Layer edits
Use "layer-2" instead of "layer 2" if it is used as an adjective like "layer-2 network". Change-Id: Ie3361e08d7781c1c799c6953026d81c2325a83c3
This commit is contained in:
@@ -150,7 +150,7 @@
|
|||||||
</section>
|
</section>
|
||||||
<section xml:id="section_adv_cfg_l3_agent">
|
<section xml:id="section_adv_cfg_l3_agent">
|
||||||
<title>L3 agent</title>
|
<title>L3 agent</title>
|
||||||
<para>You can run an L3 agent that enables layer 3 forwarding and floating IP support.</para>
|
<para>You can run an L3 agent that enables layer-3 forwarding and floating IP support.</para>
|
||||||
<para>The node that runs the L3 agent should run:</para>
|
<para>The node that runs the L3 agent should run:</para>
|
||||||
<screen><userinput>neutron-l3-agent --config-file <replaceable>NEUTRON_CONFIG_FILE</replaceable> --config-file <replaceable>L3_CONFIG_FILE</replaceable></userinput></screen>
|
<screen><userinput>neutron-l3-agent --config-file <replaceable>NEUTRON_CONFIG_FILE</replaceable> --config-file <replaceable>L3_CONFIG_FILE</replaceable></userinput></screen>
|
||||||
<para>You must configure a driver that matches the plug-in that runs on the service. This
|
<para>You must configure a driver that matches the plug-in that runs on the service. This
|
||||||
@@ -304,7 +304,7 @@ external_network_bridge = br-ex-2</programlisting>
|
|||||||
</section>
|
</section>
|
||||||
<section xml:id="section_adv_cfg_l3_metering_agent">
|
<section xml:id="section_adv_cfg_l3_metering_agent">
|
||||||
<title>L3 metering agent</title>
|
<title>L3 metering agent</title>
|
||||||
<para>You can run an L3 metering agent that enables layer 3 traffic metering. In general,
|
<para>You can run an L3 metering agent that enables layer-3 traffic metering. In general,
|
||||||
you should launch the metering agent on all nodes that run the L3 agent:</para>
|
you should launch the metering agent on all nodes that run the L3 agent:</para>
|
||||||
<screen><userinput>neutron-metering-agent --config-file <replaceable>NEUTRON_CONFIG_FILE</replaceable> --config-file <replaceable>L3_METERING_CONFIG_FILE</replaceable></userinput></screen>
|
<screen><userinput>neutron-metering-agent --config-file <replaceable>NEUTRON_CONFIG_FILE</replaceable> --config-file <replaceable>L3_METERING_CONFIG_FILE</replaceable></userinput></screen>
|
||||||
<para>You must configure a driver that matches the plug-in that runs on the service. The
|
<para>You must configure a driver that matches the plug-in that runs on the service. The
|
||||||
|
@@ -135,13 +135,13 @@
|
|||||||
(neutron), has tremendous implications and will have
|
(neutron), has tremendous implications and will have
|
||||||
a huge impact on the architecture and design of the cloud
|
a huge impact on the architecture and design of the cloud
|
||||||
network infrastructure.</para>
|
network infrastructure.</para>
|
||||||
<para>The legacy networking (nova-network) service is primarily a layer 2 networking
|
<para>The legacy networking (nova-network) service is primarily a layer-2 networking
|
||||||
service which has two main modes in which it will function.
|
service which has two main modes in which it will function.
|
||||||
The difference between the two modes in legacy networking pertain
|
The difference between the two modes in legacy networking pertain
|
||||||
to whether or not legacy networking uses VLANs. When using
|
to whether or not legacy networking uses VLANs. When using
|
||||||
legacy networking in a flat network mode, all network hardware
|
legacy networking in a flat network mode, all network hardware
|
||||||
nodes and devices throughout the cloud are connected to a
|
nodes and devices throughout the cloud are connected to a
|
||||||
single layer 2 network segment which provides access to
|
single layer-2 network segment which provides access to
|
||||||
application data.</para>
|
application data.</para>
|
||||||
<para>When the network devices in the cloud support segmentation
|
<para>When the network devices in the cloud support segmentation
|
||||||
using VLANs, legacy networking can operate in the second mode. In
|
using VLANs, legacy networking can operate in the second mode. In
|
||||||
|
@@ -55,11 +55,11 @@
|
|||||||
be needed.</para>
|
be needed.</para>
|
||||||
<para>Depending on the selected design, Networking itself may not
|
<para>Depending on the selected design, Networking itself may not
|
||||||
even support the required
|
even support the required
|
||||||
<glossterm baseform="Layer-3 network">layer 3 network</glossterm>
|
<glossterm baseform="Layer-3 network">layer-3 network</glossterm>
|
||||||
functionality. If it
|
functionality. If it
|
||||||
is necessary or advantageous to use the provider networking
|
is necessary or advantageous to use the provider networking
|
||||||
mode of Networking without running the layer 3 agent, then an
|
mode of Networking without running the layer-3 agent, then an
|
||||||
external router will be required to provide layer 3
|
external router will be required to provide layer-3
|
||||||
connectivity to outside systems.</para>
|
connectivity to outside systems.</para>
|
||||||
<para>Interaction with orchestration services is inevitable in
|
<para>Interaction with orchestration services is inevitable in
|
||||||
larger-scale deployments. The Orchestration module is capable of allocating
|
larger-scale deployments. The Orchestration module is capable of allocating
|
||||||
@@ -125,7 +125,7 @@
|
|||||||
<glossterm baseform="Layer-2 network">layer 2</glossterm>
|
<glossterm baseform="Layer-2 network">layer 2</glossterm>
|
||||||
with a provider network
|
with a provider network
|
||||||
configuration. For example, it may be necessary to implement
|
configuration. For example, it may be necessary to implement
|
||||||
HSRP to terminate layer 3 connectivity.</para>
|
HSRP to terminate layer-3 connectivity.</para>
|
||||||
<para>Depending on the workload, overlay networks may or may not
|
<para>Depending on the workload, overlay networks may or may not
|
||||||
be a recommended configuration. Where application network
|
be a recommended configuration. Where application network
|
||||||
connections are small, short lived or bursty, running a
|
connections are small, short lived or bursty, running a
|
||||||
@@ -145,7 +145,7 @@
|
|||||||
mesh overlay network, while some network monitoring tools or
|
mesh overlay network, while some network monitoring tools or
|
||||||
storage replication workloads will have performance issues
|
storage replication workloads will have performance issues
|
||||||
with throughput or excessive broadcast traffic.</para>
|
with throughput or excessive broadcast traffic.</para>
|
||||||
<para>A design decision that many overlook is a choice of layer 3
|
<para>A design decision that many overlook is a choice of layer-3
|
||||||
protocols. While OpenStack was initially built with only IPv4
|
protocols. While OpenStack was initially built with only IPv4
|
||||||
support, Networking now supports IPv6 and dual-stacked networks.
|
support, Networking now supports IPv6 and dual-stacked networks.
|
||||||
Note that, as of the icehouse release, this only includes
|
Note that, as of the icehouse release, this only includes
|
||||||
@@ -164,7 +164,7 @@
|
|||||||
routing within the cloud including network equipment, hardware
|
routing within the cloud including network equipment, hardware
|
||||||
nodes, and instances. Some workloads will perform well with
|
nodes, and instances. Some workloads will perform well with
|
||||||
nothing more than static routes and default gateways
|
nothing more than static routes and default gateways
|
||||||
configured at the layer 3 termination point. In most cases
|
configured at the layer-3 termination point. In most cases
|
||||||
this will suffice, however some cases require the addition of
|
this will suffice, however some cases require the addition of
|
||||||
at least one type of dynamic routing protocol if not multiple
|
at least one type of dynamic routing protocol if not multiple
|
||||||
protocols. Having a form of interior gateway protocol (IGP)
|
protocols. Having a form of interior gateway protocol (IGP)
|
||||||
@@ -185,7 +185,7 @@
|
|||||||
an optional design consideration and more a design warning
|
an optional design consideration and more a design warning
|
||||||
that MTU must be at least large enough to handle normal
|
that MTU must be at least large enough to handle normal
|
||||||
traffic, plus any overhead from an overlay network, and the
|
traffic, plus any overhead from an overlay network, and the
|
||||||
desired layer 3 protocol. Adding externally built tunnels will
|
desired layer-3 protocol. Adding externally built tunnels will
|
||||||
further lessen the MTU packet size making it imperative to pay
|
further lessen the MTU packet size making it imperative to pay
|
||||||
attention to the fully calculated MTU as some systems may be
|
attention to the fully calculated MTU as some systems may be
|
||||||
configured to ignore or drop path MTU discovery
|
configured to ignore or drop path MTU discovery
|
||||||
|
@@ -27,9 +27,9 @@
|
|||||||
<para>Since sessions must remain until closing, the routing and
|
<para>Since sessions must remain until closing, the routing and
|
||||||
switching architecture is designed for high availability.
|
switching architecture is designed for high availability.
|
||||||
Switches are meshed to each hypervisor and to each other, and
|
Switches are meshed to each hypervisor and to each other, and
|
||||||
also provide an MLAG implementation to ensure layer 2
|
also provide an MLAG implementation to ensure layer-2
|
||||||
connectivity does not fail. Routers are configured with VRRP
|
connectivity does not fail. Routers are configured with VRRP
|
||||||
and fully meshed with switches to ensure layer 3 connectivity.
|
and fully meshed with switches to ensure layer-3 connectivity.
|
||||||
Since GRE is used as an overlay network, Networking is installed
|
Since GRE is used as an overlay network, Networking is installed
|
||||||
and configured to use the Open vSwitch agent in GRE tunnel
|
and configured to use the Open vSwitch agent in GRE tunnel
|
||||||
mode. This ensures all devices can reach all other devices and
|
mode. This ensures all devices can reach all other devices and
|
||||||
@@ -94,7 +94,7 @@
|
|||||||
<section xml:id="overlay-networks"><title>Overlay networks</title>
|
<section xml:id="overlay-networks"><title>Overlay networks</title>
|
||||||
<para>OpenStack Networking using the Open vSwitch GRE tunnel mode
|
<para>OpenStack Networking using the Open vSwitch GRE tunnel mode
|
||||||
was included in the design to provide overlay functionality.
|
was included in the design to provide overlay functionality.
|
||||||
In this case, the layer 3 external routers will be in a pair
|
In this case, the layer-3 external routers will be in a pair
|
||||||
with VRRP and switches should be paired with an implementation
|
with VRRP and switches should be paired with an implementation
|
||||||
of MLAG running to ensure that there is no loss of
|
of MLAG running to ensure that there is no loss of
|
||||||
connectivity with the upstream routing infrastructure.</para></section>
|
connectivity with the upstream routing infrastructure.</para></section>
|
||||||
|
@@ -7,32 +7,32 @@
|
|||||||
<?dbhtml stop-chunking?>
|
<?dbhtml stop-chunking?>
|
||||||
<title>Technical considerations</title>
|
<title>Technical considerations</title>
|
||||||
<para>Designing an OpenStack network architecture involves a
|
<para>Designing an OpenStack network architecture involves a
|
||||||
combination of layer 2 and layer 3 considerations. Layer 2
|
combination of layer-2 and layer-3 considerations. Layer-2
|
||||||
decisions involve those made at the data-link layer, such as
|
decisions involve those made at the data-link layer, such as
|
||||||
the decision to use Ethernet versus Token Ring. Layer 3
|
the decision to use Ethernet versus Token Ring. Layer 3
|
||||||
involve those made about the protocol layer and the point at
|
involve those made about the protocol layer and the point at
|
||||||
which IP comes into the picture. As an example, a completely
|
which IP comes into the picture. As an example, a completely
|
||||||
internal OpenStack network can exist at layer 2 and ignore
|
internal OpenStack network can exist at layer 2 and ignore
|
||||||
layer 3 however, in order for any traffic to go outside of
|
layer 3 however, in order for any traffic to go outside of
|
||||||
that cloud, to another network, or to the Internet, a layer 3
|
that cloud, to another network, or to the Internet, a layer-3
|
||||||
router or switch must be involved.</para>
|
router or switch must be involved.</para>
|
||||||
<para>The past few years have seen two competing trends in
|
<para>The past few years have seen two competing trends in
|
||||||
networking. There has been a trend towards building data
|
networking. There has been a trend towards building data
|
||||||
center network architectures based on layer 2 networking and
|
center network architectures based on layer-2 networking and
|
||||||
simultaneously another network architecture approach is to
|
simultaneously another network architecture approach is to
|
||||||
treat the cloud environment essentially as a miniature version
|
treat the cloud environment essentially as a miniature version
|
||||||
of the Internet. This represents a radically different
|
of the Internet. This represents a radically different
|
||||||
approach to the network architecture from what is currently
|
approach to the network architecture from what is currently
|
||||||
installed in the staging environment because the Internet is
|
installed in the staging environment because the Internet is
|
||||||
based entirely on layer 3 routing rather than layer 2
|
based entirely on layer-3 routing rather than layer-2
|
||||||
switching.</para>
|
switching.</para>
|
||||||
<para>In the data center context, there are advantages of
|
<para>In the data center context, there are advantages of
|
||||||
designing the network on layer 2 protocols rather than layer
|
designing the network on layer-2 protocols rather than layer
|
||||||
3. In spite of the difficulties of using a bridge to perform
|
3. In spite of the difficulties of using a bridge to perform
|
||||||
the network role of a router, many vendors, customers, and
|
the network role of a router, many vendors, customers, and
|
||||||
service providers are attracted to the idea of using Ethernet
|
service providers are attracted to the idea of using Ethernet
|
||||||
in as many parts of their networks as possible. The benefits
|
in as many parts of their networks as possible. The benefits
|
||||||
of selecting a layer 2 design are:</para>
|
of selecting a layer-2 design are:</para>
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Ethernet frames contain all the essentials for
|
<para>Ethernet frames contain all the essentials for
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Ethernet frames can carry any kind of packet.
|
<para>Ethernet frames can carry any kind of packet.
|
||||||
Networking at layer 2 is independent of the layer 3
|
Networking at layer 2 is independent of the layer-3
|
||||||
protocol.</para>
|
protocol.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
@@ -68,11 +68,11 @@
|
|||||||
of the benefits of Ethernet can be realized on the network.
|
of the benefits of Ethernet can be realized on the network.
|
||||||
Though it is not a substitute for IP networking, networking at
|
Though it is not a substitute for IP networking, networking at
|
||||||
layer 2 can be a powerful adjunct to IP networking.</para>
|
layer 2 can be a powerful adjunct to IP networking.</para>
|
||||||
<para>The basic reasoning behind using layer 2 Ethernet over layer
|
<para>The basic reasoning behind using layer-2 Ethernet over layer-3
|
||||||
3 IP networks is the speed, the reduced overhead of the IP
|
IP networks is the speed, the reduced overhead of the IP
|
||||||
hierarchy, and the lack of requirement to keep track of IP
|
hierarchy, and the lack of requirement to keep track of IP
|
||||||
address configuration as systems are moved around. Whereas the
|
address configuration as systems are moved around. Whereas the
|
||||||
simplicity of layer 2 protocols might work well in a data
|
simplicity of layer-2 protocols might work well in a data
|
||||||
center with hundreds of physical machines, cloud data centers
|
center with hundreds of physical machines, cloud data centers
|
||||||
have the additional burden of needing to keep track of all
|
have the additional burden of needing to keep track of all
|
||||||
virtual machine addresses and networks. In these data centers,
|
virtual machine addresses and networks. In these data centers,
|
||||||
@@ -93,9 +93,9 @@
|
|||||||
addresses as well as MAC addresses.</para>
|
addresses as well as MAC addresses.</para>
|
||||||
</important>
|
</important>
|
||||||
<section xml:id="layer-2-arch-limitations">
|
<section xml:id="layer-2-arch-limitations">
|
||||||
<title>Layer 2 architecture limitations</title>
|
<title>Layer-2 architecture limitations</title>
|
||||||
<para>Outside of the traditional data center the limitations of
|
<para>Outside of the traditional data center the limitations of
|
||||||
layer 2 network architectures become more obvious.</para>
|
layer-2 network architectures become more obvious.</para>
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Number of VLANs is limited to 4096.</para>
|
<para>Number of VLANs is limited to 4096.</para>
|
||||||
@@ -105,7 +105,7 @@
|
|||||||
limited.</para>
|
limited.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The need to maintain a set of layer 4 devices to
|
<para>The need to maintain a set of layer-4 devices to
|
||||||
handle traffic control must be accommodated.</para>
|
handle traffic control must be accommodated.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
@@ -121,7 +121,7 @@
|
|||||||
<para>
|
<para>
|
||||||
Configuring <glossterm
|
Configuring <glossterm
|
||||||
baseform="Address Resolution Protocol (ARP)">ARP</glossterm>
|
baseform="Address Resolution Protocol (ARP)">ARP</glossterm>
|
||||||
is considered complicated on large layer 2 networks.</para>
|
is considered complicated on large layer-2 networks.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>All network devices need to be aware of all MACs,
|
<para>All network devices need to be aware of all MACs,
|
||||||
@@ -141,8 +141,8 @@
|
|||||||
or shape the traffic, and network troubleshooting is very
|
or shape the traffic, and network troubleshooting is very
|
||||||
difficult. One reason for this difficulty is network devices
|
difficult. One reason for this difficulty is network devices
|
||||||
have no IP addresses. As a result, there is no reasonable way
|
have no IP addresses. As a result, there is no reasonable way
|
||||||
to check network delay in a layer 2 network.</para>
|
to check network delay in a layer-2 network.</para>
|
||||||
<para>On large layer 2 networks, configuring ARP learning can also
|
<para>On large layer-2 networks, configuring ARP learning can also
|
||||||
be complicated. The setting for the MAC address timer on
|
be complicated. The setting for the MAC address timer on
|
||||||
switches is critical and, if set incorrectly, can cause
|
switches is critical and, if set incorrectly, can cause
|
||||||
significant performance problems. As an example, the Cisco
|
significant performance problems. As an example, the Cisco
|
||||||
@@ -151,22 +151,22 @@
|
|||||||
be a significant problem. In this case, the network
|
be a significant problem. In this case, the network
|
||||||
information maintained in the switches could be out of sync
|
information maintained in the switches could be out of sync
|
||||||
with the new location of the instance.</para>
|
with the new location of the instance.</para>
|
||||||
<para>In a layer 2 network, all devices are aware of all MACs,
|
<para>In a layer-2 network, all devices are aware of all MACs,
|
||||||
even those that belong to instances. The network state
|
even those that belong to instances. The network state
|
||||||
information in the backbone changes whenever an instance is
|
information in the backbone changes whenever an instance is
|
||||||
started or stopped. As a result there is far too much churn in
|
started or stopped. As a result there is far too much churn in
|
||||||
the MAC tables on the backbone switches.</para></section>
|
the MAC tables on the backbone switches.</para></section>
|
||||||
<section xml:id="layer-3-arch-advantages">
|
<section xml:id="layer-3-arch-advantages">
|
||||||
<title>Layer 3 architecture advantages</title>
|
<title>Layer-3 architecture advantages</title>
|
||||||
<para>In the layer 3 case, there is no churn in the routing tables
|
<para>In the layer 3 case, there is no churn in the routing tables
|
||||||
due to instances starting and stopping. The only time there
|
due to instances starting and stopping. The only time there
|
||||||
would be a routing state change would be in the case of a Top
|
would be a routing state change would be in the case of a Top
|
||||||
of Rack (ToR) switch failure or a link failure in the backbone
|
of Rack (ToR) switch failure or a link failure in the backbone
|
||||||
itself. Other advantages of using a layer 3 architecture
|
itself. Other advantages of using a layer-3 architecture
|
||||||
include:</para>
|
include:</para>
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Layer 3 networks provide the same level of
|
<para>Layer-3 networks provide the same level of
|
||||||
resiliency and scalability as the Internet.</para>
|
resiliency and scalability as the Internet.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
@@ -191,14 +191,14 @@
|
|||||||
example ICMP, to monitor and manage traffic.</para>
|
example ICMP, to monitor and manage traffic.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Layer 3 architectures allow for the use of Quality
|
<para>Layer-3 architectures allow for the use of Quality
|
||||||
of Service (QoS) to manage network performance.</para>
|
of Service (QoS) to manage network performance.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
<section xml:id="layer-3-arch-limitations">
|
<section xml:id="layer-3-arch-limitations">
|
||||||
<title>Layer 3 architecture limitations</title>
|
<title>Layer-3 architecture limitations</title>
|
||||||
<para>The main limitation of layer 3 is that there is no built-in
|
<para>The main limitation of layer 3 is that there is no built-in
|
||||||
isolation mechanism comparable to the VLANs in layer 2
|
isolation mechanism comparable to the VLANs in layer-2
|
||||||
networks. Furthermore, the hierarchical nature of IP addresses
|
networks. Furthermore, the hierarchical nature of IP addresses
|
||||||
means that an instance will also be on the same subnet as its
|
means that an instance will also be on the same subnet as its
|
||||||
physical host. This means that it cannot be migrated outside
|
physical host. This means that it cannot be migrated outside
|
||||||
@@ -270,7 +270,7 @@
|
|||||||
recommendations can be made:</para>
|
recommendations can be made:</para>
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Layer 3 designs are preferred over layer 2
|
<para>Layer-3 designs are preferred over layer-2
|
||||||
architectures.</para>
|
architectures.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
@@ -298,7 +298,7 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Use iBGP to flatten the internal traffic on the
|
<para>Use iBGP to flatten the internal traffic on the
|
||||||
layer 3 mesh.</para>
|
layer-3 mesh.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Determine the most effective configuration for block
|
<para>Determine the most effective configuration for block
|
||||||
@@ -430,18 +430,18 @@
|
|||||||
ways. The legacy networking (nova-network) provides a flat DHCP network
|
ways. The legacy networking (nova-network) provides a flat DHCP network
|
||||||
with a single broadcast domain. This implementation does not
|
with a single broadcast domain. This implementation does not
|
||||||
support tenant isolation networks or advanced plug-ins, but it
|
support tenant isolation networks or advanced plug-ins, but it
|
||||||
is currently the only way to implement a distributed layer 3
|
is currently the only way to implement a distributed layer-3
|
||||||
agent using the multi_host configuration.
|
agent using the multi_host configuration.
|
||||||
OpenStack Networking (neutron) is the official networking implementation
|
OpenStack Networking (neutron) is the official networking implementation
|
||||||
and provides a pluggable architecture that supports a large
|
and provides a pluggable architecture that supports a large
|
||||||
variety of network methods. Some of these include a layer 2
|
variety of network methods. Some of these include a layer-2
|
||||||
only provider network model, external device plug-ins, or even
|
only provider network model, external device plug-ins, or even
|
||||||
OpenFlow controllers.</para>
|
OpenFlow controllers.</para>
|
||||||
<para>Networking at large scales becomes a set of boundary
|
<para>Networking at large scales becomes a set of boundary
|
||||||
questions. The determination of how large a layer 2 domain
|
questions. The determination of how large a layer-2 domain
|
||||||
needs to be is based on the amount of nodes within the domain
|
needs to be is based on the amount of nodes within the domain
|
||||||
and the amount of broadcast traffic that passes between
|
and the amount of broadcast traffic that passes between
|
||||||
instances. Breaking layer 2 boundaries may require the
|
instances. Breaking layer-2 boundaries may require the
|
||||||
implementation of overlay networks and tunnels. This decision
|
implementation of overlay networks and tunnels. This decision
|
||||||
is a balancing act between the need for a smaller overhead or
|
is a balancing act between the need for a smaller overhead or
|
||||||
a need for a smaller domain.</para>
|
a need for a smaller domain.</para>
|
||||||
|
@@ -17,22 +17,22 @@
|
|||||||
required resources alters the design of an OpenStack
|
required resources alters the design of an OpenStack
|
||||||
installation. Installations that rely on overlay networks are
|
installation. Installations that rely on overlay networks are
|
||||||
unable to support a routing participant, and may also block
|
unable to support a routing participant, and may also block
|
||||||
layer 2 listeners.</para>
|
layer-2 listeners.</para>
|
||||||
</section>
|
</section>
|
||||||
<section xml:id="possible-solutions-specialized-networking">
|
<section xml:id="possible-solutions-specialized-networking">
|
||||||
<title>Possible solutions</title>
|
<title>Possible solutions</title>
|
||||||
<para>Deploying an OpenStack installation using OpenStack Networking with a
|
<para>Deploying an OpenStack installation using OpenStack Networking with a
|
||||||
provider network will allow direct layer 2 connectivity to an
|
provider network will allow direct layer-2 connectivity to an
|
||||||
upstream networking device. This design provides the layer 2
|
upstream networking device. This design provides the layer-2
|
||||||
connectivity required to communicate via Intermediate
|
connectivity required to communicate via Intermediate
|
||||||
System-to-Intermediate System (ISIS) protocol or to pass
|
System-to-Intermediate System (ISIS) protocol or to pass
|
||||||
packets controlled via an OpenFlow controller. Using the
|
packets controlled via an OpenFlow controller. Using the
|
||||||
multiple layer 2 plug-in with an agent such as
|
multiple layer-2 plug-in with an agent such as
|
||||||
<glossterm>Open vSwitch</glossterm>
|
<glossterm>Open vSwitch</glossterm>
|
||||||
would allow a private connection through a VLAN directly to a
|
would allow a private connection through a VLAN directly to a
|
||||||
specific port in a layer 3 device. This would allow a BGP
|
specific port in a layer-3 device. This would allow a BGP
|
||||||
point to point link to exist that will join the autonomous
|
point to point link to exist that will join the autonomous
|
||||||
system. Avoid using layer 3 plug-ins as they will divide the
|
system. Avoid using layer-3 plug-ins as they will divide the
|
||||||
broadcast domain and prevent router adjacencies from
|
broadcast domain and prevent router adjacencies from
|
||||||
forming.</para>
|
forming.</para>
|
||||||
</section>
|
</section>
|
||||||
|
@@ -9,7 +9,7 @@
|
|||||||
<para>Software-defined networking (SDN) is the separation of the data
|
<para>Software-defined networking (SDN) is the separation of the data
|
||||||
plane and control plane. SDN has become a popular method of
|
plane and control plane. SDN has become a popular method of
|
||||||
managing and controlling packet flows within networks. SDN
|
managing and controlling packet flows within networks. SDN
|
||||||
uses overlays or directly controlled layer 2 devices to
|
uses overlays or directly controlled layer-2 devices to
|
||||||
determine flow paths, and as such presents challenges to a
|
determine flow paths, and as such presents challenges to a
|
||||||
cloud environment. Some designers may wish to run their
|
cloud environment. Some designers may wish to run their
|
||||||
controllers within an OpenStack installation. Others may wish
|
controllers within an OpenStack installation. Others may wish
|
||||||
@@ -26,9 +26,9 @@
|
|||||||
</section>
|
</section>
|
||||||
<section xml:id="possible-solutions-sdn">
|
<section xml:id="possible-solutions-sdn">
|
||||||
<title>Possible solutions</title>
|
<title>Possible solutions</title>
|
||||||
<para>If an SDN implementation requires layer 2 access because it
|
<para>If an SDN implementation requires layer-2 access because it
|
||||||
directly manipulates switches, then running an overlay network
|
directly manipulates switches, then running an overlay network
|
||||||
or a layer 3 agent may not be advisable. If the controller
|
or a layer-3 agent may not be advisable. If the controller
|
||||||
resides within an OpenStack installation, it may be necessary
|
resides within an OpenStack installation, it may be necessary
|
||||||
to build an ML2 plug-in and schedule the controller instances
|
to build an ML2 plug-in and schedule the controller instances
|
||||||
to connect to tenant VLANs that then talk directly to the
|
to connect to tenant VLANs that then talk directly to the
|
||||||
|
@@ -592,8 +592,8 @@
|
|||||||
|
|
||||||
<glossdef>
|
<glossdef>
|
||||||
<para>
|
<para>
|
||||||
The protocol by which layer 3 IP addresses are resolved into
|
The protocol by which layer-3 IP addresses are resolved into
|
||||||
layer 2, link local addresses.
|
layer-2 link local addresses.
|
||||||
</para>
|
</para>
|
||||||
</glossdef>
|
</glossdef>
|
||||||
</glossentry>
|
</glossentry>
|
||||||
|
@@ -64,10 +64,10 @@
|
|||||||
your environment.</para>
|
your environment.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The network node runs the Networking plug-in, layer 2 agent,
|
<para>The network node runs the Networking plug-in, layer-2 agent,
|
||||||
and several layer 3 agents that provision and operate tenant
|
and several layer-3 agents that provision and operate tenant
|
||||||
networks. Layer 2 services include provisioning of virtual
|
networks. Layer-2 services include provisioning of virtual
|
||||||
networks and tunnels. Layer 3 services include routing,
|
networks and tunnels. Layer-3 services include routing,
|
||||||
<glossterm baseform="Network Address Translation (NAT)">NAT</glossterm>
|
<glossterm baseform="Network Address Translation (NAT)">NAT</glossterm>
|
||||||
, and <glossterm>DHCP</glossterm>. This node also handles
|
, and <glossterm>DHCP</glossterm>. This node also handles
|
||||||
external (internet) connectivity for tenant virtual machines
|
external (internet) connectivity for tenant virtual machines
|
||||||
@@ -77,7 +77,7 @@
|
|||||||
<para>The compute node runs the hypervisor portion of Compute,
|
<para>The compute node runs the hypervisor portion of Compute,
|
||||||
which operates tenant virtual machines or instances. By default
|
which operates tenant virtual machines or instances. By default
|
||||||
Compute uses KVM as the hypervisor. The compute node also runs
|
Compute uses KVM as the hypervisor. The compute node also runs
|
||||||
the Networking plug-in and layer 2 agent which operate tenant
|
the Networking plug-in and layer-2 agent which operate tenant
|
||||||
networks and implement security groups. You can run more than
|
networks and implement security groups. You can run more than
|
||||||
one compute node.</para>
|
one compute node.</para>
|
||||||
<para>Optionally, the compute node also runs the Telemetry
|
<para>Optionally, the compute node also runs the Telemetry
|
||||||
|
@@ -20,7 +20,7 @@
|
|||||||
|
|
||||||
<section xml:id="sec-overview">
|
<section xml:id="sec-overview">
|
||||||
<title>Overview</title>
|
<title>Overview</title>
|
||||||
<para>provide layer 2/3 connectivity to instances, handle
|
<para>provide layer-2/3 connectivity to instances, handle
|
||||||
physical-virtual network transition, handle metadata, etc</para>
|
physical-virtual network transition, handle metadata, etc</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user