summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4090.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4090.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4090.txt')
-rw-r--r--doc/rfc/rfc4090.txt2131
1 files changed, 2131 insertions, 0 deletions
diff --git a/doc/rfc/rfc4090.txt b/doc/rfc/rfc4090.txt
new file mode 100644
index 0000000..e95f20a
--- /dev/null
+++ b/doc/rfc/rfc4090.txt
@@ -0,0 +1,2131 @@
+
+
+
+
+
+
+Network Working Group P. Pan, Ed.
+Request for Comments: 4090 Hammerhead Systems
+Category: Standards Track G. Swallow, Ed.
+ Cisco Systems
+ A. Atlas, Ed.
+ Avici Systems
+ May 2005
+
+
+ Fast Reroute Extensions to RSVP-TE for LSP Tunnels
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2005).
+
+Abstract
+
+ This document defines RSVP-TE extensions to establish backup label-
+ switched path (LSP) tunnels for local repair of LSP tunnels. These
+ mechanisms enable the re-direction of traffic onto backup LSP tunnels
+ in 10s of milliseconds, in the event of a failure.
+
+ Two methods are defined here. The one-to-one backup method creates
+ detour LSPs for each protected LSP at each potential point of local
+ repair. The facility backup method creates a bypass tunnel to
+ protect a potential failure point; by taking advantage of MPLS label
+ stacking, this bypass tunnel can protect a set of LSPs that have
+ similar backup constraints. Both methods can be used to protect
+ links and nodes during network failure. The described behavior and
+ extensions to RSVP allow nodes to implement either method or both and
+ to interoperate in a mixed network.
+
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 1]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+Table of Contents
+
+ 1. Introduction ...................................................3
+ 1.1. Background ...............................................4
+ 2. Terminology ....................................................4
+ 3. Local Repair Techniques ........................................6
+ 3.1. One-to-One Backup ........................................6
+ 3.2. Facility Backup ..........................................7
+ 4. RSVP Extensions ................................................8
+ 4.1. FAST_REROUTE Object ......................................8
+ 4.2. DETOUR Object ...........................................11
+ 4.2.1. DETOUR Object for IPv4 Address ...................11
+ 4.2.2. DETOUR Object for IPv6 Address ...................12
+ 4.3. SESSION_ATTRIBUTE Flags .................................13
+ 4.4. RRO IPv4/IPv6 Sub-object Flags ..........................14
+ 5. Head-End Behavior .............................................15
+ 6. Point of Local Repair (PLR) Behavior ..........................16
+ 6.1. Signaling a Backup Path .................................17
+ 6.1.1. Backup Path Identification: Sender
+ Template-Specific ................................19
+ 6.1.2. Backup Path Identification: Path-Specific ........19
+ 6.2. Procedures for Backup Path Computation ..................20
+ 6.3. Signaling Backups for One-to-One Protection .............21
+ 6.3.1. Make-before-Break with Detour LSPs ...............22
+ 6.3.2. Message Handling .................................23
+ 6.3.3. Local Reroute of Traffic onto Detour LSP .........23
+ 6.4. Signaling for Facility Protection .......................24
+ 6.4.1. Discovering Downstream Labels ....................24
+ 6.4.2. Procedures for the PLR before Local Repair .......24
+ 6.4.3. Procedures for the PLR during Local Repair .......25
+ 6.4.4. Processing Backup Tunnel's ERO ...................26
+ 6.5. PLR Procedures during Local Repair ......................26
+ 6.5.1. Notification of Local Repair .....................26
+ 6.5.2. Revertive Behavior ...............................27
+ 7. Merge Node Behavior ...........................................28
+ 7.1. Handling Backup Path Messages before Failure ............28
+ 7.1.1. Merging Backup Paths using the Sender
+ Template-Specific Method .........................29
+ 7.1.2. Merging Detours using the Path-Specific Method ...29
+ 7.1.3. Message Handling for Merged Detours ..............31
+ 7.2. Handling Failures .......................................31
+ 8. Behavior of All LSRs ..........................................32
+ 8.1. Merging Detours in the Path-Specific Method .............32
+ 9. Security Considerations .......................................33
+ 10. IANA Considerations ...........................................33
+ 11. Contributors ..................................................35
+ 12. Acknowledgments ...............................................36
+ 13. Normative References ..........................................36
+
+
+
+Pan, et al. Standards Track [Page 2]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+1. Introduction
+
+ This document extends RSVP [RSVP] to establish backup label-switched
+ path (LSP) tunnels for the local repair of LSP tunnels. This
+ extension will meet the needs of real-time applications such as voice
+ over IP, for which user traffic should be redirected onto backup LSP
+ tunnels in 10s of milliseconds. This timing requirement can be
+ satisfied by computing and signaling backup LSP tunnels in advance of
+ failure and by re-directing traffic as close to the failure point as
+ possible. In this way, the time for redirection includes no path
+ computation and no signaling delays, including delays to propagate
+ failure notification between label-switched routers (LSRs). Speed of
+ repair is the primary advantage of the methods and extensions
+ described here. The term local repair is used when referring to
+ techniques that re-direct traffic to a backup LSP tunnel in response
+ to a local failure.
+
+ A protected LSP is an explicitly-routed LSP that is provided with
+ protection. The repair methods described here are applicable only to
+ explicitly-routed LSPs. Application of these methods to LSPs that
+ dynamically change their routes, such as LSPs used in unicast IGP
+ routing, is beyond the scope of this document.
+
+ Section 2 covers new terminology used in this document. Section 3
+ describes two basic methods for creating backup LSPs. Section 4
+ describes the RSVP protocol extensions to support local protection.
+ Section 5 presents the behavior of an LSR that seeks to request local
+ protection for an LSP. The behavior of a potential point of local
+ repair (PLR) is given in Section 6, which describes how to determine
+ the appropriate strategy for protecting an LSP and how to implement
+ each of the strategies. Section 7 describes the behavior of a merge
+ node, the LSR where a protected LSP and its backup LSP rejoin.
+ Finally, Section 8 discusses the required behavior of other nodes in
+ the network.
+
+ The methods discussed in this document depend upon three assumptions:
+
+ o An LSR that is on the path of a protected LSP should always
+ assume that it is a merge point. This is necessary because
+ the facility backup method does not signal backups through a
+ bypass tunnel before failure.
+
+ o If the one-to-one backup method is used and a DETOUR object
+ is included, the LSRs in the traffic-engineered network
+ should support the DETOUR object. This is necessary so that
+ the Path message containing the DETOUR object is not
+ rejected.
+
+
+
+
+Pan, et al. Standards Track [Page 3]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ o Understanding the DETOUR object is required to support the
+ path-specific method, which requires that LSRs in the
+ traffic-engineered network be capable of merging detours.
+
+1.1. Background
+
+ Several years before work began on this document, operational
+ networks had deployed two independent methods of doing fast reroute;
+ these methods are called here one-to-one backup and facility backup.
+ Vendors trying to support both methods experienced compatibility
+ problems in attempting to produce a single implementation capable of
+ interoperating with both methods. There are technical tradeoffs
+ between the methods. These tradeoffs are so topologically dependent
+ that the community has not converged on a single approach.
+
+ This document rationalizes the RSVP signaling for both methods so
+ that any implementation can recognize all fast reroute requests and
+ clearly respond. The response may be positive if the method can be
+ performed, or it may be a clear error to inform the requester to seek
+ alternate backup means. This document also allows a single
+ implementation to support both methods, thereby providing a range of
+ capabilities. The described behavior and extensions to RSVP allow
+ LERs and LSRs to implement either method or both.
+
+ While the two methods could in principle be used in a single network,
+ it is expected that operators will continue to deploy either one or
+ the other. The goal of this document is to standardize the RSVP
+ signaling so that a network composed of LSRs that implement both
+ methods or a network composed of some LSRs that support one method
+ and others that support both can properly signal among those LSRs to
+ achieve fast restoration.
+
+2. Terminology
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC2119 [RFC-WORDS].
+
+ The reader is assumed to be familiar with the terminology in [RSVP]
+ and [RSVP-TE].
+
+ LSR: Label-Switch Router.
+
+ LSP: An MPLS Label-Switched Path. In this document, an LSP will
+ always be explicitly routed.
+
+ Local Repair: Techniques used to repair LSP tunnels quickly when a
+ node or link along the LSP's path fails.
+
+
+
+Pan, et al. Standards Track [Page 4]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ PLR: Point of Local Repair. The head-end LSR of a backup tunnel
+ or a detour LSP.
+
+ One-to-One Backup: A local repair method in which a backup LSP is
+ separately created for each protected LSP at a PLR.
+
+ Facility Backup: A local repair method in which a bypass tunnel is
+ used to protect one or more protected LSPs that traverse the
+ PLR, the resource being protected, and the Merge Point in
+ that order.
+
+ Protected LSP: An LSP is said to be protected at a given hop if it
+ has one or multiple associated backup tunnels originating at
+ that hop.
+
+ Detour LSP: The LSP that is used to re-route traffic around a
+ failure in one-to-one backup.
+
+ Bypass Tunnel: An LSP that is used to protect a set of LSPs
+ passing over a common facility.
+
+ Backup Tunnel: The LSP that is used to backup up one of the many
+ LSPs in many-to-one backup.
+
+ NHOP Bypass Tunnel: Next-Hop Bypass Tunnel. A backup tunnel that
+ bypasses a single link of the protected LSP.
+
+ NNHOP Bypass Tunnel: Next-Next-Hop Bypass Tunnel. A backup tunnel
+ that bypasses a single node of the protected LSP.
+
+ Backup Path: The LSP that is responsible for backing up one
+ protected LSP. A backup path refers to either a detour LSP
+ or a backup tunnel.
+
+ MP: Merge Point. The LSR where one or more backup tunnels rejoin
+ the path of the protected LSP downstream of the potential
+ failure. The same LSR may be both an MP and a PLR
+ simultaneously.
+
+ DMP: Detour Merge Point. In the case of one-to-one backup, this
+ is an LSR where multiple detours converge. Only one detour
+ is signaled beyond that LSR.
+
+ Reroutable LSP: Any LSP for which the head-end LSR requests local
+ protection. See Section 5 for more detail.
+
+ CSPF: Constraint-based Shortest Path First.
+
+
+
+
+Pan, et al. Standards Track [Page 5]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ SRLG Disjoint: A path is considered to be SRLG disjoint from a
+ given link or node if the path does not use any links or
+ nodes which belong to the same SRLG as that given link or
+ node.
+
+3. Local Repair Techniques
+
+ Two different methods for local protection are described. In the
+ one-to-one backup method, a PLR computes a separate backup LSP,
+ called a detour LSP, for each LSP that the PLR protects. In the
+ facility backup method, the PLR creates a single bypass tunnel that
+ can be used to protect multiple LSPs.
+
+3.1. One-to-One Backup
+
+ In the one-to-one backup method, a label-switched path is established
+ that intersects the original LSP somewhere downstream of the point of
+ link or node failure. A separate backup LSP is established for each
+ LSP that is backed up.
+
+ [R1]----[R2]----[R3]------[R4]------[R5]
+ \ \ \ / \ /
+ [R6]----[R7]----[R8]------[R9]
+
+ Protected LSP: [R1->R2->R3->R4->R5]
+ R1's Backup: [R1->R6->R7->R8->R3]
+ R2's Backup: [R2->R7->R8->R4]
+ R3's Backup: [R3->R8->R9->R5]
+ R4's Backup: [R4->R9->R5]
+
+ Example 1. One-to-One Backup Technique
+
+ In the simple topology shown in Example 1, the protected LSP runs
+ from R1 to R5. R2 can provide user traffic protection by creating a
+ partial backup LSP that merges with the protected LSP at R4. We
+ refer to a partial one-to-one backup LSP [R2->R7->R8->R4] as a
+ detour.
+
+ To protect an LSP that traverses N nodes fully, there could be as
+ many as (N - 1) detours. Example 1 shows the paths for the detours
+ necessary to protect fully the LSP in the example. To minimize the
+ number of LSPs in the network, it is desirable to merge a detour back
+ to its protected LSP, when feasible. When a detour LSP intersects
+ its protected LSP at an LSR with the same outgoing interface, it will
+ be merged.
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 6]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ When a failure occurs along the protected LSP, the PLR redirects
+ traffic onto the local detour. For instance, if the link [R2->R3]
+ fails in Example 1, R2 will switch traffic received from R1 onto the
+ protected LSP along link [R2->R7], using the label received when R2
+ created the detour. When R4 receives traffic with the label provided
+ for R2's detour, R4 will switch that traffic onto link [R4-R5], using
+ the label received from R5 for the protected LSP. At no point does
+ the depth of the label stack increase as a result of the detour.
+ While R2 is using its detour, traffic will take the path
+ [R1->R2->R7->R8->R4->R5].
+
+3.2. Facility Backup
+
+ The facility backup method takes advantage of the MPLS label stack.
+ Instead of creating a separate LSP for every backed-up LSP, a single
+ LSP is created that serves to back up a set of LSPs. We call such an
+ LSP tunnel a bypass tunnel.
+
+ The bypass tunnel must intersect the path of the original LSP(s)
+ somewhere downstream of the PLR. Naturally, this constrains the set
+ of LSPs being backed up via that bypass tunnel to those that pass
+ through some common downstream node. All LSPs that pass through the
+ point of local repair and through this common node that do not also
+ use the facilities involved in the bypass tunnel are candidates for
+ this set of LSPs.
+
+ [R8]
+ \
+ [R1]---[R2]----[R3]-----[R4]---[R5]
+ \ / \
+ [R6]===[R7] [R9]
+
+ Protected LSP 1: [R1->R2->R3->R4->R5]
+ Protected LSP 2: [R8->R2->R3->R4]
+ Protected LSP 3: [R2->R3->R4->R9]
+ Bypass LSP Tunnel: [R2->R6->R7->R4]
+
+ Example 2. Facility Backup Technique
+
+ In Example 2, R2 has built a bypass tunnel that protects against the
+ failure of link [R2->R3] and node [R3]. The doubled lines represent
+ this tunnel. This technique provides a scalability improvement, in
+ that the same bypass tunnel can also be used to protect LSPs from any
+ of R1, R2, or R8 to any of R4, R5, or R9. Example 2 describes three
+ different protected LSPs that are using the same bypass tunnel for
+ protection.
+
+
+
+
+
+Pan, et al. Standards Track [Page 7]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ As with the one-to-one method, there could be as many as (N-1) bypass
+ tunnels to fully protect an LSP that traverses N nodes. However,
+ each of those bypass tunnels could protect a set of LSPs.
+
+ When a failure occurs along a protected LSP, the PLR redirects
+ traffic into the appropriate bypass tunnel. For instance, if link
+ [R2->R3] fails in Example 2, R2 will switch traffic received from R1
+ on the protected LSP onto link [R2->R6]. The label will be switched
+ for one which will be understood by R4 to indicate the protected LSP,
+ and the bypass tunnel's label will then be pushed onto the label-
+ stack of the redirected packets. If penultimate-hop-popping is used,
+ the merge point in Example 2, R4, will receive the redirected packet
+ with a label indicating the protected LSP that the packet is to
+ follow. If penultimate-hop-popping is not used, R4 will pop the
+ bypass tunnel's label and examine the label underneath to determine
+ the protected LSP that the packet is to follow. When R2 is using the
+ bypass tunnel for protected LSP 1, the traffic takes the path
+ [R1->R2->R6->R7->R4->R5]; the bypass tunnel is the connection between
+ R2 and R4.
+
+4. RSVP Extensions
+
+ This specification defines two additional objects, FAST_REROUTE and
+ DETOUR, to extend RSVP-TE for fast-reroute signaling. These new
+ objects are backward compatible with LSRs that do not recognize them
+ (see section 3.10 in [RSVP]). Both objects can only be carried in
+ RSVP Path messages.
+
+ The SESSION_ATTRIBUTE and RECORD_ROUTE objects are also extended to
+ support bandwidth and node protection features.
+
+4.1. FAST_REROUTE Object
+
+ The FAST_REROUTE object is used to control the backup used for the
+ protected LSP. This specifies the setup and hold priorities, session
+ attribute filters, and bandwidth to be used for protection. It also
+ allows a specific local protection method to be requested. This
+ object MUST only be inserted into the PATH message by the head-end
+ LER and MUST NOT be changed by downstream LSRs. The FAST_REROUTE
+ object has the following format:
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 8]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ Class-Num = 205
+ C-Type = 1
+
+ 0 1 2 3
+ +-------------+-------------+-------------+-------------+
+ | Length (bytes) | Class-Num | C-Type |
+ +-------------+-------------+-------------+-------------+
+ | Setup Prio | Hold Prio | Hop-limit | Flags |
+ +-------------+-------------+-------------+-------------+
+ | Bandwidth |
+ +-------------+-------------+-------------+-------------+
+ | Include-any |
+ +-------------+-------------+-------------+-------------+
+ | Exclude-any |
+ +-------------+-------------+-------------+-------------+
+ | Include-all |
+ +-------------+-------------+-------------+-------------+
+
+ Setup Priority
+
+ The priority of the backup path with respect to taking
+ resources, in the range 0 to 7. The value 0 is the highest
+ priority. Setup Priority is used in deciding whether this
+ session can preempt another session. See [RSVP-TE] for the
+ usage on priority.
+
+ Holding Priority
+
+ The priority of the backup path with respect to holding
+ resources, in the range 0 to 7. The value 0 is the highest
+ priority. Holding Priority is used in deciding whether this
+ session can be preempted by another session. See [RSVP-TE] for
+ the usage on priority.
+
+ Hop-limit
+
+ The maximum number of extra hops the backup path is allowed to
+ take, from current node (a PLR) to an MP, with PLR and MP
+ excluded from the count. For example, hop-limit of 0 means
+ that only direct links between PLR and MP can be considered.
+
+ Flags
+
+ 0x01 One-to-One Backup Desired
+
+ Requests protection via the one-to-one backup method.
+
+
+
+
+
+Pan, et al. Standards Track [Page 9]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ 0x02 Facility Backup Desired
+
+ Requests protection via the facility backup method.
+
+ Bandwidth
+
+ Bandwidth estimate; 32-bit IEEE floating point integer, in
+ bytes per second.
+
+ Exclude-any
+
+ A 32-bit vector representing a set of attribute filters
+ associated with a backup path, any of which renders a link
+ unacceptable.
+
+ Include-any
+
+ A 32-bit vector representing a set of attribute filters
+ associated with a backup path, any of which renders a link
+ acceptable (with respect to this test). A null set (all bits
+ set to zero) automatically passes.
+
+ Include-all
+
+ A 32-bit vector representing a set of attribute filters
+ associated with a backup path, all of which must be present for
+ a link to be acceptable (with respect to this test). A null
+ set (all bits set to zero) automatically passes.
+
+ The two high-order bits of the Class-Num (11) cause nodes that do not
+ understand the object to ignore it and pass it forward unchanged.
+
+ For informational purposes, a different C-Type value and format for
+ the FAST_REROUTE object are specified below. This is used by legacy
+ implementations. The meaning of the fields is the same as that
+ described for C-Type 1.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 10]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ Class-Num = 205
+ C-Type = 7
+
+ 0 1 2 3
+ +-------------+-------------+-------------+-------------+
+ | Length (bytes) | Class-Num | C-Type |
+ +-------------+-------------+-------------+-------------+
+ | Setup Prio | Hold Prio | Hop-limit | Reserved |
+ +-------------+-------------+-------------+-------------+
+ | Bandwidth |
+ +-------------+-------------+-------------+-------------+
+ | Include-any |
+ +-------------+-------------+-------------+-------------+
+ | Exclude-any |
+ +-------------+-------------+-------------+-------------+
+
+ Unknown C-Types should be treated as specified in [RSVP] Section
+ 3.10.
+
+4.2. DETOUR Object
+
+ The DETOUR object is used in the one-to-one backup method to identify
+ detour LSPs.
+
+4.2.1. DETOUR Object for IPv4 Address
+
+ Class-Num = 63
+ C-Type = 7
+
+ 0 1 2 3
+ +-------------+-------------+-------------+-------------+
+ | Length (bytes) | Class-Num | C-Type |
+ +-------------+-------------+-------------+-------------+
+ | PLR_ID 1 |
+ +-------------+-------------+-------------+-------------+
+ | Avoid_Node_ID 1 |
+ +-------------+-------------+-------------+-------------+
+ // .... //
+ +-------------+-------------+-------------+-------------+
+ | PLR_ID n |
+ +-------------+-------------+-------------+-------------+
+ | Avoid_Node_ID n |
+ +-------------+-------------+-------------+-------------+
+
+ PLR_ID (1 - n)
+
+ IPv4 address identifying the PLR that is the beginning point of
+ the detour. Any local address on the PLR can be used.
+
+
+
+Pan, et al. Standards Track [Page 11]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ Avoid_Node_ID (1 - n)
+
+ IPv4 address identifying the immediate downstream node that the
+ PLR is trying to avoid. Any local address of the downstream
+ node can be used. This field is mandatory and is used by the
+ MP for the merging rules discussed below.
+
+4.2.2. DETOUR Object for IPv6 Address
+
+ Class-Num = 63
+ C-Type = 8
+
+ 0 1 2 3
+ +-------------+-------------+-------------+-------------+
+ | Length (bytes) | Class-Num | C-Type |
+ +-------------+-------------+-------------+-------------+
+ | PLR_ID 1 |
+ +-------------+-------------+-------------+-------------+
+ | PLR_ID 1 (continued) |
+ +-------------+-------------+-------------+-------------+
+ | PLR_ID 1 (continued) |
+ +-------------+-------------+-------------+-------------+
+ | PLR_ID 1 (continued) |
+ +-------------+-------------+-------------+-------------+
+ | Avoid_Node_ID 1 |
+ +-------------+-------------+-------------+-------------+
+ | Avoid_Node_ID 1 (continued) |
+ +-------------+-------------+-------------+-------------+
+ | Avoid_Node_ID 1 (continued) |
+ +-------------+-------------+-------------+-------------+
+ | Avoid_Node_ID 1 (continued) |
+ +-------------+-------------+-------------+-------------+
+ // .... //
+ +-------------+-------------+-------------+-------------+
+
+ PLR_ID (1 - n)
+
+ An IPv6 128-bit unicast host address identifying the PLR that
+ is the beginning point of the detour. Any local address on the
+ PLR can be used.
+
+ Avoid_Node_ID (1 - n)
+
+ An IPv6 128-bit unicast host address identifying the immediate
+ downstream node that the PLR is trying to avoid. Any local
+ address on the downstream node can be used. This field is
+
+
+
+
+
+Pan, et al. Standards Track [Page 12]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ mandatory and is used by the MP for the merging rules discussed
+ below.
+
+ There can be more than one pair of (PLR_ID, Avoid_Node_ID) entries in
+ a DETOUR object. If detour merging is desired, after each merging
+ operation, the Detour Merge Point should combine all the merged
+ detours in subsequent Path messages.
+
+ The high-order bit of the Class-Num is zero; LSRs that do not support
+ the DETOUR objects MUST reject any Path message containing a DETOUR
+ object and send a PathErr to notify the PLR. This PathErr SHOULD be
+ generated as specified in [RSVP] for unknown objects with a Class-Num
+ of the form "0bbbbbbb".
+
+ Unknown C-Types should be treated as specified in [RSVP] Section
+ 3.10.
+
+4.3. SESSION_ATTRIBUTE Flags
+
+ To request bandwidth and node protection explicitly, two new flags
+ are defined in the SESSION_ATTRIBUTE object.
+
+ For both C-Type 1 and 7, the SESSION_ATTRIBUTE object currently has
+ the following flags defined [RSVP-TE]:
+
+ Local protection desired: 0x01
+
+ This flag permits transit routers to use a local repair
+ mechanism that may result in violation of the explicit route
+ object. When a fault is detected on an adjacent downstream
+ link or node, a transit node may reroute traffic for fast
+ service restoration.
+
+ Label recording desired: 0x02
+
+ This flag indicates that label information should be included
+ when doing a route record.
+
+ SE Style desired: 0x04
+
+ This flag indicates that the tunnel ingress node may choose to
+ reroute this tunnel without tearing it down. A tunnel egress
+ node SHOULD use the SE Style when responding with a Resv
+ message. When requesting fast reroute, the head-end LSR SHOULD
+ set this flag; this is not necessary for the path-specific
+ method of the one-to-one backup method.
+
+
+
+
+
+Pan, et al. Standards Track [Page 13]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ The following new flags are defined:
+
+ Bandwidth protection desired: 0x08
+
+ This flag indicates to the PLRs along the protected LSP path
+ that a backup path with a bandwidth guarantee is desired. The
+ bandwidth to be guaranteed is that of the protected LSP, if no
+ FAST_REROUTE object is included in the PATH message; if a
+ FAST_REROUTE object is in the PATH message, then the bandwidth
+ specified therein is to be guaranteed.
+
+ Node protection desired: 0x10
+
+ This flag indicates to the PLRs along a protected LSP path that
+ a backup path that bypasses at least the next node of the
+ protected LSP is desired.
+
+4.4. RRO IPv4/IPv6 Sub-object Flags
+
+ To report whether bandwidth and/or node protection are provided as
+ requested, we define two new flags in the RRO IPv4 sub-object.
+
+ The RRO IPv4 and IPv6 address sub-objects currently have the
+ following flags defined [RSVP-TE]:
+
+ Local protection available: 0x01
+
+ Indicates that the link downstream of this node is protected
+ via a local repair mechanism, which can be either one-to-one or
+ facility backup.
+
+ Local protection in use: 0x02
+
+ Indicates that a local repair mechanism is in use to maintain
+ this tunnel (usually in the face of an outage of the link it
+ was previously routed over, or an outage of the neighboring
+ node).
+
+ Two new flags are defined:
+
+ Bandwidth protection: 0x04
+
+ The PLR will set this bit when the protected LSP has a backup
+ path that is guaranteed to provide the desired bandwidth that
+ is specified in the FAST_REROUTE object or the bandwidth of the
+ protected LSP, if no FAST_REROUTE object was included. The PLR
+ may set this whenever the desired bandwidth is guaranteed; the
+ PLR MUST set this flag when the desired bandwidth is guaranteed
+
+
+
+Pan, et al. Standards Track [Page 14]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ and the "bandwidth protection desired" flag was set in the
+ SESSION_ATTRIBUTE object. If the requested bandwidth is not
+ guaranteed, the PLR MUST NOT set this flag.
+
+ Node protection: 0x08
+
+ The PLR will set this bit when the protected LSP has a backup
+ path that provides protection against a failure of the next LSR
+ along the protected LSP. The PLR may set this whenever node
+ protection is provided by the protected LSP's backup path; the
+ PLR MUST set this flag when the node protection is provided and
+ the "node protection desired" flag was set in the
+ SESSION_ATTRIBUTE object. If node protection is not provided,
+ the PLR MUST NOT set this flag. Thus, if a PLR could only set
+ up a link-protection backup path, the "Local protection
+ available" bit will be set, but the "Node protection" bit will
+ be cleared.
+
+5. Head-End Behavior
+
+ The head-end of an LSP determines whether local protection should be
+ requested for that LSP and which local protection method is desired
+ for the protected LSP. The head-end also determines what constraints
+ should be requested for the backup paths of a protected LSP.
+
+ To indicate that an LSP should be locally protected, the head-end LSR
+ MUST either set the "local protection desired" flag in the
+ SESSION_ATTRIBUTE object or include a FAST_REROUTE object in the PATH
+ message, or both. The "local protection desired" flag in the
+ SESSION_ATTRIBUTE object SHOULD always be set. If a head-end LSR
+ signals a FAST_REROUTE object, it MUST be stored for Path refreshes.
+
+ The head-end LSR of a protected LSP MUST set the "label recording
+ desired" flag in the SESSION_ATTRIBUTE object. This facilitates the
+ use of the facility backup method. If node protection is desired,
+ the head-end LSR should set the "node protection desired" flag in the
+ SESSION_ATTRIBUTE object; otherwise, this flag should be cleared.
+ Similarly, if a guarantee of bandwidth protection is desired, then
+ the "bandwidth protection desired" flag in the SESSION_ATTRIBUTE
+ object should be set; otherwise, this flag should be cleared. If the
+ head-end LSR determines that control of the backup paths for the
+ protected LSP is desired, then the LSR should include the
+ FAST_REROUTE object. The PLRs will use the attribute filters,
+ bandwidth, hop-limit, and priorities to determine the backup paths.
+
+ If the head-end LSR desires that the one-to-one backup method be used
+ for the protected LSP, then the head-end LSR should include a
+ FAST_REROUTE object and set the "one-to-one backup desired" flag. If
+
+
+
+Pan, et al. Standards Track [Page 15]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ the head-end LSR desires that the protected LSP be protected via the
+ facility backup method, then the head-end LSR should include a
+ FAST_REROUTE object and set the "facility backup desired" flag. The
+ lack of a FAST_REROUTE object, or having both these flags clear,
+ should be treated by PLRs as a lack of preference. If both flags are
+ set, a PLR may use either method or both.
+
+ The head-end LSR of a protected LSP MUST support the additional flags
+ defined in Section 4.4 being set or clear in the RRO IPv4 and IPv6
+ sub-objects. The head-end LSR of a protected LSP MUST support the
+ RRO Label sub-object.
+
+ If the head-end LSR of an LSP determines that local protection is
+ newly desired, this SHOULD be signaled via make-before-break.
+
+6. Point of Local Repair (PLR) Behavior
+
+ Every LSR along a protected LSP (except the egress) MUST follow the
+ PLR behavior described in this document.
+
+ A PLR SHOULD support the FAST_REROUTE object, the "local protection
+ desired", "label recording desired", "node protection desired", and
+ "bandwidth protection desired" flags in the SESSION_ATTRIBUTE object,
+ and the "local protection available", "local protection in use",
+ "bandwidth protection", and "node protection" flags in the RRO IPv4
+ and IPv6 sub-objects. A PLR MAY support the DETOUR object.
+
+ A PLR MUST consider an LSP to have asked for local protection if the
+ "local protection desired" flag is set in the SESSION_ATTRIBUTE
+ object and/or the FAST_REROUTE object is included. If the
+ FAST_REROUTE object is included, a PLR SHOULD consider providing
+ one-to-one protection if the "one-to-one desired" is set, and it
+ SHOULD consider providing facility backup if the "facility backup
+ desired" flag is set. If the "node protection desired" flag is set,
+ the PLR SHOULD try to provide node protection; if this is not
+ feasible, the PLR SHOULD then try to provide link protection. If the
+ "bandwidth protection guaranteed" flag is set, the PLR SHOULD try to
+ provide a bandwidth guarantee; if this is not feasible, the PLR
+ SHOULD then try to provide a backup without a guarantee of the full
+ bandwidth.
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 16]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ The following treatment for the RRO IPv4 or IPv6 sub-object's flags
+ must be followed if an RRO is included in the protected LSP's RESV
+ message. Based on this additional information, the head-end may take
+ appropriate actions.
+
+ - Until a PLR has a backup path available, the PLR MUST clear the
+ relevant four flags in the corresponding RRO IPv4 or IPv6 sub-
+ object.
+
+ - Whenever the PLR has a backup path available, the PLR MUST set the
+ "local protection available" flag. If no established one-to-one
+ backup LSP or bypass tunnel exists, or if the one-to-one LSP and
+ the bypass tunnel is in "DOWN" state, the PLR MUST clear the
+ "local protection available" flag in its IPv4 (or IPv6) address
+ sub-object of the RRO and SHOULD send the updated RESV.
+
+ - The PLR MUST clear the "local protection in use" flag unless it is
+ actively redirecting traffic into the backup path instead of along
+ the protected LSP.
+
+ - The PLR SHOULD also set the "node protection" flag if the backup
+ path protects against the failure of the immediate downstream
+ node, and, if the path does not, the PLR SHOULD clear the "node
+ protection" flag. This MUST be done if the "node protection
+ desired" flag was set in the SESSION_ATTRIBUTE object.
+
+ - The PLR SHOULD set the "bandwidth protection" flag if the backup
+ path offers a bandwidth guarantee, and, if the path does not, the
+ PLR SHOULD clear the "bandwidth protection" flag. This MUST be
+ done if the "bandwidth protection desired" flag was set in the
+ SESSION_ATTRIBUTE object.
+
+6.1. Signaling a Backup Path
+
+ A number of objectives must be met to obtain a satisfactory signaling
+ solution. These are summarized as follows:
+
+ 1. Unambiguously and uniquely identifying backup paths.
+
+ 2. Unambiguously associating protected LSPs with their backup
+ paths.
+
+ 3. Working with both global and non-global label spaces.
+
+ 4. Allowing merging of backup paths.
+
+ 5. Maintaining RSVP state during and after fail-over.
+
+
+
+
+Pan, et al. Standards Track [Page 17]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ LSP tunnels are identified by a combination of the SESSION and
+ SENDER_TEMPLATE objects [RSVP-TE]. The relevant fields are as
+ follows.
+
+ IPv4 (or IPv6) tunnel end point address
+
+ IPv4 (or IPv6) address of the egress node for the tunnel.
+
+ Tunnel ID
+
+ A 16-bit identifier used in the SESSION that remains constant
+ over the life of the tunnel.
+
+ Extended Tunnel ID
+
+ A 32-bit (IPv4) or 128-bit (IPv6) identifier used in the
+ SESSION that remains constant over the life of the tunnel.
+ Normally it is set to all zero. Ingress nodes that wish to
+ narrow the scope of a SESSION to the ingress-egress pair may
+ place their IP address here as a globally unique identifier.
+
+ IPv4 (or IPv6) tunnel sender address
+
+ IPv4 (or IPv6) address for a sender node.
+
+ LSP ID
+
+ A 16-bit identifier used in the SENDER_TEMPLATE and the
+ FILTER_SPEC, which can be changed to allow a sender to share
+ resources with itself.
+
+ The first three of these are in the SESSION object and are the basic
+ identification for the tunnel. Setting the "Extended Tunnel ID" to
+ an IP address of the head-end LSR allows the scope of the SESSION to
+ be narrowed to only LSPs sent by that LSR. A backup LSP is
+ considered part of the same session as its protected LSP; therefore
+ these three cannot be varied.
+
+ The last two are in the SENDER_TEMPLATE. Multiple LSPs in the same
+ SESSION may be protected and may take different routes; this is
+ common when a tunnel is rerouted using make-before-break. A backup
+ path must be clearly identified with its protected LSP to allow
+ correct merging and state treatment. Therefore, a backup path must
+ inherit its LSP ID from the associated protected LSP. Thus, the only
+ field in the SESSION and SENDER_TEMPLATE objects that could be varied
+ between a backup path and a protected LSP is the "IPv4 (or IPv6)
+ tunnel sender address" in the SENDER_TEMPLATE.
+
+
+
+
+Pan, et al. Standards Track [Page 18]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ There are two different methods to uniquely identify a backup path,
+ described below.
+
+6.1.1. Backup Path Identification: Sender Template-Specific
+
+ In this approach, the SESSION object and the LSP_ID are copied from
+ the protected LSP. The "IPv4 tunnel sender address" is set to an
+ address of the PLR. If the head-end of a tunnel is also acting as
+ the PLR, it MUST choose an IP address different from the one used in
+ the SENDER_TEMPLATE of the original LSP tunnel.
+
+ When the sender template-specific approach is used, the protected
+ LSPs and the backup paths SHOULD use the Shared Explicit (SE) style.
+ This allows bandwidth sharing between multiple backup paths. The
+ backup paths and the protected LSP MAY be merged by the Detour Merge
+ Points, when the ERO from the MP to the egress is the same on each
+ LSP to be merged, as specified in [RSVP-TE].
+
+6.1.2. Backup Path Identification: Path-Specific
+
+ In this approach, rather than vary the SESSION or SENDER_TEMPLATE
+ objects, an implementation uses a new object, the DETOUR object, to
+ distinguish between PATH messages for a backup path and the protected
+ LSP.
+
+ Thus, the backup paths use the same SESSION and SENDER_TEMPLATE
+ objects as the ones used in the protected LSP. The presence of a
+ DETOUR object in Path messages signifies a backup path; the presence
+ of a FAST_REROUTE object and/or the "local protection requested" flag
+ in the SESSION_ATTRIBUTE object indicates a protected LSP.
+
+ In the path message-specific approach, an LSR merges Path messages
+ that are received with the same SESSION and SENDER_TEMPLATE objects
+ and that also have the same next-hop object. Without this behavior,
+ it would be impossible to associate the multiple RESV messages with
+ the backup paths. However, this merging behavior reduces the total
+ number of RSVP states inside the network at the expense of merging
+ LSPs with different EROs.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 19]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+6.2. Procedures for Backup Path Computation
+
+ Before a PLR can create a detour or a bypass tunnel, the desired
+ explicit route must be determined. This can be done using a CSPF
+ (Constraint-based Shortest Path First) computation. Before this CSPF
+ computation, the following information must be collected at a PLR:
+
+ - The list of downstream nodes that the protected LSP passes
+ through. This information is readily available from the
+ RECORD_ROUTE objects during LSP setup. This information is also
+ available from the ERO. However, if the ERO contains loose
+ sub-objects, the ERO may not provide adequate information.
+
+ - The downstream links/nodes that we want to protect against.
+ Once again, this information is learned from the RECORD_ROUTE
+ objects. Whether node protection is desired is determined by
+ the "node protection" flag in the SESSION_ATTRIBUTE object and
+ local policy.
+
+ - The upstream uni-directional links that the protected LSP passes
+ through. This information is learned from the RECORD_ROUTE
+ objects; it is only needed for setting up one-to-one protection.
+ In the path-specific method, it is necessary to avoid the detour
+ and the protected LSP sharing a common next-hop upstream of the
+ failure. In the sender template-specific mode, this same
+ restriction is necessary to avoid sharing bandwidth between the
+ detour and its protected LSP, where that bandwidth has been
+ reserved only once.
+
+ - The link attribute filters to be applied. These are derived
+ from the FAST_REROUTE object, if it is included in the PATH
+ message, or from the SESSION_ATTRIBUTE object otherwise.
+
+ - The bandwidth to be used is found in the FAST_REROUTE object, if
+ it is included in the PATH message, or in the SESSION_ATTRIBUTE
+ object otherwise. Local policy may modify the bandwidth to be
+ reserved.
+
+ - The hop-limit, if a FAST_REROUTE object was included in the PATH
+ message.
+
+ When a CSPF algorithm is used to compute the backup route, the
+ following constraints must be satisfied:
+
+ - For detour LSPs, the destination MUST be the tail-end of the
+ protected LSP. For bypass tunnels (Section 7), the destination
+ MUST be the address of the MP.
+
+
+
+
+Pan, et al. Standards Track [Page 20]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ - When one-to-one protection is set up by using the path-specific
+ method, a detour MUST not traverse the upstream links of the
+ protected LSP in the same direction. This prevents the
+ possibility of early merging of the detour into the protected
+ LSP. When one-to-one protection is set up using the sender-
+ template-specific method, a detour should not traverse the
+ upstream links of the protected LSP in the same direction. This
+ prevents sharing the bandwidth between a protected LSP and its
+ backup upstream of the failure where the bandwidth would be used
+ twice in the event of a failure.
+
+ - The backup LSP cannot traverse the downstream node and/or link
+ whose failure is being protected against. Note that if the PLR
+ is the penultimate hop, node protection is not possible, and
+ only the downstream link can be avoided. The backup path may be
+ computed to be SRLG disjoint from the downstream node and/or
+ link being avoided.
+
+ - The backup path must satisfy the resource requirements of the
+ protected LSP. This includes the link attribute filters,
+ bandwidth, and hop limits determined from the FAST_REROUTE
+ object and the SESSION_ATTRIBUTE object.
+
+ If such computation succeeds, the PLR should attempt to establish a
+ backup path. The PLR may schedule a re-computation at a later time
+ to discover better paths that might have emerged. If for any reason,
+ the PLR is unable to bring up a backup path, it must schedule a retry
+ at a later time.
+
+6.3. Signaling Backups for One-to-One Protection
+
+ Once a PLR has decided to protect an LSP locally with one-to-one
+ backup and has identified the desired path, it signals for the
+ detour.
+
+ The following describes the transformation to be performed upon the
+ protected LSP's PATH message to create the detour LSP's PATH message.
+
+ - If the sender template-specific method is to be used, then the
+ PLR MUST change the "IPv4 (or IPv6) tunnel sender address" of
+ the SENDER_TEMPLATE to an address belonging to the PLR that is
+ not the same as that used for the protected LSP. Additionally,
+ the DETOUR object MAY be added to the PATH message.
+
+ - If the path-specific method is to be used, then the PLR MUST add
+ a DETOUR object to the PATH message.
+
+
+
+
+
+Pan, et al. Standards Track [Page 21]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ - The SESSION_ATTRIBUTE flags "Local protection desired",
+ "Bandwidth protection desired", and "Node protection desired"
+ MUST be cleared. The "Label recording desired" flag MAY be
+ modified. If the Path Message contained a FAST_REROUTE object
+ and the ERO is not completely strict, the Include-any, Exclude-
+ any, and Include-all fields of the FAST_REROUTE object SHOULD be
+ copied to the corresponding fields of the SESSION_ATTRIBUTE
+ object.
+
+ - If the protected LSP's Path message contained a FAST_REROUTE
+ object, this object MUST be removed from the detour LSP's PATH
+ message.
+
+ - The PLR MUST generate an EXPLICIT_ROUTE object toward the
+ egress. First, the PLR must remove all sub-objects preceding
+ the first address belonging to the Merge Point. Then the PLR
+ SHOULD add sub-objects corresponding to the desired backup path
+ between the PLR and the MP.
+
+ - The SENDER_TSPEC object SHOULD contain the bandwidth information
+ from the received FAST_REROUTE object, if included in the
+ protected LSP's PATH message.
+
+ - The RSVP_HOP object containing one of the PLR's IP address.
+
+ - The detour LSPs MUST use the same reservation style as the
+ protected LSP. This must be correctly reflected in the
+ SESSION_ATTRIBUTE object.
+
+ Detour LSPs operate like regular LSPs. Once a detour path is
+ successfully computed and the detour LSP is established, the PLR
+ need not compute detour routes again, unless (1) the contents of
+ FAST_REROUTE have changed or (2) the downstream interface and/or
+ the nexthop router for a protected LSP has changed. The PLR may
+ recompute detour routes at any time.
+
+6.3.1. Make-before-Break with Detour LSPs
+
+ If the sender template-specific method is used, it is possible to do
+ make-before-break with detour LSPs. This is done using two different
+ IP addresses belonging to the PLR (which were not used in the
+ SENDER_TEMPLATE of the protected LSP). If the current detour LSP
+ uses the first IP address in its SENDER_TEMPLATE, then the new detour
+ LSP should be signaled by using the second IP address in its
+ SENDER_TEMPLATE. Once the new detour LSP has been created, the
+ current detour LSP can be torn down. By alternating the use of these
+ IP addresses, the current and new detour LSPs will have different
+ SENDER_TEMPLATES and, thus, different state in the downstream LSRs.
+
+
+
+Pan, et al. Standards Track [Page 22]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ This make-before-break mechanism, which changes the PLR IP address in
+ the DETOUR object instead, is not feasible with the path-specific
+ method, as the PATH messages for new and current detour LSPs may be
+ merged if they share a common next-hop.
+
+6.3.2. Message Handling
+
+ LSRs must process the detour LSPs independently of the protected LSPs
+ to avoid triggering the LSP loop detection procedure described in
+ [RSVP-TE].
+
+ The PLR MUST not mix the messages for the protected and the detour
+ LSPs. When a PLR receives Resv, ResvTear, and PathErr messages from
+ the downstream detour destination, the messages MUST not be forwarded
+ upstream. Similarly, when a PLR receives ResvErr and ResvConf
+ messages from a protected LSP, it MUST not propagate them onto the
+ associated detour LSP.
+
+ A session tear-down request is normally originated by the sender via
+ PathTear messages. When a PLR node receives a PathTear message from
+ upstream, it MUST delete both the protected and the detour LSPs. The
+ PathTear messages MUST propagate to both protected and detour LSPs.
+ During error conditions, the LSRs may send ResvTear messages to fix
+ problems on the failing path. When a PLR node receives the ResvTear
+ messages from downstream for a protected LSP, as long as a detour is
+ up, the ResvTear messages MUST not be sent further upstream.
+ PathErrs should be treated similarly.
+
+6.3.3. Local Reroute of Traffic onto Detour LSP
+
+ When the PLR detects a failure on the protected LSP, the PLR MUST
+ rapidly switch packets to the protected LSP's backup LSP instead of
+ to the protected LSP's normal out-segment. The goal of this method
+ is to effect the redirection within 10s of milliseconds.
+
+ L32 L33 L34 L35
+ R1-------R2-------R3-------R4-------R5
+ | |
+ L46 | | L44
+ | L47 |
+ R6----------------R7
+
+ Protected LSP: [R1->R2->R3->R4->R5]
+ Detour LSP: [R2->R6->R7->R4]
+
+ Example 3. Redirect to Detour
+
+
+
+
+
+Pan, et al. Standards Track [Page 23]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ In Example 3, if the link [R2->R3] fails, R2 would do the following.
+ Any traffic received on link [R1->R2] with label L32 would be sent on
+ link [R2->R6] with label L46 (along the detour LSP) instead of on
+ link [R3->R4] with label L34 (along the protected LSP). The merge
+ point R4 would recognize that packets received on link [R7->R4] with
+ label L44 should be sent on link [R4->R5] with label L35 and that
+ they should be merged with the protected LSP.
+
+6.4. Signaling for Facility Protection
+
+ A PLR may use one or more bypass tunnels to protect against the
+ failure of a link and/or a node. These bypass tunnels may be set up
+ in advance or may be dynamically created as new protected LSPs are
+ signaled.
+
+6.4.1. Discovering Downstream Labels
+
+ To support facility backup, the PLR must determine a label that will
+ indicate to the MP that packets received with that label should be
+ switched along the protected LSP. This can be done without
+ explicitly signaling the backup path if the MP uses a label space
+ global to that LSR.
+
+ As described in Section 6, the head-end LSR MUST set the "label
+ recording requested" flag in the SESSION_ATTRIBUTE object for LSPs
+ requesting local protection. This will cause (as specified in
+ [RSVP-TE]) all LSRs to record their INBOUND labels and to note via a
+ flag whether the label is global to the LSR. Thus, when a protected
+ LSP is first signaled through a PLR, the PLR can examine the RRO in
+ the Resv message and learn about the incoming labels that are used by
+ all downstream nodes for this LSP
+
+ When MPs use per-interface label spaces, the PLR must send Path
+ messages (for each protected LSP using a bypass tunnel) via that
+ bypass tunnel prior to the failure in order to discover the
+ appropriate MP label. The signaling procedures for this are in
+ Section 6.4.3 below.
+
+6.4.2. Procedures for the PLR before Local Repair
+
+ A PLR that determines to use facility-backup to protect a given LSP
+ should select a bypass tunnel to use, taking into account whether
+ node protection is to be provided, what bandwidth was requested,
+ whether a bandwidth guarantee is desired, and what link attribute
+ filters were specified in the FAST_REROUTE object. The selection of
+ a bypass tunnel for a protected LSP is performed by the PLR when the
+ LSP is first set up.
+
+
+
+
+Pan, et al. Standards Track [Page 24]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+6.4.3. Procedures for the PLR during Local Repair
+
+ When the PLR detects a link or/and node failure condition, it has to
+ reroute the data traffic onto the bypass tunnel and to start sending
+ the control traffic for the protected LSP onto the bypass tunnel.
+
+ The backup tunnel is identified by using the sender template-specific
+ method. The procedures to follow are similar to those described in
+ Section 6.3.
+
+ - The SESSION is unchanged.
+
+ - The SESSION_ATTRIBUTE is unchanged except as follows: The
+ "Local protection desired", "Bandwidth protection desired", and
+ "Node protection desired" flags SHOULD be cleared. The "Label
+ recording desired" MAY be modified.
+
+ - The IPv4 (or IPv6) tunnel sender address of the SENDER_TEMPLATE
+ is set to an address belonging to the PLR.
+
+ - The RSVP_HOP object MUST contain an IP source address belonging
+ to the PLR. Consequently, the MP will send messages back to the
+ PLR with that IP address as the destination.
+
+ - The PLR MUST generate an EXPLICIT_ROUTE object toward the
+ egress. Detailed ERO processing is described below.
+
+ - The RRO object may have to be updated as described in Section
+ 6.5.
+
+ The PLR sends Path, PathTear, and ResvConf messages via the backup
+ tunnel. The MP sends Resv, ResvTear, and PathErr messages by sending
+ them directly to the address in the RSVP_HOP object, as specified in
+ [RSVP].
+
+ If it is necessary to signal the backup prior to failure to determine
+ the MP label to use, then the same Path message is sent. In this
+ case, the PLR SHOULD continue to send Path messages for the protected
+ LSP along the normal route. PathTear messages should be duplicated,
+ with one sent along the normal route and one sent through the bypass
+ tunnel. The MP should duplicate the Resv and ResvTear messages and
+ send them to both the PLR and the LSR indicated by the protected
+ LSP's RSVP_HOP object.
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 25]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+6.4.4. Processing Backup Tunnel's ERO
+
+ Procedures for ERO processing are described in [RSVP-TE]. This
+ section describes additional ERO update procedures for Path messages
+ that are sent over bypass tunnels. If normal ERO processing rules
+ were followed, the Merge Point would examine the first sub-object and
+ likely reject it (Bad initial sub-object). This is because the
+ unmodified ERO might contain the IP address of a bypassed node (in
+ the case of a NNHOP Bypass Tunnel) or of an interface that is
+ currently down (in the case of a NHOP Backup Tunnel). For this
+ reason, the PLR invokes the following ERO procedures before sending a
+ Path message via a bypass tunnel.
+
+ Sub-objects belonging to abstract nodes that precede the Merge
+ Point are removed, along with the first sub-object belonging to
+ the MP. A sub-object identifying the Backup Tunnel destination is
+ then added.
+
+ More specifically, the PLR MUST:
+
+ - remove all the sub-objects proceeding the first address
+ belonging to the MP, and
+
+ - replace this first MP address with an IP address of the MP.
+ (Note that this could be same address that was just removed.)
+
+6.5. PLR Procedures during Local Repair
+
+ In addition to the method-specific signaling and packet treatment,
+ there is common signaling that should be followed.
+
+ During fast reroute, for each protected LSP containing an RRO object,
+ the PLR obtains the RRO from the protected LSP's stored RESV. The
+ PLR MUST update the IPv4 or IPv6 sub-object it inserted into the RRO
+ by setting the "Local protection in use" and "Local Protection
+ Available" flags.
+
+6.5.1. Notification of Local Repair
+
+ In many situations, the route used during local repair will be less
+ than optimal. The purpose of local repair is to keep high priority
+ and loss-sensitive traffic flowing while a more optimal re-routing of
+ the tunnel can be effected by the head-end of the tunnel. Thus, the
+ head-end has to know of the failure so that it may re-signal an
+ optimal LSP.
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 26]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ To provide this notification, the PLR SHOULD send a Path Error
+ message with error code of "Notify" (Error code = 25) and an error
+ value field of ss00 cccc cccc cccc, where ss=00 and the sub-code = 3
+ ("Tunnel locally repaired") (see [RSVP-TE]).
+
+ Additionally, a head-end may detect that an LSP has to be moved to a
+ more optimal path by noticing failures reported via the IGP. Note
+ that in the case of inter-area TE LSP (TE LSP spanning areas), the
+ head-end LSR will have to rely exclusively on Path Error messages to
+ be informed of failures in another area.
+
+6.5.2. Revertive Behavior
+
+ Upon a failure event, a protected TE LSP is locally repaired by the
+ PLR. There are two basic strategies for restoring the TE LSP to a
+ full working path.
+
+ - Global revertive mode: The head-end LSR of each tunnel is
+ responsible for reoptimizing the TE LSPs that used the failed
+ resource. There are several potential reoptimization triggers:
+ RSVP error messages, inspection of OSPF LSAs or ISIS LSPs, and
+ timers. Note that this re-optimization process may proceed as
+ soon as the failure is detected. It is not tied to the
+ restoration of the failed resource.
+
+ - Local revertive mode: Upon detecting that the resource is
+ restored, the PLR re-signals each of the TE LSPs that used to be
+ routed over the restored resource. Every TE LSP successfully
+ re-signaled along the restored resource is switched back.
+
+ There are several circumstances in which a local revertive mode might
+ not be desirable. In the case of resource flapping (not an uncommon
+ failure type), this could generate multiple traffic disruptions.
+ Therefore, in the local revertive mode, the PLR should implement a
+ means to dampen the re-signaling process in order to limit potential
+ disruptions due to flapping.
+
+ In the local revertive mode, any TE LSP will be switched back,
+ without any distinction, whereas in the global revertive mode, the
+ decision to reuse the restored resource is made by the head-end LSR
+ based on the TE LSP attributes. When the head-end learns of the
+ failure, it may reoptimize the protected LSP tunnel along a different
+ and more optimal path, as it has a more complete view of the
+ resources and TE LSP constraints. This means that the old LSP that
+ has been reverted to may no longer be optimal. Note that in the case
+ of inter-area LSP, where the TE LSP path computation might be done on
+ some Path Computation Element, the reoptimization process can
+
+
+
+
+Pan, et al. Standards Track [Page 27]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ still be triggered on the Head-End LSP. The local revertive mode
+ is optional.
+
+ However, there are circumstances in which the head-end does not have
+ the ability to reroute the TE LSP (e.g., if the protected LSP is
+ pinned down, as may be desirable if the paths are determined by using
+ an off-line optimization tool), or if the head-end does not have the
+ complete TE topology information (depending on the path computation
+ scenario). In those cases, the local revertive mode might be an
+ interesting option.
+
+ The globally revertive mode SHOULD always be used. Note that a link
+ or node "failure" may be due to the facility being permanently taken
+ out of service. Local revertive mode is optional. When used in
+ combination, the global mode may rely solely on timers to do the
+ reoptimization. When local revertive mode is not used, head-end LSRs
+ SHOULD react to RSVP error messages and/or IGP indications in order
+ to make a timely response.
+
+ Interoperability: If a PLR is configured with the local revertive
+ mode but the MP is not, any attempt from the PLR to resignal the TE
+ LSP over the restored resource will fail, as the MP will not send any
+ Resv message. The PLR will still refresh the TE LSP over the backup
+ tunnel. The TE LSP will not revert to the restored resource;
+ instead, it will continue to use the backup until it is re-optimized.
+
+7. Merge Node Behavior
+
+ An LSR is a Merge Point if it receives the Path message for a
+ protected LSP and one or more messages for a backup LSP that is
+ merged into that protected LSP. In the one-to-one backup method, the
+ LSR is aware that it is a merge node prior to failure. In the
+ facility backup method, the LSR may not know that it is a Merge Point
+ until a failure occurs and it receives a backup LSP's Path message.
+ Therefore, an LSR that is on the path of a protected LSP SHOULD
+ always assume that it is a merge point.
+
+ When a MP receives a backup LSP's Path message through a bypass
+ tunnel, the Send_TTL in the Common Header may not match the TTL of
+ the IP packet within which the Path message was transported. This is
+ expected behavior.
+
+7.1. Handling Backup Path Messages before Failure
+
+ There are two circumstances in which a Merge Point will receive Path
+ messages for a backup path prior to failure. In the first case, if a
+ PLR is providing local protection via the one-to-one backup method,
+ the detour will be signaled and must be properly handled by the MP.
+
+
+
+Pan, et al. Standards Track [Page 28]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ In this case, the backup LSP may be signaled via the sender
+ template-specific method or via the path-specific method.
+
+ In the second case, if the Merge Point does not provide labels global
+ to the MP and record them in a Label sub-object of the RRO, or if the
+ PLR does not use such recorded information, the PLR may signal the
+ backup path as described in Section 6.4.1. This will determine the
+ label to use if the PLR is providing protection according to the
+ facility backup method. In this case, the backup LSP is signaled via
+ the sender template-specific method.
+
+ The reception of a backup LSP's path message does not indicate that a
+ failure has occurred or that the incoming protected LSP will no
+ longer be used.
+
+7.1.1. Merging Backup Paths using the Sender Template-Specific Method
+
+ An LSR may receive multiple Path messages for one or more backup LSPs
+ and, possibly, for the protected LSP. Each of these Path messages
+ will have a different SENDER_TEMPLATE. The protected LSP can be
+ recognized because it will include the FAST_REROUTE object or have
+ the "local protection desired" flag set in the SESSION_ATTRIBUTE
+ object, or both.
+
+ If the outgoing interface and next-hop LSR are the same, then the
+ Path messages are eligible for merging. Similarly to the
+ specification in [RSVP-TE] for merging of RESV messages, only Path
+ messages whose ERO from that LSR to the egress is the same can be
+ merged. If merging occurs and one of the Path messages merged was
+ for the protected LSP, then the final Path message to be sent MUST be
+ that of the protected LSP. This merges the backup LSPs into the
+ protected LSP at that LSR. Once the final Path message has been
+ identified, the MP MUST start to refresh it downstream periodically.
+
+ If merging occurs and all the Path messages were for backup LSPs,
+ then the DETOUR object, if any, should be altered as specified in
+ Section 8.1
+
+7.1.2. Merging Detours using the Path-Specific Method
+
+ An LSR (that is, an MP) may receive multiple Path messages from
+ different interfaces with identical SESSION and SENDER_TEMPLATE
+ objects. In this case, Path state merging is REQUIRED. The merging
+ rule is as follows:
+
+ If all Path messages have neither a FAST_REROUTE nor a DETOUR object,
+ or if the MP is the egress of the LSP, no merging is required. The
+ messages are processed according to [RSVP-TE].
+
+
+
+Pan, et al. Standards Track [Page 29]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ Otherwise, the MP MUST record the Path state and the incoming
+ interface. If the Path messages do not share an outgoing interface
+ and a next-hop LSR, the MP MUST consider them to be independent LSPs
+ and MUST NOT merge them.
+
+ For all the Path messages that share the same outgoing interface and
+ next-hop LSR, the MP runs the following procedure to create a Path
+ message to forward downstream.
+
+ 1. If one or more of the Path messages is for the protected LSP (a
+ protected LSP is one originated from this node, or with the
+ FAST_REROUTE object, or without the DETOUR object), one of these
+ must become the chosen Path message. There could be more than
+ one; in that case, which one to forward is a local decision.
+ Quit.
+
+ 2. From the remaining set of Detour Path messages, eliminate from
+ consideration those that traverse nodes that others want to
+ avoid.
+
+ 3. If several still remain, which one to forward is a local
+ decision. If none remain, then the MP MAY try to find a new
+ route that avoids all nodes that merging Detour Paths want to
+ avoid; it will forward a Path message with that ERO.
+
+ Once the final Path message has been identified, the MP MUST start to
+ refresh it downstream periodically. Other LSPs are considered merged
+ at this node. For bandwidth reservations on the outgoing link, any
+ merging should be considered to have occurred before bandwidth is
+ reserved. Thus, even though Fixed Filter style is specified,
+ multiple detours and/or their protected LSP (which are to be merged
+ due to sharing an outgoing interface and next-hop LSR) will reserve
+ only the bandwidth of the final Path message on that outgoing
+ interface.
+
+ If no merged Path message can be constructed, the MP SHOULD send a
+ PathErr in response to the most recently received detour Path
+ message. If a protected Path is chosen to be forwarded but it
+ traverses nodes that some detours want to avoid, PathErrs SHOULD be
+ sent in response to those detour Paths which cannot merge.
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 30]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+7.1.2.1. An Example of Path Message Merging
+
+ R7---R8---R9-\
+ | | | \
+ R1---R2---R3---R4---R5---R6
+
+ Protected LSP: [R1->R2->R3->R4->R5->R6]
+ R2's Detour: [R2->R7->R8->R9->R4->R5->R6]
+ R3's Detour: [R3->R8->R9->R5->R6]
+
+ Example 4. Path Message Merging
+
+ In Example 4, R8 will receive Path messages that have the same
+ SESSION and SENDER_TEMPLATE from detours for R2 and R3. During
+ merging at R8, because detour R3 has a shorter ERO path length (that
+ is, ERO is [R9->R5->R6], and path length is 3), R8 will select it as
+ the final LSP and will only propagate its Path messages downstream.
+ Upon receiving a Resv (or a ResvTear) message, R8 must relay the
+ messages toward both R2 and R3.
+
+ R5 has to merge as well, and it will select the main LSP, since it
+ has the FAST_REROUTE object. Thus, the detour LSP terminates at R5.
+
+7.1.3. Message Handling for Merged Detours
+
+ When an LSR receives a ResvTear for an LSP, the LSR must determine
+ whether it has an alternate associated LSP. For instance, if the
+ ResvTear was received for a protected LSP but an associated backup
+ LSP has not received a ResvTear, then the LSR has an alternate
+ associated LSP. If the LSR does not have an alternate associated
+ LSP, then the MP MUST propagate the ResvTear toward the LSP's
+ ingress, and, for each backup LSP merged into that LSP at this LSR,
+ the ResvTear SHOULD also be propagated along the backup LSP.
+
+ The MP may receive PathTear messages for some of the merging LSPs.
+ PathTear messages SHOULD NOT be propagated downstream until the MP
+ has received PathTear messages for each of the merged LSPs. However,
+ the fact that one or more of the merged LSPs has been torn down
+ should be reflected in the downstream message, such as by changing
+ the DETOUR object, if there is one.
+
+7.2. Handling Failures
+
+ When a downstream LSR detects a local link failure, for any protected
+ LSPs routed over the failed link, Path and Resv state MUST NOT be
+ cleared, and PathTear and ResvErr messages MUST NOT be sent
+ immediately. If this is not the case, then the facility backup
+ method will not work. Furthermore, a downstream LSR SHOULD reset the
+
+
+
+Pan, et al. Standards Track [Page 31]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ refresh timers for these LSPs as if they had just been refreshed.
+ This is to allow time for the PLR to begin refreshing state via the
+ bypass tunnel. State MUST be removed if it has not been refreshed
+ before the refresh timer expires. This allows the facility backup
+ method to work without requiring that it signal backup paths through
+ the bypass tunnel before failure.
+
+ After a failure has occurred, the MP must still send Resv messages
+ for the backup LSPs associated with the protected LSPs that have
+ failed. If the backup LSP was sent through a bypass tunnel, then the
+ PHOP object in its Path message will have the IP address of the
+ associated PLR. This will ensure that Resv state is refreshed.
+
+ Once the local link has recovered, the MP may or may not accept Path
+ messages for existing protected LSPs that had failed over to their
+ backup.
+
+8. Behavior of All LSRs
+
+ The objects and methods defined in this document require behavior
+ from all LSRs in the traffic-engineered network, even if an LSR is
+ not along the path of a protected LSP.
+
+ First, if a DETOUR object is included in the backup LSP's path
+ message for the sender template-specific method, the LSRs in the
+ traffic-engineered network should support the DETOUR object.
+
+ Second, if the path-specific method is to be supported for the one-
+ to-one backup method, it is necessary that the LSRs in the traffic-
+ engineered network be capable of merging detours as specified in
+ Section 8.1.
+
+ It is possible to avoid specific LSRs that do not support this
+ behavior by assigning a link attribute to all the links of those LSPs
+ and then requesting that backup paths exclude this link attribute.
+
+8.1. Merging Detours in the Path-Specific Method
+
+ If multiple Path Messages for different detours are received with the
+ same SESSION, SENDER_TEMPLATE, outgoing interface, and next-hop LSR,
+ then the LSR must function as a Detour Merge Point and merge the
+ detour Path Messages. This merging should occur as specified in
+ Section 7.1.2 and shown in Example 4.
+
+ In addition, it is necessary to update the DETOUR object to reflect
+ the merging that has taken place. This is done using the following
+ algorithm to format the outgoing DETOUR object for the final LSP:
+
+
+
+
+Pan, et al. Standards Track [Page 32]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+ - Combine all the (PLR_ID, Avoid_Node_ID) pairs from all the DETOUR
+ objects of all merged LSPs into a new object. Ordering is
+ insignificant.
+
+9. Security Considerations
+
+ This document does not introduce new security issues. The security
+ considerations pertaining to the original RSVP protocol [RSVP] remain
+ relevant.
+
+ Note that the facility backup method requires that a PLR and its
+ selected merge point trust RSVP messages received from each other.
+
+10. IANA Considerations
+
+ IANA [RFC-IANA] has assigned the following RSVP Class Numbers for
+ objects defined in this document.
+
+10.1. DETOUR Object
+
+ IANA has assigned:
+
+ 63 DETOUR
+
+ Class Types or C-Types:
+
+ 7 IPv4
+ 8 IPv6
+
+ Future C-Types will be assigned using the following guidelines:
+
+ C-Types 0 through 127 are assigned by Standards Action.
+
+ C-Types 128 through 191 are assigned by Expert Review.
+
+ C-Types 192 through 255 are reserved for Vendor Private Use.
+
+ For C-Types in the range 192 through 255, the first four octets of
+ the DETOUR object after the C-Type must be the Vendor's SMI Network
+ Management Private Enterprise Code (see [ENT]) in network byte order.
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 33]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+10.2. FAST_REROUTE Object
+
+ IANA has assigned:
+
+ 205 FAST_REROUTE
+
+ Class Types or C-Types:
+
+ 1 FAST_REROUTE Type 1
+ 7 RESERVED
+
+ In the FAST_REROUTE object, C-Type 7 is reserved as it is still used
+ by pre-standard implementations. Future C-Types will be assigned
+ using the following guidelines:
+
+ C-Types 0 through 127 are assigned by Standards Action.
+
+ C-Types 128 through 191 are assigned by Expert Review.
+
+ C-Types 192 through 255 are reserved for Vendor Private Use.
+
+ For C-Types in the range 192 through 255, the first four octets of
+ the FAST_REROUTE object after the C-Type must be the Vendor's SMI
+ Network Management Private Enterprise Code (see [ENT]) in network
+ byte order.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 34]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+11. Contributors
+
+ This document was written by George Swallow, Ping Pan, Alia Atlas,
+ Jean Philippe Vasseur, Markus Jork, Der-Hwa Gan, and Dave Cooper.
+
+ Jean Philippe Vasseur
+ Cisco Systems, Inc.
+ 300 Beaver Brook Road
+ Boxborough, MA 01719
+ USA
+
+ Phone: +1 978 497 6238
+ EMail: jpv@cisco.com
+
+
+ Markus Jork
+ Quarry Technologies
+ 8 New England Executive Park
+ Burlington, MA 01803
+ USA
+
+ Phone: +1 781 359 5071
+ EMail: mjork@quarrytech.com
+
+
+ Der-Hwa Gan
+ Juniper Networks
+ 1194 N.Mathilda Ave
+ Sunnyvale, CA 94089
+ USA
+
+ Phone: +1 408 745 2074
+ EMail: dhg@juniper.net
+
+
+ Dave Cooper
+ Global Crossing
+ 960 Hamlin Court
+ Sunnyvale, CA 94089
+ USA
+
+ Phone: +1 916 415 0437
+ EMail: dcooper@gblx.net
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 35]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+12. Acknowledgments
+
+ We would like to acknowledge input and helpful comments from Rob
+ Goguen, Tony Li, Yakov Rekhter and Curtis Villamizar. Especially, we
+ thank those, who have been involved in interoperability testing and
+ field trails, and provided invaluable ideas and suggestions. They
+ are Rob Goguen, Carol Iturralde, Brook Bailey, Safaa Hasan, Richard
+ Southern, and Bijan Jabbari.
+
+13. Normative References
+
+ [RSVP] Braden, R., Zhang, L., Berson, S., Herzog, S., and S.
+ Jamin, "Resource ReSerVation Protocol (RSVP) -- Version
+ 1 Functional Specification", RFC 2205, September 1997.
+
+ [RSVP-TE] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan,
+ V., and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
+ Tunnels", RFC 3209, December 2001.
+
+ [RFC-WORDS] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC-IANA] Narten, T. and H. Alvestrand, "Guidelines for Writing an
+ IANA Considerations Section in RFCs", BCP 26, RFC 2434,
+ October 1998.
+
+ [ENT] IANA PRIVATE ENTERPRISE NUMBERS,
+ http://www.iana.org/assignments/enterprise-numbers
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 36]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+Authors' Addresses
+
+ George Swallow
+ Cisco Systems, Inc.
+ 300 Beaver Brook Road
+ Boxborough, MA 01719
+ USA
+
+ Phone: +1 978 244 8143
+ EMail: swallow@cisco.com
+
+
+ Ping Pan
+ Hammerhead Systems
+ 640 Clyde Court
+ Mountain View, CA 94043
+ USA
+
+ EMail: ppan@hammerheadsystems.com
+
+
+ Alia Atlas
+ Avici Systems
+ 101 Billerica Avenue
+ N. Billerica, MA 01862
+ USA
+
+ Phone: +1 978 964 2070
+ EMail: aatlas@avici.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 37]
+
+RFC 4090 RSVP-TE Fast Reroute May 2005
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2005).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at ietf-
+ ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Pan, et al. Standards Track [Page 38]
+