Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

History of VPLS at IETF Ali Sajassi November 12, 2002.
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Identifying MPLS Applications
Overlay Transport Virtualization (OTV)
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
MPLS in the Data Center Achieve “Carrier-class” Network Dependability and Reliability for Business Critical Services.
Internetworking II: MPLS, Security, and Traffic Engineering
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
Ethernet VPN (EVPN) - Casos de Uso e Aplicação
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
© 2007 Cisco Systems, Inc. All rights reserved. Valašské Meziříčí Connecting to the Network.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Lucy Yong Susan Hares September 20, 2012 Boston
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-segment- route-00.txt Ali Sajassi, Samer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
BCP for ARP/ND Scaling for Large Data Centers
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Module 1: Configuring Routing by Using Routing and Remote Access.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
EVPN: Or how I learned to stop worrying and love the BGP
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
2V0-641 Dumps VMware Certified Professional 6 - Network Virtualization Beta Exam PDF File Download :
Virtual Hub & Spoke with BGP EVPNs
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Hierarchical Fabric Designs
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Extending MPLS/BGP VPNs to End-Systems
Kireeti Kompella Juniper Networks
EVPN a very short introduction
Connecting to the Network
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Tim Strakh CEO, IEOFIT CCIE RS, CCIE Sec CCIE Voice, CCIE DC
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Reference Model and Terminology Data Center 1 DCS1 DCS2 DCB1 Data Center 3 DCB3 DCS8 Data Center 2 DCS4 DCS5 Data Center 4 DCB4/DCS9 DCB2  DC: Data Center  DCS: Data center switch Connected to Servers/VMs  DCB: Data center border router Could be co-located with DCS  “WAN” provides interconnect among DCs, and between DCs and Client Site BR Client site Client Site BR “WAN”

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Data Center Interconnect: Layer 2 Extension Data Center 1 DCS1 DCS2 DCB1 Data Center 3 DCB3 DCS8 Data Center 2 DCS4 DCS5 Data Center 4 DCB4/DCS9 DCB2 Client site Client Site BR “WAN” VM1 VM3 VM2 VM4 VM5 VM6 VM7 VM8  VLAN1 (subnet1) stretches between DC1, DC2, DC3 and DC4  VLAN2 (subnet2) is present only on DCS1  VLAN3 (subnet3) stretches between DC1 and DC2  VLAN stretch is required for cloud computing “resource fungibility”, redundancy etc.  Communication between VMs on different VLANs/subnets and between clients and the VMs requires layer 3 routing

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net BGP-MPLS E-VPNs for Data Center Interconnect  BGP-MPLS based technology, one application of which is data center interconnect between data center switches for intra-VLAN forwarding i.e., layer 2 extension  Why? Not all data center interconnect layer 2 extension requirements are satisfied by existing MPLS technology such as VPLS E.g., minimizing flooding, active-active points of attachment, fast edge protection, scale, etc.  How? Reuses several building blocks from existing BGP-MPLS technologies Requires extensions to existing BGP-MPLS technologies Draft-raggarwa-sajassi-l2vpn-evpn-01.txt Being pursued in the L2VPN WG

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net E-VPN Reference Model MES 1 Ethernet Switch-B3 MES 3 MES 2 MES 4 VPN A Host -A1 Host-B1 Host-A4 Host-A3 VPN B VPN A VPN B EFI-A EFI-B VPN A EFI-A RR Host –A5  MES - MPLS Edge Switch; EFI – E-VPN Forwarding Instance; ESI – Ethernet Segment Identifier (e.g., LAG identifier)  MESes are connected by an IP/MPLS infrastructure  Transport may be provided by MPLS P2P or MP2P LSPs and optionally P2MP/MP2MP LSPs for “multicast”  Transport may be also be provided by IP/GRE Tunnels ESI 1, VLAN1 ESI 2, VLAN2 ESI 3, VLAN1 ESI 4, VLAN2 ESI 5, VLAN1 ESI 1, VLAN1

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Relating EVPN Reference Model to Data Center Interconnect Reference Model Data Center 1 DCS1 DCS2 DCB1 Data Center 3 DCB3 DCS8 Data Center 2 DCS4 DCS5 Data Center 4 DCB4/DCS9 DCB2 “WAN”  DCSes may act as MPLS Edge Switches (MES) DCSes may interconnect with DCBs using E-VPN DCSes are connected to hosts i.e., VMs  DCBs must participate in E-VPN although they may perform only MPLS switching  WAN routers may or may not participate in E-VPN  Following slides will describe an overview of E-VPN and then apply E- VPN to data center interconnect

7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net E-VPN Local MAC Address Learning  A MES must support local data plane learning using vanilla ethernet learning procedures When a CE generates a data plane packet such as an ARP request  MESes may learn the MAC addresses of hosts in the control plane using extensions to protocols that run between the MES and the hosts  MESes may learn the MAC addresses of hosts in the management plane

8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net E-VPN Remote MAC Address Learning  E-VPN introduces the ability for an MES to advertise locally learned MAC addresses in BGP to other MESes, using principles borrowed from IP VPNs  E-VPN requires an MES to learn the MAC addresses of CEs connected to other MESes in the control plane using BGP Remote MAC addresses are not learned in the data plane

9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Remote MAC Address Learning in the BGP Control Plane Architectural Benefits  Increases the scale of MAC addresses and VLANs supported BGP capabilities such as constrained distribution, Route Reflectors, inter-AS etc., are reused  Allows hosts to connect to multiple active points of attachment  Improves convergence in the event of certain network failures  Allow hosts to relocate within the same subnet without requiring renumbering  Minimizes flooding of unknown unicast packets  Minimizes flooding of ARP Rest of the presentation will focus on this  Control over which MAC addresses are learned by which devices Simplifies operations; enables flexible topologies etc.

10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: Approach  Minimize the radius of ARP request/response propagation Minimize the propagation radius of ARP request from a server/Virtual Machine In the switching infrastructure in the data center Across data centers Respond to an ARP request from a server/VM as close to the server/VM as possible  Requires a number of components See the following slide

11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: Proxy ARP  A network node as close to the server/VM, as possible, performs “Proxy ARP” in response to ARP requests from the server/VM The network node should ideally be the DCS  Which MAC address does the network node use to respond to the ARP request? The answer depends on the forwarding paradigm used by the node to forward packets within the VLAN MAC lookup based forwarding within the VLAN/subnet –The solution in the following slides focuses on this IP address based forwarding within the VLAN/subnet –Not discussed in the following slides

12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: The Role of E- VPN (1) When MAC lookup based forwarding is used within a VLAN/subnet  MESes perform Proxy ARP  An MES responds to an ARP request, for an IP address, with the MAC address bound to the IP address When the destination is in the same subnet as the sender of the ARP request The ARP request is not forwarded to other MESes

13 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ARP Scaling Optimization: The Role of E- VPN (2)  How does the MES learn the IP address bound to the MAC address when the MAC address is remote? BGP MAC routes carry the IP address bound to the MAC address  How does an MES learn the IP to MAC binding when the MAC address is local? Control or management plane between MES and CEs or data plane snooping  An MES advertises the local IP to MAC bindings in the MAC routes