You are on page 1of 17
Carrier Ethernet Academy MEF-CECP Boot Camp Course Module 5-2 MPLS Transport Module 5-2 – MPLS Transport

Carrier Ethernet Academy

MEF-CECP Boot Camp Course Module 5-2 MPLS Transport

Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

Course Overview

  • Boot Camp Introduction

  • Module 1 Carrier Ethernet EVC Services

    • 1-1 Carrier Ethernet EVC Services Definitions

    • 1-2 Carrier Ethernet EVC Services Attributes

    • 1-3 User Network Interface (UNI), Link OAM, and E-LMI

  • Module 2 E-NNI and Carrier Ethernet OVC Services

    • 2-1 External Network-to-Network Interfaces

    • 2-2 Carrier Ethernet OVC Services Definitions and Service Attributes

  • Module 3 - Circuit Emulation, Synchronization and Mobile Backhaul

  • Module 4 Service OAM and Protection

    • 4-1 Service OAM Fault and Performance Management Tools

    • 4-2 Protection Mechanisms

  • Module 5 - Carrier Ethernet Transport Technologies

    • 5-1 Native Ethernet Transport

    • 5-2 MPLS Transport

    • 5-3 SONET/SDH and Optical Transport

  • Module 6 - Carrier Ethernet Access Technologies

  • Module 7 CE 2.0 Equipment and Services Certification

  • Module 8 - MEF CECP Boot Camp Course Review

  • Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS Overview

    • Multiprotocol Label Switching (MPLS)

    • MPLS operates over enhanced IP routers

    • MPLS enhances the IP protocol and adds OAM mechanisms

    • MPLS works with both IPv4 and IPv6

    • MPLS VPNs support both point-to-point and multipoint services

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    3 Types of MPLS VPNs

    • MPLS L3 VPNs

      • Layer 3 multipoint VPNs are also called IP VPNs

      • L3 VPNs forward frames based on L3 information such as IP address

  • MPLS L2 VPNs - VPWS

    • Layer 2 point-to-point VPNs consist of a collection of pseudowires or Virtual Private Wire Services

  • MPLS L2 VPNs - VPLS

    • Layer 2 multipoint VPNs are also called Virtual Private LAN Services

    • L2 VPNs forward frames based on L2 information such as MAC address or VLAN ID

  • Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS L3 VPN

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    Ethernet over MPLS L3 VPN

    • MPLS L3 VPNs can be used to connect remote Ethernet LANs

    • Provides a simple way to connect remote Ethernet LANs by encapsulating Ethernet frames in MPLS

    • The Ethernet network is terminated at PE and Ethernet traffic is routed through the MPLS network to the remote LAN

    MPLS Network
    MPLS Network
    Ethernet LAN 1
    Ethernet
    LAN 1

    Ethernet

    Ethernet LAN 2
    Ethernet
    LAN 2

    Ethernet

    Switching IP Routing Switching
    Switching
    IP Routing
    Switching

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS L2 VPN VPWS

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS L2 VPN - VPWS

    • MPLS L2 VPNs or Virtual Private Wire Services were introduced to support non-IP protocols:

      • TDM

      • Frame Relay

      • ATM

      • Ethernet

  • VPWS creates MPLS tunnels and pseudowires used for delivering point-to-point E-LINE services such as EPL and EVPL

  • Pseudowire technology is standardized by the Internet Engineering

  • Task Force (IETF) Pseudo Wire Emulation Edge to Edge (PWE3) Working Group

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    E-Line Service over MPLS - VPWS

    E-Line Service
    E-Line Service
    MPLS Network MPLS Tunnel LSP (forward) Pseudowire (forward) Pseudowire (backward) PE1 MPLS Tunnel LSP (backward)
    MPLS Network
    MPLS Tunnel LSP (forward)
    Pseudowire (forward)
    Pseudowire (backward)
    PE1
    MPLS Tunnel LSP (backward)

    Ethernet

    Attachment Circuit (Also supports ATM, FR, IP, TDM, etc)

    E-Line Service over MPLS - VPWS E-Line Service MPLS Network MPLS Tunnel LSP (forward) Pseudowire (forward)

    PE2

    E-Line Service over MPLS - VPWS E-Line Service MPLS Network MPLS Tunnel LSP (forward) Pseudowire (forward)
    E-Line Service over MPLS - VPWS E-Line Service MPLS Network MPLS Tunnel LSP (forward) Pseudowire (forward)
    E-Line Service over MPLS - VPWS E-Line Service MPLS Network MPLS Tunnel LSP (forward) Pseudowire (forward)
    E-Line Service over MPLS - VPWS E-Line Service MPLS Network MPLS Tunnel LSP (forward) Pseudowire (forward)

    CE1

    CE2

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    Ethernet Encapsulation over MPLS

    4 octets 4 octets 4 octets Tunnel PW Control Payload (Ethernet/802.3 PDU) Label Label Word 0000
    4 octets
    4 octets
    4 octets
    Tunnel
    PW
    Control
    Payload (Ethernet/802.3 PDU)
    Label
    Label
    Word
    0000
    Reserved for future use
    Sequence Number
    4 bits
    12 bits
    16 bits
    • Specified in RFC 4448 ‘Encapsulation Methods for Transport of Ethernet over MPLS Networks’

    • When the forwarder hands a frame to the PW termination function:

      • The preamble and FCS are stripped off

      • The control word is prepended to the resulting frame

      • The pseudowire demultiplexer (PW label) is prepended to the resulting packet

      • The tunnel encapsulation (one or more labels) is prepended to the packet

      • The packet is transmitted

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS L2 VPN VPLS

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS L2 VPN - VPLS

    • VPLS is a multipoint L2 VPN that allows multiple sites to be connected in a single bridged domain over an IP/MPLS network

    • Used for delivering point-to-point or multipoint services

    • Step 1: Creation of Pseudowires between PEs

      • Point-to-point PWs are the building blocks of VPLS instances

      • The creation of PWs enables PEs to participate in MAC learning

  • Step 2: MAC Learning and Forwarding by the Virtual Bridges

    • A PE must implement a Virtual Bridge for each VPLS instance (EVC)

    • One Forwarding Information Base (FIB) for each VPLS instance (EVC)

    • Ethernet traffic is switched based on MAC addresses

    • Split Horizon rule is used to avoid loops

  • Step 3: MPLS Core simply switches packets based on MPLS labels

  • Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    E-LAN Service over MPLS - VPLS MPLS Network PE1 PE2 CE1 CE4 CE2 VB VB VB
    E-LAN Service over MPLS - VPLS
    MPLS Network
    PE1
    PE2
    CE1
    CE4
    CE2
    VB
    VB
    VB
    VB
    CE5
    CE3
    MPLS Tunnels
    Virtual
    Pseudowires
    Bridges
    VB
    Attachment
    VB
    Circuits
    PE3
    CE6
    CE7
    CE8
    CE9

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    VPLS Operation Example

    Once a VPLS instance is created frames are sent and MAC learning starts

    • CE1 sends a frame to PE1 destined for CE4

    • PE1 learns that CE1 can be reached on one of its local ports and stores the location in its FIB

    • PE1 has not learned where CE4 is so it floods the frame to PE2 and PE3

    • PE2 learns that CE1 is connected to PE1 and stores the location in its FIB

    • PE3 also learns that CE1 is connected to PE1 and stores the location in its FIB

    • PE2 strips off the labels and floods the frame on all if its ports except to PE3 because of the split horizon rule

    • PE3 also strips off the labels and floods the frame on all if its ports except to PE2 because of the split horizon rule

    MPLS Network PE1 PE2 VB VB VB VB VB
    MPLS Network
    PE1
    PE2
    VB
    VB
    VB
    VB
    VB

    CE1

    CE2

    CE3

    VB PE3
    VB
    PE3
    VPLS Operation Example Once a VPLS instance is created frames are sent and MAC learning starts

    CE6

    CE7

    CE8

    CE9

    • CE4 receives the frame and replies to CE1

    • PE2 learns that CE4 can be reached on one of its local ports and stores the location in its FIB

    • PE2 already knows that CE1 can be reached via PE1

    • PE1 already knows that CE1 can be reached on one of its local ports

    CE4

    CE5

    • PE1 strips off the labels and sends the frame to CE1

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS Transport Profile

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS-TP Overview

    • MPLS-TP eliminates the MPLS control plane

    • Provides deterministic and connection oriented behavior using LSPs

    • Enables provisioning of working and backup paths in the network

    • Paths are provisioned using an NMS/EMS

    • Results in a highly predictable network architecture

    • Mainly used for delivering point-to-point services

    Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy

    MPLS Transport Summary

    • MPLS is the most widely used transport technology for Interconnecting Carrier Ethernet Networks

      • L3 VPN routes between Ethernet networks used for point-to-point or multipoint services

      • L2 VPN - VPWS Pseudowires used for point-to-point services

      • L2 VPN - VPLS used for used for point-to-point or multipoint services

  • MPLS-TP is deterministic and connection oriented

  • MPLS solves the scalability limitations of Ethernet by allowing an unlimited number of subscribers and providing MPLS management and protection tools

  • Module 5-2 MPLS Transport Copyright 2015 The Carrier Ethernet Academy