Internet Engineering Task Force (IETF)                      S. Litkowski
Request for Comments: 8333                                   B. Decraene
Category: Standards Track                                         Orange
ISSN: 2070-1721                                              C. Filsfils
                                                           Cisco Systems
                                                             P. Francois
                                                  Individual Contributor
                                                           February
                                                              March 2018

     Micro-loop Prevention by Introducing a Local Convergence Delay

Abstract

   This document describes a mechanism for link-state routing protocols
   that prevents local transient forwarding loops in case of link
   failure.  This mechanism proposes a two-step convergence by
   introducing a delay between the convergence of the node adjacent to
   the topology change and the network-wide convergence.

   Because this mechanism delays the IGP convergence, it may only be
   used for planned maintenance or when Fast Reroute (FRR) protects the
   traffic during the time between the link failure time and the IGP
   convergence.

   The proposed mechanism is limited to the link down link-down event in order to keep the
   mechanism simple.

   Simulations using real network topologies have been performed and
   show that local loops are a significant portion (>50%) of the total
   forwarding loops.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc8333.

Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  Acronyms  . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  Requirements Language . . . . . . . . . . . . . . . . . .   4
   3.  Side Effects of Transient Forwarding Loops  . . . . . . . . .   4
     3.1.  FRR Inefficiency  . . . . . . . . . . . . . . . . . . . .   4
     3.2.  Network Congestion  . . . . . . . . . . . . . . . . . . .   7
   4.  Overview of the Solution  . . . . . . . . . . . . . . . . . .   8
   5.  Specification . . . . . . . . . . . . . . . . . . . . . . . .   8
     5.1.  Definitions . . . . . . . . . . . . . . . . . . . . . . .   8
     5.2.  Regular IGP Reaction  . . . . . . . . . . . . . . . . . .   9
     5.3.  Local Events  . . . . . . . . . . . . . . . . . . . . . .   9
     5.4.  Local Delay for Link Down . . . . Link-Down Events  . . . . . . . . . . . .  10
   6.  Applicability . . . . . . . . . . . . . . . . . . . . . . . .  10
     6.1.  Applicable Case: Local Loops  . . . . . . . . . . . . . .  11  10
     6.2.  Non-applicable Case: Remote Loops . . . . . . . . . . . .  11
   7.  Simulations . . . . . . . . . . . . . . . . . . . . . . . . .  12
   8.  Deployment Considerations . . . . . . . . . . . . . . . . . .  13
   9.  Examples  . . . . . . . . . . . . . . . . . . . . . . . . . .  13
     9.1.  Local Link Down . . . Link-Down Event . . . . . . . . . . . . . . . . . .  14
     9.2.  Local and Remote Event  . . . . . . . . . . . . . . . . .  17
     9.3.  Aborting Local Delay  . . . . . . . . . . . . . . . . . .  19
   10. Comparison with Other Solutions . . . . . . . . . . . . . . .  21
     10.1.  PLSN . . . . . . . . . . . . . . . . . . . . . . . . . .  21
     10.2.  oFIB . . . . . . . . . . . . . . . . . . . . . . . . . .  22
   11. Implementation Status . . . . . . . . . . . . . . . . . . . .  23
   12. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  24
   13.  22
   12. Security Considerations . . . . . . . . . . . . . . . . . . .  24
   14.  22
   13. References  . . . . . . . . . . . . . . . . . . . . . . . . .  24
     14.1.  23
     13.1.  Normative References . . . . . . . . . . . . . . . . . .  24
     14.2.  23
     13.2.  Informative References . . . . . . . . . . . . . . . . .  25  23
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  26  24
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  26  24

1.  Introduction

   Micro-loops and some potential solutions are described in [RFC5715].
   This document describes a simple targeted mechanism that prevents
   micro-loops that are local to the failure.  Based on network
   analysis, local failures micro-loops make up a significant portion of the micro-
   loops.
   micro-loops.  A simple and easily deployable solution for these local
   micro-loops is critical because these local loops cause some traffic
   loss after an FRR alternate has been used (see Section 3.1).

   Consider the case in Figure 1 where S does not have an LFA (Loop-Free
   Alternate) to protect its traffic to D when the S-D link fails.  That
   means that all non-D neighbors of S on the topology will send to S
   any traffic destined to D; if a neighbor did not, then that neighbor
   would be loop-free.  Regardless of the advanced FRR technique used,
   when S converges to the new topology, it will send its traffic to a
   neighbor that is not loop-free and will thus cause a local micro-
   loop.  The deployment of advanced FRR techniques motivates this
   simple router-local mechanism to solve this targeted problem.  This
   solution can work with the various techniques described in [RFC5715].

                                  D ------ C
                                  |        |
                                  |        | 5
                                  |        |
                                  S ------ B

                                 Figure 1

   In Figure 1, all links have a metric of 1 except the B-C link, which
   has a metric of 5.  When the S-D link fails, a transient forwarding
   loop may appear between S and B if S updates its forwarding entry to
   D before B does.

2.  Terminology

2.1.  Acronyms

   FIB: Forwarding Information Base

   FRR: Fast Reroute

   IGP: Interior Gateway Protocol

   LFA: Loop-Free Alternate
   LSA: Link State Advertisement

   LSP: Link State Packet

   MRT: Maximally Redundant Tree

   oFIB: Ordered FIB

   PLR: Point of Local Repair

   PLSN: Path Locking via Safe Neighbors

   RIB: Routing Information Base

   RLFA: Remote Loop-Free Alternate

   SPF: Shortest Path First

   TTL: Time to Live

2.2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

3.  Side Effects of Transient Forwarding Loops

   Even if they are very limited in duration, transient forwarding loops
   may cause significant network damage.

3.1.  FRR Inefficiency

   In Figure 2, we consider an IP/LDP routed network.

                                 D
                               1 |
                                 |    1
                                 A ------ B
                                 |        |    ^
                              10 |        | 5  | T
                                 |        |    |
                                 E--------C
                                 |    1
                               1 |
                                 S

                                 Figure 2

   An RSVP-TE tunnel T, provisioned on C and terminating on B, is used
   to protect the traffic against C-B link failure (the IGP shortcut
   feature, defined in [RFC3906], is activated on C).  The primary path
   of T is C->B and FRR is activated on T, providing an FRR bypass or
   detour using path C->E->A->B.  On router C, the next hop to D is the
   tunnel T, thanks to the IGP shortcut.  When the C-B link fails:

   1.  C detects the failure and updates the tunnel path using a
       preprogrammed FRR path.  The traffic path from S to D becomes
       S->E->C->E->A->B->A->D.

   2.  In parallel, on router C, both the IGP convergence and the TE
       tunnel convergence (tunnel path recomputation) are occurring:

       *  The tunnel T path is recomputed and now uses C->E->A->B.

       *  The IGP path to D is recomputed and now uses C->E->A->D.

   3.  On C, the tail-end of the TE tunnel (router B) is no longer on
       the shortest-path tree (SPT) to D, so C does not continue to
       encapsulate the traffic to D using the tunnel T and updates its
       forwarding entry to D using the next-hop E.

   If C updates its forwarding entry to D before router E, there would
   be a transient forwarding loop between C and E until E has converged.

   Table 1 describes a theoretical sequence of events happening when the
   B-C link fails.  This theoretical sequence of events should only be
   read as an example.

   +-----------+--------+-------------------+--------------------------+

   +------------+--------+---------------------+-----------------------+
   |  Network   |  Time  |   Router C Events   |    Router E Events    |
   | Condition  |        |                     |                       |
   +-----------+--------+-------------------+--------------------------+
   +------------+--------+---------------------+-----------------------+
   |    S->D    |        |                     |                       |
   | Traffic  |        |                   |                          |
   | OK |        |                     |                       |
   |            |        |                     |                       |
   |    S->D    |   t0   |    Link B-C fails   |     Link B-C fails    |
   |  Traffic   |        |                     |                       |
   |    lost    |        |                     |                       |
   |            |        |                     |                       |
   |            | t0+20  |    C detects the    |                       |
   |            |   ms   |       failure       |                       |
   |            |        |                     |                       |
   |    S->D    | t0+40  |   C activates FRR   |                       |
   | Traffic  |   ms   |                   |                          |
   | OK |   ms   |                     |                       |
   |            |        |                     |                       |
   |            | t0+50  | C updates its local |                       |
   |            |   ms   |   local       LSP/LSA       |                       |
   |            |        |                     |                       |
   |            | t0+60  |  C schedules SPF floods its local |                       |
   |            |   ms   |      (100 ms)   updated LSP/LSA   |                       |
   |            |        |                     |                       |
   |            | t0+70 t0+62  |   C floods its schedules SPF   |                       |
   |            |   ms   |   local updated   |                          |
   |           |        |      LSP/LSA       (100 ms)      |                       |
   |            |        |                     |                       |
   |            | t0+87  |                     |   E receives LSP/LSA from  |
   |            |   ms   |                     |  from C and schedules SPF (100 |
   |           |        |                   |           ms) floods it |
   |            |        |                     |                       |
   |            | t0+117 t0+92  |                     |  E floods LSP/LSA from C schedules SPF (100 |
   |            |   ms   |                     |          ms)          |
   |            |        |                     |                       |
   |            | t0+160 t0+163 |    C computes SPF   |                       |
   |            |   ms   |                     |                       |
   |            |        |                     |                       |
   |            | t0+165 |  C starts updating  |                       |
   |            |   ms   |     its RIB/FIB     |                       |
   |            |        |                     |                       |
   |            | t0+193 |                     |     E computes SPF    |
   |            |   ms   |                     |                       |
   |            |        |                     |                       |
   |            | t0+199 |                     | E starts updating its |
   |            |   ms   |                     |        RIB/FIB        |
   |            |        |                     |                       |
   |    S->D    | t0+255 |    C updates its    |                       |
   |  Traffic   |   ms   |    RIB/FIB for D    |                       |
   |    lost    |        |                     |                       |
   |            |        |                     |                       |
   |            | t0+340 |  C convergence ends |                       |
   |            |   ms   |        ends                     |                       |
   |            |        |                     |                       |
   |    S->D    | t0+443 |                     | E updates its RIB/FIB |
   | Traffic OK |   ms   |                     |         for D         |
   |     OK    |        |                   |                          |
   |            |        |                     |                       |
   |            | t0+470 |                     |   E convergence ends  |
   |            |   ms   |                     |                       |
   +-----------+--------+-------------------+--------------------------+
   +------------+--------+---------------------+-----------------------+

                                  Table 1

   The issue described here is completely independent of the FRR
   mechanism involved (e.g., TE FRR, LFA/RLFA, MRT, etc.) when the
   primary path uses hop-by-hop routing.  The protection enabled by FRR
   works perfectly but only ensures protection until the PLR has
   converged (as soon as the PLR has converged, it replaces its FRR path
   with a new primary path).  When implementing FRR, a service provider
   wants to guarantee a very limited loss of connectivity time.  The
   example described in this section shows that the benefit of FRR may
   be completely lost due to a transient forwarding loop appearing when
   PLR has converged.  Delaying FIB updates after the IGP convergence
   (1) may allow the FRR path to be kept until the neighbors have
   converged and (2) preserves the customer traffic.

3.2.  Network Congestion

   In Figure 3, when the S-D link fails, a transient forwarding loop may
   appear between S and B for destination D.  The traffic on the S-B
   link will constantly increase due to the looping traffic to D.
   Depending on the TTL of the packets, the traffic rate destined to D,
   and the bandwidth of the link, the S-B link may become congested in a
   few hundreds of milliseconds and will stay congested until the loop
   is eliminated.

                                       1
                                  D ------ C
                                  |        |
                                1 |        | 5
                                  |        |
                             A -- S ------ B
                                / |    1
                               F  E

                                 Figure 3

   The congestion introduced by transient forwarding loops is
   problematic as it can affect traffic that is not directly affected by
   the failing network component.  In Figure 3, the congestion of the
   S-B link will impact some customer traffic that is not directly
   affected by the failure, e.g., traffic from A to B, F to B, and E to
   B.  Class of service may mitigate the congestion for some traffic.

   However, some traffic not directly affected by the failure will still
   be dropped as a router is not able to distinguish the looping traffic
   from the normally forwarded traffic.

4.  Overview of the Solution

   This document defines a two-step convergence initiated by the router
   detecting a failure and advertising the topological changes change in the
   IGP.  This introduces a delay between network-wide convergence and
   the convergence of the local router.

   The proposed solution described in this document is limited to local link down link-down
   events in order to keep the solution simple.

   This ordered convergence is similar to the ordered FIB (oFIB)
   approach defined in [RFC6976], but it is limited to only a "one-hop"
   distance.  As a consequence, it is more simple and becomes a local-only local-
   only feature that does not require interoperability.  This benefit
   comes with the limitation of eliminating transient forwarding loops
   involving the local router only.  The proposed mechanism also reuses some
   concepts described in [PLSN].

5.  Specification

5.1.  Definitions

   This document refers to the following existing IGP timers.  These
   timers may be standardized or implemented as a vendor-specific local
   feature.

   o  LSP_GEN_TIMER: The delay between the consecutive generation of two
      local LSPs/LSAs.  From an operational point of view, this delay is
      usually tuned to batch multiple local events in a single local
      LSP/LSA update.  In IS-IS, this timer is defined as
      minimumLSPGenerationInterval [ISO10589].  In OSPF version 2, this
      timer is defined as MinLSInterval [RFC2328].  It is often
      associated with a vendor-specific damping mechanism to slow down
      reactions by incrementing the timer when multiple consecutive
      events are detected.

   o  SPF_DELAY: The delay between the first IGP event triggering a new
      routing table computation and the start of that routing table
      computation.  It is often associated with a damping mechanism to
      slow down reactions by incrementing the timer when the IGP becomes
      unstable.  As an example, [BACKOFF] defines a standard SPF delay
      algorithm.

   This document introduces the following new timer:

   o  ULOOP_DELAY_DOWN_TIMER: Used to slow down the local node
      convergence in case of link down link-down events.

5.2.  Regular IGP Reaction

   When the status of an adjacency or link changes, the regular IGP
   convergence behavior of the router advertising the event involves the
   following main steps:

   1.  IGP is notified of the up/down event.

   2.  The IGP processes the notification and postpones the reaction for
       LSP_GEN_TIMER ms.

   3.  Upon LSP_GEN_TIMER expiration, the IGP updates its LSP/LSA and
       floods it.

   4.  The SPF computation is scheduled in SPF_DELAY ms.

   5.  Upon SPF_DELAY timer expiration, the SPF is computed, and then
       the RIB and FIB are updated.

5.3.  Local Events

   The mechanism described in this document assumes that there has been
   a single link failure as seen by the IGP area/level.  If this
   assumption is violated (e.g., multiple links or nodes failed), then
   regular IP convergence must be applied (as described in Section 5.2).

   To determine if the mechanism is applicable or not, an implementation
   SHOULD implement logic to correlate the protocol messages (LSP/LSA)
   received during the SPF scheduling period in order to determine the
   topology changes that occurred.  This is necessary as multiple
   protocol messages may describe the same topology change, and a single
   protocol message may describe multiple topology changes.  As a
   consequence, determining a particular topology change MUST be
   independent of the order of reception of those protocol messages.
   How the logic works is left to the implementation.

   Using this logic, if an implementation determines that the associated
   topology change is a single local link failure, then the router MAY
   use the mechanism described in this document; otherwise, the regular
   IP convergence MUST be used.

   In Figure 4, let router B be the computing router when the link B-C
   fails.  B updates its local LSP/LSA describing the link B-C as down,
   C does the same, and both start flooding their updated LSPs/LSAs.
   During the SPF_DELAY period, B and C learn all the LSPs/LSAs to
   consider.  B sees that C is flooding an advertisement that indicates
   that a link is down, and B is the other end of that link.  B
   determines that B and C are describing the same single event.  Since
   B receives no other changes, B can determine that this is a local
   link failure and may decide to activate the mechanism described in
   this document.

                              +--- E ----+--------+
                              |          |        |
                       A ---- B -------- C ------ D

                                 Figure 4

5.4.  Local Delay for Link Down Link-Down Events

   This document introduces a change in step 5 (see list in Section 5.2)
   so that, upon an adjacency or link down link-down event, the local convergence
   is delayed compared to the network-wide convergence.  The new step 5
   is described below:

   5.  Upon SPF_DELAY timer expiration, the SPF is computed.  If the
       condition of a single local link down link-down event has been met, then an
       update of the RIB and the FIB MUST be delayed for
       ULOOP_DELAY_DOWN_TIMER ms.  Otherwise, the RIB and FIB SHOULD be
       updated immediately.

   If a new convergence occurs while ULOOP_DELAY_DOWN_TIMER is running,
   ULOOP_DELAY_DOWN_TIMER is stopped, and the RIB/FIB SHOULD be updated
   as part of the new convergence event.

   As a result of this addition, routers local to the failure will
   converge slower than remote routers.  Hence, it SHOULD only be done
   for a non-urgent convergence, such as administrative deactivation
   (maintenance) or when the traffic is protected by FRR.

6.  Applicability

   As previously stated, this mechanism only avoids the forwarding loops
   on the links between the node local to the failure and its neighbors.
   Forwarding loops may still occur on other links.

6.1.  Applicable Case: Local Loops

   In Figure 5, let us consider the traffic from G to F.  The primary
   path is G->D->C->E->F.  When the link C-E fails, if C updates its
   forwarding entry for F before D, a transient loop occurs.  This is
   sub-optimal as C has FRR enabled; this also it breaks the C's FRR forwarding
   because all even though upstream
   routers are still forwarding the traffic to
   themselves. C.

                          A ------ B ----- E
                          |              / |
                          |             /  |
                      G---D------------C   F

                      All the links have a metric of 1

                                 Figure 5

   By implementing the mechanism defined in this document on C, when the
   C-E link fails, C delays the update of its forwarding entry to F, in
   order to allow some time for D to converge.  FRR on C keeps
   protecting the traffic during this period.  When the timer
   ULOOP_DELAY_DOWN_TIMER expires on C, its forwarding entry to F is
   updated.  There is no transient forwarding loop on the link C-D.

6.2.  Non-applicable Case: Remote Loops

   In Figure 6, let us consider the traffic from G to K.  The primary
   path is G->D->C->F->J->K.  When the C-F link fails, if C updates its
   forwarding entry to K before D, a transient loop occurs between C and
   D.

                   A ------ B ----- E --- H
                   |                      |
                   |                      |
               G---D--------C ------F --- J ---- K

               All the links have a metric of 1 except B-E=15

                                 Figure 6

   By implementing the mechanism defined in this document on C, when the
   link C-F fails, C delays the update of its forwarding entry to K,
   allowing time for D to converge.  When the timer ULOOP_DELAY_DOWN_TIMER expires
   on C, its forwarding entry to F is updated.  There is no transient
   forwarding loop between C and D.  However, a transient forwarding
   loop may still occur between D and A.  In this scenario, this
   mechanism is not enough to address all the possible forwarding loops.
   However, it does not create additional traffic loss.  Besides, in
   some cases -- such as when the nodes update their FIB in the order C,
   A, D because the router A is quicker than D to converge -- the
   mechanism may still avoid the forwarding loop that would have
   otherwise occurred.

7.  Simulations

   Simulations have been run on multiple service-provider topologies.
   We evaluated the efficiency of the mechanism on eight different
   service-provider topologies (different network size and design).
   Table 2 shows displays the number of tuples (link, destination, PLR, backup
   next hop) that may loop. gain for each topology.

                            +----------+------+
                            | Topology | Gain |
                            +----------+------+
                            |    T1    | 71%  |
                            |    T2    | 81%  |
                            |    T3    | 62%  |
                            |    T4    | 50%  |
                            |    T5    | 70%  |
                            |    T6    | 70%  |
                            |    T7    | 59%  |
                            |    T8    | 77%  |
                            +----------+------+

                                  Table 2: Number of Repair/Dst That May Loop 2

   We evaluated the efficiency of the mechanism on eight different
   service-provider topologies (different network size and design).  The
   benefit is displayed in the table above.  The benefit is evaluated gain as follows:

   o  We considered a tuple (link A-B, destination D, PLR S, backup
      next-hop N) as a loop if, upon link A-B failure, the flow from a
      router S upstream from A (A could be considered as PLR also) to D
      may loop due to convergence time difference between S and one of
      its neighbors N.

   o  We evaluated the number of potential loop tuples in normal
      conditions.

   o  We evaluated the number of potential loop tuples using the same
      topological input but taking into account that S converges after
      N.

   o  The gain is how many the relative number of loops (both remote and local)
      we succeed in suppressing.

   On

   For topology 1, implementing the local delay prevented 71% of the
   transient forwarding loops created by the failure of any link are prevented by implementing the local delay. link.  The
   analysis shows that all local loops are prevented and only remote
   loops remain.

8.  Deployment Considerations

   Transient forwarding loops have the following drawbacks:

   o  They limit FRR efficiency.  Even if FRR is activated within 50 ms,
      as soon as the PLR has converged, the traffic may be affected by a
      transient loop.

   o  They may impact traffic not directly affected by the failure (due
      to link congestion).

   This

   The local delay proposal mechanism is a transient forwarding loop avoidance
   mechanism (like oFIB).  Even if it only addresses local transient
   loops, the efficiency versus complexity comparison of the mechanism
   makes it a good solution.  It is also incrementally deployable with
   incremental benefits, which makes it an attractive option for both
   vendors to implement and service providers to deploy.  Delaying the
   convergence time is not an issue if we consider that the traffic is
   protected during the convergence.

   The ULOOP_DELAY_DOWN_TIMER value should be set according to the
   maximum IGP convergence time observed in the network (usually
   observed in the slowest node).

   The proposed

   This mechanism is limited to link down link-down events.  When a link goes
   down, it eventually goes back up.  As a consequence, with the
   proposed this
   mechanism deployed, only the link down link-down event will be protected
   against transient forwarding loops while the link up link-up event will not.
   If the operator wants to limit the impact of transient forwarding
   loops during the link up link-up event, it should make sure to use specific
   procedures to bring the link back online.  As examples, the operator
   can decide to put the link back online outside of business hours, or
   it can use some incremental metric changes to prevent loops (as
   proposed in [RFC5715]).

9.  Examples

   We consider the following figure for the examples in this section:

                                  D
                                1 |        F----X
                                  |    1   |
                                  A ------ B
                                  |        |
                               10 |        | 5
                                  |        |
                                  E--------C
                                  |    1
                                1 |
                                  S

                                 Figure 7

   The network above is considered to have a convergence time of about 1
   second, so ULOOP_DELAY_DOWN_TIMER will be adjusted to this value.  We
   also consider that FRR is running on each node.

9.1.  Local Link Down Link-Down Event

   Table 3 describes the events and their timing on routers C and E when
   the link B-C goes down.  It is based on a theoretical sequence of
   events that should only been read as an example.  As C detects a
   single local event corresponding to a link down link-down event (its LSP + LSP
   from B received), it applies the local delay down behavior, and no micro-
   loop
   micro-loop is formed.

   +-----------+---------+-------------------+-------------------------+

   +------------+---------+---------------------+----------------------+
   |  Network   |   Time  |   Router C Events   |   Router E Events    |
   | Condition  |         |                     |                      |
   +-----------+---------+-------------------+-------------------------+
   +------------+---------+---------------------+----------------------+
   |    S->D    |         |                     |                      |
   | Traffic  |         |                   |                         |
   | OK |         |                     |                      |
   |            |         |                     |                      |
   |    S->D    |    t0   |    Link B-C fails   |    Link B-C fails    |
   |  Traffic   |         |                     |                      |
   |    lost    |         |                     |                      |
   |            |         |                     |                      |
   |            |  t0+20  |    C detects the    |                      |
   |            |    ms   |       failure       |                      |
   |            |         |                     |                      |
   |    S->D    |  t0+40  |   C activates FRR   |                      |
   | Traffic  |    ms   |                   |                         |
   | OK |    ms   |                     |                      |
   |            |         |                     |                      |
   |            |  t0+50  | C updates its local |                      |
   |            |    ms   |   local       LSP/LSA       |                      |
   |            |         |                     |                      |
   |            |  t0+60  t0+53  |  C schedules SPF floods its local |                      |
   |            |    ms   |      (100 ms)   updated LSP/LSA   |                      |
   |            |         |                     |                      |
   |            |  t0+67  t0+60  |   C receives schedules SPF   |                      |
   |            |    ms   |   LSP/LSA from B       (100 ms)      |                      |
   |            |         |                     |                      |
   |            |  t0+70  t0+67  |  C floods its receives LSP/LSA |                      |
   |            |    ms   |   local updated  from B and floods  |                      |
   |            |         |      LSP/LSA          it         |                      |
   |            |         |                     |                      |
   |            |  t0+87  |                     |  E receives LSP/LSA from  |
   |            |    ms   |                     | from C and schedules SPF   |
   |           |         |                   |         (100 ms) floods it |
   |            |         |                     |                      |
   |            |  t0+117  t0+90  |                     | E floods LSP/LSA from C schedules SPF (100 |
   |            |    ms   |                     |         ms)          |
   |            |         |                     |                      |
   |            |  t0+160  t0+161 |    C computes SPF   |                      |
   |            |    ms   |                     |                      |
   |            |         |                     |                      |
   |            |  t0+165 |     C delays its    |                      |
   |            |    ms   |  RIB/FIB update (1  |                      |
   |            |         |         sec)        |                      |
   |            |         |                     |                      |
   |            |  t0+193 |                     |    E computes SPF    |
   |            |    ms   |                     |                      |
   |            |         |                     |                      |
   |            |  t0+199 |                     |  E starts updating its   |
   |            |    ms   |                     |     its RIB/FIB      |
   |            |         |                     |                      |
   |            |  t0+443 |                     |    E updates its RIB/FIB     |
   |            |    ms   |                     |    RIB/FIB for D     |
   |            |         |                     |                      |
   |            |  t0+470 |                     |  E convergence ends  |
   |            |    ms   |                     |                      |
   |            |         |                     |                      |
   |            | t0+1165 |  C starts updating  |                      |
   |            |    ms   |     its RIB/FIB     |                      |
   |            |         |                     |                      |
   |            | t0+1255 |    C updates its    |                      |
   |            |    ms   |    RIB/FIB for D    |                      |
   |            |         |                     |                      |
   |            | t0+1340 |  C convergence ends |                      |
   |            |    ms   |        ends                     |                      |
   +-----------+---------+-------------------+-------------------------+
   +------------+---------+---------------------+----------------------+

                                  Table 3

   Similarly, upon B-C link down link-down event, if LSP/LSA from B is received
   before C detects the link failure, C will apply the route update
   delay if the local detection is part of the same SPF run.  Table 4
   describes the associated theoretical sequence of events.  It should
   only been read as an example.

   +-----------+---------+-------------------+-------------------------+

   +------------+---------+---------------------+----------------------+
   |  Network   |   Time  |   Router C Events   |   Router E Events    |
   | Condition  |         |                     |                      |
   +-----------+---------+-------------------+-------------------------+
   +------------+---------+---------------------+----------------------+
   |    S->D    |         |                     |                      |
   | Traffic  |         |                   |                         |
   | OK |         |                     |                      |
   |            |         |                     |                      |
   |    S->D    |    t0   |    Link B-C fails   |    Link B-C fails    |
   |  Traffic   |         |                     |                      |
   |    lost    |         |                     |                      |
   |            |         |                     |                      |
   |            |  t0+32  |  C receives LSP/LSA |                      |
   |            |    ms   |   LSP/LSA  from B and floods  |                      |
   |            |         |          it         |                      |
   |            |         |                     |                      |
   |            |  t0+33  |   C schedules SPF   |                      |
   |            |    ms   |       (100 ms)      |                      |
   |            |         |                     |                      |
   |            |  t0+50  |    C detects the    |                      |
   |            |    ms   |       failure       |                      |
   |            |         |                     |                      |
   |    S->D    |  t0+55  |   C activates FRR   |                      |
   | Traffic  |    ms   |                   |                         |
   | OK |    ms   |                     |                      |
   |            |         |                     |                      |
   |            |  t0+55  | C updates its local |                      |
   |            |    ms   |   local       LSP/LSA       |                      |
   |            |         |                     |                      |
   |            |  t0+70  |  C floods its local |                      |
   |            |    ms   |   local   updated   |                         |
   |           |         | LSP/LSA   |                      |
   |            |         |                     |                      |
   |            |  t0+87  |                     |  E receives LSP/LSA from  |
   |            |    ms   |                     | from C and schedules SPF   |
   |           |         |                   |         (100 ms) floods it |
   |            |         |                     |                      |
   |            |  t0+117  t0+90  |                     | E floods LSP/LSA from C schedules SPF (100 |
   |            |    ms   |                     |         ms)          |
   |            |         |                     |                      |
   |            |  t0+160  t0+135 |    C computes SPF   |                      |
   |            |    ms   |                     |                      |
   |            |         |                     |                      |
   |            |  t0+165  t0+140 |     C delays its    |                      |
   |            |    ms   |  RIB/FIB update (1  |                      |
   |            |         |         sec)        |                      |
   |            |         |                     |                      |
   |            |  t0+193 |                     |    E computes SPF    |
   |            |    ms   |                     |                      |
   |            |         |                     |                      |
   |            |  t0+199 |                     |  E starts updating its   |
   |            |    ms   |                     |     its RIB/FIB      |
   |            |         |                     |                      |
   |            |  t0+443 |                     |    E updates its RIB/FIB     |
   |            |    ms   |                     |    RIB/FIB for D     |
   |            |         |                     |                      |
   |            |  t0+470 |                     |  E convergence ends  |
   |            |    ms   |                     |                      |
   |            |         |                     |                      |
   |            | t0+1165 t0+1145 |  C starts updating  |                      |
   |            |    ms   |     its RIB/FIB     |                      |
   |            |         |                     |                      |
   |            | t0+1255 |    C updates its    |                      |
   |            |    ms   |    RIB/FIB for D    |                      |
   |            |         |                     |                      |
   |            | t0+1340 |  C convergence ends |                      |
   |            |    ms   |        ends                     |                      |
   +-----------+---------+-------------------+-------------------------+
   +------------+---------+---------------------+----------------------+

                                  Table 4

9.2.  Local and Remote Event

   Table 5 describes the events and their timing on router C and E when
   the link B-C goes down and when the link F-X fails in the same time
   window.  C will not apply the local delay because a non-local
   topology change is also received.  Table 5 is based on a theoretical
   sequence of events that should only been read as an example.

   +-----------+--------+-------------------+--------------------------+
   |  Network  |  Time  |  Router C Events  |     Router E Events      |
   | Condition |        |                   |                          |
   +-----------+--------+-------------------+--------------------------+
   |    S->D   |        |                   |                          |
   |  Traffic  |        |                   |                          |
   |     OK    |        |                   |                          |
   |           |        |                   |                          |
   |    S->D   |   t0   |   Link B-C fails  |      Link B-C fails      |
   |  Traffic  |        |                   |                          |
   |    lost   |        |                   |                          |
   |           |        |                   |                          |
   |           | t0+20  |   C detects the   |                          |
   |           |   ms   |      failure      |                          |
   |           |        |                   |                          |
   |           | t0+36  |   Link F-X fails  |      Link F-X fails      |
   |           |   ms   |                   |                          |
   |           |        |                   |                          |
   |    S->D   | t0+40  |  C activates FRR  |                          |
   |  Traffic  |   ms   |                   |                          |
   |     OK    |        |                   |                          |
   |           |        |                   |                          |
   |           | t0+50  |   C updates its   |                          |
   |           |   ms   |   local LSP/LSA   |                          |
   |           |        |                   |                          |
   |           | t0+54  |     C receives    |                          |
   |           |   ms   |   LSP/LSA from F  |                          |
   |           |        |   and floods it   |                          |
   |           |        |                   |                          |
   |           | t0+60  |  C schedules SPF  |                          |
   |           |   ms   |      (100 ms)     |                          |
   |           |        |                   |                          |
   |           | t0+67  |     C receives    |                          |
   |           |   ms   |   LSP/LSA from B  |                          |
   |           |        |   and floods it   |                          |
   |           |        |                   |                          |
   |           | t0+69  |                   | E receives LSP/LSA from  |
   |           |   ms   |                   |     F, floods it and     |
   |           |        |                   |  schedules SPF (100 ms)  |
   |           |        |                   |                          |
   |           | t0+70  |    C floods its   |                          |
   |           |   ms   |   local updated   |                          |
   |           |        |      LSP/LSA      |                          |
   |           |        |                   |                          |
   |           | t0+87  |                   | E receives LSP/LSA from  |
   |           |   ms   |                   |            C             |
   |           |        |                   |                          |
   |           | t0+117 |                   | E floods LSP/LSA from C  |
   |           |   ms   |                   |                          |
   |           |        |                   |                          |
   |           | t0+160 |   C computes SPF  |                          |
   |           |   ms   |                   |                          |
   |           |        |                   |                          |
   |           | t0+165 | C starts updating |                          |
   |           |   ms   |  its RIB/FIB (NO  |                          |
   |           |        |       DELAY)      |                          |
   |           |        |                   |                          |
   |           | t0+170 |                   |      E computes SPF      |
   |           |   ms   |                   |                          |
   |           |        |                   |                          |
   |           | t0+173 |                   |  E starts updating its   |
   |           |   ms   |                   |         RIB/FIB          |
   |           |        |                   |                          |
   |    S->D   | t0+365 |   C updates its   |                          |
   |  Traffic  |   ms   |   RIB/FIB for D   |                          |
   |    lost   |        |                   |                          |
   |           |        |                   |                          |
   |    S->D   | t0+443 |                   |  E updates its RIB/FIB   |
   |  Traffic  |   ms   |                   |          for D           |
   |     OK    |        |                   |                          |
   |           |        |                   |                          |
   |           | t0+450 |   C convergence   |                          |
   |           |   ms   |        ends       |                          |
   |           |        |                   |                          |
   |           | t0+470 |                   |    E convergence ends    |
   |           |   ms   |                   |                          |
   |           |        |                   |                          |
   +-----------+--------+-------------------+--------------------------+

                                  Table 5

9.3.  Aborting Local Delay

   Table 6 describes the events and their timing on routers C and E when
   the link B-C goes down.  In addition, we consider what happens when
   the F-X link fails during local delay of the FIB update.  C will
   first apply the local delay, but when the new event happens, it will
   fall back to the standard convergence mechanism without further
   delaying route insertion.  In this example, we consider a
   ULOOP_DELAY_DOWN_TIMER configured to 2 seconds.  Table 6 is based on
   a theoretical sequence of events that should only been read as an
   example.

   +-----------+--------+--------------------+-------------------------+

   +------------+--------+----------------------+----------------------+
   |  Network   |  Time  |   Router C Events    |   Router E Events    |
   | Condition  |        |                      |                      |
   +-----------+--------+--------------------+-------------------------+
   +------------+--------+----------------------+----------------------+
   |    S->D    |        |                      |                      |
   | Traffic  |        |                    |                         |
   | OK |        |                      |                      |
   |            |        |                      |                      |
   |    S->D    |   t0   |    Link B-C fails    |    Link B-C fails    |
   |  Traffic   |        |                      |                      |
   |    lost    |        |                      |                      |
   |            |        |                      |                      |
   |            | t0+20  |    C detects the     |                      |
   |            |   ms   |       failure        |                      |
   |            |        |                      |                      |
   |    S->D    | t0+40  |   C activates FRR    |                      |
   | Traffic  |   ms   |                    |                         |
   | OK |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+50  | C updates its local  |                      |
   |            |   ms   |   local       LSP/LSA        |                      |
   |            |        |                      |                      |
   |            | t0+60 t0+55  |  C schedules SPF floods its local  |                      |
   |            |   ms   |      (100 ms)   updated LSP/LSA    |                      |
   |            |        |                      |                      |
   |            | t0+67 t0+57  | C receives LSP/LSA schedules SPF (100 |                      |
   |            |   ms   |       from B         ms)          |                      |
   |            |        |                      |                      |
   |            | t0+70 t0+67  |  C floods its local receives LSP/LSA  |                      |
   |            |   ms   |  updated LSP/LSA from B and floods it |                      |
   |            |        |                      |                      |
   |            | t0+87  |                      |  E receives LSP/LSA from  |
   |            |   ms   |                      | from C and schedules SPF   |
   |           |        |                    |         (100 ms) floods it |
   |            |        |                      |                      |
   |            | t0+117 t0+90  |                      | E floods LSP/LSA from C schedules SPF (100 |
   |            |   ms   |                      |         ms)          |
   |            |        |                      |                      |
   |            | t0+160 |    C computes SPF    |                      |
   |            |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+165 | C delays its RIB/FIB |                      |
   |            |   ms   | RIB/FIB    update (2  |                         |
   |           |        | sec)    |                      |
   |            |        |                      |                      |
   |            | t0+193 |                      |    E computes SPF    |
   |            |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+199 |                      |  E starts updating its   |
   |            |   ms   |                      |     its RIB/FIB      |
   |            |        |                      |                      |
   |            | t0+254 |    Link F-X fails    |    Link F-X fails    |
   |            |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+300 |  C receives LSP/LSA  |                      |
   |            |   ms   | from F and floods  |                         |
   |           |        | it |                      |
   |            |        |                      |                      |
   |            | t0+303 | C schedules SPF (200 |                      |
   |            |   ms   |      (200         ms)          |                      |
   |            |        |                      |                      |
   |            | t0+312 |  E receives LSP/LSA  |                      |
   |            |   ms   | from F and floods  |                         |
   |           |        | it |                      |
   |            |        |                      |                      |
   |            | t0+313 | E schedules SPF (200 |                      |
   |            |   ms   |      (200         ms)          |                      |
   |            |        |                      |                      |
   |            | t0+502 |    C computes SPF    |                      |
   |            |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+505 |  C starts updating   |                      |
   |            |   ms   |   its RIB/FIB (NO    |                      |
   |            |        |        DELAY)        |                      |
   |            |        |                      |                      |
   |            | t0+514 |                      |    E computes SPF    |
   |            |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+519 |                      |  E starts updating its   |
   |            |   ms   |                      |     its RIB/FIB      |
   |            |        |                      |                      |
   |    S->D    | t0+659 |    C updates its     |                      |
   |  Traffic   |   ms   |    RIB/FIB for D     |                      |
   |    lost    |        |                      |                      |
   |            |        |                      |                      |
   |    S->D    | t0+778 |                      |    E updates its RIB/FIB     |
   | Traffic OK |   ms   |                      |    RIB/FIB for D     |
   |     OK    |        |                    |                         |
   |            |        |                      |                      |
   |            | t0+781 |  C convergence ends  |                      |
   |            |   ms   |                      |                      |
   |            |        |                      |                      |
   |            | t0+810 |                      |  E convergence ends  |
   |            |   ms   |                      |                      |
   +-----------+--------+--------------------+-------------------------+
   +------------+--------+----------------------+----------------------+

                                  Table 6

10.  Comparison with Other Solutions

   As stated in Section 4, the proposed local delay solution reuses some concepts
   already introduced by other IETF proposals but tries to find a trade-
   off between efficiency and simplicity.  This section tries to compare
   behaviors of the solutions.

10.1.  PLSN

   PLSN [PLSN] describes a mechanism where each node in the network
   tries to avoid transient forwarding loops upon a topology change by
   always keeping traffic on a loop-free path for a defined duration
   (locked path to a safe neighbor).  The locked path may be the new
   primary next hop, another neighbor, or the old primary next hop
   depending on how the safety condition is satisfied.

   PLSN does not solve all transient forwarding loops (see Section 4 of
   [PLSN] for more details).

   The solution defined in this document reuses some concepts of PLSN
   but in a more simple fashion:

   o  PLSN has three different behaviors: (1) keep using the old next
      hop, (2) use the new primary next hop if it is safe, or (3) use
      another safe next hop.  The proposed local delay solution, however, only
      has one: keep using the current next hop (i.e., the old primary
      next hop or an already-activated FRR path).

   o  PLSN may cause some damage while using a safe next hop that is not
      the new primary next hop if the new safe next hop does not provide
      enough bandwidth (see [RFC7916]).  The solution defined in this
      document may not experience this issue as the service provider may
      have control on the FRR path being used, preventing network
      congestion.

   o  PLSN applies to all nodes in a network (remote or local changes),
      while the mechanism proposed defined in this document applies only to the
      nodes connected to the topology change.

10.2.  oFIB

   oFIB [RFC6976] describes a mechanism where the convergence of the
   network upon a topology change is ordered in order to prevent
   transient forwarding loops.  Each router in the network deduces the
   failure type from the LSA/LSP received and computes/applies a
   specific FIB update timer based on the failure type and its rank in
   the network, considering the failure point as root.

   This

   The oFIB mechanism solves all the transient forwarding loops in a
   network at the price of introducing complexity in the convergence
   process that may require careful monitoring by the service provider.

   The solution defined in this document reuses the oFIB concept but
   limits it to the first hop that experiences the topology change.  As
   demonstrated, the mechanism proposed defined in this document allows all the
   local transient forwarding loops to be solved; these represent a high
   percentage of all the loops.  Moreover, limiting to one hop allows
   network-wide convergence behavior to be kept.

11.  Implementation Status

   At this time, there are three different implementations of this
   mechanism.

   o  Implementation 1:

      *  Organization: Cisco

      *  Implementation name: Local Micro-loop Protection

      *  Operating system: IOS-XE

      *  Level of maturity: production release

      *  Coverage: All the specification is implemented.

      *  Protocols supported: IS-IS and OSPF

      *  Implementation experience: tested in lab and works as expected

      *  Comment: The feature gives the ability to choose to apply the
         delay to FRR-protected entries only.

      *  Report last update: 10-11-2017

   o  Implementation 2:

      *  Organization: Cisco

      *  Implementation name: Local Micro-loop Protection

      *  Operating system: IOS-XR

      *  Level of maturity: deployed

      *  Coverage: All the specification is implemented.

      *  Protocols supported: IS-IS and OSPF

      *  Implementation experience: deployed and works as expected

      *  Comment: The feature gives the ability to choose to apply the
         delay to FRR-protected entries only.

      *  Report last update: 10-11-2017

   o  Implementation 3:

      *  Organization: Juniper Networks

      *  Implementation name: Micro-loop avoidance when IS-IS link fails

      *  Operating system: JUNOS

      *  Level of maturity: deployed (hidden command)

      *  Coverage: All the specification is implemented.

      *  Protocols supported: IS-IS only

      *  Implementation experience: deployed and works as expected

      *  Comment: The feature applies to all the IS-IS routes.

      *  Report last update: 10-11-2017

12.  IANA Considerations

   This document has no IANA actions.

13.

12.  Security Considerations

   This document does not introduce any change in terms of IGP security.
   The operation is internal to the router.  The local delay does not
   increase the number of attack vectors as an attacker could only
   trigger this mechanism if it already has the ability to disable or
   enable an IGP link.  The local delay does not increase the negative
   consequences.  If an attacker has the ability to disable or enable an
   IGP link, it can already harm the network by creating instability and
   harm the traffic by creating forwarding packet loss and forwarding
   loss for the traffic crossing that link.

14.

13.  References

14.1.

13.1.  Normative References

   [ISO10589]
              International Organization for Standardization,
              "Information technology -- Telecommunications and
              information exchange between systems -- Intermediate
              System to Intermediate System intra-domain routeing
              information exchange protocol for use in conjunction with
              the protocol for providing the connectionless-mode network
              service (ISO 8473)", ISO/IEC 10589:2002, Second Edition,
              November 2002.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC2328]  Moy, J., "OSPF Version 2", STD 54, RFC 2328,
              DOI 10.17487/RFC2328, April 1998,
              <https://www.rfc-editor.org/info/rfc2328>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

14.2.

13.2.  Informative References

   [BACKOFF]  Decraene, B., Litkowski, S., Gredler, H., Lindem, A.,
              Francois, P., and C. Bowers, "SPF Back-off algorithm for
              link state IGPs", Work in Progress, draft-ietf-rtgwg-
              backoff-algo-07, December 2017.

   [PLSN]     Zinin, A., "Analysis and Minimization of Microloops in
              Link-state Routing Protocols", Work in Progress, draft-
              ietf-rtgwg-microloop-analysis-01, October 2005.

   [RFC3906]  Shen, N. and H. Smit, "Calculating Interior Gateway
              Protocol (IGP) Routes Over Traffic Engineering Tunnels",
              RFC 3906, DOI 10.17487/RFC3906, October 2004,
              <https://www.rfc-editor.org/info/rfc3906>.

   [RFC5715]  Shand, M. and S. Bryant, "A Framework for Loop-Free
              Convergence", RFC 5715, DOI 10.17487/RFC5715, January
              2010, <https://www.rfc-editor.org/info/rfc5715>.

   [RFC6976]  Shand, M., Bryant, S., Previdi, S., Filsfils, C.,
              Francois, P., and O. Bonaventure, "Framework for Loop-Free
              Convergence Using the Ordered Forwarding Information Base
              (oFIB) Approach", RFC 6976, DOI 10.17487/RFC6976, July
              2013, <https://www.rfc-editor.org/info/rfc6976>.

   [RFC7916]  Litkowski, S., Ed., Decraene, B., Filsfils, C., Raza, K.,
              Horneffer, M., and P. Sarkar, "Operational Management of
              Loop-Free Alternates", RFC 7916, DOI 10.17487/RFC7916,
              July 2016, <https://www.rfc-editor.org/info/rfc7916>.

Acknowledgements

   We would like to thank the authors of [RFC6976] for introducing the
   concept of ordered convergence: Mike Shand, Stewart Bryant, Stefano
   Previdi, and Olivier Bonaventure.

Authors' Addresses

   Stephane Litkowski
   Orange

   Email: stephane.litkowski@orange.com

   Bruno Decraene
   Orange

   Email: bruno.decraene@orange.com

   Clarence Filsfils
   Cisco Systems

   Email: cfilsfil@cisco.com

   Pierre Francois
   Individual Contributor

   Email: pfrpfr@gmail.com