Você está na página 1de 97

Metanoia, Inc.

Critical Systems Thinking

Metro Ethernet: Understanding Key Underlying Technologies


Metanoia, Inc. consultants@metanoia-inc.com +1-888-641-0082 http://www.metanoia-inc.com
Copyright 2007 All Rights Reserved

Metanoia, Inc.
Critical Systems Thinking

Who is Metanoia, Inc.?


Specialty technology consultancy founded in mid-2001, with HQ in Mountain View, California Undertakes deep-dive technical consulting in telecom network, systems, software and chip architecture and design for clients across the world Services have spanned 4 continents, with clients in: North America, Europe, Asia, and Australia. Principals provided services in technology strategies, architecture and design trade-offs, product development, hardware/software architecture, and knowledge enhancement to organizations that include large equipment manufacturers, international, national and regional ISPs, premier metro/access systems startups, network planning tool vendors, established software and technology houses and leading component and semiconductor vendors Principals are technologists at the forefront of new developments, as leaders, creators, implementers, researchers, academics, strategists, and advisors in the US and abroad Expertise spans Layer 1 through Layer 4, and wireline (optical, Ethernet, IP/ATM, SONET/SDH) through wireless (Wi-Fi, cross-layer design, Wi-Max, cellular data, 2.5-3G) 125+ man years of technology design and development, and technology management experience, having worked at leading global corporations, such as Apple, AOL Time Warner, BBN, Cisco, 3Com, Fujitsu, LSI Logic, Motorola, Tellabs, Siemens, Nokia, Tibco, and Qualcomm, and having worked at/consulted to corporates in the US and abroad for almost the last decade 70+ patents collectively issued/pending Advanced graduate degrees from some of the most distinguished universities in the world the University of California, Stanford University, Iowa State University, the University of Texas, the University of Waterloo, and the Indian Institute of Technology
Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Copyright 2007 All Rights Reserved

Metanoia, Inc.
Critical Systems Thinking

Workshop Outline
Legacy networks & Ethernet over legacy networks
Value propositions and business drivers Ethernet over SDH/SONET

Metro Ethernet Forum (MEF)


MEF architecture

E-Line and E-LAN services

Native Ethernet as Carrier-class transport


Provider Bridges

Provider Backbone Bridges (PBB), Provider Backbone Transport (PBT)

MPLS an enabler for Ethernet services Layer 2 VPNs: VPWS, VPLS, H-VPLS Advanced concepts: traffic engineering, QoS, OAM, resilience

Conclusions
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Ethernet over Legacy Networks

Metanoia, Inc.
Critical Systems Thinking

Issues with Legacy Networks


Low bandwidth
No flexibility to scale High cost of installation Slow provisioning Bandwidth growth inflexible/non-linear
Limited by multiplexing hierarchy

TDM-based access: inefficient for converged data


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Next-Generation SDH
Customer Network
Central Office Switch Core Network
NG-SDH NG ADM

NG-SDH NG ADM

Ethernet

Customer Network

Cross Connect

STM/4/16 Ring
NG NG-SDH ADM

Ethernet

Customer Network

Customer Network
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Ethernet-over-SDH
Framing protocol
Encapsulates Ethernet frames in SDH payloads

Mapping of SDH payload to SDH channels


Virtual concat.: for allocation of non-contiguous VCs

Flow control mechanism


Avoids packet drops due to speed mismatch between SDH and

Ethernet

Mechanism to increase/decrease allocated SDH bandwidth


Add or remove VCs
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Ethernet-over-SDH (contd)
Very popular in carriers with installed base of SDH rings
E.g. BSNL in India

Good deployment choice when traffic primarily circuit

switched
Inefficient if major traffic is bursty packet-switched data
Solution: Carrier-class Ethernet!

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Metro Ethernet Value Propositions


Lower per-user provisioning costs
Technically simple relative to TDM ckts. Due to large installed base

Efficient and flexible transport


Wide range of speeds: 128 Kbps--10 Gbps QoS capabilities

Ease of inter-working
Plug-and-play feature

Ubiquitous adoption
The technology of choice in enterprise networks
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Ethernet Business Drivers


Business connectivity
Storage networks Data centers Video conferencing

Residential services
Triple-play services (IPTV)

On-line gaming
High-speed Internet access

Wireless backhaul
Reduced cost, complexity for mobile operators
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

10

Metanoia, Inc.
Critical Systems Thinking

Metro Ethernet Services

Metanoia, Inc.
Critical Systems Thinking

Metro Ethernet Forum (MEF)


Industry forum at forefront of Carrier Ethernet

standardization
Carrier Ethernet architecture Ethernet services Founded in 2001. Currently approx. 120 members

Technical Sub-committees
Architecture
Services Protocols and Transport Management

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

12

Metanoia, Inc.
Critical Systems Thinking

MEN Architectural Components


T S T S

End User

Customer Network

MEN

Customer Network

End User

End user Interface UNI Reference Point

End user Interface UNI Reference Point

Ethernet Virtual Connection End-to-End Ethernet Flow

Ethernet Flow
Unidirectional stream of Ethernet frames

UNI
Interface used to interconnect MEN subscriber to provider

EVC
Defines association between UNI for delivering Ethernet flow across MEN
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

13

Metanoia, Inc.
Critical Systems Thinking

MEN Layer Model


Application Service Layer
(IP, MPLS, PDH, E1/E3, SDH)

Ethernet Service Layer Transport Service Layer


(802.1, SONET/SDH, MPLS)

MEN Layer Model


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

14

Metanoia, Inc.
Critical Systems Thinking

MEF Services Definition Framework


Service Type
Construct used to create broad range of services

Service Attributes
Defines characteristics of a service type

Attribute Parameters
Set of parameters with various options

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

15

Metanoia, Inc.
Critical Systems Thinking

Service Types
E-Line
Point-to-point Ethernet Virtual
EVC1

Circuit (EVC)
EVC2

E-LAN
Multipoint-to-multipoint

Ethernet Virtual Circuit

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

16

Metanoia, Inc.
Critical Systems Thinking

Service Attributes
Physical Interface
Medium, speed, mode, MAC layer

Traffic Parameters CIR, CBS, PIR, MBS QoS Parameters


Availability, delay, jitter, loss

Service Multiplexing
Multiple instances of EVCs on a given physical I/F

Bundling
Multiple VLAN IDs (VID) mapped to single EVC at UNI
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

17

Metanoia, Inc.
Critical Systems Thinking

Ethernet Services
Ethernet Private Line (EPL)
Uses E-Line Does not allow service multiplexing High degree of transparency Low delay, delay variation, and packet loss ratio

Ethernet Virtual Private Line (EVPL)


Uses E-Line Allows for service multiplexing Need not provide full transparency

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

18

Metanoia, Inc.
Critical Systems Thinking

Service Types and Ethernet Services


Service Types

E-Line (p2p connectivity)

E-LAN (mp2mp connectivity)

Ethernet Private Line (E-line)

Ethernet Virtual Private Line (E-VPL)

Ethernet Private LAN (E-LAN)

Ethernet Virtual Private LAN (E-VPLAN)

Ethernet Services

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

19

Metanoia, Inc.
Critical Systems Thinking

Native Ethernet as Carrier-class Transport

Metanoia, Inc.
Critical Systems Thinking

Requirements for Carrier-class Ethernet


Scalability
Network should support millions of subscribers

Protection and restoration


50ms resilience

Quality-of-Service (QoS)
Ability to offer differentiated levels of service

Service Monitoring and Fault Management Support for TDM traffic


Seamless integration with legacy networks
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

21

Metanoia, Inc.
Critical Systems Thinking

Ethernet Ring
Ethernet Switch

Ethernet Switch Core Network 1/10 Gigabit Ethernet Ring

Ethernet Switch Ethernet

Customer Network

Ethernet Switch

Ethernet

Customer Network

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

22

Metanoia, Inc.
Critical Systems Thinking

Native Ethernet in Metro Access


How does one create the notion of a virtual circuit?
VLAN tagging with point-to-point VLAN

VLAN stacking
Outer tag service instance; Inner tag individual customer
802.1Q in 802.1Q (Q-in-Q) - IEEE 802.1ad
6bytes 6bytes 4bytes 4bytes 4bytes

C-DA

C-SA

S-TAG

C-TAG

Client data

FCS

C-DA: Customer Destination MAC C-SA: Customer Source MAC C-TAG: IEEE 802.1q VLAN Tag C-FCS: Customer FCS S-TAG: IEEE 802.1ad S-VLAN Tag
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

23

Provider Bridge (IEEE 802.1ad) Architecture


CES CE-A UNI-B CES CES Spanning tree UNI-C CE: Customer Equipment UNI: User-to-Network Interface CES: Core Ethernet Switch/Bridge P-VLAN: Provider VLAN
Copyright 2007 All Rights Reserved

Metanoia, Inc.
Critical Systems Thinking

CE-B

Customer Network
UNI-A

Customer Network

CE-C

Customer Network

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

24

Metanoia, Inc.
Critical Systems Thinking

Limitations of Provider Bridge Scalability


Limited to 4096 service instances

Core switches must all MAC addresses

Broadcast storms ensue due to learning

MAC address tables explode!

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

25

Metanoia, Inc.
Critical Systems Thinking

Provider Backbone Bridging (802.1ah)


Encapsulate customer MAC with provider MAC at edge
Edge switch adds 24-bit service tag (I-SID), not VLAN tag

Core switches need only learn edge switch MAC adds.

6bytes

6bytes

4bytes

5bytes

6bytes

6bytes

4bytes

4bytes

B-DA

B-SA

B-TAG

I-TAG

C-DA

C-SA

C-TAG

Client data

B-FCS

S-TAG: IEEE 802.1ad S-VLAN Tag B-DA: IEEE 802.1ah Backbone Destination B-SA: IEEE 802.1ah Backbone Source MAC I-TAG: IEEE 802.1ah Service Tag
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

26

Provider Backbone Bridging (PBB) Architecture


CPE A CPE B CPE C CPE A CPE B

Metanoia, Inc.
Critical Systems Thinking

CPE D

Provider backbone network (802.1ad)

802.1ad

Provider backbone network (802.1ad)

Provider backbone network (802.1ah)


Provider backbone network (802.1ad) 802.1q

Provider backbone network (802.1ad)

CPE C CPE B
Copyright 2007 All Rights Reserved

CPE B

CPE A CPE C

CPE D
27

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Benefits of PBB
Scalability
Addresses limitations of 4096 service instances

Robustness
Isolates provider network from broadcast storms

Security
Provider need switch frames only on provider addresses

Simplicity
Provider & customers can plan networks independently
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

28

Metanoia, Inc.
Critical Systems Thinking

Traffic Engineering in PBB


Via Multiple Spanning Tree Protocol (MSTP)
Maps a VLAN to ST or multiple VLANs to ST

Enables use of links that would otherwise be idle in ST


Eliminates wasted bandwidth but

Too slow for protection switching Not suitable for complex mesh topologies Difficult to predict QoS
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

29

Challenges with an All-Ethernet Metro Service


Restriction on # of customers 4096 VLANs!
Service monitoring Scaling of Layer 2 backbone Service provisioning
Carrying a VLAN is not a simple task!

Metanoia, Inc.
Critical Systems Thinking

Inter-working with legacy deployments

Need hybrid architectures Multiple L2 domains connected via IP/MPLS backbone


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

30

Metanoia, Inc.
Critical Systems Thinking

What Solutions do we Have?


Ethernet-based Architecture
Provider Bridge (802.1ad) in edge Provider Backbone Transport (PBT) in Core

Hybrid Architecture
802.1ad in the edge Multiprotocol Label Switching (MPLS) in core

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

31

Metanoia, Inc.
Critical Systems Thinking

Provider Backbone Transport (PBT)


Connection-oriented, traffic-engineered Ethernet tunnels
Replaces spanning tree control plane with either a:
Management plane

External control plane

No learning !
Forwarding info. provided by management plane

Forwarding done on MAC + VID (60-bit) address


VID is not network global; however, MAC + VID is B-MAC identifies destination B-VID identifies per-destination alternate paths

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

32

Metanoia, Inc.
Critical Systems Thinking

PBT Architecture
Central TE Module

PE1

PE2

Customer Network

Customer Network

SA : PE1 DA : PE2 VLAN 22

SA : PE1 DA : PE2 VLAN 33

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

33

Metanoia, Inc.
Critical Systems Thinking

Benefits of PBT
No learning
Eliminates undesirable broadcast storms Resolves MAC flooding problem Addresses scaling by forwarding on MAC + VID-highly scalable

Protection
Sets-up backup paths
50ms restoration possible

QoS support available

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

34

Metanoia, Inc.
Critical Systems Thinking

MPLS An Enabler for Ethernet Services: Fundamentals & Operations

Metanoia, Inc.
Critical Systems Thinking

Basic Concept of MPLS


DA Next hop router 129.89.10.x 198.168.7.6 179.69.x.x 198.168.7.6 N/w Int. 1 1
DA 129.89.10.x 179.69.x.x Next hop router 129.89.10.1 179.69.42.3 N/w Int. 1 2

Routing Table

128.89.10.x
In label
X X

Out label

Address Prefix N/w Int.

In label

Out label

Address Prefix N/w Int.

128.89.10.12
Label Table R3

3 4

128.89.10.x 179.69.x.x

1 1

3 4

5 7

128.89.10.x 179.69.x.x

1 2

1
R1

Advertises binding <5, 128.89.10.x>

R2

198.168.7.6 Advertises bindings <3, 128.89.10.x> <4, 179.69.x.x>

Advertises binding <7, 179.69.x.x> 179.69.x.x


R4

Routing fills routing table


Signaling fills label forwarding table
Copyright 2007 All Rights Reserved

179.69.42.3
36

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Basic Concept of MPLS


Pop label
Address Prefix N/w Int.

In label
X
X

Out label

Address Prefix N/w Int.

In label

Out label

Forward packet

3 4

128.89.10.x 179.69.x.x

1 1

3 4

5
7

128.89.10.x 179.69.x.x

1 2

128.89.10.x

128.89.10.12
R3

Swap Label
3 R1 3 Packet arrives DA=128.89.10.25 R3 Push Label

1
R2

198.168.7.6

179.69.x.x
R4

179.69.42.3
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

37

So what about MPLS Control and Forwarding?


Superset of conventional router control
Control Component

Metanoia, Inc.
Critical Systems Thinking

Distribute info. via n/w layer routing protocols (OSPF, BGP, etc.)
Algos. to convert routing info. into forwarding table:
Create binding from FEC label Assign & distribute labels to peer LSRs via signaling

Label switching forwarding table (or label information base LIB)


Incoming Label Map Incoming Label First Subentry Outgoing label Outgoing inf. Next hop address Second Subentry (for multicast or load balancing) Outgoing label Outgoing inf. Next hop address

Forwarding Component

Next hop label forwarding entry (NHFLE)

Forwarding algo = label swapping, independent of control component (implementable in optimized H/W or S/W)
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

38

What does a Label Represent? The Issue of Label Granularity


Packets form Forwarding Equivalence Class (FEC)
Treated identically by participating routers Assigned the same label

Metanoia, Inc.
Critical Systems Thinking

Membership in FEC must be determinable from IP header + other info. that

ingress router has about the packet


Entities that may be grouped into an FEC are flexible. E.g. FEC could be:
Connection between two IP ports on two hosts or between IP hosts
Traffic headed for a particular network with same TOS bits
All destination networks with a certain prefix Manually configured connection Traffic belonging to a customer or department VLAN Traffic of a given application voice, video, plain data, management traffic

and many others


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

39

Metanoia, Inc.
Critical Systems Thinking

Lets Recap: Elements of MPLS


Label Forwarding
Use data link addressing. E.g. ATM VPI/VCI, FR DLCI
Data Plane

Shim header between data link and IP header


Variable L2 header 4 bytes MPLS shim header
1 bit

20 bytes L3 IP header Higher Layers

Label 20 bits

EXP/ S CoS 3 bits

TTL 8 bits

Label Creation and Binding


Control Plane

Label Assignment and Distribution


Ride piggyback on routing protocols, where possible (BGP) Separate label distribution protocol RSVP, LDP

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

40

Primary Label Assignment and Distribution Modes


Edge LSR 1 Requests 2

Metanoia, Inc.
Critical Systems Thinking

6
5 4

Downstream-on-demand with Ordered Control

Assignments

Edge LSR

Edge LSR

Requests 2

Assignments

3 4

Downstream-on-demand with Independent Control


Copyright 2007 All Rights Reserved

Edge LSR
Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

41

Metanoia, Inc.
Critical Systems Thinking

Advantages of MPLS
Original justification
Availability of fast, amortized, ATM hardware; emergence of H/W forwarding engines has practically eliminated this

Current justifications
Separates forwarding from control, allowing
Routing functionality to evolve independently of forwarding algorithm

MPLS to control non-packet technologies: SONET/SDH ckts., lightpaths

Provides explicit, manageable IP routes


Enables policy routing and traffic engineering Offers TE for Ethernet tunnels in metro-Ethernet environments

Facilitates scalable hierarchical routing


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

42

Metanoia, Inc.
Critical Systems Thinking

The Utility of Hierarchical Label Switching


Edge LSRs

Swap Swap and Push

Core LSRs
Pop

Concept is similar to VLAN stacking in PBT we saw earlier


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

43

Metanoia, Inc.
Critical Systems Thinking

Hierarchical Label Stacking/Switching


Inside a transit AS, each core router must keep track of all

networks that might be reached through it


With hierarchical labels, only edge routers need know what

networks might eventually be reached through them


All transit traffic can be made to tunnel through core routers

using LSPs with stacked labels

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

44

Explicit Manageable Routes -- Policy routing, Traffic engineering


network engineering:
Keeps network loads balanced
Enhances network stability and reliability Enables better QoS and performance assurances Allows carriers to meet customer SLAs

Metanoia, Inc.
Critical Systems Thinking

Carriers want certain traffic to go over certain routes. Such

Constraint-based routing together with MPLS allows carriers to


Bind Ethernet tunnels to an LSP, Place (or route) LSP over the desired sequence of LSRs in the n/w

TE tunnels are helpful for VPLS-based carrier Ethernet n/ws

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

45

Metanoia, Inc.
Critical Systems Thinking

IP/MPLS-based Layer 2 VPNs

Metanoia, Inc.
Critical Systems Thinking

L2 VPN Components
VC LSP A PE1 Emulated LAN A

PE2

B AC

Routed backbone Emulated LAN B PE3

What does the P1-PE2 connection really look like?


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

47

Metanoia, Inc.
Critical Systems Thinking

L2 VPN Component Details

PW Signaling

From CE devices

PE1
5

PE2
PSN Tunnel
3

PWs

ACs

Routed backbone with P routers


4

Bridge Module

From CE devices Emulated LAN Instance

Forwarder

Emulated LAN Interface

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

48

Metanoia, Inc.
Critical Systems Thinking

VPLS Network Overview


LAN Service VSI

PW (full mesh)
VSI

VSI

CE

VSI

L3/MPLS Backbone

CE AC A
VSI

Tunnel (full mesh)

LAN Service

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

49

Metanoia, Inc.
Critical Systems Thinking

VPLS Protocols Involved


Control Ethernet Plane STP
MP-iBGP (PW) + RSVP-TE /LDP (tunnel) Targeted LDP (PW) + LDP (tunnel) Ethernet STP

PE CE

BGP/Targeted LDP

PE
LSP or PSN Tunnel

B B CE

Data Plane

Ethernet Ethernet or Ethernet in IP/ ATM/FR/SDH/ SONET

Ethernet/MPLS Ethernet/IPSec Ethernet/GRE

Ethernet Ethernet or Ethernet in IP/ ATM/FR/SDH/ SONET


50

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Operational Characteristics of VPLS


Operational Requirement
MAC address learning and switching, work with 802.1p/q tags and VLANs Flooding pkts. with unknowns broadcast, or multicast address

Realized Via
- VSI Forwarder - Bridge Module Frame replication on PWs

Provider edge signaling inform - Targeted LDP PE's to autoconfigure, and of - BGP membership, tunnelling VPLS membership discovery Inter-provider connectivity
Copyright 2007 All Rights Reserved

- BGP - Configuration Globally unique VPLS ID


51

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Data Plane: Flooding, Address Learning and Forwarding


Src. MAC = 09:10:01:45:00:AB
1

Metanoia, Inc.
Critical Systems Thinking

Dest. MAC = 08:00:69:02:01:FC


3
VSI

CE
VSI

?
PWs PE2

VSI

PE1 B

PE3 A
VSI

PE4
VSI

CE
3

All address unknown frames (unicast, multicast, broadcast) flooded over corresponding PWs to all relevant PEs only
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

52

Metanoia, Inc.
Critical Systems Thinking

Address Learning
Layer 2 reachability directly learned in data plane
Use standard learning bridge functions for local MACs PW-based association for remote MACs
Allow PE to determine from which physical port or LSP a given MAC

address came

VSI FIB keeps mapping between Ethernet MAC PW to use

Qualified Learning
- Each customer VLAN is its own VPLS instance - Has its own PW mesh and brdcast domain
Copyright 2007 All Rights Reserved

Unqualified Learning
- All customer VLANs are part of the same VPLS - One PW mesh and single brdcast domain
53

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Address Learning Example


2

Src. MAC = 08:AA:FC:01:10:DE (S1) Dest. MAC = FF:FF:FF:FF:FF:FF (D1) (broadcast)


4
VSI

CE i/f1
VSI

Inbound VC LSP Label = 1002


i/f1 PE1
3

i/f2

PE2

Local Learning

Outbound VC LSP Label = 2001

Dest. VC Tunnel Out I/F MAC Label

S1

1002

i/f1

PE3

Remote Learning

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

54

Metanoia, Inc.
Critical Systems Thinking

Forwarding and Encapsulation


Forwarding requires ability to
Dynamically learn MAC addresses on
Physical ports Pseudowire VCs (VC LSPs)

Forward/replicate pkts. across physical ports and VC LSPs

Encapsulation
PW header applied to Ethernet packet w/o preamble + FCS VLAN tag denoting customers VPLS instance can be stripped at

ingress, reapplied at egress

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

55

Tunnel and PW Topology and Loop Freedom


Dest. MAC = 08:00:69:02:01:FC
VSI

Metanoia, Inc.
Critical Systems Thinking

?
PE1

PW (full mesh) PE2

A
VSI

VSI

CE

VSI

B AC A Tunnel (full mesh)


VSI

CE

PE3

PE4

Full mesh of PW and tunnels deployed Tunnels


Help transport the PW payload Aggregate traffic from multiple PWs

Pseudowires demultiplex the L2 traffic traversing tunnels


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

56

Metanoia, Inc.
Critical Systems Thinking

Scaling VPLS: Hierarchical VPLS


Base VPLS requires full mesh of VC LSPs between PE routers Adequate for PE routers in CO multiple customers aggregated Inadequate for PE routers in MTU basements!
MTU PE MTU PE

MTU

MTU

PE

PE LSP explosion Operational nightmare!

PE MTU
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

57

Metanoia, Inc.
Critical Systems Thinking

Hierarchical VPLS Advantages


MTU PE Hub PE MTU PE

MTU

Core VC LSP mesh Spoke VCs (VLL or Q-in-Q)

MTU

PE

PE

Benefits
Simplifies signaling
PE MTU

Reduces pkt. replication Simplifies MTU Scalable inter-domain VPLS Simplifies new site addition

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

58

Hierarchical VPLS: Case Study for a Metro Region


100 MTUs; 10 customers/MTU; 2 VPLS/cust.; 100 stations/VPLS VPLSs/MTU = 10x2 = 20 MACs/MTU = 20x100 = 2000
MTU1 PE MTU 100 PE

Metanoia, Inc.
Critical Systems Thinking

MTU100 CE MTU1 CE

MTU91 CE

Hub PE

MTU90 CE

MTU2

MTU99

MTU10 CE

PE

PE

MTU81

PE

PE

CE PE

PE MTU3

PE MTU40

CE MTU31

CE MTU40

No hierarchy PE supports
2000 MACs LDP/BGP sessions = (100x99)/2 x 20 = 245,000
Copyright 2007 All Rights Reserved

Hierarchy (10 MTU/PE) PE supports


2000 x 10 = 20,000 MACs LDP/BGP sessions = (10x9)/2 x 200 = 9000 # of spoke VLLs = 10 x 20 = 200
59

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Benefits of IP/MPLS-based L2 VPNs


Separation of administrative responsibilities
Migration from traditional L2 VPNs: seamless transport of Ethernet

services
Privacy of routing Layer 3 independence Less operational overhead

Ease of configuration (?)


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

60

Metanoia, Inc.
Critical Systems Thinking

Advanced Features: Traffic Engineering, Resilience, OAM, QoS

Metanoia, Inc.
Critical Systems Thinking

Traffic Engineering Concepts

Copyright 2006 All Rights Reserved

Metanoia, Inc.
Critical Systems Thinking

Constraint Based Routing


A class of routing systems that computes routes through a

network subject to a set of constraints and requirements

QoS-based Routing
Path of flows determined by
Knowledge of resource availability in network QoS requirements of flows

Policy-based Routing
Path/routing decision based

on administrative policy

Can be on-line or off-line


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

63

Metanoia, Inc.
Critical Systems Thinking

CB Routing System
Inputs
Flow/path attributes:
Resources

required b/w, hop count, ...


Resource attributes:
Attributes

properties of nodes/links
Network topology & state

Topology

Constraint-Based Routing Process

Outputs
Computed feasible path Explicit route of the path
1 4 2
Copyright 2007 All Rights Reserved

Feasible Path ERO {1,3,4,5}


3 5

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

64

Metanoia, Inc.
Critical Systems Thinking

MPLS-based Resilience for the Metro

Copyright 2006 All Rights Reserved

Metanoia, Inc.
Critical Systems Thinking

Fundamental Characteristics of RSVP


Allows apps. to signal QoS requests to n/w, and n/w to respond

with success or failure


Designed to transport
Classification info. (Sender_Template)
Allows flows with specific QoS reqs. to be recognized

Traffic specs of source/sender (Tspec) QoS needs of receivers (Rspec)

Soft-state protocol
Path/Resv transmitted periodically to refresh reservation
Refresh Reduction [RFC2961] has practically eliminated original

scalability concerns with use of soft state


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

66

Metanoia, Inc.
Critical Systems Thinking

Basic Operation of RSVP-TE


Path (Label_Req)
A B C

Path (Label_Req)
D E

Resv Label=21

Resv Label=49

Resv Label=7

Resv Label=5

Path Message
RSVP Header SESSION SENDER_TEMPLATE SENDER_TSPEC LABEL_REQUEST ERO/RRO SESSION_ATTRIBUTE PHOP
Copyright 2007 All Rights Reserved

Resv Message
Application for which RSVP reservation is to be made Identifies pkts. of the sender Defines traffic output by sender Request for label on this hop Specific path to which flow is to be bound LSP attributes for this sender IP address of I/F that transmitted Path Msg.

RSVP Header SESSION STYLE LABEL RRO RSpec SENDER_TEMPLATE NHOP Flow Descriptor Same as that in Path Msg. Specifies senders that may use the reserved resources Label assigned to this hop Record route taken by Path QoS desired by receiver Flow for which QoS is desired IP address of I/F originating the Resv msg.
67

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Fast Re-Route (FRR) using RSVP-TE


Rerouting is done when
A better path is available Upon failure along LSP
Src

Metanoia, Inc.
Critical Systems Thinking

Originates LSPs with IDs 1 and 2 Here they are treated as different LSPs within the same Session
Rcvr

Use SESSION Obj. & SE style


Tunnel uniquely identified by
Destination IP address

LSP ID = L1

Tunnel ID in Session Obj

Tunnel ID
Ingress IP address

Tunnel ingress made to appear as 2 different senders to the RSVP session (via LSP ID)
Copyright 2007 All Rights Reserved

LSP ID = L2

On these links the LSPs share resources

LSPs 1 and 2 have a common SESSION Obj, but a new LSP ID in the SENDER_TEMPLATE and a different ERO (with possibly common hops)
68

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

TE with Constraint-based Routing in a Nutshell


Operator Input (Flow or LSP Attributes) Route Computation Process (on-line (CSPF) or offline) TED Resource Attributes

Metanoia, Inc.
Critical Systems Thinking

Enhanced IGP Process (OSPF-TE)

Output

Network Topology + State

Demand or Traffic driven LSP path selection

Computed feasible path (ERO)

Routing Table (RIB) Control driven route computation and LSP path selection

Signaling Process (RSVP-TE) CONTROL PLANE DATA PLANE LSP Establishment MPLS LSPs (Label Info. Base)
Copyright 2007 All Rights Reserved

Link State Database (LSDB)

Standard IGP Process (OSPF)

Link Attribute Modification Forwarding Info. Base (FIB)


69

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

How it All Fits Together


Last-mile Ethernet PBB clouds
CE3

LSP Tunnels
CE1

PE1

PE3

CE4

Pseudo-wires
PE2

IP/MPLS Core
CE2

Attachment circuits -- Physical (PDH/SDN) -- Logical (FR, ATM, VLANs, tunnels)


Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Copyright 2007 All Rights Reserved

70

Metanoia, Inc.
Critical Systems Thinking

OAM: The Traditional Achilles Heel of


Ethernet

Copyright 2006 All Rights Reserved

Metanoia, Inc.
Critical Systems Thinking

Why Ethernet OAM?


Current management protocols lack per-customer

granularity to handle Ethernet services


Most management protocols operate are point-to-point
Ethernet OAM can exploit multipoint capability

Link management required for last-mile connection


Similar to link mgt. in FR and ATM

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

72

Metanoia, Inc.
Critical Systems Thinking

Ethernet OAM Types


Service OAM
e2e connectivity and fault mgt. per service instance Part of IEEE 802.1ag, CFM project

Link OAM
Monitoring & fault mgt of individual Ethernet link (physical/emulated) Part of IEEE 802.3, Clause 57 (formerly 802.3ah (not to be confused

with 802.1ah))

Ethernet Local Mgt. Interface (E-LMI)


Configuration & operational provisioning of customer edge device Part of MEF Standard MEF-16

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

73

Metanoia, Inc.
Critical Systems Thinking

Service OAM
Works on per-EVC basis
Independent of underlying transport technology

CFM messages
Continuity Check Message
Detects loss of service connectivity

Link Trace Message


Traces the path hop-by-hop (like IP traceroute)

Loopback Message
Detects whether target point is reachable (like ICMP Ping)

AIS (Alarm Indication Signal) Message


Asynchronous notification to indicate fault
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

74

Metanoia, Inc.
Critical Systems Thinking

Link OAM
Discovery
Identifies devices at both ends of the link

Link Monitoring
Detects link faults
Statistics of packet errors

Remote Failure Indication


Conveys loss-of-signal indication to peers, due to poor SNR, power

failure, or other critical events

Remote Loopback
Determines quality of link during installation and troubleshooting
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

75

Metanoia, Inc.
Critical Systems Thinking

E-LMI
Provides local configuration & operational parameters to

customer edge
VLAN-EVC mapping QoS profiles of EVC

Reduces configuration errors, improves performance


Dynamic EVC management

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

76

Metanoia, Inc.
Critical Systems Thinking

Quality-of-Service: Ah! that elusive QoS

Copyright 2006 All Rights Reserved

MPLS and Quality-of-Service for Ethernet Services

Metanoia, Inc.
Critical Systems Thinking

MPLS supports (not extends) a packet-based QoS model

MPLS does not run in hosts (only in metro/core routers)


QoS, however, is an end-to-end mechanism

MPLS helps carriers offer QoS-enabled services efficiently


Can support MEF QoS model via DiffServ QoS framework

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

78

Metanoia, Inc.
Critical Systems Thinking

Differentiated Services Framework


Traffic flows aggregated into small # of classes
Drop Precedence Class Priority EF AF1x AF2x AF3x AF4x 3 2 1 BE DSCP 101110 001xx0 01xx10 11xx10 1xxx10

Per-flow state is not required

More scalable than IntServ


Class encoded in IP header via DiffServ Code Point (DSCP) Edge router
Classifies packets to DifServ classes

Best Effort (BE) Expedited Forwarding (EF)


Minimal delay & loss

Assured Forwarding (AF)


4 classes 3 drop precedences each

DSCP identifies Per Hop Behavior (PHB)


Copyright 2007 All Rights Reserved

12 possibilities total
79

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

Differentiated Services Architecture


Diffserv Domain

Edge Functions
Traffic Conditioning Meter

Core Functions
EF

Colored packet (marked DSCP)


AF Aggregate PHBs

Strict Priority

Classifier

Marker

Shaper

BE WFQ Queueing

Scheduling

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

80

MPLS Support of DiffServ: Mapping DSCPs to LSPs (or labels)


Map DSCP EXP bits in MPLS shim header
6 DS bits (64 PHBs) and only 3 EXP bits (8 classes)! Complete mapping is infeasible For many practical cases, 8 PHBs may suffice

Metanoia, Inc.
Critical Systems Thinking

IP Header
6 bits DSCP DSCP DS byte

MPLS shim header

Label

EXP

TTL

3 bits

Results in an LSP called an E-LSP

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

81

MPLS Support of DiffServ: Mapping DSCPs to LSPs (or labels)


Map {PHB, FEC} MPLS Label
That is, provide the info. in the label itself! Requires enhancing the label distribution protocols Use EXP bits for drop precedence
That is to determine different PHBs of a PHB scheduling class

Metanoia, Inc.
Critical Systems Thinking

6 bits
DSCP DSCP

DS class: EF, AFx


Label

DS class drop precedence


EXP S TTL

DS byte IP Header

3 bits MPLS shim header

Results in an LSP called an L-LSP


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

82

Metanoia, Inc.
Critical Systems Thinking

Conclusions and Discussion

Metanoia, Inc.
Critical Systems Thinking

Conclusions
Ethernet poised to be dominant choice in metro networks
Reduces capex and opex for providers Enables new revenue generating services

802.1ad provider bridge with OAM of 802.1ag


a choice at the edge

Two architectures emerging for Ethernet in the metro core


Provider Backbone Transport (PBT) IP/MPLS-based L2 VPNs

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

84

Metanoia, Inc.
Critical Systems Thinking

Thank You! Questions?

Metanoia, Inc.
Critical Systems Thinking

Glossary
AC
ACL AF API

Attachment Circuit
Access Control List Assured Forwarding Application Programming Interface

DS

DiffServ

DSCP
EF E-LMI

DiffServ Code Point


Expedited Forwarding Ethernet-Local Management Interface

AS
ATM BA B-DA

Autonomous System
Asynchronous Transfer Mode Behavior Aggregate Backbone Destination Address

E-LSP
EPL ERO E-UNI EVC EVPL EXP EXP FCS FEC FIB

EXP mapped LSP


Ethernet Private Line Explicit Route Object Ethernet UNI Ethernet Virtual Circuit Ethernet Virtual Private Line Experimental (EXP bits in MPLS "shim" header) Experimental Bits Frame Check Sequence Forwarding Equivalence Class Forwarding Information Base

B-DA
BE B-FCS BGP

Backbone Source Address


Best Effort Backbone Frame Check Sequence Border Gateway Protocol

CBS
CE CES CFM

Committed Burst Size


Customer Edge (router) Core Ethernet Switch/Bridge

CIR
CO DA DS
Copyright 2007 All Rights Reserved

Committed Information Rate


Central Office Destination Address DiffServ

FR
GR H-QoS H-VPLS IPTV

Frame Relay
Graceful Restart Hierarchical Quality-of-Service Hierarchical VPLS IP Television

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

86

Metanoia, Inc.
Critical Systems Thinking

Glossary
L2 L3 LAN LDP LER LIB L-LSP LSP LSR MAC MBS MEF MEN MPLS MSTP MTU NG NGN NNI OAM
Copyright 2007 All Rights Reserved

Layer 2 (Data Link Layer; MAC Layer) Layer 3 (Network or IP Layer) Local Area Network Label Distribution Protocol Label Edge Router Label Information Base Label inferred LSP Label Switched Path Label Switching Router Medium Access Control Maximum Burst Size Metro Ethernet Forum Metro Ethernet Architecture Multi-Protocol Label Switching Multiple Shortest Path Tree Multi-Tenant Unit Next Generation Next-Generation Network Network Network Interface Operations, Administration, and Management

OSPF
P PB PBB PBT PDH PE PHB PIR PSN P-VLAN PW QoS RIB RSTP

Open Shortest Path First


Provider (router) Provider Bridging Provider Backbone Bridging Provider Backbone Transport Pleisosynchronous Digital Hierarchy Provider Edge (router) Per Hop Behavior Peak Information Rate Packet Switching Network Provider VLAN Pseudo-Wire Quality-of-Service Routing Information Base Rapid Spanning Tree Protocol Resource Reservation Protocol - Traffic Engineering (RSVP protocol with MPLS traffic engineering extensions) Source Address Synchronous Digital Hierarchy Synchronous Optical Network

RSVP-TE SA SDH SONET

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

87

Metanoia, Inc.
Critical Systems Thinking

Glossary
SPT ST STP TDM TE TM TTL UNI VCI VFI VID VLAN VLAN VOQ VPI VPLS VPN VPWS VR Shortest Path Tree Spanning Tree Protocol Spanning Tree Protocol Time-Division Multiplexing Traffic Engineering Traffic Management Time to Live User Network Interface Virtual Circuit Identifier Virtual Forwarding Instance VLAN Identifier Virtual LAN Virtual LAN Virtual Output Queue Virtual Path Identifier Virtual Private LAN Service Virtual Private Network Virtual Private Wire Service Virtual Router VRF VSI WFQ Virtual Routing and Forwarding Virtual Switching Instance Weighted Fair Queuing

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

88

Metanoia, Inc.
Critical Systems Thinking

Readings and References (1)


MEF 4: Metro Ethernet Network Architecture Framework Part 1 Generic Framework
MEF 6: Metro Ethernet Services Definition Phase 1

MEF 10.1: Metro Ethernet Services Attributes Phase 2


MEF 16: Ethernet Local Management Interface IEEE 802.1d/q WG: Media Access Control (MAC) Bridges, IEEE 1998 IEEE 802.1s, Multiple Spanning Tree, IEEE 2002 IEEE 802.1ah, Provider Backbone Bridges, Work in Progress Documents on the MEF and IEEE 802.1 and 802.3 WG web sites
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

89

Metanoia, Inc.
Critical Systems Thinking

Readings and References (2)

L. Andersson and E. Rosen, Framework for Layer 2 Virtual Private Networks (L2VPNs), RFC 4664, September 2006
K. Kompella and Y. Rekhter, Eds., Virtual Private LAN Service: Using BGP for Autodiscovery and Signaling, RFC 4761, January 2007 V. Kompella and M. Lasserre, Eds., Virtual Private LAN Service: Using Label Distribution Protocol for Signaling, RFC 4762, January 2007 S. Bryant and P. Pate, Eds. Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture, RFC 3985, March 2005 L. Martini et al, Eds., Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP), RFC 4447, April 2006 Documents on the L2 VPN, PWE3, MPLS, and CCAMP WGs of the IETF
Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Copyright 2007 All Rights Reserved

90

Metanoia, Inc.
Critical Systems Thinking

Additional Slides

Label Assignment and Distribution (control component)


Data Labels Labels

Metanoia, Inc.
Critical Systems Thinking

Data

Direction from which labels flow

Downstream Solicited (On Demand) Unsolicited Solicited (On Demand) Unsolicited

Upstream Solicited Unsolicited Solicited Unsolicited

Ordered Independent
Whether LSR waits to hear from its upstream/downstream nbrs. before responding to a request for label(s)

Refers to whether LSR distributes labels on demand or voluntarily

Label Retention: Liberal or Conservative


Whether LSR keeps labels from a neighbor who is not currently the next hop for a FEC
Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

92

Metanoia, Inc.
Critical Systems Thinking

A Word on Reservation Styles


Always chosen by the receiver
S1 Unique label/sender Distinct reservation per sender

Two styles apply with RSVP-TE


Fixed Filter (FF)
Distinct reservation for traffic
S2

from each sender


Needs unique label per sender
S1

Link (i,j)

S3
Common reservation shared by all senders

Shared Explicit (SE)


Common resvn. for traffic from

the senders specified by rcvr.


May assign unique label/sender Useful for p2p or mp2p LSPs
S2

Link (i,j) Different senders may have different labels

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

S3

93

Metanoia, Inc.
Critical Systems Thinking

LDP versus BGP Signaling


PE PE Targeted LDP
i-BGP PE PE

PE

PE

PE

RR

PE

PE

PE

Targeted LDP

BGP-based Signaling
RRs reduce full mesh to 2 sessions/PE Cannot direct label mapping to a specific peer need label ranges

LDP session full mesh b/ween PEs


PEs exchange labels directly New PE reconfig. mesh at all PEs FIB per VPLS per PE
Copyright 2007 All Rights Reserved

New PE peering session only w/ RRs


94

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

L2 VPNS with BGP


Autodiscovery + signaling, together via BGP with RTs (per slide 74)
PE configured with its VPLS ID (if VPLS) Transmits VPLD ID or identity of attached CEs to peer PEs Includes demux value for each BGP NLRI (as a label range) Selection algorithm allows each remote PE to pick correct label for

sending traffic to advertising PE BGP NLRI for VPLS


Length (2 octets) RD (8 octets) VE ID (2 octets) VE Block Offset (2 octets) VE Block size (2 octets) Label Base (3 octets)
Copyright 2007 All Rights Reserved

BGP NLRI for L2 VPN


Length (2 octets) RD (8 octets) CE ID (2 octets) Label blk offset (2 octets) Label Base (3 octets) Circuit Status Vector
95

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

Metanoia, Inc.
Critical Systems Thinking

BGP-based L2 VPN (VPWS)


DLCI=[11,12,, 30] DLCI=[101, 102, , 120] 11
CE1 CE3

Label block offset=0 Label base = 3000 Label range = 20

103 1003

12
CE4

Label block offset=0 Label base = 1000 Label range = 20

PE1 2003 PE2

3001

PE3

3002 IP/MPLS Core

Label block offset=0 Label base = 2000 Label range = 20

CE2

403

DLCI=[401, 402, , 420]


Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

96

Metanoia, Inc.
Critical Systems Thinking

BGP-based L2 VPN (VPLS)


CE3

Label block offset=0 Label block size = 10 Label base = 3000

CE1

3001 PE1 3002 PE2 IP/MPLS Core PE3

CE4

VE ID = 3

CE2

Copyright 2007 All Rights Reserved

Next-Generation Systems & Networks Workshop, 17th July. 2007, Bangalore, India

97

Você também pode gostar