Problem Statement: Overlays for Network Virtualization
RFC 7364
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
04 | (System) | Notify list changed from nvo3-chairs@ietf.org, draft-ietf-nvo3-overlay-problem-statement@ietf.org to (None) |
2014-10-10
|
04 | (System) | RFC published |
2014-10-03
|
04 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-09-02
|
04 | Alia Atlas | Changed consensus to Yes from Unknown |
2014-09-01
|
04 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2014-08-27
|
04 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2014-08-15
|
04 | (System) | RFC Editor state changed to REF from EDIT |
2014-07-08
|
04 | (System) | RFC Editor state changed to EDIT from MISSREF |
2014-03-07
|
04 | Adrian Farrel | Shepherding AD changed to Alia Atlas |
2013-10-27
|
04 | Martin Thomson | Assignment of request for Last Call review by GENART to Martin Thomson was rejected |
2013-08-08
|
04 | (System) | IANA Action state changed to No IC |
2013-08-06
|
04 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2013-08-05
|
04 | (System) | RFC Editor state changed to MISSREF |
2013-08-05
|
04 | (System) | Announcement was received by RFC Editor |
2013-08-05
|
04 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2013-08-05
|
04 | Amy Vezza | IESG has approved the document |
2013-08-05
|
04 | Amy Vezza | Closed "Approve" ballot |
2013-08-05
|
04 | Amy Vezza | Ballot approval text was generated |
2013-08-05
|
04 | Amy Vezza | Ballot writeup was changed |
2013-07-31
|
04 | Thomas Narten | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-07-31
|
04 | Thomas Narten | New version available: draft-ietf-nvo3-overlay-problem-statement-04.txt |
2013-07-05
|
03 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2013-06-27
|
03 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2013-06-27
|
03 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-06-27
|
03 | Joel Jaeggli | [Ballot comment] The document is weirdly though non-specifically ipv4-centric. I don't think there are any particular fixes to be applied. I would observe however that … [Ballot comment] The document is weirdly though non-specifically ipv4-centric. I don't think there are any particular fixes to be applied. I would observe however that address reuse while common in parallel rfc1918 addressing planes would not I imagine be very common in ipv6 in the umbering plans of ipv6 enabled DCs. that the longest possible route is not a /32, and that a signficant scaling consideration with L3 --> L2 mappings is the duplication between the arp cache and the NDP cache. |
2013-06-27
|
03 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2013-06-27
|
03 | Benoît Claise | [Ballot comment] Not much OPS feedback in this draft. I'm dying to see the "Operational Requirements submitted for IESG review" chartered item. Editorial: "Tenant Systems" … [Ballot comment] Not much OPS feedback in this draft. I'm dying to see the "Operational Requirements submitted for IESG review" chartered item. Editorial: "Tenant Systems" should not be capitalized. Alternatively, you can define the term. Please expand ARMD Explain/Expand: C-VID, B-VID, I-VID And here is Melinda's feedback from OPS-DIR: I was asked to perform an OPS-DIR review of draft-ietf-nvo3-overlay-problem-statement. The document specifically targets multitenancy in large data center networks, describing problems arising from that scenario and how they may be addressed by overlay networks. That this document made it through working group last call at all should be seen as a major political accomplishment, given the level of rancor in the working group, and much respect is due to the chairs and the document authors for getting this done. The underlying assumption is that these virtual networks will provide traffic isolation. Minor issues: Section 3.1: "Cloud computing" - the document would benefit from eliminating that terminology and just describing the scenario ("Some service providers offer elastic services ... "). "Cloud" is imprecise and evocative of marketing jargon. We can talk about the need for dynamic provisioning more carefully, I think. Section 3.2, second sentence: "A VM can be migrated from one server to another, [ ... ]." I'm afraid it's servers all the way down - may be clearer to say that VMs may be migrated between hypervisors. An operational consideration for this section (3.2) is that there may be state associated with specific data flows to a VM that is not on the VM - that's resident on some sort of middlebox (firewall, application proxy, accelerator, cache, etc.). I tend to think that network state will, in practice, be topologically close to the VM, but care must be taken. Doesn't really matter but it appears that the section header for section 3.6 is marked up incorrectly (font and bolding). 3.7 is probably one of the clearest descriptions I've seen of this issue - well done. 10: I'm not sure the security considerations are quite right, or at least not the discussion of data plane security issues. What are the characteristics of an overlay network that differ from a physical network or VPN, and how do they impact design decisions for the overlay? Also, may be worth saying something about data leakage from interception of control plane traffic (what inferences can be made from changes in topology, etc.?). |
2013-06-27
|
03 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-06-27
|
03 | Stephen Farrell | [Ballot comment] The nodes of a virtual network, once running, can look after securing their own traffic. That might lead one to say that nvo3 … [Ballot comment] The nodes of a virtual network, once running, can look after securing their own traffic. That might lead one to say that nvo3 traffic isolation doesn't need to consider confidentiality. However, if the nodes in a virtual network are VMs and if VMs can be moved, then any secrets required for the virtual network to secure its traffic will be exposed to the underlay during the move. I'm not clear if this wg will try address that issue or not. Section 10 does say that some environments might be concerned about confidentiality but is vague about whether or not the wg will work on the topic. Such a confidentiality service isn't a panacea of course, the underlay components providing the confidentiality service could leak the relevant keys, but it could still be useful nonetheless. (BTW, I've no idea if it'd make sense to have such a service that's separated from whatever technology is used to move the VM or not.) So I was wondering: will the wg actually define such a confidentiality service or not? The response is that yes, this'll be considered for the requirements documents which is fine. Note that I'm not trying to insist on a "yes" answer, even though I think that'd be good. Even a "maybe, and that'll be answered in the requirements specs before we re-charter" would be ok. But regardless of the answer, I think it'd be good to at least note this issue in the security considerations section. - 4.1, bullets: I found the use of ingress/egress non-intuitive here. You mean ingress to the underlay and egress from the underlay, right? It'd be good to explicitly say that, though I figured it out eventually (or not, if I'm wrong above:-) |
2013-06-27
|
03 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2013-06-27
|
03 | Ted Lemon | [Ballot comment] Minor nit: While an overlay-based approach may address some of the "pain points" that were raised in ARMD (e.g., better support … [Ballot comment] Minor nit: While an overlay-based approach may address some of the "pain points" that were raised in ARMD (e.g., better support for multi-tenancy). Analysis will be needed to understand the scaling tradeoffs of an overlay based approach compared with existing approaches. I think you want a comma between these two chunks; otherwise it doesn't really parse. In 5.7, trill-fine-labeling is in the RFC editor queue, so I think that should be described as completed work, rather than something TRILL is investigating. In general this draft is very clearly written, and does a good job of analyzing the problem space. Thanks for doing such a good job on it! |
2013-06-27
|
03 | Ted Lemon | [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon |
2013-06-27
|
03 | Jari Arkko | [Ballot comment] Thank you for writing this document. It is well written and easy to read, and documents the space well. I had one question … [Ballot comment] Thank you for writing this document. It is well written and easy to read, and documents the space well. I had one question when reading Section 4. I was wondering why MTU was not mentioned, MTU issues being one of the impacts of overlay designs. |
2013-06-27
|
03 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2013-06-27
|
03 | Sean Turner | [Ballot comment] I support Stephen's discussion position. |
2013-06-27
|
03 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2013-06-26
|
03 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2013-06-26
|
03 | Adrian Farrel | [Ballot comment] Thanks for this document which I believe is a major step towards scoping and documenting the real problems in this space. I have … [Ballot comment] Thanks for this document which I believe is a major step towards scoping and documenting the real problems in this space. I have a number of fairly editorial concerns that I hope you can work through with your AD and document shepherd. --- In reading this document, I found it difficult to distinguish the requirements that arrise from the provision of multiple virtual networks on a common infrastrucutre (traffic isolation, address space isolation, virtual network creation and configuration) from those that are specific to the NVO3 scope (massive scaling, multi-tenancy on individual physical servers, no constraints on physical location of hosted services). --- [I-D.ietf-nvo3-framework] is used as a normative reference because it defines terminology used in this document. --- I would move the definiton of "in-band virtual network" from section 2 to section 5.3 (the only place the term is used) to avoid complicating the definitions with concepts that appear to only be applied to L2 networks. --- Why is the example of an Overlay Virtual Network in section picked from the layer 2 space when this work is supposed to consider only layer 3 overlays? OTOH, since this term is not used anywhere in the document, I suggest deleting it. --- I believe section 3.1 could be rewritten without the need to say "cloud" or "elastic services". This would be helpful because those marketting phrases do not add to the meaning. I think the final sentence of the paragraph captures the issues, but could be pulled out into a little more explanation of what happens and what problems it causes. --- Section 5.3 uses the terms C-VLAN, S-VLAN, and B-VLAN, but only C-VLAN has been defined. -- Section 10 seems to me to be missing the impact that one virtual network might be able to have on another (for example by stressing network resources to cause undesirable VM mobility, or by consuming shared resources to make b/w or CPU unavailable). This is a type of self-consuming DoS. |
2013-06-26
|
03 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2013-06-26
|
03 | Stephen Farrell | [Ballot discuss] The nodes of a virtual network, once running, can look after securing their own traffic. That might lead one to say that nvo3 … [Ballot discuss] The nodes of a virtual network, once running, can look after securing their own traffic. That might lead one to say that nvo3 traffic isolation doesn't need to consider confidentiality. However, if the nodes in a virtual network are VMs and if VMs can be moved, then any secrets required for the virtual network to secure its traffic will be exposed to the underlay during the move. I'm not clear if this wg will try address that issue or not. Section 10 does say that some environments might be concerned about confidentiality but is vague about whether or not the wg will work on the topic. Such a confidentiality service isn't a panacea of course, the underlay components providing the confidentiality service could leak the relevant keys, but it could still be useful nonetheless. (BTW, I've no idea if it'd make sense to have such a service that's separated from whatever technology is used to move the VM or not.) So the discuss point is: will the wg actually define such a confidentiality service or not? Note that I'm not trying to insist on a "yes" answer, even though I think that'd be good. Even a "maybe, and that'll be answered in the requirements specs before we re-charter" would be ok. But regardless of the answer, I think it'd be good to at least note this issue in the security considerations section. |
2013-06-26
|
03 | Stephen Farrell | [Ballot comment] - 4.1, bullets: I found the use of ingress/egress non-intuitive here. You mean ingress to the underlay and egress from the underlay, right? … [Ballot comment] - 4.1, bullets: I found the use of ingress/egress non-intuitive here. You mean ingress to the underlay and egress from the underlay, right? It'd be good to explicitly say that, though I figured it out eventually (or not, if I'm wrong above:-) |
2013-06-26
|
03 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2013-06-24
|
03 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-06-21
|
03 | Cindy Morgan | Note field has been cleared |
2013-06-21
|
03 | Spencer Dawkins | [Ballot comment] I did have one comment. Please consider it along with any other comments you receive. This draft uses the word "cloud", which has … [Ballot comment] I did have one comment. Please consider it along with any other comments you receive. This draft uses the word "cloud", which has been an extremely imprecise term in the IETF. The second occurrence in Section 3.1 provides some guidance on which of the (many) aspects of clouds you're talking about: Cloud computing involves on-demand provisioning of resources for multi-tenant environments. Could this explanation be moved to Section 1, with the first occurrence of "cloud"? |
2013-06-21
|
03 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2013-06-21
|
03 | Barry Leiba | [Ballot comment] Editorial: In Section 5.6, I think the second and third sentences need to be merged with a comma. |
2013-06-21
|
03 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-06-19
|
03 | Stewart Bryant | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2013-06-19
|
03 | Stewart Bryant | Placed on agenda for telechat - 2013-06-27 |
2013-06-19
|
03 | Stewart Bryant | Ballot has been issued |
2013-06-19
|
03 | Stewart Bryant | [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant |
2013-06-19
|
03 | Stewart Bryant | Created "Approve" ballot |
2013-06-19
|
03 | Stewart Bryant | Ballot writeup was changed |
2013-06-19
|
03 | Matthew Bocci | Changed document writeup |
2013-06-19
|
03 | Stewart Bryant | Ballot writeup was changed |
2013-06-19
|
03 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-06-10
|
03 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2013-06-10
|
03 | Amanda Baber | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-nvo3-overlay-problem-statement-03, which is currently in Last Call, and has the following comments: We understand that this document doesn't require … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-nvo3-overlay-problem-statement-03, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. If this assessment is not accurate, please respond as soon as possible. |
2013-06-07
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Waltermire |
2013-06-07
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Waltermire |
2013-06-06
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2013-06-06
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2013-06-05
|
03 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2013-06-05
|
03 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Problem Statement: Overlays for Network … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Problem Statement: Overlays for Network Virtualization) to Informational RFC The IESG has received a request from the Network Virtualization Overlays WG (nvo3) to consider the following document: - 'Problem Statement: Overlays for Network Virtualization' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-06-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes issues associated with providing multi- tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. A key multi-tenancy requirement is traffic isolation, so that one tenant's traffic is not visible to any other tenant. Another requirement is address space isolation, so that different tenants can use the same address space within different virtual networks. Traffic and address space isolation is achieved by assigning one or more virtual networks to each tenant, where traffic within a virtual network can only cross into another virtual network in a controlled fashion (e.g., via a configured router and/or a security gateway). Additional functionality is required to provision virtual networks, associating a virtual machine's network interface(s) with the appropriate virtual network, and maintaining that association as the virtual machine is activated, migrated and/or deactivated. Use of an overlay-based approach enables scalable deployment on large network infrastructures. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-nvo3-overlay-problem-statement/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-nvo3-overlay-problem-statement/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-06-05
|
03 | Cindy Morgan | State changed to In Last Call from Last Call Requested |
2013-06-05
|
03 | Stewart Bryant | Last call was requested |
2013-06-05
|
03 | Stewart Bryant | Ballot approval text was generated |
2013-06-05
|
03 | Stewart Bryant | Ballot writeup was generated |
2013-06-05
|
03 | Stewart Bryant | State changed to Last Call Requested from Publication Requested |
2013-06-05
|
03 | Stewart Bryant | Last call announcement was generated |
2013-05-31
|
03 | Amy Vezza | draft-ietf-nvo3-overlay-problem-statement-03.txt Document Shepherd Write-Up (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the … draft-ietf-nvo3-overlay-problem-statement-03.txt Document Shepherd Write-Up (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Informational. This is appropriate as the draft describes the issues associated with providing multi-tenancy in large data centers, as well as work areas for the attention of the NVO3 working group. It does not specify new protocol elements, but rather provides the background requirements and architecture work in this area. The intended status is properly indicated. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document describes issues associated with providing multi- tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. Working Group Summary The NVO3 working group is chartered to consider approaches to multi-tenancy that reside at the network layer rather than using traditional isolation mechanisms that rely on the underlying layer 2 technology (e.g., VLANs). The NVO3 WG will determine which types of connectivity services are needed by typical DC deployments (for example, IP and/or Ethernet). The basis for this work is a problem statement that identifies the key issues that must be considered and that are challenging to current data centre deployments, and must be considered as a part of a standardised approach. There are no IPR declarations on the draft. Document Quality I have no concerns about the quality of the document. I believe it represents WG consensus, and it has been widely reviewed and discussed on the list since formation of the NVO3 working group. The document does not specify any MIB changes or additions which would need review. Personnel The document shepherd is Matthew Bocci (matthew.bocci@alcatel-lucent.com). The responsible Area Director is Stewart Bryant (stbryant@cisco.com). (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd reviewed the document. I had no significant technical or editorial comments. There is a change log at the end of the document that should be removed prior to publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. The document has received adequate review. The document has been developed within the WG and reviewed over a period of a number of IETFs, as well as being a major focus of the BoF that led to the creation of the NVO3 working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No further review required. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No specific concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Each author listed in the Authors Addresses section has personally indicated that they are not aware of any IPR that has not already been declared in accordance with BCP 78 and 79. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. None (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I am comfortable that the document represents WG consensus and has been reviewed by a reasonable number of active WG participants. It has been discussed over a long period , both in face to face IETF meetings and on the list. It received a number of comments in WG last call that were addressed by the authors. The document is the result of the combination of text from an original problem statement draft, that was used as a basis for the formation of the NVO3 working group, and the input of others in who felt that the original draft did not consider L3VPN solutions and issues sufficiently. A design team with a new editor was formed to resolve these comments and co-edit the combined draft. I am comfortable that the resulting draft has WG consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) None indicated. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. ID-Nits passes. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. There are no relevant formal review criteria. (13) Have all references within this document been identified as either normative or informative? Yes. All references are explicitly identified as informative. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. All references are informative. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document does not change the status of any existing RFCs. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There are no IANA actions. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are no IANA actions. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There are no sections containing formal language that needs reviewing. |
2013-05-31
|
03 | Amy Vezza | Note added 'The document shepherd is Matthew Bocci (matthew.bocci@alcatel-lucent.com).' |
2013-05-31
|
03 | Amy Vezza | Intended Status changed to Informational |
2013-05-31
|
03 | Amy Vezza | IESG process started in state Publication Requested |
2013-05-31
|
03 | (System) | Earlier history may be found in the Comment Log for draft-narten-nvo3-overlay-problem-statement |
2013-05-31
|
03 | Matthew Bocci | Changed document writeup |
2013-05-31
|
03 | Matthew Bocci | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2013-05-10
|
03 | Matthew Bocci | draft-ietf-nvo3-overlay-problem-statement-03.txt Document Shepherd Write-Up (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the … draft-ietf-nvo3-overlay-problem-statement-03.txt Document Shepherd Write-Up (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Informational. This is appropriate as the draft describes the issues associated with providing multi-tenancy in large data centers, as well as work areas for the attention of the NVO3 working group. It does not specify new protocol elements, but rather provides the background requirements and architecture work in this area. The intended status is properly indicated. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document describes issues associated with providing multi- tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. Working Group Summary The NVO3 working group is chartered to consider approaches to multi-tenancy that reside at the network layer rather than using traditional isolation mechanisms that rely on the underlying layer 2 technology (e.g., VLANs). The NVO3 WG will determine which types of connectivity services are needed by typical DC deployments (for example, IP and/or Ethernet). The basis for this work is a problem statement that identifies the key issues that must be considered and that are challenging to current data centre deployments, and must be considered as a part of a standardised approach. There are no IPR declarations on the draft. Document Quality I have no concerns about the quality of the document. I believe it represents WG consensus, and it has been widely reviewed and discussed on the list since formation of the NVO3 working group. The document does not specify any MIB changes or additions which would need review. Personnel The document shepherd is Matthew Bocci (matthew.bocci@alcatel-lucent.com). The responsible Area Director is Stewart Bryant (stbryant@cisco.com). (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd reviewed the document. I had no significant technical or editorial comments. There is a change log at the end of the document that should be removed prior to publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. The document has received adequate review. The document has been developed within the WG and reviewed over a period of a number of IETFs, as well as being a major focus of the BoF that led to the creation of the NVO3 working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No further review required. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No specific concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Each author listed in the Authors Addresses section has personally indicated that they are not aware of any IPR that has not already been declared in accordance with BCP 78 and 79. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. None (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I am comfortable that the document represents WG consensus and has been reviewed by a reasonable number of active WG participants. It has been discussed over a long period , both in face to face IETF meetings and on the list. It received a number of comments in WG last call that were addressed by the authors. The document is the result of the combination of text from an original problem statement draft, that was used as a basis for the formation of the NVO3 working group, and the input of others in who felt that the original draft did not consider L3VPN solutions and issues sufficiently. A design team with a new editor was formed to resolve these comments and co-edit the combined draft. I am comfortable that the resulting draft has WG consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) None indicated. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. ID-Nits passes. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. There are no relevant formal review criteria. (13) Have all references within this document been identified as either normative or informative? Yes. All references are explicitly identified as informative. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. All references are informative. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document does not change the status of any existing RFCs. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There are no IANA actions. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are no IANA actions. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There are no sections containing formal language that needs reviewing. |
2013-05-10
|
03 | Thomas Narten | New version available: draft-ietf-nvo3-overlay-problem-statement-03.txt |
2013-02-14
|
02 | Benson Schliesser | Changed shepherd to Matthew Bocci |
2013-02-07
|
02 | Thomas Narten | New version available: draft-ietf-nvo3-overlay-problem-statement-02.txt |
2012-10-22
|
01 | Thomas Narten | New version available: draft-ietf-nvo3-overlay-problem-statement-01.txt |
2012-09-05
|
00 | Thomas Narten | New version available: draft-ietf-nvo3-overlay-problem-statement-00.txt |