Multi-Segment Pseudowires : Recognising the Layer Network

advertisement
Multi-Segment Pseudowires:
Recognising the Layer Network
Adrian Farrel
Old Dog Consulting
Old Dog Consulting
Agenda
• Existing building blocks
• Protocol layering in the data plane
• Multi-segment pseudowires
• Architecture and drivers
• Functional requirements
• Picking paths and setting up pseudowires
• Service-level requirements
• The layer model
• Pitfalls and benefits
• Next steps
© Copyright Old Dog Consulting 2010
Page 2
The PW Layering Model
• RFC 3985 defines logical protocol layering
Payload
Encapsulation
May be empty
PW Demultiplexer
PSN Convergence
May be empty
PSN
Data-Link
Physical
• For example…
Ethernet
Header
MPLS
Tunnel Label
MPLS
PW Label
Control
Word
IP Header
Data
Last byte
First byte
© Copyright Old Dog Consulting 2010
Page 3
Multi-Segment Architecture
Pseudowire
Segments
Native Service AC
Provider Network
Terminating PE
Provider Network
CE
Switching PEs
•
•
•
•
Tunnel
Simple extension to the RFC 3985 model
Emulated service is still CE-to-CE
Tunnels are still used to carry the PWs
End-to-end PW is called a multi-segment PW
• Runs between the Terminating PEs (T-PEs)
• Constructed from PW segments
• Carried across provider networks in tunnels
• Tunnels terminated at PEs
• PW segments “switched” (or stitched) at Switching PEs (S-PEs)
© Copyright Old Dog Consulting 2010
Page 4
MS-PW Deployment Motivations
• Initial model shows inter-AS PW service
• A more pressing need
• Reduce the complexity of the tunnel mesh
• Help scaling at PEs and P nodes
• S-PE becomes a network-internal node
• Not the best name!
• Same model applies to inter-area PW service
• Utility extends to P2MP PWs (discussed later)
Pseudowire
Segments
Native Service AC
Terminating PE
Provider Network
CE
Tunnel
Switching PE
© Copyright Old Dog Consulting 2010
Page 5
MS-PW Challenges
• Data plane encapsulation
• Picking a path through the network
• Setting up pseudowire segments and PSN
tunnels
• Service-level requirements
• Capacity
• Diversity
• P2MP
• Operations, Administration and Maintenance
© Copyright Old Dog Consulting 2010
Page 6
Data Plane Challenges
• PW encoding should be independent of PSN technology
• Same techniques/hardware “packetization”
• Regardless of underlying PSN transport
• Resource reservation is needed to guarantee PW
service
• PWs use PSN tunnels
• Reservation must use tunnel resources
• Tunnel must map its resources to network resources
• Tunnel transit nodes are not aware of payload PWs
• PWs must be multiplexed onto data channels to scale
the data plane
• PW flows must not merge
• Have to be able to trace and distinguish individual PWs
• Essential for OAM and fault diagnosis
© Copyright Old Dog Consulting 2010
Page 7
Path Determination
• Choices to be made
• Which tunnels to use?
• Which S-PEs to use?
• For dual-homed CEs: which T-PEs to use?
• Are these choices made in planning or during
LSP set-up? (see next slide)
• What factors affect the choices?
•
•
•
•
Tunnel load and capacity
S-PE load and capacity
Reduce the number of segments on the path?
Path diversity for backup services
© Copyright Old Dog Consulting 2010
Page 8
PW Setup
• Components of MS-PW establishment
• Tunnel set-up
• PW segment set-up
• PW segment stitching
• Choices
• All through the management plane
• Control plane for tunnels and MP for PWs
• Control plane for tunnels and PW segments
• But segment stitching using management plane
• Fully in the control plane
• Some segments MP, some segments CP
• How much operator involvement is needed?
• Where are the administrative boundaries?
• Can the signalling protocols handle the MS-PW path and
constraints?
© Copyright Old Dog Consulting 2010
Page 9
Service Requirements
• Influence path determination and set-up
• PW capacity and quality requirements
• Protection considerations
• End-to-end protection
• Tunnels are diverse
• No re-use of S-PEs
• Segment protection
• Tunnels between S-PEs are diverse
• Protect a PW segment
• Protect an S-PE
• Point-to-multipoint PWs
• Use a single P2MP tunnel?
• Stitch multiple P2P PW segments?
• Combine the techniques?
© Copyright Old Dog Consulting 2010
Page 10
MS-PW Protection
Single segment protection
End-to-end MS-PW protection
PSN tunnel protection
Multi-segment protection
© Copyright Old Dog Consulting 2010
Page 11
P2MP Pseudowires
© Copyright Old Dog Consulting 2010
Page 12
OAM Challenges
• OAM function provides
• Service verification
• Fault detection and reporting
• Fault isolation
• Service verification is end-to-end
• Can run OAM on the PW or on the emulated service
• Faults need to be known where they are to be
handled
• T-PEs for end-to-end protection
• S-PEs for protecting individual segments
• Scaling may be an issue
• How many PWs pass through an S-PE?
• Running OAM on a tunnel can solve this
© Copyright Old Dog Consulting 2010
Page 13
The Layer Model
• There is a natural layering available
• Nothing clever!
• Make a topology of
• Nodes = PEs (T-PEs and S-PEs)
• Links = PSN tunnels
• See that these links have cost and bandwidth
• Plan and set up MS-PWs on this topology
• Each “hop” is a single segment PW
© Copyright Old Dog Consulting 2010
Page 14
Topology Layering
• Tunnels between S-PEs in the PSN become
links in the MS-PW network
© Copyright Old Dog Consulting 2010
Page 15
Multi-Access links
• P2MP tunnels form multi-access links in the MS-PW network
• Care needed about unidirectional P2MP tunnels!
© Copyright Old Dog Consulting 2010
Page 16
The Application Layer is Extra
•
•
•
•
Emulated service is between CEs
• CE is out of scope for the provider network
End-to-end protected service is required
• Protected service is through two “parallel” emulated services
• Individually requested
• Different T-PEs?
• Different ACs?
The protection is the responsibility of the service user
But the emulated services need to have disjoint paths
• Requires the use of Shared Risk Link Groups (SRLGs)
© Copyright Old Dog Consulting 2010
Page 17
PWs Are Transport-Agnostic
AC
Emulated Service
End-to-End PW
Switch
Stitch
PW Segment
Packet Tunnel
CE
MPLS-TP
T-PE
•
•
•
•
Ethernet
IP
S-PE
No surprises here
But packet technologies can be different
Architecture must allow independence of PW segments
Still deliver end-to-end emulated service
© Copyright Old Dog Consulting 2010
Page 18
Pitfalls to Avoid
• “Don’t worry about the control plane”
• Let’s do it all in the management plane for now
• True, but network planning can make good use of layers
• OAM layering will help operations
• “Let’s leverage the IGP”
• We can use our IP/MPLS IGP “discover” S-PEs
• Fine to run an IGP instance in the PW layer
• But don’t overload the normal IGP
• Consider how inter-AS will work
• How about using PCE in the PW layer?
• “Layers add unnecessary complexity”
• We only have a simple network with one S-PE
• Networks will inevitably get more complicated and larger
• How easy will it be to cut over to a layered approach later?
© Copyright Old Dog Consulting 2010
Page 19
More Pitfalls
• “Network layering implies operational separation”
• We want to operate an integrated PSN
• Network layers can be operated and planned independently
• Dynamic integrated multi-layer networks are possible
• Feedback loops between layers with appropriate policy controls and
operator input
• IP/Optical is the latest buzz in this area
• “We can grow LDP to handle MS-PW” in IP/MPLS
networks
• We already use LDP for PW set-up
•
•
•
•
•
It’s true, any protocol can be extended to do anything!
LDP is designed as a neighbour-to-neighbour protocol
T-LDP is currently used only for single segment PWs
Functional creep does not make for good protocol design
Need extensions for all elements of constraint-based path signalling
• Explicit routes, route recording, bandwidth reservation, protection, path
association and path diversity, etc., etc.
• We do already have a PSN signalling suite for this type of function
(RSVP-TE/GMPLS)
© Copyright Old Dog Consulting 2010
Page 20
Potential Benefits?
• Simplified network view
• Aids operation and planning
• Integration of multiple PSN types
• Reduced complexity in network operation
• Separation of application from operation
• Reduced number of control plane protocols
• Increased features and functions
• Leverage experience with existing multi-layer
networks and control planes
•
•
•
•
•
Path computation and control
Resource reservation and management
Protection and restoration
Point-to-multipoint
OAM control and configuration
© Copyright Old Dog Consulting 2010
Page 21
What Should We Do About It?
• Decide whether MS-PWs are for real
• Plan our control plane protocols
• Don’t just evolve them piecemeal
• Look to see if we can leverage existing
protocols we are already running
• Recognise the layered architecture
• Build this into our PW architecture work
• Design PW networks as layers
© Copyright Old Dog Consulting 2010
Page 22
Questions
adrian@olddog.co.uk
© Copyright Old Dog Consulting 2010
Page 23
Download