| rfc9816.original | rfc9816.txt | |||
|---|---|---|---|---|
| Network Working Group K. Patel | Internet Engineering Task Force (IETF) K. Patel | |||
| Internet-Draft Arrcus, Inc. | Request for Comments: 9816 A. Lindem | |||
| Intended status: Informational A. Lindem | Category: Informational Arrcus, Inc. | |||
| Expires: 27 July 2025 LabN Consulting, L.L.C. | ISSN: 2070-1721 S. Zandi | |||
| S. Zandi | ||||
| G. Dawra | G. Dawra | |||
| J. Dong | J. Dong | |||
| Huawei Technologies | Huawei Technologies | |||
| 23 January 2025 | July 2025 | |||
| Usage and Applicability of BGP Link-State Shortest Path Routing (BGP- | Usage and Applicability of BGP Link State (BGP-LS) Shortest Path First | |||
| SPF) in Data Centers | (SPF) Routing in Data Centers | |||
| draft-ietf-lsvr-applicability-22 | ||||
| Abstract | Abstract | |||
| This document discusses the usage and applicability of BGP Link-State | This document discusses the usage and applicability of BGP Link State | |||
| Shortest Path First (BGP-SPF) extensions in data center networks | (BGP-LS) Shortest Path First (SPF) extensions in data center networks | |||
| utilizing Clos or Fat-Tree topologies. The document is intended to | utilizing Clos or Fat Tree topologies. The document is intended to | |||
| provide simplified guidance for the deployment of BGP-SPF extensions. | provide simplified guidance for the deployment of BGP-LS SPF | |||
| extensions. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
| provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Not all documents | |||
| approved by the IESG are candidates for any level of Internet | ||||
| Standard; see Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 27 July 2025. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9816. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2025 IETF Trust and the persons identified as the | Copyright (c) 2025 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | ||||
| Please review these documents carefully, as they describe your rights | carefully, as they describe your rights and restrictions with respect | |||
| and restrictions with respect to this document. Code Components | to this document. Code Components extracted from this document must | |||
| extracted from this document must include Revised BSD License text as | include Revised BSD License text as described in Section 4.e of the | |||
| described in Section 4.e of the Trust Legal Provisions and are | Trust Legal Provisions and are provided without warranty as described | |||
| provided without warranty as described in the Revised BSD License. | in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 2. Recommended Reading . . . . . . . . . . . . . . . . . . . . . 3 | 2. Recommended Reading | |||
| 3. Common Deployment Scenario . . . . . . . . . . . . . . . . . 3 | 3. Common Deployment Scenario | |||
| 4. Justification for BGP-SPF Extension . . . . . . . . . . . . . 4 | 4. Justification for the BGP-SPF Extension | |||
| 5. BGP-SPF Applicability to Clos Networks . . . . . . . . . . . 4 | 5. BGP-SPF Applicability to Clos Networks | |||
| 5.1. Usage of BGP-LS SPF SAFI . . . . . . . . . . . . . . . . 5 | 5.1. Usage of BGP-LS-SPF SAFI | |||
| 5.1.1. Relationship to Other BGP AFI/SAFI Tuples . . . . . . 5 | 5.1.1. Relationship to Other BGP AFI/SAFI Tuples | |||
| 5.2. Peering Models . . . . . . . . . . . . . . . . . . . . . 5 | 5.2. Peering Models | |||
| 5.2.1. Sparse Peering Model . . . . . . . . . . . . . . . . 6 | 5.2.1. Sparse Peering Model | |||
| 5.2.2. Bi-Connected Graph Heuristic . . . . . . . . . . . . 7 | 5.2.2. Biconnected Graph Heuristic | |||
| 5.3. BGP Spine/Leaf Topology Policy . . . . . . . . . . . . . 7 | 5.3. BGP Spine/Leaf Topology Policy | |||
| 5.4. BGP Peer Discovery Considerations . . . . . . . . . . . . 8 | 5.4. BGP Peer Discovery Considerations | |||
| 5.5. BGP Peer Discovery . . . . . . . . . . . . . . . . . . . 9 | 5.5. BGP Peer Discovery | |||
| 5.5.1. BGP IPv6 Simplified Peering . . . . . . . . . . . . . 9 | 5.5.1. BGP IPv6 Simplified Peering | |||
| 5.5.2. BGP-LS SPF Topology Visibility for Management . . . . 9 | 5.5.2. BGP-LS-SPF Topology Visibility for Management | |||
| 5.5.3. Data Center Interconnect (DCI) Applicability . . . . 10 | 5.5.3. Data Center Interconnect (DCI) Applicability | |||
| 6. Non-CLOS/FAT Tree Topology Applicability . . . . . . . . . . 10 | 6. Non-Clos / Fat Tree Topology Applicability | |||
| 7. Non-Transit Node Capability . . . . . . . . . . . . . . . . . 10 | 7. Non-Transit Node Capability | |||
| 8. BGP Policy Applicability . . . . . . . . . . . . . . . . . . 10 | 8. BGP Policy Applicability | |||
| 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | 9. IANA Considerations | |||
| 10. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | 10. Security Considerations | |||
| 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11 | 11. References | |||
| 12. References . . . . . . . . . . . . . . . . . . . . . . . . . 11 | 11.1. Normative References | |||
| 12.1. Normative References . . . . . . . . . . . . . . . . . . 11 | 11.2. Informative References | |||
| 12.2. Informative References . . . . . . . . . . . . . . . . . 11 | Acknowledgements | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| This document complements [I-D.ietf-lsvr-bgp-spf] by discussing the | This document complements [RFC9815] by discussing the applicability | |||
| applicability of the BGP-SPF technology in a simple and fairly common | of the BGP Link State (BGP-LS) Shortest Path First (SPF) technology | |||
| deployment scenario, which is described in Section 3. | in a simple and fairly common deployment scenario, which is described | |||
| in Section 3. | ||||
| Section 4 describes the reasons for BGP modifications for such | Section 4 describes the reasons for BGP modifications for such | |||
| deployments. | deployments. | |||
| Section 5 covers the BGP Link-State Shortest Path First (IGP-SPF) | Section 5 covers the BGP SPF protocol enhancements to BGP to meet | |||
| protocol enhancements to BGP to meet these requirements and their | these requirements and their applicability to data center [Clos] | |||
| applicability to data center [Clos] networks. | networks. | |||
| 2. Recommended Reading | 2. Recommended Reading | |||
| This document assumes knowledge of existing data center networks and | This document assumes knowledge of existing data center networks and | |||
| data center network topologies [Clos]. This document also assumes | data center network topologies [Clos]. This document also assumes | |||
| knowledge of data center routing protocols such as BGP [RFC4271], | knowledge of data center routing protocols such as BGP [RFC4271], | |||
| BGP-SPF [I-D.ietf-lsvr-bgp-spf], OSPF [RFC2328] [RFC5340], as well as | BGP-LS SPF [RFC9815], and OSPF [RFC2328] [RFC5340] as well as data | |||
| data center Operations, Administration, and Maintenance (OAM) | center Operations, Administration, and Maintenance (OAM) protocols | |||
| protocols like Link Layer Discovery Protocol (LLDP) [RFC4957] and Bi- | like the Link Layer Discovery Protocol (LLDP) [RFC4957] and | |||
| Directional Forwarding Detection (BFD) [RFC5580]. | Bidirectional Forwarding Detection (BFD) [RFC5880]. | |||
| 3. Common Deployment Scenario | 3. Common Deployment Scenario | |||
| Within a data center, servers are commonly interconnected using the | Within a data center, servers are commonly interconnected using the | |||
| Clos topology [Clos]. The Clos topology is fully non-blocking and | Clos topology [Clos]. The Clos topology is fully non-blocking, and | |||
| the topology is realized using Equal Cost Multi-Path (ECMP). In a | the topology is realized using Equal-Cost Multipath (ECMP). In a | |||
| multi-stage Clos topology, the minimum number of parallel paths in | multi-stage Clos topology, the minimum number of parallel paths in | |||
| each tier is determined by the width of the stage as shown in the | each tier is determined by the width of the stage as shown in | |||
| figure 1. | Figure 1. | |||
| Tier 1 | Tier 1 | |||
| +-----+ | +-----+ | |||
| |NODE | | |NODE | | |||
| +->| 1 |--+ | +->| 1 |--+ | |||
| | +-----+ | | | +-----+ | | |||
| Tier 2 | | Tier 2 | Tier 2 | | Tier 2 | |||
| +-----+ | +-----+ | +-----+ | +-----+ | +-----+ | +-----+ | |||
| +------------->|NODE |--+->|NODE |--+--|NODE |--------------+ | +------------->|NODE |--+->|NODE |--+--|NODE |--------------+ | |||
| | +-----| 5 |--+ | 2 | +--| 7 |-----+ | | | +-----| 5 |--+ | 2 | +--| 7 |-----+ | | |||
| skipping to change at page 3, line 47 ¶ | skipping to change at line 140 ¶ | |||
| | | | +---| 6 |--+->| 3 |--+--| 8 |---+ | | | | | | | +---| 6 |--+->| 3 |--+--| 8 |---+ | | | | |||
| | | | | +-----+ | +-----+ | +-----+ | | | | | | | | | +-----+ | +-----+ | +-----+ | | | | | |||
| | |Tier 3| | | | | |Tier 3| | | | |Tier 3| | | | | |Tier 3| | | |||
| +-----+ +-----+ | +-----+ | +-----+ +-----+ | +-----+ +-----+ | +-----+ | +-----+ +-----+ | |||
| |NODE | |NODE | +->|NODE |--+ |NODE | |NODE | | |NODE | |NODE | +->|NODE |--+ |NODE | |NODE | | |||
| | 9 | | 10 | | 4 | | 11 | | 12 | | | 9 | | 10 | | 4 | | 11 | | 12 | | |||
| +-----+ +-----+ +-----+ +-----+ +-----+ | +-----+ +-----+ +-----+ +-----+ +-----+ | |||
| | | | | | | | | | | | | | | | | | | | | | | | | | | |||
| <- Servers -> <- Servers -> | <- Servers -> <- Servers -> | |||
| Tier 1 is comprised of Nodes 1, 2, 3, and 4 | Figure 1: Illustration of the Basic Clos | |||
| Tier 2 is comprised of Nodes 5, 6, 7, and 8 | ||||
| Tier 3 is comprised of Nodes 9, 10, 11, and 12 | ||||
| Figure 1: Illustration of the basic Clos | * Tier 1 is comprised of Nodes 1, 2, 3, and 4 | |||
| 4. Justification for BGP-SPF Extension | * Tier 2 is comprised of Nodes 5, 6, 7, and 8 | |||
| To simplify L3 routing and operations, many data centers use BGP as a | * Tier 3 is comprised of Nodes 9, 10, 11, and 12 | |||
| routing protocol to create both an underlay and an overlay network | ||||
| for their Clos Topologies [RFC7938]. However, BGP is a path-vector | ||||
| routing protocol. Since it does not create a fabric topology, it | ||||
| uses hop-by-hop External BGP (EBGP) peering to facilitate hop-by-hop | ||||
| routing to create the underlay network and to resolve any overlay | ||||
| next hops. The hop-by-hop BGP peering paradigm imposes several | ||||
| restrictions within a Clos. It prohibits the deployment of Route | ||||
| Reflectors/Route Controllers as the EBGP sessions are congruent with | ||||
| the data path. The BGP best-path algorithm is prefix-based and it | ||||
| prevents announcements of prefixes to other BGP speakers until the | ||||
| best-path decision process has been performed for the prefix at each | ||||
| intermediate hop. These restrictions significantly delay the overall | ||||
| convergence of the underlay network within a Clos network. | ||||
| The BGP-SPF modifications allow BGP to overcome these limitations. | 4. Justification for the BGP-SPF Extension | |||
| To simplify Layer 3 (L3) routing and operations, many data centers | ||||
| use BGP as a routing protocol to create both an underlay and an | ||||
| overlay network for their Clos topologies [RFC7938]. However, BGP is | ||||
| a path-vector routing protocol. Since it does not create a fabric | ||||
| topology, it uses hop-by-hop External BGP (EBGP) peering to | ||||
| facilitate hop-by-hop routing to create the underlay network and to | ||||
| resolve any overlay next hops. The hop-by-hop BGP peering paradigm | ||||
| imposes several restrictions within a Clos. It prohibits the | ||||
| deployment of route reflectors / route controllers as the EBGP | ||||
| sessions are congruent with the data path. The BGP best-path | ||||
| algorithm is prefix based, and it prevents announcements of prefixes | ||||
| to other BGP speakers until the best-path decision process has been | ||||
| performed for the prefix at each intermediate hop. These | ||||
| restrictions significantly delay the overall convergence of the | ||||
| underlay network within a Clos network. | ||||
| The BGP SPF modifications allow BGP to overcome these limitations. | ||||
| Furthermore, using the BGP-LS Network Layer Reachability Information | Furthermore, using the BGP-LS Network Layer Reachability Information | |||
| (NLRI) format allows the BGP-SPF data to be advertised for nodes, | (NLRI) format allows the BGP SPF data to be advertised for nodes, | |||
| links, and prefixes in the BGP routing domain and used for Short- | links, and prefixes in the BGP routing domain [RFC9552] and used for | |||
| Path-First (SPF) computations [RFC9552]. | SPF computations [RFC9815]. | |||
| Additional motivation for deploying BGP-SPF is included in | Additional motivation for deploying BGP-SPF is included in [RFC9815]. | |||
| [I-D.ietf-lsvr-bgp-spf]. | ||||
| 5. BGP-SPF Applicability to Clos Networks | 5. BGP-SPF Applicability to Clos Networks | |||
| With the BGP-SPF extensions [I-D.ietf-lsvr-bgp-spf], the BGP best- | With the BGP-SPF extensions [RFC9815], the BGP best-path computation | |||
| path computation and route computation are replaced with link-state | and route computation are replaced with link-state algorithms such as | |||
| algorithms such as those used by OSPF [RFC2328], both to determine | those used by OSPF [RFC2328], both to determine whether a BGP-LS-SPF | |||
| whether an BGP-LS-SPF NLRI has changed and needs to be re-advertised | NLRI has changed and needs to be readvertised and to compute the BGP | |||
| and to compute the BGP routes. These modifications will | routes. These modifications will significantly improve convergence | |||
| significantly improve convergence of the underlay while affording the | of the underlay while affording the operational benefits of a single | |||
| operational benefits of a single routing protocol [RFC7938]. | routing protocol [RFC7938]. | |||
| Data center controllers typically require visibility to the BGP | Data center controllers typically require visibility to the BGP | |||
| topology to compute traffic-engineered paths. These controllers | topology to compute traffic-engineered paths. These controllers | |||
| learn the topology and other relevant information via the BGP-LS | learn the topology and other relevant information via the BGP-LS | |||
| address family [RFC9552] which is totally independent of the underlay | address family [RFC9552], which is totally independent of the | |||
| address families (usually IPv4/IPv6 unicast). Furthermore, in | underlay address families (usually IPv4/IPv6 unicast). Furthermore, | |||
| traditional BGP underlays, all the BGP routers will need to advertise | in usual BGP underlays, all the BGP routers will need to advertise | |||
| their BGP-LS information independently. With the BGP-SPF extensions, | their BGP-LS information independently. With the BGP-SPF extensions, | |||
| controllers can learn the topology using the same BGP advertisements | controllers can learn the topology using the same BGP advertisements | |||
| used to compute the underlay routes. Furthermore, these data center | used to compute the underlay routes. Furthermore, these data center | |||
| controllers can avail the convergence advantages of the BGP-SPF | controllers can avail the convergence advantages of the BGP-SPF | |||
| extensions. The placement of controllers can be outside of the | extensions. The placement of controllers can be outside of the | |||
| forwarding path or within the forwarding path. | forwarding path or within the forwarding path. | |||
| Alternatively, as each and every router in the BGP-SPF domain will | Alternatively, as each and every router in the BGP-SPF domain will | |||
| have a complete view of the topology, the operator can also choose to | have a complete view of the topology, the operator can also choose to | |||
| configure BGP sessions in the hop-by-hop peering model described in | configure BGP sessions in the hop-by-hop peering model described in | |||
| [RFC7938] along with BFD [RFC5580]. In doing so, while the hop-by- | [RFC7938] along with BFD [RFC5880]. In doing so, while the hop-by- | |||
| hop peering model lacks the inherent benefits of the controller-based | hop peering model lacks the inherent benefits of the controller-based | |||
| model, BGP updates need not be serialized by the BGP best-path | model, BGP updates need not be serialized by the BGP best-path | |||
| algorithm in either of these models. This helps overall network | algorithm in either of these models. This helps overall network | |||
| convergence. | convergence. | |||
| 5.1. Usage of BGP-LS SPF SAFI | 5.1. Usage of BGP-LS-SPF SAFI | |||
| Section 5.1 of [I-D.ietf-lsvr-bgp-spf] defines a new BGP-LS-SPF SAFI | Section 5.1 of [RFC9815] defines a new BGP-LS-SPF SAFI for | |||
| for announcement of the BGP-SPF link-state. The NLRI format and its | announcement of the BGP-SPF link-state. The NLRI format and its | |||
| associated attributes follow the format of BGP-LS for node, link, and | associated attributes follow the format of BGP-LS for node, link, and | |||
| prefix announcements. Whether the peering model within a Clos | prefix announcements. Whether the peering model within a Clos | |||
| follows hop-by-hop peering described in [RFC7938] or any controller- | follows hop-by-hop peering as described in [RFC7938] or any | |||
| based or route-reflector peering, an operator can exchange BGP-LS-SPF | controller-based or route-reflector peering, an operator can exchange | |||
| SAFI routes over the BGP peering by simply configuring BGP-LS-SPF | BGP-LS-SPF SAFI routes over the BGP peering by simply configuring | |||
| SAFI between the necessary BGP speakers. | BGP-LS-SPF SAFI between the necessary BGP speakers. | |||
| The BGP-LS-SPF SAFI can also co-exist with BGP IP Unicast SAFI | The BGP-LS-SPF SAFI can also coexist with BGP IP Unicast SAFI | |||
| [RFC4760] which could exchange overlapping IP routes. One use case | [RFC4760], which could exchange overlapping IP routes. One use case | |||
| for this is where BGP-LS-SPF routes are used for the underlay and BGP | for this is where BGP-LS-SPF routes are used for the underlay and BGP | |||
| IP Unicast routes for VPNs are advertised in the overlay as described | IP Unicast routes for VPNs are advertised in the overlay as described | |||
| in [RFC4364]. The routes received by these SAFIs are evaluated, | in [RFC4364]. The routes received by these SAFIs are evaluated, | |||
| stored, and announced independently according to the rules of | stored, and announced independently according to the rules of | |||
| [RFC4760]. The tie-breaking of route installation is a matter of the | [RFC4760]. The tiebreaking of route installation is a matter of the | |||
| local policies and preferences of the network operator. | local policies and preferences of the network operator. | |||
| Finally, as the BGP-SPF peering is done following the procedures | Finally, as the BGP-SPF peering is done following the procedures | |||
| described in [RFC4271], all the existing transport security | described in [RFC4271], all the existing transport security | |||
| mechanisms including [RFC5925] are available for the BGP-LS-SPF SAFI. | mechanisms including those in [RFC5925] are available for the BGP-LS- | |||
| SPF SAFI. | ||||
| 5.1.1. Relationship to Other BGP AFI/SAFI Tuples | 5.1.1. Relationship to Other BGP AFI/SAFI Tuples | |||
| Normally, the BGP-LS-SPF AFI/SAFI is used solely to compute the | Normally, the BGP-LS-SPF AFI/SAFI is used solely to compute the | |||
| underlay and is given precedence over other AFI/SAFIs in route | underlay and is given precedence over other AFI/SAFIs in route | |||
| processing. Other BGP SAFIs, e.g., IPv6/IPv6 Unicast VPN would use | processing. Other BGP SAFIs, e.g., IPv6/IPv6 unicast VPN, would use | |||
| the BGP-SPF computed routes for next hop resolution. | the BGP-SPF computed routes for next-hop resolution. | |||
| 5.2. Peering Models | 5.2. Peering Models | |||
| As previously stated, BGP-SPF can be deployed using the existing | As previously stated, BGP-SPF can be deployed using the existing | |||
| peering model where there is a single-hop BGP session on each and | peering model where there is a single-hop BGP session on each and | |||
| every link in the data center fabric [RFC7938]. This provides for | every link in the data center fabric [RFC7938]. This provides for | |||
| both the advertisement of routes and the determination of link and | both the advertisement of routes and the determination of link and | |||
| neighboring router availability. With BGP-SPF, the underlay will | neighboring router availability. With BGP-SPF, the underlay will | |||
| converge faster due to changes to the decision process that will | converge faster due to changes to the decision process that will | |||
| allow NLRI changes to be advertised faster after detecting a change. | allow NLRI changes to be advertised faster after detecting a change. | |||
| 5.2.1. Sparse Peering Model | 5.2.1. Sparse Peering Model | |||
| Alternately, BFD [RFC5580] can be used to swiftly determine the | Alternately, BFD [RFC5880] can be used to swiftly determine the | |||
| availability of links and the BGP peering model can be significantly | availability of links, and the BGP peering model can be significantly | |||
| sparser than the data center fabric. BGP-SPF sessions only need to | sparser than the data center fabric. BGP-SPF sessions only need to | |||
| be established with enough peers to provide a bi-connected graph. If | be established with enough peers to provide a biconnected graph. If | |||
| Internal BGP (IBGP) is used, then the BGP routers at tier N-1 will | Internal BGP (IBGP) is used, then the BGP routers at tier N-1 will | |||
| act as route-reflectors for the routers at tier N. | act as route-reflectors for the routers at tier N. | |||
| The obvious usage of sparse peering is to avoid parallel BGP sessions | The obvious usage of sparse peering is to avoid parallel BGP sessions | |||
| on links between the same two routers in the data center fabric. | on links between the same two routers in the data center fabric. | |||
| However, this use case is not very useful since parallel L3 links | However, this use case is not very useful since parallel L3 links | |||
| between the same two BGP routers are rare in Clos or Fat-Tree | between the same two BGP routers are rare in Clos or Fat Tree | |||
| topologies. Additionally, when there are multiple links, they are | topologies. Additionally, when there are multiple links, they are | |||
| often aggregated at the link layer using Link Aggregation Groups | often aggregated using Link Aggregation Groups (LAGs) at the link | |||
| (LAGs) [IEEE.802.1AX] rather than at the IP layer. Two more | layer [IEEE.802.1AX] rather than at the IP layer. Two more | |||
| interesting scenarios are described below. | interesting scenarios are described below. | |||
| In current data center topologies, there is often a very dense mesh | In current data center topologies, there is often a very dense mesh | |||
| of links between levels, e.g., leaf and spine, providing 32-way, | of links between levels, e.g., leaf and spine, providing 32-way | |||
| 64-way, or more Equal-Cost Multi-Path (ECMP) paths. In these | paths, 64-way paths, or more ECMPs. In these topologies, it is | |||
| topologies, it is desirable not to have a BGP session on every link | desirable not to have a BGP session on every link, and techniques | |||
| and techniques such as the one described in Section 5.2.2 can be used | such as the one described in Section 5.2.2 can be used to establish | |||
| to establish sessions on some subset of northbound links. For | sessions on some subset of northbound links. For example, in a | |||
| example, in a Spine-Leaf topology, each leaf router would only peer | Spine/Leaf topology, each leaf router would only peer with a subset | |||
| with a subset of the spines dependent on the flooding redundancy | of the spines dependent on the flooding redundancy required to be | |||
| required to be reasonably certain that every node within the BGP-SPF | reasonably certain that every node within the BGP-SPF routing domain | |||
| routing domain has the complete topology. | has the complete topology. | |||
| Alternately, controller-based data center topologies are envisioned | Alternately, controller-based data center topologies are envisioned | |||
| where BGP speakers within the data center only establish BGP sessions | where BGP speakers within the data center only establish BGP sessions | |||
| with two or more controllers. In these topologies, fabric nodes | with two or more controllers. In these topologies, fabric nodes | |||
| below the first tier, as shown in Figure 1 of [RFC7938], will | below the first tier, as shown in Figure 1 of [RFC7938], will | |||
| establish BGP multi-hop sessions with the controllers. For the | establish BGP multi-hop sessions with the controllers. For the | |||
| multi-hop sessions, determining the route to the controllers without | multi-hop sessions, determining the route to the controllers without | |||
| depending on BGP would need to be through some other means beyond the | depending on BGP would need to be through some other means, which is | |||
| scope of this document. However, the BGP discovery mechanisms | beyond the scope of this document. However, the BGP discovery | |||
| described in Section 5.5 would be one possibility. | mechanisms described in Section 5.5 would be one possibility. | |||
| 5.2.2. Bi-Connected Graph Heuristic | 5.2.2. Biconnected Graph Heuristic | |||
| With this heuristic, discovery of BGP SPF peers is assumed, e.g., as | With a biconnected graph heuristic, discovery of BGP SPF peers is | |||
| described in Section 5.5. In this context, "bi-connected" refers to | assumed, e.g., as described in Section 5.5. In this context, | |||
| the fact that there must be an adverised link NLRI for both BGP SPF | "biconnected" refers to the fact that there must be an advertised | |||
| peers associated with the link before the link can be used in the BGP | Link NLRI for both BGP SPF peers associated with the link before the | |||
| SPF route calcuation. Additionally, it assumed that the direction of | link can be used in the BGP SPF route calculation. Additionally, it | |||
| the peering can be ascertained. In the context of a data center | is assumed that the direction of the peering can be ascertained. In | |||
| fabric, the direction is either northbound (toward the spine), | the context of a data center fabric, the direction is either | |||
| southbound (toward the Top-Of-Rack (ToR) routers) or east-west (same | northbound (toward the spine), southbound (toward the Top-of-Rack | |||
| level in the hierarchy). The determination of the direction is | (ToR) routers), or east-west (same level in the hierarchy). The | |||
| beyond the scope of this document. However, it would be reasonable | determination of the direction is beyond the scope of this document. | |||
| to assume a technique where the ToR routers can be identified and the | However, it would be reasonable to assume a technique where the ToR | |||
| number of hops to the ToR is used to determine the direction. | routers can be identified and the number of hops to the ToR is used | |||
| to determine the direction. | ||||
| In this heuristic, BGP speakers allow passive session establishment | In this heuristic, BGP speakers allow passive session establishment | |||
| for southbound BGP sessions. For northbound sessions, BGP speakers | for southbound BGP sessions. For northbound sessions, BGP speakers | |||
| will attempt to maintain two northbound BGP sessions with different | will attempt to maintain two northbound BGP sessions with different | |||
| routers. For east-west sessions, passive BGP session establishment | routers. For east-west sessions, passive BGP session establishment | |||
| is allowed. However, a BGP speaker will never actively establish an | is allowed. However, a BGP speaker will never actively establish an | |||
| east-west BGP session unless it cannot establish two northbound BGP | east-west BGP session unless it cannot establish two northbound BGP | |||
| sessions. | sessions. | |||
| BGP SPF sparse peering deployments not using this hueristic are | BGP SPF sparse peering deployments not using this heuristic are | |||
| possible but are not described herein and are considered out of | possible but are not described herein and are considered out of | |||
| scope. | scope. | |||
| 5.3. BGP Spine/Leaf Topology Policy | 5.3. BGP Spine/Leaf Topology Policy | |||
| One of the advantages of using BGP-SPF as the underlay protocol is | One of the advantages of using BGP-SPF as the underlay protocol is | |||
| that BGP policy can be applied at any level. For example, depending | that BGP policy can be applied at any level. For example, depending | |||
| on the topology, it may be possible to aggregate or filter prefix | on the topology, it may be possible to aggregate or filter prefix | |||
| advertisements using existing BGP policy. In Spine/Leaf topologies, | advertisements using the existing BGP policy. In Spine/Leaf | |||
| it is not necessary to advertise BGP-LS Prefix NLRI received by leaf | topologies, it is not necessary to advertise a BGP-LS Prefix NLRI | |||
| nodes from the spine back to other spine nodes. If a common AS is | received by leaf nodes from the spine back to other spine nodes. If | |||
| used for the spine nodes, this can easily be accomplished with EBGP | a common Autonomous System (AS) is used for the spine nodes, this can | |||
| and a simple policy to filter advertisements from the leaves to the | easily be accomplished with EBGP and a simple policy to filter | |||
| spine if the first AS in the AS path is the spine AS. | advertisements from the leaves to the spine if the first AS in the AS | |||
| path is the spine AS. | ||||
| In the figure below, the leaves would not advertise any NLRI with AS | In the figure below, the leaves would not advertise any NLRIs with AS | |||
| 64512 as the first AS in the AS path. | 64512 as the first AS in the AS path. | |||
| +--------+ +--------+ +--------+ | +--------+ +--------+ +--------+ | |||
| AS 64512 | | | | | | | AS 64512 | | | | | | | |||
| for Spine | Spine 1+----+ Spine 2+- ......... -+ Spine N| | for Spine | Spine 1+----+ Spine 2+- ......... -+ Spine N| | |||
| Nodes at | | | | | | | Nodes at | | | | | | | |||
| this Level +-+-+-+-++ ++-+-+-+-+ +-+-+-+-++ | this Level +-+-+-+-++ ++-+-+-+-+ +-+-+-+-++ | |||
| +------+ | | | | | | | | | | | | +------+ | | | | | | | | | | | | |||
| | +-----|-|-|------+ | | | | | | | | | +-----|-|-|------+ | | | | | | | | |||
| | | +--|-|-|--------+-|-|-----------------+ | | | | | | +--|-|-|--------+-|-|-----------------+ | | | | |||
| skipping to change at page 8, line 29 ¶ | skipping to change at line 355 ¶ | |||
| | | | | +------|--|--------------+ | | | | | | | | | | +------|--|--------------+ | | | | | | |||
| | | | +------+ | | | | | | | | | | | | +------+ | | | | | | | | | |||
| ++--+--++ +-+-+--++ ++-+--+-+ ++-+--+-+ | ++--+--++ +-+-+--++ ++-+--+-+ ++-+--+-+ | |||
| | Leaf 1| | Leaf 2| ........ | Leaf X| | Leaf Y| | | Leaf 1| | Leaf 2| ........ | Leaf X| | Leaf Y| | |||
| +-------+ +-------+ +-------+ +-------+ | +-------+ +-------+ +-------+ +-------+ | |||
| Figure 2: Spine/Leaf Topology Policy | Figure 2: Spine/Leaf Topology Policy | |||
| 5.4. BGP Peer Discovery Considerations | 5.4. BGP Peer Discovery Considerations | |||
| The basic functionality of peer discovery is to be discover the | The basic functionality of peer discovery is to discover the address | |||
| address of a single-hop peer in case where the peer address is not | of a single-hop peer in the case where the peer address is not | |||
| pre-configured. This is being accomplished today by using IPv6 | preconfigured. This is being accomplished today by using IPv6 Router | |||
| Router Advertisements (RA) [RFC4861] and assuming that a BGP session | Advertisements (RAs) [RFC4861] and assuming that a BGP session is | |||
| is desired with any discovered peer. Beyond the basic functionality, | desired with any discovered peer. Beyond the basic functionality, it | |||
| it may be useful to have the following information relating to the | may be useful to have the following information relating to the BGP | |||
| BGP session: | session: | |||
| * Autonomous System (AS) and BGP Identifier of a potential peer. | * The AS and BGP Identifier of a potential peer. | |||
| * Security capabilities supported and for cryptographic | * Supported security capabilities, and for cryptographic | |||
| authentication, the security capabilities and possibly a key-chain | authentication, the security capabilities and possibly a key chain | |||
| [RFC8177] to be used. | [RFC8177] for use. | |||
| * Session Policy Identifier - A group number or name used to | * A Session Policy Identifier, which is a group number or name used | |||
| associate common session parameters with the peer. For example, | to associate common session parameters with the peer. For | |||
| in a data center, BGP sessions with a ToR device could have | example, in a data center, BGP sessions with a ToR router could | |||
| different parameters than BGP sessions between leaf and spine. | have different parameters than BGP sessions between leaf and spine | |||
| nodes. | ||||
| In a data center fabric, it is often useful to know whether a peer is | In a data center fabric, it is often useful to know whether a peer is | |||
| southbound (towards the servers) or northbound (towards the spine or | southbound (towards the servers) or northbound (towards the spine or | |||
| super-spine), e.g., Section 5.2.2. One mechanism, without specifying | super-spine), e.g., see Section 5.2.2. One mechanism, without | |||
| all the details, might be for the ToR routers to be identified when | specifying all the details, might be for the ToR routers to be | |||
| installed and for the others routers in the fabric to determine their | identified when installed and for the other routers in the fabric to | |||
| level based on the distance from the closest ToR router. | determine their level based on the distance from the closest ToR | |||
| router. | ||||
| If there are multiple links between BGP speakers or the links between | If there are multiple links between BGP speakers or the links between | |||
| BGP speakers are unnumbered, it is also useful to be able to | BGP speakers are unnumbered, it is also useful to be able to | |||
| establish multi-hop sessions using the loopback addresses. This will | establish multi-hop sessions using the loopback addresses. This will | |||
| often require the discovery protocol to install route(s) toward the | often require the discovery protocol to install one or more routes | |||
| potential peer loopback addresses prior to BGP session establishment. | toward the potential peer loopback addresses prior to BGP session | |||
| establishment. | ||||
| Finally, a simple BGP discovery protocol may be used to establish a | Finally, a simple BGP discovery protocol may be used to establish a | |||
| multi-hop session with one or more controllers by advertising | multi-hop session with one or more controllers by advertising | |||
| connectivity to one or more controllers. | connectivity to one or more controllers. | |||
| 5.5. BGP Peer Discovery | 5.5. BGP Peer Discovery | |||
| 5.5.1. BGP IPv6 Simplified Peering | 5.5.1. BGP IPv6 Simplified Peering | |||
| To conserve IPv4 address space and simplify operations, BGP-SPF | To conserve IPv4 address space and simplify operations, BGP-SPF | |||
| routers in Clos/Fat Tree deployments can use IPv6 addresses as peer | routers in Clos / Fat Tree deployments can use IPv6 addresses as the | |||
| address. For IPv4 address families, IPv6 peering as specified in | peer address. For IPv4 address families, IPv6 peering as specified | |||
| [RFC8950] can be deployed to avoid configuring IPv4 addresses on | in [RFC8950] can be deployed to avoid configuring IPv4 addresses on | |||
| router interfaces. When this is done, dynamic discovery mechanisms, | router interfaces. When this is done, dynamic discovery mechanisms, | |||
| as described in Section 5.5, can be used to learn the global or link- | as described in Section 5.5, can be used to learn the global or link- | |||
| local IPv6 peer addresses and IPv4 addresses need not be configured | local IPv6 peer addresses, and IPv4 addresses need not be configured | |||
| on these interfaces. If IPv6 link-local peering is used, then | on these interfaces. If IPv6 link-local peering is used, then | |||
| configuration of IPv6 global addresses is also not required [RFC7404] | configuration of IPv6 global addresses is also not required | |||
| . The Link Local/Remote Identifiers of the peering interfaces MUST be | [RFC7404]. The Link Local/Remote Identifiers of the peering | |||
| used in the link NLRI as described in section 5.2.2 of | interfaces must be used in the Link NLRI as described in | |||
| [I-D.ietf-lsvr-bgp-spf]. | Section 5.2.2 of [RFC9815]. | |||
| 5.5.2. BGP-LS SPF Topology Visibility for Management | 5.5.2. BGP-LS-SPF Topology Visibility for Management | |||
| Irrespective of whether or not BGP-SPF is used for route calculation, | Irrespective of whether or not BGP-SPF is used for route calculation, | |||
| the BGP-LS-SPF route advertisements can be used to periodically | the BGP-LS-SPF route advertisements can be used to periodically | |||
| construct the Clos/Fat Tree topology. This is especially useful in | construct the Clos / Fat Tree topology. This is especially useful in | |||
| deployments where an Interior Gateway Protocol (IGP) is not used and | deployments where an Interior Gateway Protocol (IGP) is not used and | |||
| the base BGP-LS routes [RFC9552] are not available. The resultant | the base BGP-LS routes [RFC9552] are not available. The resultant | |||
| topology visibility can then be used for troubleshooting and | topology visibility can then be used for troubleshooting and | |||
| consistency checking. This would normally be done on a central | consistency checking. This would normally be done on a central | |||
| controller or other management tool which could also be used for | controller or other management tool that could also be used for | |||
| fabric data path verification. The precise algorithms and | fabric data path verification. The precise algorithms and | |||
| heuristics, as well as the complete set of management applications is | heuristics, as well as the complete set of management applications, | |||
| beyond the scope of this document. | is beyond the scope of this document. | |||
| 5.5.3. Data Center Interconnect (DCI) Applicability | 5.5.3. Data Center Interconnect (DCI) Applicability | |||
| Since BGP-SPF is to be used for the routing underlay and DCI gateway | Since BGP-SPF is to be used for the routing underlay and Data Center | |||
| boxes typically have direct or very simple connectivity, BGP external | Interconnect (DCI) gateway boxes typically have direct or very simple | |||
| sessions would typically not include the BGP-LS-SPF SAFI. | connectivity, BGP external sessions would typically not include the | |||
| BGP-LS-SPF SAFI. | ||||
| 6. Non-CLOS/FAT Tree Topology Applicability | 6. Non-Clos / Fat Tree Topology Applicability | |||
| The BGP-SPF extensions [I-D.ietf-lsvr-bgp-spf] can be used in other | The BGP-SPF extensions [RFC9815] can be used in other topologies and | |||
| topologies and avail the inherent convergence improvements. | avail the inherent convergence improvements. Additionally, sparse | |||
| Additionally, sparse peering techniques may be utilized Section 5.2. | peering techniques may be utilized as described in Section 5.2. | |||
| However, determining whether to establish a BGP session is more | However, determining whether to establish a BGP session is more | |||
| complex and the heuristic described in Section 5.2.2 cannot be used. | complex, and the heuristic described in Section 5.2.2 cannot be used. | |||
| In such topologies, other techniques such as those described in | In such topologies, other techniques such as those described in | |||
| [RFC9667] may be employed. One potential deployment would be the | [RFC9667] may be employed. One potential deployment would be the | |||
| underlay for a Service Provider (SP) backbone where usage of a single | underlay for a Service Provider (SP) backbone where usage of a single | |||
| protocol, i.e., BGP, is desired. | protocol, i.e., BGP, is desired. | |||
| 7. Non-Transit Node Capability | 7. Non-Transit Node Capability | |||
| In certain scenarios, a BGP node wishes to participate in the BGP-SPF | In certain scenarios, a BGP node wishes to participate in the BGP-SPF | |||
| topology but never be used for transit traffic. These include | topology but never be used for transit traffic. These include | |||
| situations where a server wants to make application services | situations where a server wants to make application services | |||
| available to clients homed at subnets throughout the BGP-SPF domain | available to clients homed at subnets throughout the BGP-SPF domain | |||
| but does not ever want to be used as a router (i.e., carry transit | but does not ever want to be used as a router (i.e., carry transit | |||
| traffic). Another specific instance is where a controller is | traffic). Another specific instance is where a controller is | |||
| resident on a server and direct connectivity to the controller is | resident on a server and direct connectivity to the controller is | |||
| required throughout the entire domain. This can readily be | required throughout the entire domain. This can readily be | |||
| accomplished using the BGP-LS Node NLRI Attribute SPF Status TLV as | accomplished using the BGP-LS-SPF Node NLRI Attribute SPF Status TLV | |||
| described in [I-D.ietf-lsvr-bgp-spf]. | as described in [RFC9815]. | |||
| 8. BGP Policy Applicability | 8. BGP Policy Applicability | |||
| Existing BGP policy such as prefix filtering may be used in | Existing BGP policy such as prefix filtering may be used in | |||
| conjunction with the BGP-LS-SPF SAFI. When BGP policy is used with | conjunction with the BGP-LS-SPF SAFI. When BGP policy is used with | |||
| the BGP-LS-SPF SAFI, BGP speakers in the BGP-LS-SPF routing domain | the BGP-LS-SPF SAFI, BGP speakers in the BGP-LS-SPF routing domain | |||
| will not all have the same set of NLRI and will compute a different | will not all have the same set of NLRIs and will compute a different | |||
| BGP local routing table. Consequently, care must be taken to assure | BGP local routing table. Consequently, care must be taken to assure | |||
| routing is consistent and blackholes or routing loops do not ensue. | that routing is consistent and that routes to unreachable | |||
| However, this is no different than if traditional BGP routing using | destinations or routing loops do not ensue. However, this is no | |||
| the IPv4 and IPv6 address families were used. | different than if classical BGP routing using the IPv4 and IPv6 | |||
| address families were used. | ||||
| 9. IANA Considerations | 9. IANA Considerations | |||
| No IANA updates are requested by this document. | This document has no IANA actions. | |||
| 10. Security Considerations | 10. Security Considerations | |||
| This document introduces no new security considerations above and | This document introduces no new security considerations above and | |||
| beyond those already specified in the [RFC4271] and | beyond those already specified in [RFC4271] and [RFC9815]. | |||
| [I-D.ietf-lsvr-bgp-spf]. | ||||
| 11. Acknowledgements | ||||
| The authors would like to thank Alvaro Retana, Yan Filyurin, Boris | ||||
| Hassanov, Stig Venaas, Ron Bonica, Mallory Knodel, Dhruv Dhody, Erik | ||||
| Kline, Eric Vyncke, and John Scudder for their review and comments. | ||||
| 12. References | 11. References | |||
| 12.1. Normative References | 11.1. Normative References | |||
| [I-D.ietf-lsvr-bgp-spf] | [RFC9815] Patel, K., Lindem, A., Zandi, S., and W. Henderickx, "BGP | |||
| Patel, K., Lindem, A., Zandi, S., and W. Henderickx, "BGP | Link State (BGP-LS) Shortest Path First (SPF) Routing", | |||
| Link-State Shortest Path First (SPF) Routing", Work in | RFC 9815, DOI 10.17487/RFC9815, July 2025, | |||
| Progress, Internet-Draft, draft-ietf-lsvr-bgp-spf-51, 14 | <https://www.rfc-editor.org/info/rfc9815>. | |||
| January 2025, | ||||
| <https://datatracker.ietf.org/api/v1/doc/document/draft- | ||||
| ietf-lsvr-bgp-spf/>. | ||||
| 12.2. Informative References | 11.2. Informative References | |||
| [Clos] "A Study of Non-Blocking Switching Networks", The Bell | [Clos] Clos, C., "A Study of Non-Blocking Switching Networks", | |||
| System Technical Journal, Vol. 32(2), DOI | The Bell System Technical Journal, vol. 32, no. 2, pp. | |||
| 10.1002/j.1538-7305.1953.tb01433.x, March 1953. | 406-424, DOI 10.1002/j.1538-7305.1953.tb01433.x, March | |||
| 1953, | ||||
| <https://doi.org/10.1002/j.1538-7305.1953.tb01433.x>. | ||||
| [IEEE.802.1AX] | [IEEE.802.1AX] | |||
| IEEE, "IEEE Standard for Local and Metropolitan Area | IEEE, "IEEE Standard for Local and Metropolitan Area | |||
| Networks: Link Aggregation", IEEE Std 802.1AX-2020, 2020, | Networks--Link Aggregation", IEEE Std 802.1AX-2020, | |||
| <https://standards.ieee.org/standard/802_1AX-2020.html>. | DOI 10.1109/IEEESTD.2020.9105034, May 2020, | |||
| <https://doi.org/10.1109/IEEESTD.2020.9105034>. | ||||
| [RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, | [RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, | |||
| DOI 10.17487/RFC2328, April 1998, | DOI 10.17487/RFC2328, April 1998, | |||
| <https://www.rfc-editor.org/info/rfc2328>. | <https://www.rfc-editor.org/info/rfc2328>. | |||
| [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A | [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A | |||
| Border Gateway Protocol 4 (BGP-4)", RFC 4271, | Border Gateway Protocol 4 (BGP-4)", RFC 4271, | |||
| DOI 10.17487/RFC4271, January 2006, | DOI 10.17487/RFC4271, January 2006, | |||
| <https://www.rfc-editor.org/info/rfc4271>. | <https://www.rfc-editor.org/info/rfc4271>. | |||
| skipping to change at page 12, line 25 ¶ | skipping to change at line 534 ¶ | |||
| [RFC4957] Krishnan, S., Ed., Montavont, N., Njedjou, E., Veerepalli, | [RFC4957] Krishnan, S., Ed., Montavont, N., Njedjou, E., Veerepalli, | |||
| S., and A. Yegin, Ed., "Link-Layer Event Notifications for | S., and A. Yegin, Ed., "Link-Layer Event Notifications for | |||
| Detecting Network Attachments", RFC 4957, | Detecting Network Attachments", RFC 4957, | |||
| DOI 10.17487/RFC4957, August 2007, | DOI 10.17487/RFC4957, August 2007, | |||
| <https://www.rfc-editor.org/info/rfc4957>. | <https://www.rfc-editor.org/info/rfc4957>. | |||
| [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF | [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF | |||
| for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, | for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, | |||
| <https://www.rfc-editor.org/info/rfc5340>. | <https://www.rfc-editor.org/info/rfc5340>. | |||
| [RFC5580] Tschofenig, H., Ed., Adrangi, F., Jones, M., Lior, A., and | [RFC5880] Katz, D. and D. Ward, "Bidirectional Forwarding Detection | |||
| B. Aboba, "Carrying Location Objects in RADIUS and | (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010, | |||
| Diameter", RFC 5580, DOI 10.17487/RFC5580, August 2009, | <https://www.rfc-editor.org/info/rfc5880>. | |||
| <https://www.rfc-editor.org/info/rfc5580>. | ||||
| [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP | [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP | |||
| Authentication Option", RFC 5925, DOI 10.17487/RFC5925, | Authentication Option", RFC 5925, DOI 10.17487/RFC5925, | |||
| June 2010, <https://www.rfc-editor.org/info/rfc5925>. | June 2010, <https://www.rfc-editor.org/info/rfc5925>. | |||
| [RFC7404] Behringer, M. and E. Vyncke, "Using Only Link-Local | [RFC7404] Behringer, M. and E. Vyncke, "Using Only Link-Local | |||
| Addressing inside an IPv6 Network", RFC 7404, | Addressing inside an IPv6 Network", RFC 7404, | |||
| DOI 10.17487/RFC7404, November 2014, | DOI 10.17487/RFC7404, November 2014, | |||
| <https://www.rfc-editor.org/info/rfc7404>. | <https://www.rfc-editor.org/info/rfc7404>. | |||
| skipping to change at page 13, line 21 ¶ | skipping to change at line 573 ¶ | |||
| [RFC9552] Talaulikar, K., Ed., "Distribution of Link-State and | [RFC9552] Talaulikar, K., Ed., "Distribution of Link-State and | |||
| Traffic Engineering Information Using BGP", RFC 9552, | Traffic Engineering Information Using BGP", RFC 9552, | |||
| DOI 10.17487/RFC9552, December 2023, | DOI 10.17487/RFC9552, December 2023, | |||
| <https://www.rfc-editor.org/info/rfc9552>. | <https://www.rfc-editor.org/info/rfc9552>. | |||
| [RFC9667] Li, T., Ed., Psenak, P., Ed., Chen, H., Jalil, L., and S. | [RFC9667] Li, T., Ed., Psenak, P., Ed., Chen, H., Jalil, L., and S. | |||
| Dontula, "Dynamic Flooding on Dense Graphs", RFC 9667, | Dontula, "Dynamic Flooding on Dense Graphs", RFC 9667, | |||
| DOI 10.17487/RFC9667, October 2024, | DOI 10.17487/RFC9667, October 2024, | |||
| <https://www.rfc-editor.org/info/rfc9667>. | <https://www.rfc-editor.org/info/rfc9667>. | |||
| Acknowledgements | ||||
| The authors would like to thank Alvaro Retana, Yan Filyurin, Boris | ||||
| Hassanov, Stig Venaas, Ron Bonica, Mallory Knodel, Dhruv Dhody, Erik | ||||
| Kline, Éric Vyncke, and John Scudder for their reviews and comments. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Keyur Patel | Keyur Patel | |||
| Arrcus, Inc. | Arrcus, Inc. | |||
| 2077 Gateway Pl | 2077 Gateway Pl | |||
| San Jose, CA, 95110 | San Jose, CA 95110 | |||
| United States of America | United States of America | |||
| Email: keyur@arrcus.com | Email: keyur@arrcus.com | |||
| Acee Lindem | Acee Lindem | |||
| LabN Consulting, L.L.C. | Arrcus, Inc. | |||
| 301 Midenhall Way | 301 Midenhall Way | |||
| Cary, NC, 95110 | Cary, NC 27513 | |||
| United States of America | United States of America | |||
| Email: acee.ietf@gmail.com | Email: acee.ietf@gmail.com | |||
| Shawn Zandi | Shawn Zandi | |||
| Email: shafagh@shafagh.com | ||||
| 222 2nd Street | ||||
| San Francisco, CA 94105 | ||||
| United States of America | ||||
| Email: szandi@linkedin.com | ||||
| Gaurav Dawra | Gaurav Dawra | |||
| 222 2nd Street | Sunnyvale, CA | |||
| San Francisco, CA 94105 | ||||
| United States of America | United States of America | |||
| Email: gdawra@linkedin.com | Email: gdawra.ietf@gmail.com | |||
| Jie Dong | Jie Dong | |||
| Huawei Technologies | Huawei Technologies | |||
| No. 156 Beiqing Road | No. 156 Beiqing Road | |||
| Beijing | Beijing | |||
| China | China | |||
| Email: jie.dong@huawei.com | Email: jie.dong@huawei.com | |||
| End of changes. 79 change blocks. | ||||
| 250 lines changed or deleted | 254 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||