Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Designing and Developing Scalable IP Networks.pdf
Скачиваний:
36
Добавлен:
15.03.2015
Размер:
2.95 Mб
Скачать

7.6 FAST REROUTE

103

populate the TED, which is used by the CSPF process to calculate the path of the LSP. The same extended information types are carried by IS-IS as are carried with OSPF.

7.6FAST REROUTE

Fast reroute is a term used to describe two mechanisms whereby alternate paths are presignalled so that, should a path become unviable, traffic can be transferred onto a new path with minimal delay. The two mechanisms actually protect against different types of failure and can be characterized as either link protection or node protection.

As the name suggests, link protection protects against the failure of a single link by creating a bypass LSP between the two adjacent LSRs either side of the failed link (see Figure 7.3). In the event of a failure, all the affected LSPs are tunnelled through the bypass LSP using label stacking. This relies upon the use of labels, which are unique within the entire chassis (rather than unique on the interface). One major benefit of this is the fact that the labels for the inner LSP remain unchanged. This minimizes the signalling and computational requirements to achieve this form of bypass. In a large network with many nodes this reduction in signalling overhead can be significant.

Unfortunately, link protection is of no value if an LSR totally fails. On the failure of the LSR, all links from that LSR would go down. The LSR at the ingress to each failed link would identify the failure and attempt to tunnel the failed LSPs through an alternate path to the failed LSR (the next hop). Since that LSR is down, the ‘tunnel’ LSR would also be down and so fast reroute would fail. At this point, all the affected LSPs would be torn down and resignalled end to end. In a large network, the failure of a crucial LSR could cause a massive burst of signalling and path computation.

Node protection protects against the failure of an entire LSR or multiple links associated with a single LSR by creating a bypass LSP between the two LSRs adjacent to the failed LSR (see Figure 7.4). This requires a pre-signalled, alternate LSP for each affected LSP and, upon the detection of the failure, all the outbound packets will have a different label than they would have had. This is much more flexible in the sense that it is possible to route around multiple adjacent failures. However, the signalling and computational overhead of this mechanism are significantly greater than that for link protection as described above.

Bypass LSP

M5

M5

PE

M5

X

M5

PE

 

Protected LSP

Figure 7.3 MPLS fast reroute, link protection

104

MULTIPROTOCOL LABEL SWITCHING (MPLS)

Bypass LSP

M5

M5

PE

M5

X

M5

PE

 

Protected LSP

Figure 7.4 MPLS fast reroute, node protection

In addition to the extra bypass path to avoid a failed node, node protection also creates a bypass LSP to avoid a failed single node. In large networks, this can require enormous amounts of state. However, in comparison to link protection, the impact of the failure of nodes protected by node protection will cause minimal signalling and computational overhead.

In general, the functional benefits of node protection outweigh the disadvantages associated with the extra state required. In the end, you have to decide whether the failure of an entire node is sufficiently likely to make the disadvantages of link protection under those circumstances more significant than the benefits of vastly reduced state associated with link protection.

The choice of protection mode will depend upon what has been implemented by your chosen vendors. Cisco and Juniper have both implemented both mechanisms. However, if you have other vendors’ equipment in your network, it is important to check their capabilities.

7.7 INTEGRATING ATM AND IP NETWORKS

Since both ATM switches and IP routers can be LSRs, MPLS provides the basis on which this integration can occur. It is generally held to be a good thing that IP networks and ATM networks be integrated with a single control plane and data plane. The main benefits are evident to operators with existing separate ATM and IP networks who wish to operate all the services on a single converged network. By using MPLS, a network provider can significantly reduce the impact of the migration. Equally importantly, it can change the period over which the migration is paid for. For businesses today, this can be an important issue. If new equipment can be purchased over a longer period, then this can make a significant difference to the profitability of the network in the earlier stages of deployment.

ATM switches utilize the VPI/VCI field to carry the label information and use their standard signalling mechanisms for exchanging label information. ATM LSRs also have support LDP as a label distribution protocol. This is the basis on which an LSP can be

7.8 GENERALIZED MPLS (GMPLS)

105

3.220

101456

.120 1

101234

101345

0.202

Figure 7.5 Integrating MPLS and ATM networks

built end to end crossing both ATM and IP networks (see Figure 7.5). In so doing, a single ‘transport’ is created, which is independent of the underlying media.

7.8GENERALIZED MPLS (GMPLS)

Generalized MPLS takes the concept of MPLS and applies it to various types of Layer 1, Layer 2 or Layer 3 networks. GMPLS devices can have interfaces of the following types:

fibre-switched capable (FSC);

lambda-switched capable (LSC);

time-division-multiplexing switched capable (TSC);

packet-switched capable (PSC).

Within the GMPLS framework, LSPs must start and finish on links of the same capability. However, the LSP can transit any type of link within the network.

The implication of these extensions is that LSPs can now be built across a network and that devices at Layer 1, Layer 2 and Layer 3 can all participate in the decision how to route the LSPs. Thus, Optical Cross Connects (OXC) and SONET/SDH Add-Drop Multiplexers (ADM) in the core of operators’ transport networks can take part in the establishment of LSPs (see Figure 7.6).

106

MULTIPROTOCOL LABEL SWITCHING (MPLS)

 

ADM

ADM

ADM

 

ADM

ADM

 

 

ADM

Figure 7.6 Integrating MPLS and Optical switches with GMPLS

GMPLS differs from traditional MPLS in the following ways:

GMPLS requires a separate Data Control Network over which control messages can be sent. RSVP-TE is an IP-based protocol so cannot be carried natively over the data plane (as is the case with traditional MPLS).

RSVP-TE has been further extended to allow the LSR to request labels of the form applicable to the particular link (e.g. a wavelength, a fiber, or a time-slot).

GMPLS can create bi-directional LSPs. Unlike traditional MPLS, in which LSPs are strictly unidirectional, non-packet LSPs in GMPLS can be signalled to be capable of carrying data in both directions over a single path.

GMPLS requires that RSVP-TE and the Link Management Protocol (LMP) for the particular type of link interact very closely. When establishing an LSP, the following steps are required.

1.The LMP informs RSVP-TE of the following elements:

(a)the Traffic Engineering Link (an interface or sub-interface based on time-slot, wavelength, etc.);

(b)resources available on the TE Link;

(c)the control peer.

7.8 GENERALIZED MPLS (GMPLS)

107

2.GMPLS derives the specific attributes of the new LSP from the configuration of the node. It requests that RSVP-TE signal one or more specific paths described by the TE Link addresses.

3.RSVP-TE determines the adjacent TE Link, the associated control adjacency and control channel, and the transmission parameters (e.g. IP address). It requests that the LMP allocate the required resources from the TE Link. If the LMP is able to allocate the required resource, then a label is allocated. RSVP-TE then sends a PathResv message towards the destination router.

4.When the PathResv message reaches the destination router, the LMP tries to allocate the requested resources. If it is successful, then RSVP-TE transmits a ResvMsg back towards the source router.

5.Once the ResvMsg reaches the source router, the LSP is established.

As with traditional MPLS, a link state protocol is used to carry the traffic engineering information throughout the network. GMPLS uses OSPF-TE with added extensions to populate the TED, in addition to those used in traditional MPLS networks. The new information is carried in a TLV called the interface switching capability descriptor. The new TLV contains the following attributes:

signal type (minimum LSP bandwidth);

encoding type;

switching type.

GMPLS runs the constrained shortest path first (CSPF) process in exactly the same way as traditional MPLS. The only difference is that it takes the additional constraints into account when calculating the constrained path.

The output of the CSPF algorithm must be a strict path. GMPLS is incapable of using a loose path.