IS-IS for IP Internets J. Farkas, Ed. Internet-Draft Ericsson Intended status: Standards Track N. Bragg Expires: June 18, 2015 Ciena P. Unbehagen Avaya G. Parsons Ericsson P. Ashwood-Smith Huawei Technologies December 15, 2014 IS-IS Path Computation and Reservation draft-farkas-isis-pcr-01 Abstract IEEE 802.1Qca Path Control and Reservation (PCR) specifies explicit path control via IS-IS in Layer 2 networks in order to move beyond the shortest path capabilities provided by IEEE 802.1aq Shortest Path Bridging (SPB). IS-IS PCR provides capabilities for the establishment and control of explicit forwarding trees in a Layer 2 network domain. This document specifies the sub-TLVs for IS-IS PCR. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on June 18, 2015. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. Farkas, et al. Expires June 18, 2015 [Page 1] Internet-Draft IS-IS PCR December 2014 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology and Definitions . . . . . . . . . . . . . . . . . 3 3. Explicit Trees . . . . . . . . . . . . . . . . . . . . . . . 6 4. Explicit ECT Algorithms . . . . . . . . . . . . . . . . . . . 9 5. IS-IS PCR sub-TLVs . . . . . . . . . . . . . . . . . . . . . 10 5.1. Topology sub-TLV . . . . . . . . . . . . . . . . . . . . 10 5.2. Hop sub-TLV . . . . . . . . . . . . . . . . . . . . . . . 14 5.3. Bandwidth Constraint sub-TLV . . . . . . . . . . . . . . 18 5.4. Bandwidth Assignment sub-TLV . . . . . . . . . . . . . . 19 6. MRT-FRR Application . . . . . . . . . . . . . . . . . . . . . 20 7. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22 9. Security Considerations . . . . . . . . . . . . . . . . . . . 23 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 23 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 23 11.1. Normative References . . . . . . . . . . . . . . . . . . 23 11.2. Informative References . . . . . . . . . . . . . . . . . 24 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 24 1. Introduction IEEE 802.1Qca Path Control and Reservation (PCR) [IEEE8021Qca] specifies extensions to IS-IS for the control of Explicit Trees (ETs). The PCR extensions are compatible with the Shortest Path Bridging (SPB) extensions to IS-IS specified by [RFC6329] and [IEEE8021aq]. Furthermore, IS-IS with PCR extensions relies on the SPB architecture and terminology; and some of the IS-IS SPB sub-TLVs are also leveraged. IS-IS PCR builds upon IS-IS and uses IS-IS in a similar way to SPB. IS-IS PCR only addresses point-to-point physical links, although IS-IS also supports shared media LANs. This document specifies four IS-IS sub-TLVs for the control of explicit trees by IS-IS PCR in a Layer 2 network as specified by IEEE 802.1Qca. In addition to the sub-TLVs specified here, IS-IS PCR relies on the following IS-IS SPB sub-TLVs specified by [RFC6329]: Farkas, et al. Expires June 18, 2015 [Page 2] Internet-Draft IS-IS PCR December 2014 o SPB Base VLAN-Identifiers sub-TLV o SPB Instance sub-TLV o SPBV MAC address sub-TLV o SPBM Service Identifier and Unicast Address sub-TLV These sub-TLVs are used to provide the associations among bridges, MAC addresses, VIDs and I-SIDs within an IS-IS domain. The use of these SPB sub-TLVs for PCR is specified by IEEE 802.1Qca. Note that IS-IS PCR does not require the implementation of the full IS-IS SPB protocol but only the support of these SPB sub-TLVs. Nonetheless, if a bridge supports both IS-IS SPB and IS-IS PCR, then both of them are implemented by the same IS-IS entity. The sub-TLVs specified here can be also applied for Fast ReRoute using Maximally Redundant Trees (MRT-FRR) [I-D.ietf-rtgwg-mrt-frr-architecture] in a Layer 2 network. MRTs are computed as specified in [I-D.ietf-rtgwg-mrt-frr-algorithm]. If MRT computation is split such that the Generalized Almost Directed Acyclic Graph (GADAG) is computed centrally, then these sub-TLVs can be used to distribute the GADAG, which is identical for each network node throughout a network domain. PCR uses IS-IS, the SPB sub-TLVs listed above, and the new sub-TLVs defined here. IS-IS PCR has no impact to IETF protocols. 2. Terminology and Definitions ADAG: Almost Directed Acyclic Graph - a digraph that can be transformed into a DAG by removing all arcs incoming to the root. B-VID: Backbone VID. Base VID: The VID used to identify a VLAN in management operations. BLCE: Bridge Local Computation Engine - A computation engine in a bridge that performs path and routing computations. The BLCE implements e.g. SPF, CSPF, or the Maximally Redundant Trees Algorithm [I-D.ietf-rtgwg-mrt-frr-algorithm]. Constrained tree: A tree meeting a certain constraint, e.g. providing a minimal available bandwidth. Cut-node: A node is a cut-node if removing it partitions the network. Farkas, et al. Expires June 18, 2015 [Page 3] Internet-Draft IS-IS PCR December 2014 Cut-link: A link is a cut-link if removing it partitions the network. DAG: Directed Acyclic Graph - a digraph containing no directed cycle. DEI: Drop Eligible Indicator. ECT Algorithm: Equal Cost Tree Algorithm - The algorithm and mechanism that is used for the control of the active topology, i.e. forwarding trees. It can be one of the shortest path algorithms specified by IEEE 802.1aq. It can be also one of the explicit path control algorithms specified by IEEE 802.1Qca. Each ECT Algorithm has a 32-bit unique ID. ET: Explicit Tree - An explicitly defined tree, which is specified by its end points and the paths among the end points. If only the end points are specified but the paths are not, then it is a loose explicit tree. If the paths are also specified, then it is a strict explicit tree. ETDB: Explicit Tree Database - A database storing explicit trees. FDB: Filtering Database. GADAG: Generalized ADAG - a digraph, which has only ADAGs as all of its topology blocks. Hop: A hop is specified by two nodes. A strict hop has no intermediate nodes, whereas a loose hop can have one or more intermediate nodes. IS-IS PCR specifies an explicit tree by an ordered list of hops starting at the root, each successive hop being defined by the next element of the list. I-SID: Backbone Service Instance Identifier - A 24-bit ID. Maximally Redundant Trees (MRTs): A pair of trees with a common MRT Root where the path from any leaf node to the MRT Root along the first tree (MRT-Blue) and the path from the same leaf node along the second tree (MRT-Red) share the minimum number of nodes and the minimum number of links. Each such shared node is a cut-node. Any shared links are cut-links. MRT-Blue: MRT-Blue is one of the two MRTs; specifically, MRT-Blue is the increasing MRT where links in the GADAG are taken in the direction from a lower topologically ordered node to a higher one. Farkas, et al. Expires June 18, 2015 [Page 4] Internet-Draft IS-IS PCR December 2014 MRT-Red: MRT-Red is one of the two MRTs; specifically, MRT-Red is the decreasing MRT where links in the GADAG are taken in the direction from a higher topologically ordered node to a lower one. MRT Root: The common root of the two MRTs: MRT-Blue and MRT-Red. MSRP: Multiple Stream Registration Protocol, standardized as IEEE 802.1Qat, already rolled into IEEE 802.1Q-2011. PCA: Path Control Agent - The agent that is part of the IS-IS domain and thus can perform IS-IS operations on behalf of a PCE, e.g. maintain the LSDB and send LSPs. PCE: Path Computation Element - An entity that is capable of computing a path through a network based on a representation of the topology of the network (obtained by undefined means external to the PCE). PCP: Priority Code Point. Redundant trees: A pair of trees with a common Root where the paths from any leaf node to the Root along the first tree and the second tree are disjoint. SPBV: SPB VID - The SPB mode where a unique VID is assigned to each SPT Root bridge and is used to identify an SPT. SPBM: SPB MAC - The SPB mode where a MAC or its shorthand is used to identify an SPT. SPF: Shortest Path First. SPT: Shortest Path Tree. SRLG: Shared Risk Link Group - A set of links that share a resource whose failure affects each link. topology block: Either a maximally two-connected (induced) subgraph, a cut-link with its endpoints, or an isolated node. TED: Traffic Engineering Database - A database storing the traffic engineering information propagated by IS-IS. two-connected: A graph that has no cut-nodes. This is a graph that requires at least two nodes to be removed before gets partitioned. VID: VLAN ID. Farkas, et al. Expires June 18, 2015 [Page 5] Internet-Draft IS-IS PCR December 2014 VLAN: Virtual Local Area Network. 3. Explicit Trees An explicit tree is determined by a Path Computation Element (PCE) [RFC4655] and is not required to follow the shortest path. A PCE is an entity that is capable of computing a topology for forwarding based on a network topology, its corresponding attributes, and potential constraints. A PCE explicitly describes a forwarding tree as described in Section 5.1. Either a single PCE or multiple PCEs determine explicit trees for a domain. Even if there are multiple PCEs in a domain, each explicit tree is determined by only one PCE, which is referred to as the owner PCE of the tree. PCEs and IS-IS PCR can be used in combination with IS-IS SPB shortest path routing. The PCE interacts with the active topology control protocol, i.e. with IS-IS. The collaboration with IS-IS can be provided by a Path Control Agent (PCA) on behalf of a PCE. Either the PCE or the corresponding PCA is part of the IS-IS domain. If the PCE is not part of the IS-IS domain, then the PCE has to be associated with a PCA that is part of the IS-IS domain. The PCE or its PCA establishes IS-IS adjacency in order to receive all the LSPs transmitted by the bridges in the domain. The PCE, either on its own or via its PCA, can control the establishment of explicit trees in that domain by injecting an LSP conveying an explicit tree and thus instruct IS-IS to set up the explicit tree determined by the PCE. If instructed to do so by a PCE, IS-IS can also record and communicate bandwidth assignments, which can be only applied if no reservation protocol (e.g. Multiple Stream Registration Protocol (MSRP)) is used in the domain. The operation details of the PCE are not specified by IEEE 802.1Qca. If the PCE is part of the IS-IS domain, then the PCE uses IS-IS PDUs to communicate with the IS-IS domain and the PCE has a live IS-IS LSDB, (i.e. the PCE implements the PCA functions too). A PCE can instead communicate with the IS-IS domain via a PCA, e.g. to retrieve the LSDB or instruct the creation of an explicit tree. However, the means of communication between the PCE and the PCA is not specified by IEEE 802.1Qca. An Explicit Tree (ET) is an undirected loop-free topology, whose use is under the control of the owner PCE by means of associating VIDs and MAC addresses with it. As it is undirected, the ET contains no assumptions about the direction of any flows that use it; it can be used in either direction as specified by the VIDs and MAC addresses associated with it. It is the responsibility of the PCE to ensure reverse path congruency and multicast-unicast congruency if that is required. Farkas, et al. Expires June 18, 2015 [Page 6] Internet-Draft IS-IS PCR December 2014 An explicit tree is either strict or loose. A strict explicit tree specifies all bridges and paths it comprises. A loose tree only specifies the bridges as a list of hops that have a special role in the tree, e.g. a traffic end point, and no path or path segment is specified between the bridges, which are therefore loose hops even if traffic end points are adjacent neighbors. The special role of a hop can be: traffic end point, root, leaf, a bridge to be avoided, or a transit hop in case of a tree with a single leaf. The path for a loose hop is determined by the Bridge Local Computation Engine (BLCE) of the bridges. The shortest path is used for a loose hop unless specified otherwise by the descriptor (Section 5.1) of the tree or by the corresponding ECT Algorithm (Section 4). A loose explicit tree is constrained if the tree descriptor includes one or more constraints, e.g. the administrative group that the links of the tree have to belong to. The BLCE of the bridges then apply the Constrained Shortest Path First (CSPF) algorithm, which is Shortest Path First (SPF) on the topology that only contains the links meeting the constraint(s). An explicit tree is specified by a Topology sub-TLV (Section 5.1). The Topology sub-TLV associates one or more VIDs with an explicit tree. The Topology sub-TLV includes two or more Hop sub-TLVs (Section 5.2), and a hop is specified by an IS-IS System ID. A Hop sub-TLV can include a delay constraint for a loose hop. A Topology sub-TLV can also include further sub-TLVs to constrain loose hops. The bridges involved in an explicit tree store the corresponding Topology sub-TLVs in their Explicit Tree Database (ETDB). Explicit trees are propagated and set-up by IS-IS PCR in a domain. The PCE or its PCA assembles the Topology sub-TLVs (Section 5.1), and adds it into an LSP, which is flooded throughout the domain. The Topology sub-TLV is flooded by the same techniques used for the SPB LSPs. The bridges then shall process the Topology sub-TLV upon reception. If the Topology sub-TLV specifies one or more loose trees, then the path for the loose hops is determined by the BLCE of the bridges. The bridges then install the appropriate FDB entries for frame forwarding along the tree described by the Topology sub- TLV, or the trees computed based on the Topology sub-TLV. Dynamic Filtering Entries are maintained by IS-IS for the VID, MAC address tuples associated with an ET. Due to the LSP aging of IS-IS, the Topology sub-TLVs (Section 5.1) have to be refreshed similar to other IS-IS TLVs in order to keep the integrity of the LSDB. The corresponding Dynamic Filtering Entries are also refreshed in the FDB when a Topology sub-TLV is refreshed. Refreshing Topology sub-TLVs is the task of the entity being part of the IS-IS domain, i.e. either the PCE or the PCA. Farkas, et al. Expires June 18, 2015 [Page 7] Internet-Draft IS-IS PCR December 2014 If a conflict rises with respect to Topology sub-TLVs belonging to different PCEs in a domain with multiple PCEs, then IS-IS PCR resolves the conflict. IS-IS PCR grants the item in conflict, e.g. VID or bandwidth to be assigned, to one of the PCEs based on the LSPs conveying the Topology sub-TLVs. The item in conflict is granted to the PCE whose LSP ID modulo the number of Hop sub-TLVs conveyed by the Topology sub-TLV produces the numerically lowest value. If the modulo operation produces the same numerical result, then the item in conflict is granted to the PCE whose LSP has the numerically least LSP ID. The bridges can support the following IS-IS features for the computation of explicit trees. The Extended IS Reachability TLV (type 22) specified in [RFC5305] provides the following link attribute IS-IS sub-TLVs: o Administrative Group (color, resource class) (sub-TLV type 3), o Maximum Link Bandwidth (sub-TLV type 9), o Maximum Reservable Link bandwidth (sub-TLV type 10), o Unreserved Bandwidth (sub-TLV type 11), o Traffic Engineering Default Metric (sub-TLV type 18). Further attributes are provided by the IS-IS TE Metric Extension link attribute sub-TLVs specified in [I-D.ietf-isis-te-metric-extensions]: o Unidirectional Link Delay, o Min/Max Unidirectional Link Delay, o Unidirectional Delay Variation, o Unidirectional Link Loss, o Unidirectional Residual Bandwidth, o Unidirectional Available Bandwidth, o Unidirectional Utilized Bandwidth. The Shared Risk Link Group (SRLG) information provided by the SRLG TLV (type 138) [RFC5307] can be also used. In order to indicate that the interface is unnumbered in this case, the corresponding flag takes value 0. The Link Local Identifier is an Extended Local Farkas, et al. Expires June 18, 2015 [Page 8] Internet-Draft IS-IS PCR December 2014 Circuit Identifier and the Link Remote Identifier is a Neighbor Extended Local Circuit ID. 4. Explicit ECT Algorithms The exact IS-IS control mode of operation is selected for a VLAN by associating its Base VID with the appropriate ECT Algorithm in the SPB Base VLAN-Identifiers sub-TLV [RFC6329], in addition to allocating the Base VID to IS-IS control. There are five distinct ECT Algorithms for the five explicit path control modes. The operation details of the explicit ECT Algorithms and their configuration is specified by IEEE 802.1Qca, a high level overview is given here. The Strict Tree (ST) ECT Algorithm (00-80-C2-20) is used for a strict explicit tree. A strict ET is static as no other entity can update it but the owner PCE. In case of a topology change, it is the task of the owner PCE to detect the topology change, e.g. based on the changes in the LSDB, and to update the strict trees if needed. That is, the owner PCE computes the new tree, assembles its descriptor (Section 5.1), and then instructs IS-IS PCR to install it. The Loose Tree (LT) ECT Algorithm (00-80-C2-21) is used for a single loose explicit tree. The path for loose hops is determined by the BLCE of the bridges; therefore, the Topology sub-TLV (Section 5.1) specifying the tree has to indicate which hop is the Root of the tree. The loose hops are maintained by IS-IS, i.e. restored upon a topology change if a loop-free path is available. If the tree computed by the BLCE visits the same bridge twice (implying that a loop or hairpin has been created), then that loop or hairpin shall be pruned from the tree even if it contains a hop specified by the Topology sub-TLV. It is a constraint if a bridge is not to be included, which can be specified by the Exclude flag of a Hop sub-TLV (Section 5.2) conveyed by the Topology sub-TLV specifying the tree. The Loose Tree Set (LTS) ECT Algorithm (00-80-C2-22) is used if connectivity among the traffic end points specified by the Topology sub-TLV (Section 5.1) is to be provided by a set of loose trees such that one tree is rooted at each traffic end point. The BLCE of the bridges compute the loose trees, which are maintained by IS-IS, i.e. restored upon a topology change. One constraint can be to avoid some bridges in these trees, which can be specified by the Exclude flag (item c.6. in Section 5.2). Further constraints can be specified by the Topology sub-TLV. The MRT ECT Algorithm (00-80-C2-23) is used for the establishment and maintenance of MRTs in a distributed fashion. The MRT Lowpoint Algorithm specified by [I-D.ietf-rtgwg-mrt-frr-algorithm] is to be Farkas, et al. Expires June 18, 2015 [Page 9] Internet-Draft IS-IS PCR December 2014 used for the computation of MRTs. The MRT Lowpoint Algorithm first computes the GADAG then produces two MRTs for each MRT Root: MRT-Blue and MRT-Red. If the level of redundancy provided by each bridge being an MRT Root is not required, then the MRT Roots can be specified by a Topology sub-TLV (Section 5.1). Both the GADAG and the MRT computation steps are performed distributed, i.e. by each bridge. The MRT GADAG (MRTG) ECT Algorithm (00-80-C2-24) splits the computation into two. As the GADAG is identical for each MRT within a domain, it is computed by a single entity, which is the GADAG Computer. The GADAG is then described in a Topology sub-TLV (Section 5.1), which is flooded in the domain. The bridges then compute the MRTs for the MRT Roots based on the GADAG received. Section 6 provides more details on the description of the GADAG. MRTs are loose trees as bridges are involved in their computation and restoration. Thus both the MRT and the MRTG ECT Algorithms provide a set of loose trees: two MRTs for each MRT Root. 5. IS-IS PCR sub-TLVs The following sub-TLVs are specified for IS-IS PCR. The Topology sub-TLV is carried in an MT-Capability TLV, the rest of the sub-TLVs are conveyed by Topology sub-TLV. 5.1. Topology sub-TLV The variable length Topology sub-TLV shall be used to describe an explicit tree. The Topology sub-TLV may be also used for describing a Generalized Almost Directed Acyclic Graph (GADAG) as explained in Section 6 in detail. The Topology sub-TLV is carried in an MT- Capability TLV (type 144) [RFC6329] in a Link State PDU. A Topology sub-TLV specifying an explicit tree conveys one or more Base VIDs, two or more Hop sub-TLVs (Section 5.2). A Topology sub-TLV describing a loose tree specifies the shortest path algorithm to be used for the loose hops and it can also convey further sub-TLVs to specify constraints. Figure 1 shows the format of the Topology sub- TLV. Farkas, et al. Expires June 18, 2015 [Page 10] Internet-Draft IS-IS PCR December 2014 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+ | Type | (1 byte) +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ECT Algorithm (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Num Base VIDs | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Res | Base VID 1 (12 bits) | (0 or 2 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ................. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Res | Base VID n (12 bits) | (0 or 2 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | sub-TLV 1 (variable) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ................. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | sub-TLV m (variable) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: Topology sub-TLV The parameters of explicit trees are encoded by the Topology sub-TLV as follows: a. Type (8 bits): The type of the sub-TLV, its value is TBD. b. Length (8 bits): The total number of bytes contained in the Value field. c. ECT Algorithm (32 bits): If the Base VID(s) of the Topology sub- TLV are associated with the LT or the LTS ECT Algorithm, then the ECT Algorithm parameter determines the algorithm to be used for the computation of (constrained) shortest paths. The ECT Algorithm parameter takes one of the values defined in IEEE 802.1aq, the default value is 00-80-C2-01. The value of the ECT Algorithm parameter is 0 if the Topology sub-TLV specifies a strict explicit tree, MRTs, or a GADAG. Note that the IS-IS control mode for a VLAN is selected by the association of the Base VID with the corresponding ECT Algorithm in the SPB Base VLAN-Identifiers sub-TLV [RFC6329], not in the Topology sub-TLV. d. Number of Base VIDs (8 bits): The number of Base VIDs carried in the Topology sub-TLV. Its minimum value is 1 if the Topology Farkas, et al. Expires June 18, 2015 [Page 11] Internet-Draft IS-IS PCR December 2014 sub-TLV specifies one or more explicit trees. Its value can be 0 if the Topology sub-TLV specifies a GADAG. e. Reserved (Res) (4 bits): The reserved bits take value 0. f. Base VID (12 bits): The Base VID parameter provides the Base VID of the VLAN that is associated with the explicit tree. Multiple Base VIDs can be associated with the same explicit tree. In addition to the Base VID, some of the explicit ECT Algorithms (Section 4) require further VIDs which are associated with the VLAN via the SPB Instance sub-TLV [RFC6329]. A Topology sub-TLV specifying a GADAG can have zero Base VID parameters. In this case, the given GADAG has to be applied for each VLAN associated with the MRTG ECT Algorithm (Section 4). g. sub TLVs: The rest conveys further sub-TLVs that specify the hops of the topology and can also specify constraints as described in the following. A topology is specified by a list of Hop sub-TLVs (Section 5.2), and a hop is specified by an IS-IS System ID. An ill-formed Topology sub-TLV, e.g. specifying an invalid tree is ignored, no tree is installed but a management report is generated. The Topology sub-TLV specifies a strict tree by decomposing the tree to branches. Each branch is a point-to-point path specified by an ordered list of hops where the end of each branch is a leaf. Each element of a branch is the direct link between adjacent neighbor bridges whose Hop sub-TLV is next to each other in the Topology sub- TLV. The first hop of the Topology sub-TLV is the root, hence, the first branch originates from the root. The rest of the branches fork from another branch. The first hop of a branch is a bridge that is already part of a former branch and the last hop is a leaf bridge. Therefore, the hop after a leaf hop is the beginning of a new branch, if any. A hop of a branch is created if and only if the bridge specified for that hop is directly connected to the preceding bridge of the same branch. The order of the branches does not matter within the Topology sub-TLV but the first branch begins with the root. Figure 2 shows an example strict tree and its description. Farkas, et al. Expires June 18, 2015 [Page 12] Internet-Draft IS-IS PCR December 2014 +-----------+ | A | +-----------+ | I | +-----------+ | H | [B]---[A]---[I] +-----------+ | | | G | | | +-----------+ | | | E | [C]---[F] [H] +-----------+ | | | A | | | +-----------+ | | | B | [D] [E]---[G] +-----------+ | C | +-----------+ | D | +-----------+ | C | +-----------+ | F | +-----------+ Figure 2: A strict tree and its description; root = Node A The Topology sub-TLV of a loose tree does not provide any path or path segment, but the hops which are to participate. The root is the first hop. The leaves of a single loose tree are also specified. Hop sub-TLVs can be included in a Topology sub-TLV to specify bridges that have to be avoided. If the Topology sub-TLV only specifies a single leaf, then one or more transit hops can be specified by the Topology sub-TLV to direct the path along a sequence of bridges, specified by the order of hops. If bridges whose respective Hop sub- TLVs are adjacent to each other in the Topology sub-TLV but are not topology neighbors, then it is a loose hop. If a Topology sub-TLV conveys one or more loose hops, then that sub-TLV defines a loose explicit tree and each hop is considered as a loose hop. The path of a loose hop is pruned from the tree if the path would create a loop or hairpin. If the Base VIDs of the Topology sub-TLV are associated with the LTS ECT Algorithm or the MRT ECT Algorithm, then the Hop sub-TLVs conveyed by the Topology sub-TLV belong to traffic end points or bridges to be excluded. The BLCEs compute the loose trees, e.g. MRTs, such that they span the traffic end points and are rooted at a traffic end point. Farkas, et al. Expires June 18, 2015 [Page 13] Internet-Draft IS-IS PCR December 2014 The Topology sub-TLV specifies a GADAG if the Base VIDs conveyed by the Topology sub-TLV are associated with the MRTG ECT Algorithm. Section 6 provides the details on the description of a GADAG by a Topology sub-TLV. Each traffic end point of an explicit tree is always specified in the Topology sub-TLV by the inclusion of the Hop sub-TLVs corresponding to the traffic end points. The traffic end points of a tree are identified by setting the Traffic End Point flag (item c.3. in Section 5.2) in the appropriate Hop sub-TLVs. If the explicit tree is loose, then the Topology sub-TLV can convey further sub-TLVs to specify constraints, e.g. an Administrative Group sub-TLV [RFC5305] or a Bandwidth Constraint (Section 5.3). 5.2. Hop sub-TLV The Hop sub-TLV shall be used to specify a hop of a topology. Each Hop sub-TLV conveys an IS-IS System ID, which specifies a hop. A Hop sub-TLV is conveyed by a Topology sub-TLV (Section 5.1). A strict explicit tree is decomposed to branches where each branch is a point- to-point path specified by an ordered list of Hop sub-TLVs as specified in Section 5.1. A hop of a branch is created if and only if the bridge specified for that hop is directly connected to the preceding bridge in the path. That is, a point-to-point LAN is identified by the two bridges it interconnects; and the LAN is part of the strict tree if and only if the Hop sub-TLVs of the two bridges are next to each other in the Topology sub-TLV. A Hop sub-TLV can convey a Circuit ID in order to distinguish multiple links between adjacent neighbor bridges. A Hop sub-TLV also specifies the role of a bridge, e.g. if it is the root or a traffic end point. The Topology sub-TLV of a loose tree only comprises the Hop sub-TLV of the bridges that have special role in the tree. The Hop sub-TLV may also specify a delay budget for a loose hop. By default, the traffic end points both transmit and receive with respect to each VID associated with an explicit tree, except for an LTS (Section 4) associated with a learning VLAN, which uses a unidirectional VID per bridge. The Hop sub-TLV allows different configuration by means of the Transmit (T) and Receive (R) flags conveyed in the sub-TLV. The VID and its T/R flags are only present in the Hop sub-TLV if the behavior of the traffic end points differs from the default. Figure 3 shows the format of the variable length Hop sub-TLV, which shall be conveyed by a Topology sub-TLV (Section 5.1). Farkas, et al. Expires June 18, 2015 [Page 14] Internet-Draft IS-IS PCR December 2014 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+ | Type | (1 byte) +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+ |C|V|T|R|L|E|Res| (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | System ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | System ID | (6 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Extended Local Circuit ID (0 or 4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Num of VIDs | (0 or 1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R|Res| VID 1 (12 bits) | (0 or 2 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ................. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R|Res| VID n (12 bits) | (0 or 2 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Delay Constraint | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Delay Constraint | (0 or 6 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3: Hop sub-TLV The parameters of a hop are encoded as follows: a. Type (8 bits): The type of the sub-TLV, its value is TBD. b. Length (8 bits): The total number of bytes contained in the Value field. c. Hop Flags (8 bits): The Hop sub-TLV conveys six flags. The Circuit and the VID flags influence the length of the Hop sub- TLV. Two bits are reserved for future use, transmitted as 0 and ignored on receipt. 1. Circuit (C) flag (1 bit): The Circuit flag is a one-bit flag to indicate whether or not the Extended Local Circuit ID parameter is present. If the flag is set, then an Extended Local Circuit ID is also included in the Hop sub-TLV. Farkas, et al. Expires June 18, 2015 [Page 15] Internet-Draft IS-IS PCR December 2014 2. VID (V) flag (1 bit): The VID flag is a one-bit flag to indicate whether or not one or more VIDs are conveyed by the Hop sub-TLV. If the flag is set, then the Number of VIDs parameter is present and indicates how many VIDs are conveyed by the Hop sub-TLV. If the VID flag is reset, then neither the Number of VIDs parameter nor VIDs are present in the Hop sub-TLV. 3. Traffic End Point (T) flag (1 bit): The Traffic End Point flag is a one-bit flag to indicate whether or not the given System is a traffic end point, i.e. transmitter and/or receiver. If the System is a traffic end point, then the Traffic End Point flag is set. 4. Root (R) flag (1 bit): The Root flag is a one-bit flag to indicate whether or not the given System is a Root of the explicit tree specified by the Topology sub-TLV. If the System is a root of a tree, then the Root flag is set. If the Topology sub-TLV specifies a single tree, i.e. the Base VIDs conveyed by the Topology sub-TLV are associated with either the ST ECT Algorithm or the LT ECT Algorithm (Section 4), then the Root flag is only set for one of the Systems conveyed by the Topology sub-TLV. Furthermore, the first Hop sub-TLV of the Topology sub-TLV conveys the System that is the root of the tree. If the Topology sub-TLV specifies a Loose Tree Set, i.e. the Base VIDs conveyed by the Topology sub-TLV are associated with the LTS ECT Algorithm (Section 4), then the Root flag is set for each traffic end point as each of them roots a tree. If the Topology sub-TLV is used for MRT operations, i.e. the Base VIDs conveyed by the Topology sub-TLV are associated with either the MRT ECT Algorithm or the MRTG ECT Algorithm (Section 4), then the Root flag is set for each MRT Root. If no MRT Root is specified by a Topology sub-TLV specifying a GADAG, then each SPT Root is an MRT Root as well. If the Base VIDs conveyed by the Topology sub-TLV are associated with the MRTG ECT Algorithm (Section 4), then the Topology sub-TLV specifies a GADAG and the very first Hop sub-TLV specifies the GADAG Root. There is no flag for indicating the GADAG Root. 5. Leaf (L) flag (1 bit): The Leaf flag is a one-bit flag to indicate whether or not the given System is a Leaf of the explicit tree specified by the Topology sub-TLV. If the System is a Leaf, then the Leaf flag is set. The Leaf flag is only used to mark a leaf of a tree if the Topology sub-TLV specifies a single tree. The Leaf flag is used to indicate Farkas, et al. Expires June 18, 2015 [Page 16] Internet-Draft IS-IS PCR December 2014 the end of a directed ear if the Topology sub-TLV specifies a GADAG, see Section 6. 6. Exclude (E) flag (1 bit): The Exclude flag is a one-bit flag to indicate if the given System has to be excluded from the topology. 7. Reserved (Res) (2 bits): The reserved bits take value 0. d. System ID (48 bits): The 6-byte IS-IS System Identifier of the bridge that the Hop sub-TLV refers to. e. Extended Local Circuit ID (32 bits): The Extended Local Circuit ID [RFC5303] parameter is not necessarily present in the Hop sub- TLV. Its presence is indicated by the Circuit flag. Parallel links corresponding to different IS-IS adjacencies between a pair of neighbor bridges can be distinguished by means of the Extended Local Circuit ID. The Extended Local Circuit ID is conveyed by the Hop sub-TLV specifying the bridge nearer to the root of the tree, and identifies a circuit that attaches the given bridge to its neighbor cited by the next Hop sub-TLV of the Topology sub- TLV. The Extended Local Circuit ID can only be used in strict trees. f. Number of VIDs (8 bits): The Number of VIDs parameter is not present if the Hop sub-TLV does not convey VIDs, which is indicated by the VID flag. g. VID and its T/R flags (14 bits): The VID and its T/R flags are only present in the Hop sub-TLV if the given bridge is a traffic end point and it behaves differently from the default with respect to that particular VID. 1. T flag (1 bit): This is the Transmit allowed flag for the VID following the flag. 2. R flag (1 bit): This is the Receive allowed flag for the VID following the flag. 3. Reserved (Res) (2 bits): The reserved bits take value 0. 4. VID (12 bits): A VID. h. Delay Constraint (48 bits): The last six bytes specify a delay constraint if they convey a Unidirectional Link Delay sub-TLV [I-D.ietf-isis-te-metric-extensions]. The delay constraint can be used in a Topology sub-TLV that specifies a single loose tree, i.e. the Base VIDs are associated with the LT ECT Algorithm Farkas, et al. Expires June 18, 2015 [Page 17] Internet-Draft IS-IS PCR December 2014 (Section 4). If delay constraint is applied, then the loose hop has to fit in the delay budget specified by the Delay parameter of the Unidirectional Link Delay sub-TLV conveyed by the Hop sub- TLV. If the Topology sub-TLV specifies a single leaf, then the path between the preceding Hop sub-TLV and the current Hop sub- TLV has to meet the delay budget. If the Topology sub-TLV specifies multiple leaves, then the path between the root and the current Hop sub-TLV has to meet the delay budget. If the tree is used as a reverse congruent tree, then the delay constraint applies in both directions. If the tree is used as a directed tree, then the delay constraint applies in the direction of the tree. 5.3. Bandwidth Constraint sub-TLV The Bandwidth Constraint sub-TLV may be included in a Topology sub- TLV (Section 5.1) in order to specify how much available bandwidth is to be provided by the tree. Each loose hop has to meet the bandwidth constraint. The bandwidth value of the constraint is a total value or it only refers to a single PCP as specified by the sub-TLV. Figure 4 shows the format of the Bandwidth Constraint sub-TLV. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+ | Type | (1 byte) +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+ | PCP |D|P| Res | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Available Bandwidth (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 4: Bandwidth Constraint sub-TLV The parameters of the bandwidth constraint are encoded as follows: a. Type (8 bits): The type of the sub-TLV, its value is TBD. b. Length (8 bits): The total number of bytes contained in the Value field. The value of the Length field is 5 bytes. c. PCP (4 bits): The Priority Code Point (PCP) parameter determines the priority class the Available Bandwidth parameter refers to, if any. Farkas, et al. Expires June 18, 2015 [Page 18] Internet-Draft IS-IS PCR December 2014 d. DEI (D) (1 bit): This is the Drop Eligible Indicator (DEI) parameter. If the DEI parameter is clear, then the bandwidth constraint refers to committed information rate. If the DEI parameter is set, then the bandwidth constraint refers to peak information rate. e. PCP (P) flag (1 bit): If this flag is set, then the PCP parameter is taken into account. f. Reserved (Res) (3 bits): The reserved bits take value 0. g. Available Bandwidth (32 bits): The Available Bandwidth is specific to the priority class identified by the PCP parameter if the PCP flag is set, otherwise, it is total bandwidth. In-line with the bandwidth parameters specified in [RFC5305], the Available Bandwidth is encoded as a 32-bit IEEE floating point number, and the units are bytes (not bits!) per second. Thus, the Available Bandwidth constraint applied for a priority class is easily comparable with the Unreserved Bandwidth stored in the TED for the given priority class (see sub-TLV 11 specified by [RFC5305]). The bandwidth constraint applies for both directions in case of symmetric explicit trees. Nevertheless, a VID associated with an explicit tree can be made unidirectional by means of the T/R flags belonging to the VID in the Hop sub-TLV (item g. in Section 5.2) of the traffic end points. If all the VIDs of the Topology sub-TLV (Section 5.1) are unidirectional and all belong to the priority class identified by the PCP parameter of the Bandwidth Constraint sub-TLV, then it is enough to meet the bandwidth constraint in the direction applied for those VIDs. 5.4. Bandwidth Assignment sub-TLV IS-IS PCR may be used for recording bandwidth assignment for explicitly placed data traffic in a domain if MSRP is not used within the domain. If MSRP is used in a domain, then only MSRP performs reservations. The Bandwidth Assignment sub-TLV can be used to define the amount of bandwidth whose assignment is to be recorded by IS-IS PCR at each hop of the explicit tree described by the corresponding Topology sub-TLV (Section 5.1). The Bandwidth Assignment sub-TLV is used by IS-IS PCR for the recording of bandwidth assignment for a priority class. If any conflict rises when recording bandwidth assignments in a domain with multiple PCEs, then IS-IS PCR resolves the conflict as described in Section 3. The Bandwidth Assignment sub-TLV is conveyed by a Topology sub-TLV (Section 5.1). Figure 5 shows the format of the Bandwidth Assignment sub-TLV. Farkas, et al. Expires June 18, 2015 [Page 19] Internet-Draft IS-IS PCR December 2014 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+ | Type | (1 byte) +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+ | PCP |D| Res | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Bandwidth (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 5: Bandwidth Assignment sub-TLV The parameters of the bandwidth constraint are encoded as follows: a. Type (8 bits): The type of the sub-TLV, its value is TBD. b. Length (8 bits): The total number of bytes contained in the Value field. The value of the Length field is 5 bytes. c. PCP (3 bits): The PCP parameter specifies the priority class the bandwidth to be assigned for. d. DEI (D) (1 bit): This is the Drop Eligible Indicator (DEI) parameter. If the DEI parameter is clear, then the bandwidth assignment is performed for providing committed information rate. If the DEI parameter is set, then the bandwidth assignment is performed for providing peak information rate. e. Reserved (Res) (4 bits): The reserved bits take value 0. f. Bandwidth (32 bits): This is the amount of bandwidth to be assigned for the priority class identified by the PCP parameter. In-line with the bandwidth values specified in [RFC5305], the Bandwidth parameter is encoded as a 32-bit IEEE floating point number, and the units are bytes (not bits!) per second. The bandwidth assignment applies for both directions in case of symmetric explicit trees. 6. MRT-FRR Application The GADAG is identical for all the MRTs within a network domain, as a consequence of the use of the MRT Lowpoint Algorithm [I-D.ietf-rtgwg-mrt-frr-algorithm]. Therefore, it is beneficial to compute the GADAG by a single entity, which is referred to as the GADAG Computer and is either a PCE or the GADAG Root. Farkas, et al. Expires June 18, 2015 [Page 20] Internet-Draft IS-IS PCR December 2014 The GADAG computation requires the selection of the GADAG Root. The bridge with the best Bridge Identifier is selected as the GADAG Root, where the numerically lower value indicates the better identifier. The Bridge Priority component of the Bridge Identifier allows the configuration of the GADAG Root by management action. The Bridge Priority is conveyed by the SPB Instance sub-TLV [RFC6329]. Based on its LSDB, each bridge can locally determine which bridge is the GADAG Root and then compute the GADAG. The MRTs are then computed based on the GADAG. The GADAG Computer performs the GADAG computation as specified by the MRT Lowpoint Algorithm [I-D.ietf-rtgwg-mrt-frr-algorithm]. The GADAG Computer then encodes the GADAG in a Topology sub-TLV (Section 5.1), which is then flooded throughout the domain. A GADAG is encoded in a Topology sub-TLV by means of directed ear decomposition as follows. A directed ear is a directed point-to-point path whose end points can coincide but no other element of the path is repeated in the ear. Each ear is specified by an ordered list of hops such that the order of hops is according to the direction of the arcs in the GADAG. There are no leaves in a GADAG, hence, the Leaf flag (item c.5. in Section 5.2) is used to ease the parsing of the Topology sub-TLV; the Leaf flag is used to mark the end of an ear. The sequence of ears in the Topology sub-TLV is such that the end points of an ear belong to former ears. The GADAG Root is not marked by any flag but the GADAG Root is the first hop in the Topology sub-TLV, correspondingly the first ear starts and ends with the GADAG Root. MRT Roots are marked by the Root flag (item c.4. in Section 5.2) and all other traffic end points are leaves of the given MRTs. If no MRT Root is specified, then each SPT Root is also an MRT Root. Figure 6 shows an example GADAG. The figure also illustrates the description of the GADAG, it shows the System ID parameter of the Hop sub-TLV (Section 5.2) and the order of hops in the Topology sub-TLV (Section 5.1). Farkas, et al. Expires June 18, 2015 [Page 21] Internet-Draft IS-IS PCR December 2014 +-----------+ | A | +-----------+ | B | +-----------+ | C | +-----------+ | F | [B]<---[A]<---[I] +-----------+ | ^ ^ | A | | | | +-----------+ V | | | C | [C]--->[F]--->[H] +-----------+ | ^ | D | | | +-----------+ V | | E | [D]--->[E]--->[G] +-----------+ | G | +-----------+ | H | +-----------+ | I | +-----------+ | A | +-----------+ | F | +-----------+ | H | +-----------+ Figure 6: A GADAG and its description; GADAG root = Node A 7. Summary This document specifies IS-IS sub-TLVs for the control of explicit trees in Layer 2 networks. These sub-TLVs can be also used for the distribution of a centrally computed GADAG if MFT-FRR is used. 8. IANA Considerations Four new code points are required within MT-Capability for the four new sub-TLVs: o Topology sub-TLV o Hop sub-TLV o Bandwidth Constraint sub-TLV Farkas, et al. Expires June 18, 2015 [Page 22] Internet-Draft IS-IS PCR December 2014 o Bandwidth Assignment sub-TLV 9. Security Considerations This document adds no additional security risks to IS-IS, nor does it provide any additional security for IS-IS when used in a configured environment or a single-operator domain such as a data center. 10. Acknowledgements The authors would like to thank Don Fedyk for review and comments. 11. References 11.1. Normative References [I-D.ietf-isis-te-metric-extensions] Previdi, S., Giacalone, S., Ward, D., Drake, J., Atlas, A., Filsfils, C., and W. Wu, "IS-IS Traffic Engineering (TE) Metric Extensions", draft-ietf-isis-te-metric- extensions-04 (work in progress), October 2014. [I-D.ietf-rtgwg-mrt-frr-algorithm] Envedi, G., Csaszar, A., Atlas, A., Bowers, C., and A. Gopalan, "Algorithms for computing Maximally Redundant Trees for IP/LDP Fast- Reroute", draft-ietf-rtgwg-mrt-frr- algorithm-01 (work in progress), July 2014. [IEEE8021Qca] IEEE 802.1, "IEEE 802.1Qca Bridges and Bridged Networks - Amendment: Path Control and Reservation - Draft 1.2", (work in progress), December 4, 2014, . [IEEE8021aq] IEEE 802.1, "IEEE 802.1aq: IEEE Standard for Local and metropolitan area networks - Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks - Amendment 20: Shortest Path Bridging", 2012, . [RFC5303] Katz, D., Saluja, R., and D. Eastlake, "Three-Way Handshake for IS-IS Point-to-Point Adjacencies", RFC 5303, October 2008. [RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic Engineering", RFC 5305, October 2008. Farkas, et al. Expires June 18, 2015 [Page 23] Internet-Draft IS-IS PCR December 2014 [RFC5307] Kompella, K. and Y. Rekhter, "IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 5307, October 2008. [RFC6329] Fedyk, D., Ashwood-Smith, P., Allan, D., Bragg, A., and P. Unbehagen, "IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging", RFC 6329, April 2012. 11.2. Informative References [I-D.ietf-rtgwg-mrt-frr-architecture] Atlas, A., Kebler, R., Bowers, C., Envedi, G., Csaszar, A., Tantsura, J., Konstantynowicz, M., and R. White, "An Architecture for IP/LDP Fast-Reroute Using Maximally Redundant Trees", draft-ietf-rtgwg-mrt-frr-architecture-04 (work in progress), July 2014. [RFC4655] Farrel, A., Vasseur, J., and J. Ash, "A Path Computation Element (PCE)-Based Architecture", RFC 4655, August 2006. Authors' Addresses Janos Farkas (editor) Ericsson Konyves Kalman krt. 11/B Budapest 1097 Hungary Email: janos.farkas@ericsson.com Nigel Bragg Ciena 43-51 Worship Street London EC2A 2DX UK Email: nbragg@ciena.com Paul Unbehagen Jr Avaya 1300 W. 120th Avenue Westminster CO 80234 USA Email: unbehagen@avaya.com Farkas, et al. Expires June 18, 2015 [Page 24] Internet-Draft IS-IS PCR December 2014 Glenn Parsons Ericsson 349 Terry Fox Drive Ottawa ON, K2K 2V6 Canada Email: glenn.parsons@ericsson.com Peter Ashwood-Smith Huawei Technologies 303 Terry Fox Drive, Suite 400 Ottawa ON, K2K 3J1 Canada Email: Peter.AshwoodSmith@huawei.com Farkas, et al. Expires June 18, 2015 [Page 25]