UDP Encapsulation for IP Tunneling

Slides:



Advertisements
Similar presentations
Project by: Palak Baid (pb2358) Gaurav Pandey (gip2103) Guided by: Jong Yul Kim.
Advertisements

Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Problem Statement and Architecture for Information Exchange Between Interconnected Traffic Engineered Networks draft-farrel-interconnected-te-info-exchange-03.txt.
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
Encapsulating MPLS in UDP draft-xu-mpls-in-udp-02 Xiaohu Xu (Huawei) Marshall Eubanks (AmericaFree.TV) Lucy Yong (Huawei) Nischal Sheth.
TRILL over IP draft-ietf-trill-over-ip-01.txt IETF 91, Honolulu Margaret Wasserman Donald Eastlake, Dacheng Zhang.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Entropy Labels in MPLS Forwarding draft-kompella-mpls-entropy-label-01 Kireeti Kompella Juniper Networks Shane Amante Level 3 Communications.
Entropy Labels in MPLS Forwarding draft-kompella-mpls-entropy-label-02
Generic UDP Encapsulation for IP Tunneling Lucy Yong July 2014 Toronto CA draft-ietf-tsvwg-gre-in-udp-02.
MPLS over L2TPv3 Encapsulation IETF VersionIHLTOSTotal length IdentificationFlagsFragment offset TTL Protocol ==
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
HIP-Based NAT Traversal in P2P-Environments
GRE.
A Fragmentation Strategy for Generic Routing Encapsulation (GRE)
recap draft-ietf-tsvwg-ecn-encap-guidelines-07
Quality and Value for the Exam 100% Guarantee to Pass Your Exam Based on Real Exams Scenarios Verified Answers Researched by Industry.
Introduction to Networks
Ready-to-Deploy Service Function Chaining for Mobile Networks
IPSecurity.
Requirements for LER Forwarding of IPv4 Option Packets
Internet Protocol Version 6 Specifications
Virtual Private Networks
Multicast in BGP/MPLS VPN
Network Virtualization Overlay Use Cases
Booting up on the Home Link
GRE-in-UDP Encapsulation
An IPv6 Flow Label Specification Proposal
draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)
Internet and Intranet Fundamentals
Presenter: Jeffrey Zhang
Compression Format for IPv6 Datagrams in 6LoWPAN Networks
Packet PWE3 – Efficient for IP/MPLS
Softwire Mesh Solution Framework
Advertising Encapsulation Capability Using OSPF
IPv6 / IP Next Generation
Encapsulating MPLS in UDP
IPv6 Router Alert Option for MPLS OAM
I2RS Large Flow Use Case draft-krishnan-i2rs-large-flow-use-case-00
CS 457 – Lecture 10 Internetworking and IP
An MPLS-Based Forwarding Plane for Service Function Chaining
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Guide to TCP/IP Fourth Edition
Network base Network base.
Zhenbin Li, Shunwan Zhuang Huawei Technologies
A Unified Approach to IP Segment Routing
EVPN Interworking with IPVPN
Bala’zs, Norm, Jouni DetNet WG London, 23rd March, 2018
Xiaohu Xu (Huawei) Stewart Bryant (Huawei) Hamid Assarpour (Broadcom)
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Network Fundamentals – Chapter 5
PW Control Word Stitching
An MPLS-Based Forwarding Plane for Service Function Chaining
IPv6 Encapsulation for IOAM - Enhancement of IPv6 Extension Headers draft-li-6man-ipv6-sfc-ifit-01 draft-li-6man-enhanced-extension-header-00 Zhenbin.
BIER in IPv6 draft-zhang-bier-bierin6-03
PW Control Word Stitching
Active OAM in Geneve draft-mmbb-nvo3-geneve-oam
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
draft-ietf-bier-ipv6-requirements-01
IP RSVP-TE: Extensions to RSVP for P2P IP-TE LSP Tunnels Tarek Saad, Juniper Networks Vishnu Pavan Beeram, Juniper.
Editors: Bala’zs Varga, Jouni Korhonen
BGP VPN service for SRv6 Plus IETF 105, Montreal
Internet Protocol version 6 (IPv6)
DetNet Data Plane Solutions draft-ietf-detnet-dp-sol-ip-02  draft-ietf-detnet-dp-sol-mpls-02  Bala’zs Varga, Jouni Korhonen, Janos Farkas, Lou Berger,
Unified Source Routing Instructions using MPLS Label Stack draft-xu-mpls-unified-source-routing-instruction-04 Xiaohu Xu (Huawei) Ahmed Bashandy (Cisco)
E. Bellagamba, Ericsson P. Sköldström, Acreo D. Ward, Juniper
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

UDP Encapsulation for IP Tunneling draft-yong-tsvwg-udp-4-ip-tunneling-01 Lucy Yong, Xiaohu Xu * Here to present March 2013 Orlando FL

Background Existing Tunneling solutions IP Infrastructure Networks carry tunneled traffic Transit nodes are not aware of tunneled traffic/protocols Tunneled traffic may be IP or non-IP packets Some tunneled layer protocols already deployed Network overlay example: IPv6 over IPv4, GRE, etc Network virtualization overlay: MPLS VPN, VXLAN, NVGRE, etc Existing Tunneling solutions IP-in-IP [RFC2003] GRE [RFC2784] L2TPv3 [RFC3931]

Background Cont. IP Networks are built on parallelized capacity e.g. multiple 10G links bundled together as a mx10G link equal cost multiple paths (ECMP) is available to one end operator desire to use all the paths carrying the tunneled traffic w/ the same tunnel end point IP Networks already support ECMP and LAG Hashing based load distribution is the common practice IP header and TCP/UDP header is used for ECMP load distribution i.e. (five tuple) packets with the same five tuple is carried on the same path, which ensures no packet re-ordering UDP src and dst ports are used as entropy in the load distribution The purpose… These are real-world use cases we know of so far. We’re hoping to gather more use cases from the folks present here in order to make this work worthwhile. In this presentation I stay away from mash up examples so we can focus on key enabling properties individually. The presentation is divided into four focus areas … 1-2-3-4 These focus areas are further grouped by NVO properties driven by example use cases which we’ll talk about.

Problem Statement Tunneled traffic may be carried over IP network where ECMP/LAG is required To avoid tunneled flow packets re-ordering, IP network MUST keep a tunneled flow in the same path solution for this is to have an entropy field in packets for IP network with ECMP, in which a tunneled flow packets is assigned to the same entropy value Solution weakness for IP network with ECMP IP-in-IP [RFC2003] does not have a place for entropy info GRE [RFC2784] has an entropy field but requires transit router special processing L2TPv3 [RFC3931] has the same capability and problem as GRE

What is in this draft? Specify a generic UDP encapsulation method for any tunneled layer protocol over IP networks w/ ECMP Achieve it w/o any change in IP network transit nodes the same LB method for both host based apps. and tunneled apps. Have a flow entropy field in UDP header UDP src and dst ports are commonly used as entropy in IP network tunneled packets w/ the same entropy value carried through the same path in IP network may map one or more tunneled flows to the same value Have a way to identify tunneled protocol in the UDP header needed in order to support any tunneled layer protocol Achieve it w/o any change of tunneled layer protocols Specify tunnel endpoint process procedures and error handling

UDP Encapsulation for IP Tunneling UDP source port is used as the flow entropy field may be set to any value by the tunnel ingress Varying the value according to the payload flow will enable load balancing within IP networks UDP destination port is set to indicate the tunneled layer protocol that is registered under IANA Other UDP header fields remain the same as in [RFC768] RECOMMEND that the UDP checksum field is set to zero.

UDP Header Usage in this draft UDP port usage here is different from before Not for demultplexing transport connection at end point Nor identifying an upper layer service Header does not provide transport function for upper layer application UDP ports are to provide flow entropy and the tunneled protocol type UDP ports have been used as entropy in IP network The latter is necessary in order to support any tunneled layer protocol Note: VXLAN have been implemented in this way

Comment from Joe Touch Alternative ways to indicate tunneled layer protocol type A: Use one UDP dst. port to indicate the service for underlying IP network ECMP Use a shim header in the payload to indicate the payload protocol type that are registered under IANA This allows an IP tunnel carrying multiple layer protocols B: Tunnel end point always signals the tunneled protocol type ahead This only applies when each IP tunnel carries one tunneled protocol

Draft Contributors John Drake Adrian Farrel Juniper Networks Carlos Pignataro Cisco System Yiu Lee Comcast Edward Crabbe Google, Inc. Vishwas Manral Hewlett-Packard Corp. Yangbin Fan China Telecom

Next Step Welcome comment and feedback on this Determine the proper way to indicate tunneled protocol Each option has pros and cons Authors prefer the option described in the draft because VXLAN already implements this way Seek WG adoption of this