Internet DRAFT - draft-cheng-pals-p2p-pw-multicast
draft-cheng-pals-p2p-pw-multicast
PALS W. Cheng
Internet-Draft China Mobile
Intended status: Informational J. Dong
Expires: May 21, 2020 Huawei Technologies
November 18, 2019
Efficient Layer 2 Multicast with Point-to-Point Pseudowires
draft-cheng-pals-p2p-pw-multicast-01
Abstract
Multicast services such as Evolved Multimedia Broadcast/Multicast
Service (eMBMS) become more and more popular in mobile networks. In
mobile transport network, it is important for the operators to
provide efficient transport of multicast services with existing
network devices. This document describes a mechanism of using point-
to-point Pseudowires (PW) [RFC3985] to achieve efficient layer 2
multicast transportation in mobile transport networks.The document
gives a multicast method by utilizing a Point-to-Point (P2P) path
between nodes in a packet transport network , according to the
destination IP address. With it, the PTN nodes can replicate and
forward the service message, which are received from the multicast
server, to the plurality of multicast clients corresponding to the
destination IP address.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 21, 2020.
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
Cheng & Dong Expires May 21, 2020 [Page 1]
Internet-DraftEfficient Layer 2 Multicast with Point-to-PoiNovember 2019
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Conventions used in this document . . . . . . . . . . . . 3
1.1.1. Terminology . . . . . . . . . . . . . . . . . . . . . 3
1.1.2. Requirements Language . . . . . . . . . . . . . . . . 4
2. Efficient Multicast with P2P PWs . . . . . . . . . . . . . . 4
3. Protection Mechanism . . . . . . . . . . . . . . . . . . . . 4
4. OAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
6. Security Considerations . . . . . . . . . . . . . . . . . . . 5
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5
8. Normative References . . . . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6
1. Introduction
Multicast services such as evolved Multimedia Broadcast/Multicast
Service (eMBMS) become more and more popular in mobile networks. In
mobile transport network, it is important for the operators to
provide efficient transport of multicast services with existing
network devices.
Cheng & Dong Expires May 21, 2020 [Page 2]
Internet-DraftEfficient Layer 2 Multicast with Point-to-PoiNovember 2019
----------------
///// multicast \\\\\
// source \\
| |
| Layer 3 Multicast Network |
| |
\\ //
\\\\\ /////
+--+--+ +--+--+
| R-1 +-----+ R-2 |
+--+--+ +--+--+ L2
| |
+--+--+ +--+--+ Multicast
| R-3 +-----+-R-4 |
*---+-+ +-+---* Network
/ | | \
/ | | \
+-----+ +--+--+ +--+--+ +-----+
| R-5 +--+ R-6 | | R-7 +--+ R-8 |
+---+-+ +-+-+-+ +-+-+-+ +-+---+
/ | | | | | | \
/ | | | | | | \
Clients Clients Clients Clients
Figure 1. L2 Multicast Topology
PTN network comprise at least one root node and at least one leaf
node, the multicast source server is connected to the root node, and
the multicast clients are connected to the leaf node.Figure 1 shows a
typical topology of mobile transport network, which is composed of
the layer 3 network at the core and the layer 2 network at the
aggregation and edge. R-1 and R-2 connect to the upstream layer 3
network, in which the multicast source locates. This document
focuses on the efficient multicast service transportation in the
layer 2 segment of the network using point-to- point (P2P)
Pseudowires (PW) [RFC3985].
1.1. Conventions used in this document
1.1.1. Terminology
The terminology is defined as [RFC3985] .
Cheng & Dong Expires May 21, 2020 [Page 3]
Internet-DraftEfficient Layer 2 Multicast with Point-to-PoiNovember 2019
1.1.2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
2. Efficient Multicast with P2P PWs
This section describes the mechanism of efficient layer 2 multicast
transportation with point-to-point PWs.
In the layer 2 multicast segment, nodes which connect to the L3
network are called Root nodes, and nodes which connect to the
multicast clients are called Leaf nodes. For each multicast service,
between the Root nodes and the Leaf nodes, 1-hop P2P PWs are
provisioned between the adjacent nodes. The multicast tree from the
Root nodes to the Leaf nodes is the concatenation of P2P PWs
provisioned by NMS or central controller.
Multicast traffic is carried by the P2P PWs. On each PW hop, the PW
label is popped, and the forwarding is performed according to the
layer 2 multicast forwarding table of the node. The layer 2
multicast forwarding entries can be either statically provisioned by
NMS or central controller, or dynamically generated via IGMP snooping
[RFC4541]. For multicast traffic received on a specific P2P PW, the
outbound PWs and ACs are determined by the corresponding L2 multicast
forwarding table. For packets to be forwarded to next P2P PW, the PW
label is pushed according to the forwarding table. With this
mechanism, on each P2P PW in the network, at most one copy of the
multicast traffic is delivered.
On the Leaf nodes, IGMP snooping [RFC4541] is used to optimize the
layer 2 multicast forwarding to the clients, so that only the clients
which express interests to the multicast service would receive the
corresponding multicast traffic.
3. Protection Mechanism
For layer 2 multicast service, 1+1 protection is provided. The
working and protection multicast trees are provisioned seperately by
NMS or central controller, and multicast service is carried on both
the working mutlicast tree and the protection multicast tree
simultaneously. In network topology of Figure 1, the Root node of
the working PW is R-1, while the Root node of the protection PW is
R-2. Each Leaf node has a working PW from its working upstream, and
a protection PW from the protection upstream. According to the
Cheng & Dong Expires May 21, 2020 [Page 4]
Internet-DraftEfficient Layer 2 Multicast with Point-to-PoiNovember 2019
result of OAM detection mechanism, the Leaf nodes choose to receive
multicast traffic from either the working or protection PW.
4. OAM
PW OAM mechanisms as defined in [RFC5085] [RFC6428] are deployed on
each P2P PW, including both the working PWs and protection PWs. When
failure occurs on a working PW, the node which detects the failure
SHOULD send AIS message as defined in [RFC6427] to notify its
downstream nodes of the failure. This AIS message is propagated
along the multicast tree to the downstream Leaf nodes. Then the Leaf
nodes which are impacted by the failure can switchover to receive the
multicast service traffic from the protection PWs
5. IANA Considerations
This document makes no request of IANA.
Note to RFC Editor: this section may be removed on publication as an
RFC.
6. Security Considerations
This document describes a layer 2 multicst mechansim with point-to-
point PWs and NMS or controller provisioned multicast tree. The
security condierations as specified in [RFC3985] apply to this
document.
7. Acknowledgements
The authors would like to thank Jun Wu, Kai Liu and Yongjian Hu for
the review and comments.
8. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation
Edge-to-Edge (PWE3) Architecture", RFC 3985,
DOI 10.17487/RFC3985, March 2005,
<https://www.rfc-editor.org/info/rfc3985>.
Cheng & Dong Expires May 21, 2020 [Page 5]
Internet-DraftEfficient Layer 2 Multicast with Point-to-PoiNovember 2019
[RFC4541] Christensen, M., Kimball, K., and F. Solensky,
"Considerations for Internet Group Management Protocol
(IGMP) and Multicast Listener Discovery (MLD) Snooping
Switches", RFC 4541, DOI 10.17487/RFC4541, May 2006,
<https://www.rfc-editor.org/info/rfc4541>.
[RFC5085] Nadeau, T., Ed. and C. Pignataro, Ed., "Pseudowire Virtual
Circuit Connectivity Verification (VCCV): A Control
Channel for Pseudowires", RFC 5085, DOI 10.17487/RFC5085,
December 2007, <https://www.rfc-editor.org/info/rfc5085>.
[RFC6427] Swallow, G., Ed., Fulignoli, A., Ed., Vigoureux, M., Ed.,
Boutros, S., and D. Ward, "MPLS Fault Management
Operations, Administration, and Maintenance (OAM)",
RFC 6427, DOI 10.17487/RFC6427, November 2011,
<https://www.rfc-editor.org/info/rfc6427>.
[RFC6428] Allan, D., Ed., Swallow, G., Ed., and J. Drake, Ed.,
"Proactive Connectivity Verification, Continuity Check,
and Remote Defect Indication for the MPLS Transport
Profile", RFC 6428, DOI 10.17487/RFC6428, November 2011,
<https://www.rfc-editor.org/info/rfc6428>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
Authors' Addresses
Weiqiang Cheng
China Mobile
Beijing
China
Email: chengweiqiang@chinamobile.com
Jie Dong
Huawei Technologies
China
Email: jie.dong@huawei.com
Cheng & Dong Expires May 21, 2020 [Page 6]