TRILL for Data Center Networks

TRILL for Data Center Networks
HUAWEI ENTERPRISE A BETTER WAY
TRILL for Data Center Networks
www.huawei.com
enterprise.huawei.com
HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI ENTERPRISE A BETTER WAY
Agenda
Click to add Title
1
TRILL Overview
2
Protocol Mechanism Click to add Title
3
Data Forwarding
4
Click
to add
Title
Device Management and
Fault
Location
5
Use of TRILL
HUAWEI TECHNOLOGIES CO., LTD.
Click to add Title
Click to add Title
Huawei Confidential: Please do not distribute without permission
2
HUAWEI ENTERPRISE A BETTER WAY
Data Center Development Trend
Traditional Data Center Structure
Layer 3
Layer 2
 In traditional data center networks, Layer 2 only extends to access or
aggregation switches
 Virtual machines (VMs) can only be migrated within a Layer 2 domain
 To migrate VMs to another Layer 2 domain, IP addresses of the VMs must
be changed
 If technologies such as load balancing are not used, services will be
interrupted during VM migration
POD
POD
Next Generation Data Center Structure
Layer 3
 To better utilize existing data center resources, IDC carriers require VMs to
be migrated within a data center
Layer 2
 Transparent Interconnection of Lots of Links (TRILL) is used to build a large
Layer 2 network
 As huge east-west traffic exists in the data center, non-blocking forwarding
of data frames is required to achieve full utilization of network link/bandwidth
resources
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
3
HUAWEI ENTERPRISE A BETTER WAY
TRILL Advantages
Loop
Prevention
 Build loop free
distribution tree and
use TTL to avoid
loops
HUAWEI TECHNOLOGIES CO., LTD.
Efficient
Forwarding
 Forward data
efficiently based on
SPF and ECMP
Fast
Convergence
Easy
Deployment
 Listen to network
topology changes and
complete convergence
within a few
milliseconds
 Easy configuration
 Unified control
protocol for Unicast
and Multicast
Huawei Confidential: Please do not distribute without permission
4
HUAWEI ENTERPRISE A BETTER WAY
Concepts
TRILL
 TRILL runs at Layer 2 and calculates
routes based on the link state
Layer 2 Only
 It is implemented based on the IS-IS
protocol
 The device running the TRILL protocol
is the route bridge (RB)
 The network where RBs run is the
TRILL campus
RBridge
Core
RBridge
Edge
RBridge
Core
RBridge
Edge
RBridge
Edge
RB Connection Mode
 RBs can be directly connected or
connected by traditional Layer 2
network
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
5
HUAWEI ENTERPRISE A BETTER WAY
TRILL Packet Format
TRILL Packet Format
DA:
Outer destination MAC address. In Unicast forwarding, this is
the MAC address of next-hop RB. In Multicast forwarding, this is
reserved MAC address
SA:
Outer source MAC address. This is the local MAC address of
each RB
VLAN:
Outer VLAN ID of TRILL data packets. This is the VLAN ID
specified by the TRILL protocol
V:
TRILL version, which has a fixed value of 0 currently. If the
version is not 0, the TRILL packet is discarded
R:
Reserved field
M:
Multicast flag. The value 0 indicates Unicast; the value 1
indicates Multicast
Op-Length:
Length of the TRILL header
Hop:
Number of hops
E-Rb-Nickname:
Nickname. In Unicast forwarding, it is the egress RB nickname.
In Multicast, it is the root nickname
I-Rb-Nickname:
Ingress RB nickname
Original Frame:
Original Layer 2 packets sent by the server
HUAWEI TECHNOLOGIES CO., LTD.
DA
SA
VLAN
TRILL Hdr
Link transport
Hdr
FCS
Payload with
original VLAN
TRILL Header – 64 bits
TRILL Ethertype
Huawei Confidential: Please do not distribute without permission
~ Original Frame
V
Egress Rbridge Nickname
R
M
OpLng
Ingress Rbridge Nickname
MAC – in TRILL – in MAC
6
Hop
HUAWEI ENTERPRISE A BETTER WAY
TRILL Data Encapsulation
 The original Layer 2 packets from the source
end arrive at the destination through the
TRILL network
Inner MAC
Nickname
s2
 The servers consider the TRILL network a
bridge fabric
Outer Mac
Data
s2
A
s1
s3
A
s1
s1
B
A
Data
B
A
B
HUAWEI TECHNOLOGIES CO., LTD.
Data
s1
Nicknames are
unchanged
from end to end
B
s3
s3
s2
Outer MAC
is changed
hop by hop
Huawei Confidential: Please do not distribute without permission
s3
Data
7
A
B
HUAWEI ENTERPRISE A BETTER WAY
Nickname Concepts
Nickname
 Each RB on the TRILL network is identified by a nickname
 A nickname is a two digit number
 An RB can have multiple nicknames, which are generated automatically or configured
manually
RB3
My nickname is
000000000001
 Each nickname must be unique across the entire network
 A nickname has two priorities: 1) priority and 2) root priority:
– These are respectively used for nickname collision negotiation and root election
RB2
RB1
RB4
Nickname Collision Negotiation




When nicknames are automatically generated, two RBs may have the same nickname
The priority field is introduced to avoid nickname collision
RB5
When an RB is added to a network, the LSDB on the network is updated
The RB is advertised only when the RB's nickname does not conflict with any nickname
on the network
 If the RB's nickname conflicts with one on the network, another nickname must be
selected for the RB
A Nickname Must be Unique
on the Network
 Nickname collision will affect running services
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
8
HUAWEI ENTERPRISE A BETTER WAY
TRILL and Other Layer 2 Technologies Comparison
Traditional Layer 2
CSS+iStack
TRILL
SPB
Encapsulation type
Traditional ETH header (without TTL)
Traditional ETH header (without TTL)
TRILL (with TTL)
MacInMac (with TTL)
Loop protection
MSTP
Management method
TRILL
SPB
ECMP
Not supported
Support ECMP using LAG
Support hop-by-hop ECMP, similar to IP
network
Support flow-based ECMP on ingress
node, but not support hop-by-hop ECMP
Number of Multicast
trees
NA
NA
Few (Layer 2 shared Multicast tree)
Many (Layer 2 source Multicast tree)
Shortest path forwarding
Not supported
Supported
Supported
Supported
Convergence time
Long, unstable convergence time
Short
Medium (hundreds of milliseconds)
Medium (hundreds of milliseconds)
Multitenant support
4K (isolated based on VLANs)
4K (isolated based on VLANs)
4K (isolated based on VLANs). In the
future, tenants can be isolated using
FineLabel, with a maximum of 16M
tenants supported)
16M (isolated based on I-SID)
Networking cost
Low
High (inter-chassis communication
occupies high bandwidth. Nonblocking forwarding is difficult to
implement)
Low
Low
Network scale
Small
Medium (the number of stacked
devices is limited, non-blocking
forwarding is not supported)
Large
Large
Applicable network
Applicable to hierarchical networks
where the devices at each layer are
aggregated to the upper layer, but not
applicable to flat tree network
Applicable to flat tree networks
Applicable to flat tree networks
Applicable to flat tree networks and pointto-multipoint IPTV networks
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
9
HUAWEI ENTERPRISE A BETTER WAY
Agenda
Click to add Title
1
TRILL Overview
2
Protocol Mechanism Click to add Title
3
Data Forwarding
4
Click
to add
Title
Device Management and
Fault
Location
5
Use of TRILL
HUAWEI TECHNOLOGIES CO., LTD.
Click to add Title
Click to add Title
Huawei Confidential: Please do not distribute without permission
10
HUAWEI ENTERPRISE A BETTER WAY
TRILL Implementation Process
1
2
3
4
Establish Adjacency
Relationships
Synchronize
Database
Calculate Unicast
Routes
Calculate Multicast
Routes
 Discover a neighbor,
shake hands with the
neighbor, and the
neighbor is placed in the
UP state
 Elect DRB, advertise port
roles, and specify AF and
designated VLAN over
the broadcast links
HUAWEI TECHNOLOGIES CO., LTD.
 All devices obtain all the
device system IDs,
nicknames and properties,
interested VLAN (access
VLAN) of the ingress RB,
and neighbor TLVs on the
entire network
 Each device uses itself
 Each device uses the
as the source node to
calculate the shortest
paths to other nodes
Huawei Confidential: Please do not distribute without permission
distribution tree root as
the source node to
calculate the shortest
paths to other nodes
 Device performs
distribution tree pruning
and generates pruning
entries based on access
VLAN information
advertised by ingress
RBs
11
HUAWEI ENTERPRISE A BETTER WAY
Adjacency Management: Neighbor Status Negotiation
Hello Packet
 Hello packets are used for negotiating neighbor relationships, specifying designated
VLAN, electing the DRB, advertising port roles, and checking MTU
 On the multi-homed access interfaces, hello packets support the AF function
Down
2-Way
Detect
RB5
Report
Neighbor Status
 Down:
Initial state, indicating that the neighbor does not exist
 Detect:
Indicates that a neighbor is detected, but handshake has not been
successful
 2-WAY:
Indicates that handshake is successful, but MTU detection is not
complete if MTU detection is enabled
 Report:
Indicates that handshake and MTU detection are successful
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
Neighbor State Machine
12
HUAWEI ENTERPRISE A BETTER WAY
Adjacency Management: DRB Election
DRB
 Specifies the designated VLAN to transmit TRILL data over the local link
 Specifies the VLAN forwarder on the access interface
 Determines whether to create Pseudonodes:
Down
DRB
Suspend
RB5DRB
Not
– When the Pseudonode has multiple RB connections over the link, the full mesh
connections between RBs can be changed to star connections, reducing the number of
advertised LSPs
 If only two RBs exist on the link, the DRB can set a bypass Pseudonode bit in hello
packets, indicating that no Pseudonode will be created.
Neighbor Status
 Down:
Indicates that the link status on the port is Down or Trill is disabled
 Suspend:
Indicates that a TRILL Hello packet with the same <AC address ad
the local end MAC address is received, but the local DRB priority is
low. This state is similar to the Down state
 DRB:
Indicates a dRB port, which can transmit and receive TRILL packets
 Report:
Indicates a non-DRB port, which can transmit and receive TRILL packets
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
Neighbor State Machine
13
HUAWEI ENTERPRISE A BETTER WAY
Adjacency Management: Port Role
Port Roles
 Access: UNI interface, which connects to user terminals, forwards Native Ethernet packets but does not forward TRILL packets. The link
on the interface is not advertised by the LSP protocol packets. AF election is required only for this type of interfaces.
 Trunk: NNI interface, which supports broadcast links, forwards only TRILL packets and protocol packets, but does not forward Native
Ethernet packets
 P2P:
NNI interface, which functions the same as the trunk interface except it does not participate in DRB election.
Note: After TRILL is enabled on an interface, the interface becomes a hybrid interface by default. That is, it is the combination of access and trunk interfaces.
Therefore, the interface can receive Native Ethernet packets from user terminals as well as forward TRILL packets
4 RB2 5
3
4 RB2 5
Trunk Port
6
3
6
Access Port
RB1
RB3
ES2
AF
blocked
RB1
RB3
Hybrid Port
1
Bridge
2
AF
blocked
ES1
HUAWEI TECHNOLOGIES CO., LTD.
1
Bridge
ES1
Huawei Confidential: Please do not distribute without permission
14
2
ES2
HUAWEI ENTERPRISE A BETTER WAY
Adjacency Management: AF Election
No AF Module
Using AF Module
 The unknown Unicast or broadcast packets in a VLAN may
form a loop on the TRILL network, causing network storms
 The access port removes the TRILL header, so the hop count
function is invalid. The network cannot be protected
RB1
 The TRILL hello protocol is run between access ports
 The DRB specifies an RB (for example, RB1) as the VLAN
forwarder for access users
 Layer 2 loops are prevented at the access side
ES2
ES2
RB2
RB2
Loop
1
Bridge
RB3
RB1
2
1
ES1
Bridge
RB3
2
ES1
ES1 is Dual Homed to RB through Traditional Layer 2 Switch
HUAWEI TECHNOLOGIES CO., LTD.
Hello packet
ES1 is Dual Homed to RB through Traditional Layer 2 Switch
Huawei Confidential: Please do not distribute without permission
15
HUAWEI ENTERPRISE A BETTER WAY
Database Synchronization
LSDB on Entire Network
Content in LSDB
Purpose
Information Shared by All Nodes
 System ID
 Nickname and properties
 Neighbor information (link cost,
RB1
MTU, etc.)
 Nickname collision
negotiation
 Unicast route calculation
 Root election and calculation
for Multicast distribution tree
RB2
...
RBn
Information about Ingress RB
 Access user VLAN
 Relationships between VLANs
 Pruning calculation
and distribution tree (Huawei
protocol extension)
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
16
HUAWEI ENTERPRISE A BETTER WAY
Unicast Routing Table Creation
SPT Calculation
RB5
 A node uses itself as the source node to
generate an SPT to other nodes based on
the LSDB of the entire network
L1
RB6
L2
Neighbor Status
 The outbound interface pointing to the
neighbor and next hop address are obtained.
 Nickname Unicast entries are generated
based on the nicknames advertised by all
nodes
RB1
RB2
RB3
RB4
 All links have the same cost
 The system MAC addresses of RB1 to RB6 are MAC 1-6
 The nicknames of RB1 are RB6 are Nickname 1-6
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
17
HUAWEI ENTERPRISE A BETTER WAY
Nickname Unicast Forwarding Table Creation on RB1
 RB1 generates the shortest path tree to all
other nodes, ensuring that Unicast traffic is
forwarded along the shortest path
 RB1 has two equal-cost shortest paths to
each of RB2, RB3, and RB4; therefore,
Unicast traffic is load balanced. Link
bandwidth use efficiency is improved
 RB1 searches the nickname Unicast
forwarding table for the egress nickname
contained in the TRILL header of the
received data packet, and obtains the
matching outbound interface and next hop
 If multiple outbound interfaces are found,
RB1 selects one based on ECMP algorithm
to forward the packet
HUAWEI TECHNOLOGIES CO., LTD.
Nickname Unicast forwarding table on RB1
RB1
RB5
RB2
Destination
Nickname
Outbound interface
and next-hop MAC
nickname2
L1, MAC5
L2, MAC6
nickname3
L1, MAC5
L2, MAC6
nickname4
L1, MAC5
L2, MAC6
nickname5
L1, MAC5
nickname6
L2, MAC6
RB6
RB3
RB4
Neighbor entries of RB1
Neighbor
Outbound interface,
next-hop MAC
RB5
L1, MAC5
RB6
L2, MAC6
Huawei Confidential: Please do not distribute without permission
18
HUAWEI ENTERPRISE A BETTER WAY
Multicast Route Calculation
 Elect the device with the highest root priority: Each device
obtains the nickname of the RB with the highest root priority and
the minimum number (n) of distribution trees on the network.
RB2
 Distribution tree root selection: The RB with the highest root
priority can specify the distribution tree roots. If the RB does not
specify the roots, the RBs with the top N root priorities are used as
roots.
 distribution tree calculation: N roots are used as source nodes to
calculate the shortest paths to other nodes.
 RPF check table creation: The RPF check table is created based
on the distribution tree information advertised by each ingress RB.
The RPF check table is used to prevent loops.
RB7
RB5
RB1
RB3
RB10
RB8
RB6
RB4
RB11
RB9
 Prune calculation: Prune is performed based on access VLAN
information advertised by each ingress RB. The prune operation
conserves bandwidth on the TRILL network.
Roots on RB1
Note: The RB with the highest root priority and the distribution tree roots must be
reachable through Unicast routes; therefore, Multicast routing calculation must be
performed after Unicast routing calculation
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
Roots on RB7
19
HUAWEI ENTERPRISE A BETTER WAY
Multicast Forwarding Table and RPF Check Table
RPF Check
Multicast Forwarding
 Ingress RB6 selects distribution tree 1 to forward Multicast
traffic. Traffic reaches interface L1 on RB2. The traffic
reaching other interfaces is discarded because of RPF check
failure
 When forwarding Multicast packets, the processor must prune
source interfaces to prevent Multicast packets from entering
and leaving a device through the same interface. For example,
packets arriving at interface L1 cannot leave through L1
 Shared trees are used on the TRILL network. All ingress RBs
may receive Multicast traffic; therefore, the RBs need to
perform an RPF check, based on root nicknames, ingress RB
nicknames, and inbound interfaces. RPF check prevents loops
on the TRILL network
 Each RB calculates a Multicast distribution tree based on roots.
They obtain the topology of the entire network and use the
same algorithm; therefore, all RBs establish distribution trees in
the same way. Thus, the uniform distribution tree entries can
be created even if no Join or Prune message is transmitted on
the PIM network
RPF check table on RB2
Multicast
Packet
Nickname Multicast table on RB2
Root
nickname
Ingress
Nickname
Inbound
interface
RB1
RB6
L1
RB7
RB6
L3
…
…
…
HUAWEI TECHNOLOGIES CO., LTD.
Root nickname
Outbound interface
list
RB1
L1, L2, L3
RB7
L1, L3
RFP
Check
Passed
Huawei Confidential: Please do not distribute without permission
20
Replication
and
Forwarding
HUAWEI ENTERPRISE A BETTER WAY
VLAN Based Pruning Calculation
Ingress RB Advertises Information
ES1
 As shown in the figure on the right, RB2, RB4,
and RB9 access VLAN 1, and RB4 and RB10
access VLAN 2
RB7
L2
All Other RBs Perform Prune Based
on VLANS
 Other RBs perform pruning calculations based on
information advertised by ingress RBs and
generate pruning entries. Multicast traffic on the
TRILL network is replicated only to edge RBs and
forwarded on-demand. This method conserves
bandwidth on the TRILL network
L3
RB2
L1
RB1
RB5
RB3
RB10
ES3
RB8
RB6
RB4
RB11
RB9
VLAN
ES4
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
ES5
ES2
21
VLAN2
HUAWEI ENTERPRISE A BETTER WAY
VLAN Based Pruning Calculation
RB1
RB4
RB2
Distribution tree pruning entries on RB2
RB1
RB4
RB2
RB9
RB7
RB10
RB7
RB2
RB1
RB4
HUAWEI TECHNOLOGIES CO., LTD.
RB10
RB11
Outbound
interface
RB1
VLAN1
L1
RB1
VLAN2
L1, L3
RB7
VLAN1
L1, L3
RB7
VLAN2
L1, L3
 When forwarding Multicast packets, the RB uses
the destination nickname and inner VLAN ID in
the TRILL header as the key to search the
Multicast entries of VLAN-based prune
RB2
RB1
RB9
Access VLAN
Multicast Forwarding
RB1
RB10
Root
nickname
RB4
Huawei Confidential: Please do not distribute without permission
 RPF check is performed based on root
nickname and ingress RB nickname, but is
irrelevant to pruning calculation
22
HUAWEI ENTERPRISE A BETTER WAY
Multicast Load Balancing
Root1
RB1
VLAN Odd
RB2
VLAN
Odd
Trill Campus
VLAN Odd
VLAN Even
VLAN Odd
VLAN Even
…
VLAN
Even
VLAN Even
Root 1
Root 2
HUAWEI TECHNOLOGIES CO., LTD.
Root2
RBn
The ingress RB selects a distribution tree for each access VLAN. For example in the above figure, traffic in
VLAN Odd is forwarded through the distribution tree with Root 1. Traffic in VLAN Even is forwarded through the
distribution tree with Root 2. Thus Multicast traffic on the entire network is load balanced based on access
VLANs
Huawei Confidential: Please do not distribute without permission
23
HUAWEI ENTERPRISE A BETTER WAY
Distribution tree pruning Optimization
Pruning entries generated by common
method
Pruning entries generated by
Huawei method
Root RB
VLAN ID
Outbound
interface
Root1
1
L1
…
…
…
…
1000
L1
Root1
1000
L1
Root1
1001
L1
Root2
1001
L2
…
…
…
Root1
2000
L1
…
…
…
Root2
1
L2
Root2
2000
L2
…
…
…
Root2
1000
L2
Root2
1001
L2
…
…
…
Root2
2000
L2
Root RB
VLAN ID
Outbound
interface
Root1
1
L1
…
…
Root1
HUAWEI TECHNOLOGIES CO., LTD.
The Number of Pruning
Entries is Independent of the
Number of distribution Trees
Huawei Confidential: Please do not distribute without permission
Ingress RB Advertises Information
 The ingress RB load balances Multicast traffics
based on VLANS
 The ingress RB advertises the relationships between
VLANs and roots. RB1 advertises the relationships
between VLANs 1-1000 and root 1; RB2 advertises
the relationships between VLANs 1001-2000 and
Root 2
All Other RBs Perform Prune
Based on VLANs
 Other RBs perform pruning calculation based on the
relationships between VLANs and distribution trees
advertised by ingress RBs, not based on each
distribution tree
24
HUAWEI ENTERPRISE A BETTER WAY
Agenda
Click to add Title
1
TRILL Overview
2
Protocol Mechanism Click to add Title
3
Data Forwarding
4
Click
to add
Title
Device Management and
Fault
Location
5
Use of TRILL
HUAWEI TECHNOLOGIES CO., LTD.
Click to add Title
Click to add Title
Huawei Confidential: Please do not distribute without permission
25
HUAWEI ENTERPRISE A BETTER WAY
TRILL Data Forwarding Process
General Process
 Host A sends an ARP request packet to host B
 Host B returns an ARP reply packet to host A
 Host A sends a Unicast packet to host B
Layer 3
Layer 2
 Note: Hosts A, B, C, and D belong to VLAN 1
RB2
 The forwarding process for Multicast and
broadcast packets in the VLAN is the same as
the forwarding process for ARP request packets
L1
RB1
A
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
RB5
L2
L3
RB2
B
L4
L5
RB3
L6
L7
RB4
C
26
D
L8
HUAWEI ENTERPRISE A BETTER WAY
ARP Request Forwarding Process
Multi-mac
Multicast distribution Tree with RB2 and RB5 as Roots
RB2
L1
RB1
RB5
L2
L3
RB2
L4 L5
L6
RB3
L7
L8
Multi-mac
RB1.mac
RB2.mac
RB2.nkname
RB2.nkname
RB1.nkname
RB1.nkname
Brdcst-mac
Brdcst-mac
Brdcst-mac
Brdcst-mac
A.mac
A.mac
A.mac
A.mac
vlan 1
vlan 1
vlan 1
A.mac
ARP Req
ARP Req
ARP Req
ARP Req
ARP Req
A
RB1
L1
B
C
D
Learn local
entries
1
1.
The ingress RB searches Multicast forwarding entries
based on the distribution tree roots corresponding to the
VLAN, and encapsulates and forwards ARP packets
2
2.
The root RB sends packets to all Multicast group
members
Root RB
Outbound
1
RB2
L1
B
3
Multicast distribution tree
table on RB2
Multicast distribution tree
table on RB3
MAC
Outbound
VLAN
Root RB
Outbound
VLAN
Root RB
Outbound
1
A
local
1
RB2
L1, L3, L5,
L7
1
RB2
local
MAC table on RB3
VLAN entry on RB1
VLAN
1
Multicast spanning tree
root
Learn remote
entries
RB2
3.
After receiving the packets, the egress RB decapsulates
3
and broadcasts the packets locally
HUAWEI TECHNOLOGIES CO., LTD.
RB3
VLAN
Multicast distribution tree
table on RB1
VLAN
L3
2
1
RB4
MAC table on RB1
A
RB2
Brdcst-mac
Huawei Confidential: Please do not distribute without permission
27
VLAN
Root RB
Outbound
1
A
RB1
HUAWEI ENTERPRISE A BETTER WAY
ARP Reply Forwarding Process
RB5.mac
Unicast distribution Tree on RB3
RB2
L1
RB1
RB3
L4
L5
RB4
L6
L7
L8
RB5.mac
RB1.nkname
RB1.nkname
RB3.nkname
RB3.nkname
A.mac
A.mac
A.mac
A.mac
B.mac
B .mac
B.mac
B.mac
vlan 1
vlan 1
vlan 1
B.mac
ARP Rep
ARP Rep
ARP Rep
ARP Rep
ARP Rep
RB5
L2 L3
RB1.mac
RB3.mac
B
L4
RB3
B
C
D
VLAN
MAC
Outbound
1
A
RB1
1
B
local
1
1.
The ingress RB searches MAC forwarding entries,
selects a link to the destination RB, encapsulates and
forwards ARP packets
2
2.
The RBs along the forwarding path forward the packets
based on the Unicast distribution tree
3.
After receiving the packets, the egress RB decapsulates
3
and forwards packets locally
HUAWEI TECHNOLOGIES CO., LTD.
Unicast distribution tree
table on RB3
VLAN
Destination
RB
Outbound
1
RB1
L3/L4
1
RB5
L4
Huawei Confidential: Please do not distribute without permission
L2
RB1
2
1
RB6
MAC table on RB3
A
RB5
A.mac
3
Multicast distribution tree
table on RB5
VLAN
Destination
RB
Outboun
d
1
RB1
L2
Learn local
entries
28
A
MAC table on RB1
VLAN
MAC
Outbound
1
A
Local
1
B
RB3
Learn remote
entries
HUAWEI ENTERPRISE A BETTER WAY
Unicast Forwarding Process from A to B
RB2.mac
Unicast distribution Tree on RB3
RB2
L1
RB1
RB5
L2 L3
RB3
L4
L5
RB4
L6
L7
L8
RB3.mac
RB1.mac
RB2.mac
RB3.nkname
RB3.nkname
RB1.nkname
RB1.nkname
B.mac
B.mac
B.mac
B.mac
A.mac
A .mac
A.mac
B.mac
A.mac
vlan 1
vlan 1
vlan 1
A.mac
data
data
data
data
data
A
L1
RB1
B
C
D
VLAN
MAC
Outbound
1
B
RB3
1
A
local
1
1.
The ingress RB searches MAC address table for the
destination RB. It selects a link and ecapsulates Unicast
packets
2
2.
The RBs along the forwarding path forward the packets
according to the Unicast distribution tree entries
3.
The egress RB receives and decapsulates the packets,
3
and forwards them locally
HUAWEI TECHNOLOGIES CO., LTD.
RB3
VLAN
Destination
RB
Outbound
1
RB3
L1/L2
1
RB5
L2
VLAN
Destination
RB
Outboun
d
1
RB3
L3
29
B
3
MAC table on RB3
Unicast distribution tree
table on RB2
Unicast distribution tree
table on RB1
Huawei Confidential: Please do not distribute without permission
L3
2
1
RB6
MAC table on RB1
A
RB2
VLAN
MAC
Outbound
1
B
Local
1
A
RB1
HUAWEI ENTERPRISE A BETTER WAY
Agenda
Click to add Title
1
TRILL Overview
2
Protocol Mechanism Click to add Title
3
Data Forwarding
4
Click
to add
Title
Device Management and
Fault
Location
5
Use of TRILL
HUAWEI TECHNOLOGIES CO., LTD.
Click to add Title
Click to add Title
Huawei Confidential: Please do not distribute without permission
30
HUAWEI ENTERPRISE A BETTER WAY
In-Band Management
 Each RB has a VLANIF interface corresponding to the inner management VLAN
 An RB advertises network segment 10.1.1.0/24 corresponding to the management VLAN sub-interface
 The network administrator connects to the in-band management VLANIF interface through egress router 1
(from the IP network to TRILL network) and the TRILL network.
 The network administrator can use Telnet, SNMP, or NetConf to manage and configure the RBs through
in-band network
IP:10.1.1.1/24
Request
Network Administrator
PC1
IP Network
RB1
IP:10.1.1.2
RB2
IP:10.1.1.3
Router 1
IP:100.1.1.1
Reply
L2
L3
RB3
IP:10.1.1.4
VLANIF interface of the management VLAN.
The management VLAN is the inner VLAN in TRILL encapsulation
Management VLAN sub-interface corresponding to the router
TRILL Campus
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
31
HUAWEI ENTERPRISE A BETTER WAY
Fault Location
 RBs perform TRILL ping to verify connectivity of the forwarding path
 The protocol packets are transmitted over the TRILL OAM channel
Ping Packet Forwarding Process
TRILL Ping
1.
The user specifies the destination RB nickname, timeout
1
interval, and hop count on the transmit RB, and performs a ping
operation. The RB searches the nickname Unicast forwarding
table to forward the ping packet
RB1
RB2
2.
The intermediate nodes search the nickname forwarding table
2
until the TTL of the ping packet decreases to 0 or the packet
reaches the destination, and forward the packet to the CPUs
3.
The CPU finds that the TTL of the packet is 1, and checks
3
whether the local RB is the destination. If the RB is the
destination, the RB returns an Echo Reply; otherwise, it returns
an Error Notification with the error message “TTL timeout”
RB3
TRILL Campus
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
32
HUAWEI ENTERPRISE A BETTER WAY
Agenda
Click to add Title
1
TRILL Overview
2
Protocol Mechanism Click to add Title
3
Data Forwarding
4
Click
to add
Title
Device Management and
Fault
Location
5
Use of TRILL
HUAWEI TECHNOLOGIES CO., LTD.
Click to add Title
Click to add Title
Huawei Confidential: Please do not distribute without permission
33
HUAWEI ENTERPRISE A BETTER WAY
Gateway Deployment and Server Access Mode
Gateway Deployment
IP Network
 The core RB is separated from the Layer
3 gateway, or;
IP Network
 The core RB is integrated with the Layer
3 gateway
 The device is divided into two VSs. One
VS implements Layer 3 gateway function
and the other one implements the RB
function
TRILL Network Deployment
 Access switches are deployed in TOR or
EOR mode
 The TRILL network can be extended to the
access switches, covering the entire DC
 Access switches support the stack function.
Servers are dual homed to the access
switches to improve service reliability
HUAWEI TECHNOLOGIES CO., LTD.
TRILL Campus
TRILL Campus
.....
.....
Stack
Stack
.....
.....
Server
Server
Network 1: Separating Layer 3 Gateway
and Aggregation Switch
Huawei Confidential: Please do not distribute without permission
Network 2: Integrating Layer 2 Gateway
and Aggregation switch
34
HUAWEI ENTERPRISE A BETTER WAY
Value Added Service Deployment
Features
IP Network
 The FWs and LBs are located between access switches and
egress routers to process southbound and northbound traffic
 To process eastbound and westbound traffic between
network segments, the gateway can be deployed on the FW
if servers are located in un-trusted zones
FW
FW
LB
LB
 If servers are located in the same trusted zone, the gateway
can be deployed on the aggregation switch
 The eastbound and westbound traffic within a network
segment is forwarded at Layer 2 on the TRILL network
Southbound and northbound traffic between client and server
FW
FW
TRILL Campus
.....
Inter-network segment traffic between servers, filtered by firewall
Inter-network segment traffic between servers, not filtered by
firewall
Inter-network segment traffic between servers
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
.....
Server
35
HUAWEI ENTERPRISE A BETTER WAY
DC Seamless Migration 1
Preserve Customer Investment
IP Network
Migration Method
 In the early history of DC, Layer 2 networks used
MSTP because switches (such as S9300)
hardware did not support TRILL
IP Network
 With new devices (such as CE12800) DCs can
support TRILL and large Layer 2, the large Layer
2 network can also run MSTP
Seamless
Migration
TRILL Campus
MSTP Network
 Servers can be connected to access switches on
the MSTP or TRILL network. Thus, VMs can
migrate the entire large Layer 2 network
.....
Implementation
MSTP Network
 The edge devices on the TRILL network simulate
the MSTP root bridges to communicate with the
MSTP network.
.....
VLAN 1
VLAN 1
VLAN 1
 After receiving a TCN packet indicating MSTP
topology change, the edge devices clear their own
MAC address entries and request the peer RBs to
clear the related MAC address entries
HUAWEI TECHNOLOGIES CO., LTD.
.....
Huawei Confidential: Please do not distribute without permission
.....
VLAN 1
VLAN 1
36
VLAN 1
HUAWEI ENTERPRISE A BETTER WAY
DC Seamless Migration 2
Seamless Migration of O&M
IP Network
IP Network
Seamless
Migration
MSTP Network
TRILL Campus
TRILL Campus
.....
.....
.....
.....
VLAN 1-3000 VLAN 1-3000 VLAN 3001
HUAWEI TECHNOLOGIES CO., LTD.
VLAN 3001
.....
.....
VLAN 1-3000 VLAN 1-3000 VLAN 3001
Huawei Confidential: Please do not distribute without permission
37
VLAN 3001
HUAWEI ENTERPRISE A BETTER WAY
TRILL Application – Interconnection Between DCs (1)
TRILL Network Capable of Interconnecting with Other types of Networks
L1
PE
Trill
Campus
PE
VPLS Network
Trill Campus or Another
Type of Network
IP/MPLS
L2
Site 1
Site 2
 TRILL does not run between egress RBs or
different DCs
MAC1
Outbound Interface 1
MAC of Site 2
L1
MAC of Site 3
L2
MAC of Site 1
Interface in Site 1
Trill Campus or Another
Type of Network
 Different DCs are interconnected through a
VPLS network or optical fibers
Site 3
HUAWEI TECHNOLOGIES CO., LTD.
 The interconnecting interfaces between the
RBs are inbound interfaces for servers in the
respective TRILL sites
Huawei Confidential: Please do not distribute without permission
 Egress RBs must learn MAC addresses of all
servers
38
HUAWEI ENTERPRISE A BETTER WAY
TRILL Application – Interconnection Between DCs (2)
Fewer MAC Addresses to be learned on Egress RBs
TRILL Over VPLS
R1
VPLS Network
Trill Campus
Trill Campus
R2
Site 1
Site 2
 Multiple DC sites participate in computing a
distribution tree
R1
Trill Campus
 Egress RBs in each DC work as transit nodes and
do not encapsulate or decapsulate TRILL data
packets
 Egress RBs do not need to learn server MAC
addresses
 The Multicast distribution tree uses an egress RB as
the root, saving bandwidth on egress links
Site 1
Site 2
HUAWEI TECHNOLOGIES CO., LTD.
Site 3
Site 3
Huawei Confidential: Please do not distribute without permission
 Multicast packets are forwarded through local links if
they do not need to traverse the local DC site
39
HUAWEI ENTERPRISE A BETTER WAY
Campus Network 1
 Access layer and aggregation
layer: At Layer 2, the TRILL
protocol is used to replace MSTP
to increase bandwidth use
efficiency, reduce convergence
time, implement automatic
deployment, and prevent loops
 Aggregation layer and core layer:
Layer 3 networks are deployed
between departments to forward
inter-department traffic
 Devices at the aggregation layer
function as gateways to
interconnect Layer 2 and Layer 3
networks
HUAWEI TECHNOLOGIES CO., LTD.
WAN
WAN
Campus Egress
Core Layer
IP Network
Aggregation
Layer
TRILL
Campus
TRILL
Campus
Dept. A
Dept. B
TRILL
Campus
Access Layer
Huawei Confidential: Please do not distribute without permission
40
Other Zones
HUAWEI ENTERPRISE A BETTER WAY
Campus Network 2
 The sites of a service system are
distributed in different locations:
Internet
WAN
Campus Egress
– For example, building sites need
to communicate with each other
through Layer 2
 Each site set up a Layer 2 network
using Native Ethernet, and different
sites are connected by the TRILL
network
 The TRILL network forwards traffic
between sites, forming a large
Layer 2 network
 The gateway is deployed on the
campus egress router or core
switch to interconnect Layer 2 and
Layer 3 networks
HUAWEI TECHNOLOGIES CO., LTD.
Core Layer
TRILL Campus
Aggregation
Layer
Native
Ethernet
Native
Ethernet
Site A
Site B
Native
Ethernet
Access Layer
Huawei Confidential: Please do not distribute without permission
41
Site C
HUAWEI ENTERPRISE A BETTER WAY
Glossary of Terms
Acronym
Definition
RB
Router Bridge
AF
Appointed Forwarder
DRB
Designated Router Bridge
SPF
Shortest Path First
IS-IS
Intermediate System to Intermediate System
LSP
Link State PDU
P2P
Point to Point
VS
Virtual Switch
RPF
Reverse Path Forwarding
UNI
User Network Interface
NNI
Network Network interface
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential: Please do not distribute without permission
42
HUAWEI ENTERPRISE A BETTER WAY
Thank You
www.huawei.com
enterprise.huawei.com
HUAWEI TECHNOLOGIES CO., LTD.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising