Internet DRAFT - draft-zu-nvo3-mcast-considerations
draft-zu-nvo3-mcast-considerations
Network Working Group Z. Qiang
Internet Draft Ericsson
Intended status: Informational October 27, 2014
Expires: April 2015
Supporting Applications Specific Multicast in NVO3
draft-zu-nvo3-mcast-considerations-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 27, 2015.
Z. Qiang Expires April 27, 2015 [Page 1]
Internet-Draft Multicast in NVO3 October 2014
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Abstract
The framework of supporting applications specific multicast traffic
in a network using Network Virtualization using Overlays over Layer 3
(NVO3) has been discussed. The various mechanisms and considerations
that can be used for delivering those application specific multicast
traffic in networks that use NVO3 have been considered.
This draft discusses some additional considerations on how to support
applications specific multicast traffic in NVO3.
Table of Contents
1. Introduction...................................................3
2. Conventions used in this document..............................3
3. Terminology....................................................3
4. Considerations.................................................3
5. Optimizations..................................................4
6. Procedures.....................................................5
6.1. Source NVE................................................5
6.2. Receiving NVE.............................................6
6.3. Multicast Proxy function..................................6
6.4. Receiving multicast packets at Source NVE.................7
6.5. Receiving multicast packets at Proxy NVE..................7
6.6. Receiving multicast packets at Receiving NVE..............7
7. Security Considerations........................................7
8. IANA Considerations............................................7
9. References.....................................................8
9.1. Normative References......................................8
Z. Qiang Expires April 27, 2015 [Page 2]
Internet-Draft Multicast in NVO3 October 2014
9.2. Informative References....................................8
10. Acknowledgments...............................................8
1. Introduction
Network virtualization using Overlays over Layer 3 (NVO3) is a
technology that is used to address issues that arise in building
Large, multitenant data centers that make extensive use of server
virtualization [RFC7364].
The framework of supporting application specific multicast traffic in
a network that uses Network Virtualization using Overlays over Layer
3 (NVO3) is discussed in the draft [NVO3-MC]. It describes 4
mechanisms and some considerations that can be used for delivering
those application specific multicast traffic in networks that use
NVO3.
This draft discusses some additional considerations on how to support
applications specific multicast traffic in NVO3.
The reader is assumed to be familiar with the terminology as defined
in the NVO3 Framework document [RFC7365] and NVO3 Architecture
document [NVO3-ARCH].
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
In this document, these words will appear with that interpretation
only when in ALL CAPS. Lower case uses of these words are not to be
interpreted as carrying RFC-2119 significance.
3. Terminology
This document uses the same terminology as found in [NVO3-MC].
4. Considerations
While the mechanisms discussed in Section 3 of [NVO3-MC] have been
discussed individually, it is important for a development to support
one or more methods in a large, multitenant data centers. It is hard
to say which method is better than the others without considerations
of the tenant system overlay network architecture. This document
attempts to provide considerations on each mechanism detailed in
section 3 of [NVO3-MC].
Z. Qiang Expires April 27, 2015 [Page 3]
Internet-Draft Multicast in NVO3 October 2014
The source NVE replication method descripted in Section 3.2 of the
[NVO3-MC] may be more attractive for a tenant system which only has a
few NVEs participating the overlay forwarding, even the tenant system
may have hundreds of VMs. As the number of participating NVE is not
that many, the source NVE replication will not generate too many
duplicated traffic traverse the same overlay network connection.
Additional overlay control signaling may provide some level of
optimizations. Furthermore, it is not a big scaling issue for a
multi-tenant data center which the number of tenant networks can be
hundreds.
However, if a tenant system contains many VMs attaching to a large
number of NVEs, using source NVE replication method may generate
large amount of duplicated traffic on the same overlay network
connection.
Another alternative, which can be used to avoid network connections
overloading due to the duplicated traffic, is to use an IP multicast
in underlay method descripted in Section 3.4 of [NVO3-MC] to handle
the application multicast traffic. However, additional NVA-NVE
control signaling may be needed in order to enable the multicast
address mapping at source NVE. This method however introduces an
additional scaling problem if there are too many multicast groups
within a multi-tenancy data center which may have a large number of
tenant networks.
The service node method descripted in Section 3.3 of [NVO3-MC] may be
preferable for a tenant network where the multicast source VM and the
receiver VMs are distributed and the service node can be placed
closer to the multicast receiving VMs. Otherwise, this alternative
will have same duplicated traffic overloading issue as the source NVE
replication mechanism. In order to enable the service node function
at the property location, the NVA may need to know the participants
list of each multicast group in advance. Ideally, the service node
function shall be placed closer to the receivers attached NVEs.
Indeed, if the service node function and one of the receivers
attached NVEs are collocated, this method is very similar to the
multicast distribution tree mechanism described in MVPN [RFC6513].
5. Optimizations
In order to provide optimal routing for a particular multicast flow
and to improve the multicast scalability as unicast traffic, the
source NVE shall forward the received multicast packet to the
destination NVEs only if the destination NVE has at least one
participating VM of that multicast group. Duplication of the
Z. Qiang Expires April 27, 2015 [Page 4]
Internet-Draft Multicast in NVO3 October 2014
multicast packet to the destination NVEs on the same network
connection shall be avoided.
One alternative for the above optimization is to use the multicast
distribution proxy for each multicast group, which is similar to the
multicast distribution tree mechanism described in MVPN [RFC6513].
Instead of using BGP as control plane signaling, the NVA-NVE
signaling can be used to setup this multicast distribution proxy
architecture per multicast group.
To avoid generating large amount of duplicated traffic on the same
overlay network connection, the source NVE may duplicate the
multicast traffic and only send it to a limited number of proxy NVEs.
Then the proxy NVE can further duplicate the multicast traffic and
forward it to the rest of the receiving NVEs.
6. Procedures
In this document, the optimization alternative of how the multicast
distribution proxy can be applied in the NVO3 architecture is
discussed.
The procedure is to make use of the NVA, which is the centralized
control node of the NVO3 architecture, to select the proxy NVEs from
the participating NVEs and setup a distribution path for each
multicast group.
6.1. Source NVE
Source NVE is the NVE which the multicast application VM is attached.
It is assumed that the source NVE knows if a multicast application VM
is attached. The NVE may know it via overlay network provisioning or
using some kind multicast monitoring functions, e.g. IGMP snooping.
How the multicast monitoring is performed is out of the scope of this
document.
The source NVE needs to register itself to the NVA in order to enable
the multicast distribution mechanism.
Once the source NVE registration is done, based on the multicast
registration information and the multicast proxy function role
selection decision, a multicast proxy NVE list and a Participant NVE
list are created by the NVA.
Z. Qiang Expires April 27, 2015 [Page 5]
Internet-Draft Multicast in NVO3 October 2014
Multicast Proxy NVE list is a list of Proxy NVEs. It is created by
the NVA and saved in the source NVE. It is used by the source NVE for
multicast traffic duplication and distribution. And the source NVE is
updated with the multicast proxy NVE list by NVA using the NVA-NVE
control plane signaling.
6.2. Receiving NVE
Receiving NVEs is the NVE where a multicast group participanting VMs
attached.
It is assumed that the Receiving NVE knows if an attached VM would
like to join a multicast group. The NVE may know it via overlay
network provisioning or using some kind multicast monitoring
functions, e.g. IGMP snooping.
How the multicast monitoring is performed is out of the scope of this
document.
The Receiving NVE shall inform the NVA if there is any VM multicast
registrations, or if all the registered VMs of a given multicast
group discontinue participating to the multicast group. The NVA uses
this information to create / update the Participant NVE list of the
multicast group.
Participant NVE list is a list of receiving NVEs. It is created by
the NVA and saved in the Proxy NVE. It is used by the Proxy NVE for
multicast traffic duplication and distribution.
6.3. Multicast Proxy function
Proxy NVE is one of the receiving NVEs. The proxy NVE is selected by
the NVA. It has the responsibility of distributing the received
multicast traffic to the participant NVEs.
Multicast Proxy function role is assigned to one of the Receiving
NVEs. The multicast proxy function role is dynamic allocated by the
NVA at per multicast group and per tenant system. The proxy NVE will
receive the multi-cast traffic from the source NVE and distribute it
to other receiving NVEs in the receiving NVE list.
When receiving the multicast registration information, the NVA
selects one NVE as multicast proxy. The selection may be based on
several conditions, such as forwarding capability, location, network
segmentations, etc.
A Participant NVE list will be sent to the Multicast Proxy NVE for
multicast traffic duplication and distribution. The Participant NVE
Z. Qiang Expires April 27, 2015 [Page 6]
Internet-Draft Multicast in NVO3 October 2014
list is created at per Proxy NVE based. This is to avoid any
unnecessary traffic duplication and looping.
6.4. Receiving multicast packets at Source NVE
When receiving a multicast packet from the attached VM, the source
NVE shall handle the packet as followings:
If the multicast Proxy NVE list of a given multicast group is empty,
the source NVE shall not forward any multicast packet of the given
multicast group when receiving it from the attached VM.
If the multicast Proxy NVE list of a given multicast group is not
empty, the source NVE shall duplicate, encapsulate, and forward the
received multicast packet to each Proxy NVEs based on the multicast
Proxy NVE list received from NVA.
6.5. Receiving multicast packets at Proxy NVE
The NVE which has been assigned with the multicast proxy function
role will have the responsibility to distribute the multicast traffic
based on the received multicast Participated NVE list.
When receiving a multicast packet from the source NVE, the proxy NVE
shall dencapsulate, duplicate, encapsulate, and forward the multicast
packet to the destination NVEs based on the multicast Participated
NVE list received from NVA.
6.6. Receiving multicast packets at Receiving NVE
When receiving a multicast packet from a Proxy NVE, the receiving NVE
shall dencapsulate multicast packet, and forward to the attached VM
which has registered to the multicast group.
7. Security Considerations
This is a discussion paper which provides inputs for the NVO3
requirement documents and in itself does not introduce any new
security concerns.
TBD
8. IANA Considerations
No actions are required from IANA for this informational document.
TBD
Z. Qiang Expires April 27, 2015 [Page 7]
Internet-Draft Multicast in NVO3 October 2014
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2234] Crocker, D. and Overell, P.(Editors), "Augmented BNF for
Syntax Specifications: ABNF", RFC 2234, Internet Mail
Consortium and Demon Internet Ltd., November 1997.
9.2. Informative References
[NVO3-MC] "Framework of Supporting Applications Specific Multicast in
NVO3", June 6, 2014.
[RFC6513] "Multicast in MPLS/BGP IP VPNs", February 2012
[RFC7364] "Problem statement: Overlays for network virtualization",
October 2014.
[RFC7365] "Framework for Data Center (DC) Network Virtualization",
October 2014.
[NVO3-ARCH] Narten, T. et al.," An Architecture for Overlay Networks
(NVO3)", work in progress, Feb 2014.
10. Acknowledgments
Many people have contributed to the development of this document and
many more will probably do so before we are done with it. While we
cannot thank all contributors, some have played an especially
prominent role. The following have provided essential input: Suresh
Krishnan.
Authors' Addresses
Zu Qiang
Ericsson
8400, boul. Decarie
Ville Mont-Royal, QC,
Canada
Email: Zu.Qiang@Ericsson.com
Z. Qiang Expires April 27, 2015 [Page 8]