P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-ietf-mpls-p2mp-te-bypass-01.txt
Download ReportTranscript P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-ietf-mpls-p2mp-te-bypass-01.txt
P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-ietf-mpls-p2mp-te-bypass-01.txt J.L. Le Roux (France Telecom) R. Aggarwal (Juniper) J.P. Vasseur (Cisco Systems) M. Vigoureux (Alcatel-Lucent) IETF 69, MPLS WG, Chicago Document Overview Limitations of P2P bypass tunnels to protect a P2MP LSP => Traffic duplication… To overcome these limitations this draft defines extensions to the FRR procedures to support P2MP Bypass tunnels Retain scalability advantages of MPLS label stacking Avoids sending multiple copies of a packet on some links during failure During failure the traffic is tunneled within one or more P2MP bypass towards the set of Merge Points thanks to label stacking Inner label = backup LSP Label, used on the MP to forward traffic to the protected LSP Outer label = P2MP Bypass tunnel Label To avoid data replication on the PLR, a same inner label is assigned by the PLR to all MPs on a given P2MP bypass following RSVP-TE Upstream Label Assignment procedure – draft-ietf-mpls-rsvp-upstream Changes since last version Draft adopted as WG document in May No PHP on the bypass tunnel to allow for context identification Bypass signaled with the No-PHP desired bit, as specified in draft-ali-mpls-rsvp-te-no-php-oob-mapping Reversion: Entirely rely on procedures defined in RFC4090 global and local revertive modes Clarifications on PLR location: local or remote Combination of P2P and P2MP Bypass tunnels for backward comp Bypass tunnel selection options clarified Link protection procedures clarified Procedures for Partial protection Some rewordings for the sake of clarity Combination of P2P and P2MP Bypass No Up Label capable P2P Bypass P2MP Bypass P2MP bypass and P2P bypass can be used in conjunction For MP on P2P bypass => follow procedures in 4875 For MP on P2MP Bypass => follow procedures in this doc No upstream label assignment for MP leaves of P2P bypass Allows for backward compatibility with MP that do not support upstream label assignment P2MP Bypass Tunnel selection options Various options to protect a P2MP LSP with P2MP bypass – 1: A single P2MP Bypass tunnel whose leaves exactly match the set of MPs – 2: A single P2MP Bypass tunnel whose leaves are a superset of the set of MPs –Leaves that are not MP drop the traffic – 3: Several P2MP bypass tunnels whose combined leaves cover all MPs These options differ in terms of bandwidth consumption and number of P2MP bypass to be maintained P2MP Hierarchy => Tension between control plane and data plane optimization The choice depends on the desired state/bandwidth tradeoff, and the operational complexity Link protection with P2P Bypass Default procedure (defined in RFC4875) May lead to traffic duplication on some links during failure When the bypass follows another downstream link on the P2MP LSP Protected P2MP TE-LSP P2P Bypass tunnel Duplication R1 R3 R2 Link Protection with P2MP Bypass No Duplication R3 Protected P2MP TE-LSP P2MP Bypass tunnel R1 R2 OPTIONAL procedure: A link MAY be protected by A P2MP bypass that tunnels traffic towards MPs downstream to the PLR Some MPs are downstream to the PLR but not downstream to the failed element (not impacted by the failure) The PLR must stop sending traffic to these MP within the protected P2MP LSP Allows avoiding sending twice the traffic on a downstream link P2MP Partial Protection Uncovered MP P2MP Primary Partial prot allowed P2MP Bypass In some cases the PLR may not be able to find a set of P2P and/or P2MP Bypass Tunnels that cover all merge points "P2MP Partial Protection": Only a subset of MP are covered upon failure, traffic will not be delivered to all leaf LSRs Default PLR behavior: Full protection if feasible else no protection The Ingress LSR may request for "P2MP Partial Protection", such that if a P2MP LSP cannot be fully protected it is partially protected Next Steps Need to align with the mpls-upstream draft => The PLR assigns upstream labels from a single label space WG feedback required A new revision to be submitted before Vancouver meeting figures, examples, clarifications Thanks Questions? Appendix Limitations of the P2P Bypass approach node protection Using P2P bypass tunnels for P2MP LSP node protection leads to traffic duplication on some links during failure Duplication Protected P2MP TE-LSP P2P Bypass tunnel R3 R 4 R 1 R 2 R5 Link protection with P2P Bypass Default procedure (defined in RFC4875) May lead to traffic duplication on some links during failure When the bypass follows another downstream link on the P2MP LSP Protected P2MP TE-LSP P2P Bypass tunnel Duplication R1 R3 R2 Protection with P2MP Bypass Protected P2MP TE-LSP P2MP Bypass tunnel Path P2MP tunnel P sender R1 sub-lsp to R6 UA Label 50 IF-ID = tunnel B 30-> 21, R4 23, R5 R 3 21 50 IP 28 50 IP 45 P2MP tunnel P 25 23 IP R 1 40 25 -> 40, R2 FRR: 50, 30, R3 R 6 R 4 P2MP tunnel B 30 IP IP 50 IP P2MP tunnel B ILM (label 21) 50 -> 28, R6 R 2 IP 40 -> 45, R4 22, R5 Path P2MP tunnel P sender R1 sub-lsp to R7 UA Label 50 IF-ID = tunnel B 45-> 28, R6 21 -> P2MP Tunnel B ILM 22 IP R 5 37 IP R 7 22-> 37, R7 23 -> P2MP Tunnel B ILM P2MP tunnel B ILM (label 23) 50 -> 37, R7 P2MP Bypass Tunnel Selection Option 1 Protected P2MP TE-LSP P2MP Bypass tunnel P2MP Bypass Tunnel Selection Option 2 drop R 6 Protected P2MP TE-LSP P2MP Bypass tunnel P2MP Bypass Tunnel Selection Option 3 Protected P2MP TE-LSP P2MP Bypass tunnel