| < draft-litkowski-rtgwg-uloop-delay-01.txt | draft-litkowski-rtgwg-uloop-delay-02.txt > | |||
|---|---|---|---|---|
| Routing Area Working Group S. Litkowski | Routing Area Working Group S. Litkowski | |||
| Internet-Draft B. Decraene | Internet-Draft B. Decraene | |||
| Intended status: Standards Track Orange | Intended status: Standards Track Orange | |||
| Expires: February 20, 2014 P. Francois | Expires: August 18, 2014 P. Francois | |||
| IMDEA Networks/Cisco Systems | IMDEA Networks | |||
| August 19, 2013 | C. Filsfils | |||
| Cisco Systems | ||||
| February 14, 2014 | ||||
| Microloop prevention by introducting a local convergence delay | Microloop prevention by introducing a local convergence delay | |||
| draft-litkowski-rtgwg-uloop-delay-01 | draft-litkowski-rtgwg-uloop-delay-02 | |||
| Abstract | Abstract | |||
| This document describes a mechanism for link-state routing protocols | This document describes a mechanism for link-state routing protocols | |||
| to prevent a subset of transient loops during topology changes. It | to prevent local transient forwarding loops in case of link failure. | |||
| introduces a two-step convergence by introducing a delay between the | This mechanism Proposes a two-steps convergence by introducing a | |||
| network wide convergence and the node advertising the failure. As | delay between the convergence of the node adjacent to the topology | |||
| the network wide convergence is delayed in case of down events, this | change and the network wide convergence. | |||
| mechanism can be used for planned maintenance or for unplanned outage | ||||
| provided a fast reroute mechanism is used in conjunction to convert a | ||||
| failure into a less urgent topology change. | ||||
| Simulation using real network topologies and costs, with pathological | As this mechanism delays the IGP convergence it may only be used for | |||
| convergence behaviour, have been performed. While the proposed | planned maintenance or when fast reroute protects the traffic between | |||
| mechanism does not provide a complete solution, it is simple and it | the link failure and the IGP convergence. | |||
| solves an interesting fraction of the transient loops in the analyzed | ||||
| SP topologies. | Simulations using real network topologies have been performed and | |||
| show that local loops are a significant portion (>50%) of the total | ||||
| forwarding loops. | ||||
| Requirements Language | Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| Status of This Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on February 20, 2014. | ||||
| This Internet-Draft will expire on August 18, 2014. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2. Overview of the solution . . . . . . . . . . . . . . . . . . 3 | 2. Overview of the solution . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Specification . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Specification . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 3 | 3.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.2. Current IGP reactions . . . . . . . . . . . . . . . . . . 4 | 3.2. Current IGP reactions . . . . . . . . . . . . . . . . . . 5 | |||
| 3.3. Local delay . . . . . . . . . . . . . . . . . . . . . . . 4 | 3.3. Local events . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3.3.1. Link down event . . . . . . . . . . . . . . . . . . . 4 | 3.4. Local delay . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3.3.2. Link up event . . . . . . . . . . . . . . . . . . . . 5 | 3.4.1. Link down event . . . . . . . . . . . . . . . . . . . 6 | |||
| 4. Use case . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 3.4.2. Link up event . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.1. Applicable case . . . . . . . . . . . . . . . . . . . . . 5 | 4. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 4.2. Non applicable case . . . . . . . . . . . . . . . . . . . 6 | 4.1. Applicable case : local loops . . . . . . . . . . . . . . 7 | |||
| 5. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 6 | 4.2. Non applicable case : remote loops . . . . . . . . . . . . 7 | |||
| 5.1. Topological applicability . . . . . . . . . . . . . . . . 6 | 5. Simulations . . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 6. Deployment considerations . . . . . . . . . . . . . . . . . . 7 | 6. Deployment considerations . . . . . . . . . . . . . . . . . . 9 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | |||
| 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 | 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 | 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . 8 | 10.1. Normative References . . . . . . . . . . . . . . . . . . . 10 | |||
| 10.2. Informative References . . . . . . . . . . . . . . . . . 8 | 10.2. Informative References . . . . . . . . . . . . . . . . . . 10 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 1. Introduction | 1. Introduction | |||
| In figure 1, upon link AD down event, for the destination A, if D | In figure 1, upon link AD down event, for the destination A, if D | |||
| updates its forwarding entry before C, a transient forwarding loop | updates its forwarding entry before C, a transient forwarding loop | |||
| occurs between C and D. We have a similar loop for link up event, if | occurs between C and D. We have a similar loop for link up event, if | |||
| C updates its forwarding entry A before D. | C updates its forwarding entry A before D. | |||
| A ------ B | A ------ B | |||
| | | | | | | |||
| | | | | | | |||
| D--------C All the links have a metric of 1 except BC=5 | D--------C All the links have a metric of 1 except BC=5 | |||
| Figure 1 | Figure 1 | |||
| 2. Overview of the solution | 2. Overview of the solution | |||
| This document defines a two-step convergence initiated by the router | This document defines a two-step convergence initiated by the router | |||
| detecting the failure and advertising the topological changes in the | detecting the failure and advertising the topological changes in the | |||
| IGP. This introduces a delay between the convergence of the local | IGP. This introduces a delay between the convergence of the local | |||
| router compared to the network wide convergence. This delay is | router and the network wide convergence. This delay is positive in | |||
| positive in case of "down" events and negative in case of "up" | case of "down" events and negative in case of "up" events. | |||
| events. | ||||
| This ordered convergence, is similar to the ordered FIB proposed | This ordered convergence, is similar to the ordered FIB proposed | |||
| defined in [I-D.ietf-rtgwg-ordered-fib], but limited to only one hop | defined in [I-D.ietf-rtgwg-ordered-fib], but limited to only one hop | |||
| distance. The proposed mechanism reuses also some concept described | distance. As a consequence, it is simpler and becomes a local only | |||
| in [I-D.ietf-rtgwg-microloop-analysis] with some limitation and | feature not requiring interoperability; at the cost of only covering | |||
| improvements. As a consequence, it can only eliminate the loops | the transient forwarding loops involving this local router. The | |||
| between the node local to the event and its neighbors. In the SP | proposed mechanism also reuses some concept described in | |||
| topologies that were analyzed, this can avoid a high number of | [I-D.ietf-rtgwg-microloop-analysis] with some limitation and | |||
| transient loops. On the other hand, as this mechanism is local to | improvements. | |||
| the router, it can be deployed incrementally with incremental | ||||
| benefit. | ||||
| 3. Specification | 3. Specification | |||
| 3.1. Definitions | 3.1. Definitions | |||
| This document will refer to the following existing IGP timers: | This document will refer to the following existing IGP timers: | |||
| o LSP_GEN_TIMER: to batch multiple local events in one single local | o LSP_GEN_TIMER: to batch multiple local events in one single local | |||
| LSP update. It is often associated with damping mechanism to | LSP update. It is often associated with damping mechanism to | |||
| slowdown reactions by incrementing the timer when multiple | slowdown reactions by incrementing the timer when multiple | |||
| skipping to change at page 4, line 29 ¶ | skipping to change at page 5, line 35 ¶ | |||
| LSP_GEN_TIMER msec. | LSP_GEN_TIMER msec. | |||
| 3. Upon LSP_GEN_TIMER expiration, IGP updates its LSP/LSA and floods | 3. Upon LSP_GEN_TIMER expiration, IGP updates its LSP/LSA and floods | |||
| it. | it. | |||
| 4. SPF is scheduled in SPF_TIMER msec. | 4. SPF is scheduled in SPF_TIMER msec. | |||
| 5. Upon SPF_TIMER expiration, SPF is computed and RIB/FIB are | 5. Upon SPF_TIMER expiration, SPF is computed and RIB/FIB are | |||
| updated. | updated. | |||
| 3.3. Local delay | 3.3. Local events | |||
| 3.3.1. Link down event | In the next sections, we will use the concept of local events versus | |||
| remote events. The notion of event we are using in this document is | ||||
| linked to IGP link state advertisements and not network events, as a | ||||
| single network event would create multiple IGP link state | ||||
| advertisement within the network. | ||||
| A local event is a set of IGP link state advertisements describing | ||||
| only a change of a local component of the computing router (e.g. a | ||||
| link). As opposite to a remote event being a set of IGP link state | ||||
| advertisements describing any other type of changes. | ||||
| Example : | ||||
| +--- E ----+--------+ | ||||
| | | | | ||||
| A ---- B -------- C ------ D | ||||
| Considering computing router is B, when B-C fails. B updates its | ||||
| local LSP describing the link B->C being down, C does exactly the | ||||
| same and starts flooding. During SPF_TIMER, B and C LSPs would be | ||||
| taken into account. B and C LSPs are describing exactly the same | ||||
| event (B-C link down). For B point of view, both LSPs must be | ||||
| considered as a local event as they are describing the change of a | ||||
| local component of B (link B-C). If C node is failing, routers B,E | ||||
| and D are updating and flooding their LSPs. LSPs from E and D are | ||||
| considered as remote events for B as they are describing a change in | ||||
| a component that does not belong to B. Hence the local delay | ||||
| mechanism will be aborted. Hence this mechanism is not applicable to | ||||
| node failure. | ||||
| 3.4. Local delay | ||||
| 3.4.1. Link down event | ||||
| Upon an adjacency/link down event, this document introduces a change | Upon an adjacency/link down event, this document introduces a change | |||
| in step 5 in order to delay the local convergence compared to the | in step 5 in order to delay the local convergence compared to the | |||
| network wide convergence: the node SHOULD delay the forwarding entry | network wide convergence: the node SHOULD delay the forwarding entry | |||
| updates by ULOOP_DELAY_DOWN_TIMER. Such delay SHOULD only be | updates by ULOOP_DELAY_DOWN_TIMER. Such delay SHOULD only be | |||
| introduced if all the LSDB modifications processed are only reporting | introduced if all the LSDB modifications processed are only reporting | |||
| down local events. Note that determining that all topological change | down local events . Note that determining that all topological | |||
| are only local down events requires analyzing all modified LSP/LSA as | change are only local down events requires analyzing all modified | |||
| a local link or node failure will typically be notified by multiple | LSP/LSA as a local link or node failure will typically be notified by | |||
| nodes. If a subsequent LSP/LSA is received/updated and a new SPF | multiple nodes. If a subsequent LSP/LSA is received/updated and a | |||
| computation is triggered before the expiration of | new SPF computation is triggered before the expiration of | |||
| ULOOP_DELAY_DOWN_TIMER, then the same evaluation SHOULD be performed. | ULOOP_DELAY_DOWN_TIMER, then the same evaluation SHOULD be performed. | |||
| As as result of this addition, routers local to the failure will | As a result of this addition, routers local to the failure will | |||
| converge slower than remote routers. | converge slower than remote routers. Hence it SHOULD only be done | |||
| for non urgent convergence, such as for administrative de-activation | ||||
| (maintenance) or when the traffic is Fast ReRouted. | ||||
| 3.3.2. Link up event | 3.4.2. Link up event | |||
| Upon an adjacency/link up event, this document introduces the | Upon an adjacency/link up event, this document introduces the | |||
| following change in step 3 where the node SHOULD: | following change in step 3 where the node SHOULD: | |||
| o Firstly build a LSP/LSA with the new adjacency but setting the | o Firstly build a LSP/LSA with the new adjacency but setting the | |||
| metric to MAX_METRIC. It SHOULD flood it but not compute the SPF | metric to MAX_METRIC . It SHOULD flood it but not compute the SPF | |||
| at this time. | at this time. This step is required to ensure the two way | |||
| connectivity check on all nodes when computing SPF. | ||||
| o Then build the LSP/LSA with the target metric but SHOULD delay the | o Then build the LSP/LSA with the target metric but SHOULD delay the | |||
| flooding of this LSP/LSA by SPF_TIMER + ULOOP_DELAY_UP_TIMER. | flooding of this LSP/LSA by SPF_TIMER + ULOOP_DELAY_UP_TIMER. | |||
| MAX_METRIC is equal to MaxLinkMetric (0xFFFF) for OSPF and 2^24-2 | MAX_METRIC is equal to MaxLinkMetric (0xFFFF) for OSPF and 2^24-2 | |||
| (0xFFFFFE) for IS-IS. | (0xFFFFFE) for IS-IS. | |||
| o Then continue with next steps (SPF computation) without waiting | o Then continue with next steps (SPF computation) without waiting | |||
| for the expiration of the above timer. In other word, only the | for the expiration of the above timer. In other word, only the | |||
| flooding of the LSA/LSP is delayed, not the local SPF computation. | flooding of the LSA/LSP is delayed, not the local SPF computation. | |||
| As as result of this addition, routers local to the failure will | As as result of this addition, routers local to the failure will | |||
| converge faster than remote routers. | converge faster than remote routers. | |||
| If this mechanism is used in cooperation with "LDP IGP | If this mechanism is used in cooperation with "LDP IGP | |||
| Synchronization" as defined in [RFC5443] then the mechanism defined | Synchronization" as defined in [RFC5443] then the mechanism defined | |||
| in RFC 5443 is applied first, followed by the mechanism defined in | in RFC 5443 is applied first, followed by the mechanism defined in | |||
| this document. More precisely, the procedure defined in this | this document. More precisely, the procedure defined in this | |||
| document is applied once the LDP session is considered "fully | document is applied once the LDP session is considered "fully | |||
| operational" as per [RFC5443]. | operational" as per [RFC5443]. | |||
| 4. Use case | 4. Applicability | |||
| As previously stated, the mechanism only avoids the forwarding loops | As previously stated, the mechanism only avoids the forwarding loops | |||
| on the links between the node local to the failure and its neighbor. | on the links between the node local to the failure and its neighbor. | |||
| Forwarding loops may still occur on other links. | Forwarding loops may still occur on other links. | |||
| 4.1. Applicable case | 4.1. Applicable case : local loops | |||
| A ------ B ----- E | A ------ B ----- E | |||
| | / | | | / | | |||
| | / | | | / | | |||
| G---D------------C F All the links have a metric of 1 | G---D------------C F All the links have a metric of 1 | |||
| Figure 2 | Figure 2 | |||
| Let us consider the traffic from G to F. The primary path is | Let us consider the traffic from G to F. The primary path is | |||
| G->D->C->E->F. When link CE fails, if C updates its forwarding entry | G->D->C->E->F. When link CE fails, if C updates its forwarding entry | |||
| for F before D, a transient loop occures. | for F before D, a transient loop occurs. This is sub-optimal as C | |||
| has FRR enabled and it breaks the FRR forwarding while all upstream | ||||
| routers are still forwarding the traffic to itself. | ||||
| By implementing the mechanism defined in this document on C, when the | By implementing the mechanism defined in this document on C, when the | |||
| CE link fails, C delays the update of his forwarding entry to F, in | CE link fails, C delays the update of his forwarding entry to F, in | |||
| order to let some time for D to converge. When the timer expires on | order to let some time for D to converge. FRR keeps protecting the | |||
| C, forwarding entry to F is updated. There is no transient | traffic during this period. When the timer expires on C, forwarding | |||
| forwarding loop on the link CD. | entry to F is updated. There is no transient forwarding loop on the | |||
| link CD. | ||||
| Note that C should implement a protection mechanism during the | ||||
| convergence delay in order to not increase the loss of traffic. | ||||
| 4.2. Non applicable case | ||||
| 4.2. Non applicable case : remote loops | ||||
| A ------ B ----- E --- H | A ------ B ----- E --- H | |||
| | | | | | | |||
| | | | | | | |||
| G---D--------C ------F --- J ---- K | G---D--------C ------F --- J ---- K | |||
| All the links have a metric of 1 except BE=15 | All the links have a metric of 1 except BE=15 | |||
| Figure 3 | Figure 3 | |||
| Let us consider the traffic from G to K. The primary path is | Let us consider the traffic from G to K. The primary path is | |||
| G->D->C->F->J->K. When the CF link fails, if C updates its forwarding | G->D->C->F->J->K. When the CF link fails, if C updates its forwarding | |||
| entry to K before D, a transient loop occures between C and D. | entry to K before D, a transient loop occurs between C and D. | |||
| By implementing the mechanism defined in this document on C, when the | By implementing the mechanism defined in this document on C, when the | |||
| link CF fails, C delays the update of his forwarding entry to K, | link CF fails, C delays the update of his forwarding entry to K, | |||
| letting time for D to converge. When the timer expires on C, | letting time for D to converge. When the timer expires on C, | |||
| forwarding entry to F is updated. There is no transient forwarding | forwarding entry to F is updated. There is no transient forwarding | |||
| loop between C and D. However, a transient forwarding loop may still | loop between C and D. However, a transient forwarding loop may still | |||
| occur between D and A. In this scenario, this mechanism is not enough | occur between D and A. In this scenario, this mechanism is not enough | |||
| to address all the possible forwarding loops. However, it does not | to address all the possible forwarding loops. However, it does not | |||
| create additional traffic loss. Besides, in some cases -such as when | create additional traffic loss. Besides, in some cases -such as when | |||
| the nodes update their FIB in the following order C, A, D, for | the nodes update their FIB in the following order C, A, D, for | |||
| example because the router A is quicker than D to converge- the | example because the router A is quicker than D to converge- the | |||
| mechanism may still avoid the forwarding loop that was occuring. | mechanism may still avoid the forwarding loop that was occuring. | |||
| 5. Applicability | 5. Simulations | |||
| Simulations have been run on multiple service provider topologies. | Simulations have been run on multiple service provider topologies. | |||
| So far, only link down event have been tested. | So far, only link down event have been tested. | |||
| 5.1. Topological applicability | ||||
| +----------+------+ | +----------+------+ | |||
| | Topology | Gain | | | Topology | Gain | | |||
| +----------+------+ | +----------+------+ | |||
| | T1 | 71% | | | T1 | 71% | | |||
| | T2 | 81% | | | T2 | 81% | | |||
| | T3 | 62% | | | T3 | 62% | | |||
| | T4 | 50% | | | T4 | 50% | | |||
| | T5 | 70% | | | T5 | 70% | | |||
| | T6 | 70% | | | T6 | 70% | | |||
| | T7 | 59% | | | T7 | 59% | | |||
| | T8 | 77% | | | T8 | 77% | | |||
| +----------+------+ | +----------+------+ | |||
| Table 1: Number of Repair/Dst that may loop | Table 1: Number of Repair/Dst that may loop | |||
| We evaluated the efficiency of the mechanism on eight different | We evaluated the efficiency of the mechanism on eight different | |||
| service provider topologies (different network size, design). The | service provider topologies (different network size, design). The | |||
| benefit is displayed in the table above. The benefit is evaluated as | benefit is displayed in the table above. The benefit is evaluated as | |||
| follows: | follows: | |||
| o We consider a tuple (link A-B, destination D, PLR S, backup | o We consider a tuple (link A-B, destination D, PLR S, backup | |||
| skipping to change at page 7, line 33 ¶ | skipping to change at page 9, line 20 ¶ | |||
| may loop due to convergence time difference between S and one of | may loop due to convergence time difference between S and one of | |||
| his neighbor N. | his neighbor N. | |||
| o We evaluate the number of potential loop tuples in normal | o We evaluate the number of potential loop tuples in normal | |||
| conditions. | conditions. | |||
| o We evaluate the number of potential loop tuples using the same | o We evaluate the number of potential loop tuples using the same | |||
| topological input but taking into account that S converges after | topological input but taking into account that S converges after | |||
| N. | N. | |||
| o Gain is how much loops we succeed to suppress. | o Gain is how much loops (remote and local) we succeed to suppress. | |||
| On topology 1, 71% of the transient forwarding loops created by the | ||||
| failure of any link are prevented by implementing the local delay. | ||||
| The analysis shows that all local loops are obviously solved and only | ||||
| remote loops are remaining. | ||||
| 6. Deployment considerations | 6. Deployment considerations | |||
| Transient forwarding loops have the following drawbacks : | Transient forwarding loops have the following drawbacks : | |||
| o Limit FRR efficiency : even if FRR is activated in 50msec, as soon | o Limit FRR efficiency : even if FRR is activated in 50msec, as soon | |||
| as PLR has converged, traffic may be affected by a transient loop. | as PLR has converged, traffic may be affected by a transient loop. | |||
| o It may impact traffic not directly concerned by the failure (due | o It may impact traffic not directly concerned by the failure (due | |||
| to link congestion). | to link congestion). | |||
| Our local delay proposal is a transient forwarding loop avoidance | This local delay proposal is a transient forwarding loop avoidance | |||
| mechanism (like OFIB). Even if it does not prevent all transient | mechanism (like OFIB). Even if it only address local transient | |||
| loops to happen, the efficiency versus complexity comparison of the | loops, , the efficiency versus complexity comparison of the mechanism | |||
| mechanism makes it a good solution. | makes it a good solution. It is also incrementally deployable with | |||
| incremental benefits, which makes it an attractive option for both | ||||
| Delaying convergence time is not an issue if we consider that the | vendors to implement and Service Providers to deploy. Delaying | |||
| traffic is protected during the convergence. It would be up to the | convergence time is not an issue if we consider that the traffic is | |||
| service provider to implement the local delay only for protected | protected during the convergence. | |||
| destinations or for all destinations. Considering that a service | ||||
| provider may implement the local delay for non protected | ||||
| destinations, it must be aware that delaying convergence will | ||||
| increase the loss duration on the affected link but at the same time, | ||||
| will prevent some other link to be congestioned. As a best practice, | ||||
| we recommend to activate the local delay only for protected | ||||
| destinations. | ||||
| 7. Security Considerations | 7. Security Considerations | |||
| This document does not introduce change in term of IGP security. The | This document does not introduce change in term of IGP security. The | |||
| operation is internal to the router. The local delay does not | operation is internal to the router. The local delay does not | |||
| increase the attack vector as an attacker could only trigger this | increase the attack vector as an attacker could only trigger this | |||
| mechanism if he already has be ability to disable or enable an IGP | mechanism if he already has be ability to disable or enable an IGP | |||
| link. The local delay does not increase the negative consequences as | link. The local delay does not increase the negative consequences as | |||
| if an attacker has the ability to disable or enable an IGP link, it | if an attacker has the ability to disable or enable an IGP link, it | |||
| can already harm the network by creating instability and harm the | can already harm the network by creating instability and harm the | |||
| traffic by creating forwarding packet loss and forwarding loss for | traffic by creating forwarding packet loss and forwarding loss for | |||
| the traffic crossing that link. | the traffic crossing that link. | |||
| 8. Acknowledgements | 8. Acknowledgements | |||
| We wish to thanks the authors of [I-D.ietf-rtgwg-ordered-fib] for | We wish to thanks the authors of [I-D.ietf-rtgwg-ordered-fib] for | |||
| introducing the concept of ordered convergence: Mike Shand, Stewart | introducing the concept of ordered convergence: Mike Shand, Stewart | |||
| Bryant, Stefano Previdi, Clarence Filsfils, and Olivier Bonaventure. | Bryant, Stefano Previdi, and Olivier Bonaventure. | |||
| 9. IANA Considerations | 9. IANA Considerations | |||
| This document has no actions for IANA. | This document has no actions for IANA. | |||
| 10. References | 10. References | |||
| 10.1. Normative References | 10.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| skipping to change at page 9, line 5 ¶ | skipping to change at page 10, line 39 ¶ | |||
| [RFC5443] Jork, M., Atlas, A., and L. Fang, "LDP IGP | [RFC5443] Jork, M., Atlas, A., and L. Fang, "LDP IGP | |||
| Synchronization", RFC 5443, March 2009. | Synchronization", RFC 5443, March 2009. | |||
| [RFC5715] Shand, M. and S. Bryant, "A Framework for Loop-Free | [RFC5715] Shand, M. and S. Bryant, "A Framework for Loop-Free | |||
| Convergence", RFC 5715, January 2010. | Convergence", RFC 5715, January 2010. | |||
| 10.2. Informative References | 10.2. Informative References | |||
| [I-D.ietf-rtgwg-microloop-analysis] | [I-D.ietf-rtgwg-microloop-analysis] | |||
| Zinin, A., "Analysis and Minimization of Microloops in | Zinin, A., "Analysis and Minimization of Microloops in | |||
| Link-state Routing Protocols", draft-ietf-rtgwg-microloop- | Link-state Routing Protocols", | |||
| analysis-01 (work in progress), October 2005. | draft-ietf-rtgwg-microloop-analysis-01 (work in progress), | |||
| October 2005. | ||||
| [I-D.ietf-rtgwg-ordered-fib] | [I-D.ietf-rtgwg-ordered-fib] | |||
| Shand, M., Bryant, S., Previdi, S., Filsfils, C., | Shand, M., Bryant, S., Previdi, S., Filsfils, C., | |||
| Francois, P., and O. Bonaventure, "Framework for Loop-free | Francois, P., and O. Bonaventure, "Framework for Loop-free | |||
| convergence using oFIB", draft-ietf-rtgwg-ordered-fib-12 | convergence using oFIB", draft-ietf-rtgwg-ordered-fib-12 | |||
| (work in progress), May 2013. | (work in progress), May 2013. | |||
| [I-D.ietf-rtgwg-remote-lfa] | [I-D.ietf-rtgwg-remote-lfa] | |||
| Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S. | Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S. | |||
| Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-02 | Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-04 | |||
| (work in progress), May 2013. | (work in progress), November 2013. | |||
| [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering | [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering | |||
| (TE) Extensions to OSPF Version 2", RFC 3630, September | (TE) Extensions to OSPF Version 2", RFC 3630, | |||
| 2003. | September 2003. | |||
| [RFC6571] Filsfils, C., Francois, P., Shand, M., Decraene, B., | [RFC6571] Filsfils, C., Francois, P., Shand, M., Decraene, B., | |||
| Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free | Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free | |||
| Alternate (LFA) Applicability in Service Provider (SP) | Alternate (LFA) Applicability in Service Provider (SP) | |||
| Networks", RFC 6571, June 2012. | Networks", RFC 6571, June 2012. | |||
| Authors' Addresses | Authors' Addresses | |||
| Stephane Litkowski | Stephane Litkowski | |||
| Orange | Orange | |||
| Email: stephane.litkowski@orange.com | Email: stephane.litkowski@orange.com | |||
| Bruno Decraene | Bruno Decraene | |||
| Orange | Orange | |||
| Email: bruno.decraene@orange.com | Email: bruno.decraene@orange.com | |||
| Pierre Francois | Pierre Francois | |||
| IMDEA Networks/Cisco Systems | IMDEA Networks | |||
| Email: pierre.francois@imdea.org | Email: pierre.francois@imdea.org | |||
| Clarence Fils Fils | ||||
| Cisco Systems | ||||
| Email: cf@cisco.com | ||||
| End of changes. 33 change blocks. | ||||
| 111 lines changed or deleted | 140 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||