I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-03.txt
internet-drafts@ietf.org Tue, 15 January 2013 09:36 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2595A21F89E1; Tue, 15 Jan 2013 01:36:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.512
X-Spam-Level:
X-Spam-Status: No, score=-102.512 tagged_above=-999 required=5 tests=[AWL=0.087, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 04ggt80HpHaS; Tue, 15 Jan 2013 01:36:29 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 973FA21F89E5; Tue, 15 Jan 2013 01:36:29 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-03.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 4.37
Message-ID: <20130115093629.8668.9736.idtracker@ietfa.amsl.com>
Date: Tue, 15 Jan 2013 01:36:29 -0800
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jan 2013 09:36:30 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Layer 2 Virtual Private Networks Working Group of the IETF.
Title : PIM Snooping over VPLS
Author(s) : Olivier Dornon
Jayant Kotalwar
Jeffrey Zhang
Venu Hemige
Ray Qiu
Filename : draft-ietf-l2vpn-vpls-pim-snooping-03.txt
Pages : 41
Date : 2013-01-15
Abstract:
In Virtual Private LAN Service (VPLS), as also in IEEE Bridged
Networks, the switches simply flood multicast traffic on all ports in
the LAN by default. IGMP Snooping is commonly deployed to ensure
multicast traffic is not forwarded on ports without IGMP receivers.
The procedures and recommendations for IGMP Snooping are defined in
[IGMP-SNOOP]. But when any protocol other than IGMP is used, the
common practice is to simply flood multicast traffic to all ports.
PIM-SM, PIM-SSM, PIM-BIDIR are widely deployed routing protocols.
PIM Snooping procedures are important to restrict multicast traffic
to only the routers interested in receiving such traffic.
While most of the PIM Snooping procedures defined here also apply to
IEEE Bridged Networks, VPLS demands certain special procedures due to
the split-horizon rules that require the Provider Edge (PE) devices
to co-operate. This document describes the procedures and
recommendations for PIM-Snooping in VPLS to facilitate replication to
only those ports behind which there are interested PIM routers and/or
IGMP hosts. This document also describes procedures for PIM Proxy.
PIM Proxy is required on PEs for VPLS Multicast to work correctly
when Join suppression is enabled in the VPLS. PIM Proxy also helps
scale VPLS Multicast much better than just PIM Snooping.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-vpls-pim-snooping
There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-vpls-pim-snooping-03
A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-l2vpn-vpls-pim-snooping-03
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
- I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-03… internet-drafts