| < draft-ietf-mpls-recovery-frmwrk-01.txt | draft-ietf-mpls-recovery-frmwrk-02.txt > | |||
|---|---|---|---|---|
| IETF Draft Vishal Sharma | IETF Draft Vishal Sharma | |||
| Multi-Protocol Label Switching Ben-Mack Crane | Multi-Protocol Label Switching Jasmine Networks, Inc. | |||
| Expires: May 2001 Srinivas Makam | Expires: August 2001 | |||
| Ken Owens | Ben-Mack Crane | |||
| Srinivas Makam | ||||
| Tellabs Operations, Inc. | Tellabs Operations, Inc. | |||
| Ken Owens | ||||
| Erlang Technology, Inc. | ||||
| Changcheng Huang | Changcheng Huang | |||
| Carleton University | Carleton University | |||
| Fiffi Hellstrand | Fiffi Hellstrand | |||
| Jon Weil | Jon Weil | |||
| Loa Andersson | Loa Andersson | |||
| Bilel Jamoussi | Bilel Jamoussi | |||
| Nortel Networks | Nortel Networks | |||
| Brad Cain | Brad Cain | |||
| Mirror Image Internet | Mirror Image Internet | |||
| Seyhan Civanlar | Seyhan Civanlar | |||
| Coreon Networks | Coreon Networks | |||
| Angela Chiu | Angela Chiu | |||
| AT&T Labs | Celion Networks, Inc. | |||
| November 2000 | March 2001 | |||
| Framework for MPLS-based Recovery | Framework for MPLS-based Recovery | |||
| <draft-ietf-mpls-recovery-frmwrk-01.txt> | <draft-ietf-mpls-recovery-frmwrk-02.txt> | |||
| Status of this memo | Status of this memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026. | all provisions of Section 10 of RFC2026. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
| groups may also distribute working documents as Internet-Drafts. | groups may also distribute working documents as Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| skipping to change at page 1, line 49 ¶ | skipping to change at page 2, line 4 ¶ | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Abstract | Abstract | |||
| Multi-protocol label switching (MPLS) [1] integrates the label | Multi-protocol label switching (MPLS) [1] integrates the label | |||
| swapping forwarding paradigm with network layer routing. To deliver | swapping forwarding paradigm with network layer routing. To deliver | |||
| reliable service, MPLS requires a set of procedures to provide | reliable service, MPLS requires a set of procedures to provide | |||
| protection of the traffic carried on different paths. This requires | protection of the traffic carried on different paths. This requires | |||
| that the label switched routers (LSRs) support fault detection, fault | that the label switched routers (LSRs) support fault detection, fault | |||
| notification, and fault recovery mechanisms, and that MPLS signaling | notification, and fault recovery mechanisms, and that MPLS signaling | |||
| [2] [3] [4] [5] [6] support the configuration of recovery. With these | [2], [3], [4], [5], [6], [7] support the configuration of recovery. | |||
| objectives in mind, this document specifies a framework for MPLS | With these objectives in mind, this document specifies a framework | |||
| based recovery. | for MPLS based recovery. | |||
| Table of Contents Page | Table of Contents Page | |||
| 1.0 Introduction 3 | 1.0 Introduction 3 | |||
| 1.1 Background 3 | 1.1 Background 3 | |||
| 1.2 Motivations for MPLS-Based Recovery 3 | 1.2 Motivations for MPLS-Based Recovery 3 | |||
| 1.3 Objectives 4 | 1.3 Objectives 4 | |||
| 2.0 Overview 5 | 2.0 Overview 5 | |||
| 2.1 Recovery Models 6 | 2.1 Recovery Models 6 | |||
| skipping to change at page 2, line 48 ¶ | skipping to change at page 2, line 52 ¶ | |||
| 3.4.3 Bypass Tunnels 19 | 3.4.3 Bypass Tunnels 19 | |||
| 3.4.4 Recovery Granularity 20 | 3.4.4 Recovery Granularity 20 | |||
| 3.4.4.1 Selective Traffic Recovery 20 | 3.4.4.1 Selective Traffic Recovery 20 | |||
| 3.4.4.2 Bundling 20 | 3.4.4.2 Bundling 20 | |||
| 3.4.5 Recovery Path Resource Use 20 | 3.4.5 Recovery Path Resource Use 20 | |||
| 3.5 Fault Detection 21 | 3.5 Fault Detection 21 | |||
| 3.6 Fault Notification 21 | 3.6 Fault Notification 21 | |||
| 3.7 Switch Over Operation 22 | 3.7 Switch Over Operation 22 | |||
| 3.7.1 Recovery Trigger 22 | 3.7.1 Recovery Trigger 22 | |||
| 3.7.2 Recovery Action 22 | 3.7.2 Recovery Action 22 | |||
| 3.8 Switch Back Operation 23 | 3.8 Post Recovery Operation 23 | |||
| 3.8.1 Fixed Protection Counterparts 23 | 3.8.1 Fixed Protection Counterparts 23 | |||
| 3.8.2 Dynamic Protection Counterparts 24 | 3.8.2 Dynamic Protection Counterparts 24 | |||
| 3.8.3 Restoration and Notification 25 | 3.8.3 Restoration and Notification 25 | |||
| 3.8.4 Reverting to Preferred Path 25 | 3.8.4 Reverting to Preferred Path 25 | |||
| 3.9 Performance 26 | 3.9 Performance 26 | |||
| 4.0 Recovery Requirements 26 | 4.0 Recovery Requirements 26 | |||
| 5.0 MPLS Recovery Options 27 | 5.0 MPLS Recovery Options 27 | |||
| 6.0 Comparison Criteria 27 | 6.0 Comparison Criteria 27 | |||
| 7.0 Security Considerations 29 | 7.0 Security Considerations 29 | |||
| skipping to change at page 3, line 31 ¶ | skipping to change at page 3, line 35 ¶ | |||
| 1.1 Background | 1.1 Background | |||
| Network routing deployed today is focussed primarily on connectivity | Network routing deployed today is focussed primarily on connectivity | |||
| and typically supports only one class of service, the best effort | and typically supports only one class of service, the best effort | |||
| class. Multi-protocol label switching, on the other hand, by | class. Multi-protocol label switching, on the other hand, by | |||
| integrating forwarding based on label-swapping of a link local label | integrating forwarding based on label-swapping of a link local label | |||
| with network layer routing allows flexibility in the delivery of new | with network layer routing allows flexibility in the delivery of new | |||
| routing services. MPLS allows for using such media specific | routing services. MPLS allows for using such media specific | |||
| forwarding mechanisms as label swapping. This enables more | forwarding mechanisms as label swapping. This enables more | |||
| sophisticated features such as quality-of-service (QoS) and traffic | sophisticated features such as quality-of-service (QoS) and traffic | |||
| engineering [7] to be implemented more effectively. An important | engineering [8] to be implemented more effectively. An important | |||
| component of providing QoS, however, is the ability to transport data | component of providing QoS, however, is the ability to transport data | |||
| reliably and efficiently. Although the current routing algorithms are | reliably and efficiently. Although the current routing algorithms are | |||
| very robust and survivable, the amount of time they take to recover | very robust and survivable, the amount of time they take to recover | |||
| from a fault can be significant, on the order of several seconds or | from a fault can be significant, on the order of several seconds or | |||
| minutes, causing serious disruption of service for some applications | minutes, causing serious disruption of service for some applications | |||
| in the interim. This is unacceptable to many organizations that aim | in the interim. This is unacceptable to many organizations that aim | |||
| to provide a highly reliable service, and thus require recovery times | to provide a highly reliable service, and thus require recovery times | |||
| on the order of tens of milliseconds, as specified, for example, in | on the order of tens of milliseconds, as specified, for example, in | |||
| the GR253 specification for SONET. | the GR253 specification for SONET. | |||
| skipping to change at page 6, line 35 ¶ | skipping to change at page 6, line 37 ¶ | |||
| 2.1 Recovery Models | 2.1 Recovery Models | |||
| There are two basic models for path recovery: rerouting and | There are two basic models for path recovery: rerouting and | |||
| protection switching. | protection switching. | |||
| Protection switching and rerouting, as defined below, may be used | Protection switching and rerouting, as defined below, may be used | |||
| together. For example, protection switching to a recovery path may | together. For example, protection switching to a recovery path may | |||
| be used for rapid restoration of connectivity while rerouting | be used for rapid restoration of connectivity while rerouting | |||
| determines a new optimal network configuration, rearranging paths, as | determines a new optimal network configuration, rearranging paths, as | |||
| needed, at a later time [8] [9]. | needed, at a later time [9] [10]. | |||
| 2.1.1 Rerouting | 2.1.1 Rerouting | |||
| Recovery by rerouting is defined as establishing new paths or path | Recovery by rerouting is defined as establishing new paths or path | |||
| segments on demand for restoring traffic after the occurrence of a | segments on demand for restoring traffic after the occurrence of a | |||
| fault. The new paths may be based upon fault information, network | fault. The new paths may be based upon fault information, network | |||
| routing policies, pre-defined configurations and network topology | routing policies, pre-defined configurations and network topology | |||
| information. Thus, upon detecting a fault, paths or path segments to | information. Thus, upon detecting a fault, paths or path segments to | |||
| bypass the fault are established using signaling. Reroute mechanisms | bypass the fault are established using signaling. Reroute mechanisms | |||
| are inherently slower than protection switching mechanisms, since | are inherently slower than protection switching mechanisms, since | |||
| skipping to change at page 7, line 11 ¶ | skipping to change at page 7, line 15 ¶ | |||
| In terms of the principles defined in section 3, reroute recovery | In terms of the principles defined in section 3, reroute recovery | |||
| employs paths established-on-demand with resources reserved-on- | employs paths established-on-demand with resources reserved-on- | |||
| demand. | demand. | |||
| 2.1.2 Protection Switching | 2.1.2 Protection Switching | |||
| Protection switching recovery mechanisms pre-establish a recovery | Protection switching recovery mechanisms pre-establish a recovery | |||
| path or path segment, based upon network routing policies, the | path or path segment, based upon network routing policies, the | |||
| restoration requirements of the traffic on the working path, and | restoration requirements of the traffic on the working path, and | |||
| administrative considerations. The recovery path may or may not be | administrative considerations. The recovery path may or may not be | |||
| link and node disjoint with the working path [10]. However if the | link and node disjoint with the working path[11], [14]. However if | |||
| recovery path shares sources of failure with the working path, the | the recovery path shares sources of failure with the working path, | |||
| overall reliability of the construct is degraded. When a fault is | the overall reliability of the construct is degraded. When a fault is | |||
| detected, the protected traffic is switched over to the recovery | detected, the protected traffic is switched over to the recovery | |||
| path(s) and restored. | path(s) and restored. | |||
| In terms of the principles in section 3, protection switching employs | In terms of the principles in section 3, protection switching employs | |||
| pre-established recovery paths, and if resource reservation is | pre-established recovery paths, and if resource reservation is | |||
| required on the recovery path, pre-reserved resources. | required on the recovery path, pre-reserved resources. | |||
| 2.1.2.1. Subtypes of Protection Switching | 2.1.2.1. Subtypes of Protection Switching | |||
| The resources (bandwidth, buffers, processing) on the recovery path | The resources (bandwidth, buffers, processing) on the recovery path | |||
| may be used to carry either a copy of the working path traffic or | may be used to carry either a copy of the working path traffic or | |||
| skipping to change at page 12, line 29 ¶ | skipping to change at page 12, line 35 ¶ | |||
| VI. The network enters a semi-stable state | VI. The network enters a semi-stable state | |||
| VII. Dynamic routing protocols converge after the fault, and a new | VII. Dynamic routing protocols converge after the fault, and a new | |||
| working path is calculated (based, for example, on some of the | working path is calculated (based, for example, on some of the | |||
| criteria mentioned earlier in Section 2.1.1). | criteria mentioned earlier in Section 2.1.1). | |||
| VIII. A new working path is established between the PSL and the PML | VIII. A new working path is established between the PSL and the PML | |||
| (assumption is that PSL and PML have not changed) | (assumption is that PSL and PML have not changed) | |||
| IX. Traffic is switched over to the new working path. | IX. Traffic is switched over to the new working path. | |||
| 2.3 Definitions and Terminology | 2.3 Definitions and Terminology | |||
| This document assumes the terminology given in [11], and, in | This document assumes the terminology given in [1], and, in addition, | |||
| addition, introduces the following new terms. | introduces the following new terms. | |||
| 2.3.1 General Recovery Terminology | 2.3.1 General Recovery Terminology | |||
| Rerouting | Rerouting | |||
| A recovery mechanism in which the recovery path or path segments are | A recovery mechanism in which the recovery path or path segments are | |||
| created dynamically after the detection of a fault on the working | created dynamically after the detection of a fault on the working | |||
| path. In other words, a recovery mechanism in which the recovery path | path. In other words, a recovery mechanism in which the recovery path | |||
| is not pre-established. | is not pre-established. | |||
| skipping to change at page 15, line 40 ¶ | skipping to change at page 15, line 48 ¶ | |||
| layer. | layer. | |||
| Link Degraded (LD) | Link Degraded (LD) | |||
| A lower layer indication to MPLS-based recovery mechanisms that the | A lower layer indication to MPLS-based recovery mechanisms that the | |||
| link is performing below an acceptable level. | link is performing below an acceptable level. | |||
| Fault Indication Signal (FIS) | Fault Indication Signal (FIS) | |||
| A signal that indicates that a fault along a path has occurred. It is | A signal that indicates that a fault along a path has occurred. It is | |||
| relayed by each intermediate LSR to its upstream or downstream | relayed by each intermediate LSR to its upstream or downstream | |||
| neighbor, until it reaches an LSR that is setup to perform MPLS | neighbor, until it reaches an LSR that is setup to perform MPLS | |||
| recovery. | recovery. The FIS is transmitted periodically by the node/nodes | |||
| closest to the point of failure, for some configurable length of | ||||
| time. | ||||
| Fault Recovery Signal (FRS) | Fault Recovery Signal (FRS) | |||
| A signal that indicates a fault along a working path has been | A signal that indicates a fault along a working path has been | |||
| repaired. Again, like the FIS, it is relayed by each intermediate LSR | repaired. Again, like the FIS, it is relayed by each intermediate LSR | |||
| to its upstream or downstream neighbor, until is reaches the LSR that | to its upstream or downstream neighbor, until is reaches the LSR that | |||
| performs recovery of the original path. | performs recovery of the original path. . The FRS is transmitted | |||
| periodically by the node/nodes closest to the point of failure, for | ||||
| some configurable length of time. | ||||
| 2.4 Abbreviations | 2.4 Abbreviations | |||
| FIS: Fault Indication Signal. | FIS: Fault Indication Signal. | |||
| FRS: Fault Recovery Signal. | FRS: Fault Recovery Signal. | |||
| LD: Link Degraded. | LD: Link Degraded. | |||
| LF: Link Failure. | LF: Link Failure. | |||
| PD: Path Degraded. | PD: Path Degraded. | |||
| PF: Path Failure. | PF: Path Failure. | |||
| PML: Path Merge LSR. | PML: Path Merge LSR. | |||
| skipping to change at page 20, line 10 ¶ | skipping to change at page 20, line 23 ¶ | |||
| protection paths are mapped to each other. The issues of resource | protection paths are mapped to each other. The issues of resource | |||
| reservation along these paths, and how switchover is actually | reservation along these paths, and how switchover is actually | |||
| performed lead to the more commonly used composite terms, such as 1+1 | performed lead to the more commonly used composite terms, such as 1+1 | |||
| and 1:1 protection, which were described in Section 2.1. | and 1:1 protection, which were described in Section 2.1. | |||
| 1-to-1 Protection | 1-to-1 Protection | |||
| In 1-to-1 protection the working path has a designated recovery path | In 1-to-1 protection the working path has a designated recovery path | |||
| that is only to be used to recover that specific working path. | that is only to be used to recover that specific working path. | |||
| ii) n-to-1 Protection | n-to-1 Protection | |||
| In n-to-1 protection, up to n working paths are protected using only | In n-to-1 protection, up to n working paths are protected using only | |||
| one recovery path. If the intent is to protect against any single | one recovery path. If the intent is to protect against any single | |||
| fault on any of the working paths, the n working paths should be | fault on any of the working paths, the n working paths should be | |||
| diversely routed between the same PSL and PML. In some cases, | diversely routed between the same PSL and PML. In some cases, | |||
| handshaking between PSL and PML may be required to complete the | handshaking between PSL and PML may be required to complete the | |||
| recovery, the details of which are beyond the scope of this draft. | recovery, the details of which are beyond the scope of this draft. | |||
| n-to-m Protection | n-to-m Protection | |||
| skipping to change at page 24, line 4 ¶ | skipping to change at page 24, line 19 ¶ | |||
| with the difference that the LF is a lower layer impairment that may | with the difference that the LF is a lower layer impairment that may | |||
| be communicated to - MPLS-based recovery mechanisms. The PD (or LD) | be communicated to - MPLS-based recovery mechanisms. The PD (or LD) | |||
| fault, on the other hand, applies to soft defects (excessive errors | fault, on the other hand, applies to soft defects (excessive errors | |||
| due to noise on the link, for instance). The PD (or LD) results in a | due to noise on the link, for instance). The PD (or LD) results in a | |||
| fault declaration only when the percentage of lost packets exceeds a | fault declaration only when the percentage of lost packets exceeds a | |||
| given threshold, which is provisioned and may be set based on the | given threshold, which is provisioned and may be set based on the | |||
| service level agreement(s) in effect between a service provider and a | service level agreement(s) in effect between a service provider and a | |||
| customer. | customer. | |||
| 3.7.2 Recovery Action | 3.7.2 Recovery Action | |||
| After a fault is detected or FIS is received by the PSL, the recovery | After a fault is detected or FIS is received by the PSL, the recovery | |||
| action involves either a rerouting or protection switching operation. | action involves either a rerouting or protection switching operation. | |||
| In both scenarios, the next hop label forwarding entry for a recovery | In both scenarios, the next hop label forwarding entry for a recovery | |||
| path is bound to the working path. | path is bound to the working path. | |||
| 3.8 Switch-Back Operation | 3.8 Post Recovery Operation | |||
| When traffic is flowing on the recovery path decisions can be made to | When traffic is flowing on the recovery path decisions can be made to | |||
| whether let the traffic remain on the recovery path and consider it | whether let the traffic remain on the recovery path and consider it | |||
| as a new working path or do a switch to the old or a new working | as a new working path or do a switch to the old or a new working | |||
| path. This switch-back operation has two styles, one where the | path. This post recovery operation has two styles, one where the | |||
| protection counterparts, i.e. the working and recovery path, are | protection counterparts, i.e. the working and recovery path, are | |||
| fixed or "pinned" to its route and one in which the PSL or other | fixed or "pinned" to its route and one in which the PSL or other | |||
| network entity with real time knowledge of failure dynamically | network entity with real time knowledge of failure dynamically | |||
| performs re-establishment or controlled rearrangement of the paths | performs re-establishment or controlled rearrangement of the paths | |||
| comprising the protected service. | comprising the protected service. | |||
| 3.8.1 Fixed Protection Counterparts | 3.8.1 Fixed Protection Counterparts | |||
| For fixed protection counterparts the PSL will be pre-configured with | For fixed protection counterparts the PSL will be pre-configured with | |||
| the appropriate behavior to take when the original fixed path is | the appropriate behavior to take when the original fixed path is | |||
| skipping to change at page 25, line 33 ¶ | skipping to change at page 25, line 48 ¶ | |||
| For Dynamic protection counterparts when the traffic is switched over | For Dynamic protection counterparts when the traffic is switched over | |||
| to a recovery path, the association between the original working path | to a recovery path, the association between the original working path | |||
| and the recovery path may no longer exist, since the original path | and the recovery path may no longer exist, since the original path | |||
| itself may no longer exist after the fault. Instead, when the network | itself may no longer exist after the fault. Instead, when the network | |||
| reaches a stable state following routing convergence, the recovery | reaches a stable state following routing convergence, the recovery | |||
| path may be switched over to a different preferred path either | path may be switched over to a different preferred path either | |||
| optimization based on the new network topology and associated | optimization based on the new network topology and associated | |||
| information or based on pre-configured information. | information or based on pre-configured information. | |||
| Dynamic protection counterparts assume that upon failure, the PSL or | Dynamic protection counterparts assume that upon failure, the PSL or | |||
| other network entity will establish new working paths if a switch- | other network entity will establish new working paths if another | |||
| back will be performed. | switch-over will be performed. | |||
| 3.8.3 Restoration and Notification | 3.8.3 Restoration and Notification | |||
| MPLS restoration deals with returning the working traffic from the | MPLS restoration deals with returning the working traffic from the | |||
| recovery path to the original or a new working path. Reversion is | recovery path to the original or a new working path. Reversion is | |||
| performed by the PSL either upon receiving notification, via FRS, | performed by the PSL either upon receiving notification, via FRS, | |||
| that the working path is repaired, or upon receiving notification | that the working path is repaired, or upon receiving notification | |||
| that a new working path is established. | that a new working path is established. | |||
| For fixed counterparts in revertive mode, an LSR that detected the | For fixed counterparts in revertive mode, an LSR that detected the | |||
| skipping to change at page 30, line 9 ¶ | skipping to change at page 30, line 21 ¶ | |||
| IV. Percentage of coverage: dependent on a scheme and its | IV. Percentage of coverage: dependent on a scheme and its | |||
| implementation, a certain percentage of faults may be covered. This | implementation, a certain percentage of faults may be covered. This | |||
| may be subdivided into percentage of link faults and percentage of | may be subdivided into percentage of link faults and percentage of | |||
| node faults. | node faults. | |||
| V. The number of protected paths may effect how fast the total set of | V. The number of protected paths may effect how fast the total set of | |||
| paths affected by a fault could be recovered. The ratio of protected | paths affected by a fault could be recovered. The ratio of protected | |||
| is n/N, where n is the number of protected paths and N is the total | is n/N, where n is the number of protected paths and N is the total | |||
| number of paths. | number of paths. | |||
| 7.0 Security Considerations | 7.0 Security Considerations | |||
| The MPLS recovery that is specified herein does not raise any | The MPLS recovery that is specified herein does not raise any | |||
| security issues that are not already present in the MPLS | security issues that are not already present in the MPLS | |||
| architecture. | architecture. | |||
| 8.0 Intellectual Property Considerations | 8.0 Intellectual Property Considerations | |||
| The IETF has been notified of intellectual property rights claimed in | The IETF has been notified of intellectual property rights claimed in | |||
| regard to some or all of the specification contained in this | regard to some or all of the specification contained in this | |||
| document. For more information consult the online list of claimed | document. For more information consult the online list of claimed | |||
| rights. | rights. | |||
| 9.0 Acknowledgements | 9.0 Acknowledgements | |||
| We would like to thank members of the MPLS WG mailing list for their | We would like to thank members of the MPLS WG mailing list for their | |||
| suggestions on the earlier version of this draft. In particular, Bora | suggestions on the earlier versions of this draft. In particular, | |||
| Akyol, Dave Allan, and Neil Harrisson, whose suggestions and comments | Bora Akyol, Dave Allan, Neil Harrison, and Dave Danenberg whose | |||
| were very helpful in revising the document. | suggestions and comments were very helpful in revising the document. | |||
| 10.0 Authors' Addresses | 10.0 Authors' Addresses | |||
| Vishal Sharma Ben Mack-Crane | Vishal Sharma Ben Mack-Crane | |||
| Tellabs Research Center Tellabs Operations, Inc. | Jasmine Networks, Inc. Tellabs Operations, Inc. | |||
| One Kendall Square 4951 Indiana Avenue | 3061 B, Zanker Road 4951 Indiana Avenue | |||
| Bldg. 100, Ste. 121 Lisle, IL 60532 | San Jose, CA 95134 Lisle, IL 60532 | |||
| Cambridge, MA 02139-1562 Phone: 630-512-7255 | Phone: 408-895-5030 Phone: 630-512-7255 | |||
| Phone: 617-577-8760 Ben.Mack-Crane@tellabs.com | vsharma@JasmineNetworks.com Ben.Mack-Crane@tellabs.com | |||
| Vishal.Sharma@tellabs.com | ||||
| Srinivas Makam Ken Owens | Srinivas Makam Ken Owens | |||
| Tellabs Operations, Inc. Tellabs Operations, Inc. | Tellabs Operations, Inc. Erlang Technology, Inc. | |||
| 4951 Indiana Avenue 1106 Fourth Street | Lisle, IL 60532 St. Louis, MO 63119 | |||
| Lisle, IL 60532 St. Louis, MO 63126 | Phone: 630-512-7217 | |||
| Phone: 630-512-7217 Phone: 314-918-1579 | Srinivas.Makam@tellabs.com keno@erlangtech.com | |||
| Srinivas.Makam@tellabs.com Ken.Owens@tellabs.com | ||||
| Changcheng Huang Fiffi Hellstrand | Changcheng Huang Fiffi Hellstrand | |||
| Dept. of Systems & Computer Engg. Nortel Networks | Dept. of Systems & Computer Engg. Nortel Networks | |||
| Carleton University St Eriksgatan 115 | Carleton University St Eriksgatan 115 | |||
| Minto Center, Rm. 3082 PO Box 6701 | Minto Center, Rm. 3082 PO Box 6701 | |||
| 1125 Colonial By Drive 113 85 Stockholm, Sweden | 1125 Colonial By Drive 113 85 Stockholm, Sweden | |||
| Ottawa, Ontario K1S 5B6, Canada Phone: +46 8 5088 3687 | Ottawa, Ontario K1S 5B6, Canada Phone: +46 8 5088 3687 | |||
| Phone: 613 520-2600 x2477 Fiffi@nortelnetworks.com | Phone: 613 520-2600 x2477 Fiffi@nortelnetworks.com | |||
| Changcheng.Huang@sce.carleton.ca | Changcheng.Huang@sce.carleton.ca | |||
| Jon Weil Brad Cain | Jon Weil Brad Cain | |||
| Nortel Networks Mirror Image Internet | Nortel Networks Mirror Image Internet | |||
| Harlow Laboratories London Road 49 Dragon Ct. | Harlow Laboratories London Road 49 Dragon Ct. | |||
| Harlow Essex CM17 9NA, UK Woburn, MA 01801, USA | Harlow Essex CM17 9NA, UK Woburn, MA 01801, USA | |||
| Phone: +44 (0)1279 403935 bcain@mirror-image.com | Phone: +44 (0)1279 403935 bcain@mirror-image.com | |||
| jonweil@nortelnetworks.com | jonweil@nortelnetworks.com | |||
| Loa Andersson Bilel Jamoussi | Loa Andersson Bilel Jamoussi | |||
| Nortel Networks Nortel Networks | Nortel Networks Nortel Networks | |||
| St Eriksgatan 115, PO Box 6701 3 Federal Street, BL3-03 | St Eriksgatan 115, PO Box 6701 3 Federal Street, BL3-03 | |||
| 113 85 Stockholm, Sweden Billerica, MA 01821, USA | 113 85 Stockholm, Sweden Billerica, MA 01821, USA | |||
| Phone: +46 8 50 88 36 34 Phone:(978) 288-4506 | Phone: +46 8 50 88 36 34 Phone:(978) 288-4506 | |||
| loa.andersson@nortelnetworks.com jamoussi@nortelnetworks.com | loa.andersson@nortelnetworks.com jamoussi@nortelnetworks.com | |||
| Seyhan Civanlar Angela Chiu | Seyhan Civanlar Angela Chiu | |||
| Coreon, Inc. AT&T Labs, Rm. 4-204 | Coreon, Inc. Celion Networks, Inc. | |||
| 1200 South Avenue, Suite 103 100 Schulz Drive | 1200 South Avenue, Suite 103 One Shiela Drive, Suite 2 | |||
| Staten Island, NY 10314 Red Bank, NJ 07701 | Staten Island, NY 10314 Tinton Falls, NJ 07724 | |||
| Phone: (718) 889 4203 Phone: (732) 345-3441 | Phone: (718) 889 4203 Phone: (732) 345-3441 | |||
| scivanlar@coreon.net alchiu@att.com | scivanlar@coreon.net angela.chiu@celion.com | |||
| 11.0 References | 11.0 References | |||
| [1] Rosen, E., Viswanathan, A., and Callon, R., "Multiprotocol Label | [1] Rosen, E., Viswanathan, A., and Callon, R., "Multiprotocol Label | |||
| Switching Architecture", Internet Draft draft-ietf-mpls-arch-07.txt, | Switching Architecture", RFC 3031, January 2001. | |||
| Work in Progress , July 2000. | ||||
| [2] Andersson, L., Doolan, P., Feldman, N., Fredette, A., Thomas, B., | [2] Andersson, L., Doolan, P., Feldman, N., Fredette, A., Thomas, B., | |||
| "LDP Specification", Internet Draft draft-ietf-mpls-ldp-11.txt, Work in | "LDP Specification", RFC 3036, January 2001. | |||
| Progress , August 2000. | ||||
| [3] Awduche, D. Hannan, A., and Xiao, X., "Applicability Statement for | [3] Awduche, D. Hannan, A., and Xiao, X., "Applicability Statement for | |||
| Extensions to RSVP for LSP-Tunnels", draft-ietf-mpls-rsvp-tunnel- | Extensions to RSVP for LSP-Tunnels", draft-ietf-mpls-rsvp-tunnel- | |||
| applicability-01.txt, work in progress, April 2000. | applicability-01.txt, work in progress, April 2000. | |||
| [4] Jamoussi, B. et al "Constraint-Based LSP Setup using LDP", Internet | [4] Jamoussi, B. et al "Constraint-Based LSP Setup using LDP", Internet | |||
| Draft draft-ietf-mpls-cr-ldp-04.txt, Work in Progress , July 2000. | Draft draft-ietf-mpls-cr-ldp-04.txt, Work in Progress , July 2000. | |||
| [5] Braden, R., Zhang, L., Berson, S., Herzog, S., "Resource ReSerVation | [5] Braden, R., Zhang, L., Berson, S., Herzog, S., "Resource ReSerVation | |||
| Protocol (RSVP) -- Version 1 Functional Specification", RFC 2205, | Protocol (RSVP) -- Version 1 Functional Specification", RFC 2205, | |||
| September 1997. | September 1997. | |||
| [6] Awduche, D. et al "Extensions to RSVP for LSP Tunnels", Internet | [6] Awduche, D. et al "Extensions to RSVP for LSP Tunnels", Internet | |||
| Draft draft-ietf-mpls-rsvp-lsp-tunnel-07.txt, Work in Progress, August | Draft, draft-ietf-mpls-rsvp-lsp-tunnel-07.txt, Work in Progress, August | |||
| 2000. | 2000. | |||
| [7] Awduche, D., Malcolm, J., Agogbua, J., O'Dell, M., McManus, J., | [7] Hellstrand, F., and Andersson, L., "Extensions to RSVP-TE and CR-LDP | |||
| "Requirements for Traffic Engineering Over MPLS", RFC 2702, September | for setup of pre-established LSP Tunnels," Internet Draft, Work in | |||
| 1999. | Progress, draft-hellstrand-mpls-recovery-merge-01.txt, November 2000. | |||
| [8] Andersson, L., Cain B., Jamoussi, B., "Requirement Framework for | [8] Awduche, D., Malcolm, J., Agogbua, J., O'Dell, M., McManus, J., | |||
| Fast Re-route with MPLS", draft-andersson-reroute-frmwrk-00.txt, work in | "Requirements for Traffic Engineering Over MPLS", RFC 2702, September | |||
| progress, October 1999. | 1999. | |||
| [9] Goguen, R. and Swallow, G., "RSVP Label Allocation for Backup | [9] Kini, S, Lakshman, T. V., Villamizar, C., "Shared Backup Label | |||
| Tunnels", draft-swallow-rsvp-bypass-label-00.txt, work in progress, | Switched Path Restoration, " Internet Draft, Work in Progress, draft- | |||
| October 1999. | kini-restoration-shared-backup-00.txt, October 2000. | |||
| [10] Makam, S., Sharma, V., Owens, K., Huang, C., | [10] Goguen, R. and Swallow, G., "RSVP Label Allocation for Backup | |||
| "Protection/restoration of MPLS Networks", Internet Draft draft-makam- | Tunnels", draft-swallow-rsvp-bypass-label-01.txt, work in progress, | |||
| mpls-protection-00.txt, work in progress, October 1999. | November 2000. | |||
| [11] Callon, R., Doolan, P., Feldman, N., Fredette, A., Swallow, G., | [11] Kini, S., Lakshman, T. V., Villamizar, C., "Reservation Protocol | |||
| Viswanathan, A., "A Framework for Multiprotocol Label Switching", | with Traffic Engineering Extensions: Extension for Label Switched Path | |||
| Internet Draft draft-ietf-mpls-framework-05.txt, Work in Progress, | Restoration," Internet Draft, Work in Progress, draft-kini-rsvp-lsp- | |||
| September 1999. | restoration-00.txt, November 2000. | |||
| [12] Haskin, D. and Krishnan R., "A Method for Setting an Alternative | [12] Haskin, D. and Krishnan R., "A Method for Setting an Alternative | |||
| Label Switched Path to Handle Fast Reroute", Internet Draft draft- | Label Switched Path to Handle Fast Reroute", Internet Draft draft- | |||
| haskin-mpls-fast-reroute-05.txt, November 2000, Work in progress. | haskin-mpls-fast-reroute-05.txt, November 2000, Work in progress. | |||
| [13] Owens, K., Makam,V., Sharma, V., Mack-Crane, B., and Haung, C., "A | [13] Owens, K., Makam, V., Sharma, V., Mack-Crane, B., and Haung, C., "A | |||
| Path Protection/Restoration Mechanism for MPLS Networks", Internet | Path Protection/Restoration Mechanism for MPLS Networks", Internet | |||
| Draft, draft-chang-mpls-path-protection-02.txt, Work in Progress | Draft, draft-chang-mpls-path-protection-02.txt, Work in Progress | |||
| November 2000. | November 2000. | |||
| End of changes. 35 change blocks. | ||||
| 67 lines changed or deleted | 72 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||