draft-ietf-nvo3-use-case-03.txt   draft-ietf-nvo3-use-case-04.txt 
skipping to change at page 1, line 13 skipping to change at page 1, line 13
Internet Draft Huawei Internet Draft Huawei
Category: Informational M. Toy Category: Informational M. Toy
Comcast Comcast
A. Isaac A. Isaac
Bloomberg Bloomberg
V. Manral V. Manral
Hewlett-Packard Hewlett-Packard
L. Dunbar L. Dunbar
Huawei Huawei
Expires: July 2014 January 8, 2014 Expires: January 2015 July 1, 2014
Use Cases for DC Network Virtualization Overlays Use Cases for DC Network Virtualization Overlays
draft-ietf-nvo3-use-case-03 draft-ietf-nvo3-use-case-04
Abstract Abstract
This document describes DC Network Virtualization (NVO3) use cases This document describes DC Network Virtualization (NVO3) use cases
that may be potentially deployed in various data centers and apply that may be potentially deployed in various data centers and apply
to different applications. to different applications.
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with This Internet-Draft is submitted to IETF in full conformance with
skipping to change at page 1, line 46 skipping to change at page 1, line 46
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as reference at any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July, 2014. This Internet-Draft will expire on January, 2015.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License. warranty as described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction...................................................3 1. Introduction ................................................ 3
1.1. Contributors..............................................4 1.1. Contributors ........................................... 4
1.2. Terminology...............................................4 1.2. Terminology ............................................ 4
2. Basic Virtual Networks in a Data Center........................5 2. Basic Virtual Networks in a Data Center ..................... 4
3. Interconnecting DC Virtual Network and External Networks.......6 3. Interconnecting DC Virtual Network and External Networks .... 6
3.1. DC Virtual Network Access via Internet....................6 3.1. DC Virtual Network Access via Internet ................. 6
3.2. DC VN and Enterprise Sites interconnected via SP WAN......7 3.2. DC VN and Enterprise Sites interconnected via SP WAN ... 7
4. DC Applications Using NVO3.....................................9 4. DC Applications Using NVO3 .................................. 8
4.1. Supporting Multi Technologies and Applications in a DC....9 4.1. Supporting Multi Technologies and Applications in a DC . 9
4.2. Tenant Network with Multi-Subnets or across multi DCs.....9 4.2. Tenant Network with Multi-Subnets or across multi DCs .. 9
4.3. Virtualized Data Center (vDC)............................11 4.3. Virtualized Data Center (vDC) ......................... 11
5. OAM Considerations............................................13 5. OAM Considerations ......................................... 12
6. Summary.......................................................13 6. Summary .................................................... 13
7. Security Considerations.......................................14 7. Security Considerations .................................... 14
8. IANA Considerations...........................................14 8. IANA Considerations ........................................ 14
9. Acknowledgements..............................................14 9. Acknowledgements ........................................... 14
10. References...................................................14 10. References ................................................ 14
10.1. Normative References....................................14 10.1. Normative References ................................. 14
10.2. Informative References..................................15 10.2. Informative References ............................... 15
Authors' Addresses...............................................15 Authors' Addresses ............................................ 15
1. Introduction 1. Introduction
Server Virtualization has changed IT industry in terms of efficiency, Server Virtualization has changed IT industry in terms of efficiency,
cost, and the speed in providing a new applications and/or services. cost, and the speed in providing a new applications and/or services.
However, today's data center networks have limited support for cloud However, today's data center networks have limited support for cloud
applications and multi tenant networks.[NVO3PRBM] The goal of DC applications and multi tenant networks.[NVO3PRBM] The goal of DC
Network Virtualization Overlays, i.e. NVO3, is to decouple the Network Virtualization Overlays, i.e. NVO3, is to decouple the
communication among tenant systems from DC physical networks and to communication among tenant systems from DC physical networks and to
allow one physical network infrastructure to provide: 1) multi- allow one physical network infrastructure to provide: 1) multi-
tenant virtual networks and traffic isolation among the virtual tenant virtual networks and traffic isolation among the virtual
networks over the same physical network; 2) independent address networks over the same physical network; 2) independent address
spaces in individual virtual networks such as MAC, IP, TCP/UDP etc; spaces in individual virtual networks such as MAC, IP, TCP/UDP etc;
3) Flexible VM placement including the ability to move from one 3) Flexible VMs or workload placement including the ability to move
server to another without requiring VM address and configuration them from servers to other servers without requiring VM address and
change and the ability doing a hot move in which no disruption to configuration change and the ability doing a hot move in which no
the live application on the VM. These characteristics will help disruption to the live application on VM. These characteristics will
address the issues in today's cloud applications [NVO3PRBM]. help address the issues in today's cloud applications [NVO3PRBM].
Although NVO3 enables a true network virtualization environment, the An NVO3 network is necessary to interconnect with a physical network,
NVO3 solution has to address the communication between a virtual where tenant systems attach to the both networks. For examples: 1)
network and a physical network. This is because 1) many DCs that DCs that migrates toward NVO3 solution will be done in steps; 2) a
need to provide network virtualization are currently running over lot of DC applications are served to Internet users which exist on
physical networks, the migration will be in steps; 2) a lot of DC
applications are served to Internet users which run directly on
physical networks; 3) some applications are CPU bound like Big Data physical networks; 3) some applications are CPU bound like Big Data
analytics and may not need the virtualization capability. analytics and may not run on virtualized resources.
This document is to describe general NVO3 use cases that apply to This document is to describe general NVO3 use cases that apply to
various data centers. Three types of the use cases described here various data centers. Three types of the use cases described here
are: are:
o Basic virtual networks in DC. A virtual network connects many o Basic virtual networks in DC. All TS of the virtual networks are
tenant systems in a Data Center site (or more) and forms one L2 located within one DC. The Virtual networks can be either L2 or
or L3 communication domain. Many virtual networks are over same L3. The number of Virtual Networks to be supported in NVO3 is
DC physical network. The case may be used for DC internal usually more than what traditional VLAN can support. The case is
applications that constitute the DC East-West traffic. often referred as to the DC East-West traffic.
o DC virtual network access from external. A DC provider offers a o Virtual networks that span across multiple Data Centers or
secure DC service to an enterprise customer and/or Internet users. customer premises, i.e. a Virtual Network that has some nodes in
An enterprise customer may use a traditional VPN provided by a a DC and other nodes in other places. An enterprise customer may
carrier or an IPsec tunnel over Internet connecting to a virtual use a traditional VPN provided by a carrier or an IPsec tunnel
network within a provider DC site. This mainly constitutes DC over Internet to connect the TSs across multiple DCs and customer
North-South traffic. premises.
o DC applications or services that may use NVO3. Three scenarios o DC applications or services that may use NVO3. Three scenarios
are described: 1) use NVO3 and other network technologies to are described: 1) use NVO3 and other network technologies to
build a tenant network; 2) construct several virtual networks as build a tenant network; 2) construct several virtual networks as
a tenant network; 3) apply NVO3 to a virtualized DC (vDC). a tenant network; 3) apply NVO3 to a virtualized DC (vDC).
The document uses the architecture reference model defined in The document uses the architecture reference model defined in
[NVO3FRWK] to describe the use cases. [NVO3FRWK] to describe the use cases.
1.1. Contributors 1.1. Contributors
skipping to change at page 7, line 41 skipping to change at page 7, line 34
| +--------+ | Tunnel | +--------+ | Tunnel
+----------------+ +----------------+
DC Provider Site DC Provider Site
Figure 1 DC Virtual Network Access via Internet Figure 1 DC Virtual Network Access via Internet
3.2. DC VN and Enterprise Sites interconnected via SP WAN 3.2. DC VN and Enterprise Sites interconnected via SP WAN
An enterprise company may lease the VM and storage resources hosted An enterprise company may lease the VM and storage resources hosted
in the 3rd party DC to run its applications. For example, the rd company may run its web applications at 3 party sites but run in the 3rd party DC to run its applications. For example, the
backend applications in own DCs. The Web applications and backend rd applications need to communicate privately. The 3 party DC may company may run its web applications at 3 party sites but run
backend applications in own DCs. The Web applications and backend
applications need to communicate privately. The 3 party DC may
construct one or more virtual networks to connect all VMs and construct one or more virtual networks to connect all VMs and
storage running the Enterprise Web applications. The company may buy storage running the Enterprise Web applications. The company may buy
a p2p private tunnel such as VPWS from a SP to interconnect its site a p2p private tunnel such as VPWS from a SP to interconnect its site
and the virtual network at the 3rd party site. A protocol is and the virtual network at the 3rd party site. A protocol is
necessary for exchanging the reachability between two peering points necessary for exchanging the reachability between two peering points
and the traffic are carried over the tunnel. If an enterprise has and the traffic are carried over the tunnel. If an enterprise has
multiple sites, it may buy multiple p2p tunnels to form a mesh multiple sites, it may buy multiple p2p tunnels to form a mesh
interconnection among the sites and the third party site. This interconnection among the sites and the third party site. This
requires each site peering with all other sites for route requires each site peering with all other sites for route
distribution. distribution.
 End of changes. 11 change blocks. 
49 lines changed or deleted 49 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/