< draft-psarkar-rtgwg-rlfa-node-protection-02.txt   draft-psarkar-rtgwg-rlfa-node-protection-03.txt >
Routing Area Working Group P. Sarkar, Ed. Routing Area Working Group P. Sarkar, Ed.
Internet-Draft H. Gredler Internet-Draft H. Gredler
Intended status: Standards Track S. Hegde Intended status: Standards Track S. Hegde
Expires: May 22, 2014 H. Raghuveer Expires: June 23, 2014 H. Raghuveer
C. Bowers C. Bowers
Juniper Networks, Inc. Juniper Networks, Inc.
S. Litkowski S. Litkowski
Orange Orange
November 18, 2013 December 20, 2013
Remote-LFA Node Protection and Manageability Remote-LFA Node Protection and Manageability
draft-psarkar-rtgwg-rlfa-node-protection-02 draft-psarkar-rtgwg-rlfa-node-protection-03
Abstract Abstract
The loop-free alternates computed following the current Remote-LFA The loop-free alternates computed following the current Remote-LFA
[I-D.ietf-rtgwg-remote-lfa] specification gaurantees only link- [I-D.ietf-rtgwg-remote-lfa] specification gaurantees only link-
protection. The resulting Remote-LFA nexthops (also called PQ- protection. The resulting Remote-LFA nexthops (also called PQ-
nodes), may not gaurantee node-protection for all destinations being nodes), may not gaurantee node-protection for all destinations being
protected by it. protected by it.
This document describes procedures for determining if a given PQ-node This document describes procedures for determining if a given PQ-node
skipping to change at page 2, line 7 skipping to change at page 2, line 7
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 22, 2014. This Internet-Draft will expire on June 23, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 33 skipping to change at page 2, line 33
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Node Protection with Remote-LFA . . . . . . . . . . . . . . . 3 2. Node Protection with Remote-LFA . . . . . . . . . . . . . . . 3
2.1. The Problem . . . . . . . . . . . . . . . . . . . . . . . 3 2.1. The Problem . . . . . . . . . . . . . . . . . . . . . . . 3
2.2. Few Additional Definitions . . . . . . . . . . . . . . . 5 2.2. Few Additional Definitions . . . . . . . . . . . . . . . 5
2.2.1. Link-Protecting Extended P-Space . . . . . . . . . . 5 2.2.1. Link-Protecting Extended P-Space . . . . . . . . . . 5
2.2.2. Node-Protecting Extended P-Space . . . . . . . . . . 6 2.2.2. Node-Protecting Extended P-Space . . . . . . . . . . 6
2.2.3. Q-Space . . . . . . . . . . . . . . . . . . . . . . . 7 2.2.3. Q-Space . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.4. Link-Protecting PQ Space . . . . . . . . . . . . . . 7 2.2.4. Link-Protecting PQ Space . . . . . . . . . . . . . . 8
2.2.5. Candidate Node-Protecting PQ Space . . . . . . . . . 7 2.2.5. Candidate Node-Protecting PQ Space . . . . . . . . . 8
2.3. Computing Node-protecting R-LFA Path . . . . . . . . . . 7 2.3. Computing Node-protecting R-LFA Path . . . . . . . . . . 8
2.3.1. Computing Candidate Node-protecting PQ-Nodes for 2.3.1. Computing Candidate Node-protecting PQ-Nodes for
Primary nexthops . . . . . . . . . . . . . . . . . . 8 Primary nexthops . . . . . . . . . . . . . . . . . . 8
2.3.2. Computing node-protecting paths from PQ-nodes to 2.3.2. Computing node-protecting paths from PQ-nodes to
destinations . . . . . . . . . . . . . . . . . . . . 9 destinations . . . . . . . . . . . . . . . . . . . . 10
2.3.3. Limiting extra computational overhead . . . . . . . . 12 2.3.3. Limiting extra computational overhead . . . . . . . . 12
3. Manageabilty of Remote-LFA Alternate Paths . . . . . . . . . 12 3. Manageabilty of Remote-LFA Alternate Paths . . . . . . . . . 13
3.1. The Problem . . . . . . . . . . . . . . . . . . . . . . . 12 3.1. The Problem . . . . . . . . . . . . . . . . . . . . . . . 13
3.2. The Solution . . . . . . . . . . . . . . . . . . . . . . 13 3.2. The Solution . . . . . . . . . . . . . . . . . . . . . . 14
4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 13 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
6. Security Considerations . . . . . . . . . . . . . . . . . . . 13 6. Security Considerations . . . . . . . . . . . . . . . . . . . 14
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 13 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 14
7.1. Normative References . . . . . . . . . . . . . . . . . . 13 7.1. Normative References . . . . . . . . . . . . . . . . . . 14
7.2. Informative References . . . . . . . . . . . . . . . . . 14 7.2. Informative References . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15
1. Introduction 1. Introduction
The Remote-LFA [I-D.ietf-rtgwg-remote-lfa] specification provides The Remote-LFA [I-D.ietf-rtgwg-remote-lfa] specification provides
loop-free alternates that gaurantees only link-protection. The loop-free alternates that gaurantees only link-protection. The
resulting Remote-LFA alternate nexthops (also referred to as the PQ- resulting Remote-LFA alternate nexthops (also referred to as the PQ-
nodes) may not provide node-protection for all destinations covered nodes) may not provide node-protection for all destinations covered
by the same, in case of failure of the primary nexthop node. Neither by the same, in case of failure of the primary nexthop node. Neither
does the specification provide a means to determine the same. does the specification provide a means to determine the same.
skipping to change at page 3, line 47 skipping to change at page 4, line 5
2. Node Protection with Remote-LFA 2. Node Protection with Remote-LFA
2.1. The Problem 2.1. The Problem
To better illustrate the problem and the solution proposed in this To better illustrate the problem and the solution proposed in this
document the following topology diagram from the Remote-LFA document the following topology diagram from the Remote-LFA
[I-D.ietf-rtgwg-remote-lfa] draft is being re-used with slight [I-D.ietf-rtgwg-remote-lfa] draft is being re-used with slight
modification. modification.
D1 D1
/ /
S-x-E S-x-E
/ \ / \
N R3--D2 N R3--D2
\ / \ /
R1---R2 R1---R2
Figure 1: Topology 1 Figure 1: Topology 1
In the above topology, for all (non-ECMP) destinations reachable via In the above topology, for all (non-ECMP) destinations reachable via
the S-E link there is no standard LFA alternate. As per the Remote- the S-E link there is no standard LFA alternate. As per the Remote-
LFA [I-D.ietf-rtgwg-remote-lfa] alternate specifications node R2 LFA [I-D.ietf-rtgwg-remote-lfa] alternate specifications node R2
being the only PQ-node for the S-E link provides nexthop for all the being the only PQ-node for the S-E link provides nexthop for all the
above destinations. Table 1 below, shows all possible primary and above destinations. Table 1 below, shows all possible primary and
Remote-LFA alternate paths for each destination. Remote-LFA alternate paths for each destination.
skipping to change at page 4, line 38 skipping to change at page 5, line 5
protection for destinations E and F. In the event of the node-failure protection for destinations E and F. In the event of the node-failure
on primary nexthop E, the alternate path from Remote-LFA nexthop R2 on primary nexthop E, the alternate path from Remote-LFA nexthop R2
to E and D1 also becomes unavailable. So for a Remote-LFA nexthop to to E and D1 also becomes unavailable. So for a Remote-LFA nexthop to
provide node-protection for a given destination, it is mandatory provide node-protection for a given destination, it is mandatory
that, the shortest path from the given PQ-node to the given that, the shortest path from the given PQ-node to the given
destination MUST not traverse the primary nexthop. destination MUST not traverse the primary nexthop.
In another extension of the topology in Figure 1 let us consider an In another extension of the topology in Figure 1 let us consider an
additional link between N and E. additional link between N and E.
D1 D1
/ /
S-x-E S-x-E
/ / \ / / \
N---+ R3--D2 N---+ R3--D2
\ / \ /
R1---R2 R1---R2
Figure 2: Topology 2 Figure 2: Topology 2
In the above topology, the S-E link is no more on any of the shortest In the above topology, the S-E link is no more on any of the shortest
paths from N to R3. Hence R3 is also included in both the Extended-P paths from N to R3. Hence R3 is also included in both the Extended-P
space and PQ space of E (w.r.t S-E link). Table 2 below, shows all space and PQ space of E (w.r.t S-E link). Table 2 below, shows all
possible primary and R-LFA alternate paths via PQ-node R3, for each possible primary and R-LFA alternate paths via PQ-node R3, for each
destination reachable through the S-E link in the above topology. destination reachable through the S-E link in the above topology.
The R-LFA alternate paths via PQ-node R2 remains same as in Table 1. The R-LFA alternate paths via PQ-node R2 remains same as in Table 1.
skipping to change at page 6, line 31 skipping to change at page 7, line 8
being protected. being protected.
A node Y is in node-protecting extended P-space w.r.t to the node E A node Y is in node-protecting extended P-space w.r.t to the node E
being protected, if and only if, there exists atleast one direct being protected, if and only if, there exists atleast one direct
neighbor of S, Ni, other than primary nexthop E, that satisfies the neighbor of S, Ni, other than primary nexthop E, that satisfies the
following condition. following condition.
D_opt(Ni,Y) < D_opt(Ni,E) + D_opt(E,Y) D_opt(Ni,Y) < D_opt(Ni,E) + D_opt(E,Y)
Where, Where,
D_opt(A,B) : Distance on most optimum path from R1 to B. D_opt(A,B) : Distance on most optimum path from A to B.
E : The primary nexthop on shortest path from S E : The primary nexthop on shortest path from S
to destination. to destination.
Ni : A direct neighbor of S other than primary Ni : A direct neighbor of S other than primary
nexthop E. nexthop E.
Y : The node being evaluated for node-protecting Y : The node being evaluated for node-protecting
extended P-Space. extended P-Space.
Figure 4: Node-Protecting Ext-P-Space Condition Figure 4: Node-Protecting Ext-P-Space Condition
It must be noted that a node Y satisfying the condition in Figure 4 It must be noted that a node Y satisfying the condition in Figure 4
skipping to change at page 7, line 21 skipping to change at page 7, line 41
E. This MUST exclude any destination for which there is atleast one E. This MUST exclude any destination for which there is atleast one
ECMP path from the node Y to the primary nexthop E traversing the ECMP path from the node Y to the primary nexthop E traversing the
link(S-E) being protected. link(S-E) being protected.
A node Y is in Q-space w.r.t to the link (S-E) being protected, if A node Y is in Q-space w.r.t to the link (S-E) being protected, if
and only if, the following condition is satisfied. and only if, the following condition is satisfied.
D_opt(Y,E) < D_opt(S,E) + D_opt(Y,S) D_opt(Y,E) < D_opt(S,E) + D_opt(Y,S)
Where, Where,
D_opt(A,B) : Distance on most optimum path from R1 to B. D_opt(A,B) : Distance on most optimum path from A to B.
E : The primary nexthop on shortest path from S E : The primary nexthop on shortest path from S
to destination. to destination.
Y : The node being evaluated for Q-Space. Y : The node being evaluated for Q-Space.
Figure 5: Q-Space Condition Figure 5: Q-Space Condition
2.2.4. Link-Protecting PQ Space 2.2.4. Link-Protecting PQ Space
A node Y is in link-protecting PQ space w.r.t to the link (S-E) being A node Y is in link-protecting PQ space w.r.t to the link (S-E) being
protected, if and only if, Y is present in both link-protecting protected, if and only if, Y is present in both link-protecting
skipping to change at page 8, line 39 skipping to change at page 9, line 15
Implementations should run the inequality in Section 2.2.2 Figure 4 Implementations should run the inequality in Section 2.2.2 Figure 4
for all direct neighbor, other than primary nexthop node E, to for all direct neighbor, other than primary nexthop node E, to
determine whether a PQ-node Y is also a candidate node-protecting PQ- determine whether a PQ-node Y is also a candidate node-protecting PQ-
node. All of the metrics needed by this inequality would have been node. All of the metrics needed by this inequality would have been
already collected from the forward SPFs rooted at each of direct already collected from the forward SPFs rooted at each of direct
neighbor S, computed as part of standard LFA [RFC5286] neighbor S, computed as part of standard LFA [RFC5286]
implementation. With reference to the topology in Figure 2, Table 3 implementation. With reference to the topology in Figure 2, Table 3
below shows how the above condition can be used to determine the below shows how the above condition can be used to determine the
candidate node-protecting PQ-space for S-E link (primary nexthop E) candidate node-protecting PQ-space for S-E link (primary nexthop E)
+-----------+----------+----------+----------+---------+------------+ +----------+----------+----------+-----------+----------+-----------+
| PQ-node | Direct | D_opt | D_opt | D_opt | Condition | | PQ-node | Direct | D_opt | D_opt | D_opt | Condition |
| (Y) | Nbr (Ni) | (Ni,Y) | (Ni,E) | (E,Y) | Met | | (Y) | Nbr (Ni) | (Ni,Y) | (Ni,E) | (E,Y) | Met |
+-----------+----------+----------+----------+---------+------------+ +----------+----------+----------+-----------+----------+-----------+
| R2 | N | 2 (N,R2) | 1 (N,E) | 2 | Yes | | R2 | N | 2 (N,R2) | 1 (N,E) | 2 (E,R2) | Yes |
| | | | | (E,R2) | | | R3 | N | 2 (N,R3) | 1 (N,E) | 1 (E,R3) | No |
| R3 | N | 2 (N,R3) | 1 (N,E) | 1 | No | +----------+----------+----------+-----------+----------+-----------+
| | | | | (E,R3) | |
+-----------+----------+----------+----------+---------+------------+
Table 3: Node-protection evaluation for R-LFA repair tunnel to PQ- Table 3: Node-protection evaluation for R-LFA repair tunnel to PQ-
node node
As seen in the above Table 3 , R3 does not meet the node-protecting As seen in the above Table 3 , R3 does not meet the node-protecting
extended-p-space inequality And so, while R2 is in candidate node- extended-p-space inequality And so, while R2 is in candidate node-
protecting PQ space, R3 is not. protecting PQ space, R3 is not.
Some SPF implementations may also produce a list of links and nodes Some SPF implementations may also produce a list of links and nodes
traversed on the shortest path(s) from a given root to others. In traversed on the shortest path(s) from a given root to others. In
skipping to change at page 9, line 23 skipping to change at page 10, line 5
the standard LFA [RFC5286] computations. So S may re-use the list of the standard LFA [RFC5286] computations. So S may re-use the list of
links and nodes collected from the same SPF computations, to decide links and nodes collected from the same SPF computations, to decide
whether a PQ-node Y is a candidate node-protecting PQ-node or not. A whether a PQ-node Y is a candidate node-protecting PQ-node or not. A
PQ-node Y shall be considered as a node-protecting, if and only if, PQ-node Y shall be considered as a node-protecting, if and only if,
there is atleast one direct neighbor of S, other than the primary there is atleast one direct neighbor of S, other than the primary
nexthop E, for which, the primary nexthop node E does not exist on nexthop E, for which, the primary nexthop node E does not exist on
the list of nodes traversed on any of the shortest path(s) from the the list of nodes traversed on any of the shortest path(s) from the
direct neighbor to the PQ-node. Table 4 below is an illustration of direct neighbor to the PQ-node. Table 4 below is an illustration of
the mechanism with the topology in Figure 2. the mechanism with the topology in Figure 2.
+------------+------------------+-----------------+-----------------+ +---------+---------------------+-----------------+-----------------+
| PQ-node | Repair Tunnel | Link-Protection | Node-Protection | | PQ-node | Repair Tunnel | Link-Protection | Node-Protection |
| | Path(Repairing | | | | | Path(Repairing | | |
| | router to PQ- | | | | | router to PQ-node) | | |
| | node) | | | +---------+---------------------+-----------------+-----------------+
+------------+------------------+-----------------+-----------------+ | R2 | S->N->R1->R2 | Yes | Yes |
| R2 | S->N->R1->R2 | Yes | Yes | | R2 | S->E->R3->R2 | No | No |
| R2 | S->E->R3->R2 | No | No | | R3 | S->N->E->R3 | Yes | No |
| R3 | S->N->E->R3 | Yes | No | +---------+---------------------+-----------------+-----------------+
+------------+------------------+-----------------+-----------------+
Table 4: Protection of Remote-LFA tunnel to the PQ-node Table 4: Protection of Remote-LFA tunnel to the PQ-node
As seen in the above Table 4 while R2 is candidate node-protecting As seen in the above Table 4 while R2 is candidate node-protecting
Remote-LFA nexthop for R3 and G, it is not so for E and F, since the Remote-LFA nexthop for R3 and G, it is not so for E and F, since the
primary nexthop E is in the shortest path from R2 to E and F. primary nexthop E is in the shortest path from R2 to E and F.
2.3.2. Computing node-protecting paths from PQ-nodes to destinations 2.3.2. Computing node-protecting paths from PQ-nodes to destinations
Once a computing router finds all the candidate node-protecting PQ- Once a computing router finds all the candidate node-protecting PQ-
skipping to change at page 10, line 25 skipping to change at page 11, line 8
the shortest paths from the PQ-node to the given destination. After the shortest paths from the PQ-node to the given destination. After
running the forward SPF on a PQ-node (from the node-protecting PQ- running the forward SPF on a PQ-node (from the node-protecting PQ-
space) the computing router shall run the inequality in Figure 6 space) the computing router shall run the inequality in Figure 6
below. PQ-nodes that does not qualify the condition for a given below. PQ-nodes that does not qualify the condition for a given
destination, does not gaurantee node-protection for the path segment destination, does not gaurantee node-protection for the path segment
from the PQ-node to the given destination. from the PQ-node to the given destination.
D_opt(Y,D) < D_opt(Y,E) + Distance_opt(E,D) D_opt(Y,D) < D_opt(Y,E) + Distance_opt(E,D)
Where, Where,
D_opt(A,B) : Distance on most optimum path from R1 to B. D_opt(A,B) : Distance on most optimum path from A to B.
D : The destination node. D : The destination node.
E : The primary nexthop on shortest path from S E : The primary nexthop on shortest path from S
to destination. to destination.
Y : The node-protecting PQ-node being evaluated Y : The node-protecting PQ-node being evaluated
Figure 6: Node-Protecting Condition for PQ-node to Destination Figure 6: Node-Protecting Condition for PQ-node to Destination
All of the above metric costs except D_opt(Y, D), can be obtained All of the above metric costs except D_opt(Y, D), can be obtained
with forward and reverse SPFs with E(the primary nexthop) as the with forward and reverse SPFs with E(the primary nexthop) as the
root, run as part of the regular LFA and Remote-LFA implementation. root, run as part of the regular LFA and Remote-LFA implementation.
The Distance_opt(Y, D) metric can only be determined by the The Distance_opt(Y, D) metric can only be determined by the
additional forward SPF run with PQ-node Y as the root. With additional forward SPF run with PQ-node Y as the root. With
reference to the topology in Figure 2, Table 5 below shows how the reference to the topology in Figure 2, Table 5 below shows how the
above condition can be used to determine node-protection with node- above condition can be used to determine node-protection with node-
protecting PQ-node R2. protecting PQ-node R2.
+-------------+------------+---------+---------+--------+-----------+ +-------------+------------+---------+--------+---------+-----------+
| Destination | Primary-NH | D_opt | D_opt | D_opt | Condition | | Destination | Primary-NH | D_opt | D_opt | D_opt | Condition |
| (D) | (E) | (Y, D) | (Y, E) | (E, D) | Met | | (D) | (E) | (Y, D) | (Y, E) | (E, D) | Met |
+-------------+------------+---------+---------+--------+-----------+ +-------------+------------+---------+--------+---------+-----------+
| R3 | E | 1 (C,D) | 2 (C,E) | 1 | Yes | | R3 | E | 1 | 2 | 1 | Yes |
| | | | | (E,D) | | | | | (R2,R3) | (R2,E) | (E,R3) | |
| E | E | 2 (C,E) | 2 (C,E) | 0 | No | | E | E | 2 | 2 | 0 (E,E) | No |
| | | | | (E,E) | | | | | (R2,E) | (R2,E) | | |
| D1 | E | 3 (C,F) | 2 (C,E) | 1 | No | | D1 | E | 3 | 2 | 1 | No |
| | | | | (E,F) | | | | | (R2,D1) | (R2,E) | (E,D1) | |
| D2 | E | 2 (C,G) | 2 (C,E) | 1 | Yes | | D2 | E | 2 | 2 | 1 | Yes |
| | | | | (E,G) | | | | | (R2,D2) | (R2,E) | (E,D2) | |
+-------------+------------+---------+---------+--------+-----------+ +-------------+------------+---------+--------+---------+-----------+
Table 5: Node-protection evaluation for R-LFA path segment between Table 5: Node-protection evaluation for R-LFA path segment between
PQ-node and destination PQ-node and destination
As seen in the above example above, R2 does not meet the node- As seen in the above example above, R2 does not meet the node-
protecting inequality for destination E, and F. And so, once again, protecting inequality for destination E, and F. And so, once again,
while R2 is a node-protecting Remote-LFA nexthop for R3 and G, it is while R2 is a node-protecting Remote-LFA nexthop for R3 and G, it is
not so for E and F. not so for E and F.
In SPF implementations that also produce a list of links and nodes In SPF implementations that also produce a list of links and nodes
skipping to change at page 14, line 18 skipping to change at page 14, line 49
Litkowski, S., Decraene, B., Filsfils, C., and K. Raza, Litkowski, S., Decraene, B., Filsfils, C., and K. Raza,
"Operational management of Loop Free Alternates", draft- "Operational management of Loop Free Alternates", draft-
ietf-rtgwg-lfa-manageability-00 (work in progress), May ietf-rtgwg-lfa-manageability-00 (work in progress), May
2013. 2013.
[I-D.ietf-rtgwg-remote-lfa] [I-D.ietf-rtgwg-remote-lfa]
Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S. Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S.
Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-02 Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-02
(work in progress), May 2013. (work in progress), May 2013.
[I-D.litkowski-rtgwg-node-protect-remote-lfa]
Litkowski, S., "Node protecting remote LFA", draft-
litkowski-rtgwg-node-protect-remote-lfa-00 (work in
progress), April 2013.
[RFC5286] Atlas, A. and A. Zinin, "Basic Specification for IP Fast [RFC5286] Atlas, A. and A. Zinin, "Basic Specification for IP Fast
Reroute: Loop-Free Alternates", RFC 5286, September 2008. Reroute: Loop-Free Alternates", RFC 5286, September 2008.
Authors' Addresses Authors' Addresses
Pushpasis Sarkar (editor) Pushpasis Sarkar (editor)
Juniper Networks, Inc. Juniper Networks, Inc.
Electra, Exora Business Park Electra, Exora Business Park
Bangalore, KA 560103 Bangalore, KA 560103
India India
 End of changes. 17 change blocks. 
71 lines changed or deleted 63 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/