CS 672 1 Summer 2003 Lecture 13. CS 672 2 Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below: +---------------------------------------------------------+

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
MPLS VPN.
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
Identifying MPLS Applications
Deployment of MPLS VPN in Large ISP Networks
Internetworking II: MPLS, Security, and Traffic Engineering
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Leading Edge Routing MPLS Enhancements to Support Layer 2 Transport Services Jeremy Brayley
IPv6 Routing IPv6 Workshop Manchester September 2013
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
1 Copyright  1999, Cisco Systems, Inc. Module10.ppt10/7/1999 8:27 AM BGP — Border Gateway Protocol Routing Protocol used between AS’s Currently Version.
Entire Routes Reflecting capability draft-zhang-idr-bgp-entire-routes-reflect-00.txt Zhang Renhai :
BGP.
CS Summer 2003 CS672: MPLS Architecture, Applications and Fault-Tolerance.
Routing: Exterior Gateway Protocols and Autonomous Systems Chapter 15.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
CS Summer 2003 Lecture 3. CS Summer 2003 What is a BGP Path Attribute? BGP uses a set of parameters known as path attributes to characterize.
CS Summer 2003 Lecture 6. CS Summer 2003 Hierarchical LSP LSP1 LSP2 LSP3 Ingress LSR for LSP1 Egress LSR for LSP1 Ingress LSR for LSP3 Hierarchical.
CS Summer 2003 Lecture 7. CS Summer 2003 MPLS Forwarding MPLS forwarding can be described in terms of: Label imposition Label disposition.
CS Summer 2003 Lecture 4. CS Summer 2003 Route Aggregation The process of representing a group of prefixes with a single prefix is known as.
CS Summer 2003 Quiz 1 Q1) Answer the following: List one protocol that is commonly used for intra AS routing? List one protocol that is used for.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
Draft-ni-l3vpn-pm-bgp-ext-00IETF 87 L3VPN1 BGP Extension For L3VPN PM draft-ni-l3vpn-pm-bgp-ext-00 Hui Ni, Shunwan Zhuan, Zhenbin Li Huawei Technologies.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
1 © 1999, Cisco Systems, Inc _05F9_c2 1 NW’99 Vienna © 1999, Cisco Systems, Inc. MPLS VPNs Peter Tomsu Senior Consultant EMEA
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—6-1 Establishing Serial Point-To-Point Connections Introducing Frame Relay.
Lab MPLS Basic Configuration Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Lecture 4: BGP Presentations Lab information H/W update.
Border Gateway Protocol
Xuan Zheng (modified by M. Veeraraghavan) 1 BGP overview BGP operations BGP messages BGP decision algorithm BGP states.
CS 540 Computer Networks II Sandy Wang
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Different Address Family Transit (DAFT) using Encapsulation and BGP-MP Extension Tsinghua University Feb 23, 2006 Contact: ----A.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
MPLS Label Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Mr. Mark Welton.  WAN transportation method that formats data into frames and sent over a network controlled by a service provider  Frame Relay is often.
Nov. 8, 2006IDR WG Meeting1 IPv6 Next Hop for IPv4 Prefix In BGP Updates, NH not necessarily of same address family as NLRI Currently deployed examples:
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.
Inter-AS Option C between NVO3 and BGP/MPLS IP VPN network draft-hao-bess-inter-nvo3-vpn-optionc-00 Weiguo Hao Lucy Yong Susan Hares Nov, 2014 Honolulu.
BGP-based Auto-Discovery for L2VPNs draft-hlmu-l2vpn-bgp-discovery-00.txt Sue Hares - Vasile Radoaca -
EVPN: Or how I learned to stop worrying and love the BGP
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Connecting IPv4 Islands over IPv6 MPLS Using IPv4 Provider Edge Routers(4PE) Zhenqiang Li China Mobile.
MBGP and Customer Routes
MPLS Introduction Computer Networks 2007 Week 9 Lecture 1 by Donald Neal.
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Internal DP MP-BGP for IPv6 原理 ISSUE 1.0.
MPLS Virtual Private Networks (VPNs)
Advanced Computer Networks
MPLS VPN Implementation
Hector Avalos Technical Director-Southern Europe
BGP supplement Abhigyan Sharma.
Module Summary BGP is a path-vector routing protocol that allows routing policy decisions at the AS level to be enforced. BGP is a policy-based routing.
MPLS Basics 2 2.
Kireeti Kompella Juniper Networks
EVPN a very short introduction
BGP Route Selection.
BGP VPN service for SRv6 Plus IETF 105, Montreal
Presentation transcript:

CS Summer 2003 Lecture 13

CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below: | Address Family Identifier (2 octets) | | Subsequent Address Family Identifier (1 octet) | | Length of Next Hop Network Address (1 octet) | | Network Address of Next Hop (variable) | | Number of SNPAs (1 octet) | | Length of first SNPA(1 octet) | | First SNPA (variable) | | Length of second SNPA (1 octet) | | Second SNPA (variable) | |... | | Length of Last SNPA (1 octet) | | Last SNPA (variable) | | Network Layer Reachability Information (variable) |

CS Summer 2003 AFI/SAFI/NHOP Fields Address Family Identifier (AFI): This field carries the identity of the Network Layer protocol associated with the Network Address that follows. For example, AFI=1 for IPv4, AFI=2 for IPv6. Subsequent Address Family Identifier (SAFI): This field provides additional information about the type of the NLRI carried in the attribute. For example, SAFI = 4 means NLRI with MPLS label. Network Address of Next Hop: The next hop information carried in the MP_REACH_NLRI path attribute defines the Network Layer address of the border router that should be used as the next hop to the destinations listed in the MP_NLRI attribute in the UPDATE message.

CS Summer 2003 MP_UNREACH_NLRI The MP_UNREACH_NLRI attribute is encoded as shown below: | Address Family Identifier (2 octets) | | Subsequent Address Family Identifier (1 octet) | | Withdrawn Routes (variable) |

CS Summer 2003 NLRI with Label The NLRI is encoded as one or more triples of the form : | Length (1 octet) | | Label (3 octets) | | Prefix (variable) | Label: The Label field carries one or more labels (that corresponds to the stack of labels. Prefix: The Prefix field contains address prefixes followed by enough trailing bits to make the end of the field fall on an octet boundary. RFC 3107

CS Summer 2003 Label Advertisement/Withdraw between Directly Connected Speakers The advertise a label for a route, BGP speaker includes the label in the NLRI and sets the SAFI field appropriately in the Update message. The Next Hop attribute in the Update message identifies the speaker assigning the label and adverting the route. To withdraw a route and the associated label, two options are available: Include the NLRI of the previously advertised route in the Withdrawn Routes field and set the label field to 0x Alternatively, advertise a new route to label binding with the same NLRI

CS Summer 2003 Label Advertisement/Withdraw between Non-Directly Connected Speakers In MPLS VPN application (more on this topic later), border BGP routers are interconnected through an arbitrary number of intermediate routers. In order not to burden intermediate routers with external BGP routes, only border routers exchange routing information via iBGP. To transport transit traffic across intermediate routers without them knowing anything about external routes, LSPs are established via signaling protocols such as LDP or RSVP-TE. To select the outgoing interface on the border router, another label is used. This label is exchanged via iBGP between border routers which are non-directly connected.

CS Summer 2003 MPLS VPN

CS Summer 2003 How are multiple sites interconnected? The interconnectivity between multiple sites of VPN can be provided through a number of ways: Circuit-switched network – interconnect routers via point-to-point leased lines (e.g., DS1, DS3). The DS1/DS3 are circuit switched over SONET/SDH infrastructure (e.g., SONET ADM, DCS) ATM/FR network – interconnect enterprise routers via point-to-point ATM/FR VCs (e.g., ATM/FR Switches) IP network – interconnect enterprise routers via point-to-point IP tunnels (e.g., GRE tunnel, IP SEC tunnel). All of the above options belong to what is commonly termed as overlay model.

CS Summer 2003 Layer 2 Overlay Model In this model, customer edge (CE) routers are interconnected by a full mesh of point-to-point links emulated by ATM VCs, FR DLCIs or GRE Tunnels. CE-CE routers in different sites are routing peers. Pros 1. Natural traffic isolation and security due to point-to-point VC connectivity. 2.QoS (e.g., ATM VCs an be used to guarantee requested QoS) Cons 1.Full-mesh VCs are needed to form CE-CE routing adjacency. 2.If not fully meshed, traffic must traverse extra hops which causes extra delay and may waste backbone BW. 3.Provider has to provision a larger number of VCs.

CS Summer 2003 Layer 2 Overlay Model Enterprise A Shared Backbone Enterprise A Enterprise B L2 Virtual Circuits Provider Edge (PE) Device CE-CE interconnected via L2 VCs are routing peers. Customer Edge (CE) Device

CS Summer 2003 Layer 3 Peer Model In this model, customer sites (CE) exchange routing information only with the directly connected provider edge (PE) router. CE-PE are routing peers. Pros 1.CE routers peer with PE routers. 2.No need for full-mesh VC connectivity. Cons 1.Routing isolation and security