1 / 8

BN Discovery via ISIS

draft-dhody-pce-bn-discovery-isis-00.txt. BN Discovery via ISIS. Dhruv Dhody ( dhruvd@huawei.com ) Udayasree Palle ( udayasreepalle@huawei.com ). Motivation for this work. Discover Boundary Node (BN) and their domain information ABR (Area Boundary Router) and area

jadyn
Télécharger la présentation

BN Discovery via ISIS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. draft-dhody-pce-bn-discovery-isis-00.txt BN Discoveryvia ISIS Dhruv Dhody (dhruvd@huawei.com) Udayasree Palle (udayasreepalle@huawei.com) 78th IETF @ Maastricht

  2. 78th IETF @ Maastricht Motivation for this work • Discover Boundary Node (BN) and their domain information • ABR (Area Boundary Router) and area • ASBR (Autonomous system boundary router) and AS • Existing mechanism are incomplete and complicated • BN-discovery is designed to be light and easily extensible

  3. 78th IETF @ Maastricht Application • BRPC [RFC5441] requires Path Computation Element (PCE) [RFC4655] to be aware of BNs for inter-domain path computation. • Enabling PCE to dynamically learn BNs and their neighbor domains. • Help PCE to generate NEIG-PCE-DOMAIN Sub-TLV [RFC5089]

  4. 78th IETF @ Maastricht BND TLV and Sub-tlv BND TLV 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // sub-TLVs // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ BN-Address sub-TLV +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 1 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | address-type | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // BN IP Address // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

  5. 78th IETF @ Maastricht BND TLV and Sub-tlv BN-DOMAIN sub-TLV +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 2 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Domain-type | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // Domain ID // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • BND TLV carried within an IS-IS Router Capability TLV • Flooding scope can be controlled to L1 area, L2 sub-domain, entire ISIS routing domain.

  6. 78th IETF @ Maastricht Next Steps • Standard representation of Domain Sequence across area & AS. • BND can be utilized in inter-layer scenario.

  7. Questions & Comments? 78th IETF @ Maastricht

  8. Thanks! 78th IETF @ Maastricht

More Related