Sie sind auf Seite 1von 4

Virtual Private LAN Service

Virtual Private LAN Service (VPLS) is a way to pro- of PWs between those PEs.
vide Ethernet-based multipoint to multipoint communi- An advantage to using PWs as the underlying technology
cation over IP or MPLS networks. It allows geograph-
for the data plane is that in the event of failure, trac
ically dispersed sites to share an Ethernet broadcast do- will automatically be routed along available backup paths
main by connecting sites through pseudowires. The term
in the service providers network. Failover will be much
'sites includes multiplicities of both servers and clients. faster than could be achieved with e.g. Spanning Tree
The technologies that can be used as pseudo-wire can be
Protocol (STP). VPLS is thus a more reliable solution for
Ethernet over MPLS, L2TPv3 or even GRE. There are linking together Ethernet networks in dierent locations
two IETF standards track RFCs (RFC 4761 and RFC than simply connecting a WAN link to Ethernet switches
4762) describing VPLS establishment. in both locations.
VPLS is a virtual private network (VPN) technology. VPLS has signicant advantages for both service
In contrast to L2TPv3, which allows only point-to-point providers and customers. Service providers benet be-
layer 2 tunnels, VPLS allows any-to-any (multipoint) con- cause they can generate additional revenues by oering a
nectivity. new Ethernet service with exible bandwidth and sophis-
In a VPLS, the local area network (LAN) at each site ticated service level agreements (SLAs). VPLS is also
is extended to the edge of the provider network. The simpler and more cost eective to operate than a tradi-
provider network then emulates a switch or bridge to con- tional service. Customers benet because they can con-
nect all of the customer LANs to create a single bridged nect all of their sites to an Ethernet VPN that provides a
LAN. secure, high speed and homogenous network. Moreover,
VPLS provides a logical next step in the continuing evo-
VPLS is designed for applications that require multipoint
or broadcast access. lution of Ethernet from a 10 Mbit/s shared LAN protocol
to a multi-Gbps global service.

1 Mesh establishment
2 Label stack
Since VPLS emulates a LAN, full mesh connectivity is
required. There are two methods for full mesh establish- VPLS MPLS packets have a two-label stack. The outer
ment for VPLS: using Border Gateway Protocol (BGP) label is used for normal MPLS forwarding in the service
and using Label Distribution Protocol (LDP). The con- providers network. If BGP is used to establish the VPLS,
trol plane is the means by which provider edge (PE) the inner label is allocated by a PE as part of a label block.
routers communicate for auto-discovery and signalling. If LDP is used, the inner label is a virtual circuit ID as-
Auto-discovery refers to the process of nding other PE signed by LDP when it rst established a mesh between
routers participating in the same VPN or VPLS. Sig- the participating PEs. Every PE keeps track of assigned
nalling is the process of establishing pseudowires (PW). inner label, and associates these with the VPLS instance.
The PWs constitute the data plane, whereby PEs send
customer VPN/VPLS trac to other PEs.
BGP provides both auto-discovery and signalling. The 3 Ethernet emulation
mechanisms used are very similar to those used in estab-
lishing Layer-3 MPLS VPNs. Each PE is congured to PEs participating in a VPLS-based VPN must appear as
participate in a given VPLS. The PE, through the use of an Ethernet bridge to connected customer edge (CE) de-
BGP, simultaneously discovers all other PEs in the same vices. Received Ethernet frames must be treated in such
VPLS, and establishes a full mesh of pseudowires to those a way as to ensure CEs can be simple Ethernet devices.
PEs. When a PE receives a frame from a CE, it inspects the
With LDP, each PE router must be congured to par- frame and learns the CEs MAC address, storing it lo-
ticipate in a given VPLS, and, in addition, be given the cally along with LSP routing information. It then checks
addresses of other PEs participating in the same VPLS. the frames destination MAC address. If it is a broadcast
A full mesh of LDP sessions is then established between frame, or the MAC address is not known to the PE, it
these PEs. LDP is then used to create an equivalent mesh oods the frame to all PEs in the mesh.

1
2 4 SCALABILITY

Ethernet does not have a time to live (TTL) eld in its the CEs MAC address.
frame header, so loop avoidance must be arranged by PE devices may also be equipped with content-
other means. In regular Ethernet deployments, Spanning addressable memory (CAM), similar to high-end Ether-
Tree Protocol is used for this. In VPLS, loop avoidance net switches.
is arranged by the following rule: A PE never forwards a
frame received from a PE to another PE. The use of a full An alternative mechanism is using MAT (MAC Address
mesh combined with split horizon forwarding guarantees Translation).[1] However, at the time of writing this, there
a loop-free broadcast domain. aren't vendors providing MAT functionality.

4.3 PE auto-discovery
4 Scalability
In a VPLS-based VPN with a large number of sites, man-
VPLS is typically used to link a large number of sites to- ually conguring every participating PE does not scale
gether. Therefore, Scalability is an important issue that well. If a new PE is taken into service, every existing
needs addressing. PE needs to have its conguration adjusted to establish
an LDP session with the new PE. Standardisation work is
in progress to enable auto-discovery of participating PEs.
4.1 Hierarchical VPLS Three implementations are being worked on:
VPLS requires a full mesh in both the control and data
planes; this can be dicult to scale. For BGP, the control 4.3.1 LDP
plane scaling issue has long been addressed, through the
use of route reectors (RRs). RRs are extensively used The LDP method of PE auto-discovery is based on that
in the context of Internet routing, as well as for several used by the Label Distribution Protocol to distribute la-
types of VPNs. To scale the data plane for multicast and bels across P and PE routers within a single autonomous
broadcast trac, there is work in progress to use point- system.
to-multipoint LSPs as the underlying transport.
For LDP, a method of subdividing a VPLS VPN into
4.3.2 BGP
two or three tiered hierarchical networks was devel-
oped. Called hierarchical VPLS (HVPLS), it intro-
The BGP method of PE auto-discovery is based on
duces a new type of MPLS device: the multi-tenant
that used by Layer-3 MPLS VPNs to distribute VPN
unit (MTU) switch. This switch aggregates multiple cus-
routes among PEs participating in a VPN. The BGP4
tomers into a single PE, which in turn needs only one
Multi-Protocol (BGP-MP) extensions are used to dis-
control and data plane connection into the mesh. This
tribute VPN IDs and VPN-specic reachability informa-
can signicantly reduce the number of LDP sessions and
tion. Since IBGP requires either a full mesh of BGP ses-
LSPs, and thus unburden the core network, by concen-
sions or the use of a route reector, enabling the VPN
trating customers in edge devices.
ID in a participating PEs existing BGP conguration pro-
HVPLS (LDP) may also be used to join two VPLS mesh vides it with a list of all PEs in that VPN. Note that this
structures together. Without using HVPLS, every node in method is for auto-discovery alone; LDP is still used for
each VPLS mesh must become meshed with all nodes in signalling. The method of establishing VPLS with BGP
the other VPLS mesh. However, with HVPLS, the two described above accomplishes both auto-discovery and
meshes can essentially be joined together at certain lo- signalling.
cations. Techniques such as redundant pseudowires can
provide resiliency in case of failures at the interconnec-
tion points. 4.3.3 RADIUS

This method requires ALL PEs to be congured with one


4.2 MAC addresses or more RADIUS servers to use. When the rst CE router
in a particular VPLS VPN connects to the PE, it uses the
Since VPLS links multiple Ethernet broadcast domains CEs identication to request authentication from the RA-
together, it eectively creates a much larger broadcast DIUS server. This identication may be provided by the
domain. Since every PE must keep track of all MAC CE or may be congured into the PE for that particular
addresses and associated LSP routing information, this CE. In addition to a username and password, the identi-
can potentially result in a large amount of memory being cation string also contains a VPN name and an optional
needed in every PE in the mesh. provider name.
To counter this problem, sites may use a router as the CE The RADIUS server keeps track of all PEs that requested
device. This hides all MAC addresses on that site behind authentication for a particular VPN and returns a list of
3

them to the PE requesting authentication. The PE then


establishes LDP sessions to every PE in the list.

5 See also
Multiprotocol Label Switching (MPLS)

Virtual Leased Line (VLL)

IEEE 1355, which does something broadly similar


via hardware.

Virtual private network (VPN)


Virtual LAN (VLAN)

Virtual Extensible LAN (VXLAN)


Virtual network

Carrier Ethernet

6 References
[1] MAC Address Translation for Enabling Scalable Virtual
Private LAN Services

7 External links
Virtual Private LAN Service (VPLS) Using BGP
for Auto-Discovery and Signalling
Virtual Private LAN Service (VPLS) Using Label
Distribution Protocol (LDP) Signalling
Layer 2 Virtual Private Networks (l2vpn) working
group homepage
Pseudo Wire Emulation Edge to Edge (pwe3) work-
ing group homepage
RADs VPLS tutorial

MPLS-VPLS Resource Center: News and mailing


lists
4 8 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

8 Text and image sources, contributors, and licenses


8.1 Text
Virtual Private LAN Service Source: https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service?oldid=761505869 Contributors: The
Anome, Azhyd, Charles Matthews, Indefatigable, Lka, Biot, Plugwash, Linuxbeak, FlaBot, BertK, Udunuwara, Extraordinary, Mskeggs,
S charette, BenAveling, Bluebot, Dinuraj, Kvng, Kireeti, Phatom87, Davido, Dougher, Prolixium, EnOreg, Sgarson, Petzi1969, Light-
mouse, Victorblake, Craig Webb, Kireeti.kompella, NickCT, Phileasson, BMan, Addbot, Wireless friend, Materialscientist, Avesus, Web-
wat, FrescoBot, Js, WikitanvirBot, Rivz153, MaXintoshPro and Anonymous: 40

8.2 Images
File:Text_document_with_red_question_mark.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/a4/Text_document_
with_red_question_mark.svg License: Public domain Contributors: Created by bdesham with Inkscape; based upon Text-x-generic.svg
from the Tango project. Original artist: Benjamin D. Esham (bdesham)

8.3 Content license


Creative Commons Attribution-Share Alike 3.0

Das könnte Ihnen auch gefallen