SlideShare ist ein Scribd-Unternehmen logo
1 von 40
VPLS Fundamentals
By : Reza Farahani
What Is Tunneling and VPN ?
• Tunneling means Re-Encapsulation
• Hide Header over other Header
• VPN is based on the idea of tunneling
Classification of VPNs
Layer 2 VPNs
VPLS vs VPWS
Layer 2 Encapsulation
According to Layer 2 technology, there are some different encapsulations types:
 Null  Null Encapsulation means that this interface can be used for “Single Service” for “Single
Customer
 Dot1qDot1q Encapsulation means that this interface can be used for “Multiple Services”for “Multiple
Customers”
 Q-in-QQ-in-QEncapsulation means that this interface can be used to expand VLAN space by tagging tagged packets
Layer 2 Encapsulation
802.1Q summary :
 IEEE 802.1Q, often referred to as Dot1q, is the networking standard that
supports virtual LANs (VLANs) on an IEEE 802.3 Ethernet network
Layer 2 Encapsulation
Q-in-Q summary :
 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet
providers as a layer 2 VPN for customers
 the provider will put a 802.1Q tag on all the frames that it receives from a
customer with a unique VLAN tag
 By using a different VLAN tag for each customer we can separate the traffic
from different customers and also transparently transfer it throughout the
service provider network.
 It can hide one tag in 802.1q encapsulation
VPLS Concept
 VPLS is a Multipoint-to-Multipoint Layer 2 VPN Service that connects multiple branches of a Customer, in a
single logical switched architecture over Service Provider IP/MPLS network
VPLS Concept
End-to-end architecture that allows MPLS networks to provide
Multipoint Ethernet services
It is “Virtual” because multiple instances of this service share the
same physical infrastructure
It is “Private” because each instance of the service is independent
and isolated from one another
It is “LAN Service” because it emulates Layer 2 multipoint
connectivity between subscribers
Customer Perspective from VPLS :
 Layer 2 VPN infrastructure seems to the customer as their branches are connected to a single company
switch.
VPLS Concept
 Different customer branches communicate with their own branches over Service Provider IP/MPLS network.
And there is no conflict. This is the key point of VPLS architecture.
VPLS Concept
VPLS Component
Attachment Circuit
Packet switch Network (PSN) Tunnels
Pseudo wire (PW)
Auto-discovery
Auto-Configuration
Virtual Forwarding Instance(VFI) or VSI
VPLS Component
Attachment Circuit
• Port mode
• 802.1Q VLAN or Trunk
• Dot1Q Tunnel Mode
Pseudo Wires in VPLS
A Pseudo Wire (PW) is a connection between two provider edge devices
connecting two attachment circuits (ACs)
 A PWES is either: - an Ethernet link or a VLAN link between two ports, or - an
ATM VC or VP, or - a Frame Relay VC, or - a TDM circuit, or - an MPLS LSP
 PSN tunnel may be MPLS, L2TP, GRE and so on
 A VPLS is based on a full mesh of Pseudo Wires
Pseudo Wires in VPLS
VPLS LABELLING
VPLS is also a MPLS Service, so we need to use labels in VPLS too.
There are two MPLS labels used in VPLS. These labels are:
 Outer Label (Transport Label) determine MPLS VPN Services
Inner Label (Service Label / VC Label)carries the original customer VPLS information
VPLS Label Signaling
 Outer Label (Transport Label) signaling is done via LDP, RSVP or GRE
 Inner Label (Service Label / VC Label) signaling is done via T-LDP (Targeted LDP)
What is T-LDP and difference by LDP ?
TLDP
LDP is used to build and maintain LSP databases that are used to forward traffic through
MPLS networks.
LDP can be used to distribute the inner label (VC/VPN/service label) and outer label (path
label) in MPLS
 For inner label distribution, targeted LDP (TLDP) is used
Same as LDP discovery by 646 UDP and Session by 646 TCP
 Unlike LDP, TLDP unicasts the hello packets to the targeted neighbor's address
VC ID (PW ID)
 For VPLS service between different nodes, there is an ID that must much for the same
service. This is VC ID (Virtual Circuit Identifier)
 it isn’t VC TAG
VSI or VFI
 In PE routers some switching facilities are needed
 o do this a Virtual Switch instance (VSI) is defined in PE routers. And all the switching
facilities needed like MAC learning is done with this VSI
VC ID (PW ID) The bridge module in a virtual switch has
the equivalent role of that in a physical
Ethernet switch
 Besides the bridge module maintaining
forwarding table that maps MAC addresses
to attachment circuits, it can run spanning-
tree protocols on them
 A VFI has similar functionality to a bridge
but performs bridging operations on
pseudo wires instead of attachment
circuits.
 The forwarding table is populated through
the MAC address learning process based
on packets it receives on pseudo wires. It
never learns the MAC addresses of the
packets it receives on attachment circuits.
VPLS Component
again
VPLS Flooding
VPLS MAC Learning
 It’s important because VPLS is Layer 2 technology:
 Same as Ethernet switch
1- first flood through all the LSPs
2- other learn senders mac and record in CAM table
2- if they send packet to sender node direct forward
 Forwarding
 Mac Table
 Forwarding Table
 Flooding
VPLS MAC Learning
1
2
VPLS Topology – PE View
 Each PE has a P2MP view of all other PEs it sees it self as a root bridge with split horizon loop protection
VPLS Topology – CE View
MPLS VPLS CoreMPLS
CEs
CE routers/switches see a logical Bridge/LAN
VPLS Deployment
Full mesh
Hub and spoke
Partial mesh
Hierarchical
Full Mesh VPLS
 In VPLS, architecture, all the nodes are connected via pseudo wires as fully mesh
 Each VPLS has a specific VC-ID or Pseudo wire ID and this differentiate the VPLS from the other VPLS
 For each VPLS n * (n-1) / 2 pseudo wire is required for full mesh connection.
 The loop-free forwarding is guaranteed by enabling Layer 2 split horizon on every pseudowire in this
topology
 Scalability issue a number of PE routers grows
Full Mesh VPLS
Hub and Spoke VPLS
• In a hub-and-spoke model, exactly one PE router that is acting as a hub connects all other PE
routers that act as spokes in a given VPLS domain
• A hub-and-spoke topology by definition is loop-free, so it does not need to enable spanning-tree
protocols or split horizon on pseudo wires
• The simplicity of a hub-and-spoke model makes it an attractive choice for small VPLS
deployment
• Delay !!
Hierarchical VPLS
Best for larger scale deployment
Reduction in packet replication and signaling overhead
Consists of two levels in a Hub and Spoke topology
• Hub consists of full mesh VPLS Pseudo Wires in MPLS core
• Spokes consist of L2/L3 tunnels connecting to VPLS (Hub) PEs
1. Hierarchical VPLS with MPLS access network
2. Hierarchical VPLS with QinQ access network
Hierarchical VPLS with QinQ access network
Hierarchical VPLS with MPLS access network
Why H-VPLS?
Potential signaling overhead
Full PW mesh from the Edge
Packet replication done at the Edge
Node Discovery and Provisioning extends
end to end
Minimizes signaling overhead
Full PW mesh among Core devices
Packet replication done the Core
Partitions Node Discovery process
Ethernet Edge H-VPLS (EE-H-VPLS)
PE dived to NPE and UPE
Ethernet Edge H-VPLS (EE-H-VPLS)
Local edge traffic does not have to traverse N-PE
MTU-s can switch traffic locally
saves bandwidth capacity on circuits to N-PE
Direct Attach H-VPLS – QinQ tunnel H-VPLS - MPLS PW
Pros Simple access via
Ethernet
Simple access via Ethernet
Hierarchical support via QinQ at
access
Scalable customer VLANs (4K x 4K)
4K customers supported per
Ethernet Access Domain
Fast L3 IGP convergence
MPLS TE FRR <50msec
Hierarchical support via MPLS
PW at access
Cons No hierarchical scalability
Customer VLAN cannot
over lap
4K customer VLAN limit
in Ethernet access
domain
High STP reconvergence
time
High STP re-convergence time
MAC is not scalable as customer
MAC still seen on SP network
Supported on SIP-600 only as of
12.2(33)SRA
More complicated provisioning
Requires MPLS to u-PE
OSM/SIP-400/600 as U-PE facing
card on N-PE (for 7600)
VPLS Logical Topology Comparison

Weitere ähnliche Inhalte

Was ist angesagt?

BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
Febrian ‎
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 

Was ist angesagt? (20)

Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 
VXLAN
VXLANVXLAN
VXLAN
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
VLAN
VLANVLAN
VLAN
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Vlan
Vlan Vlan
Vlan
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)routing basics - (static-default-dynamic)
routing basics - (static-default-dynamic)
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 

Ähnlich wie VPLS Fundamental

Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAuto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Allan Kweli
 

Ähnlich wie VPLS Fundamental (20)

VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Vpn1
Vpn1Vpn1
Vpn1
 
Vpn1
Vpn1Vpn1
Vpn1
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
Day one-poster-vpns
Day one-poster-vpnsDay one-poster-vpns
Day one-poster-vpns
 
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAuto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Vlan
VlanVlan
Vlan
 
Protocol implementation on NS2
Protocol implementation on NS2Protocol implementation on NS2
Protocol implementation on NS2
 
Branching out with SDN
Branching out with SDNBranching out with SDN
Branching out with SDN
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
QOS of MPLS
QOS of MPLSQOS of MPLS
QOS of MPLS
 
J010136172
J010136172J010136172
J010136172
 
Mpls
MplsMpls
Mpls
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPN
 
L2tp1
L2tp1L2tp1
L2tp1
 

Mehr von Reza Farahani

CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...
CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...
CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...
Reza Farahani
 

Mehr von Reza Farahani (15)

USuurey_Presentation__CollaborativeHASSystems.pdf
USuurey_Presentation__CollaborativeHASSystems.pdfUSuurey_Presentation__CollaborativeHASSystems.pdf
USuurey_Presentation__CollaborativeHASSystems.pdf
 
IEEE_ICC'23_SARENA.pdf
IEEE_ICC'23_SARENA.pdfIEEE_ICC'23_SARENA.pdf
IEEE_ICC'23_SARENA.pdf
 
RAW23-Reza.pdf
RAW23-Reza.pdfRAW23-Reza.pdf
RAW23-Reza.pdf
 
MHV_22__RICHTER_POSTER.pdf
MHV_22__RICHTER_POSTER.pdfMHV_22__RICHTER_POSTER.pdf
MHV_22__RICHTER_POSTER.pdf
 
MMSys2022-TowardsLLL-Poster.pdf
MMSys2022-TowardsLLL-Poster.pdfMMSys2022-TowardsLLL-Poster.pdf
MMSys2022-TowardsLLL-Poster.pdf
 
MMSys'21 DS- RezaFarahani.pdf
MMSys'21 DS- RezaFarahani.pdfMMSys'21 DS- RezaFarahani.pdf
MMSys'21 DS- RezaFarahani.pdf
 
IEEEGlobecom'22-OL-RICHTER.pdf
IEEEGlobecom'22-OL-RICHTER.pdfIEEEGlobecom'22-OL-RICHTER.pdf
IEEEGlobecom'22-OL-RICHTER.pdf
 
IEEE ICC'22_ LEADER_ A Collaborative Edge- and SDN-Assisted Framework for HTT...
IEEE ICC'22_ LEADER_ A Collaborative Edge- and SDN-Assisted Framework for HTT...IEEE ICC'22_ LEADER_ A Collaborative Edge- and SDN-Assisted Framework for HTT...
IEEE ICC'22_ LEADER_ A Collaborative Edge- and SDN-Assisted Framework for HTT...
 
CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...
CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...
CSDN_ CDN-Aware QoE Optimization inSDN-Assisted HTTP Adaptive Video Streaming...
 
ACM NOSSDAV'21-ES-HAS_ An Edge- and SDN-Assisted Framework for HTTP Adaptive ...
ACM NOSSDAV'21-ES-HAS_ An Edge- and SDN-Assisted Framework for HTTP Adaptive ...ACM NOSSDAV'21-ES-HAS_ An Edge- and SDN-Assisted Framework for HTTP Adaptive ...
ACM NOSSDAV'21-ES-HAS_ An Edge- and SDN-Assisted Framework for HTTP Adaptive ...
 
Basic Security in Routing and Switching
Basic Security in Routing and SwitchingBasic Security in Routing and Switching
Basic Security in Routing and Switching
 
Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)
 
Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS)
 
OSPF Fundamental
OSPF FundamentalOSPF Fundamental
OSPF Fundamental
 
BGP
BGP BGP
BGP
 

Kürzlich hochgeladen

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

VPLS Fundamental

  • 1. VPLS Fundamentals By : Reza Farahani
  • 2. What Is Tunneling and VPN ? • Tunneling means Re-Encapsulation • Hide Header over other Header • VPN is based on the idea of tunneling
  • 6. Layer 2 Encapsulation According to Layer 2 technology, there are some different encapsulations types:  Null  Null Encapsulation means that this interface can be used for “Single Service” for “Single Customer  Dot1qDot1q Encapsulation means that this interface can be used for “Multiple Services”for “Multiple Customers”  Q-in-QQ-in-QEncapsulation means that this interface can be used to expand VLAN space by tagging tagged packets
  • 7. Layer 2 Encapsulation 802.1Q summary :  IEEE 802.1Q, often referred to as Dot1q, is the networking standard that supports virtual LANs (VLANs) on an IEEE 802.3 Ethernet network
  • 8. Layer 2 Encapsulation Q-in-Q summary :  802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers  the provider will put a 802.1Q tag on all the frames that it receives from a customer with a unique VLAN tag  By using a different VLAN tag for each customer we can separate the traffic from different customers and also transparently transfer it throughout the service provider network.  It can hide one tag in 802.1q encapsulation
  • 9. VPLS Concept  VPLS is a Multipoint-to-Multipoint Layer 2 VPN Service that connects multiple branches of a Customer, in a single logical switched architecture over Service Provider IP/MPLS network
  • 10. VPLS Concept End-to-end architecture that allows MPLS networks to provide Multipoint Ethernet services It is “Virtual” because multiple instances of this service share the same physical infrastructure It is “Private” because each instance of the service is independent and isolated from one another It is “LAN Service” because it emulates Layer 2 multipoint connectivity between subscribers
  • 11. Customer Perspective from VPLS :  Layer 2 VPN infrastructure seems to the customer as their branches are connected to a single company switch. VPLS Concept
  • 12.  Different customer branches communicate with their own branches over Service Provider IP/MPLS network. And there is no conflict. This is the key point of VPLS architecture. VPLS Concept
  • 13. VPLS Component Attachment Circuit Packet switch Network (PSN) Tunnels Pseudo wire (PW) Auto-discovery Auto-Configuration Virtual Forwarding Instance(VFI) or VSI
  • 15. Attachment Circuit • Port mode • 802.1Q VLAN or Trunk • Dot1Q Tunnel Mode
  • 16. Pseudo Wires in VPLS A Pseudo Wire (PW) is a connection between two provider edge devices connecting two attachment circuits (ACs)  A PWES is either: - an Ethernet link or a VLAN link between two ports, or - an ATM VC or VP, or - a Frame Relay VC, or - a TDM circuit, or - an MPLS LSP  PSN tunnel may be MPLS, L2TP, GRE and so on  A VPLS is based on a full mesh of Pseudo Wires
  • 18. VPLS LABELLING VPLS is also a MPLS Service, so we need to use labels in VPLS too. There are two MPLS labels used in VPLS. These labels are:  Outer Label (Transport Label) determine MPLS VPN Services Inner Label (Service Label / VC Label)carries the original customer VPLS information
  • 19. VPLS Label Signaling  Outer Label (Transport Label) signaling is done via LDP, RSVP or GRE  Inner Label (Service Label / VC Label) signaling is done via T-LDP (Targeted LDP) What is T-LDP and difference by LDP ?
  • 20. TLDP LDP is used to build and maintain LSP databases that are used to forward traffic through MPLS networks. LDP can be used to distribute the inner label (VC/VPN/service label) and outer label (path label) in MPLS  For inner label distribution, targeted LDP (TLDP) is used Same as LDP discovery by 646 UDP and Session by 646 TCP  Unlike LDP, TLDP unicasts the hello packets to the targeted neighbor's address
  • 21. VC ID (PW ID)  For VPLS service between different nodes, there is an ID that must much for the same service. This is VC ID (Virtual Circuit Identifier)  it isn’t VC TAG
  • 22. VSI or VFI  In PE routers some switching facilities are needed  o do this a Virtual Switch instance (VSI) is defined in PE routers. And all the switching facilities needed like MAC learning is done with this VSI
  • 23. VC ID (PW ID) The bridge module in a virtual switch has the equivalent role of that in a physical Ethernet switch  Besides the bridge module maintaining forwarding table that maps MAC addresses to attachment circuits, it can run spanning- tree protocols on them  A VFI has similar functionality to a bridge but performs bridging operations on pseudo wires instead of attachment circuits.  The forwarding table is populated through the MAC address learning process based on packets it receives on pseudo wires. It never learns the MAC addresses of the packets it receives on attachment circuits.
  • 26. VPLS MAC Learning  It’s important because VPLS is Layer 2 technology:  Same as Ethernet switch 1- first flood through all the LSPs 2- other learn senders mac and record in CAM table 2- if they send packet to sender node direct forward  Forwarding  Mac Table  Forwarding Table  Flooding
  • 28. VPLS Topology – PE View  Each PE has a P2MP view of all other PEs it sees it self as a root bridge with split horizon loop protection
  • 29. VPLS Topology – CE View MPLS VPLS CoreMPLS CEs CE routers/switches see a logical Bridge/LAN
  • 30. VPLS Deployment Full mesh Hub and spoke Partial mesh Hierarchical
  • 31. Full Mesh VPLS  In VPLS, architecture, all the nodes are connected via pseudo wires as fully mesh  Each VPLS has a specific VC-ID or Pseudo wire ID and this differentiate the VPLS from the other VPLS  For each VPLS n * (n-1) / 2 pseudo wire is required for full mesh connection.  The loop-free forwarding is guaranteed by enabling Layer 2 split horizon on every pseudowire in this topology  Scalability issue a number of PE routers grows
  • 33. Hub and Spoke VPLS • In a hub-and-spoke model, exactly one PE router that is acting as a hub connects all other PE routers that act as spokes in a given VPLS domain • A hub-and-spoke topology by definition is loop-free, so it does not need to enable spanning-tree protocols or split horizon on pseudo wires • The simplicity of a hub-and-spoke model makes it an attractive choice for small VPLS deployment • Delay !!
  • 34. Hierarchical VPLS Best for larger scale deployment Reduction in packet replication and signaling overhead Consists of two levels in a Hub and Spoke topology • Hub consists of full mesh VPLS Pseudo Wires in MPLS core • Spokes consist of L2/L3 tunnels connecting to VPLS (Hub) PEs 1. Hierarchical VPLS with MPLS access network 2. Hierarchical VPLS with QinQ access network
  • 35. Hierarchical VPLS with QinQ access network
  • 36. Hierarchical VPLS with MPLS access network
  • 37. Why H-VPLS? Potential signaling overhead Full PW mesh from the Edge Packet replication done at the Edge Node Discovery and Provisioning extends end to end Minimizes signaling overhead Full PW mesh among Core devices Packet replication done the Core Partitions Node Discovery process
  • 38. Ethernet Edge H-VPLS (EE-H-VPLS) PE dived to NPE and UPE
  • 39. Ethernet Edge H-VPLS (EE-H-VPLS) Local edge traffic does not have to traverse N-PE MTU-s can switch traffic locally saves bandwidth capacity on circuits to N-PE
  • 40. Direct Attach H-VPLS – QinQ tunnel H-VPLS - MPLS PW Pros Simple access via Ethernet Simple access via Ethernet Hierarchical support via QinQ at access Scalable customer VLANs (4K x 4K) 4K customers supported per Ethernet Access Domain Fast L3 IGP convergence MPLS TE FRR <50msec Hierarchical support via MPLS PW at access Cons No hierarchical scalability Customer VLAN cannot over lap 4K customer VLAN limit in Ethernet access domain High STP reconvergence time High STP re-convergence time MAC is not scalable as customer MAC still seen on SP network Supported on SIP-600 only as of 12.2(33)SRA More complicated provisioning Requires MPLS to u-PE OSM/SIP-400/600 as U-PE facing card on N-PE (for 7600) VPLS Logical Topology Comparison

Hinweis der Redaktion

  1. An IPLS is very similar to a VPLS except The CE devices must be hosts or routers not switches The service will only carry IPv4 or IPv6 packets IP Control packets are also supported – ARP, ICMP Layer 2 packets that do not contain IP are not supported IPLS is a functional subset of the VPLS service MAC address learning and aging not required Simpler mechanism to match MAC to CE can be used Bridging operations removed from the PE Simplifies hardware capabilities and operation Defined in draft-ietf-l2vpn-ipls
  2. شکل مثال کشیده شود با 3 تا سوییچ و 2 روتر