TRILL DC Interconnect draft-balaji-l2vpn-trill-over-ip-multi-level-02.txt Balaji Venkat Venkataswami Ramasubramani Mahadevan Shivakumar Sundaram Narayana.

Slides:



Advertisements
Similar presentations
MPLS VPN.
Advertisements

Identifying MPLS Applications
Overlay Transport Virtualization (OTV)
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 Module Summary The VRF table is a virtual routing and forwarding instance separating sites.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
IS-IS Extensions to support OTV Hasmit Grover Ayan Banerjee Dhananjaya Rao.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5#-1 MPLS VPN Implementation Configuring OSPF as the Routing Protocol Between PE and CE Routers.
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Planning the Enterprise-to-ISP Connection.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring Small-Scale Routing Protocols Between PE and CE Routers.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
Inter-domain Routing Outline Border Gateway Protocol.
TRILL over IP draft-ietf-trill-over-ip-01.txt IETF 91, Honolulu Margaret Wasserman Donald Eastlake, Dacheng Zhang.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP AS AN MVPN PE-CE Protocol draft-keyupate-l3vpn-mvpn-pe-ce-00 Keyur Patel,
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
BGP-MPLS VPN extension for IPv4/IPv6 Hybrid Network Defeng Li Huawei Technologies.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
CS 540 Computer Networks II Sandy Wang
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Networks and Protocols CE Week 7b. Routing an Overview.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
IPv6 Site-Local Discussion Bob Hinden & Margaret Wasserman IETF 56 San Francisco March 2003.
IETF 66 L1VPN Basic Mode Draft draft-ietf-l1vpn-basic-mode-00.txt Don Fedyk (Editor) Yakov Rekhter (Editor)
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
57 th IETF VIENNA draft-sheng-ppvpn-isis-bgp-mpls vpn-01.txt 57 th IETF meeting IS-IS as the PE/CE Protocol in BGP/MPLS VPN draft-sheng-ppvpn-isis-bgp-mpls-00.txt.
Base Specification for Multicast in BGP/MPLS VPNs draft-raggarwa-l3vpn-2547-mvpn-00.txt Rahul Aggarwal Juniper Networks.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Module 2 MPLS Concepts.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Applicability of Existing Solutions to the Problem Space draft-takeda-l1vpn-applicability-03.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
IDR WG 6PE-Alt draft-manral-idr-mpls-explicit-null-00.txt Vishwas Manral, IPInfusion Manoj Dutta, IPInfusion IETF 71, Philadelphia, PA, USA.
Inter-domain Routing Outline Border Gateway Protocol.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Draft-fm-bess-service-chaining-01 Prague, July 2015 Rex Fernando Stuart Mackie Dhananjaya Rao Bruno Rijsman Maria Napierala.
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
Global Table Multicast with BGP-MVPN Protocol
MPLS Virtual Private Networks (VPNs)
TRILL DataCenter/Campus/PBB Inter-connect over IP core with BGP
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
V4-over-v6 MVPNs.
L1VPN Working Group Scope
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Multicast in Virtual Router-based IP VPNs
Extending MPLS/BGP VPNs to End-Systems
Kireeti Kompella Juniper Networks
EVPN a very short introduction
CS 381: Introduction to Computer Networks
Multicasting Unicast.
MVPN/MSDP SA Interoperation
Presentation transcript:

TRILL DC Interconnect draft-balaji-l2vpn-trill-over-ip-multi-level-02.txt Balaji Venkat Venkataswami Ramasubramani Mahadevan Shivakumar Sundaram Narayana Swamy Perumal Bhargav Bhikkaji DELL-Force10

Architecture Considered C N-PE or Network PE device B1 H1 H2 B2 Trill Site-A AN: A-1 Core with IP-MPLS/IP-GRE capabilities between N-PE CE or CRB Trill Site-B AN: A-2

Data Plane for DC N1N2 B1 H1 H2 B2 A1 A-2 IP-GRE,VRF key, A1, A2, F1 A1,B2, F1 H1,H2: Payload  F1 B1,A2, F1 H1,H2: Payload  F1 Only Site-local MAC address are installed in HW. H2 incase of N2 Only Site-local MAC address are installed in HW. H1 incase of N1

MAC Learning… CORE N1 N2 B1 H1 H2 B2 A-1 A-2 BGP to exchange Nicknames H1  A1 A1  N1 H2  A2 A2  N1 Multidest frame = F1 MDF, B1, F1 IP-GRE, VRFkey, Mbit, A1, F1 Nicknames redistributed in ISIS MDF, A1, F1

MAC Learning Using BGP. CORE N1 N2 B1 H1 H2 B2 A-1 A-2 BGP-MAC-VPN based MP-BGP sessions that install MAC with appropriate / suitable TRILL nicknames N1 and N2 redistributed routes in to IS-IS H2  A2 A2  N2 H1  A1 A1  N1 H2  A2 A2  N1 H1  A1 A1  N2

Site local-MAC learning’s by CE’s C B1 H1 H2 B2 Trill Site-A AN: A-1 1.Learning via Multicast frame or BGP 2.Install only site local MAC’s CORE Trill Site-B AN: A-2 CE-PE like protocol to exchange Nickname for a site. Nickname exchanged using MP-BGP CE1 CE2 PE1 PE2

Multicast Core to run multicast-VPN based PIM-Bidir tree for each customer to connect DTree's. If there are multiple N-PE's, each N-PE's is part of different MVPN PIM-Bidir tree. Uses Group Designated Border Router (GDBR) mechanism – Load balancing – Prevent loops Future versions of draft to cover in detail mechanism on Multicast and GDBR election.

Summary Nickname recalculations is not required when new TRILL Sites are added MAC scaling at PE – Forwarding table to have only Site local MAC’s – Site local MAC’s learning by CE only. – Install only conversational MAC’s VPN mechanism also provides to use of over lapping MAC address/Nicknames across distinct customers. Next Steps Suggestions/Comments from WG Future version based on comments/suggestions.