1 / 9

Zhenbin Li, Li Zhang, Yuanjiao Liu,Xudong Zhang Huawei Technologies

IGP Extensions for Automatic Computation of MPLS Traffic Engineering Path Using Traffic Engineering Layers and Areas draft-li-ccamp-auto-mbb-te-path-00. Zhenbin Li, Li Zhang, Yuanjiao Liu,Xudong Zhang Huawei Technologies IETF 88, Vancouver ,BC, Canada. ATN. ATN. ATN. ATN. ATN.

jadyn
Download Presentation

Zhenbin Li, Li Zhang, Yuanjiao Liu,Xudong Zhang Huawei Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IGP Extensions for Automatic Computation of MPLS Traffic Engineering Path Using Traffic Engineering Layers and Areas draft-li-ccamp-auto-mbb-te-path-00 Zhenbin Li, Li Zhang, Yuanjiao Liu,Xudong Zhang Huawei Technologies IETF 88, Vancouver,BC, Canada

  2. ATN ATN ATN ATN ATN Application of MPLS TE in MBB Last Mile Access Aggregation RNC/SGW/MME CSG CSG BSC RSG AGG STM-1 BTS E1 CSG STM-1 PE ATM P PE ATM RNC NodeB CSG GE Tunnel Eth. AGG RSG CSG NodeB / eNB IP RNC/S-GW/MME TDM/ATM Services E2E PWE3 2G TDM PW 3G ATM PW 3G ETH VRF LTE VRF S1 LTE VRF X2 2G TDM PW 3G ATM PW 3G ETH VRF LTE VRF S1 LTE VRF X2 E2E L3VPN Ethernet Service • MPLS TE is used in the network to carry L2VPN/L3VPN services, providing traffic engineering, OAM, etc. • As the network scale expands, more MPLS TE tunnels have to be deployed. • It is important to deploy MPLS TE tunnel easily.

  3. Problem Statement of MPLS TE Auto Path Computation CSG AGG Access Ring 1 RSG AGG CSG Aggregate Ring Access Ring 2 AGG RSG CSG AGG Access Ring3 CSG Access Ring4 CSG • Requirement 1: Completely disjointed primary and backup LSP • Requirement 2: Avoid passing through different access rings

  4. Existing Solutions and Challenge • Existing Solutions • Solution 1: To set reasonable link cost • Solution 2: To use explicit-path or affinity property(Color) • Challenge • It will be very complex and time-consuming to adjust the cost for a large scale network or change explicit path or affinity property for a great deal of MPLS TE tunnels.

  5. Architecture of MPLS TE Auto Path Computation: Concept of TA/TL TL3/TA0 RSG RSG TL3/TA0 Layer3 • Concept of TA/TL • TL (TE Layer): It indicates the physical layer of the node in the network. • TA (TE Area): It indicates the physical ring of the node. • TL and TA are defined for MPLS TE path • computation according to the natural • topology of the mobile network. • IGP Flooding TA/TL Info • TL and TA information are flooded and installed into TEDB. Aggregate Ring 1 TL2/TA0TA3 AGG TL2/TA0TA1TA2 AGG Layer2 AGG TL2/TA0TA1TA2TA3 Access Ring 3 Access Ring 2 TL1/TA3 CSG TL1/TA1 CSG Access Ring 1 Layer1 TL1/TA2 CSG TL1/TA1 CSG

  6. Architecture of MPLS TE Auto Path Computation: Enhanced CSPF Algorithm TL3/TA0 RSG RSG TL3/TA0 Layer3 • Rules for Enhanced CSPF Algorithm • Rule1: If the destination node of the LSP is not in the same TA as the source node or the passed node, the node in the different layer will be the potential next-hop. • Rule2: One LSP's TL track can not include TLh->TLl->TLh, this means that the LSP cannot pass through the low layer twice. • Rule3: If the LSP reach a node that in the same TA as the destination node, the LSP must be calculated in this TA only. • Rule 4: If the LSP reach a node that among more than one TAs, the node in different TA should be prior to be the next hop. • Rules for Determining Primary/Secondary LSP • Rule 5: The LSP which passes fewer TLs will be the primary LSP. • Rule 6: If the two LSPs passes the same TLs, the one with shorter metric in every layer from high to low will be the main LSP Aggregate Ring 1 TL2/TA0TA3 AGG TL2/TA0TA1TA2 AGG Layer2 AGG TL2/TA0TA1TA2TA3 Access Ring 3 Access Ring 2 TL1/TA3 CSG TL1/TA1 CSG Access Ring 1 Layer1 TL1/TA2 CSG TL1/TA1 CSG

  7. OSPF Extensions: TA TLV and TL TLV 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TE-Area number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TE-Area number N | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TE-Layer number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • Elements of Procedure • The OSPF TA and TL TLV is carried within the OSPF Routing Information LSA. • The TA TLV and TL TLV may be advertised within an Area-local or Routing-domain scope Router Information LSA, depending on the MPLS TE profile.

  8. ISIS Extensions: TA TLV and TL TLV 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TE-Area number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TE-Area number N | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TE-Layer number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • Elements of Procedure • The ISIS TA and TL TLV is carried within the IS-IS Router capability TL. • The TA TLV and TL TLV may be advertised within the IS-IS Router CAPABILITY TLV . • A router may generate multiple IS-IS Router CAPABILITY TLVs within an IS-IS LSP with different flooding scopes, with leak across levels and S bit set or not.

  9. Next Steps • Solicit comments and feedback • Revise the draft

More Related