52
RJIL UMMTS OPTIMIZATION By- Md Mahboob Alam Shubham Guptam

UMMTS Optimization

Embed Size (px)

Citation preview

Page 1: UMMTS Optimization

RJIL UMMTS OPTIMIZATION

By-Md Mahboob Alam Shubham Guptam

Page 2: UMMTS Optimization

RUMA-II

Reliance Architecture and Terminology

Page 3: UMMTS Optimization

RUMA-II

Unified MPLS Mobile Transport

Page 4: UMMTS Optimization

4

RUMA-II

MPLS Operation

Page 5: UMMTS Optimization

RUMA-II

Transport Architecture-Access to Core

Large Network, Multi-Area Design with IP/MPLS Access

Single AS

Page 6: UMMTS Optimization

May 22 2015

Lesson 2MPLS Traffic Engineering

RUMA-II

Page 7: UMMTS Optimization

Reliance Jio Infocomm Limited 7

RUMA-II

Traffic Engineering Overview

• Traffic engineering is manipulating your traffic to fit your network.• Network engineering is building your network to carry your

predicated traffic.• TE is commonly used in voice telephony networks.• TE is a process of measures, models, and controls of traffic to

achieve various goals.• TE for data network provides an Integrated approach to managing

traffic at Layer 3.

Confidential

RUMA-II

Page 8: UMMTS Optimization

Reliance Jio Infocomm Limited 8

RUMA-II

Traffic Engineering Motivations

• Reduce the overall cost of operations by more efficient use of bandwidth resources.• Prevent a situation where some parts of a network are over utilized (congested), while

other parts remain under utilized.• Implement traffic protection against failures.• Enhance SLA in combination with QoS.

Confidential

RUMA-II

Page 9: UMMTS Optimization

Reliance Jio Infocomm Limited 9

RUMA-II

Business Drivers for Traffic Engineering

• Routers forward traffic along the least-cost route discovered by routing protocols.• Network bandwidth might not be efficiently utilized:• The least-cost route might not have enough resources to carry all the

traffic.• Alternate paths might be underutilized.

Confidential

RUMA-II

Page 10: UMMTS Optimization

Reliance Jio Infocomm Limited 10

RUMA-II

Business Drivers for Traffic Engineering (Cont.)

• Lack of resources results in congestion in two ways:• When network resources themselves are insufficient to accommodate

offered load.• When traffic streams are inefficiently mapped onto available resources

• Some resources are over utilized while other remain under utilized.

Confidential

RUMA-II

Page 11: UMMTS Optimization

Reliance Jio Infocomm Limited 11

RUMA-II

Traffic Engineering with a Layer 3 Model

Layer 3 Model with No Traffic Engineering

Confidential

RUMA-II

Page 12: UMMTS Optimization

Reliance Jio Infocomm Limited 12

RUMA-II

Traffic Engineering with a Layer 3 model

• The current forwarding paradigm, centered around “ destination-based”, is not enough.• Support for “explicit” routing (source routing) is not enough.• Supported workarounds are static routes, policy routing.• Provide controlled backup and recovery.

Confidential

RUMA-II

Page 13: UMMTS Optimization

Reliance Jio Infocomm Limited 13

RUMA-IITraffic Engineering with the MPLS TE Model

• Tunnel is assigned labels that represent the path (LSP) through the system.• Forwarding within the MPLS network is based on label (no Layer 3 lookup).

Confidential

RUMA-II

Page 14: UMMTS Optimization

Reliance Jio Infocomm Limited 14

RUMA-IITraffic Engineering with the MPLS TE Model (Cont.)• The MPLS TE LSPs are created by RSVP.• The actual path can be specified:

• Explicitly defined by the system administrator• Dynamically defined using the underlying IGP protocol

Confidential

RUMA-II

Page 15: UMMTS Optimization

Reliance Jio Infocomm Limited 15

RUMA-II

Traffic Tunnels: Concepts

The concept of MPLS TE traffic tunnels was introduced to overcome the limitations of hop-by-hop IP routing:

• A tunnel is an aggregation of traffic flows that are placed inside a common MPLS label-switched path.

• Flows are then forwarded along a common path within a network.

Confidential

RUMA-II

Page 16: UMMTS Optimization

Reliance Jio Infocomm Limited 16

RUMA-II

Traffic Tunnels: Concepts (Cont.)

• The unidirectional single class of service model encapsulates all of the traffic between an ingress and an egress router.• The different classes of service model assigns traffic into separate tunnels with

different characteristics.

Confidential

RUMA-II

Page 17: UMMTS Optimization

Reliance Jio Infocomm Limited 17

RUMA-II

Traffic Tunnels: Characteristics

• A traffic tunnel is distinct from the MPLS LSP through which it traverses:• More than one TE tunnel can be defined between two points:

• Each tunnel may pick the same or different paths through the network.• Each tunnel will use different MPLS labels.

• A traffic tunnel can be moved from one path onto another, based on resources in the network.

• A traffic tunnel is configured by defining its required attributes and characteristics.

Confidential

RUMA-II

Page 18: UMMTS Optimization

Reliance Jio Infocomm Limited 18

RUMA-II

Traffic Tunnels: Attributes

• Attributes are explicitly assigned through administrative action.• A traffic tunnel has several characteristics:

• Its ingress (headend) and egress (tail end) label switch routers• The forwarding equivalence class that is mapped onto it• A set of attributes that determine its characteristics

Confidential

PE1

Headend

PE3

Tail End

TT1

PE2 PE4

RUMA-II

Page 19: UMMTS Optimization

Reliance Jio Infocomm Limited 19

RUMA-II

Traffic Tunnels: Attributes (Cont.)

• The administrator enters the relevant information (attributes) at the headend of the traffic tunnel:• Traffic parameter: Resources required for tunnel (for example, required

bandwidth)• Generic path selection and management: Path can be administratively specified

or computed by the IGP• Resource class affinity: Can include or exclude certain links for certain traffic

tunnels• Adaptability: Traffic tunnel to be reoptimized?• Priority and preemption: Importance of a traffic tunnel and possibility for a

preemption of another tunnel• Resilience: Desired behavior under fault conditions

Confidential

RUMA-II

Page 20: UMMTS Optimization

RUMA-II

Network Links and Link Attributes

• Resource attributes (link availability) are configured locally on the router interfaces:• Maximum bandwidth

• The amount of bandwidth available• Link affinity string

• Allows the operator to administratively include or exclude links in path calculations• Constraint-based specific metric

• The TE default metric

RUMA-II

Page 21: UMMTS Optimization

RUMA-II

Constraint-Based Path Computation

• Constraint-based routing is demand-driven.• Resource-reservation-aware routing paradigm:

• Based on criteria including, but not limited to, network topology • Calculated at the edge of a network:

• Modified Dijkstra algorithm at tunnel headend (CSPF [constraint-based SPF] or PCALC [path calculation])

• Output is a sequence of IP interface addresses (next-hop routers) between tunnel endpoints

RUMA-II

Page 22: UMMTS Optimization

RUMA-II

Constraint-Based Path Computation (Cont.)

• Constraint-based routing takes into account these three elements :• Policy constraints associated with the tunnel and physical links • Physical resource availability • Network topology state

• Two types of tunnels can be established across those links with matching attributes:• Dynamic—Using the least-cost path computed by OSPF or IS-IS• Explicit—Using a path that is defined with Cisco IOS configuration commands

RUMA-II

Page 23: UMMTS Optimization

Reliance Jio Infocomm Limited 23

RUMA-II

Confidential

Constraint-Based Path Computation (Cont.)RUMA-II

Page 24: UMMTS Optimization

Reliance Jio Infocomm Limited 24

RUMA-II

Confidential

Constraint-Based Path Computation (Cont.)RUMA-II

Page 25: UMMTS Optimization

RUMA-II

Traffic Engineering Processes

• Information distribution• Path selection and calculation• Path setup• Tunnel admission control• Forwarding of traffic on to tunnel• Path maintenance

RUMA-II

Page 26: UMMTS Optimization

RUMA-II

Role of RSVP in Path Setup Procedures

• When the path has been determined, a signaling protocol is needed:• To establish and maintain label-switched paths (LSPs) for traffic tunnels• For creating and maintaining resource reservation states across a network (bandwidth

allocation)• Resource Reservation Protocol (RSVP) was adopted by the MPLS workgroup of the

IETF.

RUMA-II

Page 27: UMMTS Optimization

RUMA-II

Path Setup with RSVP

• When the path has been calculated, it must be signaled across the network.• Reserve any bandwidth to avoid “double booking” from other TE reservations.• Priority can be used to preempt low priority existing tunnels.

• RSVP is used to set up TE LSP.• PATH message (from head to tail) carries LABEL_REQUEST.• RESV message (from tail to head) carries LABEL.

• When the RESV message reaches the headend, the tunnel interface is up.• RSVP messages exist for LSP teardown and error signaling.

RUMA-II

Page 28: UMMTS Optimization

RUMA-II

RSVP and Tunnel Admission Control

• On receipt of PATH message:• Router checks whether there is bandwidth available to honor the reservation.• If bandwidth is available, then RSVP is accepted.

• On receipt of a RESV message:• Router actually reserves the bandwidth for the TE LSP.• If preemption is required, lower priority LSPs are torn down.

• OSPF or IS-IS updates are triggered.

RUMA-II

Page 29: UMMTS Optimization

RUMA-II

Forwarding Traffic to a Tunnel

• IP routing is separate from LSP routing and does not see internal details of the LSP.• The traffic must be mapped to the tunnel:

• Static routing: The static route in the IP routing table points to an LSP tunnel interface.• Policy routing: The next-hop interface is an LSP tunnel.• Autoroute: SPF enhancement

• The headend sees the tunnel as a directly connected interface (for modified SPF only).• The default cost of a tunnel is equal to the shortest IGP metric, regardless of the path

used.

RUMA-II

Page 30: UMMTS Optimization

RUMA-II

IP Forwarding Database Modification with Autoroute

• The autoroute feature enables the headend to see the LSP as a directly connected interface:• This feature is used only for the SPF route determination, not for the constraint-based path

computation.• All traffic that is directed to prefixes topologically behind the tunnel endpoint (tail end) is

forwarded onto the tunnel.• Autoroute affects the headend only; other routers on the LSP path do not see the

tunnel.• The tunnel is treated as a directly connected link to the tail end.

RUMA-II

Page 31: UMMTS Optimization

Reliance Jio Infocomm Limited 31

RUMA-II

Confidential

Autoroute Topology (OSPF and IS-IS)

Tunnel 1: R1-R2-R3-R4-R5

Tunnel 2: R1-R6-R7-R4

RUMA-II

Page 32: UMMTS Optimization

Reliance Jio Infocomm Limited 32

RUMA-II

Confidential

Autoroute Topology (OSPF and IS-IS) (Cont.)

From the perspective of R1: Next hop to R5 is Tunnel 1.

Next hop to R4 and R8 is Tunnel 2. All nodes behind the tunnel are routed via the tunnel.

3232

RUMA-II

Page 33: UMMTS Optimization

May 22, 2015

RUMA-II

Module-IIIHigh Availability and Fast convergence

Page 34: UMMTS Optimization

Reliance Jio Infocomm Limited 34

RUMA-II

High Availability and Fast convergence

• Lesson 1: FRR• Lesson 2: LFA• Lesson 3: NSF/NSR – ISIS,BFD• Lesson 4: BGP-NHT&PIC

Confidential

Page 35: UMMTS Optimization

May 22, 2015

RUMA-II

Lesson 1:Fast Reroute (FRR)

Page 36: UMMTS Optimization

RUMA-II

Fast Reroute

•Preconfigured backup tunnels

•Notification through IGP and RSVP.

•Headend attempts to establish a new LSP (rerouting).

Page 37: UMMTS Optimization

RUMA-II

Fast Reroute: Case Study

Page 38: UMMTS Optimization

RUMA-II

• Link Protection for the Core 1–Core 6 Link

Link Protection with FRR

Page 39: UMMTS Optimization

RUMA-II

Node Protection with FRR

• Node Protection for Core 5

End-to-end tunnel onto which data normally flows

Bypass (backup) static tunnel to take if there is a failure

POP A

Core 1

Core 7

Core 6

POP B

POP C

Protected Node

Next-Next-Hop Backup Tunnel

X

Page 40: UMMTS Optimization

RUMA-II

Cisco Nonstop Forwarding

• Cisco NSF is applicable in platforms with dual RPs and works together with SSO.• Cisco NSF allows:

• Routing neighbor relationships remain established during SSO.• Routes on neighboring routers remain valid.• Forwarding of data packets continues while routing process on new RP converges.

• Cisco NSF is supported by:• Routing protocols (OSPF, IS-IS, EIGRP, BGP)• Forwarding operation (Cisco Express Forwarding)

• Device has to be Cisco NSF-capable.• Neighboring device has to be Cisco NSF-aware.

Page 41: UMMTS Optimization

RUMA-II

Cisco NSF Overview

• One RP is active, one is standby.• Cisco Express Forwarding on the active RP synchronizes the FIB and adjacency

table to the standby RP.• Upon switchover, the new active RP uses the old FIB and adjacency table to

forward packets while the routing protocol reconverges.• BGP has to:

• Establish neighbor relationship without causing a reset of neighbor relationship.• Learn routing information.

• As the routing protocol starts to repopulate the RIB, it updates Cisco Express Forwarding.

Page 42: UMMTS Optimization

June, 2015

RUMA-II

Lesson 2:LFA (Loop Free Alternate)

Page 43: UMMTS Optimization

Reliance Jio Infocomm Limited 43

RUMA-II

LFA FRR (Loop Free Alternate Fast Reroute)

Confidential

Page 44: UMMTS Optimization

Reliance Jio Infocomm Limited 44

RUMA-II

Remote LFA FRR (Loop Free Alternate Fast Reroute)

Confidential

Page 45: UMMTS Optimization

Reliance Jio Infocomm Limited 45

RUMA-II

Remote LFA FRR Protection

Confidential

Page 46: UMMTS Optimization

Reliance Jio Infocomm Limited 46

RUMA-II

Remote LFA FRR- Comparison

Confidential

Page 47: UMMTS Optimization

Reliance Jio Infocomm Limited 47

RUMA-II

Remote LFA FRR- Benefits

Confidential

Page 48: UMMTS Optimization

May 22, 2015

RUMA-II

Lesson 4:BGP PIC & Bidirectional forwarding

Page 49: UMMTS Optimization

RUMA-II

BGP Prefix Independent Convergence

• PIC enhances BGP convergence, regardless of number of BGP prefixes.• PIC stores BGP backup/alternate path for each prefix in BGP, RIB, and FIB tables.• When the primary goes down, CEF quickly selects different egress port for affected

destination.

SPAS 123Customer CE1

CE2

PE1

PE2

Internet

Page 50: UMMTS Optimization

RUMA-II

Bidirectional Forwarding Detection for BGP

BFD Control PacketsEcho Packets

R1 R2

• Extremely lightweight hello protocol that uses UDP to test bidirectional communication

• Used to detect failures in the forwarding path between two adjacent routers• Millisecond resolution of forwarding plane failure• Relies on routing protocols to detect neighbors

Page 51: UMMTS Optimization

RUMA-II

• Routing protocol (BFD client) bootstraps BFD to create BFD session to a neighbor:• BFD client receives link status change notification. • Receive and transmit intervals are negotiated and configurable.

• Two systems agree on a method to detect failure.• In case of failure, BFD notifies BFD client:

• BFD client independently decides on action.

BFD Operation

R1 R2

BGP Neighbors

BFD Neighbors

BGP BFD

BFD BFD

BGP Bootstraps BFD

Page 52: UMMTS Optimization

May 22, 2015

RUMA-II

Thank You