IP/LDP FAST PROTECTION SCHEMES

Similar documents
OSPF Extensions for MRT-FRR

Loop Free Alternate and Remote Loop Free Alternate IP Fast Reroute

LDP Fast Reroute using LDP Downstream On Demand. 1. Problem: 2. Summary: 3. Description:

Advertising MPLS LSPs in the IGP

Network Configuration Example

High Availability for 2547 VPN Service

Internet Engineering Task Force (IETF) Category: Standards Track. J. Tantsura Individual IJ. Wijnands Cisco Systems, Inc.

MRT- FRR: Architecture, Algorithms, Analysis, and Extensions

Fast Reroute for Node Protection in LDP based LSPs

Routing Resiliency Latest Enhancements

Network Configuration Example

Techniques and Protocols for Improving Network Availability

PIM-tunnels and MPLS P2MP as Multicast data plane in IPTV and MVPN. Lesson learned

IP Fast Reroute Applicability. Pierre Francois Institute IMDEA Networks

MPLS, THE BASICS CSE 6067, UIU. Multiprotocol Label Switching

Segment Routing. Jérôme DURAND Consulting Systems Engineer - FRNOG #21 20 septembre 2013

BGP-TE APPLICATION LEVEL TOPOLOGY INTELLIGENCE

Multi Topology Routing Truman Boyes

"Charting the Course...

Internet Engineering Task Force (IETF) Request for Comments: 7490 Category: Standards Track

Introduction to Segment Routing Santiago Álvarez, Distinguished Technical Marketing Engineer BRKRST-2124

Juniper Networks Live-Live Technology

SDN Workshop. Contact: WSDN01_v0.1

ENTERPRISE MPLS. Kireeti Kompella

Core of Multicast VPNs: Rationale for Using mldp in the MVPN Core

Network Configuration Example

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190

Egress Protection (draft-shen-mpls-egress-protection-framework) Presented by Krzysztof G. Szarkowicz NANOG71 October 4, 2017

MPLS etc.. MPLS is not alone TEST. 26 April 2016 AN. Multi-Protocol Label Switching MPLS-TP FEC PBB-TE VPLS ISIS-TE MPƛS GMPLS SR RSVP-TE OSPF-TE PCEP

IxNetwork TM mldp Emulation

Stateless Multicast with Bit Indexed Explicit Replication (BIER)

Scaling considerations in MPLS networks. Ina Minei

SDN Controllers in the WAN: protocols and applications

Multipoint LDP (mldp)

Internet Engineering Task Force (IETF) Request for Comments: 7140 Category: Standards Track

Network Configuration Example

MPLS Egress Protection Framework draft-shen-mpls-egress-protectionframework-02

Network Configuration Example

Minimizing Packet Loss

Configure Topology-Independent Loop-Free Alternate (TI-LFA)

Network Configuration Example

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

BW Protection. 2002, Cisco Systems, Inc. All rights reserved.

Introduction to Segment Routing

Bit Indexed Explicit Replication A Stateless Multicast Architecture. Nagendra Kumar Nainar NANOG72

SYSC 5801 Protection and Restoration

Emerging MPLS OAM mechanisms

Configuring MPLS L2VPN

Configuring MPLS L2VPN

Configure Segment Routing Mapping Server

HIGH AVAILABILITY DESIGN

Internet Engineering Task Force (IETF) Category: Standards Track. T. Morin France Telecom - Orange Y. Rekhter. Juniper Networks.

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

MPLS. 9 March 2018 AN

MPLS опорни мрежи MPLS core networks

Agenda DUAL STACK DEPLOYMENT. IPv6 Routing Deployment IGP. MP-BGP Deployment. OSPF ISIS Which one?

BrainDumps.4A0-103,230.Questions

MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR)

IS-IS Configuration Commands. Generic Commands. shutdown IS-IS XRS Routing Protocols Guide Page 533. Syntax [no] shutdown

Global Table Multicast with BGP-MVPN Protocol draft-zzhang-mboned-mvpn-global-table-mcast-00

Intended status: Standards Track. C. Bowers Juniper Networks August 29, 2016

Stateless Multicast with Bit Indexed Explicit Replication

Cisco Systems, Inc. Bruno Decraene Stephane Litkowski Orange November 18, 2013

CertShiken という認定試験問題集の権威的な提供者. CertShiken.

Label Distribution Protocol and Basic MPLS Configuration. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Concepts and Operation of MPLS VPNs. Francisco Bolanos

2D1490 p MPLS, RSVP, etc. Olof Hagsand KTHNOC/NADA

6 MPLS Model User Guide

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Network Working Group. Expires: April 19, 2014 The University of Arizona M. Boucadair France Telecom October 16, 2013

Deploying Next-Generation Multicast VPN. Emil Gągała PLNOG, Warsaw,

Stateless Multicast with Bit Indexed Explicit Replication

Spirent TestCenter EVPN and PBB-EVPN AppNote

Network Configuration Example

Internet Engineering Task Force (IETF) Request for Comments: Juniper Networks, Inc. J. Tantsura Ericsson Q. Zhao Huawei Technology January 2016

Junos OS. RSVP LSP Tunnels Feature Guide. Release Published: Copyright 2011, Juniper Networks, Inc.

BIER. Bit Indexed Explicit Replica0on. MBONED, IETF 92 Greg Shepherd

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3

Introduction to Segment Routing

Session 2: MPLS Traffic Engineering and Constraint-Based Routing (CR)

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: Y. Cai Alibaba Group T. Morin Orange June 2016

Junos MPLS and VPNs. Day(s): 5. Course Code: Overview

Deploying MPLS Traffic Engineering

Practice exam questions for the Nokia NRS II Composite Exam

Testking.4A0-103,249.QA 4A Alcatel-Lucent Multi Protocol Label Switching

Segment Rou+ng IETF 87

Operation Manual MPLS VLL. Table of Contents

Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS

Open Shortest Path First IGP. Intended status: Standards Track

A Segment Routing (SR) Tutorial. R. Bonica NANOG70 June 6, 2017

Table of Contents 1 Multicast VPN Configuration 1-1

MPLS-TE Configuration Application

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Multiprotocol Label Switching. Version: Demo

MPLS DiffServ-aware Traffic Engineering

Cisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0. Upcoming Dates. Course Description. Course Outline

Internet Engineering Task Force (IETF)

Segment Routing Commands

Link Failure Recovery for MPLS Networks with Multicasting

NETWORK DEPLOYMENT WITH SEGMENT ROUTING (SPRING)

Transcription:

IP/LDP FAST PROTECTION SCHEMES PL-NOG, OCT 203 Julian Lucek

AGENDA Loop-Free Alternate (LFA) brief review Improving LFA coverage Remote LFA (rlfa) Directed forwarding label LFA with automatically created RSVP bypasses Maximally Redundant Trees (MRT) 2 Copyright 200 Juniper Networks, Inc. www.juniper.net

BACKGROUND RSVP Fast Reroute has been available for many years Advantages of simplicity: get full coverage as long as alternative path exists. Usually involves creating a full-mesh of RSVP LSPs between end-points There has been a lot of interest in IP and/or LDP FRR schemes. From operators who don t use RSVP traffic engineering etc and don t want to deploy a full RSVP mesh solely to make use of FRR. 3 Copyright 200 Juniper Networks, Inc. www.juniper.net

SPF ROOTS & LFA ILLUSTRATED N 2 R2 3 S 3 D 3 N2 3 R3 Main SPF Backup SPF 4 Copyright 200 Juniper Networks, Inc. www.juniper.net

LFA COVERAGE ISSUES 5 Copyright 200 Juniper Networks, Inc. www.juniper.net

INCOMPLETE COVERAGE PROBLEM S R D R2 Consider traffic travelling from S to D (via R). R4 is not an LFA that protects the S-R link. In almost all deployments, don t get full coverage using just plain LFA. R4 R3 6 Copyright 200 Juniper Networks, Inc. www.juniper.net

IMPROVING LFA COVERAGE WITH REMOTE LFA 7 Copyright 200 Juniper Networks, Inc. www.juniper.net

REMOTE LFA Remote LFA extends LFA coverage by tunnelling packets inside LDP to reach a non-directly-connected router (a remote neighbour ). C.f. http://tools.ietf.org/html/draft-ietf-rtgwg-remote-lfa-0 Targeted LDP session will be brought up automatically as needed. 8 Copyright 200 Juniper Networks, Inc. www.juniper.net

REMOTE LFA S R D R2 Consider traffic travelling from S to D (via R). R4 is not an LFA that protects the S-R link. P-Space contains the routers that S can reach without using the S-R link. R4 R3 P-Space 9 Copyright 200 Juniper Networks, Inc. www.juniper.net

REMOTE LFA R D Consider traffic travelling from S to D (via R). R4 is not an LFA that protects the S-R link. S R2 Extended P-Space contains the routers that S s direct neighbours can reach without using the S-R link. R4 R3 Extended P-Space 0 Copyright 200 Juniper Networks, Inc. www.juniper.net

REMOTE LFA R S R4 Extended P-Space D R3 Q-Space R2 Q-Space contains the routers that normally reach D without using the S-R link. A router that is in both Extended P-Space and Q- Space is a PQ-node. It can be a Remote LFA of S, in order to protect the S-R link. R2 and R3 are PQ-nodes. Copyright 200 Juniper Networks, Inc. www.juniper.net

COVERAGE EXTENSION USING REMOTE LFA (CONT D) S R D R2 Remote LFA involves sending traffic to a PQ-node via a tunnel. The PQ-node then sends the traffic towards the destination. An LDP tunnel is used. Existing LDP LSP to R3 R4 R3 2 Copyright 200 Juniper Networks, Inc. www.juniper.net

COVERAGE EXTENSION USING REMOTE LFA (CONT D) R D In the case of IP traffic being protected, S pushes the LDP label required to reach R3 on top of the IP packet. S Existing LDP LSP to R3 R4 R3 R2 Assuming PHP, packet arrives at R3 as a plain IP packet. R3 then forwards the packet to R2, as this is on the best path towards the destination, D. 3 Copyright 200 Juniper Networks, Inc. www.juniper.net

COVERAGE EXTENSION USING REMOTE LFA (CONT D) R D In the case of LDP traffic being protected, a stack consisting of two LDP labels is used by S, i.e. LDP over LDP. S Existing LDP LSP to R3 R4 Targeted LDP session R3 R2 The outer LDP label, X, is the label required to reach R3. The inner LDP label, Y, is the label required to reach D from R3. A targeted LDP session (automatically created) is needed between R3 and S, so that S can learn the label, Y, advertised by R3 to reach D. 4 Copyright 200 Juniper Networks, Inc. www.juniper.net

S COVERAGE EXTENSION USING REMOTE LFA (CONT D) R 8 D Q-Space R2 Remote LFA cannot provide full coverage for all scenarios. Remote LFA cannot be used in the example on the left no PQ-nodes! However, in real networks, Remote LFA usually improves coverage compared to just vanilla LFA. R4 R3 Extended P-Space The Remote LFA draft reported analysis of different SP topologies. R-LFA coverage was 00% in 4 cases, 78% in worst case. Average of the networks was 96%. 5 Copyright 200 Juniper Networks, Inc. www.juniper.net

S RFLA COVERAGE EXTENSION USING DIRECTED- FORWARDING LABEL R R4 LDP LSP R3 8 D R2 IGP advertisement: Neighbour R: Label 00 As previously discussed, given the metrics shown, neither plain LFA or Remote LFA can protect against S-R link failure, for traffic going from source S to destination D. Directed Forwarding Label: R2 advertises via the IGP a strict-forwarding label pointing to D. S pushes this label onto the packet, and pushes the LDP label required to reach R2 on top. No targeted LDP session is needed. See Section 3. of http://tools.ietf.org/html/draft-gredler-rtgwg-igp-labeladvertisement-05 for more details. 6 Copyright 200 Juniper Networks, Inc. www.juniper.net

DIFFICULTY OF ATTAINING FULL COVERAGE WITH LFA 00% LFA Coverage gap! + Directed forwarding label + Remote LFA Difficult to reach 00% coverage without caveats. The closer we get to 00%, the more difficult is it to make further improvements. Fundamental problem is that we are trying to fight against the IGP metrics. 7 Copyright 200 Juniper Networks, Inc. www.juniper.net

ALTERNATIVE WAYS OF ACHIEVING FULL COVERAGE Would be better to have scheme in which packet is launched into a protection path that, regardless of topology/igp metrics, always takes the packet towards its destination without looping. We have a way, it s called RSVP! =>Use RSVP LSPs to augment LFA coverage, to 00% 8 Copyright 200 Juniper Networks, Inc. www.juniper.net

IMPROVING LFA COVERAGE USING RSVP LSPS 9 Copyright 200 Juniper Networks, Inc. www.juniper.net

COVERAGE EXTENSION USING DYNAMIC RSVP LSP S RSVP LSP R R4 D R3 R2 As R4 is not a valid LFA to protect the link from S to R, an RSVP bypass LSP is automatically created to R (i.e. the RSVP LSP goes all the way to the node on the far side of the protected link). From R the packet then travels to its original destination. Note: There is also an alternative mode in which RSVP LSP is always created (i.e. LFA is not configured/used) Already available in Junos 20 Copyright 200 Juniper Networks, Inc. www.juniper.net

VERY EASY TO CONFIGURE {master}[edit] user@router# show protocols ldp interface all { link-protection { dynamic-rsvp-lsp; <==== } } 2 Copyright 200 Juniper Networks, Inc. www.juniper.net

LFA + RSVP FOR FULL COVERAGE As we have seen in the previous slides, the LFA + RSVP scheme has the following properties: / If a valid LFA is present, that is used 2/ If no valid LFA is present, an RSVP bypass is automatically created 3/ Also, if the user does not want to use LFA at all, they can use the automatic RSVP bypass to cover everything. The advantages of the scheme are simplicity and full coverage. Not many RSVP LSPs needed: at most one per link per direction As well as unicast traffic, the scheme also applies to P2MP-LDP traffic! 22 Copyright 200 Juniper Networks, Inc. www.juniper.net

LINK PROTECTION FOR P2MP-LDP LSPS 23 Copyright 200 Juniper Networks, Inc. www.juniper.net

INTRODUCTION Juniper are pioneers of Point-to-Multipoint (P2MP) technology grand unification of MPLS and Multicast. RSVP-signalled P2MP LSPs have been available for ~8 years in Junos. Link Protection is supported for RSVP-signalled P2MP LSPs LDP-signalled P2MP LSPs (also known as mldp ) have been available in Junos since 20. As of 2.3, we now support Link Protection for LDP-signalled P2MP LSPs 24 Copyright 200 Juniper Networks, Inc. www.juniper.net

LINK PROTECTION SCHEMES FOR LDP-P2MP LSPS The following schemes are supported: Case / Link protection using dynamically-created point-to-point RSVP bypass LSP Case 2/ Link protection using Loop-Free Alternate (LFA) Case 3/ Combination of the above two schemes LFA is used if one exists If no LFA exists, dynamically-created RSVP bypass LSP is used 25 Copyright 200 Juniper Networks, Inc. www.juniper.net

Case : Using RSVP LSP for LDP-P2MP link protection Suppose R2 needs to protect the green LDP-P2MP LSP in the case that the R- R3 link should break. RSVP LSP is signaled from R2 to R3 via R6, avoiding interface ge-//0. The LSP is automatically created, no need to manually configure it If multiple LDP-P2MP LSPs use the R2->R3 link, the same RSVP LSP protects all of them If the R2-R3 link fails, R2 moves the LDP-P2MP traffic onto the RSVP LSP: the RSVP label (label L00) is pushed on top of the P2MP-LDP label (label L2). RSVP LSP R6 R4 R L00 R2 R3 LDP-P2MP LSP L22 Leaf L20 ge-//0.0 Root LSR-U LSR-D L2 Key: Green arrows: LDP P2MP LSP. Blue arrows: LDP label values distributed by LDP control plane Orange arrow: RSVP bypass LSP 26 Copyright 200 Juniper Networks, Inc. www.juniper.net L23 R5 Leaf

Case 2: Using Loop-Free Alternate for LDP-P2MP link protection Suppose R2 needs to protect the green LDP-P2MP LSP in the case that the R-R3 link should break. R2 checks if a viable LFA path exists that avoids the R-R3 link. In the example, given the metrics shown, R6 is a valid LFA for the R2-R3 link. This is a vanilla LFA as used for unicast traffic If multiple LDP-P2MP LSPs use the R2->R3 link, the same LFA protects all of them (and also unicast traffic) If the R2-R3 link fails, R2 moves the LDP-P2MP traffic onto the LFA path: the unicast LDP label to reach R3 (label L00) is pushed on top of the P2MP-LDP label (label L2). Unicast LDP path R6 R4 R L00 R2 Metric=0 Metric=0 Metric=0 R3 LDP-P2MP LSP L22 Leaf L20 ge-//0.0 Root LSR-U LSR-D L2 R5 L23 Leaf 27 Copyright 200 Juniper Networks, Inc. www.juniper.net

Case 3: Using Loop-Free Alternate if available, and RSVP LSP if LFA is not available Suppose R2 needs to protect the green LDP-P2MP LSP in the case that the R-R3 link should break. R2 checks if a viable LFA path exists that avoids the R-R3 link. In the example, given the metrics shown, R6 is a valid LFA for the R2-R3 link. This is a vanilla LFA as used for unicast traffic If multiple LDP-P2MP LSPs use the R2->R3 link, the same LFA protects all of them (and also unicast traffic) If the R2-R3 link fails, R2 moves the LDP-P2MP traffic onto the LFA path. Unicast LDP path R6 R4 R L00 R2 Metric=0 Metric=0 Metric=0 R3 LDP-P2MP LSP L22 Leaf L20 ge-//0.0 Root LSR-U LSR-D L2 R5 L23 Leaf 28 Copyright 200 Juniper Networks, Inc. www.juniper.net

Case 3: Using Loop-Free Alternate if available, and RSVP LSP if LFA is not available (cont'd) Suppose the metrics are such that there is not a viable LFA that protects against R2->R3 link failure. In the diagram, the metric between R6 and R3 is 50. This means that R6 is not an LFA for R2->R3 traffic, because R6 would loop the traffic back to R2. In this case, an RSVP LSP is automatically created to protect the P2MP- LDP traffic travelling between R2 and R3. RSVP LSP R6 R4 R L00 R2 Metric=0 Metric=50 Metric=0 R3 LDP-P2MP LSP L22 Leaf L20 ge-//0.0 Root LSR-U LSR-D L2 R5 L23 Leaf 29 Copyright 200 Juniper Networks, Inc. www.juniper.net

MRT 30 Copyright 200 Juniper Networks, Inc. www.juniper.net

MRT-FRR For Node S to protect link S-N or Node N: Pick MRT-Blue since it doesn t use link S-N Traffic follows MRT-Blue path to destination D S A 0 0 Z SPT MRT-Blue MRT-Red N Y 0 X D W 3 Copyright 200 Juniper Networks, Inc. www.juniper.net

KEY POINTS ABOUT MRT Provides 00% coverage for link and node failure, regardless of topology and IGP metrics. (Assuming there is another way to get to the destination!). Once packet is launched onto the blue or red tree, it travels to the destination Algorithm has been defined such that all nodes have a consistent notion of the blue and red trees associated with a given destination node http://tools.ietf.org/html/draft-enyedi-rtgwg-mrt-frr-algorithm-02 Very fast to compute the trees Relatively easy (compared to LFA/rLFA) to answer the question What path will this traffic take to get to this destination if this link/node breaks?, especially with tree-tracing tools. Could be used as a supplement to LFA (use MRT blue or red path in absence of valid LFA) or as a complete alternative. 32 Copyright 200 Juniper Networks, Inc. www.juniper.net

MRT LABEL DISTRIBUTION How are labels for the red and blue trees distributed? Using multi-topology LDP Different next-hops selected based upon both the MT-ID and FEC. Or using IGP-label advertisements The label advertisement drafts have made provision for an algorithm-id field. This can be used to identify label as belonging to red-mrt or blue- MRT as appropriate http://tools.ietf.org/html/draft-previdi-isis-segment-routing-extensions- 0#page-5 http://tools.ietf.org/html/draft-psenak-ospf-segment-routing-extensions- 0#page-8 33 Copyright 200 Juniper Networks, Inc. www.juniper.net

SUMMARY Dynamically-created RSVP bypass LSPs are a very simple way of improving LFA coverage to 00% now available in Junos Works for both LDP unicast and LDP-P2MP traffic Maximally Redundant Trees Prototype code available soon 34 Copyright 200 Juniper Networks, Inc. www.juniper.net

REFERENCES Remote LFA draft http://www.ietf.org/id/draft-ietf-rtgwg-remote-lfa-02.txt MRT architecture drafts http://tools.ietf.org/html/draft-ietf-rtgwg-mrt-frr-architecture-02 (unicast) http://tools.ietf.org/html/draft-atlas-rtgwg-mrt-mc-arch-0 (multicast) 35 Copyright 200 Juniper Networks, Inc. www.juniper.net