| < draft-ietf-rtgwg-rlfa-node-protection-01.txt | draft-ietf-rtgwg-rlfa-node-protection-02.txt > | |||
|---|---|---|---|---|
| Routing Area Working Group P. Sarkar, Ed. | Routing Area Working Group P. Sarkar, Ed. | |||
| Internet-Draft H. Gredler | Internet-Draft H. Gredler | |||
| Intended status: Standards Track S. Hegde | Intended status: Standards Track S. Hegde | |||
| Expires: June 18, 2015 C. Bowers | Expires: December 17, 2015 C. Bowers | |||
| Juniper Networks, Inc. | Juniper Networks, Inc. | |||
| S. Litkowski | S. Litkowski | |||
| Orange | Orange | |||
| H. Raghuveer | H. Raghuveer | |||
| June 15, 2015 | ||||
| December 15, 2014 | ||||
| Remote-LFA Node Protection and Manageability | Remote-LFA Node Protection and Manageability | |||
| draft-ietf-rtgwg-rlfa-node-protection-01 | draft-ietf-rtgwg-rlfa-node-protection-02 | |||
| Abstract | Abstract | |||
| The loop-free alternates computed following the current Remote-LFA | The loop-free alternates computed following the current Remote-LFA | |||
| [I-D.ietf-rtgwg-remote-lfa] specification gaurantees only link- | [I-D.ietf-rtgwg-remote-lfa] specification gaurantees only link- | |||
| protection. The resulting Remote-LFA nexthops (also called PQ- | protection. The resulting Remote-LFA nexthops (also called PQ- | |||
| nodes), may not gaurantee node-protection for all destinations being | nodes), may not gaurantee node-protection for all destinations being | |||
| protected by it. | protected by it. | |||
| This document describes procedures for determining if a given PQ-node | This document describes procedures for determining if a given PQ-node | |||
| skipping to change at page 2, line 10 ¶ | skipping to change at page 2, line 7 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on June 18, 2015. | This Internet-Draft will expire on December 17, 2015. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2014 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Node Protection with Remote-LFA . . . . . . . . . . . . . . . 3 | 2. Node Protection with Remote-LFA . . . . . . . . . . . . . . . 3 | |||
| 2.1. The Problem . . . . . . . . . . . . . . . . . . . . . . . 4 | 2.1. The Problem . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.2. Few Additional Definitions . . . . . . . . . . . . . . . 5 | 2.2. Few Additional Definitions . . . . . . . . . . . . . . . 5 | |||
| 2.2.1. Link-Protecting Extended P-Space . . . . . . . . . . 6 | 2.2.1. Link-Protecting Extended P-Space . . . . . . . . . . 5 | |||
| 2.2.2. Node-Protecting Extended P-Space . . . . . . . . . . 6 | 2.2.2. Node-Protecting Extended P-Space . . . . . . . . . . 6 | |||
| 2.2.3. Q-Space . . . . . . . . . . . . . . . . . . . . . . . 7 | 2.2.3. Q-Space . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.2.4. Link-Protecting PQ Space . . . . . . . . . . . . . . 8 | 2.2.4. Link-Protecting PQ Space . . . . . . . . . . . . . . 8 | |||
| 2.2.5. Candidate Node-Protecting PQ Space . . . . . . . . . 8 | 2.2.5. Candidate Node-Protecting PQ Space . . . . . . . . . 8 | |||
| 2.3. Computing Node-protecting R-LFA Path . . . . . . . . . . 8 | 2.3. Computing Node-protecting R-LFA Path . . . . . . . . . . 8 | |||
| 2.3.1. Computing Candidate Node-protecting PQ-Nodes for | 2.3.1. Computing Candidate Node-protecting PQ-Nodes for | |||
| Primary nexthops . . . . . . . . . . . . . . . . . . 8 | Primary nexthops . . . . . . . . . . . . . . . . . . 8 | |||
| 2.3.2. Computing node-protecting paths from PQ-nodes to | 2.3.2. Computing node-protecting paths from PQ-nodes to | |||
| destinations . . . . . . . . . . . . . . . . . . . . 10 | destinations . . . . . . . . . . . . . . . . . . . . 10 | |||
| 2.3.3. Limiting extra computational overhead . . . . . . . . 12 | 2.3.3. Limiting extra computational overhead . . . . . . . . 12 | |||
| End of changes. 6 change blocks. | ||||
| 7 lines changed or deleted | 6 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||