Packet forwarding is a process of relaying packets from one communication link to another by nodes in a network. A packet is a formatted unit of data that typically contains control information and payload data. Control information may include: source and destination IP addresses, error detection codes like checksums, sequencing information, etc. Control information is typically found in packet headers and trailers, with payload data in between.
At network nodes where multiple outgoing links are available, the choice of link to use for packet forwarding requires a decision process that, while simple in concept, can be complex. Since packet forwarding decisions are handled by nodes, the total time required for this can become a major limiting factor in overall network performance.
Label Distribution Protocol (LDP) is a mechanism where network nodes (e.g., routers) capable of Multiprotocol Label Switching (MPLS) exchange labels with their neighbors. These labels can be subsequently attached to packets and used by nodes to make packet forwarding decisions. For purposes of explanation only, nodes that make packet forwarding decisions based on labels will be referred to as LDP nodes. Packet forwarding based on labels stands in stark contrast to traditional Internet Protocol (IP) routing in which packet forwarding decisions are made using IP addresses contained within packets. Because LDP nodes use labels, there is no need for LDP nodes to examine the contents (e.g., IP addresses) of packets to make packet forwarding decisions.
The present disclosure may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
Overview
An apparatus and method is disclosed for segment routing (SR). In one embodiment, the method includes a node creating a segment stack that identifies one segment calculated using a first algorithm and a second segment calculated using a second, different algorithm. The node then attaches this header to a packet and sends it to another node.
IP routing and Multiprotocol Label Switching (MPLS) are distinct packet forwarding mechanisms. IP routing uses IP addresses inside packet headers to make forwarding decisions. In contrast, LDP nodes (i.e., nodes employing MPLS) can make forwarding decisions using short path identifiers called labels that are attached to packets. Segment routing (SR) is yet another mechanism that can be employed. SR is similar to MPLS in many regards. For example, forwarding decisions in SR can be based on short path identifiers called segment IDs that are attached to packets. However, substantial differences exist between SR and MPLS as will be more fully described below.
IP Routing
IP routing uses routing tables that maintain forwarding information to various destinations. In one embodiment, when a packet arrives at a node, the node can use the destination IP address in the packet header to access a routing table and lookup corresponding forwarding information such as an egress interface, which is the interface or port to be used to forward the packet to the next node on a path to the packet's final destination. After the packet is forwarded the next node performs its own routing table lookup using the same destination IP address, and so on.
MPLS
MPLS is commonly employed in provider networks or networks that provide packet transport and other services for customers. Packets enter an MPLS provider network via an ingress provider edge (PE) node, travel hop-by-hop along a label-switched path (LSP) that includes one or more core nodes, and exit the provider network via an egress PE node.
Packets are forwarded along an LSP based on LDP forwarding tables and labels attached to packets. Labels allow for the use of very fast and simple forwarding engines in the dataplane of LDP nodes. Another benefit of MPLS is the elimination of dependence on a particular Open Systems Interconnection (OSI) model data link layer technology to forward packets.
A label is a short, fixed-length, locally significant identifier that can be associated with a forwarding equivalence class (FEC). Packets associated with the same FEC should follow the same LSP through the provider network. LSPs can be established for a variety of purposes, such as to guarantee a certain level of performance when transmitting packets, to forward packets around network congestion, to create IP tunnels for network-based virtual private networks, etc. In many ways, LSPs are no different than circuit-switched paths in ATM or Frame Relay networks, except that they are not dependent on a particular Layer 2 technology.
LDP is employed in the control plane of LDP nodes. Two nodes, called LDP peers, exchange label mapping information on a FEC by FEC basis. The exchange of information can be bi-directional. LDP generates labels for, and exchanges labels between, peer nodes. LDP can be used to build and maintain LDP forwarding tables that map labels and node interfaces. These forwarding tables can be subsequently used by nodes to forward packets through MPLS networks as more fully described below.
When a packet is received by an ingress PE node of an MPLS network, the ingress PE node may determine a corresponding FEC. Characteristics for determining the FEC for a packet can vary, but typically the determination is based on the packet's destination IP address. Quality of Service for the packet may also be used to determine the FEC. Once determined, the ingress PE node can access a table to select a label that is mapped to the FEC. The table may also map an egress interface to the FEC. Before the ingress PE node forwards the packet via the egress interface, the ingress PE node pushes or attaches the label to the packet.
A packet with attached label can be forwarded along an LSP, and nodes in the LSP can make forwarding decisions based on labels. To illustrate, when an LDP node receives a packet with an attached label (i.e., incoming label), an LDP forwarding table in the node can be accessed to read an egress interface and a label (i.e., an outgoing label) mapped to the incoming label. Before the packet is forwarded via the egress interface, the node may swap the incoming label with the outgoing label. The next hop receives the packet and attached label and may perform the same process. This process is often called hop-by-hop forwarding along a non-explicit path. The egress PE node in the LSP may pop or remove an incoming label before the packet is forwarded to a customer. To illustrate,
Segment Routing
Segment routing (SR), which can also be referred to as chain routing (CR), is a mechanism in which packets can be forwarded using SR forwarding tables and segment IDs attached to packets. Like MPLS, SR enables very fast and simple forwarding engines in the dataplane of nodes. SR is not dependent on a particular Open Systems Interconnection (OSI) model data link layer technology to forward packets.
SR nodes (i.e., nodes employing SR) are similar to LDP nodes in many ways. Since most SR nodes make forwarding decisions based on segment IDs as opposed to labels, however, SR nodes need not employ LDP in their control planes. Unless otherwise indicated, an SR node lacks LDP in the control plane. Additional differences can exist between SR nodes and LDP nodes.
SR can be employed in provider networks. Packets enter an SR enabled provider network via an ingress provider edge (PE) node, travel hop-by-hop along a segment-switched path (SSP) that includes one or more core nodes, and exit the provider network via an egress PE node. Much of the remaining disclosure will make reference to an autonomous, provider network that operates under one administrative domain, although SR can be employed over multiple administrative domains as well. In general a provider network may contain a contiguous set of nodes.
Like labels, segment IDs are short (relative to an IP address or a FEC), fixed-length identifiers. Segment IDs may correspond to topological segments of a provider network or services provided by nodes thereof. Topological segments can be one hop paths to SR nodes, or they can be multi-hop paths to SR nodes. Topological segments act as sub-paths that can be combined to form an SSP. Stacks of segment IDs can represent SSPs, as will be described below. Like LSPs, SSPs can be associated with FECs. Thus segment ID stacks may correspond to FECs.
There are several types of segment IDs, including but not limited to: nodal-segment IDs, adjacency-segment IDs, and service-segment IDs. A nodal-segment ID represents a one-hop or a multi-hop path within the provider network to an associated SR node. Nodal-segment IDs are assigned to respective SR nodes within the provider network so that no two SR nodes in the provider network are assigned the same nodal-segment ID. In one embodiment, all assigned nodal-segment IDs are selected from a predefined ID range (e.g., [64, 5000]) for the provider network. The range for nodal-segment IDs may be different from a predefined range for labels.
Nodal-segment IDs can be assigned to SR nodes, in some embodiments, by a path computation element (PCE) server. When an SR node is powered on, the SR node can send a query to the PCE server requesting a nodal-segment ID. In response, the PCE server can respond with an appropriate identifier from the predefined ID range. The PCE server can maintain a record (e.g., in a data structure in memory, in a file on a hard drive, and the like) that indicates which nodes have been assigned nodal-segment IDs. If the requesting SR node has not already been assigned a nodal-segment ID, the PCE server can select an unused ID from the ID range, send a response containing the selected ID, and update the record to show that the requesting node has been assigned the selected ID. If the requesting SR node has already been assigned a nodal-segment ID (e.g., before being powered down), the PCE server can access the record to obtain the already-assigned nodal-segment ID and return that ID to the requesting SR node.
Instead of sending IDs in response to requests from SR nodes, the PCE server can alternatively identify that a newly-booted SR node needs a nodal-segment ID and assign (and send) that SR node a nodal-segment ID without having first received a request from that SR node. Similarly, a PCE server can identify that an SR node that already has one or more assigned nodal-segment IDs needs a new nodal-segment ID (in order to provide an alternative path to that SR node) and can thus similarly assign and send the SR node its additional nodal-segment ID.
In addition to providing nodal-segment IDs, the PCE server may, in some embodiments, also specify the type of algorithm to be used when calculating the path identified by that nodal-segment ID. In such embodiments, the SR nodes do not need to be preconfigured with the identity of the particular type of algorithm(s) to use in nodal-segment path calculation.
The SR nodes can map their respectively assigned nodal-segment IDs in memory to unique identifiers. For purposes of explanation only, nodal-segment IDs are mapped to respective node loopback prefix IP addresses. One of ordinary skill understands that node loopback prefix IP addresses (node prefixes for short) distinguish the SR nodes from each other within the provider network. The node prefixes can be used by link state protocols such as open shortest path first (OSPF) or intermediate system to intermediate system (IS-IS), or modifications thereof, operating in the control plane of an SR node to identify egress interfaces for paths to respective SR nodes. Once identified, the appropriate egress interfaces for the paths can be mapped to nodal-segment IDs within an SR forwarding table as the SR forwarding table is created or subsequently updated.
In some embodiments, the link state protocols can calculate paths to SR nodes using a variety of different algorithms. A default path-calculation algorithm (e.g., a Dijkstra shortest path rooted at the SR node to which the path leads) may be used if no specific algorithm is specified; if an algorithm is specified for a particular path, however, all SR nodes will use the same specific algorithm when calculating that path. As described above, each SR node uses the path calculation in order to identify the appropriate egress interface to add to its SR forwarding table for a given nodal-segment ID.
Examples of the different algorithms that can be used to calculate a path to an SR node include Dijkstra algorithms rooted at that SR node that have one or more of the following characteristics: use of an IGP metric; use of an IGP extended latency metric; bounds on a cumulative metric; exclusion of links with loss larger than a threshold; exclusion or inclusion of a set of one or more shared risk link groups (SRLGs); use of a set of affinities; and the like. In general, the algorithms that can be used can include those used to calculate the shortest-path on any metric (not only that used by IS-IS metric), those with bounds on metrics, those having non-cumulative metrics (e.g., such as those handling optical non-linear impairments), those used to calculate non-shortest paths (e.g. reverse-Dijkstra algorithms), those enforcing disjointness based on SRLG and/or affinity, those enforcing inclusion based on SRLG and/or affinity, and the like. Thus, a node could advertise its nodal-segment ID along with a flag indicating that the algorithm used to compute the path associated with that nodal-segment ID is a Dijkstra rooted at the node on metric m2 with a bound on latency and exclusion of links with loss larger than a threshold and exclusion of SRLG 23.
In some embodiments, it may be desirable, from a traffic engineering standpoint, for there to be two (or more) different nodal segments leading to the same SR node. In such embodiments, that SR node can be assigned two different nodal-segment IDs (e.g., each of which can then be mapped to a different node prefix). In these situations, the distinct paths are each calculated using a different algorithm. Accordingly, another node can include multiple nodal-segment IDs for segments leading to the same SR node in its SR forwarding table (e.g., like SR forwarding table 240 in
One example of a situation in which it is desirable to have multiple nodal-segments leading to the same SR node involves traffic between two continents. There may be two different undersea cables available to carry this traffic. As such, one nodal-segment can be defined for a path using the first undersea cable (e.g., for standard customers' traffic) and another nodal-segment can be defined for the path using the second undersea cable (e.g., for premium customers' traffic). The first path can be computed using an IS-IS shortest path algorithm while the second can be computed using an algorithm that takes a latency metric into account.
Multiple nodal-segments leading to the same SR node can also be implemented for customers who desire to have multiple disjoint (non-overlapping) paths between customer locations. Here, algorithms that use different exclusion constraints can be used to calculate those disjoint paths.
An adjacency-segment ID represents a link between adjacent SR nodes. For purposes of explanation only, this disclosure will refer to a link between nodes as an adjacency segment (hereafter adjacency). Adjacencies can be uniquely identified in the provider network. For purposes of explanation only, this disclosure will identify an adjacency (hereafter adjacency-ID) using the node prefixes of nodes between which the adjacency is immediately positioned. To illustrate, for an adjacency between two nodes identified by node prefix X and node prefix Y, the adjacency will be identified herein as adjacency-ID XY. This disclosure will presume that only one adjacency exists between nodes in the provider network, it being understood the present disclosure should not be limited thereto. As such, adjacencies are unique in the provider network of this disclosure. Since adjacencies are unique, it follows that adjacency-IDs are likewise unique. Adjacency-IDs should not be confused with adjacency-segment IDs; adjacency-segment IDs may not be unique within the provider network domain.
Each SR node can assign a distinct adjacency-segment ID for each of the SR node's adjacencies. Separate SR nodes may assign the same adjacency-segment ID. Adjacency-segment IDs, however, are locally significant; separate SR nodes may assign the same adjacency-segment ID, but that adjacency-segment ID represents distinct adjacencies. In one embodiment, adjacency-segment IDs are selected from a predefined range that is outside the predefined range for nodal-segment IDs. The predefined range of adjacency-segment IDs may also be outside the predefined range for labels.
Service-segment IDs correspond to packet services performed by SR nodes such as deep packet inspection (DPI) and/or filtering. Each SR node can assign a distinct service-segment ID for each of the SR node's packet services. For the purposes of explanation only, a node will offer no more than one service. Service-segment IDs are locally significant Like adjacency-IDs, separate SR nodes may assign the same service-segment ID for their respective services. Service-segment IDs can be selected from the same range as the adjacency-segment IDs, or service-segment IDs can selected from a predefined range that is distinct from the ranges for labels, adjacency-segment IDs and/or nodal-segment IDs. The service-segment IDs can be assigned based on service type, it being understood the present disclosure should not be limited thereto. As an example, adjacency-segment ID 5001 is always mapped to deep packet inspection within the provider network, regardless of the node or nodes that perform the service.
SR nodes can advertise their nodal-segment IDs, adjacency-segment IDs, service-segment IDs, and node prefixes to other SR nodes in the provider network using a protocol such as interior gateway protocol (IGP) or a modification thereof. SR nodes can use the nodal-segment IDs, adjacency-segment IDs, service-segment IDs, node prefixes, and/or other information to create or update SR forwarding tables and/or segment ID stacks.
In one embodiment the SR nodes can advertise their nodal-segment ID/node prefix pairs, adjacency-segment ID/adjacency-ID pairs, and/or service-segment ID/node prefix pairs. The control planes of an SR node can receive and use the nodal-segment ID/node prefix pairs and a link-state protocol such as IS-IS or OSPF, or modified versions thereof, to identify egress interfaces for paths to SR nodes, using the appropriate algorithms identified (if any) in the advertisements of the nodal-segment to those SR nodes or a default algorithm (e.g., a Dijkstra shortest path rooted at the appropriate SR node). An egress interface, once identified, can be mapped to its respective nodal-segment ID in the node's SR forwarding table.
Nodes also map their adjacency-segment IDs to egress interfaces for respective adjacencies in SR forwarding tables. Because adjacency-segment IDs are locally significant, however, adjacency-segment IDs should only be mapped in SR forwarding tables of the nodes that advertise the adjacency-segment IDs. In other words, an SR node that advertises an adjacency-segment ID/adjacency-ID pair should be the only node in the provider network that has a SR forwarding table that maps the adjacency-segment ID to an egress interface connected to an adjacency identified by the adjacency-ID. Service-segment IDs are also locally significant and should only be mapped in the nodes in which they are advertised. Unlike adjacency-segment IDs, however, service-segment IDs are not mapped to egress interfaces. Rather, the service-segment IDs are mapped to respective services that can be implemented by the node.
In one embodiment, SR nodes can use a sub-type-length-value (sub-TLV) in an IS-IS protocol link state packet to advertise IDs. This sub-TLV can include information identifying the ID being advertised, as well as the type of that ID (e.g., nodal-segment ID, adjacency-segment ID, or service-segment ID). The sub-TLV can also include information (e.g., in the form of a flag) for nodal-segment IDs that indicates how to calculate the path identified by that nodal-segment ID (e.g., using shortest IGP metric, extended latency IGP metric, and the like). Information that identifies the path associated with the advertised ID in terms of a hop list or SR stack may also be included. In some embodiments, the sub-TLV may also include information identifying the domain to which the ID belongs (e.g., in systems that support SR across multiple domains) and/or that the ID is being linked (via redistribution) to another segment ID within a different domain (if the latter, the linked segment ID can also be included in the sub-TLV). (Performing SR across multiple domains is discussed in more detail below.) The sub-TLV can be part of a larger TLV (e.g., such as TLV22, TLV135, and the like) within the link state packet.
As an example, if IDs are 20 bits in length, each sub-TLV can include the 20-bit ID being advertised, following by a variable-length flag vector that can indicate the type of ID and other information. In one embodiment, the flag vector can include one or more of the following flags: a flag indicating whether the ID is unique within the local domain, a flag indicating that the path to the advertising node should be computed based upon a shortest-path IGP metric, a flag indicating that the path to the advertising node should be computed based upon an IGP extended latency metric, and the like. As described above, any of a variety of algorithms can be used to calculate a path to an SR node, and thus this sub-TLV can indicate the type of algorithm used to calculate the path associated with the advertised ID, thus ensuring that all SR nodes use that same algorithm when calculating that path.
This link state packet can be also be used to indicate whether the node sending the link state packet containing the sub-TLV supports SR. For example, the ability of the SR node to support SR can be indicated by a value in the router capability TLV 242 of an IS-IS link state packet.
Segment Routing (SR) enables segment-switched paths (SSPs), which can be used for transporting packets through the provider network. Like LSPs, SSPs are typically associated with FECs, and can be established for a variety of purposes, such as to guarantee a certain level of performance. Packets associated with the same FEC will typically follow the same SSP of SR nodes through the provider network. Nodes in SSPs make forwarding decisions based on segment IDs, not based on the contents (e.g., destination IP addresses) of packets. As such, packet forwarding in SSPs is not dependent on a particular Layer 2 technology.
SR nodes can use nodal-segment IDs, adjacency-segment IDs, and service-segment IDs they receive in advertisements from other SR nodes in order to create ordered lists of segment IDs (i.e., segment ID stacks). Segment ID stacks correspond to SSPs, respectively, that forward packets between nodes (e.g., SR enabled ingress and egress nodes) in the provider network. Segment IDs in a stack may correspond to respective segments or sub paths of a corresponding SSP. When an SR source node (e.g., an SR ingress PE node) receives a packet, the node can calculate a FEC for the packet in much the same way that LDP ingress PE nodes calculate FECs for packets received from a customer edge router. The SR source node uses the FEC it calculates to select a segment ID stack mapped thereto. The SR source node can add the selected segment ID stack to a header, and then attach the header to the packet. The packet with attached stack can traverse the segments of the SSP in an order that corresponds to the list order of the segment IDs in the stack. A forwarding engine operating in the dataplane of each SR node can use a segment ID within the stack and an SR forwarding table in order to forward the packet and header to the next node in the SSP. As the packet and attached header are forwarded along the SSP in a hop-by-hop fashion, the attached stack of segment IDs remains unchanged in one embodiment.
To illustrate general concepts of SR,
Provider network 202 consists of SR nodes 204-222. Nodes 204-210 are assigned unique nodal-segment IDs 64-67, respectively, SR enabled routers 212-218 are assigned unique nodal-segment ID's 68-71, respectively, and SR enabled router 222 is assigned unique nodal-segment ID of 72. Each of the SR nodes 204-222 have interfaces that are identified as shown. For example, node 204 has three interfaces designated 1-3, respectively. Each of the nodes 204-222 is assigned a node prefix that is unique within network 202. Node prefixes A-D are provided for nodes 204-210, respectively, node prefixes M-P are provided for nodes 212-218 respectively, and node prefix Z is provided for node 222. As noted above, these node prefixes are unique within network 202 and can be used for several purposes such as calculating the topology of network 202, which in turn can be used to calculate paths. Nodes 204-222 can also assign locally significant adjacency-segment IDs and/or service-segment IDs. For example, node 208 can assign adjacency-segment IDs 9001-9003 for adjacencies CB, CD, and CO, respectively, and node 208 can assign service-segment ID 5001 for a deep packet inspection service provided by the node.
Each of SR nodes 204-222 can advertise its service-segment ID, adjacency-segment ID(s), nodal-segment ID, and node prefix to the other nodes in network 202. For example, node 208 can generate and send one or more advertisements (e.g., using a sub-TLV of one or more IS-IS link state packets as described above) that: map adjacency-segment IDs 9001-9003 to adjacency IDs CB, CD, and CO, respectively; map nodal-segment ID 66 to node prefix C, and; map service-segment ID 5001 to a deep packet inspection service. Using the advertisements they receive, the control planes of nodes 204-222 can generate respective SR forwarding tables for use in the dataplanes. For example, node 208 can generate example SR forwarding table 240 using a link state protocol and the advertisements that node 208 receives directly or indirectly from nodes 204, 206, 210, 212-218, and 222. Example SR forwarding table 240 maps adjacency-segment IDs 9001-9003 to node interface IDs 1-3, respectively, and nodal-segment IDs such as 64, 65, 67, 70, and 72, to node 208 interface identifiers 1, 1, 2, 3, and 2, respectively, which are the egress interface identifiers determined by node 208 for node prefixes A, B, D, 0, and Z respectively. It is noted that in the embodiment shown, only SR forwarding table 240 maps adjacency-segment IDs 9001-9003 to interface identifiers; SR forwarding tables in the other nodes of network 202 should not map adjacency-segment IDs 9001-9003.
In addition to creating SR forwarding tables based on received segment ID advertisements, several SR nodes 204-222 can calculate segment ID stacks for respective SSPs. For example, node 204 calculates example segment ID stack 224 for an SSP between ingress node 204 and egress node 222. Example segment stack 224 can be calculated for a particular FEC (e.g., FEC F).
Example stack 224 includes four segment IDs: nodal-segment IDs 66 and 72 advertised by nodes 208 and 222, respectively; service-segment ID 5001 advertised by node 208, and; adjacency-segment ID 9003 advertised by node 208. Stack 224 corresponds to an SSP in which packets flow in order through nodes 204, 206, 208, 216, 218, and 222. Packets flowing through this SSP are also subjected to the deep packet inspection service provided by node 208.
SR node 204 is an ingress PE node for packets received from customer edge router CE1. In response to receiving a packet, ingress SR node 204 can calculate a FEC based upon, for example, one or more IP addresses contained within the packet. After calculating the FEC for the packet, node 204 can select a segment ID stack, which is mapped to the calculated FEC from a table stored in memory (not shown). For example, node 204 can calculate FEC F for packet P based on the destination IP address in packet P. As noted above, FEC F is mapped to example stack 224. Node 204 may then create a header such as header 226 for packet P that contains the selected segment ID stack 224. Example header 226, as shown in
Example segment stack 224 lists segment IDs that correspond to one hop and multi hop segments of provider network 202 that packets with stack 224 traverse to reach egress node 222. The segments collectively form the SSP corresponding to stack 224. Once header 226 is attached to packet P, ingress SR enable node 204 may access a SR forwarding table (not shown) using the active segment ID of the segment ID stack 224. Again, the active segment ID is identified by the active segment ID pointer 230. In the embodiment shown in
With continuing reference to
After the SR node increments the active segment pointer in step 306, the SR node determines whether the active segment ID is a service-segment ID for a service to be performed by the SR node. This step can be implemented simply by comparing the active segment ID with a service-segment ID mapped to a service in memory of the SR node, or by comparing the active segment ID with a range of IDs that are reserved for service-segment IDs. If the SR node determines in step 310 that the active segment ID is a service-segment ID, then the process proceeds to step 312 where the SR node implements the offered service on packet P. Thereafter, in step 314 the SR node increments the active segment ID pointer, which in turn identifies the next or the new active segment ID in the segment ID stack.
Presuming the active segment ID does not equal the SR node's nodal-segment ID in step 304, or the active segment ID is not a service-segment ID as determined in step 310, the process proceeds to step 316 where the SR node accesses its SR forwarding table to read the egress interface ID that is mapped to the active segment ID. In step 320 the SR node determines whether the active segment ID is an adjacency-segment ID or a nodal-segment ID. This determination may be implemented by simply comparing the active segment ID with the designated range of nodal-segment IDs that are available for assignment within the network. Thus, if the active segment ID is found to be a number within the designated range, the active segment ID is a nodal-segment ID and the SR node forwards packet P and attached header H to the next node via the egress interface that is identified in step 316. Otherwise, the active segment ID is an adjacency-segment ID, and the active segment pointer 324 is incremented before packet P and header H are forwarded to the next node via the egress interface that is identified in step 316.
It is noted that in an alternative embodiment, an active segment ID pointer is not needed. In this alternative embodiment, the segment ID at the top of the stack is considered the active segment ID, and segment IDs can be popped from the segment ID stack at steps 306, 314 or 324 instead of incrementing a pointer in the header as shown. In this alternative embodiment, however, the stack changes substantially as the packet and header traverse the SSP.
With continuing reference to
With continuing reference to
When creating a segment stack to include in a header of packet to be routed via a network of SR nodes, an SR node can use any of the segments identified in its SR forwarding table. As described above, these segments can identify paths calculated using any of a variety of different algorithms, such that a given segment stack can identify segments calculated using different algorithms. For example, a segment stack listing segment IDs A, B, D, E, F can include two paths (e.g., those identified by segment IDs A and B) calculated using a first algorithm and another path (e.g., identified by segment ID E) calculated using an entirely different algorithm.
Segment stacks can be constructed in any manner needed for traffic engineering purposes. Additionally, a node can use any of the identified segments in its SR forwarding table to form a segment stack. Furthermore, a node may select bits and pieces of paths identified by different segments in order to create a segment stack. Thus, a node can combine different segments into a segment stack for a variety of reasons. One reason is to define a new path that is not explicitly defined by any existing segment. Thus, to get a packet from node A to node F, a segment stack created by node A can include one segment that goes to node B, and another segment that includes node B (but doesn't necessarily have to start with node B) and goes to node F. As noted above, these two segments can cover paths calculated using different algorithms.
Another reason for combining different segments is in order to reduce the number of segment identifiers in the stack. For example, a node can determine that a packet should be routed over a path that passes through six nodes ABCDEF in that exact order. While the node could use six adjacency segments to route the packet, the segment stack would need to include all six identifiers of those adjacency segments. As an alternative, the SR node can examine its forwarding table and determine that the nodal-segment to node C includes nodes A and B, and that the nodal-segment to node F includes nodes D and E. Based on these determinations, the SR node can simply include the nodal-segment to C followed by the nodal-segment to F in the segment stack, reducing the number of identifiers from six to two.
As briefly noted above, some embodiments may support SR over multiple domains (e.g., as defined by an administrator or a protocol). In these embodiments, certain SR nodes may operate in multiple domains simultaneously. As an example, in
While nodes within a given domain can be guaranteed to use unique nodal-segment IDs for each nodal-segment defined within the domain, this guarantee of uniqueness does not extend across domains. As such, SR nodes cannot simply advertise the same nodal-segment IDs they use within their own domain into another domain. Accordingly, nodes A and B cannot advertise their nodal-segment IDs into domain D2, and nodes D and E cannot advertise their nodal-segment IDs into domain D1.
In order to allow SR to be performed across domains D1 and D2, a node that bridges domains, like node C in
When a node receives a link state message that indicates that a segment ID has been redistributed, the node updates its SR forwarding table to include both the original segment ID (from the other domain) and the linked segment ID (from the same domain as the receiving node). When forming segment stacks involving this path, the node will include both IDs in the segment stack. The topmost ID, which is the segment ID in the same domain as the node forming the segment stack, will cause the packet to which the segment stack is attached to be routed to the node that performed the redistribution. The next ID, which is the segment ID that was redistributed, is then used to route the packet from the node that performed the redistribution into the foreign domain.
Since a network can contain more than two domains, there can be multiple layers of redistribution. When this occurs, the number of linked segment IDs will equal the number of domains to which the original segment ID has been redistributed. Thus, if a redistributed segment ID was redistributed from the second domain to a third domain, there would be three segment IDs in the advertisement: one for each domain into which the segment ID had been advertised.
When segment IDs are redistributed, the properties associated with the original segment ID are preserved. Thus, if the original segment ID is advertised in a manner indicating that the segment ID represents a path calculated using a particular algorithm, this property will be maintained in the advertisements used to redistribute the segment ID. Accordingly, in the above example, the new segment ID requested by the node performing the redistribution will be associated with the same properties as the segment ID to which it is linked. In other words, both the original path in the original domain and the new, linked path in the foreign domain will be calculated using the same algorithm.
If multiple nodal-segment IDs to the same node are redistributed into another domain, each will be linked with a unique nodal-segment ID in the foreign domain. The linked segment will be calculated using the same algorithm as the original segment.
A Segment-Routed Fabric for Virtualized Dynamic Traffic-Engineered Flow
Networks MPLS Traffic Engineering (MPLS-TE) is a technique to engineer a demand matrix on a given infrastructure. However, MPLS-TE cannot support extremely fast and granular optimization, nor is MPLS-TE designed to account for multiple independent demand-matrices overlaid on the same infrastructure.
As a numerical example, assume a network of 1000 edge router (PE) and 100 core router (P) devices and a single demand from any PE to any PE (the least granularity possible, hence the simplest case). This represents 1000×1000=one (1) million Label Switched Paths (LSPs) to install through the network. Assume, on average, the number of hops of a PE-to-PE LSP is five (5) (four (4) P devices on the path). The paths are distributed uniformly across all the P devices.
In this example, each LSP is worth four (4) P states in the network. With one million LSPs, this makes four million LSP states. Assuming uniform distribution, this represents four million/100=40,000 LSP states per node. Each PE node would have 999 LSP states, and each P node would have 40,000 LSP states. As this example shows, such a network would likely have scaling and performance problems. In fact, today even smaller deployments (150×150) may suffer from scaling and performance problems.
In Software Defined Networking (SDN), applications will be able to request service-level agreement (SLA) commitments for much finer (more granular) demands. Assuming a modest granularity increase of 10 demands per PE to PE pair instead of one, as in the prior example, the number of LSP states per PE and P would become 9990 and four (4) million respectively.
Assuming that 20% of these demands change every 15 minutes, this leads to approximately 2000/800,000 LSP state changes per PE/P every 15 minutes or 200,000/80 million LSP state changes per PE/P per day. This result scales neither from an absolute state count perspective (four million far exceeds the one million MPLS label space currently available) nor from a dynamic LSP state change count perspective.
With MPLS-TE, the diameter of the engineered network may need to be restricted (100 P to 100 P nodes instead of 1000 PE to 1000 PE nodes); to be configured so that the network deals with less granular, less variant demands; and to be configured so that the network inhibits opening, on a per application demand basis, new paths through network, but instead maps each of these individual demands onto a small number of possible paths between the MPLS-TE endpoints.
In one embodiment, a solution allows use of any path through the network on a per SDN application demand basis, whatever the number of demands and their frequency of change. In the description that follows, a chain-routed network infrastructure (or at least one capable of supporting chain-routing of packets) is assumed, as well as the existence of an entity that acts as a Path Computation Element (PCE) server. This entity is responsible for maintaining an up-to-date view of the global network state.
In simple terms, achieving the desired application-specific traffic engineering relies on two elements: the PCE server, which maintains a complete view of the state of the network and of all traffic-engineering bandwidth reservations; and the chain-routed network layer, which allows an ingress edge router to direct each incoming packet along any available path to the egress edge router.
There are several alternatives for how an application can request and manage bandwidth resources from the fabric. In one embodiment, an application issues a new type of PCE request to inquire about the feasibility of a specific SLA between two end-points of the network (PE1 to PE2, SLA1). If the PCE server finds a path that meets the SLA request SLA1 (in terms of bandwidth, SRLG avoidance, disjointness with another demand, latency, loss bounds, and the like), the PCE server replies to the application and provides the chain-routed label stack to impose on the packets for this demand.
Alternatively, the application can register with the PCE server and reserve a certain amount of bandwidth per link, for each link in the topology. The application receives a topology map of the network together with all the existing chains. The application can then itself keep the “books” for how its bandwidth is used on a per link basis and how its demands are routed through the network. An important consideration in this description is that the service provider has control over the view of the network topology that is provided to the application. The service provider may choose, on a per-application basis, whether to provide a picture of the full network topology, or instead to provide a restricted or otherwise edited topology view to the application.
Furthermore, all of the techniques that apply to applications above can also be applied to customer edge (CE) devices. In these cases, information can be exchanged with the CE device using a User-to-Network Interface (UNI) protocol designed for the purpose, rather than via PCE. This yields an attractive alternative to the “classic” MPLS VPN service model. The same fabric architecture thus allows us to support highly dynamic traffic-engineered virtual overlay networks both for “classic” VPNs, and for “modern” SDN-style applications, and in such a way that the service provider has complete control over the visibility and usage of the fabric topology.
Finally, although the above description used an example in which the PCE was the means by which applications communicate with the network fabric, this is not essential. Alternative protocols or APIs can be used if desired to pass requests and information between applications or customer edge devices and the network fabric.
Any path through a network can be encoded as a combination of chains. Hence, in either of the two cases above, the network does not need to track a path state per demand. Assuming 3 nodal chains per node and 15 adj chains per node, each node would need to store an absolute number of 1100×3+15=3315 chain states. This is 1000 times smaller than what MPLS-TE would require (4M).
From a dynamic state fluctuation perspective, as chains do not reflect demands, there is no state modification on the P nodes as opposed to 800 k per P node in the MPLS-TE case. The trick is that each demand, while being associated with a specific path, does not require a specific LSP path state through the network. Instead, each specific path is built from the combination of a small number of stable chains. The chains act as an intermediate step between the demands and the network. The chains do not limit the extent of the paths that can be expressed (any path can be encoded as a combination of chain), but the use of chains does limit the number of states that need to be supported by any node in the network.
As explained in the previous example, the basic chains supported by the infrastructure allow for any virtual overlay to build any path through the network. All that is required is have a share of any link and the knowledge of the topology and chains. The PCE server (or equivalent functional component) acts as a clearinghouse for the various overlay networks and their demands, ensuring that an arbitrary number of distinct applications or “virtual” network topologies map cleanly onto the same underlying fabric.
A new traffic engineering method can support virtualized network or application overlays. Any granular demand can be routed along any path through the network with a very modest number of absolute path states per node (<10 k), which do not depend on the virtualized overlay entity nor on the engineered demand. In many embodiments, there is no restriction on the frequency with which demands and traffic-engineered overlay topologies can be updated.
The service provider can provide a customized picture of the fabric topology and resources to each user device or application, thereby retaining complete control over what the user device or application can see or do with the fabric. (This model is in stark contrast to other SDN models popular today, such as those based on OpenFlow, in which SDN applications are allowed to see and meddle directly with network infrastructure elements.)
PCE extension can provide a chain stack as a reply. A BGP-LS extension can communicate the chains within a topology to 3rd party application. A PCE extension can request the reservation of a bandwidth share per link. A PCE extension can request the reservation of a bandwidth share per link for any link in the topology
Thus, a traffic engineering technique can be established that allows for any granular demand to be routed along any path through the network with a very modest number of absolute path states per node (<10 k) and no per-demand state modification. A virtualization of the traffic engineering solution can be provided that allows any virtual network or application overlay to build any path through the network without requiring an individual per-path state through the infrastructure, and that allows the service provider to retain control of the view of the network topology and resources that is presented to applications and customer devices.
Example Node
The processors 750 and 760 of each line card 702 may be mounted on a single printed circuit board. When a packet or packet and header are received, the packet or packet and header may be identified and analyzed by router 700 in the following manner. Upon receipt, a packet (or some or all of its control information) or packet and header is sent from the one of port processors 750(1,1)-(N,N) at which the packet or packet and header was received to one or more of those devices coupled to data bus 730 (e.g., others of port processors 650(1,1)-(N,N), forwarding engine 710 and/or processor 720). Handling of the packet or packet and header can be determined, for example, by forwarding engine 710. For example, forwarding engine 710 may determine that the packet or packet and header should be forwarded to one or more of port processors 750(1,1)-(N,N). This can be accomplished by indicating to corresponding one(s) of port processor controllers 760(1)-(N) that the copy of the packet or packet and header held in the given one(s) of port processors 750(1,1)-(N,N) should be forwarded to the appropriate one of port processors 750(1,1)-(N,N). In addition, or alternatively, once a packet or packet and header has been identified for processing, forwarding engine 710, processor 720 or the like can be used to process the packet or packet and header in some manner or add packet security information, in order to secure the packet. On a node sourcing such a packet or packet and header, this processing can include, for example, encryption of some or all of the packet's or packet and header's information, the addition of a digital signature or some other information or processing capable of securing the packet or packet and header. On a node receiving such a processed packet or packet and header, the corresponding process is performed to recover or validate the packet's or packet and header's information that has been thusly protected.
Although the present invention has been described in connection with several embodiments, the invention is not intended to be limited to the specific forms set forth herein. On the contrary, it is intended to cover such alternatives, modifications, and equivalents as can be reasonably included within the scope of the invention as defined by the appended claims.
The present patent application is a continuation of and is related to U.S. patent application Ser. No. 14/047,310, filed on Oct. 7, 2013 entitled “Segment Routing Techniques,” which claims the domestic benefit under Title 35 of the United States Code § 119(e) of U.S. Provisional Patent Application Ser. No. 61/710,121 entitled “Methods for Using Chain Routing,” filed Oct. 5, 2012. Both are hereby incorporated by reference in their entirety and for all purposes as if completely and fully set forth herein.
Number | Name | Date | Kind |
---|---|---|---|
5764624 | Endo | Jun 1998 | A |
6032197 | Birdwell | Feb 2000 | A |
6147976 | Shand | Nov 2000 | A |
6374303 | Armitage et al. | Apr 2002 | B1 |
6577600 | Bare | Jun 2003 | B1 |
6647428 | Bannai et al. | Nov 2003 | B1 |
6963570 | Agarwal | Nov 2005 | B1 |
7023846 | Andersson et al. | Apr 2006 | B1 |
7031253 | Katukam et al. | Apr 2006 | B1 |
7031607 | Aswood Smith | Apr 2006 | B1 |
7061921 | Sheth | Jun 2006 | B1 |
7068654 | Joseph et al. | Jun 2006 | B1 |
7072346 | Hama | Jul 2006 | B2 |
7088721 | Droz et al. | Aug 2006 | B1 |
7154416 | Savage | Dec 2006 | B1 |
7174387 | Shand et al. | Feb 2007 | B1 |
7180887 | Schwaderer | Feb 2007 | B1 |
7260097 | Casey | Aug 2007 | B2 |
7286479 | Bragg | Oct 2007 | B2 |
7330440 | Bryant | Feb 2008 | B1 |
7359377 | Kompella et al. | Apr 2008 | B1 |
7373401 | Azad | May 2008 | B1 |
7420992 | Fang | Sep 2008 | B1 |
7430210 | Havala et al. | Sep 2008 | B2 |
7463639 | Rekhter | Dec 2008 | B1 |
7466661 | Previdi et al. | Dec 2008 | B1 |
7471669 | Sabesan et al. | Dec 2008 | B1 |
7564803 | Minei et al. | Jul 2009 | B1 |
7568047 | Aysan | Jul 2009 | B1 |
7577143 | Kompella | Aug 2009 | B1 |
7602778 | Guichard et al. | Oct 2009 | B2 |
7610330 | Quinn | Oct 2009 | B1 |
7773630 | Huang et al. | Aug 2010 | B2 |
7817667 | Frederiksen et al. | Oct 2010 | B2 |
7885259 | Filsfils | Feb 2011 | B2 |
7885294 | Patel | Feb 2011 | B2 |
7894352 | Kompella et al. | Feb 2011 | B2 |
7894458 | Jiang | Feb 2011 | B2 |
7903554 | Manur | Mar 2011 | B1 |
7940695 | Bahadur et al. | May 2011 | B1 |
7983174 | Monaghan et al. | Jul 2011 | B1 |
8064441 | Wijnands et al. | Nov 2011 | B2 |
8121126 | Moisand | Feb 2012 | B1 |
8339973 | Pichumani et al. | Dec 2012 | B1 |
8422514 | Kothari et al. | Apr 2013 | B1 |
8542706 | Wang et al. | Sep 2013 | B2 |
8611335 | Wu | Dec 2013 | B1 |
8619817 | Everson | Dec 2013 | B1 |
8630167 | Ashwood Smith | Jan 2014 | B2 |
8711883 | Kang | Apr 2014 | B2 |
8792384 | Banerjee et al. | Jul 2014 | B2 |
8848728 | Revah | Sep 2014 | B1 |
8923292 | Friskney | Dec 2014 | B2 |
8953590 | Aggarwal | Feb 2015 | B1 |
9036474 | Dibirdi et al. | May 2015 | B2 |
9049233 | Frost et al. | Jun 2015 | B2 |
9094337 | Bragg | Jul 2015 | B2 |
9112734 | Edwards et al. | Aug 2015 | B2 |
9118572 | Sajassi | Aug 2015 | B2 |
9319312 | Filsfils et al. | Apr 2016 | B2 |
9485150 | Filsfils | Nov 2016 | B2 |
9571349 | Previdi et al. | Feb 2017 | B2 |
9660897 | Gredler | May 2017 | B1 |
9749227 | Frost et al. | Aug 2017 | B2 |
20010037401 | Soumiya | Nov 2001 | A1 |
20010055311 | Trachewsky | Dec 2001 | A1 |
20020103732 | Bundy et al. | Aug 2002 | A1 |
20030016678 | Maeno | Jan 2003 | A1 |
20030026271 | Erb et al. | Feb 2003 | A1 |
20030126272 | Corl et al. | Jul 2003 | A1 |
20030133412 | Iyer | Jul 2003 | A1 |
20030142674 | Casey | Jul 2003 | A1 |
20030142685 | Bare | Jul 2003 | A1 |
20030231634 | Henderson | Dec 2003 | A1 |
20040160958 | Oh | Aug 2004 | A1 |
20040174879 | Basso et al. | Sep 2004 | A1 |
20040190527 | Okura | Sep 2004 | A1 |
20040196840 | Amrutur et al. | Oct 2004 | A1 |
20040202158 | Takeno | Oct 2004 | A1 |
20040240442 | Grimminger | Dec 2004 | A1 |
20050073958 | Atlas | Apr 2005 | A1 |
20050105515 | Reed | May 2005 | A1 |
20050157724 | Montuno | Jul 2005 | A1 |
20050213513 | Ngo | Sep 2005 | A1 |
20050259655 | Cuervo et al. | Nov 2005 | A1 |
20060002304 | Ashwood-Smith | Jan 2006 | A1 |
20060013209 | Somasundaram | Jan 2006 | A1 |
20060056397 | Aizu | Mar 2006 | A1 |
20060075134 | Aalto | Apr 2006 | A1 |
20060080421 | Hu | Apr 2006 | A1 |
20060092940 | Ansari | May 2006 | A1 |
20060146696 | Li | Jul 2006 | A1 |
20060187817 | Charzinski | Aug 2006 | A1 |
20060262735 | Guichard | Nov 2006 | A1 |
20060274716 | Oswal et al. | Dec 2006 | A1 |
20070019647 | Roy et al. | Jan 2007 | A1 |
20070041345 | Yarvis | Feb 2007 | A1 |
20070053342 | Siereki | Mar 2007 | A1 |
20070058638 | Guichard et al. | Mar 2007 | A1 |
20070189291 | Tian | Aug 2007 | A1 |
20070245034 | Retana | Oct 2007 | A1 |
20080002699 | Rajsic | Jan 2008 | A1 |
20080049610 | Linwong | Feb 2008 | A1 |
20080075016 | Ashwood-Smith | Mar 2008 | A1 |
20080075117 | Tanaka | Mar 2008 | A1 |
20080084881 | Dharwadkar et al. | Apr 2008 | A1 |
20080101227 | Fujita et al. | May 2008 | A1 |
20080101239 | Goode | May 2008 | A1 |
20080172497 | Mohan et al. | Jul 2008 | A1 |
20080189393 | Wagner | Aug 2008 | A1 |
20080192762 | Kompella et al. | Aug 2008 | A1 |
20080212465 | Yan | Sep 2008 | A1 |
20080225864 | Aissaoui et al. | Sep 2008 | A1 |
20080253367 | Ould-Brahim | Oct 2008 | A1 |
20080259820 | White et al. | Oct 2008 | A1 |
20080316916 | Tazzari | Dec 2008 | A1 |
20090041038 | Martini et al. | Feb 2009 | A1 |
20090049194 | Csaszar | Feb 2009 | A1 |
20090067348 | Vasseur | Mar 2009 | A1 |
20090067445 | Diguet | Mar 2009 | A1 |
20090080431 | Rekhter | Mar 2009 | A1 |
20090135815 | Pacella | May 2009 | A1 |
20090196289 | Shankar | Aug 2009 | A1 |
20090247157 | Yoon | Oct 2009 | A1 |
20090296710 | Agrawal | Dec 2009 | A1 |
20100063983 | Groarke et al. | Mar 2010 | A1 |
20100088717 | Candelore et al. | Apr 2010 | A1 |
20100124231 | Kompella | May 2010 | A1 |
20100142548 | Sheth | Jun 2010 | A1 |
20100220739 | Ishiguro | Sep 2010 | A1 |
20100232435 | Jabr | Sep 2010 | A1 |
20100272110 | Allan et al. | Oct 2010 | A1 |
20100284309 | Allan et al. | Nov 2010 | A1 |
20100329153 | Xu | Dec 2010 | A1 |
20110021193 | Hong | Jan 2011 | A1 |
20110060844 | Allan et al. | Mar 2011 | A1 |
20110063986 | Denecheau | Mar 2011 | A1 |
20110090913 | Kim | Apr 2011 | A1 |
20110149973 | Esteve Rothenberg | Jun 2011 | A1 |
20110228780 | Ashwood-Smith | Sep 2011 | A1 |
20110261722 | Awano | Oct 2011 | A1 |
20110268114 | Wijnands et al. | Nov 2011 | A1 |
20110280123 | Wijnands et al. | Nov 2011 | A1 |
20110286452 | Balus | Nov 2011 | A1 |
20120044944 | Kotha et al. | Feb 2012 | A1 |
20120063526 | Xiao | Mar 2012 | A1 |
20120069740 | Lu et al. | Mar 2012 | A1 |
20120069845 | Carney et al. | Mar 2012 | A1 |
20120075988 | Lu | Mar 2012 | A1 |
20120082034 | Vasseur | Apr 2012 | A1 |
20120099861 | Zheng | Apr 2012 | A1 |
20120106560 | Gumaste | May 2012 | A1 |
20120120808 | Nandagopal | May 2012 | A1 |
20120170461 | Long | Jul 2012 | A1 |
20120179796 | Nagaraj | Jul 2012 | A1 |
20120213225 | Subramanian et al. | Aug 2012 | A1 |
20120218884 | Kini | Aug 2012 | A1 |
20120236860 | Kompella et al. | Sep 2012 | A1 |
20120243539 | Keesara | Sep 2012 | A1 |
20120287818 | Corti et al. | Nov 2012 | A1 |
20120307629 | Vasseur | Dec 2012 | A1 |
20130003728 | Kwong et al. | Jan 2013 | A1 |
20130051237 | Ong | Feb 2013 | A1 |
20130077476 | Enyedi | Mar 2013 | A1 |
20130077624 | Keesara et al. | Mar 2013 | A1 |
20130077625 | Khera | Mar 2013 | A1 |
20130077626 | Keesara et al. | Mar 2013 | A1 |
20130114402 | Ould-Brahim | May 2013 | A1 |
20130142052 | Burbidge | Jun 2013 | A1 |
20130188634 | Magee | Jul 2013 | A1 |
20130219034 | Wang et al. | Aug 2013 | A1 |
20130258842 | Mizutani | Oct 2013 | A1 |
20130266012 | Dutta et al. | Oct 2013 | A1 |
20130266013 | Dutta et al. | Oct 2013 | A1 |
20130308948 | Swinkels | Nov 2013 | A1 |
20130322449 | Hwang | Dec 2013 | A1 |
20130343204 | Geib et al. | Dec 2013 | A1 |
20140044036 | Kim | Feb 2014 | A1 |
20140160925 | Xu | Jun 2014 | A1 |
20140169370 | Filsfils et al. | Jun 2014 | A1 |
20140177638 | Bragg et al. | Jun 2014 | A1 |
20140189156 | Morris | Jul 2014 | A1 |
20140192677 | Chew | Jul 2014 | A1 |
20140254596 | Filsfils et al. | Sep 2014 | A1 |
20140269266 | Filsfils et al. | Sep 2014 | A1 |
20140269421 | Previdi et al. | Sep 2014 | A1 |
20140269422 | Filsfils et al. | Sep 2014 | A1 |
20140269698 | Filsfils et al. | Sep 2014 | A1 |
20140269699 | Filsfils et al. | Sep 2014 | A1 |
20140269721 | Bashandy et al. | Sep 2014 | A1 |
20140269725 | Filsfils et al. | Sep 2014 | A1 |
20140269727 | Filsfils et al. | Sep 2014 | A1 |
20140286195 | Fedyk | Sep 2014 | A1 |
20140317259 | Previdi et al. | Oct 2014 | A1 |
20140369356 | Bryant et al. | Dec 2014 | A1 |
20150023328 | Thubert et al. | Jan 2015 | A1 |
20150030020 | Kini | Jan 2015 | A1 |
20150109902 | Kumar | Apr 2015 | A1 |
20150249587 | Kozat | Sep 2015 | A1 |
20150256456 | Previdi et al. | Sep 2015 | A1 |
20150263940 | Kini | Sep 2015 | A1 |
20150326675 | Kini | Nov 2015 | A1 |
20150334006 | Shao | Nov 2015 | A1 |
20150381406 | Francois | Dec 2015 | A1 |
20160006614 | Zhao | Jan 2016 | A1 |
20160021000 | Previdi et al. | Jan 2016 | A1 |
20160034209 | Nanduri | Feb 2016 | A1 |
20160034370 | Nanduri | Feb 2016 | A1 |
20160119159 | Zhao | Apr 2016 | A1 |
20160127142 | Tian | May 2016 | A1 |
20160173366 | Saad | Jun 2016 | A1 |
20160191372 | Zhang | Jun 2016 | A1 |
20160254987 | Eckert et al. | Sep 2016 | A1 |
20160254988 | Eckert et al. | Sep 2016 | A1 |
20160254991 | Eckert et al. | Sep 2016 | A1 |
20160352654 | Filsfils et al. | Dec 2016 | A1 |
20170019330 | Filsfils et al. | Jan 2017 | A1 |
20170104673 | Bashandy et al. | Apr 2017 | A1 |
20170111277 | Previdi et al. | Apr 2017 | A1 |
20170302561 | Filsfils et al. | Oct 2017 | A1 |
20170302571 | Frost et al. | Oct 2017 | A1 |
20170346718 | Psenak et al. | Nov 2017 | A1 |
20170346737 | Previdi et al. | Nov 2017 | A1 |
20170366453 | Previdi et al. | Dec 2017 | A1 |
20180077051 | Nainar | Mar 2018 | A1 |
20180083871 | Filsfils | Mar 2018 | A1 |
20180131532 | Wijnands | May 2018 | A1 |
20190097925 | Previdi et al. | Mar 2019 | A1 |
Number | Date | Country |
---|---|---|
101803293 | Aug 2010 | CA |
101399688 | Apr 2009 | CM |
1726679 | Jan 2006 | CN |
101247253 | Aug 2008 | CN |
101496357 | Jul 2009 | CN |
101616466 | Dec 2009 | CN |
101841442 | Sep 2010 | CN |
101931548 | Dec 2010 | CN |
102098222 | Jun 2011 | CN |
102132533 | Jul 2011 | CN |
102299852 | Dec 2011 | CN |
102498694 | Jun 2012 | CN |
102714625 | Oct 2012 | CN |
WO 2008021195 | Feb 2008 | WO |
WO 2008021195 | Feb 2008 | WO |
Entry |
---|
Bashandy, Ahmed R. et al., “Segment Routing Over Label Distribution Protocol”, U.S. Appl. No. 16/367,869, filed Mar. 28, 2019; (37 pages). |
Aggarwal, R., et al., Juniper Networks; E. Rosen, Cisco Systems, Inc.; “MPLS Upstream Label Assignment and Context Specific Label Space;” Network Working Group; Internet Draft; Jan. 2005; pp. 1-8. |
Akiya, N. et al., “Seamless Bidirectional Forwarding Detection (BFD) for Segment Routing (SR)”; draft-akiya-bfd-seamless-sr-00; Internet Engineering Task Force; Internet-Draft; Jun. 7, 2013; 7 pages. |
Akiya, N. et al., “Seamless Bidirectional Forwarding Detection (BFD) for Segment Routing (SR)”; draft-akiya-bfd-seamless-sr-01; Internet Engineering Task Force; Internet-Draft; Dec. 5, 2013; 7 pages. |
Akiya, N. et al., “Seamless Bidirectional Forwarding Detection (BFD) for Segment Routing (SR)”; draft-akiya-bfd-seamless-sr-02; Internet Engineering Task Force; Internet-Draft; Jun. 7, 2014; 7 pages. |
Akiya, N. et al., “Seamless Bidirectional Forwarding Detection (BFD) for Segment Routing (SR)”; draft-akiya-bfd-seamless-sr-03; Internet Engineering Task Force; Internet-Draft; Aug. 23, 2014; 7 pages. |
Akiya, N. et al., “Seamless Bidirectional Forwarding Detection (BFD) for Segment Routing (SR)”; draft-akiya-bfd-seamless-sr-04; Internet Engineering Task Force; Internet-Draft; Feb. 23, 2015; 7 pages. |
Akiya, N., “Segment Routing Implications on BFD”; Sep. 9, 2013; 3 pages. |
Alcatel-Lucent, “Segment Routing and Path Computation Element—Using Traffic Engineering to Optimize Path Placement and Efficiency in IP/MPLS Networks”; Technology White Paper; 2015; 28 pages. |
Aldrin, S., et al., “Seamless Bidirectional Forwarding Detection (S-BFD) Use Cases”; draft-ietf-bfd-seamless-use-case-08; Network Working Group; Internet-Draft; May 6, 2016; 15 pages. |
Awduche, Daniel O., et al., “RSVP-TE: Extensions to RSVP for LSP Tunnels,” Network Working Group, Internet-Draft, Aug. 2000, pp. 1-12. |
Awduche, Daniel O., et al., “RSVP-TE: Extensions to RSVP for LSP Tunnels,” Network Working Group, Request for Comments 3209, Dec. 2001, pp. 1-61. |
Awduche, D. et al., “Requirements for Traffic Engineering Over MPLS”; Network Working Group; Request for Comments: 2702; Sep. 1999; pp. 1-29. |
Awduche, D. et al., “Overview and Principles of Internet Traffic Engineering”; Network Working Group; Request for Comments: 3272; May 2002; pp. 1-71. |
Backes, P. and Rudiger Geib, “Deutsche Telekom AG's Statement About IPR Related to Draft-Geig-Spring-OAM-Usecase-01,” Feb. 5, 2014, pp. 1-2. |
Bryant, S. et al., Cisco Systems, “IP Fast Reroute Using Tunnels-draft-bryant-ipfrr-tunnels-03”, Network Working Group, Internet-Draft, Nov. 16, 2007, pp. 1-30. |
Bryant, S., et al., Cisco Systems, “Remote LFA FRR,” draft-ietf-rtgwg-remote-lfa-04, Network Working Group, Internet-Draft, Nov. 22, 2013, pp. 1-24. |
Cisco Systems, Inc., “Introduction to Intermediate System-to-Intermediate System Protocol,” published 1992-2002; pp. 1-25. |
Crabbe, E. et al., “PCEP Extensions for MPLS-TE LSP Protection with Stateful PCE Draft-Crabbe-PCE-Stateful-PCT-Protection-00,” Network Working Group, Internet-Draft, Apr. 2013, pp. 1-12. |
Crabbe, E., et al., Stateful PCE Extensions for MPLS-TE LSPs, draft-crabbe-pce-stateful-pce-mpls-te-00; Network Working Group, Internet- Draft, Oct. 15, 2012, pp. 1-15. |
Deering, S., et al., Cisco, Internet Protocol, Version 6 (IPv6) Specification, Network Working Group, Request for Comments 2460, Dec. 1998, pp. 1-39. |
Eckert, T., “Traffic Engineering for Bit Index Explicit Replication BIER-TE, draft-eckert-bier-te-arch-00,” Network Working Group, Internet-Draft, Mar. 5, 2015, pp. 1-21. |
Eckert, T., et al., “Traffic Engineering for Bit Index Explicit Replication BIER-TE, draft-eckert-bier-te-arch-01,” Network Working Group, Internet-Draft, Jul. 5, 2015, pp. 1-23. |
Farrel, A., et al., Old Dog Consulting, A Path Computation Element (PCE)-Based Architecture, Network Working Group, Request for Comments 4655, Aug. 2006, pp. 1-80. |
Farrel, A., et al., Old Dog Consulting, Inter-Domain MPLS and GMPLS Traffic Engineering—Resource Reservation Protocol-Traffic Enginering (RSVP-TE) Extensions, Network Working Group, Request for Comments 5151, Feb. 2008, pp. 1-25. |
Fedyk, D., et al., Alcatel-Lucent, Generalized Multiprotocol Label Switching (GMPLS) Control Ethernet Provider Backbone Traffic Engineering (PBB-TE), Internet Engineering Task Force (IETF), Request for Comments 6060, Mar. 2011, pp. 1-20. |
Filsfils, C., et al., Cisco Systems, Inc., “Segment Routing Architecture,” draft-filsfils-rtgwg-segment-routing-00, Jun. 28, 2013; pp. 1-28. |
Filsfils, C., et al., Cisco Sytems, Inc., “Segment Routing Architecture”; draft-filsfils-rtgwg-segment-routing-01, Network Working Group, Internet-Draft, Oct. 21, 2013, pp. 1-28. |
Filsfils, C. et al., Cisco Systems, Inc., “Segment Routing Interoperability with LDP”; draft-filsfils-spring-segment-routing-ldp-interop-01.txt; Apr. 18, 2014, pp. 1-16. |
Filsfils, C. et al., “Segment Routing Architecture”; draft-ietf-spring-segment-routing-07; Network Working Group, Internet-Draft; Dec. 15, 2015; pp. 1-24. |
Filsfils, C. et al.; “Segment Routing Use Cases”; draft-filsfils-rtgwg-segment-routing-use-cases-01; Network Working Group; Internet-Draft; Jul. 14, 2013; pp. 1-46. |
Filsfils, C. et al., “Segment Routing Use Cases”, draft-filsfils-rtgwg-segment-routing-use-cases-02; Network Working Group; Internet-Draft; Oct. 21, 2013; pp. 1-36. |
Filsfils, C. et al., “Segment Routing with MPLS Data Plane”, draft-ietf-spring-segment-routing-mpls-05; Network Working Group; Internet-Draft; Jul. 6, 2016; 15 pages. |
Frost, D., et al., Cisco Systems, Inc., “MPLS Generic Associated Channel (G-Ach) Advertisement Protocol,” draft-ietf-mpls-gach-adv-00, Internet-Draft, Jan. 27, 2012, pp. 1-17. |
Frost, D., et al., Cisco Systems, Inc., “MPLS Generic Associated Channel (G-Ach) Advertisement Protocol,” draft-ietf-mpls-gach-adv-08, Internet-Draft, Jun. 7, 2013, pp. 1-22. |
Frost, D., et al., Cisco Systems, Inc., “MPLS Generic Associated Channel (G-Ach) Advertisement Protocol,” Request for Comments 7212, Jun. 2014, pp. 1-23. |
Geib, R., “Segment Routing Based OAM Use Case,” IETF 87, Berlin, Jul./Aug. 2013, pp. 1-3. |
Geib, R., Deutsch Telekom, “Use Case for a Scalable and Topology Aware MPLS data plan monitoring System,” draft-geib-spring-oam-usecase-00; Internet-Draft, Oct. 17, 2013, pp. 1-7. |
Geib, R., Deutsch Telekom, “Use Case for a Scalable and Topology Aware MPLS Data Plan Monitoring System,” draft-geib-spring-oam-usecase-01; Internet-Draft, Feb. 5, 2014, pp. 1-10. |
Gredler, H., et al., Juniper Networks, Inc., “Advertising MPLS Labels in IS-IS draft-gredler-isis-label-advertisement-00,” Internet-Draft; Apr. 5, 2013; pp. 1-13. |
Gredler, H. et al., hannes@juniper.net, IETF87, Berlin, “Advertising MPLS LSPs in the IGP,” draft-gredler-ospf-label-advertisement, May 21, 2013; pp. 1-14. |
Guilbaud, Nicolas and Ross Cartlidge, “Google—Localizing Packet Loss in a Large Complex Network,” Feb. 5, 2013, pp. 1-43. |
Imaizumi, H., et al.; Networks, 2005; “FMEHR: An Alternative Approach to Multi-Path Forwarding on Packed Switched Networks,” pp. 196-201. |
Kompella, K. et al, Juniper Networks, “Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE),” Network Working Group, Request for Comments 4206, Oct. 2005, pp. 1-14. |
Kompella, K., et al., Juniper Networks, Inc., “Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures,” Network Working Group, Request for Comments 4379, Feb. 2006, pp. 1-50. |
Kompella, K. et al., Juniper Networks, “Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling,” Network Working Group, Request for Comments 4761, Jan. 2007, pp. 1-28. |
Kumar, N. et al., Cisco Systems, Inc., “Label Switched Path (LSP) Ping/Trace for Segment Routing Networks Using MPLS Dataplane,” draft-kumar-mpls-spring-lsp-ping-00, Oct. 21, 2013, pp. 1-12. |
Kumar, N. et al, “Label Switched Path (LSP) Ping/Trace for Segment Routing Networks Using MPLS Dataplane,” draft-kumarkini-mpls-spring-lsp-ping-00; Network Work Group; Internet-Draft; Jan. 2, 2014, pp. 1-15. |
Kumar, N. et al, “OAM Requirements for Segment Routing Network”; draft-kumar-spring-sr-oam-requirement-00; Spring; Internet-Draft; Feb. 14, 2014; 6 pages. |
Kumar, N. et al, “OAM Requirements for Segment Routing Network”; draft-kumar-spring-sr-oam-requirement-01;Spring; Internet-Draft; Jul. 1, 2014; 6 pages. |
Kumar, N. et al, “OAM Requirements for Segment Routing Network”; draft-kumar-spring-sr-oam-requirement-02; Spring; Internet-Draft; Dec. 31, 2014; 6 pages. |
Kumar, N. et al, “OAM Requirements for Segment Routing Network”; draft-kumar-spring-sr-oam-requirement-03; Spring; Internet-Draft; Mar. 9, 2015; 6 pages. |
Kumar, N. et al., “Label Switched Path (LSP) Ping/Trace for Segment Routing Networks Using MPLS Dataplane,” draft-ietf-mpls-spring-lsp-ping-00; Network Work Group; Internet Draft; May 10, 2016; 17 pages. |
Pignataro, C. et al., “Seamless Bidirectional Forwarding Detection (S-BFD) for IPv4, IPv6 and MPLS”, draft-ietf-bfd-seamless-ip-06; Internet Engineering Task Force; Internet-Draft; May 6, 2016; 8 pages. |
Pignataro, C. et al., “Seamless Bidirectional Forwarding Detection (S-BFD)”; draft-ietf-bfd-seamless-base-11; Internet Engineering Task Force; Internet-Draft; May 6, 2016; 21 pages. |
Number | Date | Country | |
---|---|---|---|
20180083871 A1 | Mar 2018 | US |
Number | Date | Country | |
---|---|---|---|
61710121 | Oct 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14047310 | Oct 2013 | US |
Child | 15827973 | US |