summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2340.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2340.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2340.txt')
-rw-r--r--doc/rfc/rfc2340.txt787
1 files changed, 787 insertions, 0 deletions
diff --git a/doc/rfc/rfc2340.txt b/doc/rfc/rfc2340.txt
new file mode 100644
index 0000000..468ceb3
--- /dev/null
+++ b/doc/rfc/rfc2340.txt
@@ -0,0 +1,787 @@
+
+
+
+
+
+
+Network Working Group B. Jamoussi
+Request for Comments: 2340 D. Jamieson
+Category: Informational D. Williston
+ S. Gabe
+ Nortel (Northern Telecom) Ltd.
+ May 1998
+
+
+ Nortel's Virtual Network Switching (VNS) Overview
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (1998). All Rights Reserved.
+
+Abstract
+
+ This document provides an overview of Virtual Network Switching
+ (VNS).
+
+ VNS is a multi-protocol switching architecture that provides COS-
+ sensitive packet switching, reduces the complexity of operating
+ protocols like PPP and frame relay, provides logical networks and
+ traffic segregation for Virtual Private Networks (VPNs), security and
+ traffic engineering, enables efficient WAN broadcasting and
+ multicasting, and reduces address space requirements. VNS reduces the
+ number of routing hops over the WAN by switching packets based on
+ labels.
+
+ VNS has been proven in production networks for several years.
+
+Table of Contents
+
+ 1 Introduction ............................................ 2
+ 2 What is VNS? ............................................ 3
+ 3 VNS Header ............................................. 5
+ 4 VNS Label Distribution .................................. 7
+ 5 Logical Networks (LNs) .................................... 7
+ 6 VNS Routing ............................................. 8
+ 7 VNS Forwarding .......................................... 9
+ 7.1 Unicast ................................................ 9
+ 7.2 Multicast .............................................. 9
+ 8 Traffic Engineering ..................................... 10
+
+
+
+Jamoussi, et. al. Informational [Page 1]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ 8.1 Equal Cost Multipaths .................................. 10
+ 8.2 Trunk Load Spreading ................................... 10
+ 9 Class of Service ........................................ 11
+ 10 VNS Migration Strategies ................................ 11
+ 11 Summary ................................................. 11
+ 12 Security Considerations ................................. 12
+ 13 Acknowledgments ......................................... 12
+ 14 Authors' Addresses ...................................... 13
+ 15 Full Copyright Statement ................................ 14
+
+1. Introduction
+
+ There are several key problem areas with today's wide area backbone
+ networks that carry LAN traffic: scalability, service
+ differentiation, redundancy, administration, and traffic containment.
+
+ First, scalability is becoming a major concern because of the rapid
+ growth in bandwidth demand and geographical reach. As the size of the
+ WAN network grows traditional point-to-point and NBMA topologies or
+ network models lose their performance.
+
+ Second, the need to provide several Classes of Service (CoS) has
+ never been greater. The days of a single "best effort" service are
+ over and service providers demand ways to differentiate the quality
+ of the service offered to their clients based on several policies.
+
+ Third, the WAN is often carrying mission-critical traffic and loss of
+ service is not acceptable. So far, path redundancy has been addressed
+ inefficiently by requiring additional links or VCs.
+
+ Fourth, network operators demand easy and simplified network
+ administration. Large NBMA topologies require extensive PVC
+ provisioning until SVC deployment becomes more ubiquitous. For
+ Point-to-point models, IP address space may be used inefficiently and
+ non-trivial network schemas are required to contain reserved address
+ space.
+
+ Finally, proper segregation of traffic is becoming a must. This
+ requirement is being addressed today by adding leased lines or VCs
+ used to separate traffic flows based on regions or interest or
+ protocol.
+
+ Nortel's Virtual Network Switching (VNS) is a technology that
+ provides efficient solutions to these challenges.
+
+
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 2]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ Section 2 provides an overview of VNS. The VNS header is specified in
+ Section 3. Section 4 describes the VNS label distribution mechanism.
+ Section 5 defines how a VNS network can be partitioned into Logical
+ Networks (LN). Section 6 outlines VNS routing. Section 7 defines both
+ unicast and multicast forwarding. Section 8 describes the mechanisms
+ used to engineer the traffic. Section 9 defines the COS based
+ switching of VNS. Section 10 provides network migration scenarios
+ using VNS. A summary of VNS is provided in Section 11.
+
+2. What is VNS?
+
+ Virtual Network Switching (VNS) is a CoS-sensitive multi-protocol
+ label switching architecture that reduces or eliminates the number of
+ layer 3 hops over the WAN by switching traffic based on labels.
+
+ VNS makes a network of point to point links appear to be a single
+ LAN (broadcast, multiple access) media. The network used by a
+ particular instance of VNS is called a Logical Network (LN) which is
+ described in more detail in Section 5.
+
+ In reference to the ISO Network Layering Model, the Data Link Layer
+ is expanded to include VNS network layer. To the ISO Network Layer,
+ (e.g., IP), VNS is treated as a Data Link Layer.
+
+ ------------------------
+ | Application |
+ ------------------------
+ | Presentation |
+ ------------------------
+ | Session |
+ ------------------------
+ | Transport |
+ ------------------------ -------------------------
+ | Network (e.g., IP) | / Network VNS |
+ ----------------------------- |
+ | Data Link |--------------------------
+ ----------------------------- |
+ | Physical | \ data link (e.g., ATM) |
+ ------------------------ -------------------------
+
+ Figure 1. ISO Network Layering Model for VNS
+
+ In a VNS Network, three separate nodal functions are defined. An
+ ingress node, an egress node, and a tandem node. The ingress and
+ egress nodes define the boundary between an IP network and the VNS
+ network. Therefore, these nodes run both IP routing and VNS routing.
+ However, tandem nodes need only run VNS routing.
+
+
+
+
+Jamoussi, et. al. Informational [Page 3]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ A LAN packet is encapsulated in a VNS header as it enters the LN. The
+ label in the header is used to switch the packet across the LN. The
+ encapsulation header contains the identifier of the last node (or
+ egress node) that processes the packet as it traverses the LN. It is
+ the first node (or ingress node) that decides to which egress node
+ the packet is sent. All nodes between the ingress and egress nodes
+ (known as tandem nodes) decide independently the best packet
+ forwarding route to the egress node identified in the packet.
+
+ The network layer protocols view VNS as a shared broadcast media,
+ where the speed to reach any node on the media is the same for all
+ nodes. VNS ensures that traffic destined to other nodes is forwarded
+ optimally. This transparent view of the VNS means that all the
+ details of the network (for example, topology and link states) can be
+ hidden from the Upper Layer Protocols (e.g. Layer 3 routing
+ protocols) and their applications. VNS also ensures that changes to
+ topology and link state are hidden.
+
+ The network layer protocol on the ingress node views the network
+ layer protocol on the egress node as its logical and directly
+ connected neighbor. This is significant because the network layer
+ protocols always decide which directly connected neighbor should
+ receive a forwarded packet. The details of the actual topology
+ supporting the connectionless network are managed entirely by the
+ Virtual Network Switching and are hidden from the network layer
+ protocols. To the network layer, VNS simply appears to be another
+ Data Link Layer (or media), even though VNS is a network layer itself
+ running on top of the actual Data Link Layer (for example, ATM
+ trunks).
+
+ For the ingress node to choose the egress node that provides the best
+ path to the packet's final destination, it must have knowledge of the
+ following:
+
+ - the nodes that can be reached in the network
+ - the topology of the network that is using the VNS services for
+ transport across the network (but not necessarily the topology
+ of the full network)
+
+ This knowledge is obtained through the network layer routing
+ mechanisms such as, IP's Open Shortest Path First (OSPF) and Address
+ Resolution Protocol (ARP).
+
+ Once the network layer protocol on the ingress node has decided which
+ neighbor to transmit the packet to, it is the responsibility of VNS
+ forwarding, a part of VNS, to deliver the packet to that node. Once
+ the packet arrives at the egress node, the packet is delivered to the
+ network layer protocol, which then forwards it to its ultimate
+
+
+
+Jamoussi, et. al. Informational [Page 4]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ destination.
+
+ Tandem nodes have no interaction with the network layer protocols.
+ They only require knowledge of the VNS network topology. They make
+ their packet forwarding decision on the egress node identifier and
+ LN identifier carried in the VNS header of the packet.
+
+3. VNS Header
+
+ VNS defines a unicast header shown in Figure 2 and a multicast header
+ shown in Figure 3.
+
+ 3 2 1 0
+ 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | TTL | LNN |x|LS-Key |x|DP | CmnHdr |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Protocol Type | Destination Node Identifier |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | COS |x x x x| Source Node Identifier |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Network Layer Header (e.g. IP) |
+ / /
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Data |
+ / /
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 2. Unicast VNS Header
+
+ The unicast header includes the following fields:
+
+ - Common Header (CmnHdr): The common header identifies the packet to
+ be a VNS encapsulated packet.
+
+ - Discard Priority: Indicates the level of congestion at which the
+ packet should be discarded. The value of this field is assigned on
+ the originating node based on policy information (see Section 9).
+
+ - Load Spreading Key: indicates the stream to which the packet
+ belongs for the purposes of equal cost multipath and trunk load
+ spreading (see Section 8).
+
+ - LNN: The Logical Network Number defines the logical network the
+ packet belongs to. This field in is used in conjunction with the
+ destination node identifier as the VNS switching label (see Section
+ 5).
+
+
+
+
+Jamoussi, et. al. Informational [Page 5]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ - TTL: The Time To Live field is used to detect and discard packets
+ caught in temporary routing loops.
+
+ - Destination Node Identifier: This field contains an ID which
+ uniquely identifies the destination node. This ID is unique to the
+ physical network not just the LN. In conjunction with the LNN, this
+ forms a global VNS switching label.
+
+ - Protocol Type: indicates the type of Network layer protocol being
+ carried in the packet. Examples include IP, IPX, and Bridging. If the
+ packet is a multicast packet then this is indicated in this field.
+
+ - Source Node Identifier: This field contains an ID which uniquely
+ identifies the source node (ingress node).
+
+ - CoS: The Class of Service field is used to provide routing class of
+ service. The COS field also affects the Emission Priority of the
+ packet in the scheduler (see Section 9).
+
+ - Reserved Fields: All the fields marked with "x" are Reserved.
+
+ 3 2 1 0
+ 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | TTL | LNN |x|LS-Key |x|DP | CmnHdr |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | PT = Multicast| Destination Node Identifier |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | COS |x x x x| Source Node Identifier |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Protocol Type |x x x x x x x x| Multicast Group |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Network Layer Header (e.g. IP) |
+ / /
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ / Data /
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 3. Multicast VNS Header
+
+ The multicast header shown in Figure 3, includes all the fields of
+ the unicast header. In addition, the multicast header includes the
+ following fields:
+
+ - Multicast Group: this field is used to identify a sub-group within
+ the logical network that receives the multicast packets.
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 6]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ - Protocol Type: indicates the type of Network layer protocol being
+ carried in the packet. Examples include IP, IPX, and Bridging.
+
+4. VNS Label Distribution
+
+ Label distribution in VNS is based on a distributed serverless
+ topology driven approach. Standard ARP or address gleaning is used to
+ distribute and map network layer addresses to VNS addresses.
+
+ A VNS Label is an 6 byte encoding of the LNN and the node ID. VNS
+ Labels are treated as MAC addresses by the network layer. This means
+ that labels are distributed by the same means network layers use to
+ distribute MAC addresses. Thus, VNS leverages existing L2/L3 mapping
+ techniques and doesn't require a separate Label Distribution
+ Protocol.
+
+5. Logical Networks (LNs)
+
+ A logical network consists of a subset of the nodes in a network
+ together with a subset of the trunking facilities that link those
+ nodes. Logical networks partition the network into subnetworks that
+ serve a subset of the overall topology.
+
+ Each of the logical networks supported on any given node has a
+ separate routing and forwarding table (built by VNS). Therefore,
+ routing decisions are based on the resources available to the logical
+ network, not the entire network.
+
+ Each instance of VNS will discover all the trunks which are connected
+ to neighbors which support a matching LNN. This provides a huge
+ administrative saving, since VNS provisioning is on a per-node basis,
+ not on a per-link basis. VNS provisioning requires only a unique
+ node ID and an LNN. Discovery of which trunks support which LNNs is
+ done at run time, relieving administrative effort, and allowing the
+ LN to dynamically adapt to topology changes.
+
+ Multiple Logical Networks provide the following benefits to the
+ network system:
+
+ - Logical networks allow service providers to service multiple
+ private networks or (Virtual Private Internets) easily over one
+ network.
+
+ - Logical networks can be used to limit the impact of one network
+ layer protocol on the others. This is particularly true for
+ protocols that broadcast or multicast a large percentage of either
+ their control or data packets. This increases the effective
+ bandwidth of the trunks and allows the overall network to scale
+
+
+
+Jamoussi, et. al. Informational [Page 7]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ better.
+
+ - Logical networks allow for the configuration of the network to
+ meet individual community of interest and geographical
+ subnetworking needs.
+
+ - Routing control traffic has significance only in the local
+ subnetwork that is isolated to that subnetwork.
+
+ - Logical networks allow different instances of the same protocol
+ to share trunk facilities.
+
+6. VNS Routing
+
+ VNS routing is a link state routing system which uses many concepts
+ similar to OSPF and PNNI. One of the most significant departures from
+ the others is its ability to calculate shortest path trees for
+ routing unicast traffic and spanning trees for routing multicast
+ traffic within a Logical Network.
+
+ There is only one type of interface that VNS routing supports and
+ this is known as a VNS link. A link is a set of trunks that join two
+ VNS neighbor nodes. Each node in a VNS network maintains information
+ about the state of locally attached links. This information is
+ flooded throughout the network whenever there is a significant change
+ to the link's state or attributes (i.e. up/down, speed change,
+ available bandwidth change).
+
+ Each node stores and forwards the link state information received
+ from all other nodes. This allows each node to have the same view of
+ all of the nodes in the network together with all of their link state
+ information. This data is used to compute both the shortest path to
+ reach each node in the Logical Network and a spanning tree for the
+ Logical Network.
+
+ Logical networks are not bound to a particular trunk or link. They
+ are configured on a node. By default, a link will support a specific
+ logical network if the two nodes which it connects both are
+ configured to support the logical network number. This provides a
+ significant savings in operations over having to configure logical
+ networks on links or trunks.
+
+ When a link first comes into service, a protocol is run which allows
+ the two neighboring nodes to exchange information about the logical
+ networks they support. This allows the two nodes to determine if the
+ links are to be considered as a locally attached link for a logical
+ network.
+
+
+
+
+Jamoussi, et. al. Informational [Page 8]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+7. VNS Forwarding
+
+ VNS supports two types of forwarding: unicasting and multicasting. In
+ the first type, the data packet arrives on the ingress node and
+ unicasting forwards the data packet to a single destination (egress
+ node). In the second type, the data packet arrives on the ingress
+ node and multicasting forwards the data packet to all other nodes in
+ the logical network.
+
+7.1 Unicast
+
+ When a packet first enters the LAN internetwork, the network layer
+ routing protocol determines the next hop of the best route for the
+ packet to reach its final destination. If the best route is through a
+ VNS Logical Network, the network layer routing protocol relies on VNS
+ forwarding to get the packet to the egress node. A VNS packet header
+ containing the node ID (the unique ID assigned to each node) of the
+ egress node is added to the front of the packet and VNS forwarding is
+ invoked to deliver the packet. The network layer routing protocol
+ learns the egress node ID through an Address Resolution Protocol
+ (ARP) for IP and Source Address learning for bridging.
+
+ As the packet traverses the LN, routing decisions are made to
+ determine the next hop in the route to reach the destination node ID
+ specified in the VNS header. A forwarding table is built on each node
+ that assists in making the routing decision.
+
+ Each VNS instance on each node builds and maintains a forwarding
+ table for its LN. Each forwarding table has an entry for every node
+ that is a member of the logical network.
+
+7.2 Multicast
+
+ In addition to the unicast forwarding function, VNS also supports a
+ multicast forwarding service for traffic within an LN at the VNS
+ layer. Multicast packets are delivered to all nodes supporting the
+ logical network to which the multicast packet belongs. The packets
+ are sent along the branches of a spanning tree that is built by each
+ node supporting the logical network and is based on a common root
+ node (so that each node's view of the tree is the same as other
+ nodes). In other words, multicast packets are sent intelligently,
+ consuming a minimum of network bandwidth. If the network topology is
+ stable, each node receives each multicast packet only once.
+
+ Multicast packets received at any node are not acknowledged. They are
+ simply forwarded to the specified network layer interface and sent to
+ any other neighbor nodes on the spanning tree.
+
+
+
+
+Jamoussi, et. al. Informational [Page 9]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+8. Traffic Engineering
+
+ VNS forwarding supports two types of traffic engineering mechanisms:
+ equal cost multipaths and trunk load spreading.
+
+ Equal cost multipaths allows different streams (unique network layer
+ source and destination address pairings) to be load spread between
+ multiple relatively equal cost paths, through the Logical Network to
+ the egress node.
+
+ Trunk load spreading between two neighbors can take place when
+ multiple VNS trunks are defined between neighbors. Again, the load
+ spreading is based on network layer streams.
+
+8.1 Equal Cost Multipaths
+
+ From any point in a logical network, there may be multiple paths to
+ reach a specific egress node. If VNS routing determines that more
+ than one of these paths are of equal cost, VNS packets will be load
+ spread between two of them.
+
+ Equal cost multipath forwarding is supported not only on ingress
+ nodes but on tandem nodes as well. Each packet on an ingress node is
+ tagged with an equal cost multipath key. This key is acted upon at
+ the ingress node and stored in the VNS header to be used on tandem
+ nodes.
+
+ The equal cost multipath key is calculated by running an algorithm
+ over the source and destination network layer addresses. This means
+ that, in a stable network, any given stream will always take the same
+ path through a Logical Network avoiding the problems that misordering
+ would otherwise cause.
+
+8.2 Trunk Load Spreading Between Neighbors
+
+ VNS allows multiple trunks to be configured between neighboring VNS
+ nodes. VNS routing considers the aggregate bandwidth of those trunks
+ to determine the metric between the nodes. Also, VNS load spreads its
+ traffic amongst those trunks.
+
+ As is the case with equal cost multipaths, the trunk load spreading
+ key is calculated on the ingress node from an algorithm run over the
+ source and destination network layer addresses. The key is then
+ stored in the VNS header to be used on all tandem nodes through the
+ Logical Network.
+
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 10]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+9. Class of Service
+
+ At the ingress to a VNS Network, packets are classified according to
+ the Class of Service (Cos) policy settings. The CoS differentiation
+ is achieved through different Emission and Discard priorities. The
+ semantics of the classification is carried in the VNS label (DP and
+ COS Fields described in Section 3) to be used at the ingress node as
+ well as all tandem points in the VNS network to affect queuing and
+ scheduling decisions.
+
+10. VNS Migration Strategies
+
+ VNS supports several upper layer protocols such as IP, IPX, and
+ Bridging. Therefore, it is a multiprotocol label switching
+ architecture. In addition, VNS is not tied to a particular L2
+ technology. It runs on cell (e.g., ATM) trunks, frame trunks, or a
+ mixture of both.
+
+ VNS can be gradually introduced in a network. It can be implemented
+ between switching elements interconnected by point to point links.
+ Each of the switching nodes can run layer 3 routing simultaneously
+ with packet switching. VNS also allows for the interconnection of VNS
+ clouds through an ATM VC.
+
+ Since VNS can run on a mixture of Frame and Cell trunks, it allows
+ for the graceful migration of the frame links to ATM without
+ requiring a complete immediate overhaul.
+
+11. Summary
+
+ VNS addresses scalability problems in several ways:
+
+ 1. By a generally distributed design which doesn't
+ require a Label Distribution Protocol, or servers of any kind.
+ 2. By providing an efficient, distributed multicast mechanism.
+ 3. By allowing administrators to control the size of a
+ Logical Network, limiting traffic to a subset of the physical
+ topology.
+ 4. By reducing layer 3 address space/subnet requirements in the
+ WAN which reduces the routing table size.
+
+ VNS provides redundancy transparent to the network layer protocol by
+ managing the network of trunks independently of the network layer.
+ VNS will automatically discover any topology changes and re-route
+ traffic accordingly.
+
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 11]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+ VNS eases network administration by dynamically keeping track of
+ which trunks are available for each LNN. Network administrators
+ don't have to configure VNS or network layer addresses on a per link
+ basis. Network layer addresses only have to be assigned on a per
+ Logical Network basis. For nodes which will only be tandem VNS
+ nodes, network layer addresses aren't required at all.
+
+ Since VNS traffic is constrained within an LNN, administrators have
+ control of where VNS traffic is allowed to flow.
+
+ Finally, VNS supports switching of several Upper Layer Protocols and
+ supports several media (cell and Frame) or a mixture thereof.
+ Switching in the core of the WAN removes the need for routers and
+ improves the performance due to a reduction in the number of fields
+ that need to processed.
+
+12. Security Considerations
+
+ Logical networks provide a means of restricting traffic flow for
+ security purposes. VNS also relies on the inherent security of the L2
+ media such as an ATM Virtual Circuit.
+
+13. Acknowledgments
+
+ The authors would like to acknowledge the valuable comments of Terry
+ Boland, Pierre Cousineau, Robert Eros, Robert Tomkins, and John
+ Whatman.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 12]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+14. Authors' Addresses
+
+ Bilel Jamoussi
+ Nortel (Northern Telecom), Ltd.
+ PO Box 3511 Station C
+ Ottawa ON K1Y 4H7
+ Canada
+
+ EMail: jamoussi@Nortel.ca
+
+
+ Dwight Jamieson
+ Nortel (Northern Telecom), Ltd.
+ PO Box 3511 Station C
+ Ottawa ON K1Y 4H7
+ Canada
+
+ EMail: djamies@Nortel.ca
+
+
+ Dan Williston
+ Nortel (Northern Telecom), Ltd.
+ PO Box 3511 Station C
+ Ottawa ON K1Y 4H7
+ Canada
+
+ EMail: danwil@Nortel.ca
+
+
+ Stephen Gabe
+ Nortel (Northern Telecom), Ltd.
+ PO Box 3511 Station C
+ Ottawa ON K1Y 4H7
+ Canada
+
+ EMail: spgabe@Nortel.ca
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 13]
+
+RFC 2340 Nortel's Virtual Network Switching (VNS) May 1998
+
+
+15. Full Copyright Statement
+
+ Copyright (C) The Internet Society (1998). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jamoussi, et. al. Informational [Page 14]
+