Old Dog Consulting Multi-Segment Pseudowires: Recognising the Layer Network Adrian Farrel Old Dog Consulting.

Slides:



Advertisements
Similar presentations
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
NEW OUTLOOK ON MULTI-DOMAIN AND MULTI-LAYER TRAFFIC ENGINEERING Adrian Farrel
The Impact of SDN On MPLS Networks Adrian Farrel Juniper Networks
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Deployment of MPLS VPN in Large ISP Networks
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 MPLS Scale to 100k endpoints with resiliency and simplicity Clarence.
1 LAYER 3 TSN – DRAFT 4 Jouni Korhonen, Philippe Klein July 2014 LAYER 3 FOR TSN.
OLD DOG CONSULTING Challenges and Solutions for OAM in Point-to-Multipoint MPLS Adrian Farrel, Old Dog Consulting Ltd. Zafar Ali, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
OLD DOG CONSULTING Traffic Engineering or Network Engineering? The transition to dynamic management of multi-layer networks Adrian Farrel Old Dog Consulting.
1 Why Carriers Like Pseudowires… Payload (IP, L2 data, voice) PseudoWires Layer-2 (Ethernet, ATM…) Physical (Optical, Wireless) User Applications Payload.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Benchmarking Carrier Ethernet Technologies Workshop Session MI.1: PW/MPLS Krakow, Poland Lieven Levrau 30 th April 2008.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
1 Multipoint Ethernet Connection Protection
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
61st IETF Washington DC November 2004 Detecting P2MP Data Plane Failures draft-yasukawa-mpls-p2mp-lsp-ping-00.txt Seisho Yasukawa -
Should I Migrate My MPLS-TE Network to GMPLS. And if so, how
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
PWE3 Agenda – Monday 8 th Nov 15 min - Agenda bash, WG Agenda and Status - Andy Malis and Matthew Bocci 5 min - Dynamic Placement of Multi Segment Pseudo.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Setup and Maintenance of Pseudo- Wires Using RSVP-TE Draft-raggarwa-rsvpte-pw-01.txt.
11/27/2015 draft-bocci-bryant-ms-pw-architecture-00.txt An Architecture for Multi-Segment Pseudo Wire Emulation Edge-to-Edge draft-bocci-bryant-pwe3-ms-pw-architecture-00.txt.
Application of PWE3 to MPLS Transport Networks
Inter-Area P2MP Segmented LSPs draft-raggarwa-seamless-mcast-03.txt
DetNet Data Plane using PseudoWires Jouni Korhonen Shahram Davari Norm Finn IETF#94, Yokohama.
Optical + Ethernet: Converging the Transport Network An Overview.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
1 1/24/2016 draft-shah-bocci-pwe3-ms-pw-signaling-01.txt MS-PW Signaling draft-shah-bocci-pwe3-ms-pw-signaling-01.txt Matthew Bocci, Mustapha Aissaoui,
Internet Protocol Storage Area Networks (IP SAN)
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Limit for content Do not exceed Limit for content Do not exceed Limit for content Do not exceed Limit for content Do not exceed Page 1 © The.
What do we put in the TED? Which TE links from the network should appear in the Traffic Engineering Database at a Label Switching Router? An attempt to.
IP Pseudowire Florin Balus August, PG 1Florin BalusIETF60 – San Diego Requirements - Existing topology FR/ATM VPNs ATM Network Frame Relay Access.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
Precision Time Protocol over MPLS draft-ronc-ptp-mpls-00.txt PWE3 WG IETF Chicago 2007 Ron Cohen
The Application of the Path Computation Element Architecture to the Determination of a Sequence of Domains in MPLS & GMPLS draft-king-pce-hierarchy-fwk-01.txt.
25 July Pseudowire Communities draft-pkwok-pwe3-pw-communities-01 Paul Kwok Pranjal Dutta Frederic Jounay draft-pkwok-pwe3-pw-communities-01 IETF-81.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
IETF 67, Nov 2006Slide 1 VCCV Extensions for Multi- Segment Pseudo-Wire draft-hart-pwe3-segmented-pw-vccv-01.txt draft-ietf-pwe3-segmented-pw-04.txt Mustapha.
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
PW MUX PWE – 71st IETF 10 March 2008 Yaakov (J) Stein.
Inter domain signaling protocol
DetNet Data Plane Discussion
Semester 4 - Chapter 3 – WAN Design
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
Presenter: Jeffrey Zhang
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
MPLS-TP Survivability Framework
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
DetNet Data Plane Discussion
CHAPTER 8 Network Management
Optical Fast Reroute Adrian Farrel : Old Dog Consulting
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
DetNet Data Plane design team IETF 98, Chicago, 2017
IP RSVP-TE: Extensions to RSVP for P2P IP-TE LSP Tunnels Tarek Saad, Juniper Networks Vishnu Pavan Beeram, Juniper.
Presentation transcript:

Old Dog Consulting Multi-Segment Pseudowires: Recognising the Layer Network Adrian Farrel Old Dog Consulting

Page 2 © Copyright Old Dog Consulting 2010 Agenda Existing building blocks Protocol layering in the data plane Multi-segment pseudowires Architecture and drivers Functional requirements Picking paths and setting up pseudowires Service-level requirements The layer model Pitfalls and benefits Next steps

Page 3 © Copyright Old Dog Consulting 2010 The PW Layering Model RFC 3985 defines logical protocol layering For example… Payload Encapsulation PW Demultiplexer PSN Convergence PSN Data-Link Physical May be empty Ethernet Header MPLS Tunnel Label MPLS PW Label Control Word IP HeaderData First byte Last byte

Page 4 © Copyright Old Dog Consulting 2010 Multi-Segment Architecture Pseudowire Segments Provider Network Tunnel Switching PEs Native Service AC Terminating PE Provider Network Simple extension to the RFC 3985 model Emulated service is still CE-to-CE Tunnels are still used to carry the PWs End-to-end PW is called a multi-segment PW Runs between the Terminating PEs (T-PEs) Constructed from PW segments Carried across provider networks in tunnels Tunnels terminated at PEs PW segments “switched” (or stitched) at Switching PEs (S-PEs) CE

Page 5 © Copyright Old Dog Consulting 2010 MS-PW Deployment Motivations Initial model shows inter-AS PW service A more pressing need Reduce the complexity of the tunnel mesh Help scaling at PEs and P nodes S-PE becomes a network-internal node Not the best name! Same model applies to inter-area PW service Utility extends to P2MP PWs (discussed later) Pseudowire Segments Provider Network Tunnel Switching PE Native Service AC Terminating PE CE

Page 6 © Copyright Old Dog Consulting 2010 MS-PW Challenges Data plane encapsulation Picking a path through the network Setting up pseudowire segments and PSN tunnels Service-level requirements Capacity Diversity P2MP Operations, Administration and Maintenance

Page 7 © Copyright Old Dog Consulting 2010 Data Plane Challenges PW encoding should be independent of PSN technology Same techniques/hardware “packetization” Regardless of underlying PSN transport Resource reservation is needed to guarantee PW service PWs use PSN tunnels Reservation must use tunnel resources Tunnel must map its resources to network resources Tunnel transit nodes are not aware of payload PWs PWs must be multiplexed onto data channels to scale the data plane PW flows must not merge Have to be able to trace and distinguish individual PWs Essential for OAM and fault diagnosis

Page 8 © Copyright Old Dog Consulting 2010 Path Determination Choices to be made Which tunnels to use? Which S-PEs to use? For dual-homed CEs: which T-PEs to use? Are these choices made in planning or during LSP set-up? (see next slide) What factors affect the choices? Tunnel load and capacity S-PE load and capacity Reduce the number of segments on the path? Path diversity for backup services

Page 9 © Copyright Old Dog Consulting 2010 PW Setup Components of MS-PW establishment Tunnel set-up PW segment set-up PW segment stitching Choices All through the management plane Control plane for tunnels and MP for PWs Control plane for tunnels and PW segments But segment stitching using management plane Fully in the control plane Some segments MP, some segments CP How much operator involvement is needed? Where are the administrative boundaries? Can the signalling protocols handle the MS-PW path and constraints?

Page 10 © Copyright Old Dog Consulting 2010 Service Requirements Influence path determination and set-up PW capacity and quality requirements Protection considerations End-to-end protection Tunnels are diverse No re-use of S-PEs Segment protection Tunnels between S-PEs are diverse Protect a PW segment Protect an S-PE Point-to-multipoint PWs Use a single P2MP tunnel? Stitch multiple P2P PW segments? Combine the techniques?

Page 11 © Copyright Old Dog Consulting 2010 MS-PW Protection End-to-end MS-PW protection Single segment protection Multi-segment protection PSN tunnel protection

Page 12 © Copyright Old Dog Consulting 2010 P2MP Pseudowires

Page 13 © Copyright Old Dog Consulting 2010 OAM Challenges OAM function provides Service verification Fault detection and reporting Fault isolation Service verification is end-to-end Can run OAM on the PW or on the emulated service Faults need to be known where they are to be handled T-PEs for end-to-end protection S-PEs for protecting individual segments Scaling may be an issue How many PWs pass through an S-PE? Running OAM on a tunnel can solve this

Page 14 © Copyright Old Dog Consulting 2010 The Layer Model There is a natural layering available Nothing clever! Make a topology of Nodes = PEs (T-PEs and S-PEs) Links = PSN tunnels See that these links have cost and bandwidth Plan and set up MS-PWs on this topology Each “hop” is a single segment PW

Page 15 © Copyright Old Dog Consulting 2010 Topology Layering Tunnels between S-PEs in the PSN become links in the MS-PW network

Page 16 © Copyright Old Dog Consulting 2010 Multi-Access links P2MP tunnels form multi-access links in the MS-PW network Care needed about unidirectional P2MP tunnels!

Page 17 © Copyright Old Dog Consulting 2010 The Application Layer is Extra Emulated service is between CEs CE is out of scope for the provider network End-to-end protected service is required Protected service is through two “parallel” emulated services Individually requested Different T-PEs? Different ACs? The protection is the responsibility of the service user But the emulated services need to have disjoint paths Requires the use of Shared Risk Link Groups (SRLGs)

Page 18 © Copyright Old Dog Consulting 2010 PWs Are Transport-Agnostic No surprises here But packet technologies can be different Architecture must allow independence of PW segments Still deliver end-to-end emulated service MPLS-TPIPEthernet T-PE S-PE CE AC Packet Tunnel PW Segment End-to-End PW Emulated Service Stitch Switch

Page 19 © Copyright Old Dog Consulting 2010 Pitfalls to Avoid “Don’t worry about the control plane” Let’s do it all in the management plane for now True, but network planning can make good use of layers OAM layering will help operations “Let’s leverage the IGP” We can use our IP/MPLS IGP “discover” S-PEs Fine to run an IGP instance in the PW layer But don’t overload the normal IGP Consider how inter-AS will work How about using PCE in the PW layer? “Layers add unnecessary complexity” We only have a simple network with one S-PE Networks will inevitably get more complicated and larger How easy will it be to cut over to a layered approach later?

Page 20 © Copyright Old Dog Consulting 2010 More Pitfalls “Network layering implies operational separation” We want to operate an integrated PSN Network layers can be operated and planned independently Dynamic integrated multi-layer networks are possible Feedback loops between layers with appropriate policy controls and operator input IP/Optical is the latest buzz in this area “We can grow LDP to handle MS-PW” in IP/MPLS networks We already use LDP for PW set-up It’s true, any protocol can be extended to do anything! LDP is designed as a neighbour-to-neighbour protocol T-LDP is currently used only for single segment PWs Functional creep does not make for good protocol design Need extensions for all elements of constraint-based path signalling Explicit routes, route recording, bandwidth reservation, protection, path association and path diversity, etc., etc. We do already have a PSN signalling suite for this type of function (RSVP-TE/GMPLS)

Page 21 © Copyright Old Dog Consulting 2010 Potential Benefits? Simplified network view Aids operation and planning Integration of multiple PSN types Reduced complexity in network operation Separation of application from operation Reduced number of control plane protocols Increased features and functions Leverage experience with existing multi-layer networks and control planes Path computation and control Resource reservation and management Protection and restoration Point-to-multipoint OAM control and configuration

Page 22 © Copyright Old Dog Consulting 2010 What Should We Do About It? Decide whether MS-PWs are for real Plan our control plane protocols Don’t just evolve them piecemeal Look to see if we can leverage existing protocols we are already running Recognise the layered architecture Build this into our PW architecture work Design PW networks as layers

Page 23 © Copyright Old Dog Consulting 2010 Questions