NVO3 NVA Gap Analysis Linda Dunbar Donald Eastlake.

Slides:



Advertisements
Similar presentations
TRILL ESADI draft-hu-trill-rbridge-esadi-00 Hongjun Zhai (ZTE) Fangwei hu (ZTE) Radia Perlman (Intel Labs) Donald Eastlake 3 rd (Huawei) July 20111TRILL.
Advertisements

LACP Project Proposal.
10: ICMPv6 Neighbor Discovery
A Unified LISP Mapping Database for L2 and L3 Network Virtualization Overlays Draft-hertoghs-nvo3-lisp-unfied- control-plane Yves Hertoghs.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
Host Autoconfiguration ALTTC, Ghaziabad. IPv4 Address and IPv6 equivalents ALTTC, Ghaziabad.
Directory Assisted TRILL Encapsulation by non-TRILL nodes (Directory Reliant Smart End Node) Linda Dunbar Donald Eastlake Radia Perlman Igor Gashinsky.
 As defined in RFC 826 ARP consists of the following messages ■ ARP Request ■ ARP Reply.
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Multiple Protocol Over ATM (MPOA) 中正資工 黃仁竑. MPOA v MPOA integrates LANE and NHRP to preserve benefits of LANE while allowing inter-subnet communication.
Server Assisted TRILL Edge Linda Dunbar
Revision of the Appointed Forwarder RFC draft-eastlake-trill-rfc txt Donald E. Eastlake, 3 rd March 2015 Appointed.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri February 2015 NVO3 Interim Meeting draft-yong-rtgwg-igp-mutlicast-arch-01.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 3 Address Resolution Protocol (ARP)
CEN Network Fundamentals Chapter 19 Binding Protocol Addresses (ARP) To insert your company logo on this slide From the Insert Menu Select “Picture”
Directory Assisted RBridge Edge draft-dunbar-trill-directory-assisted-edge-05 Update Linda Dunbar: Donald
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
VLAN Trunking Protocol (VTP)
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Hyung-Min Lee ©Networking Lab., 2001 Chapter 8 ARP and RARP.
Chapter 19 - Binding Protocol Addresses
November 2010Future TRILL Work1 Future TRILL Work 2 Donald Eastlake 3 rd 155 Beaver Street Milford, MA USA
Directory Assisted Edge Donald Eastlake, Linda Dunbar Huawei Technologies
BAI513 - PROTOCOLS DHCP BAIST – Network Management.
BCP for ARP/ND Scaling for Large Data Centers
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Engineering Workshops Purposes of Neighbor Solicitation.
DHCP Options for Configuring Tenant Identifier and Multicast Addresses in Overlay Networks Behcet Sarikaya Frank Xia.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
November 2013TRILL Directory Assist Mechanisms1 TRILL Directory Assistance Mechanisms draft-dunbar-trill-scheme-for-directory-assist-06 draft-eastlake-trill-ia-appsubtlv-03.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Switching Topic 3 VTP. Agenda VTP basics Components Frames and advertisements Domains and revision numbers VTP operations VTP pruning VTP issues.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
NVO3 Framework and Data Plane Requirement Addition Lucy Yong Linda Dunbar March 2013 Orlando FL draft-yong-nvo3-frwk-dpreq-addition-00.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Linux Operations and Administration
Cisco 3 - Switch Perrine. J Page 12/4/2016 Chapter 9 Which protocol is Cisco proprietary and designed to carry traffic from multiple VLANs? A Q.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
1 68th IETF, Prague, March 2007 Address Resolution for GMPLS controlled PSC Ethernet Interfaces draft-ali-arp-over-gmpls-controlled-ethernet-psc-i-04.txt.
BAI513 - PROTOCOLS DHCP BAIST – Network Management.
March th IETF - Prague1 TRILL Working Group Changes from draft-trill-rbridge-protocol-02.txt to draft-trill-rbridge-protocol-03.txt Dinesh Dutt,
Multicast Issues in Networks Using NVO3 Anoop Ghanwani, Dell Linda Dunbar, Huawei Vinay Bannai, Paypal Ram Krishnan, Brocade draft-ghanwani-nvo3-mcast-issues-011.
March 2007RBridge Extensions1 RBridge Protocol Extensions and the Inner Q-tag Location Donald Eastlake 3rd
XRBLOCK IETF 85 Atlanta Network Virtualization Architecture Design and Control Plane Requirements draft-fw-nvo3-server2vcenter-01 draft-wu-nvo3-nve2nve.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
1 Layer 3: Protocols Honolulu Community College Cisco Academy Training Center Semester 1 Version
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
Scaling the Network: Subnetting and Protocols
Introduction to Networks v6.0
Module 8: Networking Services
Instructor Materials Chapter 5: Ethernet
Anoop Ghanwani Linda Dunbar Mike McBride Vinay Bannai Ramki Krishnan
Pertemuan 12 Virtual Trunking Protocol
Revisiting Ethernet: Plug-and-play made scalable and efficient
ICMP ICMP – Internet Control Message Protocol
VLAN Trunking Protocol
TRILL Directory Assistance Mechanisms
Additional TRILL Work/Documents
2018/11/16 Scalable Address Resolution for Data Center and Cloud Computing Problem Statements Linda Dunbar Sue Hares
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Ch 17 - Binding Protocol Addresses
Presentation transcript:

NVO3 NVA Gap Analysis Linda Dunbar Donald Eastlake

TRILL Directory Applicability to NVO3 TRILL: L2 in TRILL NVO3: L2 in IP; L3 in IP Goal : Resolve Egress edge addresses

Variety of Directories (NVAs) Core DIR Locations: -Embedded in routers/switches in the core, or as standalone servers attached to them. -Embedded in Edges or as Standalone servers connected to Edges via the client side Contents: -Each DIR has mapping for a subset of VNs -multiple DIRs have content for a VN

Push Model in TRILL Policies: When ingress edge can’t find entries for the incoming data frame: – simply drop the data frame, – flood it to all other edges that are in the same VN, or – start the “pull” process to get information from Pull Directory Server(s) (or NVA) Requesting Push Service: – Push Directory servers (NVAs) (or the Edge by which they are attached) use VN scoped reliable Link State flooding to announce their availability to push mapping information. – Edge nodes use VN scoped reliable Link State flooding to announce all the Virtual Networks in which they are participating Push: – Directory servers (NVAs) pushed VN scoped entries to Edges. Incremental Push Service Update – Achieved by Link State Update to distribute the incremental updates.

Push Model: Multiple Directories When there are multiple Directories for a given VN, all of them can push, and configured number of them actually do. – An Edge takes the content from the Directory with the highest system ID

Pull Model Request and Reply use separate control channel (Rbridge Channel syntax ) Pull Request: – Target address family (IPv4/IPv6, [MAC/VLAN]) – Optional: Source Address family (IPv4/IPv6, MAC, VLAN, Source NVE) – Triggered by: An edge node (NVE) receives an ingress data frame with a destination whose attached edge (NVE) is unknown, or The edge node (NVE) receives an ingress ARP/ND request for a target whose link address (MAC) or attached edge (NVE) is unknown.

PULL Response Address mapping, coupled with the valid cache timer The target being queried is not available, or The requestor is administratively prohibited from getting an informative response. If no response is received within a configurable timeout, the request should be re-transmitted with the same Sequence Number up to a configurable number of times that defaults to three.

Push-Pull Hybrid Model Push model are used for some VNs, and pull model are used for other VNs. – It can be operator’s decision (i.e. by configuration) on which VNs’ mapping entries are pushed down from directory (e.g. frequently used) and which VNs’ mapping entries are pulled (e.g. rarely used). – Useful for Gateway nodes where great number of VNs are enabled. Or, a portion of hosts in a VN is pushed, other portion has to be pulled.

Cache Consistency When data in a Pull Directory changes and there may be unexpired stale information at a querying edge (NVE), the Pull Directory must send an unsolicited message to the edge (NVE) to update the pulled entries. When data in Push model changes, incremental update is sent to all edges that have pushed entries.

Gap Summary TRILL’s Push and Pull Policies are applicable to NVO3 TRILL’s Push/Pull requests/reply mechanism are applicable to NVO3 NVO3’s NVA will need one additional attribute: VN context (VN ID and/or VN Name).