One document matched: draft-yang-mpls-tp-ring-protection-analysis-00.txt
MPLS Working Group J. Yang
Internet-Draft H. Su
Intended status: Informational ZTE Corporation
Expires: April 30, 2009 October 27, 2008
Multiprotocol Label Switching Transport Profile Ring Protection Analysis
draft-yang-mpls-tp-ring-protection-analysis-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 30, 2009.
Abstract
The three potential solutions to the MPLS-TP ring protection were
addressed in the report of the IETF-ITU-T Joint Working Team(JWT).
Each solution has different attributes and advantages. This document
provides an analysis for MPLS-TP based on the ring protection.
Yang & Su Expires April 30, 2009 [Page 1]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions used in this document . . . . . . . . . . . . . . 3
3. Facility bypass . . . . . . . . . . . . . . . . . . . . . . . 4
4. Detours . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
5. ITU-T G.8132 . . . . . . . . . . . . . . . . . . . . . . . . . 5
6. Solutions analysis . . . . . . . . . . . . . . . . . . . . . . 6
6.1. Capability analysis . . . . . . . . . . . . . . . . . . . 6
6.2. Requirements analysis . . . . . . . . . . . . . . . . . . 8
7. Security Considerations . . . . . . . . . . . . . . . . . . . 9
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 9
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9
10.1. Normative References . . . . . . . . . . . . . . . . . . . 9
10.2. Informative References . . . . . . . . . . . . . . . . . . 9
10.3. URL References . . . . . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Intellectual Property and Copyright Statements . . . . . . . . . . 11
Yang & Su Expires April 30, 2009 [Page 2]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
1. Introduction
Network survivability reflects the ability of a network to continue
to function during failures and recovery. The three potential
solutions to the MPLS-TP ring protection were addressed in the report
of the IETF - ITU-T Joint Working Team (JWT). Each solution has
different attributes and advantages. This document provides an
analysis for MPLS-TP-based ring protection.
These three potential solutions are:
- Facility bypass: A single facility bypass LSP protects all LSPs
over a specific link by wrapping traffic.
- Detours: A detour LSP can be used for optimal traffic delivery to
the egress point (without wrapping).
- ITU-T G.8132: It defines a ring protection that includes
additional capabilities to the MPLS protection schemes, by
supporting coordinated protection in case of multiple failures
(using single protection mechanism for all cases).
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119.
The following terminologies were defined in [RFC4090].
LSR: Label-Switch Router.
LSP: An MPLS Label-Switched Path. In this document, an LSP will
always be explicitly routed.
PLR: Point of Local Repair. The head-end LSR of a backup tunnel or a
detour LSP.
One-to-One Backup: A local repair method in which a backup LSP is
separately created for each protected LSP at a PLR.
Protected LSP: An LSP is said to be protected at a given hop if it
has one or multiple associated backup tunnels originating at that
hop.
Detour LSP: The LSP that is used to re-route traffic around a failure
in one-to-one backup.
Yang & Su Expires April 30, 2009 [Page 3]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
Bypass Tunnel: An LSP that is used to protect a set of LSPs passing
over a common facility.
Backup Path: The LSP that is responsible for backing up one protected
LSP. A backup path refers to either a detour LSP or a backup tunnel.
MP: Merge Point. The LSR where one or more backup tunnels rejoin the
path of the protected LSP downstream of the potential failure. The
same LSR may be both an MP and a PLR simultaneously.
The following terminologies were defined in [ITU-T G.8132 draft].
APS channel: Automatic Protection Switch (APS) Channel is used to
carry information between the two ends of a linear protection group
to coordinate the head-end bridge with the tail-end selector for 1:n
protection, and to coordinate the selectors in both directions in the
case of bidirectional protection.
Bridge: The function that connects the normal and extra traffic
signals to the working and protection transport entities.
OAM: Operation, Administration and Maintenance.
SF: Signal Fail.
3. Facility bypass
The facility bypass is one of the backup methods defined in
[RFC4090]. It created a single LSP(bypass LSP tunnel) that serves to
back up a set of LSPs. The bypass tunnel must intersect the path of
the original LSP(s) somewhere downstream of the PLR.
The PLR built a bypass tunnel that protects against the failure of a
link or a node. When a failure occurs along a protected LSP, the PLR
redirects traffic into the appropriate bypass tunnel. If protected
link fails, the PLR will switch traffic received from upstream LSR on
the protected LSP onto the bypass tunnel. The label will be switched
for one which was assigned by MP to indicate the protected LSP, and
the bypass tunnel's label will then be pushed onto the label-stack of
the redirected packets. So there will be two levels of labels used
in the bypass tunnel. When MP receives the redirected packets, it
pops the label that it assigned for bypass tunnel and uses the label
that it assigned for protected LSP to forward the packet.
The Facility bypass technique provides that using the same bypass
tunnel protects many LSPs which traverse the same links or nodes.
Yang & Su Expires April 30, 2009 [Page 4]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
Link protection: The PLR and MP are connected through a direct link
and the primary LSP traverses this link.When the link fails, traffic
is switched to the backup LSP.
Node protection: The PLR and MP are connected through a device and
the primary LSP traverses this device. When the device fails,
traffic is switched to the backup LSP.
4. Detours
The detours one to one backup is the other method defined in
[RFC4090]. In the one-to-one backup method, a label-switched path is
established that intersects the original LSP somewhere downstream of
the point of link or node failure. A PLR computes a separate backup
LSP, called a detour LSP, for each LSP that the PLR protects.
When a failure occurs along the protected LSP, the PLR redirects
traffic onto the local detour, using the label received when PLR
created the detour. When MP receives traffic with the label provided
for PLR's detour, it will switch that traffic onto the original LSP,
using the label received from the node of MP's next hop. In the
detour mode, the depth of label stack will not increase.
It provides an optimized detour methord in [MPLS-TP JWT REPORT] to
protect an LSP that traverses N nodes only using one detour tunnel
without wrapping.
5. ITU-T G.8132
The T-MPLS Shared Protection Ring (TM-SPRing) protection switching
mechanisms are specified in [ITU-T G.8132 draft]. It provides the
protection connection as a ring topology to protect the working LSP.
Each section (span) in the ring is monitored by sending CV OAM with
periodicity of 3.3ms and Span failures are detected as absence of 3
consecutive CV frames. Each node has an APS controller that sends
and receives APS messages. These messages inform the states of the
ring.
When failure occurs, the nodes adjacent to the failure enter the
switching state and sends APS SF message to neighbor nodes. The
traffic is switching to the protection connection. When the other
nodes in the ring receive the SF message, they enter pass-through
state (i.e. allow forwarding on the protection LSP) and forward the
APS messages without modification.
The APS protocol and associated OAM functions shall accommodate the
Yang & Su Expires April 30, 2009 [Page 5]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
capability to upgrade the ring (node insertion /removal), limiting
the possible impact on existing traffic on the ring. The same
mechanism with a single protection connection restores all traffic
possible: p2p, p2mp connections, fiber or node failure, single or
multiple failures.
There are two solutions, the wrapping and the steering techniques in
TM-SPRing protection.
- The Wrapping technique: It implies that the node that detects a
failure sends a request through the APS protocol to the node
adjacent to the failure. When the node detects a failure or
receives a bridge request through APS protocol addressed to this
node, normal traffic transmitted towards the failed span is
switched to the opposite direction (away from the failure). This
traffic travels the long way around the ring to the other
switching node where it is switched back onto the working
direction. The switching nodes restore normal traffic flow when
the failure or APS protocol request is cleared.
- The Steering technique: It implies that the node that detects a
failure sends a request through the APS protocol to the node
adjacent to the failure and all nodes in the ring process this APS
information. In case of p2p connections, for each affected
connection the source node (that adds traffic to the ring) and the
sink node (that drops the traffic from the ring) perform switching
from working to the protection direction, and restore normal
traffic flow when the failure or APS protocol request is cleared.
6. Solutions analysis
As described in the sections above, the each solution has different
attributes and advantages. This section will provide an analysis for
MPLS-TP based ring protection.
6.1. Capability analysis
The table1 shows the capability analysis of the different solutions.
- Amounts of the backup LSP: The both Detour and G.8132 solutions
require the same amounts of the backup LSPs to the original LSPs.
However, the Bypass method can use the one backup LSP to protect
many original LSPs.
Yang & Su Expires April 30, 2009 [Page 6]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
- Bandwith utilization ratio: When protection occurs, the G.8132
steering method can bridge and switch directly at the nodes with
traffic ingress and egress. In the other sloutions including the
bypass, detour and G.8132 wrapping, the traffic in case of
protection travels the long way around the ring to the other
switching node where it is switched back onto the working
direction. So the G.8132 steering is the highest one of the
bandwidth utilization ratio.
- The complexity of configuration and APS: G.8132 needs the APS
protocol to implement the switch and the bridge.
- Packets disorder: There is a MP in the bypass and detour solution.
The merge operation may cause packets disorder.
+-----------------+----------+------------+------------+------------+
| Items | Bypass | Detour | G.8132 | G.8132 |
| | | | wrapping | steering |
+-----------------+----------+------------+------------+------------+
| Amounts of the | Less | As many as | As many as | As many as |
| backup LSP | | the | the | the |
| | | protected | protected | protected |
| | | LSP | LSP | LSP |
+-----------------+----------+------------+------------+------------+
| Bandwidth | The | The second | The third | The |
| utilization | third | one | one | highest |
| ratio | one | | | |
+-----------------+----------+------------+------------+------------+
| Bandwidth share | Support | Support | Support | Support |
+-----------------+----------+------------+------------+------------+
| Complexity | Simple | Simple | complex | The most |
| (configuration, | | | | complex |
| APS) | | | | |
+-----------------+----------+------------+------------+------------+
| Packets | Yes | Yes | No | No |
| disorder | | | | |
+-----------------+----------+------------+------------+------------+
| APS protocol | No need | No need | Need | Need |
+-----------------+----------+------------+------------+------------+
| Lable stack | Increase | Changeless | Changeless | Changeless |
| | one more | | | |
| | layer | | | |
+-----------------+----------+------------+------------+------------+
Table 1: solutions analysis
Yang & Su Expires April 30, 2009 [Page 7]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
6.2. Requirements analysis
The table2 shows the requirements analysis of the different
solutions. These requirements are based on the [MPLS-TP JWT REPORT]
and the [MPLS-TP Survivability Framework].
- Node failure: The all solutions support the node failure. But the
bypass method must establish as many as N bypass tunnels to
protect the N nodes in the protected LSP. And the other LSP
should be established in order to protect the link between the
protected node and its upstream node.
- Mutiple failures: One bypass tunnel can only protect single
failure of the protected LSP, a node or a link failure. It can't
provide the protection of multiple failures.
- External commands: External commands in the bypass and the detour
solution are not sufficient,should be extended to meet the
requirements.
- Bidirectional LSPs: The issue to force both ends pick same merge
point for each direction in detour methord is to be studied.
- Application to P2MP LSPs: P2MP LSP protection based on FRR is
covered in [RFC 4875], but if it could be used or not in ring
topology are to be studied.
- Operator's Qos objectives on protection path: In the bypass
solution, the many protected LSPs share one bypass tunnel. When
protection occurs, all the protected the traffic redirect onto the
bypass tunnel. EIR services from different protected LSPs can't
be distinguished. The Qos of these EIR services can't be
guaranteed.
+-----------------------+---------+---------+-----------+-----------+
| Items | Bypass | Detour | G.8132 | G.8132 |
| | | | wrapping | steering |
+-----------------------+---------+---------+-----------+-----------+
| Node failure | Support | Support | Support | Support |
+-----------------------+---------+---------+-----------+-----------+
| Multiple failures | Not | Support | Support | Support |
| | support | | | |
+-----------------------+---------+---------+-----------+-----------+
| External commands | Partial | Partial | Complete | Complete |
+-----------------------+---------+---------+-----------+-----------+
| Bidirectional LSPs | Support | TBD | Support | Support |
+-----------------------+---------+---------+-----------+-----------+
Yang & Su Expires April 30, 2009 [Page 8]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
+-----------------------+---------+---------+-----------+-----------+
| Application to P2MP | TBD | TBD | Support | TBD |
| LSPs | | | | |
+-----------------------+---------+---------+-----------+-----------+
| Protection ration of | Support | Support | Support | Support |
| 100% | | | | |
+-----------------------+---------+---------+-----------+-----------+
| Operator's QoS | Partial | Support | Support | Support |
| objectives on | | | | |
| protection path | | | | |
+-----------------------+---------+---------+-----------+-----------+
Table 2: solutions analysis
7. Security Considerations
TBD.
8. IANA Considerations
TBD.
9. Acknowledgments
TBD.
10. References
10.1. Normative References
[RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
May 2005.
10.2. Informative References
[ITUT-G.8132 Draft]
ITU-T, "Draft ITU-T Recommendation G.8132 (T-MPLS shared
protection ring)", November 2007.
[MPLS-TP JWT REPORT]
S.Bryant, L.Andersson, "JWT Report on MPLS Architectural
Considerations for a Transport Profile", July 2008.
Yang & Su Expires April 30, 2009 [Page 9]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
[MPLS-TP Survivability Framework]
N. Sprecher, A. Farrel, "Multiprotocol Label Switching
Transport Profile Survivability Framework", July 2008.
10.3. URL References
[MPLS-TP-22]
IETF - ITU-T Joint Working Team, "", 2008,
<http://www.example.com/dominator.html>.
Authors' Addresses
Jian Yang
ZTE Corporation
5F,R&D Building 3,ZTE Industrial Park,XiLi LiuXian Road
Nanshan District,Shenzhen 518055
P.R.China
Phone: +86 755 26773731
Email: yang_jian@zte.com.cn
Hui Su
ZTE Corporation
5F,R&D Building 3, ZTE Industrial Park, XiLi LiuXian Road
Nanshan District,Shenzhen 518055
P.R.China
Phone: +86 755 26773673
Email: su.hui@zte.com.cn
Yang & Su Expires April 30, 2009 [Page 10]
Internet-Draft MPLS-TP Ring Protection Analysis October 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Yang & Su Expires April 30, 2009 [Page 11]
| PAFTECH AB 2003-2026 | 2026-04-23 10:36:02 |