Re: [Rtg-dt-encap-considerations] [sfc] Encapsulation considerations

Sharon <sbarkai@gmail.com> Wed, 25 March 2015 23:47 UTC

Return-Path: <sbarkai@gmail.com>
X-Original-To: rtg-dt-encap-considerations@ietfa.amsl.com
Delivered-To: rtg-dt-encap-considerations@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 801F91A870A for <rtg-dt-encap-considerations@ietfa.amsl.com>; Wed, 25 Mar 2015 16:47:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.998
X-Spam-Level:
X-Spam-Status: No, score=-3.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, GB_I_LETTER=-2, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BqJg2dM2Wwvo for <rtg-dt-encap-considerations@ietfa.amsl.com>; Wed, 25 Mar 2015 16:47:28 -0700 (PDT)
Received: from mail-oi0-x22a.google.com (mail-oi0-x22a.google.com [IPv6:2607:f8b0:4003:c06::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAA881ACEAF for <Rtg-dt-encap-considerations@ietf.org>; Wed, 25 Mar 2015 16:47:27 -0700 (PDT)
Received: by oiag65 with SMTP id g65so35761875oia.2 for <Rtg-dt-encap-considerations@ietf.org>; Wed, 25 Mar 2015 16:47:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=8Ag0c8lx6PDMKiatr3OGcO4PDmKyRngNo/QexT4OQ4w=; b=zFDRLwXygwBhm7yNDZfP6xFyOibHUlaQ5YWwmpdleXenM9+1aBpXCepJxHvm/4kLNe S+8fWv/a7HA5YG7nOLl9VQQMObytBTHkfd/aTW2jsh3tYuL8VfKPTg+rms20rD1t5+u0 P9+BZdJMXqd0yY8DgzrYYnlZrvnue77KUsL2684IHbKOCddSI+mcQQt9mQ7RAew2kgXJ /cAwqeoVn+jcTxcOSyEM4OQ2BYki+zy6Li50eCr7qUOS5eLbhpO46BBJ+hdsTj8lnRQE 44ynWRWt7itVx5KTDjMH+C68fKphKwCdrgczwVIERyqrzQx42oP7U82iXaFIMqANmDaO QC9A==
X-Received: by 10.202.72.72 with SMTP id v69mr1234458oia.24.1427327247294; Wed, 25 Mar 2015 16:47:27 -0700 (PDT)
Received: from ?IPv6:2600:100c:b221:fce7:2d15:9410:f178:3244? ([2600:100c:b221:fce7:2d15:9410:f178:3244]) by mx.google.com with ESMTPSA id h8sm3191019obe.2.2015.03.25.16.47.25 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 25 Mar 2015 16:47:26 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-3444B8BF-7529-463B-BBCB-FDD66665C137"
Mime-Version: 1.0 (1.0)
From: Sharon <sbarkai@gmail.com>
X-Mailer: iPhone Mail (12D508)
In-Reply-To: <55134273.7040904@acm.org>
Date: Wed, 25 Mar 2015 18:47:24 -0500
Content-Transfer-Encoding: 7bit
Message-Id: <62CDFE29-B396-48B1-848C-085702084BE7@gmail.com>
References: <55123C72.202@acm.org> <3064516E-A51A-46DB-B7AB-F986A56A1532@gmail.com> <55134273.7040904@acm.org>
To: Erik Nordmark <nordmark@acm.org>
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtg-dt-encap-considerations/7j4-aTZHccuLMI8tcN88hs1Z11Q>
X-Mailman-Approved-At: Wed, 25 Mar 2015 17:19:24 -0700
Cc: "rtg-dt-encap-considerations@ietf.org" <Rtg-dt-encap-considerations@ietf.org>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [Rtg-dt-encap-considerations] [sfc] Encapsulation considerations
X-BeenThere: rtg-dt-encap-considerations@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Routing Area Design Team on Encapsulation Considerations discussion list <rtg-dt-encap-considerations.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dt-encap-considerations>, <mailto:rtg-dt-encap-considerations-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-dt-encap-considerations/>
List-Post: <mailto:rtg-dt-encap-considerations@ietf.org>
List-Help: <mailto:rtg-dt-encap-considerations-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dt-encap-considerations>, <mailto:rtg-dt-encap-considerations-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 23:47:31 -0000


> On Mar 25, 2015, at 6:19 PM, Erik Nordmark <nordmark@acm.org> wrote:
> 
>> On 3/25/15 5:13 PM, Sharon wrote:
>> This is very nice work!
> 
> Credits goes to the whole DT (cc'ed). I also took the liberty to cc Alia in case there result is a call for additional design teams.

Thanks. Actually I guess there is.
A general problem space for overlays, which are applicable to strong trends - cloud & mobile compute, too many drafts, not enough thought.

>> I wonder if the same type of analysis should be done for the mapping requirements between overlay and underlay - before diving straight to protocol bits. Things like:
>> 
>> - underlay accessibility
>> - performance metrics
>> - protections & authentication
>> - Schema extendibility
>> - Pull/Push Publish-Subscribe
>> - consistency, locking, ownership
>> - NAT traversal ..
>> 
>> It would be a shame not to leverage the by definition existence of an underlay to base global mappings on a proper feature rich distributed database.
>> 
>> Proper requirements can weed out Irrelevant link-state protocols (there's already a network established, and overlay addresses have no topological meanings), it will also open off the shelf product options beyond very limited directories.
> 
> Sharon,
> 
> we tried to keep the charter for the DT quite focused.
> 
> I'm not sure I understand the aspects about the mapping between overlay and underlay - perhaps we can talk off-line?
> We did discuss the QoS/DSCP mapping, and ability to support OAM is part to be able to measure performance.


The heart of the problem is that there are two networks here. The overlay network does not terminate in the NVE, it continues elsewhere but it's addressing has no inherit topological meaning.
This means global knowledge, something IP tries to stay away from, and what makes IP scale so well. 


> 
> Do you think there are general aspects of the control plane (general across different encapsulations?) If there is it might be an argument for a separate narrowly focused design team; I suspect the set of expertize would be somewhat different than for the encapsulation format aspects that we discussed.
> I know that NVO3 needs to determine how to do a centralized control plane, but that is something that the NVO3 WG needs to handle.

Centralization is jumping to conclusion, it's only one way to achieve global knowledge. Logically centralized is more appropriate.
We all sense that there's a scalable database under the covers for this task that leverages the underlay (IP) network to function. We just haven't defined it's features and what are the requirements and rules of the NVEs to engage it.

So rather then throwing 3-4 letter words BGP ISIS LISP XMPP LDAP DNS ... Let's just define these first.
The protocol wrappers and the Schema for that "underlying" database will follow.

The good news is that distributed eg scalable databases are centric for multiple industries, so once NVE-NVA requirements are clear we can all fast forward to implementations.

The wrapper protocol is a strong suite of this forum, not the thing to warty about once the above is well defined. The usual Darwinism will work.



> 
> Thanks,
>   Erik
> 
> 
> 
>> 
>> --szb
>> 
>> On Mar 24, 2015, at 11:41 PM, Erik Nordmark <nordmark@acm.org> wrote:
>> 
>> 
>> I don't know to what extent folks are paying attention to RTGWG but I presented the report from the encapsulation design team this afternoon.
>> The draft is
>> http://datatracker.ietf.org/doc/draft-rtg-dt-encap/
>> and the slides are at
>> http://www.ietf.org/proceedings/92/slides/slides-92-rtgwg-8.pdf
>> 
>> There is probably things in there to consider for SFC, and things that can be reused to make it easier to move SFC forward.
>> 
>> Sorry for not sending things out to the WG earlier.
>>   Erik
>> 
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>