L2VPN WG Raymond Key (editor)InternetDraft LucyEngineering Task Force (IETF) R. Key, Ed. Request for Comments: 7387 Category: Informational L. Yong, Ed. ISSN: 2070-1721 Huawei(editor) Intended status: Informational SimonS. DelordExpires: February 2015TelstraFrederic Jounay,F. Jounay Orange CHLizhongL. JinAugust 25,October 2014 A Framework for Ethernet Tree (E-Tree) Service over a Multiprotocol Label Switching (MPLS) Networkdraft-ietf-l2vpn-etree-frwk-10.txtAbstract This document describes an Ethernet-Tree (E-Tree) solution framework for supporting the Metro Ethernet Forum (MEF) E-Tree service over a Multiprotocol Label Switching (MPLS) network. The objective is to provide a simple and effective approach to emulate E-Tree services in addition to Ethernet LAN (E-LAN) services on an existing MPLS network. Status ofthisThis Memo ThisInternet-Draftdocument issubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsnot an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force(IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum(IETF). It represents the consensus ofsix monthsthe IETF community. It has received public review andmay be updated, replaced, or obsoletedhas been approved for publication byotherthe Internet Engineering Steering Group (IESG). Not all documentsatapproved by the IESG are a candidate for anytime. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The listlevel of Internet Standard; see Section 2 of RFC 5741. Information about the currentInternet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The liststatus ofInternet-Draft Shadow Directories canthis document, any errata, and how to provide feedback on it may beaccessedobtained athttp://www.ietf.org/shadow.html This Internet-Draft will expire on February 25, 2015.http://www.rfc-editor.org/info/rfc7387. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1.Introduction...................................................3Introduction ....................................................3 1.1.Terminology...............................................3Terminology ................................................3 2.Overview.......................................................4Overview ........................................................4 2.1. Ethernet BridgeNetwork...................................4Network ....................................4 2.2. MEF Multipoint Ethernet Services: E-LAN andE-Tree........4E-Tree .........4 2.3. IETFL2VPN................................................5L2VPN .................................................5 2.3.1. Virtual Private LAN Service(VPLS)...................5(VPLS) ..................5 2.3.2. Ethernet VPN(EVPN)..................................5(EVPN) .................................5 2.3.3. Virtual Private Multicast Service(VPMS).............6(VPMS) ............6 3. E-Tree Architecture ReferenceModel............................6Model .............................6 4. E-Tree UseCases...............................................8Cases ................................................8 5. L2VPN Gaps for Emulating MEF E-TreeService....................9Service .....................9 5.1. No Differentiation on ACRole.............................9Role ..............................9 5.2. No AC Role Indication orAdvertisement....................9Advertisement .....................9 5.3. OtherIssues..............................................9Issues ...............................................9 6. SecurityConsiderations.......................................10Considerations ........................................10 7.IANA Considerations...........................................10 8. References....................................................11 8.1.References .....................................................11 7.1. NormativeReferences.....................................11 8.2.References ......................................11 7.2. InformativeReferences...................................11 9. Contributing Authors..........................................12 10. Acknowledgments..............................................12References ....................................11 Acknowledgments ...................................................12 Contributors ......................................................12 Authors' Addresses ................................................13 1. Introduction This document describes an Ethernet-Tree (E-Tree) solution framework for supporting the Metro Ethernet Forum (MEF) E-Tree service over a Multiprotocol Label Switching (MPLS) network. The objective is to provide a simple and effective approach to emulate E-Tree services in addition to Ethernet LAN (E-LAN) services on an existing MPLS network. This document extends the existingIETF specifiedIETF-specified Layer 2 Virtual Private Network (L2VPN) framework [RFC4664] to provide the emulation of E-Tree services over an MPLS network. It specifies the E-Tree architecture reference model and describes the corresponding functional components. It also points out the gaps and required extension areas in existing L2VPN solutions such as Virtual Private LAN Service(VPLS)[RFC4761][RFC4762](VPLS) [RFC4761] [RFC4762] and Ethernet Virtual Private Network(EVPN)[EVPN](EVPN) [EVPN] for supporting E-Tree services. 1.1. Terminology This document adopts all the terminologies defined inRFC4664RFC 4664 [RFC4664],RFC4761RFC 4761 [RFC4761], andRFC4762RFC 4762 [RFC4762]. It also uses the followingterminologies:terms: Leaf Attachment Circuit (AC): An AC with Leaf role. An ingress Ethernet frame at a Leaf AC (Ethernet frame arriving over an AC at theprovider edgeProvider Edge (PE) of an MPLS network) can only be delivered to one or more Root ACs in an E-Tree service instance. An ingress Ethernet frame at a Leaf AC must not be delivered to any Leaf ACs in the E-Tree service instance. Root AC: An AC with Root role. An ingress Ethernet frame at a Root AC can be delivered to one or more of the other ACs in the associatedE- TreeE-Tree service instance. E-Tree: An Ethernet VPN service in which each AC is assigned the role of a Root or Leaf. The forwarding rules in an E-Treeare:are as follows: o The Root AC can communicate with other Root ACs and LeafACs;ACs. o Leaf ACs can only communicate with Root ACs. 2. Overview 2.1. Ethernet Bridge Network In this document,Ethernet"Ethernet bridgenetworknetwork" refers to the Ethernet bridge/switch network defined inIEEE802.1QIEEE 802.1Q [IEEE802.1Q]. In a bridge network, a data frame is an Ethernet frame; data forwarding is based on destinationMACMedia Access Control (MAC) address; MAC reachability is learned in the data plane based on the source MAC address and the port (or tagged port) on which the frame arrives; and the MAC aging mechanism is used to remove inactive MAC addresses from the MAC forwarding table on an Ethernet switch. Data frames arriving at a switch may be destined to knownunicast MAC destinations, unknown,unicast, unknown unicast, multicast, or broadcast MAC destinations.Unknown,Unknown unicast, multicast, and broadcast frames are forwarded in a similar way,i.e.i.e., to every port except the ingress port on which the frame arrives. Multicast forwarding can be further constrained when using multicast control protocol snooping or using multicast MAC registrationprotocols. [IEEE802.1Q]protocols [IEEE802.1Q]. An Ethernet host receiving an Ethernet frame checks the destination address in the frame to decide whether it is the intended destination. 2.2. MEF Multipoint Ethernet Services: E-LAN and E-TreeMEF6.1MEF 6.1 [MEF6.1] defines two multipoint Ethernet Service types: o E-LAN (Ethernet LAN), a multipoint-to-multipoint service o E-Tree (Ethernet Tree), a rooted-multipoint service The MEF defines User-Network Interface (UNI) in a multipoint service as the Ethernet interface betweenaCustomer Equipment (CE) and a Provider Edge (PE),i.e.i.e., the PE can send and receive Ethernet frames to/from the CE. The MEF also defines UNI roles in a multipoint service. One role isRootRoot, and another is Leaf. Note that MEF UNI in a service is equivalent to the Attachment Circuit (AC) defined in L2VPN [RFC4664]. The Root AC and Leaf AC defined in this document are the same asoftherootRoot UNI andleafLeaf UNI as defined inMEF10.3MEF 10.3 [MEF10.3]. TheRoot AC and Leaf ACterms "Root AC" and "Leaf AC" are used in the following MEF service description. For an E-LAN service, all ACs have the Root role, which means that any AC can communicate with other ACs in the service. The E-LAN service defined by the MEF may be implemented by IETF L2VPN solutions such as VPLS and EVPN [EVPN]. An E-Tree service has one or more Root ACs and at least two Leaf ACs. An E-Tree service supportsthecommunication among the roots and between a root and a leaf but prohibitsthecommunication among the leaves. Existing IETF L2VPN solutions can't support the E-Tree service. This document specifies the E-Tree architecture reference model that supports the E-Tree service defined by the MEF [MEF6.1]. Section 4 will discuss different E-Tree use cases. 2.3. IETF L2VPN 2.3.1. Virtual Private LAN Service (VPLS) VPLS [RFC4761] [RFC4762] is an L2VPN solution that provides multipoint-to-multipoint Ethernet connectivity across IP/MPLS networks. VPLS emulates traditional Ethernet Virtual LANServices(VLAN) services in MPLSnetworks,networks and may support MEF E-LAN services. A data frame in VPLS is an Ethernet frame. Data forwarding in a VPLS instance is based on the destination MAC address and the VLAN on which the frame arrives. MAC reachability learning is performed in the data plane based on the source address and the AC orPseudowirepseudowire (PW) on which the frame arrives. MAC aging isalsothe mechanism used to remove inactive MAC addresses from a VPLS switching instance (VSI) on aProvider Edge (PE).PE. VPLS supports forwarding for knownunicast,unicast frames, as well as unknown unicast, broadcast, and multicast Ethernet frames. Many service providers have deployed VPLS in their networks to provide L2VPN services to customers. 2.3.2. Ethernet VPN (EVPN) Ethernet VPN [EVPN] is an enhanced L2VPN solution that emulates an Ethernet LAN or virtual LAN(s) across MPLS networks. EVPN supports active-activemulti-homingmultihoming of CEs and uses the Multiprotocol Border Gateway Protocol (MP-BGP) control plane to advertise MAC address reachability from an ingress PE to egress PEs. Thus, a PE learns MAC addresses that are reachable over local ACs in the data plane and other MAC addresses reachable across the MPLS network over remote ACs via the EVPN MP-BGP control plane. As a result, EVPN aims to support large-scale L2VPN with better resiliency compared to VPLS. EVPN is a relatively new technique and is still under development in the IETF L2VPN WG. 2.3.3. Virtual Private Multicast Service (VPMS) VPMS [VPMS] is an L2VPN solution that provides point-to-multipoint connectivity across MPLS networks and supports various attachment circuit (AC) types, including Frame Relay, ATM, Ethernet, PPP, etc. In the case of Ethernet ACs, VPMS provides single coverage of receiver membership,i.e.i.e., there is no differentiation among multicast groups in one VPN.DestinationThe destination address in the Ethernet frame is not used in data forwarding. VPMS supports unidirectional point-to-multipoint transport from a sender to multiple receivers and may support reverse transport in a point-to-point manner. 3. E-Tree Architecture Reference Model Figure 1 illustrates the E-Tree architecture reference model. Threeprovider edges (PEs),Provider Edges -- PE1, PE2, and PE3 -- are shown in theFigure.figure. Each PE has a Virtual Service Instance (VSI) associated with an E-Tree service instance. A CE attaches to the VSI on a PE via an AC. Each AC must be configured with arootRoot orleafLeaf role. In Figure 1,AC1AC1, AC2, AC5, AC6, AC9, and AC10 are Root ACs; AC3, AC4, AC7, AC8, AC11, and AC12 are Leaf ACs. This implies that a PE (local or remote) processes the Ethernet frames from CE01, CE02,etcetc., as if theyareoriginated from a RootAC;AC, and it processes the Ethernet frames from CE03, CE04,etcetc., as if theyareoriginated from a Leaf AC. Under this architecture model, the forwarding rules among the ACs, regardless of whether the sending AC and receiving AC are on the same PE or on different PEs, are described asfollow:follows: o An egress frame(frame(the frame to be transmitted over an AC) at an AC with Root role must be the result of an ingress frame at an AC(frame(the frame received at an AC) that has Root or Leaf role and is attached to the sameE-treeE-Tree service instance. o An egress frame at the AC with Leaf role must be the result of an ingress frame at an AC that has Root role and is attached to the sameE- treeE-Tree service instance. <------------E-Tree-----------> PE1+---------+ +---------+PE2 +----+ | +---+ | | +---+ | +----+ |CE01+----AC1----+--+ | | | | +--+----AC5----+CE05| +----+ (Root AC) | | V | | | | V | | (Root AC) +----+ +----+ | | | | | | | | +----+ |CE02+----AC2----+--+ | | | | +--+----AC6----+CE06| +----+ (Root AC) | | S +--+---------+--+ S | | (Root AC) +----+ +----+ | | | | | | | | +----+ |CE03+----AC3----+--+ | | | | +--+----AC7----+CE07| +----+ (Leaf AC) | | I | | | | I | | (Leaf AC) +----+ +----+ | | | | | | | | +----+ |CE04+----AC4----+--+ | | | | +--+----AC8----+CE08| +----+ (Leaf AC) | +-+-+ | | +-+-+ | (Leaf AC) +----+ +----+----+ +----+----+ | MPLS Core | | +----+----+ | | +-+-+ | +----+ | | | +--+----AC9----+CE09| | | | V | | (Root AC) +----+ | | | | | +----+ | | | +--+----AC10---+CE10| +--------------+--+ S | | (Root AC) +----+ | | | | +----+ | | +--+----AC11---+CE11| | | I | | (Leaf AC) +----+ | | | | +----+ | | +--+----AC12---+CE12| | +---+ | (Leaf AC) +----+ PE3 +---------+ <-------------E-Tree----------> Figure11: E-Tree Architecture Reference Model These rules apply to all frame types,i.e. Known Unicast, Unknown, Broadcast,i.e., known unicast, unknown unicast, broadcast, andMulticast.multicast. ForKnown Unicastknown unicast frames, forwarding in a VSI context is based on the destination MAC address. A VSI on a PE corresponds to an E-Tree service instance and maintains a MAC forwarding tablewhichthat is isolated from other VSI tables on the PE. It also keepsthetrack of local AC roles. The VSI receives a frame from an AC or across the MPLScore;core, and it forwards the frame to another AC over which the destination is reachable according to the VSI forwarding table and forwarding rules described above. When the target AC is on a remote PE, the VSI forwards the frame to the remote PE over the MPLS core. Forwarding over the MPLS core will be dependent on theE-treeE-Tree solution. For instance, a solution may adopt PWs to mesh VSIs as inVPLS,VPLS and to forward frames over VSIs subject to theE-treeE-Tree forwarding rules. Alternatively, a solution may adopt the EVPN forwarding paradigm constrained by theE-treeE-Tree forwarding rules. Thus, solutions that satisfy theE-treeE-Tree requirements could be extensions to VPLS and EVPN. In most use cases, an E-Tree service has only a few Root ACs (root CE sites) but many Leaf ACs (leaf CE sites). Furthermore, a PE may have only Root ACs or only Leaf ACs. Figure 1 provides a general E-Tree architecture model. 4. E-Tree Use Cases Table 1 below presents some major use cases for E-Tree. +---------------------------+--------------+------------+ | Use Case | Root AC | Leaf AC | +---+---------------------------+--------------+------------+ | 1 | Hub & Spoke VPN | Hub Site | Spoke Site | +---+---------------------------+--------------+------------+ | 2 | Wholesale Access | Customer's | Customer's | | | | Interconnect | Subscriber | +---+---------------------------+--------------+------------+ | 3 | Mobile Backhaul | RAN NC | RAN BS | +---+---------------------------+--------------+------------+ | 4 | IEEE 1588 PTPv2[1588] |[IEEE1588]| PTP Server | PTP Client | | | Clock Synchronization | | | +---+---------------------------+--------------+------------+ | 5 | Internet Access | BNG Router | Subscriber | | |Reference:Reference [TR-101] | | | +---+---------------------------+--------------+------------+ | 6 | Broadcast Video | Video Source | Subscriber | | | (unidirectional only) | | | +---+---------------------------+--------------+------------+ | 7 | Broadcast/Multicast Video | Video Source | Subscriber | | | plus Control Channel | | | +---+---------------------------+--------------+------------+ | 8 | Device Management | Management | Managed | | | | System | Device | +---+---------------------------+--------------+------------+ Where: RAN: Radio Access Network NC: Network Controller BS: Base Station PTP: Precision Time Protocol BNG: Broadband Network Gateway Table11: E-Tree Use Cases Common to all use cases, directLayer2 Leaf-to-LeafLayer 2 leaf-to-leaf communication is required to be prohibited. ForMobilemobile backhaul, this may not be valid forLTELong Term Evolution (LTE) X2 interfaces; an LTE X2 interface [LTE] enables communication between two evolvednode B (eNB) enables the communication in between.Node Bs (eNBs). E-Tree service is appropriate for such use cases. Also common to the use cases mentioned above, there may besingleone or multiple Root ACs in one E-Tree service. The needoffor multipleRoot-Root ACs may be driven by a redundancy requirement or by having multiple serving sites. Whether a particular E-Tree service needs to supportsingleone or multiple Root ACs depends onanthe application. 5. L2VPN Gaps for Emulating MEF E-Tree Service The MEF E-TreeServiceservice defines special forwarding rules that prohibit forwarding Ethernet frames among leaves. This poses some challenges to IETF L2VPN solutions such as VPLS and EVPN in emulating E-Tree service over an MPLS network. There are two major issues described in the followingsections.subsections. 5.1. No Differentiation on AC Role IP/MPLS L2VPN architecture has no distinctroleroles on AttachmentCircuit (AC)Circuits (ACs) and supports any-to-any connectivity among all ACs. It does not have any mechanism to support forwardingconstraintconstraints based on an AC role. However, the MEF E-Tree service defines two ACroles,roles -- Root andLeaf,Leaf -- and defines the forwarding rules based on theframeoriginating and receiving ACroles.roles of a given frame. 5.2. No AC Role Indication or Advertisement In an L2VPN, when a PE, say PE2, receives a frame from another PE, say PE1, over the MPLS core, PE2 does not know if the frame from PE1 is originated from arootRoot AC orleafLeaf AC. This causes the forwarding issue on PE2 because the E-Tree forwarding rules require that the forwarder must know the role of the frame origin,i.e.i.e., fromrootRoot AC orleafLeaf AC. This is specificallyimportant,important when PE2 has bothrootRoot AC andleafLeaf AC attached to the VSI. E-Tree forwarding rules apply to all types of frames (known unicast destination, unknown unicast destination,multicastmulticast, and broadcast). 5.3. Other Issues Some desirable requirements for IETF E-Tree are specific to an IP/MPLS L2VPN implementation such as Leaf-only PE. A Leaf-only PE isthea PE that only has Leaf AC(s) in an E-Tree serviceinstance, thusinstance; thus, other PEs on the same E-Tree service instance do not necessarily forward the frames originated from a Leaf AC to the Leaf-only PE, which may save some network resources. It is also desirable forE- Treean E-Tree solution to work with existing PEs that support single-roleAC andACs, where the role is equivalent to the root in an E-TreeService.service. These requirements are described in the E-Tree requirementdocument. [RFC7152]document [RFC7152]. 6. Security Considerations AnE-treeE-Tree service may be deployed for security reasons to prohibit communication among sites (leaves). AnE-treeE-Tree solution must enforce E-Tree forwarding constraints. The solution must also guarantee that Ethernet frames do not leak outside of theE-treeE-Tree service instance to which they belong. An E-Tree service prohibits communication among leaf sites but does not have knowledge ofhigher layerhigher-layer securityconstraint.constraints. Therefore, in general,higher layerhigher-layer applicationscan notcannot rely on E-Tree to providethesecurity protection unless all security constraints are fully implemented by the E-Tree service. Enhancing L2VPN for E-Treeserviceservices inherits the same security issues described in the L2VPN framework document [RFC4664]. These relate to bothcontrol planecontrol-plane anddata planedata-plane security issues that may arise in the following areas: o issues fully contained in the provider network o issues fully contained in the customer network o issues in the customer-provider interface network The framework document has substantial discussions on the security issues and potential solutions to address them. An E-Tree solution must consider these issues and address them properly. VPLS [RFC4761] [RFC4762] and/or EVPN [EVPN] will likely be candidate solutions for an E-TreeServiceservice over an MPLS network. The security capabilities builtin theseinto those solutions will be naturally adoptedinwhen supporting E-Tree. Forthe detail,details, see thesecurity consideration sectionSecurity Considerations sections in [RFC4761], [RFC4762], and [EVPN]. 7.IANA Considerations The document requires no IANA action. 8.References8.1.7.1. Normative References [MEF6.1]MEF, "MetroMetro Ethernet Forum,Ethernet"Ethernet Services Definitions - Phase 2",MEF6.1,MEF 6.1, April20082008. [MEF10.3]MEF,Metro Ethernet Forum, "Ethernet Service Attributes - Phase 3",MEF10.3,MEF 10.3, October20132013. [RFC4664] Andersson, L.,et al,Ed., and E. Rosen, Ed., "Framework for Layer 2 Virtual PrivateNetworkNetworks (L2VPNs)",RFC4664, Sept. 2006RFC 4664, September 2006, <http://www.rfc-editor.org/ info/rfc4664>. [RFC4761]Kompella &Kompella, K., Ed., and Y. Rekhter, Ed., "Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling",RFC4761,RFC 4761, January20072007, <http://www.rfc-editor.org/info/rfc4761>. [RFC4762]Lasserre &Lasserre, M., Ed., and V. Kompella, Ed., "Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling",RFC4762,RFC 4762, January20072007, <http://www.rfc-editor.org/info/rfc4762>. [RFC7152] Key,et al.,R., Ed., DeLord, S., Jounay, F., Huang, L., Liu, Z., and M. Paul, "Requirements for Metro Ethernet Forum (MEF) Ethernet-Tree (E-Tree) Support inL2VPN", RFC7152, April 2011997. 8.2.Layer 2 Virtual Private Network (L2VPN)", RFC 7152, March 2014, <http://www.rfc-editor.org/info/rfc7152>. 7.2. Informative References [IEEE802.1Q]IEEE802.1, "MediaIEEE, "IEEE Standard for Local and metropolitan area networks -- Media Access Control (MAC) Bridges and Virtual Bridged Local Area",IEEE802.1Q, 2011 [1588]IEEE1588, "Precision Time Protocol",Std 802.1Q, 2011. [IEEE1588] IEEE, "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems", IEEE Std 1588,2013July 2008. [LTE]3GPP TS,3GPP, "Evolved Universal Terrestrial Radio Access(E- UTRA)(E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)",V11.2.0, June, 20123GPP TS 36.300 v11.2.0, July 2012. [TR-101] Broadband Forum, "Migration to Ethernet-Based BroadbandAggregationAggregation", TR-101 Issue2",2, July20112011. [VPMS] Kamite,et al.,Y., Jounay, F., Niven-Jenkins, B., Brungard, D., and L. Jin, "Framework and Requirements for Virtual Private Multicast Service (VPMS)",draft-ietf-l2vpn-vpms- frmwk-requirements-05, workWork inprogressProgress, draft-ietf-l2vpn-vpms-frmwk-requirements-05, October 2012. [EVPN] Sajassi,et al.,A., Ed., Aggarwal, R., Bitar, N., Isaac, A., and J. Uttaro, "BGP MPLS Based Ethernet VPN",draft-ietf- l2vpn-evpn-07, workWork inprogress 9. Contributing AuthorsProgress, draft-ietf-l2vpn-evpn-11, October 2014. Acknowledgments The authors would like to thank Nabil Bitar and Adrian Farrel for their detailed review and suggestions. Contributors The following peoplecontribute the document as co-authors.contributed significantly to this document. Yuji Kamite NTT Communications Corporation Granpark Tower 3-4-1 Shibaura, Minato-ku Tokyo 108-8118, JapanEmail:EMail: y.kamite@ntt.com Wim Henderickx Alcatel-Lucent Copernicuslaan 50 2018 Antwerp, BelgiumEmail:EMail: wim.henderickx@alcatel-lucent.com10. Acknowledgments Authors like to thank Nabil Bitar for this detail review and suggestions.Authors' Addresses Raymond Key (editor)Email:EMail: raymond.key@ieee.org Lucy Yong (editor) Huawei USAEmail:EMail: lucy.yong@huawei.com Simon Delord TelstraEmail:EMail: simon.delord@gmail.com Frederic Jounay Orange CH 4 rue caudray 1020 Renens SwitzerlandEmail:EMail: frederic.jounay@orange.ch Lizhong JinEmail:EMail: lizho.jin@gmail.com