Internet-Draft BM-TE February 2025
Wang Expires 15 August 2025 [Page]
Workgroup:
LSR Working Group
Internet-Draft:
draft-wang-lsr-bidirectional-metric-spf-00
Published:
Intended Status:
Standards Track
Expires:
Author:
A. Wang
China Telecom

Bidirectional Metric based Shortest Path First Mechanism

Abstract

This document describes the mechanism that can be used to accomplish the Shortest Path First(SPF) calculation within network based on the bidirectional metrics of the links.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 15 August 2025.

Table of Contents

1. Introduction

IGP SPF algorithm is computed based on the link metric value in each direction. If the metric value of the link in each direction is different at the two endpoints of the link, the forward and return path of one service may be different. This can cause the difficult to identify, control or QoS assurance for the specified services. And, for intra-domain source address validation(SAV mechanism) deployment, if the operator can assure there is no asymmetric path existing within its network, it will be easier for them to deploy the intra-domain SAV mechanism.

But, there is no easy way to find the inconsistent settings of the bidirectional metric value of one link.

There are also other scenarios that described in [RFC8500] and [RFC9339] that the operator wants to set the metric value of a link in one end to influence the traffic from the other ends. Reverse metric mechanism is one valid solution in some scenarios but it is not one general solution for other similar situation.

This document proposes one general solution that can solve the above problems, which utilizes the bidirectional metric values during the SPF calculation to make sure the bidirectional traffic of one service always follow the same path, regardless of the metric values setting of a link in each direction. It can also get the effect of setting the metric value in one end to influence the traffic to and from the node in both directions.

2. Conventions used in this document

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] .

3. Bidirectional Metric based SPF(BM-SPF) Overview

IS-IS[RFC1195], OSPF [RFC2328] and OSPFv3 [RFC5340]describes the basic process for calculating the shortest path between two endpoints in the IGP domain. The link metric is used to represent the output cost of the interface. Normally, such metric is set based on the link capacity and in current network, there is seldom situation that the bidirectional capacity of the link are different.

It is possible to require the both endpoints of the link to set the same value for the metric value, but there is no easy way to assure this. To solve such problem, this document proposes the bidirectional metric based SPF calculation procedures as the followings:

1) The configured link metric is advertised as the normal process.

2) When the IGP neighbors are formed, the cost to each other are set to the maximum value of advertised link metric to each other.

3) The calculated value is stored in the LSDB and then the normal SPF calculation process will be applied.

After the above procedures, the bidirectional route for one any service will be assured to follow the same path. There are also other benefits that such mechanism can afford, which are described in the followings sections.

4. Applicabilication of BM-SPF mechanism in various scenarios

This section described the application of BM-SPF mechanism in various scenarios.

4.1. Consistence in Forwarding and Return Path

Figure 1 illustrates one example that the inconsistence forwarding and return path will be emerged when the bidirectional metric values are different. Based on the value on the link metric, the traffic from R1 to R4 will follow R1-R2-R4 path, but the return traffic will follow R4-R3-R1.

           15    5
       +-------+R2+-------+
       |                  | 15
    5  +                  +
       R1                 R4
    20 +                  + 5
       +-------+R3+-------+
              5    20
Figure 1: Inconsistence forwarding and return path

Based on the BM-TE mechanism described in Section 3, the maximum value of the bidirectional link metric between each neighbor will be used to calculate the shortest path to each endpoint. The actual used values are shown in the Figure 2.

It is obviously that the traffic from R1 to R4 and the return traffic from R4 to R1 will all follow the same path, as R1, R2, R4.

           15      15
       +-------+R2+-------+
       |                  | 15
    15 +                  +
       R1                 R4
    20 +                  + 20
       +-------+R3+-------+
             20    20
Figure 2: Consistence forwarding and return path

4.2. Control Traffic from the Reverse Direction

Figure 3 illustrates the situation that when the interface from R1 to R2 is in abnormal state and needs to be maintained, the operator can change the configured metric value on R1 for this interface to higher or the maximum value, and let the traffic from R1 to R2 switch to other link, for example, R1-R3-R2.

But just doing so can't divert also the incoming traffic from R2 to R1 at the same time, thus the incoming traffic will be dropped during the maintenance period. Based on the BM-SPF mechanism, the configured higher value of the two directional metric will be used in the SPF calculation. Then the traffic from R2 to R1 will be diverted simultaneously when the operator increase the metric value on the R1.

                      5
              +--------+R1+------+
              |       20+        |
              |         |        |
            5 +       20+        +
              R2+------+R3+-----+R4
                8     8
Figure 3: Control traffic from the reverse direction

4.3. BM-SPF in LAN environment

In LAN environment described in Figure 4. If the bidirectional metric value are different in each side, there is no way to differentiate the metric for each pairs of the communication peers. For example, from the viewpoints of the R1, the cost 5 will be used to reach all of its peers on the LAN, and from the viewpoint of the R2, the cost 8 will be used to reach all of its peers on the LAN.

Based on the BM-SPF mechanism, the cost for each pair can be different. For example, from the viewpoint of the R1, the cost 8 will be used to reach R2, the cost 10 will be used to reach R3 and the cost 12 will be reached to reach R4. The situation will be same for R2. It is easy to accomplish the UCMP traffic engineering effect among their neighbor based on the BM value. For R4, the same value will be used to reach each of its communication peer, and traffic from it will be distributed evenly to its neighbors.

                    R1
                    |5
            +---------------+
            |       |       |
            |8      |10     |12
            +       +       +
            R2      R3      R4
Figure 4: Traffic Engineering in LAN environment

5. BM-SPF Router Capabilities Announcements

To assure the consistence and determined behaviors within the network, it is necessary to assure the nodes have the same capabilities to support BM-SPF. The router should announce such capability within the IGP domain.

For IS-IS, one bit(BM bit, 0x04) from the Flags field of IS-IS Router CAPABILITY TLV [RFC7981] is assigned.

For OSPFv2, one bit (BM bit, 0x20) from the OSPF Option field [RFC2328] is assigned

For OSPFv3, one bit(BM bit, 0x08) from the OSPF Option field [RFC5340] is assigned

BM bit: When BM bit is set, it indicates that the maximum value of the bidirectional metrics of a link between the neighbors will be used to calculate the SPF path to each peer. When BM bit is clear, it indicates that the configured metric on each end of the link will be used to calculate the path.

6. Deployment Considerations

The BM-SPF mechanism can be deployed incrementally. If the neighbor doesn't support the BM-SPF capabilities, the metric value configured on the interface should be used instead.

7. Security Considerations

Security concerns for ISIS are addressed in [RFC5304] and[RFC5310]

Security concern for OSPFv3 is addressed in [RFC4552]

Advertisement of the additional information defined in this document introduces no new security concerns.

8. IANA Considerations

IANA is requested to the allocation in following registries:

+===========================================+==========+===========================+
| Registry                                  | Position |       Meaning             |
+===========================================+==========+===========================+
|OSPFv2 Router Properties Registry          | 0x20     |      BM bit               |
+-------------------------------------------+----------+---------------------------+
|OSPFv3 Router Properties Registry          | 0x08     |      BM bit               |
+-------------------------------------------+----------+---------------------------+
|IS-IS Flag field in Router CAPABILITIES TLV| 0x04     |      BM bit               |
+-------------------------------------------+----------+---------------------------+
   Figure 5: IANA Allocation for BM bit in OSPFv2, OSPFv3 and IS-IS

9. Acknowledgement

TBD

10. References

10.1. Normative References

[RFC1195]
Callon, R., "Use of OSI IS-IS for routing in TCP/IP and dual environments", RFC 1195, DOI 10.17487/RFC1195, , <https://www.rfc-editor.org/info/rfc1195>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC2328]
Moy, J., "OSPF Version 2", STD 54, RFC 2328, DOI 10.17487/RFC2328, , <https://www.rfc-editor.org/info/rfc2328>.
[RFC4552]
Gupta, M. and N. Melam, "Authentication/Confidentiality for OSPFv3", RFC 4552, DOI 10.17487/RFC4552, , <https://www.rfc-editor.org/info/rfc4552>.
[RFC5304]
Li, T. and R. Atkinson, "IS-IS Cryptographic Authentication", RFC 5304, DOI 10.17487/RFC5304, , <https://www.rfc-editor.org/info/rfc5304>.
[RFC5310]
Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R., and M. Fanto, "IS-IS Generic Cryptographic Authentication", RFC 5310, DOI 10.17487/RFC5310, , <https://www.rfc-editor.org/info/rfc5310>.
[RFC5340]
Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF for IPv6", RFC 5340, DOI 10.17487/RFC5340, , <https://www.rfc-editor.org/info/rfc5340>.
[RFC7981]
Ginsberg, L., Previdi, S., and M. Chen, "IS-IS Extensions for Advertising Router Information", RFC 7981, DOI 10.17487/RFC7981, , <https://www.rfc-editor.org/info/rfc7981>.

10.2. Informative References

[RFC8500]
Shen, N., Amante, S., and M. Abrahamsson, "IS-IS Routing with Reverse Metric", RFC 8500, DOI 10.17487/RFC8500, , <https://www.rfc-editor.org/info/rfc8500>.
[RFC9339]
Talaulikar, K., Ed., Psenak, P., and H. Johnston, "OSPF Reverse Metric", RFC 9339, DOI 10.17487/RFC9339, , <https://www.rfc-editor.org/info/rfc9339>.

Author's Address

Aijun Wang
China Telecom
Beiqijia Town, Changping District
Beijing
102209
China