Juniper Networks Presentation Template-EMEA
Download
Report
Transcript Juniper Networks Presentation Template-EMEA
Packet Voice
Backbone Network
Design
Matt Kolon
February 23rd, 2004
APRICOT 2004 - Kuala Lumpur
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
2
Business: IP Voice Trunking
Service Provided: Point-to-Point “IP trunk” with low-latency QoS
and guaranteed bandwidth. Usually to replace a pure FR service.
SP implements it with circuit-oriented access network(s) and a
Traffic Engineered MPLS tunnel in the IP/MPLS backbone
All VoIP “application” intelligence resides in enterprise private
devices (e.g. IAD/Media Gateway, IP PBX, SIP phones, etc)
IP trunk
Enterprise HQ
Enterprise
Remote Site
MPLS LSP
FR/TDM
DSLAM
IP PBX
SIP
IAD
ATM
IP/MPLS
Copyright © 2003 Juniper Networks, Inc.
POTS
ETH/VLAN
Proprietary and Confidential
www.juniper.net
3
Business: [Vo]IP transport VPNs
Service Provided: Multipoint IP VPN with low-latency QoS and guaranteed
bandwidth, suitable for voice traffic. Often part of a multi traffic class IP
VPN offering (VoIP being only one traffic class).
SP implements it with circuit-oriented access network(s) and a mesh of
Traffic Engineered MPLS tunnels in the backbone. Or pure Diffserv
approach with traffic trend monitoring. Or Layer 2 VPLS. Or IPSec…
All VoIP “application” intelligence resides in enterprise private devices
Enterprise
Remote Sites
(Vo)IP VPN
Enterprise HQ
DSLAM
FR/TDM
IAD
POTS
IAD
POTS
IP PBX
SIP
Copyright © 2003 Juniper Networks, Inc.
DSLAM
IP VPNs
ETH/VLAN
Proprietary and Confidential
www.juniper.net
4
Business: IP VPNs + Managed VoIP
Service Provided: Multipoint IP VPN with low-latency QoS and guaranteed
bandwidth; Managed VoIP equipment in customer premises.
SP implements it with circuit-oriented access network(s) and a mesh of Traffic
Engineered MPLS tunnels in the backbone. Or pure Diffserv approach with traffic
trend monitoring. Or Layer 2 VPLS. Or IPSec. Or private line (e.g. FR) links. Etc.
All VoIP “application” intelligence resides in managed devices (e.g. IAD/Media
Gateway, IP PBX, etc) located in customer premises.
IP Telephony
Enterprise
Remote Sites
(Vo)IP VPN
Enterprise HQ
DSLAM
FR/TDM
IAD
POTS
IAD
POTS
IP PBX
SIP
Copyright © 2003 Juniper Networks, Inc.
DSLAM
IP VPNs
ETH/VLAN
Proprietary and Confidential
www.juniper.net
5
Business: TDM/telephony, VoIP core
Service Provided: regular TDM Telephony (transport and application)
SP implements it with a TDM access network, Media Gateways, an IP Core, a
PSTN core, and PSTN mediation mechanisms. This is a Class 4/5
replacement application, not directly visible to the end users.
VoIP “application” intelligence (servers and gateways) hosted by the SP,
overlaid on IP backbone, coupled with PSTN “intelligence”.
Enterprise Site 1
TDM / Telephony
TDM / Telephony
Enterprise Site 2
IP/MPLS
POTS
GE
CSU/DSU
MPLS LSP
TDM
GE
TDM
TDM PBX
TDM
POTS
TDM
Softswitch
SIP
Softphone
Copyright © 2003 Juniper Networks, Inc.
PSTN/SS7
Proprietary and Confidential
www.juniper.net
6
Carrier: signaling transport
Service Provided: IP VPN to convey IP-based signaling & control
messages (SS7-over-IP, SIP, H.323, MGCP/Megaco, TCAP/IN, etc) with
proper CoS and insulation.
SP implements it with an IP/MPLS Core. Could be operated by the voice
carrier, or outsourced to an IP provider.
VoIP “application” intelligence
(servers and gateways) hosted
by the SP, overlaid on IP
backbone, coupled with PSTN
intelligence.
Media
Gateway
Softswitch
Class 4/5
Signaling
IP/MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
7
Carrier: inter-domain VoIP peering
Service Provided (to end users): public telephony (VoIP or POTS)
Main goal is to create a VoIP peering point between carriers
SP implements it with “virtual” IP-to-IP gateways, plus inter-domain
signaling (e.g. SIP or SS7). May require true media/codec transcoding, or
“simple” IP forwarding.
Complex business peering issues are addressed by the signaling layer.
IP-to-IP
“Virtual”
Gateways
IP/MPLS
IP/MPLS
MPLS LSPs
SIP/H.323
Gatekeeper
MPLS LSPs
Softswitch
Softswitch
SIP/H.323
Gatekeeper
Peering Signaling
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
8
Business: IP Centrex, Softswitch
Service Provided: IP Centrex (a.k.a. Hosted IP Telephony) to Small &
Medium VoIP-enabled Businesses.
SP implements it with a broadband access network(s), a VPN enabled
IP/MPLS backbone, softswitches with Centrex intelligence, and PSTN
gateways (transport & signaling).
All VoIP “application” intelligence is hosted by the SP, as well as PSTN
gateway mechanisms.
“Virtual PBX”
IP Centrex
Enterprise Site
IP VPN
SIP
Sig. Gateway
MG
Modem
DSLAM
Softswitch
FR/TDM
IP/MPLS with VPNs
SS7
PSTN
Media Gateway
POTS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
9
Residential: VoIP / telephony
Service Provided: regular telephony services (transport and application),
via VoIP, in addition to regular Broadband Internet.
SP implements it with a broadband access network, an IP/MPLS Core, a
PSTN core, and PSTN mediation mechanisms.
VoIP “application” intelligence hosted by the SP, overlaid on IP backbone,
and coupled with PSTN “intelligence”
CPE could be a mere bridge, or an IP router, or a full-blown media
gateway (POTS phones). Home network could be ETH, WLAN, etc.
Household/SOHO
IP / Telephony
INTERNET
IP / Telephony
Household/SMB
IP/MPLS
CPE
CPE
MPLS LSP (hierarchical)
SIP or
H.323
DSLAM
POTS
DSLAM
CMTS
CMTS
SIP or
H.323
POTS
Softswitch
PSTN/SS7
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
10
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
11
Goals for Packet Voice Networks
Quality
• Deliver a grade of voice service equivalent to
that provided by the current Public Switched
Telephone Network (PSTN).
Multiservice
• Voice service must live on a common IP
backbone with a set of other services.
Flexibility
• Must be capable of supporting future
applications that may not yet be fully defined.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
12
Quality: MOS Model
Voice quality in the PSTN network has historically
been measured using ‘mean opinion score’ (MOS).
The mean opinion score measures the subjective
quality of a voice call.
Historically the telephony providers invited people
and used various call types (with delay, echo etc.)
and recorded the results.
MOS scores for “acceptable” voice have been
dropping, but quality is still important.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
13
Quality: Voice-worthy IP Backbones
Sufficient bandwidth for voice + other services
Delay: Less than 40msec
Jitter: Less than 20msec
Loss: Less than 2%
Availability: Better than 4 9s, less than 1% blocking
Security: No unauthorized intrusion or DoS effects
Predictability: None of this changes in unforseeable
ways
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
14
Engineering VoIP Experience Levels
Over-Provisioned
Network
Best Effort
Over-Subscribed
Network
Enhanced Delivery
Carrier-Grade
Multi-Service
Network
Assured Experience
Experience Levels
None (State-less)
Planning/Reporting (Historical)
Reactive (Real-time)
Service Level State
Best Effort
Diff-Serv
MPLS (Core) / Static (Access)
MPLS (Core) / Dynamic (Access)
QoS
Flat
Access / Core
Integrated End-to-End
Network Resources
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
15
Core Domain VoIP Solutions
Over-Provisioned
Network
Core
Access
Copyright © 2003 Juniper Networks, Inc.
Best Effort
Access
Proprietary and Confidential
www.juniper.net
16
Core Domain VoIP Architecture
Best Effort
A Best Effort Experience is achieved by transporting voice over IP networks
without special treatment
• All packets delivered according to equal prioritization router queuing
throughout network
Best effort engineered networks require over-provisioning to account for
peak traffic bursts associated with data applications and busy voice hours
Studies and experience both show that today’s well engineered overprovisioned networks based on current routing technologies can support
most voice services
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
17
Core Domain VoIP Architecture
Best Effort
Failure Detection ~ 300 ms – 1+ sec (without optimizations)
Route Convergence ~ 10+ sec (area size dependant)
Causes temporary service interruption, degradation of capacity
Router
Failure
Copyright © 2003 Juniper Networks, Inc.
O
Proprietary and Confidential
www.juniper.net
18
Core Domain VoIP Architecture
Best Effort
Routing protocols unable to detect route around congestion
Causes temporary service interruption, degradation of capacity
O
Link
Congestion
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
19
Core Domain VoIP Architecture
Best Effort – Pros & Cons
Pros
Inexpensive
Simple
Studies show that overprovisioning provides satisfactory
delay and jitter performance
Sufficient strategy for voice-only
and over-provisioned networks
Cons
Performance levels not
maintainable across failures
and congestion
Not adequate for oversubscribed networks
Challenges inherent with
building over-provisioned
networks
Does not provide admission
control constructs
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
20
Core Domain VoIP Solutions
Over-Subscribed
Network
Core
Access
Copyright © 2003 Juniper Networks, Inc.
Enhanced Delivery
Differentiated Services
Access
Proprietary and Confidential
www.juniper.net
21
Core Domain VoIP Architecture
Enhanced Delivery
Differentiated Services (Diff-Serv) facilitates the ability to
provision separate service classes such that they receive
particular treatment levels
Packets marked accordingly before entering the network
Participating routers process packets according to Diff-Serv
marking
Router Diff-Serv processing variables
• Queuing (priority levels)
• Scheduling (strict, weighted, round-robin, etc)
• Congestion avoidance (RED, WRED)
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
22
Core Domain VoIP Architecture
Enhanced Delivery
DiffServ markings (DSCP) scale well
DSCP’s can be AS-Dependant
• Router DSCP mediation requirement
DSCP may be mapped to other QoS technologies across
network
• QoS migration
• Network segment QoS interworking
DiffServ adds deterministic behavior to packet class
transport
• This benefit enhances transport behavior in secondary
path re-route optimizations
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
23
Core Domain VoIP Architecture
Enhanced Delivery
•Cycle through output
queues emptying from
highest to lowest priority
•DiffServ markings map to
queue level
Copyright © 2003 Juniper Networks, Inc.
High Priority Queue
Medium Priority Queue
Low Priority Queue
•Queuing schedulers
typically allow for variable
weighting/emptying
•Queue sizes typically
variable/provisionable
Proprietary and Confidential
www.juniper.net
24
Core Domain VoIP Architecture
Enhanced Delivery
Failure Detection ~ 300 ms – 1+ sec (without optimizations)
Route Convergence ~ 10+ sec (area size dependant)
Re-Route performance doesn’t benefit from DiffServ treatment
Causes temporary service interruption, degradation of capacity
Router
Failure
Copyright © 2003 Juniper Networks, Inc.
O
Proprietary and Confidential
www.juniper.net
25
Core Domain VoIP Architecture
Enhanced Delivery
Routing protocols unable to detect route around congestion
High-priority-marked VoIP flows will take longer to be affected by
congestion than lower priority flows
May cause temporary VoIP service interruption, degradation of
capacity, will affect other services
O
Link
Congestion
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
26
Core Domain VoIP Architecture
Enhanced Delivery – Pros & Cons
Pros
Cons
Adequate for oversubscribed networks
Performance levels not
guaranteed across failures
and congestion
Enhanced flow treatment
for VoIP across failure reroute paths
Lowers per-router hop
latency
Link bandwidth statistics not
maintained or usable
Does not enable admission
control constructs
Adds flow-based traffic
engineering model
Scales easily
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
27
Core Domain VoIP Solutions
Carrier-Grade
MultiService Network
Core
Access
Copyright © 2003 Juniper Networks, Inc.
Assured Experience
MPLS-TE
Access
Proprietary and Confidential
www.juniper.net
28
Core Domain VoIP Architecture
Assured Experience
Assured Experience networks are built upon an
intelligent network resource plane
Allow the service provider to guarantee
deterministic performance to its customers under
all network conditions
• Even during network congestion and element
failures
Facilitate multi-service network infrastructures
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
29
Core Domain VoIP Architecture
Assured Experience
The Intelligent Network Resource Plane…
• Maintains resource state, such as
• Link Bandwidth – up/down, total and current allocation
• Facilitates connection-oriented traffic engineering constructs, such
as…
• Constraint Based Routing Control
• Flow Classification and Forwarding
• Supports fault tolerance constructs, such as
• Fail-over Resources – routes, network elements
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
30
Core Domain VoIP Architecture
Assured Experience – MPLS
MPLS supports the requirements of Intelligent
Network Resource Plane
MPLS was designed to ease the provisioning and
maintenance of efficient packet data networks
IGP and BGP routing protocols building forwarding
tables based on shortest path only
MPLS separates the route control and packet
forwarding such that policy-based paths may be
constructed
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
31
Core Domain VoIP Architecture
Assured Experience – MPLS
MPLS is based on…
• Label Switched Paths (LSP)
• Link Attribute Distribution (IGP/BGP protocol extensions)
• Traffic Engineering Databases (TED)
• Constrained-Shortest-Path-First Algorithm (CSPF)
• Label Distribution Protocols (LDP)
• Label Edge Routers (LER) and Label Switch Routers
(LSR)
MPLS-TE facilitates constraint-based routing
We’ll talk more about MPLS items later…
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
32
Core Domain VoIP Architecture
Assured Experience – MPLS Route Protection
Primary LSP / Secondary LSP Configuration
• Allows for backup physical path TE
Fast Rerouting
• Facilitates dynamic routing around link / node failures
Fate Sharing
• Limit backup LSP crossing of the same physical
elements as primary LSP
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
33
Core Domain VoIP Architecture
Assured Experience – MPLS
•Traffic Engineering creates LSP’s
•Labels are distributed to construct LSP’s
LER
•Packets are classified / Labels added
•L2/L3 policy application
•Upstream flows policed, downstream
flows shaped
LSR
LER
•LSR’s only inspect label
•Label is removed from packets
•Label and interface table lookup
•Packets are routed to
destination
•Output label and interface
•Queue and drop accordingly
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
34
Core Domain VoIP Architecture
Assured Experience – MPLS
Failure Detection ~ 20 – 30 ms
Fast Reroute < 50 ms
Small amount of packet loss during failover
Service interruption not noticeable, minimal capacity degradation
Router
Failure
Copyright © 2003 Juniper Networks, Inc.
O
Proprietary and Confidential
www.juniper.net
35
Core Domain VoIP Architecture
Assured Experience – Pros & Cons
Pros
Cons
State-full, intelligent network
resource plane
Fully meshed topologies
suffer from n2 scaling issues
Designed to ease TE design,
maintenance and management
Facilitates class-based
forwarding for multi-service
networks
Interworks with disparate QoS
mechanisms and transport
technologies
Supports hierarchical forwarding
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
36
Multiservice: Service Classes
From this…
Control
To this….
Data
Control
Internet
Voice
VPN
Easy to think of as “CoS”, but actually involves
much more than traditional router CoS or QoS
mechanisms.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
37
Multiservice: Bundled Service Offerings
Plain VoIP service model is proven to be non-sustainable
• First generation of pure VoIP carriers are gone
• Price of 1 min of voice has fallen through the floor
VoIP with other services is the way to go
• Value-add: Unified messaging, voice accessible content,
video telephony
• Additional non-voice: Broadcast video, surveillance, etc.
VPNs and other business services
• Generate more revenue, key differentiator from
competitors
• Can be offered at minimum additional cost
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
38
Final Thought on Goals:
Who Really Knows?
Future service revenue
• By definition unknowable, will always surprise us…
• Immense possibility in diverse areas such as mobile,
micropayment, handheld videoconferencing…
• Infrastructure must have:
• Unrestricted future service rollout
– Vendors must design flexible hardware and software platforms
• Upgradeable without forklift
• Capability to support many services at one time, without the
services affecting each other
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
39
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
40
QoS: Bandwidth
VoIP traffic is constant bit stream, bandwidth required
varies with which codec used, # of voice sample per
packet, and transport media used.
Even G.711 packets are only ~80 bytes, each call only
~112 kbps.
VoIP packet is very small for compressed codecs
• G.729 with two 10ms samples/frame yields 24Kbps
without layer2 headers
Line rate processing of VoIP packets is crucial!
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
41
QoS: Delay
ITU G.114: <150ms for one-way, e2e
Delay Budget:
• T f Packet formation delay, O(10ms)
• Tsf Packet switching delay, O(10us) per Hop
Si
•
Serialization delay, (#bits/link rate*#Hop)
Pi
• Q Propagation delay, (1ms/100mile)
•
Queuing delay, (variable)
typical backbone delay requirement: <30ms
max
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
42
QoS: Jitter
Definition: Variations in packet arrival time
Causes:
• Queuing variation under changing network load condition
• Load sharing over changing paths
De-jitter (“playout”) buffer in gateways
• Static or dynamic
• Adds to the overall delay
Best to avoid causes of Jitter rather than trying to buffer it away.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
43
QoS: Packet Loss
UDP as transport
• no flow control
• doesn’t tolerate packet loss very well
<1% to avoid quality degradation
<5% if VoIP gateway provides concealment
mechanism
Higher compression rates demand lower loss
budgets
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
44
Network Availability & Recovery
Availability
• Common SLA for VoIP network: 99.995% or 26 min/yr
• Availability needs continue to increase
Recovery
• O(sub-second) to avoid session timeout and new call
setup
• VoIP gateway to gateway recovery usually spans over
several segments
• Layer 3 based network recovery is generally
unacceptable
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
45
Network Security
Guard against un-trusted network elements and networklevel attacks
Stateful and stateless firewall capabilities may be
necessary
Authentication to Prevent Fraud
• RADIUS most common deployment
Confidentiality is emerging as another basic security
requirement for VoIP
• Carry VoIP traffic within VPN, such as IPsec tunnel or
MPLS VPN
• Increased security vs. encryption overhead for VoIP
packet
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
46
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
47
Topological Assumptions
Routers deployed in pairs at each site
• Primarily for fault tolerance
• Also useful for load sharing
Intra-site connections required in all topologies
• Must be at least same capacity as inter-site
trunk links
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
48
Core Topologies
Star-connected Core
• “Outer core”
connected
to two
“super-routers”
• Simple routing and
forwarding
• Probably least
expensive
• Concerns about redundancy
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
49
Core Topologies
Fully-connected Mesh
• Each router connected
to every other site
• Also simple routing and
forwarding
• Perhaps most
expensive
• Mesh can always
be reduced!
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
50
Core Topologies
Half-mesh router groups
• Each router connected
to ~half of other sites
• More complex routing
and forwarding
• Many full-mesh benefits
without the expense
• Success depends on
engineering to
particular needs
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
51
Edge-core Topologies 1
Single uplink per router edge site
• Two connections
to two routers in one
core site
• Availability largely
dependent on physical
layout
Core
Router
Site 1
Edg e
Rout e r
Si t e D
Cor e
Rout e r
• Usually lowest cost
Copyright © 2003 Juniper Networks, Inc.
Si t e 2
Proprietary and Confidential
www.juniper.net
52
Edge-core Topologies 2
Single uplink per router edge site
• Two site connections
to two separate
routers
• Availability depends on
physical media
• Somewhat low cost
Core
Router
Site 1
Edg e
Rout e r
Si t e C
Cor e
Rout e r
Si t e 2
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
53
Edge-core Topologies 3
Partially duplicated edge router uplinks
• Three connections
to three separate
routers
• One dual-homed,
Edge
one not
Router
Site B
• Particularly useful in
MPLS topologies
• High availability
• Somewhat high cost
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
Cor e
Rout e r
Si t e 1
Cor e
Rout e r
Si t e 2
www.juniper.net
54
Edge-core Topologies 4
Fully duplicated edge router uplinks
• Four connections
to four separate
routers
• Both edge routers
dual-homed
• Highest availability
Edg e
Core
Router
Site 1
Rout e r
Si t e A
Cor e
Rout e r
Si t e 2
• Highest cost
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
55
Site Connection to Edge Routers
Many variants on dual-homed
designs possible
Essential idea is suitable
for gateway or
softswitch sites
Media
Best-effort traffic
may enter
through separate
aggregation
points
Copyright © 2003 Juniper Networks, Inc.
Gateways
Proprietary and Confidential
www.juniper.net
56
IGP Selection
Two options:
• ISIS
• OSPF
Very close race!
Biggest issue is probably legacy deployment in current
network, and customer comfort.
ISIS has slight edge in terms of sub-second failure
detection
Main point is that a successful network can be built with
either.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
57
IGP Configuration
Issues to consider
• Hierarchy (areas or levels)
• Hello Timers
•BFD changes things here!
• Authentication for security
• Addressing plan
•ISIS requires ISO NET lo0 addresses
• Metrics
• Load balancing
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
58
Load-balancing Considerations
Two approaches to load balancing
• Per-destination
• Single path chosen from equal-cost next hops
• Simpler to predict
• Per-flow
• Flow distributed between equal-cost next hops
• Policy can restrict potential traffic path
Choice depends primarily on topology and other requirements
Most voice engineers more comfortable with per-destination
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
59
Forwarding Protection Protocol Options
Link Redundancy
• MLPPP – T1/E1 Link aggregation
• 802.3ad – Ethernet aggregation
• SONET/SDH aggregation
SONET/SDH APS/MPS
Virtual Router Redundancy Protocol (VRRP)
Standard IGP protocols
• OSPF
• ISIS
Bidirectional Forwarding Detection (BFD)
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
60
Bidirectional Forwarding Detection
(BFD)
IETF Draft co-authored by Juniper and Cisco
Optimized timer-based link failure detection protocol
• Brings link failure detection in line with today’s highspeed transport technologies
Reduces link failure recognition from seconds to 10’s of
milliseconds
• Provisionable for link/service requirements
Operates at packet forwarding plane
• Independent from routing protocols and applications
When run between edge router and media gateway,
provides network resource to VoIP service link
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
61
MG to Router Connection with BFD
VoIP
Line Cards
MG
BFD-A1bu
BFD-B1bu
BFD-B2
BFD-A2
BFD-B2bu
BFD-A2bu
Line
Cards
BFD-B1
Line
Cards
BFD-A1
VoIP Line Card Failure
• Connectivity of A1 protected by B1 (vice-versa)
• Call preserved only under specific MG application control
Router PIC Failure
• Connectivity of A1 and B1 protected by A2 and B2 respectively (vice-versa)
• Call preserved with packet-loss period (dependant on detection and re-route times)
Router System Failure
• Connectivity of A and B protected by Abu and Bbu respectively (vice-versa)
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
62
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
63
IP CoS Functions
Per-flow Rate
Policing
Traffic
Classification
&
Marking
Priority
Queuing
Congestion
Avoidance
W
R
R
RED
• IP Flow
• IP Precedence bits, DSCP Byte
• MPLS CoS bits
100%
Stream
• Incoming Physical Interface
• Incoming Logical Interface
• Destination IP address
Copyright © 2003 Juniper Networks, Inc.
100%
100%
PLP=1
Proprietary and Confidential
PLP=0
www.juniper.net
64
Converged Network CoS Design
In a voice / best effort network, three classes (at least) of service are
necessary:
•
IP network control traffic
• Low bandwidth requirements, not sensitive to latency, jitter
• Must not be starved
•
Voice signaling and bearer traffic
• Highest latency and jitter requirements
•
Best effort data traffic
• Whatever capacity is left
More complex configurations may or may not be needed in other
network designs (e.g. with VPN service)
More classes = more complexity, no way around this.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
65
Converged Network CoS Design
Queue 0 : IP Network Control traffic
• Allocated bandwidth : 5% (the default for
NC)
• Priority: High; this guarantees that NC
traffic will never be starved of bandwidth.
• No RED drop profile assigned, as NC traffic
should never be dropped.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
66
Converged Network CoS Design
Queue 3 : Voice Signaling and Bearer traffic
•
Initial requirement is 50% of total traffic.
•
Allocated bandwidth: 20%; although doesn’t really
matter as this queue gets strictly high priority.
•
Strictly High Priority: voice can take as much
bandwidth as it needs.
RED drop profile: drop nothing until queue is full, then
drop everything.
•
Dropping packets randomly is not very suitable on
voice traffic.
•
Forces head dropping (rather than tail dropping)
once queue is full.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
67
Converged Network CoS Design
Queue 1 : Best effort
•
Allocated bandwidth: remaining 75%.
•
Not guaranteed
•
Priority: Low; this traffic is served only if there is no
voice traffic, and there is bandwidth available.
•
RED drop profile: medium. This can be fine tuned,
perhaps start to drop when queue is 70%, with a
probability of 30%, then drop 100% of the traffic
when queue fullness reaches 90%.
•
Medium RED drop profile will limit the TCP
congestion synchronization phenomena that would
occur otherwise.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
68
More Services Possible!
Multiservice queuing
• Service VoIP Queue Aggressively to Avoid Filling the Queue
Best Effort Traffic
Queue 0 = 50%
WRR Service Rate = 15%
VPN Traffic
Queue 1 = 35%
WRR Service Rate = 15%
VoIP Traffic
Queue 2 = 10%
WRR Service Rate = 65%
Network Control
Traffic
Queue 3 = 5%
WRR Service Rate = 5%
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
69
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
70
Don’t Stop Sending the Voice!
It doesn’t matter what happens otherwise…
• Customers only notice when the call is interrupted
Many call this idea “Non-Stop Forwarding”
Main Principles of NSF
• Data Plane should not be disrupted
• Control plane failures should not effect forwarding
• Failures happen but the infrastructure can recover gracefully
• Management/Routing sessions can be re-connected unnoticed
Many Vendors Adopting this approach
• Not all, some favor fully redundant protocol state mirroring
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
71
Graceful Restart - How ?
Restarting node preserves the forwarding state
Control plane failure known only to the Routing peers
Routing peers preserve routing information of restarting node
Restarting node (re)learns its routing information from its
routing peers
No preservation of any of the protocol-related state across the
restart on restarting node
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
72
Graceful Restart - How ?
Separate control
and data planes
P
P
PE 2
When router recovers,
neighbors sync up
without disturbing
forwarding.
PE 1
If router’s control
plane fails, data
plane can keep
forwarding packets
Copyright © 2003 Juniper Networks, Inc.
PE 3
P
Neighbors hide
failure from all
others routers
in the network
P
Other routers
are never made
aware of failure
Proprietary and Confidential
www.juniper.net
73
Graceful Restart - How ? (cont.)
Graceful restart mechanisms are protocol specific:
• BGP for Interdomain routing
• ISIS and OSPF for IGPs
• LDP and RSVP for LSP management
• BGP/MPLS specific to MPLS VPN management
• RIP – already built in, but a draft nonetheless
All these are currently IETF drafts, but implemented by major vendors
(this isn’t an unusual situation, many examples of this these days)
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
74
Hitless RE Switchover
Routing Engines
Protects against Single Node Hardware Failure
Primary (REP) and Secondary (RES) utilize
keepalive process
Keep
Alive
• Automatic failover to RES
• Synchronized Configuration
REP and RES share:
• Forwarding info + PFE config
Packet Forwarding
Engines
REP failure does not reset PFE
• No forwarding interruption
• Only Management sessions lost
• Alarms, SNMP traps on failover
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
75
Agenda
Packet voice essentials
• Quick background: VoIP Applications
• Customer Goals for Voice
• VoIP Traffic Characteristics
Packet voice backbone design
• Class of service
• High Availability
• MPLS
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
76
IP-only Path Selection
Largely dependent on routing protocols
Adjustable only through metrics
• Changes tend to be global
• Difficult on per-application basis
• Extremely manual and labor-intensive in nature
• Requires offline path computation
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
77
IP-only Network Reliability
Mechanisms
•Connection-oriented transport (TCP)
•Not used for realtime traffic like voice
•Dependence on underlying network infrastructure
•E.g. SONET/SDH APS, Ethernet VRRP, ATM
•Not IP-based, therefore not network-wide
•Routing protocol recovery
•Relatively slow convergence
•Potential system-wide effects
•BFD improves this, but not enough by itself
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
78
Enter MPLS
•Low-overhead virtual circuits for IP!
•Gives many Voice-friendly attributes to IP
•DiffServ-compatible CoS
•Deterministic path selection
•Failure recovery via:
•Fast reroute
•Secondary LSPs
•Planning and determinism through circuit-like
traffic engineering
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
79
MPLS-TE network optimization
•Traffic engineering
allows deterministic
paths for Voice and other
realtime data, similar to
circuit switched networks
•Constraint-based routing
can dynamically choose
paths best suited to
applications or types of
traffic
label-switched-path HK_to_Tokyo {
to Tokyo;
from Hong_Kong;
admin-group {exclude red}
cspf}
Seoul
Tokyo
Hong Kong
Taipei
Kuala Lumpur
Manilla
Singpore
Jakarta
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
80
MPLS CoS Capabilities
•EXP field (and label) can be used for CoS
Label (20-bits)
L2 Header
MPLS Header
CoS S
TTL
IP Packet
32 bits
•DiffServ-compatible
•Consistent meanings can exist for MPLS EXP
(and label) and IP DiffServ per-hop behaviors
•Core (MPLS) and edge (IP/DiffServ) PHBs can
be related and consistent
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
81
What is Diff-Serv TE ?
Diff-Serv: scheduling/queueing behaviour at each node depends on traffic type
(indicated by DSCP/EXP setting)
MPLS TE: use of constraints to control placement of LSPs. Typically, various
traffic classes share the same LSP. Bandwidth reservations do not take account
of the classes of traffic involved.
MPLS Diff-Serv TE:
• Traffic divided into up to eight Class-Types.
• CSPF and RSVP take the Class-Type into account when computing path of
LSP.
• Results in More granular bandwidth reservation.
On each link in network, can have separate bandwidth constraints for each type
of traffic
• E.g. limit the bandwidth taken by voice LSPs on a link to a maximum of
40%, data LSPs take the rest.
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
82
CoS / QoS & Forwarding
Diff-Serv-aware MPLS Traffic Engineering
Guaranteed bandwidth for MPLS
• Combines MPLS Diffserv and Diffserv TE
• Provides strict point to point QoS guarantees
Aggregated State (DS)
Aggregate Admission Control (DS-TE)
Aggregate Constraint-based Routing (DS-TE)
No state
Aggregated state
Per-Flow state
MPLS Diff-Serv + MPLS
DS-TE
Best effort
Diff-Serv
MPLS
Guaranteed
Bandwidth
Copyright © 2003 Juniper Networks, Inc.
RSVP v1
& Int-Serv
Proprietary and Confidential
www.juniper.net
83
How DS-TE Operates
Extended IGP
Routing Table
Traffic Engineering
Database (TED)
Operations Performed by the
Ingress LSR
Constrained
Shortest Path First
User
Constraints
1) Store information from IGP flooding
2) Store traffic engineering information
Explicit Route
3) Examine user defined constraints
4) Calculate the physical path for the LSP
5) Represent path as an explicit route
Copyright © 2003 Juniper Networks, Inc.
RSVP Signaling
Proprietary and Confidential
www.juniper.net
84
MPLS failure recovery
•Fast reroute allows rapid switching to alternate link
segments while longer-term repairs are made
•Secondary LSPs provide deterministic alternate
paths during link failure
•Possible in a consistent, network-wide manner
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
85
MPLS Fast Reroute
Single user command
at head end to enable
Fast Reroute.
Detour
Detour
Primary
LSR1
Primary
LSR2
Detour
Primary
LSR3
Primary
LSR4
LSR5
• Fast reroute is signaled to each LSR in the path
• Each LSR computes and sets up a detour path
that avoids the next link and next LSR
• Each LSR along the path uses the same route
constraints used by head-end LSR
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
86
MPLS Fast Reroute:Recovery Times
MSeconds
400
350
300
250
200
150
100
50
0
Max
Average
Min
5.0
5.1
5.2
5.3+
JUNOS version
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
87
Summary
•VoIP deployments are going ahead
•Good for provider profits
•Good for customer services and needs
•The question is no longer “if”, but rather “how”
•Luckily:
•There are tools that make voice backbones
•Possible
•High-quality
•Profitable
•Diff-serv, NSF, and MPLS are up to the job
Copyright © 2003 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
88
Thank You