MPLS TE Technology White Paper
MPLS TE Technology White Paper
MPLS TE Technology White Paper
Full spelling
BFD
CR LDP
CSPF
FEC
FRR
Fast ReRoute
IGP
IS-IS
LDP
LSP
L3VPN
Layer 3 VPN
L2VPN
Layer 2 VPN
MPLS
MPLS TE
OSPF
RSVP
RSVP-TE
TED (TEDB)
TE
Traffic Engineering
VPN
1/30
Table of Contents
1 Overview......................................................................................................................................... 4
1.1 Problems with Traditional Routing ....................................................................................... 4
1.2 TE Solution .......................................................................................................................... 4
1.3 Benefits of MPLS TE ........................................................................................................... 5
2 Technical Characteristics ............................................................................................................... 6
2.1 Static LSP Tunneling............................................................................................................ 7
2.2 Explicit Routing .................................................................................................................... 7
2.2.1 Strict Explicit Paths ................................................................................................... 7
2.2.2 Loose Explicit Paths.................................................................................................. 8
2.2.3 Hybrid Explicit Paths ................................................................................................. 9
2.3 Link Coloring ........................................................................................................................ 9
2.4 Priorities and Preemption .................................................................................................. 10
2.4.1 Priorities .................................................................................................................. 10
2.4.2 Preemption .............................................................................................................. 11
2.5 Tunnel Reoptimization ....................................................................................................... 12
2.6 LSP Tunnel Backup ........................................................................................................... 12
2.7 FRR.................................................................................................................................... 14
2.7.1 Problems Solved by FRR........................................................................................ 14
2.7.2 Switchover Time with FRR...................................................................................... 15
2.7.3 Limits of FRR........................................................................................................... 15
2.8 Automatic Bandwidth Adjustment ...................................................................................... 15
2.9 Automatic Route Advertisement......................................................................................... 16
2.9.1 IGP Shortcut............................................................................................................ 16
2.9.2 Forwarding Adjacency............................................................................................. 16
2.10 MPLS L3/L2 VPN over TE ............................................................................................... 17
3 MPLS TE Implementation ............................................................................................................ 17
3.1 Information Advertisement ................................................................................................. 18
3.2 Path Selection.................................................................................................................... 19
3.3 Signaling Protocol .............................................................................................................. 20
3.3.1 RSVP-TE................................................................................................................. 20
3.3.2 CR-LDP ................................................................................................................... 25
3.4 Data Forwarding ................................................................................................................ 26
Hangzhou H3C Technologies Co., Ltd.
2/30
3/30
1 Overview
1.1 Problems with Traditional Routing
With traditional routing technologies, a router selects the shortest path for traffic
without considering other factors such as bandwidth. Even when congestion occurs, it
does not switch traffic to any other available path. The problem gets highlighted when
large traffic is present.
As shown in the above figure, two paths are available for traffic to travel from Router
A to Router H: Router A->Router C->Router G->Router F->Router H (Path 1) and
Router A->Router C->Router D->Router E->Router F->Router H (Path 2). Suppose
that all links have the same metric. Then, all traffic will be forwarded on Path 1, the
shortest path. This tends to overload Path 1 while Path 2 is idle. You can address the
problem by modifying their link metrics so that the two paths have the same cost to
share load. However, this solution tends to cause traffic jam on other links and is
difficult to implement on a network with complex topology as the change of a link may
involve multiple routes.
1.2 TE Solution
Traffic engineering addresses the problems with traditional routing by taking elements
Hangzhou H3C Technologies Co., Ltd.
4/30
1
Router C
Router A
Router F
Router H
1
Router D
Router E
5/30
only network connectivity. This IGP disadvantage can be repaired by using an overlay
model, such as IP over ATM or IP over FR.
An overlay model provides a virtual topology above the physical network topology for
a more scalable network design. It also provides better traffic and resources control
support for implementing a variety of traffic engineering policies. Despite all the
benefits, overlay models are not suitable for implementing traffic engineering in largesized backbones because of their inadequacy in extensibility.
In this sense, MPLS TE is a better traffic engineering solution for its extensibility and
ease of implementation.
MPLS is better than IGPs in implementing traffic engineering for the following:
z
LSP routing is easy to manage and maintain compared with traditional packetby-packet IP forwarding.
MPLS TE uses less system resources compared with other traffic engineering
implementations.
MPLS TE brings together the benefits of MPLS and traffic engineering. It delivers
these benefits:
z
Providing protection with route backup or fast reroute (FRR) technology when a
link or node fails.
Small LSP setup overheads, which hardly affect normal network services.
All these benefits make MPLS TE an attractive traffic engineering solution. It allows
service providers to optimize and manage network resources efficiently to provide
diversified services.
2 Technical Characteristics
MPLS TE delivers these features:
z
Explicit Routing
6/30
Link Coloring
Tunnel Reoptimization
FRR
7/30
A strict explicit path is the path that an LSP must take as intended. On such a path,
any two neighboring nodes are directly connected.
In the above figure, Router B strict in the legend indicates that the LSP must pass
by the Router B node and the previous hop of Router B must be Router A, the ingress
LSR; Router C strict indicates that the LSP must pass by Router C, and the
previous hop of Router C must be Router B, and so on.
On a loose explicit path, the nodes that an LSP must pass by are explicitly specified
but a node and its previous hop may have devices in between.
In the above figure, Router E loose in the legend indicates that the LSP must pass
by Router E, but Router E is not necessarily directly connected to Router A, the
ingress LSR.
8/30
Strict and loose routing could be used together. In the above figure, "Router B strict
in the legend indicates that the LSP must pass by Router B and Router B must
directly connect to Router A, the ingress LSR; Router E loose indicates that the LSP
must pass by Router E, but multiple routers are allowed between Router E and
Router B.
9/30
In this example, the LSP must not travel bronze links. Therefore, the bronze links will
be cut during path calculation.
10/30
2.4.2 Preemption
As shown in the figure, there exist two TE tunnels, T1 (Router A->Router B->Router E)
with 155 Mbps of bandwidth and T2 (Router C->Router B->Router F) with 155 Mbps
of bandwidth. The setup and holding priorities of T1 are 0 and those of T2 are 7.
Suppose that each link has the same bandwidth in both directions and all links are
assigned the same metric. When link Router BRouter E goes down, Router B
signals the event to Router A. Router A then recalculates a new path Router A>Router B->Router F->Router E for T1. As the bandwidth of link Router BRouter F is
inadequate to carry both T1 and T2 and T2's holding priority (7) is lower than that of
T1, T2 will be preempted. A new path is set up for T1 as follows:
1)
A PATH message is sent along Router A -> Router B ->Router F -> Router E,
and a RESV message is sent along Router E-> Router F -> Router B -> Router
A.
2)
When Router B receives the RESV message from Router F, it clears T2 and
sends a PathTear message to Router F and a ResvTear message to Router C.
If there is traffic on T2, clearing T2 will result in packet loss. To address the issue, you
can use the make-before-break mechanism to introduce a delay before clear actions.
Hangzhou H3C Technologies Co., Ltd.
11/30
12/30
1. Primary LSP
The primary LSP is the desired optimal path. It is the object of tunnel backup. When it
fails, traffic is switched over to the backup LSP and the primary LSP reestablishment
is initiated.
2. Hot-standby LSP
A hot-standby LSP is established upon the establishment of a primary LSP. When the
ingress router receives a primary LSP failure message, it switches traffic to the hotstandby LSP. When the primary LSP recovers, the router switches traffic back.
The hot standby mechanism ensures fast switchover upon failure by establishing
extra LSPs. It is suitable for delay-sensitive services.
13/30
speed is slower than that with the hot standby mechanism. For this reason, the
ordinary backup mechanism is suitable for delay-insensitive services.
2.7 FRR
2.7.1 Problems Solved by FRR
Fast reroute (FRR), also known as fast restoration, is a link and node protection
mechanism in MPLS TE.
In this approach, once a link or node fails on a path, FRR comes up to reroute the
path to a new link or node to bypass the failed link or node. This can happen as fast
as less than 50 milliseconds, a value tolerable by most delay-sensitive services like
VoIP, thus minimizing data loss. Once a link or node on an LSP configured with FRR
fails, traffic is switched to the protection link and the headend of the LSP starts
attempting to set up a new LSP.
Router A
Router C
Router E
Router G
Ingress
Egress
1
Router B
Router D
1
Router F
Router H
Figure 9 FRR
As shown in the above figure, the primary LSP travels the path Router A -> Router B > Router D -> Router F -> Router G. Tunnel Router A->Router C->Router D protects
node Router B and link Router ARouter B; tunnel Router B->Router C->Router F
protects node Router D and link Router BRouter D; and tunnel Router D->Router C>Router E->Router G protects node Router F and link Router DRouter F.
When link Router BRouter D fails, traffic travels path Router A->Router B->Router
C->Router F->Router G.
Hangzhou H3C Technologies Co., Ltd.
14/30
Router C
Router E
Router G
Ingress
Egress
1
Router B
Router D
1
Router F
Router H
The time spent detecting a link/node failure. Link/node failure detection can be
performed in hardware or by sending RSVP hello messages, with the former
approach taking less time. In addition, detection on an SDH/SONET link is
faster than on a GE link and link failure detection is faster than node failure
detection.
The time actually spent switching traffic. How fast this could happen depends
on the CPU and system load.
15/30
automatic bandwidth adjustment is to tune the bandwidth of the LSP tunnel based on
its history traffic statistics without affecting the ongoing service. The following
presents how the device tunes the bandwidth of an LSP.
The device makes sampling periodically, every 5 minutes for example, to obtain the
average bandwidth in a sampling interval. Based on the samplings in a certain period
(24 hours for example), the device calculates the maximum value and uses this value
as the bandwidth to initiate a new LSP tunnel. After this tunnel is set up, the device
switches traffic over to the tunnel and clears the old one. If the setup fails, traffic will
travel the old LSP and another adjustment attempt will be made at the end of the next
sampling interval.
To reduce the impact caused by adjustments, adjustment thresholds are introduced.
The idea is that an adjustment can be initiated only when the percentage of maximum
average bandwidth increase or decrease relative to the last maximum average
bandwidth crosses the up or down thresholds. In addition, you may set the maximum
and minimum bandwidth values to confine adjustments within the range.
16/30
LSP Router BRouter G can participate in IGP route calculation only on Router B,
because the LSP is unknown to the other routers. For this reason, Router A will use
the path Router A->Router C->Router E->Router G with the metric 30 to reach Router
G instead of the path Router A->LSP Router BRouter G with the metric 20.
Router A
Router C
Router E
10
10
Router G
10
Ingress
Egress
10
10
10
10
10
1
Router B
Router D
10
1
Router F
Router H
3 MPLS TE Implementation
The following four functions work together to implement MPLS TE:
z
Data forwarding
17/30
18/30
Type 134 is the TE Router ID TLV, and Type 135 is the extended IP reachable TLV.
IGP extensions maintain link and topology attributes on each router to form the TEDB
for constraint-based path calculation.
Compare the links in the TEDB and prunes those that do not satisfy the
constraints, for example, bandwidth and color constraints.
Based on the new topology, use the SPF algorithm to calculate the shortest
path that satisfies the constraints of the LSP.
If there is still more than one path, select one based on the load balancing
policy.
What the IS-IS SPF algorithm or OSPF SPF algorithm calculates are the shortest
paths to the next hops, and every router must run the SPF algorithm. As a contrast,
what the CSPF algorithm calculates are explicit paths that satisfy the constraints, and
usually only the ingresses of the LSPs to be established (the headends of the TE
tunnels) need to run the CSPF algorithm. On a TE headend, a route calculated by
CSPF is considered as a logical interface that leads to the destination (the tailend of
the TE tunnel).
The MPLS signaling protocol then signals the explicit path calculated by CSPF to the
downstream LSRs along the path to create a TE tunnel. After the TE tunnel is
Hangzhou H3C Technologies Co., Ltd.
19/30
established, IP packets taking this tunnel will be encapsulated with MPLS labels at
the ingress of the tunnel and then forwarded along the tunnel till they arrive the
egress of the tunnel.
3.3.1 RSVP-TE
1. Overview
The Resource Reservation Protocol (RSVP) is designed for the integrated service
model. It reserves resources on each node along a path. RSVP is an Internet control
protocol similar to ICMP. It operates at the transport layer but does not participate in
data transmission.
The RSVP extension, RSVP-TE, supports MPLS label distribution and allows
resource reservation information to be transmitted with label bindings. In MPLS TE,
RSVP-TE operates as a signaling protocol for LSP tunnel setup. It can implement the
following functions:
z
Notifying errors.
2. Basic Concepts
1)
Soft state
20/30
state will be removed if no refresh message is received for it in certain interval, and
the TE LSP will be removed accordingly.
2)
Resource reservation style refers to the style in which the RSVP-TE protocol works
when establishing LSPs and reserving bandwidth.. The resource reservation style
that a TE LSP uses is decided by the initiator of the tunnel and implemented by every
node along the path through RSVP.
Currently, two reservation styles are available with the Comware Platform Software:
z
Fixed-filter style (FF) where resources are reserved for individual senders and
cannot be shared among the senders on the same session.
Shared-explicit style (SE) where resources are reserved for the senders on the
same session and shared among them.
3. Make-before-break
Make-before-break is a mechanism to change MPLS TE tunnel attributes with
minimum data loss and without extra bandwidth.
Figure 13 Make-before-break
The above figure presents a scenario where a path Router A->Router B->Router C>Router D is established with 30 Mbps of reserved bandwidth between Router A and
Router D. The remaining bandwidth is then 30 Mbps.
If 40 Mbps path bandwidth is requested, the remaining bandwidth of the Router A>Router B->Router C->Router D path will be inadequate. The problem cannot be
Hangzhou H3C Technologies Co., Ltd.
21/30
4. RSVP-TE messages
RSVP-TE uses RSVP messages with extensions. The following are RSVP messages:
z
ResvErr messages: sent downstream to notify the downstream nodes that error
occurred during Resv message processing or reservation error occurred as the
result of preemption.
The TE extension to RSVP adds new objects to the Path message and the Resv
message. These objects carry not only label bindings but also routing constraints to
support CR-LSP and FRR.
22/30
The following is a simplified procedure for setting up an LSP tunnel with RSVP-TE:
1)
CSPF on the ingress LSR calculates a path for the CR-LSP based on the
constraints such as specified path segments, bandwidth, and link color.
2)
The ingress LSR sends a Path message towards the egress LSR. This
message contains the bandwidth reservation information and the path
calculated for the CR-LSP.
3)
The LSRs that the Path message traverses along the path create the PSB as
required.
4)
After receiving the Path message, the egress LSR sends back a Resv message
carrying the resource reservation and label binding information towards the
ingress LSR. The LSRs that the Resv message traverses along the path
reserve resources and create the RSB as required.
5)
When the ingress LSR receives the Resv message, the CR-LSP is established.
As resources are reserved on the LSRs along the path for the LSP established using
RSVP-TE, services transmitted on the LSP are guaranteed.
23/30
Refresh messages can only be used to refresh Path messages and Resv messages.
Message refreshing between nodes along a CR-LSP path is independent, that is, it
does not need the ingress LSR or egress LSR to send messages periodically to
trigger.
As Refresh messages are periodically sent, when many RSVP sessions are present,
there may be many Refresh messages, increasing the burden of the network. In
addition, for some delay-sensitive applications, the refreshing delay they must wait for
recovering lost RSVP messages may be intolerable. As tuning refresh intervals is not
adequate to address the two problems, the refreshing mechanism was extended as
follows to address the problems:
1)
Message_ID extension
RSVP itself uses Raw IP to send messages. The Message_ID extension mechanism
adds objects that can be carried in RSVP messages. Of them, the Message_ID
object and the Message_ID_ACK object are used to acknowledge RSVP messages,
thus improving transmission reliability.
On an interface enabled with the Message_ID mechanism, you may configure RSVP
message retransmission. After the interface sends an RSVP message, it waits for
acknowledgement. If no ACK has been received before the initial retransmission
interval (Rf seconds for example) expires, the interface resends the message. After
that, the interface resends the message at an exponentially increased retransmission
interval equivalent to (1 + Delta) Rf seconds until an ACK is received or the rapid
retry limit RI is reached.
2)
Send summary refreshes (Srefreshes) rather than retransmit standard Path or Resv
messages to refresh related RSVP state. This reduces refresh traffic and allows
nodes to make faster processing.
You may enable summary refresh extension on the interfaces that connect two
neighboring routers to improve their performance.
To use summary refresh, you must use the Message_ID extension. Only states
advertised using MESSAGE_ID-included Path and Resv messages can be refreshed
using summary refreshes.
Hangzhou H3C Technologies Co., Ltd.
24/30
3.3.2 CR-LDP
The Constraint-Based Routed Label Distribution Protocol (CR-LDP) is an extension to
LDP. It is used in conjunction with MPLS to perform constraint-based routing. Unlike
common LSPs, which are calculated simply based on the routing table or
administratively configured, CR-LSPs are calculated at the network edges based on
criteria in addition to routing information. This allows other TE attributes such as
bandwidth and color to be considered during LSP calculation.
The following figure shows how a CR-LSP is set up with CR-LDP.
LDP session setup and LDP session state machine maintenance are similar to those
in LDP.
As shown in the figure:
1)
2)
The ingress LSR calculates a path for the CR-LSP tunnel through CSPF based
on the explicit route, bandwidth, link color and other constraints.
3)
The LSR then creates a label request message with the TLVs that convey the
bandwidth reservation and path information, and sends it to the downstream
LSR on the calculated path.
4)
After receiving the label request message, the downstream LSR forwards the
message to its downstream LSR based on the TLVs in the message. This
message travels along the path until it reaches the egress.
25/30
5)
When receiving the message, the egress confirms the resource reservation and
sends a mapping message to the upstream.
6)
1. Static Routing
Static routing is the easiest way to route traffic down an MPLS TE tunnel to its
destination. You only need to specify a static route pointing down the tunnel interface
at the headend of the tunnel.
2. PBR
You can also use policy-based routing to forward traffic down a TE tunnel. To this end,
you need to do these at the headend of the tunnel:
z
First, create an ACL to define the traffic that should travel along this tunnel.
Then, create a policy referencing the ACL to specify the TE tunnel interface as
the outgoing interface for the traffic matching the ACL.
26/30
4 Application Scenarios
4.1 Bandwidth Guarantee
You may provide per-service bandwidth guarantee between two nodes by
establishing multiple tunnels between the nodes.
As shown in the following figure, there are data and voice services between the
ingress and the egress. To guarantee the bandwidth required by voice service, you
can set up a TE tunnel dedicated to voice service and have data service travel other
paths to avoid congestion.
As shown in the figure, two links are available between the ingress and the egress.
Tunnel 2 is set up on a low-delay link to convey voice service while Tunnel 1 is set up
to convey data service.
You can use FRR to protect the crucial nodes or links on a network, as shown
in the following figure.
27/30
Router C
Router E
Router G
Ingress
Egress
1
Router B
Router D
1
Router F
Router H
Ingress
Egress
Tunnel 1
Tunnel 2
28/30
5 References
z
RFC 3210: Applicability Statement for Extension to RSVP for LSP Tunnels
29/30
Copyright 2008 Hangzhou H3C Technologies Co., Ltd. All rights reserved.
No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of
Hangzhou H3C Technologies Co., Ltd.
The information in this document is subject to change without notice.
30/30