SlideShare a Scribd company logo
Ethernet VPN (EVPN)
EVerything Provider Needs
by Anton Karneliuk and Pau Nadeu
Ethernet services are evolving, standards too.
New services, more bandwidth.
(even your grandma it’s also using TikTok)
Ethernet
Invented
IEEE
802.3
IEEE
802.3u
(FE)
IEEE
802.1Q
Ethernet
Over
MPLS
IEEE
802.1ad
(PB)
IEEE
802.1ah
(PBB)
TRILL
NVO3
EVPN
Segment
Routing
Ethernet
II
Ethernet
Switch-
ing
IEEE
802.3z
(GE)
IEEE
802.3ad
(LAG)
IEEE
802.3ae
(10 GE)
VPLS
IEEE
802.3ba
(40 GE,
100 GE)
IEEE
802.1aq
(SPB)
1982
1973 1983 1989 1995 1998 1998 2000 ~2001 2003 2005 2007 2008 2010 2011 2012 2013 2018+
SR Arch.
SR-MPLS
SRv6
Why Everything
Provider
Needs?
01
It never rains, but it pours.
(why we need more technologies?)
MPLS/VPLS and PBB are
proven technologies, but:
- Control plane approach isn't evolving.
- Uses flood and learn to build Layer 2
FDB (Forwarding Database).
01 EVPN ease delivery on simple
and complex services.
- Takes profit from a lot of experiences of years of
VPLS usage on production networks.
- Abstract and Separate Control Plane and data plane:
BGP carries MAC/IP information, choice your favorite
data plane encapsulation.
- Flexibility for service deliveries over Layer3 networks.
02
Fast enabler for engineers to meet needs what peoples want.
- Use as overlay technology to simplify other scenarios and remove redundant protocols from
the network.
- Integrated Layer 2 and Layer 3 VPN Services (also with IRB).
- Cloud and Virtualization services
- Datacenter interconnect (DCI)
- FTTx wholesale services (Bitstream)
- VM mobility across WAN-connected datacenters.
03
Sounds too cool, but…
(give me more )
Unified Services
- Have similarities with L3VPN in terms of
control and stability.
- Layer2 and Layer3 over same interface,
802.1Q and VPN services.
Designed as Flexible
- You can choose between IP or MPLS.
- NVO’s encapsulations allows services
over a simple IP network.
Have the power
- Consistency between control and data plane,
BGP signaled on control plane, flood-and learn
on data plane.
- Proxy ARP/ND allows PEs to respond ARP/ND
requests enabling you to have a clean network.
- MAC/IP provisioning allows you have a
methodical network control.
Squeezing efficiency
- Multihoming in all-active forwarding enable
loadbalancing across all PEs.
- Optimize BUM frames delivery.
- More efficiency delivering hybrid services over
logical or physical interfaces.
Let’s compare
apples to
apples.
02
VPLS PBB-EVPN EVPN
PE Auto-discovery
Access multi-homing (single active)
All-active multi-homing (flow load balancing)
Fast convergence on failure
MAC mobility
Control plane scaling of large number of MACs
MAC-IP based policying (flexible topologies)
Avoid flooding of unknown-unicast and ARP
Fast convergence based on local rep. on failures
Optimized VM (MAC-IP) mobility & inter-subnet
routing
Simplify configuration and O&M
Per service Class-of-Service
Yes
No
No
CP
Current EVPN
status.
03
EVPN use and evolution.
New but mature
- RFC 7209 (requirements for
EVPN) was released on 2014.
- RFC 7432 (BGP EVPN-MPLS)
was released on 2015.
- A lot of improvements and
new features are introduced
year to year.
Used by big SP / CSPs.
Telefonica, AT&T, Verizon, Apple,
Google, Facebook… are actively
using, supporting and
contributing on EVPN evolution.
Well-known vendors
EVPN it’s supported by almost all
well-known vendors: Nokia (ALU),
Cisco, Juniper, Huawei, FRRouting,
Arista…
Holded by multiple groups.
There are new Multiple work groups
are working together to standardize
new extensions and EVPN functions in
“IETF Internet L2 Working group”.
03
01
02 04
Getting deeper.
04
EVPN nomenclatures.
EVI EVPN instance, extended along all participants PEs.
MAC-VRF EVI routing table
ESI
Network segment connected to PEs that implement EVI.
Ethernet Tag Identifies broadcast domain (i.e. BD
or VLAN)
S-A/ A-A modes
Single-Active redundancy
All-Active redundancy
Single-Homed Device/Network (SHD/SHN) -> ESI = 0
Multi-Homed Device/Network (MHD/MHN)
Control and data plane in EVPN
- MAC/IP tuple routing it’s introduced using MP-BGP.
- Flood-and-learn method are kept between PE-CE (in data plane).
- MP-BGP use between PEs enable routing and MAC policy, TE criteria's, etc...
- EVPN it’s using MP-BGP AFI 25 (VPLS) and SAFI 70 (EVPN), and includes Route
Distinguisher (RD), Route Targets (RT), BGP communities, etc…
BGP Routes
Route Types:
[1] Ethernet Auto-Discovery (AD) Route
[2] MAC Advertisement Route
[3] Inclusive Multicast Route
[4] Ethernet Segment Route
[5] IP Prefix Route
BGP Route Attributes
Extended Communities:
- ESI-MPLS Label
- ES-Import RT
- MAC Mobility
- Default Gateway
Service Interfaces
- There are three service interface ”flavours”: VLAN Based Interface, VLAN Bundle
Interface, VLAN Aware Bundle Interface.
- There is another, and obvious, service interface type: Port Based Interface.
VLAN Based VLAN Bundle VLAN Aware Bundle
VLAN per EVI 1:1 N:1 N:1
Tenant ID per EVI Single Multiple Multiple
BD (Bridge-Domain) per EVI Single Single Multiple
MAC/VLAN overlapping
VLAN Translation (Mapping)
Yes
No
EVPN flavours...
- There are… three EVPN variants depending on data plane choice.
- All of this are based on route learning between PE’s using BGP.
- EVPN uses MPLS/IP, as RFC 7209 and RFC 7432 requires.
- PBB E-VPN combines 802.1ah PBB with EVPN in order to achieve MAC scalability stacking C-
MACs over B-MACs.
- What EVPN-VXLAN uses in data plane? Obviously, VXLAN.
Data Plane
Control Plane
EVPN MP-BGP
draft-ietf-l2vpn-evpn
Multiprotocol
Label
Switching
(MPLS)
draft-ietf-l2vpn-evpn
Provider
Backbone
Bridges (PBB)
draft-ietf-l2vpn-pbb-evpn
Network
Virtualization Overlay
(NVO)
draft-sd-l2vpn-evpn-
overlay
MAC Mobility & Duplication
VM migration it’s frequent between CPDs.
01
This implies that a MAC address that at a given moment is advertised from a
network PE/ESI (old and incorrect route) changes its location and passes and
advertises itself from another PE / ESI of the EVI (new and correct route).
02
The method used to identify the valid path from among the
existing in the network for each MAC is based on a counter
associated with the “MAC mobility” community, which is added to each
route type 2 "MAC Advertisement"
03
Route with highest sequence number it’s the valid route.
04
A-A Multihoming and DF election
PE’s connected to same ESI are auto-discovered using “Ethernet Segment”
route.
01
Each PE have automatically enabled filters to import type 4 routes with
community ES-Import.
02
One of PE connected to same ESI are choosed as “DF” (Designated
Forwarder): it sends BUM traffic received from core to ESI-connected CEs,
other PE’s filter the traffic to CE).
03
DF election in a site can be done in multiple ways:
- A multiple DF can coexist to have load balancing.
- One DF it’s choose for ESI or Ethernet Tag.
04
A-A Multihoming and Split Horizon
PE’s announces ESI MPLS Label associated to each ES with multihoming
topology.
01
This ”Split Horizon Label” it’s sent associated with type 1 routes (Auto-
Discovery) in a BGP Community.
02
Split-Horizon as Loop avoiding mechanism: don’t forward traffic on interface
through which it is received.
03
When PE sends BUM traffic to core, it replicates the frame to all EVI
participant PEs, and add ESI MPLS Label to identify ESI where it’s originated.
04
PEs connected to the same network segment identify the labels and filters
BUM traffic towards CEs connected to the ESI.
05
Unkown Unicast Management and
ARP/ND
The PEs participating in the EVI perform the functions of Proxy-
ARP/ND based on the EVPN route tables of each instance.
01
“ARP/ND/DHCP snooping” optimizes and reduces traffic of the type
"Unknown Unicast" between sites of an EVI.
02
Static provisioning of the MAC addresses of an ESI you can further reduce
(or even eliminate) “unknown unicast” traffic.
03
A-A Multihoming & Aliasing
Type 2 "MAC Advertisement" routes include information about
the ESI of the EVI where the MAC of each host resides.
01
Type 1 "Ethernet A-D" routes include information indicating
the PEs connected to each ESI.
02
Combining this information, remote PEs can identify
the MAC addresses found on each ESI, regardless of the PE that advertised
those MACs.
03
S-A (Single-Active) Multihoming mode: allows the use of backup paths,
improving network convergence in the event of link / node failures.
A-A (Active-Active) Multihoming mode: allows load balancing by flow
towards servers connected to remote PEs.
04
Convergence optimization on failures.
PEs learn using BGP the MACs on each ESI (Type-2 Route), and PEs connected
to each ESI (Type-1 Route)
01
When PE detect a failure on a link that’s connecting to an ESI, all learned
MACs learned using this path are considered as inactive.
02
To indicate this to remote PEs, the local PE simply has to remove the
“Ethernet A-D” route for failed ESI. Remote PEs will massively remove all
MAC/ESI routes reached through the originating PE.
03
Automate
EVPN.
05
Building blocks
EVI/VTEP
01
Route Targets (RT) ad Route Distinguisher (RD)
02
ESI
03
Ethernet tag
04
Encapsulation type (VXLAN, SR)
05
Built-in automation
- Auto-derived RD
- Auto-derived RT
- RFC 7432 and 8365
Benefits Drawbacks
- Simpler provisioning
- Certain logic
- In multivendor networks interop
shall be checked
- Not suitable for complex
deployments with route leaking or
asymmetric VRFs
Automation toolkit
Source of Truth
Documentation of all the
information (EVI/VTEP,
RD/RT, ESI, etc) – NetBox
Standard templates and
scripts – GitLab/GitHub
Interfaces
NETCONF/YANG,
RESTCONF/YANG,
GNMI/YANG
Tools
- Python
- Python w/ Nornir
- Ansible
- Go
- Code-less automation
Workflow managers
- Ansible Automation
Controller (AWX)
- StackStorm
- Apache Airflow
03
01
02 04
How does that work?
Executor
Orchestrator
Data Source 2
Data Source 1
Data Visualisation
Data Collector
CLI/SSH NETCONF/YANG RESTCONF/YANG
gNMI/YANG
SNMP
SYSLOG
GRPC
Thank you for
attention!
Pau Nadeu / Anton Karneliuk

More Related Content

What's hot

BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesFebrian ‎
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PROIDEA
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
APNIC
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
Matiullah Jamil
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
Febrian ‎
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
Rasoul Mesghali, CCIE RS
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
Indonesia Network Operators Group
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
Netwax Lab
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
Mustafa Golam
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2
Cumulus Networks
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
Wilfredzeng
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
Mason Mei
 
Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)
NetProtocol Xpert
 
Bgp
BgpBgp
VXLAN
VXLANVXLAN
VXLAN
SAliyev1
 
Mpls
MplsMpls
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
Reza Farahani
 
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Bruno Teixeira
 

What's hot (20)

BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
 
Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)Virtual Routing and Forwarding, (VRF-lite)
Virtual Routing and Forwarding, (VRF-lite)
 
Bgp
BgpBgp
Bgp
 
VXLAN
VXLANVXLAN
VXLAN
 
Mpls
MplsMpls
Mpls
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
 

Similar to Ethernet VPN (EVPN) EVerything Provider Needs

EVPN-Presentation.pptx
EVPN-Presentation.pptxEVPN-Presentation.pptx
EVPN-Presentation.pptx
VimalMallick
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
ThanhTrungBui5
 
Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)
Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)
Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)Gade Gowtham
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
Kristof De Brouwer
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering pptNitin Gehlot
 
ODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).ppt
marwan76
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333ronsito
 
OptiQNet842_presentation-ynlin-0.5
OptiQNet842_presentation-ynlin-0.5OptiQNet842_presentation-ynlin-0.5
OptiQNet842_presentation-ynlin-0.5Yi-Neng Lin
 
Day one-poster-vpns
Day one-poster-vpnsDay one-poster-vpns
Day one-poster-vpns
DervainJocelyn
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
ngusyirga
 
EVPN-Applications.pdf
EVPN-Applications.pdfEVPN-Applications.pdf
EVPN-Applications.pdf
SunnyLai23
 
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
demon667714
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
IJSRD
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
ssuserd0c720
 
Evolution Network
Evolution NetworkEvolution Network
Evolution Network
APNIC
 
5G Transport Network Technology.pptx
5G Transport Network Technology.pptx5G Transport Network Technology.pptx
5G Transport Network Technology.pptx
ssuseraab93e
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriFebrian ‎
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
CisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsecCisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsec
AreaNetworking.it
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PROIDEA
 

Similar to Ethernet VPN (EVPN) EVerything Provider Needs (20)

EVPN-Presentation.pptx
EVPN-Presentation.pptxEVPN-Presentation.pptx
EVPN-Presentation.pptx
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
 
Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)
Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)
Mondaygeneralhankinsvpn2 140605100226-phpapp01 (1)
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
ODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).ppt
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
 
OptiQNet842_presentation-ynlin-0.5
OptiQNet842_presentation-ynlin-0.5OptiQNet842_presentation-ynlin-0.5
OptiQNet842_presentation-ynlin-0.5
 
Day one-poster-vpns
Day one-poster-vpnsDay one-poster-vpns
Day one-poster-vpns
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
EVPN-Applications.pdf
EVPN-Applications.pdfEVPN-Applications.pdf
EVPN-Applications.pdf
 
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
 
Evolution Network
Evolution NetworkEvolution Network
Evolution Network
 
5G Transport Network Technology.pptx
5G Transport Network Technology.pptx5G Transport Network Technology.pptx
5G Transport Network Technology.pptx
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by Khatri
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
CisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsecCisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsec
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
 

More from CSUC - Consorci de Serveis Universitaris de Catalunya

Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Publicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de RecercaPublicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de Recerca
CSUC - Consorci de Serveis Universitaris de Catalunya
 
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Security Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademySecurity Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademy
CSUC - Consorci de Serveis Universitaris de Catalunya
 
The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
CSUC - Consorci de Serveis Universitaris de Catalunya
 
La gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolasLa gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolas
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Enginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fonsEnginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fons
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Transformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IATransformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IA
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de BarcelonaDifusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Fons de discos perforats de cartró
Fons de discos perforats de cartróFons de discos perforats de cartró
Fons de discos perforats de cartró
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Biblioteca Digital Gencat
Biblioteca Digital GencatBiblioteca Digital Gencat
El fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusióEl fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusió
CSUC - Consorci de Serveis Universitaris de Catalunya
 
El CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físicsEl CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físics
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Els serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUCEls serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUC
CSUC - Consorci de Serveis Universitaris de Catalunya
 

More from CSUC - Consorci de Serveis Universitaris de Catalunya (20)

Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
 
Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)
 
Publicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de RecercaPublicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de Recerca
 
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
 
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
 
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
 
Security Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademySecurity Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademy
 
The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
 
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
 
La gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolasLa gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolas
 
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
 
Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...
 
Enginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fonsEnginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fons
 
Transformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IATransformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IA
 
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de BarcelonaDifusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
 
Fons de discos perforats de cartró
Fons de discos perforats de cartróFons de discos perforats de cartró
Fons de discos perforats de cartró
 
Biblioteca Digital Gencat
Biblioteca Digital GencatBiblioteca Digital Gencat
Biblioteca Digital Gencat
 
El fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusióEl fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusió
 
El CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físicsEl CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físics
 
Els serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUCEls serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUC
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Ethernet VPN (EVPN) EVerything Provider Needs

  • 1. Ethernet VPN (EVPN) EVerything Provider Needs by Anton Karneliuk and Pau Nadeu
  • 2. Ethernet services are evolving, standards too. New services, more bandwidth. (even your grandma it’s also using TikTok) Ethernet Invented IEEE 802.3 IEEE 802.3u (FE) IEEE 802.1Q Ethernet Over MPLS IEEE 802.1ad (PB) IEEE 802.1ah (PBB) TRILL NVO3 EVPN Segment Routing Ethernet II Ethernet Switch- ing IEEE 802.3z (GE) IEEE 802.3ad (LAG) IEEE 802.3ae (10 GE) VPLS IEEE 802.3ba (40 GE, 100 GE) IEEE 802.1aq (SPB) 1982 1973 1983 1989 1995 1998 1998 2000 ~2001 2003 2005 2007 2008 2010 2011 2012 2013 2018+ SR Arch. SR-MPLS SRv6
  • 4. It never rains, but it pours. (why we need more technologies?) MPLS/VPLS and PBB are proven technologies, but: - Control plane approach isn't evolving. - Uses flood and learn to build Layer 2 FDB (Forwarding Database). 01 EVPN ease delivery on simple and complex services. - Takes profit from a lot of experiences of years of VPLS usage on production networks. - Abstract and Separate Control Plane and data plane: BGP carries MAC/IP information, choice your favorite data plane encapsulation. - Flexibility for service deliveries over Layer3 networks. 02 Fast enabler for engineers to meet needs what peoples want. - Use as overlay technology to simplify other scenarios and remove redundant protocols from the network. - Integrated Layer 2 and Layer 3 VPN Services (also with IRB). - Cloud and Virtualization services - Datacenter interconnect (DCI) - FTTx wholesale services (Bitstream) - VM mobility across WAN-connected datacenters. 03
  • 5. Sounds too cool, but… (give me more ) Unified Services - Have similarities with L3VPN in terms of control and stability. - Layer2 and Layer3 over same interface, 802.1Q and VPN services. Designed as Flexible - You can choose between IP or MPLS. - NVO’s encapsulations allows services over a simple IP network. Have the power - Consistency between control and data plane, BGP signaled on control plane, flood-and learn on data plane. - Proxy ARP/ND allows PEs to respond ARP/ND requests enabling you to have a clean network. - MAC/IP provisioning allows you have a methodical network control. Squeezing efficiency - Multihoming in all-active forwarding enable loadbalancing across all PEs. - Optimize BUM frames delivery. - More efficiency delivering hybrid services over logical or physical interfaces.
  • 7. VPLS PBB-EVPN EVPN PE Auto-discovery Access multi-homing (single active) All-active multi-homing (flow load balancing) Fast convergence on failure MAC mobility Control plane scaling of large number of MACs MAC-IP based policying (flexible topologies) Avoid flooding of unknown-unicast and ARP Fast convergence based on local rep. on failures Optimized VM (MAC-IP) mobility & inter-subnet routing Simplify configuration and O&M Per service Class-of-Service Yes No No CP
  • 9. EVPN use and evolution. New but mature - RFC 7209 (requirements for EVPN) was released on 2014. - RFC 7432 (BGP EVPN-MPLS) was released on 2015. - A lot of improvements and new features are introduced year to year. Used by big SP / CSPs. Telefonica, AT&T, Verizon, Apple, Google, Facebook… are actively using, supporting and contributing on EVPN evolution. Well-known vendors EVPN it’s supported by almost all well-known vendors: Nokia (ALU), Cisco, Juniper, Huawei, FRRouting, Arista… Holded by multiple groups. There are new Multiple work groups are working together to standardize new extensions and EVPN functions in “IETF Internet L2 Working group”. 03 01 02 04
  • 11. EVPN nomenclatures. EVI EVPN instance, extended along all participants PEs. MAC-VRF EVI routing table ESI Network segment connected to PEs that implement EVI. Ethernet Tag Identifies broadcast domain (i.e. BD or VLAN) S-A/ A-A modes Single-Active redundancy All-Active redundancy Single-Homed Device/Network (SHD/SHN) -> ESI = 0 Multi-Homed Device/Network (MHD/MHN)
  • 12. Control and data plane in EVPN - MAC/IP tuple routing it’s introduced using MP-BGP. - Flood-and-learn method are kept between PE-CE (in data plane). - MP-BGP use between PEs enable routing and MAC policy, TE criteria's, etc... - EVPN it’s using MP-BGP AFI 25 (VPLS) and SAFI 70 (EVPN), and includes Route Distinguisher (RD), Route Targets (RT), BGP communities, etc… BGP Routes Route Types: [1] Ethernet Auto-Discovery (AD) Route [2] MAC Advertisement Route [3] Inclusive Multicast Route [4] Ethernet Segment Route [5] IP Prefix Route BGP Route Attributes Extended Communities: - ESI-MPLS Label - ES-Import RT - MAC Mobility - Default Gateway
  • 13. Service Interfaces - There are three service interface ”flavours”: VLAN Based Interface, VLAN Bundle Interface, VLAN Aware Bundle Interface. - There is another, and obvious, service interface type: Port Based Interface. VLAN Based VLAN Bundle VLAN Aware Bundle VLAN per EVI 1:1 N:1 N:1 Tenant ID per EVI Single Multiple Multiple BD (Bridge-Domain) per EVI Single Single Multiple MAC/VLAN overlapping VLAN Translation (Mapping) Yes No
  • 14. EVPN flavours... - There are… three EVPN variants depending on data plane choice. - All of this are based on route learning between PE’s using BGP. - EVPN uses MPLS/IP, as RFC 7209 and RFC 7432 requires. - PBB E-VPN combines 802.1ah PBB with EVPN in order to achieve MAC scalability stacking C- MACs over B-MACs. - What EVPN-VXLAN uses in data plane? Obviously, VXLAN. Data Plane Control Plane EVPN MP-BGP draft-ietf-l2vpn-evpn Multiprotocol Label Switching (MPLS) draft-ietf-l2vpn-evpn Provider Backbone Bridges (PBB) draft-ietf-l2vpn-pbb-evpn Network Virtualization Overlay (NVO) draft-sd-l2vpn-evpn- overlay
  • 15. MAC Mobility & Duplication VM migration it’s frequent between CPDs. 01 This implies that a MAC address that at a given moment is advertised from a network PE/ESI (old and incorrect route) changes its location and passes and advertises itself from another PE / ESI of the EVI (new and correct route). 02 The method used to identify the valid path from among the existing in the network for each MAC is based on a counter associated with the “MAC mobility” community, which is added to each route type 2 "MAC Advertisement" 03 Route with highest sequence number it’s the valid route. 04
  • 16. A-A Multihoming and DF election PE’s connected to same ESI are auto-discovered using “Ethernet Segment” route. 01 Each PE have automatically enabled filters to import type 4 routes with community ES-Import. 02 One of PE connected to same ESI are choosed as “DF” (Designated Forwarder): it sends BUM traffic received from core to ESI-connected CEs, other PE’s filter the traffic to CE). 03 DF election in a site can be done in multiple ways: - A multiple DF can coexist to have load balancing. - One DF it’s choose for ESI or Ethernet Tag. 04
  • 17. A-A Multihoming and Split Horizon PE’s announces ESI MPLS Label associated to each ES with multihoming topology. 01 This ”Split Horizon Label” it’s sent associated with type 1 routes (Auto- Discovery) in a BGP Community. 02 Split-Horizon as Loop avoiding mechanism: don’t forward traffic on interface through which it is received. 03 When PE sends BUM traffic to core, it replicates the frame to all EVI participant PEs, and add ESI MPLS Label to identify ESI where it’s originated. 04 PEs connected to the same network segment identify the labels and filters BUM traffic towards CEs connected to the ESI. 05
  • 18. Unkown Unicast Management and ARP/ND The PEs participating in the EVI perform the functions of Proxy- ARP/ND based on the EVPN route tables of each instance. 01 “ARP/ND/DHCP snooping” optimizes and reduces traffic of the type "Unknown Unicast" between sites of an EVI. 02 Static provisioning of the MAC addresses of an ESI you can further reduce (or even eliminate) “unknown unicast” traffic. 03
  • 19. A-A Multihoming & Aliasing Type 2 "MAC Advertisement" routes include information about the ESI of the EVI where the MAC of each host resides. 01 Type 1 "Ethernet A-D" routes include information indicating the PEs connected to each ESI. 02 Combining this information, remote PEs can identify the MAC addresses found on each ESI, regardless of the PE that advertised those MACs. 03 S-A (Single-Active) Multihoming mode: allows the use of backup paths, improving network convergence in the event of link / node failures. A-A (Active-Active) Multihoming mode: allows load balancing by flow towards servers connected to remote PEs. 04
  • 20. Convergence optimization on failures. PEs learn using BGP the MACs on each ESI (Type-2 Route), and PEs connected to each ESI (Type-1 Route) 01 When PE detect a failure on a link that’s connecting to an ESI, all learned MACs learned using this path are considered as inactive. 02 To indicate this to remote PEs, the local PE simply has to remove the “Ethernet A-D” route for failed ESI. Remote PEs will massively remove all MAC/ESI routes reached through the originating PE. 03
  • 22. Building blocks EVI/VTEP 01 Route Targets (RT) ad Route Distinguisher (RD) 02 ESI 03 Ethernet tag 04 Encapsulation type (VXLAN, SR) 05
  • 23. Built-in automation - Auto-derived RD - Auto-derived RT - RFC 7432 and 8365 Benefits Drawbacks - Simpler provisioning - Certain logic - In multivendor networks interop shall be checked - Not suitable for complex deployments with route leaking or asymmetric VRFs
  • 24. Automation toolkit Source of Truth Documentation of all the information (EVI/VTEP, RD/RT, ESI, etc) – NetBox Standard templates and scripts – GitLab/GitHub Interfaces NETCONF/YANG, RESTCONF/YANG, GNMI/YANG Tools - Python - Python w/ Nornir - Ansible - Go - Code-less automation Workflow managers - Ansible Automation Controller (AWX) - StackStorm - Apache Airflow 03 01 02 04
  • 25. How does that work? Executor Orchestrator Data Source 2 Data Source 1 Data Visualisation Data Collector CLI/SSH NETCONF/YANG RESTCONF/YANG gNMI/YANG SNMP SYSLOG GRPC
  • 26. Thank you for attention! Pau Nadeu / Anton Karneliuk