VXLAN Design and Deployment

Total Page:16

File Type:pdf, Size:1020Kb

VXLAN Design and Deployment VXLAN Design and Deployment Marian Klas, Systems Engineer [email protected] Agenda • Why VXLAN? • VXLAN Fundamentals • Underlay Deployment Considerations • Overlay Deployment Considerations • Summary and Conclusion 2 Trend: Flexible Data Center Fabrics Create Virtual Networks on top of an efficient IP network Mobility Segmentation + Policy Scale Automated & Programmable V V Physical M M Full Cross Sectional BW Hosts O O S S Virtual L2 + L3 Connectivity Use VXLAN to Create DC Fabrics Physical + Virtual 3 VXLAN Fundamentals 4 Why Overlays? Seek well integrated best in class Overlays and Underlays Robust Underlay/Fabric Flexible Overlay Virtual Network • High Capacity Resilient Fabric • Mobility – Track end-point attach at edges • Intelligent Packet Handling • Segmentation • Programmable & Manageable • Scale – Reduce core state • Distribute and partition state to network edge • Flexibility/Programmability • Reduced number of touch points 5 Overlay Taxonomy Overlay Control Plane Service = Virtual Network Instance (VNI) VTEPs Identifier = VN Identifier (VNID) NVE = Network Virtualization Edge Encapsulation VTEP = VXLAN Tunnel End-Point Edge Devices (NVE) Edge Device (NVE) Hosts Underlay Network (end-points) Underlay Control Plane 6 VXLAN is an Overlay Encapsulation Data Plane Learning Protocol Learning Flood and Learn over a multidestination Advertise hosts in a protocol distribution tree joined by all edge devices amongst edge devices Overlay Control Plane Encapsulation VXLAN t 7 VXLAN Packet Structure Ethernet in IP with a shim for scalable segmentation Outer MAC Header Outer IP Header Outer UDP Header VXLAN Header Original Layer 2 Frame FCS 14 Bytes (4 Bytes Optional) 20 Bytes 8 Bytes 8 Bytes Ethernet Payload VNI Tag Port Source 0x8100 Header 0x0000 0x0800 Address Dest. IP Address Protocol VLAN ID Reserved Reserved RRRRIRRR Source IP Src. MAC Checksum Checksum IP Header 0x11 (UDP) VLAN Type Dest. MAC Misc. Data Ether Type VXLAN Port UDP Length VXLAN Flags 48 48 16 16 16 72 8 16 32 32 16 16 16 16 8 24 24 8 Src VTEP MAC Address Src and Dst addresses of Large scale the VTEPs Allows for 16M segmentation UDP 4789 possible segments Next-Hop MAC Address Hash of the inner L2/L3/L4 headers of the original frame. Enables entropy for ECMP Load Tunnel Entropy 50 (54) Bytes of overhead balancing in the Network. 8 Data Plane Learning Dedicated Multicast Distribution Tree per VNI PIM Join for Multicast PIM Join for Multicast Group 239.1.1.1 Group 239.2.2.2 V V V V V Web DB DB Web VM VM VM VM 9 Data Plane Learning Dedicated Multicast Distribution Tree per VNI V V V V V VM1 VM2 VM3 10 Data Plane Learning Learning on Broadcast Source - ARP Request Example ARP Req IP A è g ARP Req IP A è g V V V V V ARP Req VM1 VM2 VM3 MAC IP Addr MAC IP Addr VM 1 VTEP 1 VM 1 VTEP 1 ARP Req ARP Req 11 Data Plane Learning Learning on Unicast Source - ARP Response Example ARP Resp V V V V V ARP Resp VTEP 2 è VTEP 1 VM1 VM2 VM3 MAC IP Addr MAC IP Addr VM 2 VTEP 2 VM 1 VTEP 1 12 ARP Resp VXLAN Evolution • Head-end replication enables unicast-only mode Multicast Independent • Control Plane provides dynamic VTEP discovery Protocol Learning • Workload MAC addresses learnt by VXLAN NVEs • Advertise L2/L3 address-to-VTEP association prevents floods information in a protocol • VXLAN HW gateways to other encaps/networks External Connectivity • VXLAN HW gateway redundancy • Enable hybrid overlays • VXLAN Routing IP Services • Distributed IP gateways 14 VXLAN Evolution: Using a Control Protocol VTEP Discovery BgP consolidates and 2 propagates VTEP list for VNI BGP Route Reflector VTEPs advertise their VNI membership in BgP 1 1 1 IP A IP C IP B TOR 1 V V V V V Overlay Neighbors TOR 3 , IP C TOR 3 TOR 2 TOR 2 , IP B VTEP can perform 3 4 VTEP obtains list of Head-End Replication VTEP neighbors for each VNI 15 VXLAN Unicast Mode Head-end replication *Broadcast, Unknown Unicast or Multicast 5 Frames are unicast to the neighbors 4 VXLAN Encap BUM Frame IP A è IP B IP A IP C IP B Overlay Neighbors BUM Frame IP A è IP C POD3 , IP C TOR 1 V V V V V POD2 , IP B 3 VTEP performs Head- 2 End Replication TOR 3 TOR 2 VTEP retrieves the list of Overlay Neighbors** 1 BUM Frame **Information statically configured or dynamically retrieved via control plane A host sends a L2 BUM* frame (VTEP discovery) BGP EVPN Control Plane for VXLAN Host and Subnet Route Distribution Route-Reflectors deployed for scaling purposes RR RR iBgP Adjacencies V V V V V § Host Route Distribution decoupled from the Underlay protocol § Use MP-BGP on the leaf nodes to distribute internal host/subnet routes and external reachability information 17 BGP EVPN Control Plane MAC IP VNI Next- Encap Seq Hop Host Advertisement 1 1 5000 IP L1 VXLAN 0 MAC L1 NLRI: Host MAC1, IP1 NVE IP L1/MAC L1 RR RR VNI 5000 Ext.Community: Encapsulation: VXLAN, NVgRE Sequence 0 V V V V V VNI 5000 Host 1 VLAN 10 1. Host Attaches 2. Attachment NVE advertises host’s MAC (+IP) through BgP RR 3. Choice of encapsulation is also advertised 18 BGP EVPN Control Plane MACMAC IPIP VNIVNI NextNext-- EncapEncap SeqSeq HopHop Host Moves 11 11 50005000 IPIP L1L3 VXLANVXLAN 01 MACMAC L1L3 NLRI: Host MAC1, IP1 NVE IP L3/MAC L3 RR RR VNI 5000 Ext.Community: Encapsulation: VXLAN, NVgRE Sequence 1 V V V V V VNI 5000 Host 1 VLAN 10 1. Host Moves to NVE3 2. NVE3 detects Host1 and advertises H1 with seq#1 19 3. NVE1 sees more recent route and withdraws its advertisement VXLAN L2 and L3 gateways Connecting VXLAN to the broader network Egress interface chosen (bridge L2 Gateway: VXLAN to VLAN may .1Q tag the packet) VXLANORANGE VXLAN L2 Bridging Ingress VXLAN packet on Gateway Orange segment Destination is in another segment. Ingress VXLAN packet on Packet is routed to the new segment L3 gateway: VXLAN to X Routing Orange segment SVI • VXLAN VXLANORANGE VXLANBLUE VLAN100 VXLAN VLAN200 • VLAN Router Egress interface chosen (bridge may .1Q tag the packet) N7K w/F3 ASR1K/ASR Nexus 3K N5600 N9K LC 9K L2 gateway Yes Yes Yes Yes Yes L3 gateway Yes No Yes Yes Yes VXLAN BgP EVPN Nexus Programmable Fabric Support Platform Spine Leaf Function Border Leaf DCNM Fabric Function Function Management Nexus 5600 Yes Yes Yes Yes 7.3(0)N1(1) 7.3(0)N1(1) 7.3(0)N1(1) 7.2(3) Nexus Yes Yes Yes Yes 7000/7700 7.3(0)D1(1) 7.3(0)D1(1) 7.3(0)D1(1) 7.2(3) (F3 Only) Nexus 9300 Yes Yes Yes Yes 7.0(3)I1(3) 7.0(3)I1(3) 7.0(3)I1(3) 7.2(3) Nexus 9500 Yes Yes Yes Yes 7.0(3)I1(3) 7.0(3)I1(3) 7.0(3)I1(3) 7.2(3) 21 Underlay Deployment Considerations 22 Leaf/Spine Topology – Underlay Considerations • High Bi-Sectional Bandwidth • Wide ECMP: Unicast or Multicast • Uniform Reachability, ECMP Links Deterministic Latency (Layer-3) • High Redundancy: Node/Link Failure • Line rate, low latency, for all traffic Deployment Considerations Underlay • MTU and Overlays • Unicast Routing Protocol and IP Addressing • Multicast for BUM* Traffic Replication 24 MTU and VXLAN Underlay • VXLAN adds 50 Bytes to the Outer MAC Header Original Ethernet Frame • Avoid Fragmentation by adjusting Outer IP Header Underlay the IP Networks MTU UDP Header • Data Centers often require Jumbo MTU; most Server NIC do support VXLAN Header up to 9000 Bytes • Using a MTU of 9216* Bytes 50 (54) Bytes of Overhead accommodates VXLAN Overhead Original Layer-2 Frame Overlay plus Server max. MTU *Cisco Nexus 5600/6000 switches only support 9192 Byte for Layer-3 Traffic 25 Building your IP Network – Interface Principles Underlay • Know your IP addressing and IP scale requirements • Best to use single Aggregate for all Underlay Links and Loopbacks • IPv4 only • For each Point-2-Point (P2P) 2 connection, minimum /31 required V1 V • Loopback requires /32 • Routed Ports/Interfaces • Layer-3 Interfaces between Spine and Leaf (no switchport) V3 • VTEP uses Loopback as Source- Interface 26 Building your IP Network – Routing Protocols; OSPF Underlay • OSPF – watch your Network type • Network Type Point-2-Point (P2P) • Preferred (only LSA type-1) • No DR/BDR election • Suits well for routed interfaces/ports (optimal from a LSA Database perspective) 2 • Full SPF calculation on Link Change V1 V • Network Type Broadcast • Suboptimal from a LSA Database perspective (LSA type-1 & 2) • DR/BDR election • Additional election and Database 3 Overhead V 29 Building your IP Network – Routing Protocols; IS-IS Underlay • IS-IS – what was this CLNS? - Independent of IP (CLNS) - Well suited for routed interfaces/ports - No SPF calculation on Link change; only if Topology changes - Fast Re-convergence 2 1 V - Not everyone is familiar with it V V3 31 Building your IP Network – Routing Protocols; iBGP Underlay • iBgP + IgP = The Routing Protocol Combo • IgP for underlay topology & reachability (e.g. IS-IS, OSPF) • iBgP for VTEP (loopback) reachability • iBGP route-reflector for simplification and scale RR RR RR RR • Requires two routing protocols iBGP • Separates Links (IgP) from VTEPs 2 1 V (iBGP) V • End-Host information are still in iBgP but different address-family V3 33 Multicast Enabled Underlay • May use PIM-ASM or PIM-BiDir (Different hardware has different capabilities) Nexus 7K Nexus 9K CSR 1000V N1KV Nexus 3K Nexus 5K/6K ASR9K with F3 LC Standalone ASR1K PIM-ASM PIM-ASM PIM-ASM & Bidir-PIM PIM-ASM & Mcast mode IgMP v2/v3 (Bidir – Bidir-PIM (Bidir – Bidir-PIM (ASM –Future) Bidir-PIM Future) Future) • Cisco Nexus 9000 Series Switches (supports ASM/SSM/Ingress-Replication for VXLAN VTEP support) and Cisco Nexus 5600 Series Switches (supports only PIM BIDIR for VXLAN VTEP support) can be part of the same VXLAN EVPN fabric but not share the same Layer-2 VNI.
Recommended publications
  • Control Plane Overview Subnet 1.2 Subnet 1.2
    The Network Layer: Control Plane Overview Subnet 1.2 Subnet 1.2 R3 R2 R6 Interior Subnet 1.2 R5 Subnet 1.2 Subnet 1.2 R7 1. Routing Algorithms: Link-State, Distance Vector R8 R4 R1 Subnet 1.2 Dijkstra’s algorithm, Bellman-Ford Algorithm Exterior Subnet 1.2 Subnet 1.2 2. Routing Protocols: OSPF, BGP Raj Jain 3. SDN Control Plane Washington University in Saint Louis 4. ICMP Saint Louis, MO 63130 5. SNMP [email protected] Audio/Video recordings of this lecture are available on-line at: Note: This class lecture is based on Chapter 5 of the textbook (Kurose and Ross) and the figures provided by the authors. http://www.cse.wustl.edu/~jain/cse473-16/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain 5-1 5-2 Network Layer Functions Overview Routing Algorithms T Forwarding: Deciding what to do with a packet using 1. Graph abstraction a routing table Data plane 2. Distance Vector vs. Link State T Routing: Making the routing table Control Plane 3. Dijkstra’s Algorithm 4. Bellman-Ford Algorithm Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain 5-3 5-4 Rooting or Routing Routeing or Routing T Rooting is what fans do at football games, what pigs T Routeing: British do for truffles under oak trees in the Vaucluse, and T Routing: American what nursery workers intent on propagation do to T Since Oxford English Dictionary is much heavier than cuttings from plants.
    [Show full text]
  • The Network Layer: Control Plane
    CHAPTER 5 The Network Layer: Control Plane In this chapter, we’ll complete our journey through the network layer by covering the control-plane component of the network layer—the network-wide logic that con- trols not only how a datagram is forwarded among routers along an end-to-end path from the source host to the destination host, but also how network-layer components and services are configured and managed. In Section 5.2, we’ll cover traditional routing algorithms for computing least cost paths in a graph; these algorithms are the basis for two widely deployed Internet routing protocols: OSPF and BGP, that we’ll cover in Sections 5.3 and 5.4, respectively. As we’ll see, OSPF is a routing protocol that operates within a single ISP’s network. BGP is a routing protocol that serves to interconnect all of the networks in the Internet; BGP is thus often referred to as the “glue” that holds the Internet together. Traditionally, control-plane routing protocols have been implemented together with data-plane forwarding functions, monolithi- cally, within a router. As we learned in the introduction to Chapter 4, software- defined networking (SDN) makes a clear separation between the data and control planes, implementing control-plane functions in a separate “controller” service that is distinct, and remote, from the forwarding components of the routers it controls. We’ll cover SDN controllers in Section 5.5. In Sections 5.6 and 5.7 we’ll cover some of the nuts and bolts of managing an IP network: ICMP (the Internet Control Message Protocol) and SNMP (the Simple Network Management Protocol).
    [Show full text]
  • IS-IS Client for BFD C-Bit Support
    IS-IS Client for BFD C-Bit Support The Bidirectional Forwarding Detection (BFD) protocol provides short-duration detection of failures in the path between adjacent forwarding engines while maintaining low networking overheads. The BFD IS-IS Client Support feature enables Intermediate System-to-Intermediate System (IS-IS) to use Bidirectional Forwarding Detection (BFD) support, which improves IS-IS convergence as BFD detection and failure times are faster than IS-IS convergence times in most network topologies. The IS-IS Client for BFD C-Bit Support feature enables the network to identify whether a BFD session failure is genuine or is the result of a control plane failure due to a router restart. When planning a router restart, you should configure this feature on all neighboring routers. • Finding Feature Information, on page 1 • Prerequisites for IS-IS Client for BFD C-Bit Support, on page 1 • Information About IS-IS Client for BFD C-Bit Support, on page 2 • How to Configure IS-IS Client for BFD C-Bit Support, on page 2 • Configuration Examples for IS-IS Client for BFD C-Bit Support, on page 3 • Additional References, on page 4 • Feature Information for IS-IS Client for BFD C-Bit Support, on page 4 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
    [Show full text]
  • Efficient Network Reachability Analysis Using a Succinct Control Plane Representation
    Efficient Network Reachability Analysis using a Succinct Control Plane Representation Seyed K. Fayaz Tushar Sharma Ari Fogel∗ Ratul Mahajany Todd Millsteinz Vyas Sekar George Varghesez CMU ∗Intentionet yMicrosoft Research zUCLA Abstract— To guarantee network availability and se- curity, operators must ensure that their reachability poli- cies (e.g., A can or cannot talk to B) are correctly im- plemented. This is a difficult task due to the complexity Routers Environment at )me t configura)on files of network configuration and the constant churn in a net- Network work’s environment, e.g., new route announcements ar- Environment at )me t+1 control plane rive and links fail. Current network reachability analysis Environment at )me t+2 … … techniques are limited as they can only reason about the data plane at )me t+2 current “incarnation” of the network, cannot analyze all data plane at )me t+1 configuration features, or are too slow to enable explo- data plane at )me t ration of many environments. We build ERA, a tool for A B efficient reasoning about network reachability. Instead of Figure 1: Reachability behavior of a network (e.g., A reasoning about individual incarnations of the network, can talk to B) is determined by its data plane, which, ERA directly reasons about the network “control plane” in turn, is the current incarnation of the control plane. that generates these incarnations. We address key expres- siveness and scalability challenges by building (i) a suc- To highlight this challenge, it is useful to consider prior cinct model for the network control plane (i.e., various work on network verification.
    [Show full text]
  • The Network Layer Data Plane
    The Network Layer: Data Plane Overview Net 1 R1 Net 2 R2 Net 3 R3 Net 4 1. Network Layer Basics Raj Jain 2. What’s inside a router? Washington University in Saint Louis 3. Forwarding Protocols: IPv4, DHCP, NAT, IPv6 Saint Louis, MO 63130 4. Software Defined Networking [email protected] Audio/Video recordings of this lecture are available on-line at: Note: This class lecture is based on Chapter 4 of the textbook http://www.cse.wustl.edu/~jain/cse473-16/ (Kurose and Ross) and the figures provided by the authors. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain 4-1 4-2 Overview Network Layer Basics Forwarding and Routing 1. Forwarding and Routing T Forwarding: Input link to output link via Address prefix lookup in a table. 2. Connection Oriented Networks: ATM Networks T Routing: Making the Address lookup table 3. Classes of Service T Longest Prefix Match 4. Router Components 5. Packet Queuing and Dropping 125.200.1.3 126.23.45.67 125.200.1.1 125.200.1.2 128.272.15.2 2 1 Prefix Next Router Interface 126.23.45.67/32 125.200.1.1 1 128.272.15/24 125.200.1.2 2 128.272/16 125.200.1.1 1 Ref: Optional Homework: R3 in the textbook Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse473-16/ ©2016 Raj Jain Washington University in St.
    [Show full text]
  • Tesseract: a 4D Network Control Plane Hong Yan†, David A
    Tesseract: A 4D Network Control Plane Hong Yany, David A. Maltzz, T. S. Eugene Ngx, Hemant Gogineniy, Hui Zhangy, Zheng Caix yCarnegie Mellon University zMicrosoft Research xRice University Abstract example, load balanced best-effort forwarding may be implemented by carefully tuning OSPF link weights to We present Tesseract, an experimental system that en- indirectly control the paths used for forwarding. Inter- ables the direct control of a computer network that is un- domain routing policy may be indirectly implemented by der a single administrative domain. Tesseract’s design setting OSPF link weights to change the local cost met- is based on the 4D architecture, which advocates the de- ric used in BGP calculations. The combination of such composition of the network control plane into decision, indirect mechanisms create subtle dependencies. For in- dissemination, discovery, and data planes. Tesseract pro- stance, when OSPF link weights are changed to load bal- vides two primary abstract services to enable direct con- ance the traffic in the network, inter-domain routing pol- trol: the dissemination service that carries opaque con- icy may be impacted. The outcome of the synthesis of trol information from the network decision element to the indirect control mechanisms can be difficult to predict nodes in the network, and the node configuration service and exacerbates the complexity of network control [1]. which provides the interface for the decision element to The direct control paradigm avoids these problems be- command the nodes in the network to carry out the de- cause it forces the dependencies between control policies sired control policies. to become explicit.
    [Show full text]
  • Single-Chip Control/Data-Plane Processors Trends, Features, Deployment
    Single-Chip Control/Data-Plane Processors Trends, Features, Deployment By Linley Gwennap Principal Analyst June 2008 www.linleygroup.com Single-Chip Control/Data-Plane Processors By Linley Gwennap, Principal Analyst, The Linley Group This paper examines the trend toward combining control-plane and data-plane processing on a single chip. It discusses the technologies driving this trend, the common features of these chips, their advantages and disadvantages, and how they are being deployed today and into the future. What Is an SCDP? A single-chip control/data-plane processor (SCDP) combines control-plane and data- plane processing on a single chip. In networking or communications equipment, the data plane processes each packet as it passes through the system. Data-plane tasks may include converting packets from one protocol to another, encrypting or decrypting data, filtering unwanted packets, prioritizing packets, and routing them to their next destina- tion. A relatively simple processor with a small amount of software can perform these tasks, but they must be done quickly. Packets must be processed at least at wire speed, that is, the speed of the incoming network connection (e.g., 1Gbps for a Gigabit Ethernet connection). The control plane handles packets that require extra processing, typically about 5% to 10% of all packets. The most common example is a routing update (e.g., RIP, BGP); the control plane maintains the route table. The control plane may also process other protocols (e.g., ARP) that are too complex for the data plane, or legacy protocols (e.g., SNA, AppleTalk) that are rarely encountered. Finally, the control plane also handles management tasks such as system configuration and logging.
    [Show full text]
  • REDDIG II – Computer Networking Training
    REDDIG II – Computer Networking Training JM SANCHEZ / PH RASSAT - 20/06/2012 IP Addressing and Subnetting Invierno 2011 | Capacitacion en fabrica - CORPAC IP Addressing and Subnetting IP Addresses An IP address is an address used to uniquely identify a device on an IP network. The address is made up of 32 binary bits which can be divisible into a network portion and host portion with the help of a subnet mask. 32 binary bits are broken into four octets (1 octet = 8 bits) Dotted decimal format (for example, 172.16.254.1) REDDIG II | Network Course | Module 2 | 3 IP Addressing and Subnetting Binary and Decimal Conversion REDDIG II | Network Course | Module 2 | 4 IP Addressing and Subnetting IP Address Classes • IP classes are used to assist in assigning IP addresses to networks with different size requirements. • Classful addressing: REDDIG II | Network Course | Module 2 | 5 IP Addressing and Subnetting Private Address Range • Private IP addresses provide an entirely separate set of addresses that still allow access on a network but without taking up a public IP address space. • Private addresses are not allowed to be routed out to the Internet, so devices using private addresses cannot communicate directly with devices on the Internet. REDDIG II | Network Course | Module 2 | 6 IP Addressing and Subnetting Network Masks • Distinguishes which portion of the address identifies the network and which portion of the address identifies the node. • Default masks: Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 • Once you have the address and the mask represented in binary, then identification of the network and host ID is easier.
    [Show full text]
  • A Exploration of Multi-Protocol Label Switching (Mpls) Network: a Review
    ISSN- 2394-5125 VOL 7, ISSUE 13, 2020 A EXPLORATION OF MULTI-PROTOCOL LABEL SWITCHING (MPLS) NETWORK: A REVIEW Nisha 1, Dr. Rashid Hussain 2 Ph.D. Scholar 1, Associate Professor 2 Suresh Gyan Vihar University, Mahal Jagatpura, Jaipur 1, 2 Received: 14 March 2020 Revised and Accepted: 8 July 2020 ABSTRACT: The central principle of the Multiprotocol Label Switching Network (MPLS) utilizes Label Switching Path (LSP) technology that provides high efficiency in packet transmission without needing to check for routing tables. Nevertheless, where a connection breakdown happens in an MPLS network, the reconstruction of a new path may entail further overhead. The MPLS (Multi-Protocol Label Switching) network is increasingly moving into a general and converged network capable of exchanging multi-service (voice, data, and video) information on the same IP-based network. Quality of service (QoS) has been progressively a critical requirement for new applications carrying MPLS networks. It realization helps service companies to develop the methods of network design and include full network services and to resolve any loss. This article describes a standard network loss (the loss would contribute to the restoration of the path in the MPLS network by using MPLS) and the network failure on the basis of exploratory study findings. KEYWORD: Multi-Protocol Label Switching (MPLS), Label Switch Path (LSP), Quality of Service (QoS) I. INTRODUCTION MPLS (Multi-Protocol Label Switching) is used as the core technologies of multiple autonomous systems in many business networks and public infrastructures. This is a connection-oriented infrastructure intended to solve the challenges of today’s network in terms of volume, scalability and traffic engineering.
    [Show full text]
  • Introduction to MPLS
    Introduction to MPLS Steve Smith Systems Engineer 2003 Technical Symposium © 2003, Cisco Systems, Inc. All rights reserved. 1 Agenda • Background • Technology Basics What is MPLS? Where Is it Used? • Label Distribution in MPLS Networks LDP, RSVP, BGP • Building MPLS Based Services VPNs AToM Traffic Engineering • Configurations Configuring MPLS, LDP, TE • Summary RST-1061 8216_05_2003_c1 © 2003, Cisco Systems, Inc. All rights reserved. 2 Background 2003 Technical Symposium © 1999, Cisco Systems,© 2003, Inc. Cisco Systems, Inc. All rights reserved. 3 Terminology • Acronyms PE—provider edge router P—Provider core router CE—Customer Edge router (also referred to as CPE) ASBR—Autonomous System Boundary Router RR—Route Reflector • TE—Traffic Engineering TE Head end—Router that initiates a TE tunnel TE Midpoint—Router where the TE Tunnel transits • VPN—Collection of sites that share common policies • AToM—Any Transport over MPLS Commonly known scheme for building layer 2 circuits over MPLS Attachment Circuit—Layer 2 circuit between PE and CE Emulated circuit—Pseudowire between PEs RST-1061 8216_05_2003_c1 © 2003, Cisco Systems, Inc. All rights reserved. 4 Evolution of MPLS • From Tag Switching • Proposed in IETF—Later combined with other proposals from IBM (ARIS), Toshiba (CSR) Cisco Calls a MPLS Croup Cisco Ships Traffic Engineering BOF at IETF to Formally Chartered MPLS TE Deployed Standardize by IETF Tag Switching Cisco Ships MPLS VPN Large Scale MPLS (Tag Deployed Deployment Switching) 1996 1997 1998 1999 2000 2001 Time RST-1061 8216_05_2003_c1
    [Show full text]
  • Nsa Cybersecurity Report
    NATIONAL SECURITY AGENCY CYBERSECURITY REPORT A GUIDE TO BORDER GATEWAY PROTOCOL (BGP) BEST PRACTICES A TECHNICAL REPORT FROM NETWORK SYSTEMS ANALYSIS BRANCH U/OO/202911-18 PP-18-0645 10 September 2018 1 s NSA CYBERSECURITY REPORT DOCUMENT CHANGE HISTORY DATE VERSION DESCRIPTION 07/24/18 01 Initial Release 08/24/18 02 Re-templated DISCLAIMER OF WARRANTIES AND ENDORSEMENT The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government, and shall not be used for advertising or product endorsement purposes. U/OO/202911-18 PP-18-0645 10 September 2018 2 s NSA CYBERSECURITY REPORT A Guide to Border Gateway Protocol (BGP) Best Practices CONTACT INFORMATION Client Requirements and Inquiries or General Cybersecurity Inquiries CYBERSECURITY REQUIREMENTS CENTER (CRC) 410-854-4200 [email protected] U/OO/202911-18 PP-18-0645 10 September 2018 3 s NSA CYBERSECURITY REPORT Executive Summary The dominant routing protocol on the Internet is the Border Gateway Protocol (BGP). BGP has been deployed since the commercialization of the Internet and version 4 of BGP is over a decade old. BGP works well in practice, and its simplicity and resilience enabled it to play a fundamental role within the global Internet. However, BGP inherently provides few performance or security protections.
    [Show full text]
  • LTRDCT-2223.Pdf
    Implementing VXLAN In a Data Center Lilian Quan, Principle Engineer, INSBU Erum Frahim, Technical Leader, Services Kevin Cook, Solution Architecture LTRDCT-2223 Agenda . VxLAN Overview . Flood-&-Learn VXLAN . VXLAN with MP-BGP EVPN Control Plane . VXLAN Design Options . MP-BGP EVPN VXLAN Configuration . Lab Introduction Agenda . VxLAN Overview . Flood-&-Learn VXLAN . VXLAN with MP-BGP EVPN Control Plane . VXLAN Design Options . MP-BGP EVPN VXLAN Configuration . Lab Introduction Recap – What is VXLAN ? Tunnel Ethernet Frames Endpoints NETWORK OVERLAY Host Host 1 4 IP Addr IP Network IP Addr Host 1.1.1.1 2.2.2.2 Host 2 Switch Switch 5 Host Host 3 IP/UDP Packets 6 PLANE DATA DATA Outer Outer Outer Outer Outer Outer VXLAN Inner Inner Optiona Original CRC MAC MAC MAC MAC l Inner Ethernet 802.1Q IP DA IP SA UDP ID CRC DA SA (24 bits) DA SA 802.1Q Payload VXLAN Encapsulation Original Ethernet Frame • VXLAN uses MAC in UDP encapsulation (UDP destination port 4789) 5 Why VXLAN? VXLAN provides a Network with Segmentation, IP Mobility, and Scale • “Standards” based Overlay • Leverages Layer-3 ECMP – all links forwarding • Increased Name-Space to 16M identifier • Segmentation and Multi-Tenancy • Integration of Physical and Virtual • It’s SDN 6 VXLAN VTEP VXLAN terminates its tunnels on VTEPs (Virtual Tunnel End Point). Each VTEP has two interfaces, one is to provide bridging function for local hosts, the other has an IP identification in the core network for VXLAN encapsulation/decapsulation. Underlay Network (IP Routing) VTEP VTEP IP Interface IP Interface Local LAN Segment Local LAN Segment Host Host Host Host 7 VXLAN Underlay Network – IP Routing • IP routed Network • Flexible topologies IP Transport Network • Recommend a network with redundant paths using ECMP for load sharing • Support any routing protocols --- OSFP, EIGRP, IS-IS, BGP, etc.
    [Show full text]