< draft-hao-bess-mcast-auto-nvo3-00.txt   draft-hao-bess-mcast-auto-nvo3-01.txt >
BESS W. Hao BESS W. Hao
Y. Li Y. Li
L. Wang L. Wang
Internet Draft Huawei Technologies Ltd. Internet Draft Huawei Technologies Ltd.
Intended status: Standards Track Intended status: Standards Track
Expires: December 2015 June 5, 2015 Expires: September 2016 March 8, 2016
Multicast Group Address Auto-Provisioning For NVO3 Network Multicast Group Address Auto-Provisioning For NVO3 Network
draft-hao-bess-mcast-auto-nvo3-00.txt draft-hao-bess-mcast-auto-nvo3-01.txt
Abstract Abstract
This document provides dynamic underlay multicast group address This document provides dynamic underlay multicast group address
provisioning mechanism for each VNI or combination of VNI and provisioning mechanism for each VNI or combination of VNI and
overlay multicast group address. The underlay multicast group overlay multicast group address. The underlay multicast group
address allocation function is provided on NVA(centralized point), address allocation function is provided on NVA(centralized point),
NVE communicates with NVA using BGP protocol extension. NVE communicates with NVA using BGP protocol extension.
Status of this Memo Status of this Memo
skipping to change at page 1, line 43 skipping to change at page 1, line 43
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without Section 4.e of the Trust Legal Provisions and are provided without
skipping to change at page 3, line 27 skipping to change at page 3, line 27
P-multicast tree. Each bidirectional P-multicast tree corresponds to P-multicast tree. Each bidirectional P-multicast tree corresponds to
one P-Multicast group address. one P-Multicast group address.
To transport overlay BUM(broadcast, unknown unicast and multicast) To transport overlay BUM(broadcast, unknown unicast and multicast)
traffic, we need to have a mapping between the VNI/VNI plus C- traffic, we need to have a mapping between the VNI/VNI plus C-
Multicast group and the P-Multicast group that it will use. The Multicast group and the P-Multicast group that it will use. The
overlay multicast group is called C-Multicast group. There are overlay multicast group is called C-Multicast group. There are
multiple mapping methods as follows: multiple mapping methods as follows:
1. Dedicated inclusive tree. In this case, a multicast tree is 1. Dedicated inclusive tree. In this case, a multicast tree is
dedicated to a VNI, a separate underlay multicast group address dedicated to a VNI, a separate underlay multicast group address is
is allocated for each VNI. allocated for each VNI.
2. Aggregate inclusive tree. In this case, a multicast tree is 2. Aggregate inclusive tree. In this case, a multicast tree is shared
shared by multiple VNIs, a shared multicast group address is by multiple VNIs, a shared multicast group address is allocated
allocated for multiple VNIs. for multiple VNIs.
3. Dedicated selective tree. In this case, a multicast tree is 3. Dedicated selective tree. In this case, a multicast tree is
dedicated to a combination of VNI plus overlay multicast group, a dedicated to a combination of VNI plus overlay multicast group, a
separate underlay multicast group address is allocated for a separate underlay multicast group address is allocated for a
combination. combination.
4. Aggregate selective tree. In this case, a multicast tree is shared 4. Aggregate selective tree. In this case, a multicast tree is shared
by multiple combinations of VNI plus overlay multicast group, a by multiple combinations of VNI plus overlay multicast group, a
shared underlay multicast group address is allocated for multiple shared underlay multicast group address is allocated for multiple
combinations. combinations.
skipping to change at page 6, line 37 skipping to change at page 6, line 37
This Extended Community is a new transitive Extended Community This Extended Community is a new transitive Extended Community
having a Type field value of 0x06 and the Sub-Type TBD. It may be having a Type field value of 0x06 and the Sub-Type TBD. It may be
advertised along with Inclusive Multicast Ethernet Tag Routes or advertised along with Inclusive Multicast Ethernet Tag Routes or
Selective Multicast Ethernet Tag Route. Selective Multicast Ethernet Tag Route.
Each P-Multicast Allocation extended community is encoded as an 8- Each P-Multicast Allocation extended community is encoded as an 8-
octet value, as follows: octet value, as follows:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type=0x06 | Sub-Type=TBD |G|R| Reserved=0 | | Type=0x06 | Sub-Type=TBD |G|R| Reserved=0 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved=0 | | Reserved=0 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The "G" bit of 1 indicates "Request" message. The "R" bit of 1 The "G" bit of 1 indicates "Request" message. The "R" bit of 1
indicates "Reply" message. indicates "Reply" message.
5. Security Considerations 5. Security Considerations
NVA processes all NVE's P-Multicast group address allocation request NVA processes all NVE's P-Multicast group address allocation request
message, it is vulnerable for attacking by inappropriate NVE in data message, it is vulnerable for attacking by inappropriate NVE in data
center. NVE's identity should be strictly inspected on NVA, possible center. NVE's identity should be strictly inspected on NVA, possible
security solution need to be further researched. security solution need to be further researched.
 End of changes. 7 change blocks. 
14 lines changed or deleted 14 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/