RE: Call for Participation: Using IP Overlays to provide L2 Virtualization
"Balus, Florin Stelian (Florin)" <florin.balus@alcatel-lucent.com> Fri, 07 October 2011 20:31 UTC
Return-Path: <florin.balus@alcatel-lucent.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 507E821F8B79 for <l2vpn@ietfa.amsl.com>; Fri, 7 Oct 2011 13:31:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.586
X-Spam-Level:
X-Spam-Status: No, score=-6.586 tagged_above=-999 required=5 tests=[AWL=0.013, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ZSljzUM1Ygv for <l2vpn@ietfa.amsl.com>; Fri, 7 Oct 2011 13:31:48 -0700 (PDT)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by ietfa.amsl.com (Postfix) with ESMTP id 4652E21F8B2A for <l2vpn@ietf.org>; Fri, 7 Oct 2011 13:31:48 -0700 (PDT)
Received: from usnavsmail4.ndc.alcatel-lucent.com (usnavsmail4.ndc.alcatel-lucent.com [135.3.39.12]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id p97KYn30000747 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 7 Oct 2011 15:34:49 -0500 (CDT)
Received: from USNAVSXCHHUB02.ndc.alcatel-lucent.com (usnavsxchhub02.ndc.alcatel-lucent.com [135.3.39.111]) by usnavsmail4.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p97KYl8f026697 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 7 Oct 2011 15:34:48 -0500
Received: from USNAVSXCHMBSC3.ndc.alcatel-lucent.com ([135.3.39.139]) by USNAVSXCHHUB02.ndc.alcatel-lucent.com ([135.3.39.111]) with mapi; Fri, 7 Oct 2011 15:34:48 -0500
From: "Balus, Florin Stelian (Florin)" <florin.balus@alcatel-lucent.com>
To: Shahram Davari <davari@broadcom.com>, David Allan I <david.i.allan@ericsson.com>, Giles Heron <giles.heron@gmail.com>, Linda Dunbar <linda.dunbar@huawei.com>, Paul Unbehagen <paul@unbehagen.net>, Thomas Narten <narten@us.ibm.com>
Date: Fri, 07 Oct 2011 15:34:46 -0500
Subject: RE: Call for Participation: Using IP Overlays to provide L2 Virtualization
Thread-Topic: Call for Participation: Using IP Overlays to provide L2 Virtualization
Thread-Index: AQHMggrhmfy5oZaB5EK0QNUSD9DzmpVrnlyAgAAjroCAAAFegIAAlpzAgAAM2P+AAAItAIAAA9RQgAATCwCABJoG8IAAPtZA
Message-ID: <2073A6C5467C99478898544C6EBA3F4602BC589D1F@USNAVSXCHMBSC3.ndc.alcatel-lucent.com>
References: <4A95BA014132FF49AE685FAB4B9F17F61209B8D6@dfweml506-mbx> <CAB0F77A.F0EB%giles.heron@gmail.com> <60C093A41B5E45409A19D42CF7786DFD5223CEEC90@EUSAACMS0703.eamcs.ericsson.se> <2C2F1EBA8050E74EA81502D5740B4BD6BBA94D13CD@SJEXCHCCR02.corp.ad.broadcom.com> <2073A6C5467C99478898544C6EBA3F4602BC58962C@USNAVSXCHMBSC3.ndc.alcatel-lucent.com> <2C2F1EBA8050E74EA81502D5740B4BD6BBA9583D07@SJEXCHCCR02.corp.ad.broadcom.com>
In-Reply-To: <2C2F1EBA8050E74EA81502D5740B4BD6BBA9583D07@SJEXCHCCR02.corp.ad.broadcom.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.12
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 20:31:49 -0000
Hi Shahram, I believe a requirement draft is required from the DC Providers in order to evaluate the differences with the focus on the future architecture. See below for some more clarifications on selected items. > -----Original Message----- > From: Shahram Davari [mailto:davari@broadcom.com] > Sent: Friday, October 07, 2011 9:45 AM > To: Balus, Florin Stelian (Florin); David Allan I; Giles Heron; Linda Dunbar; Paul > Unbehagen; Thomas Narten > Cc: l2vpn@ietf.org > Subject: RE: Call for Participation: Using IP Overlays to provide L2 Virtualization > > Hi Florin, > > -----Original Message----- > From: Balus, Florin Stelian (Florin) [mailto:florin.balus@alcatel-lucent.com] > Sent: Tuesday, October 04, 2011 11:48 AM > To: Shahram Davari; David Allan I; Giles Heron; Linda Dunbar; Paul Unbehagen; > Thomas Narten > Cc: l2vpn@ietf.org > Subject: RE: Call for Participation: Using IP Overlays to provide L2 Virtualization > > Hi Shahram, > I think we need some requirements draft driven by Cloud Providers. Let me try > to add to your considerations below - see in-line... > > > -----Original Message----- > > From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of > > Shahram Davari > > Sent: Tuesday, October 04, 2011 10:26 AM > > To: David Allan I; Giles Heron; Linda Dunbar; Paul Unbehagen; Thomas Narten > > Cc: l2vpn@ietf.org > > Subject: RE: Call for Participation: Using IP Overlays to provide L2 Virtualization > > > > Here is my 2c: > > > > There is certainly big overlap between data center networking and L2VPN. > > However there are also some data center requirements, which I am not sure is > in > > the scope of L2VPN WG such as: > > > > 1) Private IP addresses are OK in data center, since it is confined to a close > > environment > > If you are talking about private IP addresses in the DC core, that was always in > scope for all VPN technologies. IP/MPLS core networks use private addressing. If > you are talking about the VPN IP addressing then the deployed VPNs are based > on allowing this kind of addressing too. Actually that was one of the main VPN > requirements from the beginning and to allow overlapping addressing between > customers. > > SD> I was talking about the private IP address for the routers in the DC core. I > don't think private IP address is allowed for Service Provider core. When it comes to VPN deployments there are no restrictions like this on the Service Provider core: they may use (and some actually do) private addressing inside their IP/MPLS core used for VPN transport. [clipped] > > 9) Core of data center is not MPLS (just IP or Ethernet) > > We have IP tunnels in scope in L2VPN. In L2VPN we had also PBB interop draft > which defines interop between native Ethernet tunnels and PBB-VPLS. Same can > be said about PBB-EVPN draft. > > I know that we have IP tunnels in scope of L2VPN but we have not seen any > specific solution for IP-only cores (without MPLS and PW). L2TP based solutions were developed initially in PWE3 and then I believe in L2TP WG. They are applicable and actually deployed in a number of VPLS and VPWS networks. I am also aware of vendor solutions using GRE tunneling for VPLS and VPWS that may be re-considered in L2VPN if needed. Thanks, Florin > > 10) Interworking between Data centers is required (may require translation of > > VPN identifier from local to global) > > You mean this is a good argument for keeping the work in L2VPN to make sure > we provide easy mapping of Tenant - WAN VPN ID right? > > SD> I meant that some new functions that have never been considered in L2VPN > group are required > > > Thanks > Shahram > > > Thanks, > Florin > > > > > > Thx > > Shahram > > > > -----Original Message----- > > From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of > > David Allan I > > Sent: Tuesday, October 04, 2011 10:08 AM > > To: Giles Heron; Linda Dunbar; Paul Unbehagen; Thomas Narten > > Cc: l2vpn@ietf.org > > Subject: RE: Call for Participation: Using IP Overlays to provide L2 Virtualization > > > > I thought it was L2 over TRILL over foo.... > > > > But in this particular portion of the thread we are discussing other networking > > overlay techniques interworking with this overlay implying some kind of hybrid > > network. I do not think that is the design intent of this exercise. This is a > > different technology set that those explored by L2VPN to date extended to a > > vanilla (v)UNI in a greenfield build. There is no other Ethernet networking or > > emulation in the equation. > > > > N'est pas? > > > > That being said, I still think it falls under purview of L2VPN. Provider > provisioned > > L2VPNs are exactly the same class of problem as multi-tenancy cloud. Many of > > the issues discussed in the problem statement draft explicitly overlap the class > > of solutions being discussed in L2VPN, particularly w.r.t. multicast... The > > technologies have been changed to protect the innocent, that's all. > > > > My 2 cents > > D > > > > -----Original Message----- > > From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of > > Giles Heron > > Sent: Tuesday, October 04, 2011 9:49 AM > > To: Linda Dunbar; Paul Unbehagen; Thomas Narten > > Cc: l2vpn@ietf.org > > Subject: Re: Call for Participation: Using IP Overlays to provide L2 Virtualization > > > > I think the "other" network has to be IP or MPLS (i.e. Layer 3). > > > > In the TRILL case it's L2 over L2, right? > > > > Giles > > > > On 04/10/2011 17:04, "Linda Dunbar" <linda.dunbar@huawei.com> wrote: > > > > > Does it mean that L2VPN is about L2 network being tunneled by another > > network? > > > If yes, I totally agree with Florin's opinion. > > > Then TRILL is L2VPN as well based on this definition. > > > > > > Linda Dunbar > > > > > >> -----Original Message----- > > >> From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On > > >> Behalf Of Paul Unbehagen > > >> Sent: Monday, October 03, 2011 7:04 PM > > >> To: Thomas Narten > > >> Cc: l2vpn@ietf.org > > >> Subject: Re: Call for Participation: Using IP Overlays to provide L2 > > >> Virtualization > > >> > > >> I have to agree with Florin on this one. These are essentially L2VPNs. > > >> Whether or not they are over IP or not is irrelevant. VPLS could also > > >> be considered an overlay over IP. > > >> > > >> -- > > >> Paul Unbehagen > > >> > > >> > > >> On Oct 3, 2011, at 5:58 PM, Thomas Narten <narten@us.ibm.com> wrote: > > >> > > >>> "Balus, Florin Stelian (Florin)" <florin.balus@alcatel-lucent.com> > > >> writes: > > >>> > > >>>> The L2VPN charter was modified a few months ago to include work > > >>>> related to DC/Cloud networking. There were a number of proposed > > >>>> requirements and solution initiatives that prompted the change - > > >>>> see drafts on EVPN, PBB-EVPN (requirements, solutions) and VM > > >>>> mobility. > > >>> > > >>> Can you list which drafts these are? > > >>> > > >>> For the EVPN, that would presumably be: > > >>> > > >>> draft-raggarwa-sajassi-l2vpn-evpn-04.txt > > >>> draft-sajassi-l2vpn-evpn-segment-route-00.txt > > >>> draft-sajassi-l2vpn-pbb-evpn-02.txt > > >>> draft-sajassi-raggarwa-l2vpn-evpn-req-01.txt > > >>> > > >>> What drafts relate to VM mobility? > > >>> > > >>>> The solution drafts you list below are about L2 over some sort of > > >>>> IP tunnels. IP PSN is in the charter for L2VPN and the working > > >>>> group has accumulated a lot of experience in my opinion dealing > > >>>> with all the VPN/multi-tenancy components, including L2/IP > > >>>> solution. Any DC related solutions need to also interoperate with > > >>>> existing VPNs as Cloud Provider want to deliver Cloud Services to VPN > > customers. > > >>> > > >>> Maybe, maybe not. > > >>> > > >>> Let me be clear about one thing there. My impression is that the > > >> L2VPN > > >>> work has largely been about connecting L2 LANs together. That is, > > >>> you have existng L2 LANs (or VLANs, etc.) at multiple sites, and you > > >>> want to glue them together so they look like one big LAN (to the > > >>> hosts > > >> that > > >>> connect to them). Hosts/servers interact with the network as before, > > >>> sending L2 frames over an Ethernet. At some point, the L2 frames are > > >>> picked up by an device that transports them over the WAN as > > >>> appropriate (using L2TPv3, MPLS, etc.). > > >>> > > >>> That is not what overlays are about. Conceptually, an overlay can > > >>> reside entirely within one datacenter. They can extend outside the > > >>> data center, but that is not a requirement. So the assumption is > > >>> they are setup and managed by the datacenter operator, not a providor. > > >>> > > >>> VMs on a server run on a hypervisor. The hypervisor itself is part > > >>> of the overlay. That is, the overlay extends everywhere within the > > >>> datacenter, including all the way up to the access switches and the > > >>> hypervisors. > > >>> > > >>> Thus, an overlay will have lots of "simple" devices (i.e, switches > > >> and > > >>> virtual switches) that are part of the overlay. While they > > >>> conceptually may have tunnels to all the other switches in the > > >>> overlay, in practice they don't need much per-destination state. > > >>> They just tunnel on demand. In contrast, the existing L2VP approachs > > >>> have > > >> a > > >>> lot more state per endpoint and are just not designed to go all the > > >>> way into switches and hypervisors. > > >>> > > >>> Does this make sense? > > >>> > > >>> Thomas > > > > > > > >
- FWD: Call for Participation: Using IP Overlays to… Thomas Narten
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)
- Re: Call for Participation: Using IP Overlays to … Benson Schliesser
- Re: Call for Participation: Using IP Overlays to … Thomas Narten
- Re: Call for Participation: Using IP Overlays to … Paul Unbehagen
- Re: Call for Participation: Using IP Overlays to … Thomas Narten
- RE: Call for Participation: Using IP Overlays to … John E Drake
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)
- RE: Call for Participation: Using IP Overlays to … Henderickx, Wim (Wim)
- RE: Call for Participation: Using IP Overlays to … Ali Sajassi (sajassi)
- Re: Call for Participation: Using IP Overlays to … Bitar, Nabil N
- RE: Call for Participation: Using IP Overlays to … Linda Dunbar
- Re: Call for Participation: Using IP Overlays to … Giles Heron
- RE: Call for Participation: Using IP Overlays to … David Allan I
- RE: Call for Participation: Using IP Overlays to … Linda Dunbar
- RE: Call for Participation: Using IP Overlays to … Shahram Davari
- Re: Call for Participation: Using IP Overlays to … Giles Heron
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)
- Re: Call for Participation: Using IP Overlays to … Ping Pan
- RE: Call for Participation: Using IP Overlays to … Henderickx, Wim (Wim)
- Re: Call for Participation: Using IP Overlays to … Bitar, Nabil N
- Re: Call for Participation: Using IP Overlays to … renier van tonder
- Re: Call for Participation: Using IP Overlays to … Vishwas Manral
- RE: Call for Participation: Using IP Overlays to … Shahram Davari
- RE: Call for Participation: Using IP Overlays to … Shahram Davari
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)