| rfc8741xml2.original.xml | rfc8741.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="windows-1252"?> | <?xml version='1.0' encoding='utf-8'?> | |||
| <!DOCTYPE rfc SYSTEM "rfc2629.dtd"> | <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | |||
| <?rfc toc="yes" ?> | ||||
| <?rfc tocompact="yes"?> | <rfc number="8741" consensus="true" xmlns:xi="http://www.w3.org/2001/XInclude" | |||
| <?rfc tocdepth="4"?> | category="std" docName="draft-ietf-pce-lsp-control-request-11" | |||
| <?rfc tocindent="yes"?> | ipr="trust200902" obsoletes="" updates="" submissionType="IETF" | |||
| <?rfc symrefs="yes" ?> | xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" | |||
| <?rfc sortrefs="no"?> | sortRefs="true" version="3"> | |||
| <?rfc rfcedstyle="yes"?> | ||||
| <?rfc subcompact="no"?> | <!-- xml2rfc v2v3 conversion 2.37.3 --> | |||
| <?rfc compact="yes" ?> | ||||
| <?rfc iprnotified="Yes" ?> | ||||
| <?rfc strict="no" ?> | ||||
| <rfc category="std" docName="draft-ietf-pce-lsp-control-request-11" ipr="trust20 | ||||
| 0902" obsoletes="" updates="" submissionType="IETF" xml:lang="en"> | ||||
| <front> | <front> | |||
| <title abbrev="LSP Control Request"> | <title abbrev="LSP Control Request"> | |||
| Ability for a Stateful Path Computation Element (PCE) to request and obtain | Ability for a Stateful Path Computation Element (PCE) to Request and | |||
| control of a Label Switched Path (LSP)</title> | Obtain Control of a Label Switched Path (LSP)</title> | |||
| <seriesInfo name="RFC" value="8741"/> | ||||
| <author fullname="Aswatnarayan Raghuram" initials="A." surname="Raghuram"> | <author fullname="Aswatnarayan Raghuram" initials="A." surname="Raghuram"> | |||
| <organization>AT&T</organization> | <organization>AT&T</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>200 S Laurel Aevenue</street> | <street>200 S Laurel Avenue</street> | |||
| <city>Middletown</city> | <city>Middletown</city> | |||
| <region>NJ</region> | <region>NJ</region> | |||
| <code>07748</code> | <code>07748</code> | |||
| <country>USA</country> | <country>United States of America</country> | |||
| </postal> | </postal> | |||
| <email>ar2521@att.com</email> | <email>ar2521@att.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author fullname="Al Goddard" initials="A." surname="Goddard"> | ||||
| <author fullname="Al Goddard" initials="A." surname="Goddard"> | ||||
| <organization>AT&T</organization> | <organization>AT&T</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>200 S Laurel Aevenue</street> | <street>200 S Laurel Avenue</street> | |||
| <city>Middletown</city> | <city>Middletown</city> | |||
| <region>NJ</region> | <region>NJ</region> | |||
| <code>07748</code> | <code>07748</code> | |||
| <country>USA</country> | <country>United States of America</country> | |||
| </postal> | </postal> | |||
| <email>ag6941@att.com</email> | <email>ag6941@att.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author fullname="Jay Karthik" initials="J." surname="Karthik"> | ||||
| <author fullname="Jay Karthik" initials="J." surname="Karthik"> | ||||
| <organization>Cisco Systems, Inc.</organization> | <organization>Cisco Systems, Inc.</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>125 High Street</street> | <street>125 High Street</street> | |||
| <city>Boston</city> | <city>Boston</city> | |||
| <region>Massachusetts</region> | <region>Massachusetts</region> | |||
| <code>02110</code> | <code>02110</code> | |||
| <country>USA</country> | <country>United States of America</country> | |||
| </postal> | </postal> | |||
| <email>jakarthi@cisco.com</email> | <email>jakarthi@cisco.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan"> | ||||
| <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan"> | ||||
| <organization>Cisco Systems, Inc.</organization> | <organization>Cisco Systems, Inc.</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>2000 Innovation Drive</street> | <street>2000 Innovation Drive</street> | |||
| <city>Kanata</city> | <city>Kanata</city> | |||
| <region>Ontario</region> | <region>Ontario</region> | |||
| <code>K2K 3E8</code> | <code>K2K 3E8</code> | |||
| <country>Canada</country> | <country>Canada</country> | |||
| </postal> | </postal> | |||
| <email>msiva@cisco.com</email> | <email>msiva@cisco.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="M" surname="Negi" fullname="Mahendra Singh Negi"> | ||||
| <author initials="M" surname="Negi" fullname="Mahendra Singh Negi"> | ||||
| <organization>Huawei Technologies</organization> | <organization>Huawei Technologies</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>Divyashree Techno Park, Whitefield</street> | <street>Divyashree Techno Park, Whitefield</street> | |||
| <city>Bangalore</city> | <city>Bangalore</city> | |||
| <region>Karnataka</region> | <region>Karnataka</region> | |||
| <code>560066</code> | <code>560066</code> | |||
| <country>India</country> | <country>India</country> | |||
| </postal> | </postal> | |||
| <email>mahend.ietf@gmail.com</email> | <email>mahend.ietf@gmail.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date month="February" year="2020"/> | ||||
| <date year="2019"/> | ||||
| <workgroup>PCE Working Group</workgroup> | <workgroup>PCE Working Group</workgroup> | |||
| <abstract> | <abstract> | |||
| <t>A stateful Path Computation Element (PCE) retains information about | ||||
| <t>A Stateful Path Computation Element (PCE) retains information about the place | the placement of Multiprotocol Label Switching (MPLS) Traffic | |||
| ment of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched | Engineering Label Switched Paths (TE LSPs). When a PCE has stateful | |||
| Paths (TE LSPs). When a PCE has stateful control over LSPs it may send indicatio | control over LSPs, it may send indications to LSP head-ends to modify the | |||
| ns to LSP head-ends to modify the attributes (especially the paths) of the LSPs. | attributes (especially the paths) of the LSPs. A Path Computation Client | |||
| A Path Computation Client (PCC) that has set up LSPs under local configuration | (PCC) that has set up LSPs under local configuration may delegate | |||
| may delegate control of those LSPs to a stateful PCE.</t> | control of those LSPs to a stateful PCE.</t> | |||
| <t>There are use cases in which a stateful PCE may wish to obtain | ||||
| <t>There are use-cases in which a stateful PCE may wish to obtain control of loc | control of locally configured LSPs that it is aware of but have | |||
| ally configured LSPs of which it is aware but that have not been delegated to th | not been delegated to the PCE.</t> | |||
| e PCE.</t> | <t>This document describes an extension to the Path Computation Element | |||
| Communication Protocol (PCEP) to enable a PCE to make requests for | ||||
| <t>This document describes an extension to the Path Computation Element | ||||
| communication Protocol (PCEP) to enable a PCE to make requests for | ||||
| such control.</t> | such control.</t> | |||
| </abstract> | ||||
| </abstract> | </front> | |||
| <middle> | ||||
| </front> | <section anchor="Introduction" numbered="true" toc="default"> | |||
| <name>Introduction</name> | ||||
| <middle> | <t>"Path Computation Element Communication Protocol (PCEP) Extensions | |||
| for Stateful PCE" | ||||
| <section anchor="Introduction" title="Introduction"> | <xref target="RFC8231" format="default"/> specifies a set of | |||
| extensions to PCEP <xref target="RFC5440" format="default"/> to enable | ||||
| <t>Stateful Path Computation Element (PCE) communication Protocol (PCEP) extensi | stateful control of Traffic Engineering Label Switched Paths (TE LSPs) | |||
| ons <xref target="RFC8231"/> specifies a set of extensions to PCEP <xref target= | between and across PCEP sessions in compliance with <xref | |||
| "RFC5440"/> to enable stateful control of Traffic Engineering Label Switched Pat | target="RFC4657" format="default"/>. | |||
| hs (TE LSPs) between and across PCEP sessions in compliance with <xref target="R | It includes mechanisms to | |||
| FC4657"/>. It includes mechanisms to synchronize LSP state between Path Computat | synchronize LSP state between Path Computation Clients (PCCs) and PCEs, | |||
| ion Clients (PCCs) and PCEs, delegate control of LSPs to PCE, and PCE-control of | delegate control of LSPs to PCEs, and allow PCEs to control the timing and | |||
| timing and sequence of path computations within and across PCEP sessions. The s | sequence | |||
| tateful PCEP defines the following two useful network operations: | of path computations within and across PCEP sessions. The stateful PCEP | |||
| defines the following two useful network operations: | ||||
| <list style="symbols"> | </t> | |||
| <t>Delegation: As per <xref target="RFC8051"/>, an operation to grant a | <dl newline="false" indent="13" spacing="normal"> | |||
| PCE temporary rights to modify a | <dt>Delegation:</dt> | |||
| <dd>As per <xref target="RFC8051" format="default"/>, an operation to | ||||
| grant a PCE temporary rights to modify a | ||||
| subset of LSP parameters on one or more LSPs of a PCC. LSPs are | subset of LSP parameters on one or more LSPs of a PCC. LSPs are | |||
| delegated from a PCC to a PCE and are referred to as "delegated" | delegated from a PCC to a PCE and are referred to as "delegated" | |||
| LSPs.</t> | LSPs.</dd> | |||
| <dt>Revocation:</dt> | ||||
| <t>Revocation: As per <xref target="RFC8231"/>, an operation performed by a PCC | <dd>As per <xref target="RFC8231" format="default"/>, an operation | |||
| on a previously | performed by a PCC on a previously delegated LSP. Revocation revokes | |||
| delegated LSP. Revocation revokes the rights granted to the PCE | the rights granted to the PCE in the delegation operation.</dd> | |||
| in the delegation operation.</t> | </dl> | |||
| </list> | <t>For redundant stateful PCEs (<xref target="RFC8231" | |||
| </t> | sectionFormat="of" section="5.7.4"/>), during a PCE failure, one of the re | |||
| dundant PCEs | ||||
| <t>For Redundant Stateful PCEs (section 5.7.4. of <xref target="RFC8231"/>), dur | might want to request to take control over an LSP. The redundant PCEs | |||
| ing a PCE failure, one of the redundant PCE might want to request to take contro | may use a local policy or a proprietary election mechanism to decide | |||
| l over an LSP. The redundant PCEs may use a local policy or a proprietary elect | which PCE would take control. In this case, a mechanism is needed for a | |||
| ion mechanism to decide which PCE would take control. In this case, a mechanism | stateful PCE to request control of one or more LSPs from a PCC so that | |||
| is needed for a stateful PCE to request control of one or more LSPs from a PCC, | a newly elected primary PCE can request to take over control.</t> | |||
| so that a newly elected primary PCE can request to take over control.</t> | <t>In case of virtualized PCEs (vPCEs) running in virtual network | |||
| function (VNF) mode, as the computation load in the network increases, a | ||||
| <t>In case of virtualized PCEs (vPCEs) running in virtual network function (VNF) | new instance of vPCE could be instantiated to balance the current | |||
| mode, as the computation load in the network increases, a new instance of vPCE | load. | |||
| could be instantiated to balance the current load. The PCEs could use a propriet | The PCEs could use a proprietary algorithm to decide which LSPs can | |||
| ary algorithm to decide which LSPs to be assigned to the new vPCE. Thus, having | be assigned to the new vPCE. Thus, having a mechanism for the PCE to | |||
| a mechanism for the PCE to request control of some LSPs is needed.</t> | request control of some LSPs is needed.</t> | |||
| <t>In some deployments, the operator would like to use stateful PCE for | ||||
| <t>In some deployments, the operator would like to use stateful PCE for global o | global optimization algorithms but would still like to keep the control | |||
| ptimization algorithms but would still like to keep the control of the LSP at th | of the LSP at the PCC. In such cases, a stateful PCE could request to | |||
| e PCC. In such cases, a stateful PCE could request to take control during the gl | take control during the global optimization and return the delegation | |||
| obal optimization and return the delegation once done.</t> | once done.</t> | |||
| <t>Note that <xref target="RFC8231" format="default"/> specifies a | ||||
| <t>Note that <xref target="RFC8231"/> specifies a mechanism for a PCC to delegat | mechanism for a PCC to delegate an orphaned LSP to another PCE. The | |||
| e an orphaned LSP to another PCE. The mechanism defined in this document can be | mechanism defined in this document can be used in conjunction with <xref | |||
| used in conjunction to <xref target="RFC8231"/>. Ultimately, it is the PCC that | target="RFC8231" format="default"/>. Ultimately, it is the PCC that | |||
| decides which PCE to delegate the orphaned LSP to.</t> | decides which PCE to delegate the orphaned LSP to.</t> | |||
| <!-- Dhruv commented this section | ||||
| <t>Some network operators prefer head-end (PCC) based reactivity to network even | ||||
| ts (e.g., link failure). For example, typically operators would like to reduce t | ||||
| he time that backup LSP are being used for fast-reroute protection as the links | ||||
| that a backup LSP traverses may be congested when fast-reroute is active. PCC ba | ||||
| sed LSP failure detection and re-routing mechanisms enable operators to minimize | ||||
| the duration of such congestion and meet operational requirements/constraints. | ||||
| As such, during normal operations, it may be preferable for PCC to have full con | ||||
| trol of its LSPs. However, operators shall prefer to use PCE for planned events | ||||
| such as centralized optimization and placement of LSPs. In this case, it is pref | ||||
| erable for a PCE to obtain the control of one or more LSPs from a PCC, rather th | ||||
| an waiting for the PCC to delegate the control. Once the PCE completes its opera | ||||
| tion, it relinquishes the control of the LSPs. Such capability enables operators | ||||
| to combine the benefits of both centralized and distributed control of TE LSPs | ||||
| to get the best of both worlds.</t> | ||||
| <t>This specification provides a simple extension: by using it a PCE can request | ||||
| control of one or more LSPs from any PCC over the stateful PCEP session. The pr | ||||
| ocedures for granting and relinquishing control of the LSPs are specified in acc | ||||
| ordance with the specification <xref target="RFC8231"/> unless explicitly set as | ||||
| ide in this document. </t> | ||||
| </section> <!-- Introduction --> | ||||
| <section title="Terminology"> | ||||
| <t> This document uses the following terms defined in <xref target="RFC5440"/>: | ||||
| <list style="hanging"> | ||||
| <t hangText=" PCC:">Path Computation Client.</t> | ||||
| <t hangText=" PCE:">Path Computation Element.</t> | ||||
| <t hangText=" PCEP:">Path Computation Element communication Protocol.</t> | ||||
| </list> | ||||
| </t> | ||||
| <t>This document uses the following terms defined in <xref target="RFC8231"/>: | ||||
| <list style="hanging"> | ||||
| <t hangText=" PCRpt:">Path Computation State Report message.</t> | ||||
| <t hangText=" PCUpd:">Path Computation Update Request message.</t> | ||||
| <t hangText=" PLSP-ID:">A PCEP-specific identifier for the LSP.</t> | ||||
| <t hangText=" SRP:">Stateful PCE Request Parameters.</t> | ||||
| </list> | ||||
| </t> | ||||
| <t>Readers of this document are expected to have some familiarity with <xref tar | ||||
| get="RFC8231"/>.</t> | ||||
| <section title="Requirements Language"> | ||||
| <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL | ||||
| NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", | ||||
| "MAY", and "OPTIONAL" in this document are to be interpreted as | ||||
| described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when | ||||
| , and only when, they | ||||
| appear in all capitals, as shown here.</t> | ||||
| </section> | ||||
| </section> <!-- Terminology --> | ||||
| <section anchor="LSP-Gain-Flag" title="LSP Control Request Flag"> | ||||
| <t>The Stateful PCE Request Parameters (SRP) object is defined in Section 7.2 of | ||||
| <xref target="RFC8231"/> and it includes a Flags field.</t> | ||||
| <!-- changed from LSp to SRP by Dhruv | ||||
| <figure anchor="LSP-Object" title="The LSP Object"> | ||||
| <artwork align="center"><![CDATA[ | ||||
| 0 1 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | PLSP-ID |Flags|G|C| O|A|R|S|D| | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | TLVs | | ||||
| ~ ~ | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| ]]></artwork> | ||||
| </figure> | ||||
| --> | ||||
| <!-- | ||||
| <figure anchor="SRP-Object" title="The SRP Object"> | ||||
| <artwork align="center"><![CDATA[ | ||||
| 0 1 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | Flags |C|R| | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | SRP-ID-number | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | | | ||||
| // Optional TLVs // | ||||
| | | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| ]]></artwork> | ||||
| </figure> --> | ||||
| <t>A new flag, the "LSP-Control Request Flag" (C) - TBD, is introduced in the SR | ||||
| P object. On a PCUpd message, a PCE sets the C Flag to 1 to indicate that it wis | ||||
| hes to gain control of LSPs. The LSPs are identified by the PLSP-ID in the LSP o | ||||
| bject following the SRP object. A PLSP-ID of value other than 0 and 0xFFFFF is u | ||||
| sed to identify the LSP for which the PCE requests control. The PLSP-ID value of | ||||
| 0 indicates that the PCE is requesting control of all LSPs originating from the | ||||
| PCC that it wishes to delegate. The C Flag has no meaning in other PCEP message | ||||
| s that carry SRP objects and for which the C flag MUST be set to 0 on transmissi | ||||
| on and MUST be ignored on receipt.</t> | ||||
| </section> | <t>This specification provides a simple extension that allows a PCE | |||
| to request control of one or more LSPs from any PCC over the stateful | ||||
| PCEP session. The procedures for granting and relinquishing control of | ||||
| the LSPs are specified in accordance with <xref | ||||
| target="RFC8231" format="default"/> unless explicitly set aside in this | ||||
| document.</t> | ||||
| </section> | ||||
| <!-- Introduction --> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>Terminology</name> | ||||
| <t> This document uses the following terms defined in <xref target="RFC544 | ||||
| 0" format="default"/>: | ||||
| </t> | ||||
| <section anchor="Operation" title="Operation"> | <dl newline="false" spacing="normal" indent="6"> | |||
| <dt> PCC:</dt> | ||||
| <dd>Path Computation Client</dd> | ||||
| <dt> PCE:</dt> | ||||
| <dd>Path Computation Element</dd> | ||||
| <dt> PCEP:</dt> | ||||
| <dd>Path Computation Element communication Protocol</dd> | ||||
| </dl> | ||||
| <t>This document uses the following terms defined in <xref target="RFC8231 | ||||
| " format="default"/>: | ||||
| </t> | ||||
| <dl newline="false" spacing="normal" indent="6"> | ||||
| <dt> PCRpt:</dt> | ||||
| <dd>Path Computation State Report message</dd> | ||||
| <dt> PCUpd:</dt> | ||||
| <dd>Path Computation Update Request message</dd> | ||||
| <dt> PLSP-ID:</dt> | ||||
| <dd>A PCEP-specific identifier for the LSP</dd> | ||||
| <dt> SRP:</dt> | ||||
| <dd>Stateful PCE Request Parameters</dd> | ||||
| </dl> | ||||
| <t>Readers of this document are expected to have some familiarity with <xr | ||||
| ef target="RFC8231" format="default"/>.</t> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>Requirements Language</name> | ||||
| <t> | ||||
| The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | ||||
| IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | ||||
| NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | ||||
| RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ||||
| "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | ||||
| be interpreted as | ||||
| described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | ||||
| when, and only when, they appear in all capitals, as shown here. | ||||
| </t> | ||||
| </section> | ||||
| </section> | ||||
| <!-- Terminology --> | ||||
| <section anchor="LSP-Gain-Flag" numbered="true" toc="default"> | ||||
| <name>LSP Control Request Flag</name> | ||||
| <t>The Stateful PCE Request Parameters (SRP) object is defined in | ||||
| <xref target="RFC8231" sectionFormat="of" section="7.2"/> and includes | ||||
| a Flags field.</t> | ||||
| <t>During normal operation, a PCC that wishes to delegate the control of an LSP | <t>A new "LSP-Control Request" flag (30), also called the C | |||
| sets the D Flag (delegate, Section 7.3 of <xref target="RFC8231"/>) to 1 in all | flag, is introduced in the SRP object. In a PCUpd message, a PCE sets | |||
| PCRpt messages pertaining to the LSP. The PCE confirms the delegation by setting | the C flag to 1 to indicate that it wishes to gain control of LSPs. The | |||
| D Flag to 1 in all PCUpd messages pertaining to the LSP. The PCC revokes the co | LSPs are identified by the PLSP-ID in the LSP object following the SRP | |||
| ntrol of the LSP from the PCE by setting D Flag to 0 in PCRpt messages pertainin | object. A PLSP-ID value other than 0 and 0xFFFFF is used to identify | |||
| g to the LSP. If the PCE wishes to relinquish the control of the LSP, it sets D | the LSP for which the PCE requests control. A PLSP-ID value of 0 | |||
| Flag to 0 in all PCUpd messages pertaining to the LSP.</t> | indicates that the PCE is requesting control of all LSPs originating | |||
| from the PCC that it wishes to delegate. The C flag has no meaning in | ||||
| other PCEP messages that carry SRP objects and for which the C flag | ||||
| <bcp14>MUST</bcp14> be set to 0 on transmission and <bcp14>MUST</bcp14> | ||||
| be ignored on receipt.</t> | ||||
| <t>The C flag is ignored in case the R flag <xref target="RFC8281"/> in th | ||||
| e SRP object | ||||
| is set.</t> | ||||
| </section> | ||||
| <section anchor="Operation" numbered="true" toc="default"> | ||||
| <name>Operation</name> | ||||
| <t>During normal operation, a PCC that wishes to delegate the control of | ||||
| an LSP sets the Delegate (D) flag (<xref target="RFC8231" | ||||
| sectionFormat="of" section="7.3"/>) to 1 in all PCRpt messages pertaining | ||||
| to the | ||||
| LSP. The PCE confirms the delegation by setting the D flag to 1 in all PCU | ||||
| pd | ||||
| messages pertaining to the LSP. The PCC revokes the control of the LSP | ||||
| from the PCE by setting the D flag to 0 in PCRpt messages pertaining to th | ||||
| e | ||||
| LSP. If the PCE wishes to relinquish the control of the LSP, it sets the | ||||
| D flag to 0 in all PCUpd messages pertaining to the LSP.</t> | ||||
| <t>If a PCE wishes to gain control over an LSP, it sends a PCUpd message with C | <t>If a PCE wishes to gain control over an LSP, it sends a PCUpd message | |||
| Flag set to 1 in SRP object. The LSP for which the PCE requests control is ident | with the C flag set to 1 in the SRP object. The LSP for which the PCE requ | |||
| ified by the PLSP-ID in the associated LSP object. The PLSP-ID of 0 indicates th | ests | |||
| at the PCE wants control over all LSPs originating from the PCC. <!--A PCC that | control is identified by the PLSP-ID in the associated LSP object. A | |||
| receives a PCUpd message with C Flag set to 1 and PLSP-ID of 0 MUST NOT trigger | PLSP-ID value of 0 indicates that the PCE wants control over all LSPs | |||
| the error condition for unknown PLSP-ID in an LSP update request as per <xref ta | originating from the PCC. | |||
| rget="RFC8231"/>.--> An implementation of this feature needs to make sure to che | An implementation of this feature needs to make | |||
| ck for the LSP control feature (C flag set to 1) before any check for PLSP-ID (a | sure to check for the LSP control feature (C flag set to 1) before any | |||
| s prescribed in <xref target="RFC8231"/>). The D Flag and C Flag are mutually ex | check for PLSP-ID (as per <xref target="RFC8231" | |||
| clusive in a PCUpd message. The PCE MUST NOT send a control request for the LSP | format="default"/>). The D flag and C flag are mutually exclusive in a | |||
| which is already delegated to the PCE, i.e. if the D Flag is set in the PCUpd me | PCUpd message. The PCE <bcp14>MUST NOT</bcp14> send a control request | |||
| ssage, then the C Flag MUST NOT be set. If a PCC receives a PCUpd message with D | for the LSP that is already delegated to the PCE, i.e., if the D flag is | |||
| Flag set in the LSP object (i.e. LSP is already delegated) and | set in the PCUpd message, then the C flag <bcp14>MUST NOT</bcp14> be | |||
| the C Flag is also set (i.e. PCE is making a control request), the PCC MUST igno | set. If a PCC receives a PCUpd message with the D flag set in the LSP obje | |||
| re the C Flag. A PCC can decide to delegate the control of the LSP at its own di | ct | |||
| scretion. If the PCC grants or denies the control, it sends a PCRpt message with | (i.e., LSP is already delegated) and | |||
| D Flag set to 1 and 0 respectively in accordance with stateful PCEP <xref targe | the C flag is also set (i.e., PCE is making a control request), the PCC | |||
| t="RFC8231"/>. If the PCC does not grant the control, it MAY choose to not respo | <bcp14>MUST</bcp14> ignore the C flag. A PCC can decide to delegate the | |||
| nd, and the PCE MAY choose to retry requesting the control preferably using expo | control of the LSP at its own discretion. If the PCC grants or denies the | |||
| nentially increasing timer. Note that, if the PCUpd message with C Flag set is r | control, it sends a PCRpt message with the D flag set to 1 and 0, respectively, | |||
| eceived for a currently non-delegated LSP (for which the PCE is requesting deleg | in | |||
| ation), this MUST NOT trigger the error handling as specified in <xref target="R | accordance with stateful PCEP <xref target="RFC8231" format="default"/>. If | |||
| FC8231"/> (a PCErr with Error-type=19 (Invalid Operation) | the PCC does not grant the control, it <bcp14>MAY</bcp14> choose to not | |||
| and error-value 1 (Attempted LSP Update Request for a non-delegated | respond, and the PCE <bcp14>MAY</bcp14> choose to retry requesting the control, | |||
| preferably using an exponentially increasing timer. Note that, if the PCUpd | ||||
| message with the C flag set is received for a currently non-delegated LSP (for | ||||
| which the PCE is requesting delegation), this <bcp14>MUST NOT</bcp14> trigger | ||||
| the error handling as specified in <xref target="RFC8231" format="default"/> | ||||
| (a PCErr with Error-type=19 (Invalid Operation) and error-value 1 (Attempted | ||||
| LSP Update Request for a non-delegated | ||||
| LSP)).</t> | LSP)).</t> | |||
| <t>As per <xref target="RFC8231" format="default"/>, a PCC cannot | ||||
| delegate an LSP to more than one PCE at any time. If a PCE requests | ||||
| control of an LSP that has already been delegated by the PCC to another | ||||
| PCE, the PCC <bcp14>MAY</bcp14> ignore the request or | ||||
| <bcp14>MAY</bcp14> revoke | ||||
| the delegation to the first PCE before delegating it to the second. This | ||||
| choice is a matter of local policy.</t> | ||||
| <t>As per <xref target="RFC8231"/>, a PCC cannot delegate an LSP to more than on | <t> | |||
| e PCE at any time. If a PCE requests control of an LSP that has already been del | It should be noted that a legacy implementation of PCC that does not | |||
| egated by the PCC to another PCE, the PCC MAY ignore the request, or MAY revoke | support this extension may receive an LSP control request: a PCUpd | |||
| the delegation to the first PCE before delegating it to the second. This choi | message with the C flag set and the D flag unset. The legacy implementation | |||
| ce is a matter of local policy.</t> | would ignore the C flag and trigger the error condition for the D flag, as | |||
| specified in <xref target="RFC8231" format="default"/> (i.e., a PCErr with | ||||
| <!--<t>It should be noted that a legacy implementation of PCC, that does not und | Error-type=19 (Invalid Operation) and error-value 1 (Attempted LSP Update | |||
| erstand the C Flag in PCUpd message, would simply ignore the flag (and the reque | Request for a non-delegated LSP)). Further, in case of a PLSP-ID value of | |||
| st to grant control over the LSP). At the same time it would trigger the error c | 0, the error condition, as specified in <xref target="RFC8231" | |||
| ondition as specified in <xref target="RFC8231"/> (a PCErr with Error-type=19 (I | format="default"/>, (i.e., a PCErr with Error-type=19 (Invalid Operation) | |||
| nvalid Operation) | and error-value 3 (Attempted LSP Update Request for an LSP identified by an | |||
| and error-value 1 (Attempted LSP Update Request for a non-delegated | unknown PSP-ID)) would be triggered.</t> | |||
| LSP)).</t>--> | <t><xref target="RFC8281" format="default"/> describes the setup, | |||
| maintenance, and teardown of PCE-initiated LSPs under the stateful PCE | ||||
| <t>It should be noted that a legacy implementation of PCC that does not | ||||
| support this extension would receive an LSP control request: PCUpd message wit | ||||
| h C flag set and D flag (delegate) unset, it would ignore the C flag and trigger | ||||
| the error condition for the D flag as specified in <xref target="RFC8231"/> (a | ||||
| PCErr with Error-type=19 (Invalid Operation) and | ||||
| error-value 1 (Attempted LSP Update Request for a non-delegated LSP)). Further | ||||
| , in case of PLSP-ID of 0, the error condition as specified | ||||
| in <xref target="RFC8231"/> (a PCErr with Error-type=19 (Invalid Operation) an | ||||
| d | ||||
| error-value 3 (Attempted LSP Update Request for an LSP identified by an unknow | ||||
| n PSP-ID)) would be triggered.</t> | ||||
| <t><xref target="RFC8281"/> describes the setup, | ||||
| maintenance and teardown of PCE-initiated LSPs under the stateful PCE | ||||
| model. It also specifies how a PCE may obtain control over an orphaned LSP | model. It also specifies how a PCE may obtain control over an orphaned LSP | |||
| that was PCE-initiated. A PCE implementation can apply the mechanism describe d | that was PCE-initiated. A PCE implementation can apply the mechanism describe d | |||
| in this document in conjunction with those in <xref target="RFC8281"/>.</t> | in this document in conjunction with those in <xref target="RFC8281" | |||
| format="default"/>.</t> | ||||
| </section> | </section> | |||
| <section anchor="Imp" title="Implementation Status"> | <section anchor="Security" numbered="true" toc="default"> | |||
| <t>[Note to the RFC Editor - remove this section before publication, as well as | <name>Security Considerations</name> | |||
| remove the reference to RFC 7942.]</t> | <t>The security considerations listed in <xref target="RFC8231" | |||
| <t>This section records the status of known implementations of the | format="default"/> and <xref target="RFC8281" format="default"/> | |||
| protocol defined by this specification at the time of posting of | ||||
| this Internet-Draft, and is based on a proposal described in | ||||
| <xref target="RFC7942"/>. The description of implementations in this secti | ||||
| on is | ||||
| intended to assist the IETF in its decision processes in | ||||
| progressing drafts to RFCs. Please note that the listing of any | ||||
| individual implementation here does not imply endorsement by the | ||||
| IETF. Furthermore, no effort has been spent to verify the | ||||
| information presented here that was supplied by IETF contributors. | ||||
| This is not intended as, and must not be construed to be, a | ||||
| catalog of available implementations or their features. Readers | ||||
| are advised to note that other implementations may exist.</t> | ||||
| <t>According to <xref target="RFC7942"/>, "this will allow reviewers and wo | ||||
| rking | ||||
| groups to assign due consideration to documents that have the | ||||
| benefit of running code, which may serve as evidence of valuable | ||||
| experimentation and feedback that have made the implemented | ||||
| protocols more mature. It is up to the individual working groups | ||||
| to use this information as they see fit".</t> | ||||
| <section anchor="Onos" title="Huawei's Proof of Concept based on ONOS"> | ||||
| <t>The PCE function was developed in the ONOS open source platform. This exten | ||||
| sion was implemented on a private version as a proof of concept to enable multi- | ||||
| instance support. | ||||
| <list style="symbols"> | ||||
| <t>Organization: Huawei</t> | ||||
| <t>Implementation: Huawei's PoC based on ONOS</t> | ||||
| <t>Description: PCEP as a southbound plugin was added to ONOS. To support mu | ||||
| lti-instance ONOS deployment in a cluster, this extension in PCEP is used. Refer | ||||
| https://wiki.onosproject.org/display/ONOS/PCEP+Protocol</t> | ||||
| <t>Maturity Level: Prototype</t> | ||||
| <t>Coverage: Full</t> | ||||
| <t>Contact: satishk@huawei.com</t> | ||||
| </list></t> | ||||
| </section> | ||||
| </section> | ||||
| <section anchor="Security" title="Security Considerations"> | ||||
| <t>The security considerations listed in <xref target="RFC8231"/> and <xref targ | ||||
| et="RFC8281"/> | ||||
| apply to this document as well. However, this document also | apply to this document as well. However, this document also | |||
| introduces a new attack vector. An attacker may flood the PCC with request to | introduces a new attack vector. An attacker may flood the PCC with requests | |||
| delegate all of its LSPs | to delegate all of its LSPs | |||
| at a rate which exceeds the PCC's ability to process them, either by spoofing | at a rate that exceeds the PCC's ability to process them, either by | |||
| messages or by compromising the PCE itself. | spoofing messages or by compromising the PCE itself. | |||
| The PCC SHOULD be configured with a threshold rate for the delegation request | The PCC <bcp14>SHOULD</bcp14> be configured with a threshold rate for the | |||
| s received from the PCE. If the threshold is reached, it is RECOMMENDED to log t | delegation requests received from the PCE. If the threshold is reached, | |||
| he issue.</t> | it is <bcp14>RECOMMENDED</bcp14> to log the issue.</t> | |||
| <t>A PCC is the ultimate arbiter of delegation. As per <xref | ||||
| <t>A PCC is the ultimate arbiter of delegation. As per <xref target="RFC8231" | target="RFC8231" format="default"/>, a local policy at the PCC is used to | |||
| />, a local policy at PCC is used to influence the delegation. A PCC can also re | influence the delegation. A PCC can also revoke the delegation at any | |||
| voke the delegation at any time. A PCC need not blindly trust the control reques | time. A PCC need not blindly trust the control requests and | |||
| ts and SHOULD take local policy and other factors into consideration before hono | <bcp14>SHOULD</bcp14> take local policy and other factors into | |||
| ring the request. </t> | consideration before honoring the request. </t> | |||
| <t>Note that a PCE may not be sure if a PCC supports this feature. A | ||||
| <t>Note that, a PCE may not be sure if a PCC supports this feature. A PCE wou | PCE would try sending a control request to a 'legacy' PCC that would | |||
| ld try sending a control request to a 'legacy' PCC, which would in turn respond | in turn respond with an error, as described in <xref target="Operation" | |||
| with an error as described in <xref target="Operation"/>. So a PCE would learn t | format="default"/>. So, a PCE would learn this fact only when it wants to | |||
| his fact only when it wants to take control over an LSP. A PCE might also be sus | take control over an LSP. A PCE might also be susceptible to downgrade | |||
| ceptible to a downgrade attacks by falsifying the error condition.</t> | attacks by falsifying the error condition.</t> | |||
| <t>As per <xref target="RFC8231" format="default"/>, it is <bcp14>RECOMMEN | ||||
| <t>As per <xref target="RFC8231"/>, it is RECOMMENDED | DED</bcp14> | |||
| that these PCEP extensions only be activated on authenticated and | that these PCEP extensions only be activated on authenticated and | |||
| encrypted sessions across PCEs and PCCs belonging to the same | encrypted sessions across PCEs and PCCs belonging to the same | |||
| administrative authority, using Transport Layer Security (TLS) | administrative authority, using Transport Layer Security (TLS) | |||
| <xref target="RFC8253"/>, as per the recommendations and best current practic | <xref target="RFC8253" format="default"/>, as per the recommendations and | |||
| es in | best current practices in | |||
| BCP 195 <xref target="RFC7525"/> (unless explicitly excluded in <xref target= | BCP 195 <xref target="RFC7525" format="default"/> (unless explicitly | |||
| "RFC8253"/>). | excluded in <xref target="RFC8253" format="default"/>). | |||
| </t> | </t> | |||
| </section> | ||||
| </section> | <section anchor="IANA" numbered="true" toc="default"> | |||
| <name>IANA Considerations</name> | ||||
| <section anchor="IANA" title="IANA Considerations"> | ||||
| <section anchor="IANA-srp" title="SRP Object Flags"> | ||||
| <t>IANA maintains a registry called the "Path Computation Element Protocol (PCEP | ||||
| ) Numbers" registry. It contains a subregistry called | ||||
| the "SRP Object Flag Field" registry. This document requests IANA to allocat | ||||
| e following code point in the "SRP Object Flag Field" subregistry.</t> | ||||
| <texttable style="none" suppress-title="true" title="" align="center"> | <t>IANA has allocated the following code point in the "SRP Object Flag | |||
| <ttcol align="left" width="20%">Bit</ttcol> | Field" subregistry in the "Path Computation Element Protocol (PCEP) | |||
| <ttcol align="left" width="30%">Description</ttcol> | Numbers" registry.</t> | |||
| <ttcol align="left" width="20%">Reference</ttcol> | <table align="center"> | |||
| <c>TBD</c> | <thead> | |||
| <c>LSP-Control Request Flag</c> | <tr> | |||
| <c>This document</c> | <th align="left">Bit</th> | |||
| </texttable></section> | <th align="left">Description</th> | |||
| <th align="left">Reference</th> | ||||
| </tr> | ||||
| </thead> | ||||
| <tbody> | ||||
| <tr> | ||||
| <td align="left">30</td> | ||||
| <td align="left">LSP Control Request</td> | ||||
| <td align="left">RFC 8741</td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| </section> | ||||
| </section> | <section toc="default" numbered="true"> | |||
| <name>Manageability Considerations</name> | ||||
| <t> | ||||
| All manageability requirements and considerations listed in <xref | ||||
| target="RFC5440" format="default"/> | ||||
| and <xref target="RFC8231" format="default"/> | ||||
| apply to PCEP extensions defined in this document. In addition, | ||||
| requirements and considerations listed in this section apply. | ||||
| </t> | ||||
| <section toc="default" numbered="true"> | ||||
| <name>Control of Function and Policy</name> | ||||
| <section title="Manageability Considerations" toc="default"> | <t> | |||
| <t> | A PCC implementation <bcp14>SHOULD</bcp14> allow the operator to configure | |||
| All manageability requirements and considerations listed in <xref target="RFC5 | the policy rules that specify the conditions under which it honors the | |||
| 440" pageno="false" format="default"/> | request to control the LSPs. This includes the handling of the case where an | |||
| and <xref target="RFC8231" pageno="false" format="default"/> | LSP control request is received for an LSP that is currently delegated to | |||
| apply to PCEP protocol extensions defined in this document. In addition, requi | some other PCE. A PCC implementation <bcp14>SHOULD</bcp14> also allow the | |||
| rements and considerations listed in this section apply. | operator to configure the threshold rate for the delegation requests | |||
| </t> | received from the PCE. Further, the operator <bcp14>MAY</bcp14> be allowed | |||
| <section title="Control of Function and Policy" toc="default"> | to trigger the LSP control request for a particular LSP at the PCE. A PCE | |||
| <t> | implementation <bcp14>SHOULD</bcp14> also allow the operator to configure an | |||
| A PCC implementation SHOULD allow the operator to configure the policy based o | exponentially increasing timer to retry the control requests for which the | |||
| n which it honors the request to control the LSPs. This includes the handling of | PCE did not get a response. | |||
| the case where an LSP | </t> | |||
| control request is received for an LSP that is currently delegated to some oth | </section> | |||
| er PCE. A PCC implementation SHOULD also allow the operator to configure the thr | <section toc="default" numbered="true"> | |||
| eshold rate based on which it accepts the delegation requests from the PCE. | <name>Information and Data Models</name> | |||
| Further, the operator MAY be allowed to trigger the LSP control request for a | <t>The PCEP YANG module <xref target="I-D.ietf-pce-pcep-yang" | |||
| particular LSP at the PCE. | format="default"/> could be extended to include a mechanism to trigger | |||
| A PCE implementation SHOULD also allow the operator to configure an exponentia | the LSP control request.</t> | |||
| lly increasing timer to retry the control requests for which the PCE did not get | </section> | |||
| a response. | <section toc="default" numbered="true"> | |||
| </t> | <name>Liveness Detection and Monitoring</name> | |||
| </section> | <t> | |||
| <section title="Information and Data Models" toc="default"> | Mechanisms defined in this document do not imply any new liveness detection | |||
| <t>The PCEP YANG module <xref target="I-D.ietf-pce-pcep-yang"/> could be exten | and monitoring requirements in addition to those already listed in <xref | |||
| ded to include mechanism to trigger the LSP control request.</t> | target="RFC5440" format="default"/>. | |||
| </section> | </t> | |||
| <section title="Liveness Detection and Monitoring" toc="default"> | </section> | |||
| <t> | <section toc="default" numbered="true"> | |||
| Mechanisms defined in this document do not imply any new liveness detection an | <name>Verify Correct Operations</name> | |||
| d monitoring requirements in addition to those already listed in <xref target="R | <t> | |||
| FC5440" pageno="false" format="default"/>. | Mechanisms defined in this document do not imply any new operation | |||
| </t> | verification requirements in addition to those already listed in <xref | |||
| </section> | target="RFC5440" format="default"/> | |||
| <section title="Verify Correct Operations" toc="default"> | and <xref target="RFC8231" format="default"/>. | |||
| <t> | </t> | |||
| Mechanisms defined in this document do not imply any new operation verificatio | </section> | |||
| n requirements in addition to those already listed in <xref target="RFC5440" pag | <section toc="default" numbered="true"> | |||
| eno="false" format="default"/> | <name>Requirements on Other Protocols</name> | |||
| and <xref target="RFC8231" pageno="false" format="default"/>. | <t>Mechanisms defined in this document do not imply any new | |||
| </t> | requirements on other protocols.</t> | |||
| </section> | </section> | |||
| <section title="Requirements On Other Protocols" toc="default"> | <section toc="default" numbered="true"> | |||
| <t>Mechanisms defined in this document do not imply any new requirements on ot | <name>Impact on Network Operations</name> | |||
| her protocols.</t> | <t> | |||
| </section> | Mechanisms defined in <xref target="RFC5440" format="default"/> | |||
| <section title="Impact On Network Operations" toc="default"> | ||||
| <t> | ||||
| Mechanisms defined in <xref target="RFC5440" pageno="false" format="default"/> | ||||
| and | and | |||
| <xref target="RFC8231" pageno="false" format="default"/> also apply to PCEP ex | <xref target="RFC8231" format="default"/> also apply to PCEP extensions define | |||
| tensions defined in this document. | d in this document. | |||
| Further, the mechanism described in this document can help the operator to req | Further, the mechanism described in this document can help the operator to | |||
| uest control of the LSPs at a particular PCE.</t> | request control of the LSPs at a particular PCE.</t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="Acknowledgement" title="Acknowledgements"> | ||||
| <t>Thanks to Jonathan Hardwick to remind the authors to not use suggested values | ||||
| in IANA section.</t> | ||||
| <t>Thanks to Adrian Farrel, Haomian Zheng and Tomonori Takeda for their valuable | ||||
| comments.</t> | ||||
| <t>Thanks to Shawn M. Emery for security directorate's review.</t> | ||||
| <t>Thanks to Francesca Palombini for GENART review.</t> | ||||
| <t>Thanks to Benjamin Kaduk, Martin Vigoureux, Alvaro Retana, and Barry Leiba fo | ||||
| r IESG reviews.</t> | ||||
| </section> | ||||
| </middle> | ||||
| <back> | ||||
| <references title="Normative References"> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.211 | ||||
| 9.xml"?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.544 | ||||
| 0.xml"?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.817 | ||||
| 4.xml"?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.823 | ||||
| 1.xml"?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.828 | ||||
| 1.xml"?> | ||||
| </references> | ||||
| <references title="Informative References"> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4657.xml" | ||||
| ?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7525.xml" | ||||
| ?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7942.xml" | ||||
| ?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8051.xml" | ||||
| ?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8253.xml" | ||||
| ?> | ||||
| <?rfc include="http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-pce | ||||
| -pcep-yang"?> | ||||
| </references> | </middle> | |||
| <section title="Contributor Addresses" toc="default"> | <back> | |||
| <t> | ||||
| <figure title="" suppress-title="false" align="left" alt="" width="" height= | ||||
| ""> | ||||
| <artwork xml:space="preserve" name="" type="" align="left" alt="" widt | ||||
| h="" height=""><![CDATA[ | ||||
| Dhruv Dhody | ||||
| Huawei Technologies | ||||
| Divyashree Techno Park, Whitefield | ||||
| Bangalore, Karnataka 560066 | ||||
| India | ||||
| EMail: dhruv.ietf@gmail.com | <displayreference target="I-D.ietf-pce-pcep-yang" to="PCEP-YANG"/> | |||
| ]]></artwork> | <references> | |||
| </figure> | <name>References</name> | |||
| </t> | <references> | |||
| <name>Normative References</name> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.2119.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.5440.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.8174.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.8231.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.8281.xml"/> | ||||
| </references> | ||||
| <references> | ||||
| <name>Informative References</name> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.4657.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.7525.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.8051.xml"/> | ||||
| <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refer | ||||
| ence.RFC.8253.xml"/> | ||||
| <t> | <!-- ietf-pce-pcep-yang I-D Exists --> | |||
| <figure title="" suppress-title="false" align="left" alt="" width="" height= | ||||
| ""> | ||||
| <artwork xml:space="preserve" name="" type="" align="left" alt="" widt | ||||
| h="" height=""><![CDATA[ | ||||
| Jon Parker | ||||
| Cisco Systems, Inc. | ||||
| 2000 Innovation Drive | ||||
| Kanata, Ontario K2K 3E8 | ||||
| Canada | ||||
| EMail: jdparker@cisco.com | <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/refe rence.I-D.ietf-pce-pcep-yang.xml"/> | |||
| ]]></artwork> | </references> | |||
| </figure> | </references> | |||
| </t> | <section anchor="Acknowledgement" numbered="false" toc="default"> | |||
| <name>Acknowledgements</name> | ||||
| <t>Thanks to <contact fullname="Jonathan Hardwick"/> for reminding the aut | ||||
| hors to not use | ||||
| suggested values in IANA section.</t> | ||||
| <t>Thanks to <contact fullname="Adrian Farrel"/>, <contact | ||||
| fullname="Haomian Zheng"/>, and <contact fullname="Tomonori Takeda"/> for | ||||
| their | ||||
| valuable comments.</t> | ||||
| <t>Thanks to <contact fullname="Shawn M. Emery"/> for his Security Directo | ||||
| rate review.</t> | ||||
| <t>Thanks to <contact fullname="Francesca Palombini"/> for GENART review.< | ||||
| /t> | ||||
| <t>Thanks to <contact fullname="Benjamin Kaduk"/>, <contact | ||||
| fullname="Martin Vigoureux"/>, <contact fullname="Alvaro Retana"/>, and | ||||
| <contact fullname="Barry Leiba"/> for IESG reviews.</t> | ||||
| </section> | ||||
| <section anchor="constributors" numbered="false"> | ||||
| <t> | <name>Contributors</name> | |||
| <figure title="" suppress-title="false" align="left" alt="" width="" height= | <t>The following people contributed substantially to the content of this | |||
| ""> | document and should be considered coauthors:</t> | |||
| <artwork xml:space="preserve" name="" type="" align="left" alt="" widt | <contact fullname="Dhruv Dhody"> | |||
| h="" height=""><![CDATA[ | <organization> Huawei Technologies</organization> | |||
| Chaitanya Yadlapalli | <address> | |||
| AT&T | <postal> | |||
| 200 S Laurel Aevenue | <street>Divyashree Techno Park, Whitefield</street> | |||
| Middletown NJ 07748 | <city>Bangalore</city> | |||
| USA | <region>Karnataka</region> | |||
| <code>560066</code> | ||||
| <country>India</country> | ||||
| </postal> | ||||
| <email>dhruv.ietf@gmail.com</email> | ||||
| </address> | ||||
| </contact> | ||||
| EMail: cy098d@att.com | <contact fullname="Jon Parker"> | |||
| ]]></artwork> | <organization>Cisco Systems, Inc.</organization> | |||
| </figure> | <address> | |||
| </t> | <postal> | |||
| <street>2000 Innovation Drive</street> | ||||
| <city>Kanata</city> | ||||
| <region>Ontario</region> | ||||
| <code>K2K 3E8</code> | ||||
| <country>Canada</country> | ||||
| </postal> | ||||
| <email>jdparker@cisco.com</email> | ||||
| </address> | ||||
| </contact> | ||||
| <contact fullname="Chaitanya Yadlapalli"> | ||||
| <organization>AT&T</organization> | ||||
| <address> | ||||
| <postal> | ||||
| <street>200 S Laurel Avenue</street> | ||||
| <city>Middletown</city> | ||||
| <region>NJ</region> | ||||
| <code>07748</code> | ||||
| <country>United States of America</country> | ||||
| </postal> | ||||
| <email>cy098@att.com</email> | ||||
| </address> | ||||
| </contact> | ||||
| </section> | </section> | |||
| </back> | </back> | |||
| </rfc> | </rfc> | |||
| End of changes. 38 change blocks. | ||||
| 502 lines changed or deleted | 438 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||