< draft-allan-l2vpn-mldp-evpn-00.txt   draft-allan-l2vpn-mldp-evpn-01.txt >
L2VPN Working Group Dave Allan, Jeff Tantsura L2VPN Working Group Dave Allan, Jeff Tantsura
Internet Draft Ericsson Internet Draft Ericsson
Intended status: Standards Track Intended status: Standards Track
Expires: August 2013 Expires: January 2014
March 2013 July 2013
mLDP extensions for integrating EVPN and multicast mLDP extensions for integrating EVPN and multicast
draft-allan-l2vpn-mldp-evpn-00 draft-allan-l2vpn-mldp-evpn-01
Abstract Abstract
This document describes how mLDP FECs can be encoded to support both This document describes how mLDP FECs can be encoded to support both
service specific and shared multicast trees and describes the service specific and shared multicast trees and describes the
associated procedures for EVPN PEs. Thus, mLDP can implement associated procedures for EVPN PEs. Thus, mLDP can implement
multicast for EVPN. multicast for EVPN.
Status of this Memo Status of this Memo
skipping to change at page 1, line 40 skipping to change at page 1, line 40
documents at any time. It is inappropriate to use Internet- documents at any time. It is inappropriate to use Internet-
Drafts as reference material or to cite them other than as "work Drafts as reference material or to cite them other than as "work
in progress". in progress".
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 2013. This Internet-Draft will expire on January 2014.
Copyright and License Notice Copyright and License Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described document must include Simplified BSD License text as described
in Section 4.e of the Trust Legal Provisions and are provided in Section 4.e of the Trust Legal Provisions and are provided
without warranty as described in the Simplified BSD License. without warranty as described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction..........................................2 1. Introduction...................................................2
1.1. Authors.............................................2 1.1. Authors......................................................2
1.2. Requirements Language.................................2 1.2. Requirements Language........................................2
2. Conventions used in this document........................3 2. Changes since last version.....................................3
2.1. Terminology.........................................3 3. Conventions used in this document..............................3
3. Solution Overview......................................4 3.1. Terminology..................................................3
4. Elements of Procedure ..................................4 4. Solution Overview..............................................4
5. FEC Encoding..........................................5 5. Elements of Procedure..........................................4
6. Acknowledgements.......................................7 6. FEC Encoding...................................................5
7. Security Considerations.................................7 6.1. VLAN tagged FEC..............................................5
8. IANA Considerations....................................7 6.2. I-SID tagged FEC.............................................6
9. References............................................7 6.3. Shared FEC...................................................6
9.1. Normative References..................................7 7. Acknowledgements...............................................7
9.2. Informative References................................7 8. Security Considerations........................................7
10. Authors' Addresses....................................8 9. IANA Considerations............................................7
10. References....................................................7
10.1. Normative References........................................7
10.2. Informative References......................................8
11. Authors' Addresses............................................8
1. Introduction 1. Introduction
This document describes how mLDP FECs can be encoded to permit mLDP This document describes how mLDP FECs can be encoded to permit mLDP
to implement multicast for EVPN. Such support can be applied to to implement multicast for EVPN. Such support can be applied to
interconnecting 802.1ad, 802.1ah, 802.1aq, and 802.1Qbp based interconnecting 802.1ad, 802.1ah, 802.1aq, and 802.1Qbp based
networks. networks.
1.1. Authors 1.1. Authors
David Allan, Jeff Tantsura David Allan, Jeff Tantsura
1.2. Requirements Language 1.2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC2119 [1]. document are to be interpreted as described in RFC2119 [1].
2. Conventions used in this document 2. Changes since last version
2.1. Terminology 1) Clarifications to the use of FEC encoding for RTs and VLANs
added to section 6.
3. Conventions used in this document
3.1. Terminology
BCB: Backbone Core Bridge BCB: Backbone Core Bridge
BEB: Backbone Edge Bridge BEB: Backbone Edge Bridge
BU: Broadcast/Unknown BU: Broadcast/Unknown
B-MAC: Backbone MAC Address B-MAC: Backbone MAC Address
B-VID: Backbone VLAN ID B-VID: Backbone VLAN ID
CE: Customer Edge CE: Customer Edge
C-MAC: Customer/Client MAC Address C-MAC: Customer/Client MAC Address
DF: Designated Forwarder DF: Designated Forwarder
ESI: Ethernet segment identifier ESI: Ethernet segment identifier
skipping to change at page 4, line 5 skipping to change at page 4, line 6
BEB-PE: Co located BEB and PE BEB-PE: Co located BEB and PE
PE: provider edge PE: provider edge
P2MP: Point to Multipoint P2MP: Point to Multipoint
P2P: Point to Point P2P: Point to Point
RD: Route Distinguisher RD: Route Distinguisher
SPB: Shortest path bridging SPB: Shortest path bridging
SPBM: Shortest path bridging MAC mode SPBM: Shortest path bridging MAC mode
VID: VLAN ID VID: VLAN ID
VLAN: Virtual LAN VLAN: Virtual LAN
3. Solution Overview 4. Solution Overview
mLDP[6] permits arbitrary FEC encodings for the naming of multicast mLDP[6] permits arbitrary FEC encodings for the naming of multicast
trees to be defined. This property is leveraged to permit both trees to be defined. This property is leveraged to permit both
service specific trees and shared trees to be utilized to augment service specific trees and shared trees to be utilized to augment
EVPN unicast connectivity with network based multicast and avoid the EVPN unicast connectivity with network based multicast and avoid the
inefficiencies of edge replication. inefficiencies of edge replication.
The flooding of EVPN BGP NLRI and ISIS-SPB [7] provides each PE with The flooding of EVPN BGP NLRI and ISIS-SPB [7] provides each PE with
sufficient information to self elect as a DF, have knowledge of peer sufficient information to self elect as a DF, have knowledge of peer
DFs, and from that construct the identifiers for the required set of DFs, and from that construct the identifiers for the required set of
multicast trees to support the current service set, which can then be multicast trees to support the current service set, which can then be
encoded as mLDP FECs, and used to originate label mapping and label encoded as mLDP FECs, and used to originate label mapping and label
withdraw messages. withdraw messages.
Both p2mp and mp2mp trees are supported with different FEC encodings Both p2mp and mp2mp trees are supported with different FEC encodings
for each. Service specific tree FECs encode the VID or I-SID for each. Service specific tree FECs encode the VID or I-SID
associated with the service instance in the subtending network. associated with the service instance in the subtending network.
Shared tree FECs encode a sorted list of the IP addresses of the leaf Shared tree FECs encode a sorted list of the IP addresses of the leaf
DFs. DFs.
4. Elements of Procedure 5. Elements of Procedure
A PE advertises whether or not it supports shared tree (actual A PE advertises whether or not it supports shared tree (actual
mechanism is TBD). Support of both shared and service specific trees mechanism is TBD). Support of both shared and service specific trees
is mandatory. Whether a PE supports shared trees is a network design is mandatory. Whether a PE supports shared trees is a network design
decision. decision.
A PE is expected to maintain a list of current multicast memberships. A PE is expected to maintain a list of current multicast memberships.
A PE, upon receipt of new information from BGP or ISIS-SPB: A PE, upon receipt of new information from BGP or ISIS-SPB:
1) Evaluates it"s DF roles (as described in . 1) Evaluates it"s DF roles (as described in [5]).
[5]).
2) On the basis of the PE"s DF role, determines the set of services 2) On the basis of the PE"s DF role, determines the set of services
it needs to support. it needs to support.
3) Determines the set of peer DFs for each service. 3) Determines the set of peer DFs for each service.
4) On the basis of requisite tree types and ESI multicast 4) On the basis of requisite tree types and ESI multicast
registrations (p2mp or mp2mp/service specific or shared), determines registrations (p2mp or mp2mp/service specific or shared), determines
the name of the multicast tree needed for the service. the name of the multicast tree needed for the service.
skipping to change at page 5, line 21 skipping to change at page 5, line 24
5) Upon completion of evaluating the set of services, de-duplicates 5) Upon completion of evaluating the set of services, de-duplicates
the required tree membership list. the required tree membership list.
6) Compares the required list with the existing list, and originates 6) Compares the required list with the existing list, and originates
the necessary label mapping and label withdraw transactions to the the necessary label mapping and label withdraw transactions to the
network state up to date. network state up to date.
7) Configures the dataplane for the appropriate service to multicast 7) Configures the dataplane for the appropriate service to multicast
tree bindings. tree bindings.
5. FEC Encoding 6. FEC Encoding
5.1. VLAN tagged FEC 6.1. VLAN tagged FEC
VLAN tagged FEC uses the mLDP p2mp (0x06) type FEC and the mLDP mp2mp VLAN tagged FEC uses the mLDP p2mp (0x06) type FEC and the mLDP mp2mp
downstream (0x07) and upstream FECs (0x08) downstream (0x07) and upstream FECs (0x08)
The encoding of the opaque value is: The encoding of the opaque value is:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type "x" | Length | <unused = 0> | | Type "x" | Length | <unused = 0> |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RT | | RT |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ethertype | VID | = 0 | | Ethertype | VID | = 0 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Where: Where:
- RT is the route target for the EVPN instance - RT is the route target for the EVPN instance
- Ethertype identifies the tag type (C 0x8100, S or B 0x88a8) - Ethertype identifies the tag type (C 0x8100, S or B 0x88a8)
- VID is the VLAN ID tag value - VID is the VLAN ID tag value. If the VID=0, then this is the
default MDT for the RT and how VLAN unaware RTs are encoded, else it
permits MDTs to be defined for VLAN aware services.
5.2. I-SID tagged FEC 6.2. I-SID tagged FEC
The encoding of the opaque value is: The encoding of the opaque value is:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type "x+1" | Length | <unused = 0> | | Type "x+1" | Length | <unused = 0> |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RT | | RT |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| I-SID | <unused = 0> | | I-SID | <unused = 0> |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Where: Where:
- RT is the route target for the EVPN instance - RT is the route target for the EVPN instance
- I-SID corresponds to the I-SID that will use the tree - I-SID corresponds to the I-SID that will use the tree
5.3. Shared FEC 6.3. Shared FEC
The encoding of the opaque value is: The encoding of the opaque value is:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type "x+2" | Length | <unused = 0> | | Type "x+2" | Length | <unused = 0> |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RT | | RT |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
skipping to change at page 6, line 38 skipping to change at page 7, line 4
| Type "x+2" | Length | <unused = 0> | | Type "x+2" | Length | <unused = 0> |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RT | | RT |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
~ <sorted list of DF ip addresses> ~ ~ <sorted list of DF ip addresses> ~
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Where: Where:
- RT is the route target for the EVPN instance - RT is the route target for the EVPN instance
- Sorted list of DF addresses identifies the set of leaves that have - Sorted list of DF addresses identifies the set of leaves that have
registered interest in one or more Ethernet services (either C/S or I registered interest in one or more Ethernet services (either C/S or I
tagged). tagged).
6. Acknowledgements 7. Acknowledgements
The authors would like to thank Panagiotis Saltsidis and Janos Farkas The authors would like to thank Panagiotis Saltsidis, Jakob Heitz and
for their detailed review of this draft. Janos Farkas for their detailed review of this draft.
7. Security Considerations 8. Security Considerations
For a future version of this document. For a future version of this document.
8. IANA Considerations 9. IANA Considerations
For a future version of this document. For a future version of this document.
9. References 10. References
9.1. Normative References 10.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate [1] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[2] Fedyk et.al. "IS-IS Extensions Supporting IEEE 802.1aq [2] Fedyk et.al. "IS-IS Extensions Supporting IEEE 802.1aq
Shortest Path Bridging", IETF RFC 6329, April 2012 Shortest Path Bridging", IETF RFC 6329, April 2012
[3] Rosen et.al., "BGP/MPLS IP Virtual Private Networks [3] Rosen et.al., "BGP/MPLS IP Virtual Private Networks
(VPNs)", IETF RFC 4364, February 2006 (VPNs)", IETF RFC 4364, February 2006
skipping to change at page 7, line 42 skipping to change at page 8, line 5
in progress, draft-ietf-l2vpn-evpn-01, July 2012 in progress, draft-ietf-l2vpn-evpn-01, July 2012
[5] Allan et.al. "802.1aq and 802.1Qbp Support over EVPN", [5] Allan et.al. "802.1aq and 802.1Qbp Support over EVPN",
IETF work in progress, draft-allan-l2vpn-spb-evpn-03, IETF work in progress, draft-allan-l2vpn-spb-evpn-03,
February 2013 February 2013
[6] Wijnands et.al. "Label Distribution Protocol Extensions [6] Wijnands et.al. "Label Distribution Protocol Extensions
for Point-to-Multipoint and Multipoint-to-Multipoint Label for Point-to-Multipoint and Multipoint-to-Multipoint Label
Switched Paths". IETF RFC 6388, November 2011 Switched Paths". IETF RFC 6388, November 2011
9.2. Informative References 10.2. Informative References
[7] IEEE 802.1aq "IEEE Standard for Local and Metropolitan [7] IEEE 802.1aq "IEEE Standard for Local and Metropolitan
Area Networks: Bridges and Virtual Bridged Local Area Area Networks: Bridges and Virtual Bridged Local Area
Networks - Amendment 9: Shortest Path Bridging", June 2012 Networks - Amendment 9: Shortest Path Bridging", June 2012
[8] IEEE 802.1Qbp "Draft IEEE Standard for Local and [8] IEEE 802.1Qbp "Draft IEEE Standard for Local and
Metropolitan Area Networks---Virtual Bridged Local Area Metropolitan Area Networks---Virtual Bridged Local Area
Networks - Amendment: Equal Cost Multiple Paths (ECMP), Networks - Amendment: Equal Cost Multiple Paths (ECMP),
802.1Qbp", draft 1.3, February 2013 802.1Qbp", draft 1.3, February 2013
[9] Sajassi et.al. "PBB E-VPN", IETF work in progress, draft- [9] Sajassi et.al. "PBB E-VPN", IETF work in progress, draft-
ietf-l2vpn-pbb-evpn-03, June 2012 ietf-l2vpn-pbb-evpn-03, June 2012
[10] IEEE 802.1Q-2011 "IEEE Standard for Local and metropolitan [10] IEEE 802.1Q-2011 "IEEE Standard for Local and metropolitan
area networks--Media Access Control (MAC) Bridges and area networks--Media Access Control (MAC) Bridges and
Virtual Bridged Local Area Networks", August 2011 Virtual Bridged Local Area Networks", August 2011
10. Authors' Addresses 11. Authors' Addresses
Dave Allan (editor) Dave Allan (editor)
Ericsson Ericsson
300 Holger Way 300 Holger Way
San Jose, CA 95134 San Jose, CA 95134
USA USA
Email: david.i.allan@ericsson.com Email: david.i.allan@ericsson.com
Jeff Tantsura Jeff Tantsura
Ericsson Ericsson
 End of changes. 23 change blocks. 
39 lines changed or deleted 50 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/