Service Function Chaining: Framework & Architecture



Similar documents
Service Delivery Automation in IPv6 Networks

Fostering IoT Deployment Challenges and Assets of SDN Techniques

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

Software-Defined Networking: A Service Provider s Perspective draft-sin-sdnrg-sdn-approach

WHITE PAPER. Network Virtualization: A Data Plane Perspective

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

A lightweight Approach for Viable End-to-end IP-based QoS Services

The Complete IS-IS Routing Protocol

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Authors contact info: Paul Quinn Distinguished Engineer Cisco Systems 55 Cambridge Parkway Cambridge, MA

Implementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland

The following normative disclaimer shall be included on the front page of a PoC report:

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

Boosting mobility performance with Multi-Path TCP

DSL Forum. Working Text WT-101

Intent NBI for Software Defined Networking

Software Defined Networking to Improve Mobility Management Performance

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

References and Requirements for CPE Architectures for Data Access

Using OSPF in an MPLS VPN Environment

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

WAN Optimization in MPLS Networks- the Transparency Challenge!

Dynamic Service Chaining for NFV/SDN

Monitoring within an Autonomic Network: A. Framework

Internetworking. Problem: There is more than one network (heterogeneity & scale)

MPLS L2VPN (VLL) Technology White Paper

Malicious MPLS Policy Engine Reconnaissance

Firewalls P+S Linux Router & Firewall 2013

NETWORK ISSUES: COSTS & OPTIONS

Scaling 10Gb/s Clustering at Wire-Speed

White Paper Abstract Disclaimer

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

Project Report on Traffic Engineering and QoS with MPLS and its applications

Building MPLS VPNs with QoS Routing Capability i

Impact of Virtualization on Cloud Networking Arista Networks Whitepaper

Use- cases and Requirements for MPTCP Proxy in ISP Networks

Architectural Overview of IP Multimedia Subsystem -IMS

SRX High Availability Design Guide

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Cisco Dynamic Workload Scaling Solution

AdvOSS Session Border Controller

DDoS Attack Traceback

Internetworking II: VPNs, MPLS, and Traffic Engineering

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Broadband metrics & Internet service

Incremental QoS Deployment based on Network Brokers

Extending the Internet of Things to IPv6 with Software Defined Networking

Tomás P. de Miguel DIT-UPM. dit UPM

SSL Inspection Step-by-Step Guide. June 6, 2016

Border Gateway Protocol BGP4 (2)

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs

How To Make A Network Cable Reliable And Secure

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Application Note. Onsight TeamLink And Firewall Detect v6.3

Extending Networking to Fit the Cloud

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

A Layer-2 Approach for Mobility and Transport in the Mobile Backhaul

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

The Meta-QoS-Class concept: a step towards global QoS inter-domain services

VPN. Date: 4/15/2004 By: Heena Patel

Software Defined Networking (SDN) - Open Flow

Providing Integrated Service Access. Part 2 Management

Adapting MPLS Fast Reroute to Create Resilient Rings

How Network Transparency Affects Application Acceleration Deployment

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

Business Cases for Brocade Software-Defined Networking Use Cases

TRILL for Data Center Networks

Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

VXLAN: Scaling Data Center Capacity. White Paper

Telepresence in an IPv6 World. Simplify the Transition

Internet Quality of Service

Quality of Service for IP Videoconferencing Engineering White Paper

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS

RapidIO Network Management and Diagnostics

Virtual CPE and Software Defined Networking

9-1-1 Services for Interconnected VoIP and Local Exchange Carriers

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Broadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1

Facility Usage Scenarios

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

Session Border Controller

VLANs. Application Note

Datacom Services Description and their applications

Cisco Videoscape Distribution Suite Service Broker

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

"Charting the Course to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

Cisco Configuring Basic MPLS Using OSPF

The Impact of Virtualization on Cloud Networking Arista Networks Whitepaper

Value-Added Services and Service Chaining: Deployment Considerations and Challenges

Enabling rapid and adaptive network applications deployment

Enterprise Energy Management with JouleX and Cisco EnergyWise

Transcription:

Service Function Chaining: Framework & Architecture draft-boucadair-sfc-framework London, March 2014 M. Boucadair (mohamed.boucadair@orange.com) C. Jacquenet (christian.jacquenet@orange.com) R. Parker (Ron_Parker@affirmednetworks.com) D. Lopez (diego@tid.es) J. Guichard (jguichar@cisco.com) C. Pignataro (cpignata@cisco.com) 1

Context IP networks rely more and more on the combination of advanced functions Besides basic routing and forwarding functions The goal is to enforce service-inferred forwarding for traffic traversing a given domain Differentiated by the set of Service Functions to be invoked Service-inferred forwarding is policy-based. Policies may be: subscriber-aware based on flow characteristics TE-oriented (e.g., optimize network resource usage) combination thereof 2

Main Principles SFC provides a new forwarding paradigm to process traffic according to an ordered set of Service Functions Dynamic SFC provisioning is a different operation than packet processing Service Functions are viewed as logical instances The set of SFs is defined by the service to be provided and according to the networking environment There is no global nor standard list of SFs enabled SF chaining adapts to the service and the traffic directionality Transparent to communication endpoints Policy-driven Network transport agnostic Supports sharing of information between SFs 3

All is about Policies SFC logic is domain-specific and policy-driven No global or standard SF chaining logic The ordered set of activated SFs is specific to each administrative domain The chaining of SFs and the criteria to invoke some of them are local to a domain Preserve current engineering practices Topology hiding SF chaining logic and related policies should not be leaked outside of the SFC domain Several SF chains can be simultaneously enforced within a domain To meet various business requirements How to bind the traffic to a given SF chaining is policy-based 4

Overall Approach SFC operations are abstracted No implementation-specific details are included No assumptions on how policies are enforced How SF-specific policies are enforced is out of scope Traffic forwarding between SFC-aware SFs can rely on IP-based tunnels, MAC-in-MAC, etc. Fragmentation handling A stateless approach is described MTU tweaking can be envisaged Compliance with DiffServ and ECN 5

Supported Features Core functionalities SFC structuring SFC-related policy enforcement Additional functionalities Control plane SF discovery SF/SFC diagnostic SF liveliness detection SF loop detection Overhead optimization 6

Functional Elements SFC Boundary Node: A node that connects one SFC-enabled domain to a another SFC-enabled domain or an is SFCunaware domain SFC Ingress Node: A SFC Boundary Node that handles traffic which enters the SFC-enabled domain SFC Egress Node: A SFC Boundary Node that handles traffic which leaves the SFC-enabled domain SF Node: Any node within an SFC-enabled domain that embeds one or multiple SFs SFC Classifier: An entity which classifies packets based on (some of) their contents, and optionally local policies (i.e., subscriber aware and flow aware) PDP (Policy Decision Point): An entity which is responsible for structuring SFCs and communicate policies to other involved functional elements 7

Co-locating SFC Functional Elements It is deployment-specific Operators can make their own design choices, e.g., 1. A BN can act as Egress BN and Ingress BN for the same flow 2. Distinct Ingress BN and Egress BN may be crossed by a packet 3. Distinct Ingress BNs for upstream and downstream 4. An Ingress BN can embed a Classifier 5. An Ingress BN may not embed a Classifier, but be responsible for dispatching flows among a set of Classifiers 6. Ingress BN, Egress BN, and Classifier may be co-located 7. A PDP may be co-located with a Classifier 8. An SF Node may be co-located with a Classifier 9. Many Network Elements may behave as xbns 8

The Intelligence Resides In The PDP PDP makes decisions according to policies documented in SFC Policy Tables PDP decisions are applied by SF Nodes, Classifier, and Boundary Nodes which process traffic accordingly A PDP may manage multiple SFC domains SFC Policy Enforcement PDP Classifier_m SFC_BN_n SF_i SF_j SFC_BN_s SFC Domain(i) 9

Main SFC Operations Assign SF Identifiers SFs are listed and identified in a repository maintained by the SFC administrative entity (e.g., ISP) Assign SF Locators Meant to locate a SF which can be supported by several devices Locator is typically an IP address (could be a FQDN, MAC @, etc.) One or multiple Locators can be configured for each SF (e.g., 1.2.3.4, 2001:db8::1) Build SF Chains Detail the list of SFs to be invoked in a specific order Abstracted as SF Map SF Map is an ordered list of SF Identifiers SF Maps are specific to traffic directionality Coordination between PDP, Classifiers, and SFs 10

Deployment Considerations The document identifies and discusses deployment models where: 1. A marking-based scheme is used together with an encapsulation mode 2. No encapsulation nor tagging mechanisms are needed 3. Marking can be used but no encapsulation is required 4. No protocol extension is required 11

Focus on the Marking-Based Scheme Chaining is described by an information processed by devices that participate to the delivery of a given service Such information needs to be signaled in data packets themselves Some open issues are discussed What marking information is required to be signaled? Where to inject such marking information? How to steer traffic forwarding to cross specific SF Nodes? A preliminary analysis is included in the I-D, while a detailed analysis is recorded in I-D.boucadair-sfcdesign-analysis 12

Next Step? Adopt as a Working Group document to fulfill this charter item: Architecture: This document will provide a description of the SFC architectural building blocks and their relationships including interconnection, placement of SFC specific capabilities, management, diagnostics, design analysis, and security models, as well as requirements on the protocol mechanisms. The initial scope is restricted to a single administrative domain, keeping in mind that architectural decisions made for the intra-domain case may have implications for the interdomain case. Incorporate concepts from other proposed I-Ds on architectural aspects Comments and contributions are welcome 13