draft-ietf-ccamp-inter-domain-framework-06.txt | rfc4726.txt | |||
---|---|---|---|---|
Network Working Group Adrian Farrel | ||||
IETF Internet Draft Old Dog Consulting | ||||
Proposed Status: Informational | ||||
Expires: February 2007 Jean-Philippe Vasseur | ||||
Cisco Systems, Inc. | ||||
Arthi Ayyangar | Network Working Group A. Farrel | |||
Request for Comments: 4726 Old Dog Consulting | ||||
Category: Informational J.-P. Vasseur | ||||
Cisco Systems, Inc. | ||||
A. Ayyangar | ||||
Nuova Systems | Nuova Systems | |||
November 2006 | ||||
August 2006 | ||||
A Framework for Inter-Domain Multiprotocol Label Switching | A Framework for Inter-Domain Multiprotocol Label Switching | |||
Traffic Engineering | Traffic Engineering | |||
draft-ietf-ccamp-inter-domain-framework-06.txt | Status of This Memo | |||
Status of this Memo | ||||
By submitting this Internet-Draft, each author represents that any | ||||
applicable patent or other IPR claims of which he or she is aware | ||||
have been or will be disclosed, and any of which he or she becomes | ||||
aware will be disclosed, in accordance with Section 6 of BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF), its areas, and its working groups. Note that | ||||
other groups may also distribute working documents as | ||||
Internet-Drafts. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This memo provides information for the Internet community. It does | |||
and may be updated, replaced, or obsoleted by other documents at any | not specify an Internet standard of any kind. Distribution of this | |||
time. It is inappropriate to use Internet-Drafts as reference | memo is unlimited. | |||
material or to cite them other than as "work in progress." | ||||
The list of current Internet-Drafts can be accessed at | Copyright Notice | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | ||||
The list of Internet-Draft Shadow Directories can be accessed at | Copyright (C) The IETF Trust (2006). | |||
http://www.ietf.org/shadow.html. | ||||
Abstract | Abstract | |||
This document provides a framework for establishing and controlling | This document provides a framework for establishing and controlling | |||
Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) | Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) | |||
Traffic Engineered (TE) Label Switched Paths (LSPs) in multi-domain | Traffic Engineered (TE) Label Switched Paths (LSPs) in multi-domain | |||
networks. | networks. | |||
For the purposes of this document, a domain is considered to be any | For the purposes of this document, a domain is considered to be any | |||
collection of network elements within a common sphere of address | collection of network elements within a common sphere of address | |||
management or path computational responsibility. Examples of such | management or path computational responsibility. Examples of such | |||
domains include Interior Gateway Protocol (IGP) areas and Autonomous | domains include Interior Gateway Protocol (IGP) areas and Autonomous | |||
Systems (ASs). | Systems (ASes). | |||
Contents | Table of Contents | |||
1. Introduction ............................................... 3 | 1. Introduction ....................................................3 | |||
1.1. Nested Domains ......................................... 3 | 1.1. Nested Domains .............................................3 | |||
2. Signaling Options .......................................... 4 | 2. Signaling Options ...............................................4 | |||
2.1. LSP Nesting ............................................ 4 | 2.1. LSP Nesting ................................................4 | |||
2.2. Contiguous LSP ......................................... 5 | 2.2. Contiguous LSP .............................................5 | |||
2.3. LSP Stitching .......................................... 5 | 2.3. LSP Stitching ..............................................5 | |||
2.4. Hybrid Methods ......................................... 6 | 2.4. Hybrid Methods .............................................6 | |||
2.5. Control of Downstream Choice of Signaling Method ....... 6 | 2.5. Control of Downstream Choice of Signaling Method ...........6 | |||
3. Path Computation Techniques ................................ 6 | 3. Path Computation Techniques .....................................6 | |||
3.1. Management Configuration ............................... 7 | 3.1. Management Configuration ...................................7 | |||
3.2. Head End Computation ................................... 7 | 3.2. Head-End Computation .......................................7 | |||
3.2.1. Multi-Domain Visibility Computation ................ 7 | 3.2.1. Multi-Domain Visibility Computation .................7 | |||
3.2.2. Partial Visibility Computation ..................... 7 | 3.2.2. Partial Visibility Computation ......................7 | |||
3.2.3. Local Domain Visibility Computation ................ 8 | 3.2.3. Local Domain Visibility Computation .................8 | |||
3.3. Domain Boundary Computation ............................ 8 | 3.3. Domain Boundary Computation ................................8 | |||
3.4. Path Computation Element ............................... 9 | 3.4. Path Computation Element ...................................9 | |||
3.4.1. Multi-Domain Visibility Computation ................ 9 | 3.4.1. Multi-Domain Visibility Computation ................10 | |||
3.4.2. Path Computation Use of PCE When Preserving | 3.4.2. Path Computation Use of PCE When Preserving | |||
Confidentiality ................................... 10 | Confidentiality ....................................10 | |||
3.4.3. Per-Domain Computation Servers .................... 10 | 3.4.3. Per-Domain Computation Elements ....................10 | |||
3.5. Optimal Path Computation .............................. 10 | 3.5. Optimal Path Computation ..................................11 | |||
4. Distributing Reachability and TE Information .............. 11 | 4. Distributing Reachability and TE Information ...................11 | |||
5. Comments on Advanced Functions ............................ 12 | 5. Comments on Advanced Functions .................................12 | |||
5.1. LSP Re-Optimization ................................... 12 | 5.1. LSP Re-Optimization .......................................12 | |||
5.2. LSP Setup Failure ..................................... 13 | 5.2. LSP Setup Failure .........................................13 | |||
5.3. LSP Repair ............................................ 13 | 5.3. LSP Repair ................................................14 | |||
5.4. Fast Reroute .......................................... 14 | 5.4. Fast Reroute ..............................................14 | |||
5.5. Comments on Path Diversity ............................ 15 | 5.5. Comments on Path Diversity ................................15 | |||
5.6. Domain-Specific Constraints ........................... 15 | 5.6. Domain-Specific Constraints ...............................16 | |||
5.7. Policy Control ........................................ 16 | 5.7. Policy Control ............................................17 | |||
5.8. Inter-domain Operations and Management (OAM) .......... 16 | 5.8. Inter-Domain Operations and Management (OAM) ..............17 | |||
5.9. Point-to-Multipoint ................................... 16 | 5.9. Point-to-Multipoint .......................................17 | |||
5.10. Applicability to Non-Packet Technologies ............. 17 | 5.10. Applicability to Non-Packet Technologies .................17 | |||
6. Security Considerations ................................... 17 | 6. Security Considerations ........................................18 | |||
7. IANA Considerations ....................................... 18 | 7. Acknowledgements ...............................................19 | |||
8. Acknowledgements .......................................... 18 | 8. Normative References ...........................................19 | |||
9. Intellectual Property Considerations ...................... 18 | 9. Informative References .........................................20 | |||
10. Normative References ..................................... 19 | ||||
11. Informational References ................................. 19 | ||||
12. Authors' Addresses ....................................... 21 | ||||
13. Full Copyright Statement ................................. 21 | ||||
1. Introduction | 1. Introduction | |||
The Traffic Engineering Working Group has developed requirements for | The Traffic Engineering Working Group has developed requirements for | |||
inter-area and inter-AS Multiprotocol Label Switching (MPLS) Traffic | inter-area and inter-AS Multiprotocol Label Switching (MPLS) Traffic | |||
Engineering in [RFC4105] and [RFC4216]. | Engineering in [RFC4105] and [RFC4216]. | |||
Various proposals have subsequently been made to address some or all | Various proposals have subsequently been made to address some or all | |||
of these requirements through extensions to the Resource Reservation | of these requirements through extensions to the Resource Reservation | |||
Protocol Traffic Engineering extensions (RSVP-TE) and to the Interior | Protocol Traffic Engineering extensions (RSVP-TE) and to the Interior | |||
Gateway Protocols (IGPs) (i.e., ISIS and OSPF). | Gateway Protocols (IGPs) (i.e., Intermediate System to Intermediate | |||
System (IS-IS) and OSPF). | ||||
This document introduces the techniques for establishing Traffic | This document introduces the techniques for establishing Traffic | |||
Engineered (TE) Label Switched Paths (LSPs) across multiple domains. | Engineered (TE) Label Switched Paths (LSPs) across multiple domains. | |||
In this context and within the remainder of this document, we | In this context and within the remainder of this document, we | |||
consider all source-based and constraint-based routed LSPs and refer | consider all source-based and constraint-based routed LSPs and refer | |||
to them interchangeably as "TE LSPs" or "LSPs". | to them interchangeably as "TE LSPs" or "LSPs". | |||
The functional components of these techniques are separated into the | The functional components of these techniques are separated into the | |||
mechanisms for discovering reachability and TE information, for | mechanisms for discovering reachability and TE information, for | |||
computing the paths of LSPs, and for signaling the LSPs. Note that | computing the paths of LSPs, and for signaling the LSPs. Note that | |||
the aim of this document is not to detail each of those techniques | the aim of this document is not to detail each of those techniques, | |||
which are covered in separate documents referenced from the sections | which are covered in separate documents referenced from the sections | |||
of this document that introduce the techniques, but rather to propose | of this document that introduce the techniques, but rather to propose | |||
a framework for inter-domain MPLS Traffic Engineering. | a framework for inter-domain MPLS Traffic Engineering. | |||
Note that in the remainder of this document, the term "MPLS Traffic | Note that in the remainder of this document, the term "MPLS Traffic | |||
Engineering" is used equally to apply to MPLS and Generalized MPLS | Engineering" is used equally to apply to MPLS and Generalized MPLS | |||
(GMPLS) traffic. Specific issues pertaining to the use of GMPLS in | (GMPLS) traffic. Specific issues pertaining to the use of GMPLS in | |||
inter-domain environments (for example, policy implications of the | inter-domain environments (for example, policy implications of the | |||
use of the Link Management Protocol [LMP] on inter-domain links) | use of the Link Management Protocol [RFC4204] on inter-domain links) | |||
these are covered in separate documents such as [GMPLS-AS]. | are covered in separate documents such as [GMPLS-AS]. | |||
For the purposes of this document, a domain is considered to be any | For the purposes of this document, a domain is considered to be any | |||
collection of network elements within a common sphere of address | collection of network elements within a common sphere of address | |||
management or path computational responsibility. Examples of such | management or path computational responsibility. Examples of such | |||
domains include IGP areas and Autonomous Systems. Wholly or partially | domains include IGP areas and Autonomous Systems. Wholly or | |||
overlapping domains (e.g. path computation sub-domains of areas or | partially overlapping domains (e.g., path computation sub-domains of | |||
ASs) are not within the scope of this document. | areas or ASes) are not within the scope of this document. | |||
1.1. Nested Domains | 1.1. Nested Domains | |||
Nested domains are outside the scope of this document. It may be that | Nested domains are outside the scope of this document. It may be | |||
some domains that are nested administratively or for the purposes of | that some domains that are nested administratively or for the | |||
address space management can be considered as adjacent domains for | purposes of address space management can be considered as adjacent | |||
the purposes of this document, however the fact that the domains are | domains for the purposes of this document; however, the fact that the | |||
nested is then immaterial. In the context of MPLS TE, domain A is | domains are nested is then immaterial. In the context of MPLS TE, | |||
considered to be nested within domain B if domain A is wholly | domain A is considered to be nested within domain B if domain A is | |||
contained in Domain B, and domain B is fully or partially aware of | wholly contained in domain B, and domain B is fully or partially | |||
the TE characteristics and topology of domain A. | aware of the TE characteristics and topology of domain A. | |||
2. Signaling Options | 2. Signaling Options | |||
Three distinct options for signaling TE LSPs across multiple domains | Three distinct options for signaling TE LSPs across multiple domains | |||
are identified. The choice of which options to use may be influenced | are identified. The choice of which options to use may be influenced | |||
by the path computation technique used (see section 3), although some | by the path computation technique used (see section 3), although some | |||
path computation techniques may apply to multiple signaling options. | path computation techniques may apply to multiple signaling options. | |||
The choice may further depend on the application to which the TE LSPs | The choice may further depend on the application to which the TE LSPs | |||
are put and the nature, topology and switching capabilities of the | are put and the nature, topology, and switching capabilities of the | |||
network. | network. | |||
A comparison of the usages of the different signaling options is | A comparison of the usages of the different signaling options is | |||
beyond the scope of this document and should be the subject of a | beyond the scope of this document and should be the subject of a | |||
separate applicability statement. | separate applicability statement. | |||
2.1. LSP Nesting | 2.1. LSP Nesting | |||
Hierarchical LSPs form a fundamental part of MPLS [RFC3031] and are | Hierarchical LSPs form a fundamental part of MPLS [RFC3031] and are | |||
discussed in further detail in [RFC4206]. Hierarchical LSPs may | discussed in further detail in [RFC4206]. Hierarchical LSPs may | |||
optionally be advertised as TE links. Note that a hierarchical LSP | optionally be advertised as TE links. Note that a hierarchical LSP | |||
that spans multiple domains cannot be advertised in this way because | that spans multiple domains cannot be advertised in this way because | |||
there is no concept of TE information that spans domains. | there is no concept of TE information that spans domains. | |||
Hierarchical LSPs can be used in support of inter-domain TE LSPs. | Hierarchical LSPs can be used in support of inter-domain TE LSPs. In | |||
In particular, a hierarchical LSP may be used to achieve connectivity | particular, a hierarchical LSP may be used to achieve connectivity | |||
between any pair of Label Switching Routers (LSRs) within a domain. | between any pair of Label Switching Routers (LSRs) within a domain. | |||
The ingress and egress of the hierarchical LSP could be the edge | The ingress and egress of the hierarchical LSP could be the edge | |||
nodes of the domain in which case connectivity is achieved across the | nodes of the domain in which case connectivity is achieved across the | |||
entire domain, or they could be any other pair of LSRs in the domain. | entire domain, or they could be any other pair of LSRs in the domain. | |||
The technique of carrying one TE LSP within another is termed LSP | The technique of carrying one TE LSP within another is termed LSP | |||
nesting. A hierarchical LSP may provide a TE LSP tunnel to transport | nesting. A hierarchical LSP may provide a TE LSP tunnel to transport | |||
(i.e. nest) multiple TE LSPs along a common part of their paths. | (i.e., nest) multiple TE LSPs along a common part of their paths. | |||
Alternatively, a TE LSP may carry (i.e. nest) a single LSP in a | Alternatively, a TE LSP may carry (i.e., nest) a single LSP in a | |||
one-to-one mapping. | one-to-one mapping. | |||
The signaling trigger for the establishment of a hierarchical LSP may | The signaling trigger for the establishment of a hierarchical LSP may | |||
be the receipt of a signaling request for the TE LSP that it will | be the receipt of a signaling request for the TE LSP that it will | |||
carry, or may be a management action to "pre-engineer" a domain to be | carry, or may be a management action to "pre-engineer" a domain to be | |||
crossed by TE LSPs that would be used as hierarchical LSPs by the | crossed by TE LSPs that would be used as hierarchical LSPs by the | |||
traffic that has to traverse the domain. Furthermore, the mapping | traffic that has to traverse the domain. Furthermore, the mapping | |||
(inheritance rules) between attributes of the nested and the | (inheritance rules) between attributes of the nested and the | |||
hierarchical LSPs (including bandwidth) may be statically | hierarchical LSPs (including bandwidth) may be statically pre- | |||
pre-configured or, for on-demand hierarchical LSPs, may be dynamic | configured or, for on-demand hierarchical LSPs, may be dynamic | |||
according to the properties of the nested LSPs. Even in the dynamic | according to the properties of the nested LSPs. Even in the dynamic | |||
case inheritance from the properties of the nested LSP(s) can be | case, inheritance from the properties of the nested LSP(s) can be | |||
complemented by local or domain-wide policy rules. | complemented by local or domain-wide policy rules. | |||
Note that a hierarchical LSP may be constructed to span multiple | Note that a hierarchical LSP may be constructed to span multiple | |||
domains or parts of domains. However, such an LSP cannot be | domains or parts of domains. However, such an LSP cannot be | |||
advertised as a TE link that spans domains. The end points of a | advertised as a TE link that spans domains. The end points of a | |||
hierarchical LSP are not necessarily on domain boundaries, so nesting | hierarchical LSP are not necessarily on domain boundaries, so nesting | |||
is not limited to domain boundaries. | is not limited to domain boundaries. | |||
Note also that the Interior/Exterior Gateway Protocol (IGP/EGP) | Note also that the Interior/Exterior Gateway Protocol (IGP/EGP) | |||
routing topology is maintained unaffected by the LSP connectivity and | routing topology is maintained unaffected by the LSP connectivity and | |||
skipping to change at line 221 | skipping to change at page 5, line 35 | |||
2.2. Contiguous LSP | 2.2. Contiguous LSP | |||
A single contiguous LSP is established from ingress to egress in a | A single contiguous LSP is established from ingress to egress in a | |||
single signaling exchange. No further LSPs are required to be | single signaling exchange. No further LSPs are required to be | |||
established to support this LSP so that hierarchical or stitched LSPs | established to support this LSP so that hierarchical or stitched LSPs | |||
are not needed. | are not needed. | |||
A contiguous LSP uses the same Session/LSP ID along the whole of its | A contiguous LSP uses the same Session/LSP ID along the whole of its | |||
path (that is, at each LSR). The notions of "splicing" together | path (that is, at each LSR). The notions of "splicing" together | |||
different LSPs, or of "shuffling" Session or LSP identifiers is not | different LSPs or of "shuffling" Session or LSP identifiers are not | |||
considered. | considered. | |||
2.3. LSP Stitching | 2.3. LSP Stitching | |||
LSP Stitching is described in [STITCH]. In the LSP stitching model | LSP Stitching is described in [STITCH]. In the LSP stitching model, | |||
separate LSPs (referred to as a TE LSP segments) are established and | separate LSPs (referred to as a TE LSP segments) are established and | |||
are "stitched" together in the data plane so that a single end-to-end | are "stitched" together in the data plane so that a single end-to-end | |||
label switched path is achieved. The distinction is that the | Label Switched Path is achieved. The distinction is that the | |||
component LSP segments are signaled as distinct TE LSPs in the | component LSP segments are signaled as distinct TE LSPs in the | |||
control plane. Each signaled TE LSP segment has a different source | control plane. Each signaled TE LSP segment has a different source | |||
and destination. | and destination. | |||
LSP stitching can be used in support of inter-domain TE LSPs. In | LSP stitching can be used in support of inter-domain TE LSPs. In | |||
particular, an LSP segment may be used to achieve connectivity | particular, an LSP segment may be used to achieve connectivity | |||
between any pair of LSRs within a domain. The ingress and egress of | between any pair of LSRs within a domain. The ingress and egress of | |||
the LSP segment could be the edge nodes of the domain in which case | the LSP segment could be the edge nodes of the domain in which case | |||
connectivity is achieved across the entire domain, or they could be | connectivity is achieved across the entire domain, or they could be | |||
any other pair of LSRs in the domain. | any other pair of LSRs in the domain. | |||
The signaling trigger for the establishment of a TE LSP segment may | The signaling trigger for the establishment of a TE LSP segment may | |||
be the establishment of the previous TE LSP segment, the receipt of | be the establishment of the previous TE LSP segment, the receipt of a | |||
a setup request for TE LSP that it plans to stitch to a local TE LSP | setup request for TE LSP that it plans to stitch to a local TE LSP | |||
segment, or may be a management action. | segment, or a management action. | |||
LSP segments may be managed and advertised as TE links. | LSP segments may be managed and advertised as TE links. | |||
2.4. Hybrid Methods | 2.4. Hybrid Methods | |||
There is nothing to prevent the mixture of signaling methods | There is nothing to prevent the mixture of signaling methods | |||
described above when establishing a single, end-to-end, inter-domain | described above when establishing a single, end-to-end, inter-domain | |||
TE LSP. It may be desirable in this case for the choice of the | TE LSP. It may be desirable in this case for the choice of the | |||
various methods to be reported along the path, perhaps through the | various methods to be reported along the path, perhaps through the | |||
Record Route Object (RRO). | Record Route Object (RRO). | |||
skipping to change at line 268 | skipping to change at page 6, line 34 | |||
2.5. Control of Downstream Choice of Signaling Method | 2.5. Control of Downstream Choice of Signaling Method | |||
Notwithstanding the previous section, an ingress LSR may wish to | Notwithstanding the previous section, an ingress LSR may wish to | |||
restrict the signaling methods applied to a particular LSP at domain | restrict the signaling methods applied to a particular LSP at domain | |||
boundaries across the network. Such control, where it is required, | boundaries across the network. Such control, where it is required, | |||
may be achieved by the definition of appropriate new flags in the | may be achieved by the definition of appropriate new flags in the | |||
SESSION-ATTRIBUTE object or the Attributes Flags TLV of the | SESSION-ATTRIBUTE object or the Attributes Flags TLV of the | |||
LSP_ATTRIBUTES object [RFC4420]. Before defining a mechanism to | LSP_ATTRIBUTES object [RFC4420]. Before defining a mechanism to | |||
provide this level of control, the functional requirement to control | provide this level of control, the functional requirement to control | |||
the way in which the network delivers a service must be established | the way in which the network delivers a service must be established. | |||
and due consideration must be given to the impact on | Also, due consideration must be given to the impact on | |||
interoperability since new mechanisms must be backwards compatible, | interoperability since new mechanisms must be backwards compatible, | |||
and care must be taken to avoid allowing standards-conformant | and care must be taken to avoid allowing standards-conformant | |||
implementations each supporting a different functional subset such | implementations that each supports a different functional subset in | |||
that they are not capable of establishing LSPs. | such a way that they are not capable of establishing LSPs. | |||
3. Path Computation Techniques | 3. Path Computation Techniques | |||
The discussion of path computation techniques within this document is | The discussion of path computation techniques within this document is | |||
limited significantly to the determination of where computation may | limited significantly to the determination of where computation may | |||
take place and what components of the full path may be determined. | take place and what components of the full path may be determined. | |||
The techniques used are closely tied to the signaling methodologies | The techniques used are closely tied to the signaling methodologies | |||
described in the previous section in that certain computation | described in the previous section in that certain computation | |||
techniques may require the use of particular signaling approaches and | techniques may require the use of particular signaling approaches and | |||
vice versa. | vice versa. | |||
Any discussion of the appropriateness of a particular path | Any discussion of the appropriateness of a particular path | |||
computation technique in any given circumstance is beyond the scope | computation technique in any given circumstance is beyond the scope | |||
of this document and should be described in a separate applicability | of this document and should be described in a separate applicability | |||
statement. | statement. | |||
Path computation algorithms are firmly out of scope of this document. | Path computation algorithms are firmly out of the scope of this | |||
document. | ||||
3.1. Management Configuration | 3.1. Management Configuration | |||
Path computation may be performed by offline tools or by a network | Path computation may be performed by offline tools or by a network | |||
planner. The resultant path may be supplied to the ingress LSR as | planner. The resultant path may be supplied to the ingress LSR as | |||
part of the TE LSP or service request, and encoded by the ingress LSR | part of the TE LSP or service request, and encoded by the ingress LSR | |||
as an Explicit Route Object (ERO) on the Path message that is sent | as an Explicit Route Object (ERO) on the Path message that is sent | |||
out. | out. | |||
There is no reason why the path provided by the operator should not | There is no reason why the path provided by the operator should not | |||
span multiple domains if the relevant information is available to the | span multiple domains if the relevant information is available to the | |||
planner or the offline tool. The definition of what information is | planner or the offline tool. The definition of what information is | |||
needed to perform this operation and how that information is | needed to perform this operation and how that information is | |||
gathered, is outside the scope of this document. | gathered, is outside the scope of this document. | |||
3.2. Head End Computation | 3.2. Head-End Computation | |||
The head end, or ingress, LSR may assume responsibility for path | The head-end, or ingress, LSR may assume responsibility for path | |||
computation when the operator supplies part or none of the explicit | computation when the operator supplies part or none of the explicit | |||
path. The operator must, in any case, supply at least the destination | path. The operator must, in any case, supply at least the | |||
address (egress) of the LSP. | destination address (egress) of the LSP. | |||
3.2.1. Multi-Domain Visibility Computation | 3.2.1. Multi-Domain Visibility Computation | |||
If the ingress has sufficient visibility of the topology and TE | If the ingress has sufficient visibility of the topology and TE | |||
information for all of the domains across which it will route the LSP | information for all of the domains across which it will route the LSP | |||
to its destination then it may compute and provide the entire path. | to its destination, then it may compute and provide the entire path. | |||
The quality of this path (that is, its optimality as discussed in | The quality of this path (that is, its optimality as discussed in | |||
section 3.5) can be better if the ingress has full visibility into | section 3.5) can be better if the ingress has full visibility into | |||
all relevant domains rather than just sufficient visibility to | all relevant domains rather than just sufficient visibility to | |||
provide some path to the destination. | provide some path to the destination. | |||
Extreme caution must be exercised in consideration of the | Extreme caution must be exercised in consideration of the | |||
distribution of the requisite TE information. See section 4. | distribution of the requisite TE information. See section 4. | |||
3.2.2. Partial Visibility Computation | 3.2.2. Partial Visibility Computation | |||
It may be that the ingress does not have full visibility of the | It may be that the ingress does not have full visibility of the | |||
topology of all domains, but does have information about the | topology of all domains, but does have information about the | |||
connectedness of the domains and the TE resource availability across | connectedness of the domains and the TE resource availability across | |||
the domains. In this case, the ingress is not able to provide a fully | the domains. In this case, the ingress is not able to provide a | |||
specified strict explicit path from ingress to egress. However, for | fully specified strict explicit path from ingress to egress. | |||
example, the ingress might supply an explicit path that comprises: | However, for example, the ingress might supply an explicit path that | |||
comprises: | ||||
- explicit hops from ingress to the local domain boundary | - explicit hops from ingress to the local domain boundary | |||
- loose hops representing the domain entry points across the network | - loose hops representing the domain entry points across the | |||
network | ||||
- a loose hop identifying the egress. | - a loose hop identifying the egress. | |||
Alternatively, the explicit path might be expressed as: | Alternatively, the explicit path might be expressed as: | |||
- explicit hops from ingress to the local domain boundary | - explicit hops from ingress to the local domain boundary | |||
- strict hops giving abstract nodes representing each domain in turn | - strict hops giving abstract nodes representing each domain in | |||
turn | ||||
- a loose hop identifying the egress. | - a loose hop identifying the egress. | |||
These two explicit path formats could be mixed according to the | These two explicit path formats could be mixed according to the | |||
information available resulting in different combinations of loose | information available resulting in different combinations of loose | |||
hops and abstract nodes. | hops and abstract nodes. | |||
This form of explicit path relies on some further computation | This form of explicit path relies on some further computation | |||
technique being applied at the domain boundaries. See section 3.3. | technique being applied at the domain boundaries. See section 3.3. | |||
As with the multi-domain visibility option, extreme caution must be | As with the multi-domain visibility option, extreme caution must be | |||
exercised in consideration of the distribution of the requisite TE | exercised in consideration of the distribution of the requisite TE | |||
information. See section 4. | information. See section 4. | |||
3.2.3. Local Domain Visibility Computation | 3.2.3. Local Domain Visibility Computation | |||
A final possibility for ingress-based computation is that the ingress | A final possibility for ingress-based computation is that the ingress | |||
LSR has visibility only within its own domain, and connectivity | LSR has visibility only within its own domain, and connectivity | |||
information only as far as determining one or more domain exit points | information only as far as determining one or more domain exit points | |||
that may be suitable for carrying the LSP to its egress. | that may be suitable for carrying the LSP to its egress. | |||
In this case the ingress builds an explicit path that comprises just: | In this case, the ingress builds an explicit path that comprises | |||
just: | ||||
- explicit hops from ingress to the local domain boundary | - explicit hops from ingress to the local domain boundary | |||
- a loose hop identifying the egress. | - a loose hop identifying the egress. | |||
3.3. Domain Boundary Computation | 3.3. Domain Boundary Computation | |||
If the partial explicit path methods described in sections 3.2.2 or | If the partial explicit path methods described in sections 3.2.2 or | |||
3.2.3 are applied then the LSR at each domain boundary is responsible | 3.2.3 are applied, then the LSR at each domain boundary is | |||
for ensuring that there is sufficient path information added to the | responsible for ensuring that there is sufficient path information | |||
Path message to carry it at least to the next domain boundary (that | added to the Path message to carry it at least to the next domain | |||
is, out of the new domain). | boundary (that is, out of the new domain). | |||
If the LSR at the domain boundary has full visibility to the egress | If the LSR at the domain boundary has full visibility to the egress | |||
then it can supply the entire explicit path. Note however, that the | then it can supply the entire explicit path. Note, however, that the | |||
ERO processing rules of [RFC3209] state that it should only update | ERO processing rules of [RFC3209] state that it should only update | |||
the ERO as far as the next specified hop (that is, the next domain | the ERO as far as the next specified hop (that is, the next domain | |||
boundary if one was supplied in the original ERO) and, of course, | boundary if one was supplied in the original ERO) and, of course, | |||
must not insert ERO subobjects immediately before a strict hop. | must not insert ERO subobjects immediately before a strict hop. | |||
If the LSR at the domain boundary has only partial visibility (using | If the LSR at the domain boundary has only partial visibility (using | |||
the definitions of section 3.2.2) it will fill in the path as far as | the definitions of section 3.2.2), it will fill in the path as far as | |||
the next domain boundary, and will supply further domain/domain | the next domain boundary, and will supply further domain/domain | |||
boundary information if not already present in the ERO. | boundary information if not already present in the ERO. | |||
If the LSR at the domain boundary has only local visibility into the | If the LSR at the domain boundary has only local visibility into the | |||
immediate domain it will simply add information to the ERO to carry | immediate domain, it will simply add information to the ERO to carry | |||
the Path message as far as the next domain boundary. | the Path message as far as the next domain boundary. | |||
Domain boundary path computations are performed independently from | Domain boundary path computations are performed independently from | |||
each other. Domain boundary LSRs may have different computation | each other. Domain boundary LSRs may have different computation | |||
capabilities, run different path computation algorithms, apply | capabilities, run different path computation algorithms, apply | |||
different sets of constraints and optimization criteria, and so | different sets of constraints and optimization criteria, and so | |||
forth, which might result in path segment quality which is | forth, which might result in path segment quality that is | |||
unpredictable to and out of the control of the ingress LSR. A | unpredictable to and out of the control of the ingress LSR. A | |||
solution to this issue lies in enhancing the information signaled | solution to this issue lies in enhancing the information signaled | |||
during LSP setup to include a larger set of constraints and to | during LSP setup to include a larger set of constraints and to | |||
include the paths of related LSPs (such as diverse protected LSPs) | include the paths of related LSPs (such as diverse protected LSPs) as | |||
as described in [GMPLS-E2E]. | described in [GMPLS-E2E]. | |||
It is also the case that paths generated on domain boundaries may | It is also the case that paths generated on domain boundaries may | |||
produce loops. Specifically, the paths computed may loop back into a | produce loops. Specifically, the paths computed may loop back into a | |||
domain that has already been crossed by the LSP. This may, or may not | domain that has already been crossed by the LSP. This may or may not | |||
be a problem, and might even be desirable, but could also give rise | be a problem, and might even be desirable, but could also give rise | |||
to real loops. This can be avoided by using the recorded route (RRO) | to real loops. This can be avoided by using the recorded route (RRO) | |||
to provide exclusions within the path computation algorithm, but in | to provide exclusions within the path computation algorithm, but in | |||
the case of lack of trust between domains it may be necessary for the | the case of lack of trust between domains it may be necessary for the | |||
RRO to indicate the previously visited domains. Even this solution is | RRO to indicate the previously visited domains. Even this solution | |||
not available where the RRO is not available on a Path message. Note | is not available where the RRO is not available on a Path message. | |||
that when an RRO is used to provide exclusions, and a loop-free path | Note that when an RRO is used to provide exclusions, and a loop-free | |||
is found to be not available by the computation at a downstream | path is found to be not available by the computation at a downstream | |||
border node, crankback [CRANKBACK] may enable an upstream border node | border node, crankback [CRANKBACK] may enable an upstream border node | |||
to select an alternate path. | to select an alternate path. | |||
3.4. Path Computation Element | 3.4. Path Computation Element | |||
The computation techniques in sections 3.2 and 3.3 rely on topology | The computation techniques in sections 3.2 and 3.3 rely on topology | |||
and TE information being distributed to the ingress LSR and those | and TE information being distributed to the ingress LSR and those | |||
LSRs at domain boundaries. These LSRs are responsible for computing | LSRs at domain boundaries. These LSRs are responsible for computing | |||
paths. Note that there may be scaling concerns with distributing the | paths. Note that there may be scaling concerns with distributing the | |||
required information - see section 4. | required information; see section 4. | |||
An alternative technique places the responsibility for path | An alternative technique places the responsibility for path | |||
computation with a Path Computation Element (PCE) [PCE]. There may be | computation with a Path Computation Element (PCE) [RFC4655]. There | |||
either a centralized PCE, or multiple PCEs (each having local | may be either a centralized PCE, or multiple PCEs (each having local | |||
visibility and collaborating in a distributed fashion to compute an | visibility and collaborating in a distributed fashion to compute an | |||
end-to-end path) across the entire network and even within any one | end-to-end path) across the entire network and even within any one | |||
domain. The PCE may collect topology and TE information from the same | domain. The PCE may collect topology and TE information from the | |||
sources as would be used by LSRs in the previous paragraph, or though | same sources as would be used by LSRs in the previous paragraph, or | |||
other means. | though other means. | |||
Each LSR called upon to perform path computation (and even the | Each LSR called upon to perform path computation (and even the | |||
offline management tools described in section 3.1) may abdicate the | offline management tools described in section 3.1) may abdicate the | |||
task to a PCE of its choice. The selection of PCE(s) may be driven by | task to a PCE of its choice. The selection of PCE(s) may be driven | |||
static configuration or the dynamic discovery. | by static configuration or the dynamic discovery. | |||
3.4.1. Multi-Domain Visibility Computation | 3.4.1. Multi-Domain Visibility Computation | |||
A PCE may have full visibility, perhaps through connectivity to | A PCE may have full visibility, perhaps through connectivity to | |||
multiple domains. In this case it is able to supply a full explicit | multiple domains. In this case, it is able to supply a full explicit | |||
path as in section 3.2.1. | path as in section 3.2.1. | |||
3.4.2. Path Computation Use of PCE When Preserving Confidentiality | 3.4.2. Path Computation Use of PCE When Preserving Confidentiality | |||
Note that although a centralized PCE or multiple collaborative PCEs | Note that although a centralized PCE or multiple collaborative PCEs | |||
may have full visibility into one or more domains, it may be | may have full visibility into one or more domains, it may be | |||
desirable (e.g. to preserve topology confidentiality) that the full | desirable (e.g., to preserve topology confidentiality) that the full | |||
path is not provided to the ingress LSR. Instead, a partial path is | path not be provided to the ingress LSR. Instead, a partial path is | |||
supplied (as in section 3.2.2 or 3.2.3) and the LSRs at each domain | supplied (as in section 3.2.2 or 3.2.3), and the LSRs at each domain | |||
boundary are required to make further requests for each successive | boundary are required to make further requests for each successive | |||
segment of the path. | segment of the path. | |||
In this way an end-to-end path may be computed using the full network | In this way, an end-to-end path may be computed using the full | |||
capabilities, but confidentiality between domains may be preserved. | network capabilities, but confidentiality between domains may be | |||
Optionally, the PCE(s) may compute the entire path at the first | preserved. Optionally, the PCE(s) may compute the entire path at the | |||
request and hold it in storage for subsequent requests, or it may | first request and hold it in storage for subsequent requests, or it | |||
recompute each leg of the path on each request or at regular | may recompute each leg of the path on each request or at regular | |||
intervals until requested by the LSRs establishing the LSP. | intervals until requested by the LSRs establishing the LSP. | |||
It may be the case that the centralized PCE or the collaboration | It may be the case that the centralized PCE or the collaboration | |||
between PCEs may define a trust relationship greater than that | between PCEs may define a trust relationship greater than that | |||
normally operational between domains. | normally operational between domains. | |||
3.4.3. Per-Domain Computation Elements | 3.4.3. Per-Domain Computation Elements | |||
A third way that PCEs may be used is simply to have one (or more) per | A third way that PCEs may be used is simply to have one (or more) per | |||
domain. Each LSR within a domain that wishes to derive a path across | domain. Each LSR within a domain that wishes to derive a path across | |||
skipping to change at line 479 | skipping to change at page 11, line 14 | |||
This mechanism could be used for all path computations within the | This mechanism could be used for all path computations within the | |||
domain, or specifically limited to computations for LSPs that will | domain, or specifically limited to computations for LSPs that will | |||
leave the domain where external connectivity information can then be | leave the domain where external connectivity information can then be | |||
restricted to just the PCE. | restricted to just the PCE. | |||
3.5. Optimal Path Computation | 3.5. Optimal Path Computation | |||
There are many definitions of an optimal path depending on the | There are many definitions of an optimal path depending on the | |||
constraints applied to the path computation. In a multi-domain | constraints applied to the path computation. In a multi-domain | |||
environment the definitions are multiplied so that an optimal route | environment, the definitions are multiplied so that an optimal route | |||
might be defined as the route that would be computed in the absence | might be defined as the route that would be computed in the absence | |||
of domain boundaries. Alternatively, another constraint might be | of domain boundaries. Alternatively, another constraint might be | |||
applied to the path computation to reduce or limit the number of | applied to the path computation to reduce or limit the number of | |||
domains crossed by the LSP. | domains crossed by the LSP. | |||
It is easy to construct examples that show that partitioning a | It is easy to construct examples that show that partitioning a | |||
network into domains, and the resulting loss or aggregation of | network into domains, and the resulting loss or aggregation of | |||
routing information may lead to the computation of routes that are | routing information may lead to the computation of routes that are | |||
other than optimal. It is impossible to guarantee optimal routing in | other than optimal. It is impossible to guarantee optimal routing in | |||
the presence of aggregation / abstraction / summarization of routing | the presence of aggregation / abstraction / summarization of routing | |||
information. | information. | |||
It is beyond the scope of this document to define what is an optimum | It is beyond the scope of this document to define what is an optimum | |||
path for an inter-domain TE LSP. This debate is abdicated in favor of | path for an inter-domain TE LSP. This debate is abdicated in favor | |||
requirements documents and applicability statements for specific | of requirements documents and applicability statements for specific | |||
deployment scenarios. Note, however, that the meaning of certain | deployment scenarios. Note, however, that the meaning of certain | |||
computation metrics may differ between domains (see section 5.6). | computation metrics may differ between domains (see section 5.6). | |||
4. Distributing Reachability and TE Information | 4. Distributing Reachability and TE Information | |||
Traffic Engineering information is collected into a TE Database (TED) | Traffic Engineering information is collected into a TE Database (TED) | |||
on which path computation algorithms operate either directly or by | on which path computation algorithms operate either directly or by | |||
first constructing a network graph. | first constructing a network graph. | |||
The path computation techniques described in the previous section | The path computation techniques described in the previous section | |||
skipping to change at line 520 | skipping to change at page 12, line 6 | |||
to IGPs [RFC3630], [RFC3784]. | to IGPs [RFC3630], [RFC3784]. | |||
In cases where two domains are interconnected by one or more links | In cases where two domains are interconnected by one or more links | |||
(that is, the domain boundary falls on a link rather than on a node), | (that is, the domain boundary falls on a link rather than on a node), | |||
there should be a mechanism to distribute the TE information | there should be a mechanism to distribute the TE information | |||
associated with the inter-domain links to the corresponding domains. | associated with the inter-domain links to the corresponding domains. | |||
This would facilitate better path computation and reduce TE-related | This would facilitate better path computation and reduce TE-related | |||
crankbacks on these links. | crankbacks on these links. | |||
Where a domain is a subset of an IGP area, filtering of TE | Where a domain is a subset of an IGP area, filtering of TE | |||
information may be applied at the domain boundary. This filtering may | information may be applied at the domain boundary. This filtering | |||
be one way, or two way. | may be one way or two way. | |||
Where information needs to reach a PCE that spans multiple domains, | Where information needs to reach a PCE that spans multiple domains, | |||
the PCE may snoop on the IGP traffic in each domain, or play an | the PCE may snoop on the IGP traffic in each domain, or play an | |||
active part as an IGP-capable node in each domain. The PCE might also | active part as an IGP-capable node in each domain. The PCE might | |||
receive TED updates from a proxy within the domain. | also receive TED updates from a proxy within the domain. | |||
It could be possible that an LSR that performs path computation (for | It is possible that an LSR that performs path computation (for | |||
example, an ingress LSR) obtains the topology and TE information of | example, an ingress LSR) obtains the topology and TE information of | |||
not just its own domain, but other domains as well. This information | not just its own domain, but other domains as well. This information | |||
may be subject to filtering applied by the advertising domain (for | may be subject to filtering applied by the advertising domain (for | |||
example, the information may be limited to Forwarding Adjacencies | example, the information may be limited to Forwarding Adjacencies | |||
(FAs) across other domains, or the information may be aggregated or | (FAs) across other domains, or the information may be aggregated or | |||
abstracted). | abstracted). | |||
Before starting work on any protocols or protocol extensions to | Before starting work on any protocols or protocol extensions to | |||
enable cross-domain reachability and TE advertisement in support of | enable cross-domain reachability and TE advertisement in support of | |||
inter-domain TE, the requirements and benefits must be clearly | inter-domain TE, the requirements and benefits must be clearly | |||
skipping to change at line 557 | skipping to change at page 12, line 43 | |||
extreme caution and compared carefully with the scaling requirements | extreme caution and compared carefully with the scaling requirements | |||
expressed in [RFC4105] and [RFC4216]. | expressed in [RFC4105] and [RFC4216]. | |||
5. Comments on Advanced Functions | 5. Comments on Advanced Functions | |||
This section provides some non-definitive comments on the constraints | This section provides some non-definitive comments on the constraints | |||
placed on advanced MPLS TE functions by inter-domain MPLS. It does | placed on advanced MPLS TE functions by inter-domain MPLS. It does | |||
not attempt to state the implications of using one inter-domain | not attempt to state the implications of using one inter-domain | |||
technique or another. Such material is deferred to appropriate | technique or another. Such material is deferred to appropriate | |||
applicability statements where statements about the capabilities of | applicability statements where statements about the capabilities of | |||
existing or future signaling, routing and computation techniques to | existing or future signaling, routing, and computation techniques to | |||
deliver the functions listed should be made. | deliver the functions listed should be made. | |||
5.1. LSP Re-Optimization | 5.1. LSP Re-Optimization | |||
Re-optimization is the process of moving a TE LSP from one path to | Re-optimization is the process of moving a TE LSP from one path to | |||
another, more preferable path (where no attempt is made in this | another, more preferable path (where no attempt is made in this | |||
document to define "preferable" as no attempt was made to define | document to define "preferable" as no attempt was made to define | |||
"optimal"). Make-before-break techniques are usually applied to | "optimal"). Make-before-break techniques are usually applied to | |||
ensure that traffic is disrupted as little as possible. The Shared | ensure that traffic is disrupted as little as possible. The Shared | |||
Explicit style is usually used to avoid double booking of network | Explicit style is usually used to avoid double booking of network | |||
skipping to change at line 581 | skipping to change at page 13, line 18 | |||
Alternatively, re-optimization may involve a change in route across | Alternatively, re-optimization may involve a change in route across | |||
several domains or might involve a choice of different transit | several domains or might involve a choice of different transit | |||
domains. | domains. | |||
Re-optimization requires that all or part of the path of the LSP be | Re-optimization requires that all or part of the path of the LSP be | |||
re-computed. The techniques used may be selected as described in | re-computed. The techniques used may be selected as described in | |||
section 3, and this will influence whether the whole or part of the | section 3, and this will influence whether the whole or part of the | |||
path is re-optimized. | path is re-optimized. | |||
The trigger for path computation and re-optimization may be an | The trigger for path computation and re-optimization may be an | |||
operator request, a timer, information about a change in | operator request, a timer, information about a change in availability | |||
availability of network resources, or a change in operational | of network resources, or a change in operational parameters (for | |||
parameters (for example bandwidth) of an LSP. This trigger must be | example, bandwidth) of an LSP. This trigger must be applied to the | |||
applied to the point in the network that requests re-computation and | point in the network that requests re-computation and controls re- | |||
controls re-optimization and may require additional signaling. | optimization and may require additional signaling. | |||
Note also that where multiple mutually-diverse paths are applied | Note also that where multiple mutually-diverse paths are applied | |||
end-to-end (i.e. not simply within protection domains - see section | end-to-end (i.e., not simply within protection domains; see section | |||
5.5) the point of calculation for re-optimization (whether it is PCE, | 5.5) the point of calculation for re-optimization (whether it is PCE, | |||
ingress, or domain entry point) needs to know all such paths before | ingress, or domain entry point) needs to know all such paths before | |||
attempting re-optimization of any one path. Mutual diversity here | attempting re-optimization of any one path. Mutual diversity here | |||
means that a set of computed paths have no commonality. Such | means that a set of computed paths has no commonality. Such | |||
diversity might be link, node, Shared Risk Link Group (SRLG) or even | diversity might be link, node, Shared Risk Link Group (SRLG), or even | |||
domain disjointedness according to circumstances and the service | domain disjointedness according to circumstances and the service | |||
being delivered. | being delivered. | |||
It may be the case that re-optimization is best achieved by | It may be the case that re-optimization is best achieved by | |||
recomputing the paths of multiple LSPs at once. Indeed, this can be | recomputing the paths of multiple LSPs at once. Indeed, this can be | |||
shown to be most efficient when the paths of all LSPs are known, not | shown to be most efficient when the paths of all LSPs are known, not | |||
simply those LSPs that originate at a particular ingress. While this | simply those LSPs that originate at a particular ingress. While this | |||
problem is inherited from single domain re-optimization and is out of | problem is inherited from single domain re-optimization and is out of | |||
scope within this document, it should be noted that the problem grows | scope within this document, it should be noted that the problem grows | |||
in complexity when LSPs wholly within one domain affect the | in complexity when LSPs wholly within one domain affect the re- | |||
re-optimization path calculations performed in another domain. | optimization path calculations performed in another domain. | |||
5.2. LSP Setup Failure | 5.2. LSP Setup Failure | |||
When an inter-domain LSP setup fails in some domain other than the | When an inter-domain LSP setup fails in some domain other than the | |||
first, various options are available for reporting and retrying the | first, various options are available for reporting and retrying the | |||
LSP. | LSP. | |||
In the first instance, a retry may be attempted within the domain | In the first instance, a retry may be attempted within the domain | |||
that contains the failure. That retry may be attempted by nodes | that contains the failure. That retry may be attempted by nodes | |||
wholly within the domain, or the failure may be referred back to the | wholly within the domain, or the failure may be referred back to the | |||
skipping to change at line 651 | skipping to change at page 14, line 44 | |||
that for re-optimization, or for handling setup failures (see | that for re-optimization, or for handling setup failures (see | |||
previous two sections). Fast Reroute may also be used (see below). | previous two sections). Fast Reroute may also be used (see below). | |||
5.4. Fast Reroute | 5.4. Fast Reroute | |||
MPLS Traffic Engineering Fast Reroute ([RFC4090]) defines local | MPLS Traffic Engineering Fast Reroute ([RFC4090]) defines local | |||
protection schemes intended to provide fast recovery (in 10s of | protection schemes intended to provide fast recovery (in 10s of | |||
msecs) of fast-reroutable packet-based TE LSPs upon link/SRLG/Node | msecs) of fast-reroutable packet-based TE LSPs upon link/SRLG/Node | |||
failure. A backup TE LSP is configured and signaled at each hop, and | failure. A backup TE LSP is configured and signaled at each hop, and | |||
activated upon detecting or being informed of a network element | activated upon detecting or being informed of a network element | |||
failure. The node immediately upstream of the failure (called the PLR | failure. The node immediately upstream of the failure (called the | |||
- Point of Local Repair) reroutes the set of protected TE LSPs onto | PLR, or Point of Local Repair) reroutes the set of protected TE LSPs | |||
the appropriate backup tunnel(s) and around the failed resource. | onto the appropriate backup tunnel(s) and around the failed resource. | |||
In the context of inter-domain TE, there are several different | In the context of inter-domain TE, there are several different | |||
failure scenarios that must be analyzed. Provision of suitable | failure scenarios that must be analyzed. Provision of suitable | |||
solutions may be further complicated by the fact that [RFC4090] | solutions may be further complicated by the fact that [RFC4090] | |||
specifies two distinct modes of operation referred to as the "one to | specifies two distinct modes of operation referred to as the "one to | |||
one mode" and the "facility back-up mode". | one mode" and the "facility back-up mode". | |||
The failure scenarios specific to inter-domain TE are as follows: | The failure scenarios specific to inter-domain TE are as follows: | |||
- Failure of a domain edge node that is present in both domains. | - Failure of a domain edge node that is present in both domains. | |||
There are two sub-cases: | There are two sub-cases: | |||
- The Point of Local Repair (PLR) and the Merge Point (MP) are in | - The Point of Local Repair (PLR) and the Merge Point (MP) are in | |||
the same domain | the same domain. | |||
- The PLR and the MP are in different domains. | - The PLR and the MP are in different domains. | |||
- Failure of a domain edge node that is only present in one of the | - Failure of a domain edge node that is only present in one of the | |||
domains. | domains. | |||
- Failure of an inter-domain link. | - Failure of an inter-domain link. | |||
Although it may be possible to apply the same techniques for FRR to | Although it may be possible to apply the same techniques for Fast | |||
the different methods of signaling inter-domain LSPs described in | Reroute (FRR) to the different methods of signaling inter-domain LSPs | |||
section 2, the results of protection may be different when it is the | described in section 2, the results of protection may be different | |||
boundary nodes that need to be protected, and when they are the | when it is the boundary nodes that need to be protected, and when | |||
ingress and egress of a hierarchical LSP or stitched LSP segment. In | they are the ingress and egress of a hierarchical LSP or stitched LSP | |||
particular, the choice of PLR and MP may be different, and the length | segment. In particular, the choice of PLR and MP may be different, | |||
of the protection path may be greater. These use of FRR techniques | and the length of the protection path may be greater. These uses of | |||
should be explained further in applicability statements or, in the | FRR techniques should be explained further in applicability | |||
case of a change in base behavior, in implementation guidelines | statements or, in the case of a change in base behavior, in | |||
specific to the signaling techniques. | implementation guidelines specific to the signaling techniques. | |||
Note that after local repair has been performed, it may be desirable | Note that after local repair has been performed, it may be desirable | |||
to re-optimize the LSP (see section 5.1). If the point of | to re-optimize the LSP (see section 5.1). If the point of re- | |||
re-optimization (for example the ingress LSR) lies in a different | optimization (for example, the ingress LSR) lies in a different | |||
domain to the failure, it may rely on the delivery of a PathErr or | domain to the failure, it may rely on the delivery of a PathErr or | |||
Notify message to inform it of the local repair event. | Notify message to inform it of the local repair event. | |||
It is important to note that Fast Reroute techniques are only | It is important to note that Fast Reroute techniques are only | |||
applicable to packet switching networks because other network | applicable to packet switching networks because other network | |||
technologies cannot apply label stacking within the same switching | technologies cannot apply label stacking within the same switching | |||
type. Segment protection [SEG-PROT] provides a suitable alternative | type. Segment protection [GMPLS-SEG] provides a suitable alternative | |||
that is applicable to packet and non-packet networks. | that is applicable to packet and non-packet networks. | |||
5.5. Comments on Path Diversity | 5.5. Comments on Path Diversity | |||
Diverse paths may be required in support of load sharing and/or | Diverse paths may be required in support of load sharing and/or | |||
protection. Such diverse paths may be required to be node diverse, | protection. Such diverse paths may be required to be node diverse, | |||
link diverse, fully path diverse (that is, link and node diverse), or | link diverse, fully path diverse (that is, link and node diverse), or | |||
SRLG diverse. | SRLG diverse. | |||
Diverse path computation is a classic problem familiar to all graph | Diverse path computation is a classic problem familiar to all graph | |||
theory majors. The problem is compounded when there are areas of | theory majors. The problem is compounded when there are areas of | |||
"private knowledge" such as when domains do not share topology | "private knowledge" such as when domains do not share topology | |||
information. The problem can be resolved more efficiently (e.g. | information. The problem can be resolved more efficiently (e.g., | |||
avoiding the "trap problem") when mutually resource disjoint paths | avoiding the "trap problem") when mutually resource disjoint paths | |||
can be computed "simultaneously" on the fullest set of information. | can be computed "simultaneously" on the fullest set of information. | |||
That being said, various techniques (out of the scope of this | That being said, various techniques (out of the scope of this | |||
document) exist to ensure end-to-end path diversity across multiple | document) exist to ensure end-to-end path diversity across multiple | |||
domains. | domains. | |||
Many network technologies utilize "protection domains" because they | Many network technologies utilize "protection domains" because they | |||
fit well with the capabilities of the technology. As a result, many | fit well with the capabilities of the technology. As a result, many | |||
domains are operated as protection domains. In this model, protection | domains are operated as protection domains. In this model, | |||
paths converge at domain boundaries. | protection paths converge at domain boundaries. | |||
Note that the question of SRLG identification is not yet fully | Note that the question of SRLG identification is not yet fully | |||
answered. There are two classes of SRLG: | answered. There are two classes of SRLG: | |||
- those that indicate resources that are all contained within one | - those that indicate resources that are all contained within one | |||
domain | domain | |||
- those that span domains. | - those that span domains. | |||
The former might be identified using a combination of a globally | The former might be identified using a combination of a globally | |||
skipping to change at line 743 | skipping to change at page 16, line 38 | |||
therefore, require external administration. The former is able to | therefore, require external administration. The former is able to | |||
leverage existing domain ID administration (for example, area and AS | leverage existing domain ID administration (for example, area and AS | |||
numbers), but the latter would require a new administrative policy. | numbers), but the latter would require a new administrative policy. | |||
5.6. Domain-Specific Constraints | 5.6. Domain-Specific Constraints | |||
While the meaning of certain constraints, like bandwidth, can be | While the meaning of certain constraints, like bandwidth, can be | |||
assumed to be constant across different domains, other TE constraints | assumed to be constant across different domains, other TE constraints | |||
(such as resource affinity, color, metric, priority, etc.) may have | (such as resource affinity, color, metric, priority, etc.) may have | |||
different meanings in different domains and this may impact the | different meanings in different domains and this may impact the | |||
ability to support DiffServ-aware MPLS, or to manage pre-emption. | ability to support Diffserv-aware MPLS, or to manage preemption. | |||
In order to achieve consistent meaning and LSP establishment, this | In order to achieve consistent meaning and LSP establishment, this | |||
fact must be considered when performing constraint-based path | fact must be considered when performing constraint-based path | |||
computation or when signaling across domain boundaries. | computation or when signaling across domain boundaries. | |||
A mapping function can be derived for most constraints based on | A mapping function can be derived for most constraints based on | |||
policy agreements between the Domain administrators. The details of | policy agreements between the domain administrators. The details of | |||
such a mapping function are outside the scope of this document, but | such a mapping function are outside the scope of this document, but | |||
it is important to note that the default behavior must either be | it is important to note that the default behavior must either be that | |||
that a constant mapping is applied or that any requirement to apply | a constant mapping is applied or that any requirement to apply these | |||
these constraints across a domain boundary must fail in the absence | constraints across a domain boundary must fail in the absence of | |||
of explicit mapping rules. | explicit mapping rules. | |||
5.7. Policy Control | 5.7. Policy Control | |||
Domain boundaries are natural points for policy control. There is | Domain boundaries are natural points for policy control. There is | |||
little to add on this subject except to note that a TE LSP that | little to add on this subject except to note that a TE LSP that | |||
cannot be established on a path through one domain because of a | cannot be established on a path through one domain because of a | |||
policy applied at the domain boundary, may be satisfactorily | policy applied at the domain boundary may be satisfactorily | |||
established using a path that avoids the demurring domain. In any | established using a path that avoids the demurring domain. In any | |||
case, when a TE LSP signaling attempt is rejected due to | case, when a TE LSP signaling attempt is rejected due to non- | |||
non-compliance with some policy constraint, this should be reflected | compliance with some policy constraint, this should be reflected to | |||
to the ingress LSR. | the ingress LSR. | |||
5.8. Inter-domain Operations and Management (OAM) | 5.8. Inter-Domain Operations and Management (OAM) | |||
Some elements of OAM may be intentionally confined within a domain. | Some elements of OAM may be intentionally confined within a domain. | |||
Others (such as end-to-end liveness and connectivity testing) clearly | Others (such as end-to-end liveness and connectivity testing) clearly | |||
need to span the entire multi-domain TE LSP. Where issues of | need to span the entire multi-domain TE LSP. Where issues of | |||
topology confidentiality are strong, collaboration between PCEs or | topology confidentiality are strong, collaboration between PCEs or | |||
domain boundary nodes might be required in order to provide | domain boundary nodes might be required in order to provide end-to- | |||
end-to-end OAM, and a significant issue to be resolved is to ensure | end OAM, and a significant issue to be resolved is to ensure that the | |||
that the end-points support the various OAM capabilities. | end-points support the various OAM capabilities. | |||
The different signaling mechanisms described above may need | The different signaling mechanisms described above may need | |||
refinements to [RFC4379], and [BFD-MPLS], etc., to gain full | refinements to [RFC4379], [BFD-MPLS], etc., to gain full end-to-end | |||
end-to-end visibility. These protocols should, however, be considered | visibility. These protocols should, however, be considered in the | |||
in the light of topology confidentiality requirements. | light of topology confidentiality requirements. | |||
Route recording is a commonly used feature of signaling that provides | Route recording is a commonly used feature of signaling that provides | |||
OAM information about the path of an established LSP. When an LSP | OAM information about the path of an established LSP. When an LSP | |||
traverses a domain boundary, the border node may remove or aggregate | traverses a domain boundary, the border node may remove or aggregate | |||
some of the recorded information for topology confidentiality or | some of the recorded information for topology confidentiality or | |||
other policy reasons. | other policy reasons. | |||
5.9. Point-to-Multipoint | 5.9. Point-to-Multipoint | |||
Inter-domain point-to-multipoint (P2MP) requirements are explicitly | Inter-domain point-to-multipoint (P2MP) requirements are explicitly | |||
out of scope of this document. They may be covered by other documents | out of the scope of this document. They may be covered by other | |||
dependent on the details of MPLS TE P2MP solutions. | documents dependent on the details of MPLS TE P2MP solutions. | |||
5.10. Applicability to Non-Packet Technologies | 5.10. Applicability to Non-Packet Technologies | |||
Non-packet switching technologies may present particular issues for | Non-packet switching technologies may present particular issues for | |||
inter-domain LSPs. While packet switching networks may utilize | inter-domain LSPs. While packet switching networks may utilize | |||
control planes built on MPLS or GMPLS technology, non-packet networks | control planes built on MPLS or GMPLS technology, non-packet networks | |||
are limited to GMPLS. | are limited to GMPLS. | |||
On the other hand, some problems such as Fast Re-Route on domain | On the other hand, some problems such as Fast Reroute on domain | |||
boundaries (see section 5.4) may be handled by the GMPLS technique of | boundaries (see section 5.4) may be handled by the GMPLS technique of | |||
segment protection [GMPLS-SEG] that is applicable to both packet and | segment protection [GMPLS-SEG] that is applicable to both packet and | |||
non-packet switching technologies. | non-packet switching technologies. | |||
The specific architectural considerations and requirements for | The specific architectural considerations and requirements for | |||
inter-domain LSP setup in non-packet networks are covered in a | inter-domain LSP setup in non-packet networks are covered in a | |||
separate document [GMPLS-AS]. | separate document [GMPLS-AS]. | |||
6. Security Considerations | 6. Security Considerations | |||
Requirements for security within domains are unchanged from [RFC3209] | Requirements for security within domains are unchanged from [RFC3209] | |||
and [RFC3473], and from [RFC3630] and [RFC3784]. That is, all | and [RFC3473], and from [RFC3630] and [RFC3784]. That is, all | |||
security procedures for existing protocols in the MPLS context | security procedures for existing protocols in the MPLS context | |||
continue to apply for the intra-domain cases. | continue to apply for the intra-domain cases. | |||
Inter-domain security may be considered as a more important and more | Inter-domain security may be considered as a more important and more | |||
sensitive issue than intra-domain security since in inter-domain | sensitive issue than intra-domain security since in inter-domain | |||
traffic engineering control and information may be passed across | traffic engineering control and information may be passed across | |||
administrative boundaries. The most obvious, and most sensitive case | administrative boundaries. The most obvious and most sensitive case | |||
is inter-AS TE. | is inter-AS TE. | |||
All of the intra-domain security measures for the signaling and | All of the intra-domain security measures for the signaling and | |||
routing protocols are equally applicable in the inter-domain case. | routing protocols are equally applicable in the inter-domain case. | |||
There is, however, a greater likelihood of them being applied in the | There is, however, a greater likelihood of them being applied in the | |||
inter-domain case. | inter-domain case. | |||
Security for inter-domain MPLS TE is the subject of a separate | Security for inter-domain MPLS TE is the subject of a separate | |||
document that analyses the security deployment models and risks. This | document that analyzes the security deployment models and risks. | |||
separate document must be completed before inter-domain MPLS TE | This separate document must be completed before inter-domain MPLS TE | |||
solution documents can be advanced. | solution documents can be advanced. | |||
Similarly, the PCE procedures [PCE] are subject to security measures | Similarly, the PCE procedures [RFC4655] are subject to security | |||
for the exchange computation information between PCEs, and for LSRs | measures for the exchange computation information between PCEs and | |||
that request path computations from a PCE. The requirements for this | for LSRs that request path computations from a PCE. The requirements | |||
security (set out in [PCE-REQ]) apply whether the LSR and PCE (or the | for this security (set out in [RFC4657]) apply whether the LSR and | |||
cooperating PCEs) are in the same domain or lie across domain | PCE (or the cooperating PCEs) are in the same domain or lie across | |||
boundaries. | domain boundaries. | |||
It should be noted, however, that techniques used for (for example) | It should be noted, however, that techniques used for (for example) | |||
authentication require coordination of secrets, keys, or passwords | authentication require coordination of secrets, keys, or passwords | |||
between sender and receiver. Where sender and receiver lie within a | between sender and receiver. Where sender and receiver lie within a | |||
single administrative domain, this process may be simple. But where | single administrative domain, this process may be simple. But where | |||
sender and receiver lie in different administrative domains, | sender and receiver lie in different administrative domains, cross- | |||
cross-domain coordination between network administrators will be | domain coordination between network administrators will be required | |||
required in order to provide adequate security. At this stage, it is | in order to provide adequate security. At this stage, it is not | |||
not proposed that this coordination be provided through an automatic | proposed that this coordination be provided through an automatic | |||
process nor through the use of a protocol. Human-to-human | process or through the use of a protocol. Human-to-human | |||
coordination is more likely to provide the required level of | coordination is more likely to provide the required level of | |||
confidence in the inter-domain security. | confidence in the inter-domain security. | |||
One new security concept is introduced by inter-domain MPLS TE. This | One new security concept is introduced by inter-domain MPLS TE. This | |||
is the preservation of confidentiality of topology information. That | is the preservation of confidentiality of topology information. That | |||
is, one domain may wish to keep secret the way that its network is | is, one domain may wish to keep secret the way that its network is | |||
constructed and the availability (or otherwise) of end-to-end network | constructed and the availability (or otherwise) of end-to-end network | |||
resources. This issue is discussed in sections 3.4.2, 5.2, and 5.8 of | resources. This issue is discussed in sections 3.4.2, 5.2, and 5.8 | |||
this document. When there is a requirement to preserve inter-domain | of this document. When there is a requirement to preserve inter- | |||
topology confidentiality, policy filters must be applied at the | domain topology confidentiality, policy filters must be applied at | |||
domain boundaries to avoid distributing such information. This is the | the domain boundaries to avoid distributing such information. This | |||
responsibility of the domain that distributes information, and may be | is the responsibility of the domain that distributes information, and | |||
adequately addressed by aggregation of information as described in | it may be adequately addressed by aggregation of information as | |||
the referenced sections. | described in the referenced sections. | |||
Applicability statements for particular combinations of signaling, | Applicability statements for particular combinations of signaling, | |||
routing, and path computation techniques to provide inter-domain MPLS | routing, and path computation techniques to provide inter-domain MPLS | |||
TE solutions are expected to contain detailed security sections. | TE solutions are expected to contain detailed security sections. | |||
7. IANA Considerations | 7. Acknowledgements | |||
This document makes no requests for any IANA action. | ||||
8. Acknowledgements | ||||
The authors would like to extend their warmest thanks to Kireeti | The authors would like to extend their warmest thanks to Kireeti | |||
Kompella for convincing them to expend effort on this document. | Kompella for convincing them to expend effort on this document. | |||
Grateful thanks to Dimitri Papadimitriou, Tomohiro Otani and Igor | Grateful thanks to Dimitri Papadimitriou, Tomohiro Otani, and Igor | |||
Bryskin for their review and suggestions on the text. | Bryskin for their review and suggestions on the text. | |||
Thanks to Jari Arkko, Gonzalo Camarillo, Brian Carpenter, | Thanks to Jari Arkko, Gonzalo Camarillo, Brian Carpenter, Lisa | |||
Lisa Dusseault, Sam Hartman, Russ Housley, and Dan Romascanu for | Dusseault, Sam Hartman, Russ Housley, and Dan Romascanu for final | |||
final review of the text. | review of the text. | |||
9. Intellectual Property Considerations | ||||
The IETF takes no position regarding the validity or scope of any | ||||
Intellectual Property Rights or other rights that might be claimed to | ||||
pertain to the implementation or use of the technology described in | ||||
this document or the extent to which any license under such rights | ||||
might or might not be available; nor does it represent that it has | ||||
made any independent effort to identify any such rights. Information | ||||
on the procedures with respect to rights in RFC documents can be | ||||
found in BCP 78 and BCP 79. | ||||
Copies of IPR disclosures made to the IETF Secretariat and any | ||||
assurances of licenses to be made available, or the result of an | ||||
attempt made to obtain a general license or permission for the use of | ||||
such proprietary rights by implementers or users of this | ||||
specification can be obtained from the IETF on-line IPR repository at | ||||
http://www.ietf.org/ipr. | ||||
The IETF invites any interested party to bring to its attention any | ||||
copyrights, patents or patent applications, or other proprietary | ||||
rights that may cover technology that may be required to implement | ||||
this standard. Please address the information to the IETF at | ||||
ietf-ipr@ietf.org. | ||||
10. Normative References | 8. Normative References | |||
[RFC3031] Rosen, E., Viswanathan, A. and R. Callon, | [RFC3031] Rosen, E., Viswanathan, A., and R. Callon, | |||
"Multiprotocol Label Switching Architecture", RFC 3031, | "Multiprotocol Label Switching Architecture", RFC 3031, | |||
January 2001. | January 2001. | |||
[RFC3209] Awduche, et al, "Extensions to RSVP for LSP Tunnels", | [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, | |||
RFC 3209, December 2001. | V., and G. Swallow, "RSVP-TE: Extensions to RSVP for | |||
LSP Tunnels", RFC 3209, December 2001. | ||||
[RFC3473] Berger, L., Editor "Generalized Multi-Protocol Label | ||||
Switching (GMPLS) Signaling - Resource ReserVation | ||||
Protocol-Traffic Engineering (RSVP-TE) Extensions", | ||||
RFC 3473, January 2003. | ||||
[RFC3667] Bradner, S., "IETF Rights in Contributions", BCP 78, | ||||
RFC 3667, February 2004. | ||||
[RFC3668] Bradner, S., Ed., "Intellectual Property Rights in IETF | ||||
Technology", BCP 79, RFC 3668, February 2004. | ||||
[RFC3630] Katz, D., Yeung, D., Kompella, K., "Traffic Engineering | [RFC3473] Berger, L., Ed., "Generalized Multi-Protocol Label | |||
Extensions to OSPF Version 2", RFC 3630, September 2003 | Switching (GMPLS) Signaling Resource ReserVation | |||
Protocol-Traffic Engineering (RSVP-TE) Extensions", RFC | ||||
3473, January 2003. | ||||
[RFC3784] Li, T., Smit, H., "IS-IS extensions for Traffic | [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic | |||
Engineering", RFC 3784, June 2004. | Engineering (TE) Extensions to OSPF Version 2", RFC | |||
3630, September 2003. | ||||
11. Informational References | [RFC3784] Smit, H. and T. Li, "Intermediate System to | |||
Intermediate System (IS-IS) Extensions for Traffic | ||||
Engineering (TE)", RFC 3784, June 2004. | ||||
[RFC4420] A. Farrel, D. Papadimitriou, JP. Vasseur, "Encoding of | 9. Informative References | |||
Attributes for Multiprotocol Label Switching (MPLS) | ||||
Label Switched Path (LSP) Establishment Using RSVP-TE", | ||||
RFC 4420, February 2006. | ||||
[BFD-MPLS] R. Aggarwal and K. Kompella, "BFD For MPLS LSPs", work | [BFD-MPLS] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow, | |||
in progress. | "BFD For MPLS LSPs", Work in Progress, June 2006. | |||
[CRANKBACK] Farrel, A., et al., "Crankback Signaling Extensions for | [CRANKBACK] Farrel, A., et al., "Crankback Signaling Extensions for | |||
MPLS Signaling", draft-ietf-ccamp-crankback, | MPLS Signaling", Work in Progress, May 2005. | |||
work in progress. | ||||
[EXCLUDE] Lee et all, Exclude Routes - Extension to RSVP-TE, | [EXCLUDE] Lee, CY., Farrel, A., and DeCnodder, "Exclude Routes - | |||
draft-ietf-ccamp-rsvp-te-exclude-route, work in | Extension to RSVP-TE", Work in Progress, August 2005. | |||
progress. | ||||
[RFC4090] Ping Pan, et al, "Fast Reroute Extensions to RSVP-TE | [RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute | |||
for LSP Tunnels", RFC 4090, May 2005. | Extensions to RSVP-TE for LSP Tunnels", RFC 4090, May | |||
2005. | ||||
[GMPLS-AS] Otani, T., Kumaki, K., and Okamoto, S., "GMPLS Inter-AS | [GMPLS-AS] Otani, T., Kumaki, K., Okamoto, S., and W. Imajuku, | |||
Traffic Engineering Requirements", | "GMPLS Inter-domain Traffic Engineering Requirements", | |||
draft-otani-ccamp-interas-GMPLS-TE, work in progress. | Work in Progress, August 2006. | |||
[GMPLS-E2E] Lang, J.P., Rekhter, Y., Papadimitriou, D., Editors, | [GMPLS-E2E] Lang, J.P., Rekhter, Y., and D. Papadimitriou, Editors, | |||
"RSVP-TE Extensions in support of End-to-End | "RSVP-TE Extensions in support of End-to-End | |||
GMPLS-based Recovery", | Generalized Multi-Protocol Label Switching (GMPLS)- | |||
draft-lang-ccamp-gmpls-recovery-e2e-signaling, work in | based Recovery", Work in Progress, April 2005. | |||
progress. | ||||
[RFC4206] Kompella K., Rekhter Y., "LSP Hierarchy with | [GMPLS-SEG] Berger, L., Bryskin, I., Papadimitriou, D., and A. | |||
Generalized MPLS TE", RFC 4206, October 2005. | Farrel, "GMPLS Based Segment Recovery", Work in | |||
Progress, May 2005. | ||||
[RFC4105] Le Roux, Vasseur et Boyle, "Requirements for Inter-Area | [RFC4206] Kompella, K. and Y. Rekhter, "Label Switched Paths | |||
MPLS Traffic Engineering", RFC 4105, June 2005. | (LSP) Hierarchy with Generalized Multi-Protocol Label | |||
Switching (GMPLS) Traffic Engineering (TE)", RFC 4206, | ||||
October 2005. | ||||
[RFC4216] Zhang, R., Vasseur, JP. et al, "MPLS Inter-Autonomous | [RFC4105] Le Roux, J.-L., Vasseur, J.-P., and J. Boyle, | |||
System (AS) Traffic Engineering (TE) Requirements", | "Requirements for Inter-Area MPLS Traffic Engineering", | |||
RFC 4216, November 2005. | RFC 4105, June 2005. | |||
[RFC4379] Kompella, K., and Swallow, G., "Detecting Multi- | [RFC4204] Lang, J., "Link Management Protocol (LMP)", RFC 4204, | |||
Protocol Label Switched (MPLS) Data Plane Failures", | October 2005. | |||
RFC 4379, February 2006. | ||||
[PCE] Ash, G., Farrel, A., and Vasseur, JP., "Path | [RFC4216] Zhang, R. and J.-P. Vasseur, "MPLS Inter-Autonomous | |||
Computation Element (PCE) Architecture", | System (AS) Traffic Engineering (TE) Requirements", RFC | |||
draft-ietf-pce-architecture, work in progress. | 4216, November 2005. | |||
[PCE-REQ] Ash, G., and Le Roux, J.L., "PCE Communication Protocol | [RFC4379] Kompella, K. and G. Swallow, "Detecting Multi-Protocol | |||
Generic Requirements", | Label Switched (MPLS) Data Plane Failures", RFC 4379, | |||
draft-ietf-pce-comm-protocol-gen-reqs, work in | February 2006. | |||
progress. | ||||
[SEG-PROT] Berger, L., Bryskin, I., Papadimitriou, D. and Farrel, | [RFC4420] Farrel, A., Papadimitriou, D., Vasseur, J.-P., and A. | |||
A., "GMPLS Based Segment Recovery", | Ayyangar, "Encoding of Attributes for Multiprotocol | |||
draft-ietf-ccamp-gmpls-segment-recovery, work in | Label Switching (MPLS) Label Switched Path (LSP) | |||
progress. | Establishment Using Resource ReserVation Protocol- | |||
Traffic Engineering (RSVP-TE)", RFC 4420, February | ||||
2006. | ||||
[STITCH] Ayyangar, A., and Vasseur, JP., "LSP Stitching with | [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path | |||
Generalized MPLS TE", | Computation Element (PCE)-Based Architecture", RFC | |||
draft-ietf-ccamp-lsp-stitching, work in progress. | 4655, August 2006. | |||
12. Authors' Addresses | [RFC4657] Ash, J. and J. Le Roux, "Path Computation Element (PCE) | |||
Communication Protocol Generic Requirements", RFC 4657, | ||||
September 2006. | ||||
[STITCH] Ayyangar, A. and J.-P. Vasseur, "LSP Stitching with | ||||
Generalized MPLS TE", Work in Progress, September 2005. | ||||
Authors' Addresses | ||||
Adrian Farrel | Adrian Farrel | |||
Old Dog Consulting | Old Dog Consulting | |||
EMail: adrian@olddog.co.uk | EMail: adrian@olddog.co.uk | |||
JP Vasseur | Jean-Philippe Vasseur | |||
Cisco Systems, Inc | Cisco Systems, Inc | |||
1414 Massachusetts Avenue | 1414 Massachusetts Avenue | |||
Boxborough, MA 01719 | Boxborough, MA 01719 | |||
USA | USA | |||
Email: jpv@cisco.com | EMail: jpv@cisco.com | |||
Arthi Ayyangar | Arthi Ayyangar | |||
Nuova Systems | Nuova Systems | |||
Email: arthi@nuovasystems.com | EMail: arthi@nuovasystems.com | |||
13. Full Copyright Statement | Full Copyright Statement | |||
Copyright (C) The Internet Society (2006). This document is subject | Copyright (C) The IETF Trust (2006). | |||
to the rights, licenses and restrictions contained in BCP 78, and | ||||
except as set forth therein, the authors retain all their rights. | This document is subject to the rights, licenses and restrictions | |||
contained in BCP 78, and except as set forth therein, the authors | ||||
retain all their rights. | ||||
This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST, | |||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, | |||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT | |||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY | |||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR | |||
PURPOSE. | ||||
Intellectual Property | ||||
The IETF takes no position regarding the validity or scope of any | ||||
Intellectual Property Rights or other rights that might be claimed to | ||||
pertain to the implementation or use of the technology described in | ||||
this document or the extent to which any license under such rights | ||||
might or might not be available; nor does it represent that it has | ||||
made any independent effort to identify any such rights. Information | ||||
on the procedures with respect to rights in RFC documents can be | ||||
found in BCP 78 and BCP 79. | ||||
Copies of IPR disclosures made to the IETF Secretariat and any | ||||
assurances of licenses to be made available, or the result of an | ||||
attempt made to obtain a general license or permission for the use of | ||||
such proprietary rights by implementers or users of this | ||||
specification can be obtained from the IETF on-line IPR repository at | ||||
http://www.ietf.org/ipr. | ||||
The IETF invites any interested party to bring to its attention any | ||||
copyrights, patents or patent applications, or other proprietary | ||||
rights that may cover technology that may be required to implement | ||||
this standard. Please address the information to the IETF at | ||||
ietf-ipr@ietf.org. | ||||
Acknowledgement | ||||
Funding for the RFC Editor function is currently provided by the | ||||
Internet Society. | ||||
End of changes. 116 change blocks. | ||||
333 lines changed or deleted | 295 lines changed or added | |||
This html diff was produced by rfcdiff 1.33. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |