| rfc9488v2.txt | rfc9488.txt | |||
|---|---|---|---|---|
| skipping to change at line 58 ¶ | skipping to change at line 58 ¶ | |||
| in the Revised BSD License. | in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction | 1. Introduction | |||
| 2. Requirements Language | 2. Requirements Language | |||
| 3. Terminology | 3. Terminology | |||
| 4. Motivation | 4. Motivation | |||
| 4.1. Implementation Differences | 4.1. Implementation Differences | |||
| 4.2. SLA Enforcement | 4.2. SLA Enforcement | |||
| 5. Protection Enforcement Flag (E flag) | 5. Protection Enforcement Flag (E Flag) | |||
| 5.1. Backwards Compatibility | 5.1. Backwards Compatibility | |||
| 6. Security Considerations | 6. Security Considerations | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| 8.2. Informative References | 8.2. Informative References | |||
| Acknowledgements | Acknowledgements | |||
| Authors' Addresses | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| skipping to change at line 124 ¶ | skipping to change at line 124 ¶ | |||
| 3. Terminology | 3. Terminology | |||
| This document uses the following terminology: | This document uses the following terminology: | |||
| PROTECTION MANDATORY: The path MUST have protection eligibility on | PROTECTION MANDATORY: The path MUST have protection eligibility on | |||
| all links. | all links. | |||
| UNPROTECTED MANDATORY: The path MUST NOT have protection eligibility | UNPROTECTED MANDATORY: The path MUST NOT have protection eligibility | |||
| on all links. | on all links. | |||
| PROTECTION PREFERRED: | PROTECTION PREFERRED: The path should have protection eligibility on | |||
| The path should have protection eligibility on all links but might | all links but might contain links that do not have protection | |||
| contain links that do not have protection eligibility. | eligibility. | |||
| UNPROTECTED PREFERRED: | UNPROTECTED PREFERRED: The path should not have protection | |||
| The path should not have protection eligibility on all links but | eligibility on all links but might contain links that have | |||
| might contain links that have protection eligibility. | protection eligibility. | |||
| PCC: | PCC: Path Computation Client. Any client application requesting a | |||
| Path Computation Client. Any client application requesting a path | path computation to be performed by a Path Computation Element. | |||
| computation to be performed by a Path Computation Element. | ||||
| PCE: | PCE: Path Computation Element. An entity (component, application, | |||
| Path Computation Element. An entity (component, application, or | or network node) that is capable of computing a network path or | |||
| network node) that is capable of computing a network path or route | route based on a network graph and applying computational | |||
| based on a network graph and applying computational constraints. | constraints. | |||
| PCEP: Path Computation Element Communication Protocol | PCEP: Path Computation Element Communication Protocol | |||
| LSPA: LSP Attributes object [RFC5440] | LSPA: LSP Attributes object [RFC5440] | |||
| 4. Motivation | 4. Motivation | |||
| 4.1. Implementation Differences | 4.1. Implementation Differences | |||
| As defined in [RFC5440], the mechanism to signal protection | As defined in [RFC5440], the mechanism to signal protection | |||
| skipping to change at line 214 ¶ | skipping to change at line 213 ¶ | |||
| choose a protected or unprotected instruction associated with a | choose a protected or unprotected instruction associated with a | |||
| resource, ensuring consistent PCE behavior across different | resource, ensuring consistent PCE behavior across different | |||
| implementations. | implementations. | |||
| When used with Segment Routing, an adjacency may have both a | When used with Segment Routing, an adjacency may have both a | |||
| protected SID and an unprotected SID. If the UNPROTECTED PREFERRED | protected SID and an unprotected SID. If the UNPROTECTED PREFERRED | |||
| option is selected, the PCE chooses the unprotected SID. | option is selected, the PCE chooses the unprotected SID. | |||
| Alternatively, if the PROTECTED PREFERRED option is selected, the PCE | Alternatively, if the PROTECTED PREFERRED option is selected, the PCE | |||
| chooses the protected SID. | chooses the protected SID. | |||
| 5. Protection Enforcement Flag (E flag) | 5. Protection Enforcement Flag (E Flag) | |||
| Section 7.11 of [RFC5440] describes the encoding of the Local | Section 7.11 of [RFC5440] describes the encoding of the Local | |||
| Protection Desired (L) flag. The Protection Enforcement (E) flag, | Protection Desired (L) flag. The Protection Enforcement (E) flag, | |||
| which extends the L flag, is specified below. | which extends the L flag, is specified below. | |||
| +=====+==========================+===========+ | +=====+==========================+===========+ | |||
| | Bit | Description | Reference | | | Bit | Description | Reference | | |||
| +=====+==========================+===========+ | +=====+==========================+===========+ | |||
| | 6 | Protection Enforcement | RFC 9488 | | | 6 | Protection Enforcement | RFC 9488 | | |||
| +-----+--------------------------+-----------+ | +-----+--------------------------+-----------+ | |||
| skipping to change at line 250 ¶ | skipping to change at line 249 ¶ | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Include-all | | | Include-all | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Setup Prio | Holding Prio | Flags |E|L| Reserved | | | Setup Prio | Holding Prio | Flags |E|L| Reserved | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| // Optional TLVs // | // Optional TLVs // | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Flags (8 bits) | Flags (8 bits): | |||
| L (Local Protection Desired): This flag is defined in [RFC5440] | L (Local Protection Desired): This flag is defined in [RFC5440] | |||
| and further updated by this document. When set to 1, | and further updated by this document. When set to 1, | |||
| protection is desired. When set to 0, protection is not | protection is desired. When set to 0, protection is not | |||
| desired. The enforcement of the protection is identified via | desired. The enforcement of the protection is identified via | |||
| the E flag. | the E flag. | |||
| E (Protection Enforcement): | E (Protection Enforcement): This flag controls the strictness | |||
| This flag controls the strictness with which the PCE must apply | with which the PCE must apply the L flag. When set to 1, the | |||
| the L flag. When set to 1, the value of the L flag needs to be | value of the L flag needs to be respected during resource | |||
| respected during resource selection by the PCE. When the E | selection by the PCE. When the E flag is set to 0, an attempt | |||
| flag is set to 0, an attempt to respect the value of the L flag | to respect the value of the L flag is made; however, the PCE | |||
| is made; however, the PCE could relax or ignore the L flag when | could relax or ignore the L flag when computing a path. The | |||
| computing a path. The statements below indicate preference | statements below indicate preference when the E flag is set to | |||
| when the E flag is set to 0 in combination with the L flag | 0 in combination with the L flag value. | |||
| value. | ||||
| When both the L flag and E flag are set to 1, then the PCE MUST | When both the L flag and E flag are set to 1, then the PCE MUST | |||
| consider the protection eligibility as a PROTECTION MANDATORY | consider the protection eligibility as a PROTECTION MANDATORY | |||
| constraint. | constraint. | |||
| When the L flag is set to 1 and the E flag is set to 0, then the PCE | When the L flag is set to 1 and the E flag is set to 0, then the PCE | |||
| MUST consider the protection eligibility as a PROTECTION PREFERRED | MUST consider the protection eligibility as a PROTECTION PREFERRED | |||
| constraint. | constraint. | |||
| When both the L flag and E flag are set to 0, then the PCE SHOULD | When both the L flag and E flag are set to 0, then the PCE SHOULD | |||
| End of changes. 8 change blocks. | ||||
| 25 lines changed or deleted | 23 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||