Professional Documents
Culture Documents
Fast Reroute
Fernando Garcia
fegarcia@cisco.com
1
TE - FRR Motivation
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Agenda
MPLS TE Overview
MPLS TE Fast Re-route
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
MPLS TE Overview
Tunnel Based Technology - forwarding
based on MPLS Label (LSP)
Used basically to:
r1 IP/MPLS
Bandwidth Optimization
Protection - FRR
Supports constrained-based routing r3
TE LSP
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
How MPLS TE Works
Steps necessary for MPLS TE:
Head end
Link information Distribution
IP/MPLS
ISIS-TE
OSPF-TE
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Link Information Distribution - ISIS/OSPF
IS-IS or OSPF extension flood link
information LSP or LSA
Additional link characteristics
Physical bandwidth
IP/MPLS
Maximum reservable bandwidth
Unreserved bandwidth (at eight priorities)
TE metric
Administrative group (attribute flags)
TE nodes build a topology database
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Path Calculation
Find
shortest Topology database as input to
path to R8
with
path computation
8Mbps
TE nodes can perform
IP/MPLS
R1 constraint-based routing
15 5
3 Shortest-path-first algorithm
10 R8 ignores links not meeting
10 constraints
8
10 Tunnel can be signaled once a
path is found
10
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
TE LSP Signaling
Tunnel signaled with RSVP-TE Head end IP/MPLS
Two message type:
PATH From Head to Tail (downstream)
RESV From Tail to Head (upstream)
RESV
Tail end
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Trunk Admission Control
On receipt of PATH message
Router will check if there is bandwidth available to honour the
reservation
If bandwidth available then RSVP accepted
PATH message is sent to next hop (downstream)
On receipt of a RESV message
Router actually reserves the bandwidth for the TE LSP
Label allocated
If pre-emption is required lower priority LSP are torn down
OSPF/ISIS updates are triggered
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Path Setup Example
R3 R8
R8
R4
10
30
Pop RESV
R5 message
PATH R2
Message
20Mbps 70
50
32
R1 80
60 60
40
27
49
100
80
R6 R7
22
RSVP PATH: R1 R2 R6 R7 R4 R8
RSVP RESV: Returns labels and reserves
bandwidth on each link
Bandwidth available
Returned label via RESV message
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
10
10
Traffic Selection
Multiple traffic selection options
Auto-route
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Autoroute
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Autoroute Topology (OSPF and ISIS)
R3 R8
R4
R5
R2
R1
R6 R7
Tunnel1: R1 R2 R3 R4 R5
Tunnel2: R1 R2 R6 R7 R4
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
13
13
Autoroute Topology (OSPF and ISIS)
R3 R8
R4
R5
R2
R1
R6 R7
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
14
14
Forwarding Adjacency
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Forwarding Adjacency
R3 R4 All links Use
Cost of 10
R2 R5
R1
R9
R8
R6
IGP Cost = 40
R7
Tunnel: R2 R3 R7 R4 R5
R1 shortest path to R9 via IGP
Tunnel at R2 is never used as R1 cant see it
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
16
16
Advertise TE Links into IGP
R3 R4
FA IGP Cost = 10
R2 R5
R1
R9
R8
R6
R7 IGP Cost = 30
Tunnel: R2 R3 R7 R4 R5
R1 now uses R2 as NH. Traffic From R1 to R9 is
now tunneled on R2
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
17
17
Load Balancing Across FA
IGP Cost = 30
R2 R5
R1 Tunnel 1
Tunnel 2 R9
R8
R6
R7
Tunnel1: R2 R3 R7 R4 R5
Tunnel2: R6 R7 R8
R1 shortest path to R9
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
18
18
TE and Unequal Cost Load Balancing
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Unequal Cost: Example 1
Router F
Router A 40MB
Router E
Router G
20MB
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Unequal Cost: Example 1
Router F
Router A 40MB
Router E
Router G
20MB
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Unequal Cost: Example 2
Router F
Router A Router E
100MB
10MB
1MB
Router G
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
22
22
Unequal Cost: Example 2
Router F
Router A Router E
100MB
10MB
1MB
Router G
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Fast Reroute
25
MPLS TE Fast Re-Route (FRR)
Backup TE LSP
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
FRR - MPLS TE Protection
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Categories of Fast Reroute Protection
Local protection
Link protection
Node protection
Protect a piece of the network (node or link)
1:N scalability
Fast failure recovery due to local repair
Path protection
Protects individual tunnels
1:1 scalability
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
FRR Link Protection Operation
Requires next-hop
(NHOP) backup tunnel IP/MPLS
Primary TE LSP
Backup TE LSP
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Link Protection
When B D link fails, A E tunnel is encapsulated
in B D tunnel
Backup tunnel is used until A can re-compute tunnel path as
A B C D E (~5-15 seconds or so)
A B D E
Original
Tunnel Router C
Fast ReRoute
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup Tunnel 30
Normal TE Operation
Pop 14
R8 Swap 37 with 14
R9
R3
R2 R3
Push 37
R1 R5
R6 R7
IP 14
37
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Fast Reroute Link Failure
Pop 14
R8 Swap 37 with 14
R9
R2 R3
Push 37
R1 R5
Push 17 Pop 22
R6 R7
Swap 17 with 22
IP 14 17
37 22
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Real Example - FRR at TI
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
FRR Node Protection Operation
Requires next-next-hop
(NNHOP) backup tunnel IP/MPLS
R3
Point of Local Repair (PLR) 25
36
swaps next-hop label and 36
Backup terminates on
Merge Point (MP) where 16 22 36
traffic rejoins primary
Restoration time depends R5
on failure detection time
Primary TE LSP
Backup TE LSP
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Node Protection
What if Router D failed?
Link protection would not help as the backup tunnel terminates on
Router D (which is the NHop of the
protected link)
Protected Link
NHop
Fast ReRoute
Backup Tunnel
Router C
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Node Protection
SOLUTION: NODE PROTECTION (If network topology allows)
Protect tunnel to the next hop PAST the protected link (NNhop)
Protected Node
NNHop
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Node Protection
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Link and Node Protection Times
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
What about Path Protection?
Backup TE LSP
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Bandwidth Protection
Primary TE LSP
Backup TE LSP
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Conclusion
A lot of SP are replacing traditional voice transport network
for IP network
At least the same level of availability (5 nines) and
restoration time (sub-second) needs to be achieved
Other applications demands the same availability/restoration
or even worse
Video Broadcast/Video ondemand (integrated at 3Play)
TE FRR is one of the best options, at relative low cost, to
provide those requirements
Its is a mature technology - Some SP are running it
successfully for more than 6 years
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Obrigado !!!
42