/
MPLS-TP Shared Ring Protection (MSRP) Mechanism MPLS-TP Shared Ring Protection (MSRP) Mechanism

MPLS-TP Shared Ring Protection (MSRP) Mechanism - PowerPoint Presentation

myesha-ticknor
myesha-ticknor . @myesha-ticknor
Follow
471 views
Uploaded On 2015-09-27

MPLS-TP Shared Ring Protection (MSRP) Mechanism - PPT Presentation

draftchengmplstpsharedringprotection02 IETF 90 th July 21 25 2014 Presenter Weiqiang ChengCMCC Authors Weiqiang Cheng Lei Wang Han Li CMCC H van Helvoort ID: 142224

ring node rps protection node ring protection rps tunnel wrapping interconnection failure request label tunnel1 amp switching state group

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "MPLS-TP Shared Ring Protection (MSRP) Me..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

MPLS-TP Shared Ring Protection (MSRP) Mechanism

draft-cheng-mpls-tp-shared-ring-protection-02

IETF

90

th

,

July 21- 25

, 2014

Presenter

:

Weiqiang

Cheng(CMCC

)

Authors

:

Weiqiang Cheng, Lei Wang, Han

Li (CMCC

)

H. van

Helvoort

,

Kai Liu, Jia He (Huawei Technologies Co., Ltd.)

Fang Li (CATR)

Jian

Yang (ZTE)

Junfang

Wang (

Fiberhome

)Slide2

Why Need Ring protection solution

Ring topology is deployed worldwide

, which can use minimized fiber resource to provide physical two tours.

Traditional transport networks (such as SDH) are constructed with ring topology, so that network infrastructure such as fiber/power supply/machine rooms are deployed for ring topology. Maintenance engineers are familiar with ring topology based operation.

Core

layer

Access layer

TDM/IMA E1

cSTM-1

FE

、GE

The link of access layerGE

The link of aggregation layer : 10GE

cSTM-1GE10GE

Access links

PW/LSP

Service link

10GE

10GE

RNC/BSC

SGW/MME

GE

The link of corn layer

10GE

Aggregation layer

CMCC PTN network architectureSlide3

Requirements of the Ring protection

“Multiple failures” recovery

Multiple links or nodes failures are caused

by single event, Such as:Multiple links of rings are using fibers in one cable or pipeline, and which is cut off

network migration/network cutover in different rings at the same time Ring protection should cover following possible failures scenarios

Multiple failures in single ring

Multiple failures in connected rings Simplify configuration and maintenance protection configurations should be independent of service number

Minimize the management elementsSimplify the hardware requirements

Minimize the number of OAM entitiesMinimize the number of elements of recovery Minimize the number of labels required

Linear protection using in field, operators require smooth migration from linear protection to ring protection without service impacted.Simple Wrapping solution requiredSlide4

“Ring tunnel

” in MSRP

A logical ring tunnel is introduced for both working LSP and protection LSP

to minimize the number of labels for protection paths, to minimize the number of recovery elements in the network, and to optimize the number of control and management transactions necessary,. Once the ring tunnel is established , the configuration, management and protection of the ring are all based on the ring tunnel. One port can carry more than one ring tunnel;One ring tunnel can carry several LSPs.

Port

Ring

tunnel

LSP

PW 1

PW 2

PW 3

Ring tunnel label

LSP label

PW label

Payload

Label stack used in MSRP

The logic ring tunnel in MSRP Slide5

Why need wrapping ring protection

A

B

D

C

F

E

Steering ring protection is hard to meet interconnected ring topology recovery requirement. When failure occurred as the figure show above, Steering ring protection need to notify failure information and topology to source node(as Node B). It need to introduce complex protocols.

When using wrapping ring protection, the switching action only execute in failure detected node(as Node D). It is simple to implement in the network devices then steering ring protection.

SDH networks often using MSP wrapping protection to improve network survivability.

Ring1

Ring2

interconnected ring protection scenariosSlide6

Scope

Differences from version

01

RPS protocols is added Differences from version 00short wrapping is added as an optimized wrapping solution to improve latency and bandwidth efficiency in some cases (e.g. the destination/exit node is far from the defect)

an interconnected ring protection mechanism is addedTo recover from interconnection node failure.Slide7

RPS Protocols communication

A

F

B

C

E

D

B->C(NR

)

D->E(NR

)

E->F(NR

)

F->A(NR

)

C->D(NR

)

A->B(NR)

B->A(NR

)

C->B(NR

)

E

->D(NR

)

F

->E(NR

)

A->F(NR

)

D

->C(NR

)

A

F

B

C

E

D

C->B(SF)

C

->B(SF)

C->B(SF)

C

->B(SF)

C->B(SF)

C->B(SF)

B->C(SF)

B

->C(SF)

B->C(SF)

B->C(SF)

B->C(SF)

B->C(SF)

RPS communication

(failure

between nodes B and

C)

RPS communication

(No Failure in the rings)

When no protection switches are active on the

ring

: Each

node

MUST

dispatch periodically RPS requests to the two adjacent nodes

,

indicating No Request (NR

);

When a node determines that a protection switching is

required

:

it MUST send the appropriate RPS request in both directions;

A

destination node is a node that is adjacent to a node that identified a failed span. When a node that is not the destination node receives an RPS request and it has no higher priority local request, it MUST transfer the RPS request as

received;Slide8

Idle

state

: A node is in the idle state when it has no RPS request and is sourcing and receiving NR code to/from both directions.Each node in Idle State MUST dispatch periodically RPS requests to the two adjacent nodes, indicating No Request (NR);

Switching state : A node not in the idle or pass-through states is in the switching state

.A node in the switching state MUST source RPS request to adjacent node

with its highest RPS request code in both directions when it detects a failure or receives an external command.

A node in the switching state MUST terminate RPS requests flow in both directions.

for all protection switch requests, except EXER and LP, the node in switching state MUST execute the switch

. Pass-through state : A

node is in the pass-through state when its highest priority RPS request is a request not destined to or sourced by it. Ring node RPS statesSlide9

RPS Protocols messages

The MSRP protection operation MUST be controlled with the help of

the Ring Protection

Switch Protocol(RPS). The RPS messages SHALL be sent over the G-ACh as described in [RFC5586].

RPS is dedicated to Ring protection and it requires a new A-

Ch channel type.

0 1 2 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

|0 0 0 1|0 0 0 0|0 0 0 0 0 0 0 0| RPS Channel Type (TBD) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

| Dest Node ID | Src

Node ID | Request | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Destination Node ID: The destination node ID MUST always be set to value of a node ID of the adjacent node. Valid destination node

ID values are 1-127.Source node ID: The source node ID MUST always be set to the value of the node ID generating the APS request. Valid source node ID values are 1-127.

RPS request code: A code consisting of four bits which carry RPS requests;Slide10

Scope

Differences from version

01RPS protocols is added Differences from version 00short wrapping is added as an optimized wrapping solution to improve latency and bandwidth efficiency in some cases (e.g. the destination/exit node is far from the defect)

an interconnected ring protection mechanism is addedTo recover from interconnection node failure.Slide11

Node F

Node E

Node D

Node A

Node B

Node C

Tunnel1

Short Wrapping

v.s

Wrapping (

Node D as an exit node )

Wrapping:

Protection switching happens at

neighbouring

nodes of the failure (Service is received from the working path at the exit node) . See the black line in the figure.

Short Wrapping

: Protection switching occurs at the up-stream neighboring node of the failure and the exit node (Service is received from the protection path at the exit node).

Tunnel1

wrapping path

Short wrapping path

P2P short wrapping solution

physical links

RcW

RcP

RaW

RaP

Protection ring tunnel will

poped

at ring destination node when using short wrapping

Wrapping path

Short Wrapping pathSlide12

Interconnected ring protection mechanism

Interconnected rings will be regarded as two independent rings

. Each ring runs protection switching independently. Failure in one ring only triggers protection switching in itself and does not affect the other ring.

For protected interconnection node in dual-node interconnected ring, the service LSPs in the interconnection nodes should use the same Forword table

. So either interconnection node can process service LSP if another node failure.Two interconnection nodes can be managed as a virtual interconnection node group. Each ring assigns ring tunnels to the virtual interconnection node group.

The interconnection nodes in the group should terminate the same interconnected ring tunnels. Ring tunnels to the virtual interconnection node group will be established by each rings :

one clockwise working ring tunnel to the virtual interconnection node group;

one anticlockwise protection ring tunnel to the virtual interconnection node group,

one anticlockwise working ring tunnel to the virtual interconnection node group;

one clockwise protection ring tunnel to the virtual interconnection node group.

These ring tunnel will terminated at all nodes in virtual interconnection node group. Slide13

Recovery from Interconnection node failure

Node A

Node D

Node F

Node C

Node E

Node H

Node B

Node G

Tunnel1(in)

Tunnel1(out)

Ring1

Ring2

Tunnel1(D&E)

RcW_D&E

(A)

Tunnel1(D&E)

RcW_D&E

(D&E)

Tunnel1(H)

RcW_H

(F)

Recovery from

Interconnetcion

node failure (

Node

D failure

)

push Ring1 tunnel Label

Pop Ring1 tunnel label

Switch traffic runnel label

Push ring2

tunnnel

label

pop Ring2 tunnel Label

Tunnel1(D&E)

Rap_D&E

(B)

Tunnel1(D&E)

Rap_D&E

(C)

Tunnel1(D&E)

Rap_D&E

(D&E))

Tunnel1(H)

Rap_H

(H)

Pop Ring1 tunnel label

Switch traffic runnel label

Push ring2

tunnnel

label

NodeD

and

NodeE

should deal with the same traffic LSP label. Tunnel1 will process correctly in any node of

NodeD

and

NodeE

;Slide14

Next Step

Any enhancement based on the feedbacks from the group