| rfc9270.original | rfc9270.txt | |||
|---|---|---|---|---|
| TEAS Working Group J. He | Internet Engineering Task Force (IETF) J. He | |||
| Internet-Draft I. Busi | Request for Comments: 9270 I. Busi | |||
| Updates: 4872, 4873 (if approved) Huawei Technologies | Updates: 4872, 4873 Huawei Technologies | |||
| Intended status: Standards Track J. Ryoo | Category: Standards Track J. Ryoo | |||
| Expires: October 21, 2022 B. Yoon | ISSN: 2070-1721 B. Yoon | |||
| ETRI | ETRI | |||
| P. Park | P. Park | |||
| KT | KT | |||
| April 19, 2022 | August 2022 | |||
| GMPLS Signaling Extensions for Shared Mesh Protection | GMPLS Signaling Extensions for Shared Mesh Protection | |||
| draft-ietf-teas-gmpls-signaling-smp-12 | ||||
| Abstract | Abstract | |||
| ITU-T Recommendation G.808.3 defines the generic aspects of a Shared | ITU-T Recommendation G.808.3 defines the generic aspects of a Shared | |||
| Mesh Protection (SMP) mechanism, where the difference between SMP and | Mesh Protection (SMP) mechanism, where the difference between SMP and | |||
| Shared Mesh Restoration (SMR) is also identified. ITU-T | Shared Mesh Restoration (SMR) is also identified. ITU-T | |||
| Recommendation G.873.3 defines the protection switching operation and | Recommendation G.873.3 defines the protection switching operation and | |||
| associated protocol for SMP at the Optical Data Unit (ODU) layer. | associated protocol for SMP at the Optical Data Unit (ODU) layer. | |||
| RFC 7412 provides requirements for any mechanism that would be used | RFC 7412 provides requirements for any mechanism that would be used | |||
| to implement SMP in a Multi-Protocol Label Switching - Transport | to implement SMP in a Multi-Protocol Label Switching - Transport | |||
| Profile (MPLS-TP) network. | Profile (MPLS-TP) network. | |||
| This document updates RFC 4872 and RFC 4873 to provide the extensions | This document updates RFCs 4872 and 4873 to provide extensions for | |||
| to the Generalized Multi-Protocol Label Switching (GMPLS) signaling | Generalized Multi-Protocol Label Switching (GMPLS) signaling to | |||
| to support the control of the SMP. | support the control of the SMP mechanism. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on October 21, 2022. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9270. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Revised BSD License text as described in Section 4.e of | include Revised BSD License text as described in Section 4.e of the | |||
| the Trust Legal Provisions and are provided without warranty as | Trust Legal Provisions and are provided without warranty as described | |||
| described in the Revised BSD License. | in the Revised BSD License. | |||
| This document may contain material from IETF Documents or IETF | This document may contain material from IETF Documents or IETF | |||
| Contributions published or made publicly available before November | Contributions published or made publicly available before November | |||
| 10, 2008. The person(s) controlling the copyright in some of this | 10, 2008. The person(s) controlling the copyright in some of this | |||
| material may not have granted the IETF Trust the right to allow | material may not have granted the IETF Trust the right to allow | |||
| modifications of such material outside the IETF Standards Process. | modifications of such material outside the IETF Standards Process. | |||
| Without obtaining an adequate license from the person(s) controlling | Without obtaining an adequate license from the person(s) controlling | |||
| the copyright in such materials, this document may not be modified | the copyright in such materials, this document may not be modified | |||
| outside the IETF Standards Process, and derivative works of it may | outside the IETF Standards Process, and derivative works of it may | |||
| not be created outside the IETF Standards Process, except to format | not be created outside the IETF Standards Process, except to format | |||
| it for publication as an RFC or to translate it into languages other | it for publication as an RFC or to translate it into languages other | |||
| than English. | than English. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
| 2. Conventions Used in This Document . . . . . . . . . . . . . . 4 | 2. Conventions Used in This Document | |||
| 3. SMP Definition . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. SMP Definition | |||
| 4. Operation of SMP with GMPLS Signaling Extension . . . . . . . 5 | 4. Operation of SMP with GMPLS Signaling Extensions | |||
| 5. GMPLS Signaling Extension for SMP . . . . . . . . . . . . . . 6 | 5. GMPLS Signaling Extensions for SMP | |||
| 5.1. Identifiers . . . . . . . . . . . . . . . . . . . . . . . 7 | 5.1. Identifiers | |||
| 5.2. Signaling Primary LSPs . . . . . . . . . . . . . . . . . 7 | 5.2. Signaling Primary LSPs | |||
| 5.3. Signaling Secondary LSPs . . . . . . . . . . . . . . . . 7 | 5.3. Signaling Secondary LSPs | |||
| 5.4. SMP Preemption Priority . . . . . . . . . . . . . . . . . 8 | 5.4. SMP Preemption Priority | |||
| 5.5. Notifying Availability of Shared Resources . . . . . . . 8 | 5.5. Availability of Shared Resources: The Notify Message | |||
| 5.6. SMP APS Configuration . . . . . . . . . . . . . . . . . . 9 | 5.6. SMP APS Configuration | |||
| 6. Updates to PROTECTION Object . . . . . . . . . . . . . . . . 10 | 6. Updates to PROTECTION Object | |||
| 6.1. New Protection Type . . . . . . . . . . . . . . . . . . . 10 | 6.1. New Protection Type | |||
| 6.2. Updates on Notification and Operational Bits . . . . . . 10 | 6.2. Updates to Definitions of Notification and Operational Bits | |||
| 6.3. Preemption Priority . . . . . . . . . . . . . . . . . . . 11 | 6.3. Preemption Priority | |||
| 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 | 7. IANA Considerations | |||
| 8. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | 8. Security Considerations | |||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 12 | 9. References | |||
| 10. Contributor . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 9.1. Normative References | |||
| 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 9.2. Informative References | |||
| 11.1. Normative References . . . . . . . . . . . . . . . . . . 12 | Acknowledgements | |||
| 11.2. Informative References . . . . . . . . . . . . . . . . . 13 | Contributors | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| RFC 4872 [RFC4872] defines extension of Resource Reservation Protocol | RFC 4872 [RFC4872] defines extensions for Resource Reservation | |||
| - Traffic Engineering (RSVP-TE) to support Shared Mesh Restoration | Protocol - Traffic Engineering (RSVP-TE) to support Shared Mesh | |||
| (SMR) mechanisms. SMR can be seen as a particular case of pre- | Restoration (SMR) mechanisms. SMR can be seen as a particular case | |||
| planned Label Switched Path (LSP) rerouting that reduces the recovery | of preplanned Label Switched Path (LSP) rerouting that reduces the | |||
| resource requirements by allowing multiple protecting LSPs to share | recovery resource requirements by allowing multiple protecting LSPs | |||
| common link and node resources. The recovery resources for the | to share common link and node resources. The recovery resources for | |||
| protecting LSPs are pre-reserved during the provisioning phase, and | the protecting LSPs are pre-reserved during the provisioning phase, | |||
| explicit restoration signaling is required to activate (i.e., commit | and explicit restoration signaling is required to activate (i.e., | |||
| resource allocation at the data plane) a specific protecting LSP that | commit resource allocation at the data plane) a specific protecting | |||
| was instantiated during the provisioning phase. RFC 4873 [RFC4873] | LSP that was instantiated during the provisioning phase. RFC 4873 | |||
| details the encoding of the last 32-bit Reserved field of the | [RFC4873] details the encoding of the last 32-bit Reserved field of | |||
| PROTECTION object defined in [RFC4872] | the PROTECTION object defined in [RFC4872]. | |||
| ITU-T Recommendation G.808.3 [G808.3] defines the generic aspects of | ITU-T Recommendation G.808.3 [G808.3] defines the generic aspects of | |||
| a shared mesh protection (SMP) mechanism, which are not specific to a | a Shared Mesh Protection (SMP) mechanism, which are not specific to a | |||
| particular network technology in terms of architecture types, | particular network technology in terms of architecture types, | |||
| preemption principle, and path monitoring methods, etc. ITU-T | preemption principle, path monitoring methods, etc. ITU-T | |||
| Recommendation G.873.3 [G873.3] defines the protection switching | Recommendation G.873.3 [G873.3] defines the protection switching | |||
| operation and associated protocol for SMP at the Optical Data Unit | operation and associated protocol for SMP at the Optical Data Unit | |||
| (ODU) layer. RFC 7412 [RFC7412] provides requirements for any | (ODU) layer. RFC 7412 [RFC7412] provides requirements for any | |||
| mechanism that would be used to implement SMP in a Multi-Protocol | mechanism that would be used to implement SMP in a Multi-Protocol | |||
| Label Switching - Transport Profile (MPLS-TP) network. | Label Switching - Transport Profile (MPLS-TP) network. | |||
| SMP differs from SMR in the activation/protection switching | SMP differs from SMR in the activation/protection switching | |||
| operation. The former activates a protecting LSP via the automatic | operation. The former activates a protecting LSP via the Automatic | |||
| protection switching (APS) protocol in the data plane when the | Protection Switching (APS) protocol in the data plane when the | |||
| working LSP fails, while the latter does it via control plane | working LSP fails, while the latter does it via control plane | |||
| signaling. It is therefore necessary to distinguish SMP from SMR | signaling. It is therefore necessary to distinguish SMP from SMR | |||
| during provisioning so that each node involved behaves appropriately | during provisioning so that each node involved behaves appropriately | |||
| in the recovery phase when activation of a protecting LSP is done. | in the recovery phase when activation of a protecting LSP is done. | |||
| SMP has advantages with regard to the recovery speed compared with | SMP has advantages with regard to the recovery speed compared with | |||
| SMR. | SMR. | |||
| This document updates [RFC4872] and [RFC4873] to provide the | This document updates [RFC4872] and [RFC4873] to provide extensions | |||
| extensions to the Generalized Multi-Protocol Label Switching (GMPLS) | for Generalized Multi-Protocol Label Switching (GMPLS) signaling to | |||
| signaling to support the control of the SMP mechanism. Specifically, | support the control of the SMP mechanism. Specifically, it | |||
| it; | ||||
| o defines a new LSP protection type, "Shared Mesh Protection," for | * defines a new LSP Protection Type, "Shared Mesh Protection", for | |||
| the LSP Flags field [RFC4872] of the PROTECTION object (see | the LSP Flags field [RFC4872] of the PROTECTION object (see | |||
| Section 6.1), | Section 6.1), | |||
| o updates the definitions of the Notification (N) and Operational | * updates the definitions of the Notification (N) and Operational | |||
| (O) fields [RFC4872] of the PROTECTION object to take the new SMP | (O) fields [RFC4872] of the PROTECTION object to take the new SMP | |||
| type into account (see Section 6.2), and | type into account (see Section 6.2), and | |||
| o updates the definition of the 16-bit Reserved field [RFC4873] of | * updates the definition of the 16-bit Reserved field [RFC4873] of | |||
| the PROTECTION object to allocate 8 bits to signal the SMP | the PROTECTION object to allocate 8 bits to signal the SMP | |||
| preemption priority (see Section 6.3). | preemption priority (see Section 6.3). | |||
| Only the generic aspects for signaling SMP are addressed by this | Only the generic aspects for signaling SMP are addressed by this | |||
| document. The technology-specific aspects are expected to be | document. The technology-specific aspects are expected to be | |||
| addressed by other documents. | addressed by other documents. | |||
| RFC 8776 [RFC8776] defines a collection of common YANG data types for | RFC 8776 [RFC8776] defines a collection of common YANG data types for | |||
| Traffic Engineering (TE) configuration and state capabilities. It | Traffic Engineering (TE) configuration and state capabilities. It | |||
| defines several identities for LSP protection types. As this | defines several identities for LSP Protection Types. As this | |||
| document introduces a new LSP Protection Type, [RFC8776] is expected | document introduces a new LSP Protection Type, [RFC8776] is expected | |||
| to be updated to support the SMP specified in this document. | to be updated to support the SMP mechanism specified in this | |||
| [I-D.ietf-teas-yang-te] defines a YANG data model for the | document. [YANG-TE] defines a YANG data model for the provisioning | |||
| provisioning and management of TE tunnels, LSPs, and interfaces. It | and management of TE tunnels, LSPs, and interfaces. It includes some | |||
| includes some protection and restoration data nodes relevant to this | protection and restoration data nodes relevant to this document. | |||
| document. Management aspects of the SMP are outside the scope of | Management aspects of the SMP mechanism are outside the scope of this | |||
| this document, and they are expected to be addressed by other | document, and they are expected to be addressed by other documents. | |||
| documents. | ||||
| 2. Conventions Used in This Document | 2. Conventions Used in This Document | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| In addition, the reader is assumed to be familiar with the | In addition, the reader is assumed to be familiar with the | |||
| terminology used in [RFC4872], RFC 4426 [RFC4426], and RFC 6372 | terminology used in [RFC4872], RFC 4426 [RFC4426], and RFC 6372 | |||
| [RFC6372]. | [RFC6372]. | |||
| 3. SMP Definition | 3. SMP Definition | |||
| [G808.3] defines the generic aspects of an SMP mechanism. [G873.3] | [G808.3] defines the generic aspects of an SMP mechanism. [G873.3] | |||
| defines the protection switching operation and associated protocol | defines the protection switching operation and associated protocol | |||
| for SMP at the ODU layer. [RFC7412] provides requirements for any | for SMP at the ODU layer. [RFC7412] provides requirements for any | |||
| mechanism that would be used to implement SMP in a MPLS-TP network. | mechanism that would be used to implement SMP in an MPLS-TP network. | |||
| The SMP mechanism is based on pre-computed protecting LSPs that are | The SMP mechanism is based on precomputed protecting LSPs that are | |||
| pre-configured into the network elements. Pre-configuration here | preconfigured into the network elements. Preconfiguration here means | |||
| means pre-reserving resources for the protecting LSPs without | pre-reserving resources for the protecting LSPs without activating a | |||
| activating a particular protecting LSP (e.g., in circuit networks, | particular protecting LSP (e.g., in circuit networks, the cross- | |||
| the cross-connects in the intermediate nodes of the protecting LSP | connects in the intermediate nodes of the protecting LSP are not | |||
| are not pre-established). Pre-configuring but not activating | preestablished). Preconfiguring but not activating protecting LSPs | |||
| protecting LSPs allows link and node resources to be shared by the | allows link and node resources to be shared by the protecting LSPs of | |||
| protecting LSPs of multiple working LSPs (that are themselves | multiple working LSPs (which are themselves disjoint and thus | |||
| disjoint and thus unlikely to fail simultaneously). Protecting LSPs | unlikely to fail simultaneously). Protecting LSPs are activated in | |||
| are activated in response to failures of working LSPs or operator's | response to failures of working LSPs or operator commands by means of | |||
| commands by means of the APS protocol that operates in the data | the APS protocol, which operates in the data plane. The APS protocol | |||
| plane. The APS protocol messages are exchanged along the protecting | messages are exchanged along the protecting LSP. SMP is always | |||
| LSP. SMP is always revertive. | revertive. | |||
| SMP has a lot of similarity to SMR except that the activation in case | SMP is very similar to SMR, except that activation in the case of SMR | |||
| of SMR is achieved by control plane signaling during the recovery | is achieved by control plane signaling during the recovery operation, | |||
| operation, while SMP is done by the APS protocol in the data plane. | while the same is done for SMP by the APS protocol in the data plane. | |||
| 4. Operation of SMP with GMPLS Signaling Extension | 4. Operation of SMP with GMPLS Signaling Extensions | |||
| Consider the following network topology: | Consider the network topology shown in Figure 1: | |||
| A---B---C---D | A---B---C---D | |||
| \ / | \ / | |||
| E---F---G | E---F---G | |||
| / \ | / \ | |||
| H---I---J---K | H---I---J---K | |||
| Figure 1: An example of SMP topology | Figure 1: An Example of an SMP Topology | |||
| The working LSPs [A,B,C,D] and [H,I,J,K] could be protected by the | The working LSPs [A,B,C,D] and [H,I,J,K] could be protected by the | |||
| protecting LSPs [A,E,F,G,D] and [H,E,F,G,K], respectively. Per RFC | protecting LSPs [A,E,F,G,D] and [H,E,F,G,K], respectively. Per RFC | |||
| 3209 [RFC3209], in order to achieve resource sharing during the | 3209 [RFC3209], in order to achieve resource sharing during the | |||
| signaling of these protecting LSPs, they MUST have the same Tunnel | signaling of these protecting LSPs, they have the same Tunnel | |||
| Endpoint Address (as part of their SESSION object). However, these | Endpoint Address (as part of their SESSION object). However, these | |||
| addresses are not the same in this example. Similar to SMR, this | addresses are not the same in this example. Similar to SMR, this | |||
| document defines a new LSP Protection Type of the secondary LSP as | document defines a new LSP Protection Type of the secondary LSP as | |||
| "Shared Mesh Protection" (see Section 6.1) to allow resource sharing | "Shared Mesh Protection" (see Section 6.1) to allow resource sharing | |||
| along nodes E, F, and G. Examples of shared resources include the | along nodes E, F, and G. Examples of shared resources include the | |||
| capacity of a link and the cross-connects in a node. In this case, | capacity of a link and the cross-connects in a node. In this case, | |||
| the protecting LSPs are not merged (which is useful since the paths | the protecting LSPs are not merged (which is useful, since the paths | |||
| diverge at G), but the resources along E, F, G can be shared. | diverge at G), but the resources along E, F, and G can be shared. | |||
| When a failure, such as Signal Fail (SF) and Signal Degrade (SD), | When a failure, such as Signal Fail (SF) or Signal Degrade (SD), | |||
| occurs on one of the working LSPs (say working LSP [A,B,C,D]), the | occurs on one of the working LSPs (say, working LSP [A,B,C,D]), the | |||
| end node (say node A) that detects the failure initiates the | end node (say, node A) that detects the failure initiates the | |||
| protection switching operation. End node A will send a protection | protection switching operation. End node A will send a protection | |||
| switching request APS message (for example, SF) to its adjacent | switching request APS message (for example, SF) to its adjacent | |||
| (downstream) intermediate node (say node E) to activate the | (downstream) intermediate node (say, node E) to activate the | |||
| corresponding protecting LSP and will wait for a confirmation message | corresponding protecting LSP and will wait for a confirmation message | |||
| from node E. | from node E. | |||
| If the protection resource is available, node E will send the | If the protection resource is available, node E will send the | |||
| confirmation APS message to the end node A and forward the switching | confirmation APS message to the end node (node A) and forward the | |||
| request APS message to its adjacent (downstream) node (say node F). | switching request APS message to its adjacent (downstream) node (say, | |||
| When the confirmation APS message is received by node A, the cross- | node F). When the confirmation APS message is received by node A, | |||
| connection on node A is established. At this time traffic is bridged | the cross-connection on node A is established. At this time, traffic | |||
| to and selected from the protecting LSP at node A. After forwarding | is bridged to and selected from the protecting LSP at node A. After | |||
| the switching request APS message, node E will wait for a | forwarding the switching request APS message, node E will wait for a | |||
| confirmation APS message from node F, which triggers node E to set up | confirmation APS message from node F, which triggers node E to set up | |||
| the cross-connection for the protecting LSP being activated. | the cross-connection for the protecting LSP being activated. | |||
| If the protection resource is not available (due to failure or being | If the protection resource is not available (due to failure or being | |||
| used by higher priority connections), the switching will not be | used by higher-priority connections), the switching will not be | |||
| successful; the intermediate node (node E) MUST send a message to | successful; the intermediate node (node E) MUST send a message to | |||
| notify the end node (node A) (see Section 5.5). If the resource is | notify the end node (node A) (see Section 5.5). If the resource is | |||
| in use by a lower priority protecting LSP, the lower priority service | in use by a lower-priority protecting LSP, the lower-priority service | |||
| will be removed and then the intermediate node will follow the | will be removed, and the intermediate node will then follow the | |||
| procedure as described for the case when the protection resource is | procedure as described for the case when the protection resource is | |||
| available for the higher priority protecting LSP. | available for the higher-priority protecting LSP. | |||
| If node E fails to allocate the protection resource, it MUST send a | If node E fails to allocate the protection resource, it MUST send a | |||
| message to notify node A (see Section 5.5). Then, node A will stop | message to notify node A (see Section 5.5). Then, node A will stop | |||
| bridging and selecting traffic to/from the protecting LSP and proceed | bridging and selecting traffic to/from the protecting LSP and proceed | |||
| with the procedure of removing the protection allocation according to | with the procedure of removing the protection allocation according to | |||
| the APS protocol. | the APS protocol. | |||
| 5. GMPLS Signaling Extension for SMP | 5. GMPLS Signaling Extensions for SMP | |||
| The following subsections detail how LSPs using SMP can be signaled | The following subsections detail how LSPs using SMP can be signaled | |||
| in an interoperable fashion using GMPLS RSVP-TE extensions (see RFC | in an interoperable fashion using GMPLS RSVP-TE extensions (see RFC | |||
| 3473 [RFC3473]). This signaling enables: | 3473 [RFC3473]). This signaling enables: | |||
| (1) the ability to identify a "secondary protecting LSP" (LSP | (1) the ability to identify a "secondary protecting LSP" (LSP | |||
| [A,E,F,G,D] or LSP [H,E,F,G,K] from Figure 1, hereby called the | [A,E,F,G,D] or LSP [H,E,F,G,K] from Figure 1, here called the | |||
| "secondary LSP") used to recover another "primary working LSP" | "secondary LSP") used to recover another "primary working LSP" | |||
| (LSP [A,B,C,D] or LSP [H,I,J,K] from Figure 1, hereby called the | (LSP [A,B,C,D] or LSP [H,I,J,K] from Figure 1, here called the | |||
| "protected LSP"), | "protected LSP"), | |||
| (2) the ability to associate the secondary LSP with the protected | (2) the ability to associate the secondary LSP with the protected | |||
| LSP, | LSP, | |||
| (3) the capability to include information about the resources used | (3) the capability to include information about the resources used | |||
| by the protected LSP while instantiating the secondary LSP, | by the protected LSP while instantiating the secondary LSP, | |||
| (4) the capability to instantiate during the provisioning phase | (4) the capability to instantiate several secondary LSPs efficiently | |||
| several secondary LSPs efficiently, and | during the provisioning phase, and | |||
| (5) the capability to support activation of a secondary LSP after | (5) the capability to support activation of a secondary LSP via the | |||
| failure occurrence via APS protocol in the data plane. | APS protocol in the data plane if a failure occurs. | |||
| 5.1. Identifiers | 5.1. Identifiers | |||
| To simplify association operations, both LSPs (i.e., the protected | To simplify association operations, both LSPs (i.e., the protected | |||
| and the secondary LSPs) belong to the same session. Thus, the | LSP and the secondary LSP) belong to the same session. Thus, the | |||
| SESSION object MUST be the same for both LSPs. The LSP ID, however, | SESSION object MUST be the same for both LSPs. The LSP ID, however, | |||
| MUST be different to distinguish between the protected LSP and the | MUST be different to distinguish between the protected LSP and the | |||
| secondary LSP. | secondary LSP. | |||
| A new LSP Protection Type "Shared Mesh Protection" is defined (see | A new LSP Protection Type, "Shared Mesh Protection", is defined (see | |||
| Section 6.1) for the LSP Flags of PROTECTION object (see [RFC4872]) | Section 6.1) for the LSP Flags field of the PROTECTION object (see | |||
| to set up the two LSPs. This LSP Protection Type value is applicable | [RFC4872]) to set up the two LSPs. This LSP Protection Type value is | |||
| only to bidirectional LSPs as required in [G808.3]. | only applicable to bidirectional LSPs as required in [G808.3]. | |||
| 5.2. Signaling Primary LSPs | 5.2. Signaling Primary LSPs | |||
| The PROTECTION object (see [RFC4872]) is included in the Path message | The PROTECTION object (see [RFC4872]) is included in the Path message | |||
| during signaling of the primary working LSPs, with the LSP Protection | during signaling of the primary working LSPs, with the LSP Protection | |||
| Type value set to "Shared Mesh Protection". | Type value set to "Shared Mesh Protection". | |||
| Primary working LSPs are signaled by setting in the PROTECTION object | Primary working LSPs are signaled by setting in the PROTECTION object | |||
| the S bit to 0, the P bit to 0, and the N bit to 1, and in the | the S bit to 0, the P bit to 0, and the N bit to 1; and setting in | |||
| ASSOCIATION object, the Association ID to the associated secondary | the ASSOCIATION object the Association ID to the associated secondary | |||
| protecting LSP_ID. | protecting LSP_ID. | |||
| Note: N bit is set to indicate that the protection switching | | Note: The N bit is set to indicate that the protection | |||
| signaling is done via data plane. | | switching signaling is done via the data plane. | |||
| 5.3. Signaling Secondary LSPs | 5.3. Signaling Secondary LSPs | |||
| The PROTECTION object (see [RFC4872]) is included in the Path message | The PROTECTION object (see [RFC4872]) is included in the Path message | |||
| during signaling of the secondary protecting LSPs, with the LSP | during signaling of the secondary protecting LSPs, with the LSP | |||
| Protection Type value set to "Shared Mesh Protection". | Protection Type value set to "Shared Mesh Protection". | |||
| Secondary protecting LSPs are signaled by setting in the PROTECTION | Secondary protecting LSPs are signaled by setting in the PROTECTION | |||
| object the S bit, the P bit, and the N bit to 1, and in the | object the S bit, the P bit, and the N bit to 1; and setting in the | |||
| ASSOCIATION object, the Association ID to the associated primary | ASSOCIATION object the Association ID to the associated primary | |||
| working LSP_ID, which MUST be known before signaling of the secondary | working LSP_ID, which MUST be known before signaling of the secondary | |||
| LSP. Moreover, the Path message used to instantiate the secondary | LSP. Moreover, the Path message used to instantiate the secondary | |||
| LSP MUST include at least one PRIMARY_PATH_ROUTE object (see | LSP MUST include at least one PRIMARY_PATH_ROUTE object (see | |||
| [RFC4872]) that further allows for recovery resource sharing at each | [RFC4872]) that further allows for recovery resource sharing at each | |||
| intermediate node along the secondary path. | intermediate node along the secondary path. | |||
| With this setting, the resources for the secondary LSP MUST be pre- | With this setting, the resources for the secondary LSP MUST be pre- | |||
| reserved, but not committed at the data plane level, meaning that the | reserved but not committed at the data plane level, meaning that the | |||
| internals of the switch need not be established until explicit action | internals of the switch need not be established until explicit action | |||
| is taken to activate this LSP. Activation of a secondary LSP and | is taken to activate this LSP. Activation of a secondary LSP and | |||
| protection switching to the activated protecting LSP is done using | protection switching to the activated protecting LSP is done using | |||
| APS protocol in the data plane. | the APS protocol in the data plane. | |||
| After protection switching completes the protecting LSP MUST be | After protection switching completes, the protecting LSP MUST be | |||
| signaled with the S bit set to 0 and O bit set to 1 in the PROTECTION | signaled by setting the S bit to 0 and the O bit to 1 in the | |||
| object. At this point, the link and node resources MUST be allocated | PROTECTION object. At this point, the link and node resources MUST | |||
| for this LSP that becomes a primary LSP (ready to carry traffic). | be allocated for this LSP, which becomes a primary LSP (ready to | |||
| The formerly working LSP MAY be signaled with the A bit set in the | carry traffic). The formerly working LSP MAY be signaled with the A | |||
| ADMIN_STATUS object (see [RFC3473]). | bit set in the ADMIN_STATUS object (see [RFC3473]). | |||
| Support for extra traffic in SMP is for further study. Therefore, | Support for extra traffic in SMP is left for further study. | |||
| mechanisms to set up LSPs for extra traffic are outside the scope of | Therefore, mechanisms to set up LSPs for extra traffic are outside | |||
| this document. | the scope of this document. | |||
| 5.4. SMP Preemption Priority | 5.4. SMP Preemption Priority | |||
| The SMP preemption priority of a protecting LSP that the APS protocol | The SMP preemption priority of a protecting LSP is used by the APS | |||
| uses to resolve the competition for shared resources among multiple | protocol to resolve competition for shared resources among multiple | |||
| protecting LSPs, is indicated in Preemption Priority field of the | protecting LSPs and is indicated in the Preemption Priority field of | |||
| PROTECTION object in the Path message of the protecting LSP. | the PROTECTION object in the Path message of the protecting LSP. | |||
| The Setup and Holding priorities in the SESSION_ATTRIBUTE object can | The Setup and Holding priorities in the SESSION_ATTRIBUTE object can | |||
| be used by GMPLS to control LSP preemption, but, they are not used by | be used by GMPLS to control LSP preemption, but they are not used by | |||
| the APS to resolve the competition among multiple protecting LSPs. | the APS to resolve competition among multiple protecting LSPs. This | |||
| This avoids the need to define a complex policy for defining Setup | avoids the need to define a complex policy for defining Setup and | |||
| and Holding priorities when used for both GMPLS control plane LSP | Holding priorities when used for both GMPLS control plane LSP | |||
| preemption and SMP shared resource competition resolution. | preemption and SMP shared resource competition resolution. | |||
| When an intermediate node on the protecting LSP receives the Path | When an intermediate node on the protecting LSP receives the Path | |||
| message, the priority value in the Preemption Priority field MUST be | message, the priority value in the Preemption Priority field MUST be | |||
| stored for that protecting LSP. When resource competition among | stored for that protecting LSP. When resource competition among | |||
| multiple protecting LSPs occurs, the APS protocol will use their | multiple protecting LSPs occurs, the APS protocol will use their | |||
| priority values to resolve the competition. A lower value has a | priority values to resolve this competition. A lower value has a | |||
| higher priority. | higher priority. | |||
| In SMP, a preempted LSP MUST NOT be terminated even after its | In SMP, a preempted LSP MUST NOT be terminated even after its | |||
| resources have been deallocated. Once the working LSP and the | resources have been deallocated. Once the working LSP and the | |||
| protecting LSP are configured or pre-configured, the end node MUST | protecting LSP are configured or preconfigured, the end node MUST | |||
| keep refreshing both working and protecting LSPs regardless of | keep refreshing both working and protecting LSPs, regardless of | |||
| failure or preempted situation. | failure or preemption status. | |||
| 5.5. Notifying Availability of Shared Resources | 5.5. Availability of Shared Resources: The Notify Message | |||
| When a lower priority protecting LSP is preempted, the intermediate | When a lower-priority protecting LSP is preempted, the intermediate | |||
| node that performed preemption MUST send a Notify message with error | node that performed the preemption MUST send a Notify message with | |||
| code "Notify Error" (25) (see [RFC4872]) and error sub-code "Shared | error code "Notify Error" (25) (see [RFC4872]) and error sub-code | |||
| resources unavailable" (TBA1) to the end nodes of that protecting | "Shared resources unavailable" (17) to the end nodes of that | |||
| LSP. Upon receipt of this Notify message, the end node MUST stop | protecting LSP. Upon receipt of this Notify message, the end node | |||
| sending and selecting traffic to/from its protecting LSP and try | MUST stop sending and selecting traffic to/from its protecting LSP | |||
| switching the traffic to another protecting LSP, if available. | and try switching the traffic to another protecting LSP, if | |||
| available. | ||||
| When a protecting LSP occupies the shared resources and they become | When a protecting LSP occupies the shared resources and they become | |||
| unavailable, the same Notify message MUST be generated by the | unavailable, the same Notify message MUST be generated by the | |||
| intermediate node to all the end nodes of the protecting LSPs that | intermediate node to all the end nodes of the protecting LSPs that | |||
| have lower SMP preemption priorities than the one that has occupied | have lower SMP preemption priorities than the one that has occupied | |||
| the shared resources. In case the shared resources become | the shared resources. If the shared resources become unavailable due | |||
| unavailable due to a failure in the shared resources, the same Notify | to a failure in the shared resources, the same Notify message MUST be | |||
| message MUST be generated by the intermediate node to all the end | generated by the intermediate node to all the end nodes of the | |||
| nodes of the protecting LSPs that have been configured to use the | protecting LSPs that have been configured to use the shared | |||
| shared resources. These end nodes, in case of a failure of the | resources. In the case of a failure of the working LSP, these end | |||
| working LSP, MUST avoid trying to switch traffic to these protecting | nodes MUST avoid trying to switch traffic to these protecting LSPs | |||
| LSPs that have been configured to use the shared resources and try | that have been configured to use the shared resources and try | |||
| switching the traffic to other protecting LSPs, if available. | switching the traffic to other protecting LSPs, if available. | |||
| When the shared resources become available, a Notify message with | When the shared resources become available, a Notify message with | |||
| error code "Notify Error" (25) and error sub-code "Shared resources | error code "Notify Error" (25) and error sub-code "Shared resources | |||
| available" (TBA2) MUST be generated by the intermediate node. The | available" (18) MUST be generated by the intermediate node. The | |||
| recipients of this Notify message are the end nodes of the lower | recipients of this Notify message are the end nodes of the lower- | |||
| priority protecting LSPs that have been preempted and/or all the end | priority protecting LSPs that have been preempted and/or all the end | |||
| nodes of the protecting LSPs that have lower SMP preemption | nodes of the protecting LSPs that have lower SMP preemption | |||
| priorities than the one that does not need the shared resources | priorities than the one that does not need the shared resources | |||
| anymore. Upon receipt of this Notify message, the end node is | anymore. Upon receipt of this Notify message, the end node is | |||
| allowed to reinitiate the protection switching operation as described | allowed to reinitiate the protection switching operation as described | |||
| in Section 4, if it still needs the protection resource. | in Section 4, if it still needs the protection resource. | |||
| 5.6. SMP APS Configuration | 5.6. SMP APS Configuration | |||
| SMP relies on APS protocol messages being exchanged between the nodes | SMP relies on APS protocol messages being exchanged between the nodes | |||
| along the path to activate an SMP protecting LSP. | along the path to activate a protecting LSP. | |||
| In order to allow the exchange of APS protocol messages, an APS | In order to allow the exchange of APS protocol messages, an APS | |||
| channel has to be configured between adjacent nodes along the path of | channel has to be configured between adjacent nodes along the path of | |||
| the SMP protecting LSP. This is done by other means than GMPLS | the protecting LSP. This is done by means other than GMPLS | |||
| signaling, before any SMP protecting LSP has been set up. Therefore, | signaling, before any protecting LSP has been set up. Therefore, | |||
| there are likely additional requirements for APS configuration which | there are likely additional requirements for APS configuration that | |||
| are outside the scope of this document. | are outside the scope of this document. | |||
| Depending on the APS protocol message format, the APS protocol may | Depending on the APS protocol message format, the APS protocol may | |||
| use different identifiers than GMPLS signaling to identify the SMP | use different identifiers than GMPLS signaling to identify the | |||
| protecting LSP. | protecting LSP. | |||
| Since APS protocol is for further study in [G808.3], it can be | Since the APS protocol is left for further study per [G808.3], it can | |||
| assumed that APS message format and identifiers are technology- | be assumed that the APS message format and identifiers are technology | |||
| specific and/or vendor-specific. Therefore, additional requirements | specific and/or vendor specific. Therefore, additional requirements | |||
| for APS configuration are outside the scope of this document. | for APS configuration are outside the scope of this document. | |||
| 6. Updates to PROTECTION Object | 6. Updates to PROTECTION Object | |||
| GMPLS extension requirements for SMP introduce several updates to the | GMPLS extension requirements for SMP introduce several updates to the | |||
| Protection Object (see [RFC4872]). | PROTECTION object (see [RFC4872]), as detailed below. | |||
| 6.1. New Protection Type | 6.1. New Protection Type | |||
| A new LSP protection type "Shared Mesh Protection" is added in the | A new LSP Protection Type, "Shared Mesh Protection", is added in the | |||
| PROTECTION object. This LSP Protection Type value is applicable to | PROTECTION object. This LSP Protection Type value is only applicable | |||
| only bidirectional LSPs. | to bidirectional LSPs. | |||
| LSP (Protection Type) Flags: | LSP (Protection Type) Flags: | |||
| 0x20: Shared Mesh Protection | 0x20: Shared Mesh Protection | |||
| The rules defined in Section 14.2 of [RFC4872] ensure that all the | The rules defined in Section 14.2 of [RFC4872] ensure that all the | |||
| nodes along an SMP LSP are SMP aware. Therefore, there are no | nodes along an SMP LSP are SMP aware. Therefore, there are no | |||
| backward compatibility issues. | backward-compatibility issues. | |||
| 6.2. Updates on Notification and Operational Bits | 6.2. Updates to Definitions of Notification and Operational Bits | |||
| The definitions of the N and O bits in Section 14.1 of [RFC4872] are | The definitions of the N and O bits in Section 14.1 of [RFC4872] are | |||
| replaced as follows: | replaced as follows: | |||
| Notification (N): 1 bit | Notification (N): 1 bit | |||
| When set to 1, this bit indicates that the control plane message | When set to 1, this bit indicates that the control plane message | |||
| exchange is only used for notification during protection | exchange is only used for notification during protection | |||
| switching. When set to 0 (default), it indicates that the control | switching. When set to 0 (default), it indicates that the control | |||
| plane message exchanges are used for protection-switching | plane message exchanges are used for purposes of protection | |||
| purposes. The N bit is only applicable when the LSP Protection | switching. The N bit is only applicable when the LSP Protection | |||
| Type Flag is set to 0x04 (1:N Protection with Extra-Traffic), 0x08 | Type Flag is set to 0x04 (1:N Protection with Extra-Traffic), 0x08 | |||
| (1+1 Unidirectional Protection), 0x10 (1+1 Bidirectional | (1+1 Unidirectional Protection), 0x10 (1+1 Bidirectional | |||
| Protection), or 0x20 (Shared Mesh Protection). The N bit MUST be | Protection), or 0x20 (Shared Mesh Protection). The N bit MUST be | |||
| set to 0 in any other case. If 0x20 (SMP), the N bit MUST be set | set to 0 in any other case. If 0x20 (SMP), the N bit MUST be set | |||
| to 1. | to 1. | |||
| Operational (O): 1 bit | Operational (O): 1 bit | |||
| When set to 1, this bit indicates that the protecting LSP is | When set to 1, this bit indicates that the protecting LSP is | |||
| carrying traffic after protection switching. The O bit is only | carrying traffic after protection switching. The O bit is only | |||
| applicable when the P bit is set to 1, and the LSP Protection Type | applicable when (1) the P bit is set to 1 and (2) the LSP | |||
| Flag is set to 0x04 (1:N Protection with Extra-Traffic), 0x08 (1+1 | Protection Type Flag is set to 0x04 (1:N Protection with Extra- | |||
| Unidirectional Protection), 0x10 (1+1 Bidirectional Protection), | Traffic), 0x08 (1+1 Unidirectional Protection), 0x10 (1+1 | |||
| or 0x20 (Shared Mesh Protection). The O bit MUST be set to 0 in | Bidirectional Protection), or 0x20 (Shared Mesh Protection). The | |||
| any other case. | O bit MUST be set to 0 in any other case. | |||
| 6.3. Preemption Priority | 6.3. Preemption Priority | |||
| [RFC4872] reserved a 32-bit field in the PROTECTION object header. | [RFC4872] reserved a 32-bit field in the PROTECTION object header. | |||
| Subsequently, [RFC4873] allocated several fields from that field, and | Subsequently, [RFC4873] allocated several bits from that field and | |||
| left the remainder of the bits reserved. This specification further | left the remainder of the bits reserved. This specification further | |||
| allocates the preemption priority field from those formerly-reserved | allocates the Preemption Priority field from the remaining formerly | |||
| bits. The 32-bit field in the PROTECTION object defined in [RFC4873] | reserved bits. The 32-bit field in the PROTECTION object as defined | |||
| are updated as follows: | in [RFC4872] and modified by [RFC4873] is updated by this document as | |||
| follows: | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| |I|R| Reserved | Seg.Flags | Reserved | Preempt Prio | | |I|R| Reserved | Seg.Flags | Reserved | Preempt Prio | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Preemption Priority (Preempt Prio): 8 bit | Preemption Priority (Preempt Prio): 8 bits | |||
| This field indicates the SMP preemption priority of a protecting | This field indicates the SMP preemption priority of a protecting | |||
| LSP, when the LSP Protection Type field indicates "Shared Mesh | LSP, when the LSP Protection Type field indicates "Shared Mesh | |||
| Protection". The SMP preemption priority value is configured at | Protection". The SMP preemption priority value is configured at | |||
| the end nodes of the protecting LSP by a network operator. A | the end nodes of the protecting LSP by a network operator. A | |||
| lower value has a higher priority. The decision of how many | lower value has a higher priority. The decision regarding how | |||
| priority levels to be operated in an SMP network is a network | many priority levels should be implemented in an SMP network is | |||
| operator's choice. | left to network operators. | |||
| See [RFC4873] for the definition of other fields. | See [RFC4873] for the definitions of the other fields. | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| IANA maintains a registry called "Resource Reservation Protocol | IANA maintains a group of registries called "Resource Reservation | |||
| (RSVP) Parameters" with a subregistry called "Error Codes and | Protocol (RSVP) Parameters", which includes the "Error Codes and | |||
| Globally-Defined Error Value Sub-Codes". Within this subregistry | Globally-Defined Error Value Sub-Codes" registry. IANA has added the | |||
| there is a definition of the "Notify Error" error code (25). The | following values to the "Sub-Codes - 25 Notify Error" subregistry, | |||
| definition lists a number of error value sub-codes that may be used | which lists error value sub-codes that may be used with error code | |||
| with this error code. IANA is requested to allocate further error | 25. IANA has allocated the following error value sub-codes (Table 1) | |||
| value sub-codes for use with this error code as described in this | for use with this error code as described in this document. | |||
| document. | ||||
| Value Description Reference | +=======+==============================+===========+ | |||
| ----- ---------------------------- --------------- | | Value | Description | Reference | | |||
| TBA1 Shared resources unavailable (this document) | +=======+==============================+===========+ | |||
| TBA2 Shared resources available (this document) | | 17 | Shared resources unavailable | RFC 9270 | | |||
| +-------+------------------------------+-----------+ | ||||
| | 18 | Shared resources available | RFC 9270 | | ||||
| +-------+------------------------------+-----------+ | ||||
| Table 1: New Error Sub-Codes | ||||
| 8. Security Considerations | 8. Security Considerations | |||
| Since this document makes use of the exchange of RSVP messages | Since this document makes use of the exchange of RSVP messages that | |||
| including a Notify message, the security threats discussed in | include a Notify message, the security threats discussed in [RFC4872] | |||
| [RFC4872] also apply to this document. | also apply to this document. | |||
| Additionally, it may be possible to cause disruption to traffic on | Additionally, it may be possible to cause disruption to traffic on | |||
| one protecting LSP by targeting a link used by the primary LSP of | one protecting LSP by targeting a link used by the primary LSP of | |||
| another, higher priority LSP somewhere completely different in the | another, higher-priority LSP somewhere completely different in the | |||
| network. For example, in Figure 1, assume that the preemption | network. For example, in Figure 1, assume that the preemption | |||
| priority of LSP [A,E,F,G,D] is higher than that of LSP [H,E,F,G,K] | priority of LSP [A,E,F,G,D] is higher than that of LSP [H,E,F,G,K] | |||
| and the protecting LSP [H,E,F,G,K] is being used to transport | and the protecting LSP [H,E,F,G,K] is being used to transport | |||
| traffic. If link B-C is attacked, traffic on LSP [H,E,F,G,K] can be | traffic. If link B-C is attacked, traffic on LSP [H,E,F,G,K] can be | |||
| disrupted. For this reason, it is important not only to use security | disrupted. For this reason, it is important not only to use security | |||
| mechanisms as discussed in [RFC4872] but also to acknowledge that | mechanisms as discussed in [RFC4872] but also to acknowledge that | |||
| detailed knowledge of a network's topology, including routes and | detailed knowledge of a network's topology, including routes and | |||
| priorities of LSPs, can help an attacker better target or improve the | priorities of LSPs, can help an attacker better target or improve the | |||
| efficacy of an attack. | efficacy of an attack. | |||
| 9. Acknowledgements | 9. References | |||
| The authors would like to thank Adrian Farrel, Vishnu Pavan Beeram, | ||||
| Tom Petch, Ines Robles, John Scudder, Dale Worley, Dan Romascanu, | ||||
| Eric Vyncke, Roman Danyliw, Paul Wouters, Lars Eggert, Francesca | ||||
| Palombini, and Robert Wilton for their valuable comments and | ||||
| suggestions on this document. | ||||
| 10. Contributor | ||||
| The following person contributed significantly to the content of this | ||||
| document and should be considered as a co-author. | ||||
| Yuji Tochio | ||||
| Fujitsu | ||||
| Email: tochio@fujitsu.com | ||||
| 11. References | ||||
| 11.1. Normative References | 9.1. Normative References | |||
| [G808.3] International Telecommunication Union, "Generic protection | [G808.3] International Telecommunication Union, "Generic protection | |||
| switching - Shared mesh protection", ITU-T Recommendation | switching - Shared mesh protection", ITU-T Recommendation | |||
| G.808.3, October 2012. | G.808.3, October 2012, | |||
| <https://www.itu.int/rec/T-REC-G.808.3>. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., | [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., | |||
| and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP | and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP | |||
| Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, | Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, | |||
| <https://www.rfc-editor.org/info/rfc3209>. | <https://www.rfc-editor.org/info/rfc3209>. | |||
| skipping to change at page 13, line 17 ¶ | skipping to change at line 570 ¶ | |||
| Traffic Engineering (RSVP-TE) Extensions", RFC 3473, | Traffic Engineering (RSVP-TE) Extensions", RFC 3473, | |||
| DOI 10.17487/RFC3473, January 2003, | DOI 10.17487/RFC3473, January 2003, | |||
| <https://www.rfc-editor.org/info/rfc3473>. | <https://www.rfc-editor.org/info/rfc3473>. | |||
| [RFC4426] Lang, J., Ed., Rajagopalan, B., Ed., and D. Papadimitriou, | [RFC4426] Lang, J., Ed., Rajagopalan, B., Ed., and D. Papadimitriou, | |||
| Ed., "Generalized Multi-Protocol Label Switching (GMPLS) | Ed., "Generalized Multi-Protocol Label Switching (GMPLS) | |||
| Recovery Functional Specification", RFC 4426, | Recovery Functional Specification", RFC 4426, | |||
| DOI 10.17487/RFC4426, March 2006, | DOI 10.17487/RFC4426, March 2006, | |||
| <https://www.rfc-editor.org/info/rfc4426>. | <https://www.rfc-editor.org/info/rfc4426>. | |||
| [RFC4872] Lang, J., Ed., Rekhter, Y., Ed., and D. Papadimitriou, | [RFC4872] Lang, J P., Ed., Rekhter, Y., Ed., and D. Papadimitriou, | |||
| Ed., "RSVP-TE Extensions in Support of End-to-End | Ed., "RSVP-TE Extensions in Support of End-to-End | |||
| Generalized Multi-Protocol Label Switching (GMPLS) | Generalized Multi-Protocol Label Switching (GMPLS) | |||
| Recovery", RFC 4872, DOI 10.17487/RFC4872, May 2007, | Recovery", RFC 4872, DOI 10.17487/RFC4872, May 2007, | |||
| <https://www.rfc-editor.org/info/rfc4872>. | <https://www.rfc-editor.org/info/rfc4872>. | |||
| [RFC4873] Berger, L., Bryskin, I., Papadimitriou, D., and A. Farrel, | [RFC4873] Berger, L., Bryskin, I., Papadimitriou, D., and A. Farrel, | |||
| "GMPLS Segment Recovery", RFC 4873, DOI 10.17487/RFC4873, | "GMPLS Segment Recovery", RFC 4873, DOI 10.17487/RFC4873, | |||
| May 2007, <https://www.rfc-editor.org/info/rfc4873>. | May 2007, <https://www.rfc-editor.org/info/rfc4873>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 11.2. Informative References | 9.2. Informative References | |||
| [G873.3] International Telecommunication Union, "Optical transport | [G873.3] International Telecommunication Union, "Optical transport | |||
| network - Shared mesh protection", ITU-T Recommendation | network - Shared mesh protection", ITU-T Recommendation | |||
| G.873.3, September 2017. | G.873.3, September 2017, | |||
| <https://www.itu.int/rec/T-REC-G.873.3-201709-I/en>. | ||||
| [I-D.ietf-teas-yang-te] | ||||
| Saad, T., Gandhi, R., Liu, X., Beeram, V. P., Bryskin, I., | ||||
| and O. G. D. Dios, "A YANG Data Model for Traffic | ||||
| Engineering Tunnels, Label Switched Paths and Interfaces", | ||||
| draft-ietf-teas-yang-te-29 (work in progress), February | ||||
| 2022. | ||||
| [RFC6372] Sprecher, N., Ed. and A. Farrel, Ed., "MPLS Transport | [RFC6372] Sprecher, N., Ed. and A. Farrel, Ed., "MPLS Transport | |||
| Profile (MPLS-TP) Survivability Framework", RFC 6372, | Profile (MPLS-TP) Survivability Framework", RFC 6372, | |||
| DOI 10.17487/RFC6372, September 2011, | DOI 10.17487/RFC6372, September 2011, | |||
| <https://www.rfc-editor.org/info/rfc6372>. | <https://www.rfc-editor.org/info/rfc6372>. | |||
| [RFC7412] Weingarten, Y., Aldrin, S., Pan, P., Ryoo, J., and G. | [RFC7412] Weingarten, Y., Aldrin, S., Pan, P., Ryoo, J., and G. | |||
| Mirsky, "Requirements for MPLS Transport Profile (MPLS-TP) | Mirsky, "Requirements for MPLS Transport Profile (MPLS-TP) | |||
| Shared Mesh Protection", RFC 7412, DOI 10.17487/RFC7412, | Shared Mesh Protection", RFC 7412, DOI 10.17487/RFC7412, | |||
| December 2014, <https://www.rfc-editor.org/info/rfc7412>. | December 2014, <https://www.rfc-editor.org/info/rfc7412>. | |||
| [RFC8776] Saad, T., Gandhi, R., Liu, X., Beeram, V., and I. Bryskin, | [RFC8776] Saad, T., Gandhi, R., Liu, X., Beeram, V., and I. Bryskin, | |||
| "Common YANG Data Types for Traffic Engineering", | "Common YANG Data Types for Traffic Engineering", | |||
| RFC 8776, DOI 10.17487/RFC8776, June 2020, | RFC 8776, DOI 10.17487/RFC8776, June 2020, | |||
| <https://www.rfc-editor.org/info/rfc8776>. | <https://www.rfc-editor.org/info/rfc8776>. | |||
| [YANG-TE] Saad, T., Gandhi, R., Liu, X., Beeram, V.P., Bryskin, I., | ||||
| and O. Gonzalez de Dios, "A YANG Data Model for Traffic | ||||
| Engineering Tunnels, Label Switched Paths and Interfaces", | ||||
| Work in Progress, Internet-Draft, draft-ietf-teas-yang-te- | ||||
| 29, 7 February 2022, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-teas- | ||||
| yang-te-29>. | ||||
| Acknowledgements | ||||
| The authors would like to thank Adrian Farrel, Vishnu Pavan Beeram, | ||||
| Tom Petch, Ines Robles, John Scudder, Dale Worley, Dan Romascanu, | ||||
| Éric Vyncke, Roman Danyliw, Paul Wouters, Lars Eggert, Francesca | ||||
| Palombini, and Robert Wilton for their valuable comments and | ||||
| suggestions on this document. | ||||
| Contributors | ||||
| The following person contributed significantly to the content of this | ||||
| document and should be considered a coauthor. | ||||
| Yuji Tochio | ||||
| Fujitsu | ||||
| Email: tochio@fujitsu.com | ||||
| Authors' Addresses | Authors' Addresses | |||
| Jia He | Jia He | |||
| Huawei Technologies | Huawei Technologies | |||
| F3-1B, R&D Center, Huawei Industrial Base, Bantian, Longgang District | F3-1B, R&D Center, Huawei Industrial Base | |||
| Bantian, Longgang District | ||||
| Shenzhen | Shenzhen | |||
| China | China | |||
| Email: hejia@huawei.com | Email: hejia@huawei.com | |||
| Italo Busi | Italo Busi | |||
| Huawei Technologies | Huawei Technologies | |||
| Email: italo.busi@huawei.com | Email: italo.busi@huawei.com | |||
| Jeong-dong Ryoo | Jeong-dong Ryoo | |||
| ETRI | ETRI | |||
| 218 Gajeongno | 218 Gajeongno | |||
| Yuseong-gu, Daejeon 34129 | Yuseong-gu | |||
| Daejeon | ||||
| 34129 | ||||
| South Korea | South Korea | |||
| Phone: +82-42-860-5384 | Phone: +82-42-860-5384 | |||
| Email: ryoo@etri.re.kr | Email: ryoo@etri.re.kr | |||
| Bin Yeong Yoon | Bin Yeong Yoon | |||
| ETRI | ETRI | |||
| Email: byyun@etri.re.kr | Email: byyun@etri.re.kr | |||
| Peter Park | Peter Park | |||
| KT | KT | |||
| Email: peter.park@kt.com | Email: peter.park@kt.com | |||
| End of changes. 90 change blocks. | ||||
| 266 lines changed or deleted | 267 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||