Automatic attachment of end stations and network devices Dan Romascanu Paul Unbehagen (draft-romascanu-opsawg-auto-attach-framework-00)draft-romascanu-opsawg-auto-attach-framework-00.

Slides:



Advertisements
Similar presentations
Virtual Network Auto-Provisioning Requirements draft-gu-nvo3-auto-provisioning-reqs-00 Zhongyu Gu, Ting Ao, Qian Sun, Vic Liu.
Advertisements

IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Problem Statement and Architecture for Information Exchange Between Interconnected Traffic Engineered Networks draft-farrel-interconnected-te-info-exchange-03.txt.
IEEE 802.1ABrev Extension for Auto Attach Nigel Bragg Dan Romascanu Paul Unbehagen.
Draft-li-isdnrg-seamless-mpls-mbh-00IETF 92 SDNRG1 Inter-SDN in Seamless MPLS for Mobile Backhaul Zhenbin Li, Rober Tao Huawei Technologies IETF 92, Dallas,
Network Management Complexities Dan Romascanu (Contributed in discussions by Andy Bierman, David Harrington, Juergen Schoenwealder) IESG Retreat Boston,
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Unrestricted Connection manager MIF WG IETF 78, Maastricht Gaëtan Feige, Cisco (presenter) Pierrick Seïté, France Telecom -
IT Infrastructure Chap 1: Definition
Lucy Yong Susan Hares September 20, 2012 Boston
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
ODL project proposal - Distributed LLDP with Auto Attach Capability ODL project proposal - Distributed LLDP with Auto Attach Capability Agenda – 4 slides.
VPN4DC Discussion VPN4DC Team Taipei, Taiwan.
PAR and CSD for P802.1Qxx WG January PAR (1) 1.1 Project Number: P802.1Qxx 1.2 Type of Document: Standard 1.3 Life Cycle: Full Use 2.1 Title:
Dynamic Virtual Networks (DVNE) Margaret Wasserman & Paddy Nallur November 11, 2010 IETF Beijing, China.
IETF 81 Quebec City1 Requirements and Framework of VPN-oriented Data Center Services Ning
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-ietf-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning Schulzrinne.
D. Stiliadis F. Balus W. Henderickx N. Bitar M. Pisica Software Driven Networks: Use Cases and Framework draft-stiliadis-sdnp-framework-use-cases-01.txt.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Draft-li-idr-cc-bgp-arch-00IETF 88 IDR1 An Architecture of Central Controlled Border Gateway Protocol (BGP) draft-li-idr-cc-bgp-arch-00 Zhenbin Li, Mach.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
Draft-ietf-l3sm-l3vpn-service-model S. Litkowski R. Shakir L. Tomotaki K. D’Souza.
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
ONAP SD-WAN Use Case Proposal.
VPN Extension Requirements for Private Clouds
Applicability Statement for Layer 1 Virtual Private Networks (L1VPNs) Basic Mode draft-takeda-l1vpn-applicability-basic-mode-00.txt Deborah Brungard (AT&T)
IPv6 – an Enabler for Virtualizing the Home
Zhenbin Li, Kai Lu Huawei Technologies IETF 98, Chicago, USA
Layer-2 Network Virtualization
Raymond Aubin (Nortel) Marco Carugi (Nortel) Ichiro Inoue (NTT)
draft-ietf-l3sm-l3vpn-service-model IETF 94 - Yokohama
Virtual Subnet : A L3VPN-based Subnet Extension Solution
NETW 208 RANK The power of possibility/netw208rank.com
Presenter: Jeffrey Zhang
Layer-2 Network Virtualization
SUPA/YMCA (Yang Models for Configuration and topology Abstraction)
L1VPN Working Group Scope
MCSA VCE
Enterprise vCPE use case requirement
Use Cases and Requirements for I2NSF_
Multicast in Virtual Router-based IP VPNs
IS3120 Network Communications Infrastructure
NETW 208 Enthusiastic Studysnaptutorial.com
IEEE P802.1CF for vertical applications
Private Network Laid Over ThinCPEs routing area related work
Qin Wu Roni Even Ying Cheng IETF 103 Bangkok, Tailand Oct 12, 2018
Layer-2 Network Virtualization
The Business Value of MPLS VPNs
Extending MPLS/BGP VPNs to End-Systems
Proposal for IEEE 802.1CQ-LAAP
Firewalls Routers, Switches, Hubs VPNs
Systems Analysis and Design in a Changing World, 6th Edition
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
DetNet DetNet Flow Information Model draft-farkas-detnet-flow-information-model-02 Balázs Varga, János Farkas, Rodney Cummings, Jiang Yuanlong and.
Thoughts on IEEE 802 network integration with respect to P802.1CF
EVPN a very short introduction
IEEE 802 Scope of OmniRAN Abstract
JINI ICS 243F- Distributed Systems Middleware, Spring 2001
Thoughts on IEEE 802 network integration with respect to P802.1CF
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Multicasting Unicast.
DetNet Data Plane Solutions draft-ietf-detnet-dp-sol-ip-02  draft-ietf-detnet-dp-sol-mpls-02  Bala’zs Varga, Jouni Korhonen, Janos Farkas, Lou Berger,
Paul Unbehagen Big Switch Networks Scott Fincher Extreme Networks
Presentation transcript:

Automatic attachment of end stations and network devices Dan Romascanu Paul Unbehagen (draft-romascanu-opsawg-auto-attach-framework-00)draft-romascanu-opsawg-auto-attach-framework-00 (draft-romascanu-opsawg-auto-attach-lldp-00(draft-romascanu-opsawg-auto-attach-lldp-00)

The Auto-Attachment Concept Core Network Edge Network Device Edge Network Device End Station Simplify operations procedures by automating the configuration of network devices and end-stations to individual services in a core network Run a simple one-hop / two steps protocol that Discovers and identifies end-stations to edge devices Configures the link and connects the station to the available core network resource (L2VPN, MPLS, etc.) Discovery Configuration

Changes from IETF 95 Splitting draft-unbehagen-lldp-spb-02 into two separate I-Ds – draft-romascanu-opsawg-auto-attach-framework – generic frameworkdraft-romascanu-opsawg-auto-attach-framework – draft-romascanu-opsawg-auto-attach-lldp-00 – the LLDP auto- attachment solution in an SPB network draft-romascanu-opsawg-auto-attach-lldp-00 Clarification of terminology Functional description of auto-attachment processes – Element discovery – Services configuration Protocols instantiating the Discovery Process – LLDP (a.k.a. IEEE 802.1AB) – Protocols that implement the MUD Framework (the MUD URL DHCP Option and the MUD URC X.509 Extension) Alignment with the evolution of IEEE 802.1Qcj (now at D0.2)

Conceptual Auto Attach Model Core NetworkAA-Server (‘horizontal’ DM) End Station AA-Client (‘horizontal’ DM) Routing Control Plane Service TagService Route / Tunnel ID Auto-Attachment Primitives (‘vertical’ Data Model) Auto Attachment Controller SDN/Policy Server

Comments 1. ‘The AA controller has connection to both AA client and AA server … it’s not practical in many cases. AAC and AAS are usually in different administrative domains. For example, AAC installed on a CE, and the AAS installed on the PE. Usually, CE and PE are controlled by different domain controllers. It’s hard to deploy a super controller for CE and PE. Another example is, as you showed, the IoT. It’s not practical to let all the end devices connect to the AA controller. The suggestion is to have the AA controller only connect to the AAS. AAC can pull additional information from the path: AA controller->AAS->AAC 2. If both AAC and AAS connect to the AA controller, that means the AAC and AAS can be synchronized and configured by the management plane. Some of the control plane function between AAC and AAS can be reduced Lack of clarity in the framework description that needs to be corrected. The AA controller in the diagram should not be regarded as a ‘super-controller’ across administrative domains, but rather as a policy function that applies to the network and may be instantiated in different ways. The ‘vertical’ data model (6) in the diagram does not carry the same information to AACs and AASs. Two use cases: – The AA controller connects only to the AAS and configures the mapping policies on the network devices. Clients are configured mainly by the horizontal interaction – this will be true also in most of the IoT scenarios – Both AAS and AACs connect to the AA controller function. The clients get authentication and local security and local services information from the controller (what services are available, how you configure to them). Servers perform same functionality as in #1. The implementation of the controller may be distributed, possibly with an ‘orchestration’ function in-between. This fits for example the BYOD use cases. 3. Possible new use case: cloud VPN solution. The customer provisioned virtual private cloud can automatically join (attach to) the existing enterprise VPN. To be considered. Need to assess the changes required by a client that is virtualized. Also look into I2NSF work in this space.

Evolution of the Conceptual Auto Attach Model Core NetworkAA-Server (‘horizontal’ DM) End Station AA-Client (‘horizontal’ DM) Routing Control Plane Service TagService Route / Tunnel ID Auto-Attachment Primitives (Server ‘vertical’ Data Model) Auto Attachment Controller (Client ‘vertical’ Data Model) Routing Domain SDN/Policy Server Client Services SDN/Policy Server Auto Attach Scope

Status and Next Steps Status of the project – L2 implementation using extensions of the Link Layer Discovery Protocol (LLDP – IEEE 802.1AB) and core IEEE 802.1aq (Short Path Bridging) networks – Deployed – Open source code available in ODL – IEEE / LLDP extensions defined in the IEEE 802.1Qcj project Next Steps – YANG data model for policy and service configuration – I-D describing other protocols instantiations (MUD, …) – Possible OPSAWG work item if there is interest and willing contributors

Reading List romascanu-opsawg-auto-attach-framework/ romascanu-opsawg-auto-attach-framework/ romascanu-opsawg-auto-attach-lldp/ romascanu-opsawg-auto-attach-lldp/