Itu-T: Ethernet Virtual Private Rooted Multipoint Service
Itu-T: Ethernet Virtual Private Rooted Multipoint Service
Itu-T: Ethernet Virtual Private Rooted Multipoint Service
ITU-T G.8011.4/Y.1307.4
TELECOMMUNICATION (02/2010)
STANDARDIZATION SECTOR
OF ITU
Summary
Recommendation ITU-T G.8011.4/Y.1307.4 defines the service attributes and parameters for
carrying Ethernet characteristic information over shared bandwidth, rooted multipoint connections,
provided by SDH, PDH, ATM, MPLS, OTH, ETY or ETH server layer networks. This type of
service is referred to as Ethernet virtual private rooted multipoint service. This Recommendation is
based on the Ethernet service framework as defined in Recommendation ITU-T G.8011/Y.1307.
History
Study
Edition Recommendation Approval
Group
1.0 ITU-T G.8011.4/Y.1307.4 2010-02-06 15
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some
other obligatory language such as "must" and the negative equivalents are used to express requirements. The
use of such words does not suggest that compliance with the Recommendation is required of any party.
ITU 2010
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the
prior written permission of ITU.
1 Scope
This Recommendation defines the service attributes and parameters for carrying Ethernet
characteristic information over shared-bandwidth, rooted multipoint connections, provided by SDH,
ATM, MPLS, PDH, ETY, OTH or ETH server layer networks. This type of service is referred to as
Ethernet virtual private rooted multipoint service (EVPRM). The initial focus of this
Recommendation will be on uni-root and bi-root EVPRM. This Recommendation is based on the
Ethernet service framework as defined in [ITU-T G.8011].
2 References
The following ITU-T Recommendations and other references contain provisions which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the
currently valid ITU-T Recommendations is regularly published. The reference to a document within
this Recommendation does not give it, as a stand-alone document, the status of a Recommendation.
[ITU-T G.707] Recommendation ITU-T G.707/Y.1322 (2003), Network node interface for the
synchronous digital hierarchy (SDH).
[ITU-T G.709] Recommendation ITU-T G.709/Y.1331 (2001), Interfaces for the Optical
Transport Network (OTN).
[ITU-T G.7043] Recommendation ITU-T G.7043/Y.1343 (2004), Virtual concatenation of
plesiochronous digital hierarchy (PDH) signals.
[ITU-T G.805] Recommendation ITU-T G.805 (2000), Generic functional architecture of
transport networks.
[ITU-T G.809] Recommendation ITU-T G.809 (2003), Functional architecture of
connectionless layer networks.
[ITU-T G.8001] Recommendation ITU-T G.8001/Y.1354 (2008), Terms and definitions for
Ethernet frames over Transport.
[ITU-T G.8010] Recommendation ITU-T G.8010/Y.1306 (2004), Architecture of Ethernet layer
networks.
[ITU-T G.8011] Recommendation ITU-T G.8011/Y.1307 (2009), Ethernet service
characteristics.
[ITU-T G.8011.1] Recommendation ITU-T G.8011.1/Y.1307.1 (2009), Ethernet private line
service.
[ITU-T G.8011.2] Recommendation ITU-T G.8011.2/Y.1307.2 (2009), Ethernet virtual private
line service.
[ITU-T G.8012] Recommendation ITU-T G.8012/Y.1308 (2004), Ethernet UNI and
Ethernet NNI.
[ITU-T G.8021] Recommendation ITU-T G.8021/Y.1341 (2004), Characteristics of Ethernet
transport network equipment functional blocks.
5 Conventions
In this Recommendation, the term EC/EVC stands for "Ethernet Virtual Connection" in MEF and
"Ethernet Connection" in ITU-T, with the same meaning.
EVPRM service is equivalent to EVP-Tree service defined in MEF.
6.1 Description
A rooted-multipoint EVC is one for which each UNI is designated either as root or leaf. Ingress
service frames at a root UNI can be delivered to one or more of any of the leaf UNIs in the EVC.
Ingress service frames at a leaf UNI can only be delivered to one or more root UNIs in the EVC.
The EVPRM service achieves service multiplexing by using either a shared server layer or rooted
multipoint EVCs. In the latter case service multiplexing MAY occur at none, one or more than one
of the UNIs of the EVC.
The Ethernet virtual private rooted multipoint service with only one root (i.e., uni-root) is illustrated
in Figure 6-1.
UNI-C root UNI-N root UNI-N leaf UNI-C leaf
Leaf-1
..
Transport ..
operator network
Rooted Leaf-(n−1)
Leaf-n
G.8011.4-Y.1307.4(10)_F6-1
Rooted-1 Leaf-1
..
Transport ..
.. operator network
..
Leaf-(n−1)
Rooted-m Leaf-n
Ety-UNI
attrbutes Ethernet connection attributes
Rooted UNI-N to UNI-N Access
UNI-C to UNI-C
G.8011.4-Y.1307.4(10)_F6-2
Load balancing and redundancy scenarios for multi-root EVPRM service, which is important, is for
further study.
More sophisticated cases such as hierarchical or cascaded EVPRM service architectures are also for
further study.
____________________
1 Note that the choice of customer or provider VLAN tags depends on the agreement with the service
provider.
2 EVPRM can use asymmetric flow port grouping or VLANs. Only asymmetric flow port grouping is
shown.
Server Subnetwork
Server = ATM VC, MPLS LSP, SDH VC,
OTN ODU, PDH, ETY
ETH ETH
Flow port Flow port
ETH_FF ETH_FF
ETH
group group
ETH ETH ETH
ETH
ETH
ETYn/ ETH
ETYn/ ETH
ETYn/ ETH
ETYn/ ETH
ETYn
ETYn Server/ ETHm
Server/ ETHm ETYn
ETYn
Server
Server Ethernet
Ethernet Leaf
Leaf Physical
Physical
ETYn_CI interface
interface ETYn_CI
Ethernet ETYn_CI
ETYn_CI Ethernet
Physical Physical
interface interface
Table 7-1 – EVC service attributes and parameters for the EVPRM service
EVC service attribute Service attribute parameters and values
EVC type MUST be rooted-multipoint.
EVC ID An arbitrary string, unique across the MEN, for the EVC
supporting the service instance.
UNI list MUST list the UNIs associated with the EVC. The UNI type for
at least one UNI MUST be Root. The UNI type of Leaf MAY be
used for any number of UNIs, it may be zero when leaf UNIs are
being added or removed.
Maximum number of UNIs MUST be ≥ 2 (An EVPRM service may have no leaves, for
example, during times when leaf UNIs are being added or
removed).
EVC maximum transmission unit size Integer, MUST be ≤ 2000 and MUST be ≤ minimum of UNI
MTU sizes.
CE-VLAN ID preservation MUST be either Yes or No.
CE-VLAN CoS preservation MUST be either Yes or No.
Unicast service frame delivery Deliver Unconditionally or Deliver Conditionally. If Delivered
Conditionally, MUST specify the delivery criteria.
7.2 EVC ID
An arbitrary string, unique across the domain, for EVCs supporting the service instance.
7.9 Performance
This parameter indicates the overall performance such as frame delay performance, frame delay
variation performance, frame loss ratio performance and availability performance; and associated
class of service identifier(s) of the Ethernet virtual connection.
It MAY specify one or more CoS. For each CoS, MUST specify a CoS identifier and one or more
sets of ordered UNI pairs. It MAY specify a frame delay value, a frame delay variation value, a
frame loss value, and an availability value for each set of ordered UNI pairs.
Frame delay and frame delay variation monitoring within these rooted-multipoint Ethernet
connections can be supported via on-demand Ethernet DMM/DMR OAM. Such DMM/DMR OAM
is run between any two service provider ETH MEP functions.
Frame loss monitoring via the service provider ETH MEP functions is not possible with the
Ethernet OAM frames currently specified in [ITU-T Y.1731]. In case frame loss is monitored
between any two service provider ETH MEP functions, such measurement will count frames that
are lost due to transmission errors (bit errors and congestion) on the ETH links and due to traffic
conditioning at the ingress of the ETH link connections. The service provider and network operators
are not accountable for the latter frame loss, which is due to customer traffic exceeding service level
agreement for the link. Frames lost due to transmission errors or congestion on the ETH links can
be detected when additional ETH MEP functions at the endpoints of the p2p ETH link connections
are activated. Those ETH MEP functions are not illustrated in Figure 7-1.
7.14 Survivability
The transport network (service layer) can provide survivability for the EVPRM. The survivability
alternatives for the ETH link are, for example:
– no protection;
– protection by means of SDH or OTH or ATM or MPLS protection schemes;
– restoration by means of SDH or OTH or ATM or MPLS restoration schemes.
The applicability of survivability by means of linear protection switching and ring protection based
on APS can also be an option.
The applicability of survivability by means of LAG/STP/RSTP is for further study.
When the failure occurs, the entire tree can be switched to the backup root, or only the broken link
between the leaf and root is switched to the backup link. An illustration of this is given in
Appendix II.
Table 8-1 – UNI attributes and parameters for the EVPRM service
Layer UNI service attribute Service attribute parameters and values
UNI identifier Arbitrary text string to identify the UNI.
MAC layer IEEE 802.3 – 2008.
UNI maximum transmission unit 2000 ≥ Integer ≥ 1522.
size
Service multiplexing SHOULD be supported at one or more UNIs.
EVPRM type 1 and 3: SHOULD be supported.
EVPRM type 2: MUST be No.
UNI EVC ID A string formed by the concatenation of the UNI ID and the
EVC ID.
CE-VLAN ID/EVC map MUST specify mapping table of CE-VLAN IDs to the
EVC ID.
Bundling Yes or No. If Yes, then CE-VLAN ID preservation MUST
be Yes.
All-to-one bundling MUST be No.
CE-VLAN ID for untagged and MUST specify CE-VLAN ID for untagged and priority
priority tagged service frames tagged service frames in the range of 1-4094.
Ingress bandwidth profile per OPTIONAL. If supported, MUST specify <CIR, CBS,
ingress UNI EIR, EBS, CM, CF>. MUST NOT be allowed if any other
ingress bandwidth profile is applied at this UNI.
Ingress bandwidth profile per OPTIONAL. If supported, MUST specify <CIR, CBS,
class of service identifier EIR, EBS, CM, CF>. MUST NOT be allowed if any other
ingress bandwidth profile is applied at this UNI.
Egress bandwidth profile per OPTIONAL. If supported, MUST specify <CIR, CBS,
egress UNI EIR, EBS, CM, CF>. MUST NOT be allowed if any other
egress bandwidth profile is applied at this UNI for this
EVC.
Egress bandwidth profile per OPTIONAL. If supported, MUST specify <CIR, CBS,
class of service identifier EIR, EBS, CM, CF>. MUST NOT be allowed if any other
egress bandwidth profile is applied at this UNI for this
EVC.
Layer 2 control protocols A list of Layer 2 control protocols with each being labelled
processing with one of Discard, Peer, Pass to EVC, Peer and Pass to
EVC.
MUST specify in accordance with clause 8.1.11.
8.1.1 UNI ID
The UNI ID is an arbitrary string administered by the service provider, which is used to identify the
UNI. It is intended for management and control purposes.
8.1.2 MAC layer
It supports all 802.3 MAC frames.
8.1.3 Maximum MTU size
The maximum MAC frame size supported at the UNI is at least 1522 bytes, as defined in clause 7.4
of [MEF 10.1], but not larger than 2000 (as specified in [IEEE 802.3]).
8.1.4 Service multiplexing
This attribute indicates whether the access to the Ethernet transport service is multiplexed
(i.e., contains multiple service instances) or not. EVPRM type 2 does not use multiplexed access.
However, EVPRM types 1 and 3 support multiplexed access.
8.1.5 UNI EVC ID
The UNI EVC ID is an arbitrary string administered by the service provider, which is used to
identify an EVC at the UNI. It is intended for management and control purposes.
For CE-VLAN ID for untagged and priority tagged service frames, it MUST specify CE-VLAN ID
for untagged and priority tagged service frames in the range of 1-4094.
8.1.6 CE-VLAN ID/EVC mapping
At the UNI there is a mapping of each customer VLAN ID to at most one EVC. For EVPRM,
VLAN ID mapping is supported, it MUST specify a mapping table of CE-VLAN IDs to the
EVC ID.
8.1.7 Bundling
When a UNI has the bundling attribute, it is configurable so that more than one VLAN ID can map
to an EVC at the UNI. For EVPRM type 2, bundling is all-to-one and bundling is no. For EVPRM
types 1 and 3, bundling is not supported.
8.1.8 All-to-one bundling
For EVPRM, all-to-one bundling is not supported.
8.1.9 Maximum number of EVCs
The maximum number of EVCs supported at the UNI is at least 1, per [MEF 6.1].
Table 8-2 – L2CP processing requirements for the EVPRM service at UNI
L2CP L2CP
MAC DA Requirement Applicability Requirement
(Ingress) (Egress)
STP/RSTP/MSTP 01-80-C2-00-00-00 MUST Peer All UNIs in Generate or none
(IEEE 802.1d/802.1w/802.1s) or Discard the EVC
PAUSE 01-80-C2-00-00-01 MUST All UNIs in None
[IEEE 802.3] Discard the EVC
LACP/LAMP 01-80-C2-00-00-02 MUST Peer Per UNI Generate or none
[IEEE 802.3ad] or Discard
Link OAM 01-80-C2-00-00-02 MUST Peer Per UNI Generate or none
[IEEE 802.3ah] or Discard
Port Authentication 01-80-C2-00-00-03 MUST Peer Per UNI Generate or none
[IEEE 802.1X] or Discard
E-LMI 01-80-C2-00-00-07 MUST Peer Per UNI Generate or none
[MEF 16] or Discard
LLDP 01-80-C2-00-00-0E MUST All UNIs in None
[IEEE 802.1AB] Discard the EVC
GARP/GMRP Block 01-80-C2-00-00-20 MUST Peer, Per UNI Generate or none
[IEEE 802.1D/802.1p] through Discard or
01-80-C2-00-00-2F Tunnel
Table 8-4 – CFM processing requirements for the EVPRM service at UNI
L2CP L2CP
MEL
MAC DA Requirement Applicability Requirement
level
(Ingress) (Egress)
Service OAM, UNI ME, CC 01-80-C2- MUST Peer Specify All UNIs in Generate or
[IEEE 802.1ag]/[ITU-T Y.1731] 00-00-3X or Discard or the EVC none
or Unicast Tunnel
Service OAM, UNI ME, LT 01-80-C2- MUST Peer Specify All UNIs in Generate or
[IEEE 802.1ag]/[ITU-T Y.1731] 00-00-3Y or Discard or the EVC none
Tunnel
Service OAM, UNI ME, LB Unicast MUST Peer Specify All UNIs in Generate or
[IEEE 802.1ag]/[ITU-T Y.1731] or Discard or the EVC none
Tunnel
Service OAM – Test ME Unicast MUST Peer Specify All UNIs in Generate or
[IEEE 802.1ag]/[ITU-T Y.1731] or Discard or the EVC none
Tunnel
Service OAM – Subscriber MD Unicast, MUST Peer Specify All UNIs in Generate or
[IEEE802.1ag]/[ITU-T Y.1731] multicast or Discard or the EVC none
Tunnel
Single root is the simplest model. It is composed of one root and multiple leaves. The left part of
Figure I.1 describes the abstract model of the single-root EVPRM, while the right part describes the
concrete model.
This example is easy for deployment, but if the root fails, the whole EVPRM service will collapse.
U3 (Leaf)
RMP 123
... (EVC)
Rooted-multipoint
EVC Leaf UNI
U3 (Leaf)
RMP 123
... (EVC)
Rooted-multipoint
EVC Leaf UNI
As Figure I.3 shows, the load-balance root example has multiple roots and multiple leaves. The
multiple roots always work together for the same service, and the service traffic is distributed
among the roots.
This example provides load balance ability for the root node. It is suitable for the case when all of
the server access nodes are in heavy load and thus none can provide enough capacity to transport all
of the service traffic. Actually, this model can also be viewed as the combination of multiple
EVPRMs.
U2 (Root)
RMP_123
U3 (Branch) (EVC)
... U4 (Branch)
Rooted-multipoint
Carrier EVC
Ethernet U8 (Leaf)
U5 (Leaf) network
U6 (Leaf)
U7 (Leaf) G.8011.4-Y.1307.4(10)_FI.4
If for example, a defect occurs in the working tree and the traffic to leaf node C is affected, as
shown in Figure II.2, the defect will be detected at node C. All the leaves can be switched to the
protection tree by using a 2-phase APS protocol. The protocol is as follows:
1) Node C detects the defect and switches the selector to the protection tree after validating the
priority.
2) The APS protocol from node C to the root requests a protection switch.
3) The root node sends APS protocol to all leaves for a protection switch.
4) After all other leaves validate the priority of the protection request, the selectors of these
leaves are switched to the protection tree.
In the case in which only the affected leaf (e.g., only node C) is switched to the protection tree after
protection switching, the other leaves will still work on the working tree. The APS protocol is not
necessary. When node C detects the defect, it switches the selector to the protection tree directly
after validating the priority. The scenario is shown in Figure II.3.
If for example, a defect occurs on the working tree and the traffic to node C is affected, as shown in
Figure II.5, the defect will be detected at node C. All the leaves can be switched to the protection
tree by using a 2-phase APS protocol. The protocol is as follows:
1) Node C detects the defect and switches the selector to the protection tree after validating the
priority.
2) The APS protocol from node C to root requests a protection switch.
3) After the root node validates the priority of the protection request, it operates the bridge to
the protection tree (NOTE – The working traffic will be bridged to both the working tree
and the protection tree after the root operates the broadcast bridge).
4) The root sends APS protocol to all leaves for a protection switch.
5) After all other leaves validate the priority of the protection request, the selectors of these
leaves are switched to the protection tree.
In the case in which only the affected leaf (e.g., only node C) is switched to the protection tree after
protection switching, the other leaves will still work on the working tree. A 1-phase APS protocol is
used. The process of the APS protocol is similar to the one mentioned above, but steps 4 and 5 are
not necessary. After the protection switching, the affected leaf receives the working traffic on the
protection tree, and the other leaves receive the traffic on the working tree. The scenario is shown in
Figure II.6.
If for example, a defect occurs on the working tree and the traffic to node C is affected, as shown in
Figure II.8, the defect will be detected at node C. When the root is switched to the protection tree
after protection switching, all leaves will receive the working traffic on the protection tree.
A 1-phase APS protocol is used. The protocol is follows:
1) Node C detects the defect, then the APS protocol from node C to root requests a protection
switch.
2) After the root node validates the priority of the protection request, it operates the selective
bridge to the protection tree.
III.1 Introduction
Table III.1 elaborates on the meaning of the EVPRM types and indicates an example application for
which the specific EVPRM type is suitable.
____________________
3 In this use case example the multiplexed access is done at the sink termination rather than at the source
termination.
EVC 1
Dedicated
access
EVC 2
TNE TNE
BRAS/SR Medium
server
G.8011.4-Y.1307.4(10)_FIII-1
____________________
4 ki indicates the number of RAN Node Bs belonging to the i-th group. This scenario can be extended to the
case of a single group including all the RAN Node Bs connected to the RAN RNC.
5 Inside each group, each RAN Node B is uniquely identified by its own MAC address.
RNC 1
Node B1
EVC 1
Node B2 Dedicated
Shared transport
access
EVC 2
Node B3
TNE
TNE
RNC 2
Node B4
____________________
6 Local site CEs are uniquely identified by their own MAC address.
Subscriber Multiplexed
site 2 access
TNE
Subscriber
site 3
Centralized
video networking
IP Video Business G.8011.4-Y.1307.4(10)_FIII.3
____________________
7 Egress TNE is not shown.
[b-IEEE 802.1ad] IEEE 802.1ad-2005, Standard for Local and Metropolitan Area Networks –
Virtual Bridged Local Area Networks, Amendment 4: Provider Bridges.
[b-IETF RFC 2474] IETF RFC 2474 (1998), Definition of the Differentiated Services Field
(DS Field) in the IPv4 and IPv6 Headers.
Series E Overall network operation, telephone service, service operation and human factors
Series J Cable networks and transmission of television, sound programme and other multimedia signals
Series L Construction, installation and protection of cables and other elements of outside plant
Printed in Switzerland
Geneva, 2010