Internet DRAFT - draft-yuan-cats-hierarchical-loop-prevention
draft-yuan-cats-hierarchical-loop-prevention
CATS D. Yuan
Internet-Draft F. Zhou
Intended status: Standards Track ZTE Corporation
Expires: 6 July 2024 3 January 2024
Microloop Prevention in a Hierarchical Segment Routing Solution for CATS
draft-yuan-cats-hierarchical-loop-prevention-01
Abstract
Considering computing and networking is quite different in terms of
resource granularity as well as their status stability, a
hierarchical segment routing is proposed and introduced as an end-to-
end CATS process. However, it brings about potential problems as
illustrated in [I-D.yuan-cats-end-to-end-problem-requirement]. In
order to solve the mentioned problems and to improve and perfect a
hierarchical solution, corresponding aggregation methods are
discussed and hierarchical entries are proposed in this draft.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 6 July 2024.
Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
Yuan & Zhou Expires 6 July 2024 [Page 1]
Internet-Draft Microloop Prevention January 2024
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Aggregation of Computing Resource Status Information . . . . 4
5. Design of Hierarchical Entries . . . . . . . . . . . . . . . 7
6. Forwarding Behaviours with Computing Segments . . . . . . . . 9
7. Usecase . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
8. Security Considerations . . . . . . . . . . . . . . . . . . . 14
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
11. Normative References . . . . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15
1. Introduction
An end-to-end CATS process is described as a hierarchical two segment
routing manner in [I-D.ldbc-cats-framework] and
[I-D.huang-cats-two-segment-routing] and it is further analyzed in
[I-D.yuan-cats-end-to-end-problem-requirement] which implys that a
hierarchical segment routing solution requires incremental solutions
and designs.
Compared to non hierarchical routing methods, a hierarchical segment
solution has its unique features and proposes additional requirements
as follows:
* Aggregate explicit and detailed information of multiple service
instances appropriately to avoid a loop caused by improper routing
and forwarding decisions led by inadequate cohesive information.
* Solve the microloop problem occurred in hierarchical segment
routing under a multi-point decision-making circumstance due to
inconsistent convergence time.
In IP networks, due to the distributed LSDB of IGP, there might be
microloop issues when IGP converges out of order. Solutions has
proposed such as Order FIB and Order Metric, but due to their
Yuan & Zhou Expires 6 July 2024 [Page 2]
Internet-Draft Microloop Prevention January 2024
principles of controlling the convergence order of network devices to
guarantee orderly convergence, the convergence process becomes much
more complex and the convergence time increases significantly. Thus,
these schemes have not been widely applied and deployed in networks.
Currently, SR technology is commonly used to address microloop
issues, such as constructing an acyclic SRv6 Segment List to
eliminate loops.
However, an explicit destination is determined since the source
device in IP routing circumstances while a specific service instance
may not be designated during the first segment in a hierarchical
segment service routing process. There is a lack of connection
between forwarding behaviors on multiple devices. Thus, a
conventional SR based solution requires incremental designs.
Therefore, this draft proposes possible aggregation methods, designs
hierarchical entries including global bases and local bases and
introduces a forwarding behaviour with Computing Segments.
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
3. Terminology
* LSDB: Link State DataBase
* IGP: Interior Gateway Protocol
* RIB: Routing Information Base
* FIB: Forwarding Information Base
* SR: Segment Routing
* SRv6: Segment Routing over IPv6
* GRIB: Global Routing Information Base
* GFIB: Global Forwarding Information Base
* LRIB: Local Routing Information Base
* LFIB: Local Forwarding Information Base
Yuan & Zhou Expires 6 July 2024 [Page 3]
Internet-Draft Microloop Prevention January 2024
4. Aggregation of Computing Resource Status Information
Assume that for a computing related service, a Service ID is utilized
as an identifier as proposed in
[I-D.ma-intarea-identification-header-of-san]. Various computing
related services may be sensitive to different attributes among
metadata of computing resources and network capabilities, such as CPU
cores, CPU load, I/O, memory, delay, bandwidth, etc.
For a service instance which is able to provide a computing related
service, metadata of sensitive attributes collected is capable of
indicating the performance at the moment. Furthermore, as
illustrated in [I-D.yuan-cats-middle-ware-facility], a Metric value
can be calculated with the metadata of sensitive attributes as input
variables.
Therefore, the aggregation of computing resource status information
is divided into the following two categories.
1. Aggregation of Metric Values.
As shown below, a set of meta information been sensitive to a
computing related service is recorded as a Attribute Set, the
Attribute Set collected at Instance 1 for Service ID 1 is Attribute
Set 1,1 for instance.
There are multiple instances located in a edge cloud or a central
data center connected to corresponding PEs. Based on the respective
metadata of dynamic computing status and network conditions meta
information of these service instances at a certain time,
corresponding Metric values representing their capabilities can be
calculated. As shown below, Instance 1, 2 and 3 located at PE 1 are
all able to provide services represented by Service ID 1, 2 and 3.
Accordingly, Metric 1,1 to Metric 3,3 are calculated respectively.
Yuan & Zhou Expires 6 July 2024 [Page 4]
Internet-Draft Microloop Prevention January 2024
+----------+ Service ID1-->Attribute Set 1,1-->Metric 1,1
+---+Instance 1| Service ID2-->Attribute Set 2,1-->Metric 2,1
| +----------+ Service ID3-->Attribute Set 3,1-->Metric 3,1
|
+------+ | +----------+ Service ID1-->Attribute Set 1,2-->Metric 1,2
| PE 1 +---+---+Instance 2| Service ID2-->Attribute Set 2,2-->Metric 2,2
+--++--+ | +----------+ Service ID3-->Attribute Set 3,2-->Metric 3,2
|| |
|| | +----------+ Service ID1-->Attribute Set 1,3-->Metric 1,3
|| +---+Instance 3| Service ID2-->Attribute Set 2,3-->Metric 2,3
|| +----------+ Service ID3-->Attribute Set 3,3-->Metric 3,3
||
|| PE 1:
|| Service ID1-->Metric 1 = Function(Metric 1,1 Metric 1,2 Metric 1,3)
|| Service ID2-->Metric 2 = Function(Metric 2,1 Metric 2,2 Metric 2,3)
|| Service ID3-->Metric 3 = Function(Metric 3,1 Metric 3,2 Metric 3,3)
||
vv
+--++--+
| PE 2 |
+------+
Figure 1: Aggregation of Metrics
Based on a framework of hierarchical computing status awareness and
segment service routing, edge devices apply a corresponding
aggregation algorithm to these Metric values, and publish and notify
the aggregated results to the network. For a computing-related
service represented by a Service ID, aggregation algorithms include
but are not limited to:
* Take the average of the corresponding Metric values calculated for
a specific service among all service instances.
* Take the weighted average of the corresponding Metric values
calculated for a specific service among all service instances.
* Take the maximum of the corresponding Metric value calculated for
a specific service among all service instances.
* Take the minimum of the corresponding Metric value calculated for
a specific service among all service instances.
* Take the median of the corresponding Metric values calculated for
a specific service among all service instances.
Yuan & Zhou Expires 6 July 2024 [Page 5]
Internet-Draft Microloop Prevention January 2024
The differential evaluation methods of each service can degenerate
into a unified or service class based evaluation method based on
conditions. Specifically here, different Service IDs can also
correspond to a same Metric value calculated by a unified evaluation
algorithm or a set of Service IDs corresponds to one Metric.
2. Aggregation of Metadata Sets.
+----------+ Service ID1-->Attribute Set 1,1
+---+Instance 1| Service ID2-->Attribute Set 2,1
| +----------+ Service ID3-->Attribute Set 3,1
| Metadata Set 1 =
| U(Attribute Set 1,1, Attribute Set 2,1, Attribute Set 3,1)
|
+------+ | +----------+ Service ID1-->Attribute Set 1,2
| PE 1 +---+---+Instance 2| Service ID2-->Attribute Set 2,2
+--++--+ | +----------+ Service ID3-->Attribute Set 3,2
|| | Metadata Set 2 =
|| | U(AttributetSet 1,2, Attribute Set 2,2, Attribute Set 3,2)
|| |
|| | +----------+ Service ID1-->Attribute Set 1,3
|| +---+Instance 3| Service ID2-->Attribute Set 2,3
|| +----------+ Service ID3-->Attribute Set 3,3
|| Metadata Set 3 =
|| U(AttributetSet 1,3, Attribute Set 2,3, Attribute Set 3,3)
||
|| PE 1:
|| Cohesive Metadata Set =
|| Function(Metadata Set 1,Metadata Set 2,Metadata Set 3)
vv
+--++--+
| PE 2 |
+------+
Figure 2: Aggregation of Metadata Set
The other aggregation method is shown above. For instance 1 located
at PE 1, the Attribute Set of Service ID 1 to Service ID 3 are
Attribute Set 1 to Attribute Set 3 respectively. The union of meta
information in these Attribute Sets of multiple computing related
services is recorded as the Metadata Set of instance 1. Similar to
the process of aggregating Metric values, edge devices can also
aggregate multiple Metadata Sets into a Cohesive Metadata Set, and
then publish and notify the aggregated results to the network. For
all service instances at an edge device, the aggregation algorithm
includes but is not limited to:
Yuan & Zhou Expires 6 July 2024 [Page 6]
Internet-Draft Microloop Prevention January 2024
* Take the average value of same elements in Metadata Sets as the
corresponding element value of the Cohesive Metadata Set.
* Take the weighted average of same elements in Metadata Sets as the
corresponding element value of the Cohesive Metadata Set.
* Take the maximum value of same elements in Metadata Sets as the
corresponding element value of the Cohesive Metadata Set.
* Take the minimum value of same elements in Metadata Sets as the
corresponding element value of the Cohesive Metadata Set.
* Take the median value of same elements in Metadata Sets as the
corresponding element value of the Cohesive Metadata Set.
* Apply a corresponding strategy to select an instance and directly
use the Metadata Set of the selected instance as the Cohesive
metadata set.
In conclusion, a PE can aggregate multiple Metric values or Metadata
Sets and further publish and advertise the coarse granularity and
relatively stable information to the network. As analyzed in
[I-D.yuan-cats-end-to-end-problem-requirement], an aggregation result
should maintain its comparability to the information of any explicit
service instance.
5. Design of Hierarchical Entries
With the application of appropriate aggregation functions, the
exposed entries gain essential correctness. However, due to the
indeterminacy of forwarding behaviours and inseparable entries, a
microloop problem still occurs under circumstances of sudden failures
or dynamic updates. Therefore, a design of hierarchical entries is
proposed in this section.
Taking an aggregation of Metric values as an example, Metric values
of several service instances at an edge device PE are aggregated and
published and advertised in the network. By collecting and
exchanging entries, a Global RIB was constructed. On the other hand,
PE generates a Local RIB by collecting the running status of its
local service instances. Afterwards, scheduling strategies are
applied in the control plane and corresponding decisions are made.
Suppose the entry with the smallest Metric value is selected as the
optimal entry, it will further be distributed to the forwarding plane
on the device and a Global FIB and a Local FIB is generated
respectively, ultimately instructing the packet forwarding process.
Yuan & Zhou Expires 6 July 2024 [Page 7]
Internet-Draft Microloop Prevention January 2024
A typical form of GRIB, GFIB, LRIB and LFIB, taking PE 4 as an
example, is displayed as follows. To be noted, the computing status
of PE 4 itself is also displayed as an entry in the GRIB with an
aggregated manner.
+------------+
|Instance 1,1+--+ (--------------------)
+------------+ | ( )
+------------+ | +------+ +------+ +------------+
|Instance 1,2+--+--+ PE 1 | | PE 3 +------+Instance 3,1|
+------------+ +------+ +------+ +------------+
( )
( )
( )
( )
( )
( )
( )
( )
+------+ +------+ +------------+
| PE 2 | | PE 4 +--+---+Instance 4,1|
+---+--+ +------+ | +------------+
|( ) | +------------+
| (--------------------) +---+Instance 4,2|
+---------+--+ | +------------+
|Instance 2,1| | +------------+
+------------+ +---+Instance 4,3|
| +------------+
| +------------+
+---+Instance 4,4|
+------------+
Global RIB: Local RIB:
+--------------+-----+----------+ +--------------+-------------+----------+
| Service ID | NHP | Metric | | Service ID | NHP | Metric |
+--------------+-----+----------+ +--------------+-------------+----------+
| Service ID 1 | PE1 | Metric 1 | | Service ID 1 | Instance4,1 | Metric 5 |
+--------------+-----+----------+ +--------------+-------------+----------+
| Service ID 1 | PE2 | Metric 2 | | Service ID 1 | Instance4,2 | Metric 6 |
+--------------+-----+----------+ +--------------+-------------+----------+
| Service ID 1 | PE3 | Metric 3 | | Service ID 1 | Instance4,3 | Metric 7 |
+--------------+-----+----------+ +--------------+-------------+----------+
| Service ID 1 | PE4 | Metric 4 | | Service ID 1 | Instance4,4 | Metric 8 |
+--------------+-----+----------+ +--------------+-------------+----------+
Control Plane
---------------------------------------------------------------------------
Forwarding Plane
Global FIB: Local FIB:
+--------------+-----+----------+ +--------------+-------------+----------+
Yuan & Zhou Expires 6 July 2024 [Page 8]
Internet-Draft Microloop Prevention January 2024
| Service ID | NHP | OutInt | | Service ID | NHP | OutInt |
+--------------+-----+----------+ +--------------+-------------+----------+
| Service ID 1 | PE1 | Policy 1 | | Service ID 1 | Instance4,1 |Interface1|
+--------------+-----+----------+ +--------------+-------------+----------+
Figure 3: Hierarchical Global and Local Entries
6. Forwarding Behaviours with Computing Segments
Although a design of hierarchical entries separates entries with
information of different granularity, global and local entries both
further require to be correlated with packet features and defined
forwarding behaviours.
As defined in [I-D.zhou-intarea-computing-segment-san], a Computing
Segment is introduced. With the introduction of hierarchical entries
displayed in the previous sections, a Computing Segment END.C can be
further assorted as END.CG and END.CL associated with GFIB and LFIB
respectively. Except for the different entries to lookup, END.CG and
END.CL have identical semantics as stated in the previous work. The
form of a packet delivered in the forwarding process is also shown
below.
END.CG(PE 1)
^
|
v
Global FIB(PE 1):
+--------------+-------------+----------+
| Service ID | NHP | OutInt |
+--------------+-------------+----------+
------------------+ | Service ID 1 |END.CL (PE 4)| Policy 1 |
| +--------------+-------------+----------+
+------------+ |
|Instance 1,1+--+ | (--------------------)
+------------+ | v ( )
+------------+ | +------+ +------+ +------------+
|Instance 1,2+--+-----+ PE 1 | | PE 3 +------+Instance 3,1|
+------------+ +------+ +------+ +------------+
( \ )
( \ )
( \ )
( \ )
( \ )
( \ )
( ------------------\ )
Yuan & Zhou Expires 6 July 2024 [Page 9]
Internet-Draft Microloop Prevention January 2024
( v )
+------+ +------+ ---> +------------+
| PE 2 | | PE 4 +--+---+Instance 4,1|
+---+--+ +------+ | +------------+
|( ) | +------------+
| (--------------------) +---+Instance 4,2|
+---------+--+ | +------------+
|Instance 2,1| | +------------+
+------------+ END.CL(PE 4) +---+Instance 4,3|
^ | +------------+
| | +------------+
v +---+Instance 4,4|
Local FIB(PE 4): +------------+
+--------------+-------------+----------+
| Service ID | NHP | OutInt |
+--------------+-------------+----------+
| Service ID 1 | Instance4,1 |Interface1|
+--------------+-------------+----------+
+------------+
|Outer Header|
| |
| (with |
| possible |
| SRH ) |
+------------+ +------------+ +------------+
| Inner SA | | Inner SA | | Inner SA |
+------------+ +------------+ +------------+
|END.CG(PE 1)| |END.CL(PE 4)| |Instance 4,1|
+------------+ +------------+ +------------+
| Service ID | | Service ID | | Service ID |
+------------+ +------------+ +------------+
----------------------------------------------------->
Encapsulation During Packets Forwarding
Figure 4: Hierarchical Service Routing with Computing Segments
As shown above, END.CG(PE 1) and END.CL(PE 4) are Computing Segments
configured at PE 1 and PE 4 respectively. END.CG(PE 1) correlates
with GFIB at PE 1 while END.CL(PE 4) correlates with LFIB at PE 4.
The forwarding process is determined by the SIDs and corresponding
FIBs.
Yuan & Zhou Expires 6 July 2024 [Page 10]
Internet-Draft Microloop Prevention January 2024
7. Usecase
A microloop problem is displayed as follows with a circumstance of
non hierarchical entries. A minimum Metric value is taken as the
aggregated Metric value published by a PE. Instance 4,4 located at
PE 4 is considered to be the most appropriate service instance with
the minimum Metric value which represents the best performance when a
service request accesses from PE 1. With a hierarchical computing
status awareness and routing scheme, the traffic is first steered to
PE 4 and then a sudden failure happens at Instance 4,4. PE 4
discovers the invalidity of Instance 4,4 and distributes a new FIB
entry by recalculating in the control plane. PE 1 is selected as the
updated next hop determined by PE 4. Thus, the traffic is steered
back to PE 1. However, the event of the invalidity of Instance 4,4
has not been notified to the remote PE 1. Therefore, a microloop
exists before PE 1 updates its entries.
RIB:
+------------+-------------+----------+
| Service ID | NHP | Metric |
+------------+-------------+----------+
|Service ID 1| Instance1,1 | 25 |
+------------+-------------+----------+
|Service ID 1| Instance1,2 | 30 |
+------------+-------------+----------+
|Service ID 1| PE2 | 28 | FIB:
+------------+-------------+----------+ +------------+---------+--------+
|Service ID 1| PE3 | 35 | | Service ID | NHP | OutInt |
+------------+-------------+----------+ +------------+---------+--------+
|Service ID 1| PE4 | 20 | |Service ID 1| PE4 | |
+------------+-------------+----------+ +------------+---------+--------+
|
|
|
+------------+ |
|Instance 1,1+--+ | (--------------------)
+------------+ | v ( )
+------------+ | +------+ +------+ +------------+
|Instance 1,2+--+-----+ PE 1 | | PE 3 +---+Instance 3,1|
+------------+ +------+ +------+ +------------+
( \ ^ )
( \ \ )
( \ \ )
( \ \ )
( \ \ )
( \ \-----------------\ )
( ------------------\ \ )
Yuan & Zhou Expires 6 July 2024 [Page 11]
Internet-Draft Microloop Prevention January 2024
( v \ )
+------+ +------+ +------------+
| PE 2 | | PE 4 +-+-+Instance 4,1|
+---+--+ +------+ | +------------+
|( ) | +------------+
| (--------------------) +-+Instance 4,2|
+---------+--+ | +------------+
|Instance 2,1| | +------------+
+------------+ +-+Instance 4,3|
| +------------+
RIB: | +------------+
+------------+-------------+--------+ +-+Instance 4,4|x
| Service ID | NHP | Metric | +------------+
+------------+-------------+--------+
|Service ID 1| Instance4,1 | 26 | FIB:
+------------+-------------+--------+ +------------+-----------+--------+
|Service ID 1| Instance4,2 | 36 | | Service ID | NHP | OutInt |
+------------+-------------+--------+ +------------+-----------+--------+
|Service ID 1| Instance4,3 | 34 | |Service ID 1|Instance4,4| |
+------------+-------------+--------+ +------------+-----------+--------+
|Service ID 1| Instance4,4 | 20 |x |
+------------+-------------+--------+ |
|Service ID 1| PE1 | 25 | v
+------------+-------------+--------+ +------------+-----------+--------+
|Service ID 1| PE2 | 28 | | Service ID | NHP | OutInt |
+------------+-------------+--------+ +------------+-----------+--------+
|Service ID 1| PE3 | 35 | |Service ID 1| PE1 | |
+------------+-------------+--------+ +------------+-----------+--------+
Figure 5: Microloop Problem with Non Hierarchical Entries
An identical condition with introduction of hierarchical entries is
analyzed below. A global choice is made at the access device which
is PE 1 indicated by a END.CG SID. Then, PE 4 is selected as the
most appropriate next hop with the minimum aggregated Metric value.
Identically, a sudden failure happens at Instance 4,4 and PE 1 has
not been notified yet. Unlike the previous mentioned conditions, a
specific local behaviour to lookup the LFIB denoted by a END.CL SID
is implemented at PE 4. Although Instance 4,4 becomes invalid,
Instance 4,1 is determined as the substitution with a suboptimal
Metric value. Contrary to early analysis, the traffic is not steered
back between PEs. Thus, a microloop problem is prevented through the
design of hierarchical entries and the introduction of Computing
Segments.
Yuan & Zhou Expires 6 July 2024 [Page 12]
Internet-Draft Microloop Prevention January 2024
Global RIB:
+------------+-----------+----------+
| Service ID | NHP | Metric |
+------------+-----------+----------+
|Service ID 1| PE1 | 25 |
+------------+-----------+----------+
|Service ID 1| PE2 | 28 | Global FIB:
+------------+-----------+----------+ +------------+-----------+------+
|Service ID 1| PE3 | 35 | | Service ID | NHP |OutInt|
+------------+-----------+----------+ +------------+-----------+------+
|Service ID 1| PE4 | 20 | |Service ID 1| PE4 | |
+------------+-----------+----------+ +------------+-----------+------+
|
|
|
+------------+ |
|Instance 1,1+--+ | (--------------------)
+------------+ | v ( )
+------------+ | +------+ +------+ +------------+
|Instance 1,2+--+-----+ PE 1 | | PE 3 +---+Instance 3,1|
+------------+ +------+ +------+ +------------+
( \ )
( \ )
( \ )
( \ )
( \ )
( \ )
( ------------------\ )
( v )
+------+ +------+ -> +------------+
| PE 2 | | PE 4 +-+--+Instance 4,1|
+---+--+ +------+ | +------------+
|( ) | +------------+
| (--------------------) +--+Instance 4,2|
+---------+--+ | +------------+
|Instance 2,1| | +------------+
+------------+ +--+Instance 4,3|
| +------------+
| +------------+
+--+Instance 4,4|x
Local FIB: +------------+
+------------+-------------+------+
Local RIB: | Service ID | NHP |OutInt|
+------------+-------------+--------+ +------------+-------------+------+
| Service ID | NHP | Metric | |Service ID 1| Instance4,4 | |x
+------------+-------------+--------+ +------------+-------------+------+
|Service ID 1| Instance4,1 | 26 | |
Yuan & Zhou Expires 6 July 2024 [Page 13]
Internet-Draft Microloop Prevention January 2024
+------------+-------------+--------+ |
|Service ID 1| Instance4,2 | 36 | v
+------------+-------------+--------+ +------------+-------------+------+
|Service ID 1| Instance4,3 | 34 | | Service ID | NHP |OutInt|
+------------+-------------+--------+ +------------+-------------+------+
|Service ID 1| Instance4,4 | 20 |x |Service ID 1| Instance4,1 | |
+------------+-------------+--------+ +------------+-------------+------+
Figure 6: Microloop Prevention with Hierarchical Entries
8. Security Considerations
TBA.
9. Acknowledgements
TBA.
10. IANA Considerations
TBA.
11. Normative References
[I-D.huang-cats-two-segment-routing]
Huang, D., Du, Z., and C. Zhang, "Hierarchical segment
routing solution of CATS", Work in Progress, Internet-
Draft, draft-huang-cats-two-segment-routing-01, 5
September 2023, <https://datatracker.ietf.org/doc/html/
draft-huang-cats-two-segment-routing-01>.
[I-D.ldbc-cats-framework]
Li, C., Du, Z., Boucadair, M., Contreras, L. M., Drake,
J., Huang, D., and G. S. Mishra, "A Framework for
Computing-Aware Traffic Steering (CATS)", Work in
Progress, Internet-Draft, draft-ldbc-cats-framework-04, 8
December 2023, <https://datatracker.ietf.org/doc/html/
draft-ldbc-cats-framework-04>.
[I-D.ma-intarea-identification-header-of-san]
Ma, L., 付华楷, Zhou, F., lihesong, and D. Yang, "Service
Identification Header of Service Aware Network", Work in
Progress, Internet-Draft, draft-ma-intarea-identification-
header-of-san-01, 4 May 2023,
<https://datatracker.ietf.org/doc/html/draft-ma-intarea-
identification-header-of-san-01>.
Yuan & Zhou Expires 6 July 2024 [Page 14]
Internet-Draft Microloop Prevention January 2024
[I-D.yuan-cats-end-to-end-problem-requirement]
Yuan, D., Yao, H., Li, Z., Zhou, F., and X. wang, "Problem
Statement and Requirements of end-to-end CATS", Work in
Progress, Internet-Draft, draft-yuan-cats-end-to-end-
problem-requirement-01, 22 October 2023,
<https://datatracker.ietf.org/doc/html/draft-yuan-cats-
end-to-end-problem-requirement-01>.
[I-D.yuan-cats-middle-ware-facility]
Yuan, D. and F. Zhou, "Middle Ware Facilities for CATS",
Work in Progress, Internet-Draft, draft-yuan-cats-middle-
ware-facility-00, 7 July 2023,
<https://datatracker.ietf.org/doc/html/draft-yuan-cats-
middle-ware-facility-00>.
[I-D.zhou-intarea-computing-segment-san]
Zhou, F., Yuan, D., and D. Yang, "Computing Segment for
Service Routing in SAN", Work in Progress, Internet-Draft,
draft-zhou-intarea-computing-segment-san-03, 17 October
2023, <https://datatracker.ietf.org/doc/html/draft-zhou-
intarea-computing-segment-san-03>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
Authors' Addresses
Dongyu Yuan
ZTE Corporation
No.50 Software Avenue
Nanjing
Jiangsu, 210012
China
Email: yuan.dongyu@zte.com.cn
Fenlin Zhou
ZTE Corporation
No.50 Software Avenue
Nanjing
Jiangsu, 210012
China
Yuan & Zhou Expires 6 July 2024 [Page 15]
Internet-Draft Microloop Prevention January 2024
Email: zhou.fenlin@zte.com.cn
Yuan & Zhou Expires 6 July 2024 [Page 16]