Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari.

Slides:



Advertisements
Similar presentations
Scaling The Edge Bridge Address Table In Datacenter Networks June-2012.
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
A Unified LISP Mapping Database for L2 and L3 Network Virtualization Overlays Draft-hertoghs-nvo3-lisp-unfied- control-plane Yves Hertoghs.
Scalable Edge Bridge FDB For Datacenter Networks July-2012.
DOT – Distributed OpenFlow Testbed
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
Introduction into VXLAN Russian IPv6 day June 6 th, 2012 Frank Laforsch Systems Engineer, EMEA
NCCA 2014 Performance Evaluation of Non-Tunneling Edge-Overlay Model on 40GbE Environment Nagoya Institute of Technology, Japan Ryota Kawashima and Hiroshi.
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric. Presented by: Vinuthna Nalluri Shiva Srivastava.
© 2007 Cisco Systems, Inc. All rights reserved. Valašské Meziříčí Connecting to the Network.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
NVO3 NVA Gap Analysis Linda Dunbar Donald Eastlake.
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri February 2015 NVO3 Interim Meeting draft-yong-rtgwg-igp-mutlicast-arch-01.
NVO3: VPN Interactions (Some initial thoughts) David L. Black, EMC IETF NVO3 BOF – Paris March 28, 2012.
1 CSCI 6433 Internet Protocols Class 7 Dave Roberts.
1 Computer Networks IP Multicast. 2 Recall Unicast Broadcast Multicast sends to a specific group.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri November 2014 Honolulu USA draft-yong-rtgwg-igp-mutlicast-arch-00.
Common Devices Used In Computer Networks
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Lucy Yong Susan Hares September 20, 2012 Boston
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri November 2014 Honolulu USA draft-yong-rtgwg-igp-mutlicast-arch-00.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
VXLAN – Deepdive Module 5
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
ARMD – Next Steps Next Steps. Why a WG There is a problem People want to work to solve the problem Scope of problem is defined Work items are defined.
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
BCP for ARP/ND Scaling for Large Data Centers
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
DHCP Options for Configuring Tenant Identifier and Multicast Addresses in Overlay Networks Behcet Sarikaya Frank Xia.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Objectives Blue Color VLAN’s Should reach Message Server from all locations Red Color VLAN’s Should not Reach Message Server In Each L2 Switch Blue Color.
Network Virtualization Overlay Use Cases Lucy Yong, Mehmet Toy, Aldrin Isaac, Vishwas Manral, Linda Dunbar September 20, 2012 Boston draft-mity-nvo3-use-case.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Multicasting within UCS Qiese Dides.
Ethernet Virtual LANs Hubs versus Switches –Hubs broadcast bits out all ports –Switches usually send a frame out a one port More fundamentally –In unicasting,
Multicast Issues in Networks Using NVO3 Anoop Ghanwani Dell draft-ghanwani-nvo3-mcast-issues-001 IETF 86 Orlando, FL.
NVO3 Architecture draft-narten-nvo3-arch-00.txt IETF87 – Berlin July 31, 2013 David Black, Jon Hudson, Larry Kreeger, Marc Lasserre, Thomas Narten.
1 Scalability of a Mobile Cloud Management System Roberto Bifulco* Marcus Brunner** Roberto Canonico* Peer Hasselmeyer** Faisal Mir** * Università di Napoli.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
Multicast Issues in Networks Using NVO3 Anoop Ghanwani, Dell Linda Dunbar, Huawei Vinay Bannai, Paypal Ram Krishnan, Brocade draft-ghanwani-nvo3-mcast-issues-011.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
LISP Control Plane for NVO3 <draft-maino-nvo3-lisp-cp-00>
Anoop Ghanwani Linda Dunbar Mike McBride Vinay Bannai Ramki Krishnan
Virtual Local Area Networks (VLANs) Part I
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Huajin Jeng, Jeffrey Haas, Yakov Rekhter, Jeffrey Zhang
Scaling Data Center Networks
Virtual LANs.
The good, the bad and the ugly…
Network Virtualization
Extending MPLS/BGP VPNs to End-Systems
Medium-Sized Switched Network Construction
EVPN a very short introduction
Network Overlay Framework
Connecting to the Network
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Tim Strakh CEO, IEOFIT CCIE RS, CCIE Sec CCIE Voice, CCIE DC
Presentation transcript:

Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari Sridharan

Purpose Outline the high level requirements for control protocols needed for overlay virtual networks in highly virtualized data centers.

Basic Reference Diagram Underlying Network (UN) NVE Virtual Networks (VNs) (aka Overlay Networks) Network Virtualization Edge (NVE) Tenant End System (TES) TES TES “Inner” Addresses NVE UN “Outer” Addresses Payloa d VN VN Context Payloa d VN

Possible NVE / TES Scenarios Virtual Switch VM 1 VM 2 Hypervisor Virtual Switch VM 3 VM 4 Hypervisor NVE Access Switch VLAN Trunk Server 1 Physical Servers NVE Access Switch Server 1 Locally Significant Service 3 Network Services Appliance NVE Access Switch VLAN Trunk Locally Significant Service 4 Service 1 Network Services Appliance Service 2 NVE Underlying Network End Device

Dynamic State Information Needed by an NVE Tenant End System (TES) inner address (scoped by Virtual Network (VN)) to outer (Underlying Network (UN)) address of the other Network Virtualization Edge (NVE) used to reach the TES inner address. For each VN active on an NVE, a list of UN multicast addresses and/or unicast addresses used to send VN broadcast/multicast packets to other NVEs forwarding to TES for the VN. Either a global VN Context per VN (Virtual Network ID - VNID), or locally significant VN Context to use in packets sent across the UN. If the TES is not within the same device as the NVE, the NVE needs to know the physical port to reach a given inner address. – If multiple VNs are reachable over the same physical port, some kind of tag (e.g. VLAN tag) is needed to keep the VN traffic separated over the wire.

Control Plane Category Reference Diagram Virtual Switch VM 1 VM 2 Hypervisor NVE Service 3 Network Services Appliance NVE Access Switch VLAN Trunk Locally Significant Service 4 “Oracle” “Server to NVE” Control Plane “NVE to oracle” Control Plane Central Entity? Distributed? Underlying Network End Device API to Orchestration System? “NVE to oracle” Control Plane

Main Categories of Control Protocols For NVE: 1.For an NVE to obtain dynamic state for communicating with a TES located on an End Device (e.g. hypervisor or Network Services Appliance). [server to NVE] 2.For an NVE to obtain dynamic state for communicating across the Underlying Network to other NVEs. [NVE to oracle] For “oracle”: 3.Within components of a distributed “oracle” [Intra- oracle] 4.API to Orchestration System [oracle to orchestration]

“NVE to oracle” Control Protocol Possibilities “oracle” is populated by Push from NVE (if not populated by a DC orchestration system) NVE mappings populated by Push from central entity NVE mappings are populated by Pull from central entity Peer to Peer exchange between NVEs with no “oracle” “oracle” could be a monolithic system or a distributed system – If Distributed, a control protocol may be needed between the oracle’s elements (Intra-oracle)

Possible Example CP Scenario Virtual Switch Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 NVE State This example is not part of the Req draft and is shown for illustrative purposes Assumes: Central entity with push/pull from NVE, Multicast Enabled IP Underlay “Server to NVE” “NVE to oracle”

VM 1 comes up on Hypervisor H1, connected the VN “Red” Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 MAC=M1 NVE State H1’s Virtual Switch signals to A1 that it needs attachment to VN “Red” Attach: VN = “Red” Req VN-ID and Mcast Group for VN = “Red” VN-ID = Mcast = Local VLAN Tag = 100 VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 IGMP Join “Server to NVE” “NVE to oracle”

VM 1 comes up on Hypervisor H1, connected the VN “Red” Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 MAC=M1 NVE State H1’s Virtual Switch signals to A1 that MAC M1 is connected to VN “Red” Attach: MAC = M1 in VN “Red” Register MAC = M1 in VN “Red” reachable at IP-A1 VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 MAC = M1 in “Red” on Port 10 “Server to NVE” “NVE to oracle”

VM 2 comes up on Hypervisor H1, connected the VN “Red” Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 MAC=M1 NVE State H1’s Virtual Switch signals to A1 that MAC M2 is connected to VN “Red” Attach: MAC = M2 in VN “Red” Register MAC = M2 in VN “Red” reachable at IP-A1 VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 MAC = M1 in “Red” on Port 10 MAC = M2 in “Red” on Port 10 VM 2 MAC=M2 “Server to NVE” “NVE to oracle”

VM 3 comes up on Hypervisor H2, connected the VN “Red” Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 MAC=M1 NVE State H2’s Virtual Switch signals to A2 that it needs attachment to VN “Red” VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 MAC = M1 in “Red” on Port 10 MAC = M2 in “Red” on Port 10 VM 2 MAC=M2 VM 3 MAC=M3 Attach: VN = “Red” Req VN-ID and Mcast Group for VN = “Red” VN-ID = Mcast = Local VLAN Tag = 200 VN “Red”: VN-ID = Mcast Group = Port 20, Tag=200 IGMP Join “Server to NVE” “NVE to oracle”

VM 3 comes up on Hypervisor H2, connected the VN “Red” Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 MAC=M1 NVE State H2’s Virtual Switch signals to A2 that MAC M3 is connected to VN “Red” VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 MAC = M1 in “Red” on Port 10 MAC = M2 in “Red” on Port 10 VM 2 MAC=M2 VM 3 MAC=M3 VN “Red”: VN-ID = Mcast Group = Port 20, Tag=200 MAC = M3 in “Red” on Port 20 Attach: MAC = M3 in VN “Red” Register MAC = M3 in VN “Red” reachable at IP-A2 “Server to NVE” “NVE to oracle”

VM 3 ARPs for VM1 Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 NVE State NVE A2 uses multicast to send the ARP Bcast to all NVEs interested in VN “Red” NVE A1 Queries to find inner to outer mapping for MAC M3 VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 MAC = M1 in “Red” on Port 10 MAC = M2 in “Red” on Port 10 VM 2 VM 3 VN “Red”: VN-ID = Mcast Group = Port 20, Tag=200 MAC = M3 in “Red” on Port 20 ARP tagged with VLAN 200 ARP Encapsulated with VN-ID 10000, sent to Group ARP ARP Encapsulated with VN-ID 10000, sent to Group ARP tagged with VLAN 100 ARP Multicast by Underlying Network “Server to NVE” “NVE to oracle”

VM 1 Sends ARP Response to VM3 Virtual Switch VM 1 Hypervisor H1 NVE Access Switch A1, NVE IP = IP-A1 Virtual Switch Hypervisor H2 NVE Access Switch A2, NVE IP = IP-A2 Virtual Switch Hypervisor H3 NVE Access Switch A3, NVE IP = IP-A3 Port 10 Port 20 Port 30 NVE State NVE A1 Queries central entity to find inner to outer mapping for MAC M3 NVE A1 Unicasts ARP Response to A2 VN “Red”: VN-ID = Mcast Group = Port 10, Tag=100 MAC = M1 in “Red” on Port 10 MAC = M2 in “Red” on Port 10 MAC = M3 in “Red” on NVE IP-A2 VM 2 VM 3 VN “Red”: VN-ID = Mcast Group = Port 20, Tag=200 MAC = M3 in “Red” on Port 20 ARP Resp tagged with VLAN 200 ARP Resp Encapsulated with VN-ID 10000, sent to IP-A2 ARP Resp ARP Resp Encapsulated with VN-ID 10000, sent to IP-A2 ARP Resp tagged with VLAN 100 ARP Resp Unicast by Underlying Network Query for outer address for MAC M3 in “Red” Response: Use IP-A2 “Server to NVE” “NVE to oracle”

Summary of CP Characteristics Lightweight for NVE – This means: Low amount of state (only what is needed at the time) Low on complexity (keep it simple) Low on overhead (don’t drain resources from NVE) Highly Scalable (don’t collapse when scaled) Extensible Support multiple address families (e.g. IPv4 and IPv6) Allow addition of new address families Quickly reactive to change Support Live Migration of VMs

Summary Two categories of NVE control protocols are needed to support a dynamic virtualized data center to dynamically build the state needed by an NVE to perform its map+encap and decap+deliver function. – Server to NVE – NVE to “oracle” Two categories of “oracle” control protocols may be needed. – Intra-oracle – Orchestration system to “oracle” Draft-kreeger-nvo3-overlay-cp-req covers both “server to NVE” and “NVE to oracle”, but not that later two.

Proposals Move figures showing co-located TES and NVE and physically separate NVE from draft-kreeger-nvo3-cp- req to Framework document. Separate the two NVE control planes requirements (NVE-to-oracle and server-to-NVE) covered by draft- kreeger-nvo3-cp-req into different documents. Work with other server-to-NVE draft authors to create a candidate WG server-to-NVE control plane requirements draft. Move the split out NVE-to-oracle control plane reqs document to WG draft. Agree on a better name than “oracle”. Perhaps “Mapping System”. Change “Server-to-NVE” to “End Device to NVE”.