One document matched: draft-raggarwa-l2vpn-p2mp-pw-03.txt
Differences from draft-raggarwa-l2vpn-p2mp-pw-02.txt
Network Working Group R. Aggarwal
Internet Draft Juniper Networks
Category: Standards Track
Expiration Date: January 2011 Y. Kamite
NTT Communications
F. Jounay
France Telecom
July 12, 2010
BGP based Virtual Private Multicast Service Auto-Discovery and Signaling
draft-raggarwa-l2vpn-p2mp-pw-03.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Copyright and License Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
Raggarwa, Kamite & Jounay [Page 1]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Abstract
A Point-to-Multipoint (P2MP) Pseudowire (PW) is a mechanism that
emulates the essential attributes of a unidirectional P2MP
Telecommunications service such as P2MP ATM over a Packet Switched
Network (PSN). One of the applicabilities of a P2MP PW is to deliver
a Layer 2 multicast service, that carries multicast frames (encoded
using Layer 2 or IP mechanisms) from a multicast source to one or
more multicast receivers.
[RFC4664] describes a number of different ways in which sets of PWs
may be combined together into "Provider Provisioned Layer 2 VPNs" (L2
PPVPNs, or L2VPNs), resulting in a number of different kinds of
L2VPN. P2MP PWs enable a L2VPN to provide a Virtual Private Multicast
Service (VPMS), which may be in addition to the Virtual Private Wire
Service (VPWS) offered by the L2VPN. A VPMS is a L2VPN service that
provides point-to-multipoint connectivity traffic to customers.
VPMS framework and requirements are described in [VPLS-REQ]. One of
the VPMS requirements is auto-discovery. This document describes how
procedures outlined in [VPLS-MCAST] can be used for auto-discovery
(A-D) in VPMS using BGP. This document also describes BGP based
procedures for P2MP PW signaling for VPMS that may be used when BGP
is used for VPMS auto-discovery.
Raggarwa, Kamite & Jounay [Page 2]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
Table of Contents
1 Specification of requirements ......................... 3
2 Introduction .......................................... 3
3 Layer 2 Multicast VPN ................................. 5
4 Mapping Sender Attachment ACs to Receiver ACs ......... 6
5 VPMS Auto-Discovery ................................... 7
5.1 Redundancy ............................................ 8
6 VPMS P2MP PW Signaling ................................ 8
6.1 P2MP PW Encapsulation Type ............................ 9
7 Data Forwarding ....................................... 9
8 Inter-AS and Multi-Segment P2MP PWs ................... 10
9 Security Considerations ............................... 10
10 IANA Considerations ................................... 10
11 Acknowledgments ....................................... 11
12 References ............................................ 11
12.1 Normative References .................................. 11
12.2 Informative References ................................ 11
13 Author's Address ...................................... 12
1. Specification of requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Introduction
A Point-to-Multipoint (P2MP) Pseudowire (PW) is a mechanism that
emulates the essential attributes of a unidirectional P2MP
Telecommunications service such as P2MP ATM over a Packet Switched
Network (PSN). One of the applicabilities of a P2MP PW is to deliver
a Layer 2 multicast service, that carries multicast frames (encoded
using Layer 2 or IP mechanisms) from a multicast source to one or
more multicast receivers.
The required functions of P2MP PWs include encapsulating service-
Raggarwa, Kamite & Jounay [Page 3]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
specific PDUs arriving at an ingress Attachment Circuit (AC), and
carrying them across a tunnel to one or more egress ACs, managing
their timing and order, and any other operations required to emulate
the behavior and characteristics of the service as faithfully as
possible. Encapsulation details and procedures of P2MP PWs are
described in [P2MP-PW].
P2MP PWs extend the PWE3 architecture [RFC3985] to offer a P2MP
Telecommunications service. They follow the PWE3 architecture as
described in [RFC3985] with modifications as outlined in [P2MP-PW-
REQ] and [P2MP-PW-ENCAP].
One notable difference between point-to-point (P2P) PWs as outlined
in [RFC3985] and P2MP PWs is that the former emulate a bidirectional
service whereas the latter emulate a unidirectional service.
[RFC4664] describes a number of different ways in which sets of PWs
may be combined together into "Provider Provisioned Layer 2 VPNs" (L2
PPVPNs, or L2VPNs), resulting in a number of different kinds of
L2VPN. P2MP PWs enable a L2VPN to provide a Virtual Private Multicast
Service (VPMS), which may be in addition to the Virtual Private Wire
Service (VPWS) offered by the L2VPN. A VPMS is a L2VPN service that
provides point-to-multipoint connectivity traffic to customers.
VPMS framework and requirements are described in [VPLS-REQ]. One of
the VPMS requirements is auto-discovery.
This document describes how procedures outlined in [VPLS-MCAST] can
be used for auto-discovery (A-D) in VPMS using BGP. The BGP based A-D
procedures also allow meeting other VPMS requirements such as
redundancy.
This document also describes BGP based procedures for P2MP PW
signaling for VPMS that may be used when BGP is used for VPMS auto-
discovery.
The BGP based auto-discovery procedures that are specified in this
document are meant to allow VPMS edge devices to discover each other
even when the P2MP PW signaling protocol is a protocol other than BGP
such as LDP [LDP-P2MP-PW]. However this version of the document does
not provide all the details for that particular case.
Raggarwa, Kamite & Jounay [Page 4]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
3. Layer 2 Multicast VPN
A VPMS "customer" is a customer of a Service Provider seeking to
provide P2MP connectivity between its various "sites" (each an
independent network) at Layer 2 through the Service Provider's
network, while maintaining privacy of communication and address
space. The device in a customer site that connects to a Service
Provider PE (provider edge) router is termed the CE (customer edge)
device; this device may be a router or a switch.
Each CE within a VPN is assigned a CE ID, a number that uniquely
identifies a CE within an L2 VPN. More accurately, the CE ID
identifies a physical connection from the CE device to the PE, since
a CE may be connected to multiple PEs (or have multiple connections
to a PE); in such a case, the CE would have a CE ID for each
connection. A CE may also be part of many L2 VPNs; it would need one
(or more) CE ID(s) for each L2 VPN of which it is a member. The
number space for CE IDs is scoped to a given VPN.
Within each physical connection from a CE to a PE, there may be
multiple ACs circuits.
A P2MP connection is rooted at a single CE, called the root CE (or
ingress CE) and has one or more other CEs, called the leaf CEs (or
egress CEs), as the leaves. The P2MP PW emulates the connectivity
between the root CE and leaf CEs over the PSN.
A L2VPN that offers VPMS is referred to as a L2 Multicast VPN (L2
MVPN) in this document. Such a L2VPN is defined by two sets of sites,
Sender Sites set and Receiver Sites set following the definition of
sender site and receiver site in [VPMS-REQ]. These sites have the
following properties:
- CEs within the Sender Sites set could originate traffic for CEs
in the Receiver Sites set. A PE MUST deliver traffic received
from a CE in the Sender Sites set to the CEs in the Receiver
Sites set using a P2MP PW.
- CEs not in the Receiver Sites set should not be able to receive
this traffic.
- CEs within the Receiver Sites set could receive traffic
originated by any CEs in the Sender Sites set.
- CEs within the Receiver Sites set should not be able to receive
traffic originated by any CE that is not in the Sender Sites set.
Raggarwa, Kamite & Jounay [Page 5]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
A site could be both in the Sender Sites set and Receiver Sites set,
which implies that CEs within such a site could both originate and
receive multicast traffic. An extreme case is when the Sender Sites
set is the same as the Receiver Sites set, in which case all sites
could originate and receive multicast traffic from each other.
Sites within a given L2 MVPN may be either within the same, or in
different organizations, which implies than an L2 MVPN can be either
an Intranet or an Extranet.
A given site may be in more than one L2 MVPN, which implies that L2
MVPNs may overlap.
Not all sites of a given L2 MVPN have to be connected to the same
service provider, which implies that an L2 MVPN can span multiple
service providers.
Another way to look at a L2 MVPN is to say that an L2 MVPN is defined
by a set of administrative policies. Such policies determine both
Sender Sites set and Receiver Site set. Such policies are established
by L2 MVPN customers, but implemented/realized by L2 MVPN Service
Providers using the existing mechanisms, such as Route Targets, with
extensions, as necessary.
There may be multiple sender sites in a given L2 MVPN. On each PE
that has a L2 MVPN instance, there may be multiple receiver sites in
that instance. One possible policy may be for each receiver site to
receive traffic from all the sender site. Another policy might be for
a given receiver site to receive traffic only from a given sender
site. To accomplish this there may be local algorithms on the PEs to
map a particular sender CE to a set of receiver CEs. It is not
necessary in this case to configure on each receiver CE which CE it
wishes to receive traffic from.
4. Mapping Sender Attachment ACs to Receiver ACs
A P2MP PW provides a mechanism for the root CE to send traffic to one
or more leaf CEs over a PSN. P2MP PW semantics are covered in [P2MP-
PW-REQ] and P2MP PW encapsulation is described in [P2MP-PW-ENCAP].
A root CE in a sender site sends VPMS traffic on one or more ACs to
the root PE. The root PE delivers this traffic over a P2MP PW to one
or more leaf PEs. Each leaf PE in turn delivers this traffic to one
or more leaf CEs in a receiver site. A particular leaf CE MUST
receive this traffic over a single AC.
A particular leaf CE may receive traffic from multiple sender CEs.
Raggarwa, Kamite & Jounay [Page 6]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
Traffic from different sender CEs is received by a leaf PE over
unique P2MP PWs. The leaf PE may use unique ACs or the same AC to
send traffic received over unique P2MP PW, to the same leaf CE. This
AC is determined by the leaf PE using local procedures which rely on
the policy in the L2 MVPN and may rely on the root CE identifier.
For instance an AC may be configured with the root CE identifier it
is expecting to receive traffic from. Or there may be an algorithmic
mapping between the root CE identifier and the leaf AC. Or the policy
might be to send all the traffic that is received by a receiver PE in
a L2 MVPN to all ACs that are in the receiver site set.
5. VPMS Auto-Discovery
As specified in [VPMS-REQ] a VPMS instance requires requires auto-
discovery procedures for the PEs in the Receiver Sites set to
discover the PEs (and CEs) in the Sender Sites Set. Depending on the
PSN Tunneling technology used the PEs in the Sender Sites set also
may require discovering the PEs in the Receiver Sites set.
Procedures outlined in [VPLS-MCAST] include the use of BGP for auto-
discovery and the concepts of Route Distinguishers (RD) to make VPN
advertisements unique, and Route Targets to control VPN topology.
[VPLS-MCAST] builds on the mechanisms outlined in [L2VPN-DISC] and
[RFC4761] to provide auto-discovery based on BGP. This document
reuses the procedures described in [VPLS-MCAST] for auto-discovery
with modifications described in this document.
The PE that advertises a locally attached VPMS CE MUST generate a BGP
NLRI that includes the RD and the local CE ID <RD, CE ID>. Note that
in [VPLS-MCAST] an equivalent advertisement carries the VE ID in the
NLRI. The BGP A-D route MUST carry the set of Route Targets being
exported by the VPMS instance.
The BGP based auto-discovery procedures that are specified in this
document are meant to allow VPMS edge devices to discover each other
even when the P2MP PW signaling protocol is a protocol other than BGP
such as LDP [LDP-P2MP-PW]. However this version of the document does
not provide all the details for that particular case. The details
will be provided once [LDP-P2MP-PW] procedures mature.
As described in the section "Layer 2 Multicast VPN" the information
about whether a CE belongs to a sender site or a receiver site is
determined from the Route Targets (RT) that are configured to enforce
the administrative policies of a L2 MVPN. These RTs are advertised in
the corresponding BGP A-D routes. For instance if some of the sites
in a VPMS are only in sender site set while others are only in
receiver sites set, then CEs that are in the receiver site set are
Raggarwa, Kamite & Jounay [Page 7]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
configured to import only sender site set RTs. While CEs that are in
the sender site set are configured to import only the receiver site
set RTs. In this case two RTs are required to provision the VPMS
instance.
5.1. Redundancy
[VPMS-REQ] describes requirements for redundancy that rely on multi-
homing a sender CE to multiple PEs. The goal is to allow redundancy
of the ingress PE. BGP based auto-discovery procedures allow each
ingress PE that is part of the multi-homed PE set for a given sender
CE to advertise a BGP NLRI for the CE. If the CE ID is configured to
the be the same on all the ingress PEs, BGP path selection procedures
ensure that only a given PE is chosen as the primary PE at a given
time. In other words egress PEs receive traffic only from a given PE
at a time for a multi-homed sender CE. It is a matter of local policy
as to whether a) the other ingress PEs transmit traffic on the P2MP
PW and the egress PEs drop this traffic or b) the other ingress PEs
drop traffic that they receive from the sender CE.
6. VPMS P2MP PW Signaling
Documents mentioned above [VPLS-MCAST], [L2VPN-DISC], [RFC4761],
share the idea that routers not directly connected to VPN customers
should carry no VPN state, restricting the provisioning of individual
connections to just the edge devices. This is achieved by using P2MP
PWs to carry the traffic using the encapsulation described in [P2MP-
PW-ENCAP]. A L2 MVPN requires signaling procedures for the root PE to
signal P2MP PWs to leaf PEs.
As described in [P2MP-PW-ENCAP], upstream assigned MPLS labels are
used as P2MP PW demultiplexors. This section describes how this
demultiplexor is signaled using BGP based mechanisms outlined in
[VPLS-MCAST]. Note that procedures in this section are not required
if another mechanism or procedures are used for P2MP PW signaling.
LDP based P2MP PW signaling [LDP-P2MP-PW] is one such mechanism.
Even if that is the case BGP based A-D procedures as specified in
this document MUST be used for VPMS auto-discovery.
Traffic belonging to different P2MP PWs, which may be in different
L2VPNs, may be carried over the same P2MP PSN tunnel. Thus there is a
need to identify at the leaf PE the P2MP PW the packet belongs to.
As described in [P2MP-PW-ENCAP] this is done by using an upstream
assigned MPLS label that determines the P2MP PW for which the packet
is intended. The ingress PE MUST use this label as the bottom-most
label while encapsulating a customer data packet.
Raggarwa, Kamite & Jounay [Page 8]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
The P2MP PW signaling problem is similar to the problem of
identifying traffic fordifferent VPLSs when Aggregate Trees are used
in [VPLS-MCAST]. In that case, the inner label must identify the
VPLS, while in the case of P2MP PWs, the inner label must identify
the P2MP PW. This document reuses the procedures of [VPLS-MCAST] to
signal this label and the binding of the P2MP PW to the PSN Tunnel.
For details on the procedures, please refer to [VPLS-MCAST].
The ingress PE MUST inform the egress PEs about the inner label as
part of the tree binding procedures described in section 12 of [VPLS-
MCAST] using the PMSI Tunnel Attribute. As described above the BGP
NLRI carries the root CE ID.
6.1. P2MP PW Encapsulation Type
The set of encapsulation types carried in the L2-info extended
community [RFC4761] has been expanded to include the following set.
The encapsulation type identifies the Layer 1 or Layer 2
encapsulation, e.g., ATM, Frame Relay etc.
Value Encapsulation
0 Reserved
1 Frame Relay
2 ATM AAL5 VCC transport
3 ATM transparent cell transport
4 Ethernet VLAN
5 Ethernet
6 Cisco-HDLC
7 PPP
8 CEM
9 ATM VCC cell transport
10 ATM VPC cell transport
7. Data Forwarding
Data forwarding follows the procedures specified in [P2MP-PW-ENCAP].
Raggarwa, Kamite & Jounay [Page 9]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
8. Inter-AS and Multi-Segment P2MP PWs
This document supports all of the inter-AS methodologies described in
[VPLS-MCAST] using the procedures of [VPLS-MCAST] when the signaling
procedures of this document are used along with the auto-discovery
procedures of this document.
A Multi-Segment P2MP PW is equivalent to a segmented inter-AS tree
that is described in [VPLS-MCAST], in the case of inter-AS option
(b). A segment of an inter-AS segmented tree is equivalent to a
segment of a Multi-Segment P2MP PW. A segmented inter-AS tree for a
particular VPLS instance is formed by dynamically stitching intra-AS
segments. The same procedures can be used to dynamically stitch
segments of a Multi-Segment P2MP PW. Inter-AS segmented tree
procedures of [VPLS-MCAST] MUST be used to build Multi-Segment P2MP
PWs, by replacing the VE ID with the root CE-ID in the NLRI.
9. Security Considerations
TBD
10. IANA Considerations
IANA is requested to maintain a registry for the encaps type field of
the Layer 2 Info Extended Community [RFC4761]. This document defines
the following encapsulation types in addition to those defined in
[RFC4761]. IANA is requested to add these values in the new registry:
Value Encapsulation
0 Reserved
1 Frame Relay
2 ATM AAL5 VCC transport
3 ATM transparent cell transport
4 Ethernet VLAN
5 Ethernet
6 Cisco-HDLC
7 PPP
8 CEM
9 ATM VCC cell transport
10 ATM VPC cell transport
Raggarwa, Kamite & Jounay [Page 10]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
11. Acknowledgments
Thanks to Yakov Rekhter and Kireeti Kompella for the discussions that
lead to this document.
12. References
12.1. Normative References
[VPLS-MCAST] R. Aggarwal et. al., "Multicast in VPLS", draft-ietf-
l2vpn-vpls-mcast-03.txt", November 2007
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[MPLS-UPSTREAM] R. Aggarwal, Y. Rekhter, E. Rosen, "MPLS Upstream
Label Assignment and Context Specific Label Space", draft-ietf-mpls-
upstream-label-00.txt
[P2MP-PW-ENCAP] R. Aggarwal., "Point-to-Multipoint PW Encapsulation",
draft-raggarwa-pwe3-p2mp-pw-00.txt, work in progress
12.2. Informative References
[VPMS-REQ] Y. Kamite, F. Jounay, "Framework and Requirements for
Virtual Private Multicast Service (VPMS)", draft-kamite-l2vpn-vpms-
frmwk-requirements-00.txt
[L2VPN-DISC] E. Rosen et. al., "Provisioning, Autodiscovery, and
Signaling in L2VPNs", draft-ietf-l2vpn-signaling-08.txt
[RFC3985] S. Bryant et. al., "Pseudowire Emulation Edge-to-Edge
(PWE3) Architecture", RFC 3985, March 2005.
[RFC4664] L. Andersson etl. al,, "Framework for Layer 2 Virtual
Private Networks (L2VPNs)", RFC 4664, September 2006.
[RFC4761] Kompella, K. and Y. Rekhter, "Virtual Private LAN Service
(VPLS) Using BGP for Auto-Discovery and Signaling", RFC 4761, January
2007.
[RFC4875] R. Aggarwal et. al, "Extensions to RSVP-TE for Point to
Multipoint TE LSPs", RFC4875
[LDP-P2MP-PW] F. Jounay et. al, "LDP Extensions for Source-initiated
Point-to-Multipoint Pseudowire", draft-jounay-niger-pwe3-source-
Raggarwa, Kamite & Jounay [Page 11]
Internet Draft draft-raggarwa-l2vpn-p2mp-pw-03.txt July 2010
initiated-p2mp-pw-03.txt
13. Author's Address
Rahul Aggarwal
Juniper Networks
1194 North Mathilda Ave.
Sunnyvale, CA 94089
Email: rahul@juniper.net
Yuji Kamite
NTT Communications Corporation
Tokyo Opera City Tower
3-20-2 Nishi Shinjuku, Shinjuku-ku,
Tokyo 163-1421,
Japan
Email: y.kamite@ntt.com
Frederic Jounay
France Telecom
2, avenue Pierre-Marzin
22307 Lannion Cedex
FRANCE
Email: frederic.jounay@orange-ftgroup.com
Raggarwa, Kamite & Jounay [Page 12]
| PAFTECH AB 2003-2026 | 2026-04-22 09:46:23 |