summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7412.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc7412.txt')
-rw-r--r--doc/rfc/rfc7412.txt899
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc7412.txt b/doc/rfc/rfc7412.txt
new file mode 100644
index 0000000..99a271b
--- /dev/null
+++ b/doc/rfc/rfc7412.txt
@@ -0,0 +1,899 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) Y. Weingarten
+Request for Comments: 7412
+Category: Informational S. Aldrin
+ISSN: 2070-1721 Huawei Technologies
+ P. Pan
+ Infinera
+ J. Ryoo
+ ETRI
+ G. Mirsky
+ Ericsson
+ December 2014
+
+
+ Requirements for MPLS Transport Profile (MPLS-TP)
+ Shared Mesh Protection
+
+Abstract
+
+ This document presents the basic network objectives for the behavior
+ of Shared Mesh Protection (SMP) that are not based on control-plane
+ support. This document provides an expansion of the basic
+ requirements presented in RFC 5654 ("Requirements of an MPLS
+ Transport Profile") and RFC 6372 ("MPLS Transport Profile (MPLS-TP)
+ Survivability Framework"). This document provides requirements for
+ any mechanism that would be used to implement SMP for MPLS-TP data
+ paths, in networks that delegate protection switch coordination to
+ the data plane.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7412.
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 1]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+Copyright Notice
+
+ Copyright (c) 2014 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Terminology and Notation ........................................3
+ 2.1. Acronyms and Terminology ...................................4
+ 3. Shared Mesh Protection Reference Model ..........................4
+ 3.1. Protection or Restoration ..................................5
+ 3.2. Scope of Document ..........................................5
+ 3.2.1. Relationship to MPLS ................................5
+ 4. SMP Architecture ................................................6
+ 4.1. Coordination of Resources ..................................8
+ 4.2. Control Plane or Data Plane ................................8
+ 5. SMP Network Objectives ..........................................9
+ 5.1. Resource Reservation and Coordination ......................9
+ 5.1.1. Checking Resource Availability for Multiple
+ Protection Paths ....................................9
+ 5.2. Multiple Triggers .........................................10
+ 5.2.1. Soft Preemption ....................................10
+ 5.2.2. Hard Preemption ....................................10
+ 5.3. Notification ..............................................11
+ 5.4. Reversion .................................................11
+ 5.5. Protection Switching Time .................................11
+ 5.6. Timers ....................................................12
+ 5.7. Communication Channel and Fate-Sharing ....................12
+ 6. Manageability Considerations ...................................13
+ 7. Security Considerations ........................................13
+ 8. Normative References ...........................................13
+ Acknowledgements ..................................................15
+ Contributors ......................................................15
+ Authors' Addresses ................................................16
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 2]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+1. Introduction
+
+ The MPLS Transport Profile (MPLS-TP) is described in [RFC5921].
+ [RFC6372] provides a survivability framework for MPLS-TP and is the
+ foundation for this document.
+
+ Terminology for recovery of connectivity in networks is provided in
+ [RFC4427] and includes the concept of surviving network faults
+ (survivability) through the use of re-established connections
+ (restoration) and switching of traffic to pre-established backup
+ paths (protection). MPLS provides control-plane tools to support
+ various survivability schemes, some of which are identified in
+ [RFC4426]. In addition, recent efforts in the IETF have started
+ providing for data-plane tools to address aspects of data protection.
+ In particular, [RFC6378] and [RFC7271] define a set of triggers and
+ coordination protocols for 1:1 and 1+1 linear protection of point-to-
+ point paths.
+
+ When considering a full-mesh network and the protection of different
+ paths that traverse the mesh, it is possible to provide an acceptable
+ level of protection while conserving the amount of protection
+ resources needed to protect the different data paths. As pointed out
+ in [RFC6372] and [RFC4427], applying 1+1 protection requires that
+ resources are allocated for use by both the working and protection
+ paths. Applying 1:1 protection requires that the same resources are
+ allocated but allows the resources of the protection path to be
+ utilized for preemptible extra traffic. Extending this to 1:n or m:n
+ protection allows the resources of the protection path to be shared
+ in the protection of several working paths. However, 1:n or m:n
+ protection architecture is limited by the restriction that all of the
+ n+1 or m+n paths must have the same endpoints. m:n protection
+ architecture provides m protection paths to protect n working paths,
+ where m or n can be 1.
+
+ This document provides requirements for any mechanism that would be
+ used to implement SMP for MPLS-TP data paths, in networks that
+ delegate protection switch coordination to the data plane.
+
+2. Terminology and Notation
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+ Although this document is not a protocol specification, the use of
+ this language clarifies the instructions to protocol designers
+ producing solutions that satisfy the requirements set out in this
+ document.
+
+
+
+Weingarten, et al. Informational [Page 3]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ The terminology used in this document is based on the terminology
+ defined in the MPLS-TP Survivability Framework document [RFC6372],
+ which in turn is based on [RFC4427].
+
+2.1. Acronyms and Terminology
+
+ This document uses the following acronyms:
+
+ LSP Label Switched Path
+ SLA Service Level Agreement
+ SMP Shared Mesh Protection
+ SRLG Shared Risk Link Group
+
+ This document defines the following term:
+
+ SMP Protection Group: the set of different protection paths that
+ share a common segment.
+
+3. Shared Mesh Protection Reference Model
+
+ As described in [RFC6372], SMP supports the sharing of protection
+ resources, while providing protection for multiple working paths that
+ need not have common endpoints and do not share common points of
+ failure. Note that some protection resources may be shared, while
+ some others may not be. An example of data paths that employ SMP is
+ shown in Figure 1. It shows two working paths -- <ABCDE> and <VWXYZ>
+ -- that are protected employing 1:1 linear protection by protection
+ paths <APQRE> and <VPQRZ>, respectively. The two protection paths
+ that traverse segment <PQR> share the protection resources on this
+ segment.
+
+ A----B----C----D----E
+ \ /
+ \ /
+ \ /
+ P-----Q-----R
+ / \
+ / \
+ / \
+ V----W----X----Y----Z
+
+ Figure 1: Basic SMP Architecture
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 4]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+3.1. Protection or Restoration
+
+ [RFC6372], based upon the definitions in [RFC4427], differentiates
+ between "protection" and "restoration", depending on the dynamism of
+ the resource allocation. The same distinction is used in [RFC3945],
+ [RFC4426], and [RFC4428].
+
+ This document also uses the same distinction between protection and
+ restoration as the distinction stated in [RFC6372].
+
+3.2. Scope of Document
+
+ [RFC5654] establishes that MPLS-TP SHOULD support shared protection
+ (Requirement 68) and that MPLS-TP MUST support sharing of protection
+ resources (Requirement 69). This document presents the network
+ objectives and a framework for applying SMP within an MPLS network,
+ without the use of control-plane protocols. Although there are
+ existing control-plane solutions for SMP within MPLS, a data-plane
+ solution is required for networks that do not employ a full control-
+ plane operation for some reason (e.g., service provider preferences
+ or limitations) or require service restoration faster than is
+ achievable with control-plane mechanisms.
+
+ The network objectives will also address possible additional
+ restrictions on the behavior of SMP in networks that delegate
+ protection switching for resiliency to the data plane. Definitions
+ of logic and specific protocol messaging are out of scope for this
+ document.
+
+3.2.1. Relationship to MPLS
+
+ While some of the restrictions presented by this document originate
+ from the properties of transport networks, nothing prevents the
+ information presented here from being applied to MPLS networks
+ outside the scope of the Transport Profile of MPLS.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 5]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+4. SMP Architecture
+
+ Figure 1 shows a very basic configuration of working and protection
+ paths that may employ SMP. We may consider a slightly more complex
+ configuration, such as the one in Figure 2 in order to illustrate
+ characteristics of a mesh network that implements SMP.
+
+ A----B----C----D----E---N
+ \ / / \
+ \ M ---/-- \
+ \ / \ \
+ P-----Q-----R-----S----T
+ /| \ \ \ \
+ / F---G---H J--K---L \
+ / \
+ V------W-------X-------Y-------Z
+
+ Figure 2: Example of a Larger SMP Architecture
+
+ Consider the network presented in Figure 2. There are five working
+ paths:
+
+ - <ABCDE>
+
+ - <MDEN>
+
+ - <FGH>
+
+ - <JKL>
+
+ - <VWXYZ>
+
+ Each of these has a corresponding protection path:
+
+ - <APQRE> (p1)
+
+ - <MSTN> (p2)
+
+ - <FPQH> (p3)
+
+ - <JRSL> (p4)
+
+ - <VPQRSTZ> (p5)
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 6]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ The following segments are shared by two or more of the protection
+ paths -- <PQ> is shared by p1, p3, and p5; <QR> is shared by p1 and
+ p5; <RS> is shared by p4 and p5; and <ST> is shared by p2 and p5. In
+ Figure 2, we have the following SMP Protection Groups -- {p1, p3, p5}
+ for <PQ>, {p1, p5} for <QR>, {p4, p5} for <RS>, and {p2, p5}
+ for <ST>.
+
+ We assume that the available protection resources for these shared
+ segments are not sufficient to support the complete traffic capacity
+ of the respective working paths that may use the protection paths.
+ We can further observe that with a method of coordinating sharing and
+ preemption, there are no co-routing constraints on shared components
+ at the segment level.
+
+ The use of preemption in the network is typically a business or
+ policy decision such that when protection resources are contested,
+ priority can be applied to determine which parties utilize the
+ protection resources.
+
+ As opposed to the case of simple linear protection, where the
+ relationship between the working and protection paths is defined and
+ the resources for the protection path are fully dedicated, the
+ protection path in the case of SMP consists of segments that are used
+ for the protection of the related working path and also segments that
+ are shared with other protection paths such that typically the
+ protection resources are oversubscribed to support working paths that
+ do not share common points of failure. What is required is a
+ preemption mechanism to implement business priority when multiple
+ failure scenarios occur. As such, the protection resources may be
+ allocated but would not be utilized until requested and resolved in
+ relation to other members of the SMP Protection Group as part of a
+ protection switchover.
+
+ [RFC6372] defines two types of preemption that can be considered for
+ how the resources of SMP Protection Groups are shared: "soft
+ preemption", where traffic of lower-priority paths is degraded; and
+ "hard preemption", where traffic of lower-priority paths is
+ completely blocked. The traffic of lower-priority paths in this
+ document can be viewed as the extra traffic being preempted, as
+ described in [RFC6372]. "Hard preemption" requires the programming
+ of selectors at the ingress of each shared segment to specify the
+ priorities of backup paths, so that traffic of lower-priority paths
+ can be preempted. When any protection mechanism where the protection
+ endpoint may have a choice of protection paths (e.g., m:n or m:1) is
+ deployed, the shared segment selectors require coordination with the
+ protection endpoints as well.
+
+
+
+
+
+Weingarten, et al. Informational [Page 7]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ Typical deployment of services that use SMP requires various network
+ planning activities. These include the following:
+
+ o Determining the number of working and protection paths required to
+ achieve resiliency targets for the service.
+
+ o Reviewing network topology to determine which working or
+ protection paths are required to be disjoint from each other, and
+ excluding specified resources such as links, nodes, or shared risk
+ link groups (SRLGs).
+
+ o Determining the size (bandwidth) of the shared resource.
+
+4.1. Coordination of Resources
+
+ When a protection switch is triggered, the SMP network performs two
+ operations -- switching data traffic over to a protection path and
+ coordinating the utilization of the associated shared resources.
+ Both operations should occur at the same time, or as close together
+ as possible, to provide fast protection. The resource utilization
+ coordination is dependent upon their availability at each of the
+ shared segments.
+
+ When the reserved resources of the shared segments are utilized by a
+ particular protection path, there may not be sufficient resources
+ available for an additional protection path. This then implies that
+ if another working path of the SMP domain triggers a protection
+ switch, the resource utilization coordination may fail. The
+ different working paths in the SMP network are involved in the
+ resource utilization coordination, which is a part of a whole SMP
+ protection switching coordination.
+
+4.2. Control Plane or Data Plane
+
+ As stated in both [RFC6372] and [RFC4428], full control of SMP,
+ including both configuration and the coordination of the protection
+ switching, is potentially very complex. Therefore, it is suggested
+ that this be carried out under the control of a dynamic control plane
+ based on Generalized MPLS (GMPLS) [RFC3945]. Implementations for SMP
+ with GMPLS exist, and the general principles of its operation are
+ well known, if not fully documented.
+
+ However, there are operators, in particular in the transport sector,
+ that do not operate their MPLS-TP networks under the control of a
+ control plane or for other reasons have delegated executive action
+ for resilience to the data plane, and require the ability to utilize
+
+
+
+
+
+Weingarten, et al. Informational [Page 8]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ SMP protection. For such networks, it is imperative that it be
+ possible to perform all required coordination of selectors and
+ endpoints for SMP via data-plane operations.
+
+5. SMP Network Objectives
+
+5.1. Resource Reservation and Coordination
+
+ SMP is based on pre-configuration of the working paths and the
+ corresponding protection paths. This configuration may be based on
+ either a control protocol or static configuration by the management
+ system. However, even when the configuration is performed by a
+ control protocol, e.g., GMPLS, the control protocol SHALL NOT be used
+ as the primary mechanism for detecting or reporting network failures,
+ or for initiating or coordinating protection switchover. That is, it
+ SHALL NOT be used as the primary resilience mechanism.
+
+ The protection relationship between the working and protection paths
+ SHOULD be configured, and the shared segments of the protection path
+ MUST be identified prior to use of the protection paths. Relative
+ priority for working paths to be used to resolve contention for
+ protection path usage by multiple working paths MAY also be specified
+ ahead of time.
+
+ When a protection switch is triggered by any fault condition or
+ operator command, the SMP network MUST perform two operations --
+ switch data traffic over to a protection path, and coordinate the
+ utilization of the associated shared resources. To provide fast
+ protection, both operations MUST occur at the same time or as close
+ to the same time as possible.
+
+ In the case of multiple working paths failing, the shared resource
+ utilization coordination SHALL be between the different working paths
+ in the SMP network.
+
+5.1.1. Checking Resource Availability for Multiple Protection Paths
+
+ In a hard-preemption scenario, when an endpoint identifies a
+ protection switching trigger and has more than one potential action
+ (e.g., m:1 protection), it MUST verify that the necessary protection
+ resources are available on the selected protection path. The
+ resources may not be available because they have already been
+ utilized for the protection of, for example, one or more higher-
+ priority working paths.
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 9]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+5.2. Multiple Triggers
+
+ If more than one working path is triggering a protection switch such
+ that a protection segment is oversubscribed, there are two different
+ actions that the SMP network can choose -- soft preemption and hard
+ preemption [RFC6372].
+
+5.2.1. Soft Preemption
+
+ For networks that support multiplexing packets over the shared
+ segments, the requirement is as follows:
+
+ o All of the protection paths MAY be allowed to share the resources
+ of the shared segments.
+
+5.2.2. Hard Preemption
+
+ There are networks that require the exclusive use of the protection
+ resources when a protection segment is oversubscribed. Traffic of
+ lower-priority paths is completely blocked. These include networks
+ that support the requirements in [RFC5654], and in particular support
+ Requirement 58. For such networks, the following requirements apply:
+
+ 1. Relative priority MAY be assigned to each of the working paths of
+ an SMP domain. If the priority is not assigned, the working paths
+ are assumed to have equal priority.
+
+ 2. Resources of the shared segments SHALL be utilized by the
+ protection path according to the highest priority amongst those
+ requesting use of the resources.
+
+ 3. If multiple protection paths of equal priority are requesting the
+ shared resources, the resources SHALL be utilized on a first come
+ first served basis. Traffic of the protection paths that request
+ the shared resources late SHALL be preempted. In order to cover
+ the situation where the first come first served principle cannot
+ resolve the contention among multiple equal-priority requests,
+ i.e., when the requests occur simultaneously, tie-breaking rules
+ SHALL be defined in the scope of an SMP domain.
+
+ 4. If a higher-priority path requires the protection resources that
+ are being utilized by a lower-priority path, the resources SHALL
+ be utilized by the higher-priority path. Traffic with the lower
+ priority SHALL be preempted.
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 10]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ 5. Once resources of shared segments have been successfully utilized
+ by a protection path, the traffic on that protection path SHALL
+ NOT be interrupted by any protection traffic whose priority is
+ equal to or lower than the protecting path currently in use.
+
+ 6. During preemption, shared segment resources MAY be used by both
+ existing traffic (that is being preempted) and higher-priority
+ traffic.
+
+5.3. Notification
+
+ When a working path endpoint has a protection switch triggered, it
+ SHOULD attempt to switch the traffic to the protection path and
+ request the coordination of the shared resource utilization. If the
+ necessary shared resources are unavailable, the endpoints of the
+ requesting working path SHALL be notified of protection switchover
+ failure, and switchover will not be completed.
+
+ Similarly, if preemption is supported and the resources currently
+ utilized by a particular working path are being preempted, then the
+ endpoints of the affected working path whose traffic is being
+ preempted SHALL be notified that the resources are being preempted.
+ As described in [RFC6372], the event of preemption may be detected by
+ Operations, Administration, and Maintenance (OAM) and reported as a
+ fault or a degradation of traffic delivery.
+
+5.4. Reversion
+
+ When the condition that triggered the protection switch is cleared,
+ it is possible to either revert to using the working path resources
+ or continue to utilize the protection resources. Continuing the use
+ of protection resources allows the operator to delay the disruption
+ of service caused by the switchover until periods of lighter traffic.
+ The switchover would need to be performed via an explicit operator
+ command, unless the protection resources are preempted by a higher-
+ priority fault. Hence, both automatic and manual revertive behaviors
+ MUST be supported for hard preemption in an SMP domain. Normally,
+ the network should revert to use of the working path resources in
+ order to clear the protection resources for protection of other path
+ triggers. However, the protocol MUST support non-revertive
+ configurations.
+
+5.5. Protection Switching Time
+
+ Protection switching time refers to the transfer time (Tt) defined in
+ [G.808.1] and recovery switching time defined in [RFC4427], and is
+ defined as the interval after a switching trigger is identified until
+ the traffic begins to be transmitted on the protection path. This
+
+
+
+Weingarten, et al. Informational [Page 11]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ time does not include the time needed to initiate the protection
+ switching process after a failure occurred, and the time needed to
+ complete preemption of existing traffic on the shared segments as
+ described in Section 4.2. The time needed to initiate the protection
+ switching process, which is known as detection time or correlation
+ time in [RFC4427], is related to the OAM or management process, but
+ the time needed to complete preemption is related to the actions
+ within an SMP domain. Support for a protection switching time of
+ 50 ms is dependent upon the initial switchover to the protection
+ path, but the preemption time SHOULD also be taken into account to
+ minimize total service interruption time.
+
+ When triggered, protection switching action SHOULD be initiated
+ immediately to minimize service interruption time.
+
+5.6. Timers
+
+ In order to prevent multiple switching actions for a single switching
+ trigger, when there are multiple layers of networks, SMP SHOULD be
+ controlled by a hold-off timer that would allow lower-layer
+ mechanisms to complete their switching actions before invoking SMP
+ protection actions as described in [RFC6372].
+
+ In order to prevent an unstable recovering working path from invoking
+ intermittent switching operations, SMP SHOULD employ a
+ Wait-To-Restore timer during any reversion switching, as described in
+ [RFC6372].
+
+5.7. Communication Channel and Fate-Sharing
+
+ SMP SHOULD provide a communication channel, along the protection
+ path, between the endpoints of the protection path, to support fast
+ protection switching.
+
+ SMP in hard-preemption mode SHOULD include support for communicating
+ information to coordinate the use of the shared protection resources
+ among multiple working paths. The message encoding and communication
+ channel between the nodes of the shared protection resource and the
+ endpoints of the protection path are out of the scope of this
+ document.
+
+ Bidirectional protection switching SHOULD be supported in SMP.
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 12]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+6. Manageability Considerations
+
+ The network management architecture and requirements for MPLS-TP are
+ specified in [RFC5951]. They derive from the generic specifications
+ described in ITU-T G.7710/Y.1701 [G.7710] for transport technologies.
+ This document does not introduce any new manageability requirements
+ beyond those covered in those documents.
+
+7. Security Considerations
+
+ General security considerations for MPLS-TP are covered in [RFC5921].
+ The security considerations for the generic associated control
+ channel are described in [RFC5586].
+
+ Security considerations for any proposed solution should consider
+ exhaustion of resources related to preemption, especially by a
+ malicious actor as a threat vector against which the resources should
+ be protected. Protections should also be considered to prevent a
+ malicious actor from attempting to create an alternate path on which
+ to force traffic from a sensor/device, thereby enabling pervasive
+ monitoring [RFC7258].
+
+8. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997,
+ <http://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC3945] Mannie, E., Ed., "Generalized Multi-Protocol Label
+ Switching (GMPLS) Architecture", RFC 3945, October 2004,
+ <http://www.rfc-editor.org/info/rfc3945>.
+
+ [RFC4426] Lang, J., Ed., Rajagopalan, B., Ed., and D. Papadimitriou,
+ Ed., "Generalized Multi-Protocol Label Switching (GMPLS)
+ Recovery Functional Specification", RFC 4426, March 2006,
+ <http://www.rfc-editor.org/info/rfc4426>.
+
+ [RFC4427] Mannie, E., Ed., and D. Papadimitriou, Ed., "Recovery
+ (Protection and Restoration) Terminology for Generalized
+ Multi-Protocol Label Switching (GMPLS)", RFC 4427,
+ March 2006, <http://www.rfc-editor.org/info/rfc4427>.
+
+ [RFC4428] Papadimitriou, D., Ed., and E. Mannie, Ed., "Analysis of
+ Generalized Multi-Protocol Label Switching (GMPLS)-based
+ Recovery Mechanisms (including Protection and
+ Restoration)", RFC 4428, March 2006,
+ <http://www.rfc-editor.org/info/rfc4428>.
+
+
+
+
+Weingarten, et al. Informational [Page 13]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+ [RFC5586] Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant, Ed.,
+ "MPLS Generic Associated Channel", RFC 5586, June 2009,
+ <http://www.rfc-editor.org/info/rfc5586>.
+
+ [RFC5654] Niven-Jenkins, B., Ed., Brungard, D., Ed., Betts, M., Ed.,
+ Sprecher, N., and S. Ueno, "Requirements of an MPLS
+ Transport Profile", RFC 5654, September 2009,
+ <http://www.rfc-editor.org/info/rfc5654>.
+
+ [RFC5921] Bocci, M., Ed., Bryant, S., Ed., Frost, D., Ed., Levrau,
+ L., and L. Berger, "A Framework for MPLS in Transport
+ Networks", RFC 5921, July 2010,
+ <http://www.rfc-editor.org/info/rfc5921>.
+
+ [RFC5951] Lam, K., Mansfield, S., and E. Gray, "Network Management
+ Requirements for MPLS-based Transport Networks", RFC 5951,
+ September 2010, <http://www.rfc-editor.org/info/rfc5951>.
+
+ [RFC6372] Sprecher, N., Ed., and A. Farrel, Ed., "MPLS Transport
+ Profile (MPLS-TP) Survivability Framework", RFC 6372,
+ September 2011, <http://www.rfc-editor.org/info/rfc6372>.
+
+ [RFC6378] Weingarten, Y., Ed., Bryant, S., Osborne, E., Sprecher,
+ N., and A. Fulignoli, Ed., "MPLS Transport Profile
+ (MPLS-TP) Linear Protection", RFC 6378, October 2011,
+ <http://www.rfc-editor.org/info/rfc6378>.
+
+ [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an
+ Attack", BCP 188, RFC 7258, May 2014,
+ <http://www.rfc-editor.org/info/rfc7258>.
+
+ [RFC7271] Ryoo, J., Ed., Gray, E., Ed., van Helvoort, H.,
+ D'Alessandro, A., Cheung, T., and E. Osborne, "MPLS
+ Transport Profile (MPLS-TP) Linear Protection to Match the
+ Operational Expectations of Synchronous Digital Hierarchy,
+ Optical Transport Network, and Ethernet Transport Network
+ Operators", RFC 7271, June 2014,
+ <http://www.rfc-editor.org/info/rfc7271>.
+
+ [G.7710] International Telecommunication Union, "Common equipment
+ management function requirements", ITU-T Recommendation
+ G.7710/Y.1701, February 2012.
+
+ [G.808.1] International Telecommunication Union, "Generic Protection
+ Switching - Linear trail and subnetwork protection", ITU-T
+ Recommendation G.808.1, May 2014.
+
+
+
+
+
+Weingarten, et al. Informational [Page 14]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+Acknowledgements
+
+ This document is the outcome of discussions on Shared Mesh Protection
+ for MPLS-TP. The authors would like to thank all contributors to
+ these discussions, and especially Eric Osborne for facilitating them.
+
+ We would also like to thank Matt Hartley for working on the English
+ review and Lou Berger for his valuable comments and suggestions on
+ this document.
+
+Contributors
+
+ David Allan
+ Ericsson
+ EMail: david.i.allan@ericsson.com
+
+ Daniel King
+ Old Dog Consulting
+ EMail: daniel@olddog.co.uk
+
+ Taesik Cheung
+ ETRI
+ EMail: cts@etri.re.kr
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 15]
+
+RFC 7412 MPLS SMP Requirements December 2014
+
+
+Authors' Addresses
+
+ Yaacov Weingarten
+ 34 Hagefen St.
+ Karnei Shomron, 4485500
+ Israel
+
+ EMail: wyaacov@gmail.com
+
+
+ Sam Aldrin
+ Huawei Technologies
+ 2330 Central Expressway
+ Santa Clara, CA 95050
+ United States
+
+ EMail: aldrin.ietf@gmail.com
+
+
+ Ping Pan
+ Infinera
+
+ EMail: ppan@infinera.com
+
+
+ Jeong-dong Ryoo
+ ETRI
+ 218 Gajeongno
+ Yuseong, Daejeon 305-700
+ South Korea
+
+ EMail: ryoo@etri.re.kr
+
+
+ Greg Mirsky
+ Ericsson
+
+ EMail: gregory.mirsky@ericsson.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+Weingarten, et al. Informational [Page 16]
+