datatracker.ietf.org
Sign in
Version 5.6.3.p2, 2014-09-29
Report a bug

Definition of P2MP PW TLV for LSP-Ping Mechanisms
draft-jain-pwe3-p2mp-pw-lsp-ping-03

Document type: Active Internet-Draft (individual)
Document stream: IETF
Last updated: 2014-06-18
Intended RFC status: Unknown
Other versions: plain text, pdf, html

IETF State: WG Document
Document shepherd: No shepherd assigned

IESG State: I-D Exists
Responsible AD: (None)
Send notices to: No addresses provided

Network Working Group                                   Parag Jain, Ed. 
     Internet Draft                                             Sami Boutros 
     Intended status: Standards Track                    Cisco Systems, Inc. 
     Expires: December 18, 2014                                                                                                     
                                                                  Sam Aldrin 
                                                         Huawei Technologies 
                                                                             
                                                         June 17, 2014 
                                          
                  Definition of P2MP PW TLV for LSP-Ping Mechanisms 
                       draft-jain-pwe3-p2mp-pw-lsp-ping-03.txt                
     Abstract 

        LSP-Ping is a widely deployed Operation, Administration, and 
        Maintenance (OAM) mechanism in MPLS networks. This document 
        describes a mechanism to verify connectivity of Point-to-Multipoint 
        (P2MP) Pseudowires (PW) using LSP Ping. 

      Status of this Memo 

        This Internet-Draft is submitted in full conformance with the 
        provisions of BCP 78 and BCP 79.  

        Internet-Drafts are working documents of the Internet Engineering 
        Task Force (IETF), its areas, and its working groups.  Note that 
        other groups may also distribute working documents as Internet-
        Drafts. 

        Internet-Drafts are draft documents valid for a maximum of six 
        months and may be updated, replaced, or obsoleted by other documents 
        at any time.  It is inappropriate to use Internet-Drafts as 
        reference material or to cite them other than as "work in progress." 

        The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 

        The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 

        This Internet-Draft will expire on December 28, 2011. 

     Copyright Notice 

        Copyright (c) 2011 IETF Trust and the persons identified as the 
        document authors. All rights reserved. 

        This document is subject to BCP 78 and the IETF Trust's Legal 
        Provisions Relating to IETF Documents 
        (http://trustee.ietf.org/license-info) in effect on the date of 
      
      
      
     Jain                      Expires December 2014                   [Page 1] 


     Internet-Draft  draft-jain-pwe3-p2mp-pw-lsp-ping-03.txt    June 2014 
      

        publication of this document.  Please review these documents 
        carefully, as they describe your rights and restrictions with 
        respect to this document. 

         

     Table of Contents 

       1. Introduction                                            2 
       2. Conventions used in this document                       3 
       3. Terminology                                             3 
       4. Identifying a P2MP PW                                   3 
          4.1. FEC 130 Pseudowire Sub-TLV                         4 
       5. Operations                                              4 
       6. Echo Reply using Downstream Assigned Label              6 
       7. Controlling Echo Responses                              6 
       8. Security Considerations                                 6 
       9. IANA Considerations                                     6 
       10. References                                             6 
          10.1. Normative References                              6 
          10.2. Informative References                            7 
       11. Acknowledgments                                        7 
         

     1. Introduction 

        A Point-to-Multipoint (P2MP) Pseudowire (PW) emulates the essential 
        attributes of a unidirectional P2MP Telecommunications service such 
        as P2MP ATM over PSN. Requirements for P2MP PW are described in 
        [PPWREQ]. P2MP PWs are carried over P2MP MPLS LSP. The Procedure for 
        P2MP PW signaling using LDP for single segment P2MP PWs are 
        described in [PPWPWE3]. Many P2MP PWs can share the same P2MP MPLS 
        LSP and this arrangement is called Aggregate P-tree. The aggregate 
        P2MP trees require an upstream assigned label so that on the tail of 
        the P2MP LSP, the traffic can be associated with a VPN or a VPLS 
        instance. When a P2MP MPLS LSP carries only one VPN or VPLS service 
        instance, the arrangement is called Inclusive P-Tree. For Inclusive 
        P-Trees, P2MP MPLS LSP label itself can uniquely identify the VPN or 
        VPLS service being carried over P2MP MPLS LSP. The P2MP MPLS LSP can 
        also be used in Selective P-Tree arrangement for carrying multicast 
        traffic. In a Selective P-Tree arrangement, traffic to each 

[include full document text]