We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJacob Flynn
Modified over 2 years ago
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling draft-raggarwa-l2vpn-p2mp-pw-02.txt R. Aggarwal (Juniper) Y. Kamite (NTT) F. Jounay (France Telecom)
2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Motivation What is a P2MP PW? Virtual Private Multicast Service (VPMS) VPMS Auto-Discovery
3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net What is a P2MP PW ? A Point-to-Multipoint (P2MP) Pseudo Wire (PW) is a mechanism that emulates the essential attributes of a unidirectional P2MP Telecommunications service such as P2MP ATM over a Packet Switched Network (PSN). Chartered in PWE3 WG draft-ietf-pwe3-p2mp-pw-requirements
4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Virtual Private Multicast Service (VPMS) One applicability of P2MP PWs is to deliver a Layer 2 multicast service, that carries multicast frames (encoded using Layer 2 or IP mechanisms) from a multicast source to one or more multicast receivers. P2MP PWs enable a L2VPN to provide a Virtual Private P2MP unidirectional service (VPMS), which may be in addition to the Virtual Private Wire Service (VPWS) offered by the L2VPN. Chartered in L2VPN WG draft-ietf-l2vpn-vpms-frmwk-requirements-00
5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VPMS Auto-discovery Auto-discovery (A-D) is required as per Virtual Private Multicast Service (VPMS) requirements Framework and Requirements for Virtual Private Multicast Service (VPMS)", draft-ietf-l2vpn-vpms-frmwk-requirements Draft-raggarwa-l2vpn-p2mp-pw-02.txt describes procedures for BGP based VPMS A-D These procedures are meant to apply to both BGP and LDP as P2MP PW signaling protocols Procedures in the draft are fully specified only for BGP as the P2MP PW signaling protocol at this point Draft-raggarwa-l2vpn-p2mp-pw-02.txt also describes BGP based procedures for P2MP PW signaling for VPMS that may be used when BGP is used for VPMS A-D
6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Historical Context of the Draft Comparison with draft-raggarwa-l2vpn-p2mp-pw-00.txt and draft-raggarwa-l2vpn-p2mp-pw-00.txt Version 0/1 specified VPMS service definition Now specified in draft-ietf-l2vpn-vpms-frmw requirements Version 0/1 specified P2MP PW encapsulation and forwarding Now specified in draft-raggarwa-pwe3-p2mp-pw-encaps Version 0/1 specified BGP based VPMS A-D and P2MP PW signaling Retained in draft-raggarwa-l2vpn-p2mp-pw-02.txt
7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Layer 2 Multicast VPN A L2VPN that offers VPMS is referred to as a L2 Multicast VPN A L2 MVPN is defined by two sets of sites, Sender Sites set and Receiver Sites set, with the following properties: CEs within the Sender Sites set could originate traffic for CEs in the Receiver Sites set. A PE delivers traffic received from a CE in the Sender Sites set to the CEs in the Receiver Sites set using a P2MP PW. CEs not in the Receiver Sites set should not be able to receive this traffic. CEs within the Receiver Sites set could receive traffic originated by any CEs in the Sender Sites set. CEs within the Receiver Sites set should not be able to receive traffic originated by any CE that is not in the Sender Sites set. A L2 MVPN is determined by a set of administrative policies that define the sender sites and receiver sites and these policies could be implemented using Route Targets
8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Auto-Discovery (A-D) Auto-discovery procedures for the PEs in the Receiver Sites set to discover the PEs (and CEs) in the Sender Sites Set. Depending on the P2MP PSN signaling technology the PEs in the Sender Sites set may have to discover the PEs in the Receiver Sites set This draft uses procedures in draft-ietf-l2vpn-vpls-mcast for A-D BGP NLRI: MUST carry the set of Route Targets being exported by the VPMS instance.
9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Discovering Sender Sites and Receiver Sites Whether a CE belongs to a sender site or a receiver site is determined from the Route Targets (RT) that are configured to enforce the administrative policies of a L2 MVPN. These RTs are advertised in the corresponding BGP A-D routes. For instance if some of the sites in a VPMS are only in sender site set while others are only in receiver sites set, then CEs that are in the receiver site set are configured to import only sender site set RTs. CEs that are in the sender site set are configured to import only the receiver site set RTs. In this case two RTs are required to provision the VPMS instance.
10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Redundancy draft-ietf-l2vpn-vpms-frmw requirements specifies redundancy requirements that require multi-homing a sender CE to two or more PEs Ingress PE redundancy BGP based A-D allows multi-homing a CE to two or more PEs If the CE ID is the same on all the multi-homed PEs, BGP path selection ensures that only a single PE is chosen as the primary PE at a time Its a matter of policy whether More than one ingress PEs send traffic on the P2MP PWs that they are the root of and the egress PEs drop the duplicate copies Only the primary ingress PE sends traffic on the P2MP PW that it is the root of
11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Signaling L2 MVPN requires signaling procedures for the root PE to signal P2MP PWs to leaf PEs. P2MP PSN tunnels carry the P2MP PW traffic With a P2MP PW demultiplexor that can be used to identify individual root CEs and enables carrying traffic for multiple P2MP PWs (which may belong to different L2VPNs) over the same P2MP PSN tunnel. Using upstream assigned MPLS label as the P2MP PW de-multiplexor. Draft-raggarwa-pwe3-p2mp-pw-encaps P2MP PW de-multiplexor is signaled using mechanisms described in draft-ietf-l2vpn-vpls-mcast
12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Inter-AS and Multi-Segment P2MP PWs Following applies only to P2MP PWs signaled using BGP Inter-AS optons (a), (b) and (c) that are described in VPLS-MCAST are supported A Multi-Segment P2MP PW is equivalent to a segmented inter-AS tree that is described in [VPLS-MCAST], for inter-AS option (b). In VPLS-MCAST a segmented inter-AS tree for a particular VPLS instance is formed by dynamically stitching intra-AS segments. A segment of an inter-AS segmented tree is equivalent to a segment of a Multi-Segment P2MP PW. Procedures that are used in VPLS-MCAST for segmented inter-AS trees are re-used to dynamically stitch segments of a Multi- Segment P2MP PW.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 LSP-Ping and BFD for MPLS-TP draft-nitinb-mpls-tp-lsp-ping-bfd- procedures-00.
BGP based Multi-homing in VPLS IETF-75 Bhupesh Kothari Kireeti Kompella Wim Henderickx Florin Balus.
History of VPLS at IETF Ali Sajassi November 12, 2002.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS Concepts Identifying MPLS Applications.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
March 2010IETF 77, MPLS WG1 Carrying PIM-SM in ASM mode Trees over P2MP mLDP LSPs draft-rekhter-pim-sm-over-mldp-01.txt Y. Rekhter, Juniper Networks R.
MPLS VPN. MPLS/BGP VPNs Goals MPLS/BGP VPN Features Implementation Conclusions.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 80th IETF - Prague VPLS PE Model with E-Tree Support Yuanlong Jiang.
Virtual Links: VLANs and Tunneling CS 4251: Computer Networking II Nick Feamster Spring 2008.
BGP L2VPN Auto-discovery and Signaling Kireeti Kompella.
Pseudowire freeze mechanism draft-jin-pwe3-pw-freeze-00 Lizhong Jin Bhumip. Khasnabish.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 181th IETF - Quebec VPLS PE Model with E-Tree Support Yuanlong Jiang.
1 Analysis of VPLS Deployment R. Gu, J. Dong, M. Chen, Q. Zeng (Huawei) Z. Liu (China Telecom) IETF80 L2VPN Mar Prague draft-gu-l2vpn-vpls-analysis-00.
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
1 Leaf discovery mechanism for mLDP based P2MP/MP2MP LSP draft-jin-mpls-mldp-leaf-discovery-00 Lizhong Jin, ZTE Kebo Liu, Nokia Siemens Networks.
© 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION1 1 Carrier Ethernet Technologies and Test Applications Reza Vaez-Ghaemi, Ph.D.
Metro Ethernet: Understanding Key Underlying Technologies © Copyright 2007 All Rights Reserved Metanoia, Inc
1 Introducing the Specifications of the MEF An Overview of MEF 33 Ethernet Access Services Definitions 2012 March.
1 Version Created by G.Wright CCNA 3 Module 9 Virtual Trunk Protocol.
NEW OUTLOOK ON MULTI-DOMAIN AND MULTI-LAYER TRAFFIC ENGINEERING Adrian Farrel
1 IETF 74, San Francisco IAB Plenary March 18, 2009 Network Operator Perspective MPLS: 12 Years After Tom Bechly.
OLD DOG CONSULTING MPLS-TE Doesn’t Scale Adrian Farrel Old Dog Consulting
Copyright © 2005 Rockwell Automation, Inc. All rights reserved. Ethernet Switch Features Important to EtherNet/IP.
Requirements for MEF E-Tree Support in VPLS draft-key-l2vpn-vpls-etree-reqt-02 Presenter : Manuel Paul, Deutsche Telekom IETF79, Nov 2010 Beijing, China.
Ethernet OAM Update Overview & Technical Aspects Dinesh Mohan May 18, 2004.
1 Introducing the Specifications of the MEF An Overview of MEF 6.1, 10.2, Carrier Ethernet Definitions and Attributes 2011 December.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Central Services VPNs.
Use of BGP and MPLS VPNs: A Case Study Fred P. Baker CCIE#3555.
1 © 2003 Cisco Systems, Inc. All rights reserved. MPLS VPN Inter-AS, 12/03 INTER-AUTONOMOUS SYSTEM MPLS VPN: ADVANCED CONCEPTS December 2003.
© 2017 SlidePlayer.com Inc. All rights reserved.