A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone
Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer.
Virtual Private LAN Services (VPLS) is quickly becoming the number one choice for many enterprises and service providers to deploy data communication networks. Alcatel-Lucent VPLS solution enables service providers to offer enterprise customers the operational cost benefits of Ethernet with the predictable QoS characteristics of MPLS.
Items Covered:
Building Converged Service Networks with IP/MPLS VPN Technology
IP/MPLS VPN Multi-Service Network Overview
Using MPLS Label Switched Paths as Service Transport Tunnels
Routing Protocol Traffi c Engineering and CSPF
RSVP-TE Protocol
MPLS Resiliency -- Secondary LSP
MPLS Resiliency -- RSVP-TE LSP Fast Reroute
Label Distribution Protocol
IP/MPLS VPN Service Routing Architecture
Virtual Leased Line Services
Virtual Private LAN Service
Hierarchical VPLS
High Availability in an IP/MPLS VPN Network
VLL Service Resiliency
VPLS Service Resiliency
VPLS BGP Auto-Discovery
PBB-VPLS
OAM in a VPLS Service Network
Inhaltsverzeichnis
Foreword xix
Introduction xxi
Part 1 IP/MPLS VPN Service Network Overview 1
Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3
1. 1 The Increasing Demands on Service Provider Networks 4
1. 2 MPLS Overview 6
1. 3 The MPLS Value Proposition 8
1. 4 MPLS Enables Converged Multi-Service Networks 11
1. 5 MPLS-Enabled Business VPN Services 13
Summary 17
Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19
2. 1 IP/MPLS Layer 2 VPN Requirements 20
2. 2 IP/MPLS Layer 2 VPN Services 21
2. 3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26
2. 4 IP/MPLS VPN-Enabled Applications 30
Summary 34
Part II IP/MPLS VPN Protocol Fundamentals 37
Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39
3. 1 Basic MPLS Concepts Review 40
3. 2 Label Switch Path Types 51
3. 3 LDP-LSP - LDP Label Distribution 54
3. 4 RSVP-TE LSPs 64
3. 5 Configuring RSVP-TE LSP 81
Summary 90
Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91
4. 1 Introducing Traffi c Engineering 92
4. 2 Introducing OSPF-TE 97
4. 3 Introducing IS-IS TE 112
4. 4 The CSPF Algorithm 119
4. 5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125
Summary 135
Chapter 5 RSVP-TE Protocol 137
5. 1 RSVP and RSVP-TE 138
5. 2 RSVP-TE Signaling Procedure 141
5. 3 RSVP-TE Messages and Objects 150
5. 4 Make-Before-Break (MBB) 176
5. 5 The RSVP-TE Hello Protocol 191
5. 6 Reducing RSVP Refresh Overhead 196
5. 7 RSVP MD5 Authentication 206
Summary 207
Chapter 6 MPLS Resiliency - Secondary LSP 209
6. 1 Ensuring Reliability with MPLS Resiliency 210
6. 2 An Overview of Primary and Secondary LSPs 211
6. 3 What Affects Convergence Performance? 217
6. 4 Rules for Selecting Secondary LSPs 222
6. 5 Case Study: Using Administrative Groups in Secondary LSPs 226
Summary 228
Chapter 7 MPLS Resiliency - RSVP-TE LSP Fast Reroute 231
7. 1 RSVP-TE LSP Resiliency 232
7. 2 Fast Reroute Overview 235
7. 3 Fast Reroute Architecture 244
7. 4 One-to-One Backup 259
7. 5 Facility Backup 267
7. 6 Manual Bypass Tunnel 283
Summary 288
Chapter 8 Label Distribution Protocol 291
8. 1 LDP Overview 292
8. 2 LDP Session Establishment and Management 292
8. 3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299
8. 4 LDP Messages and TLVs 304
8. 5 LDP over RSVP-TE Tunneling 307
Summary 334
Part III Ethernet VPN Services 337
Chapter 9 IP/MPLS VPN Service Routing Architecture 339
9. 1 IP/MPLS VPN Service Network Infrastructure 340
9. 2 Alcatel-Lucent Service Routing Architecture 347
9. 3 Service Access Point and SAP Components 360
9. 4 Service Distribution Paths and Transport Tunnels 365
9. 5 Multiple Forwarding Paths in the Same SDP 378
9. 6 Maximum Transmission Unit in a Service Network 391
9. 7 IP/MPLS VPN Service Implementation Overview 412
Summary 414
Chapter 10 Virtual Leased Line Services 415
10. 1 VLL Services Overview 416
10. 2 VLL Services Architecture 420
10. 3 Pseudowire Switching for VLL Services 434
10. 4 VLL Example: Epipe - Ethernet P2P VPN 445
10. 5 VLL Connection Admission Control 453
Summary 461
Chapter 11 Virtual Private LAN Service 463
11. 1 VPLS Service Overview 464
11. 2 VPLS Architecture 467
11. 3 VPLS Mesh-Pseudowires 476
11. 4 VPLS Service Access Points 487
11. 5 VPLS Forwarding Database Management 504
Summary 506
Chapter 12 Hierarchical VPLS 509
12. 1 Hierarchical-VPLS Overview 510
12. 2 Spoke-Pseudowire Details 517
12. 3 H-VPLS Topologies 527
12. 4 H-VPLS Design Case Study - Where to Break the Mesh? 531
Summary 541
Chapter 13 High Availability in an IP/MPLS VPN Network 543
13. 1 Building a Network with High Availability 544
13. 2 Bidirectional Forwarding Detection 548
13. 3 Link Aggregation Group Overview 557
13. 4 Multi Chassis Link Aggregation Group 566
13. 5 Traffic Load Balancing in Link Aggregation Groups 579
Summary 595
Chapter 14 VLL Service Resiliency 597
14. 1 VLL Service Resiliency Overview 598
14. 2 VLL Service Resiliency Using Pseudowire Redundancy 603
14. 3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615
Summary 634
Chapter 15 VPLS Service Resiliency 635
15. 1 Introduction to VPLS Service Resiliency 636
15. 2 Access Resiliency 637
15. 3 H-VPLS Backbone Resiliency 640
15. 4 Using MAC-Flush to Avoid Blackholes 651
Summary 673
Part IV Advanced Ethernet VPN Topics 675
Chapter 16 VPLS BGP Auto-Discovery 677
16. 1 VPLS BGP-AD Overview 678
16. 2 BGP Auto-Discovery for LDP-VPLS 678
16. 3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692
16. 4 Using Pre-Provisioned SDPs 698
16. 5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699
Summary 704
Chapter 17 PBB-VPLS 707
17. 1 Provider Backbone Bridge Overview 708
17. 2 PBB-VPLS Architecture 716
17. 3 PBB-VPLS Learning and Forwarding 733
17. 4 Controlling Flooding in PBB-VPLS 741
17. 5 FDB Management in I-VPLS and B-VPLS 755
17. 6 OAM in a PBB-VPLS Network 758
17. 7 Service Resiliency in PBB-VPLS Networks 760
17. 8 MAC-Flush in PBB-VPLS 762
17. 9 PBB Epipe 766
Summary 770
Chapter 18 OAM in a VPLS Service Network 773
18. 1 OAM Functional Overview 774
18. 2 Ethernet in the First Mile (EFM) OAM (802. 3ah) 776
18. 3 Ethernet Connectivity Fault Management 787
18. 4 OAM in an IP/MPLS VPN Service Network 804
18. 5 OAM in VPLS Services 818
Summary 837
Appendix A Spanning Tree Protocol 839
A. 1 Spanning Tree Protocol 841
A. 2 Spanning Tree Protocol Variations 855
A. 3 VPLS Service Loop Prevention with STP 869
A. 4 Altered STP Behavior in the VPLS Core 876
A. 5 Using VPLS STP to Eliminate Customer Forwarding Loops 880
A. 6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883
A. 7 LDP MAC-Flush in STP Convergence 884
A. 8 Management VPLS 885
Appendix B RFC and IEEE Standards 897
Glossary 901
Index 917