VNPT VN2 Network Design
Short Description
Download VNPT VN2 Network Design...
Description
VTN VN2 High Level Design
VTN VN2 High Level Design
May 2009
Final Version
2 of 130
VTN VN2 High Level Design
Document Revision history Version
Date
Author
Comment / Changes
V0.1
29/12/08
Ronald Lee, Leonard Tan
First draft for comments
V0.2
9/1/09
Ronald Lee, Ma Shaowen
Second draft for comments
V0.3
22/1/09
Ronald Lee
Third draft for comments
V.0.4
20/1/09
Ronald Lee, Leonard Tan, Anh Tuan Chu, Ed Spencer
Fourth draft for comments
V.0.5
1/3/09
Ronald Lee, Ed Spencer
Fifth draft for comments
V0.6
14/03/09
Ed Spencer, Leonard Tan, Anh Tuan Chu
Sixth draft version
V0.7
20/03/09
Leonard Tan, Ma Shaowen, Anh Tuan Chu
Seventh draft version
V0.8
04/05/09
Leonard Tan, Ma Shaowen
Incorporated inputs from the 22Apr meeting
Document Distribution Name
Title
Company
3 of 130
VTN VN2 High Level Design
Table of Contents Document Revision history ............................................................................................................... 1 Document Revision history ............................................................................................................... 2 Document Distribution....................................................................................................................... 2 Table of Contents.............................................................................................................................. 3 1 Scope ....................................................................................................................................... 5 2 Assumptions............................................................................................................................. 5 3 Introduction .............................................................................................................................. 5 4 Network Design Requirements ................................................................................................. 5 5 Physical Network Topology ...................................................................................................... 5 5.1 Network Architecture........................................................................................................ 5 5.2 Existing Network Architecture Caveats ............................................................................ 5 5.3 POP Types and POP design............................................................................................ 5 5.3.1 Type A1 ................................................................................................................... 5 5.3.2 Type A2 ................................................................................................................... 5 5.3.3 Type A3 ................................................................................................................... 5 5.3.4 Type A4 ................................................................................................................... 5 5.3.5 Type A5 ................................................................................................................... 5 5.3.6 Type A6 ................................................................................................................... 5 5.3.7 Type B1 ................................................................................................................... 5 5.3.8 Type B2 ................................................................................................................... 5 5.3.9 Type B3 ................................................................................................................... 5 5.3.10 Type B4 ................................................................................................................... 5 5.3.11 Type B5 ................................................................................................................... 5 5.3.12 Type B6 ................................................................................................................... 5 5.3.13 Type C1................................................................................................................... 5 5.3.14 Type C2................................................................................................................... 5 5.3.15 Type C3................................................................................................................... 5 5.3.16 Type C4................................................................................................................... 5 5.3.17 Type C5................................................................................................................... 5 5.3.18 Type D..................................................................................................................... 5 5.3.19 HNI ASBR ............................................................................................................... 5 5.3.20 HCM ASBR ............................................................................................................. 5 5.3.21 DNG ASBR.............................................................................................................. 5 5.4 Aggregated Core plane facing uplinks ............................................................................. 5 5.5 Network elements types and positioning. ......................................................................... 5 6 Logic al Network Topology ........................................................................................................5 6.1 IP Addressing and naming convention. ............................................................................ 5 6.1.1 IP Addressing .......................................................................................................... 5 6.1.2 Node Naming .......................................................................................................... 5 6.1.3 Port Naming ............................................................................................................ 5 6.1.4 Network Interface Naming ....................................................................................... 5 6.1.5 Service Distribution Point Naming ........................................................................... 5 6.2 IP Routing Recommendations ......................................................................................... 5 6.2.1 Overview ................................................................................................................. 5 6.3 Routing and Control Protocols ......................................................................................... 5
4 of 130
VTN VN2 High Level Design
6.4 End-to-End Logical Topology ........................................................................................... 5 6.4.1 IGP .......................................................................................................................... 5 6.4.2 IGP in Metro Networks ............................................................................................ 5 6.4.3 In-band management to Metro Networks................................................................. 5 6.4.4 BGP......................................................................................................................... 5 6.5 IP Multicast Recommendations........................................................................................ 5 6.5.1 Rendezvous Point (RP) placement.......................................................................... 5 6.5.2 Reverse Path Forwarding (RPF) considerations...................................................... 5 6.6 MPLS Topology and Signalling Overview. ....................................................................... 5 6.6.1 Overview ................................................................................................................. 5 6.6.2 Usage ...................................................................................................................... 5 6.6.3 Backbone MPLS...................................................................................................... 5 6.6.4 RSVP Signalled LSP Topology................................................................................ 5 6.6.5 Traffic Engineering .................................................................................................. 5 6.6.6 Edge MPLS ............................................................................................................. 5 6.7 High Availability................................................................................................................ 5 6.7.1 Border Router related Failure .................................................................................. 5 6.7.2 PE upstream related Failure .................................................................................... 5 6.7.3 P router RSVP Label Switch Path Recovery ........................................................... 5 6.8 Network QoS Design ....................................................................................................... 5 6.8.1 QoS Overview ......................................................................................................... 5 6.8.2 Scheduling............................................................................................................... 5 6.8.3 QoS Design ............................................................................................................. 5 6.8.4 QoS on Juniper router ............................................................................................. 5 6.9 Network Security Recommendation ................................................................................. 5 6.9.1 Generic Node Access.............................................................................................. 5 6.9.2 Authentication, Authorization, and Accounting (AAA) .............................................. 5 6.9.3 User Accounts and Passwords ................................................................................ 5 6.9.4 Packet Filtering Toolset ........................................................................................... 5 6.9.5 Securing Nodes ....................................................................................................... 5 6.9.6 Securing Client Services ......................................................................................... 5 6.9.7 Juniper network management and security ............................................................. 5 7 Service Network Topology........................................................................................................5 7.1 Core and MANs interconnect ........................................................................................... 5 7.2 Service Architecture ......................................................................................................... 5 7.2.1 Ethernet Leased line service using L2 VPN............................................................. 5 7.2.2 Wide Area Switched LAN Service using VPLS ........................................................ 5 7.2.3 Wide area Routed LAN service using VPRN ........................................................... 5 7.2.4 High Speed Internet Service.................................................................................... 5 7.2.5 IPTV Video Core distribution using multicast ........................................................... 5 8 Network Management ..............................................................................................................5 8.1 Alcatel-Lucent 5620 SAM Element Manager (5620 SAM-E) ............................................ 5 8.2 Alcatel-Lucent 5620 SAM-Assurance (SAM-A) ................................................................ 5 8.3 Alcatel-Lucent 5620 SAM Provisioning (SAM-P).............................................................. 5 8.4 Alcatel-Lucent 5620 SAM Open Interface (SAM-O) ......................................................... 5 8.5 Alcatel-Lucent 5620SAM Redundancy............................................................................. 5 8.5.1 Activity switches, failovers, and switchovers............................................................ 5 8.5.2 Server activity switches ........................................................................................... 5
5 of 130
VTN VN2 High Level Design
8.5.3 Database switchovers ............................................................................................. 5 8.5.4 Database failovers................................................................................................... 5 8.5.5 Events associated with an activity switch. ............................................................... 5 8.6 Direct 5620 SAM Client Access ....................................................................................... 5 8.7 IP Addressing and Naming convention ............................................................................ 5 8.8 Bandwidth Requirement................................................................................................... 5 8.8.1 Bandwidth Requirements SAM to Network Elements .............................................. 5 8.8.2 Details on the Bandwidth Requirements .................................................................. 5 8.8.3 Possible consequences of insufficient bandwidth .................................................... 5 8.9 Server Hardware .............................................................................................................. 5 8.10 Security ............................................................................................................................ 5 8.10.1 TACACS+ Configuration.......................................................................................... 5 8.10.2 Communication Port Requirements for 5620-SAM Components ............................. 5 8.11 Network Time Protocol..................................................................................................... 5 9 NMS WANDL IP/MPLSView Solution ...................................................................................... 5 9.1 What Can WANDL Solution Offer .................................................................................... 5 9.1.1 Overview ................................................................................................................. 5 9.1.2 Online Operation Management................................................................................ 5 9.1.3 Offline Planning Simulation ..................................................................................... 5 9.1.4 Provisioning & Service Management ....................................................................... 5 9.2 Design of WANDL NMS Solution for VN2 ........................................................................ 5 9.2.1 Overall Architecture ................................................................................................. 5 9.2.2 Machines ................................................................................................................. 5 9.2.3 User Admin.............................................................................................................. 5 9.2.4 Backup .................................................................................................................... 5 10 Conclusion ............................................................................................................................... 5 References. ...................................................................................................................................... 5 Glossary............................................................................................................................................ 5
6 of 130
VTN VN2 High Level Design
1 Scope (quy mô) The scope of this document is to provide the High-Level Design considerations to ensure a stable and scalable Network implementation using the Alcatel-Lucent 7750 Service Router series. Detail is given regarding architectural high-level design principles, approaches and technology selections, however no attempt is made to detail explicit comman0064-line configuration.
7 of 130
VTN VN2 High Level Design
2 Assumptions This document assumes that the reader is reasonably familiar with IP/MPLS, Layer-2 and Layer-3 VPNs.
8
VTN VN2 High Level Design
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
3 Introduction VNPT will implement a next generation network (NGN) and Alcatel-Lucent has been selected to be the IPCORE Provider Edge (PE) router & Autonomous System Border Router (ASBR) equipment supplier for the VN2 Network. The VN2 network is being envisaged to house all of VNPT‟s existing networks, inclusive of all Metropolitan Networks, High speed Internet delivery Core and evolve into a new unified next-generation Core network. VN2 is to be built and expanded over time to accommodate all of VNPT‟s existing service offerings and support the introduction of new services such as IP Television and Videoon-Demand. This document provides high level design (HLD) & recommendations for the VN2 project specific to the PE and ASBR routers. Topics & specifications mentioned in this high level design document will provide the foundation as implementation specifications for the low level design (LLD) phase, which will translate the mentioned implementation specifications into machine specific configurations.
VTN VN2 High Level Design
4 Network Design Requirements VN2 is poised to be the national NGN backbone network with the capabilities of delivering the following services as depicted by VNPT: •
High Speed Internet (Broadband access)
•
Voice over IP (VoIP)
•
Multicast Video services (e.g. IPTV, Video Conferencing)
•
Unicast Video services (e.g. Video on Demand)
•
Layer 3 IP-VPN services
•
Layer 2 VPN services (VPLS & Pseudo-wire/VPWS)
VTN VN2 High Level Design
5 Physical Network Topology This section describes the proposed physical network architecture.
5.1
Network Architecture
The VN2 is based on a dual Core Router plane design with 5 main core regions. These are namely: HNI, HCM, HPG, DNG & CTO. Provider edge routers within these 5 regions will be connected to the 2 Core routers located in the regional Central Office (CO). Core Routers are T-1600 supplied by Juniper Networks. Provider Edge routers and Autonomous system border routers are 7750SR-7 supplied by Alcatel-Lucent. There are a total of 10 Core routers, 79 Provider edge routers and 5 ASBR routers in the VN2 IPCore Network. It is expected that the PE routers will have high speed connectivity to BRAS and Metro Ethernet networks to be realised in separate tenders.
Figure 1: VN2 IP Core Network
Enhancement to the requested VN2 network architecture have been proposed in this high level design document to provide increased service availability and improve the level of optimum route path selection. These enhancements are essentially inter-PE connectivity for PoP with dual PE routers as well as inter- ASBR connectivity for sites with dual ASBR PE routers. For dual PE router POPs, Alcatel-Lucent strongly recommend that a series of Inter- PE link be added so as to provide increased service availability in the event of link failure to the P router.
VTN VN2 High Level Design
5.2
Existing Network Architecture Caveats
Figure 2: Failure Scenario: Inter POP VPLS
In the above failure scenario, a VPLS service is in service between HPG POP and NDH POP. Failure of the STM-64 link of HPG PE1 to HPG P1 will render the VPLS service be split into 2 isolated VPLS islands. As the failure occurred on the MPLS network interface towards HPG P1, the connected MAN-E will not be aware of the failure until the MAC address ages out. This failure scenario can be mitigated by introducing inter PE connection so that VPLS isolation does not occur during a link failure with the P router node. If the inter PE link is unavailable, the failure scenario can alternatively be mitigated by connecting the VPLS instance to an additional VLAN created within the MAN-E Metro Core to support the redundancy, RSTP will have to be configured on the VPLS for the purpose of breaking the layer 2 loop created. This will be the temporary solution until the inter-PE link is made available. The recommended bandwidth for the Inter-PE node shall be at least 3.3Gbps assuming a protection ratio of 1:3. Therefore, this will translate to a 4 x 1GE LAG between the PE nodes.
VTN VN2 High Level Design
5.3
POP Types and POP design
This section describes the various type of Point of Presence. 5.3.1 Type A1
Type A1 POP have 2 units of 7750 SR7 dual homed to MAN using 10GE interfaces as well as dual homed to P routers using STM-64 interfaces. Alcatel- Lucent recommends 4 x 1GE links between the PE router pair for increased availability. Alcatel-Lucent understands that this could only be added in subsequent expansion/variation order. 5.3.2 Type A2
Type A2 P OP have 2 units of 775 0 SR7 dual homed to MAN using 4 x 1GE interfa ces as well as d ual homed to P routers using STM- 64 interfaces. However, the 1GE modules are not present and it is understood that VTN will be putting up request to acquire these modules for deployment. In addition, 2 x 10GE interfaces are planned for connectivity to BRAS pair. Alcatel-Lucent recommends 4 x 1GE links between the PE router pair for increased availability. It is understood that provisioning the Inter-PE links could only be added in subsequent expansion/variation order.
VTN VN2 High Level Design
5.3.3 Type A3
Type A3 POP have 2 units of 7750 SR7 dual homed to MAN using 5 x 1GE interfaces as well as dual homed to P routers using STM-64 interfaces. However, the 1GE modules are not present and it is understood that VTN will be putting up request to acquire these modules for deployment. In addition, 1 x 10GE interface is planned for connectivity to BRAS pair. Alcatel-Lucent recommends 4 x 1GE links between the PE router pair for increased availability. It is understood that provisioning the Inter-PE links could only be added in subsequent expansion/variation order. 5.3.4 Type A4
Type A4 POP have 2 units of 775 0 SR7 dual homed to M AN u sing 5 x 1GbE interfaces as well as dual homed to P routers using STM-64 interfaces. However, the 1GE modules are not present and it is understood that VTN will be putting up request to acquire these modules for deployment. In addition, 2 x 10GbE interfaces are planned for connectivity to BRAS pair. Alcatel-Lucent recommends 4 x 1GE links between the PE router pair for increased availability. It is understood that provisioning the Inter-PE links could only be added in subsequent expansion/variation order.
VTN VN2 High Level Design
5.3.5 Type A5
Type A5 POP have 2 units of 7750 SR7 dual homed to MAN using 3 x 1GE interfaces as well as dual homed to P routers using STM-64 interfaces. However, the 1GE modules are not present and it is understood that VTN will be putting up request to acquire these modules for deployment. In addition, 2 x 10GE interfaces are planned for connectivity to BRAS pair. Alcatel-Lucent recommends 4 x 1GE links between the PE router pair for increased availability. It is understood that provisioning the Inter-PE links could only be added in subsequent expansion/variation order. 5.3.6 Type A6
Type A6 POP have 2 units of 7750 SR7 dual homed to MAN using 6 x 1GE interfaces as well as dual homed to P routers using STM-64 interfaces. However, the 1GE modules are not present and it is understood that VTN will be putting up request to acquire these modules for deployment. In addition, 3 x 10GE interfaces are planned for connectivity to BRAS pair. Alcatel-Lucent recommends 4 x 1GE links between the PE router pair for increased availability. It is understood that provisioning the Inter-PE links could only be added in subsequent expansion/variation order.
VTN VN2 High Level Design
5.3.7 Type B1
Type B1 POP have 1 unit of 7750 SR7 dual homed to P routers using 2 x STM-16 interfaces. In addition, 1 x 1GE interface to MAN and 1 x 1GE interface to BRAS are planned. 5.3.8 Type B2
Type B2 POP have 1 unit of 7750 SR7 dual homed to P routers using 2 x STM-16 interfaces. In addition, 1 x 1GE interface to MAN and 2 x 1GE interface to BRAS are planned.
VTN VN2 High Level Design
5.3.9 Type B3
Type B3 POP have 1 unit of 7750 SR7 dual homed to P routers using 2 x STM-16 interfaces. In addition, 2 x 1GE interfaces to MAN and 2 x 1GE interfaces to BRAS are planned. 5.3.10 Type B4
Type B4 POP have 1 unit of 7750 SR7 dual homed to P routers using 2 x STM-16 interfaces. In addition, 2 x 1GE interfaces to MAN and 3 x 1GE interfaces to BRAS are planned.
VTN VN2 High Level Design
5.3.11 Type B5
Type B5 POP have 1 unit of 7750 SR7 dual homed to P routers using 2 x STM-16 interfaces. In addition, 3 x 1GE interfaces to MAN and 3 x 1GE interfaces to BRAS are planned. 5.3.12 Type B6
Type B6 POP have 1 unit of 7750 SR7 dual homed to P routers using 2 x STM-16 interfaces. In addition, 3 x 1GE interfaces to MAN and 4 x 1GE interfaces to BRAS are planned.
VTN VN2 High Level Design
5.3.13 Type C1
Type C1 POP have 1 unit of 7750 SR7 dual homed to P routers using 3 x STM-16 interfaces. In addition, 3 x 1GE interfaces to MAN and 1 x 10GE interface to BRAS are planned. 1GE interfaces are absent from the initial order, it is understood that VTN will be putting up additional order in time for deployment. 5.3.14 Type C2
Type C2 POP have 1 unit of 7750 SR7 dual homed to P routers using 3 x STM-16 interfaces. In addition , 3 x 1GE interfaces to MAN and 3 x 1GE interfaces to BRAS are planned.
VTN VN2 High Level Design
5.3.15 Type C3
Type C3 POP have 1 unit of 7750 SR7 dual homed to P routers using 3 x STM-16 interfaces. In addition, 2 x 1GE interfaces to MAN and 4 x 1GE interfaces to BRAS are planned. 5.3.16 Type C4
Type C4 POP have 1 unit of 7750 SR7 dual homed to P routers using 3 x STM-16 interfaces. In addition, 3 x 1GE interfaces to MAN and 4 x 1GE interfaces to BRAS are planned.
VTN VN2 High Level Design
5.3.17 Type C5
Type C5 POP have 1 unit of 7750 SR7 dual homed to P routers using 3 x STM-16 interfaces. In addition, 4 x 1GE interfaces to MAN and 4 x 1GE interfaces to BRAS are planned. 5.3.18 Type D
Type D POP have 1 unit of 7750 SR7 dual homed to P routers using 4 x STM-16 interfaces. Interface requirement for Mobile Access/Core is yet to be determined.
VTN VN2 High Level Design
5.3.19 HNI ASBR
Hanoi ASBR POP will have 2 units of 7750 SR7 dual homed to P routers using 5 x STM64 interfaces as well as 5 x 10GE interfaces to VDC1. Alcatel-Lucent recommends minimum of 1 x 10GE links between the ASBR router pair for increased availability and improved routing convergence. It was understood that Inter-ASBR link could only be added in subsequent expansion/variation order. Therefore, 10GE interfaces originally planned for connectivity to VDC has been reconfigured to allow for interconnectivity between ASBR routers. Alcatel-Lucent would request for VTN to plan for the replenishment of these 10GE interfaces where possible. 5.3.20 HCM ASBR
Ho Chi Minh ASBR POP will have 2 units of 7750 SR7 dual homed to P routers using 5 x STM-64 interfaces as well as 6 x 10GE interfaces to VDC2. Alcatel- Lucent recommends minimum of 1 x 10GE links between the ASBR router pair for increased availability and improved routing convergence. It was understood that Inter-ASBR link could only be added in subsequent expansion/variation order. Therefore, 10GE interfaces originally planned for connectivity to VDC has been reconfigured to allow for interconnectivity between
VTN VN2 High Level Design
ASBR routers. Alcatel-Lucent would request VTN to plan for the replenishment of these 10GE interfaces where possible. 5.3.21 DNG ASBR
Da Nang ASBR POP will have 1 unit of 7750 SR7 dual homed to P routers using 4 x STM64 interfaces as well as 4 x 10GE interfaces to VDC3.
5.4
Aggregated Core plane facing uplinks
For the purpose of supporting P router plane planning, the below table illustrated the aggregated bandwidth from various PE routers.
HNI HPG DNG CTO HCM Bandwidth Aggr BW
Plane 1 Plane 2 STM64 STM16 STM64 STM16 4 24 4 20 1 6 1 5 3 13 3 13 1 16 1 12 5 10 5 7 138880 171120 138880 141360 310000 280240
VTN VN2 High Level Design
5.5
Network elements types and positioning.
The offered Network Provider edge (PE) router and Autonomous System Border Router (ASBR) are both Alcatel-Lucent 7750SR-7 service routers. PE routers are equipped with 2nd generation I/O modules (IOM-2) with 40Gbps/slot capacity giving a total of 200Gbps capacity per system. PE routers can be upgraded in the future with the replacement of IOMs and MDAs to achieve greater performance of up to 100Gbps/slot. ASBR routers are equipped with 3rd generation I/O modules (IOM3XP) and Media dependent Adapters (MDA-XP) with 100Gbps/slot capacity giving a total of 500Gbps capacity per system. The 7750 SR-7 chassis is a fully redundant system and has a total of seven front access slots. Two card slots are dedicated for redundant common equipment, each of which holds one Switch Fabric/Control Processor Module (SF/CPM). Only one SF/CPM is required for full, non- blocking operation at 500 Gbps. A second SF/CPM provides complete redundancy of the fabric and the control processors. When two SR-7 SF/CPMs are installed, the traffic is load shared across the switch fabrics. The remaining five slots are used for Input / Output Module (IOM) baseboards. The 7750 SR-7 chassis supports redundant power and fan trays and is designed to be NEBS Level-3 compliant. Power options for the SR-7 include -48V DC or 120/240V AC power, supporting 1+1 redundancy. All power connection are made in the rear via 2 separate Power Entry Modules (PEMs). In addition to the PEMs, there are also DC line conditions that must be installed in the front of the chassis. System cooling within the SR-7 uses right to back airflow. Two (2) separate fan trays provide 1+1 cooling redundancy. Both fan trays are inserted in the back of the SR-7 chassis. The dimensions for the SR-7 are 14”H x 17.5”W x 23.5”D, meaning five SR-7s will fit in a 7 foot Telco rack with room for a breaker panel.
The Juniper Networks T1600 Core Router is positioned in the VN2 network in the role of the P router. The T1600 is an (8) slot chassis, supporting up to 100Gigabit/sec per slot. Line card options to be used in the VN2 network include the 100Gigabit/sec T1600 Type-4 FPC, supporting two 4-port STM-64 PIC modules, and the 40Gigabit/sec Type-3 FPC, supporting up to four 1-port STM-64 or 4-port STM-16 PIC modules. The T1600 is a fully redundant system. Switch Interface Boards (SIB) redundancy is available as N+N, with a minimum redundancy of 4+1 available at full system capacity, great redundancy available at lower utilization,
VTN VN2 High Level Design
and a capability of graceful capacity degradation in the event of multiple failures. The Routing Engine (RE) used in VN2 is the RE-A-2000, and redundancy is 1+1, with a graceful failover capability available. Power Entry Modules (PEM) are also 1+1 redundant with load sharing capability and with multiple inputs per PEM providing a greater level of protection from individual circuit failure.
VTN VN2 High Level Design
6 Logical Network Topology 6.1
IP Addressing and naming convention.
This section addresses the recommendation for IP addressing and general naming convention to be used on the nodes. 6.1.1 IP Addressing All nodes in VN2 (P, PE, ASBR and RR) will use public IP for loopback and interface addresses. The MAN nodes will use public IP for loopback addresses and private IP for interface addresses. MAN should use separate contiguous IP address blocks for the loopback and interface addresses. 6.1.2 Node Naming Node names will be standardized and have a fixed length. The nodes will be named based on the function that they are performing, the node model and their physical location. The format will be as follows:
Three-letters defining a site location; for example HNI for Hanoi or HPG for Hai Phuong.
A three-letter code indicating the function of the node; NPE for Multi Service Network PE router, NPR for Network Core router, ASR for ASBR Router, ACC for Access Router, SAM for 5620SAM Application Server & SDB for 5620SAM Database Server.
A two-digit number representing the node number at this location. Where a location has multiple nodes of the same function then there will be a requirement for each node to be uniquely identified.
For example: HNINPE01
First 7750 SR Multi Service router in Hanoi
HPGAGG01
First 7450 ESS Aggregation router in Hai Phuong
All naming should be represented in UPPER CASE. 6.1.3 Port Naming Access/Network port names/descriptions should be standardised in terms of representation. A proposal for the format is as follows: ::
VTN VN2 High Level Design
Node name representing the location of the a- end of the link.
Node name representing the location of the b- end of the link.
Port number representing the port on the b-end. For
example: HNINPE01:HPGNPE01:1/1/1 • A 7750 SR router in Hanoi connected to the port 1/1/1 on a 7750 SR router in Hai Phong 6.1.4 Network Interface Naming A network interface is a logical IP routing interface that can be associated with either a physical or logical port or an SONET/SDH channel. Note that the interface name can be up to 32 characters, but must start with a letter. For ease of re- configuration it is useful to avoid the logical port being tied in name to the physical. Therefore it is recommended that the network interface name should include the originating node name and the destination node name followed by a link iteration in the event of more that one network interface exists between the same end points. ::
Node name representing the location of the a- end of the link.
Node name representing the name of the b-end of the link.
Two-digit number representing the iteration of this a-end and b-end where multiple network interfaces exist between two sites.
For example: HNINPE01:HPGNPE01:01 •
The first interface connection on a 7750 SR router in Hanoi defined towards another 7750 SR router in Hai Phuong
All naming should be represented in UPPER CASE. 6.1.5 Service Distribution Point Naming Distributed VPN services across PE routers use service distribution points (SDPs) to direct traffic to another PE router through a service tunnel. SDPs are created on each participating PE router, specifying the origination address (the PE router participating in the service communication) and the destination address of another PE router. SDPs are then bound to a specific customer service. Without the binding process, far-end PE router devices are not able to participate in the service (there is no service without associating an SDP with a service).
VTN VN2 High Level Design
In the creation of SDP, the SDP identifier is an integer with a value of between 117407. A proposal for the SDP naming convention is to use the last three digits of the destination system address in decimal. Decimal zeroes must be included. For example, a far-end destination address of 10.220.11.5 would give an SDP name of 005 using the last three digits. Equally, a far-end destination address of 10.220.11.26 would give an SDP name of 026 using the last three digits.
Figure 3: Alcatel-Lucent Service Routing Architecture
Full mesh SDP will be defined to provide 100% reachability to all PE nodes and ASBR nodes.
6.2
IP Routing Recommendations
6.2.1 Overview The logical topology of the VN2 network consists of the device and interface names, the interface, link, and virtual addresses, and the suite of routing and control protocols, including both their individual scopes and interrelations, which are used to organize and bind together the physical components into a working network.
6.3
Routing and Control Protocols
A combination of (4) primary routing and forwarding control protocols have been selected for the VN2 network. The protocols are: •
Multiprotocol BGP
•
IS-IS
•
LDP
•
RSVP
IS-IS is the baseline routing protocol, running on all devices, and enabled on all core facing physical interfaces, enabling reachability among all devices. IS-IS does not enable any services related traffic to traverse the networks, but each of the other protocols builds on top of it. Details of the use of IS-IS are given in the IGP section.
VTN VN2 High Level Design
RSVP is the next layer, using the information in IS-IS to build MPLS paths among the P routers, across the core WAN portion of the network. LDP is then layered on top of that, by tunneling LDP through the RSVP signaled paths in the core of the network. LDP runs natively between the edge and core to build a full mesh of MPLS paths among all edge routers. This enables some services, and provides the next building block for others. Details of the use of RSVP and LDP are given in the MPLS section. BGP is the top layer. Its operation is abstracted for the forwarding path, making use of centralized route reflector nodes, which are accessed using routing information from the underlying protocols. BGP provides routing information required to enable most services, in the form of a destination route with a next-hop which is reached through the LDP signalled MPLS path. Details of the use of BGP are given in the BGP section.
6.4
End-to-End Logical Topology BRAS
BRAS
Level 1
Level 1
PE
PE P
ISIS Level 1
ISIS Level 2
ISIS Area ID 3
MAN MPLS Domain
P
ISIS Level 1
ISIS Area ID 1
Dot1q
ISIS Area ID 2
Backbone MPLS Domain
Dot1q
MAN MPLS Domain
LDP (tunneled) Single hop RSVP
RSVP full mesh
Single hop RSVP
Figure 4: End-to-End Logical Routing Architecture
An illustration of all network device types and the scope of each protocol running on each device: 6.4.1 IGP The proposed IGP for VN2 IP/MPLS backbone and the connected MANs is Integrated Intermediate System to Intermediate System (IS-IS) and requires that participating network elements support the use of OSI IS-IS for routing in TCP/IP and dual environments (RFC1195), Dynamic Hostname Exchange Mechanism (RFC2763), Support for Intermediate System to Intermediate System Cryptographic Authentication (RFC3567), and Support for Intermediate System to Intermediate System Extensions for Traffic Engineering (RFC3784).
VTN VN2 High Level Design
The following are reasons for the selection of IS-IS over OSPF as the other IGP of choice: 1. Scalability. Far better scaling for the number of router nodes in a single level of more than 1,000 routers vis-à-vis 250 OSPF router nodes in a single area. This will primarily mean that future expansion for VNPT would be greatly simplified as there is a whole lot more headroom for expansion without having to constantly relooking at creating more areas. 2. Security. IS-IS protocol is non-IP based, it is considered more difficult to spoof or attack from the Internet and therefore is relatively more secure in an ISP environment. 3. Lesser Resource Usage. IS-IS uses single LSP per router. OSPF has different SLA types and has one destination prefix per LSA. 4. Faster Convergence. IS-IS uses less packets to propagate routing information. On top of these, for high availability interworking, Graceful Restart will be enabled. 6.4.2 IGP in Me tro Networks After the meeting held on the 22nd of April 2009, it has been decided by VNPT that the IGP domain of the MANs be part of the IGP domain of VN2. The MANs will be IS-IS level 1 areas. Please refer to figure 4. As some of the existing MANs are already actively serving customers and are running OSPF as the de-facto IGP, we would recommend that planning should begin for those MANs to be migrated to run IS-IS. This would greatly maintain consistency throughout the network, which is very important in maintaining an operational network. 6.4.3 In-band management to Metro Networks As the MANs and VN2 belong to the same IGP domain, in band management of the nodes in the MANs is possible from anywhere within VN2. 6.4.3.1 IS-IS NSAP Addressing Alcatel-Lucent proposes IS-IS as the IGP of choice because of it scalability, hierarchical capabilities, good convergence rate. The IS-IS Network Entity Title (NET) will use the OSI NSAP format. The format of the NET is composed of the following: IS-IS NSAP format has two main components: • Initial domain part (IDP) • Domain Specific Part (DSP)
VTN VN2 High Level Design
Each of these are broken down as: IDP • Authority and format identifier: AFI • Initial domain identifier: IDI DSP • High order domain specific part (HO-DSP) • System Identifier (SysID) • NSAP Selector (NSEL) The following parameters shall be set •
AFI shall be “49” (Private Addressing).
•
IDI shall be set to “00”
•
The High order DSP shall be international country STD code as defined ITU E164, hence “84”.
•
The system ID shall be encoded in hex from the router‟s 32 bit system interface.
•
The NSEL shall be “00”.
The system ID is a 6-octet field and defines an intermediate system (IS) within a particular area. Within the IS-IS domain, the system ID is formed from the IPv4 system (loopback) address. For example, the system IP address 172.16.0.101 will take the form 1720.1600.0101. The first part of the NET consists of an Area Address. A variable length field defining the area to which an Intermediate System belongs. 6.4.3.2 ISIS Hierarchy IS-IS support node population in excess of more than 1000 nodes, IS-IS hierarchy is implemented as illustrated in figure 4. The MANs and BRAS will be in IS-IS level 1 areas. The VN2 PE and P nodes will be in a IS-IS level 2 area. The VN2 PE nodes will be configured as IS-IS level 1/2. Each MAN area, together with the backbone area would be in different IS-IS areas.
VTN VN2 High Level Design
6.4.3.3 Convergence In order to utilize IS-IS as a trigger for other fast convergence/High Availability protocols (such as IBGP Multipath/BGP peer tracking) it is necessary to manipulate key timers 1. Shortest Path First (SPF) interval. Each Intermediate System creates a topology map using Dijkstra‟s SPF algorithm. The topology is calculated as a Shortest Path Tree (SPT) with itself as root. Aside from initialisation, an SPF calculation is executed when the Shortest Path Tree (SPT) topology is changed. This may include a link failure, or a change in link metric. 2. IS-IS Link State PDU (LSP) Generation Interval. Is simply the time an Intermediate System should wait before generating and transmitting an LSP. In order to achieve fast re-convergence however, the SPF interval needs to be configurable to a sub-second value. In addition, an exponential back-off is required in order that that Intermediate Systems are not continually computing shortest paths (and consequently using valuable CPU cycles) when subsequent computations are required. All network elements should implement sub-second SPF and exponential back-off and will be configured with an initial SPF delay of 50 milliseconds. This initial wait value is to allow the router to flood the LSP that caused the trigger before actually executing the SPF calculation, and also to ensure that only one SPF calculation is carried out at receiving intermediate systems. The incremental wait between subsequent SPFs will be configured for 100 milliseconds, whilst the maximum SPF interval should be configured for 2 seconds. Note: In the instance of a failed network link, the Intermediate System at each end of the link will generate an LSP. If the initial wait value is too small, then the potential exists that a receiving Intermediate System may execute an SPF after receiving the first LSP, then execute a second SPF after receiving the second LSP. Increasing the initial SPF wait value gives sufficient time to receive both LSPs even if one (or both) LSPs need are routed suboptimally (as in the case of failure).
VTN VN2 High Level Design
Table 1 details the SPF iterations given the defined values. Time
Iteration First
50 msec 100 msec after completion of first SPF execution 200 msec after completion of second SPF execution
Second Third
400 msec after completion of third SPF execution
Fourth
800 msec after completion of fourth SPF execution
Fifth
2 seconds after completion of fifth SPF execution.
Sixth
Table 1 : SPF Execution with Exponential Back-off
For LSP generation, the initial wait should be configured for 0 seconds. That is, LSPs will be generated immediately following the event. The incremental wait between subsequent LSPs being generated should be configured for 1 second, whilst the maximum LSP interval should be configured for 8 seconds. All network elements should implement sub-second SPF and exponential back-off and will be configured with an initial SPF delay of 50 milliseconds. Actual values used will be decided during the interop testing with Juniper. 6.4.3.4 Traffic Engineering Extension RSVP LSPs will be used within the VN2 network. Therefore, IS-IS TE extension will be enabled on all P and PE nodes. 6.4.3.5 Authentication Within any Service Provider environment, authentication of IGP updates is a desirable attribute. The backbone should be configured to support cryptographic authentication (HMAC-MD5) of IS-IS LSPs. Next to that it‟s worthwhile to use also MD5 authentication for Hello LSPs. The latter provides a mechanism for securely authenticating adjacencies before LSPs can even be exchanged. Separate commands will be used to define first, the authentication type (since 7750 SR also support simple password or plain text authentication) and secondly the authentication key, which will be used to verify the PDUs sent by neighbouring routers on the interface. Configuration of MD5 cryptographic authentication of Hellos is implemented under each interface configured under the IS-IS process. The authentication-key and authentication type must be reconciled for all routers on a link/segment :
VTN VN2 High Level Design
6.4.3.6 Point-to-Point Broadcast Media On point-to-point Ethernet, the election of a Designated Intermediate System (DIS) and regular generation of CSNPs is an unnecessary function. Point-to-point Ethernet links should therefore be configured such that no DIS election takes place and reliable flooding on these links is facilitated through generation of a PSNP to explicitly acknowledge received LSPs. 6.4.3.7 BRAS connection The IS-IS protocol includes both the concept of areas and also makes use of a two level design. IS-IS Level1 routers learn only default routing information from Level1/2 routers in their area. Level1/2 routers pass routes from Level1 up to Level2. It is desirable to support a 2nd tier of edge router downstream of the PE, but without requiring the PE(s) to at each POP to be in separate areas, or to form Level1 adjacencies with each other. To achieve this, the PE should configure links to downstream edge routers as Level1, but in the backbone area. The BRAS router will take advantage of the 2nd tier edge router scheme for IS-IS in order to learn the loopback address of the upstream PE routers, and to provide the upstream PE with a route to its own loopback. This will require the PE to leak its loopback into Level2. The BRAS will then establish iBGP connectivity to the PE router(s). When dual PE routers and/or dual BRAS uplinks are configured, IS-IS will provide the mechanism for rerouting around a single link or PE router failure without requiring the propagation of a change in the BGP route across the entire network. 6.4.3.8 General Parameters (Suggested) 6.4.3.8.1 MaxAge and LSP Refresh Interval IS-IS LSPs have a remaining lifetime, which starts at the value of MaxAge and decrements to zero before they are flushed from a link state database. The LSPs must clearly be refreshed before the remaining lifetime expires. In order to reduce the amount of resource a router must dedicate to generating and processing LSPs, this default configuration should be modified to reflect an LSP MaxAge of 65535 seconds (18 hours) and an LSP refresh interval of 32767 seconds (9 hours). 6.4.3.8.2 Hello Interval and Hello-Multiplier Once an IS-IS adjacency is established, Hellos are exchanged between the Intermediate Systems that act as keepalive messages. The IS-IS Hello interval should be configured as 1 second on all interfaces, whilst the hold time or hello- multiplier should be set to a value of 3. That is, 3 x Hellos must elapse before the adjacency is declared down.
VTN VN2 High Level Design
6.4.3.9 IS-IS Scalability Table 2 details the performance and scaling characteristics for IS-IS on the 7750 SR platform. 7750 SR
Parameter Number of adjacencies
252
Number of adjacencies on a single interface
84
Number of LSP(s)
25K
Number of routes
250K
Number of routers in a level
25K
Time to run SPF on 10K routes
< 1 second Table 2 : IS-IS Scalability
6.4.3.10
IS-IS timing overview (Suggested) Default
Configured
csnp-interval
10 sec
10 sec
lsp-pacing-interval
100 ms
100 ms
retransmit interval
5 sec
5 sec
lsp-lifetime
12000 sec
65535 sec
spf-wait
10 sec / 1 sec / 1 sec
2 sec / 50 ms / 100 ms
lsp-wait
5 sec / 0 sec / 1 sec
8 sec / 0 sec / 1 sec
IS-IS L1 hello interval
9 sec
9 sec
3
3
9 sec
1 sec
IS-IS L2 hello multiplier
3
3
overload-on-boot P node
disabled
disabled
overload-on-boot PE node
disabled
disabled
overload-on-boot RR node
disabled
disabled
IS-IS L1 hello multiplier IS-IS L2 hello interval
Table 3 : IS-IS timings
VTN VN2 High Level Design
6.4.4 BGP This section will describe the use of the Multi-protocol Border Gateway Protocol (M-BGP) protocol for the distribution of routing information within the VN2 IP Core. 6.4.4.1 Usage BGP is typically used to distribute routing information pertaining to „destination‟ networks. For example: customer networks, application services, or Internet destinations. Intermediate network infrastructure and devices are typically excluded from BGP. Specifically, the following Network Layer Reachability Information (NLRI) types will be used, and the following types of routing information will be distributed by each: IPv4 Unicast NLRI: •
Upstream and Peer Internet Routes
•
Customer Internet Routes
•
Internal Internet and Application-Service Routes
IPv4 VPN Unicast NLRI: •
Customer VPN Routes
6.4.4.2 Protocol Features/Parameters • Extended Communities •
Graceful Restart
•
MD5 Authentication
•
Default Timers Settings
6.4.4.3 Autonomous System Number VNPT/VTN has indicated that there would be the requirement to offer inter-service provider VPN services, therefore the Autonomous System number used to deliver BGP/MPLS IPVPN and Internet services shall ideally be a public ASN. VNPT has indicated that a Private ASN will be used initially within VN2. If no BGP router ID is specified, the „global‟ router ID will be used. If no BGP router ID and no „global‟ router ID is specified, the system interface IP address will be used. Alcatel-Lucent recommends configuring the router-id as the system ip-address. 6.4.4.4 Participants and Topology The network devices that are required to participate in BGP are those forming the border with the above referenced network destinations (customers, services, and
VTN VN2 High Level Design
the Internet). Specifically, all BRAS, PE, ASBR, and RR routers will participate in BGP. The transport core P routers do not require BGP routing information. 6.4.4.5 Route Reflector The key element of the BGP route distribution logical topology is the route reflector function, provided by dedicated RR routers. Route reflectors provide a central point of BGP peering in the network, and eliminate the need for a complex full mesh of BGP sessions. For scalability route reflectors will be organized into two regions, North and South, with a unique cluster-id for each region. A full mesh of normal iBGP sessions will be built among all RR routers. P PE
ASBR
RR
North Central & South
iBGP (Non‐Cluster) iBGP, North Cluster iBGP, South Cluster RR
PE P
P
Figure 5: Route Reflector Architecture in day 1
P PE
ASBR
RR
North Central & South
iBGP (Non‐Cluster) iBGP, North Cluster iBGP, South Cluster RR
PE P
P
Figure 6: Route reflector Architecture in day 2
VTN VN2 High Level Design
On day-one each of two RR routers will establish iBGP sessions to all PE and ASBR routers, and associate these with their regional cluster. In the future both of the two RR routers in each region will establish iBGP sessions with all PE and ASBR router in the same region, and associate them with their regional cluster. 6.4.4.6 ASBR ASBR routers serve the function of learning routes associated with internet peers or transit providers, and relaying them to the RRs. The ASBRs will establish iBGP sessions with the two RR routers. Each ASBR will establish eBGP sessions with peers and transit providers, learning the full internet routing table. Default BGP behaviour is for eBGP routes to be passed on to iBGP neighbours, so these routes will be passed on to the RRs. Next-hop-self should be used to rewrite the next-hop of external routes to the loopback of the ASBR itself. The ASBRs will learn internal/customer routes from the RRs. 6.4.4.7 PE PE routers participate in BGP in order to originate customer routes into the network. All PE routers will establish iBGP sessions with the two RR routers. The PE may also establish eBGP sessions with some transit customer, learning customer routes, and relaying them to the RRs as per default BGP behaviour, but also using a next-hop-self policy. The PE will also be configured to originate customer routes learned via other protocols into BGP, including VPN routes. The PE routers will learn both internet routes and other customer/vpn routes from the RRs Each PE router, or pair of PE routers at a single POP location, will also be configured as BGP route-reflectors, using a unique cluster-id derived from the system address of the PE. The PE routers will establish iBGP sessions with all directly connected BRAS routers, and associate these sessions with the local cluster. In this way customer routes can be learned from the BRAS routers and relayed to the global RRs. Again, a nexthop-self policy will be used toward the RR so that all customer routes including those originated by the BRAS will be reachable via the loopback of the PE itself. 6.4.4.8 BRAS BRAS routers will participate in iBGP in order to originate routes for locally configured customer IP pools into BGP. BRAS routers will establish iBGP sessions with directly connected PE routers only, and will be configured to originate customer IP pool routes. They will learn default routes only from the PE routers
VTN VN2 High Level Design
6.4.4.9 Authentication The TCP MD5 signature option for cryptographic authentication defined in RFC2385 should be adopted for both IBGP and EBGP sessions. The TCP MD5 signature option defines a TCP option for carrying an MD5 digest in a TCP segment, acting like a signature for that segment. As BGP uses TCP as its transport, it is inherently secure if this mechanism is adopted. Keys used for Internal BGP sessions should be different to those used for external peering. Since authentication is performed between neighboring routers, the authentication key is configured on the neighbor level. 6.4.4.10 Policies and Route Selection The logical topology and flow of routing information described above will result in the following route selections and traffic flow: •
Traffic entering the network through a BRAS router will follow a BGP default route with a next-hop of the directly connected PE router. Normal IP routing will be used to reach that next-hop.
•
Traffic entering the network through a PE or ASBR router will follow a specific BGP route to its destination, with a next-hop of another PE or ASBR. That next-hop will be reachable via MPLS. Each PE/ASBR will learn all routes from two RRs as choose the best path from the two. In most cases these two routes will have the same next-hop.
•
The RRs learn all routes from the PE/ASBR routers, and each RR makes a single best path decision. Only the selected best path is relayed by each RR to its cluster members, so any polices required to influence BGP route selection must be implemented on the RR.
•
The RRs must participate in IS-IS and LDP in order to have visibility to the routing information for the next-hops of all BGP routes, especially MPLS nexthops for VPN routes
6.4.4.11 Routing of Internet Traffic There will be three POPs where connections are made to the VDC network, which acts as an Internet transit provider to VN2. The three POPs correspond to the main points international circuit termination points on the VDC networks. The desired strategy is for VN2 to transport traffic to the POP used as the international exit point for that destination before handing it over to VDC. And conversely for VDC to hand traffic directly back to VN2 at the same POP where it was received, which should result in a symmetrical traffic flow of 'best exit / nearest entry' from the perspective of VN2
VTN VN2 High Level Design
6.4.4.11.1 Outbound For outbound traffic to reach the best exit POP from VN2 to the VDC network each PE must receive the best exit route from the RR. Then the PE will send traffic via MPLS to the ASBR with the next-hop of that route. The BGP route selection to determine the best exit must take place on the RR. The RR receives routes from each of the (5) ASBRs, and must have a means of differentiating them. BGP communities should be applied by the ASBR to indicate the POP in which the route was learned, and BGP communities must be sent from VDC to indicate the POP where the routes come in from the international side. Policies can be used the increase the local-preference of the routes learned at the same POP as the international link preferred of that route on the VDC side. 6.4.4.11.2 Inbound For inbound traffic to take the „nearest entry‟ POP from the VDC network toward VN2, the international facing routers in the VDC network should select routes with the next-hop of the VDC ASBR at the same POP. This behavior can be achieved in several ways, depending on the logical topology used by the VDC network. 6.4.4.11.3 Illustration The following is a simplified illustration of the physical links, logical BGP protocol topology, and the flow of traffic through VDC to and from the Internet that will result from the routing policies described above. The traffic flow toward ISP B traverses the VN2 network from North to South to reach the exit point closest to ISP B. The traffic flow from ISP A takes the entry point closes to ISP A and does not traverse the VDC network from North to South.
VTN VN2 High Level Design
VN2 VD C
P
PE
ASBR
ISP A
North South
RRs
ISP B
ASB RP
Best Exit traffic flow BGP
Nearest Entry traffic flow
Figure 7: Internet Traffic flow via VDC
6.4.4.12
BGP timing overview (Suggested)
Default
Configured
min-route-advertisement
30 sec
30 sec
connect-retry
120 sec
120 sec
hold-time
90 sec
90 sec
keepalive
30 sec
30 sec
min-as-origination
15 sec
15 sec
Table 4 : BGP timings
6.5
IP Multicast Recommendations
P2MP LSPs is an alternate method of distributing multicast traffic. It provides the 50ms MPLS FRR capability. This feature will need to be tested and verified between the P and PE nodes to ensure a stable rollout of multicast services using this feature. Until this feature operationally tested, PIM will be used for multicast services. Multicast traffic in VN2 is classically routed based on PIM-SM, which is best suited multicast routing protocol for sparsely dispersed sources, and more importantly, has less protocol control overhead compared with other multicast routing protocols.
VTN VN2 High Level Design
It is advised that each interface has PIM-SM correctly configured, to ensure proper operation and correctly forwarding of the multicast traffic across the backbone. PIM will be enabled on all routers in VN2 IP Core and the MANs. The MAN Agg PE routers will for PIM neighbours with the IP Core PE routers.
IP Core
PIM
PIM
IGMP static joins Duplicated MC Traffic stream
MAN
PIM
Figure 8: PIM Topology
For multicast resiliency, the IP Core PE will use IGMP static joins to distribute duplicate copies of desired multicast streams to the two MAN Agg PEs. With PIM, the MAN is able to intelligently manage duplicated multicast streams effectively by ensuring that the end devices only receive a single stream. 6.5.1 Rendezvous Point (RP) placement According to the PIM-SM protocol, all join messages are forwarded to a specific IP address, the rendezvous point (RP). It is recommended to place the RP as close as possible to the source. Considering IPTV as the primary use of multicast in VN2, it is understood that the VHO will be located within the vicinity of the HNI site; therefore, it is recommended that the RP be designated on HNI PE router nodes.
VTN VN2 High Level Design
P
PE
(Anycast RP) North South
Edge
MSDP
PE
(Anycast RP)
PE
IPTV Source (Primary)
IPTV Source (Backup)
P PIM‐SM IGMP
Figure 9: Multicast RP Topology
However, moving forward should the requirement for multicast VPN increases, it would be advisable to relocate the RP to a more centralise node within VN2 so that join latency is optimum throughout the entire network. Redundant RP should be implemented using Any-Cast RP whereby both HNI PE routers will be configured with the same RP address on a loopback interface. Redundant RP in accordance to draft-ietf-pim-anycast-rp-0X should also be configured to ensure that both RP will be capable of synchronising source information. This is to ensure that any failure to either RP, the redundant RP have the most current source states and thus minimises convergence delay. 6.5.2 Reverse Path Forwarding (RPF) considerations Multicast RPF is used in conjunction with PIM-SM to ensure loop-free forwarding of multicast packets. In multicast routing the decision to forward traffic is based upon source address and not on destination address as is the case with Unicast routing. It does this by utilizing either a dedicated multicast routing table or alternatively the router's native Unicast routing table. When a multicast packet enters a router's interface it looks up the list of networks that are reachable via that input interface. If the router finds a matching routing entry for the source IP of the multicast packet, the RPF check passes and the packet is forwarded to all other interfaces that are participating in multicast for this multicast group. If the RPF check fails the packet will be dropped. It is recommended that RPF-check should be enabled based on both Multicast & Unicast RIB.
VTN VN2 High Level Design
6.6
MPLS Topology and Signalling Overview.
6.6.1 Overview This section will describe the use of Multi-Protocol Label Switching (MPLS) for forwarding traffic within the VN2 IP Core network. P
PE
P
ASBR
RSVP Full Mesh Between P routers
Single Hop RSVP
PE P
POP A
P
RSVP Signaled LSP
POP B
LDP over RSVP
Figure 10: VN2 MPLS Topology
6.6.2 Usage MPLS will be used in two fundamental ways in the VN2 network. The first is as the baseline forwarding scheme across the WAN portion of the network, providing traffic engineering and fault protection. And second tier of MPLS is used as a unified means of connectivity between edge routers, enabling end-user services like Layer3 VPNs, VPLS, and Pseudowires. Two sets of protocols, participants, and topologies will be used for each, as follows: Backbone MPLS: •
RSVP and LDP protocols
•
Full mesh RSVP LSPs between P routers
•
LDP will be enabled for full mesh topology to be dynamically created by default
•
Statically configured dual mesh topology (A + B planes)
•
Traffic Engineering (TE) capabilities
•
Enhanced fault protection capabilities
VTN VN2 High Level Design
Edge MPLS: •
LDP and RSVP protocols
•
Single hop RSVP LSPs between P router and PE or ASBR
•
T-LDP sessions between PEs and ASBRs will be tunnelled over RSVP tunnels (LDPoverRSVP)
•
LDP will be enabled for full mesh topology to be dynamically created by default
•
Follows IGP to determine paths, dependent for re-convergence
•
Graceful restart and Non stop routing enabled for LDP
6.6.3 Backbone MPLS The backbone MPLS scheme based on the Resource Reservation Protocol (RSVP) protocol provides a highly configurable framework for forwarding traffic across the core of the network. As RSVP LSPs must be explicitly configured at the origin for each sourcedestination pair, its use of full mesh is generally confined to the network core, in order to limit the size of the N squared full mesh of LSPs among participating PE routers. In the VN2 network, the full mesh RSVP LSPs will be limited to the P routers. 6.6.4 RSVP Signalled LSP Topology The following grids give a complete list of the unidirectional RSVP signaled LSPs to be configured among the P routers. Check marks indicate an LSP which corresponds to a direct physical link. Check-plus indicates an LSP with an intermediate hop. Plane A From:
P1 - HPY
P1 - HNI
P1 - DNG
P1 - HCM
P1 - CTO
9
9
9+
9+
9
9
9+
9
9
To: P1 - HPY P1 - HNI
9
P1 - DNG
9
9
P1 - HCM
9+
9
9
P1 - CTO
9+
9+
9
9 9
VTN VN2 High Level Design
Plane B From:
P2 - HPY
P2 - HNI
P2 - DNG
P2 - HCM
P2 - CTO
9
9
9+
9+
9
9
9+
9
9
To: P2 - HPY P2 - HNI
9
P2 - DNG
9
9
P2 - HCM
9+
9
9
P2 - CTO
9+
9+
9
9 9
Interlinks From:
To:
P1 - HPY
P2 - HPY
P1 - HNI
P2 - HNI
P1 - DNG
P2 - DNG
P1 - HCM
P2 - HCM
P1 - CTO
P2 - CTO
6.6.5 Traffic Engineering RSVP provides a number of features for fine grained control over the path selection for each LSP, collectively providing the Traffic Engineering (TE) capabilities. Those parameters include a subscribed bandwidth per LSP, admin groups (or „colors‟) per link for inclusion or exclusion, a link metric scheme for TE, and the hop count. Also, RSVP paths can be explicitly defined on a per-hop basis, or allowed to follow the same IGP metric based path selection. As the traffic levels are expected to be low on the VN2 network on day one, but are otherwise unknown, it is proposed to use a course bandwidth allocation scheme, well below the actual available link bandwidth. This scheme may be used for future true bandwidth subscription based TE, or as a means to load share paths across future parallel links. Otherwise, the largely single-hop LSP topology, and the implied primary/backup paths given by the physical circuit topology, largely negate the need for other types of TE configuration. Only the LSP marked with a check-plus in the above grid have any intermediate hop which might be subject to a policy based path decision, and these would be expected to be among the lowest bandwidth consumption
VTN VN2 High Level Design
paths. As such, no other TE configuration is recommended, and the use of the IGP cost scheme to determine LSP paths should be sufficient. 6.6.6 Edge MPLS The edge MPLS scheme leverages the multiprotocol capabilities of MPLS to support converged service offerings. Single hop RSVP LSPs will be used to connect the PE and P routers. The RSVP full mesh is only within the P routers. Source PE routers will use LDP over RSVP tunnels to reach the destination PE routers. With properly placed redundant links between the PE routers, this provides MPLS FRR capability between PE and P routers without the need of a full mesh end to end RSVP tunnels between the PE routers. As a backup to RSVP, LDP can be used to build a full mesh of LSPs among the PE, ASBR and RR routers. LDP must be enabled on all of the following: •
Links from PE to P routers
•
Links from ASBR to P routers
•
Links from RR to P routers
•
Links connecting two PE routers at the same POP
•
Links connecting two P routers at the same POP
•
Via tunnelling over all RSVP LSPs connecting to P routers
LDP uses the IGP to determine the path used, and also counts on the convergence of the IGP in the event of a failure. In the event of a failure on a PE/ASBR/RR to P router link the recovery of the LSP will be dependent on the IGP convergence around the failure.
6.7
High Availability
This section describes high availability features of the core VN2 topology. For VPN service high availability, please refer to Section 7.2 Service Architecture as the topic of offering VPN high availability is being discussed as an extension. 6.7.1 Border Router related Failure For VN2 ASBR sites with redundant ASBR, single ASBR failure would not constitute to any prolonged failure. Redundant ASBR router will be capable of performing all forwarding should the primary ASBR router fails. In the rare event of a critical failure in VDC or ASBR site, it will render traffic unreachable to and from a particular set of ASBR routers. At this point in time, VN2 BGP will converge and HSI traffic will be automatically re-routed to the next administratively nearer ASBR routers.
VTN VN2 High Level Design
This behaviour covers the following scenarios: 1. Failure of VDC connect – BGP routes gets withdrawn on ASBR, the update is populated to both BGP route reflectors and subsequently to other PE routers and BRAS within VN2. PE and BRAS will reconsider other available routes in the Routing Information Base and installs the new route destination in the forwarding table for traffic to be re-routed. 2. Failure of ASBR routers – it would be extremely rare for both redundant ASBR routers to fail at the same time, nevertheless, should this occurs, BGP neighbour association with BGP route reflectors would drop and all BGP routes previously learned from the affected ASBR routers will be withdrawn, this update is then populated to PE routers and BRAS within VN2. PE and BRAS will reconsider other available routes in the Routing Information Base and installs the new route destination in the forwarding table for traffic to be re-routed.
Figure 11: F ailure of ASBRs and/or VDC interconnect
In Figure 11, HPG PE routers re-converges upon BGP notification that the preferred traffic egress via HNI ASBR is to be changed to ASBR DNG due to a major failure on either VDC or the HNI ASBRs. 6.7.2 PE upstream related Failure In the event of failure on the upstream of the PE router, POP with single PE router and redundant uplinks will converge and uses the alternate path towards its destination as in the example illustrated by Fig 12 for CTO POP.
VTN VN2 High Level Design
Figu re 12: PE upstream related failure
As for POPs that has dual PE routers, such as the HPG POP illustrated, uplink redundancy will have to be handled via the MAN-E. This is a temporary workaround until inter-PE links are made available. 6.7.3 P router RSVP Label Switch Path Recovery Based on the physical topology of the VN2 network and the proposed dual mesh LSP topology, most RSVP LSPs will correspond to a direct circuit link between two routers, and all POP-to-POP circuit paths are deployed with two parallel physical circuits. As such, most recoverable LSP interruptions will be caused by link failure, and the desired response is for traffic to be shifted from the failed circuit to the parallel circuit. Physical Links RSVP LSP and Primary Path RSVP LSP Recovery Path POP 1 LSP B, Pri. Path
LSP A, FRR Path
LSP A, Pri. Path
POP 2
Figure 13: RSVP LSPs and Recovery Path
VTN VN2 High Level Design
This failure scenario lends itself well to link protection using Fast Reroute. The FRR path used would be via neighbouring P routers in the same POP, and over the parallel circuit, as in the following illustration. This would be expected to be the path of the re-established LSP as well.
6.8
Network QoS Design
6.8.1 QoS Overview The VN2 provides service differentiation using the Differentiated Service Model. It provides a high-level of flexibility to meet different operating environments, which can sometimes appear daunting and/or complex; indeed, there is a faint line between flexibility and complexity. Prior to detailing the recommended QoS configuration for the VN2 Network, this section provides a high-level overview of QoS and traffic management on the 7750 SR. This section is not intended to detail every aspect of traffic management within the 7750 SR, only the parts pertinent to the proposed QoS model. 6.8.1.1 Traffic Classification In order to achieve both scalability and service differentiation, the 7750 SR aggregates microflows in up to eight Forwarding Classes (FC). The behaviour of a FC in terms of ingress marking interpretation, egress marking, and queuing/scheduling is configurable in order to define a different Per-Hop Behaviour (PHB) per FC. By default the Forwarding Classes are classified into three class types; High priority, Assured, and Best Effort (BE). High-priority FCs are serviced before Assured FCs and are intended to be used for real-time delay-sensitive traffic or network control traffic. In turn, Assured FCs are serviced before Best Effort FCs and provide services with a committed rate (Committed Information Rate, or CIR) and peak rate (Peak Information Rate, or PIR). Assured FCs provide the ability to classify ingress traffic as either in-profile or out-ofprofile based upon the traffic arrival rate. A queue is considered in the in-profile state if the rate at which the queue is being serviced is less than its configured CIR. A queue is considered out- of-profile if the rate at which the queue is being serviced is greater than its CIR, but less than its PIR. After the profile state of the packet is determined at service ingress, the profile state of the packet influences the packets queuing priority and drop preference at all subsequent queuing points. It is worth noting that the in- profile/out-ofprofile classification based upon the rate that a queue is being serviced can only be performed on access ingress ports (not network ingress ports). When given some thought this makes sense because at network ingress ports traffic has already been policed (at access ingress).
VTN VN2 High Level Design
Table 5 details the eight Forwarding Classes within the 7750 SR SR together with the type of class and its intended use. FC
FC name
Class Type
NC
Network Control
Real Time
H1
High-1
Real Time
EF H2 L1 AF L2 BE
Expedited High-2 Low-1 Assured Low-2 Best Effort
Real Time Real Time Assured Assured Best Effort Best Effort
Remarks Network Control traffic For a second Network Control traffic or delay/jitter sensitive data For delay/jitter sensitive data For delay/jitter sensitive data Assured traffic Assured traffic For BE traffic For BE traffic
Table 5: Forwarding Classes
In order to understand the 7750 SR QoS architecture, it is important to understand the concept of Forwarding Classes. As a standalone entity FCs do not provide any QoS capability such as classification, metering, marking or policing. FCs are a conduit and require an input (classified traffic) and an output (one or more queues).
I
FC
Figure 14: Forwarding Class Concept
6.8.1.2 Components of the DiffServ Model Within the 7750 SR DiffServ architecture, there are four constituent components that define the PHB afforded to traffic. These are the Access Ingress, Network Egress, Network Ingress, and the Access Egress.
Ser vice Acce ss Poi nt
Ser vice (Access) I ng r ess
Ser vice Acce ss Poi nt
N etwor k Eg ress
N etwor k I ng ress
Ser vice (Access) Eg r ess
Figure 15: DiffServ PHB Components
Access Ingress
Associated with a Service Access Point and responsible for classification of traffic into an FC based upon Layer-2 (i.e.
VTN VN2 High Level Design
MAC, 802.1p, Ethertype) Layer-3 (i.e. source/destination IP, protocol, DiffServ Codepoint/IP precedence) or Layer-4 (i.e. source/destination port) criteria. Ingress queues are subsequently associated with each FC and resource such as packet buffer; permissible traffic rates for in-profile/out-of- profile traffic, and scheduling priority (towards the fabric) are allocated to each queue. Network Egress
Associated with a network interface and responsible for mapping each FC and profile (in/out) into an associated MPLS EXP value. Egress network queues are associated with each FC and again resource such as packet buffer and scheduling priority (towards the line) are allocated to each queue.
Network Ingress
Associated with a network interface and responsible for classification of traffic into FCs based on MPLS EXP or DSCP bits. Ingress network queues are associated with each FC and resource such as packet buffer and scheduling priority (towards the fabric/other network processors) are allocated to each queue.
Access Egress
Associated with a Service Access Point for mapping traffic into egress queues based upon FC or DSCP. Resource such as packet buffer, permissible traffic rates, and scheduling priority (towards the line) are allocated to each queue. Remarking of Layer-2 802.1p bits can also be implemented at the Access Egress (recall that 802.1q bits are not carried over a pseudowire).
6.8.1.3 Buffer Management Logical default buffer pools exist at the port and media dependent adapter (MDA) levels. Each physical port has three logically associated pools; an ingress access pool, and egress access pool, and an egress network pool. If the mode of a port is configured as access, only ingress access pool and egress access pool are created for the port. Conversely, if the mode of a port were configured as network, only the egress network pool would be created for the port. The size of the buffer pools is automatically determined as a function of the MDA type and the port configuration (i.e. mode and speed of the port).
VTN VN2 High Level Design
Each buffer pool has a reserved and a shared buffer portion. Each Forwarding Class queue with a non-zero CIR is allocated buffers drawn from the reserved portion of the buffer pool. After a queue consumes its reserved buffers, it competes with other queues in the pool for shared buffers drawn from the shared buffer portion of the pool. M BS CBS
WRED
Shared Buffers
Res Reserved erved buffers buffers
Figure 16: Shared/Reserved Buffer
Reserved buffer is allocated to queues using the Committed Burst Size (CBS) parameter and shared buffer is allocated using the Maximum Burst Size (CBS) parameter. Optionally, Weighted Random Early Detection (WRED) can operate in the shared buffer to provide differing random drop thresholds for in-profile (high- slope) and out-of-profile (low-slope) traffic. The shared buffers are not reserved for any specific queues. Any queue within the buffer pool can use this space when its reserved buffers are full and it has not exceeded its MBS. The number of shared buffers within a buffer pool is the difference between the total number of buffers in the pool and the reserved buffers. 6.8.1.4 Queues Queues are created within buffer pools. For example, a 10 x 1-Gigabit Ethernet MDA has 250MB of buffer, which, when spread across the ports means that each Gigabit Ethernet interface has 25MB of available buffer. This 25MB can be allocated to a single queue (unlikely), or it can be allocated to a number of queues (a more likely scenario). Forwarding types have the intention of providing the capability to control processor intensive tasks such as packet replication at network ingress. A VPLS service supports four forwarding types; unicast, multicast, broadcast, and unknown- unicast. A VPRN will support two forwarding types; unicast and multicast. At service ingress, a queue can be allocated per-Forwarding Class, per-forwarding type. With eight possible FCs, it follows that a VPLS can support up to 32 queues, and a VPRN can support up to 16 queues. At service egress and network egress, there is no concept of forwarding type, hence each of the eight supported Forwarding Classes is allocated a single queue.
VTN VN2 High Level Design
A queue has two main buffer-related parameters; CBS and MBS, and two main scheduling parameters; CIR and PIR. CBS
Specifies the number of buffers that can be drawn from the reserved buffer portion of the queues buffer pool. At service ingress and egress, the CBS is defined in Kbytes. At network ingress and egress, CBS is defined as a percentage of the buffer space of the queue buffer pool.
MBS Specifies the maximum queue size of a queue. For packets that enter a queue with a queue size between the CBS and MBS, buffers are drawn from the shared portion of the buffer pool, which may be managed by the WRED function. At service ingress and egress, the MBS for a queue is defined in Kbytes. The MBS for a network queue is defined as a percentage of buffer space of the queue buffer pool. Note that the minimum buffer size granularity is 4 Kbytes, and as partial buffer blocks cannot be allocated, the values allocated to CBS and MBS are automatically rounded up to a number of full buffer blocks. CIR
The CIR for a queue performs two functions. The first function is „Profile Marking‟. At service ingress it marks packets as in-profile or out-of-profile based on the CIR of the queue. For each packet that is transmitted from a service ingress queue, the CIR is checked against the current transmission rate of the queue. If the current rate is at or below the CIR threshold, the transmitted packet is internally marked as in-profile. If the current rate is above the threshold, the transmitted packet is internally marked as out-of- profile. The second function performed by the CIR value is „Scheduler Queue Priority Metric‟. The scheduler that serves a group of ingress or egress queues prioritises individual queues based on their CIR and PIR states. Weighted queues that operate below their CIR are always serviced before queues that operate at or above their CIR. The CIR for service ingress and service egress queues is provisioned within a SAP-ingress and SAP-egress QoS policy respectively and is defined in Kb/s. The CIR for network queues is defined within the network QoS policy and is defined as a percentage of the network interface bandwidth.
PIR
The PIR defines the maximum rate at which packets can be scheduled from a queue. The PIR does not specify the maximum rate at which packets can enter a queue as this is determined by the ability of the queue to absorb bursts and is defined by the MBS. The PIR for service ingress and service egress queues is provisioned within a SAP-ingress and SAP-egress QoS policy respectively and is defined in Kb/s. The PIR for network queues is defined within the network QoS policy and is defined as a percentage of the network interface bandwidth.
6.8.2 Scheduling The hardware scheduler for a queue determines how it will be scheduled relative to the other queues at the hardware level. When a queue is defined in a SAP-ingress or SAP-egress QoS policy, it is necessary to define the hardware scheduler
VTN VN2 High Level Design
(queue-type) to use for the queue when it is applied to a SAP. The definition of hardware schedulers (queue-types) can be „expedited‟ or „best-effort‟. Scheduling ingress/egress scheduling, queues are serviced in the following order •
High-priority (expedited) queues operating within their CIR
•
Low-priority (best effort) queues operating within their CIR
•
All queues that operate within their PIR but above their CIR
CI R = PI R Q ‟s
In-Profile RR
CI R = PI R Q ‟s
Strict Priority
O ut-Profile RR Exped ited Q ue ue s
CI R = PI R Q ‟s
In-Profile RR
CI R = PI R Q ‟s
O ut-Profile RR Best Effort Q ue ues
Biased RR
Figure 17: Scheduling
In the first pass, all the queues that are associated with the high-priority queues and operate within their CIR are serviced in a round-robin manner. The servicing of a queue is stopped after it has transmitted packets up to its operational CIR. Hence, queues get out of first pass one after another and the first pass is repeated until the last queue gets out. In the second pass, all the queues that are associated with the low-priority queues and operate within their CIR are serviced in a round robin manner. The second pass is repeated until the last queue is serviced up to its CIR. In the third pass, all the queues in out-of-profile state (above CIR, but within PIR) are serviced in a biased round robin manner. It is biased round robin because the queues associated with high priority queues obtain at least 50% of third pass bandwidth if there is enough traffic in those queues. Similar to the first and second pass, third pass is repeated until the last queue is serviced up to its PIR. The third pass is basically round robin, however, every time it is interrupted by the two higher priority passes, it always resumes servicing with high priority queues; hence biased round robin.
VTN VN2 High Level Design
6.8.2.1 Virtual Hierarchical Scheduling Single-tier scheduling provides a scalable and flexible solution to share bandwidth. However, certain scenarios require a more flexible scheduling policy at the service ingress and/or service egress. In this instance, the 7750 SR provides Hierarchical Virtual Scheduling (commonly referred to as H-QoS) to provide another level of sophisticated scheduling. Consider the following scenario. The CIR and PIR of the three service ingress queues that correspond to Gold, Silver, and Bronze services are configured as follows Gold
CIR 10 Mb/s, PIR 10 Mb/s
Silver
CIR 20 Mb/s, PIR 40 Mb/s
Bronze
CIR 0 Mb/s, PIR 100 Mb/s
Using single-tier scheduling, each queue can burst up to its specified PIR, which basically means that up to 150 Mb/s can enter the service through the three queues. Using virtual hierarchical scheduling, a parent scheduler can be created for the Gold, Silver, and Bronze queues, which limits the aggregate rate of all the queues to 100 Mb/s. With virtual hierarchical scheduling, the service can offer any combination of Gold, Silver, and Bronze traffic that conforms to their specified PIR values, but does not exceed 100 Mb/s in total. The 7750 SR hierarchical scheduler structure is very similar to t-ary tree data structure. In a virtual hierarchical scheduler structure, the buffer queues form the leaves of the structure. A parent (intermediate node or root node) is always a virtual scheduler. As in the case of t-ary tree, in a hierarchical scheduler policy a parent scheduler can have any number of children. A virtual scheduler can have queues and other virtual schedulers as its child. Each child scheduler or queue can have only one parent scheduler. The number of levels in a t-ary tree is called its height. In a hierarchical scheduler structure, the number of levels is defined in the context of tiers. The 7750 SR supports up to 3 tiers of virtual schedulers. The root schedulers are defined in Tier 1. Schedulers defined in Tier 2 can have parental associations with schedulers defined in Tier 1. Schedulers defined in Tier 3 can have parental associations with schedulers defined in Tiers 1 or 2. Queues can have parental associations with schedulers at any tier level. In a hierarchical scheduler policy, a virtual scheduler or a queue is provisioned with a CIR and a PIR that effectively dictate how much bandwidth is allocated to that queue/scheduler and the maximum rate at which it can be serviced. In addition, the queue/scheduler is configured with a CIR Level, CIR Weight, Level, and Weight. A parent scheduler distributes its allocated bandwidth to its children (where children can be queues or lower tier schedulers) in two passes. The first pass is
VTN VN2 High Level Design
within CIR pass and the second pass is above CIR pass. The first pass of bandwidth allocation to a child queue/scheduler ends after its servicing rate reaches its configured CIR value. The second pass of bandwidth allocation to a child ends after its servicing rate reaches its configured PIR parameter value. During the first pass, the allocation of bandwidth and the order that a child is serviced relative to other children is based on the child‟s CIR Level and CIR Weight parameters. During the second pass, the allocation of bandwidth and the order that a child is serviced relative to other children is based on the child‟s Level and Weight parameters. The range of both CIR Level and Level is 1 to 8. A higher level (8 is the highest priority) is exhaustively serviced before a lower level is serviced. Effectively, CIR Level and Level are used to define the strict priority queuing order. The range of the CIR Weight and Weight parameters is 0 to 100. In both passes, the (CIR) Weight parameter defines the weight of a child within the given (CIR) Level. When multiple children share the same (CIR) Level on a parent scheduler, the ratio of the bandwidth allocated to an individual child depends on the ratio of the weights of the active children within that Level. The ratio is calculated by adding the (CIR) Weights of all the active children, and dividing each child‟s CIR Weight by the sum. A child with a CIR Weight of zero receives bandwidth only after all the other children of the same Level have received their within-CIR bandwidth.
VTN VN2 High Level Design
Tie r 1
Tie r 2
Tie r 3
Queue s CI R L= 8 Scheduler C1
CI R L= 1 W= 20
CI R L= 1 W= 10 Scheduler A1
Wit hin CI R p a ss Scheduler C2
Queue s Scheduler B1
PI R L= 8
PI R L= 3 W= 5 0 Scheduler C3
PI R L= 3 W= 2 5 Ab ove CI R p a ss
Figure 18: H-QoS Tiers and Scheduling
Error! Reference source not found.18 illustrates the concept of 3-tier hierarchical scheduling together with the order that a parent scheduler services its children. In Error! Reference source not found. the CIR Level and Weight (within CIR pass) and the Level and Weight (above CIR pass) are illustrated for the queues, however, it is worth re-iterating that the same methodology is applied to a child scheduler when being serviced by its parent scheduler. 6.8.3 QoS Design At the time of writing this document the services supported by the VN2 Network are HSI, Voice, Video & Business VPN. This section details the QoS recommendation to support the above listed services. 6.8.3.1 Service Classes A service class represents a set of traffic that requires common delay, loss and jitter characteristics from the network for which consistent and defined per-hop behaviour applies. Conceptually, a service class pertains to applications with similar characteristics and performance requirements. Table 6 details the service classes that shall be supported within the VN2 Network.
VTN VN2 High Level Design
Application Categories
Service Classes
Control Plane
CONTROL
Application Control
Voice
Media-Oriented
Voice Video
Business Data
Best-Effort
Application Examples Network Routing
Data 1
Telephony Signalling IEEE1588v2 Precision Timing Protocol Telephony Bearer Broadcast TV, Video on Demand Business traffic and OAM (SNMP, SSH)
Data 2 Standard
Business Traffic HSI-Business/Residential Table 6: Service Classes
6.8.3.2 Control Service Class The CONTROL service class is used for inter-router signalling protocol traffic. Inter-router signalling protocols are responsible for maintaining the network logical topology and switching; these protocols are the most important protocols crossing the network; even more important than customer real-time traffic itself. If inter- router signalling protocols are affected, then this can affect all client traffic passing through a network node. Applications that may use the CONTROL service class are router control-plane traffic that is originated by the VN2 Network itself (i.e. OSPF, ISIS, RSVP), or router controlplane traffic that passes through at least one network node (Multi- Protocol BGP, Targeted LDP). All flows in the CONTROL service class shall use a Network Control (NC1) PHB and shall be marked with the DiffServ Codepoint Class Selector 48 and IP precendece 6. 6.8.3.3 Voice Service Class The Voice service class is used for applications that require very low delay, very low jitter and very low packet loss for relatively constant rate traffic sources. All traffic in this class originates from internal network controlled equipment. The following applications should use the Voice service class •
VoIP (G.711, G.729 and other codecs)
•
Voice-band data over IP (modem, fax)
•
T.38 fax over IP
VTN VN2 High Level Design
•
Circuit emulation Service, CESoPSN & SAToP
•
IEEE1588v2 Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems
•
Peer-to-peer IP telephony signaling (i.e. SIP, H.323)
•
Peer-to-peer signalling for multimedia applications (i.e. SIP, H.323)
•
Peer-to-peer real-time control function
•
Client-server IP telephony signalling (i.e. H.248, MEGACO)
•
Signalling flows between high-capacity telephony call servers or soft switches using protocol such as SIP-T. Such high-capacity devices may control thousands of telephony (VoIP) calls.
The Voice service class shall use an Expedited Forwarding (EF) PHB and the recommended DiffServ Codepoint is Expedited Forwarding (EF). This service class should be configured to receive guaranteed forwarding resources and all packets should be forwarded without being subject to delay since the inelastic types of RTP payloads in this class do not react to loss or significant delay in any substantive way. 6.8.3.4 Video Service Class The Broadcast Video service class is used for applications that require near-real- time packet forwarding with very low packet loss of constant rate and variable rate inelastic traffic sources. Such applications include broadcast TV, streaming of live audio and video events, some video-on-demand applications, and video surveillance. In general, the Broadcast Video service class assumes that the destination end point has a delay jitter buffer, for video application usually a 2 - 8 video-frame buffer (66 to several hundred of milliseconds), and therefore that it is less sensitive to delay and jitter. The following applications should use the Broadcast Video service class: •
Video surveillance and security (unicast).
•
TV broadcast including HDTV (multicast).
•
Video on demand (unicast) with control (virtual DVD).
•
Streaming of live audio events (both unicast and multicast).
•
Streaming of live video events (both unicast and multicast).
The Video service class shall use an Assured Forwarding (AF) PHB and shall be marked with the DiffServ Codepoint AF41 and IP predecence 4.
VTN VN2 High Level Design
6.8.3.5 Data 1 Service Class The Data 1 service class is used for applications that require a low packet loss and are relatively sensitive to delay. The service class is also responsible for carrying OAM (Operations, Administration, and Management) using protocols such as Simple Network Management Protocol (SNMP), FTP/SCP, and SSH. The following applications should use the Data 1 service class: •
Store and forward applications
•
File transfer applications
•
Email
•
VPN service that supports two rates (committed information rate and excess or peak information rate)
•
Provisioning and configuration of network elements
•
Performance monitoring of network elements
•
Any network operational alarms
All flows in the Data 1 service class shall use an Assured Forwarding (AF) PHB and shall be marked with the DiffServ Codepoint AF31 and IP Precedence 3. 6.8.3.6 Data 2 Service Class The Data 2 service class is used for elastic applications that require timely packet forwarding of variable rate traffic sources and, more specifically, is configured to provide good throughput for TCP longer-lived flows. TCP or a transport with a consistent congestion avoidance mechanism will normally drive as high a data rate as it can obtain over a long period of time. The following applications should use the High-Throughput Data service class: •
Store and forward applications
•
File transfer applications
•
Email
•
VPN service that supports two rates (committed information rate and excess or peak information rate)
The High-Throughput Data service class should use an Assured Forwarding (AF) PHB and the recommended DiffServ Codepoint is AF32 and IP Precedence 2.
VTN VN2 High Level Design
6.8.3.7 Standard Service Class The Standard service class is used for traffic that has not been classified into one of the other supported forwarding service classes in the DiffServ network domain. This service class provides "best-effort" forwarding behavior and typically has minimum bandwidth guarantee. The following applications should use the Standard service class •
Network services, DNS, DHCP, BootP
•
Any undifferentiated application/packet flow transported through the DiffServ enabled network.
The Standard service class shall use an Assured Forwarding PHB and the recommended DSCP marking is DF (Default Forwarding). 6.8.3.8 Classification Classification of traffic is achieved by the SAP ingress policy assigned at the edge of the network. Multi-field classification is the process of selecting packets based on the content of some arbitrary number of header fields; typically some combination of source/destination address, DiffServ Codepoint, protocol ID, source/destination port. Following multi-field classification and the relevant marking, subsequent classification is based purely on the contents of the DiffServ Codepoint or MPLS EXP bits and is referred to as Behaviour Aggregate (BA) classification. In turn BA classification is linked to a specific PHB group. Within the 7x50 this marking is achieved by mapping ingress traffic to the relevant Forwarding Class, and each Forwarding Class is uniquely identified throughout the remainder of the DiffServ Domain using specific MPLS EXP values. A SAP- ingress QoS policy is provided on the Service Access Point (SAP). Classification of traffic can be based on the physical interface, sub-interface (i.e. VLAN, VPI/VCI, DLCI) or based on any OSI Layer 2, Layer 3, or Layer 4 criteria as defined in Table 7. Note that for the purpose of brevity IPv4 and IPv6 are simply collapsed into „IP criteria‟. Layer
Criteria
Remarks
MAC criteria
Frame Type
802.3, 802.2 LLC, 802.2 SNAP, Ethernet II
802.1P Destination SAP Destination MAC Ethertype SNAP-OUI
MAC/mask
VTN VN2 High Level Design
Layer
Criteria
Remarks
SNAP-PID Source MAC Protocol
i.e. GRE, ICMP, IGMP, PIM, OSPF
DSCP Destination IP address IP Criteria
Destination port Fragment
Criteria applies to IP fragments
Source IP address Source port Default-FC
All traffic received on SAP mapped to specified FC Table 7: Multi-field Classification Criteria
Although the potential exists to employ multi-field classification using the criteria defined in Table 7 at the SAP ingress, the potential also exists to take all traffic received over a particular SAP and map it to a definable FC using the „Default-FC‟ capability. For the purpose of simplicity, it is recommended that the „Default-FC‟ method of classification be utilised on a single logical/physical interface wherever possible, and that IP/MAC criteria is used only where multiple traffic types are carried over a single logical/physical interface. 6.8.3.9 Service Classes and Traffic Aggregates Once traffic has been classified, it requires marking in order that transit routers can infer the required PHB group. There is a distinct difference between the granularity of PHB on access (customer/client/subscriber) interfaces and the granularity of PHB on network interfaces. On network interfaces where there is a large number of aggregated customer flows the queuing and scheduling is less granular to reduce network complexity. In contrast, on customer/client/subscriber interfaces the potential exists to have much more granular queuing in order to obtain the required forwarding treatment for different traffic classes. In order to achieve this aggregation on network ports, service classes are aggregated into treatment aggregates within the network core. The proposed application to class of service is taken from Table 8: QoS Service Classes and involves mapping of two or more services classes into a single forwarding treatment aggregate.
VTN VN2 High Level Design
The degree of aggregation and hence the number of treatment aggregates depends on a number of factors; most notably these are the speed of the links and whether the scheduler implementing the aggregation can minimize the affects of mixing traffic with different packet sizes/transmit rates on queue depth. Generally however, higher speed links allow for more aggregation and a smaller number of treatment aggregates. This treatment aggregation of service class subsequently needs to be made identifiable within the core network through DiffServ codepoints and MPLS EXP markings as detailed in Table 8. Note that the STANDARD class (ELASTIC treatment aggregate) is assigned two MPLS EXP settings to differentiate in-profile traffic (Business HSI) from out-ofprofile traffic (Residential HSI) with Weighted RED configured to ensure that the latter is dropped before the former. Application
Example
Service Class
DiffServ Codepoint
Treatment Aggregate
MPLS EXP
Control Protocol
RSVP, OSPF, ISIS, BGP
CONTROL
CS-6
Network Control
EXP 6
VoIP
Voice
TELEPHONY
EF
Voice application signalling
SIP, H.248, IGMP
SIGNALLING
EF
Precision Time distribution
IEEE1588v2
SIGNALLING
EF
Video
Video on Demand, Broadcast TV
BROADCAST VIDEO
AF41
SNMP, SSH
OAM
AF41
OAM
Data 1
Data 2
Point-to-Point, Multipoint-toMultipoint service Point-to-Point, Multipoint-toMultipoint service
HIGH THROUGHPUT DATA HIGH THROUGHPUT DATA
AF31
AF32
REALTIMEVOICE
REALTIMEVIDEO
EXP4
CRITICAL
EXP 3
ASSURED ELASTIC
EXP 2
ELASTIC
Inprofile EXP 1 Out-ofprofile EXP 0
Business HSI Internet Traffic
STANDARD
Default
Residential HSI Table 8: QoS Service Classes
EXP 5
VTN VN2 High Level Design
Table 9 details the treatment aggregates, MPLS EXP markings together with the internal Forwarding Class and queue types that are proposed to support the service classes defined in Table 8.
Treatment Aggregate
MPLS EXP
Forwarding Class
Class Type
WRED
CONTROL
EXP 6
Network Control
High Priority
No
REALTIME-VOICE
EXP 5
Expedited
High Priority
No
REALTIME-VIDEO
EXP 4
H2
ASSURED ELASTIC
EXP 3
L1
Assured
No
ASSURED ELASTIC
EXP 2
AF
Assured
No
EXP 1 Yes in-profile ELASTIC
EXP 0
Best BE
out-ofprofile
Effort Yes
Table 9: DiffServ QoS Marking
6.8.3.10 Network QoS Policy On network interfaces where the queuing and scheduling is less granular to reduce network complexity, treatment aggregation is applied to the large number of aggregated client flows. Given the service classes defined in Table 8 and the EXP/FC/Queue mappings defined in Table 9, Figure illustrates the network QoS policy, which can essentially be de-composed into four distinct categories •
The Ingress Network Policy that defines the EXP and DSCP mapping to the 7x50 internal Forwarding Classes.
•
The Egress Network Policy defining the egress marking to be applied to traffic that has not already been marked (and is therefore applied by the ingress node only as transit traffic has already been marked)
VTN VN2 High Level Design
•
The Network Queue defines the queuing scheduling characteristics (bandwidth, buffer) for each FC. The Network Queue is applied to all egress network ports. For network ingress traffic a Virtual Output Queue (VOQ) exists on the IOM, which implies some form of buffering on the MDA. However, as over-subscribed MDAs (i.e. >10Gb/s) aggregate
View more...
Comments