IETF87 i2rs WG1 Interface to the Routing System (I2RS) for Service Chaining: Use Cases and Requirements draft-bitar-i2rs-service-chaining-00.txt N. Bitar.

Slides:



Advertisements
Similar presentations
Basic BGP Data Plane Convergence Benchmarking draft-papneja-bgp-basic-dp-convergence-01 Rajiv Papneja, Susan Hares, Bhavani Parise, Mohan Nanduri, Jay.
Advertisements

U-turn Alternates for IP/LDP Fast-Reroute draft-atlas-ip-local-protect-uturn-01.txt Alia Atlas Gagan Choudhury
Draft-mackie-sfc-using-virtual-networking-02 S. Mackie, B. Rijsman, Juniper Networks M. Napierala, AT&T D. Daino, Telecom Italia D.R. Lopez, Telefonica.
Routing Basics.
Introduction to OSPF.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
OpenDaylight: Service Function Chaining.
Multicasting Applications Across Inter-Domain Peering Points Percy S. Tarapore, AT&T Robert Sayko, AT&T Greg Shepherd, Cisco Toerless Eckert, Cisco Ram.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
Border Gateway Protocol (BGP4) Rizwan Rehman, CCS, DU.
IETF 80: NETEXT Working Group – Logical Interface Support for IP Hosts 1 Logical Interface Support for IP Hosts Sri Gundavelli Telemaco Melia Carlos Jesus.
Ietf-65 draft-kulmala-l3vpn-interas-option-d-02.txt ASBR VRF Context for BGP/MPLS IP VPN IETF-65 draft-kulmala-l3vpn-interas-option-d-02.txt Marko Kulmala.
66th IETF Montreal July 2006 Requirements for delivering MPLS services Over L3VPN draft-kumaki-l3VPN-e2e-mpls-rsvp-te-reqts-01.txt Kenji Kumaki KDDI, Editor.
November th Requirements for supporting Customer RSVP and RSVP-TE over a BGP/MPLS IP-VPN draft-kumaki-l3VPN-e2e-mpls-rsvp-te-reqts-05.txt.
Kenji Kumaki KDDI, Editor Raymond Zhang BT Nabil Bitar Verizon
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
Service Function Chaining Use Cases draft-liu-service-chaining-use-cases IETF 89 London, March 3, 2014 Will Liu, Hongyu Li, Oliver Huang, Huawei Technologies.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Draft-tarapore-mbone- multicast-cdni-05 Percy S. Tarapore, AT&T Robert Sayko, AT&T Greg Shepherd, Cisco Toerless Eckert, Cisco Ram Krishnan, Brocade.
A Scalable, Commodity Data Center Network Architecture Jingyang Zhu.
Virtual Topologies for Service Chaining in BGP IP/MPLS VPNs draft-rfernando-bess-service-chaining-00 (previously draft-rfernando-l3vpn-service-chaining-04)
VPN4DC Discussion VPN4DC Team Taipei, Taiwan.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
U-Turn Alternates for IP/LDP Local Protection draft-atlas-ip-local-protect-uturn-00.txt Alia Atlas Gagan Choudhury
1 Miscellaneous Capabilities for IP Network Infrastructure IETF 64 Vancouver, BC, Canada November 2005.
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
Routing and Routing Protocols
Operations and Maintenance Next Generation Requirements draft-amante-oam-ng-requirements-01 Shane Amante Alia Atlas Andrew Lange Danny McPherson March.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Interface to The Internet Routing System (IRS) draft-atlas-irs-problem-statement-00 draft-ward-irs-framework-00 Alia Atlas Thomas Nadeau David Ward IETF.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier March 20, 2003.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
November 10, 2010IETF 79 – Beijing, China A method for IP multicast performance monitoring draft-cociglio-mboned-multicast-pm-01 Alessandro Capello Luca.
IETF 80: NETEXT Working Group – Logical Interface Support for IP Hosts 1 Logical Interface Support for IP Hosts Telemaco Melia, Sri Gundavelli, Carlos.
1 IETF 91, 10 Nov 2014draft-behringer-anima-reference-model-00.txt A Reference Model for Autonomic Networking draft-behringer-anima-reference-model-00.txt.
Segment Routing: An Architecture build with SDN in mind and addressing the evolving network requirements Brian Meaney Cisco SP Consulting Team.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
J. Halpern (Ericsson), C. Pignataro (Cisco)
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Draft-fm-bess-service-chaining-01 Prague, July 2015 Rex Fernando Stuart Mackie Dhananjaya Rao Bruno Rijsman Maria Napierala.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
draft-jounay-pwe3-dynamic-pw-update-00.txt IETF 70 PWE3 Working Group
Use Case for Distributed Data Center in SUPA
draft-patel-raszuk-bgp-vector-routing-01
Instructor Materials Chapter 5: Dynamic Routing
Service Provider Requirements for Ethernet Control with GMPLS
Yang model for requesting
RSVP-TE Extensions for Associated Co-routed Bidirectional Label Switched Paths (LSPs) draft-gandhishah-teas-assoc-corouted-bidir-01 Author list: Rakesh.
of Dynamic NFV-Policies
Sue Hares (Huawei) Qin Wu (Huawei) Xiaoran Guan (Huawei) Linda Dunbar
draft-ietf-teas-yang-te-04
draft-wijnands-mpls-mldp-vpn-in-band-signaling-00
draft-ietf-teas-yang-te-topo-04
I2RS Large Flow Use Case draft-krishnan-i2rs-large-flow-use-case-00
Chapter 5: Dynamic Routing
ClosedFlow: OpenFlow-like Control over Proprietary Devices
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
SUPA Policy-based Management Framework (SUPA: Simplified Use of Policy Abstractions) draft-ietf-supa-policy-based-management-framework-01 Will Liu, John.
DetNet Information Model Consideration
Using Service Function Chaining for In-Network Computation
draft-filsfils-spring-segment-routing-policy-05
Presentation transcript:

IETF87 i2rs WG1 Interface to the Routing System (I2RS) for Service Chaining: Use Cases and Requirements draft-bitar-i2rs-service-chaining-00.txt N. Bitar (Verizon), G. Heron & L. Fang (Cisco) R. Krishnan (Brocade) N. Leymann (Deutshe Telekom) H. Shah (Ciena) S. Chakrabarti & W. Haddad (Ericsson) IETF87 - Berlin

IETF87 i2rs WG2 Outline  Objective and Scope  Use cases and requirements

IETF87 i2rs WG3 Objective and Scope  Objective: describe service chaining use cases and the corresponding required information that could be controlled via i2rs  Scope:  Multi-tenancy service chaining  Service topology discovery and maintenance  Service node monitoring  Controlling the routing on a service chain  Opaqueness to actual service provided

IETF87 i2rs WG4 Service Topology and Resource Discovery/Representation and Maintenance  Use Case: Representation/discovery of services topology and associated resources  Can be used by an orchestration system to map an abstract service chain applied to a packet/flow to a service path  Aid in monitoring of services resources  Needed Information:  Service Node ID  Non-composite (autonomous) services offered by a service node: Service type  Various node and resource attributes, e.g.:  Customer ID or list of (customer ID, VRF)  Number of virtual contexts  Per service node, customer ID, and service type  Packet and bit rates supported  Available RIB and FIB size  Numbers of supported ACLs per ACL type  Number of supported flows  Etc.  Called out the need for discovering/representing customer virtual network topology, including access ports

IETF87 i2rs WG5 Service Node Monitoring  Use Case: Monitor the liveliness of a service node and its resource utilization to:  Detect node failure  Select an uncongested service path  Add resources or service nodes, or re-groom resources as needed  Needed Information  Per service node, service context, and service type, and per hosting system as it applies Bandwidth and packet rate utilization overall and per CoS Memory utilization RIB and FIB utilization per address family Flow resource utilization per flow type CPU Utilization Available storage

IETF87 i2rs WG6 Traffic Classification and Service Chaining Control  Use Case 1: Control the action(s) taken on a packet/flow based on multi-field classification. Actions include:  packet/flow direction on a service path – using hop-by-hop policy based routing  Actions: mirror, mark, route, steer packet to a VRF, insert source or source + service header with format to be defined, etc.  Needed functionality: Define and program classification rule and associated actions  Use Case 2: BGP-based traffic redirection along a service path  Needed functionality: Define and program BGP policy that effects traffic redirection

IETF87 i2rs WG7 Scalability Requirements and Security Considerations  Scalability:  Discussion on transaction scale requirement based on different scenarios  Security Considerations  Authenticated and secure communication channel between nodes on the service path and the control system  Customer privacy preservation  Avoid congestion-triggered denial of service

IETF87 i2rs WG8 Next Steps  Comments and input from the WG  Address comments received from Alia Atlas  Update the draft completing some sections, and potentially adding use cases