Internet DRAFT - draft-litkowski-rtgwg-node-protect-remote-lfa

draft-litkowski-rtgwg-node-protect-remote-lfa





Routing Area Working Group                                  S. Litkowski
Internet-Draft                                                    Orange
Intended status: Standards Track                           April 2, 2013
Expires: October 4, 2013


                       Node protecting remote LFA
            draft-litkowski-rtgwg-node-protect-remote-lfa-00

Abstract

   This draft describes a simple extension to the remote LFA
   specification that computes a guaranteed node protection.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on October 4, 2013.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must



Litkowski                Expires October 4, 2013                [Page 1]

Internet-Draft         Node protecting remote LFA             April 2013


   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . 3
   2.  Specification . . . . . . . . . . . . . . . . . . . . . . . . . 3
     2.1.  Reference topology  . . . . . . . . . . . . . . . . . . . . 4
     2.2.  Current RLFA behavior . . . . . . . . . . . . . . . . . . . 4
     2.3.  Guaranteed node protection computation  . . . . . . . . . . 4
       2.3.1.  Computing node protecting extended P-Space  . . . . . . 5
       2.3.2.  Computing node protecting Q-Space . . . . . . . . . . . 5
       2.3.3.  Computing node protecting PQ-Spaces . . . . . . . . . . 5
   3.  Scaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
   4.  Security Considerations . . . . . . . . . . . . . . . . . . . . 7
   5.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . 7
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
   7.  Normative References  . . . . . . . . . . . . . . . . . . . . . 7
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . . . 7






























Litkowski                Expires October 4, 2013                [Page 2]

Internet-Draft         Node protecting remote LFA             April 2013


1.  Introduction

   The current RLFA specification described in
   [I-D.ietf-rtgwg-remote-lfa] is based on a per link computation (for
   optimization) that prevents determination of guaranteed node
   protection.  This does not mean that the current solution is not able
   to provide node protection for a specific destination, but as
   computation is done from the link perspective, there is no guarantee
   to have node protection.

                S---E
               /     \
              A       D
               \     /
                B---C

                           Figure 1

   In the figure above, considering all metrics equal, primary path from
   S to D is SED.  S has no LFA to reach D.

   Using RLFA specification, C is a PQ from E perspective and could be
   used as a remote LFA in case of SE failure.  In the diagram above, C
   is a considered as a link protecting alternate (as from E
   perspective, it is only link protecting), even if from a topological
   point of view, C would be a node protecting RLFA.

   There could be multiple reasons to ensure node protection in a
   network :

   o  Presence of nodes with no high availability mechanism.

   o  Avoiding transient loops in case of node crash.

   This draft describes a solution to compute a guaranteed node
   protection using remote LFA solution.


2.  Specification












Litkowski                Expires October 4, 2013                [Page 3]

Internet-Draft         Node protecting remote LFA             April 2013


2.1.  Reference topology


           3
    N1 ---------- P1
    |             |
    |       2     |
    |  N3 --- P3  |
    |/       /    |
    S ---- E ---- R1 --- D1 --- D2
    |       \                   |
    |         R2 ----- D3-------+
    |         /               2
    N2 ---- P2
        3

           Figure 2


2.2.  Current RLFA behavior

   The current remote LFA computation is based on computation of
   extended P-Space and Q-Space and then intersect both to determine PQ
   nodes that would be used for traffic tunneling.  As Q-Space requires
   rSPF computation (one per Q-Space), it would not be scalable to
   compute Q-Space for each prefix.  RLFA specification is proposing to
   compute Q Space on a per link basis, PQ will so be used by all
   prefixes using the link as primary nexthop.

   Using figure 2 and considering protection of prefixes using E as
   primary nexthop on S, there would be three nodes in PQ space :
   P1,P2,P3.  Using shortest path to PQ as tie breaker, P3 would be the
   best PQ.

   P3 is only providing link protection to D1, D2 and D3 while P1 was
   providing node protection for D1 and D2, and P2 was providing node
   protection for D3.

   In this scenario, RLFA is providing a suboptimal protection because
   of the approximation of using remote end of the link for computation.

2.3.  Guaranteed node protection computation

   To compute a guaranteed node protection using remote LFA, we just
   introduce a small modification in the current algorithm.  Rather than
   computing link protecting PQs from nexthop perspective, we propose to
   compute node protecting PQs from nextnexthop perspective.




Litkowski                Expires October 4, 2013                [Page 4]

Internet-Draft         Node protecting remote LFA             April 2013


   Our proposal is working as follows :

   o  Compute node protecting PQ space for each nextnexthop.

   o  Compute link protecting PQ space for each nexthop (as already
      done).

   o  Prefixes are inheriting protection type from nexthop or
      nextnexthop based on defined policies.  Choosing a PQ in node
      protecting space provides guaranteed node protection.

2.3.1.  Computing node protecting extended P-Space

   We define the notion of node protecting extended P-Space of a node S
   for a connected node E as the union of :

   o  Node protecting P-Space : the set of routers reachable from S
      without traversing node E.

   o  The set of destinations using E as primary nexthop but having a
      node protecting LFA.

2.3.2.  Computing node protecting Q-Space

   The set of routers from which a node N can be reached, by normal
   forwarding, without traversing the node E is termed the node
   protecting Q-space of N with respect to the node E. The Q-space can
   be obtained by computing a reverse shortest path tree (rSPT) rooted
   at N, with the sub-tree which traverses the failed node excised
   (including those which are members of an ECMP).

2.3.3.  Computing node protecting PQ-Spaces

   Upon termination of regular SPT, node S has knowledge of nexthops and
   nextnexthops to reach every destinations.  For each nextnexthop on
   the SPT, S will compute :

   o  Node protecting extended P-Space considering nexthop will fail.

   o  Node protecting extended Q-Space from nextnexthop considering
      nexthop will fail.

   Intersection of both will result in node protecting PQ-Spaces and
   node S will have a node protecting PQ-Space for each nextnexthop.

   In figure 2, considering link SE, S has two nextnexthops (R1 and R2).
   S will compute node protecting PQ Space for R1 and for R2.




Litkowski                Expires October 4, 2013                [Page 5]

Internet-Draft         Node protecting remote LFA             April 2013


   Node protecting extended P-Space :

   o  For R1 : P1,N1

   o  For R2 : P2,N2

   Node protecting Q-Space :

   o  For R1 : P1,D1,D2

   o  For R2 : P2,D3,D2

   Node protecting PQ-Space :

   o  For R1 : P1

   o  For R2 : P2

   As a result, P1 is able to provide node protection for all
   destinations using R1 as nextnexthop (D1,D2).  P2 is able to provide
   node protection for all destinations using R2 as nextnexthop (D3).


3.  Scaling

   Approximation introduced in remote LFA specification was done to
   optimize computation.  Our proposal is introducing more computation
   but in a very acceptable degree.  Computation time will be dependent
   on number of nextnexthops rather than nexthops.

           +----------+-----+---------+-----+-----------+-----+
           | Topology | Min | Average | Med | 95th perc | Max |
           +----------+-----+---------+-----+-----------+-----+
           |    T1    |  1  |   20,4  |  19 |     39    | 107 |
           |    T2    |  1  |   9,5   |  6  |     27    |  35 |
           |    T3    |  2  |   15,7  |  11 |     41    |  53 |
           |    T4    |  1  |   13,9  |  15 |    26,5   |  30 |
           |    T5    |  1  |    12   |  8  |     36    |  72 |
           |    T6    |  2  |   4,3   |  4  |     7     |  8  |
           |    T7    |  1  |    9    |  6  |     19    |  22 |
           +----------+-----+---------+-----+-----------+-----+

                      Table 1: Number of nextnexthop

   The simulation results above (from real SP topologies) show that the
   number of rSPF to compute is really acceptable : SPF takes today only
   few msec to compute even on large topologies.  Moreover installing
   protection is not an urgent task, and it would be better to take more



Litkowski                Expires October 4, 2013                [Page 6]

Internet-Draft         Node protecting remote LFA             April 2013


   time to compute a more optimal protection.


4.  Security Considerations

   This document does not introduce any change in security consideration
   compared to [RFC5286] or [I-D.ietf-rtgwg-remote-lfa].


5.  Acknowledgements


6.  IANA Considerations

   This document has no action for IANA.


7.  Normative References

   [I-D.ietf-rtgwg-remote-lfa]
              Bryant, S., Filsfils, C., Previdi, S., Shand, M., and S.
              Ning, "Remote LFA FRR", draft-ietf-rtgwg-remote-lfa-01
              (work in progress), December 2012.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC5286]  Atlas, A. and A. Zinin, "Basic Specification for IP Fast
              Reroute: Loop-Free Alternates", RFC 5286, September 2008.


Author's Address

   Stephane Litkowski
   Orange

   Email: stephane.litkowski@orange.com














Litkowski                Expires October 4, 2013                [Page 7]