rbridges: transparent routing radia perlman [email protected]

30
Rbridges: Transparent Routing Radia Perlman [email protected]

Upload: abner-horton

Post on 22-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Rbridges: Transparent Routing

Radia Perlman

[email protected]

Goals

• Glue a bunch of links together to appear to be a single LAN to IP nodes

• No configuration of internal switches

• Compatible with existing bridges

• Compatible with existing IP nodes (v4 and v6, endnodes and routers)

What’s wrong with bridges?

• They solve the problems on the previous slide

• But:– Routes not optimal– Temporary loops a disaster– Choice of meltdowns or conservative failover

Basic idea of transparent bridge

• Listen promiscuously

• Learn location of source address based on source address in packet and port from which packet received

• Forward based on learned location of destination

• When in doubt, forward

Station learning

A C

Q V

X

F G

AV

X,F

F

X,A,V

But loops are a disaster• No hop count

• Exponential proliferation

B1 B2 B3

Thus the Spanning Tree Algorithm

I think that I shall never seeA graph more lovely than a tree.

A tree whose crucial propertyIs loop-free connectivity.

A tree which must be sure to spanSo packets can reach every LAN.

First the Root must be selectedBy ID it is elected.

Least cost paths from Root are tracedIn the tree these paths are placed.

A mesh is made by folks like me.Then bridges find a spanning tree.

Path from a to c

93

4

117

10

14

2 5

6

2,0,2

2,0,2

2,1,142,1,5

2,2,7

2,1,6

2,2,4

2,2,4

2,3,3

2,3,3

a

c

Problems with Bridges

• Routes are not optimal (spanning tree)– STA cuts off redundant paths– If A and B are on opposite side of path, they

have to take long detour path

• Temporary loops really dangerous– no hop count in header– proliferation of copies during loops– So, should be conservative in transition

Compare this to routing

• Routers have temporary loops, too

• Part of the life of distributed algorithms

• But IP has a hop count (TTL)

• An IP router only forwards in one direction

• And the router specifies the next recipient

Why bridges are slow to start forwarding

• Temporary loops might cause meltdown

• Can’t (except in certain special cases, like a port to an endnode) know if turning on a link might cause temporary loop

• Simple solution: wait before turning on link, so other bridges can turn off links first

• People want instant failover (but they don’t want meltdowns)

Bridge meltdowns

• They do occur (a Boston hospital)

• Lack of receipt of spanning tree msgs tells bridge to turn on link

• So if too much traffic causes spanning tree messages to get lost…– loops– exponential proliferation of looping packets

Why are there still bridges?

• Why not just use routers?– Bridges plug-and-play– Endnode addresses can be per-campus

• IP routes to links, not endnodes– So IP addresses are per-link– Need to configure routers– Need to change IP address if change links

Using bridges with IP

• Bridging is used to create a campus in which all nodes share the same prefix

• Looks to IP like a single link• But bridging isn’t as good as routing

– Suboptimal routes– Traffic concentration (onto spanning tree links)– Meltdowns– Slow failover

What we’d like: best of both worlds

• Keep transparency to endnodes and zero configuration

• Optimal paths

• Make temporary loops safe– Fast failover– No meltdowns

Rbridges

• Compatible with today’s bridges and routers

• Like routers, terminate bridged LAN

• Like bridges, glue LANs together to create one IP subnet (or for other protocols, a broadcast domain)

• Like routers, optimal paths, fast convergence, no meltdowns

• Like bridges, plug-and-play

Basic Rbridge idea

• Link state protocol among Rbridges (so know how to route to other Rbridges)

• “Somehow” learn location of endnodes (e.g., from data traffic, or ARP replies)

• Report attached endnodes in link state info• Need to encapsulate pkts

– To distinguish originating traffic from transit

– To specify next recipient

– To include a hop count

Rbridging

R1

R2

R3

R9

R6

R7

R5

a

c

R8

R4

Encapsulation Header

S=Xmitting RbridgeD=Rcving Rbridgept=“transit”

hop count original pkt (including L2 hdr)

• Outer L2 hdr must not confuse bridges• So it’s just like it would be if the Rbridges were routers• Need special layer 2 destination address

• for unknown or multicast layer 2 destinations• can be L2 multicast, or any L2 address provided it never gets used as a source address

Need spanning tree for flooding

• Need it for distributed ARP request

• Or for unknown layer 2 destinations (e.g., endnode knows the layer 2 address of the exit router)

• Don’t need to use the bridge spanning tree

• Instead, compute it from the link state database

Rbridges and Bridges

R4 R7R2Seems like:

R4 R7

R2

Actually can be: bridged LAN

Example: IP nodes A and B

A

B

RB1

RB2

Example: A and B, Rbridges don’t know B

• A issues ARP request for B• RB1 doesn’t know, so issues distributed

ARP request (flooded through spanning tree)

• Each Designated RBridge issues ARP request on its LAN

• RB2 receives a reply (B,b)• RB2 reports (B,b) in its link state info

Example: A and B, RBridges DO know B

• A issues ARP request for “B”• RB1 responds with an ARP reply (B=b)• A transmits to “b”• RB1 encapsulates• RBridges forward towards “b”, replacing

outer header on each hop, and decrementing outer hdr TTL

• RB2 decapsulates

Example: A and off-campus B

A

R

RB1

RB2

B

A and off-campus B

• A will send to a router’s layer 2 address, say R’s layer 2 address = x

• RBridges have to send to that IP router• If x is in the forwarding table, then RB1

encapsulates and forwards to x• Else (x unknown), RB1 encapsulates and

sends on spanning tree• Each Designated RBridge decapsulates

Learning a layer 2 address

• Can learn from data packets

• Or if don’t want to for IP, listen to routing messages in order to learn layer 2 addresses of IP routers

Another optimization for IP

• Can have short endnode cache timer

• Designated RBridge pings to make sure local IP nodes still there

Conclusions

• Looks to routers like a bridge– invisible, plug-and-play

• Looks to bridges like routers– terminates spanning tree, broadcast domain

Conclusions, cont’d

• Much better replacement for bridging– optimal paths– still plug and play and transparent– fast convergence– no meltdowns

• For IP– allows plug-and-play single-prefix campus