Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt

"Black, David" <david.black@emc.com> Thu, 13 November 2014 02:09 UTC

Return-Path: <david.black@emc.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0ACBC1A1B24 for <nvo3@ietfa.amsl.com>; Wed, 12 Nov 2014 18:09:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.894
X-Spam-Level:
X-Spam-Status: No, score=-4.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.594, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AfCEukxYbIKK for <nvo3@ietfa.amsl.com>; Wed, 12 Nov 2014 18:09:20 -0800 (PST)
Received: from mailuogwdur.emc.com (mailuogwdur.emc.com [128.221.224.79]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D59271A1B1C for <nvo3@ietf.org>; Wed, 12 Nov 2014 18:09:11 -0800 (PST)
Received: from maildlpprd56.lss.emc.com (maildlpprd56.lss.emc.com [10.106.48.160]) by mailuogwprd54.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id sAD298OY029457 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 12 Nov 2014 21:09:08 -0500
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd54.lss.emc.com sAD298OY029457
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1415844548; bh=ss0uYZ/XlZ9yNUhO4W5LCfR51mI=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=nU7ncpFcu8r4BW7MCfMZyIJrlq+2dDeS8SBf6LU/V8XdVUTqus/U8hShl1xnI8dln mK1kcQXBt3nD6Scsv37gxGlMqJXzWtKyRcVPKDFKTYELrRzrCW0uQAg9ZGcHBrjILo mphTP6BYCwpW27crPX1DnWA1gSlhkWZRHzjCITGw=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd54.lss.emc.com sAD298OY029457
Received: from mailusrhubprd02.lss.emc.com (mailusrhubprd02.lss.emc.com [10.253.24.20]) by maildlpprd56.lss.emc.com (RSA Interceptor); Wed, 12 Nov 2014 21:08:46 -0500
Received: from mxhub25.corp.emc.com (mxhub25.corp.emc.com [10.254.110.181]) by mailusrhubprd02.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id sAD28s34006130 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 12 Nov 2014 21:08:54 -0500
Received: from MXHUB101.corp.emc.com (10.253.50.15) by mxhub25.corp.emc.com (10.254.110.181) with Microsoft SMTP Server (TLS) id 8.3.327.1; Wed, 12 Nov 2014 21:08:53 -0500
Received: from MX104CL02.corp.emc.com ([169.254.8.131]) by MXHUB101.corp.emc.com ([::1]) with mapi id 14.03.0195.001; Wed, 12 Nov 2014 21:08:54 -0500
From: "Black, David" <david.black@emc.com>
To: "sarikaya@ieee.org" <sarikaya@ieee.org>
Thread-Topic: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt
Thread-Index: AQHP/WI+IHIBwomt2UCKGOXvpEs9Mpxdrw+AgAAJRgCAAAzugIAAAa4A//+wT6CAAFnEgP//rNzwgACltQD//67KUA==
Date: Thu, 13 Nov 2014 02:08:52 +0000
Message-ID: <CE03DB3D7B45C245BCA0D2432779493624AFBD@MX104CL02.corp.emc.com>
References: <20141110200919.27869.2915.idtracker@ietfa.amsl.com> <5461854F.3020305@gmail.com> <CAC8QAce9kWVp_3+MeMcNpFinhnTcCgk0k1eDtip2j47iCWAbpg@mail.gmail.com> <CAC8QAceh3xPsg-ADthB8WuO2YgLpvso9HAGc1jHnPQ6jBoFk7w@mail.gmail.com> <5463B636.9020501@queuefull.net> <5617d8fdc9d949d9bd25e4131b730bc7@BY2PR0301MB0696.namprd03.prod.outlook.com> <D088E5C7.124F92%kreeger@cisco.com> <CE03DB3D7B45C245BCA0D2432779493624A99E@MX104CL02.corp.emc.com> <CAC8QAccAER4kXr6US2jos8hOyMZad8Uqtg9uqNXEsoPdr5k9Bg@mail.gmail.com> <CE03DB3D7B45C245BCA0D2432779493624AA6D@MX104CL02.corp.emc.com> <CAC8QAceL8U-ow2+uAzfgGXqWBmbhad-W4QB3TvhoT654oort_A@mail.gmail.com>
In-Reply-To: <CAC8QAceL8U-ow2+uAzfgGXqWBmbhad-W4QB3TvhoT654oort_A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.13.46.202]
Content-Type: multipart/related; boundary="_004_CE03DB3D7B45C245BCA0D2432779493624AFBDMX104CL02corpemcc_"; type="multipart/alternative"
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd02.lss.emc.com
X-RSA-Classifications: DLM_1, public
Archived-At: http://mailarchive.ietf.org/arch/msg/nvo3/AH15pIVh-eqF5lmF1EsG4dA0Oc8
Cc: "nvo3@ietf.org" <nvo3@ietf.org>, "draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org" <draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org>
Subject: Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Nov 2014 02:09:34 -0000

> Because using diffserv at the host level or VM level in our case is a local policy issue. Hosts or VMs are not required to
> diffserv mark the packets be it at the outer IP header or VXLAN header.

As noted in a response to another message, the outer IP header suffices, so just use that and don’t modify VXLAN:

> This I think makes sense. We can change the marking place and move it to IP or Ethernet header.

Thanks,
--David

From: Behcet Sarikaya [mailto:sarikaya2012@gmail.com]
Sent: Wednesday, November 12, 2014 8:58 PM
To: Black, David
Cc: nvo3@ietf.org; draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org
Subject: Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt


On Wed, Nov 12, 2014 at 3:05 PM, Black, David <david.black@emc.com<mailto:david.black@emc.com>> wrote:
 > A differentiated services boundary may be co-located with a host, subject to local policy.
 >
> So using diffserv is an option that needs to be set in VXLAN, so far we did not say anything on this in the draft.

How does that conclusion follow from the first statement?

Because using diffserv at the host level or VM level in our case is a local policy issue. Hosts or VMs are not required to diffserv mark the packets be it at the outer IP header or VXLAN header.



Thanks,
--David

From: Behcet Sarikaya [mailto:sarikaya2012@gmail.com<mailto:sarikaya2012@gmail.com>]
Sent: Wednesday, November 12, 2014 4:03 PM
To: Black, David
Cc: nvo3@ietf.org<mailto:nvo3@ietf.org>; draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org<mailto:draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org>

Subject: Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt


On Wed, Nov 12, 2014 at 2:43 PM, Black, David <david.black@emc.com<mailto:david.black@emc.com>> wrote:
Another +1, and please see RFC 2983, which is relevant to the DiffServ aspects here.



RFC 2474 says that::

A differentiated services boundary may be co-located with a host, subject to local policy.

So using diffserv is an option that needs to be set in VXLAN, so far we did not say anything on this in the draft.

Regards,

Behcet
Thanks,
--David

From: nvo3 [mailto:nvo3-bounces@ietf.org<mailto:nvo3-bounces@ietf.org>] On Behalf Of Larry Kreeger (kreeger)
Sent: Wednesday, November 12, 2014 3:27 PM
To: Osama Zia; Benson Schliesser; sarikaya@ieee.org<mailto:sarikaya@ieee.org>

Cc: nvo3@ietf.org<mailto:nvo3@ietf.org>; Dino Farinacci; draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org<mailto:draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org>
Subject: Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt

+1

I don't ever see a case where packets are being forwarded with only the VXLAN header and not the outer IP header, or IP/Ethernet headers.

 - Larry

From: Osama Zia <osamaz@microsoft.com<mailto:osamaz@microsoft.com>>
Date: Wednesday, November 12, 2014 10:20 AM
To: Benson Schliesser <bensons@queuefull.net<mailto:bensons@queuefull.net>>, "sarikaya@ieee.org<mailto:sarikaya@ieee.org>" <sarikaya@ieee.org<mailto:sarikaya@ieee.org>>
Cc: "nvo3@ietf.org<mailto:nvo3@ietf.org>" <nvo3@ietf.org<mailto:nvo3@ietf.org>>, Dino Farinacci <farinacci@gmail.com<mailto:farinacci@gmail.com>>, "draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org<mailto:draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org>" <draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org<mailto:draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org>>
Subject: Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt

I would ask this question in another way…

At what point do we need to make QoS decisions based on VXLAN header? I do not see any.

From VM to NVE it can be done in IP/Ethernet. From NVE to rest of the network again it can be based on IP/Ethernet header. I do not see a value of using VXLAN/Geneve/GUE header bits for QoS

From: nvo3 [mailto:nvo3-bounces@ietf.org] On Behalf Of Benson Schliesser
Sent: Wednesday, November 12, 2014 11:34 AM
To: sarikaya@ieee.org<mailto:sarikaya@ieee.org>
Cc: nvo3@ietf.org<mailto:nvo3@ietf.org>; Dino Farinacci; draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org<mailto:draft-xia-nvo3-vxlan-qosmarking@tools.ietf.org>
Subject: Re: [nvo3] I-D Action: draft-xia-nvo3-vxlan-qosmarking-01.txt

Hi, Behcet -

Perhaps I'm confused about what comment (from Dino) that you are referring to... But in general, I think of it this way:

Assuming the encap stack looks something like: IP1 / Eth1 / VXLAN / UDP / IP2 / Eth2  (progressing L->R as inner->outer)

Then e.g. tenant VMs can mark the IP1 and Eth1 headers with whatever appropriate markings they desire. The NVE can mark the IP2 and Eth2 headers with whatever appropriate markings.

Specifically, one could imagine the NVE copying the IP1 DSCP codepoint into the IP2 header. Alternatively one could imagine the NVE imposing an underlay DSCP in IP2, e.g. to discriminate between tenants. Possibly, one could also imagine some kind of translation policy which maps IP1 codepoints into IP2 codepoints. And that's not even considering mechanisms that leverage the Eth headers, use different encap stacks, etc.

Cheers,
-Benson

[cid:image001.jpg@01CFFEBC.DBCBB160]
Behcet Sarikaya<mailto:sarikaya2012@gmail.com>
November 12, 2014 at 9:01 AM
Hi Dino,

Regarding your comment on copying IP header QoS bits into VXLAN header,

note that IP packet is coming from the VMs.

Yes for dynamic marking these bits can be copied.
However, VMs may not be configured to mark these fields.

For static marking these bits can not be used because VMs are not
aware of the VNI. So NVE has to do the static marking.

Hope this clarifies.

Regards,

Behcet

_______________________________________________
nvo3 mailing list
nvo3@ietf.org<mailto:nvo3@ietf.org>
https://www.ietf.org/mailman/listinfo/nvo3
[cid:image001.jpg@01CFFEBC.DBCBB160]
Behcet Sarikaya<mailto:sarikaya2012@gmail.com>
November 10, 2014 at 5:47 PM

On Mon, Nov 10, 2014 at 9:41 PM, Brian E Carpenter

<brian.e.carpenter@gmail.com><mailto:brian.e.carpenter@gmail.com> wrote:

[resend with corrected address, sorry]



Hi,



 The first three bits (bits 5-7) are precedence bits. They are

 assigned according to [RFC0791]. Precedence values '110' and '111'

 are selected for routing traffic.



 The last three bits (bits 8-10) are class selector bits. Thet are

 assigned as follows:



001 - BK or background traffic

...

As can be seen the markings are the same as in IEEE 802.1p...

This is not in any way compatible with RFC 2474, which also made the

relevant part of RFC 791 obsolete.



If you want to be compatible with RFC 2474 you should not specify the

bits at all - just say that they are exactly as defined in RFC 2474

and the various PHB definitions that have been published.



I think that diffserv is less relevant in the context of VXLAN.



 If you

want to be compatible with IEEE 802.1p that is a different matter,



Yes this is more relevant for VXLAN.



but you cannot mix the two up in this way.



I now understand that we confused the two very different things.



Regards,



Behcet

    Brian









_______________________________________________

nvo3 mailing list

nvo3@ietf.org<mailto:nvo3@ietf.org>

https://www.ietf.org/mailman/listinfo/nvo3