< draft-bryant-pwe3-packet-pw-03.txt   draft-bryant-pwe3-packet-pw-04.txt >
Network Working Group S. Bryant, Ed. Network Working Group S. Bryant, Ed.
Internet-Draft L. Martini Internet-Draft L. Martini
Intended status: BCP G. Swallow Intended status: BCP G. Swallow
Expires: September 9, 2010 Cisco Systems Expires: January 9, 2011 Cisco Systems
A. Malis A. Malis
Verizon Communications Verizon Communications
March 8, 2010 July 8, 2010
Packet Pseudowire Encapsulation over an MPLS PSN Packet Pseudowire Encapsulation over an MPLS PSN
draft-bryant-pwe3-packet-pw-03.txt draft-bryant-pwe3-packet-pw-04.txt
Abstract Abstract
This document describes a pseudowire mechanism that is used to This document describes a pseudowire mechanism that is used to
transport a packet service over an MPLS PSN is the case where the transport a packet service over an MPLS PSN is the case where the
client LSR and the server PE are co-resident in the same equipment. client LSR and the server PE are co-resident in the same equipment.
This pseudowire mechanism may be used to carry all of the required This pseudowire mechanism may be used to carry all of the required
layer 2 and layer 3 protocols between the pair of client LSRs. layer 2 and layer 3 protocols between the pair of client LSRs.
Requirements Language Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC2119 [RFC2119]. document are to be interpreted as described in RFC2119 [RFC2119].
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF). Note that other groups may also distribute
other groups may also distribute working documents as Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at This Internet-Draft will expire on January 9, 2011.
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 9, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Network Reference Model . . . . . . . . . . . . . . . . . . . 3 2. Network Reference Model . . . . . . . . . . . . . . . . . . . 3
3. Client Network Layer Model . . . . . . . . . . . . . . . . . . 4 3. Client Network Layer Model . . . . . . . . . . . . . . . . . . 4
4. Forwarding Model . . . . . . . . . . . . . . . . . . . . . . . 5 4. Forwarding Model . . . . . . . . . . . . . . . . . . . . . . . 5
5. Design Considerations . . . . . . . . . . . . . . . . . . . . 6 5. Design Considerations . . . . . . . . . . . . . . . . . . . . 6
6. Encapsulation Approaches Considered . . . . . . . . . . . . . 7 6. Encapsulation Approaches Considered . . . . . . . . . . . . . 7
6.1. A Protocol Identifier in the Control Word . . . . . . . . 7 6.1. A Protocol Identifier in the Control Word . . . . . . . . 7
skipping to change at page 8, line 26 skipping to change at page 8, line 26
+-------------------------------+ +-------------------------------+
| Server MPLS Tunnel Label(s) | n*4 octets (four octets per label) | Server MPLS Tunnel Label(s) | n*4 octets (four octets per label)
+-------------------------------+ +-------------------------------+
Figure 3: Encapsulation of a pseudowire with a pseudowire load Figure 3: Encapsulation of a pseudowire with a pseudowire load
balancing label balancing label
In the PID Label approach a new Label Distribution protocol (LDP) In the PID Label approach a new Label Distribution protocol (LDP)
Forwarding Equivalence Class (FEC) element is used to signal the Forwarding Equivalence Class (FEC) element is used to signal the
mapping between protocol type and the PID label. This approach mapping between protocol type and the PID label. This approach
complies with RFC3031 and is the approach described in Section 3.4.3 complies with RFC3031.
of [I-D.ietf-mpls-tp-framework] .
A similar approach to PID label is described in Section 3.4.5 of
[I-D.ietf-mpls-tp-framework]. In this case when the client is a
network layer packet service such as IP or MPLS, a service label and
demultiplexer label (which may be combined) is used to provide the
necessary identifications needed to carry this traffic over an LSP.
The authors surveyed the hardware designs produced by a number of The authors surveyed the hardware designs produced by a number of
companies across the industry and concluded that whilst the approach companies across the industry and concluded that whilst the approach
complies with the MPLS architecture, it may conflict with a number of complies with the MPLS architecture, it may conflict with a number of
designer's interpretation of the existing MPLS architecture. This designer's interpretation of the existing MPLS architecture. This
led to concerns that the approach may result in unexpected led to concerns that the approach may result in unexpected
difficulties in the future. Specifically there is an assumption in difficulties in the future. Specifically there is an assumption in
many designs that a forwarding decision should be made on the basis many designs that a forwarding decision should be made on the basis
of a single label. Whilst the approach is attractive, it cannot be of a single label. Whilst the approach is attractive, it cannot be
supported by many commodity chip sets and this would require new supported by many commodity chip sets and this would require new
skipping to change at page 13, line 17 skipping to change at page 13, line 17
[RFC4448] Martini, L., Rosen, E., El-Aawar, N., and G. Heron, [RFC4448] Martini, L., Rosen, E., El-Aawar, N., and G. Heron,
"Encapsulation Methods for Transport of Ethernet over MPLS "Encapsulation Methods for Transport of Ethernet over MPLS
Networks", RFC 4448, April 2006. Networks", RFC 4448, April 2006.
13.2. Informative References 13.2. Informative References
[I-D.ietf-mpls-tp-framework] [I-D.ietf-mpls-tp-framework]
Bocci, M., Bryant, S., Frost, D., Levrau, L., and L. Bocci, M., Bryant, S., Frost, D., Levrau, L., and L.
Berger, "A Framework for MPLS in Transport Networks", Berger, "A Framework for MPLS in Transport Networks",
draft-ietf-mpls-tp-framework-10 (work in progress), draft-ietf-mpls-tp-framework-12 (work in progress),
February 2010. May 2010.
[I-D.ietf-pwe3-fat-pw] [I-D.ietf-pwe3-fat-pw]
Bryant, S., Filsfils, C., Drafz, U., Kompella, V., Regan, Bryant, S., Filsfils, C., Drafz, U., Kompella, V., Regan,
J., and S. Amante, "Flow Aware Transport of Pseudowires J., and S. Amante, "Flow Aware Transport of Pseudowires
over an MPLS PSN", draft-ietf-pwe3-fat-pw-03 (work in over an MPLS PSN", draft-ietf-pwe3-fat-pw-03 (work in
progress), January 2010. progress), January 2010.
[RFC3916] Xiao, X., McPherson, D., and P. Pate, "Requirements for [RFC3916] Xiao, X., McPherson, D., and P. Pate, "Requirements for
Pseudo-Wire Emulation Edge-to-Edge (PWE3)", RFC 3916, Pseudo-Wire Emulation Edge-to-Edge (PWE3)", RFC 3916,
September 2004. September 2004.
 End of changes. 9 change blocks. 
19 lines changed or deleted 18 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/