We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAllyson Guppy
Modified about 1 year ago
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Reference Model and Terminology Data Center 1 DCS1 DCS2 DCB1 Data Center 3 DCB3 DCS8 Data Center 2 DCS4 DCS5 Data Center 4 DCB4/DCS9 DCB2 DC: Data Center DCS: Data center switch Connected to Servers/VMs DCB: Data center border router Could be co-located with DCS “WAN” provides interconnect among DCs, and between DCs and Client Site BR Client site Client Site BR “WAN”
3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Data Center Interconnect: Layer 2 Extension Data Center 1 DCS1 DCS2 DCB1 Data Center 3 DCB3 DCS8 Data Center 2 DCS4 DCS5 Data Center 4 DCB4/DCS9 DCB2 Client site Client Site BR “WAN” VM1 VM3 VM2 VM4 VM5 VM6 VM7 VM8 VLAN1 (subnet1) stretches between DC1, DC2, DC3 and DC4 VLAN2 (subnet2) is present only on DCS1 VLAN3 (subnet3) stretches between DC1 and DC2 VLAN stretch is required for cloud computing “resource fungibility”, redundancy etc. Communication between VMs on different VLANs/subnets and between clients and the VMs requires layer 3 routing
4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net BGP-MPLS E-VPNs for Data Center Interconnect BGP-MPLS based technology, one application of which is data center interconnect between data center switches for intra-VLAN forwarding i.e., layer 2 extension Why? Not all data center interconnect layer 2 extension requirements are satisfied by existing MPLS technology such as VPLS E.g., minimizing flooding, active-active points of attachment, fast edge protection, scale, etc. How? Reuses several building blocks from existing BGP-MPLS technologies Requires extensions to existing BGP-MPLS technologies Draft-raggarwa-sajassi-l2vpn-evpn-01.txt Being pursued in the L2VPN WG
5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net E-VPN Reference Model MES 1 Ethernet Switch-B3 MES 3 MES 2 MES 4 VPN A Host -A1 Host-B1 Host-A4 Host-A3 VPN B VPN A VPN B EFI-A EFI-B VPN A EFI-A RR Host –A5 MES - MPLS Edge Switch; EFI – E-VPN Forwarding Instance; ESI – Ethernet Segment Identifier (e.g., LAG identifier) MESes are connected by an IP/MPLS infrastructure Transport may be provided by MPLS P2P or MP2P LSPs and optionally P2MP/MP2MP LSPs for “multicast” Transport may be also be provided by IP/GRE Tunnels ESI 1, VLAN1 ESI 2, VLAN2 ESI 3, VLAN1 ESI 4, VLAN2 ESI 5, VLAN1 ESI 1, VLAN1
6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Relating EVPN Reference Model to Data Center Interconnect Reference Model Data Center 1 DCS1 DCS2 DCB1 Data Center 3 DCB3 DCS8 Data Center 2 DCS4 DCS5 Data Center 4 DCB4/DCS9 DCB2 “WAN” DCSes may act as MPLS Edge Switches (MES) DCSes may interconnect with DCBs using E-VPN DCSes are connected to hosts i.e., VMs DCBs must participate in E-VPN although they may perform only MPLS switching WAN routers may or may not participate in E-VPN Following slides will describe an overview of E-VPN and then apply E- VPN to data center interconnect
7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net E-VPN Local MAC Address Learning A MES must support local data plane learning using vanilla ethernet learning procedures When a CE generates a data plane packet such as an ARP request MESes may learn the MAC addresses of hosts in the control plane using extensions to protocols that run between the MES and the hosts MESes may learn the MAC addresses of hosts in the management plane
8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net E-VPN Remote MAC Address Learning E-VPN introduces the ability for an MES to advertise locally learned MAC addresses in BGP to other MESes, using principles borrowed from IP VPNs E-VPN requires an MES to learn the MAC addresses of CEs connected to other MESes in the control plane using BGP Remote MAC addresses are not learned in the data plane
9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Remote MAC Address Learning in the BGP Control Plane Architectural Benefits Increases the scale of MAC addresses and VLANs supported BGP capabilities such as constrained distribution, Route Reflectors, inter-AS etc., are reused Allows hosts to connect to multiple active points of attachment Improves convergence in the event of certain network failures Allow hosts to relocate within the same subnet without requiring renumbering Minimizes flooding of unknown unicast packets Minimizes flooding of ARP Rest of the presentation will focus on this Control over which MAC addresses are learned by which devices Simplifies operations; enables flexible topologies etc.
10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: Approach Minimize the radius of ARP request/response propagation Minimize the propagation radius of ARP request from a server/Virtual Machine In the switching infrastructure in the data center Across data centers Respond to an ARP request from a server/VM as close to the server/VM as possible Requires a number of components See the following slide
11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: Proxy ARP A network node as close to the server/VM, as possible, performs “Proxy ARP” in response to ARP requests from the server/VM The network node should ideally be the DCS Which MAC address does the network node use to respond to the ARP request? The answer depends on the forwarding paradigm used by the node to forward packets within the VLAN MAC lookup based forwarding within the VLAN/subnet –The solution in the following slides focuses on this IP address based forwarding within the VLAN/subnet –Not discussed in the following slides
12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: The Role of E- VPN (1) When MAC lookup based forwarding is used within a VLAN/subnet MESes perform Proxy ARP An MES responds to an ARP request, for an IP address, with the MAC address bound to the IP address When the destination is in the same subnet as the sender of the ARP request The ARP request is not forwarded to other MESes
13 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: The Role of E- VPN (2) How does the MES learn the IP address bound to the MAC address when the MAC address is remote? BGP MAC routes carry the IP address bound to the MAC address How does an MES learn the IP to MAC binding when the MAC address is local? Control or management plane between MES and CEs or data plane snooping An MES advertises the local IP to MAC bindings in the MAC routes
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS Concepts Identifying MPLS Applications.
Virtual Links: VLANs and Tunneling CS 4251: Computer Networking II Nick Feamster Spring 2008.
Network Services for Enhanced Cloud Computing T. V. Lakshman Bell Labs (Jointly with F. Hao, S. Mukherjee, H. Song)
NSI wg Architecture Elements John Vollbrecht Internet2.
Copyright © 2005 Rockwell Automation, Inc. All rights reserved. Ethernet Switch Features Important to EtherNet/IP.
NEW OUTLOOK ON MULTI-DOMAIN AND MULTI-LAYER TRAFFIC ENGINEERING Adrian Farrel
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Lecture 6: Internetworking Principles. Part 1 – Internetworking: The term internetworking describes the connecting of separate networks possibly based.
1 Introducing the Specifications of the Metro Ethernet Forum.
3-1 Design Principles Goals: r identify, study common architectural components, protocol mechanisms r what approaches do we find in network architectures?
History of VPLS at IETF Ali Sajassi November 12, 2002.
MPLS VPN. MPLS/BGP VPNs Goals MPLS/BGP VPN Features Implementation Conclusions.
Objectives: Chapter 1: Introduction Types of Networks OSI Reference Model (7 Layers) TCP/IP Model Network Devices Network Topologies.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ROUTE v6 Chapter 1 1 Chapter 1: Routing Services CCNP ROUTE: Implementing IP Routing.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 LSP-Ping and BFD for MPLS-TP draft-nitinb-mpls-tp-lsp-ping-bfd- procedures-00.
© 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION1 1 Carrier Ethernet Technologies and Test Applications Reza Vaez-Ghaemi, Ph.D.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
Elastic Provisioning In Virtual Private Clouds Prashant Shenoy University of Massachusetts Amherst *Joint work with Tim Wood, K.K Ramakrishnan and Kobus.
Computer networks Fundamentals of Information Technology Session 6.
Scalability and efficiency: Introducing a new mechanism to the internet must not jeopardize its efficiency. Enhancing IP for mobility must not generate.
1 Version Created by G.Wright CCNA 3 Module 9 Virtual Trunk Protocol.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Ethernet Routing for Large Scale Distributed Data Center Fabrics Dave Allan, János Farkas, Panagiotis.
A GRAPH MORE LOVELY THAN A TREE © 2010 Brocade Communications Systems, Inc. CONFIDENTIALFor Internal Use Only 1 Joerg Ammon Systems.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Objectives: Chapter 7: Intranet LAN Design * Goals and considerations in LAN design * Understand the steps in systematic LAN design * Design issues associated.
1 Computer Networks TCP/IP Protocol Suite. 2 Protocols Cooperative action is necessary computer networking is not only to exchange bytes huge system with.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement VTP LAN Switching and Wireless – Chapter 4.
© 2016 SlidePlayer.com Inc. All rights reserved.