TRILL working group L. Dunbar
Internet Draft D. Eastlake
Intended status: Standard Track Huawei
Expires: Sept 2012 Radia Perlman
Intel
I. Gashinsky
Yahoo
October 23, 2011
Directory Assisted TRILL Encapsulation
draft-dunbar-trill-directory-assisted-encap-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 23, 2009.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Dunbar Expires April 23, 2012 [Page 1]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the BSD License.
Abstract
This draft describes how data center network can benefit from non-
RBridge nodes performing TRILL encapsulation and how directory
service can assist a non-RBridge node to encapsulate TRILL header.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 0.
Table of Contents
1. Introduction ................................................ 2
2. Terminology ................................................. 3
3. Directory assistance on Non-RBridge ..........................4
4. Source Nickname in frames encapsulated by non-RBridge nodes...6
5. Conclusion and Recommendation................................ 6
6. Manageability Considerations................................. 6
7. Security Considerations...................................... 6
8. IANA Considerations ......................................... 6
9. Acknowledgments ............................................. 7
10. References ................................................. 7
Authors' Addresses ............................................. 7
Intellectual Property Statement................................. 8
Disclaimer of Validity ......................................... 9
1. Introduction
It is no longer uncommon for a data center to have thousands of
server racks. Those thousands of server racks could be connected by
multiple groups of aggregation switches, with each group connecting
hundreds of ToR switches. For servers supporting virtualization,
there could be a virtual switch embedded in each server.
When TRILL is deployed in those data centers, there are issues no
matter where RBridge domain boundary starts. If RBridge domain
boundary starts at aggregation switch level, the RBridge's IS/IS
routing scale well, but with the associated issues of allowing only
one (AF port) of multiple ports connected to a bridged LAN for
forwarding traffic and requiring each RBridge edge to maintain a
Dunbar Expires Sept23, 2012 [Page 2]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
very large table of MAC&VLAN<-> RBridgeEdge mapping. If the RBridge
domain boundary starts closer to hosts, e.g. at the virtual switches
on servers, the number of MAC&VLAN<->Edge mapping is much smaller
because each virtual switch only needs to maintain the mapping for
remote hosts which actually communicate with the embedded VMs. But
then, the number of nodes in RBridge IS/IS domain is very large,
making it not scale well especially on aggregation switches which
need to advertise link state over hundreds of ports.
[RBridge-directory] introduces a method for RBridge edge to get
MAC&VLAN<->RBridgeEdge mapping from directory service in data center
environment instead of flooding unknown DAs across TRILL domain.
When directory is used, any nodes, even non-RBridge nodes, can
perform the TRILL encapsulation. This draft is to demonstrate the
benefits of non-RBridge nodes performing TRILL encapsulation.
2. Terminology
AF Appointed Forwarder RBridge port
Bridge: IEEE 802.1Q compliant device. In this draft, Bridge is used
interchangeably with Layer 2 switch.
DA: Destination Address
DC: Data Center
EoR: End of Row switches in data center. Also known as
Aggregation switches in some data centers
FDB: Filtering Database for Bridge or Layer 2 switch
Host: Application running on a physical server or a virtual
machine. A host usually has at least one IP address and at
least one MAC address.
SA: Source Address
ToR: Top of Rack Switch in data center. It is also known as
access switches in some data centers.
VM: Virtual Machines
Dunbar Expires Sept23, 2012 [Page 3]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
3. Directory assistance on Non-RBridge
With directory assistance [RBridge-Directory], a non-RBridge can
determine if a packet should be forwarded across RBridge domain.
Suppose RBridge domain boundary starts at network switches (i.e. not
virtual switches embedded on servers), directory can assist Virtual
Switches embedded in servers to encapsulate proper TRILL header if
the data frames' targers are attached to different RBridge edges.
\ +-------+ +------+ TRILL Domain/
\ +/------+ | +/-----+ | /
\ | Aggr11| + ----- |AggrN1| + /
\ +---+---+/ +------+/ /
\ / \ / \ /
\ / \ / \ /
\ +---+ +---+ +---+ +---+ /
\- |T11|... |T1x| |T21| ? |T2y|---
+---+ +---+ +---+ +---+
| | | |
+-|-+ +-|-+ +-|-+ +-|-+
| |... | V | | V | ? | V |<-Virtual Switch
+---+ +---+ +---+ +---+
| |... | V | | V | ? | V |
+---+ +---+ +---+ +---+
| |... | V | | V | ? | V |
+---+ +---+ +---+ +---+
Figure 1: TRILL domain in typical Data Center Network
When a TRILL encapsulated data packet reaches an ingress RBridge
node, the ingress RBridge can simply forward the pre-encapsulated
packet to the egress RBridge whose nickname is in the DA field of
the TRILL header. By doing so, ingress RBridge will not receive
packets with unknown DA, therefore, it won't need to flood received
data packets to all other ports. That means there is no need to
designate one AF port and all RBridge edge ports connected to one
bridged LAN can receive and forward traffic, which greatly improves
the overall network utilization.
[RBridge] Section 4.6.2 Bullet 8 specifies that an RBridge port can
be configured to accept both TRILL encapsulated frames from a
neighbor that is not an RBridge.
When data frames do not need to traverse RBridge domain, they are
switched by all nodes/ports per IEEE802.1Q and RBridge edge will not
forward native Ethernet frames across RBridge domain.
Dunbar Expires Sept23, 2012 [Page 4]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
When a TRILL frame arrives at an RBridge whose Nickname matches with
the destination nickname in the frame, the processing is exactly
same as regular RBridge, i.e. decapsulating the TRILL header of the
received TRILL frame and forwarding the decapsulated Ethernet frame
to the host attached to its edge ports.
We call a node which only performs the TRILL encapsulation but
doesn't participate in RBridge's IS/IS routing a ''TRILL
Encapsulating node'' or ''Simplified RBridge''. The TRILL Encapsulating
Node gets the MAC&VLAN<->RBridgeEdge mapping table pushed down or
pulled from directory servers [RBridge-directory]. Upon receiving a
native Ethernet frame, the TRILL Encapsulating Node checks the
MAC&VLAN<->RBridgeEdge mapping table, and perform the corresponding
TRILL encapsulation if the entry is found in the mapping table. If
the destination address and VLAN of the received Ethernet frame
doesn't exist in the mapping table, the Ethernet frame is forwarded
per IEEE802.1Q.
+---------------+
|Outer Ether hd |
|---------------|
|TRILL Header |
|---------------| ^
| MAC-400 | |
|---------------| Inner Ether Header
| MAC-1 | |
|---------------| V
| |
|---------------|
| Payload |
|---------------|
| Ethernet FCS |
+---------------+
^
| +-------+ TRILL +------+
| | R1 |-----------| R2 | Decapsulate TRILL
| +---+---+ domain +------+ header
| | |
+----------| |
| |
+-----+ +-----+
Non-RBridge node:|T12 | | T22 |
Encapsulate TRILL+-----+ +-----+
Header for data
Frames to traverse
TRILL domain.
Dunbar Expires Sept23, 2012 [Page 5]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
4. Source Nickname in frames encapsulated by non-RBridge nodes
TRILL header includes Source RBridge's Nickname and Destination
RBridge's Nickname. When a TRILL header is added by a non-RBridge
node, using the Ingress RBridge edge node's nickname in the source
address field will make the ingress RBridge node receive TRILL
frames with its own nickname in the frames' source address field,
which can be confusing.
To avoid confusion of edge RBridges receiving TRILL encapsulated
frames with its own nickname in the frames' source address field
from neighboring non-RBridge nodes, a new nickname can be given to
an RBridge edge node, e.g. Phantom Nickname, to represent all the
TRILL Encapsulating Nodes attached to the RBridge edge node.
When the Phantom Nickname is used in the Source Address field of a
TRILL frame, it is understood that the TRILL encapsulation is
actually done by a non-RBridge node which is attached to an edge
port of an RBridge Ingress node.
5. Conclusion and Recommendation
Virtual switches on servers, also known as hypervisors, are becoming
more popular as server technology advances. It is relatively easier
for virtual switches, which is usually software based switch, to get
directory assistance and perform network address encapsulation.
However, for a data center with very large number of servers, it
doesn't scale to have all the servers to participate in RBridge's
IS/IS routing.
Therefore, we suggest TRILL to consider directory assisted non-
RBridge encapsulation approach.
6. Manageability Considerations
TBD.
7. Security Considerations
TBD.
8. IANA Considerations
TBD
Dunbar Expires Sept23, 2012 [Page 6]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
9. Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot.
10. References
[RBridge-Directory] Dunbar, et, al ''Directory Assisted RBridge
Edge'', <draft-dunbar-trill-directory-assisted-edge-02.txt>, Oct,
2011
[RBridges] Perlman, et, al ''RBridge: Base Protocol Specification'',
<draft-ietf-trill-rbridge-protocol-16.txt>, March, 2010
[RBridges-AF] Perlman, et, al ''RBridges: Appointed Forwarders'',
<draft-ietf-trill-rbridge-af-02.txt>, April 2011
[ARMD-Problem] Dunbar, et,al, ''Address Resolution for Large Data
Center Problem Statement'', Oct 2010.
[ARP reduction] Shah, et. al., "ARP Broadcast Reduction for Large Data
Centers", Oct 2010
Authors' Addresses
Linda Dunbar
Huawei Technologies
1700 Alma Drive, Suite 500
Plano, TX 75075, USA
Phone: (972) 543 5849
Email: ldunbar@huawei.com
Dunbar Expires Sept23, 2012 [Page 7]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
Donald Eastlake
Huawei Technologies
155 Beaver Street
Milford, MA 01757 USA
Phone: 1-508-333-2270
Email: d3e3e3@gmail.com
Radia Perlman
Intel Labs
2200 Mission College Blvd.
Santa Clara, CA 95054-1549 USA
Phone: +1-408-765-8080
Email: Radia@alum.mit.edu
Igor Gashinsky
Yahoo
45 West 18th Street 6th floor
New York, NY 10011
Email: igor@yahoo-inc.com
Intellectual Property Statement
The IETF Trust takes no position regarding the validity or scope of
any Intellectual Property Rights or other rights that might be
claimed to pertain to the implementation or use of the technology
described in any IETF Document or the extent to which any license
under such rights might or might not be available; nor does it
represent that it has made any independent effort to identify any
such rights.
Copies of Intellectual Property disclosures made to the IETF
Secretariat and any assurances of licenses to be made available, or
the result of an attempt made to obtain a general license or
permission for the use of such proprietary rights by implementers or
users of this specification can be obtained from the IETF on-line
IPR repository at http://www.ietf.org/ipr
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
any standard or specification contained in an IETF Document. Please
address the information to the IETF at ietf-ipr@ietf.org.
Dunbar Expires Sept23, 2012 [Page 8]
Internet-Draft Directory Assisted TRILL Encapsulation March 2011
Disclaimer of Validity
All IETF Documents and the information contained therein are
provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION
HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY,
THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Dunbar Expires Sept23, 2012 [Page 9]