A Framework for E-Tree Service over MPLS Network
draft-ietf-l2vpn-etree-frwk-00
Network Working Group Raymond Key (editor), Huawei
Internet Draft Simon Delord, Alcatel-Lucent
Category: Informational Frederic Jounay, Orange CH
Expires: July 2012 Lucy Yong, Huawei
Lizhong Jin, ZTE
Yuji Kamite, NTT Communications
Wim Henderickx, Alcatel-Lucent
January 30, 2012
A Framework for E-Tree Service over MPLS Network
draft-ietf-l2vpn-etree-frwk-00
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 30, 2012.
Abstract
This document proposes a solution framework for supporting Metro
Ethernet Forum (MEF) Ethernet Tree (E-Tree) services over a
Multiprotocol Label Switching (MPLS) network. The objective is to
provide a simple and effective approach to emulate E-Tree services
in addition to Ethernet LAN (E-LAN) services on an existing MPLS
network.
Key, et al. Expires July 2012 [Page 1]
Internet Draft Framework E-Tree over MPLS January 2012
Table of Contents
1. Introduction....................................................3
1.1. Objective and Scope...........................................3
1.2. Traditional Ethernet Network..................................3
1.3. MEF Multipoint Ethernet Services..............................3
1.3.1. Similarity between E-LAN and E-Tree.........................4
1.3.2. Difference between E-LAN and E-Tree.........................4
1.4. IETF Multipoint L2VPN Services................................5
1.4.1. Virtual Private LAN Service (VPLS)..........................5
1.4.2. Virtual Private Multicast Service (VPMS)....................5
1.5. Terminology...................................................6
2. Reference Model.................................................6
3. Use Cases.......................................................8
4. Challenges......................................................9
4.1. Generic E-Tree Service Definition.............................9
4.1.1. Mandatory Leaf-to-Leaf Communication Restriction............9
4.2. Use Case Desirable Requirements..............................10
4.2.1. Ethernet Broadcast/Multicast Optimisation..................10
4.2.2. IP Multicast Optimisation..................................11
4.2.3. MAC-based Forwarding Unnecessary...........................11
4.2.4. MAC-based Forwarding Security Concern......................12
5. A Solution Framework for MAC-based Forwarding E-Tree...........12
5.1. MAC-based Forwarding Any-to-Any Ethernet VPN.................12
5.2. Leaf-to-Leaf Communication Restriction.......................13
5.3. Optional Enhancement - Point-to-Multipoint PW................13
5.4. Optional Enhancement - IP Multicast in VPLS.......... .......14
6. Non-MAC-based Forwarding E-Tree................................14
6.1. Single Root, Broadcast Only - VPMS...........................14
6.2. Multiple Roots, Broadcast and Unicast........................14
7. Security Consideration.........................................14
8. IANA Considerations............................................15
9. Acknowledgements...............................................15
10. References....................................................15
10.1. Normative References........................................15
10.2. Informative References......................................15
Appendix A. Some Possible Ways for Leaf-to-Leaf Communication
Restriction...........................................18
Authors' Addresses................................................28
Intellectual Property and Copyright Statements....................29
Conventions used in this document
Show full document text