Internet Draft Alia Atlas (Avici Systems) Expires:January 2002 Curtis Villamizar - Avici Systems Caren Litvanyi - Qwest Communications JulyMay 20002 Markus Jork (Avici Systems) November 2001 MPLS RSVP-TE Interoperability for Local Protection/Fast Reroutedraft-atlas-rsvp-local-protect-interop-01.txtdraft-atlas-rsvp-local-protect-interop-02.txt Status of this Memo This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet- Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html AbstractRouters implementingOur combined draft on fast-reroute, draft-ping-rsvp-fastreroute- 00.txt, leaves several areas with future work required. One of those areas is the merging rules for detour LSPs. This draft describes some of the issues with the merging rules presented in draft-ping- rsvp-fastreroute-02.txt and proposes a solution which also enhances interoperability. The implementation of detour LSPs described in draft-ping-rsvp- fastreroute-00.txt results in intermittent backup availability. A detour LSP will become temporarily unavailable when other detours with different EROs are merged into it; local protectionenhancements given in [draft-ietf-mpls-rsvp-lsp-tunnel-08.txt], whose usagewill become temporarily unavailable if re-optimization of a backup path isclarified in [draft-swallow-rsvp-bypass-label-01.txt],implemented. This draft describes examples of the above problems androuters implementing solely [draft-gan-fast-reroute-00.txt]proposes a solution. The solution also resolves issues with merged backups which do notinteroperate toprovidelocal protection. Those routers which follow the guidelines given in this draft should be ableadequate protection, due tointeroperate with either typethe use ofimplementation.SRLGs. Theguidelinessolution alsospecify how to support make- before-break withfinds backupLSPs.paths in some topologies where a detour LSP could not be found, in the merging rules in draft-ping- rsvp-fastreroute-00.txt were followed. Recommended behavior for supporting a revertive mode for local protection is specified. Contents 1. Introduction............................................................................................. 3 2.Terminology ...............................................Backup Availability ........................................ 3 3.Ingress Support ...........................................Backup Does Not Provide Protection ......................... 4 3.1Requesting Local Protection ..............................Selected ERO Merges at PLR ................................ 4 3.2Detecting Protection Information .........................Selected ERO Uses SRLG .................................... 5 3.3 No Backup Path For Detour LSP ............................. 5 4.PLR Behavior ..............................................Solution to Problems with Merging Rules .................... 6 4.1Selecting Backup LSP Type ................................ 7 4.2 Bypass Tunnels ........................................... 8 4.3 Make-Before-Break on Backup TunnelsDetour Object Need Not be Understood ......................8 4.3.1 Shared-Explicit and Backup LSPs ........................ 9 4.3.27 5. Make-Before-Breakwith Sender Addresses .......................................................... 7 6. Revertive Behavior: Recovery from Failure .................. 94.4 Catching ResvTears and Appropriate PathErrs ..............6.1 Local Failure ............................................. 104.5 Handling Resource Preemption ............................. 11 5. Merge Node Behavior ....................................... 11 5.1 Label Space .............................................. 11 5.2 Ignore Path Tears Unless From Ingress .................... 11 5.3 Simple and Detour Backup LSPs ............................ 12 5.4 ResvTears ................................................ 12 6.6.2 Remote Failure ............................................ 10 7. Security Considerations................................... 13 7. References ................................................ 13.................................... 10 8. Reference .................................................. 10 9. Authors' Addresses........................................ 14......................................... 11 1. IntroductionRouters may implement the local protection enhancements given in [RSVP-TE], whose usageOur combined draft on fast-reroute, draft-ping-rsvp-fastreroute- 00.txt, leaves several areas with future work required. One of those areas isclarified in [BYPASS], but not implement [DETOUR]. Routers may also implement [DETOUR] without implementingthelocal protection enhancements given in [RSVP-TE]. These two sets of routers will not interoperate to provide local protection.merging rules for detour LSPs. This draftassumes that a router falls into onedescribes some of thefollowing three sets: A. Implements bothissues with thelocal protection enhancements givenmerging rules presented in[RSVP-TE]draft-ping- rsvp-fastreroute-02.txt and[DETOUR] as described in this draft. B. Implements only [DETOUR]. C. Implements only the local protection enhancements given in [RSVP-TE], according to the guidelines in [BYPASS].proposes a solution which also enhances interoperability. Theguidelines givenimplementation of detour LSPs described inthis draft should allow routers[FAST-REROUTE] results insetintermittent backup availability. Ato interoperate with either of thedetour LSP will become temporarily unavailable when othertwo sets of routers, but not both. A networkdetours withrouters in set A and set B will be able to providedifferent EROs are merged into it; localprotection. A network with routers in set A and set Cprotection willbe able to provide local protection. A network that contains routers from both set Bbecome temporarily unavailable if re-optimization of a backup path is implemented. This draft describes examples of the above problems andset C willproposes a solution. The solution also resolves issues with merged backups which do notbe able toprovidelocal protectionadequate protection, due to the use of SRLGs. The solution also finds backup paths in somecases involving paths withtopologies where amix ofdetour LSP could not be found, in thetwo types of routers, irrespective ofmerging rules in [FAST-REROUTE] were followed. Finally, thepresence or absence of routers from set A. This draft also describes a modificationsolution allows make-before-break toidentifyingwork on detour LSPsspecifiedwithout causing the protection to become temporarily unavailable. Recommended behavior forShared-Explicit which distinguish between primary and backup bandwidth reservations. Thissupporting a revertive mode for local protection isnecessary to support make- before-break on backup tunnels; howspecified. 2. Backup Availability In order for local protection tosupport make-before-break on backup tunnels is described. More details on handling PathErrs and resource preemptionbe useful in mission-critical networks, it isprovided. 2. Terminologyimportant that local protection, once created at a PLR(Point-of-Local-Repair): Any node along thefor a given primaryLSP's path isLSP, remains available at all times until apotential PLR. A node becomes an active PLR when it takes actionsingle fault has occurred. That fault could be physical or due totransfer traffic fromresource preemption and could occur on either the primary LSPto aor the backuptunnelLSP. The fault against which the backup protects could occur at any time, including whena failurethe backup islocally detected. When discussedtemporarily unavailable. Similarly, at any time, traffic could be running across a backup - if it becomes temporarily unavailable then, traffic loss will result. The following example demonstrates a case when following the merging rules given inexamples,[FAST-REROUTE] result in the backup becoming temporarily unavailable. In this example, thespecific potentialPLR ofinterest isthenodebackup whichoriginatesis temporarily unavailable is not aware that thespecificbackuptunnel under discussion. Backup Tunnel: Ais not functional during that period. [R1]----[R2]----[R3]----[R4]--R5] | \ / | / [R6]-------[R8]----------[R9] Primary: R1-R2-R3-R4-R5 R2 backup: R2-R8-R9-R4 R3 backup: R3-R8-R9-R5 Figure 1: New Detour Causes Existing Detour to Fail Assume that due to setup timing, R2's backuptunnelislogicallycreatedfromfirst. Then when thePLRdetour from R3 tries toabe created, R8 must mergenode ontheprimary LSP's path; which specific merge node is used can vary betweentwo detours together. According to thebackup LSPs containedmerging rules in [FAST-REROUTE], R8 must select thebackup tunnel. The backup tunnel can contain one or more backup LSPs for a given primary LSP. The concept ofERO to R3's backup. When R8 does so, there is a period when the backuptunnel permits make-before- break for backup LSPs. Backup LSP: A backup LSP extendsfromits origin atR2 was "up" but isn't actually available unless R8 and R9 deal with changing thePLR toERO in aspecific merge node, where it rejoinsmake-before-break fashion. The same problem will occur when and if theprimary LSP. AbackupLSPfrom R3 ispart of atorn down. Tearing down R3's backup will make R2's backup temporarily unavailable. 3. BackupTunnel.Does Not Provide Protection There are threetypesexamples ofbackup LSPs - simple, detour and unsignalled. Simple Backup LSP: A Simple Backup LSP iswhere the merging rules given in [FAST- REROUTE] result in either abackupfinal detour LSPwhose PATH messagewhich does notinclude the DETOUR object. Theprovide protection against failure or in no detour LSP being created. 3.1 Selected EROcontains the selected backup path toMerges at PLR In themerge node and then an exact duplicate offollowing example, theprimary LSP's ERO frommerging rules in [FAST-REROUTE] require thatmerge node totheegress. Detour Backupshorter ERO be selected. [R1]--[R2]----[R3]----[R4]---------------[R5]--[R6]-- \ | | \ [R7] [R8] \ | \ | \ | \ | ------[R9]--[R10]--[R11]--[R12]---[R13] Primary LSP:AR1-R2-R3-R4-R5-R6-.... R1's Backup: R1-R9-R10-R7-R3-R4-R5-R6-.... R3's Backup: R3-R7-R9-R10-R11-R12-R13-R8-R5-R6-... Figure 2: No Protection for PLR Because Merged DetourBackup LSP is aEnds at PLR In this example, R9 must merge R1's backupLSP whose PATH message includesand R3's backup. Because theDETOUR object. Theshorter EROsimply contains the selectedmust be chosen, R9 would select R1's backup's ERO; clearly R3 would not have an effective backuppath to thein this case. This problem could be resolved by adding a mergenode. Bypass Tunnel: A tunnelrule which removes any ERO from consideration which merges with thePLR of interest toprimary LSP at aspecific mergenodethroughwhichtraffic across unsignalled backup LSPs can be passed. This is used as defined in [BYPASS]. Unsignalled Backup LSP: An Unsignalled Backup LSP can only exist if there is an appropriate bypass tunnel. This bypass tunnelisused so thattheUnsignalled BackupPLR for any detour LSPis logically one hop away from the merge node. No RSVP signalling is done to create or indicatebeing merged. 3.2 Selected ERO Uses SRLG In theexistence offollowing example, theUnsignalled Backup LSP. The Unsignalled Backup LSPselected ERO usesthe label provided by the merge node, via the Label sub-object, to forward traffica link which belongs to an SRLG which one of themerge node, as described in [BYPASS]. Fully Protected: A primarymerged detour LSPs was avoiding. [R1]-----[R2]-----[R3]-------[R4] \ | / | -----[R5]------[R6]----[R7] | | | [R8]---[R9]--| Primary LSP: R1-R2-R3-R4 R1's Backup: R1-R5-R6-R7-R4 R2's Backup: R2-R5-R6-R8-R9-R4 SRLG contains: R2-R3 and R6-R7 Figure 3: Merged Detour LSPis considered to be fully protected when each potential PLR in its path hasUses acurrent backup tunnel available. 3. Ingress Support 3.1 Requesting Local Protection The [DETOUR] and [BYPASS] propose different methods for the ingressLink Avoided Due tosignal that an LSP desires local protection. These methods are not mutually incompatible. The ingress must both include the FAST_REROUTE object inSRLG In thePATH message and setabove figure, thetwo flags, "Label Recording desired" and "Local Protection desired",merging rules in [FAST-REROUTE] mean that R5 will select theSESSION_ATTRIBUTE object[RSVP-TE]. By including the FAST_REROUTE object, any nodes onERO associated with R1's backup. Unfortunately, that means that theprimarymerged detour LSPwhich implement [DETOUR]willknow thatnot protect against theprimary LSP requires protection. By settingfailure of R2-R3 because the"Local Protection desired" flaglink R6-R7 is used in theSESSION_ATTRIBUTE object, any nodes which implement [BYPASS] will know that the primaryfinal merged detour LSPrequires protection. The FAST_REROUTE object provides constraints on the backup tunnel; those constraints can be configured solely at the primary tunnel's ingressandcan differ easily differ between primary LSPs. If the ingress sets the "Label Recording desired" flag in the SESSION_ATTRIBUTE, the resulting Label subobjectsR6-R7 and R2-R3 are inthe RRO permit those PLRs which implement [BYPASS] to create Unsignalleda common SRLG. 3.3 No BackupLSPs. If there are nodesPath For Detour LSP The CSPF rules given in [FAST-REROUTE] require that theprimary LSP'sbackup pathwhich do not understand Label subobjects and do not ignore the unrecognized subobjects, as they SHOULD according to [RSVP-TE], then the ingress should not set the "Label Recording desired" flag in the SESSION ATTRIBUTE. If this flag isselected does notset, the interoperability affected will be with routers which only support Unsignalled Backup LSPs. This must becross aconfigured option at the ingress. It is assumed that the network operator knows whether routers in the network support LRO, don't support but correctly ignore request for LRO, or handle the LROlink inviolation ofthespecification. 3.2 Detecting Protection Information The primary tunnel's ingress is responsible for determining when rerouting ofsame direction as the primarypath is desirable. For instance, if local protectionLSP does. This isin use on the current primary LSP, it would be desirabletocompute a new primary LSP. The ingress must also determineavoid merging problems whento move fromacurrentdetour LSPto a new LSP, via make-before-break. For instance, it will take time before a newly createdintersects its primary LSPwilland yet should not befully protected. Ifmerged. However, this can result in thenew primary LSP were to be createdlack of protection, due to aconfiguration change or adaptation to network changes, then the ingress might wait to move traffic to the new primary LSP until that is fully protected. Alternatively, if the new primary LSP were to be created because local protection islack of paths, as described inuse on the current primary LSP,theingress may move traffic immediatelyfollowing example. [R1]--[R2]--[R3]--[R4] | / | | | / | | [R5]--[R6]--[R7]---------| Primary: R5-R6-R7-R2-R3-R4 R2 Backup: R2-R6-R7-R4 [R2]-[R7] has insufficient bandwidth tothe new primary LSP or it may wait until the new primarysupport R2's backup Figure 4: Detour LSPis as locally protected along its pathuses same link asthe currentprimary LSPis. For both of the reasons above,upstream from PLR In theingress must know what nodes along an LSP's pathabove example, there arecurrently providing local protection and whichtwo possible ways for R2 to havethat local protection in use. The "Local protection available" and "Local protection in use" in the IPv4 address and IPv6 address subobjects of the RRO [RSVP-TE] providea backup. Either, it can use R2-R6-R7 or it can use R2-R7. In this scenario, thenecessary informationlink R2-R7 does not have sufficient free bandwidth to admit theingress.backup LSP. 4. Solution to Problems with Merging Rules Theingress mayproblems with the merging rules can benotified that local protection is in use viasolved by using aPathErr message with an error codedifferent SENDER_TEMPLATE for each backup LSP, instead of"Notify"(25)using the primary's SENDER_TEMPLATE, andan error value of "Tunnel locally repaired"(3)bynodes implementing [BYPASS]. Routers implementing only [DETOUR] without the local protection enhancements given in [RSVP-TE] maynotset the "Local protection available" and "Local protection in use" flags inmerging Path messages with different EROs. First, consider theIPv4 and IPv6 address subobjectssolution ofthe RRO. To permit the ingress behavior described early in this section, the ingress should be configured with information about which nodes implement only [DETOUR] and, therefore, donotsupport a meansmerging Path messages with different EROs. This alone appears toindicate that local protection is available at that node. Such nodes can be ignored atresolve all three of theingressissues described inany decision regarding whether the protection is fully available (it must be assumed that protection is available for any such nodeSection 3. However, simply not merging Path messages with different EROs introduces other problems whenany RSVP RESV arives). 4. PLR Behavior Once an ingress or midpoint node has determined that a givenall detour LSPs for the same primary LSPis requesting local protection, that node, acting inhave therole of a PLR, must determinesame SENDER_TEMPLATE. Consider thelink(s) and/or node(s) thatthird issue described where the backuptunnelpath mustavoid. Then,cross and use thePLR must determinesame link as thebackup pathprimary LSP. Not merging the detour LSP andmerge node. Finally,thePLR must determine what type of backupprimary LSP leads touse and create it. A link or node could fail for a variety of reasons. Links for which failure may be correlated are determined throughtheuse of Shared Risk Link Groups (SRLGs). SRLGs may be signaled via [GMPLS IS-IS] and [GMPLS OSPF]. The PLR caninability to determinewhat SRLGs are present through this signaling or through configuration at each node of all SRLGs in the entire network. Some routers may support only signaled SRLGs and therefore SRLG signaling must be originated. Some routers may only support configured SRLGs and therefore cannot originate signaled SRLGs and therefore the abilitywhether a PathErr belongs toconfigure SRLGs for external links must be supported. 4.1 Selecting Backupthe Primary LSPType The PLR may decideor tocreateabackupBackup LSPeither when it has receivedthrough theprimary LSP's PATH message or after it has receivedLSR with theprimary LSP's RESV message. The latter case is required if unsignalled backup paths are desirable. The former case is reasonablesame next hop. Figure 4 demonstrates the problem with this partial solution. In Figure 4, ifmost LSPs are expectedthe link from R7-R4 breaks, R7 will send a PathErr tobe created successfullyR6. If the SENDER_TEMPLATE for the Primary LSP andiffor R2's Backup LSP were theERO is primarily strict hops, so that a reasonable merge node cansame, then R6 would bedetermined. Tounable to determinewhich type of backupwhether the PathErr was for the Primary LSPto create,or for R2's Backup LSP. This is thePLR must infer what type of routersproblem with not merging Path messages with different EROs when detour LSPs share thelocal domain.same SENDER_TEMPLATE. To further elaborate, consider Figure 5 below, when one tries to NOT merge Path messages for detour LSPs with different EROs but with the same next link/hop. [R1]--[R2]--[R3]--[R4] \ | | / \ | | / [R5]---[R6] Primary : R1-R5-R6-R4 R1's Backup: R1-R2-R3-R6 R5's Backup: R5-R2-R3-R4 Figure 5: OverMerging Backup LSPs If theother routers implement [BYPASS], then either a simpleSENDER_TEMPLATES for R1's backupLSP or an unsignalledand R5's backupLSP should be created. Ifare theother routers implement [DETOUR],same, then adetour backup LSP should be created. If the PLR is to createRESV received for one would have a FILTER_SPEC which would match both R1's backupLSP when it has receivedand R5's backup. Because theprimary LSP's PATH message, thenSENDER_TEMPLATEs are thePLR must determinesame and thetype ofDetour object is not included in the RESV, there is no way at R2 to distinguish a RESV for R1's backupLSP based uponfrom a RESV for R5's backup. From theinferred typepreceeding, there are two alternatives if merging of Path messages with different EROs is not desired (as demonstrated via Figure 1). Either, theingress. If the primary's PATHDetour object must be included in every Path, Resv, PathErr, ResvErr, PathTear, ResvTear, and ResvConf messagecontains a FAST_REROUTE object, itwhich isassumed that other routers will supportfor the[DETOUR]. The PLR will attempt to create adetourbackup LSP. If no FAST_REROUTE object is foundLSP orifthe SENDER_TEMPLATEs for detourcreationLSPs must be different. The former alternative isrejected, as indicated by a PathErr withessentially expanding theerror code "Unknown object class", thenSENDER_TEMPLATE to include the Detour object. The recommendation is to simply use asimple backup LSP can be attempted.different SENDER_TEMPLATE. Thelatter case can only occur"IPv4 tunnel sender address" ina mixed network wheretheingress supports [DETOUR] but a node along the selected backup path does not. In this case,SENDER_TEMPLATE MUST contain an IP address of the PLR. A backup LSPmustMUST beresignaled without a DETOUR object. Whenidentified as follows. The SESSION object and thePLR creates a backup LSP after it has receivedLSP_ID are copied from the primaryLSP's RESV message, the decision as to backupLSPtype is based upon inferring the behaviorbeing protected. The IPv4 tunnel sender address MUST be set to an address of themergePLR node. If themerge node has recorded a label, viahead-end of asubobject in the RRO, then the PLR can assume thattunnel is also acting as themerge node implements [BYPASS] withPLR, it MUST choose an IP address different from theRSVP enhancements givenone used in[RSVP-TE]. Otherwisethemerge node is assumed to implement [DETOUR] and a detour backupSENDER_TEMPLATE of the original LSP tunnel. 4.1 Detour Object Need Not be Understood An additional benefit of having different SENDER_TEMPLATEs for detour LSPs issignalled. Ifthat theselected merge node doesDetour object need notsupport, or is assumed tobe rejected by LSRs which do notsupport,understand it. Instead, theDETOUR object, then a simple backup pathDetour object can beused. Using this method,silently passed along; its use is for managability. This simplifies thePLR can provideinteroperability scenarios between an LSR which implements only themost efficientfacility backupLSP feasiblemethod giventhe capabilites of the downstream LSRs. 4.2 Bypass Tunnels The use of the tunnel heirarchy describedin[BYPASS] provides enhanced scalability for local protection. The midpoint nodes along the active LSP of the bypass tunnel are aware of[FAST-REROUTE] andreserve for only one LSP, but multiple backup LSPs can use the same bypass tunnel. This use of a label stack isnotlimited totheunsignalledone-to-one detour LSP backupLSPs discussedmethod given in[BYPASS]. It is also possible to have simple backup LSPs or[FAST- REROUTE]. 5. Make-Before-Break Supporting make-before-break for detourbackupLSPsbe tunneled through a bypass tunnel. To do this,is important if re-optimization of thesimple or detourbackupLSP's PATH message must be sent throughpaths is desired. It guarantees that thebypass tunnel; itlocal protection, once created, willemerge at the merge node. The backup path part of the ERO would simply be the merge node. To support this, the merge node and the PLR must trust each other to provide legitimate RSVP messages. A bypass LSP may also be used by the PLR to avoid sendingremain continuously available until aDETOUR object throughfailure occurs. At anode which does not support [DETOUR] to reachPLR, consider amerge nodesingle detour LSP for a given primary LSP. When network adaptivity, configuration, etc. dictate thatdoes support [DETOUR] and does not support LRO. 4.3 Make-Before-Break on Backup Tunnels In supporting make-before-break on backup tunnels, the option of usinga differentLSP-IDpath isnot available. As described in [RSVP-TE], when doing a make-before-break on a regular tunnel,preferred for theingress will allocatedetour, a new detour LSPID tomust beused when creating acreated. Once that newLSP. Because the SESSION object of the currentdetour LSPand that ofis created, the fast-reroute protection should be moved to the newLSP aredetour LSP; then thesame and Shared-Explicit (SE)old detour LSP can finally be torn down. The requirement isspecified, resources willfor local-protection to ALWAYS beshared. When signallingavailable at a given PLR for a given primary LSP until a single failure occurs. That failure may occur on the backup or on the primary. When signalling either detour LSP, the LSP ID used (sent in the SENDER_TEMPLATE and the FILTER_SPEC objects) is that of the primary LSP which the backup LSP is protecting. The SESSION object used when signalling the backup LSP is the same as the SESSION object of the primary LSP.This behavior is common in [BYPASS] and [DETOUR]. 4.3.1 Shared-Explicit and Backup LSPs To properly support make-before-break on a backup tunnel, shared- explicit must be used on that backup tunnel. However, if this were done simply based uponTherefore, theSESSION object,option of using a different LSP-ID, asis specifieddescribed in[RSVP- TE], then the backup LSPs and the primary LSPs would share resources. This is undesirable, as demonstrated by the following topology. I---------J /| | / | | A----B E----F----G | /| | / | / | | / | / | | / |/ | |/ C----D----H Consider[RSVP-TE] for aprimary LSP which goes A-B-C-D-E-F-G. The backup LSPregular tunnel, is not available forE might go E-C-D-H-G. In this case, both the primary LSP and the backup LSP traverse the link C-D in the same direction. If the Shared-Explicit means that the primary LSP and backup LSP share resources, then only the maximum of the primary LSP's bandwidth and the backup LSP's bandwidth would be reservedmake-before-break onC-D. This would mean that insufficient resources are reserveda backup. As described inthe event of[RSVP-TE], when doing afailure of link E-F. Consider if the backup LSP at B is B-I-J-F. If the link B-C failed and A tried to createmake-before-break on anew primary LSP,regular tunnel, the ingress will allocate a new LSPwould haveID totravel across the I-J link. It is possible that the link I-J has only enough bandwidth for either the backup LSP or thebe used when creating a newprimaryLSP.From these two cases, it is clear that, backup LSPs cannot share bandwidth with the primary LSP that they are protecting and that backup LSPs must share bandwidth with primary LSPs that they are not protecting. All primary LSPs must share bandwidth with each other, as described in [RSVP-TE], to permit make-before-break.Toresolve this requires that the "LSP ID" of the FILTER_SPEC (or SENDER_TEMPLATE) be considered when determining whether LSPs should share resources once Shared-Explicit is specified. If the LSP IDs in two different RESV (or PATH) messages are different, then they can share resources. If the LSP IDs are the same, then they cannot share resources. This does not result in transitive sharing. i) Backup LSPs for LSP n ii) Primary LSP n iii) Primary LSP k iv) Backup LSPs for LSP k Consider the above four groups of LSPs. (i) can share with (iii) and (iv). (ii) can share with (iii) and (iv). (iii) can share with (i) and (ii). (iv) can share with (i) and (ii). A router following these guidelines should implement this enhancement of the rules for shared-explicit. If all backup LSPs always have zero bandwidth reserved, then this enhancement is not needed. Constraining all backup LSPs to use zero bandwidth issupport make-before-break on asevere restriction and unacceptable in some situations. 4.3.2 Make-Before-Break with Sender Addresses The prior subsection clarifies how Shared-Explicit can be specified for backup LSPs. The Shared-Explicitbackup, it isrequired for make-before- break, as explained in [RSVP-TE]. The other piecenecessaryfor make-before-break isto have a way of distinguishing the current backup LSP from the new backup LSP.For a regular TE tunnel, this is done by changingThe content in theLSP ID. However,SENDER_TEMPLATE (and FILTER_SPEC) are the LSP IDis used to associateand thebackup"IPv4 (IPv6) tunnelwith a specific primary LSP. Therefore, the LSP IDsender address". The former cannot bechangedmodified; therefore it is necessary todo a make-before-break on the backup tunnel. The other content ofchange theSENDER_TEMPLATE (and FILTER_SPEC) isaddress. For detour LSPs, the "IPv4 (IPv6) tunnel senderaddress". As suggested in [BYPASS], the PLRaddress" willfill out this addressbe filled with one of the PLR'saddresses for simple backup LSPs. A router implementing [DETOUR] may not modify this address in the SENDER_TEMPLATE;address, which is different from that used when the LSR acts as an ingress, rather than aPLR, this routerPLR. Additionally, for Detour Backup LSPs, the PLR will putthe PLR'sthat same address in the"Source ID" field in theDETOURobject. Any router which can distinguishObject's "Source ID". An LSR distinguishes a backup LSP from a primary LSPmust do sobased uponeitherthe "IPv4 (IPv6) tunnel sender address" in the SENDER_TEMPLATE (andFILTER_SPEC) or upon the "Source ID" in the DETOUR object.FILTER_SPEC). Therefore, to signal two different backup LSPs from the same PLR for the same primary LSP, the PLR must use different IP addresses, which are put into theSENDER_TEMPLATE and/or the DETOUR object.SENDER_TEMPLATE. To effect a reroute or a bandwidth change on abackup tunnel,backup, the PLR picks one of its IP addresses which is different from that used for the current backup LSPin that backup tunneland which is different from that used for primary LSP. Then the PLR signals the new backup LSP and proceeds with a make-before-break as described in [RSVP-TE]. To support make-before-break onbackup tunnelsbackups in this manner, the PLR must have ownership of two distinct IP addresses. If the PLR is also ingress, then it requires a third distinct IP address, which it uses when signalling primary LSPs. Only the router ID needs to be routable. All three addresses MUST be unique within the MPLSdomain, and MUSTdomain. Support of make-before-break on backups MAY beglobally unique if chosensupported. 6. Revertive Behavior: Recovery frompublic address space. 4.4 Catching ResvTears and Appropriate PathErrs The PLR behavior described in this section should only start after the primary LSPFailure [MPLS-RECOVERY] describes some motivations for supporting revertive behavior. It isknownnecessary tobe successfully created. If the backup tunnel is created afterhave aRESV is receivedmethod forthe primary LSP, then it sufficesrecovering back tocheck whether the backup tunnel is up. If the backup tunnel is created when a PATH message is received forthe primaryLSP, then it is necessary that the backup tunnel be up and thatLSP after aRESVfailure hasbeen received forrecovered. Ideally, as soon as theprimary LSP. Under those circumstances,Ingress learned about thePLR must not forward ResvTear [DETOUR]. Instead, whenfailure, aResvTear is received,new primary LSP would have been created and thePLR should movetrafficto the backup tunnel, ifmoved onto it. Practically, it isup, and thennotpropagate the ResvTear upstream towards the ingress. The PLR must also handle certain PathErrs similarlyrequired tohow it handles ResvTears. If the PLR receives a PathErr with an error codeoccur. A recomputation of"Policy Control failure", as happens whenthe primaryLSP is preempted, ortunnel's path for aPathErr with an error codenew primary LSP can guarantee the use of"Routing Problem" andasub-code of "No routenewly availabletoward destination", as may happenresource. Revertive behavior MAY be supported. The determination of when alink or node fails, then the PLR should similarly move traffic to the backup tunnel, if itfailure is over isup, and then not propagate the PathErr upstream towards the ingress. According to [RSVP-TE], the PathErr with the code "Policy Control failure" occurs when the primary LSP to be preemptedasthe result of another LSP being setup. This LSP failure caused by resource preemption cannot befollows: 1) The locally detectedat the ingress based upon IGP (IS-IS or OSPF) information. Therefore the ingress must be explicitly notifiedfailure, ifthe PLR receives this type of PathErrany, has cleared (e.g. interface has come back up), 2) anddoes not propagate it further upstream toward the ingress; if so, the PLR should sendaPathErr with an error code of "Notify" and an error value of "Tunnel locally repaired". 4.5 Handling Resource Preemption It is possibleRESV message forathe primary LSPto have its resources preempted, due tohas been received since thearrival and admission of another LSP. Iffailure occured. Practically, when a RESV for thePLRprimary LSP ismaking this determinationreceived at a PLR and that PLR hasa backup tunnel, which is currently up,local protection in use for that primary LSP,thenif no local failure is detectable, the PLRshould move traffic from the primary LSPmay revert to using thebackup tunnel and then send a PathErr with an error code of "Notify" and an error value of "Tunnel locally repaired".primary LSP. Whenthis type of PathErr is received attheingress, the ingress should rerouteRESV for thetunnel onto a newprimary LSPusing make- before-break. 5. Merge Node Behavior 5.1 Label Space To support all types of backup LSPs, a merge node must useis received, it is highly likely that aplatform-wide (aka global)different labelfor an LSP which has requested local protection. If an implemention does not normally provide platform-wide labels for unprotected RSVP-TE LSPs, additional behavior shouldwill bedefined to handle an LSP which changes from requesting local protection to not and vice versa. It is not recommended to change this attribute of a TE tunnel without doing a reroute. 5.2 Ignore Path Tears Unless From Ingress /--F----G----H--\ / | | | \ A----B----C----D----E Primary LSP: A-B-C-D-E Bypass Tunnel's LSP: B-F-G-H-D Inspecified in theabove example, consider whatLABEL Object. This occurswhen the link B-C fails. B will start using its unsignalled backup path, which goes through the bypass tunnel, and C will send a PathTear to D. If D acts uponif thePathTear received from C, then D would tear downdownstream neighbor of theremainderPLR has lost all knowledge of the primary(D-E) which is required to deliver traffic sent overLSP. When theunsignalled backup path toPLR receives a different label, it MUST change theegress. Because B isprimary LSP to usingan unsignalled backup path, D cannot determinethatit islabel without propogating amerge node. This example indicates that PathTears must be ignored fordifferent label upstream. Essentially, to revert to the primaryLSPs which request local protection. However, ignoring all PathTears means thatLSP, theingress cannot destroyPLR should: 1) Update the primaryLSP. This unfortunate loss of capability can be remedied by examination ofLSP's out-segment to use thePathTear message. Ifnew label specified, 2) Move thePathTear's IP packet's source IP address matchestraffic from the"IPv4 (IPv6) tunnel sender address" inbackup LSP's out-segment to theSENDER_TEMPLATE object, thenprimary LSP's out-segment, 3) And clear thePathTear came"local protection in use" flag from its IPv4 (IPv6) address subobject in the primary LSP'singress andRRO. This change shouldnotbeignored. 5.3 Simple and Detour Backup LSPs A router can determine that it is the merge node of either a simple backup LSP or a detour backup LSP. In the latter case, the DETOUR object contains one ofpropogated back to themerge node's IP addresses. Iningress as soon as feasible. 6.1 Local Failure If theformer case, iffailure being recovered from is local, no PATH messages can be sent for thematchingprimary LSPis known at the router anduntil theERO inaffected link, etc, has recovered. If thesimple backup LSP'sfailure was resource preemption, revertive behavior may not be reasonable. If desired, then if a PATH messagematchesfor theEROprimary LSP succeeds in getting resources on the primary LSP'sPATH message,out-going interface, thenthe node is the merge node. If the router is the merge node for a simple backup LSP,and only then can thesimple backup LSP'sPLR forward a PATH messageis not sent all the way to the egress, but is instead merged to the primary LSP and handled at the merge node. The merge node is responsibleforconstructing a RESV based uponthe primaryLSP's RESV, includingLSP downstream. 6.2 Remote Failure If theRRO, and sending that. As long as a router knows that itfailure being recovered from is remote, then themerge nodePLR may send PATH messages foran existing backup LSP, the router will not tear downthe primary LSP immediately. However, in response tothe egress. 5.4 ResvTears When a router receives a ResvTear for an LSP and it is notsuch aPLR for that LSP, then the router should propagate the ResvTear towards the LSP's ingress. For each backup LSP wherePATH message while therouterfailure is occuring, themerge node, the ResvTear should alsoPATH message will bepropagated along the backup LSP towards the backup LSP's ingress,met with aPLR. This propagation clearly works for simplePathErr. All such PathErrs must be ignored anddetour backup LSPs. For unsignalled backup LSPs, the router doesnotknow itpropogated upstream. The PLR isa merge node. A----B----C----D | | | | E----F----G----H Primary LSP: A-B-C-D Bypass Tunnel 1: A-E-F-G-C Bypass Tunnel 2: B-F-G-H-D Bypass Tunnel 3: C-G-H-D In the above example, consider the behavior when router D fails. C will determinealready aware thatboth the primary LSP and bypass tunnel 3 are down. Therefore, C will sendaResvTear to B. B will determine that bypass tunnel 2 is down and that the primary LSP has been torn down, due to receiving the ResvTear. Therefore, B will send a ResvTear to A. A will determine that the primary LSP is downfailure exists andwill switch to using an unsignalled backup path through bypass tunnel 1. Bypass tunnel 1isstill up. A willrepairing around that failure. The PLR should send a PATH message for the primary LSPthrough bypass tunnel 1 to C. C will determine the the next hop in the PATH's ERO is unreachable and send a PathErr with error code "Routing Problem" and a sub-code of "No route available toward destination". When A receives this PathErr, A will determine that the unsignalled backup LSP isnolonger available and will propagate that error upstream. 6.more frequently than the normal refresh interval. 7. Security ConsiderationsThis draft provides guidlelines forThese procedures do not change theusetrust model ofexisting protocol mechanisms defined in [RSVP-TE], [BYPASS],RSVP [RFC2205] and[DETOUR] which are designed to maximize interoperability. No new protocol is defined. The usage or existing protocol described here does not introduce any[RSVP-TE]. As such no additional securityrisks. 7.risks are posed. 8. References[RSVP-TE] Awduche, D.[FAST-REROUTE] Pan, P. et al.,"RSVP-TE: Extensions to RSVP for LSP Tunnels", Internet Draft, draft-ietf-mpls-rsvp-lsp-tunnel-08.txt, February 2001. [BYPASS] Swallow, G. and Goguen, R., "RSVP Label Allocation for Backup Tunnels","Fast Reroute Techniques in RSVP-TE", Internet Draft,draft-swallow-rsvp-bypass-label- 01.txt,draft-ping-rsvp-fastreroute-00.txt, November2000 [DETOUR] Gan, D.2001 [MPLS-RECOVERY] Sharma, V. et al.,"A Method"Framework forMPLS LSP Fast-Reroute Using RSVP Detours",MPLS-based Recovery", Internet Draft,draft-gan-fast-reroute-00.txt, Aprildraft-ietf-mpls-recovery-frmwrk-03.txt, July 2001[GMPLS IS-IS] Kompella, K.[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119, March 1997. [RFC2205] Braden, R. et al.,"IS-IS Extensions in Support of Generalized MPLS", Internet Draft, draft-ietf-isis-gmpls-extensions- 02.txt, February 2001 [GMPLS OSPF] Kompella, K."Resource ReSerVation Protocol (RSVP) -- Version 1, Functional Specification", RFC 2205, September 1997. [RSVP-TE] Awduche, D. et al.,"OSPF"RSVP-TE: Extensionsin Support of Generalized MPLS",to RSVP for LSP Tunnels", Internet Draft,draft-kompella-ospf-gmpls- extensions-01.txt,draft-ietf-mpls-rsvp-lsp-tunnel-08.txt, February2001 8.2001. 9. Authors' Addresses Alia Atlas Avici Systems 101 Billerica Avenue N. Billerica, MA 01862 Voice: +1 (978) 964-2070 Email: aatlas@avici.comCurtis Villamizar Email: curtis@avici.com Caren Litvanyi PO Box 2535 Cupertino, CA 95015Markus Jork Avici Systems 101 Billerica Avenue N. Billerica, MA 01862 Voice: +1 (978) 964-2142 Email:litvanyi@synack.netmjork@avici.com