A Framework for E-Tree Service over MPLS Network
draft-ietf-l2vpn-etree-frwk-03
Network Working Group Raymond Key (editor)
Internet Draft Simon Delord, Telstra
Category: Informational Frederic Jounay, Orange CH
Expires: March 2014 Lucy Yong, Huawei
Lizhong Jin
Yuji Kamite, NTT Communications
Wim Henderickx, Alcatel-Lucent
September 6, 2013
A Framework for E-Tree Service over MPLS Network
draft-ietf-l2vpn-etree-frwk-03
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on March 6, 2014.
Abstract
This document proposes a solution framework for supporting Metro
Ethernet Forum (MEF) Ethernet Tree (E-Tree) services over a
Multiprotocol Label Switching (MPLS) network. The objective is to
provide a simple and effective approach to emulate E-Tree services
in addition to Ethernet LAN (E-LAN) services on an existing MPLS
network.
Key, et al. Expires March 2014 [Page 1]
Internet Draft Framework E-Tree over MPLS September 2013
Table of Contents
1. Introduction....................................................3
1.1. Objective and Scope...........................................3
1.2. Traditional Ethernet Network..................................3
1.3. MEF Multipoint Ethernet Services..............................3
1.3.1. Similarity between E-LAN and E-Tree.........................4
1.3.2. Difference between E-LAN and E-Tree.........................4
1.4. IETF Multipoint L2VPN Services................................5
1.4.1. Virtual Private LAN Service (VPLS)..........................5
1.4.2. Virtual Private Multicast Service (VPMS)....................5
1.4.3. Ethernet VPN (E-VPN)........................................6
1.5. Terminology...................................................6
2. Reference Model.................................................6
3. Use Cases.......................................................8
4. Challenges......................................................9
4.1. Generic E-Tree Service Definition.............................9
4.1.1. Mandatory Leaf-to-Leaf Communication Restriction............9
4.2. Use Case Desirable Requirements..............................10
4.2.1. Ethernet Broadcast/Multicast Optimisation..................10
4.2.2. IP Multicast Optimisation..................................11
4.2.3. MAC-based Forwarding Unnecessary...........................11
4.2.4. MAC-based Forwarding Security Concern......................12
5. A Solution Framework for MAC-based Forwarding E-Tree...........12
5.1. VPLS Solution................................................12
5.1.1. MAC-based Forwarding Any-to-Any Ethernet VPN...............12
5.1.2. Leaf-to-Leaf Communication Restriction.....................13
5.1.3. Optional Enhancement - Point-to-Multipoint PW..............13
5.1.4. Optional Enhancement - IP Multicast in VPLS........ .......14
5.2. E-VPN Solution...............................................14
6. Non-MAC-based Forwarding E-Tree................................14
6.1. Single Root, Broadcast Only - VPMS...........................14
6.2. Multiple Roots, Broadcast and Unicast........................14
6.3. E-VPN Solution...............................................15
7. Security Consideration.........................................15
8. IANA Considerations............................................15
9. Acknowledgements...............................................15
10. References....................................................15
10.1. Normative References........................................15
10.2. Informative References......................................16
Appendix A. Some Possible Ways for Leaf-to-Leaf Communication
Show full document text