Engineering
Rodrigo Linhares
rlinhare@cisco.com
OC-3 OC-3
Router A Router E
DS3 Router G
OC-3
OC-3 DS3
DS3
Router C Router D
© 2001, Cisco Systems, Inc. All rights reserved. 10
What MPLS-TE Address
Router B
Router F
OC-3 OC-3
Router A Router E
DS3 Router G
OC-3
OC-3 DS3
DS3
Router C Router D
© 2001, Cisco Systems, Inc. All rights reserved. 11
How MPLS-TE Works
• IS-IS
Uses Type 22 TLVs
See draft-ietf-isis-traffic
• OSPF
Uses type 10 (opaque area—local) LSAs
See draft-katz-yeung-ospf-traffic
OC-3 OC-3
Router A Router E
DS3 Router G
OC-3
OC-3 DS3
DS3
Router C Router D
© 2001, Cisco Systems, Inc. All rights reserved. 18
Path Calculation
Router A Router E
Router G
Router C Router D
© 2001, Cisco Systems, Inc. All rights reserved. 22
How MPLS-TE Works
Router B
Router F
Router H
Router A Router E
Router G
Tunnel1 Router G
Tunnel1 Router G
Router G
20MB
Router G
20MB
Router B
Router F
Router H
Router A Router E
Router G
Router G
Tunnel1
Router G
20MB
Router B
Router F
Router H
Router A Router E
Router G
Tunnel1
Router G
Tunnel1
• Prerequisites
• How MPLS-TE Works
• Basic Configuration
• Knobs! Knobs! Knobs!
• Deploying and Designing
(globally)
ip cef {distributed}
mpls traffic-eng tunnels
(per interface)
mpls traffic-eng tunnels
• Total configuration:
1 line globally
1 line per interface
2 lines if OSPF
3 lines if IS-IS
+ 7 lines per tunnel at head-end
Not really much to the basic configuration
• Prerequisites
• How MPLS-TE Works
• Basic Configuration
• Knobs! Knobs! Knobs!
• Deploying and Designing
• Per-interface command
• X = amount of reservable BW, in K
• Default: X=75% of link bandwidth
• Per-tunnel command
• Tunnel default: 0 Kb
• Per-interface command
• X = 0–4,294,967,295
• Gives a metric that be considered for use instead
of the IGP metric
• This can be used as a per-tunnel
delay-sensitive metric for doing VoIP TE
• Per-interface command
• Per-tunnel command
• Periodically changes tunnel BW reservation
based on traffic out tunnel
• Timers are tunable to make auto-bandwidth more
or less sensitive
• Link protection
• Node protection
• Path protection
Router C
Router C
Router C
• On tunnel head-end:
tunnel mpls traffic-eng fast-reroute
• On protected link:
mpls traffic-eng backup-path <backup-tunnel>
© 2001, Cisco Systems, Inc. All rights reserved. 65
Node Protection
Path Protection
Thing Dependency Time
Media- and
Link Failure Detection ~Usecs (POS + APS)
Platform-specific
IGP Timers, Network
Information
Size, Collective ~5–30+ sec
Propagation
Router Load
Head-end Switch-over Network Size, ~Msec
to Protect LSP CPU Load
Router A
Router E
Router C
Router G
Router B Router D Router F
• Prerequisites
• How MPLS-TE Works
• Basic Configuration
• Knobs! Knobs! Knobs!
• Deploying and Designing
• Deployment methodologies
• Scalability
• Management
• Security
Router A
Router B Router C
• All links are OC12
• A has consistent 700MB to
send to C
• ~100MB constantly dropped!
Router D Router E
Router B Router C
• Tunnels with bandwidth in 3:1
(12:4) ratio
• 25% of traffic sent the long way
• 75% sent the short way
• No out-of-order packet issues—
CEF’s normal per-flow hashing
is used!
Router D Router E
Router B Router C
Router D Router E
Router B Router C
Router D Router E
Router B Router C
Router D Router E
• Deployment methodologies
• Scalability
• Management
• Security
http://www.cisco.com/univercd/cc/td/doc/p
roduct/software/ios120/120newft/120limit/1
20st/120st14/scalable.htm
• Or just search CCO for “Scalability
Enhancements for MPLS Traffic
Engineering”
• Deployment methodologies
• Scalability
• Management
• Security
• Interfaces MIB
• MPLS-TE-MIB
• CISCO-TE-MIB
• MPLS-DS-TE-MIB
• Deployment methodologies
• Scalability
• Management
• Security