ImageVerifierCode 换一换
格式:PDF , 页数:134 ,大小:806.87KB ,
资源ID:731159      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-731159.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI ES 203 385-2014 CABLE DOCSIS Layer 2 Virtual Private Networking (V1 1 1)《电缆 DOCSIS 2层虚拟专用网络 (V1 1 1)》.pdf)为本站会员(dealItalian200)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI ES 203 385-2014 CABLE DOCSIS Layer 2 Virtual Private Networking (V1 1 1)《电缆 DOCSIS 2层虚拟专用网络 (V1 1 1)》.pdf

1、 ETSI ES 203 385 V1.1.1 (2014-11) CABLE; DOCSISLayer 2 Virtual Private Networking ETSI STANDARD ETSI ETSI ES 203 385 V1.1.1 (2014-11) 2Reference DES/CABLE-00008 Keywords access, broadband, cable, data, IP, IPcable, L2VPN, modem ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.

2、: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present document may be made available in electroni

3、c versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing docume

4、nt is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents i

5、s available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in any form or by any means, e

6、lectronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European

7、Telecommunications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.

8、GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI ES 203 385 V1.1.1 (2014-11) 3Contents Intellectual Property Rights 7g3Foreword . 7g3Modal verbs terminology 7g31 Scope 8g32 References 8g32.1 Normative references . 8g32.2 Informative references 9g33 Definiti

9、ons and abbreviations . 10g33.1 Definitions 10g33.2 Abbreviations . 12g34 Requirements and conformance . 15g34.1 Requirements 15g34.2 Conformance 16g35 Theory of operation 16g35.1 L2VPN Features . 16g35.1.1 Transparent LAN Service . 16g35.1.2 Multiple ISP L2VPNs . 18g35.1.3 Management L2VPNs. 18g35.

10、1.4 Other L2VPN-enabled Features 19g35.1.5 High Availability 19g35.2 CMTS Layer 2 Forwarding Architecture . 19g35.2.1 L2VPN and Non-L2VPN Forwarding 19g35.2.2 Point-to-Point and Multipoint L2VPN Forwarding Modes 20g36 L2VPN Operation (Normative) 22g36.1 CMTS Bridging Model Requirements . 22g36.2 Con

11、figuring L2VPN Forwarding . 23g36.2.1 VPNID Subtype 26g36.2.1.1 Border Gateway Protocol (BGP) VPNID Subtype . 26g36.2.2 Downstream Classifier L2VPN Encoding 26g36.2.3 L2VPN SA-Descriptor Subtype 27g36.2.4 Vendor-Specific L2VPN Encoding 27g36.2.5 Configuration Error Requirements . 27g36.2.6 Network S

12、ystem Interface (NSI) Encapsulation . 28g36.2.6.1 NSI Encapsulation Subtype . 28g36.2.6.2 IEEE 802.1Q L2VPN Forwarding 28g36.2.6.3 IEEE 802.1Q L2VPN Forwarding 28g36.2.6.3.1 Point-to-Point CMTS Forwarding with Point-to-Point 802.1Q Forwarding . 29g36.2.6.3.2 Point-to-Point CMTS Forwarding with L2VPN

13、 Bridging Network Element . 29g36.2.6.4 IEEE 802.1Q L2VPN Forwarding 29g36.2.7 Virtual Private LAN Service (VPLS) and Virtual Private Wire Service 29g36.2.7.1 PSN Tunnel - Control Plane and Data Plane Encapsulation . 30g36.2.7.2 PW - Control Plane and Data Plane Encapsulations . 30g36.2.7.2.1 PW Sig

14、naling without Auto-Discovery . 31g36.2.7.2.2 PW Signaling with Auto-Discovery 32g36.3 CMTS Upstream L2VPN Forwarding 33g36.4 CMTS Downstream L2VPN Forwarding . 35g36.4.1 Multipoint Downstream Forwarding 36g36.4.2 DOCSIS3.0 L2VPN Downstream Multicast Forwarding 36g36.5 L2VPN Isolation and Privacy .

15、36g36.5.1 Protecting L2VPN Traffic 37g36.5.2 Preventing Leaking of non-L2VPN Traffic 37g36.5.2.1 Downstream Unencrypted Traffic (DUT) Filtering 38g3ETSI ETSI ES 203 385 V1.1.1 (2014-11) 46.5.2.2 Downstream IP Multicast Encryption (DIME) . 38g36.5.2.3 Mixing L2VPN and non-L2VPN forwarding on the same

16、 CM 38g36.6 CM and eSAFE Exclusion . 38g36.6.1 CM and eSAFE Host Forwarding Model . 39g36.6.2 Cable Modem MAC Bridge Interface Masks . 39g36.6.3 Embedded Host Exclusion 40g36.6.4 CMTS embedded host MAC Address Learning . 40g36.6.4.1 Enable eSAFE DHCP Snooping Subtype . 40g36.6.5 Interface-based Clas

17、sification . 41g36.7 L2VPN Quality of Service . 41g36.7.1 DOCSISQoS 41g36.7.1.1 Service Flow Separation . 41g36.7.1.2 Classification and Scheduling . 42g36.7.2 Backbone Network QoS . 42g36.7.2.1 User Priority 42g36.7.2.1.1 IEEE 802.1d User Priority . 42g36.7.2.1.2 MPLS Traffic Class . 42g36.7.2.1.3

18、IP Precedence 42g36.7.2.2 Downstream User Priority Range Classification . 43g36.7.2.3 Downstream User Priority . 43g36.7.2.4 Upstream User Priority . 43g36.8 Stacked 802.1Q Tags or Tag-in-Tag operation 44g36.9 Spanning Tree and Loop Detection 44g36.10 High Availability 45g36.10.1 802 Encapsulation -

19、 Active/Standby Layer 2 Trunk Ports 45g36.10.2 802 Encapsulation - Link Aggregation . 45g36.10.3 MPLS Encapsulation High Availability . 45g36.11 MPLS Encapsulation - PW Redundancy 45g37 Cable Modem Requirements 46g38 Service Operations, Administration, and Maintenance (OAM) . 47g38.1 Introduction 47

20、g38.2 Service OAM Configuration 47g38.2.1 CM 48g38.2.2 CMTS . 48g38.3 Fault Management 48g38.3.1 Continuity Check Messages (CCM) . 48g38.3.2 Loopback 49g38.3.3 Linktrace . 49g38.4 Performance Management 49g39 Layer 2 Control Protocol Handling 49g3Annex A (normative): CMTS DOCS-L2VPN-MIB Requirements

21、 . 51g3A.1 DOCS-L2VPN-MIB Conformance 51g3A.2 DOCS-L2VPN-MIB Definitions 54g3Annex B (normative): Parameter Encodings 92g3B.1 Capabilities . 92g3B.1.1 L2VPN Capability 92g3B.1.2 Embedded Service/Application Functional Entity (eSAFE) Host Capability 92g3B.1.3 Downstream Unencrypted Traffic (DUT) Filt

22、ering . 92g3B.2 Downstream Unencrypted Traffic (DUT) Filtering Encoding . 93g3B.2.1 Downstream Unencrypted Traffic (DUT) Control . 93g3B.2.2 Downstream Unencrypted Traffic (DUT) CMIM 93g3B.3 L2VPN Encoding . 94g3B.3.1 VPN Identifier 94g3B.3.2 NSI Encapsulation Subtype 95g3B.3.2.1 IEEE 802.1Q S-TPID

23、. 97g3ETSI ETSI ES 203 385 V1.1.1 (2014-11) 5B.3.2.2 IEEE 802.1Q Encapsulation . 97g3B.3.2.2.1 IEEE 802.1Q I-TCI . 97g3B.3.2.2.2 MAC Address of the Destination Backbone Edge Bridge (B-DA) . 98g3B.3.2.2.3 IEEE 802.1Q B-TCI 98g3B.3.2.2.4 IEEE 802.1Q I-TPID . 98g3B.3.2.2.5 IEEE 802.1Q I-PCP 98g3B.3.2.2

24、.6 IEEE 802.1Q I-DEI . 98g3B.3.2.2.7 IEEE 802.1Q I-UCA . 99g3B.3.2.2.8 IEEE 802.1Q I-SID . 99g3B.3.2.2.9 IEEE 802.1Q B-TPID . 99g3B.3.2.2.10 IEEE 802.1Q B-PCP . 99g3B.3.2.2.11 IEEE 802.1Q B-DEI 100g3B.3.2.2.12 IEEE 802.1Q B-VID . 100g3B.3.3 eSAFE DHCP Snooping 100g3B.3.4 CM Interface Mask (CMIM) Sub

25、type 101g3B.3.5 Attachment Group ID . 101g3B.3.6 Source Attachment Individual ID . 102g3B.3.7 Target Attachment Individual ID . 102g3B.3.8 Upstream User Priority . 103g3B.3.9 Downstream User Priority Range . 103g3B.3.10 L2VPN SA-Descriptor Subtype . 103g3B.3.11 Vendor Specific L2VPN Subtype 104g3B.3

26、.12 Pseudowire ID (deprecated) . 104g3B.3.13 Pseudowire Type 104g3B.3.14 L2VPN Mode . 104g3B.3.15 Tag Protocol Identifier (TPID) Translation 104g3B.3.15.1 Upstream TPID Translation 105g3B.3.15.2 Downstream TPID Translation . 105g3B.3.15.3 Upstream S-TPID Translation 105g3B.3.15.4 Downstream S-TPID T

27、ranslation . 105g3B.3.15.5 Upstream B-TPID Translation 106g3B.3.15.6 Downstream B-TPID Translation . 106g3B.3.15.7 Upstream I-TPID Translation . 106g3B.3.15.8 Downstream I-TPID Translation 106g3B.3.16 L2CP Processing 106g3B.3.16.1 L2CP Tunnel Mode 107g3B.3.16.2 L2CP D-MAC Address . 107g3B.3.16.3 L2C

28、P Overwriting D-MAC Address 107g3B.3.17 DAC Disable/Enable Configuration . 107g3B.3.18 Pseudowire Class 107g3B.3.19 Service Delimiter 108g3B.3.19.1 C-VID . 108g3B.3.19.2 S-VID 108g3B.3.19.3 I-SID . 109g3B.3.19.4 B-VID . 109g3B.3.20 Virtual Switch Instance Encoding 109g3B.3.20.1 VPLS Class . 109g3B.3

29、.20.2 E-Tree Role . 109g3B.3.20.3 E-Tree Root VID 110g3B.3.20.4 E-Tree Leaf VID . 110g3B.3.21 BGP Attribute sub TLV . 110g3B.3.21.1 BGP VPNID . 111g3B.3.21.2 Route Distinguisher 111g3B.3.21.3 Route Target (Import) . 111g3B.3.21.4 Route Target (Export) . 111g3B.3.21.5 CE-ID/VE-ID 112g3B.3.22 VPN-SG A

30、ttribute sub TLV . 112g3B.3.23 Pseudowire Signaling . 112g3B.3.24 L2VPN SOAM Subtype . 112g3B.3.24.1 MEP Configuration . 112g3B.3.24.1.1 MD Level 113g3B.3.24.1.2 MD Name 113g3ETSI ETSI ES 203 385 V1.1.1 (2014-11) 6B.3.24.1.3 MA Name 113g3B.3.24.1.4 MEP ID . 113g3B.3.24.2 Remote MEP Configuration . 1

31、13g3B.3.24.2.1 MD Level 114g3B.3.24.2.2 MD Name 114g3B.3.24.2.3 MA Name 114g3B.3.24.2.4 MEP ID . 114g3B.3.24.3 Fault Management Configuration . 114g3B.3.24.3.1 Continuity Check Messages 115g3B.3.24.3.2 Enable Loopback Reply Messages 115g3B.3.24.3.3 Enable Linktrace Messages . 115g3B.3.24.4 Performan

32、ce Management Configuration . 115g3B.3.24.4.1 Frame Delay Measurement . 115g3B.3.24.4.1.1 Frame Delay Measurement Enable 116g3B.3.24.4.1.2 Frame Delay Measurement One-way-Two-way 116g3B.3.24.4.1.3 Frame Delay Measurement Transmission Periodicity . 116g3B.4.24.4.2 Frame Loss Measurement . 116g3B.3.24

33、.4.2.1 Frame Loss Measurement Enable 116g3B.3.24.4.2.2 Frame Loss Measurement Transmission Periodicity . 117g3B.3.25 Network Timing Profile Reference 117g3B.3.26 L2VPN DSID . 117g3B.4 Confirmation Codes . 117g3B.5 L2VPN Error Encoding 118g3B.5.1 L2VPN Errored Parameter . 118g3B.5.2 L2VPN Error Code

34、. 118g3B.5.3 L2VPN Error Message . 119g3B.6 CM Interface Mask Classification Criteria. 119g3B.7 L2VPN MAC Aging Encoding 120g3B.7.1 L2VPN MAC Aging Mode 120g3Annex C (informative): Example L2VPN Encodings 121g3C.1 Point-to-Point Example 121g3C.2 Multipoint Example 123g3C.3 Upstream L2VPN Classifier

35、Example 126g3Annex D (informative): IEEE 802.1Q Encapsulation . 128g3Annex E (informative): Embedded VLAN CM Bridging Model . 129g3E.1 IEEE 802.1Q and Embedded VLAN Model 130g3E.2 Embedded Bridge MAC Domain Service Primitives . 131g3Annex F (informative): L2VPN Non-compliant CM Restrictions . 133g3F

36、.1 Leaking through non-compliant CMs 133g3History 134g3ETSI ETSI ES 203 385 V1.1.1 (2014-11) 7Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available

37、 for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (h

38、ttp:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, esse

39、ntial to the present document. Foreword This ETSI Standard (ES) has been produced by ETSI Technical Committee Integrated broadband cable telecommunication networks (CABLE). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “may not“, “need“, “need n

40、ot“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI ES 203 385 V1.1.1 (2014-1

41、1) 81 Scope The present document describes requirements on both CMTSs and CMs in order to implement a DOCSISLayer-2 Virtual Private Network (DOCSISL2VPN) feature. The L2VPN feature allows cable operators to offer a Layer 2 Transparent LAN Service (TLS) to commercial enterprises. In order to speed ti

42、me to market, CM-TR-L2VPN-DG-V02 i.8 offers guidelines to CMTS manufacturers as to how to phase the implementation of requirements defined in the present document. Phase designations are only applicable to CMTS products. Cable modems are expected to support all required L2VPN features in Phase 1. Th

43、e present document corresponds to the CableLabs L2VPN specification CM-SP-L2VPN-I12 i.19. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific

44、 references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at

45、 the time of publication, ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. 1 IEEE 802.1AX-2008: “IEEE Standard for Local and metropolitan area networks-Link Aggregation“. 2 IEEE 802.

46、1Q (August 2011): “IEEE Standard for Local and metropolitan area networks - Media Access, Control (MAC) Bridges and Virtual Local Area Networks“. NOTE: Available at http:/standards.ieee.org/findstds/standard/802.1Q-2011.html. 3 ETSI ES 201 488-3: “Access and Terminals (AT); Data Over Cable Systems;

47、Part 3: Baseline Privacy Plus Interface Specification“. 4 IETF Internet draft-ietf-mpls-ldp-ipv6-09 (July 15, 2013): “Updates to LDP for IPv6“. NOTE: Available at http:/tools.ietf.org/html/draft-ietf-mpls-ldp-ipv6-09. 5 MEF Technical Specification 30.1 (April 2013): “Service OAM Fault Management Imp

48、lementation Agreement: Phase 2“. 6 MEF Technical Specification 35 (April 2012): “Service OAM Performance Monitoring Implementation Agreement“. 7 CM-SP-MULPIv3.0-I22-130808 (August 8, 2013): “DOCSIS 3.0 MAC and Upper Layer Protocols Interface Specification“, Cable Television Laboratories, Inc. 8 CM-S

49、P-OSSIv3.0-I21-130404 (April 4, 2013): “DOCSIS 3.0 Operations Support System Interface Specification“, Cable Television Laboratories, Inc. ETSI ETSI ES 203 385 V1.1.1 (2014-11) 99 Internet Assigned Numbers Authority (IANA) (June 27, 2014): “MPLS Pseudowire Types Registry“. NOTE: Available at http:/www.iana.org/assignments/pwe3-parameters/pwe3-parameters.xhtml#pwe3-parameters-2. 10 IETF RFC 2544: “Benchmarking Methodology for Network Interconnect Devices“, March 1999. 11 IETF RFC 2918: “Route Refresh Capability for BGP-4“, September 2000. 12

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1