draft-ietf-nvo3-use-case-13.txt   draft-ietf-nvo3-use-case-14.txt 
skipping to change at page 1, line 16 skipping to change at page 1, line 16
Verizon Verizon
A. Isaac A. Isaac
Juniper Networks Juniper Networks
V. Manral V. Manral
Ionos Networks Ionos Networks
Expires: June 2017 December 8, 2016 Expires: June 2017 December 8, 2016
Use Cases for Data Center Network Virtualization Overlay Networks Use Cases for Data Center Network Virtualization Overlay Networks
draft-ietf-nvo3-use-case-13 draft-ietf-nvo3-use-case-14
Abstract Abstract
This document describes data center network virtualization overlay This document describes data center network virtualization overlay
(NVO3) network use cases that can be deployed in various data (NVO3) network use cases that can be deployed in various data
centers and serve different data center applications. centers and serve different data center applications.
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with This Internet-Draft is submitted to IETF in full conformance with
skipping to change at page 2, line 35 skipping to change at page 2, line 35
3. DC NVO3 Network and External Network Interconnection...........6 3. DC NVO3 Network and External Network Interconnection...........6
3.1. DC NVO3 Network Access via the Internet...................6 3.1. DC NVO3 Network Access via the Internet...................6
3.2. DC NVO3 Network and SP WAN VPN Interconnection............8 3.2. DC NVO3 Network and SP WAN VPN Interconnection............8
4. DC Applications Using NVO3.....................................8 4. DC Applications Using NVO3.....................................8
4.1. Supporting Multiple Technologies..........................9 4.1. Supporting Multiple Technologies..........................9
4.2. DC Application with Multiple Virtual Networks.............9 4.2. DC Application with Multiple Virtual Networks.............9
4.3. Virtual Data Center (vDC)................................10 4.3. Virtual Data Center (vDC)................................10
5. Summary.......................................................12 5. Summary.......................................................12
6. Security Considerations.......................................12 6. Security Considerations.......................................12
7. IANA Considerations...........................................12 7. IANA Considerations...........................................12
8. References....................................................13 8. Informative References........................................13
8.1. Normative References.....................................13
8.2. Informative References...................................13
Contributors.....................................................14 Contributors.....................................................14
Acknowledgements.................................................14 Acknowledgements.................................................14
Authors' Addresses...............................................14 Authors' Addresses...............................................14
1. Introduction 1. Introduction
Server virtualization has changed the Information Technology (IT) Server virtualization has changed the Information Technology (IT)
industry in terms of the efficiency, cost, and speed of providing industry in terms of the efficiency, cost, and speed of providing
new applications and/or services such as cloud applications. However new applications and/or services such as cloud applications. However
traditional data center (DC) networks have some limits in supporting traditional data center (DC) networks have some limits in supporting
skipping to change at page 13, line 5 skipping to change at page 13, line 5
to protect against a tenant application attacking another tenant to protect against a tenant application attacking another tenant
application via the DC infrastructure network. For example, a tenant application via the DC infrastructure network. For example, a tenant
application attempts to generate a large volume of traffic to application attempts to generate a large volume of traffic to
overload the DC's underlying network. An NVO3 solution has to overload the DC's underlying network. An NVO3 solution has to
address these issues. address these issues.
7. IANA Considerations 7. IANA Considerations
This document does not request any action from IANA. This document does not request any action from IANA.
8. References 8. Informative References
8.1. Normative References
[RFC7364] Narten, T., et al "Problem Statement: Overlays for Network
Virtualization", RFC7364, October 2014.
[RFC7365] Lasserre, M., Motin, T., and et al, "Framework for DC
Network Virtualization", RFC7365, October 2014.
8.2. Informative References
[IEEE802.1Q] IEEE, "IEEE Standard for Local and metropolitan area [IEEE802.1Q] IEEE, "IEEE Standard for Local and metropolitan area
networks -- Media Access Control (MAC) Bridges and Virtual networks -- Media Access Control (MAC) Bridges and Virtual
Bridged Local Area", IEEE Std 802.1Q, 2011. Bridged Local Area", IEEE Std 802.1Q, 2011.
[NVO3HYVR2NVE] Li, Y., et al, "Hypervisor to NVE Control Plane [NVO3HYVR2NVE] Li, Y., et al, "Hypervisor to NVE Control Plane
Requirements", draft-ietf-nvo3-hpvr2nve-cp-req-05, work in Requirements", draft-ietf-nvo3-hpvr2nve-cp-req-05, work in
progress. progress.
[NVO3ARCH] Black, D., et al, "An Architecture for Overlay Networks [NVO3ARCH] Black, D., et al, "An Architecture for Overlay Networks
skipping to change at page 13, line 45 skipping to change at page 13, line 35
[RFC3022] Srisuresh, P. and Egevang, K., "Traditional IP Network [RFC3022] Srisuresh, P. and Egevang, K., "Traditional IP Network
Address Translator (Traditional NAT)", RFC3022, January Address Translator (Traditional NAT)", RFC3022, January
2001. 2001.
[RFC4301] Kent, S., "Security Architecture for the Internet [RFC4301] Kent, S., "Security Architecture for the Internet
Protocol", rfc4301, December 2005 Protocol", rfc4301, December 2005
[RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
Networks (VPNs)", RFC 4364, February 2006. Networks (VPNs)", RFC 4364, February 2006.
[RFC7348] Mahalingam,M., Dutt, D., ific Multicast in etc "VXLAN: A [RFC7348] Mahalingam, M., Dutt, D., et al, "Virtual eXtensible Local
Framework for Overlaying Virtualized Layer 2 Networks over Area Network (VXLAN): A Framework for Overlaying
Layer 3 Networks", RFC7348 August 2014. Virtualized Layer 2 Networks over Layer 3 Networks",
RFC7348 August 2014.
[RFC7364] Narten, T., et al "Problem Statement: Overlays for Network
Virtualization", RFC7364, October 2014.
[RFC7365] Lasserre, M., Motin, T., et al, "Framework for DC Network
Virtualization", RFC7365, October 2014.
[RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A. and [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A. and
J. Uttaro, "BGP MPLS Based Ethernet VPN", RFC7432, J. Uttaro, "BGP MPLS Based Ethernet VPN", RFC7432,
February 2015 February 2015
[RFC7637] Garg, P., and Wang, Y., "NVGRE: Network Virtualization [RFC7637] Garg, P., and Wang, Y., "NVGRE: Network Virtualization
using Generic Routing Encapsulation", RFC7637, Sept. 2015. using Generic Routing Encapsulation", RFC7637, Sept. 2015.
[VRF-LITE] Cisco, "Configuring VRF-lite", http://www.cisco.com [VRF-LITE] Cisco, "Configuring VRF-lite", http://www.cisco.com
 End of changes. 4 change blocks. 
18 lines changed or deleted 13 lines changed or added

This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/