CE Bridge Interoperability - - PowerPoint PPT Presentation

ce bridge interoperability
SMART_READER_LITE
LIVE PREVIEW

CE Bridge Interoperability - - PowerPoint PPT Presentation

CE Bridge Interoperability (draft-sajassi-l2vpn-vpls-bridge-interop-00.txt) Ali Sajassi L2VPN WG November 2004 Cisco Systems 1 Agenda Motivation Behind VPLS L2VPN Framework Model for VPLS PE Discussion of Issues Next Steps 2


slide-1
SLIDE 1

1

CE Bridge Interoperability

(draft-sajassi-l2vpn-vpls-bridge-interop-00.txt)

Ali Sajassi L2VPN WG November 2004

Cisco Systems

slide-2
SLIDE 2

2

Agenda

  • Motivation Behind VPLS
  • L2VPN Framework Model for VPLS PE
  • Discussion of Issues
  • Next Steps
slide-3
SLIDE 3

3

Motivations Behind VPLS

  • It can support CE bridges as well as
  • It can support CE non-Bridges (e.g., routers/hosts)
  • If CE devices were only limited to IP routers/hosts,

then IPLS could be used

  • => So if one of the fundamental premise behind VPLS

is the support of CE bridges, then we’d better make sure it can do it right !!

slide-4
SLIDE 4

4

Motivations Behind VPLS - Continue

  • VPLS (as service) is a bridged LAN service
  • There are a number of bridging issues that need to

be discussed and addressed

  • Many of previous discussions have been centered

around signaling & auto-discovery

  • We need to pay attention to bridging issues if we

want to offer proper multipoint Ethernet service

slide-5
SLIDE 5

5

ESI v.s. VPLS Instance

  • ESI – end-to-end service provided to C1
  • VPLS Instance: LAN Emulation portion of ESI (as

defined in L2VPN FRWK)

C1 C1 C1 L2TPv3 Network MPLS Network 802.1ad Network

slide-6
SLIDE 6

6

Ethernet Service Types

? ? ?

N/A VLAN bundling

?

VPLS Qualified Learning !!!

? ?

VLAN mapping

? ?

VPLS Unqualified Learning N/A Port-based w/ tagged & untagged N/A

?

N/A VPLS Unqualified Learning Port-based w/ untagged traffic

Eth ACs & Srv Map

VLAN bundling VLAN mapping Port-based w/ tagged & untagged Port-based w/ untagged

Ethernet ACs & Service Mapping

slide-7
SLIDE 7

7

Virtual Bridge Port (multiplexer)

VPLS PE Model as Defined in L2VPN Framework

VPLS FWDR VPLS FWDR VPLS FWDR Pseudowires

PE

  • LAN Emulation

module Physical port Toward CEs Bridge Module

slide-8
SLIDE 8

8

Virtual Bridge Port (multiplexer)

VPLS PE Model as Defined in L2VPN Framework – Continue

VPLS FWDR VPLS FWDR VPLS FWDR Pseudowires

PE

  • LAN Emulation

module

S-VLAN bridge module C-VLAN bridge C-VLAN bridge C-VLAN bridge

If a PE is modeled as such, then it can handled all of the previously mentioned services

slide-9
SLIDE 9

9

VPLS as LAN (VLAN) Emulation

VPLS as (V)LAN Emulation

slide-10
SLIDE 10

10 10 10

H-VPLS with MPLS Access

CE-a CE-b CE-c

VPLS as LAN Emulation

CE-d CE-e n-PE u-PE n-PE n-PE u-PE u-PE u-PE

VPLS as “Bridged LAN” Service

slide-11
SLIDE 11

11 11 11

H-VPLS with QinQ Access

CE-a CE-b CE-c CE-d CE-e n-PE u-PE u-PE u-PE u-PE n-PE

VPLS as “Bridged LAN” Service

VPLS as LAN Emulation

slide-12
SLIDE 12

12 12 12

Bridge Interoperability Issues

  • 1. CE Bridge Protocol Handling
  • 2. Customer Network Topology Changes
  • 3. Redundancy
  • 4. MAC Address Scalability
  • 5. Partial-mesh PWs
  • 6. Multicast Traffic
  • 7. Inter-operability with 802.1ad Provider Bridges
slide-13
SLIDE 13

13 13 13

1) Protocol Handling of CE Bridge

  • Customer Bridge can run the following protocols:

– GARP (802.1D), GMRP (802.1D), GVRP (802.1Q) – STP (802.1D), RSTP (802.1W), MSTP (802.1S) – Pause (802.3 Clause 31) – LACP (802.3 Clause 43) – OAM (802.3ah) – LLDP (802.1ab) – Slow Protocols – Port-based Network Access Control (802.1X)

slide-14
SLIDE 14

14 14 14

1) Protocol Handling of CE Bridge – cont.

  • Depending on the type of AC, the PE needs to do one
  • f the following with respect to each customer

protocol:

– Operate transparently – Discard them – Peer with them – Snoop them

slide-15
SLIDE 15

15 15 15

1) Protocol Handling of CE Bridge – cont.

  • IEEE 802.1ad

– reserves a block of 16 MAC addresses for the operation of customer bridges – describes which of these reserved MAC addresses to be used for peering & how the peering is performed – describes how & where to do discarding customer protocols (filtering action) – describes how & where to tunnel them

  • IEEE 802.1ad bridge model facilitates all these operation
slide-16
SLIDE 16

16 16 16

2) Customer Topology Change

Customer Network Provider Network

slide-17
SLIDE 17

17 17 17

2) Customer Topology Change – Cont.

  • If There is a Customer Topology Change, then

– Customer activates its backup link for a subset of its VLANs (e.g., each link can be used for a subset of VLANs for load sharing) – Customer sends a Topology Change Notification (TCN) over this newly activated link – PE needs to understand and flush its MAC addresses – Receiving PE needs to propagate it to all other PEs – If any PE along the path doesn’t take any action, then customer frames will be black holed

  • IEEE 802.1ad snoops the customer TCN and generates Customer

Change Notification (CCN) message

  • CCN message must be per Provider VLAN (S-VLAN) – e.g., it must be

per VPLS instance such that only MAC addresses associated with that VPLS instance is flushed

  • IEEE 802.1ai is planned to be used for aggregating all TCN messages

from different customers

  • It is easier to directly process these in-band CCN than converting them

into out-of-band messages (LDP MAC address withdrawal)

slide-18
SLIDE 18

18 18 18

3) Redundancy & Inefficient Replication

  • There is a full-mesh of PWs (for a given service instance)

among the four PEs of the two island

  • Even though there are 6 PWs, only a single one (shown in solid

line) is needed for that service instance but instead 3 PWs are used

  • Because when a Primary PE is selected, then all its PWs are

selected

1g 1f 1d 1c 1e 2e 2i 2h 2g 2c 2f 2d P B B P Pseudowire mesh

slide-19
SLIDE 19

19 19 19

4) MAC Address Learning

  • If customer use bridges instead of routers, then

service providers can expect large number of customer MAC addresses

  • If each customer uses 1000 MAC addresses, then for

a 1000 such customers, there will be 1M MAC addresses in the provider network (or even a PE)

slide-20
SLIDE 20

20 20 20

4) MAC Address Learning – Cont.

  • IEEE 802.1 suggests two mechanism to deal with this

issue:

– Don’t learn MAC addresses unless you have to (as described in 802.1ad) – Encapsulate customer MAC addresses using 802.1ah

slide-21
SLIDE 21

21 21 21

5) Partial Mesh Connectivity

  • Partial Mesh can be caused due to:

– A failure in discovery mechanism – e.g., a PE doesn’t get a full membership list – A PW fails to come up from the start – A PW failure occurs due to hw or sw failure (soft failure) – Node or Link failure along the path (including PEs)

slide-22
SLIDE 22

22 22 22

5) Partial Mesh Connectivity – Cont.

  • Failure to detect PW failure can result in

– L3 control and routing protocols to misbehave [rosen-mesh- failure] – broadcast storm in the customer and provider network – multiple copies of a single frame to be received by CE and/or PEs

  • Need to detect partial mesh failure
  • Need to recover from partial mesh failure
  • draft-rosen-l2vpn-mesh-failure suggests a

mechanism for partial mesh detection

  • no other proposal is on the table
slide-23
SLIDE 23

23 23 23

Issues 6 & 7

  • 6) Handling of CE multicast

– bridge control protocols – bridge data (non-IP) – bridge data (IP)

  • 7) Inter-operability between IEEE 802.1ad Bridges

and VPLS PEs

slide-24
SLIDE 24

24 24 24

8) Fault Management

  • Service Providers need to be able to check the

integrity of the service offered to their customers (from ACs to ACs)

– Fault detection – Fault verification – Fault isolation – Fault notification (& alarm suppression) – Fault recovery

slide-25
SLIDE 25

25 25 25

8) Fault Management – Cont.

  • IEEE 802.1ag addresses this issue comprehensively

and introduces the following concepts and mechanisms:

– Concepts: Domain, Domain Level, Maintenance Entity, Maintenance End Point, Maintenance Intermediate Point – Mechanisms: Connectivity Check, Tracepath, Loopback, AIS

slide-26
SLIDE 26

26 26 26

Next Step

  • Have more discussions on these issues to ensure

that they are clear to everyone

  • Have compliancy matrix on the bridge interop

features listed in this draft

  • Adopt this draft as WG document
slide-27
SLIDE 27

27 27 27

Thank you! Thank you!

sajassi@cisco.com