Monday, November 3, 2025

Let Understand Network Virtualization and Overlay Networking Fundamental

Let Understand Network Virtualization and Overlay Networking Fundamental

Welcome to this essential module on network virtualization journey. You might wonder why we're discussing network virtualization in an EVPN course, but understanding this evolution is crucial for grasping the fundamental problems that led to VXLAN development and ultimately to EVPN as the unified solution.

This module will explore the historical context, technical challenges, and evolutionary steps that laid the foundation for modern overlay networking technologies. By the end of this section, you'll understand why network virtualization became essential and how it connects to BGP EVPN's revolutionary approach.

Virtualization Evolution & Concept

When we hear the term "virtualization," several concepts immediately come to mind: efficient resource utilization, reduced hardware requirements, and optimization of existing infrastructure. The virtualization journey fundamentally transformed how we approach IT infrastructure design and management.

The Virtualization Timeline

The virtualization evolution followed a logical progression through different infrastructure layers:

  • Server Virtualization (First Wave): The journey began with server virtualization, revolutionizing how we utilize compute resources
  • Storage Virtualization (Second Wave): Extended virtualization concepts to storage infrastructure, as discussed in previous modules
  • Network Virtualization (Third Wave): The natural evolution brought virtualization to network infrastructure

Server Virtualization Foundation

Definition: Server virtualization involves dividing a physical server into multiple unique and isolated virtual servers. Each virtual environment hosts applications that run in their own operating system, functioning as independent Virtual Machines (VMs).

While server virtualization isn't our primary focus, understanding this foundation helps contextualize why network virtualization became essential as compute and storage evolved.

Network Virtualization Concept

Network virtualization takes a physical network infrastructure and creates multiple logical networks on top of it. Consider a simple network of four nodes connected via physical links. Network virtualization creates multiple virtual channels (tunnels) over this physical infrastructure, enabling:

  • Resource Efficiency: Multiple virtual networks sharing physical infrastructure
  • Isolation: Logical separation between different network services
  • Flexibility: Dynamic provisioning and modification of network services
  • Scalability: Support for numerous virtual networks without proportional hardware increases

Network Tunneling Fundamentals

Understanding tunneling is crucial for grasping network virtualization concepts. The tunnel concept can be best understood through a real-world analogy.

Tunnel Analogy: Mountain Pass Example

Real-World Example: When you need to travel from Point A to Point B, but there's a mountain range in between, the government creates a tunnel through the mountain. This allows seamless travel without taking a longer, sometimes impossible, route around the obstacle.

Network Tunneling Application

In networking, tunneling solves similar connectivity challenges. Consider this scenario:

Traditional Approach (Without Tunneling):

  • Route Advertisement: Customer subnets (C1, C2) must be advertised to all intermediate nodes (R1, R2, R3, R4)
  • Routing Table Population: Every intermediate router must maintain customer route information
  • Provider Network Impact: Customer routes pollute the provider's routing domain

Tunneling Approach (Modern Solution):

  • Tunnel Creation: Establish a logical tunnel between edge routers (R1 to R4)
  • Transparent Transit: Intermediate routers (R2, R3) remain unaware of customer subnets
  • Encapsulation: Customer traffic gets encapsulated in provider headers
  • Scalable Architecture: Provider network scales independently of customer requirements

Key Principle: Keep this tunneling concept in mind as we progress through this module. The ability to create transparent connectivity while maintaining network isolation becomes fundamental to understanding VXLAN and EVPN technologies.

Overlay Network Services

Overlay networks provide various service options depending on the payload type and encapsulation method. Understanding these combinations is essential for comprehending modern network virtualization approaches.

Encapsulation Matrix: Four Fundamental Combinations

When a customer device (C) sends traffic through an overlay network, there are four possible combinations based on:

  • Inner Payload Type: Layer 2 frame or Layer 3 packet
  • Outer Encapsulation Type: Layer 2 frame or Layer 3 packet

Inner Payload Outer Encapsulation Technology Examples Use Cases
Layer 2 Frame Layer 2 Frame FabricPath, TRILL, SPB Campus LAN extension
Layer 2 Frame Layer 3 Packet VXLAN, NVGRE Data center overlays
Layer 3 Packet Layer 2 Frame Proprietary solutions Specialized applications
Layer 3 Packet Layer 3 Packet VXLAN (L3), GRE, IPSec Routed overlays, VPN

VXLAN: The Versatile Solution

VXLAN demonstrates remarkable versatility by supporting multiple combinations:

  • Layer 2 over Layer 3: Traditional VXLAN carrying Ethernet frames in IP packets
  • Layer 3 over Layer 3: VXLAN can also carry IP packets within IP encapsulation
  • Consistent Outer Header: VXLAN always uses Layer 3 (IP-based) outer encapsulation

Evolution Insight: The transition from traditional single-service overlays (either L2 or L3) to modern multi-service overlays (both L2 and L3) represents a fundamental shift in network virtualization capabilities.

Historical Context: Traditional vs. Modern Overlays

Understanding this evolution helps clarify why VXLAN became essential:

Traditional Approach (Past):

  • Layer 2 Services: Provided by VPLS, VPWS
  • Layer 3 Services: Provided by MPLS L3VPN
  • Clear Demarcation: Services were either Layer 2 OR Layer 3, never both

Modern Approach (Present):

  • Unified Service: VXLAN provides both Layer 2 AND Layer 3 services
  • Consistent Infrastructure: Same overlay technology supports multiple service types
  • Operational Simplicity: Single technology to learn, deploy, and maintain

Virtual Network Types & Classifications

Virtual networks can be classified into two fundamental categories based on where the virtualization intelligence resides in the network.

Classification Criteria

Virtual networks are classified based on two key factors:

  • Packet Association Method: How ingress nodes associate packets with virtual networks (Layer 2 or Layer 3 context)
  • Transit Node Awareness: Whether intermediate (transit) nodes in the network path are aware of virtual networks

Type 1: Inline Virtual Networks

In inline virtual networks, every node in the path maintains virtual network context.

Layer 2 Inline Example - VLAN:

  • VLAN 10 Deployment: Configure VLAN 10 on R1, R2, and R3
  • End-to-End Context: Every switch maintains VLAN 10 information
  • Per-Hop Processing: Each device processes VLAN tags and makes forwarding decisions

Layer 3 Inline Example - VRF Lite:

  • VRF 10 Deployment: Configure VRF 10 on every router (R1, R2, R3)
  • Per-Hop VRF Context: Each router maintains separate routing table for VRF 10
  • Hop-by-Hop Routing: Every router makes VRF-aware forwarding decisions

Type 2: Overlay Virtual Networks

In overlay virtual networks, only edge nodes maintain virtual network context, while transit nodes remain unaware.

MPLS L3VPN Example:

  • Edge Configuration: Configure VRF 10 only on R1 (ingress) and R3 (egress)
  • Transit Transparency: R2 acts as provider (P) router with no VRF configuration
  • Tunnel-Based: R1 creates tunnel to R3, encapsulating customer traffic
  • Scalable Approach: Hundreds of intermediate routers require no customer-specific configuration

Packet Forwarding in Overlay Networks

Understanding packet flow in overlay networks illustrates the scalability advantage:

Step-by-Step Process:

  • Step 1 - Customer Packet: Customer sends packet (Source: C1, Destination: C2)
  • Step 2 - Ingress Encapsulation: R1 encapsulates customer packet (Outer Source: R1, Outer Destination: R3)
  • Step 3 - Transit Forwarding: R2 (and any intermediate routers) forward based only on outer header
  • Step 4 - Egress Decapsulation: R3 removes outer header and identifies VRF context
  • Step 5 - Customer Delivery: R3 forwards original packet to C2

Scalability Insight: In overlay networks, adding customer 100 requires configuration only on edge nodes. Hundreds of transit nodes remain unchanged, making this approach infinitely more scalable than inline virtual networks.

Overlay Scalability & Modern Solutions

The overlay approach became dominant because of its superior scalability characteristics, but this popularity also introduced new challenges that would eventually drive the evolution to VXLAN and EVPN.

Why Overlay Networks Gained Popularity

The overlay approach offers compelling advantages over inline virtual networks:

  • Configuration Scalability: Only edge nodes require customer-specific configuration
  • Operational Simplicity: Transit network remains customer-agnostic
  • Service Provisioning Speed: New services require minimal configuration changes
  • Technology Independence: Customer services independent of transit network technology
  • Economic Benefits: Reduced operational complexity translates to lower costs

Overlay Tunnel Types

Overlay tunnels can be implemented using various technologies and approaches:

Tunnel Establishment Methods:

  • Static Tunnels: Manually configured point-to-point tunnels
  • Dynamic Tunnels: Automatically established based on routing protocols (like our R1-to-R3 example)

Technology Examples:

  • MPLS-based: Label switching creates efficient forwarding paths
  • GRE-based: Generic Routing Encapsulation for simple tunneling
  • IPSec-based: Secure tunneling with encryption and authentication
  • VXLAN-based: Modern data center overlay technology

The Challenge Preview

Important Note: While overlay networks solved scalability challenges, they introduced new problems that needed addressing. As the saying goes, "there's no such thing as a free lunch." These emerging challenges laid the foundation for VXLAN development and ultimately led to EVPN as the comprehensive solution.

The problems introduced by traditional overlay approaches will be explored in upcoming modules, where we'll discover how these challenges directly contributed to VXLAN's design requirements and EVPN's revolutionary control plane optimization.

Underlay Network Fundamentals

While overlay networks provide the virtualization magic, they cannot exist in isolation. Understanding the critical relationship between overlay and underlay networks is essential for successful network virtualization implementation.

The Overlay-Underlay Dependency

In our previous discussions about overlay networks between R1, R2, and R3, we focused on the virtualization layer. However, for these overlay tunnels to function properly, we need robust connectivity between the underlying physical nodes.

Key Principle: The underlay transport network physically carries overlay frames and must be designed appropriately to support the chosen overlay encapsulation technology.

Underlay Network Requirements

The underlay network design directly depends on the overlay encapsulation technology being deployed. Each overlay technology has specific underlay requirements:

MPLS-Based Overlays:

  • Label Switching Capability: All underlay nodes must support MPLS label processing
  • LDP or RSVP-TE: Label distribution protocols for establishing label-switched paths
  • MPLS Forwarding: Ability to transparently forward labeled packets without inspecting inner content
  • QoS Support: MPLS Traffic Engineering capabilities for service quality guarantees

VXLAN-Based Overlays:

  • IP Connectivity: All underlay nodes must support IP packet forwarding
  • UDP Support: VXLAN uses UDP as transport protocol (typically port 4789)
  • Jumbo Frame Support: Accommodate additional VXLAN header overhead
  • Multicast Support: Traditional VXLAN flood-and-learn operations (though BGP EVPN eliminates this requirement)

Critical Design Considerations

Overlay Technology Underlay Requirements Key Protocols Design Focus
MPLS L3VPN Label switching capability LDP, RSVP-TE, BGP QoS, traffic engineering
VXLAN (Traditional) IP/UDP transport, multicast IGP, PIM, IGMP Multicast optimization
VXLAN with EVPN IP/UDP transport only IGP, BGP EVPN Unicast replication, control plane
GRE IP connectivity IGP, BGP Simplicity, basic encapsulation

Underlay Network Design Principles

Successful overlay deployment depends on well-designed underlay networks following these principles:

1. Transport Independence:

  • Technology Agnostic: Underlay should transparently carry overlay traffic
  • Scalable Design: Accommodate growth without overlay reconfiguration
  • High Availability: Redundant paths and fast convergence

2. Performance Optimization:

  • Bandwidth Planning: Account for encapsulation overhead
  • Latency Minimization: Optimal path selection and processing
  • QoS Implementation: End-to-end service quality maintenance

3. Operational Simplicity:

  • Consistent Configuration: Standardized underlay design patterns
  • Monitoring Integration: Visibility into both overlay and underlay performance
  • Troubleshooting Efficiency: Clear separation of overlay and underlay issues

Modern Underlay Evolution

The evolution of underlay networks reflects changing overlay requirements:

Traditional Approach:

  • Complex Requirements: MPLS required label-aware infrastructure
  • Specialized Hardware: MPLS-capable devices throughout the network
  • Protocol Complexity: Multiple protocols for different functions

Modern IP-Based Approach:

  • Simplified Requirements: IP connectivity sufficient for VXLAN
  • Commodity Hardware: Standard IP forwarding capabilities
  • Operational Simplicity: Familiar IP routing and troubleshooting

Evolution Insight: The shift from MPLS-based to IP-based underlays represents a significant simplification in network virtualization, making overlay technologies more accessible and deployable in diverse environments.

Integration with BGP EVPN

BGP EVPN further simplifies underlay requirements by:

  • Eliminating Multicast Dependency: No need for complex multicast underlay design
  • Unicast-Only Transport: Standard IP unicast routing sufficient
  • Centralized Control Plane: BGP manages overlay state, simplifying underlay
  • Seamless Integration: Overlay and underlay routing information exchange

Key Takeaways

  • Overlay-Underlay Dependency: Overlay networks require properly designed underlay transport
  • Technology-Specific Requirements: Underlay design depends on chosen overlay encapsulation
  • Simplification Trend: Modern overlays reduce underlay complexity requirements
  • Operational Benefits: IP-based underlays offer operational simplicity over MPLS
  • Future-Ready Design: Understanding both layers essential for modern network virtualization

Key Takeaways

Complete Learning Journey Summary

  • Virtualization Evolution: Network virtualization naturally followed server and storage virtualization
  • Tunneling Concepts: Fundamental to understanding all overlay technologies
  • Service Flexibility: Modern overlays support both Layer 2 and Layer 3 services
  • Scalability Advantage: Overlay approach scales better than inline virtual networks
  • Underlay Foundation: Proper underlay design essential for overlay success
  • Technology Integration: Understanding both overlay and underlay layers crucial
  • Future Preparation: These concepts enable understanding of VXLAN and EVPN technologies

Next Steps

This module establishes the foundation for understanding why network virtualization became essential and how it evolved. In subsequent modules, we'll explore the specific challenges that traditional overlay approaches introduced and discover how VXLAN addressed these issues, setting the stage for EVPN's revolutionary control plane optimization.


Understanding this network virtualization journey is crucial for appreciating how EVPN represents the culmination of decades of networking evolution, solving fundamental challenges while maintaining the scalability advantages that made overlay networks popular.

No comments:

Post a Comment