Stewart,

You are stating the most obvious:)
For a feature to work, e.g. encapsulating into an RSVP tunnel, the entry point of the packet must be able to support that feature. That is not a problem. That how the entire world works:)

SR-based ti-uloop avoidance is no different. So if a packet arrives at node "D" for example, then node "D" must be able to steer the packet such that it guarantees loop-freeness. Once "D" source-routes the packet into the loop-free path towards the destination "Z" , downstream routers from "D" towards "Z" need NOT have the ability to do uloop avoidance or even know that packets was source-routed by node "D"

As for the need for using "strict" vs "loose" source routing, that is topology dependent. The same applies for ti-lfa, rLFA, or even directly connected LFA.

One last thing, if you think that source routing can reduced to a "tunnel" we might as well shutdown SPRING WG:)

Ahmed




On 7/19/2016 7:48 AM, Stewart Bryant wrote:
Appologies if this is a duplicate.

The RFC that had all of the generic methods that were known at the time of publication is RFC5715.

The two phase methods were in section 6.2 (near-side) and section 6.3 (far-side). The first describing tunnelling the traffic towards the repair (and continue to use the repair), the second describing tunnelling traffic towards the destination. For the purposes of this discussion source routing of all flavours can be considered a type of tunnel.

If this approach is a new genetric two phase method, it would be useful to articulate it in general terms.

The type of topology that I was trying to explain in the meeting is as follows

A-B-C-D-E-F-H-I-J.....W
|                     |
|                     |
+------X-Y-Z----------+

All costs are 1 and Y has failed.

Traffic to Z can enter enywhere, and is protected by X.

When the network starts to converge ALL the routers A..J will need to update their fib to forward towards Z via W rather than towards X via A.

If they do this in a random order as would be the case without LF convergence then you may precipitate microlooping.

What you need to do is to force the packets toward either X or Z using a tunnel, or a source routed path, and as far as I can see you need to do that at every point of potential entry into the network, in the above case A..J, else you risk a microloop.

Now I suppose that if ALL packets were source routed, then you could consider that the network was constantly in the first phase, but I think that you would need to use strict source routing, rather than loose source routing else it reduces the the problem I describe above.


- Stewart

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to