0% found this document useful (0 votes)
28 views

01 Convergence

jkhkljn

Uploaded by

Mauricio Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

01 Convergence

jkhkljn

Uploaded by

Mauricio Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Convergncia de Redes

ATM/FR & IP/MPLS


GTER18
Rodrigo Loureiro
[email protected]

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Agenda
Introduo
Building Blocks
Modelos de Convergncia
Mecanismos de Transporte
Qualidade de Servio
ATMoMPLS

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Todays Increasingly Networked World


Remote
Offices

Remote
Users

Customers

Frame
Relay

ATM

PSTN

Private
Network

Internet
Mobile
Workers
Suppliers

Copyright 2003 Juniper Networks, Inc.

Headquarters

Business
Partners

Is todays
model
sustainable?
Proprietary and Confidential

www.juniper.net

The Industry Has Two Choices


OR migrate to a unifying
infrastructure that delivers quality,
security & reach

Continue growing service-specific


private networks & a commoditized
Internet

IP/MPLS
Voice

+
FR/ATM

Internet

Copyright 2003 Juniper Networks, Inc.

FR/ATM

Voice

GRID Services

Gaming

+
Private IP/ VPNs

Private IP/ VPNs

On-demand Computing

Optimized Service Environment

Segregated, uniquely managed virtual networks

Provides end-end assurances appropriate to


application

Dynamic service options increase revenues/


customer

Proprietary and Confidential

www.juniper.net

The Infranet Standard Model


(http://www.infranet.org)
Infranet
InfranetUser-Network
User-Network
Interface
Interface(I-UNI)
(I-UNI)

Enterprise
client

Consumer
clients

Infranet
InfranetInter
InterCarrier
Carrier
Interface
(I-ICI)
Interface (I-ICI)

Provider 2

Provider 1
Provider 3

Wireless
client

Global
Infranet
Resource
Aggregation
client

Copyright 2003 Juniper Networks, Inc.

Assured
AssuredService
Service
Delivery
Delivery

Proprietary and Confidential

www.juniper.net

Agenda
Introduo
Building Blocks
Modelos de Convergncia
Mecanismos de Transporte
Qualidade de Servio
ATMoMPLS

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Parallel Cores at a glance


PVC/SVC
N x DS0, T1, DS3

Current ATM:

Backhaul

Aggregation

New IP Core:
MPLS
N x DS0, T1, DS3
Ethernet

New IP
Services
Copyright 2003 Juniper Networks, Inc.

Layer 3 VPNS

Layer 2 VPNs

Layer 2.5 VPNs

Managed Firewall

Voice over IP

Enhanced DSL

Proprietary and Confidential

www.juniper.net

ATM Core Off-load at a glance


PVC

Richer set of IP
Services for existing &
new customers

MPLS

Migrate backhaul traffic


to MPLS network

N x DS0, T1, DS3


Ethernet

New IP
Services
Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Agenda

Mecanismos de Transporte

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Pseudo Wire Emulation (Draft-Martini) Support


PDU
PDU

400
400

PDU
PDU

CW
CW 10
10 100
100

DLCI 200

ATM/FR
Access

PDU
PDU

PDU
PDU

400
400

MPLS Core

VC LSP

Tunnel LSP

LDP Signaling Session

Application

CW
CW 10
10 100
100

Allows Service Provider to build point to point


circuits over MPLS core using LDP signaling

How it works?

DLCI 500

ATM/FR
Access

Encapsulations supported

Ethernet VLAN & Port

PPP, HDLC - Port to Port, DS0 to DS0

Frame Relay - DLCI to DLCI, Port to Port

ATM AAL5 VC to VC, Port to Port

Provider pre-provisions tunnel LSPs

Provider provisions Virtual Circuit LSPs one


per customer site

ATM Cell Mode VC to VC, Port to Port

Layer 2 frame encapsulated in MPLS

ATM Cell Relay Mode

L2- interworking (any-any) supported for IP

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

10

ATM over PWE


There are currently two modes of carrying ATM traffic
over Pseudo Wires:
AAL5 mode: ATM cells are SARed into AAL5 packets before
transport over MPLS
Cell-Relay: ATM cells are carried directly into MPLS packets. Cellrelay can be done in different granularity:
VC mode
VP mode
Port mode

Cell-relay in Port mode and VP mode are best suited for


convergence applications.

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

11

PWE (L2circuit) AAL5 Mode


RES

00

Length

PE

CE

Sequence
Number

ATM OAM Cell or


AAL 5 CPCS-SDU

PE

CE

PSN
VPC

VPC

Martini (L2circuit) AAL5 Mode


Flag bits are used to indicate:
T: Packet contains an ATM Cell (OAM) or AAL5
E: EFCI for Explicit Forward Congestion Indication
L: CLP for cell loss priority
C: C/R for FRF 8.1 FR/ATM service interworking

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

12

PWE (L2circuit) Cell-Relay


L2circuit
Control Word

PE

CE

VPI

VCI

PTI

ATM Payload
(48 Octets)

VPI

VCI

PTI

PSN

ATM Payload
(48 Octets)

PE

CE

One or more cells are concatenated


Maximum number of cells is limited by network MTU, and is
optionally negotiated with far-end ingress router; the number of
cells/bundle must not exceed far-end limit
Cells are bundled per VC, per VP or per Port
cell_bundle_size is a local configuration option
Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

13

OAM in Cell-Relay mode

In Cell-relay mode, OAM cells received by PE are transparently forwarded


to LSP

When LSP failure is detected , PE generates OAM AIS cell towards the CE

For VC-mode Cell-relay, F5 OAM AIS is generated

For VP-mode Cell-relay, F4 OAM AIS is generated on VPI.4

For Trunk-mode Cell-relay, F4 OAM AIS is generated on Trunk.4

For Port-mode Cell-relay, no OAM cell is generated

Sends AIS cells every second until the failure disappears


RDI
CE

PE

PE
MPLS

vci/vpi/trunk

Copyright 2003 Juniper Networks, Inc.

l2circuit

CE
AIS
vci/vpi/trunk

Proprietary and Confidential

www.juniper.net

14

Agenda

Qualidade de Servio

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

15

MPLS QOS: How do we turn COS into QOS?


Diffserv is usually associated with Class of Service or
Differentiated Services
ATM demands quality of service or assured experience
(e.g, CBR traffic)
This is attainable through smart combination of new
MPLS features intended for ATM convergence:
E-LSPs, L-LSPs, Diffserv-Aware Traffic Engineering
Per LSP QOS enforcement
Per LSP Traffic Class Policing and Admission control
at the ingress

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

16

DiffServ
Give different forwarding treatment (per-hopbehavior, PHB) to traffic based on the class-ofservice classification.
From a practical point of view: assign traffic to
different queues and partition the resources
among the queues.
For IP packets, the class-of-service is marked
on the packet itself, in the 6-bit DSCP field.

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

17
17

MPLS DiffServ
For MPLS packets, the class-of-service needs
to be encoded in the MPLS header.
The only available field, 3-bit EXP field.

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

18
18

The MPLS DiffServ problem


How to map between 6-bit IP DSCP field (64 values) and
3-bit MPLS EXP field (8 values)?
Solution:
If only 8 values are used, they can be encoded in the
EXP bits -> E-LSPs (E stands for EXP)
If more than 8 values are used, use the label and the
EXP bits to convey the info -> L-LSPs (L stands for
label) requires extra signaling

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

19
19

MPLS DiffServ - E-LSPs


LSR

LSP for AF1 and EF


AF1
EF

AF1
EF

Support of EF and AF1 on an E-LSP


EF and AF1 packets travel on single LSP (single label)
Packets have different MPLS EXP values and are
placed into different queues
Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

20

MPLS DiffServ - L-LSPs


AF1
LSR
LSP for AF1
LSP for EF

EF

Support of EF and AF1 on L-LSPs


EF and AF1 packets travel on different LSPs (different labels)
Packets are placed into different queues based on the label

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

21

The TE in DiffServ-TE
Constraint-based routing enforce different
bandwidth constraints for different classes of
traffic.
Admission control per-class (at the time the LSP
is established).
Requires extensions to RSVP and the IGPs

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

22
22

Terminology Class-type (CT)


Class-Type (CT or traffic class): collection of
traffic flows that will be treated equivalently from a
DS-TE perspective.
Maps to a queue, equivalent to the class-ofservice forwarding-class concept.
CT0: Best effort
CT1: Expedited forwarding
CT2: Assured forwarding
CT3: Network control

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

23
23

Priorities and preemption


The idea: some LSPs are more important than
others, and can kick out the less important
ones, when resource contention occurs.
Happens at setup time, not at forwarding time.
Eight priority levels:
Priority 0 (best)
Priority 7 (worst)

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

24
24

How is bandwidth accounted?


The IETF defined bandwidth models.
They determine the partitioning of BW among
the different CTs

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

25
25

BW model MAM (maximum allocation)


The available bandwidth is partitioned between
the CTs
No sharing is allowed.
Unused resources cannot be used by other CTs.
Good or bad? Both

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

26
26

BW model RDM (Russian dolls)


The available bandwidth is partitioned between
the CTs.
Sharing is allowed.
Requires using preemption to ensure bandwidth
guarantees to CTs.

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

27
27

How DS-TE operates


Extended IGP

Routing Table

Extended IGP

Traffic Engineering
Database (TED)

Distributes topology and traffic engineering


information

IGP Extensions and mechanisms

Constrained Shortest
Path First (CSPF)

Maximum reservable bandwidth per CT

Remaining reservable bandwidth per CT

Link administrative groups (color)

Opaque LSAs for OSPF, New TLVs for IS-IS

Copyright 2003 Juniper Networks, Inc.

User
Constraints

Explicit Route

RSVP Signaling

Proprietary and Confidential

www.juniper.net

28

How DS-TE operates


Extended IGP

Routing Table

Traffic Engineering
Database (TED)

Traffic Engineering
Database (TED)

Maintains traffic engineering information


learned from the extended IGP & contains:

Constrained Shortest
Path First (CSPF)

User
Constraints

Explicit Route

Up-to-date network topology information


Current reservable bandwidth of links
per CT

RSVP Signaling

Link administrative groups (colors)

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

29

How DS-TE operates


Extended IGP

Routing Table

User Constraints

Traffic Engineering
Database (TED)

Constrained Shortest
Path First (CSPF)

User
Constraints

User-defined constraints applied to path


selection

Bandwidth requirements per CT

Hop limitations

Administrative groups (colors)

Priority (setup and hold)

Explicit route (strict or loose)

Copyright 2003 Juniper Networks, Inc.

Explicit Route

RSVP Signaling

Proprietary and Confidential

www.juniper.net

30

How DS-TE operates


Extended IGP

Routing Table

Constrained Shortest
Path First (CSPF)

Traffic Engineering
Database (TED)

Constrained Shortest
Path First (CSPF)

User
Constraints

For LSP = (highest priority) to (lowest priority)


Prune links with insufficient bandwidth for any
of the CT

Explicit Route

Prune links that do not contain an included color


Prune links that contain an excluded color
Calculate shortest path from ingress to egress

RSVP Signaling

Select among equalequal-cost paths


Pass explicit route to RSVP

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

31

How DS-TE operates


Extended IGP

Routing Table

Traffic Engineering
Database (TED)

RSVP signaling and


BW accounting
Constrained Shortest
Path First (CSPF)

User
Constraints

RSVP signals the LSP.


The available BW is updated on every link.
The new available BW is fed to the IGPs.

Explicit Route

RSVP Signaling

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

32

Multiclass E-LSPs Advantages

Multiple classes per LSP means fewer LSPs in


the core
The bandwidth reservation is made for several
classes at the same time reducing resource
consumption and set up time
Emulates ATM trunks better due to fate-sharing
among different classes
ATM trunk has multiple classes CBR, VBR-rt,
etc.
If one fails and reroutes, all should fail and
reroute like ATM

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

33
33

LSP Input Policing


All the hard work of establishing LSPs and
marking the traffic is for nothing if more traffic is
pushed on the LSPs than what we reserved.
LSP policers ensure that traffic stays in profile.
The policing is done per CT. The policers are
configured in a filter that is attached to the LSP.

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

34

L2circuit CAC
Dont bring up the layer 2 circuit unless there is
enough bandwidth available on the underlying
LSP.
Avoids overloading the underlying LSPs,
ensuring service quality for all circuits using it.

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

35
35

Agenda
Introduo
Building Blocks
Modelos de Convergncia
Mecanismos de Transporte
Qualidade de Servio
ATMoMPLS

Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

36

ATMoMPLS: mapping

EXP
E-LSP Label

ATM
Header

VPI: CoS

Payload

ATM
Header

Trunk Label
ATM
Header
Payload

One or more ATM cells are encapsulated in a single


MPLS packet

Cell aggregation is done by CoS and CLP bit value

One cell for real-time traffic, multiple cells for nrtVBR and UBR

The 12-bit VPI field in the ATM header carries a 2-bit


CoS indication and a trunk-id value

The LER writes EXP bits with CoS bits and Cell Loss
Priority.

LER translates Trunk Id to Trunk (PW) Label

Payload

Copyright 2003 Juniper Networks, Inc.

VPI

CLP

Payload
ATM
Header

Trunk Id

Proprietary and Confidential

ATM
Header
Payload
ATM
Header
Payload

www.juniper.net

37

ATM over MPLS Trunk


Trunk consists of 32 VPIs
32 NNI trunks and 7 UNI trunks
Customized ATM cell header
Each trunk corresponds to a PWE3/Martini L2 Circuit
4

GFC

16

VPI

VCI

40 bits

PTI

HEC

ATM cell header

NNI VPI

11 10 9

QOS

8 7 6

trunk
VPI field

NNI Header

Copyright 2003 Juniper Networks, Inc.

5 4

3 2 1

11 10 9

QOS

8 7 6

5 4

3 2 1

trunk
VPI field

GFC

UNI Header

Proprietary and Confidential

www.juniper.net

38

VC to MPLS QoS Mapping


VPs
ATM Control Traffic

Queues

PE to PE E-LSPs
(PSN Tunnel)

QoS Flows Based


on EXP Bits

CBR
VBR rt
(CLP0, CLP1)
VBR nrt
(CLP0, CLP1)

ABR/UBR
(CLP0, CLP1)

CBR (10% bw)


->CT3

VBR rt (20% bw)


->CT2

VBR nrt (20% bw)


->CT1

ABR/UBR (50% bw)


CT0

ATM Interface

Copyright 2003 Juniper Networks, Inc.

Trunk VPN Label


(Pseudo Wire)

POS Interface

Proprietary and Confidential

www.juniper.net

39

ATM over MPLS


Trunk
Provisioning
System

MPLS

PE to PE E-LSPs
(PSN Tunnel)
Copyright 2003 Juniper Networks, Inc.

Trunk VPN Label


(Pseudo Wire)
Proprietary and Confidential

www.juniper.net

40

ATM over MPLS


Trunk
Provisioning
System

ATMoMPLS Trunk
ATM

ATM

MPLS

1 Control
Traffic
VP

PE to PE E-LSPs
(PSN Tunnel)
Copyright 2003 Juniper Networks, Inc.

Trunk VPN Label


(Pseudo Wire)
Proprietary and Confidential

www.juniper.net

41

ATM over MPLS


Trunk
ATM
Provisioning

ATMoMPLS Trunk
ATM

MPLS

ATM

1 Control
Traffic
VP
VC/VP

PE to PE E-LSPs
(PSN Tunnel)
Copyright 2003 Juniper Networks, Inc.

Trunk VPN Label


(Pseudo Wire)
Proprietary and Confidential

www.juniper.net

42

ATM over MPLS


Trunk
ATM
Provisioning

ATMoMPLS Trunk
ATM

MPLS

ATM

4 QoS Flows

1 Control
Traffic
VP
VC/VP

Up to 31
QoS Specific
Data VPs
Copyright 2003 Juniper Networks, Inc.

PE to PE E-LSPs
(PSN Tunnel)

Trunk VPN Label


(Pseudo Wire)
Proprietary and Confidential

www.juniper.net

43

Referncias
MPLS Diffserv-Aware Traffic Engineering
http://www.juniper.net/solutions/literature/white_papers/200048.pdf

Inter-Carrier Capabilities for IP/MPLS Networks


http://www.infranet.org/learn/literature/inter-carrier.pdf

Migration Strategies for IP Sevice Growth: Cell-Switched MPLS or IP-routed


MPLS
http://www.juniper.net/solutions/literature/white_papers/200026.pdf

Transport of Layer 2 Frames Over MPLS


draft-martini-l2circuit-trans-mpls-09.txt

Encapsulation Methods for Transport of ATM Cells/Frame Over IP and MPLS


Networks
draft-martini-atm-encap-mpls-00.txt

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

44
44

Referncias
MPLS Support of Differentiated Services
rfc3270

Requirements for support of DS-aware MPLS TE


Rfc3564

Protocol extensions for support of DS-aware MPLS TE


draft-ietf-tewg-diff-te-proto-05.txt

Russian Dolls Bandwidth Constraints Model for DS-aware MPLS TE


draft-ietf-tewg-diff-te-russian-03.txt

Max Allocation Bandwidth Constraints Model for DS-aware MPLS TE


draft-ietf-tewg-diff-te-mam-00.txt

Copyright
2003
2003 Juniper
Juniper Networks,
Networks, Inc.
Inc.

Proprietary and Confidential

www.juniper.net
www.juniper.net

45
45

Dvidas ?
Copyright 2003 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

46

You might also like