QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Deployment of MPLS VPN in Large ISP Networks
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Restoration by Path Concatenation: Fast Recovery of MPLS Paths Anat Bremler-Barr Yehuda Afek Haim Kaplan Tel-Aviv University Edith Cohen Michael Merritt.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Module R R RRR R RRRRR RR R R R R Efficient Link Capacity and QoS Design for Wormhole Network-on-Chip Zvika Guz, Isask ’ har Walter, Evgeny Bolotin, Israel.
CS Summer 2003 Lecture 12 FastReRoute (FRR) - Big Picture.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Jan 29, 2006Lahore University of Management Sciences1 Seamless Detection of Link and Node Failures for Local Protection in MPLS Zartash Afzal Uzmi Computer.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
October 8, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Basics Zartash Afzal Uzmi Computer Science and Engineering Department.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
MPLS Local Restoration using Optimized Aggregate Information Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
1 End-to-End Detection of Shared Bottlenecks Sridhar Machiraju and Weidong Cui Sahara Winter Retreat 2003.
Traffic Engineering and Routing Hansen Bow. Topics Traffic Engineering with MPLS Issues Concerning Voice over IP Features of Netscope QoS Routing for.
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
Path Protection in MPLS Networks Using Segment Based Approach.
Introduction to Protection & Restoration for OBS Copyright, 2000, SUNY, Univ. at Buffalo Presented by Zaoyang Guo & Dahai Xu.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
1 Next Few Classes Networking basics Protection & Security.
Network-Coding Multicast Networks With QoS Guarantees Yuanzhe Xuan and Chin-Tau Lea, Senior Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19,
1 Quality of resilience as a network reliability characterization tool Cholda, P.; Tapolcai, J.; Cinkler, T.; Wajda, K.; Jajszczyk, A.; Network, IEEE Network,
Protection and Restoration Definitions A major application for MPLS.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Enhanced Protection using Shared Segment Backups in a Multiservice GMPLS-based Networks Anna Urra, Eusebi Calle, Jose L Marzo Institute of Informatics.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
(Slide set by Norvald Stol/Steinar Bjørnstad
Inter-area MPLS TE Architecture and Protocol Extensions
Funda Ergun Behnam Malakooti Case Western Reserve University NAG Intelligent and Agile Protocols and Architectures for Space and Terrestrial Networks.
11/02/2001 Workshop on Optical Networking 1 Design Method of Logical Topologies in WDM Network with Quality of Protection Junichi Katou Dept. of Informatics.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs Michigan altech Fujitsu 2006.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-00 Yimin Shen (Juniper Networks) Yuji Kamite (NTT Communication) IETF 83, Paris, France.
MEF Protection Work Pascal Menezes Technical Contributor June 3 rd 2003.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-03
draft-liu-pim-single-stream-multicast-frr-01
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-02
CprE 458/558: Real-Time Systems
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Achieving Resilient Routing in the Internet
Presentation transcript:

QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California at Riverside

1 Overview MPLS networks —Special need for path protection Approaches to path protection in MPLS networks —Link, node based —LSP based Segment Based Approach —Mechanisms (detection, notification and path switching) —Algorithm for segment identification —Some simulation results

2 Path protection Routing algorithms for IP networks take seconds to re- compute routes Voice & video are sensitive to “switch-over” time —require switch over in less than 50 to 100 ms Identify and set-up back-up paths a-priori BACKUP PATH

3

4 Path protection in MPLS networks Protection against link and node failure —We consider both types of failures Single vs. multiple failures —We largely consider single failures, but… Centralized vs. distributed computation and setup —We permit centralized computation

5 Major considerations —Bound switch-over time (and consequent loss of data) –Of the order of 50 ms to 150 ms —Meet SLA commitments –viz. QoS constraints – Path availability – End-to-end delay – Jitter – Packet drop rate —Use resources for path protection efficiently

6 Path protection in MPLS networks Complete LSP by-pass —allocation of resources along back-up path is efficient —time to detect failure and switch over is large —difficult to identify a node-disjoint path that also meets the specified QoS constraints

7 Path protection in MPLS networks Link by-pass —allocation of resources for back-up paths is unlikely to be efficient —fault detection and switch over can be fast —cannot be sure about QoS resulting from any failure —does not address node failure

8 Path protection in MPLS networks Node by-pass —allocation of resources for back-up paths is unlikely to be efficient —fault detection and switch over can be very fast —cannot be sure about QoS resulting from any failure

9 Segment Based Protection The Main Idea Look at the path as a sequence of segments and protect each segment separately

10 Segment based protection: a proposal —flexibility in identifying segments –schemes to protect LSP, links, or nodes are special cases —efficient allocation of resources for back-up paths —bounds on fault detection and switch over time —ability to identify back-up paths that meet specified QoS constraints

11 Focus of our paper develop algorithms to identify segments, and back-up paths, such that —switch over time (time for which packets are lost between failure and recovery) is bounded —path resulting from any single failure continues to satisfy given QoS constraints —resources are used efficiently (or more precisely, the number of segments is minimized)

12 Algorithm for Bounded Switch over time Switch over time The time for which packets are lost between failure and recovery

13 Fault Detection, Location and Notification Faults detected using live-ness messages with periodicity T test Notification messages to segment switching routers (SSR)

14 Analysis R 5 fails at time t After t - OWD(R 2,R 5 ), packets uncertain R 2 gets notified at t + t test + OWD(R 5,R 2 )

15 Analysis Bound on time during which packets are lost RTT( R i, R j ) + T test

16 Identifying Segments: A greedy algorithm Identify segments such that —switch-over delay is bounded (for instance, 60 ms) —Fewest no of segments Example computation: 11 hop LSP, T test = 10 ms R4R3R2R0R1 R11R10R9 R8R7R6R Segment 1 RTT + T test = 58 Segment 2 RTT + T test = 51 Segment 3 RTT + T test = 45

17 Another algorithm to identify segments Example: consider network with link RTT = 10 ms, T test = 5 ms —bounded switch-over delay of 40 ms —with as few segments as possible —disjoint, loop-free back-up paths exist Segment switch router Ingress router 10 ms = 35 < = 25 < 40

18 Other algorithms to Identify Segments Algorithms to identify segments such that: —Switch-over time is bounded —Fewest no. of segments —disjoint, loop-free back-up paths exist —QoS constraints are satisfied in case of ONE failure –End-to-end delay, Jitter, Drop rate Ingress router 10 ms

19 Identifying Back-up paths An individual back-up path: —is node- and link-disjoint from the segment it protects —may terminate at any node beyond the last node on the segment –Gives greater flexibility The back-up paths taken as a whole: —Must not form loops (equivalently, individual segments must be node- and link-disjoint from all nodes, links in earlier segments) Together with the original path, the back-up paths must satisfy QoS constraints assuming at most one link/node failure Segment 1Segment 2

20 End to End Delay In this analysis, we need to consider backup paths also. Max (T + ( T 2 – T 1 ) ) < 

21 End to End Delay d1d1 d2d2 d3d3 d 1 + d 2 + d 3 d3d3 0 d 2 + d 3 Dummy node Finding the backup path - Can use shortest-path approach to find the backup path - Backup path can land at multiple nodes

22 Other work in the paper

23 Description of Simulation Setup An MPLS network with —50 Nodes —82 Edges Random LSP that require 20 to 70 units of BW RTT of each link = 8 to 12 ms BW between 3000 and units Periodicity of liveness messages = 2 ms BW: 50 to 100 Results indicate advantages of segment based approach

24 Description of Simulation Setup Topology used

25 Simulation Results BW reserved for back up vs. number of LSP for different bound on switch-over time

26 Simulation Results Reserved BW vs. switch-over time

27 Summary Segment based approach offers a range of schemes for path protection —From link or nodes to segments, to paths The approach permits one to insist that back-up paths continue to provide committed QoS even when there is a failure The approach ensures that resources are reserved only to the extent necessary Many of our algorithms are good, and provably correct, but may not be optimal