diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3784.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3784.txt')
-rw-r--r-- | doc/rfc/rfc3784.txt | 731 |
1 files changed, 731 insertions, 0 deletions
diff --git a/doc/rfc/rfc3784.txt b/doc/rfc/rfc3784.txt new file mode 100644 index 0000000..208fa97 --- /dev/null +++ b/doc/rfc/rfc3784.txt @@ -0,0 +1,731 @@ + + + + + + +Network Working Group H. Smit +Request for Comments: 3784 Procket Networks +Category: Informational T. Li + June 2004 + + + Intermediate System to Intermediate System (IS-IS) + Extensions for Traffic Engineering (TE) + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2004). + +Abstract + + This document describes extensions to the Intermediate System to + Intermediate System (IS-IS) protocol to support Traffic Engineering + (TE). This document extends the IS-IS protocol by specifying new + information that an Intermediate System (router) can place in Link + State Protocol (LSP) Data Units. This information describes + additional details regarding the state of the network that are useful + for traffic engineering computations. + +1. Introduction + + The IS-IS protocol is specified in ISO 10589 [1], with extensions for + supporting IPv4 specified in RFC 1195 [3]. Each Intermediate System + (IS) (router) advertises one or more IS-IS Link State Protocol Data + Units (LSPs) with routing information. Each LSP is composed of a + fixed header and a number of tuples, each consisting of a Type, a + Length, and a Value. Such tuples are commonly known as TLVs, and are + a good way of encoding information in a flexible and extensible + format. + + This document contains the design of new TLVs to replace the existing + IS Neighbor TLV, IP Reachability TLV, and to include additional + information about the characteristics of a particular link to an IS- + IS LSP. The characteristics described in this document are needed + for Traffic Engineering [4] (TE). Secondary goals include increasing + the dynamic range of the IS-IS metric and improving the encoding of + IP prefixes. + + + + +Smit & Li Informational [Page 1] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + + The router id is useful for traffic engineering purposes because it + describes a single address that can always be used to reference a + particular router. + + Mechanisms and procedures to migrate to the new TLVs are not + discussed in this document. + +2. Introducing Sub-TLVs + + This document introduces a new way to encode routing information in + IS-IS. The new object is called a sub-TLV. Sub-TLVs are similar to + regular TLVs. They use the same concepts as regular TLVs. The + difference is that TLVs exist inside IS-IS packets, while sub-TLVs + exist inside TLVs. TLVs are used to add extra information to IS-IS + packets. Sub-TLVs are used to add extra information to particular + TLVs. Each sub-TLV consists of three fields, a one-octet Type field, + a one-octet Length field, and zero or more octets of Value. The Type + field indicates the type of items in the Value field. The Length + field indicates the length of the Value field in octets. Each sub- + TLV can potentially hold multiple items. The number of items in a + sub-TLV can be computed from the length of the whole sub-TLV, when + the length of each item is known. Unknown sub-TLVs are to be ignored + and skipped upon receipt. + + The Sub-TLV type space is managed by the IETF IS-IS WG + (http://www.ietf.org/html.charters/isis-charter.html). New type + values are allocated following review on the IETF IS-IS mailing list. + This will normally require publication of additional documentation + describing how the new type is used. In the event that the IS-IS + working group has disbanded the review shall be performed by a + Designated Expert assigned by the responsible Area Director. + +3. The Extended IS Reachability TLV + + The extended IS reachability TLV is TLV type 22. + + The existing IS reachability (TLV type 2, defined in ISO 10589 [1]) + contains information about a series of IS neighbors. For each + neighbor, there is a structure that contains the default metric, the + delay, the monetary cost, the reliability, and the 7-octet ID of the + adjacent neighbor. Of this information, the default metric is + commonly used. The default metric is currently one octet, with one + bit used to indicate whether the metric is internal or external, and + one bit that was originally unused, but which was later defined by + RFC 2966 to be the up/down bit. The remaining 6 bits are used to + store the actual metric, resulting in a possible metric range of 0- + 63. This limitation is one of the restrictions that we would like to + lift. + + + +Smit & Li Informational [Page 2] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + + The remaining three metrics (delay, monetary cost, and reliability) + are not commonly implemented and reflect unused overhead in the TLV. + The neighbor is identified by its system ID, typically 6-octets, plus + one octet indicating the pseudonode number. Thus, the existing TLV + consumes 11 octets per neighbor, with 4 octets for metric and 7 + octets for neighbor identification. To indicate multiple + adjacencies, this structure is repeated within the IS reachability + TLV. Because the TLV is limited to 255 octets of content, a single + TLV can describe up to 23 neighbors. The IS reachability TLV can be + repeated within the LSP fragments to describe further neighbors. + + The proposed extended IS reachability TLV contains a new data + structure, consisting of: + + 7 octets of system Id and pseudonode number + 3 octets of default metric + 1 octet of length of sub-TLVs + 0-244 octets of sub-TLVs, + where each sub-TLV consists of a sequence of + 1 octet of sub-type + 1 octet of length of the value field of the sub-TLV + 0-242 octets of value + + Thus, if no sub-TLVs are used, the new encoding requires 11 octets + and can contain up to 23 neighbors. Please note that while the + encoding allows for 255 octets of sub-TLVs, the maximum value cannot + fit in the overall IS reachability TLV. The practical maximum is 255 + octets minus the 11 octets described above, or 244 octets. Further, + there is no defined mechanism for extending the sub-TLV space for a + particular neighbor. Thus, wasting sub-TLV space is discouraged. + + The metric octets are encoded as a 24-bit unsigned integer. Note + that the metric field in the new extended IP reachability TLV is + encoded as a 32-bit unsigned integer. These different sizes were + chosen so that it is very unlikely that the cost of an intra-area + route has to be chopped off to fit in the metric field of an inter- + area route. + + To preclude overflow within a traffic engineering SPF implementation, + all metrics greater than or equal to MAX_PATH_METRIC SHALL be + considered to have a metric of MAX_PATH_METRIC. It is easiest to + select MAX_PATH_METRIC such that MAX_PATH_METRIC plus a single link + metric does not overflow the number of bits for internal metric + calculation. We assume that this is 32 bits. Therefore, we have + chosen MAX_PATH_METRIC to be 4,261,412,864 (0xFE000000, 2^32 - 2^25). + + + + + + +Smit & Li Informational [Page 3] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + + If a link is advertised with the maximum link metric (2^24 - 1), this + link MUST NOT be considered during the normal SPF computation. This + will allow advertisement of a link for purposes other than building + the normal Shortest Path Tree. An example is a link that is + available for traffic engineering, but not for hop-by-hop routing. + + Certain sub-TLVs are proposed here: + + Sub-TLV type Length (octets) Name + 3 4 Administrative group (color) + 6 4 IPv4 interface address + 8 4 IPv4 neighbor address + 9 4 Maximum link bandwidth + 10 4 Reservable link bandwidth + 11 32 Unreserved bandwidth + 18 3 TE Default metric + 250-254 Reserved for cisco specific extensions + 255 Reserved for future expansion + + Each of these sub-TLVs is described below. Unless stated otherwise, + multiple occurrences of the information are supported by multiple + inclusions of the sub-TLV. + +3.1. Sub-TLV 3: Administrative group (color, resource class) + + The administrative group sub-TLV contains a 4-octet bit mask assigned + by the network administrator. Each set bit corresponds to one + administrative group assigned to the interface. + + By convention, the least significant bit is referred to as 'group 0', + and the most significant bit is referred to as 'group 31'. + + This sub-TLV is OPTIONAL. This sub-TLV SHOULD appear once at most in + each extended IS reachability TLV. + +3.2. Sub-TLV 6: IPv4 interface address + + This sub-TLV contains a 4-octet IPv4 address for the interface + described by the (main) TLV. This sub-TLV can occur multiple times. + + Implementations MUST NOT inject a /32 prefix for the interface + address into their routing or forwarding table because this can lead + to forwarding loops when interacting with systems that do not support + this sub-TLV. + + + + + + + +Smit & Li Informational [Page 4] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + + If a router implements the basic TLV extensions in this document, it + MAY add or omit this sub-TLV from the description of an adjacency. + If a router implements traffic engineering, it MUST include this + sub-TLV. + +3.3. Sub-TLV 8: IPv4 neighbor address + + This sub-TLV contains a single IPv4 address for a neighboring router + on this link. This sub-TLV can occur multiple times. + + Implementations MUST NOT inject a /32 prefix for the neighbor address + into their routing or forwarding table because this can lead to + forwarding loops when interacting with systems that do not support + this sub-TLV. + + If a router implements the basic TLV extensions in this document, it + MAY add or omit this sub-TLV from the description of an adjacency. + If a router implements traffic engineering, it MUST include this + sub-TLV on point-to-point adjacencies. + +3.4. Sub-TLV 9: Maximum link bandwidth + + This sub-TLV contains the maximum bandwidth that can be used on this + link in this direction (from the system originating the LSP to its + neighbors). This is useful for traffic engineering. + + The maximum link bandwidth is encoded in 32 bits in IEEE floating + point format. The units are bytes (not bits!) per second. + + This sub-TLV is optional. This sub-TLV SHOULD appear once at most in + each extended IS reachability TLV. + +3.5. Sub-TLV 10: Maximum reservable link bandwidth + + This sub-TLV contains the maximum amount of bandwidth that can be + reserved in this direction on this link. Note that for + oversubscription purposes, this can be greater than the bandwidth of + the link. + + The maximum reservable link bandwidth is encoded in 32 bits in IEEE + floating point format. The units are bytes (not bits!) per second. + + This sub-TLV is optional. This sub-TLV SHOULD appear once at most in + each extended IS reachability TLV. + + + + + + + +Smit & Li Informational [Page 5] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + +3.6. Sub-TLV 11: Unreserved bandwidth + + This sub-TLV contains the amount of bandwidth reservable in this + direction on this link. Note that for oversubscription purposes, + this can be greater than the bandwidth of the link. + + Because of the need for priority and preemption, each head end needs + to know the amount of reserved bandwidth at each priority level. + Thus, this sub-TLV contains eight 32 bit IEEE floating point numbers. + The units are bytes (not bits!) per second. The values correspond to + the bandwidth that can be reserved with a setup priority of 0 through + 7, arranged in increasing order with priority 0 occurring at the + start of the sub-TLV, and priority 7 at the end of the sub-TLV. + + For stability reasons, rapid changes in the values in this sub-TLV + SHOULD NOT cause rapid generation of LSPs. + + This sub-TLV is optional. This sub-TLV SHOULD appear once at most in + each extended IS reachability TLV. + +3.7. Sub-TLV 18: Traffic Engineering Default Metric + + This sub-TLV contains a 24-bit unsigned integer. This metric is + administratively assigned and can be used to present a differently + weighted topology to traffic engineering SPF calculations. + + To preclude overflow within a traffic engineering SPF implementation, + all metrics greater than or equal to MAX_PATH_METRIC SHALL be + considered to have a metric of MAX_PATH_METRIC. It is easiest to + select MAX_PATH_METRIC such that MAX_PATH_METRIC plus a single link + metric does not overflow the number of bits for internal metric + calculation. We assume that this is 32 bits. Therefore, we have + chosen MAX_PATH_METRIC to be 4,261,412,864 (0xFE000000, 2^32 - 2^25). + + This sub-TLV is optional. This sub-TLV SHOULD appear once at most in + each extended IS reachability TLV. If a link is advertised without + this sub-TLV, traffic engineering SPF calculations MUST use the + normal default metric of this link, which is advertised in the fixed + part of the extended IS reachability TLV. + +4. The Extended IP Reachability TLV + + The extended IP reachability TLV is TLV type 135. + + The existing IP reachability TLVs (TLV type 128 and TLV type 130, + defined in RFC 1195 [3]) carry IP prefixes in a format that is + analogous to the IS neighbor TLV from ISO 10589 [1]. They carry four + metrics, of which only the default metric is commonly used. The + + + +Smit & Li Informational [Page 6] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + + default metric has a possible range of 0-63. We would like to remove + this restriction. + + In addition, route redistribution (a.k.a. route leaking) has a key + problem that was not fully addressed by the existing IP reachability + TLVs. RFC 1195 [3] allows a router to advertise prefixes upwards in + the level hierarchy. Unfortunately there were no mechanisms defined + to advertise prefixes downwards in the level hierarchy. + + To address these two issues, the proposed extended IP reachability + TLV provides for a 32 bit metric and adds one bit to indicate that a + prefix has been redistributed 'down' in the hierarchy. + + The proposed extended IP reachability TLV contains a new data + structure, consisting of: + + 4 octets of metric information + 1 octet of control information, consisting of + 1 bit of up/down information + 1 bit indicating the presence of sub-TLVs + 6 bits of prefix length + 0-4 octet of IPv4 prefix + 0-250 optional octets of sub-TLVs, if present consisting of + 1 octet of length of sub-TLVs + 0-249 octets of sub-TLVs, + where each sub-TLV consists of a sequence of + 1 octet of sub-type + 1 octet of length of the value field of the sub-TLV + 0-247 octets of value + + This data structure can be replicated within the TLV, without + exceeding the maximum length of the TLV. + + The 6 bits of prefix length can have the values 0-32 and indicate the + number of significant bits in the prefix. The prefix is encoded in + the minimal number of octets for the given number of significant + bits. This implies: + + Significant bits Octets + 0 0 + 1-8 1 + 9-16 2 + 17-24 3 + 25-32 4 + + The remaining bits of prefix are transmitted as zero and ignored upon + receipt. + + + + +Smit & Li Informational [Page 7] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + + If a prefix is advertised with a metric larger then MAX_PATH_METRIC + (0xFE000000, see paragraph 3.0), this prefix MUST NOT be considered + during the normal SPF computation. This allows advertisement of a + prefix for purposes other than building the normal IP routing table. + +4.1. The up/down Bit + + If routers were allowed to redistribute IP prefixes freely in both + directions between level 1 and level 2 without any additional + mechanisms, those routers would not be able to determine looping of + routing information. A problem occurs when a router learns a prefix + via level 2 routing and advertises that prefix down into a level 1 + area, where another router might pick up the route and advertise the + prefix back up into the level 2 backbone. If the original source + withdraws the prefix, those two routers might end up having a routing + loop between them, where part of the looped path is via level 1 + routing and the other part of the looped path is via level 2 routing. + The solution that RFC 1195 [3] poses is to allow only advertising + prefixes upward in the level hierarchy, and to disallow the + advertising of prefixes downward in the hierarchy. + + To prevent this looping of prefixes between levels, a new bit of + information is defined in the new extended IP reachability TLV. This + bit is called the up/down bit. The up/down bit SHALL be set to 0 + when a prefix is first injected into IS-IS. If a prefix is + advertised from a higher level to a lower level (e.g. level 2 to + level 1), the bit MUST be set to 1, indicating that the prefix has + traveled down the hierarchy. Prefixes that have the up/down bit set + to 1 may only be advertised down the hierarchy, i.e. to lower levels. + + These semantics apply even if IS-IS is extended in the future to have + additional levels. By insuring that prefixes follow only the IS-IS + hierarchy, we have insured that the information does not loop, + thereby insuring that there are no persistent forwarding loops. + + If a prefix is advertised from one area to another at the same level, + then the up/down bit SHALL be set to 1. This situation can arise + when a router implements multiple virtual routers at the same level, + but in different areas. + + The semantics of the up/down bit in the new extended IP reachability + TLV are identical to the semantics of the up/down bit defined in RFC + 2966 [2]. + + + + + + + + +Smit & Li Informational [Page 8] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + +4.2. Expandability of the Extended IP Reachability TLV with Sub-TLVs + + The extended IP reachability TLV can hold sub-TLVs that apply to a + particular prefix. This allows for easy future extensions. If there + are no sub-TLVs associated with a prefix, the bit indicating the + presence of sub-TLVs SHALL be set to 0. If this bit is set to 1, the + first octet after the prefix will be interpreted as the length of all + sub-TLVs associated with this IPv4 prefix. Please note that while + the encoding allows for 255 octets of sub-TLVs, the maximum value + cannot fit in the overall extended IP reachability TLV. The + practical maximum is 255 octets minus the 5-9 octets described above, + or 250 octets. + + This document does not define any sub-TLVs for the extended IP + reachability TLV. + +5. The Traffic Engineering Router ID TLV + + The Traffic Engineering router ID TLV is TLV type 134. + + The router ID TLV contains the 4-octet router ID of the router + originating the LSP. This is useful in several regards: + + For traffic engineering, it guarantees that we have a single stable + address that can always be referenced in a path that will be + reachable from multiple hops away, regardless of the state of the + node's interfaces. + + If OSPF is also active in the domain, traffic engineering can compute + the mapping between the OSPF and IS-IS topologies. + + If a router does not implement traffic engineering, it MAY add or + omit the Traffic Engineering router ID TLV. If a router implements + traffic engineering, it MUST include this TLV in its LSP. This TLV + SHOULD not be included more than once in an LSP. + + If a router advertises the Traffic Engineering router ID TLV in its + LSP, and if it advertises prefixes via the Border Gateway Protocol + (BGP) with the BGP next hop attribute set to the BGP router ID, the + Traffic Engineering router ID SHOULD be the same as the BGP router + ID. + + Implementations MUST NOT inject a /32 prefix for the router ID into + their forwarding table because this can lead to forwarding loops when + interacting with systems that do not support this TLV. + + + + + + +Smit & Li Informational [Page 9] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + +6. IANA Considerations + +6.1. TLV Codepoint Allocations + + This document defines the following new IS-IS TLV types, which have + been reflected in the ISIS TLV code-point registry: + + Type Description IIH LSP SNP + ---- ----------------------------------- --- --- --- + 22 The extended IS reachability TLV n y n + 134 The Traffic Engineering router ID TLV n y n + 135 The extended IP reachability TLV n y n + +6.2. New Registries + + IANA has created the following new registries. + +6.2.1. Sub-TLVs for the Extended IS Reachability TLV + + This registry contains codepoints for Sub-TLVs of TLV 22. The range + of values is 0-255. Allocations within the registry require + documentation of the proposed use of the allocated value and approval + by the Designated Expert assigned by the IESG (see [5]). + + Taking into consideration allocations specified in this document, the + registry has been initialized as follows: + + Type Description + ---- ----------------------------------- + 0-2 unassigned + 3 Administrative group (color) + 4-5 unassigned + 6 IPv4 interface address + 7 unassigned + 8 IPv4 neighbor address + 9 Maximum link bandwidth + 10 Reservable link bandwidth + 11 Unreserved bandwidth + 12-17 unassigned + 18 TE Default metric + 19-254 unassigned + 255 Reserved for future expansion + + + + + + + + + +Smit & Li Informational [Page 10] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + +6.2.2. Sub-TLVs for the Extended IP Reachability TLV + + This registry contains codepoints for Sub-TLVs of TLV 135. The range + of values is 0-255. Allocations within the registry require + documentation of the use of the allocated value and approval by the + Designated Expert assigned by the IESG (see [5]). + + No codepoints are defined in this document. + +7. References + +7.1. Normative References + + [1] ISO, "Intermediate System to Intermediate System Intra-Domain + Routeing Exchange Protocol for use in Conjunction with the + Protocol for Providing the Connectionless-mode Network Service + (ISO 8473)", International Standard 10589:2002, Second Edition + + [2] Li, T., Przygienda, T. and H. Smit, "Domain-wide Prefix + Distribution with Two-Level IS-IS", RFC 2966, October 2000. + +7.2. Informative References + + [3] Callon, R.W., "Use of OSI IS-IS for routing in TCP/IP and dual + environments", RFC 1195, December 1990 + + [4] Awduche, D., Malcolm, J., Agogbua, J., O'Dell, M. and J. McManus, + "Requirements for Traffic Engineering Over MPLS", RFC 2702, + September 1999. + + [5] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA + Considerations Section in RFCs", BCP 26, RFC 2434, October 1998. + +8. Security Considerations + + This document raises no new security issues for IS-IS. + +9. Acknowledgments + + The authors would like to thank Yakov Rekhter and Dave Katz for their + comments on this work. + + + + + + + + + + +Smit & Li Informational [Page 11] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + +10. Authors' Addresses + + Henk Smit + + EMail: hhwsmit@xs4all.nl + + + Tony Li + + EMail: tony.li@tony.li + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Smit & Li Informational [Page 12] + +RFC 3784 IS-IS extensions for Traffic Engineering June 2004 + + +11. Full Copyright Statement + + Copyright (C) The Internet Society (2004). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + +Smit & Li Informational [Page 13] + |