summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc6974.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6974.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6974.txt')
-rw-r--r--doc/rfc/rfc6974.txt1683
1 files changed, 1683 insertions, 0 deletions
diff --git a/doc/rfc/rfc6974.txt b/doc/rfc/rfc6974.txt
new file mode 100644
index 0000000..1bc2857
--- /dev/null
+++ b/doc/rfc/rfc6974.txt
@@ -0,0 +1,1683 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) Y. Weingarten
+Request for Comments: 6974
+Category: Informational S. Bryant
+ISSN: 2070-1721 Cisco Systems
+ D. Ceccarelli
+ D. Caviglia
+ F. Fondelli
+ Ericsson
+ M. Corsi
+ Altran
+ B. Wu
+ ZTE Corporation
+ X. Dai
+ July 2013
+
+
+ Applicability of MPLS Transport Profile for Ring Topologies
+
+Abstract
+
+ This document presents an applicability of existing MPLS protection
+ mechanisms, both local and end-to-end, to the MPLS Transport Profile
+ (MPLS-TP) in ring topologies. This document does not propose any new
+ mechanisms or protocols. Requirements for MPLS-TP protection
+ especially for protection in ring topologies are discussed in
+ "Requirements of an MPLS Transport Profile" (RFC 5654) and "MPLS
+ Transport Profile (MPLS-TP) Survivability Framework" (RFC 6372).
+ This document discusses how most of the requirements are met by
+ applying linear protection as defined in RFC 6378 in a ring topology.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc6974.
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 1]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+Copyright Notice
+
+ Copyright (c) 2013 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 1.1. Problem Statement . . . . . . . . . . . . . . . . . . . . 3
+ 1.2. Scope of the Document . . . . . . . . . . . . . . . . . . 4
+ 1.3. Terminology and Notation . . . . . . . . . . . . . . . . . 5
+ 2. Point-to-Point (P2P) Ring Protection . . . . . . . . . . . . . 6
+ 2.1. Wrapping . . . . . . . . . . . . . . . . . . . . . . . . . 6
+ 2.2. Steering . . . . . . . . . . . . . . . . . . . . . . . . . 8
+ 2.3. SPME for P2P Protection of a Ring Topology . . . . . . . . 10
+ 2.3.1. Path SPME for Steering . . . . . . . . . . . . . . . . 11
+ 2.3.2. Wrapping Link Protection with Segment-Based SPME . . . 12
+ 2.3.3. Wrapping Node Protection . . . . . . . . . . . . . . . 13
+ 2.3.4. Wrapping for Link and Node Protection . . . . . . . . 14
+ 2.4. Analysis of P2P Protection . . . . . . . . . . . . . . . . 15
+ 2.4.1. Recommendations for Protection of P2P Paths
+ Traversing a Ring . . . . . . . . . . . . . . . . . . 16
+ 3. Point-to-Multipoint Protection . . . . . . . . . . . . . . . . 17
+ 3.1. Wrapping for P2MP LSPs . . . . . . . . . . . . . . . . . . 17
+ 3.1.1. Comparison of Wrapping and ROM-Wrapping . . . . . . . 19
+ 3.1.2. Multiple Failures Comparison . . . . . . . . . . . . . 20
+ 3.2. Steering for P2MP Paths . . . . . . . . . . . . . . . . . 21
+ 3.2.1. Context Labels . . . . . . . . . . . . . . . . . . . . 21
+ 3.2.2. Walk-Through Using Context Labels . . . . . . . . . . 23
+ 4. Coordination Protocol . . . . . . . . . . . . . . . . . . . . 26
+ 5. Conclusions and Recommendations . . . . . . . . . . . . . . . 26
+ 6. Security Considerations . . . . . . . . . . . . . . . . . . . 27
+ 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 27
+ 7.1. Normative References . . . . . . . . . . . . . . . . . . . 27
+ 7.2. Informative References . . . . . . . . . . . . . . . . . . 27
+ Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 29
+ Appendix B. Contributors . . . . . . . . . . . . . . . . . . . . 29
+
+
+
+
+Weingarten, et al. Informational [Page 2]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+1. Introduction
+
+ The MPLS Transport Profile (MPLS-TP) has been standardized as part of
+ a joint effort between the Internet Engineering Task Force (IETF) and
+ the International Telecommunications Union Telecommunications
+ Standardization Sector (ITU-T). These specifications are based on
+ the requirements that were generated from this joint effort.
+
+ The MPLS-TP requirement document [RFC5654] includes a requirement to
+ support a network that may include subnetworks that constitute an
+ MPLS-TP ring as defined in the document. However, the document does
+ not identify any protection requirements specific to a ring topology.
+ The requirements state that specific protection mechanisms applying
+ to ring topologies may be developed if these allow the network to
+ minimize:
+
+ o the number of OAM entities needed to trigger the protection
+
+ o the number of elements of recovery needed
+
+ o the number of labels required
+
+ o the number of control- and management-plane transactions during a
+ maintenance operation
+
+ o the impact of signaling and routing information exchanged during
+ protection, in the presence of a control plane
+
+ This document describes how applying a set of basic MPLS-TP linear
+ protection mechanisms defined in [RFC6378] can be used to provide
+ protection of the data flows that traverse an MPLS-TP ring. These
+ mechanisms provide data flow protection due to any switching trigger
+ within a reasonable time frame and optimize the criteria set out in
+ [RFC5654], as summarized above. This document does not define any
+ new protocol mechanisms or procedures.
+
+ A related topic in [RFC5654] addresses the required support for
+ interconnected rings. This topic involves various scenarios that
+ require further study and will be addressed in a separate document,
+ based on the principles outlined in this document.
+
+1.1. Problem Statement
+
+ Ring topologies, as defined in [RFC5654], are used in transport
+ networks. When designing a protection mechanism for a single ring
+ topology, there is a need to address both of the following cases.
+
+
+
+
+
+Weingarten, et al. Informational [Page 3]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ 1. A point-to-point transport path that originates at a ring node or
+ enters an MPLS-TP-capable ring at a single ingress node, and
+ exits the ring at a single egress node, and possibly continues
+ beyond the ring.
+
+ 2. Where the ring is being used as a branching point for a point-to-
+ multipoint transport path, i.e., the transport path originates at
+ or enters the MPLS-TP-capable ring at the ingress node and exits
+ through a number of egress nodes, possibly continuing beyond the
+ ring.
+
+ In either of these two situations, there is a need to address the
+ following different cases.
+
+ 1. One of the ring links causes a fault condition. This could be
+ either a unidirectional or bidirectional fault, and it should be
+ detected by the neighboring nodes.
+
+ 2. One of the ring nodes causes a fault condition. This condition
+ is invariably a bidirectional fault (although in rare cases of
+ misconfiguration, this could be detected as a unidirectional
+ fault), and it should be detected by the two neighboring ring
+ nodes.
+
+ 3. An operator command is issued to a specific ring node; it either
+ changes the operational state of a node or a link or explicitly
+ triggers a protection action. An operator command changes the
+ operational state of a node or a link, or specifically triggers a
+ protection action is issued to a specific ring node. A
+ description of the different operator commands is found in
+ Section 4.13 of [RFC4427]. Examples of these commands include
+ Manual Switch, Forced Switch, and Clear operations.
+
+ The protection domain addressed in this document is limited to the
+ traffic that traverses on the ring. Protection triggers on the
+ transport path prior to the ingress node of the ring or beyond the
+ egress nodes may be protected by some other mechanism.
+
+1.2. Scope of the Document
+
+ This document addresses the requirements that appear in Section
+ 2.5.6.1 of [RFC5654] on ring protection, based on the application of
+ the linear protection as defined in [RFC6378]. Requirement R93
+ regarding the support of interconnected rings and protection of
+ faults in the interconnection nodes and links is for further study.
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 4]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ In addition, requirement R105 requiring the support of lockout of
+ specific nodes or spans is only supported to the degree that it is
+ supported by the linear protection mechanism.
+
+1.3. Terminology and Notation
+
+ The terminology used in this document is based on the terminology
+ defined in the MPLS-TP framework documents:
+
+ o MPLS-TP framework [RFC5921]
+
+ o MPLS-TP OAM framework [RFC6371]
+
+ o MPLS-TP survivability framework [RFC6372]
+
+ The MPLS-TP framework document [RFC5921] defines a Sub-Path
+ Maintenance Entity (SPME) construct that can be defined between any
+ two Label Switching Routers (LSRs) of an MPLS-TP Label Switched Path
+ (LSP). This SPME may be configured as a co-routed bidirectional
+ path. The SPME is defined to allow management and monitoring of any
+ segment of a transport path. This concept will be used extensively
+ throughout the document to support protection of the traffic that
+ traverses an MPLS-TP ring.
+
+ In addition, we describe the use of the label stack in connection
+ with the redirecting of data packets by the protection mechanism.
+ The following syntax will be used to describe the contents of the
+ label stack:
+
+ 1. The label stack will be enclosed in square brackets ("[]").
+
+ 2. Each level in the stack will be separated by the '|' character.
+ It should be noted that the label stack may contain additional
+ levels; however, we only present the levels that are germane to
+ the protection mechanism.
+
+ 3. When applicable, the S bit (signifying that a given label is the
+ bottom of the label stack) will be denoted by the string '+S'
+ within the label. If a label is not shown with '+S' , that label
+ may or may not be the bottom label in the stack. '+S' is only
+ shown when it is important to illustrate that a given label is
+ definitely the last one in the label stack.
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 5]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ 4. The label of the LSP at the ingress node of the ring will be
+ denoted by the string "LI", and the label of the LSP that is
+ expected at the egress point from the ring will be denoted by the
+ string "LE". "LSE" will denote the label expected at the exit
+ LSR of a SPME (if it is different from the egress point from the
+ ring, for example, as described in Section 2.3).
+
+ 5. The label Pxi(y) in the stack denotes the label that LSR-x would
+ use to transport the packet to LSR-y over the SPME whose index is
+ i.
+
+ For example:
+
+ o The label stack [LI] denotes the label stack received at the
+ ingress node of the ring. There may be additional labels after
+ LI, e.g., a PW label; however, this is irrelevant to the
+ discussion of the protection scenario.
+
+ o [PB1(G) | LE] denotes a stack whose top label is the SPME-1 label
+ for LSR-B to transmit the data packet to LSR-G, and the second
+ label is the label that would be used by the egress LSR to
+ continue to transmit the packet on the original LSP.
+
+ o If "LE" were the bottom label in the stack, then the label stack
+ would be shown as [PB1(G) | LE+S].
+
+2. Point-to-Point (P2P) Ring Protection
+
+ There are two protection architecture mechanisms -- "Wrapping" and
+ "Steering" -- that have historically been applied to ring topologies,
+ based on Synchronous Digital Hierarchy (SDH) specifications [G.841],
+ and have been proposed in various forums to perform recovery of a
+ topological ring network. The following subsections examine these
+ two mechanisms, as applied to an MPLS transport network.
+
+2.1. Wrapping
+
+ Wrapping is defined as a local protection architecture. This
+ mechanism is local to the nodes that are neighbors to the detected
+ fault. When a fault is detected (either a link or node failure), the
+ neighboring node can identify that the fault would prevent forwarding
+ of the data along the data path. Therefore, in order to continue to
+ transmit the data along the path, there is a need to "wrap" all data
+ traffic around the ring, on an alternate data path, until the arrives
+ at the node that is on the opposite side of the fault. When this
+ far-side node also detects that there is a fault condition on the
+ working path, it can identify that the data traffic that is arriving
+ on the alternate (protecting) data path is intended for the "broken"
+
+
+
+Weingarten, et al. Informational [Page 6]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ data path. Therefore, again making a local decision, the far-side
+ node can wrap the data back onto the normal working path until the
+ egress from the ring segment.
+
+ Wrapping behavior is similar to MPLS-TE Fast Reroute, as defined in
+ [RFC4090], which uses either bypass or detour tunnels. Applying Fast
+ Reroute to MPLS, it is possible to wrap all LSPs using a bypass
+ tunnel and a single label, or to wrap the traffic of each LSP around
+ the failed links via a detour tunnel using a different label for each
+ LSP.
+
+ ___ ######## ___ ######## ___
+ ======>/LSR\********/LSR\***XX***/LSR\
+ \_B_/@@@@@@@@\_A_/ \_F_/
+ *@ #*@
+ *@ #*@
+ *@ #*@
+ _*@ ___ #*@
+ /LSR\********/LSR\********/LSR\======>
+ \_C_/@@@@@@@@\_D_/@@@@@@@@\_E_/
+
+ ===> connected LSP *** physical link
+ ### working path @@@ wrapped data path
+
+ Figure 1: Wrapping Protection for P2P Path
+
+ Consider the LSP that is shown in Figure 1 that enters the ring of
+ LSRs at LSR-B and exits at LSR-E. The normal working path LSP
+ follows through LSRs B-A-F-E. If a fault is detected on the link
+ A<->F, then the wrapping mechanism decides that LSR-A would wrap the
+ traffic around the ring, on a wrapped data path A-B-C-D-E-F, to
+ arrive at LSR-F (on the far side of the failed link). LSR-F would
+ then wrap the data packets back onto the working path F->E to the
+ egress node. In this protection scheme, the traffic will follow the
+ path B-A-B-C-D-E-F-E.
+
+ This protection scheme is simple in the sense that there is no need
+ for coordination between the different LSRs in the ring -- only the
+ LSRs that detect the fault must wrap the traffic, either onto the
+ wrapped data path (at the near end) or back to the working path (at
+ the far end). However, coordination of the switchover to the
+ protection path would be needed to maintain the traffic on a co-
+ routed bidirectional LSP even in cases of a unidirectional fault
+ condition.
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 7]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ The following considerations should be taken into account when
+ considering use of wrapping protection:
+
+ o Detection of mis-connectivity or loss of continuity should be
+ performed at the link level and/or per LSR when using node-level
+ protection. Configuration of the protection being performed
+ (i.e., link protection or node protection) needs to be performed a
+ priori, since the configuration of the proper protection path is
+ dependent upon this decision.
+
+ o There is a need to define a data path that traverses the alternate
+ path around the ring to connect between the two neighbors of the
+ detected fault. If protecting both the links and the nodes of an
+ LSP, then, for a ring with N nodes, there is a need for O(2N)
+ alternate paths.
+
+ o When wrapping, the data is transmitted over some of the links
+ twice, once in each direction. For example, in the figure above
+ the traffic is transmitted both B->A and then A->B, and later it
+ is transmitted E->F and F->E. This means that there is additional
+ bandwidth needed for this protection.
+
+ o If a double-fault situation occurs in the ring, then wrapping will
+ not be able to deliver any packets except between the ingress and
+ the first fault location encountered on the working path. This is
+ based on the need for wrapping to connect between the neighbors of
+ the fault location, and this is not possible in the segmented
+ ring.
+
+ o The resource pre-allocation for all of the alternate paths could
+ be problematic (causing massive over subscription of the available
+ resources). However, since most of these alternate paths will not
+ be used simultaneously, there is the possibility of allocating
+ zero resources and depending on the Network Management System
+ (NMS) to allocate the proper resources around the ring, based on
+ actual traffic usage.
+
+ o Wrapping also involves a small increase in traffic latency in
+ delivering the packets, as a result of traversing the entire ring,
+ during protection.
+
+2.2. Steering
+
+ The second common scheme for ring protection, steering, takes
+ advantage of the ring topology by defining two paths from the ingress
+ node of the ring to the egress point going in opposite directions
+ around the ring. This is illustrated in Figure 2, where if we assume
+ that the traffic needs to enter the ring from node B and exit through
+
+
+
+Weingarten, et al. Informational [Page 8]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ node F, we could define a primary path through nodes B-A-F, and an
+ alternate path through the nodes B-C-D-E-F. In steering, the
+ switching is always performed by the ingress node (node B in
+ Figure 2). If a fault condition is detected anywhere on the working
+ path (B-A-F), then the traffic would be redirected by B to the
+ alternate path (i.e., B-C-D-E-F).
+
+ ___ ___ ___
+ ======>/LSR\********/LSR\********/LSR\======>
+ \_B_/########\_A_/########\_F_/
+ *@ @*
+ *@ @*
+ *@ @*
+ _*@ ___ @*_
+ /LSR\********/LSR\********/LSR\
+ \_C_/@@@@@@@@\_D_/@@@@@@@@\_E_/
+
+ ===> connected LSP *** physical link
+ ### working path @@@ protection path
+
+ Figure 2: Steering Protection in an MPLS-TP Ring
+
+ This mechanism bears similarities to linear 1:1 protection [RFC6372].
+ The two paths around the ring act as the working and protection
+ paths. This requires that the ingress node be informed of the need
+ to switch over to the protection path, and also that the ingress and
+ egress nodes coordinate the switchover. There is need to communicate
+ to the ingress node the need to switch over to the protection path
+ and there is a need to coordinate the switchover between the two
+ endpoints of the protected domain.
+
+ The following considerations must be taken into account regarding the
+ steering architecture:
+
+ o Steering relies on a failure detection method that is able to
+ notify the ingress node of the fault condition. This may involve
+ OAM functionality described in [RFC6371], e.g., Remote Defect
+ Indication, alarm reporting.
+
+ o The process of notifying the ingress node adds to the latency of
+ the protection-switching process, after the detection of the fault
+ condition.
+
+ o While there is no need for double bandwidth for the data path,
+ there is the necessity for the ring to maintain enough capacity
+ for all of the data in both directions around the ring.
+
+
+
+
+
+Weingarten, et al. Informational [Page 9]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+2.3. SPME for P2P Protection of a Ring Topology
+
+ The SPME concept was introduced by [RFC5921] to support management
+ and monitoring an arbitrary segment of a transport. However, an SPME
+ is essentially a valid LSP that may be used to aggregate all LSP
+ traffic that traverses the sub-path delineated by the SPME. An SPME
+ may be monitored using the OAM mechanisms as described in the MPLS-TP
+ OAM framework document [RFC6371].
+
+ When defining an MPLS-TP ring as a protection domain, there is a need
+ to design a protection mechanism that protects all the LSPs that
+ cross the MPLS-TP ring. For this purpose, we associate a (working)
+ SPME with the segment of the transport path that traverses the ring.
+ In addition, we configure an alternate (protecting) SPME that
+ traverses the ring in the opposite direction around the ring. The
+ exact selection of the SPMEs is dependent on the types of transport
+ path and protection that are being implemented. This will be
+ detailed in the following subsections.
+
+ Based on this architectural configuration for protection of ring
+ topologies, it is possible to limit the number of alternate paths
+ needed to protect the data traversing the ring. In addition, since
+ we will perform all of the OAM functionality on the SPME configured
+ for the traffic, we can minimize the number of OAM sessions needed to
+ monitor the data traffic of the ring, rather than monitoring each
+ individual LSP.
+
+ In all of the following subsections, we use 1:1 linear protection
+ [RFC6372] [RFC6378] to perform protection switching and coordination
+ when a signal fault is detected. The actual configuration of the
+ SPMEs used may change depending upon the choice of methodology, and
+ this will be detailed in the following sections. However, in all of
+ these configurations, the mechanism will be to transmit the data
+ traffic on the primary SPME, while applying OAM functionality over
+ both the primary and the secondary SPME to detect signal fault
+ conditions on either path. If a signal fault is detected on the
+ primary SPME, then the mechanism described in [RFC6378] shall be used
+ to coordinate a switchover of data traffic to the secondary SPME.
+
+ Assuming that the SPME is implemented as an hierarchical LSP, packets
+ that arrive at LSR-B with a label stack [LI] will have the SPME label
+ pushed at LSR-B, and the LSP label will be swapped for the label that
+ is expected by the egress LSR (i.e., the packet will arrive at LSR-A
+ with a label stack of [PA1(B) | LE] and arrive at LSR-F with [PE1(F)
+ | LE]). The SPME label will be popped by LSR-F, and the LSP label
+ will be treated appropriately at LSR-F and forwarded along the LSP,
+ outside the ring. This scenario is true for all LSPs that are
+ aggregated by this primary SPME.
+
+
+
+Weingarten, et al. Informational [Page 10]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+2.3.1. Path SPME for Steering
+
+ A P2P SPME that traverses part of a ring has two Maintenance Entity
+ Group End Points (MEPs), each one acts as the ingress and egress in
+ one direction of the bidirectional SPME. Since the SPME is
+ traversing a ring, we can take advantage of another characteristic of
+ a ring -- there is always an alternative path between the two MEPs,
+ i.e., traversing the ring in the opposite direction. This
+ alternative SPME can be defined as the protection path for the
+ working path that is configured as part of the LSP and defined as a
+ SPME.
+
+ For each pair of SPMEs that are defined in this way, it is possible
+ to verify the connectivity and continuity by applying the MPLS-TP OAM
+ functionality to both the working and protection SPME. If a
+ discontinuity or mis-connectivity is detected, then the MEPs will
+ become aware of this condition and could perform a protection switch
+ of all LSPs to the alternate, protection SPME.
+
+ The following figure shows an MPLS-TP ring that is part of a larger
+ MPLS-TP network. The ring could be used as a network segment that
+ may be traversed by numerous LSPs. In particular, the figure shows
+ that for all LSPs that connect to the ring at LSR-B and exit the ring
+ from LSR-F, we configure two SPMEs through the ring (the first SPME
+ traverses B-A-F, and the second SPME traverses B-C-D-E-F).
+
+ ___ ___ ___
+ =====>/LSR\********/LSR\********/LSR\======>
+ \_B_/########\_A_/########\_F_/
+ *@ @*
+ *@ @*
+ *@ @*
+ _*@ ___ @*_
+ /LSR\********/LSR\********/LSR\
+ \_C_/@@@@@@@@\_D_/@@@@@@@@\_E_/
+
+ ===> connected LSP *** physical link
+ ### primary SPME @@@ secondary SPME
+
+ Figure 3: An MPLS-TP Ring
+
+ This protection mechanism is identical to the application of 1:1
+ linear protection [RFC6372] [RFC6378] to the pair of SPMEs. Under
+ normal conditions, all LSP data traffic will be transmitted on the
+ working SPME. If the linear protection is triggered by the OAM
+ indication, another fault indication trigger, or an operator command,
+ then the MEPs will select the protection SPME to transmit all LSP
+ data packets.
+
+
+
+Weingarten, et al. Informational [Page 11]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ The protection SPME will continue to transmit the data packets until
+ the stable recovery of the fault condition. Upon recovery, i.e., the
+ fault condition has cleared and the network is stabilized, the
+ ingress LSR could switch traffic back to the working SPME, if the
+ protection domain is configured for revertive behavior.
+
+ The control of the protection switching, especially for cases of
+ operator commands, would be covered by the protocol defined in
+ [RFC6378].
+
+2.3.2. Wrapping Link Protection with Segment-Based SPME
+
+ It is possible to use the SPME mechanism to perform segment-based
+ protection. For each link in the ring, we define two SPMEs -- the
+ first is a SPME between the two LSRs that are connected by the link,
+ and the second SPME is between those same two LSRs but traverses the
+ entire ring (except the link that connects the LSRs). In Figure 4,
+ we show the primary SPME that connects LSR-A and LSR-F over a segment
+ connection, and the secondary SPME that connects these same LSRs by
+ traversing the ring in the opposite direction.
+
+ ___ ___ ___
+ /LSR\********/LSR\********/LSR\
+ \_B_/@@@@@@@@\_A_/########\_F_/
+ *@ *@
+ *@ *@
+ *@ *@
+ _*@ ___ _*@
+ /LSR\********/LSR\********/LSR\
+ \_C_/@@@@@@@@\_D_/@@@@@@@@\_E_/
+
+ *** physical link
+ ### primary SPME @@@ secondary SPME
+
+ Figure 4: Segment SPMEs
+
+ By applying OAM monitoring of these two SPMEs (at each LSR), it is
+ possible to effect a wrapping protection mechanism for the LSP
+ traffic that traverses the ring. The LSR on either side of the
+ segment would identify that there is a fault condition on the link
+ and redirect all LSP traffic to the secondary SPME. The traffic
+ would traverse the ring until arriving at the neighboring (relative
+ to the segment) LSR. At this point, the LSP traffic would be
+ redirected onto the original LSP, quite likely over the neighboring
+ SPME.
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 12]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ Following the progression of the label stack through this switching
+ operation (for a LSP that enters the ring at LSR-B and exits the ring
+ at LSR-E):
+
+ 1. The data packet arrives at LSR-A with label stack [L1+S] (i.e.,
+ the top label from the LSP and bottom-of-stack indicator)
+
+ 2. In the normal case (no protection switching), LSR-A forwards the
+ packet with label stack [PA1(F) | LSE+S] (i.e., swaps the label
+ for the LSP, to be acceptable to the SPME egress, and pushes the
+ label for the primary SPME from LSR-A to LSR-F).
+
+ 3. When protection switching is in effect, LSR-A forwards the packet
+ with label stack [PA2(B) | LSE+S] (i.e., LSR-A pushes the label
+ for the secondary SPME from LSR-A to LSR-F, after swapping the
+ label of the lower-level LSP). This will be transmitted along
+ the secondary SPME until LSR-E forwards it to LSR-F with label
+ stack [PE2(F) | LSE+S].
+
+ 4. When the packet arrives at LSR-F, it pops the SPME label, process
+ the LSP label, and forwards the packet to the next point,
+ possibly pushing a SPME label if the next segment is likewise
+ protected.
+
+2.3.3. Wrapping Node Protection
+
+ Implementation of protection at the node level would be similar to
+ the mechanism described in the previous subsection. The difference
+ would be in the SPMEs that are used. For node protection, the
+ primary SPME would be configured between the two LSRs that are
+ connected to the node that is being protected (see the SPME between
+ LSR-A and LSR-E through LSR-F in Figure 5), and the secondary SPME
+ would be configured between these same nodes, going around the ring
+ (see the secondary SPME in Figure 5).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 13]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ ___ ___ ___
+ /LSR\********/LSR\********/LSR\
+ \_B_/@@@@@@@@\_A_/########\_F_/
+ *@ *#
+ *@ *#
+ *@ *#
+ _*@ ___ _*#
+ /LSR\********/LSR\********/LSR\
+ \_C_/@@@@@@@@\_D_/@@@@@@@@\_E_/
+
+ *** physical link
+ ### primary SPME @@@ secondary SPME
+
+ Figure 5: Node-Protection SPMEs
+
+ The protection mechanism would work similarly -- it would be based on
+ 1:1 linear protection [RFC6372] and be triggered by OAM functions on
+ both SPMEs. It would wrap the data packets onto the secondary SPME
+ at the ingress MEP (e.g., LSR-A in the figure) of the SPME and back
+ onto the continuation of the LSP at the egress MEP (e.g., LSR-E in
+ the figure) of the SPME.
+
+2.3.4. Wrapping for Link and Node Protection
+
+ In the different types of wrapping presented in Section 2.3.2 and
+ Section 2.3.3, there is a limitation that the protection mechanism
+ must a priori decide whether it is protecting against link or node
+ failure. In addition, the neighboring LSR, that detects the fault,
+ cannot readily differentiate between a link failure or a node
+ failure.
+
+ It would be possible to configure extra SPMEs to protect both for
+ link and node failures, arriving at a configuration of the ring that
+ is shown in Figure 6. Here, there are three protection SPMEs
+ configured:
+
+ o Secondary node#1 would be used to divert traffic as a result of an
+ indication that LSR-F is not available; it redirects the traffic
+ to the path between LSR-A and LSR-E.
+
+ o Secondary node#2 would be used to divert traffic as a result of an
+ indication that LSR-A is not available; it redirects the traffic
+ to the path between LSR-F and LSR-B.
+
+ o Secondary segment would be used to divert traffic as a result of
+ an indication that the segment between LSR-A and LSR-F is not
+ available; it redirects the traffic to the path between LSR-A and
+ LSR-F on the long circuit of the ring.
+
+
+
+Weingarten, et al. Informational [Page 14]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ However, choosing the SPME to use for the wrapping would then involve
+ considerable effort and could result in the protected traffic not
+ sharing the same protection path in both directions.
+
+ ___ ++++++++ ___ ___
+ /LSR\********/LSR\********/LSR\
+ \_B_/@@@@@@@@\_A_/########\_F_/
+ $+*@ +*$
+ $+*@ +*$
+ $+*@ +*$
+ $+*@ ++++++++ ___ ++++++++ +*$
+ /LSR\********/LSR\********/LSR\
+ \_C_/@@@@@@@@\_D_/@@@@@@@@\_E_/
+ $$$$$$$$ $$$$$$$$
+
+ *** physical link
+ ### primary SPME @@@ secondary node#1 SPME
+ $$$ secondary node#2 SPME +++ secondary segment SPME
+
+ Figure 6: SPMEs for Protecting Segments and Node
+
+2.4. Analysis of P2P Protection
+
+ Analyzing steering SPME protection (Section 2.3.1) and wrapping based
+ on SPME (Sections 2.3.2 or 2.3.3), we can make the following
+ observations (based on a ring with N nodes, where N is not more than
+ 16):
+
+ o Number of SPMEs that need to be configured
+
+ For steering: O(2N^2). There are two SPMEs from each ingress
+ LSR to each of the other nodes in the ring.
+
+ For wrapping: O(2N). (However, the operator must decide a
+ priori whether to protect for link failures or node failures at
+ each point.)
+
+ o Number of OAM sessions at each node
+
+ For steering: O(2N)
+
+ For wrapping: 3
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 15]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ o Bandwidth requirements
+
+ For steering: single bandwidth at each link
+
+ For wrapping: double bandwidth at links that are between
+ ingress and wrapping node and between second wrapping node and
+ egress.
+
+ o Special considerations
+
+ For steering: latency of OAM detection of fault condition by
+ ingress MEP. (Using alarm reporting could optimize over using
+ CC-V only.)
+
+ For wrapping: each node must decide a priori whether it is
+ protecting for link or node failures. To protect for both node
+ and link failures would increase the complexity of deciding
+ which protection path to use, as well as violate the co-
+ routedness of the protected traffic.
+
+ Based on this analysis, using steering as described in Section 2.3.1
+ would be the recommended protection mechanism due to its simplicity.
+ It should be pointed out that the number of SPMEs involved in this
+ protection could be reduced by eliminating each SPME between a pair
+ of LSRs that is not used as an ingress and egress pair.
+
+2.4.1. Recommendations for Protection of P2P Paths Traversing a Ring
+
+ Based on the analysis presented, while applying linear protection to
+ effect wrapping protection in a ring topology is possible as
+ demonstrated, there are certain limitations in addressing some of the
+ required behavior. The limitations include:
+
+ o the need to configure a priori whether link or node protection
+ will be provided
+
+ o the higher number of SPMEs that need to be defined
+
+ o the difficulty in addressing cases of multiple failures in the
+ ring
+
+ Application of linear protection, based on the use of SPMEs within
+ the ring, to implement a steering methodology to protect a ring
+ topology is rather straightforward, overcomes the limitations listed
+ above, and scales very well. For this and other reasons listed
+ previously, the authors recommend the use of steering to provide
+ protection of P2P paths that traverse a ring topology.
+
+
+
+
+Weingarten, et al. Informational [Page 16]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+3. Point-to-Multipoint Protection
+
+ [RFC5654] requires that ring protection must provide protection for
+ unidirectional point-to-multipoint paths through the ring. Ring
+ topologies provide a ready platform for supporting such data paths.
+ A point-to-multipoint (P2MP) LSP in an MPLS-TP ring would be
+ characterized by a single ingress LSR and multiple egress LSRs. The
+ following subsections will present methods to address the protection
+ of the ring-based sections of these LSPs.
+
+3.1. Wrapping for P2MP LSPs
+
+ When protecting a P2MP ring data path using the wrapping
+ architecture, the basic operation is similar to the description
+ given, as the traffic has been wrapped back onto the normal working
+ path on the far side of the detected fault and will continue to be
+ transported to all of the egress points.
+
+ It is possible to optimize the performance of the wrapping mechanism
+ when applied to P2MP LSPs by exploiting the topology of ring
+ networks.
+
+ This improved mechanism, which we call Ring Optimized Multipoint
+ Wrapping (ROM-Wrapping), behaves much the same as classical wrapping.
+ However, ROM-Wrapping configures a protection P2MP LSP, relative to
+ each node that is considered a failure risk. The protection P2MP LSP
+ will be routed between the failure risk node's upstream neighbor to
+ all of the egress nodes (for the particular LSP) that are downstream
+ of the failure risk node.
+
+ Referring to Figure 7, it is possible to identify the protected
+ (working) LSP (A-B-{C}-{D}-E-{F}) and one possible backup
+ (protection) LSP. (Note: the egress nodes are indicated by the curly
+ braces.) This protection LSP will be used to wrap the data back
+ around the ring to protect against a failure on link B-C. This
+ protection LSP is also a P2MP LSP that is configured with egress
+ points (at nodes F, D, and C) complementary to the broken working
+ data path.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 17]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ |
+ |
+ V Ingress
+ ___ _V_ ___
+ /LSR\ /LSR\**************/LSR\
+ <@@\_F_/@@@@@@@@@@@@@\_A_/@@@@@@@@@@@@@@\_B_/
+ @ * *
+ @ * *
+ @ * XXXX Failure
+ @ * *
+ @_* ___ __*
+ /LSR\*************/LSR\**************/LSR\
+ \_E_/@@@@@@@@@@@@@\_D_/@@@@@@@@@@@@@@\_C_/
+ @ @
+ @ @
+ V V
+
+
+ *** working LSP @@@ protection LSP
+
+ Figure 7: P2MP ROM-Wrapping
+
+ Using this mechanism, there is a need to configure a particular
+ protection LSP for each node on the working LSP. In the table below,
+ "X's Backup" is the backup path activated by node X as a consequence
+ of a failure affecting node Y (downstream node with respect to X) or
+ link X-Y. (Note: Braces in the path indicate egress nodes.)
+
+ Protected LSP: A->B->{C}->{D}->E->{F}
+
+ -- LINK/NODE PROTECTION --
+
+ A's Backup: A->{F}->E->{D}->{C}
+ B's Backup: B->A->{F}->E->{D}->{C}
+ C's Backup: C->B->A->{F}->E->{D}
+ D's Backup: D->C->B->A->{F}
+ E's Backup: E->D->C->B->A->{F}
+
+ It should be noted that ROM-Wrapping is an LSP-based protection
+ mechanism, as opposed to the SPME-based protection mechanisms that
+ are presented in other sections of this document. While this may
+ seem to be limited in scope, the mechanism may be very efficient for
+ many applications that are based on P2MP distribution schemes. While
+ ROM-Wrapping can be applied to any network topology, it is
+ particularly efficient for interconnected ring topologies.
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 18]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+3.1.1. Comparison of Wrapping and ROM-Wrapping
+
+ It is possible to compare the wrapping and the ROM-Wrapping
+ mechanisms in various aspects and show some improvements offered by
+ ROM-Wrapping.
+
+ When configuring the protection LSP for wrapping, it is necessary to
+ configure for a specific failure: link protection or node protection.
+ If the protection method is configured to protect against node
+ failures, but the actual failure affects a link, this could result in
+ failing to deliver traffic to the node, when it should be possible to
+ do so.
+
+ ROM-Wrapping, however, does not have this limitation because there is
+ no distinction between node and link protection. Whether link B-C or
+ node C fails, the rerouting will attempt to reach C. If the failure
+ is on the link, the traffic will be delivered to C; if the failure is
+ at node C, the traffic will be rerouted correctly until node D, and
+ will be blocked at this point. However, all egress nodes up to the
+ failure will be able to deliver the traffic properly.
+
+ A second aspect is the number of hops needed to properly deliver the
+ traffic. Referring to the example shown in Figure 7, where a failure
+ is detected on link B-C, the following table lists the set of nodes
+ traversed by the data in the protection:
+
+ Basic Wrapping:
+
+ A-B B-A-F-E-D-C {C}-{D}-E-{F}
+ "Upstream" segment backup path "Downstream" segment
+ with respect to the with respect to the
+ failure failure
+
+ ROM-Wrapping:
+
+ A-B B-A-{F}-E-{D}-{C} ..
+ "Upstream" segment backup path
+ with respect to the
+ failure
+
+ Comparing the two lists of nodes, it is possible to see that in this
+ particular case the number of hops crossed when basic wrapping is
+ used is significantly higher than the number of hops crossed by the
+ traffic when ROM-Wrapping is used. Generally, the number of hops for
+ basic wrapping is always greater than or equal to that for ROM-
+ Wrapping. This implies a certain waste of bandwidth on all links
+ that are crossed in both directions.
+
+
+
+
+Weingarten, et al. Informational [Page 19]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ Considering the ring network in Figure 7, it is possible to consider
+ the bandwidth utilization. The protected LSP is set up from A to F
+ clockwise and an M Mbps bandwidth is reserved along the path. All
+ the protection LSPs are pre-provisioned counterclockwise, each of
+ them may also have reserved bandwidth M. These LSPs share the same
+ bandwidth in a SE (Shared Explicit) style, as described in [RFC2205].
+
+ The bandwidth reserved counterclockwise is not used when the
+ protected LSP is properly working and, in theory, could be used for
+ extra traffic [RFC4427]. However, it should be noted that [RFC5654]
+ does not require support of such extra traffic.
+
+ The two recovery mechanisms require different protection bandwidths.
+ In the case of wrapping, the bandwidth used is M in both directions
+ on many of the links. While in the case of ROM-Wrapping, only the
+ links from the ingress node to the node performing the actual
+ wrapping utilize M bandwidth in both directions, while all other
+ links utilize M bandwidth only in the counterclockwise direction.
+
+ Consider the case of a failure detected on link B-C as shown in
+ Figure 7. The following table lists the bandwidth utilization on
+ each link (in units equal to M), for each recovery mechanism and for
+ each direction (CW=clockwise, CCW=counterclockwise).
+
+ +----------+----------+--------------+
+ | | Wrapping | ROM-Wrapping |
+ +----------+----------+--------------+
+ | Link A-B | CW+CCW | CW+CCW |
+ | Link A-F | CCW | CCW |
+ | Link F-E | CW+CCW | CCW |
+ | Link E-D | CW+CCW | CCW |
+ | Link D-C | CW+CCW | CCW |
+ +----------+----------+--------------+
+
+3.1.2. Multiple Failures Comparison
+
+ A further comparison of wrapping and ROM-Wrapping can be done with
+ respect to their ability to react to multiple failures. The wrapping
+ recovery mechanism does not have the ability to recover from multiple
+ failures on a ring network, while ROM-Wrapping is able to recover
+ from some multiple failures.
+
+ Consider, for example, a double link failure affecting links B-C and
+ C-D shown in Figure 7. The wrapping mechanism is not able to recover
+ from the failure because B, upon detecting the failure, has no
+ alternative paths to reach C. All the P2MP traffic is lost. The
+
+
+
+
+
+Weingarten, et al. Informational [Page 20]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ ROM-Wrapping mechanism is able to partially recover from the failure,
+ because the backup P2MP LSP to F and D is correctly set up and
+ continues delivering traffic.
+
+3.2. Steering for P2MP Paths
+
+ When protecting P2MP traffic that uses an MPLS-TP ring as its
+ branching point (i.e., the traffic enters the ring at a head-end node
+ and exits the ring at multiple nodes), we can employ a steering
+ mechanism based on 1+1 linear protection [RFC6372]. We can configure
+ two P2MP unidirectional SPMEs from each node on the ring; they
+ traverse the ring in both directions. These SPMEs will be configured
+ with an egress at each ring node. In order to be able to direct the
+ LSP traffic to the proper egress point for that particular LSP, we
+ need to employ context labeling as defined in [RFC5331]. The method
+ for using these labels is expanded upon in Section 3.2.1.
+
+ For every LSP that enters the ring at a given node, the traffic will
+ be sent through both of these SPMEs, each with its own context label
+ and the context-specific label for the particular LSP. The egress
+ nodes should select the traffic that is arriving on the working SPME.
+ When a failure condition is identified, the egress nodes should
+ select the traffic from whichever of the two SPMEs whose traffic
+ arrives at that node, i.e., since one of the two (presumably the
+ working SPME) will be blocked by the failure. In this way, all
+ egress nodes are able to receive the data traffic. While each node
+ detects that there is connectivity from the ingress node of the ring,
+ it continues to select the data that is coming from the working SPME.
+ If a particular node stops receiving the connectivity messages from
+ the working SPME, it identifies that it must select to read the data
+ packets from the protection SPME.
+
+3.2.1. Context Labels
+
+ Figure 8 shows the two unidirectional P2MP SPMEs that are configured
+ from LSR-A with egress points at all of the nodes on the ring. The
+ clockwise SPME (i.e., A-B-C-D-E-F) is configured as the working SPME
+ that will aggregate all traffic for P2MP LSPs that enter the ring at
+ LSR-A and must be sent out of the ring at any subset of the ring
+ nodes. The counter-clockwise SPME (i.e., A-F-E-D-C-B) is configured
+ as the protection SPME.
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 21]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ ^ ^ ^
+ _|_ _|_ _|_
+ ----->/LSR\********/LSR\********/LSR\
+ \_A_/========\_B_/========\_C_/
+ +* <+++++++++*||
+ +* +*||
+ +* +*||
+ +* +*||
+ +*_ ++++++++ ___ +++++++++*||
+ /LSR\********/LSR\********/LSR\
+ \_F_/<=======\_E_/========\_D_/
+ | | |
+ V V V
+
+
+ ---> connected LSP *** physical link
+ === working SPME +++ protection SPME
+
+ Figure 8: P2MP SPMEs
+
+ [RFC5331] defines the concept of context labels. A context-
+ identifying label defines a context label space that is used to
+ interpret the context-specific labels (found directly below the
+ context-identifying label) for a specific tunnel. The SPME label is
+ a context-identifying label. This means that at each hop the node
+ that receives the SPME label uses it to point not directly to a
+ forwarding table, but to a Label Information Base (LIB). As a node
+ receives an SPME label, it examines it, discovers that it is a
+ context label, pops off the SPME label, and looks up the next label
+ down in the stack in the LIB indicated by the context label.
+
+ The label below this context-identifying label should be used by the
+ forwarding function of the node to decide the actions to take for
+ this packet. In MPLS-TP protection of ring topologies, there are two
+ context LIBs. One is the context LIB for the working SPME, and the
+ other is the context LIB for the protection SPME. All context LIBs
+ have a behavior defined for the end-to-end LSP label, but the
+ behavior at each node may be different in the context of each SPME.
+
+ For example, using the ring that is shown in Figure 8, the working
+ SPME is configured to have a context-identifying label of CW at each
+ node on the ring, and the protection SPME is configured to have a
+ context-identifying label of CP at each node. For the specific LSP,
+ we will designate the context-specific label used on the working SPME
+ as WL(x-y), where it's the label used as node-x forwards the packet
+ to node-y. Similarly, a context-specific label on the protection
+ SPME would be designated PL(x-y). An explicit example of label
+ values appears in the next subsection.
+
+
+
+Weingarten, et al. Informational [Page 22]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ Assume we are applying 1+1 linear protection, as outlined above, for
+ a P2MP LSP that enters the ring at LSR-A and has egress points from
+ the ring at LSR-C and LSR-E using the two SPMEs shown in Figure 8. A
+ packet that arrives at LSR-A with a label stack [LI+S] will be
+ forwarded on the working SPME with a label stack [CW | WL(A-B)]. The
+ packet should then be forwarded to LSR-C arriving with a label [CW |
+ WL(B-C)], where WL(B-C) should instruct the forwarding function to
+ egress the packet with [LE(C)] and forward a copy to LSR-D with label
+ stack [CW | WL(C-D)].
+
+ If a fault condition is detected (for example, on the link C-D), then
+ the nodes that are beyond the fault point (in this example, nodes
+ LSR-D, LSR-E, and LSR-F), will cease to receive the data packets from
+ the clockwise (working) SPME. Each of these LSRs should then begin
+ to switch its "selector bridge" and accept the data packets from the
+ protection (counter-clockwise) SPME. At the ingress point (LSR-A),
+ all data packets will have been transmitted on both the working SPME
+ and the protection SPME. Continuing the example, LSR-A will transmit
+ one copy of the data to LSR-B with stack [CW | WL(A-B)] and one copy
+ to LSR-F with stack [CP | PL(A-F)]. The packet will arrive at LSR-C
+ from the working SPME and egress from the ring. LSR-E will receive
+ the packet from the protection SPME with stack [CP | PL(F-E)], and
+ the context-sensitive label PL(F-E) will instruct the forwarding
+ function to send a copy out of the ring with label LE(E) and a second
+ copy to LSR-D with stack [CP | PL(E-D)]. In this way, each of the
+ egress points receives the packet from the SPME that is available at
+ that point.
+
+ This architecture has the added advantages that there is no need for
+ the ingress node to identify the existence of the mis-connectivity,
+ and there is no need for a return path from the egress points to the
+ ingress.
+
+3.2.2. Walk-Through Using Context Labels
+
+ In order to better demonstrate the use of the context labels, we
+ present a walk-through of an example application of the P2MP
+ protection presented in this section. Referring to Figure 9, there
+ is a P2MP LSP that traverses the ring, entering the ring at LSR-B and
+ branching off at LSR-D, LSR-E, and LSR-H, and it does not continue
+ beyond LSR-H. For purposes of protection, two P2MP unidirectional
+ SPMEs are configured on the ring starting from LSR-B. One of the
+ SPMEs, the working SPME, is configured with egress points at each of
+ the LSRs -- C, D, E, F, G, H, J, K, A. The second SPME, the
+ protection SPME, is configured with egress points at each of the LSRs
+ -- A, K, J, H, G, F, E, D, C.
+
+
+
+
+
+Weingarten, et al. Informational [Page 23]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ ^ ^ ^ ^
+ ^ ^ ^ ^
+ ___ xxxxxxxxx_+_ xxxxxxxxxX+_xxxxxxxxxX+_ xxxxxxxx_+_
+ xxxxx>/LSR\********/LSR\********/LSR\*******/LSR\*******/LSR\
+ \_B_/========\_C_/========\_D_/=======\_E_/=======\_F_/
+ *+ <+++++++++ +++++++ ++++++++*||x
+ *+ +*||x
+ *+ +*||x
+ *+ +*||x
+ _*++++++++++ ___ +++++++++___ ++++++++___+++++++++*||x
+ /LSR\********/LSR\********/LSR\*******/LSR\*******/LSR\
+ \_A_/<=======\_K_/========\_J_/=======\_H_/=======\_G_/
+ + + + +Xxxxxxxxxx +
+ v v v v v
+ v v v v v
+
+ xxx P2MP LSP (X LSP egress) *** physical link
+ === working SPME +++ protection SPME
+ +>> protection SPME egress
+
+ Figure 9: P2MP SPMEs
+
+ For this example, we suppose that the LSP traffic enters the ring at
+ LSR-B with the label stack [99], and leaves the ring:
+
+ o at LSR-D with stack [199]
+
+ o at LSR-E with stack [299]
+
+ o at LSR-H with stack [399]
+
+ While it is possible for the context-identifying label for the SPME
+ to be configured as a different value at each LSR, for the sake of
+ this example, we will suppose a configuration of 200 as the context-
+ identifying label for the working SPME at each of the LSRs in the
+ ring, and 400 as the context-identifying label for the protection
+ SPME at each LSR.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 24]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ For the specific connected LSP, we configure the following context-
+ specific labels:
+
+ +------+-----------------------------+------------------------------+
+ | node | W-context(200) | P-context(400) |
+ +------+-----------------------------+------------------------------+
+ | A | 65 {drop packet} | 165 {fwd w/ [400 | 190]} |
+ | C | 90 {fwd w/ [200 | 80]} | 190 {drop packet} |
+ | D | 80 {fwd w/ [200 | 75] + | 180 {egress w/ [199]} |
+ | | egress w/ [199]} | |
+ | E | 75 {fwd w/ [200 | 65] + | 175 {fwd w/ [400 | 180] + |
+ | | egress w/ [299]} | egress w/ [299]} |
+ | F | 65 {fwd w/ [200 | 55]} | 165 {fwd w/ [400 | 175]} |
+ | G | 55 {fwd w/ [200 | 45]} | 155 {fwd w/ [400 | 165]} |
+ | H | 45 {egress w/ [399]} | 145 {fwd w/ [400 | 155] + |
+ | | | egress w/ [399]} |
+ | J | 65 {drop packet} | 165 {fwd w/ [400 | 145]} |
+ | K | 65 {drop packet} | 190 {fwd w/ [400 | 165]} |
+ +------+-----------------------------+------------------------------+
+
+ When a packet arrives on the LSP to LSR-B with stack [99], the
+ forwarding function determines that it is necessary to forward the
+ packet to both the working SPME with stack [200 | 90] and the
+ protection SPME with stack [400 | 165]. Each LSR on the SPME will
+ identify the top label, i.e., 200 or 400, to be the context-
+ identifying label and use the next label in the stack to select the
+ forwarding action from the specific context table.
+
+ Therefore, at LSR-C, the packet on the working SPME will arrive with
+ stack [200 | 90], and the 200 will point to the middle column of the
+ table above. After popping the 200, the next label, i.e., 90, will
+ select the forwarding action "fwd w/ [200 | 80]", and the packet will
+ be forwarded to LSR-D with stack [200 | 80]. In this manner, the
+ packet will be forwarded along both SPMEs according to the configured
+ behavior in the context tables. However, the egress points at LSR-D,
+ LSR-E, and LSR-H will each be configured with a selector bridge so
+ they will use only the input from the working SPME. If any of these
+ egress points identifies that there is a connection fault on the
+ working SPME, then the selector bridge will cause the LSR to read the
+ input from the protection SPME.
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 25]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+4. Coordination Protocol
+
+ The survivability framework [RFC6372] indicates that there is a need
+ to coordinate protection switching between the endpoints of a
+ protected bidirectional domain. The coordination is necessary for
+ particular cases, in order to maintain the co-routed nature of the
+ bidirectional transport path. The particular cases where this
+ becomes necessary include when unidirectional fault detection or
+ operator commands are used.
+
+ By using the same mechanisms defined in [RFC6378] for linear
+ protection to protect a single ring topology, we are able to gain a
+ consistent solution for this coordination between the endpoints of
+ the protection domain. The Protection State Coordination Protocol
+ that is specified in [RFC6378] provides coverage for all the
+ coordination cases, including support for operator commands, e.g.,
+ Forced Switch.
+
+5. Conclusions and Recommendations
+
+ Ring topologies are prevalent in traditional transport networks and
+ will continue to be used for various reasons. Protection for
+ transport paths that traverse a ring within an MPLS network can be
+ provided by applying an appropriate instance of linear protection, as
+ defined in [RFC6372]. This document has shown that for each of the
+ traditional ring-protection architectures there is an application of
+ linear protection that provides efficient coverage, based on the use
+ of the Sub-Path Maintenance Entity (SPME), defined in [RFC5921] and
+ [RFC6371]. For example:
+
+ o P2P steering - Configuration of two SPMEs, from the ingress node
+ of the ring to the egress node of the ring, and 1:1 linear
+ protection.
+
+ o P2P Wrapping for link protection - Configuration of two SPMEs, one
+ for the protected link and the second for the long route between
+ the two neighboring nodes, and 1:1 linear protection.
+
+ o P2P wrapping for node protection - Configuration of two SPMEs, one
+ between the two neighbors of the protected node and the second
+ between these two nodes on the long route, and 1:1 linear
+ protection.
+
+ o P2MP wrapping - it is possible to optimize the performance of the
+ wrapping by configuring the proper protection path to egress the
+ data at the proper branching nodes.
+
+
+
+
+
+Weingarten, et al. Informational [Page 26]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ o P2MP steering - by combining 1+1 linear protection and
+ configuration of the SPME based on context-sensitive labeling of
+ the protection path.
+
+ This document shows that use of the protection architecture and
+ mechanisms suggested provides the optimizations needed to justify
+ ring-specific protection as defined in [RFC5654].
+
+ Protection of traffic over a ring topology based on the steering
+ architecture using basic 1:1 linear protection is a very efficient
+ implementation for sections of a P2P transport path that traverses a
+ ring. Steering should be the preferred mechanism for P2P protection
+ in a ring topology since it reduces the extra bandwidth required when
+ traffic doubles through wrapped protection, and it provides the
+ ability to protect both against link and node failures without
+ complicating the fault detection or requiring that multiple
+ protection paths be configured. While this is true, it's possible to
+ support either wrapping or steering while depending upon the OAM
+ functionality (outlined in [RFC6371] and specified in various
+ documents) and the coordination protocol specified for linear
+ protection in [RFC6378].
+
+6. Security Considerations
+
+ This document does not add any security risks to the network. Any
+ security considerations are defined in [RFC6378], and their
+ applicability to the information contained in this document follows
+ naturally from the applicability of the mechanism defined in that
+ document.
+
+7. References
+
+7.1. Normative References
+
+ [RFC6378] Weingarten, Y., Bryant, S., Osborne, E., Sprecher, N., and
+ A. Fulignoli, "MPLS Transport Profile (MPLS-TP) Linear
+ Protection", RFC 6378, October 2011.
+
+7.2. Informative References
+
+ [G.841] ITU, "Types and characteristics of SDH network protection
+ architectures", ITU-T G.841, October 1998.
+
+ [RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S.
+ Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
+ Functional Specification", RFC 2205, September 1997.
+
+
+
+
+
+Weingarten, et al. Informational [Page 27]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ [RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
+ Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
+ May 2005.
+
+ [RFC4427] Mannie, E. and D. Papadimitriou, "Recovery (Protection and
+ Restoration) Terminology for Generalized Multi-Protocol
+ Label Switching (GMPLS)", RFC 4427, March 2006.
+
+ [RFC5331] Aggarwal, R., Rekhter, Y., and E. Rosen, "MPLS Upstream
+ Label Assignment and Context-Specific Label Space",
+ RFC 5331, August 2008.
+
+ [RFC5654] Niven-Jenkins, B., Brungard, D., Betts, M., Sprecher, N.,
+ and S. Ueno, "Requirements of an MPLS Transport Profile",
+ RFC 5654, September 2009.
+
+ [RFC5921] Bocci, M., Bryant, S., Frost, D., Levrau, L., and L.
+ Berger, "A Framework for MPLS in Transport Networks",
+ RFC 5921, July 2010.
+
+ [RFC6371] Busi, I. and D. Allan, "Operations, Administration, and
+ Maintenance Framework for MPLS-Based Transport Networks",
+ RFC 6371, September 2011.
+
+ [RFC6372] Sprecher, N. and A. Farrel, "MPLS Transport Profile
+ (MPLS-TP) Survivability Framework", RFC 6372,
+ September 2011.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 28]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+Appendix A. Acknowledgements
+
+ The authors would like to acknowledge the strong contributions from
+ all the people who commented on this document and made suggestions
+ for improvements.
+
+Appendix B. Contributors
+
+ The authors would like to acknowledge the following individuals that
+ contributed their insights and advice to this work:
+
+ Nurit Sprecher (NSN)
+
+ Akira Sakurai (NEC)
+
+ Rolf Winter (NEC)
+
+ Eric Osborne (Cisco)
+
+Authors' Addresses
+
+ Yaacov Weingarten
+ 34 Hagefen St.
+ Karnei Shomron, 4485500
+ Israel
+
+ Phone:
+ EMail: wyaacov@gmail.com
+
+
+ Stewart Bryant
+ Cisco Systems
+ 10 New Square, Bedfont Lakes
+ Feltham, Middlesex,
+ TW18 8HA
+ UK
+
+ EMail: stbryant@cisco.com
+
+
+ Danielle Ceccarelli
+ Ericsson
+ Via A. Negrone 1/A
+ Genova, Sestri Ponente
+ Italy
+
+ EMail: daniele.ceccarelli@ericsson.com
+
+
+
+
+Weingarten, et al. Informational [Page 29]
+
+RFC 6974 MPLS-TP RP July 2013
+
+
+ Diego Caviglia
+ Ericsson
+ Via A. Negrone 1/A
+ Genova, Sestri Ponente
+ Italy
+
+ EMail: diego.caviglia@ericsson.com
+
+
+ Francesco Fondelli
+ Ericsson
+ Via A. Negrone 1/A
+ Genova, Sestri Ponente
+ Italy
+
+ EMail: francesco.fondelli@ericsson.com
+
+
+ Marco Corsi
+ Altran
+ Via A. Negrone 1/A
+ Genova, Sestri Ponente
+ Italy
+
+ EMail: corsi.marco@gmail.com
+
+
+ Bo Wu
+ ZTE Corporation
+ 4F, RD Building 2, Zijinghua Road
+ Nanjing, Yuhuatai District
+ P.R. China
+
+ EMail: wu.bo@zte.com.cn
+
+
+ Xuehui Dai
+
+ EMail: xuehuiwfsy@gmail.com
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 30]
+