PIM WG                                                         Yiqun Cai
Internet Draft                                                  Heidi Ou
Intended Status: Proposed Standard
Expires: April 27, 2009                              Cisco Systems, Inc.

                                                        October 27, 2008


              PIM Multi-Topology ID (MT-ID) Join-Attribute


                       draft-cai-pim-mtid-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Abstract

   This document introduces a new type of PIM Join Attribute that
   extends PIM signaling to identify a topology that should be used when
   constructing a particular multicast distribution tree.










Cai & Ou                                                        [Page 1]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008




Table of Contents

    1          Specification of Requirements  ......................   2
    2          Introduction  .......................................   2
    3          Functional Overview  ................................   3
    3.1        PIM RPF Topology  ...................................   3
    3.2        PIM MT-ID  ..........................................   4
    3.3        Applicability  ......................................   4
    4          Protocol Specification of PIM MT-ID  ................   4
    4.1        Sending PIM MT-ID Join Attribute  ...................   4
    4.2        Receiving PIM MT-ID Join Attribute  .................   5
    4.3        Validating PIM MT-ID Join Attribute  ................   5
    4.4        Conflict Resolution  ................................   6
    4.4.1      Upstream Routers  ...................................   6
    4.4.2      Downstream Routers  .................................   6
    5          PIM MT-ID Join Attribute TLV Format  ................   7
    6          IANA Considerations  ................................   7
    7          Security Considerations  ............................   7
    8          Acknowledgments  ....................................   8
    9          Authors' Addresses  .................................   8
   10          Normative References  ...............................   8
   11          Informative References  .............................   9
   12          Full Copyright Statement  ...........................   9
   13          Intellectual Property  ..............................   9






1. Specification of Requirements

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].


2. Introduction

   Some unicast protocols, such as OSPF and IS-IS, allow a single
   network to be viewed as multiple topologies [RFC4915, RFC5120].  This
   enables PIM to construct multicast distribution trees using separate
   network paths even when the roots of the trees are the same.

   This capability can be used to improve the resilience of multicast
   applications.  For instance, a multicast stream can be duplicated and



Cai & Ou                                                        [Page 2]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


   transported using different network layer addresses simultaneously.
   Assuming that two source trees, (S1, G1) and (S1, G2), are used for
   the stream. By using MT capable unicast routing protocols and
   procedures described in this document, it is possible to construct
   two source trees for (S1, G1) and (S1, G2) in such a way that they do
   not share any transit network segment.  As a result, a single network
   failure will not cause any loss to the stream.

   This draft introduces a new type of PIM Join Attribute used to encode
   the identity of the topology PIM uses for RPF. It is based on
   [ID.ietf-pim-join-attributes], and specifies additional procedures
   and rules to process the attribute and resolve conflict.


3. Functional Overview

3.1. PIM RPF Topology

   PIM RPF topology is a collection of routes used by PIM to perform RPF
   operation when building shared or source trees.  In the rest of the
   document, PIM RPF topology may be simply referred to as "topology"
   when there is no ambiguity.

   In a multi-topology environment, multiple RPF topologies can be
   created in the same network.  A particular source may be reachable in
   only one of the topologies, or in several of them via different
   paths.

   To select the RPF topology for a particular multicast distribution
   tree, one or more of the following can be done.

     1. configure a policy that maps a group range to a topology.  When
        RPF information needs to be resolved for the RP or the sources
        for a group within the range, the RPF lookup takes place in the
        specified topology.  This can be used for PIM-SM/SSM/Bidir.

     2. configure a policy that maps a source prefix range to a
        topology. This can be used for PIM-SM and PIM-SSM.

     3. use the topology identified by the Join Attribute encoding in
        the received PIM packets.


   The details of the first two methods are implementation specific and
   are not discussed in this document.  The specification to support the
   third method is included in this document.





Cai & Ou                                                        [Page 3]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


3.2. PIM MT-ID

   For each PIM RPF topology created, a unique numerical ID is assigned.
   This ID is called PIM MT-ID. PIM MT-ID has the following property,

     - this value is not required to be the same as the MT-ID used by
       the unicast routing protocols that contribute routes to the
       topology.  Although in practice, when only one unicast routing
       protocol (such as OSPF or IS-IS) is used, PIM MT-ID is typically
       assigned the same value as the IGP topology identifier.

     - this value must be unique and consistent within the network
       domain for the same topology

     - 0 is reserved as the default, and MUST NOT be included in the
       join attribute encoding.

     - how to assign a PIM MT-ID to a topology is decided by the network
       administrator and is outside the scope of this document




3.3. Applicability

   The PIM MT-ID join attribute described in this draft applies to PIM
   Join/Assert packets used by PIM SM/SSM/Bidir.  It is not used in any
   other PIM packets, such as Prune, Register, Register-Stop, Graft,
   Graft-ack, DF Election, Candidate-RP, and Bootstrap. As such, it can
   only be used to build shared or source trees for PIM SM/SSM and PIM-
   bidir downstream.

   When this attribute is used in combination with RPF vectors defined
   in [ID.ietf-pim-rpf-vector] [ID.ietf-l3vpn-2547bis-mcast], they are
   processed against the topology identified by the PIM MT-ID attribute.


4. Protocol Specification of PIM MT-ID

4.1. Sending PIM MT-ID Join Attribute

   When a PIM router originates a PIM Join/Assert packet, it may choose
   to encode PIM MT-ID of the topology in which RPF lookup takes place
   for the corresponding (*,G) or (S,G) entry. The chosen PIM MT-ID MUST
   be the one decided by local topology selection configuration if it
   exists, or the one received from downstream routers after conflict
   resolution procedures are applied.




Cai & Ou                                                        [Page 4]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


   The following are the exceptions,

     - a router MUST NOT attach the attribute if PIM MT-ID is 0. The
       value of 0 is ignored on reception.

     - a router SHOULD NOT do so if the upstream router, or one of the
       routers on the LAN does not include "PIM Join Attribute" option
       in its Hello packets.

     - a router SHOULD NOT encode PIM MT-ID for pruned sources.  If
       encoded, the value is ignored.



4.2. Receiving PIM MT-ID Join Attribute

   When a PIM router receives a PIM MT-ID join attribute in a
   Join/Assert packet, it MUST perform the following,

     - validate the attribute encoding.  The detail is described in the
       next section.

     - if the join attribute is valid, use the rules described in the
       section "Conflict Resolution" to determine a PIM MT-ID to use.

     - use the topology identified by the selected PIM MT-ID to perform
       RPF lookup for the (*,G)/(S,G) entry unless a different topology
       is specified by a local configuration.  The local configuration
       always takes precedence.



4.3. Validating PIM MT-ID Join Attribute

   An encoded PIM MT-ID join attribute is valid if all of the following
   conditions are satisfied,

     - there is at most 1 PIM MT-ID attribute encoded.

     - the length field must be 2 and the value must not be 0.


   If an encoded PIM MT-ID join attribute is deemed invalid, it is
   ignored and not forwarded further. The packet is processed as if the
   attribute were not present.

   It is important to note that, if the sender is not a PIM neighbor
   that has included "PIM Join Attribute" option in its Hello packets,



Cai & Ou                                                        [Page 5]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


   or if the "F" bit in the encoding is reset, the encoding may still be
   considered valid by an implementation and is allowed to be forwarded.


4.4. Conflict Resolution

   Depending on whether a PIM router is an upstream or a downstream
   router, the action it takes to resolve conflicting PIM MT-ID
   attributes differs. The detail is described below.


4.4.1. Upstream Routers

   If an upstream router has a local configuration that specifies a
   different topology than that from an incoming Join/Assert packet,
   including the case PIM MT-ID is not encoded in the incoming packet,
   it is not considered a conflict.

   A conflict occurs when a router doesn't have local topology selection
   policy and it has received different PIM MT-ID from Join packets sent
   by its downstream routers or Assert packets from another forwarding
   router on the LAN.

     - if an upstream router receives different PIM MT-ID attributes
       from PIM Join packets, it MUST follow the rules specified in
       [ID.ietf-pim-join-attributes] to select one.  The PIM MT-ID
       chosen will be the one encoded for its upstream neighbor.

     - if an upstream router receives a different PIM MT-ID attribute in
       an ASSERT packet, it MUST use the tie-breaker rules as specified
       in [RFC4601] to determine an ASSERT winner.  PIM MT-ID is not
       considered in deciding a winner from Assert process.


4.4.2. Downstream Routers

   A conflict is detected by a downstream router when it sees a
   different PIM MT-ID attribute from other routers on the LAN,
   regardless of whether the router has local topology selection policy
   or not.

     - if a downstream router sees different PIM MT-ID attributes from
       PIM Join packets, it MUST follow the specification of [RFC4601]
       as if the attribute did not exist.  For example, the router
       suppresses its own Join packet if a Join for the same (S,G) is
       seen.

       The router MUST NOT use the rules specified in [ID.ietf-pim-



Cai & Ou                                                        [Page 6]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


       join-attributes] to select a PIM MT-ID from Join packets sent by
       other downstream routers.

     - if a downstream router sees its preferred upstream router loses
       in the ASSERT process, and the ASSERT winner uses a different PIM
       MT-ID, the downstream router SHOULD still choose the ASSERT
       winner as the RPF neighbour but it MUST NOT encode PIM MT-ID when
       sending Join packets to it.



5. PIM MT-ID Join Attribute TLV Format

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |F|E| Attr Type | Length        | Value                         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



     - F bit: 1 Transitive Attribute.

     - E bit: As specified by [ID.ietf-pim-join-attributes]

     - Attr Type: 3.

     - Length: 2.

     - Value: PIM MT-ID, 1 to 65535.



6. IANA Considerations

   A new PIM Join Attribute type needs to be assigned. 3 is proposed for
   now.


7. Security Considerations

   As a type of PIM Join Attribute, the security considerations
   described in [ID.pim-join-attributes] apply here. Specifically,
   malicious alteration of PIM MT-ID may cause the resiliency goals to
   be violated.






Cai & Ou                                                        [Page 7]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


8. Acknowledgments

   The authors would like to thank Eric Rosen, Ice Wijnands, Dino
   Farinacci, Colby Barth and Les Ginsberg for their input.


9. Authors' Addresses


      Yiqun Cai
      Cisco Systems, Inc
      170 West Tasman Drive
      San Jose, CA 95134

      E-mail: ycai@cisco.com



      Heidi Ou
      Cisco Systems, Inc
      170 West Tasman Drive
      San Jose, CA 95134

      E-mail: hou@cisco.com



10. Normative References

   [RFC2119] S. Bradner, "Key words for use in RFCs to Indicate
   Requirement Levels", RFC 2119, March 1997.

   [RFC4601] Fenner, B., Handley, M., Holbrook, H., and I. Kouvelas,
   "Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol
   Specification (Revised)", RFC 4601, August 2006.

   [ID.ietf-pim-join-attributes] A. Boers, I. Wijnands, E. Rosen, "The
   PIM Join Attribute Format", draft-ietf-pim-join-attributes.













Cai & Ou                                                        [Page 8]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


11. Informative References

   [RFC4915] P. Psenak, S. Mirtorabi, A. Roy, L. Nguyen, P. Pillay-
   Esnault, "Multi-Topology (MT) Routing in OSPF", RFC 4915, June 2007.

   [RFC5120] T. Przygienda, N. Shen, N. Sheth, "M-ISIS: Multi Topology
   (MT) Routing in Intermediate System to Intermediate Systems (IS-
   ISs)", RFC 5120, February 2008.

   [ID.ietf-pim-rpf-vector] I. Wijnands, A. Boers, E. Rosen, "The RPF
   Vector TLV", draft-ietf-pim-rpf-vector.

   [ID.ietf-l3vpn-2547bis-mcast] E. Rosen,R Aggarwal, "Multicast in
   MPLS/BGP IP VPNs", draft-ietf-l3vpn-2547bis-mcast


12. Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


13. Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this



Cai & Ou                                                        [Page 9]


Internet Draft         draft-cai-pim-mtid-00.txt            October 2008


   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.











































Cai & Ou                                                       [Page 10]