ETHERNET Transport Service in Wide Area Network

Similar documents
Deploying MPLS L2VPN

Configuring Virtual Private LAN Services

Cisco CPT Packet Transport Module 4x10GE

L2 VPNs. Javed Asghar Muhammad Waris Sagheer 2005, Cisco Systems, Inc. All rights reserved.

Numerics I N D E X. AAL (ATM Adaptation Layer), AAL5 CPCS-SDU mode,

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

Ethernet. Access Technologies 2 Moldován István. Department of Telecommunications and Media Informatics

Implementing Virtual Private LAN Services

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

H-VPLS N-PE Redundancy for MPLS Access

L2VPN Interworking. Finding Feature Information

Cisco CPT Packet Transport Fabric 256G Fabric Card with 4x10GE

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Introduction to Multi-Protocol Label

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Hands-On Metro Ethernet Carrier Class Networks

Request for Comments: Cisco Systems, Inc. September Framework for Layer 2 Virtual Private Networks (L2VPNs)

VPLS Autodiscovery: BGP Based

AToM (Any Transport over MPLS)

Cisco Carrier Packet Transport (CPT) 50 Series

Configuring Ethernet OAM, CFM, and E-LMI

Configure L2VPN Autodiscovery and Signaling

MPLS design. Massimiliano Sbaraglia

Ethernet Connectivity Fault Management

Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties

Ethernet Virtual Connections Configuration

L2VPN Protocol-Based CLIs

Configure Multipoint Layer 2 Services

Carrier Ethernet Services

Module 11b MPLS VPLS Configuration Lab (LDP Manual)

Free4Torrent. Free and valid exam torrent helps you to pass the exam with high score

Enabling the Experience Provider Transition at the Network Layer

MPLS Network Management MPLS Japan Ripin Checker, Product Manager, Cisco Systems

MPLS: Layer 2 VPNs, Configuration Guide, Cisco IOS Release 15S

Configuring Routed Pseudowire and VPLS

Network Configuration Example

Emerging MPLS OAM mechanisms

MPLS-based Metro Ethernet Networks A Tutorial

Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture

Configuring MPLS L2VPN

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Configuring MPLS L2VPN

Configuring Ethernet OAM, CFM, and E-LMI

Metro Ethernet Design and Engineering for CO

Configuring Ethernet OAM, CFM, and E-LMI

Frame Relay over L2TPv3

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

Cisco.Actualtests v by.Tomer.76q. Exam Code:

Configuring Ethernet Connectivity Fault Management in a Service Provider Network

MC-LAG to VPLS Technology and Solution Overview

Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM

Ethernet OAM Overview. Dinesh Mohan Nortel Networks Oct 15, 2004

Configuring MPLS L2VPN

Carrier Ethernet Evolution

MPLS-based Metro Ethernet Networks

Ethernet Operation Administration and Maintenance Deliverable 2010

IEEE 802.1ah on Provider Backbone Bridges

Module 11a MPLS VPWS Configuration Lab (LDP)

MPLS-based Metro Ethernet Networks A Tutorial. Paresh Khatri

Pseudo Wire Emulation Edge to Edge (PWE3) and Multi-Protocol Label Switching (MPLS)

Cisco.Actualtests v by.Dekbie.126q. Exam Code:

Configuring Ethernet CFM and E-LMI

Selftestengine (76Q) Cisco Implementing Cisco Service Provider Next-Generation Egde Network Services

The Cisco ASR 9000 Series Routers Carrier Ethernet Model

TRILL Transparent Transport over MPLS

Configuring MPLS and EoMPLS

L2VPN Pseudowire Switching

Designing Next Generation Carrier Ethernet Access Network. Benjamin Lee Session ID 20PT Consulting Systems Engineer

Configuring Layer 2 Local Switching

The Role of MPLS-TP in Evolved packet transport

Developing Standards for Metro Ethernet Networks

Configuring Ethernet OAM

L2 MPLS VPN (VPLS) Technology White Paper

Configuring MPLS Transport Profile

Ethernet Local Management Interface

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems.

Introduction to Layer Transport and Tunneling Technologies (L2VPNs) ACC _06_2003_X. 2003, Cisco Systems, Inc. All rights reserved.

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0

Configuring Ethernet OAM

Configuration and Management of Networks. Pedro Amaral

Building Carrier Ethernet Services Using Cisco Ethernet Virtual Circuit (EVC) Framework

Ethernet Service Provision (ESP)

Configuring Ethernet OAM and Connectivity Fault Management

Loop-IP6763 TDMoEthernet Aggregator

Ethernet based Broadband Access Networks

INDEX. ATM overview. bert pattern command HC-402, HC-404 buckets archive command HC-169 bundle command HC-543 Bundle-Ether command HC-215 HC-58 HC-13

Configuring Ethernet CFM

Hands-On VPLS: Virtual Private LAN Service

Configure Virtual LANs in Layer 2 VPNs

VPLS configuration commands

Ethernet OAM Technology White Paper

Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS

INDEX AR HR IR MCR MNR MPR NFR QR RR SMR SR VPR

Configuring Ethernet CFM for the Cisco ASR 1000 Router

WAN Edge MPLSoL2 Service

Deploying Carrier Ethernet Features on Cisco ASR 9000 BRKSPG-2202

Configuring Ethernet CFM for the Cisco ASR 1000 Router

BGP Support for the L2VPN Address Family

Transcription:

ETHERNET Transport Service in Wide Area Network Bertrand Duvivier 14 January 2005 1

Ethernet in WAN? Customer 1 Customer 2 Customer 2 Customer 3 Provider Customer 2 Customer 1 Customer 1 Customer 3 2

Why and what is Ethernet in WAN Ethernet is cost effective High BW Frame based protocol Well known protocol by end-customers --- YES, in LAN or MAN --- 3

Ethernet in WAN Some scenarios Customer Equipment U-PE A Native Ethernet U-PE B Access N-PE 1 N-PE 2 SP Network Core MPLS PW N-PE 3 U-PE D SONET/SDH N-PE 4 MPLS U-PE C Ethernet UNI Ethernet UNI 4

In WAN Ethernet required Architecture/Services (ITU-T & MEF) - General Architecture - QoS - Performance and Services definition How to transported Ethernet over Wan (IETF and IEEE) - Over IP/MPLS PWE3, VPLS - Provider Bridge (QinQ, M/RSTP) IEEE-802.1AD, Tools (IEEE & IETF) - UNI Signaling E-LMI - Link OAM s (Physical) IEEE-802.3AH - Service OAM s (Mac) IEEE-802.1AG - PWE3 and VPLS OAM s IETF-VCCV, IETF-VPLS-OAM - Autodiscovery IETF- LDP/BGP/RADIUS/LDAP Scalability (IEEE & IETF) - MAC scalability IEEE-802.1AK - Maybe new way VPLSv2 idea in consideration 5

Ethernet WAN and Standard bodies Customer 1 Customer 2 Customer 2 Customer 3 Provider Customer 2 Customer 1 Customer 1 Customer 3 6

Standard bodies involved in ETHERNET transport over WAN 7

Two main IETF working groups PWE3 (draft-ietf-pwe3 ) Focusing on L2 point-to-point circuit emulation encapsulation and service emulation of pseudo wires FR, ATM, Ethernet, PPP, HDLC L2VPN (draft-ietf-l2vpn ) Focusing on service provisionning Thru multiple point-to-point: VPWS Thru bridged L2 multi-points: VPLS Thru routed L2 Multi-points: IPLS 8

Emulated Ethernet Wire in WAN (IETF PWE3) Customer 1 Customer 2 Customer 2 Customer 3 Provider Customer 2 Customer 1 Customer 1 Customer 3 9

PWE3: VC Label distributed through directed LDP session VC1 PE1 xconnect <PE2> <VCID> NH: PE1 VC: VCID Label: A Circuit type: VLAN NH: PE2 VC: VCID Label: B Circuit type: VLAN PE2 VC2 xconnect <PE1> <VCID> draft-ietf-pwe3-control-protocol-xx.txt 10

PWE3: Label forwarding VLAN 101 B B L30 B L25 B L20 B B VLAN 101 draft-ietf-pwe3-ethernet-encap-xx.txt 11

Ethernet 802.1q VLAN Transport Interface GigabitEthernet0/0.2 encapsulation dot1q 41 xconnect 172.0.0.7 312 pw-class ethernet-mpls! Interface GigabitEthernet1/0.2 encapsulation dot1q 56 xconnect 172.0.0.7 313 pw-class ethernet-mpls MPLS VLAN 56 Customer Site VLAN 41 PE1 172.0.0.4 PE1 172.0.0.7 VLAN 41 VLAN 56 Customer Site Customer Site Interface GigabitEthernet0/0.2! encapsulation dot1q 41 Customer Site xconnect 172.0.0.4 312 pw-class ethernet-mpls Interface GigabitEthernet1/0.2 encapsulation dot1q 56 xconnect 172.0.0.4 313 pw-class ethernet-mpls 12

Ethernet LAN emulated in WAN Customer 1 Customer 2 Customer 3 Customer 2 Customer 1 - Basic (IETF VPLS) Customer 2 Customer 3 Provider Customer 1 draft-ietf-l2vpn-vpls-ldp-xx.txt (LDP based) draft-ietf-l2vpn-vpls-xx.txt (BGP based) 13

VPLS ( Transparent LAN Services) - The network will simulate a L2 switch 14

Virtual Forwarding Instance VFI is a virtual bridge group Table instances per customer and per Customer VLAN performs on a per Emulated VC basis: Learning/aging of MAC address Flooding Forwarding (unicasting, broadcasting, multicasting) Running Spanning Tree Protocol (STP) if needed distributed VSI s interconnexion Full-mesh of Emulated VCs per VPLS. - Encap. based on PWE3 Network split-horizon to prevent loops 15

VPLS Building blocks PE VFI -2 PE VFI Emulated VC -1 Emulated Tunnel Attachment VC PE VFI Attachment Tunnel Attachment Tunnels Extension VC - 1Q in 1Q (L2 tunnel) - Pseudo-Wired (L3 tunnel) Attachment VC -3 PE-CLE -1Q (L2 tunnel) - Pseudo-Wired (L3 tunnel) -4 16

H-VPLS flavors Access: 802.1ad Provider Bridges U-PE1 N-PE1 VPLS Core: Full Mesh of PW H-VPLS w/ MPLS to the edge Active PW U-PE1 Other N-PE1 Split- Horizon Ethernet bridges Standby PW N-PE2 H-VPLS w/ Ethernet access IEEE 802.1ad Provider Bridges in the Access running 802.1s/w MSTP/RSTP, VPLS core (full-mesh of PW w/ splithorizon for loop-avoidance Access: H&S PW Overlay N-PE2 MPLS edge and core VPLS Core: Full Mesh of PW Full-mesh of PW in core, splithorizon Hub & Spoke access PW for access. Only one PW per U- PE active at a time 17

Ethernet TOOLS Customer 1 Customer 2 Customer 3 Customer 2 Customer 1 - Auto-discovery Customer 2 Provider Customer 1 Customer 3 18

Goals for this short talk Introduce some new L2VPN authorization concepts Provide context for these within L2VPN/VPLS autodiscovery Provide some examples of how AUTODISCOVERY could be used for L2VPN authorization and zerotouch provisioning. 19

L2VPN Authorization Steps 1. /AC Authorization Attachment Circuit to VPN ID PE 2. VPN Authorization VPN ID to PE Membership 3. PW Authorization PE Membership to PW signaling Each step is independent and may be performed by any combination of local configuration, RADIUS, BGP, etc. 20

PE Auto-discovery vs. zero touch provisioining PE Auto-discovery Focus on Authorization Step 2 only. PEs speak to one another (via BGP or some other routerrouter protocol) and discover their topology. Targeted at VPLS only Zero-touch provisioning Maps the identity of a or AC to a service. Applies to VPWS (ATM, FR, Ethernet, etc), VPLS, IPLS, etc. All service mappings reside in a RADIUS database. Router dynamically receives config for circuits which are active 21

Zero-touch authorization PE is deployed with very simple config, pointing towards a RADIUS/LDAP server Interfaces are designed to detect a First Sign of Life (FSOL). For PVCs, this could be the first data packet received on a given circuit. For SVCs, -PE signaling (EAP 802.1x, ILMI, etc). When the FSOL occurs, a string serving as identity for the interface or is sent to the RADIUS server for authorization. The RADIUS server returns interface parameters, VPN membership, Pseudowire setup information, etc. 22

L2VPN Authorization Schema Router ID + Interface name, SAI, or Identity AGI (VPN ID) Router ID + SAII AC Record SAI (AGI+SAII) Service Type (VPLS, VPWS, IPLS, etc) Circuit-specific Parameters (QoS, etc) VPN Record PE Router ID + SAII, PE Router ID + SAII, PE Router ID + SAII Pseudowire Record PW-specific parameters (TE Tunnel mapping, DSCP Setting, etc). Defined using IETF Single-Sided Signaling nomenclature 3 records in schema does not necessarily imply 3 offbox transactions 23

Collapsed Schema Router ID + Interface name, SAI, or identity Auth Record SAI (AGI+SAII) Service Type Circuit-specific Parameters (QoS, etc) PE Router ID + SAII PE Router ID + SAII PE Router ID + SAII PW-specific parameters (Preferred-path, PW-specific parameters DSCP Setting, (Preferred-path, PW-specific etc). parameters DSCP Setting, (Preferred-path, etc). DSCP Setting, etc). Parameters collapsed into single record to reduce the quantity of RADIUS transactions Particularly suited for VPWS, or VPLS with a limited number of PEs. Generic rule for PW setup: If Router ID from Auth Record is different from the local Router ID, use SAI as TAI in PW signaling (LDP) 24

Solutions for Auto-discovery Auto-discovery Protocols AC Authorization VPN Authorization PW Authorization LDP (pt-pt prtl) BGP (pt-mpt prtl) RADIUS (server based prtl) LDAP (server based prtl) No YES YES No YES No (or via LDP) YES YES YES YES YES YES 25

Ethernet TOOLS Customer 1 Customer 2 Customer 3 Customer 2 Customer 1 -OAM s Customer 2 Provider Customer 1 Customer 3 26

OAM Requirements for monitoring: First: Possibility to monitor the E2E connectivity ( to ) Possibility to do fault detection (segment monitoring (AC, PW)) Second: Performance management for E2E services (delay, loss, etc ) An EMEA PTT Presentation_ID 2004, 2003 Cisco Systems, Inc. All rights reserved. 27

Problem Domain Some scenarios (not even close to comprehensive) Customer Equipment Physical link failure UNI port failure Ethernet UNI U-PE device failure U-PE A Native Ethernet U-PE B Access Physical link failure N-PE 1 N-PE 2 N-PE device failure SP Network Core MPLS PW PW failure VFI failure D-LDP session failure N-PE 3 N-PE 4 P-Router failure SONET/SDH MPLS VC failure U-PE D U-PE C Physical link failure Ethernet UNI VLAN to VFI xconnect failure Duplex mismatch AC failure Speed mismatch 28

OAM & Layering Customer Equipment U-PE A Native Ethernet Access N-PE 1 SP Network Core MPLS N-PE 3 SONET/SDH U-PE D U-PE B N-PE 2 N-PE 4 MPLS U-PE C Bridge Bridge Bridge Router Router Router Router XC Router Bridge Layer 2 Layer 1 Layer 2 Layer 1 Native Ethernet EoMPLS EoSONET/SDH Native Ethernet (over dark fiber) (over dark fiber) Bridge Bridge Bridge Router Router Router Router Router Router Bridge Native Ethernet (over dark fiber) EoMPLS EoMPLS Native Ethernet (over dark fiber) 29

E-OAM and LMI: Where they play Connectivity Fault Management Customer Equipment E-LMI Ethernet UNI U-PE A Native Ethernet U-PE B Access Ethernet Link OAM N-PE 1 N-PE 2 SP Network Core MPLS PW PWE3-OAM VCCV, VPLS-OAM N-PE 3 N-PE 4 SONET/SDH MPLS U-PE D U-PE C Ethernet UNI E-LMI: configuration, L2 connectivity management Link-Layer OAM: Per Link OAM s Connectivity Fault Management: Per Service/VLAN OAM s PWE3 OAM s : draft-ietf-pwe3-vccv-xx.txt SDH OAM Performance Management : ITU-T working group 30

Standard Bodies and Forums Several standard bodies are working on Ethernet CFM ITU-T SG 13 IEEE Ethernet Layer Network Architecture (G.8010 SG 15) Ethernet OAM Functionality (Y.ethoam SG 13) Requirements for OAM functions in Ethernet based networks (Y.1730 SG 13) 802.3ah Ethernet in the First Mile (Physical OAM) 802.1ag Connectivity Management (Per VLAN OAM) MEF began the work on fault management and has deferred the detailed work to the other standards bodies IETF is tracking the work in fault management, in the other standards bodies, in the context of PWE3, VPLS MFA is defining OAM-Interworking as part of their MPLS- Interworking models These standard bodies share common membership and are cooperating fully Cisco has strong presence in all of these organizations 31

Link OAM (IEEE 802.3ah) Customer Equipment Link OAM Ethernet UNI U-PE A Native Ethernet U-PE B Access N-PE 1 N-PE 2 SP Network Maintain consistency of an Core Ethernet transport connection (per link, or physical N-PE 3 U-PE OAM) D MPLS SONET/SDH Address three key operational issues when deploying Ethernet PW across geographically disparate N-PE 4 MPLS U-PE C locations Operates on a single Ethernet point-topoint link between 2 UNI devices Slow protocol using packets called OAMPDUs which are never forwarded, or include in preamble. Standardized as part of IEEE 802.3ah (Ethernet in the first mile) 32

802.3ah OAM Key Functions Link monitoring basic error definitions for Ethernet so entities can detect failed and degraded connections Fault signaling mechanisms for one entity to signal another that it has detected an error Remote loopback used to troubleshoot networks, allows one station to put the other station into a state whereby all inbound traffic is immediately reflected back onto the link OAM Discovery Discover OAM support and capabilities per device 33

What is Ethernet Connectivity Fault Management? Edge Router ATM Switch ATM Switch Bridge Bridge Router Router Router Bridge ADM/DXC ADM/DXC Edge Bridge Ethernet over SDH Ethernet over MPLS 10G Ethernet Connectivity Fault Management: (From P802.1AG PAR) ATM RFC1483 L2 L1... protocols, procedures, and managed objects to support transport fault management... discovery and verification of the path, through bridges and LANs, taken for frames... detection and isolation of a connectivity fault to a specific bridge or LAN. 34

Different Service Domains result in different OAM Domains Customer Equipment U-PE A Native U-PE B Access Ethernet Operator 1 N-PE 1 N-PE 2 SP Network Core MPLS Operator 1 Operator PW 2 N-PE 3 U-PE D N-PE 4 Operator 3 Operator SONET/SDH3 MPLS Operator 4 U-PE C Service Provider Customer The Domain-Onion: Visibility of each domain is limited to its border elements with its peering domains and its own internal elements 35

Ethernet OAM Concepts: Maintenance Points Operator 3 Operator 1 Operator 2 Service Provider Operator 4 Maintenance Points (MP) IEEE MAC, Interface, Port Customer Maintenance End Points (MEP) MP located at the edge of a domain Maintenance Intermediate Points (MIP) MP located within a domain System administrators use MEPs to initiate and monitor CFM activity and report the results MIP passively receive and respond to CFM packets initiated by MEPs 36

Different views Operator and Provider: Nested MPs Operator 1 Operator 2 Operator 3 Provider Level View Service Provider Customer Operator 4 Operator Level View Operator 1 Operator 2 Service Provider Customer Operator 3 Operator 4 Each level s MEPs are the next-higher-level s MEPs and MIPs Each level s MIPs are invisible to all higher levels 37

Connection Management 4 Main Tools Eth Access MPLS Core MPLS Access Continuity Check Traceroute Loopback (Ping) Alarm Indication Signal (AIS) 38

Fault Detection: Continuity Check Each U-PE broadcast CC message periodically to all members of a service instance Island A LAN Emulation for Orange Service Instance N-PE Island B Agg U-PE U-PE Agg N-PE N-PE Agg U-PE U-PE Agg N-PE Island C N-PE Agg U-PE U-PE, Agg, and N-PE are all Provider Bridges (PBs) N-PE Agg U-PE 39

Fault Verification: Loopback Test Island B Segment Loopback N-PE Agg U-PE Island A U-PE Agg N-PE N-PE Agg U-PE U-PE Agg N-PE Island C N-PE Agg U-PE End-to-End Loopback N-PE Agg U-PE 40

Fault Isolation: Path Trace Island B N-PE Agg U-PE Island A U-PE Agg N-PE N-PE Agg U-PE U-PE Agg N-PE Island C N-PE Agg U-PE N-PE Agg U-PE 41

Alarm Indication Signal Customer Service Provider Customer MPLS Core Eth Access EoS Access AIS Customer Domain Provider Domain AIS Service OAM AIS path Operator1 Domain Operator 2 Domain Operator3 Domain SDH AIS Network OAM MEP MIP MPLS Domain PW/MPLS OAM SDH/SONET OAM SONET/SDH Domain SDH RDI 42

Ethernet TOOLS Customer 1 Customer 2 Customer 3 Customer 2 Customer 1 - E-LMI Customer 2 Provider Customer 1 Customer 3 43

Ethernet LMI Customer Equipment E-LMI Ethernet UNI U-PE A Native Ethernet U-PE B Access N-PE 1 N-PE 2 SP Network Core Enables service providers to reduce customer N-PE 3 U-PE D configuration MPLS errors, as well SONET/SDH as improve EVC performance by PWshaping on egress N-PE 4 MPLS U-PE C Eases deployment for service providers Ethernet UNI Reduces the policing configurations required on Metro Ethernet gear 44

Ethernet LMI Customer Equipment E-LMI U-PE A Native Ethernet U-PE B Access N-PE 1 N-PE 2 An LMI may be used to signal various SP Network parameters regarding a service to a Core customer device from a PE device N-PE 3 U-PE D MPLS Three Types of Information SONET/SDH PW EVC Status Configuration Data N-PE 4 MPLS U-PE C Provisioning Data Ethernet UNI Technical approach Ethernet based UNI on Frame Relay LMI Part of MEF UNI Type 2 (beyond standard Ethernet) Can leverage to develop E-NNI (similar protocol, but symmetric) 45

Ethernet LMI Customer Equipment E-LMI U-PE A Native Ethernet U-PE B Access N-PE 1 N-PE 2 1. Auto-configure C-VLAN/EVC Mapping SP Network Core 2. Improve N-PE 3 performance U-PE D by MPLS traffic SONET/SDH shaping based on bandwidth profiles PW 3. Reroute if EVC failure N-PE 4 MPLS U-PE C Ethernet UNI UNI-based attributes EVC based attributes Ethernet UNI 1. C-VLAN/EVC Mapping 2. Bandwidth profiles: Per Port, Per EVC, Per CoS 3. EVC status 46

Ethernet in WAN Customer 1 Customer 2 Customer 3 Customer 2 Customer 1 Summary Customer 2 Provider Customer 1 Customer 3 47

Ethernet in WAN summary Not just about emulated Ethernet over IP/MPLS Other points are as mush important - Auto-discovery - AOM s - Signaling (E-LMI) - QoS - Scalability (MAC, VSI, PWE3) - Integration with existing (xdsl, FR/ATM Interworking) 48

Presentation_ID 49

Comparing H-VPLS: Local Switching U-PE A N-PE 1 U-PE A N-PE 1 U-PE B H-VPLS w/ Ethernet Access U-PE A N-PE 1 U-PE B U-PE A H-VPLS w/ MPLS to the edge N-PE 1 Local Switching within the access domain: Optimal traffic flow, PE not involved Remember: Metro 80/20 rule: 80% of the traffic stays local Traffic always first passed from U-PE to N-PE 50

Comparing H-VPLS: Multicast Distribution N-PE 1 N-PE 1 H-VPLS w/ Ethernet Access H-VPLS w/ MPLS to the edge Efficient Broadcast/ Multicast distribution native Ethernet. Distributed replication All Multicast/Broadcast traffic replicated only by the N-PE and sent to all attachment PW in the access: Significant load on the N-PE (which also does replication towards the core) 51

Redundant Access of STP-Islands to the Core: The IETF/IEEE approach 802.1s MSTP IETF/IEEE (Cisco planned support) Other solutions VirtualBridge U-PE1 N-PE1 U-PE1 N-PE1 N-PE2 N-PE2 Per Island Instance for BPDUs only Standard 802.1s Per Access Island BPDU Instance Constrained topology Emulates Virtual Core Bridge to avoid Loops Non-Standard Implementation Results in non-optimal traffic flows and topological constrains the standard solution does not show 52