Hi, All
Maybe some of you know
several projects in ODL have
implemented their own openflow writers
for programming openflow rules, the
end part of the mail are some info I
collected. My question is how they
work together if we install all of
them? Every writer will create table
0, can it work normally? How can we
fix it if not? The most important
issue is they are duplicating efforts,
what if we can provide a good middle
layer in openflowplugin or in a
separate project in order that all the
operations are synchronized and
coordinated? I kick off this
discussion here is to let all the
developers discuss it in open mind.
I think we can
consolidate these unnecessary
duplicate efforts into a separate
project or part of openflowplugin, it
is very necessary to provide only one
entry to program openflow tables and
rules, these operations must be
efficiently synchronized and managed
and coordinated, the direct benefits
are as below:
1.
Fix table
conflict
2.
Reduce number
of tables: all the user scenarios have
ingress and egress tables although
they have different names or purposes
3.
Fix multiple
master/writer synchronization
4.
Provide high
level APIs for simplifying use for
consumers
5.
Optimization
will be visible for all the users
(APIs consumers)
6.
Openflowplugin
evolution or update will be invisible
for all the users (API consumers)
7.
You can list
more items here if you can imagine
J
Welcome your great ideas
and look forward to seeing we can bear
fruit.
GBP
====
Table 0: Port Security,
Ingress
Table 1: Ingress NAT
Mapper
Table 2: Source Mapper
Table 3: Destination
Mapper
Table 4: Policy Enforcer
Table 5: Egress NAT
Mapper
Table 6: External Mapper
SFC
===
Table 0, Transport
Ingress
Table 1, Path Mapper
Table 2, Next Hop
Table 10, Transport
Egress
OVSDB Netvirt
==============
Table 0: Classifier
Table 10: Director
Table 20: Distributed ARP
Responder
Table 30: DNAT for
inbound floating-ip traffic
Table 40: Egress
Acces-control
Table 50: Distributed
LBaaS
Table 60: Distributed
Virtual Routing (DVR)
Table 70: Layer 3
forwarding/lookup service
Table 80: Layer2 rewrite
service
Table 90: Ingress
Acces-control
Table 100: SNAT for
traffic accessing external network
Table 110: Layer2
mac,vlan based forwarding