Stateless Transport Tunneling draft-davie-stt-01.txt Bruce Davie, Jesse Gross, Igor Gashinsky et al.

Slides:



Advertisements
Similar presentations
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
REVEALING MIDDLEBOXES INTERFERENCE WITH TRACEBOX Gregory Detal*, Benjamin Hesmans*, Olivier Bonaventure*, Yves Vanaubel° and Benoit Donnet°. *Université.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
NCCA 2014 Performance Evaluation of Non-Tunneling Edge-Overlay Model on 40GbE Environment Nagoya Institute of Technology, Japan Ryota Kawashima and Hiroshi.
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Improving performance of overlay-based virtual networks
Network Layer Packet Forwarding IS250 Spring 2010
CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
1 Application TCPUDP IPICMPARPRARP Physical network Application TCP/IP Protocol Suite.
Networking and Internetworking: Standards and Protocols i206 Fall 2010 John Chuang Some slides adapted from Coulouris, Dollimore and Kindberg.
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
Chapter 3 Review of Protocols And Packet Formats
NVO3 Requirements for Tunneling Igor Gashinsky and Bruce Davie IETF.
Module A Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Chapter 21: IP Encapsulation, Fragmentation & Reassembly
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
NVO3 dataplane encapsulation requirements discussion Erik Nordmark, Arista Networks.
NetCloud 2013 Non-Tunneling Edge-Overlay Model using OpenFlow for Cloud Datacenter Networks Nagoya Institute of Technology, Japan Ryota Kawashima and Hiroshi.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Protocols 1 Objective: Build a protocol foundation for Client / Server programming in an Internet Environment Note: RFCs available from
More on TCP Acknowledgements Sequence Number Field Initial Sequence Number Acknowledgement Number Field.
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Dr. John P. Abraham Professor UTPA
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
1 CS 4396 Computer Networks Lab TCP/IP Networking An Example.
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
CS 4396 Computer Networks Lab
NAT Network Address Translation. Reading CNI – pp Port Mapping LA – pp NAT.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
1 CSE 5346 Spring Network Simulator Project.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
MPLS over L2TPv3 Encapsulation IETF VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol ==
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.
COMPUTER NETWORKS CS610 Lecture-30 Hammad Khalid Khan.
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
GRE.
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Introduction to TCP/IP networking
IP - The Internet Protocol
TCP/IP Transmission Control Protocol / Internet Protocol
Standards Basics.
IP - The Internet Protocol
Multipath TCP Yifan Peng Oct 11, 2012
IP - The Internet Protocol
Network Virtualization
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
IP - The Internet Protocol
Network Architecture Models: Layered Communications
IP - The Internet Protocol
Transport Layer 9/22/2019.
Presentation transcript:

Stateless Transport Tunneling draft-davie-stt-01.txt Bruce Davie, Jesse Gross, Igor Gashinsky et al.

Outline Motivation Why Network Virtualization needs tunnels Performance for software Backwards Compatibility Flexible Control Plane Context Identification Frame and Segment formats Open Issues & Next Steps

Why tunnels? Manage overlapping addresses between multiple tenants Decouple virtual topology provided by tunnels from physical network topology Decouple virtual network service from physical network (e.g. provide an L2 service over an L3 fabric) Support VM mobility independent of the physical network Support larger numbers of virtual networks (vs. VLANs for example) Reduce state requirements for physical network (e.g. MAC addresses) Because all CS problems can be solved with another level of indirection

Performance for SW Tunnels for Network Virtualization often originate in the hypervisor Lots of NICs support TSO/LRO (TCP Segmentation Offload/Large Receive Offload) Most NICs won’t do TSO with any existing tunneling encaps  significant performance loss when tunneling STT uses a header that can be generated by today’s NICs when performing TSO A few other details in the draft to improve SW performance

Backwards Compatibility NICs Routers and switches Source Port chosen to be constant per microflow, randomized for ECMP WAN services They carry IP or Ethernet Middleboxes Some work required (often true for tunnels) Many also use SW implementation, reap TSO benefits

Flexible Control Plane Control plane should not be specified as part of tunnel encaps Allow control plane to evolve Even putting “Virtual Network Instance ID” in data plane starts to constrain the control plane Note that MPLS VPNs have a much more rich notion of VPN membership than a single VPN-ID can offer

Context Identification As packets exit from tunnels, need to deliver them to the right “context” A context may be simply a “tenant” or “virtual network instance”, but they are special cases Can also use it for other metadata (state versioning, distributed lookup, etc.) An opaque context ID with control-plane defined semantics also supports control-plane independence goal

STT Encapsulation | IP Header | |IP Header | |IP header | |STT Frame | |TCP-like | |TCP-like | |TCP-like | | Header | | header | | header | | header | | | ---> | STT Frame | |Next part |... |Last part | |Payload | | Header | |of Payload| |of Payload| | | | |.. | | | | | |.. | Start of | | | | | | Payload | | | Original data STT Frame is segmented and transmitted as frame is encapped a set of TCP segments (MAC with STT Header headers not shown)

STT Frame | Version | Flags | L4 Offset | Reserved | | Max. Segment Size | PCP |V| VLAN ID | | | + Context ID (64 bits) + | | | Padding | data | | | Up to 64kB, transmitted as a series of STT Segments

STT Segment | Source Port | Destination Port | | Sequence Number(*) | | Acknowledgment Number(*) | | Data | |U|A|P|R|S|F| | | Offset| Reserved |R|C|S|S|Y|I| Window | | | |G|K|H|T|N|N| | | Checksum | Urgent Pointer | | Options | Padding | | data | SEQ and ACK are repurposed to support reassembly of STT Frames

Open Issues Clearly this will confuse devices that expect a complete TCP state machine to exist Most common result would be drop the packets Well-known port to be requested from IANA When middle boxes are in the path, need to A. Teach them at least to pass the packets, or B. Enable them to reassemble Frames for further processing

Next Steps Everything that is in STT could be done without “repurposing” the TCP header We’d like to see the STT requirements considered in NVO3 See you in a few years when the NIC vendors build this Meanwhile, would be good to get more implementations (e.g. middleboxes) Not clear if any IETF WG is chartered to work on this yet, but L2VPN is closest fit