< draft-ietf-trill-centralized-replication-02.txt   draft-ietf-trill-centralized-replication-03.txt >
skipping to change at page 1, line 13 skipping to change at page 1, line 13
INTERNET-DRAFT Y. Li INTERNET-DRAFT Y. Li
Intended Status: Standard Track Huawei Technologies Intended Status: Standard Track Huawei Technologies
M. Durrani M. Durrani
Cisco Cisco
S. Gupta S. Gupta
IP Infusion IP Infusion
A. Qu A. Qu
MediaTec MediaTec
T. Han T. Han
Huawei Technologies Huawei Technologies
Expires: October 2015 April 30, 2015 Expires: July 2016 November 09, 2015
Centralized Replication for BUM traffic in active-active edge Centralized Replication for BUM traffic in active-active edge
connection connection
draft-ietf-trill-centralized-replication-02.txt draft-ietf-trill-centralized-replication-03.txt
Abstract Abstract
In TRILL active-active access scenario, RPF check failure issue may In TRILL active-active access scenario, RPF check failure issue may
occur when pseudo-nickname mechanism in [TRILLPN] is used. This occur when pseudo-nickname mechanism in [TRILLPN] is used. This
draft describes a solution to the RPF check failure issue through draft describes a solution to resolve the RPF check failure issue
centralized replication for BUM (Broadcast, Unknown unicast, through centralized replication. The solution has all ingress RBs
Mutlicast) traffic. The solution has all ingress RBs send BUM send BUM(Broadcast, Unknown unicast, Mutlicast) traffic to a
traffic to a centralized node via unicast TRILL encapsulation. When centralized node via unicast TRILL encapsulation. When the
the centralized node receives the BUM traffic, it decapsulates the centralized node receives the BUM traffic, it decapsulates the
traffic and forwards the BUM traffic to all destination RBs using a traffic and forwards the BUM traffic to all destination RBs using a
distribution tree established via the TRILL base protocol. To avoid distribution tree established via the TRILL base protocol. To avoid
RPF check failure on a RBridge sitting between the ingress RBridge RPF check failure on a RBridge sitting between the ingress RBridge
and the centralized replication node, some change of RPF calculation and the centralized replication node, some change of RPF calculation
algorithm is required. RPF calculation on each RBridge should use algorithm is required. RPF calculation on each RBridge should use
the centralized node as ingress RB instead of the real ingress the centralized node as ingress RB instead of the real ingress
RBridge of RBv to perform the calculation. RBridge of RBv to perform the calculation.
Status of this Memo Status of this Memo
skipping to change at page 2, line 39 skipping to change at page 2, line 39
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License. warranty as described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction ................................................ 3 1. Introduction ................................................ 3
2. Conventions used in this document............................ 4 2. Conventions used in this document ............................ 4
3. Centralized Replication Solution Overview.................... 4 3. Centralized Replication Solution Overview .................... 4
4. Frame duplication from remote RB............................. 5 4. Frame duplication from remote RB ............................. 5
5. Local forwarding behavior on ingress RBridge................. 6 5. Local forwarding behavior on ingress RBridge ................. 6
6. Loop prevention among RBridges in a edge group............... 7 6. Loop prevention among RBridges in a edge group ............... 7
7. Centralized replication forwarding process................... 8 7. Centralized replication forwarding process ................... 8
8. BUM traffic loadbalancing among multiple centralized nodes....9 8. BUM traffic loadbalancing among multiple centralized nodes.... 9
9. Co-existing with CMT solution............................... 10 9. Co-existing with CMT solution ............................... 10
10. Network Migration Analysis................................. 11 10. Network Migration Analysis ................................. 11
11. TRILL protocol extension................................... 11 11. TRILL protocol extension ................................... 11
11.1. "R" and "C" Flag in Nickname Flags APPsub-TLV..........11 11.1. "R" and "C" Flag in Nickname Flags APPsub-TLV.......... 11
12. Security Considerations.................................... 12 12. Security Considerations .................................... 12
13. IANA Considerations........................................ 12 13. IANA Considerations ........................................ 12
14. References ................................................ 12 14. References ................................................ 12
14.1. Normative References ..................................12 14.1. Normative References .................................. 12
14.2. Informative References ................................12 14.2. Informative References ................................ 12
15. Acknowledgments ........................................... 13 15. Acknowledgments ........................................... 13
1. Introduction 1. Introduction
The IETF TRILL (Transparent Interconnection of Lots of Links) The IETF TRILL (Transparent Interconnection of Lots of Links)
[RFC6325] protocol provides loop free and per hop based multipath [RFC6325] protocol provides loop free and per hop based multipath
data forwarding with minimum configuration. TRILL uses IS-IS data forwarding with minimum configuration. TRILL uses IS-IS
[RFC6165] [RFC6326bis] as its control plane routing protocol and [RFC6165] [RFC6326bis] as its control plane routing protocol and
defines a TRILL specific header for user data. defines a TRILL specific header for user data.
Classic Ethernet device (CE) devices typically are multi-homed to Classic Ethernet device (CE) devices typically are multi-homed to
skipping to change at page 3, line 41 skipping to change at page 3, line 41
In active-active access scenario, pseudo-nickname solution in In active-active access scenario, pseudo-nickname solution in
[TRILLPN] can be used to avoid MAC flip-flop on remote RBs. The [TRILLPN] can be used to avoid MAC flip-flop on remote RBs. The
basic idea is to use a virtual RBridge of RBv with a single pseudo- basic idea is to use a virtual RBridge of RBv with a single pseudo-
nickname to represent an edge group that MC-LAG connects to. Any nickname to represent an edge group that MC-LAG connects to. Any
member RBridge of that edge group should use this pseudo-nickname member RBridge of that edge group should use this pseudo-nickname
rather than its own nickname as ingress nickname when it injects rather than its own nickname as ingress nickname when it injects
TRILL data frames to TRILL campus. The use of the nickname solves TRILL data frames to TRILL campus. The use of the nickname solves
the address flip flop issue by making the MAC address learnt by the the address flip flop issue by making the MAC address learnt by the
remote RBridge bound to pseudo-nickname. However, it introduces remote RBridge bound to pseudo-nickname. However, it introduces
another issue, which is incorrect packet drop by RPF check failure. another issue of incorrect packet drop which will be described as
When a pseudo-nickname is used by an edge RBridge as the ingress follows. When a pseudo-nickname is used by an edge RBridge as the
nickname to forward BUM traffic, any RBridges sitting between the ingress nickname to forward BUM traffic, any RBridges sitting
ingress RB and the distribution tree root will treat the traffic as between the ingress RB and the distribution tree root will treat the
it is ingressed from the virtual RBridge RBv. If same distribution traffic as it is ingressed from the virtual RBridge RBv. If same
tree is used by these different edge RBridges, the traffic may distribution tree is used by these different edge RBridges, the
arrive at RBn from different ports. Then the RPF check fails, and traffic may arrive at RBn from different ports. Then the RPF check
some of the traffic receiving from unexpected ports will be dropped fails, and some of the traffic receiving from unexpected ports will
by RBn. be dropped by RBn.
This document proposes a centralized replication solution for This document proposes a centralized replication solution for
broadcast, unknown unicast, multicast(BUM) traffic forwarding to broadcast, unknown unicast, multicast(BUM) traffic forwarding to
solve the issue of incorrect packet drop by RPF check failure. The resolve the issue of incorrect packet drop incurred by RPF check
basic idea is that all ingress RBs send BUM traffic to a centralized failure. The basic idea is that all ingress RBs send BUM traffic to
node which is recommended to be a distribution tree root using a centralized node which is recommended to be a distribution tree
unicast TRILL encapsulation. When the centralized node receives that root using unicast TRILL encapsulation. When the centralized node
traffic, it decapsulates it and then forwards the BUM traffic to all receives that traffic, it decapsulates it and then forwards the BUM
destination RBs using a distribution tree established per TRILL base traffic to all destination RBs using a distribution tree established
protocol. per TRILL base protocol.
2. Conventions used in this document 2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 document are to be interpreted as described in RFC-2119
[RFC2119].The acronyms and terminology in [RFC6325] is used herein [RFC2119].The acronyms and terminology in [RFC6325] is used herein
with the following additions: with the following additions:
BUM - Broadcast, Unknown unicast, and Multicast BUM - Broadcast, Unknown unicast, and Multicast
skipping to change at page 4, line 43 skipping to change at page 4, line 43
TRILL encapsulation to send the traffic to a centralized node. The TRILL encapsulation to send the traffic to a centralized node. The
centralized node is recommended to be a distribution tree root. centralized node is recommended to be a distribution tree root.
The TRILL header of the unicast TRILL encapsulation contains an The TRILL header of the unicast TRILL encapsulation contains an
"ingress RBridge nickname" field and an "egress RBridge nickname" "ingress RBridge nickname" field and an "egress RBridge nickname"
field. If ingress RB receives the traffic from the port which is in field. If ingress RB receives the traffic from the port which is in
a MC-LAG, it should set the ingress RBridge nickname to be the a MC-LAG, it should set the ingress RBridge nickname to be the
pseudo-nickname rather than its own nickname to avoid MAC flip-flop pseudo-nickname rather than its own nickname to avoid MAC flip-flop
on remote RBs as per [TRILLPN]. The egress RBridge nickname is set on remote RBs as per [TRILLPN]. The egress RBridge nickname is set
to the special nickname of the centralized node which is used to to the special nickname of the centralized node which is used to
differentiate the unicast TRILL encapsulation BUM traffic from differentiate the centralized replication purpose unicast TRILL
normal unicast TRILL traffic. The special nickname is called R- encapsulation from normal unicast TRILL encapsulation. The special
nickname. nickname is called R-nickname.
When the centralized node receives the unicast TRILL encapsulated When the centralized node receives the unicast TRILL encapsulated
BUM traffic from ingress RB, the node decapsulates the packet. Then BUM traffic from ingress RB, the node decapsulates the packet. Then
the centralized node replicates and forwards the BUM traffic to all the centralized node replicates and forwards the BUM traffic to all
destination RBs using one of the distribution trees established per destination RBs using one of the distribution trees established per
TRILL base protocol, if the centralized node is the root of a TRILL base protocol, if the centralized node is the root of a
distribution tree, the recommended distribution tree is the tree distribution tree, the recommended distribution tree is the tree
whose root is the centralized node itself. When the centralized node whose root is the centralized node itself. When the centralized node
forwards the BUM traffic, ingress nickname remains the same as that forwards the BUM traffic, ingress nickname remains unchanged as that
in frame it received to ensure that the MAC address learnt by all in frame it received to ensure that the MAC address learnt by all
egress RBridges bound to pseudo-nickname. egress RBridges bound to pseudo-nickname.
When the replicated traffic is forwarded on each RBridge along the When the replicated traffic is forwarded on each RBridge along the
distribution tree starting from the centralized node, RPF check will distribution tree starting from the centralized node, RPF check will
be performed as per RFC6325. For any RBridge sitting between the be performed as per RFC6325. For any RBridge sitting between the
ingress RBridge and the centralized replication node, the traffic ingress RBridge and the centralized replication node, the traffic
incoming port should be the centralized node facing port as the incoming port should be the centralized node facing port as the
multicast traffic always comes from the centralized node in this multicast traffic always comes from the centralized node in this
solution. However the RPF port as result of distribution tree solution. However the RPF port as result of distribution tree
calculation as per RFC 6325 will be the real ingress RB facing port calculation as per RFC 6325 will be the real ingress RB facing port
as it uses virtual RBridge as ingress RB, so RPF check will fail. To as it uses virtual RBridge as ingress RB, so RPF check will fail. To
solve this problem, some change of RPF calculation algorithm is solve this problem, some change of RPF calculation algorithm is
required. RPF calculation on each RBridge should use the centralized required. RPF calculation on each RBridge should use the centralized
node as ingress RB instead of the real ingress virtual RBridge to node as ingress RB instead of the real ingress virtual RBridge to
perform the calculation. As a result, RPF check will point to the perform the calculation. As a result, RPF check will point to the
centralized node facing port on the RBridge for multi-destination centralized node facing port on the RBridge for multi-destination
traffic. It prevents the incorrect frame discard by RPF check. traffic. It prevents the incorrect frame discard by RPF check.
To differentiate the unicast TRILL encapsulation BUM traffic from To differentiate the centralized purpose unicast TRILL encapsulation
normal unicast TRILL traffic on a centralized node, besides the from normal unicast TRILL encapsulation on a centralized node,
centralized node's own nickname, R-nickname should be introduced for besides the centralized node's own nickname, R-nickname should be
centralized replication. Only when the centralized node receives introduced for centralized replication. Only when the centralized
unicast TRILL encapsulation traffic with egress nickname equivalent node receives unicast TRILL encapsulation traffic with egress
to the R-nickname, the node does unicast TRILL decapsulaton and then nickname equivalent to the R-nickname, the node does unicast TRILL
forwards the traffic to all destination RBs through a distribution decapsulaton and then forwards the traffic to all destination RBs
tree. The centralized nodes should announce its R-nickname to all through a distribution tree. The centralized nodes should announce
TRILL campus through TRILL LSP extension. its R-nickname to all TRILL campus through TRILL LSP extension.
4. Frame duplication from remote RB 4. Frame duplication from remote RB
Frame duplication may occur when a remote host sends multi- Frame duplication may occur when a remote host sends multi-
destination frame to a local CE which has an active-active destination frame to a local CE which has an active-active
connection to the TRILL campus. To avoid local CE receiving multiple connection to the TRILL campus. To avoid local CE receiving multiple
copies from a remote RBridge, the designated forwarder (DF) copies from a remote RBridge, the designated forwarder (DF)
mechanism should be supported for egress direction multicast traffic. mechanism should be supported for egress direction multicast traffic.
DF election mechanism allows only one port in one RB of MC-LAG to DF election mechanism allows only one port in one RB of MC-LAG to
forward multicast traffic from TRILL campus to local access side for forward multicast traffic from TRILL campus to local access side for
each VLAN. The basic idea of DF is to elect one RBridge per VLAN each VLAN. The basic idea of DF is to elect one RBridge per VLAN
from an edge group to be responsible for egressing the multicast from an edge group to be responsible for egressing the multicast
traffic. [draft-hao-trill-dup-avoidance-active-active-02] describes traffic. [TRILLPN] describes the detail DF election mechanism among
the detail DF mechanism and TRILL protocol extension for DF election. member RBridges involving in a MC-LAG.
If DF-election mechanism is used for frame duplication prevention, If DF election mechanism is used for frame duplication prevention,
access ports on an RB are categorized as three types: non mc-lag, access ports on an RB are categorized as three types: non mc-lag,
mc-lag DF port and mc-lag non-DF port. The last two types can be mc-lag DF port and mc-lag non-DF port. The last two types can be
called mc-lag port. For each of the mc-lag port, there is a pseudo- called mc-lag port. For each of the mc-lag port, there is a pseudo-
nickname associated. If consistent nickname allocation per edge nickname associated. If consistent nickname allocation per edge
group RBridges is used, it is possible that same pseudo-nickname group RBridges is used, it is possible that same pseudo-nickname
associated to more than one port on a single RB. A typical scenario associated to more than one port on a single RB. A typical scenario
is that CE1 is connected to RB1 & RB2 by mc-lag1 while CE2 is is that CE1 is connected to RB1 & RB2 by mc-lag1 while CE2 is
connected to RB1 & RB2 by mc-lag 2. In order to conserve the number connected to RB1 & RB2 by mc-lag 2. In order to conserve the number
of pseudo-nickname used, member ports for both mc-lag1 and mc-lag2 of pseudo-nickname used, member ports for both mc-lag1 and mc-lag2
on RB1 & RB2 are all associated to pseudo-nickname pn1. on RB1 & RB2 are all associated to pseudo-nickname pn1.
5. Local forwarding behavior on ingress RBridge 5. Local forwarding behavior on ingress RBridge
When a ingress RBridge(RB1) receives BUM traffic from an active- When an ingress RBridge(RB1) receives BUM traffic from a local
active accessing CE(CE1) device, the traffic will be injected to active-active accessing CE(CE1) device, the traffic will be injected
TRILL campus through TRILL encapsulation, and it will be replicated to TRILL campus through TRILL encapsulation, and it will be
and forwarded to all destination RBs which include ingress RB itself replicated and forwarded to all destination RBs which include
along a TRILL distribution tree. So the traffic will return to the ingress RB itself along a TRILL distribution tree, the traffic will
ingress RBridge. To avoid the traffic looping back to original also return to the ingress RBridge. To avoid the traffic looping
sender CE, ingress nickname can be used for traffic filtering. back to original sender CE, ingress nickname of pseudo-nickname can
be used for traffic filtering.
If there are two local connecting CE(CE1 and CE2) devices on ingress If there are two CEs of CE1 and CE2 connecting to the ingress RB1
RB, the BUM traffic between these two CEs can't be forwarded locally associated with same pseudo-nickname, CE1 needs to locally
and through TRILL campus simultaneously, otherwise duplicated replicates and forwards to CE2, because another copy of the BUM
traffic will be received by destination CE. Local forwarding traffic between CE1 and CE2 through TRILL campus will be blocked by
behavior on ingress RBridge should be carefully designed. the traffic filtering.
To avoid duplicated traffic on receiver CE, local replication If CE1 and CE2 are not associated with same pseudo-nickname, the
behavior on RB1 is as follows: copy of the BUM traffic between CE1 and CE2 through TRILL campus
won't be blocked by the traffic filtering. To avoid duplicated
traffic on receiver CE, the local replicated BUM traffic between
these two CEs on ingress RB1 should be blocked.
In summary, to ensure correct BUM traffic forwarding behavior for
each CE, local replication behavior on ingress RBridge should be
carefully designed as follows:
1. Local replication to the ports associated with the same pseudo- 1. Local replication to the ports associated with the same pseudo-
nickname as that associated to the incoming port. nickname as that associated to the incoming port.
2. Do not replicate to mc-lag port associated with different pseudo- 2. Do not replicate to mc-lag port associated with different pseudo-
nickname. nickname.
3. Do not replicate to non mc-lag ports. 3. Do not replicate to non mc-lag ports.
The above local forwarding behavior on the ingress RB of RB1 can be The above local forwarding behavior on the ingress RB of RB1 can be
skipping to change at page 7, line 49 skipping to change at page 8, line 9
active access CEs as ingress nickname, egress RB can use the active access CEs as ingress nickname, egress RB can use the
nickname to filter traffic forwarding to all local CE. In this case, nickname to filter traffic forwarding to all local CE. In this case,
the traffic between these two CEs goes through local RB and another the traffic between these two CEs goes through local RB and another
copy of the traffic from TRILL campus is filtered. If different copy of the traffic from TRILL campus is filtered. If different
ingress nickname is used for two connecting CE devices, the access ingress nickname is used for two connecting CE devices, the access
ports connecting to these two CEs should be isolated with each other. ports connecting to these two CEs should be isolated with each other.
The BUM traffic between these two CEs should go through TRILL campus, The BUM traffic between these two CEs should go through TRILL campus,
otherwise the destination CE connected to same RB with the sender CE otherwise the destination CE connected to same RB with the sender CE
will receive two copies of the traffic. will receive two copies of the traffic.
Do note that the above sections on techniques to avoid frame
duplication, loop prevention is applicable assuming the Link
aggregation technology in use is unaware of the frame duplication
happening. For example using mechanisms like IEEE802.1AX,
Distributed Resilient Network Interconnect (DRNI) specs implements
mechanism similar to DF and also avoids some cases of frame
duplication & looping.
7. Centralized replication forwarding process 7. Centralized replication forwarding process
+-----------+ +-----------+
| (RB5) | | (RB5) |
+-----------+ +-----------+
| |
+-----------+ +-----------+
| (RB4) | | (RB4) |
+-----------+ +-----------+
skipping to change at page 12, line 41 skipping to change at page 12, line 41
and A. Ghanwani, "TRILL Use of IS-IS", draft-eastlake-isis- and A. Ghanwani, "TRILL Use of IS-IS", draft-eastlake-isis-
rfc6326bis, work in progress. rfc6326bis, work in progress.
[4] [RFC7180bis] Eastlake, D., Zhang, M., Perlman, R., Banerjee, A. [4] [RFC7180bis] Eastlake, D., Zhang, M., Perlman, R., Banerjee, A.
Ghanwani and Gupta.S, "TRILL: Clarifications, Corrections, and Ghanwani and Gupta.S, "TRILL: Clarifications, Corrections, and
Updates", draft-ietf-trill-rfc7180bis-00, work in progress. Updates", draft-ietf-trill-rfc7180bis-00, work in progress.
14.2. Informative References 14.2. Informative References
[1] [TRILLPN] Zhai,H., et.al., "RBridge: Pseduonode nickname", [1] [TRILLPN] Zhai,H., et.al., "RBridge: Pseduonode nickname",
draft-hu-trill-pseudonode-nickname, Work in progress, November draft-hu-trill-pseudonode-nickname-07, Work in progress,
2011. November 2011.
[2] [TRILAA] Li,Y., et.al., " Problem Statement and Goals for [2] [TRILAA] Li,Y., et.al., " Problem Statement and Goals for
Active-Active TRILL Edge", draft-ietf-trill-active-active- Active-Active TRILL Edge", draft-ietf-trill-active-active-
connection-prob-00, Work in progress, July 2013. connection-prob-00, Work in progress, July 2013.
[3] [CMT] Senevirathne, T., Pathangi, J., and J. Hudson, [3] [CMT] Senevirathne, T., Pathangi, J., and J. Hudson,
"Coordinated Multicast Trees (CMT)for TRILL", draft-ietf- "Coordinated Multicast Trees (CMT)for TRILL", draft-ietf-
trill-cmt-00.txt Work in Progress, April 2012. trill-cmt-00.txt Work in Progress, April 2012.
15. Acknowledgments 15. Acknowledgments
The authors wish to acknowledge the important contributions of The authors wish to acknowledge the important contributions of
Hongjun Zhai, Xiaomin Wu, Liang Xia. Russ White, Donald Eastlake, Hongjun Zhai, Xiaomin Wu, Liang Xia.
Authors' Addresses Authors' Addresses
Weiguo Hao Weiguo Hao
Huawei Technologies Huawei Technologies
101 Software Avenue, 101 Software Avenue,
Nanjing 210012 Nanjing 210012
China China
Email: haoweiguo@huawei.com Email: haoweiguo@huawei.com
skipping to change at page 13, line 38 skipping to change at page 13, line 38
Email: mdurrani@cisco.com Email: mdurrani@cisco.com
Sujay Gupta Sujay Gupta
IP Infusion IP Infusion
RMZ Centennial RMZ Centennial
Mahadevapura Post Mahadevapura Post
Bangalore - 560048 Bangalore - 560048
India India
Email: sujay.gupta@ipinfusion.com Email: sujay.gupta@ipinfusion.com
Andrew Qu Andrew Qu
MediaTec MediaTec
Email: laodulaodu@gmail.com Email: laodulaodu@gmail.com
Tao Han Tao Han
Huawei Technologies Huawei Technologies
101 Software Avenue, 101 Software Avenue,
Nanjing 210012 Nanjing 210012
China China
Email: billow.han@huawei.com Email: billow.han@huawei.com
 End of changes. 18 change blocks. 
83 lines changed or deleted 83 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/