rfc9488v2.txt   rfc9488.txt 
skipping to change at line 58 skipping to change at line 58
in the Revised BSD License. in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction 1. Introduction
2. Requirements Language 2. Requirements Language
3. Terminology 3. Terminology
4. Motivation 4. Motivation
4.1. Implementation Differences 4.1. Implementation Differences
4.2. SLA Enforcement 4.2. SLA Enforcement
5. Protection Enforcement Flag (E flag) 5. Protection Enforcement Flag (E Flag)
5.1. Backwards Compatibility 5.1. Backwards Compatibility
6. Security Considerations 6. Security Considerations
7. IANA Considerations 7. IANA Considerations
8. References 8. References
8.1. Normative References 8.1. Normative References
8.2. Informative References 8.2. Informative References
Acknowledgements Acknowledgements
Authors' Addresses Authors' Addresses
1. Introduction 1. Introduction
skipping to change at line 124 skipping to change at line 124
3. Terminology 3. Terminology
This document uses the following terminology: This document uses the following terminology:
PROTECTION MANDATORY: The path MUST have protection eligibility on PROTECTION MANDATORY: The path MUST have protection eligibility on
all links. all links.
UNPROTECTED MANDATORY: The path MUST NOT have protection eligibility UNPROTECTED MANDATORY: The path MUST NOT have protection eligibility
on all links. on all links.
PROTECTION PREFERRED: PROTECTION PREFERRED: The path should have protection eligibility on
The path should have protection eligibility on all links but might all links but might contain links that do not have protection
contain links that do not have protection eligibility. eligibility.
UNPROTECTED PREFERRED: UNPROTECTED PREFERRED: The path should not have protection
The path should not have protection eligibility on all links but eligibility on all links but might contain links that have
might contain links that have protection eligibility. protection eligibility.
PCC: PCC: Path Computation Client. Any client application requesting a
Path Computation Client. Any client application requesting a path path computation to be performed by a Path Computation Element.
computation to be performed by a Path Computation Element.
PCE: PCE: Path Computation Element. An entity (component, application,
Path Computation Element. An entity (component, application, or or network node) that is capable of computing a network path or
network node) that is capable of computing a network path or route route based on a network graph and applying computational
based on a network graph and applying computational constraints. constraints.
PCEP: Path Computation Element Communication Protocol PCEP: Path Computation Element Communication Protocol
LSPA: LSP Attributes object [RFC5440] LSPA: LSP Attributes object [RFC5440]
4. Motivation 4. Motivation
4.1. Implementation Differences 4.1. Implementation Differences
As defined in [RFC5440], the mechanism to signal protection As defined in [RFC5440], the mechanism to signal protection
skipping to change at line 214 skipping to change at line 213
choose a protected or unprotected instruction associated with a choose a protected or unprotected instruction associated with a
resource, ensuring consistent PCE behavior across different resource, ensuring consistent PCE behavior across different
implementations. implementations.
When used with Segment Routing, an adjacency may have both a When used with Segment Routing, an adjacency may have both a
protected SID and an unprotected SID. If the UNPROTECTED PREFERRED protected SID and an unprotected SID. If the UNPROTECTED PREFERRED
option is selected, the PCE chooses the unprotected SID. option is selected, the PCE chooses the unprotected SID.
Alternatively, if the PROTECTED PREFERRED option is selected, the PCE Alternatively, if the PROTECTED PREFERRED option is selected, the PCE
chooses the protected SID. chooses the protected SID.
5. Protection Enforcement Flag (E flag) 5. Protection Enforcement Flag (E Flag)
Section 7.11 of [RFC5440] describes the encoding of the Local Section 7.11 of [RFC5440] describes the encoding of the Local
Protection Desired (L) flag. The Protection Enforcement (E) flag, Protection Desired (L) flag. The Protection Enforcement (E) flag,
which extends the L flag, is specified below. which extends the L flag, is specified below.
+=====+==========================+===========+ +=====+==========================+===========+
| Bit | Description | Reference | | Bit | Description | Reference |
+=====+==========================+===========+ +=====+==========================+===========+
| 6 | Protection Enforcement | RFC 9488 | | 6 | Protection Enforcement | RFC 9488 |
+-----+--------------------------+-----------+ +-----+--------------------------+-----------+
skipping to change at line 250 skipping to change at line 249
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Include-all | | Include-all |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Setup Prio | Holding Prio | Flags |E|L| Reserved | | Setup Prio | Holding Prio | Flags |E|L| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
// Optional TLVs // // Optional TLVs //
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Flags (8 bits) Flags (8 bits):
L (Local Protection Desired): This flag is defined in [RFC5440] L (Local Protection Desired): This flag is defined in [RFC5440]
and further updated by this document. When set to 1, and further updated by this document. When set to 1,
protection is desired. When set to 0, protection is not protection is desired. When set to 0, protection is not
desired. The enforcement of the protection is identified via desired. The enforcement of the protection is identified via
the E flag. the E flag.
E (Protection Enforcement): E (Protection Enforcement): This flag controls the strictness
This flag controls the strictness with which the PCE must apply with which the PCE must apply the L flag. When set to 1, the
the L flag. When set to 1, the value of the L flag needs to be value of the L flag needs to be respected during resource
respected during resource selection by the PCE. When the E selection by the PCE. When the E flag is set to 0, an attempt
flag is set to 0, an attempt to respect the value of the L flag to respect the value of the L flag is made; however, the PCE
is made; however, the PCE could relax or ignore the L flag when could relax or ignore the L flag when computing a path. The
computing a path. The statements below indicate preference statements below indicate preference when the E flag is set to
when the E flag is set to 0 in combination with the L flag 0 in combination with the L flag value.
value.
When both the L flag and E flag are set to 1, then the PCE MUST When both the L flag and E flag are set to 1, then the PCE MUST
consider the protection eligibility as a PROTECTION MANDATORY consider the protection eligibility as a PROTECTION MANDATORY
constraint. constraint.
When the L flag is set to 1 and the E flag is set to 0, then the PCE When the L flag is set to 1 and the E flag is set to 0, then the PCE
MUST consider the protection eligibility as a PROTECTION PREFERRED MUST consider the protection eligibility as a PROTECTION PREFERRED
constraint. constraint.
When both the L flag and E flag are set to 0, then the PCE SHOULD When both the L flag and E flag are set to 0, then the PCE SHOULD
 End of changes. 8 change blocks. 
25 lines changed or deleted 23 lines changed or added

This html diff was produced by rfcdiff 1.48.