Internet DRAFT - draft-gray-rbridge-routing-reqs

draft-gray-rbridge-routing-reqs




Network Working Group                                           E. Gray
Internet Draft                                                   Editor
Expires: April, 2006                                            Marconi

                                                                       
                                                          October, 2005


                                      
                Routing Requirements in Support of R-Bridges
                    draft-gray-rbridge-routing-reqs-00.txt 



Status of this Memo 

   By submitting this Internet-Draft, each author represents that       
   any applicable patent or other IPR claims of which he or she is       
   aware have been or will be disclosed, and any of which he or she       
   becomes aware will be disclosed, in accordance with Section 6 of       
   BCP 79. 

   This document may not be modified, and derivative works of it may 
   not be created, except to publish it as an RFC and to translate it
   into languages other than English. 

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 

   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 

   This Internet-Draft will expire on April 15, 2006. 

Copyright Notice 

   Copyright (C) The Internet Society (2005).  All Rights Reserved. 

 
 



 
Gray                     Expires April 15, 2006                [Page 1] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 
    

Abstract 

   RBridges provide the ability to have an entire campus, with multiple 
   physical links, look to IP like a single subnet. The design allows 
   for zero configuration of switches within a campus, optimal pair-wise 
   routing, safe forwarding even during periods of temporary loops, and 
   the ability to cut down on ARP/ND traffic. The design supports VLANs,
   allows forwarding tables to be based on RBridge destinations (rather 
   than endnode destinations, allowing internal forwarding tables to be 
   smaller than in conventional bridge systems) and re-uses existing 
   routing protocols (for - at least - distribution of reachability of
   destinations and shortest path computation within a campus). 

   In order to accomplish this, the design may impose requirements for
   extensions to existing routing protocols necessary to accomplish the
   distribution and computation processes, as well as specific limits on
   interactions between bridge, R-Bridge and Router instances.


Table of Contents 
    
   1. Introduction...................................................2 
   2. Link State Protocol Requirements...............................4 
   3. Issues.........................................................5 
      3.1. Interactions with Spanning Tree Forwarding................5 
         3.1.1. Per-ingress Spanning Tree............................5 
         3.1.2. Per VLAN.............................................5 
         3.1.3. Single Spanning Tree.................................5 
      3.2. Interactions with Spanning Tree Protocol Operation........5 
      3.3. R-Bridge Interactions with Routing........................6 
   4. Security Considerations........................................6 
   5. Conclusions....................................................6 
   6. Acknowledgments................................................6 
   7. References.....................................................6 
      7.1. Normative References......................................6 
      7.2. Informative References....................................7 
   8. Author's Address(es)...........................................7 
   9. Intellectual Property Statement................................7 
   10. Disclaimer of Validity........................................7 
   11. Copyright Statement...........................................8 
   12. Acknowledgment................................................8 


1. Introduction 

   The current dominant approach to segregating network traffic relies
   on a hierarchical arrangement of bridges and routers.  Hierarchical
   network structure is thus based on a determined trade-off between
   limitations of IP routing and similar disadvantages of 802 bridging.



Gray                     Expires April 15, 2006                [Page 2] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 



   For example, bridged networks consist of single broadcast/flooding
   domains.  Ethernet/802 encapsulation (on which bridging is based) 
   does not provide mechanisms for reducing the impact of looping data 
   traffic that may result from a transient change in network topology
   and the existence of multiple paths. Considerations of consequences
   of looping traffic - and the potential for exponentially increasing
   load in the case of looping broadcast or flooded data - impose a set
   of disciplines on the use of bridge interconnections that:

   1) Result in inefficient use of inter-bridge connections and
   2) Delays in forwarding traffic as a result of changes in the
      network topology.

   The combined effect of broadcast/flooding, and loop avoidance, sets 
   practical limits on bridged network size in the network hierarchy.
   Inefficient use of inter-bridge connections similarly sets limits 
   on the usefulness of bridging with high-speed (and consequent high
   cost) interfaces.

   For IP routed networks, any link (or subnet) must have at least one 
   unique prefix. This means that a node that moves from one IP subnet 
   to another must change its IP address. Also, nodes with multiple IP
   subnet attachments must have multiple IP addresses.  In IP routed
   networks, there are frequent trade-off considerations between using 
   smaller subnets (longer prefix length) to minimize wasted IP address 
   space (as a result of unused addresses in the fixed address range 
   defined by the prefix and length) and using larger subnets (shorter
   prefix length) to minimize the need for (changes in) configuration.

   In any case - with current IP routing technology - subnets must be 
   configured for each routed interface.

   R-Bridges are intended to incorporate the efficient bandwidth use of
   IP routing with the simplicity of Ethernet/802 bridging for networks
   possibly larger - and with greater forwarding capacity - than is the
   case with current Ethernet/802 bridged networks.

   The approach that we will use in accomplishing this is based on the
   idea of extending (one or more) link state routing protocol(s) to
   include distribution of Ethernet/802 reachability information between
   R-Bridge instances. In addition, there may be specific requirements
   imposed on the interactions between these extensions and the Spanning
   Tree Protocol (STP) and between R-Bridge instances and (potentially
   colocated) IP routing instances.







Gray                     Expires April 15, 2006                [Page 3] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 






   RBridges are fully compatible with current bridges as well as current 
   IPv4 and IPv6 routers and endnodes.  They are as invisible to current
   IP routers as bridges are, and like routers, they terminate a bridged 
   spanning tree. 


2. Link State Protocol 

   Running a link state protocol among RBridges is straightforward.  It 
   is the same as running a level 1 routing protocol in an area.  IS-IS 
   is a more appropriate choice than OSPF in this case because it is 
   easy in IS-IS to define new TLVs for carrying new information.  This
   document, however, does not mandate use of any specific link-state
   routing protocol.  Instead, it sets forth the requirements that will
   apply to any link-state routing protocol that may be used.
 
   To keep R-Bridge and Routing instances separate (assuming both are 
   colocated), RBridge routing messages should be sent to a different 
   Ethernet/802 multicast address than the link-state routing protocol
   messages used for IP routing - or (as an IS-IS example) they may be 
   differentiated by use of different "area address", where, in order 
   to keep RBridges configuration-free, the RBridge area address would 
   be a constant for all RBridges, and would not be one that would ever 
   appear as a real IS-IS area address. 

   Information that RBridge link state information will carry includes: 

   o  layer 2 addresses of nodes within the campus which have 
      transmitted packets but have not transmitted ARP or ND replies  

   o  layer 3, layer 2 addresses of IP nodes within the campus.  For 
      data compression, perhaps only the portion of the address 
      following the campus-wide prefix need be carried.  This will be 
      more of an issue for IPv6 than for IPv4. 

   o  VLANs directly connected to this RBridge 

   The endnode information (the endnode information) need only be 
   delivered to RBridges supporting the VLAN in which the endnode 
   resides. So for instance, if endnode E is discovered through a VLAN A 
   packet, then E's location need only be delivered to other RBridges 
   that are attached to VLAN A links. 






Gray                     Expires April 15, 2006                [Page 4] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 



   Given that RBridges must support delivery only to links within a VLAN 
   (for multicast or unknown packets marked with the VLAN's tag), this 
   mechanism can be used to advertise endnode information solely to
   RBridges within a VLAN. Although a separate instance of the link 
   state protocol could be run for this purpose, the topology is so 
   restricted (just a single broadcast domain), that it might be 
   preferable to design a special case mechanism where each DR 
   advertises its attached endnodes, and receives explicit acks from the 
   other RBridges. 


3. Issues 

3.1. Interactions with Spanning Tree Forwarding 

3.1.1. Per-ingress Spanning Tree 

   TBD

3.1.2. Per VLAN 

   TBD

3.1.3. Single Spanning Tree 

   TBD
 

3.2. Interactions with Spanning Tree Protocol Operation

   RBridges MUST calculate a spanning tree for each broadcast domain. In 
   a campus without VLANs, this means a single spanning tree could be 
   used for delivery of packets with unknown or group address layer 2 
   destination. 

   While it is possible to support VLANs with a single spanning tree, and 
   just avoid forwarding the decapsulated packet onto links that do not 
   support that VLAN, the solution will allow for more optimal delivery 
   if a different spanning tree is calculated for each broadcast domain.  

   It is neither necessary, nor desirable, to use the bridge spanning tree 
   algorithm to calculate spanning trees. Instead, spanning trees SHOULD 
   be calculated based on the link state information. Using the link state 
   protocol to calculate spanning trees makes the design very flexible and 
   efficient. The link state database gives sufficient information so 
   that RBridges can calculate a single spanning tree, spanning trees 





Gray                     Expires April 15, 2006                [Page 5] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 



   per VLAN, or per-ingress RBridge spanning trees without requiring any 
   additional exchange of information between RBridges. 

3.3. R-Bridge Interactions with Routing 

   Because R-Bridges will need to participate in flooding, and will have
   other significant differentiations in forwarding behavior, it may be
   necessary to maintain separate routing instances if an R-Bridge and 
   Router are colocated. Otherwise, interactions between routers and 
   R-Bridges SHOULD be identical to interactions with bridges.

4. Security Considerations 

   The goal is not to add additional security issues over what would be 
   present with traditional bridges and routers.  R-Bridge Interactions
   with Routers MUST be defined such that there is no "leaking" of info
   used in authentication and/or encryption between router and r-bridge
   instances. 

   As with routing schemes, authentication of RBridge messages would be 
   a simple addition to protocol (and it could be accomplished the same 
   way as it would be in existing routing protocol).  However, any sort 
   of authentication requires additional configuration, which might 
   interfere with a requirement that RBridges need no configuration. 

5. Conclusions 

   TBD


6. Acknowledgments 

   TBD 


7. References 

7.1. Normative References 

   [1]   Touch, J., "Dynamic Internet overlay deployment and management 
         using the X-Bone", Computer Networks Vol. 36, No. 2-3, July 
         2001. 

   [2]   Touch, J., Wang, Y., Eggert, L. and G. Finn, "A Virtual 
         Internet Architecture", ISI Technical Report ISI-TR-570, 
         Presented at the Workshop on Future Directions in Network 
         Architecture (FDNA) 2003 at Sigcomm 2003, March 2003. 




Gray                     Expires April 15, 2006                [Page 6] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 



7.2. Informative References 

   TBD 


8. Author's Addresses 

   Eric Gray 
   Marconi Corporation, plc 
   900 Chelmsford Street, 
   Lowell, MA - 01851   
   Email: Eric.Gray@marconi.com 
    

9. Intellectual Property Statement 

   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 

   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 

   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at 
   ietf-ipr@ietf.org 


10. Disclaimer of Validity 

   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 



Gray                     Expires April 15, 2006                [Page 7] 

Internet-Draft      R-Bridge Routing Requirements           August 2005 



11. Copyright Statement 

   Copyright (C) The Internet Society (2005). 

   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 


12. Acknowledgment 

   Funding for the RFC Editor function is currently provided by the 
   Internet Society.






































Gray                     Expires April 15, 2006                [Page 8]