Skip to main content

Centralized Replication for BUM traffic in active-active edge connection
draft-hao-trill-centralized-replication-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Authors Hao Weiguo , Yizhou Li , Tao Han
Last updated 2013-12-10
Replaced by draft-ietf-trill-centralized-replication, draft-ietf-trill-centralized-replication, draft-ietf-trill-centralized-replication
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-hao-trill-centralized-replication-00
TRILL                                                        Weiguo Hao
                                                              Yizhou Li
                                                                Tao Han
Internet Draft                                                   Huawei
Intended status: Standards Track                       December 11,2013
Expires: June 2014

Centralized Replication for BUM traffic in active-active edge connection
              draft-hao-trill-centralized-replication-00.txt
       

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, and it may not be
   published except as an Internet-Draft.

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, except to publish it
   as an RFC and to translate it into languages other than English.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November 10,
   2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any

Hao & Li,etc            Expires June 11, 2014                 [Page 1]
Internet-Draft Centralized replication for BUM traffic        June 2014

   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on June 11, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document. Code Components extracted from this document must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions and are provided without warranty as described in
   the Simplified BSD License.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document.

Abstract

   In TRILL active-active access scenario, RPF check failure issue may
   occur when pseduonode nickname mechanism in [TRILLPN] is used. This
   draft is to solve RPF check failure issue through centralized
   replication for BUM traffic solution. The basic idea is that all
   ingress RBs send BUM traffic to a centralized node through unicast
   TRILL encapsulation, the centralized node decapsulates the unicast
   TRILL packet. Then the centralized node searches its multicast
   forwarding table to replicates a copy of the BUM traffic to
   destination RBs through TRILL unicast encapsulation. Through
   centralized replication solution, only unicast forwarding behavior is
   required between edge RB and centralized RB, so no RPF check function

Hao & Li,etc            Expires June 11, 2014                 [Page 2]
Internet-Draft Centralized replication for BUM traffic        June 2014

   is required on any device in TRILL campus through centralized
   replication solution and no RPF check failure issue occurs.

Table of Contents

   1. Introduction ................................................. 3
   2. Conventions used in this document............................. 5
   3. Centralized Replication Solution Overview .................... 5
   4. Centralized Replication Forwarding Process.................... 6
   5. Multicast forwarding table generation on the centralized node .7
   6. BUM traffic loadbalancing among multiple centralized nodes ... 9
   7. Link failure process ......................................... 9
   8. Node Failure Process ........................................ 10
   9. Enhanced Solution ........................................... 10
   10. Network Migration Analysis.................................. 11
   11. TRILL protocol extension ................................... 11
   12. Security Considerations..................................... 12
   13. IANA Considerations ........................................ 12
   14. References ................................................. 12
      14.1. Normative References .................................. 12
      14.2. Informative References................................. 12
   15. Acknowledgments ............................................ 13

1. Introduction

   The IETF TRILL (Transparent Interconnection of Lots of Links)
   [RFC6325] protocol provides loop free and per hop based multipath
   data forwarding with minimum configuration. TRILL uses IS-IS [RFC6165]
   [RFC6326bis] as its control plane routing protocol and defines a
   TRILL specific header for user data.

   Customer edge(CE) devices typically are multi-homed to several
   RBridges which form an edge group. All of the uplinks of CE is
   considered as an Multi-Chassis Link Aggregation (MC-LAG) bundle. An
   active-active flow-based load-sharing mechanism is implemented to
   achieve better load balancing and high reliability. A CE device can
   be a layer3 end system by itself or a bridge switch through which
   layer3 end systems are accessed to TRILL campus.

   In active-active access scenario, pseduonode nickname solution can be
   used to avoid mac flip-flop on remote RBs. The basic idea is to
   represent all member links of the MC-LAG as a virtual RBridge with
   single pseduonode nickname. Any member RBridge of the MC-LAG should
   use this pseduonode nickname rather than its own nickname as ingress
   nickname when inject TRILL data frames. It solves the abovementioned

Hao & Li,etc            Expires June 11, 2014                 [Page 3]
Internet-Draft Centralized replication for BUM traffic        June 2014

   problems pretty well; however, it introduces another issue: packet
   drop due to RPF check.

   This document proposes a centralized replication solution for
   broadcast, unknown unicast, multicast(BUM) traffic to solve the issue
   of packet drop due to RPF check. The basic idea is that all ingress
   RBs send BUM traffic to a centralized node through unicast TRILL
   encapsulation, the centralized node decapsulates the unicast TRILL
   packet. Then the centralized node searches its multicast forwarding
   table to replicates a copy of the BUM traffic to destination RBs
   through TRILL unicast encapsulation. Through centralized replication
   solution, only unicast forwarding behavior is required between edge
   RB and centralized RB, so no RPF check function is required on any
   device in TRILL campus through centralized replication solution and
   no RPF check failure issue occurs.

                                      |-------|

                                      | COR   |

                       *  ************|       |*****************

                     *                |-------|                 *

                   *                                             *

                *                                                  *

               *                   TRILL Campus                      *

             *                                                         *

            *                                                           *

           *                                                              *

          *                                                                 *

         *                                                                    *

        *                                                                      *

        *                                                                      *

Hao & Li,etc            Expires June 11, 2014                 [Page 4]
Internet-Draft Centralized replication for BUM traffic        June 2014

   |-------|   |-------|   |-------|        |-------|   |-------|           |-------|

   |  RB1  |   | RB2   |   | RB3   |        |  RB4  |   |  RB5  |           |  RB6  |

   |       |***|       |***|       | *******|       |***|       |***********|       |

   |-------|   |-------|   |-------|        |-------|   |-------|           |-------|

         -         -          -  -              -            -                   -

           -       -        -    -               -          -                    -

             -     -      -      -                -       -                      -

               -   -    -        -                 -     -                       -

               |-------|     |-------|            |-------|                   |-------|

               |  CE1  |     |  CE2  |            |  CE3  |                   |  CE4  |

               |       |     |       |            |       |                   |       |

               |-------|     |-------|            |-------|                   |-------|

                     Figure 1  TRILL active-active access

2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
   NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
   this document are to be interpreted as described in RFC 2119
   [RFC2119].The acronyms and terminology in [RFC6325] is used herein
   with the following additions:

   CE - customer equipment. Could be a bridge or end station.

3. Centralized Replication Solution Overview

   When an edge RB receives BUM traffic from CE device, it acts as
   ingress RB and uses unicast TRILL encapsulation instead of multicast
   TRILL encapsulation to send the traffic to a centralized node.

   The TRILL header of the unicast TRILL encapsulation contains an
   "ingress RBridge nickname" field and an "egress RBridge nickname"
   field. If ingress RB participates active-active access connection,

Hao & Li,etc            Expires June 11, 2014                 [Page 5]
Internet-Draft Centralized replication for BUM traffic        June 2014

   the ingress RBridge nickname should be set as pseduonode nickname to
   avoid mac flip-flop on remote RBs, otherwise the ingress nickname
   should be set as its own nickname. The egress RBridge nickname is the
   nickname of the centralized node.

   When the centralized node receives the unicast TRILL encapsulated BUM
   traffic from ingress RB, the node decapsulates the packet. Then the
   centralized node searches its multicast forwarding table to replicate
   a copy of the BUM traffic to destination RBs through TRILL unicast
   encapsulation. Ingress nickname for the TRILL unicast encapsulation
   is unchangeable and is still the nickname of ingress RB. Egress
   nickname for each copy of TRILL unicast encapsulation is the nickname
   corresponds to each destination RB. The destinations are all edge RBs
   except the ingress RB itself. If ingress RB participates active-
   active access connection, the virtual RB that represent all member
   links of the MC-LAG acts as real ingress RB and the physical multi-
   homed edge RB acts as transit RB, the destinations RBs should exclude
   the virtual RB.

   If destination RB participates active-active access connection, the
   egress nickname in TRILL unicast encapsulation should be set as
   pseduonode nickname to represent a MC-LAG corresponding a multi-homed
   destination CE device, the TRILL unicast encapsulation BUM traffic
   will reach destination CE device through any one of multi-homed edge
   RBs to realize flow-based loadbalancing.

   To differentiate the unicast TRILL encapsulation BUM traffic from
   normal unicast TRILL traffic, a special nickname on centralized node
   should be used exclusively for centralized replication. Only when
   centralized node receives unicast TRILL encapsulation traffic with
   egress nickname equivalent to the special nickname, the node does
   TRILL decapsulaton and performs corresponding replication procedures.
   The centralized nodes should announce its special use nickname to all
   TRILL campus.

   In default mode BUM traffic on edge RB is forwarded along
   distribution tree established by TRILL base protocol. If at least a
   centralized node exists in TRILL campus, ingress RB can use the
   centralized replication mode instead of default mode to forward BUM
   traffic to TRILL campus.

4. Centralized Replication Forwarding Process

   As described in figure1, CE1 is multi-homed to RB1,RB2 and RB3 in
   active-active mode, CE2 is single homed to RB3, CE3 is multi-homed to
   RB4, RB5 in active-active mode, CE4 is single homed to RB6.
   CE1,CE2,CE3 and CE4 belong to same CE-VLAN. COR is a centralized

Hao & Li,etc            Expires June 11, 2014                 [Page 6]
Internet-Draft Centralized replication for BUM traffic        June 2014

   replication node which can forward all BUM traffic in the TRILL
   campus. The pseduonode nickname corresponds to CE1 is p-nickname1.
   The pseduonode nickname corresponds to CE3 is p-nickname2. The
   nicknames of RB1 to RB6 are nickname1 to nickname6. The nickname on
   COR for centralized replication is S-nickname, the nickname on COR
   for normal unicast TRILL forwarding is N-nickname.

   The BUM traffic forwarding process from CE1 to CE2,CE3 and CE4 is as
   follows:

   1. CE1 sends BUM traffic to RB2.

   2. RB2 sends the BUM traffic to COR device through unicast TRILL
      encapsulation. Ingress nickname is set as p-nickname1, egress
      nickname is set as S-nickname.

   3. COR decapsulates unicast TRILL encapsulation. Then the centralized
      node searches its multicast forwarding table to replicate a copy
      of the BUM traffic to CE2,CE3 and CE4 through unicast TRILL
      encapsulation. The egress nickname of the traffic to CE2 is set as
      nickname3, the egress nickname to CE3 is set as p-nickname2, while
      the egress nickname of the traffic to CE4 is set as nickname6.
      Ingress nickname is p-nickname1.

   4. RB3 receives the unicast TRILL encapsulation BUM traffic from COR.
      It decapsulates the unicast TRILL packet. Because ingress nickname
      of p-nickname1 is equivalent to the nickname of local MC-LAG
      connecting CE1, RB3 doesn't forward the packet to CE2 to avoid
      loop. RB3 only forwards the packet to CE3.

   5. RB4(or RB5) receives the unicast TRILL encapsulation BUM traffic
      from COR. It decapsulates the unicast TRILL packet, then forwards
      the packet to CE2. The MAC of CE1 associated with p-nickname1 is
      learned on RB4(or RB5).

   RB6 receives the unicast TRILL encapsulation BUM traffic from COR1.
   It decapsulates the unicast TRILL packet, then forwards the packet to
   CE3. The MAC of CE1 associated with p-nickname1 is learned on RB6.

5. Multicast forwarding table generation on the centralized node

   There are two kinds of multicast forwarding tables of pruned and un-
   pruned on centralized node. Through un-pruned multicast forwarding
   table, all edge RBs are connected through the centralized node, BUM
   traffic from any one ingress RB is sent to all other edge RBs exclude
   ingress RB, some egress RB maybe receive extra BUM traffic if the RB
   has no local BUM traffic receiver.

Hao & Li,etc            Expires June 11, 2014                 [Page 7]
Internet-Draft Centralized replication for BUM traffic        June 2014

   To save the link bandwidth in TRILL campus, pruned multicast
   forwarding table should be used. The multicast forwarding table that
   connecting all edge RBs should be pruned based on CE-VLAN,
   centralized node relies on the pruned multicast table to replicate
   and forward BUM traffic to each destination RB that have the same
   VLAN attached. Similarly, the multicast forwarding table also can be
   pruned based on FGL or multicast group.

   Centralized node makes a local decison on whether to generate a
   pruned or un-pruned multicast forwarding table.There is only one
   forwarding item in un-pruned multicast forwarding table. No key is
   required for un-pruned multicast forwarding table. There are multiple
   multicast forwarding items in pruned multicast forwarding table and
   each item corresponds to a CE-VLAN(or FGL/Multicast group). For
   pruned multicast forwarding table, the key is CE-VLAN(or
   FGL/Multicast group) which is obtained from original BUM traffic.

   Centralized node relies on TRILL based protocol to acquire edge RB
   information and generate multicast forwarding tables. Each edge
   RBridge specifies the VLAN it is interested in the Interested VLANs
   and Spanning Tree Roots (INT-VLAN) sub-TLV [RFC6326],while the
   Multicast Group it is interested is specified in The Group Address
   TLV [RFC6326]. Centralized node can learn all access VLAN and
   multicast group information from edge RBs.

                        +----------+---------------------+

                         |   vlan  | egress nickname list|

                         +---------+---------------------+

                         |   1     |                     |

                         +---------+---------------------+

                         |   2     |                     |

                         +---------+---------------------+

                         |   ...   | ...                 |

                         +---------+---------------------+

                         |   4K    | ...                 |

                         +---------+---------------------+

Hao & Li,etc            Expires June 11, 2014                 [Page 8]
Internet-Draft Centralized replication for BUM traffic        June 2014

     Figure 2   VLAN pruning multicast forwarding table on the centralized node

6. BUM traffic loadbalancing among multiple centralized nodes

   To support unicast TRILL encapsulation traffic loadbalancing,
   multiple RBs can serve as centralized replication node and the
   traffic can be loadbalanced on these RBs in flow-based mode.

   To support flow-based loadbalancing for BUM traffic between different
   centralized node, virtual centralized node mechanism should be
   introduced. The virtual centralized node is logically directly
   connected to both physical centralized node with equal link cost, BUM
   traffic special use nickname is attached to this virtual centralized
   node.

   The egress nickname of unicast TRILL encapsulation for BUM traffic
   from ingress RB is the special use nickname attached to the virtual
   centralized node. The unicast TRILL encapsulation BUM traffic is
   transmitted in TRILL campus hop by hop until it reaches any one of
   the physical centralized node that logically connecting to the
   virtual centralized node. The physical centralized node will
   decapsulate the unicast TRILL encapsulation and performs centralized
   replication multicast forwarding procedures. Because ECMP of the
   unicast TRILL encapsulation BUM traffic is supported, so it can
   achieve better link bandwidth usage than VLAN-based(or FGL-based,etc)
   loadbalancing.

7. Link failure process

   For member RBridges of a virtual RBridge occurs link (all member link
   of LAG) failure, the member RBridge should announce disconnection
   between this node and pseudonode, the member RBridge leaves the
   virtual RBridge. If a pseduonode nickname only represents a MC-LAG ,
   because the member RBridge has left its corresponding virtual RBridge,
   so the unicast TRILL encapsulation BUM traffic with egress nickname
   equals to pseduonode nickname won't reach the member RBridge with
   failed access link, it can only reach normal member RBridges, the
   normal member RBridges then forward the original BUM traffic to local
   access link.

   If a pseduonode nickname represents multiple MC-LAG, the unicast
   TRILL encapsulation BUM traffic with egress nickname equals to
   Pseduonode nickname can reach the member RBridge with failed access
   link, to forward the BUM traffic to local access CE device, the
   member RBridge should tunnel the BUM traffic to any one of remaining
   normal RBridges in the virtual RBridge in unicast TRILL encapsulation,
   destination port ID should be specified in the encapsulation in order

Hao & Li,etc            Expires June 11, 2014                 [Page 9]
Internet-Draft Centralized replication for BUM traffic        June 2014

   to destination RBridge can forward BUM traffic only to a local port
   connecting to corresponding CE. This solution is complex, so the
   method which a Pseduonode nickname only represents single MC-LAG is
   suggested!

8. Node Failure Process

   If a member RBridges of a virtual RBridge occurs node failure, after
   TRILL network converges, the unicast TRILL encapsulation BUM traffic
   with egress nickname equals to pseduonode nickname won't reach the
   failed RBridge, it only reach any one of the remaining member
   RBridges of same virtual RBridge with the failed RBridge.

9. Enhanced Solution

   Centralized replication solution can be deployed with TRILL
   distribution tree mechanism defined in TRILL base protocol at the
   same time. In this case, distribution tree root node acts as the
   centralized replication node.

   Unicast TRILL encapsulation for BUM traffic is only used for ingress
   RB participating active-active connection to avoid RPF check failure
   issue. When a centralized node receives unicast TRILL encapsulation
   BUM traffic from the ingress RB, it decapsulates the unicast TRILL
   packet. Then it replicates and forwards the BUM traffic to all other
   destination RBs through any one of a distribution tree established
   per TRILL base protocol.

   Assuming the enhanced solution is used in the network of above
   figure1, the BUM traffic forwarding process from CE1 to CE2,CE3 and
   CE4 is as follows:

   1. CE1 sends BUM traffic to RB2.

   2. RB2 sends the BUM traffic to COR device through unicast TRILL
      encapsulation. Ingress nickname is set as p-nickname1, egress
      nickname is set as S-nickname.

   3. COR device decapsulates the unicast TRILL packet. Then it selects
      a distribution tree to forward the packet to all other destination
      RBs. The egress nickname in the trill header is the nickname of
      distribution tree root.

Hao & Li,etc            Expires June 11, 2014                [Page 10]
Internet-Draft Centralized replication for BUM traffic        June 2014

   4. RB3 receives multicast TRILL traffic from COR. It decapsulates the
      multicast TRILL packet. Because ingress nickname of p-nickname1 is
      equivalent to the nickname of local MC-LAG connecting CE1, RB3
      doesn't forward the packet to CE1 to avoid loop. RB3 only forwards
      the packet to CE2.

   5. RB3 receives multicast TRILL traffic from COR. It decapsulates the
      multicast TRILL packet. Then it forwards the packet to CE3. The
      MAC of CE1 associated with p-nickname1 is learned on RB4(or RB5).

   RB6 receives multicast TRILL traffic from COR. It decapsulates the
   multicast TRILL packet. Then it forwards the packet to CE4. The MAC
   of CE1 associated with p-nickname1 is learned on RB6.

10. Network Migration Analysis

   Centralized node should upgrade to support centralized replication
   process.

   Edge RBs participating centralized replication process also should
   upgrade, although the forwarding process is similar to normal head-
   end replication process.

   Transit nodes don't need upgrade.

11. TRILL protocol extension

   The Unicast BUM Nickname TLV is introduced to announce its special
   use nickname for centralized replication by centralized node. It is
   carried in an LSP PDU. Ingress RBs rely on the TLV to learn the
   egress nickname of TRILL unicast encapsulation for BUM traffic.

11.1. The Unicast BUM Nickname sub-TLV

           +-+-+-+-+-+-+-+-+

           |   Type        | (1 byte)

           +-+-+-+-+-+-+-+-+

           |   Length      | (1 byte)

           +-+-+-+-+-+-+-+-+-+-+-+--+

           |  Uni BUM Nickname      |  (4 bytes)

           +-+-+-+-+-+-+-+-+-+-+-+-+|

Hao & Li,etc            Expires June 11, 2014                [Page 11]
Internet-Draft Centralized replication for BUM traffic        June 2014

      o Type: Router Capability sub-TLV type, TBD (Uni-BUM-VLANs).

      o Length: indicates the length of Uni BUM Nickname field, it is a
   fixed value of 4.

      o Uni BUM Nickname: The nickname is exclusively used for
   centralized replication solution purpose. Ingress RBs use the
   nickname as egress nickname in trill header of unicast TRILL
   encapsulation for BUM traffic.

12. Security Considerations

   This draft does not introduce any extra security risks. For general
   TRILL Security Considerations, see [RFC6325].

13. IANA Considerations

   TBD

14. References

14.1. Normative References

   [1]     [RFC6165]  Banerjee, A. and D. Ward, "Extensions to IS-IS
         for Layer-2 Systems", RFC 6165, April 2011.

   [2]     [RFC6325] Perlman, R., et.al. "RBridge: Base Protocol
         Specification", RFC 6325, July 2011.

   [3]     [RFC6326bis] Eastlake, D., Banerjee, A., Dutt, D., Perlman,
         R., and A. Ghanwani, "TRILL Use of IS-IS", draft-eastlake-isis-
         rfc6326bis, work in progress.

14.2. Informative References

   [4]      [TRILLPN] Zhai,H., et.al., "RBridge: Pseduonode nickname",
         draft-hu-trill-pseudonode-nickname, Work in progress, November

         2011.

   [5]     [TRILAA] Li,Y., et.al., "Problems of Active-Active
         connection at the TRILL Edge", draft-yizhou-trill-active-
         active-connection-prob-00, Work in progress, July

         2013.

Hao & Li,etc            Expires June 11, 2014                [Page 12]
Internet-Draft Centralized replication for BUM traffic        June 2014

15. Acknowledgments

   The authors wish to acknowledge the important contributions of
   Xiaomin Wu.

Hao & Li,etc            Expires June 11, 2014                [Page 13]
Internet-Draft Centralized replication for BUM traffic        June 2014

   Authors' Addresses

   Weiguo Hao
   Huawei Technologies
   101 Software Avenue,
   Nanjing 210012
   China
   Phone: +86-25-56623144
   Email: haoweiguo@huawei.com

   Yizhou Li
   Huawei Technologies
   101 Software Avenue,
   Nanjing 210012
   China
   Phone: +86-25-56625375
   Email: liyizhou@huawei.com

   Tao Han
   Huawei Technologies
   101 Software Avenue,
   Nanjing 210012
   China
   Phone: +86-25-56623454
   Email: billow.han@huawei.com

Hao & Li,etc            Expires June 11, 2014                [Page 14]