Internet DRAFT - draft-zia-nvo3-dist-arch

draft-zia-nvo3-dist-arch



 



INTERNET-DRAFT                                                 Osama Zia
Intended Status: Informational                                 Microsoft
Expires: April 21, 2016                                 October 19, 2015


         Distributed Architecture for Customer Access to Cloud
                      draft-zia-nvo3-dist-arch-01


Abstract

   This draft describes a distributed architecture within the data
   center for providing customers, access to their VMs in the data
   center.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html


Copyright and License Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
 


O.Zia                   Expires April 21, 2016                [Page 1]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015


   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



Table of Contents

   1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1  Terminology . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Components of Existing Architecture  . . . . . . . . . . . . .  3
   3.  Limitation of Existing Architecture  . . . . . . . . . . . . .  4
   4.  Proposed Architecture  . . . . . . . . . . . . . . . . . . . .  5
   5. Advantages of proposed architecture . . . . . . . . . . . . . .  6
   3  Security Considerations . . . . . . . . . . . . . . . . . . . .  6
   4  IANA Considerations . . . . . . . . . . . . . . . . . . . . . .  6
   5  References  . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     5.1  Normative References  . . . . . . . . . . . . . . . . . . .  6
     5.2  Informative References  . . . . . . . . . . . . . . . . . .  6
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .  7




























 


O.Zia                   Expires April 21, 2016                [Page 2]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015


1  Introduction

   Customers today connect to the cloud providers using solutions that
   have been conventionally used by service providers to provide
   backhaul to customers. These are based on establishing some sort of
   Layer3 with the service provider (IGP, BGP or static route). The
   service provider then uses an overlay (generally mpls) to carry
   customers' traffic to their other locations where it is delivered to
   the customer over a similar Layer3 handoff.

   In a cloud environment especially in case of hybrid cloud, the
   expectation is to provide customers, access to their assets (compute,
   storage etc.)in the cloud with the same ease as they would access
   their assets at their premises. However, conventional connectivity
   model used by existing cloud providers make it difficult for the
   customers because they require complicated interconnection with the
   cloud provider.

   The other problem with this approach is the scalability and cost
   implications on the edge device at the cloud provider such as:

   1. Number of VRFs

   2. Number of routes

   3. Number of BGP sessions

   4. Cost of high bandwidth interfaces


1.1  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

   This document uses the same terminology as [RFC7365].  In addition,
   the following terms are used:


   VRF: Virtual Routing and Forwarding

   Edge: Device at the cloud provider used to connect customers

   Cloud Router: Routing software running on a server or VM



 


O.Zia                   Expires April 21, 2016                [Page 3]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015


2.  Components of Existing Architecture

   Starting from customer on-prem towards the customer assets in the
   cloud here are the transport components and traffic flow.

   Customer connects to the cloud provider either directly or through
   carrier. When using carrier the most common method is MPLS VPN as
   described in [RFC4364]. In case of carrier, customer either
   establishes a new layer3 connection (mostly BGP)or leverages an
   existing connection with the carrier. While in case of cloud provider
   it will be a new layer3 connection.  For this purpose customer
   deploys or leverages an existing routing device.

   At the cloud provider end there is again a routing device to
   terminate customer connections and establish layer3 connectivity. In
   order to deal with customer security requirements and overlapping
   address space problems, the cloud provider creates VRF at the routing
   device. BGP (or IGP) protocol is used to dynamically exchange
   customer routes. The customer VRF at this edge device stores
   customer's on-prem routes as well as customer routes in the cloud.

   From the edge device the cloud provider establishes some kind of
   overlay encapsulation mechanism to tunnel the traffic towards the
   customer VMs. There are many encapsulation options available today
   and used by the cloud providers such as VXLAN, GRE, NVGRE, IPSec, IP-
   in-IP etc.

   There are tunnel endpoint devices close to customer VMs that are
   responsible for decapsulating the traffic encapsulated by the cloud
   provider edge device. These are NVE devices that can be hardware
   based such as ToRs or can be software gateways in the hypervisor or
   dedicated VMs. The choice and location of these devices varies
   between cloud providers.

3.  Limitation of Existing Architecture

   The edge device at the cloud provider needs to create separate VRF
   for each customer. This pose limitation on the number of customers
   that can be onboarded via single edge device.

   As BGP is the most common protocol being used. These routing devices
   are limited on how many BGP sessions they can establish.

   Another limitation is the number of routes. This is an interesting
   problem. Unlike Internet, in this case the device will have to store
   same prefixes over and over for each customer. So, while the number
   of prefixes may not be huge (as the private address space is limited
   as compared to public address space) but number of instances of same
 


O.Zia                   Expires April 21, 2016                [Page 4]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015


   prefixes will fill up the route storage capacity of the device very
   quickly. Also, unlike Internet the customer has no need to aggregate
   these prefixes as this network is an extension of their existing
   network. This would mean that either customer is forced to aggregate
   or a new device needs to be deployed to keep up with growing number
   of routes.

   The cost of high speed interfaces on routing devices tend to be quite
   higher than on switching devices. Hence, the cost of the edge device
   is higher to start with.

   An important thing to note here is that all the above factors come
   into play at the same time. Either one of these variable could impact
   other variables and force the upgrade or additional deployment of
   these devices.

4.  Proposed Architecture



                           Customer Router
                              +--------+
                              |        |
                              +------:-+
                                     :<--BGP
                            +--------:+
                            |NVE Edge:|
                            +---.----:+
                                .    :
                                .   +:--------+
                                .   |         |Cloud Router
                                .   +---------+
                                .       |
                             +--.----------+
                             |     NVA     |
                            .+-----.-------+.
                           .       .          .
                  +-------.+   +---.----+   +--.-----+
                  |  NVE 1 |   |  NVE 2 |   |  NVE 3 |
                  +--------+   +--------+   +--------+
                    /    \      /     \      /     \
                  +---+ +---+  +---+ +---+  +---+ +---+
                  |VM1| |VM2|  |VM3| |VM4|  |VM5| |VM6|
                  +---+ +---+  +---+ +---+  +---+ +---+




 


O.Zia                   Expires April 21, 2016                [Page 5]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015


   The proposed architecture is based on three tenants.

   1. Separation of control plane and data plane

   2. Leverage extensibility of NVA

   3. Cost reduction

   At the cloud provider there will be a layer2 edge device instead of a
   layer3 edge device. This device will be used for direct or indirect
   physical connection to the customer.

   For the control plane there will be routing software running on a
   server or VM called cloud router. The customer will establish BGP
   connection with the cloud router. This cloud router will get its
   information from NVA. When a customer deploys a new VN the
   provisioning system will update NVA with the NVE and prefix for the
   customer. The NVA will update the cloud router which will send BGP
   update to the customer.

   For the data plane, the edge device will act as an NVE and use
   incoming interface to identify the customer. NVE will need more
   information to craft the header for the incoming packet such as
   destination NVE, encapsulation type etc. NVA will hold customer
   information such as VNID, NVEs belonging to the customer and the
   prefixes that each NVE is serving. There could be a push or pull
   model between NVE and NVA to update information. The destination NVE
   will received the packet, look at the VNID, decapsulate it and
   deliver it to the corresponding VM.

   NVEs that are close the customer VMs can be software or hardware
   NVEs. They use NVA in similar way to get more information about the
   TSs and their VNs. However, there search string could be different.
   For example the NVE could provide NVA with VNID to gather information
   about the destination NVE.

5. Advantages of proposed architecture

   By moving the routing function into cloud router, the route storing
   capacity will be increased many fold and at a very low cost as
   compared to a router. This will also make it more scalable.

   High bandwidth interfaces such as 10G and 40G are much cheaper on a
   switch than on a router. This will reduce the cost. Another advantage
   is space and power. A 48G switch takes less space and consumer less
   power than a 48 port router.

   By deploying a switch the throughput capacity of the device will be
 


O.Zia                   Expires April 21, 2016                [Page 6]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015


   almost non-blocking which will increase the scalability.

   Extensibility of NVA can be leveraged for routing decisions. For
   example NVA can have a field that allows access to certain prefixes
   by a VNID or Sub-VNID. At the ingress NVE packet can be dropped based
   on this policy. Similarly, the NVA can provide information related to
   encapsulation type used by the remote NVE.


3  Security Considerations

   Tenant isolation is the primary concern in a cloud provider. In this
   architecture, tenant information in NVA, Cloud Router and
   encapsulation are three components that need to be tenant specific.
   It is expected that NVO3 will address these issues in their specific
   areas.


4  IANA Considerations

   This document does not request any action from IANA.


5  References

5.1  Normative References

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
   Requirement Levels", BCP 14, RFC 2119, March 1997

5.2  Informative References

   [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
   [RFC7365] Lasserre, M., Balus, F., Morin, T., Bitar, N., and
             Y.Rekhter, "Framework for Data Center (DC) Network
             Virtualization", RFC 7365, October 2014



Authors' Addresses


   Osama Zia
   1 Microsoft Way
   Redmond, WA, 98052
   US

   EMail: osamaz@microsoft.com
 


O.Zia                   Expires April 21, 2016                [Page 7]

INTERNET DRAFT   Dist. Arch. for Customer Access to Clo   October 19, 2015





















































O.Zia                   Expires April 21, 2016                [Page 8]