internet traffic engineering
DESCRIPTION
TRANSCRIPT
![Page 1: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/1.jpg)
Internet Traffic Engineering Using Multi-Protocol Label Switching (MPLS)
D.O. Awduche and B. Jabbari
Generalized Multi-Protocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques
A. Banerjee et. al.
Internet Traffic Engineering
Joachim Seilfaldet (joachse)Jonas Sæther Markussen (jonassm)
![Page 2: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/2.jpg)
MULTIPROTOCOL LABEL SWITCHINGJonas Sæther Markussen
![Page 3: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/3.jpg)
Agenda• Multi-Protocol Label Switching– Overview– Labels– Label assignment– Forward equivalence classes (FECs)– Label switched forwarding (LSP)– Control and data separation
• Generalized Multi-Protocol Label Switching• Traffic Engineering• Traffic Engineering using MPLS
![Page 4: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/4.jpg)
Overview (1)• Multiprotocol Label Switching Architecture (RFC3031)• Overlay link network (OSI layer “2.5”)
– Eliminates the dependence on a specific link layer technology (e.g. ATM, SONET, etc.)
– Eliminates the need for multiple layer 2 networks to support multiple protocols• MPLS can carry many different kinds of traffic: IP, ATM, SONET,
Ethernet frames, etc.
• Constraint-based forwarding– (Optional) assignment of labels prefixing packet headers– Forwarding no longer constricted to packet destination
only
![Page 5: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/5.jpg)
Overview (2)• Introduces connection-oriented routing to
legacy IP routers– Does this by establishing “virtual links” using label
switched paths (LSPs)• Provides means for traffic engineering (TE)– Can manipulate link-state advertisements (LSAs)– An easy-to-maintain virtual topology– With TE, MPLS can establish alternative paths to
avoid congested areas• Enables fault tolerance if a link goes down
![Page 6: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/6.jpg)
Labels• MPLS introduces labels
– Originally called “tags” in earlier works by Cisco and others– Fixed-size header
• 20-bit Label Value• 3-bit Traffic Class (QoS priority and ECN)• 1-bit Bottom-of-Stack flag• 8-bit Time-to-Live
– Unlike ATM and frame relay, labels can be stacked• Allowing hierarchical arrangement of frames
– Labels are prefixed to IP headers and to each other• Enables fast look-ups (more on this later)
Label Value Class BoS TTL
![Page 7: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/7.jpg)
Label assignment (1)• Packets enter a MPLS domain through an ingress
node and leaves through an egress node– These are typically label edge routers (LERs)
• Ingress nodes assigns (pushes) to and egress nodes removes (pops) labels from packets coming in
Exit node
Entry node
LER
LER
MPLS domain
![Page 8: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/8.jpg)
Label assignment (2)• Three label operations:
– Push (impose, assign)• Encapsulates the packet in a new MPLS layer• Allows hierarchical routing
– Used by e.g. MPLS VPN (L3VPN)
– Pop (dispose, remove)• Remove uppermost label• When the last label is popped, the packet “leaves” the MPLS
tunnel/domain• Usually done by the egress router (exit node)
– Can be done by the preceding LSR for offloading the egress router penultimate hop popping (PHP)
– Swap• Simply replaces the label and forwards packet along the path associated
with the new label
![Page 9: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/9.jpg)
Forward equivalence classes• Label assignment is based on forward equivalence classes
(FECs)– Packets belonging to the same FEC has the same labels– FECs can be defined differently:
• Based on enter (ingress) nodes and exit (egress) nodes• Based on service class, requiring similar QoS or packet treatment
across the MPLS domain• Packets belonging to the same flow• Combinations of those above• FECs are associated according to some policy formulation
• Packets belonging to the same FEC traverse through the same path (or multi-paths)– This is called a label switched path (LSP)
![Page 10: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/10.jpg)
Label switched forwarding (1)• “Virtual links” presented to above layers in the OSI stack
– These are called label switched paths (LSPs)– From one label edge router (LER) to another
• Typically the same as ingress and egress nodes
– Established (and tore down) by a signaling protocol (more on this later)– This introduces connection-orientation in networks that originally were based on packet
switching (PS) unified data carrying for both PS and circuit-based• Routers in the MPLS domain that forward both labeled packets and conventional
IP packets are called label switching routers (LSRs)– Label edge routers (LERs) are usually LSRs with label stacking functionality
LERRouter
LSR
Router
LER
LSR
Phys. links
LSP paths
Link from IP perspective
![Page 11: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/11.jpg)
Label switched forwarding (2)• LSP update policy can vary:– Predefined (strategic)
• Careful planning of the virtual topology• Considerations and forecasting to traffic patterns• How, when and where to activate new LSPs to address
performance issues in the network
– Ad-hoc (tactical)• Establishment and managing of LSPs to divert traffic away
from congested network resources to under-utilized alternatives
• A “hybrid approach”: LSPs control traffic parts in some segments of network while interior gateway routing protocol metrics are used in other
![Page 12: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/12.jpg)
Control and data separation (1)• MPLS functionality is separated into two “planes” with different purposes• The planes are decoupled and independent
– Clear separation of the control plane from the data plane in network switching elements
– Even further separation in Generalized MPLS (GMPLS)
Control
Routing Path selection
SignalingLocal
resource control
TransportLabel swapping
Packet forwardingPacket treatment
From the article, Fig. 3
Control
Routing Path selection
SignalingLocal
resource control
TransportLabel swapping
Packet forwardingPacket treatment
Protocol Transactions
Bearer Channels
![Page 13: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/13.jpg)
Control and data separation (2)• Control plane– Control protocols are software processes that
communicate across node boundaries– Distribute and manage:
• Network topology• Resource availability
– Establish and tear down LSPs• Signaling protocol
– Label distribution protocol (LDP) for best-effort hop-to-hop paths
– RSVP-TE (or CR-LDP) for traffic engineering purposes and end-to-end virtual circuits
![Page 14: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/14.jpg)
Control and data separation (3)• Forwarding plane• Label swapping operations
– Look-up tables
• Packet treatment functions– Scheduling– Queue management– Rate shaping– Policing
• Usually implemented in hardware– High speed operations
![Page 15: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/15.jpg)
GENERALIZED MULTI-PROTOCOL LABEL SWITCHING
Joachim Seilfaldet
![Page 16: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/16.jpg)
Agenda• Multi-Protocol Label Switching• Generalized Multi-Protocol Label Switching
– What is GMPLS?– Implemented interfaces to support– Enhancements to Signaling– Hierarchical LSP Setup– GMPLS Protection and Restoration Techniques– Path Switching– Line Switching– Protection Mechanisms– Restoration Mechanisms
• Traffic Engineering• Traffic Engineering using MPLS
![Page 17: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/17.jpg)
What is GMPLS?
Generalized Multi-Protocol Label Switching• Next generation implementation of Multi-Protocol Label Switching• Extends to support a wide range of LSP for different network devices.• Extensions made to IP router protocols (OSPF and IS-IS)• New Link Management Protocol
Multi-Protocol Label Switching Recap• Works as an extension of IP• Control plane is logically separated from data plane. • Referred as a “Layer 2.5” protocol. Layer 2 (Data Link Layer) and Layer
3 (Network Layer).
![Page 18: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/18.jpg)
What is GMPLS?
Control plane concepts can be used in other switched transport technologies
• Packet Switched Networks
• A label represent a short tag attached to packet
• Time-Division Multiplexing Networks
• A label represent a time slot
• Wavelength-Switched Networks
• A label represent a wavelength
• Fiber-switched Networks
• A label represent a fiber
![Page 19: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/19.jpg)
Implemented interfaces to support
• Packet Switch Capable Interfaces (PSC) If a node recives data over this interface, it will be able to switch the
recived data on a packet-by-packet basis based on the label attached.
• Time-Division Multiplexing (TDM) Will be able to multiplex or de-multiplex channels within an payload.
• Lambda Switch Capable Interface (LSC) Will be able to recognize and switch individual lambdas within the
interface.
• Fiber Switch Capable Interface (FSC)Will be able to switch the entire contents to another interface (without distinguishing lambdas, channels or packets), such as optical cross-connects (OXCs) .
![Page 20: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/20.jpg)
Enhancements to Signaling
• GMPLS require LSP start and end on similar device • For example, SONET TDM.
• Necessitates a separate control plane transport network.• GMPLS is extended to allow control plane to be physically
diverse from the associated data plan.
•Enhancements have been made to the label distribution protocol RSVP-TE to support GMPLS.
![Page 21: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/21.jpg)
Hierarchical LSP Setup
• Occurs when a new LSP is tunneled inside an existing higher-order LSP
• Serves as a link through other LSP• Nodes at border of regions are responsible for
forming higher-order LSP and aggregating lower-order LSPs.
![Page 22: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/22.jpg)
Hierarchical LSP Setup
Figure shows how hierarchical LSP setup is performed over different types of network types.
![Page 23: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/23.jpg)
Hierarchical LSP SetupR0 R1 S2 O3 P4 P5 P6 O7 S8 R9 R10
Timeline
Path 1Path 2
Path 3
Path 4
Resv 4
Resv 3
Resv 2
Resv 1
LSP4 completes
LSP3 completes
LSP2 completes
LSP1 completes
![Page 24: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/24.jpg)
GMPLS Protection and Restoration Techniques
Protection and restoration is addressed using two techniques Path Switching Line Switching
Fault management consist of Detection Localization Notification Mitigation (Done with protection and restoration)
![Page 25: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/25.jpg)
Protection Mechanisms
• Efficient use of protection requires• Distribution of relevant link properties
Protection bandwidth Protection capabilities
• Establish secondary paths through network• Signal switch from primary path to backup
![Page 26: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/26.jpg)
Path Switching
•Failure is addressed at path endpoints.
•Path protection Protection path is pre-allocated. Resources for protection path is reserved,
specifically to handle traffic from path that is protected.
Path restoration Restoration of path needs to happen “on-the-fly”
or to be pre-computed and cached at endpoints. No resources are reserved in case of a failure.
![Page 27: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/27.jpg)
Line Switching
•Failure is addressed at transit node, where failure is detected.
•Span Protection Traffic is switched to an alternate parallel channel
or link connecting same two nodes.•Line Restoration Traffic is switched to an alternate route between
two failing nodes. Passing through additional intermediate nodes.
![Page 28: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/28.jpg)
Protection Mechanisms
•1+1 protection Data transmitted simultaneously over two
paths. Will receive on backup path, in case of errors
on working path.
M:N protection M pre-allocated backup paths shared between
N primary path.
![Page 29: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/29.jpg)
Protection Mechanisms
Note: 1:N and 1:1 are just special cases of M:N
1:N protection 1 pre-allocated backup path shared
between N primary paths
1:1 protection 1 dedicated backup path is assigned for each
primary path
![Page 30: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/30.jpg)
1+1 span protection
Transmitted simultaneously over two disjoint channels
Receiver discards packets from protection path
On failure in working path will switch to protection path
Protection Path
Working PathA B
![Page 31: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/31.jpg)
1:1 span protection
• Transmitted only over primary channel
• Backup channel has been computed
1. Link Management Protocol will localize failure.
2. RSVP refresh message will indicate a path switchover.
3. Both nodes make switch to backup channel.
Backup path
Working PathA B
(1)
(2)
(3) (3)
![Page 32: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/32.jpg)
Restoration Mechanisms
• Designed to..• React to failures quickly• Use bandwidth efficiently
Slower than protection mechanisms• Dynamic resource establishment• Route calculation
![Page 33: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/33.jpg)
Restoration Mechanisms
•Path restoration• Optimization can be done to
speed up process.• Pre-computed paths and
cached at head and end nodes.
• May reuse nodes in original path. BOOM
![Page 34: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/34.jpg)
Restoration Mechanisms
•Line restoration• Beneficial for connections
that span multiple hops• May brake TE
requirements • Constraints must be
forwarded, for intermediate nodes to be able to do line restoration
BOOM
![Page 35: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/35.jpg)
TRAFFIC ENGINEERINGJonas Sæther Markussen
![Page 36: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/36.jpg)
Agenda• Multi-Protocol Label Switching• Generalized Multi-Protocol Label Switching• Traffic Engineering– Limitations of legacy IP networks– Traffic engineering in general– Traffic engineering process– Overlay traffic engineering
• Traffic Engineering using MPLS
![Page 37: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/37.jpg)
Limitations of legacy IP networks (1) • Routing– Conventional shortest path routing protocols
• Packet-switching• Usually link-state (OSPF or IS-IS) or distance-vector• Simple and distributed• Link layer dependant
– May even be so crude as 1:1 mapping of physical links!
– Routing based on simple hop-to-hop metrics• Mainly calculated from bandwidth
• “Best effort” environment– Initially, this was why it was so successful– Not reliable with today’s QoS and performance demands
![Page 38: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/38.jpg)
Limitations of legacy IP networks (2) • Poor resource allocation– Under/over-utilized paths due to shortest paths
algorithms using link state metrics (usually bandwidth) as the only link weight
– May result in congestion even when excess capacity exists in alternative paths!
• Virtually no traffic measurement methods– Absence of reliable data• Lack of ability to produce traffic matrix
![Page 39: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/39.jpg)
Traffic engineering in general (1)• Aims to improve the unreliable and limited
behavior of IP networks– Link-metric based shortest path route computation
• Distributed shortest path first algorithms, e.g. Dijkstra’s
– Resource availability and traffic characteristics are not taken into considerations when routing traffic
– Not feasible to estimate traffic matrices from router interface statistics due to distributed nature of IP
– When congestion occurs, hard to determine which source-destination pairs contributes
![Page 40: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/40.jpg)
Traffic engineering in general (2)• Goal is to address issues concerning:
• Traffic control• Resource control• Measurements
• Different types of traffic engineering methodologies and TE classifications
Dynamic vs. Static Online vs. Offline Predictive vs. Descriptive
Proactive vs. Reactive Time Dependent vs. State Dependent
Open Loop vs. Closed Loop
Tactical vs. Strategic Local info vs. Global info
Centralized vs. Distributed
From the article, Fig. 5
![Page 41: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/41.jpg)
Traffic engineering process• Traffic engineering is an continuous process
– Policy formulation• Guidelines for traffic management, traffic control and operation of the network
– Data acquisition• Empirical statistics are gathered through measurement
– Traffic patterns, link utilization, traffic trends, packet drop statistics– Mathematical models can be used where statistics are unavailable and/or in supplement
– Analysis and characterization• Based on the workload derived from the measurement phase
– Performance optimization• Continual and iterative process• Traffic control: Manage inflow to the network and mapping of traffic to network resources• Altering network topology: Adding links, increase or decrease link capacity, etc.• Controlling local packet treatment: Queuing, scheduling, dropping policy, etc.
Policy Formulation Data Acquisition Analysis & Char. Performance Opt.
Traffic engineering work cycle
From the article, Fig. 4, simplified
![Page 42: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/42.jpg)
Overlay traffic engineering (1)• Early works revealed that virtual connection-
based abstractions with originating connection control compensated for legacy IP routing issues in dense topologies
• ISPs introduced virtual circuit (VC) switching technologies, i.e. ATM and frame relay, into IP infrastructure
![Page 43: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/43.jpg)
Overlay traffic engineering (2)• VC introduced with an overlay configuration– Elements of the VC technology are placed at the core and are
surrounded by regular IP routers– VCs serve as point-to-point connections between routers,
which routing protocols establish adjacencies routers connected by a VC appears as neighbors in the IP routing layer
ATM switch
ATM switch
ATM switch
ATM switch
IP Router
IP Router
IP Router
ATM network
Physical links
Links as seen from IP perspective
![Page 44: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/44.jpg)
Overlay traffic engineering (3)• Many advantages of an overlay structure– Decoupling of control planes for the virtual-circuit-
based network and control plane of the IP network• Can use conventional IETF IP protocols (OSPF, BGP, etc)
– Virtual circuits can be rerouted to move traffic away from congested resources onto under-utilized alternatives
– Allows the service provider to derive estimates for a traffic matrix by monitoring traffic flow over virtual circuits
![Page 45: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/45.jpg)
Overlay traffic engineering (4)• Disadvantages with IP over ATM and IP over
frame relay– Added cost of building and managing two
independent networks with dissimilar technologies and different semantics
– The so-called O(N2) scaling problem• The number of VCs grows as a function of the square of
the number of routers in the network• …and so does the number of adjacencies between
routers
![Page 46: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/46.jpg)
TRAFFIC ENGINEERING USING MPLSJonas Sæther Markussen
![Page 47: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/47.jpg)
Agenda• Multi-Protocol Label Switching• Generalized Multi-Protocol Label Switching• Traffic Engineering• Traffic Engineering using MPLS– Comparison to the overlay model– Protocol extensions– LSP-tunnels– Traffic engineering using MPLS
![Page 48: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/48.jpg)
Comparison to the overlay model• MPLS introduces constraint-based routing, which makes it very
useful for traffic engineering (TE)• Provides an overlay model in an integrated fashion on a single
network element• Advantages of MPLS for TE relative to the overlay model
– Fewer network elements– Lower operating costs– Greater reliability due to fewer network elements exist along the
routed path– Potentially less latency– Simplified network architectures
• MPLS also supports the overlay model, giving service providers the option to deploy overlay or integrated solutions
![Page 49: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/49.jpg)
Protocol extensions• Requirements to MPLS in IETF RFC-2702
– Effective means for MPLS to deploy and implement various TE policies• Resulted in extension of legacy IP routing protocols and signaling
protocols• BGP (version 4, RFC4271)
– ISIS-TE, OSPF-TE (RFC-3630)• Extended to advertise new types of capabilities and constraints associated with
links
– RSVP-TE (RFC-3209, RFC-5151)• Earlier CR-LDP was used, but was deprecated (Feb. 2003) and replaced by RSVP-TE• New objects added to RSVP to support establishment & teardown of LSPs w/
behavioral attributes• Can establish parameterized explicit LSPs and assign network resources to them
• The extensions make out the MPLS-TE control plane– Requirements expanded to encompass capabilities to support Diffserv-
aware traffic engineering
![Page 50: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/50.jpg)
LSP-tunnels• “Traffic trunks”
– Traffic belonging to the same class that are routed through a common path or multipath (LSP-tunnel)
– “LSP-tunnel” refer to both the “traffic trunk” and to the LSP it traverses• TE extensions to MPLS support assignment of attributes to LSP-
tunnels– Bandwidth characteristics, resource affinities, resilience attributes,
priority attributes, preemptive capabilities, with more• Simplified establishment of LSP-tunnels
– Establishment is done by configuring endpoints plus desired performance and behavioral attributes at an originating LSR
– The LSR will employ constraint-based path computation algorithm to compute a path through the network satisfying the LSP-tunnel specifications subject to various constraints that exists within the network
![Page 51: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/51.jpg)
Diffserv and MPLS (1)• Two important components of resource
allocation in IP networks– MPLS: Global resource allocation within a given
domain, constraint-based routing with bandwidth resource allocation
– Diffserv: Local resource allocation, “per hop behaviors” (PHB) buffer and link resources to packets based on the Diffserv code point (DSCP) in the packet headers
![Page 52: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/52.jpg)
Diffserv and MPLS (2)• MPLS has basic support for Diffserv– Diffserv behavior aggregates can be mapped onto
LSPs• Two types of LSPs support this capability, EXP-inferred-
LSPs (E-LSPs) and Label-inferred-LSPs (L-LSPs)
– MPLS support Diffserv aware traffic engineering• Derives from the fact that original MPLS-TE proposals
focused on the optimization of aggregated traffic trunks, not taking to consideration the issue of preferential treatment to different types of traffic in a Diffserv environment
![Page 53: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/53.jpg)
Traffic engineering using MPLS (1)• Considerations– Global/prevailing network constraints– LSR interface attributes
• Local packet treatment
– LSP parameters and LSP paths from originating LSRs• Strategic (predefined) vs. tactical (ad-hoc)
– LSP topology• Maintainability vs. loss of efficiency• Large vs. small number of LSP-tunnels
– Load balancing• Multiple parallel LSPs with common endpoints• Dynamic vs. static, open loop vs. closed loop etc
![Page 54: Internet Traffic Engineering](https://reader033.vdocument.in/reader033/viewer/2022061221/54be578d4a79599b358b4583/html5/thumbnails/54.jpg)
Traffic engineering using MPLS (2)• Network survivability– MPLS offers enhanced survivability capabilities
• Different types of protection, restoration and local repair schemes
– Backup LSP-tunnels and explicit LSP routes• Measurement considerations– Monitor
• Routes traversed by each LSP in the network• Bandwidth requirements of each LSP• Dynamics of LSPs in the network
– In Diffserv environments, it is desirable to measure the dealy along an LSP under different conditions