survivability
play

Survivability Modern telecommunication network are built survivable - PowerPoint PPT Presentation

Lic.(Tech.) Marko Luoma (1/25) Lic.(Tech.) Marko Luoma (2/25) Survivability Modern telecommunication network are built survivable Network maintain service continuity (SLA: availability) in the presence of faults within the network


  1. Lic.(Tech.) Marko Luoma (1/25) Lic.(Tech.) Marko Luoma (2/25) Survivability Modern telecommunication network are built survivable � � Network maintain service continuity (SLA: availability) in the presence of faults within the network S-38.192 Verkkopalvelujen tuotanto � Requires mechanisms for protection and/or restoration S-38.192 Network Service Provisioning � Level of mechanisms depend on importance of traffic � 2 nines -> restoration Lecture 10: Resiliency � 5 nines -> protection (1:1) � 7 nines -> protection (1+1) Lic.(Tech.) Marko Luoma (3/25) Lic.(Tech.) Marko Luoma (4/25) Protection vs Restoration Different Modes Protection Restoration 1+1 protection � � � � Predetermined failure � Dynamic failure recovery � A separate secondary resource is dedicated for each primary recovery resource � Recovery path is � Protection path is computed after the � Traffic is sent on both resources and receiving end of resource precomputed and installed occurrence of a fault selects one copy to be transmitted further into the network � Reconfiguration 1:1 protection � � Reconfiguration � Selection of a new path � A separate secondary resource is dedicated for each primary � Switching the affected for the traffic resource traffic from faulty entity to � Rerouting the affected � Extra traffic is carried over the secondary resource but in case of backup entity traffic fault in primary traffic is pre-empted from the secondary

  2. Lic.(Tech.) Marko Luoma (5/25) Lic.(Tech.) Marko Luoma (6/25) Different Modes Restoration 1:N protection Local restoration � � � A secondary resource is set for a group of primary resources � Network device that detects the error uses local capabilites to circumvent the failed part of the network � Extra traffic is carried over the secondary resource but in case of fault in primar(y/ies) traffic is pre-empted from the secondary � In case of link; possible secondary link to same destination � In case of node; 3 rd node to circumvent failed node � Only a subset of primary traffic is delivered on secondary � Priorization of primaries � Leads to sub-optimal network state M:N protection (M<<N) Path restoration � � � M secondary resources are set for a group of primary resources � Source of the path recalculates new path in case of failure in primary path � Higher percentage of primary traffic is secured � Precalculation of disjoint paths is possible � Faster switch over time Lic.(Tech.) Marko Luoma (7/25) Lic.(Tech.) Marko Luoma (8/25) Restoration SDH Global restoration SDH networks are famous of their fast restoration in case of fault � � � Network node that detects fault in the network informs all other � Typically less than 50ms for complete restoration nodes in the network about existence of fault � Based on general idea of non-arbitrary network topologies � This depends on routing protocol � Double rings which can be restored by reversing the traffic at the � Link state routing: by removing the LSA ends of faulty section � Only if happens to be originator of LSA � Single action � Otherwise sits back and waits for timer to clean the � Single failure restoration within the ring LSDB (can be hours) � 50% of network capacity reserved for restoration � Distance vector routing: by calculating new routing vector

  3. Lic.(Tech.) Marko Luoma (9/25) Lic.(Tech.) Marko Luoma (10/25) SDH Ethernet Conventional Ethernet restoration is based on spanning trees � R1 R1 � Any arbitrary topology is turned into tree topology � Each node has weight which determines whether the root of the tree can be reached through it � Higher the value the more closer the root is R4 R2 R4 R2 � Wastes network resources by blocking loop forming interfaces R2 R6 C A I D R7 R5 R1 R3 R3 H E R3 B F G R4 Lic.(Tech.) Marko Luoma (11/25) Lic.(Tech.) Marko Luoma (12/25) Ethernet Ethernet Three are several versions of spanning tree protocol SDH type network restoration on top of Ethernet � � � 802.1d (original spanning tree) with long convergence time (50s) � Two manufacturers � 802.1w (Rapid Spanning Tree) with only few seconds of � Extreme Networks: Ethernet Automated Protection Switching convergence (EAPS) RFC 3619 � 802.1s (Multiple Instance Spanning Tree) per VLAN operation � Foundry: Metro Ring Protocol (MRP) All versions are based on same protocol operation � Basic idea same as in SDH � � Exchange of BPDU messages to determine whether or not interface � Ring type network topology should be blocked � Traffic reversion in case of error

  4. Lic.(Tech.) Marko Luoma (13/25) Lic.(Tech.) Marko Luoma (14/25) Ethernet Ethernet Each ring has a master which � R2 R6 C � blocks loop forming interface RING 1 RING 2 A � In case of fault opens the loop forming interface for traffic RING 3 I D � Detection of fault can be based on R7 R5 R1 R3 H E � Probes sent by the master B F G � Signalling from the device that detects the fault R4 � Convergence time of network is dependent on time between fault and notification of master � Varies between � Tens of milliseconds with device signalling � Hundreds of milliseconds with probes Lic.(Tech.) Marko Luoma (15/25) Lic.(Tech.) Marko Luoma (16/25) MPLS Link Protection LSP restoration processes are based on Constrained Shortest Path First Link protection offers per-link traffic protection � � routing algorithm for selecting bypass LSPs. � Each link on protected LSP has its own bypass for circumventing the Different reroute options are: failed link � � Link protection � Link protection can be made � Link and node protection � per LSP � Path protection � several LSPs can be aggregated into single bypass LSP � Dynamic restoration Requires that � � Separate bypass is calculted between each RSVP neighbor � Router tracks the interface status of egress link and reroutes the protected traffic by stacking the original label with label structure of bypass LSP

  5. Lic.(Tech.) Marko Luoma (17/25) Lic.(Tech.) Marko Luoma (18/25) Link/Node Protection Path protection Node protection is used to circumvent faults which may not be due to Path protection is done per ingress/egress pair and to each individual � � interconnecting link rather than next node. LSP � Bypass LSP is established around set of next link, node and link � Separate backup LSP is calculated through the network using using seprate router. disjoint resources � Otherwise node protection operates like link protection � Separate routers � Separate links R2 R6 R2 R6 C C Primary LSP Primary LSP Link protected bypass for E Path protected detour A I A D Link/Node protected bypass for R5 I D R7 R5 R7 R1 R3 R5 R1 R3 H E H E B B F G F G R4 R4 Lic.(Tech.) Marko Luoma (19/25) Lic.(Tech.) Marko Luoma (20/25) Path protection Switch Back In failure of primary LSP ingress point of LSP swaps into backup Switch back is process of rerouting the failed LSPs from their backups � � � Question is � Path protected LSPs this may not be wise � How can ingress become aware of failure in primary � Shifting the traffic causes always deteoriration � Upstream notification takes time to travel � Even with make-before-brake packets usually experience sequence errors � Additional delay in restoration of network status � Facility backups require some form of switch back � Into original paths ones they are up and running � Into new primaries if restoration of original primary is not expected to happen

  6. Lic.(Tech.) Marko Luoma (21/25) Lic.(Tech.) Marko Luoma (22/25) Dynamic Restoration IP If there are no other protections new LSP can also be calculated on IP restoration is based on convergence of routing protocols � � demand � Detection of fault � Failure of primary triggers on-demand calculation of a new primary � Hello timers � Failure is circumvented by the fact that failed resources are no � (L2 indications) longer in TED � (BFD indication) � Causes few hundred milliseconds of additional delay for � Flood of new LSAs restoration � Calculation of global routing tables � Instantion of new forwarding table Lic.(Tech.) Marko Luoma (23/25) Lic.(Tech.) Marko Luoma (24/25) IP IP Detection of errors Convergence of IP routing depends heavily on detection time of fault � � � Slow process if there is a L2 interconnection device between routers � Hello process -> tens of seconds � L2 may be up even though other router is dead � BFD -> some hundreds of milliseconds � L2 indication process works only if interconnection device fails � L2 indication -> few milliseconds � Normal Hello based detection (tens of seconds) Flooding process and SPF calculations take only some tens or hundreds � � Can be speeded up with usage of bi-directional forwarding detection of milliseconds (BFD) Of the shelf running networks can have large deadlocks due to default � � Probes are sent between forwarding planes of routers timer values: � Fault is signalled to routing process � Hello timer of 10s -> router dead 40s � LS refresh time 1800s -> LSA max age 3600s

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend