Network Working Group                                          WQ. Cheng
Internet-Draft                                                   L. Wang
Intended status: Informational                                     H. Li
Expires: April 18, 2013                                     China Mobile
                                                                  K. Liu
                                                                   J. He
                                           Huawei Technologies Co., Ltd.
                                                                   F. Li
                                                   Research Institute of
                                                       Telecommunication
                                           Transmission,China Academy of
                                             Telecommunication Research,
                                                             MIIT. China
                                                                 J. Yang
                                               ZTE Corporation P.R.China
                                                                 J. Wang
                                             Fiberhome Telecommunication
                                                    Technologies Co.,LTD
                                                        October 15, 2012


            MPLS-TP Shared Ring protection (MSRP) mechanism
             draft-cheng-mpls-tp-shared-ring-protection-00

Abstract

   This document describes requirements and solutions for MPLS-TP Shared
   ring protection (MSRP) in ring topology for point to point (P2P)
   services.  The mechanisms of MSRP are illustrated and analyzed how to
   satisfy the MPLS-TP requirements in RFC5654 for optimized ring
   protection.  MSRP could support wrapping and steering protection
   mechanisms for P2P services, which provide a simple and reliable
   protection switching.  The survivability of the network could be
   improved and the operation and maintain could be more easy.  Ring
   protection solution for p2mp services will be documented in another
   draft latterly.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months



Cheng, et al.            Expires April 18, 2013                 [Page 1]


Internet-Draft                    MSRP                      October 2012


   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 18, 2013.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.































Cheng, et al.            Expires April 18, 2013                 [Page 2]


Internet-Draft                    MSRP                      October 2012


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
     1.1.  Problem statement  . . . . . . . . . . . . . . . . . . . .  4
       1.1.1.  Recovery for Multiple failures . . . . . . . . . . . .  4
       1.1.2.  Upgrade from linear protection to ring protection  . .  5
       1.1.3.  Configuration complexity . . . . . . . . . . . . . . .  5
     1.2.  Terminology and Notation . . . . . . . . . . . . . . . . .  5
     1.3.  Contributing Authors . . . . . . . . . . . . . . . . . . .  6
   2.  Shared ring protection for P2P . . . . . . . . . . . . . . . .  6
     2.1.  Basic conception . . . . . . . . . . . . . . . . . . . . .  6
       2.1.1.  The establishment of the Ring tunnels  . . . . . . . .  7
       2.1.2.  The distribution and management of ring labels . . . .  8
       2.1.3.  Failure detection  . . . . . . . . . . . . . . . . . .  9
     2.2.  P2P wrapping . . . . . . . . . . . . . . . . . . . . . . . 10
       2.2.1.  Wrapping Link Failure  . . . . . . . . . . . . . . . . 10
       2.2.2.  Wrapping node Failure  . . . . . . . . . . . . . . . . 11
     2.3.  P2P steering . . . . . . . . . . . . . . . . . . . . . . . 11
   3.  Coordination protocol  . . . . . . . . . . . . . . . . . . . . 14
   4.  Conclusions and Recommendations  . . . . . . . . . . . . . . . 14
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 14
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 14
   7.  Normative References . . . . . . . . . . . . . . . . . . . . . 15
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15



























Cheng, et al.            Expires April 18, 2013                 [Page 3]


Internet-Draft                    MSRP                      October 2012


1.  Introduction

   As described in 2.5.6.1.  Ring Protection of MPLS-TP requirements
   [RFC5654], several service providers have expressed a high level of
   interest in operating MPLS-TP in ring topologies and require a high
   level of survivability function in these topologies.  MPLS-TP
   networks are often constructed with ring topologies which allow
   service providers setting up a efficient and optimized ring
   protection mechanism to achieve simplified operation and fast
   recovery performance.

   The requirements for MPLS-TP [RFC5654] state that recovery mechanisms
   are optimized for Ring topologies may be developed if it can provide
   following optimization scenarios:

   a.  Minimize the number of OAM entities for protection

   b.  Minimize the number of elements of recovery

   c.  Minimize the number of labels required

   d.  Minimize the amount of control and management-plane transactions

   e.  Minimize the impact on information exchange if control plane
   supported

   This document specifies MPLS-TP Shared-Ring Protection mechanisms
   which can meet all those requirements on Ring protection listed in
   [RFC5654].

   This document focus on the solutions for Point-to-point transport
   path and a related topic in [RFC5654] states the required support for
   point-to-multipoint transport path.  The solution for point-to-
   multipoint solution is under evaluation and will be illustrated in a
   separate document based on the basic conception in this document.

1.1.  Problem statement

1.1.1.  Recovery for Multiple failures

   MPLS-TP is expected to be used in carrier grade metro networks and
   backbone networks for providing mobile backhauling, business
   customers' services and etc., in such kind of application scenarios
   the network survivability are very important.

   According to R106 B in RFC5654, MPLS-TP recovery mechanisms in a ring
   SHOULD protect against multiple failures.  It's expected deploying
   ring protection in ring topology could enhance the network



Cheng, et al.            Expires April 18, 2013                 [Page 4]


Internet-Draft                    MSRP                      October 2012


   survivability to against multiple failures in many cases.  Following
   context provide some more detail illustration to "multiple failures".

   In metro and backbone networks, the single risk factor often affects
   multiple links or nodes.  Some examples of risk factors are given in
   follows:

   - multiple links using fibers in one cable or pipeline

   - Several nodes shared one power supply system

   - weather sensitive micro-wave system

   Once one risk factor happens, multiple near-simultaneous links or
   nodes failures occur and those failed links or nodes may locate on
   single ring as well as on interconnected multiple rings.  The ability
   of ring protecting against multiple failures should cover both
   multiple failures on single ring scenario and multiple failures on
   interconnected multiple rings.

1.1.2.  Upgrade from linear protection to ring protection

   It is beneficial for service providers to upgrade their MPLS-TP based
   network from the linear protection to ring protection without service
   interruption, and supporting in-service insertion and removal of a
   node on the ring.  In order to realize this requirement, the ring
   protection Mechanisms should be developed and optimized to comply
   with this upgrading principle.

1.1.3.  Configuration complexity

   In the application scenarios of deploying linear protection in
   MPLS-TP network, the configuration of protection has close
   relationship with the services, LSP quantities.  Especially in some
   large metro networks with more than ten thousands of services access
   node, the LSP linear protection capabilities of the metro core nodes
   should be large enough to meet the network planning requirements,
   which also leads to the complexity of network protection
   configurations and operations.  While the ring protection is based on
   the mechanisms on section layer, it has loose relationship with the
   services quantities which could simplify the network protection
   configurations and operations.

1.2.  Terminology and Notation

   The following syntax will be used to describe the contents of the
   label stack:




Cheng, et al.            Expires April 18, 2013                 [Page 5]


Internet-Draft                    MSRP                      October 2012


   1.  The label stack will be enclosed in square brackets ("[]").

   2.  Each level in the stack will be separated by the '|' character.

   It should be noted that the label stack may contain additional levels
   however, we only present the levels that are germane to the
   protection mechanism.

   3.  If the Label is assigned by Node x, the Node Name will enclosed
   in bracket(" ()")

1.3.  Contributing Authors

   Wen Ye(China Mobile)


2.  Shared ring protection for P2P

   None

2.1.  Basic conception

   This document introduces an independent logic layer of ring for both
   working path and protection path for shared ring protection in
   MPLS-TP networks.  The logic layer is a ring tunnel on top of the
   working path or the protection path as shown in Figure 1, namely
   working ring tunnel or protection ring tunnel respectively.  Once the
   ring tunnel is established, the configuration, management and
   protection of the ring are all based on the ring tunnel.  One port
   can carry more than one ring tunnel, while one ring tunnel can carry
   several LSPs.

                                               |-------------
                                 |-------------|
                   |-------------|             |
     =====PW1======|             |             |
                   |             |  Ring       |  Physical
     =====PW2======|    LSP      |  Tunnel     |  Port
                   |             |             |
     =====PW3======|             |             |
                   |-------------|             |
                                 |-------------|
                                               |-------------

                   Figure 1 the logic layers of the ring

   The label stack used in MPLS-TP Shared Ring Protection mechanism are
   shown as below.



Cheng, et al.            Expires April 18, 2013                 [Page 6]


Internet-Draft                    MSRP                      October 2012


                +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                |            Ring tunnel Label        |
                +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                |                 LSP Label           |
                +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                |                 PW Label            |
                +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                |                 Payload             |
                +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

        Figure 2 Label Stack used in MPLS-TP Shared Ring Protection

2.1.1.  The establishment of the Ring tunnels

   A ring tunnel is created as per exit node.  The exit node means the
   node on the ring where the traffic leaves the ring.  All the LSPs
   which transverse the ring and exit at the same ring node share the
   same working ring tunnels and protection ring tunnels.  For each exit
   node, 4 ring tunnels are established:

   - 1 clockwise working ring tunnel, protected by

   - 1 anticlockwise protection ring tunnel,

   - 1 anticlockwise working ring tunnel, protected by

   - 1 clockwise protection ring tunnel.

   An example is shown in Figure 3 where Node D behaves as an exit node.
   LSP 1 entering the ring at Node E, LSP2 at Node A and LSP 3 at Node
   B, all leave the ring at Node D. .  To protect these LSPs traversing
   the ring, a clockwise working ring tunnel (RcW_D), E->F->A->B->C->D
   and its protection ring tunnel in the reverse direction (RaP_D),
   D->C->B->A->F->E->D ; Ananticlockwise working ring channel (RaW_D),
   C->B->A->F->E->D and its clockwise protection ring tunnel (RcP_D),
   D->E->F->A->B->C->D are established for Node D. Figure 3 only shows
   RcW_D and RaP_D for readability.  The similar provisioning should be
   repeated for every other node on the ring.  The ring tunnels created
   for the other nodes in Figure 3 when acting as exit node are provided
   as follows:

   To Node A: RcW_A, RaW_A, RcP_A, RaP_A;

   To Node B: RcW_B, RaW_B, RcP_B, RaP_B;

   To Node C: RcW_C, RaW_C, RcP_C, RaP_C;

   To Node E: RcW_E, RaW_E, RcP_E, RaP_E;



Cheng, et al.            Expires April 18, 2013                 [Page 7]


Internet-Draft                    MSRP                      October 2012


   To Node F: RcW_F, RaW_F, RcP_F, RaP_F;

   In Node D, two working ring tunnels, RcW_D and RaW_D are terminated;
   and two protection ring tunnels, RcP_D and RaP_D, are transit.  That
   means through those working ring tunnels with protection ring
   tunnels, LSPs which enter the ring from Node D can reach any other
   nodes on the ring, while Node D can also receive the traffic from any
   other nodes.


                 +---+#############+---+
                 | F |-------------| A | +-- LSP2
                 +---+*************+---+
                 #/*                   *\#
                #/*                     *\#
               #/*                       *\#
             +---+                     +---+
      LSP1-+ | E |                     | B |+-- LSP3
             +---+                     +---+
               #\                       */#
                #\                     */#
                 #\                   */#
                 +---+*************+---+
       LSP1   +--| D |-------------| C |
       LSP2      +---+#############+---+
       LSP3

              ---- physical links
                    **** RcW_D
                    #### RaP_D

                   Figure 3 the Ring tunnels of the ring

2.1.2.  The distribution and management of ring labels

   Ring tunnel labels are distributed by means of downstream-assigned
   mechanism as defined in [RFC3031].  When an MPLS-TP transport path,
   e.g.  LSP, enters the ring, according to the ring ID and the exit
   node, the ingress node pushes the working ring tunnel label and sends
   the traffic to the next hop; The transit nodes of the working ring
   tunnel swap the ring tunnel label and forward the packets to the next
   hop; When arriving at the egress node, the egress node pops the ring
   tunnel label and forwards the packets based on the inner LSP label
   and PW label.Figure 4 shows the label operation in MPLS-TP Shared
   Ring Protection mechanism.  Suppose LSP 1 enters the ring at Node A
   and exit at Node D, the following label operations are executed.

   1.  The traffic LSP1 arrives at Node A with a label stack [LSP1] and



Cheng, et al.            Expires April 18, 2013                 [Page 8]


Internet-Draft                    MSRP                      October 2012


   is supposed to be forwarded in the clockwise direction of the ring.
   The clockwise working ring tunnel label RcW_D will be pushed at Node
   A, the label stack for the forwarded packet at Node A is changed to
   [RcW_D(B)|LSP1]

   2.Transit nodes, in this case Node B and C, forward the packet
   by swapping the working ring tunnel label.  For Example, the label
   [RcW_D(B)|LSP1] is swapped to [RcW_D(C)|LSP1] at Node B.

   3.  When the packet arrives at Node D (i.e. egress node) with label
   stack [RcW_D(D)|LSP1], Node D Pops RcW_D(D) and further deals with
   the inner labels of LSP1.

   4.  All the LSPs exit at the same node share the same Ring tunnel
   label.


                         +---+#####[RaP_D(A)]######+---+
                         | F |---------------------| A | +-- LSP1
                         +---+*****[RcW_D(A)]******+---+
                          #/*                        *\#
               [RaP_D(F)]#/*[RcW_D(F)]       RcW_D(B)]*\#RaP_D(B)
                        #/*                            *\#
                      +---+                          +---+
                      | E |                          | B |
                      +---+                          +---+
                        #\                            */#
               [RaP_D(D)]#\                [RxW_D(C)]*/#RaP_D(C)
                          #\                        */#
                          +---+*****[RcW_D(D)]****+---+
                LSP1  +-- | D |-------------------| C |
                          +---+#####[RaP_D(C)]####+---+

                   -----physical links      ****** RcW_D    ###### RaP_D


                   Figure 4 Label operation of the ring

2.1.3.  Failure detection

   The MPLS-TP section layer OAM is used to monitor the connectivity
   between each two adjacent nodes on the ring using the mechanisms
   defined in [RFC6371].Protection switching occurs on the detection of
   failure on a link in the ring monitored by OAM functions.

   Two end ports of a link form a MEG, and an MEG end point (MEP)
   function is installed in each ring port.  Periodic CC-V OAM packets
   exchange is activated between each pair of MEPs to monitor the link



Cheng, et al.            Expires April 18, 2013                 [Page 9]


Internet-Draft                    MSRP                      October 2012


   health.  Sequential consecutive loss of CC-V packets (3 packets) is
   interpreted as a link failure.

   A node failure is regarded as the failure of two links attached to
   the node.  The two nodes adjacent to the failed node detect the
   failure on the links connected to the failed node.

2.2.  P2P wrapping

   Normal state is shown in Figure 4.  The clockwise LSP1 towards node D
   enters the ring at Node A. In normal state, LSP 1 follows the path
   A->B->C-D, label operation is [LSP1](original data traffic carried by
   LSP 1)->[RCW_D(B)|LSP1](NodeA)->[RCW_D(C)|LSP1](NodeB)->[RCW_D(D)|
   LSP1](NodeC)->[LSP1]( data traffic carried by LSP 1).  Then traffic
   packet will be forwarded on the basis of LSP1.

2.2.1.  Wrapping Link Failure

   When a link failure between Node B and Node C occurrs, both Node B
   and Node C detect the failure by OAM mechanism.  Node B switches the
   clockwise working ring tunnel(RcW_D) to the anticlockwise protection
   ring tunnel (RaP_D)and Node C switches anticlockwise protection ring
   tunnel(RaP_D) to the clockwisework ring tunnel(RcW_D).  The data
   traffic which enters the ring at Node A and exits at Node D follows
   the pathA->B->A->F->E->D->C->D. The label operation is
   [LSP1](Original data packet)-> [RcW_D(B)|LSP1](NodeA)-> [RaP_D(A)|
   LSP1](NodeB)->[RaP_D(F)|LSP1](NodeA)->[RaP_D(E)|LSP1] (NodeF)->
   [RaP_D(D)|LSP1] (NodeE)-> [RaP_D(C)|LSP1] (NodeD)-> [RcW_D(D)|
   LSP1](NodeC)->[LSP1](Exit data packet).


                          +---+#####[RaP_D(F)]######+---+
                          | F |---------------------| A | +-- LSP1
                          +---+*****[RcW_D(A)]******+---+
                          #/*                        *\#
               [RaP_D(E)]#/*[RcW_D(F)]      [RcW_D(B)]*\#RaP_D(A)
                        #/*                            *\#
                      +---+                          +---+
                      | E |                          | B |
                      +---+                          +---+
                        #\                            *x#
               [RaP_D(D)]#\                [RcW_D(C)]*x#RaP_D(B)
                          #\                        *x#
                          +---+*****[RcW_D(D)]****+---+
                LSP1  +-- | D |-------------------| C |
                          +---+#####[RaP_D(C)]####+---+

                -----physical links    xxxx Failure Link



Cheng, et al.            Expires April 18, 2013                [Page 10]


Internet-Draft                    MSRP                      October 2012


                ****** RcW_D           ###### RaP_D


                   Figure 5 Link Failure of P2P Wrapping

2.2.2.  Wrapping node Failure

   When Node B fails, Node A detects the failure between A and B and
   switches the clockwise work ring tunnel(RcW_D) to the anticlockwise
   protection ring tunnel(RaP_D), Node C detects the failure between C
   and B and switches the anticlockwise protection ring tunnel(RaP_D) to
   the clockwise working ring tunnel(RcW_D).  The data traffic which
   enters the ring at Node A and exits at Node D follows the path
   A->F->E->D->C->D. The label operation is [LSP1](original data traffic
   carried by LSP 1)-> [RaP_D(F)|LSP1](NodeA)->[RaP_D(E)|LSP1](NodeF)->
   [RaP_D(D)|LSP1](NodeE)-> [RaP_D(C)|LSP1] (NodeD)->[RcW_D(D)|LSP1]
   (NodeC)->[LSP1](data traffic carried by LSP 1).

                          +---+#####[RaP_D(F)]######+---+
                          | F |---------------------| A | +-- LSP1
                          +---+*****[RcW_D(A)]******+---+
                          #/*                        *\#
               [RaP_D(E)]#/*[RcW_D(F)]      [RcW_D(B)]*\#RaP_D(A)
                        #/*                            *\#
                      +---+                          xxxxx
                      | E |                          x B x
                      +---+                          xxxxx
                        #\                            */#
               [RaP_D(D)]#\                [RcW_D(C)]*/#RaP_D(B)
                          #\                       */#
                          +---+*****[RcW_D(D)]****+---+
                LSP1  +-- | D |-------------------| C |
                          +---+#####[RaP_D(C)]####+---+

                  -----physical links     xxxxxx  Failure Node
                  *****RcW_D              ######  RaP_D


                   Figure 6 Node Failure of P2P Wrapping

2.3.  P2P steering

   Each working ring tunnel is associated with a protection ring tunnel
   in the opposite direction.  Every node needs to know the ring
   topology by configuration or topology discovery.  When the failure
   occurs, the nodes which detect the failure will spread the fault
   information in the opposite direction node by node in the ring
   respectively.  When the node receives the message that informs the



Cheng, et al.            Expires April 18, 2013                [Page 11]


Internet-Draft                    MSRP                      October 2012


   failure, it will quickly figure out the location of the fault by the
   topology information that is maintained by itself, so that it will
   determine whether the LSPs enter the ring from itself needs switch-
   over.  If yes, it will switch the LSPs from the working ring tunnel
   to its protection ring tunnel.  If no, it will ignore the fault
   indication message.

                                                    +--LSP l
  +-+-+-+-+-+-+-+     +---+ ###[RaP_D(F)]### +---+  +-+-+-+-+-+-+-+
  |F|A|B|C|D|E|F|     | F | ---------------- | A |  |A|B|C|D|E|F|A|
  +-+-+-+-+-+-+-+     +---+ ***[RcW_D(A)]*** +---+  +-+-+-+-+-+-+-+
   |I|I|I|S|I|I|                                     |I|I|S|I|I|I|
   +-+-+-+-+-+-+      #/*                     *\#    +-+-+-+-+-+-+
         [RaP_D(E)]  #/*           [RcW_D(B)]  *\# [RaP_D(A)]
                    #/* [RcW_D(F)]              *\#
 +-+-+-+-+-+-+-+   #/*                           *\#
 |E|F|A|B|C|D|E| +---+                            +---+ +-- LSP 2
 +-+-+-+-+-+-+-+ | E |                            | B | +-+-+-+-+-+-+-+
  |I|I|I|I|S|I|  +---+                            +---+ |B|C|D|E|F|A|B|
  +-+-+-+-+-+-+     #\*                            */#   +-+-+-+-+-+-+-+
                     #\* [RcW_D(E)]    [RcW_D(C)] */#     |I|S|I|I|I|I|
         [RaP_D(D)]   #\*                        */#      +-+-+-+-+-+-+
                       #\*                      */# [RaP_D(B)]
 +-+-+-+-+-+-+-+       +---+     [RcW_D(D)]    +---+    +-+-+-+-+-+-+-+
 |D|E|F|A|B|C|D|  +--  | D | xxxxxxxxxxxxxxxxx | C |    |C|D|E|F|A|B|C|
 +-+-+-+-+-+-+-+ LSP 1 +---+     [RaP_D(C)]    +---+    +-+-+-+-+-+-+-+
  |I|I|I|I|I|S|  LSP 2                                   |S|I|I|I|I|I|
  +-+-+-+-+-+-+                                          +-+-+-+-+-+-+

         ----- physical links  ***** RcW_D  ##### RaP_D



      Figure 7 the P2P steering operation and protection switching(1)

   Steering Example is shown in figure 7.  LSP1 enters the ring from
   Node A while Node B has an LSP2, and both of them have the same
   destination node D. As per Figure 7, in normal state, LSP1 follows
   the path A->B->C->D, the label operation is [LSP1](original data
   traffic carried by LSP 1 )->[RcW_D(B)|LSP1](NodeA)->[RcW_D(C)|
   LSP1](NodeB)->[RcW_D(D)|LSP1](NodeC)->[LSP1] ( data traffic carried
   by LSP 1) .  LSP2 goes through the path B->C->D, the label operation
   is [LSP2]->[RcW_D(C)|LSP2](NodeB)->[RcW_D(D)|LSP2](NodeC)-> [LSP2] (
   data traffic carried by LSP 1) .

   If the link between C and D breaks down, as Figure 7 shows, according
   to the fault detection function of each link, Node D will find out
   that there is a failure in the link between C and D, and it will



Cheng, et al.            Expires April 18, 2013                [Page 12]


Internet-Draft                    MSRP                      October 2012


   update the link state of its ring topology, changing the link state
   between C and D from normal to fault, as Figure 7 shows.  In the
   direction that goes away from the failure point, Node D will send the
   state report message to Node E, informing Node E of the fault between
   C and D, and E will update the link state of its ring topology,
   changing the link state between C and D from normal to fault.  And
   the like, the state report message is sent from node to node in the
   clockwise direction.Similar to Node D, Node C will spread the failure
   information in anti-clockwise direction.

   Until Node A updates the link state of its ring topology, and knows
   there is a fault within its working path.  And at the same time it
   can get the conclusion that the anticlockwise path from A to D is
   working all right. so that Node A will switch the LSP1 operation to
   the anticlockwise tunnel.

   LSP1 will follow the path A->F->E->D, the label operation is
   [LSP1](original data traffic carried by LSP 1 )->[RaP_D(F)|
   LSP1](NodeA)->[RaP_D(E)|LSP1](NodeF)->[RaP_D(D)|LSP1](NodeE)->[LSP1]
   ( data traffic carried by LSP 1).

   The same goes with LSP2 operation, when Node B updates the link state
   of its ring topology, and find out the working path fault, so it will
   stop sending the LSP2 operation in clockwise direction and switch the
   LSP2 to the anticlockwise protection tunnel.  LSP2 goes through the
   path B->A->F->E->D, the label operation is [LSP2](original data
   traffic carried by LSP 2 )-> [RaP_D(A)|LSP2](NodeB)->[RaP_D(F)|
   LSP2](NodeA)->[RaP_D(E)|LSP2](NodeF)->[RaP_D(D)|LSP2](NodeE)->[LSP2]
   ( data traffic carried by LSP 2).

   Imagine the ring between A and B breaks down, as figure 8 shows.
   Like above, Node B will find out that there is a fault in the link
   between A and B, and it will update the link state of its ring
   topology, changing the link state between A and B from normal to
   fault.  The state report message is sent from node to node in the
   clockwise direction, informing every node that there is a fault
   between node A and B, so that every node updates the link state of
   its ring topology.  Node A will find out the working path fault of
   LSP1 and switch LSP1 to protection Ring tunnel, while Node B finds
   out the LSP2 working path is all right and there is no need for
   switching.










Cheng, et al.            Expires April 18, 2013                [Page 13]


Internet-Draft                    MSRP                      October 2012


                                                      +-- LSP l
 +-+-+-+-+-+-+-+      +---+ ###[RaP_D(F)]####  +---+  +-+-+-+-+-+-+-+
 |F|A|B|C|D|E|F|      | F | -----------------  | A |  |A|B|C|D|E|F|A|
 +-+-+-+-+-+-+-+      +---+ ***[RcW_D(A)]****  +---+  +-+-+-+-+-+-+-+
  |I|S|I|I|I|I|       #/*                       x      |S|I|I|I|I|I|
  +-+-+-+-+-+-+      #/*                         x     +-+-+-+-+-+-+
        [RaP_D(E)]  #/*[RcW_D(F)]       [RcW_D(B)]x [RaP_D(A)]
                   #/*                             x    +-- LSP 2
 +-+-+-+-+-+-+-+  +---+                             +---++-+-+-+-+-+-+-+
 |E|F|A|B|C|D|E|  | E |                             | B ||B|C|D|E|F|A|B|
 +-+-+-+-+-+-+-+  +---+                             +---++-+-+-+-+-+-+-+
  |I|I|S|I|I|I|     #\*                            */#    |I|I|I|I|I|S|
  +-+-+-+-+-+-+      #\*[RcW_D(E)]    [RcW_D(C)]  */#     +-+-+-+-+-+-+
          [RaP_D(D)]  #\*                        */# [RaP_D(B)]
 +-+-+-+-+-+-+-+       #\*                      */#     +-+-+-+-+-+-+-+
 |D|E|F|A|B|C|D|       +---+ ***[RcW_D(D)]*** +---+     |C|D|E|F|A|B|C|
 +-+-+-+-+-+-+-+  +--  | D | ---------------- | C |     +-+-+-+-+-+-+-+
  |I|I|I|S|I|I|   LSP1 +---+ ###[RaP_D(C)]### +---+      |I|I|I|I|S|I|
  +-+-+-+-+-+-+   LSP2                                   +-+-+-+-+-+-+

              ----- physical links  ***** RcW_D  ##### RaP_D




      Figure 8 the P2P steering operation and protection switching(2)


3.  Coordination protocol

   TBD


4.  Conclusions and Recommendations

   TBD


5.  IANA Considerations

   None


6.  Security Considerations

   TBD





Cheng, et al.            Expires April 18, 2013                [Page 14]


Internet-Draft                    MSRP                      October 2012


7.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3031]  Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
              Label Switching Architecture", RFC 3031, January 2001.

   [RFC5654]  Niven-Jenkins, B., Brungard, D., Betts, M., Sprecher, N.,
              and S. Ueno, "Requirements of an MPLS Transport Profile",
              RFC 5654, September 2009.

   [RFC6371]  Busi, I. and D. Allan, "Operations, Administration, and
              Maintenance Framework for MPLS-Based Transport Networks",
              RFC 6371, September 2011.


Authors' Addresses

   Weiqiang Cheng
   China Mobile
   No.32 Xuanwumen West Street
   Beijing  100053
   China

   Email: chengweiqiang@chinamobile.com


   Lei Wang
   China Mobile
   No.32 Xuanwumen West Street
   Beijing  100053
   China

   Email: Wangleiyj@chinamobile.com


   Han Li
   China Mobile
   No.32 Xuanwumen West Street
   Beijing  100053
   China

   Email: Lihan@chinamobile.com







Cheng, et al.            Expires April 18, 2013                [Page 15]


Internet-Draft                    MSRP                      October 2012


   Kai Liu
   Huawei Technologies Co., Ltd.
   Huawei base, Bantian, Longgang District
   Shenzhen 518129
   China

   Email: alex.liukai@huawei.com


   Jia He
   Huawei Technologies Co., Ltd.
   Huawei base, Bantian, Longgang District
   Shenzhen 518129
   China

   Email: hejia@huawei.com


   Fang Li
   Research Institute of Telecommunication Transmission,China Academy of Telecommunication Research, MIIT. China
   Number 52, Huayuan street, Haidian District
   Shenzhen 100191
   China

   Email: lifang@ritt.cn


   Jian Yang
   ZTE Corporation P.R.China
   ZTE Industrial Zone,Liuxian Road, Xili District, Shenzhen
   Shenzhen 518055
   China

   Email: yang.jian90@zte.com.cn


   Junfang Wang
   Fiberhome Telecommunication Technologies Co.,LTD
   No.5, Dongxin Lu, Guandong Industrial Park, Wuhan, Hubei
   Wuhan 430073
   China

   Email: wjf@fiberhome.com.cn








Cheng, et al.            Expires April 18, 2013                [Page 16]