Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
HARD ZONING CORRESPONDING TO FLOW
Document Type and Number:
WIPO Patent Application WO/2014/209265
Kind Code:
A1
Abstract:
A network controller may include a flow identifier to identify a flow using frame information. The frame information may be transmitted by a network switch. The network controller may include a retriever to retrieve hard zoning configuration data corresponding to the flow. The hard zoning configuration data may be used by the network switch to update an access control list.

Inventors:
AYANDEH SIAMACK (US)
Application Number:
PCT/US2013/047351
Publication Date:
December 31, 2014
Filing Date:
June 24, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HEWLETT PACKARD DEVELOPMENT CO (US)
International Classes:
H04L45/52; H04L12/28; H04L45/74
Foreign References:
US20090037977A12009-02-05
US20120226801A12012-09-06
US8364852B12013-01-29
US20120039163A12012-02-16
KR20030036216A2003-05-09
Attorney, Agent or Firm:
FEBBO, Michael et al. (Intellectual Property Administration3404 East Harmony Road,Mail Stop 3, Fort Collins CO, US)
Download PDF:
Claims:
CLAIMS

1. A method of network switch operation, comprising;

receiving a frame;

detecting a flow corresponding to the frame;

transmitting, to a network controller, frame information corresponding to the flow;

receiving, from the network controller, hard zoning configuration data corresponding to the flow; and

updating an access controi list according to the hard zoning configuration data.

2. The method of claim 1 , wherein detecting a flow corresponding to the frame comprises detecting with which of a plurality of transport protocols th frame complies.

3. The method of claim 1 , wherein :

the first flow complies with a first networking protoco!; and

the access control list includes hard zoning configuration data corresponding to a second flow, the second flow complying with a second networking protocol different from the first networking protocol,

4. The method of claim 3, wherein the access control list is implemented using a single ternary content-addressable memory table.

5. A network controller, comprising:

a network interface to receive, from a network switch, frame informatio corresponding to a flow;

a flow identifier to use the frame information to determine a source node and a destination node to identify the flow;

a retriever to retrieve hard zoning configuration data corresponding to the flow; and

the network interface to transmit, to the network switch, the hard zoning configuration data.

6. The controller of c!aim 5, wherein the retriever is to retrieve the ard zoning configuration data from a configuration database comprising a table of allowed pairwise flows, the aifowed pairwise flows forming a closed user group.

7. The controller of claim 5, wherein the network switch comprises an ingress edge switch, and wherein the transmitter is to transmit the hard zoning configuration data to an egress edge switch corresponding to the flow.

8. The controller of claim 5, wherein the flow identifier is to:

use the frame information to determine a transport protocol to which the flo compiles; and

use the transport protocol to identify the flow.

9. The controller of claim 5, wherein the flow comprises:

a connection in compliance with a Fibre Channel protocol or Fibre Channel over Ethernet protocol, or

a session in compliance with an Internet Small Computer System interface protocol or a Remote Direct Memory Access over Converged Ethernet protocol.

10. The controller of claim 5, wherein the network interface is to transmit the hard zoning configuration data in compliance with an GpenFlow protocol extended to include Fibre Channel or Fibre Channel over Ethernet flows,

11. A non-transitory computer readable medium having computer executable instructions stored thereon, the instructions to implement, when executed by a processor:

a flow identifier to use information from a frame fo identify a flow corresponding to the frame;

a retriever to retrieve hard zoning configuration data corresponding to the flow; and

a connection manager to cause a network controller to transmit the hard zoning configuration data to a network switch.

12. The non-transitory computer readable medium of claim 11 , wherein the instructions, when executed by the processor, implement the flow identifier to: use the information from the frame to identif a flow source address; use the information from the frame to identify a flow destination address; use the information from the frame to identify a transport protocol that the flow complies with; and

use the flow source device, the flow destination device, and transport protocol to identify the flow.

13. The non-transitory computer readable medium of claim 11 , wherein the instruciions, when executed by the processor, implement the connection manager to cause the network controller to transmit the hard zoning

configuration data to a second network switch,

14. The non-transitor computer readable medium of claim 11 , wherein the instructions, when executed by the processor: implement the retriever to retrieve the hard zoning configuratio data from a configuration database.

15. The non-transitory computer readable medium of claim 14, wherein the configuration database comprises a table of pairwise flows forming a closed user group.

Description:
HARD ZONING CORRESPONDING TO FLOW

BACKGROUND

[I] Computer networks may include multiple nodes, which may include network devices such as routers, switches, hubs, and computing devices such as servers, personai computers (PCs), laptops, workstations, mobile devices, storage devices, and peripheral devices. Such computer networks may be connected using wireless or wired iinks in local or wide area networks (LANs or WANs). Various networking protocols may be used to implement LANs or WANs.

[2j A storage area network (SAN) is a network that provides access to consolidated, block level data storage. Various transport protocols may be used in implementing a SAN, Transport protocols offering high bandwidth and Sow latency, such as connection-based protocols, including Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE); and session-based protocols, such as Remote Direct Memory Access over Converged Ethernet {RoCE} and Internet Small Computer System Interface (iSCSS), may be used in some SANs. Several transport technologies may exist independently or as separate traffic classes within the same network.

BRIEF DESCRIPTIO OF THE DRAWJNGS

[3| Certain examples are described in the following detailed description and in reference to the drawings, in which;

[4 Figure 1 illustrates an example method of network switch operation for updating an access control list according to hard zoning configuration data provided by a network controller;

[53 Figure 2 illustrates an example network switch having an access control list based on hard zoning configuration data provided by a network controller; and

[63 Figure 3 illustrates an example network controller, including a non- transitory computer readable medium, for transmitting hard zoning configuration data to a network switch. DETAILED DESCRIPTION OF SPECIFIC EXA PLES

[7J Switched fabric network topologies (fabrics) may be used as transport infrastructures in LANs or WANs, and SANs, !n a fabric, devices are interconnected via intermediate network switch. Each device, or node, connects to a switch, caile an "edge switch," of the fabric. Accordingly, when a first device sends a frame to a second device, the first devsce transmits the frame via the switch to which it is directiy connected, termed the "ingress switch." The frame is sent through the fabric to the switch to which the second device is directly connected, termed th "egress switch," The frame is sent by the egress switch to the second device.

[8| Hardware enforced closed user groups (CUGs) may be created in fabrics using hard zoning. Sn hard zoning, connectivity and visibility is limited to devices in the same CUG. A devsce in a hard zoned CUG can oniy see and communicate with devices in the same CUG. in contrast, in soft zoning, visibility, but not connectivity, is limited to devices in the same CUG. A devsce in a soft zoned CUG can communicate with a device outside the CUG if it knows the address of the device outside the CUG.

[9| Some transport protocols used in SANs or other datacenter applications, such as RoCE, lack zoning schemes. Other transport protocols, such as iSCSL only have soft zoning schemes. Althoug some transport protocols, such as FC and FCoE, provide hard zoning schemes, the schemes may be specific to the transport protocol and may require dedicated hardware resources at the edge switches.

[10] Some implementations of the disclosed technology may be used to provide hard zoning to fabrics in a transport independent manner. For example, a network controller may be used to instantiate hard zoning in a transport independent manner in a controlled fabric. This may allow hard zoning to be applied to various transport protocols that otherwise lack hard zoning capability.

[11] Additionally, a common hard zoning scheme may be applied to various different transport protocols. This may allow the same hardware resources, such as ternary content addressable memory (TCAM) tables, to be used to implement common hard zoning techniques across different transport technologies. For example, the same hardware resources may be used by a switch to implement a CUG for devices using RoCE and to Implement a CUG for devices using FCoE. Additionally, this may avoid a requirement for specific transport protocols to include hard zoning schemes, which may decrease the complexity of the protocols and simplify protocol stack implementations.

[12] Further, aspects of the disclosed technology may remove the need for login and logout procedures to implement hard zoning. This may reduce network overhead and simplify network administration.

[13] Figure 1 illustrates an example method of network switch operation for updating an access control iisf according to hard zoning configuration data provided by a network controller. The illustrated process may be performed to implement a CUG on a switch fabric in a transport independent manner.

[14] The process includes receiving a frame 105. The frame may be any digital data transmission unit transmitted in accordance with any of various transport protocols. For example, the frame may comprise an Ethernet frame used to transmit iSCSI, FCoE, or RoCE packets. As another example, the frame may comprise a FC frame.

[15] The process further includes detecting a flow corresponding to the frame 1 10. The term "flow" refers to a sequence of frames used for communication between two network nodes. For example, a flow may comprise a connection in compliance with an FC protocol or an FCoE protocol. As another example, a flow may comprise a session in compliance with an iSCSI protocol or a RoCE protocol.

[16] The network switch may maintain an access control list listing allowed and disallowed flows. Detecting the flow 110 may comprise determining if the frame is part of a flow listed in the access control list. For example, detecting a flow 1 10 may comprise evaluating information elements of the received frame according to various matching criteria. Additionally, detecting a flow corresponding to the frame 110 may comprise detecting with which of a plurality of transport protocols the frame complies. Detecting a flow 110 may be performed in different manners depending on the transport protocol with whic the frame comprises.

[17] For iSCSi flows, detecting a flow 110 may comprise detecting a flow 110 based on Ethernet AC source and destination address, or IP source and destination address. Detecting an iSCSI flow may also include evaluating TCP connection establishment information, session initiator_Target Nexus information for a piuraliiy of TCP connections associated with an initiator, or iSCSi control commands.

[18] For oCE flows, Ethernet frames may be sent from a source to a destination over a single subnet. Various matching criteria, such as Ethernet MAC source and destination address, RoCE layer-3 source and destination address, and Ethertype, may be used to detect a RoCE flow.

[19] For FCoE flows, FC frames, inciuding the FC header and cyclic redundancy check sequence (CRC), may be encapsulated in an FCoE header, which may be in turn carried by a virtual LAN (VLAN) tagged Ethernet frame. For FCoE frames, detecting a flow 110 may comprise inspecting the virtual LAN (VLAN) information element and Ethertype of the encapsulating Ethernet frame. For example, VLAN and Ethertype may be used in implementations vvhere frames are carried from source to destination via the same Ethernet frame with no header rewrites. As another example, FC header information elements such as Destination Address (DJD), Source Address (SJD), frame type (R _CTL), protocol type (TYPE), ciass of service (CS_CTL), and Frame Control (F_CTL) may be used as match criteria to detect a flow. In some example implementations, the network switch and network controller communicate using an Open Flow protocol, in some such implementations, the OpenFlow protocol may be extended to include these FC header information elements as match fields.

[20] For FC flows, the FC header information elements, such as as

Destination Address (DJD), Source Address (SJD), frame type (R_CTL), protocol type (TYPE), class of service (CS CTL), and Frame Control (F CTL) may be used as match criteria to detect a flow. In implementations utilizing OpenFiow, the OpenFiow protocol may be extended to inciude these FC header information elements as match fields.

[21] For flows complying with other transport protocols, other evaluation criteria may be used to detect a flow 110. Such criteria may be defined by the network administrator according to the CUG or CUGs to be implemented on the switch fabric. For example, such additional evaluation criteria may be provided by a network controiler.

[22] The process further includes transmitting, to a network controller, frame information corresponding to the fiow 115, In some examples, transmitting the frame information corresponding to the flow 1 15 comprises transmitting ail or a portion of the received frame's header to the network controller, in other examples, the frame information may comprise fiow identifiers or other information extracted from the frame for identifying the flow.

[23] In some cases, transmitting the frame information 115 is only performed if the detected flow is a new flow. For example, the frame information is transmitted 115 if the flow is not listed on the network switch's access control list. If the flow is on the access control list, then the switch may not transmit the frame information 1 15, Instead, the switch may treat the frame according to the flow's entry in the access control list.

[24] The process includes receiving, from the network controller, hard zoning configuration data corresponding to the flow 120, For example, the hard zoning configuration data may indicate whether the flow is between two members of a CUG, The hard zoning configuration data may also include matching criteria to allow the network switch to identify the flow in future frames. For example, the hard zoning configuration data may include a destination address, source address, and protocol type.

[25] The process includes updating an access control list according to the hard zoning configuration data 125. For example, the network switch may add an entry in its access control list including the matching criteria included in the hard zoning configuration data, in some cases, the entries in the access control list may indicate if the flow is disallowed or allowed. If the fiow is disallowed, then the network switch may implement hard zoning by discarding the frame. Additionally, future frames of the flow may be evaluated according to the updated access control list. In some examples, the access control list may be implemented using switch hardware resources, such as ternary content addressable memory (TCAM).

[26] Srt some implementations, the flow may comply with a first networking protocol, and the access control list may include hard zoning configuration data corresponding to a second flow, the second flow complying with a second networking protocol different from the first networking protocol. For example, the switch may use a single access control iist to evaluate frames transmitted using multiple transport protocols. For example, RoCE flows and FCoE flows may be included in the same access control list. In such an example, the same hardware resources may be used to implement hard zoning for multiple transport protocols. For example, a single TCAM tabie may be used to implement an access control list that includes multiple transport protocols.

[27] Figure 2 iliustrates an example network switch 205. The example network switch 205 may be a switch in a fabric controlled by a network controller to implement hard zoning in a transport independent manner. For example, the switch 205 ma perform the process illustrated in Figure 1. In some implementations, the switch 205 may be one of several edge switches in a three-tier network, a fat tree flat network, a full mesh network, or other data center or SAN network,

[28] The switch 205 includes a processor 210, and a memory 220, a network interface 215, and switch hardware 240 coupled to the processor 210. The processor 210 may be any processing unit capable of executing instructions stored in memory 220, configuring the switch hardware 240, and communicating using the network interface 215.

[29] Memory 220 may be a non-transitory computer readable medium capable of being read and written by the processor 210. In this example, the memory 220 contains computer executable instructions, including a protocol control stack 225, a software defined network (SDN) client, an access control list 235, and a control module 235. [30] The protocol control stack 225 may include instructions allowing the network switch 205 to operate in compliance with a transport protocol. For example, the control stack 225 may be an Ethernet control stack, allowing the switch 205 to operate in compliance with the Ethernet protocol and protocols using the Ethemet protocol, suc as RoCE, FCoE, or sSCSI. As another example, the control stack 225 may be a FC control stack. As a further example, the control stack 225 may be a converged network control stack, including instructions to allow the switch 205 to operate in compliance with multiple transport protocols, suc as Ethemet and FC.

[313 ^he SDN client 230 may include instructions to cause the switch

205 to communicate with a network controller to receive configuration data to implement a software defined network. For example, the SDN client 230 may comprise an OpenFfow client, which may include extensions to allow the switch 205 to identify additional flows, such as FC and FCoE flows. The SDN client 230 may cause the processor 210 to communicate with a network controller via the network interface 215. In some implementations, the network interface 215 may connect to the fabric that the switch 205 is a part of. For example, both the switch 205 and the network controller may be nodes of the fabric, in other implementations, the network interface 215 may connect to a separate transport network con ecti g the switches of the fabric to the network controller.

[32] The access control list 235 may comprise a list reflecting membership in a CUG implemented using the switch. For example, the access control list 235 may comprise a list of allowed flows representing pairwise connections between network nodes that are members of the same CUG. The access control list 235 may be populated using hard zoning configuration data obtained from a network controller via operation of the SDN client 230. The hard zoning configuration data ma correspond to flows of various protocols. Accordingly, the access control list 235 may include flows from different protocols.

[33] The control module 235 may include instructions to cause the processor 210 to implement the protocol control stack 225 and the SDN client 230. Additionally, the control module 235 may include instruction to cause the processor 210 to configure the switch hardware 245 io implement the switch's 205 network behaviors. For example, the control module 235 may cause the processor 210 to configure a ternary content addressable memory (TCA ) table of the hardware 245 to reflect the contents of the access control list 235.

[34] The hardware 245 may comprise application specific integrated circuits (ASICS) and TCAM tables, and may be coupled to a plurality of ports 250. The hardware 245 may operate to implement the switch behavior configured by the processor 210 without further processor operation. For example, the hardware 245 may implement the hard zoning behavior reflected in the access control list 235. The hardware 245 may evaluate frames received via a port 250 according io the TCAM table. If the frame is in an allowed flow, the hardware 245 may forward or switch the frame to another port 250. Sf the access control list 235 includes flows from multiple protocols, then a single TCAM table may be used to implement hard zoning for multiple protocols.

[35] Figure 3 illustrates an example network controller 305, including a non-transitory computer readable medium 320, for transmitting hard zoning configuration data to a network switch. For example, the network controller 305 may connect to a network switch as illustrated in Figure 2.

[36] The example network controller 305 includes a non-transitory computer readable medium having computer executable instructions stored thereon. For example, the non-transitory computer readable medium 320 may comprise read-only memory (ROM), random access memory (RAM), storage, or a combination thereof. In this example, when executed by the processor 310, the instructions implement a flow identifier 330, a retriever 335, and a connection manager 340. in other examples, these modules may be implemented by hardware logic or by a combination of software and hardware logical elements.

[37] The example network controller 305 includes a network interface

315. The network interface 315 may allow the controller to receive frame information from a network switch. The frame information may be information correspo ding to a flow. For example, the frame information may be a copy of a frame header or a portion of a frame header. In some implementations, the frame informaiion may be transmitted by a network switch performing the process illustrated in Figure i .

[38] The example network controller 305 also includes a flow identifier

330. The flow identifier 330 may use the frame information to identify a flow corresponding to the frame. For example, the ffow identifier 330 may use the frame informaiion to determine a source node and a destination node to identify the fiow. Additionally, the fiow identifier 330 may use the frame information to determine a transport protocol to which the flow complies. The fiow identifier 330 may use the transport protocol to identify the fiow. Fiows identified by the flow identifier 330 may include connections in compliance with an FC or FCoE protocol or sessions in compliance with an iSCS! or a oCE protocoi.

[39] The example network controiier 305 also includes a retriever 335 to retrieve hard zoning configuration data corresponding to the flow. For exampie, the retriever 335 may retrieve the hard zoning configuration data from a configuration database 350. The configuration database 350 may include a tabie of allowed pasrwise flows forming a closed user group, if the configuration database 350 includes the flow identified by the flow identifier 330, then the hard zoning configuration data may indicate that the fiow is an allowed fiow. If the configuration database 350 does not include the flow, then the controiier 305 may generate hard zoning configuration data indicated that the flow is a disallowed flow. In the iilustrated exampie, the configuration database 350 is stored on medium 320. For exampie, the configuration database 350 may be provided to the controller 305 by a network administrator via the network interface 315. In other examples, the configuration database may be stored at an external location, and the controller 305 may query the configuration database via the network interface 315.

[40] The example network controller 305 also includes a connection manager 340. The connection manager 340 may cause the network controller 305 to transmit the hard zoning configuration data to a network switch. For example, the connection manager 340 may cause the network controller 305 to transmit the hard zoning configuration data to the network switch via the network interface 315. in some implementations, the connectio manager 340 may include an SDN protocol stack, such as an OpenFiow protocol stack. Sf the flows identified by the flow identifier 330 include FC or FCoE flows, the OpenFiow protocol stack may be extended to include FC or FCoE flows. Accordingiy, the connection manager 340 may cause the network interface 315 to transmit the hard zoning configuration data in compliance with a OpenFiow protocol extended to include FC or FCoE flows. The network switch may be an ingress edge switch or an egress edge switch. In some cases, the connection manager 340 may cause the controller 305 to transmit to an ingress edge switch and an egress edge switch. For example, the ingress edge switc and the egress edge switch may be the switches corresponding to the flow source and destination, respectively.

[41] In the foregoing description, numerous details are set forth to provide an understanding of the subject disclosed herein. However, implementations may be practiced without some or ail of these detaiis. Other implementations may include modifications and variations from the details discussed above. It is intended that the appended claims cover such modifications and variations.