[dc] comments and suggestions to draft-narten-nv03-overlay-problem-statment-01

Linda Dunbar <linda.dunbar@huawei.com> Fri, 27 January 2012 00:23 UTC

Return-Path: <linda.dunbar@huawei.com>
X-Original-To: dc@ietfa.amsl.com
Delivered-To: dc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C5B121F86C7 for <dc@ietfa.amsl.com>; Thu, 26 Jan 2012 16:23:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.508
X-Spam-Level:
X-Spam-Status: No, score=-2.508 tagged_above=-999 required=5 tests=[AWL=0.090, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iOCNklV--O5J for <dc@ietfa.amsl.com>; Thu, 26 Jan 2012 16:23:54 -0800 (PST)
Received: from dfwrgout.huawei.com (dfwrgout.huawei.com [206.16.17.72]) by ietfa.amsl.com (Postfix) with ESMTP id 9431021F86C1 for <dc@ietf.org>; Thu, 26 Jan 2012 16:23:53 -0800 (PST)
Received: from 172.18.9.243 (EHLO dfweml202-edg.china.huawei.com) ([172.18.9.243]) by dfwrg02-dlp.huawei.com (MOS 4.2.3-GA FastPath) with ESMTP id ACR20228; Thu, 26 Jan 2012 19:23:53 -0500 (EST)
Received: from DFWEML404-HUB.china.huawei.com (10.193.5.203) by dfweml202-edg.china.huawei.com (172.18.9.108) with Microsoft SMTP Server (TLS) id 14.1.323.3; Thu, 26 Jan 2012 16:22:57 -0800
Received: from DFWEML505-MBX.china.huawei.com ([10.124.31.100]) by dfweml404-hub.china.huawei.com ([10.193.5.203]) with mapi id 14.01.0323.003; Thu, 26 Jan 2012 16:22:53 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Thomas Narten <narten@us.ibm.com>, "david.black@emc.com" <david.black@emc.com>, Murari Sridharan <muraris@microsoft.com>, Dinesh Dutt <ddutt@cisco.com>, "kreeger@cisco.com" <kreeger@cisco.com>
Thread-Topic: comments and suggestions to draft-narten-nv03-overlay-problem-statment-01
Thread-Index: Aczcic4dhzNCqBUxQSqOznX8P2avFQ==
Date: Fri, 27 Jan 2012 00:22:52 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F632E17F2D@dfweml505-mbx>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.192.11.97]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F632E17F2Ddfweml505mbx_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "dc@ietf.org" <dc@ietf.org>
Subject: [dc] comments and suggestions to draft-narten-nv03-overlay-problem-statment-01
X-BeenThere: dc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF Data Center Mailing List <dc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dc>, <mailto:dc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dc>
List-Post: <mailto:dc@ietf.org>
List-Help: <mailto:dc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dc>, <mailto:dc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Jan 2012 00:23:56 -0000

Thomas, et al,

Here are my comments to draft-narten-nv03-overlay-problem-statment-01 and suggested wording change:

3.1. Limitations of Existing Virtual Network Models.

Since IEEE802.1 defined VLAN separation is mentioned, it would be appropriate to mention PBB's ISID separation.

The limitation for PBB and VLAN should include that MAC addresses can't be aggregated, therefore forwarding table can be very large for large data centers.

Second paragraph: Why "VLANs are a pure bridging construct while VRF is pure routing construct" is a problem?

4. Network Overlays

Should add a subsection to describe Virtual Network Instance ID.

4.x. Virtual Network Instance ID

Virtual Network Instance is for segregating traffic belonging to different tenants or different zones of one tenant. When a data center uses Overlay Network to hide hosts addresses, it is important that Virtual Network Instance identifier can properly represent the zones or the tenants in entire data center, especially when the overlay edge nodes are access switches, i.e. not embedded in hypervisors.

When overlay edge nodes are access switches, the data frames before entering the Overlay Network or after exiting the Overlay Network might carry traditional VLAN-ID for proper traffic segregation. The Virtual Network Instance ID value carried by the Overlay Header  of the data frames might be 24 bits (as described in 3.2). Those VLAN-ID for data frames under each overlay edge node are only locally significant. Proper mapping has to be maintained.

6.2 (TRILL) &6.3 (L2VPN)

It is necessary to point out that both TRILL and L2VPN carry the VLAN-ID embedded in the original Ethernet frames across the Overlay Network and the VLAN-ID maintain the same meaning in two separate L2 islands.

When VLAN-ID tagged Ethernet frames traverse across the Overlay Network for Data Center, the VLAN-ID carried by Ethernet frames lose its significance. In another words, a different VLAN-ID might be re-assigned to the Ethernet frames by the Egress overlay edge.


5.3. Associating a VNID with an endpoint.

You stated that "typically, it is a virtual NIC coming up that triggers this association". It is not quite right. Virtual NIC, same as physical NIC for a non-virtualized server, usually is not aware of which network segment it is attached to. For Ethernet data frames coming out from a traditional server (i.e. server without virtualization), the data frame is not tagged, i.e. not having VID associated with it. It is the first switch which assign the VID for the data frame.

It is more accurate to say  "virtual switch" or "Hypervisor" within the server which can trigger the association.

Since overlay header can be also added by first access switches (i.e. switches not embedded in physical servers), it is very possible that  data frames arriving at the overlay edge (i.e. the first access switch) is already VLAN tagged. Then association (or mapping) from the VLAN-Tag to VNID has to be operator administrated.


Linda Dunbar