| < draft-xu-isis-flooding-reduction-in-msdc-00.txt | draft-xu-isis-flooding-reduction-in-msdc-01.txt > | |||
|---|---|---|---|---|
| Network Working Group X. Xu | Network Working Group X. Xu | |||
| Internet-Draft Huawei | Internet-Draft Huawei | |||
| Intended status: Standards Track January 6, 2017 | Intended status: Standards Track E. Auerswald | |||
| Expires: July 10, 2017 | Expires: November 3, 2017 fgn GmbH | |||
| L. Fang | ||||
| ebay | ||||
| J. Tantsura | ||||
| Individual | ||||
| May 2, 2017 | ||||
| IS-IS Flooding Reduction in MSDC | IS-IS Flooding Reduction in MSDC | |||
| draft-xu-isis-flooding-reduction-in-msdc-00 | draft-xu-isis-flooding-reduction-in-msdc-01 | |||
| Abstract | Abstract | |||
| IS-IS is commonly used as a underlay routing protocol for MSDC | IS-IS is commonly used as an underlay routing protocol for MSDC | |||
| (Massively Scalable Data Center) networks. This document proposes | (Massively Scalable Data Center) networks. For a given IS-IS router | |||
| some extensions to IS-IS so as to reduce the IS-IS flooding within | within the CLOS topology, it would receive multiple copies of exactly | |||
| MSDC networks greatly. The reduction of the IS-IS flooding is much | the same LSP from multiple IS-IS neighbors. In addition, two IS-IS | |||
| beneficial to improve the scalability of MSDC networks. | neighbors may send each other the same LSP simultaneously. The | |||
| unneccessary link-state information flooding wastes the precious | ||||
| process resource of IS-IS routers greatly due to the fact that there | ||||
| are too many IS-IS neighbors for each IS-IS router within the CLOS | ||||
| topology. This document proposes some extensions to IS-IS so as to | ||||
| reduce the IS-IS flooding within MSDC networks greatly. The | ||||
| reduction of the IS-IS flooding is much beneficial to improve the | ||||
| scalability of MSDC networks. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on July 10, 2017. | This Internet-Draft will expire on November 3, 2017. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 18 ¶ | skipping to change at page 2, line 33 ¶ | |||
| 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 4 | 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 4 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Modifications to Current IS-IS Behaviors . . . . . . . . . . 4 | 3. Modifications to Current IS-IS Behaviors . . . . . . . . . . 4 | |||
| 3.1. IS-IS Routers as Non-DIS . . . . . . . . . . . . . . . . 4 | 3.1. IS-IS Routers as Non-DIS . . . . . . . . . . . . . . . . 4 | |||
| 3.2. Controllers as DIS . . . . . . . . . . . . . . . . . . . 5 | 3.2. Controllers as DIS . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5 | 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . 5 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 5 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . 5 | 7.2. Informative References . . . . . . . . . . . . . . . . . 6 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 6 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 1. Introduction | 1. Introduction | |||
| IS-IS is commonly used as a underlay routing protocol for Massively | IS-IS is commonly used as an underlay routing protocol for Massively | |||
| Scalable Data Center (MSDC) networks. In addition, centrolized | Scalable Data Center (MSDC) networks where CLOS is the most popular | |||
| controllers are becoming fundamental network elements in most MSDCs. | toplogy. For a given IS-IS router within the CLOS topology, it would | |||
| One or more controllers are usually connected to all routers within | receive multiple copies of exactly the same LSP from multiple IS-IS | |||
| the MSDC network via a Local Area Network (LAN) which is dedicated | neighbors. In addition, two IS-IS neighbors may send each other the | |||
| for network management purpose (called management LAN), as shown in | same LSP simultaneously. The unnecessary link-state information | |||
| Figure 1. | flooding wastes the precious process resource of IS-IS routers | |||
| greatly and therefore IS-IS could not scale very well in MSDC | ||||
| networks. | ||||
| To simplify the network management task, centralized controllers are | ||||
| becoming fundamental network elements in most MSDCs. One or more | ||||
| controllers are usually connected to all routers within the MSDC | ||||
| network via a Local Area Network (LAN) which is dedicated for network | ||||
| management purpose (called management LAN), as shown in Figure 1. | ||||
| +----------+ +----------+ | +----------+ +----------+ | |||
| |Controller| |Controller| | |Controller| |Controller| | |||
| +----+-----+ +-----+----+ | +----+-----+ +-----+----+ | |||
| |DIS |Candidate DIS | |DIS |Candidate DIS | |||
| | | | | | | |||
| | | | | | | |||
| ---+---------+---+----------+-----------+---+---------+-Management LAN | ---+---------+---+----------+-----------+---+---------+-Management LAN | |||
| | | | | | | | | | | | | |||
| |Non-DIS |Non-DIS |Non-DIS |Non-DIS |Non-DIS | |Non-DIS |Non-DIS |Non-DIS |Non-DIS |Non-DIS | |||
| skipping to change at page 4, line 11 ¶ | skipping to change at page 4, line 11 ¶ | |||
| controller being elected as IS-IS DIS initially. Once an IS-IS DIS | controller being elected as IS-IS DIS initially. Once an IS-IS DIS | |||
| for the management LAN has been discovered, they start to send IS-IS | for the management LAN has been discovered, they start to send IS-IS | |||
| Hello packets directly (as unicasts) to the IS-IS DIS periodically. | Hello packets directly (as unicasts) to the IS-IS DIS periodically. | |||
| In addition, IS-IS routers would send IS-IS PDUs to the IS-IS DIS for | In addition, IS-IS routers would send IS-IS PDUs to the IS-IS DIS for | |||
| the management LAN as unicasts as well. In contrast, the controller | the management LAN as unicasts as well. In contrast, the controller | |||
| being elected as IS-IS DIS would send IS-IS PDUs as before. As a | being elected as IS-IS DIS would send IS-IS PDUs as before. As a | |||
| result, IS-IS routers would not receive IS-IS PDUs from one another | result, IS-IS routers would not receive IS-IS PDUs from one another | |||
| unless these IS-IS PDUs are forwarded as unknown unicasts over the | unless these IS-IS PDUs are forwarded as unknown unicasts over the | |||
| management LAN. Through the above modifications to the current IS-IS | management LAN. Through the above modifications to the current IS-IS | |||
| router behaviors, the IS-IS flooding is greatly reduced which is much | router behaviors, the IS-IS flooding is greatly reduced, which is | |||
| beneficial to improve the scalability of MSDC networks. | much beneficial to improve the scalability of MSDC networks. | |||
| 1.1. Requirements Language | 1.1. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
| 2. Terminology | 2. Terminology | |||
| This memo makes use of the terms defined in [RFC1195]. | This memo makes use of the terms defined in [RFC1195]. | |||
| skipping to change at page 5, line 5 ¶ | skipping to change at page 5, line 5 ¶ | |||
| Priority of those IS-IS routers to zero). As a result, IS-IS routers | Priority of those IS-IS routers to zero). As a result, IS-IS routers | |||
| would not see each other over the management LAN. In other word, IS- | would not see each other over the management LAN. In other word, IS- | |||
| IS routers would not establish adjacencies with one other. | IS routers would not establish adjacencies with one other. | |||
| Furthermore, IS-IS routers SHOULD send all the types of IS-IS PDUs to | Furthermore, IS-IS routers SHOULD send all the types of IS-IS PDUs to | |||
| the controller being elected as IS-IS DIS as unicasts as well. | the controller being elected as IS-IS DIS as unicasts as well. | |||
| To advoid the data traffic from being forwarded across the management | To advoid the data traffic from being forwarded across the management | |||
| LAN, the cost of all IS-IS routers' interfaces to the management LAN | LAN, the cost of all IS-IS routers' interfaces to the management LAN | |||
| SHOULD be set to the maximum value. | SHOULD be set to the maximum value. | |||
| When a given IS-IS router lost its connection to the management LAN, | ||||
| it SHOULD actively establish adjacency with all of its IS-IS | ||||
| neighbors within the CLOS network. As such, it could obtain the full | ||||
| LSDB of the CLOS network while flooding its self-originated LSPs to | ||||
| the remaining part of the whole CLOS network through these IS-IS | ||||
| neighbor. | ||||
| 3.2. Controllers as DIS | 3.2. Controllers as DIS | |||
| The controller being elected as IS-IS DIS would send IS-IS PDUs as | The controller being elected as IS-IS DIS would send IS-IS PDUs as | |||
| multicasts or unicasts as before. And it SHOULD accept and process | multicasts or unicasts as before. And it SHOULD accept and process | |||
| those unicast IS-IS PDUs originated from IS-IS routers. Upon | those unicast IS-IS PDUs originated from IS-IS routers. Upon | |||
| receiving any new LSP from a given IS-IS router, the controller being | receiving any new LSP from a given IS-IS router, the controller being | |||
| elected as DIS MUST flood it immediately to the management LAN for | elected as DIS MUST flood it immediately to the management LAN for | |||
| two purposes: 1) implicitly acknowledging the receipt of that LSP; 2) | two purposes: 1) implicitly acknowledging the receipt of that LSP; 2) | |||
| synchronizing that LSP to all the other IS-IS routers. | synchronizing that LSP to all the other IS-IS routers. | |||
| Futhermore, to decrease the frequency of advertising Complete | Furthermore, to decrease the frequency of advertising Complete | |||
| Sequence Number PDU (CSNP) on the controller being elected as DIS, | Sequence Number PDU (CSNP) on the controller being elected as DIS, | |||
| it's RECOMMENDED that IS-IS routers SHOULD send an explicit | it's RECOMMENDED that IS-IS routers SHOULD send an explicit | |||
| acknowledgement with a Partial Sequence Number PDU (PSNP) upon | acknowledgement with a Partial Sequence Number PDU (PSNP) upon | |||
| receiving a new LSP from the controller being elected as DIS. | receiving a new LSP from the controller being elected as DIS. | |||
| 4. Acknowledgements | 4. Acknowledgements | |||
| TBD. | The authors would like to thank Peter Lothberg for his valuable comments | |||
| and suggestions on this document. | ||||
| 5. IANA Considerations | 5. IANA Considerations | |||
| TBD. | TBD. | |||
| 6. Security Considerations | 6. Security Considerations | |||
| TBD. | TBD. | |||
| 7. References | 7. References | |||
| skipping to change at page 6, line 5 ¶ | skipping to change at page 6, line 11 ¶ | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <http://www.rfc-editor.org/info/rfc2119>. | <http://www.rfc-editor.org/info/rfc2119>. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [RFC4136] Pillay-Esnault, P., "OSPF Refresh and Flooding Reduction | [RFC4136] Pillay-Esnault, P., "OSPF Refresh and Flooding Reduction | |||
| in Stable Topologies", RFC 4136, DOI 10.17487/RFC4136, | in Stable Topologies", RFC 4136, DOI 10.17487/RFC4136, | |||
| July 2005, <http://www.rfc-editor.org/info/rfc4136>. | July 2005, <http://www.rfc-editor.org/info/rfc4136>. | |||
| Author's Address | Authors' Addresses | |||
| Xiaohu Xu | Xiaohu Xu | |||
| Huawei | Huawei | |||
| Email: xuxiaohu@huawei.com | Email: xuxiaohu@huawei.com | |||
| Erik Auerswald | ||||
| fgn GmbH | ||||
| Email: auerswald@fg-networking.de | ||||
| Luyuan Fang | ||||
| ebay | ||||
| Email: lufang@ebay.com | ||||
| Jeff Tantsura | ||||
| Individual | ||||
| Email: jefftant@gmail.com | ||||
| End of changes. 12 change blocks. | ||||
| 23 lines changed or deleted | 51 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||