TRILL working group                                         L. Dunbar
Internet Draft                                            D. Eastlake
Intended status: Standard Track                                Huawei
Expires: Sept 2012                                       Radia Perlman
                                                                Intel
                                                          I. Gashinsky
                                                                Yahoo
                                                      October 26, 2011


                  Directory Assisted TRILL Encapsulation
             draft-dunbar-trill-directory-assisted-encap-01.txt


Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with
   the provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on April 26, 2009.

Copyright Notice

   Copyright (c) 2011 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document.  Code Components extracted from this
   document must include Simplified BSD License text as described in



Dunbar                 Expires April 26, 2012                 [Page 1]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the BSD License.

Abstract

   This draft describes how data center network can benefit from non-
   RBridge nodes performing TRILL encapsulation and how directory
   service can assist a non-RBridge node to encapsulate TRILL header.

Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 0.

   The term ''TRILL'' and ''RBridge'' are used interchangeably in this
   document. The term ''subnet'' and ''VLAN'' are also used interchangeably
   because it is very common to map one subnet to one VLAN.

Table of Contents


   1. Introduction ................................................ 2
   2. Terminology ................................................. 3
   3. Directory assistance on Non-RBridge ......................... 4
   4. Source Nickname in frames encapsulated by non-RBridge nodes.. 6
   5. Conclusion and Recommendation ............................... 6
   6. Manageability Considerations ................................ 6
   7. Security Considerations ..................................... 6
   8. IANA Considerations ......................................... 6
   9. Acknowledgments ............................................. 7
   10. References ................................................. 7
   Authors' Addresses ............................................. 7
   Intellectual Property Statement................................. 8
   Disclaimer of Validity ......................................... 9

1. Introduction

   It is no longer uncommon for a data center to have thousands of
   server racks.  Those thousands of server racks could be connected by
   multiple groups of aggregation switches, with each group connecting
   hundreds of ToR switches. For servers supporting virtualization,
   there is typically a virtual switch embedded in each physical
   server.




Dunbar                  Expires Sept26, 2012                  [Page 2]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


   When TRILL is deployed in those data centers, there are issues no
   matter where the RBridge domain boundary starts. If RBridge domain
   boundary starts at aggregation switch level, the RBridge's IS-IS
   routing scales well, but there are problems with allowing only one
   (AF port) of multiple ports connected to a bridged LAN for
   forwarding traffic and requiring each RBridge edge to maintain a
   very large table of MAC&VLAN<-> RBridgeEdge mapping. If the RBridge
   domain boundary starts closer to hosts, e.g. at the virtual switches
   on servers, the number of MAC&VLAN<->Edge mapping is much smaller
   because each virtual switch only needs to maintain the mapping for
   remote hosts which actually communicate with the embedded VMs. But
   then, the number of nodes in RBridge IS-IS domain is very large,
   making it not scale well especially on aggregation switches which
   need to advertise link state over hundreds of ports.

   [RBridge-directory] introduces a method for RBridge edge to get
   MAC&VLAN<->RBridgeEdge mapping from a directory service in data
   center environment instead of flooding unknown DAs across TRILL
   domain. When directory is used, any node, even non-RBridge node, can
   perform the TRILL encapsulation. This draft is to demonstrate the
   benefits of non-RBridge nodes performing TRILL encapsulation.

2. Terminology

   AF      Appointed Forwarder RBridge port

   Bridge:  IEEE 802.1Q compliant device. In this draft, Bridge is used
             interchangeably with Layer 2 switch.

   DA:     Destination Address

   DC:      Data Center

   EoR:    End of Row switches in data center. Also known as
             Aggregation switches in some data centers

   FDB:    Filtering Database for Bridge or Layer 2 switch

   Host:    Application running on a physical server or a virtual
             machine. A host usually has at least one IP address and at
             least one MAC address.

   SA:     Source Address

   ToR:    Top of Rack Switch in data center. It is also known as
             access switches in some data centers.


Dunbar                  Expires Sept26, 2012                  [Page 3]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


   VM:     Virtual Machines

3. Directory Assistance to Non-RBridge

   With directory assistance [RBridge-Directory], a non-RBridge can
   determine if a packet should be forwarded across the RBridge domain.
   Suppose the RBridge domain boundary starts at network switches (i.e.
   not virtual switches embedded on servers), a directory can assist
   Virtual Switches embedded on servers to encapsulate proper TRILL
   header by providing the information of the RBridge edge to which the
   target is attached.

          \              +-------+         +------+ TRILL Domain/
           \           +/------+ |       +/-----+ |            /
            \          | Aggr11| + ----- |AggrN1| +           /
             \         +---+---+/        +------+/           /
              \         /     \            /      \         /
               \       /       \          /        \       /
                \   +---+    +---+      +---+     +---+   /
                 \- |T11|... |T1x|      |T21| ..  |T2y|---
                    +---+    +---+      +---+     +---+
                      |        |          |         |
                    +-|-+    +-|-+      +-|-+     +-|-+
                    |   |... | V |      | V | ..  | V |<-Virtual Switch
                    +---+    +---+      +---+     +---+
                    |   |... | V |      | V | ..  | V |
                    +---+    +---+      +---+     +---+
                    |   |... | V |      | V | ..  | V |
                    +---+    +---+      +---+     +---+
           Figure 1: TRILL domain in typical Data Center Network


   When a TRILL encapsulated data packet reaches an RBridge, the
   RBridge can simply forward the pre-encapsulated packet to the
   RBridge whose nickname is in the DA field of the TRILL header. By
   doing this, no ingress RBridge will receive a native frame with
   unknown DA, therefore, it won't need to flood received data packets
   to all other ports. That means there is no need to worry about AF
   ports and all RBridge edge ports connected to one bridged LAN can
   receive and forward pre-encapsulated traffic, which greatly improves
   the overall network utilization.

   ([RBridge] Section 4.6.2 Bullet 8 specifies that an RBridge port can
   be configured to accept TRILL encapsulated frames from a neighbor
   that is not an RBridge.)




Dunbar                  Expires Sept26, 2012                  [Page 4]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


   When data frames do not need to traverse RBridge domain, they are
   switched by all nodes/ports per IEEE802.1Q and RBridge edge will not
   encapsulate and forward native Ethernet frames across RBridge
   domain.

   When a pre-encapsulated TRILL frame arrives at an RBridge whose
   nickname matches with the destination nickname in the TRILL header,
   the processing is exactly same as normal, i.e. it decapsulates the
   native frame from the received TRILL frame and forwards the
   decapsulated Ethernet frame to the host attached to its edge ports.

   We call a node which only performs the TRILL encapsulation but
   doesn't participate in RBridge's IS-IS routing a ''TRILL
   Encapsulating node'' or ''Simplified RBridge''. The TRILL Encapsulating
   Node gets the MAC&VLAN<->RBridgeEdge mapping table pushed down or
   pulled from directory servers [RBridge-directory]. Upon receiving a
   native Ethernet frame, the TRILL Encapsulating Node checks the
   MAC&VLAN<->RBridgeEdge mapping table, and perform the corresponding
   TRILL encapsulation if the entry is found in the mapping table. If
   the destination address and VLAN of the received Ethernet frame
   doesn't exist in the mapping table, the Ethernet frame is forwarded
   per IEEE802.1Q.

       +------------+--------+---------+---------+--+-------+----+
       |OuterEtherHd|TRILL HD| InnerDA | InnerSA |..|Payload| FCS|
       +------------+--------+---------+---------+--+-------+----+
               ^
               |             |<Inner Ether Header>  |
               |
               |
               |      +-------+  TRILL    +------+
               |      |  R1   |-----------|  R2  |  Decapsulate TRILL
               |      +---+---+  domain   +------+  header
               |          |                   |
               +----------|                   |
                          |                   |
                       +-----+             +-----+
      Non-RBridge node:|T12  |             | T22 |
      Encapsulate TRILL+-----+             +-----+
      Header for data
      Frames to traverse
      TRILL domain.







Dunbar                  Expires Sept26, 2012                  [Page 5]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


4. Source Nickname in Frames Encapsulated by Non-RBridge Nodes

   The TRILL header includes a Source RBridge's Nickname (ingress) and
   Destination RBridge's Nickname (egress). When a TRILL header is
   added by a non-RBridge node, using the Ingress RBridge edge node's
   nickname in the source address field will make the ingress RBridge
   node receive TRILL frames with its own nickname in the frames'
   source address field, which can be confusing.

   To avoid confusion of edge RBridges receiving TRILL encapsulated
   frames with their own nickname in the frames' source address field
   from neighboring non-RBridge nodes, a new nickname can be given to
   an RBridge edge node, e.g. Phantom Nickname, to represent all the
   TRILL Encapsulating Nodes attached to the RBridge edge node.

   When the Phantom Nickname is used in the Source Address field of a
   TRILL frame, it is understood that the TRILL encapsulation is
   actually done by a non-RBridge node which is attached to an edge
   port of an RBridge Ingress node.

5. Conclusion and Recommendation

    As the number of hosts in data center gets large, the number of
    switches interconnecting them could increase to a point that TRILL
    no longer scales well. The situation will get worse as hypervisors
    on servers are equipped with virtual switches.  Therefore, we
    suggest TRILL consider directory assisted non-RBridge encapsulation
    approach. The non-RBridge encapsulation approach is especially
    useful when there are many servers in a data center equipped with
    hypervisor-based virtual switches because it is relatively easy for
    virtual switches, which are usually software based, to get directory
    assistance and perform network address encapsulation.



6. Manageability Considerations

   TBD.

7. Security Considerations

   TBD.

8. IANA Considerations

   TBD



Dunbar                  Expires Sept26, 2012                  [Page 6]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


9. Acknowledgments

   This document was prepared using 2-Word-v2.0.template.dot.

10. References

   [RBridge-Directory]  Dunbar, et, al ''Directory Assisted RBridge
   Edge'', <draft-dunbar-trill-directory-assisted-edge-02.txt>, Oct,
   2011

   [RBridges] Perlman, et, al ''RBridge: Base Protocol Specification'',
   <draft-ietf-trill-rbridge-protocol-16.txt>, March, 2010


   [RBridges-AF]   Perlman, et, al ''RBridges: Appointed Forwarders'',
   <draft-ietf-trill-rbridge-af-02.txt>, April 2011



   [ARMD-Problem] Dunbar, et,al, ''Address Resolution for Large Data
             Center Problem Statement'', Oct 2010.

   [ARP reduction] Shah, et. al., "ARP Broadcast Reduction for Large Data
             Centers", Oct 2010










Authors' Addresses

   Linda Dunbar
   Huawei Technologies
   1700 Alma Drive, Suite 500
   Plano, TX 75075, USA
   Phone: (972) 543 5849
   Email: ldunbar@huawei.com






Dunbar                  Expires Sept26, 2012                  [Page 7]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011



   Donald Eastlake
   Huawei Technologies
   155 Beaver Street
   Milford, MA 01757 USA
   Phone: 1-508-333-2270
   Email: d3e3e3@gmail.com

   Radia Perlman
   Intel Labs
   2200 Mission College Blvd.
   Santa Clara, CA 95054-1549 USA
   Phone: +1-408-765-8080
   Email: Radia@alum.mit.edu


   Igor Gashinsky
   Yahoo
   45 West 18th Street 6th floor
   New York, NY 10011
   Email: igor@yahoo-inc.com


Intellectual Property Statement

   The IETF Trust takes no position regarding the validity or scope of
   any Intellectual Property Rights or other rights that might be
   claimed to pertain to the implementation or use of the technology
   described in any IETF Document or the extent to which any license
   under such rights might or might not be available; nor does it
   represent that it has made any independent effort to identify any
   such rights.

   Copies of Intellectual Property disclosures made to the IETF
   Secretariat and any assurances of licenses to be made available, or
   the result of an attempt made to obtain a general license or
   permission for the use of such proprietary rights by implementers or
   users of this specification can be obtained from the IETF on-line
   IPR repository at http://www.ietf.org/ipr

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   any standard or specification contained in an IETF Document. Please
   address the information to the IETF at ietf-ipr@ietf.org.




Dunbar                  Expires Sept26, 2012                  [Page 8]


Internet-Draft Directory Assisted TRILL Encapsulation       March 2011


Disclaimer of Validity

   All IETF Documents and the information contained therein are
   provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION
   HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY,
   THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
   WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
   WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
   ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
   FOR A PARTICULAR PURPOSE.

Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.

































Dunbar                  Expires Sept26, 2012                  [Page 9]