[Search] [txt|pdfized|bibtex] [Tracker] [Email] [Nits]
Versions: 00 01 02                                                      
Internet Draft                                           Alia Atlas
Expires: January 2002                             Curtis Villamizar
                                                    - Avici Systems

                                                     Caren Litvanyi
                                             - Qwest Communications

                                                          July 2001


    MPLS RSVP-TE Interoperability for Local Protection/Fast Reroute

             draft-atlas-rsvp-local-protect-interop-00.txt

Status of this Memo

   This document is an Internet-Draft and is subject to all provisions
   of Section 10 of RFC2026.  Internet-Drafts are working documents of
   the Internet Engineering Task Force (IETF), its areas, and its
   working groups.  Note that other groups may also distribute working
   documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html


Abstract

   Routers implementing the local protection enhancements given in
   [draft-ietf-mpls-rsvp-lsp-tunnel-08.txt], whose usage is clarified in
   [draft-swallow-rsvp-bypass-label-01.txt], and routers implementing
   solely [draft-gan-fast-reroute-00.txt] do not interoperate to provide
   local protection.  Those routers which follow the guidelines given in
   this draft should be able to interoperate with either type of
   implementation.








Atlas et al.                                                    [Page 1]


Internet Draft                                                 July 2001


Contents

   1. Introduction   ..............................................   3
   2. Terminology   ...............................................   3
   3. Ingress Support   ...........................................   4
   3.1 Requesting Local Protection   ..............................   4
   3.2 Detecting Protection Information   .........................   5
   4. Distinguishing Backups from Different PLRs Based on RESV   ..   6
   5. PLR Behavior   ..............................................   6
   5.1 Selecting Backup LSP Type   ................................   7
   5.2 Bypass Tunnels   ...........................................   8
   5.3 Make-Before-Break on Backup Tunnels   ......................   8
   5.3.1 Shared-Explicit and Backup LSPs   ........................   9
   5.3.2 Make-Before-Break with Sender Addresses   ................  10
   5.4 Catching ResvTears and Appropriate PathErrs   ..............  11
   5.5 Handling Resource Preemption   .............................  11
   6. Merge Node Behavior   .......................................  12
   6.1 Ignore Path Tears Unless From Ingress   ....................  12
   6.2 Label Space   ..............................................  12
   6.3 Simple and Detour Backup LSPs   ............................  12
   6.4 ResvTears   ................................................  13
   7. Security Considerations   ...................................  14
   8. References   ................................................  14
   9. Authors' Addresses   ........................................  14



























Atlas et al.                                                    [Page 2]


Internet Draft                                                 July 2001


1. Introduction

   Routers may implement the local protection enhancements given in
   [RSVP-TE], whose usage is clarified in [BYPASS], but not implement
   [DETOUR].  Routers may also implement [DETOUR] without implementing
   the local protection enhancements given in [RSVP-TE].  These two sets
   of routers will not interoperate to provide local protection.

   This draft assumes that a router falls into one of the following
   three sets:

     A.  Implements both the local protection enhancements given in
         [RSVP-TE] and [DETOUR] as described in this draft.

     B.  Implements only [DETOUR].

     C.  Implements only the local protection enhancements given in
         [RSVP-TE].

   The guidelines given in this draft should allow routers in set A to
   interoperate with either of the other two sets of routers, but not
   both.  A network with routers in set A and set B will be able to
   provide local protection.  A network with routers in set A and set C
   will be able to provide local protection.  A network that contains
   routers from both set B and set C will not be able to provide local
   protection in some cases involving paths with a mix of the two types
   of routers, irrespective of the presence or absence of routers from
   set A.

   This draft also describes a modification to identifying LSPs
   specified for Shared-Explicit which distinguish between primary and
   backup bandwidth reservations.  This is necessary to support make-
   before-break on backup tunnels; how to support make-before-break on
   backup tunnels is described.

   More details on handling PathErrs and resource preemption is
   provided.


2. Terminology

   PLR (Point-of-Local-Repair): Any node along the primary LSP's path is
   a potential PLR.  A node becomes an active PLR when it takes action
   to transfer traffic from the primary LSP to a backup tunnel when a
   failure is locally detected.  When discussed in examples, the
   specific potential PLR of interest is the node which originates the
   specific backup tunnel under discussion.




Atlas et al.                                                    [Page 3]


Internet Draft                                                 July 2001


   Backup Tunnel: A backup tunnel is logically created from the PLR to a
   merge node on the primary LSP's path; which specific merge node is
   used can vary between the backup LSPs contained in the backup tunnel.
   The backup tunnel can contain one or more backup LSPs for a given
   primary LSP.  The concept of a backup tunnel permits make-before-
   break for backup LSPs.

   Backup LSP: A backup LSP extends from its origin at the PLR to a
   specific merge node, where it rejoins the primary LSP.  A backup LSP
   is part of a Backup Tunnel.  There are three types of backup LSPs -
   simple, detour and unsignalled.

   Simple Backup LSP: A Simple Backup LSP is a backup LSP whose PATH
   message does not include the DETOUR object.  The ERO contains the
   selected backup path to the merge node and then an exact duplicate of
   the primary LSP's ERO from that merge node to the egress.

   Detour Backup LSP: A Detour Backup LSP is a backup LSP whose PATH
   message includes the DETOUR object.  The ERO simply contains the
   selected backup path to the merge node.

   Bypass Tunnel: A tunnel from the PLR of interest to a specific merge
   node through which traffic across unsignalled backup LSPs can be
   passed.  This is used as defined in [BYPASS].

   Unsignalled Backup LSP: An Unsignalled Backup LSP can only exist if
   there is an appropriate bypass tunnel.  This bypass tunnel is used so
   that the Unsignalled Backup LSP is logically one hop away from the
   merge node.  No RSVP signalling is done to create or indicate the
   existence of the Unsignalled Backup LSP.  The Unsignalled Backup LSP
   uses the label provided by the merge node, via the Label sub-object,
   to forward traffic to the merge node, as described in [BYPASS].

   Fully Protected: A primary LSP is considered to be fully protected
   when each potential PLR in its path has a current backup tunnel
   available.


3. Ingress Support

3.1 Requesting Local Protection

   The [DETOUR] and [BYPASS] propose different methods for the ingress
   to signal that an LSP desires local protection.  These methods are
   not mutually incompatible.  The ingress can both include the
   FAST_REROUTE object in the PATH message and set the two flags, "Label
   Recording desired" and "Local Protection desired", in the
   SESSION_ATTRIBUTE object[RSVP-TE].



Atlas et al.                                                    [Page 4]


Internet Draft                                                 July 2001


   By including the FAST_REROUTE object, any nodes on the primary LSP
   which implement [DETOUR] will know that the primary LSP requires
   protection.  By setting the "Local Protection desired" flag in the
   SESSION_ATTRIBUTE object, any nodes which implement [BYPASS] will
   know that the primary LSP requires protection.  The FAST_REROUTE
   object provides constraints on the backup tunnel; those constraints
   can be configured solely at the primary tunnel's ingress and can
   differ easily differ between primary LSPs.

   If the ingress sets the "Label Recording desired" flag in the
   SESSION_ATTRIBUTE, the resulting Label subobjects in the RRO permit
   those PLRs which implement [BYPASS] to create Unsignalled Backup
   LSPs.  If there are nodes in the primary LSP's path which do not
   understand Label subobjects and do not ignore the unrecognized
   subobjects, as they SHOULD according to [RSVP-TE], then the ingress
   should not set the "Label Recording desired" flag in the SESSION
   ATTRIBUTE.  If this flag is not set, the interoperability affected
   will be with routers which only support Unsignalled Backup LSPs.
   This must be a configured option at the ingress.  It is assumed that
   the network operator knows whether routers in the network support
   LRO, don't support but correctly ignore request for LRO, or handle
   the LRO in violation of the specification.


3.2 Detecting Protection Information

   The primary tunnel's ingress is responsible for determining when
   rerouting of the primary path is desirable.  For instance, if local
   protection is in use on the current primary LSP, it would be
   desirable to compute a new primary LSP.

   The ingress must also determine when to move from a current LSP to a
   new LSP, via make-before-break.  For instance, it will take time
   before a newly created primary LSP will be fully protected.  If the
   new primary LSP were to be created due to a configuration change or
   adaptation to network changes, then the ingress might wait to move
   traffic to the new primary LSP until that is fully protected.
   Alternatively, if the new primary LSP were to be created because
   local protection is in use on the current primary LSP, the ingress
   may move traffic immediately to the new primary LSP or it may wait
   until the new primary LSP is as locally protected along its path as
   the current primary LSP is.

   For both of the reasons above, the ingress must know what nodes along
   an LSP's path are currently providing local protection and which have
   that local protection in use.  The "Local protection available" and
   "Local protection in use" in the IPv4 address and IPv6 address
   subobjects of the RRO [RSVP-TE] provide the necessary information to



Atlas et al.                                                    [Page 5]


Internet Draft                                                 July 2001


   the ingress.  The ingress may be notified that local protection is in
   use via a PathErr message with an error code of "Notify"(25) and an
   error value of "Tunnel locally repaired"(3) by nodes implementing
   [BYPASS], however [BYPASS] alone does not provide the means to
   determine when local protection is fully available.

   To permit proper ingress behavior, it is desirable that the ingress
   be configured with information about which nodes, if any, do not
   support a means to indicate that local protection is available at
   that node.  Such nodes can be ignored at the ingress in any decision
   regarding whether the protection is fully available (it must be
   assumed that protection is available for any such node when any RSVP
   RESV arives).


4. Distinguishing Backups from Different PLRs Based on RESV

   In its Section 4.3, [DETOUR] states "A merging node may receive
   multiple Path messages from different interfaces, but with identical
   SESSION and SENDER_TEMPLATES", implying that the same SENDER_TEMPLATE
   (and, therefore, the FILTER_SPEC) for the detour backup LSPs should
   be used as for the primary LSP.  Because the DETOUR object is only
   available on the PATH message, this can create a problem at a
   midpoint node in identifying which detour backup LSP a given RESV was
   received for.  Consider the following example:

              /--F----G----H--\
             /   |    |    |   \
            A----B----C----D----E

   Assume that the primary LSP is A-B-C-D-E.  Let the detour backup LSP
   from B be B-F-G-H-D.  Let the detour backup LSP from C be C-G-H-E.
   When G receives a RESV message, it cannot determine whether that RESV
   is for the detour backup LSP starting at B or at C.

   To solve this problem, when signalling a detour backup LSP, the PLR
   can change the "IPv4 (or IPv6) tunnel sender address" in the
   SENDER_TEMPLATE object to be an IPv4 (IPv6) address associated with
   the PLR.  The contents of the SENDER_TEMPLATE are copied into the
   FILTER_SPEC and sent as part of the RESV message.  This will enable
   G, in the above example, to determine whether the RESV message is for
   the detour backup LSP from B or from C.

   This change of the "IPv4 (IPv6) tunnel sender address" in the
   SENDER_TEMPLATE is suggested for simple backup LSPs in [BYPASS].


5. PLR Behavior



Atlas et al.                                                    [Page 6]


Internet Draft                                                 July 2001


   Once an ingress or midpoint node has determined that a given LSP is
   requesting local protection, that node, acting in the role of a PLR,
   must determine the link(s) and/or node(s) that the backup tunnel must
   avoid.  Then, the PLR must determine the backup path and merge node.
   Finally, the PLR must determine what type of backup LSP to use and
   create it.

   A link or node could fail for a variety of reasons.  Links for which
   failure may be correlated are determined through the use of Shared
   Risk Link Groups (SRLGs).  SRLGs may be signaled via [GMPLS IS-IS]
   and [GMPLS OSPF].  The PLR can determine what SRLGs are present
   through this signaling or through configuration at each node of all
   SRLGs in the entire network.

   Some routers may support only signaled SRLGs and therefore SRLG
   signaling must be originated.  Some routers may only support
   configured SRLGs and therefore cannot originate signaled SRLGs and
   therefore the ability to configure SRLGs for external links must be
   supported.


5.1 Selecting Backup LSP Type

   The PLR may decide to create a backup LSP either when it has received
   the primary LSP's PATH message or after it has received the primary
   LSP's RESV message.  The latter case is required if unsignalled
   backup paths are desirable.  The former case is reasonable if most
   LSPs are expected to be created successfully and if the ERO is
   primarily strict hops, so that a reasonable merge node can be
   determined.

   To determine which type of backup LSP to create, the PLR must infer
   what type of routers share the local domain.  If the other routers
   implement [BYPASS], then either a simple backup LSP or an unsignalled
   backup LSP should be created.  If the other routers implement
   [DETOUR], then a detour backup LSP should be created.

   If the PLR is to create a backup LSP when it has received the primary
   LSP's PATH message, then the PLR must determine the type of backup
   LSP based upon the inferred type of the ingress.  If the primary's
   PATH message contains a FAST_REROUTE object, it is assumed that other
   routers will support the [DETOUR].  The PLR will attempt to create a
   detour backup LSP.  If no FAST_REROUTE object is found or if the
   detour creation is rejected, as indicated by a PathErr with the error
   code "Unknown object class", then a simple backup LSP can be
   attempted.  The latter case can only occur in a mixed network where
   the ingress supports [DETOUR] but a node along the selected backup
   path does not.  In this case, the backup LSP must be resignaled



Atlas et al.                                                    [Page 7]


Internet Draft                                                 July 2001


   without a DETOUR object.

   When the PLR creates a backup LSP after it has received the primary
   LSP's RESV message, the decision as to backup LSP type is based upon
   inferring the behavior of the merge node.  If the merge node has
   recorded a label, via a subobject in the RRO, then the PLR can assume
   that the merge node implements [BYPASS] with the RSVP enhancements
   given in [RSVP-TE].  Otherwise the merge node is assumed to implement
   [DETOUR] and a detour backup LSP is signalled.  If the selected merge
   node does not support, or is assumed to not support, the DETOUR
   object, then a simple backup path can be used. Using this method, the
   PLR can provide the most efficient backup LSP feasible given the
   capabilites of the downstream LSRs.


5.2 Bypass Tunnels

   The use of the tunnel heirarchy described in [BYPASS] provides
   enhanced scalability for local protection.  The midpoint nodes along
   the active LSP of the bypass tunnel are aware of and reserve for only
   one LSP, but multiple backup LSPs can use the same bypass tunnel.

   This use of a label stack is not limited to the unsignalled backup
   LSPs discussed in [BYPASS].  It is also possible to have simple
   backup LSPs or detour backup LSPs be tunneled through a bypass
   tunnel.  To do this, the simple or detour backup LSP's PATH message
   must be sent through the bypass tunnel; it will emerge at the merge
   node.  The backup path part of the ERO would simply be the merge
   node.  To support this, the merge node and the PLR must trust each
   other to provide legitimate RSVP messages.

   A bypass LSP may also be used by the PLR to avoid sending a DETOUR
   object through a node which does not support [DETOUR] to reach a
   merge node that does support [DETOUR] and does not support LRO.


5.3 Make-Before-Break on Backup Tunnels

   In supporting make-before-break on backup tunnels, the option of
   using a different LSP-ID is not available. As described in [RSVP-TE],
   when doing a make-before-break on a regular tunnel, the ingress will
   allocate a new LSP ID to be used when creating a new LSP.  Because
   the SESSION object of the current LSP and that of the new LSP are the
   same and Shared-Explicit (SE) is specified, resources will be shared.

   When signalling a backup LSP, the LSP ID used (sent in the
   SENDER_TEMPLATE and the FILTER_SPEC objects) is that of the primary
   LSP which the backup LSP is protecting.  The SESSION object used when



Atlas et al.                                                    [Page 8]


Internet Draft                                                 July 2001


   signalling the backup LSP is the same as the SESSION object of the
   primary LSP.  This behavior is common in [BYPASS] and [DETOUR].


5.3.1 Shared-Explicit and Backup LSPs

   To properly support make-before-break on a backup tunnel, shared-
   explicit must be used on that backup tunnel.  However, if this were
   done simply based upon the SESSION object, as is specified in [RSVP-
   TE], then the backup LSPs and the primary LSPs would share resources.
   This is undesirable, as demonstrated by the following topology.

                   I---------J
                   |         |
              A----B    E----F----G
                   |   /|    |   /
                   |  / |    |  /
                   | /  |    | /
                   |/   |    |/
                   C----D----H

   Consider a primary LSP which goes A-B-C-D-E-F-G.  The backup LSP for
   E might go E-C-D-H-G.  In this case, both the primary LSP and the
   backup LSP traverse the link C-D in the same direction.  If the
   Shared-Explicit means that the primary LSP and backup LSP share
   resources, then only the maximum of the primary LSP's bandwidth and
   the backup LSP's bandwidth would be reserved on C-D.  This would mean
   that insufficient resources are reserved in the event of a failure of
   link E-F.

   To resolve this requires that the "IPv4 (IPv6) tunnel sender address"
   of the FILTER_SPEC be considered when determining whether LSPs should
   share resources once Shared-Explicit is specified.  Instead of
   maintaining one category per SESSION object, two categories would be
   maintained.  The first would be for primary LSPs; the second would be
   for backup LSPs.  The LSPs would be categorized based upon the
   FILTER_SPEC's "IPv4 (IPv6) tunnel sender address" according to the
   following logic:

        a) If a DETOUR object is included in the PATH message, then the
           LSP belongs to the backup category.  This provides
           interoperability with a strict implementation of [DETOUR].

        b) Else if the SESSIONS's "Extended Tunnel ID" is all zeros,
           then the LSP belongs to the primary category.

        c) Else if the "IPv4 (IPv6) tunnel sender address" in the
           SENDER_TEMPLATE or FILTER_SPEC matches the SESSION's



Atlas et al.                                                    [Page 9]


Internet Draft                                                 July 2001


           "Extended Tunnel Id", an LSP belongs to the primary category.

        d) Else an LSP belongs to the backup category.  The "IPv4
           (IPv6) tunnel sender address" in the SENDER_TEMPLATE or
           FILTER_SPEC does not match the SESSION's "Extended Tunnel
           Id"; the PLR's address is in the "IPv4 (IPv6) tunnel sender
           address", indicating that the LSP is a backup.

   This modification of the rules determining what constitutes a
   category to share resources provides seperate accounting for primary
   LSPs in a TE tunnel and for the backup LSPs associated with that TE
   tunnel.  If all backup LSPs always have zero bandwidth reserved, then
   this enhancement is not needed.  Constraining all backup LSPs to use
   zero bandwidth is a severe restriction and unacceptable in some
   situations.


5.3.2 Make-Before-Break with Sender Addresses

   The prior subsection clarifies how Shared-Explicit can be specified
   for backup LSPs.  The Shared-Explicit is required for make-before-
   break, as explained in [RSVP-TE].  The other piece necessary for
   make-before-break is a way of distinguishing the current backup LSP
   from the new backup LSP.  For a regular TE tunnel, this is done by
   changing the LSP ID.  However, the LSP ID is used to associate the
   backup tunnel with a specific primary LSP.  Therefore, the LSP ID
   cannot be changed to do a make-before-break on the backup tunnel.

   The other content of the SENDER_TEMPLATE (and FILTER_SPEC) is the
   "IPv4 (IPv6) tunnel sender address".  As suggested in [BYPASS], the
   PLR will fill out this address with one of the PLR's addresses for
   simple backup LSPs.  Section 4 suggests doing the same for detour
   backup LSPs.

   Any router which can distinguish a backup LSP from a primary LSP must
   do so based upon either the "IPv4 (IPv6) tunnel sender address" in
   the SENDER_TEMPLATE (and FILTER_SPEC) or upon the "Source ID" in the
   DETOUR object.  Therefore, to signal two different backup LSPs from
   the same PLR for the same primary LSP, the PLR must use different IP
   addresses, which are put into the SENDER_TEMPLATE and/or the DETOUR
   object.

   To effect a reroute or a bandwidth change on a backup tunnel, the PLR
   picks one of its IP addresses which is different from that used for
   the current backup LSP in that backup tunnel and which is different
   from that used for primary LSP.  Then the PLR signals the new backup
   LSP and proceeds with a make-before-break as described in [RSVP-TE].




Atlas et al.                                                   [Page 10]


Internet Draft                                                 July 2001


   To support make-before-break on backup tunnels in this manner, the
   PLR must have ownership of two distinct IP addresses.  If the PLR is
   also ingress, then it requires a third distinct IP address, which it
   uses when signalling primary LSPs.  Only the router ID needs to be
   routable.  All three addresses MUST be unique within the MPLS domain,
   and MUST be globally unique if chosen from public address space.


5.4 Catching ResvTears and Appropriate PathErrs

   The PLR behavior described in this section should only start after
   the primary LSP is known to be successfully created.  If the backup
   tunnel is created after a RESV is received for the primary LSP, then
   it suffices to check whether the backup tunnel is up.  If the backup
   tunnel is created when a PATH message is received for the primary
   LSP, then it is necessary that the backup tunnel be up and that a
   RESV has been received for the primary LSP.

   Under those circumstances, the PLR must not forward ResvTear
   [DETOUR].  Instead, when a ResvTear is received, the PLR should move
   traffic to the backup tunnel, if it is up, and then not propagate the
   ResvTear upstream towards the ingress.

   The PLR must also handle certain PathErrs similarly to how it handles
   ResvTears.  If the PLR receives a PathErr with an error code of
   "Policy Control failure", as happens when the primary LSP is
   preempted, or a PathErr with an error code of "Routing Problem" and a
   sub-code of "No route available toward destination", as may happen
   when a link or node fails, then the PLR should similarly move traffic
   to the backup tunnel, if it is up, and then not propagate the PathErr
   upstream towards the ingress.

   According to [RSVP-TE], the PathErr with the code "Policy Control
   failure" occurs when the primary LSP to be preempted as the result of
   another LSP being setup.  This LSP failure caused by resource
   preemption cannot be detected at the ingress based upon IGP (IS-IS or
   OSPF) information.  Therefore the ingress must be explicitly notified
   if the PLR receives this type of PathErr and does not propagate it
   further upstream toward the ingress; if so, the PLR should send a
   PathErr with an error code of "Notify" and an error value of "Tunnel
   locally repaired".


5.5 Handling Resource Preemption

   It is possible for a primary LSP to have its resources preempted, due
   to the arrival and admission of another LSP.  If the PLR is making
   this determination and has a backup tunnel, which is currently up,



Atlas et al.                                                   [Page 11]


Internet Draft                                                 July 2001


   for that primary LSP, then the PLR should move traffic from the
   primary LSP to the backup tunnel and then send a PathErr with an
   error code of "Notify" and an error value of "Tunnel locally
   repaired". When this type of PathErr is received at the ingress, the
   ingress should reroute the tunnel onto a new primary LSP using make-
   before-break.


6. Merge Node Behavior

6.1 Ignore Path Tears Unless From Ingress

                   /--F----G----H--\
                  /   |    |    |   \
                 A----B----C----D----E

                     Primary LSP:  A-B-C-D-E
             Bypass Tunnel's LSP:  B-F-G-H-D

   In the above example, consider what occurs when the link B-C fails.
   B will start using its unsignalled backup path, which goes through
   the bypass tunnel, and C will send a PathTear to D.  If D acts upon
   the PathTear received from C, then D would tear down the remainder of
   the primary (D-E) which is required to deliver traffic sent over the
   unsignalled backup path to the egress. Because B is using an
   unsignalled backup path, D cannot determine that it is a merge node.
   This example indicates that PathTears must be ignored for primary
   LSPs which request local protection.

   However, ignoring all PathTears means that the ingress cannot destroy
   the primary LSP.  This unfortunate loss of capability can be remedied
   by examination of the PathTear message.  If the PathTear's IP
   packet's source IP address matches the "IPv4 (IPv6) tunnel sender
   address" in the SENDER_TEMPLATE object, then the PathTear came from
   the LSP's ingress and should not be ignored.


6.2 Label Space

   To most easily support all types of backup LSPs, a merge node should
   use a platform-wide (aka global) label for an LSP which has requested
   local protection.

   If an implemention does not normally provide platform-wide labels for
   unprotected RSVP-TE LSPs, additional behavior must be defined to
   handle an LSP which changes from requesting local protection to not
   and vice versa.  It is not recommended to change this attribute of a
   TE tunnel without doing a reroute.



Atlas et al.                                                   [Page 12]


Internet Draft                                                 July 2001


6.3 Simple and Detour Backup LSPs

   A router can determine that it is the merge node of either a simple
   backup LSP or a detour backup LSP.  In the latter case, the DETOUR
   object contains one of the merge node's IP addresses.  In the former
   case, if the matching primary LSP is known at the router and the ERO
   in the simple backup LSP's PATH message matches the ERO in the
   primary LSP's PATH message, then the node is the merge node.  If the
   router is the merge node for a simple backup LSP, then the simple
   backup LSP's PATH message is not sent all the way to the egress, but
   is instead merged to the primary LSP and handled at the merge node.
   The merge node is responsible for constructing a RESV based upon the
   primary LSP's RESV, including the RRO, and sending that.

   As long as a router knows that it is the merge node for an existing
   backup LSP, the router will not tear down the primary LSP to the
   egress.


6.4 ResvTears

   When a router receives a ResvTear for an LSP and it is not a PLR for
   that LSP, then the router should propagate the ResvTear towards the
   LSP's ingress.  For each backup LSP where the router is the merge
   node, the ResvTear should also be propagated along the backup LSP
   towards the backup LSP's ingress, a PLR.

   This propagation clearly works for simple and detour backup LSPs.
   For unsignalled backup LSPs, the router does not know it is a merge
   node.

               A----B----C----D
               |    |    |    |
               E----F----G----H

               Primary LSP: A-B-C-D
               Bypass Tunnel 1: A-E-F-G-C
               Bypass Tunnel 2: B-F-G-H-D
               Bypass Tunnel 3: C-G-H-D

   In the above example, consider the behavior when router D fails.  C
   will determine that both the primary LSP and bypass tunnel 3 are
   down.  Therefore, C will send a ResvTear to B.  B will determine that
   bypass tunnel 2 is down and that the primary LSP has been torn down,
   due to receiving the ResvTear.  Therefore, B will send a ResvTear to
   A.  A will determine that the primary LSP is down and will switch to
   using an unsignalled backup path through bypass tunnel 1.  Bypass
   tunnel 1 is still up.



Atlas et al.                                                   [Page 13]


Internet Draft                                                 July 2001


   A will send a PATH message for the primary LSP through bypass tunnel
   1 to C.  C will determine the the next hop in the PATH's ERO is
   unreachable and send a PathErr with error code "Routing Problem" and
   a sub-code of "No route available toward destination".  When A
   receives this PathErr, A will determine that the unsignalled backup
   LSP is no longer available and will propagate that error upstream.


7. Security Considerations

   This draft provides guidlelines for the use of existing protocol
   mechanisms defined in [RSVP-TE], [BYPASS], and [DETOUR] which are
   designed to maximize interoperability.  No new protocol is defined.
   The usage or existing protocol described here does not introduce any
   additional security risks.


8. References

   [RSVP-TE] Awduche, D. et al., "RSVP-TE: Extensions to RSVP for LSP
   Tunnels", Internet Draft, draft-ietf-mpls-rsvp-lsp-tunnel-08.txt,
   February 2001.

   [BYPASS] Swallow, G. and Goguen, R., "RSVP Label Allocation for
   Backup Tunnels", Internet Draft, draft-swallow-rsvp-bypass-label-
   01.txt, November 2000

   [DETOUR] Gan, D. et al., "A Method for MPLS LSP Fast-Reroute Using
   RSVP Detours", Internet Draft, draft-gan-fast-reroute-00.txt, April
   2001

   [GMPLS IS-IS] Kompella, K. et al., "IS-IS Extensions in Support of
   Generalized MPLS", Internet Draft, draft-ietf-isis-gmpls-extensions-
   02.txt, February 2001

   [GMPLS OSPF] Kompella, K. et al., "OSPF Extensions in Support of
   Generalized MPLS", Internet Draft, draft-kompella-ospf-gmpls-
   extensions-01.txt, February 2001

9. Authors' Addresses

   Alia Atlas
   Avici Systems
   101 Billerica Avenue
   N. Billerica, MA 01862
   Voice: +1 (978) 964-2070
   Email: aatlas@avici.com




Atlas et al.                                                   [Page 14]


Internet Draft                                                 July 2001


   Curtis Villamizar
   Email: curtis@avici.com

   Caren Litvanyi
   PO Box 2535
   Cupertino, CA 95015
   Email: litvanyi@synack.net












































Atlas et al.                                                   [Page 15]