NVO3 Architecture draft-narten-nvo3-arch-00.txt IETF87 – Berlin July 31, 2013 David Black, Jon Hudson, Larry Kreeger, Marc Lasserre, Thomas Narten.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

Oct, 26 th, 2010 OGF 29, FVGA-WG: Firewall Virtualization for Grid Applications Firewall Virtualization for Grid Applications - Status update
A Unified LISP Mapping Database for L2 and L3 Network Virtualization Overlays Draft-hertoghs-nvo3-lisp-unfied- control-plane Yves Hertoghs.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Author : Martín Casado, Teemu Koponen, Scott Shenker, Amin Tootoonchian Publisher : Presenter : Pei-Hua Huang Date : 2013/10/02 Fabric: A Retrospective.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
Software Architecture for DSD DSD Team. Overview What is software architecture and why is it so important? The role of architecture in determining system.
Gap Analysis of Simplified Use of Policy Abstractions (SUPA) Presenter: Jun Bi draft-bi-supa-gap-analysis-02 IETF 92 SUPA BoF Dallas, TX March 23, 2015.
SWE Introduction to Software Engineering
Architectural Design Principles. Outline  Architectural level of design The design of the system in terms of components and connectors and their arrangements.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Chapter 22 Object-Oriented Design
NVO3 NVA Gap Analysis Linda Dunbar Donald Eastlake.
BGP L3VPN Virtual PE draft-fang-l3vpn-virtual-pe-01
Abstraction and Control of Transport Networks (ACTN) BoF
DMM Framework based on Functional Elements draft-liebsch-dmm-framework-analysis-02 M. Liebsch, P. Seite, G. Karagiannis IETF88, Vancouver DMM WG 08 th.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri February 2015 NVO3 Interim Meeting draft-yong-rtgwg-igp-mutlicast-arch-01.
Software Architecture for DSD The “Uses” Relation.
NVO3: VPN Interactions (Some initial thoughts) David L. Black, EMC IETF NVO3 BOF – Paris March 28, 2012.
The Design Discipline.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Network Virtualization Overlays (NVO3) NVO3 Meeting, IETF 88, Vancouver Benson Schliesser Matthew Bocci
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Standard for a Convergent Digital Home Network for Heterogeneous Technologies Zhimeng Du 12/5/2013.
By Xiangzhe Li Thanh Nguyen.  Introduction  Terminology  Architecture  Component  Connector  Configuration  Architectural Style  Architectural.
Virtual Topologies for Service Chaining in BGP IP/MPLS VPNs draft-rfernando-bess-service-chaining-00 (previously draft-rfernando-l3vpn-service-chaining-04)
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
Tag Switching Architecture Overview Qingfeng Zhuge Fangxia Li Xin Jiang.
Lecture 7: Requirements Engineering
Architectural Design Identifying system components and their interfaces.
CS 4310: Software Engineering Lecture 4 System Modeling The Analysis Stage.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 05. Review Software design methods Design Paradigms Typical Design Trade-offs.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
1 Computing Challenges for the Square Kilometre Array Mathai Joseph & Harrick Vin Tata Research Development & Design Centre Pune, India CHEP Mumbai 16.
Doc.: IEEE /595r2 Submission May 2002 Lily Yang, Tyan-Shu JouSlide 1 Mesh Relevance in CAPWAP and AP Functional Descriptions L. Lily Yang (Intel.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
InterDomain-QOSM: The NSIS QoS Model for Inter-domain Signaling J. Zhang, E. Monteiro, P. Mendes, G. Karagiannis, J. Andres-Colas 66 th IETF – Montreal,
1 MPLS: Progress in the IETF Yakov Rekhter
D1 - 08/12/2015 Requirements for planned maintenance of BGP sessions draft-dubois-bgp-pm-reqs-02.txt
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Smart Home Technologies
GMPLS for Ethernet A Framework for Generalized MPLS (GMPLS) Ethernet draft-papadimitriou-ccamp- gmpls-ethernet-framework-00.txt.
Component Design Elaborating the Design Model. Component Design Translation of the architectural design into a detailed (class-based or module- based)
Lucy Yong Tom Herbert Generic UDP Encapsulation (GUE) for Network Virtualization Overlay (NVO) draft-hy-nvo3-gue-4-nvo-00.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari.
NVO3 Architecture draft-ietf-nvo3-arch-01.txt IETF89 – London March 3, 2013 David Black, Jon Hudson, Larry Kreeger, Marc Lasserre, Thomas Narten.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Multicast Issues in Networks Using NVO3 Anoop Ghanwani, Dell Linda Dunbar, Huawei Vinay Bannai, Paypal Ram Krishnan, Brocade draft-ghanwani-nvo3-mcast-issues-011.
Inter-AS Option C between NVO3 and BGP/MPLS IP VPN network draft-hao-bess-inter-nvo3-vpn-optionc-00 Weiguo Hao Lucy Yong Susan Hares Nov, 2014 Honolulu.
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Network Virtualization Overlays (NVO3) NVO3 Meeting, IETF 90, Toronto Benson Schliesser Matthew Bocci
Server2nve Kompella, Rekhter, Morin, Black IETF 85, NVO3 WG.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Draft-fm-bess-service-chaining-01 Prague, July 2015 Rex Fernando Stuart Mackie Dhananjaya Rao Bruno Rijsman Maria Napierala.
A proposed Security Incident Management Process for WMO Member States
Multi-layer software defined networking in GÉANT
draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)
Data, Databases, and DBMSs
Software Architecture
Ethernet Network Network Interface: Heavy or Light?
Mesh Relevance in CAPWAP and AP Functional Descriptions
Network Overlay Framework
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
NVO3 Control Plane Roundtable Discussion Summary and Next-steps
draft-guichard-sfc-nsh-sr-02
BIER Prefix Redistribute draft-zwzw-bier-prefix-redistribute-01
Presentation transcript:

NVO3 Architecture draft-narten-nvo3-arch-00.txt IETF87 – Berlin July 31, 2013 David Black, Jon Hudson, Larry Kreeger, Marc Lasserre, Thomas Narten

NVO3 Architecture Purpose Architecture identifies key system components (NVE, NVA, etc.) and how they fit together for an overall system – WG has discussed but not formally confirmed various decisions Components interact with another through well-defined interfaces – Interfaces between components represent “on-the-wire” protocols (i.e., potential IETF work areas) Internal implementation of component not IETF matter, so long as interface behavior maintained – Allows for independent evolution of individual components Architectural decisions lead to requirements, requirements feed directly into gap analysis

NVE and NVA Components NVE NVA1 NVA2 NVA3 NVE NVE-to-NVA Protocol Inter-NVA Protocol

Data Plane Encapsulations Assertion: WG should not pick or bless one encapsulation – Multiple encaps exist today, deployments will have multiple encaps Implication: Architecture must support multiple encapsulations – NVEs should use common encapsulation and direct tunneling where possible – Traffic should flow through translating gateways when NVEs do not support same encapsulation – Should not require operator intervention – should just work Summary: Control plane must be aware of and support existence of different encapsulations on different NVEs – Impacts the control plane requirements

NVE-to-NVA Protocol Goal: NVEs should implement NVO3 functionality once, then not again – Many NVEs in a deployment – upgrading them will be difficult going forward – Future innovation/evolution will be within NVAs SHOULD NOT require NVE upgrades Assertion: there will likely be a range of NVA types – Should hide details from NVE Implies need for well-defined NVE-to-NVA protocol with clear interface

Internal NVA Organization Reliability requirement implies: – Distributed implementation (e.g, IGP/BGP like), or – Use of clustering technology NVA-internal architecture/implementation is important, but does not necessarily require IETF standardization – BGP extensions (if needed) would be IETF activity – Development of database clustering approach (likely) not appropriate for IETF standardization

NVA Federations NV Domain – Administrative construct: NVA, NVEs, virtual networks NV Region: Two or more NV Domains that share information about virtual networks, to allow VN to span multiple NV domains NVAs will need to share information with each other – On a per virtual network basis – Under policy/configuration control Federation of NVAs implies – Well-defined/clean interface between NVAs – On-the-wire protocol between NVAs – Assertion: potential are for IETF work

NV Domains & Regions NVE NVA1 NVA2 NVA3 NVE NVE-to-NVA Protocol Inter-NVA Protocol NV Domain 1 NV Domain 2

Push vs. Pull We’ve had much discussion (at abstract level) about whether “push” or “pull” is better “all push” and “all pull” are two ends of a spectrum – Neither is what we are likely to see in practice Architecture should recognize that both will need to be supported – Specific NVA solutions will define where on spectrum a particular NVA approach will lie – NVE should support range of models

Questions?