Path Protection in MPLS Networks Using Segment Based Approach.

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
IETF Differentiated Services Concerns with Intserv: r Scalability: signaling, maintaining per-flow router state difficult with large number of flows r.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Restoration by Path Concatenation: Fast Recovery of MPLS Paths Anat Bremler-Barr Yehuda Afek Haim Kaplan Tel-Aviv University Edith Cohen Michael Merritt.
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Introducing MPLS Labels and Label Stacks
CPSC Topics in Multimedia Networking A Mechanism for Equitable Bandwidth Allocation under QoS and Budget Constraints D. Sivakumar IBM Almaden Research.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
October 8, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Basics Zartash Afzal Uzmi Computer Science and Engineering Department.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
Metropolitan Ethernet Networks Estella Kang Matt Powers SC441 Computer Networks – Independent Study Boston University.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
MPLS and Traffic Engineering
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Introduction to MPLS and Traffic Engineering
Introduction to Protection & Restoration for OBS Copyright, 2000, SUNY, Univ. at Buffalo Presented by Zaoyang Guo & Dahai Xu.
Dynamic routing – QoS routing Load sensitive routing QoS routing.
RATES: A Server for MPLS Traffic Engineering (Routing And Traffic Engineering Server) Zlatokrilov Haim Advanced Topics in IP Networks5/1/2001 Tel-Aviv.
Multi-Protocol Label Switching
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
1 Multiprotocol Label Switching. 2 “ ” It was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching.
A review of quality of service mechanisms in IP-based network ─ integrated and differentiated services,multi-layer switching,MPLS and traffic engineering.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS Introduction Module 4: Frame Mode MPLS Implementation.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
Protection and Restoration Definitions A major application for MPLS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Graceful Label Numbering in Optical MPLS Networks Ibrahim C. Arkut Refik C. Arkut Nasir Ghani
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Enhanced Protection using Shared Segment Backups in a Multiservice GMPLS-based Networks Anna Urra, Eusebi Calle, Jose L Marzo Institute of Informatics.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
MPLS Some notations: LSP: Label Switched Path
1 Multiprotocol Label Switching (MPLS) and its Applications Network Architecture Spring 2009 Lecture 17.
June 4, 2003Carleton University & EIONGMPLS - 1 GMPLS Generalized Multiprotocol Label Switching Vijay Mahendran Sumita Ponnuchamy Christy Gnanapragasam.
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
(Slide set by Norvald Stol/Steinar Bjørnstad
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Multiple Protocol Support: Multiprotocol Level Switching.
Label Distribution Protocols LDP: hop-by-hop routing RSVP-TE: explicit routing CR-LDP: another explicit routing protocol, no longer under development.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
Multi-protocol Label Switching
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
Advanced Computer Networks
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Presentation transcript:

Path Protection in MPLS Networks Using Segment Based Approach

Overview Short Intro to MPLS Introduction to Our work – Protection and the segment Based approach Algorithms for QoS constraints –Switch Over time Algorithm Greedy Approach Consideration of Backup Paths –Conserving protection resources – sharing bw –End-to-End delay and Jitter –Combining the above constraints –Reliability Visualization System Experimental Results Conclusion and work done

Introduction to MPLS Mapping: 0.40 Request: 47.1 Mapping: 0.50 Request: 47.1

Label Switched Path (LSP) IP

MPLS : ROUTE AT EDGE, SWITCH IN CORE IP Forwarding LABEL SWITCHING IP Forwarding IP #L1IP#L2IP#L3 IP  Applies concept of VC routing  Packet forwarding is done based on Label Switching  FEC: Destination address prefix, Traffic Engineering tunnel, Class of Service.

Introduction to Path Protection

Introduction to Path Protection BACKUP PATH

Requirements of Path Protection Should Reroute the traffic satisfying certain QoS constraints Should aim to conserve the amount of protection resources reserved

Global Path Protection Backup Path

Local Path Protection

Segment Based Path Protection  Look at the path as a group of segments – protect each segment separately  Results in fewer backup paths – conserves resources  Meets QoS constraints in a “tight” manner  Gives flexibility Issue : How to segment the path ?

Algorithms for QoS constraints

QoS Constraints Important parameters –Switch-Over Time –End-to-End Delay –Jitter –Reliability –Combination of above Have to conserve protection resources

Bounded Switch Over Time Definition of Switch Over Time

An expression for switch over time Analysis for switch over time RTT( R i, R j ) + T test < 

Example for Segment Based Approach

Here we are able to meet the Switch Over time constraint with 3 backup paths as compared to 7 backup paths in LPP A simple algorithm for segmentation: Greedy Approach

The Resource advantage

Problem with Greedy Approach Need to consider the topology of the network as well

An adaptive Algorithm for segmentation Start from the egress and look for longest possible segment

End-to-End Delay An important parameter

Analysis Max (T + ( t2 – t1 ) ) < EED Bound

Algorithm for end-to-end delay For each backup path, we need to make sure that the end-to-end constraint is satisfied Use shortest path approach for finding a backup path – minimizes end-to-end delay

Algorithm for end-to-end delay d1d1 d2d2 d3d3 d 1 + d 2 + d 3 d3d3 0 d 2 + d 3 Searching for a backup path

Jitter Jitter can be treated as a link property Path Jitter = Σ Link Jitter Algorithm similar to end-to-end delay

Combination of above constraints Approach Dynamic Programming Switch Over Time End-to-End Delay Jitter A combined Algorithm for

Algorithm based on Dynamic Programming Artificial Node RiRi RjRj RkRk

Reliability An important QoS parameter in Computer Networks. Path Reliability : Probability of a path to be in a working state at some instant of time. Link Reliability (p) : Probability of a link to be in working state at some instant of time.

Reliability - Objectives Effect of Path Protection on Reliability Effect of Segment Size on Reliability An O(No. of Links + (No. of Segments) 2 ) Algorithm to find exact path reliability ! Algorithm for Finding most reliable Backup Path Heuristics for SBPP with reliability bounds

Effect of Path Protection on Reliability Total number of links in primary path = n Reliability of a link : p Path Reliability from A to B = p n A B Path Reliability from A to B with backup path = 2p n – p 2n n links

Effect of Path Protection on Reliability

Effect of Segment Size on Reliability Total number of links in primary path = n Reliability of a link : p Size of Segments = k Number of Segments = n/k Size of Backup Path = Size of Segment Reliability of the path = (2p k – p 2k ) n/k

Effect of Segment Size on Reliability

Algorithm to find path reliability Theoretically a path exists between ingress and egress nodes : R1 -> R2 -> R4 -> R5 -> R6 -> R7 No path between ingress and egress nodes in our path switching approach !

Algorithm to find path reliability Probability of Primary path for a particular segment S i to be working Probability of Backup path for Segment S i to be working Probability of S i to S j-1 segments’s primary path to be working & segment S j primary path to have an error

Algorithm for Finding most reliable Backup Path Artificial Node RiRi RjRj

Heuristics for SBPP with reliability bounds Divide any segment into two till the reliability bound is met Find the Segmentation with least number of segments

Visualization System

Visualization of Algorithms A visualization system developed based on POLKA – an algorithm animation toolkit Closely Integrated with the simulator Aids in understanding how the algorithms work Assists in establishing correctness of algorithms and simulations Dynamic Nature of Visualizations

Visualization Two categories of Visualization: –Animation for Adaptive Bounded Switch Over Time Algorithm –Rerouting of packets by SSR in case of failure (packet flow animation) – demonstrates various cases

Topology for Visualization

Visualization Demo

Experimental Results

Implementation Simulator developed in C++ for implemented some algorithms Size of model graph : 100 nodes, 1000 edges RTT of each link = 10 ms BW – 50 to 100 Generated large number of random LSP requests and observed various parameters Results indicate advantages of SBPP

Segment Size vs BW reserved

Segment Size vs Rejection Rate ( for 250 LSPs )

No. of Requested LSPs vs Rejection Rate

Effect of Backup Path Sharing

Crossover - Effects of backup path sharing

Effect of additional constraint

Bandwidth Reserved vs Density

Detection and Notification

A Mechanism for Notification After a fault is detected, notification needs to be sent to the SSR for switching the traffic Some nodes will participate in notification and the SSR will switch the route What information will be passed after a fault occurs ? What changes do we need in the LSR tables for switching? Case of Multiple LSPs : All LSPs using that segment may not pass through the faulty node/link – Only concerned LSPs should be switched

A Mechanism for Notification

Conclusions Fault Tolerance can now be assured to satisfy various QoS constraints Segment Based Algorithms show significant improvement in terms of protection resources used

Work Done Mechanisms for Detection, Notification Algorithms for various QoS constraints –Bounded Switch over time –End-to-End delay –Jitter –Combination of above –Reliability Issues relating to backup path - sharing Simulator developed for above Visualization System