Internet DRAFT - draft-liu-sdnrg-vn-practice

draft-liu-sdnrg-vn-practice



SDN Research Group                                              Vic. Liu
Internet Draft                                               JinZhu.Wang
Intended status: Informational                              China Mobile
March 9, 2015
Expires: September 2015



                  Virtualized Network Deployment Practice
                      draft-liu-sdnrg-vn-practice-00


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, and it may not be
   published except as an Internet-Draft.

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, except to publish it
   as an RFC and to translate it into languages other than English.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November 10,
   2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."




Liu & Wang            Expires September 9, 2015               [Page 1]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on September 9, 2015.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document. Code Components extracted from this document must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions and are provided without warranty as described in
   the Simplified BSD License.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document.

Abstract

   In this draft, we introduce the deployment practice for virtual
   network by firstly bring out the consideration of virtual network
   implementation. Then with the VN architecture, discuss the five
   planes in Virtual network. Afterwards, introduce the interfaces
   between each planes. The Application will be add soon.

Table of Contents


   1. Introduction ................................................ 3
   2. Terminology ................................................. 3
   3. Consideration of Virtual Network Implementation ............. 3
   4. Deployment of Virtualized Network............................ 5
   5. Application ................................................. 8
   6. Conclusions ................................................. 9


Liu & Wang            Expires September 9, 2015               [Page 2]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


   7. References .................................................. 9
      7.1. Normative References.................................... 9
      7.2. Informative References...................................9
   8. Acknowledgments ............................................. 9

   1. Introduction

   Today, more services are being provided through cloud system. These
   trigger more research and implementation of virtual technology in
   cloud datacenters. China mobile have been research in datacenter
   virtualized for a period of time. We design and deploy datacenters
   with virtual network to provide public cloud service. In this draft,
   we share the deployment practice and some problem statement.

   This draft is organized as follows:
   Section 2 describes terminology for virtual technology;
   Section 3 discusses the consideration while deploy the virtual
   network.
   Section 4 discusses the implementation of virtual network
   architecture;
   Section 5 discusses the interface between each layer of virtual
   network;
   Section 6 introduce the application deployed virtual network.


   2. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   [RFC2119].

   3. Consideration of Virtual Network implementation

   During the implementation of virtual network. Some issues and   key
   index SHOULD be considered clearly.

   3.1 Virtual Network Function

   a. Virtual Switch (vswitch): the vswitch is deployed at each server
   to interconnect VMs on the server. The vswitch provides the Layer 2
   switching function. The vswitches interconnect with each other by
   using the overloay tunnel in order to break the 4K limitation of
   maximum number of tenants caused by the vlan.

   In order to optimize the data traffic path, the vswitch can implement
   the distributed gateway function: routing the packets between


Liu & Wang            Expires September 9, 2015               [Page 3]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


   different subnets of the same tenant directly without sending the
   packets to the gateway.

   b. Virtual Router (vRouter): the vRouter is the gateway of the
   tenant's network, which connects different subnets of the tenant. The
   vRouter takes charge of forwarding following packets: 1.the packets
   between the tenant in the DC and the users outside the DC (South-
   north traffic); 2.the packets between different tenants; 3.the
   packets between different subnets of the same tenant.

   In addition, the vRouter can also implement the following function: 1.
   NAT, which transfers the private ip address inside DC to the public
   ip address outside the DC and vice versa; 2. Overlay tunnel endpoint,
   which removes the tunnel capsulation for packets inside the DC to
   send them outside and adds the tunnel capsulation for packets outside
   the DC to forward them inside.

   c. Virtual Firewall (vFw): filter or block packet flows based on the
   security policies. The vFw can both process the South-north and East-
   west packets flows.

   d. Virtual LoadBalancer (vLB): balance the traffic load between
   different VMs. The vLB can both process the South-north and East-west
   packets flows

   e. Virtual VPN (vVPN): the vVPN is deployed at the edge of the
   network, which creates the tunnels to users outside the DC to provide
   the VPN service. The tunnels can be IPsec VPN tunnel or the MPLS VPN
   tunnel.

   3.2 Virtual Network Performance:

   Because of the large east-west traffic, virtual network performance
   in datacenter should be taken into considered. The Key index in
   virtual network is listed below:
      a. CPU: CPU utilization is very important for VN. However, vCPU
         can be allocated for VM. But it cannot allocated for hypervisor
         and VSwitch.

      b. Memory: Memory is not sensitive for the VN performance. There
         is a consideration that the VxLAN But we
         still think it should be listed as one VxLAN performance index.

      c. Latency: When traffic is forwarded between VM to VM across two
         different physical server. Latency should be an index.

      d. Throughput: We use the benchmark as the traffic throughput.


Liu & Wang            Expires September 9, 2015               [Page 4]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015



      e. Packet-lost: Virtual network may have few packet-lost because
         of unstable of vCPU. Less than 2% of packet-lost is acceptable.


   4. Deployment of Virtualized Network

   In our deployment, we deployed a datacenter to provide public cloud
   service with 1000 servers. On each server, we deploy 10 VMs connected
   by a virtual switch. The virtual switches contains the overlay
   tunnels to interconnect with each other. In the underlay physical
   network, the traditional TOR switches and CORE switches are implied
   for Layer2/Layer3 network forwarding.

   4.1 Virtualized Network Architecture

   As the figure showed as follow. There are five layers in virtual
   network.






























Liu & Wang            Expires September 9, 2015               [Page 5]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


                               -------------------
                               |  Management plane |
                                -------------------
                                        |
                          -------------------------------
                         |                                |
                         |
                  ---------------              ------------------------
                 | Control Plane |            | Service function Plane |
                  ---------------              ------------------------
                     /     \
                    /       \
                   /         \
                  /           \
     -----------------    -----------------
     | Underlay Plane |  | Underlay Plane |
     -----------------    -----------------

                         Figure of VN architecture

   a. Underlay Plane

   The underlay plane contains physical switches, which are divided into
   access switches and core switches. The core switches can use both the
   Layer-2 switching and Layer-3 routing to interconnect with the access
   switches. The underlay plane is independent of the overlay plane.

   b. Overlay data plane

   A gateway is deployed at the edge of the datacenter network, which is
   responsible for 1: routing packets between different subnets (east-
   west traffic) and between users inside the DC and outside the DC
   (south-north traffic); 2. Overlay tunnel endpoint, which removes the
   tunnel capsulation for packets inside the DC to send them outside and
   adds the tunnel capsulation for packets outside the DC to forward
   them inside.

   c. Service function plane

   We also adopt virtual network functions, which includes the virtual
   Firewall, the virtual Load Balancer, and the virtual VPN.

   The sequence of the vFw, vLB and vPN which the packet flow pass can
   be flexible arranged according to user requirement.

   d. Control Plane



Liu & Wang            Expires September 9, 2015               [Page 6]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


   We deploy a controller to control all virtual switches and the
   gateway. The protocols between the SDN controller and virtual
   switches are: 1. OVSDB, which is used to configure the virtual switch,
   and 2. OpenFlow1.3, which is used to manage virtual switch
   dynamically. The protocol between the SDN controller and the router
   is OpenFlow1.3 or netconf.

   e. Management plane

   Above the controller, we use the OpenStack to manage public cloud.
   The OpenStack neutron cooperates with the SDN controller to control
   the virtual network: 1. the SDN controller communicates with the ML2
   plugin in the neutron to receive the Layer 2 virtual network
   configuration and configure the virtual switches; 2. The SDN
   controller communicates with the L3 plugin in the neutron to receive
   Layer 3 virtual network configuration and configure both the virtual
   switches and the gateway.

     4.2 Interfaces in Virtual Network

a. Control plane to underlay plane: This is the interface of controller
to gateway. For the gateway, it either can be the hardware gateway or
the software gateway (VRouter run within the server). This interface is
implemented by OpenFlow and Netconf. The controller use the interface to
management virtual switch to allow the legacy server connect with
overlay network.

b. Control plane to overlay data plane: control plane include controller
and the data plane include the VSwitch and VRouter. The interface of
Controller to VSwitch is implemented by OVSDB and OpenFlow. The
interface of Controller to the VRouter is implemented by Netconf and
Openflow.

c. Management plane to control plane: This is a controller interface
that connected with OpenStack Neutron by Restful API to provide L2 and
L3 management.












Liu & Wang            Expires September 9, 2015               [Page 7]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


               -------------      ------------  -----------
               | OpenStack | ->   |ML2 Plugin|  |L3 Plugin|
               |  Neutron  | ->   ------------  -----------
               -------------            |            |
                                        |            |
                                        ---------------
                                        |   REST API  |
                                        ---------------
                                               |
                                          ------------
                                         | Controller |
                                          ------------

                 Figure of controller north band interface



d. Service function interfaces: The service function interfaces include
interface between management(OpenStack) to vFW/vLB/vVPN and controller
to vFW/vLB/vVPN. The detail is showed as figure below.


   -------------     ------------  ----------- -------------------------
   | OpenStack | ->  |ML2 Plugin|  |L3 Plugin| |Service Function Plugin|
   |  Neutron  | ->  ------------  -----------  ------------------------
   -------------            |            |             |
                            |            |             |
                           ----------------------------------
                           |           REST API             |
                           ----------------------------------
                                  |                    |
                             ------------           -------------
                            | Controller |---------| vFW/vLB/vVPN|
                             ------------           -------------
                  Figure of Service Function Interfaces


   5. Application

   5.1 VPC
     TBD.
  5.2 SFC
     TBD.






Liu & Wang            Expires September 9, 2015               [Page 8]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015






   6. Conclusions

   In this draft, we introduce the deployment practice for virtual
   network by firstly bring out the consideration of virtual network
   implementation. Then with the VN architecture, discuss the five
   planes in Virtual network. Afterwards, introduce the interfaces
   between each planes. The Application will be add soon.

   7. References

   7.1. Normative References

         [1] Bradner, S., "Key words for use in RFCs to Indicate
         Requirement Levels", BCP 14, RFC 2119, March 1997.

         [2] Crocker, D. and Overell, P.(Editors), "Augmented BNF for
         Syntax Specifications: ABNF", RFC 2234, Internet Mail
         Consortium and Demon Internet Ltd., November 1997.

         [RFC2119] Bradner, S., "Key words for use in RFCs to
         Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.

         [RFC2234] Crocker, D. and Overell, P.(Editors), "Augmented
         BNF for Syntax Specifications: ABNF", RFC 2234, Internet
         Mail Consortium and Demon Internet Ltd., November 1997.

   7.2. Informative References

         [3] Faber, T., Touch, J. and W. Yue, "The TIME-WAIT state in TCP
         and Its Effect on Busy Servers", Proc. Infocom 1999 pp. 1573-
         1583.

         [Fab1999] Faber, T., Touch, J. and W. Yue, "The TIME-WAIT
         state in TCP and Its Effect on Busy Servers", Proc. Infocom
         1999 pp. 1573-1583.

   8. Acknowledgments

   This document was prepared using 2-Word-v2.0.template.dot.






Liu & Wang            Expires September 9, 2015               [Page 9]


Internet-Draft     draft-liu-sdnrg-vn-practice-00           March 2015


Authors' Addresses

Vic Liu
China Mobile

Email: liuzhiheng@chinamobile.com

Jinzhu Wang
China Moible

Email: Wangjinzhu@chinamobile.com




































Liu & Wang            Expires September 9, 2015              [Page 10]