CCAMP Working Group                           D. Dovolsky (Movaz Networks)
                                              I. Bryskin  (Movaz Networks)
                                              D. Awduche  (Isocore)
Internet Draft
Expiration Date: May 2003                                    November 2002
Document: draft-dovolsky-ccamp-ospf-limited-
flooding-00.txt


              Limited Flooding as a scalability improvement to OSPF

               draft-dovolsky-ccamp-ospf-limited-flooding-00.txt

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026 [1].

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time. It is inappropriate to use Internet- Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Abstract



   This draft describes a limited flooding approach to address the
   problem of routing scalability in link state IGPs. The solution is
   based on decomposition  of a routing area into ôzonesö and the
   restriction of the exchange of routing information between zones.
   This approach introduces an extra level in the isolation of
   knowledge within a routing domain. The advantage of this solution is
   that it considerably decreases the amount of information flooded in
   link state advertisements and reduces the size of the link-state
   database (and traffic engineering entries) on network elements
   utilizing link state protocols.   The technique presented in this
   document has been particularized to OSPF in order to make the
   discussion practical and concrete. However, the underlying concepts
   are very general and similar modifications can be easily applied to
   other IGPs, such as ISIS.

Table Of Contents

  Dovolsky, Bryskin, Awduche                Expires May 2003         1

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002



1. Summary for Sub-IP Area


1.1. Summary

   This document describes a generic mechanism to enhance the
   scalability of IGP routing protocols. More particularly, it
   specifies extensions to the OSPF routing protocol to make the
   protocol even more scalable in support of Generalized Multi-Protocol
   Label Switching (GMPLS). The method described is quite general and
   can be applied to other link state protocols, such as ISIS.

1.2. Where does it fit in the Picture of the Sub-IP Work

   This work fits squarely in either the CCAMP or OSPF box.

1.3. Why is it Targeted at this WG

   This draft is targeted at the CCAMP or the OSPF WG, because it
   specifies extensions to the OSPF routing protocols in support of
   GMPLS, because GMPLS is within the scope of the CCAMP WG, and
   because OSPF is within the scope of the OSPF WG.

1.4. Justification

   The WG should consider this document as it specifies the extensions
   to the OSPF routing protocols in support of GMPLS.


2. Overview

   This document proposes a method to enhance the scalability of link
   state interior gateway routing protocols (IGPs). The proposed
   solution is applicable to traditional link state routing protocols
   such as OSPF [1]. The proposed solution is even more pertinent in
   MPLS and GMPLS networks, where the IGP has been extended and
   equipped with traffic engineering and GMPLS extensions.

   The main idea behind the proposed approach is the reduction of a
   single routing area into multiple ôzonesö and the control of routing
   information between the zones. With this approach, it is no longer
   the case that network elements in the same routing area will
   necessarily have an identical copy of the area link state database.
   An important attribute of the zone concept is that it requires
   minimal modifications to the existing IGPs. Another important
   attribute is that it supports asymmetric exchange of routing
   information between network elements in different zones. The
   proposed approach also allows to: (1) decrease the size of the link
   state database on each node, (2) restrict the amount of routing
   information, (3) decrease the overhead associated with flooding, and
   (4) decrease the complexity of path selection.


   Dovolsky, Bryskin, Awduche                       Expires May 2003 2

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

   To make the discussions in this document concrete and practical, we
   have used OSPF to illustrate the concepts. The solution is, however,
   quite general and applies to other link state routing protocols,
   such as ISIS, with very minor modifications.


2.1 Background: Scalability of Interior Gateway Routing Protocols
Context

   Routing scalability is an important issue in operational networks.
   This issue becomes even more acute with the advent of GMPLS, which
   enables the use of IP routing protocols (after appropriate
   extensions) for different types of transport networks.

   The scalability of interior gateway routing protocols (IGPs) for IP
   networks and other types of transport networks is a particularly
   critical issue in operational networks, and is an important
   requirement for major service providers. Yet, many aspects of this
   issue have yet to be satisfactorily resolved. The most generic
   approach to addressing the routing scalability problem is the
   decomposition of a routing domain into multiple routing areas. This
   approach has become an integral part of existing IGP routing
   protocols such as OSPF [1]. Because the concept of routing areas by
   itself is not sufficient to address all nuances of the routing
   scalability problem, new improvements and workarounds have been
   proposed [4, 5, 6]. The intention of virtually all of the proposed
   solutions is to limit the amount of information advertised and to
   limit the amount of information maintained and managed by each
   routing engine on a network element.

   There are many dimensions that demand consideration in attempting to
   address the scalability of routing protocols. The main
   manifestations of lack of scalability in routing protocols is
   excessive consumption of CPU and memory resources on a network
   element, and undue transaction of state information between network
   elements to synchronize their routing databases. The transient
   behavior of the routing protocol is another aspect that could also
   have severe ramifications for scalability.

   In the worst case, the impact of lack of routing protocol
   scalability on the network itself can be devastating. In certain
   circumstances, lack of scalability can result in severe instability
   and a complete collapse of the network itself. Congestive collapse
   of the routing system can also occur because of the duplication of
   packet transmission inherent in the flooding mechanism [8]. In the
   best case, lack of routing scalability can result in inefficient
   network operation. Other manifestations of lack of routing
   scalability include: long convergence time, large path computation
   time, and slow forwarding time.

   Path computation time is a function of the number of routes, the
   size of the link-state database, the amount of traffic engineering
   parameters, and the types of user preference associated with a
   particular instance of the path computation process.  All recently

   Dovolsky, Bryskin, Awduche                       Expires May 2003 3

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

   proposed solutions attempt to improve the routing scalability by
   applying different algorithms to achieve one or more of the
   following objectives: increase the number of SPF calculations [5],
   avoid unnecessary flooding [6], restrict the   database information
   exchange to only traffic-engineering link-state advertisements [4],
   etc.

   It is important to note that the most common operational network
   scenario for link state routing protocols is a single area, which
   encompasses the entire network. In many modern networks (especially
   those utilizing MPLS or GMPLS), the single routing area will
   implement the traffic engineering extensions  (for example [2]). In
   such environments, the routing protocol disseminates the traditional
   link state information as well as traffic engineering data and other
   constraint information. Very large autonomous systems encompassing
   entire continents containing only one routing area are in operation
   today.

   It is also important to note that the issue of multi-area traffic
   engineering is an area in which the industry has not yet reached
   consensus on an effective solution.  As an example, the classical
   approach suggested in [1] of breaking the network into multiple
   areas cannot be used to good effect.

   A typical service provider network is built of network elements with
   different capabilities, such as computational resources and memory.
   Some of them (for instance, routers installed on metro networks) may
   have more resources for keeping large databases and performing fast
   forwarding and path computation than the other (for instance,
   routers installed on access networks).

   The solution proposed in this draft is to break a single link state
   routing area into  ôrouting zones.ö  Routers and other network
   elements within the same zone maintain a synchronized topology state
   database among themselves. This means that network elements within
   the same zone receive full routing information (link-sate, traffic-
   engineering advertisements) from each other.

2.2 The Zone Concept

   The zone concept refers to a ôsoftö partitioning of a routing area
   into sub-domains, which allows to control the amount of routing
   information exchange between the sub-domains in the area. The zone
   concept also allows to decouple the advertisement of traditional
   LSAs defined in the original OSPF specification ([1]) from the
   advertisement of Traffic Engineering LSAs defined in the TE and
   GMPLS extensions.

   The zone concept allows grouping a collection of network elements
   into a ôzoneö which can be viewed as a single logical network
   entity. Each zone is associated with one or more zone border routers
   (ZBR). A ZBR exists at the boundary between a zone and the remainder
   of the routing area exterior to the zone. That is, a ZBR has routing
   IGP routing adjacencies with network elements within and outside the

   Dovolsky, Bryskin, Awduche                       Expires May 2003 4

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

   zone. On the other hand, we say a network element is in the
   æinteriorÆ of a zone if it maintains IGP routing adjacencies with
   only network elements within its zone.

   We define three types of routing visibility to support the zone
   concept:

     (1) full visibility,
     (2) limited visibility, and
     (3) zero visibility.

   In the following discussion, when we say a ônetwork element,ö we
   mean a network element participating in the link state routing
   protocol.

   To fix these ideas, let us consider two zones, say zone æAÆ and zone
   æBÆ. We say that network elements within zone æAÆ have ôfull
   visibilityö of zone æBÆ if the network elements participating in the
   link state routing protocol in zone  æAÆ receive routing information
   from all network elements in   zone æBÆ.

   We say that network elements within zone æAÆ have ôlimited
   visibilityö of zone æBÆ if they receive zero routing information
   from network elements in the interior of zone æBÆ, with the
   exception of LSAs from one or more Zone Border Routers (ZBRs) at the
   boundary between the two zones.

   Lastly, we say that network elements within zone æAÆ have ôzero
   visibilityö of zone B if they receive zero routing information from
   any router that belongs to zone B.

   As a general concept, the notion of visibility defined above is not
   symmetric. Thus, it may be the case that zone æAÆ can have limited
   or zero visibility of zone æBÆ, while zone æBÆ may have full
   visibility of zone æAÆ.

   An immediate application of this concept in IP over circuit switch
   networks occurs within the context of the peer and augmented models.
   In such settings, some IP routers may have limited or full
   visibility into the circuit switch network, but it may not be
   beneficial for the circuit switch network elements to have full
   visibility into the IP network.

   Note, that routers within a given zone may have full visibility of
   some zones while having limited or zero visibility of other zones.
   For example, in an circuit switch network utilizing GMPLS, access
   network elements within an æaccess zoneÆ may  have limited
   visibility of a metro-area network zone and zero visibility of a
   long-haul network zone, while metro-area network elements may have
   full visibility of some access network zones and limited visibility
   of a long-haul network zone.

   This draft allows decoupling the advertisement of æregular LSAsÆ
   from the advertisement of traffic engineering LSAsÆ. So that

   Dovolsky, Bryskin, Awduche                       Expires May 2003 5

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

   different types of visibility can be applied with respect to
   advertisement of regular LSAs and traffic engineering LSAs. For
   example, routers within zone æAÆ may have full visibility of zone
   æBÆ with respect to regular LSA advertisements, but limited or zero
   visibility with respect to traffic engineering advertisements. The
   nature of routing visibility (full, limited or zero) between two
   zones can be asymmetrical, as noted earlier. This important
   characteristic of the zone concept is certainly worth emphasizing.
   For example, routers within zone æAÆ may have limited visibility of
   zone æBÆ, while routers with zone æBÆ may have full visibility of
   zone æAÆ.

   Routing visibility between two zones æAÆ and æBÆ is configured on
   ZBR(s) that belong(s) to both zones by limiting the flooding of the
   routing information of certain types (regular link-state
   advertisements, traffic-engineering advertisements, or both) through
   ZBR interfaces connecting zone æAÆ and zone æBÆ. ZBRs are
   responsible for advertising themselves as default routes for network
   elements within their zones, to support routing with zones that have
   limited or zero visibility with respect to the target zone.

   Transitive characteristics of zone visibility: If zone æAÆ is not
   adjacent to zone æBÆ (i.e. no ZBRs in common), then we say that
   network elements within zone æAÆ have full visibility of zone æBÆ if
   they have full visibility of zone æCÆ, which is adjacent to zone æAÆ
   and have full visibility of zone æBÆ. Otherwise, zone æAÆ has zero
   visibility of zone æBÆ.    This is an expression of the transitive
   characteristics of zone visibility.


                                   [---]
                            -------[ B ]----------
                           |       [---]          |
                           |                      |
                         [---]Limited Visibility [---]
                         [ A ]     Zone1         [ C ]
                         [---]                   [---]
                           |       [---]          |
                            -------[ZBR]----------
                            -------[---]----------
                           |                      |
                         [---]  Full Visibility  [---]
                         [ D ]     Zone          [ E ]
                         [---]                   [---]
                           |                      |
                           |       [---]          |
                            -------[ZBR]----------
                            -------[---]----------
                           |                      |
                         [---]Limited Visibility [---]
                         [ E ]     Zone2         [ F ]
                         [---]                   [---]
                           |                      |
                           |       [---]          |

   Dovolsky, Bryskin, Awduche                       Expires May 2003 6

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

                            -------[ G ]----------
                                   [---]


   In the example above routers A, B, C are within Limited Visibility
   Zone1.  They contain full routing and traffic engineering
   information about each other. However, the only information they
   have about the rest of the network is the one that was generated by
   the upper ZBR. Likewise, routers E, F and G are within Limited
   Visibility Zone2. Routers D and E are within Full Visibility Zone.
   They contain full routing and traffic engineering information about
   all other routers in all zones.

   The approach described in this draft is advantageous because it
   allows controlling and decreasing the amount of routing information
   and associated processing overhead on network elements. In some
   types of network elements, it may also decrease convergence time and
   boost the routing/forwarding performance.  The traffic engineering
   capabilities also become more scalable because constraint-based path
   selection, and tunnel setup and management can be distributed
   between access network elements and ZBR(s).

   This approach does not require changes to the routing protocol
   packet format. And it is enough to have only ZBR(s) routers
   supporting this feature.


3. Proposed solution

   A routing area may be divided into multiple zones by appropriately
   configuring the interfaces of zone boarder routers (ZBRs). Each pair
   of adjacent zones may be configured to have full or limited routing
   visibility with each other. Each pair of adjacent zones may have one
   or more ZBRs in common. Each ZBR in turn may have a number of
   interfaces configured with one or more zone identifiers (zone IDs)
   and flooding type. The flooding type indicates the type of routing
   information that may be flooded across the interface. It may have
   one of the following values:
      . link-state advertisements only;
      . traffic engineering advertisements only;
      . both

   The zone concept requires a slight modification to the OSPF Neighbor
   state machine and flooding procedures [1]. The OSPF Neighbor state
   machine defined in [1] should be amended as follows:

   ô10.3.  The Neighbor state machine
   à
         State(s):  ExStart
            Event:  NegotiationDone
        New state:  Exchange
           Action:  The router must list the contents of its entire
   area link state database in the neighbor Database summary list.


   Dovolsky, Bryskin, Awduche                       Expires May 2003 7

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

   If an interface associated with this neighbor is configured with
   limited flooding option and one or more zone IDs, each non self-
   originated link-state and/or traffic engineering database entry must
   be considered for inclusion into the Database Summary List according
   to the following rule:
      . non self-originated database entries must be included only if
        they are received from incoming interfaces that have non-zero
        overlapping list of zone IDs with the interface in question;
      . self-originated entries must be included regardless of the
        interface in question zone IDs;
      . both self-originated and non self-originated database entries
        that are disallowed to be distributed over the interface in
        question by its configured flooding type MUST NOT be included;

    ô13.3. Next step in the flooding procedure

   à
        Depending upon the LSA's LS type, the LSA can be flooded out
        only certain interfaces.  These interfaces, defined by the
        following, are called the eligible interfaces:
   à

        When flooding an LSA, which has just been received, each
        outgoing interface must be considered on whether it is eligible
        outgoing candidate or not by comparing itÆs list of configured
        zone IDs with one configured for the interface the LSA has
        arrived on. The interface in question must be considered as
        eligible outgoing candidate if all following conditions are
        true:
      . it has a non-zero overlapping list of zone IDs with the
        incoming interface;
      . this LSA type is allowed to be flooded over the interface in
        question by its configured flooding type.


   In every place in the protocol implementation, where a locally
   originated Router LSA is needed to be flooded to a neighbor, the
   following procedure should be performed:

   For interfaces configured with one or more zone IDs and limited
   flooding option the Default Route stub network link (0.0.0.0/0) must
   be added to locally originated Router LSA. The Router LSA header
   link number, length and checksum should be updated appropriately.

   As a result of the described extensions routers within a particular
   zone will receive the routing information only from routers within
   the same zone and from other zones, which are fully visible from the
   router. They will also receive Router LSAs originated on ZBRs that
   belong to the zones, which the routers have limited visibility to
   (these LSAs contain Default Route stub network links identifying
   default routes that point to the ZBRs). They will receive no routing
   information from routers within zones with zero routing visibility.

4. Distributed Traffic Engineering across multiple zones

   Dovolsky, Bryskin, Awduche                       Expires May 2003 8

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002


   As a consequence of the flooding type definition (see 3.) the
   limited visibility of a router to a particular zone may apply to:
   a) link-state information;
   b) traffic engineering information;
   c) both.

   If the router is presented with a request to establish a traffic
   engineering tunnel that should go through one or more zones with the
   limited traffic engineering visibility, the path selection and
   tunnel setup is performed in the distributed way. Specifically, the
   originating router can define a path for the tunnel and signal the
   tunnel only up to one of ZBRs of a limited visibility zone towards
   the destination. Note, that routers learn about ZBRs via Default
   Route stub network links (0.0.0.0/0) found in received Router LSAs.
   When the setup message arrives on the ZBR, it repeats the process.
   Specifically, it defines the path and signal the tunnel either to
   the destination or to ZBR of next zone towards the destination
   depending on whether the destination is located in the zone fully
   visible from the computing ZBR or not. This process completes when
   the tunnel is established.

   If a router has full visibility towards the tunnel destination as
   far as link-state information is concerned, but has the limited
   traffic engineering visibility, it can use the full link-state
   visibility while deciding which ZBR to forward the tunnel setup
   message to in case he knows about more than one.

5. Topological Considerations Relating to Zones

   It may be necessary to impose some topological restrictions on the
   connectivity of zones within a routing area, especially for
   traditional hop by hop routing. Such restrictions are necessary to
   in order to avoid routing anomalies such as blackholes and routing
   loops.

   For getting end-to-end routing connectivity and avoiding black
   holes, some central (core) zone should be configured with full
   visibility. Hierarchical configured zones donÆt have to have direct
   connectivity to this core zone.

6. Example Network


                                +--------------+
                                |    Zone A    |
                                +--------------+
                                 */LF-Z1     *\ LF-Z2
                                */          *\
                               */             *\
                         +---------+             +---------+
                         |  Zone B |             |  Zone X |
                         |        |             |         |

   Dovolsky, Bryskin, Awduche                       Expires May 2003 9

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

                         +---------+             +---------+
                      LF-Z3 */  \ LF-Z4       LF-Z5 / *\ LF-Z6
                         */    \                 /   *\
                   +--------+ +--------+    +--------+ +--------+
                   | Zone C | | Zone D |    | Zone Y | | Zone Z |
                   |    X   | |       |    |        | |       |
                   +--------+ +--------+    +--------+ +--------+



   The above figure provides an example topology consisting of seven
   (7) zones. While not a requirement, a likely configuration of zones
   will be aligned with some topological or geographic regions. For
   example, zone A may map to a network backbone, zones B and X may map
   to local (interconnected) POPs, and zones C, D, Y and Z may map to
   separate access networks.  In such a configuration, the zones could
   operate in the following fashion:

      . the zones C, D, Y and Z, have a limited visibility of directly
        attached zones, i.e., B and X respectively;
      . the zones  B and X have full visibility of directly attached
        zones C, D, Y and Z, while having a limited visibility of zone
        A;
      . zone A has a full visibility of the directly connected zones B
        and X, and therefore also a full visibility of the subtending
        zones C, D Y and Z (and thus, becoming a backbone zone for the
        whole network)

   This example network can support both standard IP forwarding as well
   as MPLS Label Switch Paths (LSPs).  To illustrate, consider an LSP
   terminating at endpoints at zone C (router C) and zone Y (router Y).
   Since, router C does not have information about router Y, it will
   route the LSP to ZBR of the directly attached zone (A, router LF-
   Z3). Since router LF-Z3 does not have information about router Y, it
   too will route the LSP to the ZBR of the directly zone (A, router
   LF-Z1). Lastly, since router LF-Z1 has full information about all
   routers on the network, it calculate a complete route for remaining
   portion of the LSP.

7. Compatibility Issues

   There should be no interoperability issues with routers and other
   network elements utilizing OSPF that do not implement this proposal.

8. Security Considerations

   This document does not raise new security issues beyond those that
   exist in OSPF with traffic engineering and GMPLS extensions. The
   method described in this document can actually enhance security
   because it can be used to block certain types of routing data from
   being advertised to a subset of network elements.

9. References


   Dovolsky, Bryskin, Awduche                       Expires May 200310

     draft-dovolsky-ccamp-ospf-limited-flooding-01.txt    November 2002

     [1] Moy, J., "OSPF Version 2", RFC 2328, April 1998.

     [2] Katz, D., D. Yeung and K. Kompella, "Traffic Engineering
   Extensions to OSPF", work in progress.

     [3] Coltun, Rob, "The OSPF Opaque LSA Option", RFC 2370, FORE
         Systems, July 1998.

     [4] Venkata Naidu, "OSPF TE Only Option", draft-venkata-ospf-te-
   only-option-00.txt, April 2002.

     [5] A. S. Maunder, G. Choudhury, "Explicit Marking and Prioritized
   Treatment of Specific IGP Packets for Faster IGP Convergence and
   Improved Network Scalability and Stability", <draft-ietf-ospf-
   scalability-00.txt>, March, 2001.

     [6] Alex Zinin, Mike Shand, "Flooding optimizations in link-state
   routing protocols", <draft-ietf-ospf-isis-flood-opt-01.txt>, March
   2001.

    [7] Yong Xue at all, "Carrier Optical Services Requirements",
   <draft-ietf-ipo-carrier-requirements-01.txt>, March, 2002.

   [8] Ash et al, ôCongestion Avoidance and Control for OSPF
   Networks,ÆÆ <draft-ash-manral-ospf-congestion-control-00.txt>,
   April 2002.

10. Acknowledgements
    The authors of this document would like to acknowledge the valuable
   inputs from Lou Berger.

11. Author's Addresses

   Dan Dovolsky
   Movaz Networks
   7926 Jones Branch Dr., Suite 615
   McLean, VA 22102
   Phone: (703)847-2438
   Email: ddovolsky@movaz.com

   Igor Bryskin
   Movaz Networks
   7926 Jones Branch Dr., Suite 615
   McLean, VA 22102
   Phone: (703)847-4208
   Email: ibryskin@movaz.com

   Daniel Awduche
   Isocore Corporation
   8201 Greensboro Drive, Suite 102
   McLean, VA 22102
   Phone: (703)298-5291
   Email: awduche@awduche.com