Network Working Group                                      S. De Cnodder
Internet Draft                                                C. Pelsser
Expiration Date: August 2003

                                                           February 2003

                  Protection for inter-AS MPLS tunnels
             draft-decnodder-mpls-interas-protection-00.txt

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.


Abstract

   This document describes a solution for link protection, node
   protection, SRLG protection and fast recovery of inter-AS LSPs. These
   problems are highlighted in [ASREQ]. The proposed solution is based
   on RSVP-TE [RFC3209] as recommended by [ASREQ].

1. Introduction

   This document describes a solution for the following requirements
   from [ASREQ]:

   1) link protection

   2) node protection

   3) SRLG protection



De Cnodder, Pelsser        Expires July 2003                    [Page 1]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   4) fast recovery

   5) based on RSVP-TE [RFC3209]

   MPLS Fast-Reroute techniques based on [FRR] together with the RSVP
   objects Exclude Route Object (XRO) and Explicit Exclude Route
   Subobject (EXRS) as defined in [XRO] will be used to fullfill the
   above requirements. Only the protection of links between 2 ASs (as
   well as their SRLGs) and the protection of nodes at the border of an
   AS are in the scope of this document.

   Section 2 proposes to tunnel inter-AS LSPs through intra-AS LSPs
   inside an AS, as described in [HIER]. This tunneling favors the
   confidentiality requirement concerning intra-AS topologies [ASREQ] as
   well as the establishment of inter-AS LSPs. The establishment of
   inter-AS LSPs will not be studied further in this draft.

   Section 3 shows that an end-to-end backup LSP can only provide link
   and node protection. For SRLG protection and fast recovery, the
   methods in [FRR] have to be used. These methods are described in
   section 5. The use of bypass tunnels to protect inter-AS LSPs is left
   for further studies.


2. Inter-AS LSP tunneled through an intra-AS LSP

   To improve scalability and confidentiality (which is outside the
   scope of this document), an inter-AS LSP can be tunneled through an
   intra-AS LSP [HIER]. For instance, in Figure 2, the link between R23
   and R24 could be an LSP passing multiple core routers. The inter-AS
   LSP is tunneled through this LSP.

   The procedures described in the following sections apply for inter-AS
   link, node and SRLG protection of inter-AS LSPs whether they are
   tunneled or not.


3. Problems to protect SRLGs with disjoint end-to-end LSPs

   The motivation to support fast-reroute techniques as described in
   [FRR] is twofold: first of all, it supports fast recovery and
   secondly, it can also provide SRLG protection, which is not the case
   for a disjoint end-to-end LSP. The problems to support SRLG
   protection, with the latter method, are described in this section.

   There are different ways to provide end-to-end protection of inter-AS
   LSPs.  A first possibility is to establish a secondary path that
   crosses different ASs than the main LSP. An alternative is to



De Cnodder, Pelsser        Expires July 2003                    [Page 2]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   establish an LSP that follows the same AS path to the destination as
   the main LSP, i.e. it crosses the same ASs in the same order, but is
   link or node disjoint from the main LSP. However, these two solutions
   do not permit to establish an LSP that is disjoint from the SRLGs of
   the main LSP. That is, it is not possible to protect the main inter-
   AS LSP against SRLGs failures with a single end-to-end link or node
   disjoint LSP. This is due to the fact that ASs may possess links
   belonging to the same SRLG even if these ASs do not have the same
   convention to designate this SRLG.

         AS1             AS2              AS3
    /----------\  /-------------- \  /------------\

           R12 ---- R21 ---- R23 ---- R31
         /              \                 \
        /                \                 \
    R11                  R25                 R33
        \                  \               /
         \                  \             /
           R13 ---- R22 ---- R24 ---- R32

                 Figure 1: end-to-end SRLG protection


   For example, on figure 1, we have a main LSP going from R11 in AS1 to
   R33 in AS3 through R13, R22, R24 and R32. It is not possible to
   protect this LSP against SRLG failures with a backup LSP crossing
   R12, R21, R23 and R31. This is because AS3 could have links which
   have SRLGs in common with links in AS1 and AS1 nor AS3 will be aware
   of it. For example, link R11-R13 and link R31-R33 may belong to the
   same SRLG. This example relies on the fact that different ASs may use
   the same resources to join different nodes in their respective
   domain. A similar situation occurs when the main and the backup LSP
   do not share the same AS path but instead partially cross different
   ASs.

   This document only focuses on local protection as defined in [FRR],
   because it is not possible to provide full protection of an inter-AS
   LSP with an end-to-end LSP.  With the solution proposed in this
   document, link, node and SRLG protection can be provided to inter-AS
   LSPs.

4. Network model and terminology

   To illustrate the procedures described in the next sections, the
   following network model is used:





De Cnodder, Pelsser        Expires July 2003                    [Page 3]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


               AS1                AS2
         /-------------\    /------------\

          +---+   +---+      +---+   +---+
    ------|R11|---|R12|------|R21|---|R22|------
          +---+   +---+      +---+   +---+
            |       |          |       |
            |       |          |       |
            |       |          |       |
          +---+   +---+      +---+   +---+
    ------|R13|---|R14|------|R23|---|R24|------
          +---+   +---+      +---+   +---+

                 Figure 2: a reference network model


   The main LSP is established from a certain node (not shown on the
   figure) and goes over routers R13, R14, R23, and R24 towards the
   destination (also not shown on the figure). AS1 is referred to as the
   upstream AS of AS2, and AS2 is referred to as the downstream AS of
   AS1.

   An "egress AS-BR" or a "primary egress AS-BR" is an Autonomous System
   Border Router (AS-BR) at which the main LSP leaves an AS. In the
   network example, in figure 2, this is router R14, inside AS1.

   An "ingress AS-BR" or a "primary ingress AS-BR" is an AS-BR at which
   the main LSP enters an AS. In the network example, this is router
   R23, inside AS2.

   A "secondary egress AS-BR" is an AS-BR at which the bypass tunnel or
   the detour LSP leaves an AS. In the network example, this could be
   router R12, in AS1.

   A "secondary ingress AS-BR" is an AS-BR at which the bypass tunnel or
   the detour LSP enters an AS. In the network example, this could be
   router R21, in AS2.

   "inter-AS link protection" is the protection of an LSP against a
   failure of the link connecting two ASs. In the network example, this
   is the link R14-R23.

   "inter-AS node protection" is the protection of an LSP against an
   AS-BR failure. This can be the egress AS-BR, R14, or the ingress AS-
   BR, R23.

   "inter-AS SRLG protection" is the protection of an LSP against a
   simultaneous failure of all links that belong to a certain SRLG which



De Cnodder, Pelsser        Expires July 2003                    [Page 4]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   also contains the inter-AS link (R14-R23 in figure 2).

   Other terminology and abbreviations are taken from [FRR].

5. Protection with detour LSPs

 5.1 Link protection with detour LSPs

  5.1.1 Procedures for the egress AS-BR

   The egress AS-BR has to establish a detour LSP to protect the
   interdomain link. The destination of the detour LSP will be the same
   as the destination of the main LSP. The LSP may merge with the main
   LSP at any downstream node or with other detour LSPs of the same main
   LSP established by nodes downstream of the link to be protected. The
   egress AS-BR has to determine a secondary egress AS-BR and then it
   can perform a path calculation towards this AS-BR.

   The egress AS-BR can select any other AS-BR as secondary egress AS-BR
   but it is recommended to select an AS-BR that peers to the downstream
   AS of the main LSP (i.e. the AS where the primary ingress AS-BR is
   located). In case this condition is not met, it could be for instance
   possible that the downstream AS of the detour LSP chooses a path that
   goes through the AS where the detour LSP was originated which can
   cause loops. In addition, it is recommended that the detour LSP
   merges in the AS where this downstream ingress AS-BR is located (the
   merging node could be the ingress AS-BR itself) if the destination of
   the LSP is not in the downstream AS (AS2 in Figure 2). This
   suggestion improves the scalability of the solution since merging of
   LSPs diminishes the number of states to be maintened, the bandwidth
   to be reserved, and so on. Therefore, the egress AS-BR should put a
   portion of the RRO of the main LSP into the ERO of the detour LSP.
   The last hop in the downstream AS (the egress AS-BR in the downstream
   AS) of the main LSP and all hops after that router should be at least
   in the ERO of the detour LSP. In addition to this portion of the RRO
   of the main LSP, the ERO may be further prepended by the egress AS-BR
   with a path (or a partial path) towards the selected secondary egress
   AS-BR.

   There are multiple ways to determine the secondary egress AS-BR at
   the primary egress AS-BR. (1) The egress AS-BR can be manually
   configured with other AS-BRs that peer to the same AS or (2) it can
   lookup in its BGP table to find an other entry such that the AS-path
   has the same AS next hop as the currently selected entry. Option (1)
   is feasible because the number of links between 2 ASs is usually
   limited to only a small number of links.

   It could be possible that the primary egress AS-BR is the same router



De Cnodder, Pelsser        Expires July 2003                    [Page 5]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   as the secondary egress AS-BR and that the primary ingress AS-BR is
   the same router as the secondary ingress AS-BR. In this particular
   case the inter-domain link on the primary path must not be the same
   link used by the main LSP and no path calculation should be done to
   calculate a (partial) path for the backup LSP.

   The use of the LSP-Merge object, defined in Appendix A, is optional
   to provide link protection.

  5.1.2 Procedures for the ingress AS-BR

   No extra procedures are required.

  5.1.3 Procedures for the secondary egress AS-BR

   The secondary egress AS-BR completes the path in the ERO by selecting
   an AS-BR in the downstream AS. If there is no ERO present, then the
   tunnel end point address in the Session object has to be used to
   route the RSVP message.

   5.1.4 Procedures for the secondary ingress AS-BR

   The secondary ingress AS-BR completes the ERO with a path towards the
   next subobject in the ERO. The LSP should merge with the main LSP at
   the node that processes the LSP-Merge subobject, if it was not yet
   merged at this point. If no ERO is present inside the Path message of
   the detour LSP, the path is computed based on the tunnel end point
   address.

   --TBD-- Content of the DETOUR Object.

 5.2 Node protection with detour LSPs

   The procedures and recommendations are the same for the protection of
   an ingress AS-BR failure as for link protection, with the exception
   that the egress AS-BR has to include an XRO object or an EXRS
   subobject [XRO] to exclude the ingress AS-BR. This information will
   be used by intermediate routers to complete the path in the ERO.

   For the protection of the egress AS-BR, the same holds except that
   the procedures apply to the router on the path of the main LSP
   preceding the egress AS-BR. The method to determine a secondary
   egress AS-BR is the same as for the egress AS-BR for link protection:
   either manual configuration or by using BGP routing information. Note
   that the first solution requires more configuration as for link
   protection in case this router peers with more than one AS-BR.

 5.3 SRLG protection with detour LSPs



De Cnodder, Pelsser        Expires July 2003                    [Page 6]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   Similar procedures as for link protection apply for SRLG protection.
   In addition, the secondary egress AS-BR must be an AS-BR that peers
   with the downstream AS of the primary LSP. And, the detour LSP must
   merge at that AS. The former condition is necessary because only the
   two peering ASs know the SRLGs of the inter-domain link and the
   latter condition implies that the LSP-Merge subobject must be used.
   This subobject is basically inserted inside the ERO to indicate the
   node where merging needs to be done (see further). The next
   subsections describe in more details the procedures to be performed
   at the nodes involved in the establishment of a detour LSP.

  5.3.1 Procedures for the egress AS-BR

   The egress AS-BR has to include an XRO object or an EXRS subobject to
   exclude the SRLGs of the inter-domain link. The XRO or the EXRS must
   include a list of SRLGs corresponding with the inter-AS link. If the
   egress AS-BR can calculate a strict path until the secondary egress
   AS-BR, then this list of SRLGs may be replaced by a reference to the
   link for which the detour LSP has to be SRLG disjoint (see section
   5.3.2). The secondary ingress AS-BR has to use the information in the
   XRO or EXRS to further calculate a path for the detour LSP.

   To ensure merging inside the downstream AS, the LSP-Merge subobject
   (see Appendix A) has to be included in the ERO by the egress AS-BR.
   The LSR where the detour LSP is merged with the main LSP has to
   ensure that it can perform a switch-over from the incoming detour LSP
   containing the LSP-Merge subobject to its originating detour LSP in
   case the next link has an SRLG in common with the inter-domain link.
   This is because in this case, both links can fail at the same time
   such that both detour LSPs will be activated at the same time.

  5.3.2 Procedures for the secondary egress AS-BR

   The secondary egress AS-BR selects a next hop and the XRO or EXRS
   must include a reference to the link for which the detour LSP has to
   be SRLG disjoint. No list of SRLGs should be included because the
   SRLG IDs are local to an AS, which means that if a list of SRLG IDs
   would be sent to the next hop, then this node would not understand
   the IDs. Therefore the secondary egress AS-BR has to translate the
   list of SRLGs to a reference to the inter-AS link by means of the IP
   address of that link, see [XRO], if this was not yet been done by the
   egress AS-BR.


  5.3.3 Procedures for the secondary ingress AS-BR

   The secondary ingress AS-BR must remove the received XRO or EXRS and
   must replace it by an XRO or EXRS containing a list of the SRLGs of



De Cnodder, Pelsser        Expires July 2003                    [Page 7]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   the inter-AS link, which are known by the nodes inside the downstream
   AS. This is because the LSP can cross nodes inside the downstream AS
   which do not know the SRLGs of the inter-AS link, but only the SRLGs
   of the intra-area links.

  5.3.4 Path calculation

   To allow the egress AS-BRs and the secondary ingress AS-BR to
   calculate a path, the SRLGs of the other inter-AS links towards the
   same downstream AS taken by the main LSP has to be known. This could
   be achieved through manual configuration of the SRLGs of other
   inter-AS links to the same downstream/upstream AS at each AS-BR. For
   instance, in Figure 2, at R14 and R23, the SRLGs of R12-R21 can be
   configured such that they are known for the path calculation, and at
   R12 and R21, the SRLGs of R14-R23 can be configured. An other option
   is to flood this information via BGP extensions to be defined.

  5.3.5 SRLG and node protection

   If protection of the ingress AS-BR is requested, in addition to SRLG
   protection, the egress AS-BR also has to put the ingress AS-BR in the
   XRO or EXRS like it was done for node protection.

   Protection of the egress AS-BR and SRLG protection of the link
   preceding the egress AS-BR is best solved by using two detour LSPs at
   the node on the path of the main LSP preceding the egress AS-BR: a
   detour to protect against the SRLG of the intra-domain link and a
   second detour LSP that is established using the procedures for node
   protection as described in the previous section. The detour
   protecting against the SRLGs has to merge in the same AS, i.e. it has
   to merge with the main LSP at the egress AS-BR. This is because other
   ASs do not know this intra-domain link, nor its SRLGs. To ensure that
   merging occurs at the egress AS-BR, the RRO of the main LSP should be
   fully included in the ERO of the detour LSP. This path should be
   preceded by a path, which is SRLG disjoint with the next link of the
   main LSP computed towards the secondary egress AS-BR. This could only
   be a partial path towards the egress AS-BR in which case an XRO
   object or an EXRS subobject, containing the SRLG to avoid, has to be
   added. It has to be ensured that these 2 detour LSPs do not merge,
   which means that one of the detour LSP should be a sender-template
   specific detour LSP.

   The egress AS-BR must ensure that it can do a switch-over from the
   incoming detour LSP protecting against a failure of the preceding
   link to its originating detour LSP. This is because the preceding
   link and the inter-domain link can belong to the same SRLG, hence
   they can fail at the same time. For this reason, the LSP-Merge
   subobject must also be used in this case.



De Cnodder, Pelsser        Expires July 2003                    [Page 8]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


   The use of 2 detour LSPs (one for SRLG protection and the other for
   node protection) is also recommended when the ingress AS-BR is to be
   protected. If only 1 detour LSP is used, and the LSP only crosses 1
   hop in the downstream AS (i.e. ingress AS-BR and egress AS-BR in the
   downstream AS are the same router), the detour LSP setup would fail.
   This is because the AS further downstream of the immediate downstream
   AS is not anymore aware of the SRLGs of the link to be protected.

   In case of 2 detour LSPs, or just in case of SRLG protection, it is
   recommended to use the sender-template specific detour LSP to avoid
   that detour LSPs merge with each other.

6. Protection with bypass tunnels

 6.1 Link protection with bypass tunnels

   -- TBC --

   To protect the inter-domain link with bypass tunnels, the same
   procedures as in [FRR] are followed. To establish a bypass tunnel the
   same procedures as for detour LSPs apply with respect to the path
   computation. In addition, the same recommendations as for detour LSPs
   apply, i.e. it is recommended that the downstream AS of the bypass
   tunnel and the main LSP are the same AS.

 6.2 Node protection with bypass tunnels

   -- TBC --

 6.3 SRLG protection with bypass tunnels

   -- TBC --

7. Security Considerations

   TBD


8. Acknowledgements

   This work was partially supported by the European Commission within
   the IST ATRIUM project. The authors would like to thank Dimitri
   Papadimitriou and Olivier Bonaventure for their useful comments.

   This draft is partially based on draft-pelsser-rsvp-te-interdomain-
   lsp-00.txt [ASLSP].





De Cnodder, Pelsser        Expires July 2003                    [Page 9]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


9. References

   [RFC2026]   Bradner, S., "The Internet Standards Process -- Revision
               3", BCP 9, RFC 2026, October 1996.

   [RFC3209]   Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
               Swallow, G., "RSVP-TE: Extensions to RSVP for LSP Tun-
               nels", RFC 3209, December 2001.

   [ASREQ]     Zhang, R., Vasseur, JP., (Editors), "MPLS Inter-AS
               Traffic Engineering requirements", draft-zhang-mpls-
               interas-te-req.txt, work in progress.

   [FRR]       Pan, P., Atlas, A. (Editors), "Fast Reroute Extensions to
               RSVP-TE for LSP Tunnels", draft-ietf-mpls-rsvp-lsp-
               fastreroute-01.txt, work in progress.

   [XRO]       Lee, CY., Farrel, A., De Cnodder, S., "Exclude Routes -
               Extension to RSVP-TE", draft-lee-ccamp-rsvp-te-exclude-
               route-01.txt, work in progress.

   [HIER]      Kompella, K., Rekhter, Y., "LSP Hierarchy with General-
               ized MPLS TE", draft-ietf-mpls-lsp-hierarchy-08.txt, work
               in progress.

   [ASLSP]     Pelsser, C., Bonaventure, O., "RSVP-TE extensions for
               interdomain LSPs", draft-pelsser-rsvp-te-interdomain-
               lsp-00.txt, work in progress.


Authors Addresses

   Stefaan De Cnodder
   Email: stefaan.de_cnodder@alcatel.be

   Cristel Pelsser
   Infonet group (FUNDP)
   Rue Grandgagnage 21, B-5000 Namur, Belgium
   Email: cpe@info.fundp.ac.be












De Cnodder, Pelsser        Expires July 2003                   [Page 10]


Internet Draft  draft-decnodder-mpls-interas-protection    February 2003


Appendix A: LSP-Merge subobject

   The LSP-Merge subobject is a new subobject in the Explicit Route
   Object (ERO). The procedures defined in [RFC3209] section 4.3.4.1 to
   select the next hop are modified as follows: if after step 3 of the
   next hop selection process the node finds an LSP-Merge subobject in
   front of the ERO, i.e. the LSP-Merge subobject is the first subobject
   in the ERO after removing the subobjects belonging to the local
   abstract node, then the LSP has to merge with an LSP with the same
   Session object and LSP ID at the current node, if such an LSP exists.
   If no such LSP exists, then the LSP-Merge object is removed and the
   procedures in [RFC3209] section 4.3.4.1 are continued.

   The LSP with which the LSP containing the LSP-Merge subobject merges
   must be a main LSP, i.e. it may not contain a DETOUR object. In addi-
   tion the abstract node where the merging occurs must ensure that that
   in case of a failure, the traffic can be switched from the LSP con-
   taining the LSP-Merge subobject to a backup LSP that was established
   by the merging node to protect the main LSP.


     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |L|    Type     |   Length      |            Resvd              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

      L

         Set to zero.

      Type

         TBD.

      Length

         The length field is set to 4.

      Resvd

         Set to zero on transmission and ignored on reception.









De Cnodder, Pelsser        Expires July 2003                   [Page 11]