Internet DRAFT - draft-yang-rtgwg-oma-impl-report

draft-yang-rtgwg-oma-impl-report







Network Working Group                                            S. Yang
Internet-Draft                                                     H. Yu
Intended status: Informational                                     UESTC
Expires: May 28, 2016                                           X. Zhang
                                                                   N. Wu
                                                                  Huawei
                                                       November 25, 2015


            Ordered Metric Adjustment Implementation Report
                  draft-yang-rtgwg-oma-impl-report-00

Abstract

   Ordered Metric Adjustment (OMA) as specified in
   [I-D.zxd-rtgwg-ordered-metric-adjustment] has provided a mechanism
   whereby global transient forwarding loops can be avoided through
   graceful link metric adjustment.  This document provides an
   implementation report for OMA algorithm and mechanism on different
   network topologies.  What's more, it gives an analysis on efficiency
   and performance of OMA, comparing with other well-known loop-
   preventing algorithm.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on May 28, 2016.






Yang, et al.              Expires May 28, 2016                  [Page 1]

Internet-Draft          OMA Implementation Report          November 2015


Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Overview of Algorithm . . . . . . . . . . . . . . . . . . . .   3
     3.1.  Calculating the adjustment range of link metric for each
           node  . . . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.2.  Merge different Seq(Yj) into a global sequence  . . . . .   5
   4.  Innovation point of algorithm . . . . . . . . . . . . . . . .   5
   5.  Simulation of Algorithm . . . . . . . . . . . . . . . . . . .   6
     5.1.  Environment Setup . . . . . . . . . . . . . . . . . . . .   6
     5.2.  Measurement and Methods . . . . . . . . . . . . . . . . .   7
     5.3.  Simulation results  . . . . . . . . . . . . . . . . . . .   8
       5.3.1.  Micro-loop risk . . . . . . . . . . . . . . . . . . .   8
       5.3.2.  Sequence length and computing time  . . . . . . . . .   8
   6.  Conclusion  . . . . . . . . . . . . . . . . . . . . . . . . .  10
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   9.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  11
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  11
     10.2.  Informative References . . . . . . . . . . . . . . . . .  11
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   This document provides an implementation report for OMA algorithm and
   mechanism on different network topologies.  What's more, it gives an
   analysis on efficiency and performance of OMA, comparing with other
   well-known loop-preventing algorithm.






Yang, et al.              Expires May 28, 2016                  [Page 2]

Internet-Draft          OMA Implementation Report          November 2015


2.  Terminology

   o  Reverse Shortest Path First Tree (RSPF Tree): A directed acyclic
      graph containing all the shortest path from the node of the
      network toward the root.

   o  Link L: An edge in the network connecting node a to b will shut
      down and its metric value is K when link L is up.

   o  X set: A node set contains the node impacted by the removal of a
      link L such that each node in X set must change its forwarding
      paths to avoid link L.

   o  Y set: A node set contains all destination nodes in that may be
      concerned by the down event of the link L.

   o  D(Yj,Xi): The shortest distacnce from node Xi to Yj when link L is
      up.

   o  D'(Yj,Xi): The shortest distacnce from node Xi to Yj when link L
      is down.

   o  COST(Yj,Xi,max): If node Xi switches its optimal path to Yj, the
      reasonable upper metric of link L can be adjusted is
      COST(Yj,Xi,max),COST(Yj,Xi,max) = MIN(COST(Yj,Xk,min)),where Xk is
      the father of node Xi in case of link L being up.

   o  COST(Yj,Xi,min): If node Xi switches its optimal path to Yj, the
      reasonable lower metric of link L can be adjusted is
      COST(Yj,Xi,min), COST(Yj,Xi,min) = D'(Yj,Xi)- D(Yj,Xi) + K.

   o  R = (R_min,R_max): Here R_min equals COST(Yj,Xi,min) and R_max =
      COST(Yj,Xi,min).  When the link L!_s metric is set in the range of
      (R_min, R_max), node Xi can be switched to its optimal path to Yj
      without forwarding loop.

   o  Seq(Yj): A metric range sequence for Yj contains all metric ranges
      of source nodes Xi affected by the removal of a link L.When link
      L' s metric set to a value in each metric range of sequence
      Seq(Yj) in order, each node Xi will to its optimal path to Yj
      without forwarding loop.

3.  Overview of Algorithm

   The Internet is the most popular network, which is a distributed
   system.  Depend on its configuration, each network device
   communicates with its neighbor, calculate routes and generate the FIB
   individually, finally, the packet will be forwarded hop by hop.  But



Yang, et al.              Expires May 28, 2016                  [Page 3]

Internet-Draft          OMA Implementation Report          November 2015


   due to the difference of each device hardware capabilities and
   internal/external environments, the route calculation cannot be
   scheduled at same time, then micro-loop occur.

   In draft [I-D.zxd-rtgwg-ordered-metric-adjustment] we introduces a
   method to prevent forwarding loop by adjusting link metric gradually
   for several times.  In this section we will give an overview of
   algorithm and here we just talk about link down event and results
   computed in down event are also appropriate to link up event.  We
   suppose link L connecting node A to B referenced in the following
   sections will shut down.

   First of all, we have some definitions.  Set X consist of Xi which on
   sub-tree below A in RSPF tree with root B such that each node in X
   must change its forwarding paths to Yj to avoid link L.  And the
   notation Y that gives the set of "affected destinations".  This set
   contains all destination nodes that may be concerned by the change of
   the link L and set Y consist of Yj which on sub- tree below B in RSPF
   tree with root A.  In Figure 1, we have X = {A, C, F, G, H} and Y=
   {B, D, E}

                    10
               /A----------B\
              /              \
           10/                \10
            /                  \
           /                    \
          C                      D
         /\                      /\
        /  \                    /  \
       /    \10              80/    \50
    10/      \                /      \
     /        \      10      /   50   \
    G          \F-----------H----------E

              Figure 1 Topology

3.1.  Calculating the adjustment range of link metric for each node

   This part is used to calculate a reasonable adjustment metric range
   for each node Xi to switch its optimal path to a destination Yj
   without forwarding loop.  Each metric range of Xi related to Yj make
   up of a metric range sequence for Yj.

   For destination Yj, we calculate the RSPF tree with root Yj when link
   L is up and down to determine the values of two variables R_min =
   COST(Yj,Xi,min) and R_max = COST(Yj,Xi,max).  When the link L's




Yang, et al.              Expires May 28, 2016                  [Page 4]

Internet-Draft          OMA Implementation Report          November 2015


   metric is set in the range of (R_min,R_max), node Xi can switch to
   its optimal path to the root node Yj without forwarding loop.

   Then metric ranges of Xi computed above make up of a metric range
   sequence for Yj recorded as Seq(Yj).  Then the metric of link L can
   be set to a value in each range of sequence in order .For example, in
   figure 1, we have seq(B) ={[100,120],[80,100],[60,80]} and if we set
   the metric of link L to 60, 81 and 101, each node Xi will switch to
   its optimal path to the B without forwarding loop.

3.2.  Merge different Seq(Yj) into a global sequence

   According to section 1.1, we have different metric range sequence
   corresponding to each destination Yj.  However, nodes need to react
   to the change of a link weight for all affected destinations.  This
   part will show how to merge different sequences of each destination
   into a minimal sequence effectively, then multiple nodes in set X
   simultaneously switch optimal path to each root node without
   forwarding loop.

   Compare the metric range of each Seq(Yj) and choose range R =
   (R_min,R_max) with largest lower bound in these metric ranges.  Then
   remove the metric range with upper bound larger than the lower bound
   R_min of R in all sequence.  Repeat operation above when the sequence
   of all destination is empty, then algorithm terminates.

   When the algorithm finishes, remaining metric ranges
   (R_1min,R_1max),(R_2min,R_2max),... (R_nmin,R_nmax) are what we want.
   In case of link L going to up, the adjustment process of metric of
   link L can be set to R_1min+1,R_2min+1,... ,R_nmin, and configuration
   value K.  In case of link L going to down, the adjustment process of
   metric of link L can be set to configuration value K,
   R_nmin+1,R_((n-1)min)+1,... , and R_1min.

   In figure 1, In case of link L going to down, the adjustment process
   of metric of link L can be set to {10,41,61,81,101}, in proper order,
   then there is no forwarding loop during this adjustment.

4.  Innovation point of algorithm

   There are several different algorithms solving forwarding loops by
   adjusting link metric gradually.  Compared with other solution, we
   put forward two innovation points in each part of our algorithm.

   First innovation point of our algorithm is to check whether
   destination Yj is affected actually due to the down link.  In part 1
   of algorithm, if the size of set Y is |Y|, we need to compute 2|Y|
   times RSPF tree and its complexity is in |N|log|N|+|E| per times in



Yang, et al.              Expires May 28, 2016                  [Page 5]

Internet-Draft          OMA Implementation Report          November 2015


   the best case.  We just compute an RSPF tree when link L is up
   firstly.  According to the Dynamic Dijsktra Algorithm, we know that
   nodes only on sub- tree below A in RSPF tree with root Yj will change
   its optimal paths to destination if link L change.  Obviously, if it
   is empty on sub- tree below A in RSPF tree with root Yj, only node A
   will change its optimal path to root so that no forwarding loop for
   destination Yj can occur when link L down.  We call it "Unaffected
   destination" and in this case we can delete destination Yj from the
   set Y.  If there are |m| destinations are unaffected, we just need |
   2|Y|-|m|| times computation.

   The second innovation of our algorithm is that using metric range
   express the reasonable adjustment metric range for each node to
   change their optimal path to the root node and using a common range
   instead of several overlapping ranges to reduce the operation.  In
   part 2 of algorithm, we merge different range sequences into a global
   sequence, however, many ranges overlap with each other so if merge
   overlapping ranges into a common range, adjusting link metric several
   times can be instead of one time.  Like this we can reduce a large
   number of metric ranges in a reasonably short time and the final
   global sequence will include a few ranges.

   Through these two points, we have a minimal metric sequence length
   with the fastest computing time among the similar algorithms.

5.  Simulation of Algorithm

   This section aims at evaluating the performance of our algorithm from
   two aspects: sequence length and the time required to compute them on
   real IP networks.  Firstly, we present the topologies we used in our
   algorithms.  Then present the results of our simulation, analyzing
   the reasonable length, as well as the efficiency of our optimizations
   on computing times.

5.1.  Environment Setup

   Table I summarizes the main characteristics of our simulation
   topologies. |N| and |E| respectively represent the number of nodes
   and links in the graph. d_m is the maximum degree, and ω gives
   the weight distribution.  Networks 1-6 of Table I are Rocketfuel
   inferred topologies obtained with traceroute campaigns
   [inferring-link-weight-e2e].  Networks 7-10 are generated obey power-
   law distribution.  Networks 9 and 10 are topologies with special
   shape.  Network 9 is a star topology and network 10 is a circle
   consists of several small circles.  Networks 4 and 5 come with
   inferred IGP weights and other topologies come with random weights in
   [1,100].




Yang, et al.              Expires May 28, 2016                  [Page 6]

Internet-Draft          OMA Implementation Report          November 2015


   +----+---------+-----+-----+----+------------+
   | ID | Network | |N| | |E| | dm |     w      |
   +----+---------+-----+-----+----+------------+
   | 1  | Abovenet| 17  | 74  | 8  | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 2  | Exodus  | 21  | 72  | 7  | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 3  | Tiscali | 27  | 128 | 18 | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 4  | Sprint  | 30  | 138 | 11 | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 5  | Geant   | 23  | 74  | 6  | [156,9953] |
   +----+---------+-----+-----+----+------------+
   | 6  | AT&T    | 154 | 376 | 29 | [1,222]    |
   +----+---------+-----+-----+----+------------+
   | 7  | Pow-1   | 50  | 200 | 7  | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 8  | Pow-2   | 100 | 400 | 7  | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 9  | Pow-3   | 200 | 800 | 7  | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 10 | Pow-4   | 500 | 2000| 7  | [1,100]    |
   +----+---------+-----+-----+----+------------+
   | 11 | star    | 13  | 44  | 6  | [5,101]    |
   +----+---------+-----+-----+----+------------+
   | 12 | circle  | 41  | 90  | 3  | [8,99]     |
   +----+---------+-----+-----+----+------------+
   Table 1 Main graph properties of simulation network

5.2.  Measurement and Methods

   In the results of simulation we focus on the length of metric
   sequence and computing time.  The shortest sequence length, the less
   operation will we do.  Thus we expect to get a minimal sequence and
   computing time is as short as possible.

   Firstly we have a loop-risk test on all simulation networks.  We
   carry on 1000 times tests on each network making a link fail
   randomly, recording the total number that we need to use our
   algorithm to reconfigure fail link.  This test will show that in most
   topologies the risk of loop will occur frequently when a link fail.
   So it is very important to search an efficient algorithm to prevent
   micro-loop.

   Then we carry on |E| times tests in each network mentioned above
   ensuring that every link in topology will fail once, recording the
   sequence length and computing time each time and analysis it.




Yang, et al.              Expires May 28, 2016                  [Page 7]

Internet-Draft          OMA Implementation Report          November 2015


5.3.  Simulation results

5.3.1.  Micro-loop risk

   Table 2 shows that possibility of micro-loop occurrence is more 50%
   in most topology.  So it is very important to search an efficient
   algorithm to prevent forwarding loop.

   +-----------+-------+-------+-------+-------+-------+-------+
   | Topo-ID   |   1   |   2   |   3   |   4   |   5   |   6   |
   +-----------+-------+-------+-------+-------+-------+-------+
   | Loop risk | 52.1% | 66.8% | 66.8% | 64.1% | 73.0% | 29.1% |
   +-----------+-------+-------+-------+-------+-------+-------+

   +-----------+-------+-------+-------+-------+-------+-------+
   | Topo-ID   |   7   |   8   |   9   |   10  |   11  |   12  |
   +-----------+-------+-------+-------+-------+-------+-------+
   | Loop risk | 77.6% | 89.1% | 91.6% | 96.1% | 56.3% | 100.0%|
   +-----------+-------+-------+-------+-------+-------+-------+
             Table 2 Micro-loop risk percentage

5.3.2.  Sequence length and computing time

   Tables 2 and 3 respectively give an overview of metric sequence
   length and computing time observed on our set of simulation networks.

   Minimal Metric Sequence Length: The length of the sequence we
   obtained in most cases are relatively short.  The actual network
   topology of 1-4,6 and 11, for more than half of the cases, no
   intermediate metric is needed, as the size of the sequence is equal
   to 0 and more than 90% of the cases, less than two intermediate
   metrics are needed to ensure a loop-free convergence in case of a
   link removal.  For all networks, in most case approximately less than
   ten intermediate metrics can solve micro-loop during the convergence.

   For all networks, there are several factors which influence the
   length of the metric sequence: 1) network size: Apparently when the
   size becomes larger, the number of source and destination nodes
   significantly increased, so more intermediate state are needed.  In
   our simulation, network 10 is the biggest which has 500 nodes and
   2000 links and we can notice that it need more intermediate state
   than others. 2) network shape: a ring network is easy to form a deep
   , so there can be many nodes on the ring forward its packets along
   the same direction to destination.  When an upstream link is closed,
   if all these nodes go backward to avoid a failed link, it will
   produce a number of cycles, as the length of the sequence is longer
   than others certainly.  Results of network 12 prove it. 3) weight
   distribution: When a network with a large weight range, there may be



Yang, et al.              Expires May 28, 2016                  [Page 8]

Internet-Draft          OMA Implementation Report          November 2015


   less overlap range.  So the common range remained will be more thus
   we get a longer sequence such as network 5.

   Although in a few cases the length of metric sequence is a little
   long, but most of our sequence have a very reasonable size.

   Computing Time: We will show that compared with others, our algorithm
   has the shortest computing time.  Here we focus on a similar
   algorithm [lightweight-algorithm-minimal-operation-impact] (We call
   it to "Graceful" for short in the following content) and give a
   contrast between them.  Table III gives computing time percentiles
   including worst-cases results.

   According to the statistical, for all networks except network 10, the
   maximum computation time for calculating a sequence is below a few
   hundred milliseconds.  Compared with the Graceful algorithm, there is
   no significant difference when network size is small.  However, with
   network size increasing our algorithm performs better significantly
   which can be completed in a shorter time.  That is because two
   innovative points in our algorithm.  It can reduce the computation
   time effectively.

   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |     |              Length distribution (%)                 | MAX |
   | NID +------------------------------------------------------+     |
   |     ||MMS|=0| <=1  |  <=2  |  <=5  |  <=8  | <=10  | <=15  ||MMS||
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |1    |69.64% |89.29%|98.21% |100.00%|100.00%|100.00%|100.00%|  3  |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |2    |50.00% |80.65%|90.32% |100.00%|100.00%|100.00%|100.00%|  5  |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |3    |55.41% |83.78%|91.89% |100.00%|100.00%|100.00%|100.00%|  4  |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |4    |54.72% |83.02%|96.23% |100.00%|100.00%|100.00%|100.00%|  4  |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |5    |21.88% |29.69%|59.38% |82.81% |93.75% |87.50% |100.00%|  15 |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |6    |77.69% |96.15%|98.46% |100.00%|100.00%|100.00%|100.00%|  4  |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |7    |32.76% |60.92%|79.31% |94.25% |97.70% |95.98% |100.00%|  14 |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |8    |25.26% |49.21%|63.16% |84.74% |91.58% |87.63% |98.68% |  21 |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |9    |11.15% |23.23%|38.32% |68.50% |84.65% |75.72% |98.56% |  34 |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |10   |4.38%  |10.56%|18.28% |44.85% |65.35% |73.79% |89.39% |  87 |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |11   |53.33% |93.33%|100.00%|100.00%|100.00%|100.00%|100.00%|  2  |



Yang, et al.              Expires May 28, 2016                  [Page 9]

Internet-Draft          OMA Implementation Report          November 2015


   +-----+-------+------+-------+-------+-------+-------+-------+-----+
   |12   |0.00%  |0.00% |1.11%  |57.78% |84.44% |62.22% |94.44% |  22 |
   +-----+-------+------+-------+-------+-------+-------+-------+-----+
                   Table 3 Length Distribution

   +-----+---------------------------------------------------------+
   |     |          Computing Time Distribution (ms)               |
   |     +------------+-------------+-------------+----------------+
   | NID |    50th    |    80th     |   100th     |    Mean        |
   |     +------------+----+--------+----+--------+-------+--------+
   |     |OMA|Graceful|OMA |Graceful|OMA |Graceful|OMA    |Graceful|
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |1    |1  |1       |1   |1       |2   |5       |0.64   |0.96    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |2    |1  |1       |4   |3       |4   |8       |1.56   |1.82    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |3    |1  |1       |1   |4       |7   |8       |1.22   |2.23    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |4    |1  |1       |3   |4       |7   |10      |1.79   |2.33    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |5    |2  |3       |3   |6       |20  |15      |2.44   |3.41    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |6    |6  |13      |49  |175     |189 |294     |35.68  |69.11   |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |7    |3  |4       |8   |18      |24  |52      |4.76   |9.32    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |8    |12 |21      |37  |86      |113 |351     |20.95  |49.50   |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |9    |71 |172     |192 |650     |589 |2541    |111.55 |346.83  |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |10   |907|2467    |2656|6886    |7365|24206   |1445.28|3689.79 |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |11   |1  |0       |1   |1       |2   |2       |0.80   |0.47    |
   +-----+---+--------+----+--------+----+--------+-------+--------+
   |12   |6  |18      |9   |31      |14  |131     |6.17   |26.27   |
   +-----+---+--------+----+--------+----+--------+-------+--------+
            Table 4 Computing Time Distribution

6.  Conclusion

   In document [I-D.zxd-rtgwg-ordered-metric-adjustment] we introduces a
   method to prevent forwarding loop by adjusting link metric gradually
   for several times.  In this document we mainly give the simulation
   data.  We have a simple review firstly then focus on the innovation
   in our algorithm.  Then give the simulation results such that our
   algorithm have the best performance among the current mainstream
   algorithms to prevent forwarding loop.




Yang, et al.              Expires May 28, 2016                 [Page 10]

Internet-Draft          OMA Implementation Report          November 2015


7.  IANA Considerations

   This document includes no request to IANA.

8.  Security Considerations

   This document is not currently believed to introduce new security
   concerns.

9.  Acknowledgments

   TBD.

10.  References

10.1.  Normative References

   [I-D.zxd-rtgwg-ordered-metric-adjustment]
              Zhang, X. and G. Yan, "Algorithm for Ordered Metric
              Adjustment", draft-zxd-rtgwg-ordered-metric-adjustment-00
              (work in progress), October 2013.

   [inferring-link-weight-e2e]
              Mahajan, R., Spring, N., Wetherall, D., and T. Anderson,
              "Inferring link weights using end-to-end measurements",
              November 2002.

   [lightweight-algorithm-minimal-operation-impact]
              Clad, F., Merindol, P., Pansiot, J., Francois, P., and O.
              Bonaventure, "Graceful Convergence in Link-State IP
              Networks: A Lightweight Algorithm Ensuring Minimal
              Operational Impact, IEEE 1063-6692", February 2014.

10.2.  Informative References

   [RFC1195]  Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
              dual environments", RFC 1195, DOI 10.17487/RFC1195,
              December 1990, <http://www.rfc-editor.org/info/rfc1195>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC2328]  Moy, J., "OSPF Version 2", STD 54, RFC 2328,
              DOI 10.17487/RFC2328, April 1998,
              <http://www.rfc-editor.org/info/rfc2328>.




Yang, et al.              Expires May 28, 2016                 [Page 11]

Internet-Draft          OMA Implementation Report          November 2015


   [RFC5715]  Shand, M. and S. Bryant, "A Framework for Loop-Free
              Convergence", RFC 5715, DOI 10.17487/RFC5715, January
              2010, <http://www.rfc-editor.org/info/rfc5715>.

   [RFC6976]  Shand, M., Bryant, S., Previdi, S., Filsfils, C.,
              Francois, P., and O. Bonaventure, "Framework for Loop-Free
              Convergence Using the Ordered Forwarding Information Base
              (oFIB) Approach", RFC 6976, DOI 10.17487/RFC6976, July
              2013, <http://www.rfc-editor.org/info/rfc6976>.

Authors' Addresses

   Shiqi Yang
   UESTC
   No.2006, Xi Yuan Ave., Westn High-Tech Zone
   Chengdu  611731
   China

   Email: yangsq90309@163.com


   Hongfang Yu
   UESTC
   No.2006, Xi Yuan Ave., Westn High-Tech Zone
   Chengdu  611731
   China

   Email: yuhf.uestc@139.com


   Xudong Zhang
   Huawei
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: zhangxudong@huawei.com


   Nan Wu
   Huawei
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: eric.wu@huawei.com





Yang, et al.              Expires May 28, 2016                 [Page 12]