PPT Version

advertisement
Multicast in VPLS
draft-raggarwa-l2vpn-vpls-mcast-00.txt
Rahul Aggarwal (Juniper)
Yuji Kamite (NTT)
Luyuan Fang (AT&T)
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
Co-Authors
 Yakov Rekhter (Juniper)
 Chaitanya Kodeboniya (Juniper)
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
2
Agenda
 Update since last IETF
 Limitations of existing VPLS proposals for Multicast
 VPLS Multicast Architecture – where do the various drafts
fit
 Avoiding PIM snooping on the PWs
 Use of P-Multicast Trees
 Conclusion
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
3
Update Since Last IETF
 Part of the work was presented in this WG at the
last IETF when it was part of draft-raggarwa-l3vpnmvpn-vpls-mcast-01.txt
 The VPLS mechanisms are now in a separate new
draft as per WG feedback
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
4
Current VPLS proposals:
 “Virtual Private LAN Service” (draft-ietf-l2vpn-vplsbgp)
 “Virtual Private LAN Services over MPLS” (draftietf-l2vpn-vpls-ldp)
 Limitations of these proposals for VPLS
multicast…
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
5
Limitations of current VPLS proposals
for VPLS Multicast
 Do not allow the use of P-Multicast Trees for
VPLS multicast data traffic
•Desirable for optimizing bandwidth efficiency
 PEs with VPLS sites that do not have receivers
in a given multicast customer (S, G) receive
traffic for that multicast stream
 Focus on optimizing state and not bandwidth.
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
6
Design Objectives for multicast
support in VPLS service (not a
complete list)
Optimize Bandwidth:
 A given customer (multicast)
packet should traverse a given
service provider link at most
once
 Deliver customer multicast
traffic to only PEs that have
(customer) receivers for that
traffic
 Deliver customer multicast
traffic along the “optimal” paths
within the service provider (from
the ingress PE to the egress PEs)
Optimize State:
• The amount of state within the
service provider network required
to support Multicast in VPLS
service should be no greater than
what is required to support
unicast in VPLS service
• The overhead of maintaining the
state to support Multicast in VPLS
service should be no greater than
what is required to support
unicast in VPLS service
Optimizing Bandwidth and State are conflicting goals
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
7
VPLS Multicast Architecture
Control Plane
 VPLS Auto-Discovery
• Use existing VPLS auto-discovery mechanisms
 Allow elimination of flooding
• PE-CE snooping – draft-serbest-l2vpn-vpls-mcast
• In VPLS a PE does not maintain a layer 2 adjacency with a CE
• PE-PE reliable exchange of multicast control messages
• Allow avoiding PIM-IGMP snooping overhead on PWs
• PIM with reliability extensions or
• BGP
• Draft-raggarwa-l2vpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
8
VPLS Multicast Architecture
Data Plane
Tree = PIM, RSVP-TE P2MP LSPs, Receiver Initiated P2MP LSPs
Separate Tree
per-set-of VPLSs
“Inclusive Mapping”
Separate Tree
per-set-of C-(S, G)s
“Selective Mapping”
Ingress
Replication
State =
Unicast VPLS
Separate Tree for
Every C-(S, G)
Aggregate State
Unbounded
State
Increasing P-router state and
Bandwidth efficiency
Decreasing P-router state and
Bandwidth efficiency
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
9
PIM snooping – implications on the
state maintenance on PE routers
 PE router has to maintain (S, G) state at least for all the (S,G) received
from all the local CEs
• E.g., assume PE with 1,000 CEs/sites, each VPLS site has at any
given point in time on average receivers for 3 groups, PE has to
maintain at least 3,000 (S,G) entries
 PE router maintains (S, G) state by processing PIM Join messages
received from (a) all sites of VPLSs connected to that PE, AND (b) all the
remote PEs that have members of these VPLSs
• E.g., assume PE router with 1,000 CEs/sites, each VPLS site has at
any given point in time on average receivers for 3 group, each group
is present on average in 10 sites, PE router has to process ~300
PIM Join per second, and ~900 (S, G) entries per second in a steady
state
• due to periodic PIM Join and PIM Join suppression
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
10
Avoiding PIM Snooping on PWs
Reliable Exchange of Multicast Control
Messages between PEs
VPLS A
Site 4
CE-A4
PE 4
VPLS A
Site 1
PIM Join
C-S, C-G –
Snooped at PE1
CE -A1
VSI-A
VRF-B
PE 1
CE-B1
BGP MVPN Routing Information Update:
<RD, C-S, C-G, Originator PE – PE1
Upstream PE – PE2, RT>
C-S -> C-G
VSI-A
RR
CE-A3
VSI-B
VPLS A
Site 3
PE 3
CE-B2
PEs have I-BGP Peering Only
With the RR
Copyright © 2004 Juniper Networks, Inc.
VPLS
B
Site 3
CE-B3
VSI-A
VSI-B
VPLS
B
Site 1
PE 2
VSI-A
CE-A2
VPLS A
Site 2
VPLS
B
Site 2
Proprietary and Confidential
www.juniper.net
11
VPLS Multicast
Data Plane Tunnels
 SP Multicast Trees
• Draft-raggarwa-l2vpn-vpls-mcast
• Aggregate Trees (Inclusive Mapping)
• Aggregate Data Trees (Selective Mapping)
• Use PE-CE snooping and PE-PE Reliable multicast message
exchange
 Ingress Replication
• Existing VPLS proposals AND
• PE-CE snooping and PE-PE Reliable multicast message
exchange
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
12
Aggregate P-Multicast Trees
 Allow one P-multicast Tree to be shared across multiple
VPLSs
 Can be setup using PIM or P2MP MPLS TE
• No architectural limitation on the P-multicast tree
technology
 Requires a MPLS label to demultiplex a particular VPN
• ‘Upstream’ label allocation by the root of the tree
• Egress PEs maintain a separate label space for each Pmulticast tree root
 State grows less than linearly with number of VPLSs
• Some efficiency of multicast routing may be sacrificed
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
13
VPLS Multicast Data Plane
P-Multicast Trees (Inclusive
Mapping)
VPLS A
Site 4
CE-A4
PE 4
VPLS A
Site 1
CE -A1
PE 2
VSI-A
VPLS
B
Site 3
CE-B3
VSI-A
VSI-A
VSI-B
PE 1
VSI-B
VPLS
B
Site 1
CE-B1
RR
CE-A3
VSI-B
VPLS A
Site 3
PE 3
CE-B2
VPLS Membership Discovery:
<Aggregation Capability> eg PE1
Aggregate Tree – PE2 as Root
C-S -> C-G
VSI-A
CE-A2
VPLS A
Site 2
VPLS
B
Site 2
BGP Signaled VPLS – Tree Binding:
<RD, Root PE, Upstream Label, RT, Tree Identifier>
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
14
Conclusion
 Comments ?
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
15
Download