Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-to-become-l3vpn-2547bis-mcast- 00.txt.

Slides:



Advertisements
Similar presentations
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Advertisements

March 2010IETF 77, MPLS WG1 Carrying PIM-SM in ASM mode Trees over P2MP mLDP LSPs draft-rekhter-pim-sm-over-mldp-01.txt Y. Rekhter, Juniper Networks R.
MPLS VPN.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
Multicast VPN using BIER IETF 91, Honolulu ietf
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
Multicast in L3VPNs Bruce Davie 1 draft-ietf-l3vpn-2547bis-mcast-03.txt 1. Not a draft co-author, or a multicast expert.
L3VPN WG2013-Nov-71 Global Table Multicast (GTM) Based on MVPN Protocols and Procedures draft-zzhang-l3vpn-mvpn-global-table-mcast-01.txt Service providers.
Multicast state damping draft-morin-multicast-damping-00 draft-morin-multicast-damping-00 Thomas Morin, Stéphane Litkowski, Keyur Patel, Jeffrey Zhang,
L3VPN WG2013-Nov-71 Ingress Replication P-Tunnels in MVPN I ngress Replication has always been one of the P-tunnel technologies supported by MVPN But there’s.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP AS AN MVPN PE-CE Protocol draft-keyupate-l3vpn-mvpn-pe-ce-00 Keyur Patel,
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
IETF 68, MPLS WG, Prague P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-leroux-mpls-p2mp-te-bypass-01.txt J.L. Le Roux (France Telecom) R. Aggarwal.
P2MP MPLS-TE FRR with P2MP Bypass Tunnel draft-leroux-mpls-p2mp-te-bypass-00.txt J.L. Le Roux (France Telecom) R. Aggarwal (Juniper) IETF 67, MPLS WG,
Use of Wildcard in S-PMSI Auto- Discovery Routes draft-rekhter-mvpn-wildcard-spmsi Rahul Aggarwal (Juniper) Wim Henderickx (Alcatel-Lucent) Praveen Muley.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Multicast Routing Protocols. The Need for Multicast Routing n Routing based on member information –Whenever a multicast router receives a multicast packet.
L3VPN WG2014-Jul-221 Ingress Replication P-Tunnels in MVPN I ngress Replication (IR) is one of the MVPN P-tunnel technologies But there’s a lot of confusing.
March 21, 2006L3VPN WG 1 MVPN Update New version of “bgp encoding” draft –BGP update syntax and semantics reworked to reflect current thinking –Inter-AS.
8/5/04L3VPN WG1 Multicast in BGP/MPLS IP VPNs Finally added to charter! Base specification: draft-rosen-vpn-mcast –Four years old, with few changes –Basis.
Softwire Mesh Framework: Multicast Mingwei Xu Yong Cui CERNET, China Chris Metz, Cisco 68 th IETF Meeting, Prague March 2007.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
IETF 66 L1VPN Basic Mode Draft draft-ietf-l1vpn-basic-mode-00.txt Don Fedyk (Editor) Yakov Rekhter (Editor)
Inter-Area P2MP Segmented LSPs draft-raggarwa-seamless-mcast-03.txt
Base Specification for Multicast in BGP/MPLS VPNs draft-raggarwa-l3vpn-2547-mvpn-00.txt Rahul Aggarwal Juniper Networks.
Support for RSVP in Layer 3 VPNs draft-davie-tsvwg-rsvp-l3vpn-01.txt Bruce Davie François le Faucheur Ashok Narayanan Cisco Systems.
MPLS WG1 Targeted mLDP Base mLDP spec didn’t consider use of LDP multipoint extensions over Targeted mLDP sessions LDP speaker must choose “upstream LSR”,
July 24, 2007IETF 69, L3VPN WG1 Progress on Arch Doc draft-ietf-l3vpn-mcast-2547bis-mcast-05 Areas of new work: –Clarification of upstream multicast hop.
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
Applicability of Existing Solutions to the Problem Space draft-takeda-l1vpn-applicability-03.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
Global Table Multicast with BGP-MVPN draft-zzhang-l3vpn-mvpn-global-table-mcast London, 89 th IETF L3VPN WG2013-Nov-71.
November 6, 2006Softwire WG Meeting1 Softwires “Mesh” Scenario Problem: –pass AF1 routing and data over the AF1-free core, –while obeying certain constraints.
December 5, 2007IETF 70 L3VPN WG1 MVPN Profiles Why do we need “profiles”? –By design, architecture provides many choices: PE-PE C-multicast routing info.
1 Use of PE-PE IP/GRE/IPsec for MPLS PWs draft-raggarwa-pwe3-pw-over-ip- 00.txt Rahul Aggarwal
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 MPLS Upstream Label Assignment for RSVP- TE and LDP draft-raggarwa-mpls-rsvp-ldp-upstream-
L3VPN WG mLDP Recursive FEC Using mLDP through a Backbone where there is no Route to the Root draft-wijnands-mpls-mldp-recurs-fec Name changed.
Establishing P2MP MPLS TE LSPs draft-raggarwa-mpls-p2mp-te-02.txt Rahul Aggarwal Juniper Networks.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
L3VPN WG2012-Jul-301 Bidirectional P-tunnels in MVPN Bidirectional P-tunnel: MP2MP LSP per RFC 6388 PIM MDT per RFC 5015, GRE Encapsulation Accommodated.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-01.txt draft-raggarwa-l2vpn-vpls-mcast-ctrl-00.txt.
1 IETF74 – L3VPN – Multicast VPN fast fail-over IETF 74 th meeting, San Francisco – L3VPN WG Multicast VPN fast fail-over draft-morin-l3vpn-mvpn-fast-failover-00.
MVPN/EVPN C-Multicast/SMET Route Enhancements Zhaohui Zhang, Robert Kebler Wen Lin, Eric Rosen Juniper Networks 96 th IETF, Berlin.
Global Table Multicast with BGP-MVPN Protocol
Softwire Mesh Framework: Multicast
Multicast in BGP/MPLS VPN
MVPN Update Continued work on both architecture draft and BGP-MVPN draft Seeing “light at end of tunnel” ☺ Progress since last time: Carrier’s carrier.
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
Support C-Bidir with Ingress Replication draft-zzhang-l3vpn-mvpn-bidir-ingress-replication Jeffrey Zhang Yakov Rekhter Andrew Dolganow 87th IETF, Berlin.
Multicast Signaling using BGP
Time to Start New Work Items
MPLS Basics 2 2.
Multicast/BIER As A Service
Inter-AS MVPN: Multihoming Considerations
BGP Signaled Multicast
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-to-become-l3vpn-2547bis-mcast- 00.txt Eric Rosen Rahul Aggarwal

2 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Other Authors/Contributors  Co-Authors Yiqun Cai, IJsbrands Wijnands, Yakov Rekhter, Thomas Morin  Contributors/Acknowledgements Arjen Boers, Toerless Eckert, Luyuan Fang, Dino Farinacci, Lenny Guiliano, Anil Lohiya, Tom Pusateri, Ted Qian, Robert Raszuk, Tony Speakman, Dan Tappan, Authors of draft- yasukawa-l3vpn-p2mp-mcast-00.txt

3 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Design Objective  Overview of the MVPN Architecture  MVPN Auto-Discovery  MVPN Routing Information Exchange  I-PMSI Instantiation  S-PMSI Instantiation  Inter-AS Procedures  Co-locating C-RP on the PE  Encapsulation

4 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Multicast Support for 2547 VPN: components  Control plane: exchanging VPN multicast routing information: Between CE and PE Among PEs  Data plane: forwarding VPN multicast traffic within the service provider(s) Very similar to the unicast support for 2547 VPNs

5 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Design Objectives for multicast support in 2547 VPN service (not a complete list)  A given customer (multicast) packet should traverse a given service provider link at most once  Deliver customer multicast traffic to only PEs that have (customer) receivers for that traffic  Deliver customer multicast traffic along the “optimal” paths within the service provider (from the ingress PE to the egress PEs) The amount of state within the service provider network required to support Multicast in 2547 VPN service should be no greater than what is required to support unicast in 2547 VPN service The overhead of maintaining the state to support Multicast in 2547 VPN service should be no greater than what is required to support unicast in 2547 VPN service Optimize Bandwidth: Optimize State: Optimizing Bandwidth and State are conflicting goals

6 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Design Objective  Overview of the MVPN Architecture  MVPN Auto-Discovery  MVPN Routing Information Exchange  I-PMSI Instantiation  S-PMSI Instantiation  Inter-AS Procedures  Co-locating C-RP on the PE  Encapsulation

7 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net MVPN Architecture Control Plane  MVPN Auto-Discovery Allows discovering MVPN membership information using BGP Elimination of overhead of PIM Hellos  MVPN Routing Information Exchange among PEs Preserves the ability to use existing PIM machinery Allows reliable exchange of VPN Multicast Routing Information PIM refresh reduction or BGP  Control traffic doesn’t necessarily use the tunnels used by the data traffic Similar to 2547 unicast architecture Allows unicast PIM or BGP

8 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net MVPN Architecture Data Plane Ingress Replication Separate Tree for Every C-(S, G) Separate Tree per-set-of MVPNs “Inclusive Mapping” Separate Tree per-set-of C-(S, G)s “Selective Mapping” Increasing P-router state and Bandwidth efficiency State = Unicast 2547bis Unbounded State Aggregate State Tree = PIM-SM, PIM-SSM, PIM-Bidir, RSVP-TE P2MP LSPs, Receiver Initiated P2MP LSPs Decreasing P-router state and Bandwidth efficiency

9 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net New Framework and Terminology  Prior proposals differ in following ways: multicast service expected from SP network method of implementing the multicast service method of exchanging multicast routing info  One size doesn’t fit all, so need way of describing various options Distinguish multicast service from implementation Clarify relation between routing info exchange and multicast data transport service Clarify inter-relationships of various options

10 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net P-Multicast Service Interface  PMSI: Provider-network Multicast Service Interface  Service is scoped to one MVPN  Three types: MI-PMSI: Multipoint Inclusive, all→all all PEs can transmit to all PEs UI-PMSI: Unidirectional Inclusive, some→all Unidirectional, selected PEs can transmit to selected PEs Selective: S-PMSI, some→some Unidirectional, selected PEs can transmit to selected PEs

11 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Instantiating PMSIs  PMSIs instantiated by tunnels. Possible tunnels: PIM-created trees (any flavor) Point-to-Multipoint LSPs Unicast tunnels: from ingress to all egresses, with ingress replication to root of distribution tree  PMSI instantiation may require set of tunnels  Single tunnel may instantiate more than one PMSI  Encaps a function of tunnel, not service

12 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Mappings to Old Terminology  Default MDT MI-PMSI, instantiated by PIM Shared Tree or set of PIM Source Trees  Data MDT S-PMSI, instantiated by PIM Source Tree  New terminology helpful in: Describing the complete set of options Allowing multiple instantiations of same service, without changing service spec

13 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Tunnel Issues  Applicability of each technique? One size doesn’t fit all MPLS vs. GRE vs. MPLS-in-GRE vs. … Source-initiated or receiver-initiated creation  Options for creating and destroying the tunnels: As part of the discovery phase As separate phase after discovery As needed (depending on traffic characteristics)  Ensuring interoperability? Force common tunnel choice?

14 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Design Objective  Overview of the MVPN Architecture  MVPN Auto-Discovery  MVPN Routing Information Exchange  I-PMSI Instantiation  S-PMSI Instantiation  Inter-AS Procedures  Co-locating C-RP on the PE  Encapsulation

15 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Discovery What MVPN multicast-specific info needs to be known before MVPN service can be set up: What PMSIs are going to be used: Will MVPN routing information be unicast or multicast Do we want to have the service available before it is needed What tunnels are to be used to instantiate the PMSIs: What information is needed to set up the tunnels and identify the tunnels What encapsulation is going to be used Is aggregation supported

16 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Design Objective  Overview of the MVPN Architecture  MVPN Auto-Discovery  MVPN Routing Information Exchange  I-PMSI Instantiation  S-PMSI Instantiation  Inter-AS Procedures  Co-locating C-RP on the PE  Encapsulation

17 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Exchange of VPN Multicast Routing Info Among PEs  Only two possibilities considered: PIM BGP

18 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Exchange of VPN Multicast Routing Info Among PEs: PIM  C-Join/Prune messages can be either: Multicast (requires MI-PMSI) Unicast (from one PE to one PE) N.B.: Unicast is different from MI-PMSI over unicast tunnels Can use full or lightweight adjacency

19 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Using PIM…  Lightweight adjacencies Minimizes overhead by eliminating periodic messages: Refresh reduction (to be spec’ed by PIM WG) Hello suppression (in L3VPN, BGP provides the necessary information) Not interoperable with full adjacencies  Finding the RPF in inter-AS MVPNs

20 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Using PIM  Control Messages: Multicast or Unicast MI-PMSI: Allows Asserts, Join Suppression, standard “PIM on a LAN” Unicast: no join suppression, no asserts Various Pros and Cons to each Unicast presupposes that all PEs must choose same PE as RPF hop for given C-S

21 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net MVPN Routing Information Exchange Using BGP PE 1 CE-B2 CE-B3 PE 3 PE 2 PE 4 VPN A Site 3 CE -A1 CE-B1 CE-A2 CE-A4 CE-A3 VPN B Site 1 VPN B Site 2 VPN A Site 4 VPN B Site 3 VRF-A VRF-B VPN A Site 2 VPN A Site 1 VRF-A RR PEs have I-BGP Peering Only With the RR C-S -> C-G PIM C-Join C-S, C-G BGP MVPN Routing Information Update: <RD, C-S, C-G, Originator PE – PE1 Upstream PE – PE2, RT>

22 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Design Objective  Overview of the MVPN Architecture  MVPN Auto-Discovery  MVPN Routing Information Exchange  I-PMSI Instantiation  S-PMSI Instantiation  Inter-AS Procedures  Co-locating C-RP on the PE  Encapsulation

23 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net I-PMSI Instantiation  UI-PMSI or MI-PMSI  Ingress Replication  P-Multicast Trees No architectural limitations on the tree building protocol Current spec limits specific procedures to PIM-SM, PIM-SSM, PIM-Bidir, RSVP-TE P2MP LSPs Source Based Trees or Shared Trees Aggregation  Tunnel Identifier (Usage Described Later) for RSVP-TE P2MP LSPs for PIM-SSM

24 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net PMSI Instantiation Ingress Replication PE 1 CE-B2 CE-B3 PE 3 PE 2 PE 4 VPN A Site 3 CE -A1 CE-B1 CE-A2 CE-A4 CE-A3 VPN B Site 1 VPN B Site 2 VPN A Site 4 VPN B Site 3 VRF-A VRF-B VPN A Site 2 VPN A Site 1 VRF-A RR MVPN Membership Discovery: <Ingress Replication Capability, Downstream MPLS Label> eg PE1 C-S -> C-G PIM C-Join C-S, C-G MVPN Rtng Information – Unicast PIM or BGP Ingress Replication – Flooding (S-PMSI Recommended)

25 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Aggregate P-Multicast Trees  Allow one P-multicast Tree to be shared across multiple VPNs  Can be setup using PIM-SM or PIM-SSM or P2MP MPLS TE Support for PIM-Bidir is for further study  Requires a MPLS label to demultiplex a particular VPN ‘Upstream’ label allocation by the root of the tree Egress PEs maintain a separate label space for each P- multicast tree root  State grows less than linearly with number of MVPNs Some efficiency of multicast routing may be sacrificed

26 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net I-PMSI Instantiation P-Multicast Trees PE 1 CE-B2 CE-B3 PE 3 PE 2 PE 4 VPN A Site 3 CE -A1 CE-B1 CE-A2 CE-A4 CE-A3 VPN B Site 1 VPN B Site 2 VPN A Site 4 VPN B Site 3 VRF-A VRF-B VPN A Site 2 VPN A Site 1 VRF-A RR MVPN Membership Discovery: eg PE1 C-S -> C-G PIM C-Join C-S, C-G Aggregate Tree – PE2 as Root BGP Signaled MVPN – Tree Binding:

27 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Design Objective  Overview of the MVPN Architecture  MVPN Auto-Discovery  MVPN Routing Information Exchange  I-PMSI Instantiation  S-PMSI Instantiation  Inter-AS Procedures  Co-locating C-RP on the PE  Encapsulation

28 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net S-PMSI Instantiation  Separate tree for set of s that may belong to different MVPNs  Increase bandwidth efficiency for the mapped s. Eg. High Bandwidth Streams  Discover the leaves i.e. PEs with receivers in s using MVPN Routing Information For RSVP-TE P2MP LSPs or/and Aggregation Unicast PIM or BGP or MI-PMSI with Join Suppression off  Ingress Replication or P-Multicast Trees  Protocol for switching to S-PMSI BGP or UDP

29 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net S-PMSI Instantiation P-Multicast Trees – BGP Signaling PE 1 CE-B2 CE-B3 PE 3 PE 2 PE 4 VPN A Site 3 CE -A1 CE-B1 CE-A2 CE-A4 CE-A3 VPN B Site 1 VPN B Site 2 VPN A Site 4 VPN B Site 3 VRF-A VRF-B VPN A Site 2 VPN A Site 1 VRF-A RR Leaf Discovery – MVPN Routing Exchange Eg. BGP C-S1 -> C-G1 PIM C-Join C-S2, C-G2 Selective Aggregate Tree – PE2 as Root BGP Signaled set of – Tree Binding: C-S2 -> C-G2 PIM C-Join C-S1, C-G1

30 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net S-PMSIs – UDP Signaling  If an MI-PMSI is in use for flow’s MVPN, can use “in-band” protocol, i.e., UDP-based protocol identifying flow and S- PMSI  Existing protocol may benefit from some enhancements: Reduce soft state overhead Ability to identify non-PIM tunnels

31 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Inter-AS Procedures  First Model – Tunnel spans multiple ASs Support for Unicast VPN Option A, B and C “RPF Attribute” to get around Next-Hop Rewrite in Option B PIM Extension to carry the proxy address when PIM P-Multicast Trees are used and P routers don’t have the route to the ingress PE  Second Model – Each AS can have its own tunneling mechanism for intra-AS tunnels Overlay Inter-AS tunnel on top of the intra-AS tunnels Build on BGP MVPN Auto-discovery and BGP MVPN-Tunnel Binding Support for Unicast VPN Option A, B and C

32 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Inter-AS Procedures Second Model – Overlay Inter-AS Tunnel  MVPN membership spanning tree rooted at the origin AS, with other ASs as nodes of the tree  The overlay tunnel traverses this spanning tree  Origin AS announces that it has a MVPN to other ASs – not the PEs that belong to the MVPN  Each AS node on the spanning tree has its own intra-AS tunnel  MVPN-tunnel binding flows towards the root of the overlay tree using BGP – essentially MPLS label switching at the ASBRs  Support for S-PMSIs

33 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Co-locating C-RP on a PE  One potential deployment model  Customer may outsource C-RP to the SP and the SP may co-locate the C-RP with the PE  Two options: 1. Anycast RP based on (*, G) advertisements that PE receives from CEs This is similar to the model in draft-yasukawa-l3vpn-mvpn-p2mp-00.txt 2. Anycast RP based on propagating active source announcements in BGP This is the model in draft-yasukawa-l3vpn-mvpn-p2mp-00.txt

34 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Encapsulation  When multiple PMSIs are aggregated into a single tunnel, how to demux the packets Unicast Tunnels: MPLS Label (downstream-assigned) Don’t want separate IP dest addr per PE per MVPN Multicast Tunnels: MPLS Label (upstream-assigned)  When PIM messages are unicast: MPLS downstream-assigned label RD (or RT) in PIM message  Ensuring agreement (among PEs) on encaps

35 Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Conclusion  Comments ?  Request to be a WG document Request authors of draft-yasukawa-l3vpn-mvpn- p2mp to join the draft