<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.hegde-isis-link-overload" target="https://datatracker.ietf.org/doc/html/draft-hegde-isis-link-overload-00">
   <front>
      <title>ISIS Link Overload</title>
      <author initials="S." surname="Hegde" fullname="Shraddha Hegde">
         <organization>Juniper Networks</organization>
      </author>
      <author initials="H." surname="Gredler" fullname="Hannes Gredler">
         <organization>Juniper Networks</organization>
      </author>
      <date month="March" day="9" year="2015" />
      <abstract>
	 <t>   Many ISIS deployments run on overlay networks provisioned by means of
   pseudo-wires or L2-circuits. when the devices in the underlying
   network go for maintenance, it is useful to divert the traffic away
   from the specific node(s), to some alternate paths, before the
   maintenance is actually scheduled.  Since the nodes in the underlying
   network are not visible to ISIS, existing Avoidance of traffic
   blackhole mechanism described in [RFC3277] cannot be used.  It is
   useful for routers in IS-IS routing domain to be able to advertise a
   link being in overload state to indicate impending maintenance
   activity in the underlying network devices.

   This document describes the protocol extensions to disseminate link
   overload information in IS-IS protocol.


	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hegde-isis-link-overload-00" />
   
</reference>
