0% found this document useful (0 votes)
24 views

MPLS

MPLS aims to improve internet scalability, flexibility in delivering routing services, and network performance. It works by assigning short fixed-length labels to packets at the edge of the network which are then used for forwarding decisions within the core instead of long variable length IP addresses. This allows for traffic engineering and explicit routing to provide quality of service guarantees. MPLS supports both rerouting and protection switching for fault tolerance, with protection being faster but requiring pre-established backup paths and reserved bandwidth. Research aims to reduce backup bandwidth usage while maintaining survivability and minimize packet loss during failures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

MPLS

MPLS aims to improve internet scalability, flexibility in delivering routing services, and network performance. It works by assigning short fixed-length labels to packets at the edge of the network which are then used for forwarding decisions within the core instead of long variable length IP addresses. This allows for traffic engineering and explicit routing to provide quality of service guarantees. MPLS supports both rerouting and protection switching for fault tolerance, with protection being faster but requiring pre-established backup paths and reserved bandwidth. Research aims to reduce backup bandwidth usage while maintaining survivability and minimize packet loss during failures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

MPLS

*
MULTI-PROTOCOL LABEL SWITCHING

GOALS OF MPLS

▪ Scalability of network layer routing.


▪ Using labels as a means to aggregate forwarding
information, while working in the presence of routing
hierarchies.
▪ Greater flexibility in delivering routing services.
▪ Using labels to identify particular traffic which are to
receive special services, e.g. QoS.
▪ Increased performance.
▪ Using the label-swapping paradigm to optimize network
performance.
GOALS OF MPLS CONT…

▪ Simplify integration of routers with cell switching based


technologies.
▪ Making cell switches behave as routers.
▪ By making information about physical topology
available to network layer routing procedures.
MULTI-PROTOCOL LABEL SWITCHING

INTRODUCTION TO MPLS
▪ MPLS improves internet scalability by eliminating the need
for each router and switch in a packet's path to perform
traditionally redundant address lookups and route
calculation.
▪ Improves scalability through better traffic engineering.
▪ MPLS also permits explicit backbone routing, which
specifies in advance the hops that a packet will take across
the network.
▪ This should allow more deterministic, or predictable,
performance that can be used to guarantee QoS.
▪ These paths function at layer 3 or can even be mapped
directly to layer 2 transport such as ATM or frame relay.
INTRODUCTION TO MPLS CONT…
▪ Explicit routing will give IP traffic a semblance of end-to-
end connections over the backbone.
▪ The MPLS definition of IP QoS parameters is limited.
▪ Out of 32 bits total, an MPLS label reserves just three bits
for specifying QoS.
▪ Label-switching routers (LSRs) will examine these bits and
forward packets over paths that provide the appropriate
QoS levels. But the exact values and functions of these so-
called 'experimental bits‘ remain to be defined.
▪ The MPLS label could specify whether traffic requires
constant bit rate (CBR) or variable bit rate (VBR) service,
and the ATM network will ensure that guarantees are met.
MULTI-PROTOCOL LABEL SWITCHING

ARCHITECTURE
MULTI-PROTOCOL LABEL SWITCHING

LABELS
▪ A label is short, fixed length physically continuous identifier
which is used to identify a FEC ( forwarding equivalence
class), usually of local significance.
▪ Ru can transmits a packet labeled L to Rd, if they can agree
to a binding between label L and FEC F for packets moving
from Ru to Rd.
▪ Ru (upstream LSR) → Rd (downstream LSR with
respect to a given binding).
▪ L becomes Ru’s “outgoing label” representing FEC F,
and L becomes rd’s “incoming label” representing FEC
F.
▪ Rd must make sure that the binding from label to FEC is
one-to-one.
MULTI-PROTOCOL LABEL SWITCHING

LABELS CONT…

▪ Rd must not agree with Ru1 to bind L to FEC F1, while


agreeing with some other LSR Ru2 to bind L to a different
FEC F2, unless rd can always tell, when it receives a packet
with incoming label L, whether the label was put on the
packet by Ru1 or Ru2.

Ru1 L for FEC F1

Rd

Ru2 L for FEC F2


MULTI-PROTOCOL LABEL SWITCHING

LABELED PACKET
▪ A packet into which a label has been encoded.
▪ The label resides in an encapsulation header which exists
specifically for this purpose.
▪ Or the label may reside in a existing data link or network
layer header.
▪ The particular encoding technique which is used must be
agreed to by both the entities which encodes the label and
the entity which decodes the label.
MULTI-PROTOCOL LABEL SWITCHING

LABEL DISTRIBUTION

▪ It is set of procedures by which one LSR informs another


LSRs of the bindings (label/FEC) it has made.
▪ Two LSRs which use a distribution protocol to exchange
label/FEC binding information are known as “label
distributing peers” with respect to the binding information
they exchange.
▪ There exists many different distribution protocols ( [MPLS-
BGP], [MPLS-RSVP], [MPLS-RVSP-TUNNELS], [MPLS-
CR-LDP]).
IP VERSUS MPLS
▪ In IP Routing, each router makes its own routing and
forwarding decisions.
▪ In MPLS:
▪ source router makes the routing decision.
▪ Intermediate routers make forwarding decisions.
▪ A path is computed and a “virtual circuit” is established
from ingress router to egress router.
▪ An MPLS path or virtual circuit from source to destination
is called an LSP (label switched path).
FAULT TOLERANCE IN MPLS

▪ In MPLS two basic models are used to recover from faults


▪ Protection Switching
▪ Rerouting
PROTECTION SWITCHING AND REROUTING
▪ Rerouting
▪ On-demand recovery – no preset backup paths.
▪ Example: existing recovery in IP networks.
▪ Protection
▪ Pre-determined recovery – backup paths “in advance”.
▪ Primary and backup are provisioned at the same time.
▪ IP supports rerouting .
▪ Because it is datagram service.
▪ MPLS supports rerouting as well as protection.
▪ Because it is virtual-circuit service.
REROUTING IN IP NETWORKS

▪ In traditional IP, what happens when a link or node fails?


▪ Failure information needs to be disseminated in the
network.
▪ During this time, packets may go in loops.
▪ Rerouting latency is in the order of seconds.

▪ We look for protection possibilities in an MPLS network,


but…
▪ First we need to look at the QoS requirements
QoS REQUIREMENTS

▪ Bandwidth Guaranteed Primary Paths


▪ Bandwidth Guaranteed Backup Paths
▪ BW remains provisioned in case of network failure
▪ Minimal “Protection or rerouting Latency”
▪ Protection/rerouting latency is the time that elapses
between:
▪ “the occurrence of a failure”, and
▪ “the diversion of network traffic on a new path”

rerouting is generally SLOWER than protection


PROTECTION IN MPLS

▪ First we define Protection level.


▪ Path protection
▪ Also called end-to-end protection.
▪ For each primary LSP, a node-disjoint backup LSP is set up.
▪ Upon failure, ingress node diverts traffic on the backup path.
▪ Local Protection
▪ Upon failure, node immediately upstream the failed element
diverts the traffic on a “local” backup path.
Path Protection ➔ More Latency
Local Protection ➔ Less Latency
PROTECTION IN MPLS CONT…

PATH PROTECTION

S 1 2 3 D

This type of “path Protection”


still takes 100s of ms.
Primary Path We may explore “Local Protection” to
quickly switch onto backup paths!
Backup Path
PROTECTION IN MPLS CONT…

LOCAL PROTECTION: FAULT MODELS

Link A B C D
Protection

Node A B C D

Protection

Element
B C D
Protection A
PROTECTION IN MPLS CONT…

PROTECTION MODES
▪ 1+1 protection
▪ Flow sent on two separate disjoint paths
▪ Receiver responsible for choosing one of the two
▪ 1:1 protection
▪ A backup path protects a single LSP (or a portion of a
single LSP)
▪ N:1 protection
▪ A backup path protects one link or one node or both
▪ Overlapping portions of many LSPs are protected by a
single backup path
▪ Applicable for local protection only
▪ N:M protection (M<N)
COST OF THE BACKUP PATH

▪ Local Protection requires that backup paths are setup in


advance
▪ Upon failure, traffic is promptly switched onto preset
backup paths.
▪ Bandwidth must be reserved for all backup paths
▪ This results in a reduction in the number of Primary
LSPs that can otherwise be placed on the network.
▪ Can we reduce the amount of “backup bandwidth” but still
provide guaranteed backups?
MOTIVATION FOR THE RESEARCH
▪ We First look to answer the following questions:
▪ Who computes the primary path?
▪ What is the fault model (link, node, or element protection)?
▪ Where do the backup paths originate?
▪ Who computes the backup path?
▪ At what point do the backup paths merge back with the
primary path?
▪ What information is stored locally in the nodes/routers?
▪ What information is propagated through routing protocols?
▪ What if a primary path can not be fully protected?
MOTIVATION FOR THE RESEARCH CONT…
▪ Then we try to solve the following unsolved problems and
hence motivations:
▪ How can we reduce the amount of “backup bandwidth” but
still provide guaranteed backups? Thus maximizing the
bandwidth sharing.
▪ How to increase the maximum number of primary LSPs
that can be placed on the network?
▪ How to maintain the survivability of network by recovering
from failure with in the acceptable delay and minimum
packet loss while efficiently utilizing the network
resources?
MOTIVATION FOR THE RESEARCH CONT…

▪ How to enhance the fault-tolerance performance


without affecting the fault free traffic?
▪ How to solve the packet disorder problem while
rerouting the affected traffic?
RELATED WORK
▪ Jenhui Chen et al. in [26] proposed a fast path recovery mechanism,
which employs the Enhanced Interior Gateway Routing Protocol
(EIGRP) and the Diffusing Update Algorithm (DUAL) together, to
find the working and backup paths simultaneously and modify the
LDP to establish the LSP by using the routing table of EIGRP.
▪ S Sae Lor et al. in [25] proposed a novel technique for fast re-route
in hop-by-hop routing in case of single link failures. It offers full
repair coverage without requiring additional mechanisms such as
tunneling or interface-specific operations. The technique handles the
failures without jeopardizing the operable parts of a network.
▪ Sahel Alouneh et al. in [27] present a novel approach for fault
tolerance in MPLS networks using a modified (k, n) threshold
sharing scheme with multi-path routing.
RELATED WORK CONT…

▪ Jenn-Wei Lin et al. in [28] enhanced the fault-tolerant performance


of the two recovery mechanisms (protection switching and
rerouting). The proposed approach utilizes the failure free LSPs to
transmit the traffic of the failed LSP (the affected traffic).
▪ Ravindra Kumar Singh et al. in [30] proposed a new algorithm for
an optimum LSP pair selection from multiple parallel LSP pairs. It
minimizes the probability of network congestion, packet loss and
request loss by selecting the LSP which is lightly loaded and
possess upward and downward bandwidth proportional to the
service request.
RESEARCH METHODOLOGY
▪ Survey of literature, Study of various algorithms/ models/
methods of the Fault Tolerance and Rerouting currently
available.
▪ Comparison between existing algorithms/ models based on
their efficiency and methodology, complexity.
▪ Analysis of pros and cons of different Fault Tolerance and
Rerouting methods exist in the literature.
▪ Criteria for evaluating the performance factors.
▪ Creation of new algorithms/ models which removes
drawbacks of existing methods
EXPECTED OUTCOMES
▪ Implementation model for proposed work.
▪ Complete analysis of various factors affecting performances of
fault tolerance algorithm.
▪ Implementation/ simulation of newly developed algorithms/
models/ methods.
▪ Comparison of newly developed algorithms/ models/ methods
with the existing algorithms/ models/ methods.
▪ Testing & maintenance of the newly developed algorithms/
models Necessary optimization models to be designed and / or
simulated.
▪ Experiments with real world networks are reported to
demonstrate the optimality of the algorithm / model / methods.
BIBLIOGRAPHY
[1] R. Aggarwal, D. Papadimitriou, and S. Y. (Eds.). Extensions to RSVP-TE for point to multipoint
TE LSPs. IETF Draft, April 2005.
[2] G. Ahn, J . Jang, and W. Chun. An efficient rerouting scheme for MPLS-based recovery and its
performance evaluation. Telecommunication Systems, pages 481-495, 2002.
[3] D. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, and G. Swallow. RSVP-TE: Extensions to
RSVP for LSP tunnels. IETF RFC 3209, December 2001.
[4] R. Bartog and M. Raman. A heuristic approach t o service restoration in MPLS networks. In IEEE
International Conference on Communications, ICC 2001, volume 1, pages 117-121, June 2001.
[5] R. Braden, L. Zhang, S. Berson, S. Herzog, and S. Jamin. Resource reservation protocol (RSVP)
- version 1 functional specification. IETF RFC 2205, September 1997.
[6] A. Dana, A. K. Zadeh, K. Badie, M. E. Kalantari, and N. Reyhani. LSP restoration in MPLS
network using case-based reasoning approach. In Proceedings of ICCT2003, pages 462-468,
2003.
[7] W. D. Grover and D. Stamatelakis. Cycle-oriented distributed preconfiguration: Ring-like speed
with mesh-like capacity for self-planning network restoration. In Proceedings of IEEE ICC'98,
pages 537-543, Atlanta, Georgia, June 1998.
[8] D.-K. Hong, C. S. Hong, and Dongsik-Yun. A hierarchical restoration scheme with dynamic
adjustment of restoration scope in an MPLS network. In Network Operations and Management
Symposium, pages 191-204, April 2004.
[9] C. Huang, V. Sharma, K. Owens, and S. Makam. Building reliable MPLS networks using a path
protection mechanism. IEEE Communications Magazine, pages 156 - 162, March 2002.
[10] J . Kang and M. J. Reed. Bandwith protection in MPLS networks using p-cycle structure. In
Design of Reliable Communication Networks (DRCN) 2003, pages 356-362, Banff, Alberta,
Canada, October 2003.
BIBLIOGRAPHY
[11] S.-Y. Kim. Effect of load distribution in path protection of MPLS. International Journal of
Communication Systems, 16(4):321-335, February 2003.
[12] M. Kodialam and T. V. Lakshman. Dynamic routing of locally restorable bandwidth guaranteed
tunnels using aggregated link usage information. In Proceedings of IEEE INFOCOM 2001, pages
376-385, April 2001.
[13] M. Kodialam and T. V. Lakshman. Restorable dynamic quality of service routing. IEEE
Communications Magazine, pages 72-81, June 2002.
[14] H. Mellah and A. F. Mohamed. Local path protection/restoration in MPLS-based networks. In the
9th Asia-Pacific Conference on Communications- APCC 2003, volume 2, pages 620-622,
September 2003.
[15] M. Menth, J. Milbrandt, and A. Reifert. End-to-end protection switching mechanisms for MPLS
networks. Technical Report 320, University of Wurzburg, Institute of Computer Science, February
2004.
[16] P. Pan, G. Swallow, and A. A. (Eds.). Fast reroute extensions to RSVP-TE for LSP tunnels. IETF RFC
4090, May 2005.
[17] P.-K. Park, H.-S. Yoon, S. C. Kim, J . Park, and S. Yang. Design of a dynamic path protection
mechanism in MPLS networks. In The 6th International Conference on Advanced Communication
Technology, volume 2, pages 857-861, 2004.
[18] C. Qiao and D. Xu. Distributed partial information management (DPIM) schemes for survivable
networks – part I. In Proceedings of IgEE INFOCOM 2002, pages 302 -311, 2002.
BIBLIOGRAPHY CONT…
[19] V. Sharma, F. Hellstrand, B. Mack-Crane, S. Makam, K. Owens, C. Huang, J. Weil, B. Cain, L.
Anderson, B. Jamoussi, A. Chiu, and S. Civanlar. Framework for multi-protocol label switching
(MPLS)-based recovery. IETF RFC 3469, February 2003.
[20] D. Stamatelakis and W. D. Grover. IP layer restoration and network planning based on virtual
protection cycles. IEEE Journal on Selected Areas in Communications, 18(10):1938-1949, October
2000.
[21] D. Xu, Y. Xiong, , and C. Qiao. Novel algorithms for shared segment protection. IEEE Journal on
Selected Areas in Communication, 21(8): 1320-1331, 2003.
[22] E. Yetginer and E. Karasan. Robust path design algorithms for traffic engineering with restoration
in MPLS networks. In Proceedings of the Seventh International Symposium on Computer and
Communications – ISCC 2002, pages 933-938, 2002.
[23] S. Yoon, H. Lee, D. Choi, Y. Kim, G. Lee, and M. Lee. An efficient recovery mechanism for MPLS-
based protection LSP. In Joint 4th IEEE International Conference on ATM (ICATM 2001), pages 75-
79, Seoul, Korea, April 2001.
[24] Weili Huang, Hongyan Guo. A Fault-Tolerant Strategy for Multicasting in MPLS Networks.
International Conference on Computer Engineering and Technology (ICCET 2009), Vol. 1, pages
432-435, 2009.
[25] S Sae Lor, R Landa, and M Rio. A New Technique for Full Fast Recovery in Hop-by-Hop Routing. In
London Communications Symposium 2009.
[26] Jenhui Chen , Chung-Ching Chiou and Shih-Lin Wu. A Fast Path Recovery Mechanism for MPLS
Networks. In Networking - ICN 2005, LNCS 3421, pages 58-65, 2005.
[27] Sahel Alouneha, Anjali Agarwal and Abdeslam En-Nouaary. A novel path protection scheme for
MPLS networks using multi-path routing. In Computer Networks Volume 53, Issue 9, Pages 1530-
1545, 25 June 2009.
BIBLIOGRAPHY CONT…
[28] Lin, J.-W., Liu, H.-Y. Redirection based recovery for MPLS network systems. J. Syst. Software
(2009).
[29] Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le Roux. PLR-based heuristic for backup path
computation in MPLS networks. Computer Networks, Volume 53, pages 1467–1479, 2009.
[30] Ravindra Kumar Singh, Kanak Saxena and Reena Singh. Traffic Aware LSP Selection Method in
MPLS Networks. In Springer LNCS for International Conference on Recent Trends in Business
Administration and Information Processing 2010. Trivandrum, India

You might also like