1 / 9

PIM Snooping in VPLS draft-hemige-serbest-l2vpn-vpls-pim-snooping-00.txt

PIM Snooping in VPLS draft-hemige-serbest-l2vpn-vpls-pim-snooping-00.txt. Suresh Boddapati Venu Hemige Sunil Khandekar Vach Kompella Marc Lasserre Rob Nath Ray Qiu Yetik Serbest Himanshu Shah. Background . WG consensus from last IETF – split VPLS Multicast into :

maura
Download Presentation

PIM Snooping in VPLS draft-hemige-serbest-l2vpn-vpls-pim-snooping-00.txt

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PIM Snooping in VPLSdraft-hemige-serbest-l2vpn-vpls-pim-snooping-00.txt Suresh Boddapati Venu Hemige Sunil Khandekar Vach Kompella Marc Lasserre Rob Nath Ray Qiu Yetik Serbest Himanshu Shah

  2. Background • WG consensus from last IETF – split VPLS Multicast into : • Mcast Trees in Provider Core (draft-raggarwa-l2vpn-vpls-mcast) • IGMP-Snooping (draft-ietf-magma-snoop-12.txt ) • PIM-Snooping in VPLS • PE-to-PE Mcast State Distribution • Split draft-serbest-l2vpn-vpls-mcast-03 into: • PIM-Snooping in VPLS (This draft) • PE-to-PE Mcast State Distribution in VPLS using LDP

  3. PIM Snooping in VPLS • VPLS floods mcast traffic today. • PIM-Snooping prevents unwanted mcast traffic • Issue A of the Requirements Draft. • PIM Snooping on ACs. • Defines data forwarding rules for IGMP+PIM. • Requires CEs to disable PIM Join-Suppression. • For PWs, PEs learn PIM states using: • PIM Snooping OR • Via LDP.

  4. What changed from draft-serbest-l2vpn-vpls-mcast-03? • Removed IGMP-Snooping • Updated PIM-Snooping procedures. • Requires CEs to disable PIM Join Suppression. • PIM Join/Prunes are flooded in VPLS. • LDP procedures moved to draft-qiu-serbest-l2vpn-vpls-mcast-ldp-00. • Modified procedures for duplicate traffic.

  5. PIM-Snooping Basic Example R2 R1 PE2 PE1 Joins flooded. Only PEs towards RPF build state Traffic sent only on interested ports PE3 PW AC Join to RPF Nbr Join seen Data Traffic R4 R3

  6. Duplicate Traffic Scenario R2 R1 PE2 PE1 Duplicate traffic to both R3 and R4 PE3 PW AC Join to RPF Nbr Join seen Data Traffic R4 R3

  7. Assert Mechanism in VPLS PIM-Snooping • Constraint: Split-Horizon rules require traffic ingressing on PW to not egress on PW. • Facilitate traffic to reach the routers forwarding traffic. • Results in Assert between the routers. • Two rules facilitate this: • Add incoming port to outgoing-port-list • When Join is “seen”, add PW towards RPF-neighbor to outgoing-port-list

  8. Assert Mechanism in VPLS PIM-Snooping R2 R1 AC1 PIM ASSERT PE2 PE1 1. A PE snooping a Join(S,G) adds IIF and OIF to OIF-List. 2. A PE “seeing” a Join, adds the PW to the RPF-nbr to the OIF-List PW12 PE3 PW AC Join to RPF Nbr Join seen Data Traffic Assert Winner becomes the forwarder in the VPLS R4 R3

  9. Summary • PIM-Snooping is important to make VPLS Multicast work. • There is a lot of interest in solving the issue addressed by this draft. • WG document.

More Related