Sunteți pe pagina 1din 51

IP Network MPLS TE and

TE Tunnel Availability
Introduction

www.huawei.com

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved.


Foreword
 On traditional IP networks, each node chooses the shortest path
as the route without considering bandwidth or other factors. As a
result, the shortest path often suffers congestion due to
concentrated traffic, whereas other alternative paths are not busy
at all.

 A scalable and simple solution is needed to implement traffic


engineering (TE) in a large-scale backbone network.

 As an overlay model, the Multi-Protocol Label Switching (MPLS)


protocol sets up a virtual topology over a physical topology, and
then maps traffic to this virtual topology. Therefore, MPLS TE that
integrates MPLS with TE emerges.
Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page2
Objectives
 Upon completion of this course, you will be able to:
 Describe working principles of MPLS TE.

 Describe MPLS TE tunnel protection technologies.

 Configure MPLS TE on IP networks.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page3
Contents
1. MPLS TE overview

2. Working Principles of MPLS TE

3. MPLSTE Tunnel Protection Technologies

4. MPLS TE Tunnel and Reliability Configuration

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page4
Contents
1. MPLS TE overview

2. Working Principles of MPLS TE

3. MPLSTE Tunnel Protection Technologies

4. MPLS TE Tunnel and Reliability Configuration

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page5
Contents
1. MPLS TE overview
1.1 What is the TE

1.2 Four Components of MPLS TE

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page6
TE(Traffic Engineering)
 NE (Network Engineering)
 Manipulating the network to suit traffic. Essentially, it is a
technology to plan, design and deploy a network by traffic
demand.

 TE (Traffic Engineering)
 Manipulating the traffic to suit network. Essentially, it is a
technology to control and distribute the traffic for the best
resources usage.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page7
Definition of TE
 TE is defined in the IEEE as follows:
 "Traffic Engineering is the process of controlling how traffic
flows through one's network so as to optimize resource
utilization and network performance." (Global Crossing, IEEE)

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page8
IP TE
 According to IP forwarding, the IP network processes traffic based
on the Short Path First (SPF) algorithm of the interior gateway
protocol (IGP). All traffic is forwarded along the path with the
minimum cost, and link bandwidth is not considered in traffic
forwarding.

 IP TE implementation:
 Selecting a traffic forwarding path based on a destination address:
The IP TE controls the forwarding path based on the destination
address, not the traffic source.

 Controlling traffic based on link costs: IP TE changes the cost of a


specific link to control traffic by means of IGP.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page9
Example
 All traffic from R1 and R2 to R8 will select the path R3-R4-
R5 based on the IGP route selection principle.
R2
R4
R5
R3 R8
10
10

R1 10
10
10

R6 R7

Path for R2-R3-R4-R5-R8 traffic

Path for R1-R3-R4-R5-R8 traffic

Under-utilized alternate path

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page10
IP TE Disadvantage
 After changing the path Metric, the traffic from R1 and R2 to
R8 will select the path R3-R6-R7-R5.
R2
R4
R5
R3 R8
10
10

R1 10
10
10

R6 R7

Path for R2-R3-R4-R5-R8 traffic

Path for R1-R3-R4-R5-R8 traffic

Under-utilized alternate path

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page11
ATM TE
 ATM TE implementation:
 The ATM TE is implemented by setting up PVCs from the
traffic source to the traffic destination.
 The ATM TE is connection-oriented TE. It implements proper
traffic adjustment and excellent QoS functions easily.
 Full-mesh VCs need to be set up between nodes in the ATM
TE.
 The ATM TE is end-to-end TE, which differs from the hop-by-
hop IP TE.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page12
Example
L3 L3
L3 L3
L2 L2
L3 L2 L2 L3 L3 L3

L2 L2 L3 L3
L3 L3
Physical Logical

 Physical :The Layer 2 network (ATM/FR) implements ATM-based TE.

 Logical : All Layer 3 devices (routers) are connected in full mesh mode.
Each router connects to any other router through an independent VC.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page13
ATM TE Disadvantage
 ATM TE has the following disadvantages:
 If ATM-based TE needs to be implemented on a traditional IP
network, additional ATM or FR devices need to be added,
which increases the costs of carriers.

 The ATM-based TE requires more costs for more complex


network management.

 The full-mesh structure results in N² problems and poor


extensibility.

 The IP over ATM brings additional cell tax.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page14
MPLS TE(MPLS Traffic Engineering)
 MPLS TE (Multiprotocol Label Switching Traffic Engineering) is
the combination of the MPLS technology and the TE
technology.
R2
R4
R5
R3 10 R8
10

R1 10
10
10

R6 R7
Path for R2-R3-R4-R5-R8 traffic

Path for R1-R3-R6-R7-R5-R8 traffic

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page15
Contents
1. MPLS TE overview
1.1 What is the TE

1.2 Four Components of MPLS TE

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page16
Four Components of MPLS TE

IGP Routing Routing Selection


Selection Module
LSP Building LSP Building
Signaling
LSDB TEDB
Module

Information Information
Flooding Flooding
Information Distribution Module

Packet In Packet Out


Packet Forwarding Module

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page17
Contents
1. MPLS TE overview

2. Working Principles of MPLS TE

3. MPLSTE Tunnel Protection Technologies

4. MPLS TE Tunnel and Reliability Configuration

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page18
Contents
2. Working Principles of MPLS TE
2.1 Information Advertisement of MPLS TE

2.2 Information Advertisement Situation of MPLS TE

2.3 Information Advertisement Methods of MPLS TE

2.4 Path Calculation of MPLS TE

2.5 Setup of MPLS TE Paths

2.6 MPLS TE Tunnel Binding Policies

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page19
Information Advertisement of MPLS
TE
 The path selection depends on the cost in IGP. MPLS TE needs
to advertise information such as bandwidth to implement path
selection based on bandwidth or other information.

 MPLS TE needs to advertise the following information so that


network devices calculate paths more intelligently:
 Link status information (supported by IGP)

 TE metric

 Tunnel priority

 Bandwidth

 Administrative groups and affinity attributes

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page20
TE Metric
 MPLS TE calculates paths by using either of the following
metric schemes:
 IGP metric: metric of IGP (OSPF or IS-IS)

 TE metric: metric configured manually for the TE

 The IGP metric is used by default.

 If the TE metric is enabled, MPLS TE uses the TE metric


value configured manually and ignores the IGP metric value
during routing.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page21
Bandwidth
 The bandwidth information advertised by MPLS TE includes
the following:
 Maximum reservable bandwidth

 BC bandwidth of a link

 Current available bandwidth for each priority


 Eight tunnel priorities numbered from 0 to 7 are supported.

 Tunnels of different priorities can preempt bandwidth. The smaller


the value is, the higher the priority is.

 The current maximum available bandwidth for each priority at an


interface is listed.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page22
Tunnel Priority
 Priority of MPLS TE tunnels
 Eight priorities numbered from 0 to 7 are supported. The
smaller the value is, the higher the priority is.

 The tunnel priority is classified into two types:


 Setup priority

 Hold priority

 The setup priority is used for tunnel setup and the hold
priority is used for tunnel preemption.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page23
Contents
2. Working Principles of MPLS TE
2.1 Information Advertisement of MPLS TE

2.2 Information Advertisement Situation of MPLS TE

2.3 Information Advertisement Methods of MPLS TE

2.4 Path Calculation of MPLS TE

2.5 Setup of MPLS TE Paths

2.6 MPLS TE Tunnel Binding Policies

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page24
Information Advertisement Situation of MPLS TE

 When does flooding occur in MPLS TE?


 Periodical flooding (supported by IGP)

 A link takes effect or becomes ineffective (supported by IGP)

 The link configuration changes, for example, the metric of a link


is updated (supported by IGP)

 The link bandwidth changes greatly (supported by TE)

 An LSP fails to be set up (supported by TE)

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page25
Contents
2. Working Principles of MPLS TE
2.1 Information Advertisement of MPLS TE

2.2 Information Advertisement Situation of MPLS TE

2.3 Information Advertisement Methods of MPLS TE

2.4 Path Calculation of MPLS TE

2.5 Setup of MPLS TE Paths

2.6 MPLS TE Tunnel Binding Policies

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page26
Information Advertisement Methods of MPLS TE

 Information advertisement of MPLS TE relies on the


extension of existing IGP protocols for implementation,
including the following:
 OSPF-TE

 ISIS-TE

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page27
OSPF-TE
 OSPF advertises only normal IGP information. Information
such as bandwidth and priority needs to be advertised in
MPLS TE.

 The original OSPF protocol is extended to support


information advertisement of MPLS TE. The extended
OSPF is called OSPF-TE. Type 10 LSA, also called opaque
LSA in RFC2370 is added in OSPF-TE.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page28
ISIS-TE
 Similar to OSPF, IS-IS advertises only normal IGP
information. Information such as bandwidth and priority
needs to be advertised in MPLS TE.

 The original IS-IS protocol is extended to support


information advertisement of MPLS TE. The extended IS-IS
is called ISIS-TE. The flooding information of ISIS-TE is
basically the same as that of OSPF-TE but their data coding
modes are different. ISIS-TE extends two TLVs:
 Type=135 wide metric TLV

 Type=22 IS reachability TLV

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page29
Contents
2. Working Principles of MPLS TE
2.1 Information Advertisement of MPLS TE

2.2 Information Advertisement Situation of MPLS TE

2.3 Information Advertisement Methods of MPLS TE

2.4 Path Calculation of MPLS TE

2.5 Setup of MPLS TE Paths

2.6 MPLS TE Tunnel Binding Policies

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page30
CSPF
 CSPF is an SPF algorithm with constraints and the
constraints are as follows:
 Cost (supported by IGP)

 Bandwidth

 Link attributes

 The CSPF-based path calculation process is designed not


for discovering the optimal paths to all destination routers
but for discovering the optimal paths to LSP tunnel
destinations.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page31
Explicit Path
 An explicit path is composed of a series of nodes. Two
adjacent nodes on an explicit path have the following
relationships:
 Strict next hop: Two nodes must be directly connected.

 Loose next hop: Routers can be connected between two nodes.

 You can run the Include or Exclude command to enable an


LSP tunnel to pass or bypass a node.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page32
Strict Explicit Path
 In a strict explicit path, the next hop is directly connected to the
previous hop. Strict explicit paths control paths that LSPs pass
accurately.

Egress
C E F
LSR
ERO
B strict;
C strict;
E strict;
D strict;
F strict;

A B D

Ingress Strict
LSR

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page33
Loose Explicit Path
 In a loose explicit path, a node that the path must pass can be specified
but routers can be connected between the node and the previous hop.

Egress
C E F
LSR
ERO

D loose;

A B D

Ingress Loose
LSR

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page34
Contents
2. Working Principles of MPLS TE
2.1 Information Advertisement of MPLS TE

2.2 Information Advertisement Situation of MPLS TE

2.3 Information Advertisement Methods of MPLS TE

2.4 Path Calculation of MPLS TE

2.5 Setup of MPLS TE Paths

2.6 MPLS TE Tunnel Binding Policies

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page35
Signaling Protocols of MPLS TE
 The signaling protocols adopted by MPLS TE are as follows:
 Resource Reservation Setup Protocol with Traffic-Engineering
Extensions (RSVP-TE)
 The protocol is mature and is applied on a large scale.

 The protocol is based on the soft state and is poor in extensibility.

 Constraint-based routing label distribution protocol (CR-LDP)


 The protocol is new and immature, and is not applied.

 The protocol is based on the hard state and is good in extensibility.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page36
RSVP-TE
 RSVP extension for LSP tunnels
 The RFC3209 RSVP-TE: Extensions to RSVP for LSP Tunnels details
RSVP extension for MPLS TE functions.

 Supports label allocation in downstream-on-demand (DoD) mode.

 Allocates network resources for explicit LSP tunnels.

 Adopts the Make Before Break mode when resources of the


established LSP tunnel are preempted.

 Records each node that an LSP tunnel traverses to prevent loops.

 Diagnoses LSP tunnels.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page37
RSVP-TE Signaling
 RSVP-TE involves the following messages:
 PATH: The PATH message is sent to request the downstream node to allocate
a label for the path

 RESV: The RESV message is used for resource reservation on each node.

 PathErr: If an error occurs when the RSVP node is processing the PATH
message, the RSVP node sends the PathErr message upstream.

 ResvErr: If an error occurs when the RSVP node is processing the RESV
message, the RSVP node sends the ResvErr message downstream

 PathTear: The ingress node sends the PathTear message downstream for
deleting the local state setup on each node.

 ResvTear: The egress node sends the ResvTear message upstream for
deleting the corresponding local resources.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page38
Path Setup Process of MPLS TE

R1 PATH R2 R3
PATH

RESV RESV

 The source sends a PATH message to the destination to


apply for resource reservation. The destination reserves
resources and returns an RESV message.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page39
Contents
2. Working Principles of MPLS TE
2.1 Information Advertisement of MPLS TE

2.2 Information Advertisement Situation of MPLS TE

2.3 Information Advertisement Methods of MPLS TE

2.4 Path Calculation of MPLS TE

2.5 Setup of MPLS TE Paths

2.6 MPLS TE Tunnel Binding Policies

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page40
MPLS TE Tunnel Binding Policies
 On an IP backhaul network, the traffic on VPNs must be
carried by MPLS TE tunnels. Therefore, the data uses a
VPN label as the inner label and an MPLS TE label as the
outer label during transmission.

 The procedure for binding an MPLS BGP VPN to a TE


tunnel is as follows:
 Create an MPLS TE tunnel.

 Create a tunnel policy.

 Bind the tunnel policy to the specified VRF.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page41
Contents
1. MPLS TE overview

2. Working Principles of MPLS TE

3. MPLSTE Tunnel Protection Technologies

4. MPLS TE Tunnel and Reliability Configuration

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page42
MPLS TE FRR
PLR
1 2

Master LSP

Backup LSP

 Basic principle of MPLS TE FRR: A pre-created LSP is used


to protect one or multiple LSPs. The ultimate objective of
MPLS TE FRR is to use a backup tunnel to bypass the
faulty link or node so that the master path is protected.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page43
MPLS TE Hot-Standby
 TE hot-standby (HSB) is a common tunnel backup technology
used on IP backhaul networks. TE HSB is used to pre-create the
master and backup LSPs on a tunnel interface to carry E2E
services.

Master Tunnel
ATN1 PE1

S0
NodeB1
S1
Backup LSP
RNC

NodeB2 ATN2 Backup Tunnel PE2

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page44
Application of MPLS TE Hot-Standby
 The MPLS TE tunnel is used to protect the outer TE tunnel. An MPLS TE
tunnel is set up between the CSG and the RSG to carry L3VPN. In
addition, Tunnel hot-standby is configured to protect the tunnel. MPLS TE
hot-standby can be used with BFD to speed up fault detection.
Master Tunnel

CSG1 ASG3 RSG5


1 2
BTS
.
BFD For TE Hot-
standby

Backup LSP BSC/RNC

NodeB CSG2 ASG4 RSG6

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page45
Contents
1. MPLS TE overview

2. Working Principles of MPLS TE

3. MPLSTE Tunnel Protection Technologies

4. MPLS TE Tunnel and Reliability Configuration

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page46
Topology
Access Aggregatio
Last Mile n MBB Core
CSG1 ASG3 RSG5

E0/3/1 G1/0/1 G1/0/0 G1/0/0


E0/3/0

G1/0/1.1
BTS

G1/0/2.2

G1/0/2.1
.

G1/0/1.1
G1/0/2.2

G1/0/2.1
BSC/R
E0/3/0

NC

E0/3/1 G1/0/1 G1/0/0 G1/0/0

NodeB CSG2 ASG4 RSG6

MPLS/MPLS TE/RSVP
Master LSP Hot-Standby Backup LSP TE Interface
LSP
Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page47
Task1:Configuring an MPLS TE
Tunnel
Step Task Description
Enable MPLS and specify
1 Configure MPLS. the label switching router
(LSR) ID and IS-IS TE level.
Configure the name, ID,
protocol type, signaling
2 Configure a TE tunnel. types, path constraints, and
protection properties of the
tunnel.
Configure a policy for
3 Configure a tunnel policy. binding services to the
tunnel.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page48
Task 2: Configuring TE HSB Tunnel Protection
Technologies

Step Task Description

Configure the protection Configure the backup mode


1
properties. and the switchback time.

Configure the setup Configure the protection path


2
properties. setup mode.

Configure the fast detection Enable fast fault detection to


3
technology. support fast tunnel switching.

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page49
Summary
1. MPLS TE overview

2. Working Principles of MPLS TE

3. MPLSTE Tunnel Protection Technologies

4. MPLS TE Tunnel and Realiability Configuration

Copyright © 2017 Huawei Technologies Co., Ltd. All rights reserved. Page50
Thank you
www.huawei.com

S-ar putea să vă placă și