| < draft-ietf-nvo3-use-case-13.txt | draft-ietf-nvo3-use-case-14.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 16 ¶ | skipping to change at page 1, line 16 ¶ | |||
| Verizon | Verizon | |||
| A. Isaac | A. Isaac | |||
| Juniper Networks | Juniper Networks | |||
| V. Manral | V. Manral | |||
| Ionos Networks | Ionos Networks | |||
| Expires: June 2017 December 8, 2016 | Expires: June 2017 December 8, 2016 | |||
| Use Cases for Data Center Network Virtualization Overlay Networks | Use Cases for Data Center Network Virtualization Overlay Networks | |||
| draft-ietf-nvo3-use-case-13 | draft-ietf-nvo3-use-case-14 | |||
| Abstract | Abstract | |||
| This document describes data center network virtualization overlay | This document describes data center network virtualization overlay | |||
| (NVO3) network use cases that can be deployed in various data | (NVO3) network use cases that can be deployed in various data | |||
| centers and serve different data center applications. | centers and serve different data center applications. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted to IETF in full conformance with | This Internet-Draft is submitted to IETF in full conformance with | |||
| skipping to change at page 2, line 35 ¶ | skipping to change at page 2, line 35 ¶ | |||
| 3. DC NVO3 Network and External Network Interconnection...........6 | 3. DC NVO3 Network and External Network Interconnection...........6 | |||
| 3.1. DC NVO3 Network Access via the Internet...................6 | 3.1. DC NVO3 Network Access via the Internet...................6 | |||
| 3.2. DC NVO3 Network and SP WAN VPN Interconnection............8 | 3.2. DC NVO3 Network and SP WAN VPN Interconnection............8 | |||
| 4. DC Applications Using NVO3.....................................8 | 4. DC Applications Using NVO3.....................................8 | |||
| 4.1. Supporting Multiple Technologies..........................9 | 4.1. Supporting Multiple Technologies..........................9 | |||
| 4.2. DC Application with Multiple Virtual Networks.............9 | 4.2. DC Application with Multiple Virtual Networks.............9 | |||
| 4.3. Virtual Data Center (vDC)................................10 | 4.3. Virtual Data Center (vDC)................................10 | |||
| 5. Summary.......................................................12 | 5. Summary.......................................................12 | |||
| 6. Security Considerations.......................................12 | 6. Security Considerations.......................................12 | |||
| 7. IANA Considerations...........................................12 | 7. IANA Considerations...........................................12 | |||
| 8. References....................................................13 | 8. Informative References........................................13 | |||
| 8.1. Normative References.....................................13 | ||||
| 8.2. Informative References...................................13 | ||||
| Contributors.....................................................14 | Contributors.....................................................14 | |||
| Acknowledgements.................................................14 | Acknowledgements.................................................14 | |||
| Authors' Addresses...............................................14 | Authors' Addresses...............................................14 | |||
| 1. Introduction | 1. Introduction | |||
| Server virtualization has changed the Information Technology (IT) | Server virtualization has changed the Information Technology (IT) | |||
| industry in terms of the efficiency, cost, and speed of providing | industry in terms of the efficiency, cost, and speed of providing | |||
| new applications and/or services such as cloud applications. However | new applications and/or services such as cloud applications. However | |||
| traditional data center (DC) networks have some limits in supporting | traditional data center (DC) networks have some limits in supporting | |||
| skipping to change at page 13, line 5 ¶ | skipping to change at page 13, line 5 ¶ | |||
| to protect against a tenant application attacking another tenant | to protect against a tenant application attacking another tenant | |||
| application via the DC infrastructure network. For example, a tenant | application via the DC infrastructure network. For example, a tenant | |||
| application attempts to generate a large volume of traffic to | application attempts to generate a large volume of traffic to | |||
| overload the DC's underlying network. An NVO3 solution has to | overload the DC's underlying network. An NVO3 solution has to | |||
| address these issues. | address these issues. | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| This document does not request any action from IANA. | This document does not request any action from IANA. | |||
| 8. References | 8. Informative References | |||
| 8.1. Normative References | ||||
| [RFC7364] Narten, T., et al "Problem Statement: Overlays for Network | ||||
| Virtualization", RFC7364, October 2014. | ||||
| [RFC7365] Lasserre, M., Motin, T., and et al, "Framework for DC | ||||
| Network Virtualization", RFC7365, October 2014. | ||||
| 8.2. Informative References | ||||
| [IEEE802.1Q] IEEE, "IEEE Standard for Local and metropolitan area | [IEEE802.1Q] IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks -- Media Access Control (MAC) Bridges and Virtual | networks -- Media Access Control (MAC) Bridges and Virtual | |||
| Bridged Local Area", IEEE Std 802.1Q, 2011. | Bridged Local Area", IEEE Std 802.1Q, 2011. | |||
| [NVO3HYVR2NVE] Li, Y., et al, "Hypervisor to NVE Control Plane | [NVO3HYVR2NVE] Li, Y., et al, "Hypervisor to NVE Control Plane | |||
| Requirements", draft-ietf-nvo3-hpvr2nve-cp-req-05, work in | Requirements", draft-ietf-nvo3-hpvr2nve-cp-req-05, work in | |||
| progress. | progress. | |||
| [NVO3ARCH] Black, D., et al, "An Architecture for Overlay Networks | [NVO3ARCH] Black, D., et al, "An Architecture for Overlay Networks | |||
| skipping to change at page 13, line 45 ¶ | skipping to change at page 13, line 35 ¶ | |||
| [RFC3022] Srisuresh, P. and Egevang, K., "Traditional IP Network | [RFC3022] Srisuresh, P. and Egevang, K., "Traditional IP Network | |||
| Address Translator (Traditional NAT)", RFC3022, January | Address Translator (Traditional NAT)", RFC3022, January | |||
| 2001. | 2001. | |||
| [RFC4301] Kent, S., "Security Architecture for the Internet | [RFC4301] Kent, S., "Security Architecture for the Internet | |||
| Protocol", rfc4301, December 2005 | Protocol", rfc4301, December 2005 | |||
| [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private | [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private | |||
| Networks (VPNs)", RFC 4364, February 2006. | Networks (VPNs)", RFC 4364, February 2006. | |||
| [RFC7348] Mahalingam,M., Dutt, D., ific Multicast in etc "VXLAN: A | [RFC7348] Mahalingam, M., Dutt, D., et al, "Virtual eXtensible Local | |||
| Framework for Overlaying Virtualized Layer 2 Networks over | Area Network (VXLAN): A Framework for Overlaying | |||
| Layer 3 Networks", RFC7348 August 2014. | Virtualized Layer 2 Networks over Layer 3 Networks", | |||
| RFC7348 August 2014. | ||||
| [RFC7364] Narten, T., et al "Problem Statement: Overlays for Network | ||||
| Virtualization", RFC7364, October 2014. | ||||
| [RFC7365] Lasserre, M., Motin, T., et al, "Framework for DC Network | ||||
| Virtualization", RFC7365, October 2014. | ||||
| [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A. and | [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A. and | |||
| J. Uttaro, "BGP MPLS Based Ethernet VPN", RFC7432, | J. Uttaro, "BGP MPLS Based Ethernet VPN", RFC7432, | |||
| February 2015 | February 2015 | |||
| [RFC7637] Garg, P., and Wang, Y., "NVGRE: Network Virtualization | [RFC7637] Garg, P., and Wang, Y., "NVGRE: Network Virtualization | |||
| using Generic Routing Encapsulation", RFC7637, Sept. 2015. | using Generic Routing Encapsulation", RFC7637, Sept. 2015. | |||
| [VRF-LITE] Cisco, "Configuring VRF-lite", http://www.cisco.com | [VRF-LITE] Cisco, "Configuring VRF-lite", http://www.cisco.com | |||
| End of changes. 4 change blocks. | ||||
| 18 lines changed or deleted | 13 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||