Issues and Approaches on Extending Ethernet Beyond LANs

Size: px
Start display at page:

Download "Issues and Approaches on Extending Ethernet Beyond LANs"

Transcription

1 ETHERNET TRANSPORT OVER WIDE AREA NETWORKS Issues and Approaches on Extending Ethernet Beyond LANs Girish Chiruvolu, An Ge, David Elie-Dit-Cosaque, Maher Ali, and Jessy Rouyer, Alcatel USA ABSTRACT Currently, LAN technology is predominantly Ethernet-based and offers packet-optimized switched technology. With more than 90 percent of Internet traffic originating from Ethernetbased LANs, efforts are underway to extend Ethernet beyond LANs into MANs and further into WANs. However, native Ethernet protocols need extensions or support from other technologies in order to succeed as MAN technology in terms of scalability, QoS, resiliency, OAM, and so on. The two emerging trends to carry Ethernet traffic across the MAN can be classified into native Ethernet (IEEE) protocol extensions, and encapsulation by another transportation technology such as MPLS networks. The goal is to offer new and challenging services such as virtual private LAN service, also known as transparent LAN service (TLS). This article presents a comprehensive overview of the required extensions/support of the Ethernet with an emphasis on the emerging provider bridge technology. INTRODUCTION Ethernet has evolved over the past decade from a simple shared medium access protocol to a full-duplex switched network. Ethernet dominates current local area network (LAN) realizations. It has been estimated that more than 90 percent of IP traffic originates from Ethernet LANs. Efforts are underway to make Ethernet an end-to-end technology spanning across LANs, metropolitan area networks (MANs), and possibly wide area networks (WANs). Fast and Gigabit Ethernet have brought more bandwidth to the technology. The required quality of service (QoS) features are under development for emerging new services, thus enabling Ethernet to make inroads toward backbone networks. Service providers are on the lookout for supporting technologies that enable newer Ethernet-based services such as transparent LAN service (TLS) connecting various customer sites across a metropolitan domain (metro Ethernet). In the context of metro Ethernet/WAN, a customer virtual LAN (C-VLAN) is a collection of multiple LANs that are physically connected to a shared service provider network (SPN) as shown in Fig. 1. The SPN is transparent to the customer s LAN segments, and the C-VLAN segments operate as a single VLAN. In this article we consider the SPNs that can be realized as an Ethernet bridged network (IEEE switches) or multiprotocol label switching (MPLS)-based network. The IEEE 802.1ad group is currently in the process of defining appropriate extensions to the existing Ethernet to realize a provider network (P- VLAN) [1] with the emphasis on interoperability and cost effectiveness. On the other hand, the Martini encapsulation scheme [2] facilitates transportation of layer 2 frames across a switched (MPLS cloud) network and thus forms a basic building block of the virtual private LAN service (VPLS) [3]. Typically, a P-VLAN shall run the IEEE protocols (with appropriate extensions) such as Spanning Tree Protocol (STP), and the forwarding is based on self-learning of medium access control (MAC) addresses in the participating Ethernet switches. On the other hand, a VPLS relies on both psuedo-wires (label switched paths [LSPs]) across the edge nodes of an MPLS domain, and routing along with horizon techniques (a route/frame is never advertised on the links from which it was learnt). An Ethernet virtual connection (EVC) is defined as a logical connection between various SPN edge nodes (customer sites) [4]. It should be noted that an EVC can be either point-to-point (P2P) or point-to-multipoint (P2MP) and is applicable to both VPLS and P-VLAN networks. A brief overview of the working details of an Ethernet switch is presented next [1]. An Ethernet switch learns the MAC addresses of end hosts and associates them with appropriate ports on which the end host frames arrive. It can bridge different segments of a LAN, thus providing connectivity between all the end hosts and in turn essentially defining a broadcast domain on which the end hosts can communicate unsolicited with each other [1]. Ethernet relies on STP [1] to seamlessly operate with selflearning of MAC addresses, and the spanning tree (ST) provides loop-free connectivity across the participating Ethernet bridges. Furthermore, the IEEE 802.1Q standard (referred to as Q /04/$ IEEE

2 Std) enables the realization of VLANs that are logical LANs (or equivalently broadcast domains) over a shared (physical) network (Ethernet). The standard was developed to break large networks into smaller parts so that broadcast and multicast traffic would not consume more bandwidth than necessary for various VLAN realizations. The Q-Std specifies a method for tagging (with Q-tags) Ethernet frames with VLAN membership. A 12-bit VLAN identifier (VID) in the Q-tag identifies the VLANs to which a frame belongs in a shared network. In addition, VIDs facilitate optimal pruning and reduce the size of the broadcast domain over a given ST. The tagged frames belonging to a given VLAN will be forwarded across the network only to the end hosts of the VLAN, thereby improving bandwidth utilization and providing implicit VLAN segregation. In addition to the VID field, the Q-tag also contains the following fields: A 3-bit priority field that can be used to determine the class of service (CoS) A canonical format identifier (CFI) field An Ethertype field that indicates the protocol to which the payload of the frame belongs A metro Ethernet provider network shall support a large number of C-VLANs, and in turn thousands of end hosts in these C-VLANs. If the current IEEE 802.1D [1] Ethernet switches are to be deployed in order to realize an SPN, a number of issues must be addressed, summarized as follows: Containment of MAC address table explosion in the provider switches Expansion of the limited VID space (due to 12-bit size) and support for more than 4096 C-VLANs across the SPN Design of schemes for isolation as well as interaction of the provider and customer control protocols Realization of various traffic management functions, such as multipoint QoS, to meet contracted service level agreements (SLAs) Design of efficient OAM tools Several aspects of these issues are analyzed in this article along with possible solutions addressing the limitations of the current Ethernet such that it can be extended to the MAN. Additional issues such as security and multicast/broadcast radiation (e.g., efficient VLAN pruning) are important, but they are beyond the scope of this article. The remainder of this article is organized as follows. We deal with various relevant encapsulation schemes and the issues in layer 2 control protocol handling for TLS. Key components of QoS such as multipoint traffic engineering (TE), fast traffic protection against failures, and evolving Ethernet operation, administration, and maintenance (OAM) functions are addressed. Finally, we conclude the article. CUSTOMER FRAMES TRANSPORT/ENCAPSULATION The IEEE 802.1D Ethernet switches deployed at the core of a metro domain would have to learn all active end host MAC addresses in every C- Provider core functions Core provider network site A Edge functions (C-VLAN) Figure 1. Metro Ethernet architecture. (SPN) site B VLAN attached to that domain. As the number of hosts attached to a metro domain increases, this may result in large MAC address tables (MAC address table explosion) that must be maintained by the core metro switches. Moreover, the metro service provider may run out of Q-tag space as determined by the 12-bit VID. Furthermore, two or more C-VLANs may choose the same VID; thus, the service provider needs to differentiate between them within the metro domain. The above problems are broadly referred to as metro Ethernet scalability issues. The encapsulation methods (e.g., VLAN stacking, MPLS-based Ethernet encapsulation) for C- VLAN segregation/scaling and MAC address table containment shall be explored next. LAYER 2 MAC ENCAPSULATION Several encapsulation schemes have been proposed to address the above issues and facilitate metro Ethernet services. These schemes insert additional tags/fields in the customer Ethernet frames at the ingress nodes and are stripped off at the egress nodes before the frames are handed over to the appropriate C-VLAN segments (sites). VLAN Stacking Since the Ethernet is inherently a broadcast network, it is necessary that the broadcast traffic of one VLAN not be flooded onto other VLANs. The Q-tag inserted in the frames can be used to limit flooding to the switches that participate in the VLAN. The Q- tag can only support 4096 unique VIDs, and several approaches address this shortcoming. One approach is to insert an additional provider Q- tag into the customer frames at the ingress switch of a domain, as shown in Fig. 2. This stacked Q- tag scheme is referred to as Q-in-Q/QiQ. In the QiQ scheme there are two possible ways of interpreting the stacked Q-tags by the provider switches. In the first one, only the VID of the outer tag (inserted at an ingress node) is used by the core Ethernet switches to identify the C-VLAN across the metro domain. The other variant is to combine both the VID fields Customer 2 81

3 It is worth noting that QiQ is currently investigated by the standard bodies and is applicable to a bridged provider network. Combining the VLAN stacking and MAS is equivalent to the MiM scheme. Schemes for MPLS-based Metro-Ethernet for addressing the same issues are described below p (3 bits) MAC DA MAC SA 0X8100 (ethertype) Figure 2. Stacked Q-tag. CFI (1 bit) Stacked Q-tag VLAN ID (12 bits) of the stacked Q-tags (customer and provider assigned) and thus be able to support a larger number of C-VLANs (more than 4096). The first scheme is backward compatible with the Q- Std; the latter is not. Other nonstandard tags have been proposed using more VID bits [3]. The VLAN stacking schemes can also address the scalability of MAC address tables in the core switches in a limited manner. For example, in the case where only two ports of an Ethernet switch forward frames of a C-VLAN, the learning of individual MAC addresses of the C-VLAN can be avoided. The switch only needs to learn about the VIDs to forward frames [5]. However, for the cases where C-VLAN frames arrive on more than two ports, all the end host MAC addresses of the C-VLAN have to be learned by the Ethernet switch. The issue of containing MAC address tables, especially in the core metro switches, is discussed next. MAC Address Stacking The MAC address stacking (MAS) scheme explicitly addresses MAC address table explosion. As shown in Fig. 3, an ingress node inserts two additional fields into the customer frames: source and destination MAC addresses of the provider edge nodes. These fields have local significance within the metro domain. The provider domain transports the user (C-VLAN) frames based on provider edge nodes MAC addresses. Furthermore, the end users MAC addresses are associated with the corresponding ingress node s MAC address. As a result, each of the core switches learns only the edge switch MAC addresses and avoids large end-user MAC addresses. The MAS is independent of the Q-tag schemes used and can be supported by existing switches with appropriate extensions (e.g., a new Ethertype). It is worth noting that QiQ is currently being investigated by the standard bodies [1] and is applicable to a bridged provider network. Combining VLAN stacking and MAS is equivalent to the MAC-in-MAC (MiM) scheme [3]. Schemes for MPLS-based metro Ethernet to address the same issues are described below. MPLS LAYER-2 ENCAPSULATION MPLS encapsulation (aka Martini encapsulation) facilitates transportation of layer 2 frames across an MPLS service provider domain [2]. The metro domain in this case comprises MPLS label switch routers (LSRs). Two MPLS labels are added onto the customer Ethernet frames based on destination MAC address/port/q-tag information at the Customer frame Q-tag 802.1Q Original Ethertype Q-tag Ethernet type Data CRC ingress node, as shown in Fig. 4. The first label at the top of the stack is the tunnel label, which is used to carry the frame across the provider network. The tunnel label is typically removed by the penultimate hop (i.e., the hop prior to the egress label edge router, LER). The second label at the bottom of the stack is the VC label, which is used by the egress LER to determine how to process the frame and deliver it to the destination network. Thus, in the case of MPLS encapsulation, two labels are necessary (tunnel and VC). As described above, Martini encapsulation enables transportation of layer 2 (Ethernet) frames and thus forms a basic building block of the VPLS. The VPLS supports the connection of multiple customer sites emulating a single bridged domain over a managed IP/MPLS network. Therefore, all the services in a VPLS appear to be on the same LAN regardless of location. Note that Ethernet frames can be transported over most layer 1 transport networks with Martini encapsulation. The edge nodes of any VPLS architecture are responsible for: Ethernet bridging (e.g., MAC address learning and interaction with customer STP) Associating the MAC addresses and VIDs with LSPs and LSP-based MPLS forwarding A decoupled-vpls scheme realizes the two edge node functions in separate entities. Moreover, in order to avoid full mesh connectivity across the edge nodes of the metro domain, a hierarchical VPLS (H-VPLS) scheme comprises a two-tier structure: core and access. The number of nodes in the core tier is typically small, and the nodes are fully connected in a mesh. The nodes in the access tier are the aggregation points for the customer VLAN sites and are in turn connected to the core tier by P2P LSPs, thus avoiding a large number of LSPs in the metro domain. These methods facilitate the realization of a scalable and efficient VPLS [3]. Table 1 summarizes various aspects of the QiQ, MAS, MiM, and MPLS encapsulation schemes. The QiQ scheme addresses VLAN scalability, while the MAS solves MAC address table explosion. It should be noted that MAS per se does not address the customer segregation issue. MiM, a combination of MAS and VLAN stacking schemes, can be implemented to limit the broadcast regions of the corresponding C-VLANs. In the absence of MAS, the standalone QiQ schemes may incur more penalties in terms of MAC address flushing and relearning when the customer ST reconverges. 82

4 Customer frame P-MAC DA P-MAC SA Original MAC DA MAC SA Q-tag Ethertype Data CRC Provider MAC fields (a) of PE1->outgoing PE2->outgoing... Pcore port number port number table of ) outgoing port number ->M4...M7 Pcore1 Pcore2 table of PE2 ) outgoing port number ->M1...M3 PE2 Provider edge switch VLAN1 PE1 Rest of Eth fields M1 M4 PE 1 PE 2 VLAN1 M3 M2 M1 Rest of Eth fields M1 (b) M4 M4 M5 M6 Customer frame M7 Figure 3. a) A provider MAC encapsulated Ethernet frame; b) a typical sequence of encapsulation/decapsulation of user frames. In general, tunneling schemes such as MPLS/MiM do not suffer from MAC table explosion due to the fact that the C-VLAN MAC addresses are learned/managed at the edge nodes. In a rough comparison between MPLS encapsulation and Ethernet extensions, a VC label corresponds to a Q-tag and the tunnel label corresponds to the MAS extensions (SA/DA). A label distribution protocol (LDP) is required to distribute the labels. LSRs are necessary to determine the routes in order to establish the required LSPs. The stacked Q-tag has the same purpose as the MPLS label, but has the advantage that no MPLS control plane needs to be introduced. Moreover, the approaches of VLAN stacking/mas and MPLS are different in the sense that the former relies on self-learning and the latter on routing. From the perspective of signaling overhead, MAS needs no such signaling. An automated version of QiQ might need some signaling between metro nodes; however, the existing IEEE Generic Attribute Registration Protocol (GARP) can be reused with minor extensions. Another interesting aspect is localization of the impact of any erroneous control operation at C-VLAN sites on the provider domain. A C- VLAN with a couple of duplicate end host MAC addresses can impact the metro Ethernet switches in terms of frequent MAC movement across the ports. MAS/MPLS encapsulations shield core Ethernet switches from such duplication as the switching is done based on uniquely assigned outer MAC addresses. Thus, the impact of duplicate MAC addresses is moved to the edge nodes. ISSUES IN CUSTOMER CONTROL PROTOCOLS HANDLING IN THE PROVIDER NETWORK In addition to the encapsulation schemes for transportation of customer data frames, appropriate methods are also necessary for the separation of Ethernet control protocols of the provider and customer networks. Moreover, the Customer frame VC label Tunnel label MAC DA MAC SA VLAN tag Original Ethernet type Data CRC Encapsulation fields Figure 4. MPLS layer 2 encapsulation. 83

5 Attribute MAC address Scalability Priority Transition/ Localization of impact of Signaling Min overhead Encapsulation Table w.r.t. C-VLANs bits Evolution Duplicate Provider ST (Bytes) method containtment MAC control MAS Yes Not applicable No Yes Yes Yes No 12 QiQ No For combination of VIDs: Yes Yes Yes No No Needed 2 For provider VID: No MiM Yes Yes, 16 million Yes Yes Yes Yes Optional 18 MPLS Yes Yes, 16 million Yes Partially Yes Yes Yes 8 Yes (cost) Table 1. Overview of the aspects of the schemes. current IEEE bridge PDUs (BPDUs) and GARP control messages are untagged. In order to distinguish control frames of one C-VLAN from those of another, it may be necessary to encapsulate/tag the customer control messages in the provider domain. This allows for various C-VLAN sites to transparently participate in their relevant layer 2 protocols for proper connectivity and functioning. MULTIHOMED C-VLANS A multihomed C-VLAN site connects to the metro domain via multiple edge nodes. However, only one connection is active at any instance. The customer ST provides loop-free connectivity across all C-VLAN sites. In Fig. 5, we show an example of a dual-homed C-VLAN. In case of a failure in the customer network, the customer bridges may either automatically (via STP reconfiguration) or manually activate the backdoor link in order to provide fast protection. As a result, topology change notifications (TCNs) are generated that lead to flushing of appropriate MAC address tables and relearning of MAC addresses. The provider network may be unaware of these C-VLAN topology changes and still forward frames to the failed customer site until the corresponding MAC addresses age out (on the order of minutes). This leads to an unacceptable recovery time. A possible solution is to detect customer TCNs at the provider edge in order to trigger unlearning in the provider [6]. This establishes the need for coordination between the provider network and various control protocol messages originating from C-VLANs. Furthermore, it is necessary to isolate provider control protocols from customer ones, to prevent the instability of C-VLANs (e.g., erratic behavior of the C-VLAN switches) from affecting the provider network. New Ethertypes and a reserved block of MAC addresses can facilitate such functions and are discussed next. NEW ETHERTYPES AND MULTICAST MAC ADDRESSES FOR PROVIDER BRIDGES In addition to the new fields provided by the encapsulation schemes described earlier, new Ethertypes might be required to distinguish between encapsulated frames in a provider domain from nonencapsulated frames. This can be an additional security measure in case encapsulated frames erroneously flow into C-VLANs. These stray frames would be dropped, as customer bridges do not recognize these new Ethertypes. They can also avoid potential problems arising from manual misconfiguration of provider bridges while processing encapsulated frames. Furthermore, the new Ethertypes allow redefinition of some of the existing fields in the provider encapsulation. Moreover, the current bridge s control protocols use a reserved set of multicast MAC destination addresses (MAC DAs). The customer bridge interfacing the provider network needs to interact with the provider bridges in three modes [7]: Peer mode (e.g., customer OAM may peer with provider bridges) Tunnel mode, in which customer control messages are transparently passed on (e.g., customer STP BPDUs) Discard mode, wherein control frames are dropped (e.g., customer Pause frames) In order to enable such distinct operation modes at the edge nodes, it is necessary to have a different set of reserved multicast MAC DAs from the provider MAC address set. For example, a tunneled customer control frame arriving at the provider egress node shall have the existing MAC DA, whereas a peered customer control frame (or a frame originating at a provider bridge) shall have a MAC DA from the provider MAC address set. It should be noted that the MiM scheme can also facilitate transparent handling of customer control protocols. However, depending on the protocols, appropriate actions may be triggered, thereby providing a richer set of interactions at the provider edge. QUALITY OF SERVICE Several elements such as traffic profiling, bandwidth guarantees, fast protection, and robust OAM tools are necessary to realize adequate QoS in a metro Ethernet. The building blocks of QoS in metro Ethernet can be broadly categorized as: a) traffic management, b) resilience, and c) OAM. Key issues in each of these categories and possible solutions are described next. TRAFFIC MANAGEMENT Currently, Ethernet predominantly carries best effort traffic with no QoS guarantees. The Q-Std defines certain classes of service that are represented by the three p-bits in the Q-tag. However, 84

6 the current IEEE 802.1Q scheme does not incorporate the drop precedence (DP), which is defined in the widely deployed differentiated services (DiffServ) traffic model [8]. In order to support the DiffServ traffic over metro Ethernet, appropriate extensions are necessary to map the p-bits and support the DP. When DiffServ and Q-Std-based CoS mapping schemes coexist in a domain, frame misordering may occur if the DP information in DiffServ-CoS is treated as different Q-Std classes. Thus, there is a need for standard mapping schemes and additional identifier fields. One solution is to redefine the CFI bit in the provider Q-tag in order to correctly implement the DP. In addition to prioritizing the traffic, the following key components are required to realize QoS requirements: Traffic management schemes that include token-bucket-based markers and policers (currently being defined by MEF) [4] Class-based congestion control schemes for realizing relative QoS (the IEEE Pause message can be extended to include CoS information) Furthermore, DP-aware packet dropping and buffer management schemes are also essential for congestion management. Metro Ethernet services require QoS guarantees for both P2P and P2MP EVCs. A customer may contract a certain SLA with a provider that may include, in addition to other parameters, bandwidth guarantees, delay, jitter, and packet loss. A P2P SLA can be characterized as a simple pipe model wherein the traffic guarantee is given between ingress and egress edge nodes. The bandwidth profile for the P2MP can be characterized as a hose model [9]. Mechanisms to realize the pipe model are relatively well understood, and the existing schemes are geared mainly toward P2P services. Therefore, new schemes must be designed for P2MP service guarantees. Multipoint TE is a key issue in efficient resource allocation and load balancing [9]. Admission control is another critical component in realizing the desired QoS for various classes/ services in addition to the TE. It deals with estimation of the available network resources (e.g., bandwidth) and decides, on demand, whether a request for bandwidth from a customer can be satisfied. Extensions to IEEE GARP need to be carried out in order to support such multipoint EVC service in P-VLANs. It should be noted that the VPLS schemes greatly benefit from the advanced features traditionally associated with MPLS such as bandwidth guarantees and TE through appropriate signaling mechanisms (e.g., Resource Reservation Protocol with TE, RSVP- TE, and extensions [10]). Furthermore, C-VLAN grouping can reduce the large state space; thus, resource management schemes can benefit from such grouping in terms of reduced computation. Host x site A Blocked backdoor ports Active primary link A Figure 5. Dual-homed C-VLAN. site B QiQ provider network RESILIENCE AND OAM Protection against link/node failures is a key component of successful realization of metro Ethernet. However, Ethernet was originally designed to provide shared local medium connectivity and mainly geared toward non-realtime data transfer. Accordingly, STP was designed in a manner such that the worst case network diameter is taken into account for setting up the timers for the reconstruction of ST upon failures and is typically on the order of 30 s. Upon a port/link failure, Rapid STP (RSTP) [1] strives to achieve almost instantaneous transition of the appropriate ports to the forwarding state, thereby improving the reconvergence time. The RSTP enhancements over STP include: a) additional port role/state definitions and faster transitions to the forwarding state, b) BPDUs periodically generated by all bridges, and c) more precise detection and rapid propagation of topology changes from the point of failure detection rather than from the root bridge. These techniques allow an RSTP-based bridged network to reduce the recovery time to at most few seconds. Moreover, RSTP reduces the amount of relearning of MAC addresses after a change in the topology. The IEEE 802.1s defines multiple STs (MSTs) [1], so the basic TE rules can be implemented with the alternate paths arising from the MSTs. In terms of protection capabilities, due to the fact that each VLAN is associated with a single ST only, it still lacks the capacity to perform fast protection switching (< 50 ms) by steering the traffic on the fly onto an alternate ST. To overcome these limitations, two additional enhancements can be deployed. The first enhancement requires that frames be augmented with an ST tree identifier; thus, each VLAN can now be associated with more than one ST explicitly. In case of failure, the traffic can now be switched from one to the other on the fly. The second enhancement is to encapsulate the user frames based on the MAS; thus, the link failure does not trigger relearning and VLAN reregistration is avoided. Therefore, these enhancements can realize fast protection on the order of 50 ms. On the other hand, VPLS schemes require knowledge of network topology in order to establish VCs and rely on split horizon techniques to avoid loops [11]. In VPLS-based metro Host y Active primary link B Customer 2 85

7 Protection against link/node failures is a key component of successful realization of Metro-Ethernet. However, Ethernet was originally designed to provide shared local medium connectivity and mainly geared towards non-realtime data transfer. Ethernet, link and node protection of virtual tunnels (VTs) can be implemented by providing preplanned and physically disjoint VTs. By utilizing a preplanned approach, there is no need to recalculate the alternate path when a failure occurs. As a result, fast reroute can be achieved. Three different schemes [12] exist for implementing such a strategy: Path protection Link protection Subpath protection These three schemes differ in terms of response time and resource utilization. OAM is another key component in ensuring that the provider network meets the contracted SLA. The Ethernet OAM protocols should provide the ability to determine the connectivity and measure the round-trip delay and jitter [13]. Furthermore, Ethernet OAM needs to provide mechanisms for alarm notification and performance measurements. Since the existing higherlayer (e.g., IP) OAM schemes are transparent to the Ethernet bridges, a new scalable Ethernet OAM is required to provide the necessary network operation and maintenance functions (e.g., layer 2 ping and traceroute) in the metro Ethernet independently. These OAM functions facilitate collection of the necessary information on routing, delay and QoS along the path. The schemes described earlier for layer 2 protocol handling by the provider network are equally applicable to the emerging Ethernet OAM. It should be noted that VPLS schemes could leverage upon relatively more advanced MPLS-based OAM tools. OAM tools are currently under development at several standard bodies such as IEEE, MEF, and ITU-T, and can provide powerful diagnostic functions to enable QoS in metro Ethernet. CONCLUSIONS Simplicity and scalability are the two key factors that make any technology successful in a MAN providing Ethernet-based VPLS/TLS. In this article, several issues in and approaches to extending Ethernet beyond LANs are discussed. In order to provide TLS, the provider edge nodes should have bridging capability and appropriate encapsulation functions. Furthermore, relevant traffic management functions are necessary to guarantee QoS and meet contracted SLAs. They also need to interact with relevant layer 2 control protocols in order to realize transparent Ethernet services. The VPLS and QiQ schemes are currently popular with standard bodies and switch vendors. While the QoS and SLA guarantees, especially for P2MP EVCs, require certain enhancements to Ethernet, there is a trade-off between the benefits and complexity of these enhancements. Evolving Ethernet OAM tools shall also play a key role in expediting the realization of such metro Ethernet services. Several heterogeneous technologies shall coexist, so interworking among such technologies must be addressed. Providers should be able to take advantage of the unique characteristics of Ethernet and offer value-added metro Ethernet services in the near future. ACKNOWLEDGMENTS The authors would like to thank the reviewers for their comments that helped improve this article. They are also thankful to Ljubisa Tancevski of Alcatel for many stimulating discussions on metro Ethernet. REFERENCES [1] IEEE 802.1D/w/s/ad, IEEE working group(s). [2] L. Martini et al., Encapsulation Methods for Transport of Ethernet Frames over IP/MPLS Networks, work in progress, Feb [3] ITU contrib. WD 14 Q12/15, Service Provider Ethernet Switching, May [4] S. Khandekar et al., Metro Ethernet Network QoS Framework, work in progress, MEF, Nov [5] M. Seaman, Large Scale Q-in-Q Scalable Address Learning, work in progress, IEEE 802.1, Sept [6] G. Chiruvolu et al., Selective Customer TCN Snooping across a Provider Domain, work in progress, IEEE, Mar [7] N. Finn, Provider Bridge Layer 2 Protocols, IEEE 802.1, work in progress, Mar [8] S. Blake et al., An Architecture for Differentiated Service, IETF RFC [9] N. Duffield et al., Resource Management with Hoses: Point-to-cloud Services for Virtual Private Networks, IEEE/ACM TON, Oct. 2002, pp [10] D. Awduche et al., RSVP-TE: Extensions to RSVP for LSP Tunnels, IETF RFC 3209, [11] M. Lassere et al., Virtual Private LAN Services over MPLS, work in progress, IETF, [12] P. Pan et al., Fast Reroute Extensions to RSVP-TE for LSP Tunnels, work in progress, IETF, [13] N. Finn, Bridges and End-to-End OAM, IEEE 802.1, work in progress, Mar BIOGRAPHIES GIRISH CHIRUVOLU (Girish.Chiruvolu@alcatel.com) is a research scientist at Research and Innovation (R&I), Alcatel, and leads a team on metro Ethernet activities in Plano, Texas. He obtained a Ph.D. in computer science from the University of South Florida. His current research interests include metro Ethernet, and modeling and performance evaluation of networks. AN GE [M] (andrew.ge@alcatel.com) is a research scientist in R&I, Alcatel. He received his B.S. and M.S. from Xidian University, Xian, China, and his Ph.D. degree in electrical engineering from the University of Texas at Dallas. His research interests include metro Ethernet, optical packet/ burst switching networks, and traffic engineering in highspeed networks. DAVID ELIE-DIT-COSAQUE (david.elie_dit_cosaque@alcatel. com) has been a research scientist at Alcatel R&I since May His research topics include storage area networks (SAN), Ethernet networks, protection/restoration and optimization of IP over WDM optical networks. Before joining Alcatel, he received his M.S. degree in computer science and telecommunications from ESIGETEL, Avon- Fontainebleau, France, in MAHER ALI [M] (maher.ali@alcatel.com) works in the general area of computer networks with a focus on the design and the control/management of optical and Ethernet-based networks. He considers the impact of transmission impairments on the next-generation optical Internet, and studies survivability and cost analysis issues of core/metro networks. In addition, he works on extending Ethernet technology to the metro and core. He is currently a research scientist at Alcatel R&I, Plano, Texas. JESSY ROUYER (Jessy.Rouyer@alcatel.com) is with Alcatel R&I, Plano, Texas. He holds B.S. and M.S. degrees in computer networks and systems from Université Henri Poincare, Nancy, France. He is currently involved in Ethernet research activities focusing on the Rapid and Multiple Spanning Tree Protocols. His interests also include metro Ethernet, integration of bridging and related protocols, and extensions for carrier-grade operation. 86

Hands-On Metro Ethernet Carrier Class Networks

Hands-On Metro Ethernet Carrier Class Networks Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface

More information

Developing Standards for Metro Ethernet Networks

Developing Standards for Metro Ethernet Networks Developing Standards for Metro Ethernet s Stephen Haddock shaddock@extremenetworks.com Chief Technology Officer Agenda Metro Ethernet s Metro Ethernet Forum Services Model and Definitions Traffic Management

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Traffic Engineering in Metro Ethernet

Traffic Engineering in Metro Ethernet Traffic Engineering in Metro Ethernet Padmaraj M. V. Nair Suku V. S. Nair mpadmara@lyle.smu.edu nair@lyle.smu.edu F. Marco Marchetti marco@lyle.smu.edu HACNet Lab, Southern Methodist University, Dallas,

More information

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture 1 Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture Author: Mikael Forsten TeliaSonera Sonera Carrier Networks Supervisor: Docent Timo O. Korhonen Instructor: M.Sc Jari

More information

Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System

Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System Wonkyoung Lee*, Chang-Ho Choi*, Sun-Me Kim* * Optical Internet Research Department, Electronics and Telecommunications Research

More information

Configuration and Management of Networks. Pedro Amaral

Configuration and Management of Networks. Pedro Amaral Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast

More information

Introduction to Multi-Protocol Label

Introduction to Multi-Protocol Label Introduction to Multi-Protocol Label Switching (MPLS) Matthew Bocci, Alcatel-Lucent IP Division Agenda History of MPLS Standardisation MPLS Architecture Control Plane QoS and Traffic Engineering Protection

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 About MPLS L2VPN 1 Comparison with traditional VPN 2 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 Overview 1 Comparison with traditional VPN 1 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration task list 4 Configuring

More information

Carrier Ethernet Evolution

Carrier Ethernet Evolution Carrier Ethernet Evolution Next phase of carrier-class Ethernet services wave Levente Laposi, IP Division Regional Support Centre October 2008 Agenda 1. Introduction 2. Understanding P 3. P-VPLS The next

More information

Ethernet Virtual Connections Configuration

Ethernet Virtual Connections Configuration An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint

More information

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) http://staff.polito.it/mario.baldi MPLS - 1 From MPLS Forum Documents MPLS is the enabling technology

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

Technical Specification MEF 1. Ethernet Services Model, Phase November 2003

Technical Specification MEF 1. Ethernet Services Model, Phase November 2003 Technical Specification Ethernet Services Model, Phase 1 10 November 2003 Disclaimer The information in this publication is freely available for reproduction and use by any recipient and is believed to

More information

Emerging MPLS OAM mechanisms

Emerging MPLS OAM mechanisms Emerging MPLS OAM mechanisms Answering the interoperability and scalability question Data Networks Operation John Nakulski Product Manager October 2006 Page 1 Agenda Introduction The Need for MPLS OAM

More information

Routing Between VLANs Overview

Routing Between VLANs Overview Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

MPLS OAM Technology White Paper

MPLS OAM Technology White Paper MPLS OAM Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff, Mark Holness, Norival Figueira, Michael Chen, Dinesh Mohan, Glenn Parsons Version 2.0 October 4, 2004

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services By Scott Kotrla How VPLS Compares to Existing VPN Technologies Multipoint Bridged Ethernet is a service offering that attempts to recreate

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 36 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal We all know Ethernet based on its long history as the LAN connectivity technology of choice. Recently,

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Ethernet. Access Technologies 2 Moldován István. Department of Telecommunications and Media Informatics

Ethernet. Access Technologies 2 Moldován István. Department of Telecommunications and Media Informatics Ethernet Access Technologies 2 Moldován István Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Ethernet Forwarding MAC Forwarding Topology VLAN Forwarding

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

Trafffic Engineering 2015/16 1

Trafffic Engineering 2015/16 1 Traffic Engineering 2015/2016 Traffic Engineering: from ATM to MPLS fernando.silva@tecnico.ulisboa.pt Instituto Superior Técnico Trafffic Engineering 2015/16 1 Outline Traffic Engineering revisited Traffic

More information

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

Introduction to MPLS APNIC

Introduction to MPLS APNIC Introduction to MPLS APNIC Issue Date: [201609] Revision: [01] What is MPLS? 2 Definition of MPLS Multi Protocol Label Switching Multiprotocol, it supports ANY network layer protocol, i.e. IPv4, IPv6,

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Routing Between VLANs Overview

Routing Between VLANs Overview Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Optical + Ethernet: Converging the Transport Network. An Overview

Optical + Ethernet: Converging the Transport Network. An Overview Optical + Ethernet: Converging the Transport Network An Overview Trends Regional Optical Networks for Research Locally-managed fiber termination points Locally-organized peering relationships Locally-controlled

More information

Technical Specification MEF 6. Ethernet Services Definitions - Phase I. June 2004

Technical Specification MEF 6. Ethernet Services Definitions - Phase I. June 2004 Technical Specification Ethernet Services Definitions - Phase I June 2004 contain the following statement: "Reproduced with permission of the Metro Ethernet Forum." No user of this document is authorized

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling 9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Cisco CPT Packet Transport Module 4x10GE

Cisco CPT Packet Transport Module 4x10GE Data Sheet Cisco CPT Packet Transport Module 4x10GE The Cisco Carrier Packet Transport System (CPT) 200 and 600 sets the industry benchmark as a carrier-class converged access and aggregation platform

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

MC-LAG to VPLS Technology and Solution Overview

MC-LAG to VPLS Technology and Solution Overview CHAPTER 3 MC-LAG to VPLS Technology and Solution Overview Virtual Private LAN Service (VPLS) is an architecture that provides multipoint Ethernet LAN services, often referred to as Transparent LAN Services

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,

More information

OPTera Metro 8000 Services Switch

OPTera Metro 8000 Services Switch Product/Service Bulletin Nortel Networks Services Switch Service providers looking for ways to scale Ethernet-based services and maximize their profitability need look no further than the Nortel Networks

More information

Configuring Ethernet OAM, CFM, and E-LMI

Configuring Ethernet OAM, CFM, and E-LMI CHAPTER 39 Ethernet Operations, Administration, and Maintenance (OAM) is a protocol for installing, monitoring, and troubleshooting Ethernet networks to increase management capability within the context

More information

for Metropolitan Area Networks MPLS No. 106 Technology White Paper Abstract

for Metropolitan Area Networks MPLS No. 106 Technology White Paper Abstract No. 106 Technology White Paper Page: 1 of 7 MPLS for Metropolitan Area Networks Abstract The demand for bandwidth in Metropolitan Area Networks (MANs) and the increased availability of fiber has created

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Introduction to MPLS. What is MPLS? 1/23/17. APNIC Technical Workshop January 23 to 25, NZNOG2017, Tauranga, New Zealand. [201609] Revision:

Introduction to MPLS. What is MPLS? 1/23/17. APNIC Technical Workshop January 23 to 25, NZNOG2017, Tauranga, New Zealand. [201609] Revision: Introduction to MPLS APNIC Technical Workshop January 23 to 25, 2017. NZNOG2017, Tauranga, New Zealand. Issue Date: [201609] Revision: [01] What is MPLS? 2 1 Definition of MPLS Multi Protocol Label Switching

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

ENTERPRISE MPLS. Kireeti Kompella

ENTERPRISE MPLS. Kireeti Kompella ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP

More information

White Paper: Control Plane Implementation on Coordinated Shared Networks (CSN)

White Paper: Control Plane Implementation on Coordinated Shared Networks (CSN) Control Plane on Coordinated Shared Networks (CSN) 1 White Paper: Control Plane Implementation on Coordinated Shared Networks (CSN) Philippe Klein, PhD Broadcom Corporation philippe@broadcom.com V.01 Nov

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

MPLS-based Metro Ethernet Networks A Tutorial

MPLS-based Metro Ethernet Networks A Tutorial MPLS-based Metro Ethernet Networks A Tutorial Paresh Khatri Jan, 2010 MPLS-based Metro Ethernet Networks Paresh Khatri Director, Advanced Consulting Engineering 2 MPLS-based Metro Ethernet Networks, January

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Ethernet CFM Over VPLS Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking

More information

Carrier Ethernet Services

Carrier Ethernet Services CHAPTER 6 The following topics describe how you can use Cisco ANA to monitor Carrier Ethernet services. Supported Carrier Ethernet Technologies, page 6-1 VLANs, page 6-2 STP, page 6-5 Cisco REP, page 6-6

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Figure 7-1 Unicast Static FDB window

Figure 7-1 Unicast Static FDB window 7. Layer 2 Features FDB VLAN Spanning Tree Loopback Detection Link Aggregation L2 Multicast Control LLDP FDB Static FDB Unicast Static FDB This window is used to view and configure the static unicast forwarding

More information

TRILL Transparent Transport over MPLS

TRILL Transparent Transport over MPLS TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties

Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties CHAPTER 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Ethernet

More information

MPLS-based Metro Ethernet Networks

MPLS-based Metro Ethernet Networks MPLS-based Metro Ethernet Networks A Tutorial Paresh Khatri paresh.khatri@alcatel-lucent.com.au Agenda 1. Introduction 2. Introduction to Metro Ethernet Services 3. Traditional Metro Ethernet networks

More information

Implementing IEEE 802.1ah Provider Backbone Bridge

Implementing IEEE 802.1ah Provider Backbone Bridge Implementing IEEE 802.1ah Provider Backbone Bridge This module provides conceptual and configuration information for IEEE 802.1ah Provider Backbone Bridge on Cisco ASR 9000 Series Routers. The IEEE 802.1ah

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 05 MULTIPROTOCOL LABEL SWITCHING (MPLS) AND LABEL DISTRIBUTION PROTOCOL (LDP) 1 by Xantaro IP Routing In IP networks, each router makes an independent

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) What you will learn Techniques for QoS Integrated Service (IntServ) Differentiated Services (DiffServ) MPLS QoS Design Principles 1/49 QoS in the Internet Paradigm IP over everything

More information

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3 Lab 1: Static MPLS First lab gives a basic understanding of MPLS label swapping No signaling manually assign labels like static routing Understand configuration, forwarding tables, and debugging of MPLS

More information

Hands-On VPLS: Virtual Private LAN Service

Hands-On VPLS: Virtual Private LAN Service Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of

More information

Technical Specification MEF 13. User Network Interface (UNI) Type 1 Implementation Agreement. November, 2005

Technical Specification MEF 13. User Network Interface (UNI) Type 1 Implementation Agreement. November, 2005 Technical Specification User Network Interface (UNI) Type 1 Implementation Agreement November, 2005 Disclaimer The information in this publication is freely available for reproduction and use by any recipient

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

Table of Contents Chapter 1 MSTP Configuration

Table of Contents Chapter 1 MSTP Configuration Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation

More information

By Masaki UMAYABASHI,* Nobuyuki ENOMOTO,* Youichi HIDAKA,* Daisaku OGASAHARA,* Kazuo TAKAGI* and Atsushi IWATA*

By Masaki UMAYABASHI,* Nobuyuki ENOMOTO,* Youichi HIDAKA,* Daisaku OGASAHARA,* Kazuo TAKAGI* and Atsushi IWATA* Special Issue on IT/Network Integrated Solution UNIVERGE Papers on the Next Step of UNIVERGE : Toward the Future High Reliable Ethernet Technologies: Global Open Ethernet By Masaki UMAYABASHI,* Nobuyuki

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

Ethernet Services over Mobile WiMAX

Ethernet Services over Mobile WiMAX WIMAX: A TECHNOLOGY UPDATE Ethernet Services over Mobile WiMAX Max Riegel, Nokia Siemens Networks ATRACT Ethernet services represent a steadily growing portion of the fixed telecommunication market. To

More information

Internet Engineering Task Force (IETF) Request for Comments: 6373 ISSN: L. Fang, Ed. Cisco N. Bitar, Ed. Verizon E. Gray, Ed.

Internet Engineering Task Force (IETF) Request for Comments: 6373 ISSN: L. Fang, Ed. Cisco N. Bitar, Ed. Verizon E. Gray, Ed. Internet Engineering Task Force (IETF) Request for Comments: 6373 Category: Informational ISSN: 2070-1721 L. Andersson, Ed. Ericsson L. Berger, Ed. LabN L. Fang, Ed. Cisco N. Bitar, Ed. Verizon E. Gray,

More information

DetNet. Flow Definition and Identification, Features and Mapping to/from TSN. DetNet TSN joint workshop IETF / IEEE 802, Bangkok

DetNet. Flow Definition and Identification, Features and Mapping to/from TSN. DetNet TSN joint workshop IETF / IEEE 802, Bangkok DetNet Flow Definition and Identification, Features and Mapping to/from TSN DetNet TSN joint workshop IETF / IEEE 802, Bangkok Balázs Varga 2018-11-11 DetNet - Data plane and related functions Page 1 Balázs

More information

Multiprotocol Label Switching Overview

Multiprotocol Label Switching Overview This chapter describes the Multiprotocol Label Switching (MPLS) distribution protocol. MPLS is a high-performance packet forwarding technology that integrates the performance and traffic management capabilities

More information

Alternative Multiple Spanning Tree Protocol (AMSTP) for Optical Ethernet Backbones

Alternative Multiple Spanning Tree Protocol (AMSTP) for Optical Ethernet Backbones Alternative Multiple Spanning Tree Protocol (AMSTP) for Optical Ethernet Backbones Guillermo Ibáñez, Alberto García, Arturo Azcorra Dpto. Ingeniería Telemática Escuela Politécnica Superior Universidad

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

Implementing Multiple Spanning Tree Protocol

Implementing Multiple Spanning Tree Protocol Implementing Multiple Spanning Tree Protocol This module provides conceptual and configuration information for Multiple Spanning Tree Protocol on Cisco ASR 9000 Series Routers. Multiple Spanning Tree Protocol

More information

Practice exam questions for the Nokia NRS II Composite Exam

Practice exam questions for the Nokia NRS II Composite Exam Practice exam questions for the Nokia NRS II Composite Exam The following questions will test your knowledge and prepare you for the Nokia NRS II Composite Exam. Compare your responses with the Answer

More information

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 4 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information advertisement 8 Inter-AS VPN

More information

Configure Virtual LANs in Layer 2 VPNs

Configure Virtual LANs in Layer 2 VPNs The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of

More information

Table of Contents 1 Multicast VPN Configuration 1-1

Table of Contents 1 Multicast VPN Configuration 1-1 Table of Contents 1 Multicast VPN Configuration 1-1 Multicast VPN Overview 1-1 Introduction to MPLS L3VPN 1-1 Introduction to Multicast VPN 1-2 Introduction to MD-VPN 1-4 Protocols and Standards 1-7 How

More information

Cisco CPT Packet Transport Fabric 256G Fabric Card with 4x10GE

Cisco CPT Packet Transport Fabric 256G Fabric Card with 4x10GE Data Sheet Cisco CPT Packet Transport Fabric 256G Fabric Card with 4x10GE The Cisco Carrier Packet Transport (CPT) 200 and 600 sets the industry benchmark as a carrier-class converged access and aggregation

More information

Traditional network management methods have typically

Traditional network management methods have typically Advanced Configuration for the Dell PowerConnect 5316M Blade Server Chassis Switch By Surendra Bhat Saurabh Mallik Enterprises can take advantage of advanced configuration options for the Dell PowerConnect

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015 .. MPLS Multi Protocol Label Switching (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 4.3, 2015/03/09 13:07:57) Thursday, March 12, 2015 Karst Koymans (UvA) MPLS

More information