CS 540 Computer Networks II Sandy Wang

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

History of VPLS at IETF Ali Sajassi November 12, 2002.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Provider Provisioned Virtual Private Networks Wing C. Lau Performance Analysis Department Bell Labs, Lucent Technologies Holmdel, New Jersey Dec
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Point-to-Multipoint Pseudowire Signaling and Auto-Discovery in Layer.
Leading Edge Routing MPLS Enhancements to Support Layer 2 Transport Services Jeremy Brayley
An Introduction to VPLS
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
Anastasios Chatzithomaoglou IP Engineering – Forthnet
Classical Ethernet Services, Evolution to VPLS (an L2VPN), VPLS Operation Vishal Sharma, Ph.D. Metanoia, Inc. Web:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
© 2001, Cisco Systems, Inc. Ethernet over Multiprotocol Label Switching.
IS-IS Extensions to support OTV Hasmit Grover Ayan Banerjee Dhananjaya Rao.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Improving Routing Performance.
Ethernet Frame PreambleDestination Address Source Address Length/ Type LLC/ Data Frame Check Sequence.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 1: Internetworking.
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—2-1 Implementing an EIGRP-Based Solution Configuring and Verifying EIGRP for the Enterprise.
EVC Atahar Khan CCIE SP Cisco Systems.
Virtual Private Networks Juha Heinänen Song Networks.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
CS 540 Computer Networks II Sandy Wang
72nd IETF Dublin July 2008 Framework and Requirements for Virtual Private Multicast Service (VPMS) draft-kamite-l2vpn-vpms-frmwk-requirements-01.txt Yuji.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
Metro Ethernet and evolution of Virtual Private LAN Services (VPLS) K. A. K. Perera MEng CEng MIET Deputy General Manager Data Services & VoIP Sri Lanka.
CS 540 Computer Networks II
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
CS 540 Computer Networks II Sandy Wang
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
MPLS VPN Presented by : Md. Shafiqur Rahman Divisional Engineer (A & C) Moghbazar, Dhaka-1217.
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Optical + Ethernet: Converging the Transport Network An Overview.
Draft-jounay-pwe3-p2mp-pw-requirements-01.txt IETF 70 PWE3 Working Group Vancouver, December 2007 F. Jounay, P. Niger, France Telecom Y. Kamite, NTT Communications.
Multicast over VPLS MPLS WC 2009 Ben Niven-Jenkins - BT Andrew Bartholomew - ALU February 2009.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
IP Pseudowire Florin Balus August, PG 1Florin BalusIETF60 – San Diego Requirements - Existing topology FR/ATM VPNs ATM Network Frame Relay Access.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
EVPN: Or how I learned to stop worrying and love the BGP
Virtual Private LAN Service
MPLS Introduction Computer Networks 2007 Week 9 Lecture 1 by Donald Neal.
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
MPLS Virtual Private Networks (VPNs)
MPLS VPN Implementation
draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Kireeti Kompella Juniper Networks
EVPN a very short introduction
CS 381: Introduction to Computer Networks
Presentation transcript:

CS 540 Computer Networks II Sandy Wang

7. MPLS

Topics 1.Overview 2.LAN Switching 3.IPv4 4.IPv6 5.Routing Protocols -- RIP, RIPng, OSPF 6.Routing Protocols -- ISIS, BGP 7.MPLS 8.Midterm Exam 9.Transport Layer -- TCP/UDP 10.Congestion Control & Quality of Service (QoS) 11.Access Control List (ACL) 12.Application Layer Protocols 13.Application Layer Protocols continue 14.Others – Multicast, SDN 15.Final Exam

Reference Books Cisco CCNA Routing and Switching ICND Official Cert Guide, Academic Edition by Wendel Odom -- July 10, ISBN-13: The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference by Charles M. Kozierok – October 1, ISBN-13: Data and Computer Communications (10th Edition) (William Stallings Books on Computer and Data Communications) by Williams Stallings – September 23, ISBN-13:

Virtual Private LAN Service (VPLS) VPLS defines an architecture allows MPLS networks offer Layer 2 multipoint Ethernet Services SP emulates an IEEE Ethernet bridge network (virtual) Virtual Bridges linked with MPLS Pseudo Wires Data Plane used is same as EoMPLS (point-to-point) PE CE VPLS is an Architecture CE

Virtual Private LAN Service End-to-end architecture that allows MPLS networks to provide Multipoint Ethernet services It is “Virtual” because multiple instances of this service share the same physical infrastructure It is “Private” because each instance of the service is independent and isolated from one another It is “LAN Service” because it emulates Layer 2 multipoint connectivity between subscribers

Why Provide A Layer 2 Service? Customer have full operational control over their routing neighbours Privacy of addressing space - they do not have to be shared with the carrier network Customer has a choice of using any routing protocol including non IP based (IPX, AppleTalk) Customers could use an Ethernet switch instead of a router as the CPE A single connection could reach all other edge points emulating an Ethernet LAN (VPLS)

VPLS Components N-PE MPLS Core CE router CE switch CE router CE switch CE router Attachment circuits Port or VLAN mode Mesh of LSP between N-PEs N-PE Pseudo Wires within LSP Virtual Switch Interface (VSI) terminates PW and provides Ethernet bridge function Targeted LDP between PEs to exchange VC labels for Pseudo Wires Attachment CE can be a switch or router

Virtual Switch Interface Flooding / Forwarding MAC table instances per customer (port/vlan) for each PE VFI will participate in learning and forwarding process Associate ports to MAC, flood unknowns to all other ports Address Learning / Aging LDP enhanced with additional MAC List TLV (label withdrawal) MAC timers refreshed with incoming frames Loop Prevention Create full-mesh of Pseudo Wire VCs (EoMPLS) Unidirectional LSP carries VCs between pair of N-PE Per A VPLS use “split horizon” concepts to prevent loops

Pseudo Wire Reference Model (RFC 3916) A Pseudo Wire (PW) is a connection between two provider edge devices connecting two attachment circuits (ACs) In an MPLS core a Pseudo Wire uses two MPLS labels Tunnel Label (LSP) identifying remote PE router VC Label identifying Pseudo Wire circuit within tunnel Emulated Service IP/MPLS PE1 Attachment Circuit Pseudo Wire PDUs Customer Site PSN Tunnel (LSP in MPLS) Packet Switched Network (PSN) IP or MPLS Pseudo Wire PE2 CE PW1 PW2 CE

PW Encapsulation over MPLS (RFC 4448) Ethernet Pseudo Wires use 3 layers of encapsulation Tunnel Encapsulation (zero, one or more MPLS Labels) To get PDU from ingress to egress PE; Could be an MPLS label (LDP, TE), GRE tunnel, L2TP tunnel Pseudo Wire Demultiplexer (PW Label) To identify individual circuits within a tunnel; Obtained from Directed LDP session Control Word (Optional) The following is supported when carrying Ethernet Provides the ability to sequence individual frames Avoidance of equal-cost multiple-path load-balancing Operations and Management (OAM) mechanisms Control word format varies depending on transported PDU Tunnel Label PW Label Control Word Layer 2 PDU

CE4 P2 P1 PE2 CE2 CE1 CE5 PE3 VPN B PE1 P3 P4 PE4 CE3 CE6 CE7 CE8 CE9 A B C D E L K J N G M H F VPN B VPN A

Network point of view from VPN-B CE3CE8 CE6CE9 F

CE4 PE2 CE2 CE1 CE5 PE3 PE1 CE7 A B C D E L K J N G M H VPN A if1 if2

Ethernet PW Tunnel Encapsulation Tunnel Encapsulation One or more MPLS labels associated with the tunnel Defines the LSP from ingress to egress PE router Can be derived from LDP+IGP, RSVP-TE, BGP IPv4+Label EXPTTL (set to 2)VC Label (VC)1 Tunnel Label (LDP,RSVP,BGP) Layer-2 PDU 0 0 ReservedSequence Number EXPTTL0 PW Demux Tunnel Encaps Control Word

Ethernet PW Demultiplexer VC Label Inner label used by receiving PE to determine the following Egress interface for L2PDU forwarding (Port based) Egress VLAN used on the CE facing interface (VLAN Based) EXP can be set to the values received in the L2 frame EXPTTL (set to 2)VC Label (VC)1 Tunnel Label (LDP,RSVP,BGP) Layer-2 PDU 0 0 ReservedSequence Number EXPTTL0 PW Demux Tunnel Encaps Control Word

Ethernet PW Control Word Control Word is Optional (as per RFC) First nibble is 0x0 to prevent aliasing with IP Packets over MPLS (MAC addresses that start with 0x4 or 0x6) Reserved Should be all zeros, ignored on receive Seq number provides sequencing capability to detect out of order packets - currently not in Cisco’s implementation – processing is optional EXPTTL (set to 2)VC Label (VC)1 Tunnel Label (LDP,RSVP,BGP) Layer-2 PDU PW Demux Tunnel Encaps Control Word 0 0 ReservedSequence Number EXPTTL0

P2P1 PW Operation and Encapsulation IP/MPLS Customer Site Directed LDP Session between PE1 and PE2 PE2 CE LSP “PW1” Lo0: Label 24 for Lo0: Label Pop for Lo0: Label 38 for Lo0: Label 72 for PW1 PE1 LDP Session 2472L2 PDU This process happens in both directions (Example shows process for PE2  PE1 traffic) 3872L2 PDU72L2 PDU

VPLS Flooding & Forwarding Flooding (Broadcast, Multicast, Unknown Unicast) Dynamic learning of MAC addresses on PHY and VCs Forwarding Physical Port Virtual Circuit DataSADA? Unknown DA? Pseudo Wire in LSP

MAC Address Learning and Forwarding Broadcast, Multicast, and Unknown Unicast are learned via the received label associations Two LSPs associated with a VC (Tx & Rx) If inbound or outbound LSP is down Then the entire Pseudo Wire is considered down PE1PE2 Send me frames using Label 170 Send me frames using Label 102 CE E0/0E0/1 MAC 2E0/1 MAC AddressAdj MAC 1102 MAC 2170 MAC AddressAdj MAC 1E0/0 Use VC Label 102 MAC1 Use VC Label 170 MAC2 PE2170MAC2MAC1Data PE2102MAC1MAC2Data Directed LDP

MPLS VPLS Topology – PE View Each PE has a P2MP view of all other PEs it sees it self as a root bridge with split horizon loop protection Full mesh topology obviates STP in the SP network Customer STP is transparent to the SP / Customer BPDUs are forwarded transparently PEs CEs PE view Full Mesh LDP Ethernet PW to each peer

MPLS PEs CEs PE view Full Mesh LDP Ethernet PW to each peer VPLS Topology – CE View CE routers/switches see a logical Bridge/LAN VPLS emulates a LAN – but not exactly… This raises a few issues which are discussed later MPLS VPLS Core MPLS CEs

Direct Attachment VPLS (Flat Architecture) CE N-PEMPLS CoreN-PE CE Ethernet (VLAN/Port Ethernet (VLAN Port) Full Mesh PWs + LDP MAC2MAC1Data PEVCMAC2MAC1Data MAC2MAC1Data 802.1q Customer Pseudo Wire SP Core

CE4 PE2 CE2 CE1 CE5 PE3 PE1 CE7 A B C D E L K J N G M H VPN A if1 if2 MACIntf Aif1

CE4 P2 P1 PE2 CE2 CE1 CE5 PE3 VPN B PE1 P3 P4 PE4 CE3 CE6 CE7 CE8 CE9 A B C D E L K J N G M H F VPN B VPN A

CE4 PE2 CE2 CE1 CE5 PE3 PE1 CE7 A B C D E L K J N G M H VPN A if1 if2 MACIntf AIf1 B CIf2 D E F200,410 H J K L M 300, 235 N