TRILL – Transparent Interconnect of Lots of Links

TRILL is short for Transparent Interconnect of Lots of Links.

The Transparent Interconnection of Lots of Links (TRILL) is an IETF specification that enables multipathing in the data center. The TRILL protocol provides transparent Layer 2 forwarding using encapsulation with a hop count and IS-IS link state routing.

Recommended Reading: Understanding The Data Link Layer.

The TRILL network protocol was first developed by Radia Perlman (also credited with the invention of the algorithm behind the Spanning Tree Protocol) to “remove deficiencies of bridged Ethernet networks in large Layer 2 campuses” and was then taken up by the IETF to create a new standard.

As defined by the IETF RFC 6326 standard, TRILL provides optimal pair-wise forwarding without configuration, safe forwarding even during periods of temporary loops, and support for multipathing of both unicast and multicast traffic as well as supporting VLANs.

TRILL introduces a new encapsulation layer, a set of associated control plane protocols, and a new network device type called an RBridge (a TRILL device) that sits midway between a router and a bridge.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...