draft-ietf-mpls-tp-temporal-hitless-psm-03.txt   draft-ietf-mpls-tp-temporal-hitless-psm-04.txt 
MPLS Working Group A. D'Alessandro MPLS Working Group A. D'Alessandro
Internet Draft Telecom Italia Internet Draft Telecom Italia
M.Paul M.Paul
Deutsche Telekom Deutsche Telekom
Intended status: Informational S. Ueno Intended status: Informational S. Ueno
NTT Communications NTT Communications
Y.Koike Y.Koike
NTT NTT
Expires: Nov7, 2013 May 8, 2013 Expires: Mar. 20, 2014 Oct 21, 2013
Temporal and hitless path segment monitoring Temporal and hitless path segment monitoring
draft-ietf-mpls-tp-temporal-hitless-psm-03.txt draft-ietf-mpls-tp-temporal-hitless-psm-04.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts. other groups may also distribute working documents as Internet-Drafts.
skipping to change at page 1, line 36 skipping to change at page 1, line 36
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on November 7, 2013. This Internet-Draft will expire on March 20, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents carefully, publication of this document. Please review these documents carefully,
skipping to change at page 2, line 42 skipping to change at page 2, line 42
This document is a product of a joint Internet Engineering Task Force This document is a product of a joint Internet Engineering Task Force
(IETF) / International Telecommunications Union Telecommunications (IETF) / International Telecommunications Union Telecommunications
Standardization Sector (ITU-T) effort to include an MPLS Transport Standardization Sector (ITU-T) effort to include an MPLS Transport
Profile within the IETF MPLS and PWE3 architectures to support the Profile within the IETF MPLS and PWE3 architectures to support the
capabilities and functionalities of a packet transport network. capabilities and functionalities of a packet transport network.
Table of Contents Table of Contents
1. Introduction ................................................ 4 1. Introduction ................................................ 4
2. Conventions used in this document ............................ 4 2. Conventions used in this document............................ 4
2.1. Terminology ............................................ 5 2.1. Terminology ............................................ 5
2.2. Definitions ............................................ 5 2.2. Definitions ............................................ 5
3. Network objectives for monitoring ............................ 5 3. Network objectives for monitoring............................ 5
4. Problem statement ........................................... 6 4. Problem statement ........................................... 6
5. OAM functions using segment monitoring ...................... 10 5. OAM functions using segment monitoring ...................... 10
6. Further consideration of requirements for enhanced segment 6. Further consideration of requirements for enhanced segment
monitoring .................................................... 10 monitoring .................................................... 10
6.1. Necessity of on-demand single-level monitoring.......... 11 6.1. Necessity of on-demand single-level monitoring.......... 11
6.2. Necessity of on-demand monitoring independent from end-to-end 6.2. Necessity of on-demand monitoring independent from end-to-end
proactive monitoring........................................ 11 proactive monitoring........................................ 11
6.3. Necessity of arbitrary segment monitoring .............. 12 6.3. Necessity of arbitrary segment monitoring .............. 12
6.4. Fault during HPSM in case of protection ................ 13 6.4. Fault during HPSM in case of protection ................ 13
7. Summary .................................................... 15 7. Summary .................................................... 15
8. Security Considerations ..................................... 16 8. Security Considerations..................................... 16
9. IANA Considerations ........................................ 16 9. IANA Considerations ........................................ 16
10. References ................................................ 16 10. References ................................................ 16
10.1. Normative References .................................. 16 10.1. Normative References.................................. 16
10.2. Informative References ................................ 16 10.2. Informative References................................ 16
11. Acknowledgments ........................................... 16 11. Acknowledgments ........................................... 16
1. Introduction 1. Introduction
A packet transport network will enable carriers or service providers A packet transport network will enable carriers or service providers
to use network resources efficiently, reduce operational complexity to use network resources efficiently, reduce operational complexity
and provide carrier-grade network operation. Appropriate maintenance and provide carrier-grade network operation. Appropriate maintenance
functions, supporting fault location, survivability, performance functions, supporting fault location, survivability, performance
monitoring and preliminary or in-service measurements, are essential monitoring and preliminary or in-service measurements, are essential
to ensure quality and reliability of a network. They are essential in to ensure quality and reliability of a network. They are essential in
 End of changes. 7 change blocks. 
8 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/