Skip to main content

TRILL: Directory Assistance Mechanisms
draft-dunbar-trill-scheme-for-directory-assist-04

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Authors Linda Dunbar , Donald E. Eastlake 3rd , Radia Perlman , Igor Gashinsky , Yizhou Li
Last updated 2013-02-25
Replaced by draft-ietf-trill-directory-assist-mechanisms, RFC 8171
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-dunbar-trill-scheme-for-directory-assist-04
INTERNET-DRAFT                                              Linda Dunbar
Intended status: Proposed Standard                       Donald Eastlake
                                                                  Huawei
                                                           Radia Perlman
                                                                   Intel
                                                          Igor Gashinsky
                                                                   Yahoo
                                                               Yizhou Li
                                                                  Huawei
Expires: August 24, 2012                               February 25, 2013

                 TRILL: Directory Assistance Mechanisms
        <draft-dunbar-trill-scheme-for-directory-assist-04.txt>

Abstract
   This document describes optional mechanisms for using directory
   server(s) to assist TRILL (Transparent Interconnection of Lots of
   Links) edge switches in reducing multi-destination traffic,
   particularly ARP/ND and unknown unicast flooding.

Status of This Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Distribution of this document is unlimited. Comments should be sent
   to the TRILL working group mailing list.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html. The list of Internet-Draft
   Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

L. Dunbar, et al                                                [Page 1]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

Table of Contents

      1. Introduction............................................3
      1.1 Terminology............................................3
      1.2 Circumstances Causing Directory Use....................4

      2. Push Model Directory Assistance Mechanisms..............5
      2.1 Requesting Push Service................................5
      2.2 Actions by Push Directory Servers......................5
      2.3 Additional Push Details................................6

      3. Pull Model Directory Assistance Mechanisms..............8
      3.1 Pull Directory Request Format..........................8
      3.2 Pull Directory Response Format........................10
      3.3 Pull Directory Hosted on an End Station...............12
      3.4 Pull Directory Request Errors.........................14
      3.5 Cache Consistency.....................................15
      3.6 Additional Pull Details...............................17

      4. Directory Use Strategies and Push-Pull Hybrids.........18
      4.1 Strategy Configuration................................18

      5. The Interface Addresses APPsub-TLV.....................21
      5.1 Format of the Interface Addresses APPsub-TLV..........21
      5.2 IA-APPsub-TLV sub-sub-TLVs............................24
      5.2.1 AFN Size sub-sub-TLV................................25
      5.2.2 Fixed Address sub-sub-TLV...........................26
      5.2.3 Data Label sub-sub-TLV..............................26
      5.2.4 Topology sub-sub-TLV................................27

      6. Security Considerations................................28

      7. IANA Considerations....................................29
      7.1 ESADI-Parameter Bits..................................29
      7.2 RBridge Channel Protocol Number.......................29
      7.3 Pull Directory and No Data Bits.......................29
      7.4 Additional AFN Number Allocation......................30
      7.5 IA APPsub-TLV Sub-Sub-TLVs SubRegistry................30

      8. Acknowledgments........................................32

      9. References.............................................33
      9.1 Normative References..................................33
      9.2 Informational References..............................34

L. Dunbar, et al                                                [Page 2]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

1. Introduction

   [DirectoryFramework] describes a high level framework for using
   directory servers to assist TRILL [RFC6325] edge nodes to reduce
   multi-destination ARP/ND and unknown unicast flooding traffic.
   Because multi-destination traffic becomes an increasing burden as a
   network scales, reducing ARP/ND and unknown unicast flooding improves
   TRILL network scalability. This document describes optional specific
   mechanisms for directory servers to assist TRILL edge nodes.

   The information held by the directories is address mapping
   information.  Most commonly, what MAC address corresponds to an IP
   address within a Data Label (VLAN or FGL (Fine Grained Label
   [RFCfgl])) and what egress TRILL switch (RBridge) that MAC address is
   attached to. But it could be what IP address corresponds to a MAC
   address or possibly other mappings. In the data center environment,
   it is common for orchestration software to know and control where all
   the IP addresses, MAC address, and VLANs/tenants are. Thus such
   orchestration software is appropriate for providing the directory
   function or for supplying the Directory(s) with information they
   need.

   Directory services can be offered in a Push or Pull mode. Push mode,
   in which a directory server pushes information to RBridges indicating
   interest, is specified in Section 2. Pull mode, in which an RBridge
   queries a server for the information it wants, is specified in
   Section 3. Hybrid Push/Pull modes of operation are discussed in
   Section 4.

   The mechanisms used to keep the mappings held by different
   Directories synchronized is beyond the scope of this document.

1.1 Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 [RFC2119].

   The terminology and acronyms of [RFC6325] are used herein along with
   the following additional acronyms and terms:

   Data Label: VLAN or FGL.

   FGL:  Fine Grained Label [RFCfgl].

   Host: Application running on a physical server or a virtual machine.
         A host must have a MAC address and usually has at least one IP
         address.

L. Dunbar, et al                                                [Page 3]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   IP:   Internet Protocol. In this document, IP includes both IPv4 and
         IPv6.

   RBridge: An alternative name for a TRILL switch.

   TRILL switch: An alternative name for an RBridge.

1.2 Circumstances Causing Directory Use

   While an RBridge can consult Directory information whenever it wants,
   by searching through information that has been pushed to it or
   requesting information from a pull directory, the following are
   expected to be the most common circumstances leading to directory
   use. All of these involve cases of ingressing a native frame.

      o  Ingressing an frame with an unknown unicast destination MAC.
         The mapping from the destination MAC and Data Label to its
         egress RBridge of attachment is needed to ingress the frame as
         unicast. If the egress RBridge is unknown, the frame must be
         dropped or ingressed as a multi-destination frame and flooded
         to all edge RBridges for its Data Label.

      o  Ingressing an ARP [RFC826]. ...TBD

      o  Ingressing a ND [RFC903]. ...TBD... Secure Neighbor Discovery
         messages [] will, in general, have to be sent to the neighbor
         intended so that neighbor can sign the answer; however,
         directory information can be used to unicast the ND packet
         rather than multicasting it.

      o  Ingressing a RARP [RFC4861]. ...TBD

L. Dunbar, et al                                                [Page 4]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

2. Push Model Directory Assistance Mechanisms

   In the Push Model, Push Directory servers push down the mapping
   information for the various addresses of end stations in some Data
   Label.  A Push Directory advertises whether or not it believes it is
   pushing complete mapping information for a Data Label. The Push Model
   uses the [ESADI] protocol.

   With this model, it is RECOMMENDED that complete address mapping
   information for a Data Label be pushed and that a participating
   RBridge simply drop a data packet, instead of flooding the packet, if
   the destination unicast MAC address is in a category being pushed and
   can't be found in the mapping information available. This will
   minimize flooding of packets due to errors or inconsistencies but is
   not practical if directories have incomplete information.

2.1 Requesting Push Service

   In the Push Model, it is necessary to have a way for an RBridge to
   request information from the directory server(s).  RBridges simply
   use the ESADI protocol mechanism to announce, in the IS-IS link state
   database, all the Data Labels for which they are participating in
   [ESADI]. They are then pushed the mapping information for all such
   Data Labels being served by a Push Directory server.

2.2 Actions by Push Directory Servers

   Push Directory servers advertise their availability to push the
   mapping information for a particular Data Label to ESADI participants
   for that Data Label by turning on a flag bit in their ESADI Parameter
   APPsub-TLV [ESADI] (see Section 7.1).

   Each Push Directory server MUST participate in ESADI for the Data
   Labels for which it can push mappings and set the PD bit in their
   ESADI-Parameters APPsub-TLV for that Data Label.

   For robustness, it is useful to have more than one copy of the data
   being pushed. Each RBridge that is a Push Directory server is
   configured with a number in the range 1 to 8, which defaults to 2, as
   to the number of copies it believes should be pushed. Each Push
   Directory server also has a priority that is its 6-byte IS-IS System
   ID treated as an unsigned integer where larger magnitude means higher
   priority.

   For each Data Label it can serve, each Push Directory RBridge server
   orders the Push Directory servers that it can see as data reachable

L. Dunbar, et al                                                [Page 5]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   [RFCclear] in the ESADI link state database for that Data Label and
   determines its position in that order. If a Push Directory server
   believes that N copies of the mappings for a Data Label should be
   pushed and finds that it is first in priority or, more generally, not
   lower than Nth in priority, it is Active. If it finds that it is
   N+1st or lower in priority, it is Passive.

   For example, assume four Push Directory servers for Data Label X:
   server A with priority 123 configured to believe there should be 2
   copies pushed; server B, priority 88, 1 copy; server C, priority 40,
   3 copies; and server D, priority 7, 2 copies. Server A, seeing that
   is highest priority, is Active. Server B, seeing that it is 2nd
   highest priority and believing that only 1 copy should be pushed, is
   Passive. Server C sees that it is 3rd highest priority and believes 3
   copies should be pushed, so it is Active. And server D sees it is 4th
   highest priority and, believing that only 2 copies should be pushed,
   is Passive.

   If a Push Directory server is Active for Data Label X, it includes
   the Data Label X directory mappings it has in its ESADI-LSP for Data
   Label X and updates that information as the mappings it knows change.
   If the Push Directory server is configured to believe it has complete
   mapping information for Data Label X then, after it has actually
   transmitted all of its ESADI-LSPs for X it waits its CSNP time (see
   Section 6.1 of [ESADI]), and then updates its ESADI-Parameters
   APPsub-TLV to set the Complete Push (CP) bit to one. It then
   maintains the CP bit as one as long as it is Active.

   If a Push Directory server is Passive for Data Label X, it removes or
   continues to leave out all Data Label X directory mappings it holds
   from its ESADI-LSP for Data Label X. However, if it was Active and
   was advertising the CP bit as one in its ESADI-Parameters APPsub-TLV,
   it first updates the CP bit to zero and sends its updated ESADI-LSP
   fragment zero and then waits its CSNP time before withdrawing all its
   directory mapping information.

2.3 Additional Push Details

   Push Directory mappings can be distinguished for any other data
   distributed through ESADI because mappings are distributed only with
   the Interface Addresses APPsub-TLV specified in Section 5 and are
   flagged as being Push Directory data.

   RBridges, whether or not they are a Push Directory server, MAY
   advertise any locally learned MAC attachment information in ESADI
   using the Reachable MAC Addresses TLV [RFC6165]. However, if a Data
   Label is being served by complete Push Directory servers, advertising
   such locally learned MAC attachment would generally not be done as it

L. Dunbar, et al                                                [Page 6]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   should not add anything and would just waste bandwidth and ESADI link
   state space. An exception would be when an RBridge learns local MAC
   connectivity and that information appears to be missing from the
   directory mapping. In that case, it SHOULD advertise the missing
   information unless configured not to.

   Because a Push Directory server may need to advertise interest in
   Data Labels even though it does not want to received user data in
   those Data Labels, the No Data flag bit is provided as discussed in
   Section 7.3.

   If an RBridge notices that a Push Directory server is no longer data
   reachable [RFCclear], it MUST ignore any Push Directory data from
   that server because it is no longer being updated and may be stale.

   There may be transient conflicts between mapping information from
   different Push Directory servers or conflicts between locally learned
   information and information received from a Push Directory server. In
   case of such conflicts, information with a higher confidence value is
   preferred over information with a lower confidence. In case of equal
   confidence, Push Directory information is preferred to locally
   learned information and if information from Push Directory servers
   conflicts, the information from the higher priority Push Directory
   server is preferred.

L. Dunbar, et al                                                [Page 7]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

3. Pull Model Directory Assistance Mechanisms

   In the Pull Model, an RBridge pulls mapping information from an
   appropriate Directory Server when needed.

   Pull Directory servers for a particular Data Label X are located by
   looking in the main TRILL IS-IS link state database for RBridges that
   advertise themselves by having the Pull Directory flag on in their
   Interested VLANs or Interested Labels sub-TLV [rfc6326bis] for X. If
   multiple RBridges indicate that they are Pull Directory Servers for a
   particular Data Label a pull request can be sent to any of them that
   is data reachable but it is RECOMMENDED that pull requests be sent to
   server that is least cost from the requesting RBridge.

   Pull Directory requests are sent by enclosing them in an RBridge
   Channel [Channel] message using the Pull Directory channel protocol
   number (see Section 7.2).  Responses are returned in an RBridge
   Channel message using the same channel protocol number.

   The requests to Pull Directory Servers are derived from normal ARP
   [RFC826], ND [RFC4861], RARP [RFC903] messages or data frames with
   unknown unicast destination MAC addresses intercepted by the RBridge
   when they would otherwise be ingressed.  Pull Directory responses
   include an amount of time for which the response should be considered
   valid. This includes negative responses that indicate no data is
   available or the requester is administratively prohibited from
   receiving the data or the like. Thus both positive responses with
   data and negative responses can be cached and used for immediate
   response to ARP, ND, RARP, or unknown destination MAC frames, until
   they expire.  If information previously pulled is about to expire, an
   RBridge MAY try to refresh it by issued a new pull request but, to
   avoid unnecessary requests, SHOULD NOT do so if it has not been
   recently used.

3.1 Pull Directory Request Format

   A Pull Directory request is sent as the Channel Protocol specific
   content of an inter-RBridge Channel message TRILL Data packet. The
   Data Label in the packet is the Data Label in which the address is
   being looked up. The priority of the channel message is a mapping of
   the priority frame being ingressed that caused the request with the
   default mapping depending, per Data Label, on the strategy (see
   Section 4). The Channel Protocol specific data is formatted as
   follows:

L. Dunbar, et al                                                [Page 8]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   V   |Q|    RESV     | Count |              RESV             |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                        Sequence Number                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | QUERY 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | QUERY 2
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | ...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | QUERY K
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...

      V: Version of the Pull Directory protocol as an unsigned integer.
         Version zero is specified in this document.

      Q: Query/Response Bit. MUST be one for a query.

      RESV: Reserved bits. MUST be sent as zero and ignored on receipt.

      Count: Number of queries present.

      Sequence Number: An opaque 32-bit quantity set by the sending
         RBridge, returned in any responses, and used to match up
         responses with queries.

      QUERY: Each Query record within a Pull Directory request message
         is formatted as follows:

           0  1  2  3  4  5  6  7  8  9 10 11 12 13 14 15
         +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
         |         SIZE          |         RESV          |
         +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
         |                      AFN                      |
         +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
         |                  Address ...
         +--+--+--+--+--+--+--+--+--+--+--...

         SIZE: Size of the query data in bytes. This is the length of
            the Address plus 4.

         RESV: A reserved byte. MUST be sent as zero and ignored on
            receipt.

         AFN: Address Family Number of the Address.

         Address: This is the address for which the query is asking for

L. Dunbar, et al                                                [Page 9]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

            mappings. Typically it would be either (1) a MAC address, in
            which case the querying RBridge is interested in the RBridge
            by which that MAC address is reachable, or (2) an IP
            address, in which case the querying RBridge is interested in
            the corresponding MAC address and the RBridge by which that
            MAC address is reachable.

   A query count of zero is explicitly allowed, for the purpose of
   pinging a Pull Directory server to see if it is responding to
   requests. It results in a response message that also has a count of
   zero.

   If no response is received to a Pull Directory request within a
   configurable timeout, the request should be re-transmitted with the
   same Sequence Number up to a configurable number of times that
   defaults to three. If there are multiple queries in a request,
   responses can be received to various subsets of these queries by the
   timeout. In that case, the remaining unanswered queries should be re-
   sent in a new query with a new sequence number.  If an RBridge is not
   capable of handling partial responses to requests with multiple
   queries, it MUST NOT sent a request with more than one query in it.

3.2 Pull Directory Response Format

   Pull Directory responses are sent as the Channel Protocol specific
   content of inter-RBridge Channel message TRILL Data packets.
   Responses are sent with the same Data Label and priority as the
   request to which they correspond except that the response priority is
   limited. This priority limit is configurable at a per RBridge level
   and defaults to priority 6. The Channel protocol specific data format
   is as follows:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   V   |Q|U|F|P|N| RESV| Count |      ERR      |  subERR       |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                        Sequence Number                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | RESPONSE 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | RESPONSE 2
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | ...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | RESPONSE K
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...

L. Dunbar, et al                                               [Page 10]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

      V: Version of the Pull Directory protocol. Version zero is
         specified in this document.

      Q: Query/Response Bit. MUST be zero for a response.

      U: Unsolicited Bit. MUST be zero for a response to a query and one
         for an unsolicited "response" sent to maintain cache
         consistency (see Section 3.5).

      F: The Flood bit. If zero, the reply is to be unicast to the
         provided Nickname. If U=1, F=1 is used to flood messages for
         certain unsolicited cache consistency maintenance messages from
         an end station Pull Directory server as discussed in Section
         3.5. If U=0, F is ignored.

         P, N: Flags used in connection with certain flooded unsolicited
         cache consistency maintenance messages. Ignored if U is zero.
         If the P bit is a one, the solicited response message relates
         to cached positive response information. If the N bit is a one,
         the unsolicited messages related to cached negative
         information. See Section 3.5.

      RESV: Reserved bits. MUST be sent as zero and ignored on receipt.

      Count: Count is the number of responses present in the particular
         reponse message.

      ERR, subERR: A two part error code. See Section 3.4.

      Sequence Number: An opaque 32-bit quantity set by the requesting
         RBridge and copied by the Pull Directory into all responses to
         the query. For an unsolicited "response", the contents are
         unspecified.

      RESPONSE: Each response record within a Pull Directory response
         message is formatted as follows:

           0  1  2  3  4  5  6  7  8  9 10 11 12 13 14 15
         +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
         |         SIZE          |   RESV    |   Index   |
         +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
         |                   Lifetime                    |
         +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
         |                Response Data ...
         +--+--+--+--+--+--+--+--+--+--+--...

         SIZE: Size of the response data in bytes plus 4.

         RESV: Four reserved bits that MUST be sent as zero and ignored
            on receipt.

L. Dunbar, et al                                               [Page 11]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

         Index: The relative index of the query in the request message
            to which this response corresponds. The index will always be
            one for request messages containing a single query. The
            index will always be zero for unsolicited "response"
            messages.

         Lifetime: The length of time for which the response should be
            considered valid in seconds.

         Response Data: There are two types of response data. If the ERR
            field is non-zero, the response data is a copy of the query
            data, that is, an AFN followed by an address. If the ERR
            field is zero, the response data is the contents of an
            Interface Addresses APPsub-TLV (see Section 5) without the
            usual TRILL GENINFO TLV type and length and without the
            usual IA APPsub-TLV type and length before it.

   Multiple response records can appear in a response message with the
   same index if the answer to a query consists of multiple Interface
   Address APPsub-TLV contents. This would be necessary if, for example,
   a MAC address within a Data Label appears to be reachable by multiple
   RBridges.

   All response records to any particular query record MUST occur in the
   same response message. If a Pull Directory holds more mappings for a
   queried address than will fit into one response message, it selects
   which to include by some method outside the scope of this document.

   See Section 3.4 for a discussion of how errors are handled.

3.3 Pull Directory Hosted on an End Station

   Optionally, a Pull Directory actually hosted on an end station MAY be
   supported. In that case, when the RBridge advertising itself as a
   Pull Directory server receives a query, it modifies the inter-RBridge
   Channel message received into a native RBridge Channel message and
   forwards it to that end station. Later, when it receives one or more
   responses from that end station by native RBridge Channel messages,
   it modifies them into inter-RBridge Channel messages and forwards
   them to the source RBridge of the query.

   The native RBridge Channel Pull Directory messages use the same
   Channel protocol number as do the inter-RBridge Pull Directory
   Channel messages. The native messages MUST be sent with an Outer.VLAN
   tag which give the priority of each message which is the priority of
   the original inter-RBridge request packet. The Outer.VLAN ID used is
   the Designated VLAN on the link.

L. Dunbar, et al                                               [Page 12]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   The native RBridge Channel message protocol dependent data for a Pull
   Directory query is formatted as follows:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   V   |Q|    RESV     | Count |           Nickname            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   Data Label ... (4 or 8 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                        Sequence Number                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | QUERY 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | QUERY 2
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | ...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | QUERY K
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...

      Data Label: The Data Label of the original inter-RBridge Pull
         Directory Channel protocol messages that was mapped to this
         native channel message. The format is the same as it appears
         right after the Inner.MacSA of the original Channel message.

      Nickname: The nickname of the requesting RBridge.

      All other fields are as specified in Section 3.1.

   The native RBridge Channel message protocol specific content for a
   Pull Directory response is formatted as follows:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   V   |Q|U|F|P|N| RESV| Count |      ERR      |  subERR       |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |           Nickname            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   Data Label ... (4 or 8 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                        Sequence Number                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | RESPONSE 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | RESPONSE 2
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | ...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...

L. Dunbar, et al                                               [Page 13]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

      | RESPONSE K
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...

      Data Label: The Data Label to which the response applies. The
         format is the same as it appears right after the Inner.MacSA in
         TRILL Data messages.

      Nickname: The nickname of the destination RBridge or, if F=1,
         ignored.

      All other fields are as specified in Section 3.2.

3.4 Pull Directory Request Errors

   An error response message is indicated by a non-zero ERR field.

   If there is an error that applies to the entire request message or
   its header, as indicated by the range of the value of the ERR field,
   then the query records in the request are just expanded with a zero
   Lifetime and the insertion of the Index field echoed back in the
   response records.

   If errors occur at the query level, they MUST be reported in a
   response message separate from the results of any successful queries.
   If multiple queries in a request have different errors, they MUST be
   reported in separate response messages. If multiple queries in a
   request have the same error, this error response MAY be reported in
   one response message.

   In an error response message, the query or queries being responded to
   appear, expanded by the Lifetime for which the server thinks the
   error might persist and with their Index inserted, as the response
   record.

   ERR values 1 through 63 are available for encoding request message
   level errors. ERR values 64 through 255 are available for encoding
   query level errors. the SubErr field is available for providing more
   detail on errors. The meaning of a SubErr field value depends on the
   value of the ERR field.

L. Dunbar, et al                                               [Page 14]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

         ERR    Meaning
         ---    -------
           0    (no error)

           1    Unknown V field value
           2    Request data too short
           3    Administratively prohibited
         4-31   (Available for allocation by Standards Action)

          32    Unknown AFN
          33    No mapping found
          34    Administratively prohibited
         35-255 (Available for allocation by Standards Action)

   More TBD...?

3.5 Cache Consistency

   Pull Directories MUST take action to minimize the amount of time that
   an RBridge will continue to use stale information from the Pull
   Directory.

   A Pull Directory server MUST maintain one of the following, in order
   of increasing specificity.

      1. An overall record per Data Label of when the last returned
         query data will expire at a requestor and when the last query
         record specific negative response will expire.

      2. For each unit of data (IA APPsub-TLV Address Set) held by the
         server and each address about which a negative response was
         sent, when the last expected response with that unit or
         negative response will expire at a requester.

      3. For each unit of data held by the server and each address about
         which a negative response was sent, a list of RBridges that
         were sent that unit as the response or sent a negative response
         to the address, with the expected time to expiration at each of
         them.

   A Pull Directory server may have a limit as to how many RBridges it
   can maintain expiry information for by method 3 above or how many
   data units or addresses it can maintain expiry information for by
   method 2. If such limits are exceeded, it MUST transition to a lower
   numbered strategy but, in all cases, MUST support, at a minimum,
   method 1.

   When data at a Pull Directory changes or is deleted or data is added

L. Dunbar, et al                                               [Page 15]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   and there may be unexpired stale information at a querying RBridge,
   the Pull Directory MUST send an unsolicited message as discussed
   below.

   If method 1, the most crude method, is being followed, then when any
   information in a Data Label is changed or deleted or an additional
   administrative Pull Directory access restriction imposed, and there
   are outstanding cached positive query data response(s), an all-
   addresses flush positive message is flooded (multicast) within that
   Data Label. And if data is added or an administrative restriction is
   removed and there are outstanding cached negative responses, an all-
   addresses flush negative message is flooded. "All-addresses" is
   indicated by the Count in an unsolicited response being zero. On
   receiving an all-addresses flooded flush positive message from a Pull
   Directory server it has used, indicated by the U, F, and P bits being
   one, an RBridge discards all cached data responses it has for that
   Data Label. Similarly, on receiving an all addresses flush negative
   message, indicated by the U, F, and N bits being one, it discards all
   cached negative responses for that Data Label. A combined flush
   positive and negative can be flooded by having all of the U, F, P,
   and N bits set to one resulting in the discard of all positive and
   negative cached information for the Data Label.

   If method 2 is being followed, then an RBridge floods address
   specific update positive unsolicited responses when data which is
   cached by a querying RBridge is changed or deleted or an
   administrative restriction is added to such data and floods an
   address specific update negative unsolicited responses when such
   information is deleted or an administrative restriction is removed
   from such data. Such messages are similar to the method 1 flooded
   unsolicited flush messages. The U and F bits will be one and the
   message will be multicast. However that Count field will be non-zero
   and either the P or N bit, but not both, will be one. On receiving
   such as address specific message, if it is positive the addresses in
   the response records in the unsolicited response are compared to the
   addresses about which the recipient RBridge is holding cached
   positive information and, if they match, the cached information is
   updated and its remaining cache life set to the minimum of its
   previous value in the cache and the Lifetime value in the unsolicited
   response. In the case of a newly imposed administrative restriction,
   the Lifetime in the unsolicited response is set to zero so the cached
   information immediately expired. On receiving an address specific
   unsolicited negative response, the addresses in the response records
   in the unsolicited response are compared to the addresses about which
   the recipient RBridge is holding cached negative information and, if
   they match, the cached negative information is discarded.

   If method 3 is being followed, the same sort of messages are sent as
   with method 2 except they are not flooded but unicast only to the
   specific RBridges the server believes may be holding the cached

L. Dunbar, et al                                               [Page 16]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   positive or negative information that may need updating.

3.6 Additional Pull Details

   If an RBridge notices that a Pull Directory server is no longer data
   reachable [RFCclear], it MUST discard all responses it is retaining
   from that server within one second as the RBridge can no longer
   receive cache consistency messages from the server.

   Because a Pull Directory server may need to advertise interest in
   Data Labels even though it does not want to received user data in
   those Data Labels, the No Data flag bit is provided as discussed in
   Section 7.3.

L. Dunbar, et al                                               [Page 17]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

4. Directory Use Strategies and Push-Pull Hybrids

   For some edge nodes which have great number of Data Labels enabled,
   managing the MAC&Label <-> RBridgeEdge mapping for hosts under all
   those Data Labels can be a challenge. This is especially true for
   Data Center gateway nodes, which need to communicate with a majority
   of Data Labels if not all.

   For those RBridge Edge nodes, a hybrid model should be considered.
   That is the Push Model is used for some Data Labels, and the Pull
   Model is used for other Data Labels. It is the network operator's
   decision by configuration as to which Data Labels' mapping entries
   are pushed down from directories and which Data Labels' mapping
   entries are pulled.

   For example, assume a data center when hosts in specific Data Labels,
   say VLANs 1 through 100, communicate regularly with external peers,
   the mapping entries for those 100 VLANs should be pushed down to the
   data center gateway routers. For hosts in other Data Labels which
   only communicate with external peers once a day (or once a few days)
   for management interface, the mapping entries for those VLANs should
   be pulled down from directory when the need comes up.

   The mechanisms described above for Push and Pull Directory services
   make it easy to use Push for some Data Labels and Pull for others. In
   fact, different RBridges can even be configured so that some use Push
   Directory services and some use Pull Directory services for the same
   Data Label if both Push and Pull Directory services are available for
   that Data Label. And there can be Data Labels for which directory
   services are not used.

4.1 Strategy Configuration

   Each RBridge that has the ability to use directory assistance has,
   for each Data Label X in which it is might ingress native frames, one
   of four major modes:

      0. No directory use. The RBridge does not subscribe to Push
         Directory data or make Pull Directory requests for Data Label X
         and directory data is not consulted on ingressed frames in Data
         Label X that might have used directory data, including ARP, ND,
         RARP, and unknown MAC destination addresses, are flooded.

      1. Use Push only. The RBridge subscribes to Push Directory data
         for Data Label X.

      2. Use Pull only. When the RBridge ingresses a frame in Data Label
         X that can use Directory information, if it has cached positive

L. Dunbar, et al                                               [Page 18]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

         information for the address it uses it. If it does not have
         either cached positive or negative information for the address,
         it sends a Pull Directory query.

      3. Use Push and Pull. The RBridge subscribes to Push Directory
         data for Data Label X. When it ingresses a frame in Data Label
         X that can use Directory information,

   The above major Directory use mode is per Data Label. In addition,
   there is a per Data Label per priority minor mode as listed below
   that indicates what should be done if Directory Data is not available
   for the ingressed frame. In all cases, if you are holding Push
   Directory or positive Pull Directory information to handle the frame
   given the major mode, the directory information is simply used and,
   in that instance, the minor modes does not matter.

      A. Flood immediate. Flood the frame immediately (even if you are
         also sending a Pull Directory) request.

      B. Flood. Flood the frame immediately unless you are going to do a
         Pull Directory request, in which case you wait for the response
         or for the request to time out after retries and flood the
         frame if the request times out.

      C. Discard if complete or Flood immediate. If you have complete
         Push Directory information and the address is not in that
         information, discard the frame. Otherwise, the same as A.

      D. Discard if complete or Flood immediate. If you have complete
         Push Directory information and the address is not in that
         information, discard the frame. Otherwise, the same as B.

   In addition, the Pull Directory priority for an Pull Directory
   requests sent can be configured on a per Data Label, per ingressed
   frame priority basis.  The default mappings are as follows:

         Ingress     If Flood    If Flood
         Priority    Immediate   Delayed
         --------    ---------   --------
           7           5           6
           6           5           6
           5           4           5
           4           3           4
           3           2           3
           2           0           2
           0           1           0
           1           1           1

   Priority 7 is normally only used for urgent messages critical to
   network connectivity and so is avoided by default for directory

L. Dunbar, et al                                               [Page 19]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   traffic.

L. Dunbar, et al                                               [Page 20]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

5. The Interface Addresses APPsub-TLV

   [[[ This Section 5 is fairly long and complex. Should it be a
   separate document? ]]]

   This section specifies a TRILL APPsub-TLV that enables the convenient
   representation of sets of addresses of different types such that all
   of the addresses in each set designate the same end station interface
   (port). For example, an EUI-48 MAC (Extended Unique Identifier
   48-bit, Media Access Control [RFC5342]) address, IPv4 address, and
   IPv6 address can be reported as all three corresponding to the same
   interface. This APPsub-TLV is used inside the TRILL GENINFO TLV as
   specified in [ESADI] and the value portion is used inside Pull
   Directory responses as specifies in Section 3.

   Although, in some IETF protocols, address field types are represented
   by EtherType [RFC5342] or Hardware Type [RFC5494] only Address Family
   Number is used in this APPsub-TLV.

5.1 Format of the Interface Addresses APPsub-TLV

   The Interface Addresses APPsub-TLV is used to indicate that a set of
   addresses indicate the same end-station interface and to associate
   that interface with the TRILL switch by which the interface is
   reachable. These addresses can be in different address families. For
   example, it can be used to declare that an end-station interface with
   a particular IPv4 address, IPv6 address, and EUI-48 MAC address is
   reachable from a particular TRILL switch.

   The Template field value indicates certain well known sets of
   addresses or gives the number of AFNs following. When AFNs are
   listed, the set of AFNs provides a template for the type and order of
   addresses in each Address Set.

L. Dunbar, et al                                               [Page 21]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

      +-+-+-+-+-+-+-+-+
      | Type = TBD    |                  (1 byte)
      +-+-+-+-+-+-+-+-+
      | Length        |                  (1 byte)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | Nickname                      |  (2 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | Flags         |                  (1 byte)
      +-+-+-+-+-+-+-+-+
      | Confidence    |                  (1 byte)
      +-+-+-+-+-+-+-+-+
      | Addr Set End  |                  (1 byte)
      +-+-+-+-+-+-+-+-+-+-
      | Template ...                     (variable)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
      | Address Set 1    (size determined by Template)     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
      | Address Set 2    (size determined by Template)     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
      |   ...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
      | Address Set N    (size determined by Template)     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
      | optional sub-sub-TLVs ...
      +-+-+-+-+-+-+-+-+-+-+-+-...

                 Figure 1. The Interface Addresses APPsub-TLV

   o  Type: Interface Addresses TRILL APPsub-TLV type, set to TBD[#2
      suggested] (IA-SUBTLV).

   o  Length: Variable, minimum 5. If length is 4 or less, the APPsub-
      TLV MUST be ignored.

   o  Nickname: The nickname of the RBridge by which the address sets
      are reachable.

   o  Flags: A byte of flags as follows:

          0 1 2 3 4 5 6 7
         +-+-+-+-+-+-+-+-+
         |D|L|   Resv    |
         +-+-+-+-+-+-+-+-+

         D: If D is one, the APPsub-TLV contains Push Directory
            information.

         L: If L is one, the APPsub-TLV contains information learned
            locally be observing ingressed frames. (Both D and L can one
            in the same APPsub-TLV.)

L. Dunbar, et al                                               [Page 22]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

         Resv: Additional reserved flag bits that MUST be sent as zero
            and ignored on receipt.

   o  Confidence: This 8-bit quantity indicates the confidence level in
      the addresses being transported [RFC6325].

   o  Addr Set End: The unsigned offset of the byte, within the TLV
      value part, of the last byte of the last Address Set. This will be
      the byte just before the first sub-TLV if any sub-TLVs are
      present. [RFC5305]

   o  Template: The initial byte of this field is the unsigned integer
      K. It K has a value from 1 to 63, it indicates that this initial
      byte is followed by a list of K AFNs (Address Family Numbers) in
      the template specifying the structure and order of each Address
      Set occurring later in the TLV. The minimum valid value is 1. If K
      is 64 to 255, it indicates that the Template for each Address Set
      is a specific well known Template. If the Template includes
      explicit AFNs, they look like the following.

         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
         | AFN 1                         |  (2 bytes)
         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
         | AFN 2                         |  (2 bytes)
         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
         | ...
         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
         | AFN K                         |  (2 bytes)
         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   o  AFN: A two-byte Address Family Number. The number of AFNs present
      is given in first byte of the Template field if that value is less
      than 64. This sequence specifies the structure of the Address Sets
      occurring later in the TLV. For example, if Template Size is 2 and
      the two AFNs present are the AFNs for IPv4 and EUI-48, in that
      order, then each Address set present will consist of a 4-byte IPv4
      address followed by a 6-byte MAC address. If any AFNs are present
      that are unknown to the receiving IS and the length of the
      corresponding address is not provided by a sub-TLV as specified
      below, the receiving IS will be unable to parse the Address Sets
      and MUST ignore the enclosing TLV.

   o  Address Set: Each address set consists of a sequence of addresses
      of the types given by the Template earlier in the TLV. No
      alignment, other than to a byte boundary, is guaranteed. The
      addresses in each Address Set are contiguous with no unused bytes
      between them and the Address Sets are contiguous with no unused
      bytes between Address Sets. The Address Sets must fit within the
      TLV. If the product of the size of an Address Set and the number
      of Address Sets is so large that this is not true, the APPsub-TLV

L. Dunbar, et al                                               [Page 23]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

      is ignored.

   o sub-sub-TLVs: If the Address Sets indicated by Addr Sets End do not
      completely fill the Length of the TLV, the remaining bytes are
      parsed as sub-sub-TLVs [RFC5305]. Any such sub-sub-TLVs that are
      not known to the receiving RBridge are ignored. Should this not be
      possible, for example there is only one remaining byte or an
      apparent sub-sub-TLV extends beyond the end of the TLV, the
      containing IA-APPsub-TLV is considered corrupt and is ignored.
      Several sub-sub-TLV types are specified in Section 5.2.

   Different IA-APPsub-TLVs within the same or different EADI-LSPs or
   Pull Directory response from the same RBridge may have different
   Templates. The same AFN may occur more than once in a Template and
   the same address may occur in more than one address set. For example,
   an EUI-48 MAC address interface might have three IPv6 addresses. This
   could be represented by an IA-APPsub-TLV whose Template specifically
   provided for one EUI-48 address and three IPv6 addresses, which might
   be an efficient format if there were multiple interfaces with that
   pattern. Alternatively, a Template with one EUI-48 and one IPv6
   address could be used in an IA-APPsub-TLV with three address sets
   each having the same EUI-48 address but different IPv6 addresses,
   which might be the most efficient format if only one interface had
   multiple IPv6 addresses and other interfaces had only one IPv6
   address.

   In order to be able to parse the Address Sets, a receiving RBridge
   must know at least the size of the address each AFN in the Template
   specifies; however, the presence of the Addr Set End field means that
   the sub-TLVs, if any, can always be located by a receiving IS.  An
   RBridge can be assumed to know the size of IPv4 and IPv6 addresses
   (AFNs 1 and 2) and the size of the additional AFNs allocated by the
   IANA Considerations below. Should an RBridge wish to include an AFN
   that some receiving RBridge in the campus may not know, it SHOULD
   include an AFN-Size sub-sub-TLV as described below. If an IA-APPsub-
   TLV is received with one or more AFNs in its template for which the
   receiving RBridge does not know the length and for which an AFN-Size
   sub-sub-TLV is not present, that IA-APPsub-TLV will be ignored.

5.2 IA-APPsub-TLV sub-sub-TLVs

   IA-APPsub-TLVs may have trailing sub-sub-TLVs [RFC5305] as specified
   below.  These sub-sub-TLVs occur after the Address Sets and the
   amount of space available for sub-sub-TLVs is determined from the
   overall IA-APPsub-TLV length and the value of the Addr Set End byte.

   There is no ordering restriction on sub-sub-TLVs. Unless otherwise
   specified each sub-sub-TLV type can occur zero, one, or many times in

L. Dunbar, et al                                               [Page 24]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   an IA-APPsub-TLV.

5.2.1 AFN Size sub-sub-TLV

   Using this sub-TLV, the originating RBridge can specify the size of
   an address type. This is useful under two circumstances:

   1. One or more AFNs that are unknown to the receiving RBridge appears
      in the template. If an AFN Size sub-sub-TLV is present for each
      such AFN, the at least the IA-APPsub-TLV can be parses the Address
      Sets and make use of any address types present that it does
      understand.

   2. If an AFN occurs in the Template that represents a variable length
      address, this sub-sub-TLV gives its size for all occurrences in
      that IA-APPsubTLV.

      +-+-+-+-+-+-+-+-+
      | Type = AFNsz  |                  (1 byte)
      +-+-+-+-+-+-+-+-+
      | Length        |                  (1 byte)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | AFN Size Record(s)                            |  (3 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Where each AFN Size Record is structured as follows:

      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |  AFN                          |  (2 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |  AdrSize      |                  (1 byte)
      +-+-+-+-+-+-+-+-+

   o  Type: AFN-Size sub-sub-TLV type, set to 1 (AFNsz).

   o  Length: 3*n where n is the number of AFN Size Records present. If
      n is not a multiple of 3, the sub-sub-TLV MUST be ignored.

   o  AFN Size Record(s): Zero or more 3-byte records, each giving the
      size of an address type identified by an AFN,

   o  AFN: The AFN whose length is being specified by the AFN Size
      Record.

   o  AdrSize: The length of the address specified by the AFN field.

   This sub-sub-TLV may occur multiple times in an enclosing IA-APPsub-
   TLV.

L. Dunbar, et al                                               [Page 25]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   An AFN Size sub-sub-TLV for any AFN known to the receiving RBridge
   (which always includes AFN 1 and 2 and the AFNs specified in xxx) is
   compared with the size known to the RBridge and if they differ, the
   IA-APPsub-TLV is ignored.

5.2.2 Fixed Address sub-sub-TLV

   There may be cases where, in an Interface Addresses TLV, the same
   address would appear across every address set in the TLV. To avoid
   having a larger template and wasted space in all Address Sets, this
   sub-sub-TLV can be used to indicate such a fixed address

      +-+-+-+-+-+-+-+-+
      |Type=FIXEDADR  |                 (1 byte)
      +-+-+-+-+-+-+-+-+
      | Length        |                 (1 byte)
      +-+-+-+-+-+-+-+-+
      | AFN           |                 (2 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | Fixed Address                   (variable)
      +-+-+-+-+-+-+-+-+-+-+-+-+-...

   o  Type: Data Label sub-sub-TLV type, set to 2 (FIXEDADR).

   o  Length: variable, minimum 3. If Length is 2 or less, the sub-sub-
      TLV MUST be ignored.

   o  AFN: Address Family Number of the Fixed Address.

   o  Fixed Address: The address of the type indicated by the preceding
      AFN field that is considered to be part of every Address Set in
      the IA-APPsub-TLV.

5.2.3 Data Label sub-sub-TLV

   When used with Push or Pull Directories, the Data Label is indicated
   by the Data Label of the ESADI instance (Push) or RBridge Channel
   message (Pull) in which the IA APPsub-TLV appears and any occurrence
   of this sub-sub-TLV is ignored. However, the IA APPsub-TLV might be
   used in other contexts where this sub-sub-TLV indicates the Data
   Label of the Address Sets and multiple occurrences of this sub-sub-
   TLV indicate that the Address Sets exist in all of the Data Labels.

L. Dunbar, et al                                               [Page 26]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

      +-+-+-+-+-+-+-+-+
      |Type=DATALEN   |                 (1 byte)
      +-+-+-+-+-+-+-+-+
      | Length        |                 (1 byte)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-...
      | Data Label                      (variable)
      +-+-+-+-+-+-+-+-+-+-+-+-+-...

      o  Type: Data Label sub-TLV type, set to 3 (DATALEN).

      o  Length: 2 or 3

      o  Data Label: If length is 2, the bottom 12 bits of the Data
         Label are a VLAN ID and the top 4 bits are reserved (MUST be
         sent as zero and ignored on receipt). If the length is 3, the
         three Data Label bytes contain an FGL [RFCfgl].

5.2.4 Topology sub-sub-TLV

   The presence of this sub-sub-TLV indicates that the Address Sets are
   in the topology give. If it occurs multiple times, then the Address
   Sets are in all of the topologies listed.

      +-+-+-+-+-+-+-+-+
      |Type=DATALEN   |                  (1 byte)
      +-+-+-+-+-+-+-+-+
      | Length        |                  (1 byte)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | RESV  |        Topology       |  (2 bytes)
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

      o  Type: Data Label sub-TLV type, set to 3 (DATALEN).

      o  Length: 2.

      RESV: Four reserved bits. MUST be sent as zero and ignored on
         receipt.

      o  Topology: The 12-bit topology number.

L. Dunbar, et al                                               [Page 27]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

6. Security Considerations

   Push Directory data is distributed through ESADI-LSPs [ESADI] which
   can be authenticated with the same mechanisms as IS-IS LSPs. See
   [RFC5304] and [RFC5310].

   Pull Directory queries and responses are transmitted as RBridge-to-
   RBridge or native RBridge Channel messages. Such messages can be
   secured by TBD

   For general TRILL security considerations, see [RFC6325].

L. Dunbar, et al                                               [Page 28]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

7. IANA Considerations

   This section give IANA allocation and registry considerations.

7.1 ESADI-Parameter Bits

   IANA is request to allocate two ESADI-Parameter TRILL APPsub-TLV flag
   bits for "Push Directory" and "Complete Push" and to create a sub-
   registry in the TRILL Parameters Registry as follows:

      Sub-Registry: ESADI-Parameter APPsub-TLV Bits

      Registration Procedures: IETF Review

      References: [ESADI], This document

         Bit  Mnemonic  Description                      Reference
         ---  --------  -----------                      ---------
          0      UN     Supports Unicast ESADI           [ESADI]
          1      PD     Push Directory Server            This document
          2      CP     Complete Push                    This document
         3-7     -      available for allocation

7.2 RBridge Channel Protocol Number

   IANA is requested to allocate a new RBridge Channel protocol number
   for "Pull Directory Services" from the range allocable by Standards
   Action and update the table of such protocol number in the TRILL
   Parameters Registry referencing this document.

7.3 Pull Directory and No Data Bits

   IANA is requested to allocate two currently reserved bits in the
   Interested VLANs field of the Interested VLANs sub-TLV (suggested
   bits 3 and 4) and the Interested Labels field of the Interested
   Labels sub-TLV (suggested bits 5 and 6) [rfc6326bis] to indicate Pull
   Directory server (PD) and No Data (ND) respectively. These bits are
   to be added to the subregistry set up in [ESADI].

   In the TRILL base protocol [RFC6325] as extended for FGL [rfcFGL],
   the mere presence of an Interested VLANs or Interested Labels sub-
   TLVs in the LSP of an RBridge indicates connection to end stations in
   the VLANs or FGLs listed and thus a desire to receive multi-
   destination traffic in those Data Labels although multicast traffic

L. Dunbar, et al                                               [Page 29]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   might be pruned. But, with Push and Pull Directories, advertising
   that you are a directory server requires using these sub-TLVs as part
   of advertising that you are a directory server. If such a directory
   server does not wish to received multi-destination user data for the
   Data Labels it lists in one of these sub-TLVs, it sets the "No Data"
   (ND) bit to one. This means that data on a distribution tree may be
   pruned so as not to reach the "No Data" RBridge as long as there are
   no RBridges interested in the Data who are beyond the "No Data"
   RBridge.  This bit is backwards compatible as RBridges ignorant of it
   will simply no prune when it could, which is safe but may cause
   increased link utilization.

7.4 Additional AFN Number Allocation

   IANA is requested to allocate four new AFN numbers as follows:

      Number   Description   References ------   -----------
      ----------

      TBD(26)  EUI-48        RFC 5342, this document
      TBD(27)  OUI           RFC 5342, this document
      TBD(28)  MAC/24        This document.
      TBD(29)  IPv6/64       This document.

   The OUI AFN is provided so that MAC addresses can be abbreviated if
   they have the same upper 24 bits. In particular, if there is an OUI
   provided as a Fixed Address sub-sub-TLV (see Section 5.2.2) then,
   whenever a MAC/24 address appears within an Address Set (as indicated
   by the Template), the OUI is used as the first 24 bits of the actual
   MAC address for the Address Set.

   MAC/24 is a 24-bit suffixes intended to be pre-fixed by an OUI as in
   the previous paragraph. In absence of an OUI specified as a Fixed
   Address in the same APPsub-TLV, the Address Set cannot be used.

   IPv6/64 is an 8-byte quantity that is the first 64 bits of an IPv6
   address. If present, there will normally be an EUI-64 address in the
   address set to provide the lower 64 bits of the IPv6 address. For
   this purpose, an EUI-48 is expanded to 64 bits as described in
   [RFC5342].

7.5 IA APPsub-TLV Sub-Sub-TLVs SubRegistry

   IANA is requested to establish a new subregistry for sub-sub-TLVs of
   the Interface Addresses APPsub-TLV with initial contents as shown
   below.

L. Dunbar, et al                                               [Page 30]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

      Name:       Interface Addresses APPsub-TLV Sub-Sub-TLVs

      Procedure:  IETF Review

      Reference:  This document

         Type   Description       Reference
         ----   -----------       ---------
           0    Reserved
           1    AFN Size          This document
           2    Fixed Address     This document
           3    Data Label        This document
           4    Topology          This document
         5-254  Available         This document
          255   Reserved

L. Dunbar, et al                                               [Page 31]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

8. Acknowledgments

   The document was prepared in raw nroff. All macros used were defined
   within the source file.

L. Dunbar, et al                                               [Page 32]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

9. References

   Normative and Informational References are given below.

9.1 Normative References

   [RFC826] - Plummer, D., "An Ethernet Address Resolution Protocol",
         RFC 826, November 1982.

   [RFC903] - Finlayson, R., Mann, T., Mogul, J., and M. Theimer, "A
         Reverse Address Resolution Protocol", STD 38, RFC 903, June
         1984

   [RFC2119] - Bradner, S., "Key words for use in RFCs to Indicate
         Requirement Levels", BCP 14, RFC 2119, March 1997

   [RFC4861] - Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
         "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
         September

   [RFC5304] Li, T. and R. Atkinson, "IS-IS Cryptographic
         Authentication", RFC 5304, October 2008.

   [RFC5310] - Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
         and M. Fanto, "IS-IS Generic Cryptographic Authentication", RFC
         5310, February 2009.

   [RFC5305] - Li, T. and H. Smit, "IS-IS Extensions for Traffic
         Engineering", RFC 5305, October 2008.

   [RFC5342] - Eastlake 3rd, D., "IANA Considerations and IETF Protocol
         Usage for IEEE 802 Parameters", BCP 141, RFC 5342, September
         2008.

   [RFC5494] - Arkko, J. and C. Pignataro, "IANA Allocation Guidelines
         for the Address Resolution Protocol (ARP)", RFC 5494, April
         2009.

   [RFC6165] - Banerjee, A. and D. Ward, "Extensions to IS-IS for
         Layer-2 Systems", RFC 6165, April 2011

   [RFC6325] - Perlman, R., Eastlake 3rd, D., Dutt, D., Gai, S., and A.
         Ghanwani, "Routing Bridges (RBridges): Base Protocol
         Specification", RFC 6325, July 2011.

   [rfc6326bis] - Eastlake, D., Banerjee, A., Dutt, D., Perlman, R., and
         A. Ghanwani, "TRILL Use of IS-IS", draft-ietf-isis-
         rfc6326bis-00.txt, work in progress.

L. Dunbar, et al                                               [Page 33]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

   [RFCclear] - Eastlake, D., M. Zhang, A. Ghanwani, V. Manral, A.
         Banerjee, draft-ietf-trill-clear-correct-06.txt, in RFC
         Editor's queue.

   [Channel] - D. Eastlake, V. Manral, Y. Li, S. Aldrin, D. Ward,
         "TRILL: RBridge Channel Support", draft-ietf-trill-rbridge-
         channel-08.txt, in RFC Editor's queue.

   [RFCfgl] - D. Eastlake, M. Zhang, P. Agarwal, R. Perlman, D. Dutt,
         "TRILL: Fine-Grained Labeling", draft-ietf-trill-fine-
         labeling-05.txt, work in progress.

   [ESADI] - Zhai, H., F. Hu, R. Perlman, D. Eastlake, J. Hudson, "TRILL
         (Transparent Interconnection of Lots of Links): The ESADI (End
         Station Address Distribution Information) Protocol", draft-
         ietf-trill-esadi-02.txt, work in progress.

9.2 Informational References

   [RFC5342] - Eastlake 3rd, D., "IANA Considerations and IETF Protocol
         Usage for IEEE 802 Parameters", BCP 141, RFC 5342, September
         2008

   [DirectoryFramework] - Dunbar, L., D. Eastlkae, R. Perlman, I.
         Gashinsky, "TRILL Edge Directory Assistance Framework", draft-
         ietf-trill-directory-framework-03.txt, work in progress.

   [ARP reduction] - Shah, et. al., "ARP Broadcast Reduction for Large
         Data Centers", Oct 2010.

L. Dunbar, et al                                               [Page 34]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

Authors' Addresses

   Linda Dunbar
   Huawei Technologies
   5430 Legacy Drive, Suite #175
   Plano, TX 75024, USA

   Phone: (469) 277 5840
   Email: ldunbar@huawei.com

   Donald Eastlake
   Huawei Technologies
   155 Beaver Street
   Milford, MA 01757 USA

   Phone: 1-508-333-2270
   Email: d3e3e3@gmail.com

   Radia Perlman
   Intel Labs
   2200 Mission College Blvd.
   Santa Clara, CA 95054-1549 USA

   Phone: +1-408-765-8080
   Email: Radia@alum.mit.edu

   Igor Gashinsky
   Yahoo
   45 West 18th Street 6th floor
   New York, NY 10011

   Email: igor@yahoo-inc.com

   Yizhou Li
   Huawei Technologies
   101 Software Avenue,
   Nanjing 210012 China

   Phone: +86-25-56622310
   Email: liyizhou@huawei.com

L. Dunbar, et al                                               [Page 35]
INTERNET-DRAFT                        TRILL: Directory Assist Mechanisms

Copyright, Disclaimer, and Additional IPR Provisions

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.  The definitive version of
   an IETF Document is that published by, or under the auspices of, the
   IETF. Versions of IETF Documents that are published by third parties,
   including those that are translated into other languages, should not
   be considered to be definitive versions of IETF Documents. The
   definitive version of these Legal Provisions is that published by, or
   under the auspices of, the IETF. Versions of these Legal Provisions
   that are published by third parties, including those that are
   translated into other languages, should not be considered to be
   definitive versions of these Legal Provisions.  For the avoidance of
   doubt, each Contributor to the IETF Standards Process licenses each
   Contribution that he or she makes as part of the IETF Standards
   Process to the IETF Trust pursuant to the provisions of RFC 5378. No
   language to the contrary, or terms, conditions or rights that differ
   from or are inconsistent with the rights and licenses granted under
   RFC 5378, shall have any effect and shall be null and void, whether
   published or posted by such Contributor, or included with or in such
   Contribution.

L. Dunbar, et al                                               [Page 36]