Re: Last Call: <draft-ietf-nvo3-framework-06.txt> (Framework for DC Network Virtualization) to Informational RFC

Brian E Carpenter <brian.e.carpenter@gmail.com> Sat, 24 May 2014 20:45 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC33B1A022F; Sat, 24 May 2014 13:45:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UoFb7OYp0CW9; Sat, 24 May 2014 13:45:54 -0700 (PDT)
Received: from mail-pb0-x22b.google.com (mail-pb0-x22b.google.com [IPv6:2607:f8b0:400e:c01::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4205B1A004B; Sat, 24 May 2014 13:45:54 -0700 (PDT)
Received: by mail-pb0-f43.google.com with SMTP id up15so5721253pbc.16 for <multiple recipients>; Sat, 24 May 2014 13:45:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=7p9OhQ9qAPKzGDIKlZuKECwAmY3E+hSRoHt1FC3y8hM=; b=QJIEVM9QLOtT/4eXRSG/kaWKhoOIUwMRg2BWbulefnj9O/4diSTBKqxvDtFTBE3n1Q qlh/DrM/HHGusw6PJIw6fKAbi4RC7cZLqpI82vGh51FIcfBVuFi+LyQbOwG8Sk2lV2U4 OsebVUhMoPxBmmL8kCnwz6ODT49CUcVrEUwADRtRs7xkFclLVPTis9diAPqtAYRwdtQi HvEoOgIcMiUB7yZPKiV4AGG81GdXaB0zsVzvAKs6HF0ZLqke2Y7T7ovOC3hchc5PBYEd 66Jdvcin/UpTRLy9DKNFgcKXvWYDIOiUMvruVPbuuX+xrRyHXoNxJbACF0OBpUTLLr6w AK5A==
X-Received: by 10.67.14.231 with SMTP id fj7mr16066458pad.115.1400964352156; Sat, 24 May 2014 13:45:52 -0700 (PDT)
Received: from [192.168.178.23] (8.199.69.111.dynamic.snap.net.nz. [111.69.199.8]) by mx.google.com with ESMTPSA id bx5sm33529900pad.22.2014.05.24.13.45.49 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 24 May 2014 13:45:51 -0700 (PDT)
Message-ID: <53810507.2010700@gmail.com>
Date: Sun, 25 May 2014 08:45:59 +1200
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: ietf@ietf.org
Subject: Re: Last Call: <draft-ietf-nvo3-framework-06.txt> (Framework for DC Network Virtualization) to Informational RFC
References: <20140521143310.22736.34790.idtracker@ietfa.amsl.com>
In-Reply-To: <20140521143310.22736.34790.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/Kyj6tEPR2wlbi5mjO1C0nbWOY0I
Cc: nvo3@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 May 2014 20:45:55 -0000

A few comments below. I can't help feeling that NVO3 is creating
a monster, however.

> 4.1. Pros & Cons
...
>           - Traffic carried over an overlay may not traverse firewalls and
>             NAT devices.

I don't know whether  "may not" means "might not" or "must not",
and that completely determines what the sentence means. For example,
does it mean this?
       - Traffic carried over an overlay might fail to traverse firewalls and
         NAT devices.

I suggest reviewing every instance of "may not" to avoid this
ambiguity.

>           - Hash-based load balancing may not be optimal as the hash
>             algorithm may not work well due to the limited number of
>             combinations of tunnel source and destination addresses. Other
>             NVO3 mechanisms may use additional entropy information than
>             source and destination addresses.

Load balancing appears out of nowhere here. Are we supposed to assume
that load balancing is a requirement? Load balancing between what -
between different tenants, different physical DCs, different servers?

Also, there seems to be an assumption that load balancing is only
based on addresses. Actually it's usually based on ports as well,
and more or less by definition they are invisible to the underlay.
So it's worse than "may not work well".

I would have expected QoS support to also appear as a challenge,
for similar reasons. Isn't giving tenants a fair share of the underlay
capacity an issue? (There's a mention of traffic engineering later,
but surely you don't want this issue to be handled by operators
twiddling knobs?)

> 4.2.4. Path MTU
...
>        TCP will
>        adjust its maximum segment size accordingly.

And how will that work for non-TCP traffic?

>        It is also possible to rely on the NVE to perform segmentation and
>        reassembly operations without relying on the Tenant Systems to know
>        about the end-to-end MTU. The assumption is that some hardware
>        assist is available on the NVE node to perform such SAR operations.
>        However, fragmentation by the NVE can lead to performance and
>        congestion issues due to TCP dynamics and might require new
>        congestion avoidance mechanisms from the underlay network [FLOYD].

In a word: yuck. Surely you should be recommending against anything like
that, or any attempt to re-segment TCP on the fly.

>        Finally, the underlay network may be designed in such a way that the
>        MTU can accommodate the extra tunneling and possibly additional NVO3
>        header encapsulation overhead.

Surely you should be recommending this, which is by far the safest
solution. (And of course it should allow for the IPv6 minimum MTU.)

> 7. References
...
>        [NVOPS] Narten, T. et al, "Problem Statement : Overlays for Network
>                  Virtualization", draft-narten-nvo3-overlay-problem-
>                  statement (work in progress)

Nit: that draft was replaced a long time ago by
http://tools.ietf.org/html/draft-ietf-nvo3-overlay-problem-statement
(which is already in the RFC Editor queue).

    Brian