< draft-shawam-pwe3-ms-pw-protection-00.txt   draft-shawam-pwe3-ms-pw-protection-01.txt >
Network Working Group H. van Helvoort Network Working Group A. Malis
Internet-Draft L. Andersson Internet-Draft L. Andersson
Intended status: Standards Track A. Malis Updates: 6870 (if approved) Huawei Technologies Co., Ltd
Expires: January 2, 2015 Huawei Technologies Co., Ltd Intended status: Standards Track H. van Helvoort
Expires: March 30, 2015 Hai Gaoming BV
J. Shin J. Shin
SK Telecom SK Telecom
L. Wang L. Wang
China Mobile China Mobile
A. D'Alessandro A. D'Alessandro
Telecom Italia Telecom Italia
July 1, 2014 September 26, 2014
Encapsulation for PSC for Multi-Segment Pseudowires S-PE Outage Protection for Static Multi-Segment Pseudowires
draft-shawam-pwe3-ms-pw-protection-00.txt draft-shawam-pwe3-ms-pw-protection-01.txt
Abstract Abstract
In RFC 6378 'MPLS Transport Profile (MPLS-TP) Linear Protection', as In MPLS and MPLS-TP environments, statically provisioned Single-
well as in the later updates of this RFC, the Protection State Segment Pseudowires (SS-PWs) are protected against tunnel failure via
Coordiantion (PSC) protocol was defined for MPLS LSPs only. This MPLS-level and MPLS-TP-level tunnel protection. With statically
draft extends RFC 6378 to be applicable for pseudowires as well. provisioned Multi-Segment Pseudowires (MS-PWs), each segment of the
MS-PW is likewise protected from tunnel failures via MPLS-level and
MPLS-TP-level tunnel protection. However, static MS-PWs are not
protected end-to-end against failure of one of the switching PEs
(S-PEs) along the path of the MS-PW. This document describes how to
achieve this protection by updating the existing procedures in RFC
6870.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 2, 2015. This Internet-Draft will expire on March 30, 2015.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Encapsulation of the PSC protocol for Pseudowires . . . . . . 2 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3
3. Security Considerations . . . . . . . . . . . . . . . . . . . 3 2. Extension to RFC 6870 to Protect Statically Provisioned SS-
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 3 PWs and MS-PWs . . . . . . . . . . . . . . . . . . . . . . . 3
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 3 3. Operational Considerations . . . . . . . . . . . . . . . . . 3
6. Normative References . . . . . . . . . . . . . . . . . . . . 3 4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 3 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 4
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
7.1. Normative References . . . . . . . . . . . . . . . . . . 4
7.2. Informative References . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction 1. Introduction
In RFC 6378 'MPLS Transport Profile (MPLS-TP) Linear Protection' As described in RFC 5659 [RFC5659], Multi-Segment Pseudowires (MS-
[RFC6378], as well as in the later updates of this RFC in 'MPLS PWs) consist of terminating PEs (T-PEs), switching PEs (S-PEs), and
Transport Profile (MPLS-TP) Linear Protection to Match the PW segments between the T-PEs at each of the MS-PW and the interior
Operational Expectations of SDH, OTN and Ethernet Transport Network S-PEs. In MPLS and MPLS-TP environments, statically provisioned
Operators' [RFC7271] and in 'Updates to MPLS Transport Profile Linear Single-Segment Pseudowires (SS-PWs) are protected against tunnel
Protection' [I-D.ietf-mpls-psc-updates], the Protection State failure via MPLS-level and MPLS-TP-level tunnel protection. With
Coordination (PSC) protocol was defined for MPLS LSPs only. statically provisioned Multi-Segment Pseudowires (MS-PWs), each PW
segment of the MS-PW is likewise protected from tunnel failure via
MPLS-level and MPLS-TP-level tunnel protection. However, PSN tunnel
protection does not protect static MS-PWs from failures of S-PEs
along the path of the MS-PW.
This draft extends RFC 6378 to be applicable for pseudowires (PWs) as RFC 6718 [RFC6718] provides a general framework for PW protection,
well. This is useful especially in the case of end-to-end static and RFC 6870 [RFC6870], which is based upon that framework, describes
provisioned Multi-Segment PWs (MS-PWs) running over MPLS-TP where we protection procedures for MS-PWs that are dynamically signaled using
can't rely on tunnel protection alone for end-to- end protection of LDP. This document describes how to achieve protection against S-PE
PWs against switching PE (S-PE) failure. failure in a static MS-PW by extending RFC 6870 to be applicable for
statically provisioned MS-PWs pseudowires (PWs) as well.
2. Encapsulation of the PSC protocol for Pseudowires 1.1. Requirements Language
The PSC protocol can be used to protect against defects on any LSP The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
(segment, link or path). Linear protection protects an LSP end-to- "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
end and if a failure is detected, switches traffic over to another document are to be interpreted as described in RFC 2119 [RFC2119].
(redundant) set of resources.
Obviously, the protected entity does not need to be of the same type 2. Extension to RFC 6870 to Protect Statically Provisioned SS-PWs and
as the protecting, it is possible to protect a link by a path. MS-PWs
Likewise it is possible to protect a PW with a MS-PW.
From a PSC protocol point of view it is possible to view a PW as a Section 3.2.3 of RFC 6718 and Section A.5 of RFC 6870 document how to
single hop LSP, and a MS-PW as a multiple hop LSP. The PSC protocol use redundant MS-PWs to protect an MS-PW against S-PE failure. The
will work just as specified in RFC 6378. procedures in these RFCs rely on LDP-based PW status signaling to
signal the state of the primary MS-PW that is being protected, and
the precedence in which redundant MS-PW(s) should be used to protect
the primary MS-PW should it fail. These procedures make use of
information carried by the PW Status TLV, which for dynamically
signaled PWs is carried by the LDP protocol.
Thus the G-ACh carrying the PSC protocol information is placed in the However, statically provisioned PWs (SS-PWs or MS-PWs) do not use the
label stack directly beneath the PW identifier. LDP protocol for PW set and signaling, rather they are provisioned by
network management systems or other means at each T-PE and S-PE along
their path. They also do not use the LDP protocol for status
signaling. Rather, they use procedures defined in RFC 6478 [RFC6478]
for status signaling via the PW OAM message using the PW Associated
Channel Header (ACH). The PW Status TLV carried via this status
signaling is itself identical to the PW Status TLV carried via LDP-
based status signaling, including the identical PW Status Codes.
3. Security Considerations Sections 6 and 7 of RFC 6870 describes the management of a primary PW
and its secondary PW(s) to provide resiliency to the failure of the
primary PW. They use status codes transmitted between endpoint T-PEs
using the PW Status TLV transmitted by LDP. For this management to
apply to statically provisioned PWs, the PW status signaling defined
in RFC 6478 MUST be used for the primary and secondary PWs. In that
case, the endpoint T-PEs can then use the PW status signaling
provided by RFC 6478 in the place of LDP-based status signaling, but
otherwise operate identically as described in RFC 6870.
The security considerations defined for RFC 6378 apply to this 3. Operational Considerations
document as well. As this is simply a re-use of RFC 6378, there are
no new security considerations.
4. IANA Considerations Because LDP is not used between the T-PEs for statically provisioned
MS-PWs, the negotiation procedures described in RFC 6870 cannot be
used. Thus, operational care must be taken so that the endpoint
T-PEs are identically provisioned regarding the use of this document,
specifically whether or not MS-PW redundancy is being used, and for
each protected MS-PW, the identity of the primary MS-PW and the
precedence of the secondary MS-PWs.
4. Security Considerations
The security considerations defined for RFC 6478 apply to this
document as well. As the security considerations in RFCs 6718 and
6870 are related to their use of LDP, they are not required for this
document.
5. IANA Considerations
There are no requests for IANA actions in this document. There are no requests for IANA actions in this document.
Note to the RFC Editor - this section can be removed before Note to the RFC Editor - this section can be removed before
publication. publication.
5. Acknowledgements 6. Acknowledgements
TBA The authors would like to thank Matthew Bocci, Yaakov Stein, and
David Sinicrope for their comments on this document.
6. Normative References 7. References
[I-D.ietf-mpls-psc-updates] 7.1. Normative References
Osborne, E., "Updates to MPLS Transport Profile Linear
Protection", draft-ietf-mpls-psc-updates-06 (work in
progress), May 2014.
[RFC6378] Weingarten, Y., Bryant, S., Osborne, E., Sprecher, N., and [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
A. Fulignoli, "MPLS Transport Profile (MPLS-TP) Linear Requirement Levels", BCP 14, RFC 2119, March 1997.
Protection", RFC 6378, October 2011.
[RFC7271] Ryoo, J., Gray, E., van Helvoort, H., D'Alessandro, A., [RFC6478] Martini, L., Swallow, G., Heron, G., and M. Bocci,
Cheung, T., and E. Osborne, "MPLS Transport Profile (MPLS- "Pseudowire Status for Static Pseudowires", RFC 6478, May
TP) Linear Protection to Match the Operational 2012.
Expectations of Synchronous Digital Hierarchy, Optical
Transport Network, and Ethernet Transport Network [RFC6870] Muley, P. and M. Aissaoui, "Pseudowire Preferential
Operators", RFC 7271, June 2014. Forwarding Status Bit", RFC 6870, February 2013.
7.2. Informative References
[RFC5659] Bocci, M. and S. Bryant, "An Architecture for Multi-
Segment Pseudowire Emulation Edge-to-Edge", RFC 5659,
October 2009.
[RFC6718] Muley, P., Aissaoui, M., and M. Bocci, "Pseudowire
Redundancy", RFC 6718, August 2012.
Authors' Addresses Authors' Addresses
Huub van Helvoort Andrew G. Malis
Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd
Email: huub.van.helvoort@huawei.com Email: agmalis@gmail.com
Loa Andersson Loa Andersson
Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd
Email: loa@mail01.huawei.com Email: loa@mail01.huawei.com
Andrew G. Malis Huub van Helvoort
Huawei Technologies Co., Ltd Hai Gaoming BV
Email: Andrew.Malis@huawei.com Email: huubatwork@gmail.com
Jongyoon Shin Jongyoon Shin
SK Telecom SK Telecom
Email: jongyoon.shin@sk.com Email: jongyoon.shin@sk.com
Lei Wang Lei Wang
China Mobile China Mobile
Email: wangleiyj@chinamobile.com Email: wangleiyj@chinamobile.com
 End of changes. 27 change blocks. 
68 lines changed or deleted 123 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/