Re: [vnrg] way forward on VNRG definitions

Martin Röhricht <roehricht@kit.edu> Wed, 30 June 2010 14:10 UTC

Return-Path: <roehricht@kit.edu>
X-Original-To: vnrg@core3.amsl.com
Delivered-To: vnrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 63CAB3A6833 for <vnrg@core3.amsl.com>; Wed, 30 Jun 2010 07:10:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.442
X-Spam-Level:
X-Spam-Status: No, score=-3.442 tagged_above=-999 required=5 tests=[AWL=0.093, BAYES_40=-0.185, HELO_EQ_DE=0.35, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2SO5IdTgIH9J for <vnrg@core3.amsl.com>; Wed, 30 Jun 2010 07:10:52 -0700 (PDT)
Received: from iramx2.ira.uni-karlsruhe.de (iramx2.ira.uni-karlsruhe.de [141.3.10.81]) by core3.amsl.com (Postfix) with ESMTP id 6AA603A6993 for <vnrg@irtf.org>; Wed, 30 Jun 2010 07:10:50 -0700 (PDT)
Received: from irams1.ira.uni-karlsruhe.de ([141.3.10.5]) by iramx2.ira.uni-karlsruhe.de with esmtps port 25 id 1OTy05-0005Vd-N0 for <vnrg@irtf.org>; Wed, 30 Jun 2010 16:11:00 +0200
Received: from i72riggs.tm.uni-karlsruhe.de ([141.3.70.153]) by irams1.ira.uni-karlsruhe.de with esmtpsa port 25 for <vnrg@irtf.org> id 1OTy05-0003iA-HQ; Wed, 30 Jun 2010 16:10:53 +0200
Message-ID: <4C2B506D.5020508@kit.edu>
Date: Wed, 30 Jun 2010 16:10:53 +0200
From: Martin Röhricht <roehricht@kit.edu>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: vnrg@irtf.org
References: <547F018265F92642B577B986577D671C014B9959@VENUS.office> <4C0E275D.3020604@intec.UGent.be> <9FA16888AD1BF64ABCE6C2532CCEB98A0A7A8C62@xmb-sjc-219.amer.cisco.com> <4C0E768F.3030703@isi.edu>
In-Reply-To: <4C0E768F.3030703@isi.edu>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-ATIS-AV: ClamAV (irams1.ira.uni-karlsruhe.de)
X-ATIS-AV: ClamAV (iramx2.ira.uni-karlsruhe.de)
X-ATIS-AV: Kaspersky (iramx2.ira.uni-karlsruhe.de)
X-ATIS-Timestamp: iramx2.ira.uni-karlsruhe.de 1277907060.184028000
Subject: Re: [vnrg] way forward on VNRG definitions
X-BeenThere: vnrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Virtual Networks Research Group \(VNRG\) discussion list" <vnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/listinfo/vnrg>, <mailto:vnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/vnrg>
List-Post: <mailto:vnrg@irtf.org>
List-Help: <mailto:vnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/vnrg>, <mailto:vnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Jun 2010 14:10:55 -0000

Dear Joe,

On 08.06.2010 18:57 Joe Touch wrote:
> As a starting point, we would like to have everyone on the list answer the
> following questions. We would prefer short text rather than full paragraphs
> extracted from any I-D or other document.
> -----------------------------------------------------
>
> Starting questions:
>
> 1. how do you define VNs?

A VN is a network that appears to its users as an ordinary network by
providing ordinary interfaces and services but which is actually
decoupled from the physical substrate.

> 	1.a. what are the key components?

Virtual nodes, virtual links, management entities

> 	1.b. what is the relationship between these components?

An arbitrary number of virtual links may be spanned between an arbitrary
number of virtual nodes.  A physical node may be equipped with multiple
virtual nodes.  Virtual links are controlled by management entities
residing on physical nodes and acting as mediators between pyhsical and
virtual nodes.

> 	1.c. what is the characteristic behavior/capability of the
> 	resulting system?

The resulting virtual network provides its users the illusion of using a
dedicated (physical) network with a set of guaranteed resources.  It
should provide its services isolated from other virtual or physical
networks that actually run on the same hardware.  Network management
operations should be performed transparent for the network's users, e.g.
by migrating nodes or links in the physical substrate.

> 2. what are VNs used for?

VNs may be used to provide a dedicated network for its users which
operates isolated from any other network traffic.  They may be used to
bring out completely new network architectures and protocols.  They may
be used to optimize resource utilization either via aggregating or via
distributing resources used for a virtual network.

> 3. what are they key challenges?
>
> for each challenge:
> 	- define the challenge
> 	- explain why it is hard
> 	- provide some references to those working on solutions

- Instantiation of virtual nodes and virtual links.  How can we a
 priori determine whether a virtual node exists or is actively running?
- Inter-domain-wide operation across multiple administrative domains.
 Comparable to the issues in QoS research we may be able to easily
 provide dedicated services to users within our domain, but providing
 these services inter-domain-wide may have some technical or business
 constraints.
- Dynamic and on-demand instantiation of virtual networks.  Instead of
 using a manual or semi-manual (e.g. script-based) configuration of
 virtual networks, it may be desirable to use signaling protocols for a
 dynamic and on-demand management of virtual networks.
- Network topologies. Talking about virtual networks, we may wish to
 not only control some virtual nodes and virtual links, but also create
 virtual network topologies, such as full-meshed networks, rings,
 trees, etc.
- Attachment of end-users---are they part of the virtual network? How
 do we cope with the mobility of end-users, again inter-domain-wide?
- Aggregation---to what level can we aggregate traffic by still
 preserving isolation and by not losing flexibility to migrate virtual
 nodes and virtual links to another location?
- Security---how can security be achieved?  Is it an integrated part of
the virtual network architecture and transparent to its users?
- AAA---using virtual network resources breaks down to actually using
 physical resources of one or more network operators.  How do we
 provide authentication, authorization, and accountability?  How do we
 provide these AAA services inter-domain-wide?
- Are Quality-of-Service guarantees an inherent requirement for virtual
 networks? If yes, to what extent?
- Providing the users the opportunity to create completely new network
 architectures and protocols inside their virtual networks---how do we
 cope with interoperability?  Or do we run the risk of creating an
 »inverse Internet«?


That's it for now.

Martin