NVE Auto-discovery Protocol draft-gu-virt-edge-auto-discovery-00 Zhongyu Gu, Ting Ao, Chongfeng Xie, Vic Liu.

Slides:



Advertisements
Similar presentations
Text 1 An invitation letter
Advertisements

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
1 IEEE 1588v2 Clock Synchronization & P2MP LSP with co-routed reverse path Lizhong Jin (ZTE) Frederic Jounay (France Telecom Orange)
How to Update S210 BIOS/EC.
Step1 : Check Free Disk Space on drive where Software is Installed. Free space must be approx. twice of current database size. Step2: Check for any pending.
What is license A unique license number is given at the time of new installation.(For example: Lic no. olk162531) A software license both imposes restrictions.
Live Migration of Virtual Machines Presented by: Edward Armstrong University of Guelph.
Live Demo – Channel Sales eCommerce SOP
Virtual Network Auto-Provisioning Requirements draft-gu-nvo3-auto-provisioning-reqs-00 Zhongyu Gu, Ting Ao, Qian Sun, Vic Liu.
CE Lesson 2 Emerging Patterns Benefits Planning Query Discovery Visits.
Yizhou Li Bob Sultan Gu Yingjie
IEEE r0 Submission July 2007 R. Zhang, H. Jung, E. Lee, M. Lee Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
1 Multicast in ns-2 報告者 : 陳沐恩. 2 Multicast 簡介 3 Multicast Routing set ns [new Simulator] $ns multicast Or set ns [new Simulator – multicast on] set mproto.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
BY MICHAEL SUDKOVITCH AND DAVID ROITMAN UNDER THE GUIDANCE OF DR. GABI NAKIBLY OSPF Security project: Summary.
1 Firewalls. 2 References 1.Mark Stamp, Information Security: Principles and Practice, Wiley Interscience, Robert Zalenski, Firewall Technologies,
Labcourse “Routerlab”
IETF87 i2rs WG1 Interface to the Routing System (I2RS) for Service Chaining: Use Cases and Requirements draft-bitar-i2rs-service-chaining-00.txt N. Bitar.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
NSIS based NetServ Signalling Protocol Design and Implementation Roberto Francescangeli Visiting PhD student.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Chapter 17 TACACS+.
Turning Software into a Service By Mark Turner, David Budgen and Pearl Brereton.
1 AAA Framework for Multicasting draft-ietf-mboned-multiaaa-framework-01.txt July 11, 2006 Hiroaki Satou Hiroshi Ohta
Lucy Yong Susan Hares September 20, 2012 Boston
Draft-tarapore-mbone- multicast-cdni-05 Percy S. Tarapore, AT&T Robert Sayko, AT&T Greg Shepherd, Cisco Toerless Eckert, Cisco Ram Krishnan, Brocade.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Liaison Report Date Submitted: July 20, 2006 Presented at IEEE.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Information Service Flow Update Date Submitted: October 22, 2006.
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
NVO3 Anycast Layer 3 Gateway draft-hao-nvo3-anycast-gw-00 July 20141NVO3 Anycast Gateway Weiguo Hao(Huawei) Lucy Yong(Huawei) Yizhou Li(Huawei) Feng Wang(H3C)
PAGE 1 A Firewall Control Protocol (FCON) draft-soliman-firewall-control-00 Hesham Soliman Greg Daley Suresh Krishnan
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari.
NVO3 VDP Gap Analysis VM to NVE Specific Control Plane Requirements Paul Bottorff (HP) Joseph Pelissier (Cisco) Patricia Thaler (Broadcom)
1 CURELAN TECHNOLOGY Co., LTD Flowviewer FM-800A CURELAN TECHNOLOGY Co., LTD
Stages in Research Process Formulate Problem Determine Research Design Determine Data Collection Method Design Data Collection Forms Design Sample & Collect.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Network Virtualization Overlays (NVO3) NVO3 Meeting, IETF 90, Toronto Benson Schliesser Matthew Bocci
Server2nve Kompella, Rekhter, Morin, Black IETF 85, NVO3 WG.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
Bing Liu (speaker), Sheng WG, ietf96, July 2016
BIER Use Case in VXLAN draft-wang-bier-vxlan-use-case-00 Linda Wang (Presenting) Sandy. Zhang & F. Hu.
Local MAC Address Assignment Protocol(LAAP) -- Thought on 802.1CQ
Initial Performance Metric Registry Entries
UDP Encapsulation for IP Tunneling
PANA Issues and Resolutions
Overview of TSG-X Femto Standardization Activities
draft-xu-isis-nvo-cp-00 Xiaohu Xu (Huawei) Saumya Dikshit (Cisco)
Virtual Subnet : A L3VPN-based Subnet Extension Solution
A Reference Model for Autonomic Networking draft-ietf-anima-reference-model-03.txt 97th IETF, Nov 2016 Michael Behringer (editor), Brian Carpenter, Toerless.
How a Stateful Firewall Works
ERP extension for EAP Early-authentication Protocol (EEP)
Authority decision on CAP086 –Implementation Dates
Kireeti Kompella Juniper Networks
<month year> <Sept 2018>
Export BGP community information in IPFIX draft-ietf-opsawg-ipfix-bgp-community-05.txt Zhenqiang Li Rong Gu China Mobile Jie Dong Huawei Technologies.
doc.: IEEE <doc#>
Requirements on NVE and introduction of VDP
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
NVO3 Control Plane Roundtable Discussion Summary and Next-steps
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-0sec
Applicability of EVPN to NVO3 Networks
Point 3.2 SAEG Meeting – July 7th, 2015
Presentation transcript:

NVE Auto-discovery Protocol draft-gu-virt-edge-auto-discovery-00 Zhongyu Gu, Ting Ao, Chongfeng Xie, Vic Liu

Purpose Outline the NVE auto-discovery protocol to support VN automatic provisioning etc.

NVE Auto-discovery protocol Procedures VM preparation VM NVE NVA NVE Auto-discovery Initiation Packet NVE Auto-discovery Offer Packet NVE Auto-discovery Request Packet NVE Auto-discovery Session- confirmation Packet VM/VN authentication Create VRF etc Sync/w other NVE(s) VN Session NVE Auto-discovery Termination Packet VM/VN Information To/From other NVE(s) VN Session Stage Discovery stage

IANA considerations New type of Ether_Type for NVE auto- discovery – Discovery stage – Session stage

NVE auto-discovery protocol: Application VM live migration – Using VN itself as the migration sync transport NVE Corresponding VM src VM dst VM Step1: dst VM preparation Step2: dst VM Auto- discover NVE with Migration attribute Step3: after dst VM pass VN auth., dst NVE create VN context Step4: NVE floods VN info for dst VM Step4 Step5: src-dst NVE work as sync transport Step6: duplicate traffic supporting sync Step7: stop running after sync Step8: Begin running after sync Step9: NVE floods VM migrat- finish info

NVE auto-discovery protocol: Pro and Con Pros – Simplicity – Flexible (VM-NVE connection) – Potential Secure – VN Auto-provisioning – Supporting VM live migration Cons – New protocol/acceptability – VM support

Comparing with VDP TBD

Next Step… Comments collecting and further discussions Further detail information Comparison with VDP ……