Internet DRAFT - draft-zhang-trill-vlan-assign

draft-zhang-trill-vlan-assign



 



INTERNET-DRAFT                                              Mingui Zhang
Intended Status: Informational                             Dacheng Zhang
Expires: April 18, 2014                                           Huawei
                                                        October 15, 2013

           Adaptive VLAN Assignment for Data Center RBridges
                  draft-zhang-trill-vlan-assign-06.txt

Abstract

   If RBridges are casually assigned as Appointed Forwarders for VLANs
   without considering the number of MAC addresses and traffic load of
   these VLANs, it may overload some of the RBridges while leave other
   RBridges lightly loaded, which reduces the scalability of a RBridge
   network and undermines its performance. 

   A new mechanism is designed in this document to support the adaptive
   VLAN assignment (or Appointed Forwarder selection) based on the
   forwarders' reporting of their usage of MAC tables and available
   bandwidth.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html


Copyright and License Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

 


Mingui Zhang             Expires April 18, 2014                 [Page 1]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1. Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . .  4
   2. Data Center RBridge . . . . . . . . . . . . . . . . . . . . . .  4
     2.1. Scalability . . . . . . . . . . . . . . . . . . . . . . . .  4
     2.2. East-West Capacity Increase . . . . . . . . . . . . . . . .  4
     2.3. Virtualization  . . . . . . . . . . . . . . . . . . . . . .  5
   3. MAC Entries Usage . . . . . . . . . . . . . . . . . . . . . . .  5
   4. Load Distribution . . . . . . . . . . . . . . . . . . . . . . .  7
     4.1. Egress Traffic  . . . . . . . . . . . . . . . . . . . . . .  7
     4.2. Ingress Traffic . . . . . . . . . . . . . . . . . . . . . .  7
   5. Feedback Sub-TLVs . . . . . . . . . . . . . . . . . . . . . . .  8
     5.1. MAC Entries Report Sub-TLV  . . . . . . . . . . . . . . . .  8
     5.2. Traffic Bit Rate Report Sub-TLV . . . . . . . . . . . . . .  9
   6. Adaptive VLAN Assignment  . . . . . . . . . . . . . . . . . . . 10
   7. Partial VLANs Appointment . . . . . . . . . . . . . . . . . . . 11
     7.1 Partial Appointed Forwarder Sub-TLV  . . . . . . . . . . . . 12
     7.2 Partial VLANs Appointing Sub-TLV . . . . . . . . . . . . . . 13
   8. Security Considerations . . . . . . . . . . . . . . . . . . . . 15
   9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 15
   10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
   11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     11.1. Normative References . . . . . . . . . . . . . . . . . . . 15
     11.2. Informative References . . . . . . . . . . . . . . . . . . 16
   Author's Addresses . . . . . . . . . . . . . . . . . . . . . . . . 17











 


Mingui Zhang             Expires April 18, 2014                 [Page 2]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


1. Introduction

   The scales of Data Center Networks (DCNs) are expanding rapidly these
   years. In DCNs, Ethernet switches and bridges are abundantly used for
   the interconnection of servers. The plug-and-play feature and the
   simple management and configuration of Ethernet are appealing to DCN
   providers. A whole DCN can be a simple large layer 2 Ethernet which
   is either built on a real network or on a virtual platform.

   Cloud Computing is growing up from DCNs which can be regarded as a
   virtual platform that provides the reuse of the network resources of
   DCNs. A lot of cloud applications have been developed by DCN
   providers, such as Amazon's Elastic Compute Cloud (EC2), Akamai's
   Application Delivery Network (ADN) and Microsoft's Azure. Cloud
   Computing clearly brings new challenges to the traditional Ethernet.
   The scales of the DCNs are becoming too large to be carried on the
   traditional Ethernet. The valuable MAC-tables of the bridges are
   running out of use for storing millions of MAC addresses. The
   broadcast of ARP messages consumes too much bandwidth and computing
   resources. The mobility of end stations brings dynamics to the
   network which can become a heavy burden if the management and
   configuration of the network involves too much manpower. The Spanning
   Tree Protocol used in the traditional Ethernet is becoming outdated
   since there is only a single viable path on the tree for a node pair
   and this path is not always the best path (e.g., shortest path). 

   RBridges are designed to improve the shortcomings of the traditional
   Ethernet. To make use of the rich connections, RBridges introduce
   multi-pathing to the Ethernet to break the single-path constraint of
   STP. Multiple points of attachment is a basic feature supported by
   RBridges and common for Data Center Bridges. This feature not only
   increases the "east-west" capacity but also greatly enhances the
   reliability of DCNs [VL2] [SAN]. If several RBridges are attached to
   a bridged LAN link at the same time, the DRB is responsible for the
   assignment of a VLAN to one of the RBridges as the Appointed
   forwarder. However, VLAN assignment is currently done in an one-way
   manner. The DRB casually assigns a VLAN to an RBridge attached to the
   local link without knowing its available MAC-table entries or
   bandwidth. The appointed forwarder does not feedback the utilization
   of its MAC-table or bandwidth either.

   This document proposes to balance the load among VLANs. Two types of
   sub-TLVs are defined, with which a forwarder can report its MAC
   entries and traffic bit rate respectively. By gathering these report
   messages, the VLAN assignment can be done in a way that the usage of
   the MAC tables and bandwidth of the attached RBridges are balanced
   among VLANs.

 


Mingui Zhang             Expires April 18, 2014                 [Page 3]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


1.1. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

2. Data Center RBridge

   Data Center Networks grow rapidly. Ethernet is widely used in data
   centers because of its simple management and plug-and-play features.
   However, there are shortcomings of Ethernet. RBridges are designed to
   improve these shortcomings. In this section, we analyze the
   characteristics of DCNs that impact the design of RBridges and reveal
   why the adaptive VLAN assignment is important for RBridges to be used
   in DCNs.

2.1. Scalability

   In the past years, a large DCN is typically composed of tens of
   thousands servers interconnected through switches. In the cloud
   computing era, there can be as many as millions of servers in one
   DCN. The management of the massive MAC addresses of the servers on
   the layer2 devices will become more and more complex. RBridges are
   used to replace the traditional bridges. 

   Valuable CAM-tables on RBridges can easily be used up if they are not
   used reasonably [CAMtbl]. For RBridges to be widely used in DCNs, the
   VLANs should be assigned to the RBridges in a manner that MAC entries
   of VLANs on RBridges are balanced.

2.2. East-West Capacity Increase

   The Spanning Tree Protocol (STP) in the traditional LAN blocks some
   ports of bridges for the purpose of loop avoidance. The side-effects
   of STP are obvious. The link bandwidth attached to the blocked ports
   are not utilized which greatly wastes the capacity of the network. On
   the tree topology, the communication between the bridges of the left
   branch and right branch must transit the single root bridge, which
   forms a "hair-pin turn".

   With the rapid increase of the amount of servers in DCNs and their
   traffic demand, it is urgent to break the constraint of STP and
   enhance the "east-west" capacity of DCNs which are always richly
   connected. RBridges use the multi-path routing to set up the data
   plane of a TRILL campus. Multiple RBridges may be attached to a same
   LAN link, which offers multiple access points to the LAN link. The
   hosts on this LAN link is therefore multi-homed to a TRILL campus.
   All the attached RBridges can act as packet forwarders for VLANs
 


Mingui Zhang             Expires April 18, 2014                 [Page 4]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   carried on this LAN link. In the worst case, all the VLANs are
   assigned to a single RBridge. Under this scenario, the ingress
   capacity on other RBridges is wasted. It is necessary to balance the
   traffic load of VLANs among these RBridges through the assignment of
   VLANs.

2.3. Virtualization

   Virtualization is important for increasing the utilization of network
   resources in DCNs. For example, the VPNs can be used to separate the
   traffic from different services therefore they can be carried on the
   same pool of resources. When the VPNs is carried over a TRILL campus,
   RBridges can use a VLAN tag to identify each VPN. However, the use of
   VLANs multiplies the entries in the MAC table of RBridges. 

   Virtual Machines (VM) are widely used in DCNs. A physical host can
   support tens of VMs and each VM has to be identified by one MAC
   address that is need to be stored in MAC tables of RBridges. This
   seriously increases the number of MAC entries in RBridges. Moreover,
   the number of VMs in a VLAN is not necessarily equal to the number of
   physical hosts. VMs are spawned or destroyed based on the demand of
   applications. They can also migrate from one location to another,
   which may be either an in-service or out-of-service move. VMs bring
   about the volatility of the size of VLANs. It is hard to provide one
   static VLAN assignment for a TRILL campus based on the numbers of
   physical hosts of VLANs that is proper for all applications all the
   time.

3. MAC Entries Usage 

   A CAM-table on a switch is expensive, which is a major constraint on
   the scalability of Ethernet [CAMtable]. When an RBridge is used to
   connect lots of hosts in large Data Center Networks, the entries of
   the CAM-table can easily be used up. The network should be tactically
   interconnected and valuable MAC table entries should be used
   economically.

   RBridges support multiple points of attachment [RFC6325]. When
   RBridges are used in a DCN to form a TRILL campus, a LAN link MAY
   have multiple access points to this campus. All these access RBridges
   are able to act as the packet forwarder of VLANs carried on this LAN
   link. The DRB of this LAN link is responsible to pick out one RBridge
   attached to this LAN link as the appointed forwarder for each VLAN-x.
   In other words, the DRB assigns VLAN-x to one of the RBridge. For an
   assigned VLAN, its forwarder is not only responsible for forwarding
   the packets for this VLAN but also need to store active MAC addresses
   of hosts on this VLAN. 

 


Mingui Zhang             Expires April 18, 2014                 [Page 5]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   If VLANs on a LAN link are not appointed properly, some RBridges's
   MAC tables are easily to be used up while other RBridges are left
   idle. Take Figure 3.1 as an example, there are four VLANs carried on
   the LAN link: w, x, y and z. There are two hosts in both VLAN-w and
   VLAN-x and one host in both VLAN-y and VLAN-z. RB1 and RB2 are both
   attached to this LAN link. RB1 is elected as the Designated RBridge
   who is responsible to choose appointed forwarders for the above
   VLANs. In the figure, VLAN-w,x are assigned to RB1 and VLAN-y,z are
   assigned to RB2. Obviously, this assignment is not balanced, since
   the MAC table of RB1 has four entries while the MAC table of RB2 only
   has two entries. If the DRB can reassign VLAN-w to RB2 and reassign
   VLAN-y to RB1, both RBridges will have three MAC entries, therefore a
   more balanced assignment is achieved. 

          MAC Entries
          +-----+
          |  w  |
          +-----+
          |  w  |                                 MAC Entries
          +-----+ >---+                           +-----+
          |  x  |     |                           |  y  |
          +-----+     |                     +---< +-----+
          |  x  |     |                     |     |  z  |
          +-----+     |                     |     +-----+
                      |                     | 
          DRB&AF:w,x  |                     |     AF:y,z
          +-----+     |                     |     +-----+ 
          | RB1 |-----+                     +-----| RB2 |  
          +-----+                                 +-----+
             |                                       |
             @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
            @                                         @
           @ +-------+ +-------+   +-------+ +-------+ @
          @  |[H] [H]| |[H] [H]|   |  [H]  | |  [H]  |  @
          @  +-------+ +-------+   +-------+ +-------+  @
           @   VLAN-w    VLAN-x      VLAN-y    VLAN-z  @
            @                                         @
             @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ 
                              LAN link

             Figure 3.1: Unbalanced assignment among VLANs

   In order to assign the VLANs in a balanced way, the DRB need to know
   the usage of MAC tables of its appointed forwarders. Since RBridges
   only store active MAC addresses and a virtual machine can move from
   one location to another, MAC entries that a VLAN occupies on an
   RBridge varies from time to time. The assignment of VLANs cannot be
   done once for all. It is necessary for the DRB to do the assignment
 


Mingui Zhang             Expires April 18, 2014                 [Page 6]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   adaptively taking the usage of MAC tables of its appointed forwarders
   into consideration. 

   In Section 5.1, the MAC Entries Report sub-TLV is defined to deliver
   this kind of information from a forwarder to a DRB.

4. Load Distribution

   The traffic from the TRILL campus to the local LAN link is the
   egressing traffic while the traffic from the local LAN link to the
   TRILL campus is the ingressing traffic. A forwarder RBridge acts as
   both the ingress and egress point of a VLAN's traffic. The assignment
   of the appointed forwarder for each VLAN affects both the egress and
   ingress traffic load distribution.

4.1. Egress Traffic

   One RBridge MAY have multiple ports attached to the same local LAN
   link. These ports are called "port group" [RFC6325]. When a DRB
   assigns a VLAN to an RBridge, its total available egress bandwidth of
   the port group needs to be taken into consideration. 

   After VLAN-x has been assigned to an RBridge, the forwarding port
   assignment of one of the port group to VLAN-x as the forwarding port
   is entirely a local matter. Since a LAN link is a STP domain, more
   than one forwarding port for one VLAN will cause a loop. The
   forwarder MUST assign one and only one port for each VLAN. Load
   balancing among multiple ports on the same link can be realized
   through splitting the load among different VLANs as suggested in
   Section 4.4.4 of [RFC6325]. 

4.2. Ingress Traffic

   After packets enter a TRILL campus from the ingress RBridge, they are
   sent through the paths starting at this ingress point. Since the DRB
   knows the whole topology of the TRILL campus, it can figure out these
   paths as well. Therefore, the DRB should take the available bandwidth
   of these paths into consideration when assigning the appointed
   forwarder of a VLAN. Any assignment that is possible to congest an
   already busy ingress point or a path should be avoided. 

   Traffic Matrices are usually taken as the input to the traffic
   engineering methods [TE]. VLAN assignment actually changes the
   Traffic Matrix of a TRILL campus. Therefore, our adaptive VLAN
   assignment can work together with traffic engineering methods to
   achieve a balanced traffic distribution of the whole network.
   However, the design of this kind of cooperative mechanism is out the
   scope of this document.
 


Mingui Zhang             Expires April 18, 2014                 [Page 7]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   With the TLV defined in Section 5.2, the egressing and ingressing
   traffic of an appointed forwarder are reported to its DRB. 

5. Feedback Sub-TLVs

   The Appointed Forwarders TLV has already been defined in [RFC6326].
   With this TLV, the DRB can appoint an RBridge on the local link to be
   the forwarder for each VLAN. However, there is no feedback from the
   appointed forwarder to notify the DRB whether the assignment is
   reasonable. Two sub-TLVs are defined in this section to open the
   passageway of feedback. 

5.1. MAC Entries Report Sub-TLV 

   Appointed forwarders use MAC Entries Report sub-TLV to report the
   usage of their MAC tables to the DRB. It has the following format:

   +-+-+-+-+-+-+-+-+
   |Type=MACEtrRep |                               (1 byte)
   +-+-+-+-+-+-+-+-+
   |  Length       |                               (1 byte)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  DRB Nickname                 |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Maximum MAC Entries          |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Available MAC Entries        |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |          MAC Entries of VLAN Range (1)      | (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |          ......                             | (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |          MAC Entries of VLAN Range (n)      | (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   where each "MAC Entries of VLAN Range" is of the form:

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV  |     Start.VLAN        |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV  |     End.VLAN          |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | The Number of MAC Entries     |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   o  Type: MAC Entries Report sub-TLV.

   o  Length: 6+6n bytes, where n is the number of VLANs that the
 


Mingui Zhang             Expires April 18, 2014                 [Page 8]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


      appointed forwarder selects to report.

   o  DRB Nickname: The nickname of the Designated RBridge of the local
      link.

   o  Maximum MAC Entries: The maximum number of the entries of the MAC
      table of the appointed forwarder.

   o  Available MAC Entries: The number of available entries of the
      appointed forwarder's MAC table.

   o  RESV: These bits MUST be sent as zero and ignored on receipt.

   o  Start.VLAN, End.VLAN: These fields are the VLAN IDs of the
      appointment range, inclusive. To specify a single VLAN, the VLAN's
      ID appears as both the start and end VLAN [RBissib].

   o  The Number of MAC Entries: The number of MAC entries occupied by
      the given VLAN range. These MAC entries does not only contain the
      MAC addresses of hosts on the local link but also includes the MAC
      addresses on the remote link in the same VLAN range.

5.2. Traffic Bit Rate Report Sub-TLV 

   Appointed forwarders use Traffic Bit Rate Report sub-TLV to report
   the bandwidth utilization of their ports (or port groups) to the DRB.
   This sub-TLV has the following format:

   +-+-+-+-+-+-+-+-+
   |Type=TrafficRep|                               (1 byte)
   +-+-+-+-+-+-+-+-+
   |  Length       |                               (1 byte)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  DRB Nickname                 |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Maximum Link Bandwidth       |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Available Link Bandwidth     |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Traffic Bit Rate of VLAN Range (1)         | (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              ......                         | (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Traffic Bit Rate of VLAN Range (n)         | (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   where each "Traffic Bit Rate of VLAN Range" is of the form: 

 


Mingui Zhang             Expires April 18, 2014                 [Page 9]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV|D|     Start.VLAN        |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV  |     End.VLAN          |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Traffic Bit Rate             |               (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   o  Type: Traffic Bit Rate Report sub-TLV.

   o  Length:  6+6n bytes, where n is the number of VLANs that the
      appointed forwarder selects to report.

   o  DRB Nickname: The nickname of the Designated RBridge of the local
      link.

   o  Maximum Link Bandwidth: The maximum bandwidth of the port (or port
      group) attached to the local link.

   o  Available Link Bandwidth: The available bandwidth of the port (or
      port group) attached to the local link.

   o  RESV: These bits MUST be sent as zero and ignored on receipt.

   o  D: The direction of the traffic. Value "0" denotes the egressing
      traffic volume and value "1" denotes the ingressing traffic
      volume.

   o  Start.VLAN, End.VLAN: These fields are the VLAN IDs of the
      appointment range, inclusive. To specify a single VLAN, the VLAN's
      ID appears as both the start and end VLAN [RBissib].

   o  Traffic Bit Rate: The traffic bit rate of the given VLAN range
      from/to the local link through the attaching ports group of the
      appointed forwarder.

6. Adaptive VLAN Assignment

   Appointed forwarders MAY advertise the MAC Entries Report Sub-TLV and
   Traffic Bit Rate Report Sub-TLV included in Multi-Topology-Aware Port
   Capability TLV in LSPs to their DRBs. The number of VLANs in these
   TLVs is constrained by the maximum size of HELLO messages which is
   1470 octets [RFC6325]. If it is not big enough to hold the
   information for all VLANs, appointed forwarders choose VLANs in the
   order of most MAC entries first and highest load first to report to
   the DRB. An appointed forwarder SHOULD report these two sub-TLVs to
   its DRB each time the DRB assigns a VLAN to it. Its adjacency to the
   DRB MUST be in Report state [RFC6327]. In order to relieve the burden
 


Mingui Zhang             Expires April 18, 2014                [Page 10]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   of feedback, thresholds MAY be imposed on the report of these sub-
   TLVs. For example, when the usage of MAC table increases by 10
   percent, the Appointed Forwarder reports the MAC Entries Report Sub-
   TLV to its DRB.

   The usage of the MAC table and the utilization of bandwidth of this
   appointed forwarder is calculated on the DRB. The DRB SHOULD choose
   an appointed forwarder for the local link based on Least
   Usage/Utilization First (LUF) policy. If an RBridge on the local link
   is already overloaded, the DRB should refrain from assigning
   additional VLANs to it.

   An Appointed Forwarder may fail or get overloaded [RBclear]. The
   usage of MAC tables and bandwidth of Appointed Forwarders attached to
   a LAN link changes with time elapses and a balanced VLAN assignment
   may become unbalanced. For example, the bandwidth of an Appointed
   Forwarder may run out of use due to the increase of traffic demand.
   The usage of the MAC table of an Appointed Forwarder may change
   greatly due to host mobility. In such situations, the DRB need to
   modify the appointment of VLANs on a LAN link. The change of
   Appointed Forwarder of a VLAN brings service interruption to this
   VLAN, therefore the reassignment of VLANs from existing Appointed
   Forwarder to a new Appointed Forwarder should be limited.

   It has been a common practice to collect MAC table usage in bridge
   networks. Through the collection of the above two sub-TLVs (e.g.,
   stored in MIB), operators will have a vision of the MAC table usage
   and bandwidth utilization of the RBridges on the LAN link. Based on
   this vision, operators can easily recognize the hot spot of the TRILL
   campus, which facilitates the trouble shooting. 

7. Partial VLANs Appointment

   [RFC6349] indicates that the appointed VLAN list for one appointed
   forwarder sent in an Appointed Forwarders Sub-TLV should be
   contiguous. In particular, when the designated VLAN falls in the
   range of the appointed VLANs list, the DRB should have two
   appointments with contiguous appointed VLAN ranges for one appointed
   forwarder. However, on a LAN link, a DRB can flexibly appoint any
   VLAN to any appointed forwarder. This flexibility creates the
   necessity to allow DRB to have discrete appointments to one appointed
   forwarder. The following example shows this necessity and reveals the
   issue caused by discrete VLAN appointment.

   When enabled VLANs of two RBriges attached to the same link have
   intersections, DRB SHOULD guarantee that the sets of VLANs appointed
   to these two RBridges do not overlap. With the adaptive VLAN
   assignment method defined in this document, the DRB is probably to
 


Mingui Zhang             Expires April 18, 2014                [Page 11]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   discretely assign VLANs of this intersection to achieve load balance
   among these two RBridges. Suppose both RB1 and RB2 have enabled the
   VLANs from 2 through 4094 on the local link. VLAN 1 is the Designated
   VLAN for this link. Suppose RB1 gets all the odd numbered VLANs while
   RB2 gets all the even numbered VLANs. The DRB has to use 2046
   appointments for RB1 and 2047 appointments for RB2. Since one
   appointment consumes 6 octets [RBisisb] and a TRILL-HELLO message
   MUST NOT exceed 1470 octets [RFC6325]. Even these octets are all used
   for VLAN appointments, a TRILL-HELLO at most contains 245
   appointments. The 4093 appointments obviously exceeds the maximum
   number of appointments that one TRILL-HELLO can have.

   The following two sub-TLVs are defined to enable the DRB to send out
   a appointed VLANs list to its appointed forwarders in multiple TRILL-
   HELLOs, which is similar as the TRILL Neighbor TLV [RBisisb].

7.1 Partial Appointed Forwarder Sub-TLV

   This section defines a sub-TLV adapted from the Appointed Forwarders
   sub-TLV [RBisisb]. This sub-TLV can appear in MT-PORT-CAP TLVs of
   multiple TRILL-HELLOs.  

   +-+-+-+-+-+-+-+-+
   |     Type      |                          (1 byte)
   +-+-+-+-+-+-+-+-+
   |     Length    |                          (1 byte)
   +-+-+-+-+-+-+-+-+
   |S|E| RESV      |                          (1 byte)  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Appointment Information (1)         |  (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Appointment Information (2)         |  (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   .................                  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Appointment Information (N)         |  (6 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   where each appointment is of the form:

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |       Appointee Nickname              |  (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV  |        Start.VLAN             |  (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV  |        End.VLAN               |  (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

 


Mingui Zhang             Expires April 18, 2014                [Page 12]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   o  Type: sub-TLV type, set to MT-PORT-CAP ParAppFwdr Sub-TLV TBD.

   o  Length: 1+6n bytes, where there are n appointments.

   o  Appointee Nickname: The nickname of the IS being appointed a
      forwarder.

   o  S: Start flag. If this bit is a one, then the first Appointment
      Information of this sub-TLV is the first appointment of the
      appointed VLANs list sent by the DRB.

   o  E: End flag. If this bit is a one, then the last Appointment
      Information of this sub-TLV is the last appointment of the
      appointed VLANs list sent by the DRB.

   o  R, RESV: These bits are reserved and MUST be sent as zero and
      ignored on receipt.

   o  Start.VLAN, End.VLAN: These fields are the VLAN IDs of the
      appointment range, inclusive. To specify a single VLAN, the VLAN's
      ID appears as both the start and end VLAN. As specified in
      [RFC6439], appointing an IS forwarder on a port for a VLAN not
      enabled on that port has no effect.

   This sub-TLV enables the DRB to send VLAN appointment information in
   multiple TRILL-HELLOs without the constraint of the size of a single
   TRILL-HELLO. An IS's nickname can occur as an appointed forwarder for
   multiple VLAN ranges by occurrences of this sub-TLV within the MT
   Port Capability TLV [RBisisb]. However, an IS's nickname SHOULD only
   occur as an appointed forwarder within the same TRILL-HELLO.

7.2 Partial VLANs Appointing Sub-TLV

   This section defines another sub-TLV adapted from the VLANs Appointed
   sub-TLV [RBisisb], which allows DRB to assign lots of VLANs to one
   appointed forwarder in a bitmap format. This sub-TLV can appear in
   MT-PORT-CAP sub-TLVs of multiple TRILL-HELLOs as well. 











 


Mingui Zhang             Expires April 18, 2014                [Page 13]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   +-+-+-+-+-+-+-+-+
   |     Type      |                          (1 byte)
   +-+-+-+-+-+-+-+-+
   |     Length    |                          (1 byte)
   +-+-+-+-+-+-+-+-+
   |S|E| RESV      |                          (1 byte)      
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |       Appointee Nickname      |          (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | RESV  |  Start VLAN ID        |          (2 bytes)
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | VLAN bit-map....
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   o  Type: sub-TLV type, set to MT-PORT-CAP ParVLANApp Sub-TLV TBD.

   o  Length: Variable, minimum 6.

   o  Appointee Nickname: The nickname of the IS being appointed a
      forwarder.

   o  S: Start flag. If this bit is a one, then this is the first
      appointment of the appointed VLANs list sent by the DRB.

   o  E: End flag. If this bit is a one, then this is the last
      appointment of the appointed VLANs list sent by the DRB.

   o  R, RESV: These bits are reserved and MUST be sent as zero and
      ignored on receipt.

   o  Start VLAN ID: The 12-bit VLAN ID that is represented by the high
      order bit of the first byte of the VLAN bit-map.

   o  VLAN bit-map: The highest order bit indicates the VLAN equal to
      the start VLAN ID, the next highest bit indicates the VLAN equal
      to start VLAN ID + 1, continuing to the end of the VLAN bit-map
      field.

   In [RBisisb], an appointed forwarder sends the VLANs Appointed Sub-
   TLV  to its neighbors including the DRB. In this document, the
   Partial VLANs Appointing sub-TLV is used by the DRB to assign
   multiple discrete VLANs to an appointed forwarder.

   A DRB can alternatively pick one of the above two sub-TLVs to send
   appointment information to a specific appointed forwarder. However,
   it is recommended that the DRB choose the option consuming less
   octets in the TRILL-HELLO. In the above example, if the DRB sends out
   the appointment using the Partial Appointed Forwarder Sub-TLV, RB1
 


Mingui Zhang             Expires April 18, 2014                [Page 14]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   has 2047 appointments which consumes 2047*6 = 12276 octets. Instead,
   if the DRB uses the Partial VLANs Appointing Sub-TLV, it only
   consumes 512 octets.

   An appointed forwarder begins to accumulate VLAN appointments when it
   receives either of the above two sub-TLVs whose first Appointment
   Information sets the Start flag to a one. This appointed forwarder
   will wait its Holding Time for either a Partial Appointed Forwarders
   Sub-TLV or a Partial VLANs Appointing Sub-TLV whose End flag is set
   to a one. If that sub-TLV is received before the Holding Timer
   expires, the appointed forwarder will issue the accumulated VLAN
   appointments. If the sub-TLV whose End flag is a one is not received
   before the Holding Timer expires, all these accumulated VLAN
   appointments will be discarded.

8. Security Considerations

   This document raises no new security issues for IS-IS.

9. IANA Considerations

   This document suggests to specify four new Sub-TLVs from existing
   sub-TLV sequences -- namely MACEtrRep, TrafficRep, ParAppFwdr and
   ParVLANApp.

                    Section  Sub-   MT Port  Router   Extended   NUM
                             TLV#   Capabil. Capabil. IS Reach
   MACEtrRep        5.1      TBD      X        -        -        *
   TrafficRep       5.2      TBD      X        -        -        *
   ParAppFwdr       7.1      TBD      X        -        -        *
   ParVLANApp       7.1      TBD      X        -        -        *

10. Acknowledgements

   The authors would like to thank Somnath Chatterjee and Weiguo Hao for
   their comments.

11. References 

11.1. Normative References

   [RFC6325] R. Perlman, D. Eastlake, et al, "RBridges: Base Protocol
             Specification", RFC 6325, July 2011.

   [RFC6326] D. Eastlake, A. Banerjee, et al, "Transparent
             Interconnection of Lots of Links (TRILL) Use of IS-IS", RFC
             6326, July 2011.

 


Mingui Zhang             Expires April 18, 2014                [Page 15]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


   [RBisisb] D. Eastlake, T. Senevirathne, et al., "Transparent
             Interconnection of Lots of Links (TRILL) Use of IS-IS",
             draft-ietf-isis-rfc6326bis-01.txt, work in Progress.

   [RFC6327] D. Eastlake, R. Perlman, et al, "Routing Bridges
             (RBridges): Adjacency", RFC 6327, July 2011.

   [RBclear] D. Eastlake, M. Zhang, et al, "TRILL: Clarifications,
             Corrections, and Updates", draft-ietf-trill-clear-correct-
             06.txt, working in progress.

11.2. Informative References

   [CAMtbl]  B. Hedlund, "Evolving Data Center Switching",
             http://internetworkexpert.s3.amazonaws.com/2010/trill1/
             TRILL-intro-part1.pdf

   [SAN]     "Configuring an iSCSI Storage Area Network Using Brocade
             FCX Switches", Brocade CONFIGURATION GUIDE, 2010.

   [VL2]     A. Greenberg, J.R. Hamilton, et al, "VL2: A scalable and
             flexible data center network", in Proceedings of ACM
             SIGCOMM, 2009.

   [TE]      M. Roughan, M. Throup, and Y. Zhang, "Traffic Engineering
             with Estimated Traffic Matrices" , in Proceedings of ACM
             IMC, 2003.





















 


Mingui Zhang             Expires April 18, 2014                [Page 16]

INTERNET-DRAFT          Adaptive VLAN Assignment        October 15, 2013


Author's Addresses


   Mingui Zhang
   Huawei Technologies Co.,Ltd
   Huawei Building, No.156 Beiqing Rd.
   Z-park ,Shi-Chuang-Ke-Ji-Shi-Fan-Yuan,Hai-Dian District, 
   Beijing 100095 P.R. China
   	
   Email: zhangmingui@huawei.com

   Dacheng Zhang
   Huawei Technologies Co.,Ltd
   Huawei Building, No.156 Beiqing Rd.
   Z-park ,Shi-Chuang-Ke-Ji-Shi-Fan-Yuan,Hai-Dian District, 
   Beijing 100095 P.R. China

   Email: zhangdacheng@huawei.com

































Mingui Zhang             Expires April 18, 2014                [Page 17]