services using e tree service type
play

Services Using E-Tree Service Type Ethernet Private Tree (EP-Tree) - PowerPoint PPT Presentation

E-TREE Requirements and Solution space Jim Uttaro (uttaro@att.com) Nick Delregno (nick.delregno@verizon.com) Florin Balus (florin.balus@alcatel-lucent.com) Services Using E-Tree Service Type Ethernet Private Tree (EP-Tree) and Ethernet


  1. E-TREE Requirements and Solution space Jim Uttaro (uttaro@att.com) Nick Delregno (nick.delregno@verizon.com) Florin Balus (florin.balus@alcatel-lucent.com)

  2. Services Using E-Tree Service Type • Ethernet Private Tree (EP-Tree) and Ethernet Virtual Private Tree (EVP-Tree) Services – Enables Point-to-Multipoint Services with less provisioning than typical hub and spoke configuration using E-Lines • Provides traffic separation between users with traffic from one “leaf” being allowed to arrive at one of more “Roots” but never being transmitted to other “leaves” Leaf UNI UNI CE Root Leaf UNI UNI Leaf CE CE UNI Carrier Ethernet Network CE E-Tree is referenced in MEF 10.1 as Rooted-Multipoint EVC 2

  3. E-TREE challenges CE Root Leaf UNI UNI CE PE UNI CE PE Carrier Ethernet Leaf Leaf Network UNI PE CE Leaf Root UNI PE PE UNI CE Root 3 CE UNI UNI Leaf Leaf 1. Standardized, interoperable solution for all traffic types? 2. How to distinguish Leaf from Root originated traffic CE CE between two Leaf & Root PEs? 3 | ETREE discussion | March 2010

  4. E-Tree many scenarios: multiple technologies combined across different domains L Leaf endpoint (MEF UNI, ENNI, VUNI) L Root endpoint (MEF UNI, ENNI, VUNI) R R L L R L L L L L Long Haul L Metro Core Metro Access L L L L L L L L Domains Metro Access/Aggregation Metro Core Long Haul (WAN) Possible Native Ethernet (PB/PBB) or Native Ethernet (PBB) or VPLS/PBB-VPLS (LDP/BGP) Technologies VPLS/PBB-VPLS (LDP/BGP) VPLS/PBB-VPLS (LDP/BGP) Use Case Native Ethernet PB (QinQ) Native Ethernet (PBB) PBB-VPLS (LDP) example 1 Use Case Native Ethernet PB VPLS (LDP) example 2 Use Case Native Ethernet PB VPLS (BGP) example 3 Use Case VPLS (LDP) VPLS (BGP) example 4 4 | ETREE discussion | March 2010

  5. Available technologies Service Data Plane  Ethernet switching common across technologies  QinQ SVIDs, PBB ISIDs and/or VPLS PWs as Carrier service infrastructure Control Plane used for setting up the Service Infrastructure  BGP - BGP VPLS or LDP VPLS with BGP-AD  LDP - LDP VPLS with no BGP-AD  Native Ethernet – e.g. MRP, SPB/SPBB 5 | ETREE discussion | March 2010

  6. E-Tree solution option 1 – Control the PW topology Leaf endpoint L Root endpoint R L R1 L L L Long Haul Metro Core Metro Access L L L L L L L L Do not build PW infrastructure between Leaf PEs (no PWs between Leaf VSIs)  Control the PW topology, potentially using BGP RTs  BGP RT approach used already in L3 VPNs for similar functions 6 | ETREE discussion | March 2010

  7. E-Tree solution option 2 – use Root/Leaf Tag to filter traffic between Leaf endpoints L Leaf endpoint L Root endpoint R R2 L L R1 L L L L L Long Haul Metro Core L Metro Access L L2 L L L1 L Tag traffic differently depending on the entry endpoint in the service  If incoming on a leaf endpoint – add tag L, see example L1 R2  If incoming on a root endpoint – add tag R, traffic distributed everywhere, see example Do not send traffic marked with tag L out on leaf endpoints, see example L2 7 | ETREE discussion | March 2010

  8. E-Tree solution option 2 – use Root/Leaf Tag to filter traffic between Leaf endpoints L Leaf endpoint L Root endpoint R R2 L L R1 L L L L L Long Haul Metro Core L Metro Access L L2 L L L1 L What can be used as R/L tag? Option 2a. Use the PW information - CW bit (proposal discussed in IETF) Option 2b . Use a field from the Ethernet header – VLAN (proposals discussed in IEEE, ITU-T) Option 2a or 2b can be combined with Option 1 where available 8 | ETREE discussion | March 2010

  9. Comparison of possible ETREE solutions Proposed solutions Pros Cons Option 1: Control PW Minimal/no standard work No support for native Ethernet (PW-only) topology No tag required No support for PBB-VPLS M:1 model (requires dedicated B-VPLS per service) May require standard work in L2VPN Option 2a: PW CW bit No overhead, re-using existing CW bit No support for native Ethernet May re-use Option 1 as a complementary Challenges supporting PBB-VPLS M:1 model mechanism where available to optimize BW usage (requires dedicated B-VPLS per service) Requires standard work in L2VPN Option 2b: VLAN-tag Common for all technologies May require 4 bytes overhead if additional SP (IEEE/ITU-T) No need for interworking at gateways VLAN is inserted Supported across technologies Requires standard work in IEEE May re-use Option 1 as a complementary mechanism where available to optimize BW usage 9 | ETREE discussion | March 2010

  10. E-Tree solution for 2 (Leaf + Root) PEs using only option 1 (PW only environment) Leaf endpoint L R2 Root endpoint R R1 Split Horizon L L L L Long Haul Metro Core Metro Access L L Do not build PW infrastructure between Leaf PEs (no PWs between Leaf VSIs)  Control the PW topology, potentially using BGP RTs  Split Horizon Groups are required to prevent loops 10 | ETREE discussion | March 2010

  11. E-Tree solution for 2 (Leaf + Root) PEs using option 1 + option 2b Leaf endpoint L R2 Root endpoint R L R1 L Split Horizon L L Long Haul Metro Core Metro Access L L Option 1: Do not build PW infrastructure between Leaf PEs (no PWs between Leaf VSIs) Option 2b: Use VLAN Tag to simplify the PW topology and to support native Ethernet 11 | ETREE discussion | March 2010

  12. To discuss  Is IEEE proposed solution (Option 2b, VLAN-based tag) acceptable as a baseline?  If it is then we do not need multiple data plane based solutions  If not should L2VPN do a separate solution? Or should we just send a liaison to IEEE explaining L2VPN position?  What kind of optimizations are required more than Option 1?  Do we need any L2VPN work here?  Need to keep the number of ETREE solutions to common and minimal set  Avoid duplication and/or multiple solutions where possible. 12 | ETREE discussion | March 2010

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend