VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Virtual Links: VLANs and Tunneling
History of VPLS at IETF Ali Sajassi November 12, 2002.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Implementing Inter-VLAN Routing
Network Localized Mobility Management using DHCP
RIB Reduction in Virtual Subnet draft-xu-bess-virtual-subnet-rib-reduction-00 Xiaohu Xu (Huawei) Susan Hares (Individual) Yongbing Fan (China.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
 As defined in RFC 826 ARP consists of the following messages ■ ARP Request ■ ARP Reply.
L3vpn end-system draft Pedro Marques. Overview Defines a mechanism to associate an end- system virtual interface to an L3VPN. – Co-located forwarder:
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
1 Internet Networking Spring 2004 Tutorial 1 Subnetting and CIDR Proxy ARP.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
FIB Reduction in Virtual Subnet draft-xu-l3vpn-virtual-subnet-fib-reduction-00 Xiaohu Xu (Huawei) Susan Hares Yongbing Fan (China Telecom)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Extension to LDP-VPLS for Ethernet Broadcast and Multicast draft-delord-l2vpn-ldp-vpls-broadcast-exten-03 Presenter: Zhihua Liu, China Telecom IETF79,
V1.1 VPLS Principle. Objectives Understand the basics of mpls layer 2 VPN Understand VPLS principle.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 4: Managing LAN Traffic
Lucy Yong Susan Hares September 20, 2012 Boston
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Networks and Protocols CE Week 2a. Network hardware.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
LAN Switching Concepts. Overview Ethernet networks used to be built using repeaters. When the performance of these networks began to suffer because too.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in VPLS draft-raggarwa-l2vpn-vpls-mcast-00.txt Rahul Aggarwal.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
6to4
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
EVPN: Or how I learned to stop worrying and love the BGP
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Scaling the Address Resolution Protocol for Large Data Centers (SARP) draft-nachum-sarp-04 Youval NachumMarvell Linda DunbarHuawei Ilan YerushalmiMarvell.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
MPLS Virtual Private Networks (VPNs)
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Virtual Hub & Spoke with BGP EVPNs
Link Layer 5.1 Introduction and services
draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Revisiting Ethernet: Plug-and-play made scalable and efficient
Network Load Balancing Topology
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Multicast in Virtual Router-based IP VPNs
Virtual LANs.
Routing and Switching Essentials v6.0
EVPN a very short introduction
Chapter 15. Connecting Devices
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Presentation transcript:

VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing

VS Overview VS aims to be a practical and scalable data center network architecture which is desired to meet the following objectives: –Maximize Bandwidth Utilization: Use L3 routing to overcome the limitations of STP. –Layer-2 Connectivity Service: Just as if the servers of a given service domain were on a LAN or a subnet. –Service Domain Isolation: Due to performance isolation and security considerations, servers of different service domains should be isolated from each other, just as if they were isolated via VLANs. –Broadcast Flooding Suppression Limit the broadcast flooding (e.g., ARP broadcast traffic, unknown unicast traffic) scope as small as possible.

VS Overview (cont) VS provides an IP-only L2VPN service for server interconnection in data center networks by mainly combining L3VPN and ARP proxy [RFC 925] (was invented by Jon Postel) technologies. On PE control plane –Host routes (i.e., /32) for local CE hosts are generated automatically according to learnt ARP entries. –Host routes for remote CE hosts are learnt by using the existing L3VPN technology to distribute the above local CE host routes across PEs. –Acting as an ARP proxy, the PE returns its own MAC as a response to an ARP request for a remote CE host which is sent from a local CE host. On PE data plane –Use L3VPN forwarding mechanism WITHOUT ANY CHANGE.

VPN Blue: /24 Host D: Host B: Unicast Communication Example MPLS/IP Backbone PE-1 VPN Blue: /24 PE-2 Prefix Next-hop Protocol /32 PE-1 BGP /32 PE-1 BGP /32 Local ARP /32 Local ARP Prefix Next-hop Protocol /32 Local ARP /32 Local ARP /32 PE-2 BGP /32 PE-2 BGP Host C: Host A: ToR Switch ToR Switch VRF Blue: IP MAC IP(C) MAC(C) IP(B) MAC(PE-1) IP(D) MAC(PE-1) IP MAC IP(C) MAC(C) IP(B) MAC(PE-1) IP(D) MAC(PE-1) ARP: ARP Proxy ARP Proxy IP MAC IP(D) MAC(D) IP(A) MAC(PE-2) IP(C) MAC(PE-2) IP MAC IP(D) MAC(D) IP(A) MAC(PE-2) IP(C) MAC(PE-2) ARP: IP(A)->IP(B) VLAN ID MAC(A)->MAC(PE-1) IP(A)->IP(B) VPN Label Tunnel to PE-2 IP(A)->IP(B) VLAN ID MAC(PE-2)->MAC(B)

Local CE Host Discovery Local CE hosts are discovered through ARP learning. –PE sends unicast ARP requests to those learnt local CE hosts periodically to keep their corresponding ARP entries from expiring. To ensure the PE has learnt all local CE hosts, especially in the event of rebooting, ARP scan should be performed at least once after rebooting: –Option 1 (available today): PE sends to its local site an ARP request for each IP address within the configured IP subnet in turn. –Option 2 (extensions to existing ARP needed): PE sends to its local site an ARP request for a directed broadcast address (i.e., ) or an ALL-Systems multicast group address (i.e., ). Any CE host receiving such ARP request should respond with an ARP reply containing its IP and MAC addresses.

ARP Reduction Besides ARP learning, PE should perform the ARP proxy [RFC 925] function: –For an ARP request for a local CE host, discards it. –For an ARP request for a remote CE host, return its own MAC as an ARP reply. –For an ARP request for an unknown CE host (i.e., no matching VRF entry found), discards it. ARP broadcast traffic from CE hosts is limited to local VPN sites –ARP broadcast traffic would not be flooded across PEs. –ARP update for a CE host (e.g., triggered by VM mobility) would not trigger any BGP update as long as that CE host is still attached to its original PE and VRF instance (e.g., VM mobility within the VPN site).

CE Multi-homing CE multi-homing is an important feature for redundancy and load-balancing, especially in data center networks. –Multiple equal-cost host routes with different BGP next-hops (i.e., remote PEs) for a given multi-homed CE host can be used to achieve maximum capacity for server interconnection. CE hosts can be multi-homed to PEs via Intermediary bridges (e.g., ToR switches) in the following way. –VRRP is enabled on PEs of a given redundancy group, –and only VRRP master is delegated to act as ARP proxy and respond with its VIRTUAL MAC.

CE Mobility (e.g., VM Mobility) CE mobility within a VPN site. –PE just needs to update the corresponding ARP entry. –No BGP update is triggered. CE mobility across VPN sites. –Upon learning a host route for a given local CE host via BGP, PE should immediately send an ARP request to that host to determine whether that host is still connected to it. If not, PE should delete the corresponding ARP entry and host route for that CE host, and withdrawn the corresponding BGP route advertised before. Otherwise, it is judged as CE multi-homing.

Multicast/Broadcast MVPN technology can be used directly without any change to distribute customer multicast traffic among PEs. –Inclusive multicast distribution tree –Selective multicast distribution tree Customer broadcast traffic can be processed as a special customer multicast group.

Comparison IPLSVS CE reachability Information Distribution MAC reachability advertisement via LDP IP reachability advertisement via BGP ARP reduction mechanism ARP cache/snooping (return a real MAC of the requested CE). ARP proxy (return the MAC of the ARP proxy) Eliminating ARP/unknown unicast flooding across PEs NoYes CE multi-homingNot supportSupport natively MAC table capacity pressure on Intermediary bridges Need to learn MACs of both local and remote CEs. Not aging out learned MAC entries worsen such pressure. Only need to learn local CE hosts’ MAC addresses.

Next-steps Any comments?

IPLS vs. VS (CE Reachability Advertisement) In IPLS, MAC reachability is advertised via LDP –LDP sessions face scalability challenge in a full-meshed large data center network. –Adding new PEs would require configurations on all remote PEs. In VS, IP reachability is advertised via BGP –BGP session can scale well with the help of route reflector mechanism. –Adding new PEs just induce configuration on RRs. The forwarding table size on PE is the same for both IPLS and VS. –Both host routes and MAC routes are not aggregatable.

IPLS vs. VS (ARP Reduction) In IPLS, ARP storm issue is not solved completely. –ARP packets even including the unicast ARP reply packets are forwarded from attachment circuits to "multicast" PWs and the received APR packets from the "multicast" PWs will be flooded to all CE hosts. –How to keep the consistency of ARP caches on different PE routers is a hard issue. In VS, by using ARP Proxy on PE routers, ARP traffic is limited within a site scope.

IPLS vs. VS (CE Multi-homing) IPLS prohibits connection of a common LAN or VLAN to more than one PE router. –That’s to say, IPLS can not support redundancy and load-balancing of PE-CE connections. VS can support CE multi-homing natively.

IPLS vs. VS (Intermediary Bridge’s MAC Table Size) In IPLS, the intermediary bridges between PEs and CEs would have to learn all CE hosts (both local and remote) –An IP frame received over a unicast PW is prepended with the PE router’s own local MAC address before transmitting it on the appropriate attachment circuits. However, the destination MAC address of the packet to a remote CE host which is sent from a local CE host is the MAC of the remote CE host, rather than the local PE router’s MAC. Thus, flooding unknown unicast frames on the above Ethernet bridges would happen sooner or latter. –To avoid flooding unknown unicast frames, these bridges are configured to not age out the learned MAC entries. In VS, the intermediary bridges only need to learn the MAC addresses of local CE hosts and local PE routers.