+ All Categories
Home > Documents > Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo...

Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo...

Date post: 18-Jan-2018
Category:
Upload: phebe-willis
View: 219 times
Download: 0 times
Share this document with a friend
Description:
Page 3 Many Application Scenarios  End to end disjoint path P2P disjoint path from an ingress to an egress P2MP disjoint path from an ingress to a number of egresses  Multi-homing end to end disjoint path P2P disjoint path from a backup ingress to a backup egress P2MP disjoint path from a backup ingress to a number of backup egresses  One to one Local Protection Path P2P  Path for link protection  Path for intermediate node protection  Path for ingress and egress protection P2MP  Facility Local Protection Path P2P  Path for protecting a set of LSPs over a link  Path for protecting a set of LSPs through an intermediate node  Path for protecting a set of LSPs via ingress and egress P2MP
16
Applicability of PCE for Applicability of PCE for Computing Protection Computing Protection Paths Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei
Transcript
Page 1: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Applicability of PCE for Applicability of PCE for Computing Protection PathsComputing Protection Paths

draft-chen-pce-protection-applicability

Huaimo Chen, Huawei

Page 2: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 2

Introduction Discussions initiated by Daniel King on List. Applications such as Cloud drive increasingly

more traffic across longer ranges over LSP crossing domains

It is very important to provide protections for the traffic against failures

PCE is used for computing paths for LSP crossing domains

PCE COULD also be used for computing protection paths for LSP crossing domains

Page 3: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 3

Many Application Scenarios End to end disjoint path

P2P disjoint path from an ingress to an egress P2MP disjoint path from an ingress to a number of egresses

Multi-homing end to end disjoint path P2P disjoint path from a backup ingress to a backup egress P2MP disjoint path from a backup ingress to a number of backup egresses

One to one Local Protection Path P2P

Path for link protection Path for intermediate node protection Path for ingress and egress protection

P2MP Facility Local Protection Path

P2P Path for protecting a set of LSPs over a link Path for protecting a set of LSPs through an intermediate node Path for protecting a set of LSPs via ingress and egress

P2MP

Page 4: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 4

PCE for Computing E2E Disjoint Path P2P disjoint path from an ingress to an egress

A UT

Q

R

L

M

N

K

J

IH

GE

FC

B

SP

D

PCE1

PCE2

PCE3

PCE4

EgressIngress

Primary path from A to U

Backup path from A to U, disjoint with the primary pathdisjoint link, node, domain except for ingress A and egress U

Page 5: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 5

PCE for Computing E2E Disjoint Path P2MP disjoint path from an ingress to multiple egresses

A YW

Q

V

L

M

N

K

J

IH

GE

FC

B

XP

D

PCE1

PCE2

PCE3

PCE5

Egress

Ingress

Primary path from A to U,Y, Z

Backup path from A to U,Y and Z, disjoint with the primary pathPossible disjoint link, node, domain except for ingress A and egresses U, Y and Z

UT

R

S

PCE4

ZB1

A1

C1PCE6

Egress

Egress

Page 6: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 6

PCE for Multi-homing E2E Disjoint Path P2P disjoint path from a backup ingress to a backup egress

A

U

Q

R

L

M

N

K

J

IH

GE

FC

B

SPD

PCE1

PCE2

PCE3

PCE4

Egress

Ingress

Primary path from A to U

Backup path from A’ to U’, disjoint with primary pathdisjoint every link, every node, domain

A’U’

Backup Ingress

Backup Egress

TSrc

Dst

Page 7: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 7

PCE for Multi-homing E2E Disjoint Path P2MP disjoint path from an ingress to multiple egresses

YW

Q

V

L

M

N

K

J

IH

GE

FC

B

XP

D

PCE1

PCE2

PCE3

PCE5

Egress

Primary path from A to U,Y, Z

Backup path from A’ to U’,Y’ and Z’, disjoint with the primary pathDisjoint as many link, node, domain as possible

UT

R

S

PCE4

ZB1

A1

C1PCE6

Egress

Egress

A

Ingress

A’

Src

Z’

U’

Y’

Backup Ingress

Backup Egress

Dst

Dst

Dst

Page 8: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 8

PCE for P2P Detour Local Protection Path Link protection

A UT

Q

R

L

M

N

K

J

IH

GE

FC

B

P

D

PCE1

PCE2

PCE3

PCE4

EgressIngress

P2P LSP from A to U

Detour path for protecting link C--F

S

VC1

Detour path for protecting link J--R

Page 9: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 9

PCE for P2P Detour Local Protection Path Intermediate node protection

A UT

Q

R

L

M

N

K

J

IH

GE

F1C

B

P

D

PCE1

PCE2

PCE3

PCE4

EgressIngress

P2P LSP from A to U

Detour path for protecting node F

S

VC1

Detour path for protecting node J

Page 10: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 10

PCE for P2P Detour Local Protection Path P2P path for protecting ingress and egress

A

U

Q

R

L

M

N

K

J

IH

GE

FC

B

SPD

PCE1

PCE2

PCE3

PCE4

Egress

Ingress

P2P LSP from A to U

Backup path from A’ to B (NH of A) for protecting ingress A

A’U’

Backup Ingress

Backup Egress

TSrc

Dst

Backup path from R (PH of U) to U’ for protecting egress U

Page 11: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 11

PCE for P2MP Detour Local Protection Path Path for protecting link Path for protecting intermediate node Path for protecting ingress and egress

Page 12: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 12

PCE for P2P Facility Local Protection Path Link protection

A UT

Q

R

L

M

N

K

J

IH

GE

F1C

B

P

D

PCE1

PCE2

PCE3

PCE4

Egress

Ingress

P2P LSP from A to U

Facility path for protecting link C—F for 2 LSPs

S

VC1

Facility path for protecting link J—R for 3 LSPs

P2P LSP from A to V

Egress

W

J1

Page 13: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 13

PCE for P2P Facility Local Protection Path Intermediate node protection

A UT

Q

R

L

M

N

K

J

IH

GE

F1C

B

P

D

PCE1

PCE2

PCE3

PCE4

EgressIngress

P2P LSP from A to U

Facility path for protecting node C for 2 LSPs

S

VC1

P2P LSP from A to V

Egress

Page 14: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 14

PCE for P2P Facility Local Protection Path P2P path for protecting ingress and egress

A

U

Q

R

L

M

N

K

J

IH

GE

F1C

B

SPD

PCE1

PCE2

PCE3

PCE4

Egress

Ingress

P2P LSP from A to U

Backup path from A’ to B (NH of A) for protecting ingress A for 2 LSPs

A’U’

Backup Ingress

Backup Egress

TSrc

Dst

Backup path from R (PH of U) to U’ for protecting egress U for 2 LSPs

P2P LSP from A to V

Ingress

Page 15: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Page 15

PCE for P2MP Facility Local Protection Path Path for protecting link Path for protecting intermediate node Path for protecting ingress and egress

Page 16: Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Summary/Next Step

Document highlights best practice, use cases and gaps.

Where needed recommendations for further extensions and procedures.

Would this be a useful document for WG? Please provide input and examples Thank you!


Recommended