< draft-cc-isis-flooding-reduction-00.txt   draft-cc-isis-flooding-reduction-01.txt >
Network Working Group H. Chen Network Working Group H. Chen
Internet-Draft D. Cheng Internet-Draft D. Cheng
Intended status: Standards Track Huawei Technologies Intended status: Standards Track Huawei Technologies
Expires: September 6, 2018 M. Toy Expires: October 31, 2018 M. Toy
Verizon Verizon
Y. Yang Y. Yang
IBM IBM
March 5, 2018 April 29, 2018
ISIS Flooding Reduction ISIS Flooding Reduction
draft-cc-isis-flooding-reduction-00 draft-cc-isis-flooding-reduction-01
Abstract Abstract
This document proposes an approach to flood ISIS link state protocol This document proposes an approach to flood ISIS link state protocol
data units on a topology that is a subgraph of the complete ISIS data units on a topology that is a subgraph of the complete ISIS
topology per underline physical network, so that the amount of topology per underline physical network, so that the amount of
flooding traffic in the network is greatly reduced, and it would flooding traffic in the network is greatly reduced, and it would
reduce convergence time with a more stable and optimized routing reduce convergence time with a more stable and optimized routing
environment. The approach can be applied to any network topology in environment. The approach can be applied to any network topology in
a single ISIS area. a single ISIS area.
skipping to change at page 1, line 46 skipping to change at page 1, line 46
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 6, 2018. This Internet-Draft will expire on October 31, 2018.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
skipping to change at page 2, line 33 skipping to change at page 2, line 33
5. Flooding Behavior . . . . . . . . . . . . . . . . . . . . . . 7 5. Flooding Behavior . . . . . . . . . . . . . . . . . . . . . . 7
5.1. Nodes Support Flooding Reduction . . . . . . . . . . . . . 7 5.1. Nodes Support Flooding Reduction . . . . . . . . . . . . . 7
5.1.1. Receiving an ISIS LSP . . . . . . . . . . . . . . . . 7 5.1.1. Receiving an ISIS LSP . . . . . . . . . . . . . . . . 7
5.1.2. Originating an ISIS LSP . . . . . . . . . . . . . . . 8 5.1.2. Originating an ISIS LSP . . . . . . . . . . . . . . . 8
5.1.3. An Exception Case . . . . . . . . . . . . . . . . . . 8 5.1.3. An Exception Case . . . . . . . . . . . . . . . . . . 8
5.1.4. One More Note . . . . . . . . . . . . . . . . . . . . 9 5.1.4. One More Note . . . . . . . . . . . . . . . . . . . . 9
5.2. Nodes Not Support Flooding Reduction . . . . . . . . . . . 9 5.2. Nodes Not Support Flooding Reduction . . . . . . . . . . . 9
6. Security Considerations . . . . . . . . . . . . . . . . . . . 9 6. Security Considerations . . . . . . . . . . . . . . . . . . . 9
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
9.1. Normative References . . . . . . . . . . . . . . . . . . . 9 9.1. Normative References . . . . . . . . . . . . . . . . . . . 10
9.2. Informative References . . . . . . . . . . . . . . . . . . 10 9.2. Informative References . . . . . . . . . . . . . . . . . . 10
Appendix A. Algorithms to Build Flooding Topology . . . . . . . . 10 Appendix A. Algorithms to Build Flooding Topology . . . . . . . . 10
A.1. Algorithms to Build Tree without Considering Flag F . . . 10 A.1. Algorithms to Build Tree without Considering Flag F . . . 10
A.2. Algorithms to Build Tree Considering Flag F . . . . . . . 11 A.2. Algorithms to Build Tree Considering Flag F . . . . . . . 12
A.3. Connecting Leaves . . . . . . . . . . . . . . . . . . . . 14 A.3. Connecting Leaves . . . . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15
1. Introduction 1. Introduction
For some networks such as dense Data Center (DC) networks, the For some networks such as dense Data Center (DC) networks, the
existing ISIS Link State PDU (LSP) flooding mechanism is not existing ISIS Link State PDU (LSP) flooding mechanism is not
efficient and may have some issues. The extra LSP flooding consumes efficient and may have some issues. The extra LSP flooding consumes
network bandwidth. Processing the extra LSP flooding, including network bandwidth. Processing the extra LSP flooding, including
receiving, buffering and decoding the extra LSPs, wastes memory space receiving, buffering and decoding the extra LSPs, wastes memory space
and processor time. This may cause scalability issues and affect the and processor time. This may cause scalability issues and affect the
network convergence negatively. network convergence negatively.
skipping to change at page 8, line 42 skipping to change at page 8, line 42
2. Otherwise, the LSP is transmitted to all ISIS interfaces. 2. Otherwise, the LSP is transmitted to all ISIS interfaces.
Choosing this action instead of limiting to links on flooding Choosing this action instead of limiting to links on flooding
topology would speed up the synchronization around the topology would speed up the synchronization around the
advertising node's neighbors, which could then disseminate the advertising node's neighbors, which could then disseminate the
new LSP quickly. new LSP quickly.
5.1.3. An Exception Case 5.1.3. An Exception Case
In Section 5.1.1 and Section 5.1.2, there are times when an ISIS node In Section 5.1.1 and Section 5.1.2, there are times when an ISIS node
sending out a LSP to an interface on the flooding topology detects an sending out a LSP to an interface on the flooding topology detects a
interface or node failure. Note the flooding topology was pre- critical interface or node failure. A critical interface is an
computed/pre-constructed; but if at the time the interface or the interface on the flooding topology and is the only connection among
neighboring node goes down before a re-newed flooding topology can be some nodes on the flooding topology. When this interface goes down,
computed/constructed, the node MUST send out the LSP to all the flooding topology will be split. Note the flooding topology was
pre-computed/pre-constructed; but if at the time a critical interface
or a node goes down before a re-newed flooding topology can be
computed/constructed, the ISIS node MUST send out the LSP to all
interfaces (except where it is received from) as a traditional ISIS interfaces (except where it is received from) as a traditional ISIS
node would do. This handling is also taking place if there are more node would do. This handling is also taking place if there are more
than one egress interfaces on the existing flooding topology, i.e., than one interfaces or nodes on the existing flooding topology fail,
if at least one egress interface or neighboring node fails, the ISIS i.e., if more than one interfaces or nodes on the flooding topology
node does traditional flooding before the flooding topology is re- fail, the ISIS node does traditional flooding before the flooding
built. topology is re-built.
5.1.4. One More Note 5.1.4. One More Note
The destination address that is used when an ISIS node sends out a The destination address that is used when an ISIS node sends out a
LSP on an interface on its flooding topology follows the LSP on an interface on its flooding topology follows the
specification in ISIS ([RFC1195]). This means on a local LAN, all specification in ISIS ([RFC1195]). This means on a local LAN, all
other ISIS nodes will receive the LSP. other ISIS nodes will receive the LSP.
5.2. Nodes Not Support Flooding Reduction 5.2. Nodes Not Support Flooding Reduction
skipping to change at page 9, line 36 skipping to change at page 9, line 39
6. Security Considerations 6. Security Considerations
This document does not introduce any security issue. This document does not introduce any security issue.
7. IANA Considerations 7. IANA Considerations
This document has no request to IANA. This document has no request to IANA.
8. Acknowledgements 8. Acknowledgements
TBD. The authors would like to thank Acee Lindem, Zhibo Hu, Robin Li,
Stephane Litkowski and Alvaro Retana for their valuable suggestions
and comments on this draft.
9. References 9. References
9.1. Normative References 9.1. Normative References
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and [RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, DOI 10.17487/RFC1195, dual environments", RFC 1195, DOI 10.17487/RFC1195,
December 1990, <https://www.rfc-editor.org/info/rfc1195>. December 1990, <https://www.rfc-editor.org/info/rfc1195>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/ Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/
RFC2119, March 1997, RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
9.2. Informative References 9.2. Informative References
[I-D.li-dynamic-flooding] [I-D.li-dynamic-flooding]
Li, T., "An Architecture for Dynamic Flooding on Dense Li, T., "Dynamic Flooding on Dense Graphs",
Graphs", draft-li-dynamic-flooding-02 (work in progress), draft-li-dynamic-flooding-04 (work in progress),
March 2018. March 2018.
[I-D.shen-isis-spine-leaf-ext] [I-D.shen-isis-spine-leaf-ext]
Shen, N., Ginsberg, L., and S. Thyamagundalu, "IS-IS Shen, N., Ginsberg, L., and S. Thyamagundalu, "IS-IS
Routing for Spine-Leaf Topology", Routing for Spine-Leaf Topology",
draft-shen-isis-spine-leaf-ext-05 (work in progress), draft-shen-isis-spine-leaf-ext-05 (work in progress),
January 2018. January 2018.
Appendix A. Algorithms to Build Flooding Topology Appendix A. Algorithms to Build Flooding Topology
 End of changes. 12 change blocks. 
21 lines changed or deleted 25 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/