Routing Area Working Group | S. Litkowski |
Internet-Draft | Orange |
Intended status: Standards Track | April 11, 2013 |
Expires: October 13, 2013 |
Node protecting remote LFA
draft-litkowski-rtgwg-node-protect-remote-lfa-00
This draft describes a simple extension to the remote LFA specification that computes a guaranteed node protection.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 13, 2013.
Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
The current RLFA specification described in [I-D.ietf-rtgwg-remote-lfa] is based on a per link computation (for optimization) that prevents determination of guaranteed node protection. This does not mean that the current solution is not able to provide node protection for a specific destination, but as computation is done from the link perspective, there is no guarantee to have node protection.
S---E / \ A D \ / B---C Figure 1
In the figure above, considering all metrics equal, primary path from S to D is SED. S has no LFA to reach D.
Using RLFA specification, C is a PQ from E perspective and could be used as a remote LFA in case of SE failure. In the diagram above, C is a considered as a link protecting alternate (as from E perspective, it is only link protecting), even if from a topological point of view, C would be a node protecting RLFA.
There could be multiple reasons to ensure node protection in a network :
This draft describes a solution to compute a guaranteed node protection using remote LFA solution.
3 N1 ---------- P1 | | | 2 | | N3 --- P3 | |/ / | S ---- E ---- R1 --- D1 --- D2 | \ | | R2 ----- D3-------+ | / 2 N2 ---- P2 3 Figure 2
The current remote LFA computation is based on computation of extended P-Space and Q-Space and then intersect both to determine PQ nodes that would be used for traffic tunneling. As Q-Space requires rSPF computation (one per Q-Space), it would not be scalable to compute Q-Space for each prefix. RLFA specification is proposing to compute Q Space on a per link basis, PQ will so be used by all prefixes using the link as primary nexthop.
Using figure 2 and considering protection of prefixes using E as primary nexthop on S, there would be three nodes in PQ space : P1,P2,P3. Using shortest path to PQ as tie breaker, P3 would be the best PQ.
P3 is only providing link protection to D1, D2 and D3 while P1 was providing node protection for D1 and D2, and P2 was providing node protection for D3.
In this scenario, RLFA is providing a suboptimal protection because of the approximation of using remote end of the link for computation.
To compute a guaranteed node protection using remote LFA, we just introduce a small modification in the current algorithm. Rather than computing link protecting PQs from nexthop perspective, we propose to compute node protecting PQs from nextnexthop perspective.
Our proposal is working as follows :
We define the notion of node protecting extended P-Space of a node S for a connected node E as the union of :
The set of routers from which a node N can be reached, by normal forwarding, without traversing the node E is termed the node protecting Q-space of N with respect to the node E. The Q-space can be obtained by computing a reverse shortest path tree (rSPT) rooted at N, with the sub-tree which traverses the failed node excised (including those which are members of an ECMP).
Upon termination of regular SPT, node S has knowledge of nexthops and nextnexthops to reach every destinations. For each nextnexthop on the SPT, S will compute :
Intersection of both will result in node protecting PQ-Spaces and node S will have a node protecting PQ-Space for each nextnexthop.
In figure 2, considering link SE, S has two nextnexthops (R1 and R2). S will compute node protecting PQ Space for R1 and for R2.
Node protecting extended P-Space :
Node protecting Q-Space :
Node protecting PQ-Space :
As a result, P1 is able to provide node protection for all destinations using R1 as nextnexthop (D1,D2). P2 is able to provide node protection for all destinations using R2 as nextnexthop (D3).
Approximation introduced in remote LFA specification was done to optimize computation. Our proposal is introducing more computation but in a very acceptable degree. Computation time will be dependent on number of nextnexthops rather than nexthops.
Topology | Min | Average | Med | 95th perc | Max |
---|---|---|---|---|---|
T1 | 1 | 20,4 | 19 | 39 | 107 |
T2 | 1 | 9,5 | 6 | 27 | 35 |
T3 | 2 | 15,7 | 11 | 41 | 53 |
T4 | 1 | 13,9 | 15 | 26,5 | 30 |
T5 | 1 | 12 | 8 | 36 | 72 |
T6 | 2 | 4,3 | 4 | 7 | 8 |
T7 | 1 | 9 | 6 | 19 | 22 |
The simulation results above (from real SP topologies) show that the number of rSPF to compute is really acceptable : SPF takes today only few msec to compute even on large topologies. Moreover installing protection is not an urgent task, and it would be better to take more time to compute a more optimal protection.
This document does not introduce any change in security consideration compared to [RFC5286] or [I-D.ietf-rtgwg-remote-lfa].
This document has no action for IANA.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[I-D.ietf-rtgwg-remote-lfa] | Bryant, S., Filsfils, C., Previdi, S., Shand, M. and S. Ning, "Remote LFA FRR", Internet-Draft draft-ietf-rtgwg-remote-lfa-01, December 2012. |
[RFC5286] | Atlas, A. and A. Zinin, "Basic Specification for IP Fast Reroute: Loop-Free Alternates", RFC 5286, September 2008. |