Re: [nvo3] Shepherd's review of draft-ietf-nvo3-vmm-06

Linda Dunbar <linda.dunbar@futurewei.com> Fri, 21 February 2020 00:41 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86D21120288; Thu, 20 Feb 2020 16:41:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4EiKzVCLoUuS; Thu, 20 Feb 2020 16:41:09 -0800 (PST)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-eopbgr770095.outbound.protection.outlook.com [40.107.77.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63199120271; Thu, 20 Feb 2020 16:41:09 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TJOEmW19gOgbgmBgdChTaFnMTgYo7jCEzFD/fGI9dEPrxlnddhQQmBy/pViQ9X+k3crb3DnmRSnDRmL+CwVYp/JRDpZX3NuoD6olzeInrqTjEh7Sqs5u9qIQJu1V2vT6yLX5ux84N9sUb322+XylnV/IVUc3c+vu+PJDZmKBSm1XTjPEpzNxWkzLQdDL6126lRte4tGwaL3OGdx3dG26hbj4JljnAIrCPNsOu62tYo2OcpoPcQakv4Yvu0lAyJIDD1UUj6N2SNYpEUci0Nv9zGTY3YE5s5ryemehr50Pm/13WJkceBi+LPG719e1ESGjhD+Wd5cwQmPZUm1cz4jEuA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h0P7Cu0oouG81+ctz2cgYvs69H37vb6P+7HXeKiLx1o=; b=LqWFCaFob/9qMHExbfXox0HerNWPbqnvNJ+IgC4MtTavOr/j3dFePG3NCS1cekNuEKQ1AQQf+yg5hJHpayYMLRQU0XFCQhWj3VVkEPu26zUuJWji2YBNR++Qy9pDd9hcl8N4nethtg/X9RaV0W2PsgFDYL7odq7WCpEp4Gz+ImAbAiqP2PKjpGwo7m90/IaQSyybJF8q/SLdNKzi3HJkq3Yc4zMseAkY6Li68CG9AooAFsVpGlsnBYp9+PudVLLa5JX/NbtTofFVeuR8R1+2CjNTUzSamqGzcP+p8ko3G8JBD2JjSsENp2A04HgHxN9KHUU/XjWM4rNbs5Jmihk7oQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h0P7Cu0oouG81+ctz2cgYvs69H37vb6P+7HXeKiLx1o=; b=k8nJbvlLrMnBj/RfBhHLUCAXN68PwytZGfx4j0od5Flw7gdG4Lko4slDpMQowJ40JMcAVMgaR7Jkvb/cD3OSQ7gD84hBIqmEK1hhd0JAlHHQec2zKXCGZSfTHNzdRZcjmZ00kzTQs121RcsLLtgzWC/i7XOPWTE7CdD4+quStq4=
Received: from MWHPR1301MB2096.namprd13.prod.outlook.com (10.174.170.35) by MWHPR1301MB2095.namprd13.prod.outlook.com (10.174.166.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.13; Fri, 21 Feb 2020 00:41:06 +0000
Received: from MWHPR1301MB2096.namprd13.prod.outlook.com ([fe80::e893:a912:1d3a:5a33]) by MWHPR1301MB2096.namprd13.prod.outlook.com ([fe80::e893:a912:1d3a:5a33%6]) with mapi id 15.20.2750.016; Fri, 21 Feb 2020 00:41:06 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>, "draft-ietf-nvo3-vmm@ietf.org" <draft-ietf-nvo3-vmm@ietf.org>
CC: NVO3 <nvo3@ietf.org>
Thread-Topic: Shepherd's review of draft-ietf-nvo3-vmm-06
Thread-Index: AQHV506G8r/CExDZbUuMIkUXDsuycqgkibfQ
Date: Fri, 21 Feb 2020 00:41:05 +0000
Message-ID: <MWHPR1301MB209646A4B133F35DFE3F57C385120@MWHPR1301MB2096.namprd13.prod.outlook.com>
References: <F3AE9A2C-20AA-452F-AC3B-DC1E4380634B@nokia.com>
In-Reply-To: <F3AE9A2C-20AA-452F-AC3B-DC1E4380634B@nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=linda.dunbar@futurewei.com;
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c18296f8-64d2-44ed-0624-08d7b666bc82
x-ms-traffictypediagnostic: MWHPR1301MB2095:
x-microsoft-antispam-prvs: <MWHPR1301MB20955B73A920E171DCE0A00D85120@MWHPR1301MB2095.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0320B28BE1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(136003)(39850400004)(376002)(346002)(396003)(199004)(189003)(53546011)(71200400001)(33656002)(8936002)(110136005)(296002)(6506007)(316002)(44832011)(478600001)(186003)(52536014)(26005)(66446008)(66946007)(4326008)(81166006)(64756008)(81156014)(86362001)(2906002)(5660300002)(8676002)(66476007)(9686003)(7696005)(76116006)(55016002)(66556008); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR1301MB2095; H:MWHPR1301MB2096.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: rCbpOL251LRJcWuYjEZu+IrVFG2JZhVda5zp6rZEqRtAs6JvUvO55zBkInZhi1ItIeZEzSly5UhbpPMLPCLt2FrkK7SrrRUpMrTkoT9iVvVBdJbdLrblqGsan9e/AMuCGMkurUQfpZCSy0YMXqmqolx1yG1aYk3e2mFyy5h72Mq4d5j0/B7ZktrsS/c7pDhxiGOOBZgRIYgPI0n11JWHnXJPXRyHD1D44HoFsBWqYje9/LsHb6fgqKDi1HGxQ30Fmm5lknMR7XCLyS12RZ4RICnLWyAqCM118FQR7mQs8B3cJpg7vqNikaJtI29XvZDy8IhvsdeGwL6s2+CENpXFzkT+X3H2hqgHnCU2XPs5qmdHvyxidUmXTCw/WLyUU8v+csRJIOoP2yBdn3K7DcSOppKBQJCfdzv3ZRRewBEMtRoo5I7sczGs/kro6kZpZM1U
x-ms-exchange-antispam-messagedata: zVeRaQA0uVfZJ/20l0U/bV9q5g1YnseYH0I2YFnQKShYmU+Wf3Wuy/zNwa3UWNDaMMYSjnb2BH2Ovr+LLpzFAXhO3EDuJWrAsFrVos6oCob0x90+2JIM97XjM6hH/OAisZxybTc6pgCIuaDTIt+WXQ==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MWHPR1301MB209646A4B133F35DFE3F57C385120MWHPR1301MB2096_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c18296f8-64d2-44ed-0624-08d7b666bc82
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Feb 2020 00:41:06.0052 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1UkPvxxkH8PI/EXtEQm/7umUHmOa9nQEVBmxkyt8sto7HW5NJcsTPKj3nJuc1RIbBfet/HYkNDpQlMSK5ujMow==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1301MB2095
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/_mGCB3lhOL9onSxcx1pJUOAWLi4>
Subject: Re: [nvo3] Shepherd's review of draft-ietf-nvo3-vmm-06
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Feb 2020 00:41:14 -0000

Matthew,

Thank you very much for the detailed comments. They are very helpful.
Inserted below are the detailed changes per your comments.

Can you let us know if they are acceptable?

Thank you.

Linda

From: Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.com>
Sent: Wednesday, February 19, 2020 12:01 PM
To: draft-ietf-nvo3-vmm@ietf.org
Cc: NVO3 <nvo3@ietf.org>
Subject: Shepherd's review of draft-ietf-nvo3-vmm-06

Authors

Here is my document shepherd’s review. Please treat these comments as you would any other last call comment.

Thanks

Matthew

The document is missing the definite article (‘the’, ‘a’ etc) in numerous places. Please go through the document carefully and correct these.
[Linda] thank you. We are going through to add them.

Please expand the term ‘DC’ on first use.
[Linda] added.

Section 3, Requirements
VM mobility should not require changing their IP addresses after the
   move.

MB> Who is ‘their’? Do you mean ‘a VM’s’ ?
[Linda]. Yes. Changed the sentence to “Virtual machine (VM) mobility should not require changing VMs’ IP addresses after the move.”

   There exist "Hot Migration" where transport service continuity is
   maintained, and "Cold Migration" where the transport service needs
   to be restarted, i.e., execution of the tasks   is stopped on the
   "Old" NVE, moved to the "New" NVE and the task is restarted.

MB> What is the requirement here? Can you rephrase this paragraph?

[Linda] Add the following sentences to the paragraph:
“Not all DCs support “Hot Migration. DCs that only support Cold Migration should make their customers aware of the potential service interruption during the Cold migration.”

4.1. VM Migration in Layer-2 Network
[...]
Therefore, this scheme is highly desirable for utilization in
     large scale multi-tenant DCs.

MB> Which scheme? Do you mean dynamic VM mobility? Please can you clarify this sentence.
[Linda] Yes. Revised the sentence to the following:
“Therefore, dynamic VM Mobility is highly desirable for large scale multi-tenant DCs.”

[...]

Such a change enables all NVEs
     to encapsulate the outgoing MAC frames with the current target NVE
     IP address. It may take some time to refresh the ARP/ND cache when
     a VM has moved to a New NVE.  During this period, a tunnel is
     needed for that Old NVE to forward packets destined to the VM
     under the New NVE.

MB> How does the old VM know which tunnel to use?
[Linda] the procedure is explained in the paragraph right following this sentence:
“In IPv4, the VM immediately after the move should send a gratuitous ARP request message containing its IPv4 and Layer 2 MAC address in its new NVE.  This message's destination address is the broadcast address.  Upon receiving this message, both Old and New NVEs should update the VM's ARP entry in the central directory at the NVA, to update its mappings to record the IPv4 address & MAC address of the moving VM along with the new NVE IPv4 address.  An NVE-to-NVA protocol is used for this purpose [RFC8014].”

[...]

Reverse ARP (RARP) which enables the host to discover its IPv4
     address when it boots from a local server [RFC0903], is not used
     by VMs because the VM already knows its IPv4 address. Next, we
     describe a case where RARP is used.

MB> Please clarify. First you say RARP is not used, but then you say it is. Perhaps it is just the was this paragraph is phrased.
[Linda] Changed the sentence to the following:
“Reverse ARP (RARP) which enables the host to discover its IPv4 address when it boots from a local server [RFC0903], is not used by VMs if the VM already knows its IPv4 address (most common scenario). Next, we describe a case where RARP is used.

4.2. Task Migration in Layer-3 Network

     Layer-2 based DC networks become quickly prohibitive because
     ARP/neighbor caches don't scale.

MB> That is a very strong statement for a BCP. Perhaps you mean to say that ARP/neighbour cache scalability considerations can limit the size of Layer-2 based DC networks?
[Linda] That is correct. Changed to your suggested wording.

[...]

Cold task migration, which is a common practice in many data
     centers, involves the following steps:

     - Stop running the task.
     - Package the runtime state of the job.
     - Send the runtime state of the task to the new NVE where the
        task is to run.
     - Instantiate the task's state on the new machine.
     - Start the tasks   continuing it from the point at which it was
        stopped.


     Address migration and connection migration in moving tasks or VMs
     are addressed next.

MB> This last sentence seems redundant. I suggest removing it.
[Linda] removed. Thanks.

[...]

5. Handling Packets in Flight

     The Old NVE may receive packets from the VM's ongoing
     communications. These packets should not be lost; they should be
     sent to the New NVE to be delivered to the VM.  The steps involved
     in handling packets in flight are as follows:

     Preparation Step:  It takes some time, possibly a few seconds for
     a VM to move from its Old NVE to a New NVE. During this period, a
     tunnel needs to be established so that the Old NVE can forward
     packets to the New NVE. Old NVE gets New NVE address from NVA in
     the request to move the VM. The Old NVE can store the New NVE
     address for the VM with a timer. When the timer expired, the entry
     for the New NVE for the VM can be deleted.

MB> How does the old NVE know this? I assume the NVA pushes this to the old NVE, but it is not at all clear from the text. Please clarify.
[Linda] “Old NVE gets New NVE address from NVA in the request to move the VM”. Not clear?


[...]

6. Moving Local State of VM

MB> This whole section seems to be out of scope of the DC VPN network. Therefore, I would think it is out of scope of this draft and should be removed.
[Linda] How about we remove the description for the detailed State Transferring. And states that it is out of the scope of this document?
6. Moving Local State of VM
In addition to the VM mobility related signaling (VM Mobility Registration Request/Reply), the VM state needs to be transferred to the New NVE.  The state includes its memory and file system if the VM cannot access the memory and the file system after moving to the New NVE.
The mechanism of transferring VM States and file system is out of the scope of this document.



[...]
There is also a Hot Standby option in addition to the Hot
     Mobility, where there are VMs in both primary and secondary NVEs.

MB> This section title says Hot Mobility, but only talks about Hot Standby.
[Linda] Added a new subtitle “Other VM Mobility Options”

     They have identical information and can provide services
     simultaneously as in load-share mode of operation.  If the VM in
     the primary NVE fails, there is no need to actively move the VM to
     the secondary NVE because the VM in the secondary NVE already
     contains identical information.  The Hot Standby option is the
     costliest mechanism, and hence this option is utilized only for
     mission-critical applications and services.  In Hot Standby
     option, regarding TCP connections, one option is to start with and
     maintain TCP connections to two different VMs at the same time.
     The least loaded VM responds first and starts providing service
     while the sender (origin) still continues to receive Ack from the
     heavily loaded (secondary) VM and chooses not to use the service
     of the secondary responding VM.  If the situation (loading
     condition of the primary responding VM) changes the secondary VM
     may start providing service to the sender (origin).

[...]

8. VM Operation
     Once a VM moves to a new NVE, the VM's IP address does not change
     and the VM should be able to continue to receive packets to its
     address(es).

MB> How does that work for the hot standby case? Do you swap the old/new VM IP addresses?
[Linda] moved the description of the behaviour on Hot VM Mobility to be under the Section 7 (Handling Hot, Warm and Cold VM Mobility). Changed the section title to “VM Lifecycle Management” (which is out of the scope of the document).