IP Switching Tag Switching MPLS  All rights reserved. No part of

93 Slides1.20 MB

IP Switching Tag Switching MPLS All rights reserved. No part of this publication and file may be repr oduced, stored in a retrieval system, or transmitted in any form o r by any means, electronic, mechanical, photocopying, recording o r otherwise, without prior written permission of Professor Nen-Fu Huang (E-mail: [email protected]). 國立清華大學資訊系黃能富教授 1

Networking Trends More Bandwidth, - New Technology, The Internet! . Users need more Bandwidth Bridges - Routers - Switches The Internet & Intranetworking 國立清華大學資訊系黃能富教授 2

Network Waves Leading to IP Switching PC Networks Proliferate time Bridges Routers Internet Networking Trends ATM & Fast Ethernet 國立清華大學資訊系黃能富教授 3

Network Waves Leading to IP Switching Routers PC Networks Proliferate time Bridges Routers Internet Networking Trends ATM & Fast Ethernet 國立清華大學資訊系黃能富教授 4

Network Waves Leading to IP Switching ATM & Internet Routers PC Networks Proliferate time Bridges Routers Internet Networking Trends 國立清華大學資訊系黃能富教授 5

Network Waves Leading to IP Switching Switches & Intranet ATM & Internet Routers PC Networks Proliferate time Bridges Routers ATM & Internet Networking Trends Switches & Intranet 國立清華大學資訊系黃能富教授 6

Network Waves Leading to IP Switching IP Switching Switches & Fast Ethernet ATM & Internet Routers PC Networks Proliferate time Bridges Routers ATM & Internet Networking Trends Switches & Fast Ethernet IP Switching 國立清華大學資訊系黃能富教授 7

Trends - from the Net Mgr. Perspective More functionality Functionality Ethernet Switching Bridges Routers IP Switching Performance More performance at lower cost 國立清華大學資訊系黃能富教授 8

Introduction to IP Switching 國立清華大學資訊系黃能富教授 9

A Typical Routed Network Today End Stations ATM/Ethernet/Optical Switches Routers (typically) Switches or Routers 國立清華大學資訊系黃能富教授 10

Collapsed Backbone Router Network TodayBottlene End Stations Leased Line ck Router Network R R R R Ethernet Link Routers or Bridges 國立清華大學資訊系黃能富教授 11

IP Switches - An Alternative End Stations “IP Switches” R S R S R S ATM “link” R S Routers (or sometimes Bridges) IP Switches use same routing technology as routers ATM is a link level, point-to-point technology 國立清華大學資訊系黃能富教授 12

IP Switching Overlay on an ATM Network IP Switches End Stations R R R S R S R S R S R R R Routers or Bridges Edge Routers or Bridges R R IP Switches use same routing technology as routers Switch controllers communicate with edge routers as peers Sustained IP flows bypass the controller through low latency ATM switch hardware ATM links interconnect IP Switches 國立清華大學資訊系黃能富教授 13

IP Switch is a . Device that integrates . R S IP Routing Switching that provides . R S into a single platform simplest way to get the price/performance and quality of service of hardware switching very high-performance IP forwarding while keeping the flexibility of routin 國立清華大學資訊系黃能富教授 14

IP Switching Technology IP Switch Gateway IP Switch R IP Switch Controller ATM Links S Legacy LANs or WANs IP Router with IP Switching enhancements ATM Switch with IP Switching Code IP Switch Host Driver 國立清華大學資訊系黃能富教授 15

The IP Switching Solution Platform Independent Data Best-of-Breed Hardware Voice Internet Protocol Combine IP Software Video IP Software IP Switch IP Switch IP Switch IP Switch IP Switch Controller IP Switch Controller IP Switch Controller IP Switch Controller ATM Switch Frame Relay Switch Ethernet, TR, FDDI Switch Optical Switch 國立清華大學資訊系黃能富教授 16

IP Switch Connections Attach directly or use the IP Switch Gateway Internetworkin g Servers IP Driver IP Switch Gateway IP Switch s/w Router IP Driver 10/100/1000, Ethernet or ATM 10/100/1000, Ethernet or ATM IP Router Switch IFMP Added IP IP Switching Driver Direct Connection s IP IP Switching Driver IFMP Added 國立清華大學資訊系黃能富教授 17 17

IP Switching Protocols R S Upstream Node IFMP General Switch Management Protocol (GSMP) Simple protocol that provides call setup, teardown, and call status Supported on ATM Switch Supported on IP Switch Controller GSMP Downstream Node IFMP IP Flow Management Protocol (IFMP) Protocol between multiple IP Switches or hosts Protocol used to send flow redirection messages 國立清華大學資訊系黃能富教授 18

IP Switch Operation Initial Path IP packets are forwarded hop-by-hop using a default virtual channel (VC). ATM cells are reassembled into IP packets at each hop. The IP Switch Controller makes a flow classification decision according to the IP packets. IP Switch Controller Direct Host ATM Node Gateway Upstream Node Œ ATM Cells ATM Fabric IP Switch Downstream Node ATM Cells 國立清華大學資訊系黃能富教授 19

IP Switch Operation Controller Labels a Selected Flow IP Switch Controller sends an IFMP message to the upstream node to use a new VC for the selected flow. Ž Traffic for the selected flow begins to flow on the new VC — the upstream flow is labeled. IP Switch IP IP Switch Switch Controller Controller Upstream Node Ž ATM Cells ATM Fabric Downstream Node 國立清華大學資訊系黃能富教授 20

IP Switch Operation Downstream Node Also Labels Flow Downstream node also sends an IFMP request for a VC. sends traffic for that flow to the IP Switch new downstream node on the new VC —the downstream flow is labeled. IP Switch IP Switch Controller Upstream Node ATM Cells ATM Fabric Downstream Node ATM Cells 國立清華大學資訊系黃能富教授 21

IP Switch Operation IP Flows at ATM Link Speeds! ‘ Incoming labeled flow switched through to outgoing labeled flow .“Cut-through” operation completed for flow-oriented traffic. IP Switch IP Switch Controller Upstream Node ‘ ATM Cells ATM Fabric Downstream Node ‘ ATM Cells 國立清華大學資訊系黃能富教授 22

How Do Packets Traverse IP Switches ? Initial IP Packet R S R S IP After redirection, Flow subsequent packets flow directly through ATM switch! Redirect Control Protocol (IFMP) R S R S 國立清華大學資訊系黃能富教授 23

IP Switching review IP Router ATM Switch IP Software ATM Forum Software IP Software MAC Layer Transport ATM HW ATM HW A IP Switch IP Switching combines the proven functionalit y of IP with the hardware switching speed of ATM 國立清華大學資訊系黃能富教授 24 24

Flow-Oriented Traffic Flows consist of multiple, similar packets, for example, the same source/destination addresses, type of service, protocol Long-lived flows are ideal for cut-through switching Short-lived transactions are ideal for datagram forwarding Over 90% of bytes can be switched, less than 10% routed! Flow-Oriented Traffic File transfer (FTP) Telnet HTTP Web image downloads Multimedia audio/video Short-Lived Traffic Name look-ups (DNS) Network Time Protocol E-mail (SMTP) Post Office Protocol (POP) SNMP 國立清華大學資訊系黃能富教授 25

IP Switching Protocols IFMP ( IP Flow Management Protocol ) Two associated RFCs RFC 1953 specifies IFMP RFC 1954 provides transmission specifics GSMP (General Switch Management Pro tocol) Between the controller and the Switch Call Setup and tear down Add and delete leaves in point-to-multipoint connecti on manage switch ports configuration and statistics 國立清華大學資訊系黃能富教授 26

Tag Switching Outline Tag Switching Overview Tag Switching Components Tag Distribution Protocol 國立清華大學資訊系黃能富教授 27

Tag Switching Overview Tag Switching fuses the intelligence of routing wit h the performance of switching to scale existing n etworks to meet future growth demands. Tag Switching uses a form of label swapping acros s packet or cell-based networks. units of data (packet or cell) carry a short, fixed length label (ta g) that tells switching nodes how to process the data. A Tag Switching internetwork consists of the follo wing elements : Tag edge routers Tag switches Tag Distribution Protocol (TDP) 國立清華大學資訊系黃能富教授 28

Fusing Routing and Switching Cisco Introduces Tag Switching Combining Layer 3 routing—scalability and flexibility Layer 2 switching—high performance of ATM Leveraging Cisco’s existing core router and ATM switch platforms 國立清華大學資訊系黃能富教授 29

Tag Switching Cisco IOS Technology Enhancement to Cisco’s IOS Tag Switching Common thread for all Cisco routing and switching platforms Software-only upgrade to existing Cisco products Investment protection for existing Cisco customers Migration options for new customers 國立清華大學資訊系黃能富教授 30

Tag Switching Overview Tag Distribution Protocol (TDP) Tag Edge Routers (apply/strip Tag) Tag Switches (ATM Switch or Router) 國立清華大學資訊系黃能富教授 31

Tag Switching Inter network Elements Tag Edge Routers Tag edge routers are full-function Layer 3 routing devices located at the edge of a tag switching network They apply tags to incoming packets and remove tags from outgoing packets. They also apply value-added Layer 3 services, such as security, acco unting, and QoS classification. Tag Switches Tag switches are the core of the tag switching internetwork. They switch tagged packets or cells based on the tags. Tag switches may also support full layer 3 routing or layer 2 switchin g. Tag Distribution Protocol (TDP) TDP is used to distribute tag information between devices in a tag s witching internetwork. 國立清華大學資訊系黃能富教授 32

Tag Edge Routers Tag bindings Full-function Layer 3 routers Security Quality of Service Traffic management NetFlow switching Apply tags to packets based on Tag Information Base (TI B) Variety of link types Per destination prefix Specified paths for traffic engineering Per QOS class Per source/destination flow Packet-over-SONET, HSSI ATM Future FE/GB Ethernet Cisco IOS upgrade for existing Cisco routers 國立清華大學資訊系黃能富教授 33

Tag Switches Routers or ATM switche s Tags is placed in the VP I/VCI fields of cells ATM switches performi ng tag switching do not need to handle high cal l setup rates. Multiple routing protoc ols OSPF, Switching on Tags Simplified lookup on tag Tag label swap on forwarding IS-IS, EIGRP, BGP Multiprotocol support 國立清華大學資訊系黃能富教授 34

Tag Switching Operation 1a. Existing routing protocols (e.g. OSPF, IGRP ) establish reachability to destination ne tworks 1b. Tag Distribution Protocol (TDP) establishes tag to destination network mappings 2. Ingress tag edge router receives packet, performs Layer 3 value-added services, and “tag” packets 4. Tag edge router at egress removes tag and delivers packet 3. Tag switches switch tagged packets using tag info 國立清華大學資訊系黃能富教授 35

Tag Switching Operations Tag edge routers and tag switches use standard routing protocols (BGP, OSPF) to identify routes through the network. Edge routers and switches use table generated by the routing protocols to assign and distribute tag information via the TDP. Edge routers receives the TDP information and build a forwarding database which makes use of the tags. When an edge router receives a packet for forwarding across the tag network, it analyzes the network layer header, selects a route for the packet from its routing tables, applies a tag, and forwards the packet to the next hop tag switch. 國立清華大學資訊系黃能富教授 36

Tag Switching Operations The tag switch receives the tagged packet and switches the packet based solely on the tag, without re-analyzing the network layer header. The packet reaches the edge router at the egress point of the network, where the tag is stripped off and the packet delivered. 國立清華大學資訊系黃能富教授 37

Tag Switching Components Tag Switching consists of two components: forwarding and control. Forwarding Component The forwarding component uses the tag information (tags) carried by packets and the tag forwarding information maintained by a tag switch to perform packet forwarding. Control Component The control component is responsible for maintaining correct tag forwarding information among a group of interconnected tag switches. 國立清華大學資訊系黃能富教授 38

Forwarding Component Label swapping is the fundamental forwarding paradigm employed by tag switching. Tag switching requires a tag to be carried in each packet. The tag can be carried in a variety of ways: as a small “shim” tag header inserted between the layer 2 and the Network Layer headers. as part of the layer 2 header, if the layer 2 header provides adequate semantics (e.g., Frame Relay, or ATM). as part of the Network Layer header (e.g., using the Flow Label field in the IPv6 with appropriately modified semantics). 國立清華大學資訊系黃能富教授 39

Tags Layer 2 ATM Layer 2 Header GFC Tag VPI Layer 3 VCI PTI CLP HEC Tag IPv6 Ver Pri Flow Label * Tag 國立清華大學資訊系黃能富教授 40

Tag Information Base Tag Information Base (TIB) Each tag switch maintains a TIB to implement the label s wapping concept. Each entry in the TIB consists of an incoming tag, and on e or more sub-entries of the form: Outgoing Outgoing Tag Interface Outgoing Link Level Information (such as MAC address) For an incoming tag, a unicast entry would just have a si ngle sub-entry, while a multicast entry may have one or more sub-entries. 國立清華大學資訊系黃能富教授 41

Forwarding Algorithm When a packet with a tag is received by a tag switch, the switch uses the tag as an index in its TIB. If the switch finds an entry with the incoming tag equals to the tag carried in the packet, the switch replaces the tag in the packet with the outgoing tag, replaces the link level information (e.g. MAC address) in the packet with the outgoing link level information, and forwards the packet over the outgoing interface. If no entry is found, or the entry exists with empty outgoing tag , and the entry does not indicate local delivery to the switch, the switch may either (a) discard the packet, or (b) strip the tag information, and submit the packet for network layer processing. 國立清華大學資訊系黃能富教授 42

Tag Switching Example In Tag Address Prefix Out Out I’face Tag In Tag Address Prefix X 128.89 1 X 171.69 . . Out Out I’face Tag 4 4 128.89 0 9 1 5 5 171.69 1 7 . . . . . . 171.69 1 1 128.89.25.4 Data 4 0 128.89.25.4 128.89 Data 9 128.89.25.4 Data 128.89.25.4 Data 國立清華大學資訊系黃能富教授 43

Advantages of the Forwarding Algorithm Advantages of the forwarding algorithm: The forwarding decision is based on the exact matc h algorithm using a fixed length, fairly short tag as an index. This enables a simplified forwarding proce dure, relative to longest match forwarding tradition ally used at the network layer. The same forwarding algorithm applies to both unic ast and multicast. The forwarding procedure is decoupled from the co ntrol component of tag switching. New routing (cont rol) functions can readily be deployed without distu rbing the forwarding paradigm. 國立清華大學資訊系黃能富教授 44

Control Component Essential to tag switching is the notion of binding between a tag and Network Layer routing (routes). The control component is responsible for creating tag bindings, and distributing the tag binding information among tag switches. Creating a tag binding involves allocating a tag, and then binding a tag to a route. The distribution of tag binding information among tag switches could be accomplished via several options piggybacking on existing routing protocols using a separate Tag Distribution Protocol (TDP) 國立清華大學資訊系黃能富教授 45

Characteristics of the Control Component Creation of tag binding is driven primarily by con trol traffic rather by data traffic. minimizes the amount of control traffic needed to distribute ta g binding. independent and insensitive to the data traffic profile/pattern. tags are precomputed (prebound) before data traffic arrives. Supporting wide range of forwarding granularitie s: A tag A tag RSVP A tag could be associated to a group of routes. could also be bound to an individual flow (e.g., an flow) could be bound to a multicast tree. 國立清華大學資訊系黃能富教授 46

Control Component Modules Control component is organized as a collection of modules designed to support a particular routing function Destination-based routing, Hierarchy of routing knowledge, Multicast, Quality of service, Flexible routing (explicit routes) Destination-based routing A router makes a forwarding decision based on the destination address carried in a packet and the information stored in the Forwarding Information Base (FIB, or routing table). A router constructs its FIB by using the information it receives from routing protocols (e.g., OSPF, BGP). To support destination-based routing with tag switching, a tag switch, just like a router, participates in routing protocols, and constructs its FIB. 國立清華大學資訊系黃能富教授 47

Destination-based Routing There are three permitted methods for tag allocation and TIB management: (a) downstream tag allocation, (b) downstream tag allocation on demand, and (c) upstream tag allocation. In all cases, a switch allocates tags and binds them to address prefixes in its FIB. Downstream tag allocation The tag is generated and bound to a prefix by the switch at the downstream end of the link (with respect to the direction of data flow). For each route in its FIB the switch allocates a tag, creates an entry in its TIB with the incoming tag set to the allocated tag, and then advertises the binding to other adjacent tag switches. When a tag switch receives tag binding information for a route, and that information was originated by the next hop for that route, the switch places the tag into the outgoing tag of the TIB entry associated with the route. 國立清華大學資訊系黃能富教授 48

Downstream Tag Allocation 1. Establish the FIB via existing routing protocols (e.g. OSPF, IGRP ) In Tag Address Prefix Out Out I’face Tag In Tag Address Prefix X 128.89 1 X 171.69 . . Out Out I’face Tag 4 4 128.89 0 9 1 5 5 171.69 1 7 . . . . . . 1 Upstream 171.69 0 1 Downstream 2a. Downstream Switch determines the Tag for each prefix (route), 2b. Deliver the Tag information to upstream switches. 128.89 國立清華大學資訊系黃能富教授 49

Destination-based Routing Downstream tag allocation on demand On demand allocation means that tags will only be allocated and distributed by the downstream switch when it is requested to do so by the upstream switch. Most useful in ATM networks. For each entry in its FIB, the switch identifies the next hop for that route. It then issues a request (via TDP) to next hop for a tag binding. The rest operations are similar to downstream allocation. Upstream tag allocation Tags are allocated and bound at the upstream end of the link. For each route in its FIB whose next hop is reachable via one of its interfaces, the switch allocates a tag, creates an entry in its TIB with the outgoing tag set to the allocated tag, and then advertises to next hop (via TDP) the binding The next hop switch places the tag into the incoming tag of the TIB entry. 國立清華大學資訊系黃能富教授 50

Control Component Modules Hierarchy of routing knowledge Tag switching allows complete decoupling of interior and exte rior routing. Only border tag switches have to maintain exteri or routing information. Multicast We need to associate a tag with a multicast tree. Quality of service Packets are classified into classes with different QoS require ments. A tag corresponding to a traffic class is applied to the packet. Flexible routing (explicit routes) Explicit routes provide forwarding paths that are different fro m the paths determined by destination-based routing. Allow TDP to carry information about an explicit route. 國立清華大學資訊系黃能富教授 51

Tag Distribution Protocol TDP provides the means for tag switches to distribute, request, and release tag binding information for multiple network layer protocols. TDP is a two party protocol that requires a connection oriented transport layer with guaranteed sequential delivery. Currently TCP is used. The TDP specification defines its state transition table and message format. 國立清華大學資訊系黃能富教授 52

TDP Architectural Benefits Leverages existing routi ng protocols (OSPF, BGP, EIGRP, etc.) Prepopulates tags Topology-driven, not tra ffic-driven Bindings are distributed before traffic arrival Avoids connection setup overhead of flow-by-flow schemes Tag Distribution Protocol (TDP) 國立清華大學資訊系黃能富教授 53

Switched Router Backbones Without Tag Switching Layer 2 ATM core with routers ATM are transparent All routers are neighbors Signaling performance issues Scalability is limited With Tag Switching Tag switching core with tag routers Tag switches are routing peers All packets tagged Minimizes signaling overhead Increased scalability 國立清華大學資訊系黃能富教授 54

Router Backbones— Internet Software upgrade to Load balancing existing routers (e.g., 75x x) Enables new traffic manag ement capabilities Load balancing Enhanced QOS High performance links including Packet-over-SONET (POS) and ATM Extensible to multigigabit routing platforms 國立清華大學資訊系黃能富教授 55

Tag Switching and ATM Services Co-Existing on Same Platform! ATM services for real-time se rvices signaling Voice trunking Circuit Emulation (CES) IP IP PNNI/UNI ATM ATM FR Tag switching for data traffic Offloads signaling-intensive tra ffic Reduces call set-up dependenci es FR IP 國立清華大學資訊系黃能富教授 56

Tag Switching vs. Other Approaches IP Switching (Ipsilon) Tag Switching Connection Setup—Per Flow Tag Prepopulated Gateway Gateway Layer 3 gateway in data path Faster path after flow classified Latency may exceed flow duration Connection setup per flow source/destination Excessive signaling overhead Support IP only Not using ATM Forum standard Route processor out of data pa th All packets use fast path Tag are prepopulated Tag assigned per destination Leverages routing protocols Multiprotocol support Using ATM Forum國立清華大學資訊系黃能富教授 standard 57

IP Switching (Ipsilon) Op eration 6. Cut-through VCI fully established, fast switch forwarding starts 1. Common routing protocols (e.g. OSPF, IGRP) establish reachability to destination networks 2. Ingress router receives packet, and forwards on default VCI to IP switch controller for forwarding Gateway Gateway Gateway Gateway Gateway Gateway Gateway 3. IP switch controller classifies ‘long lived’ flows to individual hosts 4. IP switch controller uses IFMP protocol to impose new VCI on adjacent IP switches and routers Gateway 5. IP switch controllers propagate cut-through VCI across network 國立清華大學資訊系黃能富教授 58

Tag Switching Benefits Multi-protocol Provides load balancing Enhanced Improves support QOS scalability 國立清華大學資訊系黃能富教授 59

Tag Switching Advantages Scalability Destination tagging Topology-driven, not traffic-driven No flow VC management overhead High performance Utilizes ATM core for tag switching Simplified forwarding for future gigabit interfaces Evolution Existing and new products that leverage standard pr otocols Open, emerging IETF Multi-Protocal Label Swapping s tandard 國立清華大學資訊系黃能富教授 60

Advantages (Cont.) Flexibility Operates on routers and ATM switches Over cell and packet media Standard ATM services and tag-switche d packet traffic IP and other Layer 3 protocols Multiple Layer 3 routing protocols (BGP , OSPF, etc.) Traffic management on both routed Int ernets and multiservice ATM nets 國立清華大學資訊系黃能富教授 61

Multi-Protocol Label Switching (MPLS) Outline Prior Work MPLS Overview MPLS Framework MPLS Architecture Conclusion 國立清華大學資訊系黃能富教授 62

Prior Work Tag Switching (Cisco) Aggregate Route-Based IP Switching (A RIS, IBM) IP Navigator IFMP-IP Switching (Ipsilon) Cell Switching Router (CSR, Toshiba) 國立清華大學資訊系黃能富教授 63

Prior Work Tag switching is based on the control-driven ap proach. The set up of LSPs (Label Switched Pat hs) closely follows control messages such as ro uting updates and RSVP messages. Aggregate route-based IP switching (ARIS) is al so based on the control-driven approach. Very s imilar to tag switching. ARIS introduces the con cept of an “egress identifier” (FECs) to express the granularity of LSPs. IP Navigator is again a control-driven protocol. Use OSPF as the internal routing protocol used within a routing domain. Explicit routing is use d to setting up the VCs. 國立清華大學資訊系黃能富教授 64

Prior Work Ipsilon Flow Management Protocol (IFMP) is a traffic dri ven protocol. When the number of packets from a flow exceeds a predertermined threshold, the controller use s IFMP to set up an LSP for the particular flow. Cell switch router (CSR) proposal is similar to IP switchi ng. CSR is primarily designed as a device for interconn ecting ATM clouds. Within an LIS (logical IP subnet), AT M forum standards are used to connection hosts and s witched together. Multiple LISs are then interconnected with CSRs that ar e capable of running both IP forwarding and cell forwar ding. The setup of LSPs is data-driven for best effort tr affic and RSVP-driven for flows that require resource re servation. 國立清華大學資訊系黃能富教授 65

MPLS Overview The IETF MPLS working group (created in 1997) is to standardize a base technology that integrates the label swapping forwarding paradigm with network layer routing. RFC 3812 Current status: Framework document have been published which discuss technical issue and requirements for the MPLS. Architecture document have been published which contain a draft protocol architecture for MPLS. The proposed architecture is based on the MPLS framework document. Cisco is the major contributor to the MPLS working group. substitute “Label” for “Tag” in Tag Switching MPLS 國立清華大學資訊系黃能富教授 66

Core mechanisms of MPLS Semantics assigned to a stream label Labels are associated with specific streams of data. Forwarding Methods Forwarding is simplified by the use of the short fixed length labels to identify streams. Forwarding may require simple functions such as looking up a label in a table, swapping labels, and possibly decrementing and checking a TTL. In some case MPLS may direct uses of underlying layer 2 forwarding. Label Distribution Methods Allow nodes to determine which labels to use for specific streams. This may use some sort of control exchange, and/or be piggybacked on a routing protocol. 國立清華大學資訊系黃能富教授 67

Motivation for MPLS Benefits relative to use of a Router Core Simplified forwarding Efficient explicit routing Traffic reengineering QoS routing Complex mappings from IP packet to forwarding equivalence class (FE C) Partitioning of functionality Single forwarding paradigm with several level differentiation Benefits relative to use of an ATM or Frame Relay Core Scaling of the routing protocol Common operation over packet and cell media Easier Management Elimination of the ‘routing over Large Clouds’ issue 國立清華大學資訊系黃能富教授 68

Native IP Forwarding The term IP routing is often applied to both the packet forwarding and route determination process in an IP network. To avoid confusion, we use Native IP forwarding (NIF) to specifically refer to hop-by-hop, destination-based packet forwarding. IP routing for references to the topology and path discovery processes. Each packet’s next hop and output port are determined by a longest-prefix-match forwarding table lookup (Destination IP address). Additional packet classification may also be performed to derive output port queuing and scheduling rules. 國立清華大學資訊系黃能富教授 69

A Simplified NIF node forwarding engine Longest Prefix Match lookup Forwarding Forwarding Table Table Next hop port Packet Packet Classification Classification Input Ports IP Header Queuing and Scheduling rules Output Ports IP payload Packet Classification keys: IP source and destination addresses, IP protocol type, DiffServ (DS) or TOS byte, and TCP/UDP port numbers. 國立清華大學資訊系黃能富教授 70

Per-Hop classification, queuing, and scheduling Port 1 Port N Classify Queue S Port M 國立清華大學資訊系黃能富教授 71

A Simplified LSR forwarding engine Switching Switching Table Table Next hop port Queuing and Scheduling rules Output Ports Input Ports MPLS label MPLS payload 國立清華大學資訊系黃能富教授 72

Traffic Engineering Conventional IP routing attempts to find and follow the shortest path between a packet’s current location and its intended destination. This leads to “hot spots” and packet loss rates, latency, and jitter increase as the average load on a router rises. Solutions: (1) Faster routers, (2) Alternate routes. For example. Routing policy may also require traffic engineering. For example, the external link between R6 and A3 may have been funded solely by A2 and A3. Therefore, A1’s traffic must not be allowed to traverse it. 國立清華大學資訊系黃能富教授 73

Traffic Engineering -- Override the shortest path route IP Backbone Access 1 R1 R6 Access 3 R5 Access 2 R2 R3 R4 Route from A2 to D Desired route from A1 to D Actual route from A1 to D Destination D 國立清華大學資訊系黃能富教授 74

Signaling and Provisioning The term signaling is typically applied when network (re) configuration can be requested by users at any time and achieved within milliseconds or seconds. When the reaction time for (re)configuration becomes m easured in minutes or hours, it is often referred to as pr ovisioning. In either case, the (re)configuring action involves establi shing (or modifying) information used by routers or swit ches to control their forwarding actions, including forwa rding (routing) information, classification rules, and/or q ueuing and scheduling parameters. OSPF and BGP (Border Gateway Protocol) represent a for m of free-running signaling. RSVP for signaling additiona l QoS informtion along existing paths. 國立清華大學資訊系黃能富教授 75

MPLS Framework The framework document discusses the core MPLS com ponents, observations, issues, assumptions, and techni cal approach. Core MPLS components: the Basic routing approach, Labels, and Encapsulation Observations, Issues, and Assumptions Layer 2 versus Layer 3 forwarding, Scaling issues, Types of stre ams, and Data driven versus control driven label assignment. Technical approach Label distribution, Stream Merging, Loop handling, Interoperati on with NHRP, Operation in a hierarchy, Interoperation with “co nventional “ ATM, Multicast, Mutipath, Host interactions, Explic it Routing, Traceroute, LSP Control: Egress versus local, and se curity. 國立清華大學資訊系黃能富教授 76

Core MPLS Components The basic routing approach Routing is accomplished through the use of standard L3 routing protocols (e.g. OSPF and BGP). The information maintained by the L3 routing protocols is then used to distribute labels to neighboring nodes that are used in the forwarding of packets. Labels Label semantics, Label granularity, Label assignment, Label stack and forwarding operations. Label semantics The label is nothing more than a shorthand for an aggregate stream of user data. The meaning of the label is a strictly local issue between two neighboring nodes. 國立清華大學資訊系黃能富教授 77

Labels With this interpretation: (1) MPLS could be employed between any two neighboring nodes for forwarding of data between those nodes, even if no other nodes in the network participate in MPLS. (2) When MPLS is used between more than two nodes, then the operation between any two neighboring nodes could be interpreted as independent of the operation between any other pair of nodes. Label granularity The device which will be using the label to forward packets will be forwarding all packets with the same label in the same way. A Forwarding Equivalence Class (FEC) is a set of L3 packets which are all forwarded in the same manner by a particular Label Switching Router (LSR). 國立清華大學資訊系黃能富教授 78

Labels For unicast IP traffic, the granularity of a label allows vario us levels of aggregation in a Label Information Base (LIB). For IP multicast, the natural binding of a label would be to a multicast tree, or rather to the branch of a tree which ex tends from a particular port. Label assignment Label assignment involves allocating a label, and then bind ing a label to a route. Label assignment can be driven by control traffic or data tr affic. (discussed later.) Label withdrawal is primarily a matter of garbage collectio n, that is collecting up unused labels so that they may be r eassigned. 國立清華大學資訊系黃能富教授 79

Routing Aggregation R6 Access 1 4 1 R1 R5 Access 3 2 Access 2 R2 R3 3 5 R4 Destination D 國立清華大學資訊系黃能富教授 80

Forwarding Component Label Stack and Forwarding Operations The basic forwarding operation consists of looking up the incoming label to determine the outgoing la bel, encapsulation, port, and any additional informa tion which may pertain to the stream such as a part icular queue or other QoS related treatment. This o peration is referred as label swap. When a packet first enters an MPLS domain, the pac ket is associated with a label. It is referred as a lab el push. When a packet leaves an MPLS domain, the label is removed. It is referred as a label pop. The label stack is useful within hierarchical routing domain. 國立清華大學資訊系黃能富教授 81

Encapsulation Label-based forwarding makes use of various pieces of information, including a label or stack of labels, and possibly additional information such as a TTL field. These information can be carried in several forms. The term “MPLS encapsulation” is used to refer to whatever form is used to encapsulate the label information and information used for label based forwarding. An encapsulation scheme may make use of the following fields: label, TTL, class of service, stack indicator, next header type indicator, and checksum 國立清華大學資訊系黃能富教授 82

MPLS label stack encoding Stack bottom Stack top COS Label (20 bits) Label (20 bits) Label (20 bits) Exp (3 bits) Exp (3 bits) Exp (3 bits) S (1 bit) S (1 bit) S (1 bit) TTL (8 bits) TTL (8 bits) TTL (8 bits) . Original Packet MPLS frame delivered to link layer 國立清華大學資訊系黃能富教授 83

Label Assignment Topology driven (Tag) In response to normal processing of routing protocol control tra ffic Labels are pre-assigned; no label setup latency at forwarding tim e. Request driven (RSVP) In response to normal processing of request based control traffic May require a large number of labels to be assigned. Traffic driven (Ipsilon) The arrival of data at an LSR triggers label assignment and distri bution. Label setup latency; potential for packet reordering. 國立清華大學資訊系黃能富教授 84

Label Distribution Explicit Label Distribution Downstream label allocation » label allocation is done by the downstream LSR » most natural mechanism for unicast traffic Upstream label allocation » label allocation is done by the upstream LSR » may be used for optimality for some multicast traffic A unique label for an egress LSR within the MPLS domai n » Any stream to a particular MPLS egress node could u se the label of that node. 國立清華大學資訊系黃能富教授 85

Label Distribution Explicit Label Distribution Protocol (LDP) Reliability : by transport protocol (TCP) or as part of LDP. Separate routing computation and label distribution. Piggybacking on Other Control Messages Use existing routing/control protocol for distributing routing/control and label information. OSPF, BGP, RSVP, PIM Combine routing and label distribution. Label purge mechanisms By time out Exchange of MPLS control packets 國立清華大學資訊系黃能富教授 86

Label Distribution Protocol LDP Peer: Two LSRs that exchange label/stream mapping information via LDP LDP messages Discovery messages (via UDP) » announce and maintain the presence of LSR Session messages » maintain session between LDP peers Advertisement message » label operation (Label distribution) Notification message » advisory information and signal error information » Error notification: signal fatal errors » Advisory notification: status of the LDP session or some previous mess age received from the peer. 國立清華大學資訊系黃能富教授 87

Label Swapping Labeled Packet E x a m p le : F o rw a rd in g a L a b e le d P a c k e t Map the incoming label to a next hop label, determines where to forward the packet. Encodes the new label stack into the packet, and then forwards it. In c o m in g L a b e l M a p (IL M ) In p u t P o rt L a b e l 1 4 Unlabeled Packet analyzes the L3 header, to determine the packet’s stream. Map the stream to a next hop, determines where to forward the packet. Encodes the new label stack into the packet, and then forwards it. L a b e l S w itc h in g R o u te r (L S R ) LSR L 3 H eader L 2 H eader IP R o u te r M o d u le L abel D at H 3 O u tp u t P o rt L a b e l 2 6 4 H2 D at 1 H3 6 H2 2 國立清華大學資訊系黃能富教授 88

Use of MPLS in a Hierarchy S w ap L1 L4 O SPF R 2 R 1 O U T L2 L2 L1 P u sh L1 R 3 IN O U T IN O U T L2 L3 L3 L1 S w ap L3 L3 L1 L1 Pop IN O U T L1 L4 R 5 R 6 R 4 L1 BG P L2 L1 D o m a in 1 D o m a in 2 國立清華大學資訊系黃能富教授 89

Observations, Issues, and Assumptions Layer 2 versus layer 3 forwarding MPLS uses L2 forwarding as a way to provide simple and fast packet forwarding capability. A node forwarding at L3 must parse a (relatively) large header, and perform longest-prefix match to determine a forwarding path. However, L3 forwarding will be needed for a variety of reasons, including: » For scaling; to forward on a finer granularity than the labels can provide. » For security; to allow packet filtering at firewalls. » For forwarding at the initial router (when hosts don’t do MPLS). 國立清華大學資訊系黃能富教授 90

Observations, Issues, and Assumptions Scaling issues MPLS scalability is provided by two of the principles of routing. » Forwarding follows an inverted tree rooted at a destination » The number of destinations is reduced by routing aggregation. Types of streams Switched paths in the MPLS network can be of different types: » point-to-point, multipoint-to-point, point-to-multipoint, and multipoint-to-multipoint The factors that determine which type of switched path is used are » the capability of the switches employed in a network » the purpose of the creation of a switched path; that is , the types of flows to be carried in the switched path. 國立清華大學資訊系黃能富教授 91

Observations, Issues, and Assumptions Data driven versus control traffic driven label assignment Three strategies for label assignment: (1) driven by topology based control traffic (e.g., Tag, and ARIS) » labels are assigned in response to normal processing of routing protocol control traffic (2) driven by request based control traffic (RSVP) » labels are assigned in response to normal processing of request base control traffic (3) driven by data traffic (CSR, and Ipsilon) » the arrival of data at an LSR “triggers” label assignment and distribution. In actual practice combinations of these methods may be employed. 國立清華大學資訊系黃能富教授 92

Conclusion MPLS has emerged as a promising technolog y that will improve the scalability of hop-byhop routing and forwarding, and provide tra ffic engineering capabilities for better netwo rk provisioning. It decouples forwarding from routing and all ows multi-protocol support without requirin g changes to the basic forwarding paradigm. RFC 3812 Generalized MPLS (GMPLS) λMPLS (Optical wavelength-based) 國立清華大學資訊系黃能富教授 93

Back to top button