Vous êtes sur la page 1sur 24

Diffserv-aware MPLS-TE

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1


Why combine DiffServ and TE?
R1,R2 -> R8 is 40Mbps each, 20Mbps is voice.
Also voice is limited to 25% of link
R1
R4
R5 R8
R3
100 Mbps
R2
R6 R7

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2


When TE is not enough
ƒ Traffic engineering operates at an aggregate level across all classes of
service.

ƒ The applications that generate most revenue are usually tied to strict
SLAs, and require strict QoS (delay, jitter, loss).

ƒ Traffic engineering alone cannot solve all application scenarios.


Examples:
• Limiting the proportion of traffic on a link (for voice services)
• Providing guaranteed bandwidth services

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 3
Can Diffserv solve the problem?
ƒ DiffServ dictates the scheduling/queuing behavior
given to traffic at every hop, but does not control
the path the traffic is taking.

ƒ If links are congested packets will be dropped


(cannot guarantee low-loss).

ƒ If queues are long, queuing delays are long (cannot


guarantee overall-delay).

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 4
QoS using over-provisioning
ƒ If the amount of delay-sensitive traffic is small and
the available bandwidth is plentiful – there is
nothing to do, it just works.

ƒ Problems:
• Wastes a lot of resources.
• Problematic to guarantee for failure scenarios.
• What happens when the traffic increases?

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 5
The case against over provisioning

Over provisioning gives no guarantees in case of failure scenarios:


•Under normal conditions voice traffic takes the A-C-D which is the shortest path
•The links are large so the percentage of voice on each link is acceptable
•When the failure happens the traffic fails over on A-C-G-D path
•The link C-G is low capacity, and thus the percentage of voice becomes
unacceptable
•The traffic should have re-routed on A-C-E-F-D

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6


QoS – the requirements
ƒ If links are congested packets will be dropped -> avoid
congestion by mapping the traffic to paths that have
enough resources, both in the steady-state case and in the
failure case.

ƒ If queues are long, queuing delays are long -> ensure that
queues are short – limit the amount of delay-sensitive
traffic on a link.

ƒ In addition to DiffServ, need Traffic Engineering => MPLS


TE

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 7
The goal of MPLS DS-TE
ƒ Support different queuing behaviors per DiffServ
class, give different forwarding behavior based on
the class.

ƒ Do traffic engineering at a per-class level rather


than at an aggregate level.

ƒ Enforce different bandwidth constraints for


different classes of traffic.

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 8
Components of DS-TE
ƒ Three components:

• Per-class traffic engineering – RSVP extensions, IGP extensions

• Per-class input policing at the edge – LSP Policing

• Per-class scheduling (one queue for all traffic of a given class) – Diffserv

ƒ Per-class traffic engineering + policing at the edge + dedicated queue = QoS

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 9
What is DS-TE good for?
ƒ Guaranteed QoS for services – VoIP, “guaranteed
BW” service.

ƒ Quality-based transport of all traffic types

ƒ Emulating ATM and FR over MPLS

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 10
Terminology – Class-type (CT)
ƒ Class-Type (CT or traffic class): collection of traffic flows that will be
treated equivalently from a DS-TE perspective.

ƒ Maps to a queue, equivalent to the class-of-service “forwarding-class”


concept.
• CT0: Best effort
• CT1: Expedited forwarding
• CT2: Assured forwarding
• CT3: Network control

ƒ The CoS configuration determines the BW available for each CT in JUNOS.

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 11
Terminology: TE Class
ƒ Each IGP needs to advertise the available
bandwidth per CT at each priority level on every
link
ƒ There are 8 CTs and 8 priority levels resulting on
64 values that need to be stored and propagated
for each link
ƒ IETF decided to limit the advertisements to 8
values (from possible 64 values)
ƒ TE Class is defines as (CT, priority)

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 12


Picking Eight TE-Classes

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13


How DS-TE operates
ƒ Extended IGP
Extended IGP

Traffic Engineering Constrained Shortest User


Routing Table
Database (TED) Path First (CSPF) Constraints

ƒ Distributes topology and traffic engineering information

ƒ IGP Extensions and mechanisms Explicit Route


• Maximum reservable bandwidth per CT

• Remaining reservable bandwidth per CT

• Link administrative groups (color) RSVP Signaling

• Opaque LSAs for OSPF, New TLVs for IS-IS

2004 Juniper Networks, Inc.


Copyright © 2003 Proprietary and Confidential www.juniper.net 14
How DS-TE operates
Extended IGP
ƒ Traffic Engineering
Database (TED)

Traffic Engineering Constrained Shortest User


Routing Table
Database (TED) Path First (CSPF) Constraints

ƒ Maintains traffic engineering information


learned from the extended IGP & contains: Explicit Route

• Up-to-date network topology information


• Current reservable bandwidth of links per
CT RSVP Signaling

• Link administrative groups (colors)

2004 Juniper Networks, Inc.


Copyright © 2003 Proprietary and Confidential www.juniper.net 15
How DS-TE operates
Extended IGP ƒ User Constraints

Traffic Engineering Constrained Shortest User


Routing Table
Database (TED) Path First (CSPF) Constraints

ƒ User-defined constraints applied to path


selection
• Bandwidth requirements per CT Explicit Route

• Hop limitations
• Administrative groups (colors)
• Priority (setup and hold)
RSVP Signaling
• Explicit route (strict or loose)

2004 Juniper Networks, Inc.


Copyright © 2003 Proprietary and Confidential www.juniper.net 16
How DS-TE operates
Extended IGP ƒ Constrained Shortest
Path First (CSPF)

Traffic Engineering Constrained Shortest User


Routing Table
Database (TED) Path First (CSPF) Constraints

For LSP = (highest priority) to (lowest priority)


Prune links with insufficient bandwidth for the
Explicit Route
CT
Prune links that do not contain an included color
Prune links that contain an excluded color
Calculate shortest path from ingress to egress RSVP Signaling
Select among equal-cost paths
Pass explicit route to RSVP

2004 Juniper Networks, Inc.


Copyright © 2003 Proprietary and Confidential www.juniper.net 17
How DS-TE operates
Extended IGP ƒ RSVP signaling and BW
accounting

Traffic Engineering Constrained Shortest User


Routing Table
Database (TED) Path First (CSPF) Constraints

RSVP signals the LSP.


The available BW is updated on every link.
Explicit Route
The new available BW is fed to the IGPs.

RSVP Signaling

2004 Juniper Networks, Inc.


Copyright © 2003 Proprietary and Confidential www.juniper.net 18
Diffserv-aware MPLS-TE
Dimensions
ƒ There are 3 types of LSPs for Diffserv aware MPLS-TE

• Multi-class DSTE E-LSPs - An LSP with multiple classes, with each class
represented by EXP bits, is traffic engineered across the network

• Single class DSTE E-LSPs - An LSP with a single class, with the class
represented by EXP bits, is traffic engineered across the network

• Single class DSTE L-LSPs - An LSP with a single class, with the class
represented by the label and EXP bits, is traffic engineered across the
network

• There is often confusion among the last two

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19


Summary: E and L LSPs

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 20


How is bandwidth accounted?
ƒ The IETF defined bandwidth models.

ƒ They determine the partitioning of BW among the


different CTs

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 21
BW model RDM (Russian dolls)

ƒ The available bandwidth is partitioned between the CTs.


ƒ Sharing is allowed.
ƒ Requires using preemption to ensure bandwidth guarantees to CTs.
ƒ Available in 6.4.

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 22
BW model MAM (maximum allocation)

ƒ The available bandwidth is partitioned between the CTs


ƒ No sharing is allowed.
ƒ Unused resources cannot be used by other CTs. Good or
bad? Both…
ƒ Available in 6.3

Copyright ©©2004
Copyright 2003Juniper
JuniperNetworks,
Networks, Inc.
Inc. Proprietary andConfidential
Proprietary and Confidential www.juniper.net
www.juniper.net 23
Thank You!

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24

Vous aimerez peut-être aussi