Professional Documents
Culture Documents
Fast Reroute
Fernando Garcia
fegarcia@cisco.com
TE - FRR Motivation
A lot of SP are moving Voice Traffic (wireless and
wireline) to IP Backbone
IP Backbone must provide, at least, the same level of
availability of PSTN
In general, sub-second for restoration after network failure
Presentation_ID
Cisco Confidential
Agenda
MPLS TE Overview
MPLS TE Fast Re-route
Presentation_ID
Cisco Confidential
MPLS TE Overview
Bandwidth Optimization
Protection - FRR
r1
IP/MPLS
r3
r4
r2
TE LSP
Presentation_ID
Cisco Confidential
Head end
IP/MPLS
ISIS-TE
OSPF-TE
Presentation_ID
Tail end
Cisco Confidential
IP/MPLS
Presentation_ID
Cisco Confidential
Path Calculation
Find
shortest
path to R8
with
8Mbps
IP/MPLS
R1
15
10
10
10
R8
Shortest-path-first algorithm
ignores links not meeting
constraints
Tunnel can be signaled once a
path is found
10
Cisco Confidential
TE LSP Signaling
Tunnel signaled with RSVP-TE
Head end
IP/MPLS
Presentation_ID
PATH
Tail end
Cisco Confidential
Presentation_ID
Cisco Confidential
R3
R8
R4
PATH
Message
20Mbps
10
30
R5
R2
70
50
R1
80
60
49
Pop
27
RESV
message
32
60
40
R6
100
80
R7
22
RSVP PATH: R1 R2 R6 R7 R4 R8
RSVP RESV: Returns labels and reserves
bandwidth on each link
Bandwidth available
Returned label via RESV message
Presentation_ID
Cisco Confidential
10
10
Traffic Selection
Multiple traffic selection options
Auto-route
Head end
Static routes
IP/MPLS
Presentation_ID
Cisco Confidential
11
Autoroute
Simplest manner to inject traffic into the tunnel
Tunnel TE is a logical interface
Used to include TE LSP(Logical Interface) in SPF
calculations
IGP adjacency is NOT run over the tunnel!
Tunnel is treated as a directly connected
link to the tail
Presentation_ID
Cisco Confidential
12
R3
R4
R5
R2
R1
R6
R7
Tunnel1: R1 R2 R3 R4 R5
Tunnel2: R1 R2 R6 R7 R4
Presentation_ID
Cisco Confidential
13
13
R3
R4
R5
R2
R1
R6
R7
Cisco Confidential
14
14
Forwarding Adjacency
Autoroute does not advertise the LSP (tunnel interface)
into the IGP - Routers behind Head End maybe doesnt
use TE
FA advertises the existence of TE tunnels (new logical
interfaces) into IGP
Can get suboptimal forwarding (NOT loops)
if youre not careful
Presentation_ID
Cisco Confidential
15
Forwarding Adjacency
R3
R4
R2
R5
R1
R9
R8
R6
IGP Cost = 40
R7
Tunnel: R2 R3 R7 R4 R5
R1 shortest path to R9 via IGP
Tunnel at R2 is never used as R1 cant see it
Presentation_ID
Cisco Confidential
16
16
R4
R2
FA IGP Cost = 10
R5
R1
R9
R8
R6
R7
IGP Cost = 30
Tunnel: R2 R3 R7 R4 R5
R1 now uses R2 as NH. Traffic From R1 to R9 is
now tunneled on R2
Presentation_ID
Cisco Confidential
17
17
R2
R5
Tunnel 1
R1
R9
Tunnel 2
R8
R6
R7
Tunnel1: R2 R3 R7 R4 R5
Tunnel2: R6 R7 R8
R1 shortest path to R9
Presentation_ID
Cisco Confidential
18
18
Cisco Confidential
19
40MB
Router E
Router G
20MB
gsr1#show ip route 192.168.1.8
Routing entry for 192.168.1.8/32
Known via "isis", distance 115, metric 83, type level-2
Redistributing via isis
Last update from 192.168.1.8 on Tunnel0, 00:00:21 ago
Routing Descriptor Blocks:
* 192.168.1.8, from 192.168.1.8, via Tunnel0
Route metric is 83, traffic share count is 2
192.168.1.8, from 192.168.1.8, via Tunnel1
Route metric is 83, traffic share count is 1
Presentation_ID
Cisco Confidential
20
40MB
Router E
Router G
20MB
gsr1#sh ip cef 192.168.1.8 internal
Presentation_ID
Cisco Confidential
21
100MB
10MB
1MB
Router E
Router G
Cisco Confidential
22
22
Router E
100MB
10MB
1MB
Router G
OK
Y
Y
Interface
Tunnel0
Tunnel1
Address
point2point
point2point
Packets
0
0
Tags imposed
{36}
{37}
Cisco Confidential
23
23
Path Maintenance
Path re-optimization
Process where some traffic trunks are rerouted to
new paths so as to improve the overall efficiency in bandwidth
utilization
For example, traffic may be moved to secondary path during
failure; when primary path is restored traffic
moved back
Path restoration
Comprised of two techniques; local protection
(link and node) and path protection
Discussed later
Presentation_ID
Cisco Confidential
24
Fast Reroute
25
R1
IP/MPLS
R8
R2
Backup TE LSP
Presentation_ID
Cisco Confidential
26
Presentation_ID
Cisco Confidential
27
Path protection
Protects individual tunnels
1:1 scalability
Presentation_ID
Cisco Confidential
28
IP/MPLS
25
PLR
R3
R1
MP
22
22
R2
R6
16
R7
22
R5
Primary TE LSP
Backup TE LSP
Presentation_ID
Cisco Confidential
29
Link Protection
When B D link fails, A E tunnel is encapsulated
in B D tunnel
Backup tunnel is used until A can re-compute tunnel path as
A B C D E (~5-15 seconds or so)
Router A
Router B
Original
Tunnel
Presentation_ID
Router D
Router E
Router C
Cisco Confidential
Fast ReRoute
Backup Tunnel
30
Normal TE Operation
Pop 14
R8
R2
Swap 37 with 14
R3
R3
R9
Push 37
R1
R5
R6
IP
Presentation_ID
R7
14
37
Cisco Confidential
31
R8
R2
R9
Swap 37 with 14
R3
Push 37
R1
Pop 22
Push 17
R6
R5
R7
Swap 17 with 22
IP
Presentation_ID
14 17
37
22
Cisco Confidential
32
Presentation_ID
Cisco Confidential
33
IP/MPLS
25
R3
36
36
R1
R2
16
R5
R4
22
R6
36
R5
Primary TE LSP
Backup TE LSP
Presentation_ID
Cisco Confidential
34
Node Protection
What if Router D failed?
Link protection would not help as the backup tunnel terminates on
Router D (which is the NHop of the
protected link)
Protected Link
Router A
Router B
Router D
Router E
NHop
Fast ReRoute
Backup Tunnel
Router C
Presentation_ID
Cisco Confidential
35
Node Protection
SOLUTION: NODE PROTECTION (If network topology allows)
Protect tunnel to the next hop PAST the protected link (NNhop)
Protected Node
Router A
Router B
Router D
Router E
NNHop
Router C
Presentation_ID
Cisco Confidential
Fast ReRoute
Backup Tunnel
36
Node Protection
Node protection still has the same convergence
properties as link protection
Deciding where to place your backup tunnels is a much
harder problem to solve on a large-scale
For small-scale protection, link may be better
Configuration is identical to link protection,
except where you terminate the backup tunnel (NNHop
vs. NHop)
Presentation_ID
Cisco Confidential
37
Presentation_ID
Cisco Confidential
38
R1
IP/MPLS
R8
R2
Doubles number of TE
LSPs (1:1 protection)
Primary TE LSP
Backup TE LSP
Presentation_ID
Cisco Confidential
39
Bandwidth Protection
Backup tunnel with
associated bandwidth
capacity
Backup tunnel may or may
not actually signal
bandwidth
PLR will decide best backup
to protect primary
(nhop/nnhop, class-type,
node-protection flag)
IP/MPLS
R3
R1
R2
R4
R5
R6
R5
Primary TE LSP
Backup TE LSP
Presentation_ID
Cisco Confidential
40
Conclusion
A lot of SP are replacing traditional voice transport network
for IP network
At least the same level of availability (5 nines) and
restoration time (sub-second) needs to be achieved
Other applications demands the same availability/restoration
or even worse
Video Broadcast/Video ondemand (integrated at 3Play)
Presentation_ID
Cisco Confidential
41
Obrigado !!!
42