The invention relates to computer networks and, more specifically, to forwarding network traffic within computer networks.
An Ethernet Virtual Private Network (EVPN) may be used to extend two or more remote layer two (L2) customer networks through an intermediate layer three (L3) network (usually referred to as a provider network), in a transparent manner, i.e., as if the intermediate L3 network does not exist. In particular, the EVPN transports L2 communications, such as Ethernet packets or “frames,” between customer networks via the intermediate network. In a typical configuration, provider edge (PE) network devices (e.g., routers and/or switches) coupled to the customer edge (CE) network devices of the customer networks define label switched paths (LSPs) (also referred to as pseudowires) within the provider network to carry encapsulated L2 communications as if these customer networks were directly attached to the same local area network (LAN). In some configurations, the PE network devices may also be connected by an Internet Protocol (IP) infrastructure in which case IP/Generic Routing Encapsulation (GRE) tunneling or other IP tunneling can be used between the network devices.
EVPN may be combined with Provider Backbone Bridging (PBB) defined in accordance with IEEE standard 802.1ah. PBB defines an architecture and bridging protocols in which a Provider Backbone Bridged Network (PBBN) provides L2 connectivity between multiple provider bridge networks (PBNs) of one or more different network service providers. Such large area L2 network connectivity may be deployed, for example, in metropolitan area networks. Each PBN provides one or more service virtual LANs (“S-VLANS”) to service and isolate L2 traffic from customer networks. Access switches for the PBBN typically include a set of Backbone Edge Bridges (BEBs) that interconnect some or all of the S-VLANs supported by multiple PBNs. Each BEB provides interfaces that further encapsulate L2 frames for transport through the PBBN. The VLANs used to encapsulate L2 frames from the PBNs and transport the L2 traffic through the PBBN are known as backbone VLANs (B-VLANs), and the resources that support those VLANs are usually considered to be part of the PBBN. In this way, the PBBN may be referred to as a Virtual Bridged Local Area Network under the administrative control of a backbone provider. PBB-EVPN combines functionality of an EVPN and PBB BEB bridge, such that Multi-Protocol Label Switching (MPLS) LSPs defined in an EVPN are mapped to PBB encapsulated traffic.
In a PBB-EVPN, a set of PE routers may operate in a common Ethernet Segment in active-active mode with all PE routers forwarding network traffic in the Ethernet Segment. One of the PE routers in the Ethernet Segment may operate as a designated forwarder (DF) to forward Broadcast, Unknown Unicast, and Multicast (BUM) traffic while the other PE routers in the Ethernet Segment drop BUM traffic. The Ethernet Segment may also be associated with a Backbone Media Access Control (B-MAC) address, which is used by remote PE routers to forward network traffic through a service provider network to the set of PE routers included in the common Ethernet Segment. In some examples, a remote PE router may forward a known unicast packet to a particular non-DF PE router that is associated with the B-MAC address. Although the remote PE router may have already learned the destination Customer-MAC (C-MAC) thereby causing the remote PE router to send the network packet as known unicast traffic, the particular PE router may not have yet learned the C-MAC address. As such, although the particular PE router may include a path via the Ethernet Segment to forward the network packet to its destination, the particular PE router may treat the known unicast traffic as BUM traffic (i.e., drop the traffic) because the particular PE router does not recognize the C-MAC address and the particular PE router is not the DF.
The techniques described herein enable a particular PE router included in an Ethernet Segment of a PBB-EVPN to forward known unicast traffic from a service provider network to a customer network, although the PE router has not previously learned the destination C-MAC address and the particular PE router is not the designated forwarder (DF) for the Ethernet Segment. For instance, the PBB-EVPN may initially include a set of PE routers operating in active-active mode, in which one of the set of PE routers operates as a DF for forwarding BUM traffic. The set of PE routers may forward network traffic to a remote PE router, which performs MAC learning on source C-MAC addresses included in the network traffic. As part of the MAC learning, the remote PE router may store associations between source C-MAC addresses and a source B-MAC address that corresponds to the Ethernet Segment from which the network packets were sent to the remote PE router. At a later time, a particular PE router may join the Ethernet Segment as a non-DF router and advertise its reachability to the remote PE based on a B-MAC address associated with the Ethernet Segment.
If the remote PE router receives a network packet which includes a destination C-MAC address that it previously learned, the remote PE router may forward the network packet to any of the PE routers associated with the B-MAC for the Ethernet Segment. If the remote PE router forwards the network packet to the particular PE router that joined the Ethernet Segment, the particular PE router will perform a lookup in its C-MAC table for the destination C-MAC address included in the network packet. If the particular PE router did not previously learn the destination C-MAC address, the particular PE router would conventionally drop the network packet as BUM traffic because the particular PE router is not the DF for the Ethernet Segment associated with the destination B-MAC included in the network packet. Rather than drop the network packet, the PE router is configured to perform an additional lookup in accordance with techniques of the disclosure to determine whether the destination B-MAC of the network packet matches a B-MAC included in the B-MAC table of the particular PE router. If a match exists, the particular PE router determines an egress interface of the Ethernet Segment that corresponds to the matching B-MAC, and forwards the network packet using the egress interface. Because the destination for the network packet is reachable via the Ethernet Segment, the particular PE router can still forward the network packet to the destination, although the particular PE router has neither previously learned the destination C-MAC address, nor is the particular PE router the DF for the Ethernet Segment. By allowing a PE router to perform an additional lookup on the B-MAC table when forwarding network traffic from the service provider network to a customer network, techniques of the disclosure enable the PE router to avoid dropping network packets when a path to the destination exists at the particular PE router.
In one example, a method includes configuring a first provider edge (PE) router of a Provider Backbone Bridging (PBB) Ethernet Virtual Private Network (EVPN) to join an Ethernet Segment in active-active mode with at least a second PE router that is operating as a designated forwarder for the Ethernet Segment, receiving, by the first PE router from a remote PE router and prior to the first PE router performing Media Access Control (MAC) learning of a customer-MAC (C-MAC) address that is reachable via a backbone-MAC (B-MAC) address associated with the Ethernet Segment, a network packet that includes the C-MAC address, and in response to determining that the C-MAC address has not been learned by the first PE router and that the B-MAC address included in the network packet is associated with the Ethernet Segment, forwarding, by the first PE router, the network packet to a destination identified by the C-MAC address.
In another example, a first provider edge (PE) router of a Provider Backbone Bridging (PBB) Ethernet Virtual Private Network (EVPN), includes a control unit having at least one processor coupled to a memory, wherein the control unit executes software configured to: join an Ethernet Segment in active-active mode with at least a second PE router that is operating as a designated forwarder for the Ethernet Segment; receive, from a remote PE router and prior to the first PE router performing Media Access Control (MAC) learning of a customer-MAC (C-MAC) address that is reachable via a backbone-MAC (B-MAC) address associated with the Ethernet Segment, a network packet that includes the C-MAC address; and in response to determining that the C-MAC address has not been learned by the first PE router and that the B-MAC address included in the network packet is associated with the Ethernet Segment, forward the network packet to a destination identified by the C-MAC address.
In a further example, a computer-readable medium includes instructions for causing at least one programmable processor of a first (PE) router to: join an Ethernet Segment in active-active mode with at least a second PE router that is operating as a designated forwarder for the Ethernet Segment; receive, from a remote PE router and prior to the first PE router performing Media Access Control (MAC) learning of a customer-MAC (C-MAC) address that is reachable via a backbone-MAC (B-MAC) address associated with the Ethernet Segment, a network packet that includes the C-MAC address; and in response to determining that the C-MAC address has not been learned by the first PE router and that the B-MAC address included in the network packet is associated with the Ethernet Segment, forward the network packet to a destination identified by the C-MAC address.
The details of one or more embodiments of the disclosure are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the disclosure will be apparent from the description and drawings, and from the claims.
PE routers 10 and CE routers 8 are illustrated as routers in the example of
Service provider network 12 represents a publicly accessible computer network that is owned and operated by a service provider, which is usually large telecommunications entity or corporation. Service provider network 12 is usually a large layer three (L3) computer network, where reference to a layer followed by a number refers to a corresponding layer in the Open Systems Interconnection (OSI) model. Service provider network 12 is a L3 network in the sense that it natively supports L3 operations as described in the OSI model. Common L3 operations include those performed in accordance with L3 protocols, such as the Internet protocol (IP). L3 is also known as a “network layer” in the OSI model and the term L3 may be used interchangeably with the phrase “network layer” throughout this disclosure.
Although not illustrated, service provider network 12 may be coupled to one or more networks administered by other providers, and may thus form part of a large-scale public network infrastructure, e.g., the Internet. Consequently, customer networks 6 may be viewed as edge networks of the Internet. Service provider network 12 may provide computing devices within customer networks 6 with access to the Internet, and may allow the computing devices within the customer networks to communicate with each other.
Although additional network devices are not shown for ease of explanation, it should be understood that system 2 may comprise additional network and/or computing devices such as, for example, one or more additional switches, routers, hubs, gateways, security devices such as firewalls, intrusion detection, and/or intrusion prevention devices, servers, computer terminals, laptops, printers, databases, wireless mobile devices such as cellular phones or personal digital assistants, wireless access points, bridges, cable modems, application accelerators, or other network devices. Moreover, although the elements of system 2 are illustrated as being directly coupled, it should be understood that one or more additional network elements may be included along any of network links 16, such that the network elements of system 2 are not directly coupled.
Service provider network 12 typically provides a number of residential and business services, including residential and business class data services (which are often referred to as “Internet services” in that these data services permit access to the collection of publically accessible networks referred to as the Internet), residential and business class telephone and/or voice services, and residential and business class television services. One such business class data service offered by service provider network 12 includes L2 EVPN service. For example, an EVPN is a service that provides a form of L2 connectivity across an intermediate L3 network, such as service provider network 12, to interconnect two L2 customer networks, such as L2 customer networks 6, that are usually located in two different geographic areas. Often, EVPN is transparent to the customer networks in that these customer networks are not aware of the intervening intermediate service provider network and instead act and operate as if these two customer networks were directly connected and formed a single L2 network. In a way, EVPN enables a form of a transparent LAN connection between two geographically distant customer sites that each operates a L2 network and, for this reason, EVPN may also be referred to as a “transparent LAN service.”
To configure an EVPN, a network operator of the service provider configures various devices included within service provider network 12 that interface with L2 customer networks 6. The EVPN configuration may include an EVPN instance (EVI), which consists of one or more broadcast domains. Generally, an EVI may refer to a routing and forwarding instance on a PE router, such as PE routers 10A-10B and 10E. Consequently, multiple EVIs may be configured on PE routers 10 for Ethernet segment 14A, as further described herein, each providing a separate, logical layer two (L2) forwarding domain. In this way, multiple EVIs may be configured that each includes one or more of PE routers 10A-10B and 10E of Ethernet segment 14A. In some examples, Ethernet Tags are then used to identify a particular broadcast domain, e.g., a VLAN, in an EVI. A PE router may advertise a unique EVPN label per <ESI, Ethernet Tag> combination. This label assignment methodology is referred to as a per <ESI, Ethernet Tag> label assignment. Alternatively, a PE router may advertise a unique EVPN label per MAC address. In still another example, a PE router may advertise the same single EVPN label for all MAC addresses in a given EVI. This label assignment methodology is referred to as a per EVI label assignment.
In an EVPN that does not utilize PBB, a PE router performs MAC learning of customer/client MAC (C-MAC) addresses and advertises the C-MACs in BGP MAC Advertisement Routes to other PE routers in the EVPN. Such BGP MAC Advertisement Routes indicate the reachability of the C-MACs via the PE router that advertised the BGP MAC Advertisement Routes. Therefore, in EVPN, all the PE nodes participating in the same EVPN instance are exposed to all the C-MAC addresses learnt by any one of these PE routers because a C-MAC learned by one of the PE routers is advertised to other PE routers in that EVPN instance.
To reduce the number of BGP MAC Advertisement routes and the size of C-MAC tables, PBB-EVPN relies on a MAC summarization scheme, as is provided by PBB. In the MAC summarization scheme, network packets are forwarded through service provider network 12 by encapsulating network packets with source and destination Backbone MAC (B-MAC) addresses. PBB-EVPN defines a B-MAC address space of B-MAC addresses that are independent of a C-MAC address space, and aggregates C-MAC addresses via a single B-MAC address.
Each PE router may maintain a B-MAC table and a C-MAC table for the respective address spaces. A PE router may build a B-MAC table that includes associations between B-MAC addresses and respective sets of PE router IP addresses that are associated with a particular Ethernet Segment. For instance, an entry or row in a B-MAC table of a PE router may include a B-MAC address and a set of identifiers (e.g., MAC or IP addresses) of PE routers in a particular Ethernet Segment, where the PE router has configured the B-MAC address to correspond to the particular Ethernet Segment. Each PE router may be associated with an MPLS label that uniquely identifies the respective PE router, and the MPLS label may be associated with the respective identifier or entry in B-MAC table for respective PE router.
PE routers may be initially configured to associate a B-MAC with a particular Ethernet Segment. For instance, PE routers 10A, 10B, and 10E may each be configured in the Ethernet Segment 14A. To perform this configuration, PE routers 10A, 10B, and 10E may each store a mapping that represents an association between an identifier of Ethernet Segment 14A and a common B-MAC address (e.g., B-MAC1). As such, PE routers 10A, 10B, and 10E may encapsulate egress traffic forwarded into the service provider network 12 with B-MAC1 as the source B-MAC address.
In PBB-EVPN, PE routers learn remote C-MAC to B-MAC bindings in the data plane for traffic received from the core per-PBB bridging operation. For instance, PE routers initially advertise local B-MAC address reachability information in BGP to all other PE routers in the same set of service instances, but perform C-MAC learning in the data plane. When advertising reachability, each PE router may advertise an MPLS label that identifies the respective PE router. As an example, if PE router 10A receives a network packet from customer network 6C, PE router 10A may perform C-MAC learning to store an association, in the C-MAC table of PE router 10A, between B-MAC1 and the source C-MAC of the network packet. PE router 10A may encapsulate the packet with B-MAC1 as the source B-MAC and B-MAC2 as the destination B-MAC, where B-MAC2 is associated with PE router 10C. PE router 10C, upon receiving the network packet may perform MAC learning based on the source C-MAC included in the packet. If PE router 10C does not include an entry in its C-MAC table for the source C-MAC, then PE router 10C may store an entry that includes an association between the source C-MAC and B-MAC1.
At a later time, if PE router 10C receives a network packet from customer network 6A, PE router 10C may determine the destination C-MAC for the packet matches the previously learned C-MAC stored in C-MAC table of PE router 10A that is associated with B-MAC1. PE router 10A may encapsulate the packet with B-MAC2 as the source B-MAC and B-MAC1 as the destination B-MAC. To forward the network packet to Ethernet Segment 14A that corresponds to B-MAC1, PE router 10C performs a lookup in its B-MAC table. PE router 10C identifies an entry with B-MAC1 and selects the IP address of one of PE routers 10A, 10B, or 10E, which are each associated with B-MAC1 in the B-MAC table. If PE router 10C selects PE router 10A as PE router to forward the network packet to customer network 6C, PE router 10C includes the MPLS label for PE router 10A as part of the network packet header and forwards the network packet using its egress interface for PE router 10A. PE router 10A, upon receiving the network packet, performs a lookup in the C-MAC table based on the destination C-MAC included in the network packet. Because PE router 10A previously learned the C-MAC address, PE router 10A forwards the network packet to customer network 6C using the interface for link 16D.
At configuration and startup, a PE router, such as PE router 10A performs a number of operations. For instance, PE router 10A discovers all remote PE routers for a PBB I-SID in which PE router 10A is included. PE router 10A, at configuration and startup, distributes B-MACs to other PE routers in the PBB I-SID, so as to indicate PE router 10A is reachable via the B-MACs, which may be associated with respective Ethernet Segments. PE router 10A, at configuration and startup, may also discover other PE routers in the same Ethernet Segment (e.g., PE routers 10B and 10E in Ethernet Segment 14A) and perform a designated forwarder (DF) election that is responsible for forwarding Broadcast, Unidentified Unicast or Multicast traffic (BUM) traffic for a given PBB B-MAC, and/or Ethernet Segment. In the example of
As shown in
An EVPN, such as illustrated in
As shown in the example of
In system 2 of
PE router 10C may later receive a network packet destined for customer network 6 after PE router 10C has configured its B-MAC table to include an association between B-MAC1 and an identifier of PE router 10E. PE router 10C may determine that the network packet includes the previously learned C-MAC by performing a lookup in the C-MAC table that includes an association between the C-MAC and B-MAC1. Based on the association between the C-MAC and B-MAC1, PE router 10C may perform a lookup in its B-MAC table which includes B-MAC1 associated with identifiers of PE routers 10A, 10B, and 10E. Using one or more load-balancing operations, PE router 10C may use the identifier of PE router 10E to forward the network packet to PE router 10E. For instance, PE router 10C may encapsulate the packet with B-MAC2 as the source B-MAC, B-MAC1 as the destination B-MAC, and attach and MPLS label previously advertised by PE router 10E that identifies PE router 10E the PBB-EVPN. PE router 10C may then forward the encapsulated packet as known unicast traffic to PE router 10E using a logical interface of PE router 10C that corresponds to PE router 10E. Notably, source and destination C-MACs may be included in the encapsulated network packet as it is sent to provider network 12.
PE router 10E may receive the encapsulated packet and perform a lookup in the C-MAC table for an entry that includes the destination C-MAC of the encapsulated packet. Conventionally, if PE router 10E had not previously learned the C-MAC address (e.g., the C-MAC address is not included in the C-MAC table), then PE router 10E would have dropped the encapsulated network packet because PE router 10E is not the DF for Ethernet Segment 14A that is associated with B-MAC 1. Rather than dropping the encapsulated network packet, PE router 10E is configured to, in accordance with techniques of the disclosure determine whether PE router 10E is included in an Ethernet Segment that corresponds to the destination B-MAC, i.e., B-MAC1. To perform this determination, PE router 10E determines whether the destination B-MAC, i.e., B-MAC1, is included in the B-MAC table of PE router 10E. If PE router 10E determines that B-MAC1 is included in the B-MAC table, then PE router 10E determines the egress interface for Ethernet Segment 14A based on an association between B-MAC1 and an identifier of Ethernet Segment 14A. PE router 10E removes at least the destination and source B-MACs and the MPLS labels used for forwarding the encapsulated network through service provider network 12, and forwards the network packet to CE router 8C via communication link 16F that corresponds to the egress interface.
As described above in accordance with techniques of the disclosure, PE router 10E may avoid dropping known unicast traffic from remote PE routers for B-MAC1, although PE router 10E has not yet learned the C-MAC address in such known unicast traffic and although PE router 10E is not the designated forwarder for Ethernet Segment 14A. As such, rather than dropping known unicast traffic destined for customer network 6C, PE router 10E may forward the network traffic, thereby reducing or eliminating the need for PE router 10C to re-send known unicast packets that would otherwise have been dropped. Accordingly, techniques of the disclosure may prevent PE router 10E from treating known unicast traffic as BUM traffic when PE router 10E has not yet learned the C-MAC in the known unicast traffic. This can reduce or avoid dropped traffic (an effect sometimes referred to as “traffic black holing”), and may also improve a speed of network convergence in active-active PBB-EVPN redundancy systems.
Control unit 82 may comprise a routing engine 84 and a packet forwarding engine 86 (or “forwarding unit”). Routing engine 84 operates as the control plane for provider router 18 and includes an operating system that provides a multi-tasking operating environment for execution of a number of concurrent processes. Routing engine 84, for example, execute software instructions to implement one or more control plane networking protocols 97. For example, protocols 97 may include one or more routing protocols, such as Border Gateway Protocol (BGP) 99 for exchanging routing information with other routing devices and for updating routing information 94. Protocols 97 may also include Multiprotocol Label Switching Protocol (MPLS) 95 for tunneling packets within service provider network 12.
Routing protocol daemon (RPD) 99 may use protocols 97 to exchange routing information, stored in routing information 94, with other routers. Routing information 94 may include information defining a topology of a network. RPD 99 may resolve the topology defined by routing information in routing information 94 to select or determine one or more routes through the network. RPD 99 may then generate forwarding information 106 and update forwarding plane 86 with routes from forwarding information 106.
Routing information 94 may describe a topology of the computer network in which provider router 18 resides, and may also include routes through the shared trees in the computer network. Routing information 94 describes various routes within the computer network, and the appropriate next hops for each route, i.e., the neighboring routing devices along each of the routes. Routing engine 84 analyzes stored routing information 94 and generates forwarding information 106 for forwarding engine 86. Forwarding information 106 may associate, for example, network destinations for certain multicast groups with specific next hops and corresponding IFCs 88 and physical output interfaces for output links 92. Forwarding information 106 may be a radix tree programmed into dedicated forwarding chips, a series of tables, a complex database, a link list, a radix tree, a database, a flat file, or various other data structures.
In addition, routing engine 84 executes EVPN protocol 87, which operates to communicate with other routers to establish and maintain an EVPN, such as the EVPN of
Routing engine 84 executes PBB protocol 101 in accordance with IEEE 802.1ah-2008, Provider Backbone Bridges, June 2008, the entire contents of which are incorporated herein by reference. PBB protocol 101 provides for the exchange of control plane messages that include PBB configuration information, such as announcing B-MAC addresses. PBB protocol 101 is also used by PE router 10E to encapsulate network packets with PBB headers, such as source and destination B-MAC addresses.
In some examples, forwarding engine 86 arranges forwarding structures as next hop data that can be chained together as a series of “hops” along an internal packet forwarding path for the network device. In many instances, the forwarding structures perform lookup operations within internal memory of ASICs included in forwarding engine 86, where the lookup may be performed against a tree (or trie) search, a table (or index) search. Other example operations that may be specified with the next hops include filter determination and application, or a rate limiter determination and application. Lookup operations locate, within a lookup data structure (e.g., a lookup tree), an item that matches packet contents or another property of the packet or packet flow, such as the inbound interface of the packet. The result of packet processing in accordance with the operations defined by the next hop forwarding structure within ASICs determines the manner in which a packet is forwarded or otherwise processed by forwarding engine 86 from its input interface on one of IFCs 88 to its output interface on one of IFCs 88.
As shown in
Forwarding information may also include lookup structures 111. Lookup structures 111 may, given a key, such as an address, provide one or more values. In some examples, the one or more values may be one or more next hops. A next hop may be implemented as microcode, which when executed, perform one or more operations. One or more next hops may be “chained,” such that a set of chained next hops perform a set of operations for respective different next hops when executed. Examples of such operations may include applying one or more services to a packet, dropping a packet, and/or forwarding a packet using an interface and/or interface identified by the one or more next hops.
As described above, in system 2 of
After PE router 10C has learned the C-MAC, PE router 10E may come online and be configured for B-MAC1 and Ethernet Segment 14A. At initial configuration and startup, PE router 10E discovers all remote PE routers for a PBB I-SID in which PE router 10E is included. For instance, RPD 99 may communicate with PBB 101, BGP 93, and EVPN 87 to generate a MAC Advertisement Route message (as described in draft-ietf-l2vpn-pbb-evpn-10) that includes B-MAC1, which may be configured by an administrator or operator of PE router 10E. PE router 10E may send the MAC Advertisement Router message to other PE routers in the PBB I-SID that includes PE router 10E. In this way, other PE routers in service provider network 12 determine that B-MAC1 is reachable via PE router 10E. The PE routers that received the MAC Advertisement Router message may similarly send PE router 10E respective MAC Advertisement Router messages that indicate the reachability of the same B-MAC1 and/or other B-MACs via the respective PE routers.
PE router 10C may later receive a network packet destined for customer network 6 after PE router 10C has configured its B-MAC table to include an association between B-MAC1 and an identifier of PE router 10E. PE router 10C may determine that the network packet includes the previously learned C-MAC by performing a lookup in the C-MAC table that includes an association between the C-MAC and B-MAC1. Based on the association between the C-MAC and B-MAC1, PE router 10C may perform a lookup in its B-MAC table which includes B-MAC1 associated with identifiers of PE routers 10A, 10B, and 10E. PE router 10C may use the identifier of PE router 10E to forward the network packet to PE router 10E. For instance, PE router 10C may encapsulate the packet with B-MAC2 as the source B-MAC, B-MAC1 as the destination B-MAC, and attach an MPLS label previously advertised by PE router 10E that identifies PE router 10E the PBB-EVPN. PE router 10C may then forward the encapsulated packet as known unicast traffic to PE router 10E using a logical interface of PE router 10C that corresponds to PE router 10E.
PE router 10E may initially receive the encapsulated packet at interface 88A. Forwarding engine 86 determines the destination C-MAC included in the encapsulated packet and determines whether C-MAC table 109 includes the destination C-MAC. In the examples of
Because the C-MAC is not included in C-MAC table 109, forwarding engine 106, in accordance with techniques of the disclosure identifies the destination B-MAC1 in the encapsulated network packet. Forwarding engine 106 determines whether destination B-MAC1 is included in B-MAC table 107. If forwarding engine 106 determines that B-MAC1 is not included in B-MAC table 107, then forwarding engine 106 treats the packet as BUM traffic and drops the packet because PE router 10E is not the DF in Ethernet Segment 14A. If, however, forwarding engine 106 determines that B-MAC1 is included in B-MAC table 107, then PE router 10E determines the egress interface for Ethernet Segment 14A based on an association in aliasing data 113 between B-MAC1 and an identifier of Ethernet Segment 14A. That is, upon determining that Ethernet Segment 14A is associated with B-MAC1, PE router 10A determines the egress interface for Ethernet Segment 14A. Forwarding engine 86 forwards the network packet using the egress interface to CE router 8C.
The architecture of PE router 10E illustrated in
Control unit 82 may be implemented solely in software, or hardware, or may be implemented as a combination of software, hardware, or firmware. For example, control unit 82 may include one or more processors which execute software instructions. In that case, the various software modules of control unit 82 may comprise executable instructions stored on a computer-readable medium, such as computer memory or hard disk.
PBB-EVPN header 150 also includes Ethertype 160 and ISID 162. Ethertype 160 may be a unique value that indicates the type of packet, i.e., a PBB-EVPN packet. ISID 162 may be an identifier of a PBB B-Service instance that includes B-MAC1. PBB-EVPN header 150 also includes destination C-MAC address 164 and source C-MAC address 166. In the examples of
PE router 10E performs MAC learning of the source C-MAC address (163). For instance, PE router 10E stores an entry in its C-MAC table for the ISID of the packet, which indicates an association between the source-CMAC and source B-MAC2. PE router 10E then performs a MAC lookup in the C-MAC table for the destination C-MAC address (164). PE router 10E determines whether the destination C-MAC is included in the C-MAC table (165). If the destination C-MAC is in the C-MAC table, then PE router 10E determines the B-MAC corresponding to the destination C-MAC and identifies the egress interface associated with the B-MAC. PE router 10E forwards the network packet using the egress interface (166).
In the example of
PE router 10C receives the first network packet with the PBB header. PE router 10C performs MAC learning based on source C-MAC and source B-MAC1 by storing data in the C-MAC table of PE router 10C that indicates an association between the source C-MAC and source B-MAC1 (201). In this way, PE router 10C, when receiving traffic from customer network 6A that is destined for customer network 6C, may forward the network traffic as known unicast traffic to B-MAC1. PE router 10C, upon determining that the destination C-MAC of the first network packet corresponds to customer network 6A, sends the first network packet to customer network 6A.
At a later time, PE router 10E joins Ethernet Segment 14A, which corresponds to B-MAC1. PE router 10E sends MAC Route Advertisements to at least PE routers 10B and 10C that indicate PE router 10E is included in B-MAC1 (206). PE routers 10C and 10A receive respective MAC Route Advertisements, update their respective forwarding information to associate PE router 10E with PE routers 10A and 10C (208, 204). As an example, PE router 10C creates an entry in its B-MAC table that indicates an association between B-MAC1 and an identifier of PE router 10E (e.g., IP address, MAC address, MPLS label advertised by PE router 10E, etc.). PE router 10A creates a similar entry in its B-MAC table like PE router 10C.
After PE router 10C has updated its B-MAC table to include B-MAC1, PE router 10C may receive a second network packet from CE router 8A that is destined for customer network 6C (210). PE router 10C may identify the destination C-MAC of the network packet and perform a lookup in the C-MAC table of PE router 10C (212). Since PE router 10C previously learned the destination C-MAC, which is stored in the C-MAC table, PE router 10C may determine that B-MAC1 is associated with the destination C-MAC. PE router 10C may perform a lookup on B-MAC1 to select one of PE routers 10A, 10B, or 10E to forward the second network packet. Because each of PE routers 10A, 10B, and 10E are each associated with B-MAC1 in PE router 10C's B-MAC table, PE router 10C may perform one or more load-balancing operations (e.g., round-robin, header-based hashing, or any other suitable load-balancing technique) to select PE router 10E. PE router 10C determines an interface associated with PE router 10E and forwards the second network packet to service provider network 12 (214). As described in this disclosure, PE router 10C may attach a source B-MAC1 and destination B-MAC2 to the second network packet. PE router 10C may attach an MPLS label previously advertised by PE router 10E for forwarding network packets to PE router 10E through service provider network 12 (e.g., an inner service label). PE router 10E may also attach an MPLS label that corresponds to a direct next hop (e.g., provider router) in service provider network 12 to which PE router 10C forwards the second network packet (e.g., an outer transport label).
PE router 10E receives the second network packet. Upon receiving the second network packet PE router 10E performs a lookup based on the destination C-MAC included in the network packet. PE router 10E determines that the destination C-MAC is not included in the C-MAC table of PE router 10E because PE router 10E has not previously learned the destination C-MAC (216). For instance, PE router 10E has not previously received a network packet that included the destination C-MAC as a source C-MAC and has not stored such as source C-MAC in the C-MAC table of PE router 10E in association with B-MAC1. Rather than discarding the second network packet as BUM traffic because PE router 10E is not the DF for Ethernet Segment 14A, PE router 10E performs an additional lookup in the B-MAC table of PE router 10E. To perform the lookup, PE router 10E determines whether the destination B-MAC1 is included in the B-MAC table of PE router 10E. If the destination B-MAC1 is not included in the B-MAC table, then PE router 10E treats the packet as BUM traffic and drops the packet. However, in the example of
The techniques described herein may be implemented in hardware, software, firmware, or any combination thereof. Various features described as modules, units or components may be implemented together in an integrated logic device or separately as discrete but interoperable logic devices or other hardware devices. In some cases, various features of electronic circuitry may be implemented as one or more integrated circuit devices, such as an integrated circuit chip or chipset.
If implemented in hardware, this disclosure may be directed to an apparatus such a processor or an integrated circuit device, such as an integrated circuit chip or chipset. Alternatively or additionally, if implemented in software or firmware, the techniques may be realized at least in part by a computer-readable data storage medium comprising instructions that, when executed, cause a processor to perform one or more of the methods described above. For example, the computer-readable data storage medium may store such instructions for execution by a processor.
A computer-readable medium may form part of a computer program product, which may include packaging materials. A computer-readable medium may comprise a computer data storage medium such as random access memory (RAM), read-only memory (ROM), non-volatile random access memory (NVRAM), electrically erasable programmable read-only memory (EEPROM), Flash memory, magnetic or optical data storage media, and the like. In some examples, an article of manufacture may comprise one or more computer-readable storage media.
In some examples, the computer-readable storage media may comprise non-transitory media. The term “non-transitory” may indicate that the storage medium is not embodied in a carrier wave or a propagated signal. In certain examples, a non-transitory storage medium may store data that can, over time, change (e.g., in RAM or cache).
The code or instructions may be software and/or firmware executed by processing circuitry including one or more processors, such as one or more digital signal processors (DSPs), general purpose microprocessors, application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), or other equivalent integrated or discrete logic circuitry. Accordingly, the term “processor,” as used herein may refer to any of the foregoing structure or any other structure suitable for implementation of the techniques described herein. In addition, in some aspects, functionality described in this disclosure may be provided within software modules or hardware modules.
Various embodiments of the invention have been described. These and other embodiments are within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
9019814 | Mohanty | Apr 2015 | B1 |
20080225695 | Balus | Sep 2008 | A1 |
20080228943 | Balus et al. | Sep 2008 | A1 |
20120219004 | Balus et al. | Aug 2012 | A1 |
20170141963 | Chalapathy | May 2017 | A1 |
Entry |
---|
Sajassi et al., “Provider Backbone Bridging Combined with Ethernet VPN (PBB-EVPN),” Internet Working Group Draft, draft-ieff-l2vpn-pbb-evpn-10, May 14, 2015, 22 pp. |
Sajassi et al., “BGP MPLS-Based Ethernet VPN,” RFC 7432, Internet Engineering Task Force (IETF), Feb. 2015, 56 pp. |
“Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services,” Cisco Systems Inc., May 2014, 10 pp. |
Sajassi et al., “Provider Backbone Bridging Combined with Ethernet VPN (PBB-EVPN)”, RFC 7623, Internet Engineering Task Force (IETF), Sep. 2015, 23 pp. |
Extended Search Report from counterpart European Application No. 16204290.7, dated Jun. 2, 2017, 10 pp. |
Response to Extended Search Report dated Jun. 2, 2017, from counterpart European Application No. 16204290.7, filed Jan. 4, 2018, 13 pp. |
Number | Date | Country | |
---|---|---|---|
20170195135 A1 | Jul 2017 | US |