Network Virtualization and Data Center Networks DC Virtualization Basics Part 3. Qin Yin Fall Semester 2013
|
|
- Erick French
- 8 years ago
- Views:
Transcription
1 Network Virtualization and Data Center Networks DC Virtualization Basics Part 3 Qin Yin Fall Semester
2 Outline A Brief History of Distributed Data Centers The Case for Layer 2 Extension Layer 2 Extension Over optical Connections Virtual PortChannels Fabric Path Over MPLS Ethernet over MPLS (EoMPLS) Virtual Private LAN Service (VPLS) Over IP MPLS over GRE Overlay Transport Virtualization (OTV) 2
3 Virtual PortChannel Summary Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Virtual PortChannel Single Ethernet Switch Pooling Homogeneous Two physical switches Networking Data and control plane virtualization High throughput, faster fault recovery, less complexity 3
4 Distributed Data Centers Data center interconnect (DCI) Many physical sites, one logical data center Business goals Seamless workload mobility Business continuity Pool and maximize global resources Distributed applications Defining two metrics for each application environment Recovery Point Objective: The maximum tolerable amount of time in which data can be lost from an IT service Recovery Time Objective: The maximum tolerable amount of time after which an IT service must be operational 4
5 From a networking perspective Connected through Layer 3 routing Decreases fate sharing in distributed data center Isolates each site from remote network instabilities Extending Layer 2 domains More details later 5
6 The Cold Age (Mid-1970s to 1980s) Computer rooms housing mainframe systems Applications based on batch processing RPO and RTO could span days or even weeks Recovery technologies: data backup and retrieval Data: stored on tapes Connectivity: physical transport of tapes to the backup site Cold-standby and warm-standby Data retrieved and delivered to the application Manual intervention to achieve recovery objectives 6
7 The Hot Age (1990s to Mid-2000s) Internet booms and the advent of electronic business The need of real-time response Recovery technologies focused on service availability RPO and RTO confined to hours, or even minutes Geographic clusters (geocluster) Application servers installed on at least two geo-separated sites Active node failure triggers automatic switchover to standby node Generally require data replication to the hot-standby site Synchronous replication (tens of kilometers apart to avoid latency issues) Asynchronous replication (data periodically copied from primary to secondary site) 7
8 Geocluster Different types of geocluster communication Heartbeat communication Application state information (such as cached data for database servers) Client traffic (especially nodes share the same virtual IP address) 8
9 The Active-Active Age (Mid-2000s -) In hot-standby site, hardware and software resources Used in case of major failure at the main site Activated for a small amount of time per year Some critical applications (RPO of 0, RTO of seconds) Active-active design to avoid resource waste No luxury of unused sites Deploy several active nodes dispersed over multiple data centers Server and storage virtualization to provide automatic and quick workload mobility between sites Challenges of scalability and flexibility One most discussed topic: Layer 2 extensions between remote sites 9
10 Requirements of Layer 2 Extension Heartbeat and connection state communications are usually directed to multiple destinations Broadcast, multicast, or unknown unicast Ethernet frames (flooding) Active and standby nodes usually share the same virtual IP and MAC address To facilitate traffic handling in the case of failure Server migration Application do not support IP readdressing Generates painstakingly complex operations Data center expansion A data center has reached a physical limitation A company hires a colocation service from an outsourcing data center As a result, standard Layer 2 connection are deployed to provide extended VLANs over multiple data centers. 10
11 Challenges of Layer 2 Extension Flooding and broadcast Loops over the Layer 2 extensions can be easily formed A spanning tree instance spanning multiple sites presents formidable challenges Scalability: recommended STP diameter is 7 Isolation: reconvergence will affect VLANs within one STP instance Multihoming: multiple DCI links will not be used for data comm 11
12 Challenges of Layer 2 Extension (cont.) Tromboning can be formed between data centers Non-optimal internal routing within extended VLANs Cause for DCI resource waste: uncontrolled state of an active-standby pair of devices Data confidentiality Mandates strict forms of encryption in data center interconnect to minimize the risk of data leakage Tromboning in action 12
13 Traditional Layer 2 VPNs Dark Fiber VPLS EoMPLS 13
14 Ethernet Extensions over Optical Connections Optical connections Distance: less than a few hundred kilometers Dark fiber Fiber-optic pair to connect networking devices Wavelength-division multiplexing (WDM) to increase transport capacity Coarse WDM: multiplex eight optical carrier signals Dense WDM: aggregate a higher number (128, for example) Dark fiber and WDM Communication solutions belonging to Layer 1 (physical) Can transport any data-link protocol including Ethernet 14
15 Spanning Tree Protocol STP does not allow Ethernet traffic on all the links between DCI switches STP instance Is spread over both sites Sharing any internal topology change or reconvergence 15
16 STP and Link Utilization STP wastes inter-switch connection resources 16
17 Link Aggregation STP only detects one logical interface Traffic destined to this interface is load balanced among the active physical links that are part of the channel This virtual interface is denominated a PortChannel 17
18 Virtual PortChannel Eliminate STP blocked ports Uses all available uplink bandwidth Allow a single device to use a port channel across two upstream switches Dual-homed server operate in active-active mode Provide fast convergence upon link/device failure 18
19 Virtual PortChannels on a Layer 2 Extension Virtual ProtChannels Transforms multiple Ethernet links into a single-switch STP connection Benefits Multihoming is enabled all links are being used (and load balanced) Spanning tree topology is simplified only one connection between sites If vpc peer switch feature is deployed, a device failure will not result in reconvergence 19
20 Virtual PortChannels in Multipoint Data Center Connections Problem vpcs can form a logical looped topology Solution: hub-and-spoke Deploy disjoint STP instances per site STP isolation is enabled on all DCI switches Avoid loops in the Layer 2 extension 20
21 Traditional Layer 2 VPNs Dark Fiber VPLS EoMPLS 21
22 MPLS Labels and Packets Provides packet forwarding based on labels Layer 2.5 technology Head fields Label value Experimental (Exp) To define QoS classes in MPLS networks Bottom of Stack (B) Time to live (TTL) 22
23 MPLS Basics Protocol flexibility Comes from the capability of stacking labels MPLS services Traffic engineering Configures and defines unidirectional tunnels using tunnel label Override routing protocol decision Layer 3 virtual private networks Connect different VPNS Inner label: VPN Any transport over MPLS (AToM) Transport of Layer 2 frames Inner label: virtual circuit Example: EoMPLS 23
24 MPLS Network Forwarding Equivalence Class (FEC) MPLS packets sharing the same label Two types of routers Label Edge Routers (LER) Label Switch Router (LSR) MPLS router elements A loopback interface To improve reachability A routing protocol To advertise connected subnets LDP - Label distribution Protocol To enable device discovery and label distribution MPLS interfaces between routers 24
25 EoMPLS Configuration In essence Within MPLS network Encapsulates Ethernet frames within MPLS packets At the egress of MPLS network Transported, de-capsulated and delivered as they were MPLS label stack Tunnel Label routing from ingress to egress LER VC Label identifying virtual circuit within tunnel Pseudowire Emulation of Ethernet cable 25
26 Pseudo Wire Reference Model A Pseudo Wire (PW) is a connection between two provider edge (PE) devices connecting two attachment circuits (ACs) Label Switched Path (LSP) MPLS tunnel Emulated Service Pseudo Wire Customer Site PSN Tunnel (LSP in MPLS) Customer Site Attachment Circuit MPLS (or IP) PW1 PW2 Customer Site PE1 PE2 Pseudo Wire PDUs Customer Site Packet Switched Network (PSN) IP or MPLS 26
27 VC Distribution Mechanism using LDP Unidirectional Tunnel LSP To transport PW PDU from PE to PE based on tunnel label(s) Both LSPs combined to form a single bi-directional Pseudo Wire Directed LDP session To exchange VC information, such as VC label and control information Directed LDP Session between PE1 and PE2 Tunnel Label(s) gets to PE router Customer Site Label Switch Path IP/MPLS Customer Site Customer Site PE1 LSP created using IGP+LDP or RSVP-TE PE2 VC Label identifies interface Customer Site 27
28 Ethernet PW Tunnel Encapsulation Tunnel Encaps Tunnel Label (LDP,RSVP,BGP) EXP 0 TTL PW Demux Control Word VC Label (VC) EXP 1 TTL (set to 2) Reserved Sequence Number Layer-2 PDU Tunnel Encapsulation One or more MPLS labels associated with the tunnel Defines the LSP from ingress to egress PE router 28
29 Ethernet PW Demultiplexer Tunnel Encaps Tunnel Label (LDP,RSVP,BGP) EXP 0 TTL PW Demux Control Word VC Label (VC) EXP 1 TTL (set to 2) Reserved Sequence Number Layer-2 PDU Obtained from Directed LDP session To identify individual circuits within a tunnel Used by receiving PE to determine Egress interface for L2PDU forwarding (Port based) Egress VLAN used on the facing interface (VLAN Based) EXP can be set to the values received in the L2 frame 29
30 PW Operation and Encapsulation Label 72 for PW1 Directed LDP Session between PE1 and PE2 PW1 Lo0: IP/MPLS P LSP 72 P2 L2 PDU Customer Site PE1 Label Pop for Lo0: Label 38 for Lo0: Label 24 for Lo0: PE2 Customer Site LDP Session LDP Session LDP Session This process happens in both directions (Example shows process for PE2 -> PE1 traffic) 30
31 Virtual Private LAN Service End-to-end architecture allowing MPLS networks offer Layer 2 multipoint Ethernet Services Provides emulation of a single virtual Ethernet bridge network Virtual Bridges linked with MPLS Pseudo Wires VPLS is an Architecture PE PE Data Plane used is same as EoMPLS (point-to-point) 31
32 Virtual Private LAN Service It is Virtual Multiple instances share the same physical infrastructure It is Private Each instance is independent and isolated from one another It is LAN Service It emulates Layer 2 multipoint connectivity between subscribers 32
33 VPLS Components Attachment circuits: Port or VLAN mode router N-PE Mesh of LSP between N-PEs: Pseudo Wires within LSP N-PE Virtual Switch Interface (VSI) terminates PW and provides Ethernet bridge function router router router switch MPLS Core switch LDP between PEs used to exchange VC and tunnel labels for Pseudo Wires switch router Attachment : switch or router N-PE 33
34 Virtual Switch Interface Flooding / Forwarding MAC table instances per customer (port/vlan) for each PE Associate ports to MAC, flood unknowns to all other ports Address Learning / Aging LDP enhanced with additional MAC list TLV (label withdrawal) MAC timers refreshed with incoming frames Loop Prevention Create a full-mesh of Pseudo Wires (VCs in EoMPLS) Unidirectional LSP carries VCs between pair of N-PEs split horizon concepts to prevent loops 34
35 VPLS Flooding and Forwarding Unknown DA? Pseudo Wire in LSP Data SA DA? Flooding (Broadcast, Multicast, Unknown Unicast) Dynamic learning of MAC addresses on PHY and VCs Forwarding Physical Port Virtual Circuit 35
36 MAC Learning and Forwarding Send me frames using Label 102 MAC1 PE1 MAC Address MAC MAC 1 E0/0 Send me frames using Label 170 MAC2 PE2 Use VC Label 102 E0/0 Use VC E0/1 Label 170 Adj MAC Address Data MAC1 Directed LDP PE2 102 MAC1 MAC2 Data MAC2 MAC 2 E0/1 Broadcast, Multicast, and Unknown Unicast are learned via the received label associations Two LSPs associated with a VC (Tx & Rx) If inbound or outbound LSP is down Then the entire Pseudo Wire is considered down 170 PE2 Adj MAC
37 MAC Address Withdraw Directed LDP X MPLS Message speeds up convergence process Otherwise PE relies on MAC Address Aging Timer Upon failure, PE removes locally learned MAC addresses Send LDP Address Withdraw to remote PEs in VPLS (using the Directed LDP session) New MAC List TLV is used to withdraw addresses 37
38 VPLS Functional Components Customer MxUs SP PoPs Customer MxUs U-PE N-PE MPLS Core N-PE U-PE N-PE provides VPLS termination/l3 services U-PE provides customer UNI is the custome device 38
39 Directed Attachment (Flat) Characteristics Suitable for simple/small implementations Full mesh of directed LDP sessions required N*(N-1)/2 Pseudo Wires required Scalability issue a number of PE routers grows No hierarchical scalability VLAN and Port level support Potential signaling and packet replication overhead Large amount of multicast replication over same physical CPU overhead for replication 39
40 Direct Attachment VPLS (Flat Architecture) N-PE MPLS Core N-PE Ethernet (VLAN/Port Full Mesh PWs + LDP Ethernet (VLAN Port) Data MAC1 MAC q Customer Data MAC1 MAC2 Data MAC1 MAC2 VC PE Pseudo Wire SP Core 40
41 Hierarchical VPLS (H-VPLS) Best for larger scale deployment Reduction in packet replication and signaling overhead Consists of two levels in a Hub and Spoke topology Hub consists of full mesh VPLS Pseudo Wires in MPLS core Spokes consist of L2/L3 tunnels connecting to VPLS (Hub) PEs Q-in-Q (L2), MPLS (L3), L2TPv3 (L3) 41
42 Why H-VPLS? PE VPLS PE PE H-VPLS PE-rs MTU-s PE PE PE-rs PE-rs PE PE PE-rs PE-r PE Potential signaling overhead Full PW mesh from the Edge Packet replication done at the Edge Node Discovery and Provisioning extends end to end PE-rs PE-rs Minimizes signaling overhead Full PW mesh among Core devices Packet replication done the Core Partitions Node Discovery process 42
43 MPLS Edge H-VPLS U-PE PE-rs N-PE PE-rs MPLS Core N-PE PE-rs U-PE PE-rs MPLS Acces s MPLS Core MPLS Acces s q Access MPLS Pseudo Wire 3 Full Mesh PWs + LDP MPLS Pseudo Wire 802.1q Access 1 Data 2 Vlan Data MAC1 Vlan MAC2 MAC q Customer 3 MAC2 Data VC PE Vlan MPLS PW SP Edge MAC1 MAC2 Same VCID used in Edge and core (Labels may differ) VC P E Pseudo Wire SP Core 43
44 Layer 2 VPNs Dark Fiber VPLS EoMPLS 44
45 Flooding Behavior Traditional Layer 2 VPN technologies rely on flooding to propagate MAC reachability The flooding behavior causes failures to propagate to every site in the Layer 2 VPN Goal Providing layer 2 connectivity, yet restrict the reach of the unknown unicast flooding domain in order to contain failures and preserve the resiliency 45
46 Pseudo Wires Maintenance Before any learning can happen a full mesh of pseudo-wires/ tunnels must be in place For N sites, there will be N*(N-1)/2 pseudo-wires. Complex to add and remove sites Head-end replication for multicast and broadcast. Sub-optimal BW utilization Goal providing point-to-cloud provisioning and optimal bandwidth utilization in order to reduce cost 46
47 Multi-homing Requires additional protocols (BGP, ICC, EEM) STP often extended Malfunctions impact all sites Goal Natively providing automatic detection of multihoming without the need of extending the STP domains, together with a more efficient loadbalancing 47
48 OTV Changes the Game Circuits + Data Plane Flooding Full mesh of circuits MAC learning based on flooding Tunnels and Pseudo Wires Operationally challenging Loop prevention Multi-homing Packet + Control Protocol Learning Packet switched connectivity MAC learning by control protocol Dynamic encapsulation Operational simplification Automatic loop prevention and multi-homing 48
49 Overlay Transport Virtualization OTV delivers a virtual L2 transport over any L3 Infrastructure Overlay Independent of the Infrastructure technology and services, flexible over various inter-connect facilities Transport Transport services for Layer 2 and Layer 3 Ethernet and IP traffic Virtualization Provides virtual stateless multi-access connections. Can be further partitioned into VPNs, VRFs, VLANs 49
50 OTV Control Plane MAC Learning a. Server with MAC address X sends frames that are flooded or broadcasted within site b. OTV1 learns MAC X and populates its MAC address table. c. OTV1 advertises MAC X with an IS-IS update. d. OTV2 and OTV3 become aware that MAC X can be reached through OTV1 and populate their MAC address tables using the virtual Layer 2 interface called Overlay 50
51 OTV Frame Forwarding a. Server2 sends a unicast frame destined to MAC X that is flooded to OTV2. b. OTV2 checks its MAC address table and realizes that the MAC X entry points to an Overlay interface. c. Internally in OTV2, this Overlay interface provides a mapping to OTV1 s IP address. As a result, the unicast frame is encapsulated into an IP packet directed to OTV1. d. OTV1 receives the IP packet and decapsulates it, recovering the original Ethernet frame. e. OTV1 uses its local MAC address table to forward the frame to Server1. 51
52 OTV Encapsulation Outer IP header Outer OTV shim header VLAN Overlay number Layer 2 header 52
53 OTV elements Edge device: network equipment that is actually deploying OTV - Internal interface: connected to a Layer 2 network - To process Ethernet frames - Join interface: connected to the Layer 3 network - To send or receive OTV packets 53
54 OTV elements Overlay interface: - A virtual Layer 2 interface that represents an OTV Layer 2 extension to other edge devices - Used on their MAC address tables as the interface associated to remote MAC addresses - Always associated to a join interface 54
55 OTV elements Site VLAN: - A dedicated VLAN used for discovery and adjacency maintenance between edge devices on the same site - Should not be extended to other sites. 55
56 Spanning Tree and OTV OTV is site transparent: no changes to the STP topology Each site keeps its own STP domain An Edge Device will send and receive BPDUs ONLY on the OTV Internal Interfaces 56
57 OTV Loop Avoidance Blocking unknown unicast traffic between edge devices Authoritative edge device (AED) The only edge device on a site handling multicast and broadcast traffic for the OTV-extended VLAN 57
58 OTV and Multi-homing OTV built-in multi-homing Allows Layer 2 traffic to be load balanced through different IP WAN links OTV multi-homing options Automatic distribution of VLANs among the available AED candidates (a hashing function to deploy this distribution). For unicast egress traffic, OTV can be load balanced among all the equal-cost Layer 3 paths to remote edge devices. Multidestination egress and ingress traffic can only use the join interface. Layer 3 PortChannels (between AED and a single device or one deploying VSS). 58
59 References Jeff Apcar. An introduction to VPLS. Peter Lam, Patrick Warichet. Simplifying Data Center Interconnect with Overlay Transport Virtualization (OTV). 59
60 Ethernet over MPLS Summary Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Ethernet over MPLS Ethernet connection Abstraction Structural Hardware and software dependent Networking Data plane virtualization Layer 2 extension, simplicity, transparency 60
61 Virtual Private LAN Summary Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Virtual Private LAN Ethernet bridge Abstraction Structural Hardware and software dependent Networking Data plane virtualization Layer 2 extension, multipoint connections, loop avoidance within MPLS network 61
62 Overlay Transport Virtualization Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Overlay Transport Virtualization Overlay Ethernet network Abstraction Structural Hardware and software dependent Networking Data and control planes virtualization Layer 2 extension, multipoint connections, transport independence, loop avoidance 62
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationVirtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
More informationMPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
More informationL2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and
More informationIntroduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
More informationINTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
More informationTesting Edge Services: VPLS over MPLS
Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear
More informationIP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationIntroducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
More informationInterconnecting Data Centers Using VPLS
Interconnecting Data Centers Using VPLS Nash Darukhanawalla, CCIE No. 10332 Patrice Bellagamba Cisco Press 800 East 96th Street Indianapolis, IN 46240 viii Interconnecting Data Centers Using VPLS Contents
More informationHow To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
More informationMPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
More informationMP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
More informationEnhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
More informationMPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
More informationTRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview
More informationVPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005
VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically
More informationVirtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
More informationVirtual Private Networks. Juha Heinänen jh@song.fi Song Networks
Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
More informationVirtual Private LAN Service
Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place
More informationNetwork Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
More informationVMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
More informationTechnical Brief: Offering Scalable Layer 2 Services with VPLS and VLL
SERVI PROVIDER Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL An overview of Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL) and Brocade solutions for deploying
More informationDemonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationInnovation in Access and Metropolitan Area Networks -
Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and
More informationDelivering MPLS VPLS VPN Services With Metro Service Edge Platform
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Objective This paper outlines the overall network architecture and elements for delivering MPLS VPLS VPN services by extending MPLS (Multiprotocol
More informationMikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
More informationAddressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationRiverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
More informationExpert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
More informationMulti Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
More informationVirtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans
Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Contents Overview...3 1. VPLS Traffic CoS Test...3 2. VPLS VSI Isolation Test...5 3. VPLS MAC Address Purge Test...7
More informationTRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
More informationVirtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
More informationMigrating to MPLS Technology and Applications
Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals
More informationMulti-site Datacenter Network Infrastructures
Multi-site Datacenter Network Infrastructures Petr Grygárek rek 1 Why Multisite Datacenters? Resiliency against large-scale site failures (geodiversity) Disaster recovery Easier handling of planned outages
More informationFundamentals Multiprotocol Label Switching MPLS III
Fundamentals Multiprotocol Label Switching MPLS III Design of Telecommunication Infrastructures 2008-2009 Rafael Sebastian Departament de tecnologies de la Informació i les Comunicaciones Universitat Pompeu
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationMPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
More informationETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 alastair.johnson@alcatel-lucent.com AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
More informationWHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
More informationVPN Technologies A Comparison
VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100
More informationImplementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
More informationVirtual Private LAN Service (VPLS)
White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000
More informationAPRICOT 2012 MPLS WORKSHOP L2VPN
APRICOT 2012 MPLS WORKSHOP L2VPN Alastair Johnson February 2012 alastair.johnson@alcatel-lucent.com 2 MPLS WORKSHOP L2VPN 1. Introduction to L2VPN a. Background to VPNs b. Why L2VPNs c. Types of L2VPNs
More informationDD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
More informationCLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
More informationMPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
More informationDepartment of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
More informationAgilent N2X Layer 2 MPLS VPN Emulation Software
Agilent N2X Layer 2 MPLS VPN Emulation Software E7884A Technical Data Sheet An easy-to-use solution specifically designed for measuring the scalability and performance of Layer 2 MPLS VPNs and pseudo wire
More informationThe Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More informationRFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
More informationIxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
More informationDistributed Virtual Data Center for Enterprise and Service Provider Cloud
Distributed Virtual Data Center for Enterprise and Service Provider Cloud Author: Yves Louis November 2011 I would like to acknowledge Max Ardica, Patrice Bellagamba and Victor Moreno for their significant
More informationChapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
More informationWHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
More informationETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES Greg Hankins RIPE 68 RIPE 68 2014/05/12 AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
More informationMPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
More informationRohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
More informationAPPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
More informationMPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
More informationMPLS Applications. Karel Pouzar CCIE#20198, CCSI#31414 karel.pouzar@alefnula.com
MPLS Applications Karel Pouzar CCIE#20198, CCSI#31414 karel.pouzar@alefnula.com Agenda MPLS Introduction MPLS VPN Architecture MPLS L2 Services AToM, EoMPLS VPLS, H-VPLS Copyright Alef Nula, a.s. www.alef0.cz
More informationMPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
More informationResiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationNetwork Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
More informationSECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks
More informationMPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
More informationInternetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
More informationMPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
More informationTRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
More informationCisco FabricPath Technology and Design
Cisco Technology and Design 2 Agenda Introduction to Concepts Technology vs Trill Designs Conclusion 3 Introduction to By Francois Tallet 5 Why Layer 2 in the Data Centre? Some Applications / Protocols
More informationDesigning and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
Brochure More information from http://www.researchandmarkets.com/reports/2251494/ Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL Description:
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More information1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
More informationMetro Ethernet Services
CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet
More informationTechnology Comparison: Cisco Overlay Transport Virtualization and Virtual Private LAN Service as Enablers of LAN Extensions
Technology Comparison: Cisco Overlay Transport Virtualization and Virtual Private LAN Service as Enablers of LAN Extensions What You Will Learn Geographically dispersed data centers provide added application
More informationDREAMER and GN4-JRA2 on GTS
GTS Tech+Futures Workshop (Copenhagen) GTS Tech+Futures Workshop (Copenhagen) DREAMER and GN4-JRA2 on GTS CNIT Research Unit of Rome University of Rome Tor Vergata Outline DREAMER (Distributed REsilient
More informationHow Routers Forward Packets
Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
More informationBandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie
More informationStretched Active- Active Application Centric Infrastructure (ACI) Fabric
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as
More informationImplementing Virtual Leased Lines Using MPLS
Lines Using MPLS able of Contents 1. Objective... 3 2. arget Audience... 3 3. Pre-Requisites... 3 4. Introduction: MPLS and IP-Based VPNs... 3 5. he Promise of MPLS Layer-2 VPNs... 5 6. unneling Layer-2
More informationDevelopment of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
More informationPRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
More informationAPPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
More informationWhite Paper: Carrier Ethernet
White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More informationNetwork Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationMPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
More informationVXLAN Bridging & Routing
VXLAN Bridging & Routing Darrin Machay darrin@arista.com CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationPreserve IP Addresses During Data Center Migration
White Paper Preserve IP Addresses During Data Center Migration Configure Cisco Locator/ID Separation Protocol and Cisco ASR 1000 Series Aggregation Services Routers 2015 Cisco and/or its affiliates. All
More informationMPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
More information