Mpls 17
Mpls 17
draft-umansky-mpls-tp-ring-protection-switching
Igor Umansky
Huub van Helvoort
Introduction
The MPLS-TP section layer OAM is used to monitor the connectivity between
each two adjacent nodes.
2
Protection ring
3
Architecture types – Wrapping
Wrapping:
The Wrapping technique implies that the node detecting a failure sends out
an APS request to the (opposite to the failure) node adjacent to the failure.
The APS request is transmitted over the APS communication protocol.
When a node detects a failure or receives an APS request through APS
protocol addressed to this node, the traffic of all working LSPs/tunnels
transmitted towards the failed span is switched to the protection
LSPs/tunnels in the opposite direction (away from the failure). This traffic
travels around the ring to the other node (adjacent to the failure) where it
is switched back onto the working LSPs/tunnels.
The nodes that performed the protection switching revert back to the
normal traffic flow when the failure or APS request is cleared.
4
Wrapping example – point-to-point
a) Normal state
b) Failed state
Bandwidth guaranteed for working traffic
Bandwidth available for protection traffic
Note: Bandwidth for unprotected traffic is not presented here
5
Wrapping example – point-to-multipoint
LSP Q
a) Normal state
b) Failed state
Bandwidth dedicated for working traffic
Bandwidth dedicated for protection traffic
6
Architecture types – Steering
The Steering technique implies that the node detecting a failure sends an
APS request to the node adjacent to the failure (away from the failure).
The APS request is processed by all intermediate nodes in the ring. For each
affected LSP the source node (that adds traffic onto the ring) and the sink
node (that drops the traffic from the ring) switches the traffic from working
LSPs/tunnels to the protection LSPs/tunnels and restore normal traffic flow
when the failure or APS request is cleared.
7
Steering example
a) Normal state
b) Failed state
Bandwidth guaranteed for working traffic
Bandwidth available for protection traffic
Note: Bandwidth for unprotected traffic is not presented here
8
APS protocol operation basics
The MPLS-TP MRPS protection operation is controlled with the help of the
MPLS-TP Section OAM APS protocol.
The APS protocol carries the APS requests, both automatic and externally
generated commands, between the ring nodes.
9
APS protocol operation basics (cont.)
10
Protection switching triggers
11
Manual control
The following commands (bridge requests) are transferred by the APS PDU:
Lockout of Protection
Forced Switch to protection
Manual Switch to protection
Exercise
12
Automatically initiated commands
13
APS payload fields
Destination Node ID: The destination node ID is set to the value of the node
ID for which the APS request is destined. The destination node ID is always
that of an adjacent node.
Source node ID: The source node ID is set to the value of the node ID of the
node generating the APS request.
Bridge Request code: A code consisting of four bits carrying the bridge
request message from a tail-end node to the head-end node requesting the
head-end to perform a bridge of the normal traffic signals.
14
Next steps
Finalise descriptions.
15