Re: Call for Participation: Using IP Overlays to provide L2 Virtualization
Giles Heron <giles.heron@gmail.com> Tue, 04 October 2011 17:31 UTC
Return-Path: <giles.heron@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E40BA21F8E09 for <l2vpn@ietfa.amsl.com>; Tue, 4 Oct 2011 10:31:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.837
X-Spam-Level:
X-Spam-Status: No, score=-2.837 tagged_above=-999 required=5 tests=[AWL=0.763, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wECrbZdBxncl for <l2vpn@ietfa.amsl.com>; Tue, 4 Oct 2011 10:31:30 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com [74.125.82.44]) by ietfa.amsl.com (Postfix) with ESMTP id C844821F8E30 for <l2vpn@ietf.org>; Tue, 4 Oct 2011 10:31:29 -0700 (PDT)
Received: by wwf22 with SMTP id 22so814883wwf.13 for <l2vpn@ietf.org>; Tue, 04 Oct 2011 10:34:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :thread-index:in-reply-to:mime-version:content-type :content-transfer-encoding; bh=3VH5sMhMaBSDanjWfc6eetHOiCspVUs69BIRv/bs6qc=; b=Dgv8E6qo+9VMQeQgKuzSD1i6uBiEXY5UOWbdKqDHH50Mkat41iI8UZ4clTOivf81rP S5DsqB787ZL6eVzHtvPwvhzp7KcQL1ixeOpbgS6NU9TZVJw4YXpZsorTiQHzWvKAEpBb MdrYJNFL+I1FTYjTiDohZHIprfNE6QiXvOmGw=
Received: by 10.227.113.133 with SMTP id a5mr1807837wbq.70.1317749674603; Tue, 04 Oct 2011 10:34:34 -0700 (PDT)
Received: from [144.254.149.236] (dhcp-144-254-149-236.cisco.com. [144.254.149.236]) by mx.google.com with ESMTPS id es5sm5331348wbb.11.2011.10.04.10.34.32 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 04 Oct 2011 10:34:33 -0700 (PDT)
User-Agent: Microsoft-Entourage/12.31.0.110725
Date: Tue, 04 Oct 2011 18:34:38 +0100
Subject: Re: Call for Participation: Using IP Overlays to provide L2 Virtualization
From: Giles Heron <giles.heron@gmail.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, Paul Unbehagen <paul@unbehagen.net>, Thomas Narten <narten@us.ibm.com>
Message-ID: <CAB1023E.F0F5%giles.heron@gmail.com>
Thread-Topic: Call for Participation: Using IP Overlays to provide L2 Virtualization
Thread-Index: AQHMgrWBJjt3L2jZzEqus9FfoL8/zJVsa82wgAAGj9Q=
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F61209B956@dfweml506-mbx>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 17:31:31 -0000
Right - MAC-in-MAC would be out of scope. But MAC-in-MAC over IP is potentially in scope as it provides for multi-tenant L2 over an IP PSN. Giles On 04/10/2011 18:13, "Linda Dunbar" <linda.dunbar@huawei.com> wrote: > Giles, > > Thank you for the clarification. Based on your clarification, TRILL is not in > the scope of L2VPN because TRILL is not IP or MPLS. > Then MAC-in-MAC is not in the scope of L2VPN either, correct? > > Linda > >> -----Original Message----- >> From: Giles Heron [mailto:giles.heron@gmail.com] >> Sent: Tuesday, October 04, 2011 11:49 AM >> To: Linda Dunbar; Paul Unbehagen; Thomas Narten >> Cc: l2vpn@ietf.org >> Subject: Re: Call for Participation: Using IP Overlays to provide L2 >> Virtualization >> >> I think the "other" network has to be IP or MPLS (i.e. Layer 3). >> >> In the TRILL case it's L2 over L2, right? >> >> Giles >> >> On 04/10/2011 17:04, "Linda Dunbar" <linda.dunbar@huawei.com> wrote: >> >>> Does it mean that L2VPN is about L2 network being tunneled by another >> network? >>> If yes, I totally agree with Florin's opinion. >>> Then TRILL is L2VPN as well based on this definition. >>> >>> Linda Dunbar >>> >>>> -----Original Message----- >>>> From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On >> Behalf >>>> Of Paul Unbehagen >>>> Sent: Monday, October 03, 2011 7:04 PM >>>> To: Thomas Narten >>>> Cc: l2vpn@ietf.org >>>> Subject: Re: Call for Participation: Using IP Overlays to provide L2 >>>> Virtualization >>>> >>>> I have to agree with Florin on this one. These are essentially >> L2VPNs. >>>> Whether or not they are over IP or not is irrelevant. VPLS could >> also >>>> be considered an overlay over IP. >>>> >>>> -- >>>> Paul Unbehagen >>>> >>>> >>>> On Oct 3, 2011, at 5:58 PM, Thomas Narten <narten@us.ibm.com> wrote: >>>> >>>>> "Balus, Florin Stelian (Florin)" <florin.balus@alcatel-lucent.com> >>>> writes: >>>>> >>>>>> The L2VPN charter was modified a few months ago to include work >>>>>> related to DC/Cloud networking. There were a number of proposed >>>>>> requirements and solution initiatives that prompted the change - >>>>>> see drafts on EVPN, PBB-EVPN (requirements, solutions) and VM >>>>>> mobility. >>>>> >>>>> Can you list which drafts these are? >>>>> >>>>> For the EVPN, that would presumably be: >>>>> >>>>> draft-raggarwa-sajassi-l2vpn-evpn-04.txt >>>>> draft-sajassi-l2vpn-evpn-segment-route-00.txt >>>>> draft-sajassi-l2vpn-pbb-evpn-02.txt >>>>> draft-sajassi-raggarwa-l2vpn-evpn-req-01.txt >>>>> >>>>> What drafts relate to VM mobility? >>>>> >>>>>> The solution drafts you list below are about L2 over some sort of >> IP >>>>>> tunnels. IP PSN is in the charter for L2VPN and the working group >>>>>> has accumulated a lot of experience in my opinion dealing with all >>>>>> the VPN/multi-tenancy components, including L2/IP solution. Any DC >>>>>> related solutions need to also interoperate with existing VPNs as >>>>>> Cloud Provider want to deliver Cloud Services to VPN customers. >>>>> >>>>> Maybe, maybe not. >>>>> >>>>> Let me be clear about one thing there. My impression is that the >>>> L2VPN >>>>> work has largely been about connecting L2 LANs together. That is, >> you >>>>> have existng L2 LANs (or VLANs, etc.) at multiple sites, and you >> want >>>>> to glue them together so they look like one big LAN (to the hosts >>>> that >>>>> connect to them). Hosts/servers interact with the network as before, >>>>> sending L2 frames over an Ethernet. At some point, the L2 frames >> are >>>>> picked up by an device that transports them over the WAN as >>>>> appropriate (using L2TPv3, MPLS, etc.). >>>>> >>>>> That is not what overlays are about. Conceptually, an overlay can >>>>> reside entirely within one datacenter. They can extend outside the >>>>> data center, but that is not a requirement. So the assumption is >> they >>>>> are setup and managed by the datacenter operator, not a providor. >>>>> >>>>> VMs on a server run on a hypervisor. The hypervisor itself is part >> of >>>>> the overlay. That is, the overlay extends everywhere within the >>>>> datacenter, including all the way up to the access switches and the >>>>> hypervisors. >>>>> >>>>> Thus, an overlay will have lots of "simple" devices (i.e, switches >>>> and >>>>> virtual switches) that are part of the overlay. While they >>>>> conceptually may have tunnels to all the other switches in the >>>>> overlay, in practice they don't need much per-destination state. >> They >>>>> just tunnel on demand. In contrast, the existing L2VP approachs >> have >>>> a >>>>> lot more state per endpoint and are just not designed to go all the >>>>> way into switches and hypervisors. >>>>> >>>>> Does this make sense? >>>>> >>>>> Thomas >> >
- FWD: Call for Participation: Using IP Overlays to… Thomas Narten
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)
- Re: Call for Participation: Using IP Overlays to … Benson Schliesser
- Re: Call for Participation: Using IP Overlays to … Thomas Narten
- Re: Call for Participation: Using IP Overlays to … Paul Unbehagen
- Re: Call for Participation: Using IP Overlays to … Thomas Narten
- RE: Call for Participation: Using IP Overlays to … John E Drake
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)
- RE: Call for Participation: Using IP Overlays to … Henderickx, Wim (Wim)
- RE: Call for Participation: Using IP Overlays to … Ali Sajassi (sajassi)
- Re: Call for Participation: Using IP Overlays to … Bitar, Nabil N
- RE: Call for Participation: Using IP Overlays to … Linda Dunbar
- Re: Call for Participation: Using IP Overlays to … Giles Heron
- RE: Call for Participation: Using IP Overlays to … David Allan I
- RE: Call for Participation: Using IP Overlays to … Linda Dunbar
- RE: Call for Participation: Using IP Overlays to … Shahram Davari
- Re: Call for Participation: Using IP Overlays to … Giles Heron
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)
- Re: Call for Participation: Using IP Overlays to … Ping Pan
- RE: Call for Participation: Using IP Overlays to … Henderickx, Wim (Wim)
- Re: Call for Participation: Using IP Overlays to … Bitar, Nabil N
- Re: Call for Participation: Using IP Overlays to … renier van tonder
- Re: Call for Participation: Using IP Overlays to … Vishwas Manral
- RE: Call for Participation: Using IP Overlays to … Shahram Davari
- RE: Call for Participation: Using IP Overlays to … Shahram Davari
- RE: Call for Participation: Using IP Overlays to … Balus, Florin Stelian (Florin)