Overview of TRILL Active-Active Goals, Challenges, and Proposed Solutions Radia Perlman 1November 2013.

Slides:



Advertisements
Similar presentations
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
Advertisements

Radia Perlman Intel Labs
December 2007TRILL WG Vancouver1 TRILL issue: Pseudonodes Radia Perlman
Computer Networking A Top-Down Approach Chapter 4.7.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Joining LANs - Bridges. Connecting LANs 4 Repeater –Operates at the Physical layer no decision making, processing signal boosting only 4 Bridges –operates.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 19 Introduction to Computer Networks.
TRILL issue: Using Pseudonode Nicknames for Ingress RBridge Radia Perlman Hongjun Zhai Fangwei Hu 1November 2011.
TRILL Cloudlet Radia Perlman Donald Eastlake 3 rd Fangwei Hu August 20121TRILL: Cloudlet.
Nirmala Shenoy, Daryl Johnson, Bill Stackpole, Bruce Hartpence Rochester Institute of Technology 1.
Directory Assisted TRILL Encapsulation by non-TRILL nodes (Directory Reliant Smart End Node) Linda Dunbar Donald Eastlake Radia Perlman Igor Gashinsky.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
March 2007TRILL WG, IETF Prague1 TRILL issue: Multicast Input Link Filtering Radia Perlman
VLANs Virtual LANs CIS 278.
Single Area Border RBridge Nickname for TRILL Multilevel draft-zhang-trill-multilevel-single-nickname-00.txt Mingui Zhang, Donald Eastlake, Radia Perlman.
Centralized Replication for BUM traffic in active-active edge connection draft-hao-trill-centralized-replication-02 Weiguo Hao Huawei Yizhou Li Huawei.
TRILL: Traffic engineering draft-hu-trill-traffic-engineering-00.txt Fangwei Hu Jacni Qin
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Rbridges: Transparent Routing Radia Perlman
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Revision of the Appointed Forwarder RFC draft-eastlake-trill-rfc txt Donald E. Eastlake, 3 rd March 2015 Appointed.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Networking Components
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Q and A for Ch. 17 CS 332, Spring Fiber Modems Q: Why use fiber modem extensions? Is it to save money on not having to use as much fiber (otherwise.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 4: Managing LAN Traffic
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
IEEE 802.1q - VLANs Nick Poorman.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
1 Spanning Tree Algorithm Advanced Computer Networks.
Click to edit Master subtitle style Chapter 9: Introduction to IP Routing Instructor:
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
IP Multicast Lecture 3: PIM-SM Carl Harris Communications Network Services Virginia Tech.
Base Protocol Spec Radia Perlman
1 Multilevel TRILL draft-perlman-trill-rbridge-multilevel-00.txt Radia Perlman Intel Labs March 2011.
Computer Science 6390 – Advanced Computer Networks Dr. Jorge A. Cobb Deering, Estrin, Farinacci, Jacobson, Liu, Wei SIGCOMM 94 An Architecture for Wide-Area.
November 2010Future TRILL Work1 Future TRILL Work 2 Donald Eastlake 3 rd 155 Beaver Street Milford, MA USA
TRILL OAM & BFD draft-eastlake-trill-rbridge-bfd-00.txt Donald E. Eastlake 3 rd 155 Beaver Street Milford, MA USA November 20101TRILL OAM & BFD Vishwas.
Layer 2 and Switching. How Computers Communicate  In a two node flat network data can be sent without addressing.
Rbridges: Transparent Routing Radia Perlman
Transparent Interconnection of Lots of Links(TRILL) Speaker: Hui-Hsiung Chung Date:2011/12/28 1.
TRILL remaining issues Radia Perlman
November 2013TRILL Directory Assist Mechanisms1 TRILL Directory Assistance Mechanisms draft-dunbar-trill-scheme-for-directory-assist-06 draft-eastlake-trill-ia-appsubtlv-03.
CSE 461 University of Washington1 Topic How do we connect nodes with a switch instead of multiple access – Uses multiple links/wires – Basis of modern.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
CEN 5501C - Computer Networks - Spring UF/CISE - Newman1 Computer Networks Chapter 4 – Source Routing Bridges.
March th IETF - Prague1 TRILL Working Group Changes from draft-trill-rbridge-protocol-02.txt to draft-trill-rbridge-protocol-03.txt Dinesh Dutt,
November 2006IETF TRILL WG1 TRILL Working Group draft-gai-perlman-trill-encap-00.txt as modified by Radia Ed Bowen, IBM Dinesh Dutt, Cisco Silvano Gai,
Switches – Continued. Switches If a switch has N ports with multiple computers per port, then how many simultaneous transmissions can you have? Explain.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
March 2007RBridge Extensions1 RBridge Protocol Extensions and the Inner Q-tag Location Donald Eastlake 3rd
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Datagram Forwarding.
MAC Address Tables on Connected Switches
Advanced Computer Networks
Month 2002 doc.: IEEE /xxxr0 November 2004 Routing and Rbridges
: An Introduction to Computer Networks
RBridge Channel Tunnel Protocol
Using the WUGS-20 GigE Line Card
2 - IP Routing.
CS4470 Computer Networking Protocols
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

Overview of TRILL Active-Active Goals, Challenges, and Proposed Solutions Radia Perlman 1November 2013

Don’t we have “appointed forwarders”? November R1R2R3 R1, R2, and R3 can all forward. DRB assigns work, based on VLANs But requires R1, R2, R3 all carefully coordinated, all see all packets endnodes

The active-active stuff being discussed in different November 20133

The “active-active” stuff Multiple RBridges, {R1, R2, R3} attached to a bunch of endnodes But when a packet is forwarded from the bunch of endnodes, only one of {R1, R2, R3} sees that packet And {R1, R2, R3} cannot easily talk to each other (they are not on a common link) 4November 2013

Two pictures November hypervisor VM R1 R2 R3 Rest of campus R1 R2 R3 Rest of campus bridge R4 D D S S

(Presumed) Rules for forwarding upwards Same “flow” go to the same next hop Otherwise, basically random Multidestination might go to any of the next hops And nothing is forwarded (by hypervisor or bridge) between the up-links November 20136

Goals (“would be nice”) Probably we won’t find any solutions that meet all the goals November 20137

Goals (“would be nice”) All up-links active If S sends to distant node D, D  S traffic should enter S via link closest to D, regardless of which up-link was used for path S  D Have D  S traffic take same path as S  D traffic (note: directly conflicts with above goal) R4 (or D) shouldn’t keep changing its mind about which RB S is connected to Packets for a flow should stay in order November 20138

Goals (“would be nice”) No need to change entire campus at once (perhaps only need to change {R1, R2, R3}, maybe R4. Works with all existing silicon RPF check on multi-destination works (doesn’t falsely drop packets) November 20139

What’s wrong with naïve approach? November hypervisor VM R1 R2 R3 Rest of campus R4 D S When S sends via R1, “first RB” field=R1, etc. Problem: R4 will return via same up- link (possibly not optimal one), and R4 will keep switching its endnode table for S if traffic from S comes via R2, R3,…

With pseudonode November hypervisor VM R1 R2 R3 Rest of campus R4 D S R1, R2, R3 agree (somehow) on a pseudonode nickname for the set of MACs reachable from {R1, R2, R3}, let’s say “79” Always encapsulate with 1 st RB=79

Pseudonode R1, R2, R3 claim they are attached to “79” Use “79” as ingress when receive from their uplink All endnodes attached to R1, R2, R3 look like they are reachable via 79 November

Problem: What if E1’s link to R1 dies? November R1 R2 R3 Rest of campus R4 D E1 E2 E3 E4 E5 E6

Problem: What if E1’s link to R1 dies? November R1 R2 R3 Rest of campus R4 D E1 E2 E3 E4 E5 E6 If R3 uses pseudonode “79” when sending to D, return traffic to E1 might go via R1, and fail

Problem: What if E1’s link to R1 dies? November R1 R2 R3 Rest of campus R4 D E1 E2 E3 E4 E5 E6 How could R3 detect this, even if there was something sensible for it to do?

Solutions? Ignore the problem: “hardly ever happens” Have R1 notice somehow and tunnel traffic for E1 to R2 or R3 (even though R1 is still connected to “79” for other endnodes) Don’t use pseudonode, and have distant RBs learn multiple addresses for each E, as in –E1 reachable via R2 (timestamp), and R3 (timestamp) –E2 reachable via R1 (timestamp), R2 (timestamp), and R3 (timestamp) ??? Any other possibilities? November

Picture for “learn multiple attachments for S” November hypervisor VM R1 R2 R3 Rest of campus R4 D S R4 keeps, for S S located at R1/ last seen T1 R2/ last seen T2 R3/last seen T3 And R1, R2, R3 don’t use “79”, they use their own nicknames

Another problem with pseudonode: RPF check on multicast November

Multidestination frames, pseudonode nickname, and the RPF check pseudonode R1 R2R3 R For each tree, “79” will only be attached to one of {R1, R2, R3} If R2 injects on that tree, R8 will drop because of RPF check S1 S2 S3 19November 2013

Potential solutions (assuming R3 not attached to any tree, but R1 and R2 are) R3 refuses to use link(s) to “79” at all (disables its port) R3 continues to work, but only for unicast; if a packet must be multidestination from “79”, R3 tunnels to R1 or R2 On multicast, R3 sends, but uses “R3” for ingress instead of “79” Use a bit in the TRILL header to mean “I’m in multiple places” (turn off MAC flip-flop panic, or keep multiple RB attachments) Let’s look at pros and cons of each approach November

R3 disables the port completely Pro: simple Con: very sad November

R3 tunnels multidestination to R1 or R2 Pro: –Simple –Doesn’t change anyone except {R1, R2, R3} Cons: –Maybe some silicon doesn’t support this? –Extra hops November

R3 uses its own nickname for multidestination ingress Pros –Simple –Doesn’t change anyone except {R1, R2, R3} Cons –(distant) R8 sometimes learns (S,79) (on unicast), sometimes (S,R3) (multidestination through R3) November

No pseudonode; learn multiple attachments Change (all) edge RBs to cope with E being attached to multiple places (R1, R2, and R3) Keeps separate timestamp for each learned attachment When sending to S, choose any (say nearest, or load split based on flows) of R1, R2, R3 November

Picture for “learn multiple attachments for S” November hypervisor VM R1 R2 R3 Rest of campus R4 D S R4 keeps, for S S located at R1/ last seen T1 R2/ last seen T2 R3/last seen T3 And R1, R2, R3 don’t use “79”, they use their own nicknames

Learn Multiple attachments Pros –Less, or no, configuration required –Allows {R1, R2, R3} to use any multicast tree –No problem if E1’s uplink to R1 fails Cons –Requires edge RBs to keep track of multiple attachment points for endnodes; and separately time them out; disable flip-flop panic November

What’s the “affinity” thing? It’s a new TLV in IS-IS that says “for these trees, put this nickname as a child of me” November

What does it do and what doesn’t it do? pseudonode R1 R2R3 R8 79 S1 S2 S3 28November 2013 Make 79 my child in tree #3 Make 79 my child in tree #2

What does it do? If you have at least as many trees as up- links… And you configure everything properly… And all RBs in the campus implement this new thing… You will be assured that each of the uplinks has at least one tree to send on November

What does it not do? Still have the problems mentioned earlier in the presentation – if fewer trees than uplinks –if misconfiguration –If one of the uplinks from some set of endnodes fails Requires as many trees as active uplinks. Each tree requires significant state and computation And note: It requires all RBs in the campus to understand this new TLV and compute trees accordingly November

Questions from me How many trees do people want? How many uplinks do people want? Do we care if an RB can’t use all the campus trees? Do we care about misconfiguration? Are we worried about the problem of some uplinks failing? November

Conclusions Lots of different aspects, and nothing addresses all of them at the same time…we can do mix and match No perfect solution November