P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-ietf-mpls-p2mp-te-bypass-01.txt
Download
Report
Transcript P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-ietf-mpls-p2mp-te-bypass-01.txt
P2MP MPLS-TE Fast Reroute
with P2MP Bypass Tunnels
draft-ietf-mpls-p2mp-te-bypass-01.txt
J.L. Le Roux (France Telecom)
R. Aggarwal (Juniper)
J.P. Vasseur (Cisco Systems)
M. Vigoureux (Alcatel-Lucent)
IETF 69, MPLS WG, Chicago
Document Overview
Limitations of P2P bypass tunnels to protect a P2MP LSP =>
Traffic duplication…
To overcome these limitations this draft defines extensions to the
FRR procedures to support P2MP Bypass tunnels
Retain scalability advantages of MPLS label stacking
Avoids sending multiple copies of a packet on some links during failure
During failure the traffic is tunneled within one or more P2MP
bypass towards the set of Merge Points thanks to label stacking
Inner label = backup LSP Label, used on the MP to forward traffic to the
protected LSP
Outer label = P2MP Bypass tunnel Label
To avoid data replication on the PLR, a same inner label is
assigned by the PLR to all MPs on a given P2MP bypass
following RSVP-TE Upstream Label Assignment procedure
– draft-ietf-mpls-rsvp-upstream
Changes since last version
Draft adopted as WG document in May
No PHP on the bypass tunnel to allow for context identification
Bypass signaled with the No-PHP desired bit, as specified in
draft-ali-mpls-rsvp-te-no-php-oob-mapping
Reversion: Entirely rely on procedures defined in RFC4090
global and local revertive modes
Clarifications on PLR location: local or remote
Combination of P2P and P2MP Bypass tunnels for backward comp
Bypass tunnel selection options clarified
Link protection procedures clarified
Procedures for Partial protection
Some rewordings for the sake of clarity
Combination of P2P and P2MP Bypass
No Up Label capable
P2P Bypass
P2MP Bypass
P2MP bypass and P2P bypass can be used in conjunction
For MP on P2P bypass => follow procedures in 4875
For MP on P2MP Bypass => follow procedures in this doc
No upstream label assignment for MP leaves of P2P bypass
Allows for backward compatibility with MP that do not support
upstream label assignment
P2MP Bypass Tunnel selection options
Various options to protect a P2MP LSP with P2MP bypass
– 1: A single P2MP Bypass tunnel whose leaves exactly match the set of MPs
– 2: A single P2MP Bypass tunnel whose leaves are a superset of the set of MPs
–Leaves that are not MP drop the traffic
– 3: Several P2MP bypass tunnels whose combined leaves cover all MPs
These options differ in terms of bandwidth consumption and number
of P2MP bypass to be maintained
P2MP Hierarchy => Tension between control plane and data plane
optimization
The choice depends on the desired state/bandwidth tradeoff, and the
operational complexity
Link protection with P2P Bypass
Default procedure (defined in RFC4875)
May lead to traffic duplication on some links during failure
When the bypass follows another downstream link on the P2MP LSP
Protected P2MP TE-LSP
P2P Bypass tunnel
Duplication
R1
R3
R2
Link Protection with P2MP Bypass
No Duplication
R3
Protected P2MP TE-LSP
P2MP Bypass tunnel
R1
R2
OPTIONAL procedure: A link MAY be protected by A P2MP bypass
that tunnels traffic towards MPs downstream to the PLR
Some MPs are downstream to the PLR but not downstream to the
failed element (not impacted by the failure)
The PLR must stop sending traffic to these MP within the protected P2MP LSP
Allows avoiding sending twice the traffic on a downstream link
P2MP Partial Protection
Uncovered MP
P2MP Primary
Partial prot allowed
P2MP Bypass
In some cases the PLR may not be able to find a set of P2P and/or P2MP
Bypass Tunnels that cover all merge points
"P2MP Partial Protection": Only a subset of MP are covered
upon failure, traffic will not be delivered to all leaf LSRs
Default PLR behavior: Full protection if feasible else no protection
The Ingress LSR may request for "P2MP Partial Protection", such that if a
P2MP LSP cannot be fully protected it is partially protected
Next Steps
Need to align with the mpls-upstream draft => The PLR assigns
upstream labels from a single label space
WG feedback required
A new revision to be submitted before Vancouver meeting
figures, examples, clarifications
Thanks
Questions?
Appendix
Limitations of the P2P Bypass approach
node protection
Using P2P bypass tunnels for P2MP LSP node protection leads to
traffic duplication on some links during failure
Duplication
Protected P2MP TE-LSP
P2P Bypass tunnel
R3
R
4
R
1
R
2
R5
Link protection with P2P Bypass
Default procedure (defined in RFC4875)
May lead to traffic duplication on some links during failure
When the bypass follows another downstream link on the P2MP LSP
Protected P2MP TE-LSP
P2P Bypass tunnel
Duplication
R1
R3
R2
Protection with P2MP Bypass
Protected P2MP TE-LSP
P2MP Bypass tunnel
Path P2MP tunnel P
sender R1
sub-lsp to R6
UA Label 50
IF-ID = tunnel B
30-> 21, R4
23, R5
R
3
21
50
IP
28
50
IP
45
P2MP tunnel P
25
23
IP
R
1
40
25 -> 40, R2
FRR: 50, 30, R3
R
6
R
4
P2MP tunnel B
30
IP
IP
50
IP
P2MP tunnel B ILM (label 21)
50 -> 28, R6
R
2
IP
40 -> 45, R4
22, R5
Path P2MP tunnel P
sender R1
sub-lsp to R7
UA Label 50
IF-ID = tunnel B
45-> 28, R6
21 -> P2MP Tunnel B ILM
22
IP
R
5
37
IP
R
7
22-> 37, R7
23 -> P2MP Tunnel B ILM
P2MP tunnel B ILM (label 23)
50 -> 37, R7
P2MP Bypass Tunnel Selection
Option 1
Protected P2MP TE-LSP
P2MP Bypass tunnel
P2MP Bypass Tunnel Selection
Option 2
drop
R
6
Protected P2MP TE-LSP
P2MP Bypass tunnel
P2MP Bypass Tunnel Selection
Option 3
Protected P2MP TE-LSP
P2MP Bypass tunnel