< draft-ietf-pwe3-p2mp-pw-requirements-02.txt   draft-ietf-pwe3-p2mp-pw-requirements-03.txt >
Network Working Group F. Jounay (Ed.) Network Working Group F. Jounay (Ed.)
Internet Draft P. Niger Internet Draft P. Niger
Category: Informational Track France Telecom Category: Informational France Telecom Orange
Expires: June 2010 Expires: January 2011
Y. Kamite Y. Kamite
L. Martini NTT Communications L. Martini NTT Communications
Cisco Cisco
S. Delord S. Delord
R. Aggarwal Testra R. Aggarwal Testra
Juniper Networks Juniper Networks
L. Wang L. Wang
M. Bocci Telenor M. Bocci Telenor
M. Vigoureux M. Vigoureux
Alcatel-Lucent G. Heron Alcatel-Lucent G. Heron
BT BT
L. Jin L. Jin
ZTE Janvier 08, 2010 ZTE August 18, 2010
Requirements for Point-to-Multipoint Pseudowire Requirements for Point-to-Multipoint Pseudowire
draft-ietf-pwe3-p2mp-pw-requirements-02.txt draft-ietf-pwe3-p2mp-pw-requirements-03.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts. groups may also distribute working documents as Internet-Drafts.
skipping to change at page 1, line 45 skipping to change at page 1, line 45
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on June, 2010. This Internet-Draft will expire on January, 2011.
Abstract Abstract
This document presents a set of requirements for providing a Point- This document presents a set of requirements for providing a Point-
to-Multipoint PWE3 (Pseudowire Emulation Edge to Edge) emulation. The to-Multipoint PWE3 (Pseudowire Emulation Edge to Edge) emulation. The
requirements identified in this document are related to architecture, requirements identified in this document are related to architecture,
signaling and maintenance aspects of a Point-to-Multipoint PW signaling and maintenance aspects of a Point-to-Multipoint PW
operation. They are proposed as guidelines for the standardization of operation. They are proposed as guidelines for the standardization of
such mechanisms. Among other potential applications Point-to- such mechanisms. Among other potential applications Point-to-
Multipoint PWs SHOULD be used to optimize the support of multicast Multipoint PWs SHOULD be used to optimize the support of multicast
skipping to change at page 3, line 14 skipping to change at page 3, line 14
4.5. Protection and Restoration...................................15 4.5. Protection and Restoration...................................15
4.6. Scalability..................................................15 4.6. Scalability..................................................15
5. Manageability considerations...................................15 5. Manageability considerations...................................15
6. Backward Compatibility.........................................16 6. Backward Compatibility.........................................16
7. Security Considerations........................................16 7. Security Considerations........................................16
8. IANA Considerations............................................16 8. IANA Considerations............................................16
9. Acknowledgments................................................16 9. Acknowledgments................................................16
10. References....................................................17 10. References....................................................17
10.1. Normative References........................................17 10.1. Normative References........................................17
10.2. Informative References......................................17 10.2. Informative References......................................17
Authors' Addresses.................................................18 Authors' Addresses............ ...................................18
Copyright and Licence Notice.......................................19 Copyright and Licence Notice.. ...................................19
1. Introduction 1. Introduction
1.1. Problem Statement 1.1. Problem Statement
As defined in the PWE3 WG charter, a Pseudowire (PW) emulates a As defined in the PWE3 WG charter, a Pseudowire (PW) emulates a
point-to-point bidirectional link over an IP/MPLS network, and point-to-point bidirectional link over an IP/MPLS network, and
provides a single service which is perceived by its user as an provides a single service which is perceived by its user as an
unshared link or circuit of the chosen service. A Pseudowire is used unshared link or circuit of the chosen service. A Pseudowire is used
to transport non IP traffic (e.g. Ethernet, TDM, ATM, and FR) in an to transport non IP traffic (e.g. Ethernet, TDM, ATM, and FR) in an
skipping to change at page 6, line 6 skipping to change at page 6, line 6
PE connected to a traffic source to at least two Leaf PEs connected PE connected to a traffic source to at least two Leaf PEs connected
to traffic receivers. The PW endpoints connect the PW to its to traffic receivers. The PW endpoints connect the PW to its
Attachment Circuit (AC). As for a P2P PW, an AC can be a Frame Relay Attachment Circuit (AC). As for a P2P PW, an AC can be a Frame Relay
DLC, an ATM VP/VC, an Ethernet port, a VLAN, a HDLC link on a DLC, an ATM VP/VC, an Ethernet port, a VLAN, a HDLC link on a
physical interface. physical interface.
Figure 1 describes the P2MP SS-PW reference model which is derived Figure 1 describes the P2MP SS-PW reference model which is derived
from [RFC3985] to support P2MP emulated services. from [RFC3985] to support P2MP emulated services.
|<-----------P2MP SS-PW------------>| |<-----------P2MP SS-PW------------>|
Native | | Native Native | | Native
Service | |<----P2MP PSN tunnel --->| | Service Service | |<----P2MP PSN tunnel --->| | Service
(AC) V V V V (AC) (AC) V V V V (AC)
| +----+ +-----+ +----+ | | +----+ +-----+ +----+ |
| |PE1 | | P |=========|PE2 |AC2 | +----+ | |PE1 | | P |=========|PE2 |AC2 | +----+
| | | | ......PW1.......>|---------->|CE2 | | | | | ......PW1.......>|---------->|CE2 |
| | | | . |=========| | | +----+ | | | | . |=========| | | +----+
| | | | . | +----+ | | | | | . | +----+ |
| | |=========| . | | | | |=========| . | |
| | | | . | +----+ | | | | | . | +----+ |
+----+ | AC1 | | | . |=========|PE3 |AC3 | +----+ +----+ | AC1 | | | . |=========|PE3 |AC3 | +----+
|CE1 |-------->|........PW1.............PW1.......>|---------->|CE3 | |CE1 |-------->|........PW1.............PW1.......>|---------->|CE3 |
+----+ | | | | . |=========| | | +----+ +----+ | | | | . |=========| | | +----+
skipping to change at page 7, line 15 skipping to change at page 7, line 15
3.2. P2MP SS-PW Underlying Layer 3.2. P2MP SS-PW Underlying Layer
The P2MP SS-PW implies an underlying P2MP PSN tunnel. Figure 2 gives The P2MP SS-PW implies an underlying P2MP PSN tunnel. Figure 2 gives
an example of P2MP SS-PW topology relying on a P2MP LSP. The PW tree an example of P2MP SS-PW topology relying on a P2MP LSP. The PW tree
is composed of one Root PE (i1) and several Leaf PEs (e1, e2, e3, is composed of one Root PE (i1) and several Leaf PEs (e1, e2, e3,
e4). e4).
The P2MP PSN MAY be signaled with P2MP RSVP-TE [RFC4875] or MLDP The P2MP PSN MAY be signaled with P2MP RSVP-TE [RFC4875] or MLDP
[MLDP]. [MLDP].
i1 i1
/ /
/ \ / \
/ \ / \
/ \ / \
/\ \ /\ \
/ \ \ / \ \
/ \ \ / \ \
/ \ / \ / \ / \
e1 e2 e3 e4 e1 e2 e3 e4
Figure 2 Example of P2MP Underlying Layer for P2MP SS-PW Figure 2 Example of P2MP Underlying Layer for P2MP SS-PW
The P2MP PW MAY be supported over multiple P2MP PSN tunnel. These The P2MP PW MAY be supported over multiple P2MP PSN tunnel. These
P2MP PSN tunnels MUST be able to serve more than one P2MP PW. P2MP PSN tunnels MUST be able to serve more than one P2MP PW.
The P2MP Tunnels MAY also be of different technology (ex. MPLS over The P2MP Tunnels MAY also be of different technology (ex. MPLS over
GRE, or P-to-MP MPLS LSP ) or just use different setup protocols. GRE, or P-to-MP MPLS LSP ) or just use different setup protocols.
(ex. MLDP, and P2MP RSVP-TE ). (ex. MLDP, and P2MP RSVP-TE ).
skipping to change at page 10, line 16 skipping to change at page 10, line 16
An alternative protection scheme MAY rely on the PW layer. An alternative protection scheme MAY rely on the PW layer.
Leaf PEs MAY be protected via a P2MP PW redundancy mechanism. In the Leaf PEs MAY be protected via a P2MP PW redundancy mechanism. In the
example depicted below, a standby P2MP PW is used to protect the example depicted below, a standby P2MP PW is used to protect the
active P2MP. In that protection scheme the AC at the Root PE MUST active P2MP. In that protection scheme the AC at the Root PE MUST
serve both P2MP PWs. In this scenario, the condition when to do the serve both P2MP PWs. In this scenario, the condition when to do the
switchover should be implemented, e.g. one or all Leaf failure of switchover should be implemented, e.g. one or all Leaf failure of
active P2MP PW will course P2MP PW switchover. active P2MP PW will course P2MP PW switchover.
CE1 CE1
| |
active PE1 standby active PE1 standby
P2MP PW .../ \....P2MP PW P2MP PW .../ \....P2MP PW
/ \ / \
P2 P3 P2 P3
/ \ / \ / \ / \
/ \ / \ / \ / \
/ \ / \ / \ / \
PE4 PE5 PE6 PE7 PE4 PE5 PE6 PE7
| | | | | | | |
| \ / | | \ / |
\ CE2 / \ CE2 /
\ / \ /
-------CE3------ -------CE3------
Root PE MAY be protected via a P2MP PW redundancy mechanism. In the Root PE MAY be protected via a P2MP PW redundancy mechanism. In the
example depicted below, a standby P2MP PW is used to protect the example depicted below, a standby P2MP PW is used to protect the
active P2MP. A single AC at the Leaf PE MUST be used to attach the CE active P2MP. A single AC at the Leaf PE MUST be used to attach the CE
to the primary and the standby P2MP PW. The Leaf PE MUST support to the primary and the standby P2MP PW. The Leaf PE MUST support
protection mechanism in order to select the active P2MP PW. protection mechanism in order to select the active P2MP PW.
CE1 CE1
/ \ / \
| | | |
active PE1 PE2 standby active PE1 PE2 standby
P2MP PW1 | | P2MP PW2 P2MP PW1 | | P2MP PW2
| | | |
P2 P3 P2 P3
/ \/ \ / \/ \
/ /\ \ / /\ \
/ / \ _\ / / \ _\
/ / \ \ / / \ \
PE4 PE5 PE4 PE5
| | | |
CE2 CE3 CE2 CE3
3.7. Scalability 3.7. Scalability
The solution SHOULD scale at least as well as linearly with an The solution SHOULD scale at least as well as linearly with an
increase in the number of Leaf PEs. increase in the number of Leaf PEs.
An increase in the number of P2MP PW SHOULD NOT cause the P router to An increase in the number of P2MP PW SHOULD NOT cause the P router to
increase its forwarding table linearly. increase its forwarding table linearly.
The P2MP PW multiplexed/demultiplexed to P2MP PSN Tunnel can improve The P2MP PW multiplexed/demultiplexed to P2MP PSN Tunnel can improve
skipping to change at page 11, line 38 skipping to change at page 11, line 38
| |T-PE| |S-PE1|=========|T-PE| | +----+ | |T-PE| |S-PE1|=========|T-PE| | +----+
| | 1 | | ......PW2.....> 2|---------->|CE2 | | | 1 | | ......PW2.....> 2|---------->|CE2 |
| | | | . |=========| | | +----+ | | | | . |=========| | | +----+
| | |=========| . | +----+ | | | |=========| . | +----+ |
| | | .....> | | | | | .....> | |
| | | . | . | +----+ | | | | . | . | +----+ |
| | | . | . |=========|T-PE| | +----+ | | | . | . |=========|T-PE| | +----+
| | | . | ......PW3.....> 3|---------->|CE3 | | | | . | ......PW3.....> 3|---------->|CE3 |
| | | . | |=========| | | +----+ | | | . | |=========| | | +----+
| | | . | | +----+ | | | | . | | +----+ |
| | | . +-----+ +----+ | | | . +-----+
|CE1 |-------->|.......PW1... +-----+ +----+ | |CE1 |-------->|.......PW1... +-----+ +----+ |
| | | . |S-PE2|=========|T-PE| | +----+ +----+ | | | . |S-PE2|=========|T-PE| | +----+
| | | . | | ......> 4|---------->|CE4 | | | | . | | ......> 4|---------->|CE4 |
| | | . | | . | | | +----+ | | | . | | . | | | +----+
| | | . | | . +----+ | | | | . | | . +----+ |
| | | ......>...PW4.. | | | | ......>...PW4.. |
| | | | | . +----+ | | | | | | . +----+ |
| | |=========| | . |T-PE| | +----+ | | |=========| | . |T-PE| | +----+
| | | | | ......> 5|---------->|CE5 | | | | | | ......> 5|---------->|CE5 |
| | | | |=========| | | +----+ | | | | |=========| | | +----+
| | | | | +----+ | | | | | | +----+ |
| +----+ +-----+ | | +----+ +-----+ |
skipping to change at page 12, line 46 skipping to change at page 12, line 46
packets or data received from b2 and send them to Leaf T-PEs e3 and packets or data received from b2 and send them to Leaf T-PEs e3 and
e4. e4.
However giving the fact that some PW segments MAY be supported over a However giving the fact that some PW segments MAY be supported over a
P2MP LSP, the traffic replication along the path of these PW segments P2MP LSP, the traffic replication along the path of these PW segments
can be performed as well at the underlying LSP level. can be performed as well at the underlying LSP level.
Figure 4 describes the case where each segment is supported over a Figure 4 describes the case where each segment is supported over a
P2P LSP except for the b1-b3b4 P2MP segment which is conveyed over a P2P LSP except for the b1-b3b4 P2MP segment which is conveyed over a
P2MP LSP on this section. P2MP LSP on this section.
i1 i1
/ \ / \
b1 b2 b1 b2
/ \ / \
/ \ / \
/\ \ /\ \
/ \ \ / \ \
b3 b4 b5 b3 b4 b5
/ \ / \ / \ / \
e1 e2 e3 e4 e1 e2 e3 e4
Figure 4 Example of P2P and P2MP underlying Layer for P2MP MS-PW Figure 4 Example of P2P and P2MP underlying Layer for P2MP MS-PW
The P2MP PSN MAY be signaled with P2MP RSVP-TE [RFC4875] or MLDP The P2MP PSN MAY be signaled with P2MP RSVP-TE [RFC4875] or MLDP
[MLDP]. [MLDP].
4.3. P2MP MS-PW Signaling Requirements 4.3. P2MP MS-PW Signaling Requirements
4.3.1. Dynamically Instantiated P2MP MS-PW 4.3.1. Dynamically Instantiated P2MP MS-PW
The PW tree could be statically configured at the T-PEs and each S-PE The PW tree could be statically configured at the T-PEs and each S-PE
skipping to change at page 16, line 27 skipping to change at page 16, line 27
MUST have a mechanism to report an error for non-compliant PEs. In MUST have a mechanism to report an error for non-compliant PEs. In
this case, it SHOULD report which PE (S-PE and T-PEs) are not this case, it SHOULD report which PE (S-PE and T-PEs) are not
compliant. compliant.
In some cases, upstream traffic is required from downstream CE to In some cases, upstream traffic is required from downstream CE to
upstream CE. The P2MPPW solution SHOULD allow a return path (i.e. upstream CE. The P2MPPW solution SHOULD allow a return path (i.e.
from the Leaf to the Root) that provides upstream connection. from the Leaf to the Root) that provides upstream connection.
In particular, it is expected to be allowed that the same ACs are In particular, it is expected to be allowed that the same ACs are
shared between downstream and upstream direction. For downstream, a shared between downstream and upstream direction. For downstream, a
CE receives from its connected AC traffic originated by the Root PE CE receives from its connected AC traffic originated by the Root PE
transported over a P2MP PW. For upstream, the CE MAY also send over transported over a P2MP PW. For upstream, the CE MAY also send over
the same AC traffic destined to the same remote PE. the same AC traffic destined to the same remote PE.
7. Security Considerations 7. Security Considerations
The security requirements common to PW are raised in Section 10 of The security requirements common to PW are raised in Section 10 of
[RFC3916] and common to MS-PW in section 7 of [RFC5254]. P2MP PW (SS [RFC3916] and common to MS-PW in section 7 of [RFC5254]. P2MP PW (SS
or MS) is a variant of the initial P2P PW definition, and that or MS) is a variant of the initial P2P PW definition, and that
statements also apply to P2MP PW. statements also apply to P2MP PW.
8. IANA Considerations 8. IANA Considerations
skipping to change at page 17, line 44 skipping to change at page 17, line 44
[RFC5659] Bocci, M., and Bryant, S.,T., " An Architecture for [RFC5659] Bocci, M., and Bryant, S.,T., " An Architecture for
Multi-Segment Pseudo Wire Emulation Edge-to-Edge", Multi-Segment Pseudo Wire Emulation Edge-to-Edge",
October 2009 October 2009
10.2. Informative References 10.2. Informative References
[MLDP] Minei, I., Wijnands, I., Thomas, B., "Label [MLDP] Minei, I., Wijnands, I., Thomas, B., "Label
Distribution Protocol Extensions for Point-to- Distribution Protocol Extensions for Point-to-
Multipoint and Multipoint-to-Multipoint Label Switched Multipoint and Multipoint-to-Multipoint Label Switched
Paths", Internet Draft, draft-ietf-mpls-ldp-p2mp-08, Paths", Internet Draft, draft-ietf-mpls-ldp-p2mp-10,
October 2009 July 2010
[VPMS REQ] Kamite, Y., Jounay, F. "Framework and Requirements for [VPMS REQ] Kamite, Y., Jounay, F. "Framework and Requirements for
Virtual Private Multicast Service (VPMS)", Internet Virtual Private Multicast Service (VPMS)", Internet
Draft, draft-ietf-l2vpn-vpms-frmwk-requirements-02, Draft, draft-ietf-l2vpn-vpms-frmwk-requirements-03,
October 2009 July 2010
Author's Addresses Author's Addresses
Frederic Jounay Frederic Jounay
France Telecom France Telecom
2, avenue Pierre-Marzin 2, avenue Pierre-Marzin
22307 Lannion Cedex 22307 Lannion Cedex
FRANCE FRANCE
Email: frederic.jounay@orange-ftgroup.com Email: frederic.jounay@orange-ftgroup.com
skipping to change at page 18, line 36 skipping to change at page 18, line 36
Japan Japan
Email: y.kamite@ntt.com Email: y.kamite@ntt.com
Luca Martini Luca Martini
Cisco Systems, Inc. Cisco Systems, Inc.
9155 East Nichols Avenue, Suite 400 9155 East Nichols Avenue, Suite 400
Englewood, CO, 80112 Englewood, CO, 80112
EMail: lmartini@cisco.com EMail: lmartini@cisco.com
Giles Heron Giles Heron
Tellabs BT
Abbey Place
24-28 Easton Street
High Wycombe
Bucks
HP11 1NT
UK UK
EMail: giles.heron@tellabs.com EMail: giles.heron@gmail.com
Simon Delord Simon Delord
Telstra Telstra
242 Exhibition St 242 Exhibition St
Melbourne VIC 3000 Melbourne VIC 3000
Australia Australia
Email: simon.a.delord@team.telstra.com Email: simon.a.delord@team.telstra.com
Lei Wang Lei Wang
Telenor Telenor
skipping to change at page 19, line 37 skipping to change at page 19, line 33
Lizhong JIN Lizhong JIN
ZTE Corporation ZTE Corporation
889, Bibo Road, 889, Bibo Road,
Shanghai, 201203, China Shanghai, 201203, China
Email: lizhong.jin@zte.com.cn Email: lizhong.jin@zte.com.cn
Copyright and License Notice Copyright and License Notice
Copyright (c) 2010 IETF Trust and the persons identified as the Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of Provisions Relating to IETF Documents
publication of this document (http://trustee.ietf.org/license-info). (http://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described
in Section 4.e of the Trust Legal Provisions and are provided
without warranty as described in the Simplified BSD License.
This document may contain material from IETF Documents or IETF This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this 10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process. modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling Without obtaining an adequate license from the person(s)
the copyright in such materials, this document may not be modified controlling the copyright in such materials, this document may not
outside the IETF Standards Process, and derivative works of it may be modified outside the IETF Standards Process, and derivative
not be created outside the IETF Standards Process, except to format works of it may not be created outside the IETF Standards Process,
it for publication as an RFC or to translate it into languages other except to format it for publication as an RFC or to translate it
than English. into languages other than English.
 End of changes. 22 change blocks. 
79 lines changed or deleted 76 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/