SlideShare uma empresa Scribd logo
1 de 156
1 © Nokia 2017
MPLS-based Metro
Ethernet Networks
Public
A tutorial
• Paresh Khatri
• 01-03-2017
2 © Nokia 2017
1. Introduction
2. Introduction to Metro Ethernet Services
3. Traditional Metro Ethernet networks
4. Delivering Ethernet over MPLS
5. Summary
6. Questions
Public
Agenda
3 © Nokia 2017
introduction
Public
4 © Nokia 2017
• Paresh Khatri (paresh.khatri@nokia.com)
- Chief Architect – IP Routing & Transport APAC, Alcatel-Lucent
• Key focus areas:
- End-to-end network architectures
- SDN/NFV
- Large-scale IP/MPLS networks
- L2/L3 VPNs
- Carrier Ethernet
- Next-generation mobile backhaul networks
• Acknowledgements:
- Some figures and text are provided courtesy of the Metro Ethernet Forum (MEF)
Public
Introduction
5 © Nokia 2017
introduction to metro
ethernet services
Public
6 © Nokia 2017
2. Introduction to Metro Ethernet Services
a) Why Metro Ethernet ?
b) Attributes of Carrier Ethernet
c) Carrier Ethernet Services defined by the MEF
Public
Agenda
7 © Nokia 2017
2.1 Why Metro Ethernet ?
Public
8 © Nokia 2017
Introduction to Metro Ethernet Services
Public
What is Metro Ethernet ?
“… generally defined as the network that bridges or
connects geographically separated enterprise LANs
while also connecting across the WAN or backbone
networks that are generally owned by service providers.
The Metro Ethernet Networks provide connectivity
services across Metro geography utilising Ethernet as
the core protocol and enabling broadband
applications”
from “Metro Ethernet Networks – A Technical Overview” from the
Metro Ethernet Forum
9 © Nokia 2017
• Benefits both providers and customers in numerous ways …
• Packet traffic has now overtaken all other traffic types
• Need for rapid provisioning
• Reduced CAPEX/OPEX
• Increased and flexible bandwidth options
• Well-known interfaces and technology
Public
Introduction to Metro Ethernet Services
Why Metro Ethernet ?
10 © Nokia 2017
2.2 Attributes of Carrier Ethernet
Public
11 © Nokia 2017
• Carrier Ethernet is a ubiquitous, standardized,
carrier-class SERVICE defined by five
attributes that distinguish Carrier Ethernet
from familiar LAN based Ethernet
• It brings the compelling business
benefit of the Ethernet cost model
to achieve significant savings
Carrier
Ethernet
• Scalability
• Standardized Services
• Service Management
• Quality of Service
• Reliability
Carrier
Ethernet
Attribute
s
The 5 Attributes of Carrier Ethernet
Public
12 © Nokia 2017
2.3 Carrier Ethernet Services defined
by the MEF
Public
13 © Nokia 2017
• What do we mean by Metro Ethernet services ?
- Use of Ethernet access tails
- Provision of Ethernet-based services across the MAN/WAN
• Point-to-point
• Point-to-multipoint
• Multipoint-to-multipoint
- However, the underlying infrastructure used to deliver Ethernet services does NOT have to be
Ethernet !!!
- Referred to as Carrier Ethernet services by the Metro Ethernet Forum
• The terms “Carrier Ethernet” and “Metro Ethernet” are used interchangeably in this presentation, but in the
strict sense of the term, “Carrier Ethernet” refers to the carrier-grade evolution of “Metro Ethernet”
Public
Introduction to Metro Ethernet Services
What do we mean by Metro Ethernet services ?
14 © Nokia 2017
Carrier Ethernet
Network
UNI
• The UNI is the physical interface or port that is the demarcation between the customer
and the service provider/Cable Operator/Carrier/MSO
• The UNI is always provided by the Service Provider
• The UNI in a Carrier Ethernet Network is a standard physical Ethernet Interface at
operating speeds 10Mbs, 100Mbps, 1Gbps or 10Gbps
Public
MEF Carrier Ethernet Terminology
The User Network Interface (UNI)
CE: Customer Equipment, UNI: User Network Interface. MEF certified Carrier Ethernet products
CE
15 © Nokia 2017
Carrier Ethernet
Network
UNI
• MEF has defined two types of UNIs:
- MEF UNI Type I (MEF 13)
• A UNI compliant with MEF 13
• Manually configurable
• Specified for existing Ethernet devices
• Provides bare minimum data-plane connectivity services with no control-plane or management-plane
capabilities.
- MEF UNI Type II (MEF 20)
• Automatically configurable via E-LMI (allowing UNI-C to retrieve EVC status and configuration information from
UNI-N)
• Manageable via OAM
Public
MEF Carrier Ethernet Terminology
The User Network Interface (UNI):
CE: Customer Equipment, UNI: User Network Interface. MEF certified Carrier Ethernet products
CE UNI
16 © Nokia 2017 Public
MEF Carrier Ethernet Terminology
MetroMetro
EthernetEthernet
NetworkNetwork
CustomerCustomer
EdgeEdge
(CE)(CE)
User NetworkUser Network
InterfaceInterface
(UNI)(UNI)
User NetworkUser Network
InterfaceInterface
(UNI)(UNI)
CustomerCustomer
EdgeEdge
(CE)(CE)
• Customer Equipment (CE) attaches to the Metro Ethernet Network (MEN) at the UNI
- Using standard Ethernet frames.
• CE can be
- Router or bridge/switch - IEEE 802.1 bridge
17 © Nokia 2017
UNI: User Network Interface, UNI-C: UNI-customer side, UNI-N network side
NNI: Network to Network Interface, E-NNI: External NNI; I-NNI Internal NNI
MEF Ethernet Services Model
Public
Ethernet Services “Eth” Layer
Subscriber Site
Service Provider 2
Metro Ethernet Network
Subscriber Site
ETH
UNI-C
ETH
UNI-N
ETH
UNI-N
ETH
UNI-N
ETH
UNI-N
ETH
UNI-C
Service Provider 1
Metro Ethernet Network
18 © Nokia 2017
• An Ethernet Service Instantiation
- Most commonly (but not necessarily) identified via a VLAN-ID
- Like Frame Relay and ATM PVCs or SVCs
• Connects two or more subscriber sites (UNI’s)
- Can multiplex multiple EVCs on the same UNI
- An association of two or more UNIs
• Prevents data transfer between sites that are not part of the same EVC
Public
MEF Carrier Ethernet Terminology
Ethernet Virtual Connection (EVC)
19 © Nokia 2017
MEF Carrier Ethernet Terminology
Public
Ethernet Virtual Connection (EVC)
UNI
MEN
UNI
Point-to-Point EVC
MEN
Multipoint-to-Multipoint EVC
MEN
Rooted-Multipoint EVC
Leaf
Leaf
Leaf
Root
Three types of EVC:
20 © Nokia 2017
E-LINE
E-LAN
E-TREE
Point-to-Point EVC
CE
UNI UNI
CE
CE
UNI CE
UNI
Multipoint EVC
Rooted Multipoint EVC
CE UNI
CE
UNI
CE
UNI
Basic Carrier Ethernet Services
Public
Point to Point
Service Type used to create
•Ethernet Private Lines
•Virtual Private Lines
•Ethernet Internet Access
Point to Multi-Point
•Efficient use of Service
Provider ports
•Foundation for Multicast
networks e.g. IPTV
Multi-Point to Multi-Point
Service Type used to create
•Multipoint Layer 2 VPNs
•Transparent LAN Service
21 © Nokia 2017
In a Carrier Ethernet network, data is transported
across Point-to-Point, Multipoint-to-Multipoint and
Point-to-Multipoint EVCs according to the attributes
and definitions of the E-Line, E-LAN and E-Tree
services respectively.
EVCs and Services
Public
Point-to-Point EVC
Carrier Ethernet
Network
UNI UNI
22 © Nokia 2017
• Replaces a TDM Private line
• Dedicated UNIs for Point-to-Point connections
• Single Ethernet Virtual Connection (EVC) per UNI
Public
Services Using E-Line Service Type
Ethernet Private Line (EPL)
Point-to-Point EVC
Carrier Ethernet
Network
CE UNI
CE
UNI
CE
UNI
ISP
POP
UNI
Storage Service
Provider
Internet
23 © Nokia 2017
• Replaces Frame Relay or ATM services
• Supports Service Multiplexed UNI
(i.e. multiple EVCs per UNI)
• Allows single physical connection (UNI) to customer premise equipment for multiple
virtual connections
• This is a UNI that must be configurable to support Multiple EVCs per UNI
Public
Services Using E-Line Service Type
Ethernet Virtual Private Line (EVPL)
Service
Multiplexe
d Ethernet
UNI
Multipoint-to-Multipoint EVC
Carrier Ethernet Network
CE UNI
CE
UNI
CE
UNI
24 © Nokia 2017
• Supports dedicated or service-multiplexed UNIs
• Supports transparent LAN services and multipoint VPNs
Public
Services Using E-LAN Service Type
Ethernet Private LAN and Ethernet Virtual Private LAN Services
Service
Multiplexe
d Ethernet
UNI
Point-to-Multipoint EVC
Carrier
Ethernet
Network
CE
UNI
UNI
UNI
CE
UNI
CE
25 © Nokia 2017
• Enables Point-to-Multipoint Services with less provisioning than typical hub and spoke
configuration using E-Lines
- Provides traffic separation between users with traffic from one “leaf” being allowed to arrive at one
of more “roots” but never being transmitted to other “leaves”
Public
Services Using E-Tree Service Type
Ethernet Private Tree (EP-Tree) and Ethernet Virtual Private Tree (EVP-Tree)
Services
Root
Carrier Ethernet Network
CE
UNI
UNI
UNI
CE
CE
Leaf
Leaf
UNI
CE
Leaf
Rooted-Multipoint EVC
Ethernet Private Tree example
26 © Nokia 2017
Name any two of the five attributes of Carrier Ethernet
as defined by the Metro Ethernet Forum.
Audience Question 1
Public
27 © Nokia 2017
traditional metro
ethernet services
Public
28 © Nokia 2017
3. Traditional Metro Ethernet Networks
a) Service Identification
b) Forwarding Mechanism
c) Resiliency and Redundancy
d) Recent Developments
e) Summary
Public
Agenda
29 © Nokia 2017
• Ethernet switching/bridging networks (802.1d/802.1q)
- Services identified by VLAN IDs/physical ports
- VLAN IDs globally significant
- Resiliency provided using variants of the Spanning Tree Protocol
Public
Traditional Metro Ethernet Networks
Traditional methods of Ethernet delivery
Ethernet Switches
CPE
CPE
CPE
CPE
CPE
CPE
CPE
CPE
Agg
Agg
Core
Core
Access
Access
Access
Access
Agg
Agg
Access
Access
Access
Access
Core
Core
CPE
CPE
CPE
CPE
CPE
CPE
CPE
CPE
30 © Nokia 2017
3.1 Service Identification
Public
31 © Nokia 2017
• Ethernet switching/bridging networks
• First generation was based on IEEE 802.1q switches
- One obvious limitation was the VLAN ID space – the 12-bit VLAN ID allows a maximum of 4094
VLANs (VLANs 0 and 4095 are reserved). This limited the total number of services in any one
switching/bridging domain.
- The other problem was that of customer VLAN usage – customers could not carry tagged traffic
transparently across the network
Public
Traditional Metro Ethernet Networks
Service Identification:
C-DA
C-SA
Payload
C-VID
Ethertype
Ethertype
VLAN ID
(12 bits)
PCP(3 bits)
0x8100
(16 bits)
CFI (1 bit)
Tag
Protocol
Identifer (TPID)
Tag
Control
Information
(TCI)
32 © Nokia 2017
• Q-in-Q (aka VLAN stacking, aka 802.1ad) comes to the rescue !
- Q-in-Q technology, which has now been standardised by the IEEE as 802.1ad (Provider Bridging),
allowed the addition of an additional tag to customer Ethernet frames – the S-tag. The S-tag
(Service Tag) was imposed by the Service Provider and therefore, it became possible to carry
customer tags (C-tags) transparently through the network.
Public
Traditional Metro Ethernet Networks
Service Identification
Provider
Bridge
Customer
Device
C-DA
C-SA
Payload
S-VID
C-VID
Ethertype
Ethertype
Ethertype
VLAN ID
(12 bits)
PCP(3 bits)
0x88a8
(16 bits)
DEI (1 bit)
Tag
Protocol
Identifer (TPID)
Tag
Control
Information
(TCI)
C-DA
C-SA
Payload
C-VID
Ethertype
Ethertype
33 © Nokia 2017
• Some important observations about Q-in-Q:
- This is not a new encapsulation format; it simply results in the addition of a second tag
to the customer Ethernet frame, allowing any customer VLAN tags to be preserved
across the network
- There is no change to the customer destination or source MAC addresses
- The number of distinct service instances within each Provider Bridging domain is still
limited by the S-VLAN ID space i.e. 4094 S-VLANs. The difference is that customer
VLANs can now be preserved and carried transparently across the provider network.
Public
Traditional Metro Ethernet Networks
Service Identification
34 © Nokia 2017
3.2 Forwarding Mechanism
Public
35 © Nokia 2017
• Dynamic learning methods used to build forwarding databases
Public
Traditional Metro Ethernet Networks
Forwarding Mechanism
MAC Learning Points
CPE
CPE
CPE
CPE
CPE
CPE
CPE
CPE
Agg
Agg
Core
Core
Access
Access
Access
Access
Agg
Agg
Access
Access
Access
Access
Core
Core
CPE
CPE
CPE
CPE
CPE
CPE
CPE
CPE
36 © Nokia 2017
• Dynamic learning methods used to build forwarding databases
Public
Traditional Metro Ethernet Networks
Forwarding Mechanism
Forwarding Database – E1
MAC Interface
MAC-A i1
MAC-B i2
MAC-C i2
i1
i2
i3
i4
i5
i6 i7
i8
i9
Forwarding Database – E2
MAC Interface
MAC-A i6
MAC-B i7
MAC-C i6
Forwarding Database – E3
MAC Interface
MAC-A i8
MAC-B i8
MAC-C i9
Forwarding Database – C
MAC Interface
MAC-A i3
MAC-B i5
MAC-C i4
Provider
Switch
E1
CPE
(MAC A)
Provider
Switch
E2
Provider
Switch
C
Provider
Switch
E3
CPE
(MAC C)
CPE
(MAC B)
37 © Nokia 2017
• Dynamic learning methods used to build forwarding databases
- Data-plane process – there are no control-plane processes for discovering endpoint information
• In the worst case, ALL switches have forwarding databases that include ALL MAC
addresses. This is true even for switches in the core of the network (Switch C in
preceding example).
- Switches have limited resources for storing MAC addresses. This poses severe scaling issues in all
parts of the network. VLAN-stacking does not help with this problem.
- On topology changes, forwarding databases are flushed and addresses need to be re-learned.
While these addresses are re-learned, traffic to unknown destinations is flooded through the
network, resulting in wasted bandwidth.
Public
Traditional Metro Ethernet Networks
Forwarding Mechanism
38 © Nokia 2017
3.3 Resiliency and Redundancy
Public
39 © Nokia 2017
• Redundancy is needed in any network offering Carrier-grade Ethernet BUT loops are bad
!!
• The Spanning Tree Protocol (STP) is used to break loops in bridged Ethernet networks
- There have been many generations of the STP over the years
- All of these variants work by removing redundant links so that there is one, and only one, active
path from each switch to every other switch i.e. all loops are eliminated. In effect, a minimum cost
tree is created by the election of a root bridge and the subsequent determination of shortest-path
links to the root bridge from every other bridge
- Bridges transmit special frames called Bridge Protocol Data Units (BPDUs) to exchange information
about bridge priority, path costs etc.
- High Availability is difficult to achieve in traditional Metro Ethernet networks.
Public
Traditional Metro Ethernet Networks
Resiliency and Redundancy
40 © Nokia 2017
Traditional Metro Ethernet Networks
Public
Building the Spanning Tree …
10
10
20
10
Root Bridge
Rudimentary Traffic-Engineering Capabilities
Switch
A
Switch
B
Switch
C
Switch
D
Switch
A
Switch
B
Switch
C
Switch
D
41 © Nokia 2017
• Had a number of significant shortcomings:
- Convergence times – the protocol is timer-based with times in the order of 10s of seconds. After
network topology changes (failure or addition of links), it could take up to 50s for the network to re-
converge
- The protocol was VLAN-unaware, which meant that in an IEEE 802.1q network, all VLANs had to
share the same spanning tree. This meant that there were network links that would not be utilised
at all since they were placed into a blocked state.
• Many vendors implemented their own, proprietary extensions to the protocol to allow the use of a separate STP
instance per VLAN, allowing better link utilisation within the network
- There were many conditions which resulted in the inadvertent formation of loops in the network.
Given the flooding nature of bridged Ethernet, and the lack of a TTL-like field in Ethernet frames,
looping frames could loop forever.
• There are numerous well-publicised instances of network meltdowns in Enterprise and Service Provider networks
• A lot of service providers have been permanently scarred by the catastrophic effects of STP loops !
Public
Traditional Metro Ethernet Networks
First generation of STP (IEEE802.1d-1998)
42 © Nokia 2017
• Some major improvements:
- Dependence on timers is reduced. Negotiation protocols have been introduced to allow rapid
transitioning of links to a forwarding state
- The Topology Change process has been re-designed to allow faster recovery from topology
changes
- Optimisations for certain types of direct and indirect link failures
- Convergence times are now down to sub-second in certain special cases but a lot of failure cases
still require seconds to converge !
• But…
- The protocol was still VLAN-unaware, which meant that the issue of under-utilised links was still
present
Public
Traditional Metro Ethernet Networks
Newer generations of STP (IEEE802.1d-2004 – Rapid STP aka 802.1w)
43 © Nokia 2017
• Built on top of RSTP
• Added VLAN awareness:
- Introduces the capability for the existence of multiple STP instances within the same bridged
network
- Allows the association of VLANs to STP instances, in order to provide a (relatively) small number of
STP instances, instead of using an instance per VLAN.
- Different STP instances can have different topologies, which allows much better link utilisation
• BUT
- The stigma associated with past failures is hard to remove…
- The protocol is fairly complicated, compared to its much simpler predecessors
Public
Traditional Metro Ethernet Networks
Newer generations of STP (IEEE802.1q-2003 – Multiple STP aka 802.1s)
44 © Nokia 2017
3.4 Recent Developments
Public
45 © Nokia 2017
• Takes IEEE 802.1ad to the next level
• MAC-in-MAC technology:
- Customer Ethernet frames are encapsulated in a provider Ethernet frame
• Alleviates the MAC explosion problem
- Core switches no longer need to learn customer MAC addresses
• Does not address the STP issue, however.
Public
Recent Developments
Provider Backbone Bridging
46 © Nokia 2017
• Designed to interconnect Provider Bridge Networks (PBN - IEEE 802.1ad)
• Adds a Backbone Header to a Customer/QinQ Ethernet Frame
- Provider Addressing for Backbone Forwarding
- New extended tag for Service Virtualization
• Standardization ongoing
Public
Provider Backbone Bridging (PBB)
Ethernet Technology being standardized in IEEE 802.1ah Task Group
PBBN is Ethernet based:
Connectionless Forwarding based on MAC Learning & Forwarding,
Loop Avoidance based on STP,
VLAN ID for Broadcast Containment
PBN PBNPBBN
PBB
BEB
PBB
BEB
BEB:
Backbone Edge Bridge
Forward frames based on
backbone MAC addresses
47 © Nokia 2017
B-DA
B-SA
B-VID
I-SID
Ethertype
Ethertype
PBN
(QinQ)
PBN
(QinQ)
PBBN
PBB PE2
QinQ
frame
QinQ
frame
PBB
frame
B2
PBB PE1
B1B4
B6B5
B3
A1
CMAC=X
Backbone FIBs
A1->Port
Customer FIB
X->A1
Customer FIB
X->Port
CMAC=Y
MAC-based,
Connectionless
Forwarding
Backbone VLAN ID Broadcast Containment
Extended Service Tag Identifies the service instance inside PE
Backbone MACs
I1
I2
I1
I1
I2
IEEE 802.1ah Model for PBB – I and B Components
Public
C-DA
C-SA
Payload
S-VID
C-VID
Ethertype
Ethertype
Ethertype
C-DA
C-SA
Payload
S-VID
C-VID
Ethertype
Ethertype
Ethertype
C-DA
C-SA
Payload
S-VID
C-VID
Ethertype
Ethertype
Ethertype
48 © Nokia 2017
802.1ah Provider Backbone Bridge Encapsulation
Public
6+6
22 (w/o FCS)
2+2
2+4
I-TAG
B-TAG
S-TAG
C-TAG
DEI p bits VLAN-ID
I-PCP IDEI UCA Res I-SID
24313 1Bits
I-PCP = Customer Priority
I-DEI = Drop Elegibility
UCA = Use Customer Addresses
I-SID = Service Instance ID
B-DA
B-SA
B-TAG TCI
I-TAG TCI
ah Ethertype = 88e7
ad Ethertype = 88a8
C-DA
C-SA
Payload
S-TAG TCI
C-TAG TCI
ad Ethertype = 88a8
q Ethertype = 8100
Ethertype
49 © Nokia 2017
• Addresses the STP issue…
• SPBM is a Spanning-Tree Protocol replacement for PBB
• Being standardized in the IEEE in 802.1aq
- Shortest path backbone bridging Mac/VLAN Mode
• Requirements to address:
- No blocked ports like STP
- Fast resiliency
- No hop count restrictions like STP
- Simple networking paradigm
Public
Recent Developments
Shortest Path Bridging
50 © Nokia 2017
• Discover the network topology
- Enable a routing protocol on each system to discover the network topology
• Build shortest path trees between the network nodes
- To be used later for forwarding traffic on
• Distribute the service information to the network nodes
- Once services are created (i.e. ISIDs), the routing protocol is used to distribute the information to
all SPBM nodes
- All nodes (edge and core) are now aware of all VPNs and where the endpoints are.
• Update Forwarding Tables to connect the service nodes
- If the node determines that it is on the shortest path between endpoints for an ISID, it updates its
FIB for forwarding.
- When all nodes on shortest path complete the calculations, the VPN is connected!
Public
Shortest Path Bridging
How it works
51 © Nokia 2017
1. Discover network topology
• IS-IS enabled on nodes,
• Each node/link is automatically discovered
2. Nodes use IS-IS link state to automatically build trees from
itself to all nodes:
- Important properties:
• Shortest path tree based on link metrics
• No blocked links
• Loop free via RPFC on SA-BMAC
• Symmetric unicast/mcast datapath between any two
nodes provides closed OAM system
• unicast path now exists from every node to every other
node
3. Use IS-IS to advertise new services communities of interest
• MAC and ISID information flooded to the network
4. When nodes receive notice of a new service AND they are on
the shortest path, update FDB
• Unicast FIB entry – no flooding in BVPLS
• Mcast FIB entry – per ISID group MAC
Shortest Path Bridging - Operation
ISIS
ISIS ISIS
ISISISIS
ISIS
ISIS
ISIS ISIS
ISIS
ISIS
CREATE
ISID=100
100
100
100
100
100
100
Shortest path tree to node A shown
Node A
52 © Nokia 2017
2
43
1
2
43
1
2
43 1
3
2
1
4
4
2
1
3
Base SPBM Topology
SPT for node 1 SPT for node 2 SPT for node 3 SPT for node 4
Path from 1 to 4 are
symmetrical for SPT at
node 1 and SPT at node 4.
Same for all other node
pairs.
Shortest Path Bridging – SPT Example
Public
53 © Nokia 2017
3.5 Summary
Public
54 © Nokia 2017
• High Availability is difficult to achieve in networks running the Spanning Tree Protocol
• Scalability – IEEE 802.1q/802.1ad networks run into scalability limitations in terms of the
number of supported services
- Customer Ethernet frames are encapsulated in a provider Ethernet frame
• QoS – only very rudimentary traffic-engineering can be achieved in bridged Ethernet
networks.
• A lot of deployed Ethernet switching platforms lack carrier-class capabilities required for
the delivery of Carrier Ethernet services
• New extensions in IEEE 802.1ah address some limitations such as the number of service
instances and MAC explosion problems
• New extensions in IEEE 802.1aq address the replacement of the Spanning Tree Protocol
Public
Traditional Metro Ethernet Networks
Summary of Issues
55 © Nokia 2017
Which IEEE standard defines Provider Bridging (Q-in-Q)
?
Audience Question 2
Public
56 © Nokia 2017
What is the size of the I-SID field in IEEE 802.1ah?
Audience Question 3
Public
57 © Nokia 2017
delivering ethernet over
mpls
Public
58 © Nokia 2017
4. Delivering Ethernet over MPLS
a. Introduction to MPLS
b. The Pseudowire Reference Model
c. Ethernet Virtual Private Wire Service
d. Ethernet Virtual Private LAN Service
e. Scaling VPLS
f. VPLS Topologies
g. Resiliency Mechanisms
Public
Agenda
59 © Nokia 2017
4.1 Introduction to MPLS
Public
60 © Nokia 2017
- Convergence: From “MPLS over everything” to “Everything over MPLS” !
• One network, multiple services
- Excellent virtualisation capabilities
• Today’s MPLS network can transport IP, ATM, Frame Relay and even TDM !
- Scalability
• MPLS is used in some of the largest service provider networks in the world
- Advanced Traffic Engineering capabilities using RSVP-TE
- Rapid recovery based on MPLS Fast ReRoute (FRR)
• Rapid restoration around failures by local action at the Points of Local Repair (PLRs)
• Sub-50ms restoration on link/node failures is a key requirement for carriers who are used to such performance
in their SONET/SDH networks
- Feature-richness
• MPLS has 10 years of development behind it and continues to evolve today
- Layer 3 VPNs have already proven themselves as the killer app for MPLS – there is no reason why
this success cannot be emulated by Layer 2 VPNs
Public
Delivering Ethernet over MPLS
MPLS Attributes
61 © Nokia 2017
• MPLS is multiprotocol in terms of both the layers above and below it !
• The ultimate technology for convergence
Public
MPLS is truly Multi-Protocol
The “Multiprotocol” nature of MPLS
MPLS
Ethernet
Frame
Relay
ATM PoS PPP Etc.
Physical
Ethernet
Frame
Relay
ATM TDM IP Etc.
62 © Nokia 2017
• One common network supports multiple, different overlaid services
Public
MPLS Virtualisation
The virtualisation capabilities of MPLS
PE
PE
PE
PE
PE MPLS
P
P P
P
63 © Nokia 2017
• One common network supports multiple, different overlaid services
Public
MPLS Virtualisation
The virtualisation capabilities of MPLS
PE
PE
PE
PE
PE
VPLS
VPWS
L3VPN
MPLS
64 © Nokia 2017
• Service state is kept only on
the Provider Edge devices
• The Provider (P) devices
simply contain reachability
information to each other
and all PEs in the network
• The Provider Edge (PE)
devices contain customer
and service-specific state
MPLS Scalability
MPLS Scalability
PE
PE
PE
PE
PE MPLS
P
P P
P
No
customer
or service
state in
the core
65 © Nokia 2017
• The Problem: consider example below – all mission-critical traffic between nodes A and Z
has to use the path A-D-E-F-Z, while all other traffic uses the path A-B-C-Z.
Public
MPLS Traffic-Engineering
Traffic-Engineering capabilities
A Z
D E F
B C
Other traffic
Mission-critical traffic
66 © Nokia 2017
• The IGP-based solution
- Use link metrics to influence traffic path
- It’s all or nothing – Traffic cannot be routed selectively
• Other solutions
§ Policy-based routing – will work but is cumbersome to manage and has to be carefully crafted to
avoid routing loops
Public
MPLS Traffic-Engineering
A Z
D E F
B C10
10
10 10
30
10
10
Other traffic
Mission-critical traffic
67 © Nokia 2017
• Use constrained path routing to build Label Switched Paths (LSPs)
Public
MPLS Traffic-Engineering
The MPLS solution
§ Constrain LSP1 to use only the “orange” physical links
A Z
D E F
B C
Mission-critical
traffic
LSP 2
LSP 1
Other traffic
§ Constrain LSP2 to use only the “blue” physical links
§ At the PEs, map the mission-critical traffic to LSP2 and…
§ …all other traffic to LSP1
68 © Nokia 2017
• Step 1 – Detection of the failure
- One or more routers detect that a failure (link or node) has occurred
• Step 2 – Propagation of failure notification
- The router(s) detecting the failure inform other routers in the domain about the failure
• Step 3 – Recomputation of Paths/Routes
- All routers which receive the failure notification now have to recalculate new routes/paths by
running SPF algorithms etc
• Step 4 – Updating of the Forwarding Table
- Once new routes are computed, they are downloaded to the routers’ forwarding table, in order to
allow them to be used
• All of this takes time…
Public
MPLS Traffic-Engineering
Recovery from failures – typical IGP
69 © Nokia 2017
• What happens immediately after the link between C and Z fails ?
Public
MPLS Traffic-Engineering
Failure and Recovery Example – IGP-based
B
Z
Direction of traffic flow
§ Step 1 - Assuming a loss of signal (or similar physical indication) nodes C
and Z immediately detect that the link is down
§ Node A does not know that the link is down yet and keeps sending traffic
destined to node Z to Node C. Assuming that node C has not completed
step 4 yet, this traffic is dropped.
C
A
10
10
20
10
70 © Nokia 2017
• Node C (and node Z) will be the first to recalculate its routing table and update its
forwarding table (step 4).
Public
MPLS Traffic-Engineering
Failure and Recovery Example (continued) – IGP-based
§ In the meantime, Node A does not know that the link is down yet and keeps sending traffic destined
to node Z to Node C. Given that node C has completed step 4, it now believes (quite correctly) that
the best path to Z is via node A. BUT – node A still believes that the best path to node Z is via node C
so it sends the traffic right back to node C. We have a transient loop (micro-loop) ….
§ The loop resolves itself as soon as node A updates its forwarding table but in the meantime, valuable
packets have been dropped
B
Z
Direction of traffic flow C
A
10
10
20
10
71 © Nokia 2017
• Node A and all other nodes eventually update their forwarding tables and all is well again.
• But the damage is already done. . .
Public
MPLS Traffic-Engineering
Failure and Recovery Example (continued)
B
Z
Direction of traffic flow
C
A
10
10
20
10
72 © Nokia 2017
• RSVP-TE Fast Re-Route (FRR) pre-computes detours around potential failure points such
as next-hop nodes and links
• When link or node failures occur, the routers (Points of Local Repair) directly connected to
the failed link rapidly (sub-50ms) switch all traffic onto the detour paths.
• The network eventually converges and the head-end router (source of the traffic)
switches traffic onto the most optimal path. Until that is done, traffic flows over the
potentially sub-optimal detour path BUT the packet loss is kept to a minimum
Public
MPLS Traffic-Engineering
Recovery from failures – how can MPLS help ?
73 © Nokia 2017
• Node C pre-computes and builds a detour around link C-Z
Public
MPLS Traffic-Engineering
Failure and Recovery Example – with MPLS FRR
B
Z
Direction of traffic flowC
A
10
10
20
10
Bypass tunnel
74 © Nokia 2017
• When link C-Z fails, node C reroutes traffic onto the detour tunnel
• Traffic does a U-turn but still makes it to the destination
Public
MPLS Traffic-Engineering
Failure and Recovery Example – with MPLS FRR
B
Z
C
A
10
10
20
10
Direction of traffic flow
75 © Nokia 2017
What is the size of the MPLS label stack entry ?
And the MPLS label itself ?
Audience Question 4
Public
76 © Nokia 2017
4.2 The Pseudowire Reference
Model
Public
77 © Nokia 2017
• Key enabling technology for delivering Ethernet services over MPLS
• Specified by the pwe3 working group of the IETF
• Originally designed for Ethernet over MPLS (EoMPLS) – initially called Martini tunnels
• Now extended to many other services – ATM, FR, Ethernet, TDM
• Encapsulates and transports service-specific PDUs/Frames across a Packet Switched
Network (PSN) tunnel
• The use of pseudowires for the emulation of point-to-point services is referred to as
Virtual Private Wire Service (VPWS)
Public
The Pseudowire Reference Model
Pseudowires
78 © Nokia 2017
• IETF definition (RFC3985):
“...a mechanism that emulates the essential attributes of a
telecommunications service (such as a T1 leased line or Frame Relay)
over a PSN. PWE3 is intended to provide only the minimum necessary
functionality to emulate the wire with the required degree of
faithfulness for the given service definition.”
Public
The Pseudowire Reference Model
Pseudowires (cont.)
79 © Nokia 2017
PWE3 Reference Model
Public
Generic PWE3 Architectural Reference Model:
PSN
CE 1 CE 2
Emulated Service
Pseudowire
PSN Tunnel
Attachment
Circuit
Attachment
Circuit
PE 1 PE 2
Payload Payload
PW Demultiplexer
Physical
Data Link
PSN
Payload
80 © Nokia 2017
- Attachment circuit (AC)
• The physical or virtual circuit attaching a CE to a PE.
- Customer Edge (CE)
• A device where one end of a service originates and/or terminates.
- Forwarder (FWRD)
• A PE subsystem that selects the PW to use in order to transmit a payload received on an AC.
- Packet Switched Network (PSN)
• Within the context of PWE3, this is a network using IP or MPLS as the mechanism for packet forwarding.
- Provider Edge (PE)
• A device that provides PWE3 to a CE.
- Pseudo Wire (PW)
• A mechanism that carries the essential elements of an emulated service from one PE to one or more other PEs
over a PSN.
- PSN Tunnel
• A tunnel across a PSN, inside which one or more PWs can be carried.
- PW Demultiplexer
• Data-plane method of identifying a PW terminating at a PE.
Public
PWE3 Terminology
Pseudowire Terminology
81 © Nokia 2017
• The PW demultiplexing layer provides the ability to deliver multiple PWs over a single PSN
tunnel
Public
Pseudowire Protocol Layering
Pseudowire – Protocol Layering:
Payload
PW Label
Physical
Data Link
PSN Label
Ethernet over MPLS PSN
Ethernet Frame
82 © Nokia 2017
4.3 Ethernet Virtual Private Wire
Service (VPWS)
Public
83 © Nokia 2017
• Encapsulation specified in RFC4448 – “Encapsulation Methods for Transport of Ethernet
over MPLS Networks”
- Ethernet pseudowires carry Ethernet/802.3 Protocol Data Units (PDUs) over an MPLS network
- Enables service providers to offer “emulated” Ethernet services over existing MPLS networks
- RFC4448 defines a point-to-point Ethernet pseudowire service
- Operates in one of two modes:
• Tagged mode - In tagged mode, each frame MUST contain at least one 802.1Q VLAN tag, and the tag value is
meaningful to the two PW termination points.
• Raw mode - On a raw mode PW, a frame MAY contain an 802.1Q VLAN tag, but if it does, the tag is not
meaningful to the PW termination points, and passes transparently through them.
Public
Ethernet Virtual Private Wire Service
Ethernet Pseudowires
84 © Nokia 2017
• Two types of services:
- “port-to-port” – all traffic ingressing each attachment circuit is transparently conveyed to the other
attachment circuit, where each attachment circuit is an entire Ethernet port
- “Ethernet VLAN to VLAN” – all traffic ingressing each attachment circuit is transparently conveyed
to the other attachment circuit, where each attachment circuit is a VLAN on an Ethernet port
• In this service instance, the VLAN tag may be stripped on ingress and then re-imposed on egress.
• Alternatively, the VLAN tag may be stripped on ingress and a completely different VLAN ID imposed on egress,
allowing VLAN re-write
• The VLAN ID is locally significant to the Ethernet port
Public
Ethernet Virtual Private Wire Service
Ethernet Pseudowires (continued):
85 © Nokia 2017
PWE3 Reference Model for Ethernet VPWS
Public
PWE3 Architectural Reference Model for Ethernet Pseudowires
PSN
CE 1 CE 2
Emulated Service
Pseudowire
PSN Tunnel
Attachment
Circuit
Attachment
Circuit
PE 1 PE 2
Payload Payload
PW Demultiplexer
Physical
Data Link
PSN
Payload
86 © Nokia 2017
Ethernet Virtual Private Wire Service
Public
Ethernet PWE3 Protocol Stack Reference Model
Emulated
Ethernet
PW Demultiplexer
Physical
Data Link
PSN MPLS
Emulated Service Emulated
Ethernet
PW Demultiplexer
Physical
Data Link
PSN MPLS
Pseudowire
PSN Tunnel
87 © Nokia 2017
Ethernet VPWS Example 1
Public
Example 1: Ethernet VPWS port-to-port (traffic flow from CE1 to CE2)
Port 1/2/1 Port 3/2/0
Payload Payload
•6775
Physical
Data Link
•1029
PE1 Config:
Service ID: 1000
Service Type: Ethernet VPWS
(port-to-port)
PSN Label for PE2: 1029
PW Label from PE2: 6775
Port: 1/2/1
PE2 Config:
Service ID: 1000
Service Type: Ethernet VPWS
(port-to-port)
PSN Label for PE1: 4567
PW Label from PE1: 10978
Port: 3/2/0
Traffic Flow
DA
SA
VLAN tag
DA
SA
VLAN tag
Payload
DA
SA
VLAN tag
PSN
CE 1 CE 2
PE 1 PE 2
88 © Nokia 2017
Ethernet VPWS Example 1
Public
Example 1: Ethernet VPWS port-to-port (traffic flow from CE2 to CE1)
Port 1/2/1 Port 3/2/0
Payload Payload
•10978
Physical
Data Link
•4567
PE1 Config:
Service ID: 1000
Service Type: Ethernet VPWS
(port-to-port)
PSN Label for PE2: 1029
PW Label from PE2: 6775
Port: 1/2/1
PE2 Config:
Service ID: 1000
Service Type: Ethernet VPWS
(port-to-port)
PSN Label for PE1: 4567
PW Label from PE1: 10978
Port: 3/2/0
Traffic Flow
DA
SA
VLAN tag
DA
SA
VLAN tag
Payload
DA
SA
VLAN tag
PSN
CE 1 CE 2
PE 1 PE 2
89 © Nokia 2017
Ethernet VPWS Example 2
Public
Example 2: Ethernet VPWS VLAN-based (traffic flow from CE1 to CE2)
Port 1/2/1 Port 3/2/0
Payload Payload
•6775
Physical
Data Link
•1029
PE1 Config:
Service ID: 2000
Service Type: Ethernet VPWS
(VLAN-100)
PSN Label for PE2: 1029
PW Label from PE2: 5879
Port: 1/2/1 VLAN 100
PE2 Config:
Service ID: 2000
Service Type: Ethernet VPWS
(VLAN-200)
PSN Label for PE1: 4567
PW Label from PE1: 21378
Port: 3/2/0 VLAN 200
Traffic Flow
DA
SA
VLAN tag - 100
DA
SA
VLAN tag
Payload
DA
SA
VLAN tag - 200
PSN
CE 1 CE 2
PE 1 PE 2
90 © Nokia 2017
Ethernet VPWS Example 2
Public
Example 2: Ethernet VPWS VLAN-based (traffic flow from CE2 to CE1)
Port 1/2/1 Port 3/2/0
Payload Payload
•21378
Physical
Data Link
•4567
PE1 Config:
Service ID: 2000
Service Type: Ethernet VPWS
(VLAN-100)
PSN Label for PE2: 1029
PW Label from PE2: 5879
Port: 1/2/1 VLAN 100
PE2 Config:
Service ID: 2000
Service Type: Ethernet VPWS
(VLAN-200)
PSN Label for PE1: 4567
PW Label from PE1: 21378
Port: 3/2/0 VLAN 200
Traffic Flow
DA
SA
VLAN tag - 100
DA
SA
VLAN tag
Payload
DA
SA
VLAN tag - 200
PSN
CE 1 CE 2
PE 1 PE 2
91 © Nokia 2017
• Signalling specified in RFC4447 – “Pseudowire Setup and Maintenance Using the Label
Distribution Protocol (LDP)”
• The MPLS Label Distribution Protocol, LDP [RFC5036], is used for setting up and
maintaining the pseudowires
- PW label bindings are distributed using the LDP downstream unsolicited mode
- PEs establish an LDP session using the LDP Extended Discovery mechanism a.k.a Targeted LDP or
tLDP
• The PSN tunnels are established and maintained separately by using any of the following:
- The Label Distribution Protocol (LDP)
- The Resource Reservation Protocol with Traffic Engineering (RSVP-TE)
- Static labels
Public
Ethernet Virtual Private Wire Service
Ethernet Pseudowires – Setup and Maintenance
92 © Nokia 2017
• LDP distributes FEC to label mappings using the PWid FEC Element (popularly known as
FEC Type 128)
• Both pseudowire endpoints have to be provisioned with the same 32-bit identifier for the
pseudowire to allow them to obtain a common understanding of which service a given
pseudowire belongs to.
Public
Ethernet Virtual Private Wire Service
Ethernet Pseudowires – Setup and Maintenance
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PWid (0x80) |C| PW type |PW info Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Group ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PW ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Interface Parameter Sub-TLV |
| " |
| " |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
93 © Nokia 2017
• A new TLV, the Generalized PWid FEC Element (popularly known as FEC Type 129) has also
been developed but is not widely deployed as yet
• The Generalized PWid FEC element requires that the PW endpoints be uniquely identified;
the PW itself is identified as a pair of endpoints. In addition, the endpoint identifiers are
structured to support applications where the identity of the remote endpoints needs to
be auto-discovered rather than statically configured.
Public
Ethernet Virtual Private Wire Service
Ethernet Pseudowires – Setup and Maintenance
94 © Nokia 2017
• The Generalized PWid FEC Element (popularly known as FEC Type 129)
Public
Ethernet Virtual Private Wire Service
Ethernet Pseudowires – Setup and Maintenance
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Gen PWid (0x81)|C| PW Type |PW info Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AGI Type | Length | Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ AGI Value (contd.) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AII Type | Length | Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ SAII Value (contd.) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AII Type | Length | Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ TAII Value (contd.) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
95 © Nokia 2017
What protocol is used to exchange pseudowire labels
between provider edge routers ?
Audience Question 5
Public
96 © Nokia 2017
4.4 Ethernet Virtual Private LAN
Service (VPLS)
Public
97 © Nokia 2017
• Two variants
- RFC4762 - Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling. We
will concentrate on this variant in the rest of this tutorial
- RFC4761 - Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling
Public
Ethernet Virtual Private LAN Service
Ethernet VPLS
98 © Nokia 2017
• A VPLS creates an emulated private LAN segment for a given set of users.
• It creates a Layer 2 broadcast domain that is fully capable of learning and forwarding on
Ethernet MAC addresses and that is closed to a given set of users. Multiple VPLS services
can be supported from a single Provider Edge (PE) node.
• The primary motivation behind VPLS is to provide connectivity between geographically
dispersed customer sites across MANs and WANs, as if they were connected using a LAN.
• The main intended application for the end-user can be divided into the following two
categories:
- Connectivity between customer routers: LAN routing application
- Connectivity between customer Ethernet switches: LAN switching application
Public
Ethernet Virtual Private LAN Service
Definition
99 © Nokia 2017
• Simplicity
- Behaves like an “ethernet switch in the sky”
- No routing interaction with the provider
- Clear demarcation between subscriber and provider
- Layer 3 agnostic
• Scalable
- Provider configures site connectivity only
- Hierarchy reduces number of sites touched
• Multi-site connectivity
- On the fly connectivity via Ethernet bridging
Public
VPLS Benefits
Benefits for the customer
100 © Nokia 2017
VPLS Topological Model
Public
Topological Model for VPLS (customer view)
PSN
CE 1 CE 2
CE 3
101 © Nokia 2017
VPLS Topological Model
Public
Topological Model for VPLS (provider view)
PSN
CE 1 CE 2
Attachment
Circuit
Attachment
Circuit
PE 1 PE 2
PE 3
CE 3
Attachment
Circuit
Emulated LAN
102 © Nokia 2017
Constructing VPLS Services
Public
PSN Tunnels and Pseudowire Constructs for VPLS
PSN
CE 1 CE 2
Attachment
Circuit
Attachment
Circuit
CE 3
Attachment
Circuit
PSN (LSP) tunnel
Virtual Bridge
Instance
Pseudowire
VB
PE 1 PE 2
PE 3
VB
VB
VB
103 © Nokia 2017
• PE interfaces participating in a VPLS instance are able to flood, forward, and filter
Ethernet frames, like a standard Ethernet bridged port
• Many forms of Attachment Circuits are acceptable, as long as they carry Ethernet frames:
- Physical Ethernet ports
- Logical (tagged) Ethernet ports
- ATM PVCs carrying Ethernet frames
- Ethernet Pseudowire
• Frames sent to broadcast addresses and to unknown destination MAC addresses are
flooded to all ports:
- Attachment Circuits
- Pseudowires to all other PE nodes participating in the VPLS service
• PEs have the capability to associate MAC addresses with Pseudowires
Public
VPLS PE Functions
Provider Edge Functions
104 © Nokia 2017
• Address learning:
- Unlike BGP VPNs [RFC4364], reachability information is not advertised and distributed via a control
plane.
- Reachability is obtained by standard learning bridge functions in the data plane.
- When a packet arrives on a PW, if the source MAC address is unknown, it is associated with the PW,
so that outbound packets to that MAC address can be delivered over the associated PW.
- When a packet arrives on an AC, if the source MAC address is unknown, it is associated with the AC,
so that outbound packets to that MAC address can be delivered over the associated AC.
Public
VPLS PE Functions
Provider Edge Functions (continued)
105 © Nokia 2017
VPLS Signalling
Public
VPLS Mechanics:
§ Bridging capable PE routers are
connected with a full mesh of MPLS
LSP tunnels
§ Per-Service pseudowire labels are
negotiated using RFC 4447
techniques
§ Replicates unknown/broadcast
traffic in a service domain
§ MAC learning over tunnel & access
ports
§ Separate FIB per VPLS for private
communication
Full mesh of
LSP tunnels
PSN
CE 1 CE 2
Attachment
Circuit
Attachment
Circuit
PE 1 PE 2
PE 3
CE 3
Attachment
Circuit
Emulated
LAN
106 © Nokia 2017
VPLS Signalling
Public
Tunnel establishment
§ LDP:
§ MPLS paths based on IGP reachability
§ RSVP: traffic engineered MPLS paths
with bandwidth & link constraints, and
fast reroute alternatives
Pseudowire establishment
§ LDP: point-to-point exchange of PW
ID, labels, MTU
Full mesh of
LSP tunnels
PSN
CE 1 CE 2
Attachment
Circuit
Attachment
Circuit
PE 1 PE 2
PE 3
CE 3
Attachment
Circuit
Emulated
LAN
107 © Nokia 2017
VPLS Signalling
Public
A full mesh of pseudowires is
established between all PEs
participating in the VPLS service:
§ Each PE initiates a targeted LDP
session to the far-end System IP
(loopback) address
§ Tells far-end what PW label to use
when sending packets for each
service
PSN
CE 1 CE 2
Attachment
Circuit
Attachment
Circuit
CE 3
Attachment
Circuit
PSN (LSP) tunnel
Virtual Bridge
Instance
Pseudowire
VB
PE 1 PE 2
PE 3
VB
VB
VB
108 © Nokia 2017
Why a full mesh of pseudowires?
§ If the topology of the VPLS is not restricted to a full mesh, then it may be that for two PEs not directly
connected via PWs, they would have to use an intermediary PE to relay packets
§ A loop-breaking protocol, such as the Spanning Tree Protocol, would be required
§ With a full-mesh of PWs, every PE is now directly connected to every other PE in the VPLS via a PW; there
is no longer any need to relay packets
§ The loop-breaking rule now becomes the "split horizon" rule, whereby a PE MUST NOT forward traffic
received from one PW to another in the same VPLS mesh
§ Does this remind you of a similar mechanism used in IP networks ? The ibgp full-mesh !
Public
VPLS Signalling
109 © Nokia 2017
• Signalling specified in RFC4447 – “Pseudowire Setup and Maintenance Using the Label
Distribution Protocol (LDP)”
• The MPLS Label Distribution Protocol, LDP [RFC5036], is used for setting up and
maintaining the pseudowires
- PW label bindings are distributed using the LDP downstream unsolicited mode
- PEs establish an LDP session using the LDP Extended Discovery mechanism a.k.a Targeted LDP or
tLDP
• The PSN tunnels are established and maintained separately by using any of the following:
- The Label Distribution Protocol (LDP)
- The Resource Reservation Protocol with Traffic Engineering (RSVP-TE)
- Static labels
Public
VPLS Pseudowire Signalling
Ethernet Pseudowires – Setup and Maintenance
110 © Nokia 2017
• LDP distributes FEC to label mappings using the PWid FEC Element (popularly known as
FEC Type 128)
• Both pseudowire endpoints have to be provisioned with the same 32-bit identifier for the
pseudowire to allow them to obtain a common understanding of which service a given
pseudowire belongs to.
Public
VPLS Pseudowire Signalling
Ethernet Pseudowires – Setup and Maintenance
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PWid (0x80) |C| PW type |PW info Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Group ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PW ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Interface Parameter Sub-TLV |
| " |
| " |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
111 © Nokia 2017
• A new TLV, the Generalized PWid FEC Element (popularly known as FEC Type 129) has also
been developed but is not widely deployed as yet
• The Generalized PWid FEC element requires that the PW endpoints be uniquely identified;
the PW itself is identified as a pair of endpoints. In addition, the endpoint identifiers are
structured to support applications where the identity of the remote endpoints needs to
be auto-discovered rather than statically configured.
Public
VPLS Pseudowire Signalling
Ethernet Pseudowires – Setup and Maintenance
112 © Nokia 2017
• The Generalized PWid FEC Element (popularly known as FEC Type 129)
Public
VPLS Pseudowire Signalling
Ethernet Pseudowires – Setup and Maintenance
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Gen PWid (0x81)|C| PW Type |PW info Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AGI Type | Length | Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ AGI Value (contd.) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AII Type | Length | Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ SAII Value (contd.) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AII Type | Length | Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ TAII Value (contd.) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
113 © Nokia 2017
Ethernet VPLS Signalling Example
Public
PE1 Config:
Service ID: 1001
Service Type: Ethernet VPLS
PSN Label for PE2: 1029
PSN Label for PE3: 9178
PW Label from PE2: 6775
PW Label from PE3: 10127
Port: 1/2/1
PE2 Config:
Service ID: 1001
Service Type: Ethernet VPLS
PSN Label for PE1: 4567
PSN Label for PE3: 11786
PW Label from PE1: 10978
PW Label from PE3: 4757
Port: 3/2/0
Port
1/2/1
Port
3/2/0
PE3 Config:
Service ID: 1001
Service Type: Ethernet VPLS
PSN Label for PE1: 6668
PSN Label for PE2: 12812
PW Label from PE1: 4568
PW Label from PE3: 10128
Port: 4/1/2
Port
4/1/2
PSN
CE 1 CE 2
CE 3
VB
PE 1 PE 2
PE 3
VB
VB
114 © Nokia 2017
VPLS Packet Walkthrough and MAC Learning Example
Public
Forwarding Database – PE 2
MAC Location Mapping
M2 Local Port 3/2/0
PSN
M1 M2
M3
VB
PE 1 PE 2
PE 3
VBVB
Packet Walkthrough for
VPLS Service-id 1001
Send a packet from M2 to M1
- PE2 learns that M2 is reached on Port 3/2/0
- PE2 floods to PE1 with PW-label 10978 and PE3 with PW-label 4757
- PE1 learns from the PW-label 10978 that M2 is behind PE2
- PE1 sends on Port 1/2/1
- PE3 sends on Port 4/1/2
- PE3 learns from the PW-label 4757 M2 is behind PE2
- M1 receives packet
Forwarding Database – PE 3
MAC Location Mapping
M2 Remote PW to PE2
Forwarding Database – PE 1
MAC Location Mapping
M2 Remote PW to PE2
Port
1/2/1
Port
3/2/0
Port
4/1/2
115 © Nokia 2017
VPLS Packet Walkthrough and MAC Learning Example (cont.)
Public
Forwarding Database – PE 2
MAC Location Mapping
M1 Remote PW to PE1
M2 Local Port 3/2/0
Forwarding Database – PE 1
MAC Location Mapping
M1 Local Port 1/2/1
M2 Remote PW to PE2
Reply with a packet from M1 to M2
- PE1 learns M1 is on Port 1/2/1
- PE1 knows that M2 is reachable via PE2
- PE1 sends to PE2 using PW-label 6775
- PE2 knows that M2 is reachable on Port 3/2/0 and so it sends it out that port
- M2 receives packet
PSN
M1 M2
M3
VB
PE 1 PE 2
PE 3
VBVB
Packet Walkthrough for
VPLS Service-id 1001
Port
1/2/1
Port
3/2/0
Port
4/1/2
116 © Nokia 2017
If a full-mesh VPLS is set up between 5 provider edge
routers, how many pseudowires need to be configured
?
Audience Question 6
Public
117 © Nokia 2017
4.5 Scaling VPLS
Public
118 © Nokia 2017
§ Introduces hierarchy in the
base VPLS solution to provide
scaling & operational
advantages
§ Extends the reach of a VPLS
using spokes, i.e., point-to-
point pseudowires or logical
ports
Hierarchical-VPLS (H-VPLS)
Public
PE-1
PE-2
VPLS
M-1
M-3
VB
VB
VB
PE-3
VB
M-5
M-6
VB
MTU-1
119 © Nokia 2017
• Scales signalling
- Full-mesh between MTUs is reduced to full-mesh between PEs and single PW between MTU and PE
• Scales replication
- Replication at MTU is not required
- Replication is reduced to what is necessary between PEs
• Simplifies edge devices
- Keeps cost down because PEs can be replaced with MTUs
• Enables scalable inter-domain VPLS
- Single spoke to interconnect domains
Public
Hierarchical VPLS
How is a spoke useful?
120 © Nokia 2017
Scalability: Signalling
Public
Mesh
PWsSpoke
PWs
Mesh
PWs
Full-mesh between PEs is reduced to full-mesh between PEs and single
spoke between MTU and PE
121 © Nokia 2017
Scalability: Replication
Public
Flat architecture replicationis reduced to distributed replication
122 © Nokia 2017
Scalability: Configuration
Public
is significantly reducedFull mesh configuration
123 © Nokia 2017
Topological Extensibility: Metro Interconnect
Public
ISP
IP / MPLS
Core Network
Metro
IP / MPLS
Network
Metro
IP / MPLS
Network
124 © Nokia 2017
• Provider hand-off can be
- q-tagged or q-in-q port
- Pseudowire spoke
Public
Topological Extensibility: Inter-AS Connectivity
Provider A
IP / MPLS
Network
Provider B
IP / MPLS
Network
125 © Nokia 2017
4.6 VPLS Topologies
Public
126 © Nokia 2017
Topologies: Mesh
Public
PE-4
PE-1
PE-3
PE-2
127 © Nokia 2017
Topologies: Hierarchical
Public
PE-4
PE-1
PE-3
PE-2
128 © Nokia 2017
Topologies: Dual-homing
Public
PE-4
PE-1
PE-3
PE-2
129 © Nokia 2017
Topologies: Ring
Public
PE-6
PE-1
PE-4
PE-3
PE-2
PE-5
• A full mesh would have
too many duplicate
packets
• Each PE has a spoke to
the next PE in the VPLS
• Packets are flooded
into the adjacent
spokes and to all VPLS
ports
• When MACs are
learned, packets stop
at the owning PE
130 © Nokia 2017
4.7 Resiliency Mechanisms
Public
131 © Nokia 2017
4.7 Resiliency Mechanisms
a) Multi-Chassis LAG (MC-LAG)
b) Redundancy with VPLS
c) Pseudo-wire Redundancy with MC-LAG
d) Multi-Segment Pseudo-wires
Public
Agenda
132 © Nokia 2017
4.7.1 Multi-Chassis LAG (MC-LAG)
Public
133 © Nokia 2017
Multi-chassis LAG: What is it ?
Public
LAG 1 LAG 1
Traffic distributed via hash algorithm
§ Maintains packet sequence per “flow”
§ Based on packet content or SAP/service ID
Link Aggregation Control Protocol (LACP)
IEEE Std 802.3-2002_part3 (formerly in 802.3ad)
system MAC and priority system MAC and priority
administrative key administrative key
Consistent port capabilities (e.g. speed, duplex)
Standard LAG
What if one system fails…
Introduce LAG redundancy to TWO systems
Multi-Chassis LAG (MC-LAG)
134 © Nokia 2017
Multi-chassis LAG: How does it work ?
Public
Multi-chassis LAG
LAG
1
Provider
Network
lag 1 lacp-key 1
system-id 00:00:00:00:00:01
system-priority 100
lag 1 lacp-key 1
system-id 00:00:00:00:00:01
system-priority 100
Edge
device
LAG 1
(sub-
group)
(sub-
group
)LAG
1
LACP
Standard LAG
Multi-chassis
LAG control
protocol
MC-
LAG
MC-
LAG
MC-LAG on a
SAP
Active
Standbyout of sync
in LACPDUs
135 © Nokia 2017
Multi-chassis LAG: How does it work ?
Public
Active
LAG 1
(sub-
group)
LAG
1
Provider
Network
Edge
device
LACP
Standard LAG
Standby
Multi-chassis LAG failover
Multi-chassis
LAG control
protocol
MC-
LAG
MC-
LAG
msg
(sub-
group)
LAG 1
out of sync
LACP
message
Activein sync
in LACPDUs
136 © Nokia 2017
4.7.2 Redundancy with VPLS
Public
137 © Nokia 2017
Active
Redundancy at the VPLS edge: MC-LAG
Public
LAG
Standby
MC-LAG
Standard
LAG
VPL
S
Active
MC-LAG
MAC
withdraw
Triggered by Phy/
LACP/802.3ah
failure detection
138 © Nokia 2017
- Network Edge
• L2/L3 CPE for business services L2 DSLAM/BRAS for triple-play services
Public
Redundancy Applications for VPLS w/MC-LAG
DSLAM
Provider
Network
Standby
ActiveProvider
Network
Standby
Active
CE
MC-
LAG
MC-
LAG
MC-
LAG
MC-
LAG
Full
Mesh
Full
Mesh
MC-LAG
Active
Standby
MC-
LAG
MC-
LAG
MC-
LAG
MC-
LAG
VPL
S
VPL
S
Inter-metro Connectivity
Single active path
Selective MAC
withdraw for
faster convergence
139 © Nokia 2017
4.7.3 Pseudo-wire Redundancy with
Multi-chassis LAG
Public
140 © Nokia 2017
Pseudowire Redundancy
Public
Access
Node
Access
Node
VLL
• Tunnel redundancy
PW
Tunnel bypass
VLL
Access
Node
Access
Node
VLL
• PW redundancy
• Single edge redundancy LAG
Redundant PW
Access
Node
Access
Node
VLL
• PW redundancy
• Dual edge redundancy LAG LAG
Redundant PW
141 © Nokia 2017
Combining MC-LAG with Pseudowire Redundancy
Public
Extends L2 point-to-point redundancy across the network
Acces
s
Node
Acces
s
Node
MC-
LAG
Redundant PW
Active Active
ActiveStandby
Local PW status signaled via T-LDP
VLL service terminates on different devices
MC-LAG status propagated
to local PW end points
PW showing both ends
active preferred for forwarding
142 © Nokia 2017
Multi-chassis LAG with Pseudo-Wire Redundancy
Public
How does it work ?
Access
Node
Access
Node
VLL
• PW redundancy
• Single edge redundancy
LAG
PW
VLL
143 © Nokia 2017
Multi-chassis LAG with PW Redundancy:
Public
How does it work ?
LAG to PWs
LAG
MC-
LAG
Standard
LAG
SAP
MC-
LAG
SAP
epipe
C
X Y
BA
D
epipe
epipe
PW
PW
PW
PW
Traffic path
epipe
PWs
A
C
B
D
144 © Nokia 2017
Multi-chassis LAG with PW Redundancy:
Public
How does it work ?
LAG to PWs : LAG link failure
MC-
LAG
Standard
LAG
SAP
MC-
LAG
SAP
epipe
C
X Y
BA
D
epipe
epipe
S
SDP
S
SDP
S
SDP
S
SDP
Traffic path
epipe
New Traffic path
A
C
B
D
LAG PWs
145 © Nokia 2017
Multi-chassis LAG with Pseudo-Wire Redundancy:
Public
How does it work ?
Access
Node
Access
Node
VLL
• PW redundancy
• Dual edge redundancy
LAG
PW
VLL
LAG
146 © Nokia 2017
Multi-chassis LAG with PW Redundancy:
Public
How does it work ?
LAG to PWs to LAG
LAG LAG
MC-
LAG
Standard
LAG
MC-
LAG
MC-
LAG
MC-LAG
Active Standby
ActiveStandby
Standard
LAG
PWs
PW
Pw
PW
PW
PW
PW
PW
PW
Traffic path
A F
B D
EC
147 © Nokia 2017
Multi-chassis LAG with PW Redundancy:
Public
How does it work ?
LAG to PWs to LAG : Network device failure
Active Standby
LAG LAG
MC-
LAG
Standard
LAG
MC-
LAG
MC-
LAG
MC-LAG
ActiveStandby
Standard
LAG
PWs
PW
PW
PW
PW
PW
PW
PW
PW
Traffic path
New Traffic path
ActiveActive
A F
B D
EC
148 © Nokia 2017
4.7.4 Multi-segment Pseudo-wires
Public
149 © Nokia 2017
Multi-segment Pseudo-wire – Motivation
Public
Ethernet VLL with SS-PW
CE
CE
CE
CE
CE
MPLS MPLS
MPLS
MPLS
PE
PE
PE
PE
P
P
PE
PE
MPLS tunnel
SS-PW
T-LDP
T-LDP
T-LDP
Remove need for full mesh of LDP-peers/LSP-
tunnels
VLLs over multiple tunnels (of different types)
Simplifying VLL provisioning
150 © Nokia 2017
Multi-segment Pseudo-wire – How can you use them ?
Public
Ethernet VLL with MS-PW
CE
CE
CE
CE
CE
MPLS MPLS
MPLS
MPLS tunnel
T-LDP
T-LDP
T-LDP
MPLS
S-PE
S-PE
T-PEMS-PW
T-PE
T-PE
T-PE
T-LDP
T-LDP
T-LDP
S-PE
T-PE
T-LDP
T-LDP
Ethernet VLL redundancy across multiple areas
e.g. FRR only available within an area/level
Inter-domain connectivity
[Metro w/RSVP] to [core w/LDP] to [metro w/RSVP]
One device needs PWs to many remote devices
151 © Nokia 2017
Multi-segment Pseudo-wire – How do they work ?
Public
Customer frame
Customer frame
P
E
Access
Node
Access
Node
P
E
P
Single Segment PW
VLL
Access
Node
Access
Node
T-PET-
PE
S-PE
Multi Segment PW
VLL
Customer frameTUN-
1
PW-1 Customer frameTUN-
2
PW-2
Customer frameTUN-
1
PW-1 Customer frameTUN-
2
PW-1
same
swapped
152 © Nokia 2017
Multi-segment Pseudo-wire – Redundancy
Public
Inter-metro/domain Redundant Ethernet VLLs with MS-PW
CECE
MPLS
MPLS
MPLS
S-PE
T-PE T-PE
S-PEActiv
e
Activ
e
Activ
e
Endpoint with 2 PWs with
preference determining TX
Endpoint with 2 PWs with
preference determining TX
S-PES-PE
Domain A Domain BInter-domain
–Individual segments can have MPLS (FRR…) protection
–Configure parallel MS-PW for end-end protection
153 © Nokia 2017
summary
Public
154 © Nokia 2017
- Ethernet Services are in a period of tremendous growth with great revenue potential for service
providers
- The Metro Ethernet Forum has standardised Ethernet services and continues to enhance
specifications
- Traditional forms of Ethernet delivery are no longer suitable for the delivery of “carrier-grade”
Ethernet services
- MPLS provides a proven platform for the delivery of scalable, flexible, feature-rich Ethernet services
using the same infrastructure used to deliver other MPLS-based services
Public
Summary
155 © Nokia 2017
questions ?
Public
MPLS-based Metro Ethernet Networks

Mais conteúdo relacionado

Mais procurados

Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Bruno Teixeira
 
Ont, olt and mdu in gpon technology
Ont, olt and mdu in gpon technologyOnt, olt and mdu in gpon technology
Ont, olt and mdu in gpon technologyHuanetwork
 
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Bruno Teixeira
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Febrian ‎
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
Module 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG ConceptsModule 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG ConceptsTail-f Systems
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Russia
 
Lte principles overview
Lte principles  overviewLte principles  overview
Lte principles overviewNdukwe Amandi
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksAPNIC
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriFebrian ‎
 
netconf, restconf, grpc_basic
netconf, restconf, grpc_basicnetconf, restconf, grpc_basic
netconf, restconf, grpc_basicGyewan An
 

Mais procurados (20)

Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
 
Ont, olt and mdu in gpon technology
Ont, olt and mdu in gpon technologyOnt, olt and mdu in gpon technology
Ont, olt and mdu in gpon technology
 
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Module 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG ConceptsModule 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG Concepts
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Nfv
NfvNfv
Nfv
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
 
Introduction to LTE
Introduction to LTEIntroduction to LTE
Introduction to LTE
 
Lte principles overview
Lte principles  overviewLte principles  overview
Lte principles overview
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 
NFV evolution towards 5G
NFV evolution towards 5GNFV evolution towards 5G
NFV evolution towards 5G
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by Khatri
 
netconf, restconf, grpc_basic
netconf, restconf, grpc_basicnetconf, restconf, grpc_basic
netconf, restconf, grpc_basic
 
NFV Tutorial
NFV TutorialNFV Tutorial
NFV Tutorial
 
Nokia LTE IP Planning Guide
Nokia LTE IP Planning GuideNokia LTE IP Planning Guide
Nokia LTE IP Planning Guide
 

Destaque

Deploy MPLS Traffic Engineering
Deploy MPLS Traffic EngineeringDeploy MPLS Traffic Engineering
Deploy MPLS Traffic EngineeringAPNIC
 
Segment Routing
Segment RoutingSegment Routing
Segment RoutingAPNIC
 
Universal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design GuideUniversal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design GuideJuniper Networks
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesAlcatel-Lucent Enterprise
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationNir Cohen
 
Insights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businessesInsights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businessesAlcatel-Lucent Enterprise
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANToshal Dudhwala
 
Network Automation: Ansible 101
Network Automation: Ansible 101Network Automation: Ansible 101
Network Automation: Ansible 101APNIC
 
MPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment updateMPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment updateStephane Litkowski
 
The Age of Data-Driven Network Operations
The Age of Data-Driven Network OperationsThe Age of Data-Driven Network Operations
The Age of Data-Driven Network OperationsAPNIC
 
Nokia dictionary
Nokia dictionaryNokia dictionary
Nokia dictionaryJetal Patel
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
Troubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesTroubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesSalachudin Emir
 
Lagopus workshop@Internet weekのそば
Lagopus workshop@Internet weekのそばLagopus workshop@Internet weekのそば
Lagopus workshop@Internet weekのそばYoshihiro Nakajima
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentialsbeachghim
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGPAPNIC
 

Destaque (17)

Deploy MPLS Traffic Engineering
Deploy MPLS Traffic EngineeringDeploy MPLS Traffic Engineering
Deploy MPLS Traffic Engineering
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Universal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design GuideUniversal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design Guide
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
Insights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businessesInsights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businesses
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
Network Automation: Ansible 101
Network Automation: Ansible 101Network Automation: Ansible 101
Network Automation: Ansible 101
 
MPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment updateMPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment update
 
The Age of Data-Driven Network Operations
The Age of Data-Driven Network OperationsThe Age of Data-Driven Network Operations
The Age of Data-Driven Network Operations
 
Nokia dictionary
Nokia dictionaryNokia dictionary
Nokia dictionary
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Troubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesTroubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper Examples
 
Lagopus workshop@Internet weekのそば
Lagopus workshop@Internet weekのそばLagopus workshop@Internet weekのそば
Lagopus workshop@Internet weekのそば
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentials
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
 

Semelhante a MPLS-based Metro Ethernet Networks

Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernetMapYourTech
 
MPLS-Based Metro Ethernet
MPLS-Based Metro EthernetMPLS-Based Metro Ethernet
MPLS-Based Metro EthernetAPNIC
 
Metro ethernet-services
Metro ethernet-servicesMetro ethernet-services
Metro ethernet-servicesc09271
 
Rethinking Mobile Backhaul Offering for a Fixed Operator like Colt
Rethinking Mobile Backhaul Offering for a Fixed Operator like ColtRethinking Mobile Backhaul Offering for a Fixed Operator like Colt
Rethinking Mobile Backhaul Offering for a Fixed Operator like ColtValéry Augais
 
MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)
MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)
MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)Les Williams
 
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...festival ICT 2016
 
Carrier ethernetessentials
Carrier ethernetessentialsCarrier ethernetessentials
Carrier ethernetessentialsc09271
 
Spreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesSpreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesOpen Networking Summits
 
Cygnotel Prueba 01
Cygnotel Prueba 01Cygnotel Prueba 01
Cygnotel Prueba 01cygnotel
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...Javier Gonzalez
 
Evolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier NetworkEvolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier NetworkOpen Networking Summits
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paperPrashant Sengar
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paperDivyansh Gupta
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paperHema Makani
 
The Third Network: LSO, SDN and NFV
The Third Network: LSO, SDN and NFVThe Third Network: LSO, SDN and NFV
The Third Network: LSO, SDN and NFVOPNFV
 
Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesOpen Networking Summit
 
Introducing One Network Edge
Introducing One Network EdgeIntroducing One Network Edge
Introducing One Network EdgeADVA
 

Semelhante a MPLS-based Metro Ethernet Networks (20)

Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernet
 
MPLS-Based Metro Ethernet
MPLS-Based Metro EthernetMPLS-Based Metro Ethernet
MPLS-Based Metro Ethernet
 
Metro ethernet-services
Metro ethernet-servicesMetro ethernet-services
Metro ethernet-services
 
Rethinking Mobile Backhaul Offering for a Fixed Operator like Colt
Rethinking Mobile Backhaul Offering for a Fixed Operator like ColtRethinking Mobile Backhaul Offering for a Fixed Operator like Colt
Rethinking Mobile Backhaul Offering for a Fixed Operator like Colt
 
MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)
MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)
MEF-LR-CE-Wholesale-Services-and-Interconnection-Trends-Webinar_FINAL (1)
 
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
 
Carrier ethernetessentials
Carrier ethernetessentialsCarrier ethernetessentials
Carrier ethernetessentials
 
Spreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesSpreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use cases
 
Ieee ce.dcai
Ieee ce.dcaiIeee ce.dcai
Ieee ce.dcai
 
Cygnotel Prueba 01
Cygnotel Prueba 01Cygnotel Prueba 01
Cygnotel Prueba 01
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
 
Evolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier NetworkEvolving to a Software Defined Carrier Network
Evolving to a Software Defined Carrier Network
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 
The Third Network: LSO, SDN and NFV
The Third Network: LSO, SDN and NFVThe Third Network: LSO, SDN and NFV
The Third Network: LSO, SDN and NFV
 
Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and Services
 
Lanvisn™ Clouds
Lanvisn™ Clouds Lanvisn™ Clouds
Lanvisn™ Clouds
 
Introducing One Network Edge
Introducing One Network EdgeIntroducing One Network Edge
Introducing One Network Edge
 

Mais de APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

Mais de APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Último

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Último (20)

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 

MPLS-based Metro Ethernet Networks

  • 1. 1 © Nokia 2017 MPLS-based Metro Ethernet Networks Public A tutorial • Paresh Khatri • 01-03-2017
  • 2. 2 © Nokia 2017 1. Introduction 2. Introduction to Metro Ethernet Services 3. Traditional Metro Ethernet networks 4. Delivering Ethernet over MPLS 5. Summary 6. Questions Public Agenda
  • 3. 3 © Nokia 2017 introduction Public
  • 4. 4 © Nokia 2017 • Paresh Khatri (paresh.khatri@nokia.com) - Chief Architect – IP Routing & Transport APAC, Alcatel-Lucent • Key focus areas: - End-to-end network architectures - SDN/NFV - Large-scale IP/MPLS networks - L2/L3 VPNs - Carrier Ethernet - Next-generation mobile backhaul networks • Acknowledgements: - Some figures and text are provided courtesy of the Metro Ethernet Forum (MEF) Public Introduction
  • 5. 5 © Nokia 2017 introduction to metro ethernet services Public
  • 6. 6 © Nokia 2017 2. Introduction to Metro Ethernet Services a) Why Metro Ethernet ? b) Attributes of Carrier Ethernet c) Carrier Ethernet Services defined by the MEF Public Agenda
  • 7. 7 © Nokia 2017 2.1 Why Metro Ethernet ? Public
  • 8. 8 © Nokia 2017 Introduction to Metro Ethernet Services Public What is Metro Ethernet ? “… generally defined as the network that bridges or connects geographically separated enterprise LANs while also connecting across the WAN or backbone networks that are generally owned by service providers. The Metro Ethernet Networks provide connectivity services across Metro geography utilising Ethernet as the core protocol and enabling broadband applications” from “Metro Ethernet Networks – A Technical Overview” from the Metro Ethernet Forum
  • 9. 9 © Nokia 2017 • Benefits both providers and customers in numerous ways … • Packet traffic has now overtaken all other traffic types • Need for rapid provisioning • Reduced CAPEX/OPEX • Increased and flexible bandwidth options • Well-known interfaces and technology Public Introduction to Metro Ethernet Services Why Metro Ethernet ?
  • 10. 10 © Nokia 2017 2.2 Attributes of Carrier Ethernet Public
  • 11. 11 © Nokia 2017 • Carrier Ethernet is a ubiquitous, standardized, carrier-class SERVICE defined by five attributes that distinguish Carrier Ethernet from familiar LAN based Ethernet • It brings the compelling business benefit of the Ethernet cost model to achieve significant savings Carrier Ethernet • Scalability • Standardized Services • Service Management • Quality of Service • Reliability Carrier Ethernet Attribute s The 5 Attributes of Carrier Ethernet Public
  • 12. 12 © Nokia 2017 2.3 Carrier Ethernet Services defined by the MEF Public
  • 13. 13 © Nokia 2017 • What do we mean by Metro Ethernet services ? - Use of Ethernet access tails - Provision of Ethernet-based services across the MAN/WAN • Point-to-point • Point-to-multipoint • Multipoint-to-multipoint - However, the underlying infrastructure used to deliver Ethernet services does NOT have to be Ethernet !!! - Referred to as Carrier Ethernet services by the Metro Ethernet Forum • The terms “Carrier Ethernet” and “Metro Ethernet” are used interchangeably in this presentation, but in the strict sense of the term, “Carrier Ethernet” refers to the carrier-grade evolution of “Metro Ethernet” Public Introduction to Metro Ethernet Services What do we mean by Metro Ethernet services ?
  • 14. 14 © Nokia 2017 Carrier Ethernet Network UNI • The UNI is the physical interface or port that is the demarcation between the customer and the service provider/Cable Operator/Carrier/MSO • The UNI is always provided by the Service Provider • The UNI in a Carrier Ethernet Network is a standard physical Ethernet Interface at operating speeds 10Mbs, 100Mbps, 1Gbps or 10Gbps Public MEF Carrier Ethernet Terminology The User Network Interface (UNI) CE: Customer Equipment, UNI: User Network Interface. MEF certified Carrier Ethernet products CE
  • 15. 15 © Nokia 2017 Carrier Ethernet Network UNI • MEF has defined two types of UNIs: - MEF UNI Type I (MEF 13) • A UNI compliant with MEF 13 • Manually configurable • Specified for existing Ethernet devices • Provides bare minimum data-plane connectivity services with no control-plane or management-plane capabilities. - MEF UNI Type II (MEF 20) • Automatically configurable via E-LMI (allowing UNI-C to retrieve EVC status and configuration information from UNI-N) • Manageable via OAM Public MEF Carrier Ethernet Terminology The User Network Interface (UNI): CE: Customer Equipment, UNI: User Network Interface. MEF certified Carrier Ethernet products CE UNI
  • 16. 16 © Nokia 2017 Public MEF Carrier Ethernet Terminology MetroMetro EthernetEthernet NetworkNetwork CustomerCustomer EdgeEdge (CE)(CE) User NetworkUser Network InterfaceInterface (UNI)(UNI) User NetworkUser Network InterfaceInterface (UNI)(UNI) CustomerCustomer EdgeEdge (CE)(CE) • Customer Equipment (CE) attaches to the Metro Ethernet Network (MEN) at the UNI - Using standard Ethernet frames. • CE can be - Router or bridge/switch - IEEE 802.1 bridge
  • 17. 17 © Nokia 2017 UNI: User Network Interface, UNI-C: UNI-customer side, UNI-N network side NNI: Network to Network Interface, E-NNI: External NNI; I-NNI Internal NNI MEF Ethernet Services Model Public Ethernet Services “Eth” Layer Subscriber Site Service Provider 2 Metro Ethernet Network Subscriber Site ETH UNI-C ETH UNI-N ETH UNI-N ETH UNI-N ETH UNI-N ETH UNI-C Service Provider 1 Metro Ethernet Network
  • 18. 18 © Nokia 2017 • An Ethernet Service Instantiation - Most commonly (but not necessarily) identified via a VLAN-ID - Like Frame Relay and ATM PVCs or SVCs • Connects two or more subscriber sites (UNI’s) - Can multiplex multiple EVCs on the same UNI - An association of two or more UNIs • Prevents data transfer between sites that are not part of the same EVC Public MEF Carrier Ethernet Terminology Ethernet Virtual Connection (EVC)
  • 19. 19 © Nokia 2017 MEF Carrier Ethernet Terminology Public Ethernet Virtual Connection (EVC) UNI MEN UNI Point-to-Point EVC MEN Multipoint-to-Multipoint EVC MEN Rooted-Multipoint EVC Leaf Leaf Leaf Root Three types of EVC:
  • 20. 20 © Nokia 2017 E-LINE E-LAN E-TREE Point-to-Point EVC CE UNI UNI CE CE UNI CE UNI Multipoint EVC Rooted Multipoint EVC CE UNI CE UNI CE UNI Basic Carrier Ethernet Services Public Point to Point Service Type used to create •Ethernet Private Lines •Virtual Private Lines •Ethernet Internet Access Point to Multi-Point •Efficient use of Service Provider ports •Foundation for Multicast networks e.g. IPTV Multi-Point to Multi-Point Service Type used to create •Multipoint Layer 2 VPNs •Transparent LAN Service
  • 21. 21 © Nokia 2017 In a Carrier Ethernet network, data is transported across Point-to-Point, Multipoint-to-Multipoint and Point-to-Multipoint EVCs according to the attributes and definitions of the E-Line, E-LAN and E-Tree services respectively. EVCs and Services Public Point-to-Point EVC Carrier Ethernet Network UNI UNI
  • 22. 22 © Nokia 2017 • Replaces a TDM Private line • Dedicated UNIs for Point-to-Point connections • Single Ethernet Virtual Connection (EVC) per UNI Public Services Using E-Line Service Type Ethernet Private Line (EPL) Point-to-Point EVC Carrier Ethernet Network CE UNI CE UNI CE UNI ISP POP UNI Storage Service Provider Internet
  • 23. 23 © Nokia 2017 • Replaces Frame Relay or ATM services • Supports Service Multiplexed UNI (i.e. multiple EVCs per UNI) • Allows single physical connection (UNI) to customer premise equipment for multiple virtual connections • This is a UNI that must be configurable to support Multiple EVCs per UNI Public Services Using E-Line Service Type Ethernet Virtual Private Line (EVPL) Service Multiplexe d Ethernet UNI Multipoint-to-Multipoint EVC Carrier Ethernet Network CE UNI CE UNI CE UNI
  • 24. 24 © Nokia 2017 • Supports dedicated or service-multiplexed UNIs • Supports transparent LAN services and multipoint VPNs Public Services Using E-LAN Service Type Ethernet Private LAN and Ethernet Virtual Private LAN Services Service Multiplexe d Ethernet UNI Point-to-Multipoint EVC Carrier Ethernet Network CE UNI UNI UNI CE UNI CE
  • 25. 25 © Nokia 2017 • Enables Point-to-Multipoint Services with less provisioning than typical hub and spoke configuration using E-Lines - Provides traffic separation between users with traffic from one “leaf” being allowed to arrive at one of more “roots” but never being transmitted to other “leaves” Public Services Using E-Tree Service Type Ethernet Private Tree (EP-Tree) and Ethernet Virtual Private Tree (EVP-Tree) Services Root Carrier Ethernet Network CE UNI UNI UNI CE CE Leaf Leaf UNI CE Leaf Rooted-Multipoint EVC Ethernet Private Tree example
  • 26. 26 © Nokia 2017 Name any two of the five attributes of Carrier Ethernet as defined by the Metro Ethernet Forum. Audience Question 1 Public
  • 27. 27 © Nokia 2017 traditional metro ethernet services Public
  • 28. 28 © Nokia 2017 3. Traditional Metro Ethernet Networks a) Service Identification b) Forwarding Mechanism c) Resiliency and Redundancy d) Recent Developments e) Summary Public Agenda
  • 29. 29 © Nokia 2017 • Ethernet switching/bridging networks (802.1d/802.1q) - Services identified by VLAN IDs/physical ports - VLAN IDs globally significant - Resiliency provided using variants of the Spanning Tree Protocol Public Traditional Metro Ethernet Networks Traditional methods of Ethernet delivery Ethernet Switches CPE CPE CPE CPE CPE CPE CPE CPE Agg Agg Core Core Access Access Access Access Agg Agg Access Access Access Access Core Core CPE CPE CPE CPE CPE CPE CPE CPE
  • 30. 30 © Nokia 2017 3.1 Service Identification Public
  • 31. 31 © Nokia 2017 • Ethernet switching/bridging networks • First generation was based on IEEE 802.1q switches - One obvious limitation was the VLAN ID space – the 12-bit VLAN ID allows a maximum of 4094 VLANs (VLANs 0 and 4095 are reserved). This limited the total number of services in any one switching/bridging domain. - The other problem was that of customer VLAN usage – customers could not carry tagged traffic transparently across the network Public Traditional Metro Ethernet Networks Service Identification: C-DA C-SA Payload C-VID Ethertype Ethertype VLAN ID (12 bits) PCP(3 bits) 0x8100 (16 bits) CFI (1 bit) Tag Protocol Identifer (TPID) Tag Control Information (TCI)
  • 32. 32 © Nokia 2017 • Q-in-Q (aka VLAN stacking, aka 802.1ad) comes to the rescue ! - Q-in-Q technology, which has now been standardised by the IEEE as 802.1ad (Provider Bridging), allowed the addition of an additional tag to customer Ethernet frames – the S-tag. The S-tag (Service Tag) was imposed by the Service Provider and therefore, it became possible to carry customer tags (C-tags) transparently through the network. Public Traditional Metro Ethernet Networks Service Identification Provider Bridge Customer Device C-DA C-SA Payload S-VID C-VID Ethertype Ethertype Ethertype VLAN ID (12 bits) PCP(3 bits) 0x88a8 (16 bits) DEI (1 bit) Tag Protocol Identifer (TPID) Tag Control Information (TCI) C-DA C-SA Payload C-VID Ethertype Ethertype
  • 33. 33 © Nokia 2017 • Some important observations about Q-in-Q: - This is not a new encapsulation format; it simply results in the addition of a second tag to the customer Ethernet frame, allowing any customer VLAN tags to be preserved across the network - There is no change to the customer destination or source MAC addresses - The number of distinct service instances within each Provider Bridging domain is still limited by the S-VLAN ID space i.e. 4094 S-VLANs. The difference is that customer VLANs can now be preserved and carried transparently across the provider network. Public Traditional Metro Ethernet Networks Service Identification
  • 34. 34 © Nokia 2017 3.2 Forwarding Mechanism Public
  • 35. 35 © Nokia 2017 • Dynamic learning methods used to build forwarding databases Public Traditional Metro Ethernet Networks Forwarding Mechanism MAC Learning Points CPE CPE CPE CPE CPE CPE CPE CPE Agg Agg Core Core Access Access Access Access Agg Agg Access Access Access Access Core Core CPE CPE CPE CPE CPE CPE CPE CPE
  • 36. 36 © Nokia 2017 • Dynamic learning methods used to build forwarding databases Public Traditional Metro Ethernet Networks Forwarding Mechanism Forwarding Database – E1 MAC Interface MAC-A i1 MAC-B i2 MAC-C i2 i1 i2 i3 i4 i5 i6 i7 i8 i9 Forwarding Database – E2 MAC Interface MAC-A i6 MAC-B i7 MAC-C i6 Forwarding Database – E3 MAC Interface MAC-A i8 MAC-B i8 MAC-C i9 Forwarding Database – C MAC Interface MAC-A i3 MAC-B i5 MAC-C i4 Provider Switch E1 CPE (MAC A) Provider Switch E2 Provider Switch C Provider Switch E3 CPE (MAC C) CPE (MAC B)
  • 37. 37 © Nokia 2017 • Dynamic learning methods used to build forwarding databases - Data-plane process – there are no control-plane processes for discovering endpoint information • In the worst case, ALL switches have forwarding databases that include ALL MAC addresses. This is true even for switches in the core of the network (Switch C in preceding example). - Switches have limited resources for storing MAC addresses. This poses severe scaling issues in all parts of the network. VLAN-stacking does not help with this problem. - On topology changes, forwarding databases are flushed and addresses need to be re-learned. While these addresses are re-learned, traffic to unknown destinations is flooded through the network, resulting in wasted bandwidth. Public Traditional Metro Ethernet Networks Forwarding Mechanism
  • 38. 38 © Nokia 2017 3.3 Resiliency and Redundancy Public
  • 39. 39 © Nokia 2017 • Redundancy is needed in any network offering Carrier-grade Ethernet BUT loops are bad !! • The Spanning Tree Protocol (STP) is used to break loops in bridged Ethernet networks - There have been many generations of the STP over the years - All of these variants work by removing redundant links so that there is one, and only one, active path from each switch to every other switch i.e. all loops are eliminated. In effect, a minimum cost tree is created by the election of a root bridge and the subsequent determination of shortest-path links to the root bridge from every other bridge - Bridges transmit special frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge priority, path costs etc. - High Availability is difficult to achieve in traditional Metro Ethernet networks. Public Traditional Metro Ethernet Networks Resiliency and Redundancy
  • 40. 40 © Nokia 2017 Traditional Metro Ethernet Networks Public Building the Spanning Tree … 10 10 20 10 Root Bridge Rudimentary Traffic-Engineering Capabilities Switch A Switch B Switch C Switch D Switch A Switch B Switch C Switch D
  • 41. 41 © Nokia 2017 • Had a number of significant shortcomings: - Convergence times – the protocol is timer-based with times in the order of 10s of seconds. After network topology changes (failure or addition of links), it could take up to 50s for the network to re- converge - The protocol was VLAN-unaware, which meant that in an IEEE 802.1q network, all VLANs had to share the same spanning tree. This meant that there were network links that would not be utilised at all since they were placed into a blocked state. • Many vendors implemented their own, proprietary extensions to the protocol to allow the use of a separate STP instance per VLAN, allowing better link utilisation within the network - There were many conditions which resulted in the inadvertent formation of loops in the network. Given the flooding nature of bridged Ethernet, and the lack of a TTL-like field in Ethernet frames, looping frames could loop forever. • There are numerous well-publicised instances of network meltdowns in Enterprise and Service Provider networks • A lot of service providers have been permanently scarred by the catastrophic effects of STP loops ! Public Traditional Metro Ethernet Networks First generation of STP (IEEE802.1d-1998)
  • 42. 42 © Nokia 2017 • Some major improvements: - Dependence on timers is reduced. Negotiation protocols have been introduced to allow rapid transitioning of links to a forwarding state - The Topology Change process has been re-designed to allow faster recovery from topology changes - Optimisations for certain types of direct and indirect link failures - Convergence times are now down to sub-second in certain special cases but a lot of failure cases still require seconds to converge ! • But… - The protocol was still VLAN-unaware, which meant that the issue of under-utilised links was still present Public Traditional Metro Ethernet Networks Newer generations of STP (IEEE802.1d-2004 – Rapid STP aka 802.1w)
  • 43. 43 © Nokia 2017 • Built on top of RSTP • Added VLAN awareness: - Introduces the capability for the existence of multiple STP instances within the same bridged network - Allows the association of VLANs to STP instances, in order to provide a (relatively) small number of STP instances, instead of using an instance per VLAN. - Different STP instances can have different topologies, which allows much better link utilisation • BUT - The stigma associated with past failures is hard to remove… - The protocol is fairly complicated, compared to its much simpler predecessors Public Traditional Metro Ethernet Networks Newer generations of STP (IEEE802.1q-2003 – Multiple STP aka 802.1s)
  • 44. 44 © Nokia 2017 3.4 Recent Developments Public
  • 45. 45 © Nokia 2017 • Takes IEEE 802.1ad to the next level • MAC-in-MAC technology: - Customer Ethernet frames are encapsulated in a provider Ethernet frame • Alleviates the MAC explosion problem - Core switches no longer need to learn customer MAC addresses • Does not address the STP issue, however. Public Recent Developments Provider Backbone Bridging
  • 46. 46 © Nokia 2017 • Designed to interconnect Provider Bridge Networks (PBN - IEEE 802.1ad) • Adds a Backbone Header to a Customer/QinQ Ethernet Frame - Provider Addressing for Backbone Forwarding - New extended tag for Service Virtualization • Standardization ongoing Public Provider Backbone Bridging (PBB) Ethernet Technology being standardized in IEEE 802.1ah Task Group PBBN is Ethernet based: Connectionless Forwarding based on MAC Learning & Forwarding, Loop Avoidance based on STP, VLAN ID for Broadcast Containment PBN PBNPBBN PBB BEB PBB BEB BEB: Backbone Edge Bridge Forward frames based on backbone MAC addresses
  • 47. 47 © Nokia 2017 B-DA B-SA B-VID I-SID Ethertype Ethertype PBN (QinQ) PBN (QinQ) PBBN PBB PE2 QinQ frame QinQ frame PBB frame B2 PBB PE1 B1B4 B6B5 B3 A1 CMAC=X Backbone FIBs A1->Port Customer FIB X->A1 Customer FIB X->Port CMAC=Y MAC-based, Connectionless Forwarding Backbone VLAN ID Broadcast Containment Extended Service Tag Identifies the service instance inside PE Backbone MACs I1 I2 I1 I1 I2 IEEE 802.1ah Model for PBB – I and B Components Public C-DA C-SA Payload S-VID C-VID Ethertype Ethertype Ethertype C-DA C-SA Payload S-VID C-VID Ethertype Ethertype Ethertype C-DA C-SA Payload S-VID C-VID Ethertype Ethertype Ethertype
  • 48. 48 © Nokia 2017 802.1ah Provider Backbone Bridge Encapsulation Public 6+6 22 (w/o FCS) 2+2 2+4 I-TAG B-TAG S-TAG C-TAG DEI p bits VLAN-ID I-PCP IDEI UCA Res I-SID 24313 1Bits I-PCP = Customer Priority I-DEI = Drop Elegibility UCA = Use Customer Addresses I-SID = Service Instance ID B-DA B-SA B-TAG TCI I-TAG TCI ah Ethertype = 88e7 ad Ethertype = 88a8 C-DA C-SA Payload S-TAG TCI C-TAG TCI ad Ethertype = 88a8 q Ethertype = 8100 Ethertype
  • 49. 49 © Nokia 2017 • Addresses the STP issue… • SPBM is a Spanning-Tree Protocol replacement for PBB • Being standardized in the IEEE in 802.1aq - Shortest path backbone bridging Mac/VLAN Mode • Requirements to address: - No blocked ports like STP - Fast resiliency - No hop count restrictions like STP - Simple networking paradigm Public Recent Developments Shortest Path Bridging
  • 50. 50 © Nokia 2017 • Discover the network topology - Enable a routing protocol on each system to discover the network topology • Build shortest path trees between the network nodes - To be used later for forwarding traffic on • Distribute the service information to the network nodes - Once services are created (i.e. ISIDs), the routing protocol is used to distribute the information to all SPBM nodes - All nodes (edge and core) are now aware of all VPNs and where the endpoints are. • Update Forwarding Tables to connect the service nodes - If the node determines that it is on the shortest path between endpoints for an ISID, it updates its FIB for forwarding. - When all nodes on shortest path complete the calculations, the VPN is connected! Public Shortest Path Bridging How it works
  • 51. 51 © Nokia 2017 1. Discover network topology • IS-IS enabled on nodes, • Each node/link is automatically discovered 2. Nodes use IS-IS link state to automatically build trees from itself to all nodes: - Important properties: • Shortest path tree based on link metrics • No blocked links • Loop free via RPFC on SA-BMAC • Symmetric unicast/mcast datapath between any two nodes provides closed OAM system • unicast path now exists from every node to every other node 3. Use IS-IS to advertise new services communities of interest • MAC and ISID information flooded to the network 4. When nodes receive notice of a new service AND they are on the shortest path, update FDB • Unicast FIB entry – no flooding in BVPLS • Mcast FIB entry – per ISID group MAC Shortest Path Bridging - Operation ISIS ISIS ISIS ISISISIS ISIS ISIS ISIS ISIS ISIS ISIS CREATE ISID=100 100 100 100 100 100 100 Shortest path tree to node A shown Node A
  • 52. 52 © Nokia 2017 2 43 1 2 43 1 2 43 1 3 2 1 4 4 2 1 3 Base SPBM Topology SPT for node 1 SPT for node 2 SPT for node 3 SPT for node 4 Path from 1 to 4 are symmetrical for SPT at node 1 and SPT at node 4. Same for all other node pairs. Shortest Path Bridging – SPT Example Public
  • 53. 53 © Nokia 2017 3.5 Summary Public
  • 54. 54 © Nokia 2017 • High Availability is difficult to achieve in networks running the Spanning Tree Protocol • Scalability – IEEE 802.1q/802.1ad networks run into scalability limitations in terms of the number of supported services - Customer Ethernet frames are encapsulated in a provider Ethernet frame • QoS – only very rudimentary traffic-engineering can be achieved in bridged Ethernet networks. • A lot of deployed Ethernet switching platforms lack carrier-class capabilities required for the delivery of Carrier Ethernet services • New extensions in IEEE 802.1ah address some limitations such as the number of service instances and MAC explosion problems • New extensions in IEEE 802.1aq address the replacement of the Spanning Tree Protocol Public Traditional Metro Ethernet Networks Summary of Issues
  • 55. 55 © Nokia 2017 Which IEEE standard defines Provider Bridging (Q-in-Q) ? Audience Question 2 Public
  • 56. 56 © Nokia 2017 What is the size of the I-SID field in IEEE 802.1ah? Audience Question 3 Public
  • 57. 57 © Nokia 2017 delivering ethernet over mpls Public
  • 58. 58 © Nokia 2017 4. Delivering Ethernet over MPLS a. Introduction to MPLS b. The Pseudowire Reference Model c. Ethernet Virtual Private Wire Service d. Ethernet Virtual Private LAN Service e. Scaling VPLS f. VPLS Topologies g. Resiliency Mechanisms Public Agenda
  • 59. 59 © Nokia 2017 4.1 Introduction to MPLS Public
  • 60. 60 © Nokia 2017 - Convergence: From “MPLS over everything” to “Everything over MPLS” ! • One network, multiple services - Excellent virtualisation capabilities • Today’s MPLS network can transport IP, ATM, Frame Relay and even TDM ! - Scalability • MPLS is used in some of the largest service provider networks in the world - Advanced Traffic Engineering capabilities using RSVP-TE - Rapid recovery based on MPLS Fast ReRoute (FRR) • Rapid restoration around failures by local action at the Points of Local Repair (PLRs) • Sub-50ms restoration on link/node failures is a key requirement for carriers who are used to such performance in their SONET/SDH networks - Feature-richness • MPLS has 10 years of development behind it and continues to evolve today - Layer 3 VPNs have already proven themselves as the killer app for MPLS – there is no reason why this success cannot be emulated by Layer 2 VPNs Public Delivering Ethernet over MPLS MPLS Attributes
  • 61. 61 © Nokia 2017 • MPLS is multiprotocol in terms of both the layers above and below it ! • The ultimate technology for convergence Public MPLS is truly Multi-Protocol The “Multiprotocol” nature of MPLS MPLS Ethernet Frame Relay ATM PoS PPP Etc. Physical Ethernet Frame Relay ATM TDM IP Etc.
  • 62. 62 © Nokia 2017 • One common network supports multiple, different overlaid services Public MPLS Virtualisation The virtualisation capabilities of MPLS PE PE PE PE PE MPLS P P P P
  • 63. 63 © Nokia 2017 • One common network supports multiple, different overlaid services Public MPLS Virtualisation The virtualisation capabilities of MPLS PE PE PE PE PE VPLS VPWS L3VPN MPLS
  • 64. 64 © Nokia 2017 • Service state is kept only on the Provider Edge devices • The Provider (P) devices simply contain reachability information to each other and all PEs in the network • The Provider Edge (PE) devices contain customer and service-specific state MPLS Scalability MPLS Scalability PE PE PE PE PE MPLS P P P P No customer or service state in the core
  • 65. 65 © Nokia 2017 • The Problem: consider example below – all mission-critical traffic between nodes A and Z has to use the path A-D-E-F-Z, while all other traffic uses the path A-B-C-Z. Public MPLS Traffic-Engineering Traffic-Engineering capabilities A Z D E F B C Other traffic Mission-critical traffic
  • 66. 66 © Nokia 2017 • The IGP-based solution - Use link metrics to influence traffic path - It’s all or nothing – Traffic cannot be routed selectively • Other solutions § Policy-based routing – will work but is cumbersome to manage and has to be carefully crafted to avoid routing loops Public MPLS Traffic-Engineering A Z D E F B C10 10 10 10 30 10 10 Other traffic Mission-critical traffic
  • 67. 67 © Nokia 2017 • Use constrained path routing to build Label Switched Paths (LSPs) Public MPLS Traffic-Engineering The MPLS solution § Constrain LSP1 to use only the “orange” physical links A Z D E F B C Mission-critical traffic LSP 2 LSP 1 Other traffic § Constrain LSP2 to use only the “blue” physical links § At the PEs, map the mission-critical traffic to LSP2 and… § …all other traffic to LSP1
  • 68. 68 © Nokia 2017 • Step 1 – Detection of the failure - One or more routers detect that a failure (link or node) has occurred • Step 2 – Propagation of failure notification - The router(s) detecting the failure inform other routers in the domain about the failure • Step 3 – Recomputation of Paths/Routes - All routers which receive the failure notification now have to recalculate new routes/paths by running SPF algorithms etc • Step 4 – Updating of the Forwarding Table - Once new routes are computed, they are downloaded to the routers’ forwarding table, in order to allow them to be used • All of this takes time… Public MPLS Traffic-Engineering Recovery from failures – typical IGP
  • 69. 69 © Nokia 2017 • What happens immediately after the link between C and Z fails ? Public MPLS Traffic-Engineering Failure and Recovery Example – IGP-based B Z Direction of traffic flow § Step 1 - Assuming a loss of signal (or similar physical indication) nodes C and Z immediately detect that the link is down § Node A does not know that the link is down yet and keeps sending traffic destined to node Z to Node C. Assuming that node C has not completed step 4 yet, this traffic is dropped. C A 10 10 20 10
  • 70. 70 © Nokia 2017 • Node C (and node Z) will be the first to recalculate its routing table and update its forwarding table (step 4). Public MPLS Traffic-Engineering Failure and Recovery Example (continued) – IGP-based § In the meantime, Node A does not know that the link is down yet and keeps sending traffic destined to node Z to Node C. Given that node C has completed step 4, it now believes (quite correctly) that the best path to Z is via node A. BUT – node A still believes that the best path to node Z is via node C so it sends the traffic right back to node C. We have a transient loop (micro-loop) …. § The loop resolves itself as soon as node A updates its forwarding table but in the meantime, valuable packets have been dropped B Z Direction of traffic flow C A 10 10 20 10
  • 71. 71 © Nokia 2017 • Node A and all other nodes eventually update their forwarding tables and all is well again. • But the damage is already done. . . Public MPLS Traffic-Engineering Failure and Recovery Example (continued) B Z Direction of traffic flow C A 10 10 20 10
  • 72. 72 © Nokia 2017 • RSVP-TE Fast Re-Route (FRR) pre-computes detours around potential failure points such as next-hop nodes and links • When link or node failures occur, the routers (Points of Local Repair) directly connected to the failed link rapidly (sub-50ms) switch all traffic onto the detour paths. • The network eventually converges and the head-end router (source of the traffic) switches traffic onto the most optimal path. Until that is done, traffic flows over the potentially sub-optimal detour path BUT the packet loss is kept to a minimum Public MPLS Traffic-Engineering Recovery from failures – how can MPLS help ?
  • 73. 73 © Nokia 2017 • Node C pre-computes and builds a detour around link C-Z Public MPLS Traffic-Engineering Failure and Recovery Example – with MPLS FRR B Z Direction of traffic flowC A 10 10 20 10 Bypass tunnel
  • 74. 74 © Nokia 2017 • When link C-Z fails, node C reroutes traffic onto the detour tunnel • Traffic does a U-turn but still makes it to the destination Public MPLS Traffic-Engineering Failure and Recovery Example – with MPLS FRR B Z C A 10 10 20 10 Direction of traffic flow
  • 75. 75 © Nokia 2017 What is the size of the MPLS label stack entry ? And the MPLS label itself ? Audience Question 4 Public
  • 76. 76 © Nokia 2017 4.2 The Pseudowire Reference Model Public
  • 77. 77 © Nokia 2017 • Key enabling technology for delivering Ethernet services over MPLS • Specified by the pwe3 working group of the IETF • Originally designed for Ethernet over MPLS (EoMPLS) – initially called Martini tunnels • Now extended to many other services – ATM, FR, Ethernet, TDM • Encapsulates and transports service-specific PDUs/Frames across a Packet Switched Network (PSN) tunnel • The use of pseudowires for the emulation of point-to-point services is referred to as Virtual Private Wire Service (VPWS) Public The Pseudowire Reference Model Pseudowires
  • 78. 78 © Nokia 2017 • IETF definition (RFC3985): “...a mechanism that emulates the essential attributes of a telecommunications service (such as a T1 leased line or Frame Relay) over a PSN. PWE3 is intended to provide only the minimum necessary functionality to emulate the wire with the required degree of faithfulness for the given service definition.” Public The Pseudowire Reference Model Pseudowires (cont.)
  • 79. 79 © Nokia 2017 PWE3 Reference Model Public Generic PWE3 Architectural Reference Model: PSN CE 1 CE 2 Emulated Service Pseudowire PSN Tunnel Attachment Circuit Attachment Circuit PE 1 PE 2 Payload Payload PW Demultiplexer Physical Data Link PSN Payload
  • 80. 80 © Nokia 2017 - Attachment circuit (AC) • The physical or virtual circuit attaching a CE to a PE. - Customer Edge (CE) • A device where one end of a service originates and/or terminates. - Forwarder (FWRD) • A PE subsystem that selects the PW to use in order to transmit a payload received on an AC. - Packet Switched Network (PSN) • Within the context of PWE3, this is a network using IP or MPLS as the mechanism for packet forwarding. - Provider Edge (PE) • A device that provides PWE3 to a CE. - Pseudo Wire (PW) • A mechanism that carries the essential elements of an emulated service from one PE to one or more other PEs over a PSN. - PSN Tunnel • A tunnel across a PSN, inside which one or more PWs can be carried. - PW Demultiplexer • Data-plane method of identifying a PW terminating at a PE. Public PWE3 Terminology Pseudowire Terminology
  • 81. 81 © Nokia 2017 • The PW demultiplexing layer provides the ability to deliver multiple PWs over a single PSN tunnel Public Pseudowire Protocol Layering Pseudowire – Protocol Layering: Payload PW Label Physical Data Link PSN Label Ethernet over MPLS PSN Ethernet Frame
  • 82. 82 © Nokia 2017 4.3 Ethernet Virtual Private Wire Service (VPWS) Public
  • 83. 83 © Nokia 2017 • Encapsulation specified in RFC4448 – “Encapsulation Methods for Transport of Ethernet over MPLS Networks” - Ethernet pseudowires carry Ethernet/802.3 Protocol Data Units (PDUs) over an MPLS network - Enables service providers to offer “emulated” Ethernet services over existing MPLS networks - RFC4448 defines a point-to-point Ethernet pseudowire service - Operates in one of two modes: • Tagged mode - In tagged mode, each frame MUST contain at least one 802.1Q VLAN tag, and the tag value is meaningful to the two PW termination points. • Raw mode - On a raw mode PW, a frame MAY contain an 802.1Q VLAN tag, but if it does, the tag is not meaningful to the PW termination points, and passes transparently through them. Public Ethernet Virtual Private Wire Service Ethernet Pseudowires
  • 84. 84 © Nokia 2017 • Two types of services: - “port-to-port” – all traffic ingressing each attachment circuit is transparently conveyed to the other attachment circuit, where each attachment circuit is an entire Ethernet port - “Ethernet VLAN to VLAN” – all traffic ingressing each attachment circuit is transparently conveyed to the other attachment circuit, where each attachment circuit is a VLAN on an Ethernet port • In this service instance, the VLAN tag may be stripped on ingress and then re-imposed on egress. • Alternatively, the VLAN tag may be stripped on ingress and a completely different VLAN ID imposed on egress, allowing VLAN re-write • The VLAN ID is locally significant to the Ethernet port Public Ethernet Virtual Private Wire Service Ethernet Pseudowires (continued):
  • 85. 85 © Nokia 2017 PWE3 Reference Model for Ethernet VPWS Public PWE3 Architectural Reference Model for Ethernet Pseudowires PSN CE 1 CE 2 Emulated Service Pseudowire PSN Tunnel Attachment Circuit Attachment Circuit PE 1 PE 2 Payload Payload PW Demultiplexer Physical Data Link PSN Payload
  • 86. 86 © Nokia 2017 Ethernet Virtual Private Wire Service Public Ethernet PWE3 Protocol Stack Reference Model Emulated Ethernet PW Demultiplexer Physical Data Link PSN MPLS Emulated Service Emulated Ethernet PW Demultiplexer Physical Data Link PSN MPLS Pseudowire PSN Tunnel
  • 87. 87 © Nokia 2017 Ethernet VPWS Example 1 Public Example 1: Ethernet VPWS port-to-port (traffic flow from CE1 to CE2) Port 1/2/1 Port 3/2/0 Payload Payload •6775 Physical Data Link •1029 PE1 Config: Service ID: 1000 Service Type: Ethernet VPWS (port-to-port) PSN Label for PE2: 1029 PW Label from PE2: 6775 Port: 1/2/1 PE2 Config: Service ID: 1000 Service Type: Ethernet VPWS (port-to-port) PSN Label for PE1: 4567 PW Label from PE1: 10978 Port: 3/2/0 Traffic Flow DA SA VLAN tag DA SA VLAN tag Payload DA SA VLAN tag PSN CE 1 CE 2 PE 1 PE 2
  • 88. 88 © Nokia 2017 Ethernet VPWS Example 1 Public Example 1: Ethernet VPWS port-to-port (traffic flow from CE2 to CE1) Port 1/2/1 Port 3/2/0 Payload Payload •10978 Physical Data Link •4567 PE1 Config: Service ID: 1000 Service Type: Ethernet VPWS (port-to-port) PSN Label for PE2: 1029 PW Label from PE2: 6775 Port: 1/2/1 PE2 Config: Service ID: 1000 Service Type: Ethernet VPWS (port-to-port) PSN Label for PE1: 4567 PW Label from PE1: 10978 Port: 3/2/0 Traffic Flow DA SA VLAN tag DA SA VLAN tag Payload DA SA VLAN tag PSN CE 1 CE 2 PE 1 PE 2
  • 89. 89 © Nokia 2017 Ethernet VPWS Example 2 Public Example 2: Ethernet VPWS VLAN-based (traffic flow from CE1 to CE2) Port 1/2/1 Port 3/2/0 Payload Payload •6775 Physical Data Link •1029 PE1 Config: Service ID: 2000 Service Type: Ethernet VPWS (VLAN-100) PSN Label for PE2: 1029 PW Label from PE2: 5879 Port: 1/2/1 VLAN 100 PE2 Config: Service ID: 2000 Service Type: Ethernet VPWS (VLAN-200) PSN Label for PE1: 4567 PW Label from PE1: 21378 Port: 3/2/0 VLAN 200 Traffic Flow DA SA VLAN tag - 100 DA SA VLAN tag Payload DA SA VLAN tag - 200 PSN CE 1 CE 2 PE 1 PE 2
  • 90. 90 © Nokia 2017 Ethernet VPWS Example 2 Public Example 2: Ethernet VPWS VLAN-based (traffic flow from CE2 to CE1) Port 1/2/1 Port 3/2/0 Payload Payload •21378 Physical Data Link •4567 PE1 Config: Service ID: 2000 Service Type: Ethernet VPWS (VLAN-100) PSN Label for PE2: 1029 PW Label from PE2: 5879 Port: 1/2/1 VLAN 100 PE2 Config: Service ID: 2000 Service Type: Ethernet VPWS (VLAN-200) PSN Label for PE1: 4567 PW Label from PE1: 21378 Port: 3/2/0 VLAN 200 Traffic Flow DA SA VLAN tag - 100 DA SA VLAN tag Payload DA SA VLAN tag - 200 PSN CE 1 CE 2 PE 1 PE 2
  • 91. 91 © Nokia 2017 • Signalling specified in RFC4447 – “Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)” • The MPLS Label Distribution Protocol, LDP [RFC5036], is used for setting up and maintaining the pseudowires - PW label bindings are distributed using the LDP downstream unsolicited mode - PEs establish an LDP session using the LDP Extended Discovery mechanism a.k.a Targeted LDP or tLDP • The PSN tunnels are established and maintained separately by using any of the following: - The Label Distribution Protocol (LDP) - The Resource Reservation Protocol with Traffic Engineering (RSVP-TE) - Static labels Public Ethernet Virtual Private Wire Service Ethernet Pseudowires – Setup and Maintenance
  • 92. 92 © Nokia 2017 • LDP distributes FEC to label mappings using the PWid FEC Element (popularly known as FEC Type 128) • Both pseudowire endpoints have to be provisioned with the same 32-bit identifier for the pseudowire to allow them to obtain a common understanding of which service a given pseudowire belongs to. Public Ethernet Virtual Private Wire Service Ethernet Pseudowires – Setup and Maintenance 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PWid (0x80) |C| PW type |PW info Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Group ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PW ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface Parameter Sub-TLV | | " | | " | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  • 93. 93 © Nokia 2017 • A new TLV, the Generalized PWid FEC Element (popularly known as FEC Type 129) has also been developed but is not widely deployed as yet • The Generalized PWid FEC element requires that the PW endpoints be uniquely identified; the PW itself is identified as a pair of endpoints. In addition, the endpoint identifiers are structured to support applications where the identity of the remote endpoints needs to be auto-discovered rather than statically configured. Public Ethernet Virtual Private Wire Service Ethernet Pseudowires – Setup and Maintenance
  • 94. 94 © Nokia 2017 • The Generalized PWid FEC Element (popularly known as FEC Type 129) Public Ethernet Virtual Private Wire Service Ethernet Pseudowires – Setup and Maintenance 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Gen PWid (0x81)|C| PW Type |PW info Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AGI Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ AGI Value (contd.) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ SAII Value (contd.) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ TAII Value (contd.) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  • 95. 95 © Nokia 2017 What protocol is used to exchange pseudowire labels between provider edge routers ? Audience Question 5 Public
  • 96. 96 © Nokia 2017 4.4 Ethernet Virtual Private LAN Service (VPLS) Public
  • 97. 97 © Nokia 2017 • Two variants - RFC4762 - Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling. We will concentrate on this variant in the rest of this tutorial - RFC4761 - Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling Public Ethernet Virtual Private LAN Service Ethernet VPLS
  • 98. 98 © Nokia 2017 • A VPLS creates an emulated private LAN segment for a given set of users. • It creates a Layer 2 broadcast domain that is fully capable of learning and forwarding on Ethernet MAC addresses and that is closed to a given set of users. Multiple VPLS services can be supported from a single Provider Edge (PE) node. • The primary motivation behind VPLS is to provide connectivity between geographically dispersed customer sites across MANs and WANs, as if they were connected using a LAN. • The main intended application for the end-user can be divided into the following two categories: - Connectivity between customer routers: LAN routing application - Connectivity between customer Ethernet switches: LAN switching application Public Ethernet Virtual Private LAN Service Definition
  • 99. 99 © Nokia 2017 • Simplicity - Behaves like an “ethernet switch in the sky” - No routing interaction with the provider - Clear demarcation between subscriber and provider - Layer 3 agnostic • Scalable - Provider configures site connectivity only - Hierarchy reduces number of sites touched • Multi-site connectivity - On the fly connectivity via Ethernet bridging Public VPLS Benefits Benefits for the customer
  • 100. 100 © Nokia 2017 VPLS Topological Model Public Topological Model for VPLS (customer view) PSN CE 1 CE 2 CE 3
  • 101. 101 © Nokia 2017 VPLS Topological Model Public Topological Model for VPLS (provider view) PSN CE 1 CE 2 Attachment Circuit Attachment Circuit PE 1 PE 2 PE 3 CE 3 Attachment Circuit Emulated LAN
  • 102. 102 © Nokia 2017 Constructing VPLS Services Public PSN Tunnels and Pseudowire Constructs for VPLS PSN CE 1 CE 2 Attachment Circuit Attachment Circuit CE 3 Attachment Circuit PSN (LSP) tunnel Virtual Bridge Instance Pseudowire VB PE 1 PE 2 PE 3 VB VB VB
  • 103. 103 © Nokia 2017 • PE interfaces participating in a VPLS instance are able to flood, forward, and filter Ethernet frames, like a standard Ethernet bridged port • Many forms of Attachment Circuits are acceptable, as long as they carry Ethernet frames: - Physical Ethernet ports - Logical (tagged) Ethernet ports - ATM PVCs carrying Ethernet frames - Ethernet Pseudowire • Frames sent to broadcast addresses and to unknown destination MAC addresses are flooded to all ports: - Attachment Circuits - Pseudowires to all other PE nodes participating in the VPLS service • PEs have the capability to associate MAC addresses with Pseudowires Public VPLS PE Functions Provider Edge Functions
  • 104. 104 © Nokia 2017 • Address learning: - Unlike BGP VPNs [RFC4364], reachability information is not advertised and distributed via a control plane. - Reachability is obtained by standard learning bridge functions in the data plane. - When a packet arrives on a PW, if the source MAC address is unknown, it is associated with the PW, so that outbound packets to that MAC address can be delivered over the associated PW. - When a packet arrives on an AC, if the source MAC address is unknown, it is associated with the AC, so that outbound packets to that MAC address can be delivered over the associated AC. Public VPLS PE Functions Provider Edge Functions (continued)
  • 105. 105 © Nokia 2017 VPLS Signalling Public VPLS Mechanics: § Bridging capable PE routers are connected with a full mesh of MPLS LSP tunnels § Per-Service pseudowire labels are negotiated using RFC 4447 techniques § Replicates unknown/broadcast traffic in a service domain § MAC learning over tunnel & access ports § Separate FIB per VPLS for private communication Full mesh of LSP tunnels PSN CE 1 CE 2 Attachment Circuit Attachment Circuit PE 1 PE 2 PE 3 CE 3 Attachment Circuit Emulated LAN
  • 106. 106 © Nokia 2017 VPLS Signalling Public Tunnel establishment § LDP: § MPLS paths based on IGP reachability § RSVP: traffic engineered MPLS paths with bandwidth & link constraints, and fast reroute alternatives Pseudowire establishment § LDP: point-to-point exchange of PW ID, labels, MTU Full mesh of LSP tunnels PSN CE 1 CE 2 Attachment Circuit Attachment Circuit PE 1 PE 2 PE 3 CE 3 Attachment Circuit Emulated LAN
  • 107. 107 © Nokia 2017 VPLS Signalling Public A full mesh of pseudowires is established between all PEs participating in the VPLS service: § Each PE initiates a targeted LDP session to the far-end System IP (loopback) address § Tells far-end what PW label to use when sending packets for each service PSN CE 1 CE 2 Attachment Circuit Attachment Circuit CE 3 Attachment Circuit PSN (LSP) tunnel Virtual Bridge Instance Pseudowire VB PE 1 PE 2 PE 3 VB VB VB
  • 108. 108 © Nokia 2017 Why a full mesh of pseudowires? § If the topology of the VPLS is not restricted to a full mesh, then it may be that for two PEs not directly connected via PWs, they would have to use an intermediary PE to relay packets § A loop-breaking protocol, such as the Spanning Tree Protocol, would be required § With a full-mesh of PWs, every PE is now directly connected to every other PE in the VPLS via a PW; there is no longer any need to relay packets § The loop-breaking rule now becomes the "split horizon" rule, whereby a PE MUST NOT forward traffic received from one PW to another in the same VPLS mesh § Does this remind you of a similar mechanism used in IP networks ? The ibgp full-mesh ! Public VPLS Signalling
  • 109. 109 © Nokia 2017 • Signalling specified in RFC4447 – “Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)” • The MPLS Label Distribution Protocol, LDP [RFC5036], is used for setting up and maintaining the pseudowires - PW label bindings are distributed using the LDP downstream unsolicited mode - PEs establish an LDP session using the LDP Extended Discovery mechanism a.k.a Targeted LDP or tLDP • The PSN tunnels are established and maintained separately by using any of the following: - The Label Distribution Protocol (LDP) - The Resource Reservation Protocol with Traffic Engineering (RSVP-TE) - Static labels Public VPLS Pseudowire Signalling Ethernet Pseudowires – Setup and Maintenance
  • 110. 110 © Nokia 2017 • LDP distributes FEC to label mappings using the PWid FEC Element (popularly known as FEC Type 128) • Both pseudowire endpoints have to be provisioned with the same 32-bit identifier for the pseudowire to allow them to obtain a common understanding of which service a given pseudowire belongs to. Public VPLS Pseudowire Signalling Ethernet Pseudowires – Setup and Maintenance 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PWid (0x80) |C| PW type |PW info Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Group ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PW ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface Parameter Sub-TLV | | " | | " | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  • 111. 111 © Nokia 2017 • A new TLV, the Generalized PWid FEC Element (popularly known as FEC Type 129) has also been developed but is not widely deployed as yet • The Generalized PWid FEC element requires that the PW endpoints be uniquely identified; the PW itself is identified as a pair of endpoints. In addition, the endpoint identifiers are structured to support applications where the identity of the remote endpoints needs to be auto-discovered rather than statically configured. Public VPLS Pseudowire Signalling Ethernet Pseudowires – Setup and Maintenance
  • 112. 112 © Nokia 2017 • The Generalized PWid FEC Element (popularly known as FEC Type 129) Public VPLS Pseudowire Signalling Ethernet Pseudowires – Setup and Maintenance 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Gen PWid (0x81)|C| PW Type |PW info Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AGI Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ AGI Value (contd.) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ SAII Value (contd.) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ TAII Value (contd.) ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  • 113. 113 © Nokia 2017 Ethernet VPLS Signalling Example Public PE1 Config: Service ID: 1001 Service Type: Ethernet VPLS PSN Label for PE2: 1029 PSN Label for PE3: 9178 PW Label from PE2: 6775 PW Label from PE3: 10127 Port: 1/2/1 PE2 Config: Service ID: 1001 Service Type: Ethernet VPLS PSN Label for PE1: 4567 PSN Label for PE3: 11786 PW Label from PE1: 10978 PW Label from PE3: 4757 Port: 3/2/0 Port 1/2/1 Port 3/2/0 PE3 Config: Service ID: 1001 Service Type: Ethernet VPLS PSN Label for PE1: 6668 PSN Label for PE2: 12812 PW Label from PE1: 4568 PW Label from PE3: 10128 Port: 4/1/2 Port 4/1/2 PSN CE 1 CE 2 CE 3 VB PE 1 PE 2 PE 3 VB VB
  • 114. 114 © Nokia 2017 VPLS Packet Walkthrough and MAC Learning Example Public Forwarding Database – PE 2 MAC Location Mapping M2 Local Port 3/2/0 PSN M1 M2 M3 VB PE 1 PE 2 PE 3 VBVB Packet Walkthrough for VPLS Service-id 1001 Send a packet from M2 to M1 - PE2 learns that M2 is reached on Port 3/2/0 - PE2 floods to PE1 with PW-label 10978 and PE3 with PW-label 4757 - PE1 learns from the PW-label 10978 that M2 is behind PE2 - PE1 sends on Port 1/2/1 - PE3 sends on Port 4/1/2 - PE3 learns from the PW-label 4757 M2 is behind PE2 - M1 receives packet Forwarding Database – PE 3 MAC Location Mapping M2 Remote PW to PE2 Forwarding Database – PE 1 MAC Location Mapping M2 Remote PW to PE2 Port 1/2/1 Port 3/2/0 Port 4/1/2
  • 115. 115 © Nokia 2017 VPLS Packet Walkthrough and MAC Learning Example (cont.) Public Forwarding Database – PE 2 MAC Location Mapping M1 Remote PW to PE1 M2 Local Port 3/2/0 Forwarding Database – PE 1 MAC Location Mapping M1 Local Port 1/2/1 M2 Remote PW to PE2 Reply with a packet from M1 to M2 - PE1 learns M1 is on Port 1/2/1 - PE1 knows that M2 is reachable via PE2 - PE1 sends to PE2 using PW-label 6775 - PE2 knows that M2 is reachable on Port 3/2/0 and so it sends it out that port - M2 receives packet PSN M1 M2 M3 VB PE 1 PE 2 PE 3 VBVB Packet Walkthrough for VPLS Service-id 1001 Port 1/2/1 Port 3/2/0 Port 4/1/2
  • 116. 116 © Nokia 2017 If a full-mesh VPLS is set up between 5 provider edge routers, how many pseudowires need to be configured ? Audience Question 6 Public
  • 117. 117 © Nokia 2017 4.5 Scaling VPLS Public
  • 118. 118 © Nokia 2017 § Introduces hierarchy in the base VPLS solution to provide scaling & operational advantages § Extends the reach of a VPLS using spokes, i.e., point-to- point pseudowires or logical ports Hierarchical-VPLS (H-VPLS) Public PE-1 PE-2 VPLS M-1 M-3 VB VB VB PE-3 VB M-5 M-6 VB MTU-1
  • 119. 119 © Nokia 2017 • Scales signalling - Full-mesh between MTUs is reduced to full-mesh between PEs and single PW between MTU and PE • Scales replication - Replication at MTU is not required - Replication is reduced to what is necessary between PEs • Simplifies edge devices - Keeps cost down because PEs can be replaced with MTUs • Enables scalable inter-domain VPLS - Single spoke to interconnect domains Public Hierarchical VPLS How is a spoke useful?
  • 120. 120 © Nokia 2017 Scalability: Signalling Public Mesh PWsSpoke PWs Mesh PWs Full-mesh between PEs is reduced to full-mesh between PEs and single spoke between MTU and PE
  • 121. 121 © Nokia 2017 Scalability: Replication Public Flat architecture replicationis reduced to distributed replication
  • 122. 122 © Nokia 2017 Scalability: Configuration Public is significantly reducedFull mesh configuration
  • 123. 123 © Nokia 2017 Topological Extensibility: Metro Interconnect Public ISP IP / MPLS Core Network Metro IP / MPLS Network Metro IP / MPLS Network
  • 124. 124 © Nokia 2017 • Provider hand-off can be - q-tagged or q-in-q port - Pseudowire spoke Public Topological Extensibility: Inter-AS Connectivity Provider A IP / MPLS Network Provider B IP / MPLS Network
  • 125. 125 © Nokia 2017 4.6 VPLS Topologies Public
  • 126. 126 © Nokia 2017 Topologies: Mesh Public PE-4 PE-1 PE-3 PE-2
  • 127. 127 © Nokia 2017 Topologies: Hierarchical Public PE-4 PE-1 PE-3 PE-2
  • 128. 128 © Nokia 2017 Topologies: Dual-homing Public PE-4 PE-1 PE-3 PE-2
  • 129. 129 © Nokia 2017 Topologies: Ring Public PE-6 PE-1 PE-4 PE-3 PE-2 PE-5 • A full mesh would have too many duplicate packets • Each PE has a spoke to the next PE in the VPLS • Packets are flooded into the adjacent spokes and to all VPLS ports • When MACs are learned, packets stop at the owning PE
  • 130. 130 © Nokia 2017 4.7 Resiliency Mechanisms Public
  • 131. 131 © Nokia 2017 4.7 Resiliency Mechanisms a) Multi-Chassis LAG (MC-LAG) b) Redundancy with VPLS c) Pseudo-wire Redundancy with MC-LAG d) Multi-Segment Pseudo-wires Public Agenda
  • 132. 132 © Nokia 2017 4.7.1 Multi-Chassis LAG (MC-LAG) Public
  • 133. 133 © Nokia 2017 Multi-chassis LAG: What is it ? Public LAG 1 LAG 1 Traffic distributed via hash algorithm § Maintains packet sequence per “flow” § Based on packet content or SAP/service ID Link Aggregation Control Protocol (LACP) IEEE Std 802.3-2002_part3 (formerly in 802.3ad) system MAC and priority system MAC and priority administrative key administrative key Consistent port capabilities (e.g. speed, duplex) Standard LAG What if one system fails… Introduce LAG redundancy to TWO systems Multi-Chassis LAG (MC-LAG)
  • 134. 134 © Nokia 2017 Multi-chassis LAG: How does it work ? Public Multi-chassis LAG LAG 1 Provider Network lag 1 lacp-key 1 system-id 00:00:00:00:00:01 system-priority 100 lag 1 lacp-key 1 system-id 00:00:00:00:00:01 system-priority 100 Edge device LAG 1 (sub- group) (sub- group )LAG 1 LACP Standard LAG Multi-chassis LAG control protocol MC- LAG MC- LAG MC-LAG on a SAP Active Standbyout of sync in LACPDUs
  • 135. 135 © Nokia 2017 Multi-chassis LAG: How does it work ? Public Active LAG 1 (sub- group) LAG 1 Provider Network Edge device LACP Standard LAG Standby Multi-chassis LAG failover Multi-chassis LAG control protocol MC- LAG MC- LAG msg (sub- group) LAG 1 out of sync LACP message Activein sync in LACPDUs
  • 136. 136 © Nokia 2017 4.7.2 Redundancy with VPLS Public
  • 137. 137 © Nokia 2017 Active Redundancy at the VPLS edge: MC-LAG Public LAG Standby MC-LAG Standard LAG VPL S Active MC-LAG MAC withdraw Triggered by Phy/ LACP/802.3ah failure detection
  • 138. 138 © Nokia 2017 - Network Edge • L2/L3 CPE for business services L2 DSLAM/BRAS for triple-play services Public Redundancy Applications for VPLS w/MC-LAG DSLAM Provider Network Standby ActiveProvider Network Standby Active CE MC- LAG MC- LAG MC- LAG MC- LAG Full Mesh Full Mesh MC-LAG Active Standby MC- LAG MC- LAG MC- LAG MC- LAG VPL S VPL S Inter-metro Connectivity Single active path Selective MAC withdraw for faster convergence
  • 139. 139 © Nokia 2017 4.7.3 Pseudo-wire Redundancy with Multi-chassis LAG Public
  • 140. 140 © Nokia 2017 Pseudowire Redundancy Public Access Node Access Node VLL • Tunnel redundancy PW Tunnel bypass VLL Access Node Access Node VLL • PW redundancy • Single edge redundancy LAG Redundant PW Access Node Access Node VLL • PW redundancy • Dual edge redundancy LAG LAG Redundant PW
  • 141. 141 © Nokia 2017 Combining MC-LAG with Pseudowire Redundancy Public Extends L2 point-to-point redundancy across the network Acces s Node Acces s Node MC- LAG Redundant PW Active Active ActiveStandby Local PW status signaled via T-LDP VLL service terminates on different devices MC-LAG status propagated to local PW end points PW showing both ends active preferred for forwarding
  • 142. 142 © Nokia 2017 Multi-chassis LAG with Pseudo-Wire Redundancy Public How does it work ? Access Node Access Node VLL • PW redundancy • Single edge redundancy LAG PW VLL
  • 143. 143 © Nokia 2017 Multi-chassis LAG with PW Redundancy: Public How does it work ? LAG to PWs LAG MC- LAG Standard LAG SAP MC- LAG SAP epipe C X Y BA D epipe epipe PW PW PW PW Traffic path epipe PWs A C B D
  • 144. 144 © Nokia 2017 Multi-chassis LAG with PW Redundancy: Public How does it work ? LAG to PWs : LAG link failure MC- LAG Standard LAG SAP MC- LAG SAP epipe C X Y BA D epipe epipe S SDP S SDP S SDP S SDP Traffic path epipe New Traffic path A C B D LAG PWs
  • 145. 145 © Nokia 2017 Multi-chassis LAG with Pseudo-Wire Redundancy: Public How does it work ? Access Node Access Node VLL • PW redundancy • Dual edge redundancy LAG PW VLL LAG
  • 146. 146 © Nokia 2017 Multi-chassis LAG with PW Redundancy: Public How does it work ? LAG to PWs to LAG LAG LAG MC- LAG Standard LAG MC- LAG MC- LAG MC-LAG Active Standby ActiveStandby Standard LAG PWs PW Pw PW PW PW PW PW PW Traffic path A F B D EC
  • 147. 147 © Nokia 2017 Multi-chassis LAG with PW Redundancy: Public How does it work ? LAG to PWs to LAG : Network device failure Active Standby LAG LAG MC- LAG Standard LAG MC- LAG MC- LAG MC-LAG ActiveStandby Standard LAG PWs PW PW PW PW PW PW PW PW Traffic path New Traffic path ActiveActive A F B D EC
  • 148. 148 © Nokia 2017 4.7.4 Multi-segment Pseudo-wires Public
  • 149. 149 © Nokia 2017 Multi-segment Pseudo-wire – Motivation Public Ethernet VLL with SS-PW CE CE CE CE CE MPLS MPLS MPLS MPLS PE PE PE PE P P PE PE MPLS tunnel SS-PW T-LDP T-LDP T-LDP Remove need for full mesh of LDP-peers/LSP- tunnels VLLs over multiple tunnels (of different types) Simplifying VLL provisioning
  • 150. 150 © Nokia 2017 Multi-segment Pseudo-wire – How can you use them ? Public Ethernet VLL with MS-PW CE CE CE CE CE MPLS MPLS MPLS MPLS tunnel T-LDP T-LDP T-LDP MPLS S-PE S-PE T-PEMS-PW T-PE T-PE T-PE T-LDP T-LDP T-LDP S-PE T-PE T-LDP T-LDP Ethernet VLL redundancy across multiple areas e.g. FRR only available within an area/level Inter-domain connectivity [Metro w/RSVP] to [core w/LDP] to [metro w/RSVP] One device needs PWs to many remote devices
  • 151. 151 © Nokia 2017 Multi-segment Pseudo-wire – How do they work ? Public Customer frame Customer frame P E Access Node Access Node P E P Single Segment PW VLL Access Node Access Node T-PET- PE S-PE Multi Segment PW VLL Customer frameTUN- 1 PW-1 Customer frameTUN- 2 PW-2 Customer frameTUN- 1 PW-1 Customer frameTUN- 2 PW-1 same swapped
  • 152. 152 © Nokia 2017 Multi-segment Pseudo-wire – Redundancy Public Inter-metro/domain Redundant Ethernet VLLs with MS-PW CECE MPLS MPLS MPLS S-PE T-PE T-PE S-PEActiv e Activ e Activ e Endpoint with 2 PWs with preference determining TX Endpoint with 2 PWs with preference determining TX S-PES-PE Domain A Domain BInter-domain –Individual segments can have MPLS (FRR…) protection –Configure parallel MS-PW for end-end protection
  • 153. 153 © Nokia 2017 summary Public
  • 154. 154 © Nokia 2017 - Ethernet Services are in a period of tremendous growth with great revenue potential for service providers - The Metro Ethernet Forum has standardised Ethernet services and continues to enhance specifications - Traditional forms of Ethernet delivery are no longer suitable for the delivery of “carrier-grade” Ethernet services - MPLS provides a proven platform for the delivery of scalable, flexible, feature-rich Ethernet services using the same infrastructure used to deliver other MPLS-based services Public Summary
  • 155. 155 © Nokia 2017 questions ? Public