Internet DRAFT - draft-hares-trill-multicast

draft-hares-trill-multicast






IDR Working Group                                               S. Hares
Internet-Draft                                      NextHop Technologies
Expires: April 20, 2006                                 October 17, 2005


                    Multicast Link State For Rbidges
                   draft-hares-trill-multicast-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 20, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   Rbridges are transparent Layer 2 bridges that provide the ability to
   have an entire campus, with multiple physical links look like a
   single subnet.  The Rbridge technology utilizes Rbridges to link
   together Layer 2 areas using spanning trees to calculate paths.  The
   Rbridges run a link state protocol to determine the least cost paths
   Rbridges and exchange information about the location of MAC
   addresses.  The Rbridges will run a level 1 or a single area routing
   protocol.  To forward multicast packets, the Rbirdges may treat these
   as broadcast (sending the packets to all Rbridges) or use methods to



Hares                    Expires April 20, 2006                 [Page 1]

Internet-Draft             TRILL-Multicast-LS               October 2005


   snoop the Multicast MAC addresses (GARP, MAC learning) or IP/MAC
   address packets (IGMP/PIM snooping).

   Multicast Link State Rbridge connections suggest a Hybrid Multicast
   Link state extensions to ISIS and OSPF for Rbridges.


Table of Contents

   1.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Conventions used in this document  . . . . . . . . . . . .  3
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Multicast Algorithms . . . . . . . . . . . . . . . . . . . . .  7
     3.1.  Forwarding Database for Rbridges . . . . . . . . . . . . .  7
       3.1.1.  Output: Forwarding Database for Rbridges . . . . . . .  9
     3.2.  S,G Multicast Tree Calculation rooted at S MAC . . . . . . 10
     3.3.  S,G Multicast Tree Calculation to all G-Group MACs . . . . 12
     3.4.  Reduced Flooding Trees for all Rbridges supporting
           multicast  . . . . . . . . . . . . . . . . . . . . . . . . 13
   4.  Multicast Rbridge Cross Algorithm Aids . . . . . . . . . . . . 15
   5.  Multicast Rbridge TLV formats  . . . . . . . . . . . . . . . . 16
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 17
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 18
   Intellectual Property and Copyright Statements . . . . . . . . . . 19


























Hares                    Expires April 20, 2006                 [Page 2]

Internet-Draft             TRILL-Multicast-LS               October 2005


1.  Definitions

1.1.  Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [1].












































Hares                    Expires April 20, 2006                 [Page 3]

Internet-Draft             TRILL-Multicast-LS               October 2005


2.  Introduction

   Rbridges are transparent Layer 2 bridges that provide the ability to
   have an entire campus, with multiple physical links look like a
   single subnet.  The Rbridge technology utilizes Rbridges to link
   together Layer 2 areas using spanning trees to calculate paths.  The
   Rbridges run a link state protocol to determine the least cost paths
   Rbridges and exchange information about the location of MAC
   addresses.  Rbridges calculate one spanning tree and distables the
   use of equal cost links by utilizing the ID of the parent as the tie
   breaker.

   Rbridges are described in RBRIDGE [2].  Tie breaking is described in
   section 2.2 (Spanning Tree).

   The Rbridges will run a level 1 or a single area routing protocol.
   The Rbridge specification RBRIDGE [2] suggests that the protocol be
   IS-IS due ease of adding TLVS and the NET ID (6 bytes) that
   identifies the node.  While ISIS may be easier, it is still possible
   to OSPF to pass information given more modifications to OSPF.

   To forward multicast packets, the Rbridges may treat these as
   broadcast (sending the packets to all Rbridges) or use methods to
   snoop the Multicast MAC addresses (GARP GMRP or MAC learning) or IP/
   MAC address packets (IGMP/PIM snooping), or ARP/ND replies.

   The Rbridge must support multiple VLANs and traffic engineering to
   support Layer 2 forwarding based on traffic engineered paths
   (802.11e, 802.1 P bit and Q bits).

   These constraints placed on the routing calculations for the Rbridge
   are exactly the constraints placed on two previous protocols: MOSPF
   and 802.11s Wireless mesh.  This document suggests a Hybrid Link
   State Rbridge Protocol based on the work for 802.11s Wireless Mesh
   that is in turned based on the earlier work in MOSPF.

   MOSPF RFC 1584 [3].created source based trees rooted at the datagram
   source.  The MOSPF routers collected information about requests for
   nodes to receive multicast group traffice.  The MOSPF protocol
   calculated the shortest path from the source to the destinations.
   MOSPF did not support Equal-Cost Multi-path.  It select a single link
   for multiast traffic, just as the Rbridge work suggests.

   The Hybrid Link State Protocol Wi-Mesh 802.11s Proposal: Hybrid Link
   State Protocol [6], part of Wi-Mesh Alliance submission for 802.11s,
   suggests allowing three options for the multicast trees:





Hares                    Expires April 20, 2006                 [Page 4]

Internet-Draft             TRILL-Multicast-LS               October 2005


      Tree rooted at MAC source addreses per Destination MAC address

      Flooding Trees based on detection of a MAC Group Address detected
      an an Rbrdige

      Reduced flooding trees to Rbridges that support Multicast

   Todays layer 2 bridges are often highly meshed within a campus area.
   Bridges may be support WLANs (802.11) or Wired LANs (802.3 or
   Ethernet).  The reducing of flooding trees may allow needless
   flooding of multicast packets between Rbridges.  The Reduced flooding
   tree methods from OSLR or OSPF MANET can be used in general multicast
   flooding algorithsm to reduce the cost of forwarding data.  This
   document suggest allowing Rbridges to be able to negotiate Flooding
   reduction algorithms as well as Traffic Engineering paths.

   A reduced flooding algorithm may be useful for two reason The Layer 2
   LANs supported by TRILL will include both wired and wireless physical
   media.  In the wireless media, the bridges broadcast may reach
   several

   This document will cover the three multicast algorithms:

   1.  Forwarding Pathways results that Multicast Link State for
       Rbridges must creat

   2.  Tree Calculations Rooted at Rbridge report (Source MAC, Group
       MAC) state

   3.  Tree Calculations Rooted at Rbridge that detect sets of Sources
       addresses sending to Group MAC Address or receiving traffic for
       Group MAC Addresses

   4.  Reduced Fooding Trees to Rbridge that simply request to support
       Multicast for a VLAN or for a TE/VLAN pairing

   In each of these section will provide basic algorithms, TLV
   suggestions and a sample topology.

   This document will also cover mechanism in a different section that
   span across multiple multicast algorithms.

   1.  Alternative Tie-Breakers for spanning tree passed as part of
       Rbridge to Rbridge Link attribute

   2.  Used of Logical Link Bundling to support multiple links





Hares                    Expires April 20, 2006                 [Page 5]

Internet-Draft             TRILL-Multicast-LS               October 2005


   3.  Negotiating of reduced flooding algorithms between Rbridges.

   4.  Database issues
















































Hares                    Expires April 20, 2006                 [Page 6]

Internet-Draft             TRILL-Multicast-LS               October 2005


3.  Multicast Algorithms

   Rbridges must learn about Multicast pathways request by learning
   about frames destined to a Group MAC address from a Source MAC
   address.  The Rbridges must create a forwarding database structure to
   support forwarding behavior required by the Rbridge.

   Section 4.1 contains information about the Forwarding path for
   Rbridges.  The next three section contain information about the
   multicast tree calculations

      4.2- Tree rooted at MAC source addreses per Destination MAC
      address

      4.3 - Flooding Trees based on detection of a MAC Group Address
      detected an an Rbrdige

      4.4 - Reduced flooding trees to Rbridges that support Multicast

3.1.  Forwarding Database for Rbridges

   The Rbridge RBRIDGE [2] contains information on Forwarding Behavior
   and Forwarding headers

   The first step to defining how a Multicast algorithsm can work to
   support Multicast pathways through Rbridges is by defining the inputs
   and outputs.  The inputs are:

   1.  Rbridge topology - Bridges, Links and Designate Rbridges

   2.  Source-Group (S,G) MAC address pairs associated per Rbridge

   3.  (*,G) MAC pairs associated per Rbridge

   4.  IP Multicast (S,G) to (S,G) mappings

   5.  Single Path Selection weights

   The outputs are:

   1.  Destination Multicast MAC to Rbridge(s) mapping

   2.  Source Code MAC to Rbridge mapping

   3.  Encapsulation Table for traffic Destined for Rbridge

   4.  Forwarding Table for Encapsulated traffic to Rbridge(s)




Hares                    Expires April 20, 2006                 [Page 7]

Internet-Draft             TRILL-Multicast-LS               October 2005


   Rbridge Topolology The Rbridge topology borrows from the ISIS router
      topology for Bridges but must be extended to support:

      1.  Hello information to indicated Flags for support Router has.
          In a similar manner, the ISIS hello must be extended to
          indicate support for:

             Multicast Forwarding,

             Multicast Reduced Flooding algorithms

             Multicast Path Weights

      2.  Link information must include:

             Rbridge link Metric

             Traffic Engineering link metrics - both radio and wired

             Multicast support - broadcast, multicast by unicast
             replication, or other

      3.  Number of topology (default, VLAN Based)

      4.  Designated RBridge per link

   (S,G) MAC state: the Rbridge needs to indicate keep a table of Source
      MAC, Group MAC pairs associated with each Rbridge.

         The Destinated Ingress Rbridge will learn these pairs from the
         endnodes associated with the Rbridge.

         The Designated Rbridge will send this state in TLVs passed to
         other Rbridges.  The ISIS flooding algorithm will be used to
         distribute the (S,G) MAC information.

   (*,G) MAC state: the Rbridge should also be able to passing Support
      for flooding to all Rbridges Multicast traffic from any source.
      The (*,G) MAC state can be used for a reduced flooding to a
      limited set of Rbridges.

   IP (S,G) Mappings to MAC (S,G): the Rbridge should keep a set of
      mappings from IP (S,G) to MAC (S,G) in order to aid the ARP
      processing.







Hares                    Expires April 20, 2006                 [Page 8]

Internet-Draft             TRILL-Multicast-LS               October 2005


   Singe Path Weights: The Tie breaker mechanisms may be tuned by
      allowing common single path weights per VLAN so that alternative
      single path calculations may be optionally used.  The default tie-
      breaker would be required to be supported.

   Note: Since the Rbridge topology cannot make use of equal-cost-multi-
   path links, it would be good to combine the links into bundled links
   and utilize traffic engineer capabilities within that link.

3.1.1.  Output: Forwarding Database for Rbridges

   Figure 1 shows sample Databases for the forwarding tables

      Destination Multicast MAC to Rbridge(s) mapping

      Source Code MAC to Rbridge mapping

      Encapsulation Table for traffic Destined for Rbridge

      Forwarding Table for Encapsulated traffic to Rbridge(s)

   The Multicast Algorithms need to take the input and create the
   forwarding state per VLAN, per Traffic-Engineering layer 2 overlayin.




























Hares                    Expires April 20, 2006                 [Page 9]

Internet-Draft             TRILL-Multicast-LS               October 2005


         Destination MAC Table
         ==========================================================
         Destination MAC       RBridge List
         ------------------    -------------------------------
         Group MAC-1           Rbridge-x, Rbridge-y, Rbridge-z
         Group MAC-2           Rbridge-w, Rbridge-z
         ...
         Group MAC-n           Rbridge-z, Rbridge-y


         Source MAC Table
         ============================================================
         Source MAC            Rbridge
         ----------------      -------------
         MAC-1                 Rbridge-x
         MAC-10                Rbridge-z


         Encapsulation Table
         ==================================================================
         Source MAC   Destination MAC  Egress       Encapsulation
                                       Rbridges     Group MAC    Unicast MAC
         ----------   ---------------  ---------   -----------   -----------
         MAC-1        Group-MAC 1      Rbridge-x,   Group-MAC-3   [none]
                                       Rbridge-y,
                                       Rbridge-z

         MAC-10       Group-MAC-n      Rbridge-z,                  MAC-5
                                       Rbridge-y      [none]


         Forwarding of Encapsulations

         Unicast Encap MAC       Next Rbridge
         -----------------       ---------------
         MAC-5                   Rbridge-a

         Multicast Encap MAC     Next Rbridges
         ---------------------   --------------------------
         Group-MAC-3             Rbridge-a, Rbridge-C


   Figure 1: Destinatino MAC to Rbridge mapping

3.2.  S,G Multicast Tree Calculation rooted at S MAC

   The mechanism has three parts:




Hares                    Expires April 20, 2006                [Page 10]

Internet-Draft             TRILL-Multicast-LS               October 2005


   1.  Flooding Information via Link State

   2.  Sorting (S,G,Rbridge) into S-[G-sets,Rbridges-set]

   3.  Calculating a multicast forwarding tree based in the source for
       S-[G-Sets,Rbridge

   1.  The Flooding of information via the link state should include the
       following information about MAC Addresses:


         TLV sent from originating Rbridge
         =====================================
         TLV1: Source MAC address
         -------------------------------------
         Source MAC Address IDentifier
         Count of Unicast Source MAC Addresses
         Source MAC 1  [Flag Add/Delete, Encrypted/None]
         Source MAC 2
         Source MAC n
         [count of Group MACs associated with Source set]
         [MAC Group Identifier - number]

         TLV2: Group MAC set
         ---------------------------
         Count of Multicast MAC addresses
         Group MAC Address-1 [6 bytes][ Flag byte -Add/Delete, Encrypt/None]
         Group MAC Address-2
         ...
         Group MAC Address -n
         [count of Groups of Source MAC adddresses Associted with Group]
         [Source MAC Identifiers]

       Figure 2: TLVs for MAC flooding

   2.  Sorting (S,G,Rbridge) into [S, G-Sets] [G-sets,Rbridges-set]

          This part of the calculation tries to reduce the (S,G,Rbridge)
          source tree to all destination MAC Address and Rbridge
          calculations.

          Each Rbridge has received them mappings between (S,G,Rbridge)
          pairs from the above TLVs.  After storing the original link
          state information in the ISIS LSDB, the Rbridge needs to sort
          information around this calculation framework: Sources going
          to the same Groups, a "Group-Set".  For these sources, the
          calculation to the Groups can be summarized into a "Source-
          set".



Hares                    Expires April 20, 2006                [Page 11]

Internet-Draft             TRILL-Multicast-LS               October 2005


          For each group set, the groups will be listed on a a set of
          Rbridges.  If the multiple groups share the same group sets,
          the Group set can be summarized into a "Rbridge-Group-set".

          Map the Source Address to a Rbridge and see if any further
          reduction by combining Source Addresses to Rbridge can be made
          of the Source-Rbridge-set each with a G-Destination-Rbridge-
          Group-Set.

          The results (Source-Rbridge-set, G-Destination-Rbridge-Group-
          set) is passed to the next stage.

   3.  For each Source-Rbridge-Set calculate the spanning tree for each
       G-Destination-Rbridge-Group Set. Store the Resulting Entries in
       the forwarding state as {S-MAC, G-MAC] state.  Use the Path tie
       entries to set the forwarding tree state to a single path.

3.3.  S,G Multicast Tree Calculation to all G-Group MACs

   The Group MAC address calculation can be used for a smaller number of
   Rbridges with only some of the Rbridges supporting the Destination
   MAC Addresses.

   In this calcualtion, the source tree is calculated form each Ingress
   Rbridge to the Group MAC Destination learned at each Rbridge.  The
   benefit of this calculation is that only Group MAC addresses need to
   be passed around and no (S,G) calculation is completed.

   The mechanism has three parts:

   1.  Flooding Information via Link State

   2.  Sorting the (Group-MAC-set,Rbridge> into Rbridge-(*,G)sets that
       share the same Group-MAC-Sets

   3.  Calculating a multicast forwarding tree from each Rbridge to the
       Rbridge-(*,G)sets

   4.  Updating the forwarding table with the results

   1.  The Flooding of information via the link state should include the
       following information about MAC Addresses:









Hares                    Expires April 20, 2006                [Page 12]

Internet-Draft             TRILL-Multicast-LS               October 2005


         TLV sent from originating Rbridge
         =====================================
         TLV2: Group MAC set
         ---------------------------
         Count of Multicast MAC addresses
         Group MAC Address-1 [6 bytes][ Flag byte -Add/Delete, Encrypt/None]
         Group MAC Address-2
         ...
         Group MAC Address -n
         [count of Groups of Source MAC adddresses Associted with Group]
         [Source MAC Identifiers]

       Figure 3: Defitions for TLV for MAC flooding

   2.  Sort the (Group-Set,originating RBridge) into (*,G) Group sets
       that share the same set of Rbridges.

          (For example, four (*,g) group sets could be found only on
          Rbridges 1,2,3, and 4.  The calculation for these two group
          sets sets can be done at the same time.)

   3.  For each Source-Rbridge calculate the spanning tree for each
       Rbridges for the (*,G) group sets.  Use the path tie-break
       entries to set the forwarding state to 1 path.

   4.  Store the Resulting Entries in the forwarding state as {S-MAC,
       G-MAC] state.

3.4.  Reduced Flooding Trees for all Rbridges supporting multicast

   The third algorithm for calculating multicast state is to simply
   calculate a more efficient broadcast flood.  The MANET and OSPF MANET
   work has started to look at ways to reduced the Link state
   announcements that are sent over and over.

   The first step in this method is to determine what Rbridges will
   support Multicast forwarding.  If nodes do not support multicast
   flooding, the nodes are cut out of the calculation tree.

   Reduction of flooding of multicast frames may utilize the similar
   methods that calculate the minimum routers that need to flood Link
   State Advertisements.  All routers send ACKs for the information
   received - but the repeat ACK require less bandwidth than the data.

      The OLSR RFC 3626 [7] MPR sets that announced to the other
      routers.





Hares                    Expires April 20, 2006                [Page 13]

Internet-Draft             TRILL-Multicast-LS               October 2005


      The OSPF manet work has two drafts:

         OSPF with Minimum Connected Dominating Sets (MCDS) calculated
         and optionally sent. draft-chandra-ospf-manet-ext [5]

         OSPF with MPR sets calculated and always sent
         draft-ogier-manet-ospf-extension-04> [4]












































Hares                    Expires April 20, 2006                [Page 14]

Internet-Draft             TRILL-Multicast-LS               October 2005


4.  Multicast Rbridge Cross Algorithm Aids

      This section covers algorithms that will span across multiple
      multicast algorithms.

      Alternative Tie-Break: The addition tie breaking algorithms can
         be:

            Negotiated on the ISIS Hello

            Passed as TLVs indicating weights to select a group leader
            Rbridge that will form the root of the spanning tree

      Logical Links: Logical links provide a natural bundling of
         existing links into larger calculations.  The link bundling is
         supported by many ISIS implementations.  Use of a "logical
         link" identifier or a L2 Logical Link ID (6 bytes) to identify
         the logical link bundle.

      Negotiating of Reduced flooding a mechanism to negotiate the flood
         algorithms between bridge is needed for the a non-configured
         selection of flooding algorithms.





























Hares                    Expires April 20, 2006                [Page 15]

Internet-Draft             TRILL-Multicast-LS               October 2005


5.  Multicast Rbridge TLV formats


      +--------------------------------------------------+
      |Source MAC Group ID          (4 octet)            |
      +--------------------------------------------------+
      | count of Unicast MAC addr   (2 octet)            |
      +--------------------------------------------------+
      | Source MAC Address 1        (6 octet)            |
      +--------------------------------------------------+
      | MAC 1 Flag (Add/Delete, Encrypt/none (1 octet)   |
      +--------------------------------------------------+
      | Source MAC Address 2        (6 octets            |
      +--------------------------------------------------+
      | MAC 2 Flag (Add/Delte, Encrypt/none) (1 octet)   |
      +--------------------------------------------------+
      |...............................                   |
      +--------------------------------------------------+
      | count sets of Group MACs       (2 octets)        |
      +--------------------------------------------------+
      + Group set 1 Identifier        (6 octest)         +
      ----------------------------------------------------
      + .................................                +
      ----------------------------------------------------

      ---------------------------------------------------+
      |Group MAC Group ID                   (4 octet)    |
      +--------------------------------------------------+
      | count of Group MAC addr             (2 octet)    |
      +--------------------------------------------------+
      | Group MAC Address 1                 (6 octet)    |
      +--------------------------------------------------+
      | MAC 1 Flag (Add/Delete, Encrypt/none (1 octet)   |
      +--------------------------------------------------+
      | Group MAC Address 2                 (6 octets    |
      +--------------------------------------------------+
      | MAC 2 Flag (Add/Delte, Encrypt/none) (1 octet)   |
      +--------------------------------------------------+
      |...............................                   |
      +--------------------------------------------------+
      | count sets of Source MACs           (2 octets)   |
      +--------------------------------------------------+
      + Group of Source MAC set 1 Id       (6 octets)    +
      ----------------------------------------------------
      + .................................                +
      ----------------------------------------------------
      + Group of Source MAC set N ID        (6 octets>   +
      ----------------------------------------------------



Hares                    Expires April 20, 2006                [Page 16]

Internet-Draft             TRILL-Multicast-LS               October 2005


6.  Security Considerations

   The security of the Rbridge exchange depends on the factors:

      IS-IS protocol security

      Encryption of MAC traffic on a hop-by-hop basis.  Wireless LANs
      will utilized encrypted traffic.  Some wired traffic may be
      encrupted.

   This proposal does not change the security implications pre-existing
   in these protocols.

7.  References

   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", March 1997, <ftp://ftp.isi.edu/in-notes/rfc2119>.

   [2]  ""Rbridges: Transparent Routing"", May 2005, <http://
        www.ietf.org/internet-drafts/draft-perlman-rbridge-03.txt>.

   [3]  ""Multicast Extensions to OSPF"", March 1994,
        <http://www.ietf.org/rfc/rfc1584.txt>.

   [4]  ""MANET Extension of OSPF using CDS Flooding"", July 2005, <http
        ://www.ietf.org/internet-drafts/
        draft-ogier-manet-ospf-extension-04.txt>.

   [5]  ""Extensions to OSPF to Support Mobile Ad Hoc Networking"",
        April 2005, <http://www.ietf.org/internet-drafts/
        draft-chandra-ospf-manet-ext-03.txt>.

   [6]  ""802.11 TGS MAC Enhancment Proposal - Wi-Mesh Alliance"",
        <http://www.ieee.org/802.11/IEEE 802.11.05/5899r4>.

   [7]  ""Optimized Link State Routing Protocol (OLSR)"", October 2003,
        <http://www.ietf.org/rfc/rfc3626.txt>.














Hares                    Expires April 20, 2006                [Page 17]

Internet-Draft             TRILL-Multicast-LS               October 2005


Author's Address

   Susan Hares
   NextHop Technologies
   825 Victors Way
   Ann Arbor, MI  48105

   Phone: +1-734-222-1610
   Email: shares@nexthop.com










































Hares                    Expires April 20, 2006                [Page 18]

Internet-Draft             TRILL-Multicast-LS               October 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Hares                    Expires April 20, 2006                [Page 19]