RBRIDGES/TRILL. Donald Eastlake 3 rd Stellar Switches AND IS-IS.

Similar documents
RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING

RBRIDGES AND THE TRILL PROTOCOL

TRILL. Part 1. Donald E. Eastlake 3 rd Co-Chair, TRILL Working Group Principal Engineer, Huawei

Routing without tears: Bridging without danger

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 8139 Obsoletes: 6439 Updates: 6325, 7177 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 7067 Category: Informational. Intel I. Gashinsky Yahoo November 2013

TRILL Transparent Transport over MPLS

Independent Submission Request for Comments: 6847 Category: Informational. Huawei January 2013

Network Myths and Mysteries. Radia Perlman Intel Labs

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: M. Umair Cisco May 2018

HP 6125XLG Blade Switch

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Transparent Bridging and VLAN

Data Center Configuration. 1. Configuring VXLAN

In This Issue. From The Editor

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track

Myths and Mysteries in the Network Protocol World. Radia Perlman

Intended status: Standards Track. Donald Eastlake Ting Liao Huawei Technologies Mar 11, 2018

Configuration and Management of Networks. Pedro Amaral

Configuring Virtual Private LAN Services

Communication Networks

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Multi-site Datacenter Network Infrastructures

ENTERPRISE MPLS. Kireeti Kompella

A Meshed Tree Algorithm for Loop Avoidance in Switched Networks

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

Cisco FabricPath Technology Introduction

Implementing Spanning Tree Protocol

Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow

Table of Contents 1 Multicast VPN Configuration 1-1

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

ABridges: Scalable, self-configuring Ethernet campus networks

Contents. EVPN overview 1

Carrier Ethernet Evolution

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).

Community Connection Service for escience. Ronald van der Pol, SURFnet TNC May 2014

HP MSR Router Series. EVI Configuration Guide(V7) Part number: b Software version: CMW710-R0304 Document version: 6PW

HP Routing Switch Series

A Segment Routing (SR) Tutorial. R. Bonica NANOG70 June 6, 2017

Configuring Access and Trunk Interfaces

Mobile Communications. Ad-hoc and Mesh Networks

Internet Engineering Task Force (IETF) Request for Comments: 7961 Category: Standards Track ISSN: August 2016

Ethernet Virtual Connections Configuration

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3

Cloud networking (VITMMA02) DC network topology, Ethernet extensions

Examination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC. Date: 20 May :00 19:00 SOLUTIONS

Understanding Basic 802.1ah Provider Backbone Bridge

Lesson 9 OpenFlow. Objectives :

The Spanning Tree Protocol

VXLAN Overview: Cisco Nexus 9000 Series Switches

RBridges: Transparent Routing

VXLAN Design with Cisco Nexus 9300 Platform Switches

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

EVPN Multicast. Disha Chopra

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Contents. Configuring EVI 1

Configure Virtual LANs in Layer 2 VPNs

MANET Architecture and address auto-configuration issue

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

HPE FlexFabric 7900 Switch Series

DetNet. Flow Definition and Identification, Features and Mapping to/from TSN. DetNet TSN joint workshop IETF / IEEE 802, Bangkok

Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Junos Enterprise Switching

Configuring StackWise Virtual

Cloud e Datacenter Networking

Spanning-Tree Protocol

Configuring Q-in-Q VLAN Tunnels

EXAM Brocade Certified Ethernet Fabric Professional 2013 Exam.

Chapter 4 Configuring Switching

2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA

Ethernet VPN (EVPN) in Data Center

Implementing IEEE 802.1ah Provider Backbone Bridge

Cloud e Datacenter Networking

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

Configuring Port-Based Traffic Control

Operation Manual MPLS VLL. Table of Contents

High Available Synchronization with IEEE 802.1AS bt

Stateless Multicast with Bit Indexed Explicit Replication

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Improving Bandwidth Efficiency When Bridging on RPR. November 2001

EIGRP Features and Operation

Alternative Multiple Spanning Tree Protocol (AMSTP) for Optical Ethernet Backbones

Connection Oriented Networking MPLS and ATM

Configuring Q-in-Q VLAN Tunnels

Understanding Issues Related to Inter VLAN Bridging

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Chapter 5. Spanning Tree Protocol (STP) Part I

IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Internet Engineering Task Force (IETF) Request for Comments: N. Bitar Nokia R. Shekhar. Juniper. J. Uttaro AT&T W. Henderickx Nokia March 2018

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

TRILL Deployment Nears

L2 MPLS VPN (VPLS) Technology White Paper

Transcription:

RBRIDGES/TRILL AND IS-IS 1 Donald Eastlake 3 rd donald.eastlake@stellarswitches.com, +1-508-333-2270 Stellar Switches

CAVEATS The base protocol specification may change: It is currently in TRILL WG Last Call. IEEE 802.1 has been asked to comment on the specification from the point of view of its effects on the Ethernet Service Model. It may also be reviewed by the L2VPN WG and non- TRILL-WG IETF experts. This presentations is based on RBridges: Base Protocol Specification version -10 and RBridge VLAN Mapping version -00. 2

CONTENTS Introduction TRILL Frames Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports TRILL IS-IS Data Requirements References 3

DEFINITIONS TRILL TRansparent Interconnection of Lots of Links Being specified by the IETF TRILL Working Group co-chaired by: Erik Nordmark, Sun Microsystems Donald Eastlake 3 rd, Stellar Switches RBridge Routing Bridge A device which implements TRILL RBridge Campus A network of RBridges, links, and possibly intervening bridges bounded by end stations. 4

WHAT/WHO TRILL? What is TRILL? TRILL is a new protocol to perform Layer 2 bridging based on IS-IS link state routing technology. Who started TRILL? Invented by Radia Perlman of Sun Microsystems, the inventor of the Spanning Tree Protocol. 5

WHY DO TRILL? Provides optimum point-to-point forwarding with zero configuration Supports multi-pathing of both unicast and multi-destination traffic Reduce the size of forwarding tables in the network core Provide a flexible options feature Other RBridge features: Compatible with spanning tree bridges; can be incrementally deployed into a customer bridged LAN Scale roughly as well as spanning tree bridging 6

WHY IS-IS FOR TRILL? The IS-IS (Intermediate System to Intermediate System) link state routing protocol was chosen for TRILL for the following reasons: IS-IS runs directly at Layer 2. Thus no IP addresses are needed, as they are for OSPF, and IS-IS can run with zero configuration. IS-IS uses a TLV (type, length, value) encoding which makes it easy to define and carry new types of data. 7

CONTENTS Introduction TRILL Frames Frame Types The TRILL Encapsulation and Header Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports TRILL IS-IS Data Requirements References 8

FRAME TYPES Frame Type Terminology in the Protocol Spec. Control Frames Destination Address is 01-80- C2-00-00-00 to 01-80-C2-00-00-0F or 01-80-C2-00-00-21 High Level 01-80-C2-00-00-00 & 01-80-C2-00-00-21 Low Level all other control frames TRILL Frames Have either the TRILL Ethertype or a TRILL multi-cast destination address. TRILL core IS-IS frames are sent to All-IS-IS-RBridges TRILL data frames are encapsulated native frames TRILL ESADI (End Station Address Distribution Instance) IS-IS frames look like data frames but the encapsulated destination address is All-ESADI-RBridges Native Frames all frames that are not TRILL or Control Frames 9

THE TRILL ENCAPSULATION AND HEADER TRILL data and ESADI frames sent between RBridges are encapsulated inside a local link header, addressed from the local source RBridge to the local destination RBridge, and a TRILL header. RBridge One Ethernet Cloud RBridge Two 10

THE TRILL ENCAPSULATION AND HEADER Some reasons for encapsulation: Provides a hop count to mitigate loop issues To hide the original source address to avoid confusing any bridges present as might happen if multi-pathing were in use To direct unicast frames toward the egress RBridge so that forwarding tables in transit RBridges need only be sized with the number of RBridges in the campus, not the number of end stations To provide a separate VLAN tag for forwarding traffic between RBridges, independent of the original VLAN of the frame 11

THE TRILL ENCAPSULATION AND HEADER Assuming the link is Ethernet (IEEE 802.3) the encapsulation looks like: 1. Outer Ethernet Header Source RBridge One, Destination RBridge Two 2. (Outer VLAN Tag) 3. TRILL Header 4. Inner Ethernet Header Original Source and Destination Addresses 5. Inner VLAN Tag 6. Original Payload 7. Frame Check Sequence (FCS) 12

THE TRILL ENCAPSULATION AND HEADER TRILL Header 64 bits TRILL Ethertype Egress RBridge Nickname Nicknames auto-configured 16-bit campus local names for RBridges V = Version (2 bits) R = Reserved (2 bits) M = Multi-Destination (1 bit) OpLng = Length of TRILL Options Hop = Hop Limit (6 bits) V R M OpLng Hop Ingress RBridge Nickname 13

CONTENTS Introduction TRILL Frames Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports TRILL IS-IS Data Requirements References 14

ARE RBRIDGES BRIDGES OR ROUTERS? They are obviously Bridges because 1. RBridges deliver unmodified frames from the source end station to the destination end station 2. RBridges can operate with zero configuration and auto-configure themselves 3. RBridges provide the restriction of frames to VLANs as IEEE 802.1Q bridges do 4. RBridges support frame priorities as IEEE 802.1Q bridges do 5. RBridges, by default, learn MAC addresses from the data plane 15

ARE RBRIDGES BRIDGES OR ROUTERS? They are obviously Routers because 1. RBridges swap the outer addresses on each RBridge hop from the ingress RBridge to the egress RBridge 2. RBridges decrement a hop count in TRILL frames on each hop 3. RBridges use a routing protocol rather than the spanning tree protocol 4. RBridges optionally learn MAC addresses by distribution through the control plane 5. RBridges normally act based on IP multicast control messages (IGMP, MLD, and MRD) and restrict the distribution of IP derived multicast frames 16

ARE RBRIDGES BRIDGES OR ROUTERS? Really, they are a new species, between IEEE 802.1 bridges and routers: Routers (plus servers and other end stations) RBridges Bridges Hubs/Repeaters 17

CONTENTS Introduction TRILL Frames Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports TRILL IS-IS Data Requirements References 18

HOW RBRIDGES WORK RBridges find each other by exchanging TRILL IS-IS Hello frames Hellos are sent to the All-IS-IS-RBridges multicast address labeled for various VLANs if VLANs have been configured. They are transparently forwarded by bridges, dropped by end stations including routers, and are processed by RBridge ports. The Hellos establish IS-IS connectivity on each RBridge port. Using the information exchanged in the Hellos, the RBridges on each link elect the Designated RBridge for that link. 19

HOW RBRIDGES WORK RBridges use the IS-IS reliable flooding protocol so that each RBridge in the campus has a copy of the global link state database. Each RBridge campus is a single Level 1 Area. The RBridge link state includes information beyond connectivity and link cost. Information such as VLAN connectivity, multicast listeners and multicast router attachment, claimed nickname, options supported, and the like. The database is sufficient for each RBridge to independently and without further messages calculate optimal point-to-point paths for known unicast frames and the same distribution trees for multi-destination frames. 20

HOW RBRIDGES WORK The Designated RBridge specifies the Appointed Forwarder for each VLAN on the link (which may be itself) and the Designated VLAN for inter- RBridge communication. The Appointed Forwarder for VLAN-x on a link handles all native frames to/from that link in that VLAN. It encapsulates frames from the link into a TRILL data frame. This is the ingress RBridge function. It decapsulates native frames destined for the link from TRILL data frames. This is the egress RBridge function. 21

HOW RBRIDGES WORK TRILL data frames with known unicast ultimate destinations are forwarded RBridge hop by RBridge hop toward the egress RBridge. multi-destination frames (broadcast, multicast, and unknown destination unicast) are forwarded on a tree rooted at an RBridge selected by the ingress RBridge from among the distribution trees all RBridges in the campus are computing. 22

CONTENTS Introduction TRILL Encapsulation Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports Structure of an RBridge Structure of an RBridge Port TRILL IS-IS Data Requirements References 23

STRUCTURE OF AN RBRIDGE Port Logic Port Logic Central Processing IS-IS, Mgmt., Etc. Switching fabric Port Logic Port Logic Links to other devices. Could be 802.3 (Ethernet), 802.11 (Wi-Fi), PPP, 24

STRUCTURE OF AN RBRIDGE PORT Assumes an Ethernet (802.3) link. Information Frame & Info RBridge: High Level Control Frame Processing (BPDU, VRP) RBridge: Higher Level Processing (see next slide) 802.1/802.3 Low Level Control Frame Processing, Port/Link Control Logic 802.1Q Port VLAN Processing EISS ISS 802.3 Physical Interface 802.3 Link 25

STRUCTURE OF AN RBRIDGE PORT Information Frame & Info Encapsulation / Decapsulation Processing Appointed Forwarder and Inhibition Logic TRILL data frames Native frames RBridge: Inter-port Forwarding, IS-IS, Management, Etc. TRILL IS-IS Hello Processing TRILL IS-IS Hello frames TRILL data and other IS-IS frames Lower Level Processing (see previous slide) 26

CONTENTS Introduction TRILL Frames Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports TRILL Data Requirements TRILL Hello Data TRILL Core LSP Data TRILL ESADI Data References 27

TRILL HELLO DATA Additional data for TRILL is all VLAN Stuff: The Designated VLAN Copy of Outer VLAN ID (to detect VLAN mapping in the link) Flag indicating VLAN mapping detected Set of VLANs with native frame service enabled on the port Flag indicating the sender thinks it is Appointed Forwarder Flag indicating an access port Appointed Forwarder appointments by the Designated RBridge 28

TRILL CORE LSP DATA (SLIDE 1 OF 2) TRILL versions supported Nickname and priority Distribution Tree Stuff: Priority to be a distribution tree root Number of trees desired List of RBridges to be used as roots by this RBridge 29

TRILL CORE LSP DATA (SLIDE 2 OF 2) List of VLANs for which the RBridge is an Appointed Forwarder and, for each VLAN: IPv4 and IPv6 multicast router connectivity Non-IP derived multicast request flag Optional: Listeners for IP-derived multicast addresses Appointed Forwarder status lost counter Root bridges of attached bridged LANs Optional: VLAN groups Optional: VLAN mappings being performed by this RBridge 30

TRILL ESADI DATA End Station Address Distribution Information: End station MAC address information and confidence 31

CONTENTS Introduction TRILL Frames Are RBridges Bridges or Routers? How RBridges Work Structure of RBridge Ports TRILL IS-IS Data Requirements References 32

REFERENCES Current Specification Draft: Rbridges: Base Protocol Specification http://www.ietf.org/internet-drafts/draft-ietftrill-rbridge-protocol-10.txt RBridge VLAN Mapping http://www.ietf.org/internet-drafts/draft-perlmantrill-rbridge-vlan-mapping-00.txt RBridges: Use of IS-IS http://www.ietf.org/internet-drafts/draft-eastlaketrill-rbridge-isis-02.txt Original Paper by Radia Perlman: Rbridges: Transparent Routing http://www.postel.org/rbridge/infocom04-paper.pdf 33

END 34 Donald Eastlake 3 rd donald.eastlake@stellarswitches.com, +1-508-333-2270 Stellar Switches