Multicast in VPLS draftraggarwal 2 vpnvplsmcast00 txt Rahul

  • Slides: 15
Download presentation
Multicast in VPLS draft-raggarwa-l 2 vpn-vpls-mcast-00. txt Rahul Aggarwal (Juniper) Yuji Kamite (NTT) Luyuan

Multicast in VPLS draft-raggarwa-l 2 vpn-vpls-mcast-00. txt Rahul Aggarwal (Juniper) Yuji Kamite (NTT) Luyuan Fang (AT&T) Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 1

Co-Authors § Yakov Rekhter (Juniper) § Chaitanya Kodeboniya (Juniper) Copyright © 2004 Juniper Networks,

Co-Authors § Yakov Rekhter (Juniper) § Chaitanya Kodeboniya (Juniper) Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 2

Agenda § Update since last IETF § Limitations of existing VPLS proposals for Multicast

Agenda § Update since last IETF § Limitations of existing VPLS proposals for Multicast § VPLS Multicast Architecture – where do the various drafts fit § Avoiding PIM snooping on the PWs § Use of P-Multicast Trees § Conclusion Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 3

Update Since Last IETF § Part of the work was presented in this WG

Update Since Last IETF § Part of the work was presented in this WG at the last IETF when it was part of draft-raggarwal 3 vpn-mvpn-vpls-mcast-01. txt § The VPLS mechanisms are now in a separate new draft as per WG feedback Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 4

Current VPLS proposals: § “Virtual Private LAN Service” (draft-ietf-l 2 vpnvpls-bgp) § “Virtual Private

Current VPLS proposals: § “Virtual Private LAN Service” (draft-ietf-l 2 vpnvpls-bgp) § “Virtual Private LAN Services over MPLS” (draftietf-l 2 vpn-vpls-ldp) § Limitations of these proposals for VPLS multicast… Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 5

Limitations of current VPLS proposals for VPLS Multicast § Do not allow the use

Limitations of current VPLS proposals for VPLS Multicast § Do not allow the use of P-Multicast Trees for VPLS multicast data traffic • Desirable for optimizing bandwidth efficiency § PEs with VPLS sites that do not have receivers in a given multicast customer (S, G) receive traffic for that multicast stream § Focus on optimizing state and not bandwidth. Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 6

Design Objectives for multicast support in VPLS service (not a complete list) Optimize Bandwidth:

Design Objectives for multicast support in VPLS service (not a complete list) Optimize Bandwidth: § A given customer (multicast) packet should traverse a given service provider link at most once § Deliver customer multicast traffic to only PEs that have (customer) receivers for that traffic § Deliver customer multicast traffic along the “optimal” paths within the service provider (from the ingress PE to the egress PEs) Optimize State: • The amount of state within the service provider network required to support Multicast in VPLS service should be no greater than what is required to support unicast in VPLS service • The overhead of maintaining the state to support Multicast in VPLS service should be no greater than what is required to support unicast in VPLS service Optimizing Bandwidth and State are conflicting goals Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 7

VPLS Multicast Architecture Control Plane § VPLS Auto-Discovery • Use existing VPLS auto-discovery mechanisms

VPLS Multicast Architecture Control Plane § VPLS Auto-Discovery • Use existing VPLS auto-discovery mechanisms § Allow elimination of flooding • PE-CE snooping – draft-serbest-l 2 vpn-vpls-mcast • In VPLS a PE does not maintain a layer 2 adjacency with a CE • PE-PE reliable exchange of multicast control messages • Allow avoiding PIM-IGMP snooping overhead on PWs • PIM with reliability extensions or • BGP • Draft-raggarwa-l 2 vpn-vpls-mcast- Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 8

VPLS Multicast Architecture Data Plane Tree = PIM, RSVP-TE P 2 MP LSPs, Receiver

VPLS Multicast Architecture Data Plane Tree = PIM, RSVP-TE P 2 MP LSPs, Receiver Initiated P 2 MP LSPs Separate Tree per-set-of VPLSs “Inclusive Mapping” Separate Tree per-set-of C-(S, G)s “Selective Mapping” Ingress Replication State = Unicast VPLS Separate Tree for Every C-(S, G) Aggregate State Unbounded State Increasing P-router state and Bandwidth efficiency Decreasing P-router state and Bandwidth efficiency Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 9

PIM snooping – implications on the state maintenance on PE routers § PE router

PIM snooping – implications on the state maintenance on PE routers § PE router has to maintain (S, G) state at least for all the (S, G) received from all the local CEs • E. g. , assume PE with 1, 000 CEs/sites, each VPLS site has at any given point in time on average receivers for 3 groups, PE has to maintain at least 3, 000 (S, G) entries § PE router maintains (S, G) state by processing PIM Join messages received from (a) all sites of VPLSs connected to that PE, AND (b) all the remote PEs that have members of these VPLSs • E. g. , assume PE router with 1, 000 CEs/sites, each VPLS site has at any given point in time on average receivers for 3 group, each group is present on average in 10 sites, PE router has to process ~300 PIM Join per second, and ~900 (S, G) entries per second in a steady state • due to periodic PIM Join and PIM Join suppression Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 10

Avoiding PIM Snooping on PWs Reliable Exchange of Multicast Control Messages between PEs VPLS

Avoiding PIM Snooping on PWs Reliable Exchange of Multicast Control Messages between PEs VPLS A Site 4 CE-A 4 PE 4 VPLS A Site 1 PIM Join C-S, C-G – Snooped at PE 1 CE -A 1 PE 2 VSIA VPLS B Site 3 CE-B 3 VSI-A VSIA VRF-B PE 1 VPLS B Site 1 VSI-B RR CE-B 1 VSI-B Copyright © 2004 Juniper Networks, Inc. CE-A 3 VPLS A Site 3 PE 3 CE-B 2 PEs have I-BGP Peering Only With the RR BGP MVPN Routing Information Update: <RD, C-S, C-G, Originator PE – PE 1 Upstream PE – PE 2, RT> C-S -> C-G VSI-A CE-A 2 VPLS A Site 2 VPLS B Site 2 Proprietary and Confidential www. juniper. net 11

VPLS Multicast Data Plane Tunnels § SP Multicast Trees • Draft-raggarwa-l 2 vpn-vpls-mcast •

VPLS Multicast Data Plane Tunnels § SP Multicast Trees • Draft-raggarwa-l 2 vpn-vpls-mcast • Aggregate Trees (Inclusive Mapping) • Aggregate Data Trees (Selective Mapping) • Use PE-CE snooping and PE-PE Reliable multicast message exchange § Ingress Replication • Existing VPLS proposals AND • PE-CE snooping and PE-PE Reliable multicast message exchange Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 12

Aggregate P-Multicast Trees § Allow one P-multicast Tree to be shared across multiple VPLSs

Aggregate P-Multicast Trees § Allow one P-multicast Tree to be shared across multiple VPLSs § Can be setup using PIM or P 2 MP MPLS TE • No architectural limitation on the P-multicast tree technology § Requires a MPLS label to demultiplex a particular VPN • ‘Upstream’ label allocation by the root of the tree • Egress PEs maintain a separate label space for each P-multicast tree root § State grows less than linearly with number of VPLSs • Some efficiency of multicast routing may be sacrificed Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 13

VPLS Multicast Data Plane P-Multicast Trees (Inclusive Mapping) VPLS A Site 4 CE-A 4

VPLS Multicast Data Plane P-Multicast Trees (Inclusive Mapping) VPLS A Site 4 CE-A 4 PE 4 VPLS A Site 1 CE -A 1 PE 2 VSI-A VPLS B Site 3 CE-B 3 VSI-A VSI-B PE 1 VPLS B Site 1 VSI-B CE-B 1 RR VSI-B CE-A 3 VPLS A Site 3 PE 3 CE-B 2 VPLS Membership Discovery: <Aggregation Capability> eg PE 1 Aggregate Tree – PE 2 as Root C-S -> C-G VSIA CE-A 2 VPLS A Site 2 VPLS B Site 2 BGP Signaled VPLS – Tree Binding: <RD, Root PE, Upstream Label, RT, Tree Identifier> Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 14

Conclusion § Comments ? Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.

Conclusion § Comments ? Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www. juniper. net 15