WO2007102965A2 - Technique for preventing routing loops by disseminating bgp attribute information in an ospf-configured network - Google Patents

Technique for preventing routing loops by disseminating bgp attribute information in an ospf-configured network Download PDF

Info

Publication number
WO2007102965A2
WO2007102965A2 PCT/US2007/003033 US2007003033W WO2007102965A2 WO 2007102965 A2 WO2007102965 A2 WO 2007102965A2 US 2007003033 W US2007003033 W US 2007003033W WO 2007102965 A2 WO2007102965 A2 WO 2007102965A2
Authority
WO
WIPO (PCT)
Prior art keywords
ospf
tlv
network
bgp
network device
Prior art date
Application number
PCT/US2007/003033
Other languages
French (fr)
Other versions
WO2007102965A3 (en
Inventor
Sina Mirtorabi
Mukhtiar Shaikh
Peter Psenak
Muhammad Ahmed Moizuddin
Original Assignee
Cisco Technology, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology, Inc. filed Critical Cisco Technology, Inc.
Priority to CN200780008232XA priority Critical patent/CN101401083B/en
Priority to EP07749940A priority patent/EP1997017B1/en
Publication of WO2007102965A2 publication Critical patent/WO2007102965A2/en
Publication of WO2007102965A3 publication Critical patent/WO2007102965A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/033Topology update or discovery by updating distance vector protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations

Definitions

  • This invention relates generally to preventing routing loops in a computer network, and, more specifically, to a novel technique for transporting Border Gateway Protocol (BGP) attribute information in an Open Shortest Path First (OSPF) configured network so as to prevent routing loops.
  • Border Gateway Protocol Border Gateway Protocol
  • OSPF Open Shortest Path First
  • a computer network is a geographically distributed collection of interconnected subnetworks, such as local area networks (LAN), that transport data between network nodes.
  • LAN local area networks
  • a network node is any device adapted to send and/or receive data in the computer network.
  • node and “device” may be used interchangeably.
  • the network topology is defined by an ar- rangement of network nodes that communicate with one another, typically through one or more intermediate network nodes, such as routers and switches.
  • data also may be exchanged between nodes located in different networks.
  • an "edge device" located at the logical outer-bound of a first computer network may be adapted to send and receive data with an edge device situated in a neighboring (i.e., adjacent) network.
  • Inter-network and intra-network communications are typically effected by exchanging discrete packets of data according to predefined protocols.
  • a protocol consists of a set of rules defining how network nodes interact with each other.
  • Each data packet typically comprises "payload" data prepended ("encapsulated”) by at least one network header formatted in accordance with a network communication protocol.
  • the network headers include information that enables network nodes to efficiently route the packet through the computer network.
  • a packet's net- work headers include a data-link (layer 2) header, an internetwork (layer 3) header and a transport (layer 4) header as defined by the Transmission Control Protocol/ Internet Protocol (TCP/EP) Reference Model.
  • TCP/EP Transmission Control Protocol/ Internet Protocol
  • the TCP/IP Reference Model is generally described in more detail in Section 1.4.2 of the reference book entitled Computer Net- s works, Fourth Edition, by Andrew Tanenbaum, published 2003, which is hereby incorporated by reference as though fully set forth herein.
  • a data packet may originate at a source node and subsequently "hop" from node to node along a logical data path until it reaches its destination.
  • IP Internet Protocol o
  • IP addresses are typically formatted in accordance with the IP Version 4 (IPv4) protocol, in which network nodes are addressed using 32 bit (four byte) values.
  • IPv4 IP Version 4
  • IPv6 IP Version 6
  • a network or subnetwork is allocated a predetermined set of IP addresses which may be assigned to network nodes situated within that network or subnetwork.
  • a subnetwork is a subset of a larger computer network, and thus network nodes in the subnetwork may be configured to communicate with nodes located in other subnetworks.
  • a subnet mask may be used to select a set of contiguous high-order bits from IP addresses within a subnetwork's allotted address space.
  • a subnet mask length indicates the number of contiguous high-order bits selected by the subnet mask, and a subnet mask length of N bits is hereinafter represented as /N.
  • the subnet mask length for a given subnetwork is typically selected based on the number of bits required to distinctly 5 address nodes in that subnetwork.
  • an "address prefix” is defined as the result of applying a subnet mask to a network address, such as an IP address.
  • An address prefix therefore specifies a range of network addresses in a subnetwork, and in IPv4 a /32 address prefix corresponds to a particular network address.
  • a "route” is defined herein as an address prefix and its associated path attributes.
  • the path attributes o generally include any information that characterizes the address prefix, and may in- elude various protocol-specific attributes, such as conventional Border Gateway Protocol attributes.
  • IGP- Interior Gateway Protocols
  • a computer network may contain smaller groups of one or more subnetworks which may be managed as separate autonomous systems.
  • an autonomous system is broadly construed as a collection of interconnected network nodes under a common administration.
  • the AS is managed by a single administrative entity, such as a company, an academic institution or a branch of government.
  • the AS may operate as an enterprise network, a service provider or any other type of network or subnetwork.
  • Each AS is typically assigned a unique identifier, such as a unique AS number, that identifies the AS among a plurality of ASes in a computer network.
  • An AS may contain one or more edge devices (or “autonomous system border routers” (ASBR)), having peer connections to other edge devices located in adjacent networks or subnetworks. Thus, packets enter or exit the AS through an appropriate ASBR.
  • the AS may be logically partitioned into a plurality of different "routing areas.” Each routing area includes a designated set of network nodes that are configured to share routing and topology information. As such, the network nodes in a routing area share a consistent "view" of the network topology.
  • the nodes can calculate consistent sets of "best paths" through the AS, e.g., using conventional shortest path first (SPF) calculations or other routing computations.
  • a calculated best path corresponds to a preferred data path for transporting data between a pair of source and destination nodes.
  • the best path may be an intra-area, inter-area or inter-AS data path, depending on the locations of the source and destination nodes.
  • Area border devices such as area border routers (ABR) are located at the logical border of two or more routing areas. Accordingly, each ABR device participates in multiple routing areas and typically maintains a separate set of routing and topology information for each adjacent routing area in which it participates. Each network node in a routing area typically maintains its own link-state database (LSDB). The LSDB is configured to store topology information advertised with the node's routing area. Because an ABR (by definition) participates in multiple routing areas, each ABR therefore maintains a separate LSDB for each of its routing areas.
  • ABR area border routers
  • Network nodes located in the same routing area generally exchange routing in- 5 formation and network-topology information using an "interior gateway” routing protocol (IGP), such as a link-state protocol.
  • IGP interior gateway
  • An example of a conventional link-state protocol is the Open Shortest Path First (OSPF) protocol, which is described in more detail in Request for Comments (RFC) 2328, entitled OSPF Version 2, dated April 1998, which is publicly available through the Internet Engineering Task Force (IETF) and is o hereby incorporated by reference in its entirety.
  • OSPF Open Shortest Path First
  • OSPF employs conventional link-state advertisements (LSA) for exchanging routing and topology information between a set of interconnected intermediate network nodes, i.e., routers and switches.
  • LSA link-state advertisements
  • different types of LSAs maybe used to com- • rnunicate the routing and topology information.
  • the OSPF version 2 s specification RRC 23278 defines the following types of LSAs: Router, Network, Summary and AS-External LSAs. Router and Network LSAs are used to propagate link information within a routing area.
  • Router LSAs advertise router- interface links (i.e., links connected to routers) and their associated cost values
  • Network LSAs advertise network-interface links (i.e., links connected to subnetworks) o and their associated cost values within the routing area.
  • Summary and AS-External LSAs are used to disseminate routing information between routing areas.
  • the Summary LSA is typically generated by an ABR and is used to advertise intra- AS ("internal") routes between routing areas.
  • the ABR receives various LSAs that are advertised in a first routing area.
  • the ABR "summa- 5 rizes" the advertised routes by aggregating routes where possible.
  • the ABR stores the summarized routes in a Summary LSA, which it then advertises in a second routing area. In this way, nodes in the second area are made aware of routes in the first routing area that can be reached through the ABR.
  • An AS-Extemal LSA stores a list of reachable inter-AS ("external") routes, i.e., located outside of the AS.
  • the AS-External o LSA is typically generated by an ASBR and is propagated throughout the AS to iden- tify which external routes can be reached through the advertising ASBR.
  • routes stored in an AS-External LSA are generally not aggregated.
  • Opaque LSAs provide an extensible LSA format for use with the OSPF protocol and are generally described in more detail in the IETF publication RFC 2370, entitled The OSPF Opaque LSA Option, published July 1998, by R. Coltun, which publication is hereby incorporated by reference as though fully set forth herein.
  • opaque LSAs may be advertised ("flooded") between network nodes (link- scope), within a routing area (area-scope) or throughout an AS (AS-scope). While the conventional Router, Network, Summary and AS-External LSAs are constrained by their respective formats set forth in the OSPF protocol specification (RFC 2328), opaque LSAs are generally more flexible in what information they can transport.
  • an opaque LSA may be configured to store one or more type-length-value (TLV) tuples containing selected OSPF attributes associated with routes advertised in the opaque LSA.
  • TLV type-length-value
  • RA OSPF Router Attributes
  • the RA-TLV may contain one or more route attributes that are encoded as sub-TLVs within the RA-TLV.
  • the RA-TLV is only used to transport sub-TLVs containing OSPF tags, extended tags and multi-topology identifiers associated with OSPF routes advertised in the RA-Opaque LSA.
  • a virtual private network is a collection of network nodes that establish private communications over a shared backbone network.
  • VPNs were implemented by embedding private leased lines in the shared network.
  • the leased lines i.e., communication links
  • the above-described VPN implementation has been mostly replaced by private "virtual circuits" deployed in public networks. Spe- cifically, each virtual circuit defines a logical end-to-end data path between a pair of network nodes participating in the VPN.
  • Network nodes belonging to the same VPN may be situated in different subnetworks, or "customer sites.” Each customer site may participate in one or more different VPNs, although most often each customer site is associated with a single VPN, and hereinafter the illustrative embodiments will assume a one-to-one correspondence between customer sites and VPNs. For example, customer sites owned or managed by a common administrative entity, such as a corporate enterprise, may be statically assigned to the enterprise's VPN. As such, network nodes situated in the enterprise's various customer sites participate in the same VPN and are therefore permitted to securely communicate with one another.
  • the customer sites typically communicate with one another through a service provider network ("provider network").
  • the provider network is an AS that functions as a backbone network through which VPN information may be exchanged between customer sites.
  • the provider network may include both provider edge (PE) devices which function as ASBRs at the logical outer edge of the provider network, as well as provider (P) devices situated within the interior ("core") of the provider network.
  • PE provider edge
  • P provider
  • each customer site contains at least one customer edge (CE) device coupled to a PE device in the provider network.
  • CE customer edge
  • the customer site may be multi-homed to the provider network, i.e., wherein one or more of the customer's CE devices is coupled to a plurality of PE devices.
  • the PE-CE data links may be established over various physical mediums, such as conventional wire links, optical links, wireless links, etc., and may communicate data formatted using various network communication protocols including ATM, Frame Relay, Ethernet, Fibre Distributed Data Interface (FDDI), etc.
  • provider networks often provide the customer sites with layer-3 network-based VPN services that utilize IP and/or Multi-Protocol Label Switching (MPLS) technologies. These networks are typically said to provide "MPLS/VPN" services.
  • MPLS Multi-Protocol Label Switching
  • PE and CE devices are configured to exchange routing information over their respective PE-CE data links in accordance with the Border Gateway Protocol (BGP).
  • BGP Border Gateway Protocol
  • the BGP protocol is well known and described in detail in RFC 1771 by Y. Rekhter and T. Li, entitled .4 Border Gateway Protocol 4 ⁇ GP-4), dated March 1995, which publication is hereby incorporated by reference as though fully set forth herein.
  • a variation of the BGP protocol known as internal BGP (iBGP) is often used to distribute routing and reachability information between PE devices in the provider network.
  • iBGP internal BGP
  • the PE devices must be "fully meshed," such that each PE device is coupled to every other PE device, e.g., by way of a Transmission Control Protocol (TCP) connection.
  • TCP Transmission Control Protocol
  • the folly- meshed PE devices may be directly connected or may be otherwise coupled, e.g., by one or more conventional BGP route reflectors.
  • BGP-enabled PE and CE devices perform various routing functions, including transmitting and receiving BGP messages and rendering routing decisions based on BGP routing policies.
  • Each BGP-enabled device maintains a local BGP routing table that lists feasible routes to reachable (i.e., accessible) network nodes and subnetworks.
  • the BGP table also may associate one or more BGP attributes with each route that it stores. For example, a conventional BGP AS-path attribute may be associated with a BGP route so as to identify a particular AS path that may be used for reaching that route.
  • the AS path is represented as an ordered sequence of AS numbers corresponding to which ASes must be traversed in order to reach the route's associated node or subnetwork.
  • BGP is most often executed over PE-CE data links
  • other protocols also may be used to exchange routing and topology information between a customer- site CE device and a provider-network PE device.
  • OSPF the Internet Draft publication ⁇ draft-ietf-13vpn-ospf-2547-05.txt>, entitled OSPF as the Provider/Customer Edge Protocol for BGP/MPLSIP VPNs, published November 2005 by Rosen et al., which publication is publicly available through the IETF and is hereby incorporated by reference in its entirety, describes an implementation in which OSPF is executed over a PE-CE link.
  • the PE device functions as an ABR for the customer site containing the CE device, and thus the PE device maintains both an OSPF LSDB contain- ing the customer site's IGP topology information as well as a BGP table containing BGP routes that have been distributed, e.g., via iBGP, within the provider network.
  • Routing protocols such as OSPF and BGP, typically perform "best path" com- putations for selecting a preferred data path for transporting data to a destination node or subnetwork. Therefore, it is possible that two or more networks or subnetworks may select each other as the best path to reach a certain destination. In such a scenario, a "routing loop" can develop where data addressed to that destination is circulated among the two or more networks or subnetworks and may never actually reach its intended recipient.
  • An example of a conventional routing loop is illustrated in Fig. 1.
  • Fig. 1 illustrates an exemplary network 100 including a provider network ASl 110 coupled to two customer sites 120 and 130 (labeled "A" and "B," respectively).
  • the customer sites A and B participate in the same VPN, e.g., VPNl, and therefore communicate with one another through the provider network 110.
  • the customer site 120 includes CE devices 125a and 125b (CEl and CE2) which are coupled to respective PE devices 115a and 115b (PEl and PE2) in the provider network.
  • the customer site 130 includes a CE device 135c (CE3) which is coupled to a PE device 115c (PE3) in the provider network.
  • CE3 CE device 135c
  • CE3 advertises a message over the PE3-CE3 data link indicating that CE3 can reach the destination prefix "X."
  • the advertised prefix is received by
  • PE3 which in turn distributes the advertised prefix, e.g., in an iBGP update message, to the devices PEl and PE2 in the provider network.
  • PEl After PEl receives the iBGP advertisement, PEl advertises the prefix X over the PEl-CEl data link, thereby signaling to nodes in the customer site 120 that the prefix X can be reached via PEl .
  • the prefix X is then distributed within the customer site 120 using an appropriate IGP protocol.
  • CE2 may advertise over the PE2-CE2 data link that it can reach the prefix X. In response to receiving CE2's advertisement, PE2 may distribute this reachability information to the provider-edge devices PEl and PE3.
  • the prefix X may be advertised along the sequential data flow CE3-PE3-PE1-CE1-CE2-PE2-PE1, the prefix also may be advertised along a similar loop (not shown) CE3-PE3-PE2-CE2-CE1-PE1- PE2.
  • network nodes in the customer site 120 become aware that the prefix X is reachable through PEl, and PEl becomes aware that the prefix X can be reached via PE2 or PE3.
  • a routing loop may develop if the best-path calculations performed at PEl determine that data addressed to the destination prefix X should be routed to the customer site 120 via PE2, instead of correctly routing the data through PE3 to the customer site 130.
  • the data addressed to the prefix X may be passed back and forth between ASl and the customer site 120, e.g., around the routing loop CE1-PE1-PE2-CE2-CE1.
  • OSPF Provider/Customer Edge Protocol or BGP/MPLSIP VPNs.
  • This proposed solution relies on an OSPF route tag for identifying when one or more advertised routes have already been advertised from a PE device to a CE device. Accordingly, when an LSA containing an advertised route and a corresponding OSPF route tag is received at a PE device, that PE device can identify the route tag and determine that the received route was previously advertised by a PE device in the provider network.
  • the PE device can conclude that the received route should not be propagated again through the provider network.
  • This known OSPF route-tag solution suffers the disadvantage that it is not applicable when Summary LSAs are exchanged over PE-CE data links. More specifically, Summary LSAs are not formatted in a manner that enables them to transport the OSPF route tags. Instead, .the route tags are typically transported in AS-External LSAs which carry external routing information. Thus, this solution is generally undesirable since it precludes the use of Summary LSAs for advertising internal routes over PE-CE links and therefore does not permit conventional route aggregation techniques that are traditionally employed for reducing the number of routes processed in an OSPF routing area.
  • the OSPF external route tag solution does not apply to multi-homed networks.
  • Yet another solution for preventing routing loops where OSPF is executed over the PE-CE data links is described in the Internet Draft publication ⁇ draft-ietf-ospf- 2547-dribit-04.txt>, entitled Using an LSA Options Bit to Prevent Looping in BGP/MPLS IP VPNs, published March 2004 by Rosen et al., which publication is publicly available through the IETF and is hereby incorporated by reference as though fully set forth herein.
  • This solution proposes using the most-significant bit, i.e., the "DN" bit, in the conventional LSA-options field to indicate when an OSPF LSA has been advertised from a PE device to a CE device. Because every LSA transports the LSA- options field, this DN-bit solution is not limited to only AS-External LSAs.
  • the routing information transported in the received LSA is excluded from the PE device's SPF calculation (e.g., the LSAs are not stored in the OSPF LSDB).
  • the LSA' s advertised routes are not installed in the PE device's routing table. In this way, the uninstalled routes are not redistributed into the provider network's BGP tables, thereby ensuring that routing loops cannot develop between the provider network and the customer site containing the CE device.
  • Fig. 2 illustrates the exemplary network 100 in which the DN-bit solution is de- ployed for preventing routing loops.
  • CE3 advertises the prefix X over the PE3- CE3 data link.
  • the advertised prefix X is received by PE3, which in turn advertises the prefix, e.g., in an iBGP update message, to the devices PEl and PE2.
  • PEl After PEl receives the iBGP advertisement, PEl advertises a conventional OSPF LSA containing the prefix X over the PEl-CEl data link.
  • PEl sets the DN-bit in the advertised LSA to indicate that the prefix X is reachable through the provider network.
  • the LSA with its DN bit set, is distributed throughout the customer site 120.
  • CE2 may forward the LSA back to the provider network 110 over the PE2-CE2 link.
  • PE2 can determine that the LSA was generated by another PE device (PEl) in the provider net- work.
  • PE2 does not install the prefix X in its routing table, thereby preventing any potential routing loops from developing between the customer site 120 and the provider network 110. That is, network nodes in customer site 120 are aware that prefix X can be reached via PEl, and PEl is only aware that prefix X can be reached via PE3.
  • the provider network ASl 310 is coupled to the customer sites 330, 340 and 350 (labeled "A,” “B” and “C” respectively) which participate in the same VPN, e.g., VPNl .
  • the customer sites 340 and 350 are also coupled to a second provider network AS2 320.
  • the provider network ASl may function as a primary Internet service provider (ISP), whereas the provider network AS2 functions as a backup ISP through which the customer sites 330-350 may communicate in the event that a PE-CE link to ASl fails.
  • ISP Internet service provider
  • ASl and AS2 are not configured to communicate directly with one another.
  • the customer site 330 includes a CE device 335a (CEl) which is coupled to a PE device 315a (PEl) located in ASl.
  • ASl also includes a PE device 315b (PE2) coupled to a CE device 345b (CE2) situated in the customer site 340, as well as to a PE device 315c (PE3) coupled to a CE device 355c (CE3) located in the customer site 350.
  • a CE device 345d (CE4) in the customer site 340 is coupled to a PE device 325d (PE4) in AS2, and a CE device 355e (CE5) in the customer site 350 is coupled to a PE device 325e (PE5) in AS2.
  • each of the PE-CE data links' is configured to execute OSPF.
  • CEl may advertise to PEl that the prefix X can be reached via CEl.
  • PEl propagates the prefix X, e.g., in iBGP update messages, to the devices PE2 and PE3.
  • PE2 and PE3 each may advertise an LSA containing the prefix X to the customer-edge devices CE2 and CE3.
  • the LSAs advertised over the PE2-CE2 and PE3-CE3 data links have their DN bits set to a predetermined value so as to indicate that the prefix X is reachable through a PE device.
  • the provider-edge devices PE4 and PE5 notice that the DN bits are set in the received LSAs and, consequently, exclude the prefix X from their OSPF and BGP routing tables.
  • the customer sites 340 and 350 do not learn that the prefix X can be reached via the ISP AS2.
  • the backup connectivity of AS2 is "broken" for the backup ISP AS2, since the customer sites 340 and 350 are only made aware that the prefix X can be reached through the primary ISP ASl.
  • the customer site 340 is not aware that the prefix X can alternatively be reached through AS2, e.g., via the backup data path CE4-PE4-PE5-CE5-CE3-PE3-PE1-CE1.
  • the customer site 350 is not aware that the prefix X can be reached through AS2, e.g., via the backup data path CE5-PE5-PE4-CE4-CE2-PE2-PE1-CE1.
  • a routing-loop prevention technique that does not break the backup connectivity of the topology.
  • the technique should not be limited to AS-External LSAs sent over PE-CE links and instead should be operable with any type of OSPF LSA sent over a PE-CE data link.
  • the present invention overcomes the disadvantages of the prior art by providing a novel technique for preventing routing loops by disseminating BGP attribute information in an OSPF-configured network.
  • a new OSPF sub-TLV is introduced for transporting a conventional BGP AS-path attribute through the OSPF-configured network.
  • an OSPF AS-path sub-TLV is configured to store a set of AS numbers corresponding to the AS path of one or more advertised routes.
  • the network device determines that the LSA' s advertised routes have been previously advertised to the autono- mous system, and thus the network device does not install the routes in its routing table since the routes, if installed, could create routing loops between autonomous systems.
  • the network device may install the LSA's advertised routes in its routing table and then propagate the routes to other autonomous systems.
  • the routes may be propagated along with an updated AS-path sub-TLV that stores an AS path including the AS number of the network device's autonomous system. In this manner, the LSA's advertised routes can be propagated across multiple autonomous systems without creating routing loops as a result of their propagation.
  • the novel AS-path sub-TLV may be used to prevent routing loops without breaking backup connectivity in networks having multiple autonomous systems that are not configured to communicate with one another.
  • the inventive technique can prevent routing loops from developing when a route is advertised from a first customer site to a primary AS to a second customer site and then to a secondary ("backup") AS which is not in communication with the primary AS.
  • the technique may be deployed to prevent routing loops in single-AS as well as multi-AS environments.
  • the inventive technique may be used to prevent routing loops for both internal and external routes advertised in an OSPF routing area.
  • Fig. 1 previously described, is an exemplary computer network in which routing loops may develop;
  • Fig. 2 previously described, is an exemplary computer network configured to execute the OSPF protocol over PE-CE data links, wherein a DN-bit solution is deployed over the PE-CE data links for preventing routing loops;
  • Fig. 3, previously described, is an exemplary network topology in which the conventional DN-bit solution does not effectively prevent routing loops, the topology including multiple provider networks that are not configured to directly communicate with one another;
  • Fig. 4 is an exemplary computer network in which an illustrative embodiment of the present invention may be advantageously deployed for preventing routing loops;
  • Fig. 5 is an exemplary OSPF LSA that may be used to transport, among other things, a novel AS-path sub-TLV in accordance with the illustrative embodiment
  • Fig. 6 is an exemplary BGP update message that may be used to transport, among other things, a BGP AS-path attribute in accordance with the illustrative embodiment
  • Fig. 7 is a schematic block diagram of an exemplary PE device that maybe advantageously employed in the illustrative embodiment of the invention
  • Fig. 8 is a schematic block diagram illustrating an exemplary software process arrangement that the exemplary PE device may use to redistribute routes and AS-path information between the OSPF and BGP protocols in accordance with the illustrative embodiment
  • Fig. 9 is a flowchart illustrating a sequence of steps that may be performed by a network device that is configured to advertise an OSPF route and its associated AS- path sub-TLV in accordance with the illustrative embodiment.
  • Fig. 10 is a flowchart illustrating a sequence of steps that a network device may perform for preventing routing loops in accordance with the illustrative embodiment.
  • FIG. 4 illustrates an exemplary computer network 400 in which an illustrative embodiment of the present invention may be deployed.
  • the network 400 includes a first provider network ASl 410 and a second provider network AS2 420.
  • the provider networks ASl and AS2 are not configured to directly communicate with one another, e.g., due to contractual agreement or lack of connectivity.
  • the exemplary network 400 also includes a set of customer sites 430, 440 and 450 (labeled "A,” “B” and "C" respectively) which participate in the same VPN, e.g., VPNl.
  • Each of the customer sites 430-450 is coupled to ASl, which functions as a "primary" ISP for exchanging data among the VPNl customer sites.
  • ASl which functions as a "primary" ISP for exchanging data among the VPNl customer sites.
  • the customer sites 440 and 450 are also coupled to AS2, which functions as a "backup" ISP in the event that a PE-CE link to ASl fails.
  • the customer site 430 includes a CE device 470a (CEl) which is coupled to a PE device 700a (PEl) located in ASl.
  • ASl also includes a PE device 700b (PE2) coupled to a CE device 470b (CE2) situated in the customer site 440, as well as to a PE device 700c (PE3) coupled to a CE device 470c (CE3) located in the customer site 450.
  • a CE device 47Od (CE4) in the customer site 440 is coupled to a PE device 70Od (PE4) in AS2, and a CE device 47Oe (CE5) in the customer site 350 is coupled to a PE device 70Oe (PE5) in AS2.
  • Each of the data links PEl-CEl 460a, PE2-CE2 460b, PE3-CE3 460c, PE4-CE446Od and PE5-CE5 46Oe is preferably configured to accommodate execution of the OSPF protocol, and each of the devices PE1-PE5 functions as an ABR device for its respective neighboring OSPF- configured customer site 430-450.
  • CEl may advertise an OSPF LSA 500a to PEl indicating that the prefix X can be reached via CEl.
  • PEl propagates the pre- fix X 5 e.g., in iBGP update messages (hereinafter "BGP update message"), to the other fully-meshed devices PE2 and PE3.
  • the BGP update messages may be sent directly to PE2 and PE3, or may be forwarded using a conventional route reflector, as is known in the art.
  • BGP update message 600a is shown forwarded to PE2.
  • PE2 may notify CE2 that the prefix X can be reached through PE2. To that end, PE2 may forward the prefix X in an OSPF LSA 500b to CE2.
  • PE2 may be configured to store BGP path- attribute information, such as AS-path information, in the LSA 500b.
  • the AS-path information may be used to prevent routing loops in accordance with the present inven- tion.
  • the LSA 500b includes a novel OSPF sub-TLV 550b that is configured to store a conventional BGP AS-path attribute over the OSPF-configured PE2-CE2 data link 460b.
  • the OSPF AS- path sub-TLV is configured to store a set of AS numbers corresponding to the AS path of one or more advertised routes.
  • the sub-TLV 550b stores the AS number of provider network ASl, since the LSA 500b is being advertised by PE2, which is resident in ASl.
  • CE2 receives the LSA 500b from PE2 and disseminates the LSA throughout the OSPF-configured customer site 440.
  • the customer site 440 may contain one or more routing areas through which the LSA 500b may be propagated.
  • CE4 receives the LSA 500b, it forwards the LSA over the PE4-CE4 data link 46Od to PE4 situated in AS2.
  • PE4 is configured, to advertise the prefix X and its associated AS-path information to other PE devices in AS2, as long as the AS number of AS2 is not included in the prefix's AS path.
  • the AS-path sub-TLV 550b indicates that the AS path for the prefix X includes only ASl, and therefore the sub-TLV does not store the AS number of the provider network AS2 in which PE4 is located. Since the AS number of AS2 is not stored in the received AS-path sub-TLV 550b, PE4 advertises the prefix X in a BGP update message 600b, along with a conventional BGP AS-path attribute 650b, to the other fully-meshed PE devices in the provider network AS2.
  • the BGP attribute 650b stores the same list of AS numbers received in the AS-path sub-TLV 550b, and thus stores only the AS number of ASl.
  • PE5 may store the prefix X and its AS-path information in an OSPF LSA 500c and send the LSA 500c to the customer-edge device CE5, thereby signaling to CE5 that the prefix X is reachable through PE5.
  • PE5 includes a novel AS-path sub-TLV 550c in the LSA 500c, the AS-path sub-TLV 550c storing the AS path associated with the advertised prefix X.
  • PE5 generates the AS-path sub-TLV 550c by prepending the AS number of provider network AS2 to the list of AS numbers already stored in the received BGP AS-path attribute 650b.
  • the sub-TLV 550c transports the ordered sequence of AS numbers ⁇ AS2, ASl).
  • AS numbers need not be sequentially prepended as illustratively described herein, and more generally the set of AS numbers may be listed in the AS-path sub-TLV in various sequential or non-sequential manners.
  • CE5 disseminates the LSA 500c throughout the customer site 450.
  • CE3 receives the LSA 500c and forwards it over the PE3- CE3 data link 460c to PE3.
  • PE3 determines whether the received AS-path sub-TLV 550c includes the AS number corre- sponding to ASl, i.e., the provider network in which PE3 is located. In this case, because the AS-path sub-TLV 550c contains the AS number of ASl, PE3 determines that the prefix X (transported by the LSA 500c) was previously advertised throughout the provider network ASl .
  • PE3 does not install the prefix X in its routing table so as to prevent potential routing loops from developing in the network 400.
  • PE2 similarly may identify a potential routing loop in accordance with the present invention, if PE2 receives the prefix X and an AS-path sub-TLV containing the AS number of ASl, where the data flow is CEl-PEl -PE3-CE3-CE5-PE5-PE4-CE4-CE2-PE2.
  • the present invention may be used in conjunction with the DN bit as described above with reference to Fig. 2 and Fig. 3.
  • the DN bit prevents routing loops from occurring by excluding from SPF calculations any advertised prefixes received with a DN bit set by an egress border router (e.g., PE device).
  • an egress border router e.g., PE device.
  • unnecessary exclusions may occur in various network configurations, such as, e.g., the backup service provider configuration of Fig. 3 and Fig. 4.
  • the present invention "improves" the DN bit behavior by allowing the PE devices receiving DN bit LSAs prior to the AS-path sub-TLV 550 LSAs 500 to exclude (perhaps unnecessarily) one or more reachable address prefixes (e.g., prefix X).
  • prefix X e.g., prefix X
  • the decision to exclude/include the prefix (X) in its routing table based on the AS-path sub-TLV overrides any decisions based on the DN bit. In other words, if the DN bit exclusion is proper, no changes are made, but if it is improper, the prefix may be added accordingly.
  • the LSA 500 may be formatted as a type- 10 opaque LSA, which is defined in the above- incorporated RFC 2370, entitled The OSPF Opaque LSA Option.
  • the opaque LSA 500 includes, among other things, an LSA header 510 and one or more TLVs, such as a RA-TLV 530 described in more detail in the above-incorporated IETF Internet Draft publication ⁇ draft-mirtorabi-ospf-tag-01.txt>, entitled Extensions to OSPFv2 for Adver- tising Optional Route/Link Attributes.
  • the LSA 500 also may store link-state information and other TLVs which are not explicitly shown in Fig. 5. Those skilled in the art will understand that while a type- 10 opaque LSA is described herein, other types may be used in accordance with the present invention.
  • the LSA header 510 includes a link-state (LS) age field 512, an LSA options field 514, an LS type field 516, an opaque-type field 518, an instance field 520, an advertising-router field 522, a LS sequence number field 524, a LS checksum field 526 and a length field 528.
  • the LS age field 512 stores an age value, e.g., usually in seconds, that may be used to determine whether the LSA 500 is valid.
  • the age value is o typically initialized to zero and incremented, e.g., by one every second, until it reaches a predetermined maximum value, thereby indicating that the LSA has become invalid.
  • the options field 514 stores a plurality of flag values that maybe used to signal whether certain capabilities are supported by the LSA' s advertising router. For instance, one flag may indicate whether the advertising router is configured to receive s and forward opaque LSAs.
  • the type field 516 equals 10 to indicate that the LSA 500 has area-wide scope, and therefore cannot be flooded beyond the routing area into which it is initially flooded.
  • the opaque-type field 518 stores a value that identifies the LSA 500 as a label-mapping LSA. If multiple instances of OSPF are executing over the same data link 0 460, the instance field 520 stores a value that identifies the particular OSPF instance for which the LSA 500 transports link-state information.
  • the advertising-router field 522 stores a value, such as a loopback IP address, that identifies the router that generated and originally broadcast the LSA 500.
  • the LS sequence number field 524 stores a sequence number indicating the relative version of the LSA.
  • the sequence s number is incremented, e.g., by one, for every new version of the LSA.
  • the LS checksum field 526 stores a checksum (or other data integrity check) that may be used to validate the contents of the LSA.
  • the length field 528 stores the length, e.g., in bytes, ofthe LSA 500.
  • the RA-TLV 530 includes, among other things, a TLV-type field 532, TLV- 0 length field 534, link-state identification (ID) field 536, reserved bits 538, prefix-length field 540, reserved field 542 and the AS-path sub-TLV 550.
  • the TLV-type field 532 stores a value indicating the type of route-attribute information (e.g., inter-area or external route attributes) that is stored in the RA-TLV 530.
  • the TLV-length field 534 stores the length (e.g., in bytes) of the RA-TLV.
  • the link-state ID field 536 stores the address prefix of a data link associated with the route attributes transported in the RA- TLV.
  • the prefix-length field 540 stores the length of the prefix stored in the link-state ID field 536.
  • the reserved bits 538 and reserved field 542 are presently unused.
  • the RA-TLV 530 maybe configured to store one or more sub-TLVs, such as the novel AS-path sub-TLV 550.
  • the AS-path sub-TLV 550 is preferably formatted as a sub-TLV within the RA-TLV 530, it is also expressly contemplated that the AS-path sub-TLV alternatively may be formatted as a sub-TLV in other types of OSPF TLVs. Further, in some embodiments, the AS-path sub-TLV may be formatted as an actual TLV rather than a sub-TLV.
  • the AS-path sub-TLV 550 is configured to store, inter alia, a sub-TLV type field 552, sub-TLV length field 554 and a list of one or more AS numbers 556.
  • the sub-TLV type field 552 stores a value that identifies the AS-path sub-TLV as containing AS-path information.
  • the sub-TLV length field 554 stores the length (e.g., in bytes) of the AS-path sub-TLV 550.
  • the list of AS numbers 556 indicates an AS path associated with the address prefix stored in the link-state ID field 536. Notably, the list is preferably an ordered sequence of AS numbers 556, although the list alternatively may be configured to store an unordered list, depending on the particular implementation.
  • Fig. 6 illustrates an exemplary BGP update message 600 that may be used in accordance with the illustrative embodiment.
  • the update message 600 includes a BGP header 610, a set of withdrawn routes 620, a set of path attributes 630 and a set of network layer reachability information (NLRI) 640.
  • the BGP header 610 may be config- ured to store, among other things, the length (in bytes) of the message 600, a type value (e.g., equal to 2) identifying the message as a BGP update message and a conventional 16-byte BGP marker, as known in the art.
  • the set of withdrawn routes 620 is configured to store zero or more address prefixes that are no longer reachable through a sending PE device.
  • a PE device may withdraw a set of routes in response to a topology change, such as a failed data link or network node, that results in network traffic becoming inaccessible over the withdrawn routes.
  • a topology change such as a failed data link or network node
  • the NLRI 640 speci- fies zero or more address prefixes that are reachable (i.e., accessible) to the sending PE device.
  • the NLRI stores the prefix X 645.
  • the set of path attributes 630 is configured to store zero or more BGP attributes 5 that characterize the prefixes stored in the NLRI 640.
  • a path attribute is generally any property or characteristic that may be associated with the NLRI prefixes).
  • the set of path attributes may include an AS-path attribute 650 that carries AS-path information associated with the prefix(es) stored in the NLRI.
  • the AS-path attribute 650 includes a set of attribute flags 652, a code field 654, length field o 656 and a list of one or more AS numbers 658.
  • the set of attribute flags 652 are well known and are described in more detail in the above-incorporated RFC 1771.
  • the code field 654 stores a value that identifies the BGP attribute as containing AS-path information.
  • the length field 656 stores the length (e.g., in bytes) of the attribute 650.
  • the list of AS numbers 658 may contain an ordered or unordered set of AS numbers describing s the AS path of the prefixes stored in the NLRI 640.
  • other BGP path attributes and their formats are also generally well known and are further described in more detail in the above-incorporated RFC 1771.
  • Fig. 7 is a schematic block diagram of an exemplary PE device 700 that may be advantageously used in the illustrative embodiment.
  • the PE device 700 is illustrated on a generic hardware platform.
  • the PE device may contain a plurality of line cards which are interconnected with a route processing engine through a switching fabric (i.e., backplane logic and circuitry).
  • a switching fabric i.e., backplane logic and circuitry.
  • the PE device 700 comprises a plurality of network interfaces 710, a processor 720, and a memory 740 interconnected by a system bus 790.
  • the network interfaces 710 contain the mechanical, electrical and signaling logic and circuitry for communi- 0 eating data over physical links coupled to other network nodes in the computer network 400.
  • the network interfaces may be configured to transmit and/or receive data using a variety of different communication protocols, including, inter alia, TCP/IP, Asynchronous Transfer Mode (ATM), User Datagram Protocol (UDP), synchronous optical networks (SONET), synchronous digital hierarchy (SDH), various wireless protocols, Frame Relay, Ethernet, Fiber Distributed Data Interface (FDDI), etc.
  • ATM Asynchronous Transfer Mode
  • UDP User Datagram Protocol
  • SONET synchronous optical networks
  • SDH synchronous digital hierarchy
  • various wireless protocols Frame Relay, Ethernet, Fiber Distributed Data Interface (FDDI), etc.
  • the memory 740 comprises a plurality of storage locations, which are addressable by the processor 720 and the network interfaces 710.
  • the memory storage locations are adapted to store program code and data structures associated with the present invention.
  • the processor 720 comprises circuitry and logic adapted to execute the program code and manipulate the data structures.
  • the memory 740 preferably comprises a form of random access memory
  • RAM that is generally cleared by a power cycle or other reboot operation (e.g., it is a "volatile" memory).
  • the memory 740 also may comprise other memory means, including various computer-readable media, for storing program instructions and data structures pertaining to the operation of the PE device 700. Further, those skilled in the art will appreciate that at least some portions of the memory 740 may be embodied as electromagnetic signals that are transmitted from a remote memory element to the PE device 700.
  • the memory 740 stores, among other things, computer-readable instructions for implementing a routing operating system 750 that functionally organizes the PE device 700 by, inter alia, invoking network operations in support of software processes and services executing in the PE device.
  • the IO STM operating system by Cisco Systems Incorporated is one example of such a routing operating system 750.
  • the software processes and services supported by the routing operating system include a BGP process 760, an OSPF process 770, and an import/export process 780 (e.g., illustratively performed in conjunction with routing tables 775, as will be understood by those skilled in the art).
  • the BGP process includes computer-executable instructions that enable the processor 720 to implement external BGP (eBGP) and internal BGP (iBGP) functionality.
  • the BGP process 760 may be configured to manage the contents of a BGP table 765, which lists all of the feasible routes that are reachable (i.e., accessible) to the PE device 700 through neighboring customer sites. Again, a BGP "route" includes an address prefix and its associated BGP path attributes.
  • the PE device 700 may execute a separate OSPF process 770 for each VPN to which it is attached. For simplicity, each of the illustrative customer sites 430-450 participates in the same VPN, e.g., VPNl. Accordingly, each of the illustrative PE devices 700a-e executes only a single OSPF process 770 for managing reachability information in the VPNl .
  • the OSPF process 770 may be configured to manage an LSDB 772 which contains link-state information, e.g., for the VPNl . More specifically, the LSDB may be configured to store a set of destinations (nodes, networks or subnetworks) which are reachable in the VPN and further may be configured to store conventional OSPF cost metrics that are associated with the data links to the reachable destinations. In addition, for each reachable destination, the LSDB 772 also may be configured to store one or more associated OSPF TLVs or sub-TLVs, such as an AS-path sub-TLV 550.
  • Fig. 8 illustrates a schematic block diagram of the exemplary process arrangement 800 that may be used to redistribute routes between the routing table 775 and the BGP table 765.
  • the OSPF process 770 stores the LSA' s advertised prefix(es), e.g., prefix X, in appropriate entries in the LSDB 772.
  • the OSPF process 770 also stores in the LSDB any OSPF cost metrics or other link-state information, such as the AS-path sub-TLV 550, received in the LSA 500.
  • the OSPF process 770 may perform a shortest-path-first (SPF) computation to calculate the best paths, e.g., lowest cost paths, to reachable destinations in the VPNl, which are stored in routing table 775.
  • SPF shortest-path-first
  • each "best path" is a route that identifies a preferred data path to a reachable destination.
  • storing prefixes and AS-path information in an LSDB and storing routes in a routing table may be used inter- changeably herein due to their interrelationship, as will be understood by those skilled in the art.
  • the present invention excludes storing a route based on the excluded LSA in the routing table 775.
  • the import/export process 780 redistributes the calculated OSPF best paths from the routing table 775 into the BGP table 765. To that end, the import/export process may convert the OSPF routes into functionally equivalent BGP routes, e.g., by add- ing appropriate route distinguisher (RD) values (as per RFC 2547). The import/export process 780 also may convert the OSPF AS-path sub-TLVs 550 of the OSPF best paths into functionally equivalent BGP AS-path attributes 650 that may be stored in the BGP table 765. When a BGP update message 600 is received at the PE device 700, the BGP process 760 stores the advertised BGP routes and their associated BGP AS-path attributes 650 in the BGP table 765.
  • RD route distinguisher
  • the BGP process 760 may determine a set of BGP best paths for the reachable routes stored in the BGP table. Then, the import/export process 780 may redistribute the BGP best paths and their associated BGP AS-path attributes 650 from the BGP table 765 into the routing table 775. Specifically, the import/export process 780 may redistribute the BGP best paths by converting the BGP routes and their associated BGP AS-path attributes into functionally equivalent OSPF routes and OSPF AS-path sub-TLVs that may be stored in the routing table 775.
  • the OSPF process 770 is con- figured to prevent routing loops by selectively installing OSPF routes in the routing table 775 based on the AS-path information stored in the routes' associated AS-path sub- TLVs 550. More specifically, when a PE device 700 receives an OSPF LSA 500 containing an AS-path sub-TLV 550, the PE device's OSPF process 770 determines whether the PE device resides in an autonomous system whose AS number is stored in the received AS-path sub-TLV 550.
  • the OSPF process determines that the LSA's advertised OSPF routes have been previously advertised to the autonomous system, and thus the OSPF process does not install the routes in its routing table 775 since the routes, if installed, could result in routing loops. In this way, the received OSPF routes are excluded from the routing table (and SPF calculations) and cannot be redistributed into BGP for future propagation through the autonomous system.
  • the OSPF process may also be configured to prevent temporary routing loops based on additional DN bit behavior, as described above.
  • the OSPF process 770 may install the LSA's advertised OSPF routes in the routing table 775.
  • the installed OSPF routes and their associated AS-path sub-TLVs may be redistributed, e.g., by the import/export process 780, into the BGP table 765.
  • the redistributed routes may be propagated in a BGP update message 600 to other, fully-meshed PE devices 700 in the autonomous system.
  • a PE device 700 that subsequently receives the BGP update message 600 may store the advertised BGP routes in its local BGP table, redistribute the received BGP routes into its local OSPF routing table and then advertise the redistributed routes to a neighboring OSPF-configured CE device.
  • the PE device preferably sends the CE device an LSA 500 containing an updated AS-path sub-TLV 550, the updated AS-path sub-TLV storing an AS path that includes the AS number of the PE device's autonomous system.
  • Fig. 9 illustrates a sequence of steps that may be performed by a PE device 700
  • the sequence starts at step 900 and proceeds to step 910 where a BGP update message 600 containing at least one advertised BGP prefix 645 and an associated BGP AS-path attribute 650 is received at the PE device.
  • a BGP process 760 stores the re- ceived BGP prefix and AS-path attribute in the BGP table 765.
  • the import/export process 780 redistributes the prefix and AS-path attribute into the OSPF routing table 775.
  • the BGP prefix may be converted from a VPN-EP v4 BGP prefix to a conventional OSPF IPv4 prefix and the BGP AS-path attribute may be converted to a functionally equivalent OSPF AS-path sub-TLV 550.
  • the OSPF process 770 executing in the PE device 700 generates an LSA 500 configured to store both the redistributed OSPF prefix and its associated AS-path sub-TLV.
  • the PE device also may update the AS-path information stored in the AS-path sub-TLV by prepending the AS number of the PE device's provider network to the list of AS numbers stored in the AS-path sub-TLV.
  • the OSPF process forwards the LSA 500 to a CE device 470 via an OSPF-configured PE-CE data link 460. The sequence ends at step 960.
  • Fig. 10 illustrates a sequence of steps that the PE device 700 (e.g., as an ingress PE device) may perform for preventing routing loops in accordance with the illustrative embodiment.
  • the sequence starts at step 1000 and proceeds to step 1010 where the PE device receives one or more OSPF LSAs 500 containing at least one prefix and an associated AS-path sub-TLV 550 storing AS-path information for the at least one prefix.
  • the OSPF process 770 executing in the PE device determines whether the received AS- ⁇ ath sub-TLV stores the AS number of the provider network containing the PE device. If so, the sequence advances to step 1030 where the OSPF process determines that the route has already been advertised throughout the provider network, and therefore the PE device does not install the route in its routing table 775; the sequence ends at step 1080.
  • the PE device 700 determines that the received AS-path sub-TLV 550 does not store the AS number of the provider network containing the PE device, then at step 1040 the OSPF process 770 executing in the PE device stores the advertised route in the routing table 775 (e.g., storing the prefix and its AS-path information from the LSA in the LSDB 772). (Notably, storing the advertised route in the routing table may override a previous DN bit-based decision to exclude the route.) Then, at step 1050, the import/export process 780 redistributes the prefix and AS-path information into the BGP table 765.
  • the OSPF process 770 executing in the PE device stores the advertised route in the routing table 775 (e.g., storing the prefix and its AS-path information from the LSA in the LSDB 772). (Notably, storing the advertised route in the routing table may override a previous DN bit-based decision to exclude the route.)
  • the import/export process 780 red
  • the BGP process 760 exe- cuting in the PE device generates a BGP update message 600 containing both the redistributed prefix and a BGP AS-path attribute 650 that stores the route's associated AS- path information.
  • the BGP process forwards the generated BGP update message 600 to other PE devices in the PE device's provider network, at step 1070.
  • the sequence ends at step 1080.
  • the novel AS-path sub-TLV may be used to prevent routing loops without breaking backup connectivity in networks having multiple autonomous systems that are not configured to communicate with one another.
  • the inventive technique can prevent routing loops from developing when a route is advertised from a first customer site to a primary AS to a second customer site and then to a secondary ("backup") AS which is not in communication with the primary AS. More generally, the technique may be deployed to prevent routing loops in single- AS as well as multi-AS environments. Further, the inventive technique may be used to prevent routing loops for both internal and external routes advertised in an OSPF routing area.
  • the illustrative embodiment utilizes a novel AS-path sub-TLV to prevent routing loops when OSPF is executed over PE-CE data links
  • the teachings of the invention are equally applicable when other IGP protocols are executed over PE-CE data links.
  • IS-IS Intermediate-System-to-Intermediate-System
  • the herein described OSPF AS-path sub-TLV may be replaced with a functionally equivalent IS-IS AS-path sub-TLV, e.g., that may be transported in conventional IS-IS link-state packets (LSP).
  • LSP IS-IS link-state packets
  • the present invention is generally applicable for transporting any type of BGP attribute information in an OSPF LSA.
  • the illustrative embodiment uses the novel sub-TLV 550 for carrying BGP AS-path attribute information through an OSPF-configured network
  • the novel sub- TLV more generally may be formatted to carry any type of BGP attribute information, such as information conventionally stored in of the BGP attributes described in the above-incorporated RHC 1771.
  • the novel OSPF sub-TLV may be con- figured to store BGP information that is traditionally stored in one or more BGP attributes.
  • teachings of this invention can be implemented as software, including a computer-readable medium having program instructions stored thereon, hardware, firmware, electromagnetic signals carrying instructions for execution by a processor, or any combination thereof. More generally, the inventive technique may be implemented in various combinations of hardware and/or software. Accordingly, this description is meant to be taken only by way of example and not to otherwise limit the scope of the invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A novel technique is provided for preventing routing loops by disseminating Border Gateway Protocol (BGP) attribute information in an Open Shortest Path First (OSPF) configured network. Specifically, a new OSPF sub-type-length-value (TLV) is introduced for transporting a conventional BGP autonomous system (AS) path attribute through the OSPF-configured network. Like the BGP AS-path attribute, the new OSPF AS-path sub-TLV is configured to store a set of AS numbers corresponding to the AS path of one or more advertised routes. Thus, when a network device receives an OSPF link-state advertisement (LSA) containing the novel AS-path sub-TLV, the network device determines whether it resides in an autonomous system whose AS number is stored in the sub-TLV. If so, the network device does not install the LSA's advertised routes in its link-state database since the routes, if installed, could result in routing loops.

Description

TECHNIQUE FOR PREVENTING ROUTING LOOPS BY
DISSEMINATING BGP ATTRIBUTE INFORMATION IN AN
OSPF-CONFIGURED NETWORK
FIELD OF THE INVENTION This invention relates generally to preventing routing loops in a computer network, and, more specifically, to a novel technique for transporting Border Gateway Protocol (BGP) attribute information in an Open Shortest Path First (OSPF) configured network so as to prevent routing loops.
BACKGROUND OF THE INVENTION A computer network is a geographically distributed collection of interconnected subnetworks, such as local area networks (LAN), that transport data between network nodes. As used herein, a network node is any device adapted to send and/or receive data in the computer network. Thus, in the context of this disclosure, the terms "node" and "device" may be used interchangeably. The network topology is defined by an ar- rangement of network nodes that communicate with one another, typically through one or more intermediate network nodes, such as routers and switches. In addition to intra- network communications between network nodes located in the same network, data also may be exchanged between nodes located in different networks. To that end, an "edge device" located at the logical outer-bound of a first computer network may be adapted to send and receive data with an edge device situated in a neighboring (i.e., adjacent) network. Inter-network and intra-network communications are typically effected by exchanging discrete packets of data according to predefined protocols. In this context, a protocol consists of a set of rules defining how network nodes interact with each other. Each data packet typically comprises "payload" data prepended ("encapsulated") by at least one network header formatted in accordance with a network communication protocol. The network headers include information that enables network nodes to efficiently route the packet through the computer network. Often, a packet's net- work headers include a data-link (layer 2) header, an internetwork (layer 3) header and a transport (layer 4) header as defined by the Transmission Control Protocol/ Internet Protocol (TCP/EP) Reference Model. The TCP/IP Reference Model is generally described in more detail in Section 1.4.2 of the reference book entitled Computer Net- s works, Fourth Edition, by Andrew Tanenbaum, published 2003, which is hereby incorporated by reference as though fully set forth herein.
A data packet may originate at a source node and subsequently "hop" from node to node along a logical data path until it reaches its destination. The network addresses defining the logical data path of a data flow are most often stored as Internet Protocol o (IP) addresses in the packet's internetwork header. IP addresses are typically formatted in accordance with the IP Version 4 (IPv4) protocol, in which network nodes are addressed using 32 bit (four byte) values. Although IPv4 is prevalent in most networks today, IP Version 6 (IPv6) has been introduced to increase the length of an IP address to 128 bits (16 bytes), thereby increasing the number of available IP addresses. Typi- 5 cally, a network or subnetwork is allocated a predetermined set of IP addresses which may be assigned to network nodes situated within that network or subnetwork. Here, a subnetwork is a subset of a larger computer network, and thus network nodes in the subnetwork may be configured to communicate with nodes located in other subnetworks. o A subnet mask may be used to select a set of contiguous high-order bits from IP addresses within a subnetwork's allotted address space. A subnet mask length indicates the number of contiguous high-order bits selected by the subnet mask, and a subnet mask length of N bits is hereinafter represented as /N. The subnet mask length for a given subnetwork is typically selected based on the number of bits required to distinctly 5 address nodes in that subnetwork. As used herein, an "address prefix" is defined as the result of applying a subnet mask to a network address, such as an IP address. An address prefix therefore specifies a range of network addresses in a subnetwork, and in IPv4 a /32 address prefix corresponds to a particular network address. A "route" is defined herein as an address prefix and its associated path attributes. The path attributes o generally include any information that characterizes the address prefix, and may in- elude various protocol-specific attributes, such as conventional Border Gateway Protocol attributes.
Interior Gateway Protocols (IGP-)
A computer network may contain smaller groups of one or more subnetworks which may be managed as separate autonomous systems. As used herein, an autonomous system (AS) is broadly construed as a collection of interconnected network nodes under a common administration. Often, the AS is managed by a single administrative entity, such as a company, an academic institution or a branch of government. For instance, the AS may operate as an enterprise network, a service provider or any other type of network or subnetwork. Each AS is typically assigned a unique identifier, such as a unique AS number, that identifies the AS among a plurality of ASes in a computer network.
An AS may contain one or more edge devices (or "autonomous system border routers" (ASBR)), having peer connections to other edge devices located in adjacent networks or subnetworks. Thus, packets enter or exit the AS through an appropriate ASBR. The AS may be logically partitioned into a plurality of different "routing areas." Each routing area includes a designated set of network nodes that are configured to share routing and topology information. As such, the network nodes in a routing area share a consistent "view" of the network topology. Since consistent sets of intra- area, inter-area and inter-AS routing information are usually distributed among network nodes in an AS, the nodes can calculate consistent sets of "best paths" through the AS, e.g., using conventional shortest path first (SPF) calculations or other routing computations. A calculated best path corresponds to a preferred data path for transporting data between a pair of source and destination nodes. The best path may be an intra-area, inter-area or inter-AS data path, depending on the locations of the source and destination nodes.
Area border devices, such as area border routers (ABR), are located at the logical border of two or more routing areas. Accordingly, each ABR device participates in multiple routing areas and typically maintains a separate set of routing and topology information for each adjacent routing area in which it participates. Each network node in a routing area typically maintains its own link-state database (LSDB). The LSDB is configured to store topology information advertised with the node's routing area. Because an ABR (by definition) participates in multiple routing areas, each ABR therefore maintains a separate LSDB for each of its routing areas.
Network nodes located in the same routing area generally exchange routing in- 5 formation and network-topology information using an "interior gateway" routing protocol (IGP), such as a link-state protocol. An example of a conventional link-state protocol is the Open Shortest Path First (OSPF) protocol, which is described in more detail in Request for Comments (RFC) 2328, entitled OSPF Version 2, dated April 1998, which is publicly available through the Internet Engineering Task Force (IETF) and is o hereby incorporated by reference in its entirety.
OSPF employs conventional link-state advertisements (LSA) for exchanging routing and topology information between a set of interconnected intermediate network nodes, i.e., routers and switches. In fact, different types of LSAs maybe used to com- rnunicate the routing and topology information. For example, the OSPF version 2 s specification (RFC 2328) defines the following types of LSAs: Router, Network, Summary and AS-External LSAs. Router and Network LSAs are used to propagate link information within a routing area. Specifically, Router LSAs advertise router- interface links (i.e., links connected to routers) and their associated cost values, whereas Network LSAs advertise network-interface links (i.e., links connected to subnetworks) o and their associated cost values within the routing area.
Summary and AS-External LSAs are used to disseminate routing information between routing areas. The Summary LSA is typically generated by an ABR and is used to advertise intra- AS ("internal") routes between routing areas. First, the ABR receives various LSAs that are advertised in a first routing area. The ABR "summa- 5 rizes" the advertised routes by aggregating routes where possible. Next, the ABR . stores the summarized routes in a Summary LSA, which it then advertises in a second routing area. In this way, nodes in the second area are made aware of routes in the first routing area that can be reached through the ABR. An AS-Extemal LSA stores a list of reachable inter-AS ("external") routes, i.e., located outside of the AS. The AS-External o LSA is typically generated by an ASBR and is propagated throughout the AS to iden- tify which external routes can be reached through the advertising ASBR. Unlike Summary LSAs, routes stored in an AS-External LSA are generally not aggregated.
Opaque LSAs provide an extensible LSA format for use with the OSPF protocol and are generally described in more detail in the IETF publication RFC 2370, entitled The OSPF Opaque LSA Option, published July 1998, by R. Coltun, which publication is hereby incorporated by reference as though fully set forth herein. As described in RFC 2370, opaque LSAs may be advertised ("flooded") between network nodes (link- scope), within a routing area (area-scope) or throughout an AS (AS-scope). While the conventional Router, Network, Summary and AS-External LSAs are constrained by their respective formats set forth in the OSPF protocol specification (RFC 2328), opaque LSAs are generally more flexible in what information they can transport. For instance, an opaque LSA may be configured to store one or more type-length-value (TLV) tuples containing selected OSPF attributes associated with routes advertised in the opaque LSA. The Internet Draft publication <draft-mirtorabi-ospf-tag-01.txt>, entitled Extensions to OSPFv2 for Advertising Optional Route/Link Attributes, published August 2005 by S. Mirtorabi et al., which publication is publicly available through the IETF and is hereby incorporated by reference in its entirety, describes an OSPF Router Attributes (RA) Opaque LSA that maybe used to transport at least one Inter- Area/External Route Attribute TLV (RA-TLV). The RA-TLV may contain one or more route attributes that are encoded as sub-TLVs within the RA-TLV. Currently, the RA-TLV is only used to transport sub-TLVs containing OSPF tags, extended tags and multi-topology identifiers associated with OSPF routes advertised in the RA-Opaque LSA. PE-CE Network Topology
A virtual private network (VPN) is a collection of network nodes that establish private communications over a shared backbone network. Previously, VPNs were implemented by embedding private leased lines in the shared network. The leased lines (i.e., communication links) were reserved only for network traffic among those network nodes participating in the VPN. Today, the above-described VPN implementation has been mostly replaced by private "virtual circuits" deployed in public networks. Spe- cifically, each virtual circuit defines a logical end-to-end data path between a pair of network nodes participating in the VPN.
Network nodes belonging to the same VPN may be situated in different subnetworks, or "customer sites." Each customer site may participate in one or more different VPNs, although most often each customer site is associated with a single VPN, and hereinafter the illustrative embodiments will assume a one-to-one correspondence between customer sites and VPNs. For example, customer sites owned or managed by a common administrative entity, such as a corporate enterprise, may be statically assigned to the enterprise's VPN. As such, network nodes situated in the enterprise's various customer sites participate in the same VPN and are therefore permitted to securely communicate with one another.
The customer sites typically communicate with one another through a service provider network ("provider network"). The provider network is an AS that functions as a backbone network through which VPN information may be exchanged between customer sites. The provider network may include both provider edge (PE) devices which function as ASBRs at the logical outer edge of the provider network, as well as provider (P) devices situated within the interior ("core") of the provider network. Accordingly, each customer site contains at least one customer edge (CE) device coupled to a PE device in the provider network. The customer site may be multi-homed to the provider network, i.e., wherein one or more of the customer's CE devices is coupled to a plurality of PE devices. The PE-CE data links may be established over various physical mediums, such as conventional wire links, optical links, wireless links, etc., and may communicate data formatted using various network communication protocols including ATM, Frame Relay, Ethernet, Fibre Distributed Data Interface (FDDI), etc. In a popular VPN deployment, provider networks often provide the customer sites with layer-3 network-based VPN services that utilize IP and/or Multi-Protocol Label Switching (MPLS) technologies. These networks are typically said to provide "MPLS/VPN" services. This widely-deployed MPLS/VPN architecture is generally described in more detail in the IETF publication RFC 2547, entitled BGP/MPLS VPNs, by E. Rosen et al., published March 1999, which is hereby incorporated by reference as though fully set forth herein. Most typically, PE and CE devices are configured to exchange routing information over their respective PE-CE data links in accordance with the Border Gateway Protocol (BGP). The BGP protocol is well known and described in detail in RFC 1771 by Y. Rekhter and T. Li, entitled .4 Border Gateway Protocol 4 βGP-4), dated March 1995, which publication is hereby incorporated by reference as though fully set forth herein. A variation of the BGP protocol, known as internal BGP (iBGP), is often used to distribute routing and reachability information between PE devices in the provider network. To implement iBGP, the PE devices must be "fully meshed," such that each PE device is coupled to every other PE device, e.g., by way of a Transmission Control Protocol (TCP) connection. Those skilled in the art will understand that the folly- meshed PE devices may be directly connected or may be otherwise coupled, e.g., by one or more conventional BGP route reflectors.
BGP-enabled PE and CE devices perform various routing functions, including transmitting and receiving BGP messages and rendering routing decisions based on BGP routing policies. Each BGP-enabled device maintains a local BGP routing table that lists feasible routes to reachable (i.e., accessible) network nodes and subnetworks. The BGP table also may associate one or more BGP attributes with each route that it stores. For example, a conventional BGP AS-path attribute may be associated with a BGP route so as to identify a particular AS path that may be used for reaching that route. Typically, the AS path is represented as an ordered sequence of AS numbers corresponding to which ASes must be traversed in order to reach the route's associated node or subnetwork.
Although BGP is most often executed over PE-CE data links, other protocols also may be used to exchange routing and topology information between a customer- site CE device and a provider-network PE device. For instance, the Internet Draft publication <draft-ietf-13vpn-ospf-2547-05.txt>, entitled OSPF as the Provider/Customer Edge Protocol for BGP/MPLSIP VPNs, published November 2005 by Rosen et al., which publication is publicly available through the IETF and is hereby incorporated by reference in its entirety, describes an implementation in which OSPF is executed over a PE-CE link. In this case, the PE device functions as an ABR for the customer site containing the CE device, and thus the PE device maintains both an OSPF LSDB contain- ing the customer site's IGP topology information as well as a BGP table containing BGP routes that have been distributed, e.g., via iBGP, within the provider network.
Routing Loops
Routing protocols, such as OSPF and BGP, typically perform "best path" com- putations for selecting a preferred data path for transporting data to a destination node or subnetwork. Therefore, it is possible that two or more networks or subnetworks may select each other as the best path to reach a certain destination. In such a scenario, a "routing loop" can develop where data addressed to that destination is circulated among the two or more networks or subnetworks and may never actually reach its intended recipient. An example of a conventional routing loop is illustrated in Fig. 1.
Fig. 1 illustrates an exemplary network 100 including a provider network ASl 110 coupled to two customer sites 120 and 130 (labeled "A" and "B," respectively). Here, the customer sites A and B participate in the same VPN, e.g., VPNl, and therefore communicate with one another through the provider network 110. As shown, the customer site 120 includes CE devices 125a and 125b (CEl and CE2) which are coupled to respective PE devices 115a and 115b (PEl and PE2) in the provider network. In addition, the customer site 130 includes a CE device 135c (CE3) which is coupled to a PE device 115c (PE3) in the provider network.
Suppose that CE3 advertises a message over the PE3-CE3 data link indicating that CE3 can reach the destination prefix "X." The advertised prefix is received by
PE3, which in turn distributes the advertised prefix, e.g., in an iBGP update message, to the devices PEl and PE2 in the provider network. After PEl receives the iBGP advertisement, PEl advertises the prefix X over the PEl-CEl data link, thereby signaling to nodes in the customer site 120 that the prefix X can be reached via PEl . The prefix X is then distributed within the customer site 120 using an appropriate IGP protocol. CE2 may advertise over the PE2-CE2 data link that it can reach the prefix X. In response to receiving CE2's advertisement, PE2 may distribute this reachability information to the provider-edge devices PEl and PE3. Although Fig. 1 illustrates the prefix X being advertised along the sequential data flow CE3-PE3-PE1-CE1-CE2-PE2-PE1, the prefix also may be advertised along a similar loop (not shown) CE3-PE3-PE2-CE2-CE1-PE1- PE2. As a result of the above-noted advertisements, network nodes in the customer site 120 become aware that the prefix X is reachable through PEl, and PEl becomes aware that the prefix X can be reached via PE2 or PE3. In this case, a routing loop may develop if the best-path calculations performed at PEl determine that data addressed to the destination prefix X should be routed to the customer site 120 via PE2, instead of correctly routing the data through PE3 to the customer site 130. Thus, the data addressed to the prefix X may be passed back and forth between ASl and the customer site 120, e.g., around the routing loop CE1-PE1-PE2-CE2-CE1.
One solution for preventing routing loops where OSPF is executed over the PE- CE data links is described in the above-incorporated Internet Draft publication <draft- ietf-13vpn-ospf-2547-05.txt>, entitled OSPF as the Provider/Customer Edge Protocol or BGP/MPLSIP VPNs. This proposed solution relies on an OSPF route tag for identifying when one or more advertised routes have already been advertised from a PE device to a CE device. Accordingly, when an LSA containing an advertised route and a corresponding OSPF route tag is received at a PE device, that PE device can identify the route tag and determine that the received route was previously advertised by a PE device in the provider network. Based on this determination, the PE device can conclude that the received route should not be propagated again through the provider network. This known OSPF route-tag solution suffers the disadvantage that it is not applicable when Summary LSAs are exchanged over PE-CE data links. More specifically, Summary LSAs are not formatted in a manner that enables them to transport the OSPF route tags. Instead, .the route tags are typically transported in AS-External LSAs which carry external routing information. Thus, this solution is generally undesirable since it precludes the use of Summary LSAs for advertising internal routes over PE-CE links and therefore does not permit conventional route aggregation techniques that are traditionally employed for reducing the number of routes processed in an OSPF routing area. Also, as will be understood by those skilled in the art, the OSPF external route tag solution does not apply to multi-homed networks. Yet another solution for preventing routing loops where OSPF is executed over the PE-CE data links is described in the Internet Draft publication <draft-ietf-ospf- 2547-dribit-04.txt>, entitled Using an LSA Options Bit to Prevent Looping in BGP/MPLS IP VPNs, published March 2004 by Rosen et al., which publication is publicly available through the IETF and is hereby incorporated by reference as though fully set forth herein. This solution proposes using the most-significant bit, i.e., the "DN" bit, in the conventional LSA-options field to indicate when an OSPF LSA has been advertised from a PE device to a CE device. Because every LSA transports the LSA- options field, this DN-bit solution is not limited to only AS-External LSAs. When a PE device receives an LSA whose DN bit is "set," the routing information transported in the received LSA is excluded from the PE device's SPF calculation (e.g., the LSAs are not stored in the OSPF LSDB). As such, the LSA' s advertised routes are not installed in the PE device's routing table. In this way, the uninstalled routes are not redistributed into the provider network's BGP tables, thereby ensuring that routing loops cannot develop between the provider network and the customer site containing the CE device.
Fig. 2 illustrates the exemplary network 100 in which the DN-bit solution is de- ployed for preventing routing loops. First, CE3 advertises the prefix X over the PE3- CE3 data link. The advertised prefix X is received by PE3, which in turn advertises the prefix, e.g., in an iBGP update message, to the devices PEl and PE2. After PEl receives the iBGP advertisement, PEl advertises a conventional OSPF LSA containing the prefix X over the PEl-CEl data link. However, according to this DN-bit solution, PEl sets the DN-bit in the advertised LSA to indicate that the prefix X is reachable through the provider network. The LSA, with its DN bit set, is distributed throughout the customer site 120. CE2 may forward the LSA back to the provider network 110 over the PE2-CE2 link. However, because the DN-bit is set in the LSA, PE2 can determine that the LSA was generated by another PE device (PEl) in the provider net- work. Upon making this determination, PE2 does not install the prefix X in its routing table, thereby preventing any potential routing loops from developing between the customer site 120 and the provider network 110. That is, network nodes in customer site 120 are aware that prefix X can be reached via PEl, and PEl is only aware that prefix X can be reached via PE3. Although this conventional DN-bit solution for preventing routing loops works well in many network topologies, it may suffer various problems in topologies having multiple provider networks (ASes) that are not configured to directly communicate with one another, e.g., because of contractual terms or lack of network connectivity. For instance, consider the exemplary network 300 shown in Fig. 3. Here, the provider network ASl 310 is coupled to the customer sites 330, 340 and 350 (labeled "A," "B" and "C" respectively) which participate in the same VPN, e.g., VPNl . In addition, the customer sites 340 and 350 are also coupled to a second provider network AS2 320. In this case, the provider network ASl may function as a primary Internet service provider (ISP), whereas the provider network AS2 functions as a backup ISP through which the customer sites 330-350 may communicate in the event that a PE-CE link to ASl fails. Notably, ASl and AS2 are not configured to communicate directly with one another.
As shown, the customer site 330 includes a CE device 335a (CEl) which is coupled to a PE device 315a (PEl) located in ASl. In addition, ASl also includes a PE device 315b (PE2) coupled to a CE device 345b (CE2) situated in the customer site 340, as well as to a PE device 315c (PE3) coupled to a CE device 355c (CE3) located in the customer site 350. Also, a CE device 345d (CE4) in the customer site 340 is coupled to a PE device 325d (PE4) in AS2, and a CE device 355e (CE5) in the customer site 350 is coupled to a PE device 325e (PE5) in AS2. Further assume that each of the PE-CE data links' is configured to execute OSPF.
In this illustrative topology, CEl may advertise to PEl that the prefix X can be reached via CEl. hi response, PEl propagates the prefix X, e.g., in iBGP update messages, to the devices PE2 and PE3. Next, PE2 and PE3 each may advertise an LSA containing the prefix X to the customer-edge devices CE2 and CE3. hi accordance with the conventional DN-bit technique, the LSAs advertised over the PE2-CE2 and PE3-CE3 data links have their DN bits set to a predetermined value so as to indicate that the prefix X is reachable through a PE device. When the LSAs are forwarded over the PE4-CE4 and PE5-CE5 data links, the provider-edge devices PE4 and PE5 notice that the DN bits are set in the received LSAs and, consequently, exclude the prefix X from their OSPF and BGP routing tables. As a result, the customer sites 340 and 350 do not learn that the prefix X can be reached via the ISP AS2. In other words, the backup connectivity of AS2 is "broken" for the backup ISP AS2, since the customer sites 340 and 350 are only made aware that the prefix X can be reached through the primary ISP ASl.
For example, in the event that the PE2-CE2 link fails, the customer site 340 is not aware that the prefix X can alternatively be reached through AS2, e.g., via the backup data path CE4-PE4-PE5-CE5-CE3-PE3-PE1-CE1. Similarly, if the PE3-CE3 data link fails, the customer site 350 is not aware that the prefix X can be reached through AS2, e.g., via the backup data path CE5-PE5-PE4-CE4-CE2-PE2-PE1-CE1.
In networks having multiple, provider networks that are not configured to communicate with one another, as shown in Fig. 3, it is generally desirable to implement a routing-loop prevention technique that does not break the backup connectivity of the topology. The technique should not be limited to AS-External LSAs sent over PE-CE links and instead should be operable with any type of OSPF LSA sent over a PE-CE data link.
SUMMARY OF THE INVENTION The present invention overcomes the disadvantages of the prior art by providing a novel technique for preventing routing loops by disseminating BGP attribute information in an OSPF-configured network. Specifically, a new OSPF sub-TLV is introduced for transporting a conventional BGP AS-path attribute through the OSPF-configured network. Like the BGP AS-path attribute, an OSPF AS-path sub-TLV is configured to store a set of AS numbers corresponding to the AS path of one or more advertised routes. When a network device receives an OSPF LSA containing the novel AS-path sub-TLV, the network device determines whether it resides in an autonomous system whose AS number is stored in the received sub-TLV. If so, the network device determines that the LSA' s advertised routes have been previously advertised to the autono- mous system, and thus the network device does not install the routes in its routing table since the routes, if installed, could create routing loops between autonomous systems. However, if the network device determines that the AS number of its autonomous system is not stored in the received AS-path sub-TLV, the network device may install the LSA's advertised routes in its routing table and then propagate the routes to other autonomous systems. In this case, the routes may be propagated along with an updated AS-path sub-TLV that stores an AS path including the AS number of the network device's autonomous system. In this manner, the LSA's advertised routes can be propagated across multiple autonomous systems without creating routing loops as a result of their propagation. Advantageously, the novel AS-path sub-TLV may be used to prevent routing loops without breaking backup connectivity in networks having multiple autonomous systems that are not configured to communicate with one another. For instance, unlike prior implementations, the inventive technique can prevent routing loops from developing when a route is advertised from a first customer site to a primary AS to a second customer site and then to a secondary ("backup") AS which is not in communication with the primary AS. More generally, the technique may be deployed to prevent routing loops in single-AS as well as multi-AS environments. Further, the inventive technique may be used to prevent routing loops for both internal and external routes advertised in an OSPF routing area.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and further advantages of the invention may be better understood by referring to the following description in conjunction with the accompanying drawings in which like reference numerals indicate identically or functionally similar elements, of which: Fig. 1, previously described, is an exemplary computer network in which routing loops may develop;
Fig. 2, previously described, is an exemplary computer network configured to execute the OSPF protocol over PE-CE data links, wherein a DN-bit solution is deployed over the PE-CE data links for preventing routing loops; Fig. 3, previously described, is an exemplary network topology in which the conventional DN-bit solution does not effectively prevent routing loops, the topology including multiple provider networks that are not configured to directly communicate with one another; Fig. 4 is an exemplary computer network in which an illustrative embodiment of the present invention may be advantageously deployed for preventing routing loops;
Fig. 5 is an exemplary OSPF LSA that may be used to transport, among other things, a novel AS-path sub-TLV in accordance with the illustrative embodiment; Fig. 6 is an exemplary BGP update message that may be used to transport, among other things, a BGP AS-path attribute in accordance with the illustrative embodiment;
Fig. 7 is a schematic block diagram of an exemplary PE device that maybe advantageously employed in the illustrative embodiment of the invention; Fig. 8 is a schematic block diagram illustrating an exemplary software process arrangement that the exemplary PE device may use to redistribute routes and AS-path information between the OSPF and BGP protocols in accordance with the illustrative embodiment;
Fig. 9 is a flowchart illustrating a sequence of steps that may be performed by a network device that is configured to advertise an OSPF route and its associated AS- path sub-TLV in accordance with the illustrative embodiment; and
Fig. 10 is a flowchart illustrating a sequence of steps that a network device may perform for preventing routing loops in accordance with the illustrative embodiment.
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS Fig. 4 illustrates an exemplary computer network 400 in which an illustrative embodiment of the present invention may be deployed. The network 400 includes a first provider network ASl 410 and a second provider network AS2 420. The provider networks ASl and AS2 are not configured to directly communicate with one another, e.g., due to contractual agreement or lack of connectivity. The exemplary network 400 also includes a set of customer sites 430, 440 and 450 (labeled "A," "B" and "C" respectively) which participate in the same VPN, e.g., VPNl. Each of the customer sites 430-450 is coupled to ASl, which functions as a "primary" ISP for exchanging data among the VPNl customer sites. In addition, the customer sites 440 and 450 are also coupled to AS2, which functions as a "backup" ISP in the event that a PE-CE link to ASl fails.
As shown, the customer site 430 includes a CE device 470a (CEl) which is coupled to a PE device 700a (PEl) located in ASl. In addition, ASl also includes a PE device 700b (PE2) coupled to a CE device 470b (CE2) situated in the customer site 440, as well as to a PE device 700c (PE3) coupled to a CE device 470c (CE3) located in the customer site 450. Also, a CE device 47Od (CE4) in the customer site 440 is coupled to a PE device 70Od (PE4) in AS2, and a CE device 47Oe (CE5) in the customer site 350 is coupled to a PE device 70Oe (PE5) in AS2. Each of the data links PEl-CEl 460a, PE2-CE2 460b, PE3-CE3 460c, PE4-CE446Od and PE5-CE5 46Oe is preferably configured to accommodate execution of the OSPF protocol, and each of the devices PE1-PE5 functions as an ABR device for its respective neighboring OSPF- configured customer site 430-450.
In this illustrative topology, CEl may advertise an OSPF LSA 500a to PEl indicating that the prefix X can be reached via CEl. In response, PEl propagates the pre- fix X5 e.g., in iBGP update messages (hereinafter "BGP update message"), to the other fully-meshed devices PE2 and PE3. The BGP update messages may be sent directly to PE2 and PE3, or may be forwarded using a conventional route reflector, as is known in the art. For simplicity of illustration and explanation, only the BGP update message 600a is shown forwarded to PE2. After receiving the message 600a, PE2 may notify CE2 that the prefix X can be reached through PE2. To that end, PE2 may forward the prefix X in an OSPF LSA 500b to CE2.
Unlike prior implementations, PE2 may be configured to store BGP path- attribute information, such as AS-path information, in the LSA 500b. The AS-path information may be used to prevent routing loops in accordance with the present inven- tion. More particularly, the LSA 500b includes a novel OSPF sub-TLV 550b that is configured to store a conventional BGP AS-path attribute over the OSPF-configured PE2-CE2 data link 460b. Like a conventional BGP AS-path attribute, the OSPF AS- path sub-TLV is configured to store a set of AS numbers corresponding to the AS path of one or more advertised routes. Accordingly, in this case, the sub-TLV 550b stores the AS number of provider network ASl, since the LSA 500b is being advertised by PE2, which is resident in ASl. CE2 receives the LSA 500b from PE2 and disseminates the LSA throughout the OSPF-configured customer site 440. Notably, the customer site 440 may contain one or more routing areas through which the LSA 500b may be propagated. When CE4 receives the LSA 500b, it forwards the LSA over the PE4-CE4 data link 46Od to PE4 situated in AS2. In accordance with the illustrative embodiment, PE4 is configured, to advertise the prefix X and its associated AS-path information to other PE devices in AS2, as long as the AS number of AS2 is not included in the prefix's AS path. In this case, the AS-path sub-TLV 550b indicates that the AS path for the prefix X includes only ASl, and therefore the sub-TLV does not store the AS number of the provider network AS2 in which PE4 is located. Since the AS number of AS2 is not stored in the received AS-path sub-TLV 550b, PE4 advertises the prefix X in a BGP update message 600b, along with a conventional BGP AS-path attribute 650b, to the other fully-meshed PE devices in the provider network AS2. The BGP attribute 650b stores the same list of AS numbers received in the AS-path sub-TLV 550b, and thus stores only the AS number of ASl. hi response to receiving the BGP update message 600b, PE5 may store the prefix X and its AS-path information in an OSPF LSA 500c and send the LSA 500c to the customer-edge device CE5, thereby signaling to CE5 that the prefix X is reachable through PE5. Accordingly, PE5 includes a novel AS-path sub-TLV 550c in the LSA 500c, the AS-path sub-TLV 550c storing the AS path associated with the advertised prefix X. Preferably, PE5 generates the AS-path sub-TLV 550c by prepending the AS number of provider network AS2 to the list of AS numbers already stored in the received BGP AS-path attribute 650b. Thus, in this example, the sub-TLV 550c transports the ordered sequence of AS numbers {AS2, ASl). Of course, those skilled in the art will understand that the AS numbers need not be sequentially prepended as illustratively described herein, and more generally the set of AS numbers may be listed in the AS-path sub-TLV in various sequential or non-sequential manners.
After receiving the OSPF LSA 500c, CE5 disseminates the LSA 500c throughout the customer site 450. CE3 receives the LSA 500c and forwards it over the PE3- CE3 data link 460c to PE3. In accordance with the illustrative embodiment, PE3 determines whether the received AS-path sub-TLV 550c includes the AS number corre- sponding to ASl, i.e., the provider network in which PE3 is located. In this case, because the AS-path sub-TLV 550c contains the AS number of ASl, PE3 determines that the prefix X (transported by the LSA 500c) was previously advertised throughout the provider network ASl . Consequently, PE3 does not install the prefix X in its routing table so as to prevent potential routing loops from developing in the network 400. Although the above-described data flow is described in terms of CE1-PE1-PE2-CE2-CE4- PE4-PE5-CE5-CE3-PE3, those skilled in the art will appreciate that PE2 similarly may identify a potential routing loop in accordance with the present invention, if PE2 receives the prefix X and an AS-path sub-TLV containing the AS number of ASl, where the data flow is CEl-PEl -PE3-CE3-CE5-PE5-PE4-CE4-CE2-PE2.
Notably, the present invention may be used in conjunction with the DN bit as described above with reference to Fig. 2 and Fig. 3. In particular, the DN bit prevents routing loops from occurring by excluding from SPF calculations any advertised prefixes received with a DN bit set by an egress border router (e.g., PE device). As men- tioned above, one problem with this solution is that unnecessary exclusions may occur in various network configurations, such as, e.g., the backup service provider configuration of Fig. 3 and Fig. 4. By continuing to utilize the DN bit, the present invention "improves" the DN bit behavior by allowing the PE devices receiving DN bit LSAs prior to the AS-path sub-TLV 550 LSAs 500 to exclude (perhaps unnecessarily) one or more reachable address prefixes (e.g., prefix X). Once an AS-path sub-TLV 550 LSA 500 is received, however, the decision to exclude/include the prefix (X) in its routing table based on the AS-path sub-TLV overrides any decisions based on the DN bit. In other words, if the DN bit exclusion is proper, no changes are made, but if it is improper, the prefix may be added accordingly. Fig. 5 illustrates an exemplary OSPF LSA 500 that may be used to transport the novel AS-path sub-TLV 550 in accordance with the illustrative embodiment. The LSA 500 may be formatted as a type- 10 opaque LSA, which is defined in the above- incorporated RFC 2370, entitled The OSPF Opaque LSA Option. The opaque LSA 500 includes, among other things, an LSA header 510 and one or more TLVs, such as a RA-TLV 530 described in more detail in the above-incorporated IETF Internet Draft publication <draft-mirtorabi-ospf-tag-01.txt>, entitled Extensions to OSPFv2 for Adver- tising Optional Route/Link Attributes. The LSA 500 also may store link-state information and other TLVs which are not explicitly shown in Fig. 5. Those skilled in the art will understand that while a type- 10 opaque LSA is described herein, other types may be used in accordance with the present invention. s The LSA header 510 includes a link-state (LS) age field 512, an LSA options field 514, an LS type field 516, an opaque-type field 518, an instance field 520, an advertising-router field 522, a LS sequence number field 524, a LS checksum field 526 and a length field 528. The LS age field 512 stores an age value, e.g., usually in seconds, that may be used to determine whether the LSA 500 is valid. The age value is o typically initialized to zero and incremented, e.g., by one every second, until it reaches a predetermined maximum value, thereby indicating that the LSA has become invalid. The options field 514 stores a plurality of flag values that maybe used to signal whether certain capabilities are supported by the LSA' s advertising router. For instance, one flag may indicate whether the advertising router is configured to receive s and forward opaque LSAs.
The type field 516 equals 10 to indicate that the LSA 500 has area-wide scope, and therefore cannot be flooded beyond the routing area into which it is initially flooded. The opaque-type field 518 stores a value that identifies the LSA 500 as a label-mapping LSA. If multiple instances of OSPF are executing over the same data link 0 460, the instance field 520 stores a value that identifies the particular OSPF instance for which the LSA 500 transports link-state information. The advertising-router field 522 stores a value, such as a loopback IP address, that identifies the router that generated and originally broadcast the LSA 500. The LS sequence number field 524 stores a sequence number indicating the relative version of the LSA. Typically, the sequence s number is incremented, e.g., by one, for every new version of the LSA. The LS checksum field 526 stores a checksum (or other data integrity check) that may be used to validate the contents of the LSA. The length field 528 stores the length, e.g., in bytes, ofthe LSA 500.
The RA-TLV 530 includes, among other things, a TLV-type field 532, TLV- 0 length field 534, link-state identification (ID) field 536, reserved bits 538, prefix-length field 540, reserved field 542 and the AS-path sub-TLV 550. The TLV-type field 532 stores a value indicating the type of route-attribute information (e.g., inter-area or external route attributes) that is stored in the RA-TLV 530. The TLV-length field 534 stores the length (e.g., in bytes) of the RA-TLV. The link-state ID field 536 stores the address prefix of a data link associated with the route attributes transported in the RA- TLV. The prefix-length field 540 stores the length of the prefix stored in the link-state ID field 536. The reserved bits 538 and reserved field 542 are presently unused.
The RA-TLV 530 maybe configured to store one or more sub-TLVs, such as the novel AS-path sub-TLV 550. Although the AS-path sub-TLV 550 is preferably formatted as a sub-TLV within the RA-TLV 530, it is also expressly contemplated that the AS-path sub-TLV alternatively may be formatted as a sub-TLV in other types of OSPF TLVs. Further, in some embodiments, the AS-path sub-TLV may be formatted as an actual TLV rather than a sub-TLV. The AS-path sub-TLV 550 is configured to store, inter alia, a sub-TLV type field 552, sub-TLV length field 554 and a list of one or more AS numbers 556. The sub-TLV type field 552 stores a value that identifies the AS-path sub-TLV as containing AS-path information. The sub-TLV length field 554 stores the length (e.g., in bytes) of the AS-path sub-TLV 550. The list of AS numbers 556 indicates an AS path associated with the address prefix stored in the link-state ID field 536. Notably, the list is preferably an ordered sequence of AS numbers 556, although the list alternatively may be configured to store an unordered list, depending on the particular implementation.
Fig. 6 illustrates an exemplary BGP update message 600 that may be used in accordance with the illustrative embodiment. The update message 600 includes a BGP header 610, a set of withdrawn routes 620, a set of path attributes 630 and a set of network layer reachability information (NLRI) 640. The BGP header 610 may be config- ured to store, among other things, the length (in bytes) of the message 600, a type value (e.g., equal to 2) identifying the message as a BGP update message and a conventional 16-byte BGP marker, as known in the art. The set of withdrawn routes 620 is configured to store zero or more address prefixes that are no longer reachable through a sending PE device. For instance, a PE device may withdraw a set of routes in response to a topology change, such as a failed data link or network node, that results in network traffic becoming inaccessible over the withdrawn routes. In contrast, the NLRI 640 speci- fies zero or more address prefixes that are reachable (i.e., accessible) to the sending PE device. For instance, in the exemplary update message 600, the NLRI stores the prefix X 645.
The set of path attributes 630 is configured to store zero or more BGP attributes 5 that characterize the prefixes stored in the NLRI 640. In this context, a path attribute is generally any property or characteristic that may be associated with the NLRI prefixes). For example, the set of path attributes may include an AS-path attribute 650 that carries AS-path information associated with the prefix(es) stored in the NLRI. The AS-path attribute 650 includes a set of attribute flags 652, a code field 654, length field o 656 and a list of one or more AS numbers 658. The set of attribute flags 652 are well known and are described in more detail in the above-incorporated RFC 1771. The code field 654 stores a value that identifies the BGP attribute as containing AS-path information. The length field 656 stores the length (e.g., in bytes) of the attribute 650. The list of AS numbers 658 may contain an ordered or unordered set of AS numbers describing s the AS path of the prefixes stored in the NLRI 640. Notably, other BGP path attributes and their formats are also generally well known and are further described in more detail in the above-incorporated RFC 1771.
Fig. 7 is a schematic block diagram of an exemplary PE device 700 that may be advantageously used in the illustrative embodiment. For ease of illustration and de- 0 scription, the PE device 700 is illustrated on a generic hardware platform. However, in alternative embodiments, the PE device may contain a plurality of line cards which are interconnected with a route processing engine through a switching fabric (i.e., backplane logic and circuitry). Accordingly, those skilled in the art will appreciate that the depicted PE device is merely exemplary and that the advantages of the present inven- s tion may be realized on a variety of different hardware platforms having various software capabilities.
The PE device 700 comprises a plurality of network interfaces 710, a processor 720, and a memory 740 interconnected by a system bus 790. The network interfaces 710 contain the mechanical, electrical and signaling logic and circuitry for communi- 0 eating data over physical links coupled to other network nodes in the computer network 400. The network interfaces may be configured to transmit and/or receive data using a variety of different communication protocols, including, inter alia, TCP/IP, Asynchronous Transfer Mode (ATM), User Datagram Protocol (UDP), synchronous optical networks (SONET), synchronous digital hierarchy (SDH), various wireless protocols, Frame Relay, Ethernet, Fiber Distributed Data Interface (FDDI), etc. The memory 740 comprises a plurality of storage locations, which are addressable by the processor 720 and the network interfaces 710. The memory storage locations are adapted to store program code and data structures associated with the present invention. The processor 720 comprises circuitry and logic adapted to execute the program code and manipulate the data structures. The memory 740 preferably comprises a form of random access memory
(RAM) that is generally cleared by a power cycle or other reboot operation (e.g., it is a "volatile" memory). It will be apparent to those skilled in the art that the memory 740 also may comprise other memory means, including various computer-readable media, for storing program instructions and data structures pertaining to the operation of the PE device 700. Further, those skilled in the art will appreciate that at least some portions of the memory 740 may be embodied as electromagnetic signals that are transmitted from a remote memory element to the PE device 700.
The memory 740 stores, among other things, computer-readable instructions for implementing a routing operating system 750 that functionally organizes the PE device 700 by, inter alia, invoking network operations in support of software processes and services executing in the PE device. The IO S™ operating system by Cisco Systems Incorporated is one example of such a routing operating system 750. The software processes and services supported by the routing operating system include a BGP process 760, an OSPF process 770, and an import/export process 780 (e.g., illustratively performed in conjunction with routing tables 775, as will be understood by those skilled in the art). The BGP process includes computer-executable instructions that enable the processor 720 to implement external BGP (eBGP) and internal BGP (iBGP) functionality. The BGP process 760 may be configured to manage the contents of a BGP table 765, which lists all of the feasible routes that are reachable (i.e., accessible) to the PE device 700 through neighboring customer sites. Again, a BGP "route" includes an address prefix and its associated BGP path attributes. The PE device 700 may execute a separate OSPF process 770 for each VPN to which it is attached. For simplicity, each of the illustrative customer sites 430-450 participates in the same VPN, e.g., VPNl. Accordingly, each of the illustrative PE devices 700a-e executes only a single OSPF process 770 for managing reachability information in the VPNl . The OSPF process 770 may be configured to manage an LSDB 772 which contains link-state information, e.g., for the VPNl . More specifically, the LSDB may be configured to store a set of destinations (nodes, networks or subnetworks) which are reachable in the VPN and further may be configured to store conventional OSPF cost metrics that are associated with the data links to the reachable destinations. In addition, for each reachable destination, the LSDB 772 also may be configured to store one or more associated OSPF TLVs or sub-TLVs, such as an AS-path sub-TLV 550.
Fig. 8 illustrates a schematic block diagram of the exemplary process arrangement 800 that may be used to redistribute routes between the routing table 775 and the BGP table 765. For example, when an OSPF LSA 500 is received at the PE device 700, the OSPF process 770 stores the LSA' s advertised prefix(es), e.g., prefix X, in appropriate entries in the LSDB 772. The OSPF process 770 also stores in the LSDB any OSPF cost metrics or other link-state information, such as the AS-path sub-TLV 550, received in the LSA 500. After installing the advertised OSPF routes in the LSDB 772, the OSPF process 770 may perform a shortest-path-first (SPF) computation to calculate the best paths, e.g., lowest cost paths, to reachable destinations in the VPNl, which are stored in routing table 775. In this context, each "best path" is a route that identifies a preferred data path to a reachable destination. Notably, storing prefixes and AS-path information in an LSDB and storing routes in a routing table may be used inter- changeably herein due to their interrelationship, as will be understood by those skilled in the art. In other words, by excluding an LSA from the LSDB 772 (or otherwise from route calculation), the present invention excludes storing a route based on the excluded LSA in the routing table 775.
The import/export process 780 redistributes the calculated OSPF best paths from the routing table 775 into the BGP table 765. To that end, the import/export process may convert the OSPF routes into functionally equivalent BGP routes, e.g., by add- ing appropriate route distinguisher (RD) values (as per RFC 2547). The import/export process 780 also may convert the OSPF AS-path sub-TLVs 550 of the OSPF best paths into functionally equivalent BGP AS-path attributes 650 that may be stored in the BGP table 765. When a BGP update message 600 is received at the PE device 700, the BGP process 760 stores the advertised BGP routes and their associated BGP AS-path attributes 650 in the BGP table 765. The BGP process 760 may determine a set of BGP best paths for the reachable routes stored in the BGP table. Then, the import/export process 780 may redistribute the BGP best paths and their associated BGP AS-path attributes 650 from the BGP table 765 into the routing table 775. Specifically, the import/export process 780 may redistribute the BGP best paths by converting the BGP routes and their associated BGP AS-path attributes into functionally equivalent OSPF routes and OSPF AS-path sub-TLVs that may be stored in the routing table 775. hi accordance with the illustrative embodiment, the OSPF process 770 is con- figured to prevent routing loops by selectively installing OSPF routes in the routing table 775 based on the AS-path information stored in the routes' associated AS-path sub- TLVs 550. More specifically, when a PE device 700 receives an OSPF LSA 500 containing an AS-path sub-TLV 550, the PE device's OSPF process 770 determines whether the PE device resides in an autonomous system whose AS number is stored in the received AS-path sub-TLV 550. Ifso, the OSPF process determines that the LSA's advertised OSPF routes have been previously advertised to the autonomous system, and thus the OSPF process does not install the routes in its routing table 775 since the routes, if installed, could result in routing loops. In this way, the received OSPF routes are excluded from the routing table (and SPF calculations) and cannot be redistributed into BGP for future propagation through the autonomous system. Notably, the OSPF process may also be configured to prevent temporary routing loops based on additional DN bit behavior, as described above.
On the other hand, if the OSPF process 770 determines that the AS number of the PE device's autonomous system is not stored in the received AS-path sub-TLV 550, the OSPF process may install the LSA's advertised OSPF routes in the routing table 775. In this case, the installed OSPF routes and their associated AS-path sub-TLVs may be redistributed, e.g., by the import/export process 780, into the BGP table 765. The redistributed routes may be propagated in a BGP update message 600 to other, fully-meshed PE devices 700 in the autonomous system. A PE device 700 that subsequently receives the BGP update message 600 may store the advertised BGP routes in its local BGP table, redistribute the received BGP routes into its local OSPF routing table and then advertise the redistributed routes to a neighboring OSPF-configured CE device. In such a scenario, the PE device preferably sends the CE device an LSA 500 containing an updated AS-path sub-TLV 550, the updated AS-path sub-TLV storing an AS path that includes the AS number of the PE device's autonomous system. Fig. 9 illustrates a sequence of steps that may be performed by a PE device 700
(e.g., as an egress PE device) in accordance with the illustrative embodiment. The sequence starts at step 900 and proceeds to step 910 where a BGP update message 600 containing at least one advertised BGP prefix 645 and an associated BGP AS-path attribute 650 is received at the PE device. At step 920, a BGP process 760 stores the re- ceived BGP prefix and AS-path attribute in the BGP table 765. Next, at step 930, the import/export process 780 redistributes the prefix and AS-path attribute into the OSPF routing table 775. To that end, the BGP prefix may be converted from a VPN-EP v4 BGP prefix to a conventional OSPF IPv4 prefix and the BGP AS-path attribute may be converted to a functionally equivalent OSPF AS-path sub-TLV 550. At step 940, the OSPF process 770 executing in the PE device 700 generates an LSA 500 configured to store both the redistributed OSPF prefix and its associated AS-path sub-TLV. Notably, the PE device also may update the AS-path information stored in the AS-path sub-TLV by prepending the AS number of the PE device's provider network to the list of AS numbers stored in the AS-path sub-TLV. At step 950, the OSPF process forwards the LSA 500 to a CE device 470 via an OSPF-configured PE-CE data link 460. The sequence ends at step 960.
Fig. 10 illustrates a sequence of steps that the PE device 700 (e.g., as an ingress PE device) may perform for preventing routing loops in accordance with the illustrative embodiment. The sequence starts at step 1000 and proceeds to step 1010 where the PE device receives one or more OSPF LSAs 500 containing at least one prefix and an associated AS-path sub-TLV 550 storing AS-path information for the at least one prefix. At step 1020, the OSPF process 770 executing in the PE device determines whether the received AS-ρath sub-TLV stores the AS number of the provider network containing the PE device. If so, the sequence advances to step 1030 where the OSPF process determines that the route has already been advertised throughout the provider network, and therefore the PE device does not install the route in its routing table 775; the sequence ends at step 1080.
If, on the other hand, at step 1020 the PE device 700 determines that the received AS-path sub-TLV 550 does not store the AS number of the provider network containing the PE device, then at step 1040 the OSPF process 770 executing in the PE device stores the advertised route in the routing table 775 (e.g., storing the prefix and its AS-path information from the LSA in the LSDB 772). (Notably, storing the advertised route in the routing table may override a previous DN bit-based decision to exclude the route.) Then, at step 1050, the import/export process 780 redistributes the prefix and AS-path information into the BGP table 765. At step 1060, the BGP process 760 exe- cuting in the PE device generates a BGP update message 600 containing both the redistributed prefix and a BGP AS-path attribute 650 that stores the route's associated AS- path information. The BGP process forwards the generated BGP update message 600 to other PE devices in the PE device's provider network, at step 1070. The sequence ends at step 1080. Advantageously, the novel AS-path sub-TLV may be used to prevent routing loops without breaking backup connectivity in networks having multiple autonomous systems that are not configured to communicate with one another. For instance, unlike prior implementations, the inventive technique can prevent routing loops from developing when a route is advertised from a first customer site to a primary AS to a second customer site and then to a secondary ("backup") AS which is not in communication with the primary AS. More generally, the technique may be deployed to prevent routing loops in single- AS as well as multi-AS environments. Further, the inventive technique may be used to prevent routing loops for both internal and external routes advertised in an OSPF routing area. The foregoing has been a detailed description of illustrative embodiments of the invention. Various modifications and additions can be made without departing from the spirit and scope of the invention. For example, although the illustrative embodiment utilizes a novel AS-path sub-TLV to prevent routing loops when OSPF is executed over PE-CE data links, it is also expressly contemplated that the teachings of the invention are equally applicable when other IGP protocols are executed over PE-CE data links. For instance, if the Intermediate-System-to-Intermediate-System (IS-IS) protocol is executed over the PE-CE links 460, the herein described OSPF AS-path sub-TLV may be replaced with a functionally equivalent IS-IS AS-path sub-TLV, e.g., that may be transported in conventional IS-IS link-state packets (LSP). Those skilled in the art will understand that the present invention is not limited to any specific network communication protocols, such as OSPF and BGP, and may be generalized to prevent routing loops in conjunction with various different interior and exterior gateway protocols.
The present invention is generally applicable for transporting any type of BGP attribute information in an OSPF LSA. Thus, while the illustrative embodiment uses the novel sub-TLV 550 for carrying BGP AS-path attribute information through an OSPF-configured network, those skilled in the art will understand that the novel sub- TLV more generally may be formatted to carry any type of BGP attribute information, such as information conventionally stored in of the BGP attributes described in the above-incorporated RHC 1771. Broadly stated, the novel OSPF sub-TLV may be con- figured to store BGP information that is traditionally stored in one or more BGP attributes.
It is also expressly contemplated that the teachings of this invention can be implemented as software, including a computer-readable medium having program instructions stored thereon, hardware, firmware, electromagnetic signals carrying instructions for execution by a processor, or any combination thereof. More generally, the inventive technique may be implemented in various combinations of hardware and/or software. Accordingly, this description is meant to be taken only by way of example and not to otherwise limit the scope of the invention.
What is claimed is:

Claims

CLAIMS 1. A method, comprising: receiving, at a first network device, a Border Gateway Protocol (BGP) message containing at least one route having an associated BGP attribute, the first network de- vice being located at the edge of a first autonomous system (AS); converting the received BGP attribute into a functionally equivalent Open Shortest Path First (OSPF) type-length-value tuple (TLV); and sending an OSPF link-state advertisement (LSA) containing the OSPF TLV as- sociated with the at least one route to a second network device, the second network de- vice being located at the edge of a second AS that is different than the first AS.
2. The method of claim 1, further comprising: propagating the OSPF LSA containing the OSPF TLV associated with the at least one route from the second network device to a third network device, the third net- work device being located at the edge of a third AS, the third AS not in direct commu- nication with the first AS; determining, at the third network device, whether the received OSPF TLV stores an AS number corresponding to the third AS; excluding, in response to determining that the received OSPF TLV stores the AS number corresponding to the third AS, the at least one route from a set of OSPF routes stored at the third network device.
3. The method of claim 2, further comprising: converting, in response to determining that the received OSPF TLV does not store the AS number corresponding to the third AS, the received OSPF TLV into a functionally equivalent BGP attribute; and sending a BGP update message containing the BGP attribute associated with the at least one route from the third network device to one or more other network devices in the third AS.
4. The method of claim 3, further comprising: excluding the at least one route from the set of OSPF routes stored at the third network device in response to a received LSA having a set DN bit; and overriding the exclusion by converting the received OSPF TLV into the func- tionally equivalent BGP attribute in response to determining that the received OSPF TLV does not store the AS number corresponding to the third AS.
5. The method of claim 2, wherein the first network device is a provider edge (PE) device and the first AS is a first provider network, the second network device is a cus- tomer edge (CE) device and the second AS is a customer site situated adjacent to the first provider network, and the third network device is a PE device and the third AS is a second provider network situated adjacent to the customer site, the second provider network not in direct communication with the first provider network.
6. The method of claim 1 , wherein the BGP attribute is a BGP AS-path attribute and the OSPF TLV is an OSPF AS-path sub-TLV.
7. The method of claim 6, wherein the OSPF AS-path sub-TLV is stored in an In- ter- Area/External Route Attribute TLV (RA-TLV).
8. The method of claim 1, further comprising: converting, before sending the OSPF LSA to the second network device, the at least one route from a virtual private network Internet Protocol version 4 (VPN-D?v4) format to an IPv4 format.
9. A computer network having a plurality of autonomous systems (AS), the com- puter network comprising: a first device situated in a first AS, the first device configured to perform the steps of: receiving a Border Gateway Protocol (BGP) message containing at least one route having an associated BGP attribute; converting the received BGP attribute into a functionally equiva- lent Open Shortest Path First (OSPF) type-length-value tuple (TLV); and advertising an OSPF link-state advertisement (LSA) containing the OSPF TLV associated with the at least one route.
10. The computer network of claim 9, further comprising: a second network device situated in a second AS, the second AS not being con- figured to communicate directly with the first AS, second network device being config- ured to receive the advertised OSPF LSA and further configured to perform the steps of: determining whether the received OSPF TLV stores an AS number cor- responding to the second AS; excluding, in response to determining that the received OSPF TLV stores the AS number corresponding to the second AS, the at least one route from a set of OSPF routes stored at the second network device.
11. The computer network of claim 10, wherein the second network device is fur- ther configured to perform the steps of: converting, in response to determining that the received OSPF TLV does not store the AS number corresponding to the second AS, the received OSPF TLV into a functionally equivalent BGP attribute; and advertising a BGP update message containing the BGP attribute associ- ated with the at least one route from the second network device to one or more other network devices in the second AS.
12. The computer network of claim 11, wherein the second network device is fur- ther configured to perform the steps of: excluding the at least one route from the set of OSPF routes stored at the third network device in response to a received LSA having a set DN bit; and overriding the exclusion by converting the received OSPF TLV into the functionally equivalent BGP attribute in response to determining that the re- ceived OSPF TLV does not store the AS number corresponding to the third AS.
13. The computer network of claim 9, wherein the BGP attribute is a BGP autono- mous system AS-path attribute and the TLV is an OSPF AS-path sub-TLV.
14. The computer network of claim 13, wherein the OSPF AS-path sub-TLV is stored in an Inter-Area/External Route Attribute TLV (RA-TLV).
15. A system, comprising: means for receiving, at a first network device, a Border Gateway Protocol (BGP) message containing at least one route having an associated BGP attribute, the first network device being located at the edge of a first autonomous system (AS); means for converting the received BGP attribute into a functionally equivalent Open Shortest Path First (OSPF) type-length-value tuple (TLV); and means for sending an OSPF link-state advertisement (LSA) containing the OSPF TLV associated with the at least one route to a second network device, the sec- ond network device being located at the edge of a second AS that is different than the first AS.
16. The system of claim 15, further comprising: means for propagating the OSPF LSA containing the OSPF TLV associated with the at least one route from the second network device to a third network device, the third network device being located at the edge of a third AS, the third AS not in di- rect communication with the first AS; means for determining, at the third network device, whether the received OSPF TLV stores an AS number corresponding to the third AS; means for excluding, in response to determining that the received OSPF TLV stores the AS number corresponding to the third AS, the at least one route from a set of OSPF routes stored at the third network device.
17. The system of claim 16, further comprising: means for converting, in response to determining that the received OSPF TLV does not store the AS number corresponding to the third AS, the received OSPF TLV into a functionally equivalent BGP attribute; and means for sending a BGP update message containing the BGP attribute associ- ated with the at least one route from the third network device to one or more other net- work devices in the third AS.
18. The system of claim 17, further comprising: means for excluding the at least one route from the set of OSPF routes stored at the third network device in response to a received LSA having a set DN bit; and means for overriding the exclusion by converting the received OSPF TLV into the functionally equivalent BGP attribute in response to determining that the received OSPF TLV does not store the AS number corresponding to the third AS.
19. The system of claim 16, wherein the first network device is a provider edge (PE) device and the first AS is a first provider network, the second network device is a customer edge (CE) device and the second AS is a customer site situated adjacent to the first provider network, and the third network device is a PE device and the third AS is a second provider network situated adjacent to the customer site, the second provider network not in direct communication with the first provider network.
20. The system of claim 15, wherein the BGP attribute is a BGP AS-path attribute and the OSPF TLV is an OSPF AS-path sub-TLV.
21. The system of claim 20, wherein the OSPF AS-path sub-TLV is stored in an Inter-Area/External Route Attribute TLV (RA-TLV).
22. The system of claim 15, further comprising: means for converting, before sending the OSPF LSA to the second network de- vice, the at least one route from a virtual private network Internet Protocol version 4 (VPN-IPv4) format to an IPv4 format.
23. A computer-readable medium storing instructions for execution on a processor for the practice of a method comprising the steps of: receiving, at a first network device, a Border Gateway Protocol (BGP) message containing at least one route having an associated BGP attribute, the first network de- vice being located at the edge of a first autonomous system (AS); converting the received BGP attribute into a functionally equivalent Open Shortest Path First (OSPF) type-length-value tuple (TLV); and sending an OSPF link-state advertisement (LSA) containing the OSPF TLV as- sociated with the at least one route to a second network device, the second network de- vice being located at the edge of a second AS that is different than the first AS.
24. A node located at the edge of a first autonomous system (AS), the node com- prising: one or more network interfaces; a processor coupled to the one or more network interfaces and adapted to exe- cute software processes; and a memory adapted to store one or more processes executable by the processor, the one or more processes configured to: i) receive a Border Gateway Protocol (BGP) message containing at least one route having an associated BGP attribute, ii) convert the received BGP attribute into a functionally equivalent Open Shortest Path First (OSPF) type-length-value tuple (TLV), and iii) send an OSPF link-state advertisement (LSA) containing the OSPF TLV associated with the at least one route to a node lo- cated at the edge of a second AS that is different than the first AS.
PCT/US2007/003033 2006-03-08 2007-02-06 Technique for preventing routing loops by disseminating bgp attribute information in an ospf-configured network WO2007102965A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200780008232XA CN101401083B (en) 2006-03-08 2007-02-06 Technique for preventing routing loops by disseminating BGP attribute information in an ospf-configured network
EP07749940A EP1997017B1 (en) 2006-03-08 2007-02-06 Technique for preventing routing loops by disseminating bgp attribute information in an ospf-configured network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/370,468 US8589573B2 (en) 2006-03-08 2006-03-08 Technique for preventing routing loops by disseminating BGP attribute information in an OSPF-configured network
US11/370,468 2006-03-08

Publications (2)

Publication Number Publication Date
WO2007102965A2 true WO2007102965A2 (en) 2007-09-13
WO2007102965A3 WO2007102965A3 (en) 2008-01-24

Family

ID=38475331

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/003033 WO2007102965A2 (en) 2006-03-08 2007-02-06 Technique for preventing routing loops by disseminating bgp attribute information in an ospf-configured network

Country Status (4)

Country Link
US (1) US8589573B2 (en)
EP (1) EP1997017B1 (en)
CN (1) CN101401083B (en)
WO (1) WO2007102965A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101237462B (en) * 2008-03-13 2011-01-05 杭州华三通信技术有限公司 A method for processing disorderly OSPF report and OSPF router
GB2505986A (en) * 2012-08-21 2014-03-19 Avaya Inc Redistributing routes in backbone edge bridge multi-chassis link aggregation group topologies

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7813265B2 (en) * 2006-03-09 2010-10-12 Cisco Technology, Inc. Backup BGP paths for non-multipath BGP fast convergence
US8111616B2 (en) * 2006-09-08 2012-02-07 Cisco Technology, Inc. Constructing a repair path in the event of failure of an inter-routing domain system link
US7957306B2 (en) * 2006-09-08 2011-06-07 Cisco Technology, Inc. Providing reachability information in a routing domain of an external destination address in a data communications network
EP2391077B1 (en) 2006-11-09 2014-01-01 Huawei Technologies Co., Ltd. Method and border node for advertising border connection information of autonomous system
US20080159150A1 (en) * 2006-12-28 2008-07-03 Furquan Ahmed Ansari Method and Apparatus for Preventing IP Datagram Fragmentation and Reassembly
US7885294B2 (en) * 2007-08-23 2011-02-08 Cisco Technology, Inc. Signaling compression information using routing protocols
US7894450B2 (en) * 2007-12-31 2011-02-22 Nortel Network, Ltd. Implementation of VPNs over a link state protocol controlled ethernet network
JP4922972B2 (en) * 2008-03-13 2012-04-25 株式会社日立製作所 Communications system
US8223669B2 (en) * 2008-04-07 2012-07-17 Futurewei Technologies, Inc. Multi-protocol label switching multi-topology support
US7894462B2 (en) * 2008-12-29 2011-02-22 At&T Intellectual Property I, L.P. Boundary routers providing redistribution and related backbone networks, computer program products, and methods
EP2209267B1 (en) * 2009-01-15 2017-05-03 Teliasonera AB A system and a method for routing data traffic
FR2945903B1 (en) 2009-05-22 2011-05-20 Alcatel Lucent METHOD FOR PREVENTING AND AVOIDING INTER-DOMAIN LOOPS
US8644315B2 (en) * 2009-06-04 2014-02-04 Cisco Technology, Inc. Label distribution protocol label filtering
US9515916B2 (en) * 2010-10-21 2016-12-06 Cisco Technology, Inc. Redirection of requests for target addresses
US9049140B2 (en) 2010-11-18 2015-06-02 Microsoft Technology Licensing, Llc Backbone network with policy driven routing
US9391796B1 (en) * 2010-12-22 2016-07-12 Juniper Networks, Inc. Methods and apparatus for using border gateway protocol (BGP) for converged fibre channel (FC) control plane
EP2717519B1 (en) * 2011-05-23 2016-08-10 Huawei Technologies Co., Ltd. Method and apparatus for transferring bootstrap message
WO2013182248A1 (en) * 2012-06-08 2013-12-12 Telefonaktiebolaget L M Ericsson (Publ) Propagation of network configuration update from network manager to network nodes using routing protocol
US9137155B2 (en) 2012-09-29 2015-09-15 Avaya Inc. Network virtualization in access networks
CN103888359B (en) * 2012-12-21 2017-04-12 杭州华三通信技术有限公司 Route calculation method and network device
US9270574B2 (en) * 2013-01-09 2016-02-23 Avaya Inc. Method and apparatus providing delayed path calculations based on service type
US9413610B2 (en) * 2013-04-24 2016-08-09 Ciena Corporation Network-based DHCP server recovery
CN104158737B (en) 2013-05-15 2017-07-28 华为技术有限公司 A kind of methods, devices and systems for controlling routing iinformation to issue
CN104283813B (en) * 2013-07-11 2019-03-12 中兴通讯股份有限公司 A kind of method and system handling RSVP-TE signaling
US9258210B2 (en) * 2013-10-01 2016-02-09 Juniper Networks, Inc. Dynamic area filtering for link-state routing protocols
CN104767687B (en) * 2014-01-03 2019-04-23 国际商业机器公司 Propagate critical path by and establish and update routing table method and apparatus
US9722919B2 (en) * 2014-01-22 2017-08-01 Cisco Technology, Inc. Tying data plane paths to a secure control plane
US10003520B2 (en) * 2014-12-22 2018-06-19 Cisco Technology, Inc. System and method for efficient name-based content routing using link-state information in information-centric networks
US10469360B1 (en) * 2015-09-30 2019-11-05 Juniper Networks, Inc. Reverse metric advertisement for border gateway protocol route reflection inhierarchical networks
US9853915B2 (en) 2015-11-04 2017-12-26 Cisco Technology, Inc. Fast fail-over using tunnels
US9781029B2 (en) * 2016-02-04 2017-10-03 Cisco Technology, Inc. Loop detection and prevention
CN106453080B (en) * 2016-09-22 2020-06-05 新华三技术有限公司 Tracing method and device for link state clearing message
CN106878186B (en) 2017-02-04 2019-11-29 华为技术有限公司 The method of routing update, the network equipment and system in network
EP3750284A1 (en) 2018-02-23 2020-12-16 Huawei Technologies Co., Ltd. Advertising and programming preferred path routes using interior gateway protocols
WO2019190699A1 (en) 2018-03-28 2019-10-03 Futurewei Technologies, Inc. Method and apparatus for preferred path route information distribution and maintenance
WO2019209480A1 (en) 2018-04-26 2019-10-31 Futurewei Technologies, Inc. Resource reservation and maintenance for preferred path routes in a network
WO2019212678A1 (en) 2018-05-04 2019-11-07 Futurewei Technologies, Inc. Explicit backups and fast re-route mechanisms for preferred path routes in a network
WO2019236221A1 (en) 2018-06-04 2019-12-12 Futurewei Technologies, Inc. Preferred path route graphs in a network
CN112953822A (en) * 2019-12-10 2021-06-11 华为技术有限公司 Method, device and system for reducing routing loop
CN113037629B (en) * 2019-12-24 2022-07-12 中国电信股份有限公司 Traffic scheduling method and system between non-direct connection autonomous systems
CN114172836B (en) * 2020-08-19 2024-05-14 瞻博网络公司 Route reflector, computer readable medium and method for route reflection
CN112311649B (en) * 2020-11-03 2022-11-22 优刻得科技股份有限公司 Dynamic disaster recovery method, system, equipment, medium and mixed cloud system of PE equipment
US11689446B2 (en) * 2021-02-05 2023-06-27 Extreme Networks, Inc. Shortest path bridging (SPB) multi area
US11848856B2 (en) * 2021-02-05 2023-12-19 Extreme Networks, Inc. Shortest path bridging (SPB) multi area and virtual SPB node
CN114024836B (en) * 2021-11-03 2023-08-25 中盈优创资讯科技有限公司 STN network A ring breakpoint determination method and device
US20230396499A1 (en) * 2022-06-03 2023-12-07 Nile Global, Inc. Methods and systems for automatic open shortest path first (ospf) configuration

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003005649A1 (en) 2001-07-06 2003-01-16 Nortel Networks Limited Policy-based forwarding in open shortest path first (ospf) networks

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6130889A (en) * 1996-10-02 2000-10-10 International Business Machines Corporation Determining and maintaining hop-count for switched networks
US6473421B1 (en) * 1999-03-29 2002-10-29 Cisco Technology, Inc. Hierarchical label switching across multiple OSPF areas
US6604146B1 (en) * 1999-06-15 2003-08-05 Viasat, Inc. Efficient internet service implementation for mesh satellite networks using centralized router server for distribution of destination tables
WO2001006707A1 (en) * 1999-07-19 2001-01-25 British Telecommunications Public Limited Company Telecommunications routing
US6415323B1 (en) * 1999-09-03 2002-07-02 Fastforward Networks Proximity-based redirection system for robust and scalable service-node location in an internetwork
US7752024B2 (en) * 2000-05-05 2010-07-06 Computer Associates Think, Inc. Systems and methods for constructing multi-layer topological models of computer networks
US7403482B2 (en) * 2000-10-30 2008-07-22 Nec Corporation Path provisioning for service level agreements in differentiated service networks
US20060082627A9 (en) * 2001-02-27 2006-04-20 Bright Christopher J Formulation and method for depositing a material on a substrate
US20040039839A1 (en) * 2002-02-11 2004-02-26 Shivkumar Kalyanaraman Connectionless internet traffic engineering framework
US7280752B2 (en) * 2002-02-22 2007-10-09 Intel Corporation Network address routing using multiple routing identifiers
US7260645B2 (en) * 2002-04-26 2007-08-21 Proficient Networks, Inc. Methods, apparatuses and systems facilitating determination of network path metrics
US7310685B2 (en) * 2002-08-29 2007-12-18 International Business Machines Corporation Method and system for reducing look-up time in packet forwarding on computer networks
AU2002351629A1 (en) * 2002-11-27 2004-06-18 Research In Motion Limited Data transfer from a host server via a tunnel server to a wireless device, and associating a temporary ipv6 address with a temporary ipv4 address for communicating in an ipv4 wireless network with the device
US20040177157A1 (en) * 2003-02-13 2004-09-09 Nortel Networks Limited Logical grouping of VPN tunnels
US6970464B2 (en) * 2003-04-01 2005-11-29 Cisco Technology, Inc. Method for recursive BGP route updates in MPLS networks
US7965620B2 (en) * 2004-05-25 2011-06-21 Telcordia Licensing Company, Llc Method, computer product and system for correlating events in a network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003005649A1 (en) 2001-07-06 2003-01-16 Nortel Networks Limited Policy-based forwarding in open shortest path first (ospf) networks

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101237462B (en) * 2008-03-13 2011-01-05 杭州华三通信技术有限公司 A method for processing disorderly OSPF report and OSPF router
GB2505986A (en) * 2012-08-21 2014-03-19 Avaya Inc Redistributing routes in backbone edge bridge multi-chassis link aggregation group topologies
US9225627B2 (en) 2012-08-21 2015-12-29 Avaya Inc. Redistributing routes in backbone edge bridge multi-chassis link aggregation group topologies between two routing protocols
GB2505986B (en) * 2012-08-21 2016-08-10 Avaya Inc Redistributing routes in backbone edge bridge multi-chassis link aggregation group topologies between two routing protocols

Also Published As

Publication number Publication date
WO2007102965A3 (en) 2008-01-24
EP1997017A4 (en) 2011-04-20
US20070214275A1 (en) 2007-09-13
US8589573B2 (en) 2013-11-19
CN101401083B (en) 2012-05-02
EP1997017B1 (en) 2012-05-23
CN101401083A (en) 2009-04-01
EP1997017A2 (en) 2008-12-03

Similar Documents

Publication Publication Date Title
EP1997017B1 (en) Technique for preventing routing loops by disseminating bgp attribute information in an ospf-configured network
US7865615B2 (en) Maintaining IGP transparency of VPN routes when BGP is used as a PE-CE protocol
US7522603B2 (en) Technique for efficiently routing IP traffic on CE-CE paths across a provider network
EP1867103B1 (en) Dynamic shared risk node group (srng) membership discovery
US7630392B2 (en) Multi-homing using controlled route leakage at a backup service provider
US7483387B2 (en) Hierarchical label distribution for inter-area summarization of edge-device addresses
EP1817881B1 (en) Inter-domain te-lsp with igp extensions
US7983153B2 (en) Fast reroute (FRR) protection at the edge of a RFC 2547 network
EP1859561B1 (en) Algorithm for backup pe selection
US8155000B2 (en) Technique for enabling traffic engineering on CE-CE paths across a provider network
US7633859B2 (en) Loop prevention technique for MPLS using two labels
US7693047B2 (en) System and method for PE-node protection
EP1859586B1 (en) Loop prevention technique for mpls using service labels

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 200780008232.X

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007749940

Country of ref document: EP