Topology-independent loop-free alternate (TI-LFA) fast reroute (FRR) provides link and node protection for Segment Routing (SR) tunnels. If a link or node fails, it enables traffic to be rapidly switched to a backup path, minimizing traffic loss.
SR-MPLS TI-LFA FRR applies to both SR-MPLS BE and loose SR-MPLS TE scenarios.
Concept |
Definition |
---|---|
P space |
The P space is a set of nodes reachable from the source node of a protected link using the shortest path tree (SPT) rooted at the source node without traversing the protected link. |
Extended P space |
The extended P space is a set of nodes reachable from all the neighbors of a protected link's source node using SPTs rooted at the neighbors without traversing the protected link. A node in the P space or extended P space is called a P node. |
Q space |
The Q space is a set of nodes reachable from the destination node of a protected link using the reverse SPT rooted at the destination node without traversing the protected link. A node in the Q space is called a Q node. |
PQ node |
A PQ node resides in both the (extended) P space and Q space and functions as the destination node of a protected tunnel. |
LFA |
With LFA, a device runs the SPF algorithm to compute the shortest paths to the destination, using each neighbor that can provide a backup link as a root node. The device then computes a group of loop-free backup links with the minimum cost. For more information about LFA, see IS-IS Auto FRR. |
RLFA |
Remote LFA (RLFA) computes a PQ node based on a protected link and establishes a tunnel between the source and PQ nodes to offer alternate next hop protection. If the protected link fails, traffic is automatically switched to the backup path, improving network reliability. For more information about RLFA, see IS-IS Auto FRR. NOTE:
When computing an RLFA FRR backup path, Huawei devices compute the extended P space by default. |
TI-LFA |
In some LFA FRR and RLFA scenarios, the extended P space and Q space neither intersect nor have direct neighbors. Consequently, no backup path can be computed, failing to meet reliability requirements. TI-LFA solves this problem by computing the extended P space, Q space, and post-convergence SPT based on the protected path, computing a scenario-specific repair list, and establishing an SR tunnel from the source node to a P node and then to a Q node to offer alternate next hop protection. If the protected link fails, traffic is automatically switched to the backup path, improving network reliability.
NOTE:
When computing a TI-LFA FRR backup path, Huawei devices compute the extended P space by default. |
Conventional loop-free alternate (LFA) requires that at least one neighbor be a loop-free next hop to a destination, and RLFA requires that at least one node be connected to the source and destination nodes without traversing the failure point. In contrast, Topology-Independent Loop-free Alternate (TI-LFA) uses an explicit path to represent a backup path, achieving higher FRR reliability without imposing topology constraints.
On the network shown in Figure 3, PE1 and PE3 are source and destination nodes, respectively, and link costs are configured. This example assumes that P1 fails.
TI-LFA provides both link and node protection.
Link protection: protects traffic traversing a specific link.
Node protection: protects traffic traversing a specific node. Node protection takes precedence over link protection.
The following uses node protection as an example to describe how to implement TI-LFA. Assume that traffic travels along the PE1 -> P1 -> P3 -> PE3 path on the network shown in Figure 3. To prevent traffic loss caused by P1 failures, TI-LFA computes the extended P space, Q space, post-convergence SPT to be used after P1 fails, backup outbound interface, and repair list, and then generates backup forwarding entries.
Computes the extended P space {PE2, P2} with PE1's neighbor PE2 as the root node.
Computes the Q space {P3, P4, PE3, PE4} with P3 as the root node.
In this example, the end node on the traffic forwarding path is PE3, which has only one egress (P3). As such, to simplify calculation, P3 can be used as the root.
Computes the post-convergence SPT by excluding the primary next hop.
Backup outbound interface: If the extended P space and Q space neither intersect nor have direct neighbors, the post-convergence next-hop outbound interface functions as the backup outbound interface.
Repair list: a constrained path through which traffic can be directed to a Q node. The repair list consists of a P node label (SID) and a P-to-Q adjacency label. In Figure 3, the repair list consists of P2's node label 100 and the P2-to-P4 adjacency label 9204.
After a TI-LFA backup path is computed, if the primary path fails, traffic is switched to the backup path, preventing packet loss.
Assume that a packet carrying the prefix SID 16100 of PE3 needs to be forwarded from PE1 to PE3 over the PE1 -> P1 -> P3 -> PE3 path shown in Figure 4. When the primary next hop P1 fails, TI-LFA FRR is triggered, switching traffic to the backup path.
The process of forwarding a packet over a TI-LFA FRR backup path is as follows:
TI-LFA FRR Protection |
Description |
Deployment |
---|---|---|
TI-LFA FRR protects traffic transmitted in IP forwarding mode. |
Traffic is transmitted over the primary path in IP forwarding mode, and a TI-LFA FRR backup path is computed. |
|
TI-LFA FRR protects traffic transmitted over an SR tunnel. |
Traffic is transmitted over a primary SR tunnel, and a TI-LFA FRR backup path is computed. |
|