draft-ietf-mpls-p2mp-oam-reqs-00.txt   draft-ietf-mpls-p2mp-oam-reqs-01.txt 
Network Working Group Seisho Yasukawa Network Working Group Seisho Yasukawa
Internet Draft NTT Corp Internet Draft NTT Corp
Expires: June 2006 Expires: August 2006
Adrian Farrel Adrian Farrel
Old Dog Consulting Old Dog Consulting
Daniel King Daniel King
DNNI Ltd. Aria Networks Ltd.
Thomas D. Nadeau Thomas D. Nadeau
Cisco Systems, Inc. Cisco Systems, Inc.
December 2005 February 2006
OAM Requirements for Point-to-Multipoint MPLS Networks OAM Requirements for Point-to-Multipoint MPLS Networks
draft-ietf-mpls-p2mp-oam-reqs-00.txt draft-ietf-mpls-p2mp-oam-reqs-01.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
skipping to change at page 1, line 51 skipping to change at page 1, line 51
Abstract Abstract
Multi-Protocol Label Switching (MPLS) has been extended to encompass Multi-Protocol Label Switching (MPLS) has been extended to encompass
point-to-multipoint (P2MP) Label Switched Paths (LSPs). As with point-to-multipoint (P2MP) Label Switched Paths (LSPs). As with
point-to-point MPLS LSPs the requirement to detect, handle and point-to-point MPLS LSPs the requirement to detect, handle and
diagnose control and dataplane defects is critical. diagnose control and dataplane defects is critical.
For operators deploying services based on P2MP MPLS LSPs the For operators deploying services based on P2MP MPLS LSPs the
detection and specification of how to handle those defects is detection and specification of how to handle those defects is
important because such defects may not only affect the fundamental important because such defects may not only affect the fundamentals
of an MPLS network, but also because they MAY impact service level of an MPLS network, but also because they may impact service level
specification commitments for customers of their network. specification commitments for customers of their network.
This document describes requirements for user and data plane This document describes requirements for data plane operations and
operations and management for P2MP MPLS LSPs. These requirements management for P2MP MPLS LSPs. These requirements apply to all forms
apply to all forms of P2MP MPLS LSPs, and include P2MP Traffic of P2MP MPLS LSPs, and include P2MP Traffic Engineered (TE) LSPs and
Engineered (TE) LSPs and multicast LSPs. multicast LSPs.
Table of Contents Table of Contents
1. Introduction .................................................. 2 1. Introduction .................................................. 2
2. Terminology ................................................... 3 2. Terminology ................................................... 3
2.1 Conventions ................................................ 3 2.1 Conventions ................................................ 3
2.2 Terminology ................................................ 3 2.2 Terminology ................................................ 3
2.3 Acronyms ................................................... 3 2.3 Acronyms ................................................... 3
3. Motivations ................................................... 3 3. Motivations ................................................... 3
4. General Requirements .......................................... 4 4. General Requirements .......................................... 4
4.1 Detection of Label Switch Path Defects ..................... 4 4.1 Detection of Label Switch Path Defects ..................... 4
4.2 Diagnosis of a Broken Label Switch Path .................... 5 4.2 Diagnosis of a Broken Label Switch Path .................... 5
4.3 Path characterization ...................................... 5 4.3 Path characterization ...................................... 6
4.4 Service Level Agreement Measurement ........................ 5 4.4 Service Level Agreement Measurement ........................ 6
4.5 Frequency of OAM Execution ................................. 6 4.5 Frequency of OAM Execution ................................. 7
4.6 Alarm Suppression, Aggregation and Layer Coordination ...... 6 4.6 Alarm Suppression, Aggregation and Layer Coordination ...... 7
4.7 Support for OAM Interworking for Fault Notification ........ 6 4.7 Support for OAM Interworking for Fault Notification ........ 7
4.8 Error Detection and Recovery ............................... 7 4.8 Error Detection and Recovery ............................... 8
4.9 Standard Management Interfaces ............................. 7 4.9 Standard Management Interfaces ............................. 8
4.10 Detection of Denial of Service Attacks ................... 7 4.10 Detection of Denial of Service Attacks .................... 9
4.11 Per-LSP Accounting Requirements ........................... 8 4.11 Per-LSP Accounting Requirements ........................... 9
5. Security Considerations ....................................... 8 5. Security Considerations ....................................... 9
6. IANA Considerations ........................................... 8 6. IANA Considerations .......................................... 10
7. References .................................................... 9 7. References ................................................... 10
7.1 Normative References ....................................... 9 7.1 Normative References ...................................... 10
7.2 Informative References ..................................... 9 7.2 Informative References .................................... 10
8. Acknowledgements ............................................. 10 8. Acknowledgements ............................................. 11
9. Authors' Addresses ........................................... 10 9. Authors' Addresses ........................................... 11
10. Intellectual Property Statement ............................. 10 10. Intellectual Property Statement ............................. 12
11. Full Copyright Statement .................................... 11 11. Full Copyright Statement .................................... 12
1. Introduction 1. Introduction
This document describes requirements for user and data plane This document describes requirements for data plane operations and
operations and management (OAM) for point-to-multipoint (P2MP) management (OAM) for point-to-multipoint (P2MP) Multi-Protocol Label
Multi-Protocol Label Switching (MPLS). These requirements have been Switching (MPLS). This draft specifies OAM requirements for P2MP
gathered from network operators who have extensive experience MPLS, as well as for applications of P2MP MPLS.
deploying MPLS networks and from operators who are considering
deploying P2MP MPLS networks. This draft specifies OAM requirements
for P2MP MPLS, as well as for applications of P2MP MPLS.
These requirements apply to all forms of P2MP MPLS LSPs, and include These requirements apply to all forms of P2MP MPLS LSPs, and include
P2MP Traffic Engineered (TE) LSPs [P2MP-SIG-REQ] and [P2MP-RSVP], as P2MP Traffic Engineered (TE) LSPs [P2MP-SIG-REQ] and [P2MP-RSVP], as
well as multicast LDP LSPs [P2MP-LDP] and [MCAST-LDP]. well as multicast LDP LSPs [MCAST-LDP].
Note that the requirements for OAM for P2MP MPLS build heavily on the Note that the requirements for OAM for P2MP MPLS build heavily on the
requirements for OAM for point-to-point MPLS. These latter are requirements for OAM for point-to-point MPLS. These latter
described in [MPLS-OAM] and are not repeated in this document. requirements are described in [RFC4377] and are not repeated in this
document.
For a generic framework for OAM in MPLS networks, refer to [RFC4378].
2. Terminology 2. Terminology
2.1 Conventions used in this document 2.1 Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119]. document are to be interpreted as described in RFC 2119 [RFC2119].
2.2 Terminology 2.2 Terminology
Definitions of key terms for MPLS OAM are found in [MPLS-OAM] and Definitions of key terms for MPLS OAM are found in [RFC4377] and the
the reader is assumed to be familiar with those definitions which reader is assumed to be familiar with those definitions which are not
are not repeated here. repeated here.
[P2MP-SIG-REQ] includes some important definitions and terms for use [P2MP-SIG-REQ] includes some important definitions and terms for use
within the context of P2MP MPLS. The reader should be familiar with within the context of P2MP MPLS. The reader should be familiar with
at least the terminology section of that document. at least the terminology section of that document.
2.3 Acronyms 2.3 Acronyms
The following list of acronyms is a repeat of common acronyms defined The following acronyms are used in this document.
in many other documents, and is provided here for convenience.
CE: Customer Edge CE: Customer Edge
DoS: Denial of service DoS: Denial of service
ECMP: Equal Cost Multipath ECMP: Equal Cost Multipath
LDP: Label Distribution Protocol LDP: Label Distribution Protocol
LSP: Label Switch Path LSP: Label Switch Path
LSR: Label Switch Router LSR: Label Switch Router
OAM: Operations and Management OAM: Operations and Management
OA&M: Operations, Administration and Maintenance. OA&M: Operations, Administration and Maintenance.
RSVP: Resource reSerVation Protocol RSVP: Resource reSerVation Protocol
P2MP: Point-to-Multipoint P2MP: Point-to-Multipoint
SP: Service Provider SP: Service Provider
TE: Traffic Engineering TE: Traffic Engineering
3. Motivations 3. Motivations
OAM for MPLS networks has been established as a fundamental OAM for MPLS networks has been established as a fundamental
requirement both through operational experience and through requirement both through operational experience and through its
its documentation in numerous Internet drafts. Many such documentation in numerous Internet drafts. Many such documents (for
documents (for example, [LSP-PING], [RFC3812], [RFC3813], [RFC3814], example, [RFC4379], [RFC3812], [RFC3813], [RFC3814], and [RFC3815])
and [RFC3815]) developed specific solutions to individual issues or developed specific solutions to individual issues or problems.
problems. Coordination of the full OAM requirements for MPLS was Coordination of the full OAM requirements for MPLS was achieved by
achieved by [MPLS-OAM] in recognition of the fact that the previous [RFC4377] in recognition of the fact that the previous piecemeal
piecemeal approach could lead to inconsistent and inefficient approach could lead to inconsistent and inefficient applicability of
applicability of OAM techniques across the MPLS architecture, and OAM techniques across the MPLS architecture, and might require
might require significant modifications to operational procedures and significant modifications to operational procedures and systems in
systems in order to provide consistent and useful OAM functionality. order to provide consistent and useful OAM functionality.
This document builds on these realizations and extends the This document builds on these realizations and extends the statements
statements of MPLS OAM requirements to cover the new area of P2MP of MPLS OAM requirements to cover the new area of P2MP MPLS. That is,
MPLS. That is, this document captures the requirements for P2MP this document captures the requirements for P2MP MPLS OAM in advance
MPLS OAM in advance of the development of specific solutions. of the development of specific solutions.
Nevertheless, at the time of writing, some effort had already Nevertheless, at the time of writing, some effort had already been
been expended to extend existing MPLS OAM solutions to cover P2MP expended to extend existing MPLS OAM solutions to cover P2MP MPLS
MPLS (for example, [P2MP-LSP-PING]). While this approach of extending (for example, [P2MP-LSP-PING]). While this approach of extending
existing solutions may be reasonable, in order to ensure a consistent existing solutions may be reasonable, in order to ensure a consistent
OAM framework it is necessary to articulate the full set of OAM framework it is necessary to articulate the full set of
requirements in a single document. This will facilitate a uniform set requirements in a single document. This will facilitate a uniform set
of MPLS OAM solutions spanning multiple MPLS deployments and of MPLS OAM solutions spanning multiple MPLS deployments and
concurrent applications. concurrent applications.
4. General Requirements 4. General Requirements
The general requirements described in this section are closely The general requirements described in this section are similar to
similar to those described for point-to-point MPLS in [MPLS-OAM]. those described for point-to-point MPLS in [RFC4377]. The subsections
The subsections below do not repeat material from [MPLS-OAM], but below do not repeat material from [RFC4377], but simply give
simply give references to that document. references to that document.
However, where the requirements for P2MP MPLS OAM differ from or are However, where the requirements for P2MP MPLS OAM differ from or are
more extensive than those expressed in [MPLS-OAM], additional text is more extensive than those expressed in [RFC4377], additional text is
supplied. supplied.
In general, it should be noted that P2MP LSPs introduce a scalability In general, it should be noted that P2MP LSPs introduce a scalability
issue that is not present in point-to-point MPLS. That is, an issue with respect to OAM that is not present in point-to-point MPLS.
individual P2MP LSP will have more than one egress and the path to That is, an individual P2MP LSP will have more than one egress and
those egresses will very probably not be linear (for example, it may the path to those egresses will very probably not be linear (for
have a tree structure). Since the number of egresses for a single example, it may have a tree structure). Since the number of egresses
P2MP LSP is unknown and not bounded by any small number, it follows for a single P2MP LSP is unknown and not bounded by any small number,
that all mechanisms defined for OAM support must scale well with the it follows that all mechanisms defined for OAM support MUST scale
number of egresses and the complexity of the path of the LSP. well with the number of egresses and the complexity of the path of
Mechanisms that are able to deal with individual egresses will scale the LSP. Mechanisms that are able to deal with individual egresses
no worse than similar mechanisms for point-to-point LSPs, but it is will scale no worse than similar mechanisms for point-to-point LSPs,
desirable to develop mechanisms that are able to leverage the fact but it is desirable to develop mechanisms that are able to leverage
that multiple egresses are associated with a single LSP, and so the fact that multiple egresses are associated with a single LSP, and
achieve better scaling. so achieve better scaling.
4.1 Detection of Label Switch Path Defects 4.1 Detection of Label Switch Path Defects
The ability to detect defects in a broken Label Switch Path The ability to detect defects in a P2MP LSP SHOULD not require
(LSP) SHOULD not require manual hop-by-hop troubleshooting of manual, hop-by-hop troubleshooting of each LSR used to switch traffic
each LSR used to switch traffic for that P2MP LSP. Any for that LSP, and SHOULD rely on proactive OAM procedures (such as
solutions should either extend or work in close conjunction continuous path connectivity and SLA measurement mechanisms). Any
with existing solutions developed for point-to-point MPLS, such as solutions SHOULD either extend or work in close conjunction with
those specified in [LSP-PING]. This will leverage existing software existing solutions developed for point-to-point MPLS, such as those
and hardware deployments. specified in [RFC4379] where this requirement is not contradicted by
the other requirements in this section. This will leverage existing
software and hardware deployments.
Note that P2MP LSPs may introduce additional scaling concerns for Note that P2MP LSPs may introduce additional scaling concerns for LSP
LSP probing by tools such as [LSP-PING]. As the number of leaves probing by tools such as [RFC4379]. As the number of leaves of a P2MP
of the P2MP LSP increases so it becomes potentially more expensive to LSP increases it potentially becomes more expensive to inspect the
inspect the LSP to detect defects. Any tool developed for this LSP to detect defects. Any tool developed for this purpose MUST be
purpose MUST be cognitive of this issue and MUST include techniques cognitive of this issue and MUST include techniques to reduce the
to reduce the scaling impact of an increase in the number of leaves. scaling impact of an increase in the number of leaves. Nevertheless,
Nevertheless, it should also be noted that the introduciton of it should also be noted that the introduction of additional leaves
additional leaves may mean that the use of techniques such as may mean that the use of techniques such as [RFC4379] are less
[LSP-PING] are less appropriate for defect detection of P2MP LSPs, appropriate for defect detection with P2MP LSPs, while the technique
while the technique may still remain useful for defect diagnosis as may still remain useful for defect diagnosis as described in the next
described in the next section. section.
Due to the above scaling concerns, LSRs or other network resources
MUST NOT be overwhelmed by the operation of normal proactive OAM
procedures, and measures taken to protect LSRs and network resources
against being overwhelmed MUST NOT degrade the operational value or
responsiveness of proactive OAM procedures.
By "overwhelmed" we mean that it MUST NOT be possible for an LSR to
be so busy handling proactive OAM that it is unable to continue to
process control or data plane traffic at its advertised rate.
Similarly, a network resource (such as a data link) MUST NOT be
carrying so much proactive OAM traffic that it is unable to carry the
advertised data rate. At the same time, it is important to configure
proactive OAM, if it is in use, to not raise alarms caused by the
failure to receive an OAM message if the component responsible for
processing the messages is unable to process because other components
are consuming too many system resources - such alarms might turn out
to be false.
In practice, of course, the requirements in the previous paragraph
may be overcome by careful specification of the anticipated data
throughput of LSRs or data links, but it should be recalled that
proactive OAM procedures may be scaled linearly with the number of
LSPs, and the number of LSPs is not necessarily a function of the
available bandwidth in an LSR or on a data link.
4.2 Diagnosis of a Broken Label Switch Path 4.2 Diagnosis of a Broken Label Switch Path
The ability to diagnose a broken P2MP LSP and to isolate the failed The ability to diagnose a broken P2MP LSP and to isolate the failed
component (i.e., link or node) in the path is required. These component (i.e., link or node) in the path is REQUIRED. These
functions include a path connectivity test that can test all branches functions include a path connectivity test that can test all branches
and leaves of a P2MP LSP for reachability, as well as a path tracing and leaves of a P2MP LSP for reachability, as well as a path tracing
function. It must be possible for the operator (or an automated function. Note that this requirement is distinct from the requirement
process) to stipulate a timeout after which the failure to see a to detect errors or failures described in the previous section. In
response shall be flagged as an error. practice Detection and Diagnosis/Isolation MAY be performed by
separate or the same mechanisms according to the way in which the
other requirements are met.
Any mechanism developed to perform these functions are subject to the It MUST be possible for the operator (or an automated process) to
stipulate a timeout after which the failure to see a response shall
be flagged as an error.
Any mechanism developed to perform these functions is subject to the
scalability concerns expressed in section 4. scalability concerns expressed in section 4.
4.3 Path Characterization 4.3 Path Characterization
The path characterization function [MPLS-OAM] is the ability to The path characterization function [RFC4377] is the ability to reveal
reveal details of LSR forwarding operations for P2MP LSPs. These details of LSR forwarding operations for P2MP LSPs. These details can
details can then be compared later during subsequent testing relevant then be compared later during subsequent testing relevant to OAM
to OAM functionality. Therefore, LSRs supporting P2MP LSPs MUST functionality. Therefore, LSRs supporting P2MP LSPs MUST provide
provide mechanisms that allow operators to interogate and mechanisms that allow operators to interrogate and characterize P2MP
characterize P2MP paths. paths.
Since P2MP paths are more complex than the paths of point-to-point Since P2MP paths are more complex than the paths of point-to-point
LSPs, the scaling concerns expressed in section 4 apply. LSPs, the scaling concerns expressed in section 4 apply.
Note that path characterization should lead to the operator being Note that path characterization SHOULD lead to the operator being
able to determine the full tree for a P2MP LSP. That is, it is not able to determine the full tree for a P2MP LSP. That is, it is not
sufficient to know the list of LSRs in the tree, but it is important sufficient to know the list of LSRs in the tree, but it is important
to know their relative order and where the LSP branches. to know their relative order and where the LSP branches.
Since, in some cases, the control plane state and data paths may Since, in some cases, the control plane state and data paths may
branch at different points from the control plane and data plane branch at different points from the control plane and data plane
topologies (for example, figure 1), it is not sufficient to present topologies (for example, figure 1), it is not sufficient to present
the order of LSRs, but it is important that the branching points on the order of LSRs, but it is important that the branching points on
that tree are clearly identified. that tree are clearly identified.
skipping to change at page 6, line 22 skipping to change at page 6, line 50
state branch at C, but the topology branches at D. state branch at C, but the topology branches at D.
A diagnostic tool that meets the path characterization requirements A diagnostic tool that meets the path characterization requirements
SHOULD collect information that is easy to process to determine the SHOULD collect information that is easy to process to determine the
P2MP tree for a P2MP LSP, rather than provide information that must P2MP tree for a P2MP LSP, rather than provide information that must
be post-processed with some complexity. be post-processed with some complexity.
4.4 Service Level Agreement Measurement 4.4 Service Level Agreement Measurement
Mechanisms are required to measure the diverse aspects of Service Mechanisms are required to measure the diverse aspects of Service
Level Agreements for services that utlize P2MP LSPs. The aspects are Level Agreements for services that utilize P2MP LSPs. The aspects
listed in [MPLS-OAM]. are listed in [RFC4377].
Service Level Agreements are often measured in terms of the quality Service Level Agreements are often measured in terms of the quality
and rate of data delivery. In the context of P2MP MPLS, data is and rate of data delivery. In the context of P2MP MPLS, data is
delivered to multiple egress nodes. The mechanisms MUST, therefore, delivered to multiple egress nodes. The mechanisms MUST, therefore,
be capable of measuring the aspects of Service Level Agreements as be capable of measuring the aspects of Service Level Agreements as
they apply to each of the egress points to a P2MP LSP. At the same they apply to each of the egress points to a P2MP LSP. At the same
time, in order to diagnose issues with meeting Service Level time, in order to diagnose issues with meeting Service Level
Agreements, mechanisms SHOULD be provided to measure the aspects of Agreements, mechanisms SHOULD be provided to measure the aspects of
the agreements at key points within the network such as at branch the agreements at key points within the network such as at branch
nodes on the P2MP tree. nodes on the P2MP tree.
4.5 Frequency of OAM Execution 4.5 Frequency of OAM Execution
As stipulated in [MPLS-OAM], the operator MUST have the flexibility As stipulated in [RFC4377], the operator MUST have the flexibility
to configure OAM parameters to meet their specific operational to configure OAM parameters to meet their specific operational
requirements. This requirement is potentially more important in P2MP requirements. This requirement is potentially more important in P2MP
deployments where the effects of the execution of OAM functions can deployments where the effects of the execution of OAM functions can
be potentially much greater than in a non-P2MP configuration. For be potentially much greater than in a non-P2MP configuration. For
example, a mechanism that causes each egress of a P2MP LSP to respond example, a mechanism that causes each egress of a P2MP LSP to respond
could result in a large burst of responses for a single OAM request. could result in a large burst of responses for a single OAM request.
Therefore, solutions produced SHOULD NOT impose any fixed limitations Therefore, solutions produced SHOULD NOT impose any fixed limitations
on the frequency of the execution of any OAM functions. on the frequency of the execution of any OAM functions.
4.6 Alarm Suppression, Aggregation and Layer Coordination 4.6 Alarm Suppression, Aggregation and Layer Coordination
As described in [MPLS-OAM], network elements MUST provide alarm As described in [RFC4377], network elements MUST provide alarm
suppression and aggregation to prevent the generation of superfluous suppression and aggregation mechanisms to prevent the generation of
alarms within or across network layers. The same time constraint superfluous alarms within or across network layers. The same time
issues identified in [MPLS-OAM] also exist for P2MP LSPs. constraint issues identified in [RFC4377] also apply to P2MP LSPs.
A P2MP LSP also brings the possiblity of a single fault causing a A P2MP LSP also brings the possibility of a single fault causing a
larger number of alarms than for a point-to-point LSP. This can larger number of alarms than for a point-to-point LSP. This can
happen because there are a larger number of downstream LSRs (for happen because there are a larger number of downstream LSRs (for
example, a larger number of egresses). The resultant multiplier in example, a larger number of egresses). The resultant multiplier in
the number of alarms could cause swamping of the alarm management the number of alarms could cause swamping of the alarm management
systems to which the alarms are reported, and serves as a multiplier systems to which the alarms are reported, and serves as a multiplier
to the number of potentially duplicate alarms raised by the network. to the number of potentially duplicate alarms raised by the network.
Alarm aggregation or limitation techniques MUST be applied within any Alarm aggregation or limitation techniques MUST be applied within any
solution, or be available within an implementation, so that this solution, or be available within an implementation, so that this
scaling issue can be reduced. Note that this requirement introduces a scaling issue can be reduced. Note that this requirement introduces a
second dimension to the concept of alarm aggregation. Where second dimension to the concept of alarm aggregation. Where
previously it applied to the correlation and suppression of alarms previously it applied to the correlation and suppression of alarms
generated by different network layers, it now also applies to similar generated by different network layers, it now also applies to similar
techniques applied to alarms generated by multiple downstream LSRs. techniques applied to alarms generated by multiple downstream LSRs.
4.7 Support for OAM Interworking for Fault Notification 4.7 Support for OAM Interworking for Fault Notification
[MPLS-OAM] specifies that an LSR supporting the interworking of [RFC4377] specifies that an LSR supporting the interworking of
one or more networking technologies over MPLS MUST be able to one or more networking technologies over MPLS MUST be able to
translate an MPLS defect into the native technology's error translate an MPLS defect into the native technology's error
condition. This also applies to any LSR supporting P2MP condition. This also applies to any LSR supporting P2MP LSPs.
LSPs. However, careful attention to the requirements for However, careful attention to the requirements for alarm suppression
alarm suppression stipulated therein and in section 4.6 SHOULD stipulated therein and in section 4.6 SHOULD be observed.
be observed.
Note that the time constraints for fault notification and alarm Note that the time constraints for fault notification and alarm
propagation impact upon the solutions that might be applied to the propagation impact upon the solutions that might be applied to the
scalability problem inherent in certain OAM techniques applied to scalability problem inherent in certain OAM techniques applied to
P2MP LSPs. For example, a solution to the issue of a large number P2MP LSPs. For example, a solution to the issue of a large number
of egresses all responding to some form of probe request at the of egresses all responding to some form of probe request at the
same time, might be to make the probes less frequent - but this same time, might be to make the probes less frequent - but this
might impact on the ability to detect and/or report faults. might impact on the ability to detect and/or report faults.
Where fault notification to the egress is required, there is the Where fault notification to the egress is required, there is the
possiblity that a single fault will give rise to multiple possibility that a single fault will give rise to multiple
notifications, one to each egress node of the P2MP that is downstream notifications, one to each egress node of the P2MP that is downstream
of the fault. Any mechanisms MUST manage this scaling issue while of the fault. Any mechanisms MUST manage this scaling issue while
still continuing to deliver fault notifications in a timely manner. still continuing to deliver fault notifications in a timely manner.
Where fault notification to the ingress is required, the mechanisms Where fault notification to the ingress is required, the mechanisms
MUST ensure that the notification identifies the egress nodes of the MUST ensure that the notification identifies the egress nodes of the
P2MP LSP that are impacted (that is, those downstream of the fault) P2MP LSP that are impacted (that is, those downstream of the fault)
and does not falsely imply that all egress nodes are impacted. and does not falsely imply that all egress nodes are impacted.
4.8 Error Detection and Recovery 4.8 Error Detection and Recovery
Recovery from a fault by a network element can be facilitated by Recovery from a fault by a network element can be facilitated by
MPLS OAM procedures. As described in [MPLS-OAM], these procedures MPLS OAM procedures. As described in [RFC4377], these procedures
will detect a broad range of defects, and SHOULD be operable where will detect a broad range of defects, and SHOULD be operable where
MPLS P2MP LSPs span multiple routing areas, or multiple Service MPLS P2MP LSPs span multiple routing areas, or multiple Service
Provider domains. Provider domains.
The same requirements as those expressed in [MPLS-OAM] with respect The same requirements as those expressed in [RFC4377] with respect
to automatic repair and operator intervention ahead of customer to automatic repair and operator intervention ahead of customer
detection of faults apply to P2MP LSPs. detection of faults apply to P2MP LSPs.
It should be observed that faults in P2MP LSPs may be recovered It should be observed that faults in P2MP LSPs MAY be recovered
through techniques described in [P2MP-RSVP]. through techniques described in [P2MP-RSVP].
4.9 Standard Management Interfaces 4.9 Standard Management Interfaces
The wide-spread deployment of MPLS requires common information The wide-spread deployment of MPLS requires common information
modeling of management and control of OAM functionality. This is modeling of management and control of OAM functionality. This is
reflected in the the integration of standard MPLS-related MIBs reflected in the integration of standard MPLS-related MIBs
[RFC3813], [RFC3812], [RFC3814], [RFC3815] for fault, statistics [RFC3813], [RFC3812], [RFC3814], [RFC3815] for fault, statistics
and configuration management. These standard interfaces provide and configuration management. These standard interfaces provide
operators with common programmatic interface access to operators with common programmatic interface access to
operations and management functions and their status. These operations and management functions and their status.
The standard MPLS-related MIB modules [RFC3812], [RFC3813], The standard MPLS-related MIB modules [RFC3812], [RFC3813],
[RFC3814], and [RFC3815] SHOULD be extended wherever possible, to [RFC3814], and [RFC3815] SHOULD be extended wherever possible, to
support P2MP LSPs, the associated OAM functions on these LSPs, and support P2MP LSPs, the associated OAM functions on these LSPs, and
the applications that utlize P2MP LSPs. Extending them will the applications that utilize P2MP LSPs. Extending them will
facillitate the reuse of existing management software both in LSRs facilitate the reuse of existing management software both in LSRs
and in management systems. In cases where the existing MIB modules and in management systems. In cases where the existing MIB modules
cannot be extended, then new MIB modules MUST be created. cannot be extended, then new MIB modules MUST be created.
4.10 Detection of Denial of Service Attacks 4.10 Detection of Denial of Service Attacks
The ability to detect denial of service (DoS) attacks against the The ability to detect denial of service (DoS) attacks against the
data or control planes which signal P2MP LSPs MUST be part of data or control planes which signal P2MP LSPs MUST be part of
any security management related to MPLS OAM tools or techniques. any security management related to MPLS OAM tools or techniques.
4.11 Per-LSP Accounting Requirements 4.11 Per-LSP Accounting Requirements
In an MPLS network where P2MP LSPs are in use, Service Providers can In an MPLS network where P2MP LSPs are in use, Service Providers can
measure traffic from an LSR to the egress of the network using some measure traffic from an LSR to the egress of the network using some
MPLS-related MIB modules (see section 4.9), for example. Other MPLS-related MIB modules (see section 4.9), for example. Other
interfaces MAY exist as well and enable the creation of traffic interfaces MAY exist as well and enable the creation of traffic
matricies so that it is possible to know how much traffic is matrices so that it is possible to know how much traffic is
traveling from where to where within the network. traveling from where to where within the network.
Analysis of traffic flows to produce a traffic matrix is more Analysis of traffic flows to produce a traffic matrix is more
complicated where P2MP LSPs are deployed becasue there is no simple complicated where P2MP LSPs are deployed because there is no simple
pairing relationship between an ingress and a single egress. pairing relationship between an ingress and a single egress.
Fundamental to understanding traffic flows within a network that Fundamental to understanding traffic flows within a network that
supports P2MP LSPs will be the knowledge of where the traffic is supports P2MP LSPs will be the knowledge of where the traffic is
branched for each LSP within the network. That is, where within the branched for each LSP within the network. That is, where within the
network the branch nodes for the LSPs are located and what their network the branch nodes for the LSPs are located and what their
relationship is to links and other LSRs. The Traffic flow and relationship is to links and other LSRs. Traffic flow and
accounting tools MUST take this fact into account. accounting tools MUST take this fact into account.
5. Security Considerations 5. Security Considerations
This document introduces no new security issues compared with This document introduces no new security issues compared with
[MPLS-OAM]. It is worth highlighting, however, that any tool designed [RFC4377]. It is worth highlighting, however, that any tool designed
to satisfy the requirements described in this document MUST include to satisfy the requirements described in this document MUST include
provisions to prevent its unauthorized use. Likewise, these tools provisions to prevent its unauthorized use. Likewise, these tools
MUST provide a means by which an operator can prevent denial of MUST provide a means by which an operator can prevent denial of
service attacks if those tools are used in such an attack. service attacks if those tools are used in such an attack.
LSP mis-merging is described in [MPLS-OAM] where it is pointed out LSP mis-merging is described in [RFC4377] where it is pointed out
that it has security implications beyond simply being a network that it has security implications beyond simply being a network
defect. It needs to be stressed that it is in the nature of P2MP defect. It needs to be stressed that it is in the nature of P2MP
traffic flows that any erroneous delivery (such as caused by LSP traffic flows that any erroneous delivery (such as caused by LSP
mis-merging) is likely to have more far reaching conseuqences since mis-merging) is likely to have more far reaching consequences since
the traffic will be mis-delivered to multiple receivers. the traffic will be mis-delivered to multiple receivers.
As with previous OAM function described in [MPLS-OAM], the As with the OAM functions described in [RFC4377], the
performance of diagnostic functions and path characterization may performance of diagnostic functions and path characterization may
involve the extraction of a significant amount of information about involve the extraction of a significant amount of information about
network construction. The network operator MAY consider this network construction. The network operator MAY consider this
information private and wish to take steps to secure it, but further, information private and wish to take steps to secure it, but further,
the volume of this information may be considered as a threat to the the volume of this information may be considered as a threat to the
integrity of the network if it is extacted in bulk. This issue may be integrity of the network if it is extracted in bulk. This issue may
greater in P2MP MPLS becuase of the potential for a large number of be greater in P2MP MPLS because of the potential for a large number
receivers on a single LSP and the consequent extensive path of the of receivers on a single LSP and the consequent extensive path of the
LSP. LSP.
6. IANA Considerations 6. IANA Considerations
This document creates no new requirements on IANA namespaces. This document creates no new requirements on IANA namespaces.
7. References 7. References
7.1 Normative References 7.1 Normative References
[MPLS-OAM] T. Nadeau, Allan D., et al. Allan D., [RFC4377] T. Nadeau, M. Morrow, G. Swallow, D. Allan, and
"OAM Requirements for MPLS Networks", S. Matsushima, "Operations and Management (OAM)
draft-ietf-mpls-oam-requirements-05.txt, Requirements for Multi-Protocol Label Switched
December 2004 (MPLS) Networks", RFC 4377, February 2006.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
7.2 Informative References 7.2 Informative References
[LSP-PING] Kompella, K., and Swallow, G., (Editors), "Detecting [RFC4378] Alan, D., Nadeau T., "A Framework for
MPLS Data Plane Failures", draft-ietf-mpls-lsp-ping, Multi-Protocol Label Switching (MPLS) Operations
work in progress. and Management (OAM)", RFC4378, February 2006.
[MCAST-LDP] Wijnands, IJ., et al., " Multicast Extensions for [RFC4379] Kompella, K., and Swallow, G., (Editors), "Detecting
LDP", draft-wijnands-mpls-ldp-mcast-ext, work in MPLS Data Plane Failures", RFC 4379, February 2006.
progress.
[P2MP-LDP] Minei, I., et al., "Label Distribution Protocol [MCAST-LDP] IJ., Wijnands, I. Minei, et al., "Label Distribution
Extensions for Point-to-Multipoint Label Switched Protocol Extensions for Point-to-Multipoint and
Paths", draft-minei-mpls-ldp-p2mp, work in progress. Multipoint-to-Multipoint Label Switched Paths",
draft-minei-wijnands-mpls-ldp-p2mp, work in
progress.
[P2MP-LSP-PING] Yasukawa, S., Farrel, A., Ali, Z., and Fenner, B., [P2MP-LSP-PING] Yasukawa, S., Farrel, A., Ali, Z., and Fenner, B.,
"Detecting Data Plane Failures in "Detecting Data Plane Failures in
Point-to-Multipoint MPLS Traffic Engineering - Point-to-Multipoint MPLS Traffic Engineering -
Extensions to LSP Ping", Extensions to LSP Ping",
draft-yasukawa-mpls-p2mp-lsp-ping, work in progress. draft-yasukawa-mpls-p2mp-lsp-ping, work in progress.
[P2MP-RSVP] Aggarwal, R., Papadimitriou, D., and Yasukawa, S., [P2MP-RSVP] Aggarwal, R., Papadimitriou, D., and Yasukawa, S.,
"Extensions to RSVP-TE for Point to Multipoint TE "Extensions to RSVP-TE for Point to Multipoint TE
LSPs", draft-ietf-mpls-rsvp-te-p2mp, work in LSPs", draft-ietf-mpls-rsvp-te-p2mp, work in
skipping to change at page 10, line 51 skipping to change at page 11, line 32
[RFC3815] Cucchiara, J., Sjostrand, H., and Luciani, J., [RFC3815] Cucchiara, J., Sjostrand, H., and Luciani, J.,
"Definitions of Managed Objects for the "Definitions of Managed Objects for the
Multiprotocol Label Switching (MPLS), Label Multiprotocol Label Switching (MPLS), Label
Distribution Protocol (LDP)", RFC 3815, June 2004. Distribution Protocol (LDP)", RFC 3815, June 2004.
8. Acknowledgment 8. Acknowledgment
The authors wish to acknowledge and thank the following The authors wish to acknowledge and thank the following
individuals for their valuable comments to this document: individuals for their valuable comments to this document:
Dimitri Papadimitriou and Rahul Aggarwal. Rahul Aggarwal, Neil Harrison, Ben Niven-Jenkins and Dimitri
Papadimitriou.
9. Authors' Addresses 9. Authors' Addresses
Adrian Farrel Adrian Farrel
Old Dog Consulting Old Dog Consulting
Phone: +44 (0) 1978 860944 Phone: +44 (0) 1978 860944
Email: adrian@olddog.co.uk Email: adrian@olddog.co.uk
Daniel King Daniel King
Darwinian Neural Network Industries Ltd. Aria Networks Ltd.
Phone: +44 (0)1249 665923 Phone: +44 (0)1249 665923
Email: dan@dnni.com Email: daniel.king@aria-networks.com
Thomas D. Nadeau Thomas D. Nadeau
Cisco Systems, Inc. Cisco Systems, Inc.
1414 Massachusetts Ave. 1414 Massachusetts Ave.
Boxborough, MA 01719 Boxborough, MA 01719
Email: tnadeau@cisco.com Email: tnadeau@cisco.com
Seisho Yasukawa Seisho Yasukawa
NTT Corporation NTT Corporation
9-11, Midori-Cho 3-Chome 9-11, Midori-Cho 3-Chome
Musashino-Shi, Tokyo 180-8585, Musashino-Shi, Tokyo 180-8585,
Japan Japan
Phone: +81 422 59 4769 Phone: +81 422 59 4769
Email: yasukawa.seisho@lab.ntt.co.jp Email: yasukawa.seisho@lab.ntt.co.jp
10. Intellectual Property Statement 10. Intellectual Property Statement
skipping to change at page 12, line 7 skipping to change at page 12, line 38
http://www.ietf.org/ipr. http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at this standard. Please address the information to the IETF at
ietf-ipr@ietf.org. ietf-ipr@ietf.org.
11. Full Copyright Statement 11. Full Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights. except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
 End of changes. 55 change blocks. 
156 lines changed or deleted 188 lines changed or added

This html diff was produced by rfcdiff 1.29, available from http://www.levkowetz.com/ietf/tools/rfcdiff/