Internet DRAFT - draft-gvenkat-sdn-dc-arch-arch
draft-gvenkat-sdn-dc-arch-arch
INTERNET-DRAFT G. Venkatasubramaniyan
Intended Status: INFORMATIONAL
Expires: 1, Jan 2013 1, June 2012
Problem Statement and Orthogonal control network for
managing data-centers draft-gvenkat-sdn-dc-arch-arch-00
Abstract
This draft describes a distributed Control Element for SDN
implementations. This document describes various complexities
associated with data-center management on adoption of new
technologies in data center networking. While Server vitalization,
cloud computing have very much increased the networking complexities
while OpenFlow/SDN gives a different perspective which could provide
solution. Network virtualisation is next thing in happening.
Traditional methods of managing each data-center element are
increasing management complexities. The key to reduce the management
complexity, and have automated infrastructure in very highly scaled
data center network is to have orthogonal management and control
network to the Data network. A distributed CE yet with a single
manager orchestrating the networks will give much needed intelligence
to OF controller.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 1]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
Copyright and License Notice
Copyright (c) <2012> IETF Trust and the persons identified as the
document authors. All rights reserved.
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3
2 Problem definition . . . . . . . . . . . . . . . . . . . . . . 3
2.1 Server virtualization . . . . . . . . . . . . . . . . . . . 3
2.2 Cloud computing . . . . . . . . . . . . . . . . . . . . . . 4
2.3 SDN / OpenFlow . . . . . . . . . . . . . . . . . . . . . . . 4
2.5 Flattening of DC networks. . . . . . . . . . . . . . . . . . 5
2.4 Network Virtualization . . . . . . . . . . . . . . . . . . . 5
3 Unified data center architecture . . . . . . . . . . . . . . . . 6
3.1 comparison with Chassis based switches . . . . . . . . . . . 8
3.2 Comparison with ForCES . . . . . . . . . . . . . . . . . . . 8
3.3 Issues to consider . . . . . . . . . . . . . . . . . . . . . 8
3.3.1 External interface . . . . . . . . . . . . . . . . . . . 8
3.3.2 Algorithm consideration and scaling . . . . . . . . . . 8
4 Security Considerations . . . . . . . . . . . . . . . . . . . . 9
5 IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 9
6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
6.1 Normative References . . . . . . . . . . . . . . . . . . . 9
6.2 Informative References . . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 2]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
1 Introduction
One of the major challenges in large enterprises is managing their
data centers. Evolving technologies had made managing more complex.
Following sections describes the problems and section 3 give a
possible architecture that would reduce the complexity
1.1 Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
2 Problem definition
2.1 Server virtualization
Server Virtualization provides an abstraction of all hardware
resource that System image interface with. Various technologies has
shaped the virtualization technology. Server virtualization allows
multiple instances of various OS/SI run simultaneously on a physical
server hardware. Hyper visor(VMM) is a software that enables multiple
VM share the physical infrastructure with HW assist. Hyper visors
implement Virtual Ethernet Bridges (VEB)/ virtual Switches. Each VM
contains at least one virtual NIC and which is associated with the
physical NIC by VEB. This kind of a virtual switch raises two kinds
of architectures.
1. Ethernet switching functionality with in the physical server with
following functionality of
a VM to VM switching happens internally with in the VEB and
forwarding from VM and/or Hyper visor to adjacent
L2 switch.
b. All of L2 functionality, VLAN. LAG/
c. Differs from traditional switches by not forwarding traffic
from adjacent L2 switch back to the adjacent switch
even through any other physical ports. Security policies
implemented in adjacent switches is not learned by the
virtual switch.
The problem with this kind of architecture is that the traffic
between the two VMs reside with in the physical server and require
additional control protocols for standard network policies - e.g.,
Security and QoS. [IEEE8021Qbg]. This standard also defines channels
for segregation of traffic.
2. The Hyper visor, instead of implementing its own virtual switch
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 3]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
cooperatively work for switching traffic with the adjacent L2 switch.
a. VM to VM switching happens through adjacent L2 switch
b. VM and / or Hyper-visor adjacent L2 switch
c. All of L2 functionality, VLAN. LAG/
d. Differs from traditional switches by not forwarding
traffic from adjacent L2 switch back to the adjacent
switch even through any other physical ports. Security
policies implemented in adjacent switches
[IEEE8021BR, 8021Qay].
The complexity in management of Networked VM requires more involved
protocol exchange because of the blur in the demarcation of network
and the computing resource. Really, a becoming of "Network is
computer".
2.2 Cloud computing
The goal of cloud computing is to enable IT organizations to achieve
a dramatic improvement in the cost effective, elastic provisioning of
IT services. Cloud computing is Service or Infrastructure made
available on and through Internet, on demand, which can scale on
demand and migrate when there is a need[GAUTAM-SHROFF]. These
features has transformed Cap-ex intensive Compute, network and
Storage resources into cost effective utility services.
These properties constraint the data center and imposes dynamic
configuration changes on the data center as the infrastructure usage
grows. Migrations need impose the address schema's to be retained.
Dynamic bringing up and closing of App's, dynamic provisioning of
storage and connecting, tearing or scaling of connections though WWW
makes configuration of NE in silos difficult. These requirement
requires to data center be configured and managed as one single
unified unit rather than the connected nodes of switches and nodes.
Present architecture visualizes data center not as whole one unit but
as component made out of individual switches, routers and servers.
This requires configuration of individual elements and this results
in the need of control protocols. Traditional method of configuration
would require Complex checkpoint, commit or rollback methodologies
for end-to-end provisioning in a data center.
2.3 SDN / OpenFlow
The traditional network element, viz., switches and routers can be
modularized to three major components based on the function they
perform.
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 4]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
ME - Management element. This module interact with management user
for configuration data of the network resources. These data might
under go changes due to control protocol rules and finally affects
the Forwarding decision of FE.e.g., System Priority.
CE- Control element, These influence the forwarding decisions of FE.
The major function are Neighbor discovery, Topology discovery, QoS
parameter negotiations and Flow control, etc. These traffic are not
use data but results of the algorithmic computation of these protocol
data facilitate the user data communication. Each NE has a CE which
generate control traffic. Each CE talk to the rest of the CEs or
directly connected CE through various protocols for arriving in
control data.
FE - Forwarding element. Based on the configuration and control
element learning, this element chooses the best path to forward the
traffic for the packet to reach the destination.
ForCES framework [RFC3656] and OpenFlow standards provides clear
separation of Forwarding (FE) and Controlling (CE) entities allowing
them to reside in different compute nodes in a network. This
separation resulted in definition of protocols [RFC5810], [OPENFLOW]
to configure forwarding tables in the Network element. But still
these advances does not allow the to be seen as a single unit for
provisioning.
OpenFlow defines (1) OpenFlow channel which carries the OpenFlow
protocol messages, (2) OpenFlow switch which implements the Flow
Tables and Action lists and (3) the controller. The OpenFlow channel
is independent and orthogonal to the Data network and is used to
configure the data flows. Since its is separate from the data
network, controller is devoid of the dynamics of the data network and
inhibits it in from dynamic control.
2.5 Flattening of DC networks.
A three-tier network architecture is the dominant structure in as the
standard design for DCs. The three tiers are access, Aggregation and
Core layers in the hierarchy. Access switches Top-of-Rack (ToR)
switches, or modular/End-of-Row (EoR) switches that connect servers
and IP/Ethernet based storage to aggregation switches. Traditionally,
DC are designed for higher North-South (client - server) traffic.
Virtualization disrupts these assumptions and requires the network be
flat. [
2.4 Network Virtualization
After Storage and Compute resource (server) virtualization, the need
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 5]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
for virtualizing of network is being felt[INET-VIR]. Though VLANS and
tunnels could be considers as virtual networks, the dynamics and
scale data-centers impose, requires fresh thinking[OVERLAY1,
OVERLAY2].
3 Unified data center architecture
Blade based unified "data-center in a box" solutions are available in
the market as off-the-rack products, but for the system integrators
who wish of build, there seems to be lack of standards to unify the
three essentials of data-center, storage. network and compute. These
three does not reside alone in data-center, usually requiring these
three resources or at-the-least two of them.
This document proposes an independent management and control network
which would be orthogonal to the data network. This type of
orthogonal network separate for control and configuration of data
network is not new. TMN architecture in Telecommunication network is
a similar kind of architecture. [TMN]
----------------------------------------------------------------
OF controller | Network controller | Network manager
---------------------------+-----------------------------------
+---+--+---------------+---------+---- + ----+
| | | |
| | | |
-----|-SW2*****************SW4-----|----------------
-----|--*--*--*------------------------*---*-*--|-*-----------
------|*----*-------*----------------*--------*---|---*-------
----*-|*---*------------*--------*------------*----|-----*-----
--*---|----*-----------------*------------------*----|------*----
SS1--|----*--------------*----*----------------*----|------SR6------
-------*-|---*------------*-----------*-----------*---|----*-----
---------*|--*-----------------------------*-------*--|---*------
-----------*|-*-------*------------------------*---*-|--*----------
-------------*|-*---*-------------------------------*|-*-------
--------------SW3*************************SW5-->>ISP>>---
--------------------------------------------------------------------
DATA NETWORK -PLANE
virtual switch in Server and storage communicate with
Network controller through the neighbor switch. All switches
are managed and controlled centrally through independent
network.
--------------------------------------------------------------------
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 6]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
The Control and Management Network (CMNw) is independent and
orthogonal to the data traffic. It would specifically carry the
control, management traffic and OF Messages. This would be a
carefully laid loop free, non Hierarchical would be in a private
address space. The management of individual NEs must happen through
SNMP/ NETCONF or standard CLI from centralized management module.
Provisioning of Server, network and Storage happen from centralized
manager application.
Control Plane functions that are that are processed in
switches/routers at superficially
1. Topology discovery
2. Event or notification of a state change to peer at the layer
of operation.
3. Exchange of parameters or configuration values
4. Handling of Un handled packets in FE
The following table gives various functions handled in control plane
and corresponding protocols in
Layer -2
S.No Function | Protocols
------+-------------------------------+------------------------------
1 Topology/path, | XSTP & VLAN , TRILL,
and neighbor | 802.1Qbp, 802.1ax,
discovery | LLDP/ 802.1AB
2 Parameter negotiations | LLDP
3 Signaling, Fault | 802.1Qbb, 802.1ag,
management | 802.1Qau,
4 ARP | ARP
------+--------------------------------+-----------------------------
Layer -3
S.No Function | Protocols
------+-------------------------------+------------------------------
1 Topology/path, | OSPF, IS-IS
and neighbor |
discovery |
2 Parameter negotiations | LLDP
3 Signaling, Fault | RSVP, ICMP,
management |
4 |
------+--------------------------------+-----------------------------
Some of the functions of present CE functions would become a non-
requirement by this control and management work. And Path/Topology
discovery become less intense as states and configurations become
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 7]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
globally available.
Path discovery is step process usually implemented as state machines,
involving port or link states or elections bases on priorities
assigned. Briefly, the present implementations work the following
way.
1. Exchange of protocol message between peer ports with
priorities, cost, etc identification, re computation
notification and confirming changes
2. Algorithmic computation of best paths, distribution trees.
For example, each node its own view of shortest paths
3. Program the FE's Forwarding tables, based on step 2.
In unified framework,
1. Link existence. Since port or node failure would be available
through Control Network, the protocol exchange would be less
intense.
2. Algorithmic computation of best paths for all pairs of
vertices [CORMEN, FLOYD]
3. Program all FE's Forwarding tables, based on step 2, which
would be OF messages. For L2 this would be distribution trees
for which protocols needs to be specified.
The traditional network element, viz., switches and routers can be
modularized to three major components based on the function they
perform.
3.1 comparison with Chassis based switches
3.2 Comparison with ForCES
3.3 Issues to consider
3.3.1 External interface
3.3.2 Algorithm consideration and scaling
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 8]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
4 Security Considerations
<Security considerations text>
5 IANA Considerations
<IANA considerations text>
6 References
6.1 Normative References
[KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC1776] Crocker, S., "The Address is the Message", RFC 1776, April
1 1995.
[TRUTHS] Callon, R., "The Twelve Networking Truths", RFC 1925,
April 1 1996.
6.2 Informative References
[EVILBIT] Bellovin, S., "The Security Flag in the IPv4 Header",
RFC 3514, April 1 2003.
[RFC5513] Farrel, A., "IANA Considerations for Three Letter
Acronyms", RFC 5513, April 1 2009.
[RFC5514] Vyncke, E., "IPv6 over Social Networks", RFC 5514, April 1
2009.
[XEN] Xen and the art of virtualization, Proceeding SOSP '03
Proceedings of the nineteenth ACM symposium on Operating
systems principles Pages 164-177
[SMITH-NAIR]James E. Smith, Ravi Nair, "Virtual machines - versatile
platforms for systems and process,
[IEEE8021BR] IEEE 802.1BR Bridge port extension
http://www.ieee802.org/1/pages/802.1br.html
[IEEE8021bg] IEEE 802.1Qbg Edge Virtual Bridging
http://www.ieee802.org/1/pages/802.1bg.html
[8021Qay] IEEE 802.1Qay - Provider Backbone Bridge Traffic
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 9]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
Engineering, http://www.ieee802.org/1/pages/802.1ay.html
[GAUTAM-SHROFF] "Enterprise Cloud Computing: Technology,
Architecture, Applications", Gautam Shroff, Cambridge
University Press.
[I-D.nadeau-sdn-problem-statement] Nadeau, T., and P. Pan, " Software
Defined Network (SDN) Problem Statement", draft-nadeau-
sdn-problem-statement-00 (work in progress), September
2011.
[NET-VIR] "Network virtualization: a hypervisor for the Internet?"
Vol 50(1) Khan, A.; Zugenmaier, A. ; Jurca, D. ;
Kellerer, W. IEEE Communications Magazine
[FLATNW] Greg Scherer, 2012- Ethernet
Summit,http://www.ethernetsummit.com/English/Collaterals
/Proceedings/2012/20120222_Keynote4_Scherer.pdf
[OVERLAY1] M-K. Shin, K-H. Nam, J.Choi, Korea U., "Formally
Verifiable Networking Framework for SDN draft-shin-sdn-
formal-specification-00", draft-shin-sdn-formal-
specification-00 (work in progress), March 1, 2012
[OVERLAY2] M-K. Shin, K-H. Nam, J.Choi, Korea U., "Analysis of
Comparisons between OpenFlow and ForCES draft-wang-forces-
compare-openflow-forces-01.txt", draft-wang-forces-
compare-openflow-forces-01 (work in progress), March 11,
2012
[TMN] Telecommunications management network. PRINCIPLES FOR A
TELECOMMUNICATIONS. MANAGEMENT NETWORK. ITU-T
Recommendation M.3010, May 1996.
[CORMEN] Cormen, Thomas H.; Leiserson, Charles E., Rivest, Ronald L.
(1990). Introduction to Algorithms (1st ed.). MIT Press
and McGraw-Hill. ISBN 0-262-03141-8. Section 26.2, "The
Floyd-Warshall algorithm", pp. 558-565;
[FLOYD] Floyd, Robert W. (June 1962). "Algorithm 97: Shortest Path".
Communications of the ACM 5 (6): 345.
Authors' Addresses
G. Venkatasubramaniyan
EMail: g.venkatasubramaniyan@gmail.com
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 10]
INTERNET DRAFT draft-gvenkat-sdn-dc-arch-arch-00 3, June 2012
G. Venkatasubramaniyan Expires 2, Jan 2013 [Page 11]