SlideShare ist ein Scribd-Unternehmen logo
1 von 90
MPLS Tutorial
Peter Ashwood-Smith
Bilel N. Jamoussi
petera@nortelnetworks.com
jamoussi@nortelnetworks.com
Tutorial Outline

• Overview
• Label Encapsulations
• Label Distribution Protocols
• MPLS & ATM
• Constraint Based Routing with CR-LDP
• Summary

2
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
“Label Substitution” what is it?
One of the many ways of getting from A to B:
•BROADCAST: Go everywhere, stop when you get to
B, never ask for directions.
•HOP BY HOP ROUTING: Continually ask who’s closer
to B go there, repeat … stop when you get to B.
“Going to B? You’d better go to X, its on the way”.
•SOURCE ROUTING: Ask for a list (that you carry with
you) of places to go that eventually lead you to B .
“Going to B? Go straight 5 blocks, take the next left, 6 more
blocks and take a right at the lights”.
3
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Substitution
•Have a friend go to B ahead of you using one of the
previous two techniques. At every road they reserve a
lane just for you. At ever intersection they post a big sign
that says for a given lane which way to turn and what new
lane to take.
LANE#1 TURN RIGHT USE LANE#2
LANE#1

LANE#2

4
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
A label by any other name ...
There are many examples of label substitution
protocols already in existence.
• ATM - label is called VPI/VCI and travels with cell.
• Frame Relay - label is called a DLCI and travels with
frame.
• TDM - label is called a timeslot its implied, like a lane.
• X25 - a label is an LCN
• Proprietary PORS, TAG etc..
• One day perhaps Frequency substitution where label is a
light frequency?
5
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
SO WHAT IS MPLS ?

• Hop-by-hop or source routing
to establish labels
• Uses label native to the media
• Multi level label substitution transport

6
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
ROUTE AT EDGE, SWITCH IN CORE

IP

IP

IP Forwarding

#L1

IP

#L2

LABEL SWITCHING

IP

#L3

IP

IP Forwarding

7
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS: HOW DOES IT WORK
TIME

UDP-Hello

UDP-Hello

TCP-open

Initialization(s)

IP

Label request

#L2

TIME

Label mapping
8
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
WHY MPLS ?

• Leverage existing ATM hardware
• Ultra fast forwarding
• IP Traffic Engineering
— Constraint-based Routing

• Virtual Private Networks
— Controllable tunneling mechanism

• Voice/Video on IP
— Delay variation + QoS constraints

9
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
BEST OF BOTH WORLDS
PACKET
ROUTING

IP

HYBRID

MPLS
+IP

CIRCUIT
SWITCHING

ATM

•MPLS + IP form a middle ground that combines the best of
IP and the best of circuit switching technologies.
•ATM and Frame Relay cannot easily come to the middle
so IP has!!
10
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Terminology
• LDP: Label Distribution Protocol
• LSP: Label Switched Path
• FEC: Forwarding Equivalence Class
• LSR: Label Switching Router
• LER: Label Edge Router (Useful term not in standards)

11
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Forwarding Equivalence Classes
LSR

LER

LSR

LER

LSP
IP1

IP2

IP1
IP1

#L1

IP1

#L2

IP1

#L3

IP2

#L1

IP2

#L2

IP2

#L3

IP2

Packets are destined for different address prefixes, but can be
mapped to common path

• FEC = “A subset of packets that are all treated the same way by a router”
• The concept of FECs provides for a great deal of flexibility and scalability
• In conventional routing, a packet is assigned to a FEC at each hop (i.e. L3
look-up), in MPLS it is only done once at the network ingress
12
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
LABEL SWITCHED PATH (vanilla)
#14
#99

#311

#963

#216

#311
#311

#963
#14
#612
#5

#462
#99

#311

- A Vanilla LSP is actually part of a tree from
every source to that destination (unidirectional).
- Vanilla LDP builds that tree using existing IP
forwarding tables to route the control messages.
13
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS BUILT ON STANDARD IP
Dest
47.1
47.2
47.3

Dest
47.1
47.2
47.3

Out
1
2
3

3
Dest
47.1
47.2
47.3

Out
1
2
3

3

1

Out
1
2
3

1 47.1
2

2
1
47.2

47.3 3
2

• Destination based forwarding tables as built by OSPF, IS-IS, RIP, etc.
14

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
IP FORWARDING USED BY HOPBY-HOP CONTROL
Dest
47.1
47.2
47.3

Dest
47.1
47.2
47.3

3

Out
1
2
3

Dest
47.1
47.2
47.3

Out
1
2
3

Out
1
2
3

1 47.1
1

IP 47.1.1.1

2

IP 47.1.1.1

2
IP 47.1.1.1
1
47.2

47.3 3
2
IP 47.1.1.1

15
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Label Distribution
Intf Label Dest Intf Label
In In
Out Out
3
0.50 47.1 1
0.40

Intf Dest Intf Label
In
Out Out
3
47.1 1
0.50

Request: 47.1

3
7.1
st : 4
ue
Req

1

47.3 3
2

Intf
In
3

Ma

:0
ping
p

1
.50

2

Label Dest Intf
In
Out
0.40 47.1 1
1
3
2

Mapping: 0.40
47.2

16
Copyright © 1999, Nortel Networks, Ltd.

47.1

BNJ+PAS
Label Switched Path (LSP)
Intf Label Dest Intf Label
In In
Out Out
3
0.50 47.1 1
0.40
Intf Dest Intf Label
In
Out Out
3
47.1 1
0.50

Intf
In
3

Label Dest Intf
In
Out
0.40 47.1 1
IP 47.1.1.1
1 47.1

3

3
2

1
1

2

47.3 3

47.2
2

IP 47.1.1.1

17
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Route=
{A,B,C}

EXPLICITLY ROUTED OR ER-LSP
#14
#216

#972

B
A

#14

C
#972

#462

- ER-LSP follows route that source chooses. In
other words, the control message to establish
the LSP (label request) is source routed.
18
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
EXPLICITLY ROUTED LSP ER-LSP

Intf Label Dest Intf Label
In In
Out Out
3
0.50 47.1 1
0.40
Intf
In
3
3

Dest
47.1.1
47.1

Intf
Out
2
1

Label
Out
1.33
0.50

Intf
In
3

Label Dest Intf
In
Out
0.40 47.1 1
IP 47.1.1.1
1 47.1

3

3
2

1
1

2

47.3 3

47.2
2

IP 47.1.1.1

19
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
ER LSP - advantages

•Operator has routing flexibility (policy-based,
QoS-based)
•Can use routes other than shortest path
•Can compute routes based on constraints in
exactly the same manner as ATM based on
distributed topology database.
(traffic engineering)

20
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
ER LSP - discord!
•Two signaling options proposed in the standards:
CR-LDP, RSVP extensions:
— CR-LDP = LDP + Explicit Route
— RSVP ext = Traditional RSVP + Explicit Route +
Scalability Extensions
•Not going to be resolved any time soon, market
will probably have to resolve it.
•Survival of the fittest not such a bad thing.

21
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Tutorial Outline
• Overview

• Label Encapsulations
• Label Distribution Protocols
• MPLS & ATM
• Constraint Based Routing with CR-LDP
• Summary

22
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Encapsulation
L2

ATM

FR

Label VPI VCI

DLCI

Ethernet

PPP

“Shim Label”

“Shim Label” …….
IP | PAYLOAD
MPLS Encapsulation is specified over various media
types. Top labels may use existing format, lower
label(s) use a new “shim” label format.
23
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Link Layers
• MPLS is intended to run over multiple link layers
• Specifications for the following link layers currently exist:
• ATM: label contained in VCI/VPI field of ATM header
• Frame Relay: label contained in DLCI field in FR header
• PPP/LAN: uses ‘shim’ header inserted between L2 and L3 headers
Translation between link layers types must be supported

MPLS intended to be “multi-protocol” below as well as above
MPLS intended to be “multi-protocol” below as well as above
24
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Encapsulation - ATM
ATM LSR constrained by the cell format imposed by existing ATM standards
ATM LSR constrained by the cell format imposed by existing ATM standards
5 Octets

ATM Header
Format
Option 1

VPI
Label

PT

CLP

HEC

Label

Combined Label

Option 2
Option 3

VCI

ATM VPI (Tunnel)

Label
AAL 5 PDU Frame (nx48 bytes)

•••

n

ATM
SAR

1
Network Layer Header
and Packet (eg. IP)

Generic Label Encap.
(PPP/LAN format)

AAL5 Trailer

48 Bytes

ATM Header
ATM Payload

48 Bytes

•••

• Top 1 or 2 labels are contained in the VPI/VCI fields of ATM header
- one in each or single label in combined field, negotiated by LDP
• Further fields in stack are encoded with ‘shim’ header in PPP/LAN format
- must be at least one, with bottom label distinguished with ‘explicit NULL’
• TTL is carried in top label in stack, as a proxy for ATM header (that lacks TTL)
25
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Encapsulation - Frame Relay
Generic Encap.
(PPP/LAN Format)

Q.922
Header
n

DLCI

C/ E
R A

DLCI

•••

FE BE D E
CN CN E A

Layer 3 Header and Packet
1

DLCI Size = 10, 17, 23 Bits

• Current label value carried in DLCI field of Frame Relay header
• Can use either 2 or 4 octet Q.922 Address (10, 17, 23 bytes)
• Generic encapsulation contains n labels for stack of depth n
- top label contains TTL (which FR header lacks), ‘explicit NULL’ label value

26
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Encapsulation - PPP & LAN Data Links
MPLS ‘Shim’ Headers (1-n)
n

•••

1
Network Layer Header
and Packet (eg. IP)

Layer 2 Header
(eg. PPP, 802.3)

4 Octets

Label Stack
Entry Format

Label

Exp.

TTL

S

Label: Label Value, 20 bits (0-16 reserved)
Exp.:
Experimental, 3 bits (was Class of Service)
S:
Bottom of Stack, 1 bit (1 = last entry in label stack)
TTL:
Time to Live, 8 bits

• Network layer must be inferable from value of bottom label of the stack
• TTL must be set to the value of the IP TTL field when packet is first labelled
• When last label is popped off stack, MPLS TTL to be copied to IP TTL field
• Pushing multiple labels may cause length of frame to exceed layer-2 MTU
- LSR must support “Max. IP Datagram Size for Labelling” parameter
- any unlabelled datagram greater in size than this parameter is to be fragmented
MPLS on PPP links and LANs uses ‘Shim’ Header Inserted
MPLS on PPP links and LANs uses ‘Shim’ Header Inserted
Between Layer 22and Layer 33Headers
Between Layer and Layer Headers
27
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Tutorial Outline
• Overview
• Label Encapsulations

• Label Distribution Protocols
• MPLS & ATM
• IETF Status
• Nortel’s Activity
• Summary

28
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Distribution Protocols

• Overview of Hop-by-hop &
Explicit
• Label Distribution Protocol (LDP)
• Constraint-based Routing LDP (CR-LDP)
• Extensions to RSVP
• Extensions to BGP

29
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Comparison - Hop-by-Hop vs. Explicit Routing
Hop-by-Hop Routing

Explicit Routing

• Distributes routing of control traffic

• Source routing of control traffic

• Builds a set of trees either fragment
by fragment like a random fill, or
backwards, or forwards in organized
manner.

• Builds a path from source to dest

• Reroute on failure impacted by
convergence time of routing protocol

• LSPs can be ranked so some reroute
very quickly and/or backup paths may
be pre-provisioned for rapid restoration

• Existing routing protocols are
destination prefix based
• Difficult to perform traffic
engineering, QoS-based routing

• Requires manual provisioning, or
automated creation mechanisms.

• Operator has routing flexibility (policybased, QoS-based,
• Adapts well to traffic engineering

Explicit routing shows great promise for traffic engineering
30
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Explicit Routing - MPLS vs. Traditional Routing
• Connectionless nature of IP implies that routing is based on information in
each packet header
• Source routing is possible, but path must be contained in each IP header
• Lengthy paths increase size of IP header, make it variable size, increase
overhead
• Some gigabit routers require ‘slow path’ option-based routing of IP packets
• Source routing has not been widely adopted in IP and is seen as impractical
• Some network operators may filter source routed packets for security
reasons
• MPLS’s enables the use of source routing by its connection-oriented
capabilities
- paths can be explicitly set up through the network
- the ‘label’ can now represent the explicitly routed path
• Loose and strict source routing can be supported
MPLS makes the use of source routing in the Internet practical
31

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Distribution Protocols
• Overview of Hop-by-hop & Explicit

• Label Distribution Protocol
(LDP)
• Constraint-based Routing LDP (CR-LDP)
• Extensions to RSVP
• Extensions to BGP

32
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Distribution Protocol (LDP) - Purpose
Label distribution ensures that adjacent routers have
a common view of FEC <-> label bindings
Routing Table:
Routing Table:

Routing Table:
Routing Table:
Addr-prefix
Addr-prefix
47.0.0.0/8
47.0.0.0/8

Addr-prefix
Addr-prefix
47.0.0.0/8
47.0.0.0/8

Next Hop
Next Hop
LSR2
LSR2

Next Hop
Next Hop
LSR3
LSR3

LSR1
IP Packet

LSR3

LSR2

47.80.55.3

Label Information Base:
Label-In FEC Label-Out
XX
47.0.0.0/8
17
XX
47.0.0.0/8
17

Step 3: LSR inserts label
value into forwarding base

For 47.0.0.0/8
use label ‘17’

Label Information Base:
Label Information Base:
Label-In FEC Label-Out
Label-In
17
47.0.0.0/8
XX
17
47.0.0.0/8
XX

Step 2: LSR communicates
binding to adjacent LSR

Step 1: LSR creates binding
between FEC and label value

Common understanding of which FEC the label is referring to!

Label distribution can either piggyback on top of an existing routing protocol,
or a dedicated label distribution protocol (LDP) can be created
33
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Distribution - Methods
Label Distribution can take place using one of two possible methods
Downstream Label Distribution

Downstream-on-Demand Label Distribution
LSR2

LSR1

Label-FEC Binding

• LSR2 and LSR1 are said to have an “LDP
adjacency” (LSR2 being the downstream LSR)

LSR1

LSR2

Request for Binding
Label-FEC Binding

• LSR2 discovers a ‘next hop’ for a particular FEC

• LSR1 recognizes LSR2 as its next-hop for an FEC

• LSR2 generates a label for the FEC and
communicates the binding to LSR1

• A request is made to LSR2 for a binding between
the FEC and a label

• LSR1 inserts the binding into its forwarding tables

• If LSR2 recognizes the FEC and has a next hop for
it, it creates a binding and replies to LSR1

• If LSR2 is the next hop for the FEC, LSR1 can use
that label knowing that its meaning is understood

• Both LSRs then have a common understanding

Both methods are supported, even in the same network at the same time
For any single adjacency, LDP negotiation must agree on a common method
34
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
DOWNSTREAM MODE MAKING
SPF TREE COPY IN H/W
#14
#99

D
#963
#14
#612

D

#311

D

D

D

#5

#311

#963

#216

#311

D
D

D

#462

#311

#99

35
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
DOWNSTREAM ON DEMAND
MAKING SPF TREE COPY IN H/W
#14
#99

D

#311

#963

#216

#311
#311

D?
#963

D?
#14 D

D?
#612

D

#5

D

D?

D?

D

D

D?

D?
D?

D

D

#462

#311

#99

36
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Distribution Control: Ordered v. Independent
MPLS path forms as associations
are made between FEC next-hops
and incoming and outgoing labels

Next Hop
(for FEC)
Incoming
Label

Independent LSP Control
Definition

Comparison

• Each LSR makes independent decision on when to
generate labels and communicate them to
upstream peers
• Communicate label-FEC binding to peers once
next-hop has been recognized
• LSP is formed as incoming and outgoing labels are
spliced together

• Labels can be exchanged with less delay
• Does not depend on availability of egress node
• Granularity may not be consistent across the nodes
at the start
• May require separate loop detection/mitigation
method

Outgoing
Label

Ordered LSP Control
• Label-FEC binding is communicated to peers if:
- LSR is the ‘egress’ LSR to particular FEC
- label binding has been received from
upstream LSR
• LSP formation ‘flows’ from egress to ingress

• Requires more delay before packets can be
forwarded along the LSP
• Depends on availability of egress node
• Mechanism for consistent granularity and freedom
from loops
• Used for explicit routing and multicast

Both methods are supported in the standard and can be fully interoperable
37
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
INDEPENDENT MODE
#14
#99

D

#963
#612

D

#5

D

#14

D

D
#99

#311

#963

#216

#311
#311

D

D
D

#462

#311

38
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Retention Methods
An LSR may receive label
bindings from multiple LSRs

LSR1

Some bindings may come
from LSRs that are not the
valid next-hop for that FEC

Binding
for LSR5

LSR2
LSR5
Binding for LSR5

Binding
for LSR5

LSR2

LSR1

Label Bindings
for LSR5
LSR3

LSR4’s Label
LSR3’s Label
LSR2’s Label

Valid
Next Hop

LSR4

Conservative Label Retention

Liberal Label Retention
Label Bindings
for LSR5

LSR3

LSR4

• LSR maintains bindings received from LSRs
other than the valid next hop
• If the next-hop changes, it may begin using
these bindings immediately
• May allow more rapid adaptation to routing
changes
• Requires an LSR to maintain many more
labels

LSR2

LSR1

LSR3

LSR4’s Label
LSR3’s Label
LSR2’s Label

Valid
Next Hop

LSR4

• LSR only maintains bindings received from
valid next hop
• If the next-hop changes, binding must be
requested from new next hop
• Restricts adaptation to changes in routing
• Fewer labels must be maintained by LSR

Label Retention method trades off between label capacity and speed of adaptation to routing changes
39
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
LIBERAL RETENTION MODE
These labels are kept
incase they are needed
after a failure.
#216

D

D
#422

#622
#963
#612
#5

D

#14

D

D
D

#99

D

D
D

D
#462

#311

40
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CONSERVATIVE RETENTION MODE
These labels are
released the moment
they are received.
#216

D

D
#422

#622
#963
#612
#5

D

#14

D

D
D

#99

D

D
D

D
#462

#311

41
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
LDP - STATUS
•Gone to last call
•Multi Vendor interoperability
demonstrated for DSOD on OC-3/ATM by
(Nortel Networks & Cisco) at Interop/99
•Source code for these PDUs publicly
available: www.NortelNetworks.com/mpls

42
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Distribution Protocols
• Overview of Hop-by-hop & Explicit
• Label Distribution Protocol (LDP)

• Constraint-based Routing LDP
(CR-LDP)
• Extensions to RSVP

43
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Constraint-based LSP Setup using LDP
• Uses LDP Messages (request, map, notify)
• Shares TCP/IP connection with LDP
• Can coexist with vanilla LDP and interwork with it, or can exist as an entity on its
own

• Introduces additional data to the vanilla
LDP messages to signal ER, and other
“Constraints”

44
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
ER-LSP Setup using CR-LDP

1. Label Request message. It
contains ER path < B,C,D>

2. Request message processed
and next node determined.
Path list modified to <C,D>

6. When LER A
receives label mapping,
the ER established.
LER A

Ingress

5. LSR C receives label to
use for sending data to LER
D. Label table updated
LSR B

3. Request message
terminates.

4. Label mapping
message originates.

LSR C

LER D

ER Label
Switched Path

Egress

45
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
LDP/CR-LDP INTERWORKING
INSERT ER{A,B,C}
#216

#99

A
#311

B
C

#14
#612

#462

#5

LDP

CR-LDP

- It is possible to take a vanilla LDP label request
let it flow vanilla to the edge of the core, insert
an ER hop list at the core boundary at which
point it is CR-LDP to the far side of the core.
46
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Basic LDP Message additions
• LSPID: A unique tunnel identifier within an
MPLS network.

• ER: An explicit route, normally a list of
IPV4 addresses to follow (source route)
the label request message.

• Resource Class (Color): to constrain the
route to only links of this Color. Basically a
32 bit mask used for constraint based
computations.

• Traffic Parameters: similar to ATM call
setup, which specify treatment and reserve
resources.
47

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CR-LDP Traffic Parameters
Flags control “negotiability” of
parameters
U F

Traf. Param. TLV

Flags

Frequency

Length
Reserved

Weight

Peak Data Rate (PDR)
Peak Burst Size (PBS)
Committed Data Rate (CDR)
Committed Burst Size (CBS)
Excess Burst Size (EBS)

32 bit fields are short IEEE floating point
numbers
Any parameter may be used or not used by
selecting appropriate values

Frequency constrains the variable
delay that may be introduced
Weight of the CRLSP in the
“relative share”
Peak rate (PDR+PBS) maximum
rate at which traffic should be sent
to the CRLSP
Committed rate (CDR+CBS) the
rate that the MPLS domain
commits to be available to the
CRLSP
Excess Burst Size (EBS) to
measure the extent by which the
traffic sent on a CRLSP exceeds
the committed rate
48

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CRLSP characteristics not edge functions
• The approach is like diff-serv’s separation of PHB
from Edge

• The parameters describe the “path behavior” of the
CRLSP, i.e. the CRLSP’s characteristics

• Dropping behavior is not signaled
— Dropping may be controlled by DS packet markings

• CRLSP characteristics may be combined with edge
functions (which are undefined in CRLDP) to create
services
— Edge functions can perform packet marking
— Example services are in an appendix

49
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Peak rate
• The maximum rate at which traffic should
be sent to the CRLSP

• Defined by a token bucket with parameters
— Peak data rate (PDR)
— Peak burst size (PBS)

• Useful for resource allocation
• If a network uses the peak rate for
resource allocation then its edge function
should regulate the peak rate

• May be unused by setting PDR or PBS or
both to positive infinity
50
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Committed rate
• The rate that the MPLS domain commits to
be available to the CRLSP

• Defined by a token bucket with parameters
— Committed data rate (CDR)
— Committed burst size (CBS)

• Committed rate is the bandwidth that
should be reserved for the CRLSP

• CDR = 0 makes sense; CDR = +∞ less so
• CBS describes the burstiness with which
traffic may be sent to the CRLSP
51
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Excess burst size
• Measure the extent by which the traffic
sent on a CRLSP exceeds the committed
rate

• Defined as an additional limit on the
committed rate’s token bucket

• Can be useful for resource reservation
• If a network uses the excess burst size for
resource allocation then its edge function
should regulate the parameter and perhaps
mark or drop packets

• EBS = 0 and EBS = +∞ both make sense
52
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Frequency
• Specifies how frequently the committed rate should
be given to CRLSP

• Defined in terms of “granularity” of allocation of
rate

• Constrains the variable delay that the network may
introduce

• Constrains the amount of buffering that a LSR may
use

• Values:
— Very frequently: no more than one packet may be
buffered
— Frequently: only a few packets may be buffered
— Unspecified: any amount of buffering is acceptable
53
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Weight
• Specifies the CRLSP’s weight in the
“realtive share algorithm”

• Implied but not stated:
— CRLSPs with a larger weight get a bigger relative share
of the “excess bandwidth”

• Values:
— 0 — the weight is not specified
— 1-255 — weights; larger numbers are larger weights

• The definition of “relative share” is
network specific

54
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Negotiation flags

PDR Negotiation Flag

PBS Negotiation Flag

CDR Negotiation Flag

CBS Negotiation Flag

EBS Negotiation Flag

Weight Negotiation Flag

Res F6 F5 F4 F3 F2 F1

If a parameter is flagged as negotiable
then LSRs may replace the parameter
value with a smaller value in the label
request message. LSRs descover the
negotiated values in the label mapping
message.
Label request - possible
downward negotiation

Label mapping no negotiation
55
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CR-LDP PREEMPTION
A CR-LSP carries an LSP priority. This
priority can be used to allow new LSPs to
bump existing LSPs of lower priority in
order to steal their resources.
This is especially useful during times of
failure and allows you to rank the LSPs
such that the most important obtain
resources before less important LSPs.
These are called the setupPriority and a
holdingPriority and 8 levels are provided.
56
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CR-LDP PREEMPTION
When an LSP is established its
setupPriority is compared with the
holdingPriority of existing LSPs, any with
lower holdingPriority may be bumped to
obtain their resources.
This process may continue in a domino
fashion until the lowest holdingPriority
LSPs either clear or are on the worst
routes.

57
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
PREEMPTION A.K.A. BUMPING
Route=
{A,B,C}
#216

B
A

#14

C
#972

#462

58
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
LOW PRI

HIGH PRI

TOPOLOGY DB FOR BUMPING

Topology Database sees 8 levels of bandwidth, depending on
the setup priority of the LSP, a subset of that bandwidth is
seen as available.
The highest priority sees all bandwidth used and free at
levels lower that it, etc. to the lowest priority which only sees
unused bandwidth.
59
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CR-LDP Status
• Going through last call
• Demonstrated Interoperability Nov/98
Nortel Networks, Ericson, GDC

• Extensions to CR-LDP now being
proposed for:

• Bandwidth Adjustment (AT&T)
Multicast ….

• Source code for these PDUs publicly
available:
www.NortelNetworks.com/mpls
60
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Distribution Protocols
• Overview of Hop-by-hop & Explicit
• Label Distribution Protocol (LDP)
• Constraint-based Routing LDP (CR-LDP)

• Extensions to RSVP

61
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
ER-LSP setup using RSVP

2. New path state. Path
message sent to next node

1. Path message. It contains
ER path < B,C,D>

3. Resv message originates.
Contain the label to use and the
required traffic/QoS para.

4. New reservation state.
Resv message propagated
upstream

5. When LER A
receives Resv, the ER
established.
LER A

LSR B

Per-hop Path and
Resv refresh unless
suppressed

Per-hop Path and
Resv refresh unless
suppressed

LSR C

LER D

Per-hop Path and
Resv refresh unless
suppressed

62
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Tutorial Outline
• Overview
• Label Encapsulations
• Label Distribution Protocols

• MPLS & ATM
• Constraint Based Routing with CR-LDP
• Summary

63
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS & ATM
• Various Modes of Operation
— Label-Controlled ATM
— Tunneling Through ATM
— Ships in the night with ATM

• ATM Merge
— VC Merge
— VP Merge

64
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS & ATM
Several Models for running MPLS on ATM:
1. Label-Controlled ATM:
• Use ATM hardware for label switching
• Replace ATM Forum SW by IP/MPLS

IP Routing
MPLS
ATM HW

65
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label-Controlled ATM
• Label switching is used to forward network-layer packets
• It combines the fast, simple forwarding technique of ATM with network layer
routing and control of the TCP/IP protocol suite
Label Switching Router

Network Layer
Routing
(eg. OSPF, BGP4)

Switched path topology
Switched path topology
formed using network
formed using network
layer routing
layer routing
(I.e. TCP/IP technique)
(I.e. TCP/IP technique)

Forwarding
Table

Forwarding
Table
B 17

•
•
•

C 05

Label

Port

A

C

Label
IP Packet

17

B

D

IP Packet

05

Packets forwarded
Packets forwarded
by swapping short,
by swapping short,
fixed length labels
fixed length labels
(I.e. ATM technique)
(I.e. ATM technique)

ATM Label Switching is the combination of L3 routing and L2 ATM switching
66

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
2. MPLS Over ATM
MPLS

MPLS
L
S
R

ATM Network

L
S
R

Two Models
VP

VC

Internet Draft:
VCID notification over ATM Link
67
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
3. Ships in the Night
L
S
R

MPLS

ATM
SW

ATM

L
S
R
ATM
SW

• ATM Forum and MPLS control planes both run on the
same hardware but are isolated from each other, i.e.
they do not interact.

• This allows a single device to simultaneously operate
as both an MPLS LSR and an ATM switch.

• Important for migrating MPLS into an ATM network
68
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Ships in the night Requirements

• Resource Management
—VPI.VCI Space Partitioning
—Traffic management
– Bandwidth Reservation
– Admission Control
– Queuing & Scheduling
– Shaping/Policing
—Processing Capacity
69
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Bandwidth Management

Port Capacity

A. Full Sharing
MPLS
Pool 1
•MPLS
•ATM
ATM

Available

B. Protocol Partition
Pool 1 MPLS
•50%
•ATM
Available

Pool 2 ATM
•50%
•rt-VBR
Available

C. Service Partition
MPLS
Pool 1
•50%
•rt-VBR ATM
•COS2
Available
MPLS
Pool 2
•50%
•nrt-VBR ATM
•COS1
Available

• Bandwidth Guarantees
• Flexibility
Copyright © 1999, Nortel Networks, Ltd.

70
BNJ+PAS
ATM Merge
• Multipoint-to-point capability
• Motivation
— Stream Merge to achieve scalability in MPLS:

– O(n) VCs with Merge as opposed to O(n2) for full mesh
– less labels required
— Reduce number of receive VCs on terminals

• Alternatives
— Frame-based VC Merge
— Cell-based VP Merge

71
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Stream Merge
Input cell streams
1 1 1
2 2 2
3 3

in
1
2
3

out
7
6
9

6 7 9 6 7 9 6 7

Non-VC merging (Nin--Nout)
Input cell streams
in out
7 7 7 7 7 7 7 7
1 1 1
1 7
AAL5 Cell Interleaving Problem
2 2 2
2 7
7 7 7 7 7 7 7 7
3 3
3 7
No Cell Interleaving

VC merging (Nin-1out)
72
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
VC-Merge: Output Module

Reassembly buffers
Output buffer
Merge

73
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
VP-Merge

VCI=1

Option 1: Dynamic VCI Mapping

VCI=2

VPI=1

No Cell Interleaving Problem
Since VCI is unique
VCI=1
VCI=2

VPI=2

VCI=3

VPI=3
Option 2: Root
Assigned VCI
VCI=3

–merge multiple VPs into one VP
–use separate VCIs within VPs to distinguish frames
–less efficient use of VPI/VCI space, needs support of SVP
74
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Tutorial Outline
• Overview
• Label Encapsulations
• Label Distribution Protocols
• MPLS & ATM

• Constraint Based Routing
with CR-LDP
• Summary

75
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
IP FOLLOWS A TREE TO DESTINATION
Dest=a.b.c.d

Dest=a.b.c.d

Dest=a.b.c.d

- IP will over-utilize best paths and under-utilize
less good paths.
76
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
HOP-BY-HOP(A.K.A Vanilla) LDP
#216

#963
#14
#612
#5

#462
#99

#311

- Ultra fast, simple forwarding a.k.a switching
- Follows same route as normal IP datapath
- So like IP, LDP will over-utilize best paths and
under-utilize less good paths.
77
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Label Switched Path (Two Types)
#427

#216

#819
#77

#18
#963
#14
#612

#462
#99

#5

#311

Two types of Label Switched Paths:
•

Hop by hop

•

Explicit Routing (LDP+”ER”)

(“Vanilla” LDP)
78

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
CR-LDP
• CR = “Constraint” based “Routing”
• eg: USE: (links with sufficient resources AND
(links of type “someColor”) AND
(links that have delay less than 200 ms)

&

&

=
79
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Pieces Required for Constraint
Based Routing
1) A topology database that knows about link attributes.
{a,b,c}

ANSWER: OSPF/ISIS + attribs{a,b,c}

z

{a,b,c}
z

2) A label distribution protocol that goes where it’s told.
ANSWER: LDP + Explicit Route{x,y,m,z}

x

y

m

z
80

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Tutorial Outline
• Overview
• Label Encapsulations
• Label Distribution Protocols
• MPLS & ATM
• Constraint Based Routing with CR-LDP

• Summary

81
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Summary of Motivations for MPLS
• Simplified forwarding based on exact match of fixed length label
- initial drive for MPLS was based on existance of cheap, fast ATM switches

• Separation of routing and forwarding in IP networks
- facilitates evolution of routing techniques by fixing the forwarding method
- new routing functionality can be deployed without changing the forwarding
techniques of every router in the Internet

• Facilitates the integration of ATM and IP
- allows carriers to leverage their large investment of ATM equipment
- eliminates the adjacency problem of VC-mesh over ATM

•Enables the use of explicit routing/source routing in IP networks
- can be easily used for such things as traffic management, QoS routing

•Promotes the partitioning of functionality within the network
- move granular processing of packets to edge; restrict core to packet forwarding
- assists in maintaining scalability of IP protocols in large networks

•Improved routing scalability through stacking of labels
- removes the need for full routing tables from interior routers in transit domain;
only routes to border routers are required

•Applicability to both cell and packet link-layers
- can be deployed on both cell (eg. ATM) and packet (eg. FR, Ethernet) media
- common management and techniques simplifies engineering

Many drivers exist for MPLS above and beyond high speed forwarding
82
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
IP and ATM Integration
IP over ATM VCs
IP over ATM VCs

IP over MPLS
IP over MPLS

• ATM cloud invisible to Layer 3 Routing

• ATM network visible to Layer 3 Routing

• Full mesh of VCs within ATM cloud

• Singe adjacency possible with edge router

• Many adjacencies between edge routers

• Hierachical network design possible

• Topology change generates many route updates

• Reduces route update traffic and power
needed to process them

• Routing algorithm made more complex

MPLS eliminates the “n-squared” problem of IP over ATM VCs
MPLS eliminates the “n-squared” problem of IP over ATM VCs
83
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Traffic Engineering
B

C

Demand

A

D

Traffic engineering is the process of mapping traffic demand onto a network
Network
Topology

Purpose of traffic engineering:
• Maximize utilization of links and nodes throughout the network
• Engineer links to achieve required delay, grade-of-service
• Spread the network traffic across network links, minimize impact of single failure
• Ensure available spare link capacity for re-routing traffic on failure
• Meet policy requirements imposed by the network operator
Traffic engineering key to optimizing cost/performance
Copyright © 1999, Nortel Networks, Ltd.

84
BNJ+PAS
Traffic Engineering Alternatives
Current methods of traffic engineering:
Manipulating routing metrics

Difficult to manage

Use PVCs over an ATM backbone

Not scalable

Over-provision bandwidth

Not economical

MPLS provides a new method to do traffic engineering (traffic steering)
Example Network:
Ingress node
explicitly routes
traffic over
uncongested path

Chosen by Traffic Eng.
(least congestion)
Congested Node

Potential benefits of MPLS for traffic engineering:
- allows explicitly routed paths
- no “n-squared” problem
- per FEC traffic monitoring
- backup paths may be configured

Chosen by routing protocol
(least cost)

operator control
scalable
granularity of feedback
redundancy/restoration

MPLS combines benefits of ATM and IP-layer traffic engineering
85

Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS Traffic Engineering Methods
• MPLS can use the source routing capability to steer traffic on desired path
• Operator may manually configure these in each LSR along the desired path
- analogous to setting up PVCs in ATM switches
• Ingress LSR may be configured with the path, RSVP used to set up LSP
- some vendors have extended RSVP for MPLS path set-up
• Ingress LSR may be configured with the path, LDP used to set up LSP
- many vendors believe RSVP not suited
• Ingress LSR may be configured with one or more LSRs along the desired path,
hop-by-hop routing may be used to set up the rest of the path
- a.k.a loose source routing, less configuration required
• If desired for control, route discovered by hop-by-hop routing can be frozen
- a.k.a “route pinning”
• In the future, constraint-based routing will offload traffic engineering tasks from
the operator to the network itself
86
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS: Scalability Through Routing Hierarchy
AS1

BR2

AS2
TR1

BR1

AS3

TR2
BR3

TR4
Ingress router
receives packet

Packet labelled
based on
egress router

TR3

BR4

Forwarding in the interior
based on IGP route

Egress border
router pops
label and fwds.

• Border routers BR1-4 run an EGP, providing inter-domain routing
• Interior transit routers TR1-4 run an IGP, providing intra-domain routing
• Normal layer 3 forwarding requires interior routers to carry full routing tables
- transit router must be able to identify the correct destination ASBR (BR1-4)
• Carrying full routing tables in all routers limits scalability of interior routing
- slower convergence, larger routing tables, poorer fault isolation
• MPLS enables ingress node to identify egress router, label packet based on interior route
• Interior LSRs would only require enough information to forward packet to egress
MPLS increases scalability by partitioning exterior routing from interior routing
87
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
MPLS: Partitioning Routing and Forwarding
Routing

Based on:
OSPF, IS-IS, BGP, RIP
Forwarding Table

Forwarding

Classful Addr. Prefix?
Classless Addr. Prefix?
Multicast Addr.?
Port No.?
ToS Field?

Based on:
MPLS

Exact Match on Fixed Length Label

• Current network has multiple forwarding paradigms
- class-ful longest prefix match (Class A,B,C boundaries)
- classless longest prefix match (variable boundaries)
- multicast (exact match on source and destination)
- type-of-service (longest prefix. match on addr. + exact match on ToS)
• As new routing methods change, new route look-up algorithms are required
- introduction of CIDR
• Next generation routers will be based on hardware for route look-up
- changes will require new hardware with new algorithm
• MPLS has a consistent algorithm for all types of forwarding; partitions routing/fwding
- minimizes impact of the introduction of new forwarding methods
MPLS introduces flexibility through consistent forwarding paradigm
88
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS
Upper Layer Consistency Across Link Layers

Ethernet

PPP
(SONET, DS-3 etc.)

ATM

Frame
Relay

• MPLS is “multiprotocol” below (link layer) as well as above (network layer)
• Provides for consistent operations, engineering across multiple technologies
• Allows operators to leverage existing infrastructure
• Co-existence with other protocols is provided for
- eg. “Ships in the Night” operation with ATM, muxing over PPP
MPLS positioned as end-to-end forwarding paradigm
MPLS positioned as end-to-end forwarding paradigm
Copyright © 1999, Nortel Networks, Ltd.

89
BNJ+PAS
Summary
• MPLS is an exciting promising emerging
technology

• Basic functionality (Encapsulation and
basic Label Distribution) has been defined
by the IETF

• Traffic engineering based on MPLS/IP is
just round the corner.

• Convergence is one step closer …...

90
Copyright © 1999, Nortel Networks, Ltd.

BNJ+PAS

Weitere ähnliche Inhalte

Was ist angesagt?

Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhuCU
 
An introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsAn introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsShawn Zandi
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Sumit Pathak
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switchingseanraz
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switchingSumita Das
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsShawn Zandi
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)Netwax Lab
 

Was ist angesagt? (20)

Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
MPLS
MPLSMPLS
MPLS
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
An introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsAn introduction to MPLS networks and applications
An introduction to MPLS networks and applications
 
Mpls
MplsMpls
Mpls
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching
 
Mpls101
Mpls101Mpls101
Mpls101
 
Mpls
MplsMpls
Mpls
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 
Mpls
MplsMpls
Mpls
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 

Andere mochten auch

Andere mochten auch (6)

MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
MPLS
MPLSMPLS
MPLS
 
10 fn tut2
10 fn tut210 fn tut2
10 fn tut2
 
MPLS
MPLSMPLS
MPLS
 
MPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label SwitchingMPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label Switching
 

Ähnlich wie Mpls

ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
ODC010001 MPLS Basic Knowledge ISSUE1.5.pptODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
ODC010001 MPLS Basic Knowledge ISSUE1.5.pptRandyDookheran1
 
PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PROIDEA
 
PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PROIDEA
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistancePROIDEA
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
Georgi Geshev, warranty void if label removed
Georgi Geshev,   warranty void if label removedGeorgi Geshev,   warranty void if label removed
Georgi Geshev, warranty void if label removedPacSecJP
 
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS NetworksG. Geshev
 
NFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS Fabric
NFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS FabricNFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS Fabric
NFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS Fabricozkan01
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMulugetaTsehay1
 
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introductionCodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introductionCodiLime
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Network services on Kubernetes on premise
Network services on Kubernetes on premiseNetwork services on Kubernetes on premise
Network services on Kubernetes on premiseHans Duedal
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerAPNIC
 
Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS Cisco Canada
 

Ähnlich wie Mpls (20)

mpls.ppt
mpls.pptmpls.ppt
mpls.ppt
 
MPLS_cisco.ppt
MPLS_cisco.pptMPLS_cisco.ppt
MPLS_cisco.ppt
 
MPLS101.ppt
MPLS101.pptMPLS101.ppt
MPLS101.ppt
 
01 introduction to mpls
01 introduction to mpls 01 introduction to mpls
01 introduction to mpls
 
ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
ODC010001 MPLS Basic Knowledge ISSUE1.5.pptODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
 
PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network
 
Introduction to MPLS - NANOG 61
Introduction to MPLS - NANOG 61Introduction to MPLS - NANOG 61
Introduction to MPLS - NANOG 61
 
PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Georgi Geshev, warranty void if label removed
Georgi Geshev,   warranty void if label removedGeorgi Geshev,   warranty void if label removed
Georgi Geshev, warranty void if label removed
 
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
[ZeroNights] G. Geshev - Warranty Void If Label Removed: Attacking MPLS Networks
 
NFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS Fabric
NFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS FabricNFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS Fabric
NFV SDN Summit March 2014 D1 07 kireeti_kompella Native MPLS Fabric
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdf
 
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introductionCodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Network services on Kubernetes on premise
Network services on Kubernetes on premiseNetwork services on Kubernetes on premise
Network services on Kubernetes on premise
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
 
Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS
 
module 4.pptx
module 4.pptxmodule 4.pptx
module 4.pptx
 

Kürzlich hochgeladen

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Mpls

  • 1. MPLS Tutorial Peter Ashwood-Smith Bilel N. Jamoussi petera@nortelnetworks.com jamoussi@nortelnetworks.com
  • 2. Tutorial Outline • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • Constraint Based Routing with CR-LDP • Summary 2 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 3. “Label Substitution” what is it? One of the many ways of getting from A to B: •BROADCAST: Go everywhere, stop when you get to B, never ask for directions. •HOP BY HOP ROUTING: Continually ask who’s closer to B go there, repeat … stop when you get to B. “Going to B? You’d better go to X, its on the way”. •SOURCE ROUTING: Ask for a list (that you carry with you) of places to go that eventually lead you to B . “Going to B? Go straight 5 blocks, take the next left, 6 more blocks and take a right at the lights”. 3 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 4. Label Substitution •Have a friend go to B ahead of you using one of the previous two techniques. At every road they reserve a lane just for you. At ever intersection they post a big sign that says for a given lane which way to turn and what new lane to take. LANE#1 TURN RIGHT USE LANE#2 LANE#1 LANE#2 4 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 5. A label by any other name ... There are many examples of label substitution protocols already in existence. • ATM - label is called VPI/VCI and travels with cell. • Frame Relay - label is called a DLCI and travels with frame. • TDM - label is called a timeslot its implied, like a lane. • X25 - a label is an LCN • Proprietary PORS, TAG etc.. • One day perhaps Frequency substitution where label is a light frequency? 5 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 6. SO WHAT IS MPLS ? • Hop-by-hop or source routing to establish labels • Uses label native to the media • Multi level label substitution transport 6 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 7. ROUTE AT EDGE, SWITCH IN CORE IP IP IP Forwarding #L1 IP #L2 LABEL SWITCHING IP #L3 IP IP Forwarding 7 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 8. MPLS: HOW DOES IT WORK TIME UDP-Hello UDP-Hello TCP-open Initialization(s) IP Label request #L2 TIME Label mapping 8 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 9. WHY MPLS ? • Leverage existing ATM hardware • Ultra fast forwarding • IP Traffic Engineering — Constraint-based Routing • Virtual Private Networks — Controllable tunneling mechanism • Voice/Video on IP — Delay variation + QoS constraints 9 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 10. BEST OF BOTH WORLDS PACKET ROUTING IP HYBRID MPLS +IP CIRCUIT SWITCHING ATM •MPLS + IP form a middle ground that combines the best of IP and the best of circuit switching technologies. •ATM and Frame Relay cannot easily come to the middle so IP has!! 10 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 11. MPLS Terminology • LDP: Label Distribution Protocol • LSP: Label Switched Path • FEC: Forwarding Equivalence Class • LSR: Label Switching Router • LER: Label Edge Router (Useful term not in standards) 11 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 12. Forwarding Equivalence Classes LSR LER LSR LER LSP IP1 IP2 IP1 IP1 #L1 IP1 #L2 IP1 #L3 IP2 #L1 IP2 #L2 IP2 #L3 IP2 Packets are destined for different address prefixes, but can be mapped to common path • FEC = “A subset of packets that are all treated the same way by a router” • The concept of FECs provides for a great deal of flexibility and scalability • In conventional routing, a packet is assigned to a FEC at each hop (i.e. L3 look-up), in MPLS it is only done once at the network ingress 12 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 13. LABEL SWITCHED PATH (vanilla) #14 #99 #311 #963 #216 #311 #311 #963 #14 #612 #5 #462 #99 #311 - A Vanilla LSP is actually part of a tree from every source to that destination (unidirectional). - Vanilla LDP builds that tree using existing IP forwarding tables to route the control messages. 13 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 14. MPLS BUILT ON STANDARD IP Dest 47.1 47.2 47.3 Dest 47.1 47.2 47.3 Out 1 2 3 3 Dest 47.1 47.2 47.3 Out 1 2 3 3 1 Out 1 2 3 1 47.1 2 2 1 47.2 47.3 3 2 • Destination based forwarding tables as built by OSPF, IS-IS, RIP, etc. 14 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 15. IP FORWARDING USED BY HOPBY-HOP CONTROL Dest 47.1 47.2 47.3 Dest 47.1 47.2 47.3 3 Out 1 2 3 Dest 47.1 47.2 47.3 Out 1 2 3 Out 1 2 3 1 47.1 1 IP 47.1.1.1 2 IP 47.1.1.1 2 IP 47.1.1.1 1 47.2 47.3 3 2 IP 47.1.1.1 15 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 16. MPLS Label Distribution Intf Label Dest Intf Label In In Out Out 3 0.50 47.1 1 0.40 Intf Dest Intf Label In Out Out 3 47.1 1 0.50 Request: 47.1 3 7.1 st : 4 ue Req 1 47.3 3 2 Intf In 3 Ma :0 ping p 1 .50 2 Label Dest Intf In Out 0.40 47.1 1 1 3 2 Mapping: 0.40 47.2 16 Copyright © 1999, Nortel Networks, Ltd. 47.1 BNJ+PAS
  • 17. Label Switched Path (LSP) Intf Label Dest Intf Label In In Out Out 3 0.50 47.1 1 0.40 Intf Dest Intf Label In Out Out 3 47.1 1 0.50 Intf In 3 Label Dest Intf In Out 0.40 47.1 1 IP 47.1.1.1 1 47.1 3 3 2 1 1 2 47.3 3 47.2 2 IP 47.1.1.1 17 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 18. Route= {A,B,C} EXPLICITLY ROUTED OR ER-LSP #14 #216 #972 B A #14 C #972 #462 - ER-LSP follows route that source chooses. In other words, the control message to establish the LSP (label request) is source routed. 18 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 19. EXPLICITLY ROUTED LSP ER-LSP Intf Label Dest Intf Label In In Out Out 3 0.50 47.1 1 0.40 Intf In 3 3 Dest 47.1.1 47.1 Intf Out 2 1 Label Out 1.33 0.50 Intf In 3 Label Dest Intf In Out 0.40 47.1 1 IP 47.1.1.1 1 47.1 3 3 2 1 1 2 47.3 3 47.2 2 IP 47.1.1.1 19 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 20. ER LSP - advantages •Operator has routing flexibility (policy-based, QoS-based) •Can use routes other than shortest path •Can compute routes based on constraints in exactly the same manner as ATM based on distributed topology database. (traffic engineering) 20 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 21. ER LSP - discord! •Two signaling options proposed in the standards: CR-LDP, RSVP extensions: — CR-LDP = LDP + Explicit Route — RSVP ext = Traditional RSVP + Explicit Route + Scalability Extensions •Not going to be resolved any time soon, market will probably have to resolve it. •Survival of the fittest not such a bad thing. 21 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 22. Tutorial Outline • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • Constraint Based Routing with CR-LDP • Summary 22 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 23. Label Encapsulation L2 ATM FR Label VPI VCI DLCI Ethernet PPP “Shim Label” “Shim Label” ……. IP | PAYLOAD MPLS Encapsulation is specified over various media types. Top labels may use existing format, lower label(s) use a new “shim” label format. 23 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 24. MPLS Link Layers • MPLS is intended to run over multiple link layers • Specifications for the following link layers currently exist: • ATM: label contained in VCI/VPI field of ATM header • Frame Relay: label contained in DLCI field in FR header • PPP/LAN: uses ‘shim’ header inserted between L2 and L3 headers Translation between link layers types must be supported MPLS intended to be “multi-protocol” below as well as above MPLS intended to be “multi-protocol” below as well as above 24 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 25. MPLS Encapsulation - ATM ATM LSR constrained by the cell format imposed by existing ATM standards ATM LSR constrained by the cell format imposed by existing ATM standards 5 Octets ATM Header Format Option 1 VPI Label PT CLP HEC Label Combined Label Option 2 Option 3 VCI ATM VPI (Tunnel) Label AAL 5 PDU Frame (nx48 bytes) ••• n ATM SAR 1 Network Layer Header and Packet (eg. IP) Generic Label Encap. (PPP/LAN format) AAL5 Trailer 48 Bytes ATM Header ATM Payload 48 Bytes ••• • Top 1 or 2 labels are contained in the VPI/VCI fields of ATM header - one in each or single label in combined field, negotiated by LDP • Further fields in stack are encoded with ‘shim’ header in PPP/LAN format - must be at least one, with bottom label distinguished with ‘explicit NULL’ • TTL is carried in top label in stack, as a proxy for ATM header (that lacks TTL) 25 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 26. MPLS Encapsulation - Frame Relay Generic Encap. (PPP/LAN Format) Q.922 Header n DLCI C/ E R A DLCI ••• FE BE D E CN CN E A Layer 3 Header and Packet 1 DLCI Size = 10, 17, 23 Bits • Current label value carried in DLCI field of Frame Relay header • Can use either 2 or 4 octet Q.922 Address (10, 17, 23 bytes) • Generic encapsulation contains n labels for stack of depth n - top label contains TTL (which FR header lacks), ‘explicit NULL’ label value 26 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 27. MPLS Encapsulation - PPP & LAN Data Links MPLS ‘Shim’ Headers (1-n) n ••• 1 Network Layer Header and Packet (eg. IP) Layer 2 Header (eg. PPP, 802.3) 4 Octets Label Stack Entry Format Label Exp. TTL S Label: Label Value, 20 bits (0-16 reserved) Exp.: Experimental, 3 bits (was Class of Service) S: Bottom of Stack, 1 bit (1 = last entry in label stack) TTL: Time to Live, 8 bits • Network layer must be inferable from value of bottom label of the stack • TTL must be set to the value of the IP TTL field when packet is first labelled • When last label is popped off stack, MPLS TTL to be copied to IP TTL field • Pushing multiple labels may cause length of frame to exceed layer-2 MTU - LSR must support “Max. IP Datagram Size for Labelling” parameter - any unlabelled datagram greater in size than this parameter is to be fragmented MPLS on PPP links and LANs uses ‘Shim’ Header Inserted MPLS on PPP links and LANs uses ‘Shim’ Header Inserted Between Layer 22and Layer 33Headers Between Layer and Layer Headers 27 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 28. Tutorial Outline • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • IETF Status • Nortel’s Activity • Summary 28 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 29. Label Distribution Protocols • Overview of Hop-by-hop & Explicit • Label Distribution Protocol (LDP) • Constraint-based Routing LDP (CR-LDP) • Extensions to RSVP • Extensions to BGP 29 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 30. Comparison - Hop-by-Hop vs. Explicit Routing Hop-by-Hop Routing Explicit Routing • Distributes routing of control traffic • Source routing of control traffic • Builds a set of trees either fragment by fragment like a random fill, or backwards, or forwards in organized manner. • Builds a path from source to dest • Reroute on failure impacted by convergence time of routing protocol • LSPs can be ranked so some reroute very quickly and/or backup paths may be pre-provisioned for rapid restoration • Existing routing protocols are destination prefix based • Difficult to perform traffic engineering, QoS-based routing • Requires manual provisioning, or automated creation mechanisms. • Operator has routing flexibility (policybased, QoS-based, • Adapts well to traffic engineering Explicit routing shows great promise for traffic engineering 30 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 31. Explicit Routing - MPLS vs. Traditional Routing • Connectionless nature of IP implies that routing is based on information in each packet header • Source routing is possible, but path must be contained in each IP header • Lengthy paths increase size of IP header, make it variable size, increase overhead • Some gigabit routers require ‘slow path’ option-based routing of IP packets • Source routing has not been widely adopted in IP and is seen as impractical • Some network operators may filter source routed packets for security reasons • MPLS’s enables the use of source routing by its connection-oriented capabilities - paths can be explicitly set up through the network - the ‘label’ can now represent the explicitly routed path • Loose and strict source routing can be supported MPLS makes the use of source routing in the Internet practical 31 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 32. Label Distribution Protocols • Overview of Hop-by-hop & Explicit • Label Distribution Protocol (LDP) • Constraint-based Routing LDP (CR-LDP) • Extensions to RSVP • Extensions to BGP 32 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 33. Label Distribution Protocol (LDP) - Purpose Label distribution ensures that adjacent routers have a common view of FEC <-> label bindings Routing Table: Routing Table: Routing Table: Routing Table: Addr-prefix Addr-prefix 47.0.0.0/8 47.0.0.0/8 Addr-prefix Addr-prefix 47.0.0.0/8 47.0.0.0/8 Next Hop Next Hop LSR2 LSR2 Next Hop Next Hop LSR3 LSR3 LSR1 IP Packet LSR3 LSR2 47.80.55.3 Label Information Base: Label-In FEC Label-Out XX 47.0.0.0/8 17 XX 47.0.0.0/8 17 Step 3: LSR inserts label value into forwarding base For 47.0.0.0/8 use label ‘17’ Label Information Base: Label Information Base: Label-In FEC Label-Out Label-In 17 47.0.0.0/8 XX 17 47.0.0.0/8 XX Step 2: LSR communicates binding to adjacent LSR Step 1: LSR creates binding between FEC and label value Common understanding of which FEC the label is referring to! Label distribution can either piggyback on top of an existing routing protocol, or a dedicated label distribution protocol (LDP) can be created 33 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 34. Label Distribution - Methods Label Distribution can take place using one of two possible methods Downstream Label Distribution Downstream-on-Demand Label Distribution LSR2 LSR1 Label-FEC Binding • LSR2 and LSR1 are said to have an “LDP adjacency” (LSR2 being the downstream LSR) LSR1 LSR2 Request for Binding Label-FEC Binding • LSR2 discovers a ‘next hop’ for a particular FEC • LSR1 recognizes LSR2 as its next-hop for an FEC • LSR2 generates a label for the FEC and communicates the binding to LSR1 • A request is made to LSR2 for a binding between the FEC and a label • LSR1 inserts the binding into its forwarding tables • If LSR2 recognizes the FEC and has a next hop for it, it creates a binding and replies to LSR1 • If LSR2 is the next hop for the FEC, LSR1 can use that label knowing that its meaning is understood • Both LSRs then have a common understanding Both methods are supported, even in the same network at the same time For any single adjacency, LDP negotiation must agree on a common method 34 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 35. DOWNSTREAM MODE MAKING SPF TREE COPY IN H/W #14 #99 D #963 #14 #612 D #311 D D D #5 #311 #963 #216 #311 D D D #462 #311 #99 35 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 36. DOWNSTREAM ON DEMAND MAKING SPF TREE COPY IN H/W #14 #99 D #311 #963 #216 #311 #311 D? #963 D? #14 D D? #612 D #5 D D? D? D D D? D? D? D D #462 #311 #99 36 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 37. Distribution Control: Ordered v. Independent MPLS path forms as associations are made between FEC next-hops and incoming and outgoing labels Next Hop (for FEC) Incoming Label Independent LSP Control Definition Comparison • Each LSR makes independent decision on when to generate labels and communicate them to upstream peers • Communicate label-FEC binding to peers once next-hop has been recognized • LSP is formed as incoming and outgoing labels are spliced together • Labels can be exchanged with less delay • Does not depend on availability of egress node • Granularity may not be consistent across the nodes at the start • May require separate loop detection/mitigation method Outgoing Label Ordered LSP Control • Label-FEC binding is communicated to peers if: - LSR is the ‘egress’ LSR to particular FEC - label binding has been received from upstream LSR • LSP formation ‘flows’ from egress to ingress • Requires more delay before packets can be forwarded along the LSP • Depends on availability of egress node • Mechanism for consistent granularity and freedom from loops • Used for explicit routing and multicast Both methods are supported in the standard and can be fully interoperable 37 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 39. Label Retention Methods An LSR may receive label bindings from multiple LSRs LSR1 Some bindings may come from LSRs that are not the valid next-hop for that FEC Binding for LSR5 LSR2 LSR5 Binding for LSR5 Binding for LSR5 LSR2 LSR1 Label Bindings for LSR5 LSR3 LSR4’s Label LSR3’s Label LSR2’s Label Valid Next Hop LSR4 Conservative Label Retention Liberal Label Retention Label Bindings for LSR5 LSR3 LSR4 • LSR maintains bindings received from LSRs other than the valid next hop • If the next-hop changes, it may begin using these bindings immediately • May allow more rapid adaptation to routing changes • Requires an LSR to maintain many more labels LSR2 LSR1 LSR3 LSR4’s Label LSR3’s Label LSR2’s Label Valid Next Hop LSR4 • LSR only maintains bindings received from valid next hop • If the next-hop changes, binding must be requested from new next hop • Restricts adaptation to changes in routing • Fewer labels must be maintained by LSR Label Retention method trades off between label capacity and speed of adaptation to routing changes 39 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 40. LIBERAL RETENTION MODE These labels are kept incase they are needed after a failure. #216 D D #422 #622 #963 #612 #5 D #14 D D D #99 D D D D #462 #311 40 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 41. CONSERVATIVE RETENTION MODE These labels are released the moment they are received. #216 D D #422 #622 #963 #612 #5 D #14 D D D #99 D D D D #462 #311 41 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 42. LDP - STATUS •Gone to last call •Multi Vendor interoperability demonstrated for DSOD on OC-3/ATM by (Nortel Networks & Cisco) at Interop/99 •Source code for these PDUs publicly available: www.NortelNetworks.com/mpls 42 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 43. Label Distribution Protocols • Overview of Hop-by-hop & Explicit • Label Distribution Protocol (LDP) • Constraint-based Routing LDP (CR-LDP) • Extensions to RSVP 43 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 44. Constraint-based LSP Setup using LDP • Uses LDP Messages (request, map, notify) • Shares TCP/IP connection with LDP • Can coexist with vanilla LDP and interwork with it, or can exist as an entity on its own • Introduces additional data to the vanilla LDP messages to signal ER, and other “Constraints” 44 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 45. ER-LSP Setup using CR-LDP 1. Label Request message. It contains ER path < B,C,D> 2. Request message processed and next node determined. Path list modified to <C,D> 6. When LER A receives label mapping, the ER established. LER A Ingress 5. LSR C receives label to use for sending data to LER D. Label table updated LSR B 3. Request message terminates. 4. Label mapping message originates. LSR C LER D ER Label Switched Path Egress 45 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 46. LDP/CR-LDP INTERWORKING INSERT ER{A,B,C} #216 #99 A #311 B C #14 #612 #462 #5 LDP CR-LDP - It is possible to take a vanilla LDP label request let it flow vanilla to the edge of the core, insert an ER hop list at the core boundary at which point it is CR-LDP to the far side of the core. 46 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 47. Basic LDP Message additions • LSPID: A unique tunnel identifier within an MPLS network. • ER: An explicit route, normally a list of IPV4 addresses to follow (source route) the label request message. • Resource Class (Color): to constrain the route to only links of this Color. Basically a 32 bit mask used for constraint based computations. • Traffic Parameters: similar to ATM call setup, which specify treatment and reserve resources. 47 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 48. CR-LDP Traffic Parameters Flags control “negotiability” of parameters U F Traf. Param. TLV Flags Frequency Length Reserved Weight Peak Data Rate (PDR) Peak Burst Size (PBS) Committed Data Rate (CDR) Committed Burst Size (CBS) Excess Burst Size (EBS) 32 bit fields are short IEEE floating point numbers Any parameter may be used or not used by selecting appropriate values Frequency constrains the variable delay that may be introduced Weight of the CRLSP in the “relative share” Peak rate (PDR+PBS) maximum rate at which traffic should be sent to the CRLSP Committed rate (CDR+CBS) the rate that the MPLS domain commits to be available to the CRLSP Excess Burst Size (EBS) to measure the extent by which the traffic sent on a CRLSP exceeds the committed rate 48 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 49. CRLSP characteristics not edge functions • The approach is like diff-serv’s separation of PHB from Edge • The parameters describe the “path behavior” of the CRLSP, i.e. the CRLSP’s characteristics • Dropping behavior is not signaled — Dropping may be controlled by DS packet markings • CRLSP characteristics may be combined with edge functions (which are undefined in CRLDP) to create services — Edge functions can perform packet marking — Example services are in an appendix 49 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 50. Peak rate • The maximum rate at which traffic should be sent to the CRLSP • Defined by a token bucket with parameters — Peak data rate (PDR) — Peak burst size (PBS) • Useful for resource allocation • If a network uses the peak rate for resource allocation then its edge function should regulate the peak rate • May be unused by setting PDR or PBS or both to positive infinity 50 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 51. Committed rate • The rate that the MPLS domain commits to be available to the CRLSP • Defined by a token bucket with parameters — Committed data rate (CDR) — Committed burst size (CBS) • Committed rate is the bandwidth that should be reserved for the CRLSP • CDR = 0 makes sense; CDR = +∞ less so • CBS describes the burstiness with which traffic may be sent to the CRLSP 51 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 52. Excess burst size • Measure the extent by which the traffic sent on a CRLSP exceeds the committed rate • Defined as an additional limit on the committed rate’s token bucket • Can be useful for resource reservation • If a network uses the excess burst size for resource allocation then its edge function should regulate the parameter and perhaps mark or drop packets • EBS = 0 and EBS = +∞ both make sense 52 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 53. Frequency • Specifies how frequently the committed rate should be given to CRLSP • Defined in terms of “granularity” of allocation of rate • Constrains the variable delay that the network may introduce • Constrains the amount of buffering that a LSR may use • Values: — Very frequently: no more than one packet may be buffered — Frequently: only a few packets may be buffered — Unspecified: any amount of buffering is acceptable 53 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 54. Weight • Specifies the CRLSP’s weight in the “realtive share algorithm” • Implied but not stated: — CRLSPs with a larger weight get a bigger relative share of the “excess bandwidth” • Values: — 0 — the weight is not specified — 1-255 — weights; larger numbers are larger weights • The definition of “relative share” is network specific 54 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 55. Negotiation flags PDR Negotiation Flag PBS Negotiation Flag CDR Negotiation Flag CBS Negotiation Flag EBS Negotiation Flag Weight Negotiation Flag Res F6 F5 F4 F3 F2 F1 If a parameter is flagged as negotiable then LSRs may replace the parameter value with a smaller value in the label request message. LSRs descover the negotiated values in the label mapping message. Label request - possible downward negotiation Label mapping no negotiation 55 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 56. CR-LDP PREEMPTION A CR-LSP carries an LSP priority. This priority can be used to allow new LSPs to bump existing LSPs of lower priority in order to steal their resources. This is especially useful during times of failure and allows you to rank the LSPs such that the most important obtain resources before less important LSPs. These are called the setupPriority and a holdingPriority and 8 levels are provided. 56 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 57. CR-LDP PREEMPTION When an LSP is established its setupPriority is compared with the holdingPriority of existing LSPs, any with lower holdingPriority may be bumped to obtain their resources. This process may continue in a domino fashion until the lowest holdingPriority LSPs either clear or are on the worst routes. 57 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 59. LOW PRI HIGH PRI TOPOLOGY DB FOR BUMPING Topology Database sees 8 levels of bandwidth, depending on the setup priority of the LSP, a subset of that bandwidth is seen as available. The highest priority sees all bandwidth used and free at levels lower that it, etc. to the lowest priority which only sees unused bandwidth. 59 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 60. CR-LDP Status • Going through last call • Demonstrated Interoperability Nov/98 Nortel Networks, Ericson, GDC • Extensions to CR-LDP now being proposed for: • Bandwidth Adjustment (AT&T) Multicast …. • Source code for these PDUs publicly available: www.NortelNetworks.com/mpls 60 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 61. Label Distribution Protocols • Overview of Hop-by-hop & Explicit • Label Distribution Protocol (LDP) • Constraint-based Routing LDP (CR-LDP) • Extensions to RSVP 61 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 62. ER-LSP setup using RSVP 2. New path state. Path message sent to next node 1. Path message. It contains ER path < B,C,D> 3. Resv message originates. Contain the label to use and the required traffic/QoS para. 4. New reservation state. Resv message propagated upstream 5. When LER A receives Resv, the ER established. LER A LSR B Per-hop Path and Resv refresh unless suppressed Per-hop Path and Resv refresh unless suppressed LSR C LER D Per-hop Path and Resv refresh unless suppressed 62 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 63. Tutorial Outline • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • Constraint Based Routing with CR-LDP • Summary 63 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 64. MPLS & ATM • Various Modes of Operation — Label-Controlled ATM — Tunneling Through ATM — Ships in the night with ATM • ATM Merge — VC Merge — VP Merge 64 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 65. MPLS & ATM Several Models for running MPLS on ATM: 1. Label-Controlled ATM: • Use ATM hardware for label switching • Replace ATM Forum SW by IP/MPLS IP Routing MPLS ATM HW 65 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 66. Label-Controlled ATM • Label switching is used to forward network-layer packets • It combines the fast, simple forwarding technique of ATM with network layer routing and control of the TCP/IP protocol suite Label Switching Router Network Layer Routing (eg. OSPF, BGP4) Switched path topology Switched path topology formed using network formed using network layer routing layer routing (I.e. TCP/IP technique) (I.e. TCP/IP technique) Forwarding Table Forwarding Table B 17 • • • C 05 Label Port A C Label IP Packet 17 B D IP Packet 05 Packets forwarded Packets forwarded by swapping short, by swapping short, fixed length labels fixed length labels (I.e. ATM technique) (I.e. ATM technique) ATM Label Switching is the combination of L3 routing and L2 ATM switching 66 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 67. 2. MPLS Over ATM MPLS MPLS L S R ATM Network L S R Two Models VP VC Internet Draft: VCID notification over ATM Link 67 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 68. 3. Ships in the Night L S R MPLS ATM SW ATM L S R ATM SW • ATM Forum and MPLS control planes both run on the same hardware but are isolated from each other, i.e. they do not interact. • This allows a single device to simultaneously operate as both an MPLS LSR and an ATM switch. • Important for migrating MPLS into an ATM network 68 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 69. Ships in the night Requirements • Resource Management —VPI.VCI Space Partitioning —Traffic management – Bandwidth Reservation – Admission Control – Queuing & Scheduling – Shaping/Policing —Processing Capacity 69 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 70. Bandwidth Management Port Capacity A. Full Sharing MPLS Pool 1 •MPLS •ATM ATM Available B. Protocol Partition Pool 1 MPLS •50% •ATM Available Pool 2 ATM •50% •rt-VBR Available C. Service Partition MPLS Pool 1 •50% •rt-VBR ATM •COS2 Available MPLS Pool 2 •50% •nrt-VBR ATM •COS1 Available • Bandwidth Guarantees • Flexibility Copyright © 1999, Nortel Networks, Ltd. 70 BNJ+PAS
  • 71. ATM Merge • Multipoint-to-point capability • Motivation — Stream Merge to achieve scalability in MPLS: – O(n) VCs with Merge as opposed to O(n2) for full mesh – less labels required — Reduce number of receive VCs on terminals • Alternatives — Frame-based VC Merge — Cell-based VP Merge 71 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 72. Stream Merge Input cell streams 1 1 1 2 2 2 3 3 in 1 2 3 out 7 6 9 6 7 9 6 7 9 6 7 Non-VC merging (Nin--Nout) Input cell streams in out 7 7 7 7 7 7 7 7 1 1 1 1 7 AAL5 Cell Interleaving Problem 2 2 2 2 7 7 7 7 7 7 7 7 7 3 3 3 7 No Cell Interleaving VC merging (Nin-1out) 72 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 73. VC-Merge: Output Module Reassembly buffers Output buffer Merge 73 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 74. VP-Merge VCI=1 Option 1: Dynamic VCI Mapping VCI=2 VPI=1 No Cell Interleaving Problem Since VCI is unique VCI=1 VCI=2 VPI=2 VCI=3 VPI=3 Option 2: Root Assigned VCI VCI=3 –merge multiple VPs into one VP –use separate VCIs within VPs to distinguish frames –less efficient use of VPI/VCI space, needs support of SVP 74 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 75. Tutorial Outline • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • Constraint Based Routing with CR-LDP • Summary 75 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 76. IP FOLLOWS A TREE TO DESTINATION Dest=a.b.c.d Dest=a.b.c.d Dest=a.b.c.d - IP will over-utilize best paths and under-utilize less good paths. 76 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 77. HOP-BY-HOP(A.K.A Vanilla) LDP #216 #963 #14 #612 #5 #462 #99 #311 - Ultra fast, simple forwarding a.k.a switching - Follows same route as normal IP datapath - So like IP, LDP will over-utilize best paths and under-utilize less good paths. 77 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 78. Label Switched Path (Two Types) #427 #216 #819 #77 #18 #963 #14 #612 #462 #99 #5 #311 Two types of Label Switched Paths: • Hop by hop • Explicit Routing (LDP+”ER”) (“Vanilla” LDP) 78 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 79. CR-LDP • CR = “Constraint” based “Routing” • eg: USE: (links with sufficient resources AND (links of type “someColor”) AND (links that have delay less than 200 ms) & & = 79 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 80. Pieces Required for Constraint Based Routing 1) A topology database that knows about link attributes. {a,b,c} ANSWER: OSPF/ISIS + attribs{a,b,c} z {a,b,c} z 2) A label distribution protocol that goes where it’s told. ANSWER: LDP + Explicit Route{x,y,m,z} x y m z 80 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 81. Tutorial Outline • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • Constraint Based Routing with CR-LDP • Summary 81 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 82. Summary of Motivations for MPLS • Simplified forwarding based on exact match of fixed length label - initial drive for MPLS was based on existance of cheap, fast ATM switches • Separation of routing and forwarding in IP networks - facilitates evolution of routing techniques by fixing the forwarding method - new routing functionality can be deployed without changing the forwarding techniques of every router in the Internet • Facilitates the integration of ATM and IP - allows carriers to leverage their large investment of ATM equipment - eliminates the adjacency problem of VC-mesh over ATM •Enables the use of explicit routing/source routing in IP networks - can be easily used for such things as traffic management, QoS routing •Promotes the partitioning of functionality within the network - move granular processing of packets to edge; restrict core to packet forwarding - assists in maintaining scalability of IP protocols in large networks •Improved routing scalability through stacking of labels - removes the need for full routing tables from interior routers in transit domain; only routes to border routers are required •Applicability to both cell and packet link-layers - can be deployed on both cell (eg. ATM) and packet (eg. FR, Ethernet) media - common management and techniques simplifies engineering Many drivers exist for MPLS above and beyond high speed forwarding 82 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 83. IP and ATM Integration IP over ATM VCs IP over ATM VCs IP over MPLS IP over MPLS • ATM cloud invisible to Layer 3 Routing • ATM network visible to Layer 3 Routing • Full mesh of VCs within ATM cloud • Singe adjacency possible with edge router • Many adjacencies between edge routers • Hierachical network design possible • Topology change generates many route updates • Reduces route update traffic and power needed to process them • Routing algorithm made more complex MPLS eliminates the “n-squared” problem of IP over ATM VCs MPLS eliminates the “n-squared” problem of IP over ATM VCs 83 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 84. Traffic Engineering B C Demand A D Traffic engineering is the process of mapping traffic demand onto a network Network Topology Purpose of traffic engineering: • Maximize utilization of links and nodes throughout the network • Engineer links to achieve required delay, grade-of-service • Spread the network traffic across network links, minimize impact of single failure • Ensure available spare link capacity for re-routing traffic on failure • Meet policy requirements imposed by the network operator Traffic engineering key to optimizing cost/performance Copyright © 1999, Nortel Networks, Ltd. 84 BNJ+PAS
  • 85. Traffic Engineering Alternatives Current methods of traffic engineering: Manipulating routing metrics Difficult to manage Use PVCs over an ATM backbone Not scalable Over-provision bandwidth Not economical MPLS provides a new method to do traffic engineering (traffic steering) Example Network: Ingress node explicitly routes traffic over uncongested path Chosen by Traffic Eng. (least congestion) Congested Node Potential benefits of MPLS for traffic engineering: - allows explicitly routed paths - no “n-squared” problem - per FEC traffic monitoring - backup paths may be configured Chosen by routing protocol (least cost) operator control scalable granularity of feedback redundancy/restoration MPLS combines benefits of ATM and IP-layer traffic engineering 85 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 86. MPLS Traffic Engineering Methods • MPLS can use the source routing capability to steer traffic on desired path • Operator may manually configure these in each LSR along the desired path - analogous to setting up PVCs in ATM switches • Ingress LSR may be configured with the path, RSVP used to set up LSP - some vendors have extended RSVP for MPLS path set-up • Ingress LSR may be configured with the path, LDP used to set up LSP - many vendors believe RSVP not suited • Ingress LSR may be configured with one or more LSRs along the desired path, hop-by-hop routing may be used to set up the rest of the path - a.k.a loose source routing, less configuration required • If desired for control, route discovered by hop-by-hop routing can be frozen - a.k.a “route pinning” • In the future, constraint-based routing will offload traffic engineering tasks from the operator to the network itself 86 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 87. MPLS: Scalability Through Routing Hierarchy AS1 BR2 AS2 TR1 BR1 AS3 TR2 BR3 TR4 Ingress router receives packet Packet labelled based on egress router TR3 BR4 Forwarding in the interior based on IGP route Egress border router pops label and fwds. • Border routers BR1-4 run an EGP, providing inter-domain routing • Interior transit routers TR1-4 run an IGP, providing intra-domain routing • Normal layer 3 forwarding requires interior routers to carry full routing tables - transit router must be able to identify the correct destination ASBR (BR1-4) • Carrying full routing tables in all routers limits scalability of interior routing - slower convergence, larger routing tables, poorer fault isolation • MPLS enables ingress node to identify egress router, label packet based on interior route • Interior LSRs would only require enough information to forward packet to egress MPLS increases scalability by partitioning exterior routing from interior routing 87 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 88. MPLS: Partitioning Routing and Forwarding Routing Based on: OSPF, IS-IS, BGP, RIP Forwarding Table Forwarding Classful Addr. Prefix? Classless Addr. Prefix? Multicast Addr.? Port No.? ToS Field? Based on: MPLS Exact Match on Fixed Length Label • Current network has multiple forwarding paradigms - class-ful longest prefix match (Class A,B,C boundaries) - classless longest prefix match (variable boundaries) - multicast (exact match on source and destination) - type-of-service (longest prefix. match on addr. + exact match on ToS) • As new routing methods change, new route look-up algorithms are required - introduction of CIDR • Next generation routers will be based on hardware for route look-up - changes will require new hardware with new algorithm • MPLS has a consistent algorithm for all types of forwarding; partitions routing/fwding - minimizes impact of the introduction of new forwarding methods MPLS introduces flexibility through consistent forwarding paradigm 88 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS
  • 89. Upper Layer Consistency Across Link Layers Ethernet PPP (SONET, DS-3 etc.) ATM Frame Relay • MPLS is “multiprotocol” below (link layer) as well as above (network layer) • Provides for consistent operations, engineering across multiple technologies • Allows operators to leverage existing infrastructure • Co-existence with other protocols is provided for - eg. “Ships in the Night” operation with ATM, muxing over PPP MPLS positioned as end-to-end forwarding paradigm MPLS positioned as end-to-end forwarding paradigm Copyright © 1999, Nortel Networks, Ltd. 89 BNJ+PAS
  • 90. Summary • MPLS is an exciting promising emerging technology • Basic functionality (Encapsulation and basic Label Distribution) has been defined by the IETF • Traffic engineering based on MPLS/IP is just round the corner. • Convergence is one step closer …... 90 Copyright © 1999, Nortel Networks, Ltd. BNJ+PAS

Hinweis der Redaktion

  1. &lt;number&gt;
  2. The “Forwarding Equivalence Class” is an important concept in MPLS. An FEC is any subset of packets that are treated the same way by a router. By “treated” this can mean, forwarded out the same interface with the same next hop and label. It can also mean given the same class of service, output on same queue, given same drop preference, and any other option available to the network operator. When a packet enters the MPLS network at the ingress node, the packet is mapped into an FEC. The mapping can also be done on a wide variety of parameters, address prefix (or host), source/destination address pair, or ingress interface. This greater flexibility adds functionality to MPLS that is not available in traditional IP routing. FECs also allow for greater scalability in MPLS. In Ipsilon’s implementation of IP Switching or in MPOA, their equivalent to an FEC maps to a data flow (source/destination address pair, or source/destination address plus port no.). The limited flexibility and large numbers of (short lived) flows in the Internet limits the applicability of both IP Switching and MPOA. With MPLS, the aggregation of flows into FECs of variable granularity provides scalability that meets the demands of the public Internet as well as enterprise applications. In the current Label Distribution Protocol specification, only three types of FECs are specified: - IP Address Prefix - Router ID - Flow (port, dest-addr, src-addr etc.) The spec. states that new elements can be added as required.
  3. &lt;number&gt;
  4. Labels are created based on the forwarding equivalence classes (FECs) created through the layer 3 routing protocol. In order for label swapping to be possible, common understanding of which FECs map to which labels must be achieved between adjacent routers. The communication of label binding information (I.e. the binding of an FEC to a specific label value) between LSRs is accomplished by label distribution. Label distribution can occur either by piggybacking binding information on an existing routing protocol, or through the creation of a dedicated label distribution protocol (LDP). In either case, a router would communicate binding information after a specific label value is assigned to an FEC. The LSR receiving this binding information would, assuming the information comes from the correct next hop, insert the label value into the label information base associated with the corresponding FEC. After this information is communicated, the upstream LSR knows that if it is forwarding a packet associated with the particular FEC, it can use the associated label value and the downstream LSR that the packet is forwarded to will recognize it as belonging to that FEC. As this information is communicated along a chain of LSRs, a path will be set up along which a number of hops can use label swapping and avoid the full layer 3 look-up. This is a much simplified view of label distribution, in reality there are a number of options and techniques by which this can be implemented.
  5. &lt;number&gt; CR-LDP is an open standard protocol, proposed and accepted by the IETF MPLS working group. It does not have any dependencies on other protocols that are outside the scope or control of the MPLS working group. This provides two major benefits for CR-LDP: a) it can easily be enhanced to accommodate new network requirements, b) it promotes interoperability. In fact, recent interoperability demonstrations have proven CR-LDP to be a true multivendor networking protocol. CR-LDP software is also publicly available. The CR-LDP signaling builds on the LDP protocol, and provides ER-LSP setup with optional resource reservation in a simple hard state control and messaging manner. The transport mechanism is UDP for peer discovery and TCP for session, advertisement, notification and CR-LDP messages. Building the CR-LDP signaling on TCP ensures a reliable transport mechanism for the signaling of ER-LSPs. Interoperability of CR-LDP has already been proven and publicly demonstrated by a multi-vendor interoperability trial. The software of the protocol is also publicly available for the promotion of network interoperability. CR-LDP is a true open standard, which starts from a clean slate and has no backward compatibility issue to be concerned with. This makes CR-LDP easy to enhance and standardize. CR-LDP is part of LDP and uses the same mechanisms and messages as LDP for peer discovery, session establishment/maintenance, label distribution/management and error handling. Therefore, LDP/CR-LDP offers a unified signaling protocol system that provides network operators with the complete label distribution and path setup modes needed for MPLS. This certainly maximizes operational efficiency and results in lower operational costs.
  6. &lt;number&gt;
  7. &lt;number&gt;
  8. &lt;number&gt;
  9. &lt;number&gt;
  10. &lt;number&gt;
  11. &lt;number&gt;
  12. &lt;number&gt;
  13. &lt;number&gt;
  14. &lt;number&gt;
  15. &lt;number&gt; VP merge stream merge when it is applied to VPs, specifically so as to allow multiple VPs to merge into one single VP. In this case the VCIs need to be unique. This allows cells from different sources to be distinguished via the VCI. An issue with VP merge is that unique VCIs need to be configured/negotiated/derived for each ingress on a mp2p VP tree. Congestion issue at merging points, how much bandwidth to allocate, the node doing the merge may need to have knowledge about the number of leaves being meged (fan-in) in order to allocate resources (buffers, bandwidth) appropriately. So this information is carried in the LDP with ingress based label allocation where sources advertise their existence towards the root. EPD on VCCs inside the VPC? this requires hardware changes? Lucent presented a contribution in the atm forum meting in july where they calculated the extra latency and buffer utilization caused by vcmerge and result was the the negative effect is very small. in fact so small which makes vp merge not worth the trouble. VP space is limited to 256/4K (UNI/NNI) and may be limited to a few hundred edge routers (depending on how it is done). VP merging also has other unsolved problems with regard to label consumption and label setup protocol. Ascend/Cascade argues for the benefits of VP-merge (IP Navigator does that and they claim a patent for it)
  16. &lt;number&gt;