draft-ietf-mpls-p2mp-oam-reqs-00.txt | draft-ietf-mpls-p2mp-oam-reqs-01.txt | |||
---|---|---|---|---|
Network Working Group Seisho Yasukawa | Network Working Group Seisho Yasukawa | |||
Internet Draft NTT Corp | Internet Draft NTT Corp | |||
Expires: June 2006 | Expires: August 2006 | |||
Adrian Farrel | Adrian Farrel | |||
Old Dog Consulting | Old Dog Consulting | |||
Daniel King | Daniel King | |||
DNNI Ltd. | Aria Networks Ltd. | |||
Thomas D. Nadeau | Thomas D. Nadeau | |||
Cisco Systems, Inc. | Cisco Systems, Inc. | |||
December 2005 | February 2006 | |||
OAM Requirements for Point-to-Multipoint MPLS Networks | OAM Requirements for Point-to-Multipoint MPLS Networks | |||
draft-ietf-mpls-p2mp-oam-reqs-00.txt | draft-ietf-mpls-p2mp-oam-reqs-01.txt | |||
Status of this Memo | Status of this Memo | |||
By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
skipping to change at page 1, line 51 | skipping to change at page 1, line 51 | |||
Abstract | Abstract | |||
Multi-Protocol Label Switching (MPLS) has been extended to encompass | Multi-Protocol Label Switching (MPLS) has been extended to encompass | |||
point-to-multipoint (P2MP) Label Switched Paths (LSPs). As with | point-to-multipoint (P2MP) Label Switched Paths (LSPs). As with | |||
point-to-point MPLS LSPs the requirement to detect, handle and | point-to-point MPLS LSPs the requirement to detect, handle and | |||
diagnose control and dataplane defects is critical. | diagnose control and dataplane defects is critical. | |||
For operators deploying services based on P2MP MPLS LSPs the | For operators deploying services based on P2MP MPLS LSPs the | |||
detection and specification of how to handle those defects is | detection and specification of how to handle those defects is | |||
important because such defects may not only affect the fundamental | important because such defects may not only affect the fundamentals | |||
of an MPLS network, but also because they MAY impact service level | of an MPLS network, but also because they may impact service level | |||
specification commitments for customers of their network. | specification commitments for customers of their network. | |||
This document describes requirements for user and data plane | This document describes requirements for data plane operations and | |||
operations and management for P2MP MPLS LSPs. These requirements | management for P2MP MPLS LSPs. These requirements apply to all forms | |||
apply to all forms of P2MP MPLS LSPs, and include P2MP Traffic | of P2MP MPLS LSPs, and include P2MP Traffic Engineered (TE) LSPs and | |||
Engineered (TE) LSPs and multicast LSPs. | multicast LSPs. | |||
Table of Contents | Table of Contents | |||
1. Introduction .................................................. 2 | 1. Introduction .................................................. 2 | |||
2. Terminology ................................................... 3 | 2. Terminology ................................................... 3 | |||
2.1 Conventions ................................................ 3 | 2.1 Conventions ................................................ 3 | |||
2.2 Terminology ................................................ 3 | 2.2 Terminology ................................................ 3 | |||
2.3 Acronyms ................................................... 3 | 2.3 Acronyms ................................................... 3 | |||
3. Motivations ................................................... 3 | 3. Motivations ................................................... 3 | |||
4. General Requirements .......................................... 4 | 4. General Requirements .......................................... 4 | |||
4.1 Detection of Label Switch Path Defects ..................... 4 | 4.1 Detection of Label Switch Path Defects ..................... 4 | |||
4.2 Diagnosis of a Broken Label Switch Path .................... 5 | 4.2 Diagnosis of a Broken Label Switch Path .................... 5 | |||
4.3 Path characterization ...................................... 5 | 4.3 Path characterization ...................................... 6 | |||
4.4 Service Level Agreement Measurement ........................ 5 | 4.4 Service Level Agreement Measurement ........................ 6 | |||
4.5 Frequency of OAM Execution ................................. 6 | 4.5 Frequency of OAM Execution ................................. 7 | |||
4.6 Alarm Suppression, Aggregation and Layer Coordination ...... 6 | 4.6 Alarm Suppression, Aggregation and Layer Coordination ...... 7 | |||
4.7 Support for OAM Interworking for Fault Notification ........ 6 | 4.7 Support for OAM Interworking for Fault Notification ........ 7 | |||
4.8 Error Detection and Recovery ............................... 7 | 4.8 Error Detection and Recovery ............................... 8 | |||
4.9 Standard Management Interfaces ............................. 7 | 4.9 Standard Management Interfaces ............................. 8 | |||
4.10 Detection of Denial of Service Attacks ................... 7 | 4.10 Detection of Denial of Service Attacks .................... 9 | |||
4.11 Per-LSP Accounting Requirements ........................... 8 | 4.11 Per-LSP Accounting Requirements ........................... 9 | |||
5. Security Considerations ....................................... 8 | 5. Security Considerations ....................................... 9 | |||
6. IANA Considerations ........................................... 8 | 6. IANA Considerations .......................................... 10 | |||
7. References .................................................... 9 | 7. References ................................................... 10 | |||
7.1 Normative References ....................................... 9 | 7.1 Normative References ...................................... 10 | |||
7.2 Informative References ..................................... 9 | 7.2 Informative References .................................... 10 | |||
8. Acknowledgements ............................................. 10 | 8. Acknowledgements ............................................. 11 | |||
9. Authors' Addresses ........................................... 10 | 9. Authors' Addresses ........................................... 11 | |||
10. Intellectual Property Statement ............................. 10 | 10. Intellectual Property Statement ............................. 12 | |||
11. Full Copyright Statement .................................... 11 | 11. Full Copyright Statement .................................... 12 | |||
1. Introduction | 1. Introduction | |||
This document describes requirements for user and data plane | This document describes requirements for data plane operations and | |||
operations and management (OAM) for point-to-multipoint (P2MP) | management (OAM) for point-to-multipoint (P2MP) Multi-Protocol Label | |||
Multi-Protocol Label Switching (MPLS). These requirements have been | Switching (MPLS). This draft specifies OAM requirements for P2MP | |||
gathered from network operators who have extensive experience | MPLS, as well as for applications of P2MP MPLS. | |||
deploying MPLS networks and from operators who are considering | ||||
deploying P2MP MPLS networks. This draft specifies OAM requirements | ||||
for P2MP MPLS, as well as for applications of P2MP MPLS. | ||||
These requirements apply to all forms of P2MP MPLS LSPs, and include | These requirements apply to all forms of P2MP MPLS LSPs, and include | |||
P2MP Traffic Engineered (TE) LSPs [P2MP-SIG-REQ] and [P2MP-RSVP], as | P2MP Traffic Engineered (TE) LSPs [P2MP-SIG-REQ] and [P2MP-RSVP], as | |||
well as multicast LDP LSPs [P2MP-LDP] and [MCAST-LDP]. | well as multicast LDP LSPs [MCAST-LDP]. | |||
Note that the requirements for OAM for P2MP MPLS build heavily on the | Note that the requirements for OAM for P2MP MPLS build heavily on the | |||
requirements for OAM for point-to-point MPLS. These latter are | requirements for OAM for point-to-point MPLS. These latter | |||
described in [MPLS-OAM] and are not repeated in this document. | requirements are described in [RFC4377] and are not repeated in this | |||
document. | ||||
For a generic framework for OAM in MPLS networks, refer to [RFC4378]. | ||||
2. Terminology | 2. Terminology | |||
2.1 Conventions used in this document | 2.1 Conventions used in this document | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
2.2 Terminology | 2.2 Terminology | |||
Definitions of key terms for MPLS OAM are found in [MPLS-OAM] and | Definitions of key terms for MPLS OAM are found in [RFC4377] and the | |||
the reader is assumed to be familiar with those definitions which | reader is assumed to be familiar with those definitions which are not | |||
are not repeated here. | repeated here. | |||
[P2MP-SIG-REQ] includes some important definitions and terms for use | [P2MP-SIG-REQ] includes some important definitions and terms for use | |||
within the context of P2MP MPLS. The reader should be familiar with | within the context of P2MP MPLS. The reader should be familiar with | |||
at least the terminology section of that document. | at least the terminology section of that document. | |||
2.3 Acronyms | 2.3 Acronyms | |||
The following list of acronyms is a repeat of common acronyms defined | The following acronyms are used in this document. | |||
in many other documents, and is provided here for convenience. | ||||
CE: Customer Edge | CE: Customer Edge | |||
DoS: Denial of service | DoS: Denial of service | |||
ECMP: Equal Cost Multipath | ECMP: Equal Cost Multipath | |||
LDP: Label Distribution Protocol | LDP: Label Distribution Protocol | |||
LSP: Label Switch Path | LSP: Label Switch Path | |||
LSR: Label Switch Router | LSR: Label Switch Router | |||
OAM: Operations and Management | OAM: Operations and Management | |||
OA&M: Operations, Administration and Maintenance. | OA&M: Operations, Administration and Maintenance. | |||
RSVP: Resource reSerVation Protocol | RSVP: Resource reSerVation Protocol | |||
P2MP: Point-to-Multipoint | P2MP: Point-to-Multipoint | |||
SP: Service Provider | SP: Service Provider | |||
TE: Traffic Engineering | TE: Traffic Engineering | |||
3. Motivations | 3. Motivations | |||
OAM for MPLS networks has been established as a fundamental | OAM for MPLS networks has been established as a fundamental | |||
requirement both through operational experience and through | requirement both through operational experience and through its | |||
its documentation in numerous Internet drafts. Many such | documentation in numerous Internet drafts. Many such documents (for | |||
documents (for example, [LSP-PING], [RFC3812], [RFC3813], [RFC3814], | example, [RFC4379], [RFC3812], [RFC3813], [RFC3814], and [RFC3815]) | |||
and [RFC3815]) developed specific solutions to individual issues or | developed specific solutions to individual issues or problems. | |||
problems. Coordination of the full OAM requirements for MPLS was | Coordination of the full OAM requirements for MPLS was achieved by | |||
achieved by [MPLS-OAM] in recognition of the fact that the previous | [RFC4377] in recognition of the fact that the previous piecemeal | |||
piecemeal approach could lead to inconsistent and inefficient | approach could lead to inconsistent and inefficient applicability of | |||
applicability of OAM techniques across the MPLS architecture, and | OAM techniques across the MPLS architecture, and might require | |||
might require significant modifications to operational procedures and | significant modifications to operational procedures and systems in | |||
systems in order to provide consistent and useful OAM functionality. | order to provide consistent and useful OAM functionality. | |||
This document builds on these realizations and extends the | This document builds on these realizations and extends the statements | |||
statements of MPLS OAM requirements to cover the new area of P2MP | of MPLS OAM requirements to cover the new area of P2MP MPLS. That is, | |||
MPLS. That is, this document captures the requirements for P2MP | this document captures the requirements for P2MP MPLS OAM in advance | |||
MPLS OAM in advance of the development of specific solutions. | of the development of specific solutions. | |||
Nevertheless, at the time of writing, some effort had already | Nevertheless, at the time of writing, some effort had already been | |||
been expended to extend existing MPLS OAM solutions to cover P2MP | expended to extend existing MPLS OAM solutions to cover P2MP MPLS | |||
MPLS (for example, [P2MP-LSP-PING]). While this approach of extending | (for example, [P2MP-LSP-PING]). While this approach of extending | |||
existing solutions may be reasonable, in order to ensure a consistent | existing solutions may be reasonable, in order to ensure a consistent | |||
OAM framework it is necessary to articulate the full set of | OAM framework it is necessary to articulate the full set of | |||
requirements in a single document. This will facilitate a uniform set | requirements in a single document. This will facilitate a uniform set | |||
of MPLS OAM solutions spanning multiple MPLS deployments and | of MPLS OAM solutions spanning multiple MPLS deployments and | |||
concurrent applications. | concurrent applications. | |||
4. General Requirements | 4. General Requirements | |||
The general requirements described in this section are closely | The general requirements described in this section are similar to | |||
similar to those described for point-to-point MPLS in [MPLS-OAM]. | those described for point-to-point MPLS in [RFC4377]. The subsections | |||
The subsections below do not repeat material from [MPLS-OAM], but | below do not repeat material from [RFC4377], but simply give | |||
simply give references to that document. | references to that document. | |||
However, where the requirements for P2MP MPLS OAM differ from or are | However, where the requirements for P2MP MPLS OAM differ from or are | |||
more extensive than those expressed in [MPLS-OAM], additional text is | more extensive than those expressed in [RFC4377], additional text is | |||
supplied. | supplied. | |||
In general, it should be noted that P2MP LSPs introduce a scalability | In general, it should be noted that P2MP LSPs introduce a scalability | |||
issue that is not present in point-to-point MPLS. That is, an | issue with respect to OAM that is not present in point-to-point MPLS. | |||
individual P2MP LSP will have more than one egress and the path to | That is, an individual P2MP LSP will have more than one egress and | |||
those egresses will very probably not be linear (for example, it may | the path to those egresses will very probably not be linear (for | |||
have a tree structure). Since the number of egresses for a single | example, it may have a tree structure). Since the number of egresses | |||
P2MP LSP is unknown and not bounded by any small number, it follows | for a single P2MP LSP is unknown and not bounded by any small number, | |||
that all mechanisms defined for OAM support must scale well with the | it follows that all mechanisms defined for OAM support MUST scale | |||
number of egresses and the complexity of the path of the LSP. | well with the number of egresses and the complexity of the path of | |||
Mechanisms that are able to deal with individual egresses will scale | the LSP. Mechanisms that are able to deal with individual egresses | |||
no worse than similar mechanisms for point-to-point LSPs, but it is | will scale no worse than similar mechanisms for point-to-point LSPs, | |||
desirable to develop mechanisms that are able to leverage the fact | but it is desirable to develop mechanisms that are able to leverage | |||
that multiple egresses are associated with a single LSP, and so | the fact that multiple egresses are associated with a single LSP, and | |||
achieve better scaling. | so achieve better scaling. | |||
4.1 Detection of Label Switch Path Defects | 4.1 Detection of Label Switch Path Defects | |||
The ability to detect defects in a broken Label Switch Path | The ability to detect defects in a P2MP LSP SHOULD not require | |||
(LSP) SHOULD not require manual hop-by-hop troubleshooting of | manual, hop-by-hop troubleshooting of each LSR used to switch traffic | |||
each LSR used to switch traffic for that P2MP LSP. Any | for that LSP, and SHOULD rely on proactive OAM procedures (such as | |||
solutions should either extend or work in close conjunction | continuous path connectivity and SLA measurement mechanisms). Any | |||
with existing solutions developed for point-to-point MPLS, such as | solutions SHOULD either extend or work in close conjunction with | |||
those specified in [LSP-PING]. This will leverage existing software | existing solutions developed for point-to-point MPLS, such as those | |||
and hardware deployments. | specified in [RFC4379] where this requirement is not contradicted by | |||
the other requirements in this section. This will leverage existing | ||||
software and hardware deployments. | ||||
Note that P2MP LSPs may introduce additional scaling concerns for | Note that P2MP LSPs may introduce additional scaling concerns for LSP | |||
LSP probing by tools such as [LSP-PING]. As the number of leaves | probing by tools such as [RFC4379]. As the number of leaves of a P2MP | |||
of the P2MP LSP increases so it becomes potentially more expensive to | LSP increases it potentially becomes more expensive to inspect the | |||
inspect the LSP to detect defects. Any tool developed for this | LSP to detect defects. Any tool developed for this purpose MUST be | |||
purpose MUST be cognitive of this issue and MUST include techniques | cognitive of this issue and MUST include techniques to reduce the | |||
to reduce the scaling impact of an increase in the number of leaves. | scaling impact of an increase in the number of leaves. Nevertheless, | |||
Nevertheless, it should also be noted that the introduciton of | it should also be noted that the introduction of additional leaves | |||
additional leaves may mean that the use of techniques such as | may mean that the use of techniques such as [RFC4379] are less | |||
[LSP-PING] are less appropriate for defect detection of P2MP LSPs, | appropriate for defect detection with P2MP LSPs, while the technique | |||
while the technique may still remain useful for defect diagnosis as | may still remain useful for defect diagnosis as described in the next | |||
described in the next section. | section. | |||
Due to the above scaling concerns, LSRs or other network resources | ||||
MUST NOT be overwhelmed by the operation of normal proactive OAM | ||||
procedures, and measures taken to protect LSRs and network resources | ||||
against being overwhelmed MUST NOT degrade the operational value or | ||||
responsiveness of proactive OAM procedures. | ||||
By "overwhelmed" we mean that it MUST NOT be possible for an LSR to | ||||
be so busy handling proactive OAM that it is unable to continue to | ||||
process control or data plane traffic at its advertised rate. | ||||
Similarly, a network resource (such as a data link) MUST NOT be | ||||
carrying so much proactive OAM traffic that it is unable to carry the | ||||
advertised data rate. At the same time, it is important to configure | ||||
proactive OAM, if it is in use, to not raise alarms caused by the | ||||
failure to receive an OAM message if the component responsible for | ||||
processing the messages is unable to process because other components | ||||
are consuming too many system resources - such alarms might turn out | ||||
to be false. | ||||
In practice, of course, the requirements in the previous paragraph | ||||
may be overcome by careful specification of the anticipated data | ||||
throughput of LSRs or data links, but it should be recalled that | ||||
proactive OAM procedures may be scaled linearly with the number of | ||||
LSPs, and the number of LSPs is not necessarily a function of the | ||||
available bandwidth in an LSR or on a data link. | ||||
4.2 Diagnosis of a Broken Label Switch Path | 4.2 Diagnosis of a Broken Label Switch Path | |||
The ability to diagnose a broken P2MP LSP and to isolate the failed | The ability to diagnose a broken P2MP LSP and to isolate the failed | |||
component (i.e., link or node) in the path is required. These | component (i.e., link or node) in the path is REQUIRED. These | |||
functions include a path connectivity test that can test all branches | functions include a path connectivity test that can test all branches | |||
and leaves of a P2MP LSP for reachability, as well as a path tracing | and leaves of a P2MP LSP for reachability, as well as a path tracing | |||
function. It must be possible for the operator (or an automated | function. Note that this requirement is distinct from the requirement | |||
process) to stipulate a timeout after which the failure to see a | to detect errors or failures described in the previous section. In | |||
response shall be flagged as an error. | practice Detection and Diagnosis/Isolation MAY be performed by | |||
separate or the same mechanisms according to the way in which the | ||||
other requirements are met. | ||||
Any mechanism developed to perform these functions are subject to the | It MUST be possible for the operator (or an automated process) to | |||
stipulate a timeout after which the failure to see a response shall | ||||
be flagged as an error. | ||||
Any mechanism developed to perform these functions is subject to the | ||||
scalability concerns expressed in section 4. | scalability concerns expressed in section 4. | |||
4.3 Path Characterization | 4.3 Path Characterization | |||
The path characterization function [MPLS-OAM] is the ability to | The path characterization function [RFC4377] is the ability to reveal | |||
reveal details of LSR forwarding operations for P2MP LSPs. These | details of LSR forwarding operations for P2MP LSPs. These details can | |||
details can then be compared later during subsequent testing relevant | then be compared later during subsequent testing relevant to OAM | |||
to OAM functionality. Therefore, LSRs supporting P2MP LSPs MUST | functionality. Therefore, LSRs supporting P2MP LSPs MUST provide | |||
provide mechanisms that allow operators to interogate and | mechanisms that allow operators to interrogate and characterize P2MP | |||
characterize P2MP paths. | paths. | |||
Since P2MP paths are more complex than the paths of point-to-point | Since P2MP paths are more complex than the paths of point-to-point | |||
LSPs, the scaling concerns expressed in section 4 apply. | LSPs, the scaling concerns expressed in section 4 apply. | |||
Note that path characterization should lead to the operator being | Note that path characterization SHOULD lead to the operator being | |||
able to determine the full tree for a P2MP LSP. That is, it is not | able to determine the full tree for a P2MP LSP. That is, it is not | |||
sufficient to know the list of LSRs in the tree, but it is important | sufficient to know the list of LSRs in the tree, but it is important | |||
to know their relative order and where the LSP branches. | to know their relative order and where the LSP branches. | |||
Since, in some cases, the control plane state and data paths may | Since, in some cases, the control plane state and data paths may | |||
branch at different points from the control plane and data plane | branch at different points from the control plane and data plane | |||
topologies (for example, figure 1), it is not sufficient to present | topologies (for example, figure 1), it is not sufficient to present | |||
the order of LSRs, but it is important that the branching points on | the order of LSRs, but it is important that the branching points on | |||
that tree are clearly identified. | that tree are clearly identified. | |||
skipping to change at page 6, line 22 | skipping to change at page 6, line 50 | |||
state branch at C, but the topology branches at D. | state branch at C, but the topology branches at D. | |||
A diagnostic tool that meets the path characterization requirements | A diagnostic tool that meets the path characterization requirements | |||
SHOULD collect information that is easy to process to determine the | SHOULD collect information that is easy to process to determine the | |||
P2MP tree for a P2MP LSP, rather than provide information that must | P2MP tree for a P2MP LSP, rather than provide information that must | |||
be post-processed with some complexity. | be post-processed with some complexity. | |||
4.4 Service Level Agreement Measurement | 4.4 Service Level Agreement Measurement | |||
Mechanisms are required to measure the diverse aspects of Service | Mechanisms are required to measure the diverse aspects of Service | |||
Level Agreements for services that utlize P2MP LSPs. The aspects are | Level Agreements for services that utilize P2MP LSPs. The aspects | |||
listed in [MPLS-OAM]. | are listed in [RFC4377]. | |||
Service Level Agreements are often measured in terms of the quality | Service Level Agreements are often measured in terms of the quality | |||
and rate of data delivery. In the context of P2MP MPLS, data is | and rate of data delivery. In the context of P2MP MPLS, data is | |||
delivered to multiple egress nodes. The mechanisms MUST, therefore, | delivered to multiple egress nodes. The mechanisms MUST, therefore, | |||
be capable of measuring the aspects of Service Level Agreements as | be capable of measuring the aspects of Service Level Agreements as | |||
they apply to each of the egress points to a P2MP LSP. At the same | they apply to each of the egress points to a P2MP LSP. At the same | |||
time, in order to diagnose issues with meeting Service Level | time, in order to diagnose issues with meeting Service Level | |||
Agreements, mechanisms SHOULD be provided to measure the aspects of | Agreements, mechanisms SHOULD be provided to measure the aspects of | |||
the agreements at key points within the network such as at branch | the agreements at key points within the network such as at branch | |||
nodes on the P2MP tree. | nodes on the P2MP tree. | |||
4.5 Frequency of OAM Execution | 4.5 Frequency of OAM Execution | |||
As stipulated in [MPLS-OAM], the operator MUST have the flexibility | As stipulated in [RFC4377], the operator MUST have the flexibility | |||
to configure OAM parameters to meet their specific operational | to configure OAM parameters to meet their specific operational | |||
requirements. This requirement is potentially more important in P2MP | requirements. This requirement is potentially more important in P2MP | |||
deployments where the effects of the execution of OAM functions can | deployments where the effects of the execution of OAM functions can | |||
be potentially much greater than in a non-P2MP configuration. For | be potentially much greater than in a non-P2MP configuration. For | |||
example, a mechanism that causes each egress of a P2MP LSP to respond | example, a mechanism that causes each egress of a P2MP LSP to respond | |||
could result in a large burst of responses for a single OAM request. | could result in a large burst of responses for a single OAM request. | |||
Therefore, solutions produced SHOULD NOT impose any fixed limitations | Therefore, solutions produced SHOULD NOT impose any fixed limitations | |||
on the frequency of the execution of any OAM functions. | on the frequency of the execution of any OAM functions. | |||
4.6 Alarm Suppression, Aggregation and Layer Coordination | 4.6 Alarm Suppression, Aggregation and Layer Coordination | |||
As described in [MPLS-OAM], network elements MUST provide alarm | As described in [RFC4377], network elements MUST provide alarm | |||
suppression and aggregation to prevent the generation of superfluous | suppression and aggregation mechanisms to prevent the generation of | |||
alarms within or across network layers. The same time constraint | superfluous alarms within or across network layers. The same time | |||
issues identified in [MPLS-OAM] also exist for P2MP LSPs. | constraint issues identified in [RFC4377] also apply to P2MP LSPs. | |||
A P2MP LSP also brings the possiblity of a single fault causing a | A P2MP LSP also brings the possibility of a single fault causing a | |||
larger number of alarms than for a point-to-point LSP. This can | larger number of alarms than for a point-to-point LSP. This can | |||
happen because there are a larger number of downstream LSRs (for | happen because there are a larger number of downstream LSRs (for | |||
example, a larger number of egresses). The resultant multiplier in | example, a larger number of egresses). The resultant multiplier in | |||
the number of alarms could cause swamping of the alarm management | the number of alarms could cause swamping of the alarm management | |||
systems to which the alarms are reported, and serves as a multiplier | systems to which the alarms are reported, and serves as a multiplier | |||
to the number of potentially duplicate alarms raised by the network. | to the number of potentially duplicate alarms raised by the network. | |||
Alarm aggregation or limitation techniques MUST be applied within any | Alarm aggregation or limitation techniques MUST be applied within any | |||
solution, or be available within an implementation, so that this | solution, or be available within an implementation, so that this | |||
scaling issue can be reduced. Note that this requirement introduces a | scaling issue can be reduced. Note that this requirement introduces a | |||
second dimension to the concept of alarm aggregation. Where | second dimension to the concept of alarm aggregation. Where | |||
previously it applied to the correlation and suppression of alarms | previously it applied to the correlation and suppression of alarms | |||
generated by different network layers, it now also applies to similar | generated by different network layers, it now also applies to similar | |||
techniques applied to alarms generated by multiple downstream LSRs. | techniques applied to alarms generated by multiple downstream LSRs. | |||
4.7 Support for OAM Interworking for Fault Notification | 4.7 Support for OAM Interworking for Fault Notification | |||
[MPLS-OAM] specifies that an LSR supporting the interworking of | [RFC4377] specifies that an LSR supporting the interworking of | |||
one or more networking technologies over MPLS MUST be able to | one or more networking technologies over MPLS MUST be able to | |||
translate an MPLS defect into the native technology's error | translate an MPLS defect into the native technology's error | |||
condition. This also applies to any LSR supporting P2MP | condition. This also applies to any LSR supporting P2MP LSPs. | |||
LSPs. However, careful attention to the requirements for | However, careful attention to the requirements for alarm suppression | |||
alarm suppression stipulated therein and in section 4.6 SHOULD | stipulated therein and in section 4.6 SHOULD be observed. | |||
be observed. | ||||
Note that the time constraints for fault notification and alarm | Note that the time constraints for fault notification and alarm | |||
propagation impact upon the solutions that might be applied to the | propagation impact upon the solutions that might be applied to the | |||
scalability problem inherent in certain OAM techniques applied to | scalability problem inherent in certain OAM techniques applied to | |||
P2MP LSPs. For example, a solution to the issue of a large number | P2MP LSPs. For example, a solution to the issue of a large number | |||
of egresses all responding to some form of probe request at the | of egresses all responding to some form of probe request at the | |||
same time, might be to make the probes less frequent - but this | same time, might be to make the probes less frequent - but this | |||
might impact on the ability to detect and/or report faults. | might impact on the ability to detect and/or report faults. | |||
Where fault notification to the egress is required, there is the | Where fault notification to the egress is required, there is the | |||
possiblity that a single fault will give rise to multiple | possibility that a single fault will give rise to multiple | |||
notifications, one to each egress node of the P2MP that is downstream | notifications, one to each egress node of the P2MP that is downstream | |||
of the fault. Any mechanisms MUST manage this scaling issue while | of the fault. Any mechanisms MUST manage this scaling issue while | |||
still continuing to deliver fault notifications in a timely manner. | still continuing to deliver fault notifications in a timely manner. | |||
Where fault notification to the ingress is required, the mechanisms | Where fault notification to the ingress is required, the mechanisms | |||
MUST ensure that the notification identifies the egress nodes of the | MUST ensure that the notification identifies the egress nodes of the | |||
P2MP LSP that are impacted (that is, those downstream of the fault) | P2MP LSP that are impacted (that is, those downstream of the fault) | |||
and does not falsely imply that all egress nodes are impacted. | and does not falsely imply that all egress nodes are impacted. | |||
4.8 Error Detection and Recovery | 4.8 Error Detection and Recovery | |||
Recovery from a fault by a network element can be facilitated by | Recovery from a fault by a network element can be facilitated by | |||
MPLS OAM procedures. As described in [MPLS-OAM], these procedures | MPLS OAM procedures. As described in [RFC4377], these procedures | |||
will detect a broad range of defects, and SHOULD be operable where | will detect a broad range of defects, and SHOULD be operable where | |||
MPLS P2MP LSPs span multiple routing areas, or multiple Service | MPLS P2MP LSPs span multiple routing areas, or multiple Service | |||
Provider domains. | Provider domains. | |||
The same requirements as those expressed in [MPLS-OAM] with respect | The same requirements as those expressed in [RFC4377] with respect | |||
to automatic repair and operator intervention ahead of customer | to automatic repair and operator intervention ahead of customer | |||
detection of faults apply to P2MP LSPs. | detection of faults apply to P2MP LSPs. | |||
It should be observed that faults in P2MP LSPs may be recovered | It should be observed that faults in P2MP LSPs MAY be recovered | |||
through techniques described in [P2MP-RSVP]. | through techniques described in [P2MP-RSVP]. | |||
4.9 Standard Management Interfaces | 4.9 Standard Management Interfaces | |||
The wide-spread deployment of MPLS requires common information | The wide-spread deployment of MPLS requires common information | |||
modeling of management and control of OAM functionality. This is | modeling of management and control of OAM functionality. This is | |||
reflected in the the integration of standard MPLS-related MIBs | reflected in the integration of standard MPLS-related MIBs | |||
[RFC3813], [RFC3812], [RFC3814], [RFC3815] for fault, statistics | [RFC3813], [RFC3812], [RFC3814], [RFC3815] for fault, statistics | |||
and configuration management. These standard interfaces provide | and configuration management. These standard interfaces provide | |||
operators with common programmatic interface access to | operators with common programmatic interface access to | |||
operations and management functions and their status. These | operations and management functions and their status. | |||
The standard MPLS-related MIB modules [RFC3812], [RFC3813], | The standard MPLS-related MIB modules [RFC3812], [RFC3813], | |||
[RFC3814], and [RFC3815] SHOULD be extended wherever possible, to | [RFC3814], and [RFC3815] SHOULD be extended wherever possible, to | |||
support P2MP LSPs, the associated OAM functions on these LSPs, and | support P2MP LSPs, the associated OAM functions on these LSPs, and | |||
the applications that utlize P2MP LSPs. Extending them will | the applications that utilize P2MP LSPs. Extending them will | |||
facillitate the reuse of existing management software both in LSRs | facilitate the reuse of existing management software both in LSRs | |||
and in management systems. In cases where the existing MIB modules | and in management systems. In cases where the existing MIB modules | |||
cannot be extended, then new MIB modules MUST be created. | cannot be extended, then new MIB modules MUST be created. | |||
4.10 Detection of Denial of Service Attacks | 4.10 Detection of Denial of Service Attacks | |||
The ability to detect denial of service (DoS) attacks against the | The ability to detect denial of service (DoS) attacks against the | |||
data or control planes which signal P2MP LSPs MUST be part of | data or control planes which signal P2MP LSPs MUST be part of | |||
any security management related to MPLS OAM tools or techniques. | any security management related to MPLS OAM tools or techniques. | |||
4.11 Per-LSP Accounting Requirements | 4.11 Per-LSP Accounting Requirements | |||
In an MPLS network where P2MP LSPs are in use, Service Providers can | In an MPLS network where P2MP LSPs are in use, Service Providers can | |||
measure traffic from an LSR to the egress of the network using some | measure traffic from an LSR to the egress of the network using some | |||
MPLS-related MIB modules (see section 4.9), for example. Other | MPLS-related MIB modules (see section 4.9), for example. Other | |||
interfaces MAY exist as well and enable the creation of traffic | interfaces MAY exist as well and enable the creation of traffic | |||
matricies so that it is possible to know how much traffic is | matrices so that it is possible to know how much traffic is | |||
traveling from where to where within the network. | traveling from where to where within the network. | |||
Analysis of traffic flows to produce a traffic matrix is more | Analysis of traffic flows to produce a traffic matrix is more | |||
complicated where P2MP LSPs are deployed becasue there is no simple | complicated where P2MP LSPs are deployed because there is no simple | |||
pairing relationship between an ingress and a single egress. | pairing relationship between an ingress and a single egress. | |||
Fundamental to understanding traffic flows within a network that | Fundamental to understanding traffic flows within a network that | |||
supports P2MP LSPs will be the knowledge of where the traffic is | supports P2MP LSPs will be the knowledge of where the traffic is | |||
branched for each LSP within the network. That is, where within the | branched for each LSP within the network. That is, where within the | |||
network the branch nodes for the LSPs are located and what their | network the branch nodes for the LSPs are located and what their | |||
relationship is to links and other LSRs. The Traffic flow and | relationship is to links and other LSRs. Traffic flow and | |||
accounting tools MUST take this fact into account. | accounting tools MUST take this fact into account. | |||
5. Security Considerations | 5. Security Considerations | |||
This document introduces no new security issues compared with | This document introduces no new security issues compared with | |||
[MPLS-OAM]. It is worth highlighting, however, that any tool designed | [RFC4377]. It is worth highlighting, however, that any tool designed | |||
to satisfy the requirements described in this document MUST include | to satisfy the requirements described in this document MUST include | |||
provisions to prevent its unauthorized use. Likewise, these tools | provisions to prevent its unauthorized use. Likewise, these tools | |||
MUST provide a means by which an operator can prevent denial of | MUST provide a means by which an operator can prevent denial of | |||
service attacks if those tools are used in such an attack. | service attacks if those tools are used in such an attack. | |||
LSP mis-merging is described in [MPLS-OAM] where it is pointed out | LSP mis-merging is described in [RFC4377] where it is pointed out | |||
that it has security implications beyond simply being a network | that it has security implications beyond simply being a network | |||
defect. It needs to be stressed that it is in the nature of P2MP | defect. It needs to be stressed that it is in the nature of P2MP | |||
traffic flows that any erroneous delivery (such as caused by LSP | traffic flows that any erroneous delivery (such as caused by LSP | |||
mis-merging) is likely to have more far reaching conseuqences since | mis-merging) is likely to have more far reaching consequences since | |||
the traffic will be mis-delivered to multiple receivers. | the traffic will be mis-delivered to multiple receivers. | |||
As with previous OAM function described in [MPLS-OAM], the | As with the OAM functions described in [RFC4377], the | |||
performance of diagnostic functions and path characterization may | performance of diagnostic functions and path characterization may | |||
involve the extraction of a significant amount of information about | involve the extraction of a significant amount of information about | |||
network construction. The network operator MAY consider this | network construction. The network operator MAY consider this | |||
information private and wish to take steps to secure it, but further, | information private and wish to take steps to secure it, but further, | |||
the volume of this information may be considered as a threat to the | the volume of this information may be considered as a threat to the | |||
integrity of the network if it is extacted in bulk. This issue may be | integrity of the network if it is extracted in bulk. This issue may | |||
greater in P2MP MPLS becuase of the potential for a large number of | be greater in P2MP MPLS because of the potential for a large number | |||
receivers on a single LSP and the consequent extensive path of the | of receivers on a single LSP and the consequent extensive path of the | |||
LSP. | LSP. | |||
6. IANA Considerations | 6. IANA Considerations | |||
This document creates no new requirements on IANA namespaces. | This document creates no new requirements on IANA namespaces. | |||
7. References | 7. References | |||
7.1 Normative References | 7.1 Normative References | |||
[MPLS-OAM] T. Nadeau, Allan D., et al. Allan D., | [RFC4377] T. Nadeau, M. Morrow, G. Swallow, D. Allan, and | |||
"OAM Requirements for MPLS Networks", | S. Matsushima, "Operations and Management (OAM) | |||
draft-ietf-mpls-oam-requirements-05.txt, | Requirements for Multi-Protocol Label Switched | |||
December 2004 | (MPLS) Networks", RFC 4377, February 2006. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
7.2 Informative References | 7.2 Informative References | |||
[LSP-PING] Kompella, K., and Swallow, G., (Editors), "Detecting | [RFC4378] Alan, D., Nadeau T., "A Framework for | |||
MPLS Data Plane Failures", draft-ietf-mpls-lsp-ping, | Multi-Protocol Label Switching (MPLS) Operations | |||
work in progress. | and Management (OAM)", RFC4378, February 2006. | |||
[MCAST-LDP] Wijnands, IJ., et al., " Multicast Extensions for | [RFC4379] Kompella, K., and Swallow, G., (Editors), "Detecting | |||
LDP", draft-wijnands-mpls-ldp-mcast-ext, work in | MPLS Data Plane Failures", RFC 4379, February 2006. | |||
progress. | ||||
[P2MP-LDP] Minei, I., et al., "Label Distribution Protocol | [MCAST-LDP] IJ., Wijnands, I. Minei, et al., "Label Distribution | |||
Extensions for Point-to-Multipoint Label Switched | Protocol Extensions for Point-to-Multipoint and | |||
Paths", draft-minei-mpls-ldp-p2mp, work in progress. | Multipoint-to-Multipoint Label Switched Paths", | |||
draft-minei-wijnands-mpls-ldp-p2mp, work in | ||||
progress. | ||||
[P2MP-LSP-PING] Yasukawa, S., Farrel, A., Ali, Z., and Fenner, B., | [P2MP-LSP-PING] Yasukawa, S., Farrel, A., Ali, Z., and Fenner, B., | |||
"Detecting Data Plane Failures in | "Detecting Data Plane Failures in | |||
Point-to-Multipoint MPLS Traffic Engineering - | Point-to-Multipoint MPLS Traffic Engineering - | |||
Extensions to LSP Ping", | Extensions to LSP Ping", | |||
draft-yasukawa-mpls-p2mp-lsp-ping, work in progress. | draft-yasukawa-mpls-p2mp-lsp-ping, work in progress. | |||
[P2MP-RSVP] Aggarwal, R., Papadimitriou, D., and Yasukawa, S., | [P2MP-RSVP] Aggarwal, R., Papadimitriou, D., and Yasukawa, S., | |||
"Extensions to RSVP-TE for Point to Multipoint TE | "Extensions to RSVP-TE for Point to Multipoint TE | |||
LSPs", draft-ietf-mpls-rsvp-te-p2mp, work in | LSPs", draft-ietf-mpls-rsvp-te-p2mp, work in | |||
skipping to change at page 10, line 51 | skipping to change at page 11, line 32 | |||
[RFC3815] Cucchiara, J., Sjostrand, H., and Luciani, J., | [RFC3815] Cucchiara, J., Sjostrand, H., and Luciani, J., | |||
"Definitions of Managed Objects for the | "Definitions of Managed Objects for the | |||
Multiprotocol Label Switching (MPLS), Label | Multiprotocol Label Switching (MPLS), Label | |||
Distribution Protocol (LDP)", RFC 3815, June 2004. | Distribution Protocol (LDP)", RFC 3815, June 2004. | |||
8. Acknowledgment | 8. Acknowledgment | |||
The authors wish to acknowledge and thank the following | The authors wish to acknowledge and thank the following | |||
individuals for their valuable comments to this document: | individuals for their valuable comments to this document: | |||
Dimitri Papadimitriou and Rahul Aggarwal. | Rahul Aggarwal, Neil Harrison, Ben Niven-Jenkins and Dimitri | |||
Papadimitriou. | ||||
9. Authors' Addresses | 9. Authors' Addresses | |||
Adrian Farrel | Adrian Farrel | |||
Old Dog Consulting | Old Dog Consulting | |||
Phone: +44 (0) 1978 860944 | Phone: +44 (0) 1978 860944 | |||
Email: adrian@olddog.co.uk | Email: adrian@olddog.co.uk | |||
Daniel King | Daniel King | |||
Darwinian Neural Network Industries Ltd. | Aria Networks Ltd. | |||
Phone: +44 (0)1249 665923 | Phone: +44 (0)1249 665923 | |||
Email: dan@dnni.com | Email: daniel.king@aria-networks.com | |||
Thomas D. Nadeau | Thomas D. Nadeau | |||
Cisco Systems, Inc. | Cisco Systems, Inc. | |||
1414 Massachusetts Ave. | 1414 Massachusetts Ave. | |||
Boxborough, MA 01719 | Boxborough, MA 01719 | |||
Email: tnadeau@cisco.com | Email: tnadeau@cisco.com | |||
Seisho Yasukawa | Seisho Yasukawa | |||
NTT Corporation | NTT Corporation | |||
9-11, Midori-Cho 3-Chome | 9-11, Midori-Cho 3-Chome | |||
Musashino-Shi, Tokyo 180-8585, | Musashino-Shi, Tokyo 180-8585, | |||
Japan | Japan | |||
Phone: +81 422 59 4769 | Phone: +81 422 59 4769 | |||
Email: yasukawa.seisho@lab.ntt.co.jp | Email: yasukawa.seisho@lab.ntt.co.jp | |||
10. Intellectual Property Statement | 10. Intellectual Property Statement | |||
skipping to change at page 12, line 7 | skipping to change at page 12, line 38 | |||
http://www.ietf.org/ipr. | http://www.ietf.org/ipr. | |||
The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
rights that may cover technology that may be required to implement | rights that may cover technology that may be required to implement | |||
this standard. Please address the information to the IETF at | this standard. Please address the information to the IETF at | |||
ietf-ipr@ietf.org. | ietf-ipr@ietf.org. | |||
11. Full Copyright Statement | 11. Full Copyright Statement | |||
Copyright (C) The Internet Society (2005). This document is subject | Copyright (C) The Internet Society (2006). This document is subject | |||
to the rights, licenses and restrictions contained in BCP 78, and | to the rights, licenses and restrictions contained in BCP 78, and | |||
except as set forth therein, the authors retain all their rights. | except as set forth therein, the authors retain all their rights. | |||
This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | |||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | |||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | |||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | |||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | |||
End of changes. 55 change blocks. | ||||
156 lines changed or deleted | 188 lines changed or added | |||
This html diff was produced by rfcdiff 1.29, available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |