|
|
This chapter describes tag switching, a high-performance, packet-forwarding technology developed by Cisco Systems. Tag switching combines the benefits of routing with the performance of switching.
This chapter includes the following sections:
Tag switching provides additional benefits in the areas of functionality, scalability, traffic management, and flexibility for service providers. For example, tag switching offers a flexible and scalable method to provide virtual private network (VPN) services with QoS. The traffic engineering features of tag switching are useful for managing traffic and link utilization in a routed network. Finally, tag switching's ability to integrate ATM and IP technology is of interest to those who want to use an ATM backbone to build a multiservice network.
The Internet Engineering Task Force (IETF) is developing a standard for tag switching based on Cisco's technology. The IETF term for its tag switching standard is Multiprotocol Label Switching (MPLS).
A tag switching network consists of two types of devices, tag edge routers and tag switches (see Figure 11-1).

Tag edge routers use standard routing protocols to create routing tables, which identify routes through the network. Based on the routing tables, tag edge routers use the Tag Distribution Protocol (TDP) to apply and distribute tags to other tag edge routers or tag switches.
Tag switches receive TDP information from the tag edge routers and build their own forwarding database. Tag switches then switch the packets based on the tags only (VPI/VCI in the case of ATM), without looking at the Layer 3 header.
Tag switching utilizes three types of information bases for storing and retrieving forwarding information:
In a tag switching network, the Layer 3 header is analyzed just once. It is then mapped into a short fixed-length tag. At each hop, the forwarding decision is made by looking only at the value of the tag. There is no need to reanalyze the Layer 3 header. Because the tag is a fixed-length, unstructured value, lookup is fast and simple.
Figure 11-2 illustrates the operation of a tag switching network.

When a tag edge router at the entry point of a tag switching network receives a packet for forwarding, the following process occurs:
1. Tag edge routers and tag switches use standard routing protocols to identify routes through the network. This routing information is summarized in the FIB.
2. Tag switches use the tables generated by the standard routing protocols to assign and distribute tag information using TDP. Tag switches receive TDP information and build the TFIB that makes use of the tags.
3. When a tag edge router receives a packet for forwarding across the network, it does the following:
(a) Analyzes the network-layer header
(b) Performs applicable network-layer services
(c) Selects a route for the packet from its routing tables
(d) Applies a tag and forwards the packet to the next-hop tag switch
4. The tag switch receives the tagged packet and switches the packet based solely on the tag, without reanalyzing the network-layer header.
5. The packet reaches the tag edge router at the egress point of the network, where the tag is stripped off and the packet delivered.
Because both tag switching and ATM switching forward traffic based on label swapping, tag switching can readily be applied to ATM switching environments. In addition, ATM switches can use tag switching and still perform ATM Forum standard User-to-Network (UNI) signaling and Private Network-to-Network (PNNI) routing functions.
Advantages of implementing tag switching in an ATM network include the following:
Limitations of tag switching include the following:
Tag switching on the ATM switch router has the following software restrictions:
Step 1 Configure a loopback interface.
Step 2 Enable tag switching on the ATM interface.
Step 3 Configure OSPF.
Step 4 Configure a VPI range (optional).
Step 5 Configure TDP control channel (optional).
Step 6 Configure tag switching on VP tunnels.
Step 7 Configure VC merge (optional).
Step 8 Configure CoS.
Configuring the loopback interface requires the following steps:
Step 1 Enter interface configuration mode and assign a number to the loopback interface.
Step 2 Assign an IP address and subnet mask to the loopback interface.
Enabling tag switching on the ATM interface requires the following steps:
Step 1 Select the ATM interface to configure and enter interface configuration mode.
Step 2 Do one of the following:
(a) Enable IP unnumbered on the ATM interface and assign the unnumbered interface to an interface that has an IP address. This is the recommended method. It allows you to conserve IP addresses and reduces the number of tag virtual channels (TVCs) terminating on the switch.
(b) Assign an IP address and subnet mask to the ATM interface.
All parallel interfaces between ATM switch routers should be configured with the same method.
Step 3 Enable tag switching of IPv4 packets on the interface.
Configuring OSPF requires the following steps:
Step 1 Enable OSPF and assign it a process number.
Step 2 Define the network prefix, a wildcard subnet mask, and the associated area number on which to run OSPF.
Repeat this step for each additional area you want to add to the OSPF process.
You might need to change the default tag virtual path identifier (VPI) range on the switch if:
For an overview of configuring VPI ranges, refer to the "VPI/VCI Ranges for SVCs" section in the chapter "Virtual Connections."
Figure 11-3 shows an example TDP control channel configuration between a source switch and destination switch on ATM interface 0/0/1. Note that the VPI and VCI values match on the source switch and destination switch.

Changing the TDP control channel requires the following steps:
Step 1 Select the interface to configure and enter interface configuration mode.
Step 2 Specify the new VPI and VCI values for the new TDP control channel configuration.
You can configure tag switching on VP tunnels. To do so, you must first configure the VP tunnel on the source and destination switch, then connect the VP tunnel at the intermediate switch. VP tunnels are described in the "VP Tunnels" section in the chapter "Virtual Connections."
Figure 11-4 shows an example VP tunnel between a source switch and destination switch.

Configuring tag switching on a VP tunnel requires the following steps:
Step 1 Select the interface to configure and enter interface configuration mode.
Step 2 Create a PVP with a VPI value.
Step 3 Select the interface and subinterface you specified in the previous steps.
Step 4 Enable IP unnumbered or assign an IP address and subnet mask to the subinterface, as described in Step 2 in the "Tag Switching on the ATM Interface" section.
Step 5 Enable tag switching of IPv4 packets on the interface.
Repeat these steps on the ATM switch router at the other end of the VP tunnel.
To complete the VP tunnel, you must configure the ATM ports on the intermediate switch to designate where to send packets coming from the source switch and going to the
destination switch.
Figure 11-5 shows an example configuration on an intermediate switch.

Configuring the cross-connect in the intermediate switch requires the following steps:
Step 1 Select one of the interfaces and enter interface configuration mode.
Step 2 Connect the PVP from the source switch to the destination switch by specifying the PVP on this interface, the number of the opposite interface, and the PVP to use on that end.
Virtual connection (VC) merge allows the switch to aggregate multiple incoming flows with the same destination address into a single outgoing flow. Where VC merge occurs, several incoming tags are mapped to one single outgoing tag. Cells from different VCIs going to the same destination are transmitted to the same outgoing virtual connection using multipoint-to-point connections. This sharing of tags reduces the total number of virtual connections required for tag switching. Without VC merge, each source-destination prefix pair consumes one tag virtual connection on each interface along the path. VC merge reduces the tag space shortage by sharing tags for different flows with the same destination.
Figure 11-6 shows an example of VC merge. In Figure 11-6, routers A and B are sending traffic to prefix 171.69.0.0/16 on router C. The ATM switch router in the middle is configured with a single outbound VCI 50 bound to prefix 171.69.0.0/16. Data flows from routers A and B congregate in the ATM switch router and share the same outgoing virtual connection. Cells coming from VCIs 40 and 90 are buffered in the input queues of the ATM switch router until complete AAL5 frames are received. The complete frame is then forwarded to router C on VCI 50.

VC merge is enabled by default on the ATM switch router. No manual configuration is required for it to work.
Class of service (CoS) is supported for tag switching on the ATM switch router. For related information on ATM QoS classes, see "Traffic and Resource Management."
With tag switching CoS, tag switching can dynamically set up a maximum of four TVCs with different service categories between a source and destination. TVCs do not share the same QoS classes reserved for ATM Forum VCs (VBR-RT, VBR-NRT, ABR, and UBR). The following four new service classes were created for TVCs: TBR_1 (WRR_1), TBR_2 (WRR_2), TBR_3 (WRR_3), and TBR_4 (WRR_4). These new service classes are called Tag Bit Rate (TBR) classes. TVCs and ATM Forum VCs can only coexist on the same physical interface, but they operate ships in the night mode (SIN) and are unaware of each other.
TBR classes support only best-effort VCs (similar to the ATM Forum service category UBR); therefore, there is no bandwidth guarantee from the rate scheduler (RS) for TVCs. All of the TVCs fall into one of the four TBR classes, which each carry a different default relative weight. The default values of the relative weights for the four TBR classes are configurable so that you can change the priority of the default values.
Table 11-1 shows the TBR classes and ATM Forum class mappings into the service classes for physical ports.
| TBR Class | Service Class | Relative Weight |
|---|---|---|
TBR_1 (WRR_1) | 1 | 1 |
TBR_2 (WRR_2) | 6 | 2 |
TBR_3 (WRR_3) | 7 | 3 |
TBR_4 (WRR_4) | 8 | 4 |
| ATM Forum Service Category | Service Class | Relative Weight |
VBR-RT | 2 | 15 |
VBR-NRT | 3 | 2 |
ABR | 4 | 2 |
UBR | 5 | 2 |
Table 11-2 lists the mapping of ATM Forum service categories and TBR classes for hierarchical VP tunnels.
| TBR Class | Service Class | Relative Weight |
|---|---|---|
TBR_1 (WRR_1) | 1 | 1 |
TBR_2 (WRR_2) | 2 | 2 |
TBR_3 (WRR_3) | 3 | 3 |
TBR_4 (WRR_4) | 4 | 4 |
| ATM Forum Service Category | | |
VBR-RT | 1 | 15 |
VBR-NRT | 2 | 2 |
ABR | 3 | 2 |
UBR | 4 | 2 |
Each service class is assigned a relative weight. These weights are configurable, and range from 1 to 15. Configuring the service class and relative weight requires the following steps:
Step 1 Select the interface to configure and enter interface configuration mode.
Step 2 Enter the service class and relative weight for the interface.
The number of threshold groups available on the ATM switch router is platform dependent. For details, refer to the ATM Switch Router Software Configuration Guide.
Each threshold group has a set of eight regions, and each region has a set of thresholds. When these thresholds are exceeded, cells are dropped to maintain the integrity of the shared memory resource.
Each ATM Forum service category is mapped into a distinct threshold group. All the connections in a particular service category map into one threshold group. Similarly, all the TBR classes have best effort traffic; the service differentiation comes mainly by assigning different weights. Each of the TBR classes map into four different threshold groups whose parameters are the same as the UBR threshold group.
Table 11-3 shows the threshold group parameters mapped to the connections in all of the TBR classes for the ATM switch router.
| Group | Maximum Cells | Maximum Queue Limit | Minimum Queue Limit | Mark Threshold | Discard Threshold | Use |
|---|---|---|---|---|---|---|
7 | 131071 | 511 | 31 | 25% | 87% | TBR_1 (WRR_1) |
8 | 131071 | 511 | 31 | 25% | 87% | TBR_2 (WRR_2) |
9 | 131071 | 511 | 31 | 25% | 87% | TBR_3 (WRR_3) |
10 | 131071 | 511 | 31 | 25% | 87% | TBR_3 (WRR_4) |
Each threshold group is divided into eight regions. Each region has a set of thresholds which are calculated from the corresponding threshold group parameters given in Table 11-3. The threshold group might be in any one of the regions depending on the fill level (cell occupancy) of that group. And that region is used to derive the set of thresholds which apply to all the connections in that group.
Table 11-4 gives the eight thresholds for threshold groups 6, 7, 8, and 9.
| Region | Lower Limit | Upper Limit | Queue Limit | Marking Threshold | Discard Threshold |
|---|---|---|---|---|---|
0 | 0 | 8191 | 511 | 127 | 447 |
1 | 8128 | 16383 | 255 | 63 | 223 |
2 | 16320 | 24575 | 127 | 31 | 111 |
3 | 24512 | 32767 | 63 | 15 | 63 |
4 | 32704 | 40959 | 31 | 15 | 31 |
5 | 40896 | 49151 | 31 | 15 | 31 |
6 | 49088 | 57343 | 31 | 15 | 31 |
7 | 57280 | 65535 | 31 | 15 | 31 |
For more information about threshold groups, see the "Threshold Groups" section in the chapter "Traffic and Resource Management."
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon May 8 19:21:44 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.