rfc9855v2.txt | rfc9855.txt | |||
---|---|---|---|---|
skipping to change at line 193 ¶ | skipping to change at line 193 ¶ | |||
By utilizing SR, TI-LFA eliminates the need to establish Targeted | By utilizing SR, TI-LFA eliminates the need to establish Targeted | |||
Label Distribution Protocol sessions with remote nodes for leveraging | Label Distribution Protocol sessions with remote nodes for leveraging | |||
the benefits of Remote Loop-Free Alternates (RLFAs) [RFC7490] | the benefits of Remote Loop-Free Alternates (RLFAs) [RFC7490] | |||
[RFC7916] or Directed Loop-Free Alternates (DLFAs) [RFC5714]. All | [RFC7916] or Directed Loop-Free Alternates (DLFAs) [RFC5714]. All | |||
the Segment Identifiers (SIDs) required are present within the Link | the Segment Identifiers (SIDs) required are present within the Link | |||
State Database (LSDB) of the IGP. Consequently, there is no longer a | State Database (LSDB) of the IGP. Consequently, there is no longer a | |||
necessity to prefer LFAs over RLFAs or DLFAs, nor is there a need to | necessity to prefer LFAs over RLFAs or DLFAs, nor is there a need to | |||
minimize the number of RLFA or DLFA repair nodes. | minimize the number of RLFA or DLFA repair nodes. | |||
Utilizing SR makes the requirement unnecessary to establish an | Utilizing SR also eliminates the need to establish an additional | |||
additional state within the network for enforcing explicit Fast | state within the network for enforcing explicit Fast Reroute (FRR) | |||
Reroute (FRR) paths. This spares the nodes from maintaining a | paths. This spares the nodes from maintaining a supplementary state | |||
supplementary state and frees the operator from the necessity to | and frees the operator from the necessity to implement additional | |||
implement additional protocols or protocol sessions solely to augment | protocols or protocol sessions solely to augment protection coverage. | |||
protection coverage. | ||||
TI-LFA also brings the benefit of the ability to provide a backup | TI-LFA also brings the benefit of the ability to provide a backup | |||
path that follows the expected post-convergence path considering a | path that follows the expected post-convergence path considering a | |||
particular failure, which reduces the need of locally configured | particular failure, which reduces the need of locally configured | |||
policies that influence the backup path selection [RFC7916]. The | policies that influence the backup path selection [RFC7916]. The | |||
easiest way to express the expected post-convergence path in a loop- | easiest way to express the expected post-convergence path in a loop- | |||
free manner is to encode it as a list of adjacency segments. | free manner is to encode it as a list of adjacency segments. | |||
However, this may create a long segment list that some hardware may | However, this may create a long segment list that some hardware may | |||
not be able to program. One of the challenges of TI-LFA is to encode | not be able to program. One of the challenges of TI-LFA is to encode | |||
the expected post-convergence path by combining adjacency segments | the expected post-convergence path by combining adjacency segments | |||
skipping to change at line 228 ¶ | skipping to change at line 227 ¶ | |||
* Section 2 defines the main notations used in the document. They | * Section 2 defines the main notations used in the document. They | |||
are in line with [RFC5714]. | are in line with [RFC5714]. | |||
* Section 3 defines the main principles of TI-LFA backup path | * Section 3 defines the main principles of TI-LFA backup path | |||
computation. | computation. | |||
* Section 4 suggests to compute the P-Space and Q-Space properties | * Section 4 suggests to compute the P-Space and Q-Space properties | |||
defined in Section 2 for the specific case of nodes lying over the | defined in Section 2 for the specific case of nodes lying over the | |||
post-convergence paths towards the protected destinations. | post-convergence paths towards the protected destinations. | |||
* Using the properties defined in Section 4, Section 5 describes how | * Section 5 describes how to compute protection lists that encode a | |||
to compute protection lists that encode a loop-free post- | loop-free post-convergence path towards the destination using the | |||
convergence path towards the destination. | properties defined in Section 4 | |||
* Section 6 defines the segment operations to be applied by the PLR | * Section 6 defines the segment operations to be applied by the PLR | |||
to ensure consistency with the forwarding state of the repair | to ensure consistency with the forwarding state of the repair | |||
node. | node. | |||
* Section 7 discusses aspects that are specific to the dataplane. | * Section 7 discusses aspects that are specific to the dataplane. | |||
* Section 8 discusses the relationship between TI-LFA and the SR | * Section 8 discusses the relationship between TI-LFA and the SR | |||
algorithm. | algorithm. | |||
* Certain considerations are needed when adjacency segments are used | * Section 9 provides an overview of the certain considerations that | |||
in a repair list. Section 9 provides an overview of these | are needed when adjacency segments are used in a repair list. | |||
considerations. | ||||
* Section 10 discusses security considerations. | * Section 10 discusses security considerations. | |||
* Appendix A highlights advantages of using the expected post- | * Appendix A highlights advantages of using the expected post- | |||
convergence path during FRR. | convergence path during FRR. | |||
* By implementing the algorithms detailed in this document within | * Appendix B summarizes the measurements from implementing the | |||
actual service provider and large enterprise network environments, | algorithms detailed in this document within actual service | |||
real-life measurements are presented regarding the number of SIDs | provider and large enterprise network environments. Real-life | |||
utilized by repair paths. These measurements are summarized in | measurements are presented regarding the number of SIDs utilized | |||
Appendix B. | by repair paths. | |||
2. Terminology | 2. Terminology | |||
2.1. Abbreviations and Notations | 2.1. Abbreviations and Notations | |||
DLFA: Directed Loop-Free Alternate | DLFA: Directed Loop-Free Alternate | |||
FRR: Fast Reroute | FRR: Fast Reroute | |||
IGP: Interior Gateway Protocol | IGP: Interior Gateway Protocol | |||
End of changes. 4 change blocks. | ||||
17 lines changed or deleted | 15 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |