< draft-ietf-pwe3-arch-01.txt   draft-ietf-pwe3-arch-02.txt >
Pseudo-Wire Edge-to-Edge (PWE3) Working Group Stewart Bryant Pseudo-Wire Edge-to-Edge (PWE3) Working Group Stewart Bryant
Internet Draft Cisco Systems Internet Draft Cisco Systems
Document: <draft-ietf-pwe3-arch-01.txt> Document: <draft-ietf-pwe3-arch-02.txt>
Expires: May 2003 Prayson Pate Expires: August 2003 Prayson Pate
Overture Networks, Inc. Overture Networks, Inc.
Editors Editors
November 2002 February 2003
PWE3 Architecture PWE3 Architecture
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of section 10 of RFC2026. all provisions of section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
skipping to change at page 1, line 37 skipping to change at page 1, line 37
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt The list of http://www.ietf.org/ietf/1id-abstracts.txt The list of
Internet-Draft Shadow Directories can be accessed at Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
Abstract Abstract
This document describes an architecture for Pseudo Wire Emulation This document describes an architecture for Pseudo Wire Emulation
Edge-to-Edge (PWE3). It discusses the emulation of services (such as Edge-to-Edge (PWE3). It discusses the emulation of services (such as
Frame Relay, ATM, Ethernet TDM and SONET/SDH) over packet switched Frame Relay, ATM, Ethernet, TDM and SONET/SDH) over packet switched
networks (PSNs) using IP or MPLS. It presents the architectural networks (PSNs) using IP or MPLS. It presents the architectural
framework for pseudo wires (PWs), defines terminology, specifies the framework for pseudo wires (PWs), defines terminology, specifies the
various protocol elements and their functions. various protocol elements and their functions.
Co-Authors Co-Authors
The following are co-authors of this document: The following are co-authors of this document:
Thomas K. Johnson Litchfield Communications Thomas K. Johnson Litchfield Communications
Kireeti Kompella Juniper Networks, Inc. Kireeti Kompella Juniper Networks, Inc.
Andrew G. Malis Vivace Networks Andrew G. Malis Vivace Networks
Danny McPherson TCB Danny McPherson TCB
Thomas D. Nadeau Cisco Systems Thomas D. Nadeau Cisco Systems
Tricci So Caspian Networks Tricci So Caspian Networks
W. Mark Townsley Cisco Systems W. Mark Townsley Cisco Systems
Craig White Level 3 Communications, LLC. Craig White Level 3 Communications, LLC.
Lloyd Wood Cisco Systems Lloyd Wood Cisco Systems
XiPeng Xiao Redback Networks XiPeng Xiao Redback Networks
Table of Contents Conventions used in this document
Status of this Memo.......................................... 1 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
1. Introduction............................................. 5 1. Introduction............................................. 5
1.1 Pseudo Wire Definition............................... 5 1.1 Pseudo Wire Definition............................... 5
1.2 PW Service Functionality............................. 6 1.2 PW Service Functionality............................. 6
1.3 Non-Goals of this document........................... 6 1.3 Non-Goals of this document........................... 6
1.4 Terminology.......................................... 6 1.4 Terminology.......................................... 6
2. PWE3 Applicability....................................... 9 2. PWE3 Applicability....................................... 9
3. Protocol Layering Model.................................. 9 3. Protocol Layering Model.................................. 9
3.1 Protocol Layers...................................... 9 3.1 Protocol Layers...................................... 9
3.2 Domain of PWE3....................................... 10 3.2 Domain of PWE3....................................... 11
3.3 Payload Types........................................ 10 3.3 Payload Types........................................ 11
4. Architecture of Pseudo-wires............................. 14 4. Architecture of Pseudo-wires............................. 14
4.1 Network Reference Model.............................. 14 4.1 Network Reference Model.............................. 14
4.2 PWE3 Pre-processing.................................. 15 4.2 PWE3 Pre-processing.................................. 15
4.3 Maintenance Reference Model.......................... 19 4.3 Maintenance Reference Model.......................... 19
4.4 Protocol Stack Reference Model....................... 19 4.4 Protocol Stack Reference Model....................... 19
4.5 Pre-processing Extension to Protocol Stack........... 4.5 Pre-processing Extension to Protocol Stack Reference.
Reference Model...................................... 20 Model................................................ 20
5. PW Encapsulation......................................... 21 5. PW Encapsulation......................................... 21
5.1 Payload Convergence Layer............................ 22 5.1 Payload Convergence Layer............................ 22
5.2 Payload-independent PW Encapsulation Layers.......... 24 5.2 Payload-independent PW Encapsulation Layers.......... 24
5.3 Fragmentation........................................ 27 5.3 Fragmentation........................................ 27
5.4 Instantiation of the Protocol Layers................. 27 5.4 Instantiation of the Protocol Layers................. 27
6. PW Demultiplexer Layer and PSN Requirements.............. 30 6. PW Demultiplexer Layer and PSN Requirements.............. 31
6.1 Multiplexing......................................... 30 6.1 Multiplexing......................................... 31
6.2 Fragmentation........................................ 30 6.2 Fragmentation........................................ 31
6.3 Length and Delivery.................................. 30 6.3 Length and Delivery.................................. 31
6.4 PW-PDU Validation.................................... 31 6.4 PW-PDU Validation.................................... 31
6.5 Congestion Considerations............................ 31 6.5 Congestion Considerations............................ 32
7. Control Plane............................................ 31 7. Control Plane............................................ 33
7.1 Set-up or Teardown of Pseudo-Wires................... 31 7.1 Set-up or Teardown of Pseudo-Wires................... 33
7.2 Status Monitoring.................................... 32 7.2 Status Monitoring.................................... 33
7.3 Notification of Pseudo-wire Status Changes........... 32 7.3 Notification of Pseudo-wire Status Changes........... 34
7.4 Keep-alive........................................... 34 7.4 Keep-alive........................................... 35
7.5 Handling Control Messages of the Native Services..... 34 7.5 Handling Control Messages of the Native Services..... 35
8. Management and Monitoring................................. 34 8. Management and Monitoring................................. 36
8.1 Statistics........................................... 34 8.1 Status and Statistics................................ 36
8.2 PW SNMP MIB Architecture............................. 35 8.2 PW SNMP MIB Architecture............................. 36
8.3 Connection Verification and Traceroute................ 38 8.3 Connection Verification and Traceroute................ 40
9. IANA considerations...................................... 38 9. IANA considerations...................................... 40
10. Security Considerations................................. 38 10. Security Considerations................................. 40
10.1 PW Tunnel End-Point and PW Demultiplexer Security... 38
10.2 Validation of PW Encapsulation...................... 39
1. Introduction 1. Introduction
This document describes an architecture for Pseudo Wire Emulation This document describes an architecture for Pseudo Wire Emulation
Edge-to-Edge (PWE3) in support of [XIAO]. It discusses the emulation Edge-to-Edge (PWE3) in support of [XIAO]. It discusses the emulation
of services (such as Frame Relay, ATM, Ethernet TDM and SONET/SDH) of services (such as Frame Relay, ATM, Ethernet, TDM and SONET/SDH)
over packet switched networks (PSNs) using IP or MPLS. It presents over packet switched networks (PSNs) using IP or MPLS. It presents
the architectural framework for pseudo wires (PWs), defines the architectural framework for pseudo wires (PWs), defines
terminology, specifies the various protocol elements and their terminology, specifies the various protocol elements and their
functions. functions.
1.1 Pseudo Wire Definition 1.1 Pseudo Wire Definition
PWE3 is a mechanism that emulates the essential attributes of a PWE3 is a mechanism that emulates the essential attributes of a
service (such as a T1 leased line or Frame Relay) over a PSN. PWE3 is service (such as a T1 leased line or Frame Relay) over a PSN. PWE3 is
intended to provide only the minimum necessary functionality to intended to provide only the minimum necessary functionality to
emulate the wire with the required degree of faithfulness for the emulate the wire with the required degree of faithfulness for the
given service definition. Any required switching functionality is the given service definition. Any required switching functionality is the
responsibility of a forwarder function (FWRD). Any translation or responsibility of a forwarder function (FWRD). Any translation or
other operation needing knowledge of the payload semantics is carried other operation needing knowledge of the payload semantics is carried
out by native service processing (NSP) elements. The functional out by native service processing (NSP) elements. The functional
definition of any FWRD or NSP elements is outside the scope of PWE3. definition of any FWRD or NSP elements is outside the scope of PWE3.
The required functions of PWs include encapsulating service-specific The required functions of PWs include encapsulating service-specific
bit-streams, cells or PDUs arriving at an ingress port, and carrying bit-streams, cells or PDUs arriving at an ingress port, and carrying
them across a path or tunnel. In some cases it is necessary to them across a IP path or MPLS tunnel. In some cases it is necessary
perform other operation such as managing their timing and order, to to perform other operation such as managing their timing and order,
emulate the behavior and characteristics of the service to the to emulate the behavior and characteristics of the service to the
required degree of faithfulness. required degree of faithfulness.
From the perspective of a Customer Edge Equipment (CE), the PW is From the perspective of a Customer Edge Equipment (CE), the PW is
characterised as an unshared link or circuit of the chosen service. characterised as an unshared link or circuit of the chosen service.
In some cases, there may be deficiencies in the PW emulation that In some cases, there may be deficiencies in the PW emulation that
impact the traffic carried over a PW, and hence limit the impact the traffic carried over a PW, and hence limit the
applicability of this technology. These limitations must be fully applicability of this technology. These limitations must be fully
described in the appropriate service-specific documentation. It is described in the appropriate service-specific documentation.
possible that these limitations may lead to the definition of more
than one PW emulation method, each providing a different degree of For each service type, there will be one default mode of operation
faithfulness. that all PEs offering that service type MUST support. However,
OPTIONAL modes MAY be defined to improve the faithfulness of the
emulated service, if it can be clearly demonstrated that the
additional complexity associated with the OPTIONAL mode is offset by
the value it offers to PW users.
1.2 PW Service Functionality 1.2 PW Service Functionality
PWs provide the following functions in order to emulate the behavior PWs provide the following functions in order to emulate the behavior
and characteristics of the native service. and characteristics of the native service.
o Encapsulation of service-specific PDUs or circuit data arriving o Encapsulation of service-specific PDUs or circuit data arriving
at the ingress port (logical or physical). at the PE-bound port (logical or physical).
o Carriage of the encapsulated data across a PSN tunnel. o Carriage of the encapsulated data across a PSN tunnel.
o Establishment of the PW including the exchange and/or o Establishment of the PW including the exchange and/or
distribution of the PW identifiers used by the PSN distribution of the PW identifiers used by the PSN
tunnel endpoints. tunnel endpoints.
o Managing the signaling, timing, order or other aspects of the o Managing the signaling, timing, order or other aspects of the
service at the boundaries of the PW. service at the boundaries of the PW.
o Service-specific status and alarm management. o Service-specific status and alarm management.
1.3 Non-Goals of this document 1.3 Non-Goals of this document
The following are non-goals for this document: The following are non-goals for this document:
o The on-the-wire specification of services encapsulation. o The on-the-wire specification of PW encapsulations.
o The detailed definition of the protocols involved in PW o The detailed definition of the protocols involved in PW
setup and maintenance. set-up and maintenance.
The following are outside the scope of PWE3: The following are outside the scope of PWE3:
o Any multicast service not native to the emulated medium. o Any multicast service not native to the emulated medium.
Thus, Ethernet transmission to a "multicast" IEEE-48 address Thus, Ethernet transmission to a "multicast" IEEE-48 address
is in scope, while multicast services like MARS [RFC2022] that is in scope, while multicast services like MARS [RFC2022] that
are implemented on top of the medium are out of scope. are implemented on top of the medium are out of scope.
o Methods to signal or control the underlying PSN. o Methods to signal or control the underlying PSN.
1.4 Terminology 1.4 Terminology
Editor's note: Although it was decided at IETF-54 that the PWE3
common terminology should be published in a separate document, there
is case for it remaining in the architecture document. If the PWE3-WG
confirms the desire to have a separate document, we will remove this
section in the next revision.
This document uses the following definitions of terms. These terms This document uses the following definitions of terms. These terms
are illustrated in context in Figure 2. are illustrated in context in Figure 2.
Attachment Circuit The circuit or virtual circuit attaching Attachment Circuit The circuit or virtual circuit attaching
(AC) a CE to a PE. (AC) a CE to a PE.
Applicability Each PW service will have an Applicability
Statement (AS) Statement (AS) that describes the applicability
of PWs for that service.
CE-bound The traffic direction where PW-PDUs are CE-bound The traffic direction where PW-PDUs are
received on a PW via the PSN, processed received on a PW via the PSN, processed
and then sent to the destination CE. and then sent to the destination CE.
CE Signaling Messages sent and received by the CEs CE Signaling Messages sent and received by the CEs
control plane. It may be desirable or control plane. It may be desirable or
even necessary for the PE to participate even necessary for the PE to participate
in or monitor this signaling in order in or monitor this signaling in order
to effectively emulate the service. to effectively emulate the service.
Control Word (CW) A four octet header used in some encapsulations
to carry per packet information when the PSN
is MPLS.
Customer Edge (CE) A device where one end of a service Customer Edge (CE) A device where one end of a service
originates and/or terminates. The CE is not originates and/or terminates. The CE is not
aware that it is using an emulated service aware that it is using an emulated service
rather than a native service. rather than a native service.
Forwarder (FWRD) A PE subsystem that selects the PW to use to Forwarder (FWRD) A PE subsystem that selects the PW to use to
transmit a payload received on an AC. transmit a payload received on an AC.
Fragmentation The action of dividing a single PDU into Fragmentation The action of dividing a single PDU into
multiple PDUs before transmission with the multiple PDUs before transmission with the
intent of the original PDU being reassembled intent of the original PDU being reassembled
elsewhere in the network. Fragmentation may be elsewhere in the network. Fragmentation MAY be
performed in order to allow sending of packets performed in order to allow sending of packets
of a larger size than the network MTU which of a larger size than the network MTU which
they will traverse. they will traverse.
Maximum transmission The packet size (excluding data link header) Maximum transmission The packet size (excluding data link header)
unit (MTU) that an interface can transmit without unit (MTU) that an interface can transmit without
needing to fragment. needing to fragment.
Native Service Processing of the data received by the PE Native Service Processing of the data received by the PE
Processing (NSP) from the CE before presentation to the PW Processing (NSP) from the CE before presentation to the PW
for transmission across the core. for transmission across the core, or
processing of the data received from a PW
by a PE before it is output on the AC.
NSP functionality is defined by standards
bodies other than the IETF, such as ITU-T,
ANSI, ATMF, etc.)
Packet Switched Within the context of PWE3, this is a Packet Switched Within the context of PWE3, this is a
Network (PSN) network using IP or MPLS as the mechanism Network (PSN) network using IP or MPLS as the mechanism
for packet forwarding. for packet forwarding.
Protocol Data The unit of data output to, or received Protocol Data The unit of data output to, or received
Unit (PDU) from, the network by a protocol layer. Unit (PDU) from, the network by a protocol layer.
Provider Edge (PE) A device that provides PWE3 to a CE. Provider Edge (PE) A device that provides PWE3 to a CE.
skipping to change at page 8, line 34 skipping to change at page 8, line 33
PSN Tunnel A tunnel across a PSN inside which one or PSN Tunnel A tunnel across a PSN inside which one or
more PWs can be carried. more PWs can be carried.
PSN Tunnel Used to set up, maintain and tear down the PSN Tunnel Used to set up, maintain and tear down the
Signaling underlying PSN tunnel. Signaling underlying PSN tunnel.
PW Demultiplexer Data-plane method of identifying a PW PW Demultiplexer Data-plane method of identifying a PW
terminating at a PE. terminating at a PE.
Time Domain Synchronous bit-streams at rates defined by Time Domain Time Division Multiplexing. Frequently used
Multiplexing (TDM) G.702. Multiplexing (TDM) to refer to the synchronous bit-streams at
rates defined by G.702.
Tunnel A method of transparently carrying information Tunnel A method of transparently carrying information
over a network. over a network.
2. PWE3 Applicability 2. PWE3 Applicability
The PSN carrying a PW will subject payload packets to delay, jitter, The PSN carrying a PW will subject payload packets to loss, delay,
network transients and re-ordering. The applicability of PWE3 to a delay variation, and re-ordering. During a network transient there
particular service depends on the sensitivity of that service to may be a sustained period of impaired service. The applicability of
these effects, and the ability of the adaptation layer to mask them. PWE3 to a particular service depends on the sensitivity of that
Some services, such as IP over FR over PWE3, may prove quite service (or the CE implementation) to these effects, and the ability
resilient to IP and MPLS PSN characteristics. Other services, such as of the adaptation layer to mask them. Some services, such as IP over
the interconnection of PBX systems via PWE3, will require more FR over PWE3, may prove quite resilient to IP and MPLS PSN
careful consideration of the PSN and adaptation layer characteristics. Other services, such as the interconnection of PBX
characteristics. In some instances, traffic engineering of the systems via PWE3, will require more careful consideration of the PSN
underlying PSN will be required, and in some cases the constraints and adaptation layer characteristics. In some instances, traffic
may be such that it is not possible to provide the required service engineering of the underlying PSN will be required, and in some
guarantees. cases, the constraints may be such that it is not possible to provide
the required service guarantees.
3. Protocol Layering Model 3. Protocol Layering Model
The PWE3 protocol-layering model is intended to minimise the The PWE3 protocol-layering model is intended to minimise the
differences between PWs operating over different PSN types. The differences between PWs operating over different PSN types. The
design of the protocol-layering model has the goals of making each PW design of the protocol-layering model has the goals of making each PW
definition independent of the underlying PSN, and maximizing the definition independent of the underlying PSN, and maximizing the
reuse of IETF protocol definitions and their implementations. reuse of IETF protocol definitions and their implementations.
3.1 Protocol Layers 3.1 Protocol Layers
The logical protocol-layering model required to support a PW is shown The logical protocol-layering model required to support a PW is shown
in Figure 1. in Figure 1.
+---------------------------+ +---------------------------+
| Payload | | Payload |
+---------------------------+ +---------------------------+
| Encapsulation | <==== May be empty | Encapsulation | <==== MAY be null
+---------------------------+ +---------------------------+
| PW Demultiplexer | | PW Demultiplexer |
+---------------------------+ +---------------------------+
| PSN Convergence | <==== May be empty | PSN Convergence | <==== MAY be null
+---------------------------+ +---------------------------+
| PSN | | PSN |
+---------------------------+ +---------------------------+
| MAC/Data-link | | Data-link |
+---------------------------+ +---------------------------+
| Physical | | Physical |
+---------------------------+ +---------------------------+
Figure 1: Logical Protocol Layering Model Figure 1: Logical Protocol Layering Model
The payload is transported over the Encapsulation Layer. The The payload is transported over the Encapsulation Layer. The
Encapsulation Layer carries any information, not already present Encapsulation Layer carries any information, not already present
within the payload itself, that is needed by the PW CE-bound PE within the payload itself, that is needed by the PW CE-bound PE
interface to send the payload to the CE via the physical interface. interface to send the payload to the CE via the physical interface.
If no information is needed beyond that in the payload itself, this If no information is needed beyond that in the payload itself, this
layer is empty. layer is empty.
This layer also provides support for real-time processing, and This layer also provides support for real-time processing, and
sequencing, if needed. sequencing, if needed.
The PW Demultiplexer Layer provides the ability to deliver multiple The PW Demultiplexer Layer provides the ability to deliver multiple
PWs over a single PSN tunnel. The PW demultiplexer value used to PWs over a single PSN tunnel. The PW demultiplexer value used to
identify the PW in the data-plane may be unique per PE, but this is identify the PW in the data-plane may be unique per PE, but this is
not a PWE3 requirement. It must, however, be unique per tunnel not a PWE3 requirement. It MUST, however, be unique per tunnel
endpoint. If it is necessary to identify a particular tunnel, then endpoint. If it is necessary to identify a particular tunnel, then
that is the responsibility of the PSN layer. that is the responsibility of the PSN layer.
The PSN Convergence Layer provides the enhancements needed to make The PSN Convergence Layer provides the enhancements needed to make
the PSN conform to the assumed PSN service requirement. This layer the PSN conform to the assumed PSN service requirement. This layer
therefore provides a consistent interface to the PW, making the PW therefore provides a consistent interface to the PW, making the PW
independent of the PSN type. If the PSN already meets the service independent of the PSN type. If the PSN already meets the service
requirements, this layer is empty. requirements, this layer is empty.
The PSN header, MAC/Data-link and Physical Layer definitions are The PSN header, MAC/Data-link and Physical Layer definitions are
skipping to change at page 11, line 5 skipping to change at page 11, line 27
o Packet o Packet
o Cell o Cell
o Bit-stream o Bit-stream
o Structured bit-stream o Structured bit-stream
Within these generic types there are specific service types. For Within these generic types there are specific service types. For
example: example:
Generic Payload Type PW Service Generic Payload Type PW Service
-------------------- ---------- -------------------- ----------
Packet Ethernet (all types), HDLC, Packet Ethernet (all types), HDLC framing,
frame-relay, ATM AAL5 PDU. frame-relay, ATM AAL5 PDU.
Cell ATM. Cell ATM.
Bit-stream SONET, TDM (e.g. DS1, DS3, E1). Bit-stream Unstructured E1, T1, E3, T3.
Structured bit-stream SONET, TDM. Structured bit-stream SONET/SDH (e.g. SPE, VT, NxDS0).
3.3.1. Packet Payload 3.3.1. Packet Payload
A packet payload is a variable-size data unit presented to the PE on A packet payload is a variable-size data unit presented to the PE on
the AC. A packet payload may be large compared to the PSN MTU. The the AC. A packet payload may be large compared to the PSN MTU. The
delineation of the packet boundaries is encapsulation-specific. HDLC delineation of the packet boundaries is encapsulation-specific. HDLC
or Ethernet PDUs can be considered as examples of packet payloads. or Ethernet PDUs can be considered as examples of packet payloads.
Typically a packet will be stripped of transmission overhead such as Typically a packet will be stripped of transmission overhead such as
HDLC flags and stuffing bits before transmission over the PW. HDLC flags and stuffing bits before transmission over the PW.
A packet payload would normally be relayed across the PW as a single A packet payload would normally be relayed across the PW as a single
unit. However, there will be cases where the combined size of the unit. However, there will be cases where the combined size of the
packet payload and its associated PWE3 and PSN headers exceeds the packet payload and its associated PWE3 and PSN headers exceeds the
PSN path MTU. In these cases, some fragmentation methodology needs PSN path MTU. In these cases, some fragmentation methodology needs
to be applied. This may, for example, be the case when a user is to be applied. This may, for example, be the case when a user is
providing the service and attaching to the service provider via an providing the service and attaching to the service provider via
Ethernet, or where nested pseudo-wires are involved. Fragmentation is Ethernet, or where nested pseudo-wires are involved. Fragmentation is
discussed in more detail in Section 5.3 discussed in more detail in Section 5.3
A packet payload may need sequencing and real-time support. A packet payload may need sequencing and real-time support.
In some situations, the packet payload may be selected from the In some situations, the packet payload MAY be selected from the
packets presented on the emulated wire on the basis of some sub- packets presented on the emulated wire on the basis of some sub-
multiplexing technique. For example, one or more frame-relay PDUs multiplexing technique. For example, one or more frame-relay PDUs
may be selected for transport over a particular pseudo-wire based on may be selected for transport over a particular pseudo-wire based on
the frame-relay Data-Link Connection Identifier (DLCI), or, in the the frame-relay Data-Link Connection Identifier (DLCI), or, in the
case of Ethernet payloads, on the basis of the VLAN identifier. This case of Ethernet payloads, using a suitable MAC bridge filter. This
is an FWRD function, and this selection would therefore be made is an FWRD function, and this selection would therefore be made
before the packet was presented to the PW Encapsulation Layer. before the packet was presented to the PW Encapsulation Layer.
3.3.2. Cell Payload 3.3.2. Cell Payload
A cell payload is created by capturing, transporting and replaying A cell payload is created by capturing, transporting and replaying
groups of bits presented on the wire in a fixed-size format. The groups of octets presented on the wire in a fixed-size format. The
delineation of the group of bits that comprise the cell is specific delineation of the group of bits that comprise the cell is specific
to the encapsulation type. Two common examples of cell payloads are to the encapsulation type. Two common examples of cell payloads are
ATM 53-octet cells, and the larger 188-octet MPEG Transport Stream ATM 53-octet cells, and the larger 188-octet MPEG Transport Stream
packets [ETSI]. packets [DVB].
To reduce per-PSN packet overhead, multiple cells may be concatenated To reduce per-PSN packet overhead, multiple cells MAY be concatenated
into a single payload. The Encapsulation Layer may consider the into a single payload. The Encapsulation Layer MAY consider the
payload complete on the expiry of a timer, after a fixed number of payload complete on the expiry of a timer, after a fixed number of
cells have been received or when a significant cell (e.g. an ATM OAM cells have been received or when a significant cell (e.g. an ATM OAM
cell) has been received. The benefit of concatenating multiple PDUs cell) has been received. The benefit of concatenating multiple PDUs
should be weighed against the resulting increase in jitter and the should be weighed against a possible increase in packet delay
larger penalty incurred by packet loss. In some cases, it may be variation and the larger penalty incurred by packet loss. In some
appropriate for the Encapsulation Layer to perform a silence cases, it may be appropriate for the Encapsulation Layer to perform
suppression or a similar compression. some type of compression, such as silence suppression or voice
compression.
The generic cell payload service will normally need sequence number The generic cell payload service will normally need sequence number
support, and may also need real-time support. The generic cell support, and may also need real-time support. The generic cell
payload service would not normally require fragmentation. payload service would not normally require fragmentation.
The Encapsulation Layer may apply some form of compression to some of The Encapsulation Layer MAY apply some form of compression to some of
these sub-types (e.g. idle cells may be suppressed). these sub-types (e.g. idle cells MAY be suppressed).
In some instances, the cells to be incorporated in the payload may be In some instances, the cells to be incorporated in the payload MAY be
selected by filtering them from the stream of cells presented on the selected by filtering them from the stream of cells presented on the
wire. For example, an ATM PWE3 service may select cells based on wire. For example, an ATM PWE3 service may select cells based on
their VCI or VPI fields. This is an FWRD function, and the selection their VCI or VPI fields. This is an FWRD function, and the selection
would therefore be made before the packet was presented to the PW would therefore be made before the packet was presented to the PW
Encapsulation Layer. Encapsulation Layer.
3.3.3. Bit-stream 3.3.3. Bit-stream
A bit-stream payload is created by capturing, transporting and A bit-stream payload is created by capturing, transporting and
replaying the bit pattern on the emulated wire, without taking replaying the bit pattern on the emulated wire, without taking
skipping to change at page 13, line 5 skipping to change at page 13, line 29
3.3.4. Structured bit-stream 3.3.4. Structured bit-stream
A structured bit-stream payload is created by using some knowledge of A structured bit-stream payload is created by using some knowledge of
the underlying structure of the bit-stream to capture, transport and the underlying structure of the bit-stream to capture, transport and
replay the bit pattern on the emulated wire. replay the bit pattern on the emulated wire.
Two important points distinguish structured and unstructured bit- Two important points distinguish structured and unstructured bit-
streams: streams:
o Some part of the original bit-stream are stripped in o Some parts of the original bit-stream MAY be stripped in the
the PSN-bound direction by NSP block. For example, PSN-bound direction by NSP block. For example, in Structured
in Structured SONET the section and line overhead (and, SONET the section and line overhead (and, possibly more) may
possibly, more) may be stripped. be stripped. A framer is required to enable such stripping.
It is also required for frame/payload alignment for
fractional T1/E1 applications.
o The PW must preserve the structure across the PSN so that o The PW MUST preserve the structure across the PSN so that
the CE-bound NSP block can insert it correctly into the the CE-bound NSP block can insert it correctly into the
reconstructed unstructured bit-stream. reconstructed unstructured bit-stream. The stripped
information (such as SONET pointer justifications) may
appear in the encapsulation layer to facilitate this
reconstitution.
The Encapsulation Layer may also perform silence/idle suppression or As an option, the Encapsulation Layer MAY also perform silence/idle
similar compression on a structured bit-stream. suppression or similar compression on a structured bit-stream.
Structured bit-streams are distinguished from cells in that the Structured bit-streams are distinguished from cells in that the
structures may be too long to be carried in a single packet. Note structures may be too long to be carried in a single packet. Note
that "short" structures are indistinguishable from cells and may that "short" structures are indistinguishable from cells and may
benefit from the use of those PWE3 methods. benefit from the use of methods described in section 3.3.2.
This service will require sequencing and real-time support. This service REQUIRES sequencing and real-time support.
3.3.5. Principle of Minimum Intervention 3.3.5. Principle of Minimum Intervention
To minimise the scope of information, and to improve the efficiency To minimise the scope of information, and to improve the efficiency
of data flow through the Encapsulation Layer, the payload should be of data flow through the Encapsulation Layer, the payload SHOULD be
transported as received with as few modifications as possible transported as received with as few modifications as possible
[RFC1958]. [RFC1958].
This minimum intervention approach decouples payload development from This minimum intervention approach decouples payload development from
PW development and requires fewer translations at the NSP in a system PW development and requires fewer translations at the NSP in a system
with similar CE interfaces at each end. It also prevents unwanted with similar CE interfaces at each end. It also prevents unwanted
side-effects due to subtle mis-representation of the payload in the side-effects due to subtle misrepresentation of the payload in the
intermediate format. intermediate format.
An intervention approach can be more wire-efficient in some cases and An approach which does intervene can be more wire-efficient in some
may result in fewer translations at the NSP where the CE interfaces cases and may result in fewer translations at the NSP where the CE
are of different types. Any intermediate format effectively becomes a interfaces are of different types. Any intermediate format
new framing type, requiring documentation and assured effectively becomes a new framing type, requiring documentation and
interoperability. This increases the amount of work for handling the assured interoperability. This increases the amount of work for
protocol the intermediate format carries, and is undesirable. handling the protocol the intermediate format carries, and is
undesirable.
4. Architecture of Pseudo-wires 4. Architecture of Pseudo-wires
This section describes the PWE3 architectural model. This section describes the PWE3 architectural model.
4.1 Network Reference Model 4.1 Network Reference Model
Figure 2 illustrates the network reference model for point-to-point Figure 2 illustrates the network reference model for point-to-point
PWs. PWs.
skipping to change at page 14, line 42 skipping to change at page 15, line 33
| | | |
native service native service native service native service
Figure 2: PWE3 Network Reference Model Figure 2: PWE3 Network Reference Model
The two PEs (PE1 and PE2) need to provide one or more PWs on behalf The two PEs (PE1 and PE2) need to provide one or more PWs on behalf
of their client CEs (CE1 and CE2) to enable the client CEs to of their client CEs (CE1 and CE2) to enable the client CEs to
communicate over the PSN. A PSN tunnel is established to provide a communicate over the PSN. A PSN tunnel is established to provide a
data path for the PW. The PW traffic is invisible to the core data path for the PW. The PW traffic is invisible to the core
network, and the core network is transparent to the CEs. Native data network, and the core network is transparent to the CEs. Native data
units (bits, cells or packets) presented at the PW End Service (PWES) units (bits, cells or packets) presented to the PW End Service (PWES)
are encapsulated in a PW-PDU and carried across the underlying are encapsulated in a PW-PDU and carried across the underlying
network via the PSN tunnel. The PEs perform the necessary network via the PSN tunnel. The PEs perform the necessary
encapsulation and decapsulation of PW-PDUs, as well as handling any encapsulation and decapsulation of PW-PDUs, as well as handling any
other functions required by the PW service, such as sequencing or other functions required by the PW service, such as sequencing or
timing. timing. A PE MAY provide multiple PWESs.
There are situations in which a particular packet payload needs to be
multicast so that it is received by a number of CEs. This is useful
when using PWs as part of a "virtual LAN" service (see, e.g.,
[VPLS]). This can be achieved by replicating the payload and
transmitting the replicas on PWs, but it may also be useful to have a
type of PW that is inherently point-to-multipoint. In that case, the
PW would need to be carried through a point-to-multipoint PSN tunnel,
employing a multicast mechanism provided by the PSN.
4.2 PWE3 Pre-processing 4.2 PWE3 Pre-processing
In some applications, there is a need to perform operations on the In some applications, there is a need to perform operations on the
native data units received from the CE (including both payload and native data units received from the CE (including both payload and
signaling traffic) before they are transmitted across the PW by the signaling traffic) before they are transmitted across the PW by the
PE. Examples include Ethernet bridging, SONET cross-connect, PE. Examples include Ethernet bridging, SONET cross-connect,
translation of locally-significant identifiers such as VCI/VPI, or translation of locally-significant identifiers such as VCI/VPI, or
translation to another service type. These operations could be translation to another service type. These operations could be
carried out in external equipment, and the processed data sent to the carried out in external equipment, and the processed data sent to the
skipping to change at page 17, line 8 skipping to change at page 17, line 13
o Native Service Processing (NSP) o Native Service Processing (NSP)
4.2.1. Forwarders 4.2.1. Forwarders
In some applications there is the need to selectively forward payload In some applications there is the need to selectively forward payload
elements from one of more ACs to one or more PWs. In such cases there elements from one of more ACs to one or more PWs. In such cases there
will also be the need to perform the inverse function on PWE3-PDUs will also be the need to perform the inverse function on PWE3-PDUs
received by a PE from the PSN. This is the function of the FWRD. received by a PE from the PSN. This is the function of the FWRD.
The FWRD selects the PW based on, for example: the incoming AC, the The FWRD selects the PW based on, for example: the incoming AC, the
contents of the payload, or some statically- or dynamically- contents of the payload, or some statically and/or dynamically
configured forwarding information. configured forwarding information.
+----------------------------------------+ +----------------------------------------+
| PE Device | | PE Device |
+----------------------------------------+ +----------------------------------------+
Single | | | Single | | |
PWES | | Single | PW Instance PWES | | Single | PW Instance
<------>o Forwarder + PW Instance X<===========> <------>o Forwarder + PW Instance X<===========>
| | | | | |
+----------------------------------------+ +----------------------------------------+
skipping to change at page 17, line 30 skipping to change at page 17, line 35
Figure 4a: Simple point-to-point service Figure 4a: Simple point-to-point service
+----------------------------------------+ +----------------------------------------+
| PE Device | | PE Device |
+----------------------------------------+ +----------------------------------------+
Multiple| | Single | PW Instance Multiple| | Single | PW Instance
PWES | + PW Instance X<===========> PWES | + PW Instance X<===========>
<------>o | | <------>o | |
| |----------------------| | |----------------------|
<------>o | Single | PW Instance <------>o | Single | PW Instance
| + PW Instance X<===========> | Forwarder + PW Instance X<===========>
<------>o | | <------>o | |
| Forwarder |----------------------| | |----------------------|
<------>o | Single | PW Instance <------>o | Single | PW Instance
| + PW Instance X<===========> | + PW Instance X<===========>
<------>o | | <------>o | |
| |----------------------| Multipoint
| | Multipoint | PW Instance
| + PW Instance X<===========>
| | |
+----------------------------------------+ +----------------------------------------+
Figure 4b: Multiple PWEs to Multiple PW Forwarding Figure 4b: Multiple PWES to Multiple PW Forwarding
Figure 4a shows a simple FWRD that performs some type of filtering Figure 4a shows a simple FWRD that performs some type of filtering
operation. Because the FWRD has a single input and a single output operation. Because the FWRD has a single input and a single output
interface, filtering is the only type of forwarding operation that interface, filtering is the only type of forwarding operation that
applies. Figure 4b shows a more general forwarding situation where applies. Figure 4b shows a more general forwarding situation where
payloads are extracted from one or more PWESs and directed to one or payloads are extracted from one or more PWESs and directed to one or
more PWs, including, in this instance, a multipoint PW. In this case more PWs, including, in this instance, a multipoint PW. In this case
both filtering and direction operations may be performed on the both filtering and direction operations MAY be performed on the
payloads. payloads.
4.2.2. Native Service Processing 4.2.2. Native Service Processing
In some applications some form of data or address translation, or In some applications some form of data or address translation, or
other operation requiring knowledge of the semantics of the payload, other operation requiring knowledge of the semantics of the payload,
will be required. This is the function of the Native Service will be required. This is the function of the Native Service
Processor (NSP). Processor (NSP).
The use of the NSP approach simplifies the design of the PW by The use of the NSP approach simplifies the design of the PW by
skipping to change at page 18, line 28 skipping to change at page 18, line 28
PWE3. PWE3.
+----------------------------------------+ +----------------------------------------+
| PE Device | | PE Device |
Multiple+----------------------------------------+ Multiple+----------------------------------------+
PWES | | | Single | PW Instance PWES | | | Single | PW Instance
<------>o NSP # + PW Instance X<===========> <------>o NSP # + PW Instance X<===========>
| | | | | | | |
|------| |----------------------| |------| |----------------------|
| | | Single | PW Instance | | | Single | PW Instance
<------>o NSP # + PW Instance X<===========> <------>o NSP #Forwarder + PW Instance X<===========>
| | | | | | | |
|------|Forwarder |----------------------| |------| |----------------------|
| | | Single | PW Instance | | | Single | PW Instance
<------>o NSP # + PW Instance X<===========> <------>o NSP # + PW Instance X<===========>
| | | | | | | |
|------| |----------------------| Multipoint
| | | Multipoint | PW Instance
<------>o NSP # + PW Instance X<===========>
| | | |
+----------------------------------------+ +----------------------------------------+
Figure 5: NSP in a Multiple PWEs to Multiple Figure 5: NSP in a Multiple PWEs to Multiple
PW Forwarding PE PW Forwarding PE
Figure 5 illustrates the relationship between NSP, FWRD and PWs in a Figure 5 illustrates the relationship between NSP, FWRD and PWs in a
PE. The NSP function may apply any transformation operation PE. The NSP function MAY apply any transformation operation
(modification, injection, etc.) on the payloads as they pass between (modification, injection, etc.) on the payloads as they pass between
the physical interface to the CE and the virtual interface to the the physical interface to the CE and the virtual interface to the
FWRD. A PE device may contain more than one FWRD. FWRD. A PE device MAY contain more than one FWRD.
This model also supports the operation of a system in which the NSP This model also supports the operation of a system in which the NSP
functionality includes terminating the data-link and applying Network functionality includes terminating the data-link, and applying
Layer processing to the payload is also supported. Network Layer processing to the payload is also supported.
4.3 Maintenance Reference Model 4.3 Maintenance Reference Model
Figure 6 illustrates the maintenance reference model for PWs. Figure 6 illustrates the maintenance reference model for PWs.
|<------- CE (end-to-end) Signaling ------>| |<------- CE (end-to-end) Signaling ------>|
| |<---- PW/PE Maintenance ----->| | | |<---- PW/PE Maintenance ----->| |
| | |<-- PSN Tunnel -->| | | | | |<-- PSN Tunnel -->| | |
| | | Signaling | | | | | | Signaling | | |
| V V (out of scope) V V | | V V (out of scope) V V |
skipping to change at page 19, line 30 skipping to change at page 19, line 26
| |-----|.............PW1..............|-----| | | |-----|.............PW1..............|-----| |
| CE1 | | | | | | CE2 | | CE1 | | | | | | CE2 |
| |-----|.............PW2..............|-----| | | |-----|.............PW2..............|-----| |
+-----+ | |==================| | +-----+ +-----+ | |==================| | +-----+
+-----+ +-----+ +-----+ +-----+
Customer Provider Provider Customer Customer Provider Provider Customer
Edge 1 Edge 1 Edge 2 Edge 2 Edge 1 Edge 1 Edge 2 Edge 2
Figure 6: PWE3 Maintenance Reference Model Figure 6: PWE3 Maintenance Reference Model
The following signaling mechanisms are required: The following signaling mechanisms are REQUIRED:
o The CE (end-to-end) signaling is between the CEs. This o The CE (end-to-end) signaling is between the CEs. This
signaling could be frame relay PVC status signaling, ATM SVC signaling could be frame relay PVC status signaling, ATM SVC
signaling, etc. signaling, TDM CAS signaling, etc.
o The PW/PE Maintenance is used between the PEs (or NSPs) to set o The PW/PE Maintenance is used between the PEs (or NSPs) to set
up, maintain and tear down PWs, including any required up, maintain and tear down PWs, including any required
coordination of parameters. coordination of parameters.
o The PSN Tunnel signaling controls the PW multiplexing and some o The PSN Tunnel signaling controls the PW multiplexing and some
elements of the underlying PSN. Examples are L2TP control elements of the underlying PSN. Examples are L2TP control
protocol, MPLS LDP and RSVP-TE. The definition of the protocol, MPLS LDP and RSVP-TE. The definition of the
information that PWE3 needs to be signaled is within the scope information that PWE3 needs to be signaled is within the scope
of PWE3, but the signaling protocol itself is not. of PWE3, but the signaling protocol itself is not.
skipping to change at page 20, line 35 skipping to change at page 20, line 35
connection to its peer at the far end. Native service PDUs from the connection to its peer at the far end. Native service PDUs from the
CE are passed through an Encapsulation Layer at the sending PE, and CE are passed through an Encapsulation Layer at the sending PE, and
then sent over the PSN. The receiving PE removes the encapsulation then sent over the PSN. The receiving PE removes the encapsulation
and restores the payload to its native format for transmission to the and restores the payload to its native format for transmission to the
destination CE. destination CE.
4.5 Pre-processing Extension to Protocol Stack Reference Model 4.5 Pre-processing Extension to Protocol Stack Reference Model
Figure 8 illustrates how the protocol stack reference model is Figure 8 illustrates how the protocol stack reference model is
extended to include the provision of pre-processing (Forwarding and extended to include the provision of pre-processing (Forwarding and
NSP). This shows the ideal placement of the physical interface NSP). This shows the placement of the physical interface relative to
relative to the CE. the CE.
/======================================\ /======================================\
H Forwarder H<----Pre-processing H Forwarder H<----Pre-processing
H----------------======================/ H----------------======================/
H Native Service H | | H Native Service H | |
H Processing H | | H Processing H | |
\================/ | | \================/ | |
| | | Emulated | | | | Emulated |
| Service | | Service | | Service | | Service |
| Interface | | (TDM, ATM, | | Interface | | (TDM, ATM, |
skipping to change at page 22, line 23 skipping to change at page 22, line 23
H Timing H H Timing H
H---------------------------H H---------------------------H
H Sequencing H H Sequencing H
\===========================/ \===========================/
| PW Demultiplexer | | PW Demultiplexer |
+---------------------------+ +---------------------------+
| PSN Convergence | | PSN Convergence |
+---------------------------+ +---------------------------+
| PSN | | PSN |
+---------------------------+ +---------------------------+
| MAC/Data-link | | Data-link |
+---------------------------+ +---------------------------+
| Physical | | Physical |
+---------------------------+ +---------------------------+
Figure 9: PWE3 Encapsulation Layer in Context Figure 9: PWE3 Encapsulation Layer in Context
The Payload Convergence Sub-layer is highly tailored to the specific The Payload Convergence Sub-layer is highly tailored to the specific
payload type, but, by grouping a number of target payload types into payload type, but, by grouping a number of target payload types into
a generic class, and then providing a single convergence sub-layer a generic class, and then providing a single convergence sub-layer
type common to the group, we achieve a reduction in the number of type common to the group, we achieve a reduction in the number of
payload convergence sub-layer types. This decreases implementation payload convergence sub-layer types. This decreases implementation
complexity. The provision of per-packet signaling and other out-of- complexity. The provision of per-packet signaling and other out-of-
band information (other than sequencing or timing) is undertaken by band information (other than sequencing or timing) is undertaken by
this layer. this layer.
The Timing Layer and the Sequencing Layer provide generic services to The Timing Layer and the Sequencing Layer provide generic services to
the Payload Convergence Layer for all payload types, when required. the Payload Convergence Layer for all payload types that require
them.
5.1 Payload Convergence Layer 5.1 Payload Convergence Layer
5.1.1. Encapsulation 5.1.1. Encapsulation
The primary task of the Payload Convergence Layer is the The primary task of the Payload Convergence Layer is the
encapsulation of the payload in PW-PDUs. The native data units to be encapsulation of the payload in PW-PDUs. The native data units to be
encapsulated may or may not contain a L2 header or L1 overhead. This encapsulated MAY contain a L2 header or L1 overhead. This is service
is service specific. The Payload Convergence header carries the specific. The Payload Convergence header carries the additional
additional information needed to replay the native data units at the information needed to replay the native data units at the CE-bound
CE-bound physical interface. The PW Demultiplexer header is not physical interface. The PW Demultiplexer header is not considered as
considered as part of the PW header. part of the PW header.
Not all the additional information needed to replay the native data Not all the additional information needed to replay the native data
units need to be carried in the PW header of the PW PDUs. Some units need to be carried in the PW header of the PW PDUs. Some
information (e.g. service type of a PW) may be stored as state information (e.g. service type of a PW) MAY be stored as state
information at the destination PE during PW set-up. information at the destination PE during PW set-up.
5.1.2. PWE3 Channel Types 5.1.2. PWE3 Channel Types
The PW Encapsulation Layer and its associated signaling require one The PW Encapsulation Layer and its associated signaling require one
or more of the following types of channels from its underlying PW or more of the following types of channels from its underlying PW
Demultiplexer and PSN Layers: Demultiplexer and PSN Layers:
1. A reliable control channel for signaling line events, status 1. A reliable control channel for signaling line events, status
indications, and, in some exceptional cases, CE-CE events indications, and, in some exceptional cases, CE-CE events
skipping to change at page 23, line 29 skipping to change at page 23, line 30
For example, this capability is needed in [PPPoL2TP] For example, this capability is needed in [PPPoL2TP]
(PPP negotiation has to be split between the two ends of the (PPP negotiation has to be split between the two ends of the
tunnel). PWE3 may also need this type of control channel to tunnel). PWE3 may also need this type of control channel to
provide faithful emulation of complex data-link protocols. provide faithful emulation of complex data-link protocols.
plus one or more data channels with the following characteristics: plus one or more data channels with the following characteristics:
2. A high-priority, unreliable, sequenced channel. A typical use 2. A high-priority, unreliable, sequenced channel. A typical use
is for CE-to-CE signaling. "High priority" may simply be is for CE-to-CE signaling. "High priority" may simply be
indicated via DSCP/EXP bits for priority during transit. indicated via the DSCP bits for IP or the EXP bits for MPLS,
This channel type could also use a bit in the tunnel header giving the packet priority during transit. This channel type
itself to indicate that packets received at the PE should be could also use a bit in the tunnel header itself to indicate
processed with higher priority [RFC2474]. that packets received at the PE SHOULD be processed with higher
priority [RFC2474].
3. A sequenced channel for data traffic that is sensitive to 3. A sequenced channel for data traffic that is sensitive to
packet reordering (one classification for use could be for packet reordering (one classification for use could be for
any non-IP traffic). any non-IP traffic).
4. An un-sequenced channel for data traffic insensitive to packet 4. An un-sequenced channel for data traffic insensitive to packet
order. order.
The data channels (2, 3 and 4 above) should be carried "in band" with The data channels (2, 3 and 4 above) SHOULD be carried "in band" with
one another to as much of a degree as is reasonably possible on a one another to as much of a degree as is reasonably possible on a
PSN. PSN.
Where end-to-end connectivity may be disrupted by address translation Where end-to-end connectivity may be disrupted by address translation
[RFC3022], access-control lists, firewalls etc., there exists the [RFC3022], access-control lists, firewalls etc., there exists the
possibility that the control channel may be able to pass traffic and possibility that the control channel may be able to pass traffic and
set up the PW, but the PW data traffic is blocked by one or more of set-up the PW, but the PW data traffic is blocked by one or more of
these mechanisms. In these cases unless the control channel is also these mechanisms. In these cases unless the control channel is also
carried "in band" the signaling to set-up the PW will not confirm carried "in band" the signaling to set-up the PW will not confirm the
the existence of an end-to-end data path. existence of an end-to-end data path.
In some cases there is a need to synchronize CE events with the data In some cases there is a need to synchronize CE events with the data
carried over a PW. This is especially the case with TDM circuits carried over a PW. This is especially the case with TDM circuits
(e.g., the on-hook/off-hook events in PSTN switches might be carried (e.g., the on-hook/off-hook events in PSTN switches might be carried
over a reliable control channel, whilst the associated bit-stream is over a reliable control channel, whilst the associated bit-stream is
carried over a sequenced data channel). carried over a sequenced data channel).
PWE3 channel types that are not needed by the supported PWs need not PWE3 channel types that are not needed by the supported PWs need not
be included in such an implementation. be included in such an implementation.
5.1.3. Quality of Service Considerations 5.1.3. Quality of Service Considerations
Where possible, it is desirable to employ mechanisms to provide PW Where possible, it is desirable to employ mechanisms to provide PW
Quality of Service (QoS) support over PSNs. Quality of Service (QoS) support over PSNs.
5.2 Payload-independent PW Encapsulation Layers 5.2 Payload-independent PW Encapsulation Layers
Two PWE3 Encapsulation Sub-layers provide common services to all Two PWE3 Encapsulation Sub-layers provide common services to all
payload types: Sequencing and Timing. These services are optional payload types: Sequencing and Timing. These services are optional
and are only used if needed by a particular PW instance. If the and are only used if needed by a particular PW instance. If the
service is not needed, the associated header may be omitted in order service is not needed, the associated header MAY be omitted in order
to conserve processing and network resources. to conserve processing and network resources.
There will be instances where a specific payload type will be There will be instances where a specific payload type will be
required to be transported with or without sequence and/or real-time required to be transported with or without sequence and/or real-time
support. For example, an invariant of frame relay transport is the support. For example, an invariant of frame relay transport is the
preservation of packet order. Some frame-relay applications expect preservation of packet order. Some frame-relay applications expect
in-order delivery, and may not cope with reordering of the frames. in-order delivery, and may not cope with reordering of the frames.
However, where the frame relay service is itself only being used to However, where the frame relay service is itself only being used to
carry IP, it may be desirable to relax that constraint in return for carry IP, it may be desirable to relax that constraint in return for
reduced per-packet processing cost. reduced per-packet processing cost.
The guiding principle is that, where possible, an existing IETF The guiding principle is that, where possible, an existing IETF
protocol should be used to provide these services. Where a suitable protocol SHOULD be used to provide these services. Where a suitable
protocol is not available, the existing protocol should be extended protocol is not available, the existing protocol should be extended
or modified to meet the PWE3 requirements, thereby making that or modified to meet the PWE3 requirements, thereby making that
protocol available for other IETF uses. In the particular case of protocol available for other IETF uses. In the particular case of
timing, more than one general method may be necessary to provide for timing, more than one general method may be necessary to provide for
the full scope of payload timing requirements. the full scope of payload timing requirements.
5.2.1. Sequencing 5.2.1. Sequencing
The sequencing function provides three services: frame ordering, The sequencing function provides three services: frame ordering,
frame duplication detection and frame loss detection. These services frame duplication detection and frame loss detection. These services
allow the emulation of the invariant properties of a physical wire. allow the emulation of the invariant properties of a physical wire.
Support for sequencing depends on the payload type, and may be Support for sequencing depends on the payload type, and MAY be
omitted if not needed. omitted if not needed.
The size of the sequence-number space depends on the speed of the The size of the sequence-number space depends on the speed of the
emulated service, and the maximum time of the transient conditions in emulated service, and the maximum time of the transient conditions in
the PSN. A sequence number space greater than approximately 2^16 may the PSN. A sequence number space greater than 2^16 may therefore be
therefore be needed to prevent the sequence number space wrapping needed to prevent the sequence number space wrapping during the
during the transient. transient.
5.2.1.1 Frame Ordering 5.2.1.1 Frame Ordering
When packets carrying the PW-PDUs traverse a PSN, they may arrive out When packets carrying the PW-PDUs traverse a PSN, they may arrive out
of order at the destination PE. For some services, the frames of order at the destination PE. For some services, the frames
(control frames, data frames, or both control and data frames) must (control frames, data frames, or both control and data frames) MUST
be delivered in order. For such services, some mechanism must be be delivered in order. For such services, some mechanism MUST be
provided for ensuring in-order delivery. Providing a sequence number provided for ensuring in-order delivery. Providing a sequence number
in the sequence sub-layer header for each packet is one possible in the sequence sub-layer header for each packet is one possible
approach to out-of-sequence detection. Alternatively it can be noted approach to out-of-sequence detection. Alternatively it can be noted
that sequencing is a subset of the problem of delivering timed that sequencing is a subset of the problem of delivering timed
packets, and that a single combined mechanism such as [RFC1889] may packets, and that a single combined mechanism such as [RFC1889] MAY
be employed. be employed.
There are two possible misordering strategies: There are two possible misordering strategies:
o Drop misordered PW PDUs. o Drop misordered PW PDUs.
o Try to sort PW PDUs into the correct order. o Try to sort PW PDUs into the correct order.
The choice of strategy will depend on: The choice of strategy will depend on:
skipping to change at page 25, line 43 skipping to change at page 25, line 46
o The speeds of the PW and PSN. o The speeds of the PW and PSN.
o The acceptable delay (since delay must be introduced to o The acceptable delay (since delay must be introduced to
reorder) reorder)
o The incidence of expected misordering. o The incidence of expected misordering.
5.2.1.2 Frame Duplication Detection 5.2.1.2 Frame Duplication Detection
In rare cases, packets traversing a PW may be duplicated by the In rare cases, packets traversing a PW may be duplicated by the
underlying PSN. For some services, frame duplication is not underlying PSN. For some services frame duplication is not
acceptable. For such services, some mechanism must be provided to acceptable. For such services, some mechanism MUST be provided to
ensure that duplicated frames will not be delivered to the ensure that duplicated frames will not be delivered to the
destination CE. The mechanism may or may not be the same as the destination CE. The mechanism MAY be the same as the mechanism used
mechanism used to ensure in-order frame delivery. to ensure in-order frame delivery.
5.2.1.3 Frame Loss Detection 5.2.1.3 Frame Loss Detection
A destination PE can determine whether a frame has been lost by A destination PE can determine whether a frame has been lost by
tracking the sequence numbers of the received PW PDUs. tracking the sequence numbers of the received PW PDUs.
In some instances, a destination PE will have to presume that a PW In some instances, a destination PE will have to presume that a PW
PDU is lost if it fails to arrive within a certain time. If a PW-PDU PDU is lost if it fails to arrive within a certain time. If a PW-PDU
that has been processed as lost subsequently arrives, the destination that has been processed as lost subsequently arrives, the destination
PE must discard it. PE MUST discard it.
5.2.2. Timing 5.2.2. Timing
A number of native services have timing expectations based on the A number of native services have timing expectations based on the
characteristics of the networks that they were designed to travel characteristics of the networks that they were designed to travel
over, and it can be necessary for the emulated service to duplicate over, and it can be necessary for the emulated service to duplicate
these network characteristics as closely as possible, e.g. in these network characteristics as closely as possible, e.g. in
delivering native traffic with the same jitter, bit-rate and timing delivering native traffic with bit-rate, jitter, wander and delay
characteristics as it was sent. characteristics similar to those received at the sending PE.
In such cases, it is necessary for the receiving PE to play out the In such cases, it is necessary for the receiving PE to play out the
native traffic as it was received at the sending PE. This relies on native traffic as it was received at the sending PE. This relies on
either timing information sent between the two PEs, or in some case either timing information sent between the two PEs, or in some case
timing information received from an external reference. timing information received from an external reference.
The Timing Sub-layer must therefore support two timing functions: The Timing Sub-layer must therefore support two timing functions:
clock recovery and timed payload delivery. A particular payload type clock recovery and timed payload delivery. A particular payload type
may require either or both of these services. may require either or both of these services.
5.2.2.1 Clock Recovery 5.2.2.1 Clock Recovery
Clock recovery is the extraction of output transmission bit timing Clock recovery is the extraction of output transmission bit timing
information from the delivered packet stream, and requires a suitable information from the delivered packet stream, and requires a suitable
mechanism. A physical wire provides this naturally, but it is a mechanism. A physical wire carries the timing information natively,
relatively complex task to extract this from a highly jittered source but it is a relatively complex task to extract timing from a highly
such as packet stream. It is therefore desirable that an existing jittered source such as packet stream. It is therefore desirable
real-time protocol such as [RFC1889] be used for this purpose, unless that an existing real-time protocol such as [RFC1889] be used for
it can be shown that this is unsuitable or unnecessary for a this purpose, unless it can be shown that this is unsuitable or
particular payload type. unnecessary for a particular payload type.
5.2.2.2 Timed delivery 5.2.2.2 Timed delivery
Timed delivery is the delivery of non-contiguous PW PDUs to the PW Timed delivery is the delivery of non-contiguous PW PDUs to the PW
output interface with a constant phase relative to the input output interface with a constant phase relative to the input
interface. The timing of the delivery may be relative to a clock interface. The timing of the delivery may be relative to a clock
derived from the packet stream received over the PSN clock recovery, derived from the packet stream received over the PSN clock recovery,
or with reference to an external clock. or with reference to an external clock.
5.3 Fragmentation 5.3 Fragmentation
A payload would normally be relayed across the PW as a single unit. A payload would ideally be relayed across the PW as a single unit.
However, there will be cases where the combined size of the payload However, there will be cases where the combined size of the payload
and its associated PWE3 and PSN headers exceeds the PSN path MTU. and its associated PWE3 and PSN headers exceeds the PSN path MTU.
When a packet exceeds the MTU of a given network, fragmentation and When a packet size exceeds the MTU of a given network, fragmentation
reassembly may have to be performed in order for the packet to be and reassembly have to be performed in order for the packet to be
delivered. Since fragmentation and reassembly generally consume a delivered. Since fragmentation and reassembly generally consume a
large amount of network resource as compared to simply switching a considerable network resources as compared to simply switching a
packet in its entirety, efforts should be made to reduce or eliminate packet in its entirety, efforts SHOULD be made to reduce or eliminate
the need for fragmentation and reassembly as much as possible the need for fragmentation and reassembly throughout a network to the
throughout a network. Of particular concern for fragmentation and extent possible. Of particular concern for fragmentation and
reassembly are aggregation points where large numbers of pseudowires reassembly are aggregation points where large numbers of PWs are
are processed (e.g. at the PE). processed (e.g. at the PE).
Ideally, the equipment originating the traffic being sent over the PW Ideally, the equipment originating the traffic being sent over the PW
will be configured to have adaptive measures (e.g. [RFC1191], will be configured to have adaptive measures (e.g. [RFC1191],
[RFC1981]) in place such that it never sends a packet that must be [RFC1981]) in place that ensure that packets that need to be
fragmented. When this fails, the point closest to the sending host fragmented are not sent. When this fails, the point closest to the
with fragmentation and reassembly capabilities should attempt to sending host with fragmentation and reassembly capabilities SHOULD
reduce the size of packets further into the network. Thus, in the attempt to reduce the size of packets to satisfy the PSN MTU. Thus,
reference model for PWE3 [Figure 3] fragmentation should first be in the reference model for PWE3 [Figure 3] fragmentation SHOULD first
performed at the CE if at all possible. If and only if the CE cannot be performed at the CE if at all possible. If and only if the CE
adhere to an acceptable MTU size for the PW should the PE attempt its cannot adhere to an acceptable MTU size for the PW should the PE
own fragmentation method. attempt its own fragmentation method.
In cases where MTU management fails to limit the payload to a size In cases where MTU management fails to limit the payload to a size
suitable for transmission of the PW, the PE may fall back to either a suitable for transmission of the PW, the PE MAY fall back to either a
generic PW fragmentation method, or, if available the fragmentation generic PW fragmentation method, or, if available the fragmentation
service of the underlying PSN. service of the underlying PSN.
It is acceptable for a PE implementation to not support It is acceptable for a PE implementation not to support
fragmentation. A PE that does not support fragmentation will drop fragmentation. A PE that does not support fragmentation will drop
packets that exceed the PSN MTU, and the management plane of the packets that exceed the PSN MTU, and the management plane of the
encapsulating PE may be notified. encapsulating PE MAY be notified.
If the length of a L2/L1 frame, restored from a PW PDU, exceeds the If the length of a L2/L1 frame, restored from a PW PDU, exceeds the
MTU of the destination PWES, it must be dropped. In this case, the MTU of the destination PWES, it MUST be dropped. In this case, the
management plane of the destination PE may be notified. management plane of the destination PE MAY be notified.
5.4 Instantiation of the Protocol Layers 5.4 Instantiation of the Protocol Layers
This document does not address the detailed mapping of the Protocol This document does not address the detailed mapping of the Protocol
Layering model to existing or future IETF standards. The Layering model to existing or future IETF standards. The
instantiation of the logical Protocol Layering model is shown in instantiation of the logical Protocol Layering model is shown in
Figure 9. Figure 9.
5.4.1. PWE3 over an IP PSN 5.4.1. PWE3 over an IP PSN
The protocol definition of PWE3 over an IP PSN should employ existing The protocol definition of PWE3 over an IP PSN SHOULD employ existing
IETF protocols where possible. IETF protocols where possible.
+---------------------+ +-------------------------+ +---------------------+ +-------------------------+
| Payload |------------->| Raw payload if possible | | Payload |------------->| Raw payload if possible |
/=====================\ +-------------------------+ /=====================\ +-------------------------+
H Payload Convergence H------------->| As Needed | H Payload Convergence H------------->| As Needed |
H---------------------H +-------------------------+ H---------------------H +-------------------------+
H Timing H----------+-->| RTP | H Timing H----------+-->| RTP |
H---------------------H / +-------------+ | H---------------------H / +-------------+ |
H Sequencing H----one of | | H Sequencing H----one of | |
\=====================/ \ | +-----------+ \=====================/ \ | +-----------+
| PW Demultiplexer |----------+-->| L2TP, MPLS etc. | | PW Demultiplexer |----------+-->| L2TP, MPLS etc. |
+---------------------+ +-------------------------+ +---------------------+ +-------------------------+
| PSN Convergence |------------->| Not needed | | PSN Convergence |------------->| Not needed |
+---------------------+ +-------------------------+ +---------------------+ +-------------------------+
| PSN |------------->| IP | | PSN |------------->| IP |
+---------------------+ +-------------------------+ +---------------------+ +-------------------------+
| MAC/Data-link |------------->| MAC/Data-link | | Data-link |------------->| Data-link |
+---------------------+ +-------------------------+ +---------------------+ +-------------------------+
| Physical |------------->| Physical | | Physical |------------->| Physical |
+---------------------+ +-------------------------+ +---------------------+ +-------------------------+
Figure 10: PWE3 over an IP PSN Figure 10: PWE3 over an IP PSN
Figure 10 shows the protocol layering for PWE3 over an IP PSN. As a Figure 10 shows the protocol layering for PWE3 over an IP PSN. As a
rule, the payload should be carried as received from the NSP, with rule, the payload SHOULD be carried as received from the NSP, with
the Payload Convergence Layer provided when needed. (It is accepted the Payload Convergence Layer provided when needed. (It is accepted
that there may sometimes be good reason not to follow this rule, but that there MAY sometimes be good reason not to follow this rule, but
the exceptional circumstances need to be documented in the the exceptional circumstances need to be documented in the
Encapsulation Layer definition for that payload type). Encapsulation Layer definition for that payload type).
Where appropriate, timing is provided by RTP [RFC1889], which when Where appropriate, timing is provided by RTP [RFC1889], which when
used also provides a sequencing service. PW Demultiplexing may be used also provides a sequencing service. PW Demultiplexing may be
provided by a number of existing IETF tunnel protocols. Some of provided by a number of existing IETF tunnel protocols. Some of
these tunnel protocols provide an optional sequencing service. these tunnel protocols provide an optional sequencing service.
(Sequencing is provided either by RTP, or by the PW Demultiplexer (Sequencing is provided either by RTP, or by the PW Demultiplexer
Layer, but not both). A PSN Convergence Layer is not needed, because Layer, but not both). A PSN Convergence Layer is not needed, because
all the tunnel protocols shown above are designed to operate directly all the tunnel protocols shown above are designed to operate directly
skipping to change at page 29, line 26 skipping to change at page 29, line 26
H Timing H------------------------+ H Timing H------------------------+
H---------------------H | | H---------------------H | |
H Sequencing H-----| | H Sequencing H-----| |
\=====================/ | | \=====================/ | |
| PW Demultiplexer |---+ | v | PW Demultiplexer |---+ | v
+---------------------+ | | +--------------------------------+ +---------------------+ | | +--------------------------------+
| PSN Convergence |-----| . . | PSN Convergence |-----| . .
+---------------------+ | | . RTP . +---------------------+ | | . RTP .
| PSN |-+ | | | | | PSN |-+ | | | |
+---------------------+ | | | +--------------------------------+ +---------------------+ | | | +--------------------------------+
| MAC/Data-link | | | +->| Flags, Frag, Len, Seq #, etc | | Data-link | | | +->| Flags, Frag, Len, Seq #, etc |
+---------------------+ | | +--------------------------------+ +---------------------+ | | +--------------------------------+
| Physical | | +--->| Inner Label | | Physical | | +--->| PW Label |
+---------------------+ | +--------------------------------+ +---------------------+ | +--------------------------------+
+----->| Outer Label or MPLS-in-IP encap| +----->| Outer Label or MPLS-in-IP encap|
+--------------------------------+ +--------------------------------+
Figure 11: PWE3 over an MPLS PSN using a control word Figure 11: PWE3 over an MPLS PSN using a control word
Figure 11 shows the protocol layering for PWE3 over an MPLS PSN. An Figure 11 shows the protocol layering for PWE3 over an MPLS PSN. An
inner MPLS label is used to provide the PW demultiplexing function. inner MPLS label is used to provide the PW demultiplexing function.
A control word is used to carry most of the information needed by the A control word is used to carry most of the information needed by the
PWE3 Encapsulation Layer and the PSN Convergence Layer in a compact PWE3 Encapsulation Layer and the PSN Convergence Layer in a compact
skipping to change at page 30, line 7 skipping to change at page 30, line 7
in MPLS to correctly pass over an Ethernet data-link, a length in MPLS to correctly pass over an Ethernet data-link, a length
correction field is needed in the control word. As with an IP PSN, correction field is needed in the control word. As with an IP PSN,
where appropriate, timing is provided by RTP [RFC1889]. where appropriate, timing is provided by RTP [RFC1889].
In some networks it may be necessary to carry PWE3 over MPLS over IP. In some networks it may be necessary to carry PWE3 over MPLS over IP.
In these circumstances, the PW is encapsulated for carriage over MPLS In these circumstances, the PW is encapsulated for carriage over MPLS
as described in this section, and then a method of carrying MPLS over as described in this section, and then a method of carrying MPLS over
an IP PSN (such as GRE [RFC2784], [RFC2890]) is applied to the an IP PSN (such as GRE [RFC2784], [RFC2890]) is applied to the
resultant PW-PDU. resultant PW-PDU.
5.4.3. PW over MPLS Generic Control Word
The PW set-up protocol determines whether a particular PW uses a
control word. When a control word is used, it MUST have the
following form:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PID | Flags |FRG| Length | Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 12 - MPLS Generic Control Word
The meaning of the fields of the MPLS Generic Control Word (Figure
12) is as follows:
PID (bits 0 to 3):
In an environment in which all PWs use the control word,
the payload type of an MPLS packet can be determined by
inspecting the first four bits of the longword, which
follows the bottom of the label stack. A value of 0
indicates "pseudowire", 4 indicates IPv4, 6 indicates IPv6.
Flags (bits 4 to 7):
These bits are available for per payload signaling. Their
definition is encapsulation specific.
FRG (bits 8 and 9):
These bits are used when fragmenting a PW payload. Their use
is defined in [FRAG].
Length (bits 10 to 15):
The length field is used to determine the size of a PW
payload that might have been padded to the minimum Ethernet
MAC frame size during its transit across the PSN. If the
MPLS payload (defined as the CW + the PW payload + any
additional PW headers is less than 46 bytes, the length MUST
be set to the length of the MPLS payload. If the MPLS
payload is between 46 bytes and 63 bytes the implementation
MAY either set to the length to the length of the MPLS
payload, or it MAY set it to 0. If the length of the MPLS
payload is greater than 63 bytes the length MUST be set to 0.
Sequence number (Bit 16 to 31):
If the sequence number is not used, it is set to zero by
the sender and ignored by the receiver. Otherwise it
specifies the sequence number of a packet. A circular list
of sequence numbers is used. A sequence number takes a value
from 1 to 65535 (2**16-1).
6. PW Demultiplexer Layer and PSN Requirements 6. PW Demultiplexer Layer and PSN Requirements
PWE3 places three service requirements on the protocol layers used to PWE3 places three service requirements on the protocol layers used to
carry it across the PSN: carry it across the PSN:
o Multiplexing o Multiplexing
o Fragmentation o Fragmentation
o Length and Delivery o Length and Delivery
6.1 Multiplexing 6.1 Multiplexing
The purpose of the PW Demultiplexer Layer is to allow multiple PWs to The purpose of the PW Demultiplexer Layer is to allow multiple PWs to
be carried in a single tunnel. This minimizes complexity and be carried in a single tunnel. This minimizes complexity and
conserves resources. conserves resources.
Some types of native service are capable of grouping multiple Some types of native service are capable of grouping multiple
circuits into a "trunk", e.g. multiple ATM VCs in a VP, multiple circuits into a "trunk", e.g. multiple ATM VCs in a VP, multiple
Ethernet VLANs on a physical media, or multiple DS0 services within a Ethernet VLANs on a physical media, or multiple DS0 services within a
T1 or E1. A PW may interconnect two end-trunks. That trunk would T1 or E1. A PW MAY interconnect two end-trunks. That trunk would
have a single multiplexing value. have a single multiplexing identifier.
6.2 Fragmentation 6.2 Fragmentation
If the PSN provides a fragmentation and reassembly service of If the PSN provides a fragmentation and reassembly service of
adequate performance, it MAY be used to obtain an effective MTU that adequate performance, it MAY be used to obtain an effective MTU that
is large enough to transport the PW PDUs. However, if the PSN does is large enough to transport the PW PDUs. See Section 5.3 for a full
not offer an adequate service, and fragmentation at the PE cannot be discussion of the PW fragmentation issues.
avoided by any other means, then a PW-specific fragmentation method
may be utilized here. See Section 5.3 for more details.
6.3 Length and Delivery 6.3 Length and Delivery
PDU delivery to the egress PE is the function of the PSN Layer. PDU delivery to the egress PE is the function of the PSN Layer.
If the underlying PSN does not provide all the information necessary If the underlying PSN does not provide all the information necessary
to determine the length of a PW-PDU, the Encapsulation Layer will to determine the length of a PW-PDU, the Encapsulation Layer MUST
provide it. provide it.
6.4 PW-PDU Validation 6.4 PW-PDU Validation
It is a common practice to use a CRC or similar mechanism to assure It is a common practice to use an error detection mechanism such as a
end-to-end integrity of frames. The PW service-specific mechanisms CRC or similar mechanism to assure end-to-end integrity of frames.
MUST define whether the packet's checksum shall be preserved across
the PW or be removed from PE bound PDUs and then be re-calculated for The PW service-specific mechanisms MUST define whether the packet's
insertion in CE bound data. checksum shall be preserved across the PW, or be removed from PE-
bound PDUs and then be re-calculated for insertion in CE-bound data.
The former approach saves work, while the latter saves bandwidth. For The former approach saves work, while the latter saves bandwidth. For
a given implementation the choice may be dictated by hardware a given implementation the choice may be dictated by hardware
restrictions. restrictions, which may not allow the preservation of the checksum.
For protocols such as ATM and FR, the scope of the checksum is For protocols such as ATM and FR, the scope of the checksum is
restricted to a single link. This is because the circuit identifiers restricted to a single link. This is because the circuit identifiers
(e.g. FR DLCI or ATM VPI/VCI) have only local significance and are (e.g. FR DLCI or ATM VPI/VCI) have only local significance and are
changed on each hop or span. If the circuit identifier (and thus changed on each hop or span. If the circuit identifier (and thus
checksum) were going to change as a part of the PW emulation, it checksum) were going to change as a part of the PW emulation, it
would be more efficient to strip and re-calculate the checksum. would be more efficient to strip and re-calculate the checksum.
The service specific document for each protocol must describe the The service specific document for each protocol MUST describe the
validation scheme to be used. validation scheme to be used.
6.5 Congestion Considerations 6.5 Congestion Considerations
The PSN carrying the PW may be subject to congestion. The congestion The PSN carrying the PW may be subject to congestion. The congestion
characteristics will vary with the PSN type, the network architecture characteristics will vary with the PSN type, the network architecture
and configuration, and the loading of the PSN. and configuration, and the loading of the PSN.
Each service specific document will have to specify whether it needs Where the traffic carried over the PW is known to be TCP friendly
an appropriate mechanism for operating in the presence of this (by, for example, packet inspection), packet discard in the PSN will
congestion, including methods of mapping between its native trigger the necessary reduction in offered load, and no additional
congestion reporting and avoidance mechanisms, and those provided by congestion avoidance action is necessary.
the PW.
If the PW is operating over a PSN that provides enhanced delivery,
the PEs SHOULD monitor packet loss to ensure that the service that
was requested is actually being delivered. If it is not, then the PE
SHOULD assume that the PSN is providing a best-effort service, and
SHOULD use the best-effort service congestion avoidance measures
described below.
If best-effort service is being used and the trafic is not known to
be TCP friendly, the PEs SHOULD monitor packet loss to ensure that
the packet loss rate is within acceptable parameters. Packet loss is
considered acceptable if a TCP flow across the same network path and
experiencing the same network conditions would achieve an average
throughput, measured on a reasonable timescale, that is not less than
the PW flow is achieving. This condition can be satisfied by
implementing a rate-limiting measure in the NSP, or by shutting down
one or more PWs. The choice of which approach to use depends upon
the type of traffic being carried. Where congestion is avoided by
shutting down a PW, a suitable mechanism MUST be provided to prevent
it immediately returning to service, causing a series of congestion
pulses.
The comparison to TCP cannot be specified exactly, but is intended as
an "order-of-magnitude" comparison in timescale and throughput. The
timescale on which TCP throughput is measured is the round-trip time
of the connection. In essence, this requirement states that it is not
acceptable to deploy an application (using PWE3 or any other
transport protocol) on the best-effort Internet which consumes
bandwidth arbitrarily and does not compete fairly with TCP within an
order of magnitude. One method of determining an acceptable PW
bandwidth is described in [TFRC].
7. Control Plane 7. Control Plane
This section describes PWE3 control plane services. This section describes PWE3 control plane services.
7.1 Set-up or Teardown of Pseudo-Wires 7.1 Set-up or Teardown of Pseudo-Wires
A PW must be set up before an emulated service can be established, A PW MUST be set up before an emulated service can be established,
and must be torn down when an emulated service is no longer needed. and MUST be torn down when an emulated service is no longer needed.
Set up or teardown of a PW can be triggered by a CLI command, from Set up or teardown of a PW can be triggered by an operator command,
the management plane of a PE, by signaling (i.e., set-up or teardown) from the management plane of a PE, by signaling (i.e., set-up or
of a PWES, e.g., an ATM SVC, or by an auto-discovery mechanism. teardown) of a PWES, e.g., an ATM SVC, or by an auto-discovery
mechanism.
During the set-up process, the PEs need to exchange some information During the set-up process, the PEs need to exchange some information
(e.g. learn each others' capabilities). The tunnel signalling (e.g. learn each other's capabilities). The tunnel signaling
protocol may be extended to provide mechanisms to enable the PEs to protocol MAY be extended to provide mechanisms to enable the PEs to
exchange all necessary information on behalf of the PW. exchange all necessary information on behalf of the PW.
Manual configuration of PWs can be considered a special kind of Manual configuration of PWs can be considered a special kind of
signaling, and is allowed. signaling, and is allowed.
7.2 Status Monitoring 7.2 Status Monitoring
Some native services have mechanisms for status monitoring. For Some native services have mechanisms for status monitoring. For
example, ATM supports OAM for this purpose. For such services, the example, ATM supports OAM for this purpose. For such services, the
corresponding emulated services must specify how to perform status corresponding emulated services MUST specify how to perform status
monitoring. monitoring.
7.3 Notification of Pseudo-wire Status Changes 7.3 Notification of Pseudo-wire Status Changes
7.3.1. Pseudo-wire Up/Down Notification 7.3.1. Pseudo-wire Up/Down Notification
If a native service requires bi-directional connectivity, the If a native service REQUIRES bi-directional connectivity, the
corresponding emulated service can only be signaled up when the corresponding emulated service can only be signaled as being up when
associated PWs, and PSN tunnels if any, are functional in both the associated PWs, and PSN tunnels if any, are functional in both
directions. directions.
Because the two CEs of an emulated service are not adjacent, a Because the two CEs of an emulated service are not adjacent, a
failure may occur at a place such that one or both physical links failure may occur at a place such that one or both physical links
between the CEs and PEs remain up. For example, in Figure 2, if the between the CEs and PEs remain up. For example, in Figure 2, if the
physical link between CE1 and PE1 fails, the physical link between physical link between CE1 and PE1 fails, the physical link between
CE2 and PE2 will not be affected and will remain up. Unless CE2 is CE2 and PE2 will not be affected and will remain up. Unless CE2 is
notified about the remote failure, it will continue to send traffic notified about the remote failure, it will continue to send traffic
over the emulated service to CE1. Such traffic will be discarded at over the emulated service to CE1. Such traffic will be discarded at
PE1. Some native services have failure notification so that when the PE1. Some native services have failure notification so that when the
services fail, both CEs will be notified. For such native services, services fail, both CEs will be notified. For such native services,
the corresponding PWE3 service must provide a failure notification the corresponding PWE3 service MUST provide a failure notification
mechanism. mechanism.
Similarly, if a native service has notification mechanisms so that Similarly, if a native service has notification mechanisms so that
when a network failure is fixed, all the affected services will when a network failure is fixed, all the affected services will
change status from "Down" to "Up", the corresponding emulated service change status from "Down" to "Up", the corresponding emulated service
must provide a similar mechanism for doing so. MUST provide a similar mechanism for doing so.
These mechanisms may already be built into the tunneling protocol. These mechanisms may already be built into the tunneling protocol.
For example, the L2TP control protocol [RFC2661] [L2TPv3] has this For example, the L2TP control protocol [RFC2661] [L2TPv3] has this
capability and LDP has the ability to withdraw the corresponding MPLS capability and LDP has the ability to withdraw the corresponding MPLS
label. label.
7.3.2. Misconnection and Payload Type Mismatch 7.3.2. Misconnection and Payload Type Mismatch
With PWE3, misconnection and payload type mismatch can occur. If a With PWE3, misconnection and payload type mismatch can occur. If a
misconnection occurs it can breach the integrity of the system. If a misconnection occurs it can breach the integrity of the system. If a
skipping to change at page 33, line 30 skipping to change at page 35, line 11
A PW can incur packet loss, corruption, and out-of-order delivery on A PW can incur packet loss, corruption, and out-of-order delivery on
the PSN path between the PEs. This can impact the working condition the PSN path between the PEs. This can impact the working condition
of an emulated service. For some payload types, packet loss, of an emulated service. For some payload types, packet loss,
corruption, and out-of-order delivery can be mapped to either a bit corruption, and out-of-order delivery can be mapped to either a bit
error burst, or loss of carrier on the PW. If a native service has error burst, or loss of carrier on the PW. If a native service has
some mechanism to deal with bit error, the corresponding PWE3 service some mechanism to deal with bit error, the corresponding PWE3 service
should provide a similar mechanism. should provide a similar mechanism.
7.3.4. Other Status Notification 7.3.4. Other Status Notification
A PWE3 approach may provide a mechanism for other status A PWE3 approach MAY provide a mechanism for other status
notification, if any. notification, if any are needed.
7.3.5. Collective Status Notification 7.3.5. Collective Status Notification
Status of a group of emulated services may be affected identically by Status of a group of emulated services may be affected identically by
a single network incident. For example, when the physical link (or a single network incident. For example, when the physical link (or
sub-network) between a CE and a PE fails, all the emulated services sub-network) between a CE and a PE fails, all the emulated services
that go through that link (or sub-network) will fail. It is likely that go through that link (or sub-network) will fail. It is likely
that there exists a group of emulated services that all terminate at that there exists a group of emulated services that all terminate at
a remote CE. There may also be multiple such CEs affected by the a remote CE. There may also be multiple such CEs affected by the
failure. Therefore, it is desirable that a single notification failure. Therefore, it is desirable that a single notification
message be used to notify failure of the whole group of emulated message be used to notify failure of the whole group of emulated
services. services.
A PWE3 approach may provide some mechanism for notifying status A PWE3 approach MAY provide some mechanism for notifying status
changes of a group of emulated circuits. One possible method is to changes of a group of emulated circuits. One possible method is to
associate each emulated service with a group ID when the PW for that associate each emulated service with a group ID when the PW for that
emulated service is set up. Multiple emulated services can then be emulated service is set up. Multiple emulated services can then be
grouped by associating them with the same group ID. In status grouped by associating them with the same group ID. In status
notification, that group ID can be used to refer all the emulated notification, that group ID can be used to refer all the emulated
services in that group. The group ID mechanism should be a mechanism services in that group. The group ID mechanism should be a mechanism
provided by the underlying tunnel signaling protocol. provided by the underlying tunnel signaling protocol.
7.4 Keep-alive 7.4 Keep-alive
If a native service has a keep-alive mechanism, the corresponding If a native service has a keep-alive mechanism, the corresponding
emulated service needs to use a mechanism to propagate this across emulated service MUST provide a mechanism to propagate this across
the PW. An approach following the principle of minimum intervention the PW. An approach following the principle of minimum intervention
would be to transparently transport keep-alive messages over the PW. would be to transparently transport keep-alive messages over the PW.
However, to accurately reproduce the semantics of the native However, to accurately reproduce the semantics of the native
mechanism, some PWs may require an alternative approach, such as mechanism, some PWs MAY REQUIRE an alternative approach, such as
piggy-backing on the PW signaling mechanism. piggy-backing on the PW signaling mechanism.
7.5 Handling Control Messages of the Native Services 7.5 Handling Control Messages of the Native Services
Some native services use control messages for maintaining the Some native services use control messages for circuit maintenance.
circuits. These control messages may be in-band, e.g. Ethernet flow These control messages MAY be in-band, e.g. Ethernet flow control,
control or ATM performance management, or out-of-band, e.g. the ATM performance management, or TDM tone signaling, or they MAY be
signaling VC of an ATM VP. out-of-band, e.g. the signaling VC of an ATM VP, or TDM CCS
signaling.
From the principle of minimum intervention, it is desirable that the From the principle of minimum intervention, it is desirable that the
PEs participate as little as possible in the signaling and PEs participate as little as possible in the signaling and
maintenance of the native services. This principle should not, maintenance of the native services. This principle SHOULD NOT,
however, override the need to satisfactorily emulate the native however, override the need to satisfactorily emulate the native
service. service.
If control messages are passed through, it may be desirable to send If control messages are passed through, it may be desirable to send
them using either a higher priority or a reliable channel provided by them using either a higher priority or a reliable channel provided by
the PW Demultiplexer layer. See PWE3 Channel Types. the PW Demultiplexer layer. See PWE3 Channel Types.
8. Management and Monitoring 8. Management and Monitoring
This section describes the management and monitoring architecture for This section describes the management and monitoring architecture for
PWE3. PWE3.
8.1 Statistics 8.1 Status and Statistics
The PE can tabulate statistics that help monitor the state of the The PE should report the status of the interface and tabulate
network, and to help with measurement of service level agreements statistics that help monitor the state of the network, and to help
(SLAs). Typical counters include: with measurement of service level agreements (SLAs). Typical counters
include:
o Counts of PW-PDUs sent and received, with and without errors. o Counts of PW-PDUs sent and received, with and without errors.
o Counts of sequenced PW-PDUs lost. o Counts of sequenced PW-PDUs lost.
o Counts of service PDUs sent and received over the PSN, with o Counts of service PDUs sent and received over the PSN, with
and without errors (non-TDM). and without errors (non-TDM).
o Service-specific interface counts. o Service-specific interface counts.
o One way delay and delay variation.
These counters would be contained in a PW-specific MIB, and they These counters would be contained in a PW-specific MIB, and they
should not replicate existing MIB counters. should not replicate existing MIB counters.
8.2 PW SNMP MIB Architecture 8.2 PW SNMP MIB Architecture
This section describes the general architecture for SNMP MIBs used to This section describes the general architecture for SNMP MIBs used to
manage PW services and the underlying PSN. The intent here is to manage PW services and the underlying PSN. The intent here is to
provide a clear picture of how all of the pertinent MIBs fit together provide a clear picture of how all of the pertinent MIBs fit together
to form a cohesive management framework for deploying PWE3 services. to form a cohesive management framework for deploying PWE3 services.
8.2.1. MIB Layering 8.2.1. MIB Layering
The SNMP MIBs created for PWE3 should fit the architecture shown in The SNMP MIBs created for PWE3 should fit the architecture shown in
Figure 12. Figure 13.
+-----------+ +-----------+ +-----------+ +-----------+ +-----------+ +-----------+
Service | CEM | | Ethernet | | ATM | Service | CEM | | Ethernet | | ATM |
Layer |Service MIB| |Service MIB| ... |Service MIB| Layer |Service MIB| |Service MIB| ... |Service MIB|
+-----------+ +-----------+ +-----------+ +-----------+ +-----------+ +-----------+
\ | / \ | /
\ | / \ | /
- - - - - - - - - - - - \ - - - | - - - - / - - - - - - - - - - - - - - - - - - - \ - - - | - - - - / - - - - - - -
\ | / \ | /
+-------------------------------------------+ +-------------------------------------------+
skipping to change at page 35, line 45 skipping to change at page 37, line 30
+-----------+ +-----------+ +-----------+ +-----------+
PSN VC |L2TP VC MIB| |MPLS VC MIB| PSN VC |L2TP VC MIB| |MPLS VC MIB|
Layer +-----------+ +-----------+ Layer +-----------+ +-----------+
| | | |
- - - - - - - - - | - - - - - - - - - - - - - - - | - - - - - - - - - - - - | - - - - - - - - - - - - - - - | - - -
| | | |
+-----------+ +-----------+ +-----------+ +-----------+
PSN |L2TP MIB(s)| |MPLS MIB(s)| PSN |L2TP MIB(s)| |MPLS MIB(s)|
Layer +-----------+ +-----------+ Layer +-----------+ +-----------+
Figure 12: Relationship of SNMP MIBs Figure 13: Relationship of SNMP MIBs
Figure 13 shows an example for a TDM PW carried over MPLS. Figure 14 shows an example for a SONET PW carried over MPLS.
+-----------------+ +-----------------+
| SONET MIB | RFC2558 | SONET MIB | RFC2558
+-----------------+ +-----------------+
| |
+-----------------+ +-----------------+
Service |SONET Service MIB| pw-cem-mib Service |SONET Service MIB| pw-cem-mib
Layer +-----------------+ Layer +-----------------+
- - - - - - - - - - | - - - - - - - - - - - - - - - - - - - - - - - - - | - - - - - - - - - - - - - - -
+-----------------+ +-----------------+
skipping to change at page 36, line 27 skipping to change at page 38, line 27
Layer +-----------------+ pw-mib Layer +-----------------+ pw-mib
- - - - - - - - - - | - - - - - - - - - - - - - - - - - - - - - - - - - | - - - - - - - - - - - - - - -
+-----------------+ +-----------------+
PSN VC | MPLS VC MIBS | pw-mpls-mib PSN VC | MPLS VC MIBS | pw-mpls-mib
Layer +-----------------+ Layer +-----------------+
- - - - - - - - - - | - - - - - - - - - - - - - - - - - - - - - - - - - | - - - - - - - - - - - - - - -
+-----------------+ +-----------------+
PSN | MPLS MIBs | mpls-te-mib PSN | MPLS MIBs | mpls-te-mib
Layer +-----------------+ mpls-lsr-mib Layer +-----------------+ mpls-lsr-mib
Figure 13: Service-specific Example for MIBs Figure 14: Service-specific Example for MIBs
Note that there is a separate MIB for each emulated service as well Note that there is a separate MIB for each emulated service as well
as one for each underlying PSN. These MIBs may be used in various as one for each underlying PSN. These MIBs MAY be used in various
combinations as needed. combinations as needed.
8.2.2. Service Layer MIBs 8.2.2. Service Layer MIBs
The first layer is referred to as the Service Layer. It contains The first layer is referred to as the Service Layer. It contains
MIBs for PWE3 services such as Ethernet, ATM, circuits and Frame MIBs for PWE3 services such as Ethernet, ATM, circuits and Frame
Relay. This layer contains those corresponding MIBs used to mate or Relay. This layer contains those corresponding MIBs used to mate or
adapt those emulated services to the underlying services. This adapt those emulated services to the underlying services. This
working group should not produce any MIBs for managing the general working group should not produce any MIBs for managing the general
service; rather, it should produce just those MIBs that are used to service; rather, it should produce just those MIBs that are used to
skipping to change at page 37, line 16 skipping to change at page 39, line 16
The second layer is referred to as the Generic PW Layer. This layer The second layer is referred to as the Generic PW Layer. This layer
is composed of two MIBs: the PWE-TC-MIB [PWTCMIB] and the PWE-MIB is composed of two MIBs: the PWE-TC-MIB [PWTCMIB] and the PWE-MIB
[PWMIB]. These MIBs are responsible for providing general PWE3 [PWMIB]. These MIBs are responsible for providing general PWE3
counters and service models used for monitoring and configuration of counters and service models used for monitoring and configuration of
PWE3 services over any supported PSN service. That is, this MIB PWE3 services over any supported PSN service. That is, this MIB
provides a general model of PWE3 abstraction for management purposes. provides a general model of PWE3 abstraction for management purposes.
This MIB is used to interconnect the Service Layer MIBs to the PSN VC This MIB is used to interconnect the Service Layer MIBs to the PSN VC
Layer MIBs. The latter will be described in the next section. This Layer MIBs. The latter will be described in the next section. This
layer also provides the PW-TC-MIB [PWTCMIB]. This MIB contains layer also provides the PW-TC-MIB [PWTCMIB]. This MIB contains
common SMI textual conventions [RFC1902] that may be used by any PW common SMI textual conventions [RFC1902] that MAY be used by any PW
MIB. MIB.
8.2.4. PSN VC Layer MIBs 8.2.4. PSN VC Layer MIBs
The third layer in the PWE3 management architecture is referred to as The third layer in the PWE3 management architecture is referred to as
the PSN VC layer. This layer is comprised of MIBs that are the PSN VC layer. This layer is comprised of MIBs that are
specifically designed to interface general PWE3 services (VCs) onto specifically designed to interface general PWE3 services (VCs) onto
those underlying PSN services. In general this means that the MIB those underlying PSN services. In general this means that the MIB
provides a means with which an operator can map the PW service onto provides a means with which an operator can map the PW service onto
the native PSN service. For example, in the case of MPLS, it is the native PSN service. For example, in the case of MPLS, it is
skipping to change at page 37, line 41 skipping to change at page 39, line 41
working group should produce these MIBs. working group should produce these MIBs.
8.2.5. PSN Layer MIBs 8.2.5. PSN Layer MIBs
The fourth and final layer in the PWE3 management architecture is The fourth and final layer in the PWE3 management architecture is
referred to as the PSN layer. This layer is comprised of those MIBs referred to as the PSN layer. This layer is comprised of those MIBs
that control the PSN service-specific services. For example, in the that control the PSN service-specific services. For example, in the
case of the MPLS [RFC3031] PSN service, the MPLS-LSR-MIB [LSRMIB] and case of the MPLS [RFC3031] PSN service, the MPLS-LSR-MIB [LSRMIB] and
the MPLS-TE-MIB [TEMIB] are used to interface the general PWE3 VC the MPLS-TE-MIB [TEMIB] are used to interface the general PWE3 VC
services onto native MPLS LSPs and/or TE tunnels to carry the services onto native MPLS LSPs and/or TE tunnels to carry the
emulated services. In addition, the MPLS-LDP-MIB [LDPMIB] may be emulated services. In addition, the MPLS-LDP-MIB [LDPMIB] MAY be
used to reveal the MPLS labels that are distributed over the MPLS PSN used to reveal the MPLS labels that are distributed over the MPLS PSN
in order to maintain the PW service. The MIBs in this layer are in order to maintain the PW service. The MIBs in this layer are
produced by other working groups that design and specify the native produced by other working groups that design and specify the native
PSN services. These MIBs should contain the appropriate mechanisms PSN services. These MIBs should contain the appropriate mechanisms
for monitoring and configuring the PSN service such that the emulated for monitoring and configuring the PSN service such that the emulated
PWE3 service will function correctly. PWE3 service will function correctly.
8.3 Connection Verification and Traceroute 8.3 Connection Verification and Traceroute
A connection verification mechanism should be supported by PWs. A connection verification mechanism should be supported by PWs.
Connection verification as well as other alarming mechanisms can Connection verification as well as other alarm mechanisms can alert
alert the operator that a PW has lost its remote connection. The the operator that a PW has lost its remote connection. The opaque
opaque nature of a PW means that it is not possible to specify a nature of a PW means that it is not possible to specify a generic
generic connection verification or traceroute mechanism that passes connection verification or traceroute mechanism that passes this
this status to the CEs over the PW. If connection verification status to the CEs over the PW. If connection verification status of
status of the PW is needed by the CE, it must be mapped to the native the PW is needed by the CE, it MUST be mapped to the native
connection status method. connection status method.
For troubleshooting purposes, it is sometimes desirable to know the For troubleshooting purposes, it is sometimes desirable to know the
exact functional path of a PW between PEs. This is provided by the exact functional path of a PW between PEs. This is provided by the
traceroute service of the underlying PSN. The opaque nature of the traceroute service of the underlying PSN. The opaque nature of the
PW means that this traceroute information is only available within PW means that this traceroute information is only available within
the provider network e.g. at the PEs. the provider network, e.g., at the PEs.
9. IANA considerations 9. IANA considerations
There are no IANA considerations for this document. The control word PID bits need to be assigned by IANA.
10. Security Considerations 10. Security Considerations
PWE3 provides no means of protecting the contents or delivery of the PWE3 provides no means of protecting the contents or delivery of the
native data units. PWE3 may, however, leverage security mechanisms native data units. The use of PWE3 can therefore expose a particular
provided by the PW Demultiplexer or PSN Layers, such as IPSec environment to additional security threats. Assumptions that might be
[RFC2401]. This section addresses the PWE3 vulnerabilities, and the appropriate when all communicating systems are interconnected via a
mechanisms available to protect the emulated native services. point to point or circuit-switched network may no longer hold when
they are interconnected using an emulated wire carried over some
The PW Tunnel End-Point, PW Demultiplexing mechanism, and the types of PSN. It is outside the scope of this specification, to
payloads of the native service are all vulnerable to attack. fully analyze and review the risks of PWE3, particularly as these
risks will depend on the PSN. An example should make the concern
10.1 PW Tunnel End-Point and PW Demultiplexer Security clear. A number of IETF standards employ relatively weak security
mechanisms when communicating nodes are expected to be connected to
Protection mechanisms must be considered for the PW Tunnel end-point the same local area network. The Virtual Router Redundancy Protocol
and PW Demultiplexer mechanism in order to avoid denial-of-service [RFC2338] is one instance. The relatively weak security mechanisms
attacks upon the native service, and to prevent spoofing of the represent a greater vulnerability in an emulated Ethernet connected
native data units. Exploitation of vulnerabilities from within the via a PW.
PSN may be directed to the PW Tunnel end-point so that PW
Demultiplexer and PSN tunnel services are disrupted. Controlling PSN
access to the PW Tunnel end-point may protect against this.
By restricting PW Tunnel end-point access to legitimate remote PE
sources of traffic, the PE may reject traffic that would interfere
with the PW Demultiplexing and PSN tunnel services.
10.2 Validation of PW Encapsulation Exploitation of vulnerabilities from within the PSN may be directed
to the PW Tunnel end-point so that PW Demultiplexer and PSN tunnel
services are disrupted. Controlling PSN access to the PW Tunnel
end-point is one way to protect against this. By restricting PW
Tunnel end-point access to legitimate remote PE sources of traffic,
the PE may reject traffic that would interfere with the PW
Demultiplexing and PSN tunnel services.
Protection mechanisms must address the spoofing of tunneled PW data. Protection mechanisms MUST also address the spoofing of tunneled PW
The validation of traffic addressed to the PW Demultiplexer end-point data. The validation of traffic addressed to the PW Demultiplexer
is paramount in ensuring integrity of PW encapsulation. Security end-point is paramount in ensuring integrity of PW encapsulation.
protocols such as IPSec [RFC2401] may be used by the PW Demultiplexer Security protocols such as IPSec [RFC2401] MAY be used by the PW
Layer in order to maintain the integrity of the PW by authenticating Demultiplexer Layer in order to maintain the integrity of the PW by
data between the PW Demultiplexer End-points. IPSec may provide authenticating data between the PW Demultiplexer End-points. IPSec
authentication, integrity, non-repudiation, and confidentiality of MAY provide authentication, integrity, non-repudiation, and
data transferred between two PEs. It cannot provide the equivalent confidentiality of data transferred between two PEs. It cannot
services to the native service. provide the equivalent services to the native service.
Based on the type of data being transferred, the PW may indicate to Based on the type of data being transferred, the PW MAY indicate to
the PW Demultiplexer Layer that enhanced security services are the PW Demultiplexer Layer that enhanced security services are
required. The PW Demultiplexer Layer may define multiple protection required. The PW Demultiplexer Layer MAY define multiple protection
profiles based on the requirements of the PW emulated service. CE- profiles based on the requirements of the PW emulated service. CE-
to-CE signaling and control events emulated by the PW and some data to-CE signaling and control events emulated by the PW and some data
types may require additional protection mechanisms. Alternatively, types may require additional protection mechanisms. Alternatively,
the PW Demultiplexer Layer may use peer authentication for every PSN the PW Demultiplexer Layer may use peer authentication for every PSN
packet to prevent spoofed native data units from being sent to the packet to prevent spoofed native data units from being sent to the
destination CE. destination CE.
Acknowledgments Acknowledgments
We thank: Sasha Vainshtein for his work on Native Service Processing We thank: Sasha Vainshtein for his work on Native Service Processing
skipping to change at page 39, line 46 skipping to change at page 41, line 44
We also thank: Ron Bonica, Stephen Casner, Durai Chinnaiah, Jayakumar We also thank: Ron Bonica, Stephen Casner, Durai Chinnaiah, Jayakumar
Jayakumar, Ghassem Koleyni, Eric Rosen, John Rutemiller, Scott Jayakumar, Ghassem Koleyni, Eric Rosen, John Rutemiller, Scott
Wainner and David Zelig for their comments and contributions. Wainner and David Zelig for their comments and contributions.
References References
Internet-drafts are works in progress available from Internet-drafts are works in progress available from
<http://www.ietf.org/internet-drafts/> <http://www.ietf.org/internet-drafts/>
[ETSI] EN 300 744 Digital Video Broadcasting (DVB); Framing [DVB] EN 300 744 Digital Video Broadcasting (DVB); Framing
structure, channel coding and modulation for digital structure, channel coding and modulation for digital
terrestrial television (DVB-T), European terrestrial television (DVB-T), European
Telecommunications Standards Institute (ETSI) Telecommunications Standards Institute (ETSI)
[FRAG] Malis and Townsley, "PWE3 Fragmentation and
Reassembly", <draft-ietf-pwe3-fragmentation-00.txt>,
work in progress, October 2002.
[LDP-MIB] Cucchiara, J., Sjostrand, H., and Luciani, J., [LDP-MIB] Cucchiara, J., Sjostrand, H., and Luciani, J.,
"Definitions of Managed Objects for the Multiprotocol "Definitions of Managed Objects for the Multiprotocol
Label Switching, Label Distribution Protocol (LDP)", Label Switching, Label Distribution Protocol (LDP)",
<draft-ietf-mpls-ldp-mib-08.txt>, work in progress, <draft-ietf-mpls-ldp-mib-09.txt>, work in progress,
August 2001. October 2002.
[LSRMIB] Srinivasan et al, "MPLS Label Switch Router Management [LSRMIB] Srinivasan et al, "MPLS Label Switch Router Management
Information Base Using SMIv2", Information Base Using SMIv2",
(draft-ietf-mpls-lsr-mib-08.txt, work in progress, <draft-ietf-mpls-lsr-mib-09.txt>, work in progress,
January 2002. October 2002.
[L2TPv3] Layer Two Tunneling Protocol (Version 3)'L2TPv3', J Lau, [L2TPv3] Layer Two Tunneling Protocol (Version 3)'L2TPv3', J Lau,
et. al. (work in progress). et. al. <draft-ietf-l2tpext-l2tp-base-05.txt>, work
in progress, January 2003.
[PPPoL2TP] PPP Tunneling Using Layer Two Tunneling Protocol, [PPPoL2TP] PPP Tunneling Using Layer Two Tunneling Protocol,
J Lau et al. <draft-ietf-l2tpext-l2tp-ppp-01.txt>, J Lau et al. <draft-ietf-l2tpext-l2tp-ppp-02.txt>,
work in progress. work in progress, June 2002.
[PWMIB] Zelig et al, "Pseudo Wire (PW) Management Information [PWMIB] Zelig et al, "Pseudo Wire (PW) Management Information
Base Using SMIv2", (draft-ietf-pwe3-pw-mib-00.txt), Base Using SMIv2", <draft-ietf-pwe3-pw-mib-00.txt>,
work in progress, June 2002. work in progress, June 2002.
[PWTCMIB] Nadeau et al, "Definitions for Textual Conventions and [PWTCMIB] Nadeau et al, "Definitions for Textual Conventions and
OBJECT-IDENTITIES for Pseudo-Wires Management" OBJECT-IDENTITIES for Pseudo-Wires Management"
(draft-ietf-pwe3-pw-tc-mib-00.txt), work in progress, <draft-ietf-pwe3-pw-tc-mib-00.txt>, work in progress,
June 2002. June 2002.
[PWMPLSMIB] Danenberg et al, "SONET/SDH Circuit Emulation Service [PWMPLSMIB] Danenberg et al, "SONET/SDH Circuit Emulation Service
Over MPLS (CEM) Management Information Base Using Over MPLS (CEM) Management Information Base Using
SMIv2", (draft-ietf-pwe3-cep-mib-00.txt), work in SMIv2", <draft-ietf-pwe3-cep-mib-01.txt>, work in
progress, August 2001. progress, October 2002.
[RFC1191] RFC-1191: Path MTU discovery. J.C. Mogul, S.E. Deering. [RFC1191] RFC-1191: Path MTU discovery. J.C. Mogul, S.E. Deering.
[RFC1889] RFC-1889: RTP: A Transport Protocol for Real-Time [RFC1889] RFC-1889: RTP: A Transport Protocol for Real-Time
Applications. H. Schulzrinne et. al. Applications. H. Schulzrinne et. al.
[RFC1902] RFC-1902: Structure of Management Information for [RFC1902] RFC-1902: Structure of Management Information for
Version 2 of the Simple Network Management Protocol Version 2 of the Simple Network Management Protocol
(SNMPv2), Case et al, January 1996. (SNMPv2), Case et al, January 1996.
[RFC1958] RFC-1958: Architectural Principles of the Internet, [RFC1958] RFC-1958: Architectural Principles of the Internet,
B. Carpenter et al. B. Carpenter et al.
[RFC1981] RFC-1981: Path MTU Discovery for IP version 6. J. McCann, [RFC1981] RFC-1981: Path MTU Discovery for IP version 6. J. McCann,
S. Deering, J.Mogul. S. Deering, J. Mogul.
[RFC2022] RFC-2022: Support for Multicast over UNI 3.0/3.1 based [RFC2022] RFC-2022: Support for Multicast over UNI 3.0/3.1 based
ATM Networks, G. Armitage. ATM Networks, G. Armitage.
[RFC2119] RFC-2119, BCP-14: Key words for use in RFCs to Indicate
Requirement Levels, S. Bradner.
[RFC2338] RFC-2338: Virtual Router Redundancy Protocol,
S. Knight, M. Shand et. al.
[RFC2401] RFC-2401: Security Architecture for the Internet [RFC2401] RFC-2401: Security Architecture for the Internet
Protocol. S. Kent, R. Atkinson. Protocol. S. Kent, R. Atkinson.
[RFC2474] RFC-2474: Definition of the Differentiated Services [RFC2474] RFC-2474: Definition of the Differentiated Services
Field (DS Field) in the IPv4 and IPv6 Headers, Field (DS Field) in the IPv4 and IPv6 Headers,
K. Nichols, et. al. K. Nichols, et. al.
[RFC2661] RFC-2661: Layer Two Tunneling Protocol "L2TP". [RFC2661] RFC-2661: Layer Two Tunneling Protocol "L2TP".
W. Townsley, et. al. W. Townsley, et. al.
skipping to change at page 41, line 32 skipping to change at page 43, line 44
(Traditional NAT). P Srisuresh et al. (Traditional NAT). P Srisuresh et al.
[RFC3031] RFC3031: Multiprotocol Label Switching Architecture, [RFC3031] RFC3031: Multiprotocol Label Switching Architecture,
E. Rosen, January 2001. E. Rosen, January 2001.
[SONETMIB] K. Tesink, "Definitions of Managed Objects for the [SONETMIB] K. Tesink, "Definitions of Managed Objects for the
SONET/SDH Interface Type", RFC2558, March 1999. SONET/SDH Interface Type", RFC2558, March 1999.
[TEMIB] Srinivasan et al, "Traffic Engineering Management [TEMIB] Srinivasan et al, "Traffic Engineering Management
Information Base Using SMIv2", Information Base Using SMIv2",
(draft-ietf-mpls-te-mib-08.txt), work in progress, <draft-ietf-mpls-te-mib-09.txt>, work in progress,
January 2002. November 2002.
[TFRC] M. Handley et al, "TCP Friendly Rate Control (TFRC):
Protocol Specification" <draft-ietf-tsvwg-tfrc-05.txt>,
work in progress, October 2002.
[VPLS] M. Lasserre, "Virtual Private LAN Services over MPLS", [VPLS] M. Lasserre, "Virtual Private LAN Services over MPLS",
draft-lasserre-vkompella-ppvpn-vpls-02.txt, work in <draft-lasserre-vkompella-ppvpn-vpls-03.txt>, work in
progress, June 2002. progress, January 2003.
[XIAO] Xiao et al, "Requirements for Pseudo-Wire Emulation [XIAO] Xiao et al, "Requirements for Pseudo-Wire Emulation
Edge-to-Edge (PWE3)", Edge-to-Edge (PWE3)",
(draft-ietf-pwe3-requirements-03.txt), X Xiao et al. (draft-ietf-pwe3-requirements-04.txt), X Xiao et al.
work in progress, December 2002. work in progress, December 2002.
Editors' Addresses Editors' Addresses
Stewart Bryant Stewart Bryant
Cisco Systems, Cisco Systems,
4, The Square, 4, The Square,
Stockley Park, Stockley Park,
Uxbridge UB11 1BL, Uxbridge UB11 1BL,
United Kingdom. Email: stbryant@cisco.com United Kingdom. Email: stbryant@cisco.com
Prayson Pate Prayson Pate
Overture Networks, Inc. Overture Networks, Inc.
P. O. Box 14864 Airport Boulevard
RTP, NC, USA 27709 Email: prayson.pate@overturenetworks.com Morrisville, NC, USA 27560 Email: prayson.pate@overturenetworks.com
Full copyright statement Full copyright statement
Copyright (C) The Internet Society (2002). Copyright (C) The Internet Society (2002).
All Rights Reserved. All Rights Reserved.
This document and translations of it may be copied and This document and translations of it may be copied and
furnished to others, and derivative works that comment furnished to others, and derivative works that comment
on or otherwise explain it or assist in its implementation on or otherwise explain it or assist in its implementation
may be prepared, copied, published and distributed, in may be prepared, copied, published and distributed, in
 End of changes. 155 change blocks. 
320 lines changed or deleted 414 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/