< draft-litkowski-rtgwg-uloop-delay-01.txt   draft-litkowski-rtgwg-uloop-delay-02.txt >
Routing Area Working Group S. Litkowski Routing Area Working Group S. Litkowski
Internet-Draft B. Decraene Internet-Draft B. Decraene
Intended status: Standards Track Orange Intended status: Standards Track Orange
Expires: February 20, 2014 P. Francois Expires: August 18, 2014 P. Francois
IMDEA Networks/Cisco Systems IMDEA Networks
August 19, 2013 C. Filsfils
Cisco Systems
February 14, 2014
Microloop prevention by introducting a local convergence delay Microloop prevention by introducing a local convergence delay
draft-litkowski-rtgwg-uloop-delay-01 draft-litkowski-rtgwg-uloop-delay-02
Abstract Abstract
This document describes a mechanism for link-state routing protocols This document describes a mechanism for link-state routing protocols
to prevent a subset of transient loops during topology changes. It to prevent local transient forwarding loops in case of link failure.
introduces a two-step convergence by introducing a delay between the This mechanism Proposes a two-steps convergence by introducing a
network wide convergence and the node advertising the failure. As delay between the convergence of the node adjacent to the topology
the network wide convergence is delayed in case of down events, this change and the network wide convergence.
mechanism can be used for planned maintenance or for unplanned outage
provided a fast reroute mechanism is used in conjunction to convert a
failure into a less urgent topology change.
Simulation using real network topologies and costs, with pathological As this mechanism delays the IGP convergence it may only be used for
convergence behaviour, have been performed. While the proposed planned maintenance or when fast reroute protects the traffic between
mechanism does not provide a complete solution, it is simple and it the link failure and the IGP convergence.
solves an interesting fraction of the transient loops in the analyzed
SP topologies. Simulations using real network topologies have been performed and
show that local loops are a significant portion (>50%) of the total
forwarding loops.
Requirements Language Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. document are to be interpreted as described in [RFC2119].
Status of This Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on February 20, 2014.
This Internet-Draft will expire on August 18, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Overview of the solution . . . . . . . . . . . . . . . . . . 3 2. Overview of the solution . . . . . . . . . . . . . . . . . . . 4
3. Specification . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Specification . . . . . . . . . . . . . . . . . . . . . . . . 4
3.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 3 3.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4
3.2. Current IGP reactions . . . . . . . . . . . . . . . . . . 4 3.2. Current IGP reactions . . . . . . . . . . . . . . . . . . 5
3.3. Local delay . . . . . . . . . . . . . . . . . . . . . . . 4 3.3. Local events . . . . . . . . . . . . . . . . . . . . . . . 5
3.3.1. Link down event . . . . . . . . . . . . . . . . . . . 4 3.4. Local delay . . . . . . . . . . . . . . . . . . . . . . . 6
3.3.2. Link up event . . . . . . . . . . . . . . . . . . . . 5 3.4.1. Link down event . . . . . . . . . . . . . . . . . . . 6
4. Use case . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.4.2. Link up event . . . . . . . . . . . . . . . . . . . . 6
4.1. Applicable case . . . . . . . . . . . . . . . . . . . . . 5 4. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2. Non applicable case . . . . . . . . . . . . . . . . . . . 6 4.1. Applicable case : local loops . . . . . . . . . . . . . . 7
5. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 6 4.2. Non applicable case : remote loops . . . . . . . . . . . . 7
5.1. Topological applicability . . . . . . . . . . . . . . . . 6 5. Simulations . . . . . . . . . . . . . . . . . . . . . . . . . 8
6. Deployment considerations . . . . . . . . . . . . . . . . . . 7 6. Deployment considerations . . . . . . . . . . . . . . . . . . 9
7. Security Considerations . . . . . . . . . . . . . . . . . . . 8 7. Security Considerations . . . . . . . . . . . . . . . . . . . 9
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
10.1. Normative References . . . . . . . . . . . . . . . . . . 8 10.1. Normative References . . . . . . . . . . . . . . . . . . . 10
10.2. Informative References . . . . . . . . . . . . . . . . . 8 10.2. Informative References . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11
1. Introduction 1. Introduction
In figure 1, upon link AD down event, for the destination A, if D In figure 1, upon link AD down event, for the destination A, if D
updates its forwarding entry before C, a transient forwarding loop updates its forwarding entry before C, a transient forwarding loop
occurs between C and D. We have a similar loop for link up event, if occurs between C and D. We have a similar loop for link up event, if
C updates its forwarding entry A before D. C updates its forwarding entry A before D.
A ------ B A ------ B
| | | |
| | | |
D--------C All the links have a metric of 1 except BC=5 D--------C All the links have a metric of 1 except BC=5
Figure 1 Figure 1
2. Overview of the solution 2. Overview of the solution
This document defines a two-step convergence initiated by the router This document defines a two-step convergence initiated by the router
detecting the failure and advertising the topological changes in the detecting the failure and advertising the topological changes in the
IGP. This introduces a delay between the convergence of the local IGP. This introduces a delay between the convergence of the local
router compared to the network wide convergence. This delay is router and the network wide convergence. This delay is positive in
positive in case of "down" events and negative in case of "up" case of "down" events and negative in case of "up" events.
events.
This ordered convergence, is similar to the ordered FIB proposed This ordered convergence, is similar to the ordered FIB proposed
defined in [I-D.ietf-rtgwg-ordered-fib], but limited to only one hop defined in [I-D.ietf-rtgwg-ordered-fib], but limited to only one hop
distance. The proposed mechanism reuses also some concept described distance. As a consequence, it is simpler and becomes a local only
in [I-D.ietf-rtgwg-microloop-analysis] with some limitation and feature not requiring interoperability; at the cost of only covering
improvements. As a consequence, it can only eliminate the loops the transient forwarding loops involving this local router. The
between the node local to the event and its neighbors. In the SP proposed mechanism also reuses some concept described in
topologies that were analyzed, this can avoid a high number of [I-D.ietf-rtgwg-microloop-analysis] with some limitation and
transient loops. On the other hand, as this mechanism is local to improvements.
the router, it can be deployed incrementally with incremental
benefit.
3. Specification 3. Specification
3.1. Definitions 3.1. Definitions
This document will refer to the following existing IGP timers: This document will refer to the following existing IGP timers:
o LSP_GEN_TIMER: to batch multiple local events in one single local o LSP_GEN_TIMER: to batch multiple local events in one single local
LSP update. It is often associated with damping mechanism to LSP update. It is often associated with damping mechanism to
slowdown reactions by incrementing the timer when multiple slowdown reactions by incrementing the timer when multiple
skipping to change at page 4, line 29 skipping to change at page 5, line 35
LSP_GEN_TIMER msec. LSP_GEN_TIMER msec.
3. Upon LSP_GEN_TIMER expiration, IGP updates its LSP/LSA and floods 3. Upon LSP_GEN_TIMER expiration, IGP updates its LSP/LSA and floods
it. it.
4. SPF is scheduled in SPF_TIMER msec. 4. SPF is scheduled in SPF_TIMER msec.
5. Upon SPF_TIMER expiration, SPF is computed and RIB/FIB are 5. Upon SPF_TIMER expiration, SPF is computed and RIB/FIB are
updated. updated.
3.3. Local delay 3.3. Local events
3.3.1. Link down event In the next sections, we will use the concept of local events versus
remote events. The notion of event we are using in this document is
linked to IGP link state advertisements and not network events, as a
single network event would create multiple IGP link state
advertisement within the network.
A local event is a set of IGP link state advertisements describing
only a change of a local component of the computing router (e.g. a
link). As opposite to a remote event being a set of IGP link state
advertisements describing any other type of changes.
Example :
+--- E ----+--------+
| | |
A ---- B -------- C ------ D
Considering computing router is B, when B-C fails. B updates its
local LSP describing the link B->C being down, C does exactly the
same and starts flooding. During SPF_TIMER, B and C LSPs would be
taken into account. B and C LSPs are describing exactly the same
event (B-C link down). For B point of view, both LSPs must be
considered as a local event as they are describing the change of a
local component of B (link B-C). If C node is failing, routers B,E
and D are updating and flooding their LSPs. LSPs from E and D are
considered as remote events for B as they are describing a change in
a component that does not belong to B. Hence the local delay
mechanism will be aborted. Hence this mechanism is not applicable to
node failure.
3.4. Local delay
3.4.1. Link down event
Upon an adjacency/link down event, this document introduces a change Upon an adjacency/link down event, this document introduces a change
in step 5 in order to delay the local convergence compared to the in step 5 in order to delay the local convergence compared to the
network wide convergence: the node SHOULD delay the forwarding entry network wide convergence: the node SHOULD delay the forwarding entry
updates by ULOOP_DELAY_DOWN_TIMER. Such delay SHOULD only be updates by ULOOP_DELAY_DOWN_TIMER. Such delay SHOULD only be
introduced if all the LSDB modifications processed are only reporting introduced if all the LSDB modifications processed are only reporting
down local events. Note that determining that all topological change down local events . Note that determining that all topological
are only local down events requires analyzing all modified LSP/LSA as change are only local down events requires analyzing all modified
a local link or node failure will typically be notified by multiple LSP/LSA as a local link or node failure will typically be notified by
nodes. If a subsequent LSP/LSA is received/updated and a new SPF multiple nodes. If a subsequent LSP/LSA is received/updated and a
computation is triggered before the expiration of new SPF computation is triggered before the expiration of
ULOOP_DELAY_DOWN_TIMER, then the same evaluation SHOULD be performed. ULOOP_DELAY_DOWN_TIMER, then the same evaluation SHOULD be performed.
As as result of this addition, routers local to the failure will As a result of this addition, routers local to the failure will
converge slower than remote routers. converge slower than remote routers. Hence it SHOULD only be done
for non urgent convergence, such as for administrative de-activation
(maintenance) or when the traffic is Fast ReRouted.
3.3.2. Link up event 3.4.2. Link up event
Upon an adjacency/link up event, this document introduces the Upon an adjacency/link up event, this document introduces the
following change in step 3 where the node SHOULD: following change in step 3 where the node SHOULD:
o Firstly build a LSP/LSA with the new adjacency but setting the o Firstly build a LSP/LSA with the new adjacency but setting the
metric to MAX_METRIC. It SHOULD flood it but not compute the SPF metric to MAX_METRIC . It SHOULD flood it but not compute the SPF
at this time. at this time. This step is required to ensure the two way
connectivity check on all nodes when computing SPF.
o Then build the LSP/LSA with the target metric but SHOULD delay the o Then build the LSP/LSA with the target metric but SHOULD delay the
flooding of this LSP/LSA by SPF_TIMER + ULOOP_DELAY_UP_TIMER. flooding of this LSP/LSA by SPF_TIMER + ULOOP_DELAY_UP_TIMER.
MAX_METRIC is equal to MaxLinkMetric (0xFFFF) for OSPF and 2^24-2 MAX_METRIC is equal to MaxLinkMetric (0xFFFF) for OSPF and 2^24-2
(0xFFFFFE) for IS-IS. (0xFFFFFE) for IS-IS.
o Then continue with next steps (SPF computation) without waiting o Then continue with next steps (SPF computation) without waiting
for the expiration of the above timer. In other word, only the for the expiration of the above timer. In other word, only the
flooding of the LSA/LSP is delayed, not the local SPF computation. flooding of the LSA/LSP is delayed, not the local SPF computation.
As as result of this addition, routers local to the failure will As as result of this addition, routers local to the failure will
converge faster than remote routers. converge faster than remote routers.
If this mechanism is used in cooperation with "LDP IGP If this mechanism is used in cooperation with "LDP IGP
Synchronization" as defined in [RFC5443] then the mechanism defined Synchronization" as defined in [RFC5443] then the mechanism defined
in RFC 5443 is applied first, followed by the mechanism defined in in RFC 5443 is applied first, followed by the mechanism defined in
this document. More precisely, the procedure defined in this this document. More precisely, the procedure defined in this
document is applied once the LDP session is considered "fully document is applied once the LDP session is considered "fully
operational" as per [RFC5443]. operational" as per [RFC5443].
4. Use case 4. Applicability
As previously stated, the mechanism only avoids the forwarding loops As previously stated, the mechanism only avoids the forwarding loops
on the links between the node local to the failure and its neighbor. on the links between the node local to the failure and its neighbor.
Forwarding loops may still occur on other links. Forwarding loops may still occur on other links.
4.1. Applicable case 4.1. Applicable case : local loops
A ------ B ----- E A ------ B ----- E
| / | | / |
| / | | / |
G---D------------C F All the links have a metric of 1 G---D------------C F All the links have a metric of 1
Figure 2 Figure 2
Let us consider the traffic from G to F. The primary path is Let us consider the traffic from G to F. The primary path is
G->D->C->E->F. When link CE fails, if C updates its forwarding entry G->D->C->E->F. When link CE fails, if C updates its forwarding entry
for F before D, a transient loop occures. for F before D, a transient loop occurs. This is sub-optimal as C
has FRR enabled and it breaks the FRR forwarding while all upstream
routers are still forwarding the traffic to itself.
By implementing the mechanism defined in this document on C, when the By implementing the mechanism defined in this document on C, when the
CE link fails, C delays the update of his forwarding entry to F, in CE link fails, C delays the update of his forwarding entry to F, in
order to let some time for D to converge. When the timer expires on order to let some time for D to converge. FRR keeps protecting the
C, forwarding entry to F is updated. There is no transient traffic during this period. When the timer expires on C, forwarding
forwarding loop on the link CD. entry to F is updated. There is no transient forwarding loop on the
link CD.
Note that C should implement a protection mechanism during the
convergence delay in order to not increase the loss of traffic.
4.2. Non applicable case
4.2. Non applicable case : remote loops
A ------ B ----- E --- H A ------ B ----- E --- H
| | | |
| | | |
G---D--------C ------F --- J ---- K G---D--------C ------F --- J ---- K
All the links have a metric of 1 except BE=15 All the links have a metric of 1 except BE=15
Figure 3 Figure 3
Let us consider the traffic from G to K. The primary path is Let us consider the traffic from G to K. The primary path is
G->D->C->F->J->K. When the CF link fails, if C updates its forwarding G->D->C->F->J->K. When the CF link fails, if C updates its forwarding
entry to K before D, a transient loop occures between C and D. entry to K before D, a transient loop occurs between C and D.
By implementing the mechanism defined in this document on C, when the By implementing the mechanism defined in this document on C, when the
link CF fails, C delays the update of his forwarding entry to K, link CF fails, C delays the update of his forwarding entry to K,
letting time for D to converge. When the timer expires on C, letting time for D to converge. When the timer expires on C,
forwarding entry to F is updated. There is no transient forwarding forwarding entry to F is updated. There is no transient forwarding
loop between C and D. However, a transient forwarding loop may still loop between C and D. However, a transient forwarding loop may still
occur between D and A. In this scenario, this mechanism is not enough occur between D and A. In this scenario, this mechanism is not enough
to address all the possible forwarding loops. However, it does not to address all the possible forwarding loops. However, it does not
create additional traffic loss. Besides, in some cases -such as when create additional traffic loss. Besides, in some cases -such as when
the nodes update their FIB in the following order C, A, D, for the nodes update their FIB in the following order C, A, D, for
example because the router A is quicker than D to converge- the example because the router A is quicker than D to converge- the
mechanism may still avoid the forwarding loop that was occuring. mechanism may still avoid the forwarding loop that was occuring.
5. Applicability 5. Simulations
Simulations have been run on multiple service provider topologies. Simulations have been run on multiple service provider topologies.
So far, only link down event have been tested. So far, only link down event have been tested.
5.1. Topological applicability
+----------+------+ +----------+------+
| Topology | Gain | | Topology | Gain |
+----------+------+ +----------+------+
| T1 | 71% | | T1 | 71% |
| T2 | 81% | | T2 | 81% |
| T3 | 62% | | T3 | 62% |
| T4 | 50% | | T4 | 50% |
| T5 | 70% | | T5 | 70% |
| T6 | 70% | | T6 | 70% |
| T7 | 59% | | T7 | 59% |
| T8 | 77% | | T8 | 77% |
+----------+------+ +----------+------+
Table 1: Number of Repair/Dst that may loop Table 1: Number of Repair/Dst that may loop
We evaluated the efficiency of the mechanism on eight different We evaluated the efficiency of the mechanism on eight different
service provider topologies (different network size, design). The service provider topologies (different network size, design). The
benefit is displayed in the table above. The benefit is evaluated as benefit is displayed in the table above. The benefit is evaluated as
follows: follows:
o We consider a tuple (link A-B, destination D, PLR S, backup o We consider a tuple (link A-B, destination D, PLR S, backup
skipping to change at page 7, line 33 skipping to change at page 9, line 20
may loop due to convergence time difference between S and one of may loop due to convergence time difference between S and one of
his neighbor N. his neighbor N.
o We evaluate the number of potential loop tuples in normal o We evaluate the number of potential loop tuples in normal
conditions. conditions.
o We evaluate the number of potential loop tuples using the same o We evaluate the number of potential loop tuples using the same
topological input but taking into account that S converges after topological input but taking into account that S converges after
N. N.
o Gain is how much loops we succeed to suppress. o Gain is how much loops (remote and local) we succeed to suppress.
On topology 1, 71% of the transient forwarding loops created by the
failure of any link are prevented by implementing the local delay.
The analysis shows that all local loops are obviously solved and only
remote loops are remaining.
6. Deployment considerations 6. Deployment considerations
Transient forwarding loops have the following drawbacks : Transient forwarding loops have the following drawbacks :
o Limit FRR efficiency : even if FRR is activated in 50msec, as soon o Limit FRR efficiency : even if FRR is activated in 50msec, as soon
as PLR has converged, traffic may be affected by a transient loop. as PLR has converged, traffic may be affected by a transient loop.
o It may impact traffic not directly concerned by the failure (due o It may impact traffic not directly concerned by the failure (due
to link congestion). to link congestion).
Our local delay proposal is a transient forwarding loop avoidance This local delay proposal is a transient forwarding loop avoidance
mechanism (like OFIB). Even if it does not prevent all transient mechanism (like OFIB). Even if it only address local transient
loops to happen, the efficiency versus complexity comparison of the loops, , the efficiency versus complexity comparison of the mechanism
mechanism makes it a good solution. makes it a good solution. It is also incrementally deployable with
incremental benefits, which makes it an attractive option for both
Delaying convergence time is not an issue if we consider that the vendors to implement and Service Providers to deploy. Delaying
traffic is protected during the convergence. It would be up to the convergence time is not an issue if we consider that the traffic is
service provider to implement the local delay only for protected protected during the convergence.
destinations or for all destinations. Considering that a service
provider may implement the local delay for non protected
destinations, it must be aware that delaying convergence will
increase the loss duration on the affected link but at the same time,
will prevent some other link to be congestioned. As a best practice,
we recommend to activate the local delay only for protected
destinations.
7. Security Considerations 7. Security Considerations
This document does not introduce change in term of IGP security. The This document does not introduce change in term of IGP security. The
operation is internal to the router. The local delay does not operation is internal to the router. The local delay does not
increase the attack vector as an attacker could only trigger this increase the attack vector as an attacker could only trigger this
mechanism if he already has be ability to disable or enable an IGP mechanism if he already has be ability to disable or enable an IGP
link. The local delay does not increase the negative consequences as link. The local delay does not increase the negative consequences as
if an attacker has the ability to disable or enable an IGP link, it if an attacker has the ability to disable or enable an IGP link, it
can already harm the network by creating instability and harm the can already harm the network by creating instability and harm the
traffic by creating forwarding packet loss and forwarding loss for traffic by creating forwarding packet loss and forwarding loss for
the traffic crossing that link. the traffic crossing that link.
8. Acknowledgements 8. Acknowledgements
We wish to thanks the authors of [I-D.ietf-rtgwg-ordered-fib] for We wish to thanks the authors of [I-D.ietf-rtgwg-ordered-fib] for
introducing the concept of ordered convergence: Mike Shand, Stewart introducing the concept of ordered convergence: Mike Shand, Stewart
Bryant, Stefano Previdi, Clarence Filsfils, and Olivier Bonaventure. Bryant, Stefano Previdi, and Olivier Bonaventure.
9. IANA Considerations 9. IANA Considerations
This document has no actions for IANA. This document has no actions for IANA.
10. References 10. References
10.1. Normative References 10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
skipping to change at page 9, line 5 skipping to change at page 10, line 39
[RFC5443] Jork, M., Atlas, A., and L. Fang, "LDP IGP [RFC5443] Jork, M., Atlas, A., and L. Fang, "LDP IGP
Synchronization", RFC 5443, March 2009. Synchronization", RFC 5443, March 2009.
[RFC5715] Shand, M. and S. Bryant, "A Framework for Loop-Free [RFC5715] Shand, M. and S. Bryant, "A Framework for Loop-Free
Convergence", RFC 5715, January 2010. Convergence", RFC 5715, January 2010.
10.2. Informative References 10.2. Informative References
[I-D.ietf-rtgwg-microloop-analysis] [I-D.ietf-rtgwg-microloop-analysis]
Zinin, A., "Analysis and Minimization of Microloops in Zinin, A., "Analysis and Minimization of Microloops in
Link-state Routing Protocols", draft-ietf-rtgwg-microloop- Link-state Routing Protocols",
analysis-01 (work in progress), October 2005. draft-ietf-rtgwg-microloop-analysis-01 (work in progress),
October 2005.
[I-D.ietf-rtgwg-ordered-fib] [I-D.ietf-rtgwg-ordered-fib]
Shand, M., Bryant, S., Previdi, S., Filsfils, C., Shand, M., Bryant, S., Previdi, S., Filsfils, C.,
Francois, P., and O. Bonaventure, "Framework for Loop-free Francois, P., and O. Bonaventure, "Framework for Loop-free
convergence using oFIB", draft-ietf-rtgwg-ordered-fib-12 convergence using oFIB", draft-ietf-rtgwg-ordered-fib-12
(work in progress), May 2013. (work in progress), May 2013.
[I-D.ietf-rtgwg-remote-lfa] [I-D.ietf-rtgwg-remote-lfa]
Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S. Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S.
Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-02 Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-04
(work in progress), May 2013. (work in progress), November 2013.
[RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering
(TE) Extensions to OSPF Version 2", RFC 3630, September (TE) Extensions to OSPF Version 2", RFC 3630,
2003. September 2003.
[RFC6571] Filsfils, C., Francois, P., Shand, M., Decraene, B., [RFC6571] Filsfils, C., Francois, P., Shand, M., Decraene, B.,
Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free
Alternate (LFA) Applicability in Service Provider (SP) Alternate (LFA) Applicability in Service Provider (SP)
Networks", RFC 6571, June 2012. Networks", RFC 6571, June 2012.
Authors' Addresses Authors' Addresses
Stephane Litkowski Stephane Litkowski
Orange Orange
Email: stephane.litkowski@orange.com Email: stephane.litkowski@orange.com
Bruno Decraene Bruno Decraene
Orange Orange
Email: bruno.decraene@orange.com Email: bruno.decraene@orange.com
Pierre Francois Pierre Francois
IMDEA Networks/Cisco Systems IMDEA Networks
Email: pierre.francois@imdea.org Email: pierre.francois@imdea.org
Clarence Fils Fils
Cisco Systems
Email: cf@cisco.com
 End of changes. 33 change blocks. 
111 lines changed or deleted 140 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/