Network Working GroupB. Sarikaya Internet-Draft Denpel Informatique Intended status: Best Current PracticeL. Dunbar Internet Draft Futurewei Intended status: Informational B. Sarikaya Expires:February 10,Dec 2019Huawei USA B. Khasnabish ZTE (TX) Inc.Denpel Informatique B.Khasnabish Independent T. HerbertQuantoniumIntel S. DikshitCisco SystemsAruba-HPE August9, 201822, 2019 Virtual Machine MobilityProtocolSolutions for L2 and L3 Overlay Networksdraft-ietf-nvo3-vmm-04.txtdraft-ietf-nvo3-vmm-05 Abstract This document describesavirtual machine mobilityprotocolsolutions commonly used in data centers built with overlay-basednetwork virtualization approach.network. This document is intended for describing the solutions and the impact of moving VMs (or applications) from one Rack to another connected by the Overlay networks. For layer 2, it is based on usinga Networkan NVA (Network VirtualizationAuthority (NVA)-NetworkAuthority) - NVE (Network VirtualizationEdge (NVE)Edge) protocol to updateAddressARP (Address ResolutionProtocol (ARP)Protocol) table or neighbor cache entriesat the NVA and the source NVEs tunneling in-flight packets to the destination NVEafterthe virtual machineVM (virtual machine) moves fromsourceOld NVE to thedestinationNew NVE. For Layer 3, it is based on address and connection migration after the move. Status ofThisthis Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. This document may not be modified, and derivative works of it may not be created, except to publish it as an RFC and to translate it into languages other than English. Internet-Drafts are working documents of the Internet Engineering Task Force(IETF).(IETF), its areas, and its working groups. Note that other groups may also distribute working documents asInternet-Drafts. The list of currentInternet-Drafts is at https://datatracker.ietf.org/drafts/current/.Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire on February10, 2019.22, 2009. Copyright Notice Copyright (c)20182019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents(https://trustee.ietf.org/license-info)(http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1.Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2Introduction...................................................3 2. Conventionsand Terminology . . . . . . . . . . . . . . . . . 3used in this document..............................4 3.Requirements . . . . . . . . . . . . . . . . . . . . . . . . 4Requirements...................................................5 4. Overview of theprotocol . . . . . . . . . . . . . . . . . . 4VM Mobility Solutions..........................6 4.1. VM Migration. . . . . . . . . . . . . . . . . . . . . . 5in Layer 2 Network...........................6 4.2. Task Migration. . . . . . . . . . . . . . . . . . . . . 6in Layer-3 Network.........................7 4.2.1. Address and Connection Migration in TaskMigration . 7Migration...8 5. Handling Packets inFlight . . . . . . . . . . . . . . . . . 8Flight.....................................9 6. Moving Local State ofVM . . . . . . . . . . . . . . . . . . 9VM......................................10 7. Handling of Hot, Warm and ColdVirtual Machine Mobility . . . 9VM Mobility....................10 8.Virtual Machine Operation . . . . . . . . . . . . . . . . . . 10 8.1. Virtual Machine Lifecycle Management . . . . . . . . . . 10VM Operation..................................................11 9. SecurityConsiderations . . . . . . . . . . . . . . . . . . . 10Considerations.......................................12 10. IANAConsiderations . . . . . . . . . . . . . . . . . . . . . 11Considerations..........................................12 11.Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11Acknowledgments..............................................12 12. ChangeLog . . . . . . . . . . . . . . . . . . . . . . . . . 11Log...................................................12 13.References . . . . . . . . . . . . . . . . . . . . . . . . . 11References...................................................13 13.1. NormativeReferences . . . . . . . . . . . . . . . . . . 11References....................................13 13.2. Informativereferences . . . . . . . . . . . . . . . . . 12 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12References..................................14 1. IntroductionData center networks are being increasingly used by telecom operators as well as by enterprises. In thisThis documentwe are interested in overlay-based data center networks supporting multitenancy. These networks are organized as one large Layer 2 network geographically distributeddescribes the overlay-based data center networks solutions inseveral buildings. In some cases geographical distribution can span across Layer 2 boundaries. In that case need arisessupporting multitenancy and VM (Virtual Machine) mobility. Many large DCs, especially Cloud DCs, host tasks (or workloads) forconnectivity between Layer 2 boundariesmultiple tenants, which can beachieved by the network virtualization edge (NVE) functioning as Layer 3 gateway routing across bridging domain such as in Warehouse Scale Computers (WSC). Virtualizationmultiple departments of one organization or multiple organizations. There is communication among tasks belonging to one tenant and communications among tasks belonging to different tenants or with external entities. Server Virtualization, which is being used in almost all of today's datacenterscenters, enables manyvirtual machinesVMs to run on a single physical computer or computeserver. Virtual machines (VM) need hypervisor running on the physical computeserverto provide them sharedsharing the processor/memory/storage. Network connectivity among VMs is provided by the network virtualization edge (NVE) [RFC8014].Being ableIt is highly desirable [RFC7364] tomoveallow VMsdynamically,to be moved dynamically (live, hot, orlive migration,cold move) from one server to anotherallowsfor dynamic load balancing or optimized workdistribution and thus it is a highly desirable feature [RFC7364].distribution. There are many challenges and requirements related tomigration, mobility, and interconnection of Virtual Machines (VMs)andVM mobility in large data centers, including dynamic attaching/detaching VMs to/from Virtual NetworkElementsEdges (VNEs). Retaining IP addresses after a move is a key requirement [RFC7364]. Such a requirement is needed in order to maintain existing transport connections. InL3traditional Layer-3 baseddatanetworks, retaining IP addresses after a move issimplygenerally notpossible. Thisrecommended because the frequent move will cause non-aggregated IP addresses (a.k.a. fragmented IP addresses), which introduces complexity in IP addressmanagement and as a result transport connections need to be reestablished.management. In view of manyvirtual machineVM mobility schemes that exist today, there is a desire todefine a standard control plane protocol for virtual machine mobility.document comprehensive VM mobility solutions that cover both IPv4 and IPv6. Theprotocol shouldlarge Data Center networks can bebased on IPv4organized as one large Layer-2 network geographically distributed in several buildings/cities orIPv6. In this document we specify such a protocol forLayer-3 networks with large number of host routes that cannot be aggregated as the result of frequent move from one location to another without changing their IP addresses. The connectivity between Layer 2andboundaries can be achieved by the network virtualization edge (NVE) functioning as Layer 3data networks.gateway routing across bridging domain such as in Warehouse Scale Computers (WSC). 2. Conventionsand Terminologyused in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119] and [RFC8014]. This document uses the terminology defined in [RFC7364]. Inadditionaddition, we make the following definitions:Tasks. Tasks are the generalization ofVM: Virtual Machine Tasks: Task is a program instantiated or running on a virtualmachines.machine or container. Tasks in virtual machines or containersthatcan be migratedcorrespondfrom one server tothe virtual machines that can be migrated.another. We usetasktask, workload and virtual machine interchangeably in this document. Hot VMMobility.Mobility: A given VM could be moved from one server to another in running state. Warm VMMobility.Mobility: In case of warm VM mobility, the VM states are mirrored to the secondary server (or domain) at a predefined (configurable) regular intervals. This reduces the overheads andcomplexitycomplexity, but this may also lead to a situation when both servers may not contain the exact same data (state information) Cold VMMobility.Mobility: A given VM could be moved from one server to another in stopped or suspended state.Source NVEOld NVE: refers to the old NVE where packets were forwarded to before migration.Destination NVENew NVE: refers to the new NVE after migration. Packets inflightflight: refers to the packets received by thesourceOld NVE sent by the correspondents that have old ARP or neighbor cache entry before VM or task migration. Users of VMs in diskless systems or systems not using configuration files are called end user clients. Cloud DC: Third party data centers that host applications, tasks or workloads owned by different organizations or tenants. 3. Requirements This section states requirements on data center network virtual machine mobility. Data center networkSHOULDshould supportvirtual machine mobility in IPv6.both IPv4SHOULD also be supported in virtual machineand IPv6 VM mobility. Virtual machine mobilityprotocol MAY support host routesshould not require changing their IP addresses after the move. There is "Hot Migration" with transport service continuing, and there is a "Cold Migration" with transport service restarted, i.e. stop the task running on the Old NVE and move toaccomplish virtualization. Virtual machinethe New NVE before restart as described in the Task Migration. VM mobilityprotocol SHOULD not supportsolutions/procedures should minimize triangular routing except for handling packets in flight.Virtual machineVM mobilityprotocol SHOULDsolutions/procedures should not need to use tunneling except for handling packets in flight. 4. Overview of theprotocolVM Mobility Solutions Layer 2 and Layer 3protocolsmobility solutions are describednext. Inrespectively in the followingsections, we examine more advanced features.sections. 4.1. VM Migration in Layer 2 Network Being able to moveVirtual MachinesVMs dynamically, from one server toanother allowsanother, makes it possible for dynamic load balancing or workdistribution and thusdistribution. Therefore, it isahighly desirablefeature.for large scale multi-tenants data centers. In a Layer-2 baseddata centerapproach,virtual machineVM moving to another server does not change its IPaddress. Because of this an IP based virtual machine mobility protocol is not needed. However, when a virtual machine moves, NVEs need to change their caches associating VM Layer 2 or Medium Access Control (MAC) address with NVE's IP address. Such a change enables NVE to send outgoing MAC frames addressed to the virtual machine. VM movement across Layer 3 boundaries is not typical but the same solution applies if the VM moves in the same link such as in WSCs. Virtual machine moves from its source NVE to a new, destination NVE. After the move the virtual machine IP address(es) do not changeaddress, but thisvirtual machineVM is now under a new NVE, previously communicating NVEs will continue to send their packets to thesourceOld NVE. To solve this problem, Address Resolution Protocol (ARP) cache in IPv4 [RFC0826] or neighbor cache in IPv6 [RFC4861] in the NVEsneedneed to be updated. NVEs need to change their caches associating the VM Layer-2 or Medium Access Control (MAC) address with the NVE's IP address. Such a change enables NVEs tobe updated.encapsulate the outgoing MAC frames with the current target NVE address. It may take some time to refresh ARP/ND cache when a VM is moved to anew destinationNew NVE. During this period, a tunnel is needed so thatsourceOld NVE can forwards packets destined to thedestinationVM to the New NVE. In IPv4, thevirtual machineVM immediately after the move should send a gratuitous ARP request message containing its IPv4 and Layer 2orMAC address in its newNVE, destinationNVE. This message's destination address is the broadcast address.SourceOld NVE receives this message.source NVEBoth Old and New NVEs should update VM's ARP entry in the central directory at theNVA. Source NVE asks NVANVA, to update its mappings to record the IPv4 address & MAC address of the moving VM along withMAC address of VM, andthe new NVE IPv4 address. An NVE-to-NVA protocol is used for this purpose [RFC8014]. Reverse ARP (RARP) which enables the host to discover its IPv4 address when it boots from a local server[RFC0903][RFC0903], is not used by VMs because the VM already knows its IPv4 address.IPv4/v6 address is assigned to a newly created VM, possibly using Dynamic Host Configuration Protocol (DHCP).Next, we describe a case where RARP is used. There are some vendor deployments (diskless systems or systems without configuration files) wherein VM users, i.e. end-user clients ask for the same MAC address upon migration. This can be achieved by the clients sending RARP requestreversemessage which carries the old MAC address looking for an IP address allocation. The server, in this case the new NVE needs to communicate with NVA, just like in the gratuitous ARP case to ensure that the same IPv4 address is assigned to the VM. NVA uses the MAC address as the key in the search of ARP cache to find the IP address and informs this to the new NVE which in turn sends RARP replyreversemessage. This completes IP address assignment to the migrating VM.AllOther NVEs communicating with thisvirtual machine usesVM could have the old ARP entry. If anyVMVMs in those NVEs need totalk tocommunicate with thenewVMinattached to thedestinationNew NVE,it uses theold ARPentry. Thusentries might be used. Thus, the packets are delivered to thesourceOld NVE. ThesourceOld NVE MUST tunnel thesein- flightin-flight packets to thedestinationNew NVE. When an ARP entryinfor those VMs times out, their corresponding NVEs should access the NVA for an update. IPv6 operation is slightly different: In IPv6,the virtual machine immediatelyafter themovemove, the VM immediately sends an unsolicited neighbor advertisement message containing its IPv6 address and Layer-2 MAC addressinto its newNVE, the destinationNVE. This message is sent to the IPv6 Solicited Node Multicast Address corresponding to the target address which is the VM's IPv6 address. The NVEreceivesreceiving thismessage. NVEmessage should send request to update VM's neighbor cache entry in the central directory of the NVA. The NVA's neighbor cache entry should include IPv6 address of the VM, MAC address of the VM and the NVE IPv6address are recorded in the entry.address. An NVE-to-NVA protocol is used for this purpose [RFC8014].AllOther NVEs communicating with thisvirtual machine usesVM might still use the old neighbor cache entry. If any VM in those NVEs need totalk tocommunicate with thenewVMinattached to thedestinationNew NVE, itusescould use the old neighbor cache entry.ThusThus, the packets are delivered to thesourceOld NVE. ThesourceOld NVE MUST tunnel these in-flight packets to thedestinationNew NVE. When a neighbor cache entry in those VMs times out, their corresponding NVEs should access the NVA for an update. 4.2. Task MigrationVirtualizationinL2Layer-3 Network Layer-2 based data center networksbecomesbecome quickly prohibitive because ARP/neighbor caches don't scale. Scaling can be accomplished seamlesslyin L3Layer-3 data center networks by just giving each virtual network an IP subnet and a default route that points to NVE. This means no explosion of ARP/ neighbor cache in VMs and NVEs (just one ARP/ neighbor cache entry for default route) and there is no need to have Ethernet header in encapsulation [RFC7348] which saves at least 16 bytes.In L3Even though the term VM and Task are used interchangeably in this document, the term Task is used in the context of Layer-3 migration mainly to have slight emphasis on the moving an entity (Task) that is instantiated on a VM or a container. Traditional Layer-3 based data centernetworks, sincenetworks require IP address of the taskhasto change aftermove,moving because the prefixes of the IP address usually reflect the locations. It is necessary to have an IP basedtaskVM migrationprotocol is needed. The protocol mostly used issolution that can allow IP addresses staying theidentifier locator addressingsame after moving to different locations. The Identifier Locator Addressing or ILA[I-D.herbert-nvo3-ila]. Address and connection migration introduce complications in task migration protocol as we discuss below. Especially informing the communicating hosts[I-D.herbert-nvo3-ila] is one ofthe migration becomes a major issue. Also, in L3 based networks, becausesuch solutions. Because broadcasting is notavailable,available in Layer-3 based networks, multicast of neighbor solicitations in IPv6 would need to be emulated.Task migrationCold task migration, which is a common practice in many data centers, involves the following steps: - Stop running the task. - Package the runtime state of the job. - Send the runtime state of the task to thedestinationNew NVE where the task is to run. - Instantiate the task's state on the new machine. - Start the tasks for the task continuing from the point at which it was stopped. Address migration and connection migration in moving tasks or VMs are addressed next. 4.2.1. Address and Connection Migration in Task Migration Address migration is achieved as follows: - Configure IPv4/v6 address on the targethost.Task. - Suspend use of the address on the oldhost.Task. This includes handling established connections. A state may be established to drop packets or send ICMPv4 or ICMPv6 destination unreachable message when packets to the migrated address are received. - Push the new mapping tohosts.VM. CommunicatinghostsVMs will learn of the new mapping via a control plane either by participation in a protocol for mapping propagation or by getting the new mapping from a central database such as Domain Name System (DNS). Connection migration involves reestablishing existing TCP connections of the task in the new place. The simplest course of action is to drop TCP connections across a migration.SinceIt the migrationsshould beare relatively rare events, it is conceivable that TCP connections could be automatically closed in the network stack during a migration event. If the applications running are known to handle this gracefully (i.e. reopen dropped connections) then this may be viable. More involved approach to connection migration entails pausing the connection, packaging connection state and sending to target, instantiating connection state in the peer stack, and restarting the connection. From the time the connection is paused to the time it is running again in the new stack, packets received for the connectionshouldcould be silently dropped. For some period of time, the old stack will need to keep a record of the migrated connection. If it receives a packet, itshouldcan either silently drop the packet or forward it to the new location, similarly as in Section 5. 5. Handling Packets in FlightSource hypervisorThe Old NVE may receive packets from thevirtual machine'sVM's ongoing communications and these packets should not belostlost, and they should be sent to thedestination hypervisorNew NVE to be delivered to thevirtual machine.VM. The steps involved in handling packets in flight are as follows: PreparationStepStep: It takes some time, possibly a few seconds for a VM to move from itssource hypervisorOld NVE to anew destination one.New NVE. During this period, a tunnel needs to be established so that thesourceOld NVEforwardscan forward packets to thedestinationNew NVE. Old NVE gets New NVE address from NVA in the request to move the VM. The Old NVE can store the New NVE address for the VM with a timer. When the timer expired, the entry for the New NVE for the VM can be deleted. Tunnel Establishment -IPv6IPv6: Inflight packets are tunneled to thedestinationNew NVE using the encapsulation protocol such as VXLAN in IPv6.Source NVE gets destination NVE address from NVA in the request to move the virtual machine.Tunnel Establishment -IPv4IPv4: Inflight packets are tunneled to thedestinationNew NVE using the encapsulation protocol such as VXLAN in IPv4.Source NVE gets destination NVE address from NVA when NVA requests NVE to move the virtual machine.Tunneling Packets -IPv6IPv6: IPv6 packetsarereceived for the migratingvirtual machineVM are encapsulated in an IPv6 header at thesourceOld NVE.DestinationNew NVE decapsulates the packet and sends IPv6 packet to the migrating VM. Tunneling Packets -IPv4IPv4: IPv4 packetsarereceived for the migratingvirtual machineVM are encapsulated in an IPv4 header at thesourceOld NVE.DestinationNew NVE decapsulates the packet and sends IPv4 packet to the migrating VM. Stop TunnelingPacketsPackets: WhensourceOld NVE stops receiving packets destined to thevirtual machineVM that has just moved to thedestinationNew NVE. The Timer for storing the New NVE address for the VM should be long enough for all other NVEs that need to communicate with the VM to get their NVE-VM cache entries updated. 6. Moving Local State of VMAfterIn addition to the VM mobility related signaling (VM Mobility Registration Request/Reply), thevirtual machineVM state needs to be transferred to thedestination Hypervisor.New NVE. The state includes its memory and filesystem. Sourcesystem if the VM cannot access the memory and the file system after moved to the New NVE. Old NVE opens a TCP connection withdestinationNew NVE over which VM's memory state is transferred. File system or local storage is more complicated to transfer. The transfer should ensure consistency, i.e. the VM at thedestinationNew NVE should find the same file system it had at thesource. PrecopyingOld NVE. Pre- copying is a commonly used technique for transferring the file system. First the whole disk image is transferred while VM continues to run. After the VM is moved any changes in the file system are packaged together and sent to thedestinationNew NVE Hypervisor which reflects these changes to the file system locally at the destination. 7. Handling of Hot, Warm and ColdVirtual MachineVM Mobility Both ColdVirtual Machineand Warm VM mobilityis facilitated by(or migration) refers to the VMinitially sendingbeing completely shut down at the Old NVE before restarted at the New NVE. Therefore, all transport services to the VM are restarted. Upon starting at the New NVE, the VM should send an ARP or Neighbor Discoverymessage at the destination NVE but the source NVE not receiving any packets inflight.message. Cold VM mobility also allowsall previous source NVEsthe Old NVE and all communicating NVEs to time out ARP/neighbor cache entries of theVM and then getVM. It is necessary for the NVA to push the updated ARP/neighbor cache entry to NVEs orgetfor NVEs to pull the updated ARP/neighbor cache entry from NVA. TheVMs that are used forCold VM mobility can be facilitated by cold standbyreceiveentity receiving scheduled backupinformation but less frequently than that would be for warminformation. The cold standbyoption. Therefore,entity can be a VM or can be other form factors which is beyond the scope of this document. The cold mobility option can be used for non- critical applications andservices. In cases of warm standby option,services that can tolerate interrupted TCP connections. The Warm VM mobility refers the backupVMsentities receive backup information atregularmore frequent intervals. The duration of the interval determines the warmth of thestandbyoption. The larger the duration, the less warm (and hence cold) thestandbyWarm VM mobility option becomes.In case of hot standby option,There is also a Hot Standby option in addition to the Hot Mobility, where there are VMs in both primary and secondarydomains haveNVEs and they identical information and can provide services simultaneously as in load-share mode of operation. If the VMs in the primarydomainNVE fails, there is no need to actively move the VMs to the secondarydomainNVE because the VMs in the secondarydomainNVE already contain identical information. The hot standby option is the most costlymechanism for providing redundancy,mechanism, and hence this option is utilized only for mission-critical applications and services. In hot standby option, regarding TCP connections, one option is to start with and maintain TCP connections to two different VMs at the same time. The least loaded VM responds first and pickup providing service while the sender (origin) still continues to receive Ack from the heavily loaded (secondary) VM and chooses not use the service of the secondary responding VM. If the situation (loading condition of the primary responding VM) changes the secondary responding VM may start providing service to the sender (origin). 8.Virtual MachineVM OperationVirtual machines are not involved in any mobility signalling.Once VM moves tothe destinationa New NVE, VM IP address does not change and VM should be able to continue to receive packets to its address(es).This happens in hotVMmobility scenarios. Virtual machine sendsneeds to send a gratuitous Address ResolutionProtocolmessage or unsolicited Neighbor Advertisement message upstream after each move.8.1. Virtual Machine Lifecycle Management Managing the lifecycle ofThe VMincludes creatinglifecycle management is aVM with all ofcomplicated task, which is beyond therequired resources, and managing themscope of this document. Not only it involves monitoring server utilization, balanced distribution of workload, etc., but also needs to manage seamlesslyas theVMmigratesmigration from oneservice to another during its lifetime. The on-boarding process includes the following steps: 1. Sending an allowed (authorized/authenticated) request to Network Virtualization Authority (NVA) in an acceptable format with mandatory/optional virtualized resources {cpu, memory, storage, process/thread support, etc.} and interface information 2. Receiving an acknowledgement from the NVA regarding availability and usability of virtualized resources and interface package 3. Sending a confirmation message to the NVA with request for approvalserver toadapt/adjust/modify the virtualized resources and interface package for utilization in a service.another. 9. Security Considerations Security threats for the data and control plane for overlay networks are discussed in [RFC8014]. There are several issues in a multi-tenant environment that create problems. InL2Layer-2 based overlay data center networks, lack of security in VXLAN, corruption of VNI can lead to delivery to wrong tenant. Also, ARP in IPv4 and ND in IPv6 are notsecuresecure, especially if we accept gratuitous versions. When these are done over a UDP encapsulation, like VXLAN, the problem is worse since it is trivial for anon trusted applicationnon-trusted entity to spoof UDP packets. InL3Layer-3 based overlay data center networks, the problem of address spoofing may arise.As a result the destinationsAn NVE maycontainhave untrustedhosts.tasks attached. This usually happens in cases like thevirtual machinesVMs (tasks) running thirdpartparty applications. This requires the usage of stronger security mechanisms. 10. IANA Considerations This document makes no request to IANA. 11.AcknowledgementsAcknowledgments The authors are grateful to Bob Briscoe, David Black, Dave R. Worley, Qiang Zu, Andrew Malis for helpful comments. 12. Change Logo. submitted version -00 as a working group draft after adoptiono. submitted version -01 with these changes: references are updated, o added packets in flight definition to Section 2o. submitted version -02 with updated address.o. submitted version -03 to fix the nits.o. submitted version -04 in reference to the WG Last call comments. . Submitted version - 05 to address IETF LC comments from TSV area. 13. References 13.1. Normative References [RFC0826] Plummer, D., "An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware", STD 37, RFC 826, DOI 10.17487/RFC0826, November 1982, <https://www.rfc-editor.org/info/rfc826>. [RFC0903] Finlayson, R., Mann, T., Mogul, J., and M. Theimer, "A Reverse Address Resolution Protocol", STD 38, RFC 903, DOI 10.17487/RFC0903, June 1984,<https://www.rfc-editor.org/info/rfc903>.<https://www.rfc- editor.org/info/rfc903>. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119,DOI 10.17487/RFC2119,March1997, <https://www.rfc-editor.org/info/rfc2119>.1997. [RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629, DOI 10.17487/RFC2629, June 1999,<https://www.rfc-editor.org/info/rfc2629>.<https://www.rfc- editor.org/info/rfc2629>. [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, DOI 10.17487/RFC4861, September 2007,<https://www.rfc-editor.org/info/rfc4861>.<https://www.rfc- editor.org/info/rfc4861>. [RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, L., Sridhar, T., Bursell, M., and C. Wright, "Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, <https://www.rfc-editor.org/info/rfc7348>. [RFC7364] Narten, T., Ed., Gray, E., Ed., Black, D., Fang, L., Kreeger, L., and M. Napierala, "Problem Statement: Overlays for Network Virtualization", RFC 7364, DOI 10.17487/RFC7364, October 2014,<https://www.rfc-editor.org/info/rfc7364>.<https://www.rfc- editor.org/info/rfc7364>. [RFC8014] Black, D., Hudson, J., Kreeger, L., Lasserre, M., and T. Narten, "An Architecture for Data-Center Network Virtualization over Layer 3 (NVO3)", RFC 8014, DOI 10.17487/RFC8014, December 2016,<https://www.rfc-editor.org/info/rfc8014>.<https://www.rfc- editor.org/info/rfc8014>. 13.2. InformativereferencesReferences [I-D.herbert-nvo3-ila] Herbert, T. and P. Lapukhov,"Identifier-locator"Identifier- locator addressing for IPv6", draft-herbert-nvo3-ila-04 (work in progress), March 2017. Authors' Addresses Linda Dunbar Futurewei Email: ldunbar@futurewei.com Behcet Sarikaya Denpel Informatique Email: sarikaya@ieee.orgLinda Dunbar Huawei USA 5340 Legacy Dr. Building 3 Plano, TX 75024 Email: linda.dunbar@huawei.comBhumip KhasnabishZTE (TX) Inc.Independent 55 Madison Avenue, Suite 160 Morristown, NJ 07960 Email:vumip1@gmail.com, bhumip.khasnabish@ztetx.comvumip1@gmail.com Tom HerbertQuantoniumIntel Email: tom@herbertland.com Saumya DikshitCisco Systems Cessna Business ParkAruba-HPE Bangalore,Karnataka,India560 087Email:sadikshi@cisco.comsaumya.dikshit@hpe.com