Modeling Tool of TRILL Protocol


  • Filip Holik University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech Republic.
  • Simeon Karamazov University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech Republic.


Modeling Tool, TRILL Protocol, STP Protocol, Deployment,


This paper proposes the first modeling tool of TRILL protocol. The application implements TRILL features, which include the most fundamental concepts of IS-IS protocol. Simplified STP protocol is also implemented. The application can be used to didactically and interactively present the advantages of the TRILL protocol over STP. Alternatively, the tool can be utilized as a decision tool for TRILL deployment in enterprise networks. The functionality of the TRILL protocol is discussed with emphasis on the main differences between STP. The application was tested on five scenarios of TRILL deployment in a typical enterprise network. Data traffic of these different deployments was compared using the application. Finally, results are further discussed.


Cisco, “Cisco Visual Networking Index: Forecast and Methodology”. Retrieved from:,on: 15 November 2015.

“IETF RFC 6325, Routing Bridges (RBridges): Base Protocol

Specification”., 2011 . ISSN: 2070-1721.

Selga J, Zaballos A, Navarro J, “Solutions to the Computer

Networking Challenges of the Distribution Smart Grid”. In: IEEE

Communications Letters, vol 17, no 3, pp. 588-591, 2013.

Lu, C., Jiang, Z., Yu, J., Zhang, G., Li, M., Liang, W. and Bi, J. “Understanding the overhead of large layer 2 data center networking: Measurement and analysis of TRILL as an example”. In Innovative Computing Technology (INTECH), 2013 Third International Conference, pp. 555-560, 2013.

Piccolo V, Amamou A, Dauchy W, Haddadou K. “Multi-tenant

isolation in a TRILL based multi-campus network”. In Cloud

Networking (CloudNet), 2015 IEEE 4th International Conference, pp.

-57, 2015.

Ibanez G, Rojas, E. “All-path bridging: Path exploration as an efficient alternative to path computation in bridging standards”. In 2013 IEEE International Conference on Communications Workshops (ICC), pp. 1280-1285, 2013.

Coudron, M., Secci, S., Maier, G., Pujolle, G. and Pattavina, A., “Boosting Cloud Communications through a Crosslayer Multipath Protocol Architecture”. In Future Networks and Services (SDN4FNS), 2013 IEEE SDN, pp. 1-8, 2013.

Lopes J, Sargento S, Zúquete A. “A Dependable Alternative to the Spanning Tree Protocol”. In Dependable Computing, pp. 148-164, 2013.

Gohar, M., Choi, S.I. and Koh, S.J., “Mobility support for Proxy Mobile IPv6 in TRILL-based mobile networks”. In 2015 Seventh International Conference on Ubiquitous and Future Networks, pp. 677-681, 2015.

Kazmi M, Sardar M, Khayam S. “Linux Implementation of TRILL Protocol”. (2013). Retrieved from: on 21 November 2015.

Balik L, Hornig O, Horalek J, Sobeslav V. “ IED Remote Data Acquisition and Processing in Power Distribution”. In: Computational Collective Intelligence, pp. 355-364, 2015.

Behan M, Krejcar O. “Modern Smart Device-Based Concept of Sensoric Networks”. EURASIP Journal on Wireless Communications and Networking, no. 1, pp. 1-13, 2013.

Bernstein, G. “New Switch Architectures and the Impact to the 40/100GbE Transition in the Data Center”. In: The Data Center Journal. 2013, Retrieved from on 22 November 2015.




How to Cite

Holik, F., & Karamazov, S. (2017). Modeling Tool of TRILL Protocol. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-3), 71–75. Retrieved from