| < draft-ietf-pwe3-arch-02.txt | draft-ietf-pwe3-arch-03.txt > | |||
|---|---|---|---|---|
| Pseudo-Wire Edge-to-Edge (PWE3) Working Group Stewart Bryant | Pseudo-Wire Edge-to-Edge (PWE3) Working Group Stewart Bryant | |||
| Internet Draft Cisco Systems | Internet Draft Cisco Systems | |||
| Document: <draft-ietf-pwe3-arch-02.txt> | Document: <draft-ietf-pwe3-arch-03.txt> | |||
| Expires: August 2003 Prayson Pate | Expires: December 2003 Prayson Pate | |||
| Overture Networks, Inc. | Overture Networks, Inc. | |||
| Editors | Editors | |||
| February 2003 | June 2003 | |||
| PWE3 Architecture | PWE3 Architecture | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of section 10 of RFC2026. | all provisions of section 10 of RFC2026. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
| skipping to change at page 2, line 12 ¶ | skipping to change at page 2, line 12 ¶ | |||
| framework for pseudo wires (PWs), defines terminology, specifies the | framework for pseudo wires (PWs), defines terminology, specifies the | |||
| various protocol elements and their functions. | various protocol elements and their functions. | |||
| Co-Authors | Co-Authors | |||
| The following are co-authors of this document: | The following are co-authors of this document: | |||
| Thomas K. Johnson Litchfield Communications | Thomas K. Johnson Litchfield Communications | |||
| Kireeti Kompella Juniper Networks, Inc. | Kireeti Kompella Juniper Networks, Inc. | |||
| Andrew G. Malis Vivace Networks | Andrew G. Malis Vivace Networks | |||
| Danny McPherson TCB | ||||
| Thomas D. Nadeau Cisco Systems | Thomas D. Nadeau Cisco Systems | |||
| Tricci So Caspian Networks | Tricci So Caspian Networks | |||
| W. Mark Townsley Cisco Systems | W. Mark Townsley Cisco Systems | |||
| Craig White Level 3 Communications, LLC. | Craig White Level 3 Communications, LLC. | |||
| Lloyd Wood Cisco Systems | Lloyd Wood Cisco Systems | |||
| XiPeng Xiao Redback Networks | XiPeng Xiao Redback Networks | |||
| Conventions used in this document | Conventions used in this document | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| Table of Contents | ||||
| 1. Introduction............................................. 5 | 1. Introduction............................................. 5 | |||
| 1.1 Pseudo Wire Definition............................... 5 | 1.1 Pseudo Wire Definition............................... 5 | |||
| 1.2 PW Service Functionality............................. 6 | 1.2 PW Service Functionality............................. 6 | |||
| 1.3 Non-Goals of this document........................... 6 | 1.3 Non-Goals of this document........................... 6 | |||
| 1.4 Terminology.......................................... 6 | 1.4 Terminology.......................................... 6 | |||
| 2. PWE3 Applicability....................................... 9 | 2. PWE3 Applicability....................................... 9 | |||
| 3. Protocol Layering Model.................................. 9 | 3. Protocol Layering Model.................................. 9 | |||
| 3.1 Protocol Layers...................................... 9 | 3.1 Protocol Layers...................................... 9 | |||
| 3.2 Domain of PWE3....................................... 11 | 3.2 Domain of PWE3....................................... 11 | |||
| 3.3 Payload Types........................................ 11 | 3.3 Payload Types........................................ 11 | |||
| 4. Architecture of Pseudo-wires............................. 14 | 4. Architecture of Pseudo-wires............................. 14 | |||
| 4.1 Network Reference Model.............................. 14 | 4.1 Network Reference Model.............................. 14 | |||
| 4.2 PWE3 Pre-processing.................................. 15 | 4.2 PWE3 Pre-processing.................................. 15 | |||
| 4.3 Maintenance Reference Model.......................... 19 | 4.3 Maintenance Reference Model.......................... 19 | |||
| 4.4 Protocol Stack Reference Model....................... 19 | 4.4 Protocol Stack Reference Model....................... 19 | |||
| 4.5 Pre-processing Extension to Protocol Stack Reference. | 4.5 Pre-processing Extension to Protocol Stack Reference | |||
| Model................................................ 20 | Model................................................ 20 | |||
| 5. PW Encapsulation......................................... 21 | 5. PW Encapsulation......................................... 21 | |||
| 5.1 Payload Convergence Layer............................ 22 | 5.1 Payload Convergence Layer............................ 22 | |||
| 5.2 Payload-independent PW Encapsulation Layers.......... 24 | 5.2 Payload-independent PW Encapsulation Layers.......... 24 | |||
| 5.3 Fragmentation........................................ 27 | 5.3 Fragmentation........................................ 27 | |||
| 5.4 Instantiation of the Protocol Layers................. 27 | 5.4 Instantiation of the Protocol Layers................. 27 | |||
| 6. PW Demultiplexer Layer and PSN Requirements.............. 31 | 6. PW Demultiplexer Layer and PSN Requirements.............. 32 | |||
| 6.1 Multiplexing......................................... 31 | 6.1 Multiplexing......................................... 32 | |||
| 6.2 Fragmentation........................................ 31 | 6.2 Fragmentation........................................ 32 | |||
| 6.3 Length and Delivery.................................. 31 | 6.3 Length and Delivery.................................. 32 | |||
| 6.4 PW-PDU Validation.................................... 31 | 6.4 PW-PDU Validation.................................... 33 | |||
| 6.5 Congestion Considerations............................ 32 | 6.5 Congestion Considerations............................ 33 | |||
| 7. Control Plane............................................ 33 | 7. Control Plane............................................ 34 | |||
| 7.1 Set-up or Teardown of Pseudo-Wires................... 33 | 7.1 Set-up or Teardown of Pseudo-Wires................... 34 | |||
| 7.2 Status Monitoring.................................... 33 | 7.2 Status Monitoring.................................... 34 | |||
| 7.3 Notification of Pseudo-wire Status Changes........... 34 | 7.3 Notification of Pseudo-wire Status Changes........... 35 | |||
| 7.4 Keep-alive........................................... 35 | 7.4 Keep-alive........................................... 36 | |||
| 7.5 Handling Control Messages of the Native Services..... 35 | 7.5 Handling Control Messages of the Native Services..... 36 | |||
| 8. Management and Monitoring................................. 36 | 8. Management and Monitoring................................. 37 | |||
| 8.1 Status and Statistics................................ 36 | 8.1 Status and Statistics................................ 37 | |||
| 8.2 PW SNMP MIB Architecture............................. 36 | 8.2 PW SNMP MIB Architecture............................. 37 | |||
| 8.3 Connection Verification and Traceroute................ 40 | 8.3 Connection Verification and Traceroute................ 41 | |||
| 9. IANA considerations...................................... 40 | 9. IANA considerations...................................... 41 | |||
| 10. Security Considerations................................. 40 | 10. Security Considerations................................. 41 | |||
| 1. Introduction | 1. Introduction | |||
| This document describes an architecture for Pseudo Wire Emulation | This document describes an architecture for Pseudo Wire Emulation | |||
| Edge-to-Edge (PWE3) in support of [XIAO]. It discusses the emulation | Edge-to-Edge (PWE3) in support of [XIAO]. It discusses the emulation | |||
| of services (such as Frame Relay, ATM, Ethernet, TDM and SONET/SDH) | of services (such as Frame Relay, ATM, Ethernet, TDM and SONET/SDH) | |||
| over packet switched networks (PSNs) using IP or MPLS. It presents | over packet switched networks (PSNs) using IP or MPLS. It presents | |||
| the architectural framework for pseudo wires (PWs), defines | the architectural framework for pseudo wires (PWs), defines | |||
| terminology, specifies the various protocol elements and their | terminology, specifies the various protocol elements and their | |||
| functions. | functions. | |||
| skipping to change at page 28, line 13 ¶ | skipping to change at page 28, line 13 ¶ | |||
| Figure 9. | Figure 9. | |||
| 5.4.1. PWE3 over an IP PSN | 5.4.1. PWE3 over an IP PSN | |||
| The protocol definition of PWE3 over an IP PSN SHOULD employ existing | The protocol definition of PWE3 over an IP PSN SHOULD employ existing | |||
| IETF protocols where possible. | IETF protocols where possible. | |||
| +---------------------+ +-------------------------+ | +---------------------+ +-------------------------+ | |||
| | Payload |------------->| Raw payload if possible | | | Payload |------------->| Raw payload if possible | | |||
| /=====================\ +-------------------------+ | /=====================\ +-------------------------+ | |||
| H Payload Convergence H------------->| As Needed | | H Payload Convergence H-----------+->| As Needed | | |||
| H---------------------H +-------------------------+ | H---------------------H / +-------------------------+ | |||
| H Timing H----------+-->| RTP | | H Timing H---------/--->| RTP | | |||
| H---------------------H / +-------------+ | | H---------------------H / +-------------+ | | |||
| H Sequencing H----one of | | | H Sequencing H----one of | | | |||
| \=====================/ \ | +-----------+ | \=====================/ \ | +-----------+ | |||
| | PW Demultiplexer |----------+-->| L2TP, MPLS etc. | | | PW Demultiplexer |---------+--->| L2TP, MPLS etc. | | |||
| +---------------------+ +-------------------------+ | +---------------------+ +-------------------------+ | |||
| | PSN Convergence |------------->| Not needed | | | PSN Convergence |------------->| Not needed | | |||
| +---------------------+ +-------------------------+ | +---------------------+ +-------------------------+ | |||
| | PSN |------------->| IP | | | PSN |------------->| IP | | |||
| +---------------------+ +-------------------------+ | +---------------------+ +-------------------------+ | |||
| | Data-link |------------->| Data-link | | | Data-link |------------->| Data-link | | |||
| +---------------------+ +-------------------------+ | +---------------------+ +-------------------------+ | |||
| | Physical |------------->| Physical | | | Physical |------------->| Physical | | |||
| +---------------------+ +-------------------------+ | +---------------------+ +-------------------------+ | |||
| Figure 10: PWE3 over an IP PSN | Figure 10: PWE3 over an IP PSN | |||
| Figure 10 shows the protocol layering for PWE3 over an IP PSN. As a | Figure 10 shows the protocol layering for PWE3 over an IP PSN. As a | |||
| rule, the payload SHOULD be carried as received from the NSP, with | rule, the payload SHOULD be carried as received from the NSP, with | |||
| the Payload Convergence Layer provided when needed. (It is accepted | the Payload Convergence Layer provided when needed. (It is accepted | |||
| that there MAY sometimes be good reason not to follow this rule, but | that there MAY sometimes be good reason not to follow this rule, but | |||
| the exceptional circumstances need to be documented in the | the exceptional circumstances need to be documented in the | |||
| Encapsulation Layer definition for that payload type). | Encapsulation Layer definition for that payload type). | |||
| Where appropriate, timing is provided by RTP [RFC1889], which when | Where appropriate, timing is provided by RTP [RFC1889], which when | |||
| used also provides a sequencing service. PW Demultiplexing may be | used also provides a sequencing service. PW Demultiplexing may be | |||
| skipping to change at page 29, line 13 ¶ | skipping to change at page 29, line 13 ¶ | |||
| protocol architecture of this section. | protocol architecture of this section. | |||
| 5.4.2. PWE3 over an MPLS PSN | 5.4.2. PWE3 over an MPLS PSN | |||
| The MPLS ethos places importance on wire efficiency. By using a | The MPLS ethos places importance on wire efficiency. By using a | |||
| control word, some components of the PWE3 protocol layers can be | control word, some components of the PWE3 protocol layers can be | |||
| compressed to increase this efficiency. | compressed to increase this efficiency. | |||
| +---------------------+ | +---------------------+ | |||
| | Payload | | | Payload | | |||
| /=====================\ | /=====================\ +--------------------------------+ | |||
| H Payload Convergence H-----+ | H Payload Convergence H--+------>| Flags, Frag, Len, Seq #, etc | | |||
| H---------------------H | | H---------------------H | +--------------------------------+ | |||
| H Timing H------------------------+ | H Timing H--------->| RTP | | |||
| H---------------------H | | | H---------------------H | +--------------------------------+ | |||
| H Sequencing H-----| | | H Sequencing H--+ | MPLS Payload Type Ident | | |||
| \=====================/ | | | \=====================/ | +--------------------------------+ | |||
| | PW Demultiplexer |---+ | v | | PW Demultiplexer |--------->| PW Label | | |||
| +---------------------+ | | +--------------------------------+ | +---------------------+ | +--------------------------------+ | |||
| | PSN Convergence |-----| . . | | PSN Convergence |--+ +--->| Outer Label or MPLS-in-IP encap| | |||
| +---------------------+ | | . RTP . | +---------------------+ | +--------------------------------+ | |||
| | PSN |-+ | | | | | | PSN |-----+ | |||
| +---------------------+ | | | +--------------------------------+ | +---------------------+ | |||
| | Data-link | | | +->| Flags, Frag, Len, Seq #, etc | | | Data-link | | |||
| +---------------------+ | | +--------------------------------+ | +---------------------+ | |||
| | Physical | | +--->| PW Label | | | Physical | | |||
| +---------------------+ | +--------------------------------+ | +---------------------+ | |||
| +----->| Outer Label or MPLS-in-IP encap| | ||||
| +--------------------------------+ | ||||
| Figure 11: PWE3 over an MPLS PSN using a control word | Figure 11: PWE3 over an MPLS PSN using a control word | |||
| Figure 11 shows the protocol layering for PWE3 over an MPLS PSN. An | Figure 11 shows the protocol layering for PWE3 over an MPLS PSN. An | |||
| inner MPLS label is used to provide the PW demultiplexing function. | inner MPLS label is used to provide the PW demultiplexing function. | |||
| A control word is used to carry most of the information needed by the | A control word is used to carry most of the information needed by the | |||
| PWE3 Encapsulation Layer and the PSN Convergence Layer in a compact | PWE3 Encapsulation Layer and the PSN Convergence Layer in a compact | |||
| format. The flags in the control word provide the necessary payload | format. The flags in the control word provide the necessary payload | |||
| convergence. A sequence field provides support for both in-order | convergence. A sequence field provides support for both in-order | |||
| payload delivery and (supported by a fragmentation control method) a | payload delivery and (supported by a fragmentation control method) a | |||
| PSN fragmentation service within the PSN Convergence Layer. Ethernet | PSN fragmentation service within the PSN Convergence Layer. Ethernet | |||
| pads all frames to a minimum size of 64 bytes. The MPLS header does | pads all frames to a minimum size of 64 bytes. The MPLS header does | |||
| not include a length indicator. Therefore to allow PWE3 to be carried | not include a length indicator. Therefore to allow PWE3 to be carried | |||
| in MPLS to correctly pass over an Ethernet data-link, a length | in MPLS to correctly pass over an Ethernet data-link, a length | |||
| correction field is needed in the control word. As with an IP PSN, | correction field is needed in the control word. Where the design of | |||
| where appropriate, timing is provided by RTP [RFC1889]. | the control word would alias an IP packet, an MPLS Payload Type | |||
| Identifier should be interposed between the PW label and the control | ||||
| word (see 5.4.4). As with an IP PSN, where appropriate, timing is | ||||
| provided by RTP [RFC1889]. | ||||
| In some networks it may be necessary to carry PWE3 over MPLS over IP. | In some networks it may be necessary to carry PWE3 over MPLS over IP. | |||
| In these circumstances, the PW is encapsulated for carriage over MPLS | In these circumstances, the PW is encapsulated for carriage over MPLS | |||
| as described in this section, and then a method of carrying MPLS over | as described in this section, and then a method of carrying MPLS over | |||
| an IP PSN (such as GRE [RFC2784], [RFC2890]) is applied to the | an IP PSN (such as GRE [RFC2784], [RFC2890]) is applied to the | |||
| resultant PW-PDU. | resultant PW-PDU. | |||
| 5.4.3. PW over MPLS Generic Control Word | 5.4.3. PW over MPLS Generic Control Word | |||
| The PW set-up protocol determines whether a particular PW uses a | To allow accurate packet inspection in an MPLS PSN, and/or to operate | |||
| control word. When a control word is used, it MUST have the | correctly over MPLS PSNs that have deployed equal-cost multiple-path | |||
| following form: | load-balancing (ECMP), a PW packet MUST NOT alias an IP packet. IP | |||
| packets are carried in MPLS label stacks without any protocol | ||||
| identifier. Historic values of the IP version number [RFC791] | ||||
| [RFC1881] are therefore used to distinguish between IP and non-IP | ||||
| MPLS payloads. | ||||
| To disambiguate the PW from an IP flow the PW SHOULD employ either | ||||
| the generic PW control word shown in Figure 12, or an MPLS payload | ||||
| type identifier. Note that an MPLS payload with bits 0..3 = 4 is an | ||||
| IPv4 packet and an MPLS payload with bits 0..3 = 6 is an IPv6 packet. | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | PID | Flags |FRG| Length | Sequence Number | | |0 0 0 0| Specified by PW Encapsulation | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 12 - MPLS Generic Control Word | Figure 12: Generic PW Control Word | |||
| The meaning of the fields of the MPLS Generic Control Word (Figure | The PW set-up protocol determines whether a PW uses a control word. | |||
| 12) is as follows: | When a control word is used, it SHOULD have the following preferred | |||
| form: | ||||
| PID (bits 0 to 3): | 0 1 2 3 | |||
| In an environment in which all PWs use the control word, | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| the payload type of an MPLS packet can be determined by | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| inspecting the first four bits of the longword, which | |0 0 0 0| Flags |FRG| Length | Sequence Number | | |||
| follows the bottom of the label stack. A value of 0 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| indicates "pseudowire", 4 indicates IPv4, 6 indicates IPv6. | ||||
| Figure 13: MPLS Preferred Control Word | ||||
| The meaning of the fields of the MPLS Preferred Control Word (Figure | ||||
| 13) is as follows: | ||||
| Flags (bits 4 to 7): | Flags (bits 4 to 7): | |||
| These bits are available for per payload signaling. Their | These bits are available for per payload signaling. Their | |||
| definition is encapsulation specific. | definition is encapsulation specific. | |||
| FRG (bits 8 and 9): | FRG (bits 8 and 9): | |||
| These bits are used when fragmenting a PW payload. Their use | ||||
| is defined in [FRAG]. | These bits are used when fragmenting a PW payload. Their use | |||
| is defined in [FRAG]. When the PW is of a type that will | ||||
| never need payload fragmentation, these bits may be used as | ||||
| general purpose flags. | ||||
| Length (bits 10 to 15): | Length (bits 10 to 15): | |||
| The length field is used to determine the size of a PW | The length field is used to determine the size of a PW | |||
| payload that might have been padded to the minimum Ethernet | payload that might have been padded to the minimum Ethernet | |||
| MAC frame size during its transit across the PSN. If the | MAC frame size during its transit across the PSN. If the | |||
| MPLS payload (defined as the CW + the PW payload + any | MPLS payload (defined as the CW + the PW payload + any | |||
| additional PW headers is less than 46 bytes, the length MUST | additional PW headers is less than 46 bytes, the length MUST | |||
| be set to the length of the MPLS payload. If the MPLS | be set to the length of the MPLS payload. If the MPLS | |||
| payload is between 46 bytes and 63 bytes the implementation | payload is between 46 bytes and 63 bytes the implementation | |||
| MAY either set to the length to the length of the MPLS | MAY either set to the length to the length of the MPLS | |||
| payload, or it MAY set it to 0. If the length of the MPLS | payload, or it MAY set it to 0. If the length of the MPLS | |||
| payload is greater than 63 bytes the length MUST be set to 0. | payload is greater than 63 bytes the length MUST be set to 0. | |||
| Sequence number (Bit 16 to 31): | Sequence number (Bit 16 to 31): | |||
| If the sequence number is not used, it is set to zero by | If the sequence number is not used, it is set to zero by | |||
| the sender and ignored by the receiver. Otherwise it | the sender and ignored by the receiver. Otherwise it | |||
| specifies the sequence number of a packet. A circular list | specifies the sequence number of a packet. A circular list | |||
| of sequence numbers is used. A sequence number takes a value | of sequence numbers is used. A sequence number takes a value | |||
| from 1 to 65535 (2**16-1). | from 1 to 65535 (2**16-1). If the payload is an OAM packet | |||
| the sequence number MAY be used to mark the position in the | ||||
| sequence, in which case it has the same value as the last | ||||
| data PDU sent. The use of the sequence number is optional | ||||
| for OAM payloads. | ||||
| 5.4.4. MPLS Payload Identifier | ||||
| If technical considerations result in a PW control word that may | ||||
| alias an IP packet, the control word SHOULD be preceeded by an MPLS | ||||
| payload type identifier. | ||||
| The MPLS payload type is defined as follows: | ||||
| 0 1 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| |0 0 0 1| reserved | PPP DLL Protocol Number | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | As defined by PPP DLL protocol definition | | ||||
| | | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| Figure 14: MPLS Payload Type Identifier | ||||
| PPP DLL Protocol Number [16:31]: | ||||
| These numbers are assigned by IANA. | ||||
| 6. PW Demultiplexer Layer and PSN Requirements | 6. PW Demultiplexer Layer and PSN Requirements | |||
| PWE3 places three service requirements on the protocol layers used to | PWE3 places three service requirements on the protocol layers used to | |||
| carry it across the PSN: | carry it across the PSN: | |||
| o Multiplexing | o Multiplexing | |||
| o Fragmentation | o Fragmentation | |||
| o Length and Delivery | o Length and Delivery | |||
| skipping to change at page 31, line 33 ¶ | skipping to change at page 32, line 28 ¶ | |||
| The purpose of the PW Demultiplexer Layer is to allow multiple PWs to | The purpose of the PW Demultiplexer Layer is to allow multiple PWs to | |||
| be carried in a single tunnel. This minimizes complexity and | be carried in a single tunnel. This minimizes complexity and | |||
| conserves resources. | conserves resources. | |||
| Some types of native service are capable of grouping multiple | Some types of native service are capable of grouping multiple | |||
| circuits into a "trunk", e.g. multiple ATM VCs in a VP, multiple | circuits into a "trunk", e.g. multiple ATM VCs in a VP, multiple | |||
| Ethernet VLANs on a physical media, or multiple DS0 services within a | Ethernet VLANs on a physical media, or multiple DS0 services within a | |||
| T1 or E1. A PW MAY interconnect two end-trunks. That trunk would | T1 or E1. A PW MAY interconnect two end-trunks. That trunk would | |||
| have a single multiplexing identifier. | have a single multiplexing identifier. | |||
| When a MPLS label is used as a PW Demultiplexer setting of the TTL | ||||
| value [RFC3032] in the PW label is application specific, however in a | ||||
| strict point to point application the TTL SHOULD be set to 2. | ||||
| 6.2 Fragmentation | 6.2 Fragmentation | |||
| If the PSN provides a fragmentation and reassembly service of | If the PSN provides a fragmentation and reassembly service of | |||
| adequate performance, it MAY be used to obtain an effective MTU that | adequate performance, it MAY be used to obtain an effective MTU that | |||
| is large enough to transport the PW PDUs. See Section 5.3 for a full | is large enough to transport the PW PDUs. See Section 5.3 for a full | |||
| discussion of the PW fragmentation issues. | discussion of the PW fragmentation issues. | |||
| 6.3 Length and Delivery | 6.3 Length and Delivery | |||
| PDU delivery to the egress PE is the function of the PSN Layer. | PDU delivery to the egress PE is the function of the PSN Layer. | |||
| skipping to change at page 32, line 41 ¶ | skipping to change at page 33, line 45 ¶ | |||
| trigger the necessary reduction in offered load, and no additional | trigger the necessary reduction in offered load, and no additional | |||
| congestion avoidance action is necessary. | congestion avoidance action is necessary. | |||
| If the PW is operating over a PSN that provides enhanced delivery, | If the PW is operating over a PSN that provides enhanced delivery, | |||
| the PEs SHOULD monitor packet loss to ensure that the service that | the PEs SHOULD monitor packet loss to ensure that the service that | |||
| was requested is actually being delivered. If it is not, then the PE | was requested is actually being delivered. If it is not, then the PE | |||
| SHOULD assume that the PSN is providing a best-effort service, and | SHOULD assume that the PSN is providing a best-effort service, and | |||
| SHOULD use the best-effort service congestion avoidance measures | SHOULD use the best-effort service congestion avoidance measures | |||
| described below. | described below. | |||
| If best-effort service is being used and the trafic is not known to | If best-effort service is being used and the traffic is not known to | |||
| be TCP friendly, the PEs SHOULD monitor packet loss to ensure that | be TCP friendly, the PEs SHOULD monitor packet loss to ensure that | |||
| the packet loss rate is within acceptable parameters. Packet loss is | the packet loss rate is within acceptable parameters. Packet loss is | |||
| considered acceptable if a TCP flow across the same network path and | considered acceptable if a TCP flow across the same network path and | |||
| experiencing the same network conditions would achieve an average | experiencing the same network conditions would achieve an average | |||
| throughput, measured on a reasonable timescale, that is not less than | throughput, measured on a reasonable timescale, that is not less than | |||
| the PW flow is achieving. This condition can be satisfied by | the PW flow is achieving. This condition can be satisfied by | |||
| implementing a rate-limiting measure in the NSP, or by shutting down | implementing a rate-limiting measure in the NSP, or by shutting down | |||
| one or more PWs. The choice of which approach to use depends upon | one or more PWs. The choice of which approach to use depends upon | |||
| the type of traffic being carried. Where congestion is avoided by | the type of traffic being carried. Where congestion is avoided by | |||
| shutting down a PW, a suitable mechanism MUST be provided to prevent | shutting down a PW, a suitable mechanism MUST be provided to prevent | |||
| skipping to change at page 36, line 47 ¶ | skipping to change at page 37, line 47 ¶ | |||
| 8.2 PW SNMP MIB Architecture | 8.2 PW SNMP MIB Architecture | |||
| This section describes the general architecture for SNMP MIBs used to | This section describes the general architecture for SNMP MIBs used to | |||
| manage PW services and the underlying PSN. The intent here is to | manage PW services and the underlying PSN. The intent here is to | |||
| provide a clear picture of how all of the pertinent MIBs fit together | provide a clear picture of how all of the pertinent MIBs fit together | |||
| to form a cohesive management framework for deploying PWE3 services. | to form a cohesive management framework for deploying PWE3 services. | |||
| 8.2.1. MIB Layering | 8.2.1. MIB Layering | |||
| The SNMP MIBs created for PWE3 should fit the architecture shown in | The SNMP MIBs created for PWE3 should fit the architecture shown in | |||
| Figure 13. | Figure 15. | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| Service | CEM | | Ethernet | | ATM | | Service | CEM | | Ethernet | | ATM | | |||
| Layer |Service MIB| |Service MIB| ... |Service MIB| | Layer |Service MIB| |Service MIB| ... |Service MIB| | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| \ | / | \ | / | |||
| \ | / | \ | / | |||
| - - - - - - - - - - - - \ - - - | - - - - / - - - - - - - | - - - - - - - - - - - - \ - - - | - - - - / - - - - - - - | |||
| \ | / | \ | / | |||
| +-------------------------------------------+ | +-------------------------------------------+ | |||
| skipping to change at page 37, line 30 ¶ | skipping to change at page 38, line 30 ¶ | |||
| +-----------+ +-----------+ | +-----------+ +-----------+ | |||
| PSN VC |L2TP VC MIB| |MPLS VC MIB| | PSN VC |L2TP VC MIB| |MPLS VC MIB| | |||
| Layer +-----------+ +-----------+ | Layer +-----------+ +-----------+ | |||
| | | | | | | |||
| - - - - - - - - - | - - - - - - - - - - - - - - - | - - - | - - - - - - - - - | - - - - - - - - - - - - - - - | - - - | |||
| | | | | | | |||
| +-----------+ +-----------+ | +-----------+ +-----------+ | |||
| PSN |L2TP MIB(s)| |MPLS MIB(s)| | PSN |L2TP MIB(s)| |MPLS MIB(s)| | |||
| Layer +-----------+ +-----------+ | Layer +-----------+ +-----------+ | |||
| Figure 13: Relationship of SNMP MIBs | Figure 15: Relationship of SNMP MIBs | |||
| Figure 14 shows an example for a SONET PW carried over MPLS. | Figure 16 shows an example for a SONET PW carried over MPLS. | |||
| +-----------------+ | +-----------------+ | |||
| | SONET MIB | RFC2558 | | SONET MIB | RFC2558 | |||
| +-----------------+ | +-----------------+ | |||
| | | | | |||
| +-----------------+ | +-----------------+ | |||
| Service |SONET Service MIB| pw-cem-mib | Service |SONET Service MIB| pw-cem-mib | |||
| Layer +-----------------+ | Layer +-----------------+ | |||
| - - - - - - - - - - | - - - - - - - - - - - - - - - | - - - - - - - - - - | - - - - - - - - - - - - - - - | |||
| +-----------------+ | +-----------------+ | |||
| skipping to change at page 38, line 27 ¶ | skipping to change at page 39, line 27 ¶ | |||
| Layer +-----------------+ pw-mib | Layer +-----------------+ pw-mib | |||
| - - - - - - - - - - | - - - - - - - - - - - - - - - | - - - - - - - - - - | - - - - - - - - - - - - - - - | |||
| +-----------------+ | +-----------------+ | |||
| PSN VC | MPLS VC MIBS | pw-mpls-mib | PSN VC | MPLS VC MIBS | pw-mpls-mib | |||
| Layer +-----------------+ | Layer +-----------------+ | |||
| - - - - - - - - - - | - - - - - - - - - - - - - - - | - - - - - - - - - - | - - - - - - - - - - - - - - - | |||
| +-----------------+ | +-----------------+ | |||
| PSN | MPLS MIBs | mpls-te-mib | PSN | MPLS MIBs | mpls-te-mib | |||
| Layer +-----------------+ mpls-lsr-mib | Layer +-----------------+ mpls-lsr-mib | |||
| Figure 14: Service-specific Example for MIBs | Figure 16: Service-specific Example for MIBs | |||
| Note that there is a separate MIB for each emulated service as well | Note that there is a separate MIB for each emulated service as well | |||
| as one for each underlying PSN. These MIBs MAY be used in various | as one for each underlying PSN. These MIBs MAY be used in various | |||
| combinations as needed. | combinations as needed. | |||
| 8.2.2. Service Layer MIBs | 8.2.2. Service Layer MIBs | |||
| The first layer is referred to as the Service Layer. It contains | The first layer is referred to as the Service Layer. It contains | |||
| MIBs for PWE3 services such as Ethernet, ATM, circuits and Frame | MIBs for PWE3 services such as Ethernet, ATM, circuits and Frame | |||
| Relay. This layer contains those corresponding MIBs used to mate or | Relay. This layer contains those corresponding MIBs used to mate or | |||
| skipping to change at page 40, line 28 ¶ | skipping to change at page 41, line 28 ¶ | |||
| traceroute service of the underlying PSN. The opaque nature of the | traceroute service of the underlying PSN. The opaque nature of the | |||
| PW means that this traceroute information is only available within | PW means that this traceroute information is only available within | |||
| the provider network, e.g., at the PEs. | the provider network, e.g., at the PEs. | |||
| 9. IANA considerations | 9. IANA considerations | |||
| The control word PID bits need to be assigned by IANA. | The control word PID bits need to be assigned by IANA. | |||
| 10. Security Considerations | 10. Security Considerations | |||
| PWE3 provides no means of protecting the contents or delivery of the | PWE3 provides no means of protecting the integrity, confidentiality | |||
| native data units. The use of PWE3 can therefore expose a particular | or delivery of the native data units. The use of PWE3 can therefore | |||
| environment to additional security threats. Assumptions that might be | expose a particular environment to additional security threats. | |||
| appropriate when all communicating systems are interconnected via a | Assumptions that might be appropriate when all communicating systems | |||
| point to point or circuit-switched network may no longer hold when | are interconnected via a point to point or circuit-switched network | |||
| they are interconnected using an emulated wire carried over some | may no longer hold when they are interconnected using an emulated | |||
| types of PSN. It is outside the scope of this specification, to | wire carried over some types of PSN. It is outside the scope of this | |||
| fully analyze and review the risks of PWE3, particularly as these | specification, to fully analyze and review the risks of PWE3, | |||
| risks will depend on the PSN. An example should make the concern | particularly as these risks will depend on the PSN. An example should | |||
| clear. A number of IETF standards employ relatively weak security | make the concern clear. A number of IETF standards employ relatively | |||
| mechanisms when communicating nodes are expected to be connected to | weak security mechanisms when communicating nodes are expected to be | |||
| the same local area network. The Virtual Router Redundancy Protocol | connected to the same local area network. The Virtual Router | |||
| [RFC2338] is one instance. The relatively weak security mechanisms | Redundancy Protocol [RFC2338] is one instance. The relatively weak | |||
| represent a greater vulnerability in an emulated Ethernet connected | security mechanisms represent a greater vulnerability in an emulated | |||
| via a PW. | Ethernet connected via a PW. | |||
| Exploitation of vulnerabilities from within the PSN may be directed | Exploitation of vulnerabilities from within the PSN may be directed | |||
| to the PW Tunnel end-point so that PW Demultiplexer and PSN tunnel | to the PW Tunnel end-point so that PW Demultiplexer and PSN tunnel | |||
| services are disrupted. Controlling PSN access to the PW Tunnel | services are disrupted. Controlling PSN access to the PW Tunnel | |||
| end-point is one way to protect against this. By restricting PW | end-point is one way to protect against this. By restricting PW | |||
| Tunnel end-point access to legitimate remote PE sources of traffic, | Tunnel end-point access to legitimate remote PE sources of traffic, | |||
| the PE may reject traffic that would interfere with the PW | the PE may reject traffic that would interfere with the PW | |||
| Demultiplexing and PSN tunnel services. | Demultiplexing and PSN tunnel services. | |||
| Protection mechanisms MUST also address the spoofing of tunneled PW | Protection mechanisms MUST also address the spoofing of tunneled PW | |||
| data. The validation of traffic addressed to the PW Demultiplexer | data. The validation of traffic addressed to the PW Demultiplexer | |||
| end-point is paramount in ensuring integrity of PW encapsulation. | end-point is paramount in ensuring integrity of PW encapsulation. | |||
| Security protocols such as IPSec [RFC2401] MAY be used by the PW | Security protocols such as IPSec [RFC2401] MAY be used by the PW | |||
| Demultiplexer Layer in order to maintain the integrity of the PW by | Demultiplexer Layer in order to maintain the integrity of the PW by | |||
| authenticating data between the PW Demultiplexer End-points. IPSec | authenticating data between the PW Demultiplexer End-points. | |||
| MAY provide authentication, integrity, non-repudiation, and | ||||
| IPSec MAY provide authentication, integrity, non-repudiation, and | ||||
| confidentiality of data transferred between two PEs. It cannot | confidentiality of data transferred between two PEs. It cannot | |||
| provide the equivalent services to the native service. | provide the equivalent services to the native service. | |||
| Based on the type of data being transferred, the PW MAY indicate to | Based on the type of data being transferred, the PW MAY indicate to | |||
| the PW Demultiplexer Layer that enhanced security services are | the PW Demultiplexer Layer that enhanced security services are | |||
| required. The PW Demultiplexer Layer MAY define multiple protection | required. The PW Demultiplexer Layer MAY define multiple protection | |||
| profiles based on the requirements of the PW emulated service. CE- | profiles based on the requirements of the PW emulated service. CE- | |||
| to-CE signaling and control events emulated by the PW and some data | to-CE signaling and control events emulated by the PW and some data | |||
| types may require additional protection mechanisms. Alternatively, | types may require additional protection mechanisms. Alternatively, | |||
| the PW Demultiplexer Layer may use peer authentication for every PSN | the PW Demultiplexer Layer may use peer authentication for every PSN | |||
| packet to prevent spoofed native data units from being sent to the | packet to prevent spoofed native data units from being sent to the | |||
| destination CE. | destination CE. | |||
| Acknowledgments | Acknowledgments | |||
| We thank: Sasha Vainshtein for his work on Native Service Processing | We thank: Sasha Vainshtein for his work on Native Service Processing | |||
| and advice on bit-stream over PW services. Thomas K. Johnson for his | and advice on bit-stream over PW services. Thomas K. Johnson for his | |||
| work on the background and motivation for PWs. | work on the background and motivation for PWs. | |||
| We also thank: Ron Bonica, Stephen Casner, Durai Chinnaiah, Jayakumar | We also thank: Ron Bonica, Stephen Casner, Durai Chinnaiah, Jayakumar | |||
| Jayakumar, Ghassem Koleyni, Eric Rosen, John Rutemiller, Scott | Jayakumar, Ghassem Koleyni, Danny McPherson, Eric Rosen, John | |||
| Wainner and David Zelig for their comments and contributions. | Rutemiller, Scott Wainner and David Zelig for their comments and | |||
| contributions. | ||||
| References | References | |||
| Internet-drafts are works in progress available from | Internet-drafts are works in progress available from | |||
| <http://www.ietf.org/internet-drafts/> | <http://www.ietf.org/internet-drafts/> | |||
| [DVB] EN 300 744 Digital Video Broadcasting (DVB); Framing | [DVB] EN 300 744 Digital Video Broadcasting (DVB); Framing | |||
| structure, channel coding and modulation for digital | structure, channel coding and modulation for digital | |||
| terrestrial television (DVB-T), European | terrestrial television (DVB-T), European | |||
| Telecommunications Standards Institute (ETSI) | Telecommunications Standards Institute (ETSI) | |||
| [FRAG] Malis and Townsley, "PWE3 Fragmentation and | [FRAG] Malis and Townsley, "PWE3 Fragmentation and | |||
| Reassembly", <draft-ietf-pwe3-fragmentation-00.txt>, | Reassembly", <draft-ietf-pwe3-fragmentation-00.txt>, | |||
| work in progress, October 2002. | work in progress, October 2002. | |||
| [LDP-MIB] Cucchiara, J., Sjostrand, H., and Luciani, J., | [LDPMIB] Cucchiara, J., Sjostrand, H., and Luciani, J., | |||
| "Definitions of Managed Objects for the Multiprotocol | "Definitions of Managed Objects for the Multiprotocol | |||
| Label Switching, Label Distribution Protocol (LDP)", | Label Switching, Label Distribution Protocol (LDP)", | |||
| <draft-ietf-mpls-ldp-mib-09.txt>, work in progress, | <draft-ietf-mpls-ldp-mib-09.txt>, work in progress, | |||
| October 2002. | October 2002. | |||
| [LSRMIB] Srinivasan et al, "MPLS Label Switch Router Management | [LSRMIB] Srinivasan et al, "MPLS Label Switch Router Management | |||
| Information Base Using SMIv2", | Information Base Using SMIv2", | |||
| <draft-ietf-mpls-lsr-mib-09.txt>, work in progress, | <draft-ietf-mpls-lsr-mib-09.txt>, work in progress, | |||
| October 2002. | October 2002. | |||
| skipping to change at page 42, line 40 ¶ | skipping to change at page 43, line 44 ¶ | |||
| [PWTCMIB] Nadeau et al, "Definitions for Textual Conventions and | [PWTCMIB] Nadeau et al, "Definitions for Textual Conventions and | |||
| OBJECT-IDENTITIES for Pseudo-Wires Management" | OBJECT-IDENTITIES for Pseudo-Wires Management" | |||
| <draft-ietf-pwe3-pw-tc-mib-00.txt>, work in progress, | <draft-ietf-pwe3-pw-tc-mib-00.txt>, work in progress, | |||
| June 2002. | June 2002. | |||
| [PWMPLSMIB] Danenberg et al, "SONET/SDH Circuit Emulation Service | [PWMPLSMIB] Danenberg et al, "SONET/SDH Circuit Emulation Service | |||
| Over MPLS (CEM) Management Information Base Using | Over MPLS (CEM) Management Information Base Using | |||
| SMIv2", <draft-ietf-pwe3-cep-mib-01.txt>, work in | SMIv2", <draft-ietf-pwe3-cep-mib-01.txt>, work in | |||
| progress, October 2002. | progress, October 2002. | |||
| [RFC791] RFC-791: DARPA Internet Program, Protocol Specification, | ||||
| ISI, September 1981. | ||||
| [RFC1191] RFC-1191: Path MTU discovery. J.C. Mogul, S.E. Deering. | [RFC1191] RFC-1191: Path MTU discovery. J.C. Mogul, S.E. Deering. | |||
| [RFC1883] RFC-1883: Internet Protocol, Version 6 (IPv6), | ||||
| S. Deering, et al, December 1995 | ||||
| [RFC1889] RFC-1889: RTP: A Transport Protocol for Real-Time | [RFC1889] RFC-1889: RTP: A Transport Protocol for Real-Time | |||
| Applications. H. Schulzrinne et. al. | Applications. H. Schulzrinne et. al. | |||
| [RFC1902] RFC-1902: Structure of Management Information for | [RFC1902] RFC-1902: Structure of Management Information for | |||
| Version 2 of the Simple Network Management Protocol | Version 2 of the Simple Network Management Protocol | |||
| (SNMPv2), Case et al, January 1996. | (SNMPv2), Case et al, January 1996. | |||
| [RFC1958] RFC-1958: Architectural Principles of the Internet, | [RFC1958] RFC-1958: Architectural Principles of the Internet, | |||
| B. Carpenter et al. | B. Carpenter et al. | |||
| skipping to change at page 43, line 39 ¶ | skipping to change at page 44, line 49 ¶ | |||
| [RFC2890] RFC-2890: Key and Sequence Number Extensions to GRE. | [RFC2890] RFC-2890: Key and Sequence Number Extensions to GRE. | |||
| G. Dommety. | G. Dommety. | |||
| [RFC3022] RFC-3022: Traditional IP Network Address Translator | [RFC3022] RFC-3022: Traditional IP Network Address Translator | |||
| (Traditional NAT). P Srisuresh et al. | (Traditional NAT). P Srisuresh et al. | |||
| [RFC3031] RFC3031: Multiprotocol Label Switching Architecture, | [RFC3031] RFC3031: Multiprotocol Label Switching Architecture, | |||
| E. Rosen, January 2001. | E. Rosen, January 2001. | |||
| [RFC3032] RFC3032: MPLS Label Stack Encoding, E. Rosen, | ||||
| January 2001. | ||||
| [SONETMIB] K. Tesink, "Definitions of Managed Objects for the | [SONETMIB] K. Tesink, "Definitions of Managed Objects for the | |||
| SONET/SDH Interface Type", RFC2558, March 1999. | SONET/SDH Interface Type", RFC2558, March 1999. | |||
| [TEMIB] Srinivasan et al, "Traffic Engineering Management | [TEMIB] Srinivasan et al, "Traffic Engineering Management | |||
| Information Base Using SMIv2", | Information Base Using SMIv2", | |||
| <draft-ietf-mpls-te-mib-09.txt>, work in progress, | <draft-ietf-mpls-te-mib-09.txt>, work in progress, | |||
| November 2002. | November 2002. | |||
| [TFRC] M. Handley et al, "TCP Friendly Rate Control (TFRC): | [TFRC] M. Handley et al, "TCP Friendly Rate Control (TFRC): | |||
| Protocol Specification" <draft-ietf-tsvwg-tfrc-05.txt>, | Protocol Specification" <draft-ietf-tsvwg-tfrc-05.txt>, | |||
| skipping to change at page 44, line 22 ¶ | skipping to change at page 45, line 35 ¶ | |||
| Stewart Bryant | Stewart Bryant | |||
| Cisco Systems, | Cisco Systems, | |||
| 4, The Square, | 4, The Square, | |||
| Stockley Park, | Stockley Park, | |||
| Uxbridge UB11 1BL, | Uxbridge UB11 1BL, | |||
| United Kingdom. Email: stbryant@cisco.com | United Kingdom. Email: stbryant@cisco.com | |||
| Prayson Pate | Prayson Pate | |||
| Overture Networks, Inc. | Overture Networks, Inc. | |||
| Airport Boulevard | 507 Airport Boulevard | |||
| Morrisville, NC, USA 27560 Email: prayson.pate@overturenetworks.com | Morrisville, NC, USA 27560 Email: prayson.pate@overturenetworks.com | |||
| Full copyright statement | Full copyright statement | |||
| Copyright (C) The Internet Society (2002). | Copyright (C) The Internet Society (2002). | |||
| All Rights Reserved. | All Rights Reserved. | |||
| This document and translations of it may be copied and | This document and translations of it may be copied and | |||
| furnished to others, and derivative works that comment | furnished to others, and derivative works that comment | |||
| on or otherwise explain it or assist in its implementation | on or otherwise explain it or assist in its implementation | |||
| End of changes. 38 change blocks. | ||||
| 97 lines changed or deleted | 156 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||