draft-ietf-bess-virtual-subnet-fib-reduction-00.txt   draft-ietf-bess-virtual-subnet-fib-reduction-01.txt 
Network Working Group X. Xu Network Working Group X. Xu
Internet-Draft Huawei Internet-Draft Huawei
Intended status: Informational S. Hares Intended status: Informational C. Jacquenet
Expires: July 30, 2015 Individual Expires: January 31, 2016 Orange
Y. Fan
China Telecom
C. Jacquenet
Orange
T. Boyes T. Boyes
Bloomberg LP Bloomberg LP
B. Fee B. Fee
Extreme Networks Extreme Networks
W. Henderickx W. Henderickx
Alcatel-Lucent Alcatel-Lucent
January 26, 2015 July 30, 2015
FIB Reduction in Virtual Subnet FIB Reduction in Virtual Subnet
draft-ietf-bess-virtual-subnet-fib-reduction-00 draft-ietf-bess-virtual-subnet-fib-reduction-01
Abstract Abstract
Virtual Subnet is a BGP/MPLS IP VPN-based subnet extension solution Virtual Subnet is a BGP/MPLS IP VPN-based subnet extension solution
which is intended for building Layer3 network virtualization overlays which is intended for building Layer3 network virtualization overlays
within and/or across data centers. This document describes a within and/or between data centers. This document describes a
mechanism for reducing the FIB size of PE routers in the Virtual mechanism for reducing the FIB size of PE routers in the Virtual
Subnet context. Subnet context.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 30, 2015. This Internet-Draft will expire on January 31, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Solution Description . . . . . . . . . . . . . . . . . . . . 3 3. Solution Description . . . . . . . . . . . . . . . . . . . . 3
4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
6. Security Considerations . . . . . . . . . . . . . . . . . . . 5 6. Security Considerations . . . . . . . . . . . . . . . . . . . 5
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 5
7.1. Normative References . . . . . . . . . . . . . . . . . . 5 7.1. Normative References . . . . . . . . . . . . . . . . . . 5
7.2. Informative References . . . . . . . . . . . . . . . . . 5 7.2. Informative References . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction 1. Introduction
Virtual Subnet [I-D.ietf-l3vpn-virtual-subnet] is a BGP/MPLS IP VPN Virtual Subnet [I-D.ietf-bess-virtual-subnet] is a BGP/MPLS IP VPN
[RFC4364] -based subnet extension solution which is intended for [RFC4364] -based subnet extension solution which is intended for
building Layer3 network virtualization overlays within and/or across building Layer3 network virtualization overlays within and/or across
data centers. In the Virtual Subnet context, since CE host routes of data centers. In the Virtual Subnet context, since CE host routes of
a given VPN instance need to be exchanged among PE routers a given VPN instance need to be exchanged among PE routers
participating in that VPN instance, the resulting forwarding table participating in that VPN instance, the resulting forwarding table
(a.k.a. FIB) size of PE routers may become a big concern in large- (a.k.a. FIB) size of PE routers may become a big concern in large-
scale data center environment where they may need to install a huge scale data center environment where they may need to install a huge
amount of host routes into their forwarding tables. In some cases amount of host routes into their forwarding tables. In some cases
where host routes need to be maintained on the control plane, it where host routes need to be maintained on the control plane, it
needs a method to reduce the FIB size of PE routers without any needs a method to reduce the FIB size of PE routers without any
skipping to change at page 3, line 20 skipping to change at page 3, line 14
2. Terminology 2. Terminology
This memo makes use of the terms defined in [RFC4364]. This memo makes use of the terms defined in [RFC4364].
3. Solution Description 3. Solution Description
+----------+ +----------+
+----+PE/RR(APR)+----+ +----+PE/RR(APR)+----+
+-----------------+ | +----------+ | +-----------------+ +-----------------+ | +----------+ | +-----------------+
|VPN_A:1.1.1.1/24 | | | |VPN_A:1.1.1.1/24 | |VPN_A:10.1.1.1/24| | | |VPN_A:10.1.1.1/24|
| \ | | | | / | | \ | | | | / |
| +------+ \++---+-+ +-+---++/ +------+ | | +------+ \++---+-+ +-+---++/ +------+ |
| |Host A+------+ PE-1 | | PE-2 +------+Host B| | | |Host A+------+ PE-1 | | PE-2 +------+Host B| |
| +------+\ ++-+-+-+ +-+-+-++ /+------+ | | +------+\ ++-+-+-+ +-+-+-++ /+------+ |
| 1.1.1.2/24 | | | | | | 1.1.1.3/24 | | 10.1.1.2/24 | | | | | | 10.1.1.3/24 |
| | | | | | | | | | | | | | | |
| DC West | | | IP/MPLS Backbone | | | DC East | | DC West | | | IP/MPLS Backbone | | | DC East |
+-----------------+ | | | | +-----------------+ +-----------------+ | | | | +-----------------+
| +--------------------+ | | +--------------------+ |
| | | |
VRF: V VRF:V VRF: V VRF:V
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
| Prefix | Nexthop |Protocol|In_FIB| | Prefix | Nexthop |Protocol|In_FIB| | Prefix- | Nexthop |Protocol|In_FIB| | Prefix | Nexthop |Protocol|In_FIB|
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
| 1.1.1.1/32 |127.0.0.1| Direct | Yes | | 1.1.1.1/32 |127.0.0.1| Direct | Yes | |10.1.1.1/32 |127.0.0.1| Direct | Yes | |10.1.1.1/32 |127.0.0.1| Direct | Yes |
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
| 1.1.1.2/32 | 1.1.1.2 | Direct | Yes | | 1.1.1.2/32 | PE-1 | IBGP | No | |10.1.1.2/32 |10.1.1.2 | Direct | Yes | |10.1.1.2/32 | PE-1 | IBGP | No |
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
| 1.1.1.3/32 | PE-2 | IBGP | No | | 1.1.1.3/32 | 1.1.1.3 | Direct | Yes | |10.1.1.3/32 | PE-2 | IBGP | No | |10.1.1.3/32 |10.1.1.3 | Direct | Yes |
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
| 1.1.1.0/25 | APR | IBGP | Yes | | 1.1.1.0/25 | APR | IBGP | Yes | |10.1.1.0/25 | APR | IBGP | Yes | |10.1.1.0/25 | APR | IBGP | Yes |
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
|1.1.1.128/25| APR | IBGP | Yes | |1.1.1.128/25| APR | IBGP | Yes | |10.1.1.128/25| APR | IBGP | Yes | |10.1.1.128/25| APR | IBGP | Yes |
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
| 1.1.1.0/24 | 1.1.1.1 | Direct | Yes | | 1.1.1.0/24 | 1.1.1.1 | Direct | Yes | |10.1.1.0/24 | 10.1.1.1| Direct | Yes | |10.1.1.0/24 |10.1.1.1 | Direct | Yes |
+------------+---------+--------+------+ +------------+---------+--------+------+ +-------------+---------+--------+------+ +-------------+---------+--------+------+
Figure 1: Selective FIB Installation Example Figure 1: Selective FIB Installation Example
To reduce the FIB size of PE routers, the selective FIB installation To reduce the FIB size of PE routers, the selective FIB installation
concept as described in [I-D.ietf-grow-va] can be leveraged in the concept as described in [I-D.ietf-grow-va] can be leveraged in the
Virtual Subnet context. Take the VPN instance demonstrated in Virtual Subnet context. Take the VPN instance demonstrated in
Figure 1 as an example, the FIB reduction procedures are described as Figure 1 as an example, the FIB reduction procedures are described as
follows: follows:
1. Multiple more specific prefixes (e.g., 1.1.1.0/25 and 1. Multiple more specific prefixes (e.g., 1.1.1.0/25 and
skipping to change at page 5, line 12 skipping to change at page 5, line 7
the control plane would trigger a lookup in the routing table. If a the control plane would trigger a lookup in the routing table. If a
corresponding host route is found but not yet installed into the FIB, corresponding host route is found but not yet installed into the FIB,
it would be installed into the FIB. To provide robust protection it would be installed into the FIB. To provide robust protection
against DoS attacks on the control plane, rate-limiting of the above against DoS attacks on the control plane, rate-limiting of the above
packets sent to the control plane MUST be enabled. Those FIB entries packets sent to the control plane MUST be enabled. Those FIB entries
for remote CE host routes which are on-demand installed on non-APR PE for remote CE host routes which are on-demand installed on non-APR PE
routers would expire if not used for a certain period of time. routers would expire if not used for a certain period of time.
4. Acknowledgements 4. Acknowledgements
The authors would like to thank Robert Raszuk and Bruno Decraene for The authors would like to thank Susan Hares, Yongbing Fan, Robert
their valuable suggestions on this document. Raszuk and Bruno Decraene for their valuable suggestions on this
document.
5. IANA Considerations 5. IANA Considerations
The type value for the Extended Communities Attributes as described The type value for the Extended Communities Attributes as described
in this doc is required to be allocated by the IANA. in this doc is required to be allocated by the IANA.
6. Security Considerations 6. Security Considerations
This document does not introduce any new security risk. This document does not introduce any new security risk.
7. References 7. References
7.1. Normative References 7.1. Normative References
[I-D.ietf-l3vpn-virtual-subnet] [I-D.ietf-bess-virtual-subnet]
Xu, X., Raszuk, R., Hares, S., Yongbing, F., Jacquenet, Xu, X., Raszuk, R., Jacquenet, C., Boyes, T., and B. Fee,
C., Boyes, T., and B. Fee, "Virtual Subnet: A L3VPN-based "Virtual Subnet: A BGP/MPLS IP VPN-based Subnet Extension
Subnet Extension Solution", draft-ietf-l3vpn-virtual- Solution", draft-ietf-bess-virtual-subnet-00 (work in
subnet-03 (work in progress), December 2014. progress), June 2015.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
Networks (VPNs)", RFC 4364, February 2006. Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February
2006, <http://www.rfc-editor.org/info/rfc4364>.
7.2. Informative References 7.2. Informative References
[I-D.ietf-grow-va] [I-D.ietf-grow-va]
Francis, P., Xu, X., Ballani, H., Jen, D., Raszuk, R., and Francis, P., Xu, X., Ballani, H., Jen, D., Raszuk, R., and
L. Zhang, "FIB Suppression with Virtual Aggregation", L. Zhang, "FIB Suppression with Virtual Aggregation",
draft-ietf-grow-va-06 (work in progress), December 2011. draft-ietf-grow-va-06 (work in progress), December 2011.
Authors' Addresses Authors' Addresses
Xiaohu Xu Xiaohu Xu
Huawei Huawei
Email: xuxiaohu@huawei.com Email: xuxiaohu@huawei.com
Susan Hares
Individual
Email: shares@ndzh.com
Yongbing Fan
China Telecom
Email: fanyb@gsta.com
Christian Jacquenet Christian Jacquenet
Orange Orange
Email: christian.jacquenet@orange.com Email: christian.jacquenet@orange.com
Truman Boyes Truman Boyes
Bloomberg LP Bloomberg LP
Email: tboyes@bloomberg.net Email: tboyes@bloomberg.net
 End of changes. 16 change blocks. 
49 lines changed or deleted 39 lines changed or added

This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/