Applications aware LDP Targeted Session
draft-esale-mpls-appl-aware-ldp-targeted-session-00
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Authors | Santosh Esale , Raveendra Torvi , Chris Bowers | ||
Last updated | 2014-10-04 (latest revision 2014-04-02) | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-esale-mpls-appl-aware-ldp-targeted-session-00.txt
Abstract
Recent Targeted LDP applications such as Remote LFA and BGP auto discovery FEC 129 pseudowire may automatically establish a targeted LDP session to any LSR in the core network. The sender LSR has information about the targeted applications to administratively control initiation of the session. However the receiver LSR has no such information to control the acceptance of this session. This document defines a mechanism to advertise Targeted Application Capability during session initialization. As the receiver LSR becomes aware of targeted LDP applications, it may establish a limited number of sessions for certain applications. In addition, each targeted application is mapped to LDP FEC Elements to advertise only necessary LDP FEC label bindings over the session.
Authors
Santosh Esale
(sesale@juniper.net)
Raveendra Torvi
(rtorvi@juniper.net)
Chris Bowers
(cbowers@juniper.net)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)