Internet Engineering Task Force H. Chen
Internet-Draft Huawei Technology, Inc.
Intended status: Standards Track N. So
Expires: January 13, 2011 Verison Business
July 12, 2010
Extensions to RSVP-TE for P2MP LSP Ingress Local Protection
draft-chen-mpls-p2mp-ingress-protection-01.txt
Abstract
This document describes extensions to Resource Reservation Protocol -
Traffic Engineering (RSVP-TE) for locally protecting ingress nodes of
Traffic Engineered (TE) point-to-multipoint (P2MP) Label Switched
Paths (LSPs) in Multi-Protocol Label Switching (MPLS) and Generalized
MPLS (GMPLS) networks.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 13, 2011.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
Chen & So Expires January 13, 2011 [Page 1]
Internet-Draft P2MP LSP Ingress Protection July 2010
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Conventions Used in This Document . . . . . . . . . . . . . . 4
4. Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4.1. An Example of Ingress Local Protection . . . . . . . . . . 4
4.2. Set up of Backup P2MP sub Tree . . . . . . . . . . . . . . 5
4.3. Forwarding State for Backup P2MP sub Tree . . . . . . . . 6
4.4. Detection of Failure in Ingress . . . . . . . . . . . . . 6
5. LSP Information Message . . . . . . . . . . . . . . . . . . . 7
5.1. Format of LSP Information Message . . . . . . . . . . . . 7
5.2. Processing of LSP Information Message . . . . . . . . . . 8
6. LSP Information Confirmation Message . . . . . . . . . . . . . 8
6.1. Format of LSP Information Confirmation Message . . . . . . 9
6.2. Processing of LSP Information Confirmation Message . . . . 9
7. PATH Messages for Backup P2MP sub Tree . . . . . . . . . . . . 9
7.1. Construction of PATH Messages . . . . . . . . . . . . . . 10
7.2. Processing of PATH Messages . . . . . . . . . . . . . . . 11
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
9. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 11
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
10.1. Normative References . . . . . . . . . . . . . . . . . . . 12
10.2. Informative References . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12
Chen & So Expires January 13, 2011 [Page 2]
Internet-Draft P2MP LSP Ingress Protection July 2010
1. Introduction
"Fast Reroute Extensions to RSVP-TE for LSP Tunnels" RFC4090
describes two methods to protect P2P LSP tunnels or paths at local
repair points. For a P2P LSP, the local repair points may comprise a
plurality of intermediate nodes between the ingress node and the
egress node of the P2P LSP. The first method is a one-to-one backup
method, where a detour backup P2P LSP for each protected P2P LSP is
created at each potential point of local repair. The second method
is a facility bypass backup protection method, where a bypass backup
P2P LSP tunnel is created using MPLS label stacking to protect a
potential failure point for a set of P2P LSP tunnels. The bypass
backup tunnel can protect a set of P2P LSPs that have similar backup
constraints.
"Extensions to RSVP-TE for P2MP TE LSPs" RFC4875 describes how to use
the one-to-one backup method and facility bypass backup method to
protect a link or intermediate node failure on the path of a P2MP
LSP. However, there is no mention of locally protecting an ingress
node failure in a protected P2MP LSP.
The existing methods for protecting an ingress node of a P2MP LSP
that is from the ingress node to a plurality of destination nodes may
be classified into two categories. The first category uses a backup
P2MP LSP that is from a backup ingress node to the plurality of
destination nodes to protect the ingress node. The disadvantages of
this class of methods include more network resource such as computer
power and link bandwidth consumption since the backup P2MP LSP is
from the backup ingress node to the plurality of destination nodes.
The second category extends the existing methods for protecting an
intermediate node of a P2P LSP to protect an ingress node of a P2MP
LSP. The disadvantages of this class of methods include extra work
for refreshing PATH messages and processing RESV messages for the
P2MP LSP in the backup ingress node.
This document defines extensions to RSVP-TE for locally protecting an
ingress node of a Traffic Engineered (TE) point-to-multipoint (P2MP)
Label Switched Path through using a backup P2MP sub tree. The
disadvantages in the existing methods for protecting an ingress node
of a P2MP LSP mentioned above disappear in the protection mechanism
described below.
2. Terminology
This document uses terminologies defined in RFC2205, RFC3031,
RFC3209, RFC3473, RFC4090, RFC4461, and RFC4875.
Chen & So Expires January 13, 2011 [Page 3]
Internet-Draft P2MP LSP Ingress Protection July 2010
3. Conventions Used in This Document
The key words "MUST", "MUST NOT","REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119.
4. Mechanism
This section briefly describes a solution that locally protects an
ingress node of a P2MP LSP through using a backup P2MP sub tree. We
start with a simple example, and then present different parts of the
solution, which includes the creation of the backup P2MP sub tree,
the forwarding state for the backup P2MP sub tree, and the detection
of a failure in the ingress node.
4.1. An Example of Ingress Local Protection
The figure 1 illustrates an example of using a backup P2MP sub tree
to locally protect the ingress of a P2MP LSP. The P2MP LSP to be
protected is from ingress node R1 to three egress/leaf nodes: L1, L2
and L3. The backup P2MP sub tree used to protect the ingress node R1
is from backup ingress node Ra to the next hop nodes R2 and R4 of the
ingress node R1 along the P2MP LSP. The traffic from source S may be
delivered to both R1 and Ra. R1 introduces the traffic into the P2MP
LSP, which is sent to the egress/leaf nodes L1, L2 and L3 along the
P2MP LSP. Ra normally does not put the traffic into the backup P2MP
sub tree, which is from Ra to R2 and R4. There may be a BFD session
between ingress node R1 and backup ingress node Ra. Ra uses this BFD
session to detect the failure of ingress R1. When Ra detects the
failure of R1, it imports the traffic from the source S into the
backup P2MP sub tree. The traffic from the sub tree is merged into
the P2MP LSP at R2 and R4, and then sent to the egress/leaf nodes L1,
L2 and L3 along the P2MP LSP.
Chen & So Expires January 13, 2011 [Page 4]
Internet-Draft P2MP LSP Ingress Protection July 2010
[R2]======[R3]=====[L1]
// |
// |
// |
// |
// /
// /
// /
+---[R1]======[R4]====[R5]=====[L2]
| ! / / \\
| ! / / \\
[S]--| ! / / \\
| ! / / \\
| !/ / \\
+---[Ra]---[Rb] \\
\\
\\
[L3]
Figure 1: P2MP sub Tree for Locally Protecting Ingress
After the failure of the ingress node R1, the refresh of the PATH
messages for the ingress node is not needed. Each of the next-hop
nodes of the ingress node will receive the PATH messages and the
refresh of the PATH messages for the backup P2MP sub tree from the
backup ingress node Ra, which make the P2MP LSP alive.
4.2. Set up of Backup P2MP sub Tree
For the ingress node of the P2MP LSP, a backup ingress node is
designated to protect the ingress node. The backup ingress node
initiates the creation of the backup P2MP sub tree from the backup
ingress node to the next-hop nodes of the ingress node of the P2MP
LSP based on the information about the P2MP LSP. The ingress node of
the P2MP LSP sends the information about the P2MP LSP to the backup
ingress node.
The backup ingress node sets up the backup P2MP sub tree in a way
similar to setting up a P2MP tree or LSP from the signaling's point
of view. It constructs and sends RSVP-TE PATH messages along the
path for the backup P2MP sub tree with the final destinations (i.e,
egress/leaf nodes) that are the same as those of the P2MP LSP,
receives and processes RSVP-TE RESV messages that response to the
PATH messages.
Chen & So Expires January 13, 2011 [Page 5]
Internet-Draft P2MP LSP Ingress Protection July 2010
4.3. Forwarding State for Backup P2MP sub Tree
The forwarding state for the backup P2MP sub tree is different from
that for a P2MP LSP. After receiving the RSVP-TE RESV messages for
the backup P2MP sub tree, the backup ingress node creates a
forwarding entry with an inactive state or flag. This forwarding
entry with an inactive state or flag is called an inactive forwarding
entry. In a normal operation, this inactive forwarding entry is not
used to forward any data traffic to be transported by the P2MP LSP
even though the data traffic is delivered to the backup ingress node
from an external node such as source node S in the above example or
network. The forwarding entry for a P2MP LSP is with an active state
or flag. Thus when the data traffic from the external node or
network reaches the ingress node of the P2MP LSP, it is imported into
the P2MP LSP tunnel through the active forwarding entry on the
ingress node.
On each of the next-hop nodes of the ingress node of the P2MP LSP,
the forwarding entry for the backup P2MP sub tree is created
optionally with an inactive state or flag when the backup P2MP sub
tree is set up.
When a failure of the ingress node happens, the state or flag of the
forwarding entry for the backup P2MP sub tree on the backup ingress
node is set to be active, and the forwarding entry for the backup
P2MP sub tree on each of the next-hop nodes of the ingress node is
also set to be active. Thus when the data traffic from the external
node or network reaches the backup ingress node, it is imported into
the backup P2MP sub tree on the backup ingress node through the
active forwarding entry on the backup ingress node. When the data
traffic arrives at the next-hop nodes of the ingress node through the
backup P2MP sub tree that is from the backup ingress node to the
next-hop nodes of the ingress node, the data traffic is merged into
the P2MP LSP on these next-hop nodes and then transported to the
destinations of the P2MP LSP.
4.4. Detection of Failure in Ingress
There are a number of failures in the ingress node of a P2MP LSP.
The failures in the ingress that the backup ingress node should
detect include two classes of failures. One class of failures is any
failure that will cause the traffic from the external node or network
can not be delivered from the ingress node to egress nodes of the
P2MP LSP. The death of the signalling protocol MPLS RSVP-TE is such
a failure. This failure will cause the next hop nodes to bring down
the P2MP LSP. The death of the ingress node also belongs to this
class of failures.
Chen & So Expires January 13, 2011 [Page 6]
Internet-Draft P2MP LSP Ingress Protection July 2010
Another class of failures are the failures that lead to the ingress
node not receive the traffic from the traffic source. The failure of
the link over which the traffic is delivered to the ingress node for
importing into the P2MP LSP is such a failure.
After the backup ingress node detects any above failure in the
ingress node, it imports the traffic from the traffic source into the
backup P2MP sub tree. The traffic from the backup ingress node via
the sub tree is merged into the P2MP LSP on the next-hop nodes of the
ingress of the P2MP LSP, and then transported to the egress/leaf
nodes of the P2MP LSP.
5. LSP Information Message
LSP information messages are used to transfer the information about a
P2MP LSP to a backup ingress node from an ingress node. This section
describes the format of an LSP information message and processing of
the message.
5.1. Format of LSP Information Message
The format of a P2MP LSP information message is illustrated below.
<LSP Information Message> ::=
<Common Header> [ <INTEGRITY> ]
[ [<MESSAGE_ID_ACK> | <MESSAGE_ID_NACK>] ...]
[ <MESSAGE_ID> ]
<SESSION> <RSVP_HOP>
<TIME_VALUES>
[ <EXPLICIT_ROUTE> ]
<LABEL_REQUEST>
[ <PROTECTION> ]
[ <LABEL_SET> ... ]
[ <SESSION_ATTRIBUTE> ]
[ <NOTIFY_REQUEST> ]
[ <ADMIN_STATUS> ]
[ <POLICY_DATA> ... ]
<sender descriptor>
[<S2L sub-LSP descriptor list>]
<RECORD_ROUTE>
<S2L sub LSP flow descriptor list>
Figure 2
The formats and values of the objects in a P2MP LSP information
Chen & So Expires January 13, 2011 [Page 7]
Internet-Draft P2MP LSP Ingress Protection July 2010
message are similar to or the same as those of the corresponding
objects defined in RFC4875. The values of the RECORD_ROUTE and the
S2L sub LSP flow descriptor list describe the path that the P2MP LSP
traverses, which may be obtained from the RECORD_ROUTE object and the
S2L sub-LSP flow descriptor list in a RSVP-TE RESV message that the
ingress node of the P2MP LSP receives.
The values of the fields in the common header in a P2MP LSP
information message is similar to or the same as those in the common
header in an existing RSVP-TE message such as a PATH message that the
ingress node of the P2MP LSP sends to one of the next-hop nodes of
the ingress node. The value of the Msg Type field in the common
header in the P2MP LSP information message will be a new number such
as 68 for the LSP information message, or may be another number
assigned by Internet Assigned Numbers Authority (IANA).
5.2. Processing of LSP Information Message
The ingress node of a P2MP LSP sends a RSVP-TE LSP information
message for the P2MP LSP to a backup ingress node of the P2MP LSP.
Similar to sending an existing RSVP-TE message such as a PATH
message, the ingress node sends a updated RSVP-TE LSP information
message to the backup ingress node whenever there is a change in the
RSVP-TE LSP information message; the ingress node may send the same
RSVP-TE LSP information message to the backup ingress node every
refresh interval if there is not any change in the RSVP-TE LSP
information message.
When the backup ingress node receives the RSVP-TE LSP information
message from the ingress node, the backup ingress node stores the
information about the P2MP LSP, constructs a PATH message or a
plurality of PATH messages based on the information about the P2MP
LSP, and sends the PATH messages downstream accordingly. If the
backup ingress node does not receive any RSVP-TE LSP information
message for the P2MP LSP for a period of time such as a cleanup
timeout interval, the backup ingress node removes the information
about the P2MP LSP, constructs a PathTear message or a plurality of
PathTear messages, and sends the PathTear messages downstream
accordingly.
6. LSP Information Confirmation Message
LSP information confirmation messages are used to confirm that the
corresponding LSP information messages are received. With the
confirmation messages, the refresh of the LSP information messages is
not needed. This section describes the format of an LSP information
confirmation message and processing of the message.
Chen & So Expires January 13, 2011 [Page 8]
Internet-Draft P2MP LSP Ingress Protection July 2010
6.1. Format of LSP Information Confirmation Message
The format of a P2MP LSP information confirmation message is
illustrated below.
<LSP Information Confirmation Message> ::=
<Common Header> [ <INTEGRITY> ]
[ [<MESSAGE_ID_ACK> | <MESSAGE_ID_NACK>] ...]
[ <MESSAGE_ID> ]
<SESSION> <RSVP_HOP>
<sender descriptor>
Figure 3
The formats and values of the objects in a P2MP LSP information
confirmation message are similar to or the same as those of the
corresponding objects defined in RFC4875.
The values of the fields in the common header in a P2MP LSP
information confirmation message is similar to or the same as those
in the common header in an existing RSVP-TE message such as a PATH
message that the ingress node of the P2MP LSP sends to one of the
next-hop nodes of the ingress node. The value of the Msg Type field
in the common header in the P2MP LSP information confirmation message
will be a new number such as 69 for the LSP information confirmation
message, or may be another number assigned by Internet Assigned
Numbers Authority (IANA).
6.2. Processing of LSP Information Confirmation Message
When the backup ingress node receives a RSVP-TE LSP information
message from the ingress node of a P2MP LSP, the backup ingress node
constructs and sends an LSP information confirmation message to the
ingress node to acknowledge the ingress node that the LSP information
message has been received.
After the ingress node receives the LSP information confirmation
message, it stops refreshing the LSP information message.
7. PATH Messages for Backup P2MP sub Tree
PATH messages for a backup P2MP sub tree has the same format as PATH
messages for a P2MP LSP defined in RFC 4875. This section describes
the construction of the PATH messages for the backup P2MP sub tree,
which is followed by processing of the PATH messages.
Chen & So Expires January 13, 2011 [Page 9]
Internet-Draft P2MP LSP Ingress Protection July 2010
7.1. Construction of PATH Messages
When a backup ingress node receives an LSP information message, it
checks the information about the P2MP LSP in the message to see
whether the message is a new message for the P2MP LSP or the
information in the message is changed compared with the information
in a previous message for the P2MP LSP received. If the message is a
new message or the information in the message is changed, then the
PATH messages for the backup P2MP sub tree are to be constructed as
follows.
At first, a path to the next-hop nodes of the ingress node of the
P2MP LSP is to be computed. The path must satisfy the constraints
for the P2MP LSP and not go through the ingress node.
If a path is computed successfully, then the PATH messages for the
backup P2MP sub tree are constructed based on the path computed and
the information message received, and sent downstream accordingly.
After sending the PATH messages, the backup ingress node receives
RESV messages from downstream nodes that response the PATH messages,
processes the RESV messages and creates forwarding state based on the
information in the RESV messages.
If a path can not be found, then the backup ingress node may tear
down the backup P2MP sub tree that is created based the previous
information message for the P2MP LSP through constructing and sending
PathTear messages downstream accordingly if the backup P2MP sub tree
exists.
Constructing a PATH message based on an LSP information message and a
computed path comprises constructing a common header and a first
group of objects such as a SESSION object, a SESSION_ATTRIBUTE object
and a TIME_VALUES object, a second group of objects such as a
RSVP_HOP object and a RECORD_ROUTE object, and a third group of
objects such as a SENDER_TEMPLATE object, an EXPLICIT_ROUTE object
and objects in an S2L sub-LSP descriptor list for the PATH message.
The common header for the PATH message may be constructed through
setting the Vers field, the Flags field and the Reserved field in the
common header of the PATH message to the corresponding values of the
Vers field, the Flags field and the Reserved field in the common
header of the LSP information message. The other fields such as the
Msg Type field, RSVP Checksum field, Send_TTL field and RSVP Length
field may be set in a way similar to or same as setting them in a
normal PATH message.
The first group of objects for the PATH message may be constructed
through copying the corresponding objects from the LSP information
Chen & So Expires January 13, 2011 [Page 10]
Internet-Draft P2MP LSP Ingress Protection July 2010
message. The second group of objects may be constructed in a similar
or same way for constructing them in a normal PATH message.
In the third group, the SENDER_TEMPLATE object may be constructed
through setting the tunnel sender address field, the first Reserved
field and the LSP ID field in the object to the corresponding values
of the tunnel sender address field, the first Reserved field and the
LSP ID field in the SENDER_TEMPLATE object in the LSP information
message, setting the Sub-Group Originator ID field to the TE Router
ID of the backup ingress node, and setting the second Reserved field
and the Sub-Group ID in a similar or same way for setting them in a
normal PATH message.
The EXPLICIT_ROUTE object and the objects in the S2L sub-LSP
descriptor list for the PATH message may be constructed through
combining the path computed to the next-hop nodes of the ingress node
and the path from the next-hop nodes to the destination nodes of the
P2MP LSP that may be obtained from the RECORD_ROUTE object and the
objects for the S2L sub-LSP flow descriptor list in the LSP
information message. Alternatively, a plurality of intermediate
nodes and links in the path from a next-hop node of the ingress node
to a destination node may be removed and thus the path from the next-
hop node to the destination may be represented just by the
destination node.
7.2. Processing of PATH Messages
The processing of PATH messages on the intermediate nodes along the
backup P2MP sub tree is the same as the processing of PATH messages
for a P2MP LSP.
On each of the next-hop nodes of the ingress node of the P2MP LSP,
after receiving a PATH message for the backup P2MP sub tree from a
upstream node, it may merge the PATH message with a number of PATH
messages that it sends to its next-hop nodes for the P2MP LSP.
Alternatively, it may generate a number of PATH messages based on the
PATH message received and sends the PATH messages to its next-hop
nodes accordingly.
8. IANA Considerations
TBD
9. Acknowledgement
The author would like to thank Quintin Zhao for his valuable comments
Chen & So Expires January 13, 2011 [Page 11]
Internet-Draft P2MP LSP Ingress Protection July 2010
on this draft.
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3692] Narten, T., "Assigning Experimental and Testing Numbers
Considered Useful", BCP 82, RFC 3692, January 2004.
[RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S.
Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
Functional Specification", RFC 2205, September 1997.
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
Label Switching Architecture", RFC 3031, January 2001.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
Tunnels", RFC 3209, December 2001.
[RFC3473] Berger, L., "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Resource ReserVation Protocol-Traffic
Engineering (RSVP-TE) Extensions", RFC 3473, January 2003.
[RFC4090] Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
May 2005.
[RFC4461] Yasukawa, S., "Signaling Requirements for Point-to-
Multipoint Traffic-Engineered MPLS Label Switched Paths
(LSPs)", RFC 4461, April 2006.
[RFC4875] Aggarwal, R., Papadimitriou, D., and S. Yasukawa,
"Extensions to Resource Reservation Protocol - Traffic
Engineering (RSVP-TE) for Point-to-Multipoint TE Label
Switched Paths (LSPs)", RFC 4875, May 2007.
10.2. Informative References
Chen & So Expires January 13, 2011 [Page 12]
Internet-Draft P2MP LSP Ingress Protection July 2010
Authors' Addresses
Huaimo Chen
Huawei Technology, Inc.
Boston, MA
US
Email: Huaimochen@huawei.com
Ning So
Verison Business
2400 North Glenville Drive
Richardson, TX 75082
USA
Email: Ning.So@verizonbusiness.com
Chen & So Expires January 13, 2011 [Page 13]