1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
|
Internet Engineering Task Force (IETF) Z. Ali, Ed.
Request for Comments: 8390 Cisco Systems
Updates: 4874 G. Swallow, Ed.
Category: Standards Track SETC
ISSN: 2070-1721 F. Zhang, Ed.
Huawei
D. Beller, Ed.
Nokia
July 2018
RSVP-TE Path Diversity Using Exclude Route
Abstract
RSVP-TE provides support for the communication of exclusion
information during Label Switched Path (LSP) setup. A typical LSP
diversity use case is for protection, where two LSPs should follow
different paths through the network in order to avoid single points
of failure, thus greatly improving service availability. This
document specifies an approach that can be used for network scenarios
where the full path(s) is not necessarily known by use of an abstract
identifier for the path. Three types of abstract identifiers are
specified: client based, Path Computation Element (PCE) based, and
network based. This document specifies two new diversity subobjects
for the RSVP eXclude Route Object (XRO) and the Explicit Exclusion
Route Subobject (EXRS).
For the protection use case, LSPs are typically created at a slow
rate and exist for a long time so that it is reasonable to assume
that a given (reference) path currently existing (with a well-known
identifier) will continue to exist and can be used as a reference
when creating the new diverse path. Re-routing of the existing
(reference) LSP, before the new path is established, is not
considered.
Ali, et al. Standards Track [Page 1]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc8390.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Ali, et al. Standards Track [Page 2]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Conventions Used in This Document . . . . . . . . . . . . 6
1.2. Terms and Abbreviations . . . . . . . . . . . . . . . . . 6
1.3. Client-Initiated Identifier . . . . . . . . . . . . . . . 7
1.4. PCE-Allocated Identifier . . . . . . . . . . . . . . . . 7
1.5. Network-Assigned Identifier . . . . . . . . . . . . . . . 9
2. RSVP-TE Signaling Extensions . . . . . . . . . . . . . . . . 10
2.1. Diversity XRO Subobject . . . . . . . . . . . . . . . . . 10
2.2. Diversity EXRS Subobject . . . . . . . . . . . . . . . . 16
2.3. Processing Rules for the Diversity XRO and EXRS
Subobjects . . . . . . . . . . . . . . . . . . . . . . . 16
3. Security Considerations . . . . . . . . . . . . . . . . . . . 20
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 21
4.1. New XRO Subobject Types . . . . . . . . . . . . . . . . . 21
4.2. New EXRS Subobject Types . . . . . . . . . . . . . . . . 21
4.3. New RSVP Error Sub-codes . . . . . . . . . . . . . . . . 22
5. References . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.1. Normative References . . . . . . . . . . . . . . . . . . 22
5.2. Informative References . . . . . . . . . . . . . . . . . 23
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 24
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 26
1. Introduction
Path diversity for multiple connections is a well-known operational
requirement. Diversity constraints ensure that Label Switched Paths
(LSPs) can be established without sharing network resources, thus
greatly reducing the probability of simultaneous connection failures.
The source node can compute diverse paths for LSPs when it has full
knowledge of the network topology and is permitted to signal an
Explicit Route Object (ERO). However, there are scenarios where
different nodes perform path computations, and therefore there is a
need for relevant diversity constraints to be signaled to those
nodes. These include (but are not limited to):
o LSPs with loose hops in the Explicit Route Object, e.g., inter-
domain LSPs; and
o Generalized Multiprotocol Label Switching (GMPLS) User-Network
Interface (UNI), where the core node may perform path computation
[RFC4208].
Ali, et al. Standards Track [Page 3]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
[RFC4874] introduced a means of specifying nodes and resources to be
excluded from a route using the eXclude Route Object (XRO) and
Explicit Exclusion Route Subobject (EXRS). It facilitates the
calculation of diverse paths for LSPs based on known properties of
those paths including addresses of links and nodes traversed and
Shared Risk Link Groups (SRLGs) of traversed links. Employing these
mechanisms requires that the source node that initiates signaling
knows the relevant properties of the path(s) from which diversity is
desired. However, there are circumstances under which this may not
be possible or desirable, including (but not limited to):
o Exclusion of a path that does not originate, terminate, or
traverse the source node of the diverse LSP, in which case the
addresses of links and SRLGs of the path from which diversity is
required are unknown to the source node.
o Exclusion of a path that is known to the source node of the
diverse LSP for which the node has incomplete or no path
information, e.g., due to operator policy. In this case, the
source node is aware of the existence of the reference path, but
the information required to construct an XRO object to guarantee
diversity from the reference path is not fully known. Inter-
domain and GMPLS overlay networks can impose such restrictions.
This is illustrated in Figure 1, where the overlay reference model
from [RFC4208] is shown.
Ali, et al. Standards Track [Page 4]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Overlay Overlay
Network +----------------------------------+ Network
+---------+ | | +---------+
| +----+ | | +-----+ +-----+ +-----+ | | +----+ |
| | | | UNI | | | | | | | | UNI | | | |
| -+ EN1+-+-----+--+ CN1 +----+ CN2 +----+ CN3 +---+-----+-+ EN3+- |
| | | | +--+--+ | | | | | | +---+-| | |
| +----+ | | | +--+--+ +--+--+ +--+--+ | | | +----+ |
+---------+ | | | | | | | +---------+
| | | | | | |
+---------+ | | +--+--+ | +--+--+ | | +---------+
| +----+ | | | | | +-------+ +-----+ | +----+ |
| | +-+--+ | | CN4 +---------------+ CN5 | | | | | |
| -+ EN2+-+-----+--+ | | +---+-----+-+ EN4+- |
| | | | UNI | +-----+ +-----+ | UNI | | | |
| +----+ | | | | +----+ |
+---------+ +----------------------------------+ +---------+
Overlay Core Network Overlay
Network Network
Legend: EN - Edge Node
CN - Core Node
Figure 1: Overlay Reference Model [RFC4208]
Figure 1 depicts two types of UNI connectivity: single-homed and
dual-homed ENs (which also applies to higher-order multihomed
connectivity). Single-homed EN devices are connected to a single CN
device via a single UNI link. This single UNI link may constitute a
single point of failure. UNI connection between EN1 and CN1 is an
example of singled-homed UNI connectivity.
Such a single point of failure can be avoided when the EN device is
connected to two different CN devices, as depicted for EN2 in
Figure 1. For the dual-homing case, it is possible to establish two
different UNI connections from the same source EN device to the same
destination EN device. For example, two connections from EN2 to EN3
may use the two UNI links EN2-CN1 and EN2-CN4. To avoid single
points of failure within the provider network, it is necessary to
also ensure path (LSP) diversity within the core network.
In a network providing a set of UNI interfaces between ENs and CNs
such as that shown in Figure 1, the CNs typically perform path
computation. Information sharing across the UNI boundary is
restricted based on the policy rules imposed by the core network.
Typically, the core network topology information as well as LSP path
information is not exposed to the ENs. In the network shown in
Figure 1, consider a use case where an LSP from EN2 to EN4 needs to
be SRLG diverse from an LSP from EN1 to EN3. In this case, EN2 may
Ali, et al. Standards Track [Page 5]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
not know SRLG attributes of the EN1-EN3 LSP and hence cannot
construct an XRO to exclude these SRLGs. In this example, EN2 cannot
use the procedures described in [RFC4874]. Similarly, an LSP from
EN2 to EN3 traversing CN1 needs to be diverse from an LSP from EN2 to
EN3 going via CN4. Again, in this case, exclusions based on
[RFC4874] cannot be used.
This document addresses these diversity requirements by introducing
an approach of excluding the path taken by these particular LSP(s).
Each reference LSP or route from which diversity is required is
identified by an abstract "identifier". The type of identifier to
use is highly dependent on the core network operator's networking
deployment scenario; it could be client initiated (provided by the
EN), provided by a PCE, or allocated by the (core) network. This
document defines three different types of identifiers corresponding
to these three cases: a client-initiated identifier, a PCE-allocated
identifier, and an identifier allocated by the CN ingress node
(UNI-N), i.e., a network-assigned identifier.
1.1. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
1.2. Terms and Abbreviations
Diverse LSP: A diverse Label Switched Path (LSP) is an LSP that has
a path that does not have any link or SRLG in common with the path
of a given LSP. Diverse LSPs are meaningful in the context of
protection or restoration.
ERO: Explicit Route Object as defined in [RFC3209].
EXRS: Explicit Exclusion Route Subobject as defined in [RFC4874].
SRLG: Shared Risk Link Group as defined in [RFC4202].
Reference Path: The reference path is the path of an existing LSP to
which the path of a diverse LSP shall be diverse.
XRO: eXclude Route Object as defined in [RFC4874].
Ali, et al. Standards Track [Page 6]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
1.3. Client-Initiated Identifier
The following fields MUST be used to represent the client-initiated
identifier: IPv4/IPv6 tunnel sender address, IPv4/IPv6 tunnel
endpoint address, Tunnel ID, and Extended Tunnel ID. Based on local
policy, the client MAY also include the LSP ID to identify a specific
LSP within the tunnel. These fields are defined in Sections 4.6.1.1
and 4.6.2.1 of [RFC3209].
The usage of the client-initiated identifier is illustrated by
Figure 1. Suppose an LSP from EN2 to EN4 needs to be diverse with
respect to an LSP from EN1 to EN3.
The LSP identifier of the EN1-EN3 LSP is LSP-IDENTIFIER1, where LSP-
IDENTIFIER1 is defined by the tuple
(tunnel-id = T1,
LSP ID = L1,
source address = EN1.RID (Route Identifier),
destination address = EN3.RID,
extended tunnel-id = EN1.RID).
Similarly, the LSP identifier of the EN2-EN4 LSP is LSP-IDENTIFIER2,
where LSP-IDENTIFIER2 is defined by the tuple
(tunnel-id = T2,
LSP ID = L2,
source address = EN2.RID,
destination address = EN4.RID,
extended tunnel-id = EN2.RID).
The EN1-EN3 LSP is signaled with an exclusion requirement from LSP-
IDENTIFIER2, and the EN2-EN4 LSP is signaled with an exclusion
requirement from LSP-IDENTIFIER1. In order to maintain diversity
between these two connections within the core network, the core
network SHOULD implement crankback signaling extensions as defined in
[RFC4920]. Note that crankback signaling is known to lead to slower
setup times and suboptimal paths under some circumstances as
described by [RFC4920].
1.4. PCE-Allocated Identifier
In scenarios where a PCE is deployed and used to perform path
computation, typically the ingress node of the core network (e.g.,
node CN1 in Figure 1) could consult a PCE to allocate identifiers,
which are used to signal path diversity constraints. In other
deployment scenarios, a PCE is deployed at a network node(s) or it is
Ali, et al. Standards Track [Page 7]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
part of a Network Management System (NMS). In all these cases, the
PCE is consulted and the Path Key, as defined in [RFC5520], can be
used in RSVP signaling as the identifier to ensure diversity.
An example of specifying LSP diversity using a Path Key is shown in
Figure 2, where a simple network with two domains is shown. It is
desired to set up a pair of path-disjoint LSPs from the source in
Domain 1 to the destination in Domain 2, but the domains keep strict
confidentiality about all path and topology information.
The first LSP is signaled by the source with ERO {A, B, loose Dst}
and is set up with the path {Src, A, B, U, V, W, Dst}. However, when
sending the Record Route Object (RRO) out of Domain 2, node U would
normally strip the path and replace it with a loose hop to the
destination. With this limited information, the source is unable to
include enough detail in the ERO of the second LSP to avoid it
taking, for example, the path {Src, C, D, X, V, W, Dst} for path-
disjointness.
--------------------- -----------------------------
| Domain 1 | | Domain 2 |
| | | |
| --- --- | | --- --- --- |
| | A |--| B |--+--+--| U |--| V |---| W | |
| / --- --- | | --- --- --- \ |
| ---/ | | / / \--- |
| |Src| | | / / |Dst| |
| ---\ | | / / /--- |
| \ --- --- | | --- / --- / --- / |
| | C |--| D |--+--+--| X |---| Y |--| Z | |
| --- --- | | --- --- --- |
| | | |
--------------------- -----------------------------
Figure 2: A Simple Multi-domain Network
In order to support LSP diversity, node U consults the PCE and
replaces the path segment {U, V, W} in the RRO with a Path Key
subobject. The PCE function assigns an "identifier" and puts it into
the Path Key field of the Path Key subobject. The PCE ID in the
message indicates that this replacement operation was performed by
node U.
With this additional information, the source node is able to signal
the subsequent LSPs with the ERO set to {C, D, exclude Path Key
(signaled in the EXRS RSVP subobject), loose Dst}. When the
signaling message reaches node X, it can consult the PCE function
associated with node U to expand the Path Key in order to calculate a
Ali, et al. Standards Track [Page 8]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
path that is diverse with respect to the first LSP. Alternatively,
the source node could use an ERO of {C, D, loose Dst} and include an
XRO containing the Path Key.
This mechanism can work with all the Path Key resolution mechanisms,
as detailed in Section 3.1 of [RFC5553]. A PCE, co-located or not,
may be used to resolve the Path Key, but the node (i.e., a Label
Switching Router (LSR)) can also use the Path Key information to
index a path segment previously supplied to it by the entity that
originated the Path Key (for example, the LSR that inserted the Path
Key in the RRO or a management system).
1.5. Network-Assigned Identifier
There are scenarios in which the network provides diversity-related
information for a service that allows the client device to include
this information in the signaling message. If the Shared Risk Link
Group (SRLG) identifier information is both available and shareable
(by policy) with the ENs, the procedure defined in [RFC8001] can be
used to collect SRLG identifiers associated with an LSP (LSP1). When
a second LSP (LSP2) needs to be diverse with respect to LSP1, the EN
constructing the RSVP signaling message for setting up LSP2 can
insert the SRLG identifiers associated with LSP1 as diversity
constraints into the XRO using the procedure described in [RFC4874].
However, if the core network SRLG identifiers are either not
available or not shareable with the ENs based on policies enforced by
the core network, existing mechanisms cannot be used.
In this document, a signaling mechanism is defined where information
signaled to the CN via the UNI does not require shared knowledge of
core network SRLG information. For this purpose, the concept of a
Path Affinity Set (PAS) is defined for abstracting SRLG information.
The motive behind the introduction of the PAS is to minimize the
exchange of diversity information between the core network (CNs) and
the client devices (ENs). The PAS contains an abstract SRLG
identifier associated with a given path rather than a detailed SRLG
list. The PAS is a single identifier that can be used to request
diversity and associate diversity. The means by which the processing
node determines the path corresponding to the PAS is beyond the scope
of this document.
A CN on the core network boundary interprets the specific PAS
identifier (e.g., "123") as meaning to exclude the core network SRLG
information (or equivalent) that has been allocated by LSPs
associated with this PAS identifier value. For example, if a path
exists for the LSP with the PAS identifier "123", the CN would use
local knowledge of the core network SRLGs associated with the LSPs
tagged with PAS attribute "123" and use those SRLGs as constraints
Ali, et al. Standards Track [Page 9]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
for path computation. If a PAS identifier is used as an exclusion
identifier in the connection request, the CN (UNI-N) in the core
network is assumed to be able to determine the existing core network
SRLG information and calculate a path that meets the determined
diversity constraints.
When a CN satisfies a connection setup for an SRLG-diverse signaled
path, the CN may optionally record the core network SRLG information
for that connection in terms of CN-based parameters and associate
that with the EN addresses in the Path message. Specifically, for
Layer 1 Virtual Private Networks (L1VPNs), Port Information Tables
(PITs) [RFC5251] can be leveraged to translate between client (EN)
addresses and core network addresses.
The means to distribute the PAS information within the core network
is beyond the scope of this document. For example, the PAS and the
associated SRLG information can be distributed within the core
network by an Interior Gateway Protocol (IGP) or by other means such
as configuration. Regardless of means used to distribute the PAS
information, the information is kept inside the core network and is
not shared with the overlay network (see Figure 1).
2. RSVP-TE Signaling Extensions
This section describes the signaling extensions required to address
the aforementioned requirements and use cases.
2.1. Diversity XRO Subobject
New Diversity XRO subobjects are defined below for the IPv4 and IPv6
address families. Most of the fields in the IPv4 and IPv6 Diversity
XRO subobjects are common and are described following the definition
of the two subobjects.
The IPv4 Diversity XRO subobject is defined as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|L| XRO Type | Length |DI Type|A-Flags|E-Flags| Resvd |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv4 Diversity Identifier Source Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Diversity Identifier Value |
// ... //
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Ali, et al. Standards Track [Page 10]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Similarly, the IPv6 Diversity XRO subobject is defined as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|L| XRO Type | Length |DI Type|A-Flags|E-Flags| Resvd |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Diversity Identifier Source Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Diversity Identifier Source Address (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Diversity Identifier Source Address (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Diversity Identifier Source Address (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Diversity Identifier Value |
// ... //
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
L:
The L flag is used in the same way as for the XRO subobjects
defined in [RFC4874], that is:
0 indicates that the diversity constraints MUST be satisfied, and
1 indicates that the diversity constraints SHOULD be satisfied.
XRO Type:
The value is set to 38 for the IPv4 Diversity XRO subobject. The
value is set to 39 for the IPv6 Diversity XRO subobject.
Length:
Per [RFC4874], the Length contains the total length of the
IPv4/IPv6 subobject in bytes, including the XRO Type and Length
fields. The Length is variable, depending on the Diversity
Identifier Value.
Ali, et al. Standards Track [Page 11]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Diversity Identifier Type (DI Type):
Diversity Identifier Type (DI Type) indicates the way the
reference LSP(s) or route(s) with which diversity is required is
identified in the IPv4/IPv6 Diversity subobjects. The following
three DI Type values are defined in this document:
DI Type value Definition
------------- --------------------------------
1 Client-Initiated Identifier
2 PCE-Allocated Identifier
3 Network-Assigned Identifier
Attribute Flags (A-Flags):
The Attribute Flags (A-Flags) are used to communicate desirable
attributes of the LSP being signaled in the IPv4/IPv6 Diversity
subobjects. Each flag acts independently. Any combination of
flags is permitted.
0x01 = Destination node exception
Indicates that the exclusion does not apply to the destination
node of the LSP being signaled.
0x02 = Processing node exception
Indicates that the exclusion does not apply to the node(s)
performing ERO expansion for the LSP being signaled. An
ingress UNI-N node is an example of such a node.
0x04 = Penultimate node exception
Indicates that the penultimate node of the LSP being signaled
MAY be shared with the excluded path even when this violates
the exclusion flags. This flag is useful, for example, when an
EN is not dual homed (like EN4 in Figure 1, where all LSPs have
to go through CN5).
The "Penultimate node exception" flag is typically set when the
destination node is single homed (e.g., EN1 or EN4 in
Figure 2). In such a case, LSP diversity can only be
accomplished inside the core network up to the egress node and
the penultimate hop must be the same for the LSPs.
0x08 = LSP ID to be ignored
This flag is used to indicate tunnel-level exclusion.
Specifically, this flag is used to indicate that if the
diversity identifier contains an LSP ID field, then the LSP ID
is to be ignored, and the exclusion applies to any LSP matching
the rest of the diversity identifier.
Ali, et al. Standards Track [Page 12]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Exclusion Flags (E-Flags):
The Exclusion Flags are used to communicate the desired type(s) of
exclusion requested in the IPv4/IPv6 Diversity subobjects. The
following flags are defined. Any combination of these flags is
permitted. Please note that the exclusion specified by these
flags may be modified by the value of the A-Flags. For example,
the node exclusion flag is ignored for the penultimate node if the
"Penultimate node exception" flag of the A-Flags is set.
0x01 = SRLG exclusion
Indicates that the path of the LSP being signaled is requested
to be SRLG disjoint with respect to the excluded path specified
by the IPv4/IPv6 Diversity XRO subobject.
0x02 = Node exclusion
Indicates that the path of the LSP being signaled is requested
to be "node diverse" from the excluded path specified by the
IPv4/IPv6 Diversity XRO subobject.
0x04 = Link exclusion
Indicates that the path of the LSP being signaled is requested
to be "link diverse" from the path specified by the IPv4/IPv6
Diversity XRO subobject.
0x08 = Reserved
This flag is reserved. It MUST be set to zero on transmission
and MUST be ignored on receipt for both IPv4/IPv6 Diversity XRO
subobjects.
Resvd:
This field is reserved. It MUST be set to zero on transmission
and MUST be ignored on receipt for both IPv4/IPv6 Diversity XRO
subobjects.
IPv4/IPv6 Diversity Identifier Source Address:
This field MUST be set to the IPv4/IPv6 address of the node that
assigns the diversity identifier. Depending on the Diversity
Identifier Type, the diversity identifier source may be a client
node, PCE entity, or network node. Specifically:
* When the Diversity Identifier Type is set to the "Client-
Initiated Identifier", the value MUST be set to IPv4/IPv6
tunnel sender address of the reference LSP against which
diversity is desired. The IPv4/IPv6 tunnel sender address is
as defined in [RFC3209].
Ali, et al. Standards Track [Page 13]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
* When the Diversity Identifier Type is set to "PCE-Allocated
Identifier", the value MUST be set to the IPv4/IPv6 address of
the node that assigned the Path Key identifier and that can
return an expansion of the Path Key or use the Path Key as
exclusion in a path computation. The Path Key is defined in
[RFC5553]. The PCE ID is carried in the Diversity Identifier
Source Address field of the subobject.
* When the Diversity Identifier Type is set to "Network-Assigned
Identifier", the value MUST be set to the IPv4/IPv6 address of
the node allocating the Path Affinity Set (PAS).
Diversity Identifier Value: Encoding for this field depends on the
Diversity Identifier Type, as defined in the following.
When the Diversity Identifier Type is set to "Client-Initiated
Identifier" in the IPv4 Diversity XRO subobject, the Diversity
Identifier Value MUST be encoded as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv4 Tunnel Endpoint Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Must Be Zero | Tunnel ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Tunnel ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Must Be Zero | LSP ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The IPv4 Tunnel Endpoint Address, Tunnel ID, Extended Tunnel ID,
and LSP ID are as defined in [RFC3209].
Ali, et al. Standards Track [Page 14]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
When the Diversity Identifier Type is set to "Client-Initiated
Identifier" in the IPv6 Diversity XRO subobject, the Diversity
Identifier Value MUST be encoded as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Tunnel Endpoint Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Tunnel Endpoint Address (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Tunnel Endpoint Address (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 Tunnel Endpoint Address (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Must Be Zero | Tunnel ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Tunnel ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Tunnel ID (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Tunnel ID (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Tunnel ID (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Must Be Zero | LSP ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The IPv6 Tunnel Endpoint Address, Tunnel ID, IPv6 Extended Tunnel
ID, and LSP ID are as defined in [RFC3209].
When the Diversity Identifier Type is set to "PCE-Allocated
Identifier" in the IPv4 or IPv6 Diversity XRO subobject, the
Diversity Identifier Value MUST be encoded as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Must Be Zero | Path Key |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Path Key is defined in [RFC5553].
Ali, et al. Standards Track [Page 15]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
When the Diversity Identifier Type is set to "Network-Assigned
Identifier" in the IPv4 or IPv6 Diversity XRO subobject, the
Diversity Identifier Value MUST be encoded as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Path Affinity Set (PAS) Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Path Affinity Set (PAS) Identifier field is a 32-bit value
that is scoped by (i.e., is only meaningful when used in
combination with) the Diversity Identifier Source Address field.
There are no restrictions on how a node selects a PAS identifier
value. Section 1.3 defines the PAS term and provides context on
how values may be selected.
2.2. Diversity EXRS Subobject
[RFC4874] defines the EXRS ERO subobject. An EXRS is used to
identify abstract nodes or resources that must not or should not be
used on the path between two inclusive abstract nodes or resources in
the explicit route. An EXRS contains one or more subobjects of its
own, called EXRS subobjects [RFC4874].
An EXRS MAY include a Diversity subobject as specified in this
document. The same type values 38 and 39 MUST be used.
2.3. Processing Rules for the Diversity XRO and EXRS Subobjects
The procedure defined in [RFC4874] for processing the XRO and EXRS is
not changed by this document. The processing rules for the Diversity
XRO and EXRS subobjects are similar unless the differences are
explicitly described. Similarly, IPv4 and IPv6 Diversity XRO
subobjects and IPv4 and IPv6 Diversity EXRS subobjects follow the
same processing rules.
If the processing node cannot recognize the Diversity XRO/EXRS
subobject, the node is expected to follow the procedure defined in
[RFC4874].
An XRO/EXRS object MAY contain multiple Diversity subobjects of the
same DI Type. For example, in order to exclude multiple Path Keys, a
node MAY include multiple Diversity XRO subobjects, each with a
different Path Key. Similarly, in order to exclude the routes taken
by multiple LSPs, a node MAY include multiple Diversity XRO/EXRS
subobjects, each with a different LSP identifier. Likewise, to
exclude multiple PAS identifiers, a node MAY include multiple
Ali, et al. Standards Track [Page 16]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Diversity XRO/EXRS subobjects, each with a different PAS identifier.
However, all Diversity subobjects in an XRO/EXRS MUST contain the
same Diversity Identifier Type. If a Path message contains an XRO/
EXRS with multiple Diversity subobjects of different DI Types, the
processing node MUST return a PathErr with the error code "Routing
Problem" (24) and error sub-code "XRO/EXRS Too Complex" (68/69).
If the processing node recognizes the Diversity XRO/EXRS subobject
but does not support the DI Type, it MUST return a PathErr with the
error code "Routing Problem" (24) and error sub-code "Unsupported
Diversity Identifier Type" (36).
In the case of DI Type "Client-Initiated Identifier", all nodes along
the path SHOULD process the diversity information signaled in the
XRO/EXRS Diversity subobjects to verify that the signaled diversity
constraint is satisfied. If a diversity violation is detected,
crankback signaling MAY be initiated.
In the case of DI Type "PCE-Allocated Identifier" and "Network-
Assigned Identifier", the nodes in the domain that perform path
computation SHOULD process the diversity information signaled in the
XRO/EXRS Diversity subobjects as follows. In the PCE case, the
ingress node of a domain sends a path computation request for a path
from ingress node to egress node, including diversity constraints to
a PCE. Or, in the PAS case, the ingress node is capable of
calculating the path for the new LSP from ingress node to the egress
node, taking the diversity constraints into account. The calculated
path is then carried in the Explicit Route Object (ERO). Hence, the
transit nodes in a domain and the domain egress node SHOULD NOT
process the signaled diversity information unless path computation is
performed.
While processing the EXRS object, if a loose hop expansion results in
the creation of another loose hop in the outgoing ERO, the processing
node MAY include the EXRS in the newly created loose hop for further
processing by downstream nodes.
The A-Flags affect the processing of the Diversity XRO/EXRS subobject
as follows:
o When the "Processing node exception" flag is set, the exclusion
MUST be ignored for the node processing the XRO or EXRS subobject.
o When the "Destination node exception" flag is set, the exclusion
MUST be ignored for the destination node in processing the XRO
subobject. The destination node exception for the EXRS subobject
applies to the explicit node identified by the ERO subobject that
Ali, et al. Standards Track [Page 17]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
identifies the next abstract node. When the "Destination node
exception" flag is set in the EXRS subobject, exclusion MUST be
ignored for said node (i.e., the next abstract node).
o When the "Penultimate node exception" flag is set in the XRO
subobject, the exclusion MUST be ignored for the penultimate node
on the path of the LSP being established.
The penultimate node exception for the EXRS subobject applies to
the node before the explicit node identified by the ERO subobject
that identifies the next abstract node. When the "Penultimate
node exception" flag is set in the EXRS subobject, the exclusion
MUST be ignored for said node (i.e., the node before the next
abstract node).
If the L-flag of the Diversity XRO subobject or Diversity EXRS
subobject is not set, the processing node proceeds as follows.
o If the Diversity Identifier Type is set to "Client-Initiated
Identifier", the processing node MUST ensure that the path
calculated/expanded for the signaled LSP is diverse from the route
taken by the LSP identified in the Diversity Identifier Value
field.
o If the Diversity Identifier Type is set to "PCE-Allocated
Identifier", the processing node MUST ensure that any path
calculated for the signaled LSP is diverse from the route
identified by the Path Key. The processing node MAY use the PCE
identified by the Diversity Identifier Source Address in the
subobject for route computation. The processing node MAY use the
Path Key resolution mechanisms described in [RFC5553].
o If the Diversity Identifier Type is set to "Network-Assigned
Identifier", the processing node MUST ensure that the path
calculated for the signaled LSP is diverse with respect to the
values associated with the PAS Identifier and Diversity Identifier
Source Address fields.
o Regardless of whether the path computation is performed locally or
at a remote node (e.g., PCE), the processing node MUST ensure that
any path calculated for the signaled LSP is diverse from the
requested Exclusion Flags.
o If the excluded path referenced in the XRO subobject is unknown to
the processing node, the processing node SHOULD ignore the
Diversity XRO subobject and SHOULD proceed with the signaling
request. After sending the Resv for the signaled LSP, the
Ali, et al. Standards Track [Page 18]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
processing node MUST return a PathErr with the error code "Notify
Error" (25) and error sub-code "Route of XRO LSP identifier
unknown" (14) for the signaled LSP.
o If the processing node fails to find a path that meets the
requested constraint, the processing node MUST return a PathErr
with the error code "Routing Problem" (24) and error sub-code
"Route blocked by Exclude Route" (67).
If the L-flag of the Diversity XRO subobject or Diversity EXRS
subobject is set, the processing node proceeds as follows:
o If the Diversity Identifier Type is set to "Client-Initiated
Identifier", the processing node SHOULD ensure that the path
calculated/expended for the signaled LSP is diverse from the route
taken by the LSP identified in the Diversity Identifier Value
field.
o If the Diversity Identifier Type is set to "PCE-Allocated
Identifier", the processing node SHOULD ensure that the path
calculated for the signaled LSP is diverse from the route
identified by the Path Key.
o If the Diversity Identifier Type is set to "Network-Assigned
Identifier", the processing node SHOULD ensure that the path
calculated for the signaled LSP is diverse with respect to the
values associated with the PAS Identifier and Diversity Identifier
Source Address fields.
o If the processing node fails to find a path that meets the
requested constraint, it SHOULD proceed with signaling using a
suitable path that meets the constraint as far as possible. After
sending the Resv for the signaled LSP, it MUST return a PathErr
message with error code "Notify Error" (25) and error sub-code
"Failed to satisfy Exclude Route" (15) to the source node.
If, subsequent to the initial signaling of a diverse LSP, an excluded
path referenced in the XRO subobject becomes known to the processing
node or a change in the excluded path becomes known to the processing
node, the processing node MUST re-evaluate the exclusion and
diversity constraints requested by the diverse LSP to determine
whether they are still satisfied.
o In the case where the L-flag was not set in the initial setup
message, the exclusion and diversity constraints were satisfied at
the time of the initial setup. If the processing node re-
evaluating the exclusion and diversity constraints for a diverse
LSP detects that the exclusion and diversity constraints are no
Ali, et al. Standards Track [Page 19]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
longer met, it MUST send a PathErr message for the diverse LSP
with the error code "Routing Problem" (24) and error sub-code
"Route blocked by Exclude Route" (67). The Path_State_Removed
(PSR) flag [RFC3473] MUST NOT be set. A source node receiving a
PathErr message with this error code and sub-code combination
SHOULD take appropriate actions and move the diverse LSP to a new
path that meets the original constraints.
o In the case where the L-flag was set in the initial setup message,
the exclusion and diversity constraints may or may not be
satisfied at any given time. If the exclusion constraints for a
diverse LSP were satisfied before, and if the processing node re-
evaluating the exclusion and diversity constraints for a diverse
LSP detects that exclusion and diversity constraints are no longer
met, it MUST send a PathErr message for the diverse LSP with the
error code "Notify Error" (25) and error sub-code "Failed to
satisfy Exclude Route" (15). The PSR flag MUST NOT be set. The
source node MAY take no consequent action and keep the LSP along
the path that does not meet the original constraints. Similarly,
if the exclusion constraints for a diverse LSP were not satisfied
before, and if the processing node re-evaluating the exclusion and
diversity constraints for a diverse LSP detects that the exclusion
constraints are met, it MUST send a PathErr message for the
diverse LSP with the error code "Notify Error" (25) and a new
error sub-code "Compliant path exists" (16). The PSR flag MUST
NOT be set. A source node receiving a PathErr message with this
error code and sub-code combination MAY move the diverse LSP to a
new path that meets the original constraints.
3. Security Considerations
This document does not introduce any additional security issues in
addition to those identified in [RFC5920], [RFC2205], [RFC3209],
[RFC3473], [RFC2747], [RFC4874], [RFC5520], and [RFC5553].
The diversity mechanisms defined in this document rely on the new
diversity subobject that is carried in the XRO or EXRS, respectively.
In Section 7 of [RFC4874], it is noted that some administrative
boundaries may remove the XRO due to security concerns on explicit
route information exchange. However, when the diversity subobjects
specified in this document are used, removing at the administrative
boundary an XRO containing these diversity subobjects would result in
the request for diversity being dropped at the boundary, and path
computation would be unlikely to produce the requested diverse path.
As such, diversity subobjects MUST be retained in an XRO crossing an
administrative boundary, even if other subobjects are removed. This
Ali, et al. Standards Track [Page 20]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
retention would be based on operator policy. The use of diversity
subobjects is based on mutual agreement. This avoids the need to
share the identity of network resources when supporting diversity.
4. IANA Considerations
IANA has assigned new values defined in this document and summarized
in this section.
4.1. New XRO Subobject Types
In the IANA registry for RSVP parameters, under "Class Names, Class
Numbers, and Class Types", this document defines two new subobjects
for the EXCLUDE_ROUTE object [RFC4874], C-Type 1 (see "Class Types or
C-Types - 232 EXCLUDE_ROUTE" on <https://www.iana.org/assignments/
rsvp-parameters>).
+----------------+-------+
| Description | Value |
+----------------+-------+
| IPv4 Diversity | 38 |
| IPv6 Diversity | 39 |
+----------------+-------+
4.2. New EXRS Subobject Types
The Diversity XRO subobjects are also defined as new EXRS subobjects
(see "Class Types or C-Types - 20 EXPLICIT_ROUTE" on
<https://www.iana.org/assignments/rsvp-parameters>). The same
numeric values have been assigned:
+----------------+-------+
| Description | Value |
+----------------+-------+
| IPv4 Diversity | 38 |
| IPv6 Diversity | 39 |
+----------------+-------+
Ali, et al. Standards Track [Page 21]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
4.3. New RSVP Error Sub-codes
In the IANA registry for RSVP parameters, under "Error Codes and
Globally Defined Error Value Sub-Codes", for Error Code "Routing
Problem" (24) (see [RFC3209]), the following sub-codes are defined
(see "Sub-Codes - 24 Routing Problem" on
<https://www.iana.org/assignments/rsvp-parameters>).
+-------+---------------------------------------+-----------+
| Value | Description | Reference |
+-------+---------------------------------------+-----------+
| 36 | Unsupported Diversity Identifier Type | RFC 8390 |
+-------+---------------------------------------+-----------+
For Error Code "Notify Error" (25) (see [RFC3209]), the following
sub-codes are defined (see "Sub-Codes - 25 Notify Error" on
<https://www.iana.org/assignments/rsvp-parameters>).
+-------+-------------------------------------+-----------+
| Value | Description | Reference |
+-------+-------------------------------------+-----------+
| 14 | Route of XRO LSP identifier unknown | RFC 8390 |
| 15 | Failed to satisfy Exclude Route | RFC 8390 |
| 16 | Compliant path exists | RFC 8390 |
+-------+-------------------------------------+-----------+
5. References
5.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP Cryptographic
Authentication", RFC 2747, DOI 10.17487/RFC2747, January
2000, <https://www.rfc-editor.org/info/rfc2747>.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001,
<https://www.rfc-editor.org/info/rfc3209>.
Ali, et al. Standards Track [Page 22]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
[RFC3473] Berger, L., Ed., "Generalized Multi-Protocol Label
Switching (GMPLS) Signaling Resource ReserVation Protocol-
Traffic Engineering (RSVP-TE) Extensions", RFC 3473,
DOI 10.17487/RFC3473, January 2003,
<https://www.rfc-editor.org/info/rfc3473>.
[RFC4202] Kompella, K., Ed. and Y. Rekhter, Ed., "Routing Extensions
in Support of Generalized Multi-Protocol Label Switching
(GMPLS)", RFC 4202, DOI 10.17487/RFC4202, October 2005,
<https://www.rfc-editor.org/info/rfc4202>.
[RFC4874] Lee, CY., Farrel, A., and S. De Cnodder, "Exclude Routes -
Extension to Resource ReserVation Protocol-Traffic
Engineering (RSVP-TE)", RFC 4874, DOI 10.17487/RFC4874,
April 2007, <https://www.rfc-editor.org/info/rfc4874>.
[RFC4920] Farrel, A., Ed., Satyanarayana, A., Iwata, A., Fujita, N.,
and G. Ash, "Crankback Signaling Extensions for MPLS and
GMPLS RSVP-TE", RFC 4920, DOI 10.17487/RFC4920, July 2007,
<https://www.rfc-editor.org/info/rfc4920>.
[RFC5553] Farrel, A., Ed., Bradford, R., and JP. Vasseur, "Resource
Reservation Protocol (RSVP) Extensions for Path Key
Support", RFC 5553, DOI 10.17487/RFC5553, May 2009,
<https://www.rfc-editor.org/info/rfc5553>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
5.2. Informative References
[RFC2205] Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S.
Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
Functional Specification", RFC 2205, DOI 10.17487/RFC2205,
September 1997, <https://www.rfc-editor.org/info/rfc2205>.
[RFC4208] Swallow, G., Drake, J., Ishimatsu, H., and Y. Rekhter,
"Generalized Multiprotocol Label Switching (GMPLS) User-
Network Interface (UNI): Resource ReserVation Protocol-
Traffic Engineering (RSVP-TE) Support for the Overlay
Model", RFC 4208, DOI 10.17487/RFC4208, October 2005,
<https://www.rfc-editor.org/info/rfc4208>.
[RFC5251] Fedyk, D., Ed., Rekhter, Y., Ed., Papadimitriou, D.,
Rabbat, R., and L. Berger, "Layer 1 VPN Basic Mode",
RFC 5251, DOI 10.17487/RFC5251, July 2008,
<https://www.rfc-editor.org/info/rfc5251>.
Ali, et al. Standards Track [Page 23]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
[RFC5520] Bradford, R., Ed., Vasseur, JP., and A. Farrel,
"Preserving Topology Confidentiality in Inter-Domain Path
Computation Using a Path-Key-Based Mechanism", RFC 5520,
DOI 10.17487/RFC5520, April 2009,
<https://www.rfc-editor.org/info/rfc5520>.
[RFC5920] Fang, L., Ed., "Security Framework for MPLS and GMPLS
Networks", RFC 5920, DOI 10.17487/RFC5920, July 2010,
<https://www.rfc-editor.org/info/rfc5920>.
[RFC8001] Zhang, F., Ed., Gonzalez de Dios, O., Ed., Margaria, C.,
Hartley, M., and Z. Ali, "RSVP-TE Extensions for
Collecting Shared Risk Link Group (SRLG) Information",
RFC 8001, DOI 10.17487/RFC8001, January 2017,
<https://www.rfc-editor.org/info/rfc8001>.
Acknowledgements
The authors would like to thank Xihua Fu for his contributions. The
authors also would like to thank Luyuan Fang and Walid Wakim for
their review and comments.
Contributors
Igor Bryskin
Huawei Technologies
Email: Igor.Bryskin@huawei.com
Daniele Ceccarelli
Ericsson
Email: Daniele.Ceccarelli@ericsson.com
Dhruv Dhody
Huawei Technologies
Email: dhruv.ietf@gmail.com
Don Fedyk
Hewlett-Packard Enterprise
Email: don.fedyk@hpe.com
Clarence Filsfils
Cisco Systems, Inc.
Email: cfilsfil@cisco.com
Gabriele Maria Galimberti
Cisco Systems
Email: ggalimbe@cisco.com
Ali, et al. Standards Track [Page 24]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Ori Gerstel
SDN Solutions Ltd.
Email: origerstel@gmail.com
Oscar Gonzalez de Dios
Telefonica I+D
Email: ogondio@tid.es
Matt Hartley
Cisco Systems
Email: mhartley@cisco.com
Kenji Kumaki
KDDI Corporation
Email: ke-kumaki@kddi.com
Ruediger Kunze
Deutsche Telekom AG
Email: Ruediger.Kunze@telekom.de
Lieven Levrau
Nokia
Email: Lieven.Levrau@nokia.com
Cyril Margaria
Email: cyril.margaria@gmail.com
Julien Meuric
France Telecom Orange
Email: julien.meuric@orange.com
Yuji Tochio
Fujitsu
Email: tochio@jp.fujitsu.com
Xian Zhang
Huawei Technologies
Email: zhang.xian@huawei.com
Ali, et al. Standards Track [Page 25]
^L
RFC 8390 RVSP-TE Path Diversity July 2018
Authors' Addresses
Zafar Ali (editor)
Cisco Systems.
Email: zali@cisco.com
George Swallow (editor)
Southend Technical Center
Email: swallow.ietf@gmail.com
Fatai Zhang (editor)
Huawei Technologies
Email: zhangfatai@huawei.com
Dieter Beller (editor)
Nokia
Email: Dieter.Beller@nokia.com
Ali, et al. Standards Track [Page 26]
^L
|