TRILL: Pseudo-Nickname for Active-Active Access
draft-ietf-trill-pseudonode-nickname-03

The information below is for an old version of the document
Document Type Active Internet-Draft (trill WG)
Authors Hongjun Zhai  , Tissa Senevirathne  , Radia Perlman  , Mingui Zhang  , Li Yizhou 
Last updated 2015-02-18
Replaces draft-hu-trill-pseudonode-nickname
Stream IETF
Intended RFC status Proposed Standard
Formats pdf htmlized (tools) htmlized bibtex
Reviews
Stream WG state WG Consensus: Waiting for Write-Up
Doc Shepherd Follow-up Underway
Document shepherd Donald Eastlake
IESG IESG state I-D Exists
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)
TRILL Working Group                                              H. Zhai
Internet-Draft                                                       JIT
Intended Status: Standards Track                         T. Senevirathne
Expires: August 22, 2015                                   Cisco Systems
                                                              R. Perlman
                                                                     EMC
                                                                M. Zhang
                                                                   Y. Li
                                                     Huawei Technologies
                                                       February 17, 2015

            TRILL: Pseudo-Nickname for Active-Active Access 
                draft-ietf-trill-pseudonode-nickname-03

Abstract

   The IETF TRILL (TRansparent Interconnection of Lots of Links)
   protocol provides support for flow level multi-pathing for both
   unicast and multi-destination traffic in networks with arbitrary
   topology. Active-active access at the TRILL edge is the extension of
   these characteristics to end stations that are multiply connected to
   a TRILL campus as discussed in RFC 7379. In this document, the edge
   RBridge (TRILL switch) group providing active-active access to such
   an end station are represented as a Virtual RBridge. Based on the
   concept of Virtual RBridge along with its pseudo-nickname, this
   document specifies a method for TRILL active-active access by such
   end stations.

Status of This Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html
 

H. Zhai, et al                                                  [Page 1]
INTERNET DRAFT              Pseudo-Nickname                February 2015

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

Copyright and License Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1. Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  4
     1.1. Terminology and Acronyms  . . . . . . . . . . . . . . . . .  5
   2. Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   3. Virtual RBridge and its Pseudo-nickname . . . . . . . . . . . .  8
   4. Member RBridges Auto-Discovery  . . . . . . . . . . . . . . . .  9
     4.1. Discovering Member RBridge for an RBv . . . . . . . . . . .  9
     4.2. Selection of Pseudo-nickname for RBv  . . . . . . . . . . . 12
   5. Distribution Trees and Designated Forwarder . . . . . . . . . . 13
     5.1. Different Trees for Different Member RBridges . . . . . . . 13
     5.2. Designated Forwarder for Member RBridges  . . . . . . . . . 14
     5.3. Ingress Nickname Filtering  . . . . . . . . . . . . . . . . 17
   6. TRILL Traffic Processing  . . . . . . . . . . . . . . . . . . . 17
     6.1. Native Frames Ingressing  . . . . . . . . . . . . . . . . . 17
     6.2. Egressing TRILL Data Packets  . . . . . . . . . . . . . . . 18
       6.2.1. Unicast TRILL Data Packets  . . . . . . . . . . . . . . 18
       6.2.2. Multi-Destination TRILL Data Packets  . . . . . . . . . 19
   7. MAC Information Synchronization in Edge Group . . . . . . . . . 20
   8. Member Link Failure in RBv  . . . . . . . . . . . . . . . . . . 20
     8.1. Link Protection for Unicast Frame Egressing . . . . . . . . 21
   9. TLV Extensions for Edge RBridge Group . . . . . . . . . . . . . 22
     9.1. PN-LAALP-Membership APPsub-TLV  . . . . . . . . . . . . . . 22
     9.2. PN-RBv APPsub-TLV . . . . . . . . . . . . . . . . . . . . . 23
     9.3. PN-MAC-RI-LAALP Boundary APPsub-TLVs  . . . . . . . . . . . 24
Show full document text