IS-IS WG - IETF 71 Summary Route with Detailed Reachability George Swallow, Clarence Filsfils, Stefano Previdi

Slides:



Advertisements
Similar presentations
MPLS VPN.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Diverse Paths draft-ietf-grow-diverse-bgp-paths-dist-02 Keyur Patel.
1 © 2000, Cisco Systems, Inc. Integrated-ISIS Route Leaking.
All Rights Reserved © Alcatel-Lucent 2006, ##### Scalability of IP/MPLS networks Lieven Levrau 30 th April, 2008 France Telecom, Cisco Systems, uawei Technologies,
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
Seamless MPLS for Mobile Backhaul draft-li-mpls-seamless-mpls-mbh-00
7/3/2015 Unit-3 : Network Layer 1 CS 1302 Computer Networks — Unit - 3 — — Network Layer — Text Book Behrouz.A. Forouzan, “Data communication and Networking”,
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Draft-ni-l3vpn-pm-bgp-ext-00IETF 87 L3VPN1 BGP Extension For L3VPN PM draft-ni-l3vpn-pm-bgp-ext-00 Hui Ni, Shunwan Zhuan, Zhenbin Li Huawei Technologies.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
IP Addressing. Dotted Decimal Notation IP addresses are written in a so-called dotted decimal notation Each byte is identified by a decimal number in.
LSP Ping Relay Reply L. Jin J. Luo T. Nadeau G. Swallow.
Chapter 8 Advanced TCP/IP Network Design. Classful IP Addressing There are three basic classes of addresses known as class A, B, or C networks.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
1 © 2001, Cisco Systems, Inc. All rights reserved.© 2003, Cisco Systems, Inc. OSPF and ISIS v6 Khalid Raza
Protocol Topology Support for IS-IS Kay Noguchi draft-ietf-noguchi-isis-protocol-topology-01.txt 56th IETF San Francisco, CA, USA March 18, 2003.
Virtual Topologies for Service Chaining in BGP IP/MPLS VPNs draft-rfernando-bess-service-chaining-00 (previously draft-rfernando-l3vpn-service-chaining-04)
Chapter 6 VLSM and CIDR.
Chapter 6 VLSM and CIDR CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 3/30/2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 VLSM and CIDR Routing Protocols and Concepts – Chapter 6 05/07/2009.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing in an Enterprise Network Introducing Routing and Switching in the.
Chapter 9. Implementing Scalability Features in Your Internetwork.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
1 Multi Topology Routing for OSPFv3 (draft-mirtorabi-mt-ospfv3-00.txt) Sina Mirtorabi
BGP Link-State extensions for Segment Routing
Simplified Extension of LSP Space for IS-IS draft-ietf-isis-wg-extlsp-00.txt Les Ginsberg Stefano Previdi Mike Shand.
1MPLS QOS 10/00 © 2000, Cisco Systems, Inc. rfc2547bis VPN Alvaro Retana Alvaro Retana
CIDR Classless Inter Domain Routing Give the IP address space some breathing room! Basic idea: allocate the remaining IP addresses in variable-size blocks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Routing and Routing Protocols
IETF 68, Prague 2007 Update on “BGP-based Auto- Discovery for L1VPNs” draft-ietf-l1vpn-bgp-auto-discovery-01.txt Don Fedyk Hamid Ould-Brahim.
57 th IETF VIENNA draft-sheng-ppvpn-isis-bgp-mpls vpn-01.txt 57 th IETF meeting IS-IS as the PE/CE Protocol in BGP/MPLS VPN draft-sheng-ppvpn-isis-bgp-mpls-00.txt.
Nov. 8, 2006IDR WG Meeting1 IPv6 Next Hop for IPv4 Prefix In BGP Updates, NH not necessarily of same address family as NLRI Currently deployed examples:
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 draft-pillay-esnault-ospf-service-distribution-00.txt Padma Pillay-Esnault.
7/11/0666th IETF1 QoS Enhancements to BGP in Support of Multiple Classes of Service Andreas Terzis Computer Science Department Johns Hopkins University.
Extended procedures and Considerations for Loop Free Alternatives draft-chunduri-rtgwg-lfa-extended-procedures-01 Uma Chunduri Ericsson Inc. Jeff Tantsura.
OSPF Traffic Engineering (TE) Express Path Updates draft-giacalone-ospf-te-express-path-01.txt Spencer Giacalone, Alia Atlas, John Drake, Stefano Previdi,
Covering Prefixes Outbound Route Filter for BGP-4 draft-bonica-l3vpn-orf-covering-prefixes-01 H. Jeng, l. Jalil, R. Bonica, Y. Rekhter, K. Patel, L. Yong.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
Introduction to Internetworking. 2 The IP Addressing Scheme (IPv4) (psu.edu) Dotted Decimal Notation: A notation more convenient for humans.
86th IETF, Orlando, March 2013 Flooding Scope PDUs draft-ginsberg-isis-fs-lsp-00.txt Les Ginsberg Stefano Previdi.
BGP Encapsulation SAFI and BGP Tunnel Encapsulation Attribute draft-pmohapat-idr-info-safi-02.txt Pradosh Mohapatra and Eric Rosen Cisco Systems IETF-69,
UNIT 4 NETWORK LAYER. Position of network layer 7/8/2016 UNIT-3 : NETWORK LAYER 2.
Virtual Private LAN Service
MPLS Virtual Private Networks (VPNs)
IP – Subnetting and CIDR
BGP extensions for Path Computation Element (PCE) Discovery in a BGP/MPLS IP-VPN draft-kumaki-pce-bgp-disco-attribute-03.txt Kenji Kumaki KDDI R&D Labs,
Advertising Generic Information in IS-IS
draft-patel-raszuk-bgp-vector-routing-01
Update on Advertising L2 Bundle Member Link Attributes in IS-IS
draft-ietf-idr-ls-distribution-02
Instructor Materials Chapter 8: Subnetting IP Networks
Multi-Instances ISIS Extension draft-ietf-isis-mi-08.txt
Chapter 8: Subnetting IP Networks
ISIS Route Tag sub-TLV draft-ietf-isis-admin-tags-02.txt
draft-wijnands-mpls-mldp-vpn-in-band-signaling-00
CS 1302 Computer Networks — Unit - 3 — — Network Layer —
Dynamic Routing Protocols part2
BIER PIM SIGNALLING Hooman Bidgoli, Jayant Kotalwar, Andrew Dolganow (Nokia) Fengman Xu (Verizon) IJsbrand Wijnands, Mankamana Mishra (Cisco) Zhaohui.
IP Addressing Introductory material
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
BIER Prefix Redistribute draft-zwzw-bier-prefix-redistribute-00
Presentation transcript:

IS-IS WG - IETF 71 Summary Route with Detailed Reachability George Swallow, Clarence Filsfils, Stefano Previdi

2 Motivation Scalability and convergence IGP convergence SPT Calculation is quick FIB update is not so quick Would like to summarize routes in FIB BGP Convergence Next hop tracking very useful Depends on reachability to /32 address Currently IS-IS makes no distinction between having a route and having reachability Want to have it both ways!

3 L3VPN over L2TPv3 VPN packets are encapsulated in L2TPv3 For many VPNs, multiple next-hops are carried in BGP using a Route Distinguisher (RD) Switch to new route occurs on BGP withdrawal or indication from ISIS that the next-hop is not reachable (aka BGP NH tracking) To scale IS-IS, operators would like to summarize PE loopbacks However summarizing hides detailed reachability, BGP convergence then depends on BGP withdrawal Area 0 Area 1 ABR1PE Area 2 PE Area 3 PE3ABR ABR2

4 Separating Routing and Reachability New routing advertisement - SRDR Summarized route Detailed reachability Proposed format Use the Extended IP Reachability TLV Add a sub-TLV Bit vector of reachable hosts Vector length = 2^(number of ignored bits)

5 Example Area 2 has /25 assigned as its address range The following addresses appear in ABR2’s database for Area then the bit mask encoding would advertise a summary route to /25 with an associated 128-bit mask like this:

6 Changes in draft-…-01 Added applicability section case study as motivation for sufficiency of bit-map encoding Added text on partitioning

7 Bit-Vector Characteristics Limited to 1024 bits by TLV/sub-TLV encoding Fixed size Good for memory mgmt Good for LSP fragmentation issues Cannot exceed allowable sub-TLV size Not compact for sparse allocation Works well for IPv4 given the assumptions in the following case study

8 Bit-Vector Case Study Assume up to 30k routers in network Break this into 75 domains Average of 400 routers / domain Assume PE are numbered in blocks of /24 addresses Utilized 33% due to admin inefficiency Requires 5 /24 per domain = 375 total Each /24 would need 32 bytes of bit-vector ~ 12k bytes total Much less than advertising the /32s

9 Inconsistent Advertisements “Should” only happen in two cases Race condition between L1L2 routers seeing a host/router come up or down Area partition Solution Monitor bit vector associated with any summary address matching one that you are advertising Leak /32 for hosts seen by you but not by some other L1L2 advertising this summary Appropriate hold-downs apply

10 Detailed Reachabilty Encoding These assumptions should carry over to IPv6 if provides allocate loopbacks from /120 addresses Authors would like feedback on the assumptions from Service Providers

11 Inconsistent Advertisements L1 PE L1 PE How do ABR1, ABR2 react to inconsistent advertisements from ABR3, AB4? How does PE1 react to inconsistent advertisements from ABR1, ABR2 ABR1 & ABR2 adversize logical of bit-masks and leak any covered /32s PEs select most specific address L2 Domain ABR1ABR3ABR4ABR2