Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.

Slides:



Advertisements
Similar presentations
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Advertisements

1 Analysis of VPLS Deployment R. Gu, J. Dong, M. Chen, Q. Zeng (Huawei) Z. Liu (China Telecom) IETF80 L2VPN Mar Prague draft-gu-l2vpn-vpls-analysis-00.
Pseudowire freeze mechanism draft-jin-pwe3-pw-freeze-00 Lizhong Jin Bhumip. Khasnabish.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 80th IETF - Prague VPLS PE Model with E-Tree Support Yuanlong Jiang.
BGP based Multi-homing in VPLS IETF-75
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei)
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-02 Yimin Shen (Juniper Networks) Rahul Aggarwal (Arktan Inc) Wim Henderickx.
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-03 Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc) Wim Henderickx (Alcatel-Lucent)
Draft-chen-i2rs-mpls-ldp-usecases-00/ draft-huang-i2rs-mpls-te-usecase-00 IETF 88 I2RS1 Use Cases for an Interface to MPLS Protocol draft-chen-i2rs-mpls-ldp-usecases-00/
Draft-li-isdnrg-seamless-mpls-mbh-00IETF 92 SDNRG1 Inter-SDN in Seamless MPLS for Mobile Backhaul Zhenbin Li, Rober Tao Huawei Technologies IETF 92, Dallas,
Dual-Homing Protection for MPLS and MPLS-TP Pseudowires
Seamless MPLS for Mobile Backhaul draft-li-mpls-seamless-mpls-mbh-00
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
Draft-ni-l3vpn-pm-bgp-ext-00IETF 87 L3VPN1 BGP Extension For L3VPN PM draft-ni-l3vpn-pm-bgp-ext-00 Hui Ni, Shunwan Zhuan, Zhenbin Li Huawei Technologies.
Requirements for MEF E-Tree Support in VPLS draft-key-l2vpn-vpls-etree-reqt-00 Presenter: Frederic Jounay IETF78, July 2010 Authors: Raymond Key Simon.
Draft-ni-l3vpn-bgp-ext-sd-co-lsp-00IETF 87 L3VPN1 BGP Extensions for Setup Service-Driven Co-Routed LSP in L3VPN draft-ni-l3vpn-bgp-ext-sd-co-lsp-00 Hui.
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
Draft-li-ccamp-auto-mbb-te-path-00IETF 88 CCAMP1 IGP Extensions for Automatic Computation of MPLS Traffic Engineering Path Using Traffic Engineering Layers.
Draft-li-mpls-seamless-mpls-mbb-00IETF 87 MPLS1 Seamless MPLS for Mobile Backhaul draft-li-mpls-mbb-seamless-mpls-00 Zhenbin Li, Lei Li (Huawei) Manuel.
Li Zhang, Zhenbin Li (Huawei Technologies) Dapeng Liu (China Mobile)
IETF 84, July 2012Slide 1 Multiple LDP Instances in single Label Space Mustapha Aïssaoui, Pranjal K. Dutta Alcatel-Lucent.
Draft-li-mpls-global-label-framework-02IETF 90 MPLS WG1 A Framework of MPLS Global Label draft-li-mpls-global-label-framework-02 Zhenbin Li, Quintin Zhao,
Draft-li-mpls-network-virtualization-framework-00IETF 88 SPRING WG1 Framework of Network Virtualization Based on MPLS Global Label draft-li-mpls-network-virtualization-framework-00.
Pseudowire And LDP-enabled Services (PALS) WG Status IETF-91 Honolulu Co-Chairs: Stewart Bryant and Andy Malis
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
11/27/2015 draft-bocci-bryant-ms-pw-architecture-00.txt An Architecture for Multi-Segment Pseudo Wire Emulation Edge-to-Edge draft-bocci-bryant-pwe3-ms-pw-architecture-00.txt.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
73rd IETF Minneapolis Nov Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-02.txt.
SIP-H.323 Interworking Group RRR-1 IETF-48 SIP-H.323 Interworking Requirements draft-agrawal-sip-h323-interworking-reqs-00.txt Hemant.
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
1 1/24/2016 draft-shah-bocci-pwe3-ms-pw-signaling-01.txt MS-PW Signaling draft-shah-bocci-pwe3-ms-pw-signaling-01.txt Matthew Bocci, Mustapha Aissaoui,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Yaakov (J) Stein RAD Data Communications, Ltd. PW usage nits.
Draft-li-rtgwg-igp-ext-mrt-frr-00IETF 85 RTGWG1 Applicability of LDP Multi-Topology for Unicast Fast-reroute Using Maximally Redundant Trees draft-li-rtgwg-ldp-mt-mrt-frr-01.
IETF 69, July 2007Slide 1 Preferential Forwarding Status bit Definition draft-muley-dutta-pwe3-redundancy-bit-01.txt Praveen Muley, Pranjal K. Dutta, Mustapha.
Draft-li-mpls-proxy-te-lsp-01IETF 90 MPLS1 Proxy MPLS Traffic Engineering Label Switched Path(LSP) draft-li-mpls-proxy-te-lsp-01 Zhenbin Li, Xinzong Zeng.
Draft-li-mpls-proxy-te-lsp-00IETF 87 MPLS1 Proxy MPLS Traffic Engineering Label Switched Path(LSP) draft-li-mpls-proxy-te-lsp-00 Zhenbin Li, Xinzong Zeng.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
BGP-based Auto-Discovery for L2VPNs draft-hlmu-l2vpn-bgp-discovery-00.txt Sue Hares - Vasile Radoaca -
Draft-li-idr-cc-bgp-arch-00IETF 88 IDR1 An Architecture of Central Controlled Border Gateway Protocol (BGP) draft-li-idr-cc-bgp-arch-00 Zhenbin Li, Mach.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Draft-chen-rtgwg-resource-management-yang-00IETF 94 RTGWG1 PCE-initiated IP Tunnel draft-chen-pce-pce-initiated-ip-tunnel-00 Xia Chen, Zhenbin Li(Huawei)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
1 MTU Extended Community for BGP-4 Q. Zeng, J. Dong (Huawei Technologies) IETF81 IDR July 2011 Quebec draft-zeng-idr-bgp-mtu-extension-00.
1 MPLS Source Label Mach Chen Xiaohu Xu Zhenbin Li Luyuan Fang IETF87 MPLS Aug Berlin draft-chen-mpls-source-label-00.
Draft-li-mpls-serv-driven-co-lsp-fmwk-03IETF 90 MPLS1 A Framework for Service-Driven Co-Routed MPLS Traffic Engineering LSPs draft-li-mpls-serv-driven-co-lsp-fmwk-03.
BGP extensions for Path Computation Element (PCE) Discovery in a BGP/MPLS IP-VPN draft-kumaki-pce-bgp-disco-attribute-03.txt Kenji Kumaki KDDI R&D Labs,
draft-jounay-pwe3-dynamic-pw-update-00.txt IETF 70 PWE3 Working Group
Zhenbin Li, Li Zhang(Huawei Technologies)
Booting up on the Home Link
Zhenbin Li, Kai Lu Huawei Technologies IETF 98, Chicago, USA
A Framework for Service-Driven Co-Routed MPLS Traffic Engineering LSPs draft-li-mpls-serv-driven-co-lsp-fmwk-01 Zhenbin Li, Shunwan Zhuan, Jie Dong Huawei.
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc)
Multi-domain MPLS Deployment Enhancement
TRILL MPLS-Based Ethernet VPN
78th IETF Meeting - Maastricht 27th, July 2010
Performance Monitoring Analysis for L3VPN
Zhenbin Li, Shunwan Zhuang Huawei Technologies
IETF South Korea PCEP Link-State extensions for Segment Routing draft-li-pce-pcep-ls-sr-extension-01 Zhenbin Li (Huawei) Xia Chen (Huawei) Nan.
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
PW Control Word Stitching
PW Control Word Stitching
Presentation transcript:

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin Li, Shunwan Zhuang Huawei Technologies IETF 88, Vancouver, BC, Canada

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN2 Introduction The architecture of central controlled BGP is defined in [draft-li-idr-cc-bgp-arch-00]. Some use cases under this new framework are also discussed. In the central controlled framework, control functionality of L2VPN can be done only by the Controllers. Consequently it can reduce control functionality in network nodes. This document defines the architecture of central controlled L2VPN and corresponding protocol extension requirement.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN3 Architecture The architecture consists of two essential network elements: L2VPN Controller and Forward Node. There is no L2VPN related control functionality in Forward Nodes. L2VPN Controller controls all the Forward Nodes. L2VPN Controllers need to communicate with each other via extension of existing protocols, e.g. BGP, LDP, etc. L2VPN service set up between the forward nodes is proxied by the BGP Controllers.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN4 Application Scenarios Three application scenarios for deployment of Central Controlled L2VPN service. Scenario 1: Partial Deployment. – Some network nodes are upgrading to support Central Controlled L2VPN, the other nodes are retained as legacy network nodes. – The new network nodes are controlled by L2VPN Controller. Scenario 2: Multiple Controller within a Single AS – There are multiple controllers in a single AS to be responsible for setup of Central Controlled L2VPN service. Scenario 3: Multiple Controller within Multiple Ases – There are multiple controllers in different ASes to be responsible for setup of Central Controlled L2VPN service.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN5 Solutions and Protocol Extensions Overview: There are two options to implement the architecture of Central Controlled L2VPN. – Option 1: BGP for all scenarios – Option 2: LDP for Partial Deployment Scenario Procedures: – PW Establishment – PW Redundancy – MAC Withdraw – Capability Negotiation

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN6 PW Establishment Auto Discovery: – The controller SHOULD advertise the address list of Forward Nodes participating in a specific VPLS or VLL to other controllers. Then the controller can discover the PW that should be set up between the Forwarding Nodes controlled by different controllers. PW Label Allocation: – The controller will advertise the label mapping message to the other controller for the PW which should be set up between a pair of Forward Nodes. – The addresses of the local Forward Node and the remote Forward Node SHOULD be carried in the message to differentiate the PWs. PW Forwarding Entry Creation: – The controller will find the tunnel to the Forward Node controlled by another controller. – The controller will create PW forwarding entry with PW label and the tunnel information and download the forwarding entry to the specified local Forward Node controlled by itself.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN7 PW Redundancy In the Central Controlled L2VPN, when advertise the status for the PW between the controllers, the addresses of the Local Forward Node and the Remote Forward Node should be carried to specify the specific PW. When the controller receives the message carried the PW status information, it will set the PW on the specified Forwarding Node as the state specified by the message.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN8 MAC Withdraw For Central Controlled L2VPN, L2VPN Controller needs to develop an ability to remove the MAC of the specific Forward Node. – When a Forward Node within a L2VPN Controller wants to remove MAC Addresses that has been sent to the remote endpoint, the Controller needs to send MAC Withdraw Messages on behalf of the Forward Node. – In the message, the address of the remote forward node should be carried. When the other controller receive the message, it will remove the specified MAC addresses on the Forward Node identified by the address of the remote forward node in the message.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN9 Capability Negotiation To ensure backward compatibility with existing implementations, the capability for Central Controlled L2VPN SHOULD be negotiated between the controllers. The capability is advertised to each other by the controllers. After the successful negotiation of the capability, the other control functionalities for the central controlled L2VPN can be done by the controller.

draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN10 Next Steps EVPN functionality will be taken into account. The control functionality between CE and PE will be taken into account for L2VPN. Solicit more comments & feedbacks Revise the draft