Network Working Group                              B. Niven-Jenkins, Ed.
Internet-Draft                                                        BT
Intended status: Informational                          D. Brungard, Ed.
Expires: January 4, 2009                                            AT&T
                                                           M. Betts, Ed.
                                                         Nortel Networks
                                                             N. Sprecher
                                                  Nokia Siemens Networks
                                                           July 03, 2008


                          MPLS-TP Requirements
               draft-jenkins-mpls-mpls-tp-requirements-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on January 4, 2009.

Abstract

   This document specifies the requirements for a MPLS Transport Profile
   (MPLS-TP).  This document is a product of a joint ITU-IETF effort to
   include a MPLS Transport Profile within the IETF MPLS architecture to
   support the capabilities and functionalities of a packet transport
   network as defined by ITU-T.

   This work is based on two sources of requirements, MPLS architecture



Niven-Jenkins, et al.    Expires January 4, 2009                [Page 1]


Internet-Draft            MPLS-TP Requirements                 July 2008


   as defined by IETF and packet transport networks as defined by ITU-T.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Terminology  . . . . . . . . . . . . . . . . . . . . . . .  4
     1.2.  Transport network overview . . . . . . . . . . . . . . . .  5
   2.  MPLS-TP Requirements . . . . . . . . . . . . . . . . . . . . .  6
     2.1.  General requirements . . . . . . . . . . . . . . . . . . .  6
     2.2.  Layering requirements  . . . . . . . . . . . . . . . . . .  7
     2.3.  Data plane requirements  . . . . . . . . . . . . . . . . .  8
     2.4.  Control plane requirements . . . . . . . . . . . . . . . .  9
     2.5.  Network Management (NM) requirements . . . . . . . . . . . 11
     2.6.  OAM requirements . . . . . . . . . . . . . . . . . . . . . 12
     2.7.  Network performance management (PM) requirements . . . . . 12
     2.8.  Protection & Survivability requirements  . . . . . . . . . 12
     2.9.  QoS requirements . . . . . . . . . . . . . . . . . . . . . 15
     2.10. Security requirements  . . . . . . . . . . . . . . . . . . 16
   3.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 16
   4.  Security Considerations  . . . . . . . . . . . . . . . . . . . 16
   5.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 16
   6.  Informative References . . . . . . . . . . . . . . . . . . . . 17
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 17
   Intellectual Property and Copyright Statements . . . . . . . . . . 19




















Niven-Jenkins, et al.    Expires January 4, 2009                [Page 2]


Internet-Draft            MPLS-TP Requirements                 July 2008


1.  Introduction

   For many years, SONET/SDH has provided service providers with a high
   benchmark for reliability and operational simplicity.  With the
   accelerating growth of packet-based services (such as Ethernet, VoIP,
   L2/L3 VPN, IPTV, RAN backhauling, etc.), service providers are in
   need of capabilities to efficiently support packet-based services on
   their transport networks.  The need to increase their revenue while
   remaining competitive forces operators to look for the lowest network
   Total Cost of Ownership (TCO).  Investment in both Capital
   Expenditure (CAPEX) and Operational Expense (OPEX) should be minimal.

   Carriers are considering migrating to packet transport networks in
   order to reduce their costs and to improve their ability to support
   services with guaranteed SLAs.  Migrating from SONET/SDH to packet
   transport networks should not involve dramatic changes in network
   operation, should not necessitate extensive retraining, and should
   not require major changes to existing work practices.  The aim is to
   preserve the look-and-feel to which carriers have become accustomed
   in deploying their SONET/SDH networks, while providing common, multi-
   layer operations, resiliency, control and management for packet,
   circuit and lambda transport networks.

   Service providers require control and deterministic usage of network
   resources.  They need end-to-end control to engineer network paths
   and to efficiently utilize network resources.  They require
   capabilities to support static (OSS based) or dynamic (control plane)
   provisioning of deterministic, protected and secured services and
   their associated resources as well as alternative control-plane
   options.

   Carriers will still need to cope with legacy networks (which are
   composed of many layers and technologies), thus the packet transport
   network should interwork with other packet and transport networks
   (both horizontally and vertically).  Vertical interworking is also
   known as client/server or network interworking.  Horizontal
   interworking is also known as peer-partition or service interworking.
   For more details on each type of interworking and some of the issues
   that may arise (especially with horizontal interworking) see
   [ITU.Y1401.2008].

   MPLS is a maturing packet technology and it is already playing an
   important role in transport networks and services.  However, not all
   of MPLS's capabilities and mechanisms are needed and/or consistent
   with transport network operations.  There is therefore the need to
   define an MPLS Transport Profile (MPLS-TP) in order to support the
   capabilities and functionalities needed for packet transport network
   services and operations through combining the packet experience of



Niven-Jenkins, et al.    Expires January 4, 2009                [Page 3]


Internet-Draft            MPLS-TP Requirements                 July 2008


   MPLS with the operational experience of SONET/SDH.

   MPLS-TP will enable the migration of SONET/SDH networks to a packet-
   based network that will easily scale to support packet services in a
   simple and cost effective way.  MPLS-TP needs to combine the
   necessary existing capabilities of MPLS with additional minimal
   mechanisms in order that it can be used in a transport role.

   This document specifies the requirements for a MPLS Transport Profile
   (MPLS-TP).  This document is a product of a joint ITU-IETF effort to
   include a MPLS Transport Profile within the IETF MPLS architecture to
   support the capabilities and functionalities of a packet transport
   network as defined by ITU-T.

   This work is based on two sources of requirements, MPLS architecture
   as defined by IETF and packet transport networks as defined by ITU-T.
   The requirements of MPLS-TP are provided below.

   Although both static and dynamic configuration of MPLS-TP transport
   paths (including OAM and protection capabilities) is required by this
   document, it MUST be possible for operators to be able to completely
   operate (including OAM) an MPLS-TP network in the absence of any
   control plane protocols for dynamic configuration.

1.1.  Terminology

   Section: A section is a network segment between two LSRs that are
   immediately adjacent at the MPLS-TP layer.

   Service layer: A network layer in which transport paths are used to
   carry a customer's (individual or bundled) service (may be point-to-
   point, point-to-multipoint or multipoint-to-multipoint services).

   Tandem Connection: A tandem connection corresponds to a segment of a
   path.  This may be either a segment of an LSP (i.e. a sub-path), or
   one or more segment(s) of a PW.

   Transport path: A connection as define in G.805 [ITU.G805.2000].

   Transport path layer: A network layer which provides point-to-point
   or point-to-multipoint transport paths which are used to carry
   aggregates of the network service layer.

   Transmission media layer: A network layer which provides sections
   (two-port point-to-point connections) to carry the aggregate of
   network transport path or network service layers on various physical
   media.




Niven-Jenkins, et al.    Expires January 4, 2009                [Page 4]


Internet-Draft            MPLS-TP Requirements                 July 2008


1.2.  Transport network overview

   The connectivity service is the basic service provided by a transport
   network.  The purpose of a transport network is to transparently
   carry its clients (i.e. the stream of client PDUs or client bits)
   between endpoints in the network (typically over several intermediate
   nodes).  These endpoints may be service switching points or service
   terminating points.  The connectivity services offered to customers
   are aggregated into large transport paths with long-holding times,
   which enable the efficient and reliable operation of the transport
   network.  These transport paths are modified infrequently.

   Aggregation and hierarchy are beneficial for achieving scalability
   and security since:

   1.  They reduce the number of provisioning and forwarding states in
       the network core.

   2.  They reduce load and the cost of implementing service assurance
       and fault management.

   3.  Client signals are completely encapsulated and isolated from each
       other.  This also allows complete isolation of customer traffic
       from carrier operations.

   An important attribute of a transport network is its ability to
   function independently from both its client and server (transmission
   media) layer networks.  It should be capable of transmitting over any
   media.  Another key characteristic of transport networks is the
   capability to maintain the integrity of the client across the
   transport network.  A transport network must provide the means to
   commit quality of service objectives to clients.  This is achieved by
   providing a mechanism for client network service demarcation for the
   network path together with an associated network resiliency
   mechanism.  A transport network must also provide a method of service
   monitoring in order to verify the delivery of an agreed quality of
   service.  This is enabled by means of carrier-grade OAM tools.

   Client signals are first transparently encapsulated.  These
   encapsulated client signals are then aggregated for transport through
   the network in order to optimize network management.  Server layer
   OAM is used to monitor the transport integrity of the client layer
   aggregate.  At any hop, the aggregated signals may be further
   aggregated in lower layer transport network paths for transport
   across intermediate shared links.  The encapsulated client signals
   are extracted at the edges of aggregation domains, and are either
   delivered to the client or forwarded to another domain.  In the core
   of the network, only the server layer aggregated signals are



Niven-Jenkins, et al.    Expires January 4, 2009                [Page 5]


Internet-Draft            MPLS-TP Requirements                 July 2008


   monitored; individual client signals are monitored at the network
   boundary in the client layer network.

   Quality-of-service mechanisms are required in the packet transport
   network to ensure the prioritization of critical services, to
   guarantee BW and to control jitter and delay.


2.  MPLS-TP Requirements

2.1.  General requirements

   o  MPLS-TP MUST offer as much commonality as possible with the MPLS
      data plane as defined by IETF.  When MPLS offers multiple options
      in this respect, MPLS-TP SHOULD select the minimum sub-set
      (necessary and sufficient subset) applicable to a transport
      network application.

   o  Any new functionality that is defined to fulfil the requirements
      for MPLS-TP MUST be agreed within IETF and re-use (as far as
      practically possible) existing MPLS standards.

   o  Mechanisms and capabilities MUST be able to interoperate with
      existing IETF MPLS [RFC3031] and IETF PWE3 [RFC3985] control and
      data planes where appropriate.

   o  MPLS-TP MUST support a connection-oriented packet switching
      paradigm with traffic engineering capabilities that allow
      deterministic control of the use of network resources.

   o  MPLS-TP MUST support the logical separation of the control and
      management planes from the data plane.

   o  MPLS-TP MUST allow the physical separation of the control and
      management planes from the data plane.

   o  MPLS-TP MUST support point to point (P2P) or point to multipoint
      (P2MP) transport paths.

   o  MPLS-TP MUST support static provisioning of transport paths via an
      NMS/OSS (i.e. via the management plane).

   o  Static provisioning MUST NOT depend on routing or signaling
      protocols (e.g.  GMPLS, OSPF, IS-IS, RSVP, BGP, LDP etc.).

   o  MPLS-TP MUST support the capability for network operation
      (including OAM) via an NMS/OSS (without the use of any control
      plane protocols).



Niven-Jenkins, et al.    Expires January 4, 2009                [Page 6]


Internet-Draft            MPLS-TP Requirements                 July 2008


   o  MPLS-TP MUST support dynamic provisioning of transport paths via a
      control plane.

   o  The MPLS-TP data plane MUST be capable of functioning
      independently of the control or management plane used to operate
      the MPLS-TP layer network.  That is the MPLS-TP data plane
      operation MUST continue to operate normally if the management
      plane or control plane that configured the transport paths fails.

   o  MPLS-TP MUST support any network topology and be able to support
      increasing bandwidth demands, topology, number of customers or
      number of services incrementally.

   o  MPLS-TP SHOULD support mechanisms to safeguard against the
      provisioning of transport paths which contain forwarding loops.

2.2.  Layering requirements

   o  An MPLS-TP network MUST operate in a multiple layer network
      environment consisting of independent service, transport path and
      transmission media layers.

   MPLS-TP may be used as the service layer (for P2P and P2MP services)
   and/or as the transport path layer within a packet transport network.

   o  An MPLS-TP layer network MUST support the transparent transport of
      MPLS-TP and non MPLS-TP client layer networks.

   o  An MPLS-TP layer network MUST be able to be transparently carried
      over MPLS-TP and non MPLS-TP server layer networks (such as
      Ethernet, OTN, etc.)

   o  It MUST be possible to operate the MPLS-TP layer network
      independently of other layer networks (either MPLS-TP or non
      MPLS-TP).

   The above are not only technology requirements, but also operational.
   Different administrative groups may be responsible for the same layer
   network or different layer networks, and require the capability for
   autonomous network operations.

   o  It MUST be possible to hide MPLS-TP layer network addressing and
      other information (e.g. topology) from client layers.








Niven-Jenkins, et al.    Expires January 4, 2009                [Page 7]


Internet-Draft            MPLS-TP Requirements                 July 2008


2.3.  Data plane requirements

   o  The identification of each transport path within its aggregate
      MUST be supported.

   o  A label in a particular section MUST uniquely identify the
      transport path.

   o  A transport path's source MUST be identifiable at its destination.

   Transport paths can be aggregated into trunks by pushing and de-
   aggregated by popping labels.  MPLS-TP labels are swapped within a
   transport path in a layer network instance when the traffic is
   forwarded from one MPLS-TP link to another MPLS-TP link.

   o  Labeling MUST make use of the MPLS label and label stack entry as
      defined in RFC3032.

   o  It MUST be possible to operate and configure the MPLS-TP data
      (transport) plane without any IP functionality.

   o  MPLS-TP MUST support both unidirectional and bi-directional point-
      to-point transport paths.

   o  The forward and backward directions of a bi-directional transport
      path MUST be capable of following the same path within the MPLS-TP
      network.

   o  The intermediate nodes MUST be aware about the pairing
      relationship of the forward and the backward directions belonging
      to the same bi-directional transport path.

   o  MPLS-TP MUST support unidirectional point-to-multipoint transport
      paths.

   o  MPLS-TP transport paths MUST NOT perform merging in a way that
      prevents the unique identification of the source at the
      destination (e.g. no use of LDP mp2p signaling in order to avoid
      losing LSP head-end information, no use of PHP, etc).

   o  MPLS-TP MUST support transport paths through a single domain.

   o  MPLS-TP MUST support transport paths through multiple domains.

   o  MPLS-TP MUST be able to accommodate new traffic types.

   o  MPLS-TP SHOULD support mechanisms to minimize traffic impact
      during network reconfiguration.



Niven-Jenkins, et al.    Expires January 4, 2009                [Page 8]


Internet-Draft            MPLS-TP Requirements                 July 2008


   o  MPLS-TP SHOULD support mechanisms which ensure the integrity of
      the transported customer's service traffic.

   o  MPLS-TP MUST support an unambiguous and reliable means of
      distinguishing users' (client) packets from MPLS-TP control
      packets (e.g. control plane, management plane, OAM and protection
      switching packets).

2.4.  Control plane requirements

   o  A distributed control plane MAY be supported to enable fast,
      dynamic and reliable service provisioning in multi-vendor and
      multi-domain environments using standardized protocols that
      guarantee interoperability.

   o  If a control plane is used for configuration of MPLS-TP transport
      paths then:

      *  Failure of the control plane MUST NOT impact the MPLS-TP data
         plane.

      *  Recovery of the control plane MUST NOT impact the MPLS-TP data
         plane any more than is necessary to re-establish the control
         plane.

      *  It MUST support the setup, modification, and release of MPLS-TP
         transport paths and protection paths.

      *  It MUST support mechanisms to provide traffic engineering,
         constraint-based routing and explicit path control.

      *  It MUST provide mechanisms to address QoS and performance
         requirements (such as throughput, delay, packet loss, etc.)
         while utilizing network resources efficiently and reliably.

   o  MPLS-TP SHOULD support off-path (out-of-band) control and
      management planes.

   o  The MPLS-TP control plane MUST be able to be operated independent
      of any particular client or server layer control plane.

   o  The control plane SHOULD facilitate the implementation of the
      service by providing end-to-end seamless connectivity and service
      assurance.

   o  The MPLS-TP control plane MUST support establishing all the
      connectivity patterns defined for the MPLS-TP data plane (e.g.,
      uni-directional and bidirectional P2P, uni-directional P2MP, etc.)



Niven-Jenkins, et al.    Expires January 4, 2009                [Page 9]


Internet-Draft            MPLS-TP Requirements                 July 2008


      including configuration of protection functions and any associated
      maintenance functions.

   o  The MPLS-TP control pane MUST support the configuration and
      modification of OAM maintenance points as well as the activation/
      deactivation of OAM when the transport path is established or
      modified.

   o  An MPLS-TP control plane MUST support topology hiding and address
      independence between domains.

   o  At the boundary of a domain an MPLS-TP control plane MUST support
      unique control plane identifiers or addresses identifying boundary
      points to be interconnected.

   o  At the boundary of a domain an MPLS-TP control plane MUST support
      group control plane identifiers or addresses identifying sets of
      boundary points to be interconnected.

   o  MPLS-TP data plane layer network access points (or connection
      points that proxy for access points) SHOULD be able to be assigned
      control plane identifiers which are available to clients to
      identify endpoints in call or connection requests.

   o  An MPLS-TP control plane MUST support translation between
      externally visible endpoint control plane identifiers and internal
      network addresses.

   o  An MPLS-TP control plane MUST support constraint-based route
      calculation.

   o  An MPLS-TP control plane MUST support provisioning and application
      of routing constraint policies.

   o  An MPLS-TP control plane MUST support pre-provisioned path
      protection.

   In some situations it is impractical to expect acceptable recovery
   performance to be achieved using dynamic recalculation of transport
   path routes.  For this reason, it is necessary to allow for pre-
   planning of protection routes for selected transport paths.

   o  The MPLS-TP control plane MUST support fast restoration.

   o  An MPLS-TP control plane MUST scale gracefully to support a large
      number of transport paths.





Niven-Jenkins, et al.    Expires January 4, 2009               [Page 10]


Internet-Draft            MPLS-TP Requirements                 July 2008


   o  An MPLS-TP control plane MUST clearly distinguish resources
      belonging to the MPLS-TP layer network from those in other layer
      networks that may also be under control plane control.

   o  An MPLS-TP control plane MUST support the independent unique
      identification of control plane elements as needed to support
      interoperability.

   o  It MUST be possible to identify and provision these elements
      independently, in order to reorganize the control plane components
      without impacting the data plane services and vice-versa.

   Architecturally distinct elements in a control plane include: nodes
   and links, control plane functional components, protocol controllers,
   etc.

   o  An MPLS-TP control plane SHOULD provide a common control mechanism
      for architecturally similar operations.

   o  An MPLS-TP control plane MUST support mechanisms for partitioning
      the network under control into separate peer or hierarchical
      control domains.

   o  To enable the deployment of a unified control plane aimed at
      controlling the set of transport technologies used in a transport
      network, the MPLS-TP control plane MUST also be applicable to
      other transport layer networks and provide common operations
      across multiple layers.  In order to maintain independence between
      MPLS-TP and its respective client and server layer networks, the
      capability to support separate control plane instances SHOULD be
      possible for control of transport multilayer networks.

   o  MPLS-TP SHOULD detect and recover from control plane failures and
      degradations using graceful operations.

2.5.  Network Management (NM) requirements

   o  MPLS-TP MUST operate under a common operation, control and
      management paradigm with respect to other transport technologies
      (e.g.  SDH, OTN or WDM).

   o  An MPLS-TP network MUST be able to be operated with a centralized
      NMS system.

   o  An MPLS-TP network SHOULD be able to be operated by a centralized
      NMS system with the support of a distributed control plane.





Niven-Jenkins, et al.    Expires January 4, 2009               [Page 11]


Internet-Draft            MPLS-TP Requirements                 July 2008


   o  The MPLS-TP management plane MUST be able to operate independently
      of any particular client or server layer management plane.

   o  The MPLS-TP management plane MUST support the configuration and
      modification of OAM maintenance points as well as the activation/
      deactivation of OAM when the transport path is established or
      modified.

   For the complete set of requirements related to NM functionality for
   MPLS-TP, see the MPLS-TP NM requirements document [REF].

2.6.  OAM requirements

   o  MPLS-TP SHOULD provide a comprehensive set of capabilities (that
      are independent of and agnostic to the transmitted client
      services) to support fault management (e.g. fault detection and
      localization), performance monitoring (e.g. signal quality
      measurement) of the MPLS-TP network and the services) and
      protection switching.

   o  OAM mechanisms SHOULD detect and trigger recovery actions in case
      of facility and equipment failures and performance degradations
      according to the requirements of the service.

   o  MPLS-TP OAM and data MUST share the same fate.

   o  MPLS-TP OAM MUST be able to operate without IP functionality and
      without relying on control and/or management planes.  When MPLS-TP
      is run with IP functionality, all existing IP-MPLS OAM
      functionality, e.g.  LSP-Ping, BFD and VCCV, MUST be able to
      operate seamlessly.

   For the complete set of requirements related to OAM functionality for
   MPLS-TP, see the MPLS-TP OAM requirements document [REF].

2.7.  Network performance management (PM) requirements

   For the complete set of requirements related to PM functionality for
   MPLS-TP, see the MPLS-TP OAM requirements document [REF].

2.8.  Protection & Survivability requirements

   Network survivability plays a critical factor in the delivery of
   reliable services.  Network availability is a significant contributor
   to revenue and profit.  Service guarantees in the form of SLAs
   require a resilient network that rapidly detects facility or node
   failures and restores network operation in accordance with the terms
   of the SLA.



Niven-Jenkins, et al.    Expires January 4, 2009               [Page 12]


Internet-Draft            MPLS-TP Requirements                 July 2008


   The requirements in this section use the recovery terminology defined
   in RFC 4427 [RFC4427].

   o  MPLS-TP MUST support transport network style protection switching
      mechanisms (tandem network connection protection, LSP protection
      and PW protection) to provide the appropriate recovery time
      required to maintain customer SLAs when potentially thousands of
      services are simultaneously affected by a single failure.

   o  MPLS-TP recovery mechanisms SHOULD be applicable at various levels
      throughout the network including support for span, tandem
      connection and end-to-end recovery.

   o  MPLS-TP MUST support network restoration mechanisms controlled by
      a distributed control plane and MUST support network restoration
      mechanisms controlled by a management plane.

      *  The restoration resources MAY be pre-planned and selected a
         priori, or computed after failure occurrence.

      *  MPLS-TP MAY support shared-mesh restoration.

      *  MPLS-TP SHOULD support soft LSP restoration.

      *  MPLS-TP MAY support hard LSP restoration.

      *  The restoration mechanism MUST be applicable to any topology.

      *  Restoration priority MAY be implemented to determine the order
         in which transport paths should be restored (to minimize
         service restoration time as well as to gain access to available
         spare capacity on the best paths).  Preemption priority MAY be
         used in the event that not all transport paths can be restored,
         in which case transport paths with lower preemption priority
         should be released.  When preemption is supported, its use MUST
         be operator configurable.

      *  The restoration mechanism SHOULD operate in synergy with other
         transport network technologies (SDH, OTN, WDM).

   o  MPLS-TP MUST support data plane driven protection mechanisms
      (without any dependency on a control plane or IP protocols) to
      enable fast recovery from failure.

   o  If protection is supported then:

      *  MPLS-TP protection mechanisms SHOULD be applied to LSPs and
         PWs.



Niven-Jenkins, et al.    Expires January 4, 2009               [Page 13]


Internet-Draft            MPLS-TP Requirements                 July 2008


      *  MPLS-TP MUST support mechanisms that rapidly detect, locate,
         notify and remedy network faults.

      *  MPLS-TP MAY support 1:1 bidirectional protection switching.  If
         bi-directional 1:1 protection switching is activated then the
         protection state of both ends of the protected entity MUST be
         synchronized.

      *  MPLS-TP MAY support 1+1 unidirectional protection switching.

      *  MPLS-TP protection mechanisms MUST be applicable to point-to-
         point and SHOULD be applicable to point-to-multipoint transport
         paths.

      *  Protection ratio MUST be of 100%, i.e. 100% of impaired working
         traffic MUST be protected for a failure on the working path.
         Additionally:

         +  The QoS objectives defined by the operator MUST also be met
            along the protection path.

         +  In the case of 1:1 protection mechanisms, the bandwidth
            reserved for the protection path MAY be available for other
            traffic when the working path is operational.

      *  Operator requests for manual control of protection switching
         such as clear, lockout of protection, forced-switch and manual-
         switch commands MUST be supported.  Prioritized protection
         between Signal Fail (SF), Signal Degradation (SD) and operator
         switch requests MUST be supported.

      *  MPLS-TP protection mechanisms MUST support revertive and non-
         revertive behaviour.

      *  MPLS-TP protection switching mechanisms MUST prevent frequent
         operation of the protection switch due to an intermittent
         defect.

      *  MPLS-TP protection mechanisms MUST ensure co-ordination of
         timing of protection switches at multiple layers to avoid races
         and to allow the protection switching mechanism of the server
         layer to fix the problem before switching at the MPLS-TP layer.

      *  MPLS-TP MAY support mechanisms that are optimized for specific
         network topologies (Ring, Mesh) in order to handle protection
         switching in an efficient manner.





Niven-Jenkins, et al.    Expires January 4, 2009               [Page 14]


Internet-Draft            MPLS-TP Requirements                 July 2008


2.9.  QoS requirements

   Service providers require advanced traffic management capabilities to
   enforce and guarantee the QoS parameters of customers' SLAs.

   Quality of service mechanisms are required to ensure:

   o  Support for differentiated services and different traffic types
      with traffic class separation associated with different traffic.

   o  Prioritization of critical services.

   o  Enabling the provisioning and the guarantee of Service Level
      Specifications (SLS), with support for hard and relative end-to-
      end BW guaranteed.

   o  Controlled jitter and delay.

   o  Guarantee of fair access to shared resources in an MPLS-TP
      network.

   o  Resources for control and management plane packets so that data
      plane traffic, regardless of the amount, will not cause control
      and management functions to become inoperative.

   MPLS-TP:

   o  MUST be able to deliver the same degree of QoS that has been
      delivered by SDH/SONET systems.

   o  MUST support a method to offer packet loss objectives comparable
      to those in TDM transport networks (only due to bit errors).

   o  SHOULD support transport and QoS mechanisms that can deliver
      statistical multiplexing gain.  Packets exceeding the agreed
      traffic profile may be marked or discarded by the traffic
      conditioning at the ingress of the MPLS-TP network.

   o  MUST support transport bandwidth allocation to any granularity
      without any restrictions based on a circuit-switched multiplexing
      hierarchy.  This will provide service providers with the
      capability to efficiently support service demands over the MPLS-TP
      network.

   [Should we refer here to the requirements specified in RFC 2702?]






Niven-Jenkins, et al.    Expires January 4, 2009               [Page 15]


Internet-Draft            MPLS-TP Requirements                 July 2008


2.10.  Security requirements

   o  MPLS-TP MUST ensure that the network and services are secured.

   o  Traffic flows from different users MUST NOT be intermingled, but
      if this does occur then this MUST be detectable and the
      appropriate consequent actions taken.

   o  MPLS-TP MUST ensure the separation of customer (client) and
      provider (server and peer network) addressing and other
      information.

   o  MPLS-TP MUST ensure that the control and management planes as well
      as OAM traffic are secure from external attack.

   o  MPLS-TP MUST provide mechanisms to ensure that the MPLS-TP network
      remains secure and stable under situations of extreme stress.

   Examples of attacks and situations of extreme stress include (but are
   not limited to) classical security attacks (e.g., hijacking, privacy,
   non-repudiation, etc.) and attacks on network availability (e.g.,
   denial of service (DoS) attacks).


3.  IANA Considerations

   This document makes no request of IANA.

   Note to RFC Editor: this section may be removed on publication as an
   RFC.


4.  Security Considerations

   This document does not by itself raise any particular security
   considerations.


5.  Acknowledgements

   The authors would like to thank all members of the teams (the Joint
   Working Team, the MPLS Interoperability Design Team in IETF and the
   T-MPLS Ad Hoc Group in ITU-T) involved in the definition and
   specification of MPLS Transport Profile.

   The authors would also like to thank Italo Busi, Neil Harrison,
   Julien Meuric, Tom Nadeau, Hiroshi Ohta and Tomonori Takeda for their
   comments and enhancements to the text.



Niven-Jenkins, et al.    Expires January 4, 2009               [Page 16]


Internet-Draft            MPLS-TP Requirements                 July 2008


6.  Informative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC4427]  Mannie, E. and D. Papadimitriou, "Recovery (Protection and
              Restoration) Terminology for Generalized Multi-Protocol
              Label Switching (GMPLS)", RFC 4427, March 2006.

   [RFC3031]  Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
              Label Switching Architecture", RFC 3031, January 2001.

   [RFC3985]  Bryant, S. and P. Pate, "Pseudo Wire Emulation Edge-to-
              Edge (PWE3) Architecture", RFC 3985, March 2005.

   [ITU.Y1401.2008]
              International Telecommunications Union, "Principles of
              interworking", ITU-T Recommendation Y.1401, February 2008.

   [ITU.G805.2000]
              International Telecommunications Union, "Generic
              functional architecture of transport networks", ITU-
              T Recommendation G.805, March 2000.


Authors' Addresses

   Ben Niven-Jenkins (editor)
   BT
   208 Callisto House, Adastral Park
   Ipswich, Suffolk  IP5 3RE
   UK

   Email: benjamin.niven-jenkins@bt.com


   Deborah Brungard (editor)
   AT&T
   Rm. D1-3C22 - 200 S. Laurel Ave.
   Middletown, NJ  07748
   USA

   Email: dbrungard@att.com








Niven-Jenkins, et al.    Expires January 4, 2009               [Page 17]


Internet-Draft            MPLS-TP Requirements                 July 2008


   Malcolm Betts (editor)
   Nortel Networks
   3500 Carling Avenue
   Ottawa, Ontario  K2H 8E9
   Canada

   Email: betts01@nortel.com


   Nurit Sprecher
   Nokia Siemens Networks
   3 Hanagar St. Neve Ne'eman B
   Hod Hasharon,   45241
   Israel

   Email: nurit.sprecher@nsn.com



































Niven-Jenkins, et al.    Expires January 4, 2009               [Page 18]


Internet-Draft            MPLS-TP Requirements                 July 2008


Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.











Niven-Jenkins, et al.    Expires January 4, 2009               [Page 19]