1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
|
Internet Engineering Task Force (IETF) J. Farkas, Ed.
Request for Comments: 7813 Ericsson
Category: Standards Track N. Bragg
ISSN: 2070-1721 Ciena
P. Unbehagen
Avaya
G. Parsons
Ericsson
P. Ashwood-Smith
Huawei Technologies
C. Bowers
Juniper Networks
June 2016
IS-IS Path Control and Reservation
Abstract
IEEE 802.1Qca Path Control and Reservation (PCR) specifies explicit
path control via IS-IS in Layer 2 networks in order to move beyond
the shortest path capabilities provided by IEEE 802.1aq Shortest Path
Bridging (SPB). IS-IS PCR provides capabilities for the
establishment and control of explicit forwarding trees in a Layer 2
network domain. This document specifies the sub-TLVs for IS-IS PCR.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc7813.
Farkas, et al. Standards Track [Page 1]
^L
RFC 7813 IS-IS PCR June 2016
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions Used in This Document . . . . . . . . . . . . . . 4
3. Terminology and Definitions . . . . . . . . . . . . . . . . . 4
4. Explicit Trees . . . . . . . . . . . . . . . . . . . . . . . 6
5. Explicit ECT Algorithms . . . . . . . . . . . . . . . . . . . 9
6. IS-IS PCR Sub-TLVs . . . . . . . . . . . . . . . . . . . . . 11
6.1. Topology Sub-TLV . . . . . . . . . . . . . . . . . . . . 11
6.2. Hop Sub-TLV . . . . . . . . . . . . . . . . . . . . . . . 15
6.3. Bandwidth Constraint Sub-TLV . . . . . . . . . . . . . . 19
6.4. Bandwidth Assignment Sub-TLV . . . . . . . . . . . . . . 21
6.5. Timestamp Sub-TLV . . . . . . . . . . . . . . . . . . . . 23
7. MRT-FRR Application . . . . . . . . . . . . . . . . . . . . . 24
8. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 29
10. Security Considerations . . . . . . . . . . . . . . . . . . . 29
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 30
11.1. Normative References . . . . . . . . . . . . . . . . . . 30
11.2. Informative References . . . . . . . . . . . . . . . . . 31
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 32
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 32
Farkas, et al. Standards Track [Page 2]
^L
RFC 7813 IS-IS PCR June 2016
1. Introduction
IEEE 802.1Qca Path Control and Reservation (PCR) [IEEE8021Qca]
specifies extensions to IS-IS for the control of Explicit Trees
(ETs). The PCR extensions are compatible with the Shortest Path
Bridging (SPB) extensions to IS-IS specified by [RFC6329] and
[IEEE8021aq] (already rolled into [IEEE8021Q]). Furthermore, IS-IS
with PCR extensions relies on the SPB architecture and terminology,
and some of the IS-IS SPB sub-TLVs are also leveraged. IS-IS PCR
builds upon IS-IS and uses IS-IS in a similar way to SPB. IS-IS PCR
only addresses point-to-point physical links, although IS-IS also
supports shared media LANs.
This document specifies five IS-IS sub-TLVs for the control of
explicit trees by IS-IS PCR in a Layer 2 network as specified by IEEE
Std 802.1Qca. In addition to the sub-TLVs specified here, IS-IS PCR
relies on the following IS-IS SPB sub-TLVs specified by [RFC6329]:
o SPB Link Metric sub-TLV
o SPB Base VLAN-Identifiers sub-TLV
o SPB Instance sub-TLV
o SPBV MAC address sub-TLV
o SPBM Service Identifier and Unicast Address sub-TLV
These sub-TLVs are used to provide the link metric and the
associations among bridges, Media Access Control (MAC) addresses,
VLAN IDs (VIDs), and I-SIDs within an IS-IS domain. The use of these
SPB sub-TLVs for PCR is specified by IEEE Std 802.1Qca. Note that
IS-IS PCR does not require the implementation of the full IS-IS SPB
protocol but only the support of these SPB sub-TLVs. A bridge can
support both IS-IS SPB and IS-IS PCR at the same time; however, when
it supports both, they are implemented by the same IS-IS entity on a
per-instance basis.
The sub-TLVs specified in this document can also be applied for Fast
Reroute using Maximally Redundant Trees (MRT-FRR) [RFC7812] in a
Layer 2 network. Maximally Redundant Trees (MRTs) are computed as
specified in [RFC7811]. If MRT computation is split such that the
Generalized Almost Directed Acyclic Graph (GADAG) is computed
centrally, then these sub-TLVs can be used to distribute the GADAG,
which is identical for each network node throughout a network domain.
PCR uses IS-IS, the SPB sub-TLVs listed above, and the new sub-TLVs
defined in this document. IS-IS PCR has no impact on IETF protocols.
Farkas, et al. Standards Track [Page 3]
^L
RFC 7813 IS-IS PCR June 2016
2. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Terminology and Definitions
This document uses the terminology defined in [RFC7812]. Only the
abbreviations are resolved here for the MRT terms; please refer to
[RFC7812] for the complete definition.
ADAG: Almost Directed Acyclic Graph [RFC7812]
B-VID: Backbone VID [IEEE8021Q]
Base VID: The VID used to identify a VLAN in management operations.
[IEEE8021Q]
BLCE: Bridge Local Computation Engine - A computation engine in a
bridge that performs path and routing computations. The BLCE
implements e.g., SPF, CSPF, or the Maximally Redundant Trees
algorithm. [IEEE8021Qca]
Constrained tree: A tree meeting a certain constraint, e.g.,
providing minimally available bandwidth. [IEEE8021Qca]
CSPF: Constrained Shortest Path First
DAG: Directed Acyclic Graph [RFC7812]
DEI: Drop Eligible Indicator [IEEE8021Q]
ECT Algorithm: Equal-Cost Tree algorithm - The algorithm and
mechanism that is used for the control of the active topology,
i.e., forwarding trees. It can be one of the shortest path
algorithms specified by [IEEE8021Q]. It can be also one of the
explicit path-control algorithms specified by [IEEE8021Qca]. Each
ECT Algorithm has a 32-bit unique ID.
ET: Explicit Tree - An explicitly defined tree, which is specified
by its Edge Bridges and the paths among the Edge Bridges. If only
the Edge Bridges are specified but the paths are not, then it is a
loose explicit tree. If the paths are also specified, then it is
a strict explicit tree. [IEEE8021Qca]
ETDB: Explicit Tree Database - A database storing explicit trees.
[IEEE8021Qca]
Farkas, et al. Standards Track [Page 4]
^L
RFC 7813 IS-IS PCR June 2016
FDB: Filtering Database [IEEE8021Q]
GADAG: Generalized ADAG [RFC7812]
Hop: A hop is specified by two nodes. A strict hop has no
intermediate nodes, whereas a loose hop can have one or more
intermediate nodes. IS-IS PCR specifies an explicit tree by an
ordered list of hops starting at the root, each successive hop
being defined by the next element of the list. [IEEE8021Qca]
I-SID: Backbone Service Instance Identifier - A 24-bit ID.
[IEEE8021Q]
LSDB: Link State Database
MRT: Maximally Redundant Trees [RFC7812]
MRT-Blue: MRT-Blue is used to describe one of the two MRTs.
[RFC7812]
MRT-Red: MRT-Red is used to describe one of the two MRTs. [RFC7812]
MRT Root: The common root of the two MRTs: MRT-Blue and MRT-Red.
MSRP: Multiple Stream Registration Protocol, standardized as IEEE
Std 802.1Qat, already rolled into [IEEE8021Q].
PCA: Path Control Agent - The agent that is part of the IS-IS domain
and thus can perform IS-IS operations on behalf of a PCE, e.g.,
maintain the LSDB and send LSPs. [IEEE8021Qca]
PCE: Path Computation Element - An entity that is capable of
computing a path through a network based on a representation of
the topology of the network (obtained by undefined means external
to the PCE). [RFC4655]
PCP: Priority Code Point, which identifies a traffic class.
[IEEE8021Q]
PTP: Precision Time Protocol specified by [IEEE1588].
SPB: Shortest Path Bridging
SPBM: SPB MAC - The SPB mode where a MAC or its shorthand
(SPSourceID: Shortest Path Source ID) is used to identify an SPT.
[IEEE8021Q]
Farkas, et al. Standards Track [Page 5]
^L
RFC 7813 IS-IS PCR June 2016
SPBV: SPB VID - The SPB mode where a unique VID is assigned to each
SPT Root bridge and is used to identify an SPT. [IEEE8021Q]
SPF: Shortest Path First
SPT: Shortest Path Tree [IEEE8021Q]
SRLG: Shared Risk Link Group - A set of links that share a resource
whose failure affects each link. [RFC5307]
TAI: Temps Atomique International - International Atomic Time
[IEEE1588]
TED: Traffic Engineering Database - A database storing the traffic
engineering information propagated by IS-IS. [RFC5305]
VID: VLAN ID [IEEE8021Q]
VLAN: Virtual Local Area Network [IEEE8021Q]
4. Explicit Trees
Explicit trees may be determined in some fashion. For example, an
explicit tree may be determined by a Path Computation Element (PCE)
[RFC4655]. A PCE is an entity that is capable of computing a
topology for forwarding based on a network topology, its
corresponding attributes, and potential constraints. If a PCE is
used, it MUST explicitly specify an explicit tree as described in
Section 6.1. Either a single PCE or multiple PCEs determine explicit
trees for a domain. Even if there are multiple PCEs in a domain,
each explicit tree MUST only be determined by one PCE, which is
referred to as the owner PCE of the tree. PCEs and IS-IS PCR can be
used in combination with IS-IS SPB shortest path routing. The
remainder of this section, and subsequent sections, are written
assuming PCE use.
The PCE interacts with the active topology control protocol, i.e.,
with IS-IS. The collaboration with IS-IS can be provided by a Path
Control Agent (PCA) on behalf of a PCE. Either the PCE or the
corresponding PCA is part of the IS-IS domain. If the PCE is not
part of the IS-IS domain, then the PCE MUST be associated with a PCA
that is part of the IS-IS domain. The PCE or its PCA MUST establish
IS-IS adjacency in order to receive all the LSPs transmitted by the
bridges in the domain. The PCE, either on its own or via its PCA,
can control the establishment of explicit trees in that domain by
injecting an LSP conveying an explicit tree and thus instruct IS-IS
to set up the explicit tree determined by the PCE. If instructed to
do so by a PCE, IS-IS MAY also record and communicate bandwidth
Farkas, et al. Standards Track [Page 6]
^L
RFC 7813 IS-IS PCR June 2016
assignments, which MUST NOT be applied if reservation protocol (e.g.,
Multiple Stream Registration Protocol (MSRP)) is used in the domain.
Both MSRP and IS-IS MUST NOT be used to make bandwidth assignments in
the same domain.
The operation details of the PCE are not specified by this document
or by IEEE Std 802.1Qca. If the PCE is part of the IS-IS domain,
then the PCE uses IS-IS PDUs to communicate with the IS-IS domain and
the PCE has a live IS-IS LSDB (i.e., the PCE implements the PCA
functions too). A PCE can instead communicate with the IS-IS domain
via a PCA, e.g., to retrieve the LSDB or instruct the creation of an
explicit tree. However, the means of communication between the PCE
and the PCA is not specified by this document or by IEEE Std
802.1Qca.
An Explicit Tree (ET) is an undirected loop-free topology, whose use
is under the control of the owner PCE by means of associating VIDs
and MAC addresses with it. An ET MUST NOT contain cycles. As it is
undirected, an ET contains no assumptions about the direction of any
flows that use it; it can be used in either direction as specified by
the VIDs and MAC addresses associated with it. It is the
responsibility of the PCE to ensure reverse-path congruency and
multicast-unicast congruency if that is required.
An explicit tree is either strict or loose. A strict explicit tree
specifies all bridges and paths it comprises. A loose tree only
specifies the bridges as a list of hops that have a special role in
the tree, e.g., an Edge Bridge, and no path or path segment is
specified between the bridges, which are therefore loose hops even if
Edge Bridges are adjacent neighbors. The special role of a hop can
be: Edge Bridge, root, leaf, a bridge to be avoided, or a transit hop
in case of a tree with a single leaf. The path for a loose hop is
determined by the Bridge Local Computation Engine (BLCE) of the
bridges. The shortest path is used for a loose hop unless specified
otherwise by the descriptor (Section 6.1) of the tree or by the
corresponding ECT Algorithm (Section 5).
A loose explicit tree is constrained if the tree descriptor includes
one or more constraints, e.g., the administrative group that the
links of the tree have to belong to. The BLCE of the bridges then
applies the Constrained Shortest Path First (CSPF) algorithm, which
is Shortest Path First (SPF) on the topology that only contains the
links meeting the constraint(s).
An explicit tree is specified by a Topology sub-TLV (Section 6.1).
The Topology sub-TLV associates one or more VIDs with an explicit
tree. The Topology sub-TLV includes two or more Hop sub-TLVs
(Section 6.2), and a hop is specified by an IS-IS System ID. A Hop
Farkas, et al. Standards Track [Page 7]
^L
RFC 7813 IS-IS PCR June 2016
sub-TLV MAY include a delay constraint for a loose hop. A Topology
sub-TLV MAY also include further sub-TLVs to constrain loose hops.
The bridges involved in an explicit tree store the corresponding
Topology sub-TLVs in their Explicit Tree Database (ETDB).
Explicit trees are propagated and set up by IS-IS PCR in a domain.
The PCE or its PCA assembles the Topology sub-TLVs (Section 6.1), and
adds it into an LSP, which is flooded throughout the domain. The
Topology sub-TLV is flooded by the same techniques used for the SPB
LSPs. The bridges then MUST process the Topology sub-TLV upon
reception. If the Topology sub-TLV specifies one or more loose
trees, then the path for the loose hops is determined by the BLCE of
the bridges. The bridges then install the appropriate FDB entries
for frame forwarding along the tree described by the Topology sub-TLV
or the trees computed based on the Topology sub-TLV. Dynamic
Filtering Entries are maintained by IS-IS for the [VID, MAC address]
two-tuples associated with an ET.
Due to the LSP aging of IS-IS, the Topology sub-TLVs (Section 6.1)
have to be refreshed similar to other IS-IS TLVs in order to keep the
integrity of the LSDB. The corresponding Dynamic Filtering Entries
are also refreshed in the FDB when a Topology sub-TLV is refreshed.
Refreshing Topology sub-TLVs is the task of the entity being part of
the IS-IS domain, i.e., either the PCE or the PCA.
The owner PCE can withdraw an explicit tree by sending an updated LSP
that does not include the Topology sub-TLV (Section 6.1). If a
Topology sub-TLV is removed from an LSP (or has been changed) so that
(previous) Topology sub-TLV is no longer present (or has been
changed) in the LSDB, then that (previous) Topology sub-TLV is
implicitly withdrawn. IS-IS PCR then removes (or updates) the
explicit tree.
There is no precedence order between explicit trees. Precedence
order among bandwidth assignments recorded by IS-IS PCR is specified
in Section 6.4.
If it is not possible to install an explicit tree, e.g.,
constraint(s) cannot be met or the Topology sub-TLV is ill-formed,
then no tree is installed, but a management report is generated.
The bridges MAY support the following IS-IS features for the
computation of explicit trees. The Extended IS Reachability TLV
(type 22) specified in [RFC5305] provides the following link
attribute IS-IS sub-TLVs:
o Administrative Group (color) (sub-TLV type 3),
Farkas, et al. Standards Track [Page 8]
^L
RFC 7813 IS-IS PCR June 2016
o Maximum Link Bandwidth (sub-TLV type 9),
o Maximum Reservable Link Bandwidth (sub-TLV type 10),
o Unreserved Bandwidth (sub-TLV type 11),
o TE Default Metric (sub-TLV type 18).
When the Unreserved Bandwidth sub-TLV is used in a Layer 2 bridge
network, the priority value encoded in the sub-TLV provides the PCP,
i.e., identifies a traffic class (not a setup priority level).
Further attributes are provided by the IS-IS TE Metric Extension link
attribute sub-TLVs specified in [RFC7810]:
o Unidirectional Link Delay (sub-TLV type 33),
o Min/Max Unidirectional Link Delay (sub-TLV type 34),
o Unidirectional Delay Variation (sub-TLV type 35),
o Unidirectional Link Loss (sub-TLV type 36),
o Unidirectional Residual Bandwidth (sub-TLV type 37),
o Unidirectional Available Bandwidth (sub-TLV type 38),
o Unidirectional Utilized Bandwidth (sub-TLV type 39).
The Shared Risk Link Group (SRLG) information provided by the SRLG
TLV (type 138) [RFC5307] MAY also be used. In order to indicate that
the interface is unnumbered in this case, the corresponding flag
takes value 0. The Link Local Identifier is an Extended Local
Circuit Identifier and the Link Remote Identifier is a Neighbor
Extended Local Circuit ID.
5. Explicit ECT Algorithms
The exact IS-IS control mode of operation MUST be selected for a VLAN
by associating its Base VID with the appropriate ECT Algorithm in the
SPB Base VLAN-Identifiers sub-TLV [RFC6329], in addition to
allocating the Base VID to IS-IS control. There are five distinct
ECT Algorithms for the five explicit path control modes. The
operation details of the explicit ECT Algorithms and their
configuration is specified by IEEE Std 802.1Qca; a high-level
overview is given here. An ECT Algorithm value consists of the IEEE
802.1 OUI (Organizationally Unique Identifier) value 00-80-C2
concatenated with an index [RFC6329].
Farkas, et al. Standards Track [Page 9]
^L
RFC 7813 IS-IS PCR June 2016
The Strict Tree (ST) ECT Algorithm MUST be used for a strict explicit
tree. A strict ET is static, as no other entity can update it but
the owner PCE. In case of a topology change, it is the task of the
owner PCE to detect the topology change, e.g., based on the changes
in the LSDB and to update the strict trees if needed. That is, the
owner PCE computes the new tree, assembles its descriptor
(Section 6.1), and then instructs IS-IS PCR to install it. The value
for the ST ECT Algorithm is 00-80-C2-17.
The Loose Tree (LT) ECT Algorithm MAY also be supported. It is used
for a single loose explicit tree. The path for loose hops is
determined by the BLCE of the bridges; therefore, the Topology sub-
TLV (Section 6.1) specifying the tree MUST indicate which hop is the
root of the tree. The loose hops are maintained by IS-IS, i.e.,
restored upon a topology change if a loop-free path is available. If
the tree computed by the BLCE visits the same bridge twice (implying
that a loop or hairpin has been created), then that loop or hairpin
MUST be pruned from the tree even if it contains a hop specified by
the Topology sub-TLV. It is a constraint if a bridge is not to be
included, which can be specified by the Exclude flag of a Hop sub-TLV
(Section 6.2) conveyed by the Topology sub-TLV specifying the tree.
The range of values for the LT ECT Algorithms is
00-80-C2-21...00-80-C2-30.
The Loose Tree Set (LTS) ECT Algorithm MAY also be supported. It is
used if connectivity among the Edge Bridges specified by the Topology
sub-TLV (Section 6.1) is to be provided by a set of loose trees such
that one tree is rooted at each Edge Bridge. The BLCE of the bridges
compute the loose trees, which are maintained by IS-IS, i.e.,
restored upon a topology change. One constraint can be to avoid some
bridges in these trees, which can be specified by the Exclude flag
(item c.6. in Section 6.2). Further constraints can be specified by
the Topology sub-TLV. The range of values for the LT ECT Algorithms
is 00-80-C2-31...00-80-C2-40.
The LT and LTS ECT Algorithms use the shortest paths after pruning
the topology according to the constraint(s), if any. The shortest
path tie-breaking specified by Section 12 of [RFC6329] is applied
(see also subclauses 28.5 - 28.8 of [IEEE8021aq]), that's why range
of values are associated with the LT and LTS ECT Algorithms. In case
of the LT ECT Algorithm, the indexes are 0x21...0x30, and
ECT-MASK{index-0x20} is applied to retrieve the ECT-MASK of
Section 12 of [RFC6329]. In case of the LTS ECT Algorithm, the
indexes are 0x31...0x40, and ECT-MASK{index-0x30} is applied to
retrieve the ECT-MASK for shortest path tie-breaking.
Farkas, et al. Standards Track [Page 10]
^L
RFC 7813 IS-IS PCR June 2016
The MRT ECT Algorithm MAY also be supported. It is used for the
establishment and maintenance of MRTs in a distributed fashion. The
MRT Lowpoint algorithm specified by [RFC7811] MUST be used for the
computation of MRTs. The MRT Lowpoint algorithm first computes the
GADAG and then produces two MRTs for each MRT Root: MRT-Blue and MRT-
Red. If the level of redundancy provided by each bridge being an MRT
Root is not required, then the MRT Roots can be specified by a
Topology sub-TLV (Section 6.1). Both the GADAG and the MRT
computation steps are performed distributed, i.e., by each bridge.
The value for the MRT ECT Algorithm is 00-80-C2-18.
The MRT GADAG (MRTG) ECT Algorithm MAY also be supported. It splits
the computation into two. As the GADAG is identical for each MRT
within a domain, it is computed by a single entity, which is the
GADAG Computer. The GADAG is then described in a Topology sub-TLV
(Section 6.1), which is flooded in the domain. The bridges then
compute the MRTs for the MRT Roots based on the GADAG received.
Section 7 provides more details on the description of the GADAG. The
value for the MRTG ECT Algorithm is 00-80-C2-19.
MRTs are loose trees as bridges are involved in their computation and
restoration. Thus, both the MRT and the MRTG ECT Algorithms provide
a set of loose trees: two MRTs for each MRT Root.
The SPB Link Metric sub-TLV [RFC6329] specifies the metric of each
link for IS-IS PCR if the LT, the LTS, the MRT, or the MRTG ECT
Algorithm is used. If the SPB Link Metric values advertised by
different ends of an adjacency are different, then the maximum value
MUST be used.
6. IS-IS PCR Sub-TLVs
The following sub-TLVs are specified for IS-IS PCR. The Topology
sub-TLV MUST be carried in an MT-Capability TLV, the rest of the sub-
TLVs are conveyed by the Topology sub-TLV.
6.1. Topology Sub-TLV
An explicit tree MUST be described by the variable-length Topology
sub-TLV. A Generalized Almost Directed Acyclic Graph (GADAG) MAY be
described by a Topology sub-TLV as explained in Section 7 in detail.
The Topology sub-TLV MUST be carried in an MT-Capability TLV (type
144) [RFC6329] in a Link State PDU. A Topology sub-TLV specifying an
explicit tree conveys one or more Base VIDs, two or more Hop sub-TLVs
(Section 6.2). A Topology sub-TLV describing a loose tree MAY also
convey further sub-TLVs to specify constraints. Figure 1 shows the
format of the Topology sub-TLV.
Farkas, et al. Standards Track [Page 11]
^L
RFC 7813 IS-IS PCR June 2016
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| Type | (1 byte)
+-+-+-+-+-+-+-+-+
| Length | (1 byte)
+-+-+-+-+-+-+-+-+
| Num Base VIDs | (1 byte)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Res | Base VID 1 (12 bits) | (2 bytes if present)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.................
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Res | Base VID n (12 bits) | (2 bytes if present)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| sub-TLV 1 (variable) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.................
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| sub-TLV m (variable) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: Topology Sub-TLV
The parameters of explicit trees are encoded by the Topology sub-TLV
as follows:
a. Type (8 bits): The type of the sub-TLV, its value is 21.
b. Length (8 bits): The total number of bytes contained in the Value
field.
c. Number of Base VIDs (8 bits): The number of Base VIDs carried in
the Topology sub-TLV. Its minimum value is 1 if the Topology
sub-TLV specifies one or more explicit trees. Its value can be 0
if the Topology sub-TLV specifies a GADAG.
d. Reserved (Res) (4 bits): The reserved bits MUST be set to 0 on
transmission and the value MUST be ignored on reception.
e. Base VID (12 bits): The Base VID parameter provides the Base VID
of the VLAN that is associated with the explicit tree. Multiple
Base VIDs can be associated with the same explicit tree. In
addition to the Base VID, some of the explicit ECT Algorithms
(Section 5) require further VIDs that are associated with the
VLAN via the SPB Instance sub-TLV [RFC6329]. A Topology sub-TLV
specifying a GADAG can have zero Base VID parameters. In this
Farkas, et al. Standards Track [Page 12]
^L
RFC 7813 IS-IS PCR June 2016
case, the given GADAG MUST be applied for each VLAN associated
with the MRTG ECT Algorithm (Section 5).
f. sub-TLVs: The rest conveys further sub-TLVs that specify the hops
of the topology and can also specify constraints as described in
the following.
A topology is specified by a list of Hop sub-TLVs (Section 6.2), and
a hop is specified by an IS-IS System ID. An ill-formed Topology
sub-TLV (e.g., specifying an invalid or inconsistent tree) is
ignored; no tree is installed, but a management report is generated.
The Topology sub-TLV specifies a strict tree by decomposing the tree
to branches. Each branch is a point-to-point path specified by an
ordered list of hops where the end of each branch is a leaf. Each
element of a branch is the direct link between adjacent neighbor
bridges whose Hop sub-TLV is next to each other in the Topology sub-
TLV. The first hop of the Topology sub-TLV is the root; hence, the
first branch originates from the root. The rest of the branches fork
from another branch. The first hop of a branch is a bridge that is
already part of a former branch, and the last hop is a leaf bridge.
Therefore, the hop after a leaf hop is the beginning of a new branch,
if any. A hop of a branch is created if and only if the bridge
specified for that hop is directly connected to the preceding bridge
of the same branch. The first branch MUST begin with the root; after
that, the order of the branches does not matter within the Topology
sub-TLV. Figure 2 shows an example strict tree and its description.
Farkas, et al. Standards Track [Page 13]
^L
RFC 7813 IS-IS PCR June 2016
+-----------+
| A |
+-----------+
| I |
+-----------+
| H |
[B]---[A]---[I] +-----------+
| | | G |
| | +-----------+
| | | E |
[C]---[F] [H] +-----------+
| | | A |
| | +-----------+
| | | B |
[D] [E]---[G] +-----------+
| C |
+-----------+
| D |
+-----------+
| C |
+-----------+
| F |
+-----------+
Figure 2: A Strict Tree and Its Description; Root = Node A
The Topology sub-TLV of a loose tree does not provide any path or
path segment other than the hops that are to participate. The root
MUST be the first hop. The leaves of a single loose tree MUST also
be specified. Hop sub-TLVs can be included in a Topology sub-TLV to
specify bridges that have to be avoided. If the Topology sub-TLV
only specifies a single leaf, then one or more transit hops can be
specified by the Topology sub-TLV to direct the path along a sequence
of bridges, specified by the order of hops. If bridges whose
respective Hop sub-TLVs are adjacent to each other in the Topology
sub-TLV are not topology neighbors, then it is a loose hop. If a
Topology sub-TLV conveys one or more loose hops, then that sub-TLV
defines a loose explicit tree and each hop is considered to be a
loose hop. The path of a loose hop MUST be pruned from the tree if
the path would create a loop or hairpin.
If the Base VIDs of the Topology sub-TLV are associated with the LTS
ECT Algorithm or the MRT ECT Algorithm, then the Hop sub-TLVs
conveyed by the Topology sub-TLV belong to Edge Bridges or bridges to
be excluded. The BLCEs compute the loose trees, e.g., MRTs, such
that they span the Edge Bridges and are rooted at an Edge Bridge.
Farkas, et al. Standards Track [Page 14]
^L
RFC 7813 IS-IS PCR June 2016
The Topology sub-TLV specifies a GADAG if the Base VIDs conveyed by
the Topology sub-TLV are associated with the MRTG ECT Algorithm.
Section 7 provides the details on the description of a GADAG by a
Topology sub-TLV.
Each Edge Bridge of an explicit tree MUST always be specified in the
Topology sub-TLV by the inclusion of the Hop sub-TLVs corresponding
to the Edge Bridges. The Edge Bridges of a tree are identified by
setting the Edge Bridge flag (item c.3. in Section 6.2) in the
appropriate Hop sub-TLVs.
If the explicit tree is loose, then the Topology sub-TLV MAY convey
further sub-TLVs to specify constraints, e.g., an Administrative
Group sub-TLV [RFC5305] or a Bandwidth Constraint (Section 6.3). If
it is not possible to meet the constraint(s) specified by the
Topology sub-TLV, then no tree is installed but a management report
is generated.
IS-IS PCR MAY be used for recording bandwidth assignment. In that
case, the Topology sub-TLV conveys Bandwidth Assignment sub-TLV
(Section 6.4), and it MAY also convey Timestamp sub-TLV
(Section 6.5). If assignment of the bandwidth indicated by the
Bandwidth Assignment sub-TLV of the Topology sub-TLV would result in
overbooking any link of the explicit tree, then bandwidth assignment
MUST NOT be performed and a management report is generated. If the
Topology sub-TLV specifies a new valid explicit tree, then the tree
is installed without bandwidth assignment.
6.2. Hop Sub-TLV
The Hop sub-TLV MUST be used to specify a hop of a topology. Each
Hop sub-TLV conveys an IS-IS System ID, which specifies a hop. A Hop
sub-TLV is conveyed by a Topology sub-TLV (Section 6.1). A strict
explicit tree is decomposed to branches where each branch is a point-
to-point path specified by an ordered list of Hop sub-TLVs as
specified in Section 6.1. A hop of a branch is created if and only
if the bridge specified for that hop is directly connected to the
preceding bridge in the path. That is, a point-to-point LAN is
identified by the two bridges it interconnects; and the LAN is part
of the strict tree if and only if the Hop sub-TLVs of the two bridges
are next to each other in the Topology sub-TLV. A Hop sub-TLV can
convey a Circuit ID in order to distinguish multiple links between
adjacent neighbor bridges. A Hop sub-TLV also specifies the role of
a bridge, e.g., if it is the root or an Edge Bridge. The Topology
sub-TLV of a loose tree only comprises the Hop sub-TLV of the bridges
that have a special role in the tree. The Hop sub-TLV MAY also
specify a delay budget for a loose hop.
Farkas, et al. Standards Track [Page 15]
^L
RFC 7813 IS-IS PCR June 2016
By default, the Edge Bridges both transmit and receive with respect
to each VID associated with an explicit tree, except for an LTS
(Section 5) associated with a learning VLAN, which uses a
unidirectional VID per bridge. The Hop sub-TLV allows different
configuration by means of the Transmit (T) and Receive (R) flags
conveyed in the sub-TLV. The VID and its T/R flags are only present
in the Hop sub-TLV if the behavior of the Edge Bridges differs from
the default.
Figure 3 shows the format of the variable length Hop sub-TLV, which
MUST be conveyed by a Topology sub-TLV (Section 6.1).
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| Type | (1 byte)
+-+-+-+-+-+-+-+-+
| Length | (1 byte)
+-+-+-+-+-+-+-+-+
|C|V|B|R|L|E|Res| (1 byte)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| System ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| System ID | (6 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Local Circuit ID (4 bytes if present) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Num of VIDs | (1 byte if present)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|T|R|Res| VID 1 (12 bits) | (2 bytes if present)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.................
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|T|R|Res| VID n (12 bits) | (2 bytes if present)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Delay Constraint |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Delay Constraint | (6 bytes if present)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: Hop Sub-TLV
The parameters of a hop are encoded as follows:
a. Type (8 bits): The type of the sub-TLV, its value is 22.
b. Length (8 bits): The total number of bytes contained in the Value
field.
Farkas, et al. Standards Track [Page 16]
^L
RFC 7813 IS-IS PCR June 2016
c. Hop Flags (8 bits): The Hop sub-TLV conveys six one-bit flags.
The Circuit and the VID flags influence the length of the Hop
sub-TLV. Two bits are reserved for future use, transmitted as 0
and ignored on receipt.
1. Circuit (C) flag (1 bit): The Circuit flag is a one-bit flag
to indicate whether or not the Extended Local Circuit ID
parameter is present. If the flag is set, then an Extended
Local Circuit ID is also included in the Hop sub-TLV.
2. VID (V) flag (1 bit): The VID flag is a one-bit flag to
indicate whether or not one or more VIDs are conveyed by the
Hop sub-TLV. If the flag is set, then the Number of VIDs
parameter is present and indicates how many VIDs are conveyed
by the Hop sub-TLV. If the VID flag is reset, then neither
the Number of VIDs parameter nor VIDs are present in the Hop
sub-TLV.
3. Edge Bridge (B) flag (1 bit): The Edge Bridge flag is a one-
bit flag to indicate whether or not the given System is an
Edge Bridge, i.e., transmitter and/or receiver. If the
System is an Edge Bridge, then the Edge Bridge flag MUST be
set. The Edge Bridge flag indicates that FDB entries have to
be installed for the given hop as specified by the SPBV MAC
address sub-TLV or SPBM Service Identifier and Unicast
Address sub-TLV of the hop.
4. Root (R) flag (1 bit): The Root flag is a one-bit flag to
indicate whether or not the given System is a root of the
explicit tree specified by the Topology sub-TLV. If the
System is a root of a tree, then the Root flag MUST be set.
If the Topology sub-TLV specifies a single tree, i.e., the
Base VIDs conveyed by the Topology sub-TLV are associated
with either the ST ECT Algorithm or the LT ECT Algorithm
(Section 5), then the Root flag is only set for one of the
Systems conveyed by the Topology sub-TLV. Furthermore, the
first Hop sub-TLV of the Topology sub-TLV conveys the System
that is the root of the tree.
If the Topology sub-TLV specifies a Loose Tree Set, i.e., the
Base VIDs conveyed by the Topology sub-TLV are associated
with the LTS ECT Algorithm (Section 5), then the Root flag is
set for each Edge Bridge as each of them roots a tree.
If the Topology sub-TLV is used for MRT operations, i.e., the
Base VIDs conveyed by the Topology sub-TLV are associated
with either the MRT ECT Algorithm or the MRTG ECT algorithm
(Section 5), then the Root flag is set for each MRT Root. If
no MRT Root is specified by a Topology sub-TLV specifying a
GADAG, then each SPT Root is an MRT Root as well.
Farkas, et al. Standards Track [Page 17]
^L
RFC 7813 IS-IS PCR June 2016
If the Base VIDs conveyed by the Topology sub-TLV are
associated with the MRTG ECT algorithm (Section 5), then the
Topology sub-TLV specifies a GADAG and the very first Hop
sub-TLV specifies the GADAG Root. There is no flag for
indicating the GADAG Root.
5. Leaf (L) flag (1 bit): The Leaf flag is a one-bit flag to
indicate whether or not the given System is a leaf of the
explicit tree specified by the Topology sub-TLV. If the
System is a leaf, then the Leaf flag MUST be set. The Leaf
flag is only used to mark a leaf of a tree if the Topology
sub-TLV specifies a single tree. The Leaf flag MUST be used
to indicate the end of a topology block if the Topology sub-
TLV specifies a GADAG, see Section 7.
6. Exclude (E) flag (1 bit): The Exclude flag is a one-bit flag
to indicate if the given System MUST be excluded from the
topology. The Exclude flag and the Root flag cannot be set
for a given hop at the same time.
7. Reserved (Res) (2 bits): The reserved bits MUST be set to 0
on transmission, and the value MUST be ignored on reception.
d. System ID (48 bits): The six-byte IS-IS System Identifier of the
bridge to which the Hop sub-TLV refers.
e. Extended Local Circuit ID (32 bits): The Extended Local Circuit
ID [RFC5303] parameter is not necessarily present in the Hop sub-
TLV. Its presence is indicated by the Circuit flag. Parallel
links corresponding to different IS-IS adjacencies between a pair
of neighbor bridges can be distinguished by means of the Extended
Local Circuit ID. The Extended Local Circuit ID is conveyed by
the Hop sub-TLV specifying the bridge nearer to the root of the
tree, and identifies a circuit that attaches the given bridge to
its neighbor cited by the next Hop sub-TLV of the Topology sub-
TLV. The Extended Local Circuit ID can only be used in strict
trees.
f. Number of VIDs (8 bits): The Number of VIDs parameter is not
present if the Hop sub-TLV does not convey VIDs, which is
indicated by the VID flag.
g. VID and its T/R flags (14 bits): The VID and its T/R flags are
only present in the Hop sub-TLV if the given bridge is an Edge
Bridge and it behaves differently from the default with respect
to that particular VID.
Farkas, et al. Standards Track [Page 18]
^L
RFC 7813 IS-IS PCR June 2016
1. T flag (1 bit): This is the Transmit allowed flag for the VID
following the flag.
2. R flag (1 bit): This is the Receive allowed flag for the VID
following the flag.
3. Reserved (Res) (2 bits): The reserved bits MUST be set to 0
on transmission, and the value MUST be ignored on reception.
4. VID (12 bits): A VID.
h. Delay Constraint (48 bits): A Hop sub-TLV MAY specify a delay
constraint. The Length of the Hop sub-TLV indicates whether or
not a delay constraint is present because the Length of a Hop
sub-TLV conveying a delay constraint is six bytes greater than it
would be without the delay constraint. The last six bytes then
specify a delay constraint if they convey a Unidirectional Link
Delay sub-TLV [RFC7810]. The delay constraint MAY be used in a
Topology sub-TLV that specifies a single loose tree, i.e., the
Base VIDs are associated with the LT ECT Algorithm (Section 5).
If the delay constraint is applied, then the loose hop MUST fit
in the delay budget specified by the Delay parameter of the
Unidirectional Link Delay sub-TLV conveyed by the Hop sub-TLV.
If the Topology sub-TLV specifies a single leaf, then the path
between the preceding Hop sub-TLV and the current Hop sub-TLV
MUST meet the delay budget. If the Topology sub-TLV specifies
multiple leaves, then the path between the root and the current
Hop sub-TLV MUST to meet the delay budget. If the tree is used
as a reverse congruent tree, then the delay constraint applies in
both directions. If the tree is used as a directed tree, then
the delay constraint applies in the direction of the tree. If it
is not possible to meet the delay constraint specified by the
Topology sub-TLV, then no tree is installed but a management
report is generated.
6.3. Bandwidth Constraint Sub-TLV
The Bandwidth Constraint sub-TLV MAY be included in a Topology sub-
TLV (Section 6.1) in order to specify how much available bandwidth is
to be provided by the constrained tree. Each loose hop MUST meet the
bandwidth constraint. The bandwidth value of the constraint is a
total value or it only refers to a single PCP as specified by the
sub-TLV. Figure 4 shows the format of the Bandwidth Constraint sub-
TLV.
Farkas, et al. Standards Track [Page 19]
^L
RFC 7813 IS-IS PCR June 2016
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| Type | (1 byte)
+-+-+-+-+-+-+-+-+
| Length | (1 byte)
+-+-+-+-+-+-+-+-+
| PCP |D|P| Res | (1 byte)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Available Bandwidth (4 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: Bandwidth Constraint Sub-TLV
The parameters of the bandwidth constraint are encoded as follows:
a. Type (8 bits): The type of the sub-TLV, its value is 23.
b. Length (8 bits): The total number of bytes contained in the Value
field. The value of the Length field is 5 bytes.
c. PCP (4 bits): The Priority Code Point (PCP) parameter identifies
the traffic class the Available Bandwidth parameter refers to, if
any.
d. DEI (D) (1 bit): This is the Drop Eligible Indicator (DEI)
parameter. If the DEI parameter is clear, then the bandwidth
constraint refers to committed information rate. If the DEI
parameter is set, then the bandwidth constraint refers to the
peak information rate.
e. PCP (P) flag (1 bit): If this flag is set, then the PCP parameter
is taken into account.
f. Reserved (Res) (3 bits): The reserved bits MUST be set to 0 on
transmission, and the value MUST be ignored on reception.
g. Available Bandwidth (32 bits): The Available Bandwidth is
specific to the traffic class identified by the PCP parameter if
the PCP flag is set; otherwise, it is total bandwidth. In line
with the bandwidth parameters specified in [RFC5305], the
Available Bandwidth is encoded as a 32-bit IEEE floating-point
number [IEEE754], and the units are bytes (not bits!) per second.
When the Unreserved Bandwidth sub-TLV (sub-TLV type 11 specified
by [RFC5305]) is used in a Layer 2 bridge network, the priority
value encoded in the Unreserved Bandwidth sub-TLV provides the
PCP, i.e., identifies a traffic class (not a setup priority
level). Thus, the Available Bandwidth of a traffic class is
Farkas, et al. Standards Track [Page 20]
^L
RFC 7813 IS-IS PCR June 2016
easily comparable with the Unreserved Bandwidth stored in the TED
for the given traffic class. The bandwidth constraint applies
for both directions in case of symmetric explicit trees.
Nevertheless, a VID associated with an explicit tree can be made
unidirectional by means of the T/R flags belonging to the VID in
the Hop sub-TLV (item g. in Section 6.2) of the Edge Bridges. If
all the VIDs of the Topology sub-TLV (Section 6.1) are
unidirectional and all belong to the traffic class identified by
the PCP parameter of the Bandwidth Constraint sub-TLV, then it is
enough to meet the bandwidth constraint in the direction applied
for those VIDs.
6.4. Bandwidth Assignment Sub-TLV
IS-IS PCR MAY be used for recording bandwidth assignment for
explicitly placed data traffic in a domain if MSRP is not used within
the domain. If MSRP is used in a domain, then only MSRP performs
reservations and IS-IS does not. Both MSRP and IS-IS MUST NOT be
used to make bandwidth assignments in the same domain.
The Bandwidth Assignment sub-TLV can be used to define the amount of
bandwidth whose assignment is to be recorded by IS-IS PCR at each hop
of the explicit tree described by the corresponding Topology sub-TLV
(Section 6.1). The Bandwidth Assignment sub-TLV is used by IS-IS PCR
for the recording of bandwidth assignment for a traffic class
identified by the PCP parameter of a VLAN tag. If precedence order
has to be determined among bandwidth assignments in a domain with
multiple PCEs, then IS-IS PCR does it as described below. If the
bandwidth assignment specified by the Topology sub-TLV is not
possible, e.g., due to overbooking, then bandwidth recording MUST NOT
be performed and a management report is generated. If the Topology
sub-TLV specifies a new valid explicit tree, then the tree is
installed without bandwidth assignment. The Bandwidth Assignment
sub-TLV is conveyed by a Topology sub-TLV (Section 6.1). Figure 5
shows the format of the Bandwidth Assignment sub-TLV.
Farkas, et al. Standards Track [Page 21]
^L
RFC 7813 IS-IS PCR June 2016
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| Type | (1 byte)
+-+-+-+-+-+-+-+-+
| Length | (1 byte)
+-+-+-+-+-+-+-+-+
| PCP |D| Imp |R| (1 byte)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Bandwidth (4 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5: Bandwidth Assignment Sub-TLV
The parameters of the bandwidth assignment are encoded as follows:
a. Type (8 bits): The type of the sub-TLV, its value is 24.
b. Length (8 bits): The total number of bytes contained in the Value
field. The value of the Length field is 5 bytes.
c. PCP (3 bits): The PCP parameter identifies the traffic class for
which the bandwidth is to be assigned.
d. DEI (D) (1 bit): This is the Drop Eligible Indicator (DEI)
parameter. If the DEI parameter is clear, then the bandwidth
assignment is performed for providing the committed information
rate. If the DEI parameter is set, then the bandwidth assignment
is performed for providing the peak information rate.
e. Importance (Imp) (3 bits): This is the Importance parameter for
determining precedence order among bandwidth assignments within a
PCP as described below. A lower numerical value indicates more
important bandwidth assignment within a PCP. The default value
of the Importance parameter is 7.
f. Reserved (R) (1 bit): The reserved bit MUST be set to 0 on
transmission, and the value MUST be ignored on reception.
g. Bandwidth (32 bits): This is the amount of bandwidth to be
assigned for the traffic class identified by the PCP parameter.
In line with the bandwidth values specified in [RFC5305], the
Bandwidth parameter is encoded as a 32-bit IEEE floating-point
number [IEEE754], and the units are bytes (not bits!) per second.
The bandwidth assignment applies for both directions in case of
symmetric explicit trees.
Farkas, et al. Standards Track [Page 22]
^L
RFC 7813 IS-IS PCR June 2016
The PCEs are collectively responsible for making a consistent set of
bandwidth assignments when IS-IS PCR is used for recording bandwidth
allocations. If, despite that, precedence ordering is required among
bandwidth assignments, then ordering based on the following
parameters MUST be applied:
1. PCP parameter of Bandwidth Assignment sub-TLV,
2. Importance parameter of Bandwidth Assignment sub-TLV,
3. Timestamp sub-TLV (if present in the Topology sub-TLV).
A bandwidth assignment takes precedence if it has a higher PCP, or a
higher Importance within a PCP, or an earlier timestamp in case of
equal Importance within a PCP. A bandwidth assignment associated
with a timestamp takes precedence over a bandwidth assignment without
a timestamp when PCP and Importance of different bandwidth
assignments are both equal. If resolution is not possible based on
the above parameters or they are not available, e.g., each bandwidth
assignment lacks a timestamp or the precedence order has to be
determined for the use of a VID, then the item is granted to the PCE
whose LSP has the numerically lowest LSP ID.
6.5. Timestamp Sub-TLV
The Timestamp sub-TLV MAY be included in a Topology sub-TLV
(Section 6.1) in order to provide precedence order among equally
important bandwidth assignments within a PCP as described in
Section 6.4. Figure 6 shows the format of the Timestamp sub-TLV.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| Type | (1 byte)
+-+-+-+-+-+-+-+-+
| Length | (1 byte)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Time (4 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 6: Timestamp Sub-TLV
The timestamp represents a positive time with respect to the
Precision Time Protocol (PTP) epoch, and it is encoded as follows:
a. Type (8 bits): The type of the sub-TLV; its value is 25.
Farkas, et al. Standards Track [Page 23]
^L
RFC 7813 IS-IS PCR June 2016
b. Length (8 bits): The total number of bytes contained in the Value
field. The value of the Length field is 4 bytes.
c. Time (32 bits): This is the time in units of seconds with respect
to the PTP epoch.
The Timestamp sub-TLV carries the seconds portion of PTP as specified
by [IEEE1588]. The epoch is 1970-01-01 00:00:00 TAI (i.e., the PTP
time does not include leap seconds).
7. MRT-FRR Application
The application of MRT by [IEEE8021Qca] is discussed in detail in
[MRT-IEEE8021qca]. This section describes some special
considerations for the use of the MRT Lowpoint algorithm [RFC7811],
which are applicable both to the MRT ECT Algorithm and the MRTG ECT
Algorithm. This section also explains details related to the MRTG
ECT Algorithm and the application of the Topology sub-TLV in
particular.
IS-IS PCR does not use the MRT Profile specified in [RFC7812]. IS-IS
PCR only relies on the algorithm specification in [RFC7811]. Both
the MRT ECT Algorithm and the MRTG ECT Algorithm use the MRT Lowpoint
algorithm specified in [RFC7811].
The SPB Link Metric sub-TLV [RFC6329] specifies the metric of each
link for IS-IS PCR including the MRT algorithms. If the SPB Link
Metric values advertised by different ends of an adjacency are
different, then the maximum value MUST be used. If equal cost
(sub-)paths are found during the MRT computation, then the default
tie-breaking specified by Section 11 of [RFC6329] MUST be used, which
is based on the lower BridgeID. (The BridgeID is an 8-byte quantity
whose upper 2 bytes are the node's BridgePriority and lower 6 bytes
are the node's System ID.) Note that if MRTs are used for source-
specific multicast (see [IEEE8021Qca] for details), then the bridges
have to compute the MRTs of the other bridges in addition to their
own in order to be able to install the appropriated FDB entries.
(This is similar to the need for all pairs shortest path computation
instead of Dijkstra for source-specific shortest path multicast
trees.)
The GADAG is identical for all the MRTs within a network domain, as a
consequence of the use of the MRT Lowpoint algorithm [RFC7811].
Therefore, it is beneficial to compute the GADAG by a single entity,
which is referred to as the GADAG Computer and is either a PCE or the
GADAG Root. If the MRTG ECT Algorithm is applied, then the GADAG
MUST be computed only by the GADAG Computer, which then MUST flood
Farkas, et al. Standards Track [Page 24]
^L
RFC 7813 IS-IS PCR June 2016
the descriptor Topology sub-TLV of the GADAG. The bridges then
compute the MRTs based on the received GADAG.
The GADAG computation requires the selection of the GADAG Root. The
bridge with the best BridgeID MUST be selected as the GADAG Root,
where the numerically lower value indicates the better identifier.
The Bridge Priority component of the BridgeID allows the
configuration of the GADAG Root by management action. The Bridge
Priority is conveyed by the SPB Instance sub-TLV [RFC6329].
The GADAG Computer MUST perform the GADAG computation as specified by
the MRT Lowpoint algorithm [RFC7811]. The GADAG Computer then MUST
encode the GADAG in a Topology sub-TLV (Section 6.1), which is then
flooded throughout the domain. A GADAG is encoded in a Topology sub-
TLV by means of directed ear decomposition as follows. A directed
ear is a directed point-to-point path whose end points can coincide
but no other element of the path is repeated in the ear. Each ear is
specified by an ordered list of hops such that the order of hops is
according to the direction of the arcs in the GADAG. There are no
leaves in a GADAG; hence, the Leaf flag (item c.5. in Section 6.2) is
used to mark the end of a topology block. (A GADAG with multiple
blocks is illustrated in Figure 8.) The sequence of ears in the
Topology sub-TLV is such that the end points of an ear belong to
preceding ears. The GADAG Root is not marked by any flag, but the
GADAG Root is the first hop in the Topology sub-TLV; correspondingly,
the first ear starts and ends with the GADAG Root. MRT Roots MUST be
marked by the Root flag (item c.4. in Section 6.2) and all other Edge
Bridges are leaves of the given MRTs. If no MRT Root is specified,
then each SPT Root is also an MRT Root.
Figure 7 shows an example GADAG. The figure also illustrates the
description of the GADAG; it shows the System ID parameter of the Hop
sub-TLV (Section 6.2) and the order of hops in the Topology sub-TLV
(Section 6.1).
Farkas, et al. Standards Track [Page 25]
^L
RFC 7813 IS-IS PCR June 2016
Leaf
Hop flag
+-----------+---+
| A | |
+-----------+---+
| B | |
+-----------+---+
| C | |
+-----------+---+
| F | |
[B]<---[A]<---[I] +-----------+---+
| ^ ^ | A | |
| | | +-----------+---+
V | | | C | |
[C]--->[F]--->[H] +-----------+---+
| ^ | D | |
| | +-----------+---+
V | | E | |
[D]--->[E]--->[G] +-----------+---+
| G | |
+-----------+---+
| H | |
+-----------+---+
| I | |
+-----------+---+
| A | |
+-----------+---+
| F | |
+-----------+---+
| H | X |
+-----------+---+
Figure 7: A GADAG and Its Description; GADAG Root = Node A
A topology can comprise multiple blocks, like the one illustrated in
Figure 8(a). This example topology comprises four blocks as each
cut-link is a block. A-B-C-D-E-F is a block, D-G is another block,
G-H, and H-J-K are further blocks. A GADAG for this topology is
shown in Figure 8(b). Note that two arcs with opposite directions
represent a cut-link in a GADAG; see, for example, the cut-link
between D and G. The encoding starts with the block (ADAG) involving
the GADAG Root as illustrated in Figure 8. The first hop in the
Topology sub-TLV is the GADAG Root (node A in this example). The
ADAG of the first block is then described using the ear
decomposition, as described above. In this example, the first block
has been completely traversed at the second occurrence of node A in
the GADAG descriptor. The end of a block is indicated by setting the
Leaf flag for the last hop of the block, e.g., for the second
Farkas, et al. Standards Track [Page 26]
^L
RFC 7813 IS-IS PCR June 2016
occurrence of node A in the example GADAG descriptor. The next node
that appears in the GADAG descriptor (D in this case) is the
localroot for the nodes in the next block. Continuing this process,
the Leaf flag is set for the third occurrence of D, the third
occurrence of G, and the third occurrence of H, each indicating the
end of a block. The first hop of the first block is the GADAG Root,
the fist hop in the rest of the blocks is the localroot. The
position of the set Leaf flags helps to determine the localroot,
which is the next hop. In the example GADAG descriptor, one can
determine that A is the localroot for B, C, D, E, F (and A is the
GADAG Root). D is the localroot for G. G is the localroot for H.
And H is the localroot for J and K. The GADAG Root is assigned a
localroot of None.
Block IDs are reconstructed while parsing a Topology sub-TLV
specifying a GADAG. The current Block ID starts at 0 and is assigned
to the GADAG Root. A node appearing in the GADAG descriptor without
a previously assigned Block ID value is assigned the current Block
ID. And the current Block ID is incremented by 1 after processing
the localroot of a block. Note that the localroot of a block will
keep the Block ID of the first block in which it is assigned a Block
ID. In the example in Figure 8, A has Block ID=0. B, C, D, E, and F
have Block ID=1. G has Block ID=2. H has Block ID=3. J and K have
Block ID=4.
Farkas, et al. Standards Track [Page 27]
^L
RFC 7813 IS-IS PCR June 2016
Leaf
Hop flag
[F]--[E] +--[K] +-----------+---+
| | | | | A | |
| | | | +-----------+---+
[A] [D]--[G]--[H] | | B | |
| | | | +-----------+---+
| | | | | C | |
[B]--[C] +--[J] +-----------+---+
| D | |
(a) Topology +-----------+---+
| E | |
+-----------+---+
| F | |
+-----------+---+
| A | X |
+-----------+---+
+-+ +-+ +-+ | D | |
|F|<-|E| +--|K| +-----------+---+
+-+ +-+ | +-+ | G | |
| ^ | ^ +-----------+---+
| | V | | D | X |
V +-+ +-+ +-+ | +-----------+---+
+-+ | |->| |->| | | | G | |
|A| |D| |G| |H| | +-----------+---+
+-+ | |<-| |<-| | | | H | |
| +-+ +-+ +-+ | +-----------+---+
| ^ | | | G | X |
V | | | +-----------+---+
+-+ +-+ | +-+ | H | |
|B|->|C| +->|J| +-----------+---+
+-+ +-+ +-+ | J | |
+-----------+---+
(b) GADAG | K | |
+-----------+---+
| H | X |
+-----------+---+
(c) GADAG Descriptor
Figure 8: A GADAG with Cut-Links and Its Description; GADAG Root =
Node A
Farkas, et al. Standards Track [Page 28]
^L
RFC 7813 IS-IS PCR June 2016
8. Summary
This document specifies IS-IS sub-TLVs for the control of explicit
trees in Layer 2 networks. These sub-TLVs can be also used for the
distribution of a centrally computed GADAG or MRTs if MFT-FRR is
used.
9. IANA Considerations
This document defines the following IS-IS sub-TLVs within the
MT-Capability TLV (type 144). They are listed in the "IS-IS TLV
Codepoints" registry.
Type Description Length
---- ---------------------------- --------
21 Topology variable
22 Hop variable
23 Bandwidth Constraint 5
24 Bandwidth Assignment 5
25 Timestamp 4
10. Security Considerations
This document adds no additional security risks to IS-IS, nor does it
provide any additional security for IS-IS when used in a configured
environment or a single-operator domain such as a data center. IS-IS
PCR is not for zero-configuration environments.
Any mechanism that chooses forwarding paths, and allocates resources
to those paths, is potentially vulnerable to attack. The security
considerations section of [RFC4655] describes the risks associated
with the use of PCE for this purpose and should be referred to. Use
of any other means to determine paths should only be used after
considering similar concerns.
Because the mechanism assumed for distributing tree information
relies on IS-IS routing, IS-IS routing security considerations
(Section 6, [RFC1195]) and mechanisms (e.g., [RFC5310]) used to
authenticate peer advertisements apply.
Farkas, et al. Standards Track [Page 29]
^L
RFC 7813 IS-IS PCR June 2016
11. References
11.1. Normative References
[IEEE8021Qca]
IEEE, "IEEE Standard for Local and metropolitan area
networks - Bridges and Bridged Networks - Amendment 24:
Path Control and Reservation", IEEE 802.1Qca-2015,
DOI 10.1109/IEEESTD.2016.7434544, 2016,
<https://standards.ieee.org/findstds/
standard/802.1Qca-2015.html>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC5303] Katz, D., Saluja, R., and D. Eastlake 3rd, "Three-Way
Handshake for IS-IS Point-to-Point Adjacencies", RFC 5303,
DOI 10.17487/RFC5303, October 2008,
<http://www.rfc-editor.org/info/rfc5303>.
[RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic
Engineering", RFC 5305, DOI 10.17487/RFC5305, October
2008, <http://www.rfc-editor.org/info/rfc5305>.
[RFC5307] Kompella, K., Ed. and Y. Rekhter, Ed., "IS-IS Extensions
in Support of Generalized Multi-Protocol Label Switching
(GMPLS)", RFC 5307, DOI 10.17487/RFC5307, October 2008,
<http://www.rfc-editor.org/info/rfc5307>.
[RFC6329] Fedyk, D., Ed., Ashwood-Smith, P., Ed., Allan, D., Bragg,
A., and P. Unbehagen, "IS-IS Extensions Supporting IEEE
802.1aq Shortest Path Bridging", RFC 6329,
DOI 10.17487/RFC6329, April 2012,
<http://www.rfc-editor.org/info/rfc6329>.
[RFC7810] Previdi, S., Ed., Giacalone, S., Ward, D., Drake, J., and
Q. Wu, "IS-IS Traffic Engineering (TE) Metric Extensions",
RFC 7810, DOI 10.17487/RFC7810, May 2016,
<http://www.rfc-editor.org/info/rfc7810>.
[RFC7811] Enyedi, G., Csaszar, A., Atlas, A., Bowers, C., and A.
Gopalan, "An Algorithm for Computing IP/LDP Fast Reroute
Using Maximally Redundant Trees (MRT-FRR)", RFC 7811,
DOI 10.17487/RFC7811, June 2016,
<http://www.rfc-editor.org/info/rfc7811>.
Farkas, et al. Standards Track [Page 30]
^L
RFC 7813 IS-IS PCR June 2016
11.2. Informative References
[IEEE1588] IEEE, "IEEE Standard for a Precision Clock Synchronization
Protocol for Networked Measurement and Control Systems",
IEEE 1588-2008, DOI 10.1109/IEEESTD.2008.4579760, 2008,
<http://standards.ieee.org/findstds/
standard/1588-2008.html>.
[IEEE754] IEEE, "IEEE Standard for Floating-Point Arithmetic",
IEEE 754-2008, DOI 10.1109/IEEESTD.2008.4610935, 2008,
<http://standards.ieee.org/findstds/
standard/754-2008.html>.
[IEEE8021aq]
IEEE, "IEEE Standard for Local and metropolitan area
networks -- Media Access Control (MAC) Bridges and Virtual
Bridged Local Area Networks -- Amendment 20: Shortest Path
Bridging", IEEE 802.1aq-2012,
DOI 10.1109/IEEESTD.2012.6231597, 2012,
<https://standards.ieee.org/findstds/
standard/802.1aq-2012.html>.
[IEEE8021Q]
IEEE, "IEEE Standard for Local and metropolitan area
networks--Bridges and Bridged Networks", IEEE 802.1Q-2014,
DOI 10.1109/IEEESTD.2014.6991462, 2014,
<https://standards.ieee.org/findstds/
standard/802.1Q-2014.html>.
[MRT-IEEE8021qca]
Bowers, C. and J. Farkas, "Applicability of Maximally
Redundant Trees to IEEE 802.1Qca Path Control and
Reservation", Work in Progress, draft-bowers-rtgwg-mrt-
applicability-to-8021qca-01, July 2015.
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, DOI 10.17487/RFC1195,
December 1990, <http://www.rfc-editor.org/info/rfc1195>.
[RFC4655] Farrel, A., Vasseur, J., and J. Ash, "A Path Computation
Element (PCE)-Based Architecture", RFC 4655,
DOI 10.17487/RFC4655, August 2006,
<http://www.rfc-editor.org/info/rfc4655>.
[RFC5310] Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
and M. Fanto, "IS-IS Generic Cryptographic
Authentication", RFC 5310, DOI 10.17487/RFC5310, February
2009, <http://www.rfc-editor.org/info/rfc5310>.
Farkas, et al. Standards Track [Page 31]
^L
RFC 7813 IS-IS PCR June 2016
[RFC7812] Atlas, A., Bowers, C., and G. Enyedi, "An Architecture for
IP/LDP Fast Reroute Using Maximally Redundant Trees (MRT-
FRR)", RFC 7812, DOI 10.17487/RFC7812, June 2016,
<http://www.rfc-editor.org/info/rfc7812>.
Acknowledgements
The authors would like to thank Don Fedyk and Eric Gray for their
comments and suggestions.
Authors' Addresses
Janos Farkas (editor)
Ericsson
Konyves Kalman krt. 11/B
Budapest 1097
Hungary
Email: janos.farkas@ericsson.com
Nigel Bragg
Ciena
43-51 Worship Street
London EC2A 2DX
United Kingdom
Email: nbragg@ciena.com
Paul Unbehagen Jr
Avaya
1300 W. 120th Avenue
Westminster, CO 80234
United States
Email: unbehagen@avaya.com
Glenn Parsons
Ericsson
349 Terry Fox Drive
Ottawa ON, K2K 2V6
Canada
Email: glenn.parsons@ericsson.com
Farkas, et al. Standards Track [Page 32]
^L
RFC 7813 IS-IS PCR June 2016
Peter Ashwood-Smith
Huawei Technologies
303 Terry Fox Drive, Suite 400
Ottawa ON, K2K 3J1
Canada
Email: Peter.AshwoodSmith@huawei.com
Chris Bowers
Juniper Networks
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
United States
Email: cbowers@juniper.net
Farkas, et al. Standards Track [Page 33]
^L
|