| < draft-ietf-spring-resiliency-use-cases-02.txt | draft-ietf-spring-resiliency-use-cases-03.txt > | |||
|---|---|---|---|---|
| Network Working Group Pierre Francois | Network Working Group Pierre Francois | |||
| Internet-Draft Clarence Filsfils | Internet-Draft Clarence Filsfils | |||
| Intended status: Informational Cisco Systems, Inc. | Intended status: Informational Cisco Systems, Inc. | |||
| Expires: June 6, 2016 Bruno Decraene | Expires: October 8, 2016 Bruno Decraene | |||
| Orange | Orange | |||
| Rob Shakir | Rob Shakir | |||
| Jive Communications, Inc. | Jive Communications, Inc. | |||
| December 4, 2015 | April 6, 2016 | |||
| Use-cases for Resiliency in SPRING | Use-cases for Resiliency in SPRING | |||
| draft-ietf-spring-resiliency-use-cases-02 | draft-ietf-spring-resiliency-use-cases-03 | |||
| Abstract | Abstract | |||
| This document describes the use cases for resiliency in SPRING | This document describes the use cases for resiliency in SPRING | |||
| networks. | networks. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 35 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on June 6, 2016. | This Internet-Draft will expire on October 8, 2016. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 2, line 16 ¶ | skipping to change at page 2, line 16 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Path protection . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Path protection . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Management free local protection . . . . . . . . . . . . . . . 4 | 3. Management free local protection . . . . . . . . . . . . . . . 4 | |||
| 3.1. Management free bypass protection . . . . . . . . . . . . . 5 | 3.1. Management free bypass protection . . . . . . . . . . . . . 5 | |||
| 3.2. Management-free shortest path based protection . . . . . . 5 | 3.2. Management-free shortest path based protection . . . . . . 5 | |||
| 4. Managed local protection . . . . . . . . . . . . . . . . . . . 6 | 4. Managed local protection . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.1. Managed bypass protection . . . . . . . . . . . . . . . . . 6 | 4.1. Managed bypass protection . . . . . . . . . . . . . . . . . 6 | |||
| 4.2. Managed shortest path protection . . . . . . . . . . . . . 6 | 4.2. Managed shortest path protection . . . . . . . . . . . . . 6 | |||
| 5. Co-existence . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 5. Loop avoidance . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 6. Co-existence . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 7 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8 | ||||
| 1. Introduction | 1. Introduction | |||
| SPRING aims at providing a network architecture supporting services | SPRING aims at providing a network architecture supporting services | |||
| with tight SLA guarantees [1]. This document reviews various use | with tight SLA guarantees [1]. This document reviews various use | |||
| cases for the protection of services in a SPRING network. Note that | cases for the protection of services in a SPRING network. Note that | |||
| these use cases are in particular applicable to existing LDP based | these use cases are in particular applicable to existing LDP based | |||
| and pure IP networks. | and pure IP networks. | |||
| Three key alternatives are described: path protection, local | Three key alternatives are described: path protection, local | |||
| skipping to change at page 3, line 29 ¶ | skipping to change at page 3, line 29 ¶ | |||
| The rest of the document focuses on approaches where protection is | The rest of the document focuses on approaches where protection is | |||
| performed by the node adjacent to the failed component, commonly | performed by the node adjacent to the failed component, commonly | |||
| referred to as local protection techniques or Fast Reroute | referred to as local protection techniques or Fast Reroute | |||
| techniques. | techniques. | |||
| We discuss two different approaches to provide unmanaged local | We discuss two different approaches to provide unmanaged local | |||
| protection, namely link/node bypass protection and shortest path | protection, namely link/node bypass protection and shortest path | |||
| based protection, in Section 3. | based protection, in Section 3. | |||
| In Section 5, we discuss the opportunity for the SPRING architecture | ||||
| to provide loop-avoidance mechanisms, such that transient forwarding | ||||
| state inconsistencies during routing convergence does not lead to | ||||
| traffic loss. | ||||
| A case is then made to allow the operator to manage the local | A case is then made to allow the operator to manage the local | |||
| protection behavior in order to accommodate specific policies, in | protection behavior in order to accommodate specific policies, in | |||
| Section 4. | Section 4. | |||
| The purpose of this document is to illustrate the different | The purpose of this document is to illustrate the different | |||
| approaches and explain how an operator could combine them in the same | approaches and explain how an operator could combine them in the same | |||
| network (see Section 5). Solutions are not defined in this document. | network (see Section 6). Solutions are not defined in this document. | |||
| B------C------D------E | B------C------D------E | |||
| /| | \ / | \ / |\ | /| | \ / | \ / |\ | |||
| / | | \/ | \/ | \ | / | | \/ | \/ | \ | |||
| A | | /\ | /\ | Z | A | | /\ | /\ | Z | |||
| \ | | / \ | / \ | / | \ | | / \ | / \ | / | |||
| \| |/ \|/ \|/ | \| |/ \|/ \|/ | |||
| F------G------H------I | F------G------H------I | |||
| Figure 1: Reference topology | Figure 1: Reference topology | |||
| skipping to change at page 7, line 15 ¶ | skipping to change at page 7, line 15 ¶ | |||
| B * * *C------D------E | B * * *C------D------E | |||
| *| * \ / | \ * |* | *| * \ / | \ * |* | |||
| * | * \/ | \* | * | * | * \/ | \* | * | |||
| A | * /\ | *\ | Z | A | * /\ | *\ | Z | |||
| \ | * / \ | * \ | * | \ | * / \ | * \ | * | |||
| \| */ \|* \|* | \| */ \|* \|* | |||
| F------G * * *H * * *I | F------G * * *H * * *I | |||
| Figure 5: Managed shortest path protection | Figure 5: Managed shortest path protection | |||
| 5. Co-existence | 5. Loop avoidance | |||
| Transient inconsistencies among the Forwarding Information Bases of | ||||
| routers converging after a change in the state of links of the | ||||
| network can occur. Such inconsistencies (some nodes forwarding | ||||
| traffic according to the past network topology while some other nodes | ||||
| are forwarding packets according to the new topology) may lead to | ||||
| forwarding loops. | ||||
| The SPRING architecture SHOULD provide solutions to prevent the | ||||
| occurrence of micro-loops during convergence following a change in | ||||
| the network state. A SPRING enabled router could take advantage of | ||||
| the increased packet steering capabilities offered by SPRING in order | ||||
| to steer packets in a way that packets do not enter such loops. | ||||
| 6. Co-existence | ||||
| The operator may want to support several very-different services on | The operator may want to support several very-different services on | |||
| the same packet-switching infrastructure. As a result, the SPRING | the same packet-switching infrastructure. As a result, the SPRING | |||
| architecture SHOULD allow for the co-existence of the different use | architecture SHOULD allow for the co-existence of the different use | |||
| cases listed in this document, in the same network. | cases listed in this document, in the same network. | |||
| Let us illustrate this with the following example. | Let us illustrate this with the following example. | |||
| o Flow F1 is supported over path {C, C-D, E} | o Flow F1 is supported over path {C, C-D, E} | |||
| o Flow F2 is supported over path {C, C-D, I) | o Flow F2 is supported over path {C, C-D, I) | |||
| o Flow F3 is supported over path {C, C-D, Z) | o Flow F3 is supported over path {C, C-D, Z) | |||
| o Flow F4 is supported over path {C, C-D, Z} | o Flow F4 is supported over path {C, C-D, Z} | |||
| o It should be possible for the operator to configure the network to | o It should be possible for the operator to configure the network to | |||
| achieve path protection for F1, management free shortest path | achieve path protection for F1, management free shortest path | |||
| local protection for F2, managed protection over path {C-G, G-H, | local protection for F2, managed protection over path {C-G, G-H, | |||
| Z} for F3, and management free bypass protection for F4. | Z} for F3, and management free bypass protection for F4. | |||
| 6. References | 7. References | |||
| [1] Filsfils, C., Previdi, S., Decraene, B., Litkowski, S., and r. | [1] Filsfils, C., Previdi, S., Decraene, B., Litkowski, S., and R. | |||
| rjs@rob.sh, "Segment Routing Architecture", | Shakir, "Segment Routing Architecture", | |||
| draft-ietf-spring-segment-routing-06 (work in progress), | draft-ietf-spring-segment-routing-07 (work in progress), | |||
| October 2015. | December 2015. | |||
| Authors' Addresses | Authors' Addresses | |||
| Pierre Francois | Pierre Francois | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| Vimercate | Vimercate | |||
| IT | IT | |||
| Email: pifranco@cisco.com | Email: pifranco@cisco.com | |||
| Clarence Filsfils | Clarence Filsfils | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| Brussels | Brussels | |||
| BE | BE | |||
| Email: cfilsfil@cisco.com | Email: cfilsfil@cisco.com | |||
| Bruno Decraene | Bruno Decraene | |||
| Orange | Orange | |||
| Issy-les-Moulineaux | Issy-les-Moulineaux | |||
| End of changes. 12 change blocks. | ||||
| 15 lines changed or deleted | 37 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||