Requirements and Framework for Point-to-Multipoint Pseudowires over MPLS Packet Switched Networks
draft-ietf-pwe3-p2mp-pw-requirements-08

The information below is for an old version of the document
Document Type Active Internet-Draft (pwe3 WG)
Last updated 2014-05-13 (latest revision 2014-05-12)
Replaces draft-jounay-pwe3-p2mp-pw-requirements
Stream IETF
Intended RFC status Informational
Formats plain text pdf html
Stream WG state Submitted to IESG for Publication Jun 2014
Consensus Yes
Document shepherd Andrew Malis
Shepherd write-up Show (last changed 2014-03-13)
IESG IESG state IESG Evaluation
Telechat date
Has enough positions to pass.
Responsible AD Adrian Farrel
IESG note Andrew Malis (andrew.g.malis@verizon.com) is the document shepherd.
Send notices to pwe3-chairs@tools.ietf.org, draft-ietf-pwe3-p2mp-pw-requirements@tools.ietf.org
IANA IANA review state IANA OK - No Actions Needed
IANA action state None
Network Working Group                                  F. Jounay, Ed. 
Internet-Draft                                             Orange CH 
Category: Informational                                Y. Kamite, Ed. 
Expires: November 15, 2014                        NTT Communications 
                                                            G. Heron 
                                                       Cisco Systems 
                                                            M. Bocci 
                                                      Alcatel-Lucent 
                                                        May 15, 2014 
 
     Requirements and Framework for Point-to-Multipoint Pseudowires 
                 over MPLS Packet Switched Networks 
                
              draft-ietf-pwe3-p2mp-pw-requirements-08.txt 
 
    
Abstract 
    
   This document presents a set of requirements and a framework for 
   providing a Point-to-Multipoint Pseudowire (PW) over MPLS Packet 
   Switched Networks. The requirements identified in this document are 
   related to architecture, signaling and maintenance aspects of Point-
   to-Multipoint PW operation. They are proposed as guidelines for the 
   standardization of such mechanisms. Among other potential 
   applications, Point-to-Multipoint PWs can be used to optimize the 
   support of multicast layer 2 services (Virtual Private LAN Service 
   and Virtual Private Multicast Service) as defined in the Layer 2 
   Virtual Private Network Working Group. 
    
Status of This Memo 
 
    
   This Internet-Draft is submitted in full conformance with the 
   provisions of BCP 78 and BCP 79. 
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF).  Note that other groups may also distribute 
   working documents as Internet-Drafts.  The list of current Internet- 
   Drafts is at http://datatracker.ietf.org/drafts/current/. 
 
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
 
   This Internet-Draft will expire on November 15, 2014. 
 
 
 
 
 
Jounay, et al.         Expires November 15, 2014               [Page 1] 
  

Internet Draft           P2MP PW Requirements                May 2014 

Copyright Notice 
 
    
   Copyright (c) 2014 IETF Trust and the persons identified as the 
   document authors.  All rights reserved. 
 
   This document is subject to BCP 78 and the IETF Trust's Legal 
   Provisions Relating to IETF Documents 
   (http://trustee.ietf.org/license-info) in effect on the date of 
   publication of this document.  Please review these documents 
   carefully, as they describe your rights and restrictions with respect 
   to this document.  Code Components extracted from this document MUST 
   include Simplified BSD License text as described in Section 4.e of 
   the Trust Legal Provisions and are provided without warranty as 
   described in the Simplified BSD License. 
 
 
Table of Contents 
    
 1. Introduction.....................................................3 
   1.1. Problem Statement........................................... 3 
   1.2. Scope of this document...................................... 3 
   1.3. Conventions used in this document........................... 4 
 2. Definition...................................................... 4 
   2.1. Acronyms.................................................... 4 
   2.2. Terminology ................................................ 4 
 3. P2MP PW Requirements.............................................5 
   3.1. Reference Model............................................. 5 
   3.2. P2MP PW and Underlying Layer ............................... 7 
   3.3. P2MP PW Construction........................................ 9 
   3.4. P2MP PW Signaling Requirements.............................. 9 
     3.4.1. PW Identifier........................................... 9 
     3.4.2. PW type mismatch ....................................... 9 
     3.4.3. Interface Parameters sub-TLV............................ 9 
     3.4.4. Leaf Grafting/Pruning ..................................10 
     3.4.5. Failure Detection and Reporting.........................10 
     3.4.6. Protection and Restoration..............................11 
     3.4.7. Scalability.............................................12 
 4. Backward Compatibility..........................................12 
 5. Security Considerations.........................................13 
 6. IANA Considerations.............................................13 
 7. Contributing Aurhors............................................13 
 8. Acknowledgments.................................................14 
 9. References......................................................14 
   9.1. Normative References........................................14 
Show full document text