Internet DRAFT - draft-fedyk-isis-spb

draft-fedyk-isis-spb




 Working Group                             Peter Ashwood-Smith 
 Internet-Draft                                      Don Fedyk 
 Date Created: June, 2009                          David Allan 
 Expiration Date:  January, 2010               Jerome Chiabaut 
 Intended Status: Informational                    Nigel Bragg 
                                                                       
 Preliminary                                                   
                                                                        
                                                                        
                                                                        
                                        
      
           Shortest Path Bridging and Backbone Bridging with IS-IS  
                         draft-fedyk-isis-spb-00.txt 
   
      
  Status of this Memo 
   
     This Internet-Draft is submitted to IETF in full conformance with 
     the provisions of BCP 78 and BCP 79. 
      
     Internet-Drafts are working documents of the Internet Engineering 
     Task Force (IETF), its areas, and its working groups.  Note that 
     other groups may also distribute working documents as Internet-
     Drafts. 
      
     Internet-Drafts are draft documents valid for a maximum of six 
     months and may be updated, replaced, or obsoleted by other 
     documents at any time.  It is inappropriate to use Internet-Drafts 
     as reference material or to cite them other than as "work in 
     progress." 
      
     The list of current Internet-Drafts can be accessed at 
     http://www.ietf.org/ietf/1id-abstracts.txt. 
      
     The list of Internet-Draft Shadow Directories can be accessed at 
     http://www.ietf.org/shadow.html. 
      
     This Internet-Draft will expire in January 6th 2010. 
   
  Copyright Notice 
      
     Copyright (c) 2009 IETF Trust and the persons identified as the 
     document authors. All rights reserved. 
      
     This document is subject to BCP 78 and the IETF Trust's Legal 
     Provisions Relating to IETF Documents in effect on the date of 
     publication of this document (http://trustee.ietf.org/license-info). 
     Please review these documents carefully, as they describe your 
     rights and restrictions with respect to this document. 


    
  Fedyk et al.                                           [Page 1] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
      
  Abstract 
   
     Several techniques are being developed which use IS-IS to deliver 
     link state based layer 2 forwarding. The superset of the extensions 
     proposed to IS-IS to allow these capabilities is found in [IS-IS-
     L2].  One technique for layer 2 forwarding is being specified in 
     the IEEE 802.1aq task group, under the over-arching title 
     of "Shortest Path Bridging" (SPB). SPB however only requires a 
     subset of the proposed IS-IS extensions in [IS-IS-L2]. For clarity 
     this informational draft documents only the subset required by SPB. 
     In addition a high level introduction, describing how these TLVs 
     are used is provided for those who do not follow the IEEE work in 
     detail. A reference is also given to the normative IEEE 802.1aq 
     document  The ordering of material in this document follows that of 
     Clause 28 of IEEE 802.1aq, to aid cross-referencing. 
      
      
      
  Conventions used in this document  
   
     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   
     "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
     document are to be interpreted as described in [RFC2119]. 
   
   
   
  Table of Contents 
   
     1.   Terminology..................................................3 
     2.   Introduction.................................................4 
     3.   New TLVs for SPB and SPBB....................................6 
     3.1  Base Vlan-Identifiers sub-TLV................................7 
     3.2  SPB/SPBB Instance sub-TLV....................................8 
     3.3  SPB Link Metric sub-TLV......................................9 
     3.4  The Group MAC Address sub-TLV................................9 
     3.5  The Service Identifier and Unicast Address sub-TLV..........10 
     4.   Security Considerations.....................................10 
     5.   IANA Considerations / ISO Considerations....................10 
     6.   References..................................................11 
     6.1  Normative References........................................11 
     6.2  Informative References......................................11 
     7.   Acknowledgments.............................................12 
     8.   Author's Addresses..........................................12 
   







   
  Fedyk et al.                                              [Page 2] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
  1. Terminology 
      
     In addition to well understood IS-IS terms, this memo uses 
     terminology from IEEE 802.1 and introduces a few new terms: 
      
     802.1ah      Provider Backbone Bridges a.k.a. Mac-in-Mac 
                  encapsulation 
     802.1aq      Shortest Path Bridging (SPB)     
     B-DA         Backbone Destination Address in 802.1ah Mac-in-Mac 
                  header 
     B-MAC        Backbone MAC Address 
     B-SA         Backbone Source address in 802.1ah Mac-in-Mac header 
     B-VID        Backbone VLAN ID in 802.1ah Mac-in-Mac header 
     B-VLAN       Backbone Virtual LAN 
     C-MAC        Customer MAC. Inner MAC in 802.1ah Mac-in-Mac header 
     C-VID        Customer VLAN ID 
     C-VLAN       Customer Virtual LAN  
     DA           Destination Address 
     FIB          Forwarding information base (B-DA/B-VID to next hop(s)) 
     ISID         802.1ah: service membership in datapath(not always=SID) 
     MAC          Media Access Control 
     PBB          Provider Backbone Bridges as specified in 802.1ah 
     M-IS-IS      Multi Topology IS-IS as used in [MT] 
     MT           Multi Topology. As used in [MT] 
     MT-ID        Multi Topology Identifier (12 bits). As used in [MT] 
     SPSourceID   20 bit nodal identifier used with SID forms mcast DA. 
     PATHID       The unique identifier for a path used for symmetric tie  
                  breaking 
     PBB          Provider Backbone Bridge 
     PBT          Provider Backbone Transport 
     SA           Source Address 
     SID          Service Identifier at control plane, groups many ISIDs 
     UNI          User Network Interface: Customer/Backbone attach point 
     VID          VLAN ID  
      
      
















   
  Fedyk et al.                                              [Page 3] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
   
  2. Introduction 
      
     Shortest Path Bridging (SPB) and Shortest Path Backbone Bridging 
     (SPBB) both apply the [IS-IS] protocol to the utilization of mesh 
     topologies for native Ethernet bridging.  While 802.1aq has the 
     umbrella title of shortest path bridging, this memo adopts the 
     convention of ascribing unique attributes to the terms SPB and SPBB 
     individually; SPB uses an IEEE 802.1Q forwarding paradigm, whilst 
     SPBB extends the FIB population techniques specified in 802.1Qay 
     combined with IEEE 802.1ah [PBB] adaptation.  Both SPB and SPBB 
     forward packets on shortest path trees with minimum path cost as a 
     first order tie-breaker, where for any pair of nodes A and B, the 
     unicast path for A to B is the exact reverse of the path from B to A 
     (reverse path congruency), and all multicast traffic between the two 
     nodes follows the unicast path (multicast and unicast congruency). 
     These are direct extensions to fundamental Ethernet forwarding 
     properties in IEEE bridged networks.  
      
     In SPB, conventional bridge learning is used to associate (customer) 
     MAC addresses to ports and hence routes through the SPB region.  The 
     source-rooted tree associated with each node is assigned a unique 
     VLAN ID (the SPVID) to identify it. 
      
     The 802.1ah [PBB] MAC-in-MAC encapsulation used by SPBB permits the 
     isolation of customer Ethernet addressing from backbone Ethernet 
     addressing in the core of a network. This has an important 
     consequence; the association between a customer MAC (C-MAC) and a B-
     MAC to resolve forwarding across the core is required only at the 
     edge of the network. Flooding is only done by the edge adaptation 
     functions to learn which B-MAC reaches a given C-MAC using the 
     normal PBB C-MAC learning behavior, flooding at the C-MAC layer 
     resolving to a service specific multicast tree at the B-MAC layer.  
      
     A minimum of one B-VID MUST be assigned to each instance of SPBB 
     (IS-IS MT-ID). The B-VID MUST be unique backbone network wide. Two 
     B-VIDs MAY be used by a single SPBB instance (MT-ID) when it is 
     desired to use more than one equal cost shortest path permutation.  
   
     With Spanning Tree Protocol (STP), Rapid STP or Multiple STP[802.1Q] 
     Ethernet networks use a shared spanning tree (or a small number of 
     shared trees) to route traffic based on the VLAN ID and then on 
     learned MAC addresses. Per service multicast is instantiated as a 
     (*,G) multicast address which is a proper subset of the VID.  
   
     In order to move from a shared spanning tree to mesh connectivity, 
     SPB and SPBB use one or more broadcast trees per source as a 
     template for per service multicast trees i.e.(S,G).  
      
     SPB uses the SPVID when flooding, with conventional pruning as C-MAC 
     addresses are learned. 
        
   
  Fedyk et al.                                              [Page 4] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
     SPBB adapts client flooding onto service specific multicast trees 
     instantiated by encoding S,G in the destination MAC address. SPBB 
     therefore uses both B-VID and B-MAC when forwarding.  
      
     SPBB uses algorithmically constructed addresses for the multicast 
     DA. Multicast addresses are local to a PBB domain. The multicast B-
     MAC DA address constructed for a particular node/service consists of 
     a unique nodal identifier called a SPSourceID (20 bits), combined 
     with the service identifier (SID) (24 bits). Every SPBB node(per 
     SPBB instance/MT-ID) therefore advertises  this unique SPSourceID 
     which can be correlated to the node's ISIS SYSID by all nodes in the 
     SPBB network. 
       
     In SPB, a VID (called the Base VID) is also defined for 
     interoperation with xSTP regions. This VID identifies the Common and 
     Internal Spanning Tree (CIST) in the Shortest Path Region. It is 
     created as a conventional Spanning Tree within the SPB region, and 
     Group MAC addresses, installed by conventional Ethernet mechanisms, 
     may be supported on this VID. 
   
     A node performing SPB or SPBB calculations (for a given instance/MT-
     ID) use the IS-IS topology, and link metrics to compute which leaves 
     of each shortest path tree require transit of the local node, and 
     this node can then do pair-wise comparison of services of interest 
     between the root and the leaves to populate the FIB accordingly. The 
     link metrics are forced to be equal in both directions by defaulting 
     to the largest of the two unidirectional metrics specified for a 
     link as seen during the establishment of a standard IS-IS adjacency.  
      
     A node performing SPB or SPBB for a given MT instance MUST specify 
     the NLPID for SPB and SPBB (IANA allocation 0xC1 pending) in its IS-
     IS hello message. Links that do not support this NLPID for this MT 
     instance must be excluded from the shortest path computations by the 
     given MT instance.  
   
     Both SPB and SPBB employ a transitive symmetric tie breaking 
     algorithm which chooses deterministically and progressively between 
     equal cost alternatives by ranking the paths according to the sorted 
     list of node identifiers that make up the path. This sorted list of 
     node identifiers (SYSIDs) is called the Path Identifier (PATHID). 
     For SPB, and when only one B-VID is used in SPBB, the tie breaking 
     algorithm will always pick from a set of equal cost shortest path 
     alternatives by choosing the path with the lowest PATHID. Two B-VID 
     instances MAY be used for an SPBB instance, when it will assign the 
     lowest PATHID paths to one B-VID and the highest PATHID paths to the 
     other B-VID. In this manner an SPBB instance will use more of the 
     available paths in a network but will do so by assignment of packets 
     at the head ends to one of different SPBB B-VIDs.  
   



   
  Fedyk et al.                                              [Page 5] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
   
  3. New TLVs for SPB and SPBB 
      
     SPB and SPBB require a subset of the [MT] TLVs. 
      
     SPB and SPBB inherit the Multi Topology mechanisms from [MT] to 
     allow multiple logical bridging instances to exist within a single 
     IS-IS control instance. Top level TLV's used by SPB and SPBB 
     therefore begin with the Multi Topology Identifier (MT-ID) fields as 
     defined in [MT] and the new sub-TLVs identified here may be used as 
     sub-TLVs of the corresponding new top level Multi Topology TLV's 
     defined in [MT]. 
      
     In the IEEE the Multiple Spanning tree protocol allowed multiple 
     VIDs to represent a single VLAN. The single "logical" VLAN was 
     identified by a Base VID so that bridges external to the region 
     could have a consistent VID to identify the VLAN.  This concept of a 
     Base VID extends easily to SPB and SPBB.  In this way a Base VID can 
     be used to identify a topology instance and to correlate VIDs that 
     are allocated to a particular shortest path VLAN instance.  
      
     A Shortest Path Region also has the property that viewed from 
     outside the Region it appears as a single 802.1Q or 802.1ah bridge, 
     irrespective of how the VLAN is implemented.   
      
     In SPB, each node uses a unique VID as its source identifier (an 
     SPVID), and each SPVID is correlated to a Base VID.  The set of 
     SPVIDs that map to a given Base VID form the SPB region.  In SPBB, 
     this concept is reused however there is a slight modification. A 
     single B-VID maps to a Base VID for all bridges. However multiple B-
     VIDs (currently two) can map to the same Base VID allowing multiple 
     trees within the SPBB VLAN.  A typical use for multiple trees is to 
     instantiate equal cost paths and provide the opportunity to load 
     spread services.  
      
     A Base VID identifies a traditional spanning tree in both SPB and 
     SPBB that can be used to represent the VLAN for proper bridge 
     behavior when viewed by bridges outside the shortest path region.  
     In essence the VLAN identified by this Base VID can appear as a 
     single bridge allowing proper spanning tree behavior. 
      
     The following sections introduce the new [MT] TLVs which are used by 
     SPB and SPBB, and give an overview of their use from an SPB and SPBB 
     perspective.  
   







   
  Fedyk et al.                                              [Page 6] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
   
  3.1 Base Vlan-Identifiers sub-TLV 
      
     The Base Vlan-Identifier sub-TLV (section 2.3.5 of [IS-IS-L2]) is 
     carried within the Multi Topology aware Port Capability TLV (section 
     2.3 of [IS-IS-L2]), and this is carried in an IIH PDU. 
      
     The purpose of this sub-TLV is to check for compatible configuration 
     of SPB or SPBB mode of operation and then of SPB or SPBB parameters 
     as bridges form adjacencies, and to prevent adjacency formation when 
     incompatible configurations are detected. 
      
     In informal terms this requires : 
     -  agreement on the NLPID for SPB and SPBB  
     -  specification of the bridging mode to be used (SPB or SPBB) 
     -  binding of individual VIDs to the Base VID, and specification of 
        the shortest path bridging algorithm to be used for each VID 
     -  use (or not) of auto allocation capability for SPVIDs in SPB and 
        SPSourceIDs in SPBB.  
      
     It was mentioned earlier that each SPB node is assigned a unique VID 
     (a Shortest Path VID, or SPVID) as its source identifier for all 
     traffic it transmits. The set of SPVIDs, one for each SPB node in 
     the region, are bound to the Base VID, configured to execute a 
     specific tiebreaking algorithm, and collectively provide the 
     shortest path trees to support the VLAN.  A control flag in the sub-
     TLV determines whether the SPVIDs are provisioned, or auto-allocated 
     by the procedure in [801.1aq] 
      
     In SPB, the Base VID is also used to identify a VLAN providing peer 
     inter-working with other non-SPB bridges outside the SPB Region.  
     This VLAN forms a spanning tree across the region to achieve this. 
      
     In SPBB, the VID(s) on which forwarding is performed are Region-wide 
     assignments.  At present, the use of one or two VIDs is defined, 
     with the latter capability available for edge-based load spreading 
     using Equal Cost Multiple Trees generated via the symmetric tie-
     breaking variations. 
      
     Three algorithms are currently available to SPB and SPBB : 
     -  spanning tree algorithm, which constructs a tree which is the 
        same as would be constructed by Spanning Tree Protocol [802.1D] 
     -  shortest path trees, selecting the low PATHID as a tie-breaker 
     -  shortest path trees, selecting the high PATHID as a tie-breaker 
   







   
  Fedyk et al.                                              [Page 7] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
   
  3.2 SPB/SPBB Instance sub-TLV 
      
     The SPB/SPBB Instance sub-TLV (section 2.5.1 of [IS-IS-L2]) is 
     carried within the Multi Topology Aware Capability TLV (section 2.5 
     of [IS-IS-L2]). 
      
     The purpose of this sub-TLV is to announce configuration and other 
     parameters to the entire SPB or SPBB Region. The instance sub-TLV 
     carries some information elements common to the Base VLAN-
     Identifiers sub-TLV described in the previous section, which are : 
     -  binding of individual VIDs to the Base VID, and specification of 
        the shortest path bridging algorithm to be used for each VID 
     -  use (or not) of auto allocation capability for SPVIDs in SPB and 
        SPSourceIDs in SPBB.   
      
     The SPB/SPBB Instance sub-TLV carries further information : 
     -  the SPSourceID - the 20 bit network wide unique identifier used 
        in the higher order bits of the SPBB multicast DA for packets 
        originating at this node  
     -  various Spanning Tree parameters for inter-working with non-SPB 
        regions  
      
     In SPB, the multicast tree built off each SPB node is uniquely 
     associated with an SPVID which thereby identifies the source.  The 
     required (S,G) trees, and loop avoidance checking, may be directly 
     implemented using this SPVID by standard Ethernet forwarding. The 
     SPVID can be configured from a pool or it can be auto allocated.  
      
     In SPBB multicast, the same capability is achieved by encoding the 
     service-specific (S,G) tree in the multicast Destination Address. 
     This is achieved by concatenating the PBB Service Identifier with 
     the nodal SPSourceID.  The distribution of SPSourceID therefore 
     allows all SPBB nodes to compute the forwarding state they need to 
     install, based only on topology and service endpoint locations. The 
     computed SPBB multicast DA looks like this: 
      
        +-+-+-+-+-----------------------+---------------------------+ 
        |M/L| A | SPSourceID (20 bit)   |       I-SID (24 bit)      | 
        +-+-+-+-+-----------------------+---------------------------+ 
      
          Where M/L = multicast/local bits 
                     (2 bits - both set to 1) 
                  A = SPSourceID allocation style 
                     (2 bits - both 0 initially) 
      
                  Figure 1: SPBB multicast MAC address construction 
      
      
     The SPSourceID can be provisioned, or auto allocated. 
      
     The Spanning tree inter-working parameters for SPB comprise : 

   
  Fedyk et al.                                              [Page 8] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
     -  a Spanning tree compatible Bridge identifier, configured exactly 
        as specified in [802.1D].  This allows SPB to build a compatible 
        Spanning tree using link state. 
     -  The Base VID identifies a VLAN capable of covering multiple 
        Regions, SPB and non-SPB.  In SPB, this is known as the Common 
        and Internal Spanning Tree (CIST).  At SPB Region boundaries, the 
        CIST Root Identifier and the CIST External Root Path Cost may be 
        imported from xSTP and flooded by IS-IS as a part of SPB`s 
        Spanning Tree emulation. 
      
   
  3.3 SPB Link Metric sub-TLV 
      
     SPB Link Metric sub-TLV (section 2.6 of [IS-IS-L2]) is carried 
     within the Extended Reachability TLV, or the Multi Topology 
     Intermediate System TLV. 
      
     The purpose of this sub-TLV is to announce SPB link metrics, in a 
     form which enables SPB to build xSTP compatible Spanning Trees, 
     typically to create the SPB component of the CIST (above) : 
     -  indicates the administrative cost or weight of using a link 
     -  a standard IEEE port identifier used to build a spanning tree 
        associated with this link 
      
      
  3.4 The Group MAC Address sub-TLV 
      
     The Group MAC Address sub-TLV (section 2.2.1 of [IS-IS-L2]) is 
     carried within the Group Address TLV (section 2.2 of [IS-IS-L2]), 
     which is in turn carried within the Multicast Group Level 1 link 
     state PDU. 
      
     This sub-TLV is used only by SPB.  SPBB builds and installs per-
     service per-source multicast addresses algorithmically, as 
     described earlier, using the SPSourceID and PBB Service Identifier 
     information announced in other sub-TLVs.   
      
     By default, SPB nodes broadcast traffic to all other nodes in their 
     region.  When inter-working with non-SPB regions over the CIST, 
     multicast group membership may be signaled over the CIST using 
     mechanisms such as MMRP [802.1ak].  The Group MAC Address sub-TLV 
     allows such registrations to be imported and announced by IS-IS. 
      
     The sub-TLV carries the following information for SPB : 
     -  the VID with which all subsequent MAC addresses are associated 
     -  sets of group records, each consisting of a multicast group 
        address and a list of unicast MAC addresses known to be sources 
        of that group. 
      



   
  Fedyk et al.                                              [Page 9] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
      
  3.5 The Service Identifier and Unicast Address sub-TLV 
      
     The Service Identifier and Unicast Address sub-TLV (section 2.5.2 of 
     [IS-IS-L2]) is carried within the Multi Topology Aware Capability 
     TLV (section 2.5 of [IS-IS-L2]). 
      
     The purpose of this sub-TLV is to announce service group membership 
     (using the PBB Service Identifier or I-SID) on the originating node, 
     also to advertise an additional B-MAC unicast address present on or 
     reachable by the node.  It is applicable to SPBB only. 
      
     This sub-TLV carries: 
     -  the unicast B-MAC address which must be used to send to the set 
        of PBB I-SIDs announced in the sub-TLV, and which this node will 
        use as its source B-MAC when transmitting these I-SIDs 
     -  the unicast VID which must be used to send to the set of PBB I-
        SIDs announced in the sub-TLV, and which this node will use when 
        transmitting these I-SIDs 
     -  a list of PBB I-SIDs and their transmit and receive properties. 
   
     Announcement of I-SIDs in this way allows all SPBB nodes to see all 
     service endpoints, and allows nodes not terminating a particular 
     service to algorithmically determine the per-service per-source 
     forwarding state which they must install if they lie on the shortest 
     path between two or more service end-points. 
      
     The advertisement of the B-MAC unicast address to be used to reach 
     the set of services allows different granularities of addressing to 
     be used within the SPBB node, without compromising inter-working 
     between nodes of different types.  It also has application in some 
     resiliency schemes. 
   
      
  4. Security Considerations 
      
     This document adds no additional security risks to IS-IS. 
      
     SPBB assumes that the link state bridged subnetwork consists of 
     trusted devices and that the UNI ports to the domain are untrusted. 
     Care is required to ensure untrusted access to the trusted domain 
     does not occur.  
        
      
  5. IANA Considerations / ISO Considerations 
      
     See the subset of [IS-IS-L2] cited by this document and also the 
     NLPID assignments requested by [NLPID]. 
      



   
  Fedyk et al.                                             [Page 10] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
      
  6. References 
      
  6.1  Normative References 
   
     [RFC2119]    Bradner, S., "Key words for use in RFCs to Indicate 
                  Requirement Levels", BCP 14, RFC 2119, March 1997.  
      
     [MT]         Multi Topology (MT) Routing in Intermediate System to 
                  Intermediate Systems (IS-ISs), 
                  RFC 5120, February 2008 
   
     [802.1D]     "IEEE draft Standard for Local and Metropolitan  
                  Networks, Media Access Control (MAC) Bridges", 
                  IEEE 802.D June 2004  
      
     [802.1aq]    "IEEE draft Standard for Local and Metropolitan  
                  Networks, Virtual Bridged Local Area Networks,  
                  Amendment 9: Shortest Path Bridging",  
                  IEEE 802.1aq D2.0, June 2009 
      
     [802.1ak]    "IEEE Standard for Local and Metropolitan Networks, 
                  Virtual Bridged Local Area Networks, Amendment 7: 
                  Multiple Registration Protocol" 
                  IEEE Std 802.1ak - 2007 amendment to IEEE 802.Q - 2005  
                   
     [PBB]        "IEEE Standard for Local and Metropolitan  
                  Networks, Virtual Bridged Local Area Networks,  
                  Amendment 7: Provider Backbone Bridges"  
                  IEEE Std 802.1ah - 2008 amendment to IEEE 802.Q - 2005 
      
     [IS-IS-L2]   Extensions to IS-IS for Layer-2 Systems, IETF,  
                  Internet Draft, draft-ietf-isis-layer2-00.txt,  
                  Work in Progress, June 2009 
              
     [NLPID]      IANA Considerations for NLPIDs, IETF,  
                  Internet Draft, Draft-eastlake-nlpid-iana-
                  considerations-00.txt,  
                  Work in Progress, June 23, 2009 
                   
      
  6.2  Informative References 
      
      
     [IS-IS]      ISO/IEC 10589:2002, "Intermediate system to  
                  Intermediate system routing information exchange 
                  protocol" ISO/IEC 
                  10589:2002. 
                   
      
      
      
   
  Fedyk et al.                                             [Page 11] 
   
   
  Internet Draft     draft-fedyk-isis-spb-00.txt        July 2009 
   
      
  7. Acknowledgments 
      
     The authors would like to thank Antonela Paraschiv, Daniel Joyal, 
     Paul Unbehagen and Gautam Khera for their detailed review of this 
     work. 
      
  8. Author's Addresses 
      
         
     Don Fedyk 
     Alcatel-Lucent 
     220 Hayden Road 
     Groton, MA, USA 
     Email donald.fedyk@alcatel-lucent.com 
      
     Peter Ashwood-Smith 
     Huawei Technologies Canada 
     411 Leggget Drive, Suite 503 
     Kanata, Ontario, K2k3C9, Canada 
     Email: peter.ashwoodsmith@huawei.com 
      
     Nigel Bragg 
     Nortel Networks 
     London Road, Harlow, 
     Essex  CM17 9NA,  UK 
     Email: nbragg@nortel.com 
   
     David Allan 
     Nortel Networks 
     3500 Carling Ave. 
     Ottawa, ON, Canada 
     K1Y4H7 
     Email: dallan@nortel.com 
      
     Jerome Chiabaut 
     Nortel Networks 
     3500 Carling Ave. 
     Ottawa, ON, Canada 
     K1Y 4H7 
     Email: chiabaut@nortel.com 










   
  Fedyk et al.                                             [Page 12]