Skip to main content

Applications aware LDP Targeted Session
draft-esale-mpls-appl-aware-ldp-targeted-session-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Santosh Esale , Raveendra Torvi , Chris Bowers
Last updated 2014-10-04 (Latest revision 2014-04-02)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Recent Targeted LDP applications such as Remote LFA and BGP auto discovery FEC 129 pseudowire may automatically establish a targeted LDP session to any LSR in the core network. The sender LSR has information about the targeted applications to administratively control initiation of the session. However the receiver LSR has no such information to control the acceptance of this session. This document defines a mechanism to advertise Targeted Application Capability during session initialization. As the receiver LSR becomes aware of targeted LDP applications, it may establish a limited number of sessions for certain applications. In addition, each targeted application is mapped to LDP FEC Elements to advertise only necessary LDP FEC label bindings over the session.

Authors

Santosh Esale
Raveendra Torvi
Chris Bowers

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)