diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3786.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3786.txt')
-rw-r--r-- | doc/rfc/rfc3786.txt | 787 |
1 files changed, 787 insertions, 0 deletions
diff --git a/doc/rfc/rfc3786.txt b/doc/rfc/rfc3786.txt new file mode 100644 index 0000000..fa3eac3 --- /dev/null +++ b/doc/rfc/rfc3786.txt @@ -0,0 +1,787 @@ + + + + + + +Network Working Group A. Hermelin +Request for Comments: 3786 Montilio Inc. +Category: Informational S. Previdi + M. Shand + Cisco Systems + May 2004 + + + Extending the Number of + Intermediate System to Intermediate System (IS-IS) + Link State PDU (LSP) Fragments Beyond the 256 Limit + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2004). All Rights Reserved. + +Abstract + + This document describes a mechanism that allows a system to originate + more than 256 Link State PDU (LSP) fragments, a limit set by the + original Intermediate System to Intermediate System (IS-IS) Routing + protocol, as described in ISO/IEC 10589. This mechanism can be used + in IP-only, OSI-only, and dual routers. + +Table of Contents + + 1. Introduction ................................................. 2 + 1.1. Keywords ............................................... 2 + 1.2. Definitions of Commonly Used Terms ..................... 2 + 1.3. Operation Modes ........................................ 3 + 1.4. Overview ............................................... 4 + 2. IS Alias ID TLV (IS-A) ....................................... 5 + 3. Generating LSPs .............................................. 6 + 3.1. Both Operation Modes ................................... 6 + 3.2. Operation Mode 1 Additives ............................. 8 + 4. Purging Extended LSP Fragments ............................... 10 + 5. Modifications to LSP handling in SPF ......................... 10 + 6. Forming Adjacencies .......................................... 11 + 7. Interoperating between extension-capable and non-capable ISs . 11 + 8. Security Considerations ...................................... 12 + 9. Acknowledgements ............................................. 12 + + + + +Hermelin, et al. Informational [Page 1] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + 10. References ................................................... 12 + 11. Authors' Addresses ........................................... 13 + 12. Full Copyright Statement ..................................... 14 + +1. Introduction + + In the Intermediate System to Intermediate System (IS-IS) protocol, a + system floods its link-state information in Link State PDU (LSP) Data + Units, or LSPs for short. These logical LSPs can become quite large, + therefore the protocol specifies a means of fragmenting this + information into multiple LSP fragments. The number of fragments a + system can generate is limited by ISO/IEC 10589 [ISIS-ISO] to 256 + fragments, where each fragment's size is also limited. Hence, there + is a limit on the amount of link-state information a system can + generate. + + A number of factors can contribute to exceeding this limit: + + - Introduction of new TLVs and sub-TLVs to be included in LSPs. + - The use of LSPs to propagate various types of information (such as + traffic-engineering information). + - The increasing number of destinations and AS topologies. + - Finer granularity routing, and the ability to inject external + routes into areas [DOMAIN-WIDE]. + - Other emerging technologies, such as optical, IPv6, etc. + + This document describes mechanisms to relax the limit on the number + of LSP fragments. + +1.1. Keywords + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in BCP 14, RFC 2119 + [BCP14]. + +1.2. Definitions of Commonly Used Terms + + This section provides definitions for terms that are used throughout + the text. + + Originating System + A router physically running the IS-IS protocol. As this + document describes methods allowing a single IS-IS process to + advertise its LSPs as multiple "virtual" routers, the + Originating System represents the single "physical" IS-IS + process. + + + + +Hermelin, et al. Informational [Page 2] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + Normal system-id + The system-id of an Originating System. + + Additional system-id + An Additional system-id that is assigned by the network + administrator. Each Additional system-id allows generation of + 256 additional, or extended, LSP fragments. The Additional + system-id, like the Normal system-id, must be unique throughout + the routing domain. + + Virtual System + The system, identified by an Additional system-id, advertised + as originating the extended LSP fragments. These fragments + specify the Additional system-id in their LSP IDs. + + Original LSP + An LSP using the Normal system-id in its LSP ID. + + Extended LSP + An LSP using an Additional system-id in its LSP ID. + + LSP set + Logical LSP. This term is used only to resolve the ambiguity + between a logical LSP and an LSP fragment, both of which are + sometimes termed "LSP". + + Extended LSP set + A group of LSP fragments using an Additional system-id, and + originated by the Originating System. + + Extension-capable IS + An IS implementing the mechanisms described in this document. + +1.3. Operation Modes + + Two administrative operation modes are provided: + + - Operation Mode 1 provides behavior that allows implementations + that don't support this extension, to correctly process the + extended fragment information, without any modifications. This + mode has some restrictions on what may be advertised in the + extended LSP fragments. Namely, only leaf information may be + advertised in the extended LSPs. + + + + + + + + +Hermelin, et al. Informational [Page 3] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + - Operation Mode 2 extends the previous mode and relaxes its + advertisement restrictions. Any link-state information may be + advertised in the extended LSPs. However, it mandates a change to + the way LSPs are considered during the SPF algorithm, in a way + that is not compatible with previous implementations. + + These modes are configured on a per-level and area basis. That is, + all LSPs considered in the same SPF instance MUST use the same Mode. + There is no restriction that an L1/L2 IS operates in the same mode, + for both its L1 and L2 instances. It can use Mode 1 for its L1 LSPs, + and Mode 2 for its L2 LSPs, or vice versa. + + Mode 1 has the only advantage of being backwards compatible with + older implementations. It does have restrictions which are + considered drawbacks. Therefore, routers should operate in Mode 1 + only if backwards compatibility is desired. Otherwise, it is + recommended to run in Mode 2. + + Routers MAY implement Operational Mode 2 without supporting running + in Operational Mode 1. They will still interoperate correctly with + routers that support both modes. + +1.4. Overview + + Using Additional system-ids assigned by the administrator, the + Originating System can advertise the excess link-state information in + extended LSPs under these Additional system-ids. It would do so as + if other routers, or "Virtual Systems", were advertising this + information. These extended LSPs will also have the specified limit + on their LSP fragments; however, the Originating System may generate + extended LSPs under numerous Virtual Systems. + + For Operation Mode 1, 0-cost adjacencies are advertised from the + Originating System to its Virtual System(s). No adjacencies (other + than back to the Originating System) are advertised in the extended + LSPs. As a consequence, the Virtual Systems are 'stub', meaning they + can only be reached through their Originating System. Therefore, + older implementations do not need modifications in order to correctly + process these extended LSPs. + + For both modes, each LSP (set) created by a node will contain in its + fragment-0 a new TLV (IS Alias ID TLV) that contains the Normal + system-id and PN Number of the Original LSP created by the router. + Extension-capable ISs can then use this information and store the + original and extended LSPs as one logical LSP. + + The only sections that deal only with Mode 1 additions are 3.2, + 3.2.1, and 3.2.2. All other sections relate to both modes. + + + +Hermelin, et al. Informational [Page 4] + +RFC 3786 IS-IS LSP Fragments May 2004 + + +2. IS Alias ID TLV (IS-A) + + The proposed IS-A TLV allows extension-capable ISs to recognize all + LSPs of an Originating System, and combine the original and extended + LSPs for the purpose of SPF computation. It identifies the Normal + system-id of the Originating System. + + The proposed IS Alias ID TLV is type 24, and its format is as + follows: + + x CODE - 24. + + x LENGTH - total length of the value field. + + x VALUE - + + No. of Octets + +-------------------+ + | Normal system-id | 6 + +-------------------+ + | Pseudonode number | 1 + +-------------------+ + | Sub-TLVs length | 1 + +-------------------+ + | | 0-247 + : Sub-TLVs : + : : + | | + +-------------------+ + + Normal system-id + The Normal system-id of the LSP set, as described in section 1.2 + of this document. + + Pseudonode number + The Pseudonode number of the LSP set. LSPs with the same Normal + system-id and Pseudonode number are considered in SPF as one + logical LSP, as described in section 5 of this document. + + Sub-TLVs length + Total length of all sub-TLVs. + + + + + + + + + + +Hermelin, et al. Informational [Page 5] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + Sub-TLVs + A series of tuples with the following format: + + No. of Octets + +-------------------+ + | Sub-type | 1 + +-------------------+ + | Length | 1 + +-------------------+ + | | 0-245 + : Value : + : : + | | + +-------------------+ + + Sub-type + Type of the sub-TLV + + Length + Total length of the value field + + Value + Type-specific TLV payload. + + For an explanation on sub-TLV handling, see [ISIS-TE]. + + Without sub-TLVs, this structure consumes 8 octets per LSP set. This + TLV MUST be included in fragment 0 of every LSP set belonging to an + Originating System running in either Mode 1 or Mode 2. Currently, + there are no sub-TLVs defined. + + For a complete list of used IS-IS TLV numbers, see [ISIS-CODES]. + +3. Generating LSPs + +3.1. Both Operation Modes + + Under both modes, the Originating System MUST include information + binding the Original LSP and the Extended ones. It can do this since + it is trivially an extension-capable IS. This is to ensure other + extension-capable routers correctly process the extra information in + their SPF calculation. This binding is advertised via a new IS Alias + ID TLV, which is advertised in all fragment 0 of Original and + Extended LSPs. + + + + + + + +Hermelin, et al. Informational [Page 6] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + +---------------------------------------------+ + | Originating System | + | system-id = S | + | is-alias-id = S | + +---------------------------------------------+ + + +-------------------+ +-------------------+ + | Virtual System | | Virtual System | + | system-id = S' | | system-id = S''| + | is-alias-id = S | | is-alias-id = S | + +-------------------+ +-------------------+ + + Figure 1. Advertising binding between all of a system's LSPs + (both modes). S' and S'' are configured as Additional + system-ids. + + When new extended LSP fragments are generated, these fragments should + be generated as specified in ISO/IEC 10589 [ISIS-ISO]. Furthermore, + a system SHOULD treat its extended LSPs the same as it treats its + original LSPs, with the exceptions noted in the following sections. + Specifically, creating, flooding, renewing, purging and all other + operations are similar for both Original and Extended LSPs, unless + stated otherwise. The Extended LSPs will use one of the Additional + system-ids configured for the router, in their LSP ID. + + Extended LSPs fragment zero should be regarded in the same special + manner as specified in ISO/IEC 10589 for LSPs with number zero, and + should include the same type of extra information as specified in + ISO/IEC 10589 and RFC 1195 [ISIS-IP]. So, for example, when a system + reissues its LSP fragment zero due to an area address change, it + should reissue all extended LSPs fragment zero as well. + + An extended LSP fragment zero MUST be generated for every extended + LSP set, to allow a router's SPF calculation to consider those + fragments in that set. See section 5 for details. + +3.1.1. The Attached Bits + + The Attached (ATT) bits SHOULD be set to zero for all four metric + types, on all Extended LSPs. This is due to the following: if a + Virtual System is reachable, so is its Originating System. It is + preferable, then, that an L1 IS chooses the Originating System and + not the Virtual System as its nearest L2 exit point, as connectivity + to the Virtual System has a higher probability of being lost (as a + result of the extended LSP no longer being advertised). This could + cause unnecessary computations on some implementations. + + + + + +Hermelin, et al. Informational [Page 7] + +RFC 3786 IS-IS LSP Fragments May 2004 + + +3.1.2. The Partition Repair Bit + + The Partition Repair (P) bit SHOULD be set to zero on all extended + LSPs. This is for the same reasons as for the Attached bits. + +3.1.3. ES Neighbors TLV + + ISO/IEC 10589 [ISIS-ISO] section 7.3.7 specifies inserting an ES + Neighbor TLV in L1 LSPs, with the system ID of the router. RFC 1195 + [ISIS-IP] relieves IP-only routers of this requirement. However, for + routers that do insert this ESN TLV in L1 LSPs (whether IP-only or + OSI-capable), then in an extended LSP, the ESN TLV should include the + relevant Additional system-id. Furthermore, OSI-capable routers + should accept packets destined for this Additional system-id. + +3.1.4. Overload Bit + + The overload bit should be set consistently across all LSPs, original + and extended, belonging to an Originating System, and should reflect + the Originating System's overload state. + +3.1.5. Other Fields and TLVs + + Other fields and TLVs not mentioned above remain the same, both for + original and extended LSPs. + +3.2. Operation Mode 1 Additions + + The following additions apply only to routers generating LSPs in Mode + 1. Routers, which are configured to operate in Operation Mode 2, + SHOULD NOT apply these additions to their advertisements. + + Under Operation Mode 1, adjacencies from the Originating System to + its Virtual Systems are advertised using the standard neighbor TLVs. + The metric for these connections MUST be zero, since the cost of + reaching a Virtual System is the same as the cost of reaching its + Originating System. + + To older implementations, Virtual Systems would appear reachable only + through their Originating System, hence loss of connectivity to the + Originating System means loss of connectivity to all of its + information, including that advertised in its extended LSPs. + Furthermore, the cost of reaching information advertised in non- + extended LSPs is the same as the cost of reaching information + advertised in the new extended LSPs, with an additional hop. + + + + + + +Hermelin, et al. Informational [Page 8] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + +---------------------------------------------+ + | Originating System | + | system-id = S | + | is-alias-id = S | + +---------------------------------------------+ + | /\ | /\ + cost=0 | |cost=max-1 cost=0 | |cost=max-1 + | | | | + \/ | \/ | + +-------------------+ +-------------------+ + | Virtual System | | Virtual System | + | system-id = S' | | system-id = S''| + | is-alias-id = S | | is-alias-id = S | + +-------------------+ +-------------------+ + + Figure 2. Advertising connections to Virtual Systems under + Operation Mode 1. S' and S'' are configured as + Additional system-ids. + + Under Operation Mode 1, only "leaf" information, i.e., information + that serves only as leaves in a shortest path tree, can be advertised + in extended LSPs. + + When an Extended LSP belonging to Additional system-id S' is first + created, the Original LSP MUST specify S' as a neighbor, with metric + set to zero. This is in order to consider the cost of reaching the + Virtual System S' the same as the cost of reaching its Originating + System. Furthermore, the Extended LSP MUST specify the Normal + system-id as a neighbor. The metric SHOULD be set to MaxLinkMetric - + 1 (this is only for uniformity purpose, any metric greater than zero + is acceptable). This in order to satisfy the two-way connectivity + check on other routers. Where relevant, this adjacency SHOULD be + considered as point-to-point. + + Note, that the restriction specified in ISO/IEC 10589 section 7.2.5 + holds: if an LSP Number zero of the Originating System is not + present, none of that system's neighbor entries would be processed + during SPF, hence none of its extended LSPs would be processed as + well. + +3.2.1. IS Neighbors TLV (Mode 1 Only) + + An Extended LSP must specify only the Originating System as a + neighbor, with the metric set to (MaxLinkMetric - 1). Where + relevant, this adjacency should be considered as point-to-point. + Other neighbors MUST NOT be specified in an Extended LSP, because + + + + + +Hermelin, et al. Informational [Page 9] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + those other neighbors would only specify the Originating System and + not the Virtual System, and hence would not satisfy the bi- + directionality check in the SPF computation. + +3.2.2. Originating System in the Overload State in (Mode 1 Only) + + If the Originating System is in the overload state, information in + the extended LSPs will not be processed by other routers in their SPF + computation. This is because in Mode 1, extended LSPs are reachable + only through adjacencies from the Original LSP. If this LSP has set + its OL bit, adjacencies will not be processed in the SPF computation. + + This side effect should be taken into consideration when operating in + Mode 1. + +4. Purging Extended LSP Fragments + + ISO/IEC 10589 [ISIS-ISO] section 7.3.4.4 note 25 suggests that an + implementation keeps the number of LSP fragments within a certain + limit based on the optimal (minimal) number of fragments needed. + Section 7.3.4.6 also recommends that an IS purge its empty LSPs to + conserve resources. These recommendations hold for the extended LSP + fragments as well. However, an extended LSP fragment zero should not + be purged until all of the fragments in its set (i.e., belonging to a + particular Additional system-id), are empty as well. This is to + ensure implementations consider the fragments in their SPF + computations, as specified in section 7.2.5. + + In Operational Mode 1, when all the extended LSP fragments of a + particular Additional system-id S' have been purged, the Originating + System SHOULD remove the neighbor information to S' from its original + LSPs. + +5. Modifications to LSP handling in SPF + + This section describes modifications to the way extension-capable ISs + handle LSPs for the SPF computation. + + When considering LSPs of an extension-capable IS (identified by the + inclusion of the IS Alias ID TLV), the original and extended LSPs are + combined to form one large logical LSP. If the LSP belongs to an IS + running Operational Mode 1, there might be adjacencies between the + original and extended LSPs. These are trivially ignored (since when + processing them the large logical LSP is already on PATHS), and does + not complicate the SPF. Furthermore, this check should already be + implemented (this scenario could occur on error, without this + extension). + + + + +Hermelin, et al. Informational [Page 10] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + If LSP fragment 0 of the Original LSP set is missing or its + RemainingLifetime is zero, all of the LSPs generated by that + Originating System (Extended as well) MUST NOT be considered in the + SPF. That is, the large logical LSP is not considered in the SPF. + The original LSP fragments are identified when the is-alias-id value + is the same as the system-id of those LSPs. If an LSP fragment 0 of + an extended LSP set is missing or its RemainingLifetime is zero, only + that LSP set MUST NOT be considered in the SPF. These rules are + present to ensure consistent SPF results on Mode 1 and Mode 2 LSPs. + + Note, that the above behavior is consistent with how previous + implementations will interpret Mode 1 LSPs. + +6. Forming Adjacencies + + It should be noted, that an IS MUST use the system-id of the LSP that + will include a neighbor, when forming an adjacency with that + neighbor. That is, if a neighbor is to be included in extended LSP + S', then S' should be used as the system-id in IS Hellos [3] and IS- + IS Hellos when forming an adjacency with that neighbor. This is + regardless of the Operational Mode. Of course, in Mode 1 this means + that only the Normal system-id will be used when sending hellos. + +7. Interoperating between extension-capable and non-extension-capable + ISs. + + In order to correctly advertise link-state information under + Operation Mode 2, all ISs in an area must be extension-capable. + However, it is possible to not upgrade every router in the network, + if the extended information is not routing information, but rather + data that is of use to only a subset of routers (e.g., optical + switches using IS-IS could carry optical-specific information in + extended LSPs) + + If a live network contains routers exceeding the 256 fragment limit, + and for some reason the upgrade has to be done incrementally, it is + possible to transition the network, using the following steps: + + - Upgrade the routers, one-by-one, to run this extension in + Operation Mode 1. The other non-extension-capable routers will + interoperate correctly. + + - When all routers are extension-capable, configure them one-by-one + to run in Operation Mode 2. All extension-capable routers + interoperate correctly, regardless of what mode they are run in. + + + + + + +Hermelin, et al. Informational [Page 11] + +RFC 3786 IS-IS LSP Fragments May 2004 + + + Implementations SHOULD support a configuration parameter controlling + the LSP origination behavior. The default value of this parameter + SHOULD correspond to the behavior described in [ISIS-ISO], i.e., + neither of the two modes described in this document should be enabled + without explicit configuration when the router software is upgraded + with this extension. + +8. Security Considerations + + This document raises no new security issues for IS-IS. + +9. Acknowledgments + + The authors would like to thank Tony Li and Radia Perlman for helpful + comments and suggestions on the subject. + +10. References + +10.1. Normative References + + [ISIS-ISO] "Intermediate System to Intermediate System Intra- + Domain Routeing Exchange Protocol for use in + Conjunction with the Protocol for Providing the + Connectionless-mode Network Service (ISO 8473)", + ISO/IEC 10589:2002, Second Edition. + + [ISIS-IP] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and + dual environments", RFC 1195, December 1990. + + [ISIS-TE] Smit, H. and T. Li, "Intermediate System to + Intermediate System (IS-IS) Extensions for Traffic + Engineering (TE)", RFC 3784, May 2004. + + [BCP14] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + +10.2. Informative References + + [DOMAIN-WIDE] Li, T., Przygienda, T. and H. Smit, "Domain-wide Prefix + Distribution with Two-Level IS-IS", RFC 2966, October + 2000. + + [ISIS-CODES] Przygienda, T., "Reserved Type, Length and Value (TLV) + Codepoints in Intermediate System to Intermediate + System", RFC 3359, August 2002. + + + + + + +Hermelin, et al. Informational [Page 12] + +RFC 3786 IS-IS LSP Fragments May 2004 + + +11. Authors' Addresses + + Amir Hermelin + Montilio Inc. + 1 Maskit St. + POB 12253 + Herzelia, 46733 + ISRAEL + + Phone: +972 9 9511944 + Fax: +972 9 9542430 + EMail: amir@montilio.com + + + Stefano Previdi + Cisco Systems, Inc. + Via Del Serafico 200 + 00142 Roma + Italy + + Phone: +39 06 5164 4491 + EMail: sprevidi@cisco.com + + + Mike Shand + Cisco Systems + 250, Longwater Avenue, + Green Park, + Reading, + RG2 6GB, + UK + + Phone: +44 20 8824 8690 + EMail: mshand@cisco.com + + + + + + + + + + + + + + + + + +Hermelin, et al. Informational [Page 13] + +RFC 3786 IS-IS LSP Fragments May 2004 + + +12. Full Copyright Statement + + Copyright (C) The Internet Society (2004). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + +Hermelin, et al. Informational [Page 14] + |