draft-ietf-mpls-targeted-mldp-04.txt   rfc7060.txt 
MPLS Working Group Maria Napierala Internet Engineering Task Force (IETF) M. Napierala
Internet Draft AT&T Request for Comments: 7060 AT&T
Intended Status: Standards Track Category: Standards Track E. Rosen
Expires: March 4, 2014 Eric C. Rosen ISSN: 2070-1721 IJ. Wijnands
IJsbrand Wijnands
Cisco Systems, Inc. Cisco Systems, Inc.
November 2013
September 4, 2013
Using LDP Multipoint Extensions on Targeted LDP Sessions Using LDP Multipoint Extensions on Targeted LDP Sessions
draft-ietf-mpls-targeted-mldp-04.txt
Abstract Abstract
Label Distribution Protocol (LDP) can be used to set up Point-to- Label Distribution Protocol (LDP) can be used to set up Point-to-
Multipoint (P2MP) and Multipoint-to-Multipoint (MP2MP) Label Switched Multipoint (P2MP) and Multipoint-to-Multipoint (MP2MP) Label Switched
Paths. However, the specification for the Multipoint Extensions to Paths. However, the specification for the Multipoint Extensions to
LDP presupposes that the two endpoints of an LDP session are directly LDP presupposes that the two endpoints of an LDP session are directly
connected. The LDP base specification allows for the case where the connected. The LDP base specification allows for the case where the
two endpoints of an LDP session are not directly connected; such a two endpoints of an LDP session are not directly connected; such a
session is known as a "Targeted LDP" session. This document provides session is known as a "Targeted LDP" session. This document provides
the specification for using the LDP Multipoint Extensions over a the specification for using the LDP Multipoint Extensions over a
Targeted LDP session. Targeted LDP session.
Status of this Memo Status of This Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months This is an Internet Standards Track document.
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at This document is a product of the Internet Engineering Task Force
http://www.ietf.org/ietf/1id-abstracts.txt. (IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.
The list of Internet-Draft Shadow Directories can be accessed at Information about the current status of this document, any errata,
http://www.ietf.org/shadow.html. and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc7060.
Copyright and License Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1 Introduction .......................................... 3 1. Introduction ....................................................2
2 Targeted mLDP and the Upstream LSR .................... 3 2. Targeted mLDP and the Upstream LSR ..............................3
2.1 Selecting the Upstream LSR ............................ 3 2.1. Selecting the Upstream LSR .................................3
2.2 Sending data from U to D .............................. 4 2.2. Sending Data from U to D ...................................4
3 Applicability of Targeted mLDP ........................ 5 3. Applicability of Targeted mLDP ..................................4
4 LDP Capabilities ...................................... 5 4. LDP Capabilities ................................................5
5 Targeted mLDP with Unicast Replication ................ 6 5. Targeted mLDP with Unicast Replication ..........................5
6 Targeted mLDP with Multicast Tunneling ................ 7 6. Targeted mLDP with Multicast Tunneling ..........................6
7 IANA Considerations ................................... 8 7. Security Considerations .........................................8
8 Security Considerations ............................... 8 8. Acknowledgments .................................................8
9 Acknowledgments ....................................... 8 9. Normative References ............................................8
10 Authors' Addresses .................................... 9
11 Normative References .................................. 9
1. Introduction
The Label Distribution Protocol (LDP) extensions for setting up 1. Introduction
Point-to-MultiPoint (P2MP) Label Switched Paths (LSPs) and
Multipoint-to-Multipoint (MP2MP) LSPs are specified in [mLDP]. This Label Distribution Protocol (LDP) extensions for setting up Point-to-
set of extensions is generally known as "Multipoint LDP" (mLDP). Multipoint (P2MP) Label Switched Paths (LSPs) and Multipoint-to-
Multipoint (MP2MP) LSPs are specified in [mLDP]. This set of
extensions is generally known as "Multipoint LDP" (mLDP).
A pair of Label Switched Routers (LSRs) that are the endpoints of an A pair of Label Switched Routers (LSRs) that are the endpoints of an
LDP session are considered to be "LDP peers". When a pair of LDP LDP session are considered to be "LDP peers". When a pair of LDP
peers are "directly connected" (e.g., they are connected by a layer 2 peers are "directly connected" (e.g., they are connected by a layer 2
medium, or are otherwise considered to be neighbors by the network's medium or are otherwise considered to be neighbors by the network's
interior routing protocol), the LDP session is said to be a "directly interior routing protocol), the LDP session is said to be a "directly
connected" LDP session. When the pair of LDP peers are not directly connected" LDP session. When the pair of LDP peers are not directly
connected, the session between them is said to be a "Targeted" LDP connected, the session between them is said to be a "Targeted" LDP
session. session.
The base specification for mLDP does not explicitly cover the case The base specification for mLDP does not explicitly cover the case
where the LDP multipoint extensions are used over a targeted LDP where the LDP multipoint extensions are used over a Targeted LDP
session. This document provides that specification. session. This document provides that specification.
We will use the term "Multipoint" to mean "either P2MP or MP2MP". We will use the term "Multipoint" to mean "either P2MP or MP2MP".
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. document are to be interpreted as described in [RFC2119].
2. Targeted mLDP and the Upstream LSR 2. Targeted mLDP and the Upstream LSR
2.1. Selecting the Upstream LSR 2.1. Selecting the Upstream LSR
In mLDP, a multipoint LSP (MP-LSP) has a unique identifier that is an In mLDP, a multipoint LSP (MP-LSP) has a unique identifier that is an
ordered pair of the form <root, opaque value>. The first element of ordered pair of the form <root, opaque value>. The first element of
the ordered pair is the IP address of the MP-LSP's "root node". The the ordered pair is the IP address of the MP-LSP's "root node". The
second element of the ordered pair is an identifier that is unique in second element of the ordered pair is an identifier that is unique in
the context of the root node. the context of the root node.
If LSR D is setting up the MP-LSP <R, X>, D must determine the If LSR D is setting up the MP-LSP <R, X>, D must determine the
"upstream LSR" for <R, X>. In [mLDP], the upstream LSR for <R, X>, "upstream LSR" for <R, X>. In [mLDP], the upstream LSR for <R, X>,
U, is defined to be the "next hop" on D's path to R, and "next hop" U, is defined to be the "next hop" on D's path to R, and "next hop"
is tacitly assumed to mean "IGP next hop". It is thus assumed that is tacitly assumed to mean "IGP next hop". It is thus assumed that
there is a direct LDP session between D and U. In this there is a direct LDP session between D and U. In this
specification, we extend the notion of "upstream LSR" to cover the specification, we extend the notion of "upstream LSR" to cover the
following cases: following cases:
- U is the "BGP next hop" on D's path to R, where U and D are not - U is the "BGP next hop" on D's path to R, where U and D are not
necessarily IGP neighbors, and where there is a Targeted LDP necessarily IGP neighbors, and where there is a Targeted LDP
session between U and D. In this case, we allow D to select U as session between U and D. In this case, we allow D to select U
the "upstream LSR" for <R,X>. as the "upstream LSR" for <R,X>.
- If the "next hop interface" on D's path to R is an RSVP-TE P2P - If the "next-hop interface" on D's path to R is an RSVP Traffic
tunnel whose remote endpoint is U, and if there is known to be an Engineering (RSVP-TE) P2P tunnel whose remote endpoint is U,
RSVP-TE P2P tunnel from U to D, and if there is a Targeted LDP and if there is known to be an RSVP-TE P2P tunnel from U to D,
session between U and D, then we allow D to select U as the and if there is a Targeted LDP session between U and D, then we
"upstream LSR" for <R,X>. This is useful when D and U are part allow D to select U as the "upstream LSR" for <R,X>. This is
of a network area that is fully meshed via RSVP-TE P2P tunnels. useful when D and U are part of a network area that is fully
meshed via RSVP-TE P2P tunnels.
The particular method used to select an "upstream LSR" is determined The particular method used to select an "upstream LSR" is determined
by the Service Provider (SP), and must be made known a priori (i.e., by the Service Provider (SP) and must be made known a priori (i.e.,
by provisioning) to all the LSRs involved. by provisioning) to all the LSRs involved.
Other methods than the two specified above MAY be used; however the Other methods than the two specified above MAY be used; however, the
specification of other methods is outside the scope of this document. specification of other methods is outside the scope of this document.
2.2. Sending data from U to D 2.2. Sending Data from U to D
By using Targeted mLDP, we can construct an MP-LSP <R,X> containing By using Targeted mLDP, we can construct an MP-LSP <R,X> containing
an LSR U, where U has one or more downstream LSR neighbors (D1, ..., an LSR U, where U has one or more downstream LSR neighbors (D1, ...,
Dn) to which it is not directly connected. In order for a data Dn) to which it is not directly connected. In order for a data
packet to travel along this MP-LSP, U must have some way of packet to travel along this MP-LSP, U must have some way of
transmitting the packet to D1, ..., Dn. We will cover two methods of transmitting the packet to D1, ..., Dn. We will cover two methods of
transmission: transmission:
- Unicast Replication. - Unicast Replication
In this method, U creates n copies of the packet, and unicasts In this method, U creates n copies of the packet and unicasts
each copy to exactly one of D1, ..., Dn. each copy to exactly one of D1, ..., Dn.
- Multicast tunneling. - Multicast Tunneling
In this method, U becomes the root node of a multicast tunnel, In this method, U becomes the root node of a multicast tunnel,
with D1, ..., Dn as leaf nodes. When a packet traveling along with D1, ..., Dn as leaf nodes. When a packet traveling along
the MP-LSP <R,X> arrives at U, U transmits it through the the MP-LSP <R,X> arrives at U, U transmits it through the
multicast tunnel, and as a result it arrives at D1, ..., Dn. multicast tunnel, and as a result it arrives at D1, ..., Dn.
When this method is used, it may be desirable to carry traffic of When this method is used, it may be desirable to carry traffic
multiple MP-LSPs through a single multicast tunnel. We specify of multiple MP-LSPs through a single multicast tunnel. We
procedures that allow for the proper demultiplexing of the MP- specify procedures that allow for the proper demultiplexing of
LSPs at the leaf nodes of the multicast tunnel. We do not assume the MP-LSPs at the leaf nodes of the multicast tunnel. We do
that all the leaf nodes of the tunnel are on all the MP-LSPs not assume that all the leaf nodes of the tunnel are on all the
traveling through the tunnel; thus some of the tunnel leaf nodes MP-LSPs traveling through the tunnel; thus, some of the tunnel
may need to discard some of the packets received through the leaf nodes may need to discard some of the packets received
tunnel. For example, suppose MP-LSP <R1,X1> contains node U with through the tunnel. For example, suppose MP-LSP <R1,X1>
downstream LSRs D1 and D2, while MP-LSP <R2,X2> contains node U contains node U with downstream LSRs D1 and D2, while MP-LSP
with downstream LSRs D2 and D3. Suppose also that there is a <R2,X2> contains node U with downstream LSRs D2 and D3.
multicast tunnel with U as root and with D1, D2, and D3 as leaf Suppose also that there is a multicast tunnel with U as root
nodes. U can aggregate both MP-LSPs in this one tunnel. and with D1, D2, and D3 as leaf nodes. U can aggregate both
However, D1 will have to discard packets that are traveling on MP-LSPs in this one tunnel. However, D1 will have to discard
<R2,X1>, while D3 will have to discard packets that are traveling packets that are traveling on <R2,X1>, while D3 will have to
on <R1,X2>. discard packets that are traveling on <R1,X2>.
3. Applicability of Targeted mLDP 3. Applicability of Targeted mLDP
When LSR D is setting up MP-LSP <R,X>, it MUST NOT use targeted mLDP When LSR D is setting up MP-LSP <R,X>, it MUST NOT use Targeted mLDP
unless D implements a procedure that can select, as the "upstream unless D implements a procedure that can select an LSR U that is a
LSR" for <R,X>, an LSR U that is a Targeted mLDP peer of D. See Targeted mLDP peer of D as the "upstream LSR" for <R,X>. See Section
section 2.1. 2.1.
Whether D uses Targeted mLDP when this condition holds is determined Whether D uses Targeted mLDP when this condition holds is determined
by provisioning, or by other methods that are outside the scope of by provisioning or by other methods that are outside the scope of
this specification. this specification.
When Targeted mLDP is used, the choice between unicast replication When Targeted mLDP is used, the choice between unicast replication
and multicast tunneling is determined by provisioning, or by other and multicast tunneling is determined by provisioning or by other
methods that are outside the scope of this specification. It is methods that are outside the scope of this specification. It is
presupposed that all nodes will have a priori knowledge of whether to presupposed that all nodes will have a priori knowledge of whether to
use unicast replication or to use multicast tunneling. If the use unicast replication or to use multicast tunneling. If the
latter, it is presupposed that all nodes will have a priori knowledge latter, it is presupposed that all nodes will have a priori knowledge
of the type of multicast tunneling to use. of the type of multicast tunneling to use.
4. LDP Capabilities 4. LDP Capabilities
Per [mLDP], any LSR that needs to set up an MP-LSP must support the Per [mLDP], any LSR that needs to set up an MP-LSP must support the
procedures of [LDP-CAP], and in particular must send and receive the procedures of [LDP-CAP], and in particular must send and receive the
P2MP Capability and/or the MP2MP Capability. This specification does P2MP Capability and/or the MP2MP Capability. This specification does
not define any new capabilities; the advertisement of the P2MP and/or not define any new capabilities; the advertisement of the P2MP and/or
MP2MP Capabilities on a Targeted LDP session means that the MP2MP Capabilities on a Targeted LDP session means that the
advertising LSR is capable of following the procedures of this advertising LSR is capable of following the procedures set forth in
document. this document.
Some of the procedures of this document require the use of upstream- Some of the procedures described in this document require the use of
assigned labels [LDP-UP]. In order to use upstream-assigned labels upstream-assigned labels [LDP-UP]. In order to use upstream-assigned
as part of Targeted mLDP, an LSR must advertise the LDP Upstream- labels as part of Targeted mLDP, an LSR must advertise the LDP
Assigned Label Capability [LDP-UP] on the Targeted LDP session. Upstream-Assigned Label Capability [LDP-UP] on the Targeted LDP
session.
5. Targeted mLDP with Unicast Replication 5. Targeted mLDP with Unicast Replication
When unicast replication is used, the mLDP procedures are exactly the When unicast replication is used, the mLDP procedures are exactly the
same as described in [mLDP], with the following exception. If LSR D same as described in [mLDP], with the following exception. If LSR D
is setting up MP-LSP <R,X>, its "upstream LSR" is selected according is setting up MP-LSP <R,X>, its "upstream LSR" is selected according
to the procedures of section 2.1, and is not necessarily the "IGP to the procedures of Section 2.1, and is not necessarily the "IGP
next hop" on D's path to R. next hop" on D's path to R.
Suppose that LSRs D1 and D2 are both setting up the P2MP MP-LSP Suppose that LSRs D1 and D2 are both setting up the P2MP MP-LSP
<R,X>, and that LSR U is the upstream LSR on each of their paths to <R,X>, and that LSR U is the upstream LSR on each of their paths to
R. D1 and D2 each binds a label to <R,X>, and each uses a label R. D1 and D2 each binds a label to <R,X> and each uses a Label
mapping message to inform U of the label binding. Suppose D1 has Mapping message to inform U of the label binding. Suppose D1 has
assigned label L1 to <R,X> and D2 has assigned label L2 to <R,X>. assigned label L1 to <R,X> and D2 has assigned label L2 to <R,X>.
(Note that L1 and L2 could have the same value or different values; (Note that L1 and L2 could have the same value or different values;
D1 and D2 do not coordinate their label assignments.) When U has a D1 and D2 do not coordinate their label assignments.) When U has a
packet to transmit on the MP-LSP <R,X>, it makes a copy of the packet to transmit on the MP-LSP <R,X>, it makes a copy of the
packet, pushes on label L1, and unicasts the resulting packet to D1. packet, pushes on label L1, and unicasts the resulting packet to D1.
It also makes a second copy of the packet, pushes on label L2, and It also makes a second copy of the packet, pushes on label L2, and
then unicasts the resulting packet to D2. then unicasts the resulting packet to D2.
This procedure also works when the MP-LSP <R,X> is a MP2MP LSP. This procedure also works when the MP-LSP <R,X> is an MP2MP LSP.
Suppose that in addition to labels L1 and L2 described above, U has Suppose that in addition to labels L1 and L2 described above, U has
assigned label L3 for <R,X> traffic received from D1, and label L4 assigned label L3 for <R,X> traffic received from D1 and label L4 for
for <R,X> traffic received from D2. When U processes a packet with <R,X> traffic received from D2. When U processes a packet with label
label L3 at the top of its label stack, it knows the packet is from L3 at the top of its label stack, it knows the packet is from D1, so
D1, so U sends a unicast copy of the packet to D2, after swapping L3 U sends a unicast copy of the packet to D2, after swapping L3 for L2.
for L2. U does not send a copy back to D1. U does not send a copy back to D1.
Note that all labels used in this procedure are downstream-assigned Note that all labels used in this procedure are downstream-assigned
labels. labels.
The method of unicast is a local matter, outside the scope of this The method of unicast is a local matter, outside the scope of this
specification. The only requirement is that D1 will receive the copy specification. The only requirement is that D1 will receive the copy
of the packet carrying label L1, and that D1 will process the packet of the packet carrying label L1 and that D1 will process the packet
by looking up label L1. (And similarly, D2 must receive the copy of by looking up label L1. (And similarly, D2 must receive the copy of
the packet carrying label L2, and must process the packet by looking the packet carrying label L2 and must process the packet by looking
up label L2.) up label L2.)
Note that if the method of unicast is MPLS, U will need to push Note that if the method of unicast is MPLS, U will need to push
another label on each copy of the packet before transmitting it. another label on each copy of the packet before transmitting it.
This label needs to ensure that delivery of the packet to the This label needs to ensure that delivery of the packet to the
appropriate LSR, D1 or D2. Use of penultimate-hop popping for that appropriate LSR, D1 or D2. Use of penultimate-hop popping for that
label is perfectly legitimate. label is perfectly legitimate.
6. Targeted mLDP with Multicast Tunneling 6. Targeted mLDP with Multicast Tunneling
Suppose that LSRs D1 and D2 are both setting up MP-LSP <R,X>, and Suppose that LSRs D1 and D2 are both setting up MP-LSP <R,X> and that
that LSR U is the upstream LSR on each of their paths to R. Since LSR U is the upstream LSR on each of their paths to R. Since
multicast tunneling is being used, when U has a packet to send on multicast tunneling is being used, when U has a packet to send on
this MP-LSP, it does not necessarily send two copies, one to D1 and this MP-LSP, it does not necessarily send two copies, one to D1 and
one to D2. It may send only one copy of the packet, which will get one to D2. It may send only one copy of the packet, which will get
replicated somewhere downstream in the multicast tunnel. Therefore, replicated somewhere downstream in the multicast tunnel. Therefore,
the label that gets bound to the MP-LSP must be an upstream-assigned the label that gets bound to the MP-LSP must be an upstream-assigned
label, assigned by U. This requires a change from the procedures of label assigned by U. This requires a change from the procedures of
[mLDP]. D1 and D2 do not send label mapping messages to U; instead [mLDP]. D1 and D2 do not send Label Mapping messages to U; instead,
they send label request messages to U, following the procedures of they send Label Request messages to U, following the procedures of
Section 4 of [LDP-UP], asking U to assign a label to the MP-LSP Section 4 of [LDP-UP], asking U to assign a label to the MP-LSP
<R,X>. U responds with a label mapping message containing an <R,X>. U responds with a Label Mapping message containing an
upstream-assigned label, L (using the procedures specified in [LDP- upstream-assigned label L (using the procedures specified in
UP]). As part of the same label mapping message, U also sends an [LDP-UP]). As part of the same Label Mapping message, U also sends
Interface TLV (as specified in [LDP-UP]) identifying the multicast an Interface TLV (as specified in [LDP-UP]) identifying the multicast
tunnel in which data on the MP-LSP will be carried. When U transmits tunnel in which data on the MP-LSP will be carried. When U transmits
a packet on this tunnel, it first pushes on the upstream-assigned a packet on this tunnel, it first pushes on the upstream-assigned
label L, and then pushes on the label that corresponds to the label L and then pushes on the label that corresponds to the
multicast tunnel. multicast tunnel.
If the numerical value L of the upstream-assigned label is the value If the numerical value L of the upstream-assigned label is the value
3, defined in [LDP] and [RFC3032] as "Implicit NULL", then the 3, defined in [LDP] and [RFC3032] as "Implicit NULL", then the
specified multicast tunnel will carry only the specified MP-LSP. specified multicast tunnel will carry only the specified MP-LSP.
That is, aggregation of multiple MP-LSPs into a single multicast That is, aggregation of multiple MP-LSPs into a single multicast
tunnel is not being done. In this case, no upstream-assigned label tunnel is not being done. In this case, no upstream-assigned label
is pushed onto a packet that is transmitted through the multicast is pushed onto a packet that is transmitted through the multicast
tunnel. tunnel.
skipping to change at page 7, line 52 skipping to change at page 7, line 25
outside the scope of this document. outside the scope of this document.
If the multicast tunnel is an mLDP MP-LSP or an RSVP-TE P2MP LSP, If the multicast tunnel is an mLDP MP-LSP or an RSVP-TE P2MP LSP,
when U transmits a packet on the MP-LSP <R,X>, the upstream-assigned when U transmits a packet on the MP-LSP <R,X>, the upstream-assigned
label L will be the second label in the label stack. Penultimate-hop label L will be the second label in the label stack. Penultimate-hop
popping MUST NOT be done, because the top label provides the context popping MUST NOT be done, because the top label provides the context
in which the second label is to be interpreted. See [RFC5331]. in which the second label is to be interpreted. See [RFC5331].
When LSR U uses these procedures to inform LSR D that a particular When LSR U uses these procedures to inform LSR D that a particular
MP-LSP is being carried in a particular multicast tunnel, U and D MP-LSP is being carried in a particular multicast tunnel, U and D
MUST take appropriate steps to ensure that packets U sends into this MUST take appropriate steps to ensure that the packets U sends into
tunnel will be received by D. The exact steps to take depend on the this tunnel will be received by D. The exact steps to take depend on
tunnel type. As long as U is D's upstream LSR for any MP-LSP that the tunnel type. As long as U is D's upstream LSR for any MP-LSP
has been assigned to this tunnel, D must remain joined to the tunnel. that has been assigned to this tunnel, D must remain joined to the
tunnel.
Note that U MAY assign the same multicast tunnel for multiple Note that U MAY assign the same multicast tunnel for multiple
different MP-LSPs. However, U MUST assign a distinct upstream- different MP-LSPs. However, U MUST assign a distinct upstream-
assigned label to each MP-LSP. This allows the packets traveling assigned label to each MP-LSP. This allows the packets traveling
through the tunnel to be demultiplexed into the proper MP-LSPs. through the tunnel to be demultiplexed into the proper MP-LSPs.
If U has an MP-LSP <R1,X1> with downstream LSRs D1 and D2, and an MP- If U has an MP-LSP <R1,X1> with downstream LSRs D1 and D2, and an MP-
LSP <R2,X2> with downstream LSRs D2 and D3, U may assign both MP-LSPs LSP <R2,X2> with downstream LSRs D2 and D3, U may assign both MP-LSPs
to the same multicast tunnel. In this case, D3 will receive packets to the same multicast tunnel. In this case, D3 will receive packets
traveling on <R1,X1>. However, the upstream-assigned label carried traveling on <R1,X1>. However, the upstream-assigned label carried
by those packets will not be recognized by D3, hence D3 will discard by those packets will not be recognized by D3, hence D3 will discard
those packets. Similarly, D1 will discard the <R2,X2> packets. those packets. Similarly, D1 will discard the <R2,X2> packets.
This document does not specify any rules for deciding whether to This document does not specify any rules for deciding whether to
aggregate two or more MP-LSPs into a single multicast tunnel. Such aggregate two or more MP-LSPs into a single multicast tunnel. Such
rules are outside the scope of this document. rules are outside the scope of this document.
Except for the procedures explicitly detailed in this document, the Except for the procedures explicitly detailed in this document, the
procedures of [mLDP] and [LDP-UP] apply unchanged. procedures of [mLDP] and [LDP-UP] apply unchanged.
7. IANA Considerations 7. Security Considerations
This document has no considerations for IANA.
8. Security Considerations
This document raises no new security considerations beyond those This document raises no new security considerations beyond those
discussed in [LDP], [LDP-UP], and [RFC5331]. discussed in [LDP], [LDP-UP], and [RFC5331].
9. Acknowledgments 8. Acknowledgments
The authors wish to thank Lizhong Jin and Lizhen Bin for their The authors wish to thank Lizhong Jin and Lizhen Bin for their
comments. comments.
10. Authors' Addresses 9. Normative References
[LDP] Andersson, L., Ed., Minei, I., Ed., and B. Thomas, Ed.,
"LDP Specification", RFC 5036, October 2007.
[LDP-CAP] Thomas, B., Raza, K., Aggarwal, S., Aggarwal, R., and JL.
Le Roux, "LDP Capabilities", RFC 5561, July 2009.
[mLDP] Wijnands, IJ., Ed., Minei, I., Ed., Kompella, K., and B.
Thomas, "Label Distribution Protocol Extensions for
Point-to-Multipoint and Multipoint-to-Multipoint Label
Switched Paths", RFC 6388, November 2011.
[LDP-UP] Aggarwal, R. and JL. Le Roux, "MPLS Upstream Label
Assignment for LDP", RFC 6389, November 2011.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3032] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y.,
Farinacci, D., Li, T., and A. Conta, "MPLS Label Stack
Encoding", RFC 3032, January 2001.
[RFC5331] Aggarwal, R., Rekhter, Y., and E. Rosen, "MPLS Upstream
Label Assignment and Context-Specific Label Space", RFC
5331, August 2008.
Authors' Addresses
Maria Napierala Maria Napierala
AT&T Labs AT&T Labs
200 Laurel Avenue, Middletown, NJ 07748 200 Laurel Avenue
Middletown, NJ 07748
USA USA
E-mail: mnapierala@att.com
EMail: mnapierala@att.com
Eric C. Rosen Eric C. Rosen
Cisco Systems, Inc. Cisco Systems, Inc.
1414 Massachusetts Avenue 1414 Massachusetts Avenue
Boxborough, MA, 01719 Boxborough, MA, 01719
USA USA
E-mail: erosen@cisco.com
EMail: erosen@cisco.com
IJsbrand Wijnands IJsbrand Wijnands
Cisco Systems, Inc. Cisco Systems, Inc.
De kleetlaan 6a Diegem 1831 De kleetlaan 6a Diegem 1831
Belgium Belgium
E-mail: ice@cisco.com
11. Normative References
[LDP] Loa Andersson, Ina Minei, Bob Thomas, editors, "LDP
Specification", RFC 5036, October 2007
[LDP-CAP] Bob Thomas, Kamran Raza, Shivani Aggarwal, Rahul Aggarwal,
Jean-Louis Le Roux, "LDP Capabilities", RFC 5561, July 2009
[mLDP] IJsbrand Wijnands, Ina Minei, Kireeti Kompella, Bob Thomas,
"Label Distribution Protocol Extensions for Point-to-Multipoint and
Multipoint-to-Multipoint Label Switched Paths", RFC 6388, November
2011
[LDP-UP] Rahul Aggarwal, Jean-Louis Le Roux, "MPLS Upstream Label
Assignment for LDP", RFC 6389, November 2011
[RFC2119] "Key words for use in RFCs to Indicate Requirement EMail: ice@cisco.com
Levels.", Bradner, March 1997
[RFC3032] Eric Rosen, et. al., "MPLS Label Stack Encoding", RFC 3032,
January 2001
[RFC5331] Rahul Aggarwal, Yakov Rekhter, Eric Rosen, "MPLS Upstream
Label Assignment and Context-Specific Label Space", RFC 5331, August
2009
 End of changes. 55 change blocks. 
156 lines changed or deleted 156 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/