BGP Mpls With Evpn 1677998611
BGP Mpls With Evpn 1677998611
BGP Mpls With Evpn 1677998611
University of Alberta
Supervisor: Juned Noonari
Abstract
MPLS based VPLS is proven L2VPN technology delivering Ethernet based Services.
However Ethernet and its requirements are continually changing due to
modernization of Networks, Ethernet Service model such as separation of Data
and Control plane, MEF based service delivery etc. In order to meet those
requirements EVPN are introduced in the industry under L2VPN IEFT Working
Group.
Intent of project is research EVPN, its requirements, its various implementation
methods and comparing it with VPLS to justify its relative benefits.
Due to EVPN being a new technology not much documentation could be found
from the vendors like Cisco and Alcatel. Juniper only being the vendor that has
the command reference for EVPN out. However, I succeeded in implementing a
Lab scenario of BGP based VPLS with Multi-homing on Alcatel Lucent 7750 SR-OS
routers.
BGP MPLS based EVPN KANWAR ALAM SINGH
3
Table of Contents
1.Introduction…………………………………………………………………………………..5
2.Background and Technology overview……………………………………………6
2.1 MPLS……………………………………………………………………………………………………….…..…6
2.2 L2VPNs……………………………………………………………………………………………………..….…7
2.3 VPLS………………………………………………………………………………………………………….…...8
3.Discussion………………………………………………………………………………….…22
3.1 VPLS Limitations……………………………………………………………………………………….…..22
3.2 Emerging EVPN technology……………………………………………………………………….….23
3.3 EVPN Features……………………………………………………………………………………….….….40
3.4 EVPN Applications……………………………………………………………………………….……….47
4.LAB DEMO…………………………………………………………………………………...50
5.CONCLUSION………………………………………………………………………………..54
6.BIBLIOGRAPHY……………………………………………………………………………..56
BGP MPLS based EVPN KANWAR ALAM SINGH
4
Table of Figures
1 Introduction
During the last decade the demand for implementing scalable L2 VPN has been
increased which led to development in the area of Layer 2 Services. Many MPLS
based technologies were brought in, Virtual Private LAN Service being one of
them. With VPLS, multipoint Ethernet services over the MPLS infrastructure can
provided using a full mesh of pseudowires. It emulates as a virtual bridge to the
end customers, and moreover they are free to run any routing protocol of their
choice. However VPLS has its own demerits, one of them being MAC learning
happens in data plane, other drawbacks include no multihoming with active-
active link, no multipoint to multipoint multicast LSPs. To overcome these
shortcomings a new solution is proposed called Ethernet Virtual Private Network.
Internet Engineering Task Force (IETF) recently published their 11th internet draft
which describes the procedures for BGP MPLS based EVPN. RFC 7209 published
by IETF describes the requirements for EVPN and how it fulfills the demands of
the new applications such Data Center Interconnect and overcomes the
limitations of current L2VPN technology VPLS.
The scope of the project is to study EVPN, specifying its advantages over VPLS and
the different implementation scenario possible.
BGP MPLS based EVPN KANWAR ALAM SINGH
2.1 MPLS:
Multi Protocol Label Switching is a widely used technology since the
past decade. At first it was being used for fast switching of packets but
due to its scalability and resiliency capabilities soon it became the most
popular and vastly used technology across the networks. It simplifies
the process of routing the packets through the network by labeling the
packets, this leads to fast packet forwarding as the packet itself does
not need to be examined and the routing decisions can be made based
on the labels itself. The feature of traffic management and the
capability to support multiple service models makes it more appealing
to the ISPs.
BGP MPLS based EVPN KANWAR ALAM SINGH
2.2 L2VPN
Layer 2 VPN allows users to connect different LANs together over Layer
3 networks that are using MPLS or IP core. From Customer Prospective
it seems that they are connected through a big switch and feel they are
part of the same broadcast domain.
Layer 2 VPN provides users the flexibility to scale bandwidth according
to their needs. L2 Ethernet are preferred over L3 IP VPN for efficient
transport of Non-IP applications including traditional voice and video,
along with this, application security is an another L2 consideration as
the customers can control their own routing tables.
Unlike in case of Layer 3 VPN, with Layer 2 VPN service the Customer
Edge router and Provider Edge router does not need to peer up, the
customer routing tables are not stored on provider network reducing
complexity.
BGP MPLS based EVPN KANWAR ALAM SINGH
10
Signaling: It Includes the setup, maintain and teardown of
Pseudowires.
There are two alternate ways of deploying control planes, one is using
LDP and the other one is using BGP. The scaling characteristics of both
these control planes differ a lot. BGP VPLS has numerous advantages
over LDP VPLS.
While using LDP, in order for the signaling of full mesh pseudowires a
full mesh of targeted LDP sessions is required between the PEs. There is
no auto discovery in case we are using LDP for signaling so these LDP
sessions must be manually configured on each PE router. These
sessions carry the VC ID which is used to identify to which VPLS
instance the LDP message refers to. While using BGP for signaling, with
auto discovery capability a PE gets to know which PEs are the members
of a given VPLS instance. The BGP NLRI contains the information that let
the automatic setting up the full mesh of pseudowires. On each PE
router a Route Target (RT) and a Route Distinguisher (RD) is configured
for each VPLS.RT is the same for a particular VPLS across all PEs and is
used to identify to which VPLS the BGP message belongs to, while RD is
used to distinguish between routes. Each PE has a identifier for each
VPLS known as VPLS Edge Identifier (VE ID), it should be unique for each
VPLS.VE ID is communicated over to other PEs.VE ID and the BGP NLRI
provides the means to the other PEs to calculate value of the pseudo
label required to reach the advertising PE. Advantage of using BGP for
signaling is that all PEs get to know about each other without any
manual configurations.
BGP MPLS based EVPN KANWAR ALAM SINGH
11
VPLS Forwarding Plane
Forwarding Plane Mechanisms for the unicast and to some extent for
multicast traffic are almost the same for both BGP VPLS and LDP VPLS.A
PE VPLS data plane acts as a learning bridge performing the same
functions of a standard bridge such as MAC address learning, flooding
and aging. For each VPLS instance a separate MAC forwarding table is
maintained by each participating PE router.
12
The same issues will be faced if a full mesh of BGP sessions is required,
to tackle this issue BGP Router Reflector (RR) can be used. It is in use
with L3VPN services but can be used for VPLS as well. In that case, only
RRs have to be in a full mesh. This makes it simpler when adding a new
PE router or deleting an existing one as only the BGP session between
the RR and that PE router needs to be modified.
BGP MPLS based EVPN KANWAR ALAM SINGH
13
Figure 3. Only BGP session need to set up between the new PE and RR.
14
configurations to be changed on all the existing PE routers to make
them in full mesh with the new PE.
Figure 4. In case of LDP VPLS, manual configurations are to be made on all existing
PE routers to make them in a full mesh.
15
While in case of BGP there is auto-discovery capability which leads to
just configuration changes on the PE to which site is attached.
Figure 5. In case of BGP VPLS, configuration is to be made on only the new PE
router rest all existing PE routers are auto discovered.
16
Multihoming
For resilience the customer maybe connected to more than one PE, in
that case forwarding loops can occur. Like in case of IP forwarding we
can use TTL to limit the circulation of a packet, in this case the customer
has to use Routers to prevent loops. If the customer chooses to use
Ethernet switch as CE then there can be great possibility of loops unless
no countermeasure is taken. One of the countermeasure is that
customer run STP on all its Switches so there is a loop free topology.
But this is not acceptable by the service provider as they have to rely on
the customer to implement it correctly, it might affect other customers
if not implemented correctly. The other countermeasure is that service
provider allow only one port to be active at a time. This can be done in
case if we use BGP for signaling, the service provider configure the
same VE ID on the PEs connecting to the same CE. By this way each PE
receives two advertisement with the same VE ID.BGP applies its
selection rules and installs the best NLRI out of them. Suppose if we
want the traffic to exit from a specific PE then we can make the local
preference higher on that PE than others, this way all PEs choose to
install the route advertised by that particular PE. In case of link failure
to that PE, other route is installed by PEs. This countermeasure is better
than relying on the customer to run STP as in this case bandwidth is
saved as broadcast traffic is sent on only one link.
17
spoke PE on the customer premises, which is homed to multiple-hub
PEs.
H-VPLS
Hierarchical version of LDP VPLS can significantly alleviate the
pseudowire scalability problem. It is achieved by reducing the number
of PE routers that have to been in full mesh, hence improving the
control plane scalability. It helps to reduce the signaling and replication
overhead to allow large scale deployments.
Taking an example, suppose the physical topology is as shown in the
figure below:
Figure 6. A simple VPLS topology.
BGP MPLS based EVPN KANWAR ALAM SINGH
18
All PE routers are connected to each other in a full mesh by
psuedowires.
Suppose PE1 wants to send 100mb of broadcast data then it will
replicate it three times, such that each PE router receives a copy of it.
The links PE1-P1 and P1-P2 have to carry 300mb of data which is kind of
inefficient usage of the links. With the addition of more PE routers the
amount of data which these links carry will linearly increase, hence
leading to scalability issues.
Loop problem is solved by using a split horizon rule that means a PE
router will only forward traffic to its locally attached hosts not to other
PEs, so no need for STP.
To resolve the above discussed problem, H-VPLS uses spoke
pseudowire which can carry both mesh and spoke pseudowire traffic so
that they can relay traffic between PE routers.
The above VPLS topology can be re-designed using H VPLS in two ways:
Figure 7.1 Logical connection between PE1-PE3, PE1-PE2 and PE2-PE4.
BGP MPLS based EVPN KANWAR ALAM SINGH
19
Figure 7.2 Logical connection between PE1-PE3, PE1-PE2, PE2-PE4 and PE3-PE4.
In the Figure 7.1, there is VPLS service defined on PE1 which has two
spoke pseudowires connecting to PE2 and PE3 and one link to local
circuit. There is no link between PE1 – PE4.
While in Figure 7.2, all the PE routers are connected in a ring by spoke
pseudowires.
In H-VPLS, split horizon rule is not followed, any traffic arriving on a
spoke pseudowire is forwarded to all other pseudowires (spoke and
meshes) and to local circuits. This leads the need to run STP (Spanning
Tree Protocol) across the network by Service Provider to avoid loops.
This can be considered one of the drawback of Using H-VLPS because
the architecture of spokes and meshes has to been planned carefully
BGP MPLS based EVPN KANWAR ALAM SINGH
20
else there is always chances of loops to occur. Moreover the high
convergence time of STP adds on to the problems.
H-VPLS somehow reduces the scalability issue but also adds on some
other issues.
Taking into account the topology in the Figure 7.1, Even after using the
spoke pseudowires the links PE1-P1, P1-P2 are still carrying two copies
of each broadcast traffic, hence not much of bandwidth efficiency
improvement. Second issue is the traffic reaching PE4 has to be always
relayed by PE2, as there is no direct link between PE1-PE4 leading to
congestion on PE2-PE4 link. Moreover in case of failure of PE2, PE4 get
disconnected from the other PE routers. Third issue is that PE2 router
has to learn all the MAC addresses that fall behind PE1 and PE4 because
all traffic from PE1 to PE4 will be terminated at PE2 then it is PE2 router
responsible to forward it to PE4 and vice versa.
Taking into account the other H-VPLS architecture i.e. Figure 7.2, all PE
routers are connected in a ring so there is a chance of occurrence of
loop. STP has to be run to avoid loops. Assuming if STP put the spoke
link between PE1-PE2 in block state, now there is no direct link
between PE1-PE2 this leads to traffic being relayed through PE4
creating the same issue as discussed above in case of Figure 7.1.
No doubt the advantages of H-VPLS over VPLS are:
Improves control plane scalability by reducing the number of
pseudowires that are to be in a full mesh
Reduces the burden on core devices by adding a hierarchical
aggregation layer.
Size of MAC table can be reduced if combined with MAC in MAC
stacking.
BGP MPLS based EVPN KANWAR ALAM SINGH
21
This concludes that H-VPLS provides a solution to improve the
pseudowire scalability to some extend but not an efficient way to
handle multicast traffic. Additionally H-VPLS brings in other problems
along with it.
Operational considerations
The operational issues faced while running VPLS services are:
MAC address scaling-One of the main consideration for service provider
is the number of MAC addresses that are to be stored by every PE,
along with taking into account a PE might be providing VPLS services to
a large number of customers. Service providers have to keep an
account of the number of MAC addresses stored for each VPLS
customer and impose a limit on it by using VPLS implementations that
allow limits on per VPLS basis or per interface basis.
Limiting Broadcast and Multicast Traffic-Another concern for Service
providers is to limit the Broadcast and Multicast Traffic as it can be
costly to send such traffic especially if there are large number of PE
members and there is ingress replication. There are implementations
that allow Service providers to keep an account of this type of traffic.
Policing of VPLS traffic-Service providers need to police the amount of
traffic being send into the network by the customer on each access port
if the VPLS service is being offered over the 100 Mbps or 1 Gbps native
Ethernet ports.
BGP MPLS based EVPN KANWAR ALAM SINGH
22
3 Discussion
23
Data Center Interconnect – VPLS cannot handle new applications
as they require the Layer 2 and Layer 3 services over the same
interface. Scalability and control like L3VPN.
In order to meet the above listed challenges, EVPN was introduced in
the industry under the L2VPN IEFT Working group.
3.2 EVPN (ETHERNET VPN):
EVPN is the next generation solution that provides L2VPN services over
the MPLS network, it inherits a decade of VPLS operational experience
in production networks but it differs from VPLS as MAC learning occurs
in control plane over the core. MAC information is carried by
multiprotocol BGP control plane and provides different choices for Data
Plane encapsulation.
EVPN is a significant milestone for the industry as it provides Layer 2
and Layer 3 service in a single VPN with scalability and control of
L3VPN.Like VPLS, EVPN allows you to connect different customer sites
located at different geographical locations together into a single virtual
LAN emulating the end users as if they are connected to the same LAN.
Now the service providers are able to meet evolving demands of higher
speeds along with sophisticated QoS. Moreover EVPN can support the
evolving demands of the new applications which cannot be met by the
existing technologies. (RFC 7209)
24
EVI: It identifies a particular EVPN Instance (EVI)
ES: Set of Ethernet links connecting a multihomed device or network to
two or more PEs is known as Ethernet Segment (ES)
ESI: Ethernet Segment Identifier (ESI) is a non zero number that
identifies a particular Ethernet Segment
Ethernet Tag: It identifies a particular Broadcast or Bridge Domain in
the EVI.
Figure 8. EVPN
BGP MPLS based EVPN KANWAR ALAM SINGH
25
EVPN Control Plane
MAC learning over Control plane provides greater control of who learns
what, provides ability to apply policies and helps to maintain isolation
and virtualization of EVPN instances. PEs advertise MAC addresses and
IPs for next hop to other PEs over the MP-BGP with an EVPN NLRI. In
addition to load balancing over multiple LSPs between the same PEs,
control plane learning also provides load balancing of traffic between
the CEs that are multihomed to number of PEs. This helps improve
convergence time in case of one of the CE-PE link failure.
Though MAC address learning over the MPLS core happens in control
plane, but still learning between PEs and CEs is done by method
preferred by the CE, it could be data plane learning, 802.1 aq, ARP or
other protocols.
It can be locally decided whether the PE L2 forwarding table should
include all the MAC addresses known to the control plane or it should
include only the MAC addresses of the active flows or it can also
implement cache based scheme.
EVPN policy attributes are almost similar to those of L3VPN. Each EVI
needs a unique RD per PE and one or more globally unique RTs
26
27
Provides all active multihoming for Virtual Private Wire Service
(VPWS).
It requires no pseudowires.
IGP, RSVP-TE or LDP is required for MPLS and BGP for EVPN.
28
Backbone Edge Bridges (BEB) PEs only advertise backbone MACs
with BGP, while customer MAC and backbone MAC mapping is
learned in the data plane.
MPLS runs in the control plane and the data plane.
This topology or architecture can be useful where the number of
MAC addresses are too large as this hides the customer MACs
from the backbone elevating to high MAC scalability.
29
EVPN-VXLAN can be used to provide an L2 overlay over an IP
network. It is quite flexible, VXLAN can be routable with IP
irrespective of the underlying network being used.
VXLAN Data plane encapsulates VXLAN header and L2 Frame
using UDP and can run over IPv4 or IPv6 while EVPN uses BGP
Control Plane to advertise MAC routes.
Possible to provide a VPN to a hypervisor attached to a Virtual
Machine, as the VXLAN tunnel endpoints can be on Virtual
Machines.
This architecture can provide EVPN services to DCI and virtual
network without requiring MPLS.
Ethernet Segment
If a Customer Edge (CE) is multihomed to two or more Provider Edge
(PEs), the set of Ethernet links that attach CE to PEs is known as
Ethernet Segment (ES). To CE an ES seems to be a Link Aggregation
Group (LAG). Each Ethernet Segment has a unique non zero identifier
called the Ethernet Segment Identifier (ESI). ESI is a ten octet integer in
line format sent with the most significant octet first.
The value of the ESI has to be unique and non-reserved across all the
EVPN instances on a PE. With the managed CE the ESI uniqueness
should be guaranteed by the network operator but if the CE is not
managed by the network operator then a network wide unique ESI has
to be configured for that ES. The uniqueness helps the auto discovery of
the ES and DF election.
The two reserved values of ESI are:
ESI 0 represents a single homed CE i.e. CE is linked to only one PE.
Maximum ESI value 0xFF (10 times) is reserved.
BGP MPLS based EVPN KANWAR ALAM SINGH
30
ESI has the following format:
Ethernet Tag
Ethernet Tag denotes a particular Broadcast domain such as VLAN. It is
possible to have one or more broadcast domains in a particular EVPN.
Ethernet Tag ID is a 32 bit field that contains 24 bit or 12 bit of the
identifier. The 12 bit identifier is also called the VLAN ID (VID). Service
BGP MPLS based EVPN KANWAR ALAM SINGH
31
providers assign VLANs to a particular EVPN. A particular VLAN may
contain more than one VID. In case of multiple VIDs within a VLAN the
participating PEs in that VLAN for a particular EVPN are responsible for
VID translation to and from the attached CEs. There is no need of VID
translation on PEs if there is only one VID in that VLAN. There are
deployment scenarios that have unique VID across all EVPN instances
and there are scenarios where all points of attachment for a particular
EVPN instance use the same VID, no other EVPN instance use that same
VID. RTs for each EVPN instance are automatically derived from the
corresponding VID.
For an EVPN instance, each PE performs a mapping of Ethernet Tag and
broadcast domain identifier (VID).
The following relationships can exist between VLANs, Ethernet Tag IDs
and MAC-VRFs:
VLAN based Service Interface:
There is only one broadcast domain (VLAN) associated with the EVPN
instance, so there is one to one mapping of VID and EVI. VID translation
is allowed, if the VLAN consists of multiple VIDs i.e. different VID per
Ethernet Segment per PE, then each PE needs to translate VID for the
frames destined to its Ethernet Segments. Overlapping of MAC
addresses across different VLANs is possible. Ethernet Tag ID in all EVPN
routes is set to zero.
VLAN Bundle Service Interface:
In this type of service interface there are multiple broadcast domains
associated with a single EVPN instance, so there is many to 1 mapping
of VID and EVI. Multiple VLANs share the same bridge domain. MAC
addresses are to be unique across VLANs. VID translation is not
allowed. Ethernet Tag ID in all EVPN routes is set to zero.
BGP MPLS based EVPN KANWAR ALAM SINGH
32
VLAN Aware Bundle Service Interface:
In this type of Service interface there are multiple broadcast domains
associated with a single EVPN instance with each VLAN having its own
bridge domain. In this case VID translation is allowed and Ethernet Tag
ID is assigned by Service Provider.
BGP EVPN routes:
As we know EVPN uses Control Plane for MAC learning so it introduces
a new BGP NLRI (Network Layer Reachability Information) called EVPN
NLRI.
The Route type describes the Route Type Specific EVPN NLRI. While the
Length field denotes the number of octets of the Route Type Specific
field.
Multiprotocol BGP extensions AFI (Address Family Identifier) of 25 and
SAFI (Subsequent Address Family Identifier) of 70 is used to carry the
EVPN NLRI. The Two BGP speakers must use the BGP capabilities
Advertisement to properly process this EVPN NLRI.
Route types are as follows:
BGP MPLS based EVPN KANWAR ALAM SINGH
33
Ethernet Auto Discovery(A-D) Route
34
Fig. Ethernet A-D route type
35
36
advertised IP ADDRESS LENGTH field is set to 0 and IP ADDRESS
field is left empty. But if each MAC address is advertised
individually then IP ADDRESS field corresponds to that MAC
address. If a PE router receives an ARP request for an IP address
from a CE router, the PE router checks out the IP address and if
there is an MAC address binding for that IP address it acts as ARP
proxy and responds back to the ARP request.
MPLS Label field is of three octets, it depends on the following
procedures:
o PE router may advertise the same MPLS Label for all MAC
addresses in that particular EVI
o PE router may advertise a unique MPLS label per (ESI,
Ethernet Tag) combination
o PE router may advertise a unique MPLS label for each MAC
address
37
38
39
Ethernet Segment Route format is a below:
40
ORIGINATING PEs IP ADDRESS field in the Ethernet Segment
Route. On the basis of numeric value of IP addresses an
ordinal number is assigned to each PE with 0 ordinal being
representing the IP address with lowest numeric value. The
PE router with the highest ordinal number is elected the
Designated Forwarder and the next highest ordinal number
is elected as the Backup Designated Forwarder
o The Designated Forwarder elected for that particular EVI
unblocks all traffic for the Ethernet Tags of that EVI.
In the scenario of a link/port failure, the affected PE withdraws
its Ethernet Segment Route retriggering the service carving
procedure on all PEs.
3.3 EVPN KEY FEATURES
Unlike the traditional VPLS which rely only on Data plane learning,
EVPN uses control plane for learning which adds on new features and
functions overcoming the VPLS limitations.
Following are the control plane key features:
All Active Multihoming and Designated Forwarder
Figure 12.
BGP MPLS based EVPN KANWAR ALAM SINGH
41
For all active redundancy mode, the bridged network is connected to
two or more PEs using Link Aggregation Group. One of the PE is
elected as Designated Forwarder based on the information in the
Ethernet Segment Route using the Service Carving procedure. All the
BUM (Broadcast, Unknown Unicast, Multicast) traffic is forwarded by
only the DF to Ethernet Segment towards the CE as shown in the
scenario above, it avoids duplicate flooding of BUM traffic to all
active CEs. Other PEs block BUM traffic to CE.
To achieve the split horizon function EVPN uses the Ethernet Auto
Discovery Route Type per Ethernet Segment, it contains the ESI label
which helps identify the Ethernet Segment this traffic originated from.
This is achieved by encapsulating every BUM traffic originating from a
non-DF PE with an MPLS label that identifies the Ethernet Segment
where the traffic originated. Egress PE use this label to filter out the
BUM traffic that has the same ESI label to where it is destined.
BGP MPLS based EVPN KANWAR ALAM SINGH
42
ARP and ND
Figure 14
43
MAC mobility
Figure 15.
44
Aliasing and Backup Path
Figure 16.
45
Default Gateway
Figure 17.
46
47
3.4 EVPN Applications
For today EVPN can offer the following services:
48
Layer 2 and Layer 3 services
Figure 20.
49
Flexible L2 and L3 Site to Site solution
Figure 21.
50
4 Lab Demo
51
BGP based
VPLS
SW1
192.168.0.1
50.50.50.1 192.168.0.3
50.50.50.3
CE1 CE3
10.10.10.1/30
10.10.10.10/
PE1
30
10.10.10.2/30 PE3
10.10.10.9/30 10.10.10.13/
30
192.168.0.2
T-LDP
10.10.10.6/30
CE2 RR based VPLS
50.50.50.50
MULTIHOMED
10.10.10.14/
10.10.10.5/30 30
PE2 PE4
50.50.50.2 50.50.50.4 192.168.0.4
CE4
BGP MPLS based EVPN KANWAR ALAM SINGH
52
Configuration steps:
Configuring IGP: OSPF
OSPF (IGP) protocol is configured on all the PE routers as well as
on RR router for the routers to exchange their routing
information. All the routers are kept in the single domain i.e.
Area 0.
Configure BGP VPLS on PE1, PE2, and PE3. Creating customer and
defining the Route Distinguisher and Route Target. Assigning a VE-
ID and defining the maximum value for it. The VE-ID and VE-NAME
should be unique. STP on PE1, PE2 should be shut down as
because of multihoming, it has to be run on the customer edge
router to avoid loops.
BGP MPLS based EVPN KANWAR ALAM SINGH
53
PE3 and PE4 are configured to run T-LDP VPLS between them. This
way both BGP based VPLS and T-LDP based VPLS are
demonstrated.
192.168.0.3
CE3
PE3
T-LDP
based
VPLS
PE4
192.168.0.4
CE4
54
5 Conclusion
55
router, this is an issue when there are large number of virtualized
machines attached at the customer end leading to a large volume of
MAC addresses to be taken care of. To demonstrate the above two
limitations, Ixia assessment tools are required. The new Data Center
Interconnect applications require Layer 2 and Layer 3 services over the
same interface added with the scalability and control like L3VPN, this is
where VPLS fails.
Future Research:
There are still many inquisitive research queries on how EVPN can will
handle the new DCI applications.
According to the authors of RFC7209 EVPN seems to overcome the
shortcomings of VPLS, but future research and practical
implementation is required to find out whether the theoretical claims
of EVPN capabilities are any true and moreover does it introduce any of
its own glitches.
One interesting research topic relevant to EVPN that comes to my mind
is that how migration from VPLS to EVPN can be done, assuming that
VPLS is already implemented and is running. Would it be possible to
move to EVPN without turning down the existing VPLS network and can
VPLS and EVPN both run together?
BGP MPLS based EVPN KANWAR ALAM SINGH
56
6 Bibliography
Alcatel Lucent (February 2014) ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET
SERVICES. Retrieved from
https://conference.apnic.net/data/37/2014-02-24-apricot-evpn-presentation_1393283550.pdf
Analysis of VPLS Deployment R. Gu, J. Dong, M. Chen, Q. Zeng (Huawei) Z. Liu (China Telecom)
draft-gu-l2vpn-vpls-analysis-00
https://tools.ietf.org/agenda/80/slides/l2vpn-2.pdf
http://wiki.mikrotik.com/wiki/Manual:BGP_based_VPLS
57
Configuring VPLS Routing Instances by juniper
https://www.juniper.net/documentation/en_US/junos14.2/topics/usage-guidelines/vpns-configuring-
vpls-routing-instances.html
Ethernet VPN (EVPN) for integrated layer 2-3 services – Alcatel Lucent
http://www2.alcatel-lucent.com/techzine/ethernet-vpn-evpn-integrated-layer-2-3-services/
Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based
Ethernet Services by cisco(white paper)
http://www.cisco.com/c/en/us/products/collateral/routers/asr-9000-series-aggregation-services-
routers/whitepaper_c11-731864.html
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES by Greg Hankins (Alcatel Lucent)
https://ripe68.ripe.net/presentations/170-ripe-68-evpn.pdf
https://sites.google.com/site/amitsciscozone/home/vpls/hierarchical-vpls
https://routingfreak.wordpress.com/2011/02/21/does-hierarchical-vpls-solve-all-scaling-issues-found-
in-vpls/
MPLS-Enabled Applications: Emerging Developments and New Technologies By Ina Minei, Julian Lucek
https://books.google.ca/books?id=2lxbaQ-
VN8sC&pg=PA396&lpg=PA396&dq=multihoming+drawback+MPLS&source=bl&ots=L5BUW3DvIU&sig=x
5qIErvuqKeCXlnkgM84X2zssQU&hl=en&sa=X&ei=3E7pVLiwFoyWgwSks4OIAQ&ved=0CCwQ6AEwAjgU#v
=onepage&q=multihoming%20drawback%20MPLS&f=false
BGP MPLS based EVPN KANWAR ALAM SINGH
58
Network Configuration Example Validating a BGP-Based VPLS Multihoming Configuration
http://www.juniper.net/techpubs/en_US/release-independent/nce/information-products/topic-
collections/nce/bgp-vpls-multihoming/validating-a-bgp-based-vpls-multihoming-configuration.pdf
http://blog.ine.com/2010/11/26/scaling-virtual-private-lan-services-vpls/
Scale and Extend VPLS with LDP-BGP VPLS Interworking Retrieved from
http://www.eetimes.com/document.asp?doc_id=1208544&
Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL
http://www.brocade.com/downloads/documents/technical_briefs/Offering_Scalable_Layer2_Services_
with_VPLS_and_VLL.pdf
Virtual Private LAN Service (VPLS) Interoperability with Customer Edge (CE) Bridges (RFC 6246)
Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling(RFC 4761)
Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling(RFC 4762)