Requirements for 802.1AD Provider Bridges June 2003 Muneyoshi Suzuki

advertisement
Requirements for 802.1AD
Provider Bridges
June 2003
Muneyoshi Suzuki
NTT
Reference Model
User Bridged LAN
User Site
of
user A
CE
PEB
PEB
CE
User Site
of
user A
PCB
Provider Bridged Network
PCB
PCB
CE
User Site
of
user B
CE
PEB
PEB
User Bridged LAN
PEB: Provider Edge Bridge
PCB: Provider Core Bridge
CE: Customer Equipment
CE
User Site
of
user B
P-VID Space
Problem: 12bit VID space defined 802.1Q-1998
is too small for public service
Requirements:
If a P-VID identifies an User Bridged LAN, 24
bit (16M users) ID space is needed
If a P-VID identifies an user site, 32 bit (4G
sites) ID space is needed
Maximum Bridge Diameter
Problem: Recommended value of the Maximum
Bridge Diameter is 7 (802.1D-1998, 802.1w-2001),
but it is too small for public service
The standards don’t address technical background
of the value (What happens if it exceeds 7? xSTP
does not converge in periodic time?)
Requirements:
The value should be extended tens for Provider
Bridged Network and 10 for User Bridged LAN
Diameter of a Provider Bridged Network should
not affect diameter of User Bridged LANs
Loop Prevention
Problem: A loop fatally affects a Bridged LAN
Requirements:
Provider Bridged Network should deploy a
mechanism for loop prevention
User Bridged LAN should deploy a mechanism
for loop prevention
Provider Bridged Network should deploy a
mechanism that protects the network from
loops caused by users
Loop Prevention
in Provider Bridged Network
It is provider’s responsibility to ensure loop-free
tree topology for the Provider Bridged Network
Thus, the topology is decided by the provider’s
policy and control
Therefore, it is quite unrealistic scenario to
change the topology based on user-xSTP
Requirements:
Provider Bridged Network should deploy
provider-xSTP for loop prevention
However, it is usually closed to the provider
and need not to interwork with user-xSTP
Loop Prevention
in User Bridged LAN
 It is user’s responsibility to ensure loop-free tree topology for
the User Bridged LAN
 This is because, an user can cause a loop whether the
provider supports xSTP for the user or not
 However, if xSTP is used in an User Bridged LAN and if the
provider forwards it transparently, loops can be prevented
 This is because, the provider ensures loop-free topology and a
single xSTP instance on a loop can detect and cut it
 Requirements:
User Bridged LAN should deploy customer-xSTP for loop
prevention
Provider Bridged Network may support per-user-xSTP,
otherwise, it must forward user-xSTP BPDUs transparently
Provider Bridged Network Protection
from Loops Caused by Users
 If Provider Bridged Network supports per-user-xSTP, it
can be protected from loops caused by users
 Only Provider Edge Bridges need to support it, because
a single xSTP instance on a loop can detect and cut it
 However, this is not perfect solution, but it does not
mean Providers don’t need protection
 Requirements:
Provider Edge Bridges may support per-user-xSTP
to protect the network
Otherwise, development of an OAM tool that detects
loop through User and Provider Bridge Networks is
indispensable
Unlearning User
Addresses
 Problem: If topology of an User Bridged LAN is changed by
the user-xSTP, the Provider Bridges must clear related
entries in the FDB
 However, this is limited only if the User Site is multihomed
to the Provider Network
 Requirements:
Provider Edge Bridges should support per-user-xSTP or a
snooping mechanism for it.
Q-in-Q: If topology change is detected, clear related
entries in the FDB, then notify that the fact to the other
Provider Bridges using Customer Change Notification
BPDU to be developed
MAC-in-MAC: If topology change is detected, clear
related entries in the FDB
Path Tracing
When a provider tests a path that forwards
frames for an user, the provider verifies
consistency of FDBs in the Provider Bridges
Problem: Verification is not easy in Q-in-Q case,
because, the Provider Bridged Network uses
user MAC addresses which frequently change
and are purged from FDBs in 5 minutes
Requirement: An OAM tool for path tracing is
indispensable in Q-in-Q case
Note: In MAC-in-MAC case, path tracing is easy,
because the Network uses Provider Edge
Bridge addresses
Summary of Requirements
 24-32 bit ID space for P-VID
 Extend Maximum Bridge Diameter
 Provider-xSTP is usually closed to the Provider
 If Provider Bridged Network supports per-user-xSTP
It can protect the Network from loops (but not perfect)
It can detect topology change of User Bridged LANs
 If Provider Bridged Network forwards User-xSTP BPDUs
transparently
Development of an OAM tool for loop detection is needed
A snooping mechanism for User-xSTP BPDUs is needed
 If Q-in-Q is used for encapsulation
Development of CCN BPDU is needed
Development of an OAM tool for path tracing is needed
Download