Technical White Paper For VPLS: Huawei Technologies Co., LTD
Technical White Paper For VPLS: Huawei Technologies Co., LTD
Table of Contents
1 Foreword.......................................................................................................... 1
2 Introduction ...................................................................................................... 1
2.1 Two Signaling Modes for VPLS PW Establishment............................................... 2
2.2 Packet Forwarding................................................................................................. 5
2.2.1 Basic Transmission Components of the VPLS Network.............................................. 5
4 Typical Application.......................................................................................... 15
4.1 Integrated Networking with VPLS........................................................................ 15
5 Conclusion ..................................................................................................... 16
Appendix A Abbreviations and Acronyms............................................................. 17
Abstract: The VPLS technology is a technology used to provide virtual Ethernet service over
the existing WAN. Through membership discovery, PW establishment and
maintenance, and MAC-based address forwarding in the VSI, it interconnects LAN
sites across WANs and thus interconnects the LANs geographically scattered via
the Internet. This document introduces the principles, key technologies, defects
and merits of VPLS. It ends up with suggestions on VPLS application and
deployment.
Key word: VPLS, PW, AC, VSI, UPE, SPE, P-PE
1 Foreword
VPLS is a kind of L2 VPN technology based on MPLS and Ethernet technologies. In
the past decade, the Ethernet technology has gained rapid development and wide
application. Its rate increases from 10M to 100M and from 100M to 1000M with lower
and lower deployment cost. Besides wide application in enterprise networks, it is
more and more applied to operation networks especially MANs. Because of its high
bandwidth and low cost, the Ethernet is very competitive. To provide the multi-point
service similar to that in the Ethernet over the MAN/WAN, the VPLS technology
emerged.
2 Introduction
VPLS (Virtual Private LAN Services) is a kind of service provided on the MPLS
network, similar to the LAN service. It enables users to access the network from
multiple points geographically scattered and access each other, just as if these points
were directly accessed to the LAN. With the VPLS service, users can extend their
LAN to the MAN or even the WAN.
Figure 1 illustrates the typical networking of VPLS. The interfaces added to the VPLS
support broadcast, forwarding and Ethernet frame filtering. The PEs are connected
with one another via PWs (Pseudo Wires) to form a simulated LAN for the customer.
Each PE must learn not only MAC addresses of the Ethernet packets from the PWs
but also MAC addresses of the CEs connected to it. Generally, MPLS tunnels or any
tunnel tunnels (e.g. GRE, L2TPV3 or TE) are used as the PWs. A PE is generally an
MPLS edge router and can establish tunnels to the other PEs.
VPLS-A VPLS-A
CE-3 U-PE
CE-1
PE P-PE
VPLS-B
CE-1
VPLS-B
CE-3 SP Backbone
L 2 ACCESS
NETWORK
PE
VPLS-B
U-PE CE-4
VPLS-A
CE-2
VPLS-B
CE-2
PE1 PE2
Configure a VSI and
specify PE2 as the Configure a VSI and
peer specify PE1 as the
Mapping message peer
Mapping message
Withdraw message
Withdraw the
PW, PW down
Release message
Reclaim the
label, PW down
PE1 PE2
Configure a VSI, specify
PE2 as its BGP peer Configure a VSI, specify
and enable the VPLS PE1 as its BGP peer
address family and enable the VPLS
Update message (with mp-reach) address family
Withdraw the
PW, PW down
Reclaim the
label, PW down
Signaling mode
Attribute
Signaling mode
Attribute
In sum, the BGP mode is suitable for the core layer of a large network where the PEs
run the BGP protocol and have requirement of the inter-AS. The LDP mode is
applicable when there are few VPLS sites and there is no or seldom inter-AS
requirement, especially when the PEs do not run the BGP protocol. When the VPLS
network is large (with numerous nodes and large geographical area), the HVPLS
(Hierarchical VPLS) combining these two modes can be used: The core layer adopts
the BGP mode and the access layer adopts the LDP mode.
The basic transmission components of the VPLS network and their functions are
described as follows:
1) Attachment Circuit (AC): A connection line or virtual link between a CE and a PE.
Generally, all the user packets on the AC should be transparently transmitted to the
peer site, including the L2/L3 protocol packets of the user.
2) Pseudo Wire (PW): To be simply, a PW is a VC plus a tunnel. The tunnel may be an
LSP, L2TPV3 or TE. PWs are directional. To establish a PW in the VPLS network, the
signaling (LDP or BGP) is needed to transmit VC information and then the VC
information and tunnel is managed via VSI management to form a PW. For the
VPLS system, a PW is just like a straight channel from one local AC to the peer AC to
transparently transmit L2 data of users.
3) Forwarders: A PE receives the data frames sent over the AC while a forwarder
selects a PW for forwarding the packets. A forwarder is in fact the FDB of VPLS.
4) Tunnels: Used for bearing PWs. One tunnel can bear multiple PWs, generally MPLS
tunnels. A tunnel is a straight channel between a local PE and the peer PE to
transparently transmit data between the two PE’s.
5) Encapsulation: The packets transmitted over the PW use the standard PW
encapsulation format and technology. There are two modes for VPLS packet
encapsulation over the PW: Tagged mode and RAW mode.
6) Pseudowire Signaling: The PW signaling protocol is the basis for VPLS
implementation and is used for establishing and maintaining PWs. It can also be
used for automatically discovering the peer PE of a VSI. At present, there are two PW
signaling protocols: LDP and BGP.
7) Service Quality: To map the priority information in the L2 packet header of the user
into the QoS priority for transmission over the public network, generally the
application should support MPLS QOS.
The positions of the basic transmission components of VPLS in the network are
shown in Figure 4:
AC VPN 1
PW Site 1
Tunnel
CE1
VPN 2
PW信令协议 Site 1
CE2
Forwarder
PE1
VPN 1 P MPLS网络
Site 2
PE2
CE3
CE4
VPN 2
Site 2
PW2
VPN1 B vlan10,port1
ARP reply
The remote MAC addresses learnt by the PE need an aging mechanism to remove
the address entries related to the VC label but no longer in use. After the packet is
received, the aging timer corresponding to the source address shall be reset. Similarly,
all the MAC addresses learnt in the local VSI should be aged.
Loop elimination
Generally, STP is used on the Ethernet to avoid possible forwarding loops. In the
VPLS network, the split horizon mechanism is used to eliminate loops between PEs,
that is, the packets received by a PE shall not be forwarded to the other PEs. In
addition, the PE’s are fully meshed to ensure the reachability and a loop-free
environment for VPLS packet forwarding, along with the split horizon mechanism.
When a CE has multiple connections to a PE or the CEs connected to one VPLS VPN
have connections with one another, loops are unavoidable in the VPLS network and
other methods (e.g. STP) shall be used to solve the problem.
3 Key Technologies
MAC Address Learning
MAC address learning is one of the important indices in VPLS. In the telecom network,
the original traffic will change from clockwise to counterclockwise if ring network
switching occurs. If 500 MAC packets are learnt per second, it takes 128 seconds to
learn the typical 64K MAC addresses. Thus, before the MAC addresses are all learnt
again, traffic will be in an incorrect direction (still clockwise) or broadcast will occur.
Packet loss will be caused in either case. The typical switching time for the telecom
network is 50ms. Then what is the appropriated MAC learning capability? When the
MAC address capacity of the equipment is 64K and the switching of 64K MAC
addresses is to be completed within 50 ms, the learning capability should be: 64K / 50
ms = 1.28M times/second. When the MAC address capacity is 16K, the learning
capability should be: 16K / 50 ms = 320K times/second.
Fully Mesh of PWs when the Number of PEs Increases
Whether the BGP mode or the LDP mode of signaling for the VPLS, the basic concept
is to establish a full mesh of all sites in signaling so as to avoid loop occurrence. In the
LDP mode, the LDP sessions among all sites are fully meshed. So it is with the BGP
mode. During data forwarding, the packets from a PW will no longer be forwarded to
the other PWs according to the split horizon mechanism. Suppose there are 100 sites,
then there will be 4950 LDP sessions among sites. The HVPLS (Hierarchical VPLS) is
introduced to protocol draft-ietf-l2vpn_vpls_ldp_xx. This HVPLS solution can also be
derived from protocol draft-ietf-l2vpn_vpls_bgp_xx.
HVPLS in the LDP mode
The core concept of HVPLS is to divide the network into different layers with each
layer of network being fully meshed and connect the equipment of different layers via
the QinQ or PW. The upper end of the connection is called the SPE (Super PE) or
P-PE (Provider PE) and the lower end is called the UPE (User PE). Because the PE’s
of different layers are not fully meshed, the data forwarding between the SPE and the
UPE does not follow the split horizon mechanism but the mutual forwarding principle.
1) PW access means of H-VPLS
PSN Tunnel
U-PE1 P-PE1
CE1
VSI
CE2
VSI P-PE3 U-PE3
CE5
VSI
CE6
P-PE2
U-PE2 PW
CE3
VSI
VSI
CE4
PSN Tunnel
U-PE1 P-PE1
CE1
BG VSI
CE2
VSI P-PE3 U-PE3
CE4
VSI BG
CE5
U-PE2 P-PE2
PW
BG VSI
CE3
VSI
.1Q in .1Q
N-PW MP-EBGP
N-PW
CE2 UPE1 AS2
N-PW
SPE2 SPE1 AS3
UPE3 N-PW
SPE3
N-PW
CE1
MP-EBGP N-PW
N-PW
CE3
N-PW
UPE2
SPE2
BGP HVPLS
Figure 8 HVPLS solution in the MP-EBGP mode
In the LDP HVPLS solution, the mode of LDP + IGP is adopted between the UPE and
the P-PE to establish a PW. This mode will have problems in the inter-AS case of the
MAN, because the routers SPE and UPE between the ASs cannot run IGP + LDP.
Therefore, only the MP-EBGP solution can be used in that case.
As shown in Figure 8, the MP-EBGP is run between the UPE and the SPE,
draft-ietf-l2vpn_vpls_bgp_xx is used in terms of signaling to establish a PW, and the
split horizon disable setting (for both the UPE and the SPE) is applied for the BGP
peers in terms of forwarding, or the split horizon disable flag is used for the VE ID in
the BGP VSI, that is, the UPE is allowed to send a packet from the other PEs to the
SPE while the SPE is allowed to send a packet from the other PEs to the UPE. In this
way, HVPLS is implemented.
2) HVPLS solution with LDP access, MP-EBGP access and BGP RR in the backbone
area
UPE1
BGP access
MP-EBGP
SPE1
CE3
BGP RR
SPE2
SPE3
CE1 CE2
PW access
IGP + LDP
UPE2 AS1
PW access UPE3
IGP + LDP
AS1 AS1
Figure 9 HVPLS solution with LDP PW access, MP-EBGP access and BGP RR
As shown in the above figure, fully-meshed connections can be formed inside the
VPLS of a lower layer by use of the LDP mode. And because the VPLS of a lower
layer is located in the same AS with that of a higher layer, it can use the LPD PW
mode to access the BGP VPLS. Since the backbone network contains a huge number
of PEs, the BGP RR is used to reduce the quantity of fully-meshed connections and
indirectly attain the logic full mesh. However, if the VPLS of a lower layer is not in the
same AS with that of a higher layer, the MP-EBGP mode can still be adopted. The
above figure shows a hybrid networking model that combines LDP PW access,
MP-EBGP access and BGP in the backbone area.
1) CE Dual Homing
Similar to L3VPN, in order to ensure that the services of the accessed user are not
interrupted when the access point equipment PE fails, the CE can connect two PEs
(one active and the other standby). When the active PE fails, the services can be
automatically switched over to the standby PE.
The CE dual homing solves the reliability problem in the case of PE failure.
In HVPLS, the UPE can connect the SPE in the dual homing mode. The
active/standby mode is adopted. When a PW fails, the services can be immediately
switched over to the other PW, as shown in the following figure:
CE PE
VSI
LDP
Secondary PW P-PE
VSI
P-PE 2
It is necessary to protect the tunnels for constructing the PWs for the links among PEs.
There are two types of tunnel protection: Protection of the physical links bearing the
tunnels and backup of different physical links through certain protocols. The RPR
(Resilient Packet Ring) is of dual-ring structure. Physically, when one direction of the
ring fails, the service can be looped in the other direction. Therefore, if the tunnel is
established on such physical links, it is protected automatically. In addition, the
upper-layer protocol, for example, the RSVP-TE protocol, can be adopted to protect
the tunnels. That is, RSVP-TE FRR (Fast Re-Routing) technology can be adopted to
implement fast switchover in the case of link faults, thus ensuring end-to-end tunnel
protection.
4 Typical Application
4.1 Integrated Networking with VPLS
MPLS VPLS is an important MAN technology, with which various existing enterprise
networks based on the Ethernet technology can be interconnected. Featuring low
cost and high reliability, VPLS is attracting more and more operators.
Shanghai
Branch of
Customer A
PE2
Operator's CE2
national
backbone
network MPLS
PE1
PE3
Beijing CE3
Branch of
Customer A
Shenzhen
CE1
Branch of
Customer A
5 Conclusion
The VPLS is a technology that extends the LAN to the MAN/WAN and emancipates
users from geographical restrictions. It is easy and simple to use as a widely applied
LAN technology. The feature of multipoint access makes the VPLS application easy
and it almost does not have any requirement or restriction on users.