NVO3 Requirements for Tunneling Igor Gashinsky and Bruce Davie IETF.

Slides:



Advertisements
Similar presentations
Shortest Path Bridging IEEE 802
Advertisements

Overlay Transport Virtualization (OTV)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle’s Next-Generation SDN Platform Andrew Thomas Architect Corporate Architecture.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
Virtual LANs.
OpenFlow overview Joint Techs Baton Rouge. Classic Ethernet Originally a true broadcast medium Each end-system network interface card (NIC) received every.
NCCA 2014 Performance Evaluation of Non-Tunneling Edge-Overlay Model on 40GbE Environment Nagoya Institute of Technology, Japan Ryota Kawashima and Hiroshi.
OpenFlow : Enabling Innovation in Campus Networks SIGCOMM 2008 Nick McKeown, Tom Anderson, et el. Stanford University California, USA Presented.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Improving performance of overlay-based virtual networks
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
CS 582 / CMPE 481 Distributed Systems Communications.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly.
VLANs (Virtual LANs) CS 158B Elaine Lim Allison Nham.
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Chapter 4 Queuing, Datagrams, and Addressing
The OSI Reference Model Key concepts: Layers Communications between two adjacent layers Encapsulation Multiplexing and demultiplexing Tunneling.
Data Center Network Redesign using SDN
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
Aditya Akella (Based on slides from Aaron Gember and Nick McKeown)
Chapter 21: IP Encapsulation, Fragmentation & Reassembly
NVO3 dataplane encapsulation requirements discussion Erik Nordmark, Arista Networks.
NetCloud 2013 Non-Tunneling Edge-Overlay Model using OpenFlow for Cloud Datacenter Networks Nagoya Institute of Technology, Japan Ryota Kawashima and Hiroshi.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Dr. John P. Abraham Professor UTPA
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2010 Dr. Hiroshi Fujinoki Tunneling & Virtual.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Chapter 9 Hardware Address & Frame Type Identification Hardware address of frame Addressing schemes Ethernet Frame header format.
Stateless Transport Tunneling draft-davie-stt-01.txt Bruce Davie, Jesse Gross, Igor Gashinsky et al.
Routers Operate in a Mesh –Many possible alternative routes between two stations Only One of Many Possible Alternative Routes Packet.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
L2TP-VP: Layer Two Tunneling Protocol - Virtualization Profile draft-fan-l2tp-vp-00 Duoliang Fan, Liang Xia, Zhen Cao, Namgon Kim November 2013 Vancouver.
@packetjay Fun and games until someone uses IPv6 or TCP.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
Introduction to Mininet, Open vSwitch, and POX
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
MPLS over L2TPv3 Encapsulation IETF VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol ==
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.
K. Salah1 Security Protocols in the Internet IPSec.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Flow OAM Requirements Janardhanan Pathangi Balaji Venkat Venkataswami DELL Richard Groves – Microsoft Peter Hoose – Facebook
Considerations for Benchmarking Virtual Networks Samuel Kommu, Jacob Rapp, Ben Basler,
Network Virtualization Ben Pfaff Nicira Networks, Inc.
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
Konstantin agouros Omkar deshpande
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Packets & Routing Lower OSI layers (1-3) concerned with packets and the network Packets carry data independently through the network, and into other networks…
Scaling the Network: The Internet Protocol
Part I. Overview of Data Communications and Networking
CS 457 – Lecture 10 Internetworking and IP
Network Virtualization
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
NTHU CS5421 Cloud Computing
Dr. John P. Abraham Professor UTPA
Protocols 1 Key Revision Points.
Scaling the Network: The Internet Protocol
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
CS 381: Introduction to Computer Networks
ITIS 6167/8167: Network and Information Security
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

NVO3 Requirements for Tunneling Igor Gashinsky and Bruce Davie IETF

Why tunnels? Manage overlapping addresses between multiple tenants Decouple virtual topology provided by tunnels from physical network topology Decouple virtual network service from physical network (e.g. provide an L2 service over an L3 fabric) Support VM mobility independent of the physical network Support larger numbers of virtual networks (vs. VLANs for example) Reduce state requirements for physical network (e.g. MAC addresses) Because all CS problems can be solved with another level of indirection

Disclaimers We have a horse in this race, but we’ve tried hard to be objective AFAICT, no existing protocol meets all the requirements in this presentation We’ve put a lot of emphasis on compatibility with existing HW – others may differ on the importance of that

Requirements Overview Control Plane independence Backwards compatibility Lots of installed devices & services to consider Context identification

Control Plane Independence Data planes tend to get baked into HW, control planes evolve Best not to specify control plane as part of tunnel encaps

Backwards Compatibility (1) With switches and routers IP-based encaps likely to be most compatible ECMP – mostly looks at IP src/dst and TCP or UDP ports, so make use of that With NICs Most tunneling methods break TSO, causing major performance hit for host-terminated tunnels For current generation NICs, only way to keep TSO is to completely match TCP header – see draft-davie-stt-01

Backwards Compatibility (2) Middle Boxes Should be possible to transit them They may need to inspect payload (e.g. for stateful firewall) Stream or Frame Reassembly may be needed for L4/L7 services Hardware or software-based “NV Edge” “Edge” may be in hypervisor, physical switch, appliance etc. With WAN services (e.g. Public IP, L3VPNs, VPLS) These services carry IP or Ethernet, so compatible with IP- based encaps

Context Identification As packets exit from tunnels, need to deliver them to the right “context” A context may be simply a “tenant”, or a “virtual network instance” but these are special cases Can also use it for other metadata (state versioning, distributed lookup, etc.) Note that L3VPNs don’t have any single field that is the VPN- ID, and that’s a good thing Allows much more complex notions of VPN membership than “a member of exactly one VPN” An opaque context ID with control-plane defined semantics also supports control-plane independence goal