We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJacob Flynn
Modified over 3 years ago
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling draft-raggarwa-l2vpn-p2mp-pw-02.txt R. Aggarwal (Juniper) Y. Kamite (NTT) F. Jounay (France Telecom)
2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Motivation What is a P2MP PW? Virtual Private Multicast Service (VPMS) VPMS Auto-Discovery
3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net What is a P2MP PW ? A Point-to-Multipoint (P2MP) Pseudo Wire (PW) is a mechanism that emulates the essential attributes of a unidirectional P2MP Telecommunications service such as P2MP ATM over a Packet Switched Network (PSN). Chartered in PWE3 WG draft-ietf-pwe3-p2mp-pw-requirements
4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Virtual Private Multicast Service (VPMS) One applicability of P2MP PWs is to deliver a Layer 2 multicast service, that carries multicast frames (encoded using Layer 2 or IP mechanisms) from a multicast source to one or more multicast receivers. P2MP PWs enable a L2VPN to provide a Virtual Private P2MP unidirectional service (VPMS), which may be in addition to the Virtual Private Wire Service (VPWS) offered by the L2VPN. Chartered in L2VPN WG draft-ietf-l2vpn-vpms-frmwk-requirements-00
5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VPMS Auto-discovery Auto-discovery (A-D) is required as per Virtual Private Multicast Service (VPMS) requirements Framework and Requirements for Virtual Private Multicast Service (VPMS)", draft-ietf-l2vpn-vpms-frmwk-requirements Draft-raggarwa-l2vpn-p2mp-pw-02.txt describes procedures for BGP based VPMS A-D These procedures are meant to apply to both BGP and LDP as P2MP PW signaling protocols Procedures in the draft are fully specified only for BGP as the P2MP PW signaling protocol at this point Draft-raggarwa-l2vpn-p2mp-pw-02.txt also describes BGP based procedures for P2MP PW signaling for VPMS that may be used when BGP is used for VPMS A-D
6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Historical Context of the Draft Comparison with draft-raggarwa-l2vpn-p2mp-pw-00.txt and draft-raggarwa-l2vpn-p2mp-pw-00.txt Version 0/1 specified VPMS service definition Now specified in draft-ietf-l2vpn-vpms-frmw requirements Version 0/1 specified P2MP PW encapsulation and forwarding Now specified in draft-raggarwa-pwe3-p2mp-pw-encaps Version 0/1 specified BGP based VPMS A-D and P2MP PW signaling Retained in draft-raggarwa-l2vpn-p2mp-pw-02.txt
7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Layer 2 Multicast VPN A L2VPN that offers VPMS is referred to as a L2 Multicast VPN A L2 MVPN is defined by two sets of sites, Sender Sites set and Receiver Sites set, with the following properties: CEs within the Sender Sites set could originate traffic for CEs in the Receiver Sites set. A PE delivers traffic received from a CE in the Sender Sites set to the CEs in the Receiver Sites set using a P2MP PW. CEs not in the Receiver Sites set should not be able to receive this traffic. CEs within the Receiver Sites set could receive traffic originated by any CEs in the Sender Sites set. CEs within the Receiver Sites set should not be able to receive traffic originated by any CE that is not in the Sender Sites set. A L2 MVPN is determined by a set of administrative policies that define the sender sites and receiver sites and these policies could be implemented using Route Targets
8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Auto-Discovery (A-D) Auto-discovery procedures for the PEs in the Receiver Sites set to discover the PEs (and CEs) in the Sender Sites Set. Depending on the P2MP PSN signaling technology the PEs in the Sender Sites set may have to discover the PEs in the Receiver Sites set This draft uses procedures in draft-ietf-l2vpn-vpls-mcast for A-D BGP NLRI: MUST carry the set of Route Targets being exported by the VPMS instance.
9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Discovering Sender Sites and Receiver Sites Whether a CE belongs to a sender site or a receiver site is determined from the Route Targets (RT) that are configured to enforce the administrative policies of a L2 MVPN. These RTs are advertised in the corresponding BGP A-D routes. For instance if some of the sites in a VPMS are only in sender site set while others are only in receiver sites set, then CEs that are in the receiver site set are configured to import only sender site set RTs. CEs that are in the sender site set are configured to import only the receiver site set RTs. In this case two RTs are required to provision the VPMS instance.
10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Redundancy draft-ietf-l2vpn-vpms-frmw requirements specifies redundancy requirements that require multi-homing a sender CE to two or more PEs Ingress PE redundancy BGP based A-D allows multi-homing a CE to two or more PEs If the CE ID is the same on all the multi-homed PEs, BGP path selection ensures that only a single PE is chosen as the primary PE at a time Its a matter of policy whether More than one ingress PEs send traffic on the P2MP PWs that they are the root of and the egress PEs drop the duplicate copies Only the primary ingress PE sends traffic on the P2MP PW that it is the root of
11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Signaling L2 MVPN requires signaling procedures for the root PE to signal P2MP PWs to leaf PEs. P2MP PSN tunnels carry the P2MP PW traffic With a P2MP PW demultiplexor that can be used to identify individual root CEs and enables carrying traffic for multiple P2MP PWs (which may belong to different L2VPNs) over the same P2MP PSN tunnel. Using upstream assigned MPLS label as the P2MP PW de-multiplexor. Draft-raggarwa-pwe3-p2mp-pw-encaps P2MP PW de-multiplexor is signaled using mechanisms described in draft-ietf-l2vpn-vpls-mcast
12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Inter-AS and Multi-Segment P2MP PWs Following applies only to P2MP PWs signaled using BGP Inter-AS optons (a), (b) and (c) that are described in VPLS-MCAST are supported A Multi-Segment P2MP PW is equivalent to a segmented inter-AS tree that is described in [VPLS-MCAST], for inter-AS option (b). In VPLS-MCAST a segmented inter-AS tree for a particular VPLS instance is formed by dynamically stitching intra-AS segments. A segment of an inter-AS segmented tree is equivalent to a segment of a Multi-Segment P2MP PW. Procedures that are used in VPLS-MCAST for segmented inter-AS trees are re-used to dynamically stitch segments of a Multi- Segment P2MP PW.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
73rd IETF Minneapolis Nov Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-02.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 LSP-Ping and BFD for MPLS-TP draft-nitinb-mpls-tp-lsp-ping-bfd- procedures-00.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
BGP based Multi-homing in VPLS IETF-75 Bhupesh Kothari Kireeti Kompella Wim Henderickx Florin Balus.
History of VPLS at IETF Ali Sajassi November 12, 2002.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 80th IETF - Prague VPLS PE Model with E-Tree Support Yuanlong Jiang.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
L3VPN WG2014-Jul-221 Ingress Replication P-Tunnels in MVPN I ngress Replication (IR) is one of the MVPN P-tunnel technologies But there’s a lot of confusing.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-01.txt draft-raggarwa-l2vpn-vpls-mcast-ctrl-00.txt.
Inter-Area P2MP Segmented LSPs draft-raggarwa-seamless-mcast-03.txt R. Aggarwal (Juniper), Y. Rekhter (Juniper), T. Morin (France Telecom) I. Grosclaude.
72nd IETF Dublin July 2008 Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-01.txt Yuji.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS Concepts Identifying MPLS Applications.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Requirements for MEF E-Tree Support in VPLS draft-key-l2vpn-vpls-etree-reqt-00 Presenter: Frederic Jounay IETF78, July 2010 Authors: Raymond Key Simon.
L3VPN WG2013-Nov-71 Ingress Replication P-Tunnels in MVPN I ngress Replication has always been one of the P-tunnel technologies supported by MVPN But there’s.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 181th IETF - Quebec VPLS PE Model with E-Tree Support Yuanlong Jiang.
March 2010IETF 77, MPLS WG1 Carrying PIM-SM in ASM mode Trees over P2MP mLDP LSPs draft-rekhter-pim-sm-over-mldp-01.txt Y. Rekhter, Juniper Networks R.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-02 Yimin Shen (Juniper Networks) Rahul Aggarwal (Arktan Inc) Wim Henderickx.
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
July 24, 2007IETF 69, L3VPN WG1 Progress on Arch Doc draft-ietf-l3vpn-mcast-2547bis-mcast-05 Areas of new work: –Clarification of upstream multicast hop.
1 Analysis of VPLS Deployment R. Gu, J. Dong, M. Chen, Q. Zeng (Huawei) Z. Liu (China Telecom) IETF80 L2VPN Mar Prague draft-gu-l2vpn-vpls-analysis-00.
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
Multicast VPN using BIER IETF 91, Honolulu Eric RosenJuniper Networks Mahesh SivakumarCisco Systems.
Draft-jounay-pwe3-p2mp-pw-requirements-00.txt IETF 68 PWE3 Working Group Prague, March 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
BGP L2VPN Auto-discovery and Signaling Kireeti Kompella.
MPLS VPN. MPLS/BGP VPNs Goals MPLS/BGP VPN Features Implementation Conclusions.
1 Use of PE-PE IP/GRE/IPsec for MPLS PWs draft-raggarwa-pwe3-pw-over-ip- 00.txt Rahul Aggarwal
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
1 Leaf discovery mechanism for mLDP based P2MP/MP2MP LSP draft-jin-mpls-mldp-leaf-discovery-00 Lizhong Jin, ZTE Kebo Liu, Nokia Siemens Networks.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
11/27/2015 draft-bocci-bryant-ms-pw-architecture-00.txt An Architecture for Multi-Segment Pseudo Wire Emulation Edge-to-Edge draft-bocci-bryant-pwe3-ms-pw-architecture-00.txt.
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
CS 540 Computer Networks II Sandy Wang
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Virtual Links: VLANs and Tunneling CS 4251: Computer Networking II Nick Feamster Spring 2008.
Base Specification for Multicast in BGP/MPLS VPNs draft-raggarwa-l3vpn-2547-mvpn-00.txt Rahul Aggarwal Juniper Networks.
© 2017 SlidePlayer.com Inc. All rights reserved.