Internet DRAFT - draft-li-l2vpn-ccvpn-arch

draft-li-l2vpn-ccvpn-arch






Network Working Group                                              Z. Li
Internet-Draft                                                 S. Zhuang
Intended status: Informational                       Huawei Technologies
Expires: April 23, 2014                                 October 20, 2013


 An Architecture of Central Controlled Layer 2 Virtual Private Network
                                (L2VPN)
                      draft-li-l2vpn-ccvpn-arch-00

Abstract

   With the emergence of Software Defined Networks (SDN), the
   architecture of forwarding and control element separation will
   develop faster.  In the central controlled framework, control
   functionality of L2VPN can be done only by the Controllers.
   Consequently it can reduce control functionality in network nodes.
   This document defines the architecture of central controlled L2VPN
   and corresponding protocol extension requirement.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 23, 2014.









Li & Zhuang              Expires April 23, 2014                 [Page 1]

Internet-Draft         An Architecture of CC L2VPN          October 2013


Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Architecture  . . . . . . . . . . . . . . . . . . . . . . . .   3
     3.1.  Application Scenarios . . . . . . . . . . . . . . . . . .   4
   4.  Solutions and Protocol Extensions . . . . . . . . . . . . . .   5
     4.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .   5
     4.2.  PW Establishment  . . . . . . . . . . . . . . . . . . . .   5
     4.3.  PW Redundancy . . . . . . . . . . . . . . . . . . . . . .   6
     4.4.  MAC Withdraw  . . . . . . . . . . . . . . . . . . . . . .   6
     4.5.  Capability Negotiation  . . . . . . . . . . . . . . . . .   7
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   7.  Normative References  . . . . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   With the development of network technologies, carrier's networks
   become increasingly complex.  New technologies are required to
   integrate traditional switching networks such as ATM and FR networks
   through IP/MPLS networks.  Layer 2 VPN (L2VPN) is therefore
   introduced.  MPLS L2VPN transmits Layer 2 VPN services over an MPLS
   network.  MPLS L2VPN enables operators to provide L2VPN services over
   different media, such as Asynchronous Transfer Mode (ATM), Frame
   Relay (FR), virtual local area network (VLAN), Ethernet, and Point-
   to-Point Protocol (PPP) in a unified MPLS network.  Simply, the MPLS
   L2VPN indicates that Layer 2 data is transmitted transparently over
   an MPLS network.  For the users, the MPLS network functions as a
   Layer 2 switched network through which Layer 2 connections can be set
   up between nodes.  Layer 2 connections can be set up in virtual
   leased line (VLL) mode and virtual private LAN service (VPLS) mode.



Li & Zhuang              Expires April 23, 2014                 [Page 2]

Internet-Draft         An Architecture of CC L2VPN          October 2013


   With the emergence of Software Defined Networks (SDN), various
   services (e.g. L2VPN, L3VPN, MVPN) have been considered to deploy in
   a central controlled mode.  The architecture of central controlled
   BGP is defined in [I-D.li-idr-cc-bgp-arch].  In the central
   controlled framework, control functionality of L2VPN can be done only
   by the Controllers.  Consequently it can reduce control functionality
   in network nodes.

   This document defines an architecture of Central Controlled L2VPN and
   corresponding protocol extension requirement.

2.  Terminology

   BGP: Border Gateway Protocol

   FEC: Forwarding Equivalence Class

   I2RS: Interface to Routing System

   L2VPN: Layer 2 VPN

   L3VPN: Layer 3 VPN

   LDP: Labe Distribution Protocol

   MPLS: Multi-Protocol Label Switching

   PW: Pseudo-Wire

   SDN: Software-Defined Network

   VPN: Virtual Private Network

   VPLS: Virtual Private LAN Service

   VSI: Virtual Switch Instance

3.  Architecture













Li & Zhuang              Expires April 23, 2014                 [Page 3]

Internet-Draft         An Architecture of CC L2VPN          October 2013


    +------------------------------+   +------------------------------+
    |            Domain 1          |   |            Domain 2          |
    |          +----------+                       +----------+        |
    |          |  L2VPN   |      Signaling        |  L2VPN   |        |
    |          |Controller|--------------------- -|Controller|        |
    |          |          |        |   |          |          |        |
    |          |          |        |   |          |          |        |
    |          +----------+                       +----------+        |
    |         /            \    PW/Tunnel        /            \       |
    |        / =============================    /              \      |
    |       / //             \     |   |   \\  /                \     |
    | +--------+        +--------+ |   | +--------+        +--------+ |
    | |        |        |        | |   | |        |        |        | |
    | |Forward | ...... |Forward | |   | |Forward | ...... |Forward | |
    | |        |        |        | |   | |        |        |        | |
    | | NODE 1 |        | NODE n | |   | | NODE 1 |        | NODE n | |
    | +--------+        +--------+ |   | +--------+        +--------+ |
    +------------------------------+   +------------------------------+

           Figure 1: An Architecture of Central Controlled L2VPN


   The figure above shows the architecture of central controlled L2VPN,
   which consists of two essential network elements: L2VPN Controller
   and Forward Node.  In the architecture, there is no L2VPN related
   control functionality in Forward Nodes.  L2VPN Controller controls
   all the Forward Nodes by download forwarding entries to control the
   forwarding behavior of the node.  L2VPN Controllers need to
   communicate with each other via extension of existing protocols, e.g.
   BGP, LDP, etc.  In this architecture, the L2VPN service set up
   between the forward nodes is proxied by the BGP Controllers.

   The architecture defined in this document applies to VPLS, VPWS.
   Extension to EVPN will be described in a future version.

3.1.  Application Scenarios

   There are three application scenarios for deployment of Central
   Controlled L2VPN service.

   Scenario 1: Partial Deployment

   Some network nodes are upgrading to support Central Controlled L2VPN,
   the other nodes are retained as legacy network nodes.  The new
   network nodes are controlled by L2VPN Controller.  In this scenarios,
   the protocol extensions are applied between the legacy node and the
   controller.




Li & Zhuang              Expires April 23, 2014                 [Page 4]

Internet-Draft         An Architecture of CC L2VPN          October 2013


   Scenario 2: Multiple Controller within a Single AS

   In this scenario, there are multiple controllers in a single AS to be
   responsible for setup of Central Controlled L2VPN service.  The
   network will be partitioned into multiple domains in which one
   Central Controller controls a set of nodes.  The protocol extensions
   are applied between the controllers.

   Scenario 3: Multiple Controller within Multiple ASes

   In this scenario, there are multiple controllers in different ASes to
   be responsible for setup of Central Controlled L2VPN service.  Each
   AS has at least one Central Controller.  The protocol extensions
   SHOULD support inter-AS application.

4.  Solutions and Protocol Extensions

4.1.  Overview

   There are two options to implement the architecture of Central
   Controlled L2VPN.

   Option 1:

   Using BGP to distribute label and fulfill the other control
   functionality for central controlled L2VPN service.

   This option can be applied to multiple scenarios.

   Option 2:

   Using LDP to distribute label and fulfill the other control
   functionality for central controlled L2VPN service.

   This option is a transitional manner, mainly being used for
   communicating between legacy network node and L2VPN Controller.

4.2.  PW Establishment

   There are following procedures to set up PW in the Central Controlled
   L2VPN service:

   1.  Auto Discovery: The controller SHOULD advertise the address list
   of Forward Nodes participating in a specific VPLS or VLL to other
   controllers.  After the communication between the controllers, the
   controller can discover the PW that should be set up between the
   Forwarding Nodes controlled by this controller and the Forwarding
   Nodes controlled by other controllers.



Li & Zhuang              Expires April 23, 2014                 [Page 5]

Internet-Draft         An Architecture of CC L2VPN          October 2013


   2.  PW Label Allocation: After the process of auto discovery, the
   controller will advertise the label mapping message to the other
   controller for the PW which should be set up between a pair of
   Forward Nodes.  The addresses of the local Forward Node and the
   remote Forward Node SHOULD be carried in the message to differentiate
   the PWs.

   3.  PW Forwarding Entry Creation: When receive the label mapping, the
   controller will find the tunnel to the Forward Node identified by the
   address information of the Local Forwarding Node in the message.
   Then the controller will create PW forwarding entry with PW label and
   the tunnel information and download the forwarding entry to the
   specified Forward Node identified by the address information of the
   remote Forward Node in the message .

4.3.  PW Redundancy

   [RFC4447] defines the PW redundancy mechanism and specifies the PW
   Status TLV to transmit the PW forwarding status.  In the Central
   Controlled L2VPN, when advertise the status for the PW between the
   controllers, the addresses of the Local Forward Node and the Remote
   Forward Node should be carried to specify the specific PW.  The
   similar TLV like PW Status TLV SHOULD also be defined to carry the
   status of the specific PW.

   When the controller receives the message carried the PW status
   information, it will set the PW on the specified Forwarding Node as
   the state specified by the message.

4.4.  MAC Withdraw

   [RFC4762] describes a mechanism to remove MAC addresses that have
   been dynamically learned in a VPLS Instance for faster convergence on
   topology change.  The procedure also removes MAC addresses in the
   VPLS that does not require relearning due to such topology change.

   [I-D.ietf-l2vpn-vpls-ldp-mac-opt] defines an enhancement to the MAC
   Address Withdrawal procedure with empty MAC List [RFC4762], which
   enables a Provider Edge(PE) device to remove only the MAC addresses
   that need to be relearned.  Additional extensions to [RFC4762] MAC
   Withdrawal procedures are specified to provide optimized MAC flushing
   for the PBB-VPLS specified in [I-D.ietf-l2vpn-pbb-vpls-pe-model] .

   For Central Controlled L2VPN, L2VPN Controller needs to develop an
   ability to remove the MAC of the specific Forward Node.  When a
   Forward Node within a L2VPN Controller wants to remove MAC Addresses
   that has been sent to the remote endpoint, the Controller needs to
   send MAC Withdraw Messages on behalf of the Forward Node.  In the



Li & Zhuang              Expires April 23, 2014                 [Page 6]

Internet-Draft         An Architecture of CC L2VPN          October 2013


   message, the address of the remote forward node should be carried.
   When the other controller receive the message, it will remove the
   specified MAC addresses on the Forward Node identified by the address
   of the remote forward node in the message.

4.5.  Capability Negotiation

   To ensure backward compatibility with existing implementations, the
   capability for Central Controlled L2VPN SHOULD be negotiated between
   the controllers.  The capability is advertised to each other by the
   controllers.  After the successful negotiation of the capability, the
   other control functionalities for the central controlled L2VPN can be
   done by the controller.

5.  IANA Considerations

   This document makes no request of IANA.

6.  Security Considerations

   TBD.

7.  Normative References

   [I-D.ietf-l2vpn-pbb-vpls-pe-model]
              Balus, F., Sajassi, A., and N. Bitar, "Extensions to VPLS
              PE model for Provider Backbone Bridging", draft-ietf-
              l2vpn-pbb-vpls-pe-model-07 (work in progress), June 2013.

   [I-D.ietf-l2vpn-vpls-ldp-mac-opt]
              Dutta, P., Balus, F., Stokes, O., and G. Calvignac, "LDP
              Extensions for Optimized MAC Address Withdrawal in
              H-VPLS", draft-ietf-l2vpn-vpls-ldp-mac-opt-08 (work in
              progress), February 2013.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC4271]  Rekhter, Y., Li, T., and S. Hares, "A Border Gateway
              Protocol 4 (BGP-4)", RFC 4271, January 2006.

   [RFC4447]  Martini, L., Rosen, E., El-Aawar, N., Smith, T., and G.
              Heron, "Pseudowire Setup and Maintenance Using the Label
              Distribution Protocol (LDP)", RFC 4447, April 2006.

   [RFC4761]  Kompella, K. and Y. Rekhter, "Virtual Private LAN Service
              (VPLS) Using BGP for Auto-Discovery and Signaling", RFC
              4761, January 2007.



Li & Zhuang              Expires April 23, 2014                 [Page 7]

Internet-Draft         An Architecture of CC L2VPN          October 2013


   [RFC5492]  Scudder, J. and R. Chandra, "Capabilities Advertisement
              with BGP-4", RFC 5492, February 2009.

   [RFC6074]  Rosen, E., Davie, B., Radoaca, V., and W. Luo,
              "Provisioning, Auto-Discovery, and Signaling in Layer 2
              Virtual Private Networks (L2VPNs)", RFC 6074, January
              2011.

   [RFC6513]  Rosen, E. and R. Aggarwal, "Multicast in MPLS/BGP IP
              VPNs", RFC 6513, February 2012.

   [RFC6514]  Aggarwal, R., Rosen, E., Morin, T., and Y. Rekhter, "BGP
              Encodings and Procedures for Multicast in MPLS/BGP IP
              VPNs", RFC 6514, February 2012.

   [RFC6718]  Muley, P., Aissaoui, M., and M. Bocci, "Pseudowire
              Redundancy", RFC 6718, August 2012.

   [RFC6870]  Muley, P. and M. Aissaoui, "Pseudowire Preferential
              Forwarding Status Bit", RFC 6870, February 2013.

Authors' Addresses

   Zhenbin Li
   Huawei Technologies
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: lizhenbin@huawei.com


   Shunwan Zhuang
   Huawei Technologies
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: zhuangshunwan@huawei.com












Li & Zhuang              Expires April 23, 2014                 [Page 8]