TRILL RBridge Architecture Changes prior to IETF-67 Issues and Future Work Eric Gray, Ericsson.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
Single Area Border RBridge Nickname for TRILL Multilevel draft-zhang-trill-multilevel-single-nickname-00.txt Mingui Zhang, Donald Eastlake, Radia Perlman.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
COS 420 Day 15. Agenda Assignment 3 Due Assignment 4 Posted Chap Due April 6 Individual Project Presentations Due IEPREP - Jeff MANETS - Donnie.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
Jan 01, 2008CS573: Network Protocols and Standards D – Selective Multicast Network Protocols and Standards Winter
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Rbridges: Transparent Routing Radia Perlman
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
TRILL over IP draft-ietf-trill-over-ip-01.txt IETF 91, Honolulu Margaret Wasserman Donald Eastlake, Dacheng Zhang.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
IEEE 802.1q - VLANs Nick Poorman.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri November 2014 Honolulu USA draft-yong-rtgwg-igp-mutlicast-arch-00.
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
NEMO Requirements and Mailing List Discussions/Conclusions T.J. Kniveton - Nokia Pascal Thubert - Cisco IETF 54 – July 14, 2002 Yokohama, Japan.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri November 2014 Honolulu USA draft-yong-rtgwg-igp-mutlicast-arch-00.
© 2002, Cisco Systems, Inc. All rights reserved..
1 Multilevel TRILL draft-perlman-trill-rbridge-multilevel-00.txt Radia Perlman Intel Labs March 2011.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
U-Turn Alternates for IP/LDP Local Protection draft-atlas-ip-local-protect-uturn-00.txt Alia Atlas Gagan Choudhury
TRILL remaining issues Radia Perlman
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
Multiple Interfaces (MIF) WG IETF 79, Beijing, China Margaret Wasserman Hui Deng
Guidance for Running Multiple IPv6 Prefixes (draft-liu-v6ops-running-multiple-prefixes-02) Bing Liu, Sheng Jiang (Speaker), Yang Bo IETF91
D1 - 08/12/2015 Requirements for planned maintenance of BGP sessions draft-dubois-bgp-pm-reqs-02.txt
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
CAPWAP Arch-Draft Issues IETF 59, Seoul 4 March 2004.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier March 20, 2003.
1 Multicast Routing Blackhole Avoidance draft-asati-pim-multicast-routing-blackhole-avoid-00 Rajiv Asati Mike McBride IETF 72, Dublin.
Chapter 21 Multicast Routing
Slide 1 July 2006, Montreal, QuebecIETF DNSEXT 2929bis Donald E. Eastlake 3 rd
Link-local security J.W. Atwood, S. Islam PIM Working Group 2007/12/04
Moving towards an IRS WG Charter Ross Callon IETF 85, Atlanta.
SIP Events: Changes and Open Issues IETF 50 / SIP Working Group Adam Roach
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
What do we put in the TED? Which TE links from the network should appear in the Traffic Engineering Database at a Label Switching Router? An attempt to.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
March th IETF - Prague1 TRILL Working Group Changes from draft-trill-rbridge-protocol-02.txt to draft-trill-rbridge-protocol-03.txt Dinesh Dutt,
November 2006IETF TRILL WG1 TRILL Working Group draft-gai-perlman-trill-encap-00.txt as modified by Radia Ed Bowen, IBM Dinesh Dutt, Cisco Silvano Gai,
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
TRILL T RANSPARENT T RANSPORT OVER MPLS draft-muks-trill-transport-over-mpls-00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong.
Open issues with PANA Protocol
Trill Parent node shift, Mitigation. IETF 97, Seoul.
Thierry Ernst (INRIA and WIDE) Hesham Soliman (Ericsson)
© 2002, Cisco Systems, Inc. All rights reserved.
Revisiting Ethernet: Plug-and-play made scalable and efficient
(How the routers’ tables are filled in)
Les Ginsberg Stefano Previdi Peter Psenak Martin Pilka
Month 2002 doc.: IEEE /xxxr0 November 2004 Routing and Rbridges
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
Additional TRILL Work/Documents
Zhenbin Li, Shunwan Zhuang Huawei Technologies
Multi-server Namespace in NFSv4.x Previous and Pending Updates
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
BPSec: AD Review Comments and Responses
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

TRILL RBridge Architecture Changes prior to IETF-67 Issues and Future Work Eric Gray, Ericsson

Changes in Recent Iterations Many minor wording changes: –Based on comments from Donald (mostly) and one or two others; –Specifically detailed in on the list in mid- September. Added text describing the “wiring-closet” problem and issues with it.

Issues to Be Addressed A few issues (requiring clarification) came up in review comments and on the mailing list. –Do we want to address the “wiring closet” problem? –Interaction with non-cooperating RBridges – why forward RBridge control frames if the local RBridge cannot consume them? –Issues with the use of TTL – particularly for non-unicast or flooded traffic –CFT, CFT-IRT and how many trees? –Scalability, ECMP, BCN, etc. –Do RBridges replace bridges, or routers? –Optimality verses Orthogonality –Drop verses process BPDUs Hopefully, we will soon come to closure on these issues.

CRED Wiring Closet Problem (Review) B-1 B-2 RB-1 RB-2 RB’ How to ensure that links A and B get used? Do we want to solve this, or is this something we “solve” by suggesting that B-1 and B-2 should be RBridges as well? Depends entirely on RBridge complexity (cost). A B

Non-Cooperating RBridges Whether or not there is any intention (or use- case) for deliberately non-cooperating RBridges, it is possible that this will occur. The fact that we will be required to define security requirements for the protocol, and these will include (at least) authentication, it is actually likely that this will occur in a few deployment scenarios. The solution must be robust against this occurrence. The current wording in the architecture draft is intended to reflect this.

RB-3 RB-2 RB-4 RB-5 RB-1 RB-6 In any arbitrary topology involving the above RBridges, if RB-1 is either misconfigured, or out of sync with the other RBridges, it must appear to be “transparent” relative to the peer discovery protocol. If it is transparent, then the peers will discover each other RB-1 is the (trivial) “solitary RBridge deployment” scenario – a scenario which must work in any case – and the solution is robust.

RB-3 RB-2 RB-4 RB-5 RB-1 RB-6 RB-7 Similarly, if there is more than one RBridge identically misconfigured, or out of sync, the solution is robust. This is true because similarly configured RBridges will cooperate with each other, forming disjoint – but overlapping – CREDs and all non-cooperating RBridges will be transparent to each other.

RB-3 RB-2 RB-4 RB-5 RB-1 RB-6 RB-7 Finally, without loss of generality, this can be shown to apply to any arbitrary combination of two or more differently configured RBridges. At one extreme, you have an arbitrary collection of independent – stand-alone RBridges in the “solitary RBridge deployment” scenario. At the other, multiple CREDs that are each transparent to all others.

TTL Issues Use of TTL appears to be adequate for the unicast delivery case. What about for non-unicast and flooded traffic? –TTL is most likely not adequate, without requiring other forms of mitigation. –Need to modify the architecture draft to say something about this. What approach does the WG advocate? –Use spanning tree for the non-unicast/flooded case; –Use a purge-or-mark approach with the CFT-IRT in the event of a topology change; –Require routing based loop avoidance techniques; –Require other loop mitigation techniques; –Some combination of the above?

CFT, CFT-IRT and How Many Trees? Do we use a per-ingress IRT (Ingress RBridge Tree), using SPF routing (similar to unicast), or some subset of this in the form of multiple spanning trees? Applies only to non-unicast and flooded traffic forwarding. Apparently driven – in part – by the need to distribute traffic across multiple paths.

RB-3RB-2RB-4RB-5RB-1 RB-12 RB-9 RB-8 RB-10RB-11 RB-7RB-6 RB-13 RB-14 RB-15

Scalability Scalability: –This was essentially “tabled” as a requirement because (for one thing) it seemed unlikely we would be able to achieve anything like rough consensus on specific goals beyond a simple “not worse, and possibly better” goal. –Is there a sense that we need to take this on as a chartered goal?

ECMP ECMP, multiple shared trees or other forms of multi-pathing –The wording in the charter is currently unclear and appears to include this as a goal. –Is this – in fact – a goal, or is the wording meant simply to indicate that an SPF-based solution is preferred based on link-utilization considerations? –What are the use-cases that drive this as a requirement – especially in light of the other goals of the TRILL WG?

BCN A relatively new technology and proposed requirement. Only works in “compatible cloud” scenario Has inconsistent potential impacts on the RBridge solution –It’s unreasonable to require BCN capable RBridges to keep MAC reachability information because of the potential scaling issues involved. –Yet BCN only works in small domains where the total control-plane propagation delay is less than a milisecond. –Can we have “scaling issues” in small networks?

Do RBridges Represent the Future of Routers, or Bridges? Several recent proposals appear to want to put functionality that is typically provided by routers, into RBridges –Policy based forwarding –ACLs –Firewall A few recent posts on the mailing list suggest that the TRILL solution should be based on the needs of customers who are looking to replace the routers in their networks with RBridges. I am reasonably sure that is not what we intend, but the WG needs to make this clear – one way or the other.

Optimality verses Orthogonality RBridge protocols and encapsulations would – ideally – be treated as orthogonal to other protocols (routing, bridging) and encapsulations (802.3, 802.1Q). Similar observations have been made relative to multicast protocols (PIM, IGMP). In many cases (so far), the WG appears to be consistently leaning in the direction of optimization verses orthogonality – in spite of issues relating to: –protocol complexity; –getting to specification closure.

Drop verses Process BPDU The intention was not to explicitly specify how RBridge implementations would be required to “keep an eye out for topology changes” – –“Snooping” BPDUs is allowed (because it is not explicitly forbidden), –Other methods might be used. Some people feel that explicit specification is required. A new proposal is on the table that suggests: –rejecting the “co-located bridge model” and –employing RBridges as STP participants that still terminate an STP “domain”

Still to Be Done Clarify tunnel injection text (section 3.2.3). Address recent comments from Silvano, et al: –Modify/clarify definitions; –Clarify architectural issues relating to traffic loops; –Other changes still being discussed. Potentially make (possibly extensive) changes to address new requirements recently proposed on the mailing list. Potentially address pending comments (from Donald) Address any comments that may come out of IEEE expert review. Complete WG Last Call.