Professional Documents
Culture Documents
Established? One Session Forward The Traffic of Customers or Not?
Established? One Session Forward The Traffic of Customers or Not?
Question 29: What is CEF and without enabling CEF, can we make MPLS work?
CEF is mandatory in Cisco routers for MPLS.
Question 30: I am receiving end to end customer routes on various PE but not able to ping those
routes, what’s could be the problem?
as per your config the network which you are advertising in the BGP VRF Addressfamily for
customer will carry the next hop but in your IGP routing table that is not available. That why
you are not able to ping your customer becasue your next hop is not accessible in your IGP
Question 34: In neighbor discovery command, I am receiving only xmit, what does it mean
You can see only xmit in neighbor discovery command which means neighboring router
isn't sending any ldp hello packets
Question 39: I am using different vendor products and want to implement TDP, what type of
challenges will you face?
Question 40: What is the MFA Forum?
Question 41: What MPLS related mailing lists are there and what are they used for?
Question 42: How did MPLS evolve?
Question 43: What problems does MPLS solve?
Question 44: What is the status of the MPLS standard?
Question 45: What is a Label?
Section 3.1 of RFC 3031: “Multiprotocol Label Switching Architecture” defines a label as follows “A
label is a short, fixed length, locally significant identifier which is used to identify a FEC. The label
which is put on a particular packet represents the “Forwarding Equivalence Class” to which that
packet is assigned.”
Question 46: What is a Label Switch Path?
An LSP is a specific path traffic path through an MPLS network. An LSP is provisioned
using Label Distribution Protocols (LDPs) such as RSVP-TE or CR-LDP. Either of these
protocols will establish a path through an MPLS network and will reserve necessary
resources to meet pre-defined service requirements for the data path.
LSPs must be contrasted with traffic trunks. From RFC 2702: “Requirements for Traffic
Engineering Over MPLS,” “A traffic trunk is an aggregation of traffic flows of the same class
which are placed inside a LSP. It is important, however, to emphasize that there is a
fundamental distinction between a traffic trunk and the path, and indeed the LSP, through
which it traverses. In practice, the terms LSP and traffic trunk are often used synonymously.
The path through which a trunk traverses can be changed. In this respect, traffic trunks are
similar to virtual circuits in ATM and Frame Relay networks.”
Label Switching Routers (LSRs) use labels to forward traffic. A fundamental step to Label
Switching is that LSRs agree on the what labels they should use to forward traffic. They
come to this common understanding by using the Label Distribution
Label Distribution Protocol is a major part of MPLS. Similar mechanisms for Label exchange
existed in vendor implementations like Ipsilonâs Flow Management Protocol (IFMP), IBMâs
Aggregate Route-based IP Switching (ARIS), and Ciscoâs Tag Distribution Protocol. LDP
and labels are the foundation of Label Switching.
It provides an LSR discovery mechanism to enable LSR peers to find each other and establish
communication
It defines four classes of messages: DISCOVERY, ADJACENCY, LABEL
ADVERTISEMENT, and NOTIFICATION messages
It runs over TCP to provide reliable delivery of messages (with the exception of
DISCOVERY messages
LDP label distribution and assignment may be performed in several different modes:
There are many similarities between CR-LSP and RSVP-TE for constraint-based routing. The
Explicit Route Objects that are used are extremely similar. Both protocols use ordered Label
Switched Path (LSP) setup procedures. Both protocols include some QoS information in the
signaling messages to enable resource allocation and LSP establishment to take place
automatically.
At the present time CD-LDP development has ended and RSVP-TE has emerged as the
“winner” for traffic engineering protocols.
One example of an FEC is a set of unicast packets whose network layer destination address
matches a particular IP address prefix. A set of multicast packets with the same source and
destination network layer addresses is another example of an FEC. Yet another example is a
set of unicast packets whose destination addresses match a particular IP address prefix and
whose Type of Service bits are the same
Question 50: How are Label Switch Paths built?
A Label Switch Path (LSP) is a set of LSRs that packets belonging to a certain FEC travel in
order to reach their destination. Since MPLS allows hierarchy of labels known as label stack,
it is possible to have different LSPs at different levels of labels for a packet to reach its
destination. So more formally, a LSP of a packet with a label of level m is a set of LSRs that
a packet p has to travel at level m to reach its destination. Please refer to 3.15 of RFC 3031 –
Multiprotocol Label Switching Architecture, for a very formal and complete definition.
g. What is the relationship between MPLS and the Interior Routing Protocol
Interior Gateway Protocols (IGP), such as OSPF and IS-IS, are used to defined reachability
and the binding/mapping between FEC and next-hop address. MPLS learns routing
information from IGP (e.g., OSPF, IS-IS). Link-state Interior Gateway Protocol is typically
already running on large Corporations or Service Providers networks There are no changes
required to IGP routing protocols to support MPLS, MPLS-TE, MPLS QoS, or MPLS-BGP
VPNs.
A major goal of Internet Traffic Engineering is to facilitate efficient and reliable network
operations while simultaneously optimizing network resource utilization and traffic
performance.
The goal of TE is to compute a path from one given node to another (source routing), such
that the path does not violate the constraints (e.g. Bandwidth/administrative requirements…)
and is optimal with respect to some scalar metric. Once the path is computed, TE (a.k.a.
Constraint based routing) is responsible for establishing and maintaining forwarding state
along such a path.
In order to support Traffic engineering, besides explicit routing (source routing), the
following components should be available:
Ability to compute a path at the source by taking into account all the constraints. To do so the
source need to have all the information either available locally or obtained from other routers
in the network (e.g. Network topology)
Ability to distribute the information about network topology and attributes associated with
links throughout the network once the path is computed, need a way to support forwarding
along such a path
Ability to reserve network resources and to modify link attributes (as the result of certain
traffic taking certain routes)
Constraint shortest path first algorithm used in path calculation. This is a modified version of
the well known SPF algorithm extended to constraints support
RSVP extension used to establish the forwarding state along the path, as well as to reserve
resources along the path
Link state IGPs with extension (OSPF with Opaque LSAs, IS-IS with Link State Packets
TLV (type, length, value)) keeping track of topology changes propagation
From a forwarding point of view, packets within the same subset are treated by the LSR in
the same way, even if the packets differ from each other with respect to the information in the
network layer header. The mapping between the information carried in the network layer
header of the packets and the entries in the forwarding table of the LSR is many to one. That
is packets with different content of their network layer headers could be mapped into the
same FEC. (example of a FEC: set of unicast packets whose network layer destination
address match a particular IP address prefix…)
Loop prevention: provides methods for avoiding loops before any packets are sent on the path
– i.e. Path Vector
As far as loop mitigation is concerned, MPLS labeled packets may carry a TTL field that
operates just like the IP TTL to enable packets caught in transient loops to be discarded.
However, for certain medium such as ATM and Frame Relay, where TTL is not available,
MPLS will use buffer allocation as a form of loop mitigation. It is mainly used on ATM
switches which have the ability to limit the amount of switch buffer space that can be
consumed by a single VC.
Another technique for non TTL segment is the hop count approach: hop count information is
carried within the Link Distribution Protocol messages [3]. It works like a TTL. Hop count
will decrease by 1 for every successful label binding.
A third alternative adopted by MPLS is an optional loop detection technique called path
vector. A path vector contains a list of the LSRs that label distribution control message has
traversed. Each LSR which propagates a control packet (to either create or modify an LSP)
adds its own identifier to the path vector list. Loop is detected when an LSR receives a
message with a path vector that contains its own identifier. This technique is also used by the
BGP routing protocol with its AS path attribute.
Question 59: How does MPLS perform failure recovery?
When a link goes down it is important to reroute all trunks that were routed over this link.
Since the path taken by a trunk is determined by the LSR at the start of the MPLS path (head
end), rerouting has to be performed by the head end LSR. To perform rerouting, the head end
LSR could rely either on the information provided by IGP or by RSVP/CR-LDP.
However, several MPLS-specific resiliency features havebeen developed including Fast Re-
Route, RAPID, and Bidirectional Forwarding. See RFC 3469: “Framework for Multi-
Protocol Label Switching (MPLS)-based Recovery” for additional information.
Question 60: What differences are there in running MPLS in OSPF versus IS-IS environments
This is not an MPLS question but an IGP (Interior Gateway Protocol) question. MPLS
extensions, stated in IEFT RFC’s, are supported for both OSPF and IS-IS. MPLS and BGP-
VPN real-world deployments have been on both protocols for some time now.
There is much debate over which IGP is best. This is usually centered around scalability. The
street word is that IS-IS is more scaleable than OSPF. That is, a single OSPF area can support
150 plus routers and a single IS-IS area can support 500 plus routers. However, very large IS-
IS and OSPF networks have been deployed.
Ultimately, it is best to first understand the benefits and disadvantages of each protocol. Then
use the customer / network requirements to choice the IGP which best suites your needs.
Question 61: Can there be two or more Autonomous Systems within the same MPLS domain?
This is possible only under very restricted circumstances. Consider the ASBRs of two
adjacent ASes. If either or both ASBRs summarize eBGP routes before distributing them into
their IGP, or if there is any other set-up where the IGP routes cover a set of FECs which
differs from that of the eBGP routes (and this would almost always be the case), then the
ASBRs cannot forward traffic based on the top-level label. A similar argument applies to TE
tunnels. Some traffic usually will be either IP forwarded by the ASBR, or forwarded based on
a non-top-level label.
So there would usually be 2-3 MPLS forwarding domains if there were two ASes: one for
each of the two ASes, and possibly one for the link between the two ASBRs (in the case that
labelled packets instead of IP packets are forwarded between the two ASBRs).
Also, it’s likely that the ASBRs could not be ATM-LSRs, as ATM-LSRs typically have
limited or no capability of manipulating label stacks or forwarding unlabelled IP traffic.
(1) and (2) are both true, which implies that different definitions of the boundary of the
administrative domains can exist with respect to different levels in the label stack. It is also
(in hindsight) obvious that different MPLS domain boundaries can exist with respect to
different levels of the label stack.
MPLS VPNs
It should be noted that using MPLS for VPNs simply provides traffic isolation, much like an
ATM or Frame Relay service. MPLS currently has no mechanism for packet encryption, so if
customer requirements included encryption, some other method, such as IPsec, would have to
be employed. The best way to think of MPLS VPNs is to consider them the equivalent of a
Frame Relay or ATM virtual circuit.
Question 63: What alternatives are there for implementing VPNs over MPLS?
Question 64: What is the “Martini Draft’?
The “Martini Draft” actually refers to set of Internet drafts co-authored by Luca Martini. These drafts
define how MPLS can be used to support Layer 2 transport services such as Ethernet, Frame Relay
and/or ATM. Martini drafts define Layer 2 encapsulation methods, as well as Layer 2 transport
signaling methods.
The IETF’s “Layer 2 Virtual Private Networks (l2vpn)” working group is currently defining
standards for provisioning Layer 2 VPN services. Current working group drafts can be
located at http://www.mplsrc.com/standards.shtml under the sub-heading “Layer 2 VPNs and
Layer 2 Emulation.”
Question 66: What is a Virtual Private LAN Service (VPLS)?
VPLS refers to a method for using MPLS to create virtual LAN services based on Ethernet.
In this type of service, all edge devices maintain MAC address tables for all reachable end
nodes, much in the same way as a LAN switch.
Among many network security professionals, the term “VPN” implies “encrypted” tunnels
across a public network. Since MPLS-VPNs do not require encryption, there is often
concern over the security implications of using MPLS to tunnel non-encrypted traffic over
a public IP network. There are a couple of points to consider in this debate:
MPLS-VPN traffic is isolated by the use of tags, much in the same way ATM and Frame
Relay PVCs are kept isolated in a public ATM/Frame Relay network. This implies that
security of MPLS-VPNs is equivalent to that of Frame Relay or ATM public network
services. Interception of any of these three types of traffic would require access to the
service provider network.
The debate over MPLS security really comes down requirements of the customer.
Customers comfortable with carrying their traffic over public ATM or Frame Relay
services should have the same level of comfort with MPLS-VPN services. Customers
requiring additional security should employ encryption in addition to MPLS.
MPLS supports the same QoS capabilities as IP. These mechanisms are IP Precedence,
Committed Access Rate (CAR), Random Early Detection (RED), Weighted RED,
Weighted Fair Queuing (WFQ), Class-based WFQ, and Priority Queuing. Proprietary and
non-standard QoS mechanisms can also be support but are not guaranteed to interoperate
with other vendors.
Since MPLS also supports reservation of Layer 2 resources, MPLS can deliver finely
grained quality of service, much in the same manner as ATM and Frame Relay.
DiffServ can support up to 64 classes while the MPLS shim label supports up to 8 classes.
This shim header has a 3-bit field defined ãfor experimental use. This poses a problem.
This Exp field is only 3 bits long, whereas the Diff-Serv field is 6 bits. There are different
scenarios to work around this problem.
There are two alternatives that address this problem called Label-LSP and Exp-LSP
models. But they introduce complexity into the architecture. The diffserv model
essentially defines the interpretation of the TOS bits. As long as the IP precedence bits
map to the Exp bits the same interpretation as the diffserv model can be applied to these
bits. In the case where additional bits are used in the diffserv model, one can essentially
use the label value to interpret the meaning of the remaining bits. Recognizing that 3 bits
are sufficient to identify the required number of classes, the remaining bits in the diffserv
model are used for identifying the drop priority and these drop priorities can be mapped
into an L-LSP in which case the label identifies the drop priority while the exp bits
identify the Class that the packet belongs to.
Many Service Provides have or will add just a few classes. This small enhancement will
be hard enough to provision, manage and sell. This would be an effective strategy to get to
market quickly with a value-added service.
The followings classes may be more appropriate for the initial deployment of MPLS QoS:
MPLS makes it possible to apply QoS across very large routed or switched networks
because Service Providers can designate sets of labels that have special meanings, such as
service class. Traditional ATM and Frame Relay networks implement CoS with point-to-
point virtual circuits, but this is not scalable for IP networks. Placing traffic flows at the
edge into service classes enables providers to engineer and manage classes throughout the
network.
Generalized MPLS
GMPLS represents a natural extension of MPLS to allow MPLS to be used as the control
mechanism for configuring not only packet-based paths, but also paths in non-packet
based devices such as optical switches, TDM muxes, and SONET/ADMs.
GMPLS introduces a new protocol called the “Link Management Protocol” or LMP. LMP
runs between adjacent nodes and is responsible for establishing control channel
connectivity as well as failure detection. LMP also verifies connectivity between channels.
Additionally, the IETF’s “Common Control and Measurement Plane” working group
(ccamp) is working on defining extensions to interior gateway routing protocols such as
OSPF and IS-IS to enable them to support GMPLS operation.
Link Bundling – the grouping of multiple, independent physical links into a single logical
link
Link Hierarchy – the issuing of a suite of labels to support the various requirements of
physical and logical devices across a given path
GMPLS supports two methods of operation, peer and overlay. In the peer model, all
devices in a given domain share the same control plane. This provides true integration
between optical switches and routers. Routers have visibility into the optical topology and
routers peer with optical switches. In the overlay model, the optical and routed (IP) layers
are separated, with minimal interaction. Think of the overlay model as the equivalent of
today’s ATM and IP networks, where there is no direct connection between the ATM
layer and the IP routing layer.
The peer model is inherently simpler and more scalable, but the overlay model provides
fault isolation and separate control mechanisms for the physical and routed network
layers, which may be more attractive to some network operators.
39. Can voice and video traffic be natively encapsulated into MPLS?
Yes. The MFA Alliance has released a bearer transport implementation agreement which
can be viewed at http://www.mfaforum.org/VoMPLS_IA.pdf.
MPLS Management
Currently, most MPLS implementations are managed using CLI. Tools such as WANDL’s
NPAT simulator allow MPLS networks to be modeled prior to deployment.
Several companies in the operational support systems product space have introduced tools
designed to ease MPLS network management and automatically provision LSPs.
Several conferences are devoted to, or include presentations on MPLS. These include:
44. Are there any labs that are performing MPLS interoperability testing?
The University of New Hampshire Interoperability Lab has set up a MPLS Consortium for
vendors to test the interoperability of their products and to support MPLS standards
development. More information is available on their web site
at http://www.iol.unh.edu/consortiums/mplsServices/.
Isocore in Fairfax, VA conducts interoperability testing and hosts the “MPLS 200x”
annual event each fall in Washington D.C.
The MFA Forum has conducted several GMPLS interoperability testing events at
conferences such as SuperComm and Next Generation Networks.
Photonic Internet Lab is supported by the Government of Japan and provides testing and
simulation efforts for GMPLS development.