summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5715.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5715.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5715.txt')
-rw-r--r--doc/rfc/rfc5715.txt1235
1 files changed, 1235 insertions, 0 deletions
diff --git a/doc/rfc/rfc5715.txt b/doc/rfc/rfc5715.txt
new file mode 100644
index 0000000..f3b440b
--- /dev/null
+++ b/doc/rfc/rfc5715.txt
@@ -0,0 +1,1235 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) M. Shand
+Request for Comments: 5715 S. Bryant
+Category: Informational Cisco Systems
+ISSN: 2070-1721 January 2010
+
+
+ A Framework for Loop-Free Convergence
+
+Abstract
+
+ A micro-loop is a packet forwarding loop that may occur transiently
+ among two or more routers in a hop-by-hop packet forwarding paradigm.
+
+ This framework provides a summary of the causes and consequences of
+ micro-loops and enables the reader to form a judgement on whether
+ micro-looping is an issue that needs to be addressed in specific
+ networks. It also provides a survey of the currently proposed
+ mechanisms that may be used to prevent or to suppress the formation
+ of micro-loops when an IP or MPLS network undergoes topology change
+ due to failure, repair, or management action. When sufficiently fast
+ convergence is not available and the topology is susceptible to
+ micro-loops, use of one or more of these mechanisms may be desirable.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc5715.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 1]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+Copyright Notice
+
+ Copyright (c) 2010 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. The Nature of Micro-Loops .......................................4
+ 3. Applicability ...................................................5
+ 4. Micro-Loop Control Strategies ...................................6
+ 5. Loop Mitigation .................................................8
+ 5.1. Fast Convergence ...........................................8
+ 5.2. PLSN .......................................................8
+ 6. Micro-Loop Prevention ..........................................10
+ 6.1. Incremental Cost Advertisement ............................10
+ 6.2. Nearside Tunneling ........................................12
+ 6.3. Farside Tunnels ...........................................13
+ 6.4. Distributed Tunnels .......................................14
+ 6.5. Packet Marking ............................................14
+ 6.6. MPLS New Labels ...........................................15
+ 6.7. Ordered FIB Update ........................................16
+ 6.8. Synchronised FIB Update ...................................18
+ 7. Using PLSN in Conjunction with Other Methods ...................18
+ 8. Loop Suppression ...............................................19
+ 9. Compatibility Issues ...........................................20
+ 10. Comparison of Loop-Free Convergence Methods ...................20
+ 11. Security Considerations .......................................21
+ 12. Acknowledgments ...............................................21
+ 13. Informative References ........................................21
+
+
+
+
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 2]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+1. Introduction
+
+ When there is a change to the network topology (due to the failure or
+ restoration of a link or router, or as a result of management
+ action), the routers need to converge on a common view of the new
+ topology and the paths to be used for forwarding traffic to each
+ destination. During this process, referred to as a routing
+ transition, packet delivery between certain source/destination pairs
+ may be disrupted. This occurs due to the time it takes for the
+ topology change to be propagated around the network together with the
+ time it takes each individual router to determine and then update the
+ forwarding information base (FIB) for the affected destinations.
+ During this transition, packets may be lost due to the continuing
+ attempts to use the failed component and due to forwarding loops.
+ Forwarding loops arise due to the inconsistent FIBs that occur as a
+ result of the difference in time taken by routers to execute the
+ transition process. This is a problem that may occur in both IP
+ networks and MPLS networks that use the label distribution protocol
+ (LDP) [RFC5036] as the label switched path (LSP) signaling protocol.
+
+ The service failures caused by routing transitions are largely hidden
+ by higher-level protocols that retransmit the lost data. However,
+ new Internet services could emerge that are more sensitive to the
+ packet disruption that occurs during a transition. To make the
+ transition transparent to their users, these services would require a
+ short routing transition. Ideally, routing transitions would be
+ completed in zero time with no packet loss.
+
+ Regardless of how optimally the mechanisms involved have been
+ designed and implemented, it is inevitable that a routing transition
+ will take some minimum interval that is greater than zero. This has
+ led to the development of a traffic engineering (TE) fast-reroute
+ mechanism for MPLS [RFC4090]. Alternative mechanisms that might be
+ deployed in an MPLS network or an IP network are current work items
+ in the IETF [RFC5714]. The repair mechanism may, however, be
+ disrupted by the formation of micro-loops during the period between
+ the time when the failure is announced and the time when all FIBs
+ have been updated to reflect the new topology.
+
+ One method of mitigating the effects of micro-loops is to ensure that
+ the network reconverges in a sufficiently short time that these
+ effects are inconsequential. Another method is to design the network
+ topology to minimise or even eliminate the possibility of micro-
+ loops.
+
+ The propensity to form micro-loops is highly topology dependent, and
+ algorithms are available to identify which links in a network are
+ subject to micro-looping. In topologies that are critically
+
+
+
+Shand & Bryant Informational [Page 3]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ susceptible to the formation of micro-loops, there is little point in
+ introducing new mechanisms to provide fast reroute without also
+ deploying mechanisms that prevent the disruptive effects of micro-
+ loops. Unless micro-loop prevention is used in these topologies,
+ packets may not reach the repair and micro-looping packets may cause
+ congestion, resulting in further packet loss.
+
+ The disruptive effect of micro-loops is not confined to periods when
+ there is a component failure. Micro-loops can, for example, form
+ when a component is put back into service following repair. Micro-
+ loops can also form as a result of a network-maintenance action such
+ as adding a new network component, removing a network component, or
+ modifying a link cost.
+
+ This framework provides a summary of the causes and consequences of
+ micro-loops and enables the reader to form a judgement on whether
+ micro-looping is an issue that needs to be addressed in specific
+ networks. It also provides a survey of the currently proposed micro-
+ loop mitigation mechanisms. When sufficiently fast convergence is
+ not available and the topology is susceptible to micro-loops, use of
+ one or more of these mechanisms may be desirable.
+
+2. The Nature of Micro-Loops
+
+ A micro-loop is a packet forwarding loop that may occur transiently
+ among two or more routers in a hop-by-hop, packet forwarding
+ paradigm.
+
+ Micro-loops may form during the periods when a network is re-
+ converging following ANY topology change and are caused by
+ inconsistent FIBs in the routers. During the transition, micro-loops
+ may occur over a single link between a pair of routers that
+ temporarily use each other as the next hop for a prefix. Micro-loops
+ may also form when each router in a cycle of three or more routers
+ has the next router in the cycle as a next hop for a given prefix.
+
+ Cyclic loops may occur if one or more of the following conditions are
+ met:
+
+ 1. Asymmetric link costs.
+
+ 2. An equal-cost path exists between a pair of routers, each of
+ which makes a different decision regarding which path to use for
+ forwarding to a particular destination. Note that even routers
+ that do not implement equal-cost, multi-path (ECMP) forwarding
+ must make a choice between the available equal-cost paths, and
+ unless they make the same choice, the condition for cyclic loops
+ will be fulfilled.
+
+
+
+Shand & Bryant Informational [Page 4]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ 3. Topology changes affecting multiple links, including single node
+ and line card failures.
+
+ Micro-loops have two undesirable side effects: congestion and repair
+ starvation.
+
+ o A looping packet consumes bandwidth until it either escapes as a
+ result of the re-synchronization of the FIBs or its time to live
+ (TTL) expires. This transiently increases the traffic over a link
+ by as much as 128 times, and may cause the link to become
+ congested. This congestion reduces the bandwidth available to
+ other traffic (which is not otherwise affected by the topology
+ change). As a result, the "innocent" traffic using the link
+ experiences increased latency and is liable to congestive packet
+ loss.
+
+ o In cases where the link or node failure has been protected by a
+ fast-reroute repair, an inconsistency in the FIBs may prevent some
+ traffic from reaching the failure, and hence being repaired. The
+ repair may thus become starved of traffic and thereby rendered
+ ineffective.
+
+ Although micro-loops are usually considered in the context of a
+ failure, similar problems of congestive packet loss and starvation
+ may also occur if the topology change is the result of management
+ action. For example, consider the case where a link is to be taken
+ out of service by management action. The link can be retained in
+ service throughout the transition, thus avoiding the need for any
+ repair. However, if micro-loops form, they may cause congestion loss
+ and may also prevent traffic from reaching the link.
+
+ Unless otherwise controlled, micro-loops may form in any part of the
+ network that forwards (or in the case of a new link, will forward)
+ packets over a path that includes the affected topology change. The
+ time taken to propagate the topology change through the network, and
+ the non-uniform time taken by each router to calculate the new
+ shortest path tree (SPT) and update its FIB, contribute to the
+ duration of the packet disruption caused by the micro-loops. In some
+ cases, a packet may be subject to disruption from micro-loops that
+ occur sequentially at links along the path, thus further extending
+ the period of disruption beyond that required to resolve a single
+ loop.
+
+3. Applicability
+
+ Loop-free convergence techniques are applicable to any situation in
+ which micro-loops may form, for example, the convergence of a network
+ following:
+
+
+
+Shand & Bryant Informational [Page 5]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ 1. Component failure
+
+ 2. Component repair
+
+ 3. Management withdrawal of a component
+
+ 4. Management insertion or a component
+
+ 5. Management change of link cost (either positive or negative)
+
+ 6. External cost change, for example, change of external gateway as
+ a result of a BGP change
+
+ 7. A Shared Risk Link Group (SRLG) failure
+
+ In each case, a component may be a link, a set of links, or an entire
+ router. Throughout this document, we use the term SRLG when
+ describing the procedure to be followed when multiple failures have
+ occurred, whether or not they are members of an explicit SRLG. In
+ the case of multiple independent failures, the loop-prevention method
+ described for SRLG may be used, provided it is known that all of
+ these failures have been repaired.
+
+ Loop-free convergence techniques are applicable to both IP networks
+ and MPLS-enabled networks that use LDP, including LDP networks that
+ use the single-hop tunnel fast-reroute mechanism.
+
+ An assessment of whether loop-free convergence techniques are
+ required should take into account whether or not the interior gateway
+ protocol (IGP) convergence is sufficiently fast that any micro-loops
+ are of such short duration that they are not disruptive, and whether
+ or not the topology is such that micro-loops are likely to form.
+
+4. Micro-Loop Control Strategies
+
+ Micro-loop control strategies fall into four basic classes:
+
+ 1. Micro-loop mitigation
+
+ 2. Micro-loop prevention
+
+ 3. Micro-loop suppression
+
+ 4. Network design to minimise micro-loops
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 6]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ A micro-loop-mitigation scheme works by re-converging the network in
+ such a way that it reduces, but does not eliminate, the formation of
+ micro-loops. Such schemes cannot guarantee the productive forwarding
+ of packets during the transition.
+
+ A micro-loop-prevention mechanism controls the re-convergence of the
+ network in such a way that no micro-loops form. Such a micro-loop-
+ prevention mechanism allows the continued use of any fast repair
+ method until the network has converged on its new topology and
+ prevents the collateral damage that occurs to other traffic for the
+ duration of each micro-loop.
+
+ A micro-loop-suppression mechanism attempts to eliminate the
+ collateral damage caused by micro-loops to other traffic. This may
+ be achieved by, for example, using a packet-monitoring method that
+ detects that a packet is looping and drops it. Such schemes make no
+ attempt to productively forward the packet throughout the network
+ transition.
+
+ Highly meshed topologies are less susceptible to micro-loops, thus
+ networks may be designed to minimise the occurrence of micro-loops by
+ appropriate link placement and metric settings. However, this
+ approach may conflict with other design requirements, such as cost
+ and traffic planning, and may not accurately track the evolution of
+ the network or temporary changes due to outages.
+
+ Note that all known micro-loop-prevention mechanisms and most micro-
+ loop-mitigation mechanisms extend the duration of the re-convergence
+ process. When the failed component is protected by a fast-reroute
+ repair, this implies that the converging network requires the repair
+ to remain in place for longer than would otherwise be the case. The
+ extended convergence time means any traffic that is not repaired by
+ an imperfect repair experiences a significantly longer outage than it
+ would experience with conventional convergence.
+
+ When a component is returned to service, or when a network management
+ action has taken place, this additional delay does not cause traffic
+ disruption because there is no repair involved. However, the
+ extended delay is undesirable because it increases the time that the
+ network takes to be ready for another failure, and hence leaves it
+ vulnerable to multiple failures.
+
+
+
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 7]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+5. Loop Mitigation
+
+ There are two approaches to loop mitigation.
+
+ o Fast convergence
+
+ o A purpose-designed, loop-mitigation mechanism
+
+5.1. Fast Convergence
+
+ The duration of micro-loops is dependent on the speed of convergence.
+ Improving the speed of convergence may therefore be seen as a loop-
+ mitigation technique.
+
+5.2. PLSN
+
+ The only known purpose-designed, loop-mitigation approach is the Path
+ Locking with Safe-Neighbors (PLSN) method described in PLSN
+ [ANALYSIS]. In this method, a micro-loop-free next-hop safety
+ condition is defined as follows:
+
+ In a symmetric-cost network, it is safe for router X to change to the
+ use of neighbor Y as its next hop for a specific destination if the
+ path through Y to that destination satisfies both of the following
+ criteria:
+
+ 1. X considers Y as its loop-free neighbor based on the topology
+ before the change, AND
+
+ 2. X considers Y as its downstream neighbor based on the topology
+ after the change.
+
+ In an asymmetric-cost network, a stricter safety condition is needed,
+ and the criterion is that:
+
+ X considers Y as its downstream neighbor based on the topology
+ both before and after the change.
+
+ Based on these criteria, destinations are classified by each router
+ into three classes:
+
+ o Type A destinations: Destinations unaffected by the change (type
+ A1) and also destinations whose next hop after the change
+ satisfies the safety criteria (type A2).
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 8]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ o Type B destinations: Destinations that cannot be sent via the new,
+ primary next hop because the safety criteria are not satisfied,
+ but that can be sent via another next hop that does satisfy the
+ safety criteria.
+
+ o Type C destinations: All other destinations.
+
+ Following a topology change, type A destinations are immediately
+ changed to go via the new topology. Type B destinations are
+ immediately changed to go via the next hop that satisfies the safety
+ criteria, even though this is not the shortest path. Type B
+ destinations continue to go via this path until all routers have
+ changed their type C destinations over to the new next hop. Routers
+ must not change their type C destinations until all routers have
+ changed their type A2 and B destinations to the new or intermediate
+ (safe) next hop.
+
+ Simulations indicate that this approach produces a significant
+ reduction in the number of links that are subject to micro-looping.
+ However, unlike all of the micro-loop-prevention methods, it is only
+ a partial solution. In particular, micro-loops may form on any link
+ joining a pair of type C routers.
+
+ Because routers delay updating their type C destination FIB entries,
+ they will continue to route towards the failure during the time when
+ the routers are changing their type A and B destinations, and hence
+ will continue to productively forward packets, provided that viable
+ repair paths exist.
+
+ A backwards-compatibility issue arises with PLSN. If a router is not
+ capable of micro-loop control, it will not correctly delay its FIB
+ update. If all such routers had only type A destinations, this loop-
+ mitigation mechanism would work as it was designed. Alternatively,
+ if all such incapable routers had only type C destinations, the
+ "loop-prevention" announcement mechanism used to trigger the tunnel-
+ based schemes (see Sections 6.2 to 6.4) could be used to cause the
+ type A and B destinations to be changed, with the incapable routers
+ and routers having type C destinations delaying until they received
+ the "real" announcement. Unfortunately, these two approaches are
+ mutually incompatible.
+
+ Note that simulations indicate that in most topologies treating type
+ B destinations as type C results in only a small degradation in loop
+ prevention. Also note that simulation results indicate that in
+ production networks where some, but not all, links have asymmetric
+ costs, using the stricter asymmetric-cost criterion actually reduces
+ the number of loop-free destinations because fewer destinations can
+ be classified as type A or B.
+
+
+
+Shand & Bryant Informational [Page 9]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ This mechanism operates identically for:
+
+ o events that degrade the topology (e.g., link failure),
+
+ o events that improve the topology (e.g., link restoration), and
+
+ o shared risk link group (SRLG) failure.
+
+6. Micro-Loop Prevention
+
+ Eight micro-loop-prevention methods have been proposed:
+
+ 1. Incremental cost advertisement
+
+ 2. Nearside tunneling
+
+ 3. Farside tunneling
+
+ 4. Distributed tunnels
+
+ 5. Packet marking
+
+ 6. New MPLS labels
+
+ 7. Ordered FIB update
+
+ 8. Synchronized FIB update
+
+6.1. Incremental Cost Advertisement
+
+ When a link fails, the cost of the link is normally changed from its
+ assigned metric to "infinity" in one step. However, it can be proved
+ [OPT] that no micro-loops will form if the link cost is increased in
+ suitable increments, and the network is allowed to stabilize before
+ the next cost increment is advertised. Once the link cost has been
+ increased to a value greater than that of the lowest alternative cost
+ around the link, the link may be disabled without causing a micro-
+ loop.
+
+ The criterion for a link cost change to be safe is that any link that
+ is subjected to a cost change of x can only cause loops in a part of
+ the network that has a cyclic cost less than or equal to x. Because
+ there may exist links that have a cost of one in each direction,
+ resulting in a cyclic cost of two, this can result in the link cost
+ having to be raised in increments of one. However, the increment can
+ be larger where the minimum cost permits. Recent work [OPT] has
+
+
+
+
+
+Shand & Bryant Informational [Page 10]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ shown that there are a number of optimizations that can be applied to
+ the problem in order to determine the exact set of cost values
+ required, and hence minimise the number of increments.
+
+ It will be appreciated that when a link is returned to service, its
+ cost is reduced in small steps from "infinity" to its final cost,
+ thereby providing similar micro-loop prevention during a "good-news"
+ event. Note that the link cost may be decreased from "infinity" to
+ any value greater than that of the lowest alternative cost around the
+ link in one step without causing a micro-loop.
+
+ When the failure is an SRLG, the link cost increments must be
+ coordinated across all failing members of the SRLG. This may be
+ achieved by completing the transition of one link before starting the
+ next or by interleaving the changes.
+
+ The incremental cost change approach has the advantage over all other
+ currently known loop-prevention schemes in that it requires no change
+ to the routing protocol. It will work in any network because it does
+ not require any cooperation from the other routers in the network.
+
+ Where the micro-loop-prevention mechanism is being used to support a
+ planned reconfiguration of the network, the extended total
+ reconvergence time resulting from the multiple increments is of
+ limited consequence, particularly where the number of increments have
+ been optimized. This, together with the ability to implement this
+ technique in isolation, makes this method a good candidate for use
+ with such management-initiated changes.
+
+ Where the micro-loop-prevention mechanism is being used to support
+ failure recovery, the number of increments required, and hence the
+ time taken to fully converge, is significant even for small numbers
+ of increments. This is because, for the duration of the transition,
+ some parts of the network continue to use the old forwarding path,
+ and hence use any repair mechanism for an extended period. In the
+ case of a failure that cannot be fully repaired, some destinations
+ may therefore become unreachable for an extended period. In
+ addition, the network may be vulnerable to a second failure for the
+ duration of the controlled re-convergence.
+
+ Where large metrics are used and no optimization (such as that
+ described above) is performed, the incremental cost method can be
+ extremely slow. However, in cases where the per-link metric is
+ small, either because small values have been assigned by the network
+ designers or because of restrictions implicit in the routing protocol
+ (e.g., RIP restricts the metric, and BGP using the autonomous system
+
+
+
+
+
+Shand & Bryant Informational [Page 11]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ (AS) path length frequently uses an effective metric of one or a very
+ small integer for each inter AS hop), the number of required
+ increments can be acceptably small even without optimizations.
+
+6.2. Nearside Tunneling
+
+ This mechanism works by creating an overlay network using tunnels
+ whose path is not affected by the topology change and then carrying
+ the traffic affected by the change in that new network. When all the
+ traffic is in the new, tunnel-based network, the real network is
+ allowed to converge on the new topology. Because all the traffic
+ that would be affected by the change is carried in the overlay
+ network, no micro-loops form.
+
+ When a failure is detected (or a link is withdrawn from service), the
+ router adjacent to the failure issues a new "loop-prevention" routing
+ message announcing the topology change. This message is propagated
+ through the network by all routers but is only understood by routers
+ capable of using one of the tunnel-based, micro-loop-prevention
+ mechanisms.
+
+ Each of the micro-loop-preventing routers builds a tunnel to the
+ closest router adjacent to the failure. They then determine which of
+ their traffic would transit the failure and place that traffic in the
+ tunnel. When all of these tunnels are in place (determined, for
+ example, by waiting a suitable interval), the failure is announced as
+ normal. Because these tunnels will be unaffected by the transition
+ and because the routers protecting the link will continue the repair
+ (or forward across the link being withdrawn), no traffic will be
+ disrupted by the failure. When the network has converged, these
+ tunnels are withdrawn, allowing traffic to be forwarded along its
+ new, "natural" path. The order of tunnel insertion and withdrawal is
+ not important, provided that the tunnels are all in place before the
+ normal announcement is issued and that the repair remains in place
+ until normal convergence has completed.
+
+ This method completes in bounded time and is generally much faster
+ than the incremental cost method. Depending on the exact design, it
+ completes in two or three flood-SPF-FIB update cycles.
+
+ At the time at which the failure is announced as normal, micro-loops
+ may form within isolated islands of non-micro-loop-preventing
+ routers. However, only traffic entering the network via such routers
+ can micro-loop. All traffic entering the network via a micro-loop-
+ preventing router will be tunneled correctly to the nearest repairing
+ router -- including, if necessary, being tunneled via a non-micro-
+ loop-preventing router -- and will not micro-loop.
+
+
+
+
+Shand & Bryant Informational [Page 12]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ Where there is no requirement to prevent the formation of micro-loops
+ involving non-micro-loop-preventing routers, a single, "normal"
+ announcement may be made and a local timer used to determine the time
+ at which transition from tunneled forwarding to normal forwarding
+ over the new topology may commence.
+
+ This technique has the disadvantage that it requires traffic to be
+ tunneled during the transition. This is an issue in IP networks
+ because not all router designs are capable of high-performance IP
+ tunneling. It is also an issue in MPLS networks because the
+ encapsulating router has to know the label set that the decapsulating
+ router is distributing.
+
+ A further disadvantage of this method is that it requires cooperation
+ from all the routers within the routing domain to fully protect the
+ network against micro-loops.
+
+ When a new link is added, the mechanism is run in "reverse". When
+ the loop-prevention announcement is heard, routers determine which
+ traffic they will send over the new link and tunnel that traffic to
+ the router on the near side of that link. This path will not be
+ affected by the presence of the new link. When the "normal"
+ announcement is heard, they then update their FIB to send the traffic
+ normally, according to the new topology. Any traffic encountering a
+ router that has not yet updated its FIB will be tunneled to the near
+ side of the link, and will therefore not loop.
+
+ When a management change to the topology is required, again exactly
+ the same mechanism protects against micro-looping of packets by the
+ micro-loop-preventing routers.
+
+ When the failure is an SRLG, the required strategy is to classify
+ traffic according the furthest failing member of the SRLG that it
+ will traverse on its way to the destination, and to tunnel that
+ traffic to the repairing router for that SRLG member. This will
+ require multiple tunnel destinations -- in the limiting case, one per
+ SRLG member.
+
+6.3. Farside Tunnels
+
+ Farside tunneling loop prevention requires the loop-preventing
+ routers to place all of the traffic that would traverse the failure
+ in one or more tunnels terminating at the router (or, in the case of
+ node failure, routers) at the far side of the failure. The
+ properties of this method are a more uniform distribution of repair
+ traffic than is achieved using the nearside tunnel method and, in the
+ case of node failure, a reduction in the decapsulation load on any
+ single router.
+
+
+
+Shand & Bryant Informational [Page 13]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ Unlike the nearside tunnel method (which uses normal routing to the
+ repairing router), this method requires the use of a repair path to
+ the farside router. This may be provided by the not-via [NOT-VIA]
+ mechanism, in which case no further computation is needed.
+
+ The mode of operation is otherwise identical to the nearside
+ tunneling loop-prevention method (Section 6.2).
+
+6.4. Distributed Tunnels
+
+ In the distributed tunnels loop-prevention method, each router
+ calculates its own repair and forwards traffic affected by the
+ failure using that repair. Unlike the fast reroute (FRR) case, the
+ actual failure is known at the time of the calculation. The
+ objective of the loop-preventing routers is to get the packets that
+ would have gone via the failure into Q-space [FRR-TUNN] using routers
+ that are in P-space. Because packets are decapsulated on entry to
+ Q-space, rather than being forced to go to the farside of the
+ failure, more optimum routing may be achieved. This method is
+ subject to the same reachability constraints described in [FRR-TUNN].
+
+ The mode of operation is otherwise identical to the nearside
+ tunneling loop-prevention method (Section 6.2).
+
+ An alternative distributed tunnel mechanism is for all routers to
+ tunnel to the not-via address [NOT-VIA] associated with the failure.
+
+6.5. Packet Marking
+
+ If packets could be marked in some way, this information could be
+ used to assign them to one of:
+
+ o the new topology,
+
+ o the old topology, or
+
+ o a transition topology.
+
+ They would then be correctly forwarded during the transition. This
+ mechanism works identically for both "bad-news" and "good-news"
+ events. It also works identically for SRLG failure. There are three
+ problems with this solution:
+
+ o A packet-marking bit may not be available, for example, a network
+ supporting both the differentiated services architecture [RFC2475]
+ and explicit congestion notification [RFC3168] uses all eight bits
+ of the IPv4 Type of Service field.
+
+
+
+
+Shand & Bryant Informational [Page 14]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ o The mechanism would introduce a non-standard forwarding procedure.
+
+ o Packet marking using either the old or the new topology would
+ double the size of the FIB; however, some optimizations may be
+ possible.
+
+6.6. MPLS New Labels
+
+ In an MPLS network that is using [RFC5036] for label distribution,
+ loop-free convergence can be achieved through the use of new labels
+ when the path that a prefix will take through the network changes.
+
+ As described in Section 6.2, the repairing routers issue a loop-
+ prevention announcement to start the loop-free convergence process.
+ All loop-preventing routers calculate the new topology and determine
+ whether their FIB needs to be changed. If there is no change in the
+ FIB, they take no part in the following process.
+
+ The routers that need to make a change to their FIB consider each
+ change and check the new next hop to determine whether it will use a
+ path in the OLD topology that reaches the destination without
+ traversing the failure (i.e., the next hop is in P-space with respect
+ to the failure [FRR-TUNN]). If so, the FIB entry can be immediately
+ updated. For all of the remaining FIB entries, the router issues a
+ new label to each of its neighbors. This new label is used to lock
+ the path during the transition in a similar manner to the previously
+ described method for loop-free convergence with tunnels
+ (Section 6.2). Routers receiving a new label install it in their FIB
+ for MPLS label translation, but do not yet remove the old label and
+ do not yet use this new label to forward IP packets, i.e., they
+ prepare to forward using the new label on the new path but do not use
+ it yet. Any packets received continue to be forwarded the old way,
+ using the old labels, towards the repair.
+
+ At some time after the loop-prevention announcement, a normal routing
+ announcement of the failure is issued. This announcement must not be
+ issued until such time as all routers have carried out all of their
+ activities that were triggered by the loop-prevention announcement.
+ On receipt of the normal announcement, all routers that were delaying
+ convergence move to their new path for both the new and the old
+ labels. This involves changing the IP address entries to use the new
+ labels AND changing the old labels to forward using the new labels.
+
+ Because the new label path was installed during the loop-prevention
+ phase, packets reach their destinations as follows:
+
+ o If they do not go via any router using a new label, they go via
+ the repairing router and the repair.
+
+
+
+Shand & Bryant Informational [Page 15]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ o If they meet any router that is using the new labels, they get
+ marked with the new labels and reach their destination using the
+ new path, back-tracking if necessary.
+
+ When all routers have changed to the new path, the network is
+ converged. At some later time, when it can be assumed that all
+ routers have moved to using the new path, the FIB can be cleaned up
+ to remove the, now redundant, old labels.
+
+ As with other methods, the new labels may be modified to provide loop
+ prevention for "good news". There are also a number of optimizations
+ of this method.
+
+6.7. Ordered FIB Update
+
+ The ordered FIB loop prevention method is described in "Loop-free
+ convergence using oFIB" [oFIB]. Micro-loops occur following a
+ failure or a cost increase, when a router closer to the failed
+ component revises its routes to take account of the failure before a
+ router that is further away. By analyzing the reverse shortest path
+ tree (rSPT) over which traffic is directed to the failed component in
+ the old topology, it is possible to determine a strict ordering that
+ ensures that nodes closer to the root always process the failure
+ after any nodes further away, and hence micro-loops are prevented.
+
+ When the failure has been announced, each router waits a multiple of
+ the convergence timer [LF-TIMERS]. The multiple is determined by the
+ node's position in the rSPT, and the delay value is chosen to
+ guarantee that a node can complete its processing within this time.
+ The convergence time may be reduced by employing a signaling
+ mechanism to notify the parent when all the children have completed
+ their processing, and hence when it is safe for the parent to
+ instantiate its new routes.
+
+ The property of this approach is therefore that it imposes a delay
+ that is bounded by the network diameter, although in many cases it
+ will be much less.
+
+ When a link is returned to service, the convergence process above is
+ reversed. A router first determines its distance (in hops) from the
+ new link in the NEW topology. Before updating its FIB, it then waits
+ a time equal to the value of that distance multiplied by the
+ convergence timer.
+
+ It will be seen that network-management actions can similarly be
+ undertaken by treating a cost increase in a manner similar to a
+ failure and a cost decrease similar to a restoration.
+
+
+
+
+Shand & Bryant Informational [Page 16]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ The ordered FIB mechanism requires all nodes in the domain to operate
+ according to these procedures, and the presence of non-cooperating
+ nodes can give rise to loops for any traffic that traverses them (not
+ just traffic that is originated through them). Without additional
+ mechanisms, these loops could remain in place for a significant time.
+
+ It should be noted that this method requires per-router ordering but
+ not per-prefix ordering. A router must wait its turn to update its
+ FIB, but it should then update its entire FIB.
+
+ When an SRLG failure occurs, a router must classify traffic into the
+ classes that pass over each member of the SRLG. Each router is then
+ independently assigned a ranking with respect to each SRLG member for
+ which they have a traffic class. These rankings may be different for
+ each traffic class. The prefixes of each class are then changed in
+ the FIB according to the ordering of their specific ranking. Again,
+ as for the single failure case, signaling may be used to speed up the
+ convergence process.
+
+ Note that the special SRLG case of a full or partial node failure can
+ be dealt with without using per-prefix ordering by running a single
+ reverse-SPF computation rooted at the failed node (or common point of
+ the subset of failing links in the partial case).
+
+ There are two classes of signaling optimization that can be applied
+ to the ordered FIB loop-prevention method:
+
+ o When the router makes NO change, it can signal immediately. This
+ significantly reduces the time taken by the network to process
+ long chains of routers that have no change to make to their FIB.
+
+ o When a router HAS changed, it can signal that it has completed.
+ This is more problematic since this may be difficult to determine,
+ particularly in a distributed architecture, and the optimization
+ obtained is the difference between the actual time taken to make
+ the FIB change and the worst-case timer value. This saving could
+ be of the order of one second per hop.
+
+ There is another method of executing ordered FIB that is based on
+ pure signaling [SIG]. Methods that use signaling as an optimization
+ are safe because eventually they fall back on the established IGP
+ mechanisms that ensure that networks converge under conditions of
+ packet loss. However, a mechanism that relies on signaling in order
+ to converge requires a reliable signaling mechanism that must be
+ proven to recover from any failure circumstance.
+
+
+
+
+
+
+Shand & Bryant Informational [Page 17]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+6.8. Synchronised FIB Update
+
+ Micro-loops form because of the asynchronous nature of the FIB update
+ process during a network transition. In many router architectures,
+ it is the time taken to update the FIB itself that is the dominant
+ term. One approach would be to have two FIBs and, in a synchronized
+ action throughout the network, to switch from the old to the new.
+ One way to achieve this synchronized change would be to signal or
+ otherwise determine the wall clock time of the change and then
+ execute the change at that time, using NTP [RFC1305] to synchronize
+ the wall clocks in the routers.
+
+ This approach has a number of major issues. Firstly, two complete
+ FIBs are needed, which may create a scaling issue; secondly, a
+ suitable network-wide synchronization method is needed. However,
+ neither of these are insurmountable problems.
+
+ Since the FIB change synchronization will not be perfect, there may
+ be some interval during which micro-loops form. Whether this scheme
+ is classified as a micro-loop-prevention mechanism or a micro-loop-
+ mitigation mechanism within this taxonomy is therefore dependent on
+ the degree of synchronization achieved.
+
+ This mechanism works identically for both "bad-news" and "good-news"
+ events. It also works identically for SRLG failure. Further
+ consideration needs to be given to interoperating with routers that
+ do not support this mechanism. Without a suitable interoperating
+ mechanism, loops may form for the duration of the synchronization
+ delay.
+
+7. Using PLSN in Conjunction with Other Methods
+
+ All of the tunnel methods and packet marking can be combined with
+ PLSN (see Section 5.2 of this document and [ANALYSIS]) to reduce the
+ traffic that needs to be protected by the advanced method.
+ Specifically, all traffic could use PLSN except traffic between a
+ pair of routers, both of which consider the destination to be type C.
+ The type-C-to-type-C traffic would be protected from micro-looping
+ through the use of a loop-prevention method.
+
+ However, determining whether the new next-hop router considers a
+ destination to be type C may be computationally intensive. An
+ alternative approach would be to use a loop-prevention method for all
+ local type C destinations. This would not require any additional
+ computation, but would require the additional loop-prevention method
+ to be used in cases that would not have generated loops (i.e., when
+ the new next-hop router considered this to be a type A or B
+ destination).
+
+
+
+Shand & Bryant Informational [Page 18]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ The amount of traffic that would use PLSN is highly dependent on the
+ network topology and the specific change, but would be expected to be
+ in the range of 70% to 90% in typical networks.
+
+ However, PLSN cannot be combined safely with ordered FIB. Consider
+ the network fragment shown below:
+
+ R
+ /|\
+ / | \
+ 1/ 2| \3
+ / | \ cost S->T = 10
+ Y-----X----S----T cost T->S = 1
+ | 1 2 |
+ |1 |
+ D---------------+
+ 20
+
+ On failure of link XY, according to PLSN, S will regard R as a safe
+ neighbor for traffic to D. However, the ordered FIB rank of both R
+ and T will be zero, and hence these can change their FIBs during the
+ same time interval. If R changes before T, then a loop will form
+ around R, T, and S. This can be prevented by using a stronger safety
+ condition than PLSN currently specifies, at the cost of introducing
+ more type C routers, and hence reducing the PLSN coverage.
+
+8. Loop Suppression
+
+ A micro-loop-suppression mechanism recognizes that a packet is
+ looping and drops it. One such approach would be for a router to
+ recognize, by some means, that it had seen the same packet before.
+ It is difficult to see how sufficiently reliable discrimination could
+ be achieved without some form of per-router signature, such as route
+ recording. A packet-recognizing approach therefore seems infeasible.
+
+ An alternative approach would be to recognize that a packet was
+ looping by recognizing that it was being sent back to the place from
+ which it had just come. This would work for the types of loop that
+ form in symmetric-cost networks, but would not suppress the cyclic
+ loops that form in asymmetric networks or as a result of multiple
+ failures.
+
+ This mechanism operates identically for both "bad-news" events,
+ "good-news" events, and SRLG failure.
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 19]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+9. Compatibility Issues
+
+ Deployment of any micro-loop-control mechanism is a major change to a
+ network. Full consideration must be given to interoperation between
+ routers that are capable of micro-loop control and those that are
+ not. Additionally, there may be a desire to limit the complexity of
+ micro-loop control by choosing a method based purely on its
+ simplicity. Any such decision must take into account that if a more
+ capable scheme is needed in the future, its deployment might be
+ complicated by interaction with the scheme previously deployed.
+
+10. Comparison of Loop-Free Convergence Methods
+
+ PLSN [ANALYSIS] is an efficient mechanism to prevent the formation of
+ micro-loops but is only a partial solution. It is a useful adjunct
+ to some of the complete solutions but may need modification.
+
+ Incremental cost advertisement in its simplest form is impractical as
+ a general solution because it takes too long to complete. Optimized
+ incremental cost advertisement, however, completes in much less time
+ and requires no assistance from other routers in the network. It is
+ therefore useful for network-reconfiguration operations.
+
+ Packet marking is probably impractical because of the need to find
+ the marking bit and to change the forwarding behavior.
+
+ Of the remaining methods, distributed tunnels is significantly more
+ complex than nearside or farside tunnels and should only be
+ considered if there is a requirement to distribute the tunnel
+ decapsulation load.
+
+ Synchronised FIBs is a fast method but has the issue that a suitable
+ synchronization mechanism needs to be defined. One method would be
+ to use NTP [RFC1305]; however, the coupling of routing convergence to
+ a protocol that uses the network may be a problem. During the
+ transition, there will be some micro-looping for a short interval
+ because it is not possible to achieve complete synchronization of the
+ FIB changeover.
+
+ The ordered FIB mechanism has the major advantage that it is a
+ control-plane-only solution. However, SRLGs require a per-
+ destination calculation and the convergence delay may be high,
+ bounded by the network diameter. The use of signaling as an
+ accelerator may reduce the number of destinations that experience the
+ full delay, and hence reduce the total re-convergence time to an
+ acceptable period.
+
+
+
+
+
+Shand & Bryant Informational [Page 20]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ The nearside and farside tunnel methods deal relatively easily with
+ SRLGs and uncorrelated changes. The convergence delay would be
+ small. However, these methods require the use of tunneled
+ forwarding, which is not supported on all router hardware, and raises
+ issues of forwarding performance. When used with PLSN, the amount of
+ traffic that was tunneled would be significantly reduced, thus
+ reducing the forwarding performance concerns. If the selected repair
+ mechanism requires the use of tunnels, then a tunnel-based loop
+ prevention scheme may be acceptable.
+
+11. Security Considerations
+
+ This document analyzes the problem of micro-loops and summarizes a
+ number of potential solutions that have been proposed. These
+ solutions require only minor modifications to existing routing
+ protocols and therefore do not add additional security risks.
+ However, a full security analysis would need to be provided within
+ the specification of a particular solution proposed for deployment.
+
+12. Acknowledgments
+
+ The authors would like to acknowledge contributions to this document
+ made by Clarence Filsfils.
+
+13. Informative References
+
+ [ANALYSIS] Zinin, A., "Analysis and Minimization of Microloops in
+ Link-state Routing Protocols", Work in Progress,
+ October 2005.
+
+ [FRR-TUNN] Bryant, S., Filsfils, C., Previdi, S., and M. Shand, "IP
+ Fast Reroute using tunnels", Work in Progress,
+ November 2007.
+
+ [LF-TIMERS] Atlas, A., Bryant, S., and M. Shand, "Synchronisation of
+ Loop Free Timer Values", Work in Progress,
+ February 2008.
+
+ [NOT-VIA] Shand, M., Bryant, S., and S. Previdi, "IP Fast Reroute
+ Using Not-via Addresses", Work in Progress, July 2009.
+
+ [OPT] Francois, P., Shand, M., and O. Bonaventure, "Disruption
+ free topology reconfiguration in OSPF networks", IEEE
+ INFOCOM May 2007, Anchorage.
+
+ [RFC1305] Mills, D., "Network Time Protocol (Version 3)
+ Specification, Implementation", RFC 1305, March 1992.
+
+
+
+
+Shand & Bryant Informational [Page 21]
+
+RFC 5715 A Framework for Loop-Free Convergence January 2010
+
+
+ [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z.,
+ and W. Weiss, "An Architecture for Differentiated
+ Services", RFC 2475, December 1998.
+
+ [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
+ of Explicit Congestion Notification (ECN) to IP",
+ RFC 3168, September 2001.
+
+ [RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
+ Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
+ May 2005.
+
+ [RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP
+ Specification", RFC 5036, October 2007.
+
+ [RFC5714] Shand, M. and S. Bryant, "IP Fast Reroute Framework",
+ RFC 5714, January 2010.
+
+ [SIG] Francois, P. and O. Bonaventure, "Avoiding transient
+ loops during IGP convergence", IEEE INFOCOM March 2005,
+ Miami.
+
+ [oFIB] Francois, P., "Loop-free convergence using oFIB", Work
+ in Progress, February 2008.
+
+Authors' Addresses
+
+ Mike Shand
+ Cisco Systems
+ 250, Longwater Ave,
+ Green Park, Reading, RG2 6GB
+ United Kingdom
+
+ EMail: mshand@cisco.com
+
+
+ Stewart Bryant
+ Cisco Systems
+ 250, Longwater Ave,
+ Green Park, Reading, RG2 6GB
+ United Kingdom
+
+ EMail: stbryant@cisco.com
+
+
+
+
+
+
+
+
+Shand & Bryant Informational [Page 22]
+