the npp++ framework for protection routing in mpls
DESCRIPTION
The NPP++ Framework for Protection Routing in MPLS. Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences (LUMS) Pakistan. Outline. Background and Preview IP and MPLS Routing Protection Routing in MPLS Backup Bandwidth Sharing - PowerPoint PPT PresentationTRANSCRIPT
1
The NPP++ Framework forProtection Routing in MPLS
Zartash Afzal UzmiComputer Science and Engineering
Lahore University of Management Sciences (LUMS)Pakistan
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 2
Outline Background and Preview
IP and MPLS Routing Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths
NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling
Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 3
Outline Background and Preview
IP and MPLS Routing Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths
NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling
Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 4
IP versus MPLS Routing
IP Routing Destination-based Hop-by-hop
MPLS Routing: An MPLS path or “virtual circuit” from
source to destination (ingress to egress)
A label switched path (LSP) is pre-established
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 5
MPLS Flow Progress
LSR1
LSR2
LSR3
LSR5
LSR6
R1 R2LSR4D
Ddestination
D31
D17
D
D11
S
source
LSP
ingress
egress
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 6
Protection Routing with MPLS Bandwidth Guaranteed Primary Paths
Bandwidth Guaranteed Backup Paths BW remains provisioned in case of a failure
Minimal “Recovery Latency”
Need Preset backup paths with Local Protection
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 7
Types of Backup Paths
Primary PathBackup Path
All links and all nodes are protected!
A B C D E
PLRPLR: Point of Local Repair: Point of Local Repair
nnhop
nhop
LOCAL PROTECTION of one primary path from A to E
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 8
Opportunity cost of backup paths
Backup paths are setup in advance Upon failure, traffic is promptly switched onto preset
backup paths
Bandwidth must be reserved for all backup paths Reduced number of Primary LSPs (that can otherwise
be placed)
Can we reduce the amount of “backup bandwidth”? YES: Try to share the bandwidth along backup paths
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 9
BW Sharing in backup Paths
Example:
max(X, Y)
BW: Y
A B
C D
E F G
LSP1LSP1
LSP2LSP2
BW: XBW: X
Primary PathBackup Path
XX XXXX
YY YYX+Y
Sharing is possible
IF
Links (A,B) and (C,D) do not simultaneously fail!
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 10
Activation SetsA
B
C
D
E
Activation set for node B
Activation set for link (A,B)
A
B
C
D
E
Paths in the same activation set MUST not share bandwidth
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 11
Sharing with Primary Paths Can we do any sharing with primary paths?
Normally, the answer is NO because… Traffic is always flowing on the primary paths BUT…
Backup paths protecting a node N may share bandwidth with primary paths that originate or terminate at node N because… Such backup will be active when:
node N fails, and in that condition… No primary originates or terminates at node N
Sharing with (some) primary paths is possible
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 12
Outline Background and Preview
IP and MPLS Routing Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths
NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling
Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 13
Protection Routing Framework
Tasks of a protection routing framework: Path computation Path signaling and setup
Objectives of a protection routing framework1. Incur scalable routing overhead2. Find optimal primary paths3. Find optimal backup paths4. Maximize bandwidth sharing
NPP++ framework achieves all of above However, (2) and (3) are not achieved jointly
Primary and Backup
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 14
1.Scalable routing overhead
Aggregate Information Scenario (AIS) Fij: Bandwidth reserved on link (i, j) for all primary LSPs
Gij: Bandwidth reserved on link (i, j) for all backup LSPs
Rij: Bandwidth remaining on link (i, j)
NPP++ relies on AIS Low routing overhead
More Information propagated More potential for BW sharing
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 15
2.Optimal backup paths Who computes the backup paths? Node that computes backup paths maintains
two local maps: BFTLIM
How much backup bandwidth will fall on a given link (u,v) if this element fails
PFTLIM How much primary bandwidth will be available on
a given link (u,v) if this element fails FTLIMs keep historical information about
bandwidth reserved for protecting an element Leads to the computation of backup paths that
are optimal
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 16
Path Computation in NPP++
R1
R2
R3
R4
R5
R2 Contains:R2 Contains:
a) BFTLIMa) BFTLIM
b) PFTLIMb) PFTLIM
Path computation is shifted to R2 because…Path computation is shifted to R2 because…
Only R2 has full knowledge of its own Activation setOnly R2 has full knowledge of its own Activation set
GOAL:GOAL:
Find a backup Find a backup path that path that protects R2protects R2
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 17
3.Maximum Bandwidth Sharing Optimal path is signaled with requirements
for FULL bandwidth All nodes (along the backup path) maintain
two local data structures: BLTFIM
How much backup bandwidth will fall on this link if a given element fails
PLTFIM How much primary bandwidth will be released on
this link if a given element fails LTFIMs help nodes reserve only what is
needed Leading to maximum sharing along backup paths
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 18
NPP++ Summary
Primary PathBackup Path
R1
R2
R3
R4
(2) Path computation is shifted to special (2) Path computation is shifted to special nodesnodes(3) Nodes in primary path maintain “local data (3) Nodes in primary path maintain “local data structures” called BFTLIM/PFTLIMstructures” called BFTLIM/PFTLIM
(4) Nodes in backup paths maintain “local data (4) Nodes in backup paths maintain “local data structures” called BLTFIM/PLTFIMstructures” called BLTFIM/PLTFIM
(1) Advertise aggregate link usage information (1) Advertise aggregate link usage information onlyonly
Results:Results:
•Path computation is Path computation is optimaloptimal
•Bandwidth sharing on backup paths is Bandwidth sharing on backup paths is maximummaximum..
•Advertisement overhead is minimumAdvertisement overhead is minimum
FTLIMsFTLIMs
LTFIMsLTFIMsFTLIMsFTLIMs
FTLIMsFTLIMs
LTFIMsLTFIMs
LTFIMsLTFIMs
Protecting R2
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 19
Outline Background and Preview
IP and MPLS Routing Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths
NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling
Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 20
Evaluation & Experimentation
Traffic generation Used existing traffic models
Rejected requests experiments Generate a set of LSP requests Measure the number of rejected requests Simulate on various topologies
Scalability of local state information How do the average number of entries in
locally stored maps grow with the number of requests
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 21
Simulation Parameters Simulations performed on two networks Network 1:
15-node heterogeneous topology Core links with capacity 480 units, other links 120
units Network 2:
20-node homogenous topology (metros in the U.S.) Each link with capacity 120 units
LSP requests arrive one-by-one Ingress/Egress pairs chosen randomly
Bandwidth demand for each request is uniformly distributed between 1 and 6
100 experiments with different traffic matrices
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 22
Comparative Results: Network 1
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 23
Comparative Results: Network 2
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 24
Local Storage: Network 1
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 25
Local Storage: Network 2
April 29, 2006Global Internet 2006
Computer Science and EngineeringLahore University of Management Sciences (LUMS) - Pakistan 26
Conclusions: NPP++ Optimal path computation
Maximum sharing along computed path With backup paths and with primary paths
Scalable routing overhead Practically feasible
15% – 40% improvement over existing protection schemes