Multi-Protocol Label Switching (MPLS)
Multi-Protocol Label Switching (MPLS)
(MPLS)
1
MPLS Overview
2
MPLS Header Format
• Label: 20-bit label value
• Exp: experimental use
• Can indicate class of service
• S: bottom of stack indicator
• 1 for the bottom label, 0 otherwise
• TTL: time to live
20 3 1 8
7
Label Switched Path
• For each FEC, a specific path called Label Switched Path (LSP)
is assigned
• The LSP is unidirectional
• To set up an LSP, each LSR must
• Assign an incoming label to the LSP for the corresponding FEC
• Labels have only local significance
• Inform the upstream node of the assigned label
• Learn the label that the downstream node has assigned to the LSP
• Need a label distribution protocol so that an LSR can inform
others of the label/FEC bindings it has made
• A forwarding table is constructed as the result of label
distribution.
8
Label Distribution
Intf Label Intf Label Intf Label Intf
In In Out Out In In Out
3 50 1 40 3 40 1
1 47.1
Request: 47.1
3
Dest Intf Label
Out Out s t : 47.1 2
ue 3
47.1 1 50 Req 1
1 Mapping: 40
2
0
47.3 3 p i ng: 5 47.2
p
Ma
2
9
LSP Route Selection
10
Explicitly Routed LSP
• Advantages
• Can establish LSP’s based on policy, QoS, etc.
• Can have pre-established LSP’s that can be used in case of
failures.
• Signaling protocols
• CR-LDP
• RSVP-TE
11
Diffserv-Aware MPLS
• MPLS can be used together with Differentiated Services
to provide QoS.
• LSPs are configured between each ingress-egress pair.
• For each ingress-egress pair, a separate LSP can be created
for each traffic class, or
• Can create a single LSP for each ingress-egress pair and use
the Exp bits to differentiate packet classes.
• Scalable: as the number of flows increases, the number
of LSPs does not increase.
12
Diffserv-Aware MPLS
• Operations of routers in an ISP network
• At the ingress router, in addition to policing, a MPLS
header is inserted into the packet.
• Core routers process the packets based on the label and
Exp fields
• At the egress router, the MPLS header is removed.
• Whether a ISP’s architecture is DS field-based or
MPLS-based is transparent to other ISPs
The DS field based architecture and the MPLS
based architecture can easily inter-operate.
13
Diffserv-Aware MPLS
15
MPLS Protection Approaches
• End-to-End protection
• A backup LSP is set up in advance from the source LSR to the
destination LSR of the primary LSP.
• The backup LSP is link and node disjoint with the primary LSP
• Need reserve resources for the backup LSP
• Source LSR responsible for restorationsender must be notified of
the failure
16
MPLS Protection Approaches
• Local protection
• When establishing a primary LSP, a backup LSP for each possible
link or node failure is set up
• Resources reserved for each backup LSP
• Failure detecting LSR responsible for switching traffic to the backup
LSR
• Faster restoration than end-to-end protection
17
Local Protection
18
Label Stacking
• A packet may carry multiple labels, organized as a last-
in-first-out stack
• A label may be added to/removed from the stack at any
LSR
• Processing always done on the top label
• Allow the aggregation of LSPs into a single LSP for a
portion of the route, creating a tunnel
• At the beginning of the tunnel, the LSR assigns the same
label to packets from different LSPs by pushing the label
onto each packet’s stack
• At the end of the tunnel, the LSR pops the top label
19
Local Protection Using Label
Stacking
• Bypass tunnel: a LSP used to protect a set of LSPs
passing over a common facility.
• Label stacking allows different primary LSPs to
use the same bypass tunnel for failure protection.
20
Local Protection Using Label
Stacking
When a failure occurs:
• LSR at the beginning of the tunnel will
• Switch packets received on the protected LSP x onto the bypass
tunnel
• Replace the old label with a new label that will be understood by
the last node in the bypass tunnel to indicate LSP x
• Push the bypass tunnel's label onto the label-stack of the redirected
packets.
• LSR at the end of the tunnel will
• Pop the bypass tunnel's label
• Examine the top label to determine the protected LSP that the
packet is to follow.
21
Summary of MPLS
22