March 20091 Reducing the Number of MAC Addresses Visible to Bridges in the Data Center Bob Sultan Ben Mack-Crane.

Slides:



Advertisements
Similar presentations
COMP 110: Introduction to Programming Tyler Johnson Feb 11, 2009 MWF 11:00AM-12:15PM Sitterson 014.
Advertisements

COMP 110: Introduction to Programming Tyler Johnson Mar 23, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 27, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Feb 4, 2009 MWF 11:00AM-12:15PM Sitterson 014.
Tax Year TYPES OF PAYMENTS 1040 PG 2 Line & 68 Federal income tax withheld from W-2s, 1099s Estimated payments & $ applied from prior year.
Virtual Trunk Protocol
Federal Energy Regulatory Commission July Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
Bob Sultan ( evb protocol alternatives.
Gu Yingjie Bob Sultan Li Yizhou
© Copyright SOGET 2008 GRAND PORT MARITIME DU HAVRE CIP – Le Havre Technical Cooperation Tenth Executive Board Meeting of the Inter-American Committee.
Distributed Information System December 7, 20091Alvin MACCHIONE - Rémy JAVELLE.
Student Learning Center Time Management Welcome to the Time Management workshop. While we are waiting to begin, please fill out the blank weekly.
Ziehm Academy - User Guide for online registration portal Nuremberg, February 2009.
Scaling The Edge Bridge Address Table In Datacenter Networks June-2012.
1 Cathay Life Insurance Ltd. (Vietnam) 27/11/20091.
Tools and Organization Rev. 5/13/20091 Staying Organized Tools to Keep Near the Phone Paper, Pen and Pencil –For messages –For notes ____________________________.
18 February Anaerobic Digestion On-farm AD Planning Permission and Environmental Permitting.
Introduction to TCP/IP
FC-PI-5, FC-FS-3, and 16GFC T11/09-506v0 - 8/27/2009 FC-PI-5, FC-FS-3, and 16GFC.
FC-PI-5, FC-FS-3, and 16GFC T11/09-506v2 - 10/27/2009 FC-PI-5, FC-FS-3, and 16GFC.
Bob Sultan ( Which protocol for VSI-to-Profile Binding?
Bob Sultan A further use of VID-learning March 2011.
Yizhou Li Bob Sultan Gu Yingjie
 Recap the proposal  Questions from last meeting and answers.
Panel 3D = XML file pointer 08/09/20091 LHCb calorimeter meeting (jean-luc PANAZOL)
Delivering Preference The Marketing Clinic THE MARKETING CLINIC Success Springs From Understanding The Consumer Fully Understanding Regional Preferences.
Transmission Control Protocol (TCP)
Directory Assisted TRILL Encapsulation by non-TRILL nodes (Directory Reliant Smart End Node) Linda Dunbar Donald Eastlake Radia Perlman Igor Gashinsky.
VLANs Module 2. 2 VLANs  VLANs  Trunking  VLAN Trunking Protocol (VTP)
CS335 Networking & Network Administration Tuesday, April 13, 2010.
Server Assisted TRILL Edge Linda Dunbar
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
Q and A for Ch. 17 CS 332, Spring Fiber Modems Q: Why use fiber modem extensions? Is it to save money on not having to use as much fiber (otherwise.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Directory Assisted RBridge Edge draft-dunbar-trill-directory-assisted-edge-05 Update Linda Dunbar: Donald
CISCO NETWORKING ACADEMY Chabot College ELEC Collision & Broadcast Domains.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Network Devices.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Chapter 8: Virtual LAN (VLAN)
1 Multilevel TRILL draft-perlman-trill-rbridge-multilevel-00.txt Radia Perlman Intel Labs March 2011.
Local-Area-Network (LAN) Architecture Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Ethernet Overview it the IEEE standard for Ethernet.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Identify basic switching concepts and the operation of Cisco switches.
Switch 1 Switch 2 Switch 3 Blocking Forwarding ROOT BRIDGE BRIDGE’S ROOT PORT DESIGNATED PORT DESIGNATED BRIDGE.
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
I-TAG A multiplexing tag for service instance scaling in Provider Bridged Networks Mick Seaman
Virtual LANs.
Hubs Hubs are essentially physical-layer repeaters:
Chapter 2 Network Models.
Broadcast and Collision Domains
2018/11/16 Scalable Address Resolution for Data Center and Cloud Computing Problem Statements Linda Dunbar Sue Hares
Network Virtualization
Chapter 2 Network Models.
COMMON LAYER 2 DEVICES AND FUNCTIONALITIES.
Binary Math Basic operations.
Chapter 2 Network Models.
TCP/IP Protocol Suite: Review
Proposal for the MAC address assignment protocol
Chapter 2 Network Models.
Presentation transcript:

March Reducing the Number of MAC Addresses Visible to Bridges in the Data Center Bob Sultan Ben Mack-Crane Linda Dunbar

March Problem: MAC per VNIC requires big FDB Hypervisor requires MAC address per VNIC; MAC per VNIC implies many MAC Addresses; Result is FDB overflow, flooding, poor performance; Our server guys say this is the real problem in the Data Center. e.g., 50 VNICs per blade e.g., 25 blades per rack e.g., 25 racks per access bridge e.g., 25 access bridges per core bridge MAC Addresses could number in hundreds of thousands

March Proposed: MAC Address Summary VNIC MAC Addresses having common high-order bits (eg., AA) are represented by a single MAC address (eg., AA00) in the network core; FDB entries in core reduced from ‘one per VNIC’ to ‘one per NIC (or blade, or rack)’. SA=AA23 summarize here restore here SA=AA17 SA=AA42 SA=AA00, [23] SA=AA00, [17] SA=AA00, [42] AA22AA24AA25AA26 NIC VNIC BB39BB40BB41BB42 CC25CC26CC27CC28 DD77DD78DD79DD80

March LoTag Carries Low-order Bits needed to Restore Tag added for Summarization; Low-order bits (red) copied to DLO / SLO; Low-order bits of DA / SA replaced by zeros; Restoration reverses the procedure; DA SA DDDDDD000078AAAAAA data LoTag LO EthertypeDLO 16 bits24 bits 8 bytes SLO data DA SA DDDDDD000000AAAAAA summarize restore

March When the NIC Doesn’t Support S/R When NIC does not support Summary/Restore (S/R) function, the function can be supported on the NIC- facing port of the external bridge; The same MAC reduction benefits are realized. S/R AA22AA24AA25AA26 BB39BB40BB41BB42 CC25CC26CC27CC28 DD77DD78DD79DD80 No S/R Function Here Deploy S/R port on external bridge

March Independent of the Type of Forwarding Function It is immaterial whether the forwarding device with which the S/R function is associated is a Bridge or a Port MUX (e.g., a VEPA or IV); The S/R function will operate in the same manner. AA22AA24AA25AA26 BB39BB40BB41BB42 CC25CC26CC27CC28 DD77DD78DD79DD80 Port Multiplexer

March Deploying S/R Further Up the Bridge Hierarchy S/R can be deployed further up the hierarchy; Bridges outside S/R boundary do not realize MAC reduction; Useful when migrating to summarization. S/R AA22AA24AA25AA26 BB39BB40BB41BB42 CC25CC26CC27CC28 DD77DD78DD79DD80 No S/R Function here or here Deploy S/R here or here No MAC reduction on this bridge

March Talking with a NIC that Doesn’t Summarize AA22 not tagged when sending to 1234 which lacks S/R; AA22 tagged when sending to CC26; S/R at AA will allows untagged frame from 1234 to pass directly to AA25; Maximize tagging while avoiding errors. AA22AA24AA25AA26 BB39BB40BB41BB42 CC25CC26CC27CC No S/R Function Here S/R provisioned with info that frames to 1234 must not be summarized

March Talking with a NIC that Doesn’t Summarize When sending from 1234 to AA22, a Tag is created at Y and the DLO/SLO fields are populated as usual. It is not necessary to zero the low-order bits of the SA (as the SA is not summarized in this case; When sending from AA22 to 1234, a Tag is created at X and the DLO/SLO fields are populated as usual. It is not necessary to zero the low-order bits of the DA (as the DA is not summarized in this case; AA22AA24AA25AA26 BB39BB40BB41BB X Y

March When the SA is not Summarized Tagging at X when AA22 sends to 1234 (see previous slide); SA is summarized as usual; DA is not summarized; MAC Reduction is realized for the SA; DA SA 1234AA22 data LoTag LO EthertypeDLO 16 bits24 bits 8 bytes SLO data DA SA 1234AA00 summarize restore

March Key Points Increasing numbers of VNICs per NIC creates significant scaling problem in large Data Center; Summarization can reduce MAC awareness from ‘one MAC per VNIC’ to ‘one MAC per NIC’; Summarization preserves the common practice of assigning one MAC address per VNIC; Summarization can be deployed on a NIC or on an external bridge port; Summarization can be performed on the DA and not on the SA or on the SA and not on the DA; Summarization is independent of whether the attached device is a Bridge or a Port MUX Device.