One document matched: draft-ietf-isis-node-admin-tag-00.xml
<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-ietf-isis-node-admin-tag-00" ipr="trust200902">
<!-- ***** FRONT MATTER ***** -->
<front>
<title>Advertising Per-node Admin Tags in IS-IS</title>
<author initials="P." surname="Sarkar" fullname="Pushpasis Sarkar" role="editor">
<organization>Juniper Networks, Inc.</organization>
<address>
<postal>
<street>Electra, Exora Business Park</street>
<city>Bangalore</city>
<region>KA</region>
<code>560103</code>
<country>India</country>
</postal>
<email>psarkar@juniper.net</email>
</address>
</author>
<author fullname="Hannes Gredler" initials="H." surname="Gredler">
<organization>Juniper Networks, Inc.</organization>
<address>
<postal>
<street>1194 N. Mathilda Ave.</street>
<city>Sunnyvale</city>
<region>CA</region>
<code>94089</code>
<country>US</country>
</postal>
<email>hannes@juniper.net</email>
</address>
</author>
<author initials="S." surname="Hegde" fullname="Shraddha Hegde">
<organization>Juniper Networks, Inc.</organization>
<address>
<postal>
<street>Electra, Exora Business Park</street>
<city>Bangalore</city>
<region>KA</region>
<code>560103</code>
<country>India</country>
</postal>
<email>shraddha@juniper.net</email>
</address>
</author>
<author fullname="Stephane Litkowski" initials="S" surname="Litkowski">
<organization>Orange</organization>
<address>
<!-- postal><street/><city/><region/><code/><country/></postal -->
<!-- <phone/> -->
<!-- <facsimile/> -->
<email>stephane.litkowski@orange.com</email>
<!-- <uri/> -->
</address>
</author>
<author fullname="Bruno Decraene" initials="B" surname="Decraene">
<organization>Orange</organization>
<address>
<!-- postal><street/><city/><region/><code/><country/></postal -->
<!-- <phone/> -->
<!-- <facsimile/> -->
<email>bruno.decraene@orange.com</email>
<!-- <uri/> -->
</address>
</author>
<author initials="Z" surname="Li" fullname="Li Zhenbin">
<organization>Huawei Technologies</organization>
<address>
<postal>
<street>Huawei Bld. No.156 Beiqing Rd</street>
<city>Beijing</city>
<region>KA</region>
<code>100095</code>
<country>China</country>
</postal>
<!-- <phone/> -->
<!-- <facsimile/> -->
<email>lizhenbin@huawei.com</email>
<!-- <uri/> -->
</address>
</author>
<author initials="E" surname="Aries" fullname="Ebben Aries">
<organization>Facebook</organization>
<address>
<!-- postal><street/><city/><region/><code/><country/></postal -->
<!-- <phone/> -->
<!-- <facsimile/> -->
<email>exa@fb.com</email>
<!-- <uri/> -->
</address>
</author>
<author initials="R" surname="Rodriguez" fullname="Rafael Rodriguez">
<organization>Facebook</organization>
<address>
<!-- postal><street/><city/><region/><code/><country/></postal -->
<!-- <phone/> -->
<!-- <facsimile/> -->
<email>rafael@fb.com</email>
<!-- <uri/> -->
</address>
</author>
<author initials="H." surname="Raghuveer" fullname="Harish Raghuveer">
<address>
<email>harish.r.prabhu@gmail.com</email>
</address>
</author>
<date day="22" month="December" year="2014" />
<area>Routing</area>
<workgroup>IS-IS for IP Internets</workgroup>
<keyword>IGP</keyword>
<keyword>IS-IS</keyword>
<keyword>Admin-Tag</keyword>
<keyword>Traffic Engineering</keyword>
<abstract>
<t> This document describes an extension to IS-IS protocol <xref target="ISO10589"/>,
<xref target="RFC1195"/> to add an optional operational capability, that allows
tagging and grouping ofthe nodes in an IS-IS domain. This allows simple management
and easy control over route and path selection, based on local configured policies.
</t>
<t>This document describes the protocol extensions to disseminate
per-node administrative tags in IS-IS protocols.</t>
</abstract>
<note title="Requirements Language">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref
target="RFC2119">RFC 2119</xref>.</t>
</note>
</front>
<middle>
<section title="Introduction" anchor='intro'>
<t> This document provides mechanisms to advertise per-node administrative tags
in the IS-IS Link State PDU <xref target="RFC1195"/>. In certain path-selection
applications like for example in traffic-engineering or LFA <xref target="RFC5286"/>
selection there is a need to tag the nodes based on their roles in the network
and have policies to prefer or prune a certain group of nodes.
</t>
</section>
<section title='Administrative Tag'>
<t> For the purpose of advertising per-node administrative tags within IS-IS,
a new sub-TLV to the IS-IS Router Capability TLV-242 that is defined in <xref
target="RFC4971"/> is proposed. Because path selection is a functional set which
applies both to TE and non-TE applications the same has not been added as a new
sub-TLV in the Traffic Engineering TLVs <xref target="RFC5305"/>.</t>
<t> An administrative Tag is a 32-bit integer value that can be used to identify
a group of nodes in the IS-IS domain. The new sub-TLV specifies one or more
administrative tag values. An IS-IS router advertises the set of groups it is part
of in the specific IS-IS level. As an example, all PE-nodes may be configured
with certain tag value, whereas all P-nodes are configured with a different tag
value in. </t>
<t> The new sub-TLV defined will be carried inside the IS-IS Router Capability TLV-242
(defined in <xref target="RFC4971"/>) in the Link State PDUs originated by the router.
Link State PDUs <xref target="ISO10589"/> that has either level-wise (i.e. L1 or L2) or
domain-wide flooding scope. Choosing the flooding scope to flood the group tags are
defined by the needs of the operator's usage and is a matter of local policy or
configuration. </t>
<t> Operator may choose to advertise a set of per-node administrative tags across levels
and another set of per-node administrative tags within the specific level. But evidently
the same set of per-node administrative tags cannot be advertised both across levels and
within a specific level. A receiving IS-IS router will not be able to distinguish between
the significance of a per-node administrative tag advertised globally from that of a
administrative tag advertised locally if they have the same value associated but different
significance across different scopes. </t>
<t> Implementations SHOULD allow configuring one or more 'global' as well as 'level-wide'
administrative tags. A operator may only need to advertise and flood a specific per-node
administrative tag, either across all levels, or only within a specific level. Hence
implementations MUST NOT allow configuring the same per-node administrative tag values
in both 'global' and 'level-wide' scopes. However the same administrative tag value MAY be
allowed to be configured and advertised for multiple levels with 'level-wide' flooding scope. </t>
<t> The 'global' per-node administrative tags shall have significance across the entire
administrative domain and hence MUST be advertised in a Router-Capability TLV with 'global'
scope (i.e. S-bit set to 1), and inserted in the LSP PDUs generated for all levels applicable.
The 'level-wide' administrative tags should be copied in to a Router-Capability with 'level-wide'
scope only (i.e S-bit reset to 0) and copied into the LSP PDU for the specific level. </t>
<t> In deployments using multi-topology routing <xref target="RFC5120"/>, since multiple
topologies within same IS-IS level share the same flooding scope configuring the same
per-node administrative tag across different topologies, SHOULD NOT be allowed. Advertising
the same tag value across multiple topologies will lead to same inconsistencies as with
the case of advertising same tag value across 'global' and 'level-wide' flooding scope.
If there is need to distinguish between the per-node administrative tags used for one
topology to another, operators are advised to use disjoint sets of per-node administrative
tags across such topologies.</t>
</section>
<section title='TLV format'>
<section title='Per-node Admin Tag sub-TLV'>
<t>The new Per-node Administrative Tag sub-TLV, like other ISIS Capability sub-TLVs, is formatted
as Type/Length/Value (TLV)triplets. <xref target="isisadmintagtlv"/> below shows the
format of the new sub-TLV.
</t>
<figure anchor="isisadmintagtlv" title="IS-IS Per-node Administrative Tag sub-TLV">
<artwork>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Administrative Tag #1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Administrative Tag #2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// //
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Administrative Tag #N |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type : TBA
Length: A 8-bit field that indicates the length of the value
portion in octets and will be a multiple of 4 octets
dependent on the number of tags advertised.
Value: A sequence of multiple 4 octets defining the
administrative tags.
</artwork>
</figure>
<t>
The 'Per-node Admin Tag' sub-TLV may be generated more than once by an originating
router. This MAY happen if a node carries more than 63 per-node administrative groups
and a single sub-TLV does not provide sufficient space. As such occurence of the
'Per-node Admin Tag' sub-TLV does not cancel previous announcements, but rather
is cumulative.
</t>
</section>
</section>
<section title='Elements of Procedure'>
<t> Meaning of the Per-node administrative tags is generally opaque to IS-IS.
Router advertising the per-node administrative tag (or tags) may be
configured to do so without knowing (or even explicitly supporting)
functionality implied by the tag.</t>
<t> Interpretation of tag values is specific to the administrative domain
of a particular network operator. The meaning of a per-node administrative
tag is defined by the network local policy and is controlled via the
configuration. If a receiving node does not understand the tag value,
it ignores the specific tag and floods the Router Capability TLV without
any change as defined in <xref target="RFC4971"/>.</t>
<t> The semantics of the tag order has no meaning. There is no implied
meaning to the ordering of the tags that indicates a certain operation
or set of operations that need to be performed based on the ordering.</t>
<t> Each tag SHOULD be treated as an independent identifier that MAY be
used in policy to perform a policy action. Tags carried by the
administrative tag TLV SHOULD be used to indicate independent
characteristics of a node. The TLV SHOULD be considered as an unordered list.
Whilst policies may be implemented based on the presence of multiple tags
(e.g., if tag A AND tag B are present), they MUST NOT be reliant upon
the order of the tags (i.e., all policies should be considered commutative
operations, such that tag A preceding or following tag B does not change
their outcome).</t>
<t> As mentioned earlier, to avoid incomplete or inconsistent interpretations
of the per-node administrative tags the same tag value MUST NOT be advertised by a
router in Router Capabilities of different scopes. Implementations MUST
NOT allow configuring the same tag value across domain-wide and 'level-wide'
scopes. The same tag value MAY be allowed to be configured and advertised
under 'level-wide' scope for all levels. A IS-IS Area Border Routers (ABR)
participating in both levels 1 and 2 MAY advertise the same tag value in
the level-specific Router Capability TLVs with 'level-wide' scope (S-bit reset to 0)
generated by it. But the same tag value MUST not be advertised in any of
level 1 or level 2 Router-Capability TLV with 'global' scope (S-bit set to 1).</t>
<t> The per-node administrative tags are not meant to be extended by the
future IS-IS standards. The new IS-IS extensions MUST NOT require use
of per-node administrative tags or define well-known tag values.
Per-node administrative tags are for generic use and do not require IANA
registry. The future IS-IS extensions requiring well known values MAY
use new Capability sub-TLVs tailored to the needs of the feature, as
defined in <xref target="RFC4971"/>.</t>
<t> Being part of the Router Capability TLV, the per-node administrative tag
sub-TLV MUST be reasonably small and stable. In particular, but not
limited to, implementations supporting the per-node administrative tags
MUST NOT tie advertised tags to changes in the network topology (both within
and outside the IS-IS domain) or reachability of routes.</t>
</section>
<section title='Applications'>
<t>This section lists several examples of how implementations
might use the Per-node administrative tags. These examples are
given only to demonstrate generic usefulness of the router
tagging mechanism. Implementation supporting this
specification is not required to implement any of the use
cases. It is also worth noting that in some described use
cases routers configured to advertise tags help other routers
in their calculations but do not themselves implement the
same functionality.
<list style="numbers">
<t>Auto-discovery of Services
<vspace blankLines="1"/>
Router tagging may be used to automatically discover
group of routers sharing a particular service.
<vspace blankLines="1"/>
For example, service provider might desire to establish
full mesh of MPLS TE tunnels between all PE routers in
the area of MPLS VPN network. Marking all PE routers with
a tag and configuring devices with a policy to create
MPLS TE tunnels to all other devices advertising this tag
will automate maintenance of the full mesh. When new PE
router is added to the area, all other PE devices will
open TE tunnels to it without the need of reconfiguring
them.
</t>
<t>Policy-based Fast-Reroute
<vspace blankLines="1"/>
Increased deployment of Loop Free Alternates (LFA) as
defined in <xref target="RFC5286"/> poses operation and
management challenges. <xref target="I-D.ietf-rtgwg-lfa-manageability"/>
proposes policies which, when implemented, will ease LFA
operation concerns.
<vspace blankLines="1"/>
One of the proposed refinements is to be able to group
the nodes in IGP domain with administrative tags and
engineer the LFA based on configured policies.
<list style="format (%c)" hangIndent="4">
<t>Administrative limitation of LFA scope
<vspace blankLines="1"/>
Service provider access infrastructure is frequently
designed in layered approach with each layer of
devices serving different purposes and thus having
different hardware capabilities and configured
software features. When LFA repair paths are being
computed, it may be desirable to exclude devices from
being considered as LFA candidates based on their
layer.
<vspace blankLines="1"/>
For example, if the access infrastructure is divided
into the Access, Distribution and Core layers it may
be desirable for a Distribution device to compute LFA
only via Distribution or Core devices but not via
Access devices. This may be due to features enabled
on Access routers; due to capacity limitations or due
to the security requirements. Managing such a policy
via configuration of the router computing LFA is
cumbersome and error prone.
<vspace blankLines="1"/>
With the Per-node administrative tags it is possible to
assign a tag to each layer and implement LFA policy
of computing LFA repair paths only via neighbors
which advertise the Core or Distribution tag. This
requires minimal per-node configuration and network
automatically adapts when new links or routers are
added.
</t>
<t>Optimizing LFA calculations
<vspace blankLines="1"/>
Calculation of LFA paths may require significant
resources of the router. One execution of Dijkstra
algorithm is required for each neighbor eligible to
become next hop of repair paths. Thus a router with a
few hundreds of neighbors may need to execute the
algorithm hundreds of times before the best (or even
valid) repair path is found. Manually excluding from
the calculation neighbors which are known to provide
no valid LFA (such as single-connected routers) may
significantly reduce number of Dijkstra algorithm
runs.
<vspace blankLines="1"/>
LFA calculation policy may be configured so that
routers advertising certain tag value are excluded
from LFA calculation even if they are otherwise
suitable.
</t>
</list>
</t>
<t>Controlling Remote LFA tunnel termination
<vspace blankLines="1"/>
<xref target="I-D.ietf-rtgwg-remote-lfa"/> proposed
method of tunneling traffic after connected link failure
to extend the basic LFA coverage and algorithm to find
tunnel tail-end routers fitting LFA requirement. In most
cases proposed algorithm finds more than one candidate
tail-end router. In real life network it may be desirable
to exclude some nodes from the list of candidates based
on the local policy. This may be either due to known
limitations of the per-node (the router does accept targeted
LDP sessions required to implement Remote LFA tunneling)
or due to administrative requirements (for example, it
may be desirable to choose tail-end router among
co-located devices).
<vspace blankLines="1"/>
The Per-node administrative tag delivers simple and scalable
solution. Remote LFA can be configured with a policy to
accept during the tail-end router calculation as
candidates only routers advertising certain tag. Tagging
routers allows to both exclude nodes not capable of
serving as Remote LFA tunnel tail-ends and to define a
region from which tail-end router must be selected.
</t>
<t>Mobile backhaul network service deployment
<vspace blankLines="1"/>
The topology of mobile backhaul network usually adopts ring topology
to save fiber resource and it is divided into the aggregate network and
the access network. Cell Site Gateways(CSGs) connects the eNodeBs and
RNC(Radio Network Controller) Site Gateways(RSGs)connects the RNCs.
The mobile traffic is transported from CSGs to RSGs. The network takes
a typical aggregate traffic model that more than one access rings will
attach to one pair of aggregate site gateways(ASGs) and more than one
aggregate rings will attach to one pair of RSGs.
<vspace blankLines="1"/>
<figure anchor="mobile-backhaul-network" title="Mobile Backhaul Network">
<artwork>
----------------
/ \
/ \
/ \
+------+ +----+ Access +----+
|eNodeB|---|CSG1| Ring 1 |ASG1|-------------
+------+ +----+ +----+ \
\ / \
\ / +----+ +---+
\ +----+ |RSG1|----|RNC|
-------------| | Aggregate +----+ +---+
|ASG2| Ring |
-------------| | +----+ +---+
/ +----+ |RSG2|----|RNC|
/ \ +----+ +---+
/ \ /
+------+ +----+ Access +----+ /
|eNodeB|---|CSG2| Ring 2 |ASG3|------------
+------+ +----+ +----+
\ /
\ /
\ /
-----------------
</artwork>
</figure>
<vspace blankLines="1"/>
A typical mobile backhaul network with access rings and aggregate
links is shown in figure above. The mobile backhaul networks deploy
traffic engineering due to the strict Service Level Agreements(SLA).
The TE paths may have additional constraints to avoid passing via different
access rings or to get completely disjoint backup TE paths. The mobile backhaul
networks towards the access side change frequently due to the growing mobile
traffic and addition of new eNodeBs. It's complex to satisfy the requirements
using cost, link color or explicit path configurations.
The per-node administrative tag defined in this document can be effectively used
to solve the problem for mobile backhaul networks. The nodes in different rings
can be assigned with specific tags. TE path computation can be enhanced to
consider additional constraints based on per-node administrative tags. </t>
<t>Policy-based Explicit Routing
<vspace blankLines="1"/>
Partially meshed network provides multiple paths between any two
nodes in the network. In a data center environment, the topology
is usually highly symmetric with many/all paths having equal
cost. In a long distance network, this is usually less the case
for a variety of reasons (e.g. historic, fiber availability
constraints, different distances between transit nodes, different
roles ...). Hence between a given source and destination, a path
is typically preferred over the others, while between the same
source and another destination, a different path may be
preferred.
<vspace blankLines="1"/>
<figure anchor="Explicit_routing_topology" title="Explicit Routing topology">
<artwork>
+--------------------+
| |
| +----------+ |
| | | |
T-10-T | |
/| /| | |
/ | / | | |
--+ | | | | |
/ +--+-+ 100 | |
/ / | | | |
/ / R-18-R | |
/ / /\ /\ | |
/ | / \ / \ | |
/ | / x \ | |
A-25-A 10 10 \ \ | |
/ / 10 10 | |
/ / \ \ | |
A-25-A A-25-A | |
\ \ / / | |
201 201 201 201 | |
\ \ / / | |
\ x / | |
\ / \ / | |
\/ \/ | |
I-24-I 100 100
| | | |
| +-----------+ |
| |
+---------------------+
</artwork>
</figure>
<vspace blankLines="1"/>
In the above topology, operator may want to enforce the following high level explicitly
routed policies: - Traffic from A nodes to A nodes must not go through I nodes - Traffic
from A nodes to I nodes must not go through R and T nodes with per-node administrative
tag, tag A can be configured on all A nodes, (similarly I, R, T), and then configure this
single CSPF policy on all A nodes to avoid I nodes for path calculation.
</t>
</list>
</t>
</section>
<section title='Security Considerations' anchor='sec-con'>
<t>
This document does not introduce any further security issues other than those discussed
in <xref target="ISO10589"/> and <xref target="RFC1195"/>.
</t>
</section>
<section anchor="IANA" title="IANA Considerations">
<t>IANA maintains the registry for the Router Capability sub-TLVs. IS-IS Administrative Tags
will require new type code for the following new sub-TLV defined in this document.
<vspace blankLines="1"/>
i) Per-Node-Admin-Tag Sub-TLV, Type: TBD
<vspace blankLines="1"/>
</t>
</section>
<section title='Acknowledgments'>
<t>Many thanks to Les Ginsberg, Dhruv Dhody, Uma Chunduri for useful inputs.
Thanks to Chris Bowers for providing useful inputs to remove ambiguity related
to tag-ordering.</t>
</section>
</middle>
<back>
<references title='Normative References'>
<?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
<reference anchor="ISO10589">
<front>
<title>Intermediate system to Intermediate system intra-domain
routeing information exchange protocol for use in conjunction with
the protocol for providing the connectionless-mode Network Service
(ISO 8473), ISO/IEC 10589:2002, Second Edition.</title>
<author fullname="ISO "International Organization for Standardization""/>
<date month="Nov" year="2002"/>
</front>
</reference>
</references>
<references title='Informative References'>
<?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.1195.xml"?>
<?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4971.xml"?>
<?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5120.xml"?>
<?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5286.xml"?>
<?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5305.xml"?>
<?rfc include="http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-rtgwg-remote-lfa-09.xml"?>
<?rfc include="http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-rtgwg-lfa-manageability-04.xml"?>
</references>
</back>
</rfc>
| PAFTECH AB 2003-2026 | 2026-04-23 21:40:17 |