Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly...

26
1 Network Design for Highly Network Design for Highly Available Available VoIP VoIP David Tipper Associate Professor Associate Professor Department of Information Science and Telecommunications University of Pittsburgh [email protected] [email protected] http://www.tele.pitt.edu/tipper.html http://www.tele.pitt.edu/tipper.html Slides 4 Slides 4 Molde 2005 2 What is Critical Infrastructure? Critical Infrastructure (CI) or Critical National Infrastructure (CNI) are the systems, assets and services upon which society and the economy depend Energy and utilities Information Technology and Telecommunications Critical Services (food, health care, financial) – Transportation Government and Emergency Services – Etc. Critical Infrastructures are expected to be reliable with high availability Current PSTN infrastructure is highly available – can VoIP provide similar availability?

Transcript of Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly...

Page 1: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

1

Network Design for Highly Network Design for Highly Available Available VoIPVoIP

David TipperAssociate ProfessorAssociate Professor

Department of Information Science and Telecommunications

University of Pittsburgh

[email protected]@tele.pitt.eduhttp://www.tele.pitt.edu/tipper.htmlhttp://www.tele.pitt.edu/tipper.html

Slides 4Slides 4

Molde 2005 2

What is Critical Infrastructure?• Critical Infrastructure (CI) or Critical National

Infrastructure (CNI) are the systems, assets and services upon which society and the economy depend– Energy and utilities– Information Technology and Telecommunications– Critical Services (food, health care, financial)– Transportation– Government and Emergency Services– Etc.

• Critical Infrastructures are expected to be reliable with high availability

• Current PSTN infrastructure is highly available – can VoIP provide similar availability?

Page 2: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

2

Molde 2005 3

PSTN Architecture

WirelessInterExchange CarrierLocal Exchange CarrierLEC

Central OfficesLEC

End OfficesLEC

Local Loop

POP

POP

POP

Satellite

Logical Tree Structure Graph-Structured

TandemSwitch

Trunk Backbone

SatelliteGatewa

y

CellularGatewa

y

CellTowe

r

GroundStation

IEC POPS

Headend

Molde 2005 4

Causes of Telecom Network Outages

• According to NIST study of FCC outage data main causes in decreasing order of occurrence– Accidents

• cable cuts, car wreck, etc.– Human errors

• incorrect maintenance, installation – Environmental hazards

• fire, flood, etc.– Sabotage

• physical, electronic– Operational disruptions

• schedule upgrades, maintenance, power outage – Hardware/Software failures

• Line card failure, faulty laser, software crash, etc.

Page 3: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

3

Molde 2005 5

Network Survivability

• Definition– Ability of the network to support the committed Quality of

Services (QoS) continuously in the presence of various failure scenarios

• Survivability Components

– Analysis: understand failures and system functionality after failures

– Design: adopt network procedures and architecture to prevent and minimize the impact of failures/attacks on network services.

– Goal: maintain service for certain scenarios at reasonable cost

• Not only connectivity

• But also QoS guarantee: call blocking

• Self – Healing network

Molde 2005 6

Survivable Network Design

• Three steps towards a survivable network 1. Prevention:

– Robust equipment and architecture (e.g., backup power supplies)

– Security (physical, electronic), Intrusion detection, etc.

2. Topology Design and Capacity AllocationDesign network with enough resources in appropriate topologySpare capacity allocation – to recover from failure

3. Network Management and traffic restoration procedures

Detect the failure, and reroute traffic around failure using the redundant capacity

Page 4: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

4

Molde 2005 7

Survivability – Basic Concept

• Working path and Backup path (Protection path):

• Working path: carry traffic under normal operation

• Backup path: an alternate path to carry the traffic in case of failures

1

3 4

2X

BA

Working route

Backup route

DCS

Customer

Bac

kup

rout

e

Molde 2005 8

Survivability – Basic Concept

• To survive against a network failure– working path and backup path must be disjoint – So that both paths are not lost at the same time

• Disjoint = ? (depending on a failure assumption)– Link disjoint– Node disjoint– (Shared Risk Link Group) SRLG disjoint

Source DestinationAP

BP

AP

BP

SourceDestinationLink-disjoint Node-disjoint

Page 5: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

5

Molde 2005 9

Shared Risk Link Group (SRLG)

A

Logical intent

Actual routing

Physical Cables

B

C

• Two fiber cables share the same duct or other common physical structure (such as a bridge crossing).

• Two cables can be failed simultaneously

Molde 2005 10

Survivability Techniques

• Path-based (Global) versus Link-based (Local)

• Dedicated-Backup versus Shared-Backup Capacity

• Protection versus Restoration• Ring versus Mesh topology• Dual homing• P cycle

Page 6: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

6

Molde 2005 11

Path-based versus Link-based

• Path-based Scheme (Global)– Disjoint alternate routes are provided between source

and destination node

2

1

3

4 5

6

Working pathBackup path

Molde 2005 12

Path-based versus Link-based

• Link-based Scheme (Local)– Alternate routes are provided between end nodes of

the failed link

1

4

2 3

5

6

Working pathBackup path

Page 7: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

7

Molde 2005 15

Dedicated versus Shared - Backup

• Dedicated-Backup Capacity– Backup resource can be used only by a particular working path

• Shared-Backup Capacity– Backup resource between several working paths can be shared– Rule: backup resource can be shared only when corresponding

working paths are not expected to fail at the same time– More capacity efficient

WP2 (traffic 10 units)

2

4 6

3

7

8

1

5

WP1 (traffic 5 units)

BP1

BP2

link5-7: dedicated spare capacity = 15 unitsshared spare capacity = 10 units

Working pathBackup path

Molde 2005 16

Protection versus Restoration

• When to establish the backup paths?• Protection

– Backup paths are fully setup before a failure occurs.– When failure occurs, no additional signaling is needed to establish

the backup path– Faster recovery time

• Restoration– Backup paths are established after a failure occurs– More flexible with regard to the failure scenarios

• backup paths are setup after the location of failure is known– More capacity efficient

• due to its shared-backup nature, • Utilize any spare capacity available in the network

– But cannot guarantee 100% restorability after failures

WP

BP

Page 8: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

8

Molde 2005 17

Protection Switching Variations• Automatic Protection Switch (APS)

– Provide a mechanism for link-failure tolerance.• APS 1:1

– One standby cable for each working cable• APS 1:N

– One standby cable for N working cable

• APS/DP (APS with diverse protection)– Standby cable is placed on a different physical

route than the working cable• Fully restorable APS/DP system requires

100% capacity redundancy.

APS APSWorking Channel 1

Working Channel nWorking Channel 2

Standby Channel

Node 1 Node 2

APS

APSWorking Channel 1

Working Channel nWorking Channel 2

Standby Channel

Node 1 Node 2

Node 3 Node 4

Div e

rse

Molde 2005 18

Mesh Network

• WDM Optical Networks - lightpath• Example:

8

13

12

11

10

1

9

2

7

3

6

54

Working path

Path restoration backup path

Link restoration/Protectionbackup path

Path protection backup path

Page 9: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

9

Molde 2005 19

Dedicated-path Protection

• Ai is an availability of link i• Availability of a connection between S-D:

WP

BP

Source (S) Destination (D)

no protection ii WP

A A−∈

= ∏

protection i i ii WP i BP i WP BP

A A A A∈ ∈ ∈ ∪

= + −∏ ∏ ∏• Given Ai = 0.998297,

- Ano-protection = 0.996597, Aprotection= 0.999983

Molde 2005 20

Self-healing Rings (SHRs)

• SHR is a topology connecting a set of nodes by one (or more) rings.

• Two types of SHRs :– Uni-directional ring (USHR)

• Nodes are connected to two rings forwarding traffic in opposite direction.

– Bi-directional ring (BSHR)• Four rings are used as two working and two

standby routes. • An extension to 1:1 APS

Page 10: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

10

Molde 2005 21

Types of Self-healing Rings

1:1 Bi-directional self-healing ring(BSHR)

ADM ADM

ADM

ADM

1:1 Uni-directional self-healing ring(USHR)

ADM ADM

ADM

ADM

Working ring

Protection ring

Working ring

Protection ring

Molde 2005 22

Dual-homing and Multi-homing

• Dual-homing– Customer host is connected to two switched-

hubs.– Traffic may be split between primary and

secondary paths connecting to the hubs.– Each path is served as a backup for another.

• Multi-homing– Customer host is connected to more than two

switched hubs.– Greater protection against a failure.

Page 11: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

11

Molde 2005 23

Dual/Multi-homing Topologies

switch

customer host

Dual-homing topology Multi-homing topology

Molde 2005 24

Dual-homing Restoration Capability

• Dual-homing doesn’t accomplish restoration by itself, must be used in conjunction with dynamic restoration techniques.

• 100% restoration can be achieved for a single link or a single switch failure via path rearrangement given that there is enough spare capacity at the link to alternate switched hub.

• Dual-homing approach guarantees surviving connectivity, but it may take time to restore priority circuits via path rearrangement.

Page 12: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

12

Molde 2005 25

• For meshed networks• Pre-reserved protection paths (before failure) • Based on cycles, like rings• Also protects straddling failures, unlike rings• Local protection action, adjacent to failure (in

the order of some 10 milliseconds)• Shared capacity

• “pre-configured protection cycles” p-cycles• Developed in Canada at

p-Cycles: Basics

(c) A link not on the cycle fails

Molde 2005 26

• A single p-cycle in a network:

p-Cycles: Basics

Page 13: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

13

Molde 2005 27

p-Cycles: Basics

• Protected spans:• 9 „on-cycle“ (1 protection path)

Molde 2005 28

• Protected spans:• 9 „on-cycle“ (1 protection path)• 8 „straddling“ (2 protection paths)

p-Cycles: Basics

Page 14: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

14

Molde 2005 29

Transport Survivability• Number of techniques exist

– Automatic Protection Switching (APS)– Multi-homing (with or without trunk diversity)– Link restoration– Path restoration– Self healing rings– p-cycles

• See a mixture of techniques in real networks• Usually little or no survivability at the far edge (CPE – last mile)

AccessCore

Access

Molde 2005 30

Failure in IP Backbones

Source: University of Michigan, 2000

32%32%

9%9%

23%23%

36%36%Congestion results from long time to recover

Software UpgradeHardware UpgradeConfiguration Errors

Software failuresHardware failuresDOS Attacks

Link FailureLink Failure

Other UnknownOther Unknown

Router FailuresRouter Failures

Router OperationsRouter Operations

Page 15: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

15

Molde 2005 31

Sprint IP Backbone

Molde 2005 32

Failures

• Failures are frequent in IP networks– Software failures, line card resets/failures, etc

• Example according to Sprint

Page 16: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

16

Molde 2005 33

Equipment Reliability

• Routers, routing protocols, and management thereof must be highly available and secure

• Core and Edge Routers and becoming more reliable with adoption of fault tolerant hardware architectures– (hot swappable line cards, backup switch cards,

redundant cooling, power, etc )• Software failures a major concern

– many more lines of code in comparison to OXC or Telco switch – redundancy improvement??

• Service/upgrade downtime needs improvement

Molde 2005 34

• Several techniques to improve survivability• IP layer –

– adjust link weights and timers for faster failure recovery

– prestore second shortest paths, etc,• Adopt Optical Transport techniques from

Telco operators (survivable rings, APS, path restoration, etc.)

• MPLS logical layer restoration

Survivability Options

Page 17: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

17

Molde 2005 35

IP Dynamic Routing

• OSPF or IS-IS computes path• If link or node fails, New path is computed• Response times: Typically a few seconds

– Can be tuned to ~1000’s milliseconds– According to Sprint data – usually ~ 7secs to recover– Too Long for VoIP – PSTN will hang up if VoIP/ PSTN call

SanSanFranciscoFrancisco

New YorkNew York

Link failure floodedLink failure flooded

New Path ComputedNew Path Computed

Molde 2005 36

Backup Label Switched Paths

• Primary & backup LSPs established a priori• If primary fails

– Signal to head end, Use backup

• Faster response, requires wide area signaling

SanSanFranciscoFrancisco

New YorkNew York

Primary LSPPrimary LSP

Backup LSPBackup LSP

Error signaledError signaled

Page 18: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

18

Molde 2005 37

• Increasing demand for“APS-like” redundancy– MPLS resilience to link/node failures– Control-plane protection required– Avoid cost of SONET APS protection

• Solution: MPLS Fast-reroute– RSVP Extensions define Fast Reroute– LSPs can be set up, a priori, to backup:

• One LSP across a link and optionally next node, or• All LSPs across a particular link

MPLS Fast Reroute

LSR

Primary

Detour

Molde 2005 38

1:1 Protection

• For each LSP, for each node– Set up one LSP as backup– Merge into primary LSP further downstream– Backs up link and downstream node

Page 19: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

19

Molde 2005 39

1:1 LSP Protection

Link Fails

Traffic uses detour LSP

Merged Downstream

Molde 2005 40

1:N Link Protection

• For each link, for each neighbor– Set up one detour LSP to backup the link– Uses LSP Hierarchy to backup all LSPs which

were using failed linkMultiple Primary LSPs on same link

One detour LSP for link

Page 20: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

20

Molde 2005 41

1:N Link Protection

Link Fails

Primary LSPs multiplexed over one detour LSP

LSPs demultiplexedat next node

Molde 2005 42

1:N Link and Node Protection

• For each link– For each node 2 hops away

• Detour LSP backs up link & intermediate node• Uses LSP Hierarchy to backup all LSPs to that node• If there are two 2-hop paths to that node, setup two

detour LSPs– For each node 1 hop away

• Detour LSP backs up LSPs ending at that node

Page 21: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

21

Molde 2005 43

MPLS Fast Reroute

• Provides fast recovery for LSP failure– Based on a priori backup of detour LSPs– (eg, ~5 millisecond for tens of LSPs with 1:1)

• There are significant tradeoffs between the approaches– Number of LSPs required– Whether node failures are protected – Ability to reserve resources for backup LSPs– Optimality of routes

Molde 2005 44

Summary of MPLS Methods

• End-to-End backup LSPs• MPLS Fast Re-Route

– 1:1 LSP protection– 1:N Link protection– 1:N Link plus node protection

• All of these are interoperable based on IETF standards

• Sink Trees are under study• Does MPLS solve all the problems???

Page 22: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

22

Molde 2005 45

Multilayer Networks• Backbone networks have multiple technology layers

• Converging toward IP/MPLS/WDM• Multiple Layers present several survivability challenges

• Coordination of recovery actions at different layers– Which layer is responsible for fault recovery?

• Spare Capacity Allocation (SCA)– How to prevent over allocation, when each layer provides spare

resources?• Failure Propagation between layers

– Lower layer failure can affect multiple higher layer links!

1

2 3

4 5

1

5

3

MPLS connectionsPhysical Path

Molde 2005 46

Resilient Edge Connectivity

• Multi-Homing for resilient Internet and IP-VPN connectivity– Stub network with backup access (static routing)– Multi-Homed Network with load sharing

enterprise

ISP Core

Multi-Homed Stub Network

Page 23: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

23

Molde 2005 47

Link Redundancy

• Link Bundling– Link failure does not

affect forwarding – Load redistributed among

other members

• Parallel Link Technologies– MLPPP – T1/E1 Link aggregation– 802.3ad – Ethernet aggregation– SONET/SDH aggregation– Multi-Link Frame Relay

Simultaneous Physical Simultaneous Physical ConnectionsConnections

Molde 2005 48

Optical Protection

• Protection switching with ADM– Redundant routers share uplink

• Rapid circuit failure recovery– Used on router-to-ADM links– 50 ms at physical layer– Faster than layer 3 routing protocol

convergence

• Interoperable with standard ADM

• Working & protect circuits– May reside on different routers– May reside on same router

Protect

ADMADM

Page 24: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

24

Molde 2005 49

Virtual Router Redundancy Protocol

• Redundant default gateways:VRRP (RFC 2338)

FE

FE

FE

GEGE

Master Back-up

Ethernet Switch

HostHost HostHostHostHost

Master sends periodic hellosto communicatealive state.

Hosts arepreconfigured with Virtual Router IP address as default fortraffic exiting the LAN.

Multiple routers on the subnet negotiate who will be “Master”and own the Virtual Router IP Address.

All other routersare backups. Backuppriority is configurable.

Molde 2005 50

Summary

• VoIP Availability can be greatly improved by adopting – Reliable network components– Stable survivable network design– Protocols configured for quick recovery– Also need defined procedures for reporting

and resolution of outages.• Cost is an issue

– VoIP the most demanding application in terms of Availability? Can cost be justified?

Page 25: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

25

Molde 2005 51

VoIP Trends• Market Situation

– Deregulation and competitive Voice environment– Many ISP have built out network with QoS support

• Diff Serve or MPLS– Businesses are considering VoIP

• Economist Magazine Survey of 254 executives on corporate networking notes

• 43% report they are using, testing or planning to implement VoIP within the next two years

• Concerns: Quality, Availability, Features (new and PSTN) – Significant Cost advantages to VoIP

• AT&T study : Business ROI positive if phone bill greater than $350 month or 3 cents/minute or $50 month international calls

• In some cases this is due to avoiding taxes and settlement fees

• Business Case for VoIP service provider unclear in some cases

Molde 2005 52

VoIP Trends

• Technical situation– VoIP technology maturing

• Easier to setup, manage, interoperate, better quality, tradeoffs known etc.

• Possible to make a good quality network/service – Hurdles still exist

• No single standard, Interprovider QoS support, QoS over access links, 911, PSTN feature set, signalling control and QoS, etc

– Much focus on developing new telephony features

• VoIP phone technology of the future?

Page 26: Network Design for Highly Available VoIPdtipper/Molde/Molde_Slides4.pdfNetwork Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and

26

Molde 2005 53

Course Summary

• Overview of VoIP Architecture and Protocols– VoIP Configurations, H.323, SIP, MGCP

• VoIP Quality Factors –– VocodingVocoding, Echo, Delay, Jitter, Packet Loss, , Echo, Delay, Jitter, Packet Loss,

AvailiabilityAvailiability

• Network Quality of Service and VoIP–– QoSQoS Techniques, Diff Serve, MPLS Techniques, Diff Serve, MPLS

• Reliability and Network Design