© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.

Slides:



Advertisements
Similar presentations
History of VPLS at IETF Ali Sajassi November 12, 2002.
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
BGP based Multi-homing in VPLS IETF-75
Update on LDP Extensions for Optimized MAC Address Withdrawal in H-VPLS draft-ietf-l2vpn-vpls-ldp-mac-opt-04 Geraldine Calvignac
BGP based Multi-homing in Virtual Private LAN Service
Overlay Transport Virtualization (OTV)
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 MPLS Scale to 100k endpoints with resiliency and simplicity Clarence.
Computer Networking A Top-Down Approach Chapter 4.7.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
An Introduction to VPLS
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
Ethernet VPN (EVPN) - Casos de Uso e Aplicação
Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Centralized Replication for BUM traffic in active-active edge connection draft-hao-trill-centralized-replication-02 Weiguo Hao Huawei Yizhou Li Huawei.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
Flowspace revisited OpenFlow Basics Flow Table Entries Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot L4 sport L4 dport Rule Action.
© 2002, Cisco Systems, Inc. All rights reserved..
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 Advanced Internetworking Computer Networks, 5th Edition.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
1 © 2002, Cisco Systems, Inc. All rights reserved. draft-nadeau-pwe3-vccv-00.txt IETF #56 San Francisco, CA USA Thomas D. Nadeau Monique.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
CS 540 Computer Networks II Sandy Wang
IETF 84, July 2012 Vancouver, Canada
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Identifying Problems That Occur in Redundant Switched.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Multicast over VPLS MPLS WC 2009 Ben Niven-Jenkins - BT Andrew Bartholomew - ALU February 2009.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
EVPN: Or how I learned to stop worrying and love the BGP
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
P2MP LSP for IPTV 이동 무선 네트워크 연구실 홍 석 준
Virtual Private LAN Service
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
Advanced Computer Networks
L2VPN Provisioning & Signaling
MPLS-TP Fault Management Draft draft-boutros-mpls-tp-fault-01
Chapter 3 Part 1 Switching and Bridging
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Link state routing In link state routing, if each node in the domain has the entire topology of the domain list of nodes and links, how they are connected.
ECE 544 Protocol Design Project 2016
Zhenbin Li, Shunwan Zhuang Huawei Technologies
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
EVPN a very short introduction
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Routing.
EVPN and L2 Access Protocols: Single-Flow-Active load-balancing mode
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 PE1PE10 PE3 Site1 Site3 Site2 M2 M3 PE2 Site5 M5 Site4 AC4 AC1 AC10 AC5 AC3 PE30 AC30 AC2 MHID 1 MHID 3 B3 M1 B1 AC300 Site6 M30 AA-VPLS - Signalling PE3’s upstream label for MHID3 = 30, 31 PE3 signals that its upstream label for MHID=3 is 30/31. Any remote PE in the same VPLS instance will recognize that any packet coming from PE3 with the next label after the PW label =30/31 is coming from MHID3. It will thus learn the SMAC as being in MHID3. It will not reinject the packet into MHID3

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 PE1PE10 PE3 Site1 Site3 Site2 M2 M3 PE2 Site5 M5 Site4 AC4 AC1 AC10 AC5 AC3 PE30 AC30 AC2 MHID 1 MHID 3 B3 M1 B1 AC300 Site6 M30 [S: M3, D: M1] AA-VPLS – Unknown/Mcast [S: M3, D: M1] 31 - [S: M3, D: M1] PE3 and PE30 signaled the MH-Site-ID3 and upstream labels. PE3 and PE1 are DF for Site 3 and Site 1 and PE3 is DF for site10 1.Mcast Packet with src MAC M3 arrives at PE3. 2.PE3 floods packet to AC40 and AC13. 3.PE3 encap packet with upstream label (Flood to DF at MH Sites) and flood over PWs or over p2mp LSP to PE1, 2, 10, On PE1,2,10,30 learning of M3 will be against MH virtual port (MHID3). 5.PE1, floods packet to AC4 and AC1 (DF for Site1). 6.PE10 floods only to AC5 and PE2 to AC2. 7.On PE30, learning will be against MH Virtual port. 8.PE30, floods packet to AC300.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 PE1PE10 PE3 Site1 Site3 Site2 M2 M3 PE2 Site5 M5 Site4 AC4 AC1 AC10 AC5 AC3 PE30 AC30 AC2 MHID 1 MHID 3 B3 M1 B1 AC300 Site6 M30 [S: M3, D: M1] AA-VPLS – Known Unicast [S: M3, D: M1] 30 - [S: M3, D: M1] Assume PE3 and PE1 are DF for Site 3 and Site 1. 1.Packet with src MAC M3 arrives at PE30. 2.PE30 encap packet with upstream label (Unicast Packet) and send packet over PW PE10. 3.On PE10 learning of M3 will be against MH virtual port (MHID3). 4.PE10 sends packet to M5 over AC5. VFI table of PE3: M1’ M1 M1’ MHID1: {PE1, PE10} M1’’ PE1 PE10

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Properties Per-flow load-balancing among multiple active attachment circuits connected to the same multi-homed site Fast Convergence upon redundant link or node failure Flexible PE location Shortest-path routing P2M Multicast optimization MAC Flush reduction Policy support (E-TREE and more) No requirement for control-word presence