0% found this document useful (0 votes)
13 views26 pages

LAN Extension and Virtualization Using Layer 3 Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views26 pages

LAN Extension and Virtualization Using Layer 3 Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

LAN Extension and

Virtualization using .

Layer 3 Protocols
LAN

Raj Jain
Washington University in Saint Louis
Saint Louis, MO 63130
[email protected]
These slides and audio/video recordings of this class lecture are at:
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-1
Overview

1. Data Center Interconnection and LAN extension


2. TRILL
3. LISP

Note: Data Center partitioning techniques for multi-tenancy are


discussed in another module that covers NVO3, VXLAN,
NVGRE, and STT.

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-2
Network Virtualization Techniques
Entity Partitioning Aggregation/Extension/Interconnection**
NIC SR-IOV MR-IOV
Switch VEB, VEPA VSS, VBE, DVS, FEX
L2 Link VLANs LACP, Virtual PortChannels
L2 Network using L2 VLAN PB (Q-in-Q), PBB (MAC-in-MAC), PBB-TE,
Access-EPL, EVPL, EVP-Tree, EVPLAN
L2 Network using L3 NVO3, MPLS, VPLS, A-VPLS, H-VPLS, PWoMPLS,
VXLAN, PWoGRE, OTV, TRILL, LISP, L2TPv3,
NVGRE, STT EVPN, PBB-EVPN
Router VDCs, VRF VRRP, HSRP
L3 Network using L1 GMPLS, SONET
L3 Network using MPLS, GRE, MPLS, T-MPLS, MPLS-TP, GRE, PW, IPSec
L3* PW, IPSec
Application ADCs Load Balancers
*All L2/L3 technologies for L2 Network partitioning and aggregation can also be used for L3 network
partitioning and aggregation, respectively, by simply putting L3 packets in L2 payloads.
**The aggregation technologies can also be seen as partitioning technologies from the provider point of view.

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-3
Geographic Clusters of Data Centers
 Multiple data centers are used to improve availability
 Cold-Standby: Data is backed up on tapes and stored off-site.
In case of disaster, application and data are loaded in standby.
Manual switchover  Significant downtime. (1970-1990)
 Hot-Standby: Two servers in different geographically close
data centers exchange state and data continuously.
Synchronous or Asynchronous data replication to standby.
On a failure, the application automatically switches to standby.
Automatic switchover  Reduced downtime (1990-2005)
Only 50% of resources are used under normal operation.
 Active-Active: All resources are used. Virtual machines and
data can be quickly moved between sites, when needed.
Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-4
Data Center Interconnection (DCI)
 Allows distant data centers to be connected in one L2 domain
 Distributed applications
 Disaster recovery
 Maintenance/Migration
 High-Availability
 Consolidation
 Active and standby can share the same virtual IP for switchover.
 Multicast can be used to send state to multiple destinations.

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-5
Challenges of LAN Extension
 Broadcast storms: Unknown and broadcast
frames may create excessive flood LAN
 Loops: Easy to form loops in a large network.
 STP Issues:
 High spanning tree diameter (leaf-to-leaf):
More than 7.
 Root can become bottleneck and a single
point of failure
 Multiple paths remain unused
 Tromboning: Dual attached servers Core Core

LAN Extension
and switches generate excessive
Aggregation Aggregation
cross traffic
Access Access
 Security: Data on LAN extension
must be encrypted Server Server
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-6
TRILL
 Transparent Interconnection of Lots of Links
 Allows a large campus to be a single extended LAN
 LANs allow free mobility inside the LAN but:
 Inefficient paths using Spanning tree

 Inefficient link utilization since many links are disabled

 Inefficient link utilization since multipath is not allowed.

 Unstable: small changes in network  large changes in


spanning tree
 IP subnets are not good for mobility because IP addresses
change as nodes move and break transport connections, but:
 IP routing is efficient, optimal, and stable

 Solution: Take the best of both worlds


 Use MAC addresses and IP routing
Ref: RFCs 5556, 6325, 6326, 6327, 6361, 6439
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-7
TRILL Architecture
 Routing Bridges (RBridges) encapsulate L2 frames and route
them to destination RBridges which decapsulate and forward
 Header contains a hop-limit to avoid looping
 RBridges run IS-IS to compute pair-wise optimal paths for
unicast and distribution trees for multicast
 RBridge learn MAC addresses by source learning and by
exchanging their MAC tables with other RBridges
 Each VLAN on the link has one (and only one) designated
RBridge using IS-IS election protocol
RB2
H1 RB1 RB4 RB3 H2

Ref: R. Perlman, "RBridges: Transparent Routing," Infocom 2004


Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-8
TRILL Encapsulation Format

Outer Header TRILL header Original 802.1Q packet

Version Res. Multi- Options Hops Egress Ingress Options


Destination Length to Live RBridge RBridge
2b 2b 1b 5b 6b 16b 16b

 For outer headers both PPP and Ethernet headers are allowed.
PPP for long haul.
 Outer Ethernet header can have a VLAN ID corresponding to
the VLAN used for TRILL.
 Priority bits in outer headers are copied from inner VLAN

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-9
TRILL Features
 Transparent: No change to capabilities.
Broadcast, Unknown, Multicast (BUM) support. Auto-
learning.
 Zero Configuration: RBridges discover their connectivity and
learn MAC addresses automatically
 Hosts can be multi-homed
 VLANs are supported
 Optimized route
 No loops
 Legacy bridges with spanning tree in the same extended LAN

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-10
TRILL: Summary
 TRILL allows a large campus to be a single Extended LAN
 Packets are encapsulated and routed using IS-IS routing

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-11
Locator ID Separation Protocol (LISP)
 Each host has an ID and a locator
e.g., Raj Jain (EID) at WashU (RLOC)
 IPv6: 2001:0034:0000:0000:0001:0002:0003:0004
Locator ID
IPv4: 128.72.45.65.192.168.0.1
Locator ID
 Inside a site, the routing is based on ID.
Between sites, the routing is based on locators
 Edge routers encapsulate packets with locator on outer header.
Boston Los Angeles
Carol
Site 1 Locator Locator Edge
Router ID 2.0.0.2
172.0.0.1 185.0.0.3

New York
Core San Jose
Bob Edge
ID 1.0.0.1 Router
Locator Legacy Locator Site 4
108.0.0.2 Routers 92.0.0.1

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-12
LISP (Cont)
 IDs look like IP addresses  No changes to hosts
 Locators look like IP addresses  No changes to core routers
between sites
 Changes are required only in routers at the edge of the sites.
 Trick: Edge routers use IP-in-IP tunneling to send packets
between sites.
 A “map server” keeps track of ID to locator mapping

Source Dest. UDP Source Dest IP


Locator Locator ID ID Payload

External IP Header Internal IP Header


Ref: LISP – Routing in the Cloud, Sep 2012, http://lisp.cisco.com/LISP_Update.pdf
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-13
LISP Terminology
 Endpoint Identifier (EID): ID from different name space.
Not routable on global Internet. Registered in DNS.
 Routing Locators (RLOC): Existing name space.
Globally routable. Assigned to routers.
Hosts do not know about them.
 Ingress Tunnel Router (ITR): Encapsulates and transmits
 Egress Tunnel Router (ETR): Receives and decapsulates
 xTR: Both ITR and ETR functions (common)
 Map-server: ETRs register their EID prefix-to-RLOC mappings
Receives map requests via mapping system and forwards them
to ETRs. ETR is “authoritative” for its EIDs.
 Map-Resolver: Receives map requests from ITR. Forwards
them to mapping system.
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-14
LISP Example
11.0.0.1 → 13.0.0.2 11.0.0.1 → 13.0.0.2
Core
1.0.0.1 → 2.0.0.2 Provider C 1.0.0.1 → 2.0.0.2
10.0.0.1 12.0.0.0/8 12.0.0.2
Provider A
Edge 10.0.0.0/8 Edge

Provider B
A B
11.0.0.0/8 Provider D
11.0.0.1 13.0.0.0/8 13.0.0.2
1.0.0.1 → 2.0.0.2
1.0.0.1 → 2.0.0.2
EIDs: Green
EID-Prefix: 2.0.0.0/8
Locators: Red DNS: B→2.0.0.2
Locator Set:
Map Server Entry:
12.0.0.2, priority 1, weight 50
13.0.0.2, priority 1, weight 50
Ref: http://www.nanog.org/meetings/nanog41/presentations/lisp-nanog-abq.pdf
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-15
LISP Applications
 No renumbering if carrier changes
AT&T Verizon
128.0.0.0/8 Provider change 108.0.0.0/8
Need to
128.0.0.1 128.0.0.1 renumber
all hosts
128.0.0.2 128.0.0.2

 Site Multihoming:
AT&T
1.0.0.1 128.0.0.1 128.0.0.0/8

1.0.0.2 108.0.0.1 Verizon


108.0.0.0/8
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-16
VM Migration Using LISP
 When an aggregator switch receives an IP packet from a VM, it
notes its EID and registers its RLOC with map-server
 Map-server deletes the old entry (if any)
 Push or pull models for resolution
 Note: No triangulation after move. No IP address change.
Intra-company Users

Core Core
xTR Core Core
LISP
Aggregation Aggregation Packet Aggregation Aggregation LISP
Unaware
Access Access LISP Access Access
Aware

Data VM VM Data
Center Center
Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-17
LISP Summary
 Separates IDs from Locators
 Legacy IP needs locators  Use it on the outside
 Mobility requires IDs  Use it on the inside
 Uses IP-in-IP tunneling.

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-18
Summary
1. Ethernet is being extended to cover multiple
data centers and large campuses. Networks are being
“flattened” (L2 end-to-end)
2. Most of these efforts encapsulate Ethernet frames and transport
them using layer 3 protocols
3. TRILL allows a single LAN to cover a large campus by using
Rbridges that act as bridge for address learning and as router
for forwarding. They exchange learnt MAC addresses using
IS-IS.
4. LISP allows a network to span multiple sites. IDs are used
inside while locators are used between sites. UDP
encapsulation is used for inter-site communication.

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-19
Reading List
 Cisco, “Enhance Business Continuance with Application Mobility Across
Data Centers,”
http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9402/white
_paper_c11-591960.pdf
 G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014,
ISBN: 1587143240 (Safari book)
 V. Fuller, et al., “LISP: A level of Indirection for Routing,”
http://www.nanog.org/meetings/nanog41/presentations/lisp-nanog-abq.pdf
 LISP - Routing in the Cloud, Sep 2012,
http://lisp.cisco.com/LISP_Update.pdf
 R. Perlman, "RBridges: Transparent Routing," Infocom 2004
 V. Josyula, M. Orr, and G. Page, “Cloud Computing: Automating the
Virtualized Data Center,” Cisco Press, 2012, 392 pp., ISBN: 1587204347
(Safari book)

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-20
Wikipedia Links
 http://en.wikipedia.org/wiki/TRILL_(computing)
 http://en.wikipedia.org/wiki/Locator/Identifier_Separation_Prot
ocol

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-21
Acronyms
 A-VPLS Advanced Virtual Private LAN Service
 ASM Across Subnet Mode
 BFD Bidirectional Forwarding Detection
 BGP Border Gateway Protocol
 BUM Broadcast, Unicast, Multicast
 CRC Cyclic Redundancy Check
 DCI Data Center Interconnection
 DNS Domain Name System
 DWDM Dense Wavelength Division Multiplexing
 EID Endpoint Identifier
 EoMPLS Ethernet over MPLS
 EoMPLSoGRE Ethernet over MPLS over GRE
 ESM Extended Subnet Mode
 ETR Egress Tunnel Router
 EVPN Ethernet Virtual Private Network
 GRE Generic Routing Encapsulation
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-22
Acronyms (Cont)
 H-VPLS Hierarchical Virtual Private LAN Service
 ID Identifier
 IP Internet Protocol
 IPv4 Internet Protocol version 4
 IPv6 Internet Protocol version 6
 IS-IS Intermediate System to Intermediate System
 ITR Ingress Tunnel Router
 LAN Local Area Network
 LISP Locator ID Separation Protocol
 MAC Media Access Control
 MPLS Multiprotocol Label Switching
 NVGRE Network Virtualization Using GRE
 NVO3 Network Virtualization using L3
 OAM Operations, Administration, and Maintenance
 OTV Overlay Transport Virtualization
 PB Provider bridging
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-23
Acronyms (Cont)
 PBB Provider Backbone Briding
 PPP Point to Point Protocol
 RBridge Routing Bridges
 RFC Request for Comments
 RLOC Routing Locators
 STP Spanning Tree Protocol
 STT Stateless Transport Tunneling
 TE Traffic Engineering
 TR Tunnel Router
 TRILL Transparent Interconnection of Lots of Link
 UDP User Datagram Protocol
 VLAN Virtual Local Area Network
 VM Virtual Machine
 vPC Virtual PortChannel
 VPLS Virtual Private LAN Service
 VPLSoGRE VPLS over GRE
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain
12-24
Acronyms (Cont)
 VPN Virtual Private Network
 VSS Virtual Switching System
 VXLAN Virtual Extensible Local Area Network
 xTR Ingress/Egress Tunnel Router

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-25
References
 "TRILL: Problem and Applicability Statement," RFC 5556, May 2009,
https://datatracker.ietf.org/doc/rfc5556/
 "RBridges: Base Protocol Specification," RFC 6325, Jul 2011,
https://datatracker.ietf.org/doc/rfc6325/
 "RBridges: Adjacency," RFC 6327, July 2011,
https://datatracker.ietf.org/doc/rfc6327/
 "PPP TRILL Protocol Control Protocol," RFC 6361, Nov 2011,
https://datatracker.ietf.org/doc/rfc6361/
 " RBridges: Appointed Forwarders," RFC 6439, Nov 2011,
https://datatracker.ietf.org/doc/rfc6439/
 "Definitions of Managed Objects for RBridges," RFC 6850, Jan 2013,
https://datatracker.ietf.org/doc/rfc6850/
 "Requirements for OAM in TRILL," RFC 6905, Mar 2013,
https://datatracker.ietf.org/doc/rfc6905/

Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ ©2013 Raj Jain


12-32

You might also like