Network Working Group WQ. Cheng
Internet-Draft L. Wang
Intended status: Informational H. Li
Expires: April 18, 2013 China Mobile
K. Liu
J. He
Huawei Technologies Co., Ltd.
F. Li
Research Institute of
Telecommunication
Transmission,China Academy of
Telecommunication Research,
MIIT. China
J. Yang
ZTE Corporation P.R.China
J. Wang
Fiberhome Telecommunication
Technologies Co.,LTD
October 15, 2012
MPLS-TP Shared Ring protection (MSRP) mechanism
draft-cheng-mpls-tp-shared-ring-protection-00
Abstract
This document describes requirements and solutions for MPLS-TP Shared
ring protection (MSRP) in ring topology for point to point (P2P)
services. The mechanisms of MSRP are illustrated and analyzed how to
satisfy the MPLS-TP requirements in RFC5654 for optimized ring
protection. MSRP could support wrapping and steering protection
mechanisms for P2P services, which provide a simple and reliable
protection switching. The survivability of the network could be
improved and the operation and maintain could be more easy. Ring
protection solution for p2mp services will be documented in another
draft latterly.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
Cheng, et al. Expires April 18, 2013 [Page 1]
Internet-Draft MSRP October 2012
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 18, 2013.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Cheng, et al. Expires April 18, 2013 [Page 2]
Internet-Draft MSRP October 2012
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1. Problem statement . . . . . . . . . . . . . . . . . . . . 4
1.1.1. Recovery for Multiple failures . . . . . . . . . . . . 4
1.1.2. Upgrade from linear protection to ring protection . . 5
1.1.3. Configuration complexity . . . . . . . . . . . . . . . 5
1.2. Terminology and Notation . . . . . . . . . . . . . . . . . 5
1.3. Contributing Authors . . . . . . . . . . . . . . . . . . . 6
2. Shared ring protection for P2P . . . . . . . . . . . . . . . . 6
2.1. Basic conception . . . . . . . . . . . . . . . . . . . . . 6
2.1.1. The establishment of the Ring tunnels . . . . . . . . 7
2.1.2. The distribution and management of ring labels . . . . 8
2.1.3. Failure detection . . . . . . . . . . . . . . . . . . 9
2.2. P2P wrapping . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.1. Wrapping Link Failure . . . . . . . . . . . . . . . . 10
2.2.2. Wrapping node Failure . . . . . . . . . . . . . . . . 11
2.3. P2P steering . . . . . . . . . . . . . . . . . . . . . . . 11
3. Coordination protocol . . . . . . . . . . . . . . . . . . . . 14
4. Conclusions and Recommendations . . . . . . . . . . . . . . . 14
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
6. Security Considerations . . . . . . . . . . . . . . . . . . . 14
7. Normative References . . . . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15
Cheng, et al. Expires April 18, 2013 [Page 3]
Internet-Draft MSRP October 2012
1. Introduction
As described in 2.5.6.1. Ring Protection of MPLS-TP requirements
[RFC5654], several service providers have expressed a high level of
interest in operating MPLS-TP in ring topologies and require a high
level of survivability function in these topologies. MPLS-TP
networks are often constructed with ring topologies which allow
service providers setting up a efficient and optimized ring
protection mechanism to achieve simplified operation and fast
recovery performance.
The requirements for MPLS-TP [RFC5654] state that recovery mechanisms
are optimized for Ring topologies may be developed if it can provide
following optimization scenarios:
a. Minimize the number of OAM entities for protection
b. Minimize the number of elements of recovery
c. Minimize the number of labels required
d. Minimize the amount of control and management-plane transactions
e. Minimize the impact on information exchange if control plane
supported
This document specifies MPLS-TP Shared-Ring Protection mechanisms
which can meet all those requirements on Ring protection listed in
[RFC5654].
This document focus on the solutions for Point-to-point transport
path and a related topic in [RFC5654] states the required support for
point-to-multipoint transport path. The solution for point-to-
multipoint solution is under evaluation and will be illustrated in a
separate document based on the basic conception in this document.
1.1. Problem statement
1.1.1. Recovery for Multiple failures
MPLS-TP is expected to be used in carrier grade metro networks and
backbone networks for providing mobile backhauling, business
customers' services and etc., in such kind of application scenarios
the network survivability are very important.
According to R106 B in RFC5654, MPLS-TP recovery mechanisms in a ring
SHOULD protect against multiple failures. It's expected deploying
ring protection in ring topology could enhance the network
Cheng, et al. Expires April 18, 2013 [Page 4]
Internet-Draft MSRP October 2012
survivability to against multiple failures in many cases. Following
context provide some more detail illustration to "multiple failures".
In metro and backbone networks, the single risk factor often affects
multiple links or nodes. Some examples of risk factors are given in
follows:
- multiple links using fibers in one cable or pipeline
- Several nodes shared one power supply system
- weather sensitive micro-wave system
Once one risk factor happens, multiple near-simultaneous links or
nodes failures occur and those failed links or nodes may locate on
single ring as well as on interconnected multiple rings. The ability
of ring protecting against multiple failures should cover both
multiple failures on single ring scenario and multiple failures on
interconnected multiple rings.
1.1.2. Upgrade from linear protection to ring protection
It is beneficial for service providers to upgrade their MPLS-TP based
network from the linear protection to ring protection without service
interruption, and supporting in-service insertion and removal of a
node on the ring. In order to realize this requirement, the ring
protection Mechanisms should be developed and optimized to comply
with this upgrading principle.
1.1.3. Configuration complexity
In the application scenarios of deploying linear protection in
MPLS-TP network, the configuration of protection has close
relationship with the services, LSP quantities. Especially in some
large metro networks with more than ten thousands of services access
node, the LSP linear protection capabilities of the metro core nodes
should be large enough to meet the network planning requirements,
which also leads to the complexity of network protection
configurations and operations. While the ring protection is based on
the mechanisms on section layer, it has loose relationship with the
services quantities which could simplify the network protection
configurations and operations.
1.2. Terminology and Notation
The following syntax will be used to describe the contents of the
label stack:
Cheng, et al. Expires April 18, 2013 [Page 5]
Internet-Draft MSRP October 2012
1. The label stack will be enclosed in square brackets ("[]").
2. Each level in the stack will be separated by the '|' character.
It should be noted that the label stack may contain additional levels
however, we only present the levels that are germane to the
protection mechanism.
3. If the Label is assigned by Node x, the Node Name will enclosed
in bracket(" ()")
1.3. Contributing Authors
Wen Ye(China Mobile)
2. Shared ring protection for P2P
None
2.1. Basic conception
This document introduces an independent logic layer of ring for both
working path and protection path for shared ring protection in
MPLS-TP networks. The logic layer is a ring tunnel on top of the
working path or the protection path as shown in Figure 1, namely
working ring tunnel or protection ring tunnel respectively. Once the
ring tunnel is established, the configuration, management and
protection of the ring are all based on the ring tunnel. One port
can carry more than one ring tunnel, while one ring tunnel can carry
several LSPs.
|-------------
|-------------|
|-------------| |
=====PW1======| | |
| | Ring | Physical
=====PW2======| LSP | Tunnel | Port
| | |
=====PW3======| | |
|-------------| |
|-------------|
|-------------
Figure 1 the logic layers of the ring
The label stack used in MPLS-TP Shared Ring Protection mechanism are
shown as below.
Cheng, et al. Expires April 18, 2013 [Page 6]
Internet-Draft MSRP October 2012
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ring tunnel Label |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| LSP Label |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PW Label |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Payload |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 2 Label Stack used in MPLS-TP Shared Ring Protection
2.1.1. The establishment of the Ring tunnels
A ring tunnel is created as per exit node. The exit node means the
node on the ring where the traffic leaves the ring. All the LSPs
which transverse the ring and exit at the same ring node share the
same working ring tunnels and protection ring tunnels. For each exit
node, 4 ring tunnels are established:
- 1 clockwise working ring tunnel, protected by
- 1 anticlockwise protection ring tunnel,
- 1 anticlockwise working ring tunnel, protected by
- 1 clockwise protection ring tunnel.
An example is shown in Figure 3 where Node D behaves as an exit node.
LSP 1 entering the ring at Node E, LSP2 at Node A and LSP 3 at Node
B, all leave the ring at Node D. . To protect these LSPs traversing
the ring, a clockwise working ring tunnel (RcW_D), E->F->A->B->C->D
and its protection ring tunnel in the reverse direction (RaP_D),
D->C->B->A->F->E->D ; Ananticlockwise working ring channel (RaW_D),
C->B->A->F->E->D and its clockwise protection ring tunnel (RcP_D),
D->E->F->A->B->C->D are established for Node D. Figure 3 only shows
RcW_D and RaP_D for readability. The similar provisioning should be
repeated for every other node on the ring. The ring tunnels created
for the other nodes in Figure 3 when acting as exit node are provided
as follows:
To Node A: RcW_A, RaW_A, RcP_A, RaP_A;
To Node B: RcW_B, RaW_B, RcP_B, RaP_B;
To Node C: RcW_C, RaW_C, RcP_C, RaP_C;
To Node E: RcW_E, RaW_E, RcP_E, RaP_E;
Cheng, et al. Expires April 18, 2013 [Page 7]
Internet-Draft MSRP October 2012
To Node F: RcW_F, RaW_F, RcP_F, RaP_F;
In Node D, two working ring tunnels, RcW_D and RaW_D are terminated;
and two protection ring tunnels, RcP_D and RaP_D, are transit. That
means through those working ring tunnels with protection ring
tunnels, LSPs which enter the ring from Node D can reach any other
nodes on the ring, while Node D can also receive the traffic from any
other nodes.
+---+#############+---+
| F |-------------| A | +-- LSP2
+---+*************+---+
#/* *\#
#/* *\#
#/* *\#
+---+ +---+
LSP1-+ | E | | B |+-- LSP3
+---+ +---+
#\ */#
#\ */#
#\ */#
+---+*************+---+
LSP1 +--| D |-------------| C |
LSP2 +---+#############+---+
LSP3
---- physical links
**** RcW_D
#### RaP_D
Figure 3 the Ring tunnels of the ring
2.1.2. The distribution and management of ring labels
Ring tunnel labels are distributed by means of downstream-assigned
mechanism as defined in [RFC3031]. When an MPLS-TP transport path,
e.g. LSP, enters the ring, according to the ring ID and the exit
node, the ingress node pushes the working ring tunnel label and sends
the traffic to the next hop; The transit nodes of the working ring
tunnel swap the ring tunnel label and forward the packets to the next
hop; When arriving at the egress node, the egress node pops the ring
tunnel label and forwards the packets based on the inner LSP label
and PW label.Figure 4 shows the label operation in MPLS-TP Shared
Ring Protection mechanism. Suppose LSP 1 enters the ring at Node A
and exit at Node D, the following label operations are executed.
1. The traffic LSP1 arrives at Node A with a label stack [LSP1] and
Cheng, et al. Expires April 18, 2013 [Page 8]
Internet-Draft MSRP October 2012
is supposed to be forwarded in the clockwise direction of the ring.
The clockwise working ring tunnel label RcW_D will be pushed at Node
A, the label stack for the forwarded packet at Node A is changed to
[RcW_D(B)|LSP1]
2.Transit nodes, in this case Node B and C, forward the packet
by swapping the working ring tunnel label. For Example, the label
[RcW_D(B)|LSP1] is swapped to [RcW_D(C)|LSP1] at Node B.
3. When the packet arrives at Node D (i.e. egress node) with label
stack [RcW_D(D)|LSP1], Node D Pops RcW_D(D) and further deals with
the inner labels of LSP1.
4. All the LSPs exit at the same node share the same Ring tunnel
label.
+---+#####[RaP_D(A)]######+---+
| F |---------------------| A | +-- LSP1
+---+*****[RcW_D(A)]******+---+
#/* *\#
[RaP_D(F)]#/*[RcW_D(F)] RcW_D(B)]*\#RaP_D(B)
#/* *\#
+---+ +---+
| E | | B |
+---+ +---+
#\ */#
[RaP_D(D)]#\ [RxW_D(C)]*/#RaP_D(C)
#\ */#
+---+*****[RcW_D(D)]****+---+
LSP1 +-- | D |-------------------| C |
+---+#####[RaP_D(C)]####+---+
-----physical links ****** RcW_D ###### RaP_D
Figure 4 Label operation of the ring
2.1.3. Failure detection
The MPLS-TP section layer OAM is used to monitor the connectivity
between each two adjacent nodes on the ring using the mechanisms
defined in [RFC6371].Protection switching occurs on the detection of
failure on a link in the ring monitored by OAM functions.
Two end ports of a link form a MEG, and an MEG end point (MEP)
function is installed in each ring port. Periodic CC-V OAM packets
exchange is activated between each pair of MEPs to monitor the link
Cheng, et al. Expires April 18, 2013 [Page 9]
Internet-Draft MSRP October 2012
health. Sequential consecutive loss of CC-V packets (3 packets) is
interpreted as a link failure.
A node failure is regarded as the failure of two links attached to
the node. The two nodes adjacent to the failed node detect the
failure on the links connected to the failed node.
2.2. P2P wrapping
Normal state is shown in Figure 4. The clockwise LSP1 towards node D
enters the ring at Node A. In normal state, LSP 1 follows the path
A->B->C-D, label operation is [LSP1](original data traffic carried by
LSP 1)->[RCW_D(B)|LSP1](NodeA)->[RCW_D(C)|LSP1](NodeB)->[RCW_D(D)|
LSP1](NodeC)->[LSP1]( data traffic carried by LSP 1). Then traffic
packet will be forwarded on the basis of LSP1.
2.2.1. Wrapping Link Failure
When a link failure between Node B and Node C occurrs, both Node B
and Node C detect the failure by OAM mechanism. Node B switches the
clockwise working ring tunnel(RcW_D) to the anticlockwise protection
ring tunnel (RaP_D)and Node C switches anticlockwise protection ring
tunnel(RaP_D) to the clockwisework ring tunnel(RcW_D). The data
traffic which enters the ring at Node A and exits at Node D follows
the pathA->B->A->F->E->D->C->D. The label operation is
[LSP1](Original data packet)-> [RcW_D(B)|LSP1](NodeA)-> [RaP_D(A)|
LSP1](NodeB)->[RaP_D(F)|LSP1](NodeA)->[RaP_D(E)|LSP1] (NodeF)->
[RaP_D(D)|LSP1] (NodeE)-> [RaP_D(C)|LSP1] (NodeD)-> [RcW_D(D)|
LSP1](NodeC)->[LSP1](Exit data packet).
+---+#####[RaP_D(F)]######+---+
| F |---------------------| A | +-- LSP1
+---+*****[RcW_D(A)]******+---+
#/* *\#
[RaP_D(E)]#/*[RcW_D(F)] [RcW_D(B)]*\#RaP_D(A)
#/* *\#
+---+ +---+
| E | | B |
+---+ +---+
#\ *x#
[RaP_D(D)]#\ [RcW_D(C)]*x#RaP_D(B)
#\ *x#
+---+*****[RcW_D(D)]****+---+
LSP1 +-- | D |-------------------| C |
+---+#####[RaP_D(C)]####+---+
-----physical links xxxx Failure Link
Cheng, et al. Expires April 18, 2013 [Page 10]
Internet-Draft MSRP October 2012
****** RcW_D ###### RaP_D
Figure 5 Link Failure of P2P Wrapping
2.2.2. Wrapping node Failure
When Node B fails, Node A detects the failure between A and B and
switches the clockwise work ring tunnel(RcW_D) to the anticlockwise
protection ring tunnel(RaP_D), Node C detects the failure between C
and B and switches the anticlockwise protection ring tunnel(RaP_D) to
the clockwise working ring tunnel(RcW_D). The data traffic which
enters the ring at Node A and exits at Node D follows the path
A->F->E->D->C->D. The label operation is [LSP1](original data traffic
carried by LSP 1)-> [RaP_D(F)|LSP1](NodeA)->[RaP_D(E)|LSP1](NodeF)->
[RaP_D(D)|LSP1](NodeE)-> [RaP_D(C)|LSP1] (NodeD)->[RcW_D(D)|LSP1]
(NodeC)->[LSP1](data traffic carried by LSP 1).
+---+#####[RaP_D(F)]######+---+
| F |---------------------| A | +-- LSP1
+---+*****[RcW_D(A)]******+---+
#/* *\#
[RaP_D(E)]#/*[RcW_D(F)] [RcW_D(B)]*\#RaP_D(A)
#/* *\#
+---+ xxxxx
| E | x B x
+---+ xxxxx
#\ */#
[RaP_D(D)]#\ [RcW_D(C)]*/#RaP_D(B)
#\ */#
+---+*****[RcW_D(D)]****+---+
LSP1 +-- | D |-------------------| C |
+---+#####[RaP_D(C)]####+---+
-----physical links xxxxxx Failure Node
*****RcW_D ###### RaP_D
Figure 6 Node Failure of P2P Wrapping
2.3. P2P steering
Each working ring tunnel is associated with a protection ring tunnel
in the opposite direction. Every node needs to know the ring
topology by configuration or topology discovery. When the failure
occurs, the nodes which detect the failure will spread the fault
information in the opposite direction node by node in the ring
respectively. When the node receives the message that informs the
Cheng, et al. Expires April 18, 2013 [Page 11]
Internet-Draft MSRP October 2012
failure, it will quickly figure out the location of the fault by the
topology information that is maintained by itself, so that it will
determine whether the LSPs enter the ring from itself needs switch-
over. If yes, it will switch the LSPs from the working ring tunnel
to its protection ring tunnel. If no, it will ignore the fault
indication message.
+--LSP l
+-+-+-+-+-+-+-+ +---+ ###[RaP_D(F)]### +---+ +-+-+-+-+-+-+-+
|F|A|B|C|D|E|F| | F | ---------------- | A | |A|B|C|D|E|F|A|
+-+-+-+-+-+-+-+ +---+ ***[RcW_D(A)]*** +---+ +-+-+-+-+-+-+-+
|I|I|I|S|I|I| |I|I|S|I|I|I|
+-+-+-+-+-+-+ #/* *\# +-+-+-+-+-+-+
[RaP_D(E)] #/* [RcW_D(B)] *\# [RaP_D(A)]
#/* [RcW_D(F)] *\#
+-+-+-+-+-+-+-+ #/* *\#
|E|F|A|B|C|D|E| +---+ +---+ +-- LSP 2
+-+-+-+-+-+-+-+ | E | | B | +-+-+-+-+-+-+-+
|I|I|I|I|S|I| +---+ +---+ |B|C|D|E|F|A|B|
+-+-+-+-+-+-+ #\* */# +-+-+-+-+-+-+-+
#\* [RcW_D(E)] [RcW_D(C)] */# |I|S|I|I|I|I|
[RaP_D(D)] #\* */# +-+-+-+-+-+-+
#\* */# [RaP_D(B)]
+-+-+-+-+-+-+-+ +---+ [RcW_D(D)] +---+ +-+-+-+-+-+-+-+
|D|E|F|A|B|C|D| +-- | D | xxxxxxxxxxxxxxxxx | C | |C|D|E|F|A|B|C|
+-+-+-+-+-+-+-+ LSP 1 +---+ [RaP_D(C)] +---+ +-+-+-+-+-+-+-+
|I|I|I|I|I|S| LSP 2 |S|I|I|I|I|I|
+-+-+-+-+-+-+ +-+-+-+-+-+-+
----- physical links ***** RcW_D ##### RaP_D
Figure 7 the P2P steering operation and protection switching(1)
Steering Example is shown in figure 7. LSP1 enters the ring from
Node A while Node B has an LSP2, and both of them have the same
destination node D. As per Figure 7, in normal state, LSP1 follows
the path A->B->C->D, the label operation is [LSP1](original data
traffic carried by LSP 1 )->[RcW_D(B)|LSP1](NodeA)->[RcW_D(C)|
LSP1](NodeB)->[RcW_D(D)|LSP1](NodeC)->[LSP1] ( data traffic carried
by LSP 1) . LSP2 goes through the path B->C->D, the label operation
is [LSP2]->[RcW_D(C)|LSP2](NodeB)->[RcW_D(D)|LSP2](NodeC)-> [LSP2] (
data traffic carried by LSP 1) .
If the link between C and D breaks down, as Figure 7 shows, according
to the fault detection function of each link, Node D will find out
that there is a failure in the link between C and D, and it will
Cheng, et al. Expires April 18, 2013 [Page 12]
Internet-Draft MSRP October 2012
update the link state of its ring topology, changing the link state
between C and D from normal to fault, as Figure 7 shows. In the
direction that goes away from the failure point, Node D will send the
state report message to Node E, informing Node E of the fault between
C and D, and E will update the link state of its ring topology,
changing the link state between C and D from normal to fault. And
the like, the state report message is sent from node to node in the
clockwise direction.Similar to Node D, Node C will spread the failure
information in anti-clockwise direction.
Until Node A updates the link state of its ring topology, and knows
there is a fault within its working path. And at the same time it
can get the conclusion that the anticlockwise path from A to D is
working all right. so that Node A will switch the LSP1 operation to
the anticlockwise tunnel.
LSP1 will follow the path A->F->E->D, the label operation is
[LSP1](original data traffic carried by LSP 1 )->[RaP_D(F)|
LSP1](NodeA)->[RaP_D(E)|LSP1](NodeF)->[RaP_D(D)|LSP1](NodeE)->[LSP1]
( data traffic carried by LSP 1).
The same goes with LSP2 operation, when Node B updates the link state
of its ring topology, and find out the working path fault, so it will
stop sending the LSP2 operation in clockwise direction and switch the
LSP2 to the anticlockwise protection tunnel. LSP2 goes through the
path B->A->F->E->D, the label operation is [LSP2](original data
traffic carried by LSP 2 )-> [RaP_D(A)|LSP2](NodeB)->[RaP_D(F)|
LSP2](NodeA)->[RaP_D(E)|LSP2](NodeF)->[RaP_D(D)|LSP2](NodeE)->[LSP2]
( data traffic carried by LSP 2).
Imagine the ring between A and B breaks down, as figure 8 shows.
Like above, Node B will find out that there is a fault in the link
between A and B, and it will update the link state of its ring
topology, changing the link state between A and B from normal to
fault. The state report message is sent from node to node in the
clockwise direction, informing every node that there is a fault
between node A and B, so that every node updates the link state of
its ring topology. Node A will find out the working path fault of
LSP1 and switch LSP1 to protection Ring tunnel, while Node B finds
out the LSP2 working path is all right and there is no need for
switching.
Cheng, et al. Expires April 18, 2013 [Page 13]
Internet-Draft MSRP October 2012
+-- LSP l
+-+-+-+-+-+-+-+ +---+ ###[RaP_D(F)]#### +---+ +-+-+-+-+-+-+-+
|F|A|B|C|D|E|F| | F | ----------------- | A | |A|B|C|D|E|F|A|
+-+-+-+-+-+-+-+ +---+ ***[RcW_D(A)]**** +---+ +-+-+-+-+-+-+-+
|I|S|I|I|I|I| #/* x |S|I|I|I|I|I|
+-+-+-+-+-+-+ #/* x +-+-+-+-+-+-+
[RaP_D(E)] #/*[RcW_D(F)] [RcW_D(B)]x [RaP_D(A)]
#/* x +-- LSP 2
+-+-+-+-+-+-+-+ +---+ +---++-+-+-+-+-+-+-+
|E|F|A|B|C|D|E| | E | | B ||B|C|D|E|F|A|B|
+-+-+-+-+-+-+-+ +---+ +---++-+-+-+-+-+-+-+
|I|I|S|I|I|I| #\* */# |I|I|I|I|I|S|
+-+-+-+-+-+-+ #\*[RcW_D(E)] [RcW_D(C)] */# +-+-+-+-+-+-+
[RaP_D(D)] #\* */# [RaP_D(B)]
+-+-+-+-+-+-+-+ #\* */# +-+-+-+-+-+-+-+
|D|E|F|A|B|C|D| +---+ ***[RcW_D(D)]*** +---+ |C|D|E|F|A|B|C|
+-+-+-+-+-+-+-+ +-- | D | ---------------- | C | +-+-+-+-+-+-+-+
|I|I|I|S|I|I| LSP1 +---+ ###[RaP_D(C)]### +---+ |I|I|I|I|S|I|
+-+-+-+-+-+-+ LSP2 +-+-+-+-+-+-+
----- physical links ***** RcW_D ##### RaP_D
Figure 8 the P2P steering operation and protection switching(2)
3. Coordination protocol
TBD
4. Conclusions and Recommendations
TBD
5. IANA Considerations
None
6. Security Considerations
TBD
Cheng, et al. Expires April 18, 2013 [Page 14]
Internet-Draft MSRP October 2012
7. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
Label Switching Architecture", RFC 3031, January 2001.
[RFC5654] Niven-Jenkins, B., Brungard, D., Betts, M., Sprecher, N.,
and S. Ueno, "Requirements of an MPLS Transport Profile",
RFC 5654, September 2009.
[RFC6371] Busi, I. and D. Allan, "Operations, Administration, and
Maintenance Framework for MPLS-Based Transport Networks",
RFC 6371, September 2011.
Authors' Addresses
Weiqiang Cheng
China Mobile
No.32 Xuanwumen West Street
Beijing 100053
China
Email: chengweiqiang@chinamobile.com
Lei Wang
China Mobile
No.32 Xuanwumen West Street
Beijing 100053
China
Email: Wangleiyj@chinamobile.com
Han Li
China Mobile
No.32 Xuanwumen West Street
Beijing 100053
China
Email: Lihan@chinamobile.com
Cheng, et al. Expires April 18, 2013 [Page 15]
Internet-Draft MSRP October 2012
Kai Liu
Huawei Technologies Co., Ltd.
Huawei base, Bantian, Longgang District
Shenzhen 518129
China
Email: alex.liukai@huawei.com
Jia He
Huawei Technologies Co., Ltd.
Huawei base, Bantian, Longgang District
Shenzhen 518129
China
Email: hejia@huawei.com
Fang Li
Research Institute of Telecommunication Transmission,China Academy of Telecommunication Research, MIIT. China
Number 52, Huayuan street, Haidian District
Shenzhen 100191
China
Email: lifang@ritt.cn
Jian Yang
ZTE Corporation P.R.China
ZTE Industrial Zone,Liuxian Road, Xili District, Shenzhen
Shenzhen 518055
China
Email: yang.jian90@zte.com.cn
Junfang Wang
Fiberhome Telecommunication Technologies Co.,LTD
No.5, Dongxin Lu, Guandong Industrial Park, Wuhan, Hubei
Wuhan 430073
China
Email: wjf@fiberhome.com.cn
Cheng, et al. Expires April 18, 2013 [Page 16]