Looks like it has been submitted for publication!!

https://datatracker.ietf.org/doc/draft-ietf-idr-tunnel-encaps/22/

Ready to drain the queue of drafts with normative references!!

Kind Regards

Gyan

On Sat, Apr 24, 2021 at 3:03 PM Gyan Mishra <hayabusa...@gmail.com> wrote:

> Completely understood for a standards specifications with normative
> dependencies.
>
> I think we are close to seeing light at the end of the tunnel for the
> encap draft.
>
> Kind Regards
>
> Gyan
>
> On Sat, Apr 24, 2021 at 2:57 PM Jeff Tantsura <jefftant.i...@gmail.com>
> wrote:
>
>> Gyan,
>>
>> Normative references have to be at least at the same level of maturity as
>> the document referring. Just common sense. While it often creates rather
>> complex dependencies, it is a healthy precaution.
>>
>> Regards,
>> Jeff
>>
>> On Apr 24, 2021, at 10:14, Gyan Mishra <hayabusa...@gmail.com> wrote:
>>
>> 
>>
>>
>> That’s fabulous news that everyone has implemented!!
>>
>> Unfortunate on the red tape with the turn around to RFC.
>>
>> Kind Regards
>>
>> Gyan
>>
>>
>> On Sat, Apr 24, 2021 at 8:29 AM John E Drake <jdr...@juniper.net> wrote:
>>
>> Yes, and everyone has implemented it.  Unfortunately, it had an
>>> inadvertent normative reference to the tunnel encapsulation attribute and
>>> hence has been in the RFC Editor queue for over three years.
>>>
>>>
>>>
>>> Yours Irrespectively,
>>>
>>>
>>>
>>> John
>>>
>>>
>>>
>>>
>>>
>>> Juniper Business Use Only
>>>
>>> *From:* Gyan Mishra <hayabusa...@gmail.com>
>>> *Sent:* Friday, April 23, 2021 6:21 PM
>>> *To:* Ali Sajassi (sajassi) <saja...@cisco.com>; BESS <bess@ietf.org>;
>>> Jeff Tantsura <jefftant.i...@gmail.com>; John E Drake <
>>> jdr...@juniper.net>; Rabadan, Jorge (Nokia - US/Mountain View) <
>>> jorge.raba...@nokia.com>
>>> *Subject:* Fwd: [bess] VXLAN BGP EVPN Question
>>>
>>>
>>>
>>> *[External Email. Be cautious of content]*
>>>
>>>
>>>
>>>
>>>
>>> Authors
>>>
>>>
>>>
>>> Do we know if this draft will progress to RFC?
>>>
>>>
>>>
>>> https://tools.ietf.org/html/draft-ietf-bess-dci-evpn-overlay-10
>>> <https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-bess-dci-evpn-overlay-10__;!!NEt6yMaO-gk!Vg9pxTtcOdgw7cYL_Ze1TyY-pXZUmyMf3uJyvPslpcQNVpijlvjvRwzvkEMMBHM$>
>>>
>>>
>>>
>>>
>>>
>>> This is a very useful draft for intra DC multi pod NVO3 solutions with
>>> multiple vendors.
>>>
>>>
>>>
>>>
>>>
>>> Thanks
>>>
>>>
>>>
>>> Gyan
>>>
>>>
>>>
>>>
>>>
>>> ---------- Forwarded message ---------
>>> From: *Rabadan, Jorge (Nokia - US/Mountain View)* <
>>> jorge.raba...@nokia.com>
>>> Date: Fri, Apr 24, 2020 at 3:07 AM
>>> Subject: Re: [bess] VXLAN BGP EVPN Question
>>> To: Gyan Mishra <hayabusa...@gmail.com>, Jeff Tantsura <
>>> jefftant.i...@gmail.com>
>>> CC: BESS <bess@ietf.org>
>>>
>>>
>>>
>>> Hi Gyan,
>>>
>>>
>>>
>>> If I may, note that:
>>>
>>>
>>> https://tools.ietf.org/html/draft-ietf-bess-dci-evpn-overlay-10#section-4.6
>>> <https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-bess-dci-evpn-overlay-10*section-4.6__;Iw!!NEt6yMaO-gk!Vg9pxTtcOdgw7cYL_Ze1TyY-pXZUmyMf3uJyvPslpcQNVpijlvjvRwzvfKkPzi4$>
>>>
>>>
>>>
>>> Also provides vxlan segmentation, and while the description is based on
>>> DCI, you can perfectly use it for inter-pod connectivity.
>>>
>>>
>>>
>>> Thanks.
>>>
>>> Jorge
>>>
>>>
>>>
>>> *From: *BESS <bess-boun...@ietf.org> on behalf of Gyan Mishra <
>>> hayabusa...@gmail.com>
>>> *Date: *Friday, April 24, 2020 at 5:21 AM
>>> *To: *Jeff Tantsura <jefftant.i...@gmail.com>
>>> *Cc: *BESS <bess@ietf.org>
>>> *Subject: *Re: [bess] VXLAN BGP EVPN Question
>>>
>>>
>>>
>>>
>>>
>>> Hi Jeff
>>>
>>>
>>>
>>> Yes - Cisco has a draft for multi site for use cases capability of inter
>>> pod or inter site segmented path between desperate POD fabrics intra DC or
>>> as DCI option inter DC without MPLS.  The segmentation localizes BUM
>>> traffic and has border gateway DF election for BUM traffic that is
>>> segmented stitched between PODs as I mentioned similar to inter-as L3 vpn
>>> opt b.  There is a extra load as you said on the BGW border gateway
>>> performing the network vtep dencap from leaf and then again encap towards
>>> the egress border gateway.  Due to that extra load on the border gateway
>>> it’s not recommended to have spine function on BGW thus an extra layer for
>>> multi site to be scalable.  Definitely requires proprietary asic and not
>>> merchant silicon or white box solution.  The BUM traffic is much reduced as
>>> you stated from multi fabric connected super spine or single fabric spine
>>> that contains all leafs.  That decoupling sounds like incongruent control
>>> and data plane with Mac only Type 2 routes which would result in more BUM
>>> traffic  but it sounds like that maybe trade off of conversation learning
>>> only active flows versus entire data center wide Mac VRF being learned
>>> everywhere.  I wonder if their is an option to have that real decoupling of
>>> EVPN control plane and vxlan data plane overlay that does not impact
>>> convergence but adds stability and only active flow Type 2 Mac learner
>>> across the fabric.
>>>
>>>
>>>
>>> https://datatracker.ietf.org/doc/draft-sharma-multi-site-evpn/
>>> <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-sharma-multi-site-evpn/__;!!NEt6yMaO-gk!Vg9pxTtcOdgw7cYL_Ze1TyY-pXZUmyMf3uJyvPslpcQNVpijlvjvRwzvPV5PoSI$>
>>>
>>>
>>>
>>> Kind regards
>>>
>>>
>>>
>>> Gyan
>>>
>>>
>>>
>>> On Thu, Apr 23, 2020 at 6:04 PM Jeff Tantsura <jefftant.i...@gmail.com>
>>> wrote:
>>>
>>> Gyan,
>>>
>>>
>>>
>>> "Multi site” is not really an IETF terminology, this is a solution
>>> implement by NX-OS, there’s a draft though. Its main functionality is to
>>> localize VxLAN tunnels and provide segmented path vs end2end full mesh of
>>> VxLAN tunnels (participating in the same EVI). We are talking HER here.
>>>
>>> The feature is heavily HW dependent as it requires BUM re-encapsulation
>>> at the boundaries (leaf1->BGW1-BGW2->leaf2..n). So good luck seeing it soon
>>> on low end silicon.
>>>
>>> It doesn’t eliminate BUM traffic but significantly reduces the span of
>>> “broadcast domain” and reduces the need for large flood domains (modern HW
>>> gives you ~512 large flood groups, obviously depending on HW)
>>>
>>>
>>>
>>> Wrt your question about Mac conversation learning - this is an
>>> implementation issue, nothing in EVPN specifications precludes you of doing
>>> so, moreover in the implementation I was designing (in my previous life) we
>>> indeed decoupled data plane learning from control plane advertisement so
>>> control plane was aware of “Active” flows.  Needless to say - this creates
>>>  an additional layer of complexity and all kinds of funky states in the
>>> system ;-).
>>>
>>>
>>>
>>> Hope this helps
>>>
>>>
>>>
>>> Cheers,
>>>
>>> Jeff
>>>
>>> On Apr 23, 2020, 8:30 AM -0700, Gyan Mishra <hayabusa...@gmail.com>,
>>> wrote:
>>>
>>>
>>>
>>>
>>>
>>> Slight clarification with the arp traffic.  What I meant was broadcast
>>> traffic translated into BUM traffic with the EVPN architecture is there any
>>> way to reduce the amount of BUM traffic with a data center design
>>> requirement with vlan anywhere sprawl with 1000s of type 2 Mac mobility
>>> routes being learned between all the leaf VTEPs.
>>>
>>>
>>>
>>> The elimination of broadcast is a tremendous gain and with broadcast
>>> suppression of multicast that does help but it would be nice to not have
>>> such massive Mac tables type 2 route churn chatter with a conversation
>>> learning where only active flows are are in the type 2 rib.
>>>
>>>
>>>
>>> Kind regards
>>>
>>>
>>>
>>> Gyan
>>>
>>>
>>>
>>> On Wed, Apr 22, 2020 at 6:47 PM Gyan Mishra <hayabusa...@gmail.com>
>>> wrote:
>>>
>>>
>>>
>>> In the description of the vxlan BGP evpn scenario has a typo on the
>>> multisite feature segmented LSP inter pod with the RT auto rewrite which is
>>> similar to MPLS inter-as option b not a.
>>>
>>>
>>>
>>> Kind regards
>>>
>>>
>>>
>>> Gyan
>>>
>>>
>>>
>>> On Wed, Apr 22, 2020 at 5:57 PM Gyan Mishra <hayabusa...@gmail.com>
>>> wrote:
>>>
>>>
>>>
>>> All
>>>
>>>
>>>
>>> Had a question related to vxlan BGP EVPN architecture specifications
>>> defined in BGP EVPN NVO3 overlay RFC 8365 and VXLAN data plane RFC 7348.
>>>
>>>
>>>
>>> In a Data Center environment where you have a multiple PODs individual
>>> fabrics per POD connected via a super spine extension using a Multi site
>>> feature doing auto rewrite of RTs to stitch the NVE tunnel between pods
>>> similar to inter-as option A.
>>>
>>>
>>>
>>> So in this scenario where you have vlan sprawl everywhere with L2 and L3
>>> VNIs everywhere as if it were a a single L2 domain.  The topology is a
>>> typical vxlan spine leaf topology where the L3 leafs are the TOR switch so
>>> very small physical  L2 fault domain. So I was wondering if with the vxlan
>>> architecture if this feature below is possible or if their is a way to do
>>> so in the current specification.
>>>
>>>
>>>
>>> Cisco use to have a DC product called “fabric path” which was based on
>>> conversation learning.
>>>
>>>
>>>
>>> Is there any way with existing vxlan BGP evpn specification or maybe
>>> future enhancement to have a Mac conversation learning capability so that
>>> only the active mac’s that are part of a conversations flow are the mac
>>> that are flooded throughout the vxlan fabric.  That would really help
>>> tremendously with arp storms so if new arp entries are generated locally on
>>> a leaf they are not flooded through the fabric unless their are active
>>> flows between leafs.
>>>
>>>
>>>
>>> Also is there a way to filter type 2 Mac mobility routes between leaf
>>> switches at the control plane level based on remote vtep or maybe other
>>> parameters..  That would also reduce arp storms BUM traffic.
>>>
>>>
>>>
>>> Kind regards
>>>
>>>
>>>
>>> Gyan
>>>
>>> --
>>>
>>> Gyan  Mishra
>>>
>>> Network Engineering & Technology
>>>
>>> Verizon
>>>
>>> Silver Spring, MD 20904
>>>
>>> Phone: 301 502-1347
>>>
>>> Email: gyan.s.mis...@verizon.com
>>>
>>>
>>>
>>>
>>>
>>> --
>>>
>>> Gyan  Mishra
>>>
>>> Network Engineering & Technology
>>>
>>> Verizon
>>>
>>> Silver Spring, MD 20904
>>>
>>> Phone: 301 502-1347
>>>
>>> Email: gyan.s.mis...@verizon.com
>>>
>>>
>>>
>>>
>>>
>>> --
>>>
>>> Gyan  Mishra
>>>
>>> Network Engineering & Technology
>>>
>>> Verizon
>>>
>>> Silver Spring, MD 20904
>>>
>>> Phone: 301 502-1347
>>>
>>> Email: gyan.s.mis...@verizon.com
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> BESS mailing list
>>> BESS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/bess
>>> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/bess__;!!NEt6yMaO-gk!Vg9pxTtcOdgw7cYL_Ze1TyY-pXZUmyMf3uJyvPslpcQNVpijlvjvRwzvzScD_hE$>
>>>
>>> --
>>>
>>> Gyan  Mishra
>>>
>>> Network Engineering & Technology
>>>
>>> Verizon
>>>
>>> Silver Spring, MD 20904
>>>
>>> Phone: 301 502-1347
>>>
>>> Email: gyan.s.mis...@verizon.com
>>>
>>>
>>>
>>>
>>>
>>> --
>>>
>>
>>> <https://urldefense.com/v3/__http:/www.verizon.com/__;!!NEt6yMaO-gk!Vg9pxTtcOdgw7cYL_Ze1TyY-pXZUmyMf3uJyvPslpcQNVpijlvjvRwzvJ9vmSpU$>
>>> <~WRD0000.jpg>
>>> <https://urldefense.com/v3/__http:/www.verizon.com/__;!!NEt6yMaO-gk!Vg9pxTtcOdgw7cYL_Ze1TyY-pXZUmyMf3uJyvPslpcQNVpijlvjvRwzvJ9vmSpU$>
>>>
>>> *Gyan Mishra*
>>>
>>> *Network Solutions Architect *
>>>
>>> *Email gyan.s.mis...@verizon.com <gyan.s.mis...@verizon.com>*
>>>
>>> *M 301 502-1347*
>>>
>>>
>>>
>> --
>>
>> <http://www.verizon.com/>
>>
>> *Gyan Mishra*
>>
>> *Network Solutions A**rchitect *
>>
>> *Email gyan.s.mis...@verizon.com <gyan.s.mis...@verizon.com>*
>>
>>
>>
>> *M 301 502-1347*
>>
>> --
>
> <http://www.verizon.com/>
>
> *Gyan Mishra*
>
> *Network Solutions A**rchitect *
>
> *Email gyan.s.mis...@verizon.com <gyan.s.mis...@verizon.com>*
>
>
>
> *M 301 502-1347*
>
> --

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *

*Email gyan.s.mis...@verizon.com <gyan.s.mis...@verizon.com>*



*M 301 502-1347*
_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org/mailman/listinfo/bess

Reply via email to