Re: [dc] comments and suggestions to draft-narten-nv03-overlay-problem-statment-01

Rakesh Saha <rsaha@us.ibm.com> Fri, 27 January 2012 07:43 UTC

Return-Path: <rsaha@us.ibm.com>
X-Original-To: dc@ietfa.amsl.com
Delivered-To: dc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88D2621F8518 for <dc@ietfa.amsl.com>; Thu, 26 Jan 2012 23:43:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.298
X-Spam-Level:
X-Spam-Status: No, score=-8.298 tagged_above=-999 required=5 tests=[AWL=1.700, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_52=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u6OOhfZRcgkH for <dc@ietfa.amsl.com>; Thu, 26 Jan 2012 23:43:40 -0800 (PST)
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.149]) by ietfa.amsl.com (Postfix) with ESMTP id 50F4921F84EC for <dc@ietf.org>; Thu, 26 Jan 2012 23:43:40 -0800 (PST)
Received: from /spool/local by e31.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <dc@ietf.org> from <rsaha@us.ibm.com>; Fri, 27 Jan 2012 00:43:38 -0700
Received: from d03dlp03.boulder.ibm.com (9.17.202.179) by e31.co.us.ibm.com (192.168.1.131) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Fri, 27 Jan 2012 00:43:06 -0700
Received: from d03relay03.boulder.ibm.com (d03relay03.boulder.ibm.com [9.17.195.228]) by d03dlp03.boulder.ibm.com (Postfix) with ESMTP id 3F8CF19D804C; Fri, 27 Jan 2012 00:43:03 -0700 (MST)
Received: from d03av01.boulder.ibm.com (d03av01.boulder.ibm.com [9.17.195.167]) by d03relay03.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id q0R7h5cV132422; Fri, 27 Jan 2012 00:43:05 -0700
Received: from d03av01.boulder.ibm.com (loopback [127.0.0.1]) by d03av01.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id q0R7h5YA016367; Fri, 27 Jan 2012 00:43:05 -0700
Received: from d03nm691.boulder.ibm.com (d03nm691.boulder.ibm.com [9.17.195.188]) by d03av01.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id q0R7h5HX016361; Fri, 27 Jan 2012 00:43:05 -0700
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F632E17F2D@dfweml505-mbx>
References: <4A95BA014132FF49AE685FAB4B9F17F632E17F2D@dfweml505-mbx>
To: Linda Dunbar <linda.dunbar@huawei.com>
MIME-Version: 1.0
X-KeepSent: F6866E01:3C35AF59-88257992:0029C4E2; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
From: Rakesh Saha <rsaha@us.ibm.com>
Message-ID: <OFF6866E01.3C35AF59-ON88257992.0029C4E2-88257992.002A64BA@us.ibm.com>
Date: Thu, 26 Jan 2012 23:43:03 -0800
X-MIMETrack: Serialize by Router on D03NM691/03/M/IBM(Release 8.5.1FP4HF305 | July 28, 2011) at 01/27/2012 00:43:04, Serialize complete at 01/27/2012 00:43:04
Content-Type: multipart/alternative; boundary="=_alternative 002A636388257992_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 12012707-7282-0000-0000-000005F64CFF
Cc: "dc@ietf.org" <dc@ietf.org>, "david.black@emc.com" <david.black@emc.com>, Dinesh Dutt <ddutt@cisco.com>, dc-bounces@ietf.org, Murari Sridharan <muraris@microsoft.com>, "kreeger@cisco.com" <kreeger@cisco.com>, narten@rotala.raleigh.ibm.com
Subject: Re: [dc] comments and suggestions to draft-narten-nv03-overlay-problem-statment-01
X-BeenThere: dc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF Data Center Mailing List <dc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dc>, <mailto:dc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dc>
List-Post: <mailto:dc@ietf.org>
List-Help: <mailto:dc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dc>, <mailto:dc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Jan 2012 07:43:41 -0000

Hi Linda,

>You stated that “typically, it is a virtual NIC coming up that triggers 
this association”. It is not quite right. Virtual NIC, same as physical 
NIC for a non-virtualized server, usually is not aware of which >network 
segment it is attached to. For Ethernet data frames coming out from a 
traditional server (i.e. server without virtualization), the data frame is 
not tagged, i.e. not having VID associated with it. It is >the first 
switch which assign the VID for the data frame. 

Regarding "For Ethernet data frames coming out from a traditional server 
(i.e. server without virtualization), the data frame is not tagged",..." 
It is >the first switch which assign the VID for the data frame" ...

non-virtualized servers are capable of sending VLAN tagged packets. It is 
a standard feature of today'as traditional Operating Systems (NIC drivers) 
 to allow VLANs to be associated with an ethernet interface.
So a traditional non-virtualized server may send tagged and untagged 
frames.

Thanks,
Rakesh.
-=-






From:   Linda Dunbar <linda.dunbar@huawei.com>
To:     narten@rotala.raleigh.ibm.com, "david.black@emc.com" 
<david.black@emc.com>, Murari Sridharan <muraris@microsoft.com>, Dinesh 
Dutt <ddutt@cisco.com>, "kreeger@cisco.com" <kreeger@cisco.com>
Cc:     "dc@ietf.org" <dc@ietf.org>
Date:   01/26/2012 04:25 PM
Subject:        [dc] comments and suggestions to 
draft-narten-nv03-overlay-problem-statment-01
Sent by:        dc-bounces@ietf.org



Thomas, et al, 
 
Here are my comments to draft-narten-nv03-overlay-problem-statment-01 and 
suggested wording change:
 
3.1. Limitations of Existing Virtual Network Models. 
 
Since IEEE802.1 defined VLAN separation is mentioned, it would be 
appropriate to mention PBB’s ISID separation. 
 
The limitation for PBB and VLAN should include that MAC addresses can’t be 
aggregated, therefore forwarding table can be very large for large data 
centers. 
 
Second paragraph: Why “VLANs are a pure bridging construct while VRF is 
pure routing construct” is a problem? 
 
4. Network Overlays
 
Should add a subsection to describe Virtual Network Instance ID. 
 
4.x. Virtual Network Instance ID
 
Virtual Network Instance is for segregating traffic belonging to different 
tenants or different zones of one tenant. When a data center uses Overlay 
Network to hide hosts addresses, it is important that Virtual Network 
Instance identifier can properly represent the zones or the tenants in 
entire data center, especially when the overlay edge nodes are access 
switches, i.e. not embedded in hypervisors. 
 
When overlay edge nodes are access switches, the data frames before 
entering the Overlay Network or after exiting the Overlay Network might 
carry traditional VLAN-ID for proper traffic segregation. The Virtual 
Network Instance ID value carried by the Overlay Header  of the data 
frames might be 24 bits (as described in 3.2). Those VLAN-ID for data 
frames under each overlay edge node are only locally significant. Proper 
mapping has to be maintained. 
 
6.2 (TRILL) &6.3 (L2VPN)
 
It is necessary to point out that both TRILL and L2VPN carry the VLAN-ID 
embedded in the original Ethernet frames across the Overlay Network and 
the VLAN-ID maintain the same meaning in two separate L2 islands. 
 
When VLAN-ID tagged Ethernet frames traverse across the Overlay Network 
for Data Center, the VLAN-ID carried by Ethernet frames lose its 
significance. In another words, a different VLAN-ID might be re-assigned 
to the Ethernet frames by the Egress overlay edge. 
 
 
5.3. Associating a VNID with an endpoint. 
 
You stated that “typically, it is a virtual NIC coming up that triggers 
this association”. It is not quite right. Virtual NIC, same as physical 
NIC for a non-virtualized server, usually is not aware of which network 
segment it is attached to. For Ethernet data frames coming out from a 
traditional server (i.e. server without virtualization), the data frame is 
not tagged, i.e. not having VID associated with it. It is the first switch 
which assign the VID for the data frame. 
 
It is more accurate to say  “virtual switch” or “Hypervisor” within the 
server which can trigger the association. 
 
Since overlay header can be also added by first access switches (i.e. 
switches not embedded in physical servers), it is very possible that  data 
frames arriving at the overlay edge (i.e. the first access switch) is 
already VLAN tagged. Then association (or mapping) from the VLAN-Tag to 
VNID has to be operator administrated. 
 
 
Linda Dunbar
 _______________________________________________
dc mailing list
dc@ietf.org
https://www.ietf.org/mailman/listinfo/dc