ce bridge interoperability
play

CE Bridge Interoperability - PowerPoint PPT Presentation

CE Bridge Interoperability (draft-sajassi-l2vpn-vpls-bridge-interop-00.txt) Ali Sajassi L2VPN WG November 2004 Cisco Systems 1 Agenda Motivation Behind VPLS L2VPN Framework Model for VPLS PE Discussion of Issues Next Steps 2


  1. CE Bridge Interoperability (draft-sajassi-l2vpn-vpls-bridge-interop-00.txt) Ali Sajassi L2VPN WG November 2004 Cisco Systems 1

  2. Agenda • Motivation Behind VPLS • L2VPN Framework Model for VPLS PE • Discussion of Issues • Next Steps 2

  3. Motivations Behind VPLS • It can support CE bridges as well as • It can support CE non-Bridges (e.g., routers/hosts) • If CE devices were only limited to IP routers/hosts, then IPLS could be used • => So if one of the fundamental premise behind VPLS is the support of CE bridges, then we’d better make sure it can do it right !! 3

  4. Motivations Behind VPLS - Continue • VPLS (as service) is a bridged LAN service • There are a number of bridging issues that need to be discussed and addressed • Many of previous discussions have been centered around signaling & auto-discovery • We need to pay attention to bridging issues if we want to offer proper multipoint Ethernet service 4

  5. ESI v.s. VPLS Instance 802.1ad Network C1 C1 L2TPv3 MPLS Network Network C1 • ESI – end-to-end service provided to C1 • VPLS Instance: LAN Emulation portion of ESI (as defined in L2VPN FRWK) 5

  6. Ethernet Service Types Ethernet ACs & Service Mapping Port-based Port-based w/ VLAN VLAN w/ tagged & mapping bundling untagged untagged Eth Port-based VPLS w/ untagged Unqualified N/A N/A ? ACs traffic Learning & Port-based VPLS w/ tagged & N/A Unqualified ? ? Srv untagged Learning Map VLAN VPLS mapping Qualified ? ? ? Learning !!! VLAN bundling N/A ? ? ? 6

  7. VPLS PE Model as Defined in L2VPN Framework Pseudowires PE LAN Emulation module VPLS FWDR VPLS Bridge FWDR Module • • VPLS Virtual Bridge Port Physical port (multiplexer) FWDR Toward CEs 7

  8. VPLS PE Model as Defined in L2VPN Framework – Continue Pseudowires PE LAN Emulation module VPLS FWDR C-VLAN bridge S-VLAN VPLS bridge C-VLAN FWDR bridge module • C-VLAN bridge • VPLS Virtual Bridge Port (multiplexer) FWDR If a PE is modeled as such, then it can handled all of the previously mentioned services 8

  9. VPLS as LAN (VLAN) Emulation VPLS as (V)LAN Emulation 9

  10. H-VPLS with MPLS Access u-PE u-PE CE-d VPLS as LAN Emulation CE-a n-PE n-PE u-PE u-PE CE-e CE-b n-PE VPLS as “Bridged LAN” Service CE-c 10 10 10

  11. H-VPLS with QinQ Access VPLS as LAN Emulation n-PE u-PE n-PE u-PE CE-d CE-a CE-e u-PE CE-b u-PE VPLS as “Bridged LAN” Service CE-c 11 11 11

  12. Bridge Interoperability Issues 1. CE Bridge Protocol Handling 2. Customer Network Topology Changes 3. Redundancy 4. MAC Address Scalability 5. Partial-mesh PWs 6. Multicast Traffic 7. Inter-operability with 802.1ad Provider Bridges 12 12 12

  13. 1) Protocol Handling of CE Bridge • Customer Bridge can run the following protocols: – GARP (802.1D), GMRP (802.1D), GVRP (802.1Q) – STP (802.1D), RSTP (802.1W), MSTP (802.1S) – Pause (802.3 Clause 31) – LACP (802.3 Clause 43) – OAM (802.3ah) – LLDP (802.1ab) – Slow Protocols – Port-based Network Access Control (802.1X) 13 13 13

  14. 1) Protocol Handling of CE Bridge – cont. • Depending on the type of AC, the PE needs to do one of the following with respect to each customer protocol: – Operate transparently – Discard them – Peer with them – Snoop them 14 14 14

  15. 1) Protocol Handling of CE Bridge – cont. • IEEE 802.1ad – reserves a block of 16 MAC addresses for the operation of customer bridges – describes which of these reserved MAC addresses to be used for peering & how the peering is performed – describes how & where to do discarding customer protocols (filtering action) – describes how & where to tunnel them • IEEE 802.1ad bridge model facilitates all these operation 15 15 15

  16. 16 16 16 2) Customer Topology Change Provider Network Customer Network

  17. 2) Customer Topology Change – Cont. • If There is a Customer Topology Change, then – Customer activates its backup link for a subset of its VLANs (e.g., each link can be used for a subset of VLANs for load sharing) – Customer sends a Topology Change Notification (TCN) over this newly activated link – PE needs to understand and flush its MAC addresses – Receiving PE needs to propagate it to all other PEs – If any PE along the path doesn’t take any action, then customer frames will be black holed • IEEE 802.1ad snoops the customer TCN and generates Customer Change Notification (CCN) message • CCN message must be per Provider VLAN (S-VLAN) – e.g., it must be per VPLS instance such that only MAC addresses associated with that VPLS instance is flushed • IEEE 802.1ai is planned to be used for aggregating all TCN messages from different customers • It is easier to directly process these in-band CCN than converting them into out-of-band messages (LDP MAC address withdrawal) 17 17 17

  18. 3) Redundancy & Inefficient Replication 2c 1c P P 2g 1f 2d 1d 2h 2f B 1g B 2i 1e Pseudowire 2e mesh • There is a full-mesh of PWs (for a given service instance) among the four PEs of the two island • Even though there are 6 PWs, only a single one (shown in solid line) is needed for that service instance but instead 3 PWs are used • Because when a Primary PE is selected, then all its PWs are selected 18 18 18

  19. 4) MAC Address Learning • If customer use bridges instead of routers, then service providers can expect large number of customer MAC addresses • If each customer uses 1000 MAC addresses, then for a 1000 such customers, there will be 1M MAC addresses in the provider network (or even a PE) 19 19 19

  20. 4) MAC Address Learning – Cont. • IEEE 802.1 suggests two mechanism to deal with this issue: – Don’t learn MAC addresses unless you have to (as described in 802.1ad) – Encapsulate customer MAC addresses using 802.1ah 20 20 20

  21. 5) Partial Mesh Connectivity • Partial Mesh can be caused due to: – A failure in discovery mechanism – e.g., a PE doesn’t get a full membership list – A PW fails to come up from the start – A PW failure occurs due to hw or sw failure (soft failure) – Node or Link failure along the path (including PEs) 21 21 21

  22. 5) Partial Mesh Connectivity – Cont. • Failure to detect PW failure can result in – L3 control and routing protocols to misbehave [rosen-mesh- failure] – broadcast storm in the customer and provider network – multiple copies of a single frame to be received by CE and/or PEs • Need to detect partial mesh failure • Need to recover from partial mesh failure • draft-rosen-l2vpn-mesh-failure suggests a mechanism for partial mesh detection • no other proposal is on the table 22 22 22

  23. Issues 6 & 7 • 6) Handling of CE multicast – bridge control protocols – bridge data (non-IP) – bridge data (IP) • 7) Inter-operability between IEEE 802.1ad Bridges and VPLS PEs 23 23 23

  24. 8) Fault Management • Service Providers need to be able to check the integrity of the service offered to their customers (from ACs to ACs) – Fault detection – Fault verification – Fault isolation – Fault notification (& alarm suppression) – Fault recovery 24 24 24

  25. 8) Fault Management – Cont. • IEEE 802.1ag addresses this issue comprehensively and introduces the following concepts and mechanisms: – Concepts: Domain, Domain Level, Maintenance Entity, Maintenance End Point, Maintenance Intermediate Point – Mechanisms: Connectivity Check, Tracepath, Loopback, AIS 25 25 25

  26. Next Step • Have more discussions on these issues to ensure that they are clear to everyone • Have compliancy matrix on the bridge interop features listed in this draft • Adopt this draft as WG document 26 26 26

  27. 27 27 27 Thank you! Thank you! sajassi@cisco.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend