One document matched: draft-yang-mpls-tp-ring-protection-analysis-01.txt
Differences from draft-yang-mpls-tp-ring-protection-analysis-00.txt
MPLS Working Group J. Yang
Internet-Draft H. Su
Intended status: Informational ZTE Corporation
Expires: November 2, 2009 May 1, 2009
Multiprotocol Label Switching Transport Profile Ring Protection Analysis
draft-yang-mpls-tp-ring-protection-analysis-01
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on November 2, 2009.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Abstract
The three potential solutions to the MPLS-TP ring protection were
addressed in the report of the IETF-ITU-T Joint Working Team(JWT).
Each solution has different attributes and advantages. This document
Yang & Su Expires November 2, 2009 [Page 1]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
provides an analysis for MPLS-TP based on the ring protection.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions used in this document . . . . . . . . . . . . . . 3
3. Facility bypass . . . . . . . . . . . . . . . . . . . . . . . 4
4. Detours . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. ITU-T G.8132 . . . . . . . . . . . . . . . . . . . . . . . . . 5
6. Solutions analysis . . . . . . . . . . . . . . . . . . . . . . 6
6.1. Capability analysis . . . . . . . . . . . . . . . . . . . 6
6.2. Requirements analysis . . . . . . . . . . . . . . . . . . 7
6.3. Recovery mechanisms comparison for different traffic . . . 9
6.4. Ring and Linear Protection Switching Comparison . . . . . 9
7. Security Considerations . . . . . . . . . . . . . . . . . . . 10
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
10.1. Normative References . . . . . . . . . . . . . . . . . . . 10
10.2. Informative References . . . . . . . . . . . . . . . . . . 10
10.3. URL References . . . . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11
Yang & Su Expires November 2, 2009 [Page 2]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
1. Introduction
Network survivability reflects the ability of a network to continue
to function during failures and recovery. The three potential
solutions to the MPLS-TP ring protection were addressed in the
[RFC5317],the report of the IETF - ITU-T Joint Working Team (JWT).
Each solution has different attributes and advantages. This document
provides an analysis for MPLS-TP-based ring protection.
These three potential solutions are:
- Facility bypass: A single facility bypass LSP protects all LSPs
over a specific link by wrapping traffic.
- Detours: A detour LSP can be used for optimal traffic delivery to
the egress point (without wrapping).
- ITU-T G.8132: It defines a ring protection that includes
additional capabilities to the MPLS protection schemes, by
supporting coordinated protection in case of multiple failures
(using single protection mechanism for all cases).
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119.
The following terminologies were defined in [RFC4090].
LSR: Label-Switch Router.
LSP: An MPLS Label-Switched Path. In this document, an LSP will
always be explicitly routed.
PLR: Point of Local Repair. The head-end LSR of a backup tunnel or a
detour LSP.
One-to-One Backup: A local repair method in which a backup LSP is
separately created for each protected LSP at a PLR.
Protected LSP: An LSP is said to be protected at a given hop if it
has one or multiple associated backup tunnels originating at that
hop.
Detour LSP: The LSP that is used to re-route traffic around a failure
in one-to-one backup.
Yang & Su Expires November 2, 2009 [Page 3]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
Bypass Tunnel: An LSP that is used to protect a set of LSPs passing
over a common facility.
Backup Path: The LSP that is responsible for backing up one protected
LSP. A backup path refers to either a detour LSP or a backup tunnel.
MP: Merge Point. The LSR where one or more backup tunnels rejoin the
path of the protected LSP downstream of the potential failure. The
same LSR may be both an MP and a PLR simultaneously.
The following terminologies were defined in [ITU-T G.8114 draft].
OAM: Operation, Administration and Maintenance.
3. Facility bypass
The facility bypass is one of the backup methods defined in
[RFC4090]. It created a single LSP(bypass LSP tunnel) that serves to
back up a set of LSPs. The bypass tunnel must intersect the path of
the original LSP(s) somewhere downstream of the PLR.
The PLR built a bypass tunnel that protects against the failure of a
link or a node. When a failure occurs along a protected LSP, the PLR
redirects traffic into the appropriate bypass tunnel. If protected
link fails, the PLR will switch traffic received from upstream LSR on
the protected LSP onto the bypass tunnel. The label will be switched
for one which was assigned by MP to indicate the protected LSP, and
the bypass tunnel's label will then be pushed onto the label-stack of
the redirected packets. So there will be two levels of labels used
in the bypass tunnel. When MP receives the redirected packets, it
pops the label that it assigned for bypass tunnel and uses the label
that it assigned for protected LSP to forward the packet.
The Facility bypass technique provides that using the same bypass
tunnel protects many LSPs which traverse the same links or nodes.
Link protection: The PLR and MP are connected through a direct link
and the primary LSP traverses this link.When the link fails, traffic
is switched to the backup LSP.
Node protection: The PLR and MP are connected through a device and
the primary LSP traverses this device. When the device fails,
traffic is switched to the backup LSP.
4. Detours
The detours one to one backup is the other method defined in
Yang & Su Expires November 2, 2009 [Page 4]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
[RFC4090]. In the one-to-one backup method, a label-switched path is
established that intersects the original LSP somewhere downstream of
the point of link or node failure. A PLR computes a separate backup
LSP, called a detour LSP, for each LSP that the PLR protects.
When a failure occurs along the protected LSP, the PLR redirects
traffic onto the local detour, using the label received when PLR
created the detour. When MP receives traffic with the label provided
for PLR's detour, it will switch that traffic onto the original LSP,
using the label received from the node of MP's next hop. In the
detour mode, the depth of label stack will not increase.
It provides an optimized detour methord in [MPLS-TP JWT REPORT] to
protect an LSP that traverses N nodes only using one detour tunnel
without wrapping.
5. ITU-T G.8132
The T-MPLS Shared Protection Ring (TM-SPRing) protection switching
mechanisms are specified in [ITU-T G.8132 draft]. It provides the
protection connection as a ring topology to protect the working LSP.
Each section (span) in the ring is monitored by sending CV OAM with
periodicity of 3.3ms and Span failures are detected as absence of 3
consecutive CV frames. Each node has an APS controller that sends
and receives APS messages. These messages inform the states of the
ring.
When failure occurs, the nodes adjacent to the failure enter the
switching state and sends APS SF message to neighbor nodes. The
traffic is switching to the protection connection. When the other
nodes in the ring receive the SF message, they enter pass-through
state (i.e. allow forwarding on the protection LSP) and forward the
APS messages without modification.
The APS protocol and associated OAM functions shall accommodate the
capability to upgrade the ring (node insertion /removal), limiting
the possible impact on existing traffic on the ring. The same
mechanism with a single protection connection restores all traffic
possible: p2p, p2mp connections, fiber or node failure, single or
multiple failures.
There are two solutions, the wrapping and the steering techniques in
TM-SPRing protection.
Yang & Su Expires November 2, 2009 [Page 5]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
- The Wrapping technique: It implies that the node that detects a
failure sends a request through the APS protocol to the node
adjacent to the failure. When the node detects a failure or
receives a bridge request through APS protocol addressed to this
node, normal traffic transmitted towards the failed span is
switched to the opposite direction (away from the failure). This
traffic travels the long way around the ring to the other
switching node where it is switched back onto the working
direction. The switching nodes restore normal traffic flow when
the failure or APS protocol request is cleared.
- The Steering technique: It implies that the node that detects a
failure sends a request through the APS protocol to the node
adjacent to the failure and all nodes in the ring process this APS
information. In case of p2p connections, for each affected
connection the source node (that adds traffic to the ring) and the
sink node (that drops the traffic from the ring) perform switching
from working to the protection direction, and restore normal
traffic flow when the failure or APS protocol request is cleared.
6. Solutions analysis
As described in the sections above, the each solution has different
attributes and advantages. This section will provide an analysis for
MPLS-TP based ring protection.
6.1. Capability analysis
The table1 shows the capability analysis of the different solutions.
- Amounts of the backup LSP: The both Detour and G.8132 solutions
require the same amounts of the backup LSPs to the original LSPs.
However, the Bypass method can use the one backup LSP to protect
many original LSPs.
- Bandwith utilization ratio: When protection occurs, the G.8132
steering method can bridge and switch directly at the nodes with
traffic ingress and egress. In the other sloutions including the
bypass, detour and G.8132 wrapping, the traffic in case of
protection travels the long way around the ring to the other
switching node where it is switched back onto the working
direction. So the G.8132 steering is the highest one of the
bandwidth utilization ratio.
Yang & Su Expires November 2, 2009 [Page 6]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
- The complexity of configuration and APS: G.8132 needs the APS
protocol to implement the switch and the bridge.
- Packets disorder: There is a MP in the bypass and detour solution.
The merge operation may cause packets disorder.
+-----------------+----------+------------+------------+------------+
| Items | Bypass | Detour | G.8132 | G.8132 |
| | | | wrapping | steering |
+-----------------+----------+------------+------------+------------+
| Amounts of the | Less | As many as | As many as | As many as |
| backup LSP | | the | the | the |
| | | protected | protected | protected |
| | | LSP | LSP | LSP |
+-----------------+----------+------------+------------+------------+
| Bandwidth | The | The second | The third | The |
| utilization | third | one | one | highest |
| ratio | one | | | |
+-----------------+----------+------------+------------+------------+
| Bandwidth share | Support | Support | Support | Support |
+-----------------+----------+------------+------------+------------+
| Complexity | Simple | Simple | complex | The most |
| (configuration, | | | | complex |
| APS) | | | | |
+-----------------+----------+------------+------------+------------+
| Packets | Yes | Yes | No | No |
| disorder | | | | |
+-----------------+----------+------------+------------+------------+
| APS protocol | No need | No need | Need | Need |
+-----------------+----------+------------+------------+------------+
| Lable stack | Increase | Changeless | Changeless | Changeless |
| | one more | | | |
| | layer | | | |
+-----------------+----------+------------+------------+------------+
Table 1: solutions analysis
6.2. Requirements analysis
The table2 shows the requirements analysis of the different
solutions. These requirements are based on the [MPLS-TP JWT REPORT]
and the [MPLS-TP Survivability Framework].
- Node failure: The all solutions support the node failure. But the
bypass method must establish as many as N bypass tunnels to
protect the N nodes in the protected LSP. And the other LSP
should be established in order to protect the link between the
protected node and its upstream node.
Yang & Su Expires November 2, 2009 [Page 7]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
- Mutiple failures: One bypass tunnel can only protect single
failure of the protected LSP, a node or a link failure. It can't
provide the protection of multiple failures.
- External commands: External commands in the bypass and the detour
solution are not sufficient,should be extended to meet the
requirements.
- Bidirectional LSPs: The issue to force both ends pick same merge
point for each direction in detour methord is to be studied.
- Application to P2MP LSPs: P2MP LSP protection based on FRR is
covered in [RFC 4875], but if it could be used or not in ring
topology are to be studied.
- Operator's Qos objectives on protection path: In the bypass
solution, the many protected LSPs share one bypass tunnel. When
protection occurs, all the protected the traffic redirect onto the
bypass tunnel. EIR services from different protected LSPs can't
be distinguished. The Qos of these EIR services can't be
guaranteed.
+-----------------------+---------+---------+-----------+-----------+
| Items | Bypass | Detour | G.8132 | G.8132 |
| | | | wrapping | steering |
+-----------------------+---------+---------+-----------+-----------+
| Node failure | Support | Support | Support | Support |
+-----------------------+---------+---------+-----------+-----------+
| Multiple failures | Not | Support | Support | Support |
| | support | | | |
+-----------------------+---------+---------+-----------+-----------+
| External commands | Partial | Partial | Complete | Complete |
+-----------------------+---------+---------+-----------+-----------+
| Bidirectional LSPs | Support | TBD | Support | Support |
+-----------------------+---------+---------+-----------+-----------+
| Application to P2MP | TBD | TBD | Support | TBD |
| LSPs | | | | |
+-----------------------+---------+---------+-----------+-----------+
| Protection ration of | Support | Support | Support | Support |
| 100% | | | | |
+-----------------------+---------+---------+-----------+-----------+
| Operator's QoS | Partial | Support | Support | Support |
| objectives on | | | | |
| protection path | | | | |
+-----------------------+---------+---------+-----------+-----------+
Table 2: solutions analysis
Yang & Su Expires November 2, 2009 [Page 8]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
6.3. Recovery mechanisms comparison for different traffic
Three types of traffic may be in the Aggregation ring,hubbed point-
to-point traffic, side-to- side traffic and Point- to-multipoint
traffic.
- Hubbed point-to-point traffic: It can be presented as set of p2p
LSPs. And these set of LSPs can be protected by any mechanism
with similar BW utilization. For linear mechanism,it will consume
multiple APS instances and OAM sessions. For bypass mechanism, it
will also consume multiple bypass and does no support for user
commands and multiple failures. For G.8132 mechanism, it can use
single APS instance and support for user commands and multiple
failures.
- Side-to-side traffic: It can be presented as set of p2p LSPs. If
it is protected by linear mechanism, the very poor BW utilization
will get and multiple APS instances and OAM sessions will be used.
If it is protected by bypass mechanism,it needs to set up multiple
bypass and doesn't support for user commands and multiple
failures. If it is protected by G.8132 mechanism,single APS
instance will be used and working bandwidth can be re-used span-by
span and protection bandwidth sharing, support for user commands
and multiple failures.
- Point-to-multipoint traffic: It can be presented as set of p2p
LSPs(very poor BW utilization) or as single drop-and-continue
connection(very good BW utilization).These set of p2p LSPs can be
protected by linear mechanism,multiple APS instances and OAM
sessions will be consumed.If the single drop-and-continue
connection protected by bypass mechanism,multiple bypass will be
consumed,and doesn't support for user commands and multiple
failures.If the single drop-and-continue connection protected by
G.8132 mechanism, it only needs a single APS instance and supports
for user commands and multiple failures.
All types of traffic can coexist in a singe ring:hubbed, side-to-
side and point-to-multipoint. Having a single mechanism
protecting all types of traffic in all cases of failure with
maximum efficiency in terms of bandwidth usage and reduced
management complexity is an advantage.
6.4. Ring and Linear Protection Switching Comparison
Ring protection provides the following benefits when compared to
linear 1:1 protection (E2E protection).
Yang & Su Expires November 2, 2009 [Page 9]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
1. Scalability independent from the number of connections (LSPs) and
traffic patterns (hubbed or not hubbed) on the ring.
* Lower OPEX because a single APS state machine needs to be
configured and monitored.
* Lower CAPEX because only two instances of fast OAM processing
are required for fault detection.
* It does not require an additional layer (hierarchy via label
stacking).
2. Ring protection is most efficient solution for protecting p-t-mp
connections (LSPs). Up to now there are no solutions for p-t-mp
linear 1:1 protection meeting transport requirements (only 1+1 is
available).
3. Protection bandwidth sharing when traffic pattern is not hubbed.
7. Security Considerations
TBD.
8. IANA Considerations
TBD.
9. Acknowledgments
TBD.
10. References
10.1. Normative References
[RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
May 2005.
10.2. Informative References
[ITUT-G.8132 Draft]
ITU-T, "Draft ITU-T Recommendation G.8132 (T-MPLS shared
protection ring)", November 2007.
Yang & Su Expires November 2, 2009 [Page 10]
Internet-Draft MPLS-TP Ring Protection Analysis May 2009
[MPLS-TP Survivability Framework]
N. Sprecher, A. Farrel, "Multiprotocol Label Switching
Transport Profile Survivability Framework", April 2009.
10.3. URL References
[MPLS-TP-22]
IETF - ITU-T Joint Working Team, "", 2008,
<http://www.example.com/dominator.html>.
Authors' Addresses
Jian Yang
ZTE Corporation
5F,R&D Building 3,ZTE Industrial Park,XiLi LiuXian Road
Nanshan District,Shenzhen 518055
P.R.China
Phone: +86 755 26773731
Email: yang_jian@zte.com.cn
Hui Su
ZTE Corporation
5F,R&D Building 3, ZTE Industrial Park, XiLi LiuXian Road
Nanshan District,Shenzhen 518055
P.R.China
Phone: +86 755 26773673
Email: su.hui@zte.com.cn
Yang & Su Expires November 2, 2009 [Page 11]
| PAFTECH AB 2003-2026 | 2026-04-23 10:27:55 |