One document matched: draft-pan-pwe3-pbb-tunnels-00.txt


Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

 
Network Working Group                                                   
Internet Draft                                                 Ping Pan 
Intended status: Standards Track                   (Hammerhead Systems) 
Expiration Date: December 2007                             Shane Amante 
                                                        Nasser El-Aawar 
                                                              (Level-3) 
                                                                        
                                                                        
                                                                        
                                                              June 2007 
                                                                        
    
    
          Setup and Manage PBB-based Tunnels with PWE3 Mechanism 
                                      
                                      
                     draft-pan-pwe3-pbb-tunnel-00.txt 
    
    
Status of this Memo                           
    
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79. 
    
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups. Note that other 
   groups may also distribute working documents as Internet-Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time. It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/1id-abstracts.html 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 
    
    
Abstract 
    
   This document describes a mechanism that enables providers to setup 
   point-to-point tunnels over PBB networks for the purpose of 
   aggregating customer flows. The interior network nodes will not be 
   disturbed with this mechanism. 

                                                                [Page 1] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

Table of Contents 
    
   1. Specification of Requirements 
                                    .................................2 
   2. Introduction 
                   ..................................................2 
      2.1. Assumptions 
                       ..............................................3 
      2.2. Perspectives 
                        .............................................3 
   3. Background 
                 ....................................................4 
      3.1. PWE3 
                .....................................................4 
      3.2. PBB 
               ......................................................4 
      3.3. PBT 
               ......................................................5 
      3.4. PBB-based Tunnels 
                             ........................................6 
   4. Operation Outline 
                        .............................................6 
   5. Protocol Extensions 
                          ...........................................8 
      5.1. Generalized ID FEC 
                              .......................................8 
      5.2. AII Type: PBB-based Tunnels 
                                       ..............................8 
      5.3. Pseudowire Status 
                             ........................................9 
      5.4. OAM 
               ......................................................9 
   6. Applications 
                   ..................................................9 
      6.1. Interconnection PBB Domains with PW MHOP 
                                                    .................9 
      6.2. Carrying multi-service traffic over PBB-based tunnels 
                                                                 ....9 
      6.3. Interworking with PBT 
                                 ....................................9 
   7. Intellectual Property Statement 
                                      ..............................10 
   8. Full Copyright Statement 
                               .....................................10 
   9. IANA Considerations 
                          ..........................................10 
   10.  Normative References .......................................10 
   11.  Informative References .....................................11 
   12.  Author Information .........................................11 
    
    
    
1. Specification of Requirements 
   
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC 2119. 
   
   
2. Introduction 
 
   With the proliferation of Ethernet deployment in metro and backbone 
   networks, managing Ethernet connections becomes increasingly 
   important. Despite the popularity of MPLS, many carriers continue to 
   build-out Ethernet-only networks, where no MPLS switching takes place 
   at data plane inside the network. 
    
   To make the deployment scalable, the carriers have been deploying Q-
   in-Q [Q-in-Q] whereby each Ethernet frame can be encapsulated with 
   multiple VLAN tags. 
    


                                                                [Page 2] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

   As the metro network continues to expand, the carriers need to 
   improve scalability beyond Q-in-Q VLAN tagging. PBB (Provider 
   Backbone Bridges) [PBB], also known as MAC-in-MAC, is a technique 
   that encapsulates Ethernet frames with another Ethernet MAC and VLAN 
   header. It therefore increases Ethernet framing hierarchy at data-
   plane. 
    
   Generally, the scaling improvement at data-plane needs to be coupled 
   with the scalability at control-plane.  
    
   One simple yet popular application is to aggregate VLAN-tagged flows 
   from customer locations into point-to-point tunnels from PBB backbone 
   edge. It requires the network operators to be able to dynamically 
   provision, monitor and manage the PBB-based tunnels, as well as 
   mapping of customer VLAN flows into PBB-based tunnels. 
    
   PBT (Provide Bridge Transport) [PBT] has been proposed as the 
   solution for the above application. However, PBT inherently has two 
   shortcomings: 
    
   First, the currently defined PBT proposal has no dynamic provisioning 
   mechanism, and won’t scale for large scale backbone with static 
   configuration. 
    
   Second, the currently defined PBT proposal requires the internal 
   nodes to be programmed for tunnel setup. It is debatable if it will 
   bring the justification for control-plane simplicity.  
    
   In this document, we first define PBB-based tunnels, as the virtual 
   tunnels between PBB edge nodes. We then propose of using the well-
   defined PWE3 protocols to setup and manage the PBB-based tunnels. 
    
   The proposal does not require the changes on the internal nodes. 
    
    
2.1. Assumptions 
    
   Our proposal is based on the following assumptions: 
    
   1. The Ethernet metro/core network is relatively stable. The network 
     will not experience frequent link and node failures, or subsequent 
     long converging and looping problems introduced by STP. 
    
   2. Network providers will over-provision the network to overcome per-
     flow QoS issues. 
 
 
2.2. Perspectives 
    
   There should be little doubt on the effectiveness of MPLS/IP 
   protocols in establishing data tunnels - point-to-point, and point-
                                                                [Page 3] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

   to-multi-point alike. In particular, PWE3 is a well-defined and 
   widely deployed mechanism in setting up and managing edge-to-edge 
   data connections. In particular, the PWE3 control-plane can operate 
   over just about any type of networks. 
    
   There should also be obvious that the carriers have incentive in 
   deploying PBB (Provider Backbone Bridges, or, MAC-in-MAC) to expand 
   their Ethernet-only networks. Inside the PBB networks, the carriers 
   have the option of using spanning tree protocols to interconnect 
   nodes. It should be noted that the MAC-in-MAC mechanism itself is a 
   data-plane function. 
    
   Hence, instead of operating the networks with either MPLS or PBB/PBT, 
   we believe that an alternative is to deploy MPLS/PWE3 protocols at 
   places where they fit (such as, network edge), while using PBB for 
   simple and cheap Ethernet packet transport within the backbone. 
    
   In our proposal, we define the protocol extension in using target LDP 
   (PWE3) at network edge to exchange MAC-in-MAC and VLAN information 
   between network edges. The backbone network itself will operate with 
   PBB only. 
    
 
3. Background 
   
   In this section, we will outline some of the relevant technologies 
   that we work with. 
    
3.1. PWE3 
    
   PWE3 [RFC3985] is to create edge-to-edge connections between two edge 
   nodes, and has been widely deployed to interconnect user traffic over 
   the MPLS/IP backbone. It comes with a number of important features: 
   VCCV [VCCV] provides an efficient OAM capability for PW’s, and MHOP 
   [MHOP] and PW switching [PW Switching] enable the PWE3 to be deployed 
   over multiple networks. 
    
   Further, Pseudo-wire itself is a very flexible concept, and can 
   operate over any data network, including MPLS, TDM and Ethernet 
   (a.k.a. dry-martini). 
    
 
3.2. PBB 
   
   PBB extends the Ethernet stacking as shown in Figure-1: 
    
     +-------+        +-------+      +-------+      +---------+ 
     |  Data |        |  Data |      |  Data |      |  Data   | 
     +-------+        +-------+      +-------+      +---------+ 
     |Src MAC|  --->  |  VID  | ---> | C-VID | ---> | C-VID   | 
     +-------+        +-------+      +-------+      +---------+ 
                                                                [Page 4] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

     |Dst MAC|        |Src MAC|      | S-VID |      | S-VID   | 
     +-------+        +-------+      +-------+      +---------+ 
                      |Dst MAC|      |Src MAC|      |Src MAC  |  
       802.1          +-------+      +-------+      +---------+ 
                                     |Dst MAC|      |Dst MAC  | 
                       802.1q        +-------+      +---------+ 
                                                    | I-SID   | 
      VID = VLAN ID                   802.1ad       +---------+ 
      C-VID = Customer VID                          | B-VID   | 
      S-VID = Service VID                           +---------+ 
      I-SID = Service ID                            |B-Src MAC| 
      B-VID = Backbone VID                          +---------+ 
      B-Src MAC = Backbone Source MAC               |B-Dst MAC| 
      B-Dst MAC = Backbone Destination MAC          +---------+ 
    
                                                   802.1ah (PBB) 
    
               Figure 1: A brief history of Ethernet Stacking 
    
    
   As mentioned previously, Q-in-Q (or 802.1ad) has been widely 
   deployed. PBB leads to a reasonable evolution for Ethernet backbone 
   expansion. 
    
   Since PBB is to encapsulate a new MAC header to each packet, the 
   network intermediate nodes can be constructed with any out-of-shelf 
   Ethernet switches and employee STP or other means for connectivity. 
    
   In summary, if the carriers have already adapted native Ethernet 
   services, the deployment of PBB should not introduce much overhead 
   and cost. 
    
 
3.3. PBT 
 
   By definition, PBB offers a bridged network, where each node can 
   communicate with other nodes simultaneously (a.k.a. any-to-any 
   connectivity). This may not be a desirable behavior for some of the 
   backbone applications. 
    
   One important backbone application is to create point-to-point 
   tunnels between edge nodes to aggregate user flows. 
    
   PBT (Provider Bridge Transport) is designed to support point-to-point 
   tunnels over PBB networks. Instead of using STP to interconnect edge 
   nodes, PBT defines one or multiple B-VID bits in the PBB stack for 
   the purpose of tunneling functionality. The intermediate nodes will 
   not perform STP flooding on the frames that have the special B-VID 
   bits. To setup the PBT tunnels, PBT requires all the intermediate 
   nodes to manage the B-VID entries. It has been proposed of using 
   GMPLS to setup and maintain the PBT tunnels. 
                                                                [Page 5] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

    
   The advantage here is that it enables the operators to run traffic 
   engineering on every PBT tunnel. Also the PBT path setup can be 
   independent from STP, therefore, is immune from the undesirable long 
   convergence problems. 
    
   The disadvantages in PBT are that each PBB nodes need to be 
   provisioned, and the lack of dynamic provisioning mechanism. 
    
    
3.4. PBB-based Tunnels 
    
   If the PBB backbone is over-provisioned and relatively stable, and 
   the carrying data is best-effect, then it does not seem necessary to 
   provision all the nodes, as recommended in PBT. 
    
   In the context of our proposal, we define PBB-based tunnels as the 
   following:  
    
   If two edge nodes have connectivity over the PBB backbone, then the 
   operators can establish bi-directional virtual tunnels between two 
   nodes for the purpose of aggregating user traffic flows. Such tunnels 
   are called “PBB-based tunnels”. 
    
   Note that the interior nodes do not need to do anything special. The 
   connectivity between edge nodes can be achieved by dynamic protocols, 
   such as STP, or static configuration, or other means. 
   
   
4. Operation Outline 
    
   The objective here is to establish PBB-based tunnels over the PBB 
   core, and aggregate customer flows through the point-to-point 
   tunnels. 
    
    
                  |                                 | 
                  |<----- PBB-based Tunnel -------->| 
                  |                                 | 
    Customer      |                                 |     Customer  
     VLAN’s   +------+                          +------+   VLAN’s 
              |      |       ------------       |      | 
    <-------->|      |      (            )      |      |<--------> 
    <-------->| PE-A |     {              }     | PE-B |<--------> 
        ...   |      |====(      PBB       )====|      |   ... 
    <-------->|      |     (   Network    )     |      |<--------> 
              |      |      (            )      |      | 
              +------+       ------------       +------+ 
                 ^                                  ^ 
                 |                                  | 
                 |                                  | 
                                                                [Page 6] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

                IP-A                              IP-B 
                MAC-A                             MAC-B 
                I-SID-A                           I-SID-B 
                B-VID-A                           B-VID-B 
    
     
                        Figure 2: Operation example 
    
    
   The operation is illustrated in Figure 2. The service provider needs 
   to transport multiple customer VLAN flows between PE-A and PE-B. The 
   PBB backbone may apply STP or other means to discover the 
   connectivity between PE-A and PE-B. 
    
   The operators will configure IP address to both PE nodes. ARP will 
   resolve the MAC addresses, that is, MAC-A and MAC-B. The operators 
   will need the I-SID and B-VID information to aggregate customer flows 
   with MAC-in-MAC encapsulation. 
    
   We propose of using RFC4447 [PWE3-LDP] to exchange I-SDI and B-VID 
   information. Essentially, we will use the mechanism for setting up 
   PW’s to create PBB-based tunnels between PE-A and PE-B. 
    
   Specifically, the tunnel setup is based on the Generalized ID (GID) 
   FEC (type 129). This enables the operators setting up and managing 
   the tunnels from local PE’s. The PBT-based tunnels will use a new AII 
   to identify PBB-based tunnels, which contains MAC, B-VID and I-SID 
   information.  
    
   In the example, the operators at PE-A will send a LDP mapping message 
   with SAII = {MAC-A, I-SID-A, B-VID-A}, and TAII = {MAC-B, I-SID-B, B-
   VID-B} to PE-B. Upon successful reception, PE-A and PE-B will install 
   the PBB information on data path. When a VLAN packet from a customer 
   site arrives on PE-A, PE-A will encapsulate a backbone Ethernet 
   header with the appropriated MAC, I-SID and B-VID. Upon the 
   reception, PE-B will remove the header, and continue to the native 
   Ethernet switching. 
    
   Each PBB-based tunnel can carry traffic from multiple customer 
   sources. 
    
   When a PBB-tunnel is no longer in use, the operator will apply the 
   standard PWE3 procedure to remove it. 
    
   For OAM support, the operators have the option to apply either native 
   Ethernet OAM schemes (802.3ah, 802.1ag) or VCCV (LSP-ping, BFD), or 
   both. 
    
   For protection support, the operators can either rely on STP to 
   converge, or statically establish backup connections between PE-1 and 

                                                                [Page 7] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

   PE-2. The method in establishing backup Ethernet connections is 
   beyond the scope of this draft. 
    
   In terms of QoS, we adapt the most common practice in Ethernet 
   networks, over-provisioning.  
    
   Finally, other than the PE nodes need to be IP-enabled to support ARP 
   and target LDP, the rest of the network can remain Ethernet-only. 
    
      
5. Protocol Extensions 
 
   The document specifies the protocol requirements and definitions for 
   setting up PBB-based tunnels from network edge. 
    
    
5.1. Generalized ID FEC 
    
   RFC4447 defines the mechanism for setting up point-to-point 
   Pseudowires between two PE nodes. During Pseudowire setup, the PE 
   nodes will exchange messages containing information about the PW type 
   and an endpoint identifier used in the selection of the packet 
   forwarder.  
    
   Endpoint identifier can be represented in two formats: PWid FEC (type 
   128) and Generalized ID (GID) FEC (type 129). The PWid FEC requires 
   to be configured on the local and remote PE prior to PW setup.  
    
   The GID FEC defines each PW as a combination of Source and 
   Destination Attachment Individual Identifiers (AII). Each AII is 
   globally unique. This arrangement enables GID to be used for 
   individual configuration, as well as provisioning models where the 
   local PE’s can learn (or discover) about the remote PE’s prior to 
   launching PW’s. For sizeable PBB-based tunnel deployment, the GID FEC 
   presents a more flexible and scalable solution. 
    
   We require GID to be used in setting up PBB-based tunnels. 
    
    
5.2. AII Type: PBB-based Tunnels 
    
   We define a new AII Type for PPB-based Tunnels. The encoding is shown 
   in Figure 3. 
    
    
       0                   1                   2                   3 
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |  AII Type=xx  |    Length     |            B-MAC              | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 

                                                                [Page 8] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

      |                           B-MAC (cont.)                       | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |      B-VID                    |            I-SID              | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |      I-SID (cont.)            | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
                        Figure 3: AII Type: PBB-based Tunnel 
    
    
      B-MAC: Backbone MAC address 
       
      B-VID: Backbone VLAN ID 
       
      I-SID: Service Instance ID 
    
    
   All above parameters have been defined in [PBB]. 
    
    
5.3. Pseudowire Status 
    
   We will use the defined Pseudowire Status [PWE3-IANA] for PBB-based 
   tunnels. 
    
    
5.4. OAM 
    
   We believe that VCCV needs to specific the OAM types. Other than LSP-
   ping and BFD, VCCV may need to expand to advertise 802.1ag and 
   802.3.ah as capabilities [VCCV]. 
    
      
      
6. Applications 
   
 
6.1.  Interconnection PBB Domains with PW MHOP 
    
   (TBD) 
    
    
6.2. Carrying multi-service traffic over PBB-based tunnels 
    
   (TBD) 
    
    
6.3. Interworking with PBT 
    
   (TBD) 
                                                                [Page 9] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

    
 
7. Intellectual Property Statement 
 
   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 
    
   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at ietf- 
   ipr@ietf.org. 
    
 
8. Full Copyright Statement 
 
   Copyright (C) The IETF Trust (2007). 
    
   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 
    
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND 
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS 
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF 
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
    
 
9. IANA Considerations 
 
   This document has defined an AII type for PBB-based tunnels. 
    
 
10.  Normative References 
    
                                                               [Page 10] 
 
Internet Draft    draft-pan-pwe3-pbb-tunnels-00.txt         June 2007 

   [PBB] IEEE 802.1ah, " Virtual Bridged Local Area Networks — Amendment  
    6: Provider Backbone Bridges" 
    
   [PBT] IEEE 802.1Qay, “Provider Backbone Bridge Traffic Engineering” 
    
   [PWE3-LDP] L. Martini, et al., “Pseudowire Setup and Maintenance 
   Using the Label Distribution Protocol (LDP)", RFC4447, April 2006 
    
   [PWE3-IANA] L. Martini, “IANA Allocations for Pseudowire Edge to Edge 
   Emulation (PWE3)”, RFC4446, April 2006 
    
 
11.  Informative References 
 
   [Q-in-Q]  IEEE 802.1ad, "Virtual Bridged Local Area Networks: 
   Provider Bridges" 
    
   [RFC3985]  Bryant, et al., "PWE3 Architecture", RFC3985, March 2005. 
    
   [VCCV] T. Nadeau, et al., “Pseudo Wire Virtual Circuit Connectivity 
   Verification (VCCV)”, March 2007. 
    
   [PW Switching] L. Martini, et al., “Pseudo Wire Switching”, February 
   2007. 
    
   [MHOP] L. Martini, et al., “Dynamic Placement of Multi Segment Pseudo 
   Wires”, October 2006. 
 
   
12.  Author Information 
  
   Ping Pan  
   Hammerhead Systems  
   ppan@hammerheadsystems.com 
    
   Shane Amante 
   Level 3 Communications 
   Shane.Amante@Level3.com 
    
   Nasser El-Aawar 
   Level 3 Communications 
   Nasser.El-Aawar@Level3.com 
 
    
 
 





                                                               [Page 11] 
 


PAFTECH AB 2003-20262026-04-24 01:04:52