Voice Transport Techniques over MPLS

Share Embed


Descrição do Produto

Voice Transport Techniques over MPLS Junaid Ahmed Zubairi, Ph.D., Member, IEEE with DiffServ for prioritized handling of the QoS traffic. ITUT has defined T-MPLS as a simplified version of MPLS for carrier transport networks. T-MPLS and its unique placement in the telecommunications industry are discussed briefly.

Abstract- In this paper, we discuss currently evolving technologies for packet based real-time voice communication. Packet based voice has gained popularity in the toll-quality market due to its flexibility and cost effectiveness. IMS (IP Multimedia Subsystem) is being developed for converged voice

Next, therotl a as evolved through

ardsfr V oM agreedic ss carrier implementation agreements facilitated by IP/MPLS Forum [2].

and data services. While initially it was intended for mobile networks, it has been expanded to include support for fixed

networks. In the wired network, the quality of service needed for

media traffic can be provided by MPLS and related protocols. The traffic engineering and quality of service mechanisms of MPLS and Diffserv allow the differential treatment of premium traffic on predefined LSPs (Label Switched Path). Recently TMPLS has been introduced as the transport network for connection oriented packet switched traffic, dropping some of the MPLS features that were irrelevant for connection oriented applications. We introduce IMS and then look at implementation agreements, methods and protocols for transport of voice over MPLS (Multi Protocol Label Switching) networks.

II. IP MULTIMEDIA SUBSYSTEM IP Multimedia Subsystem is SIP (Session Initiation Protocol) and IP based next generation architecture for unifying the data and media services for mobile and fixed network users. IMS is being developed by 3GPP, a liaison body that works with other organizations including TISPAN (Telecom and Intemet converged Services and protocols for Advanced Networks).

Index Terms- IP multimedia subsystem, VoMPLS, T-MPLS, Quad Play, QoS, jitter,, A2oMPLS

IMS-S

I. INTRODUCTION

oice over IP has been around for several years. Users

[have experimented with various audio-conferencing tools

offered by messaging services. Discounted phone cards that route calls through the Internet have been sold for quite some time. However, the end to end VoIP telephony did not achieve notable success until recently. The number of worldwide VoIP customers has now reached 40 million and it is projected to grow to approximately 250 million by the end of 2011 [1]. The quad play (voice, video, wireless and data) services are being defined for next generation integrated networks in IMS (IP Multimedia Subsystem). This tutorial paper discusses the IMS specifications and focuses on the techniques and methods developed for transport of voice over MPLS. The protocols are developed by 3GPP (3rd Generation Partnership Project), IETF (Internet Engineering Task Force), IP/MPLS Forum (formerly MFA Forum / MPLS Forum) and the ITU-T (Telecommunication Standardization Sector of the International Telecommunication Union).

Figure 1: IMS Architecture IMS goals include provisioning QoS, enabling network usage billing for media applications and integrating various media services. IMS adds a control layer below the services and defines interfaces to the mobile and landline phone network as well as the IP network. As shown in Figure 1, IMS

In the next section, the key proposals of IMS are defined. MPLS serves as an enabling technology for QoS, and it works Manuscript received November 2008.

Junaid Ahmed Zubairi is with the Department of Computer Science, State University of New York, Fredonia, NY 14063 USA ( phone: 716-6734694; fax: 716-673-4821; e-mail: [email protected]).

defines CSCF (Call Session Control Function) server as the primary SIP server that has three functions. The Proxy CSCF ©2008 IEEE. Personal use of this material is permitted. However, 25

permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE .

The MPLS header fields include an unstructured 20-bit label that identifies the LSP to which this packet belongs. The label is assigned based on the FEC (forwarding equivalency class) of the traffic trunk. It is followed by 3 bits TC (Traffic Class) field and 1 bit indicating whether this is the bottom of the label stack. The TTL (Time to Live) field has the same usage as the TTL field in an IP header. Class based queuing (CBQ) is invoked on routers that implement the differentiated services (DiffServ) protocol to create separate queues for each class of traffic. DiffServ divides the traffic into expedited forwarding (EF) and assured forwarding (AF) per-hop behaviors (PHBs). EF is the premium service offered under DiffServ. It is suitable for low latency and low jitter flows that maintain almost constant rate. In an MPLS-DiffServ network, the routers jointly implement various MPLS and DiffServ functions. The ingress router is responsible for determining an LSP for a new flow request. The QoS requirements of the new flow can be translated into DiffServ class assignment at the ingress. For this purpose, the TC (Traffic Class) field in the MPLS shim header is used. As the TC field is 3 bits in length, it can represent only eight different scheduling and drop precedences. Under MPLSDiffServ [5], two types of LSPs are defined. E-LSP interprets the label field of MPLS shim header as the egress identifier and the TC field as the DiffServ PSC (PHB scheduling class) combined with the drop precedence. On the other hand, LLSP interprets the label field as the DiffServ scheduling priority and the destination. The TC field in L-LSP is used to indicate only the drop precedence of the packet. The main difference between E-LSP and L-LSP is the aggregation feature in E-LSP resulting in scalability; however, some PSCs in an E-LSP may suffer because the bandwidth is reserved for the whole LSP [6]. Figure 3 shows the placement of the DiffServ class identifier and MPLS label for an E-LSP.

lets client user agents connect to the IMS , the Serving CSCF provides the basic signaling for IMS session and Interrogating CSCF bridges the different carriers thus enabling roaming. HSS (Home Subscriber Server), in association with SLF (Subscription Locator Function) , runs a database listing users and their subscribed services. HSS would be used to authenticate the users that request IMS session. IMS links to all types of networks including wired IP network, wireless CDMA/GPRS network and fixed phone network. PSTN is supported by MGCF (Media Gateway Control Function)[3]. IMS uses IETF standardized protocols in order to make it widely acceptable. However, the details of implementation are not specified, thus leaving it flexible. Vendors may come up with products that are IMS-compatible but the same may be implemented with different strategies. Only the interfaces with network may follow IMS standards.

III. MPLS AND DIFFSERV PROTOCOLS Real-time voice traffic has tight timing budget with the required end to end delay values below 150ms and the jitter or delay variation around 50ms. The best effort protocols cannot guarantee such limits because the datagrams do not follow a fixed path and may arrive at the destination out of order. With increased congestion, the queues get longer resulting in increased jitter. These problems make conventional IP networks largely unsuitable for connection-oriented applications such as interactive real-time voice. The real-time audio-conferencing applications written for the conventional IP networks use forward error correction and inter-mixing of small packets to recover from packet loss, often leaving the perceived call quality as less than desirable. MPLS [4] has emerged as the key integration technology for carrying voice, video, and data traffic over the same network. In an MPLS-enabled network, LSPs (Label Switched Path) are installed from an ingress node to an egress node prior to start of transmission. Each LSP can be specified with features that include time constraints and reliability. Therefore, the connection-oriented applications can take advantage of the "virtual connections" set by MPLS that satisfy some constraints. Since the LSPs are stackable, traffic from different flows sharing some common characteristics can be aggregated on an LSP. These characteristics may include common egress and identical QoS and protection requirements. MPLS operates by defining a label inside MPLS "shim header" that is placed on the packet between the layer-2 and layer-3 headers. The 32-bit shim header is organized as shown in Figure 2. It is referred to as "shim" header as MPLS allows la yer-2 and layer-3 to fit together firmly. MPLS Ladbel (20 TC (3 | (1* TTL (8 | bits) I bit) bits) bits)

MPLS LAbel (20

TC

bits) (FEC

(DiffSCrv

Dti))

S

(1 bit)

TTL (8 bits)

IV. TMPLS PROTOCOL ITU-T believes that the transport networks do not have highly varying traffic patterns thus there is no need for some of the features of MPLS that largely suit the dynamically changing traffic of Internet. They introduced T-MPLS in 2006 for support of connection oriented packet switching flows. The T-MPLS (Transport MPLS) (ITU-T G.8110.1) protocol implements a simplified MPLS architecture for carrier class networks. T-MPLS adds the TE capabilities of SONET/SDH to Layer 2 network designs [7]. It provides backup tunnels with 50ms protection switching, thus enabling the migration from SONET/SDH transport to a fully packet switched

netw

ork

ith

The

Figure 2: MPLS header fields 26

com

standard

parable

reliability[8].

documents

approved were

G.81 10.1

the MPLS bypassing the RTP/UDP/IP protocol stack. As seen in Figure 4, the VoMPLS protocol stack is more compact as compared to VoIP. The MPLS UNI (User Network Interface) definition [14] allows users at CE (Customer edge) to establish LSPs to the PE (Provider Edge) network. The LSP may be a single link or a layer-2 network but it is considered a single hop LSP. Since there may be thousands of CE-to-CE connections, a potential scalability issue arises. The MPLS proxy admission control [15] solves the scalability problem by letting the PE ingress router search for existing tunnels that can satisfy the traffic parameters TLV in the label request message sent by the CE. Once a suitable LSP is found, its RIL (Resource Index Label) is returned to the CE which then uses it to encapsulate the traffic for that tunnel. QoS is guaranteed only within the PE-to-PE network. For CE-to-PE links, customers have to deploy layer-2 QoS techniques for provisioning of resources.

Architecture of T-MPLS layer network, G.8112 Interfaces for the T-MPLS hierarchy (TMH) and G.8121 Characteristics of T-MPLS equipment. T-MPLS is described as a connection oriented packet transport technology that uses the MPLS label swapping and forwarding, carrier networks performance monitoring, simplified protection switching and ASON/GMPLS control and management functions [9]. It involves setting up unidirectional and bidirectional P2P (Point to Point) connections that take identical network path in both directions and receive TE support and management. T-MPLS simplifies end to end OAM (Operation, Administration and Management) by removing the IP specific functionality. For example, T-MPLS removes the PHP (Penultimate Hop Popping) feature that would require IP processing of the packet at the end router and similarly the ECMP feature is removed in order to avoid possible source identification confusion. The T-MPLS tunnel can carry multiple L2 and L3 services including IP/MPLS LSPs and PWE3 pseudowires. Companies that deploy T-MPLS are expected to find it easier and economical in terms of man-hours of staff training, as compared with IP/MPLS networks. It is because of the fact that the T-MPLS network's architecture is similar to SONET/SDH network. Recently, in early 2008, ITU-T and IETF have deliberated to resolve inconsistencies between MPLS and T-MPLS and the consensus is emerging to define separate code points for MPLS and T-MPLS in order to avoid confusion. IETF and ITU-T agree that MPLS and T-MPLS are disjoint networks. An LSP initiated from either network would encapsulate into Ethernet before transiting the other network. Client support in T-MPLS is based on IETF Pseudo wire model for Layer-2 VPN. The two-layer architecture includes top layer as client Virtual Circuit LSPs and bottom layer for aggregating the VC LSPs into Trunk LSPs. The key differences between MPLS and T-MPLS include the use of bidirectional LSPs in T-MPLS and no PHP, no merging of LSPs and no ECMP routing in TMPLS [10].

o RT1PLS

MA JA

M ALIA MPL5

AL3 A

IJDP

Figure 4: VolPoMPLS and VoMPLS protocol stacks B. MPLS UNI With Proxy Admission Control In voice deployment over MPLS, the VGW (Voice Gateway) acts as the CE requesting guaranteed LSPs to the remote VGW. The MPLS proxy admission control allows the voice gateways to dynamically request LSPs to remote VGWs and to share the multiplexed LSP-TE tunnels among themselves through the local PE acting as a proxy for admission control [16]. Using voice gateway as an example as in Figure 5, the following exchange of control messages may occur between the VGW and PE before a call can be established: 1) Phone 1 requests a voice call to Phone2. 2) VGW sends a label request message to PE containing FEC (Forwarding Equivalence Class) and Traffic Parameters TLV for the intended call. 3) PE acts as a proxy for the local VGW and searches existing TE tunnels to remote VGW that satisfy the traffic parameters and FEC in the label request message 4) If an existing tunnel is found that can satisfy the request, PE sends its RIL to the requesting VGW 5) The requesting VGW can now initiate the call and then release the resources once the call is terminated.

V. VOICE TRANSPORT OVER MPLS

Voice is carried on MPLS network either directly or with VoIP stack i.e. RTP/UDP/IP/MPLS. On the other hand, VoMPLS [11,12] carries voice directly over MPLS, reducing the headers significantly. Figure 4 shows the comparison of protocol stacks in different schemes. VoIP has the clear advantage of providing end-to-end connectivity with mature protocols. The MPLS user-to-network interface (UNI) definition for bringing users in direct contact with MPLS networks has been defined recently [13,14,15]. Using MFA IA 1.0 and IA 5.0, voice can be directly encapsulated in MPLS packets. The other option is to use the ATM over MPLS definition to enable VoATM voice service. Among these choices, VoMPLS is the most promising solution as it involves the least amount of protocol tax.

From the above, it is obvious that the MPLS UNI together with MPLS Proxy admission control provides a powerful mechanism to deploy thousands of voice calls through the PE network without control messaging overflow.

A. VoMPLS In VoMPLS,-ktd the packets are directly transpo ed over lt voice r 27

C. VoMPLS Header Formats In VoMPLS, Various header formats are defined for different payload types. Payloads may include encoded audio information, dialed digits, silence descriptors and control signaling. Two types of frames are defined in VoMPLS IA 1.0: primary and control frames. The VoMPLS primary frame header is shown [10] in Figure 6. Many primary VoMPLS frames may be multiplexed within a single MPLS packet.

Pb-

Figure 5: MPLS UNI and Proxy Admission Control

Channeil

Wfidtifie (8 bits)

Pay

load

Type

Counte (8 bits)

Payload

Length (6 bits)

Pad

Length (2 bits)

1) Using MPLS signaling mechanism, a bidirectional LSP is created 2) As voice call request arrives at the edge of the MPLS network, an existing CID is allocated to the new call within the LSP just created or CID signaling is done to establish the new channel. 3) Optionally, inner LSPs may be created within the outer LSP in which case the outer LSP label, inner LSP label and CID unqul idntf th voc. al the voice call.

uniquely identify

The VoMPLS control frame header is also 4 bytes in length. Control fames cannot be multiplexed and must be carried separately however the mandatory outer label and the optional inner label precede the control frame header fields in order to uniquely identify the voice call for which this control frame is sent. In the control frame, the Payload Type field distinguishes Pbetween dialed digits and the channel related signaling. Time Stamp is relative to the first randomized time stamp. The Redundancy field is very important to ensure the receipt of the control frames. If the Redundancy field is set to 0, 1, or 2, the control packet is repeated that many times. Another solution for VoMPLS reuses ATM Adaptation Layer 2 (AAL2) components but replaces ATM by MPLS [6,1 1], thus eliminating the ATM cell overhead. The MFA 5.0 implementation agreement proposes voice trunking over MPLS by

directly encapsulating AAL2 common part sublayer

(CPS) packets into MPLS (A2oMPLS). The gateway

to the MPLS network should be able to function as an AAL2 switch. Multiple A2oMPLS connections may be multiplexed into a single LSP. One MPLS frame may carry multiple CPS packets. The A2oMPLS sub-frames may be of different length but the maximum CPS packet payload length is restricted to between 45 octets to 64 octets. Like the MFA IAlO, the CID field in the CPS packet header allows up to 248 A2oMPLS connections to be multiplexed. Each A2oMPLS connection can be uniquely identified with outer label of the LSP, optional inner label and the CID value. When inner labels are

bits)

Figure 6: VoMPLS MFA 1 primary frame header fields VoMPLS primary frame header is 4 bytes long and includes 5 fields: > Channel Identifier uniquely identifies the voice channel that is the source of the payload. Thus, a total of 248 different voice calls can be multiplexed into a single LSP. Payload Type identifies the encoding scheme used as well as silence removal/insertion descriptors. A value equal to or above 224 indicates control payload (part of the control frame) that would allow DTMF (dual tone multi frequency) dialed digits as well as signaling for the channel to be carried [4]. > The revolving Counter field is set at the first sample or frame and keeps incrementing for each additional frame. > Payload Length is read in conjunction with the pad length to keep the payload a multiple of 4 bytes. Multiple primary frames may be multiplexed with the use of optional inner MPLS labels in addition to one mandatory outer MPLS label. Using CID, up to 248 voice calls can be aggregated. The payload of primary frame may consist of encoded audio data or SID (Silence Insertion Descriptor) parameters. Keeping the frames and header formats in perspective, the voice calls can be established as follows [4].

used the number of calls that are .

increases rapldly.

carried by

a single LSP

r

The following fields are included in the A2oMPLS header: Reserved (10 bits) currently ignored. > Length (6 bits) used for padding length. It is set to 0 if A2oMPLS packet length exceeds 64 bytes. > Sequence Number (S No) (16 bits) used if guaranteed ordered packet delivery is required. Sequence number of 0 indicates otherwise. The following fields are inside the CPS packet header; several CPS packets may be packed in one MPLS frame. > CID (8 bits) identifies the A2oMPLS connection carried. Thus a total of 248 connections (8 to 255) can be multiplexed into a single LSP. > LI (6 bits) identifies the length of the CPS packet. > UUI (5 bits) is used for user-to-user indication (0 to 27 for users, 30-31 for layer management, and bv 1rsre) L

28

HEC (5 bits) (header error control) uses CRC checksum. However, this field may not be used in feldmaynobeusei cheksu.'Hweer,thi the MPLS environment.

[8]

Industry is moving towards integration of phone system with the packet switching network. IMS is being developed to provide uniform interface for users from cellular, landline or wired systems. In wired and wireless packet based networks, MPLS can work with other protocols to guarantee the bandwidth needed for a voice call and provide fast protection switching. Voice can be deployed over MPLS using a variety of techniques that have been developed recently. In this paper, these techniques including VoIPoMPLS and VoMPLS are

[11] MFA. 2001. Voice over MPLS: Bearer Transport Implementation Agreement (MFA IA 1.0). MFA Forum. [12] MFA. 2003. Voice trunkingformat over MPLS. MPLS/FR 5.0.0. 1.366.2. MFA Forum. [13] ITU-T. 2002. Recommendation Y.1261. Service requirements and architecture for voice services over MPLS. [14] [14] MFA 2003A D. Sinicrope, A. Malis, MPLS PVC User to Network Interface, MPLS/FR Alliance 2.0.1, May 2003. [15] MFA 2004A MPLS Proxy Admission Control Protocol Implementation Agreement 7.0.0. [16] Fineberg V, 2004 (With Sinicrope D, Phelan T, Sherwin R and Garbin

discussed.

D) The MPLS UNI And End-to-End QOS. Business Communications

VoIPoMPLS deploys voice over the RTP/UDP/IP protocol stack, which uses MPLS tunnels. Since the number of protocols involved iS large, the control information equals or exceeds the payload. Most efficient method is to run voice directly over MPLS. VoMPLS is discussed in detail including

Review Dec 2004 Pages 27 - 32. [17] Fjellskal, E., and S. Solberg. 2002. IPEvaluation of Voice over MPLS (VoMPLS) compared to Voice over (VoIP) (Masters thesis, Agder Univ College).

Junaid Ahmed Zubairi received his BE (Electrical Engineering) from NED

University of Engineering, Pakistan and MS and Ph.D. (Computer Engineering) from Syracuse University, USA. He worked in Sir Syed

various proposals for enabling it in the network. VoMPLS is

well suited for multiplexing in the core and carrying the bulk of voice calls through the MPLS domain. The difference between MPLS and T-MPLS, a new ITU-T proposal for carrier networks, is highlighted. The MPLS UNI proposal presented in 2004 is outlined. Since the original proposal was not scalable, proxy admission

University Pakistan and Intl' Islamic University Malaysia before joining SUNY at Fredonia in 1999 where currently he is an Associate Professor in the Department of Computer Science. Dr. Zubairi is a recipient of many awards including Malaysian Government IRPA research award, National Science Foundation MACS award, SUNY Scholarly Incentive award and SUNY

Faculty Fellowship award. He has published several book chapters, journal

articles and conference papers in his areas of interest. His research interests include network applications, traffic engineering and performance evaluation of networks. He can be reached at junaid.zubairi fredonia.edu.

d control was introduced to pack new control LSPs intointrodu existing to

tunnels. With the introduction of IMS, many technologies would be integrated to allow exciting new features in packet voice. For example, transparent connectivity through landline and mobile networks would let the user continue the conversation while changing the connection from landline network to mobile network or vice versa. Since IMS is based on IPV6, the IMS adoption would be slow in parts of the world where IPV4 still runs the network. The VoP phones would be flexible and allow all the functionalities of current PSTN phones. Security of packet based phones and authentication of users poses new challenges that must be analyzed and resolved for widespread deployment. REFERENCES

[1] Teral, 2006 Service provider and enterprise IP telephony markets, Infonetics Research. 30 Aug 2006.

accessed Nov 4 2008 [2] Zubairi, J. 2008. Emerging Methods for Voice Transport over MPLS. Chapter in Taylor Francis Handbook of MPLS Technologies Dec 2008 [3] M. Hunter et. al. Security Issues with the IP Multimedia Subsystem (IMS) , Proc. Middleware Conference 2007, ACM. [4] Rosen, E. et al. 2001. Multiprotocol Label SwitchingArchitecture. RFC

[6] [7]

2008.

Barry, D. 2007. T-MPLS and PBTIPBB-TE offer connection-oriented packet transport. Lightwave May 2007 http://lw.pennnet.com.

[9] ITU-T 2006 Draft new Amendment 1 to G.81 10.1 Y.13 70.1, Nov 2006. [10] Lum, 2006 When Networks Collide: Putting the T into MPLS 2006 article FiberSystems.org online h accessed Nov 42008.

VI. CONCLUSION

[5]

ffic-engineering-for-Ethernet:-PBT-vs-T-MPLS/ accessed Nov 4

3031. Faucheur and Lai IETF RFC 4125, Maximum Allocation Bandwidth Constraints Modelfor Diffserv-aware MPLS Traffic Engineering 2005. Fineberg, V. 2003. QoS Support in MPLS networks. MFA Forum white paper Lunk, P 2008 Traffic engineering for Ethernet: PBT vs. T-MPLS Online LightWave article,

29

Lihat lebih banyak...

Comentários

Copyright © 2017 DADOSPDF Inc.