Copyright © 2004 Juniper Networks, Inc. www.juniper.net 1 Operational Aspects of Virtual Private LAN Service Kireeti Kompella.

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
Kireeti Kompella Bhupesh Kothari Thomas Spencer
MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Deployment of MPLS VPN in Large ISP Networks
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Diverse Paths draft-ietf-grow-diverse-bgp-paths-dist-02 Keyur Patel.
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Leading Edge Routing MPLS Enhancements to Support Layer 2 Transport Services Jeremy Brayley
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
MPLS-VPN/BGP Approach Hari Rakotoranto Technical Marketing Engineer
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
More on BGP Check out the links on politics: ICANN and net neutrality To read for next time Path selection big example Scaling of BGP.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Improving Routing Performance.
PTX Use Cases Chris Whyte
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Planning the Enterprise-to-ISP Connection.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
Ietf-64 draft-kulmala-l3vpn-interas-option-d-01.txt Additional Inter AS option for BGP/MPLS IP VPN IETF-64 draft-kulmala-l3vpn-interas-option-d-01.txt.
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
MPLS VPN Security assessment
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
1 © 2003 Cisco Systems, Inc. All rights reserved. MPLS VPN Inter-AS, 12/03 INTER-AUTONOMOUS SYSTEM MPLS VPN December 2003.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—2-1 Implementing an EIGRP-Based Solution Configuring and Verifying EIGRP for the Enterprise.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Adjust and Troubleshoot Single- Area OSPF Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
61st IETF Washington DC November 2004 BGP/MPLS IP Multicast VPNs draft-yasukawa-l3vpn-p2mp-mcast-00.txt Seisho Yasukawa (NTT) Shankar Karuna (Motorola)
Lecture 4: BGP Presentations Lab information H/W update.
MPLS on UW System Network Michael Hare. Purpose of presentation As I didn't really understand MPLS going in, I thought it would be useful to share what.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
CS 540 Computer Networks II Sandy Wang
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Inter AS option D (draft-mapathak-interas-option-d-00) Manu Pathak Keyur Patel Arjun Sreekantiah November 2012.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
MPLS on UW System Network Michael Hare. Purpose of presentation As I didn't really understand MPLS going in, I thought it would be useful to share what.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-01.txt draft-raggarwa-l2vpn-vpls-mcast-ctrl-00.txt.
EVPN: Or how I learned to stop worrying and love the BGP
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
MPLS Virtual Private Networks (VPNs)
MPLS VPN Implementation
Presenter: Jeffrey Zhang
Kireeti Kompella Juniper Networks
Dynamic Routing and OSPF
EVPN a very short introduction
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. 1 Operational Aspects of Virtual Private LAN Service Kireeti Kompella

2 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

3 Copyright © 2004 Juniper Networks, Inc Introduction to VPLS  Typical Building/Campus Network  Frame Relay (ATM) Connectivity  Ethernet-based Connectivity  Why Ethernet for External Connectivity?  Why VPLS? Summary: Multipoint Ethernet access is a service desired by many enterprises

4 Copyright © 2004 Juniper Networks, Inc. Typical Building/Campus Network  Intra-building connectivity via Ethernet  Broadcast domains (LANs) broken up by routers  External connectivity via a WAN link from a router Primary theme of talk: WAN link replaced by Ethernet Service Provider Router/Switch Customer Edge Router EthernetSwitch Desktop Server CustomerRouter EthernetSwitch … WAN link

5 Copyright © 2004 Juniper Networks, Inc. Frame Relay (ATM) Connectivity …  Intra-building connectivity via Ethernet  External connectivity via Frame Relay or ATM VCs  Routing paradigm shift -- multiple point-to-point adjacencies instead of a single multi-point adjacency Forwarding is based on VCs SP network looks like a Frame Relay switch

6 Copyright © 2004 Juniper Networks, Inc. Ethernet-based Connectivity …  Intra-building connectivity via Ethernet  External connectivity via VPLS – just another Ethernet broadcast domain  All customer routing is based on multi-point adjacencies over Ethernet; multicast is native Ethernet multicast Forwarding is based on MAC addrs SP network looks like an Ethernet switch/hub/wire

7 Copyright © 2004 Juniper Networks, Inc. Why Ethernet for External Connectivity?  Most networks inside buildings have Ethernet – this is the most common network connection Ethernet is cheap, fast and simple  Routing over an Ethernet is easier and more scalable than over N point-to-point links For RIP, one can broadcast or multicast updates For OSPF and IS-IS, form a single adjacency per LAN segment, send one hello and floods LSDB once  Broadcast and multicast are simpler -- native operation with IGMP instead of PIM  Native operation for non-IP Ethernet-based applications

8 Copyright © 2004 Juniper Networks, Inc. Why VPLS (Not Native Ethernet)?  “Network convergence” -- don’t want a separate network for Ethernet access  Ethernet is an appealing access medium, but it makes a poor Service Provider infrastructure Don’t want to carry all customer MAC addresses in every single device -- does not scale, violates privacy Don’t want to run Spanning Tree in SP network Cannot afford even transient layer 2 loops or broadcast storms

9 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

10 Copyright © 2004 Juniper Networks, Inc LAN Over a MAN/WAN?  Can the SP network emulate an Ethernet well enough? Learn (and age) MAC addresses, flood packets, etc.?  Will LAN applications work correctly over a MAN or WAN connection? …

11 Copyright © 2004 Juniper Networks, Inc. LAN Over a MAN/WAN?  The answer to the first question is absolutely!  The answer to the second question is less definite at present This is a new service, and there isn’t enough deployment experience However, many active deployments -- we’ll know soon The attitude is, Ethernet/VPLS deployment and usage is inevitable, so just make it work! No issues are anticipated with IP-based applications The main issues are: latency and packet loss These are known problems, and have good solutions

12 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

13 Copyright © 2004 Juniper Networks, Inc MAC Address Scaling  Will the SP network be able to handle all the customer MAC addresses? …

14 Copyright © 2004 Juniper Networks, Inc. MAC Address Scaling  The aim is not to build a single huge, world- spanning broadcast domain for each customer! Even within a building, there are multiple LANs  MAC address knowledge for a given VPLS is limited to the PEs participating in that VPLS Analogy: RFC 2547bis IP VPNs  MAC addresses are not exchanged among PEs by any protocol -- they are learned dynamically  Initial deployments: restrict CE devices to routers, and thus limit the number of MACs

15 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

16 Copyright © 2004 Juniper Networks, Inc Full Mesh Connectivity  Why do the PEs need to be fully meshed?  How does one ensure this? … … Service Provider Network CE 1 CE 2 CE 4CE 3

17 Copyright © 2004 Juniper Networks, Inc. Full Mesh Connectivity  All VPLS solutions require full mesh connectivity among PEs belonging to a particular VPLS A partial mesh can lead to weird failure modes that are not easy to debug or diagnose This is a rare failure mode in true LAN environments  This problem is exacerbated if you don’t have an autodiscovery mechanism Greater likelihood of misconfiguration leading to partial mesh creation

18 Copyright © 2004 Juniper Networks, Inc. Full Mesh Connectivity  Assume that one connection goes down from the full mesh in the previous diagram  Suppose that the CE routers are running OSPF CE1 is the DR, CE2 the BDR CE2 stops hearing hellos from CE1, takes over as DR CE3 and CE4 are now thoroughly confused  Or suppose that CE1 is ARPing for IP addresses Usually, this works, but when the IP address is behind CE2, there is no ARP response

19 Copyright © 2004 Juniper Networks, Inc. Full Mesh Connectivity of VPLS PEs  I-BGP messages go to all peers, by definition This is an inherent part of the protocol  Thus, by definition there will be full mesh connectivity among PEs for a given VPLS A configuration error (e.g., wrong route target) may result in a PE completely missing a given VPLS, but can never result in a partial mesh Easier to diagnose a completely missing site rather than a partial mesh

20 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

21 Copyright © 2004 Juniper Networks, Inc Loops and Spanning Tree  Service Providers must protect against a layer 2 loop or broadcast storm in the customer network  Three ways for a SP to do this Rate-limit broadcast, multicast and flooding traffic from the customer devices Run Spanning Tree Protocol on the PE-CE links Whenever possible, keep control of loop avoidance and link selection with the Service Provider

22 Copyright © 2004 Juniper Networks, Inc. Broadcast Storms  One must rate-limit the flooding of packets to unknown addresses Possible that the source MAC address is never learned  One should rate-limit broadcasting Limit damage due to broadcast storms  One should rate-limiting multicast traffic In principle, less damaging than broadcast  Ideally, each of these should have independent knobs, to adapt to customer needs

23 Copyright © 2004 Juniper Networks, Inc. VPLS and BGP Path Selection Multi- homed CE 2 announcements for site 1 of RED VPLS with different Local Preferences Label 94 Label 53 PE 3 PE 2 PE 4 Path Selection Prefer PE 2; install route to PE 2 with VPLS label 94 PE2 withdraws PE4 redoes path selection, picks path via PE 3 A multi-homed CE would normally immediately cause a layer 2 loop. This is usually resolved by having the CE run STP. However, an alternative is to use BGP path selection

24 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

25 Copyright © 2004 Juniper Networks, Inc Inter-AS/Inter-provider VPLS  A strong requirement in R&E Networks  Defined in 2547bis for IP VPNs, but can be used as is for BGP L2 VPNs and VPLS  3 options: option A, option B, option C Summary: MP-BGP offers a scalable Inter-AS solution with Route Reflectors

26 Copyright © 2004 Juniper Networks, Inc. Route Reflectors For Inter-AS VPLS AS 1 AS 2 Brute force Inter-AS signaling: Set up sessions between every PE in AS 1 and every PE in AS 2: MxN sessions, authentication nightmare BGP with Route Reflectors: Set up sessions between RRs in AS1 and RRs in AS2 -- easier to manage, fewer authentication keys RR M PEs N PEs

27 Copyright © 2004 Juniper Networks, Inc. Loop-free Distribution of VPLS NLRIs AS 1 RR AS 2 RR AS 3 RR AS 4 RR AS path loop detection AS path-based path selection

28 Copyright © 2004 Juniper Networks, Inc. Site 1 Site 2 VFT PE_3 ASBR 1 PE_4R_1R_2 ASBR 4 Multi-As Operations with a Direct Connection Between BGP/MPLS VPN Providers BGP/MPLS VPN Provider (AS 1) BGP/MPLS VPN Provider (AS 2) Can be: - a direct L2 link - a L2 VPN pt-to-pt connection - a GRE/IPSec tunnel Multi-hop EBGP Distribution of Labeled VPN Routes Between PE Routers (1) Inter-Provider VPN/VPLS Option C in 2547bis

29 Copyright © 2004 Juniper Networks, Inc. Multi-As Operations with a Direct Connection Between BGP/MPLS VPN Providers Forwarding Plane pop push pop Site 1 Site /16 VFT Provider IGP + LDP Provider IGP + LDP MP-eBGP (for provider’s VPLS NLRIs) PE_3 ASBR 1 PE_4R_1R_2 Direct E-BGP (for provider’s internal routes) ProviderI-BGP ASBR 4 ProviderI-BGP Multi-hop EBGP Distribution of Labeled VPN Routes Between PE Routers (2) push VPLS NLRI NH: PE4 push to PE4: NH ASBR1 push to ASBR1: LDP label pop PHP pop swap to PE4: BGP NH ASBR4 Control Plane

30 Copyright © 2004 Juniper Networks, Inc. Multi-hop EBGP Distribution of Labeled VPN Routes Between PE Routers (3)  Advertise labeled Internal Routes (/32) routes into other AS  Establish LSP between ingress and egress PE  Use multihop EBGP over established LSP  If /32 PE addresses not advertised to P router, can use 3-level label-stack  ASBR is not aware of VPN information (scalable !) PE_3 CE_1 (ASBR) Site 1 Site 2 PE_1 (ASBR) PE_2 (ASBR) PE_4R_1PR_2 CE_2 (ASBR) BGP/MPLS VPN Provider (AS 1) VFT BGP/MPLS VPN Capable Transit Provider (AS 3) BGP/MPLS VPN Provider (AS 2) VRF Multi-As Operations with a BGP/MPLS VPN Capable Transit Provider

31 Copyright © 2004 Juniper Networks, Inc. PE_3 CE_1 (ASBR) Site 1 Site 2 PE_1 (ASBR) PE_2 (ASBR) PE_4R_1PR_2 CE_2 (ASBR) VFT Transit Provider IGP + LDP MP-eBGP (for provider’s VPLS NLRIs) MP-iBGP (for provider’s internal routes) Provider IGP + LDP (AS 1) Provider IGP + LDP (AS 2) Multi-As Operations with a BGP/MPLS VPN Capable Transit Provider Direct E-BGP (for provider’s internal routes) VRF Direct E-BGP (for provider’s internal routes) VRF Forwarding: PE_3 pushes Three labels push swap pop Forwarding Plane pop swap push swap pop push pop ProviderI-BGP ProviderI-BGP Multi-hop EBGP Distribution of Labeled VPN Routes Between PE Routers (4)

32 Copyright © 2004 Juniper Networks, Inc. Recursive Multi-AS Operations IGP MP-iBGP Transit Provider’s External (Provider B’s + C’s internal) VPN Provider A (AS 1) VPN Provider B (AS 2) Transit Provider (AS 3) VPN Provider C (AS 4) VPN Provider D (AS 5) Maintains Provider B’s + C’s Internal Routes Maintains VPLS NLRIs VFT MP-eBGP Provider A’s + D’s VPLS NLRIs Maintains E-BGPE-BGPE-BGPE-BGPIGP Maintains Provider A’s + D’s Internal Routes MP-eBGP Provider B’s + C’s External (Provider A’s + D’s Internal) VRF CE CE

33 Copyright © 2004 Juniper Networks, Inc. Recursive Multi-AS Operations IGP Direct E-BGP (for provider B’s + C’s internal routes) VFT VPN Provider A (AS 1) VPN Provider B (AS 2) VPN Provider C (AS 4) VPN Provider D (AS 5) E-BGPE-BGPIGP VRF CE CE Maintains VPLS NLRIs Maintains Provider A’s + D’s Internal Routes Maintains VPLS NLRIs Maintains Provider A’s + D’s Internal Routes MP-eBGP Provider A’s + D’s VPLS NLRIs MP-eBGP Provider B’s + C’s External (Provider A’s + D’s Internal) Can be: - a direct L2 link - a L2 VPN pt-to-pt connection - a GRE/IPSec tunnel

34 Copyright © 2004 Juniper Networks, Inc. Recursive Multi-AS Operations IGP Direct E-BGP (for provider B’s + C’s internal routes) VFT VPN Provider A (AS 1) VPN Provider D (AS 5) IGP CE CE Maintains VPLS NLRIs Maintains Maintains Provider A’s + D’s Internal Routes MP-eBGP Provider A’s + D’s VPLS NLRIs Can be: - a direct L2 link - a L2 VPN pt-to-pt connection - a GRE/IPSec tunnel

35 Copyright © 2004 Juniper Networks, Inc. This is actually a CPE based VPN! - Complexity managed by end-users - Scalability issue - Do NOT require any VPN service from transit provider (if GRE or IPSec Tunnel) Recursive Multi-AS Operations VFT CE CE MP-eBGP Can be: - a direct L2 link - a L2 VPN pt-to-pt connection - a GRE/IPSec tunnel

36 Copyright © 2004 Juniper Networks, Inc. Inter-AS/Inter-provider VPLS  Exchange VPN information + VPN labels across AS/provider boundary by using BGP between BGP Route Reflectors in each AS/provider Route Reflectors preserve the next hop information and the VPN label across the AS/provider  PEs learn routes and label information of the PEs in the neighboring ASes through ASBRs Using labeled IPv4 routes  No VPN information (e.g., VRF, VFT) on ASBRs Applies to RFC2547 VPN, L2 VPN, and VPLS !!!

37 Copyright © 2004 Juniper Networks, Inc. Agenda 1.Introduction to VPLS Operational Issues 2.LAN over a MAN/WAN? 3.MAC Address Scaling 4.Full Mesh Connectivity 5.Loops and Spanning Tree 6.Inter-AS (Inter-Provider) VPLS 7.Deployment Status

38 Copyright © 2004 Juniper Networks, Inc Status on Deployment  Korea Telecom and Hutchinson have jointly announced an inter-provider VPLS deployment using BGP for signaling and auto-discovery  Major carrier in the US has tested inter-metro VPLS for over 8 months, and has started a beta trial for their customers. Deployment starts in June, to reach over 40 metro areas by end of ‘04 Active dialogue, many features requested and, yes, implemented

39 Copyright © 2004 Juniper Networks, Inc. Status on Deployment  Ethernet-focused carrier in Norway has tested VPLS for 3 months, and has completed their design. Will begin deployment shortly  Another carrier in Norway has a small VPLS deployment for internal use  Several Metro Ethernet providers in Europe and Asia are actively testing BGP VPLS  Other groups in the US have also begun testing; target is to replace existing LANE networks

40 Copyright © 2004 Juniper Networks, Inc. Thank you!