MPLS Working Group                                       Dave Allan, Ed.
Internet Draft                                                 Ericsson
Intended status: Standards Track
Expires: September 2012                                      March 2012


          Requirements and Framework for Unified MPLS Sub-Network
                              Interconnection


                 draft-allan-mpls-unified-ic-req-frmwk-01


Abstract

   The definition of a transport profile for MPLS means that MPLS
   network architectures will emerge that combines both managed and
   control plane driven MPLS sub-networks and requires interconnection
   of same to achieve a unified MPLS architecture.

   This document generalizes the problem of sub-network interconnect,
   discusses issues in general and suggests ways forward.


Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC2119 [1].

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance
   with the provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet
   Engineering Task Force (IETF), its areas, and its working
   groups.  Note that other groups may also distribute working
   documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other
   documents at any time.  It is inappropriate to use Internet-
   Drafts as reference material or to cite them other than as "work
   in progress".

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.



Allan et al.,           Expires September 2012                 [Page 1]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire in September 2012.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described
   in Section 4.e of the Trust Legal Provisions and are provided
   without warranty as described in the Simplified BSD License.

Table of Contents

   1. Introduction...................................................3
   2. Conventions used in this document..............................4
   2.1. Terminology..................................................4
   2.2. Acronyms.....................................................4
   3. Sub-Network Interconnect Scenarios.............................4
   4. Sub-Network Interconnect Mechanisms............................5
   4.1. Border Node..................................................5
   4.2. Border Link..................................................5
   5. Sub-network types..............................................5
   5.1. Infrastructure sub-network types.............................5
   5.2. Service Sub-network types....................................6
   6. Issues & Requirements..........................................6
   6.1. Alignment of OAM functionality...............................7
   6.2. OAM identifier mismatches....................................7
   6.3. OAM encapsulation............................................7
   6.4. Protection Mechanisms........................................8
   6.5. Label space management.......................................8
   6.6. Path maintenance and re-sizing...............................8
   6.7. Sub-network migration........................................9
   6.8. (Non)Interworking of DP and CP notifications.................9
   7. Operational Decoupling.........................................9
   8. Acknowledgments...............................................10
   9. IANA Considerations...........................................10
   10. Security Considerations......................................10
   11. References...................................................10
   11.1. Informative References.....................................10

Allan et al.,             Expires July, 2012                   [Page 2]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012




1. Introduction

   Networks that provide an end-to-end service infrastructure are
   typically deployed as multiple domains or sub-networks in order to
   scale. These different domains may be operated by different
   technologies using different control plane technology (e.g.
   management driven control plane (centralized) or distributed control
   plane).

   Within the MPLS control plane there exist a number of functional
   behaviors that are typically associated with a single control
   protocol and function autonomously from the other control protocols.
   That is to say when a labeled layer and associated control protocol
   is overlaid on another, there is frequently no operational coupling
   between them. When two control protocols are operated side by side
   the same is true (e.g. ships in the night). An example of the former
   would be pseudo wires over a PSN. An example of the latter would be
   L2 and L3 virtual private networks (VPNs) sharing a common packet
   switched network (PSN).

   The introduction of transport functions to MPLS and the intent to
   deploy, merge or otherwise combine networks that will concatenate
   sub-networks that have different operational characteristics and/or
   control planes (including management) introduces the requirement to
   integrate operations across multiple sub-networks. This frequently is
   manifested in requirements on nodes at sub-network boundaries and/or
   alignment of identifiers in order to construct a unified end-to-end
   MPLS based service plane.

   By having a unified MPLS based service plane, a network operator is
   able to provide services across different MPLS domains instrumented
   with common management and control functionality in order to provide
   scalable service offerings on a common MPLS technology base.

   This document is a framework that postulates models and functional
   requirements for sub-network interconnect to achieve a unified end to
   end MPLS based service plane or "Unified MPLS".






Allan et al.,             Expires July, 2012                   [Page 3]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


2. Conventions used in this document

2.1. Terminology

   Binding: Is the mechanism for association and interconnection of
   label switched path (LSP) or pseudo wire (PW) segments that exist in
   different sub-networks.

   Section: As per RFC 5960[17].

   Segment: A part of a PW or LSP that has one or more contiguous
   sections in a common sub-network. This usage is as per RFC 6372[18].

   Sub-network: A portion of a larger MPLS network that is operated by a
   single system and whose boundaries are set by the scope of the
   system. The system may be a control plane or management system.
   Similarly it could be a sub-layer stacked on another sub-network.

2.2. Acronyms

   LIB - label information base

   LSP - label switched path

   MEG - Maintenance Entity Group

   MEP - Maintenance Entity Group End Point

   MIP - Maintenance Entity Group Intermediate Point

   PSN - packet switched network

   PW - pseudo wire

   SPME - Sub-path Maintenance Entity

   VPWS - Virtual Private Wire Service

   VPMS - Virtual Private Multicast Service

3. Sub-Network Interconnect Scenarios

   The combination of MPLS label swapping and label stacking makes it
   possible to consider a number of atomic interconnect scenarios,
   briefly summarized here:

   Peer Model - is the scenario when an LSP or PW has segments in
   different sub-networks.

Allan et al.,             Expires July, 2012                   [Page 4]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


   Segmentation Model - is the scenario when a client LSP or PW with
   common establishment and maintenance procedures has sections in
   separate sub-networks. This model can recurse arbitrarily.

   Overlay Model - is the simplest case of the segmentation model in
   which a section of an LSP or PW is a distinct sub-network. This is
   currently the common deployment scenario for MPLS, and normally has
   minimal dependencies. In the specific case of MPLS & GMPLS, the
   requirements are examined in RFC 5146[21].

   Termination Model - is the scenario where a non-MPLS or PW transfer
   function separates the sub-networks. The termination model logically
   isolates the sub-networks and is included simply for completeness.

4. Sub-Network Interconnect Mechanisms

   There are two interconnect mechanisms considered. The first (Border
   node) postulates a node that spans two sub-networks and both likely
   operated by a single provider. The second (Border link) postulates a
   link connecting sub-networks of two distinct organizations within a
   provider or two distinct providers.

4.1. Border Node

   A border node is one that implements, interconnects and interworks
   LSPs or PWs with segments or sections in different sub-networks. The
   interworking function at the border node will either terminate, swap
   or encapsulate labels.

4.2. Border Link

   A border link is the case whereby two border nodes are connected back
   to back in an MPLS sub-network that consists of a single link. This
   can be a physical link or a logical link (e.g. an MPLS section).

5. Sub-network types

   In the current MPLS architecture the following sub-network types
   exist:

5.1. Infrastructure sub-network types

   The infrastructure sub-network types are:

   MPLS-TD: Topology driven MPLS. LSP setup is via the LDP protocol [6]
   with path routing determined by the IGP. ECMP, merging and PHP are
   are included in the set of possible dataplane behaviors. LSPs are
   unidirectional only. P2mp and mp2mp LSPs are supported by mLDP [7].

Allan et al.,             Expires July, 2012                   [Page 5]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


   MPLS-TE: LSP setup is via the RSVP-TE protocol[8] with path routing
   determined by a TE enabled IGP (e.g. OSPF-TE) according to bandwidth
   and QoS constraints. PHP is included in the set of dataplane
   behaviors. LSPs are unidirectional only. Bandwidth allocations, class
   of service or priority(PHB) are typically part of traffic handling.

   Managed MPLS-TP: LSP setup is via management action. LSPs can be uni-
   directional, bi-directional or associated bi-directional. LSPs are
   purely connection oriented p2p or p2mp (where p2mp is unidirectional
   only).

   Signalled MPLS-TP: LSP setup is via RSVP-TE GMPLS[9]. LSPs can be
   uni-directional, bi-directional or associated bi-directional. LSPs
   are purely connection oriented p2p or p2mp (where p2mp is
   unidirectional only).

   And it is possible to consider

   GMPLS for non-MPLS dataplanes:

5.2. Service Sub-network types

   L3VPN: VPN setup is via the BGP protocol as per RFC 4364[10]. Note
   that this can be an IP-VPN (via IGP peering with the VRF) or an MPLS-
   VPN (via a combination of IGP and MPLS CP peering with the VRF).

   L2VPN: VPN setup is via the PW Control Protocol per RFC 4447 (LDP in
   targeted mode) or BGP protocols. A broadcast domain is emulated which
   will have the effect of limiting sub-network interconnect to a single
   point to avoid loops.

   VPWS: VPWS setup is via the PW Control Protocol per RFC 4447 (LDP in
   targeted mode).

   VPMS: VPMS setup is currently an L2VPN work item .
                                                         [20].

6. Issues & Requirements

   In theory, any ingress label can be mapped to one or more egress
   labels or label stack permutations via the ILM to NHLFE mapping
   defined in RFC 3031[2]. Further one carrier"s infrastructure layer
   may be a client of another carrier"s infrastructure. More
   considerations need to come into play in order to produce a tractable
   set of sub-network interworking scenarios. The following is a partial
   list of some of the issues to be considered and/or addressed:




Allan et al.,             Expires July, 2012                   [Page 6]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


6.1. Alignment of OAM functionality

   Not all OAM encapsulations guarantee fate sharing with the LSP of
   interest across all of the sub-network types in MPLS. This not only
   means that failures may not be detected or detected in a timely
   manner, it also means that "false positives" are a possibility as
   failures may occur on the path taken by the OAM PDUs.

   Any OAM encapsulation using a reserved label, e.g. the GAL[12], or
   Router Alert as used by VCCV type 2[13], or without a PW control word
   will not have predictable control over fate sharing with normal
   payload for any LSP or PW that has a section that transits a MPLS-TD
   sub network that implements ECMP[11]. Specifying that ECMP
   implementations exclude reserved labels from consideration would
   permit ECMP and LAG approaches that limit the sources of entropy to
   the label stack (e.g. FAT PWs [ref] or the entropy label [ref]) to be
   employed and be correctly and reliably instrumented by OAM that used
   a reserved label.

   A separate issue is interconnecting sub networks where the LSPs have
   a different cardinality of end points (e.g. concatenating mp2p to
   p2p), implying a different number of maintenance entities than would
   be suggested by an implementation dimensioned to a single sub
   network"s characteristics.

6.2. OAM identifier mismatches

   MEG, MEP, MIP and nodal addressing will not pose identifier mismatch
   problems. Where such problems will arise is in the use of RFC 4379
   LSP Ping [3]. This is because LSP-PING uses identifiers associated
   with a specific sub-network type in the FEC stack as part of the
   processing to detect inconsistencies between the control plane and
   the data plane.

   [Issue: The on demand CV draft provides for the Static LSP and Static
   PW TLVs for the FEC stack which allows intermediate nodes to validate
   the FEC stack against the MEG ID for the local MIP. The applicability
   for this should be generalized such that it can be used end to end
   across domains. This will also raise the problem of disseminating MEG
   information to non-transport sub networks as not all defined MPLS
   sub-network types use the current fields in the IP based LSP MEG ID]

6.3. OAM encapsulation

   The MPLS architecture permits multiple OAM encapsulations that may or
   may nor have an IP header. Any interconnect mechanism needs to be
   able to align not only capability but encapsulations end to end. This


Allan et al.,             Expires July, 2012                   [Page 7]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


   document assumes that translation of encapsulations by MIPs will not
   be specified or implemented.

6.4. Protection Mechanisms

   An MPLS LSP or PW sub-network may be made resilient by any number of
   mechanisms. There are also three scenarios of note, end to end
   protection, end to end restoration and sub-network protection.

   End to end protection offers minimal complications in sub-network
   interconnect as the interworking functions is common to that of the
   unprotected case, that is to say transit nodes do not participate in
   protection switching.

   Sub-network protection is universally offered by the use of
   mechanisms that operate within the level such as detours [19] and may
   require label merging at the border node. Mechanisms that operate at
   nested MPLS label levels (e.g. SPMEs or FRR facility protection) have
   no impact on sub-network interconnect.

   End to end restoration is a bit more complicated as it involves
   coordinating dynamic action between sub-networks.

   It also becomes possible to consider sub-network restoration with
   many of the same considerations as path maintenance and re-sizing.

6.5. Label space management

   The MPLS architecture has always been based around local
   administration of a node"s label space. As such mechanisms to
   partition the label space between multiple administrative entities is
   not currently supported and would be difficult to retrofit.

   A consequence of this is that a border node is potentially required
   to provide labels from a common pool to both a control and management
   plane, e.g. a management system be required to obtain label values
   from the node prior to populating the LIB vs. being delegated a pool.
   This suggests that such a mechanism be carried forward for all
   managed nodes such that only a single mechanism need be implemented.
   However this is an implementation decision.

6.6. Path maintenance and re-sizing

   It must be possible to make operational modifications to a path
   segment in a hitless fashion. The normal procedure for MPLS-TE is
   known as "make before break". This gives rise to two scenarios, the
   first is end to end "make before break", and the other is make before
   break confined to a sub-network with the border node as a pinned

Allan et al.,             Expires July, 2012                   [Page 8]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


   waypoint. This means the design of the inter-sub-network binding
   information permit make before break modification of one segment of
   the LSP.

6.7. Sub-network migration

   The practical considerations are documented in RFC 5950[4] and by
   reference RFC 5493[5].

6.8. (Non)Interworking of DP and CP notifications

   Within the MPLS architecture there are techniques for propagating the
   status of adjacent sections of either a native service or PW section
   in both the data plane and the control plane. One example
   (documenting both) is RFC 6310[14].

   When concatenating sub networks the interworking of dataplane fault
   notifications [15] or protection switching coordination [16] and
   control plane indications will not be possible. The reason is that
   data plane indications flow end to end on a labeled path therefore
   will not be visible to border nodes, a requirement to enable
   interworking of dataplane notifications with the control plane in any
   useful form.

   When connecting a sub network restricted to data plane only
   notifications to a sub network that will support either dataplane or
   control plane notifications, the border node will be required to
   negotiate exclusive use of dataplane notifications in any control
   plane signaling during the path setup. This will have implications in
   both the interconnect data model, and potential enhancements to
   signaling.

7. Operational Decoupling

   The objective of any sub-network interconnect solution is to decouple
   the operation of the interconnected systems in order to minimize any
   dependencies.

   The sub-network interconnect must accommodate interconnecting LSPs
   and PWs with different establishment and persistency characteristics.
   This is determined by whether the LSP, PW or segment is provisioned
   or signaled, where from a persistency point of view, a provisioned
   entry is permanent and exists until removed by management action,
   while a signaled entity fate shares with a control plane adjacency
   and may come and go during the life time of the inter sub-network
   binding.



Allan et al.,             Expires July, 2012                   [Page 9]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


   The state present at a border node to bind the LSP or PW spanning the
   sub networks together should exist independently of the
   characteristics of the LSPs or associated control or management
   planes.

   This also requires a level of indirection such that the management
   action is decoupled from the mechanics of label assignment in each
   sub-network and may work with sub-network resiliency mechanisms.

   So the state "connect whatever label from sub-network A associated
   with FOO to whatever label from sub-network B is associated with BAR"
   should be persistent.

8. Acknowledgments

   Loa Andersson, Mach Chen, Eric Gray, David Sinicrope and Greg Mirsky
   contributed to the development of this document.

9. IANA Considerations

   This document does not require IANA action.

10. Security Considerations

   Sub-network interconnect in a single provider scenario does not
   introduce any new security exposures to the MPLS architecture that do
   not already exist.

   Sub-network interconnect in a multi-provider scenario (e.g. border
   link) introduces a number of potential exposures, and requires a
   strong trust model for the co-ordination of the set up if interdomain
   LSPs. This is particularly true for the peer model. This is somewhat
   mitigated when operational decoupling techniques are employed as
   discussed in section 7, as the scope of what a provider can ask of a
   peer network is explicitly scoped.

11. References

11.1. Informative References

[1]      Bradner, S., "Key words for use in RFCs to Indicate Requirement
      Levels", BCP 14, RFC 2119, March 1997.

[2]      Rosen et.al. Multiprotocol Label Switching Architecture, IETF
      RFC 3031, January 2001

[3]      Kompella et.al. Detecting Multi-Protocol Label Switched (MPLS)
      Data Plane Failures, IETF RFC 4379, February 2006

Allan et al.,             Expires July, 2012                  [Page 10]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


[4]      Mansfield et. al. Network Management Framework for MPLS-based
      Transport Networks, IETF RFC 5950, September 2010

[5]      Caviglia, D., Bramanti, D., Li, D., and D. McDysan,
      "Requirements for the Conversion between Permanent Connections and
      Switched Connections in a Generalized Multiprotocol Label
      Switching (GMPLS) Network", RFC 5493, April 2009.

[6]      Andersson et.al. "LDP Specification", IETF RFC 5036, October
      2007

[7]      Minei, I. et.al. "Label Distribution Protocol Extensions for
      Point-to-Multipoint and Multipoint-to-Multipoint Label Switched
      Paths", IETF RFC 6388

[8]      Awduche et.al. "RSVP-TE: Extensions to RSVP for LSP Tunnels",
      IETF RFC 3209, December 2001

[9]      Berger et.al. "Generalized Multi-Protocol Label Switching
      (GMPLS) Signaling Functional Description", IETF RFC 3471, January
      2003

[10]     Rosen et.al. "BGP/MPLS IP Virtual Private Networks (VPNs)",
      IETF RFC 4364, February 2006

[11]     Swallow et.al. "Avoiding Equal Cost Multipath Treatment in MPLS
      Networks", IETF RFC 4928, June 2007

[12]     Bocci et.al. "MPLS Generic Associated Channel", IETF RFC 5586,
      June 2009

[13]     Nadeau et.al "Pseudowire Virtual Circuit Connectivity
      Verification (VCCV) A Control Channel for Pseudowires", IETF RFC
      5085, December 2007

[14]     Aissaoui et.al. "Pseudowire (PW) Operations, Administration,
      and Maintenance (OAM) Message Mapping", IETF RFC 6310, July 2011

[15]     Swallow et.al. "MPLS Fault Management OAM", IETF RFC 6427,
      November 2011

[16]     Bryant et.al. "MPLS-TP Linear Protection", IETF RFC 6378,
      October 2011

[17]     Frost et.al. "MPLS Transport Profile Data Plane Architecture",
      IETF RFC 5960, August 2010



Allan et al.,             Expires July, 2012                  [Page 11]


Internet-Draft  draft-allan-mpls-unified-ic-req-frmwk-01      March 2012


[18]     Sprecher et.al. "MPLS Transport Profile (MPLS-TP) Survivability
      Framework", IETF RFC 6372, September 2011

[19]     Pan et.al. "Fast Reroute Extensions to RSVP-TE for LSP
      Tunnels", IETF RFC 4090, May 2005

[20]     Kamite et.al., "Framework and Requirements for Virtual Private
      Multicast Service (VPMS)", IETF work in progress, draft-ietf-
      l2vpn-vpms-frmwk-requirements-04.txt, July 2011

[21]     Kumaki et.al., Interworking Requirements to Support Operation
      of MPLS-TE over GMPLS Networks, IETF RFC 5146, March 2008




   Authors' Addresses

   Dave Allan
   Ericsson
   Email: david.i.allan@ericsson.com




























Allan et al.,             Expires July, 2012                  [Page 12]