当前位置:网站首页>LAN SDN technology hard core insider 7 from layer 2 to layer 2
LAN SDN technology hard core insider 7 from layer 2 to layer 2
2022-07-23 07:44:00 【User 8289326】
In the previous issue 《 Distributed anycast gateway 》 in , We asked two questions :
Virtual machines in the same network segment , How to cross virtual switches (OVS) signal communication ?
Virtual machines of different network segments , How to cross OVS Communication ?
Today we will uncover the mystery for you .
First , We know , Under the same host , Virtual machines in the same network segment can communicate directly , In the same two-tier domain , Virtual machine communication across hosts requires OVS Increase in the upward direction VLAN TAG, As shown in the figure :
that , Do we configure the entire data center network as a two-tier network , And assign corresponding VLAN, You can realize any communication between virtual machines and host computers ?
Of course not .
Let's review 《 computer network 》 Ethernet communication mechanism mentioned in the course , For Ethernet , Every BUM message (Broadcast, Unknown-unicast, Multicast), Will flood the network , in other words , Each layer-2 node in the network will copy the message to all ports except the port that receives the message .
Some students may ask , Such mechanism , Has not experienced the test of history ? Of course . In a small subnet , If the number of terminals does not exceed 200 individual , There is no problem . however , If the subnet size reaches 1000 More than , Each terminal sends 1 individual BUM message , It will cause transmission in the subnet every second 1,000,000 A message , in other words , In the subnet BUM Number of flood packets , It is proportional to the square of the number of terminals .
See here , Some students who have a solid grasp of Ethernet technology have found the problem . Yes , Gigabit Ethernet can only transmit at most per second 1,488,095 A data message , When the subnet is large , Most of the resources in the network will be BUM Message flooding consumption , This is unacceptable .
We can judge , Under the trend of large-scale virtualization in the data center , The square law increased flooding packets manufactured by the virtualized terminal under the Ethernet flooding mechanism , And linearly enhanced Ethernet switching capability , It has become the main contradiction of data center network .
Second tier technology is the main means to solve this contradiction .
Common second tier Technology , Yes Trill、NVGRE、FabricPath、SPB etc. . In the waves washing away the sand ,VXLAN Technology with its good compatibility and scalability has become the mainstream of the second tier Technology .
VXLAN Implementation of technology , Is to encapsulate Ethernet packets in UDP Inside , When Ethernet packets enter VXLAN Tunnel time ,VXLAN End of Tunnel (VTEP, Vxlan Tunnel End Point) Add an outer layer for Ethernet packets IP/UDP Head , On the other end VTEP Demolished , As shown in the figure below :
Pictured ,VLAN 100 Two inside VM When communication ,OVS Play the role VTEP Role , Add a layer of Ethernet outside the Ethernet packet /IP/UDP Data packet head . Outer layer IP Source address of / The destination addresses are at both ends OVS Of IP.
VXLAN use UDP port 4789 As the destination port , The source port is through the header of the inner packet Hash calculated , Easy to realize load balancing .
original ,VXLAN It's not mysterious , adopt VXLAN The implementation of layer 2 Forwarding is also very simple .
perform VXLAN Layer 2 Forwarding VTEP, We call it the VXLAN Second level gateway , or VXLAN bridge .
Tomorrow, , We will introduce VXLAN The concept of three-layer routing , Introduce in detail the mechanism of virtual machine forwarding across network segments .
边栏推荐
猜你喜欢

2022就业季惊喜来袭!正版Adobe软件,终于能正经白嫖一把了

一年130+新服务和功能,这个存储“全家桶”又壮大了

Daily question brushing record (XXXI)

(五)数电——公式化简法

Trees and binary trees

A web server where browser users access server files

【刷题记录】18. 四数之和
![[SSM]统一结果封装](/img/ff/9528a062d464acee52047598af40c3.png)
[SSM]统一结果封装

Classes et objets (1)

Wechat campus second-hand book trading applet graduation design finished product (7) Interim inspection report
随机推荐
Classes and objects (1)
《postgresql指南--内幕探索》第一章 数据库集簇、数据库和数据表
Problems encountered in punching
小程序毕设作品之微信校园二手书交易小程序毕业设计成品(8)毕业设计论文模板
Part I sourcetree installation
直播实录 | 37 手游如何用 StarRocks 实现用户画像分析
局域网SDN技术硬核内幕 10 云网融合的红娘EVPN
局域网SDN硬核技术内幕 21 亢龙有悔——规格与限制(中)
智能商务的数据分析平台设计与实现
Application of the latest version of Ontrack easyrecovery computer data recovery software
【翻译】宣布Krius--加速你对Kubernetes的监控采用
Codeforces Round #809 (Div. 2) A - D1
局域网SDN技术硬核内幕 4 从计算虚拟化到网络虚拟化
如何使用订单流分析工具(中)
[technology popularization] alliance chain layer2- on a new possibility
BGP笔记(二)
局域网SDN技术硬核内幕 7 从二层到大二层
Wechat hotel reservation applet graduation project (8) graduation project thesis template
工作流引擎在vivo营销自动化中的应用实践
redis 哨兵模式,主节点检查脚本