MPLS TP - Overview 22
MPLS TP - Overview 22
1
Table of Contents
• Executive Overview
– Recommendation
• Introduction and Background Material
• High Level Architecture
• OAM Requirements
• OAM Mechanisms and Baseline Use Cases
• Associated Channel Level (ACH)
• Forwarding and OAM
– LSP/PW OAM
– Use Case Scenario and Label Stack Diagrams
– Use of TTL for MIP OAM alert
– Packet Context
• Control Plane
• Survivability
• Network Management
• Summary
2
Executive Summary
3
Recommendation
Consensus on recommendation of Option 1
– Jointly agree to work together and bring transport requirements into the IETF and extend
IETF MPLS forwarding, OAM, survivability, network management and control plane
protocols to meet those requirements through the IETF Standards Process
– The Joint Working Team believes this would fulfill the mutual goal of improving the
functionality of the transport networks and the internet and guaranteeing complete
interoperability and architectural soundness
– Refer to the technology as the Transport Profile for MPLS (MPLS-TP)
– Therefore, we recommend that future work should focus on:
• In the IETF: Definition of the MPLS “Transport Profile” (MPLS-TP)
• In the ITU-T:
– Integration of MPLS-TP into the transport network
– Alignment of the current T-MPLS Recommendations with MPLS-TP and,
– Terminate the work on current T-MPLS
5
Role for the IETF MPLS Interoperability Design Team
The IETF MPLS Interoperability Design Team should be chartered to produce an
MPLS-TP architectural documentation hierarchy
– All documents would progress in appropriate IETF WGs according to the normal process
– The list of specific documents to be written in the IETF will be created by the Design
Team
• To allow rapid development of the architectural foundation documents no additional
work on MPLS-TP will be taken on until the architectural foundation RFCs have
progressed into WG LC
– The Design Team is the group sponsored by the Routing Area Directors to facilitate rapid
communication and coherent and consistent decision making on the Transport Profile for
MPLS
– An example of such a tree (by functional area) is below:
Requirements
(MPLS WG)
Alert Label Definition ACH Definition Survivability Control Plane Network Management
(MPLS WG) (PWE3 WG) (MPLS WG) (CCAMP WG) (MPLS WG)
6
Development of RFCs on MPLS-TP
Work areas will be assigned to the appropriate IETF Working Groups to
develop the RFCs
– Working group charters and milestones will be updated to reflect the new
work
• Expected to be completed before IETF 72 (July 2008)
• This will include the list of documents in the architectural hierarchy
– WGs will appoint authors and where appropriate form design teams to
develop the RFCs
• It is assumed that ITU-T participants will be active members of these
design teams
• The draft will be reviewed by the ITU-T prior to completion of WG last call
– ITU-T review will be by correspondence, the results of this review will
be conveyed via a liaison statement
» Review by correspondence will avoid delaying WG last call to align
with an ITU-T SG/experts meeting
» Early communication via liaisons and the JWT should allow us to
avoid major comments on the final documents
• Apply for early allocation of RFC numbers and IANA codepoints once a
document has completed IESG review
7
Development of ITU-T Recommendations on MPLS-TP
The normative definition of the MPLS-TP that supports the ITU-T transport
network requirements will be captured in IETF RFCs
The ITU-T will:
– Develop Recommendations to allow MPLS-TP to be integrated with current
transport equipment and networks
• Including in agreement with the IETF, the definition of any ITU-T specific
functionality within the MPLS-TP architecture
– Via the MPLS change process (RFC 4929)
• Revise existing Recommendations to align with MPLS-TP
– It is anticipated that following areas will be in scope. The actual
Recommendations will be identified by the questions responsible for the topic
areas.
• Architecture (e.g. G.8110.1)
• Equipment (e.g. G.8121)
• Protection (e.g. G.8131, G.8132)
• OAM (e.g. G.8113, G.8114)
• Network management (e.g. G.7710, G.7712, G.8151, …)
• Control plane (e.g. G.7713, G.7715, …)
– ITU-T Recommendations will make normative references to the appropriate
8
RFCs
Development of ITU-T Recommendations on MPLS-TP - 2
Work areas will be assigned to the Questions as defined in COM 15 - C1
(Questions allocated to SG15)
– Work will be progressed in each question
• Direct participation by interested parties from the IETF is strongly
encouraged
• Draft versions of Recommendations will be provided to the IETF for
review via a liaison to a WG and/or via the JWT
– It is anticipated that approval will be using AAP as defined in
Recommendation A.8
• Interim WP meetings may be required to allow timely consent of
Recommendations that rely on normative references to RFCs
• Final text for consent will be provided to the IETF for review
– Initiation of the AAP process should be timed such that members can
base AAP comments on an appropriate IETF WG consensus review
of the consented text
– Early communication via liaisons and the JWT should allow us to
avoid major comments on the final documents
» e.g. the draft Recommendation for consent should be sent to the
IETF for review prior to the SG meeting
9
Documentation schedule
First draft of the Transport Profile Architectural Framework
– IETF 72 (July 2008)
– WG last call completion Q2/2009
10
Introduction and
Background Material
11
What am I reading?
This presentation is a collection of assumptions, discussion points and
decisions that the combined group has had during the months of March and
April, 2008
This represents the agreed upon starting point for the technical analysis of the T-
MPLS requirements from the ITU-T and the MPLS architecture to meet those
requirements
BT
Verizon
ATT
NTT
Comcast
Acreo AB
Alcatel-Lucent
Cisco
Ericsson
Huawei
Juniper
Nortel
Old Dog Consulting
13
How is the effort organized?
1. In ITU-T
TMPLS ad hoc group
2. In IETF
MPLS interoperability design team
3. DMZ between the SDOs: Joint Working Team
Segmented into groups looking at
1. Forwarding
2. OAM
3. Protection
4. Control Plane
5. Network Management
Goal: Produce a technical analysis showing that MPLS architecture can
perform functionality required by a transport profile.
Compare w/ ITU-T requirements and identify showstoppers
Find any obvious design points in MPLS architecture that may need extensions 14
MPLS - Transport Profile: What are the problems?
Desire to statically configure LSPs and PWEs via the management plane
– Not solely via control (routing/signaling) plane
– If a control plane is used for configuration of LSPs/PWEs failure and recovery of the control
plane must not impact forwarding plane (a la NSR/NSF)
Transport OAM capabilities don’t exist for LSP and PWE independent of configuration
mechanism (management plane or GMPLS or PWE control plane)
– Full transport FCAPS - AIS, RDI, Connection verification (aka connectivity supervision in
G.806), loss of connectivity (aka continuity supervision in G.806), support of MCC and SCC
etc
– Recent drafts to IETF demonstrate some issues
15
MPLS -TP: What are the problems? 2
Service Providers want to be able to offer MPLS LSPs and PWEs as a part of their
transport offerings and not just associated with higher level services (e.g. VPNs)
Service Providers are requesting that OAM and traffic are congruent
Including scenarios of LAG or ECMP
Or create LSP/PWEs that don’t traverse links with LAG/ECMP
16
MPLS - TP Requirements Overview
No LSP merging (e.g. no use of LDP mp2p signaling in order to avoid losing
LSP head-end information)
17
MPLS - TP Requirements Overview .2
OAM function responsible for monitoring the LSP/PWE
Initiates path recovery actions
18
MPLS-TP Major Solution Constructs
NOTE: These two constructs were used as the basis for the Technical Feasibility study performed
by the ad hoc team, JWT and IETF MPLS Interoperability Design Team
19
MPLS-TP Major Solution Observations
1. Bringing ACH functionality into LSPs begins to blur the architectural line
between an MPLS LSP and an MPLS Pseudowire
The functional differences between an MPLS LSP and MPLS PW must be retained
in the architecture
2. The same OAM mechanism (e.g. ACH) can be unified for LSPs and PWE
Enabling the same functionality for both and ease of implementation
Avoid breaking anything (e.g. ECMP)
There may be specific differences that are discovered in design phase
ACH functionality for LSPs should be limited to only OAM, APS & ECC
management channel data
20
MPLS-TP Alert Label Observations - 1
The JWT has established that to create an MPLS-TP there is a need for an
associated channel that shares fate and coexists with data
One possibility would be to use the OAM Alert Label (label 14) to establish
this channel but:
IETF WGs and ITU-T SGs were polled to find out the state of
implementation and deployment of Y.1711 and RFC3429
– The conclusion was that there are enough implementations and deployments
so that it is not possible to immediately deprecate Y.1711 and RFC3429
21
MPLS-TP Alert Label Observations - 2
The JWT has concluded that a new reserved label may be
needed for the MPLS TP alert
This label would be requested from the pool of un-allocated
reserved MPLS labels
Label 13 has been suggested.
The suggested roadmap is to gradually move all OAM
functionality defined by label 14 over to the new reserved label
The specification of the new OAM channel must be
accompanied with a decision to stop further extension of OAM
based on label 14
Only maintenance operations continue
22
High Level Architecture
23
MPLS-TP service spectrum MPLS-TP solution must exist
over this spectrum
Connection
Connectionless Multi-service Oriented
(Connectionless and Connection Oriented) (The label is the service)
Attachment Attachment
Circuit Circuit
CE1 CE2
PE1 PW1 PE2
26
LSP example
- end to end and per carrier monitoring
PE Carrier 1 PE
Carrier 2
segment
segment LSP OAM LSP OAM segment LSP OAM
(carrier 1) (inter carrier) (carrier 2)
MEP MIP MIP MEP MEP MEP MEP MIP MEP
Note: A policing function (traffic management/shaping) is normally co MEP: Maintenance End Point
located with a MEP at a business boundary (UNI/NNI) MIP: Maintenance Intermediate Point 27
Bidirectional Paths
28
OAM requirements
29
OAM Requirements
Packet loss rather than bit error based measurements/metrics for L2, LSP,
PWE3
A security architecture
30
What is segment recovery?
End to End Protection
A B C D E F
Segment Protection
31
Node identification
32
OAM mechanisms
33
Overview: OAM hierarchy and mechanisms
A B C D E F
L1/L2 L1/L2 L1/L2 L1/L2 L1/L2
Segment LSP
Midpoint
End to End LSP
Pseudo-wire
L0/L1 : Loss of Light; G.709, SONET/SDH LoS, LoF, ES, SES (NOT DISCUSSED)
Non MPLS L2 connectivity : Native L2 solution 802.1ag (Not Discussed) , Non IP BFD
Failure propagation across layers is supported by this architecture
Carrier 1
Region 1 Region 2
segment LSP
OAM
Carrier 1 LSP OAM segment (inter carrier)
MEP MIP MIP MEP MEP MEP
So Sk
Pushing a new label at the MEP So starts a server layer trail
that is terminated when the label is removed at the MEP Sk
MEP A MIP must support monitoring on the ingress port (logically before the label swap)
An implementation may optionally support a second MIP to monitor the egress port
How will this MIP be addressed
MIP
Trail
36
PW over LSP monitoring example
Attachment circuit
CE Attachment circuit CE
Carrier 1 Carrier 2
segment
segment LSP OAM LSP OAM segment LSP OAM
(carrier 1) (inter carrier) (carrier 2)
MEP MIP MIP MEP MEP MEP MEP MIP MEP
• end to end LSP OAM is used since PW OAM cannot create MIPs at the inter carrier boundary without a
PW switching function
Note: A policing function (traffic management/shaping) is normally co MEP: Maintenance End Point
located with a MEP at a business boundary (UNI/NNI) MIP: Maintenance Intermediate Point 37
PW over LSP example with PW switching
Attachment circuit
CE Attachment circuit CE
Carrier 1 Carrier 2
segment
segment LSP OAM LSP OAM segment LSP OAM
(carrier 1) (inter carrier) (carrier 2)
MEP MIP MIP MEP MEP MEP MEP MIP MEP
• end to end LSP OAM is not requires since the PW switching points can support a MIP
Note: A policing function (traffic management/shaping) is normally co MEP: Maintenance End Point
located with a MEP at a business boundary (UNI/NNI) MIP: Maintenance Intermediate Point 38
Associated Channel
Level (ACH)
39
Associated Channel Level ACH: Overview
Generalised mechanism for carrying management / OAM information
OAM capabilities : Connectivity Checks (CC) and “Connectivity Verification” (CV)
Management information: Embedded Control Channel (ECC)
To support the Data Communications Network (DCN) and the Signalling Communication
Network (SCN) – see G.7712
APS information
Associated Channel Capabilities
Multiple channels can exist between end points
Channel Type Indicates what protocol that is carried
To service an MPLS-TP network new channel types will need to be defined
Management and Control Plane Information (DCN and SCN connectivity)
Via ECC where IP is not configured
Generic ACH contains a “channel Type” field
Need for a registry of protocols
This needs to be blocked for different functions
(IP-Free BFD is currently 7)
We may want to define a vendor specific and experimental range
No Showstoppers found
40
LSP monitoring and alarming
Generic Exception Label and Generic Associated Channel Proposal
41
Pseudo-wire monitoring and alarming
PWE-3 Control Word and PW-Associated Channel
42
Required Functionality demarked by
Associated Channel
CV : Connectivity Verification (detection of configuration errors)
PM: Performance of the path
AIS: Alarm suppression
CC : Continuity Check : Is the path present (may reuse vanilla BFD here)
Light weight
Role is as a CC protocol, it is not a CV protocol
Not a connectivity verification protocol
VCCV-BFD provides capabilities over pseudo-wire
ECC
OSS and control plane communication
APS
Protection switching coordination
Accounting/Billing information
Security exchange
Extra codepoint space to define new or use existing protocols for other
functions 43
Associated Channel Functionality
Observations
Existing MPLS LSP OAM uses an IP based control channel and
could be used for some OAM functions in transport networks
– e.g. CC/CV
– The new Alert label based control channel should be able to co-exist
with the existing MPLS LSP OAM functions and protocols
44
Pseudo-wire OAM processing
A B C D E F
Pseudo-wire
Pseudo-wire Label
OAM function
A B C D E F
Pseudo-wire
OAM function
47
Scope of next slides
48
Notation and color conventions
• [Destination][(using label provided by)][optionalFEC]/[StackBit]
• Thus D(E)/0 means Destination is D, using label provided by (E) - i.e. c is
the tunnel next hop and the Sbit is 0 - i.e. not bottom of stack.
• Thus E(E)p/1 means Destination is E, using label provided by (E) the FEC
is a pseudowire and the Sbit is 1, i.e. bottom of stack
• Special Labels and terms
LFU = Label For yoU - OAM alert label
Ach = Associated Channel Header
CW = Control Word
P = PW FEC
Co lo r Co n ven tio n s
LSP ta n d em OA M la b el
LSP la b el
PW ta n d em OA M la b el
PW la b el
PW co n tro l w o rd
La b el Fo r yo U
A CH
49
Scenarios
SS-PW over intra-domain LSP
– No TCM OAM
–TCM-LSP OAM
SS-PW over inter-domain LSP
–LSP, TCM LSP & PW OAM
Intra-domain MS-PW
–MS-PW TCM OAM
Intra-domain MS-PW
–LSP OAM and TCM-MS-PW OAM
Inter-provider MS-PW
–PW E2Eand PW TCM OAM
SS-PW over Intra-domain LSP
–LSP MEP->MIP OAM using TTL
Intra-domain MS-PW
–MS-PW OAM: PW MEP-MIP, No TCM
Intra-domain MS-PW
–MS-PW OAM: TCM MEP->MIP, plus E2E PW
50
Segment LSP setup
Starting Point
A B C D E
L1/L2 L1/L2 L1/L2 L1/L2
end-to-end LSP
Pseudo-wire
Final Point
A B C D E
L1/L2 L1/L2 L1/L2 L1/L2
Segment LSP
Objective:
Use bridge-and-roll with make-before-break mechanism
to ensure transition 51
Segment LSP setup – G.805 view
Starting Point
End to End LSP
A B C D E
LC LC LC LC
Final Point
New end-to-end (tunnelled) LSP
A B D E
LC LC LC
Segment LSP
C
LC – Link Connection
LC LC
52
Procedural Ordering Overview
53
LFU – Label For You (label 13)
ACh – Associated Channel
SS-PW, LSP OAM (no TCM) CW – Control Word
A B C D E
E2E (A to E)
E(B)/0 E(C)/0 E(D)/0 E(E)/0
LSP OAM LFU/1 LFU/1 LFU/1 LFU/1
ACh ACh ACh ACh
E2E (A to E)
E(B)/0 E(C)/0 E(D)/0 E(E)/0
PW OAM E(E)p/1 E(E)p/1 E(E)p/1 E(E)p/1
ACh ACh ACh ACh
A B C D E
PE P P P PE
Provider A Provider B
A B C D E F
PE P PB PB P PE
A B C D E
B and D are S-PEs
T-PE S-PE P S-PE T-PE
PW TCM
TCM-PWE (B to D) D(C)/0 D(D)/0
OAM D(D)p/1 D(D)p/1 Use of pseudo-wire TCM
ACh ACh
labels to be further spec’d.
E(B)p-E(D)p pw label
Non OAM Data Frames B(B)/0 D(C)/0 D(D)/0 E(E)(0) LSPs swap
D(D)p/0 D(D)p/0 TCM-PWE D(D)p pw label push
E(B)p/1 E(D)p/1 E(D)p/1 E(E)p/1 MS-PW D(C) lsp label push
CW CW CW CW
57
Intra-domain MS-PW
LFU – Label For You (label 13)
ACh – Associated Channel
CW – Control Word
LSP, MS-PW & TCM-MS-PW OAM
A B C D E
B and D are S-PEs
T-PE S-PE S-PE T-PE
Non OAM Data Frames C(B)/0 C(C)/0 F(E)/0 F(F)/0 LSP tunnel
C(C)0 C(C)/0 D(D)/0 F(F)/0 F(F)/0 TCM MS-PW
F(C)p/1 F(C)p/1 F(D)p/1 F(F)p/1 F(F)p/1 MS-PW
CW CW CW CW CW
59
SS-PW over Intra-domain LSP LFU – Label For You (label 13)
ACh – Associated Channel
CW – Control Word
LSP MEP->MIP OAM using TTL T = TTL
A B C D E
PE P PE
MEP MIP MEP
E2E (A to E)
E(B)/0 E(D)/0 E(D)/0 E(E)/0
PW OAM E(E)p/1 E(E)p/1 E(E)p/1 E(E)p/1
ACh ACh ACh ACh
E2E (A to E)
B(B)/0 C(C)/0 D(D)/0 E(E)(0)
PW OAM E(B)p/1 T=255 E(C)p/1 T=254 E(D)p/1 T=253 E(E)p/1 T=253
ACh ACh ACh ACh
61
LFU – Label For You (label 13)
Intra-domain MS-PW ACh – Associated Channel
CW – Control Word
TCM-MS-PW MEP->MIP OAM using TTL T = TTL
A B C D E
B,C and D are S-PEs
T-PE S-PE S-PE S-PE
MEP T-PE
MIP MIP MEP
TCM PW label
expires, OAM pkt
TCM-PWE (A to C) B(B)/0 C(C)/0 pops out at MIP
OAM D(B)p/1 T=2 D(C)p/1 T=1
ACh ACh
TCM PW label
TCM-PWE (A to D) causes OAM to
B(B)/0 C(C)/0 D(D)/0 terminate at MEP
OAM D(B)p/1 T=255 D(C)p/1 T=254 D(D)p/1 T=253
ACh ACh ACh
Scenarios to be added:
a) LSP on FRR path (both facility and detour)
b) b) PW with ACH processing (no need for LFU, so processing
steps are slightly different from LSP processing)
63
Short Pipe Model with Nested TTL and No PHP Processing
A B C D E F G H
Bottom of stack 64
Nested LSP TTL Processing (1)
65
Nested LSP TTL Processing (2) - pseudo code
66
Nested LSP TTL Processing (3) continued pseudocode
If a packet arrives at a node with TTL = 1, then the TTL is decremented and goes to 0
If the packet has no LFU below the current label, then the packet may be discarded
Statistics may be maintained for these packets
If the packet has an LFU just below the current label
If the LFIB action for this label is POP, then this node should be a MEP for this level
The packet is passed to the control plane module for processing, including validating
that the node is a MEP, the packet contents are consistent
The appropriate OAM actions, as described by the packet, are taken
A reply, if required, is returned to the MEP that originated this message
If the LFIB action for this label is SWAP, then this node should be a MIP for this level
The packet is passed to the control plane module for processing, including validating
that the node is a MIP, the packet contents are consistent
The appropriate OAM actions, as described by the packet, are taken
A reply, if required, is returned to the MEP that originated this message
67
Multi-Segment PW TTL Processing
LSP
PW
A B C D
LSP LSP
PW
69
ECMP Considerations
70
RFC4928 Mechanism
D
LFIB:AB-BC
B
DE, PW-L
PW-L, AB
Segment Primary Path LFIB:BC-CD
E
A LFIB:XY-YZ
YZ, PW-L
PW-L, AW
LSP OAM
Path diversity is not part of the OAM process. It is the responsibility of the Control or
Management Plane
OAM function uses LFU with Generic Channel Association
Pre-provisioned segment primary and backup paths
LSP OAM running on segment primary and back-up paths (using a nested LSP)
OAM failure on backup path Alert NMS
OAM failure on primary path results in B and D updating LFIB to send traffic labelled for BD via
segment backup path
End to End traffic labelled for BD now pushed onto segment backup path
72
End to End LSP operations
LFIB:CD-DE
LFIB:AB-BC LSP OAM
DE, PW-L
PW-L, AB
Primary Path LFIB:BC-CD
E
A LFIB:XY-YZ
YZ, PW-L
PW-L, AW
LFIB:WX-XY
LFIB:AW-WX Backup Path
LSP OAM
Path diversity is not part of the OAM process. It is the responsibility of the Control
Plane
OAM function uses LFU with Generic Channel Association
Pre-provisioned primary and backup paths
LSP OAM running on primary and back-up paths
OAM failure on backup path Alert NMS
OAM failure on primary path A and E updating LFIB to send and receive PW-L
traffic over backup path 73
PHP
74
Packet Context
OAM operations require packet context.
Work to date has proposed that this is supplied by the
label value and hence precludes the use of PHP.
Using the label as the identifier is a simple mechanism
that can be applied to both OAM and data packets, but
has a number of issues:
–Precludes PHP which has cost and applicability implications
for the OAM
–Label errors may produce complex network issues
Other context indicators may be available that allow the
lifting of the PHP constraint (at least as an option).
75
Alternative Context Indication
76
Use of alternate context mechanisms
The MPLS architecture supports label retention and hence we
can proceed on the basis that this approach is available to the
design team.
There are costs to the prohibition of PHP that needs to be fully
understood and accepted.
During the design phase we need to:
– Understand the costs, limitations, vulnerabilities and advantages of the PHP
and non-PHP approaches
– Either
1. Confirm label as context identifier and hence confirm PHP restriction
2. Propose an alternative mechanism that satisfies all needs and which
permits PHP
3. Propose the specification of a PHP and non-PHP method with appropriate
applicability statements.
77
SS-PW, LSP and TCM-LSP OAM - LFU – Label For You (label 13|14)
ACh – Associated Channel
CW – Control Word
PHP
A B C D E
E2E (A to E) D(C)/0
E(B)/0 E(D)/0 E(D)/0
LSP OAM LFU/1 LFU/1 LFU/1 LFU/1
ACh ACh ACh ACh
E2E (A to E) D(C)/0
E(B)/0 E(D)/0 E(D)/0
PW OAM E(E)p/1 E(E)p/1 E(E)p/1 E(E)p/1
ACh ACh ACh ACh
79
Conclusions/Recommendations
80
Discussion
Transport profile should meet the requirements of the ASON architecture
Use IETF protocol suite given it is used for ASON
GMPLS RSVP-TE for LSP signaling
GMPLS OSPF-TE and ISIS-TE for LSP TE information distribution
LDP will be used for PW setup (as part of client set up process)
DCN/SCN
IP-based DCN/SCN
ACH defines ECC
Can have as many channels and protocols as necessary and therefore could
support the SCN
Must have policing for DCN/SCN
IS-IS or OSPF running in DCN to provide DCN topology information
Connectivity discovery and verification
Could use LMP if native mechanisms not adequate
81
AC – Attachment Circuit
Inter-provider MS-PW
E-NNI – External NNI
SCN – Signaling Communication Network
SCN-GW Gateway
T-LDP – Targeted LDP
SCN-A SCN
GW
SCN-B
Provider A Provider B
AC CP I-NNI CP I-NNI CP E-NNI CP I-NNI CP I-NNI CP AC
C1 A B C D E F C2
82
ASON Call/Connection CCC – Client Call Controller
NCC – Network Call Controller
Model CC – Connection Controller
UNI – User-Network-Interface
NNI – Network-Network Interface
I-NNI – Internal NNI
E-NNI – External NNI
SCN-A SCN
GW
SCN-B
Provider A Provider B
UNI CP I-NNI CP I-NNI CP E-NNI CP I-NNI CP I-NNI CP UNI
C1 A B C D E F C2
Call Connection
Signaling Signaling
83
Survivability
84
Advice
85
Discussion
86
Discussion - 2
Native MPLS protection schemes, such as facility bypass and detours, can be
used to provide ring protection in most, but not optimal in some scenarios
A single facility bypass LSP protects all LSPs over a specific link by wrapping
traffic
A detour LSP can be used for optimal traffic delivery to the egress point (without
wrapping)
A detour LSP is needed for every LSP to be protected.
Also can provide optimized exit preventing the 2x bandwidth in other wrapping
repair technologies
Must add notion of DOWN and ADMINDOWN (e.g. standby bit)
ITU-T G.8132 TM-SPRing defines a ring protection that includes additional
capabilities to the MPLS protection schemes, by supporting coordinated
protection in case of multiple failures (using single protection mechanism for
all cases
MPLS ring protection strategies provide necessary functionality and option 1
can be recommended but, there appears to be cases where G.8132 may
provide additional functionality that may be incorporated and specified
We have found no showstoppers
87
Requirements summary - Rings
MPLS-TP ring protection shall satisfy the following:
– Less than 50 ms switching time
– Protect p-t-p and p-t-mp connections
– Support normal traffic and non-preemptable unprotected traffic
– Provide hold-off timer and wait to-restore timer
– Protect all traffic possible in case of single and multiple failures
• Fiber, nodes or both
• Failures that segment the ring
– Support operator’s commands
– Support a priority scheme to arbitrate between switch requests from multiple faults and/or operator
commands
• Provide ability to coordinate multiple requests in the ring
– Bi directional switching
ITU-T References:
ETSI TS 101 009, Section 6.2.2
ITU-T G.841, Section 7.2.2
Telcordia GR-1230, Section 5
ITU-T Draft G.8132, Section 7
88
Requirements summary - Linear
MPLS-TP linear protection shall satisfy the following:
– Less than 50 ms switching time
– Protect p-t-p and p-t-mp connections
• P-2-MP LSP protection based on detours is covered in RFC 4875, though an example is
not included here
– Support normal traffic and non-preemptable unprotected traffic
– Provide hold-off timer and wait to-restore timer
– Support operator’s commands
– Support a priority scheme to arbitrate between switch requests from multiple faults
and/or operator commands
– Bi directional switching
– Revertive and non revertive operation
ITU-T References:
– G.808.1 – Generic linear protection
– G.8131 T-MPLS linear protection
Not addressed
Reuse (or simplify) the mechanism used for Ring protection? 89
Example Scenarios in the following slides
90
MPLS Facility Bypass Example
B B
C C
A A
D D
F F
E E
Example:
Assume ingress to ring is at A and egress is at E
Facility bypass (B-A-F-E-D-C) is established to protect link B-C
Link B-C in the ring goes down
Facility bypass protects failure of link B-C with the red path to the merge point (C)
Emulates conventional optical ring failure recovery
Requires two-label stack to redirect the LSP around the failure
Scale issue:
One facility bypass provides protection for all LSPs over link B-C
One facility bypass for each link in the ring (shared by all LSPs on that link) 91
AE = Initial clockwise ring
C
AE AE
E(D)/0
A C(A)/0
Payload
AE
C(C)/0
PHP may or may
AE not be used:
C(F)/0 TBD
D
AE
C(D)/0
AE AE
F C(E)/0 E(E)/0
Payload
92
MPLS Facility Bypass Label Stack .2 AE = Initial clockwise ring
AE = bypass for AE
AE
E(B)/0
Payload B A(A)/0 = bypass label
CB bypass
label pushed by C
AE
C
C(A)/0
E(C)/0
AC A Payload AE
AE E(D)/0
(PE) C(C)/0 Payload
E(C)/0
Payload
AE
C(F)/0 PHP may or may
E(C)/0 not be used:
Payload TBD
AE D
C(D)/0
E(C)/0
Payload
F AE AE
C(E)/0 E(E)/0
E(C)/0 Payload
Payload
E
(PE)
AC
93
AE = Initial clockwise ring
MPLS Facility Bypass Label Stack EA = Initial anticlockwise ring
AE = bypass for AE
Failure state, Bidirectional LSP EA = bypass for EA
Spin is relative to
initial LSP traffic flow
AE EA
E(B)/0 A(A)/0
Payload Payload B A(A)/0 = bypass label
CB bypass
label pushed by C
AE EA
C
C(A)/0 B(B)/0
E(C)/0 A(B)/0
AC A Payload Payload AE EA
AE EA E(D)/0 A(C)/0
(PE) C(C)/0 B(D)/0 Payload Payload
E(C)/0 A(B)/0
Payload Payload
AE EA
C(F)/0 B(A)/0 PHP may or may
E(C)/0 A(B)/0 not be used:
Payload Payload TBD
AE EA D
C(D)/0 B(E)/0
E(C)/0 A(B)/0
Payload Payload
F AE EA AE EA
C(E)/0 B(F)/0 E(E)/0 A(D)/0
E(C)/0 A(B)/0 Payload Payload
Payload Payload
E
(PE)
AC
94
MPLS 1:1 Detours
- Optimized Restoration
Entry Point to repair path
B Primary-detour B
C merge point C
A A
Repair Path
D D
F F
E E
Example
Assume ingress to ring is at A and egress is at E
Detour established to protect link B-C merges with primary path at E, resulting in protection through B-A-F-E
Link B-C in the ring goes down
Detour carries traffic to E
Optimizes on conventional optical ring and facility bypass failure recovery
Requires one-label stack to redirect the LSP around the failure
Scale issue:
One detour per LSP is required for each working LSP
The detour LSP can be used to protect the failure of any link on the ring
95
AE = Initial clockwise ring
C
AE
E(D)/0
E(A)/0 Payload
A E(B)/0
E(F)/0
E(C)/0 D
E(E)/0
AE
E(E)/0
F Payload
96
AE = Clockwise ring
MPLS 1:1 Detours - Label Stacks .2 AE = bypass for AE
C
AE
AC A E(A)/0
Payload
Payload AE
E(F)/0
Payload
D
F
AE
E(E)/0
Payload
E
AC
97
AE
C ==Clockwise
Clockwisering
ring
MPLS 1:1 Detours - Label Stacks EA
A ==Anticlockwise
Anticlockwisering
ring
EA
C ==Clockwise
bypass fordetour
AE
Failure state, Bidirectional LSP AE
A ==Anticlockwise
bypass for EAdetour
Spin
Direction
is relative
relative
to to
initial
LSP traffic
LSP traffic
flow flow
C
AE EA
AC A E(A)/0 B(B)/0
Payload Payload
AE EA
E(F)/0 B(A)/0
Payload Payload
D
F AE EA
E(E)/0 B(F)/0
Payload Payload
AC
98
Open questions on MPLS Facility bypass/detours
99
Review: TM-SPRing labels allocation
100
Review: TM-SPRing OAM monitoring and APS
messages
Monitoring:
APS controller
APS messages – Each section (span) in the ring is
monitored by sending CV OAM with
periodicity of 3.3ms
– Span failures are detected as absence of 3
consecutive CV frames
Node 1
Node 2 Node 6
APS:
Idle state at all nodes – Each node has an APS controller that
sends and receives APS PDUs using an
Node 3 Node 5 ACH
– In normal state APS controller generates
Node 4
NR (no request) PDUs to its neighbours in
both directions
– When there is no failure each node in the
Monitoring point
ring is in the Idle state i.e. frames are not
forwarded on the protection LSP
101
TM-SPRing point-to-point example
Fiber failure Node failure
Add Add
4 ‒ Pass-through state at 3 ‒ SF PDU by 4 ‒ Pass-through state
nodes 2-1-6-5 nodes 2-4 at nodes 1-6-5
Node 1 Node 1
Node 2 Node 6 Node 2 Node 6
3 ‒ SF PDU
by nodes 3-4 2 ‒ Switching state 2 ‒ Switching state at
at nodes 3-4 nodes 2-4
Node 4 Node 4
1 ‒ Node 3
1 ‒ Fiber failure
failure 3 ‒ SF PDU by 3 ‒ SF PDU by
nodes 3-4 nodes 2-4
Add Add
4 ‒ Pass-through state at 4 ‒ Pass-through state
Drop and nodes 2-1-6-5 Drop and at nodes 1-6-5
continue continue
Node 1 Node 1
Node 2 Node 6 3 ‒ SF PDU by Node 2 Node 6
nodes 2-4
3 ‒ SF PDU by
nodes 3-4 2 ‒ Switching state 2 ‒ Switching state at
at nodes 3-4 nodes 2-4
Node 4 Node 4
1 ‒ Node 3
1 ‒ Fiber failure
failure 3 ‒ SF PDU by 3 ‒ SF PDU by
nodes 3-4 nodes 2-4
Drop and Drop and
continue continue
103
TM-SPRing multiple failures example
Multiple failures, p-t-p Multiple failures, p-t-mp
3 ‒ SF PDU 3 ‒ SF PDU by
by nodes 1-4 Add nodes 1-4 Add
4 ‒ Pass-through 4 ‒ Pass-through state
1 ‒ Fiber state at nodes 6-5 1 ‒ Fiber at nodes 6-5
failure failure
Node 1 Node 1
Node 2 Node 6 Node 2 Node 6
Node 4 Node 4
1 ‒ Fiber 1 ‒ Fiber
failure failure
3 ‒ SF PDU by 3 ‒ SF PDU by
nodes 1-4 Drop and nodes 1-4
continue
The same mechanism with a single protection connection restores all traffic possible:
• For p-t-p and p-t-mp connections
• For fiber or node failure
• For single or multiple failures
104
Network Management
105
Advice
106
Conclusions - I
Need to be able to provision and manage a LSP or PW across a network where some
segments are managed by IETF (e.g. netconf) and other segments that are managed
by ITU/TMF (XML/CORBA) interfaces.
– LSP establishment
• MPLS management in the IETF already supports the ability to independently
setup LSP segments (using different tools) to create a concatenated (end to
end) LSP
– LSP maintenance
• It is possible to run maintenance on an LSP independent of the mechanism
used to establish the LSP
– The ITU/TMF interface supports the management of multiple technologies
• Management of MPLS-TP needs to be added to these multi technology
interfaces
No need to explicitly support the case of a single NE that offers both the IETF and
ITU/TMF interface
– This is a NE implementation issue
107
Conclusions - 2
Network Management (NM) requirements
– Configuration
• No issues
– Fault, PM
• If the OAM can provide the measurement primitives then no reason that NM
cannot report them
• Need to allow each operator to determine the performance of the segment (plus
end to end).
– Accounting
• Limited functionality – e.g. reporting of unavailable time, providing PM data
– Security (of the management interface)
• Not specific to MPLS-TP networks
• Dependent on:
– Management protocol
– Management application
– Bearer for the management traffic
• Security implementation is per network segment
108
Management – Background IETF
109
Management – Background ITU
TMF/ITU approach
– Provides both a NE and Network level interface to the OSS
– Protocol neutral model (in UML), requirements and use cases
– Protocol specific interface definitions
110
ITU-T PM objectives
PM Requirements for a MPLS-TP LSP/PW
Same measurements and processing as Ethernet
– Connectivity defects present in a 1-second period
– number of lost (circuit/packet) frames in a 1-second period
– near-end and far-end (severely) errored second
– 10 seconds being severely errored/not severely errored to enter/exit
unavailable time (UAT)
– 15min and 24hr PM parameter reporting
To define how LM (loss measurement) and DM (delay
measurement) information, as defined in Y.1731 & draft G.8114, is
registered in 15min/24hr bins (G.7710)
112
Summary
To date we have found no showstoppers and everyone is in agreement
that we have a viable solution
Recommend Option 1
From probing various SGs, WGs it appears that label 14 has had wide
enough implementation and deployment that the solution may have to use
a different reserved label (e.g. Label 13)
Extensions to Label 14 should cease
This architecture also appears to subsume Y.1711 since the
requirements can be met by the mechanism proposed here
113
Some open discussion points
114
The End
115