[trill] ESADI 4. Multiple attachment of the same MAC

Donald Eastlake <d3e3e3@gmail.com> Thu, 10 January 2013 22:36 UTC

Return-Path: <d3e3e3@gmail.com>
X-Original-To: trill@ietfa.amsl.com
Delivered-To: trill@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DD0321F8696 for <trill@ietfa.amsl.com>; Thu, 10 Jan 2013 14:36:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.999
X-Spam-Level:
X-Spam-Status: No, score=-102.999 tagged_above=-999 required=5 tests=[AWL=-0.600, BAYES_00=-2.599, J_CHICKENPOX_34=0.6, J_CHICKENPOX_55=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ku5cxNfuys1t for <trill@ietfa.amsl.com>; Thu, 10 Jan 2013 14:36:16 -0800 (PST)
Received: from mail-oa0-f47.google.com (mail-oa0-f47.google.com [209.85.219.47]) by ietfa.amsl.com (Postfix) with ESMTP id 9AEE121F8694 for <trill@ietf.org>; Thu, 10 Jan 2013 14:36:16 -0800 (PST)
Received: by mail-oa0-f47.google.com with SMTP id h1so1172634oag.6 for <trill@ietf.org>; Thu, 10 Jan 2013 14:36:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:from:date:message-id:subject:to:content-type; bh=4YRselCipSKMJF9WwDKLeAzyNkPld93Ztc35qNkZaqI=; b=ipLcvRbcGU6lallv5jP+N+u+WkW6DEf/8ZNWclVdA+jC7Sf5Ev+p+vPjxfjU3MjxXh MQdEdcGh79NfiuOleiJRGYuQqBJ7pnj6CDlBTIV6R1ILis9iJCKvOt+9f8hALsvnUg6a wl4lPr3s4OGiEwfukVF/kE6o7IAvLL/ITNrTUURO43ppYKxS8KQJRGIJdmj1iXwjx3cv MHLzcK3i5HoHPjxh30wAn38bp6uvOUwrIUwTwQyXEnb60CUmtVKEHvadClnRvLu4twX1 i7Lv5IQh2mGEdzqIdojC7+sfAR+O5C9FWccG7LlFmGoTGWD3IGK07dhz+w5EIxJCk75U Rghg==
Received: by 10.182.131.3 with SMTP id oi3mr48849047obb.13.1357857376034; Thu, 10 Jan 2013 14:36:16 -0800 (PST)
MIME-Version: 1.0
Received: by 10.76.110.239 with HTTP; Thu, 10 Jan 2013 14:35:55 -0800 (PST)
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Thu, 10 Jan 2013 17:35:55 -0500
Message-ID: <CAF4+nEHkw3=F3XWUqEYWm1fu8GvYn+Jm_a4buqGs2sAwrVerfg@mail.gmail.com>
To: trill@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Subject: [trill] ESADI 4. Multiple attachment of the same MAC
X-BeenThere: trill@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Developing a hybrid router/bridge." <trill.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trill>, <mailto:trill-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trill>
List-Post: <mailto:trill@ietf.org>
List-Help: <mailto:trill-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trill>, <mailto:trill-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Jan 2013 22:36:17 -0000

Notwithstanding the claim that there were three suggested changes to
ESADI below is a forth :-)

Thanks,
Donald
=============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 155 Beaver Street, Milford, MA 01757 USA
 d3e3e3@gmail.com


Update RFC 6325 by updating the last sentence of the last paragraph of
Section 4.2 as shown below to provide better traffic spreading while
avoiding possible address flip-flopping. (The preceding two sentences
are also shown for context.)

   Explanation: Assume some end station has two or more ports with the
   same MAC&VLAN that are each connected to different RBridges (RB1,
   RB2, ...).  With ESADI, some other RBridge, RB0, can persistently
   see that MAC&VLAN connected to multile RBridges. When RB0 ingresses
   a frame for that MAC&VLAN, the current RFC 6325 text permits a wide
   range of behavior. In particular, it would permit RB0 to use some
   rule such as always send to the egress with the lowest System ID,
   which would put all of this traffic through one of the egress RBs
   and one of the end station ports.  There would be no load spreading
   even if there were multiple different ingress RBridges and/or
   different MAC addresses. It also would also permit RB0 to send
   different traffic to different egresses by doing ECMP at a flow
   levee which would likely result in return traffic to RB0 from RB1,
   RB2, ... for the same MAC&VLAN. The resulting address flip-flopping
   could cause problems. The change below fixes this by requiring RB0
   to use only one egress for a particular MAC&VLAN but to select that
   egress pseudo-randomly based on the topology including MAC
   reachabilty.  Assuming multiple ingress RBridges and/or multiple
   MAC addresses, this should result in load spreading without without
   address flip-floping.

OLD: ...  However, duplicates of the same MAC within a VLAN can appear
      in ESADI data and between ESADI data and addresses learned from
      the observation of received and decapsulated frames, entered by
      manual configuration, or learned through Layer 2 registration
      protocols.  If duplicate MAC addresses occur within a VLAN, RB2
      sends frames to the MAC with the highest confidence.  If
      confidences are also tied between the duplicates, for
      consistency it is suggested that RB2 direct all such frames (or
      all such frames in the same ECMP flow) toward the same egress
      RBridge; however, the use of other policies will not cause a
      network problem since transit RBridges do not examine the
      Inner.MacDA for known unicast frames.

NEW: ...  However, duplicates of the same MAC within a VLAN can appear
      in ESADI data and between ESADI data and addresses learned from
      the observation of received and decapsulated frames, entered by
      manual configuration, or learned through Layer 2 registration
      protocols.  If duplicate MAC addresses occur within a VLAN, RB2
      sends frames to the MAC with the highest confidence.

      If confidences are also tied between the duplicates then RB2
      MUST, in a pseudo-random way [RFC4086], select one of the egress
      RBridges to which the destination MAC appears to be attached and
      send all traffic for the destination MAC and VLAN to that
      egress. Such pseudo-random selection will, over a population of
      ingress RBridges, probabilistically spread traffic over the
      possible egress RBridges. Reasonable inputs to the pseudo-random
      selection are the ingress RBridge System ID and/or nickname, the
      VLAN, the destination MAC address, and a vector of the RBridges
      with connectivity to that MAC and VLAN. There is no need for
      different RBridges to use the same pseudo-random function.