TRILL for Data Center Networks



Similar documents
TRILL Large Layer 2 Network Solution

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

VMDC 3.0 Design Overview

Virtual Machine in Data Center Switches Huawei Virtual System

Avaya VENA Fabric Connect

Multi-site Datacenter Network Infrastructures

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

WHITE PAPER. Network Virtualization: A Data Plane Perspective

Shortest Path Bridging IEEE 802.1aq Overview

Network Technologies for Next-generation Data Centers

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Extending Networking to Fit the Cloud

VXLAN: Scaling Data Center Capacity. White Paper

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Security Technology White Paper

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

Non-blocking Switching in the Cloud Computing Era

VXLAN Bridging & Routing

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Network Virtualization for Large-Scale Data Centers

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Top-Down Network Design

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

Pre$SDN era: network trends in data centre networking

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Cisco FabricPath Technology and Design

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

SSVVP SIP School VVoIP Professional Certification

How To Make A Network Cable Reliable And Secure

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Next-Gen Securitized Network Virtualization

VLAN and QinQ Technology White Paper

Chapter 3. Enterprise Campus Network Design

OSPF Routing Protocol

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Ethernet Fabrics: An Architecture for Cloud Networking

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Juniper / Cisco Interoperability Tests. August 2014

Networking 4 Voice and Video over IP (VVoIP)

Virtual PortChannels: Building Networks without Spanning Tree Protocol

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

VLANs. Application Note

ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Interconnecting Cisco Networking Devices Part 2

MPLS L2VPN (VLL) Technology White Paper

Chapter 1 Reading Organizer

Layer 3 Network + Dedicated Internet Connectivity

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Course Contents CCNP (CISco certified network professional)

ConnectX -3 Pro: Solving the NVGRE Performance Challenge

Control Tower for Virtualized Data Center Network

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

SDN and Data Center Networks

Building Secure Network Infrastructure For LANs

Technical Support Information Belkin internal use only

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Link Layer Discovery Protocol

MLAG on Linux - Lessons Learned. Scott Emery, Wilson Kok Cumulus Networks Inc.

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

Scalability Analysis of Metro Ethernet

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Optimizing Data Center Networks for Cloud Computing

CloudEngine 5800 Series Data Center Switches

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

Ten Things to Look for in an SDN Controller

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Understanding VLAN Translation/Rewrites using Switches and Routers

Troubleshooting Bundles and Load Balancing

Virtualization, SDN and NFV

SSVP SIP School VoIP Professional Certification

IP Multicasting. Applications with multiple receivers

Testing Edge Services: VPLS over MPLS

Interconnecting Data Centers Using VPLS

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

Data Center Networking Designing Today s Data Center

Link-State Routing Protocols

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Huawei Enterprise A Better Way VM Aware Solution for Data Center Networks

CCT vs. CCENT Skill Set Comparison

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Layer 3 Routing User s Manual

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Computer Networks Vs. Distributed Systems

MPLS is the enabling technology for the New Broadband (IP) Public Network

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Transcription:

24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com

Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759

Agenda 1 TRILL Overview Click to add Title 2 3 Protocol Mechanism Click to add Title Device Management Click and Fault to Location add Title 4 Use of TRILL Click to add Title 3

Data Center Development Trend Traditional Data Center Structure In traditional data center networks, Layer 2 only extends to access or aggregation switches Virtual machines (VMs) can only be migrated within a Layer 2 domain To migrate VMs to another Layer 2 domain, IP addresses of the VMs must be changed If technologies such as load balancing are not used, services will be interrupted during VM migration Layer 3 Layer 2 POD POD Next Generation Data Center Structure To better utilize existing data center resources, IDC carriers require VMs to be migrated within a data center Transparent Interconnection of Lots of Links (TRILL) is used to build a large Layer 2 network As huge east-west traffic exists in the data center, non-blocking forwarding of data frames is required to achieve full utilization of network link/bandwidth resources Layer 3 Layer 2 4

TRILL Advantages Loop Prevention Efficient Forwarding Fast Convergence Easy Deployment Build loop free distribution tree and use TTL to avoid loops Forward data efficiently based on SPF and ECMP Listen to network topology changes and complete convergence within a few milliseconds Easy configuration Unified control protocol for Unicast and Multicast It is easy for Virtual Computer migrate inside of the network 5

Concepts TRILL TRILL runs at Layer 2 and calculates routes based on the link state Layer 2 Only It is implemented based on the IS-IS protocol The device running the TRILL protocol is the route bridge (RB) RBridge Core RBridge Core The network where RBs run is the TRILL campus RB Connection Mode RBridge Edge RBridge Edge RBridge Edge RBs can be directly connected or connected by traditional Layer 2 network 6

TRILL Data Encapsulation The original Layer 2 packets from the source end arrive at the destination through the TRILL network The servers consider the TRILL network a bridge fabric s2 Data Inner MAC Nickname Outer Mac A Data A B s1 Data A B s1 s3 s1 s2 Nicknames are unchanged from end to end A B s1 Outer MAC is changed hop by hop s3 s2 s3 s3 Data A B B 7

Nickname Concepts Nickname Each RB on the TRILL network is identified by a nickname A nickname is a two digit number An RB can have multiple nicknames, which are generated automatically or configured manually Each nickname must be unique across the entire network My nickname is 000000000001 RB3 A nickname has two priorities: 1) priority and 2) root priority: These are respectively used for nickname collision negotiation and root election RB2 RB1 RB4 Nickname Collision Negotiation When nicknames are automatically generated, two RBs may have the same nickname The priority field is introduced to avoid nickname collision When an RB is added to a network, the LSDB on the network is updated The RB is advertised only when the RB's nickname does not conflict with any nickname on the network If the RB's nickname conflicts with one on the network, another nickname must be selected for the RB Nickname collision will affect running services RB5 A Nickname Must be Unique on the Network 8

TRILL and Other Layer 2 Technologies Comparison Traditional Layer 2 CSS+iStack TRILL SPB Encapsulation type Traditional ETH header (without TTL) Traditional ETH header (without TTL) TRILL (with TTL) MacInMac (with TTL) Loop protection MSTP Management method TRILL SPB ECMP Not supported Support ECMP using LAG Support hop-by-hop ECMP, similar to IP network Support flow-based ECMP on ingress node, but not support hop-by-hop ECMP Number of Multicast trees NA NA Few (Layer 2 shared Multicast tree) Many (Layer 2 source Multicast tree) Shortest path forwarding Not supported Supported Supported Supported Convergence time Long, unstable convergence time Short Medium (hundreds of milliseconds) Medium (hundreds of milliseconds) Multitenant support 4K (isolated based on VLANs) 4K (isolated based on VLANs) 4K (isolated based on VLANs). In the future, tenants can be isolated using FineLabel, with a maximum of 16M tenants supported) 16M (isolated based on I-SID) Networking cost Low High (inter-chassis communication occupies high bandwidth. Nonblocking forwarding is difficult to implement) Network scale Small Medium (the number of stacked devices is limited, non-blocking forwarding is not supported) Low Large Low Large Applicable network Applicable to hierarchical networks where the devices at each layer are aggregated to the upper layer, but not applicable to flat tree network Applicable to flat tree networks Applicable to flat tree networks Applicable to flat tree networks and pointto-multipoint IPTV networks 9

Agenda 1 TRILL Overview Click to add Title 2 3 Protocol Mechanism Click to add Title Device Management Click and Fault to Location add Title 4 Use of TRILL Click to add Title 10

TRILL Implementation Process 1 2 3 4 Establish Adjacency Relationships Synchronize Database Calculate Unicast Routes Calculate Multicast Routes Discover a neighbor, shake hands with the neighbor, and the neighbor is placed in the UP state Elect DRB, advertise port roles, and specify AF and designated VLAN over the broadcast links All devices obtain all the device system IDs, nicknames and properties, interested VLAN (access VLAN) of the ingress RB, and neighbor TLVs on the entire network Each device uses itself as the source node to calculate the shortest paths to other nodes Each device uses the distribution tree root as the source node to calculate the shortest paths to other nodes Device performs distribution tree pruning and generates pruning entries based on access VLAN information advertised by ingress RBs 11

Database Synchronization LSDB on Entire Network Content in LSDB Purpose Information Shared by All Nodes RB1 System ID Nickname and properties Neighbor information (link cost, MTU, etc.) Nickname collision negotiation Unicast route calculation Root election and calculation for Multicast distribution tree RB2... RBn Information about Ingress RB Access user VLAN Relationships between VLANs and distribution tree Pruning calculation 12

Unicast Routing Table Creation SPT Calculation A node uses itself as the source node to generate an SPT(Short Path Tree) to other nodes based on the LSDB of the entire network Neighbor Status L1 RB5 L2 RB6 The outbound interface pointing to the neighbor and next hop address are obtained. Nickname Unicast entries are generated based on the nicknames advertised by all nodes RB1 RB2 RB3 RB4 All links have the same cost The system MAC addresses of RB1 to RB6 are MAC 1-6 The nicknames of RB1 are RB6 are Nickname 1-6 13

Agenda 1 TRILL Overview Click to add Title 2 3 Protocol Mechanism Click to add Title Device Management Click and Fault to Location add Title 4 Use of TRILL Click to add Title 14

In-Band Management Each RB has a VLANIF interface corresponding to the inner management VLAN An RB advertises network segment 10.1.1.0/24 corresponding to the management VLAN sub-interface The network administrator connects to the in-band management VLANIF interface through egress router 1 (from the IP network to TRILL network) and the TRILL network. The network administrator can use Telnet, SNMP, or NetConf to manage and configure the RBs through in-band network IP:10.1.1.1/24 Request Network Administrator PC1 RB1 IP:10.1.1.2 RB2 IP:10.1.1.3 Router 1 IP Network IP:100.1.1.1 Reply RB3 IP:10.1.1.4 TRILL Campus L2 L3 VLANIF interface of the management VLAN. The management VLAN is the inner VLAN in TRILL encapsulation Management VLAN sub-interface corresponding to the router 15

Fault Location RBs perform TRILL ping to verify connectivity of the forwarding path The protocol packets are transmitted over the TRILL RBridge channel Ping Packet Forwarding Process TRILL Ping 1. 1 The user specifies the destination RB nickname, timeout interval, and hop count on the transmit RB, and performs a ping operation. The RB searches the nickname Unicast forwarding table to forward the ping packet 2. 2 The intermediate nodes search the nickname forwarding table until the TTL of the ping packet decreases to 0 or the packet reaches the destination, and forward the packet to the CPUs RB1 RB2 3. 3 The CPU finds that the TTL of the packet is 1, and checks whether the local RB is the destination. If the RB is the destination, the RB returns an Echo Reply; otherwise, it returns an Error Notification with the error message TTL timeout RB3 TRILL Campus 16

Agenda 1 TRILL Overview Click to add Title 2 3 Protocol Mechanism Click to add Title Device Management Click and Fault to Location add Title 4 Use of TRILL Click to add Title 17

Value Added Service Deployment Features The FWs and LBs are located between access switches and egress routers to process southbound and northbound traffic To process eastbound and westbound traffic between network segments, the gateway can be deployed on the FW if servers are located in un-trusted zones FW LB IP Network FW LB If servers are located in the same trusted zone, the gateway can be deployed on the aggregation switch The eastbound and westbound traffic within a network segment is forwarded at Layer 2 on the TRILL network FW TRILL Campus FW Southbound and northbound traffic between client and server..... Inter-subnet traffic between servers, filtered by firewall Inter-subnet traffic between servers, not filtered by firewall..... Intra-subnet traffic between servers Server 18

DC Seamless Migration Protect Customer Investment Migration Method IP Network In the early history of DC, Layer 2 networks used MSTP because switches hardware did not support TRILL IP Network With new devices (such as HUAWEI CE12800) DCs can support TRILL and large Layer 2, the large Layer 2 network can also run MSTP Servers can be connected to access switches on the MSTP or TRILL network. Thus, VMs can migrate the entire large Layer 2 network MSTP Network Seamless Migration TRILL Campus..... Implementation MSTP Network..... The edge devices on the TRILL network simulate the MSTP root bridges to communicate with the MSTP network. After receiving a TCN packet indicating MSTP topology change, the edge devices clear their own MAC address entries and request the peer RBs to clear the related MAC address entries..... VLAN 1 VLAN 1..... VLAN 1 VLAN 1 VLAN 1 VLAN 1 19

TRILL Application Interconnection Between DCs TRILL Network Capable of Interconnecting with Other types of Networks L1 Trill Campus PE VPLS Network PE Trill Campus or Another Type of Network L2 IP/MPLS Site 1 Site 2 MAC1 Outbound Interface 1 MAC of Site 2 L1 MAC of Site 3 L2 MAC of Site 1 Interface in Site 1 L1 and L2 can be layer2 or layer3 interface Trill Campus or Another Type of Network Site 3 TRILL does not run between egress RBs or different DCs The interconnecting interfaces between the RBs are inbound interfaces for servers in the respective TRILL sites Different DCs are interconnected through a VPLS network or optical fibers For layer2 interconnection, border RBs for DC must learn all MAC addresses of multi sites. For layer3 interconnection, border RBs for DC must learn all MAC addresses of local site. 20

TRILL Application Interconnection Between DCs (2) Fewer MAC Addresses to be learned on Egress RBs R1 TRILL Over VPLS VPLS Network Trill Campus Trill Campus R2 Site 1 R1 Site 1 Site 2 Site 3 Trill Campus Site 3 Site 2 Multiple DC sites participate in computing a distribution tree Egress RBs in each DC work as transit nodes and do not encapsulate or decapsulate TRILL data packets Egress RBs do not need to learn server MAC addresses The Multicast distribution tree uses an egress RB as the root, saving bandwidth on egress links Multicast packets are forwarded through local links if they do not need to traverse the local DC site 21

Campus Network Access layer and aggregation layer: At Layer 2, the TRILL protocol is used to replace MSTP to increase bandwidth use efficiency, reduce convergence time, implement automatic deployment, and prevent loops Campus Egress Core Layer WAN WAN Aggregation layer and core layer: Layer 3 networks are deployed between different departments to forward interdepartment traffic Aggregation Layer IP Network Devices at the aggregation layer function as gateways to interconnect Layer 2 and Layer 3 networks Access Layer TRILL Campus TRILL Campus TRILL Campus Dept. A Dept. B Other Zones 22

Glossary of Terms Acronym RB AF DRB SPF IS-IS LSP P2P VS RPF UNI NNI Definition Router Bridge Appointed Forwarder Designated Router Bridge Shortest Path First Intermediate System to Intermediate System Link State PDU Point to Point Virtual Switch Reverse Path Forwarding User Network Interface Network Network interface 23

24.05.13 Thank You www.huawei.com enterprise.huawei.com