| < draft-dong-pce-discovery-proto-bgp-03.txt | draft-dong-pce-discovery-proto-bgp-04.txt > | |||
|---|---|---|---|---|
| Network Working Group J. Dong | Network Working Group J. Dong | |||
| Internet-Draft M. Chen | Internet-Draft M. Chen | |||
| Intended status: Standards Track D. Dhody | Intended status: Standards Track D. Dhody | |||
| Expires: March 4, 2016 Huawei Technologies | Expires: September 10, 2016 Huawei Technologies | |||
| J. Tantsura | J. Tantsura | |||
| Ericsson | Ericsson | |||
| September 1, 2015 | March 9, 2016 | |||
| BGP Extensions for Path Computation Element (PCE) Discovery | BGP Extensions for Path Computation Element (PCE) Discovery | |||
| draft-dong-pce-discovery-proto-bgp-03 | draft-dong-pce-discovery-proto-bgp-04 | |||
| Abstract | Abstract | |||
| In networks where Path Computation Element (PCE) is used for | In networks where Path Computation Element (PCE) is used for | |||
| centralized path computation, it is desirable for Path Computation | centralized path computation, it is desirable for the Path | |||
| Clients (PCCs) to automatically discover a set of PCEs and select the | Computation Clients (PCCs) to automatically discover a set of PCEs | |||
| suitable ones to establish the PCEP session. RFC 5088 and RFC 5089 | and select the suitable ones to establish the PCEP session. RFC 5088 | |||
| define the PCE discovery mechanisms based on Interior Gateway | and RFC 5089 define the PCE discovery mechanisms based on Interior | |||
| Protocols (IGP). This document describes several scenarios in which | Gateway Protocols (IGP). This document describes several scenarios | |||
| the IGP based PCE discovery mechanisms cannot be used directly. This | in which the IGP based PCE discovery mechanisms cannot be used | |||
| document specifies the BGP extensions for PCE discovery in these | directly. In such scenarios, BGP might be suitable, thus this | |||
| scenarios. The BGP based PCE discovery mechanism is complementary to | document specifies the BGP extensions for PCE discovery. The BGP | |||
| the existing IGP based mechanisms. | based PCE discovery mechanism is complementary to the existing IGP | |||
| based mechanisms. | ||||
| Requirements Language | Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 1, line 48 ¶ | skipping to change at page 1, line 49 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 4, 2016. | This Internet-Draft will expire on September 10, 2016. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Carrying PCE Discovery Information in BGP . . . . . . . . . . 4 | 2. Carrying PCE Discovery Information in BGP . . . . . . . . . . 4 | |||
| 2.1. PCE Address Information . . . . . . . . . . . . . . . . . 4 | 2.1. PCE Address Information . . . . . . . . . . . . . . . . . 4 | |||
| 2.2. PCE Discovery TLVs . . . . . . . . . . . . . . . . . . . 5 | 2.2. PCE Discovery TLVs . . . . . . . . . . . . . . . . . . . 5 | |||
| 3. Operational Considerations . . . . . . . . . . . . . . . . . 6 | 3. Operational Considerations . . . . . . . . . . . . . . . . . 6 | |||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
| 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . 7 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 7 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . 8 | 7.2. Informative References . . . . . . . . . . . . . . . . . 8 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 1. Introduction | 1. Introduction | |||
| In network scenarios where Path Computation Element (PCE) is used for | In network scenarios where Path Computation Element (PCE) is used for | |||
| centralized path computation, it is desirable for Path Computation | centralized path computation, it is desirable for the Path | |||
| Clients (PCCs) to automatically discover a set of PCEs and select the | Computation Clients (PCCs) to automatically discover a set of PCEs | |||
| suitable ones to establish the PCEP session. [RFC5088] and [RFC5089] | and select the suitable ones to establish the PCEP session. | |||
| define the PCE discovery mechanisms based on Interior Gateway | [RFC5088] and [RFC5089] define the PCE discovery mechanisms based on | |||
| Protocols (IGP). Those IGP based mechanisms may not work in several | Interior Gateway Protocols (IGP). | |||
| scenarios where the PCEs do not participate in the IGP, and it is | ||||
| difficult for PCEs to participate in multiple IGP domains where PCE | ||||
| discovery is needed. | ||||
| In some scenarios, Backward Recursive Path Computation (BRPC) | The IGP based discovery mechanism requires the PCE participate in the | |||
| [RFC5441] can be used by cooperating PCEs to compute inter-domain | IGP network, which usually requires that the PCE is directly adjacent | |||
| path, in which case these cooperating PCEs should be known to each | to at least one of the IGP routers in the network. In some scenarios | |||
| other in advance. In case of inter-AS networks where the PCEs do not | such requirement cannot be satisfied. For example, a PCE may need to | |||
| participate in a common IGP, the existing IGP discovery mechanism | provide path computation service to some subsidiary networks of an | |||
| cannot be used to discover the PCEs in other domains. | operator, which typically locate in different geographical region | |||
| (and not IGP adjacent). Also when PCE function is implemented in a | ||||
| central server running IGP on individual interfaces to each IGP area | ||||
| can be cumbersome. | ||||
| In the Hierarchical PCE scenario [RFC6805], the child PCEs need to | The requirement on PCE discovery, as described in [RFC4674], also | |||
| know the address of the parent PCEs. This cannot be achieved through | include the automatic discovery of the PCEs in other domains, as it | |||
| IGP based discovery, as normally the child PCEs and the parent PCE | is a desirable function in the case of inter-domain path computation. | |||
| are under different administration and reside in different domains. | The IGP based discovery mechanisms cannot meet such requirement. | |||
| Besides, as BGP could be used for north-bound distribution of routing | For example, Backward Recursive Path Computation (BRPC) [RFC5441] can | |||
| and Label Switched Path (LSP) information to PCE as described in | be used by cooperating PCEs to compute an inter-AS path, in which | |||
| case these cooperating PCEs should be known to each other in advance. | ||||
| In this case the PCEs belongs to different AS and do not participate | ||||
| in a common IGP, the IGP based discovery mechanisms are not | ||||
| applicable. | ||||
| Another example is the hierarchical PCE scenario [RFC6805], in which | ||||
| the child PCEs need to know the information of the parent PCEs. This | ||||
| cannot be achieved via IGP based discovery, as the child PCEs and the | ||||
| parent PCE are usually in different domains. | ||||
| Since BGP has been extended for north-bound distribution of routing | ||||
| and Label Switched Path (LSP) information to PCE | ||||
| [I-D.ietf-idr-ls-distribution] [I-D.ietf-idr-te-lsp-distribution] and | [I-D.ietf-idr-ls-distribution] [I-D.ietf-idr-te-lsp-distribution] and | |||
| [I-D.ietf-idr-te-pm-bgp], PCEs can obtain the routing information | [I-D.ietf-idr-te-pm-bgp], PCEs can obtain the routing information | |||
| without participating in IGP. In this scenario, some other PCE | without participating in IGP. In this scenario, a new BGP based PCE | |||
| discovery mechanism is needed. | discovery mechanism is needed. | |||
| A detailed set of requirements for a PCE discovery mechanism are | ||||
| provided in [RFC4674]. | ||||
| This document proposes to extend BGP for PCE discovery in the above | This document proposes to extend BGP for PCE discovery in the above | |||
| scenarios. In networks where BGP-LS is used for the north-bound | scenarios. In networks where BGP-LS is used for the north-bound | |||
| routing information distribution to PCE, the BGP based PCE discovery | routing information distribution to PCE, the BGP based PCE discovery | |||
| can reuse the existing BGP sessions and mechanisms to achieve PCE | can make use of the existing BGP sessions and mechanisms to achieve | |||
| discovery. It should be noted that in each IGP domain, the IGP based | automatic PCE discovery. Further IGP may be used to redistribute | |||
| PCE discovery mechanism may be used in conjunction with the BGP based | remote PCE information, the detailed mechanism is out of the scope of | |||
| PCE discovery. Thus the BGP based PCE discovery is complementary to | this document. Thus the BGP based PCE discovery is complementary to | |||
| the existing IGP based mechanisms. | the existing IGP based mechanisms. | |||
| +-----------+ | +-----------+ | |||
| | PCE | | | PCE | | |||
| +-----------+ | +-----------+ | |||
| | | | | |||
| v | v | |||
| +-----------+ | +-----------+ | |||
| | BGP | +-----------+ | | BGP | +-----------+ | |||
| | Speaker | | PCE | | | Speaker | | PCE | | |||
| +-----------+ +-----------+ | +-----------+ +-----------+ | |||
| | | | | | | | | | | |||
| | | | | | | | | | | |||
| +---------------+ | +-------------------+ | | +---------------+ | +-------------------+ | | |||
| v v v v | v v v v | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| | BGP | | BGP | | BGP | | | BGP | | BGP | | BGP | | |||
| | Speaker | | Speaker | . . . | Speaker | | | Speaker | | Speaker | . . . | Speaker | | |||
| | & PCC | | & PCC | | | | | & PCC | | & PCC | | & PCC | | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| | | ||||
| | via | ||||
| | IGP | ||||
| v | ||||
| +-----------+ | ||||
| | PCC | | ||||
| +-----------+ | ||||
| Figure 1: BGP for PCE discovery | Figure 1: BGP for PCE discovery | |||
| As shown in the network architecture in Figure 1, BGP is used for | As shown in the network architecture in Figure 1, BGP is used both | |||
| both routing information distribution and PCE information discovery. | for routing information distribution and for PCE information | |||
| The routing information is collected from the network elements and | discovery. The routing information is collected from the network | |||
| distributed to PCE, while the PCE discovery information is advertised | elements and distributed to PCE, while the PCE discovery information | |||
| from PCE to PCCs, or between different PCEs. The PCCs maybe co- | is advertised from PCE to PCCs, or among different PCEs. The PCCs | |||
| located with the BGP speakers as shown in Figure 1. The IGP based | maybe co-located with the BGP speakers as shown in Figure 1. | |||
| PCE discovery mechanism may be used for the distribution of PCE | ||||
| discovery information in IGP domain. | ||||
| 2. Carrying PCE Discovery Information in BGP | 2. Carrying PCE Discovery Information in BGP | |||
| 2.1. PCE Address Information | 2.1. PCE Address Information | |||
| The PCE discovery information is advertised in BGP UPDATE messages | The PCE discovery information is advertised in BGP UPDATE messages | |||
| using the MP_REACH_NLRI and MP_UNREACH_NLRI attributes [RFC4760]. | using the MP_REACH_NLRI and MP_UNREACH_NLRI attributes [RFC4760]. | |||
| The AFI and SAFI defined in [I-D.ietf-idr-ls-distribution] are re- | The AFI and SAFI defined in [I-D.ietf-idr-ls-distribution] are re- | |||
| used, and a new NLRI Type is defined for PCE discovery information as | used, and a new NLRI Type is defined for PCE discovery information as | |||
| below: | below: | |||
| skipping to change at page 5, line 23 ¶ | skipping to change at page 5, line 19 ¶ | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Identifier | | | Identifier | | |||
| | (64 bits) | | | (64 bits) | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| ~ PCE-Address (4 or 16 octets) ~ | ~ PCE-Address (4 or 16 octets) ~ | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 2. PCE Discovery NLRI | Figure 2. PCE Discovery NLRI | |||
| The 'Protocol-ID' field SHOULD be set to a new value which indicates | The 'Protocol-ID' field SHOULD be set to the appropriate value which | |||
| the information source protocol is PCE. | indicates the source of the PCE discovery information. If BGP | |||
| speaker and PCE are co-located, the Protocol-ID SHOULD be set to | ||||
| +-------------+----------------------------------+ | "Direct". In other cases, it is RECOMMENDED that the Protocol-ID | |||
| | Protocol-ID | NLRI information source protocol | | value be set to "Static configuration". | |||
| +-------------+----------------------------------+ | ||||
| | TBD | PCE | | ||||
| +-------------+----------------------------------+ | ||||
| As defined in [I-D.ietf-idr-ls-distribution], the 64-Bit 'Identifier' | As defined in [I-D.ietf-idr-ls-distribution], the 64-Bit 'Identifier' | |||
| field is used to identify the "routing universe" where the PCE | field is used to identify the "routing universe" where the PCE | |||
| belongs. | belongs. | |||
| 2.2. PCE Discovery TLVs | 2.2. PCE Discovery TLVs | |||
| The detailed PCE discovery information is carried in the BGP-LS | The detailed PCE discovery information is carried in the BGP-LS | |||
| attribute [I-D.ietf-idr-ls-distribution] with a new "PCE Discovery | attribute [I-D.ietf-idr-ls-distribution] with a new "PCE Discovery | |||
| TLV", which contains a set of sub-TLVs for specific PCE discovery | TLV", which contains a set of sub-TLVs for specific PCE discovery | |||
| skipping to change at page 6, line 25 ¶ | skipping to change at page 6, line 10 ¶ | |||
| The PCE Discovery sub-TLVs are listed as below. The format of the | The PCE Discovery sub-TLVs are listed as below. The format of the | |||
| PCE Discovery sub-TLVs are consistent with the IGP PCED sub-TLVs as | PCE Discovery sub-TLVs are consistent with the IGP PCED sub-TLVs as | |||
| defined in [RFC5088] and [RFC5089]. The PATH-SCOPE sub-TLV MUST | defined in [RFC5088] and [RFC5089]. The PATH-SCOPE sub-TLV MUST | |||
| always be carried in the PCE Discovery TLV. Other PCE Discovery sub- | always be carried in the PCE Discovery TLV. Other PCE Discovery sub- | |||
| TLVs are optional and may facilitate the PCE selection process on the | TLVs are optional and may facilitate the PCE selection process on the | |||
| PCCs. | PCCs. | |||
| Type | Length | Name | Type | Length | Name | |||
| ------+------------+-------------------------------- | ------+------------+-------------------------------- | |||
| TBD | 3 | PATH-SCOPE sub-TLV | 1 | 3 | PATH-SCOPE sub-TLV | |||
| TBD | variable | PCE-CAP-FLAGS sub-TLV | 2 | variable | PCE-CAP-FLAGS sub-TLV | |||
| TBD | variable | OSPF-PCE-DOMAIN sub-TLV | 3 | variable | OSPF-PCE-DOMAIN sub-TLV | |||
| TBD | variable | IS-IS-PCE-DOMAIN sub-TLV | 4 | variable | IS-IS-PCE-DOMAIN sub-TLV | |||
| TBD | variable | OSPF-NEIG-PCE-DOMAIN sub-TLV | 5 | variable | OSPF-NEIG-PCE-DOMAIN sub-TLV | |||
| TBD | variable | IS-IS-NEIG-PCE-DOMAIN sub-TLV | 6 | variable | IS-IS-NEIG-PCE-DOMAIN sub-TLV | |||
| More PCE Discovery sub-TLVs may be defined in future and the format | More PCE Discovery sub-TLVs may be defined in future. The format and | |||
| SHOULD be in line with the new sub-TLVs defined for IGP based PCE | semantic of new PCE Discovery sub-TLVs SHOULD be consistent in BGP | |||
| discovery. | and IGP based PCE discovery. | |||
| 3. Operational Considerations | 3. Operational Considerations | |||
| Existing BGP operational procedures apply to the advertisement of PCE | Existing BGP operational procedures apply to the advertisement of PCE | |||
| discovery information. This information is treated as pure | discovery information. This information is treated as pure | |||
| application level data which has no immediate impact on forwarding | application level data which has no immediate impact on forwarding | |||
| states. Normal BGP path selection can be applied to PCE Discovery | states. Normal BGP path selection can be applied to PCE Discovery | |||
| NLRI only for the information propagation in the network, while the | NLRI only for the information propagation in the network, while on | |||
| PCE selection on the PCCs would be based on the information carried | PCCs the PCE selection is based on the information carried in the PCE | |||
| in the PCE Discovery TLV. | Discovery TLV. The PCE discovery information SHOULD be advertised | |||
| only to the domains where such information is allowed to be used. | ||||
| This can be achieved by policy control on the ASBRs. | ||||
| The PCE discovery information is considered relatively stable and | The PCE discovery information is considered relatively stable and | |||
| does not change frequently, thus this information will not bring | does not change frequently, thus this information will not bring | |||
| significant impact on the amount of BGP updates in the network. | significant impact on the amount of BGP updates in the network. | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| IANA needs to assign a new NLRI Type for 'PCE Discovery NLRI' from | IANA needs to assign a new NLRI Type for 'PCE Discovery NLRI' from | |||
| the "BGP-LS NLRI-Types" registry. | the "BGP-LS NLRI-Types" registry. | |||
| IANA needs to assign a new Protocol-ID for "PCE" from the "BGP-LS | ||||
| Protocol-IDs" registry. | ||||
| IANA needs to assign a new TLV code point for 'PCE Discovery TLV' | IANA needs to assign a new TLV code point for 'PCE Discovery TLV' | |||
| from the "node anchor, link descriptor and link attribute TLVs" | from the "node anchor, link descriptor and link attribute TLVs" | |||
| registry. | registry. | |||
| IANA needs to create a new registry for "PCE Discovery Sub-TLVs". | IANA needs to create a new registry for "PCE Discovery Sub-TLVs". | |||
| The registry will be initialized as shown in section 2.2 of this | The registry will be initialized as shown in section 2.2 of this | |||
| document. | document. | |||
| 5. Security Considerations | 5. Security Considerations | |||
| Procedures and protocol extensions defined in this document do not | Procedures and protocol extensions defined in this document do not | |||
| affect the BGP security model. See the 'Security Considerations' | affect the BGP security model. See the 'Security Considerations' | |||
| section of [RFC4271] for a discussion of BGP security. Also refer to | section of [RFC4271] for a discussion of BGP security. Also refer to | |||
| [RFC4272] and [RFC6952] for analysis of security issues for BGP. | [RFC4272] and [RFC6952] for analysis of security issues for BGP. | |||
| 6. Acknowledgements | 6. Acknowledgements | |||
| The authors would like to thank Zhenbin Li and Hannes Gredler for | The authors would like to thank Zhenbin Li, Hannes Gredler, Jan | |||
| their discussion and comments. | Medved, Adrian Farrel and Julien Meuric for the valuable discussion | |||
| and comments. | ||||
| 7. References | 7. References | |||
| 7.1. Normative References | 7.1. Normative References | |||
| [I-D.ietf-idr-ls-distribution] | [I-D.ietf-idr-ls-distribution] | |||
| Gredler, H., Medved, J., Previdi, S., Farrel, A., and S. | Gredler, H., Medved, J., Previdi, S., Farrel, A., and S. | |||
| Ray, "North-Bound Distribution of Link-State and TE | Ray, "North-Bound Distribution of Link-State and TE | |||
| Information using BGP", draft-ietf-idr-ls-distribution-11 | Information using BGP", draft-ietf-idr-ls-distribution-13 | |||
| (work in progress), June 2015. | (work in progress), October 2015. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <http://www.rfc-editor.org/info/rfc2119>. | <http://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A | [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A | |||
| Border Gateway Protocol 4 (BGP-4)", RFC 4271, | Border Gateway Protocol 4 (BGP-4)", RFC 4271, | |||
| DOI 10.17487/RFC4271, January 2006, | DOI 10.17487/RFC4271, January 2006, | |||
| <http://www.rfc-editor.org/info/rfc4271>. | <http://www.rfc-editor.org/info/rfc4271>. | |||
| skipping to change at page 8, line 26 ¶ | skipping to change at page 8, line 11 ¶ | |||
| Zhang, "IS-IS Protocol Extensions for Path Computation | Zhang, "IS-IS Protocol Extensions for Path Computation | |||
| Element (PCE) Discovery", RFC 5089, DOI 10.17487/RFC5089, | Element (PCE) Discovery", RFC 5089, DOI 10.17487/RFC5089, | |||
| January 2008, <http://www.rfc-editor.org/info/rfc5089>. | January 2008, <http://www.rfc-editor.org/info/rfc5089>. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [I-D.ietf-idr-te-lsp-distribution] | [I-D.ietf-idr-te-lsp-distribution] | |||
| Dong, J., Chen, M., Gredler, H., Previdi, S., and J. | Dong, J., Chen, M., Gredler, H., Previdi, S., and J. | |||
| Tantsura, "Distribution of MPLS Traffic Engineering (TE) | Tantsura, "Distribution of MPLS Traffic Engineering (TE) | |||
| LSP State using BGP", draft-ietf-idr-te-lsp- | LSP State using BGP", draft-ietf-idr-te-lsp- | |||
| distribution-03 (work in progress), May 2015. | distribution-04 (work in progress), December 2015. | |||
| [I-D.ietf-idr-te-pm-bgp] | [I-D.ietf-idr-te-pm-bgp] | |||
| Wu, Q., Previdi, S., Gredler, H., Ray, S., and J. | Wu, Q., Previdi, S., Gredler, H., Ray, S., and J. | |||
| Tantsura, "BGP attribute for North-Bound Distribution of | Tantsura, "BGP attribute for North-Bound Distribution of | |||
| Traffic Engineering (TE) performance Metrics", draft-ietf- | Traffic Engineering (TE) performance Metrics", draft-ietf- | |||
| idr-te-pm-bgp-02 (work in progress), January 2015. | idr-te-pm-bgp-02 (work in progress), January 2015. | |||
| [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", | [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", | |||
| RFC 4272, DOI 10.17487/RFC4272, January 2006, | RFC 4272, DOI 10.17487/RFC4272, January 2006, | |||
| <http://www.rfc-editor.org/info/rfc4272>. | <http://www.rfc-editor.org/info/rfc4272>. | |||
| skipping to change at page 9, line 18 ¶ | skipping to change at page 9, line 4 ¶ | |||
| DOI 10.17487/RFC6805, November 2012, | DOI 10.17487/RFC6805, November 2012, | |||
| <http://www.rfc-editor.org/info/rfc6805>. | <http://www.rfc-editor.org/info/rfc6805>. | |||
| [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of | [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of | |||
| BGP, LDP, PCEP, and MSDP Issues According to the Keying | BGP, LDP, PCEP, and MSDP Issues According to the Keying | |||
| and Authentication for Routing Protocols (KARP) Design | and Authentication for Routing Protocols (KARP) Design | |||
| Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, | Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, | |||
| <http://www.rfc-editor.org/info/rfc6952>. | <http://www.rfc-editor.org/info/rfc6952>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Jie Dong | Jie Dong | |||
| Huawei Technologies | Huawei Technologies | |||
| Huawei Campus, No. 156 Beiqing Rd. | Huawei Campus, No. 156 Beiqing Rd. | |||
| Beijing 100095 | Beijing 100095 | |||
| China | China | |||
| Email: jie.dong@huawei.com | Email: jie.dong@huawei.com | |||
| Mach(Guoyi) Chen | Mach(Guoyi) Chen | |||
| Huawei Technologies | Huawei Technologies | |||
| Huawei Campus, No. 156 Beiqing Rd. | Huawei Campus, No. 156 Beiqing Rd. | |||
| Beijing 100095 | Beijing 100095 | |||
| China | China | |||
| Email: mach.chen@huawei.com | Email: mach.chen@huawei.com | |||
| Dhruv Dhody | Dhruv Dhody | |||
| Huawei Technologies | Huawei Technologies | |||
| Leela Palace | Divyashree Techno Park, Whitefield | |||
| Bangalore, Karnataka 560008 | Bangalore, Karnataka 560066 | |||
| India | India | |||
| Email: dhruv.ietf@gmail.com | Email: dhruv.ietf@gmail.com | |||
| Jeff Tantsura | Jeff Tantsura | |||
| Ericsson | Ericsson | |||
| 300 Holger Way | 300 Holger Way | |||
| San Jose, CA 95134 | San Jose, CA 95134 | |||
| US | US | |||
| End of changes. 28 change blocks. | ||||
| 91 lines changed or deleted | 88 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||