Friday, October 9, 2015

Multiprotocol Label Switching Transport Profile (MPLS-TP) 

Slide2

Introduction

Since data traffic started dominating telecom networks there was a need for transport data networks as opposed to transport TDM networks. Traditional transport technologies like SONET, SDH and OTN are good for voice traffic. There was a need for new technology that will continue the useful features of transport technologies and packet switched in nature.
MPLS-TP (Multi Protocol Label Switching – Transport Profile) is an effort by IEEE & ITU-T to have a technology that meets all the requirements of transport networks but is packet switched in nature.
Slide1

Connection Oriented Transport

Major motivation for developing MPLS-TP was the need for the circuits in Packet Transport Networks. Usually packet transport switches each packet individually. In connection oriented transport a connection is first setup between the end points and the traffic follows that path through the network. This makes the Packet Transport Network similar to the TDM networks and streamlined management and migration of the transport network.
The concept of Label Switched Paths or LSPs from MPLS technology is already tested and successful in the inter-networking world. It made sense to adapt it for use in Packet Transport Networks. Yet there was a need to simplify the working of MPLS to make it more suitable for use in the Packet Transport World. For that, some features removed from the traditional MPLS, since it felt that these were not needed in Transport World and would only the network.
The features from MPLS that are not supported by MPLS-TP are:
  • MPLS Control Plane
MPLS-TP does not need LDP or any other control plane protocol to set up the circuits. Instead a user provisioned model followed. The user can provision a circuit from a centralized Network Management System (NMS) in a way similar to TDM networks.
  • Penultimate Hop Popping (PHP)
PHP is use by MPLS Edge Routers to reduce the load of two label lookups. But this causes problems with QoS and disabled in MPLS-TP.
  • LSP Merge
Merging two LSPs (going to the same destination) reduces the number of labels used in the network. But it makes it impossible to differentiate between traffic common from two different sources before the merging happened. To simplify things in transport networks, LSP merge was also disabled.
  • Equal Cost Multi Path
In traditional IP/MPLS networks different packets between a source-destination pair can take different.

The introduction of circuits is the main reasons to adding a lot of functionality to transport networks.

OAM

Operations, Administration and Maintenance have always been important for transport networks. And that is one of the mail reasons for the success of SONET/SDH. Recent developments have brought this functionality to Packet Transport as well. Standards like IEEE 802.1ag, ITU-T Y.1731, Bidirectional Forwarding Detection (BFD), LSP-Ping, and LSP Traceroute are enabling OAM features on Packet Transport.
Slide3
Alarms can rise on certain events/failures. Loopbacks can used to localize faults and end-to-end connection parameters like throughput, packet loss, latency and latency variation (jitter). This can measure and continually reported. The OAM can apply across multiple layers across the network. For eg, an End-to-End connection can monitor and also for a particular network operator or a particular sub-net, paths. This is especially true when multiple equal cost paths exist. But this is in conflict with the concept of a circuit where all the traffic should follow the same path. Hence ECMP disabled.

Linear Protection

Traditional SDH has offered end-to-end Path protection and that too within 50ms. The same is required from Packet Transport. Connection oriented Packet Transport concept with OAM on those circuits makes it possible to detect the faults and switch the traffic from working to protecting path fast. These protect paths would be pre-provisioned and kept ready, just like in SDH. This functionality has been standardized by ITU-TG.8031 standard.
Slide4
It is possible to define the protection as revertive or non-revertive and option for the user to give forced switch or manual switch command. It is also possible to provide Linear Protection in a stitched pseudowire.

Quality of Service

In a packet switched network since all the packets share the same infrastructure, Quality of Service and prioritization are important. A high priority or delay critical packet should not be held up in a queue by low priority or non-premium traffic. Hence all packet switched networks need QoS mechanisms.
MPLS & MPLS-TP label has a 3 bit Traffic Class (formerly called EXP bits). These can support 8 classes of service per LSP. At the LERs the IP or TCP header fields can use to mark the TC bits or it can be statically provisioned by the service provider. With QoS, both a flat QoS and a hierarchical QoS model can be supported as shown below. Hierarchical QoS can ensure fairness of service between different services, between different customers and across different tunnels.
Slide5
Flat QoS. All the traffic will be prioritized based Flat QoS on PCP/IP DSCP field
Slide6

Hierarchical QoS:
3 Levels of QoS

  1. First level scheduler ensures that each CoS within a service gets the promised bandwidth.
  2. Second level scheduler ensures that service (pseudo-wire) gets the required priority within a tunnel.
  3. Third level scheduler ensures that each tunnel get the requisite priority within the egress port.

Scalability

MPLS-TP follows a label similar to MPLS. The label has 20 bits for label value which allows for 1 million unique labels. Also, label stacking allows multiple levels of hierarchy to be created. There’s no limit on the number of levels that can be stacked. This makes MPLS-TP, just like MPLS highly scalable. One limitation of MPLS was that the entire database of network topology had to be present on each router. Since each router had limited memory and processing power, they could handle only a particular network size. In MPLS-TP by moving all this intelligence to a central NMS, so high-capacity multi-processor servers can be deployed to do this processing, but the individual nodes become simpler and cheaper.

Summary

MPLS Transport Profile (MPLS-TP) is a profile of MPLS. It will be designed for use as a network layer technology in transport network.
This MPLS profile is simplified for transport network with some of the MPLS functions turned off (e.g. PHP, LSP merging...) and with enhancement based on transport network requirements (e.g. In-band Carrier Grade OAM).
  • It is a connection-oriented packet-switched application.
  • Its design and standardization effort for MPLS-TP is being progressed in a cooperation between ITU-T and IETF.
  • The required protocol extensions to MPLS being designed by the IETF based on requirements provided by service providers.
  • Solution is based on existing LSP and Pseudowire constructs.
  • MPLS-TP tunnels provide the transport network service layer over which IP and MPLS traffic pass through.
  • MPLS-TP tunnels help the transition from SONET/SDH and TDM technologies to packet switching to support services with high bandwidth utilization and lower cost.
  • Transport networks are connection-oriented, statically provisioned, and have long-lived connections.
  • Transport networks usually avoid control protocols that change identifiers (like labels).
  • MPLS-TP tunnels provide this functionality through statically provisioned bidirectional label switched paths (LSPs)
This is one of the ideal technologies to build packet transport networks of the future.




Thursday, October 8, 2015

The RASCI matrix

    The RASCI matrix is a useful tool for defining the roles and to determine the tasks, responsibilities and authority of the development group members. The names or functional roles of the development group members are listed along the horizontal axis of the matrix and the deliverables, activities or processes along the vertical axis. The letters R, A, S, C and I each constitute a combination of a name/role and result/process/task. The letters stand for the following terms:

R (responsible): those who do the work and are responsible for the result. They report directly to the person accountable.
A (accountable): the one ultimately responsible and authorised to hold accountable those responsible.
S (supportive): those who provide support and assistance to those responsible for the result.
C (consulted): those whose opinions are sought before decisions or steps are taken to achieve the result (two-way communication).
I (informed): those who are informed after decisions have been made or results have been achieved. They have no influence over the result.
A basic RASCI matrix for a guideline development group could look like the following. Naturally, guideline development groups can make additions to the matrix and provide further detail for specific situations.


The advantages of using the RASCI matrix are:
  • The roles and responsibilities of all parties are clarified. This is particularly important regarding the position of the chair of the guideline development group and who can hold the chair accountable when things are not running smoothly.
  • It helps clarify which roles may be missing.
  • It helps clarify who should be cooperating and coordinating with whom.
  • Support is increased by liaising and coordinating.
  • Teamwork is encouraged; duplication of activities can be prevented. The completed RASCI matrix provides a reference for if responsibilities become unclear among group members: agreements at the start prevent discussions later.
  • Roles are associated with processes/activities rather than results.

Basic MPLS

How to configure a basic Multiprotocol Label Switching (MPLS) Network and testing it.
An MPLS network is commonly a backbone network comprised of MPLS-enabled routers called Label Switch Routers (LSR). Generally, the network consists of a core LSR with an edge LSR that applies labels to packets.

MPLS Network Setup:
MPLS Network Setup:

Mechanism

An MPLS network is commonly a backbone network comprised of MPLS-enabled routers called Label Switch Routers (LSR). Generally, the network consists of a core LSR with an edge LSR that applies labels to packets.
This is the setup mechanism of an MPLS network:
  1. Routing tables of the different LSRs are computed with an Interior Gateway Protocol (IGP). A link-state protocol, such as Open Shortest Path First (OSPF) or Intermediate System-to-Intermediate System (IS-IS), is required if you plan to deploy MPLS TE.
  2. A label distribution protocol (LDP) advertises the bindings between routes and labels. These bindings are checked against the routing table. If the route (prefix/mask and next hop) learned from the LDP matches the route learned from IGP in the routing table, an entry is created in the label that forwards information bases (LFIB) on the LSR.
The LSR uses this forwarding mechanism:
  1. Once an edge LSR receives an unlabelled packet, the Cisco Express Forwarding table is checked and a label is imposed on the packet if needed. This LSR is called the ingress LSR.
  2. Upon the arrival of a labelled packet at the inbound interface of a core LSR, the LFIB provides the outbound interface and the new label that is associated with the outbound packet.
  3. The router before the last LSR (the penultimate hop) pops the label and transmits the packet without the label. The last hop is called the egress LSR.

Fundamentals of Network Security

This will Covers the following.
  1. Understanding network and information security.
  2. Recognizing current network threats.
  3. Applying fundamental security principles to network design.
Understanding network and information security.
Network Security Objectives.
Confidentiality, Integrity and Availability.
Image
Cost-Benefit Analysis of Security.
Security Terms.
Basic-01
Classifying Assets.
Classifying Vulnerabilities.
Classifying Countermeasures.
What do we do with the Risk?.
Recognizing Current Network Threats.
Potential  Attackers.
Attack Methods.
Attack Vectors.
Man-in-the-Middle Attacks
Other Miscellaneous Attack Methods.
Applying Fundamental Security Principles to Network Design.
Guidelines
How It All Fits Together.
Able to serve information when it is need to authorized individuals/systems.