Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei)

Slides:



Advertisements
Similar presentations
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - Beijing VPLS PE Model with E-Tree Support Yuanlong Jiang.
Advertisements

Overlay Transport Virtualization (OTV)
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Communication Networks Recitation 3 Bridges & Spanning trees.
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Ethernet Automatic Protection Switching (EAPS)
IEEE 802.1D: Spanning Tree Algorithm and the Filtering Database Ben Schultz Bridge Functions Consortium UNH InterOperability Lab July, 2000.
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
Centralized Replication for BUM traffic in active-active edge connection draft-hao-trill-centralized-replication-02 Weiguo Hao Huawei Yizhou Li Huawei.
Spanning Tree Protocol STP STP A broadcast storm occurs when there are so many broadcast frames caught in a Layer 2 loop that all available.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Describing STP Stability Mechanisms.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Spanning Tree Protocol Enhancements.
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
IEEE 802.1q - VLANs Nick Poorman.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Extending LANs Asst. Prof. Chaiporn Jaikaeo,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 7: Layer 2 Switching.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-virtual-eth- segment-00.txt A. Sajassi (Cisco),
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Multicast State Advertisement in EVPN draft-li-l2vpn-evpn-multicast-state-ad Zhenbin Li Junlin Zhang Huawei Technologies July, 2013 Berlin Germany.
EVPN: Or how I learned to stop worrying and love the BGP
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
Spanning Tree Protocol
3. Internetworking (part 2: switched LANs)
VLANs: Virtual Local Area Networks
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Configuring Catalyst Switch Operations
Spanning Tree Protocol
© 2002, Cisco Systems, Inc. All rights reserved.
Spanning Tree Protocol
Framework for EVPN Designated Forwarder Election Extensibility
NT2640 Unit 9 Activity 1 Handout
Connecting LANs, Backbone Networks,
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
STP – Spanning Tree Protocol A closer look
Spanning Tree Protocol (STP)
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
Dr. Rocky K. C. Chang 23 February 2004
MVPN/EVPN Tunnel Aggregation with Common Labels Zhaohui Zhang (Juniper) Eric Rosen (Juniper) Wen Lin (Juniper) Zhenbin Li (Huawei) BESS WG 20-March-2018.
Preference-based EVPN DF Election draft-rabadan-bess-evpn-pref-df-02
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
Cisco networking CNET-448
EVPN and L2 Access Protocols: Single-Flow-Active load-balancing mode
Presentation transcript:

Multi-homed network in EVPN draft-hao-evpn-mhn-00 July 20131MHN in EVPN Weiguo Hao(Huawei) Yizhou Li(Huawei) Pei Xu(Huawei) July, 2013 Berlin Germany

EVPN Network Multi-homed network (MHN) in EVPN scenarios July 20132MHN in EVPN PE1 PE2 B1 B2 B3 Bridged Network There are two categories of mechanisms to avoid the layer 2 traffic loop. 1, PEs doesn’t participate in the control protocol of the bridged network, that is designated forwarder (DF) election mechanism. 2, PEs participate in the control protocol of the bridged network, active/active MAC-based load balancing can be achieved through the solution. ES1 ES2 ES3

DF Mechanism July 20133MHN in EVPN  VLAN-based load balancing among PEs can be achieved.  Only one of the links between the switched bridged network and the PEs is active for a given VLAN.  All end systems of one VLAN can access the EVPN network through only one PE. EVPN Network PE1 PE2 B1(STP Root) B2 B3 BLOCKED MSTP Network ES1 ES2 ES3 EVPN For DF Non- DF ES1,ES2 and ES3 access to EVPN network through PE1

Active/Active MAC-based load balancing mechanism July 20134MHN in EVPN EVPN Network PE1 PE2 B1 B2 B3 BLOCKED MSTP Network ES1 ES2 ES3 ES1 and ES2 access to EVPN network through PE1 BLOCKED ES3 accesses to EVPN network through PE2  The mechanism requires PEs participate in the control plane protocol of the bridged network.  per-vlan MAC-based load balancing can be achieved through the mechanism, so it can achieve better load balancing than DF election. Two solutions: 1, emulated MSTP root bridge solution. 2, bridge control plane protocol tunneling solution.

Emulated MSTP root bridge solution July 20135MHN in EVPN EVPN Network PE1 PE2 B1(STP Root) B2 B3 BLOCKED MSTP Network ES1 ES2 ES3 BLOCKED PE1 and PE2 emulate MSTP root bridge  PE1 & PE2 use the same bridge ID to emit spanning tree BPDUs as the highest priority root Bx.  When PE2 receives TC BPDU from the bridge network, PE2 tunnel the TC BPDU to PE1.  This solution is only applicable for STP/MSTP network. PE3

Bridge control plane protocol tunneling solution EVPN Network PE1(ST P Root) PE2 B1 B2 B3 BLOCKED MSTP Network ES1 ES2 ES3 BLOCKED PE3 BPDU tunnel EVPN Network PE1 PE2 B1 B2 B3 BLOCKED G.8032 Network ES1 ES2 ES3 BLOCKED PE3 G.8032 message tunnel RPL owner node MHN in EVPNJuly 2013 RPL owner node The cost should be set to 0 to avoid blocking

Bridge control plane protocol tunneling solution July 2013MHN in EVPN7 The solution can be used for both MSTP and G.8032 domain. Scenario 1: Local bridged network is MSTP PE1 and PE2 act as normal MSTP bridge nodes. BPDU message can be sent through tunnel over EVPN network between PE1 and PE2. Scenario 2: Local bridged network is G.8032 PE1 and PE2 act as normal G.8032 ring nodes. They support standard FDB MAC learning, forwarding, flush behavior and port blocking/unblocking mechanisms. G.8032 message can be sent through tunnel over EVPN network between PE1 and PE2.

EVPN protocol extension July 20138MHN in EVPN  "M" bit is introduced to indicate multi-homing mode of MAC-based all active without DF Election.  DF selection procedures should be skipped if "M" bit is set to be 1.  When remote PE receives Ethernet A-D route withdraw message, it simply invalidates the MAC entries for the segment that corresponding to the Ethernet A-D route | Type=0x06 | Sub-Type=0x01 |DF|R|M| Reserved=0 | | Reserved = 0| ESI Label | ESI Label Extended Community

Next Steps July 20139MHN in EVPN Does WG think this can be put into EVPN base protocol? Any other comments and suggestions?