diff options
Diffstat (limited to 'doc/rfc/rfc5671.txt')
-rw-r--r-- | doc/rfc/rfc5671.txt | 843 |
1 files changed, 843 insertions, 0 deletions
diff --git a/doc/rfc/rfc5671.txt b/doc/rfc/rfc5671.txt new file mode 100644 index 0000000..ca9391c --- /dev/null +++ b/doc/rfc/rfc5671.txt @@ -0,0 +1,843 @@ + + + + + + +Network Working Group S. Yasukawa +Request for Comments: 5671 NTT +Category: Informational A. Farrel, Ed. + Old Dog Consulting + October 2009 + + + Applicability of the Path Computation Element (PCE) to + Point-to-Multipoint (P2MP) MPLS and GMPLS Traffic Engineering (TE) + +Abstract + + The Path Computation Element (PCE) provides path computation + functions in support of traffic engineering in Multiprotocol Label + Switching (MPLS) and Generalized MPLS (GMPLS) networks. + + Extensions to the MPLS and GMPLS signaling and routing protocols have + been made in support of point-to-multipoint (P2MP) Traffic Engineered + (TE) Label Switched Paths (LSPs). + + This document examines the applicability of PCE to path computation + for P2MP TE LSPs in MPLS and GMPLS networks. It describes the + motivation for using a PCE to compute these paths and examines which + of the PCE architectural models are appropriate. + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (c) 2009 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the BSD License. + + + + + + +Yasukawa & Farrel Informational [Page 1] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + +Table of Contents + + 1. Introduction ....................................................2 + 2. Architectural Considerations ....................................4 + 2.1. Offline Computation ........................................4 + 2.2. Online Computation .........................................4 + 2.2.1. LSR Loading .........................................5 + 2.2.2. PCE Overload ........................................6 + 2.2.3. PCE Capabilities ....................................6 + 3. Fragmenting the P2MP Tree .......................................7 + 4. Central Replication Points ......................................8 + 5. Reoptimization and Modification .................................9 + 6. Repair .........................................................10 + 7. Disjoint Paths .................................................11 + 8. Manageability Considerations ...................................11 + 8.1. Control of Function and Policy ............................11 + 8.2. Information and Data Models ...............................11 + 8.3. Liveness Detection and Monitoring .........................12 + 8.4. Verifying Correct Operation ...............................12 + 8.5. Requirements on Other Protocols and Functional + Components ................................................12 + 8.6. Impact on Network Operation ...............................13 + 9. Security Considerations ........................................13 + 10. Acknowledgments ...............................................13 + 11. References ....................................................13 + 11.1. Normative References .....................................13 + 11.2. Informative References ...................................13 + +1. Introduction + + The Path Computation Element (PCE) defined in [RFC4655] is an entity + that is capable of computing a network path or route based on a + network graph and of applying computational constraints. The + intention is that the PCE is used to compute the path of Traffic + Engineered Label Switched Paths (TE LSPs) within Multiprotocol Label + Switching (MPLS) and Generalized MPLS (GMPLS) networks. + + [RFC4655] defines various deployment models that place PCEs + differently within the network. The PCEs may be collocated with the + Label Switching Routers (LSRs), may be part of the management system + that requests the LSPs to be established, or may be positioned as one + or more computation servers within the network. + + Requirements for point-to-multipoint (P2MP) MPLS TE LSPs are + documented in [RFC4461], and signaling protocol extensions for + setting up P2MP MPLS TE LSPs are defined in [RFC4875]. In this + + + + + +Yasukawa & Farrel Informational [Page 2] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + document, P2MP MPLS TE networks are considered in support of various + features including layer 3 multicast VPNs [RFC4834], video + distribution, etc. + + Fundamental to the determination of the paths for P2MP LSPs within a + network is the selection of branch points. Not only is this + selection constrained by the network topology and available network + resources, but it is determined by the objective functions that may + be applied to path computation. For example, one standard objective + is to minimize the total cost of the tree (that is, to minimize the + sum of the costs of each link traversed by the tree) to produce what + is known as a Steiner tree. Another common objective function + requires that the cost to reach each leaf of the P2MP tree be + minimized. + + The selection of branch points within the network is further + complicated by the fact that not all LSRs in the network are + necessarily capable of performing branching functions. This + information may be recorded in the Traffic Engineering Database (TED) + that the PCE uses to perform its computations, and may have been + distributed using extensions to the Interior Gateway Protocol (IGP) + operating within the network [RFC5073]. + + Additionally, network policies may dictate specific branching + behavior. For example, it may be decided that, for certain types of + LSPs in certain types of networks, it is important that no branch LSR + is responsible for handling more than a certain number of downstream + branches for any one LSP. This might arise because the replication + mechanism used at the LSRs is a round-robin copying process that + delays the data transmission on each downstream branch by the time + taken to replicate the data onto each previous downstream branch. + Alternatively, administrative policies may dictate that replication + should be concentrated on specific key replication nodes behaving + like IP multicast rendezvous points (perhaps to ensure appropriate + policing of receivers in the P2MP tree, or perhaps to make protection + and resiliency easier to implement). + + Path computation for P2MP TE LSPs presents a significant challenge + because of the complexity of the computations described above. + Determining disjoint protection paths for P2MP TE LSPs can add + considerably to this complexity, while small modifications to a P2MP + tree (such as adding or removing just one leaf) can completely change + the optimal path. Reoptimization of a network containing multiple + P2MP TE LSPs requires considerable computational resources. All of + this means that an ingress LSR might not have sufficient processing + power to perform the necessary computations, and even if it does, the + act of path computation might interfere with the control and + + + + +Yasukawa & Farrel Informational [Page 3] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + management plane operation necessary to maintain existing LSPs. The + PCE architecture offers a way to offload such path computations from + LSRs. + +2. Architectural Considerations + +2.1. Offline Computation + + Offline path computation is performed ahead of time, before the LSP + setup is requested. That means that it is requested by, or performed + as part of, a management application. This model can be seen in + Section 5.5 of [RFC4655]. + + The offline model is particularly appropriate to long-lived LSPs + (such as those present in a transport network) or for planned + responses to network failures. In these scenarios, more planning is + normally a feature of LSP provisioning. + + This model may also be used where the network operator wishes to + retain full manual control of the placement of LSPs, using the PCE + only as a computation tool to assist the operator, not as part of an + automated network. + + Offline path computation may be applied as a background activity for + network reoptimization to determine whether and when the current LSP + placements are significantly sub-optimal. See Section 5 for further + discussions of reoptimization. + +2.2. Online Computation + + Online path computation is performed on-demand as LSRs in the network + determine that they need to know the paths to use for LSPs. Thus, + each computation is triggered by a request from an LSR. + + As described in [RFC4655], the path computation function for online + computation may be collocated with the LSR that makes the request, or + it may be present in a computation-capable PCE server within the + network. The PCE server may be another LSR in the network, a + dedicated server, or a functional component of a Network Management + System (NMS). Furthermore, the computation is not necessarily + achieved by a single PCE operating on its own, but may be the result + of cooperation between several PCEs. + + The remainder of this document makes frequent reference to these + different online models in order to indicate which is more + appropriate in different P2MP scenarios. + + + + + +Yasukawa & Farrel Informational [Page 4] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + +2.2.1. LSR Loading + + An important feature of P2MP path computation is the processing load + that it places on the network element that is determining the path. + Roughly speaking, the load to compute a least-cost-to-leaf tree is + the same as the cost to compute a single optimal path to each leaf in + turn. The load to compute a Steiner tree is approximately an order + of magnitude greater, although algorithms exist to approximate + Steiner trees in roughly the same order of magnitude of time as for a + least-cost-to-leaf tree. + + Whereas many LSRs are capable of simple Constrained Shortest Path + First (CSPF) computations to determine a path for a single point-to- + point (P2P) LSP, they rapidly become swamped if called on to perform + multiple such computations, such as when recovering from a network + failure. Thus, it is reasonable to expect that an LSR would struggle + to handle a P2MP path computation for a tree with many destinations. + + The result of an LSR becoming overloaded by a P2MP path computation + may be two-fold. First, the LSR may be unable to provide timely + computations of paths for P2P LSPs; this may impact LSP setup times + for simple demand-based services and could damage the LSR's ability + to recover services after network faults. Secondly, the LSR's + processing capabilities may be diverted from other important tasks, + not the least of which is maintaining the control plane protocols + that are necessary to the support of existing LSPs and forwarding + state within the network. It is obviously critically important that + existing traffic should not be disrupted by the computation of a path + for a new LSP. + + It is also not reasonable to expect the ingress LSRs of P2MP LSRs to + be specially powerful and capable of P2MP computations. Although a + solution to the overloading problem would be to require that all LSRs + that form the ingresses to P2MP LSPs be sufficiently high-capacity to + perform P2MP computations, this is not an acceptable solution + because, in all other senses, the ingress to a P2MP LSP is just a + normal ingress LSR. + + Thus, there is an obvious solution: off-load P2MP path computations + from LSRs to remotely located PCEs. Such PCE function can be + provided on dedicated or high-capacity network elements (such as + dedicated servers, or high-end routers that might be located as + Autonomous System Border Routers - ASBRs). + + + + + + + + +Yasukawa & Farrel Informational [Page 5] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + +2.2.2. PCE Overload + + Since P2MP path computations are resource-intensive, it may be that + the introduction of P2MP LSPs into an established PCE network will + cause overload at the PCEs. That is, the P2MP computations may block + other P2P computations and might even overload the PCE. + + Several measures can be taken within the PCE architecture to + alleviate this situation as described in [RFC4655]. For example, + path computation requests can be assigned priorities by the LSRs that + issue them. Thus, the LSRs could assign lower priority to the P2MP + requests, ensuring that P2P requests were serviced in preference. + Furthermore, the PCEs are able to apply local and network-wide policy + and this may dictate specific processing rules [RFC5394]. + + But ultimately, a network must possess sufficient path computation + resources for its needs and this is achieved within the PCE + architecture simply by increasing the number of PCEs. + + Once there are sufficient PCEs available within the network, the LSRs + may choose between them and may use overload notification information + supplied by the PCEs to spot which PCEs are currently over-loaded. + Additionally, a PCE that is becoming over-loaded may redistribute its + queue of computation requests (using the PCE cooperation model + described in [RFC4655]) to other, less burdened PCEs within the + network. + +2.2.3. PCE Capabilities + + An LSR chooses between available PCEs to select the one most likely + to be able to perform the requested path computation. This selection + may be based on overload notifications from the PCEs, but could also + consider other computational capabilities. + + For example, it is quite likely that only a subset of the PCEs in the + network have the ability to perform P2MP computations since this + requires advanced functionality. Some of those PCEs might have the + ability to satisfy certain objective functions (for example, least + cost to destination), but lack support for other objective functions + (for example, Steiner). Additionally, some PCEs might not be capable + of the more complex P2MP reoptimization functionality. + + The PCE architecture allows an LSR to discover the capabilities of + the PCEs within the network at the same time it discovers their + existence. Further and more detailed exchanges of PCE capabilities + can be made directly between the PCEs and the LSRs. This exchange of + PCE capabilities information allows a Path Computation Client (PCC) + to select the PCE that can best answer its computation requests. + + + +Yasukawa & Farrel Informational [Page 6] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + +3. Fragmenting the P2MP Tree + + A way to reduce the computational burden of computing a large P2MP + tree on a single PCE is to fragment or partition the tree. This may + be particularly obvious in a multi-domain network (such as multiple + routing areas), but is equally applicable in a single domain. + + Consider the network topology in Figure 1. A P2MP LSP is required + from ingress LSR A to egress LSRs s, t, u, v, w, x, y, and z. Using + a single PCE model, LSR A may request the entire path of the tree and + this may be supplied by the PCE. Alternatively, the PCE that is + consulted by LSR A may only compute the first fragment of the tree + (for example, from A to K, L, and M) and may rely on other PCEs to + compute the three smaller trees from K to t, u, and v; from L to w + and x; and from M to s, y, and z. + + The LSR consulted by A may simply return the first subtree and leave + LSRs K, L, and M to invoke PCEs in their turn in order to complete + the signaling. Alternatively, the first PCE may cooperate with other + PCEs to collect the paths for the later subtrees and return them in a + single computation response to PCE A. The mechanisms for both of + these approaches are described in the PCE architecture [RFC4655]. + + t + / + / + n--u + / + / + e--f--h--K--o--v + / + / + A--b--c--d--g--i--L--p--w + \ \ + \ \ + j x + \ + \ + M--r--y + \ \ + \ \ + s z + + Figure 1: A P2MP Tree with Intermediate Computation Points + + + + + + + +Yasukawa & Farrel Informational [Page 7] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + A further possibility is that LSRs at which the subtrees are stitched + together (K, L, and M in this example) are selected from a set of + potential such points using a cooperative PCE technique, such as the + Backward Recursive Path Computation (BRPC) mechanism [RFC5441]. + Indeed, if LSRs K, L, and M were ASBRs or Area Border Routers (ABRs), + the BRPC technique would be particularly applicable. + + Note, however, that while these mechanisms are superficially + beneficial, it is far from obvious how the first LSR selects the + transit LSRs K, L, and M, or how the leaf nodes are assigned to be + downstream of particular downstream nodes. The computation to + determine these questions may be no less intensive than the + determination of the full tree unless there is some known property of + the leaf node identifiers such as might be provided by address + aggregation. + +4. Central Replication Points + + A deployment model for P2MP LSPs is to use centralized, well-known + replication points. This choice may be made for administrative or + security reasons, or because of particular hardware capability + limitations within the network. Indeed, this deployment model can be + achieved using P2P LSPs between ingress and replication point as well + as between replication point and each leaf so as to achieve a P2MP + service without the use of P2MP MPLS-TE. + + The motivations for this type of deployment are beyond the scope of + this document, but it is appropriate to examine how PCE might be used + to support this model. + + In Figure 2, a P2MP service is required from ingress LSR a to egress + LSRs m, n, o, and p. There are four replication-capable LSRs in the + network: D, E, J, and K. + + When LSR a consults a PCE, it could be given the full P2MP path from + LSR a to the leaves, but in this model, the PCE simply returns a P2P + path to the first replication point (in this case, LSR D). LSR D + will consult a PCE in its turn and determine the P2P LSPs to egress + LSRs m and p as well as the P2P LSP to the next replication point, + LSR J. Finally, LSR J will use a PCE to determine P2P LSPs to + egresses n and o. + + + + + + + + + + +Yasukawa & Farrel Informational [Page 8] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + f--i--m + / + / + a--b--c--D--g--J--n + \ \ + \ \ + E h K o + \ + \ + l--p + + Figure 2: Using Centralized Replication Points + + In this model of operation, it is quite likely that the PCE function + is located at the replication points, which will be high-capacity + LSRs. One of the main features of the computation activity is the + selection of the replication points (for example, why is LSR D + selected in preference to LSR E, and why is LSR J chosen over LSR + K?). This selection may be made solely on the basis of path + optimization as it would be for a P2MP computation, but may also be + influenced by policy issues (for example, LSR D may be able to give + better security to protect against rogue leaf attachment) or network + loading concerns (for example, LSR E may already be handling a very + large amount of traffic replication for other P2MP services). + +5. Reoptimization and Modification + + Once established, P2MP LSPs are more sensitive to modification than + their P2P counterparts. If an egress is removed from a P2P LSP, the + whole LSP is torn down. But egresses may be added to and removed + from active P2MP LSPs as receivers come and go. + + The removal of an egress from a P2MP LSP does not require any new + path computation since the tree can be automatically pruned. + + The addition of a new egress to a P2MP LSP can be handled as the + computation of an appropriate branch point and the determination of a + P2P path from the branch point to the new egress. This is a + relatively simple computation and can be achieved by reverse-path + CSPF, much as in the manner of some multicast IP routing protocols. + + However, repeated addition to and removal from a P2MP LSP will almost + certainly leave it in a sub-optimal state. The tree shape that was + optimal for the original set of destinations will be distorted by the + changes and will not be optimal for the new set of destinations. + + + + + + +Yasukawa & Farrel Informational [Page 9] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + Further, as resource availability changes in the network due to other + LSPs being released or network resources being brought online, the + path of the P2MP LSP may become sub-optimal. + + Computing a new optimal path for the P2MP LSP is as simple as + computing any optimal P2MP path, but selecting a path that can be + applied within the network as a migration from the existing LSP may + be more complex. Additional constraints may be applied by the + network administrator so that only subsets of the egresses (or + subtrees of the P2MP tree) are optimized at any time. In these + cases, the computational load of reoptimization may be considerable, + but fortunately reoptimization computations may be performed as + background activities. Splitting the P2MP tree into subtrees, as + described in Section 3, may further reduce the computation load and + may assist with administrative preferences for partial tree + reoptimization. + + Network-wide reoptimization of multiple LSPs [RFC5557] can achieve + far greater improvements in optimality within overloaded networks + than can be achieved by reoptimizing LSPs sequentially. Such + computation would typically be performed offline and would usually + require a dedicated processor such as a PCE invoked by the NMS. + +6. Repair + + LSP repair is necessary when a network fault disrupts the ability of + the LSP to deliver data to an egress. For a P2MP LSP, a network + fault is (statistically) likely to only impact a small subset of the + total set of egresses. Repair activity, therefore, does not need to + recompute the path of the entire P2MP tree. Rather, it needs to + quickly find suitable new branches that can be grafted onto the + existing tree to reconnect the disconnected leaves. + + In fact, immediately after a network failure there may be a very + large number of path computations required in order to restore + multiple P2P and P2MP LSPs. The PCEs will be heavily loaded, and it + is important that computation requests are restricted to only the + 'essential'. + + In this light, it is useful to note that the simple repair + computations described in the first paragraph of this section may be + applied to achieve a first repair of the LSPs, while more + sophisticated reoptimization computations can be deferred until the + network is stable and the load on the PCEs has been reduced. Those + reoptimizations can be computed as described in Section 5. + + + + + + +Yasukawa & Farrel Informational [Page 10] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + +7. Disjoint Paths + + Disjoint paths are required for end-to-end protection services and + sometimes for load balancing. They may require to be fully disjoint + (except at the ingress and egress!), link disjoint (allowing common + nodes on the paths), or best-effort disjoint (allowing shared links + or nodes when no other path can be found). + + It is possible to compute disjoint paths sequentially, but this can + lead to blocking problems where the second path cannot be placed. + Such issues are more readily avoided if the paths are computed in + parallel. + + The computation of link disjoint P2P paths may be non-trivial and may + be the sort of task that an LSR offloads to a PCE because of its + complexity. The computation of disjoint P2MP paths is considerably + more difficult and is therefore a good candidate to be offloaded to a + PCE that has dedicated resources. In fact, it may well be the case + that not all P2MP-capable PCEs can handle disjoint path requests and + it may be necessary to select between PCEs based on their + capabilities. + +8. Manageability Considerations + + The use of PCE to compute P2MP paths has many of the same + manageability considerations as when it is used for P2P LSPs + [RFC5440]. There may be additional manageability implications for + the size of P2MP computation requests and the additional loading + exerted on the PCEs. + +8.1. Control of Function and Policy + + As already described, individual PCEs may choose to not be capable of + P2MP computation, and where this function is available, it may be + disabled by an operator, or may be automatically withdrawn when the + PCE becomes loaded or based on other policy considerations. + + Further, a PCE may refuse any P2MP computation request or pass it on + to another PCE based on policy. + +8.2. Information and Data Models + + P2MP computation requests necessitate considerably more information + exchange between the LSR and the PCE than is required for P2P + computations. This will result in much larger data sets to be + controlled and modeled, and will impact the utility of any management + data models, such as MIB modules. Care needs to be taken in the + + + + +Yasukawa & Farrel Informational [Page 11] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + design of such data models, and the use of other management protocols + and data modeling structures, such as NETCONF [RFC4741] and the + NETCONF Data Modeling Language (NETMOD), could be considered. + +8.3. Liveness Detection and Monitoring + + PCE liveness detection and monitoring is unchanged from P2P + operation, but it should be noted that P2MP requests will take longer + to process than P2P requests, meaning that the time between request + and response will be, on average, longer. This increases the chance + of a communications failure between request and response and means + that liveness detection is more important. + +8.4. Verifying Correct Operation + + Correct operation of any communication between LSRs and PCEs is + exactly as important as it is for P2P computations. + + The correct operation of path computation algorithms implemented at + PCEs is out of scope, but LSRs that are concerned that PCE algorithms + might not be operating correctly may make identical requests to + separate PCEs and compare the responses. + +8.5. Requirements on Other Protocols and Functional Components + + As is clear from the PCE architecture, a communications protocol is + necessary to allow LSRs to send computation requests to PCEs and for + PCEs to cooperate. Requirements for such a protocol to handle P2P + path computations are described in [RFC4657], and additional + requirements in support of P2MP computations are described in + [PCE-P2MP]. The PCE Communication Protocol (PCEP) is defined in + [RFC5440], but extensions will be necessary to support P2MP + computation requests. + + As described in the body of this document, LSRs need to be able to + recognize which PCEs can perform P2MP computations. Capability + advertisement is already present in the PCE Discovery protocols + ([RFC5088] and [RFC5089]) and can also be exchanged in PCEP + ([RFC5440]), but extensions will be required to describe P2MP + capabilities. + + As also described in this document, the PCE needs to know the branch + capabilities of the LSRs and store this information in the TED. This + information can be distributed using the routing protocols as + described in [RFC5073]. + + + + + + +Yasukawa & Farrel Informational [Page 12] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + +8.6. Impact on Network Operation + + The use of a PCE to perform P2MP computations may have a beneficial + impact on network operation if it can offload processing from the + LSRs, freeing them up to handle protocol operations. + + Furthermore, the use of a PCE may enable more dynamic behavior in + P2MP LSPs (such as the addition of new egresses, reoptimization, and + failure recovery) than is possible using more traditional + management-based planning techniques. + +9. Security Considerations + + The use of PCE to compute P2MP paths does not raise any additional + security issues beyond those that generally apply to the PCE + architecture. See [RFC4655] for a full discussion. + + Note, however, that P2MP computation requests are more CPU-intensive + and also use more link bandwidth. Therefore, if the PCE was attacked + by the injection of spurious path computation requests, it would be + more vulnerable through a smaller number of such requests. + + Thus, the use of message integrity and authentication mechanisms + within the PCE protocol should be used to mitigate attacks from + devices that are not authorized to send requests to the PCE. It + would be possible to consider applying different authorization + policies for P2MP path computation requests compared to other + requests. + +10. Acknowledgments + + The authors would like to thank Jerry Ash and Jean-Louis Le Roux for + their thoughtful comments. Lars Eggert, Dan Romascanu, and Tim Polk + provided useful comments during IESG review. + +11. References + +11.1. Normative References + + [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path + Computation Element (PCE)-Based Architecture", RFC 4655, + August 2006. + +11.2. Informative References + + [RFC4461] Yasukawa, S., Ed., "Signaling Requirements for Point-to- + Multipoint Traffic-Engineered MPLS Label Switched Paths + (LSPs)", RFC 4461, April 2006. + + + +Yasukawa & Farrel Informational [Page 13] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + [RFC4657] Ash, J., Ed., and J. Le Roux, Ed., "Path Computation + Element (PCE) Communication Protocol Generic + Requirements", RFC 4657, September 2006. + + [RFC4741] Enns, R., Ed., "NETCONF Configuration Protocol", RFC 4741, + December 2006. + + [RFC4834] Morin, T., Ed., "Requirements for Multicast in Layer 3 + Provider-Provisioned Virtual Private Networks (PPVPNs)", + RFC 4834, April 2007. + + [RFC4875] Aggarwal, R., Ed., Papadimitriou, D., Ed., and S. + Yasukawa, Ed., "Extensions to Resource Reservation + Protocol - Traffic Engineering (RSVP-TE) for Point-to- + Multipoint TE Label Switched Paths (LSPs)", RFC 4875, May + 2007. + + [RFC5073] Vasseur, J., Ed., and J. Le Roux, Ed., "IGP Routing + Protocol Extensions for Discovery of Traffic Engineering + Node Capabilities", RFC 5073, December 2007. + + [RFC5088] Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., and R. + Zhang, "OSPF Protocol Extensions for Path Computation + Element (PCE) Discovery", RFC 5088, January 2008. + + [RFC5089] Le Roux, JL., Ed., Vasseur, JP., Ed., Ikejiri, Y., and R. + Zhang, "IS-IS Protocol Extensions for Path Computation + Element (PCE) Discovery", RFC 5089, January 2008. + + [RFC5394] Bryskin, I., Papadimitriou, D., Berger, L., and J. Ash, + "Policy-Enabled Path Computation Framework", RFC 5394, + December 2008. + + [RFC5440] Vasseur, JP., Ed., and JL. Le Roux, Ed., "Path Computation + Element (PCE) Communication Protocol (PCEP)", RFC 5440, + March 2009. + + [RFC5441] Vasseur, JP., Ed., Zhang, R., Bitar, N., and JL. Le Roux, + "A Backward-Recursive PCE-Based Computation (BRPC) + Procedure to Compute Shortest Constrained Inter-Domain + Traffic Engineering Label Switched Paths", RFC 5441, April + 2009. + + [RFC5557] Lee, Y., Le Roux, JL., King, D., and E. Oki, "Path + Computation Element Communication Protocol (PCEP) + Requirements and Protocol Extensions in Support of Global + Concurrent Optimization", RFC 5557, July 2009. + + + + +Yasukawa & Farrel Informational [Page 14] + +RFC 5671 PCE for P2MP MPLS and GMPLS TE October 2009 + + + [PCE-P2MP] Yasukawa, S., and Farrel, A., "PCC-PCE Communication + Requirements for Point to Multipoint Multiprotocol Label + Switching Traffic Engineering (MPLS-TE)", Work in + Progress, May 2008. + +Authors' Addresses + + Seisho Yasukawa + NTT Corporation + 9-11, Midori-Cho 3-Chome + Musashino-Shi, Tokyo 180-8585, + Japan + + EMail: yasukawa.seisho@lab.ntt.co.jp + + + Adrian Farrel + Old Dog Consulting + + EMail: adrian@olddog.co.uk + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Yasukawa & Farrel Informational [Page 15] + |