summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc3353.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc3353.txt')
-rw-r--r--doc/rfc/rfc3353.txt1683
1 files changed, 1683 insertions, 0 deletions
diff --git a/doc/rfc/rfc3353.txt b/doc/rfc/rfc3353.txt
new file mode 100644
index 0000000..f16fb91
--- /dev/null
+++ b/doc/rfc/rfc3353.txt
@@ -0,0 +1,1683 @@
+
+
+
+
+
+
+Network Working Group D. Ooms
+Request for Comments: 3353 Alcatel
+Category: Informational B. Sales
+ Alcatel
+ W. Livens
+ Colt Telecom
+ A. Acharya
+ IBM
+ F. Griffoul
+ Ulticom
+ F. Ansari
+ Bell Labs
+ August 2002
+
+
+ Overview of IP Multicast in a
+ Multi-Protocol Label Switching (MPLS) Environment
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2002). All Rights Reserved.
+
+Abstract
+
+ This document offers a framework for IP multicast deployment in an
+ MPLS environment. Issues arising when MPLS techniques are applied to
+ IP multicast are overviewed. The pros and cons of existing IP
+ multicast routing protocols in the context of MPLS are described and
+ the relation to the different trigger methods and label distribution
+ modes are discussed. The consequences of various layer 2 (L2)
+ technologies are listed. Both point-to-point and multi-access
+ networks are considered.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 1]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+Table of Contents
+
+ 1. Introduction ............................................. 3
+ 2. Layer 2 Characteristics .................................. 4
+ 3. Taxonomy of IP Multicast Routing Protocols
+ in the Context of MPLS ................................... 5
+ 3.1. Aggregation .............................................. 5
+ 3.2. Flood & Prune ............................................ 5
+ 3.3. Source/Shared Trees ...................................... 6
+ 3.4. Co-existence of Source and Shared Trees .................. 7
+ 3.5. Uni/Bi-directional Shared Trees .......................... 10
+ 3.6. Encapsulated Multicast Data .............................. 11
+ 3.7. Loop-free-ness ........................................... 11
+ 3.8. Mapping of Characteristics on Existing Protocols ......... 11
+ 4. Mixed L2/L3 Forwarding in a Single Node .................. 12
+ 5. Taxonomy of IP Multicast LSP Triggers .................... 14
+ 5.1. Request Driven ........................................... 14
+ 5.1.1. General .................................................. 14
+ 5.1.2. Multicast Routing Messages ............................... 15
+ 5.1.3. Resource Reservation Messages ............................ 15
+ 5.2. Topology Driven .......................................... 16
+ 5.3. Traffic Driven ........................................... 16
+ 5.3.1. General .................................................. 16
+ 5.3.2. An Implementation Example ................................ 17
+ 5.4. Combinations of Triggers and Label Distribution Modes .... 18
+ 6. Piggy-backing ............................................ 18
+ 7. Explicit Routing ......................................... 20
+ 8. QoS/CoS .................................................. 20
+ 8.1. DiffServ ................................................. 20
+ 8.2. IntServ and RSVP ......................................... 21
+ 9. Multi-access Networks .................................... 21
+ 10. More Issues .............................................. 22
+ 10.1. TTL Field ................................................ 22
+ 10.2. Independent vs. Ordered Label Distribution Control ....... 23
+ 10.3. Conservative vs. Liberal Label Retention Mode ............ 24
+ 10.4. Downstream vs. Upstream Label Allocation ................. 25
+ 10.5. Explicit vs. Implicit Label Distribution ................. 25
+ 11. Security Considerations .................................. 26
+ 12. Acknowledgements ......................................... 26
+ Informative References........................................... 27
+ Authors' Addresses .............................................. 28
+ Full Copyright Statement ........................................ 30
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 2]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+Table of Abbreviations
+
+ ATM Asynchronous Transfer Node
+ CBT Core Based Tree
+ CoS Class of Service
+ DLCI Data Link Connection Identifier
+ DRrecv Designated Router of the receiver
+ DRsend Designated Router of the sender
+ DVMRP Distant Vector Multicast Routing Protocol
+ FR Frame Relay
+ IGMP Internet Group Management Protocol
+ IP Internet Protocol
+ L2 layer 2 (e.g. ATM, Frame Relay)
+ L3 layer 3 (e.g. IP)
+ LSP Label Switched Path
+ LSR Label Switching Router
+ LSRd Downstream LSR
+ LSRu Upstream LSR
+ MOSPF Multicast OSPF
+ mp2mp multipoint-to-multipoint
+ MRT Multicast Routing Table
+ p2mp point-to-multipoint
+ PIM-DM Protocol Independent Multicast-Dense Mode
+ PIM-SM Protocol Independent Multicast-Sparse Mode
+ QoS Quality of Service
+ RP Rendezvous Point
+ RPT-bit RP Tree bit [DEER]
+ RSVP Resource reSerVation Protocol
+ SPT-bit Shortest Path Tree [DEER]
+ SSM Source Specific Multicast
+ TCP Transmission Control Protocol
+ UDP User Datagram Protocol
+ VC Virtual Circuit
+ VCI Virtual Circuit Identifier
+ VP Virtual Path
+ VPI Virtual Path Identifier
+
+1. Introduction
+
+ In an MPLS cloud the routes are determined by a L3 routing protocol.
+ These routes can then be mapped onto L2 paths to enhance network
+ performance. Besides this, MPLS offers a vehicle for enhanced
+ network services such as QoS/CoS, traffic engineering, etc.
+
+ Current unicast routing protocols generate a same (optimal) shortest
+ path in steady state for a certain (source, destination) pair.
+ Remark that unicast protocols can behave slightly different with
+ regard to equal cost paths.
+
+
+
+Ooms, et al. Informational [Page 3]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ For multicast, the optimal solution (minimum cost to interconnect N
+ nodes) would impose a Steiner tree computation. Unfortunately, no
+ multicast routing protocol today is able to maintain such an optimal
+ tree. Different multicast protocols will therefore, in general,
+ generate different trees.
+
+ The discussion is focused on intra-domain multicast routing
+ protocols. Aspects of inter-domain routing are beyond the scope of
+ this document.
+
+2. Layer 2 Characteristics
+
+ Although MPLS is multiprotocol both at L3 and at L2, in practice IP
+ is the only considered L3 protocol. MPLS can run on top of several
+ L2 technologies (PPP/Sonet, Ethernet, ATM, FR, ...).
+
+ When label switching is mapped on L2 switching capabilities (e.g.
+ VPI/VCI is used as label), attention is mainly focused on the mapping
+ to ATM [DAVI]. ATM offers high switching capacities and QoS
+ awareness, but in the context of MPLS it poses several limitations
+ which are described in [DAVI]. Similar considerations are made for
+ Frame Relay on L2 in [CONT]. The limitations can be summarized as:
+
+ - Limited Label Space: either the standardized or the implemented
+ number of bits available for a label can be small (e.g. VPI/VCI
+ space, DLCI space), limiting the number of LSPs that can be
+ established.
+
+ - Merging: some L2 technologies or implementations of these
+ technologies do not support multipoint-to-point and/or
+ multipoint-to-multipoint 'connections', obstructing the merging of
+ LSPs.
+
+ - TTL: L2 technologies do not support a 'TTL-decrement' function.
+
+ All three limitations can impact the implementation of multicast in
+ MPLS as will be described in this document.
+
+ When native MPLS is deployed the above limitations vanish. Moreover
+ on PPP and Ethernet links the same label can be used at the same time
+ for a unicast and a multicast LSP because different EtherTypes for
+ MPLS unicast and multicast are defined [ROSE].
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 4]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+3. Taxonomy of IP Multicast Routing Protocols in the Context of MPLS
+
+ At the moment, an abundance of IP multicast routing protocols is
+ being proposed and developed. All these protocols have different
+ characteristics (scalability, computational complexity, latency,
+ control message overhead, tree type, etc...). It is not the purpose
+ of this document to give a complete taxonomy of IP multicast routing
+ protocols, only their characteristics relevant to the MPLS technology
+ will be addressed.
+
+ The following characteristics are considered:
+
+ - Aggregation
+ - Flood & Prune
+ - Source/Shared trees
+ - Co-existence of Source and Shared Trees
+ - Uni/Bi-directional shared trees
+ - Encapsulated multicast data
+ - Loop-free-ness
+
+ The discussion of these characteristics will not lead to the
+ selection of one superior multicast routing protocol. It is not
+ impossible that different IP multicast routing protocols will be
+ deployed in the Internet.
+
+3.1. Aggregation
+
+ In unicast different destination addresses are aggregated to one
+ entry in the routing table, yielding one FEC and one LSP.
+
+ The granularity of multicast streams is (*, G) for a shared tree and
+ (S, G) for a source tree, S being the source address and G the
+ multicast group address. Aggregation of multicast trees with
+ different multicast 'destination' addresses on one LSP is a subject
+ for further study.
+
+3.2. Flood & Prune
+
+ To establish a multicast tree some IP multicast routing protocols
+ (e.g. DVMRP, PIM-DM) flood the network with multicast data. The
+ branches can then be pruned by nodes which do not want to receive the
+ data of the specific multicast group. This process is repeated
+ periodically.
+
+ Flood & Prune multicast routing protocols have some characteristics
+ which significantly differ from unicast routing protocols:
+
+
+
+
+
+Ooms, et al. Informational [Page 5]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ a) Volatile. Due to the Flood & Prune nature of the protocol, very
+ volatile tree structures are generated. Solutions to map a
+ dynamic L3 p2mp tree to a L2 p2mp LSP need to be efficient in
+ terms of signaling overhead and LSP setup time. The volatile L2
+ LSP will consume a lot of labels throughout the network, which is
+ a disadvantage when label space is limited.
+
+ b) Traffic-driven. The router only creates state for a certain group
+ when data arrives for that group. Routers also independently
+ decide to remove state when an inactivity timer expires.
+
+ - Thus LSPs can not be pre-established as is usually done in
+ unicast. To minimize the time between traffic arrival and LSP
+ establishment a fast LSP setup method is favorable.
+
+ - Since creation and deletion of a L3 route at each node is
+ triggered by traffic, this suggests that the LSP associated with
+ the route be setup and torn down in a traffic-driven manner as
+ well.
+
+ - If an LSR does not support L3 forwarding this traffic-driven
+ nature even requires that the upstream LSR takes the initiative
+ to create an LSP (Upstream Unsolicited or Downstream on Demand
+ label advertisement).
+
+3.3. Source/Shared Trees
+
+ IP multicast routing protocols create either source trees (S, G),
+ i.e. a tree per source (S) and per multicast group (G), or shared
+ trees (*, G), i.e. one tree per multicast group (Figure 1).
+
+
+ R1 R1 R1
+ S1 / / /
+ \ / / /
+ \ / / /
+ C---R2 S1---R2 S2---R2
+ / \ \ \
+ / \ \ \
+ S2 \ \ \
+ R3 R3 R3
+
+ Figure 1. Shared tree and Source trees
+
+ The advantage of using shared trees, when label switching is applied,
+ is that shared trees consume less labels than source trees (1 label
+ per group versus 1 label per source and per group).
+
+
+
+
+Ooms, et al. Informational [Page 6]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ However, mapping a shared tree end-to-end on L2 implies setting up
+ multipoint-to-multipoint (mp2mp) LSPs. The problem of implementing
+ mp2mp LSPs boils down to the merging problem discussed earlier.
+
+ Note that in practice shared trees are often only used to discover
+ new sources of the group and a switchover to a source tree is made at
+ very low bitrates.
+
+3.4. Co-existence of Source and Shared Trees
+
+ Some protocols support both source and shared trees (e.g. PIM-SM) and
+ one router can maintain both (*, G) and (S, G) state for the same
+ group G. Two cases of state co-existence are described below.
+ Assume topologies with senders Si and receivers Ri. RP is the
+ Rendezvous Point. Ni are LSRs. The numbers are the interface
+ numbers, "Reg" is the Register interface. All IGMP and PIM
+ Join/Prune messages are shown in the figures. It is also indicated
+ whether the RPT-bit is set for the (S, G) state.
+
+ 1) Figure 2 shows a switchover from shared to source tree. Assume
+ that the shortest path from R1 to RP is via N1-N2-N5. N1, the
+ Designated Router of receiver R1 (DRrecv), decides to initiate a
+ source tree for source S1. After the arrival of data via the
+ source tree in N2, N2 will send a prune to N5 for source S1.
+ State co-existence occurs in the node where the overlap of shared
+ and source tree starts (N2) and in the node where S1 does not need
+ forwarding on the shared tree anymore (N5).
+
+ PJ
+ IJ PJS PJS
+ -> 1 2 -> 1 2 -> 1 2
+ R1-----N1------N2------N3----S1
+ 3| |3 IJ=Igmp Join
+ ||PPS | PJ=Pim Join (*,G)
+ |vPJ | PJS=Pim Join (S1,G)
+ IJ PJ | PJ | PPS=Pim Prune (S1,G)
+ -> -> |3 -> |
+ R2-----N4------N5------RP----S2
+ 1 2 1 2 1
+
+ Figure 2
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 7]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ The multicast routing states created in the Multicast Routing Table
+ (MRT) are:
+
+ in RP: (*,G):Reg->1 (i.e. incoming itf=Reg; outgoing itf=1)
+ in N1: (*,G):2->1
+ in N2: (*,G):3->1
+ (S1,G):2->1
+ in N3: (S1,G):2->Reg,1
+ in N4: (*,G):2->1
+ in N5: (*,G):2->1,3
+ (S1,G)RPT-bit:2->1
+
+ 2) Figure 3 shows that even without a switchover, state co-existence
+ can occur. Multicast traffic from a sender will create (S, G)
+ state in the Designated Router of the sender (DRsend; N3 in Figure
+ 3 is the DRsend of S). Each node on a shared-tree has (*, G)
+ state. Thus an on-tree DRsend has both (*, G) and (S, G) state.
+ If the DRsend is on-tree it will also send a prune for S towards
+ the RP, creating (S, G) state in all nodes until the first router
+ which has a branch (N1 and N2 in Figure 3).
+
+ S
+ PPS PPS |
+ PJ PJ PJ |2 PJ IJ
+ 1 <- 1 3<- <- | <- <- PJ=Pim Join
+ RP------N1----N2----N3----N4----R1 IJ=Igmp Join
+ ^|2 1 2 1 3 1 2 PPS=Pim Prune (S,G)
+ PJ|| IJ
+ 1| <-
+ N5----R2
+ 2
+ Figure 3
+
+ The multicast routing states created in the MRT are:
+
+ in RP: (*,G):Reg->1 (i.e. incoming itf=Reg; outgoing itf=1)
+ in N1: (*,G):1->2,3
+ (S,G)RPT-bit:1->2
+ in N2: (*,G):1->2
+ (S,G)RPT-bit:1->none
+ in N3: (*,G):1->3
+ (S,G):2->Reg,3
+ in N4: (*,G):1->2
+ in N5: (*,G):1->2
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 8]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ In the examples one can observe that two types of state co-
+ existence occur:
+
+ 1) (S, G) with RPT-bit not set (N2 in Figure 2, N3 in Figure 3). The
+ (*, G) and (S, G) state have different incoming interfaces, but
+ some common outgoing interfaces. It is possible that the traffic
+ of S arrives on both the (*, G) and (S, G) interfaces. In normal
+ L3 forwarding the (S, G)SPT-bit entry prohibits the forwarding of
+ the traffic from S arriving on the (*, G) incoming interface. The
+ traffic of S can only temporarily arrive on the incoming
+ interfaces of both the (*, G) and (S, G) entries (until N5 in
+ Figure 2 and N1 in Figure 3 have processed the prune messages).
+ To avoid the temporary forwarding of duplicate packets L3
+ forwarding can be applied in this type of node. If one does not
+ mind the temporary duplicate packets L2 forwarding can be applied.
+ In this case the (*, G) and (S, G) streams have to be merged into
+ the (*, G) LSP on their common outgoing interfaces.
+
+ 2) (S, G) with RPT-bit set (N5 in Figure 2, N1 in Figure 3). The
+ (*, G) and (S, G) state have the same incoming interface. The (S,
+ G) traffic must be extracted from the (*, G) stream. In MPLS this
+ state co-existence can be handled in several ways. Four
+ approaches to this problem will be described:
+
+ a) A first method to handle this state co-existence is to
+ terminate the LSPs and forward all traffic of this group at L3.
+ However a return to L3 can be avoided in case a (S, G) entry
+ without an outgoing interface is added to the MRT (N2 in Figure
+ 3). This entry will only receive traffic temporarily. In this
+ particular case one could ignore the (S, G) state and maintain
+ the existing (*, G) LSP, the disadvantage being duplicate
+ traffic for a very short time.
+
+ b) A second approach is to assign source specific labels on the
+ nodes of the shared tree. Multiple labels will be associated
+ with one (*, G) entry, corresponding to one label per active
+ source. Since the nodes only know which sources are active
+ when traffic from these sources arrives, the LSPs cannot be
+ pre-established and a fast LSP setup method is favorable.
+
+ c) A third way is that only source trees are labelswitched and
+ that traffic on the shared tree is always forwarded at L3.
+ This assumes that the shared tree is only used as a way for the
+ receivers to find out who the sources are. By configuring a
+ low bitrate switchover threshold, one can ensure that the
+ receivers switchover to source trees very quickly.
+
+
+
+
+
+Ooms, et al. Informational [Page 9]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ d) In the fourth approach, an LSR which has (S, G) RPT-bit state
+ with a non-null oif, advertises a label for (S, G) to the
+ upstream LSR and this label advertisement is then propagated by
+ each upstream LSR towards the RP. In this way a dedicated LSP
+ is created for (S, G) traffic from the RP to the LSR with the
+ (S, G) RPT-bit state. In the latter LSR, the (S, G) LSP is
+ merged onto the (*, G) LSP for the appropriate outgoing
+ interfaces. This ensures that (S, G) packets traveling on the
+ shared tree do not make it past any LSR which has pruned S.
+
+3.5. Uni/Bi-directional Shared Trees
+
+ Bidirectional shared trees (e.g. CBT [BALL]) have the disadvantage of
+ creating a lot of merging points (M) in the nodes (N) of the shared
+ tree. Figure 4 shows these merging points resulting from 2 senders
+ S1 and S2 on a bidirectional tree.
+
+ S1 S2
+ || ||
+ v| <- <- <- <- |v
+ <- <- | -> -> -> -> | ->
+ ----N----M----M----M----M----M----N
+ || || || || || ||
+ |v |v |v |v |v |v
+ | | | | | |
+
+ Figure 4.
+ Multicast traffic flows from 2 senders on a bidirectional tree
+
+ In Figure 5 the same situation for unidirectional shared trees is
+ depicted. In this case the data of the senders is tunneled towards
+ the root node R, yielding only a single merging point, namely the
+ root of the shared tree itself.
+
+ S1
+ tunnel || S2
+ <----- v| tunnel ||
+ to R<------------------------- v|
+ -> -> | -> -> -> -> | ->
+ ----N----N----N----N----N----N----N
+ || || || || || ||
+ |v |v |v |v |v |v
+ | | | | | |
+
+ Figure 5.
+ Multicast traffic flows from 2 senders on a unidirectional tree
+
+
+
+
+
+Ooms, et al. Informational [Page 10]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+3.6. Encapsulated Multicast Data
+
+ Sources of unidirectional shared trees and non-member sources of
+ bidirectional shared trees encapsulate the data towards the root
+ node. The data is then decapsulated in the root node. The
+ encapsulation and decapsulation of multicast data are L3 processes.
+
+ Thus in case of encapsulation/decapsulation a path can never be
+ mapped onto an end-to-end LSP: the traffic can not be forwarded on
+ L2 on the Register interface of the DRsend (encapsulation), nor can
+ it cross the root (decapsulation) at L2.
+
+ Remarks:
+
+ 1) If the LSR supports mixed L2/L3 forwarding (section 4), the (S, G)
+ traffic in DRsend can still be forwarded at L2 on all outgoing
+ interfaces other than the Register interface.
+
+ 2) The encapsulated traffic can also benefit from MPLS by label
+ switching the tunnels.
+
+ 3) If the root node decides to join the source (to avoid
+ encapsulation/decapsulation), an end-to-end (S, G) LSP can be
+ constructed.
+
+3.7. Loop-free-ness
+
+ Multicast routing protocols which depend on a unicast routing
+ protocol suffer from the same transient loops as the unicast
+ protocols do, however the effect of loops will be much worse in the
+ case of multicast. The reason being, each time a multicast packet
+ goes around a loop, copies of the packet may be emitted from the loop
+ if branches exist in the loop.
+
+ Currently loop detection is a configurable option in LDP and a
+ decision on the mechanism for loop prevention is postponed.
+
+3.8. Mapping of Characteristics on Existing Protocols
+
+ The above characteristics are summarized in Table 1 for a
+ non-exhaustive list of existing IP multicast routing protocols:
+ DVMRP [PUSA], MOSPF [MOY], CBT [BALL], PIM-DM [ADAM], PIM-SM [DEER],
+ SSM [HOLB], SM [PERL].
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 11]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ +------------------+------+------+------+------+------+------+------+
+ | |DVMRP |MOSPF |CBT |PIM-DM|PIM-SM|SSM |SM |
+ +------------------+------+------+------+------+------+------+------+
+ |Aggregation |no |no |no |no |no |no |no |
+ +------------------+------+------+------+------+------+------+------+
+ |Flood & Prune |yes |no |no |yes |no |no |option|
+ +------------------+------+------+------+------+------+------+------+
+ |Tree Type |source|source|shared|source|both |source|shared|
+ +------------------+------+------+------+------+------+------+------+
+ |State Co-existence|no |no |no |no |yes |no |no |
+ +------------------+------+------+------+------+------+------+------+
+ |Uni/Bi-directional|N/A |N/A |bi |N/A |uni |uni |bi |
+ +------------------+------+------+------+------+------+------+------+
+ |Encapsulation |no |no |yes |no |yes |no |yes |
+ +------------------+------+------+------+------+------+------+------+
+ |Loop Free |no |no |no |no |no |no |no |
+ +------------------+------+------+------+------+------+------+------+
+
+ Table 1. Taxonomy of IP Multicast Routing Protocols
+
+ From Table 1 one can derive e.g. that DVMRP will consume a lot of
+ labels when the Flood & Prune L3 tree is mapped onto a L2 tree.
+ Furthermore since DVMRP uses source trees it experiences no merging
+ problem when label switching is applied. The table can be
+ interpreted in the same way for the other protocols.
+
+4. Mixed L2/L3 Forwarding in a Single Node
+
+ Since unicast traffic has one incoming and one outgoing interface the
+ traffic is either forwarded at L2 OR at L3 (Figure 6). Because
+ multicast traffic can be forwarded to more than one outgoing
+ interface one can consider the case that traffic to some branches is
+ forwarded on L2 and to other branches on L3 (Figure 7).
+
+ +--------+ +--------+
+ | L3 | | L3 |
+ | +>>+ | | |
+ | | | | | |
+ +--|--|--+ +--------+
+ | | | | | |
+ ->-----+ +-----> ->------>>----->
+ | L2 | | L2 |
+ +--------+ +--------+
+
+ Figure 6. Unicast forwarding on resp. L3 or L2
+
+
+
+
+
+
+Ooms, et al. Informational [Page 12]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ +--------+ +--------+ +--------+
+ | L3 | | L3 | | L3 |
+ | +>>++ | | +>>+ | | |
+ | | || | | | | | | |
+ +--|--||-+ +--|--|--+ +--------+
+ | | |+----> | | +-----> | +---->
+ ->-----+ | | | |L2 | ->----->>-+ |
+ | L2+-----> ->-----+>>------> | L2 +---->
+ +--------+ +--------+ +--------+
+
+ Figure 7. Multicast forwarding on resp. L3, mixed L2/L3 or L2
+
+ Nodes that support this 'mixed L2/L3 forwarding' feature allow
+ splitting of a multicast tree into branches in which some are
+ forwarded at L3 while others are switched at L2.
+
+ The L3 forwarding has to take care that the traffic is not forwarded
+ on those branches that already get their traffic on L2. This can be
+ accomplished by e.g. providing an extra bit in the Multicast Routing
+ Table.
+
+ Although the mixed L2/L3 forwarding requires processing of the
+ traffic at L3, the load on the L3 forwarding engine is generally less
+ than in a pure L3 node.
+
+ Supporting this 'mixed L2/L3 forwarding' feature has the following
+ advantages:
+
+ a) Assume LSR A (Figure 8) is an MPLS edge node for the branch
+ towards LSR B and an MPLS core node for the branch towards LSR C.
+ The mixed L2/L3 forwarding allows that the branch towards C is not
+ disturbed by a return to L3 in LSR A.
+
+ +-------------+
+ | MPLS cloud |
+ | N |
+ | / \ |
+ | / \ |
+ | / \ |
+ | A N |
+ |/ \ \ |
+ | \ \ |
+ /| \ |
+ B | C |
+ | |
+ +-------------+
+
+ Figure 8. Mixed L2/L3 forwarding in node A
+
+
+
+Ooms, et al. Informational [Page 13]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ b) Enables the use of the traffic driven trigger with the Downstream
+ Unsolicited or Upstream on Demand label distribution mode, as
+ explained in section 5.3.1.
+
+5. Taxonomy of IP Multicast LSP Triggers
+
+ The creation of an LSP for multicast streams can be triggered by
+ different events, which can be mapped on the well known categories of
+ 'request driven', 'topology driven' and 'traffic driven'.
+
+ a) Request driven: intercept the sending or receiving of control
+ messages (e.g. multicast routing messages, resource reservation
+ messages).
+
+ b) Topology driven: map the L3 tree, which is available in the
+ Multicast Routing Table, to a L2 tree. The mapping is done even
+ if there is no traffic.
+
+ c) Traffic driven: the L3 tree is mapped onto a L2 tree when data
+ arrives on the tree.
+
+5.1. Request Driven
+
+5.1.1. General
+
+ The establishment of LSPs can be triggered by the interception of
+ outgoing (requiring that the label is requested by the downstream
+ LSR) or incoming (requiring that the label is requested by the
+ upstream LSR) control messages. Figure 9 illustrates these two
+ cases.
+
+ LSRu LSRd LSRu LSRd
+ -------+ +--- ---+ +-------
+ | control | | control |
+ <---*<-----message------- <-------message-------*----
+ | | | | | |
+ trigger| | | | | |trigger
+ | | bind | | bind | |
+ +--------or---------> <---------or----------+
+ | bind-request | | bind-request |
+ | | | |
+ | | | |
+ |----data----->| |-----data---->|
+
+ incoming outgoing
+
+ Figure 9. Request driven trigger
+ (interception of resp. incoming and outgoing control messages)
+
+
+
+Ooms, et al. Informational [Page 14]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ The downstream LSR (LSRd) sends a control message to the upstream LSR
+ (LSRu). In the case that incoming control messages are intercepted
+ and the MPLS module in LSRu decides to establish an LSP, it will send
+ an LDP bind (Upstream Unsolicited mode) or an LDP bind request
+ (Downstream on Demand mode) to LSRd.
+
+ Currently, for multicast, we can identify two important types of
+ control messages: the multicast routing messages and the resource
+ reservation messages.
+
+5.1.2. Multicast Routing Messages
+
+ In principle, this mechanism can only be used by IP multicast routing
+ protocols which use explicit signaling: e.g. the Join messages in
+ PIM-SM or CBT. Remark that DVMRP and PIM-DM can be adapted to
+ support this type of trigger [FARI], however, at the cost of
+ modifying the IP multicast routing protocol itself!
+
+ IP multicast routing messages can create both hard states (e.g. CBT
+ Join + CBT Join-Ack) and soft states (e.g. PIM-SM Joins are sent
+ periodically). The latter generates more control traffic for tree
+ maintenance and thus requires more processing in the MPLS module.
+
+ Triggers based on the multicast routing protocol messages have the
+ disadvantage that the 'routing calculations' performed by the
+ multicast routing daemon to determine the Multicast Routing Table are
+ repeated by the MPLS module. The former determines the tree that
+ will be used at L3, the latter calculates an identical tree to be
+ used by L2. Since the same task is performed twice, it is better to
+ create the multicast LSP on the basis of information extracted from
+ the Multicast Routing Table itself (see section 5.2 and 5.3). The
+ routing calculations become more complex for protocols which support
+ a switch-over from a (*, G) tree to a (S, G) tree because more
+ messages have to be interpreted.
+
+ When a host has a point-to-point connection to the first router one
+ could create 'LSPs up to the end-user' by intercepting not only the
+ multicast routing messages but the IGMP Join/Prune messages ([FENN])
+ as well.
+
+5.1.3. Resource Reservation Messages
+
+ As is the case for unicast the RSVP Resv message can be used as a
+ trigger to establish LSPs. A source of a multicast group will send
+ an RSVP Path message down the tree, the receivers can then reply with
+ an RSVP Resv message. RSVP scales equally well for multicast as it
+ does for unicast because:
+
+
+
+
+Ooms, et al. Informational [Page 15]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ a) RSVP Resv messages can merge.
+
+ b) RSVP Resv messages are only sent up to the first branch which made
+ the required reservation.
+
+5.2. Topology Driven
+
+ The Multicast Routing Table (MRT) is maintained by the IP multicast
+ routing protocol daemon. The MPLS module maps this L3 tree topology
+ information to L2 p2mp LSPs.
+
+ The MPLS module can poll the MRT to extract the tree topologies.
+ Alternatively, the multicast daemon can be modified to notify the
+ MPLS module directly of any change to the MRT.
+
+ The disadvantage of this method is that labels are consumed even when
+ no traffic exists.
+
+5.3. Traffic Driven
+
+5.3.1. General
+
+ A traffic driven trigger method will only construct LSPs for trees
+ which carry traffic. It consumes less labels than the topology
+ driven method, as labels are only allocated when there is traffic on
+ the multicast tree.
+
+ If the mixed L2/L3 forwarding capability (see section 4) is not
+ supported, the traffic driven trigger requires a label distribution
+ mode in which the label is requested by the LSRu (Downstream on
+ Demand or Upstream Unsolicited mode). In Figure 10, suppose an LSP
+ for a certain group exists to LSRd1 and another LSRd2 wants to join
+ the tree. In order for LSRd2 to initiate a trigger, it must already
+ receive the traffic from the tree. This can be either at L2 or at
+ L3. The former case is a chicken and egg problem. The latter case
+ requires a mixed L2/L3 forwarding capability in LSRu to add the L3
+ branch.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 16]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ +--------+
+ | LSRd1 |
+ | |
+ +--------+ | L3 |
+ | LSRu | +--------+
+ | | | |
+ | L3 | +-------------------------->
+ +--------+ / | L2 |
+ | | / +--------+
+ ->-------------+
+ | L2 | +--------+
+ +--------+ | LSRd2 |
+ | |
+ | L3 |
+ +--------+
+ | |
+ | |
+ | L2 |
+ +--------+
+
+ Figure 10. The LSRu has to request the label.
+
+5.3.2. An Implementation Example
+
+ To illustrate that by choosing an appropriate trigger one can
+ conclude that MPLS multicast is independent of the deployed multicast
+ routing protocol, the following implementation example is given.
+
+ Current implementations on Unix platforms of IP multicast routing
+ protocols (DVMRP, PIM) have a Multicast Forwarding Cache (MFC). The
+ MFC is a cached copy of the Multicast Routing Table. The MFC
+ requests an entry for a certain multicast group when it experiences a
+ 'cache miss' for an incoming multicast packet. The missing routing
+ information is provided by the multicast daemon. If at a later point
+ in time something changes to the route (outgoing interfaces added or
+ removed), the multicast daemon will update the MFC.
+
+ The MFC is implemented as a common component (part of the kernel),
+ which makes this trigger very attractive because it can be
+ transparently used for any IP multicast routing protocol.
+
+ Entries in the MFC are removed when no traffic is received for this
+ entry for a certain period of time. When label switching is applied
+ to a certain MFC-entry, the L3 will not see any packets arriving
+ anymore. To retain the normal MFC behavior, the L3 counters of the
+ MFC need to be updated by L2 measurements.
+
+
+
+
+
+Ooms, et al. Informational [Page 17]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+5.4. Combinations of Triggers and Label Distribution Modes
+
+ Table 2 shows the valid combinations of label distribution modes and
+ trigger types that were discussed in the previous sections. The (X)
+ means that the combination is valid when the mixed L2/L3 forwarding
+ feature is supported in the LSR.
+
+ +----------------+---------------------------------------------+
+ | | label requested by |
+ | | LSRu | LSRd |
+ | +----------------------+----------------------+
+ | | upstream |downstream|downstream |upstream |
+ | |unsolicited|on demand |unsolicited|on demand |
+ +----------------+-----------+----------+-----------+----------+
+ |Request Driven | | | | |
+ |(incoming msg) | X | X | | |
+ +----------------+-----------+----------+-----------+----------+
+ |Request Driven | | | | |
+ |(outgoing msg) | | | X | X |
+ +----------------+-----------+----------+-----------+----------+
+ |Topology Driven | X | X | X | X |
+ +----------------+-----------+----------+-----------+----------+
+ |Traffic Driven | X | X | (X) | (X) |
+ +----------------+-----------+----------+-----------+----------+
+
+ Table 2. Valid combinations of triggers and label distribution modes
+
+6. Piggy-backing
+
+ In Figure 9 (outgoing case) one can observe that instead of sending 2
+ separate messages the label advertisement can be piggy-backed on the
+ existing control messages. For multicast two piggy-back candidates
+ exist:
+
+ a) Multicast routing messages: protocols such as PIM-SM and CBT have
+ explicit Join messages which could carry the label mappings. This
+ approach is described in [FARI]. When different multicast routing
+ protocols are deployed, an extension to each of these protocols
+ has to be defined.
+
+ b) RSVP Resv messages: a label mapping extension object for RSVP,
+ also applicable to multicast, is proposed in [AWDU].
+
+ The pros and cons of piggy-backing on multicast routing messages will
+ be described now.
+
+
+
+
+
+
+Ooms, et al. Informational [Page 18]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ Piggy-backing has following advantages:
+
+ a) If the label advertisement is piggy-backed on multicast routing
+ messages, then the distribution of routes and the distribution of
+ labels is tightly synchronized. This eliminates difficult corner
+ cases such as "what do I do with a label if I don't (yet) have a
+ routing table entry to attach it to?". It also minimizes the
+ interval between the establishment of the multicast route and the
+ mapping of a label to the route.
+
+ b) The number of control messages needed to support label
+ advertisement beyond those needed to support the multicast routing
+ itself is zero.
+
+ Following disadvantages of piggy-backing can be identified:
+
+ a) In dense-mode protocols there are no messages on which the label
+ advertisement can be piggy-backed. [FARI] proposes to add
+ periodic messages to dense-mode protocols for the purpose of label
+ advertisement, which is a heavy impact on the multicast routing
+ protocol and it eliminates the message conserving benefit of
+ piggy-backing.
+
+ b) The second solution for the state co-existence problem (section
+ 3.4) cannot be applied in combination with piggy-backing.
+
+ c) Piggy-backing requires extending the multicast routing protocol,
+ and hence becomes less attractive if label advertisement needs to
+ be supported for multiple multicast routing protocols. Especially
+ when not only the label advertisement but also the other two LDP
+ functions (discovery and adjacency) are piggy-backed.
+
+ d) Piggy-backing assumes the Downstream Unsolicited label
+ distribution mode, this excludes a number of trigger methods (see
+ Table 2).
+
+ e) LDP normally runs on top of TCP, assuring a reliable communication
+ between peer nodes. Piggy-backed label advertisement often
+ replaces the reliable communication with periodic soft-state label
+ advertisements. Because of this periodic label advertisement the
+ control traffic (in number of bytes) will increase.
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 19]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ f) If a VCID notification mechanism [NAGA] is required, the (in-band)
+ notification can normally be done by sending the LDP bind through
+ the newly established VC. This way only one message is
+ required. This method cannot be combined with piggy-backing
+ because the routing message is sent before the VC can be
+ established. An extra handshake message is thus required,
+ diminishing the benefit of piggy-backing.
+
+ So whether piggy-backing makes sense or not depends heavily on which
+ and how many multicast routing protocols are deployed, whether LDP is
+ already used for unicast, which trigger mechanism is used, ...
+ Piggy-backing is just one possible component of an MPLS multicast
+ solution.
+
+7. Explicit Routing
+
+ Explicit routing for unicast refers to overriding the unicast routing
+ table by using LSPs.
+
+ A first way to interpret "multicast explicit routing" is overriding
+ the tree established by the multicast routing protocol by another LSP
+ tree (e.g. a Steiner tree calculated by an off-line tool). In this
+ interpretation the current 'shortest path' multicast routing protocol
+ becomes obsolete and can be replaced by label advertisement messages
+ that follow an explicit route (e.g. a branch of the Steiner tree).
+
+ A second way of interpreting "multicast explicit routing" is that the
+ known multicast routing protocols are running, but that the messages
+ generated by these protocols use explicit unicast routes (instead of
+ the IGP shortest path routes) to construct trees.
+
+8. QoS/CoS
+
+8.1. DiffServ
+
+ The Differentiated Services approach can be applied to multicast as
+ well. It introduces finer stream granularities (DiffServ Codepoint
+ (DSCP) as an extra differentiator). A sender can construct one or
+ more trees with different DSCPs.
+
+ These (S, G, DSCP) or (*, G, DSCP) trees can be mapped very easily
+ onto LSPs when the traffic driven trigger is used. In this case one
+ can create LSPs with different attributes for the various DSCPs.
+ Note however that these LSPs still use the same route as long as the
+ tree construction mechanism itself does not take the DSCP as an
+ input.
+
+
+
+
+
+Ooms, et al. Informational [Page 20]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+8.2. IntServ and RSVP
+
+ RSVP can be used to setup multicast trees with QoS. An important
+ multicast issue is the problem of how to map the 'heterogeneous
+ receivers' paradigm onto L2 (remark that it is not solved in IP
+ either). This subject is tackled in [CRAW]. Pragmatic approaches
+ are the 'Limited Heterogeneity Model' which allows a best effort
+ service and a single alternate QoS (e.g. a QoS proposed by the sender
+ in a RSVP Path message) and the 'Homogeneous Model' which allows only
+ a single QoS.
+
+ The first approach will construct full trees for each service class.
+ The sender has to send its traffic twice across the network (e.g. 1
+ best-effort and 1 QoS tree). Both trees can be label switched.
+
+ The second approach constructs one tree and the best-effort users are
+ connected to the QoS tree. If the branches created for best-effort
+ users are not to be label switched, (thus carried by a hop-by-hop
+ default LSP) the QoS multicast traffic has to be merged onto these
+ default LSPs. This function can be provided by the 'mixed L2/L3
+ forwarding' feature described in section 4. If this is not
+ available, merging is necessary to avoid a return to L3 in the QoS
+ LSP.
+
+ The mapping of the IntServ service categories onto L2 for ATM service
+ categories is studied in [GARR].
+
+9. Multi-access Networks
+
+ Multicast MPLS on multi-access networks poses a special problem. An
+ LSR that wants to join a group must always be ready to accept the
+ label that is already assigned to the group LSP (to another
+ downstream LSR on the link). This can be achieved in three ways:
+
+ 1) Each LSR on the multi-access link memorizes all the advertised
+ labels on the link, even if it has not received a join for the
+ associated group. If an LSR is added to the multi-access link it
+ has to retrieve this information from another LSR on the link or
+ in case of soft state label advertisement it can wait a certain
+ time before it can allocate labels itself. If LSRs allocate a
+ label 'at the same moment' the LSR with the highest IP address
+ could keep it, while the other LSRs withdraw the label.
+
+ 2) Each LSR gets its own label range to allocate labels from. A
+ mechanism for label partitioning is described in [FARI]. If an
+ LSR is added to the multi-access link, the label ranges have to be
+ negotiated again and possibly existing LSPs are torn down and
+ are reconstructed with other labels.
+
+
+
+Ooms, et al. Informational [Page 21]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ 3) Per multi-access link one LSR could be elected to be responsible
+ for label allocation. When an LSR needs a label, it can request
+ it from this Label Allocation LSR.
+
+ Unlike the unicast case, a multicast stream can have more than one
+ downstream LSR which all have to use the same label. Two solutions
+ for label advertisement can be thought of:
+
+ 1) [FARI] proposes to multicast the label advertisements to all LSRs
+ on the shared link. Since multicast is not reliable this requires
+ periodic label advertisements, yielding label advertisement
+ duplicates in time.
+
+ 2) Another approach is that an LSR unicasts its label advertisements
+ in a reliable way (TCP) to all other (or to all interested) LSRs
+ on the shared link. In this approach the hard-state character of
+ LDP can be maintained but the label advertisement is duplicated in
+ space.
+
+ Since LSPs are only rewarding if they have a long lifetime and since
+ the number of LSRs on a shared link is limited the second approach
+ seems advantageous.
+
+ Another issue with multicast in multi-access networks is whether to
+ use upstream or downstream label assignment. For multicast traffic,
+ upstream label allocation is simpler since there can be only one
+ upstream node per link that belongs to a multicast tree. This
+ (upstream) node can assign a unique label for the FEC. With
+ downstream allocation, there may be multiple downstream nodes for a
+ given tree on a multi-access link; each node may propose a different
+ label assignment for a FEC that would require some resolution process
+ in order to come up with a single label per multicast FEC on the
+ link.
+
+ Once a label has been assigned, it is possible that the label
+ assigner leaves the tree. With downstream label assignment, this
+ could happen when the label allocator leaves the group. With
+ upstream assignment this could happen when the upstream LSR changes
+ due to a unicast topology change.
+
+10. More Issues
+
+10.1. TTL Field
+
+ The TTL field in the IP header is typically used for loop detection.
+ In IP multicast it is also used to limit the scope of the multicast
+ packets by setting an appropriate TTL value.
+
+
+
+
+Ooms, et al. Informational [Page 22]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ Thus in LSRs that do not support a TTL decrement function (e.g. ATM
+ LSR), the scope restriction function is affected. Suppose one could
+ calculate in advance the number of hops an LSP traverses. In a
+ unicast LSP the TTL value could then be decremented at the ingress or
+ the egress node. For multicast all the branches of the tree can have
+ different lengths so the TTL can only be decremented at the egress
+ node, potentially wasting bandwidth if the TTL turns out to be zero
+ or negative.
+
+10.2. Independent vs. Ordered Label Distribution Control
+
+ Current Label Distribution Terminology is only defined for unicast.
+ The following sections explore what this terminology might mean in a
+ multicast context.
+
+ In Independent Control ([ANDE]) each LSR can take the initiative to
+ do a label mapping. In Ordered Control ([ANDE]) an LSR only maps a
+ label when it already received a label from its next-hop.
+
+ All the previously described trigger methods (section 5) combine with
+ Independent Control. Note that if the request driven approach is
+ used with Independent Control the label distribution still behaves as
+ in Ordered Control: the control messages flow from the egress node
+ upstream, imposing the same sequence to the label advertisement.
+
+ Ordered Control is not applicable for a traffic driven trigger in
+ case the node does not support mixed L2/L3 forwarding. According to
+ Table 2, this case implies that labels are requested by the upstream
+ LSR. Suppose in Figure 11 that an LSP exists from S to R1 and a new
+ branch must be added to R2. B will only accept a label on the A-B
+ link if a label is already assigned on the B-C link. However, to
+ establish a label on the B-C link, B must already receive traffic on
+ the A-B link.
+
+ N---N---R1
+ /
+ /
+ S -----A
+ \
+ \
+ B---C---R2
+
+ Figure 11.
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 23]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+10.3. Conservative vs. Liberal Label Retention Mode
+
+ In the Conservative Mode ([ANDE]) only the labels that are used for
+ forwarding data (if the next-hop for the FEC is the LSR which
+ advertised the label) are allocated and maintained. In the Liberal
+ Mode labels are advertised and maintained to all neighbors. Liberal
+ Mode does not make sense in multicast. Two reasons can be identified
+ for this:
+
+ 1) All LSRs have a route for each unicast FEC. This is not true for
+ multicast FECs.
+
+ 2) For multicast an LSR always knows to which neighbor to send the
+ label request or the label map messages. In e.g. unicast
+ Downstream Unsolicited mode (see below) the LSR does not know
+ where to send the label mappings and thus has to send the mapping
+ to all its neighbors. In this case supporting the Liberal Mode
+ does not generate extra messages (it still requires extra state
+ information and label space) and thus the threshold to support
+ Liberal Mode could be considered lower.
+
+ Table 3 shows the cases where it is known by an LSR where to send its
+ label requests.
+
+ +---------+----------------------------------+
+ | | label requested by |
+ | | LSRu | LSRd |
+ +---------+----------------+-----------------|
+ |unicast | Yes | No |
+ +---------+----------------+-----------------|
+ |multicast| Yes | Yes |
+ +---------+----------------+-----------------+
+
+ Table 3. Does an LSR know where to send its label requests ?
+
+ For a unicast flow, an LSR can determine the next hop LSR, which is
+ the one to send the request to in case of Upstream Unsolicited or
+ Downstream on Demand mode. The LSR is however not able to find the
+ previous hop. The previous hop is not necessarily the next hop
+ towards the source, because the path from A to B is not necessarily
+ the same as the path from B to A. Such a situation can occur as a
+ result of asymmetric link measures or in the event that multiple
+ equal cost paths exist [PAXS].
+
+ In the case of multicast, an LSR knows both the next hop(s) and the
+ previous hop. Because multicast trees are constructed using the
+ reverse shortest path method, the previous hop is always the next hop
+ towards the source or towards the root of the tree.
+
+
+
+Ooms, et al. Informational [Page 24]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+10.4. Downstream vs. Upstream Label Allocation
+
+ The label can be allocated by either the downstream LSR (Downstream
+ on Demand, Downstream Unsolicited) or the upstream LSR (Upstream on
+ Demand, Upstream Unsolicited, implicit). The advantages of
+ downstream label allocation are:
+
+ a) It is the same mode as for unicast LDP, thus eliminating the need
+ to develop upstream label distribution procedures.
+
+ b) The same label can be kept when the upstream LSR changes due to a
+ route change, which is an advantage on multi-access networks (see
+ section 9).
+
+ c) Compatible with piggy-backing (especially the downstream
+ distribution mode).
+
+ The advantages of upstream label allocation are:
+
+ a) Easier label allocation in multi-access networks (see section 9).
+
+ b) The same label can be kept when the downstream LSR (which would
+ have been the label allocator in downstream mode in a multi-access
+ network) leaves the group (see section 9).
+
+ c) The upstream and implicit distribution mode allow a faster LSP
+ setup when the LSP is traffic triggered.
+
+ Whether to use upstream or downstream label distribution is outside
+ the scope of this framework. The relative complexity between the
+ necessary protocol extensions and the resolution mechanism needed, as
+ well as the relative operational complexity, will influence which way
+ to go.
+
+10.5. Explicit vs. Implicit Label Distribution
+
+ Beside the explicit distribution modes (which use a signaling
+ protocol), [ACHA] proposes an implicit label distribution method by
+ using unknown labels. This method has all the advantages of the
+ upstream label allocation method and is probably the fastest label
+ advertisement method for traffic triggered LSPs.
+
+ Implicit label distribution is not applicable if the FEC-to-label
+ binding has been advertised prior to traffic arrival, e.g. explicit
+ routing (i.e. if all the information necessary to identify the FEC is
+ not present in the packet).
+
+
+
+
+
+Ooms, et al. Informational [Page 25]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ Explicit distribution allows pre-establishment (before the arrival of
+ data) of LSPs with topology or request driven triggers.
+
+11. Security Considerations
+
+ In general, the use of multicast in an MPLS environment poses no
+ extra security issues beyond the ones that already exist in multicast
+ and MPLS protocols as such.
+
+ The protocols described in this document are however not suited to
+ cross administrative boundaries.
+
+ When the multicast tree is determined by an existing multicast
+ routing protocol (this is the assumption made in this document,
+ except for the Explicit Routing section), clearly no additional
+ security issues are introduced with respect to the shape of the tree
+ (e.g. unauthorized joining, tapping, blackholing, injecting traffic,
+ ...). These security issues should have been addressed in the
+ specifications of the multicast routing protocols.
+
+ In the MPLS context it is possible that control messages trigger L2
+ resource allocations (e.g. LSPs). If security flaws would still be
+ present in the existing protocols (which possibly are not too harmful
+ in its original context) the abusive sending of such control messages
+ can yield more severe DoS attacks.
+
+ In case of an "explicit routed" tree that is calculated centrally,
+ sufficient authentication must be done on the control messages that
+ set up the tree in the network nodes.
+
+12. Acknowledgements
+
+ The authors would like to thank Eric Rosen, Piet Van Mieghem, Philip
+ Dumortier, Hans De Neve, Jan Vanhoutte, Alex Mondrus and Gerard
+ Gastaud for the fruitful discussions and/or their thorough revision
+ of this document.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 26]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+Informative References
+
+ [ACHA] A. Acharya, R. Dighe and F. Ansari, "IP Switching Over Fast
+ ATM Cell Transport (IPSOFACTO) : Switching Multicast flows",
+ IEEE Globecom '97.
+
+ [ADAM] A. Adams, J. Nicholas, W. Siadak, Protocol Independent
+ Multicast Version 2 Dense Mode Specification", Work In
+ Progress.
+
+ [ANDE] Andersson, L., Doolan, P., Feldman, N., Fredette, A. and
+ R. Thomas, "LDP Specification", RFC 3036, January 2001.
+
+ [AWDU] Awduche, D., Berger, L., Gan, D., Li, T., Swallow, G. and
+ V. Srinivasan, "RSVP-TE: Extensions to RSVP for LSP Tunnels",
+ RFC 3209, December 2001.
+
+ [BALL] Ballardie, A., "Core Based Trees (CBT) Multicast Routing
+ Architecture", RFC 2201, September 1997.
+
+ [CONT] Conta, D., Doolan, P. and A. Malis, "Use of Label Switching
+ on Frame Relay Networks", RFC 3034, January 2001.
+
+ [CRAW] Crawley, E., Berger, L., Berson, S., Baker, F., Borden, M.
+ and J. Krawczyk, "A Framework for Integrated Services and
+ RSVP over ATM", RFC 2382, August 1998.
+
+ [DAVI] Davie, B., Lawrence, J., McCloghrie, K., Rekhter, Y., Rosen,
+ E., Swallow, G. and P. Doolan, "MPLS using LDP and ATM VC
+ switching", RFC 3035, January 2001.
+
+ [DEER] Deering, S., Estrin, D., Farinacci, D., Helmy, A., Thaler,
+ D., Handley, M., Jacobson, V., Liu, C., Sharma, P. and L Wei,
+ "Protocol Independent Multicast-Sparse Mode (PIM-SM):
+ Protocol Specification", RFC 2362, June 1998.
+
+ [FARI] D. Farinacci, Y. Rekhter, E. Rosen and T. Qian, "Using PIM to
+ Distribute MPLS Labels for Multicast Routes", Work In
+ Progress.
+
+ [FENN] Fenner, W., "Internet Group Management Protocol, IGMP,
+ Version 2", RFC 2236, November 1997.
+
+ [GARR] Garrett, M. and M. Borden, "Interoperation of Controlled-Load
+ Service and Guaranteed Service with ATM", RFC 2381, August
+ 1998.
+
+
+
+
+
+Ooms, et al. Informational [Page 27]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ [HOLB] H. Holbrook, B. Cain, "Source-Specific Multicast for IP",
+ Work In Progress.
+
+ [MOY] Moy, J., "Multicast Extensions to OSPF", RFC 1584, March
+ 1994.
+
+ [NAGA] Nagami, K., Demizu, N., Esaki, H., Katsube, Y. and P. Doolan,
+ "VCID Notification over ATM link for LDP", RFC 3038, January
+ 2001.
+
+ [PERL] R. Perlman, C-Y. Lee, A. Ballardie, J. Crowcroft, Z. Wang, T.
+ Maufer, "Simple Multicast", Work In Progress.
+
+ [PUSA] T. Pusateri, "Distance Vector Multicast Routing Protocol",
+ Work In Progress.
+
+ [PAXS] V. Paxson, "End-to-End Routing Behavior in the Internet",
+ IEEE/ACM Transactions on Networking 5(5), pp. 601-615.
+
+ [ROSE] Rosen, E., Rekhter, Y., Tappan, D., Farinacci, D., Fedorkow,
+ G., Li, T. and A. Conta, "MPLS Label Stack Encoding",
+ RFC 3032, January 2001.
+
+Authors Addresses
+
+ Dirk Ooms
+ Alcatel Corporate Research Center
+ Fr. Wellesplein 1, 2018 Antwerp, Belgium.
+ Phone : 32 3 2404732
+ Fax : 32 3 2409879
+ EMail: Dirk.Ooms@alcatel.be
+
+ Bernard Sales
+ Alcatel Corporate Research Center
+ Fr. Wellesplein 1, 2018 Antwerp, Belgium.
+ Phone : 32 3 2409574
+ EMail: Bernard.Sales@alcatel.be
+
+ Wim Livens
+ Colt Telecom
+ Zweefvliegtuigstraat 10, 1130 Brussels, Belgium
+ Phone : 32 2 7901705
+ Fax : 32 2 7901711
+ EMail: WLivens@colt-telecom.be
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 28]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+ Arup Acharya
+ IBM TJ Watson Research Center
+ 30 Saw Mill River Road, Hawthorne
+ NY 10532
+ Phone : 1 914 784 7481
+ EMail: arup@us.ibm.com
+
+ Frederic Griffoul
+ Ulticom, Inc.
+ Les Algorithmes, 2000 Route des Lucioles, BP29
+ 06901 Sophia-Antipolis, FRANCE
+ EMail: griffoul@ulticom.com
+
+ Furquan Ansari
+ Bell Labs, Lucent Tech.
+ 101 Crawfords Corner Rd., Holmdel, NJ 07733
+ Phone : 1 732 949 5249
+ Fax : 1 732 949 4556
+ EMail: furquan@dnrc.bell-labs.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 29]
+
+RFC 3353 IP Multicast in an MPLS Environment August 2002
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2002). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ooms, et al. Informational [Page 30]
+