Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Using TRILL, FabricPath, and VXLAN : designing massively scalable data centers (MSDC) with overlays
Hooda S., Kapadia S., Krishnan P., Cisco Press, Indianapolis, IN, 2014. 368 pp. Type: Book (978-1-587143-93-9)
Date Reviewed: Dec 16 2014

The evolution of current data centers is driven by several major forces in terms of end-user and service requirements. Tenants, using infrastructures as a service (IaaS), require large Internet protocol (IP) address spaces operated over multiple physical networks, mobility of virtual machines, and operation in hybrid environments consisting of physical and virtual infrastructures. One of the core enablers for meeting these requirements is to provide scalable overlay networks capable of virtualizing layer 2 over existing layer 3 protocols. Several such approaches exist: virtual extensible LAN (VXLAN), NGVRE, FabricPath, and TRILL are the major players in the field, where a conceptual design is common to all these protocols.

This design relies on encapsulating layer 2 traffic in layer 3 traffic, but subtle differences among them relate to how link-state routing protocols like intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF) can be leveraged to transparently build such overlays. The fundamental question that has to be solved by these protocols is essentially very simple. Once layer 2 traffic is encapsulated in a layer 3 packet, the routing needs to map media access control (MAC) addresses to tunnel endpoints identified by layer 3 addresses. This process is the major discriminator among VXLAN, NGVRE, and Trill, and the authors go into great detail in describing it.

Chapter 1 motivates the need for overlay networks. Chapter 2 provides a high-level overview on the different overlay technologies, followed by individual chapters on FabricPath, TRILL, and VXLAN, respectively. What makes this book truly exceptional is the right mix of graphical illustrations, concrete device instantiations, and hands-on concrete command-line interface (CLI) examples. The logical flow of this book is a blueprint on how to write a technical book. Besides just a simple enumeration of major overlay technologies, the book dedicates significant coverage to the migration of existing infrastructures toward TRILL. Both bottom-up and top-down alternatives are discussed. Combining TRILL with VXLAN in one unified overlay is not straightforward, and the authors address this specific issue in the last chapter of the book.

This book fills an existing niche in the computer networking literature. Several Internet Engineering Task Force (IETF) standards and scattered pieces of information were, until now, the required entry point to the design of network overlays. The Cisco team manages to write a comprehensive introduction to this timely topic, with an updated, precise, and well-thought-out book in the area. This book is a welcome recommendation for a large audience: network designers, network engineers, and cloud operators can learn and benefit from it.

More reviews about this item: Amazon, B&N

Reviewer:  Radu State Review #: CR143015 (1503-0198)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
General (C.2.0 )
 
 
Data Warehouse And Repository (H.2.7 ... )
 
 
Routing Protocols (C.2.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "General": Date
Comparative evaluation of networks and protocols
Pooch U., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Aug 1 1985
Data communications, networks, and systems
Bartee T., Sams, Indianapolis, IN, 1985. Type: Book (9780672222351)
May 1 1987
Introduction to data communications and computer networks
Halsall F. (ed), Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1985. Type: Book (9789780201145472)
May 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy