Metanoia, Inc.
Critical Systems Thinking
based forwarding
Longest prefix matching
Routing Table
DA Host entry Host entry Host entry Host entry N/w entry N/w entry Default
Copyright 2002-2005 All Rights Reserved
Yes
Network Interface 2 3
No Yes
198.168.7.1 198.168.7.5 1 198.168.7.2 198.168.7.5 1 198.100.x.x 198.100.9.1 4 128.72.x.x x.x.x.x 128.72.55.4 5 128.84.73.1 6
No Yes
Metanoia, Inc.
Critical Systems Thinking
Longest prefix match gives next hop router as 198.100.9.1 and outgoing interface as 4.
DA Host entry Host entry Host entry Host entry N/w entry N/w entry
N/w Int. 2 3
198.168.7.1 198.168.7.5 1 198.100.9.75 198.168.7.2 198.168.7.5 1 198.100.9.75 198.100.x.x 198.100.9.1 4 198.100.9.75 128.72.x.x x.x.x.x 128.72.55.4 5 128.84.73.1 6
198.168.7.4
198.100.x.x 3 4 5 198.100.9.1
Default
1
198.168.7.2 198.168.7.6 6 128.84.x.x
198.100.9.7 5 128.72.x.x
128.84.73.1
128.72.55.4
How do routers build their routing tables? By exchanging information with each other using routing protocols
Copyright 2002-2005 All Rights Reserved
Metanoia, Inc.
Critical Systems Thinking
Attach label
198.168.7.3 198.168.7.1 198.168.7.5
Exact matching label swapping gives outgoing label as and outgoing interface as 4.
198.168.7.4
Incoming label
Outgoing label
1
198.168.7.2 198.168.7.6
128.84.x.x
128.84.73.1
128.72.55.4
How do routers learn the labels? By interpreting routing information and through signaling
Copyright 2002-2005 All Rights Reserved
Metanoia, Inc.
Critical Systems Thinking
Host entry Host entry Host entry N/w entry N/w entry
Next hop router 198.168.7.4 X 198.168.7.1 198.168.7.5 198.168.7.2 198.168.7.5 198.101.x.x 198.168.7.4 198.100.x.x 198.100.9.1 128.72.x.x x.x.x.x 128.72.55.4 128.84.73.1
N/w Int. 3 1 1 3 4 5 6
R3
R1
1 198.168.7.2 198.168.7.6 6 128.84.x.x 128.84.73.1
R2
R4
128.72.55.4
Shortest path converges traffic on a few network links Significant increase in congestion Unbalanced resource utilization
Copyright 2002-2005 All Rights Reserved
Metanoia, Inc.
Critical Systems Thinking
Outgoing label
R3
198.101.x.x
R1
1 198.168.7.2 198.168.7.6 6 128.84.x.x 128.84.73.1
3 4
R2
R4
128.72.55.4
Labels enable:
Differentiation based on criteria other than shortest path
Metanoia, Inc.
Critical Systems Thinking
DA
N/w Int. 1 2
Routing Table
128.89.10.x
In label
X X
Out label
In label
Out label
128.89.10.12
Label Table R3
3 4
128.89.10.x 179.69.x.x
1 1
3 4
5 7
128.89.10.x 179.69.x.x
1 2
1
R1
R2
179.69.42.3
7
Metanoia, Inc.
Critical Systems Thinking
In label
X
X
Out label
In label
Out label
Forward packet
3 4
128.89.10.x 179.69.x.x
1 1
3 4
5 7
128.89.10.x 179.69.x.x
1 2
128.89.10.x
128.89.10.12
R3
Swap Label
3 R1 3 Packet arrives DA=128.89.10.25 R3 Push Label
1
R2
198.168.7.6
179.69.x.x
R4
179.69.42.3
Copyright 2002-2005 All Rights Reserved
Metanoia, Inc.
Critical Systems Thinking
Algos. used to make forwarding decision on packet The algorithms define: Information from packet used to find an entry in the forwarding table
Exact procedures
For unicast routing Information = Network layer (IP) address Procedure = Longest prefix matching
Metanoia, Inc.
Critical Systems Thinking
Distribute routing info. via network layer routing (OSPF, BGP, etc.) Algos. to convert routing info. into forwarding table for fwding component
Create binding from FEC (derived from routing info.) --> label Assign and distribute labels to peer LSRs via signaling
Incoming Label
Forwarding algorithm = label swapping, independent of control component (implementable in optimized hardware or software)
10
Metanoia, Inc.
Critical Systems Thinking
11
Metanoia, Inc.
Critical Systems Thinking
Use data link addressing, e.g. ATM VPI/VCI, FR DLCI Put shim header between data link and IP header
Data Plane
Variable L2 header
EXP/
Label 20 bits
CoS
TTL 8 bits
3 bits 1 bit
Ride piggyback on routing protocols, where possible (BGP) Use separate label distribution protocol RSVP, LDP/CR-LDP
12
Metanoia, Inc.
Critical Systems Thinking
13
Metanoia, Inc.
Critical Systems Thinking
IP Header
IP Payload
For labeled packets, Layer 2 header indicates whether it is MPLS unicast packet or MPLS multicast packet The label stack: sequence of 4-octet label stack entries (no limit on stack depth) Network layer packet immediately follows the label stack entry that has the S bit set. Label values 0 -->16 are reserved
MPLS Seminar, MTNL CETTM, Mumbai, 26th April 2005
14
Metanoia, Inc.
Critical Systems Thinking
IP Header
IP Payload
Top stack of shim carries placeholder label value of 0. VPI/VCI value in header represent actual label value (no SNAP/LLC encapsulation used) Upstream LSR connected to first ATM-LSR adjusts TTL value based on how many ATM-LSRs are consecutively connected downstream (learnt via LDP) For ATM LSRs, UNI gives 24-bit VPI/VCI label, NNI gives 28-bit VPI/VCI label If two ATM-LSRs connected via VPC through ATM cloud, 16-bit VCI label used
Copyright 2002-2005 All Rights Reserved
15
Metanoia, Inc.
Critical Systems Thinking
Data
Ordered Independent
Whether LSR waits to hear from its upstream/downstream nbrs. before responding to a request for label(s)
16
Metanoia, Inc.
Critical Systems Thinking
Assignments
Edge LSR
Edge LSR
Requests 2
Assignments
2 3 4 3
Edge LSR
Copyright 2002-2005 All Rights Reserved
17
Metanoia, Inc.
Critical Systems Thinking
IP router LSR
OXC
ASICs
Software, ASICs
OSPF, IS-IS
Metanoia, Inc.
Critical Systems Thinking
Notification, Hello, Initialization, KeepAlive, Address, Address Withdraw, Label Mapping, Label Request, Label Withdraw, Label Release
Peer discovery msgs. over UDP, rest over TCP for reliability
19
Metanoia, Inc.
Critical Systems Thinking
Label Req. Label Mapping. Label Mapping. Edge LSR Label Mapping.
Each LSR forwards Label Req. along hop-by-hop routed path to 1.1.1.0/24
1.1.1.0/24.
When next hop to 1.1.1.0/24 changes in LSR2 (e.g. due to topology or link metric change) LSR2 releases original LSP Starts setting up new LSP from that point on
Several other options available
MPLS Seminar, MTNL CETTM, Mumbai, 26th April 2005
20
Metanoia, Inc.
Critical Systems Thinking
21
Metanoia, Inc.
Critical Systems Thinking
Network operator or network management creates ER-LSP request with path and traffic parameters
Label Req. <3.3.3.2> Label Mapping 1.1.1.2 Label Mapping Edge LSR Label Mapping 2.2.2.2
Traffic parameter TLV contains: 3.3.3.2 Frequency, weight Peak data rate, Peak burst rate Committed data rate, committed burst rate, excess burst size
Frequency specifies granularity at which CDR is made available Weight determines excess bandwidth possible above CDR
Copyright 2002-2005 All Rights Reserved
22
Metanoia, Inc.
Critical Systems Thinking
Network operator or network management creates ER-LSP request with path and traffic parameters
Label Mapping.
4.4.5.7
23
Metanoia, Inc.
Critical Systems Thinking
Hardware engine needs ability to examine both EXP bits and LABEL, and map it to any control hardware used for scheduling MPLS packets
Ability to push and/or pop labels determines whether switch can be
24
Metanoia, Inc.
Critical Systems Thinking
Advantages of MPLS
Original justification was fast, amortized, ATM hardware
Eliminated by hardware forwarding engines at multi-gigabit rates
Facilitates scalable hierarchical routing (via label stacking) Scalability by reducing number of IP peers/neighbors Provides explicit, manageable IP routes: enables policy routing and traffic engineering (can setup routes different than default shortest-path)
Copyright 2002-2005 All Rights Reserved
25
Metanoia, Inc.
Critical Systems Thinking
26
Metanoia, Inc.
Critical Systems Thinking
where only Border Routers need to know what networks might eventually be reached through them
All transit traffic can tunneled through interior routers
27
Metanoia, Inc.
Critical Systems Thinking
Pop
Interior LSRs
28
Metanoia, Inc.
Critical Systems Thinking
29
Metanoia, Inc.
Critical Systems Thinking
QoS-based Routing
Path of flows determined by
Knowledge of resource availability in network QoS requirements of flows
Policy-based Routing
Path/routing decision based
on administrative policy
30
Metanoia, Inc.
Critical Systems Thinking
CB Routing System
Inputs
Flow/path attributes:
Resources
properties of nodes/links
Network topology & state
Topology
Outputs
Computed feasible path Explicit route of the path
1 4 2
Copyright 2002-2005 All Rights Reserved
31
Metanoia, Inc.
Critical Systems Thinking
Network Diagram
A C D
OC-3 A C
DS3 D OC-12
OC-192
OC-12
32
Metanoia, Inc.
Critical Systems Thinking
Originates LSPs with IDs 1 and 2 Here they are treated as different LSPs within the same Session
Rcvr
LSP ID = L1
Tunnel ID
Ingress IP address
Tunnel ingress made to appear as 2 different senders to the RSVP session (via LSP ID)
Copyright 2002-2005 All Rights Reserved
LSP ID = L2
LSPs 1 and 2 have a common SESSION Obj, but a new LSP ID in the SENDER_TEMPLATE and a different ERO (with possibly common hops)
33
Metanoia, Inc.
Critical Systems Thinking
Saw how labels decouple data plane from control plane Examined basics of MPLS
Control and forwarding components
Label granularity (forwarding equivalence class, FEC) Benefits over conventional routing
rerouting
Copyright 2002-2005 All Rights Reserved
34