diff options
Diffstat (limited to 'doc/rfc/rfc6371.txt')
-rw-r--r-- | doc/rfc/rfc6371.txt | 3475 |
1 files changed, 3475 insertions, 0 deletions
diff --git a/doc/rfc/rfc6371.txt b/doc/rfc/rfc6371.txt new file mode 100644 index 0000000..0223c4f --- /dev/null +++ b/doc/rfc/rfc6371.txt @@ -0,0 +1,3475 @@ + + + + + + +Internet Engineering Task Force (IETF) I. Busi, Ed. +Request for Comments: 6371 Alcatel-Lucent +Category: Informational D. Allan, Ed. +ISSN: 2070-1721 Ericsson + September 2011 + + + Operations, Administration, and Maintenance Framework for + MPLS-Based Transport Networks + +Abstract + + The Transport Profile of Multiprotocol Label Switching (MPLS-TP) is a + packet-based transport technology based on the MPLS Traffic + Engineering (MPLS-TE) and pseudowire (PW) data-plane architectures. + + This document describes a framework to support a comprehensive set of + Operations, Administration, and Maintenance (OAM) procedures that + fulfill the MPLS-TP OAM requirements for fault, performance, and + protection-switching management and that do not rely on the presence + of a control plane. + + This document is a product of a joint Internet Engineering Task Force + (IETF) / International Telecommunications Union Telecommunication + Standardization Sector (ITU-T) effort to include an MPLS Transport + Profile within the IETF MPLS and Pseudowire Emulation Edge-to-Edge + (PWE3) architectures to support the capabilities and functionalities + of a packet transport network as defined by the ITU-T. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6371. + + + + + + + +Busi & Allan Informational [Page 1] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +Copyright Notice + + Copyright (c) 2011 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction ....................................................3 + 2. Conventions Used in This Document ...............................5 + 2.1. Terminology ................................................5 + 2.2. Definitions ................................................7 + 3. Functional Components ..........................................10 + 3.1. Maintenance Entity and Maintenance Entity Group ...........10 + 3.2. MEG Nesting: SPMEs and Tandem Connection Monitoring .......13 + 3.3. MEG End Points (MEPs) .....................................14 + 3.4. MEG Intermediate Points (MIPs) ............................18 + 3.5. Server MEPs ...............................................20 + 3.6. Configuration Considerations ..............................21 + 3.7. P2MP Considerations .......................................21 + 3.8. Further Considerations of Enhanced Segment Monitoring .....22 + 4. Reference Model ................................................23 + 4.1. MPLS-TP Section Monitoring (SMEG) .........................26 + 4.2. MPLS-TP LSP End-to-End Monitoring Group (LMEG) ............27 + 4.3. MPLS-TP PW Monitoring (PMEG) ..............................27 + 4.4. MPLS-TP LSP SPME Monitoring (LSMEG) .......................28 + 4.5. MPLS-TP MS-PW SPME Monitoring (PSMEG) .....................30 + 4.6. Fate-Sharing Considerations for Multilink .................31 + 5. OAM Functions for Proactive Monitoring .........................32 + 5.1. Continuity Check and Connectivity Verification ............33 + 5.1.1. Defects Identified by CC-V .........................35 + 5.1.2. Consequent Action ..................................37 + 5.1.3. Configuration Considerations .......................38 + 5.2. Remote Defect Indication ..................................40 + 5.2.1. Configuration Considerations .......................40 + 5.3. Alarm Reporting ...........................................41 + 5.4. Lock Reporting ............................................42 + 5.5. Packet Loss Measurement ...................................44 + 5.5.1. Configuration Considerations .......................45 + + + +Busi & Allan Informational [Page 2] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + 5.5.2. Sampling Skew ......................................45 + 5.5.3. Multilink Issues ...................................45 + 5.6. Packet Delay Measurement ..................................46 + 5.6.1. Configuration Considerations .......................46 + 5.7. Client Failure Indication .................................47 + 5.7.1. Configuration Considerations .......................47 + 6. OAM Functions for On-Demand Monitoring .........................48 + 6.1. Connectivity Verification .................................48 + 6.1.1. Configuration Considerations .......................49 + 6.2. Packet Loss Measurement ...................................50 + 6.2.1. Configuration Considerations .......................50 + 6.2.2. Sampling Skew ......................................50 + 6.2.3. Multilink Issues ...................................50 + 6.3. Diagnostic Tests ..........................................50 + 6.3.1. Throughput Estimation ..............................51 + 6.3.2. Data-Plane Loopback ................................52 + 6.4. Route Tracing .............................................54 + 6.4.1. Configuration Considerations .......................54 + 6.5. Packet Delay Measurement ..................................54 + 6.5.1. Configuration Considerations .......................55 + 7. OAM Functions for Administration Control .......................55 + 7.1. Lock Instruct .............................................55 + 7.1.1. Locking a Transport Path ...........................56 + 7.1.2. Unlocking a Transport Path .........................56 + 8. Security Considerations ........................................57 + 9. Acknowledgments ................................................58 + 10. References ....................................................58 + 10.1. Normative References .....................................58 + 10.2. Informative References ...................................59 + 11. Contributing Authors ..........................................60 + +1. Introduction + + As noted in the MPLS Transport Profile (MPLS-TP) framework RFCs (RFC + 5921 [8] and RFC 6215 [9]), MPLS-TP is a packet-based transport + technology based on the MPLS Traffic Engineering (MPLS-TE) and + pseudowire (PW) data-plane architectures defined in RFC 3031 [1], RFC + 3985 [2], and RFC 5659 [4]. + + MPLS-TP utilizes a comprehensive set of Operations, Administration, + and Maintenance (OAM) procedures for fault, performance, and + protection-switching management that do not rely on the presence of a + control plane. + + In line with [15], existing MPLS OAM mechanisms will be used wherever + possible, and extensions or new OAM mechanisms will be defined only + where existing mechanisms are not sufficient to meet the + requirements. Some extensions discussed in this framework may end up + + + +Busi & Allan Informational [Page 3] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + as aspirational capabilities and may be determined to be not + tractably realizable in some implementations. Extensions do not + deprecate support for existing MPLS OAM capabilities. + + The MPLS-TP OAM framework defined in this document provides a + protocol-neutral description of the required OAM functions and of the + data-plane OAM architecture to support a comprehensive set of OAM + procedures that satisfy the MPLS-TP OAM requirements of RFC 5860 + [11]. In this regard, it defines similar OAM functionality as for + existing Synchronous Optical Network / Synchronous Digital Hierarchy + (SONET/SDH) and Optical Transport Network (OTN) OAM mechanisms (e.g., + [19]). + + The MPLS-TP OAM framework is applicable to Sections, Label Switched + Paths (LSPs), Multi-Segment Pseudowires (MS-PWs), and Sub-Path + Maintenance Elements (SPMEs). It supports co-routed and associated + bidirectional P2P transport paths as well as unidirectional P2P and + P2MP transport paths. + + OAM packets that instrument a particular direction of a transport + path are subject to the same forwarding treatment (i.e., fate-share) + as the user data packets and in some cases, where Explicitly TC- + encoded-PSC LSPs (E-LSPs) are employed, may be required to have + common per-hop behavior (PHB) Scheduling Class (PSC) End-to-End (E2E) + with the class of traffic monitored. In case of Label-Only-Inferred- + PSC LSP (L-LSP), only one class of traffic needs to be monitored, and + therefore the OAM packets have common PSC with the monitored traffic + class. + + OAM packets can be distinguished from the used data packets using the + Generic Associated Channel Label (GAL) and Associated Channel Header + (ACH) constructs of RFC 5586 [7] for LSP, SPME, and Section, or the + ACH construct of RFC 5085 [3] and RFC 5586 [7] for (MS-)PW. OAM + packets are never fragmented and are not combined with user data in + the same packet payload. + + This framework makes certain assumptions as to the utility and + frequency of different classes of measurement that naturally suggest + different functions are implemented as distinct OAM flows or packets. + This is dictated by the combination of the class of problem being + detected and the need for timeliness of network response to the + problem. For example, fault detection is expected to operate on an + entirely different time base than performance monitoring, which is + also expected to operate on an entirely different time base than in- + band management transactions. + + + + + + +Busi & Allan Informational [Page 4] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + The remainder of this memo is structured as follows: + + Section 2 covers the definitions and terminology used in this memo. + + Section 3 describes the functional component that generates and + processes OAM packets. + + Section 4 describes the reference models for applying OAM functions + to Sections, LSP, MS-PW, and their SPMEs. + + Sections 5, 6, and 7 provide a protocol-neutral description of the + OAM functions, defined in RFC 5860 [11], aimed at clarifying how the + OAM protocol solutions will behave to achieve their functional + objectives. + + Section 8 discusses the security implications of OAM protocol design + in the MPLS-TP context. + + The OAM protocol solutions designed as a consequence of this document + are expected to comply with the functional behavior described in + Sections 5, 6, and 7. Alternative solutions to required functional + behaviors may also be defined. + + OAM specifications following this OAM framework may be provided in + different documents to cover distinct OAM functions. + + This document is a product of a joint Internet Engineering Task Force + (IETF) / International Telecommunication Union Telecommunication + Standardization Sector (ITU-T) effort to include an MPLS Transport + Profile within the IETF MPLS and PWE3 architectures to support the + capabilities and functionalities of a packet transport network as + defined by the ITU-T. + +2. Conventions Used in This Document + +2.1. Terminology + + AC Attachment Circuit + + AIS Alarm Indication Signal + + CC Continuity Check + + CC-V Continuity Check and Connectivity Verification + + CV Connectivity Verification + + DBN Domain Border Node + + + +Busi & Allan Informational [Page 5] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + E-LSP Explicitly TC-encoded-PSC LSP + + ICC ITU Carrier Code + + LER Label Edge Router + + LKR Lock Report + + L-LSP Label-Only-Inferred-PSC LSP + + LM Loss Measurement + + LME LSP Maintenance Entity + + LMEG LSP ME Group + + LSP Label Switched Path + + LSR Label Switching Router + + LSME LSP SPME ME + + LSMEG LSP SPME ME Group + + ME Maintenance Entity + + MEG Maintenance Entity Group + + MEP Maintenance Entity Group End Point + + MIP Maintenance Entity Group Intermediate Point + + NMS Network Management System + + PE Provider Edge + + PHB Per-Hop Behavior + + PM Performance Monitoring + + PME PW Maintenance Entity + + PMEG PW ME Group + + PSC PHB Scheduling Class + + PSME PW SPME ME + + + + +Busi & Allan Informational [Page 6] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + PSMEG PW SPME ME Group + + PW Pseudowire + + SLA Service Level Agreement + + SME Section Maintenance Entity + + SMEG Section ME Group + + SPME Sub-Path Maintenance Element + + S-PE Switching Provider Edge + + TC Traffic Class + + T-PE Terminating Provider Edge + +2.2. Definitions + + This document uses the terms defined in RFC 5654 [5]. + + This document uses the term 'per-hop behavior' as defined in RFC 2474 + [16]. + + This document uses the term 'LSP' to indicate either a service LSP or + a transport LSP (as defined in RFC 5921 [8]). + + This document uses the term 'Section' exclusively to refer to the n=0 + case of the term 'Section' defined in RFC 5960 [10]. + + This document uses the term 'Sub-Path Maintenance Element (SPME)' as + defined in RFC 5921 [8]. + + This document uses the term 'traffic profile' as defined in RFC 2475 + [13]. + + Where appropriate, the following definitions are aligned with ITU-T + recommendation Y.1731 [21] in order to have a common, unambiguous + terminology. They do not however intend to imply a certain + implementation but rather serve as a framework to describe the + necessary OAM functions for MPLS-TP. + + Adaptation function: The adaptation function is the interface between + the client (sub-)layer and the server (sub-)layer. + + Branch Node: A node along a point-to-multipoint transport path that + is connected to more than one downstream node. + + + +Busi & Allan Informational [Page 7] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Bud Node: A node along a point-to-multipoint transport path that is + at the same time a branch node and a leaf node for this transport + path. + + Data-plane loopback: An out-of-service test where a transport path at + either an intermediate or terminating node is placed into a data- + plane loopback state, such that all traffic (including both payload + and OAM) received on the looped back interface is sent on the reverse + direction of the transport path. + + Note: The only way to send an OAM packet to a node that has been + put into data-plane loopback mode is via Time to Live (TTL) + expiry, irrespective of whether the node is hosting MIPs or MEPs. + + Domain Border Node (DBN): An intermediate node in an MPLS-TP LSP that + is at the boundary between two MPLS-TP OAM domains. Such a node may + be present on the edge of two domains or may be connected by a link + to the DBN at the edge of another OAM domain. + + Down MEP: A MEP that receives OAM packets from, and transmits them + towards, the direction of a server layer. + + Forwarding Engine: An abstract functional component, residing in an + LSR, that forwards the packets from an ingress interface toward the + egress interface(s). + + In-Service: The administrative status of a transport path when it is + unlocked. + + Interface: An interface is the attachment point to a server + (sub-)layer, e.g., a MPLS-TP Section or MPLS-TP tunnel. + + Intermediate Node: An intermediate node transits traffic for an LSP + or a PW. An intermediate node may originate OAM flows directed to + downstream intermediate nodes or MEPs. + + Loopback: See data-plane loopback and OAM loopback definitions. + + Maintenance Entity (ME): Some portion of a transport path that + requires management bounded by two points (called MEPs), and the + relationship between those points to which maintenance and monitoring + operations apply (details in Section 3.1). + + Maintenance Entity Group (MEG): The set of one or more maintenance + entities that maintain and monitor a section or a transport path in + an OAM domain. + + + + + +Busi & Allan Informational [Page 8] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + MEP: A MEG End Point (MEP) is capable of initiating (source MEP) and + terminating (sink MEP) OAM packets for fault management and + performance monitoring. MEPs define the boundaries of an ME (details + in Section 3.3). + + MIP: A MEG intermediate point (MIP) terminates and processes OAM + packets that are sent to this particular MIP and may generate OAM + packets in reaction to received OAM packets. It never generates + unsolicited OAM packets itself. A MIP resides within a MEG between + MEPs (details in Section 3.3). + + OAM domain: A domain, as defined in [5], whose entities are grouped + for the purpose of keeping the OAM confined within that domain. An + OAM domain contains zero or more MEGs. + + Note: Within the rest of this document, the term "domain" is used + to indicate an "OAM domain". + + OAM flow: The set of all OAM packets originating with a specific + source MEP that instrument one direction of a MEG (or possibly both + in the special case of data-plane loopback). + + OAM loopback: The capability of a node to be directed by a received + OAM packet to generate a reply back to the sender. OAM loopback can + work in-service and can support different OAM functions (e.g., + bidirectional on-demand connectivity verification). + + OAM Packet: A packet that carries OAM information between MEPs and/or + MIPs in a MEG to perform some OAM functionality (e.g., connectivity + verification). + + Originating MEP: A MEP that originates an OAM transaction packet + (toward a target MIP/MEP) and expects a reply, either in-band or out- + of-band, from that target MIP/MEP. The originating MEP always + generates the OAM request packets in-band and expects and processes + only OAM reply packets returned by the target MIP/MEP. + + Out-of-Service: The administrative status of a transport path when it + is locked. When a path is in a locked condition, it is blocked from + carrying client traffic. + + Path Segment: It is either a segment or a concatenated segment, as + defined in RFC 5654 [5]. + + Signal Degrade: A condition declared by a MEP when the data + forwarding capability associated with a transport path has + deteriorated, as determined by performance monitoring (PM). See also + ITU-T recommendation G.806 [14]. + + + +Busi & Allan Informational [Page 9] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Signal Fail: A condition declared by a MEP when the data forwarding + capability associated with a transport path has failed, e.g., loss of + continuity. See also ITU-T recommendation G.806 [14]. + + Sink MEP: A MEP acts as a sink MEP for an OAM packet when it + terminates and processes the packets received from its associated + MEG. + + Source MEP: A MEP acts as source MEP for an OAM packet when it + originates and inserts the packet into the transport path for its + associated MEG. + + Tandem Connection: A tandem connection is an arbitrary part of a + transport path that can be monitored (via OAM) independent of the + end-to-end monitoring (OAM). The tandem connection may also include + the forwarding engine(s) of the node(s) at the boundaries of the + tandem connection. Tandem connections may be nested but cannot + overlap. See also ITU-T recommendation G.805 [20]. + + Target MEP/MIP: A MEP or a MIP that is targeted by OAM transaction + packets and that replies to the originating MEP that initiated the + OAM transactions. The target MEP or MIP can reply either in-band or + out-of-band. The target sink MEP function always receives the OAM + request packets in-band, while the target source MEP function only + generates the OAM reply packets that are sent in-band. + + Up MEP: A MEP that transmits OAM packets towards, and receives them + from, the direction of the forwarding engine. + +3. Functional Components + + MPLS-TP is a packet-based transport technology based on the MPLS and + PW data plane architectures ([1], [2], and [4]) and is capable of + transporting service traffic where the characteristics of information + transfer between the transport path end points can be demonstrated to + comply with certain performance and quality guarantees. + + In order to describe the required OAM functionality, this document + introduces a set of functional components. + +3.1. Maintenance Entity and Maintenance Entity Group + + MPLS-TP OAM operates in the context of Maintenance Entities (MEs) + that define a relationship between two points of a transport path to + which maintenance and monitoring operations apply. The two points + that define a maintenance entity are called Maintenance Entity Group + End Points (MEPs). The collection of one or more MEs that belongs to + the same transport path and that are maintained and monitored as a + + + +Busi & Allan Informational [Page 10] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + group are known as a Maintenance Entity Group (MEG). In between + MEPs, there are zero or more intermediate points, called Maintenance + Entity Group Intermediate Points (MIPs). MEPs and MIPs are + associated with the MEG and can be shared by more than one ME in a + MEG. + + An abstract reference model for an ME is illustrated in Figure 1 + below. + + +-+ +-+ +-+ +-+ + |A|----|B|----|C|----|D| + +-+ +-+ +-+ +-+ + + Figure 1: ME Abstract Reference Model + + The instantiation of this abstract model to different MPLS-TP + entities is described in Section 4. In Figure 1, nodes A and D can + be Label Edge Routers (LERs) for an LSP or the Terminating Provider + Edges (T-PEs) for an MS-PW, nodes B and C are LSRs for an LSP or + Switching PEs (S-PEs) for an MS-PW. MEPs reside in nodes A and D, + while MIPs reside in nodes B and C and may reside in A and D. The + links connecting adjacent nodes can be physical links, (sub-)layer + LSPs/SPMEs, or server-layer paths. + + This functional model defines the relationships between all OAM + entities from a maintenance perspective and it allows each + Maintenance Entity to provide monitoring and management for the + (sub-)layer network under its responsibility and efficient + localization of problems. + + An MPLS-TP Maintenance Entity Group may be defined to monitor the + transport path for fault and/or performance management. + + The MEPs that form a MEG bound the scope of an OAM flow to the MEG + (i.e., within the domain of the transport path that is being + monitored and managed). There are two exceptions to this: + + 1) A misbranching fault may cause OAM packets to be delivered to a + MEP that is not in the MEG of origin. + + 2) An out-of-band return path may be used between a MIP or a MEP and + the originating MEP. + + In case of a unidirectional point-to-point transport path, a single + unidirectional Maintenance Entity is defined to monitor it. + + + + + + +Busi & Allan Informational [Page 11] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + In case of associated bidirectional point-to-point transport paths, + two independent unidirectional Maintenance Entities are defined to + independently monitor each direction. This has implications for + transactions that terminate at or query a MIP, as a return path from + MIP to the originating MEP does not necessarily exist in the MEG. + + In case of co-routed bidirectional point-to-point transport paths, a + single bidirectional Maintenance Entity is defined to monitor both + directions congruently. + + In case of unidirectional point-to-multipoint transport paths, a + single unidirectional Maintenance Entity for each leaf is defined to + monitor the transport path from the root to that leaf. + + In all cases, portions of the transport path may be monitored by the + instantiation of SPMEs (see Section 3.2). + + The reference model for the P2MP MEG is represented in Figure 2. + + +-+ + /--|D| + / +-+ + +-+ + /--|C| + +-+ +-+/ +-+\ +-+ + |A|----|B| \--|E| + +-+ +-+\ +-+ +-+ + \--|F| + +-+ + + Figure 2: Reference Model for P2MP MEG + + In the case of P2MP transport paths, the OAM measurements are + independent for each ME (A-D, A-E, and A-F): + + o Fault conditions - some faults may impact more than one ME + depending on where the failure is located; + + o Packet loss - packet dropping may impact more than one ME + depending from where the packets are lost; + + o Packet delay - will be unique per ME. + + Each leaf (i.e., D, E, and F) terminates OAM flows to monitor the ME + between itself and the root while the root (i.e., A) generates OAM + packets common to all the MEs of the P2MP MEG. All nodes may + implement a MIP in the corresponding MEG. + + + + +Busi & Allan Informational [Page 12] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +3.2. MEG Nesting: SPMEs and Tandem Connection Monitoring + + In order to verify and maintain performance and quality guarantees, + there is a need to apply OAM functionality not only on a transport + path granularity (e.g., LSP or MS-PW), but also on arbitrary parts of + transport paths, defined as tandem connections, between any two + arbitrary points along a transport path. + + Sub-Path Maintenance Elements (SPMEs), as defined in [8], are + hierarchical LSPs instantiated to provide monitoring of a portion of + a set of transport paths (LSPs or MS-PWs) that follow the same path + between the ingress and the egress of the SPME. The operational + aspects of instantiating SPMEs are out of scope of this memo. + + SPMEs can also be employed to meet the requirement to provide tandem + connection monitoring (TCM), as defined by ITU-T Recommendation G.805 + [20]. + + TCM for a given path segment of a transport path is implemented by + creating an SPME that has a 1:1 association with the path segment of + the transport path that is to be monitored. + + In the TCM case, this means that the SPME used to provide TCM can + carry one and only one transport path, thus allowing direct + correlation between all fault management and performance monitoring + information gathered for the SPME and the monitored path segment of + the end-to-end transport path. + + There are a number of implications to this approach: + + 1) The SPME would use the uniform model [23] of Traffic Class (TC) + code point copying between sub-layers for Diffserv such that the + E2E markings and PHB treatment for the transport path were + preserved by the SPMEs. + + 2) The SPME normally would use the short-pipe model for TTL handling + [6] (no TTL copying between sub-layers) such that the TTL distance + to the MIPs for the E2E entity would not be impacted by the + presence of the SPME, but it should be possible for an operator to + specify use of the uniform model. + + Note that points 1 and 2 above assume that the TTL copying mode and + TC copying modes are independently configurable for an LSP. + + The TTL distance to the MIPs plays a critical role for delivering + packets to these MIPs as described in Section 3.4. + + + + + +Busi & Allan Informational [Page 13] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + There are specific issues with the use of the uniform model of TTL + copying for an SPME: + + 1. A MIP in the SPME sub-layer is not part of the transport-path MEG; + hence, only an out-of-band return path for OAM originating in the + transport-path MEG that addressed an SPME MIP might be available. + + 2. The instantiation of a lower-level MEG or protection-switching + actions within a lower-level MEG may change the TTL distances to + MIPs in the higher-level MEGs. + + The end points of the SPME are MEPs and limit the scope of an OAM + flow within the MEG that the MEPs belong to (i.e., within the domain + of the SPME that is being monitored and managed). + + When considering SPMEs, it is important to consider that the + following properties apply to all MPLS-TP MEGs (regardless of whether + they instrument LSPs, SPMEs, or MS-PWs): + + o They can be nested but not overlapped, e.g., a MEG may cover a + path segment of another MEG and may also include the forwarding + engine(s) of the node(s) at the edge(s) of the path segment. + However, when MEGs are nested, the MEPs and MIPs in the SPME are + no longer part of the encompassing MEG. + + o It is possible that MEPs of MEGs that are nested reside on a + single node but again are implemented in such a way that they do + not overlap. + + o Each OAM flow is associated with a single MEG. + + o When an SPME is instantiated after the transport path has been + instantiated, the TTL distance to the MIPs may change for the + short-pipe model of TTL copying, and may change for the uniform + model if the SPME is not co-routed with the original path. + +3.3. MEG End Points (MEPs) + + MEG End Points (MEPs) are the source and sink points of a MEG. In + the context of an MPLS-TP LSP, only LERs can implement MEPs, while in + the context of an SPME, any LSR of the MPLS-TP LSP can be an LER of + SPMEs that contributes to the overall monitoring infrastructure of + the transport path. Regarding PWs, only T-PEs can implement MEPs; + while for SPMEs supporting one or more PWs, both T-PEs and S-PEs can + implement SPME MEPs. Any MPLS-TP LSR can implement a MEP for an + MPLS-TP Section. + + + + + +Busi & Allan Informational [Page 14] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + MEPs are responsible for originating almost all of the proactive and + on-demand monitoring OAM functionality for the MEG. There is a + separate class of notifications (such as Lock Report (LKR) and Alarm + Indication Signal (AIS)) that are originated by intermediate nodes + and triggered by server-layer events. A MEP is capable of + originating and terminating OAM packets for fault management and + performance monitoring. These OAM packets are carried within the + Generic Associated Channel (G-ACh) with the proper encapsulation and + an appropriate channel type as defined in RFC 5586 [7]. A MEP + terminates all the OAM packets it receives from the MEG it belongs to + and silently discards those that do not. (Note that in the + particular case of Connectivity Verification (CV) processing, a CV + packet from an incorrect MEG will result in a mis-connectivity defect + and there are further actions taken.) The MEG the OAM packet belongs + to is associated with the MPLS or PW label, whether the label is used + to infer the MEG or the content of the OAM packet is an + implementation choice. In the case of an MPLS-TP Section, the MEG is + inferred from the port on which an OAM packet was received with the + GAL at the top of the label stack. + + OAM packets may require the use of an available "out-of-band" return + path (as defined in [8]). In such cases, sufficient information is + required in the originating transaction such that the OAM reply + packet can be constructed and properly forwarded to the originating + MEP (e.g., IP address). + + Each OAM solution document will further detail the applicability of + the tools it defines as a proactive or on-demand mechanism as well as + its usage when: + + o The "in-band" return path exists and it is used. + + o An "out-of-band" return path exists and it is used. + + o Any return path does not exist or is not used. + + Once a MEG is configured, the operator can configure which proactive + OAM functions to use on the MEG, but the MEPs are always enabled. + + MEPs terminate all OAM packets received from the associated MEG. As + the MEP corresponds to the termination of the forwarding path for a + MEG at the given (sub-)layer, OAM packets never leak outside of a MEG + in a properly configured fault-free implementation. + + + + + + + + +Busi & Allan Informational [Page 15] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + A MEP of an MPLS-TP transport path coincides with transport path + termination and monitors it for failures or performance degradation + (e.g., based on packet counts) in an end-to-end scope. Note that + both the source MEP and sink MEP coincide with transport paths' + source and sink terminations. + + The MEPs of an SPME are not necessarily coincident with the + termination of the MPLS-TP transport path. They are used to monitor + a path segment of the transport path for failures or performance + degradation (e.g., based on packet counts) only within the boundary + of the MEG for the SPME. + + An MPLS-TP sink MEP passes a fault indication to its client + (sub-)layer network as a consequent action of fault detection. When + the client layer is not MPLS-TP, the consequent actions in the client + layer (e.g., ignore or generate client-layer-specific OAM + notifications) are outside the scope of this document. + + A node hosting a MEP can either support per-node MEP or per-interface + MEP(s). A per-node MEP resides in an unspecified location within the + node, while a per-interface MEP resides on a specific side of the + forwarding engine. In particular, a per-interface MEP is called an + "Up MEP" or a "Down MEP" depending on its location relative to the + forwarding engine. An "Up MEP" transmits OAM packets towards, and + receives them from, the direction of the forwarding engine, while a + "Down MEP" receives OAM packets from, and transmits them towards, the + direction of a server layer. + + + + + + + + + + + + + + + + + + + + + + + + +Busi & Allan Informational [Page 16] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Source node Up MEP Destination node Up MEP + ------------------------ ------------------------ + | | | | + |----- -----| |----- -----| + | MEP | | | | | | MEP | + | | ---- | | | | ---- | | + | In |->-| FW |->-| Out |->- ->-| In |->-| FW |->-| Out | + | i/f | ---- | i/f | | i/f | ---- | i/f | + |----- -----| |----- -----| + | | | | + ------------------------ ------------------------ + (1) (2) + + Source node Down MEP Destination node Down MEP + ------------------------ ------------------------ + | | | | + |----- -----| |----- -----| + | | | MEP | | MEP | | | + | | ---- | | | | ---- | | + | In |->-| FW |->-| Out |->- ->-| In |->-| FW |->-| Out | + | i/f | ---- | i/f | | i/f | ---- | i/f | + |----- -----| |----- -----| + | | | | + ------------------------ ------------------------ + (3) (4) + + Figure 3: Examples of Per-Interface MEPs + + Figure 3 describes four examples of per-interface Up MEPs: an Up + Source MEP in a source node (case 1), an Up Sink MEP in a destination + node (case 2), a Down Source MEP in a source node (case 3), and a + Down Sink MEP in a destination node (case 4). + + The usage of per-interface Up MEPs extends the coverage of the ME for + both fault and performance monitoring closer to the edge of the + domain and determines that the location of a failure or performance + degradation is within a node or on a link between two adjacent nodes. + + Each OAM solution document will further detail the implications of + the tools it defines when used with per-interface or per-node MEPs, + if necessary. + + It may occur that multiple MEPs for the same MEG are on the same + node, and are all Up MEPs, each on one side of the forwarding engine, + such that the MEG is entirely internal to the node. + + + + + + +Busi & Allan Informational [Page 17] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + It should be noted that an ME may span nodes that implement per-node + MEPs and per-interface MEPs. This guarantees backward compatibility + with most of the existing LSRs that can implement only a per-node + MEP. In fact, in many current implementations, label operations are + largely performed on the ingress interface; hence, the exposure of + the GAL as top label will occur at the ingress interface. + + Note that a MEP can only exist at the beginning and end of a + (sub-)layer in MPLS-TP. If there is a need to monitor some portion + of that LSP or PW, a new sub-layer (in the form of an SPME) must be + created that permits MEPs and associated MEGs to be created. + + In the case where an intermediate node sends an OAM packet to a MEP, + it uses the top label of the stack at that point. + +3.4. MEG Intermediate Points (MIPs) + + A MEG Intermediate Point (MIP) is a function located at a point + between the MEPs of a MEG for a PW, LSP, or SPME. + + A MIP is capable of reacting to some OAM packets and forwarding all + the other OAM packets while ensuring fate-sharing with user data + packets. However, a MIP does not initiate unsolicited OAM packets, + but may be addressed by OAM packets initiated by one of the MEPs of + the MEG. A MIP can generate OAM packets only in response to OAM + packets that it receives from the MEG it belongs to. The OAM packets + generated by the MIP are sent to the originating MEP. + + An intermediate node within a MEG can either: + + o support per-node MIPs (i.e., a single MIP per node in an + unspecified location within the node); or + + o support per-interface MIPs (i.e., two or more MIPs per node on + both sides of the forwarding engine). + + Support of per-interface or per-node MIPs is an implementation + choice. It is also possible that a node could support per-interface + MIPs on some MEGs and per-node MIPs on other MEGs for which it is a + transit node. + + + + + + + + + + + +Busi & Allan Informational [Page 18] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Intermediate node + ------------------------ + | | + |----- -----| + | MIP | | MIP | + | | ---- | | + ->-| In |->-| FW |->-| Out |->- + | i/f | ---- | i/f | + |----- -----| + | | + ------------------------ + + Figure 4: Example of Per-Interface MIPs + + Figure 4 describes an example of two per-interface MIPs at an + intermediate node of a point-to-point MEG. + + Using per-interface MIPs allows the network operator to determine + that the location of a failure or performance degradation is within a + node or on a link between two adjacent nodes. + + When sending an OAM packet to a MIP, the source MEP should set the + TTL field to indicate the number of hops necessary to reach the node + where the MIP resides. + + The source MEP should also include target MIP information in the OAM + packets sent to a MIP to allow proper identification of the MIP + within the node. The MEG the OAM packet belongs to is associated + with the MPLS label, whether the label is used to infer the MEG or + the content of the OAM packet is an implementation choice. In the + latter case, the MPLS label is checked to be the expected one. + + The use of TTL expiry to deliver OAM packets to a specific MIP is not + a fully reliable delivery mechanism because the TTL distance of a MIP + from a MEP can change. Any MPLS-TP node silently discards any OAM + packet that is received with an expired TTL and that is not addressed + to any of its MIPs or MEPs. An MPLS-TP node that does not support + OAM is also expected to silently discard any received OAM packet. + + Packets directed to a MIP may not necessarily carry specific MIP + identification information beyond that of TTL distance. In this + case, a MIP would promiscuously respond to all MEP queries on its + MEG. This capability could be used for discovery functions (e.g., + route tracing as defined in Section 6.4) or when it is desirable to + leave to the originating MEP the job of correlating TTL and MIP + identifiers and noting changes or irregularities (via comparison with + information previously extracted from the network). + + + + +Busi & Allan Informational [Page 19] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + MIPs are associated to the MEG they belong to, and their identity is + unique within the MEG. However, their identity is not necessarily + unique to the MEG, e.g., all nodal MIPs in a node can have a common + identity. + + A node hosting a MEP can also support per-interface Up MEPs and per- + interface MIPs on either side of the forwarding engine. + + Once a MEG is configured, the operator can enable/disable the MIPs on + the nodes within the MEG. All the intermediate nodes and possibly + the end nodes host MIP(s). Local policy allows them to be enabled + per function and per MEG. The local policy is controlled by the + management system, which may delegate it to the control plane. A + disabled MIP silently discards any received OAM packets. + +3.5. Server MEPs + + A server MEP is a MEP of a MEG that is either: + + o defined in a layer network that is "below", which is to say + encapsulates and transports the MPLS-TP layer network being + referenced; or + + o defined in a sub-layer of the MPLS-TP layer network that is + "below", which is to say encapsulates and transports the sub-layer + being referenced. + + A server MEP can coincide with a MIP or a MEP in the client (MPLS-TP) + (sub-)layer network. + + A server MEP also provides server-layer OAM indications to the + client/server adaptation function between the client (MPLS-TP) + (sub-)layer network and the server (sub-)layer network. The + adaptation function maintains state on the mapping of MPLS-TP + transport paths that are set up over that server (sub-)layer's + transport path. + + For example, a server MEP can be: + + o a non-MPLS MEP at a termination point of a physical link (e.g., + 802.3, an SDH Virtual Circuit, or OTN Optical Data Unit (ODU)), + for the MPLS-TP Section layer network, defined in Section 4.1; + + o an MPLS-TP Section MEP for MPLS-TP LSPs, defined in Section 4.2; + + o an MPLS-TP LSP MEP for MPLS-TP PWs, defined in Section 4.3; + + + + + +Busi & Allan Informational [Page 20] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + o an MPLS-TP SPME MEP used for LSP path segment monitoring, as + defined in Section 4.4, for MPLS-TP LSPs or higher-level SPMEs + providing LSP path segment monitoring; or + + o an MPLS-TP SPME MEP used for PW path segment monitoring, as + defined in Section 4.5, for MPLS-TP PWs or higher-level SPMEs + providing PW path segment monitoring. + + The server MEP can run appropriate OAM functions for fault detection + within the server (sub-)layer network and provides a fault indication + to its client MPLS-TP layer network via the client/server adaptation + function. When the server layer is not MPLS-TP, server MEP OAM + functions are simply assumed to exist but are outside the scope of + this document. + +3.6. Configuration Considerations + + When a control plane is not present, the management plane configures + these functional components. Otherwise, they can be configured by + either the management plane or the control plane. + + Local policy allows disabling the usage of any available "out-of- + band" return path, as defined in [8], irrespective of what is + requested by the node originating the OAM packet. + + SPMEs are usually instantiated when the transport path is created by + either the management plane or the control plane (if present). + Sometimes an SPME can be instantiated after the transport path is + initially created. + +3.7. P2MP Considerations + + All the traffic sent over a P2MP transport path, including OAM + packets generated by a MEP, is sent (multicast) from the root to all + the leaves. As a consequence: + + o To send an OAM packet to all leaves, the source MEP can send a + single OAM packet that will be delivered by the forwarding plane + to all the leaves and processed by all the leaves. Hence, a + single OAM packet can simultaneously instrument all the MEs in a + P2MP MEG. + + o To send an OAM packet to a single leaf, the source MEP sends a + single OAM packet that will be delivered by the forwarding plane + to all the leaves but contains sufficient information to identify + a target leaf, and therefore is processed only by the target leaf + and can be silently discarded by the other leaves. + + + + +Busi & Allan Informational [Page 21] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + o To send an OAM packet to a single MIP, the source MEP sends a + single OAM packet with the TTL field indicating the number of hops + necessary to reach the node where the MIP resides. This packet + will be delivered by the forwarding plane to all intermediate + nodes at the same TTL distance of the target MIP and to any leaf + that is located at a shorter distance. The OAM packet must + contain sufficient information to identify the target MIP and + therefore is processed only by the target MIP and can be silently + discarded by the others. + + o In order to send an OAM packet to M leaves (i.e., a subset of all + the leaves), the source MEP sends M different OAM packets targeted + to each individual leaf in the group of M leaves. Aggregating or + subsetting mechanisms are outside the scope of this document. + + A bud node with a Down MEP or a per-node MEP will both terminate and + relay OAM packets. Similar to how fault coverage is maximized by the + explicit utilization of Up MEPs, the same is true for MEPs on a bud + node. + + P2MP paths are unidirectional; therefore, any return path to an + originating MEP for on-demand transactions will be out-of-band. A + mechanism to target "on-demand" transactions to a single MEP or MIP + is required as it relieves the originating MEP of an arbitrarily + large processing load and of the requirement to filter and discard + undesired responses. This is because normally TTL exhaustion will + address all MIPs at a given distance from the source, and failure to + exhaust TTL will address all MEPs. + +3.8. Further Considerations of Enhanced Segment Monitoring + + Segment monitoring, like any in-service monitoring, in a transport + network should meet the following network objectives: + + 1. The monitoring and maintenance of existing transport paths has to + be conducted in service without traffic disruption. + + 2. Segment monitoring must not modify the forwarding of the segment + portion of the transport path. + + SPMEs defined in Section 3.2 meet the above two objectives, when they + are pre-configured or pre-instantiated as exemplified in Section 3.6. + However, sometimes pre-design and pre-configuration of all the + considered patterns of SPME are not preferable in real operation due + to the burden of design works, a number of header consumptions, + bandwidth consumption, and so on. + + + + + +Busi & Allan Informational [Page 22] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + When SPMEs are configured or instantiated after the transport path + has been created, network objective (1) can be met: application and + removal of SPME to a faultless monitored transport entity can be + performed in such a way as not to introduce any loss of traffic, + e.g., by using a non-disruptive "make before break" technique. + + However, network objective (2) cannot be met due to new assignment of + MPLS labels. As a consequence, generally speaking, the results of + SPME monitoring are not necessarily correlated with the behavior of + traffic in the monitored entity when it does not use SPME. For + example, application of SPME to a problematic/faulty monitoring + entity might "fix" the problem encountered by the latter -- for as + long as SPME is applied. And vice versa, application of SPME to a + faultless monitored entity may result in making it faulty -- again, + as long as SPME is applied. + + Support for a more sophisticated segment-monitoring mechanism + (temporal and hitless segment monitoring) to efficiently meet the two + network objectives may be necessary. + + One possible option to instantiate non-intrusive segment monitoring + without the use of SPMEs would require the MIPs selected as + monitoring end points to implement enhanced functionality and state + for the monitored transport path. + + For example, the MIPs need to be configured with the TTL distance to + the peer or with the address of the peer, when out-of-band return + paths are used. + + A further issue that would need to be considered is events that + result in changing the TTL distance to the peer monitoring entity, + such as protection events that may temporarily invalidate OAM + information gleaned from the use of this technique. + + Further considerations on this technique are outside the scope of + this document. + +4. Reference Model + + The reference model for the MPLS-TP OAM framework builds upon the + concept of a MEG, and its associated MEPs and MIPs, to support the + functional requirements specified in RFC 5860 [11]. + + The following MPLS-TP MEGs are specified in this document: + + o A Section Maintenance Entity Group (SMEG), allowing monitoring and + management of MPLS-TP Sections (between MPLS LSRs). + + + + +Busi & Allan Informational [Page 23] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + o An LSP Maintenance Entity Group (LMEG), allowing monitoring and + management of an end-to-end LSP (between LERs). + + o A PW Maintenance Entity Group (PMEG), allowing monitoring and + management of an end-to-end Single-Segment Pseudowire (SS-PW) or + MS-PW (between T-PEs). + + o An LSP SPME ME Group (LSMEG), allowing monitoring and management + of an SPME (between a given pair of LERs and/or LSRs along an + LSP). + + o A PW SPME ME Group (PSMEG), allowing monitoring and management of + an SPME (between a given pair of T-PEs and/or S-PEs along an + (MS-)PW). + + The MEGs specified in this MPLS-TP OAM framework are compliant with + the architecture framework for MPLS-TP [8] that includes both MS-PWs + [4] and LSPs [1]. + + Hierarchical LSPs are also supported in the form of SPMEs. In this + case, each LSP in the hierarchy is a different sub-layer network that + can be monitored, independently from higher- and lower-level LSPs in + the hierarchy, on an end-to-end basis (from LER to LER) by an SPME. + It is possible to monitor a portion of a hierarchical LSP by + instantiating a hierarchical SPME between any LERs/LSRs along the + hierarchical LSP. + + + + + + + + + + + + + + + + + + + + + + + + + +Busi & Allan Informational [Page 24] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Native |<------------------ MS-PW1Z ---------------->| Native + Layer | | Layer + Service | |<LSP13>| |<-LSP3X->| |<LSPXZ>| | Service + (AC1) V V V V V V V V (AC2) + +----+ +---+ +----+ +----+ +---+ +----+ + +----+ |T-PE| |LSR| |S-PE| |S-PE| |LSR| |T-PE| +----+ + | | | 1 | | 2 | | 3 | | X | | Y | | Z | | | + | | | |=======| |=========| |=======| | | | + | CE1|--|.......PW13......|...PW3X..|......PWXZ.......|---|CE2 | + | | | |=======| |=========| |=======| | | | + | | | | | | | | | | | | | | | | + +----+ | | | | | | | | | | | | +----+ + +----+ +---+ +----+ +----+ +---+ +----+ + . . . . + | | | | + |<--- Domain 1 -->| |<--- Domain Z -->| + ^----------------- PW1Z PMEG ----------------^ + ^--- PW13 PSMEG --^ ^--- PWXZ PSMEG --^ + ^-------^ ^-------^ + LSP13 LMEG LSPXZ LMEG + ^--^ ^--^ ^---------^ ^--^ ^--^ + Sec12 Sec23 Sec3X SecXY SecYZ + SMEG SMEG SMEG SMEG SMEG + + ^---^ ME + ^ MEP + ==== LSP + .... PW + + T-PE 1: Terminating Provider Edge 1 + LSR 2: Label Switching Router 2 + S-PE 3: Switching Provider Edge 3 + S-PE X: Switching Provider Edge X + LSR Y: Label Switching Router Y + T-PE Z: Terminating Provider Edge Z + + Figure 5: Reference Model for the MPLS-TP OAM Framework + + Figure 5 depicts a high-level reference model for the MPLS-TP OAM + framework. The figure depicts portions of two MPLS-TP-enabled + network domains, Domain 1 and Domain Z. In Domain 1, T-PE 1 is + adjacent to LSR 2 via the MPLS-TP Section Sec12, and LSR 2 is + adjacent to S-PE 3 via the MPLS-TP Section Sec23. Similarly, in + Domain Z, S-PE X is adjacent to LSR Y via the MPLS-TP Section SecXY, + and LSR Y is adjacent to T-PE Z via the MPLS-TP Section SecYZ. In + addition, S-PE 3 is adjacent to S-PE X via the MPLS-TP Section Sec3X. + + + + + +Busi & Allan Informational [Page 25] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Figure 5 also shows a bidirectional MS-PW (MS-PW1Z) between AC1 on + T-PE1 and AC2 on T-PE Z. The MS-PW consists of three bidirectional + PW path segments: 1) PW13 path segment between T-PE 1 and S-PE 3 via + the bidirectional LSP13 LSP, 2) PW3X path segment between S-PE 3 and + S-PE X via the bidirectional LSP3X LSP, and 3) PWXZ path segment + between S-PE X and T-PE Z via the bidirectional LSPXZ LSP. + + The MPLS-TP OAM procedures that apply to a MEG are expected to + operate independently from procedures on other MEGs. Yet, this does + not preclude that multiple MEGs may be affected simultaneously by the + same network condition -- for example, a fiber cut event. + + Note that there are no constraints imposed by this OAM framework on + the number or type (P2P, P2MP, LSP, or PW), of MEGs that may be + instantiated on a particular node. In particular, when looking at + Figure 5, it should be possible to configure one or more MEPs on the + same node if that node is the end point of one or more MEGs. + + Figure 5 does not describe a PW3X PSMEG because typically SPMEs are + used to monitor an OAM domain (like PW13 and PWXZ PSMEGs) rather than + the segment between two OAM domains. However, the OAM framework does + not pose any constraints on the way SPMEs are instantiated as long as + they are not overlapping. + + The subsections below define the MEGs specified in this MPLS-TP OAM + architecture framework document. Unless otherwise stated, all + references to domains, LSRs, MPLS-TP Sections, LSPs, pseudowires, and + MEGs in this section are made in relation to those shown in Figure 5. + +4.1. MPLS-TP Section Monitoring (SMEG) + + An MPLS-TP Section MEG (SMEG) is an MPLS-TP maintenance entity + intended to monitor an MPLS-TP Section. An SMEG may be configured on + any MPLS-TP section. SMEG OAM packets must fate-share with the user + data packets sent over the monitored MPLS-TP Section. + + An SMEG is intended to be deployed for applications where it is + preferable to monitor the link between topologically adjacent (next + hop in this layer network) MPLS-TP LSRs rather than monitoring the + individual LSP or PW path segments traversing the MPLS-TP Section and + where the server-layer technology does not provide adequate OAM + capabilities. + + + + + + + + + +Busi & Allan Informational [Page 26] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Figure 5 shows five Section MEGs configured in the network between + AC1 and AC2: + + 1. Sec12 MEG associated with the MPLS-TP Section between T-PE 1 and + LSR 2, + + 2. Sec23 MEG associated with the MPLS-TP Section between LSR 2 and + S-PE 3, + + 3. Sec3X MEG associated with the MPLS-TP Section between S-PE 3 and + S-PE X, + + 4. SecXY MEG associated with the MPLS-TP Section between S-PE X and + LSR Y, and + + 5. SecYZ MEG associated with the MPLS-TP Section between LSR Y and + T-PE Z + +4.2. MPLS-TP LSP End-to-End Monitoring Group (LMEG) + + An MPLS-TP LSP MEG (LMEG) is an MPLS-TP maintenance entity group + intended to monitor an end-to-end LSP between its LERs. An LMEG may + be configured on any MPLS LSP. LMEG OAM packets must fate-share with + user data packets sent over the monitored MPLS-TP LSP. + + An LMEG is intended to be deployed in scenarios where it is desirable + to monitor an entire LSP between its LERs, rather than, say, + monitoring individual PWs. + + Figure 5 depicts two LMEGs configured in the network between AC1 and + AC2: 1) the LSP13 LMEG between T-PE 1 and S-PE 3, and 2) the LSPXZ + LMEG between S-PE X and T-PE Z. Note that the presence of a LSP3X + LMEG in such a configuration is optional, and hence, not precluded by + this framework. For instance, the network operator may prefer to + monitor the MPLS-TP Section between the two LSRs rather than the + individual LSPs. + +4.3. MPLS-TP PW Monitoring (PMEG) + + An MPLS-TP PW MEG (PMEG) is an MPLS-TP maintenance entity intended to + monitor a SS-PW or MS-PW between its T-PEs. A PMEG can be configured + on any SS-PW or MS-PW. PMEG OAM packets must fate-share with the + user data packets sent over the monitored PW. + + A PMEG is intended to be deployed in scenarios where it is desirable + to monitor an entire PW between a pair of MPLS-TP-enabled T-PEs + rather than monitoring the LSP that aggregates multiple PWs between + PEs. + + + +Busi & Allan Informational [Page 27] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Figure 5 depicts an MS-PW (MS-PW1Z) consisting of three path segments + (PW13, PW3X, and PWXZ) and its associated end-to-end PMEG (PW1Z + PMEG). + +4.4. MPLS-TP LSP SPME Monitoring (LSMEG) + + An MPLS-TP LSP SPME MEG (LSMEG) is an MPLS-TP SPME with an associated + maintenance entity group intended to monitor an arbitrary part of an + LSP between the MEPs instantiated for the SPME, independent from the + end-to-end monitoring (LMEG). An LSMEG can monitor an LSP path + segment, and it may also include the forwarding engine(s) of the + node(s) at the edge(s) of the path segment. + + When an SPME is established between non-adjacent LSRs, the edges of + the SPME become adjacent at the LSP sub-layer network and any LSR + that was previously in between becomes an LSR for the SPME. + + Multiple hierarchical LSMEGs can be configured on any LSP. LSMEG OAM + packets must fate-share with the user data packets sent over the + monitored LSP path segment. + + A LSME can be defined between the following entities: + + o The LER and LSR of a given LSP. + + o Any two LSRs of a given LSP. + + An LSMEG is intended to be deployed in scenarios where it is + preferable to monitor the behavior of a part of an LSP or set of LSPs + rather than the entire LSP itself, for example, when there is a need + to monitor a part of an LSP that extends beyond the administrative + boundaries of an MPLS-TP-enabled administrative domain. + + + + + + + + + + + + + + + + + + + +Busi & Allan Informational [Page 28] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + |<-------------------- PW1Z ------------------->| + | | + | |<-------------LSP1Z LSP------------->| | + | |<-LSP13->| |<LSP3X>| |<-LSPXZ->| | + V V V V V V V V + +----+ +---+ +----+ +----+ +---+ +----+ + +----+ | PE | |LSR| |DBN | |DBN | |LSR| | PE | +----+ + | | | 1 | | 2 | | 3 | | X | | Y | | Z | | | + | |AC1| |=====================================| |AC2| | + | CE1|---|.....................PW1Z......................|---|CE2 | + | | | |=====================================| | | | + | | | | | | | | | | | | | | | | + +----+ | | | | | | | | | | | | +----+ + +----+ +---+ +----+ +----+ +---+ +----+ + . . . . + | | | | + |<---- Domain 1 --->| |<---- Domain Z --->| + + ^---------^ ^---------^ + LSP13 LSMEG LSPXZ LSMEG + ^-------------------------------------^ + LSP1Z LMEG + + DBN: Domain Border Node + + PE 1: Provider Edge 1 + LSR 2: Label Switching Router 2 + DBN 3: Domain Border Node 3 + DBN X: Domain Border Node X + LSR Y: Label Switching Router Y + PE Z: Provider Edge Z + + Figure 6: MPLS-TP LSP SPME MEG (LSMEG) + + Figure 6 depicts a variation of the reference model in Figure 5 where + there is an end-to-end LSP (LSP1Z) between PE 1 and PE Z. LSP1Z + consists of, at least, three LSP Concatenated Segments: LSP13, LSP3X, + and LSPXZ. In this scenario, there are two separate LSMEGs + configured to monitor the LSP1Z: 1) a LSMEG monitoring the LSP13 + Concatenated Segment on Domain 1 (LSP13 LSMEG), and 2) a LSMEG + monitoring the LSPXZ Concatenated Segment on Domain Z (LSPXZ LSMEG). + + It is worth noticing that LSMEGs can coexist with the LMEG monitoring + the end-to-end LSP and that LSMEG MEPs and LMEG MEPs can be + coincident in the same node (e.g., PE 1 node supports both the LSP1Z + LMEG MEP and the LSP13 LSMEG MEP). + + + + + +Busi & Allan Informational [Page 29] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +4.5. MPLS-TP MS-PW SPME Monitoring (PSMEG) + + An MPLS-TP MS-PW SPME Monitoring MEG (PSMEG) is an MPLS-TP SPME with + an associated maintenance entity group intended to monitor an + arbitrary part of an MS-PW between the MEPs instantiated for the + SPME, independently of the end-to-end monitoring (PMEG). A PSMEG can + monitor a PW path segment, and it may also include the forwarding + engine(s) of the node(s) at the edge(s) of the path segment. A PSMEG + is no different than an SPME; it is simply named as such to discuss + SPMEs specifically in a PW context. + + When SPME is established between non-adjacent S-PEs, the edges of the + SPME become adjacent at the MS-PW sub-layer network, and any S-PE + that was previously in between becomes an LSR for the SPME. + + S-PE placement is typically dictated by considerations other than + OAM. S-PEs will frequently reside at operational boundaries such as + the transition from distributed control plane (CP) to centralized + Network Management System (NMS) control or at a routing area + boundary. As such, the architecture would appear not to have the + flexibility that arbitrary placement of SPME segments would imply. + Support for an arbitrary placement of PSMEG would require the + definition of additional PW sub-layering. Multiple hierarchical + PSMEGs can be configured on any MS-PW. PSMEG OAM packets fate-share + with the user data packets sent over the monitored PW path Segment. + + A PSMEG does not add hierarchical components to the MPLS + architecture; it defines the role of existing components for the + purposes of discussing OAM functionality. + + A PSME can be defined between the following entities: + + o The T-PE and any S-PE of a given MS-PW. + + o Any two S-PEs of a given MS-PW. + + Note that, in line with the SPME description in Section 3.2, when a + PW SPME is instantiated after the MS-PW has been instantiated, the + TTL distance of the MIPs may change and MIPs in the PW SPME are no + longer part of the encompassing MEG. This means that the S-PE nodes + hosting these MIPs are no longer S-PEs but P nodes at the SPME LSP + level. The consequences are that the S-PEs hosting the PSMEG MEPs + become adjacent S-PEs. This is no different than the operation of + SPMEs in general. + + A PSMEG is intended to be deployed in scenarios where it is + preferable to monitor the behavior of a part of an MS-PW rather than + the entire end-to-end PW itself, for example, when monitoring an MS- + + + +Busi & Allan Informational [Page 30] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + PW path segment within a given network domain of an inter-domain MS- + PW. + + Figure 5 depicts an MS-PW (MS-PW1Z) consisting of three path + segments: PW13, PW3X, and PWXZ with two separate PSMEGs: 1) a PSMEG + monitoring the PW13 MS-PW path segment on Domain 1 (PW13 PSMEG) and + 2) a PSMEG monitoring the PWXZ MS-PW path segment on Domain Z with + (PWXZ PSMEG). + + It is worth noticing that PSMEGs can coexist with the PMEG monitoring + the end-to-end MS-PW and that PSMEG MEPs and PMEG MEPs can be + coincident in the same node (e.g., T-PE 1 node supports both the PW1Z + PMEG MEP and the PW13 PSMEG MEP). + +4.6. Fate-Sharing Considerations for Multilink + + Multilink techniques are in use today and are expected to continue to + be used in future deployments. These techniques include Ethernet + link aggregation [22] and the use of link bundling for MPLS [18] + where the option to spread traffic over component links is supported + and enabled. While the use of link bundling can be controlled at the + MPLS-TP layer, use of link aggregation (or any server-layer-specific + multilink) is not necessarily under the control of the MPLS-TP layer. + Other techniques may emerge in the future. These techniques + frequently share the characteristic that an LSP may be spread over a + set of component links and therefore be reordered, but no flow within + the LSP is reordered (except when very infrequent and minimally + disruptive load rebalancing occurs). + + The use of multilink techniques may be prohibited or permitted in any + particular deployment. If multilink techniques are used, the + deployment can be considered to be only partially MPLS-TP compliant; + however, this is unlikely to prevent their use. + + The implications for OAM are that not all components of a multilink + will be exercised, independent server-layer OAM being required to + exercise the aggregated link components. This has further + implications for MIP and MEP placement, as per-interface MIPs or Down + MEPs on a multilink interface are akin to a layer violation, as they + instrument at the granularity of the server layer. The implications + for reduced OAM loss measurement functionality are documented in + Sections 5.5.3 and 6.2.3. + + + + + + + + + +Busi & Allan Informational [Page 31] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +5. OAM Functions for Proactive Monitoring + + In this document, proactive monitoring refers to OAM operations that + are either configured to be carried out periodically and continuously + or preconfigured to act on certain events such as alarm signals. + + Proactive monitoring is usually performed "in-service". Such + transactions are universally MEP to MEP in operation, while + notifications can be node to node (e.g., some MS-PW transactions) or + node to MEPs (e.g., AIS). The control and measurement considerations + are: + + 1. Proactive monitoring for a MEG is typically configured at the + creation time of the transport path. + + 2. The operational characteristics of in-band measurement + transactions (e.g., CV, Loss Measurement (LM), etc.) are + configured at the MEPs. + + 3. Server-layer events are reported by OAM packets originating at + intermediate nodes. + + 4. The measurements resulting from proactive monitoring are typically + reported outside of the MEG (e.g., to a management system) as + notification events such as faults or indications of performance + degradations (such as signal degrade conditions). + + 5. The measurements resulting from proactive monitoring may be + periodically harvested by an NMS. + + Proactive fault reporting is assumed to be subject to unreliable + delivery and soft-state, and it needs to operate in cases where a + return path is not available or faulty. Therefore, periodic + repetition is assumed to be used for reliability, instead of + handshaking. + + Delay measurement also requires periodic repetition to allow + estimation of the packet delay variation for the MEG. + + For statically provisioned transport paths, the above information is + statically configured; for dynamically established transport paths, + the configuration information is signaled via the control plane or + configured via the management plane. + + The operator may enable/disable some of the consequent actions + defined in Section 5.1.2. + + + + + +Busi & Allan Informational [Page 32] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +5.1. Continuity Check and Connectivity Verification + + Proactive Continuity Check functions, as required in Section 2.2.2 of + RFC 5860 [11], are used to detect a loss of continuity (LOC) defect + between two MEPs in a MEG. + + Proactive Connectivity Verification functions, as required in Section + 2.2.3 of RFC 5860 [11], are used to detect an unexpected connectivity + defect between two MEGs (e.g., mismerging or misconnection), as well + as unexpected connectivity within the MEG with an unexpected MEP. + + Both functions are based on the (proactive) generation, at the same + rate, of OAM packets by the source MEP that are processed by the peer + sink MEP(s). As a consequence, in order to save OAM bandwidth + consumption, CV, when used, is linked with CC into Continuity Check + and Connectivity Verification (CC-V) OAM packets. + + In order to perform proactive Connectivity Verification, each CC-V + OAM packet also includes a globally unique Source MEP identifier, + whose value needs to be configured on the source MEP and on the peer + sink MEP(s). In some cases, to avoid the need to configure the + globally unique Source MEP identifier, it is preferable to perform + only proactive Continuity Check. In this case, the CC-V OAM packet + does not need to include any globally unique Source MEP identifier. + Therefore, a MEG can be monitored only for CC or for both CC and CV. + CC-V OAM packets used for CC-only monitoring are called CC OAM + packets, while CC-V OAM packets used for both CC and CV are called CV + OAM packets. + + As a consequence, it is not possible to detect misconnections between + two MEGs monitored only for continuity as neither the OAM packet type + nor the OAM packet content provides sufficient information to + disambiguate an invalid source. To expand: + + o For a CC OAM packet leaking into a CC monitored MEG - + undetectable. + + o For a CV OAM packet leaking into a CC monitored MEG - reception of + CV OAM packets instead of a CC OAM packets (e.g., with the + additional Source MEP identifier) allows detecting the fault. + + o For a CC OAM packet leaking into a CV monitored MEG - reception of + CC OAM packets instead of CV OAM packets (e.g., lack of additional + Source MEP identifier) allows detecting the fault. + + o For a CV OAM packet leaking into a CV monitored MEG - reception of + CV OAM packets with different Source MEP identifier permits fault + to be identified. + + + +Busi & Allan Informational [Page 33] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Having a common packet format for CC-V OAM packets would simplify + parsing in a sink MEP to properly detect all the misconfiguration + cases described above. + + MPLS-TP OAM supports different formats of MEP identifiers to address + different environments. When an alternative to IP addressing is + desired (e.g., MPLS-TP is deployed in transport network environments + where consistent operations with other transport technologies defined + by the ITU-T are required), the ITU Carrier Code (ICC)-based format + for MEP identification is used: this format is under definition in + [25]. When MPLS-TP is deployed in an environment where IP + capabilities are available and desired for OAM, the IP-based MEP + identification is used: this format is described in [24]. + + CC-V OAM packets are transmitted at a regular, operator-configurable + rate. The default CC-V transmission periods are application + dependent (see Section 5.1.3). + + Proactive CC-V OAM packets are transmitted with the "minimum loss + probability PHB" within the transport path (LSP, PW) they are + monitoring. For E-LSPs, this PHB is configurable on the network + operator's basis, while for L-LSPs this is determined as per RFC 3270 + [23]. PHBs can be translated at the network borders by the same + function that translates them for user data traffic. The implication + is that CC-V fate-shares with much of the forwarding implementation, + but not all aspects of PHB processing are exercised. Either on- + demand tools are used for finer-grained fault finding or an + implementation may utilize a CC-V flow per PHB to ensure a CC-V flow + fate-shares with each individual PHB. + + In a co-routed or associated, bidirectional point-to-point transport + path, when a MEP is enabled to generate proactive CC-V OAM packets + with a configured transmission rate, it also expects to receive + proactive CC-V OAM packets from its peer MEP at the same transmission + rate. This is because a common SLA applies to all components of the + transport path. In a unidirectional transport path (either point-to- + point or point-to-multipoint), the source MEP is enabled only to + generate CC-V OAM packets, while each sink MEP is configured to + expect these packets at the configured rate. + + MIPs, as well as intermediate nodes not supporting MPLS-TP OAM, are + transparent to the proactive CC-V information and forward these + proactive CC-V OAM packets as regular data packets. + + During path setup and tear down, situations arise where CC-V checks + would give rise to alarms, as the path is not fully instantiated. In + order to avoid these spurious alarms, the following procedures are + recommended. At initialization, the source MEP function (generating + + + +Busi & Allan Informational [Page 34] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + proactive CC-V packets) should be enabled prior to the corresponding + sink MEP function (detecting continuity and connectivity defects). + When disabling the CC-V proactive functionality, the sink MEP + function should be disabled prior to the corresponding source MEP + function. + + It should be noted that different encapsulations are possible for + CC-V packets, and therefore it is possible that in case of + misconfigurations or mis-connectivity, CC-V packets are received with + an unexpected encapsulation. + + There are practical limitations to detecting unexpected + encapsulation. It is possible that there are misconfiguration or + mis-connectivity scenarios where OAM packets can alias as payload, + e.g., when a transport path can carry an arbitrary payload without a + pseudowire. + + When CC-V packets are received with an unexpected encapsulation that + can be parsed by a sink MEP, the CC-V packet is processed as if it + were received with the correct encapsulation. If it is not a + manifestation of a mis-connectivity defect, a warning is raised (see + Section 5.1.1.4). Otherwise, the CC-V packet may be silently + discarded as unrecognized and a LOC defect may be detected (see + Section 5.1.1.1). + + The defect conditions are described in no specific order. + +5.1.1. Defects Identified by CC-V + + Proactive CC-V functions allow a sink MEP to detect the defect + conditions described in the following subsections. For all of the + described defect cases, a sink MEP should notify the equipment fault + management process of the detected defect. + + Sequential consecutive loss of CC-V packets is considered indicative + of an actual break and not of congestive loss or physical-layer + degradation. The loss of 3 packets in a row (implying a detection + interval that is 3.5 times the insertion time) is interpreted as a + true break and a condition that will not clear by itself. + + A CC-V OAM packet is considered to carry an unexpected globally + unique Source MEP identifier if it is a CC OAM packet received by a + sink MEP monitoring the MEG for CV; it is a CV OAM packet received by + a sink MEP monitoring the MEG for CC, or it is a CV OAM packet + received by a sink MEP monitoring the MEG for CV but carrying a + unique Source MEP identifier that is different that the expected one. + Conversely, the CC-V packet is considered to have an expected + globally unique Source MEP identifier; it is a CC OAM packet received + + + +Busi & Allan Informational [Page 35] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + by a sink MEP monitoring the MEG for CC, or it is a CV OAM packet + received by a sink MEP monitoring the MEG for CV and carrying a + unique Source MEP identifier that is equal to the expected one. + +5.1.1.1. Loss of Continuity Defect + + When proactive CC-V is enabled, a sink MEP detects a loss of + continuity (LOC) defect when it fails to receive proactive CC-V OAM + packets from the source MEP. + + o Entry criteria: If no proactive CC-V OAM packets from the source + MEP (and in the case of CV, this includes the requirement to have + the expected globally unique Source MEP identifier) are received + within the interval equal to 3.5 times the receiving MEP's + configured CC-V reception period. + + o Exit criteria: A proactive CC-V OAM packet from the source MEP + (and again in the case of CV, with the expected globally unique + Source MEP identifier) is received. + +5.1.1.2. Mis-Connectivity Defect + + When a proactive CC-V OAM packet is received, a sink MEP identifies a + mis-connectivity defect (e.g., mismerge, misconnection, or unintended + looping) when the received packet carries an unexpected globally + unique Source MEP identifier. + + o Entry criteria: The sink MEP receives a proactive CC-V OAM packet + with an unexpected globally unique Source MEP identifier or with + an unexpected encapsulation. + + o Exit criteria: The sink MEP does not receive any proactive CC-V + OAM packet with an unexpected globally unique Source MEP + identifier for an interval equal at least to 3.5 times the longest + transmission period of the proactive CC-V OAM packets received + with an unexpected globally unique Source MEP identifier since + this defect has been raised. This requires the OAM packet to + self-identify the CC-V periodicity, as not all MEPs can be + expected to have knowledge of all MEGs. + +5.1.1.3. Period Misconfiguration Defect + + If proactive CC-V OAM packets are received with the expected globally + unique Source MEP identifier but with a transmission period different + than the locally configured reception period, then a CC-V period + misconfiguration defect is detected. + + + + + +Busi & Allan Informational [Page 36] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + o Entry criteria: A MEP receives a CC-V proactive packet with the + expected globally unique Source MEP identifier but with a + transmission period different than its own CC-V-configured + transmission period. + + o Exit criteria: The sink MEP does not receive any proactive CC-V + OAM packet with the expected globally unique Source MEP identifier + and an incorrect transmission period for an interval equal at + least to 3.5 times the longest transmission period of the + proactive CC-V OAM packets received with the expected globally + unique Source MEP identifier and an incorrect transmission period + since this defect has been raised. + +5.1.1.4. Unexpected Encapsulation Defect + + If proactive CC-V OAM packets are received with the expected globally + unique Source MEP identifier but with an unexpected encapsulation, + then a CC-V unexpected encapsulation defect is detected. + + It should be noted that there are practical limitations to detecting + unexpected encapsulation (see Section 5.1.1). + + o Entry criteria: A MEP receives a CC-V proactive packet with the + expected globally unique Source MEP identifier but with an + unexpected encapsulation. + + o Exit criteria: The sink MEP does not receive any proactive CC-V + OAM packet with the expected globally unique Source MEP identifier + and an unexpected encapsulation for an interval equal at least to + 3.5 times the longest transmission period of the proactive CC-V + OAM packets received with the expected globally unique Source MEP + identifier and an unexpected encapsulation since this defect has + been raised. + +5.1.2. Consequent Action + + A sink MEP that detects any of the defect conditions defined in + Section 5.1.1 declares a defect condition and performs the following + consequent actions. + + If a MEP detects a mis-connectivity defect, it blocks all the traffic + (including also the user data packets) that it receives from the + misconnected transport path. + + If a MEP detects a LOC defect that is not caused by a period + misconfiguration, it should block all the traffic (including also the + user data packets) that it receives from the transport path, if this + consequent action has been enabled by the operator. + + + +Busi & Allan Informational [Page 37] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + It is worth noticing that the OAM requirements document [11] + recommends that CC-V proactive monitoring be enabled on every MEG in + order to reliably detect connectivity defects. However, CC-V + proactive monitoring can be disabled by an operator for a MEG. In + the event of a misconnection between a transport path that is + proactively monitored for CC-V and a transport path that is not, the + MEP of the former transport path will detect a LOC defect + representing a connectivity problem (e.g., a misconnection with a + transport path where CC-V proactive monitoring is not enabled) + instead of a continuity problem, with a consequence of delivery of + traffic to an incorrect destination. For these reasons, the traffic + block consequent action is applied even when a LOC condition occurs. + This block consequent action can be disabled through configuration. + This deactivation of the block action may be used for activating or + deactivating the monitoring when it is not possible to synchronize + the function activation of the two peer MEPs. + + If a MEP detects a LOC defect (Section 5.1.1.1) or a mis-connectivity + defect (Section 5.1.1.2), it declares a signal fail condition of the + ME. + + It is a matter of local policy whether or not a MEP that detects a + period misconfiguration defect (Section 5.1.1.3) declares a signal + fail condition of the ME. + + The detection of an unexpected encapsulation defect does not have any + consequent action: it is just a warning for the network operator. An + implementation able to detect an unexpected encapsulation but not + able to verify the source MEP ID may choose to declare a mis- + connectivity defect. + +5.1.3. Configuration Considerations + + At all MEPs inside a MEG, the following configuration information + needs to be configured when a proactive CC-V function is enabled: + + o MEG-ID: the MEG identifier to which the MEP belongs. + + o MEP-ID: the MEP's own identity inside the MEG. + + o list of the other MEPs in the MEG. For a point-to-point MEG, the + list would consist of the single MEP ID from which the OAM packets + are expected. In case of the root MEP of a P2MP MEG, the list is + composed of all the leaf MEP IDs inside the MEG. In case of the + leaf MEP of a P2MP MEG, the list is composed of the root MEP ID + (i.e., each leaf needs to know the root MEP ID from which it + expects to receive the CC-V OAM packets). + + + + +Busi & Allan Informational [Page 38] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + o PHB for E-LSPs. It identifies the per-hop behavior of a CC-V + packet. Proactive CC-V packets are transmitted with the "minimum + loss probability PHB" previously configured within a single + network operator. This PHB is configurable on network operator's + basis. PHBs can be translated at the network borders. + + o transmission rate. The default CC-V transmission periods are + application dependent (depending on whether they are used to + support fault management, performance monitoring, or protection- + switching applications): + + * Fault Management: default transmission period is 1 s (i.e., + transmission rate of 1 packet/second). + + * Performance Management: default transmission period is 100 ms + (i.e., transmission rate of 10 packets/second). CC-V + contributes to the accuracy of performance monitoring + statistics by permitting the defect-free periods to be properly + distinguished as described in Sections 5.5.1 and 5.6.1. + + * Protection Switching: If protection switching with CC-V, defect + entry criteria of 12 ms is required (for example, in + conjunction with the requirement to support 50 ms recovery time + as indicated in RFC 5654 [5]), then an implementation should + use a default transmission period of 3.33 ms (i.e., + transmission rate of 300 packets/second). Sometimes, the + requirement of 50 ms recovery time is associated with the + requirement for a CC-V defect entry criteria period of 35 ms; + in these cases a transmission period of 10 ms (i.e., + transmission rate of 100 packets/second) can be used. + Furthermore, when there is no need for so small CC-V defect + entry criteria periods, a larger transmission period can be + used. + + It should be possible for the operator to configure these + transmission rates for all applications, to satisfy specific network + requirements. + + Note that the reception period is the same as the configured + transmission rate. + + For management-provisioned transport paths, the above parameters are + statically configured; for dynamically signaled transport paths, the + configuration information is distributed via the control plane. + + The operator should be able to enable/disable some of the consequent + actions. Which consequent actions can be enabled/disabled is + described in Section 5.1.2. + + + +Busi & Allan Informational [Page 39] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +5.2. Remote Defect Indication + + The Remote Defect Indication (RDI) function, as required in Section + 2.2.9 of RFC 5860 [11], is an indicator that is transmitted by a sink + MEP to communicate to its source MEP that a signal fail condition + exists. In case of co-routed and associated bidirectional transport + paths, RDI is associated with proactive CC-V, and the RDI indicator + can be piggy-backed onto the CC-V packet. In case of unidirectional + transport paths, the RDI indicator can be sent only using an out-of- + band return path if it exists and its usage is enabled by policy + actions. + + When a MEP detects a signal fail condition (e.g., in case of a + continuity or connectivity defect), it should begin transmitting an + RDI indicator to its peer MEP. When incorporated into CC-V, the RDI + information will be included in all proactive CC-V packets that it + generates for the duration of the signal fail condition's existence. + + A MEP that receives packets from a peer MEP with the RDI information + should determine that its peer MEP has encountered a defect condition + associated with a signal fail condition. + + MIPs as well as intermediate nodes not supporting MPLS-TP OAM are + transparent to the RDI indicator and forward OAM packets that include + the RDI indicator as regular data packets, i.e., the MIP should not + perform any actions nor examine the indicator. + + When the signal fail condition clears, the MEP should stop + transmitting the RDI indicator to its peer MEP. When incorporated + into CC-V, the RDI indicator will not be set for subsequent + transmission of proactive CC-V packets. A MEP should clear the RDI + defect upon reception of an RDI indicator cleared. + +5.2.1. Configuration Considerations + + In order to support RDI, the indication may be carried in a unique + OAM packet or may be embedded in a CC-V packet. The in-band RDI + transmission rate and PHB of the OAM packets carrying RDIs should be + the same as that configured for CC-V to allow both far-end and near- + end defect conditions being resolved in a timeframe that has the same + order of magnitude. This timeframe is application specific as + described in Section 5.1.3. Methods of the out-of-band return paths + will dictate how out-of-band RDIs are transmitted. + + + + + + + + +Busi & Allan Informational [Page 40] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +5.3. Alarm Reporting + + The Alarm Reporting function, as required in Section 2.2.8 of RFC + 5860 [11], relies upon an Alarm Indication Signal (AIS) packet to + suppress alarms following detection of defect conditions at the + server (sub-)layer. + + When a server MEP asserts a signal fail condition, it notifies that + to the co-located MPLS-TP client/server adaptation function that then + generates OAM packets with AIS information in the downstream + direction to allow the suppression of secondary alarms at the MPLS-TP + MEP in the client (sub-)layer. + + The generation of packets with AIS information starts immediately + when the server MEP asserts a signal fail condition. These periodic + OAM packets, with AIS information, continue to be transmitted until + the signal fail condition is cleared. + + It is assumed that to avoid spurious alarm generation a MEP detecting + a loss of continuity defect (see Section 5.1.1.1) will wait for a + hold-off interval prior to asserting an alarm to the management + system. Therefore, upon receiving an OAM packet with AIS + information, an MPLS-TP MEP enters an AIS defect condition and + suppresses reporting of alarms to the NMS on the loss of continuity + with its peer MEP, but it does not block traffic received from the + transport path. A MEP resumes loss of continuity alarm generation + upon detecting loss of continuity defect conditions in the absence of + AIS condition. + + MIPs, as well as intermediate nodes, do not process AIS information + and forward these AIS OAM packets as regular data packets. + + For example, let's consider a fiber cut between T-PE 1 and LSR 2 in + the reference network of Figure 5. Assuming that all of the MEGs + described in Figure 5 have proactive CC-V enabled, a LOC defect is + detected by the MEPs of Sec12 SMEG, LSP13 LMEG, PW1 PSMEG, and PW1Z + PMEG; however, in a transport network, only the alarm associated to + the fiber cut needs to be reported to an NMS, while all secondary + alarms should be suppressed (i.e., not reported to the NMS or + reported as secondary alarms). + + If the fiber cut is detected by the MEP in the physical layer (in LSR + 2), LSR 2 can generate the proper alarm in the physical layer and + suppress the secondary alarm associated with the LOC defect detected + on Sec12 SMEG. As both MEPs reside within the same node, this + process does not involve any external protocol exchange. Otherwise, + + + + + +Busi & Allan Informational [Page 41] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + if the physical layer does not have enough OAM capabilities to detect + the fiber cut, the MEP of Sec12 SMEG in LSR 2 will report a LOC + alarm. + + In both cases, the MEP of Sec12 SMEG in LSR 2 notifies the adaptation + function for LSP13 LMEG that then generates AIS packets on the LSP13 + LMEG in order to allow its MEP in S-PE 3 to suppress the LOC alarm. + S-PE 3 can also suppress the secondary alarm on PW13 PSMEG because + the MEP of PW13 PSMEG resides within the same node as the MEP of + LSP13 LMEG. The MEP of PW13 PSMEG in S-PE 3 also notifies the + adaptation function for PW1Z PMEG that then generates AIS packets on + PW1Z PMEG in order to allow its MEP in T-PE Z to suppress the LOC + alarm. + + The generation of AIS packets for each MEG in the MPLS-TP client + (sub-)layer is configurable (i.e., the operator can enable/disable + the AIS generation). + + The AIS condition is cleared if no AIS packet has been received in + 3.5 times the AIS transmission period. + + The AIS transmission period is traditionally one per second, but an + option to configure longer periods would be also desirable. As a + consequence, OAM packets need to self-identify the transmission + period such that proper exit criteria can be established. + + AIS packets are transmitted with the "minimum loss probability PHB" + within a single network operator. For E-LSPs, this PHB is + configurable on network operator's basis, while for L-LSPs, this is + determined as per RFC 3270 [23]. + +5.4. Lock Reporting + + The Lock Reporting function, as required in Section 2.2.7 of RFC 5860 + [11], relies upon a Lock Report (LKR) packet used to suppress alarms + following administrative locking action in the server (sub-)layer. + + When a server MEP is locked, the MPLS-TP client (sub-)layer + adaptation function generates packets with LKR information to allow + the suppression of secondary alarms at the MEPs in the client + (sub-)layer. Again, it is assumed that there is a hold-off for any + loss of continuity alarms in the client-layer MEPs downstream of the + node originating the Lock Report. In case of client (sub-)layer co- + routed bidirectional transport paths, the LKR information is sent on + both directions. In case of client (sub-)layer unidirectional + transport paths, the LKR information is sent only in the downstream + direction. As a consequence, in case of client (sub-)layer point-to- + multipoint transport paths, the LKR information is sent only to the + + + +Busi & Allan Informational [Page 42] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + MEPs that are downstream from the server (sub-)layer that has been + administratively locked. Client (sub-)layer associated bidirectional + transport paths behave like co-routed bidirectional transport paths + if the server (sub-)layer that has been administratively locked is + used by both directions; otherwise, they behave like unidirectional + transport paths. + + The generation of packets with LKR information starts immediately + when the server MEP is locked. These periodic packets, with LKR + information, continue to be transmitted until the locked condition is + cleared. + + Upon receiving a packet with LKR information, an MPLS-TP MEP enters + an LKR defect condition and suppresses the loss of continuity alarm + associated with its peer MEP but does not block traffic received from + the transport path. A MEP resumes loss of continuity alarm + generation upon detecting loss of continuity defect conditions in the + absence of the LKR condition. + + MIPs, as well as intermediate nodes, do not process the LKR + information; they forward these LKR OAM packets as regular data + packets. + + For example, let's consider the case where the MPLS-TP Section + between T-PE 1 and LSR 2 in the reference network of Figure 5 is + administratively locked at LSR 2 (in both directions). + + Assuming that all the MEGs described in Figure 5 have proactive CC-V + enabled, a LOC defect is detected by the MEPs of LSP13 LMEG, PW1 + PSMEG, and PW1Z PMEG; however, in a transport network all these + secondary alarms should be suppressed (i.e., not reported to the NMS + or reported as secondary alarms). + + The MEP of Sec12 SMEG in LSR 2 notifies the adaptation function for + LSP13 LMEG that then generates LKR packets on the LSP13 LMEG in order + to allow its MEPs in T-PE 1 and S-PE 3 to suppress the LOC alarm. + S-PE 3 can also suppress the secondary alarm on PW13 PSMEG because + the MEP of PW13 PSMEG resides within the same node as the MEP of + LSP13 LMEG. The MEP of PW13 PSMEG in S-PE 3 also notifies the + adaptation function for PW1Z PMEG that then generates AIS packets on + PW1Z PMEG in order to allow its MEP in T-PE Z to suppress the LOC + alarm. + + The generation of LKR packets for each MEG in the MPLS-TP client + (sub-)layer is configurable (i.e., the operator can enable/disable + the LKR generation). + + + + + +Busi & Allan Informational [Page 43] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + The locked condition is cleared if no LKR packet has been received + for 3.5 times the transmission period. + + The LKR transmission period is traditionally one per second, but an + option to configure longer periods would be also desirable. As a + consequence, OAM packets need to self-identify the transmission + period such that proper exit criteria can be established. + + LKR packets are transmitted with the "minimum loss probability PHB" + within a single network operator. For E-LSPs, this PHB is + configurable on network operator's basis, while for L-LSPs, this is + determined as per RFC 3270 [23]. + +5.5. Packet Loss Measurement + + Packet Loss Measurement (LM) is one of the capabilities supported by + the MPLS-TP Performance Monitoring (PM) function in order to + facilitate reporting of Quality of Service (QoS) information for a + transport path as required in Section 2.2.11 of RFC 5860 [11]. LM is + used to exchange counter values for the number of ingress and egress + packets transmitted and received by the transport path monitored by a + pair of MEPs. + + Proactive LM is performed by periodically sending LM OAM packets from + a MEP to a peer MEP and by receiving LM OAM packets from the peer MEP + (if a co-routed or associated bidirectional transport path) during + the lifetime of the transport path. Each MEP performs measurements + of its transmitted and received user data packets. These + measurements are then correlated in real time with the peer MEP in + the ME to derive the impact of packet loss on a number of performance + metrics for the ME in the MEG. The LM transactions are issued such + that the OAM packets will experience the same PHB scheduling class as + the measured traffic while transiting between the MEPs in the ME. + + For a MEP, near-end packet loss refers to packet loss associated with + incoming data packets (from the far-end MEP), while far-end packet + loss refers to packet loss associated with egress data packets + (towards the far-end MEP). + + Proactive LM can be operated in two ways: + + o One-way: a MEP sends an LM OAM packet to its peer MEP containing + all the required information to facilitate near-end packet loss + measurements at the peer MEP. + + o Two-way: a MEP sends an LM OAM packet with an LM request to its + peer MEP, which replies with an LM OAM packet as an LM response. + The request/response LM OAM packets contain all the required + + + +Busi & Allan Informational [Page 44] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + information to facilitate both near-end and far-end packet loss + measurements from the viewpoint of the originating MEP. + + One-way LM is applicable to both unidirectional and bidirectional + (co-routed or associated) transport paths, while two-way LM is + applicable only to bidirectional (co-routed or associated) transport + paths. + + MIPs, as well as intermediate nodes, do not process the LM + information; they forward these proactive LM OAM packets as regular + data packets. + +5.5.1. Configuration Considerations + + In order to support proactive LM, the transmission rate and, for + E-LSPs, the PHB class (associated with the LM OAM packets originating + from a MEP) need to be configured as part of the LM provisioning. LM + OAM packets should be transmitted with the PHB that yields the lowest + drop precedence within the measured PHB Scheduling Class (see RFC + 3260 [17]), in order to maximize reliability of measurement within + the traffic class. + + If that PHB class is not an ordered aggregate where the ordering + constraint is all packets with the PHB class being delivered in + order, LM can produce inconsistent results. + + Performance monitoring (e.g., LM) is only relevant when the transport + path is defect free. CC-V contributes to the accuracy of PM + statistics by permitting the defect-free periods to be properly + distinguished. Therefore, support of proactive LM has implications + on the CC-V transmission period (see Section 5.1.3). + +5.5.2. Sampling Skew + + If an implementation makes use of a hardware forwarding path that + operates in parallel with an OAM processing path, whether hardware or + software based, the packet and byte counts may be skewed if one or + more packets can be processed before the OAM processing samples + counters. If OAM is implemented in software, this error can be quite + large. + +5.5.3. Multilink Issues + + If multilink is used at the ingress or egress of a transport path, + there may not be a single packet-processing engine where an LM packet + can be injected or extracted as an atomic operation while having + accurate packet and byte counts associated with the packet. + + + + +Busi & Allan Informational [Page 45] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + In the case where multilink is encountered along the route of the + transport path, the reordering of packets within the transport path + can cause inaccurate LM results. + +5.6. Packet Delay Measurement + + Packet Delay Measurement (DM) is one of the capabilities supported by + the MPLS-TP PM function in order to facilitate reporting of QoS + information for a transport path as required in Section 2.2.12 of RFC + 5860 [11]. Specifically, proactive DM is used to measure the long- + term packet delay and packet delay variation in the transport path + monitored by a pair of MEPs. + + Proactive DM is performed by sending periodic DM OAM packets from a + MEP to a peer MEP and by receiving DM OAM packets from the peer MEP + (if a co-routed or associated bidirectional transport path) during a + configurable time interval. + + Proactive DM can be operated in two ways: + + o One-way: a MEP sends a DM OAM packet to its peer MEP containing + all the required information to facilitate one-way packet delay + and/or one-way packet delay variation measurements at the peer + MEP. Note that this requires precise time synchronization at + either MEP by means outside the scope of this framework. + + o Two-way: a MEP sends a DM OAM packet with a DM request to its peer + MEP, which replies with a DM OAM packet as a DM response. The + request/response DM OAM packets contain all the required + information to facilitate two-way packet delay and/or two-way + packet delay variation measurements from the viewpoint of the + originating MEP. + + One-way DM is applicable to both unidirectional and bidirectional + (co-routed or associated) transport paths, while two-way DM is + applicable only to bidirectional (co-routed or associated) transport + paths. + + MIPs, as well as intermediate nodes, do not process the DM + information; they forward these proactive DM OAM packets as regular + data packets. + +5.6.1. Configuration Considerations + + In order to support proactive DM, the transmission rate and, for + E-LSPs, the PHB (associated with the DM OAM packets originating from + a MEP) need to be configured as part of the DM provisioning. DM OAM + packets should be transmitted with the PHB that yields the lowest + + + +Busi & Allan Informational [Page 46] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + drop precedence within the measured PHB Scheduling Class (see RFC + 3260 [17]). + + Performance monitoring (e.g., DM) is only relevant when the transport + path is defect free. CC-V contributes to the accuracy of PM + statistics by permitting the defect-free periods to be properly + distinguished. Therefore, support of proactive DM has implications + on the CC-V transmission period (see Section 5.1.3). + +5.7. Client Failure Indication + + The Client Failure Indication (CFI) function, as required in Section + 2.2.10 of RFC 5860 [11], is used to help process client defects and + propagate a client signal defect condition from the process + associated with the local attachment circuit where the defect was + detected (typically the source adaptation function for the local + client interface). It is propagated to the process associated with + the far-end attachment circuit (typically the source adaptation + function for the far-end client interface) for the same transmission + path, in case the client of the transport path does not support a + native defect/alarm indication mechanism, e.g., AIS. + + A source MEP starts transmitting a CFI to its peer MEP when it + receives a local client signal defect notification via its local + client signal fail indication. Mechanisms to detect local client + signal fail defects are technology specific. Similarly, mechanisms + to determine when to cease originating client signal fail indication + are also technology specific. + + A sink MEP that has received a CFI reports this condition to its + associated client process via its local CFI function. Consequent + actions toward the client attachment circuit are technology specific. + + There needs to be a 1:1 correspondence between the client and the + MEG; otherwise, when multiple clients are multiplexed over a + transport path, the CFI packet requires additional information to + permit the client instance to be identified. + + MIPs, as well as intermediate nodes, do not process the CFI + information; they forward these proactive CFI OAM packets as regular + data packets. + +5.7.1. Configuration Considerations + + In order to support CFI indication, the CFI transmission rate and, + for E-LSPs, the PHB of the CFI OAM packets should be configured as + part of the CFI configuration. + + + + +Busi & Allan Informational [Page 47] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +6. OAM Functions for On-Demand Monitoring + + In contrast to proactive monitoring, on-demand monitoring is + initiated manually and for a limited amount of time, usually for + operations such as diagnostics to investigate a defect condition. + + On-demand monitoring covers a combination of "in-service" and "out- + of-service" monitoring functions. The control and measurement + implications are: + + 1. A MEG can be directed to perform an "on-demand" functions at + arbitrary times in the lifetime of a transport path. + + 2. "Out-of-service" monitoring functions may require a priori + configuration of both MEPs and intermediate nodes in the MEG + (e.g., data-plane loopback) and the issuance of notifications into + client layers of the transport path being removed from service + (e.g., lock reporting) + + 3. The measurements resulting from "on-demand" monitoring are + typically harvested in real time, as they are frequently initiated + manually. These do not necessarily require different harvesting + mechanisms than for harvesting proactive monitoring telemetry. + + The functions that are exclusively out-of-service are those described + in Section 6.3. The remainder are applicable to both in-service and + out-of-service transport paths. + +6.1. Connectivity Verification + + The on-demand connectivity verification function, as required in + Section 2.2.3 of RFC 5860 [11], is a transaction that flows from the + originating MEP to a target MIP or MEP to verify the connectivity + between these points. + + Use of on-demand CV is dependent on the existence of a bidirectional + ME or an associated return ME, or the availability of an out-of-band + return path, because it requires the ability for target MIPs and MEPs + to direct responses to the originating MEPs. + + One possible use of on-demand CV would be to perform fault management + without using proactive CC-V, in order to preserve network resources, + e.g., bandwidth, processing time at switches. In this case, network + management periodically invokes on-demand CV. + + + + + + + +Busi & Allan Informational [Page 48] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + An additional use of on-demand CV would be to detect and locate a + problem of connectivity when a problem is suspected or known to be + based on other tools. In this case, the functionality will be + triggered by the network management in response to a status signal or + alarm indication. + + On-demand CV is based upon generation of on-demand CV packets that + should uniquely identify the MEG that is being checked. The on- + demand functionality may be used to check either an entire MEG (end- + to-end) or between the originating MEP and a specific MIP. This + functionality may not be available for associated bidirectional + transport paths or unidirectional paths, as the MIP may not have a + return path to the originating MEP for the on-demand CV transaction. + + When on-demand CV is invoked, the originating MEP issues a sequence + of on-demand CV packets that uniquely identifies the MEG being + verified. The number of packets and their transmission rate should + be pre-configured at the originating MEP to take into account normal + packet-loss conditions. The source MEP should use the mechanisms + defined in Sections 3.3 and 3.4 when sending an on-demand CV packet + to a target MEP or target MIP, respectively. The target MEP/MIP + shall return a reply on-demand CV packet for each packet received. + If the expected number of on-demand CV reply packets is not received + at the originating MEP, this is an indication that a connectivity + problem may exist. + + On-demand CV should have the ability to carry padding such that a + variety of MTU sizes can be originated to verify the MTU transport + capability of the transport path. + + MIPs that are not targeted by on-demand CV packets, as well as + intermediate nodes, do not process the CV information; they forward + these on-demand CV OAM packets as regular data packets. + +6.1.1. Configuration Considerations + + For on-demand CV, the originating MEP should support the + configuration of the number of packets to be transmitted/received in + each sequence of transmissions and their packet size. + + In addition, when the CV packet is used to check connectivity toward + a target MIP, the number of hops to reach the target MIP should be + configured. + + For E-LSPs, the PHB of the on-demand CV packets should be configured + as well. This permits the verification of correct operation of QoS + queuing as well as connectivity. + + + + +Busi & Allan Informational [Page 49] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +6.2. Packet Loss Measurement + + On-demand Packet Loss Measurement (LM) is one of the capabilities + supported by the MPLS-TP Performance Monitoring function in order to + facilitate the diagnosis of QoS performance for a transport path, as + required in Section 2.2.11 of RFC 5860 [11]. + + On-demand LM is very similar to proactive LM described in Section + 5.5. This section focuses on the differences between on-demand and + proactive LM. + + On-demand LM is performed by periodically sending LM OAM packets from + a MEP to a peer MEP and by receiving LM OAM packets from the peer MEP + (if a co-routed or associated bidirectional transport path) during a + pre-defined monitoring period. Each MEP performs measurements of its + transmitted and received user data packets. These measurements are + then correlated to evaluate the packet-loss performance metrics of + the transport path. + + Use of packet loss measurement in an out-of-service transport path + requires a traffic source such as a test device that can inject + synthetic traffic. + +6.2.1. Configuration Considerations + + In order to support on-demand LM, the beginning and duration of the + LM procedures, the transmission rate, and, for E-LSPs, the PHB class + (associated with the LM OAM packets originating from a MEP) must be + configured as part of the on-demand LM provisioning. LM OAM packets + should be transmitted with the PHB that yields the lowest drop + precedence as described in Section 5.5.1. + +6.2.2. Sampling Skew + + The same considerations described in Section 5.5.2 for the proactive + LM are also applicable to on-demand LM implementations. + +6.2.3. Multilink Issues + + Multilink issues are as described in Section 5.5.3. + +6.3. Diagnostic Tests + + Diagnostic tests are tests performed on a MEG that has been taken out + of service. + + + + + + +Busi & Allan Informational [Page 50] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +6.3.1. Throughput Estimation + + Throughput estimation is an on-demand out-of-service function, as + required in Section 2.2.5 of RFC 5860 [11], that allows verifying the + bandwidth/throughput of an MPLS-TP transport path (LSP or PW) before + it is put in service. + + Throughput estimation is performed between MEPs and between a MEP and + a MIP. It can be performed in one-way or two-way modes. + + According to RFC 2544 [12], this test is performed by sending OAM + test packets at increasing rates (up to the theoretical maximum), + computing the percentage of OAM test packets received, and reporting + the rate at which OAM test packets begin to drop. In general, this + rate is dependent on the OAM test packet size. + + When configured to perform such tests, a source MEP inserts OAM test + packets with a specified packet size and transmission pattern at a + rate to exercise the throughput. + + The throughput test can create congestion within the network, thus + impacting other transport paths. However, the test traffic should + comply with the traffic profile of the transport path under test, so + the impact of the test will not be worse than the impact caused by + the customers, whose traffic would be sent over that transport path, + sending the traffic at the maximum rate allowed by their traffic + profiles. Therefore, throughput tests are not applicable to + transport paths that do not have a defined traffic profile, such as + LSPs in a context where statistical multiplexing is leveraged for + network capacity dimensioning. + + For a one-way test, the remote sink MEP receives the OAM test packets + and calculates the packet loss. For a two-way test, the remote MEP + loops the OAM test packets back to the original MEP, and the local + sink MEP calculates the packet loss. + + It is worth noting that two-way throughput estimation is only + applicable to bidirectional (co-routed or associated) transport paths + and can only evaluate the minimum of available throughput of the two + directions. In order to estimate the throughput of each direction + uniquely, two one-way throughput estimation sessions have to be set + up. One-way throughput estimation requires coordination between the + transmitting and receiving test devices as described in Section 6 of + RFC 2544 [12]. + + It is also worth noting that if throughput estimation is performed on + transport paths that transit oversubscribed links, the test may not + produce comprehensive results if viewed in isolation because the + + + +Busi & Allan Informational [Page 51] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + impact of the test on the surrounding traffic needs to also be + considered. Moreover, the estimation will only reflect the bandwidth + available at the moment when the measure is made. + + MIPs that are not targeted by on-demand test OAM packets, as well as + intermediate nodes, do not process the throughput test information; + they forward these on-demand test OAM packets as regular data + packets. + +6.3.1.1. Configuration Considerations + + Throughput estimation is an out-of-service tool. The diagnosed MEG + should be put into a locked state before the diagnostic test is + started. + + A MEG can be put into a locked state either via an NMS action or + using the Lock Instruct OAM tool as defined in Section 7. + + At the transmitting MEP, provisioning is required for a test signal + generator that is associated with the MEP. At a receiving MEP, + provisioning is required for a test signal detector that is + associated with the MEP. + + In order to ensure accurate measurement, care needs to be taken to + enable throughput estimation only if all the MEPs within the MEG can + process OAM test packets at the same rate as the payload data rates + (see Section 6.3.1.2). + +6.3.1.2. Limited OAM Processing Rate + + If an implementation is able to process payload at much higher data + rates than OAM test packets, then accurate measurement of throughput + using OAM test packets is not achievable. Whether OAM packets can be + processed at the same rate as payload is implementation dependent. + +6.3.1.3. Multilink Considerations + + If multilink is used, then it may not be possible to perform + throughput measurement, as the throughput test may not have a + mechanism for utilizing more than one component link of the + aggregated link. + +6.3.2. Data-Plane Loopback + + Data-plane loopback is an out-of-service function, as required in + Section 2.2.5 of RFC 5860 [11]. This function consists in placing a + transport path, at either an intermediate or terminating node, into a + data-plane loopback state, such that all traffic (including both + + + +Busi & Allan Informational [Page 52] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + payload and OAM) received on the looped back interface is sent on the + reverse direction of the transport path. The traffic is looped back + unmodified except for normal per-hop processing such as TTL + decrement. + + The data-plane loopback function requires that the MEG is locked such + that user data traffic is prevented from entering/exiting that MEG. + Instead, test traffic is inserted at the ingress of the MEG. This + test traffic can be generated from an internal process residing + within the ingress node or injected by external test equipment + connected to the ingress node. + + It is also normal to disable proactive monitoring of the path as the + MEP located upstream with respect to the node set in the data-plane + loopback mode will see all the OAM packets originated by itself, and + this may interfere with other measurements. + + The only way to send an OAM packet (e.g., to remove the data-plane + loopback state) to the MIPs or MEPs hosted by a node set in the data- + plane loopback mode is via TTL expiry. It should also be noted that + MIPs can be addressed with more than one TTL value on a co-routed + bidirectional path set into data-plane loopback. + + If the loopback function is to be performed at an intermediate node, + it is only applicable to co-routed bidirectional paths. If the + loopback is to be performed end to end, it is applicable to both co- + routed bidirectional and associated bidirectional paths. + + It should be noted that data-plane loopback function itself is + applied to data-plane loopback points that can reside on different + interfaces from MIPs/MEPs. Where a node implements data-plane + loopback capability and whether it implements it in more than one + point is implementation dependent. + +6.3.2.1. Configuration Considerations + + Data-plane loopback is an out-of-service tool. The MEG that defines + a diagnosed transport path should be put into a locked state before + the diagnostic test is started. However, a means is required to + permit the originated test traffic to be inserted at the ingress MEP + when data-plane loopback is performed. + + A transport path, at either an intermediate or terminating node, can + be put into data-plane loopback state via an NMS action or using an + OAM tool for data-plane loopback configuration. + + + + + + +Busi & Allan Informational [Page 53] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + If the data-plane loopback point is set somewhere at an intermediate + point of a co-routed bidirectional transport path, the side of the + loopback function (east/west side or both sides) needs to be + configured. + +6.4. Route Tracing + + It is often necessary to trace a route covered by a MEG from an + originating MEP to the peer MEP(s) including all the MIPs in between. + This may be conducted after provisioning an MPLS-TP transport path + for, e.g., troubleshooting purposes such as fault localization. + + The route tracing function, as required in Section 2.2.4 of RFC 5860 + [11], is providing this functionality. Based on the fate-sharing + requirement of OAM flows, i.e., OAM packets receive the same + forwarding treatment as data packets, route tracing is a basic means + to perform connectivity verification and, to a much lesser degree, + continuity check. For this function to work properly, a return path + must be present. + + Route tracing might be implemented in different ways, and this + document does not preclude any of them. + + Route tracing should always discover the full list of MIPs and of + peer MEPs. In case a defect exists, the route tracing function will + only be able to trace up to the defect, and it needs to be able to + return the incomplete list of OAM entities that it was able to trace + so that the fault can be localized. + +6.4.1. Configuration Considerations + + The configuration of the route tracing function must at least support + the setting of the number of trace attempts before it gives up. + +6.5. Packet Delay Measurement + + Packet Delay Measurement (DM) is one of the capabilities supported by + the MPLS-TP PM function in order to facilitate reporting of QoS + information for a transport path, as required in Section 2.2.12 of + RFC 5860 [11]. Specifically, on-demand DM is used to measure packet + delay and packet delay variation in the transport path monitored by a + pair of MEPs during a pre-defined monitoring period. + + On-demand DM is performed by sending periodic DM OAM packets from a + MEP to a peer MEP and by receiving DM OAM packets from the peer MEP + (if a co-routed or associated bidirectional transport path) during a + configurable time interval. + + + + +Busi & Allan Informational [Page 54] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + On-demand DM can be operated in two modes: + + o One-way: a MEP sends a DM OAM packet to its peer MEP containing + all the required information to facilitate one-way packet delay + and/or one-way packet delay variation measurements at the peer + MEP. Note that this requires precise time synchronization at + either MEP by means outside the scope of this framework. + + o Two-way: a MEP sends a DM OAM packet with a DM request to its peer + MEP, which replies with a DM OAM packet as a DM response. The + request/response DM OAM packets contain all the required + information to facilitate two-way packet delay and/or two-way + packet delay variation measurements from the viewpoint of the + originating MEP. + + MIPs, as well as intermediate nodes, do not process the DM + information; they forward these on-demand DM OAM packets as regular + data packets. + +6.5.1. Configuration Considerations + + In order to support on-demand DM, the beginning and duration of the + DM procedures, the transmission rate and, for E-LSPs, the PHB + (associated with the DM OAM packets originating from a MEP) need to + be configured as part of the DM provisioning. DM OAM packets should + be transmitted with the PHB that yields the lowest drop precedence + within the measured PHB Scheduling Class (see RFC 3260 [17]). + + In order to verify different performances between long and short + packets (e.g., due to the processing time), it should be possible for + the operator to configure the packet size of the on-demand OAM DM + packet. + +7. OAM Functions for Administration Control + +7.1. Lock Instruct + + The Lock Instruct (LKI) function, as required in Section 2.2.6 of RFC + 5860 [11], is a command allowing a MEP to instruct the peer MEP(s) to + put the MPLS-TP transport path into a locked condition. + + This function allows single-side provisioning for administratively + locking (and unlocking) an MPLS-TP transport path. + + Note that it is also possible to administratively lock (and unlock) + an MPLS-TP transport path using two-side provisioning, where the NMS + administratively puts both MEPs into an administrative lock + condition. In this case, the LKI function is not required/used. + + + +Busi & Allan Informational [Page 55] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + MIPs, as well as intermediate nodes, do not process the Lock Instruct + information; they forward these on-demand LKI OAM packets as regular + data packets. + +7.1.1. Locking a Transport Path + + A MEP, upon receiving a single-side administrative lock command from + an NMS, sends an LKI request OAM packet to its peer MEP(s). It also + puts the MPLS-TP transport path into a locked state and notifies its + client (sub-)layer adaptation function upon the locked condition. + + A MEP, upon receiving an LKI request from its peer MEP, can either + accept or reject the instruction and replies to the peer MEP with an + LKI reply OAM packet indicating whether or not it has accepted the + instruction. This requires either an in-band or out-of-band return + path. The LKI reply is needed to allow the MEP to properly report to + the NMS the actual result of the single-side administrative lock + command. + + If the lock instruction has been accepted, it also puts the MPLS-TP + transport path into a locked state and notifies its client + (sub-)layer adaptation function upon the locked condition. + + Note that if the client (sub-)layer is also MPLS-TP, Lock Report + (LKR) generation at the client MPLS-TP (sub-)layer is started, as + described in Section 5.4. + +7.1.2. Unlocking a Transport Path + + A MEP, upon receiving a single-side administrative unlock command + from NMS, sends an LKI removal request OAM packet to its peer MEP(s). + + The peer MEP, upon receiving an LKI removal request, can either + accept or reject the removal instruction and replies with an LK + removal reply OAM packet indicating whether or not it has accepted + the instruction. The LKI removal reply is needed to allow the MEP to + properly report to the NMS the actual result of the single-side + administrative unlock command. + + If the lock removal instruction has been accepted, it also clears the + locked condition on the MPLS-TP transport path and notifies its + client (sub-)layer adaptation function of this event. + + The MEP that has initiated the LKI clear procedure, upon receiving a + positive LKI removal reply, also clears the locked condition on the + MPLS-TP transport path and notifies this event to its client + (sub-)layer adaptation function. + + + + +Busi & Allan Informational [Page 56] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Note that if the client (sub-)layer is also MPLS-TP, Lock Report + (LKR) generation at the client MPLS-TP (sub-)layer is terminated, as + described in Section 5.4. + +8. Security Considerations + + A number of security considerations are important in the context of + OAM applications. + + OAM traffic can reveal sensitive information, such as performance + data and details, about the current state of the network. Insertion + or modification of OAM transactions can mask the true operational + state of the network, and in the case of transactions for + administration control, such as lock or data-plane loopback + instructions, these can be used for explicit denial-of-service + attacks. The effect of such attacks is mitigated only by the fact + that, for in-band messaging, the managed entities whose state can be + masked is limited to those that transit the point of malicious access + to the network internals due to the fate-sharing nature of OAM + messaging. This is not true when an out-of-band return path is + employed. + + The sensitivity of OAM data therefore suggests that one solution is + that some form of authentication, authorization, and encryption is in + place. This will prevent unauthorized access to vital equipment, and + it will prevent third parties from learning about sensitive + information about the transport network. However, it should be + observed that the combination of the frequency of some OAM + transactions, the need for timeliness of OAM transaction exchange, + and all permutations of unique MEP to MEP, MEP to MIP, and + intermediate-system-originated transactions mitigates against the + practical establishment and maintenance of a large number of security + associations per MEG either in advance or as required. + + For this reason, it is assumed that the internal links of the network + are physically secured from malicious access such that OAM + transactions scoped to fault and performance management of individual + MEGs are not encumbered with additional security. Further, it is + assumed in multi-provider cases where OAM transactions originate + outside of an individual provider's trusted domain that filtering + mechanisms or further encapsulation will need to constrain the + potential impact of malicious transactions. Mechanisms that the + framework does not specify might be subject to additional security + considerations. + + In case of misconfiguration, some nodes can receive OAM packets that + they cannot recognize. In such a case, these OAM packets should be + silently discarded in order to avoid malfunctions whose effects may + + + +Busi & Allan Informational [Page 57] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + be similar to malicious attacks (e.g., degraded performance or even + failure). Further considerations about data-plane attacks via G-ACh + are provided in RFC 5921 [8]. + +9. Acknowledgments + + The authors would like to thank all members of the teams (the Joint + Working Team, the MPLS Interoperability Design Team in IETF, and the + Ad Hoc Group on MPLS-TP in ITU-T) involved in the definition and + specification of the MPLS Transport Profile. + + The editors gratefully acknowledge the contributions of Adrian + Farrel, Yoshinori Koike, Luca Martini, Yuji Tochio, and Manuel Paul + for the definition of per-interface MIPs and MEPs. + + The editors gratefully acknowledge the contributions of Malcolm + Betts, Yoshinori Koike, Xiao Min, and Maarten Vissers for the Lock + Report and Lock Instruct descriptions. + + The authors would also like to thank Alessandro D'Alessandro, Loa + Andersson, Malcolm Betts, Dave Black, Stewart Bryant, Rui Costa, + Xuehui Dai, John Drake, Adrian Farrel, Dan Frost, Xia Liang, Liu + Gouman, Peng He, Russ Housley, Feng Huang, Su Hui, Yoshionori Koike, + Thomas Morin, George Swallow, Yuji Tochio, Curtis Villamizar, Maarten + Vissers, and Xuequin Wei for their comments and enhancements to the + text. + +10. References + +10.1. Normative References + + [1] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol Label + Switching Architecture", RFC 3031, January 2001. + + [2] Bryant, S., Ed., and P. Pate, Ed., "Pseudo Wire Emulation Edge- + to-Edge (PWE3) Architecture", RFC 3985, March 2005. + + [3] Nadeau, T., Ed., and C. Pignataro, Ed., "Pseudowire Virtual + Circuit Connectivity Verification (VCCV): A Control Channel for + Pseudowires", RFC 5085, December 2007. + + [4] Bocci, M. and S. Bryant, "An Architecture for Multi-Segment + Pseudowire Emulation Edge-to-Edge", RFC 5659, October 2009. + + [5] Niven-Jenkins, B., Ed., Brungard, D., Ed., Betts, M., Ed., + Sprecher, N., and S. Ueno, "Requirements of an MPLS Transport + Profile", RFC 5654, September 2009. + + + + +Busi & Allan Informational [Page 58] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + [6] Agarwal, P. and B. Akyol, "Time To Live (TTL) Processing in + Multi-Protocol Label Switching (MPLS) Networks", RFC 3443, + January 2003. + + [7] Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant, Ed., "MPLS + Generic Associated Channel", RFC 5586, June 2009. + + [8] Bocci, M., Ed., Bryant, S., Ed., Frost, D., Ed., Levrau, L., and + L. Berger, "A Framework for MPLS in Transport Networks", RFC + 5921, July 2010. + + [9] Bocci, M., Levrau, L., and D. Frost, "MPLS Transport Profile + User-to-Network and Network-to-Network Interfaces", RFC 6215, + April 2011. + + [10] Frost, D., Ed., Bryant, S., Ed., and M. Bocci, Ed., "MPLS + Transport Profile Data Plane Architecture", RFC 5960, August + 2010. + + [11] Vigoureux, M., Ed., Ward, D., Ed., and M. Betts, Ed., + "Requirements for Operations, Administration, and Maintenance + (OAM) in MPLS Transport Networks", RFC 5860, May 2010. + + [12] Bradner, S. and J. McQuaid, "Benchmarking Methodology for + Network Interconnect Devices", RFC 2544, March 1999. + + [13] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W. + Weiss, "An Architecture for Differentiated Service", RFC 2475, + December 1998. + + [14] ITU-T Recommendation G.806 (01/09), "Characteristics of + transport equipment - Description methodology and generic + functionality", January 2009. + +10.2. Informative References + + [15] Sprecher, N. and L. Fang, "An Overview of the OAM Tool Set for + MPLS based Transport Networks", Work in Progress, June 2011. + + [16] Nichols, K., Blake, S., Baker, F., and D. Black, "Definition of + the Differentiated Services Field (DS Field) in the IPv4 and + IPv6 Headers", RFC 2474, December 1998. + + [17] Grossman, D., "New Terminology and Clarifications for Diffserv", + RFC 3260, April 2002. + + [18] Kompella, K., Rekhter, Y., and L. Berger, "Link Bundling in MPLS + Traffic Engineering (TE)", RFC 4201, October 2005. + + + +Busi & Allan Informational [Page 59] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + [19] ITU-T Recommendation G.707/Y.1322 (01/07), "Network node + interface for the synchronous digital hierarchy (SDH)", January + 2007. + + [20] ITU-T Recommendation G.805 (03/00), "Generic functional + architecture of transport networks", March 2000. + + [21] ITU-T Recommendation Y.1731 (02/08), "OAM functions and + mechanisms for Ethernet based networks", February 2008. + + [22] IEEE Standard 802.1AX-2008, "IEEE Standard for Local and + Metropolitan Area Networks - Link Aggregation", November 2008. + + [23] Le Faucheur, F., Wu, L., Davie, B., Davari, S., Vaananen, P., + Krishnan, R., Cheval, P., and J. Heinanen, "Multi-Protocol Label + Switching (MPLS) Support of Differentiated Services", RFC 3270, + May 2002. + + [24] Bocci, M., Swallow, G., and E. Gray, "MPLS Transport Profile + (MPLS-TP) Identifiers", RFC 6370, September 2011. + + [25] Winter, R., Ed., van Helvoort, H., and M. Betts, "MPLS-TP + Identifiers Following ITU-T Conventions", Work in Progress, July + 2011. + +11. Contributing Authors + + Ben Niven-Jenkins + Velocix + + EMail: ben@niven-jenkins.co.uk + + + Annamaria Fulignoli + Ericsson + + EMail: annamaria.fulignoli@ericsson.com + + + Enrique Hernandez-Valencia + Alcatel-Lucent + + EMail: Enrique.Hernandez@alcatel-lucent.com + + + + + + + + +Busi & Allan Informational [Page 60] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + + Lieven Levrau + Alcatel-Lucent + + EMail: Lieven.Levrau@alcatel-lucent.com + + + Vincenzo Sestito + Alcatel-Lucent + + EMail: Vincenzo.Sestito@alcatel-lucent.com + + + Nurit Sprecher + Nokia Siemens Networks + + EMail: nurit.sprecher@nsn.com + + + Huub van Helvoort + Huawei Technologies + + EMail: hhelvoort@huawei.com + + + Martin Vigoureux + Alcatel-Lucent + + EMail: Martin.Vigoureux@alcatel-lucent.com + + + Yaacov Weingarten + Nokia Siemens Networks + + EMail: yaacov.weingarten@nsn.com + + + Rolf Winter + NEC + + EMail: Rolf.Winter@nw.neclab.eu + + + + + + + + + + + +Busi & Allan Informational [Page 61] + +RFC 6371 OAM Framework for MPLS-Based Transport September 2011 + + +Authors' Addresses + + Dave Allan + Ericsson + + EMail: david.i.allan@ericsson.com + + + Italo Busi + Alcatel-Lucent + + EMail: Italo.Busi@alcatel-lucent.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Busi & Allan Informational [Page 62] + |