1 / 9

A Framework for E-VPN Performance Monitoring

A Framework for E-VPN Performance Monitoring. draft-zheng-l2vpn-evpn-pm-framework-00. Vero Zheng (vero.zheng@huawei.com) Robin Li (lizhenbin@huawei.com) L2VPN WG, IETF 87, Berlin, 29 July 2013. Background.

tam
Download Presentation

A Framework for E-VPN Performance Monitoring

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Framework for E-VPN Performance Monitoring draft-zheng-l2vpn-evpn-pm-framework-00 Vero Zheng (vero.zheng@huawei.com) Robin Li (lizhenbin@huawei.com) L2VPN WG, IETF 87, Berlin, 29 July 2013

  2. Background • Virtual Private LAN Service (VPLS) is a proven and widely deployed Ethernet L2VPN solution with limitations. Also, new applications are driving several new requirements for other L2VPN services • Ethernet VPN (E-VPN) solution has been proposed to meet the requirements • Performance Monitoring (PM) in E-VPN is desired • Challenges for performance monitoring in E-VPN • Identifying the source EVI of received packets • This document introduces the framework for E-VPN PM

  3. Challenge for E-VPN Performance Monitoring • Network Model: Multipoint-to-Point or Multipoint-to-Multipoint • Existing mechanisms for MPLS networks are for P2P or P2MP. CE1 EVI 1 PE1 D-MAC EVI 1 D-MAC Label:3000 CE4 PE3 CE2 D-MAC Label:3000 Label:3000 PE2 Label:3000 CE3 ?? Label:3000 EVI 1 Data to D-MAC D-MAC Label:3000 Same Consideration for E-VPN

  4. New Concept for E-VPN PM • EVI-to-EVI Tunnel (ET) • Point-to-point connection between two EVIs in a E-VPN • ET is used by the egress PE to identify the ingress EVI CE2 PE2 CE1 PE1 PE3 CE3 PE4 CE4

  5. Control Plane Mechanisms • Step1: VPN membership auto-discovery • Could be achieved by the Ethernet A-D route per EVI defined in draft-ietf-l2vpn-evpn • Step2: EVI-to-EVI Tunnel Label Allocation – ET Label • For each local EVI, the egress PE SHOULD allocate different ET labels for each remote EVI in PEs belonging to the same E-VPN CE2 PE2 CE1 PE1 PE3 Lable1 Lable2 Lable3 CE3 PE4 CE4

  6. Packet Encapsulation with ET label • Approach 1: additional ET label for Ingress EVI identification • Approach 2: replace MAC label with ET label It’s Simple, its Backward Compatible and its Secure

  7. E-VPN Performance Monitoring • PM mechanisms in RFC 6374 can be used for E-VPN • Loss & Delay measurement • Address format for E-VPN: • Source addresses for E-VPN: (RD + PE address) of source EVI • Destination addresses for E-VPN: (RD + PE address) of destination EVI

  8. Next Steps • Solicit comments & feedbacks • Revise the draft

More Related