LISP FlowMapping for NFV draft will be posted as soon as 00 window reopens.
Sorry for missing the deadline. Meanwhile attached. Thanks. Sharon


On Feb 25, 2013, at 17:15, Terry Manderson <[email protected]> wrote:

> All,
> 
> I have posted a _DRAFT_ agenda at:
> 
> http://www.ietf.org/proceedings/86/agenda/agenda-86-lisp
> 
> Please review it and if you see that your requested slot is not there, AND
> you have not received an email from me saying it won't be on the agenda -
> please email me again.
> 
> As with the last meeting The Intro and Architecture documents remain a
> gate to any further WG documents being adopted. Please review these
> documents and send comments to the list so that we can have these
> submitted to the IESG.
> 
> You should note that the WG Goals and Milestones now feature as a part of
> the Agenda to remind us about the work we have (as a WG) committed to.
> 
> Cheers
> Terry
> _______________________________________________
> lisp mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/lisp

> 
> 


LISP Working Group                                             S. Barkai
Internet-Draft                                          ConteXtream Inc.
Intended status: Experimental                               D. Farinacci
Expires: August 29, 2013                                        D. Meyer

                                                                F. Maino
                                                              V. Ermagan
                                                           Cisco Systems
                                                       February 25, 2013


                 LISP Based FlowMapping for Scaling NFV
                        draft-barkai-lisp-nfv-00

Abstract

   This draft describes a flow-mapping method for scaling of virtualized
   network functions (NFV) based on RFC 6830 Locator ID Separation
   Protocol (LISP).  Network functions such as subscriber mobility-
   security-quality management are typically delivered using proprietary
   appliances topologically embedded into the network.  NGN virtualized
   network functions run as software instances on standard servers and
   are unbundled building blocks of capacity and functionality.  LISP
   based flow-mapping wires VNF instances and assembles them into the
   data-path, resulting in a scalable, dynamically programmable, and
   elastic solution based on subscriber-profiles and subscriber-demand
   of network functions.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."



Barkai, et al.           Expires August 29, 2013                [Page 1]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


   This Internet-Draft will expire on August 29, 2013.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



































Barkai, et al.           Expires August 29, 2013                [Page 2]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . 4
   2.  Connectivity Models Used  . . . . . . . . . . . . . . . . . . . 4
   3.  XTR FlowMapping Reference Architecture  . . . . . . . . . . . . 7
     3.1.    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
   4.  Intra-Provider Mappings . . . . . . . . . . . . . . . . . . . . 8
   5.  Mapping Subscription  . . . . . . . . . . . . . . . . . . . . . 8
   6.  Inter-Provider Mappings . . . . . . . . . . . . . . . . . . . . 8
   7.  QOS and Echo Measurements . . . . . . . . . . . . . . . . . . . 8
   8.  Security Considerations . . . . . . . . . . . . . . . . . . . . 8
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 8
   10. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . 8
   11. Normative References  . . . . . . . . . . . . . . . . . . . . . 8
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . . . 8




































Barkai, et al.           Expires August 29, 2013                [Page 3]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


1.  Introduction

   This draft describes a flow-mapping method for scaling virtualized
   network functions (NFV) based on the Locator ID Separation Protocol
   (LISP).[RFC6830]Network functions such as subscriber mobility-
   security-quality.. management are typically delivered using
   proprietary appliances topologically embedded into the network as
   service nodes or service blades.

   This monolithic delivery model increases the complexity of roll-out
   and capacity planning, complicates basic connectivity, as well as
   limits and inhibits functional choices and service innovation.
   Virtualized network functions on the other hand, run as software
   instances on standard servers forming unbundled building blocks of
   capacity and functionality.  This componentized method of function
   instantiation presents the network, or rather the virtual network,
   with the task of assembling these components into whole solutions by
   forwarding the right traffic to the right NFV instance at the right
   sequence and the right time.

   While it is possible to some extent to use traditional virtual
   networking mechanisms such as virtual-LANs (VLAN) and virtual-
   private-networks (VPN) for this task, these mechanisms are relatively
   static and are bound to the topological network interfaces adding
   complex line configuration.  Next generation software-defined and
   flow-based models on the other hand are much more programmable and
   dynamic, and present a better fit to the next generation service-
   provider data-center applications.  LISP based flow-mapping wires VNF
   instances into the data-path in a dynamically programmable and
   elastic manner based on subscriber-profiles and subscriber-demand.


2.  Connectivity Models Used

   LISP implements an identity grid forwarding grid for NFVs.  Unlike
   topological forwarding which is based on source Subnet - routed hop
   by hop to - destination Subnet, NFV grids are based on subscriber
   flow-identity "patched" to VNF instance-identity.  This is done using
   the standard LISP distributed-overlay and network-database
   mechanisms.  In order to describe how LISP based NFV flow-mapping
   works we will refer to 3 connectivity models that are applied
   conjointly:

   o  The topological network or the "location" connectivity is based on
      standard bridging and routing enabling both the physical capacity
      and physical availability of connectivity.  Typically spine-leafs
      switching architecture that can cluster hundreds or computer
      racks, and core-edge routing architecture inter-connecting these



Barkai, et al.           Expires August 29, 2013                [Page 4]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


      computer clusters across points of presence, as well as connecting
      to the access networks and to the public Internet.

   o  The functional network or the "identity" grid is there to map
      identified subscriber flows carrying an application thread to the
      right function task or instance, enabling the logical scalability
      and compute concurrency of NFV.  This mapping is based on global
      definitions of the business service and application, as well
      global knowledge of capacity and availability of each functional
      task or instance.

   o  The virtualized network or the location-identity overlay enables
      the implementation of the functional network on the physical in-
      place bridge-routed network.  The network virtualization ring or
      overlay is based on the encap/decap functionality of LISP XTR
      working in conjunction with the LISP mmap services.



                                POP3    POP4
                                \ /     \ /
                               EdgeR -- EdgeRouter
                                  |      |
                    Access ...    | Core |    ... Internet
                                  |      |
                               EdgeR -- EdgeR
                                 / \
                                /   \
                     ^      Spine1 Spine2 ... Spine5
                     |       /  \  /  \    __/ / .. |
                     |       |   \/   | __/   /     |
                     P       |   /\   ||     /      |
                     O      Leaf1   Leaf2  ... Leaf300
                     P       |-PC1   |-PC1
                     1       |-PC2   |-PC2
                     |       |..     |..
                     |       |-PC40  |-PC40
                     v



                       Topological Location Network









Barkai, et al.           Expires August 29, 2013                [Page 5]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


                  v <<   FunctionA   FunctionB .. FunctionN
                  v
             Recursion  Instance1..i Instance1..j Instance1..k
                  v      | | | |      | | | |      | | | |
                  v      | | | |      | | | |      | | | |
             Subscriber1-o o o o - - -+ o o o - - -o o o o
                         | | | |      | | | |      | | | |
             Subscriber2-o + o o - - -o o o o - - -o o o o
                         | | | |      | | | |      | | | |
                 .         ...          ...          ...
                 .         ...          ...          ...
                 .         ...          ...          ...
                         | | | |      | | | |      | | | |
             SubscriberM-o o o o - - -o o o o - - -+ o o o
                         | | | |      | | | |      | | | |




                         Functional Identity Grid



                 AoF AoF AoF Access or Functions AoF AoF AoF
                    \ | /          \ | /           \ | /
                     BoR            BoR             BoR
                      |              |               |
                     XTR            XTR             XTR
                      ||             ||              ||
                       ===============================
                      ||                             ||
               B     _||                             ||_     B
               o -XTR_ |                             | _XTR- o
               R      ||     Bridges or Routers      ||      R
                     _||                             ||_
               B -XTR_ |                             | _XTR- B
               o      ||                             ||      o
               R      ||                             ||      R
                       ===============================
                      ||             ||              ||
                     XTR             XTR             XTR
                      |               |               |
                     BoR             BoR             BoR
                    / | \           / | \           / | \



                   Identity-Location Virtualization Ring



Barkai, et al.           Expires August 29, 2013                [Page 6]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


3.  XTR FlowMapping Reference Architecture

   In order to map subscriber flows to virtualized function instances
   and essentially to overlay identity grid onto topology based bridge-
   routed network we use the following XTR 3-tier reference
   architecture:

   1.  Flow Switching, or the ability to process consistently and
       encapsulate sequences of packets belonging to the same
       subscriber-application threads using identity pattern masks.
       This tier can be based on, but not limited to ONF OpenFlow

   2.  Flow Handlers, or the ability to have distinct software for
       processing different protocol families and to further provision
       flow-switching per specific subscriber-application threads
       encapsulated based on application identity elements.

   3.  Global Mapping, or the ability to associate any globally
       significant key to a set of globally assigned values and
       attributes.  For example mapping a functional VIP to function
       instances, or mapping function instances to locations,
       accessibility, and load.



                 Orchestration    Authorization    OSS/BSS
                    Mappings       Mappings        Mappings
                        v               v              v
                  (NFVMs etc.)     (3A etc.)     (Subs. etc)
                        v               v              v
                       _________________________________
                      |                                 |
                      |            LISP-MMAP            |
                      |_________________________________|

                         ^            ^             ^
              Runtime Mappings(location, affinity, load, etc.)
                         ^            ^             ^
                ^     -------      -------       -------
                |    |MMapper|    |MMapper|     |MMapper|
                |    |-------|    |-------|     |-------|
                X    |H H H H|    |H H H H|     |H H H H|
                T    |n n n n|    |n n n n|     |n n n n|
                R    |d d d d|    |d d d d|     |d d d d|
                |    |l l l l|    |l l l l|     |l l l l|
                |    |-------|    |-------|     |-------|
                v    | FlowX |    | FlowX |     | FlowX |
                      -------      -------       -------



Barkai, et al.           Expires August 29, 2013                [Page 7]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


                       FlowMapping XTR Architecture

3.1.


4.  Intra-Provider Mappings


5.  Mapping Subscription


6.  Inter-Provider Mappings


7.  QOS and Echo Measurements


8.  Security Considerations

   There are no security considerations related with this memo.


9.  IANA Considerations

   There are no IANA considerations related with this memo.


10.  Acknowledgements


11.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC6830]  Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The
              Locator/ID Separation Protocol (LISP)", RFC 6830,
              January 2013.













Barkai, et al.           Expires August 29, 2013                [Page 8]

Internet-Draft   LISP Based FlowMapping for Scaling NFV    February 2013


Authors' Addresses

   Sharon Barkai
   ConteXtream Inc.
   California
   USA

   Email: [email protected]


   Dino Farinacci
   California
   USA

   Email: [email protected]


   David Meyer
   California
   USA

   Email: [email protected]


   Fabio Maino
   Cisco Systems
   California
   USA

   Email: [email protected]


   Vina Ermagan
   Cisco Systems
   California
   USA

   Email: [email protected]













Barkai, et al.           Expires August 29, 2013                [Page 9]

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to