Internet DRAFT - draft-geng-iac-caba
draft-geng-iac-caba
Internet Engineering Task Force Geng, Ed.
Internet-Draft Shanxi Univ.
Intended status: Informational Zhang
Expires: November 13, 2020 Beihang Univ.
Shi
Wang
Yin
Tsinghua Univ.
May 12, 2020
Efficient Implementation Method for Loop-free Criterion
draft-geng-iac-caba-00
Abstract
[RFC5286] introduces Loop-Free Criterion (LFC) in detail, which is a
technology for local fast rerouting when network failures occur.
With LFC, alternate next hops are stored alongside with the default
next hops in a routers forwarding table, and can be immediately
activated to invoke a loop free repair path in face of link failure.
As long as not introducing routing loops, these alternative next hops
can also be used for multipath transmission if there are stringent
demands on bandwidth or load balancing. However, in such link state
networks, computing loop free alternates typically requires one or
more rounds of full shortest path tree computation on a graph, and
poses a heavy burden to both the processor load and the memory
consumption of a network equipment. In this document, we describe an
efficient Loop-free Criterion (LFC) implementation method which is
based on incremental shortest path first (i-SPF), which is suitable
for practical deployment in large scale networks. The computational
complexity of the method is independent of the average node degree of
the network.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
Geng, et al. Expires November 13, 2020 [Page 1]
Internet-Draft IAC May 2020
This Internet-Draft will expire on November 13, 2020.
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Overview of Solution . . . . . . . . . . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 5
5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 5
6. Normative References . . . . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6
1. Introduction
Existing algorithms for computing LFC rely on one or more rounds of
full shortest path tree computation on a graph, and cannot achieve
both good coverage of alternates and low computational complexity at
the same time. Based on graph properties we newly find, this
document propose Incremental Alternates Computation IAC, which can
compute the full set of alternates for a given network topology in a
highly efficient way. IAC performs incremental shortest path
computation on specific link cost update, where the sign of some cost
is simply reversed.
2. Terminology
In this document, we employ OSPF as an example to explain our method.
Each router in a single routing area maintains an identical network
map which allows them to compute the shortest path to every other
router in a routing area. Then each router construct its FIB table
employing the above information. When a packet arrives at a router,
a destination address based method is using to determine how to
forward the packets to its corresponding interface. When the network
Geng, et al. Expires November 13, 2020 [Page 2]
Internet-Draft IAC May 2020
topology changes, the routers adjacent to the changed component
detects the change and then propagates the information to its
neighboring router through the LSA (link state advertisement)
information. After a period of time, all routers in this routing
area are aware of the change information and update their routing
tables accordingly, then the network is at a stable state.
LFC: x can be chosen when C(x,d) is lower than C(x,c)+C(c,d), which
means when packets are routed from x to d, they will not be routed
back to c, since C(x,c) + C(c,d) is the lowest cost of any path from
x to d that passes c. So the protection route will bypass c, thus
bypass link (c,b) too.
In order to implement LFC rule, each node needs to obtain costs for
its neighbors as well as itself. With a linkstate protocol, it
requires multiple shortest-path computations. In this document, the
notation C(x,d) refers to the shortest path cost from node x to node
d, x refers to the neighboring node of node c. w(c,x) refers to the
weight of link (c,x), Tc refers to the shortest path tree rooted at
node c, Tc(c,x) refers to the shortest path tree rooted at node c
when the weight of the link (c,x) is changed to -w(c,x), D(Tc,x)
refers to the descendants of node x (x is included) in the Tc,
D(Tc(c,x),x) refers to the descendants of node x (x is included) in
the Tc(c,x).
3. Overview of Solution
In general, in order to compute the LFCs set for a spcific
destination d, a router needs to know the following information:
(1) the shortest path cost from the calculating router, for example
router c, to the destination d (C(c,d)).
(2) the shortest path cost from the neighboring node x of c to the
destination d (C(x,d)).
(3) the shortest path cost from the neighboring node x of c to itself
(C(x,c)).
C(c,d) can be obtained from the shortest path tree Tc, C(x,c) is
equal to w(x,c) which can be obtained from OSPF protocol, C(x,c) can
be obtained by performing additional SPF calculations. Therefore,
the induced cost will be particularly high for high degree nodes.
This document describes how to efficiently implement LFC rule on
backbone networks. In order to implement LFC efficiently, the next
hop computation rule is proposed.
Geng, et al. Expires November 13, 2020 [Page 3]
Internet-Draft IAC May 2020
Next hop computation rule:
For a node d, if d is not in the set of D(Tc,x), while d is in the
set of D(Tc(c,x),x), we can get the node x is a valid next hop from c
to d.
c
/\
3/ \5
/ \
a b
| |
3 | |3
| |
d------e
3
Figure 1: Network Topology
c
/\
3/ \5
/ \
a b
| |
3| |3
| |
d e
Figure 2: Shortest path first rooted at node c
c
/\
-3/ \5
/ \
a b
|
3|
|
d
|
3|
|
e
Figure 3: Shortest path first rooted at node c when the weight of
link (c,a) is changed to -3
Geng, et al. Expires November 13, 2020 [Page 4]
Internet-Draft IAC May 2020
c
/\
3/ \-5
/ \
a b
|
3|
|
e
|
3|
|
d
Figure 4: Shortest path first rooted at node c when the weight of
link (c,b) is changed to -5
IAC cleverly uses Next hop computation rule, so it can realize LFC
efficiently. IAC is suitable for incremental deployment within a
network, including a network that is already deploying iSPF. We will
use the following example to explain how ICA works. Fig. 1 depicts a
network topology consisting of 5 nodes and 6 edges, while the
corresponding SPT Tc is depicted in Fig. 2(b), with c being the root.
Fig. 3 shows the shortest path tree constructed using i-SPF when the
weight of link (c,a) is changed to -3. Fig. 4 is the shortest path
tree constructed using i-SPF when the weight of link (c,b) is changed
to -5. We can see that node a can be a viable backup next-hop from c
to e according to the next hop computation rule. We can get that
node b can be a viable backup next-hop from c to d in the same way.
4. Security Considerations
The security considerations of [RFC5286] also apply.
5. Conclusions
The purpose of this document is to describe an efficient way to
implement LFC, which can compute the full set of alternates with
incremental shortest path first computation on specific link cost
update. Therefore, IAC is suitable for deploying in the larger scale
networks.
6. Normative References
[RFC5286] Atlas, A., Ed. and A. Zinin, Ed., "Basic Specification for
IP Fast Reroute: Loop-Free Alternates", RFC 5286,
DOI 10.17487/RFC5286, September 2008,
<https://www.rfc-editor.org/info/rfc5286>.
Geng, et al. Expires November 13, 2020 [Page 5]
Internet-Draft IAC May 2020
Authors' Addresses
Haijun Geng (editor)
Shanxi Univ.
Taiyuan
CN
Email: genghaijun@sxu.edu.cn
Han Zhang
Beihang Univ.
Beijing
CN
Email: zhhan@buaa.edu.cn
Xingang Shi
Tsinghua Univ.
Beijing
CN
Email: shixg@cernet.edu.cn
Zhiliang Wang
Tsinghua Univ.
Beijing
CN
Email: wzl@cernet.edu.cn
Xia Yin
Tsinghua Univ.
Beijing
CN
Email: yxia@tsinghua.edu.cn
Geng, et al. Expires November 13, 2020 [Page 6]