"It is easy to break one arrow, but difficult to break ten arrows." This is a proverb story that I often heard when I was a child. The literal meaning is that a single arrow is easily broken, but multiple arrows tied together are difficult to destroy. This tells us the importance of "unity and cooperation". In the field of bearing, this story also has a wonderful use. Let's take a look at it together~ Single link, one arrow can easily breakIn the early days of IP networking, two network devices (A and B) generally communicated by establishing a single link. Obviously, using a single link connection has the following drawbacks:
Even though a single link has obvious flaws, it can still meet the needs of the public in an era when network requirements were not high. As the scale of networks grows, a single link can no longer meet the bandwidth and reliability requirements of the network, so people came up with the idea of bundling multiple links like arrows. As a result, link aggregation technology came into being. Link Aggregation: Ten Arrows Can’t Be FailedLink aggregation "bundles" multiple links between two devices to form an aggregation group. The multiple links in the aggregation group can now be regarded as one logical link. At this point, the traffic between the two devices can be shared on each link in the aggregation group. So, what benefits can link aggregation bring to the network? Increased network bandwidthMultiple links between A and B are bundled into one logical link. The bandwidth of the bundled link is the sum of the bandwidths of all links. For example, there are three links between A and B for link aggregation, and the bandwidth of each link is 10 Gbps. Then the maximum bandwidth of this aggregation group can reach 30 Gpbs. Improved network connection reliabilityIf one link between A and B fails and is interrupted, the traffic will be automatically redistributed among the remaining links without causing traffic interruption between A and B. Implementing traffic load balancingLink aggregation can evenly distribute the traffic between A and B to all member links, minimizing the risk of traffic blocking the link generated by each member link. Avoid Layer 2 loopsWhen link aggregation is used between A and B, these links are no longer single links working independently, but become a logical link to the outside world. Therefore, even if STP (Spanning Tree Protocol) is not used, loops will not occur, effectively avoiding the risk of Layer 2 loops between A and B. Based on the above advantages, link aggregation has been widely used in IP networks. MC-LAG: A more reliable “bundle”With the advent of the mobile Internet era, the Internet has become increasingly closely integrated with our daily lives. While we enjoy the convenience of the Internet, it also brings about the interactive processing of massive amounts of data, which puts higher demands on the network's bandwidth and reliability. However, traditional link aggregation technology is limited to one-to-one link aggregation between two devices and cannot achieve link aggregation between one-to-many devices. Therefore, in order to provide a more reliable network, MC-LAG (Multi-Chassis Link Aggregation Group) was created. When an access device (which can be a server or switch) is connected to two upper-layer network devices A and B, the MC-LAG technology can be used to form a cross-device link aggregation group. The basic idea of MC-LAG is to allow two network devices A and B to perform link aggregation with the access device in the same state. From the access device's point of view, it is as if a link aggregation relationship has been established with the same network device. In this way, link aggregation technology is expanded from one-to-one device docking to being able to access two devices at the same time and form a dual-active system. Let’s take a look at how this active-active system works. MC-LAG working processBefore understanding the working process of MC-LAG, first learn some basic concepts involved in MC-LAG technology. DFS Group, or Dynamic Fabric Service Group, is mainly used to pair the two network devices (A and B in the figure) that make up MC-LAG and synchronize the interface status, table entries and other information of the two devices. In a DFS Group, the roles of devices A and B are differentiated as master and backup. Under normal circumstances, the master and backup devices forward service traffic at the same time. Peer-link is a direct Layer 2 link between two MC-LAG devices A and B, used for negotiation message exchange and partial traffic transmission. Keepalive is the heartbeat link between two MC-LAG devices. It carries heartbeat data packets and is mainly used to send dual-active detection messages between the active and standby devices to prevent dual-active devices A and B from being used as dual-active devices. MC-LAG member interfaces are interfaces on two network devices A and B that connect to access devices. After understanding the basic concepts of MC-LAG, we will further understand the process of establishing MC-LAG, which includes the following five steps.
After completing the above establishment process, MC-LAG can work normally. MC-LAG Traffic ForwardingMC-LAG is mainly used in dual-homing access scenarios, that is, the access-side device C uses the MC-LAG technology to access the network-side devices A and B. During normal operation, the upstream and downstream traffic is forwarded through devices A and B in a load-balancing manner. If the above network fails, how does MC-LAG protect the network from working normally? Member interface link failureIf a member interface of MC-LAG fails, for example, a member interface of device B fails. Access side device C senses the failure of the member interface of device B and sends all upstream traffic to device A, which forwards it. When device B receives traffic from the network side to device C on the access side, it will hand over the traffic to the normally functioning device A through the peer-link and forward it to device C on the access side. MC-LAG Device FailureIf an MC-LAG device fails, for example, device B fails, device B cannot forward traffic, and all traffic is forwarded by device A. Peer-link failureIf a peer-link failure occurs, devices A and B cannot forward traffic at the same time, otherwise it will cause a series of problems such as broadcast storms and MAC drift, so only one device is allowed to forward traffic. At this time, the backup device of MC-LAG (here is device B) will process all its physical interfaces except the peer-link interface and the management network port in Error-down mode. At this time, all traffic will only be forwarded by the MC-LAG master device. ConclusionFrom the previous introduction, we can see that MC-LAG technology has more advantages than traditional link aggregation technology. While enhancing network reliability, it simplifies networking and realizes device-level high-availability redundant protection and multi-path forwarding. In addition, the two network devices of MC-LAG run independently and can be upgraded separately. During the upgrade process, as long as one device is kept working normally, there will be almost no impact on the running business. Currently, MC-LAG technology is being widely used in new IP metropolitan area networks and cloud data centers. While adopting the Spine-Leaf network architecture, MC-LAG can be deployed to ensure network reliability. In the process of 5G evolution, MC-LAG technology will surely provide more reliable protection for IP bearer networks. |
<<: Let’s talk about how 5G applications can empower thousands of industries
>>: How these three benefits of SDN can help small businesses
Network Function Virtualization (NFV) held great ...
1. The harm of fake and inferior wires Electric w...
No one likes the word "recession", but ...
Hello everyone, I am Xiaolin. This morning I saw ...
5G commercial use is targeted for 2020, and all p...
Sharktech has no special offers recently, but has...
With the continuous development of communication ...
I have had my driver's license for more than ...
The development of technologies such as 5G, cloud...
Structured cabling standards help organizations a...
On January 26, the State Council Information Offi...
Gateway Gateways are used to control the flow of ...
CloudCone has launched several special packages f...
The public cloud has not killed the data center, ...
2017 is coming to an end. There is no doubt that ...