Internet DRAFT - draft-zheng-l2vpn-evpn-pm-framework

draft-zheng-l2vpn-evpn-pm-framework







Network Working Group                                           L. Zheng
Internet-Draft                                                     Z. Li
Intended status: Standards Track                               S. Aldrin
Expires: August 17, 2014                             Huawei Technologies
                                                       February 13, 2014


              A Framework for E-VPN Performance Monitoring
                 draft-zheng-l2vpn-evpn-pm-framework-01

Abstract

   The capability of Ethernet VPN performance monitoring (PM) is
   important to meet the Service Level Agreement(SLA) for the service
   beared.  Since multipoint-to-point or multipoint-to-multipoint
   (MP2MP) network model applies, flow identifying is a big challenge
   for E-VPN PM.  This document specifies the framework and mechanisms
   for the application of E-VPN PM.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on August 17, 2014.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.





Zheng, et al.            Expires August 17, 2014                [Page 1]

Internet-Draft           A Framework for EVPN PM           February 2014


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Overview and Concepts . . . . . . . . . . . . . . . . . . . .   4
     3.1.  EVI-to-EVI Tunnel . . . . . . . . . . . . . . . . . . . .   4
   4.  Control Plane . . . . . . . . . . . . . . . . . . . . . . . .   4
     4.1.  E-VPN Membership Auto-Discovery . . . . . . . . . . . . .   4
     4.2.  EVI-to-EVI Tunnel Label Allocation  . . . . . . . . . . .   4
   5.  Data Plane  . . . . . . . . . . . . . . . . . . . . . . . . .   5
     5.1.  Additional Label for Ingress EVI Identification . . . . .   5
     5.2.  Replace MAC Label with ET Label . . . . . . . . . . . . .   6
   6.  E-VPN Performance Monitoring  . . . . . . . . . . . . . . . .   6
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   7
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     10.1.  Normative References . . . . . . . . . . . . . . . . . .   7
     10.2.  Informative References . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   Virtual Private LAN Service (VPLS) is a proven and widely deployed
   Ethernet L2VPN solution.  However, it has a number of limitations
   when it comes to redundancy, multicast optimization and provisioning
   simplicity.  Also, new applications are driving several new
   requirements for other L2VPN services such as E-TREE, VPWS, and VPMS.
   Furthermore, data center interconnect applications are driving the
   need for new service interface types, the "VLAN-aware Bundling"
   service interfaces.  Then the Ethernet VPN (E-VPN) solution (defined
   in [I-D.ietf-l2vpn-evpn]) has been proposed to meet these
   requirements which is documented in [I-D.ietf-l2vpn-evpn-req].

   An E-VPN comprises PEs that form the edge of the MPLS infrastructure
   and CEs that are connected to PEs.  The PEs provide virtual Layer 2
   bridged connectivity between the CEs.  In E-VPN, MAC learning between
   PEs occurs not in the data plane but in the control plane.  PEs



Zheng, et al.            Expires August 17, 2014                [Page 2]

Internet-Draft           A Framework for EVPN PM           February 2014


   advertise the MAC addresses learned from the CEs, along with the
   associated MPLS label, to other PEs in the control plane by using MP-
   BGP.

   The requirements and reference framework for Ethernet VPN (E-VPN)
   Operations, Administration and Maintenance (OAM) has been specified
   in [I-D.salam-l2vpn-evpn-oam-req-frmwk].  The capability of E-VPN to
   measure and monitor performance metrics for packet loss, packet
   delay, etc. is essential for meeting the Service Level Agreement
   (SLA).  This measurement capability also provides operators with
   greater visibility into the performance characteristics of the
   services in their networks, and provides diagnostic information in
   case of performance degradation or failure and helps for fault
   localization.  To perform the measurement of packet loss, delay and
   other metrics on a particular E-VPN flow, the egress PE needs to
   determine which specific ingress EVI packets belongs to.  There
   exists complete and mature performance monitoring mechanism for the
   traditional L2VPN based on the point-to-point PW.  But in the case of
   E-VPN, multipoint-to-point (MP2P) or multipoint-to-multipoint (MP2MP)
   network model applies, it makes the flow identifying a big challenge
   for packets loss and delay measurement.  This MP2P or MP2MP model
   also apply to L3VPN, please refer to [I-D.zheng-l3vpn-pm-analysis]
   for detailed description of the challenge for performance monitoring
   of such network model.

   Statistical approximation of packet loss by using synthetic OAM
   packets is briefly discussed in [I-D.salam-l2vpn-evpn-oam-req-frmwk].
   This document defines a framework for accurate performance monitoring
   of E-VPN, especially for packet loss measurement.  The point-to-point
   connection named as EVI-to-EVI tunnel is introduced in E-VPN.  And
   the corresponding process of control plane and data plane is defined.

2.  Terminology

   E-VPN: Ethernet VPN

   EVI: Ethernet VPN Instance

   ET: EVI-to-EVI Tunnel

   MP2P: Multi-Point to Point

   MP2MP: Multi-Point to Multi-Point

   P2P: Point to Point

   PM: Performance Monitoring




Zheng, et al.            Expires August 17, 2014                [Page 3]

Internet-Draft           A Framework for EVPN PM           February 2014


3.  Overview and Concepts

   Based on the mechanisms in [I-D.ietf-l2vpn-evpn], for a particular
   MAC address route, the directly connected PE allocates the same MPLS
   label to all the remote PEs which maintain the MAC routing and
   forwarding instance (EVI) of that E-VPN.  Thus for the egress PE, it
   is unable to identify the source EVI of the received E-VPN packets.

   To perform the packet loss or delay measurement on a specific E-VPN
   flow, it is critical to establish the Point-to-Point connection
   between the two EVIs.  Once the Point-to-Point connection is built
   up, current measurement mechanisms for MPLS networks may be applied
   to E-VPN.  A new concept "EVI-to-EVI Tunnel" is introduced in the
   following section to establish such Point-to-Point connection in
   E-VPN.

3.1.  EVI-to-EVI Tunnel

   In order to perform performance monitoring in E-VPN, a point-to-point
   connection between any two EVIs of a particular E-VPN needs to be
   established.  This point-to-point connection enables the egress PE
   identifying the ingress EVI of the received E-VPN packet, thus
   enables the measurement of the packet loss and delay between the
   ingress and egress EVIs.  Such point-to-point connection between an
   ingress EVI and an egress EVI is called "EVI-to-EVI Tunnel (ET)".

4.  Control Plane

   This section describes the control plane mechanisms for E-VPN
   performance monitoring.

4.1.  E-VPN Membership Auto-Discovery

   Before the Point-to-Point connections between EVIs could be
   established, each PE attaching a given E-VPN needs to learn all the
   remote PEs that attach to the same E-VPN.  This could be achieved by
   the Ethernet A-D route per EVI defined in [I-D.ietf-l2vpn-evpn].
   Please refer to section 9.4.1 [I-D.ietf-l2vpn-evpn] for details.

4.2.  EVI-to-EVI Tunnel Label Allocation

   After obtaining the E-VPN membership information, each PE needs to
   allocate MPLS labels to identify the EVI-to-EVI tunnel from the
   remote EVI to the local EVI.  We call such labels as ET labels in
   this document.  For each local EVI, the egress PE SHOULD allocate
   different ET labels for each remote EVI in PEs belonging to the same
   E-VPN.  As such, the egress PE could identify the E-VPN flow received
   from different ingress EVIs, and the packet loss and delay



Zheng, et al.            Expires August 17, 2014                [Page 4]

Internet-Draft           A Framework for EVPN PM           February 2014


   measurement could be performed between each ingress EVI and the local
   EVI.

5.  Data Plane

   This section introduces two new MPLS label stack encapsulations when
   ET label applies.

5.1.  Additional Label for Ingress EVI Identification

   When a E-VPN data packet is to be sent on the ingress PE, firstly the
   label advertised by the MP-BGP for the Mac address route is pushed
   onto the label stack.  The ET label allocated by the egress EVI for
   the ingress EVI should then be pushed onto the label stack to
   identify the Point-to-Point connection between the sending and
   receiving EVI.  Finally the MPLS tunnel label is pushed onto the
   label stack.  The process of TTL and COS fields between the E-VPN
   label encapsulation and the tunnel label encapsulation is done
   according to the Pipe and Uniform Models defined by [RFC3270] and
   [RFC3443].The value of the TTL and COS field in the MAC label's
   encapsulation SHOULD be copied to the corresponding fields of the ET
   label's encapsulation.  As such, one extra label is carried in the
   label stack compared with E-VPN data plane defined in
   [I-D.ietf-l2vpn-evpn].

   When the E-VPN data packet received by the egress PE, the outermost
   tunnel label is popped, then the egress PE could use the ET label to
   identify the ingress EVI of the packet.  The process of TTL and COS
   fields at the egress node should be done according to the Pipe and
   Uniform Models defined by [RFC3270] and [RFC3443].  Since the value
   of the TTL and COS fields of the MAC label encapsulation and the ET
   label encapsulation are the same, the TTL and COS fields of the ET
   label encapsulation could be ignored during the course of the TTL and
   COS process at the egress node.

    +--------------+              +--------------+
    | Tunnel Label |              | Tunnel Label |
    +--------------+        \     +--------------+
    |   MAC Label  |  -------\    |   ET Label   |
    +--------------+  -------/    +--------------+
    |    Payload   |        /     |  MAC Label   |
    +--------------+              +--------------+
                                  |   Payload    |
                                  +--------------+

           Fig.1 Additional Label for Ingress EVI Identification





Zheng, et al.            Expires August 17, 2014                [Page 5]

Internet-Draft           A Framework for EVPN PM           February 2014


5.2.  Replace MAC Label with ET Label

   Since the ET label identifies the connection between the ingress EVI
   and egress EVI, it could also be used to identify the egress EVI
   forwarding table in which the MAC prefix lookup should be performed.
   Thus when encapsulating the E-VPN data packets, the ingress PE could
   simply replace the MAC label with the ET label, then push the tunnel
   label.  The process of TTL and COS fields between the MAC label
   encapsulation and the tunnel label encapsulation is done according to
   the Pipe and Uniform Models defined by [RFC3270] and [RFC3443].  The
   TTL and COS value of the MAC label entry should be copied to the TTL
   and COS field of the ET label entry respectively.  In this way the
   depth of the MPLS label stack is unchanged.

   The encapsulation method would require the egress PE to perform MAC
   prefix lookup in the egress EVI forwarding table before the packet
   can be forwarded to a specific CE.  The similar procedure is also
   required when per-instance EVI label allocation mechanism is used.
   The process of TTL and COS fields at the egress node should be done
   according to the Pipe and Uniform Models defined by [RFC3270] and
   [RFC3443].  Since the MAC label encapsulation is replaced with the ET
   label encapsulation, the TTL and COS fields of the VT label
   encapsulation should be used as those of the MAC label encapsulation
   during the course of the TTL and COS process at the egress node.

    +--------------+              +--------------+
    | Tunnel Label |              | Tunnel Label |
    +--------------+        \     +--------------+
    |   MAC Label  |  -------\    |   ET Label   |
    +--------------+  -------/    +--------------+
    |    Payload   |        /     |    Payload   |
    +--------------+              +--------------+

                 Fig.2 Replace the MAC Label with ET Label

6.  E-VPN Performance Monitoring

   [RFC6374] defines procedure and protocol mechanisms to enable the
   efficient and accurate measurement of packet loss, delay, as well as
   related metrics in MPLS networks.  It provides either point-to-point
   or point-to-multipoint measurement capabilities.  Once the point-to-
   point connection EVI-to-EVI Tunnel is established between the ingress
   and egress EVIs, the procedures for the packet loss and delay
   measurement as defined in [RFC6374] can be utilized for E-VPN
   performance monitoring.  The main difference between performance
   monitoring of E-VPN and MPLS is the format of identifiers in the Loss
   Measurement (LM) and Delay Measurement (DM) messages.  Specifically,
   for E-VPN, the source and destination addresses of the LM and DM



Zheng, et al.            Expires August 17, 2014                [Page 6]

Internet-Draft           A Framework for EVPN PM           February 2014


   messages should be set to the concatenation of the Route
   Distinguisher (RD) of the particular EVI and the IP address of the
   ingress and egress PE respectively.

7.  IANA Considerations

   This document makes no request of IANA.

8.  Security Considerations

   TBD

9.  Acknowledgements

   TBD

10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

10.2.  Informative References

   [I-D.ietf-l2vpn-evpn-req]
              Sajassi, A., Aggarwal, R., Bitar, N., and A. Isaac,
              "Requirements for Ethernet VPN (EVPN)", draft-ietf-l2vpn-
              evpn-req-07 (work in progress), February 2014.

   [I-D.ietf-l2vpn-evpn]
              Sajassi, A., Aggarwal, R., Henderickx, W., Isaac, A., and
              J. Uttaro, "BGP MPLS Based Ethernet VPN", draft-ietf-
              l2vpn-evpn-05 (work in progress), February 2014.

   [I-D.salam-l2vpn-evpn-oam-req-frmwk]
              Salam, S., Sajassi, A., Aldrin, S., and J. Drake, "E-VPN
              Operations, Administration and Maintenance Requirements
              and Framework", draft-salam-l2vpn-evpn-oam-req-frmwk-02
              (work in progress), January 2014.

   [I-D.zheng-l3vpn-pm-analysis]
              Zheng, L., Li, Z., Aldrin, S., and B. Parise, "Performance
              Monitoring Analysis for L3VPN", draft-zheng-l3vpn-pm-
              analysis-02 (work in progress), October 2013.






Zheng, et al.            Expires August 17, 2014                [Page 7]

Internet-Draft           A Framework for EVPN PM           February 2014


   [RFC3270]  Le Faucheur, F., Wu, L., Davie, B., Davari, S., Vaananen,
              P., Krishnan, R., Cheval, P., and J. Heinanen, "Multi-
              Protocol Label Switching (MPLS) Support of Differentiated
              Services", RFC 3270, May 2002.

   [RFC3443]  Agarwal, P. and B. Akyol, "Time To Live (TTL) Processing
              in Multi-Protocol Label Switching (MPLS) Networks", RFC
              3443, January 2003.

   [RFC6374]  Frost, D. and S. Bryant, "Packet Loss and Delay
              Measurement for MPLS Networks", RFC 6374, September 2011.

Authors' Addresses

   Lianshu Zheng
   Huawei Technologies
   Huawei Campus, No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: vero.zheng@huawei.com


   Zhenbin Li
   Huawei Technologies
   Huawei Campus, No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: lizhenbin@huawei.com


   Sam K. Aldrin
   Huawei Technologies

   Email: aldrin.ietf@gmail.com















Zheng, et al.            Expires August 17, 2014                [Page 8]