+ All Categories
Home > Documents > Designing and Implementing IP/MPLS-Based Ethernet...

Designing and Implementing IP/MPLS-Based Ethernet...

Date post: 30-Sep-2018
Category:
Upload: hoangquynh
View: 220 times
Download: 1 times
Share this document with a friend
30
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services An Advanced Guide for VPLS and VLL Zhuo (Frank) Xu Alcatel-Lucent SRA No.1
Transcript
Page 1: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Designing and Implementing IP/MPLS-Based EthernetLayer 2 VPN ServicesAn Advanced Guide for VPLS and VLL

Zhuo (Frank) Xu

Alcatel-Lucent SRA No.1

Designing and Im

plementing IP/M

PLS-Based Ethernet Layer 2 VPN

ServicesA

n Advanced G

uide for VPLS and V

LL

Zhuo (Frank) Xu

This guide is a must read for any network engineer interested in IP/MPLS technologies and Carrier Ethernet Layer 2 VPN services. Discover what it takes to optimize an IP/MPLS-based VPN network’s reliability, performance, and fl exibility. Learn about the core components of an IP/MPLS VPN Service Architecture, and enhance your network with new service-carrying IP/MPLS technologies such as RSVP-TE, Fast Reroute, and secondary LSP. Get a thorough knowledge of the two core Ethernet Layer 2 VPN services: Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL). Explore advanced topics such as Service Resiliency, BGP Auto-discovery, Provider Backbone Bridging, and OAM for VPLS and learn how to implement them in your network.

“ An extremely valuable tool for anyone involved in the design, operation, and maintenance of MPLS-based networks. The reader will walk away with a clear and practical understanding of all aspects of the complexities associated with MPLS network operations. I highly recommend that this text be part of any MPLS network engineer’s library.”— Gary Horn, Director, Enterprise Architecture and Network Security,

Advocate Health Care

“ A thorough and solid publication that refl ects Alcatel-Lucent’s industry-leading and innovative approaches to Layer 2 Services. An invaluable asset for any network designer/architect.”— Ray Miller, Jr., Senior Network Engineer,

Sting Communications

Zhuo (Frank) Xu is a recognized MPLS/VPLS service routing expert. A seasoned telecom professional, he holds several industry IP certifi cations including the distinction of being the world’s fi rst Alcatel-Lucent Service Routing Architect.

Networking / Network Protocols

Visit our Web site at www.alcatel-lucent.com/srpublications

Page 2: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

56569ffirs.indd ii56569ffirs.indd ii 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 3: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

“This book will be of great benefi t to the entire Exponential-e engineering team.”—Chris Christou

Engineering Manager Exponential-e

“An extremely valuable tool for anyone involved in the design, operation, and maintenance of MPLS-based networks. The reader will walk away with a clear and practical understanding of all aspects of the complexities associated with MPLS network operations. I highly recommend that this text be part of any MPLS network engineer’s library.”

—Gary HornDirector, Enterprise Architecture and Network Security Advocate Health Care

“A thorough and solid publication that refl ects Alcatel-Lucent’s industry-leading and innovative approaches to Layer 2 Services. An invaluable asset for any network designer/architect.”

—Ray Miller, Jr. Senior Network Engineer Sting Communications

56569ffirs.indd i56569ffirs.indd i 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 4: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

56569ffirs.indd ii56569ffirs.indd ii 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 5: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN ServicesAn Advanced Guide for VPLS and VLL

Zhu o ( F ra n k ) Xu

A l c a te l - L u ce n t S R A No. 1

56569ffirs.indd iii56569ffirs.indd iii 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 6: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

Published byWiley Publishing, Inc.10475 Crosspoint BoulevardIndianapolis, IN 46256www.wiley.com

Copyright © 2010 Alcatel-Lucent

Published by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-0-470-45656-9

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifi cally disclaim all warranties, including without limitation warranties of fi tness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services please contact our Customer Care Department within the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Library of Congress Control Number: 2009937280

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affi liates, in the United States and other countries, and may not be used without written permission. Alcatel, Lucent, Alcatel-Lucent, and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. Wiley Publishing, Inc. is not associated with any product or vendor mentioned in this book.

56569ffirs.indd iv56569ffirs.indd iv 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 7: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

To my grandfather, GuangXiao Xu, and to my parents, Yin and WeiMin. You have given me so much love and set perfect

examples for me to be passionate, disciplined, and dedicated to my career and my life.

— Zhuo (Frank) Xu

56569ffirs.indd v56569ffirs.indd v 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 8: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

56569ffirs.indd vi56569ffirs.indd vi 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 9: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Zhuo (Frank) Xu is a seasoned telecom professional with 16 years experience working for Alcatel-Lucent and other telecommunication service providers. He is a recognized MPLS/VPLS service routing expert. Zhuo holds several industry IP certifi cations, including the distinction of being the world’s fi rst Alcatel-Lucent Service Routing Architect (SRA), and is accredited with a patent associated with the MPLS FRR protocol. Educated in Beijing at the Beijing Polytechnic University, P.R. China, Zhuo holds a Bachelor’s degree in Electronics Engineering.

About the Author

56569ffirs.indd vii56569ffirs.indd vii 10/20/09 10:04:28 AM10/20/09 10:04:28 AM

Page 10: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Executive EditorCarol Long

Project EditorSara Shlaer

Technical ReviewersMustapha Aissaoui Florin BalusFooter (Richard) FootePrashanth IshwarSivaramakrishna KuditipudiAnthony PeresJorge RabadanRay Qiu

Production EditorKathleen Wisor

Copy EditorCate Caffrey

Editorial DirectorRobyn B. Siesky

Editorial ManagerMary Beth Wakefield

Marketing ManagerDavid Mayhew

Production ManagerTim Tate

Vice President and Executive Group PublisherRichard Swadley

Vice President and Executive PublisherBarry Pruett

Associate PublisherJim Minatel

Project Coordinator, CoverLynsey Stanford

CompositorJeff Lytle, Happenstance Type-O-Rama

ProofreaderNancy Carrasco

IndexerRobert Swanson

Credits

56569ffirs.indd viii56569ffirs.indd viii 10/20/09 10:04:29 AM10/20/09 10:04:29 AM

Page 11: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Acknowledgments

First, I thank members of the Alcatel-Lucent senior management team — Basil Alwan, Ravi Parmasad, James Watts, and Barry Denroche — for helping to make this book happen. Your constant support made this book possible. It is an honor for me to work with such an excellent product and with such an outstanding team. Ravi: Special thanks for your encouragement and help as a leader and a friend.

Thanks to Mac Virdy, Jim Tam, and George Carroll for providing the resources that helped me deliver the content of this book. Your strong support and encour-agement made the job of writing this book much easier. Mac: You and the network design engineering team provided a friendly and helpful environment that helped to make this book’s development much easier. George: Thanks for your consistent attention and help since day one, when I started working on this book.

This publication is the result of the efforts of many individuals who all contrib-uted in different capacities to bringing this book to market.

I express my gratitude to Karyn Lennon for all of her efforts in securing the team who contributed to this book and in managing the many diverse activities needed to publish the book. Without your enthusiasm, passion, and hard work, there was no way I could have fi nished this book. You did an amazing job organizing the project and coordinating all the parties (editors, artists, technical reviewers, illustrators, publishing authorities, marketing departments, and our customers) who contributed to this book. Your effi ciency and patience made it possible for me to keep focused on content delivery. Karyn, it would have been impossible for me to stay focused on completing the content of the book without you taking care of everything else.

This book has benefi ted enormously from the technical reviewer team of Mustapha Aissaoui, Florin Balus, Footer (Richard) Foote, Prashanth Ishwar, Sivaramakrishna Kuditipudi, Anthony Peres, Jorge Rabadan, and Ray Qiu. Thank you all for the detailed input and technical discussions, and for spending signifi cant amounts of time contributing to the book. I appreciate all of your insight, the thor-oughness of your input, and for juggling this activity with everything else that you needed to do. Special thanks to Mustapha for the tens of hours of technical discus-sion sessions we had on the topics covered by the book. Thanks to Vach Kompella; it’s my pleasure to have you write the forward for this book. Also, I thank James Zhang and Chris Fang from the IPD support team for helping me with the research of many technical questions.

56569ffirs.indd ix56569ffirs.indd ix 10/20/09 10:04:29 AM10/20/09 10:04:29 AM

Page 12: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

To the editorial team — Mary Buchanan and Karen Sayer — thank you for helping to ensure that the accurate message and wording came through.

To the illustration team of Blair Buchanan, Alex Cedzynski, and Peter Wayne, thank you for transforming my images into sleek illustrations that will truly contrib-ute to the educational value of this publication. Peter: Thank you for your creativity in setting the illustration style and leading this team to complete all of these illus-trations in a short period of time.

I also thank the many Alcatel-Lucent customers that I have worked with over the years. It has always been my pleasure to work with you — you have all helped me understand how the technology is used in the industry. Our discussions and experiences led to the case studies and real-life network deployment scenarios of this publication. Special thanks to Gary Horn, Ray Miller, and Chris Christou — as industry experts and our customers, your input to this book was invaluable.

And to the Wiley team, led by Sara Shlaer, thanks for your guidance and patience with me during my fi rst publishing endeavor.

56569ffirs.indd x56569ffirs.indd x 10/20/09 10:04:29 AM10/20/09 10:04:29 AM

Page 13: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Contents at a Glance

Foreword xix

Introduction xxi

Part I IP/MPLS VPN Service Network Overview 1

Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3

Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19

Part II IP/MPLS VPN Protocol Fundamentals 37

Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39

Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91

Chapter 5 RSVP-TE Protocol 137

Chapter 6 MPLS Resiliency — Secondary LSP 209

Chapter 7 MPLS Resiliency — RSVP-TE LSP Fast Reroute 231

Chapter 8 Label Distribution Protocol 291

Part III Ethernet VPN Services 337

Chapter 9 IP/MPLS VPN Service Routing Architecture 339

Chapter 10 Virtual Leased Line Services 415

Chapter 11 Virtual Private LAN Service 463

Chapter 12 Hierarchical VPLS 509

Chapter 13 High Availability in an IP/MPLS VPN Network 543

Chapter 14 VLL Service Resiliency 597

Chapter 15 VPLS Service Resiliency 635

56569ffirs.indd xi56569ffirs.indd xi 10/20/09 10:04:29 AM10/20/09 10:04:29 AM

Page 14: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Part IV Advanced Ethernet VPN Topics 675

Chapter 16 VPLS BGP Auto-Discovery 677

Chapter 17 PBB-VPLS 707

Chapter 18 OAM in a VPLS Service Network 773

Appendix A Spanning Tree Protocol 839

Appendix B RFC and IEEE Standards 897

Glossary 901

Index 917

56569ffirs.indd xii56569ffirs.indd xii 10/20/09 10:04:29 AM10/20/09 10:04:29 AM

Page 15: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

ContentsForeword xixIntroduction xxi

Part 1 IP/MPLS VPN Service Network Overview 1

Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 31.1 The Increasing Demands on Service Provider Networks 4

1.2 MPLS Overview 6

1.3 The MPLS Value Proposition 8

1.4 MPLS Enables Converged Multi-Service Networks 11

1.5 MPLS-Enabled Business VPN Services 13

Summary 17

Chapter 2 IP/MPLS VPN Multi-Service Network Overview 192.1 IP/MPLS Layer 2 VPN Requirements 20

2.2 IP/MPLS Layer 2 VPN Services 21

2.3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26

2.4 IP/MPLS VPN-Enabled Applications 30

Summary 34

Part II IP/MPLS VPN Protocol Fundamentals 37

Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 393.1 Basic MPLS Concepts Review 40

3.2 Label Switch Path Types 51

3.3 LDP-LSP — LDP Label Distribution 54

3.4 RSVP-TE LSPs 64

3.5 Confi guring RSVP-TE LSP 81

Summary 90

Chapter 4 Routing Protocol Traffi c Engineering and CSPF 914.1 Introducing Traffi c Engineering 92

4.2 Introducing OSPF-TE 97

4.3 Introducing IS-IS TE 112

56569ftoc.indd xiii56569ftoc.indd xiii 10/20/09 10:04:41 AM10/20/09 10:04:41 AM

Page 16: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xiv CON T E N TS

4.4 The CSPF Algorithm 119

4.5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125

Summary 135

Chapter 5 RSVP-TE Protocol 1375.1 RSVP and RSVP-TE 138

5.2 RSVP-TE Signaling Procedure 141

5.3 RSVP-TE Messages and Objects 150

5.4 Make-Before-Break (MBB) 176

5.5 The RSVP-TE Hello Protocol 191

5.6 Reducing RSVP Refresh Overhead 196

5.7 RSVP MD5 Authentication 206

Summary 207

Chapter 6 MPLS Resiliency — Secondary LSP 2096.1 Ensuring Reliability with MPLS Resiliency 210

6.2 An Overview of Primary and Secondary LSPs 211

6.3 What Affects Convergence Performance? 217

6.4 Rules for Selecting Secondary LSPs 222

6.5 Case Study: Using Administrative Groups in Secondary LSPs 226

Summary 228

Chapter 7 MPLS Resiliency — RSVP-TE LSP Fast Reroute 2317.1 RSVP-TE LSP Resiliency 232

7.2 Fast Reroute Overview 235

7.3 Fast Reroute Architecture 244

7.4 One-to-One Backup 259

7.5 Facility Backup 267

7.6 Manual Bypass Tunnel 283

Summary 288

Chapter 8 Label Distribution Protocol 2918.1 LDP Overview 292

8.2 LDP Session Establishment and Management 292

8.3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299

56569ftoc.indd xiv56569ftoc.indd xiv 10/20/09 10:04:41 AM10/20/09 10:04:41 AM

Page 17: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xvCON T E N TS

8.4 LDP Messages and TLVs 304

8.5 LDP over RSVP-TE Tunneling 307

Summary 334

Part III Ethernet VPN Services 337

Chapter 9 IP/MPLS VPN Service Routing Architecture 3399.1 IP/MPLS VPN Service Network Infrastructure 340

9.2 Alcatel-Lucent Service Routing Architecture 347

9.3 Service Access Point and SAP Components 360

9.4 Service Distribution Paths and Transport Tunnels 365

9.5 Multiple Forwarding Paths in the Same SDP 378

9.6 Maximum Transmission Unit in a Service Network 391

9.7 IP/MPLS VPN Service Implementation Overview 412

Summary 414

Chapter 10 Virtual Leased Line Services 41510.1 VLL Services Overview 416

10.2 VLL Services Architecture 420

10.3 Pseudowire Switching for VLL Services 434

10.4 VLL Example: Epipe — Ethernet P2P VPN 445

10.5 VLL Connection Admission Control 453

Summary 461

Chapter 11 Virtual Private LAN Service 46311.1 VPLS Service Overview 464

11.2 VPLS Architecture 467

11.3 VPLS Mesh-Pseudowires 476

11.4 VPLS Service Access Points 487

11.5 VPLS Forwarding Database Management 504

Summary 506

Chapter 12 Hierarchical VPLS 50912.1 Hierarchical-VPLS Overview 510

12.2 Spoke-Pseudowire Details 517

56569ftoc.indd xv56569ftoc.indd xv 10/20/09 10:04:41 AM10/20/09 10:04:41 AM

Page 18: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xvi CON T E N TS

12.3 H-VPLS Topologies 527

12.4 H-VPLS Design Case Study — Where to Break the Mesh? 531

Summary 541

Chapter 13 High Availability in an IP/MPLS VPN Network 54313.1 Building a Network with High Availability 544

13.2 Bidirectional Forwarding Detection 548

13.3 Link Aggregation Group Overview 557

13.4 Multi Chassis Link Aggregation Group 566

13.5 Traffi c Load Balancing in Link Aggregation Groups 579

Summary 595

Chapter 14 VLL Service Resiliency 59714.1 VLL Service Resiliency Overview 598

14.2 VLL Service Resiliency Using Pseudowire Redundancy 603

14.3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615

Summary 634

Chapter 15 VPLS Service Resiliency 63515.1 Introduction to VPLS Service Resiliency 636

15.2 Access Resiliency 637

15.3 H-VPLS Backbone Resiliency 640

15.4 Using MAC-Flush to Avoid Blackholes 651

Summary 673

Part IV Advanced Ethernet VPN Topics 675

Chapter 16 VPLS BGP Auto-Discovery 67716.1 VPLS BGP-AD Overview 678

16.2 BGP Auto-Discovery for LDP-VPLS 678

16.3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692

16.4 Using Pre-Provisioned SDPs 698

16.5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699

Summary 704

56569ftoc.indd xvi56569ftoc.indd xvi 10/20/09 10:04:41 AM10/20/09 10:04:41 AM

Page 19: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xviiCON T E N TS

Chapter 17 PBB-VPLS 70717.1 Provider Backbone Bridge Overview 708

17.2 PBB-VPLS Architecture 716

17.3 PBB-VPLS Learning and Forwarding 733

17.4 Controlling Flooding in PBB-VPLS 741

17.5 FDB Management in I-VPLS and B-VPLS 755

17.6 OAM in a PBB-VPLS Network 758

17.7 Service Resiliency in PBB-VPLS Networks 760

17.8 MAC-Flush in PBB-VPLS 762

17.9 PBB Epipe 766

Summary 770

Chapter 18 OAM in a VPLS Service Network 77318.1 OAM Functional Overview 774

18.2 Ethernet in the First Mile (EFM) OAM (802.3ah) 776

18.3 Ethernet Connectivity Fault Management 787

18.4 OAM in an IP/MPLS VPN Service Network 804

18.5 OAM in VPLS Services 818

Summary 837

Appendix A Spanning Tree Protocol 839A.1 Spanning Tree Protocol 841

A.2 Spanning Tree Protocol Variations 855

A.3 VPLS Service Loop Prevention with STP 869

A.4 Altered STP Behavior in the VPLS Core 876

A.5 Using VPLS STP to Eliminate Customer Forwarding Loops 880

A.6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883

A.7 LDP MAC-Flush in STP Convergence 884

A.8 Management VPLS 885

Appendix B RFC and IEEE Standards 897

Glossary 901

Index 917

56569ftoc.indd xvii56569ftoc.indd xvii 10/20/09 10:04:41 AM10/20/09 10:04:41 AM

Page 20: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

56569flast.indd xviii56569flast.indd xviii 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 21: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Foreword

If we have learned one thing from the plethora of wireline connectivity technolo-gies, it is that they change constantly. Over the years, while Ethernet was taking over enterprise networks, Frame-Relay, ATM, and SONET/SDH ruled the service provider domain. Attempts were made to unify these technologies, but in the end, the result was independently operated networks, with some interoperability at the edges.

Consequently, the infrastructure of the service providers was expensive and lacked consistency, and a massive transformation was long overdue. IP/MPLS, the emerging technology of the 1990s, provided an abstraction that enabled service pro-viders to interconnect their disparate networks, while endowing that same network with a uniform set of characteristics that was independent of the underlying carrier technology: QoS awareness, traffi c-engineering, and fast recovery times in the face of outages. However, MPLS wasn’t multi-protocol enough, and needed a killer app to make it universally applicable.

Enter pseudowire technology: Virtual Leased Lines (VLL) and Virtual Private LAN Service (VPLS). Based on the MPLS architecture, pseudowires allowed a ser-vice provider to abstract out the idiosyncrasies of wired technologies. This allowed them to continue to support various connectivity technologies at the edge of their networks to customers while migrating to a modern architecture in the core. Customers with both IP and non-IP traffi c could now be connected across a multi-service, multi-protocol network.

MPLS absorbed the best of the Layer 2 capabilities of the network infrastructure, but the story didn’t stop there. While VLL addressed the problems of a transition to a modern networking architecture, VPLS typifi ed the best of the connectivity mod-els. Ethernet, as a Layer 2 technology, was just another technology like Frame-Relay or ATM. Ethernet, as a network model, delivered the ease-of-use that has made it the choice for enterprises.

VPLS is not simply an Ethernet emulation — it is a connectivity model that abstracts a LAN. It can be used as a VPN service, connecting multiple customer sites together, providing them the ease-of-use and consistent feel of a single Ethernet network. But it can just as well be used as an infrastructure technology, providing the service provider with a highly reliable LAN service spanning a larger geographic area than has been covered by customary Ethernet networks.

I hope that as you read this book, you will appreciate the opportunities IP/MPLS VPNs present to address the connectivity and architectural requirements of customers.

Vach KompellaDirector, MPLS DevelopmentAlcatel-Lucent

56569flast.indd xix56569flast.indd xix 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 22: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

56569flast.indd xx56569flast.indd xx 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 23: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Internet Protocol/Multi Protocol Label Switching (IP/MPLS) Virtual Private Network (VPN) technology has been widely adopted by service providers for use in their backbone networks. It has signifi cant advantages compared to legacy ATM, Frame-Relay, Ethernet, or IP networks. With IP/MPLS VPN technology, service providers can now build service-oriented networks with multiple services in a single converged network with high availability, reliability, and performance.

The IP/MPLS VPN network uses an evolutionary service-oriented network architecture, which brings the concepts of service entity and service router into the network. The service-oriented network de-couples the roles of Provider Edge (PE) routers and Provider (P) backbone routers. Service instances are created at the edge of the network in the customer-facing PE routers, and MPLS pseudowires are used to connect multiple service instances residing on different PE routers belonging to the same service. P routers connect to PE routers in the network to carry traffi c across the backbone network, providing high bandwidth throughput, traffi c engineering capability, and fast convergence.

One of the biggest challenges for service providers who migrate from legacy net-works to modern IP/MPLS VPN networks is to acquire the knowledge of IP/MPLS VPN, especially for the newly developed pseudowire-based Layer 2 VPN (L2VPN) technologies such as Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS). In modern IP/MPLS VPN service routing networks, both the net-work architecture and the protocols underneath are changed signifi cantly:

The service architecture introduces many new concepts, such as Service Access • Points (SAPs), Service Distribution Paths (SDPs), service instances, and pseudowires (PWs).

IP routing protocols are improved with the Traffi c Engineering (TE) extension, • and the TE-based Constrained Shortest Path First (CSPF) is introduced to per-form more optimal path calculation.

MPLS is improved with Resource Reservation Protocol Traffi c Engineering • (RSVP-TE) as the Label Switched Path (LSP) signaling protocol. New resil-iency features such as secondary LSP, Fast Reroute, and make-before-break (MBB) are introduced to improve convergence performance. Targeted LDP (T-LDP) is used to signal MPLS pseudowires to connect the service instances in different PE routers.

Introduction

56569flast.indd xxi56569flast.indd xxi 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 24: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xxii IN T RODUC T ION

New pseudowire-based VPN services such as VLL and VPLS are used to provide • multiple services in the IP/MPLS backbone network. Service resiliency features such as pseudowire switching and pseudowire redundancy are introduced to pro-vide more reliable service deployment.

The ease of deployment and the high bandwidth throughput of modern Ethernet technology make it more attractive for both service providers and customers as a Layer 2 transport technology. Ethernet VPN has also become more popular as it enables service providers to offl oad the IP routing peering responsibilities to their customers, and focuses instead on optimal traffi c forwarding. Customers would like to have total control of IP routing without being obligated to follow the providers’ rout-ing policies. Virtual Private LAN Service (VPLS) is capable of connecting multiple geographically separated customer sites with a Virtual Bridge. The customer sites connected by the VPLS service appear to be in the signal LAN segment, with span-ning tree interoperability. In the backbone network, VPLS service instances are con-nected by MPLS pseudowire through MPLS or IP transport tunnels.

With all these innovations in the service providers’ networks, networking profes-sionals need to update their knowledge of IP/MPLS VPN and obtain an in-depth understanding of the service routing architecture. This book is written to provide readers with a thorough understanding of the new IP/MPLS Layer 2 VPN technology.

How This Book Is OrganizedMany readers may have some experience with the newly evolved IP/MPLS VPN technologies. They may have some experience with legacy IP routing and/or Ethernet bridging networks and may fi nd that some of the terminologies sound familiar: IGP, BGP, spanning tree, LSP, RSVP, and so on. However, they may fi nd that these terminologies have different meanings and the protocols’ behaviors are altered in IP/MPLS VPN networks. Furthermore, there are many new concepts such as SAP, SDP, pseudowire, LSP, detour LSP, and more.

This book is organized in a hierarchical manner in four parts to help readers obtain a solid understanding of a service routing network.

Part I presents a high-level overview of the limitation of the traditional service • providers’ networks, and the challenge for service providers to provide more types of services to customers (Chapter 1). It also introduces the evolution of IP/MPLS VPN multi-service networks and the requirements for building a service-oriented IP/MPLS VPN network infrastructure (Chapter 2).

56569flast.indd xxii56569flast.indd xxii 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 25: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xxiiiIN T RODUC T ION

Part II discusses the protocols supporting the IP/MPLS VPN networks in detail. • The discussion includes enhanced MPLS switching with different types of LSPs (Chapter 3), traffi c engineering extensions for IGP and CSPF (Chapter 4), the RSVP-TE protocol for MPLS LSP signaling (Chapter 5), secondary LSP (Chapter 6), RSVP-TE MPLS LSP Fast Reroute (Chapter 7), and the use of the Label Distribution Protocol (LDP) for MPLS transport tunnels and VPN pseudowire signaling (Chapter 8). Part II is the foundation of the in-depth understanding of the IP/MPLS VPN network. These protocol details are man-datory for advanced network design and troubleshooting in service routing networks.

Part III discusses the IP/MPLS service routing architecture and the multiple • services provided by the IP/MPLS VPN service networks. It starts with the “big picture” of IP/MPLS VPN pseudowire-based service routing architecture (Chapter 9), followed by the introduction of the different types of Virtual Leased Line (Chapter 10). Then, the in-depth discussion of the Virtual Private LAN Services (VPLS) architecture is presented (Chapter 11). The scalable hierarchical extension of VPLS (H-VPLS) is also introduced (Chapter 12) fol-lowed by the high availability of the service network (Chapter 13). VLL resil-iency (Chapter 14) and VPLS resiliency (Chapter 15) follow.

Part IV presents advanced VPLS services topics including the use of BGP auto-• discovery in VPLS to improve the confi guration effi ciency (Chapter 16); the adoption of Provider Backbone Bridging (PBB, 802.1ah) to the VPLS imple-mentation to further improve the VPLS solution’s scalability (Chapter 17); and fi nally, the Operation, Administration, and Maintenance (OAM) tools in the VPLS service (Chapter 18).

Some material is presented in the format of Notes, Warnings, or other sidebars. Notes are used to clarify the critical concepts and some commonly misunderstood technical terms, or as quick reference reminders while designing the service routing network. Warnings are notices regarding potential service-impacting confi gurations and operations.

Many acronyms are used throughout the book. Each acronym is fully spelled out when it’s mentioned for the fi rst time in each chapter, followed by its abbreviation. The Glossary at the end of the book presents the full list of acronyms with brief explanations.

56569flast.indd xxiii56569flast.indd xxiii 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 26: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xxiv IN T RODUC T ION

Conventions Used in This BookAlcatel-Lucent provides a modular approach for confi guring the individual entities of Alcatel-Lucent Service Router Portfolio (ALSRP) nodes. ALSRP nodes can be provisioned and managed either directly using the command-line interface (CLI) of individual nodes or through a service-aware network management system (Alcatel-Lucent 5620 SAM). Alcatel-Lucent 5620 Service Awareness Manager (SAM) pro-vides different types of interfaces, including a graphical user interface (GUI), for provisioning the nodes of a network. In this book, only the command-line confi gu-ration option for confi guration and managing ALSRP nodes is presented.

CLI commands are entered at the command-line prompt. Entering a command makes navigation possible from one command context (or level) to another. When you initially enter a CLI session, you are in the root context. At the root context, the prompt indicates the active central processor module slot and the name of the node. Navigate to another level by entering the name of successively lower contexts. As you change through the levels, the prompt also changes to indicate the context you are in. Figure 1 shows an example CLI navigation and prompt change according to the context.

Figure 1 Navigation and Prompt Change

A:PE-1# A:PE-1# showA:PE-1>show#

The root prompt shown in Figure 1 indicates that the active CPM slot of the node is A and the name of the node is confi gured as PE-1. Upon entering the com-mand show, the prompt changes to indicate the show context. As you can see in this paragraph, when CLI codes are used inline along with the main text, they are indicated by the use of monofont text.

To get contextual help at a given prompt, simply enter a question mark (?). In a given CLI context, you can enter commands at that context level by simply enter-ing the text. It is also possible to enter a command in a lower context as long as the command is formatted in the proper command and parameter syntax. Figures 2 and 3 show the two methods to navigate to the show service context.

56569flast.indd xxiv56569flast.indd xxiv 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 27: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xxvIN T RODUC T ION

Figure 2 Navigation by Entering Context-Level Commands

A:PE-1# showA:PE-1>show# serviceA:PE-1>show>service#

Figure 3 Navigation by Entering Lower Context-Level Commands

A:PE-1# show serviceA:PE-1>show>service#

Figure 4 shows the command options for the oam vccv-ping command. This code is presented here to explain the syntax of CLI command options. The purpose of the command in Figure 4 is explained in Chapter 18.

Figure 4 An Example of CLI Command Options

A:PE-1# oam vccv-ping - vccv-ping <sdp-id:vc-id> [src-ip-address <ip-addr> dst-ip-address <ip-addr> pw-id <pw-id>][reply-mode {ip-routed|control-channel}][fc <fc-name> [profile {in|out}]] [size <octets>] [count<send-count>] [timeout <timeout>] [interval <interval>][ttl <vc-label-ttl]>

<sdp-id:vc-id> : sdp-id - [1..17407] vc-id - [1..4294967295] <ip-routed|control*> : keywords - specify reply mode Default: control-channel <fc-name> : be|l2|af|l1|h2|ef|h1|nc - Default: be <in|out> : keywords - Default: out <octets> : [88..9198] octets - Default: 88 <send-count> : [1..100] - Default: 1 <timeout> : [1..10] seconds - Default: 5 <interval> : [1..10] seconds - Default 1 <ip-addr> : a.b.c.d <vc-label-ttl> : [1..255] <pw-id> : [1..4294967295]

In the command syntax, square brackets indicate optional parameters of a com-mand; angle brackets indicate that a substitution is required for the placeholder; and a pipe (|) indicates an either/or relationship between the parameters on either side of the pipe. To shorten some of the code presentation, later in the book, part of some listings’ outputs is stripped and replaced with ellipses (…) to indicate the stripping.

56569flast.indd xxv56569flast.indd xxv 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 28: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

xxvi IN T RODUC T ION

For further information regarding the use of the command-line interface, refer to the System Basics Guide, which is part of the ALSRP product manuals. This book is one of the series of technical books to be published related to Alcatel-Lucent service routers. This book provides reference to the Alcatel-Lucent manuals that come with the Alcatel-Lucent 7750 Service Router, the Alcatel-Lucent 7450 Ethernet Service Switch, or the Alcatel-Lucent 7710 Service Router platforms. If you are an Alcatel-Lucent customer and you don’t have access to the Alcatel-Lucent’s Service product manuals, contact your Alcatel-Lucent account manager. If you are not a customer of Alcatel-Lucent, visit the “Contact Us” area at www.alcatel-lucent.com.

A standard set of icons is used in the diagrams throughout this book. A repre-sentation of these icons and their meanings is listed under the section “Standard Icons” at the end of the Introduction.

AudienceThe target audience of this book includes network design, maintenance, or support professionals working for telecommunication service providers or equipment vendors who want to acquire expert-level, in-depth knowledge on the latest IP/MPLS VPN technology. It is highly recommended that readers have a solid understanding of legacy IP and Ethernet switched networks and related protocols; some hands-on net-working experience is also recommended.

Alcatel-Lucent Service Routing Certifi cation ProgramFor those who feel they need more IP Service Routing training and hands-on expe-rience, I encourage you to review the offerings from the Alcatel-Lucent Service Routing Certifi cation Program. Visit www.alcatel-lucent.com/src for a complete overview of the four certifi cations in this industry-leading program.

Feedback Is WelcomeIt would be my pleasure to hear back from you. Please forward your comments and suggestions for improvements to the following email address:

[email protected]

With that, I welcome you to explore the exciting world of IP/MPLS VPN service routing networks.

— Zhuo (Frank) Xu

56569flast.indd xxvi56569flast.indd xxvi 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 29: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

Standard Icons

Enterprise

Residence

Broadband Service Router

Service Router

Microwave ConnectionSatellite Transmission

Broadband RemoteAccess Server

Radio Network Controllersand Base Station Controllers

Network

CE

Customer Equipment

Provider Equipment

SAP

Service Access Point

PW

Pseudowire

Failure Data

Forwarding Database

FDB

Internet

Cell Site &Base Service

Broadband Service AggregatorNetworkManagement

PE

56569flast.indd xxvii56569flast.indd xxvii 10/21/09 11:35:07 AM10/21/09 11:35:07 AM

Page 30: Designing and Implementing IP/MPLS-Based Ethernet …download.e-bookshelf.de/download/0000/5757/92/L-G-0000575792... · Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN

56569flast.indd xxviii56569flast.indd xxviii 10/21/09 11:35:07 AM10/21/09 11:35:07 AM


Recommended