Network Working Group                                          Y. Kamite
Internet-Draft                                        NTT Communications
Intended status: Informational                                 F. Jounay
Expires: January 12, 2012                                 France Telecom
                                                        B. Niven-Jenkins
                                                                 Velocix
                                                             D. Brungard
                                                                    AT&T
                                                                  L. Jin
                                                                     ZTE
                                                           July 11, 2011


Framework and Requirements for Virtual Private Multicast Service (VPMS)
            draft-ietf-l2vpn-vpms-frmwk-requirements-04.txt

Abstract

   This document provides a framework and service level requirements for
   Virtual Private Multicast Service (VPMS).  VPMS is defined as a Layer
   2 VPN service that provides point-to-multipoint connectivity for a
   variety of Layer 2 link layers across an IP or MPLS-enabled PSN.
   This document outlines architectural service models of VPMS and
   states generic and high level requirements.  This is intended to aid
   in developing protocols and mechanisms to support VPMS.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 12, 2012.

Copyright Notice

   Copyright (c) 2011 IETF Trust and the persons identified as the
   document authors.  All rights reserved.




Kamite, et al.          Expires January 12, 2012                [Page 1]


Internet-Draft       VPMS Framework and Requirements           July 2011


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
     1.1.  Problem Statement  . . . . . . . . . . . . . . . . . . . .  4
     1.2.  Scope of This Document . . . . . . . . . . . . . . . . . .  4
   2.  Conventions used in this document  . . . . . . . . . . . . . .  5
   3.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.1.  Acronyms . . . . . . . . . . . . . . . . . . . . . . . . .  5
   4.  Use Cases  . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     4.1.  Ethernet Use Case  . . . . . . . . . . . . . . . . . . . .  6
       4.1.1.  Ethernet-based multicast stream  . . . . . . . . . . .  6
       4.1.2.  Ethernet-based time/frequency synchronization  . . . .  7
     4.2.  ATM-based Use Case . . . . . . . . . . . . . . . . . . . .  7
       4.2.1.  ATM-based multicast stream . . . . . . . . . . . . . .  7
     4.3.  TDM-based Use Case . . . . . . . . . . . . . . . . . . . .  8
       4.3.1.  TDM-based multicast stream . . . . . . . . . . . . . .  8
   5.  Reference Model  . . . . . . . . . . . . . . . . . . . . . . .  8
   6.  Customer Requirements  . . . . . . . . . . . . . . . . . . . . 10
     6.1.  Service Topology . . . . . . . . . . . . . . . . . . . . . 10
       6.1.1.  Point-to-Multipoint Traffic Support  . . . . . . . . . 10
       6.1.2.  Reverse Traffic Support  . . . . . . . . . . . . . . . 10
     6.2.  Transparency . . . . . . . . . . . . . . . . . . . . . . . 12
     6.3.  Quality of Service (QoS) . . . . . . . . . . . . . . . . . 13
     6.4.  Multi-Source Support . . . . . . . . . . . . . . . . . . . 13
     6.5.  High Availability  . . . . . . . . . . . . . . . . . . . . 14
       6.5.1.  Dual-homed Access Support  . . . . . . . . . . . . . . 14
       6.5.2.  Single/Dual Traffic Support in Dual-homed Access . . . 17
     6.6.  Security . . . . . . . . . . . . . . . . . . . . . . . . . 17
     6.7.  Reordering Prevention  . . . . . . . . . . . . . . . . . . 17
     6.8.  Failure reporting  . . . . . . . . . . . . . . . . . . . . 17
   7.  Service Provider Network Requirements  . . . . . . . . . . . . 18
     7.1.  Scalability  . . . . . . . . . . . . . . . . . . . . . . . 18
     7.2.  Pseudo Wire Signaling and PSN Tunneling  . . . . . . . . . 18
     7.3.  Auto-discovery . . . . . . . . . . . . . . . . . . . . . . 19
     7.4.  Activation and Deactivation  . . . . . . . . . . . . . . . 20
     7.5.  Inter-AS Support . . . . . . . . . . . . . . . . . . . . . 22
     7.6.  Co-existence with Existing L2VPNs  . . . . . . . . . . . . 22



Kamite, et al.          Expires January 12, 2012                [Page 2]


Internet-Draft       VPMS Framework and Requirements           July 2011


     7.7.  Operation, Administration and Maintenance  . . . . . . . . 22
       7.7.1.  Fault Management . . . . . . . . . . . . . . . . . . . 22
       7.7.2.  Testing  . . . . . . . . . . . . . . . . . . . . . . . 23
       7.7.3.  Performance Management . . . . . . . . . . . . . . . . 23
     7.8.  Security . . . . . . . . . . . . . . . . . . . . . . . . . 24
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 24
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 25
   10. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 25
   11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 25
     11.1. Normative References . . . . . . . . . . . . . . . . . . . 25
     11.2. Informative References . . . . . . . . . . . . . . . . . . 25
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 26







































Kamite, et al.          Expires January 12, 2012                [Page 3]


Internet-Draft       VPMS Framework and Requirements           July 2011


1.  Introduction

1.1.  Problem Statement

   [RFC4664] describes different types of Provider Provisioned Layer 2
   VPNs (L2 PPVPNs, or L2VPNs).  Some of them are widely deployed today,
   such as Virtual Private Wire Service (VPWS) and Virtual Private LAN
   Service (VPLS).  A VPWS is a VPN service that supplies a Layer 2 (L2)
   point-to-point service.  A VPLS is an L2 service that emulates
   Ethernet LAN service across a Wide Area Network (WAN).

   For some use cases described hereafter, there are P2MP (point-to-
   multipoint) type services for Layer 2 traffic.  However, there is no
   straightforward way to realize them based on the existing L2VPN
   specifications.

   In a VPWS, a SP can set up point-to-point connectivity per a pair of
   CEs but it is not possible to replicate traffic for point-to-
   multipoint services in the SP's network side.  A SP could build
   multiple Pseudowires (PWs) independently and have the CEs replicate
   traffic over them, but this is not only inconvenient for the
   customer, it's a waste of bandwidth resources.

   In a VPLS, SPs can natively offer multipoint connectivity across
   their backbone.  Although it is seemingly applicable for point-to-
   multipoint service as well, there remains extra complexity for SPs to
   filter unnecessary traffic between irrelevant sites (i.e., from a
   receiver PE to another receiver PE) because VPLS provides multipoint-
   to-multipoint connectivity between CEs.  Moreover, VPLS's MAC-based
   learning/forwarding operation is unnecessary for some scenarios
   particularly if customers only need simple unidirectional point-to-
   multipoint service, or if they require non- Ethernet Layer 2
   connectivity.

   Consequently, there is a real need for a solution that natively
   provides point-to-multipoint service in L2VPN.

1.2.  Scope of This Document

   VPMS is defined as a Layer 2 service that provides point-to-
   multipoint connectivity for a variety of Layer2 link layers across an
   IP or MPLS-enabled PSN.  VPMS is categorized as a class of provider-
   provisioned Layer 2 Virtual Private Networks (L2VPN).

   This document introduces a new service framework, reference model and
   functional requirements for VPMS by extending the existing framework
   [RFC4664] and requirements [RFC4665] for L2VPNs.




Kamite, et al.          Expires January 12, 2012                [Page 4]


Internet-Draft       VPMS Framework and Requirements           July 2011


   The technical specifications are outside the scope of this document.
   There is no intent to specify solution-specific details.

   This document provides requirements from both the Service Provider's
   and the Customer's point of view.


2.  Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119] .


3.  Terminology

   The content of this document makes use of the terminology defined in
   [RFC4026].  For readability purposes, we list some of the terms here
   in addition to some specific terms used in this document.

3.1.  Acronyms

   P2P:  Point-to-Point

   P2MP:  Point-to-Multipoint

   PW:  Pseudowire

   VPMS:  Virtual Private Multicast Service

   PE/CE:  Provider/Customer Edge

   P: Provider Router

   AC:  Attachment Circuit

   PSN:  Packet Switched Network

   SP:  Service Provider

   VPMS instance:  A service entity manageable in a VPMS that provides
      isolated service reachability domain to each CE.  It corresponds
      to a so-called "VPN" as a specific set of sites that allows
      communication.







Kamite, et al.          Expires January 12, 2012                [Page 5]


Internet-Draft       VPMS Framework and Requirements           July 2011


   P2MP connection:  A logical entity between PE/ACs in a given VPMS
      instance that transfers unidirectional traffic transparently from
      one local ingress AC to one or more remote egress ACs.


4.  Use Cases

4.1.  Ethernet Use Case

4.1.1.  Ethernet-based multicast stream

   For multicast traffic delivery, there is a requirement to deliver a
   unidirectional P2MP service in addition to the existing P2P service.
   The demand is growing to provide private (P2MP native Ethernet)
   services, for various applications such as IP- based delivery of TV
   broadcasting, content delivery networks, etc.  Moreover, many digital
   audio/video devices (e.g., MPEG-TS, HD-SDI) that support Ethernet
   interfaces are becoming available, which will make Ethernet P2MP
   service more common.  Also there are some applications that naturally
   suited to static transport of VPMS.  For example, MPEG-TS/IP/Ethernet
   in DVB-H is typically static broadcast without any signaling in the
   upstream direction.  VPMS could be a possible solution to provide
   these kinds of networking connectivity over PSNs.

   Currently VPLS [RFC4761][RFC4762] is able to give P2MP-type
   replication for Ethernet traffic.  Native VPLS already supports this
   capability via a full mesh of PWs, and an extension to optimize
   replication is also proposed [I-D.ietf-l2vpn-vpls-mcast] as an
   additional feature.  However, VPLS by nature requires MAC-based
   learning and forwarding, which might not be needed in some cases by
   particular users.  Generally, video distribution applications use
   unidirectional P2MP traffic, but may not always require any added
   complexity of MAC address management.  In addition, VPLS is a service
   that essentially provides any-to-any connectivity between all CEs in
   a L2VPN as it emulates a LAN service.  However, if only P2MP
   connectivity is required, the traffic between leaves is not allowed.
   It might require extra efforts to guarantee this behavior in VPLS.
   And in some P2MP scenarios there no traffic from leafs to root.  In
   these cases, VPMS is a service that provides much simpler operation.

   Note that VPMS provides single coverage of receiver membership; that
   is, there is no distinct differentiation for multiple multicast
   groups.  All traffic from a particular Attachment Circuit (AC) will
   be forwarded toward the same remote receivers, even if the
   destination MAC address is changed.  Basically in VPMS, destination
   MAC addresses are not used for forwarding, which is significantly
   different from VPLS.  If MAC-based forwarding is preferred (i.e.,
   multicast/unicast differentiation of MAC address), VPLS should be



Kamite, et al.          Expires January 12, 2012                [Page 6]


Internet-Draft       VPMS Framework and Requirements           July 2011


   chosen rather than VPMS.

4.1.2.  Ethernet-based time/frequency synchronization

   Nowadays there exist several solutions to provide synchronization for
   time and/or frequency reference by the packet-based technology of
   Ethernet.  For example, PTPv2 (Precision Time Protocol version 2) is
   a time-transfer protocol defined in the IEEE 1588-2008 standard.  It
   provides precise synchronization of packet-based networks (e.g.,
   Ethernet).  It adopts two-way time transfer approach for
   synchronization.  Time transfer protocol may be operated in multicast
   or unicast mode in both directions, and it is mapped over the
   Ethernet/IP/UDP protocol stack.

   Moreover, PTPv2 telecom profile is now discussed in ITU-T that
   defines a set of capabilities and extensions required to support
   telecommunication applications.  It aims at providing frequency
   distribution with higher level of accuracy.  It allows unicast mode
   or the mix of unicast/multicast modes for the transmission of the PTP
   messages.

   In this aspect, VPMS might be considered as a potential packet-based
   infrastructure to deliver multicast messages in PTPv2 with efficient
   forwarding.  Note, however, in PTPv2 telecom profile, multicast
   transport may not always be supported in all the parts of a telecom
   network because multicast might sometimes generate additional PDV
   (packet delay variation) compared to unicast.  Therefore, VPMS use
   case and the corresponding solution for this purpose will need more
   study in the future (e.g., PDV issue to be checked).

4.2.  ATM-based Use Case

4.2.1.  ATM-based multicast stream

   A use case of ATM-based service in VPMS could be to offer the
   capability for service providers to support IP multicast wholesale
   services over ATM in case the wholesale customer relies on ATM
   infrastructure.  The P2MP support alleviates the constraint in terms
   of replication for ATM to support IP multicast services.

   Another use case of VPMS for ATM is for audio/video stream
   applications.  Today many digital TV broadcasting networks adopt ATM-
   based distribution systems with point-to-multipoint PVPs/PVCs.  The
   transport network supports replicating ATM cells in transit nodes to
   efficiently deliver programs to multiple terminals.  For migrating
   such ATM-based networks onto IP/MPLS-based networks, VPMS is
   considered to be a candidate solution.




Kamite, et al.          Expires January 12, 2012                [Page 7]


Internet-Draft       VPMS Framework and Requirements           July 2011


4.3.  TDM-based Use Case

4.3.1.  TDM-based multicast stream

   Today the existing VPWS already supports TDM emulation services
   (SAToP, CESoPSN or TDMoIP).  It is a Layer 1 service, not Layer 2
   service; however, a common architecture is being used since they are
   all packet-based emulations over a SP's network.  VPMS is also
   considered to be a solution for such TDM applications that require
   point-to-multipoint topology.

   One use case is TDM-based multicast stream delivery, like video
   delivery.  That is, data duplication is simply provided by Layer 1,
   without using upper layer's multicast protocols.


5.  Reference Model

   The VPMS reference model is shown in Figure 1.



       +-----+ AC1                                     AC2 +-----+
       | CE1 |>---+     ------------------------      +--->| CE2 |
       +-----+    |    |      VPMS A's P2MP     |     |    +-----+
        VPMS A    |  +------+ Connection    +------+  |    VPMS A
        Sender    +->|......>...+.......... >......|>-+    Receiver
                     | VPMS |   .           | VPMS |
                     | PE1  |   .           | PE2  |
                  +-<|......<.. . ....+.....<......|<-+
                  |  +------+   .     .     +------+  |
       +-----+    |    |        .     .         |     |    +-----+
       | CE4 |<---+    |Routed  .     . VPMS B's P2MP +---<| CE3 |
       +-----+ AC4     |Backbone.     . Connection     AC3 +-----+
        VPMS B         |        .     .         |          VPMS B
        Receiver       |      +-v-----v-+       |          Sender
                        ------| .     . |-------
                              | . VPMS. |
                              | . PE3 . |
                              +---------+
                                v     v       VPMS A:
                                |     |         Root AC  : AC1
                             AC5|     |AC6      Leaf AC  : AC2, AC5
                                v     v       VPMS B:
                           +-----+   +-----+    Root AC  : AC3
                           | CE5 |   | CE6 |    Leaf AC  : AC4, AC6
                           +-----+   +-----+
                           VPMS A     VPMS B



Kamite, et al.          Expires January 12, 2012                [Page 8]


Internet-Draft       VPMS Framework and Requirements           July 2011


                           Receiver   Receiver

                     Figure 1: Reference Model for VPMS

   A VPMS instance is defined as a service entity manageable in the VPMS
   architecture.  A single VPMS instance provides an isolated service
   reachability domain to each CE, so it corresponds to a so-called
   "VPN" as it allows communication among a specific set of sites.  A
   single VPMS instance provides a unique point-to-multipoint L2VPN
   service.  In Figure 1, there are two VPMS instances shown, VPMS A and
   VPMS B. In principle, there is no traffic exchange allowed between
   these different instances, so they are treated as different VPNs.

   In a VPMS, a single CE-PE link connection is used for transmitting
   frames for delivery to multiple remote CEs, with point-to-multipoint
   duplication.  The SP's network (PE as well as P) has a role to
   replicate frames so that the sender's CE does not need to send
   multiple frames to individual receivers.

   Like VPWS, an Attachment Circuit (AC) is provided to accommodate CEs
   in a VPMS.  In a VPMS, an AC attached to a VPMS MUST be configured as
   "root" (sender) or "leaf" (receiver) not both.  Any AC is associated
   with the role of either sending side (Tx) or receiving side (Rx) from
   the view of the CE.  These will be named the root (sender) AC and
   leaf (receiver) AC respectively.  Unless reverse traffic is
   optionally supported, a root AC does not transmit traffic back to a
   CE at upstream side, likewise a leaf AC does not receive traffic from
   a CE at downstream side.  In Figure 1, AC1 and AC3 are configured as
   root ACs while AC2, AC4, AC5 and AC6 are configured as leaf ACs.  In
   VPMS A, CE1 could send traffic via AC1, and CE2 and CE5 could receive
   the traffic.

   A CE which is locally connected to a root AC is called a root
   (sender) CE.  Also a CE which is locally connected to a leaf AC is
   called a leaf (receiver) CE.  However, such CEs's roles will not be
   managed directly in VPMS because the configured AC's role (root or
   leaf) will automatically determine them.

   Similarly, a PE which locally accommodates a root AC is called a root
   (sender) PE.  A PE which locally accommodates a leaf AC is called a
   leaf (receiver) PE.

   Root AC and leaf ACs are typically located at separate PEs as shown
   in Figure 1, but it is also allowed that a single PE locally has both
   a root AC and one or more leaf ACs.

   Basically there is a one-to-one mapping between an attachment circuit
   and a VPMS instance.  For example, all traffic from CE1 to PE1



Kamite, et al.          Expires January 12, 2012                [Page 9]


Internet-Draft       VPMS Framework and Requirements           July 2011


   (through AC1) is mapped to VPMS A (to CE2 and CE5).

   In a VPMS, P2MP tree-shaped reachability is given from a single root
   AC to several leaf ACs.  This will be named a "P2MP connection" in
   this VPMS framework.  P2MP connection is a logical entity between PE/
   ACs in a given VPMS instance that transfers unidirectional traffic
   transparently from one local ingress AC to one or more remote egress
   ACs.

   Similar to other L2VPN mechanisms, the VPMS architecture is based on
   PWs which may be using through IP or MPLS-enabled PSN tunnels over a
   routed backbone.  That is, every P2MP connection can be instantiated
   by PW technology that supports P2MP traffic optimization (i.e., P2MP
   PW.  See section 7.2.).  P2MP traffic optimization will provide the
   benefit of traffic replication for high bandwidth efficiency.  That
   is, the sender CE has only to transmit one stream towards the PE and
   it does not have to replicate traffic.

   Regarding end-to-end traffic topology between the ACs, a single VPMS
   instance (i.e., one VPN) may correspond to a single P2MP connection.
   In Figure 1, VPMS A (one instance) has one P2MP connection (from AC1
   to AC2 and AC5).  However, there is also a case that a single VPMS
   consists of two or more P2MP connections grouped, which is typically
   used for multi-source or redundancy.  The details are given in
   section 6.4 and 6.5.

   VPMS can support various Layer 2 protocol services such as Ethernet,
   ATM, etc.


6.  Customer Requirements

6.1.  Service Topology

6.1.1.  Point-to-Multipoint Traffic Support

   A solution MUST support unidirectional point-to-multipoint traffic
   from a sender CE to multiple receiver CEs.  A root CE can send
   traffic to one or more leaf CEs.  Leaf CEs include not only the CEs
   which are located at remote sites, but also the local CEs which are
   connected to the same root PE (i.e., when a root AC and some of leaf
   ACs are co-located).  If there is only one receiver in the instance,
   it is considered equivalent to unidirectional point-to-point traffic.

6.1.2.  Reverse Traffic Support

   There are cases where a reverse traffic flow is needed.  A root CE
   may need to receive traffic from leaf CEs.  There are some usage



Kamite, et al.          Expires January 12, 2012               [Page 10]


Internet-Draft       VPMS Framework and Requirements           July 2011


   scenarios for this, such as stream monitoring through a loopback
   mechanism, control channels which need feedback communication etc.  A
   possible way to accomplish this is to provide different VPMS
   instances for reverse traffic, i.e. a root CE is a receiver of
   another VPMS instance.  However, provisioning different VPNs for a
   particular customer would make its management task more complex.  It
   is desired to have an alternative solution for supporting reverse
   traffic flow.  This section provides additional requirements for this
   optional capability.

   Therefore, a VPMS solution MAY support reverse traffic from a leaf AC
   to a root AC.  Each reverse path is basically given in a P2P
   (unicast) manner.  In other words, each leaf of the P2MP tree can
   individually send back traffic to the root.  For this purpose a VPMS
   instance MAY have more than one reverse P2P connections as network
   entity; However, such network entities MUST have a common indetifier
   that enables themselves to be managed together in the same VPN.  Thus
   any PWs used for such connections are expected to be assigned a
   common VPMS instance ID (i.e., VPN ID).

   Note, a VPMS does not assume any-to-any multipoint reachability.
   Therefore, in principle, every leaf AC does not need to exchange
   traffic directly with other leaf ACs even if reverse traffic is
   supported.

   Figure 3 illustrates this kind of scenario, where CE1 is configured
   as a sender in VPMS A. AC1 is a root AC, and AC2/AC3/AC4 are leaf
   ACs.  P2MP connection is given for traffic in the forward direction.
   Unidirectional P2P connection is also provided for traffic in the
   reverse direction, from AC4 to AC1.  Other reverse P2P connections
   can be provided similarly. (from AC2 to AC1 / from AC3 to AC1).

   In this case, PEs need to deal with two types of traffic, locally-
   attached CE's sending (Tx) and receiving (Rx) flows.  In Figure 3,
   they are both passing through the same physical PE-CE link (AC1 and
   AC4 respectively).  But it is an implementation matter if Tx and Rx
   traffic are conveyed on the same physical link or separate links.  It
   is also possible that a root PE multiplexes two ore more reverse
   traffic from different leaves and transmits it to an upstream CE over
   the same local physical link.

   Note, in most implementations of VPWS today, every AC is always
   considered bidirectional.  In contrast, in VPMS, every AC can be
   chosen unidirectional (if it is a totally unidirectional service), or
   bidirectional (if reverse traffic is supported).






Kamite, et al.          Expires January 12, 2012               [Page 11]


Internet-Draft       VPMS Framework and Requirements           July 2011


          +-----+ <-- Rx   (bidirectional)
          | CE1 |--------------+
          +-----+ --> Tx       |
    VPMS A Sender              |
                           AC1 |
                             +----------+ VPMS
                             | . .      | PE1
                             | .  ....  |
                      -------| .      . |--------
                     |  P2MP +-v------^-+        |
                  Connection   .      .          |
                    (forward)  +      .          |
                     |         .      .          |
                   +------+  . . .    .        +------+
                +-<|......<..  .  ..  .  ......>..... |>-+
                |  | VPMS |    .      .        | VPMS |  |
             AC2|  | PE2  |    .      .        | PE3  |  |AC3
                |  +------+    .      .        +------+  |
      +-----+   |    |         .      . P2P      |       |   +-----+
      | CE2 |<--+    | Routed  .      . Connection       +-->| CE3 |
      +-----+ <--    | Backbone.      . (reverse)|       --> +-----+
     VPMS A     Rx   |       +-v------^-+        |        Rx VPMS A
     Receiver         -------| .      . |--------            Receiver
                             | .  ....  |
                             | . .      | VPMS
                             +----------+ PE4
                            AC4|
                               |
                               |           <-- Tx   +-----+
                               +--------------------| CE4 |
                           (bidirectional) --> Rx   +-----+
                                                    VPMS A
                                                    Receiver


                       Figure 3: Reverse traffic support

6.2.  Transparency

   A solution is intended to provide Layer-2 traffic transparency.
   Transparency SHOULD be supported per VPMS instance basis.  In other
   words, Layer-2 traffic can be transparently transported from a local
   CE to remote CEs in a given instance.  Note, however, if service
   delimiting fields (VLAN Id in Ethernet, VPI/VCI in ATM, DLCI in FR
   etc.) are assigned by the SP, the Layer-2 traffic is not necessarily
   transparent.  It will depend on the SP's choice if they assign it to
   each AC.  Hence, it could be that some of the leaf CEs are receiving
   traffic that has different delimiting fields than the traffic for the



Kamite, et al.          Expires January 12, 2012               [Page 12]


Internet-Draft       VPMS Framework and Requirements           July 2011


   other leaf CEs.  Hence, it could be that some of receiver CEs are
   getting traffic with different delimiting fields than the other
   receiver CEs.

   The VPMS solution SHOULD NOT require any special packet processing by
   the end users (CEs).

6.3.  Quality of Service (QoS)

   A customer may require that the VPMS service provide guaranteed QoS.
   In particular, for real time applications which are considered common
   in point-to-multipoint delivery, delay and loss sensitive traffic
   MUST be supported.  The solution SHOULD provide native QoS techniques
   for service class differentiation, such as IEEE 802.1p CoS for
   Ethernet.

   For bandwidth committed services (e.g., ATM CBR), a solution SHOULD
   guarantee end-to-end bandwidth.  It MAY provide flow admission
   control mechanisms to achieve that.

6.4.  Multi-Source Support

   A VPMS solution SHOULD support multiple sources in each VPN.  That
   is, two or more sender CEs can exist in the same VPMS instance.  Each
   sender CE SHOULD be able to be connected to physically separate root
   PEs, which will facilitate flexible topology design.

   Additionally, traffic from sender CEs MAY have a common single
   coverage to receiver CEs, i.e., data from any sources can reach the
   same group of receivers.  For example, in TV provisioning scenario,
   customers may need to receive two or more TV channels from different
   sources.  In figure 3, suppose there are 7 hosts, CE1 to CE7 which
   belong to a given VPMS instance A. CE1, CE2 and CE3 are common
   sources of this VPN, and are attached to different PEs respectively.
   Traffic from each source can reach the same group of receivers, CE4
   to CE7.

   This kind of scenario will require multiple P2MP connections in a
   single VPMS instance (i.e., VPN).  Each P2MP connection's root might
   be a completely different CE/AC, but leaf CE/ACs are overlapped.
   Since this is basically the same requirement as dual-homed scenario,
   see section 6.5.1 for details.









Kamite, et al.          Expires January 12, 2012               [Page 13]


Internet-Draft       VPMS Framework and Requirements           July 2011


                    VPMS A +-----+     +-----+ VPMS A
                    Sender | CE1 |     | CE2 | Sender
                           +-----+     +-----+
                             |          |
      +-----+ VPMS A         v AC1      v AC2
      | CE3 | Sender        +----+     +----+
      +-----+          -----|VPMS|-----|VPMS|-----
          \           |     | PE1|     | PE2|     |
           \          |     +----+     +----+     |
            \         |                           |
             \ AC3  +----+                      +----+
              +---->|VPMS|                      |VPMS|  AC5    VPMS A
                    | PE3|  Routed              | PE4|-----+   Receiver
                    +----+  Backbone            +----+     |   +-----+
                   /  |                           |  \     +-->| CE5 |
              AC4 /   |                           |   \        +-----+
                 /    |                           |    \ AC6
     +-----+    /     |           +----+          |     \   +-----+
     | CE4 |<--+       -----------|VPMS|----------       +->| CE6 |
     +-----+                      | PE5|                    +-----+
      VPMS A                      +----+                    VPMS A
      Receiver                      | AC7                   Receiver
                                    v
                                 +-----+
                                 | CE7 | VPMS A
                                 +-----+ Receiver



                       Figure 3: Multi-Source support

6.5.  High Availability

   A solution MUST provide protection and restoration mechanism for end-
   to-end services to ensure high availability.

   There are multiple parts of the connection that can support
   protection and restoration: (1) CE to PE, (2) between PEs (3) inside
   core (PSN backbone).  It is expected that (3) is fulfilled by
   existing PSN protection mechanisms (e.g., RSVP-TE FRR).  Following
   subsections covers the requirements for redundancy support for (1)
   and (2).

6.5.1.  Dual-homed Access Support

   A solution MUST allow dual-homed redundant access from a CE to
   multiple PEs.  This if beneficial to support reliable data delivery
   for customers.  Figure 4 provides an example of this access topology.



Kamite, et al.          Expires January 12, 2012               [Page 14]


Internet-Draft       VPMS Framework and Requirements           July 2011


              +-----+
              | CE1 |--------------+
              +-----+               \
        VPMS A  |                   |
        Sender  |                   v AC1
    (dual-homed)|                 +----+
                |            -----|VPMS|--------
                |           |     | PE1|        |
                \           |     +----+        |
                 \  AC2   +----+             +----+   AC4
                  +------>|VPMS|             |VPMS|------------+
                          | PE2|  Routed     | PE3|             \
                          +----+  Backbone   +----+\            |
                     AC3 /  |                   |   \ AC5       v
              +-----+   /   |                   |    \        +-----+
              | CE2 |<-+    |                   |     \       | CE3 |
              +-----+       |    +----+         |      \      +-----+
              VPMS A         ----|VPMS|---------        \     VPMS A
              Receiver           | PE4|                  |    Receiver
                                 +----+                  |
                                   |  AC6                v
                                    \                 +-----+
                                     +--------------->| CE4 |
                                                      +-----+
                                                      VPMS A
                                                      Receiver
                                                     (dual-homed)

                       Figure 4: Dual-homing support

   A solution SHOULD provide a protection mechanism between the
   redundant PEs to which a CE is dual-homed.  This is because when an
   ingress root PE node fails whole traffic delivery will fail unless a
   backup root PE is provided, even in case of dual-homed access.
   Similarly, if an egress leaf PE node fails, traffic toward that CE is
   never received unless a backup leaf PE is provided.

   In some cases, the data source is required to be highly reliable
   since it is often deployed as a centralized server that provides
   traffic to many receivers.  Therefore, there is an additional
   requirement specifically about redundancy of root-side: each VPMS
   instance SHOULD be able to have multiple P2MP connections whose roots
   are located at separate root ACs.  Those root ACs can be located at
   physically separate root PEs, whereas those trees will share common
   leaf ACs.  This means that each P2MP connection has a single root AC,
   but several P2MP connections can be managed together inside a common
   VPN.




Kamite, et al.          Expires January 12, 2012               [Page 15]


Internet-Draft       VPMS Framework and Requirements           July 2011


   For example, in Figure 5, traffic from root AC1 and AC2 both reach
   receivers CE3 and CE4 while AC1, AC2, AC3 and AC4 all are associated
   with a single VPMS instance.  This topology is reliable since there
   are redundant root PE/ACs.  At the egress side, PE3 and PE4 select
   traffic from either root, PE1 or PE2.  In this figure, each leaf PE
   has one leaf AC only (AC3 attached to PE3, and AC4 attached to PE4).
   Therefore, PEs will need to support PW protection and restoration
   mechanism so that two redundant P2MP connections are given among
   common ACs.





     +-----+ AC2
     | CE1 |>--------------------------------------------+
     +-----+                                             |
     AC1v  VPMS A                                        |
        |  Sender    -----------------------------       |
        |           |           VPMS A's P2MP     |      |
        |        +------+       Connection-2   +------+  |
        +------->|......>..    .............+..<......|<-+
              Tx | VPMS | .    .            .  | VPMS | Tx
                 | PE 1 | .    .            .  | PE 2 |
                 |      | .    .            .  |      |
                 +------+ .    .            .  +------+
                    |     .    .            .     |
           VPMS A's P2MP  +..  .  ......    .     |
           Connection-1   .    .       .    .     |
                    |     .    .       .    .     |
                    |   +-v----v-+   +-v----v-+   |
                     ---| .   .  |---| .   .  |---
                    VPMS|  . .   |   |  . .   |VPMS
                    PE 3|   .    |   |   .    |PE 4
                        +--------+   +--------+
                            v            v
                         AC3|            |AC4
                            v            v
                        +-----+       +-----+
                        | CE3 |       | CE4 |
                        +-----+       +-----+
                        VPMS A         VPMS A
                        Receiver       Receiver

        Figure 5: Multiple P2MP connections in Dual-homed Sender






Kamite, et al.          Expires January 12, 2012               [Page 16]


Internet-Draft       VPMS Framework and Requirements           July 2011


6.5.2.  Single/Dual Traffic Support in Dual-homed Access

   When dual-homed access to root PEs is provided, a solution MAY allow
   a sender CE to transmit just a single copy of the traffic to either
   one of the two root (ingress) PEs or to transmit a copy of the
   traffic to both the PEs simultaneously.  The latter scenario consumes
   more resource of CE-PE link than the single traffic scenario, but it
   is usually applicable when a source device has only a simple
   forwarding capability without any switchover functionality.  In such
   a dual traffic case, the backup root (ingress) PE SHOULD be able to
   filter the incoming unnecessary traffic while the other root PE is
   active if it is needed by SP.  In either case, single traffic or dual
   traffic, the switchover mechanism between root (ingress) PEs will be
   necessary to handle traffic appropriately in case of failure.

   In the case of dual-homed access to leaf PEs, a solution MAY allow a
   receiver CE to receive a single copy of the traffic from either one
   of the two leaf (egress) PEs, or receive a copy of the traffic from
   both PEs simultaneously.  The dual traffic approach is applicable if
   CE has fast switchover capability as a receiver by selecting either
   one of incoming traffic, but note that additional traffic resources
   are always consumed at PE-CE link of backup side.  Specifically in
   the single traffic case, it might be needed to support switchover
   mechanism between egress PEs in case of failure.

6.6.  Security

   The basic security requirements from the view of customers are raised
   in section 6.5 of [RFC4665].  It also applies to VPMS.

   In addition, a VPMS solution MAY have the mechanisms to activate the
   appropriate filtering capabilities (for example, MAC/VLAN filtering
   etc.), and it MAY be added with the control mechanism between
   particular sender/receiver sites inside a VPMS instance.  For
   example, in Figure 1, filtering can be added such that traffic from
   CE1 to CE4/CE5 is allowed but traffic from CE1 to CE6 is filtered.

6.7.  Reordering Prevention

   A solution SHOULD prevent Layer-2 frame reordering when delivering
   customer traffic under normal conditions.

6.8.  Failure reporting

   A solution MAY provide information to the customer about failures.
   For example, if there is a loss of connectivity toward some of the
   receiver CEs, it is reported to the sender CE.




Kamite, et al.          Expires January 12, 2012               [Page 17]


Internet-Draft       VPMS Framework and Requirements           July 2011


7.  Service Provider Network Requirements

7.1.  Scalability

   A VPMS solution MUST be designed to scale well with an increase in
   the number of any of the following metrics:

   -  the number of PEs (per VPMS instance and total in a SP network)
   -  the number of VPMS instances (per PE and total)
   -  the number of root ACs / sender CEs (per PE, VPMS instance and
      total)
   -  the number of leaf ACs / receiver CEs (per PE, VPMS instance and
      total)

   A VPMS solution SHALL document its scalability characteristics in
   quantitative terms.  A solution SHOULD quantify the amount of state
   that a PE and a P device has to support.

   The scalability characteristics SHOULD include:

   -  the processing resources required by the control plane in managing
      PWs (neighborhood or session maintenance messages, keepalives,
      timers, etc.)
   -  the processing resources required by the control plane in managing
      PSN tunnels
   -  the memory resources needed for the control plane
   -  other particular elements inherent to each solution that impact
      scalability

7.2.  Pseudo Wire Signaling and PSN Tunneling

   A VPMS solution SHOULD provide an efficient replication that can
   contribute to optimizing the bandwidth usage required in a SP's
   network.  For supporting efficient replication, it is expected to
   take advantage of PW and PSN mechanisms that are capable of P2MP
   traffic.

   Regarding PW mechanism, [I-D.ietf-pwe3-p2mp-pw-requirements]
   introduces P2MP PW concept and its requirements, showing two basic
   approaches of providing replication.  One is SS (Single Segment)-PW
   model that provides replication by PSN tunnel such as P2MP LSP (i.e.,
   by outer label layer), and the other is MS (Multi Segment)-PW model
   that provides replication by multiple interconnected PWs (i.e., by
   inner label layer).  In either case, end-to-end P2MP topology (i.e.,
   P2MP connection) in VPMS is common from the view of ACs.
   Requirements as a provider service specified in this document will be
   commonly applied regardless of P2MP PW's signaling model.




Kamite, et al.          Expires January 12, 2012               [Page 18]


Internet-Draft       VPMS Framework and Requirements           July 2011


   It is out of scope of this document how to extend and use PW
   mechanisms to realize P2MP connections.  For example, it is under the
   scope of the solution work how to support forward/reverse traffic
   e.g., by a single PW signaling, coupling multiple PWs, or other ways.

   This document does not raise any specific requirements for particular
   PSN tunneling schemes (point-to-point, point-to-multipoint and
   multipoint-to-multipoint) that are applied to VPMS.  The actual type
   of PSN tunnel used in VPMS will be dependent on individual deployment
   scenarios (e.g., which PSN protocol is available in the core and how
   much of the network resources that operators will want to optimize).

7.3.  Auto-discovery

   A solution SHOULD support auto-discovery methods that dynamically
   allow VPMS related information to be discovered by the PEs to
   minimize the amount of configuration the SP must perform.

   All of the requirements on discovery described in Section 7.3 of
   [RFC4665] SHOULD be satisfied in VPMS as well.

   Auto-discovery will help operators' initial configuration of adding a
   new VPN (i.e., VPMS instance), adding/deleting new sender/receiver,
   and so on.

   The candidate information treated in auto-discovery will be as
   follows:

   -  Information to indentify the location of each PE, e.g., PE router
      ID / IP address
   -  Information to identify the VPMS instance, that is, to identify a
      VPN
   -  Information to identify the type of ACs (root AC or leaf AC)
   -  Information to identify the P2MP connection that binds ACs
   -  Information to show if reverse traffic support is optionally
      desired
   -  SP-related information (AS number, etc. for an inter-provider
      case)

   Following is an example scenario about adding a new leaf PE: suppose
   there are three PEs in an existing VPMS, PE1, PE2, PE3.  PE1 is a
   root PE and has a AC1.  PE2 and PE3 are leaves and have AC2 and AC3.
   every PE has the association among the information described above.
   Now a new PE4 having an AC4 is provisioned in the existing VPMS
   instance and this AC is configured as leaf.  This information will be
   automatically discovered by the other existing remote PEs (i.e.,
   ingress and egress PEs in the same VPMS instance).  Once the ingress
   PE1 discovers this new PE/AC, it can automatically add AC4 as the new



Kamite, et al.          Expires January 12, 2012               [Page 19]


Internet-Draft       VPMS Framework and Requirements           July 2011


   leaf of P2MP connection topology according to P2MP PW signaling
   mechanism.  The ingress PE1 will graft a new leaf (PE4) to the
   already existing P2MP connection which is now created from AC1 to
   AC2/AC3/AC4.  This operation does not require any new configuration
   at the existing PEs.

   Another example is about adding a new root PE: suppose there are one
   root PE (PE1/AC1) and three leaf PEs (PE2/AC2, PE3/AC3 and PE4/AC4).
   There is an existing P2MP connection from AC1 to AC2/AC3/AC4.  Now
   the operator adds a new root PE/AC (PE5/AC5) for some reasons (e.g.,
   multiple source sites, dual-homed access, root PE redundancy etc.).
   Then, auto-discovery mechanism advertises this information to all
   other members PE1/PE2/PE3/PE4, and a new P2MP connection from AC5 to
   AC2/AC3/AC4 is created by PW signaling.

   Note that VPMS instance is created when one root AC and at least one
   leaf AC are added.  In principle VPMS requires such minimum
   provisioning.  Hence in dual-homing case of sender, only backup root
   PE can be dynamically added/deleted to/from VPMS without destroying
   the VPN.

7.4.  Activation and Deactivation

   A solution SHOULD provide a way to activate/deactivate the
   administrative status of each AC.  After initial provisioning, an SP
   might change connectivity configuration between particular CEs inside
   a single VPMS instance for operational reasons.  This feature will be
   beneficial to help such a scenario.

   For example, in Figure 6, AC1, AC3, AC4 and AC5 are initially
   provisioned for VPMS A. AC2 is not provisioned for any VPMSes.  In
   VPMS A, CE1 is a sender and CE3, CE4 and CE5 are receivers.  Traffic
   will usually flow from CE1 to all receivers, CE3, CE4 and CE5.
   However, for maintenance operation, application's request (e.g.,
   stream program has changed) or some other reasons, AC4 needs to be
   set as administratively deactivated.  Then it becomes necessary to
   turn off traffic from PE4 to CE4.  This operation must be
   appropriately distinguished from failure cases.

   When deactivating a particular site, backbone PSN/PW resources (e.g.,
   admission control of PSN tunnel) MAY be released for that particular
   direction in order to provide that bandwidth to other services.  In
   Figure 6, AC3 is now administratively activated and receiving
   traffic.  However, if AC3 comes to be administratively deactivated,
   and if RSVP-TE (including P2P and/or P2MP) is used for backbone PSN,
   then TE reserved resources from PE1 to PE3 may be released.

   In addition, a solution SHOULD allow single-sided activation



Kamite, et al.          Expires January 12, 2012               [Page 20]


Internet-Draft       VPMS Framework and Requirements           July 2011


   operation at a root (ingress) PE.  In some scenarios, operators
   prefer centralized operation.  This is often considered natural for
   one-way digital audio/video distribution applications: SPs often want
   to complete their service delivery by a single operation at one
   source PE, not by multiple operations at many leaf (egress) PEs.
   Figure 6 illustrates this scenario, where a SP only has to do single-
   sided operation at PE1 (source) to administratively activate/
   deactivate various connections from AC1 to AC3, AC4 and/or AC5.  It
   is not needed to perform operations on PE3 and PE4 directly.


              +-----+   AC1
              + CE1 +----------------+
              +-----+                |
        VPMS A Sender                |
              (sending now)          v
                                  +----+
                             -----|VPMS|--------
                            |     | PE1|        |
                            |     +----+        |
                          +----+             +----+
                          |VPMS|             |VPMS|
                          | PE2|  Routed     | PE3|
                      AC2 +----+  Backbone   +----+ AC3
       (not provisioned) /  |                   |  \
              +-----+   /   |                   |   \   +-----+
              + CE2 +<-+    |                   |    +->| CE3 |
              +-----+       |    +----+         |       +-----+
           (not receiving)   ----|VPMS|---------    VPMS A Receiver
                                 | PE4|              (receiving now)
                                 +----+
                              AC5 /  \  AC4
              +-----+            /    \                  +-----+
              + CE5 +<----------+      +---------------->| CE4 |
              +-----+                                    +-----+
          VPMS A Receiver                            VPMS A Receiver
          (receiving now)                             (not receiving)

                                   AC1: Administratively activated
                                   AC2: No VPMS provisioned
                                   AC3: Administratively activated
                                   AC4: Administratively deactivated
                                   AC5: Administratively activated

                       Figure 6: Site activation and deactivation






Kamite, et al.          Expires January 12, 2012               [Page 21]


Internet-Draft       VPMS Framework and Requirements           July 2011


7.5.  Inter-AS Support

   A solution SHOULD support inter-AS scenarios, where there is more
   than one provider providing a common VPMS instance and VPN.  More
   specifically, it is necessary to consider the case where some of the
   PEs that compose one VPMS belong to several different ASes.

7.6.  Co-existence with Existing L2VPNs

   A solution MUST co-exist with the existing L2VPNs (e.g., VPWS, VPLS)
   across the same SP's network.  A solution MUST NOT impede the
   operation of auto-discovery and signaling mechanism that are already
   supported by the PEs for those existing L2VPNs.

7.7.  Operation, Administration and Maintenance

7.7.1.  Fault Management

7.7.1.1.  Fault Detection

   A solution MUST provide tools that detect reachability failure and
   traffic looping of data transport in a VPMS instance.  If multiple
   root ACs are supported (i.e., multiple P2MP connections are grouped
   together into a single VPMS instance), such tools MUST be able to
   perform distinguishing each P2MP connection.

7.7.1.2.  Fault Notification

   A solution MUST provide fault notification and trouble tracking
   mechanisms. (e.g.  SNMP-trap and syslog that notify fault to remote
   NMS.)

   In VPMS one point of failure at upstream often affects a number of
   downstream PEs and ACs that might raise a notification message.
   Hence notification messages MAY be summarized or compressed for
   operators' ease of management.

   In case of receiver-side failure (leaf PE or its AC), this fault
   status SHOULD be able to be monitored at root PE.  This will help an
   operator to monitor each leaf PE/AC in a centralized manner; that is,
   a root PE can collect leaf-side information.  How this status is
   transferred depends on a solution.

   In contrast, in case of sender-side failure (root PE or its AC), this
   fault status SHOULD also be able to be monitored at leaf PEs.  This
   will help an operator to troubleshoot at leaf PEs (i.e., distinguish
   local AC's failure from remote root AC's failure easily).




Kamite, et al.          Expires January 12, 2012               [Page 22]


Internet-Draft       VPMS Framework and Requirements           July 2011


   In any case of failure at SP's network, fault information MAY be
   notified to the customer.  Specifically, such fault MAY trigger
   generating customer OAM message toward CEs (e.g., AIS) and/or
   shutting down leaf ACs.

7.7.1.3.  Fault Isolation

   A solution MUST provide diagnostic/troubleshooting tools for data
   transport in a VPMS instance.

7.7.2.  Testing

   A solution MUST provide a mechanism for testing each data
   connectivity and verifying the associated information in a VPMS
   instance.  The connectivity is between a root and all leaf ACs (i.e.,
   each P2MP connection can be tested).

   Operators will run testing before and after service activation.
   Testing mechanism SHOULD support end-to-end testing of the data path
   used by customer's data.  End-to-end testing will have CE-to-CE path
   test and PE-to-PE path test.  A solution MUST support PE-to-PE path
   test and MAY support CE-to-CE path test.  In either case the minimum
   data path unit for each VPMS is unidirectional, hence if loopback
   testing is supported, additional consideration about reverse-path
   might also be needed (see section 6.1.2).

   If there are multiple P2MP connections for redundancy (active/backup
   tree) in a common VPMS (like in Figure 4), testing mechanism MUST be
   able to check the connectivity over not only working P2MP connection
   but also protecting connection(s).  This testing MUST be able to be
   performed from a root PE.  It MAY also be able to be performed from a
   sender CE.

7.7.3.  Performance Management

   A solution MUST offer mechanisms to monitor traffic performance
   parameters and statistics of data traffic in VPMS.

   A solution MUST provide access to:

   -  Traffic statistics (total traffic forwarded, incoming, outgoing,
      dropped, etc., by period of time)

   A solution SHOULD provide access to:







Kamite, et al.          Expires January 12, 2012               [Page 23]


Internet-Draft       VPMS Framework and Requirements           July 2011


   -  Performance information related to traffic usage, e.g., one-way
      delay, one-way jitter, one-way loss, delay variations (the
      difference of various one-way delay from a particular root PE to
      multiple leaf PEs) etc.

   All or part of this information SHOULD be made available through
   standardized SNMP MIB Modules (Management Information Base).

   It is expected that such information can be used for SLA monitoring
   between sender and receiver, to give the SP a clear picture of
   current service providing to the customer.

7.8.  Security

   Section 7.6. of [RFC4665] describes common Layer-2 VPN security
   requirements from service provider aspect, which also applies to
   VPMS.  (For example, an SP network MUST be protected against
   malformed or maliciously constructed customer traffic, etc.)

   This subsection adds VPMS-specific consideration and requirements.

   In VPMS, all traffic is transported with multicast duplication in
   terms of end-to-end perspective, regardless of customer's individual
   protocol.  A PE never processes CE's multicast control protocol
   (e.g., PIM, IGMP, MLD as Layer-3).  Hence, in PE and P, basically the
   security threat from malicious customer's C-plane protocol is small.

   In VPMS, there is security threat from malicious customers' D-plane
   traffic.  A PE might receive a high volume of data from a CE.  If
   there is no safeguard on PE, it will cause excessive replication in
   the SP network.  Therefore, a VPMS solution SHOULD support traffic
   policing to limit the unwanted data traffic.  Such a policing
   mechanism MUST be configurable per VPN basis, not the total of
   various VPNs to isolate malicious customer's traffic from others.


8.  Security Considerations

   The security requirements common to customers and service providers
   are raised in Section 5.5. of [RFC4665], which are fundamental for
   all Layer-2 VPN services.  VPMS is a variant of Layer-2 VPN, and that
   statement also applies to VPMS.

   Moreover, in this document, security requirements from the view of
   customers are shown in Section 6.5.  Security requirements from the
   view of providers are shown in Section 7.8.  They explain security
   considerations that are specific to VPMS.




Kamite, et al.          Expires January 12, 2012               [Page 24]


Internet-Draft       VPMS Framework and Requirements           July 2011


9.  IANA Considerations

   This document has no actions for IANA.


10.  Acknowledgments

   Many thanks to Ichiro Fukuda, Kazuhiro Fujihara, Ukyo Yamaguchi and
   Kensuke Shindome for their ideas and feedback in documentation.

   The authors gratefully acknowledge the valuable review and comments
   provided by Greg Mirsky and Yuji Tochio.


11.  References

11.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC4026]  Andersson, L. and T. Madsen, "Provider Provisioned Virtual
              Private Network (VPN) Terminology", RFC 4026, March 2005.

11.2.  Informative References

   [I-D.ietf-l2vpn-vpls-mcast]
              Aggarwal, R., Kamite, Y., and L. Fang, "Multicast in
              VPLS", draft-ietf-l2vpn-vpls-mcast-09 (work in progress),
              July 2011.

   [I-D.ietf-pwe3-p2mp-pw-requirements]
              Heron, G., Wang, L., Aggarwal, R., Vigoureux, M., Bocci,
              M., Jin, L., JOUNAY, F., Niger, P., Kamite, Y., DeLord,
              S., and L. Martini, "Requirements and Framework for Point-
              to-Multipoint Pseudowire",
              draft-ietf-pwe3-p2mp-pw-requirements-04 (work in
              progress), July 2011.

   [RFC4664]  Andersson, L. and E. Rosen, "Framework for Layer 2 Virtual
              Private Networks (L2VPNs)", RFC 4664, September 2006.

   [RFC4665]  Augustyn, W. and Y. Serbest, "Service Requirements for
              Layer 2 Provider-Provisioned Virtual Private Networks",
              RFC 4665, September 2006.

   [RFC4761]  Kompella, K. and Y. Rekhter, "Virtual Private LAN Service
              (VPLS) Using BGP for Auto-Discovery and Signaling",



Kamite, et al.          Expires January 12, 2012               [Page 25]


Internet-Draft       VPMS Framework and Requirements           July 2011


              RFC 4761, January 2007.

   [RFC4762]  Lasserre, M. and V. Kompella, "Virtual Private LAN Service
              (VPLS) Using Label Distribution Protocol (LDP) Signaling",
              RFC 4762, January 2007.


Authors' Addresses

   Yuji Kamite
   NTT Communications Corporation
   Granpark Tower
   3-4-1 Shibaura, Minato-ku
   Tokyo  108-8118
   Japan

   Email: y.kamite@ntt.com


   Frederic Jounay
   France Telecom
   2, avenue Pierre-Marzin
   22307 Lannion Cedex
   France

   Email: frederic.jounay@orange-ftgroup.com


   Ben Niven-Jenkins
   Velocix
   326 Cambridge Science Park
   Milton Road, Cambridge
   CB4 0WG
   UK

   Email: ben@niven-jenkins.co.uk


   Deborah Brungard
   AT&T
   Rm. D1-3C22, 200 S. Laurel Ave.
   Middletown, NJ, 07748
   USA

   Email: dbrungard@att.com






Kamite, et al.          Expires January 12, 2012               [Page 26]


Internet-Draft       VPMS Framework and Requirements           July 2011


   Lizhong Jin
   ZTE Corporation
   889, Bibo Road
   Shanghai, 201203
   China

   Email: lizhong.jin@zte.com.cn












































Kamite, et al.          Expires January 12, 2012               [Page 27]