Juniper Networks Presentation Template-US
Download
Report
Transcript Juniper Networks Presentation Template-US
GSMPv3 applicability to L2CP
draft-wadhwa-gsmp-l2control-configuration-00.txt
L2CP BOF
IETF-65
Sanjay Wadhwa
Juniper Networks
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
Agenda
Layer2 Control in Access Networks (L2CP)
GSMPv3 applicability to L2CP
GSMPv3 extensions for L2CP
• Adjacency Protocol
• Access-Line discovery
• Line Configuration
• Remote connectivity check
• “Transactional” Multicast
Current Status
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
2
Proprietary and Confidential
www.juniper.net
2
L2CP : Layer2 Control Protocol in DSL
Access Networks
BNG (Broadband Network Gateway)
•Aggregation point for subscriber traffic.
•Serves as injection point for policy and IP QOS
management in access/regional network.
Acess-Node
•Terminates the “local-loop”.
•First point in the network where traffic is aggregated
from multiple “local-loops” on to a single network
(e.g. DSLAM in DSL access networks).
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
3
Proprietary and Confidential
www.juniper.net
3
Broadband Access Aggregation
Network
Customer
Premises Network
Access Aggregation Network
RG
Regional Broadband Network
BNG
DSLAM
(Access-Node)
Video
Head End or
ASP
ASP
(e.g. IP
Telephony)
Aggregation Network
IP Backbone
ISP
(Internet)
RG
L2CP
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
4
Proprietary and Confidential
www.juniper.net
4
L2CP: Layer2 Control in Access
Networks
Control Plane required between BNG and Accessnode for dynamic “QOS-related”, “service-related”
and “subscriber-related” operations.
Dynamic control protocol eliminates dependency
on integration with a complex OSS system
spanning multiple entities.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
5
Proprietary and Confidential
www.juniper.net
5
L2C: Layer2 Control in Access Networks
Desired control plane attributes:
• Simple
• Ease of implementation
• Time to market
• Light-weight
– Allow implementation on AN with limited control plane resources
(CPU/memory)
• Extensible
• Possible to extend the protocol for use-cases relevant to access
technologies other than DSL (e.g PON).
• Supports addition of new capabilities in a downward compatible
manner.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
6
Proprietary and Confidential
www.juniper.net
6
L2C: Layer2 Control in Access Networks
• Flexible
•Independent of underlying access/aggregation
network (e.g. ATM or Ethernet).
• Supports transactional exchange
•Request/response model for BNG to communicate
control decisions or request information from AN.
• Supports “asynchronous” notifications from AN
to BNG.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
7
Proprietary and Confidential
www.juniper.net
7
L2C: Layer2 Control in Access Networks
• Minimize configuration overhead and maximize
automation of operation.
•OPEX reduction
• Supports configurable keep-alive
•Detection for loss of connectivity and failure of peer
node.
•Support efficient resynchronization after loss of
peering.
• Supports graceful shutdown notification.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
8
Proprietary and Confidential
www.juniper.net
8
L2C: Layer2 Control in Access Networks
• Scalable
•Number of adjacencies
•Number of transactions
• Does not require any soft state.
• Supports Incremental update of information.
• Ease of supporting non-disruptive “on demand”
state refresh capability.
• Ease of supporting Graceful Restart and High
availability.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
9
Proprietary and Confidential
www.juniper.net
9
GSMPv3 applicability to L2C
Leverage subset of GSMPv3 as the base control
protocol to build upon.
Subset of GSMPv3 relevant to L2C identified in
draft-wadhwa-gsmp-l2control-configuration-00.txt.
• Contains DSL specific modifications and
extensions to GSMPv3 for few currently
envisaged use-cases of L2C.
• Based on draft-ietf-gsmp-v3-base-spec-07.txt
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
10
Proprietary and Confidential
www.juniper.net
10
GSMPv3 applicability to L2C
Master (Controller) - BNG (Broadband Network
Gateway)
Slave (Switch) - Access Node (e.g. DSLAM in DSL
access)
GSMP over TCP encaps
Separate “logical connection” for L2C.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
11
Proprietary and Confidential
www.juniper.net
11
GSMPv3 applicability to L2C
• GSMP Connection Establishment
• Access-node (slave) initiates TCP connection
•Ease of provisioning on BNG
•Divergence from base GSMP specification
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
12
Proprietary and Confidential
www.juniper.net
12
Adjacency Protocol : Extension
• Base GSMP adjacency protocol is extended:
•Adjacency messages extended to carry Capability
TLVs.
•Negotiation procedure for “Least Common
Denominator” capability set defined.
•Capability mis-match prevents adjacency to be
formed.
•Capabilities defined for current use-cases.
•Configurable adjacency keepalive (ACK) interval.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
13
Proprietary and Confidential
www.juniper.net
13
Use Case 1: Access Line Discovery
• Access-node asynchronously informs BNG of access-line state and
attributes (e.g. sync rate) when line comes up.
• BNG can adjust QOS for the local-loop based on the sync rate (aka
“remote link scheduling”).
• BNG can inform the access-line attributes to a policy server.
• Embedded “business logic” in the policy server can factor in the
access-line attributes.
• Policy server can then trigger the BNG to turn on/off services or
modify service attributes for the subscriber on the local loop.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
14
Proprietary and Confidential
www.juniper.net
14
Use Case 1: Access Line Discovery
• Change in access-line attributes also reported to the
BNG.
• Access-line reporting uses GSMP “Port-Up” and “PortDown” EVENT messages.
• TLVs defined for “access-line identification” and “accessline attributes”.
• TLVs are carried in “technology specific extension block”
of the EVENT message.
• “Technology Type” field is extended with a new value for
“DSL”.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
15
Proprietary and Confidential
www.juniper.net
15
8- Business
logic
Access-line Discovery
Radius
7-Sync Rate to
radius in
access-request
4-PORT_UP MESSAGE
ACI : [TCOM-Dslam-1]eth 207/1:350
Line Attributes : Downstream = B/W 768
Upstream = B/W 300
Local Loop Type = ATM
3-RG Turned On,
Synchronized with
DSLAM
DSLAM
Internet Port
9-Service
VSAs
5-Access Loop
Parameters
Stored
BNG
Video
Head End or
ASP
1-L2CP Session
Established
ASP
(e.g. IP
Telephony)
RG
IPTV Port
2-Access-Line Discovery
Capability Advertised
2-Subscriber logs in
(PPP/DHCP session)
IP Backbone
6-Set Shaping
Rate, Adjust
Shaping Mode
ISP
(Internet)
Ensures no congestion in the access network
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
16
Proprietary and Confidential
www.juniper.net
16
8- Business
logic
Access-line Attributes Update
Radius
7-Sync Rate to
radius in
access-request
4-PORT_UP MESSAGE
(Updated Line Parameters)
ACI : [xyz-Dslam-1]eth 207/1:350
1-DSL LINE
RESYNCH
Line Attributes : Downstream = B/W 512K
Upstream = B/W 300
Local Loop Type = ATM
9-Service
VSAs
5-Access Loop
Parameters
Updated
BNG
Video
Head End or
ASP
DSLAM
ASP
(e.g. IP
Telephony)
Internet Port
RG
IPTV Port
IP Backbone
6-Set Shaping
Rate, Adjust
Shaping Mode
ISP
(Internet)
QOS and Service control updated
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
17
Proprietary and Confidential
www.juniper.net
17
Access Line Discovery
Best-practice recommendations:
• Desirable to dampen Access-line state changes
by the Access-Node.
• Desirable to use use “BULK” transaction
message for access-line reporting on startup.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
18
Proprietary and Confidential
www.juniper.net
18
Use Case 2: Line Configuration
• BSR “managed” access and QOS control enforced by the accessnode.
• Provides for centralized “service management”.
• BSR can download service profiles/parameters to the access-node
(e.g. “IGMP Filter Lists”) via L2C.
• “Line Config” uses GSMP “Port Management” message to convey “service
attributes” from the BNG to the Access-node.
• “Function” field carried in the message has been extended with a new value
to support “line configuration”.
• TLVs defined for “access-line identification” and “service attributes”.
• TLVs are carried in “technology extension block” of the
PORT_MANAGEMENT message.
• “Technology type” is extended with a new value for “DSL”
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
19
Proprietary and Confidential
www.juniper.net
19
8- Business
logic
Line Configuration
Radius
7-Sync Rate to
radius in
access-request
4- EVENT (PORT_UP) MESSAGE
ACI : [TCOM-Dslam-1]eth 207/1:350
Line Attributes : Downstream = B/W 768
Upstream = B/W 300
Local Loop Type = ATM
5-Access Loop
Parameters
Stored
3-RG Turned On,
Synchronized with
DSLAM
BNG
DSLAM
Internet Port
RG
IPTV Port
9-Service
VSAs
Video
Head End or
ASP
1-L2C Session
Established
ASP
(e.g. IP
Telephony)
2-Access-Line Discovery &
Line Config Capability
Advertised
2-Subscriber logs in
(PPP/DHCP session)
IP Backbone
6-Set Shaping
Rate, Adjust
Shaping Mode
ISP
(Internet)
Enterprise
VPNs
10- PORT_MANAGEMENT MESSAGE
ACI : [TCOM-DSLAM-1] eth 207/1:350
Service-Profile : Gold
IGMP-Profile : Premium-Package
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
20
Proprietary and Confidential
www.juniper.net
20
2- Business
logic
Line Configuration Update
Web Portal/OSS etc
Radius/AAA
Policy
3-Change of
Authorization
BNG
DSLAM
Video
Head End or
ASP
1-Subscriber logs in
(PPP/DHCP session)
ASP
(e.g. IP
Telephony)
Internet Port
RG
IPTV Port
IP Backbone
ISP
(Internet)
10- PORT_MANAGEMENT MESSAGE
ACI : [TCOM-DSLAM-1] eth 207/1:350
Service-Profile : Gold
IGMP-Profile : Premium-Package
Enterprise
VPNs
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
21
Proprietary and Confidential
www.juniper.net
21
Use Case 3: Remote Connectivity Check
BNG triggered “local loop” test
capability.
Provides fault detection and to
some extent fault isolation.
L2 Network Independent
Verify the integrity of a local
loop
• Request AN Initiate
Loop-specific LB
Procedure
• LB Results returned to
BNG via L2C
Aggregation
Network
L2C: Port Management
Remote LB for ACI
L2-specific
L2C: Port Management
loop-back
LB Report for ACI – Success/Fail
procedure
Code: 0x500 : Specified access line does not exist.
• AN can trigger:
0x501 : Loopback test timed out.
0x502 : Reserved
0x503 : DSL line status showtime.
0x504 : DSL line status idle.
0x505 : DSL line integrity silent.
0x506 : DSL line status training
0x507 : DSL line integrity error
0x508 : DSLAM resource not available
0x509 : invalid test parameters
• F5 loopback cells for
ATM based local loop
IETF 65 (L2C BOF)
• 8023.ah procedures for
Copyright © 2004 Juniper Networks,
Inc.
EFM.
22
Proprietary and Confidential
www.juniper.net
22
Remote Connectivity Check
PORT_MANAGEMENT message is used for OAM request and
response.
“Function” field in the message extended with a new “remote
loopback” value.
PORT_MANAGEMENT message carrying the loopback test
response has a valid “result” field (Success/Failure)
“Code” field in PORT_MANAGEMENT message extended to carry
detailed OAM loopback test response.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
23
Proprietary and Confidential
www.juniper.net
23
Use Case 4 : Transactional
Multicast
Typically, BNG terminates user requests for receiving multicast
channels via IGMP.
BNG performs “authorization” , “access-control” (checks
subscription rights for the subscriber) and does admission control.
Ideal for BNG to send a single copy of “multicast stream” to a given
access-node (as opposed to a separate copy for each subscriber
behind the access-node).
BNG can set “replication state” in the access node using L2C (e.g.
P2MP PVC cross-connect OR mapping of “multicast MAC” to accesslines)
Access node can replicate based on native L2 mechanisms (e.g. ATM
p2mp cell replication or ethernet data-link bridging).
GSMP extensions for this use-case : TBD.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
24
Proprietary and Confidential
www.juniper.net
24
Current Status
Some work to define L2C use-cases is happening in DSL forum
(Working Text 147)
Desirable to undertake framework/requirement, and protocol
specification work for L2C in IETF.
L2C framework/requirements and GSMPv3 extensions for L2C are
defined in draft-wadhwa-gsmp-l2control-configuration-00.txt.
Framework/requirements also defined in a later ID draft-ooghel2c-framework-00.txt. The two drafts should be combined to yield
a single requirements draft.
Initial inter-operable implementations from different vendors (3
BNG and 4 DSLAM) exist based on draft-wadhwa-gsmp-l2controlconfiguration-00.txt
Field trials of these implementations underway.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
25
Proprietary and Confidential
www.juniper.net
25
Potential Protocol Work
Mechanism for “Graceful Restart”.
Mechanisms/Extensions to scale to a large number of L2C
adjacencies.
Support for “subtended DSL topologies” (large number of remote
Access-nodes controlled by a central BNG).
Mechanism on BNG for non-disruptive, “on-demand” retrieval of all
state on the Access node.
Definition of MIBs.
Support for redundant controllers (BNGs) for a single AN (or a
single partition on an AN)
Applicability to other broadband access technologies (e.g. PON,
WIMAX etc).
If needed, support for appropriate security mechanisms (to ensure
authentication of message initiator and integrity of messages).
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
26
Proprietary and Confidential
www.juniper.net
26
Recommendations
An IETF WG be formed to undetake L2C framework, requirements
and protocol specification work.
“GSMPv3 extensions for L2C” draft be considered as a WG item.
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
27
Proprietary and Confidential
www.juniper.net
27
Thank You
IETF 65 (L2C BOF)
Copyright © 2004 Juniper Networks, Inc.
28
Proprietary and Confidential
www.juniper.net
28