summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8184.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc8184.txt')
-rw-r--r--doc/rfc/rfc8184.txt619
1 files changed, 619 insertions, 0 deletions
diff --git a/doc/rfc/rfc8184.txt b/doc/rfc/rfc8184.txt
new file mode 100644
index 0000000..6d59102
--- /dev/null
+++ b/doc/rfc/rfc8184.txt
@@ -0,0 +1,619 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) W. Cheng
+Request for Comments: 8184 L. Wang
+Category: Informational H. Li
+ISSN: 2070-1721 China Mobile
+ S. Davari
+ Broadcom Corporation
+ J. Dong
+ Huawei Technologies
+ June 2017
+
+
+ Dual-Homing Protection for
+ MPLS and the MPLS Transport Profile (MPLS-TP) Pseudowires
+
+Abstract
+
+ This document describes a framework and several scenarios for a
+ pseudowire (PW) dual-homing local protection mechanism that avoids
+ unnecessary switchovers and does not depend on whether a control
+ plane is used. A Dual-Node Interconnection (DNI) PW is used to carry
+ traffic between the dual-homing Provider Edge (PE) nodes when a
+ failure occurs in one of the Attachment Circuits (AC) or PWs. This
+ PW dual-homing local protection mechanism is complementary to
+ existing PW protection mechanisms.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc8184.
+
+
+
+
+
+
+
+
+
+
+
+Cheng, et al. Informational [Page 1]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+Copyright Notice
+
+ Copyright (c) 2017 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Reference Models of Dual-Homing Local Protection . . . . . . 4
+ 2.1. PE Architecture . . . . . . . . . . . . . . . . . . . . . 4
+ 2.2. Dual-Homing Local Protection Reference Scenarios . . . . 5
+ 2.2.1. One-Side Dual-Homing Protection . . . . . . . . . . . 5
+ 2.2.2. Two-Side Dual-Homing Protection . . . . . . . . . . . 6
+ 3. Generic Dual-Homing PW Protection Mechanism . . . . . . . . . 8
+ 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8
+ 5. Security Considerations . . . . . . . . . . . . . . . . . . . 9
+ 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 9
+ 6.1. Normative References . . . . . . . . . . . . . . . . . . 9
+ 6.2. Informative References . . . . . . . . . . . . . . . . . 9
+ Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 10
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cheng, et al. Informational [Page 2]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+1. Introduction
+
+ [RFC6372] and [RFC6378] describe the framework and mechanism of MPLS
+ Transport Profile (MPLS-TP) linear protection, which can provide
+ protection for the MPLS Label Switched Path (LSP) or pseudowire (PW)
+ between the edge nodes. This mechanism does not protect against
+ failure of the Attachment Circuit (AC) or the Provider Edge (PE)
+ node. [RFC6718] and [RFC6870] describe the framework and mechanism
+ for PW redundancy to provide protection against AC or PE node
+ failure. The PW redundancy mechanism is based on the signaling of
+ the Label Distribution Protocol (LDP), which is applicable to PWs
+ with a dynamic control plane. [RFC8104] describes a fast local
+ repair mechanism for PW egress endpoint failures, which is based on
+ PW redundancy, upstream label assignment, and context-specific label
+ switching. The mechanism defined in [RFC8104] is only applicable to
+ PWs with a dynamic control plane.
+
+ There is a need to support a dual-homing local protection mechanism
+ that avoids unnecessary switches of the AC or PW and can be used
+ regardless of whether a control plane is used. In some scenarios,
+ such as mobile backhauling, the MPLS PWs are provisioned with dual-
+ homing topology in which at least the Customer Edge (CE) node on one
+ side is dual-homed to two PEs. If some fault occurs in the primary
+ AC, operators usually prefer to have the switchover only on the dual-
+ homing PE side and keep the working pseudowires unchanged if
+ possible. This is to avoid massive PW switchover in the mobile
+ backhaul network due to AC failure in the mobile core site; such
+ massive PW switchover may in turn lead to congestion caused by
+ migrating traffic away from the preferred paths of network planners.
+ Similarly, as multiple PWs share the physical AC in the mobile core
+ site, it is preferable to keep using the working AC when one working
+ PW fails in the Packet Switched Network (PSN) to potentially avoid
+ unnecessary switchover for other PWs. To meet the above
+ requirements, a fast dual-homing local PW protection mechanism is
+ needed to protect against the failures of an AC, the PE node, and the
+ PSN.
+
+ This document describes the framework and several typical scenarios
+ of PW dual-homing local protection. A Dual-Node Interconnection
+ (DNI) PW is used between the dual-homing PE nodes to carry traffic
+ when a failure occurs in the AC or PW side. In order for the dual-
+ homing PE nodes to determine the forwarding state of AC, PW, and
+ DNI-PW, necessary state exchange and coordination between the
+ dual-homing PEs is needed. The necessary mechanisms and protocol
+ extensions are defined in [RFC8185].
+
+
+
+
+
+
+Cheng, et al. Informational [Page 3]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+2. Reference Models of Dual-Homing Local Protection
+
+ This section shows the reference architecture of the dual-homing PW
+ local protection and the usage of the architecture in different
+ scenarios.
+
+2.1. PE Architecture
+
+ Figure 1 shows the PE architecture for dual-homing local protection.
+ This is based on the architecture in Figure 4a of [RFC3985]. In
+ addition to the AC and the service PW between the local and remote
+ PEs, a DNI-PW is used to connect the forwarders of the dual-homing
+ PEs. It can be used to forward traffic between the dual-homing PEs
+ when a failure occurs in the AC or service PW side. As [RFC3985]
+ specifies: "any required switching functionality is the
+ responsibility of a forwarder function". In this case, the forwarder
+ is responsible for switching the payloads between three entities: the
+ AC, the service PW, and the DNI-PW.
+
+ +----------------------------------------+
+ | Dual-Homing PE Device |
+ +----------------------------------------+
+ AC | | | Service PW
+ <------>o Forwarder + Service X<===========>
+ | | PW |
+ +--------+--------+ |
+ | DNI-PW | |
+ +--------X--------+----------------------+
+ ^
+ | DNI-PW
+ |
+ V
+ +--------X--------+----------------------+
+ | DNI-PW | |
+ +--------+--------+ | Service PW
+ AC | | Service X<===========>
+ <------>o Forwarder + PW |
+ | | |
+ +----------------------------------------+
+ | Dual-Homing PE Device |
+ +----------------------------------------+
+
+ Figure 1: PE Architecture for Dual-Homing Protection
+
+
+
+
+
+
+
+
+Cheng, et al. Informational [Page 4]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+2.2. Dual-Homing Local Protection Reference Scenarios
+
+2.2.1. One-Side Dual-Homing Protection
+
+ Figure 2 illustrates the network scenario of dual-homing PW local
+ protection where only one of the CEs is dual-homed to two PE nodes.
+ CE1 is dual-homed to PE1 and PE2, while CE2 is single-homed to PE3.
+ A DNI-PW is established between the dual-homing PEs, which is used to
+ bridge traffic when a failure occurs in the PSN or the AC side. A
+ dual-homing control mechanism enables the PEs and CE to determine
+ which AC should be used to carry traffic between CE1 and the PSN.
+ The necessary control mechanisms and protocol extensions are defined
+ in [RFC8185].
+
+ This scenario can protect against node failure of PE1 or PE2 or
+ failure of one of the ACs between CE1 and the dual-homing PEs. In
+ addition, dual-homing PW protection can protect against failure
+ occurring in the PSN that impacts the working PW; thus, it can be an
+ alternative solution of PSN tunnel protection mechanisms. This
+ topology can be used in mobile backhauling application scenarios.
+ For example, CE2 might be an equipment cell site such as a NodeB,
+ while CE1 is the shared Radio Network Controller (RNC). PE3
+ functions as an access-side MPLS device, while PE1 and PE2 function
+ as core-side MPLS devices.
+
+ |<--------------- Emulated Service --------------->|
+ | |
+ | |<------- Pseudowire ------>| |
+ | | | |
+ | | |<-- PSN Tunnels-->| | |
+ | V V V V |
+ V AC1 +----+ +----+ V
+ +-----+ | | PE1| | | +-----+
+ | |----------|........PW1.(working).......| | |
+ | | | | | | | |
+ | | +-+--+ | | AC3 | |
+ | | | | | | | |
+ | CE1 | DNI-PW | |PE3 |----------| CE2 |
+ | | | | | | |
+ | | +-+--+ | | | |
+ | | | | | | | |
+ | |----------|......PW2.(protection)......| | |
+ +-----+ | | PE2| | | +-----+
+ AC2 +----+ +----+
+
+
+ Figure 2: One-Side Dual-Homing PW Protection
+
+
+
+
+Cheng, et al. Informational [Page 5]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+ Consider the example where in normal state AC1 from CE1 to PE1 is
+ initially active and AC2 from CE1 to PE2 is initially standby. PW1
+ is configured as the working PW and PW2 is configured as the
+ protection PW.
+
+ When a failure occurs in AC1, then the state of AC2 changes to active
+ based on the AC dual-homing control mechanism. In order to keep the
+ switchover local and continue using PW1 for traffic forwarding as
+ preferred according to traffic planning, the forwarder on PE2 needs
+ to connect AC2 to the DNI-PW, and the forwarder on PE1 needs to
+ connect the DNI-PW to PW1. In this way, the failure in AC1 will not
+ impact the forwarding of the service PWs across the network. After
+ the switchover, traffic will go through the bidirectional path:
+ CE1-(AC2)-PE2-(DNI-PW)-PE1-(PW1)-PE3-(AC3)-CE2.
+
+ When a failure in the PSN affects the working PW (PW1), according to
+ PW protection mechanisms [RFC6378], traffic is switched onto the
+ protection PW (PW2) while the state of AC1 remains active. Then, the
+ forwarder on PE1 needs to connect AC1 to the DNI-PW, and the
+ forwarder on PE2 needs to connect the DNI-PW to PW2. In this way,
+ the failure in the PSN will not impact the state of the ACs. After
+ the switchover, traffic will go through the bidirectional path:
+ CE1-(AC1)-PE1-(DNI-PW)-PE2-(PW2)-PE3-(AC3)-CE2.
+
+ When a failure occurs in the working PE (PE1), it is equivalent to a
+ failure of the working AC, the working PW, and the DNI-PW. The state
+ of AC2 changes to active based on the AC dual-homing control
+ mechanism. In addition, according to the PW protection mechanism,
+ traffic is switched on to the protection PW "PW2". In this case, the
+ forwarder on PE2 needs to connect AC2 to PW2. After the switchover,
+ traffic will go through the bidirectional path:
+ CE1-(AC2)-PE2-(PW2)-PE3-(AC3)-CE2.
+
+2.2.2. Two-Side Dual-Homing Protection
+
+ Figure 3 illustrates the network scenario of dual-homing PW
+ protection where the CEs in both sides are dual-homed. CE1 is dual-
+ homed to PE1 and PE2, and CE2 is dual-homed to PE3 and PE4. A dual-
+ homing control mechanism enables the PEs and CEs to determine which
+ AC should be used to carry traffic between the CE and the PSN.
+ DNI-PWs are used between the dual-homing PEs on both sides. One
+ service PW is established between PE1 and PE3, and another service PW
+ is established between PE2 and PE4. The role of working and
+ protection PWs can be determined by either configuration or existing
+ signaling mechanisms.
+
+
+
+
+
+
+Cheng, et al. Informational [Page 6]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+ This scenario can protect against node failure on one of the dual-
+ homing PEs or failure on one of the ACs between the CEs and their
+ dual-homing PEs. Also, dual-homing PW protection can protect against
+ the occurrence of failure in the PSN that impacts one of the PWs;
+ thus, it can be used as an alternative solution of PSN tunnel
+ protection mechanisms. Note, this scenario is mainly used for
+ services requiring high availability as it requires redundancy of the
+ PEs and network utilization. In this case, CE1 and CE2 can be
+ regarded as service access points.
+
+ |<---------------- Emulated Service -------------->|
+ | |
+ | |<-------- Pseudowire ------>| |
+ | | | |
+ | | |<-- PSN Tunnels-->| | |
+ | V V V V |
+ V AC1 +----+ +----+ AC3 V
+ +-----+ | | ...|...PW1.(working)..|... | | +-----+
+ | |----------| PE1| | PE3|----------| |
+ | | +----+ +----+ | |
+ | | | | | |
+ | CE1 | DNI-PW1 | | DNI-PW2 | CE2 |
+ | | | | | |
+ | | +----+ +----+ | |
+ | | | | | | | |
+ | |----------| PE2| | PE4|--------- | |
+ +-----+ | | ...|.PW2.(protection).|... | | +-----+
+ AC2 +----+ +----+ AC4
+
+ Figure 3: Two-Side Dual-Homing PW Protection
+
+ Consider the example where in normal state AC1 between CE1 and PE1 is
+ initially active, AC2 between CE1 and PE2 is initially standby, AC3
+ between CE2 and PE3 is initially active and AC4 from CE2 to PE4 is
+ initially standby. PW1 is configured as the working PW and PW2 is
+ configured as the protection PW.
+
+ When a failure occurs in AC1, the state of AC2 changes to active
+ based on the AC dual-homing control mechanism. In order to keep the
+ switchover local and continue using PW1 for traffic forwarding, the
+ forwarder on PE2 needs to connect AC2 to the DNI-PW1, and the
+ forwarder on PE1 needs to connect DNI-PW1 with PW1. In this way,
+ failures in the AC side will not impact the forwarding of the service
+ PWs across the network. After the switchover, traffic will go
+ through the bidirectional path:
+ CE1-(AC2)-PE2-(DNI-PW1)-PE1-(PW1)-PE3-(AC3)-CE2.
+
+
+
+
+
+Cheng, et al. Informational [Page 7]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+ When a failure occurs in the working PW (PW1), according to the PW
+ protection mechanism [RFC6378], traffic needs to be switched onto the
+ protection PW "PW2". In order to keep the state of AC1 and AC3
+ unchanged, the forwarder on PE1 needs to connect AC1 to DNI-PW1, and
+ the forwarder on PE2 needs to connect DNI-PW1 to PW2. On the other
+ side, the forwarder of PE3 needs to connect AC3 to DNI-PW2, and the
+ forwarder on PE4 needs to connect PW2 to DNI-PW2. In this way, the
+ state of the ACs will not be impacted by the failure in the PSN.
+ After the switchover, traffic will go through the bidirectional path:
+ CE1-(AC1)-PE1-(DNI-PW1)-PE2-(PW2)-PE4-(DNI-PW2)-PE3-(AC3)-CE2.
+
+ When a failure occurs in the working PE (PE1), it is equivalent to
+ the failures of the working AC, the working PW, and the DNI-PW. The
+ state of AC2 changes to active based on the AC dual-homing control
+ mechanism. In addition, according to the PW protection mechanism,
+ traffic is switched on to the protection PW "PW2". In this case, the
+ forwarder on PE2 needs to connect AC2 to PW2, and the forwarder on
+ PE4 needs to connect PW2 to DNI-PW2. After the switchover, traffic
+ will go through the bidirectional path:
+ CE1-(AC2)-PE2-(PW2)-PE4-(DNI-PW2)-PE3-(AC3)-CE2.
+
+3. Generic Dual-Homing PW Protection Mechanism
+
+ As shown in the above scenarios, with the described dual-homing PW
+ protection, failures in the AC side will not impact the forwarding
+ behavior of the PWs in the PSN, and vice-versa.
+
+ In order for the dual-homing PEs to coordinate traffic forwarding
+ during failures, synchronization of the status information of the
+ involved entities and coordination of switchover between the dual-
+ homing PEs are needed. For PWs with a dynamic control plane, such
+ synchronization and coordination information can be achieved with a
+ dynamic protocol, such as that described in [RFC7275], possibly with
+ some extensions. For PWs that are manually configured without a
+ control plane, a new mechanism is needed to exchange the status
+ information and coordinate switchover between the dual-homing PEs,
+ e.g., over an embedded PW control channel. This is described in
+ [RFC8185].
+
+4. IANA Considerations
+
+ This document does not require any IANA action.
+
+
+
+
+
+
+
+
+
+Cheng, et al. Informational [Page 8]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+5. Security Considerations
+
+ The scenarios defined in this document do not affect the security
+ model as defined in [RFC3985].
+
+ With the proposed protection mechanism, the disruption of a dual-
+ homed AC, a component that is outside the core network, would have a
+ reduced impact on the traffic flows in the core network. This could
+ also avoid unnecessary congestion in the core network.
+
+ The security consideration of the DNI-PW is the same as for service
+ PWs in the data plane [RFC3985]. Security considerations for the
+ coordination/control mechanism will be addressed in the companion
+ document, RFC 8185, which defines the mechanism.
+
+6. References
+
+6.1. Normative References
+
+ [RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation
+ Edge-to-Edge (PWE3) Architecture", RFC 3985,
+ DOI 10.17487/RFC3985, March 2005,
+ <http://www.rfc-editor.org/info/rfc3985>.
+
+ [RFC8185] Cheng, W., Wang, L., Li, H., Dong, J., and A.
+ D'Alessandro, "Dual-Homing Coordination for MPLS Transport
+ Profile (MPLS-TP) Pseudowires Protection", RFC 8185,
+ DOI 10.17487/RFC8185, June 2017.
+
+6.2. Informative References
+
+ [RFC6372] Sprecher, N., Ed. and A. Farrel, Ed., "MPLS Transport
+ Profile (MPLS-TP) Survivability Framework", RFC 6372,
+ DOI 10.17487/RFC6372, September 2011,
+ <http://www.rfc-editor.org/info/rfc6372>.
+
+ [RFC6378] Weingarten, Y., Ed., Bryant, S., Osborne, E., Sprecher,
+ N., and A. Fulignoli, Ed., "MPLS Transport Profile (MPLS-
+ TP) Linear Protection", RFC 6378, DOI 10.17487/RFC6378,
+ October 2011, <http://www.rfc-editor.org/info/rfc6378>.
+
+ [RFC6718] Muley, P., Aissaoui, M., and M. Bocci, "Pseudowire
+ Redundancy", RFC 6718, DOI 10.17487/RFC6718, August 2012,
+ <http://www.rfc-editor.org/info/rfc6718>.
+
+
+
+
+
+
+
+Cheng, et al. Informational [Page 9]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+ [RFC6870] Muley, P., Ed. and M. Aissaoui, Ed., "Pseudowire
+ Preferential Forwarding Status Bit", RFC 6870,
+ DOI 10.17487/RFC6870, February 2013,
+ <http://www.rfc-editor.org/info/rfc6870>.
+
+ [RFC7275] Martini, L., Salam, S., Sajassi, A., Bocci, M.,
+ Matsushima, S., and T. Nadeau, "Inter-Chassis
+ Communication Protocol for Layer 2 Virtual Private Network
+ (L2VPN) Provider Edge (PE) Redundancy", RFC 7275,
+ DOI 10.17487/RFC7275, June 2014,
+ <http://www.rfc-editor.org/info/rfc7275>.
+
+ [RFC8104] Shen, Y., Aggarwal, R., Henderickx, W., and Y. Jiang,
+ "Pseudowire (PW) Endpoint Fast Failure Protection",
+ RFC 8104, DOI 10.17487/RFC8104, March 2017,
+ <http://www.rfc-editor.org/info/rfc8104>.
+
+Contributors
+
+ The following individuals substantially contributed to the content of
+ this document:
+
+ Kai Liu
+ Huawei Technologies
+ Email: alex.liukai@huawei.com
+
+
+ Alessandro D'Alessandro
+ Telecom Italia
+ Email: alessandro.dalessandro@telecomitalia.it
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cheng, et al. Informational [Page 10]
+
+RFC 8184 Dual-Homing PW Protection June 2017
+
+
+Authors' Addresses
+
+ Weiqiang Cheng
+ China Mobile
+ No.32 Xuanwumen West Street
+ Beijing 100053
+ China
+
+ Email: chengweiqiang@chinamobile.com
+
+
+ Lei Wang
+ China Mobile
+ No.32 Xuanwumen West Street
+ Beijing 100053
+ China
+
+ Email: Wangleiyj@chinamobile.com
+
+
+ Han Li
+ China Mobile
+ No.32 Xuanwumen West Street
+ Beijing 100053
+ China
+
+ Email: Lihan@chinamobile.com
+
+
+ Shahram Davari
+ Broadcom Corporation
+ 3151 Zanker Road
+ San Jose 95134-1933
+ United States of America
+
+ Email: davari@broadcom.com
+
+
+ Jie Dong
+ Huawei Technologies
+ Huawei Campus, No. 156 Beiqing Rd.
+ Beijing 100095
+ China
+
+ Email: jie.dong@huawei.com
+
+
+
+
+
+
+Cheng, et al. Informational [Page 11]
+