| < draft-jjwl-mpls-mldp-hsmp-00.txt | draft-jjwl-mpls-mldp-hsmp-01.txt > | |||
|---|---|---|---|---|
| Network Working Group L. Jin | Network Working Group L. Jin | |||
| Internet-Draft ZTE | Internet-Draft ZTE Corporation | |||
| Intended status: Standards Track F. Jounay | Intended status: Standards Track F. Jounay | |||
| Expires: February 4, 2013 France Telecom | Expires: March 7, 2013 France Telecom | |||
| I. Wijnands | I. Wijnands | |||
| Cisco Systems | Cisco Systems, Inc | |||
| N. Leymann | N. Leymann | |||
| Deutsche Telekom | Deutsche Telekom AG | |||
| Aug 3, 2012 | Sep 3, 2012 | |||
| LDP Extensions for Hub & Spoke Multipoint Label Switched Path | LDP Extensions for Hub & Spoke Multipoint Label Switched Path | |||
| draft-jjwl-mpls-mldp-hsmp-00.txt | draft-jjwl-mpls-mldp-hsmp-01.txt | |||
| Abstract | Abstract | |||
| This draft introduces a hub & spoke multipoint LSP (short for HSMP | This draft introduces a hub & spoke multipoint LSP (short for HSMP | |||
| LSP), which allows traffic both from root to leaf through P2MP LSP | LSP), which allows traffic both from root to leaf through P2MP LSP | |||
| and also leaf to root along the co-routed reverse path. That means | and also leaf to root along the co-routed reverse path. That means | |||
| traffic entering the HSMP LSP from application/customer at the root | traffic entering the HSMP LSP from application/customer at the root | |||
| node travels downstream, exactly as if it was traveling downstream | node travels downstream, exactly as if it was traveling downstream | |||
| along a P2MP LSP to each leaf node, and traffic entering the HSMP LSP | along a P2MP LSP to each leaf node, and traffic entering the HSMP LSP | |||
| at any leaf node travels upstream along the tree to the root as if it | at any leaf node travels upstream along the tree to the root as if it | |||
| is unicast to the root, except that it follows the path of the tree | is unicast to the root, except that it follows the path of the tree | |||
| rather than ordinary unicast path. | rather than ordinary unicast to the root. | |||
| Requirements Language | Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC2119 [RFC2119]. | document are to be interpreted as described in RFC2119 [RFC2119]. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 1, line 49 ¶ | skipping to change at page 1, line 49 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on February 4, 2013. | This Internet-Draft will expire on March 7, 2013. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2012 IETF Trust and the persons identified as the | Copyright (c) 2012 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 25 ¶ | skipping to change at page 2, line 25 ¶ | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Applications . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Applications . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3.1. Time synchronization . . . . . . . . . . . . . . . . . . . 4 | 3.1. Time synchronization scenario . . . . . . . . . . . . . . 4 | |||
| 3.2. IPTV scenario . . . . . . . . . . . . . . . . . . . . . . 4 | 3.2. VPMS scenario . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.3. P2MP PW based L2VPN (VPMS and VPLS) . . . . . . . . . . . 4 | 3.3. IPTV scenario . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Setting up HSMP LSP with LDP . . . . . . . . . . . . . . . . . 4 | 4. Setting up HSMP LSP with LDP . . . . . . . . . . . . . . . . . 5 | |||
| 4.1. Support for HSMP LSP setup with LDP . . . . . . . . . . . 5 | 4.1. Support for HSMP LSP setup with LDP . . . . . . . . . . . 5 | |||
| 4.2. HSMP FEC Elements . . . . . . . . . . . . . . . . . . . . 5 | 4.2. HSMP FEC Elements . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.3. Using the HSMP FEC Elements . . . . . . . . . . . . . . . 6 | 4.3. Using the HSMP FEC Elements . . . . . . . . . . . . . . . 6 | |||
| 4.3.1. HSMP LSP Label Map . . . . . . . . . . . . . . . . . . 6 | 4.3.1. HSMP LSP Label Map . . . . . . . . . . . . . . . . . . 6 | |||
| 4.3.2. HSMP LSP Label Withdraw . . . . . . . . . . . . . . . 8 | 4.3.2. HSMP LSP Label Withdraw . . . . . . . . . . . . . . . 8 | |||
| 4.3.3. HSMP LSP upstream LSR change . . . . . . . . . . . . . 8 | 4.3.3. HSMP LSP upstream LSR change . . . . . . . . . . . . . 9 | |||
| 5. HSMP LSP on a LAN . . . . . . . . . . . . . . . . . . . . . . 9 | 5. HSMP LSP on a LAN . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 6. Redundancy considerations . . . . . . . . . . . . . . . . . . 9 | 6. Redundancy considerations . . . . . . . . . . . . . . . . . . 9 | |||
| 7. Co-routed path exceptions . . . . . . . . . . . . . . . . . . 9 | 7. Co-routed path exceptions . . . . . . . . . . . . . . . . . . 9 | |||
| 8. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | |||
| 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 10 | 10. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 11.1. Normative references . . . . . . . . . . . . . . . . . . . 10 | 11.1. Normative references . . . . . . . . . . . . . . . . . . . 10 | |||
| 11.2. Informative References . . . . . . . . . . . . . . . . . . 10 | 11.2. Informative References . . . . . . . . . . . . . . . . . . 11 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 1. Introduction | 1. Introduction | |||
| The point-to-multipoint LSP defined in [RFC6388] allows traffic to | The point-to-multipoint LSP defined in [RFC6388] allows traffic to | |||
| transmit from root to several leaf nodes, and multipoint-to- | transmit from root to several leaf nodes, and multipoint-to- | |||
| multipoint LSP allows traffic from every node to transmit to every | multipoint LSP allows traffic from every node to transmit to every | |||
| other node. This draft introduces a hub & spoke multipoint LSP | other node. This draft introduces a hub & spoke multipoint LSP | |||
| (short for HSMP LSP), which allows traffic both from root to leaf | (short for HSMP LSP), which allows traffic both from root to leaf | |||
| through P2MP LSP and also leaf to root along the co-routed reverse | through P2MP LSP and also leaf to root along the co-routed reverse | |||
| path. That means traffic entering the HSMP LSP at the root node | path. That means traffic entering the HSMP LSP at the root node | |||
| travels downstream, exactly as if it was traveling downstream along a | travels downstream, exactly as if it was traveling downstream along a | |||
| P2MP LSP, and traffic entering the HSMP LSP at any other node travels | P2MP LSP, and traffic entering the HSMP LSP at any other node travels | |||
| upstream along the tree to the root. A packet traveling upstream | upstream along the tree to the root. A packet traveling upstream | |||
| should be thought of as being unicast to the root, except that it | should be thought of as being unicast to the root, except that it | |||
| follows the path of the tree rather than ordinary unicast path. | follows the path of the tree rather than ordinary unicast to the | |||
| root. | ||||
| 2. Terminology | 2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| This document uses some terms and acronyms as follows: | This document uses some terms and acronyms as follows: | |||
| mLDP: Multipoint extensions for LDP | mLDP: Multipoint extensions for LDP | |||
| skipping to change at page 4, line 5 ¶ | skipping to change at page 4, line 6 ¶ | |||
| 3. Applications | 3. Applications | |||
| In some cases, the P2MP LSP may not have a reply path for the OAM | In some cases, the P2MP LSP may not have a reply path for the OAM | |||
| message (e.g, LSP Ping). If P2MP LSP is provided by HSMP LSP, then | message (e.g, LSP Ping). If P2MP LSP is provided by HSMP LSP, then | |||
| the upstream path could be exactly used as the OAM message reply | the upstream path could be exactly used as the OAM message reply | |||
| path. This is especially useful in the case of P2MP LSP fault | path. This is especially useful in the case of P2MP LSP fault | |||
| detection, performance measurement, root node redundancy and etc. | detection, performance measurement, root node redundancy and etc. | |||
| There are several other applications that could take advantage of | There are several other applications that could take advantage of | |||
| such kind of LDP based HSMP LSP as described below. | such kind of LDP based HSMP LSP as described below. | |||
| 3.1. Time synchronization | 3.1. Time synchronization scenario | |||
| [IEEE1588] over MPLS is defined in [I-D.ietf-tictoc-1588overmpls]. | [IEEE1588] over MPLS is defined in [I-D.ietf-tictoc-1588overmpls]. | |||
| It is required that the LSP used to transport PTP event message | It is required that the LSP used to transport PTP event message | |||
| between a Master Clock and a Slave Clock and the LSP between the same | between a Master Clock and a Slave Clock, and the LSP between the | |||
| Slave Clock and Master Clock must be co-routed. By using point-to- | same Slave Clock and Master Clock must be co-routed. By using point- | |||
| multipoint technology to transmit PTP event messages from Master | to-multipoint technology to transmit PTP event messages from Master | |||
| Clock at root side to Slave Clock at leaf side will greatly improve | Clock at root side to Slave Clock at leaf side will greatly improve | |||
| the bandwidth usage. Unfortunately current point-to-multipoint LSP | the bandwidth usage. Unfortunately current point-to-multipoint LSP | |||
| only provides unidirectional path from root to leaf, which cannot | only provides unidirectional path from root to leaf, which cannot | |||
| provide a co-routed reverse path for the PTP messages. LDP based | provide a co-routed reverse path for the PTP event messages. LDP | |||
| HSMP LSP described in this draft provides unidirectional point-to- | based HSMP LSP described in this draft provides unidirectional point- | |||
| multipoint LSP from root to leaf and co-routed reverse path from leaf | to-multipoint LSP from root to leaf and co-routed reverse path from | |||
| to root. | leaf to root. | |||
| 3.2. IPTV scenario | ||||
| The mLDP based HSMP LSP can also be applied in a typical IPTV | ||||
| scenario. There is usually only one location with senders but there | ||||
| are many receiver locations. If IGMP is used for signaling between | ||||
| senders as IGMP querier and receivers, the IGMP messages from the | ||||
| receivers are travelling only from the leaves to the root (and from | ||||
| root towards leaves) but not from leaf to leaf. In addition traffic | ||||
| from the root is only replicated towards the leaves. Then leaf node | ||||
| receiving IGMP message (for SSM case) will join HSMP LSP, and then | ||||
| send IGMP message upstream to root along HSMP LSP. Note that in | ||||
| above case, there is no node redundancy for IGMP querier. | ||||
| 3.3. P2MP PW based L2VPN (VPMS and VPLS) | 3.2. VPMS scenario | |||
| Point to multipoint PW described in [I-D.ietf-pwe3-p2mp-pw] requires | Point to multipoint PW described in [I-D.ietf-pwe3-p2mp-pw] requires | |||
| to setup reverse path from leaf node (referred as egress PE) to root | to setup reverse path from leaf node (referred as egress PE) to root | |||
| node (referred as ingress PE), if HSMP LSP is used to multiplex P2MP | node (referred as ingress PE), if HSMP LSP is used to multiplex P2MP | |||
| PW, the reverse path can also be multiplexed to HSMP upstream path to | PW, the reverse path can also be multiplexed to HSMP upstream path to | |||
| avoid setup independent reverse path. In that case, the operational | avoid setup independent reverse path. In that case, the operational | |||
| cost will be reduced for maintaining only one HSMP LSP, instead of | cost will be reduced for maintaining only one HSMP LSP, instead of | |||
| P2MP LSP and n (number of leaf nodes) P2P reverse LSPs. | P2MP LSP and n (number of leaf nodes) P2P reverse LSPs. | |||
| The VPMS defined in [I-D.ietf-l2vpn-vpms-frmwk-requirements] requires | The VPMS defined in [I-D.ietf-l2vpn-vpms-frmwk-requirements] requires | |||
| reverse path from leaf to root node. The P2MP PW multiplexed to HSMP | reverse path from leaf to root node. The P2MP PW multiplexed to HSMP | |||
| LSP can provide VPMS with reverse path, without introducing | LSP can provide VPMS with reverse path, without introducing | |||
| independent reverse path from each leaf to root. | independent reverse path from each leaf to root. | |||
| 3.3. IPTV scenario | ||||
| The mLDP based HSMP LSP can also be applied in a typical IPTV | ||||
| scenario. There is usually only one location with senders but there | ||||
| are many receiver locations. If IGMP is used for signaling between | ||||
| senders as IGMP querier and receivers, the IGMP messages from the | ||||
| receivers are travelling only from the leaves to the root (and from | ||||
| root towards leaves) but not from leaf to leaf. In addition traffic | ||||
| from the root is only replicated towards the leaves. Then leaf node | ||||
| receiving IGMP message (for SSM case) will join HSMP LSP, and then | ||||
| send IGMP message upstream to root along HSMP LSP. Note that in | ||||
| above case, there is no node redundancy for IGMP querier. And the | ||||
| node redundancy for IGMP querier could be provided by two independent | ||||
| VPMS instances with HSMP applied. | ||||
| 4. Setting up HSMP LSP with LDP | 4. Setting up HSMP LSP with LDP | |||
| HSMP LSP is similar with MP2MP LSP described in [RFC6388], with the | HSMP LSP is similar with MP2MP LSP described in [RFC6388], with the | |||
| difference that the leaf LSRs can only send traffic to root node | difference that the leaf LSRs can only send traffic to root node | |||
| along the same path of traffic from root node to leaf node. | along the same path of traffic from root node to leaf node. | |||
| HSMP LSP consists of a downstream path and upstream path. The | HSMP LSP consists of a downstream path and upstream path. The | |||
| downstream path is same as MP2MP LSP, while the upstream path is only | downstream path is same as MP2MP LSP, while the upstream path is only | |||
| from leaf to root node, without communication between leaf and leaf | from leaf to root node, without communication between leaf and leaf | |||
| nodes. The transmission of packets from the root node of a HSMP LSP | nodes. The transmission of packets from the root node of a HSMP LSP | |||
| skipping to change at page 10, line 7 ¶ | skipping to change at page 10, line 12 ¶ | |||
| path is co-routed or not, if not co-routed, an indication could be | path is co-routed or not, if not co-routed, an indication could be | |||
| generated to the management system. | generated to the management system. | |||
| 8. Security Considerations | 8. Security Considerations | |||
| The same security considerations apply as for the MP2MP LSP described | The same security considerations apply as for the MP2MP LSP described | |||
| in [RFC6388]. | in [RFC6388]. | |||
| 9. IANA Considerations | 9. IANA Considerations | |||
| This document requires allocation of two new LDP FEC Element types: | This document requires allocation of two new LDP FEC Element types | |||
| from the "Label Distribution Protocol (LDP) Parameters registry" the | ||||
| "Forwarding Equivalence Class (FEC) Type Name Space": | ||||
| 1. the HSMP-upstream FEC type - requested value 0x09 | 1. the HSMP-upstream FEC type - requested value TBD | |||
| 2. the HSMP-downstream FEC type - requested value 0x10 | 2. the HSMP-downstream FEC type - requested value TBD | |||
| This document requires the assignment of new code points for the | This document requires allocation of one new code points for the HSMP | |||
| Capability Parameter TLVs, corresponding to the advertisement of the | LSP capability TLV from "Label Distribution Protocol (LDP) Parameters | |||
| HSMP LSP capabilities. The values requested are: | registry" the "TLV Type Name Space": | |||
| HSMP LSP Capability Parameter - requested value 0x050C | HSMP LSP Capability Parameter - requested value TBD | |||
| 10. Acknowledgement | 10. Acknowledgement | |||
| The author would like to thank Eric Rosen, Sebastien Jobert, Fei Su, | The author would like to thank Eric Rosen, Sebastien Jobert, Fei Su, | |||
| Edward, Mach Chen, Thomas Morin for their valuable comments. | Edward, Mach Chen, Thomas Morin for their valuable comments. | |||
| 11. References | 11. References | |||
| 11.1. Normative references | 11.1. Normative references | |||
| End of changes. 23 change blocks. | ||||
| 46 lines changed or deleted | 51 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||