draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)

Slides:



Advertisements
Similar presentations
History of VPLS at IETF Ali Sajassi November 12, 2002.
Advertisements

Overlay Transport Virtualization (OTV)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
RIB Reduction in Virtual Subnet draft-xu-bess-virtual-subnet-rib-reduction-00 Xiaohu Xu (Huawei) Susan Hares (Individual) Yongbing Fan (China.
Directory Assisted TRILL Encapsulation by non-TRILL nodes (Directory Reliant Smart End Node) Linda Dunbar Donald Eastlake Radia Perlman Igor Gashinsky.
BGP Extensions for BIER draft-xu-idr-bier-extensions-01 Xiaohu Xu (Huawei) Mach Chen (Huawei) Keyur Patel (Cisco) IJsbrand Wijnands (Cisco)
IS-IS Extensions to support OTV Hasmit Grover Ayan Banerjee Dhananjaya Rao.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
FIB Reduction in Virtual Subnet draft-xu-l3vpn-virtual-subnet-fib-reduction-00 Xiaohu Xu (Huawei) Susan Hares Yongbing Fan (China Telecom)
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Performance-based BGP Routing Mechanism draft-xu-idr-performance-routing-00 Xiaohu Xu (Huawei) Hui Ni (Huawei) Mohamed Boucadair (France.
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
Encapsulating MPLS in UDP draft-xu-mpls-in-udp-02 Xiaohu Xu (Huawei) Marshall Eubanks (AmericaFree.TV) Lucy Yong (Huawei) Nischal Sheth.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
CS 540 Computer Networks II Sandy Wang
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.
NVO3 VDP Gap Analysis VM to NVE Specific Control Plane Requirements Paul Bottorff (HP) Joseph Pelissier (Cisco) Patricia Thaler (Broadcom)
Advertising Encapsulation Capability Using OSPF draft-xu-ospf-encapsulation-cap-01 Xiaohu Xu (Huawei) Robert Raszuk (Mirantis) Uma Chunduri.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
BIER Use Cases draft-kumar-bier-use-cases-00 Nagendra Kumar (Cisco) Rajiv Asati (Cisco) Mach(Guoyi) Chen (Huawei) Xiaohu Xu (Huawei) * IETF 91, Honolulu,
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
EVPN: Or how I learned to stop worrying and love the BGP
DHCP Options for Configuring Multicast Addresses in VXLAN draft-sarikaya-dhc-vxlan-multicast-02 Behcet Sarikaya Frank Xia November 2013 nvo3 WG IETF-88.
Virtual Private LAN Service
BIER Use Case in VXLAN draft-wang-bier-vxlan-use-case-00 Linda Wang (Presenting) Sandy. Zhang & F. Hu.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
LISP Control Plane for NVO3 <draft-maino-nvo3-lisp-cp-00>
UDP Encapsulation for IP Tunneling
Connecting MPLS-SPRING Islands over IP Networks
Virtual Hub & Spoke with BGP EVPNs
Multicast in BGP/MPLS VPN
83rd IETF Paris by Tissa Senevirathne Les Ginsberg Ayan Banerjee
Anoop Ghanwani Linda Dunbar Mike McBride Vinay Bannai Ramki Krishnan
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Presenter: Jeffrey Zhang
Hierarchical Fabric Designs
Multicast Information Model draft-zhang-mboned-multicast-info-model-00 Sandy. Zhang Linda Wang (Presenting) Mboned WG IETF 97#Seoul.
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
Advertising Encapsulation Capability Using OSPF
Multi-domain MPLS Deployment Enhancement
Virtual LANs.
IS-IS Geo Location IETF 97, Seoul
Network base Network base.
Multicast/BIER As A Service
A Unified Approach to IP Segment Routing
Encapsulation for BIER in Non-MPLS IPv6 Networks
MVPN/EVPN Tunnel Aggregation with Common Labels Zhaohui Zhang (Juniper) Eric Rosen (Juniper) Wen Lin (Juniper) Zhenbin Li (Huawei) BESS WG 20-March-2018.
Lu Huang Shujun Hu China Mobile
EVPN a very short introduction
Xiaohu Xu (Huawei) Stewart Bryant (Huawei) Hamid Assarpour (Broadcom)
BFD for VXLAN draft-spallagatti-bfd-vxlan
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
IETF BIER, November 2017, Singapore
BIER in IPv6 draft-zhang-bier-bierin6-03
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
Quan Xiong(ZTE) Gregory Mirsky(ZTE) Chang Liu(China Unicom)
draft-ietf-bier-ipv6-requirements-01
Applicability of EVPN to NVO3 Networks
BGP VPN service for SRv6 Plus IETF 105, Montreal
Parag Jain, Samer Salam, Ali Sajassi (Cisco),
Global vpnid advertisement in BIER overlay draft-pengzhang-bier-global-vpnid-00 BIER WG IETF103# Bangkok Shaofu Peng Sandy Zhang.
Tim Strakh CEO, IEOFIT CCIE RS, CCIE Sec CCIE Voice, CCIE DC
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Network Virtualization Overlays (NVO) Control Plane Protocol Using IS-IS draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco) Himanshu Shah (Ciena Corp) Yongbing Fan (China Telecom) IETF97, Seoul

Motivation Due to the success of the Network Virtualization Overlays (NVO) technology in data center networks, more and more enterprises are considering the deployment of this technology in their campus networks. Although BGP or SDN controller could still be used as the control plane protocol in campus network environment, both of them seem a bit heavyweight, especially for small and even medium sized campus networks. By using IS-IS as a lightweight control plane protocol for NVO, the network provisioning is greatly simplified (e.g., only a single protocol to be deployed), which is much significant to campus networks.

VN Membership Auto-discovery By propagating the VN membership info among Network Virtualization Edges (NVEs), NVEs belonging to the same VN instance could discover one another automatically. The VN membership info is carried in a VN Membership Info sub-TLV (see next page) of the following TLVs originated by that NVE: TLV-135 (IPv4 extended reachability) TLV-236 (IPv6 reachability) When the above TLV is propagated across level boundaries, the VN Membership Info sub-TLV contained in that TLV SHOULD be kept.

VN Membership Info Sub-TLV VN ID: This field is filled with a 24-bit globally significant VN ID for a particular attached VN instance. S-Flag: This field indicates the existence of the Sub-domain ID field. When the S-Flag is set, the Sub-domain ID field MUST be filled with a valid sub-domain ID. Otherwise, it SHOULD be set to zero. Sub-domain ID: This field is filled with a 8-bit BIER sub-domain ID to which the VN has been associated [I-D.ietf-bier-architecture]. The field is only useful in the case where the Broadcast, Unknown-unicast and Multicast (BUM) packets within a VN are transported across the underlay by using the BIER forwarding mode.

Tunnel Capability Advertisement This IS-IS based control plane protocol for NVO could support any specific NVO data encapsulation formats such as VXLAN. To reach a consensus on what specific tunnel encapsulation format to be used between ingress and egress NVE pairs automatically, egress NVEs SHOULD advertise their own tunnel encapsulation capabilities by using the Encapsulation Capability sub-TLV as defined in [I-D.ietf-isis-encapsulation-cap].

MAC Address Learning MAC addresses of local CE hosts would still be learnt by NVEs as normal bridges. Two options for learning MAC addresses of remote CE hosts: data-plane based MAC learning control- plane based MAC learning If unknown unicast flood suppression is strongly required even at the cost of consuming more forwarding table resources, the control-plane based MAC learning option could be considered. Otherwise, the data-plane based MAC learning option is RECOMMENDED.

Control-plane based MAC Learning NVEs advertise local MAC addresses to remote NVEs of the same VN instance by using the MAC-Reachability TLV as defined in [RFC6165]. One or more MAC-Reachability TLVs are carried in an LSP which in turn is encapsulated with an Ethernet header. The source MAC address is the originating NVE‘s MAC address whereas the destination MAC address is a to-be-defined multicast MAC address specifically identifying all NVEs. Such Ethernet frames containing IS-IS LSPs are forwarded towards remote NVEs as if they were customer multicast Ethernet frames. Egress NVEs receiving the above frames SHOULD intercept them and accordingly process them.

Next Steps Huawei had implemented a previous version of this draft (i.e., draft-xu-nvo3-isis-cp) on an open source Linux system (ubuntu) about two years before and it works very well with the Open vSwitch(OVS). WG adoption of this draft?