LISP Working Group | S. Barkai |
Internet-Draft | ConteXtream Inc. |
Intended status: Experimental | D. Farinacci |
Expires: September 12, 2013 | . |
D. Meyer | |
Brocade | |
F. Maino | |
V. Ermagan | |
Cisco Systems | |
March 11, 2013 |
LISP Based FlowMapping for Scaling NFV
draft-barkai-lisp-nfv-00
This draft describes distributed flow-mapping applied according to RFC 6830 Locator ID Separation Protocol (LISP) for dynamic scaling of virtualized network functions (NFV) . Network functions such as subscriber management-mobility-security-quality, are typically delivered using proprietary appliances topologically embedded into the network as service-nodes or service-blades. Next generation virtualized network functions are pure software instances running on standard servers - unbundled building blocks of processing capacity and modular functionality. LISP based flow-mapping dynamically wires VNF instances into the data-path, and scales virtualized functions by steering the right traffic in the right sequence to the right process.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 12, 2013.
Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
This draft describes distributed flow-mapping applied according to RFC 6830 Locator ID Separation Protocol (LISP) for dynamic scaling of virtualized network functions (NFV) .[RFC6830]Network functions such as subscriber management-mobility-security-quality are typically delivered using proprietary appliances topologically embedded into the network as service-nodes or service-blades.
This monolithic service delivery method increases the complexity of roll-out and capacity planning, limits functional choices, and inhibits service innovation. Next generation virtualized network functions are pure software instances running on standard servers - unbundled building blocks of compute capacity and modular functionality. This component based model opens up service provider networks to the savings of elasticity and the innovation of an open architectures. However this model also presents the network (or the virtual network rather) with the brand new challenges of assembling components into whole solutions by forwarding the right traffic to the right process at the right sequence and the right time.
While it is possible, to some extent, to use traditional virtual networking mechanisms such as virtual-LANs (VLAN) and virtual-private-networks (VPN) in-order to map traffic to functions-processes, these mechanisms are relatively static and require complex and intense configuration of physical network interfaces with vbridge vrf configuration. NGN software-defined flow based models on the other hand are much more programmable and dynamic, and if orchestrated properly offer a better fit to next generation service-provider data-centers. LISP based flow-mapping enables such a dynamic global orchestration of flows. LISP xTRs wire virtual function instances into the data-path, based on dynamic identity-function and identity-location mappings, perform these actions in a dynamically programmable and elastic manner, and operate based on subscriber-profiles and function-demand global information.
The basic connectivity model used to map flows to function is an identity-matrix forwarding. Unlike topological forwarding models which are based on source-subnet >> routed hop by hop >> to destination-subnet, identity-matrices are based on flow-identity "patched" to function-identity. This model is implemented using the LISP distributed overlay and LISP distributed database mechanisms. These mechanisms are applied over in-place physical networks in a manner described bellow:
POP3 POP4 \ / \ / EdgeR -- EdgeRouter | | Access ... | Core | ... Internet | | EdgeR -- EdgeR / \ / \ ^ Spine1 Spine2 ... Spine5 | / \ / \ __/ / .. | | | \/ | __/ / | P | /\ || / | O Leaf1 Leaf2 ... Leaf300 P |-PC1 |-PC1 1 |-PC2 |-PC2 | |.. |.. | |-PC40 |-PC40 v
Topological Location Network
v << FunctionA FunctionB .. FunctionN v Recursion Instance1..i Instance1..j Instance1..k v | | | | | | | | | | | | v | | | | | | | | | | | | Subscriber1 o o o o - - -+ o o o - - -o o o o | | | | | | | | | | | | Subscriber2 o + o o - - -o o o o - - -o o o o | | | | | | | | | | | | . ... ... ... . ... ... ... . ... ... ... | | | | | | | | | | | | SubscriberM o o o o - - -o o o o - - -+ o o o | | | | | | | | | | | |
Functional Identity Matrix
AoF AoF AoF Access or Functions AoF AoF AoF \ | / \ | / \ | / BoR BoR BoR | | | XTR XTR XTR || || || =============================== || || B _|| ||_ B o -XTR_ | | _XTR- o R || Bridges or Routers || R _|| ||_ B -XTR_ | | _XTR- B o || || o R || || R =============================== || || || XTR XTR XTR | | | BoR BoR BoR / | \ / | \ / | \
Identity-Location Overlay
In order to map subscriber flows to virtualized function instances and essentially to overlay identity grid onto topology based bridge-routed network we use the following XTR 3-tier reference architecture:
Orchestration Authorization OSS/BSS Mappings Mappings Mappings v v v (NFVMs etc.) (3A etc.) (Subs. etc) v v v _________________________________ | | | LISP-MMAP | |_________________________________| ^ ^ ^ Runtime Mappings(location, affinity, load, etc.) ^ ^ ^ ^ ^ ^ ^ ------- ------- ------- | |MMapper| |MMapper| |MMapper| | |-------| |-------| |-------| X |F F F F| |F F F F| |F F F F| T |H H H H| |H H H H| |H H H H| R |n n n n| |n n n n| |n n n n| | |d d d d| |d d d d| |d d d d| | |-------| |-------| |-------| v | FlowX | | FlowX | | FlowX | ------- ------- -------
Identity-Location Overlay Ring
There are no security considerations related with this memo.
There are no IANA considerations related with this memo.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[RFC6830] | Farinacci, D., Fuller, V., Meyer, D. and D. Lewis, "The Locator/ID Separation Protocol (LISP)", RFC 6830, January 2013. |