90 likes | 258 Views
84th IETF @ Vancouver. Fast Reroute for Receiver-Driven mRSVP -TE draft-zlj-mpls-mrsvp-te-frr-00.txt. Katherine Zhao (katherine.zhao @huawei.com ) Richard Li (renwei.li @huawei.com ) Christian Jacquenet ( christian.jacquenet@orange.com ). Why N eed FRR Extension for mRSVP-TE.
E N D
84th IETF @ Vancouver Fast Reroute for Receiver-Driven mRSVP-TEdraft-zlj-mpls-mrsvp-te-frr-00.txt Katherine Zhao (katherine.zhao@huawei.com) Richard Li (renwei.li@huawei.com) Christian Jacquenet (christian.jacquenet@orange.com)
WhyNeed FRR Extension for mRSVP-TE • The existing FRR mechanisms for sender-driven RSVP-TE is no longer applicable • FRR is well accepted and must have for HA FRR Relevant Terminologies • PLR: Point of Local Repair, a LSR that detects failure event and redirects traffic from protected LSP to backup mLSP. PLR does not initiate backup LSP setup with mRSVP-TE. • MP: Merge Point, a LSR that merges user traffic from a backup LSP to the primary LSP. MP initiates backup LSP setup considering PLR as the root of the backup LSR. • N: The node being protected, a LSR located between PLR and MP over the primary LSP. • FRR Domain: A set of links and LSRs crossover the protected sub-LSP(s) and backup LSP. The domain is between PLR and MP(s)
FRR Extension to mRSVP-TE Supports 1) Detour Protection Mode • Detour backup applies to One-to-One protection with local repair technology • A separate backup LSP is established for each protected LSP • The backup path is called “Detour LSP” in this mode. P4 P1 P2 P3 Sender Receiver P6 P5 Protected PATH Backup PATH 2) Facility Protection Mode • Facility backup applies to one-to-n protection • A bypass tunnel is used to protect one or more LSPs that traverse the PLR and the MP(s). • The backup path is called “bypass tunnel” or “backup LSP” in this mode P1 P9 P8 Receiver Sender P5 P2 P4 P3 Receiver Sender P7 P6
FRR Extension to mRSVP-TE Supports 1) Basic Link Protection with mRSVP-TE Receiver Protected Tunnel Backup Tunnel PE2 PATH P1 RESV P2 PE1 Source PE3 P3 Receiver 2) Basic Node Protection with mRSVP-TE P4 PE2 Receiver P1 P2 PE1 Source PE3 P3
Link and Node Protection in Detour Mode Lp1 Lp5 Lp4 Lp-pe2 Lb2 Lb3 Lp1 Lp3 Lp-pe2 Protected Path Detour Path Protected Path Sender Sender PE1 PE1 BFD BFD Lp1->Lp2,MP FRR: Lp1->Lb3, TMP Lp1 Lp1 P1(PLR) P1(PLR) Detour Path Lp5 Lp1->Lp3, N FRR: Lp1->Lb5, TMP1 Lp2 FRR Domain Lp2 Lb3 P5(TMP1) Lb5 P2(MP) Lp3 Lb2 P3(TMP) P2(N) Lp3->Lp-pe2,PE2 FRR: Lb3->Lp-pe2, PE2 Lp2->Lp-pe2,PE2 FRR: Lb2->Lp-pe2, PE2 Lb4 PE2 Lp-pe2 Lb3 P3(MP) Receiver Lp#: the label for protected path Lb#: the label for backup path Lp-pe2 P4(TMP2) Link Protection in Detour Backup Mode PE2 FRR Domain The Procedure Includes: Receiver Detour LSP Setup Initiated by MP via PATH/RESV Messages Single Label Assigning and Binding; FRR Entry Creation Link or Node Failure Repair Re-convergence after Local Repair Node Protection In Detour Mode
Link and Node Protection in Facility Mode Lb5 Lb4 Lb3 Lb3 Lb2 Lp1 Lp1 Lp2 Lp-pe2 Lp2 Lp2 Lp-pe2 Lp2 Lp2 Sender Protected Path Backup Path PE1 Sender Protected Path BFD PE1 BFG Lp1 Lp1 Lp1->Lp2, MP FRR: Lp2, Lp1->Lb3, TMP P1(PLR) P1(PLR) Lp2 Backup Path Lp1->Lp2, N FRR: Lp2, Lp1->Lb5, TMP1 Lb3 Lp2 P2(MP) P5(TMP1) Lb5 Lb2 P3(TMP) Lp2 P2(N) Lp2 -> Lp-pe2, PE2 FRR: Lp2,Lp2>Lp-pe2,PE2 PE2 P3(MP) Lb4 Lp-pe2 Lb3 Receiver Lp2>Lp-pe2,PE2 FRR: Lp2, Lb3->Lp-pe2, PE2 P4(TMP2) Lp#: the label for protected path Lb#: the label for backup path Lp-pe2 PE2 Link Protection In Facility Backup Receiver The Procedure Includes: Node Protection In Facility Backup Mode Detour LSP Setup Initiated by MP via PATH/RESV Messages Dual-Label Assigning and Binding; FRR Entry Creation; ULA for Node Protection Link or Node Failure Repair Re-convergence after Local Repair
P2MP/MP2MP Node Protection with mRSVP-TE PLR PLR • Protected LSP is a P2MP session • Protected LSP is a P2MP session Pn • Backup LSP is a P2MP session Pn N N Pn • Backup LSP is multiple P2P sessions MP MP MP MP Protection Option 2 Protection Option 1 • . • Option 1: • P2MP (or MP2MP) LSP can be protected by a single backup P2MP (or MP2MP) LSP. • Option 2: • P2MP (or MP2MP) LSP can be protected by multiple P2P LSP(s)
P2MP Node Protection in Facility Mode with mRSVP-TE Sender Data Flow on Protected LSP1 PE1 P1(PLR): Lp1->lg2, N Ly1->Ly2,N FRR: Lp2, Lp1->Lb5, TMP1 FRR: Ly2, Ly1->Lb5, TMP1 Data Flow on Backup LSP Ly1 Ly2 Lp2 Lp1 P1(PLR, Root) P7(MP3): Ly2->Lp-pe7, PE7 Ly2->Lp-pe6, PE6 FRR: Ly2, Lb7->Lp-pe7,PE7 FRR: Ly2, Lb7->Lp-pe6, PE6 Data Flow on Protected LSP 2 Lb5 Lb4 Ly2 Lb4 Lp2 Lp2 P5(TMP1) Ly2 Ly2 P7(MP3) Lp-pe7 PE7 Ly2 Lb7 P2(N) Lp2 Lp-pe6 Lb4 Lp2 P6(MP2) Lb6 Lb6 PE6 Lb3 P4 (TMP2) P3(MP1) Lp-pe3 PE5 P3(MP1) : Lp2 -> Lp-pe2, PE2 Lp2 -> Lp-pe3, PE3 FRR: Lp2, Lb3->Lp-pe2, PE2 FRR: Lp2, Lb3->Lp-pe3, PE3 PE4 Lp-pe2 PE3 Leaf PE1 PE2
Next Steps • Looking for feedbacks from you! • Suggestions? Questions? Comments? 84th IETF @ Vancouver