Documente Academic
Documente Profesional
Documente Cultură
a short introduction
Yaakov (J) Stein July 2010
Chief Scientist
RAD Data Communications
Contents
p
pseudowires
PW encapsulations
TDM PWs
Ethernet PWs
L2VPNs
OAM for PWs
PWE control protocol
emulated link
C C C
C CE
CE
AC C
C AC
ATM (port mode, cell mode, AAL5-specific modes) RFC 4717, 4816
Frame Relay RFC 4619
HDLC/PPP
C/ RFC
C 4618
6 8
TDM (E1, T1, E3, T3) RFC 4553, 5086, 5087
SONET/SDH (CEP) RFC 4842
Fiber channel
Multiprotocol packet service
Ethernet (raw, VLAN-aware) RFC 4448
CE CE
scaling problem:
requires large number of LSPs
P-routers need to be aware of customer networks
CE CE
ACs transport tunnel ACs
CE PE PE CE
CE CE
PWs are bidirectional
PSN / multiplexing
tunnel PW CW
P l d
Payload
label(s) label
Ethernet FCS
Y(J)S PWE short Slide 14
IP PSN using L2
L2TPv
TPv3
3
L2TPv3 – RFC 3931 ((without UDP))
IP header (5*4 B)
IP p
protocol 115
session ID (4 B)
optional
i l cookie
ki (4 or 8 B)
control word (4 B)
IP header (5*44 B)
(5
P header ((8B)
return PW label (2 B)
PW label (2 B)
UDP
control word (4 B)
IP header (5*44 B)
(5
P header ((8B)
PW label (2 B)
well known port (085E) (2 B)
UDP
control word (4 B)
IP hheader
d (5*4 B)
IP protocol 47(GRE) or 137(MPLS)
PW label (4 B)
control word (4 B)
PSN
L R M(2b)
( )
TDM frame TDM frame TDM frame TDM frame TDM frame
1 1 1 2 2 2 3 3 3 4 4 4 5 5 5
TDMoIP
TDMoIP PSN
GW GW DATA
DATA
The arrival
time is not
constant!!!
Jitter Buffer
Y(J)S PWE short Slide 31
Adaptive Clock Recovery
The packets are injected into network ingress at times Tn
For TDM the source packet rate R is constant
Tn = n / R
The network delay Dn can be considered to be the sum of
typical delay d and random delay variation Vn
The packets are received at network egress at times tn
tn = Tn + Dn = Tn + d + Vn
By proper averaging/filtering
<tn > = Tn + d =n/R+ d
and the packet rate R has been recovered
TDMoIP
TDMoIP PSN
GW GW
IIn order
d tto maintain
i t i TDM ti
timing
i att egress
SOMETHING must be output
towards the TDM interface when a ppacket is lost
PSN
1 2 4
1 2 3 4 5 1 2 4 3 5
router router
3 5
LAN LAN
WAN
t e et
Ethernet t e et
Ethernet
WAN
not Ethernet
Y(J)S PWE short Slide 38
Tunneling Ethernet frames
Ethernet Ethernet
X
Ethernet inside X
ttunnell PW t l
control
Ethernet Frame
label label word
optional
p control word
generation and processing of sequence number is optional
AC PE AC
CE PE CE
provider
network
AC
CE PE
PE AC CE
V B CE
CE B V
V B CE
VPLS bridging
b id i module d l mustt perform:
f
MAC learning
MAC aging
flooding of unknown MAC frames
replication (for unknown/multicast/broadcast frames)
CE
V B CE
CE
CE B V
CE
V B CE
CE
a packet from a CE:
may be sent back to a CE
may be sent to a PE via a PW
a packet from a PE:
is onlyy sent to a CE (split
( p horizon))
is sent to a particular CE based on 802.1D bridging
Y(J)S PWE short Slide 48
L2VPN vs. L3
L3VPN
PE CE
CE PE
?
PE CE
VC (old
( ld name ffor PW) CV (incorrect
(i t name for
f CC)
VCCV is set up by PWE control protocol, if used
VCCV can run in the ACH, but there are also other methods
VCCV enables p
pings,
g ,pperiodic CC,, loopback,
p ,…
VCCV has several CV types :
– ICMP (RFC 5085)
– LSP ping (RFC 5085)
– BFD (RFC 5885)
PWE control
t l protocol
t l (RFC 4447) used
d tto sett up / configure
fi PWs
PW
used only by PW end-points (PEs in standard model)
intermediate nodes (e.g. P routers) don’t participate or see
based on LDP
– targeted LDP is used to communicate with remote end-point
– 2 new FECs for PWs
– new TLVs added for PW-specific functionality
– associates two labels with PW
P P
PE PE
P P P
FEC 128
– both end-points of PW must be provisioned with a unique (32b) value
– each PW end-point independently initiates LSP set up
– LSPs bound together into a single PW
FEC 129
– used when autodiscovering PW end-points
– each end-point has attachment identifier (AI) …
Y(J)S PWE short Slide 55
Generalized ID
for each forwarder we have a PE-unique Attachment Identifier (AI)
<PE,, AI> must be globally
g y unique
q
frequently useful to group a set of forwarders into a attachment group
where PWs may only be set up among members of a group
then Attachment Identifier (AI) consists of
– Attachment Group Identifier (AGI) (which is basically a VPN-id)
– Attachment Individual Identifier (AII)
the LSPs making up the (two directions of the) PW are
< PE1, (AGI, AII1), PE2, (AGI, AII2) > and
< PE2, (AGI, AII2), PE1, (AGI, AII1) >