1 / 36

Lecture 7. L2 MPLS VPN: VPWS, (H)VPLS

Lecture 7. L2 MPLS VPN: VPWS, (H)VPLS. D. Moltchanov , TUT, Spring 2010. Outline. L2 MPLS VPNs Architecture VPWS VPLS Some notes on HVPLS, IPLS. Types of L2 MPLS VPN. VPWS Virtual Private Wire Services Point-to-point VPLS Virtual Private LAN Services Point-multipoint HVPLS

hatten
Download Presentation

Lecture 7. L2 MPLS VPN: VPWS, (H)VPLS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 7. L2 MPLS VPN: VPWS, (H)VPLS D. Moltchanov, TUT, Spring 2010

  2. Outline • L2 MPLS VPNs • Architecture • VPWS • VPLS • Some notes on HVPLS, IPLS

  3. Types of L2 MPLS VPN • VPWS • Virtual Private Wire Services • Point-to-point • VPLS • Virtual Private LAN Services • Point-multipoint • HVPLS • Hierarchical VPLS • Point-multipoint • IPLS • Modification of VPLS for IP only • Point-multipoint • … • VPLS, HVPLS, IPLS: same principles!

  4. L2 MPLS VPN: VPWS andVPLS • VPWS • VPLS, HVPLS, IPLS

  5. Virtual Private Wire Service

  6. VPWS:point-to-point • VPWS • “draft-martini-l2circuit-trans-mpls-08.txt” • “draft-martini-l2circuit-encap-mpls-04.txt” • Known as ‘martini’ • Basis is point-to-point • Simplex Virtual Circuits (VC) • LSPsinMPLS:tunnels that carry theseVCs • Two labels in the header • LSP:LSP label (identifiesLSPto a certainPE) • VC:VC label (identifiesCE) • Ctrl.:Control information

  7. VPWS:procedure • Set upLSP • We can useLDP, CR-LDP or RSVP-TE • ExchangeVC label • PEat the source side • Receives frame from CE • Encapsulates it in a new frame • Assign two label (VС label first) • PE at the remote side • Receives frame from the network • Identifies user’s interface based on VC label • Original frame is sent to the user

  8. VPWS: basic principles • Adding newCE • Setting local connection with PE1: configuring • Detecting other PE in this community: PE auto detection • Setting up LSPs to themPE: signaling • Data transfer

  9. VPWS: basic principles • TL: Tunnel (LSP) Label betweenPE • AC: Attachment Circuit: L2 access toPE: Eth., FR, ATM • VF: Virtual Forwarders: local forwarding table • MPLS pseudo-wire (PW):path betweenVF • Determined byVCL-TL labels

  10. VPWS: basic principles

  11. VPWS: bacis characteristics • No PE auto detectioninVPWS • Additional function inVPLS • OnlyLDPforPW establishment • Pseudo-wire (PW): (TL-VCL) • Simple Virtual Forwarders • Everything betweenVCandL2 interface

  12. VPWS: advantages/shortcomings • Advantages • Easy to use in ISPs’ networks • Only PEs have to be configured • Notonly IP traffic • IPX, SNA, whatever • Customer equipment can be simple • Switch, hub, bridge… • Single-side and double-side provisioning • Shortcomings • Ineffective resource usage

  13. Virtual Private LAN Service

  14. VPLS: in brief • Virtual Private LAN Services (VPLS) • Transport in ISP’s network is similar toBGP/MPLS • The difference is howCE-PE interoperate • VPLS • CEis not required to be router • There is no need for a number of switching table • PEmapsL2toMPLS LSP • Carries not onlyIP • Similarities betweenBGP/MPLSandVPLS • BGP/MPLS:PE supportsVRF • There can be several VRF (one per VPN)associated with PE • VPLS: PEsupports switching tables • There can be several of those (one per VPN) for each PE

  15. VPLS: properties • Aim of VPLS • WAN/MAN service similartoEthernet • VPLSforum: http://www.vpls.org/ • Difference compared to leased lines • Bandwidth is not fixed • Similar toEthernet • Sufficiently popular • Easy to use • Cost-effective • Cheap customer equipment • Flexibility • Easy to control • Connection type in VPLS • Point-to-multipoint • LAN emulation

  16. VPLS:point-to-multipoint • Idea:emulateL2 switch • Switching in WAN/MANbased on MAC address • VPLS: draft-lasserre-vkompellappvp-vpls-00.txt

  17. VPLS: basics • Basics of VPLS: • Full mesh • 2*2NLSPs are required, Nis the number of CE in VPN • VPN identification • UniqueVPN ID: 32bits • Extension to VPN ID: 56 bits, 64 bits • Extension to VPN ID: string • Site (CE) identifiers:labels!

  18. VPLS:basic principles • PE function • DetectingMACaddressesfromVC

  19. VPLS:basic principles • PE functions • Switching based onMACaddress

  20. VPLS:basic principles • PE functions • No entry in the switching table

  21. VPLS:basic principles • PE functions • Virtual Switched Instance (VSI)instead ofVF

  22. VPLS: setting up VPN • PE auto detection • Creating mesh topology • UsingVSIfor data transfer

  23. VPLS: VPN identification • ConnectVSIvia the network • Identify PW using (PE IP, VPNid) • VSI must be connected intofull mesh

  24. VPLS: configuringPE • List of remotePE • Automatically (BGP) ormanually

  25. LDP-VPLS:setting upLSPsandPWs • AddingCE1: configuringPE2, LDP mapping • PWs connect VSIs • By analogy toVPWS, butPWconnectsVSI, notAC!

  26. LDP-VPLS: data transfer • PE: full mesh

  27. LDP-VPLS: data transfer – single node • Local loop detection, the following is only possible • AC-AC • AC-PW • PW-AC

  28. LDP-VPLS: broadcasting • Broadcasting • To allPEthat have at least oneVPNid = “Yellow”

  29. LDP-VPLS: point-to-point • Point-to-point • IfMACY is knownthen to only onePE, then to only oneCE!

  30. LDP-VPLS:broadcasting phase • Point-to-point (broadcasting phase) • Gatheringinformation about MACaddress in remote networks!!! • OnlyVPNid = “Yellow”

  31. Example LDP-VPLS: Riverstone

  32. PE auto detection (BGP) • Information about VPNs as a part ofMP_Reach_NLRI • AFI (address family identifier):assigned by IANA • SAFI (subsequent address family identifier): 0000 00LW, • L:VPLS, W:VPWS

  33. VPLS: advantages/shortcomings • Advantages fo VPLS • Seamless use of Ethernet across WAN/MAN • SLA can be used • PErouters can be simple • Not only IP • ISP do not know what happens in customer’s network • Simple CE (switch, bridge, hub) • Compatible withBGP/MPLS • Easily controlled • Shortcomings of VPLS • PE auto detection is not often used • Depends on implementation • Scalability • A lot ofLSP: indeed, full mesh! • Solution: use hierarchialVPLS (HVPLS)

  34. HVPLS: principles • VPLS problem №1:2*2Nnodes in VPLS • Performance, resource reservation • Solution:use user-basedPE (U-PE) • draft-ietf-l2vpn-vpls-ldp.txt • VPLS problem №2: • PEshould know a lot of MAC addresses • Solution:pass this functionto U-PE • draft-kompella-ppvpn-dtls.txt

  35. HVPLS: Nortel Networks

  36. L2 VPN IETF: basic standards • PE auto detection (BGP) • draft-ietf-ppvpn-bgpvpn-auto-05.txt • Signaling • draft-ietf-l2vpn-signaling-00.txt • draft-ietf-pwe3-control-protocol-03.txt • Incapsulation • Common format: draft-ietf-pwe3-<протокол>-encap-<год>.txt • Ethernet: draft-ietf-pwe3-ethernet-encap-03.txt • Particular solutions • LDP-VPLS: draft-ietf-ppvpn-vpls-ldp-00.txt • BGP-VPLS: draft-ietf-ppvpn-vpls-bgp-00.txt • IPLS: relaxing complexity of broadcasting phaseVPLS • Only for IP atL3!

More Related