SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
LAN Extension and
Virtualization using
Layer 3 Protocols

.

LAN

Raj Jain
Washington University in Saint Louis
Saint Louis, MO 63130
Jain@cse.wustl.edu
These slides and audio/video recordings of this class lecture are at:
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-1

©2013 Raj Jain
Overview
1.
2.
3.

Data Center Interconnection and LAN extension
TRILL
LISP

Note: Data Center partitioning techniques for multi-tenancy are
discussed in another module that covers NVO3, VXLAN,
NVGRE, and STT.
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-2

©2013 Raj Jain
Network Virtualization Techniques
Entity
NIC
Switch
L2 Link
L2 Network using L2

Partitioning
SR-IOV
VEB, VEPA
VLANs
VLAN

L2 Network using L3 NVO3,
VXLAN,
NVGRE, STT
Router
VDCs, VRF
L3 Network using L1
L3 Network using
MPLS, GRE,
L3*
PW, IPSec
Application
ADCs

Aggregation/Extension/Interconnection**
MR-IOV
VSS, VBE, DVS, FEX
LACP, Virtual PortChannels
PB (Q-in-Q), PBB (MAC-in-MAC), PBB-TE,
Access-EPL, EVPL, EVP-Tree, EVPLAN
MPLS, VPLS, A-VPLS, H-VPLS, PWoMPLS,
PWoGRE, OTV, TRILL, LISP, L2TPv3
,
EVPN, PBB-EVPN
VRRP, HSRP
GMPLS, SONET
MPLS, T-MPLS, MPLS-TP, GRE, PW, IPSec
Load Balancers

*All L2/L3 technologies for L2 Network partitioning and aggregation can also be used for L3 network
partitioning and aggregation, respectively, by simply putting L3 packets in L2 payloads.
**The aggregation technologies can also be seen as partitioning technologies from the provider point of view.
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-3

©2013 Raj Jain
Geographic Clusters of Data Centers







Multiple data centers are used to improve availability
Cold-Standby: Data is backed up on tapes and stored off-site.
In case of disaster, application and data are loaded in standby.
Manual switchover  Significant downtime. (1970-1990)
Hot-Standby: Two servers in different geographically close
data centers exchange state and data continuously.
Synchronous or Asynchronous data replication to standby.
On a failure, the application automatically switches to standby.
Automatic switchover  Reduced downtime (1990-2005)
Only 50% of resources are used under normal operation.
Active-Active: All resources are used. Virtual machines and
data can be quickly moved between sites, when needed.

Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

12-4

©2013 Raj Jain
Data Center Interconnection (DCI)





Allows distant data centers to be connected in one L2 domain
 Distributed applications
 Disaster recovery
 Maintenance/Migration
 High-Availability
 Consolidation
Active and standby can share the same virtual IP for switchover.
Multicast can be used to send state to multiple destinations.

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-5

©2013 Raj Jain
Challenges of LAN Extension







Broadcast storms: Unknown and broadcast
frames may create excessive flood
Loops: Easy to form loops in a large network.
STP Issues:
 High spanning tree diameter (leaf-to-leaf):
More than 7.
 Root can become bottleneck and a single
point of failure
 Multiple paths remain unused
Tromboning: Dual attached servers
Core
and switches generate excessive
Aggregation
cross traffic
Access
Security: Data on LAN extension
Server
must be encrypted

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-6

LAN

LAN Extension



Core
Aggregation
Access
Server
©2013 Raj Jain
TRILL








Transparent Interconnection of Lots of Links
Allows a large campus to be a single extended LAN
LANs allow free mobility inside the LAN but:
 Inefficient paths using Spanning tree
 Inefficient link utilization since many links are disabled
 Inefficient link utilization since multipath is not allowed.
 Unstable: small changes in network  large changes in
spanning tree
IP subnets are not good for mobility because IP addresses
change as nodes move and break transport connections, but:
 IP routing is efficient, optimal, and stable
Solution: Take the best of both worlds
 Use MAC addresses and IP routing

Ref: RFCs 5556, 6325, 6326, 6327, 6361, 6439
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-7

©2013 Raj Jain
TRILL Architecture






Routing Bridges (RBridges) encapsulate L2 frames and route
them to destination RBridges which decapsulate and forward
Header contains a hop-limit to avoid looping
RBridges run IS-IS to compute pair-wise optimal paths for
unicast and distribution trees for multicast
RBridge learn MAC addresses by source learning and by
exchanging their MAC tables with other RBridges
Each VLAN on the link has one (and only one) designated
RBridge using IS-IS election protocol
RB2
H1

RB1

RB4

RB3

H2

Ref: R. Perlman, "RBridges: Transparent Routing," Infocom 2004
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-8

©2013 Raj Jain
TRILL Encapsulation Format
Outer Header TRILL header Original 802.1Q packet
Version Res.
2b




2b

MultiOptions Hops
Egress Ingress Options
Destination Length to Live RBridge RBridge
1b
5b
6b
16b
16b

For outer headers both PPP and Ethernet headers are allowed.
PPP for long haul.
Outer Ethernet header can have a VLAN ID corresponding to
the VLAN used for TRILL.
Priority bits in outer headers are copied from inner VLAN

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-9

©2013 Raj Jain
TRILL Features









Transparent: No change to capabilities.
Broadcast, Unknown, Multicast (BUM) support. Autolearning.
Zero Configuration: RBridges discover their connectivity and
learn MAC addresses automatically
Hosts can be multi-homed
VLANs are supported
Optimized route
No loops
Legacy bridges with spanning tree in the same extended LAN

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-10

©2013 Raj Jain
TRILL: Summary



TRILL allows a large campus to be a single Extended LAN
Packets are encapsulated and routed using IS-IS routing

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-11

©2013 Raj Jain
Locator ID Separation Protocol (LISP)



Each host has an ID and a locator
e.g., Raj Jain (EID) at WashU (RLOC)
IPv6: 2001:0034:0000:0000:0001:0002:0003:0004
Locator

ID

IPv4: 128.72.45.65.192.168.0.1
Locator



ID

Inside a site, the routing is based on ID.
Between sites, the routing is based on locators
Edge routers encapsulate packets with locator on outer header.
Boston
Locator
172.0.0.1

Site 1
Bob
ID 1.0.0.1

Edge
Router

Washington University in St. Louis

New York
Locator
108.0.0.2

Los Angeles
Locator
185.0.0.3

Core
Legacy
Routers

San Jose
Locator
92.0.0.1

http://www.cse.wustl.edu/~jain/cse570-13/

12-12

Edge
Router

Carol
ID 2.0.0.2

Site 4
©2013 Raj Jain
LISP (Cont)






IDs look like IP addresses  No changes to hosts
Locators look like IP addresses  No changes to core routers
between sites
Changes are required only in routers at the edge of the sites.
Trick: Edge routers use IP-in-IP tunneling to send packets
between sites.
A “map server” keeps track of ID to locator mapping
Source Dest. UDP Source
Locator Locator
ID
External IP Header

Dest
ID

IP
Payload

Internal IP Header

Ref: LISP – Routing in the Cloud, Sep 2012, http://lisp.cisco.com/LISP_Update.pdf
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

12-13

©2013 Raj Jain
LISP Terminology










Endpoint Identifier (EID): ID from different name space.
Not routable on global Internet. Registered in DNS.
Routing Locators (RLOC): Existing name space.
Globally routable. Assigned to routers.
Hosts do not know about them.
Ingress Tunnel Router (ITR): Encapsulates and transmits
Egress Tunnel Router (ETR): Receives and decapsulates
xTR: Both ITR and ETR functions (common)
Map-server: ETRs register their EID prefix-to-RLOC mappings
Receives map requests via mapping system and forwards them
to ETRs. ETR is “authoritative” for its EIDs.
Map-Resolver: Receives map requests from ITR. Forwards
them to mapping system.

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-14

©2013 Raj Jain
LISP Example
11.0.0.1 → 13.0.0.2
1.0.0.1 → 2.0.0.2
10.0.0.1

11.0.0.1 → 13.0.0.2

Core
Provider C
12.0.0.0/8

Provider A
10.0.0.0/8

Edge

Provider B
11.0.0.0/8

A
11.0.0.1
1.0.0.1 → 2.0.0.2
EIDs: Green
Locators: Red

DNS: B→2.0.0.2
Map Server Entry:

1.0.0.1 → 2.0.0.2
12.0.0.2
Edge

Provider D
13.0.0.0/8

13.0.0.2

1.0.0.1 → 2.0.0.2
EID-Prefix: 2.0.0.0/8
Locator Set:
12.0.0.2, priority 1, weight 50
13.0.0.2, priority 1, weight 50

Ref: http://www.nanog.org/meetings/nanog41/presentations/lisp-nanog-abq.pdf
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

12-15

B

©2013 Raj Jain
LISP Applications


No renumbering if carrier changes
AT&T
128.0.0.0/8

Verizon
Provider change 108.0.0.0/8
128.0.0.1

128.0.0.1

128.0.0.2

128.0.0.2


Need to
renumber
all hosts

Site Multihoming:
1.0.0.1
1.0.0.2

Washington University in St. Louis

128.0.0.1
108.0.0.1

AT&T
128.0.0.0/8
Verizon
108.0.0.0/8

http://www.cse.wustl.edu/~jain/cse570-13/

12-16

©2013 Raj Jain
VM Migration Using LISP





When an aggregator switch receives an IP packet from a VM, it
notes its EID and registers its RLOC with map-server
Map-server deletes the old entry (if any)
Push or pull models for resolution
Note: No triangulation after move. No IP address change.
Intra-company Users

Core
Aggregation
Access

Data
Center

Core
Aggregation
Access

xTR
LISP
Packet
LISP
Aware

VM

Core
Aggregation
Access

VM

Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

12-17

Core
LISP
Unaware

Aggregation
Access

Data
Center
©2013 Raj Jain
LISP Summary





Separates IDs from Locators
Legacy IP needs locators  Use it on the outside
Mobility requires IDs  Use it on the inside
Uses IP-in-IP tunneling.

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-18

©2013 Raj Jain
Summary
1.

2.
3.

4.

Ethernet is being extended to cover multiple
data centers and large campuses. Networks are being
“flattened” (L2 end-to-end)
Most of these efforts encapsulate Ethernet frames and transport
them using layer 3 protocols
TRILL allows a single LAN to cover a large campus by using
Rbridges that act as bridge for address learning and as router
for forwarding. They exchange learnt MAC addresses using
IS-IS.
LISP allows a network to span multiple sites. IDs are used
inside while locators are used between sites. UDP
encapsulation is used for inter-site communication.

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-19

©2013 Raj Jain
Reading List








Cisco, “Enhance Business Continuance with Application Mobility Across
Data Centers,”
http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9402/white
_paper_c11-591960.pdf
G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014,
ISBN: 1587143240 (Safari book)
V. Fuller, et al., “LISP: A level of Indirection for Routing,”
http://www.nanog.org/meetings/nanog41/presentations/lisp-nanog-abq.pdf
LISP - Routing in the Cloud, Sep 2012,
http://lisp.cisco.com/LISP_Update.pdf
R. Perlman, "RBridges: Transparent Routing," Infocom 2004
V. Josyula, M. Orr, and G. Page, “Cloud Computing: Automating the
Virtualized Data Center,” Cisco Press, 2012, 392 pp., ISBN: 1587204347
(Safari book)

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-20

©2013 Raj Jain
Wikipedia Links



http://en.wikipedia.org/wiki/TRILL_(computing)
http://en.wikipedia.org/wiki/Locator/Identifier_Separation_Prot
ocol

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-21

©2013 Raj Jain
Acronyms

















A-VPLS
Advanced Virtual Private LAN Service
ASM
Across Subnet Mode
BFD
Bidirectional Forwarding Detection
BGP
Border Gateway Protocol
BUM
Broadcast, Unicast, Multicast
CRC
Cyclic Redundancy Check
DCI
Data Center Interconnection
DNS
Domain Name System
DWDM
Dense Wavelength Division Multiplexing
EID
Endpoint Identifier
EoMPLS
Ethernet over MPLS
EoMPLSoGRE
Ethernet over MPLS over GRE
ESM
Extended Subnet Mode
ETR
Egress Tunnel Router
EVPN
Ethernet Virtual Private Network
GRE
Generic Routing Encapsulation

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-22

©2013 Raj Jain
Acronyms (Cont)

















H-VPLS
ID
IP
IPv4
IPv6
IS-IS
ITR
LAN
LISP
MAC
MPLS
NVGRE
NVO3
OAM
OTV
PB

Hierarchical Virtual Private LAN Service
Identifier
Internet Protocol
Internet Protocol version 4
Internet Protocol version 6
Intermediate System to Intermediate System
Ingress Tunnel Router
Local Area Network
Locator ID Separation Protocol
Media Access Control
Multiprotocol Label Switching
Network Virtualization Using GRE
Network Virtualization using L3
Operations, Administration, and Maintenance
Overlay Transport Virtualization
Provider bridging

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-23

©2013 Raj Jain
Acronyms (Cont)

















PBB
PPP
RBridge
RFC
RLOC
STP
STT
TE
TR
TRILL
UDP
VLAN
VM
vPC
VPLS
VPLSoGRE

Provider Backbone Briding
Point to Point Protocol
Routing Bridges
Request for Comments
Routing Locators
Spanning Tree Protocol
Stateless Transport Tunneling
Traffic Engineering
Tunnel Router
Transparent Interconnection of Lots of Link
User Datagram Protocol
Virtual Local Area Network
Virtual Machine
Virtual PortChannel
Virtual Private LAN Service
VPLS over GRE

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-24

©2013 Raj Jain
Acronyms (Cont)





VPN
VSS
VXLAN
xTR

Virtual Private Network
Virtual Switching System
Virtual Extensible Local Area Network
Ingress/Egress Tunnel Router

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-25

©2013 Raj Jain
References








"TRILL: Problem and Applicability Statement," RFC 5556, May 2009,
https://datatracker.ietf.org/doc/rfc5556/
"RBridges: Base Protocol Specification," RFC 6325, Jul 2011,
https://datatracker.ietf.org/doc/rfc6325/
"RBridges: Adjacency," RFC 6327, July 2011,
https://datatracker.ietf.org/doc/rfc6327/
"PPP TRILL Protocol Control Protocol," RFC 6361, Nov 2011,
https://datatracker.ietf.org/doc/rfc6361/
" RBridges: Appointed Forwarders," RFC 6439, Nov 2011,
https://datatracker.ietf.org/doc/rfc6439/
"Definitions of Managed Objects for RBridges," RFC 6850, Jan 2013,
https://datatracker.ietf.org/doc/rfc6850/
"Requirements for OAM in TRILL," RFC 6905, Mar 2013,
https://datatracker.ietf.org/doc/rfc6905/

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

12-32

©2013 Raj Jain

Mais conteúdo relacionado

Mais procurados

Unit 5 Application Layer
Unit 5 Application LayerUnit 5 Application Layer
Unit 5 Application LayerKalpanaC14
 
Performance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANsPerformance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANsijcnesiir
 
A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...eSAT Journals
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocolsijeei-iaes
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain TechnologyIRJET Journal
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Super final-report
Super final-reportSuper final-report
Super final-reportJaveria600
 
F233842
F233842F233842
F233842irjes
 

Mais procurados (20)

Unit 5 Application Layer
Unit 5 Application LayerUnit 5 Application Layer
Unit 5 Application Layer
 
Performance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANsPerformance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANs
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueingImprovement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
 
A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain Technology
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Super final-report
Super final-reportSuper final-report
Super final-report
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
F233842
F233842F233842
F233842
 

Destaque

10 asp.net session14
10 asp.net session1410 asp.net session14
10 asp.net session14Vivek chan
 
Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?
Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?
Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?Anne Nicolas
 
A Deeper Look at Network Virtualization
A Deeper Look at Network VirtualizationA Deeper Look at Network Virtualization
A Deeper Look at Network VirtualizationScott Lowe
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocolsAbdessamad TEMMAR
 

Destaque (8)

10 asp.net session14
10 asp.net session1410 asp.net session14
10 asp.net session14
 
Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?
Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?
Kernel Recipes 2015: Multi-campus Layer 2 Network Fabric: what?, why? How?
 
Silverlight Databinding
Silverlight DatabindingSilverlight Databinding
Silverlight Databinding
 
A Deeper Look at Network Virtualization
A Deeper Look at Network VirtualizationA Deeper Look at Network Virtualization
A Deeper Look at Network Virtualization
 
Integrating
IntegratingIntegrating
Integrating
 
Chapter 3 v6.0
Chapter 3 v6.0Chapter 3 v6.0
Chapter 3 v6.0
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocols
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 

Semelhante a LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Protocols

Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologiesrjain51
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetrjain51
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlowrjain51
 
Networking Protocols for Internet of Things
Networking Protocols for Internet of ThingsNetworking Protocols for Internet of Things
Networking Protocols for Internet of Thingsrjain51
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PROIDEA
 
Application Delivery Networking
Application Delivery NetworkingApplication Delivery Networking
Application Delivery Networkingrjain51
 
Iot for bluetoth
Iot for bluetothIot for bluetoth
Iot for bluetothYomi Ayo
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIRJET Journal
 
Data center interconnect seamlessly through SDN
Data center interconnect seamlessly through SDNData center interconnect seamlessly through SDN
Data center interconnect seamlessly through SDNFelecia Fierro
 
Data Center Interconnect Seamlessly with SDN
Data Center Interconnect Seamlessly with SDNData Center Interconnect Seamlessly with SDN
Data Center Interconnect Seamlessly with SDNPluribus Networks
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Thingsrjain51
 

Semelhante a LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Protocols (20)

Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologies
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Networking Protocols for Internet of Things
Networking Protocols for Internet of ThingsNetworking Protocols for Internet of Things
Networking Protocols for Internet of Things
 
M 14ofl
M 14oflM 14ofl
M 14ofl
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
Application Delivery Networking
Application Delivery NetworkingApplication Delivery Networking
Application Delivery Networking
 
Iot for bluetoth
Iot for bluetothIot for bluetoth
Iot for bluetoth
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
Virtual local area networks
Virtual local area networksVirtual local area networks
Virtual local area networks
 
Data center interconnect seamlessly through SDN
Data center interconnect seamlessly through SDNData center interconnect seamlessly through SDN
Data center interconnect seamlessly through SDN
 
Data Center Interconnect Seamlessly with SDN
Data Center Interconnect Seamlessly with SDNData Center Interconnect Seamlessly with SDN
Data Center Interconnect Seamlessly with SDN
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 

Mais de rjain51

Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
SDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier OpportunitiesSDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier Opportunitiesrjain51
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)rjain51
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Toolsrjain51
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentalsrjain51
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualizationrjain51
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationrjain51
 

Mais de rjain51 (7)

Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
SDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier OpportunitiesSDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier Opportunities
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Tools
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Protocols

  • 1. LAN Extension and Virtualization using Layer 3 Protocols . LAN Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-1 ©2013 Raj Jain
  • 2. Overview 1. 2. 3. Data Center Interconnection and LAN extension TRILL LISP Note: Data Center partitioning techniques for multi-tenancy are discussed in another module that covers NVO3, VXLAN, NVGRE, and STT. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-2 ©2013 Raj Jain
  • 3. Network Virtualization Techniques Entity NIC Switch L2 Link L2 Network using L2 Partitioning SR-IOV VEB, VEPA VLANs VLAN L2 Network using L3 NVO3, VXLAN, NVGRE, STT Router VDCs, VRF L3 Network using L1 L3 Network using MPLS, GRE, L3* PW, IPSec Application ADCs Aggregation/Extension/Interconnection** MR-IOV VSS, VBE, DVS, FEX LACP, Virtual PortChannels PB (Q-in-Q), PBB (MAC-in-MAC), PBB-TE, Access-EPL, EVPL, EVP-Tree, EVPLAN MPLS, VPLS, A-VPLS, H-VPLS, PWoMPLS, PWoGRE, OTV, TRILL, LISP, L2TPv3 , EVPN, PBB-EVPN VRRP, HSRP GMPLS, SONET MPLS, T-MPLS, MPLS-TP, GRE, PW, IPSec Load Balancers *All L2/L3 technologies for L2 Network partitioning and aggregation can also be used for L3 network partitioning and aggregation, respectively, by simply putting L3 packets in L2 payloads. **The aggregation technologies can also be seen as partitioning technologies from the provider point of view. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-3 ©2013 Raj Jain
  • 4. Geographic Clusters of Data Centers     Multiple data centers are used to improve availability Cold-Standby: Data is backed up on tapes and stored off-site. In case of disaster, application and data are loaded in standby. Manual switchover  Significant downtime. (1970-1990) Hot-Standby: Two servers in different geographically close data centers exchange state and data continuously. Synchronous or Asynchronous data replication to standby. On a failure, the application automatically switches to standby. Automatic switchover  Reduced downtime (1990-2005) Only 50% of resources are used under normal operation. Active-Active: All resources are used. Virtual machines and data can be quickly moved between sites, when needed. Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240 http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis 12-4 ©2013 Raj Jain
  • 5. Data Center Interconnection (DCI)    Allows distant data centers to be connected in one L2 domain  Distributed applications  Disaster recovery  Maintenance/Migration  High-Availability  Consolidation Active and standby can share the same virtual IP for switchover. Multicast can be used to send state to multiple destinations. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-5 ©2013 Raj Jain
  • 6. Challenges of LAN Extension     Broadcast storms: Unknown and broadcast frames may create excessive flood Loops: Easy to form loops in a large network. STP Issues:  High spanning tree diameter (leaf-to-leaf): More than 7.  Root can become bottleneck and a single point of failure  Multiple paths remain unused Tromboning: Dual attached servers Core and switches generate excessive Aggregation cross traffic Access Security: Data on LAN extension Server must be encrypted Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-6 LAN LAN Extension  Core Aggregation Access Server ©2013 Raj Jain
  • 7. TRILL      Transparent Interconnection of Lots of Links Allows a large campus to be a single extended LAN LANs allow free mobility inside the LAN but:  Inefficient paths using Spanning tree  Inefficient link utilization since many links are disabled  Inefficient link utilization since multipath is not allowed.  Unstable: small changes in network  large changes in spanning tree IP subnets are not good for mobility because IP addresses change as nodes move and break transport connections, but:  IP routing is efficient, optimal, and stable Solution: Take the best of both worlds  Use MAC addresses and IP routing Ref: RFCs 5556, 6325, 6326, 6327, 6361, 6439 Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-7 ©2013 Raj Jain
  • 8. TRILL Architecture      Routing Bridges (RBridges) encapsulate L2 frames and route them to destination RBridges which decapsulate and forward Header contains a hop-limit to avoid looping RBridges run IS-IS to compute pair-wise optimal paths for unicast and distribution trees for multicast RBridge learn MAC addresses by source learning and by exchanging their MAC tables with other RBridges Each VLAN on the link has one (and only one) designated RBridge using IS-IS election protocol RB2 H1 RB1 RB4 RB3 H2 Ref: R. Perlman, "RBridges: Transparent Routing," Infocom 2004 Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-8 ©2013 Raj Jain
  • 9. TRILL Encapsulation Format Outer Header TRILL header Original 802.1Q packet Version Res. 2b    2b MultiOptions Hops Egress Ingress Options Destination Length to Live RBridge RBridge 1b 5b 6b 16b 16b For outer headers both PPP and Ethernet headers are allowed. PPP for long haul. Outer Ethernet header can have a VLAN ID corresponding to the VLAN used for TRILL. Priority bits in outer headers are copied from inner VLAN Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-9 ©2013 Raj Jain
  • 10. TRILL Features        Transparent: No change to capabilities. Broadcast, Unknown, Multicast (BUM) support. Autolearning. Zero Configuration: RBridges discover their connectivity and learn MAC addresses automatically Hosts can be multi-homed VLANs are supported Optimized route No loops Legacy bridges with spanning tree in the same extended LAN Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-10 ©2013 Raj Jain
  • 11. TRILL: Summary   TRILL allows a large campus to be a single Extended LAN Packets are encapsulated and routed using IS-IS routing Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-11 ©2013 Raj Jain
  • 12. Locator ID Separation Protocol (LISP)   Each host has an ID and a locator e.g., Raj Jain (EID) at WashU (RLOC) IPv6: 2001:0034:0000:0000:0001:0002:0003:0004 Locator ID IPv4: 128.72.45.65.192.168.0.1 Locator   ID Inside a site, the routing is based on ID. Between sites, the routing is based on locators Edge routers encapsulate packets with locator on outer header. Boston Locator 172.0.0.1 Site 1 Bob ID 1.0.0.1 Edge Router Washington University in St. Louis New York Locator 108.0.0.2 Los Angeles Locator 185.0.0.3 Core Legacy Routers San Jose Locator 92.0.0.1 http://www.cse.wustl.edu/~jain/cse570-13/ 12-12 Edge Router Carol ID 2.0.0.2 Site 4 ©2013 Raj Jain
  • 13. LISP (Cont)      IDs look like IP addresses  No changes to hosts Locators look like IP addresses  No changes to core routers between sites Changes are required only in routers at the edge of the sites. Trick: Edge routers use IP-in-IP tunneling to send packets between sites. A “map server” keeps track of ID to locator mapping Source Dest. UDP Source Locator Locator ID External IP Header Dest ID IP Payload Internal IP Header Ref: LISP – Routing in the Cloud, Sep 2012, http://lisp.cisco.com/LISP_Update.pdf http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis 12-13 ©2013 Raj Jain
  • 14. LISP Terminology        Endpoint Identifier (EID): ID from different name space. Not routable on global Internet. Registered in DNS. Routing Locators (RLOC): Existing name space. Globally routable. Assigned to routers. Hosts do not know about them. Ingress Tunnel Router (ITR): Encapsulates and transmits Egress Tunnel Router (ETR): Receives and decapsulates xTR: Both ITR and ETR functions (common) Map-server: ETRs register their EID prefix-to-RLOC mappings Receives map requests via mapping system and forwards them to ETRs. ETR is “authoritative” for its EIDs. Map-Resolver: Receives map requests from ITR. Forwards them to mapping system. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-14 ©2013 Raj Jain
  • 15. LISP Example 11.0.0.1 → 13.0.0.2 1.0.0.1 → 2.0.0.2 10.0.0.1 11.0.0.1 → 13.0.0.2 Core Provider C 12.0.0.0/8 Provider A 10.0.0.0/8 Edge Provider B 11.0.0.0/8 A 11.0.0.1 1.0.0.1 → 2.0.0.2 EIDs: Green Locators: Red DNS: B→2.0.0.2 Map Server Entry: 1.0.0.1 → 2.0.0.2 12.0.0.2 Edge Provider D 13.0.0.0/8 13.0.0.2 1.0.0.1 → 2.0.0.2 EID-Prefix: 2.0.0.0/8 Locator Set: 12.0.0.2, priority 1, weight 50 13.0.0.2, priority 1, weight 50 Ref: http://www.nanog.org/meetings/nanog41/presentations/lisp-nanog-abq.pdf http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis 12-15 B ©2013 Raj Jain
  • 16. LISP Applications  No renumbering if carrier changes AT&T 128.0.0.0/8 Verizon Provider change 108.0.0.0/8 128.0.0.1 128.0.0.1 128.0.0.2 128.0.0.2  Need to renumber all hosts Site Multihoming: 1.0.0.1 1.0.0.2 Washington University in St. Louis 128.0.0.1 108.0.0.1 AT&T 128.0.0.0/8 Verizon 108.0.0.0/8 http://www.cse.wustl.edu/~jain/cse570-13/ 12-16 ©2013 Raj Jain
  • 17. VM Migration Using LISP     When an aggregator switch receives an IP packet from a VM, it notes its EID and registers its RLOC with map-server Map-server deletes the old entry (if any) Push or pull models for resolution Note: No triangulation after move. No IP address change. Intra-company Users Core Aggregation Access Data Center Core Aggregation Access xTR LISP Packet LISP Aware VM Core Aggregation Access VM Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240 http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis 12-17 Core LISP Unaware Aggregation Access Data Center ©2013 Raj Jain
  • 18. LISP Summary     Separates IDs from Locators Legacy IP needs locators  Use it on the outside Mobility requires IDs  Use it on the inside Uses IP-in-IP tunneling. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-18 ©2013 Raj Jain
  • 19. Summary 1. 2. 3. 4. Ethernet is being extended to cover multiple data centers and large campuses. Networks are being “flattened” (L2 end-to-end) Most of these efforts encapsulate Ethernet frames and transport them using layer 3 protocols TRILL allows a single LAN to cover a large campus by using Rbridges that act as bridge for address learning and as router for forwarding. They exchange learnt MAC addresses using IS-IS. LISP allows a network to span multiple sites. IDs are used inside while locators are used between sites. UDP encapsulation is used for inter-site communication. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-19 ©2013 Raj Jain
  • 20. Reading List       Cisco, “Enhance Business Continuance with Application Mobility Across Data Centers,” http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9402/white _paper_c11-591960.pdf G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240 (Safari book) V. Fuller, et al., “LISP: A level of Indirection for Routing,” http://www.nanog.org/meetings/nanog41/presentations/lisp-nanog-abq.pdf LISP - Routing in the Cloud, Sep 2012, http://lisp.cisco.com/LISP_Update.pdf R. Perlman, "RBridges: Transparent Routing," Infocom 2004 V. Josyula, M. Orr, and G. Page, “Cloud Computing: Automating the Virtualized Data Center,” Cisco Press, 2012, 392 pp., ISBN: 1587204347 (Safari book) Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-20 ©2013 Raj Jain
  • 22. Acronyms                 A-VPLS Advanced Virtual Private LAN Service ASM Across Subnet Mode BFD Bidirectional Forwarding Detection BGP Border Gateway Protocol BUM Broadcast, Unicast, Multicast CRC Cyclic Redundancy Check DCI Data Center Interconnection DNS Domain Name System DWDM Dense Wavelength Division Multiplexing EID Endpoint Identifier EoMPLS Ethernet over MPLS EoMPLSoGRE Ethernet over MPLS over GRE ESM Extended Subnet Mode ETR Egress Tunnel Router EVPN Ethernet Virtual Private Network GRE Generic Routing Encapsulation Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-22 ©2013 Raj Jain
  • 23. Acronyms (Cont)                 H-VPLS ID IP IPv4 IPv6 IS-IS ITR LAN LISP MAC MPLS NVGRE NVO3 OAM OTV PB Hierarchical Virtual Private LAN Service Identifier Internet Protocol Internet Protocol version 4 Internet Protocol version 6 Intermediate System to Intermediate System Ingress Tunnel Router Local Area Network Locator ID Separation Protocol Media Access Control Multiprotocol Label Switching Network Virtualization Using GRE Network Virtualization using L3 Operations, Administration, and Maintenance Overlay Transport Virtualization Provider bridging Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-23 ©2013 Raj Jain
  • 24. Acronyms (Cont)                 PBB PPP RBridge RFC RLOC STP STT TE TR TRILL UDP VLAN VM vPC VPLS VPLSoGRE Provider Backbone Briding Point to Point Protocol Routing Bridges Request for Comments Routing Locators Spanning Tree Protocol Stateless Transport Tunneling Traffic Engineering Tunnel Router Transparent Interconnection of Lots of Link User Datagram Protocol Virtual Local Area Network Virtual Machine Virtual PortChannel Virtual Private LAN Service VPLS over GRE Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-24 ©2013 Raj Jain
  • 25. Acronyms (Cont)     VPN VSS VXLAN xTR Virtual Private Network Virtual Switching System Virtual Extensible Local Area Network Ingress/Egress Tunnel Router Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-25 ©2013 Raj Jain
  • 26. References        "TRILL: Problem and Applicability Statement," RFC 5556, May 2009, https://datatracker.ietf.org/doc/rfc5556/ "RBridges: Base Protocol Specification," RFC 6325, Jul 2011, https://datatracker.ietf.org/doc/rfc6325/ "RBridges: Adjacency," RFC 6327, July 2011, https://datatracker.ietf.org/doc/rfc6327/ "PPP TRILL Protocol Control Protocol," RFC 6361, Nov 2011, https://datatracker.ietf.org/doc/rfc6361/ " RBridges: Appointed Forwarders," RFC 6439, Nov 2011, https://datatracker.ietf.org/doc/rfc6439/ "Definitions of Managed Objects for RBridges," RFC 6850, Jan 2013, https://datatracker.ietf.org/doc/rfc6850/ "Requirements for OAM in TRILL," RFC 6905, Mar 2013, https://datatracker.ietf.org/doc/rfc6905/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 12-32 ©2013 Raj Jain