1
CE Bridge Interoperability
(draft-sajassi-l2vpn-vpls-bridge-interop-00.txt)
Ali Sajassi L2VPN WG November 2004
Cisco Systems
CE Bridge Interoperability - - PowerPoint PPT Presentation
CE Bridge Interoperability (draft-sajassi-l2vpn-vpls-bridge-interop-00.txt) Ali Sajassi L2VPN WG November 2004 Cisco Systems 1 Agenda Motivation Behind VPLS L2VPN Framework Model for VPLS PE Discussion of Issues Next Steps 2
1
(draft-sajassi-l2vpn-vpls-bridge-interop-00.txt)
Cisco Systems
2
3
4
5
C1 C1 C1 L2TPv3 Network MPLS Network 802.1ad Network
6
N/A VLAN bundling
VPLS Qualified Learning !!!
VLAN mapping
VPLS Unqualified Learning N/A Port-based w/ tagged & untagged N/A
N/A VPLS Unqualified Learning Port-based w/ untagged traffic
Eth ACs & Srv Map
VLAN bundling VLAN mapping Port-based w/ tagged & untagged Port-based w/ untagged
Ethernet ACs & Service Mapping
7
Virtual Bridge Port (multiplexer)
VPLS FWDR VPLS FWDR VPLS FWDR Pseudowires
PE
module Physical port Toward CEs Bridge Module
8
Virtual Bridge Port (multiplexer)
VPLS FWDR VPLS FWDR VPLS FWDR Pseudowires
PE
module
S-VLAN bridge module C-VLAN bridge C-VLAN bridge C-VLAN bridge
If a PE is modeled as such, then it can handled all of the previously mentioned services
9
VPLS as (V)LAN Emulation
10 10 10
CE-a CE-b CE-c
VPLS as LAN Emulation
CE-d CE-e n-PE u-PE n-PE n-PE u-PE u-PE u-PE
VPLS as “Bridged LAN” Service
11 11 11
CE-a CE-b CE-c CE-d CE-e n-PE u-PE u-PE u-PE u-PE n-PE
VPLS as “Bridged LAN” Service
VPLS as LAN Emulation
12 12 12
13 13 13
– GARP (802.1D), GMRP (802.1D), GVRP (802.1Q) – STP (802.1D), RSTP (802.1W), MSTP (802.1S) – Pause (802.3 Clause 31) – LACP (802.3 Clause 43) – OAM (802.3ah) – LLDP (802.1ab) – Slow Protocols – Port-based Network Access Control (802.1X)
14 14 14
– Operate transparently – Discard them – Peer with them – Snoop them
15 15 15
– reserves a block of 16 MAC addresses for the operation of customer bridges – describes which of these reserved MAC addresses to be used for peering & how the peering is performed – describes how & where to do discarding customer protocols (filtering action) – describes how & where to tunnel them
16 16 16
Customer Network Provider Network
17 17 17
– Customer activates its backup link for a subset of its VLANs (e.g., each link can be used for a subset of VLANs for load sharing) – Customer sends a Topology Change Notification (TCN) over this newly activated link – PE needs to understand and flush its MAC addresses – Receiving PE needs to propagate it to all other PEs – If any PE along the path doesn’t take any action, then customer frames will be black holed
Change Notification (CCN) message
per VPLS instance such that only MAC addresses associated with that VPLS instance is flushed
from different customers
into out-of-band messages (LDP MAC address withdrawal)
18 18 18
among the four PEs of the two island
line) is needed for that service instance but instead 3 PWs are used
selected
1g 1f 1d 1c 1e 2e 2i 2h 2g 2c 2f 2d P B B P Pseudowire mesh
19 19 19
20 20 20
– Don’t learn MAC addresses unless you have to (as described in 802.1ad) – Encapsulate customer MAC addresses using 802.1ah
21 21 21
– A failure in discovery mechanism – e.g., a PE doesn’t get a full membership list – A PW fails to come up from the start – A PW failure occurs due to hw or sw failure (soft failure) – Node or Link failure along the path (including PEs)
22 22 22
– L3 control and routing protocols to misbehave [rosen-mesh- failure] – broadcast storm in the customer and provider network – multiple copies of a single frame to be received by CE and/or PEs
23 23 23
– bridge control protocols – bridge data (non-IP) – bridge data (IP)
24 24 24
– Fault detection – Fault verification – Fault isolation – Fault notification (& alarm suppression) – Fault recovery
25 25 25
– Concepts: Domain, Domain Level, Maintenance Entity, Maintenance End Point, Maintenance Intermediate Point – Mechanisms: Connectivity Check, Tracepath, Loopback, AIS
26 26 26
27 27 27
sajassi@cisco.com