datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

Framework for Multi-Protocol Label Switching (MPLS)-based Recovery
RFC 3469

Document type: RFC - Informational (February 2003)
Updated by RFC 5462
Document stream: IETF
Last updated: 2013-03-02
Other versions: plain text, pdf, html

IETF State: WG Document
Consensus: Unknown
Document shepherd: No shepherd assigned

IESG State: RFC 3469 (Informational)
Responsible AD: Scott Bradner
Send notices to: <swallow@cisco.com>, <loa@pi.se>

Network Working Group                                     V. Sharma, Ed.
Request for Comments: 3469                                Metanoia, Inc.
Category: Informational                               F. Hellstrand, Ed.
                                                         Nortel Networks
                                                           February 2003

  Framework for Multi-Protocol Label Switching (MPLS)-based Recovery

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2003).  All Rights Reserved.

Abstract

   Multi-protocol label switching (MPLS) integrates the label swapping
   forwarding paradigm with network layer routing.  To deliver reliable
   service, MPLS requires a set of procedures to provide protection of
   the traffic carried on different paths.  This requires that the label
   switching routers (LSRs) support fault detection, fault notification,
   and fault recovery mechanisms, and that MPLS signaling support the
   configuration of recovery.  With these objectives in mind, this
   document specifies a framework for MPLS based recovery.  Restart
   issues are not included in this framework.

Table of Contents

   1.   Introduction................................................2
        1.1.  Background............................................3
        1.2.  Motivation for MPLS-Based Recovery....................4
        1.3.  Objectives/Goals......................................5
   2.   Overview....................................................6
        2.1.  Recovery Models.......................................7
              2.1.1   Rerouting.....................................7
              2.1.2   Protection Switching..........................8
        2.2.  The Recovery Cycles...................................8
              2.2.1   MPLS Recovery Cycle Model.....................8
              2.2.2   MPLS Reversion Cycle Model...................10
              2.2.3   Dynamic Re-routing Cycle Model...............12
              2.2.4   Example Recovery Cycle.......................13
        2.3.  Definitions and Terminology..........................14
              2.3.1   General Recovery Terminology.................14

Sharma & Hellstrand          Informational                      [Page 1]
RFC 3469           Framework for MPLS-based Recovery       February 2003

              2.3.2   Failure Terminology..........................17
        2.4.  Abbreviations........................................18
   3.   MPLS-based Recovery Principles.............................18
        3.1.  Configuration of Recovery............................19
        3.2.  Initiation of Path Setup.............................19
        3.3.  Initiation of Resource Allocation....................20
              3.3.1   Subtypes of Protection Switching.............21
        3.4.  Scope of Recovery....................................21
              3.4.1   Topology.....................................21
              3.4.2   Path Mapping.................................24
              3.4.3   Bypass Tunnels...............................25
              3.4.4   Recovery Granularity.........................25
              3.4.5   Recovery Path Resource Use...................26
        3.5.  Fault Detection......................................26
        3.6.  Fault Notification...................................27
        3.7.  Switch-Over Operation................................28
              3.7.1   Recovery Trigger.............................28
              3.7.2   Recovery Action..............................29
        3.8.  Post Recovery Operation..............................29
              3.8.1   Fixed Protection Counterparts................29
              3.8.2   Dynamic Protection Counterparts..............30
              3.8.3   Restoration and Notification.................31
              3.8.4   Reverting to Preferred Path
                      (or Controlled Rearrangement)................31
        3.9.  Performance..........................................32
   4.   MPLS Recovery Features.....................................32
   5.   Comparison Criteria........................................33
   6.   Security Considerations....................................35
   7.   Intellectual Property Considerations.......................36
   8.   Acknowledgements...........................................36
   9.   References.................................................36
        9.1   Normative References.................................36
        9.2   Informative References...............................37
   10.  Contributing Authors.......................................37

[include full document text]