Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 Network Working Group Internet Draft Ping Pan Intended status: Standards Track (Hammerhead Systems) Expiration Date: December 2007 Shane Amante Nasser El-Aawar (Level-3) June 2007 Setup and Manage PBB-based Tunnels with PWE3 Mechanism draft-pan-pwe3-pbb-tunnel-00.txt Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract This document describes a mechanism that enables providers to setup point-to-point tunnels over PBB networks for the purpose of aggregating customer flows. The interior network nodes will not be disturbed with this mechanism. [Page 1] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 Table of Contents 1. Specification of Requirements .................................2 2. Introduction ..................................................2 2.1. Assumptions ..............................................3 2.2. Perspectives .............................................3 3. Background ....................................................4 3.1. PWE3 .....................................................4 3.2. PBB ......................................................4 3.3. PBT ......................................................5 3.4. PBB-based Tunnels ........................................6 4. Operation Outline .............................................6 5. Protocol Extensions ...........................................8 5.1. Generalized ID FEC .......................................8 5.2. AII Type: PBB-based Tunnels ..............................8 5.3. Pseudowire Status ........................................9 5.4. OAM ......................................................9 6. Applications ..................................................9 6.1. Interconnection PBB Domains with PW MHOP .................9 6.2. Carrying multi-service traffic over PBB-based tunnels ....9 6.3. Interworking with PBT ....................................9 7. Intellectual Property Statement ..............................10 8. Full Copyright Statement .....................................10 9. IANA Considerations ..........................................10 10. Normative References .......................................10 11. Informative References .....................................11 12. Author Information .........................................11 1. Specification of Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. 2. Introduction With the proliferation of Ethernet deployment in metro and backbone networks, managing Ethernet connections becomes increasingly important. Despite the popularity of MPLS, many carriers continue to build-out Ethernet-only networks, where no MPLS switching takes place at data plane inside the network. To make the deployment scalable, the carriers have been deploying Q- in-Q [Q-in-Q] whereby each Ethernet frame can be encapsulated with multiple VLAN tags. [Page 2] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 As the metro network continues to expand, the carriers need to improve scalability beyond Q-in-Q VLAN tagging. PBB (Provider Backbone Bridges) [PBB], also known as MAC-in-MAC, is a technique that encapsulates Ethernet frames with another Ethernet MAC and VLAN header. It therefore increases Ethernet framing hierarchy at data- plane. Generally, the scaling improvement at data-plane needs to be coupled with the scalability at control-plane. One simple yet popular application is to aggregate VLAN-tagged flows from customer locations into point-to-point tunnels from PBB backbone edge. It requires the network operators to be able to dynamically provision, monitor and manage the PBB-based tunnels, as well as mapping of customer VLAN flows into PBB-based tunnels. PBT (Provide Bridge Transport) [PBT] has been proposed as the solution for the above application. However, PBT inherently has two shortcomings: First, the currently defined PBT proposal has no dynamic provisioning mechanism, and won’t scale for large scale backbone with static configuration. Second, the currently defined PBT proposal requires the internal nodes to be programmed for tunnel setup. It is debatable if it will bring the justification for control-plane simplicity. In this document, we first define PBB-based tunnels, as the virtual tunnels between PBB edge nodes. We then propose of using the well- defined PWE3 protocols to setup and manage the PBB-based tunnels. The proposal does not require the changes on the internal nodes. 2.1. Assumptions Our proposal is based on the following assumptions: 1. The Ethernet metro/core network is relatively stable. The network will not experience frequent link and node failures, or subsequent long converging and looping problems introduced by STP. 2. Network providers will over-provision the network to overcome per- flow QoS issues. 2.2. Perspectives There should be little doubt on the effectiveness of MPLS/IP protocols in establishing data tunnels - point-to-point, and point- [Page 3] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 to-multi-point alike. In particular, PWE3 is a well-defined and widely deployed mechanism in setting up and managing edge-to-edge data connections. In particular, the PWE3 control-plane can operate over just about any type of networks. There should also be obvious that the carriers have incentive in deploying PBB (Provider Backbone Bridges, or, MAC-in-MAC) to expand their Ethernet-only networks. Inside the PBB networks, the carriers have the option of using spanning tree protocols to interconnect nodes. It should be noted that the MAC-in-MAC mechanism itself is a data-plane function. Hence, instead of operating the networks with either MPLS or PBB/PBT, we believe that an alternative is to deploy MPLS/PWE3 protocols at places where they fit (such as, network edge), while using PBB for simple and cheap Ethernet packet transport within the backbone. In our proposal, we define the protocol extension in using target LDP (PWE3) at network edge to exchange MAC-in-MAC and VLAN information between network edges. The backbone network itself will operate with PBB only. 3. Background In this section, we will outline some of the relevant technologies that we work with. 3.1. PWE3 PWE3 [RFC3985] is to create edge-to-edge connections between two edge nodes, and has been widely deployed to interconnect user traffic over the MPLS/IP backbone. It comes with a number of important features: VCCV [VCCV] provides an efficient OAM capability for PW’s, and MHOP [MHOP] and PW switching [PW Switching] enable the PWE3 to be deployed over multiple networks. Further, Pseudo-wire itself is a very flexible concept, and can operate over any data network, including MPLS, TDM and Ethernet (a.k.a. dry-martini). 3.2. PBB PBB extends the Ethernet stacking as shown in Figure-1: +-------+ +-------+ +-------+ +---------+ | Data | | Data | | Data | | Data | +-------+ +-------+ +-------+ +---------+ |Src MAC| ---> | VID | ---> | C-VID | ---> | C-VID | +-------+ +-------+ +-------+ +---------+ [Page 4] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 |Dst MAC| |Src MAC| | S-VID | | S-VID | +-------+ +-------+ +-------+ +---------+ |Dst MAC| |Src MAC| |Src MAC | 802.1 +-------+ +-------+ +---------+ |Dst MAC| |Dst MAC | 802.1q +-------+ +---------+ | I-SID | VID = VLAN ID 802.1ad +---------+ C-VID = Customer VID | B-VID | S-VID = Service VID +---------+ I-SID = Service ID |B-Src MAC| B-VID = Backbone VID +---------+ B-Src MAC = Backbone Source MAC |B-Dst MAC| B-Dst MAC = Backbone Destination MAC +---------+ 802.1ah (PBB) Figure 1: A brief history of Ethernet Stacking As mentioned previously, Q-in-Q (or 802.1ad) has been widely deployed. PBB leads to a reasonable evolution for Ethernet backbone expansion. Since PBB is to encapsulate a new MAC header to each packet, the network intermediate nodes can be constructed with any out-of-shelf Ethernet switches and employee STP or other means for connectivity. In summary, if the carriers have already adapted native Ethernet services, the deployment of PBB should not introduce much overhead and cost. 3.3. PBT By definition, PBB offers a bridged network, where each node can communicate with other nodes simultaneously (a.k.a. any-to-any connectivity). This may not be a desirable behavior for some of the backbone applications. One important backbone application is to create point-to-point tunnels between edge nodes to aggregate user flows. PBT (Provider Bridge Transport) is designed to support point-to-point tunnels over PBB networks. Instead of using STP to interconnect edge nodes, PBT defines one or multiple B-VID bits in the PBB stack for the purpose of tunneling functionality. The intermediate nodes will not perform STP flooding on the frames that have the special B-VID bits. To setup the PBT tunnels, PBT requires all the intermediate nodes to manage the B-VID entries. It has been proposed of using GMPLS to setup and maintain the PBT tunnels. [Page 5] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 The advantage here is that it enables the operators to run traffic engineering on every PBT tunnel. Also the PBT path setup can be independent from STP, therefore, is immune from the undesirable long convergence problems. The disadvantages in PBT are that each PBB nodes need to be provisioned, and the lack of dynamic provisioning mechanism. 3.4. PBB-based Tunnels If the PBB backbone is over-provisioned and relatively stable, and the carrying data is best-effect, then it does not seem necessary to provision all the nodes, as recommended in PBT. In the context of our proposal, we define PBB-based tunnels as the following: If two edge nodes have connectivity over the PBB backbone, then the operators can establish bi-directional virtual tunnels between two nodes for the purpose of aggregating user traffic flows. Such tunnels are called “PBB-based tunnels”. Note that the interior nodes do not need to do anything special. The connectivity between edge nodes can be achieved by dynamic protocols, such as STP, or static configuration, or other means. 4. Operation Outline The objective here is to establish PBB-based tunnels over the PBB core, and aggregate customer flows through the point-to-point tunnels. | | |<----- PBB-based Tunnel -------->| | | Customer | | Customer VLAN’s +------+ +------+ VLAN’s | | ------------ | | <-------->| | ( ) | |<--------> <-------->| PE-A | { } | PE-B |<--------> ... | |====( PBB )====| | ... <-------->| | ( Network ) | |<--------> | | ( ) | | +------+ ------------ +------+ ^ ^ | | | | [Page 6] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 IP-A IP-B MAC-A MAC-B I-SID-A I-SID-B B-VID-A B-VID-B Figure 2: Operation example The operation is illustrated in Figure 2. The service provider needs to transport multiple customer VLAN flows between PE-A and PE-B. The PBB backbone may apply STP or other means to discover the connectivity between PE-A and PE-B. The operators will configure IP address to both PE nodes. ARP will resolve the MAC addresses, that is, MAC-A and MAC-B. The operators will need the I-SID and B-VID information to aggregate customer flows with MAC-in-MAC encapsulation. We propose of using RFC4447 [PWE3-LDP] to exchange I-SDI and B-VID information. Essentially, we will use the mechanism for setting up PW’s to create PBB-based tunnels between PE-A and PE-B. Specifically, the tunnel setup is based on the Generalized ID (GID) FEC (type 129). This enables the operators setting up and managing the tunnels from local PE’s. The PBT-based tunnels will use a new AII to identify PBB-based tunnels, which contains MAC, B-VID and I-SID information. In the example, the operators at PE-A will send a LDP mapping message with SAII = {MAC-A, I-SID-A, B-VID-A}, and TAII = {MAC-B, I-SID-B, B- VID-B} to PE-B. Upon successful reception, PE-A and PE-B will install the PBB information on data path. When a VLAN packet from a customer site arrives on PE-A, PE-A will encapsulate a backbone Ethernet header with the appropriated MAC, I-SID and B-VID. Upon the reception, PE-B will remove the header, and continue to the native Ethernet switching. Each PBB-based tunnel can carry traffic from multiple customer sources. When a PBB-tunnel is no longer in use, the operator will apply the standard PWE3 procedure to remove it. For OAM support, the operators have the option to apply either native Ethernet OAM schemes (802.3ah, 802.1ag) or VCCV (LSP-ping, BFD), or both. For protection support, the operators can either rely on STP to converge, or statically establish backup connections between PE-1 and [Page 7] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 PE-2. The method in establishing backup Ethernet connections is beyond the scope of this draft. In terms of QoS, we adapt the most common practice in Ethernet networks, over-provisioning. Finally, other than the PE nodes need to be IP-enabled to support ARP and target LDP, the rest of the network can remain Ethernet-only. 5. Protocol Extensions The document specifies the protocol requirements and definitions for setting up PBB-based tunnels from network edge. 5.1. Generalized ID FEC RFC4447 defines the mechanism for setting up point-to-point Pseudowires between two PE nodes. During Pseudowire setup, the PE nodes will exchange messages containing information about the PW type and an endpoint identifier used in the selection of the packet forwarder. Endpoint identifier can be represented in two formats: PWid FEC (type 128) and Generalized ID (GID) FEC (type 129). The PWid FEC requires to be configured on the local and remote PE prior to PW setup. The GID FEC defines each PW as a combination of Source and Destination Attachment Individual Identifiers (AII). Each AII is globally unique. This arrangement enables GID to be used for individual configuration, as well as provisioning models where the local PE’s can learn (or discover) about the remote PE’s prior to launching PW’s. For sizeable PBB-based tunnel deployment, the GID FEC presents a more flexible and scalable solution. We require GID to be used in setting up PBB-based tunnels. 5.2. AII Type: PBB-based Tunnels We define a new AII Type for PPB-based Tunnels. The encoding is shown in Figure 3. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AII Type=xx | Length | B-MAC | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ [Page 8] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 | B-MAC (cont.) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | B-VID | I-SID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | I-SID (cont.) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3: AII Type: PBB-based Tunnel B-MAC: Backbone MAC address B-VID: Backbone VLAN ID I-SID: Service Instance ID All above parameters have been defined in [PBB]. 5.3. Pseudowire Status We will use the defined Pseudowire Status [PWE3-IANA] for PBB-based tunnels. 5.4. OAM We believe that VCCV needs to specific the OAM types. Other than LSP- ping and BFD, VCCV may need to expand to advertise 802.1ag and 802.3.ah as capabilities [VCCV]. 6. Applications 6.1. Interconnection PBB Domains with PW MHOP (TBD) 6.2. Carrying multi-service traffic over PBB-based tunnels (TBD) 6.3. Interworking with PBT (TBD) [Page 9] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 7. Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- ipr@ietf.org. 8. Full Copyright Statement Copyright (C) The IETF Trust (2007). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 9. IANA Considerations This document has defined an AII type for PBB-based tunnels. 10. Normative References [Page 10] Internet Draft draft-pan-pwe3-pbb-tunnels-00.txt June 2007 [PBB] IEEE 802.1ah, " Virtual Bridged Local Area Networks — Amendment 6: Provider Backbone Bridges" [PBT] IEEE 802.1Qay, “Provider Backbone Bridge Traffic Engineering” [PWE3-LDP] L. Martini, et al., “Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)", RFC4447, April 2006 [PWE3-IANA] L. Martini, “IANA Allocations for Pseudowire Edge to Edge Emulation (PWE3)”, RFC4446, April 2006 11. Informative References [Q-in-Q] IEEE 802.1ad, "Virtual Bridged Local Area Networks: Provider Bridges" [RFC3985] Bryant, et al., "PWE3 Architecture", RFC3985, March 2005. [VCCV] T. Nadeau, et al., “Pseudo Wire Virtual Circuit Connectivity Verification (VCCV)”, March 2007. [PW Switching] L. Martini, et al., “Pseudo Wire Switching”, February 2007. [MHOP] L. Martini, et al., “Dynamic Placement of Multi Segment Pseudo Wires”, October 2006. 12. Author Information Ping Pan Hammerhead Systems ppan@hammerheadsystems.com Shane Amante Level 3 Communications Shane.Amante@Level3.com Nasser El-Aawar Level 3 Communications Nasser.El-Aawar@Level3.com [Page 11]