< draft-litkowski-rtgwg-lfa-rsvpte-cooperation-00.txt   draft-litkowski-rtgwg-lfa-rsvpte-cooperation-01.txt >
Routing Area Working Group S. Litkowski Routing Area Working Group S. Litkowski
Internet-Draft B. Decraene Internet-Draft B. Decraene
Intended status: Standards Track Orange Intended status: Standards Track Orange
Expires: May 17, 2013 C. Fils Fils Expires: August 22, 2013 C. FilsFils
K. Raza K. Raza
Cisco Systems Cisco Systems
November 13, 2012 February 18, 2013
Interactions between LFA and RSVP-TE Interactions between LFA and RSVP-TE
draft-litkowski-rtgwg-lfa-rsvpte-cooperation-00 draft-litkowski-rtgwg-lfa-rsvpte-cooperation-01
Abstract Abstract
RSVP-TE FRR is a well known and deployed technology for fast reroute, This document defines the behavior of a node supporting Loopfree
and there are some use cases where LFA and RSVP-TE may interact. Alternates (LFA) when the node has established RSVP TE tunnels. It
This document clarifies the behavior of LFA when RSVP-TE tunnels are first describes the decisions to be made by the LFA mechanism with
used simultaneously. respect to the use of TE tunnels as LFA candidates. Second, it
discusses the use of RSVP TE tunnels as a way to complement the LFA
coverage, illustrating how these technologies can benefit from each
other.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 17, 2013. This Internet-Draft will expire on August 22, 2013.
Copyright Notice Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. LFA FRR and MPLS TE FRR interaction . . . . . . . . . . . . . 3 2. LFA FRR and MPLS-TE interactions . . . . . . . . . . . . . . . 3
2.1. LFA on TE head end router . . . . . . . . . . . . . . . . 3 2.1. Use case : using MPLS LSP as LFA candidates . . . . . . . 3
2.1.1. LFA and TE IGP shortcut . . . . . . . . . . . . . . . 3 2.2. Specifications of interactions between LFA and TE LSP . . 4
2.1.2. TE tunnel as an LFA candidate . . . . . . . . . . . . 4 2.2.1. Having both a physical interface and a TE tunnel
2.1.3. LFA candidate TE tunnel and TE IGP shortcut . . . . . 4 toward a LFA . . . . . . . . . . . . . . . . . . . . . 4
2.1.4. LFA and TE tunnel to a directly connected neighbor . . 4 2.2.2. TE ingress LSP as LFA candidate . . . . . . . . . . . 5
2.2. LFA on TE midpoint router . . . . . . . . . . . . . . . . 4 2.2.3. Independence between LFA and TE FRR . . . . . . . . . 5
3. Need for LFA and RSVP-TE interactions . . . . . . . . . . . . 4 3. Operational considerations . . . . . . . . . . . . . . . . . . 7
3.1. Network with some already deployed RSVP-TE tunnels . . . . 5 3.1. Relevance of joint LFA FRR and RSVP-TE FRR deployments . . 7
3.2. Network with no protection at all . . . . . . . . . . . . 5 3.2. Extending LFA coverage using RSVP-TE tunnels . . . . . . . 8
4. LFA FRR and MPLS TE FRR interaction scenarios . . . . . . . . 5 3.2.1. Creating multihop tunnel to extend topology . . . . . 8
4.1. LFA activated on RSVP-TE tunnel headend . . . . . . . . . 5 3.2.2. Selecting multihop tunnels to extend topology . . . . 9
4.2. LFA activated on RSVP-TE tunnel midpoint . . . . . . . . . 6 4. Security Considerations . . . . . . . . . . . . . . . . . . . 10
5. Extending LFA coverage using RSVP-TE tunnels . . . . . . . . . 7 5. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1. Reference topology . . . . . . . . . . . . . . . . . . . . 7 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
5.2. Creating multihop tunnel to extend topology . . . . . . . 8 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11
6. Security Considerations . . . . . . . . . . . . . . . . . . . 10 7.1. Normative References . . . . . . . . . . . . . . . . . . . 11
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10 7.2. Informative References . . . . . . . . . . . . . . . . . . 11
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11
9.1. Normative References . . . . . . . . . . . . . . . . . . . 11
9.2. Informative References . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11
1. Introduction 1. Introduction
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", When a failure occurs in an IP network, the subsequent converge
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this process often leads to traffic disruption. Some mechanisms are
document are to be interpreted as described in [RFC2119]. available to limit traffic disruptions by pre-computing alternate
paths and locally reroute over these as soon as the failure is
This document is being discussed on the rtgwg@ietf.org mailing list. detected. Such techniques are commonly known as "protection
mechanisms". Currently, the protection mechanisms widely used in
Service Provider networks are RSVP-TE Fast Reroute [RFC4090] and Loop
Free Alternates [RFC5286]. RSVP-TE FRR permits full network coverage
but with a quite high complexity in terms of operation, as well as
potential scaling issues. On the other hand, LFA offer a very easy,
manageable, and scalable mechanism, but does not provide full
coverage.
When a failure occurs inside an IP network, network has to converge. This document discusses how LFA and RSVP-TE should interact. It
This convergence leads to traffic disruption. Some mechanisms are first describes how an LFA implementation should deal with existing
already available to limit traffic disruption by computing alternate RSVP TE tunnels established by the LFA node, as well as its behavior
path and switching locally to alternate path as soon as failure is with respect to established IGP Shortcut tunnels [RFC3906]. Second,
detected. All this can be termed as a protection mechanism. the document suggets the use of RSVP-TE tunnels to extend LFA
Currently, the widely used protection mechanisms for traffic are (i) coverage, and discusses the management and operational aspects of
RSVP-TE Fast Reroute [RFC4090] and Loop Free Alternates [RFC5286]. such a practice.
Both have pros and cons. For example, RSVP-TE FRR permits full
network coverage but with a quite high complexity in terms of
operation as well as potential scaling issues. Whereas, LFA is a
very easy, manageable and quite scalable mechanism but it does not
provides full coverage.
This document presents some scenarios where LFA and RSVP-TE may 2. LFA FRR and MPLS-TE interactions
interact. The document also proposes the usage of RSVP-TE tunnels to
extend LFA coverage and clarifies interactions between the two
protection mechanisms.
2. LFA FRR and MPLS TE FRR interaction This section discusses the various interactions among LFA FRR and
MPLS-TE FRR. It starts with a simple example emphasizing the
benefits of jointly using of LFA-FRR and MPLS-TE FRR, and then
summarizes the requirements for the interactions between LFAs and
MPLS-FRR.
This section provides the summarized normative requirements for the 2.1. Use case : using MPLS LSP as LFA candidates
interaction between LFA FRR and TE FRR. Following sections provide
illustration and reasoning why an operator may care for these
behavior.
2.1. LFA on TE head end router In some cases, typically in ring shapped parts of network topologies,
links cannot be protected by LFAs. In the following topology, from
the point of view of R5, LFAs are able to partiatlly protect (49% of
the destination routers) from the failure of R3, while the failure of
R4 is not covered at all.
2.1.1. LFA and TE IGP shortcut (30 routers) --- R1 ----(30)---- R2 --- (50 routers)
| |
(5) (30)
| |
R3 R4 --- (20 routers)
| |
(10) (30)
| |
------- R5 ------
If a node N has an IGP/LDP forwarding entry F1 with outgoing Figure 1
interface i1 and an IGP/LDP forwarding entry F2 with outgoing
interface onto a TE tunnel T2 (due to IGP shortcut [RFC3906]) and
tunnel T2 has outgoing interface i2, then an implementation MUST
support enabling LFA FRR for F1 and using TE FRR for F2 as long as i1
!= i2.
If i1 == i2, an implementation SHOULD allow for using LFA FRR backup Many networks deploy MPLS tunnels for traffic engineering and
for F1 and TE FRR backup for F2. resiliency reasons. To extend its benefit, an LFA implementation
could take advantage of such existing MPLS tunnels. In the exemple
above, if R5 has established TE tunnels bypassing R4 and R3, these
could be considerd as LFA candidates respectively protecting links
from R5 to R4 and R3.
2.1.2. TE tunnel as an LFA candidate In the following section, we provide a detailed summary of the
behavior to be applied by an LFA implementation which would consider
the existence of MPLS TE tunnels to improve its applicability. The
explicit configuration of such tunnels with the intent of improving
LFA applicability is discussed in later sections.
TE tunnel LFA candidate mechanism is the ability to use a TE tunnel 2.2. Specifications of interactions between LFA and TE LSP
as a virtual neighbor in LFA computation.
If a node N has an IGP/LDP forwarding entry F1 with outgoing Here we summarize the normative requirements for the interaction
interface i1 and N originates a TE tunnel T1 terminating at node Y, between LFA FRR and MPLS TE tunnels.
then an implementation SHOULD support a local policy which instructs
node N to consider Y as a virtual neighbor and hence include Y as
part of the LFA FRR alternate computation. In such case, an
implementation MUST not use Y as an LFA for F1 if T1's outgoing
interface is i1.
This would permit to extend LFA coverage as described in 2.2.1. Having both a physical interface and a TE tunnel toward a LFA
[I-D.ietf-rtgwg-remote-lfa]
2.1.3. LFA candidate TE tunnel and TE IGP shortcut If a node S has both a physical interface and a TE tunnel to reach a
LFA, it SHOULD use the physical interface unless :
The mechanisms for using TE tunnel as an LFA candidate, and RFC3906 1. The tunnel has been explicitly configured as an LFA candidate.
mechanisms MUST be de-correlated -- i.e an implementation MUST
support TE tunnel configuration with RFC3906 only, as LFA candidate
only, or both at the same time.
2.1.4. LFA and TE tunnel to a directly connected neighbor 2. The tunnel does not pass through the link subject to LFA
protection.
If a node N has an IGP/LDP forwarding entry F1 with outgoing In other words, if a node S has an IGP/LDP forwarding entry F1 with
interface i1, and N originates a TE tunnel T2 terminating on direct outgoing interface i1, and S originates a TE tunnel T2 terminating on
neighbor N2 (for example : if a TE tunnel is provisionned for link direct neighbor N2 (for example : if a TE tunnel is provisionned for
protection), T2 has an outgoing interface i2 and N2 is best LFA for link protection), T2 has an outgoing interface i2 and N2 is best LFA
F1, then an implementation MUST NOT use T2 when programming LFA for F1, then an implementation MUST NOT use T2 when programming LFA
repair for F1 unless T2 is configured as an LFA candidate. repair for F1 unless T2 is configured as an LFA candidate.
2.2. LFA on TE midpoint router 2.2.2. TE ingress LSP as LFA candidate
If a node N has an IGP/LDP forwarding entry F1 with outgoing A TE LSP can be used as a virtual interface to reach a LFA if
interface i1 and a MPLS TE midpoint forwarding entry F2 with outgoing
interface i2, then an implementation MUST support using LFA FRR for
F1 and TE FRR for F2 as long as i1 != i2.
If i1 == i2, an implementation SHOULD allow for using LFA FRR backup 1. The TE tunnel has been configured to allow its use as an LFA
for F1 and TE FRR backup for F2. candidate.
3. Need for LFA and RSVP-TE interactions 2. The TE tunnel does not pass through the primary outgoing
interface of D.
This section describes some of the deployment scenarios where LFA and This would permit to extend LFA coverage as described in
RSVP-TE may interact. [I-D.ietf-rtgwg-remote-lfa], in a controlled fashioned, as the
tunnels used by the fast reroute mechanism are defined by
configuration.
3.1. Network with some already deployed RSVP-TE tunnels In other words, if a node S has an IGP/LDP forwarding entry F1 with
outgoing interface i1 and S originates a TE tunnel T1 terminating at
node Y, then an implementation SHOULD support a local policy which
instructs node S to consider Y as a virtual neighbor and hence
include Y as part of the LFA FRR alternate computation. In such
case, an implementation MUST not use Y as an LFA for F1 if T1's
outgoing interface is i1.
There are many networks where RSVP-TE is already deployed. The 2.2.3. Independence between LFA and TE FRR
deployment of RSVP-TE is typically for two main reasons :
o Traffic engineering : a provider wants to route some flows on some 2.2.3.1. Tunnel head-end case
specific paths using constraints;
o Traffic protection using Fast-reroute ability Similar requirements can be expressed for TE IGP shortcut tunnels.
LFA is a feature that may bring benefits on RSVP-TE enabled networks, -----C1 ---------
with no/minimal operational cost (compared to RSVP-TE FRR global roll / | \
out). These benefits include: / | \
PE1 ---- C2 --- C3 ---- PE2
| /
PE3
o Should increase protection on network where FRR is not available Figure 2
everywhere. Although it may not provide full coverage, it will
increase the protection significantly.
o May provide better protection in specific cases than RSVP-TE FRR PE to Cx metrics are 50, Cx to Cx are 1
3.2. Network with no protection at all A service provider is often providing traffic-engineered path for
specific customer traffic (L3VPN, PW ...) to ensure path diversity or
traffic constraints. In the diagram above, we consider a TE tunnel
T2 built on a non shortest path as follows : PE1->C2->C3->PE2 and IGP
shortcut is activated on PE1 to make traffic to PE2 using T2. Based
on operational feedback, some implementations prevent LFA computation
to run for an interface where a TE tunnel exists. In our example, if
LFA is activated on N, we would not be able to have a protection for
PE3 destination as a tunnel exists on the interface. This current
observed behavior leads to a very limited coverage for LFA. In the
other hand, it is important to keep protection mechanisms independant
as much as possible to keep implementation simple. We propose the
following approach :
For IP networks that do not have any traffic protection mechanism, o If an IP prefix is reachable through a TE tunnel, LFA must not
LFA is a very good first step to provide traffic protection even if compute a protection for it.
its coverage is not 100%.
Providers may want to increase protection coverage if LFA benefit is o If an IP prefix is reachable through a native IP path, LFA MUST
not sufficient for some destinations. The following sections compute a protection for it disregarding the presence of a tunnel
describe usage of basic RSVP-TE tunnels to extend protection or not on the primary interface.
coverage.
4. LFA FRR and MPLS TE FRR interaction scenarios In other words, if a node S has an IGP/LDP forwarding entry F1 with
outgoing interface i1 and an IGP/LDP forwarding entry F2 with
outgoing interface onto a TE tunnel T2 (due to IGP shortcut
[RFC3906]) and tunnel T2 has outgoing interface i2, then an
implementation MUST support enabling LFA FRR for F1 and using TE FRR
for F2 as long as i1 != i2.
4.1. LFA activated on RSVP-TE tunnel headend If i1 == i2, an implementation SHOULD allow for using LFA FRR backup
for F1 and TE FRR backup for F2.
R4 --(10)- R5 -(1)- R6 -(10)- R7 The mechanisms for using TE tunnel as an LFA candidate, and RFC3906
| | mechanisms MUST be de-correlated -- i.e an implementation MUST
(10) ---(30)----R14--(10)----- (10) support TE tunnel configuration with RFC3906 only, as LFA candidate
| / \ | only, or both at the same time.
R1 -R2 -(100)-- R3 --(22)--- R8 ---(10)------- R9 --(100)-- R10 ---- R11
/ / | |
(10) (10) (40) |
| / | |
R16-(200)-R15 R12 --(1)-- R13--------(5)------
Figure 1 2.2.3.2. Tunnel midpoint case
In figure 1, shortest path from R1 to R11 is : R1-R2-R3-R8-R9-R10- -----C1 ---------
R11. / | \
/ | \
PE1 ---- C2 --- C3 ---- PE2
| /
PE3
An RSVP-TE tunnel (tunnel1) is configured on R3 towards R10 using Figure 3
constrained path R4-R5-R6-R7-R9-R10, and another tunnel (tunnel2) is
configured towards R8 using IGP path (with no constraints). IGP
shortcut ([RFC3906]) is activated on R3, leading to the following
forwarding informations (not exhaustive) on R3 :
o R8 and R9 via tunnel2 PE to Cx metrics are 50, except PE3-C3 (60), Cx to Cx are 1In the
diagram above, we consider a TE tunnel T2 built on a non shortest
path as follows : PE1->C2->C3->PE2 and IGP shortcut is activated on
PE1 to make traffic to PE2 using T2. C2 is a TE tunnel midpoint
router. In terms of forwarding, C2 has a MPLS TE forwarding entry
for T2, as well as an IP forwarding entry to PE2. As explained in
previous sections, it would be too restrictive and would limit LFA
benefit on C2 if C2 would not be able to compute an LFA for the IP
forwarding entry to PE2 due to the presence of a transit tunnel.
o R10 and R11 via tunnel1 We propose the following approach for a midpoint router of a TE
tunnel :
o R4 and R5 via R4 o MPLS TE forwarding entries MUST not be protected by LFA (if an
operator wants protection, TE FRR could be enabled).
o R14 via R14 o IP forwarding entries MUST be protected by LFA disregarding the
presence of a TE tunnel transiting through the primary interface
of the destination.
Per destination LFA is also activated on R3 In our example :
Based on the normative principles already described, here are the FRR o MPLS TE forwarding entry for T2 (ending on PE2) would be protected
backup paths : by TE-FRR (if enabled).
o R8, R9, R10 and R11 are forwarded via an RSVP-TE tunnel, so there o IP forwarding entry for PE2 would be protected by LFA.
will be no LFA programmed, TE FRR may be used for protection, if
available.
o R14 has primary nexthop R14, LFA computed to protect R14 is R8, In case of failure of C2-C3 :
but R8 is primarily reachable through tunnel2. As defined in
normative principles, backup forwarding entry for R14 will be
programmed to direct neighbor (R8) rather than using tunnel2.
o R4 has primary nexthop R4, alternate is R12. (no ambiguity in this o traffic from PE1 to PE2 (encapsulated in T2), would be protected
case as no tunnel is involved) by TE FRR.
o R16,R15,R2,R1 are not covered because though alternate paths exist o traffic from PE3 to PE2 (native IP), would be protected by LFA.
but they are not loop free. We could envisage to create a new TE
tunnel to provide more path diversity using loop free tunnel
endpoints. For example, we could create a tunnel from R3 to R16
(explicity routed through R15), that is configured only as an LFA
candidate, to provide loop free alternate to R1 and R2.
4.2. LFA activated on RSVP-TE tunnel midpoint In other words, if a node S has an IGP/LDP forwarding entry F1 with
R4 --(10)-- R5 -(1)- R6 -(10)- R7 outgoing interface i1 and a MPLS TE midpoint forwarding entry F2 with
| | | outgoing interface i2, then an implementation MUST support using LFA
(10) (60) (10) FRR for F1 and TE FRR for F2 as long as i1 != i2.
| | |
R1 -R2 -(100)-- R3 --(22)--- R8 ---(10)------- R9 --(100)-- R10 ---- R11
| |
(40) |
| |
R12 --(1)-- R13--------(5)------
Figure 3 If i1 == i2, an implementation SHOULD allow for using LFA FRR backup
for F1 and TE FRR backup for F2.
In figure 3, RSVP-TE tunnel is configured from R3 to R9 using 3. Operational considerations
constrained path R4-R5-R6-R7. R4 to R7 routers are midpoints of
tunnels, and they are receiving tunneled packets as well as native IP
packets on their interface. We consider LFA implemented on R5.
As explained in normative principles, IP prefixes will be programmed In this section, we first discuss the benefit of considering a joint
with LFA alternate as backup entry (if available) and MPLS ILM deployment of LFA and MPLS tunnels to achieve resiliency. We then
(Incoming label map) of transit TE tunnel will not use LFA alternate discuss one approach aiming at defining MPLS tunnels for the purpose
as backup NHLFE even if there is a LFA to reach tunnel tail-end (TE of complementing LFA coverage.
use his own protection).
In our figure 3, R5 receives native IP traffic from R4 to R10 and 3.1. Relevance of joint LFA FRR and RSVP-TE FRR deployments
tunneled traffic from R1 to R11 (tunneling done by R3). R5 computes
LFAs for all destinations. R8 is an alternate to reach R10, as well
as to reach R11 and R9. When link R5->R6 fails, traffic from R4 is
switched to alternate R8 (protection by LFA), but traffic from R1 to
R11 may be dropped (in case of tunnel without protection) or switched
to RSVP-TE protection path (in case tunnel has protection).
5. Extending LFA coverage using RSVP-TE tunnels This section describes the deployment scenarios where it can be
beneficial to jointly use LFAs and RSVP-TE FRR.
We already have seen in previous section that creating RSVP-TE There are many networks where RSVP-TE is already deployed. The
tunnels would increase LFA coverage. The choice of tunnel placement deployment of RSVP-TE is typically for two main reasons :
should depend on what type of protection (link or node) we want to
achieve, as well as on the set of destinations we want to protect.
5.1. Reference topology o Traffic engineering : a provider wants to route some flows on some
specific paths using constraints;
Some topologies like rings do not work well with LFA. We consider o Traffic protection using Fast-reroute ability
the following topology in our document for further illustration.
(30 routers) --- R1 ----(30)---- R2 --- (50 routers) LFA is a feature that may bring benefits on RSVP-TE enabled networks,
| | with no/minimal operational cost (compared to RSVP-TE FRR global roll
(5) (30) out). These benefits include:
| |
R3 R4 --- (20 routers)
| |
(10) (30)
| |
------- R5 ------
Figure 5 o Should increase protection on network where FRR is not available
everywhere. Although it may not provide full coverage, it will
increase the protection significantly.
In this topology, we consider LFA enabled on all routers and links. o May provide better protection in specific cases than RSVP-TE FRR
We will focus on R5 view of the network.
R5 is routing all traffic towards R3 as nominal nexthop, except For IP networks that do not have any traffic protection mechanism,
traffic towards R4 which is routed using R4 (direct link) as nexthop. LFA is a very good first step to provide traffic protection even if
R5 has LFAs only for R2 and destinations behind R2 (primary nexthop its coverage is not 100%. Providers may want to increase protection
R3, alternate R4). There are 104 destinations (routers) in the coverage if LFA benefit is not sufficient for some destinations, in
network in figure 5. R5-R3 link has 49% LFA coverage with 83 some parts of the network. The following sections discusses the use
destinations primarily routed on it. R3 node (from R5 point of view) of basic RSVP-TE tunnels to extend protection coverage.
has 49% LFA coverage with 83 destinations primarily routed through it
from R5. R5-R4 link has 0% coverage with 21 destinations primarily
routed on it. R4 node (from R5 point of view) has 0% coverage with
21 destinations primarily routed on it through it from R5.
Globally from R5 point of view, LFA is able to protect to partially 3.2. Extending LFA coverage using RSVP-TE tunnels
(49%) protect from failure of R3, while failure of R4 is not
protected at all.
5.2. Creating multihop tunnel to extend topology We already have seen in previous sections that RSVP-TE tunnels could
be established by an operator to complement LFA coverage. The method
of tunnel placement depends on what type of protection (link or node)
is required, as well as on the set of destinations or network parts
which requires better protection than what LFA can provide.
From R5 point of view, traffic routed through R3 is protected (node 3.2.1. Creating multihop tunnel to extend topology
protected) at about 49% with 83 destinations routed on it.
Destinations R1,R3 and routers behind R1 are not protected, while R2
and destinations behind it are protected.
To extend the coverage, the idea is to extend the topology using LFA To extend the coverage, the idea is to use a mechanism extending LFA
tunnel candidate mechanism. This mechanism is of a local by turning TE tunnels into LFA candidates. This mechanism is of a
significance only. local significance only.
The hardest task is then to choose the tunnel(s) endpoint such as to When explicitly establishing tunnels for that purpose, choices have
achieve the maximum coverage. Tunnel definition must satisfy : to be made for the endpoints of such tunnels, in order to maximize
coverage while preserving management simplicity. Requirements are
that:
o Endpoint must satisfy equations from [RFC5286], otherwise it will o Endpoints must satisfy equations from [RFC5286], otherwise it will
not be a LFA : so when releasing traffic from tunnel, the traffic not be a valide LFA candidate: so when releasing traffic from
will go to the destination without flowing through the protected tunnel, the traffic will go to the destination without flowing
link or node. Depending on which equations are satisfied, node or through the protected link or node. Depending on which equations
link protection will be provided by the tunnel hop. are satisfied, node or link protection will be provided by the
tunnel hop.
o Tunnel must not flow though the link or node to be protected, o Tunnel must not flow though the link or node to be protected,
explicit routing of tunnel is highly recommended to enforce this explicit routing of tunnel is recommended to enforce this
condition. condition.
The approach to choose tunnel endpoints might be different here when The approach to choose tunnel endpoints might be different here when
compared to [I-D.ietf-rtgwg-remote-lfa] as endpoint choice is a compared to [I-D.ietf-rtgwg-remote-lfa] as endpoint choice is a
manual one. Automatic behavior and scaling of manual one. Automatic behavior and scaling of
[I-D.ietf-rtgwg-remote-lfa] requires : [I-D.ietf-rtgwg-remote-lfa] requires:
o Non null intersection of Extended P-Space and Q-Space o Non null intersection of Extended P-Space and Q-Space
o Computation of PQ node only for the remote end of the link o Computation of PQ node only for the remote end of the link
Based on this, [I-D.ietf-rtgwg-remote-lfa] may : Based on this, [I-D.ietf-rtgwg-remote-lfa] may:
o Not find a tunnel endpoint; o Not find a tunnel endpoint;
o Not provide the more efficient protection : -- i.e. provides only o Not provide the more efficient protection : -- i.e. provides only
link protection, while there is node protection possible for a link protection, while there is node protection possible for a
specific destination specific destination
The proposed solution of manual explicitly routed tunnels is a good The proposed solution of manual explicitly routed tunnels is a good
complement for [I-D.ietf-rtgwg-remote-lfa] and provides more complement for [I-D.ietf-rtgwg-remote-lfa] and provides more
flexibility: flexibility:
o Always a possibility to find a tunnel endpoint for a specific o Always a possibility to find a tunnel endpoint for a specific
destination destination.
o Possibility to provide better protection level o Possibility to provide a better protection type (link vs. node).
From manageability aspect of our manual solution, computing a best Q 3.2.2. Selecting multihop tunnels to extend topology
node for each destination could lead to have one different Q node for
different destination. This is not optimal in terms of number of From a manageability point of view, computing a best Q node for each
tunnels, given that possibly one Q node may be able to serve multiple destination could lead to have one different Q node for each
non covered destinations. destination. This is not optimal in terms of number of tunnels,
given that possibly one Q node may be able to serve multiple non
covered destinations.
Rather than computing the best Q node per non covered destination, we Rather than computing the best Q node per non covered destination, we
would prefer to find best compromise Q nodes (best for multiple would prefer to find best compromise Q nodes (best for multiple
destinations). To find the best compromise between coverage increase destinations). To find the best compromise between coverage increase
and number of tunnels, we recommend to use a simulator that do the and number of tunnels, we recommend to use a simulator performing the
following computation per link : following computations per link:
Step 1 : Compute for each not covered destination (routed on the Step 1 : Compute for each not covered destination (routed on the
link) the list of endpoints that are satisfying equations link) the list of endpoints that are satisfying equations
from [RFC5286] (node or link protection equations depending from [RFC5286] (node or link protection equations depending
of required level of protection) : nodes in Q-Space of required level of protection) : nodes in Q-Space
Step 2 : Remove endpoint that you want to avoid to use as repair Step 2 : Remove endpoints that are not eligible for repair (Edge
(Edge nodes, low bandwidth meshed nodes, number of hops nodes, low bandwidth meshed nodes, number of hops ...) :
...) : multiple attributes could be specified to exclude multiple attributes could be specified to exclude some
some nodes from Q-Space : The example of attributes include nodes from Q-Space : The example of attributes include
router type, metric to node, bandwidth, packet loss, RTD router type, metric to node, bandwidth, packet loss, RTD
... ...
Step 3 : Within all the list of endpoints (one list per Step 3 : Within the list of endpoints (one list per destination),
destination), order the endpoints by number of destination order the endpoints by number of destination covered
covered
Step 4 : Choose the endpoint that has the highest number of Step 4 : Choose the endpoint that has the highest number of
destination covered : some other criteria could be used to destination covered : some other criteria could be used to
prefer an endpoint from another (same type of criteria that prefer an endpoint from another (same type of criteria that
excluded some nodes from Q-Space) excluded some nodes from Q-Space)
Step 5 : Remove destinations covered by this endpoint from non Step 5 : Remove destinations covered by this endpoint from non
covered list covered list
Step 6 : If non covered list is not empty, restart from Step 1 Step 6 : If non covered list is not empty, restart from Step 1
Multiple endpoint (and so tunnels) could be necessary to have 100% Multiple endpoint (and so tunnels) could be necessary to have 100%
coverage. But the idea is to find a tradeoff between number of coverage. But the idea is to find a tradeoff between number of
tunnels configured (complexity) and number of destination covered, tunnels configured (complexity) and number of destination covered,
combining with traffic information would also provide a better view. combining with traffic information would also provide a better view.
Globally, configuring 2 tunnels providing 80% coverage would be
considered as (operationnally) better than configuring 15 tunnels to
obtain 100% coverage.
In our example, we can create a tunnel from R5 to R2. R2 satisfies 4. Security Considerations
node protection equation for destination R1, routers behind R1 and
R3. To satisfy the second criteria, the tunnel must not use IGP path
but must be constrained through R4. With this, we achieve 100% of
LFA coverage for R3 router failure.
6. Security Considerations
TBD. TBD.
7. Acknowledgements 5. Contributors
8. IANA Considerations Significant contribution was made by Pierre Francois which the
authors would like to acknowledge.
This document has no actions for IANA. 6. IANA Considerations
9. References This document has no actions for IANA.
9.1. Normative References 7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3906] Shen, N. and H. Smit, "Calculating Interior Gateway [RFC3906] Shen, N. and H. Smit, "Calculating Interior Gateway
Protocol (IGP) Routes Over Traffic Engineering Tunnels", Protocol (IGP) Routes Over Traffic Engineering Tunnels",
RFC 3906, October 2004. RFC 3906, October 2004.
[RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute [RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
Extensions to RSVP-TE for LSP Tunnels", RFC 4090, Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
May 2005. May 2005.
[RFC5286] Atlas, A. and A. Zinin, "Basic Specification for IP Fast [RFC5286] Atlas, A. and A. Zinin, "Basic Specification for IP Fast
Reroute: Loop-Free Alternates", RFC 5286, September 2008. Reroute: Loop-Free Alternates", RFC 5286, September 2008.
9.2. Informative References 7.2. Informative References
[I-D.bryant-ipfrr-tunnels] [I-D.bryant-ipfrr-tunnels]
Bryant, S., Filsfils, C., Previdi, S., and M. Shand, "IP Bryant, S., Filsfils, C., Previdi, S., and M. Shand, "IP
Fast Reroute using tunnels", draft-bryant-ipfrr-tunnels-03 Fast Reroute using tunnels", draft-bryant-ipfrr-tunnels-03
(work in progress), November 2007. (work in progress), November 2007.
[I-D.ietf-rtgwg-remote-lfa] [I-D.ietf-rtgwg-remote-lfa]
Bryant, S., Filsfils, C., Shand, M., and S. Ning, "Remote Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S.
LFA FRR", draft-ietf-rtgwg-remote-lfa-00 (work in Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-01
progress), June 2012. (work in progress), December 2012.
Authors' Addresses Authors' Addresses
Stephane Litkowski Stephane Litkowski
Orange Orange
Email: stephane.litkowski@orange.com Email: stephane.litkowski@orange.com
Bruno Decraene Bruno Decraene
Orange Orange
Email: bruno.decraene@orange.com Email: bruno.decraene@orange.com
Clarence Fils Fils
Clarence FilsFils
Cisco Systems Cisco Systems
Email: cfilsfil@cisco.com Email: cfilsfil@cisco.com
Kamran Raza Kamran Raza
Cisco Systems Cisco Systems
Email: skraza@cisco.com Email: skraza@cisco.com
 End of changes. 94 change blocks. 
277 lines changed or deleted 278 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/