Re: router-router NHRP

shur@arch4.ho.att.com Thu, 10 August 1995 03:59 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa04955; 9 Aug 95 23:59 EDT
Received: from guelah.nexen.com by IETF.CNRI.Reston.VA.US id aa04951; 9 Aug 95 23:59 EDT
Received: from maelstrom.acton.timeplex.com (maelstrom.nexen.com [204.249.97.5]) by guelah.nexen.com (8.6.12/8.6.12) with ESMTP id XAA06262; Wed, 9 Aug 1995 23:43:10 -0400
Received: (from root@localhost) by maelstrom.acton.timeplex.com (8.6.12/8.6.12) id XAA03517 for rolc-out; Wed, 9 Aug 1995 23:31:02 -0400
Received: from guelah.nexen.com (guelah.nexen.com [204.249.96.19]) by maelstrom.acton.timeplex.com (8.6.12/8.6.12) with ESMTP id XAA03508 for <rolc@nexen.com>; Wed, 9 Aug 1995 23:30:59 -0400
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: shur@arch4.ho.att.com
Received: from gw2.att.com (gw2.att.com [192.20.239.134]) by guelah.nexen.com (8.6.12/8.6.12) with SMTP id XAA06230 for <rolc@nexen.com>; Wed, 9 Aug 1995 23:29:49 -0400
Received: from arch4.ho.att.com by ig1.att.att.com id AA14361; Wed, 9 Aug 95 23:27:25 EDT
Received: from dahlia.ho.att.com by arch4.ho.att.com (4.1/EMS-1.2 GIS) id AA20249; Wed, 9 Aug 95 23:27:51 EDT
Received: by dahlia.ho.att.com (4.1/EMS-1.1 SunOS) id AA02487; Wed, 9 Aug 95 23:28:06 EDT
Date: Wed, 9 Aug 95 23:28:06 EDT
Message-Id: <9508100328.AA02487@dahlia.ho.att.com>
To: rolc@nexen.com, yakov@cisco.com
Subject: Re: router-router NHRP
Cc: bcole@cisco.com
X-Orig-Sender: owner-rolc@nexen.com
Precedence: bulk
X-Info: Submissions to rolc@nexen.com
X-Info: [Un]Subscribe requests to rolc-request@nexen.com
X-Info: Archives for rolc via ftp://ietf.cnri.reston.va.us/ietf-mail-archive/rolc/

The recent proposals of Yakov/Bruce for router-router NHRP loop
suppression are very interesting, and (alternatives 1 and 2) bring out
some important facts, namely, that state information needs to be
tracked along the routed path between NHRP query sender and responder.
As is mentioned in their e-mail, there is a scalability problem in the
first 2 alternatives, because of the need to maintain state and take
action proportional to the the number of NHRP requests.  Alternative 3
is based on loop detection, does not have the aforementioned scaling
problem, but requires loop detection algorithms capable of rapidly
detecting loops under many varied conditions to be defined.

Wrt the scalability problem in alternatives 1 and 2, the scalability
problem seems to be related to the fact that allowing cut-though via a
local caching mechanism has the affect of dis-aggregating the routing
information that typically would have been aggregrated in a large
Internet. The forwarding of the NHRP query via the router
infrastructure is feasible in a large Internet, because of the
scalability afforded by routing aggregation procedures. Once the
cut-through is accomplished, the scalability afforded by routing
aggregation seems to go away, because there is a direct association
between source and destination. This seems to suggest that loop
prevention techniques along the lines of alternatives 1 and 2 may be
effective only a smaller scale (e.g., when the number of routers in
the NBMA is a few 100s). This would also suggest that if alternative 3
could be shown to work, it would be preferred.