Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.

Slides:



Advertisements
Similar presentations
History of VPLS at IETF Ali Sajassi November 12, 2002.
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
March 2010IETF 77, MPLS WG1 Carrying PIM-SM in ASM mode Trees over P2MP mLDP LSPs draft-rekhter-pim-sm-over-mldp-01.txt Y. Rekhter, Juniper Networks R.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-02 Yimin Shen (Juniper Networks) Rahul Aggarwal (Arktan Inc) Wim Henderickx.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
Multicast VPN using BIER IETF 91, Honolulu ietf
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
63rd IETF Paris August 2005 Requirements for Multicast Support in Virtual Private LAN Services draft-kamite-l2vpn-vpls-mcast-reqts-00.txt Yuji Kamite (NTT.
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
Multicast in L3VPNs Bruce Davie 1 draft-ietf-l3vpn-2547bis-mcast-03.txt 1. Not a draft co-author, or a multicast expert.
Proactive fault detection in E-VPN (draft-vgovindan-l2vpn-evpn-bfd-00) Vengada Prasad Govindan, Samer Salam, Ali Sajassi IETF 88, November 2013 Vancouver.
1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 Advanced Internetworking Computer Networks, 5th Edition.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-to-become-l3vpn-2547bis-mcast- 00.txt.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP AS AN MVPN PE-CE Protocol draft-keyupate-l3vpn-mvpn-pe-ce-00 Keyur Patel,
Autonomicity in Virtual Private Network provisioning for enterprises GLOBECOM Workshops (GC Wkshps), 2010 IEEE.
GVPNs: Generalized VPNs using BGP and GMPLS Toolkit draft-ouldbrahim-ppvpn-gvpn-bgpgmpls-06.txt Hamid Ould-Brahim Yakov Rekhter
IETF 68, MPLS WG, Prague P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-leroux-mpls-p2mp-te-bypass-01.txt J.L. Le Roux (France Telecom) R. Aggarwal.
P2MP MPLS-TE FRR with P2MP Bypass Tunnel draft-leroux-mpls-p2mp-te-bypass-00.txt J.L. Le Roux (France Telecom) R. Aggarwal (Juniper) IETF 67, MPLS WG,
Use of Wildcard in S-PMSI Auto- Discovery Routes draft-rekhter-mvpn-wildcard-spmsi Rahul Aggarwal (Juniper) Wim Henderickx (Alcatel-Lucent) Praveen Muley.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
L3VPN WG2014-Jul-221 Ingress Replication P-Tunnels in MVPN I ngress Replication (IR) is one of the MVPN P-tunnel technologies But there’s a lot of confusing.
CS 540 Computer Networks II Sandy Wang
IETF 84, July 2012 Vancouver, Canada
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
March 21, 2006L3VPN WG 1 MVPN Update New version of “bgp encoding” draft –BGP update syntax and semantics reworked to reflect current thinking –Inter-AS.
Softwire Mesh Framework: Multicast Mingwei Xu Yong Cui CERNET, China Chris Metz, Cisco 68 th IETF Meeting, Prague March 2007.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Setup and Maintenance of Pseudo- Wires Using RSVP-TE Draft-raggarwa-rsvpte-pw-01.txt.
IETF 66 L1VPN Basic Mode Draft draft-ietf-l1vpn-basic-mode-00.txt Don Fedyk (Editor) Yakov Rekhter (Editor)
Inter-Area P2MP Segmented LSPs draft-raggarwa-seamless-mcast-03.txt
Base Specification for Multicast in BGP/MPLS VPNs draft-raggarwa-l3vpn-2547-mvpn-00.txt Rahul Aggarwal Juniper Networks.
Support for RSVP in Layer 3 VPNs draft-davie-tsvwg-rsvp-l3vpn-01.txt Bruce Davie François le Faucheur Ashok Narayanan Cisco Systems.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
MPLS WG1 Targeted mLDP Base mLDP spec didn’t consider use of LDP multipoint extensions over Targeted mLDP sessions LDP speaker must choose “upstream LSR”,
July 24, 2007IETF 69, L3VPN WG1 Progress on Arch Doc draft-ietf-l3vpn-mcast-2547bis-mcast-05 Areas of new work: –Clarification of upstream multicast hop.
73rd IETF Minneapolis Nov Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-02.txt.
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-vpls-integration- 00.txt A. Sajassi (Cisco),
Multicast over VPLS MPLS WC 2009 Ben Niven-Jenkins - BT Andrew Bartholomew - ALU February 2009.
Applicability of Existing Solutions to the Problem Space draft-takeda-l1vpn-applicability-03.txt.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
December 5, 2007IETF 70 L3VPN WG1 MVPN Profiles Why do we need “profiles”? –By design, architecture provides many choices: PE-PE C-multicast routing info.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 MPLS Upstream Label Assignment for RSVP- TE and LDP draft-raggarwa-mpls-rsvp-ldp-upstream-
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Establishing P2MP MPLS TE LSPs draft-raggarwa-mpls-p2mp-te-02.txt Rahul Aggarwal Juniper Networks.
L3VPN WG2012-Jul-301 Bidirectional P-tunnels in MVPN Bidirectional P-tunnel: MP2MP LSP per RFC 6388 PIM MDT per RFC 5015, GRE Encapsulation Accommodated.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-01.txt draft-raggarwa-l2vpn-vpls-mcast-ctrl-00.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
1 MPLS Source Label Mach Chen Xiaohu Xu Zhenbin Li Luyuan Fang IETF87 MPLS Aug Berlin draft-chen-mpls-source-label-00.
1 IETF74 – L3VPN – Multicast VPN fast fail-over IETF 74 th meeting, San Francisco – L3VPN WG Multicast VPN fast fail-over draft-morin-l3vpn-mvpn-fast-failover-00.
Softwire Mesh Framework: Multicast
Multicast in BGP/MPLS VPN
PE-based IPv6 multicast transition for mesh problem
MVPN Update Continued work on both architecture draft and BGP-MVPN draft Seeing “light at end of tunnel” ☺ Progress since last time: Carrier’s carrier.
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
Support C-Bidir with Ingress Replication draft-zzhang-l3vpn-mvpn-bidir-ingress-replication Jeffrey Zhang Yakov Rekhter Andrew Dolganow 87th IETF, Berlin.
78th IETF Meeting - Maastricht 27th, July 2010
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Inter-AS MVPN: Multihoming Considerations
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal (Juniper) Yuji Kamite (NTT) Luyuan Fang (AT&T)

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Co-Authors  Yakov Rekhter (Juniper)  Chaitanya Kodeboniya (Juniper)

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Update since last IETF  Limitations of existing VPLS proposals for Multicast  VPLS Multicast Architecture – where do the various drafts fit  Avoiding PIM snooping on the PWs  Use of P-Multicast Trees  Conclusion

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Update Since Last IETF  Part of the work was presented in this WG at the last IETF when it was part of draft-raggarwa-l3vpn- mvpn-vpls-mcast-01.txt  The VPLS mechanisms are now in a separate new draft as per WG feedback

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Current VPLS proposals:  “ Virtual Private LAN Service” ( draft-ietf-l2vpn-vpls- bgp )  “ Virtual Private LAN Services over MPLS ” ( draft-ietf- l2vpn-vpls-ldp )  Limitations of these proposals for VPLS multicast…

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Limitations of current VPLS proposals for VPLS Multicast  Do not allow the use of P-Multicast Trees for VPLS multicast data traffic Desirable for optimizing bandwidth efficiency  PEs with VPLS sites that do not have receivers in a given multicast customer (S, G) receive traffic for that multicast stream  Focus on optimizing state and not bandwidth.

7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Design Objectives for multicast support in VPLS service (not a complete list)  A given customer (multicast) packet should traverse a given service provider link at most once  Deliver customer multicast traffic to only PEs that have (customer) receivers for that traffic  Deliver customer multicast traffic along the “optimal” paths within the service provider (from the ingress PE to the egress PEs) The amount of state within the service provider network required to support Multicast in VPLS service should be no greater than what is required to support unicast in VPLS service The overhead of maintaining the state to support Multicast in VPLS service should be no greater than what is required to support unicast in VPLS service Optimize Bandwidth: Optimize State: Optimizing Bandwidth and State are conflicting goals

8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VPLS Multicast Architecture Control Plane  VPLS Auto-Discovery Use existing VPLS auto-discovery mechanisms  Allow elimination of flooding PE-CE snooping – draft-serbest-l2vpn-vpls-mcast In VPLS a PE does not maintain a layer 2 adjacency with a CE PE-PE reliable exchange of multicast control messages Allow avoiding PIM-IGMP snooping overhead on PWs PIM with reliability extensions or BGP Draft-raggarwa-l2vpn-vpls-mcast-

9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VPLS Multicast Architecture Data Plane Ingress Replication Separate Tree for Every C-(S, G) Separate Tree per-set-of VPLSs “Inclusive Mapping” Separate Tree per-set-of C-(S, G)s “Selective Mapping” Increasing P-router state and Bandwidth efficiency State = Unicast VPLS Unbounded State Aggregate State Tree = PIM, RSVP-TE P2MP LSPs, Receiver Initiated P2MP LSPs Decreasing P-router state and Bandwidth efficiency

10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net PIM snooping – implications on the state maintenance on PE routers  PE router has to maintain (S, G) state at least for all the (S,G) received from all the local CEs E.g., assume PE with 1,000 CEs/sites, each VPLS site has at any given point in time on average receivers for 3 groups, PE has to maintain at least 3,000 (S,G) entries  PE router maintains (S, G) state by processing PIM Join messages received from (a) all sites of VPLSs connected to that PE, AND (b) all the remote PEs that have members of these VPLSs E.g., assume PE router with 1,000 CEs/sites, each VPLS site has at any given point in time on average receivers for 3 group, each group is present on average in 10 sites, PE router has to process ~300 PIM Join per second, and ~900 (S, G) entries per second in a steady state due to periodic PIM Join and PIM Join suppression

11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Avoiding PIM Snooping on PWs Reliable Exchange of Multicast Control Messages between PEs PE 1 CE-B2 CE-B3 PE 3 PE 2 PE 4 VPLS A Site 3 CE -A1 CE-B1 CE-A2 CE-A4 CE-A3 VPLS B Site 1 VPLS B Site 2 VPLS A Site 4 VPLS B Site 3 VSI-A VSI-B VRF-B VPLS A Site 2 VPLS A Site 1 VSI-A RR PEs have I-BGP Peering Only With the RR C-S -> C-G PIM Join C-S, C-G – Snooped at PE1 BGP MVPN Routing Information Update: <RD, C-S, C-G, Originator PE – PE1 Upstream PE – PE2, RT>

12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VPLS Multicast Data Plane Tunnels  SP Multicast Trees Draft-raggarwa-l2vpn-vpls-mcast Aggregate Trees (Inclusive Mapping) Aggregate Data Trees (Selective Mapping) Use PE-CE snooping and PE-PE Reliable multicast message exchange  Ingress Replication Existing VPLS proposals AND PE-CE snooping and PE-PE Reliable multicast message exchange

13 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Aggregate P-Multicast Trees  Allow one P-multicast Tree to be shared across multiple VPLSs  Can be setup using PIM or P2MP MPLS TE No architectural limitation on the P-multicast tree technology  Requires a MPLS label to demultiplex a particular VPN ‘Upstream’ label allocation by the root of the tree Egress PEs maintain a separate label space for each P- multicast tree root  State grows less than linearly with number of VPLSs Some efficiency of multicast routing may be sacrificed

14 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net VPLS Multicast Data Plane P-Multicast Trees (Inclusive Mapping) PE 1 CE-B2 CE-B3 PE 3 PE 2 PE 4 VPLS A Site 3 CE -A1 CE-B1 CE-A2 CE-A4 CE-A3 VPLS B Site 1 VPLS B Site 2 VPLS A Site 4 VPLS B Site 3 VSI-A VSI-B VPLS A Site 2 VPLS A Site 1 VSI-A RR VPLS Membership Discovery: eg PE1 C-S -> C-G Aggregate Tree – PE2 as Root BGP Signaled VPLS – Tree Binding:

15 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Conclusion  Comments ?