RFC 1518
RFC 1518
RFC 1518
net/publication/234787927
CITATIONS READS
232 371
2 authors, including:
Tony Li
Arista Networks
25 PUBLICATIONS 3,314 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Tony Li on 04 June 2014.
1. Introduction
2. Scope
3. Background
all the subscribers into groups, such that traffic destined to all
the subscribers within a group should flow through a particular
attachment point. Once the partitioning is done, the address space
of the provider is subdivided along the group boundaries. A leaf
routing domain that is willing to accept prefixes derived from its
direct provider gets a prefix from the provider’s address space
subdivision associated with the group the domain belongs to. Note
that the advertisement by the direct provider of the routing
information associated with each subdivision must be done with
care to ensure that such an advertisement would not result in a
global distribution of separate reachability information
associated with each subdivision, unless such distribution is
warranted for some other purposes (e.g., supporting certain
aspects of policy-based routing).
domains.
national backbones in Europe, and one in the far east, then MBII
may make use of six different address prefixes. Each part of MBII
would be assigned a single address prefix based on the nearest
connection.
Also note that this and the previous approach will tend to cause
packets to take different routes. With the first approach, packets
from outside of MBII destined for within MBII will tend to enter
via the point which is closest to the source (which will therefore
tend to maximize the load on the networks internal to MBII). With
the second solution, packets from outside destined for within MBII
will tend to enter via the point which is closest to the
For example, let’s suppose that the XYZ corporation does a lot of
business with MBII. In this case, XYZ and MBII may contract with a
carrier to provide a private link between the two corporations,
where this link may only be used for packets whose source is
within one of the two corporations, and whose destination is
within the other of the two corporations. Finally, suppose that
the point-to-point link is connected between a single router
(router X) within XYZ corporation and a single router (router M)
within MBII. It is therefore necessary to configure router X to
know which addresses can be reached over this link (specifically,
all addresses reachable in MBII). Similarly, it is necessary to
configure router M to know which addresses can be reached over
this link (specifically, all addresses reachable in XYZ
Corporation).
If the old TRD and the new TRD are not adjacent, then the
situation is a bit more complex, but there are still several
possible ways to forward traffic correctly.
If the old TRD and the new TRD are themselves connected by other
cooperative transit routing domains, then these intermediate
domains may agree to forward traffic for XYZ correctly. For
example, suppose that NorthSouthNet and NewCommercialNet are not
directly connected, but that they are both directly connected to
the BBNet backbone. In this case, all three of NorthSouthNet,
NewCommercialNet, and the BBNet backbone would need to maintain a
special entry for XYZ corporation so that traffic to XYZ using the
old address allocation would be forwarded via NewCommercialNet.
However, other routing domains would not need to be aware of the
new location for XYZ Corporation.
Suppose that the old TRD and the new TRD are separated by a non-
cooperative routing domain, or by a long path of routing domains.
In this case, the old TRD could encapsulate traffic to XYZ
Corporation in order to deliver such packets to the correct
backbone.
6. Recommendations
Also, the solution used may affect the actual routes which packets
follow, and may effect the availability of backup routes when the
primary route fails.
7. Acknowledgments
Topolcic (CNRI), and Kannan Varadhan (OARnet) for their review and
constructive comments.
8. References
[1] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Supernetting: an
Address Assignment and Aggregation Strategy", RFC 1338, BARRNet,
cicso, Merit, OARnet, June 1992.
[2] Colella, R., Gardner, E, and R. Callon, "Guidelines for OSI NSAP
Allocation in the Internet", RFC 1237, JuNIST, Mitre, DEC, July
1991.
9. Security Considerations
Yakov Rekhter
T.J. Watson Research Center, IBM Corporation
P.O. Box 218
Yorktown Heights, NY 10598
Tony Li
cisco Systems, Inc.
1525 O’Brien Drive
Menlo Park, CA 94025
EMail: tli@cisco.com