E N D
P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-leroux-mpls-p2mp-te-bypass-01.txtJ.L. Le Roux (France Telecom) R. Aggarwal (Juniper) J.P. Vasseur (Cisco Systems) M. Vigoureux (Alcatel-Lucent) IETF 68, MPLS WG, Prague
R1 R2 R5 R4 R3 Limitations of the P2P Bypass approachnode protection • Using P2P bypass tunnels for P2MP LSP node protection leads to traffic duplication on some links during failure Protected P2MP TE-LSP P2P Bypass tunnel Duplication
R1 R3 R2 Limitations of the P2P Bypass approach • Using P2P bypass tunnels for P2MP LSP link protection may also lead to traffic duplication on some links during failure Protected P2MP TE-LSP P2P Bypass tunnel Duplication
Solution Overview • To overcome these limitations this draft defines extensions to the FRR procedures to support P2MP Bypass tunnels • Retain scalability advantages of MPLS label stacking • Avoids sending multiple copies of a packet on some links during failure • During failure the traffic is tunneled within one or more P2MP bypass towards the set of Merge Points thanks to label stacking • Inner label = backup LSP Label, used on the MP to forward traffic to the protected LSP. • Outer label = P2MP Bypass tunnel Label • To avoid data replication on the PLR, a same inner label is assigned by the PLR to all MPs on a given P2MP bypass • following RSVP-TE Upstream Label Assignment procedure • draft-ietf-mpls-rsvp-upstream • P2MP bypass may be used in conjunction with P2P bypass: they are not exclusive
Path P2MP tunnel P sender R1 sub-lsp to R6 UA Label 50 IF-ID = tunnel B 30-> 21, R4 23, R5 45-> 28, R6 21 -> P2MP Tunnel B ILM 40 -> 45, R4 22, R5 R7 R3 R4 R6 R2 R1 R5 25 -> 40, R2 FRR: 50, 30, R3 45 40 37 28 22 25 IP IP IP IP IP IP Path P2MP tunnel P sender R1 sub-lsp to R7 UA Label 50 IF-ID = tunnel B 21 30 23 50 50 50 IP IP IP 22-> 37, R7 23 -> P2MP Tunnel B ILM Protection with P2MP Bypass Protected P2MP TE-LSP P2MP Bypass tunnel P2MP tunnel B P2MP tunnel P P2MP tunnel B ILM (label 21) 50 -> 28, R6 P2MP tunnel B ILM (label 23) 50 -> 37, R7
Changes since last version • Two new co-authors joined the draft • This new version accounts for comments received on the list • Support for link protection • Support for LAN interface protection • A P2MP bypass that tunnels traffic towards all downstream LSRs on the LAN • The P2MP Bypass selection procedure has been extended • Multiple Bypass LSPs • Bypass LSP whose leaves are a superset of MPs • Clarification regarding bypass tunnel setup (implementation issue) • Pre-established automatically or via configuration • Dynamically triggered upon primary P2MP LSP setup • Some rewordings for the sake of clarity
R1 R3 R2 Link Protection Protected P2MP TE-LSP P2MP Bypass tunnel • A P2MP bypass that tunnels traffic towards MPs downstream to the PLR • During failure all traffic is tunneled within the P2MP Bypass LSP • Some MPs are downstream to the PLR but not downstream to the failed element (not impacted by the failure) • The PLR must stop sending traffic to these MP within the protected P2MP LSP • Allows avoiding sending twice the traffic on a downstream link during failure
P2MP Bypass Tunnel selection 1/3 • Various options to protect a P2MP LSP • 1: A single P2MP Bypass LSP whose leaves exactly match the set of MPs • 2: Several P2MP bypass LSPs whose combined leaves cover all MPs • 3: A single P2MP Bypass LSP whose leaves are a superset of the set of MPs • Leaves that are not MP drop the traffic • These options differ in terms of data plane and control plane optimization • Option 1 increases the number of states but consumes less bandwidth than 2 and 3 • The choice depends on the desired state/bandwidth tradeoff, and the operational complexity • The choice may also be governed by the ability to find a path for such P2MP Bypass LSPs
P2MP Bypass Tunnel SelectionOption 1 Protected P2MP TE-LSP P2MP Bypass tunnel
P2MP Bypass Tunnel SelectionOption 2 Protected P2MP TE-LSP P2MP Bypass tunnel
R6 P2MP Bypass Tunnel SelectionOption 3 Protected P2MP TE-LSP P2MP Bypass tunnel drop
Next Steps • Procedures for LAN protection to be simplified • No need for backup signaling before the failure, as the primary LSP is signaled using upstream label assignment • Same label can be used for primary and backup LSPs • Backward compatibility: Need to address the case where some downstream LSRs do not support upstream label assignment • Combination of P2P and P2MP Bypass tunnels to protect a given LSP • WG feedback required on the following points • Support for partial protection • Only protect a subset of MPs when all MPs cannot be covered • Cases where the PLR is not directly upstream to the protected facility • Need for new attributes in the RSVP-TE Attribute Flags TLV (RFC4420)? • Protection with P2MP bypass tunnels desired • Partial protection allowed
Conclusion • This draft complements the base P2MP RSVP-TE spec • FRR with P2MP Bypass tunnels is a useful improvement • It allows avoiding potentially expensive data duplication along the backup path • Straightforward procedures that rely on upstream label assignment • WG feedback is required • Adopt as WG doc?