Extensions to RSVP-TE for LSP Egress Local Protection
draft-ietf-teas-rsvp-egress-protection-14
The information below is for an old version of the document | |||
---|---|---|---|
Document | Type | Active Internet-Draft (teas WG) | |
Authors | Huaimo Chen , Autumn Liu , Tarek Saad , Fengman Xu , Lu Huang | ||
Last updated | 2018-03-02 | ||
Replaces | draft-ietf-mpls-rsvp-egress-protection | ||
Stream | Internent Engineering Task Force (IETF) | ||
Formats | pdf htmlized (tools) htmlized bibtex | ||
Reviews | |||
Stream | WG state | Submitted to IESG for Publication | |
Document shepherd | Vishnu Beeram | ||
Shepherd write-up | Show (last changed 2017-11-03) | ||
IESG | IESG state | IESG Evaluation | |
Consensus Boilerplate | Yes | ||
Telechat date |
Needs 6 more YES or NO OBJECTION positions to pass. |
||
Responsible AD | Deborah Brungard | ||
Send notices to | Vishnu Beeram <vishnupavan@gmail.com> | ||
IANA | IANA review state | Version Changed - Review Needed |
Internet Engineering Task Force H. Chen Internet-Draft Huawei Technologies Intended status: Standards Track A. Liu Expires: September 3, 2018 Ciena T. Saad Cisco Systems F. Xu Verizon L. Huang China Mobile March 2, 2018 Extensions to RSVP-TE for LSP Egress Local Protection draft-ietf-teas-rsvp-egress-protection-14.txt Abstract This document describes extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for locally protecting the egress node(s) of a Point-to-Point (P2P) or Point-to-Multipoint (P2MP) Traffic Engineered (TE) Label Switched Path (LSP). Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on September 3, 2018. Copyright Notice Copyright (c) 2018 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of Chen, et al. Expires September 3, 2018 [Page 1] Internet-Draft RSVP LSP Egress Protection March 2018 publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Egress Local Protection . . . . . . . . . . . . . . . . . 3 2. Conventions Used in This Document . . . . . . . . . . . . . . 4 3. Terminologies . . . . . . . . . . . . . . . . . . . . . . . . 4 4. Protocol Extensions . . . . . . . . . . . . . . . . . . . . . 5 4.1. Extensions to SERO . . . . . . . . . . . . . . . . . . . . 5 4.1.1. Primary Egress Subobject . . . . . . . . . . . . . . . 7 4.1.2. P2P LSP ID Subobject . . . . . . . . . . . . . . . . . 8 5. Egress Protection Behaviors . . . . . . . . . . . . . . . . . 9 5.1. Ingress Behavior . . . . . . . . . . . . . . . . . . . . . 9 5.2. Primary Egress Behavior . . . . . . . . . . . . . . . . . 10 5.3. Backup Egress Behavior . . . . . . . . . . . . . . . . . . 10 5.4. Transit Node and PLR Behavior . . . . . . . . . . . . . . 10 5.4.1. Signaling for One-to-One Protection . . . . . . . . . 11 5.4.2. Signaling for Facility Protection . . . . . . . . . . 12 5.4.3. Signaling for S2L Sub LSP Protection . . . . . . . . . 13 5.4.4. PLR Procedures during Local Repair . . . . . . . . . . 13 6. Considering Application Traffic . . . . . . . . . . . . . . . 14 6.1. A Typical Application . . . . . . . . . . . . . . . . . . 14 6.2. PLR Procedure for Applications . . . . . . . . . . . . . . 16 6.3. Egress Procedures for Applications . . . . . . . . . . . . 16 7. Security Considerations . . . . . . . . . . . . . . . . . . . 16 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 9. Co-authors and Contributors . . . . . . . . . . . . . . . . . 17 10. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 18 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 19 11.1. Normative References . . . . . . . . . . . . . . . . . . . 19 11.2. Informative References . . . . . . . . . . . . . . . . . . 19 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 20Show full document text