Internet Engineering Task Force (IETF)                      I. Busi, Ed.
Request for Comments: 6371                                Alcatel-Lucent
Category: Informational                                    D. Allan, Ed.
ISSN: 2070-1721                                                 Ericsson
                                                          September 2011


       Operations, Administration, and Maintenance Framework for
                     MPLS-Based Transport Networks

Abstract

   The Transport Profile of Multiprotocol Label Switching (MPLS-TP) is a
   packet-based transport technology based on the MPLS Traffic
   Engineering (MPLS-TE) and pseudowire (PW) data-plane architectures.

   This document describes a framework to support a comprehensive set of
   Operations, Administration, and Maintenance (OAM) procedures that
   fulfill the MPLS-TP OAM requirements for fault, performance, and
   protection-switching management and that do not rely on the presence
   of a control plane.

   This document is a product of a joint Internet Engineering Task Force
   (IETF) / International Telecommunications Union Telecommunication
   Standardization Sector (ITU-T) effort to include an MPLS Transport
   Profile within the IETF MPLS and Pseudowire Emulation Edge-to-Edge
   (PWE3) architectures to support the capabilities and functionalities
   of a packet transport network as defined by the ITU-T.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Not all documents
   approved by the IESG are a candidate for any level of Internet
   Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   http://www.rfc-editor.org/info/rfc6371.







Busi & Allan                  Informational                     [Page 1]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


Copyright Notice

   Copyright (c) 2011 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1. Introduction ....................................................3
   2. Conventions Used in This Document ...............................5
      2.1. Terminology ................................................5
      2.2. Definitions ................................................7
   3. Functional Components ..........................................10
      3.1. Maintenance Entity and Maintenance Entity Group ...........10
      3.2. MEG Nesting: SPMEs and Tandem Connection Monitoring .......13
      3.3. MEG End Points (MEPs) .....................................14
      3.4. MEG Intermediate Points (MIPs) ............................18
      3.5. Server MEPs ...............................................20
      3.6. Configuration Considerations ..............................21
      3.7. P2MP Considerations .......................................21
      3.8. Further Considerations of Enhanced Segment Monitoring .....22
   4. Reference Model ................................................23
      4.1. MPLS-TP Section Monitoring (SMEG) .........................26
      4.2. MPLS-TP LSP End-to-End Monitoring Group (LMEG) ............27
      4.3. MPLS-TP PW Monitoring (PMEG) ..............................27
      4.4. MPLS-TP LSP SPME Monitoring (LSMEG) .......................28
      4.5. MPLS-TP MS-PW SPME Monitoring (PSMEG) .....................30
      4.6. Fate-Sharing Considerations for Multilink .................31
   5. OAM Functions for Proactive Monitoring .........................32
      5.1. Continuity Check and Connectivity Verification ............33
           5.1.1. Defects Identified by CC-V .........................35
           5.1.2. Consequent Action ..................................37
           5.1.3. Configuration Considerations .......................38
      5.2. Remote Defect Indication ..................................40
           5.2.1. Configuration Considerations .......................40
      5.3. Alarm Reporting ...........................................41
      5.4. Lock Reporting ............................................42
      5.5. Packet Loss Measurement ...................................44
           5.5.1. Configuration Considerations .......................45



Busi & Allan                  Informational                     [Page 2]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


           5.5.2. Sampling Skew ......................................45
           5.5.3. Multilink Issues ...................................45
      5.6. Packet Delay Measurement ..................................46
           5.6.1. Configuration Considerations .......................46
      5.7. Client Failure Indication .................................47
           5.7.1. Configuration Considerations .......................47
   6. OAM Functions for On-Demand Monitoring .........................48
      6.1. Connectivity Verification .................................48
           6.1.1. Configuration Considerations .......................49
      6.2. Packet Loss Measurement ...................................50
           6.2.1. Configuration Considerations .......................50
           6.2.2. Sampling Skew ......................................50
           6.2.3. Multilink Issues ...................................50
      6.3. Diagnostic Tests ..........................................50
           6.3.1. Throughput Estimation ..............................51
           6.3.2. Data-Plane Loopback ................................52
      6.4. Route Tracing .............................................54
           6.4.1. Configuration Considerations .......................54
      6.5. Packet Delay Measurement ..................................54
           6.5.1. Configuration Considerations .......................55
   7. OAM Functions for Administration Control .......................55
      7.1. Lock Instruct .............................................55
           7.1.1. Locking a Transport Path ...........................56
           7.1.2. Unlocking a Transport Path .........................56
   8. Security Considerations ........................................57
   9. Acknowledgments ................................................58
   10. References ....................................................58
      10.1. Normative References .....................................58
      10.2. Informative References ...................................59
   11. Contributing Authors ..........................................60

1.  Introduction

   As noted in the MPLS Transport Profile (MPLS-TP) framework RFCs (RFC
   5921 [8] and RFC 6215 [9]), MPLS-TP is a packet-based transport
   technology based on the MPLS Traffic Engineering (MPLS-TE) and
   pseudowire (PW) data-plane architectures defined in RFC 3031 [1], RFC
   3985 [2], and RFC 5659 [4].

   MPLS-TP utilizes a comprehensive set of Operations, Administration,
   and Maintenance (OAM) procedures for fault, performance, and
   protection-switching management that do not rely on the presence of a
   control plane.

   In line with [15], existing MPLS OAM mechanisms will be used wherever
   possible, and extensions or new OAM mechanisms will be defined only
   where existing mechanisms are not sufficient to meet the
   requirements.  Some extensions discussed in this framework may end up



Busi & Allan                  Informational                     [Page 3]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   as aspirational capabilities and may be determined to be not
   tractably realizable in some implementations.  Extensions do not
   deprecate support for existing MPLS OAM capabilities.

   The MPLS-TP OAM framework defined in this document provides a
   protocol-neutral description of the required OAM functions and of the
   data-plane OAM architecture to support a comprehensive set of OAM
   procedures that satisfy the MPLS-TP OAM requirements of RFC 5860
   [11].  In this regard, it defines similar OAM functionality as for
   existing Synchronous Optical Network / Synchronous Digital Hierarchy
   (SONET/SDH) and Optical Transport Network (OTN) OAM mechanisms (e.g.,
   [19]).

   The MPLS-TP OAM framework is applicable to Sections, Label Switched
   Paths (LSPs), Multi-Segment Pseudowires (MS-PWs), and Sub-Path
   Maintenance Elements (SPMEs).  It supports co-routed and associated
   bidirectional P2P transport paths as well as unidirectional P2P and
   P2MP transport paths.

   OAM packets that instrument a particular direction of a transport
   path are subject to the same forwarding treatment (i.e., fate-share)
   as the user data packets and in some cases, where Explicitly TC-
   encoded-PSC LSPs (E-LSPs) are employed, may be required to have
   common per-hop behavior (PHB) Scheduling Class (PSC) End-to-End (E2E)
   with the class of traffic monitored.  In case of Label-Only-Inferred-
   PSC LSP (L-LSP), only one class of traffic needs to be monitored, and
   therefore the OAM packets have common PSC with the monitored traffic
   class.

   OAM packets can be distinguished from the used data packets using the
   Generic Associated Channel Label (GAL) and Associated Channel Header
   (ACH) constructs of RFC 5586 [7] for LSP, SPME, and Section, or the
   ACH construct of RFC 5085 [3] and RFC 5586 [7] for (MS-)PW.  OAM
   packets are never fragmented and are not combined with user data in
   the same packet payload.

   This framework makes certain assumptions as to the utility and
   frequency of different classes of measurement that naturally suggest
   different functions are implemented as distinct OAM flows or packets.
   This is dictated by the combination of the class of problem being
   detected and the need for timeliness of network response to the
   problem.  For example, fault detection is expected to operate on an
   entirely different time base than performance monitoring, which is
   also expected to operate on an entirely different time base than in-
   band management transactions.






Busi & Allan                  Informational                     [Page 4]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   The remainder of this memo is structured as follows:

   Section 2 covers the definitions and terminology used in this memo.

   Section 3 describes the functional component that generates and
   processes OAM packets.

   Section 4 describes the reference models for applying OAM functions
   to Sections, LSP, MS-PW, and their SPMEs.

   Sections 5, 6, and 7 provide a protocol-neutral description of the
   OAM functions, defined in RFC 5860 [11], aimed at clarifying how the
   OAM protocol solutions will behave to achieve their functional
   objectives.

   Section 8 discusses the security implications of OAM protocol design
   in the MPLS-TP context.

   The OAM protocol solutions designed as a consequence of this document
   are expected to comply with the functional behavior described in
   Sections 5, 6, and 7.  Alternative solutions to required functional
   behaviors may also be defined.

   OAM specifications following this OAM framework may be provided in
   different documents to cover distinct OAM functions.

   This document is a product of a joint Internet Engineering Task Force
   (IETF) / International Telecommunication Union Telecommunication
   Standardization Sector (ITU-T) effort to include an MPLS Transport
   Profile within the IETF MPLS and PWE3 architectures to support the
   capabilities and functionalities of a packet transport network as
   defined by the ITU-T.

2.  Conventions Used in This Document

2.1.  Terminology

   AC     Attachment Circuit

   AIS    Alarm Indication Signal

   CC     Continuity Check

   CC-V   Continuity Check and Connectivity Verification

   CV     Connectivity Verification

   DBN    Domain Border Node



Busi & Allan                  Informational                     [Page 5]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   E-LSP  Explicitly TC-encoded-PSC LSP

   ICC    ITU Carrier Code

   LER    Label Edge Router

   LKR    Lock Report

   L-LSP  Label-Only-Inferred-PSC LSP

   LM     Loss Measurement

   LME    LSP Maintenance Entity

   LMEG   LSP ME Group

   LSP    Label Switched Path

   LSR    Label Switching Router

   LSME   LSP SPME ME

   LSMEG  LSP SPME ME Group

   ME     Maintenance Entity

   MEG    Maintenance Entity Group

   MEP    Maintenance Entity Group End Point

   MIP    Maintenance Entity Group Intermediate Point

   NMS    Network Management System

   PE     Provider Edge

   PHB    Per-Hop Behavior

   PM     Performance Monitoring

   PME    PW Maintenance Entity

   PMEG   PW ME Group

   PSC    PHB Scheduling Class

   PSME   PW SPME ME




Busi & Allan                  Informational                     [Page 6]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   PSMEG  PW SPME ME Group

   PW     Pseudowire

   SLA    Service Level Agreement

   SME    Section Maintenance Entity

   SMEG   Section ME Group

   SPME   Sub-Path Maintenance Element

   S-PE   Switching Provider Edge

   TC     Traffic Class

   T-PE   Terminating Provider Edge

2.2.  Definitions

   This document uses the terms defined in RFC 5654 [5].

   This document uses the term 'per-hop behavior' as defined in RFC 2474
   [16].

   This document uses the term 'LSP' to indicate either a service LSP or
   a transport LSP (as defined in RFC 5921 [8]).

   This document uses the term 'Section' exclusively to refer to the n=0
   case of the term 'Section' defined in RFC 5960 [10].

   This document uses the term 'Sub-Path Maintenance Element (SPME)' as
   defined in RFC 5921 [8].

   This document uses the term 'traffic profile' as defined in RFC 2475
   [13].

   Where appropriate, the following definitions are aligned with ITU-T
   recommendation Y.1731 [21] in order to have a common, unambiguous
   terminology.  They do not however intend to imply a certain
   implementation but rather serve as a framework to describe the
   necessary OAM functions for MPLS-TP.

   Adaptation function: The adaptation function is the interface between
   the client (sub-)layer and the server (sub-)layer.

   Branch Node: A node along a point-to-multipoint transport path that
   is connected to more than one downstream node.



Busi & Allan                  Informational                     [Page 7]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Bud Node: A node along a point-to-multipoint transport path that is
   at the same time a branch node and a leaf node for this transport
   path.

   Data-plane loopback: An out-of-service test where a transport path at
   either an intermediate or terminating node is placed into a data-
   plane loopback state, such that all traffic (including both payload
   and OAM) received on the looped back interface is sent on the reverse
   direction of the transport path.

      Note: The only way to send an OAM packet to a node that has been
      put into data-plane loopback mode is via Time to Live (TTL)
      expiry, irrespective of whether the node is hosting MIPs or MEPs.

   Domain Border Node (DBN): An intermediate node in an MPLS-TP LSP that
   is at the boundary between two MPLS-TP OAM domains.  Such a node may
   be present on the edge of two domains or may be connected by a link
   to the DBN at the edge of another OAM domain.

   Down MEP: A MEP that receives OAM packets from, and transmits them
   towards, the direction of a server layer.

   Forwarding Engine: An abstract functional component, residing in an
   LSR, that forwards the packets from an ingress interface toward the
   egress interface(s).

   In-Service: The administrative status of a transport path when it is
   unlocked.

   Interface: An interface is the attachment point to a server
   (sub-)layer, e.g., a MPLS-TP Section or MPLS-TP tunnel.

   Intermediate Node: An intermediate node transits traffic for an LSP
   or a PW.  An intermediate node may originate OAM flows directed to
   downstream intermediate nodes or MEPs.

   Loopback: See data-plane loopback and OAM loopback definitions.

   Maintenance Entity (ME): Some portion of a transport path that
   requires management bounded by two points (called MEPs), and the
   relationship between those points to which maintenance and monitoring
   operations apply (details in Section 3.1).

   Maintenance Entity Group (MEG): The set of one or more maintenance
   entities that maintain and monitor a section or a transport path in
   an OAM domain.





Busi & Allan                  Informational                     [Page 8]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   MEP: A MEG End Point (MEP) is capable of initiating (source MEP) and
   terminating (sink MEP) OAM packets for fault management and
   performance monitoring.  MEPs define the boundaries of an ME (details
   in Section 3.3).

   MIP: A MEG intermediate point (MIP) terminates and processes OAM
   packets that are sent to this particular MIP and may generate OAM
   packets in reaction to received OAM packets.  It never generates
   unsolicited OAM packets itself.  A MIP resides within a MEG between
   MEPs (details in Section 3.3).

   OAM domain: A domain, as defined in [5], whose entities are grouped
   for the purpose of keeping the OAM confined within that domain.  An
   OAM domain contains zero or more MEGs.

      Note: Within the rest of this document, the term "domain" is used
      to indicate an "OAM domain".

   OAM flow: The set of all OAM packets originating with a specific
   source MEP that instrument one direction of a MEG (or possibly both
   in the special case of data-plane loopback).

   OAM loopback: The capability of a node to be directed by a received
   OAM packet to generate a reply back to the sender.  OAM loopback can
   work in-service and can support different OAM functions (e.g.,
   bidirectional on-demand connectivity verification).

   OAM Packet: A packet that carries OAM information between MEPs and/or
   MIPs in a MEG to perform some OAM functionality (e.g., connectivity
   verification).

   Originating MEP: A MEP that originates an OAM transaction packet
   (toward a target MIP/MEP) and expects a reply, either in-band or out-
   of-band, from that target MIP/MEP.  The originating MEP always
   generates the OAM request packets in-band and expects and processes
   only OAM reply packets returned by the target MIP/MEP.

   Out-of-Service: The administrative status of a transport path when it
   is locked.  When a path is in a locked condition, it is blocked from
   carrying client traffic.

   Path Segment: It is either a segment or a concatenated segment, as
   defined in RFC 5654 [5].

   Signal Degrade: A condition declared by a MEP when the data
   forwarding capability associated with a transport path has
   deteriorated, as determined by performance monitoring (PM).  See also
   ITU-T recommendation G.806 [14].



Busi & Allan                  Informational                     [Page 9]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Signal Fail: A condition declared by a MEP when the data forwarding
   capability associated with a transport path has failed, e.g., loss of
   continuity.  See also ITU-T recommendation G.806 [14].

   Sink MEP: A MEP acts as a sink MEP for an OAM packet when it
   terminates and processes the packets received from its associated
   MEG.

   Source MEP: A MEP acts as source MEP for an OAM packet when it
   originates and inserts the packet into the transport path for its
   associated MEG.

   Tandem Connection: A tandem connection is an arbitrary part of a
   transport path that can be monitored (via OAM) independent of the
   end-to-end monitoring (OAM).  The tandem connection may also include
   the forwarding engine(s) of the node(s) at the boundaries of the
   tandem connection.  Tandem connections may be nested but cannot
   overlap.  See also ITU-T recommendation G.805 [20].

   Target MEP/MIP: A MEP or a MIP that is targeted by OAM transaction
   packets and that replies to the originating MEP that initiated the
   OAM transactions.  The target MEP or MIP can reply either in-band or
   out-of-band.  The target sink MEP function always receives the OAM
   request packets in-band, while the target source MEP function only
   generates the OAM reply packets that are sent in-band.

   Up MEP: A MEP that transmits OAM packets towards, and receives them
   from, the direction of the forwarding engine.

3.  Functional Components

   MPLS-TP is a packet-based transport technology based on the MPLS and
   PW data plane architectures ([1], [2], and [4]) and is capable of
   transporting service traffic where the characteristics of information
   transfer between the transport path end points can be demonstrated to
   comply with certain performance and quality guarantees.

   In order to describe the required OAM functionality, this document
   introduces a set of functional components.

3.1.  Maintenance Entity and Maintenance Entity Group

   MPLS-TP OAM operates in the context of Maintenance Entities (MEs)
   that define a relationship between two points of a transport path to
   which maintenance and monitoring operations apply.  The two points
   that define a maintenance entity are called Maintenance Entity Group
   End Points (MEPs).  The collection of one or more MEs that belongs to
   the same transport path and that are maintained and monitored as a



Busi & Allan                  Informational                    [Page 10]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   group are known as a Maintenance Entity Group (MEG).  In between
   MEPs, there are zero or more intermediate points, called Maintenance
   Entity Group Intermediate Points (MIPs).  MEPs and MIPs are
   associated with the MEG and can be shared by more than one ME in a
   MEG.

   An abstract reference model for an ME is illustrated in Figure 1
   below.

                         +-+    +-+    +-+    +-+
                         |A|----|B|----|C|----|D|
                         +-+    +-+    +-+    +-+

                   Figure 1: ME Abstract Reference Model

   The instantiation of this abstract model to different MPLS-TP
   entities is described in Section 4.  In Figure 1, nodes A and D can
   be Label Edge Routers (LERs) for an LSP or the Terminating Provider
   Edges (T-PEs) for an MS-PW, nodes B and C are LSRs for an LSP or
   Switching PEs (S-PEs) for an MS-PW.  MEPs reside in nodes A and D,
   while MIPs reside in nodes B and C and may reside in A and D.  The
   links connecting adjacent nodes can be physical links, (sub-)layer
   LSPs/SPMEs, or server-layer paths.

   This functional model defines the relationships between all OAM
   entities from a maintenance perspective and it allows each
   Maintenance Entity to provide monitoring and management for the
   (sub-)layer network under its responsibility and efficient
   localization of problems.

   An MPLS-TP Maintenance Entity Group may be defined to monitor the
   transport path for fault and/or performance management.

   The MEPs that form a MEG bound the scope of an OAM flow to the MEG
   (i.e., within the domain of the transport path that is being
   monitored and managed).  There are two exceptions to this:

   1) A misbranching fault may cause OAM packets to be delivered to a
      MEP that is not in the MEG of origin.

   2) An out-of-band return path may be used between a MIP or a MEP and
      the originating MEP.

   In case of a unidirectional point-to-point transport path, a single
   unidirectional Maintenance Entity is defined to monitor it.






Busi & Allan                  Informational                    [Page 11]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   In case of associated bidirectional point-to-point transport paths,
   two independent unidirectional Maintenance Entities are defined to
   independently monitor each direction.  This has implications for
   transactions that terminate at or query a MIP, as a return path from
   MIP to the originating MEP does not necessarily exist in the MEG.

   In case of co-routed bidirectional point-to-point transport paths, a
   single bidirectional Maintenance Entity is defined to monitor both
   directions congruently.

   In case of unidirectional point-to-multipoint transport paths, a
   single unidirectional Maintenance Entity for each leaf is defined to
   monitor the transport path from the root to that leaf.

   In all cases, portions of the transport path may be monitored by the
   instantiation of SPMEs (see Section 3.2).

   The reference model for the P2MP MEG is represented in Figure 2.

                                             +-+
                                          /--|D|
                                         /   +-+
                                      +-+
                                   /--|C|
                        +-+    +-+/   +-+\   +-+
                        |A|----|B|        \--|E|
                        +-+    +-+\   +-+    +-+
                                   \--|F|
                                      +-+

                 Figure 2: Reference Model for P2MP MEG

   In the case of P2MP transport paths, the OAM measurements are
   independent for each ME (A-D, A-E, and A-F):

   o  Fault conditions - some faults may impact more than one ME
      depending on where the failure is located;

   o  Packet loss - packet dropping may impact more than one ME
      depending from where the packets are lost;

   o  Packet delay - will be unique per ME.

   Each leaf (i.e., D, E, and F) terminates OAM flows to monitor the ME
   between itself and the root while the root (i.e., A) generates OAM
   packets common to all the MEs of the P2MP MEG.  All nodes may
   implement a MIP in the corresponding MEG.




Busi & Allan                  Informational                    [Page 12]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


3.2.  MEG Nesting: SPMEs and Tandem Connection Monitoring

   In order to verify and maintain performance and quality guarantees,
   there is a need to apply OAM functionality not only on a transport
   path granularity (e.g., LSP or MS-PW), but also on arbitrary parts of
   transport paths, defined as tandem connections, between any two
   arbitrary points along a transport path.

   Sub-Path Maintenance Elements (SPMEs), as defined in [8], are
   hierarchical LSPs instantiated to provide monitoring of a portion of
   a set of transport paths (LSPs or MS-PWs) that follow the same path
   between the ingress and the egress of the SPME.  The operational
   aspects of instantiating SPMEs are out of scope of this memo.

   SPMEs can also be employed to meet the requirement to provide tandem
   connection monitoring (TCM), as defined by ITU-T Recommendation G.805
   [20].

   TCM for a given path segment of a transport path is implemented by
   creating an SPME that has a 1:1 association with the path segment of
   the transport path that is to be monitored.

   In the TCM case, this means that the SPME used to provide TCM can
   carry one and only one transport path, thus allowing direct
   correlation between all fault management and performance monitoring
   information gathered for the SPME and the monitored path segment of
   the end-to-end transport path.

   There are a number of implications to this approach:

   1) The SPME would use the uniform model [23] of Traffic Class (TC)
      code point copying between sub-layers for Diffserv such that the
      E2E markings and PHB treatment for the transport path were
      preserved by the SPMEs.

   2) The SPME normally would use the short-pipe model for TTL handling
      [6] (no TTL copying between sub-layers) such that the TTL distance
      to the MIPs for the E2E entity would not be impacted by the
      presence of the SPME, but it should be possible for an operator to
      specify use of the uniform model.

   Note that points 1 and 2 above assume that the TTL copying mode and
   TC copying modes are independently configurable for an LSP.

   The TTL distance to the MIPs plays a critical role for delivering
   packets to these MIPs as described in Section 3.4.





Busi & Allan                  Informational                    [Page 13]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   There are specific issues with the use of the uniform model of TTL
   copying for an SPME:

   1. A MIP in the SPME sub-layer is not part of the transport-path MEG;
      hence, only an out-of-band return path for OAM originating in the
      transport-path MEG that addressed an SPME MIP might be available.

   2. The instantiation of a lower-level MEG or protection-switching
      actions within a lower-level MEG may change the TTL distances to
      MIPs in the higher-level MEGs.

   The end points of the SPME are MEPs and limit the scope of an OAM
   flow within the MEG that the MEPs belong to (i.e., within the domain
   of the SPME that is being monitored and managed).

   When considering SPMEs, it is important to consider that the
   following properties apply to all MPLS-TP MEGs (regardless of whether
   they instrument LSPs, SPMEs, or MS-PWs):

   o  They can be nested but not overlapped, e.g., a MEG may cover a
      path segment of another MEG and may also include the forwarding
      engine(s) of the node(s) at the edge(s) of the path segment.
      However, when MEGs are nested, the MEPs and MIPs in the SPME are
      no longer part of the encompassing MEG.

   o  It is possible that MEPs of MEGs that are nested reside on a
      single node but again are implemented in such a way that they do
      not overlap.

   o  Each OAM flow is associated with a single MEG.

   o  When an SPME is instantiated after the transport path has been
      instantiated, the TTL distance to the MIPs may change for the
      short-pipe model of TTL copying, and may change for the uniform
      model if the SPME is not co-routed with the original path.

3.3.  MEG End Points (MEPs)

   MEG End Points (MEPs) are the source and sink points of a MEG.  In
   the context of an MPLS-TP LSP, only LERs can implement MEPs, while in
   the context of an SPME, any LSR of the MPLS-TP LSP can be an LER of
   SPMEs that contributes to the overall monitoring infrastructure of
   the transport path.  Regarding PWs, only T-PEs can implement MEPs;
   while for SPMEs supporting one or more PWs, both T-PEs and S-PEs can
   implement SPME MEPs.  Any MPLS-TP LSR can implement a MEP for an
   MPLS-TP Section.





Busi & Allan                  Informational                    [Page 14]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   MEPs are responsible for originating almost all of the proactive and
   on-demand monitoring OAM functionality for the MEG.  There is a
   separate class of notifications (such as Lock Report (LKR) and Alarm
   Indication Signal (AIS)) that are originated by intermediate nodes
   and triggered by server-layer events.  A MEP is capable of
   originating and terminating OAM packets for fault management and
   performance monitoring.  These OAM packets are carried within the
   Generic Associated Channel (G-ACh) with the proper encapsulation and
   an appropriate channel type as defined in RFC 5586 [7].  A MEP
   terminates all the OAM packets it receives from the MEG it belongs to
   and silently discards those that do not.  (Note that in the
   particular case of Connectivity Verification (CV) processing, a CV
   packet from an incorrect MEG will result in a mis-connectivity defect
   and there are further actions taken.)  The MEG the OAM packet belongs
   to is associated with the MPLS or PW label, whether the label is used
   to infer the MEG or the content of the OAM packet is an
   implementation choice.  In the case of an MPLS-TP Section, the MEG is
   inferred from the port on which an OAM packet was received with the
   GAL at the top of the label stack.

   OAM packets may require the use of an available "out-of-band" return
   path (as defined in [8]).  In such cases, sufficient information is
   required in the originating transaction such that the OAM reply
   packet can be constructed and properly forwarded to the originating
   MEP (e.g., IP address).

   Each OAM solution document will further detail the applicability of
   the tools it defines as a proactive or on-demand mechanism as well as
   its usage when:

   o  The "in-band" return path exists and it is used.

   o  An "out-of-band" return path exists and it is used.

   o  Any return path does not exist or is not used.

   Once a MEG is configured, the operator can configure which proactive
   OAM functions to use on the MEG, but the MEPs are always enabled.

   MEPs terminate all OAM packets received from the associated MEG.  As
   the MEP corresponds to the termination of the forwarding path for a
   MEG at the given (sub-)layer, OAM packets never leak outside of a MEG
   in a properly configured fault-free implementation.








Busi & Allan                  Informational                    [Page 15]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   A MEP of an MPLS-TP transport path coincides with transport path
   termination and monitors it for failures or performance degradation
   (e.g., based on packet counts) in an end-to-end scope.  Note that
   both the source MEP and sink MEP coincide with transport paths'
   source and sink terminations.

   The MEPs of an SPME are not necessarily coincident with the
   termination of the MPLS-TP transport path.  They are used to monitor
   a path segment of the transport path for failures or performance
   degradation (e.g., based on packet counts) only within the boundary
   of the MEG for the SPME.

   An MPLS-TP sink MEP passes a fault indication to its client
   (sub-)layer network as a consequent action of fault detection.  When
   the client layer is not MPLS-TP, the consequent actions in the client
   layer (e.g., ignore or generate client-layer-specific OAM
   notifications) are outside the scope of this document.

   A node hosting a MEP can either support per-node MEP or per-interface
   MEP(s).  A per-node MEP resides in an unspecified location within the
   node, while a per-interface MEP resides on a specific side of the
   forwarding engine.  In particular, a per-interface MEP is called an
   "Up MEP" or a "Down MEP" depending on its location relative to the
   forwarding engine.  An "Up MEP" transmits OAM packets towards, and
   receives them from, the direction of the forwarding engine, while a
   "Down MEP" receives OAM packets from, and transmits them towards, the
   direction of a server layer.
























Busi & Allan                  Informational                    [Page 16]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


         Source node Up MEP             Destination node Up MEP
       ------------------------         ------------------------
      |                        |       |                        |
      |-----              -----|       |-----              -----|
      | MEP |            |     |       |     |            | MEP |
      |     |    ----    |     |       |     |    ----    |     |
      | In  |->-| FW |->-| Out |->- ->-| In  |->-| FW |->-| Out |
      | i/f |    ----    | i/f |       | i/f |    ----    | i/f |
      |-----              -----|       |-----              -----|
      |                        |       |                        |
       ------------------------         ------------------------
                  (1)                               (2)

         Source node Down MEP           Destination node Down MEP
       ------------------------         ------------------------
      |                        |       |                        |
      |-----              -----|       |-----              -----|
      |     |            | MEP |       | MEP |            |     |
      |     |    ----    |     |       |     |    ----    |     |
      | In  |->-| FW |->-| Out |->- ->-| In  |->-| FW |->-| Out |
      | i/f |    ----    | i/f |       | i/f |    ----    | i/f |
      |-----              -----|       |-----              -----|
      |                        |       |                        |
       ------------------------         ------------------------
                  (3)                               (4)

                Figure 3: Examples of Per-Interface MEPs

   Figure 3 describes four examples of per-interface Up MEPs: an Up
   Source MEP in a source node (case 1), an Up Sink MEP in a destination
   node (case 2), a Down Source MEP in a source node (case 3), and a
   Down Sink MEP in a destination node (case 4).

   The usage of per-interface Up MEPs extends the coverage of the ME for
   both fault and performance monitoring closer to the edge of the
   domain and determines that the location of a failure or performance
   degradation is within a node or on a link between two adjacent nodes.

   Each OAM solution document will further detail the implications of
   the tools it defines when used with per-interface or per-node MEPs,
   if necessary.

   It may occur that multiple MEPs for the same MEG are on the same
   node, and are all Up MEPs, each on one side of the forwarding engine,
   such that the MEG is entirely internal to the node.






Busi & Allan                  Informational                    [Page 17]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   It should be noted that an ME may span nodes that implement per-node
   MEPs and per-interface MEPs.  This guarantees backward compatibility
   with most of the existing LSRs that can implement only a per-node
   MEP.  In fact, in many current implementations, label operations are
   largely performed on the ingress interface; hence, the exposure of
   the GAL as top label will occur at the ingress interface.

   Note that a MEP can only exist at the beginning and end of a
   (sub-)layer in MPLS-TP.  If there is a need to monitor some portion
   of that LSP or PW, a new sub-layer (in the form of an SPME) must be
   created that permits MEPs and associated MEGs to be created.

   In the case where an intermediate node sends an OAM packet to a MEP,
   it uses the top label of the stack at that point.

3.4.  MEG Intermediate Points (MIPs)

   A MEG Intermediate Point (MIP) is a function located at a point
   between the MEPs of a MEG for a PW, LSP, or SPME.

   A MIP is capable of reacting to some OAM packets and forwarding all
   the other OAM packets while ensuring fate-sharing with user data
   packets.  However, a MIP does not initiate unsolicited OAM packets,
   but may be addressed by OAM packets initiated by one of the MEPs of
   the MEG.  A MIP can generate OAM packets only in response to OAM
   packets that it receives from the MEG it belongs to.  The OAM packets
   generated by the MIP are sent to the originating MEP.

   An intermediate node within a MEG can either:

   o  support per-node MIPs (i.e., a single MIP per node in an
      unspecified location within the node); or

   o  support per-interface MIPs (i.e., two or more MIPs per node on
      both sides of the forwarding engine).

   Support of per-interface or per-node MIPs is an implementation
   choice.  It is also possible that a node could support per-interface
   MIPs on some MEGs and per-node MIPs on other MEGs for which it is a
   transit node.











Busi & Allan                  Informational                    [Page 18]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


                            Intermediate node
                        ------------------------
                       |                        |
                       |-----              -----|
                       | MIP |            | MIP |
                       |     |    ----    |     |
                    ->-| In  |->-| FW |->-| Out |->-
                       | i/f |    ----    | i/f |
                       |-----              -----|
                       |                        |
                        ------------------------

                Figure 4: Example of Per-Interface MIPs

   Figure 4 describes an example of two per-interface MIPs at an
   intermediate node of a point-to-point MEG.

   Using per-interface MIPs allows the network operator to determine
   that the location of a failure or performance degradation is within a
   node or on a link between two adjacent nodes.

   When sending an OAM packet to a MIP, the source MEP should set the
   TTL field to indicate the number of hops necessary to reach the node
   where the MIP resides.

   The source MEP should also include target MIP information in the OAM
   packets sent to a MIP to allow proper identification of the MIP
   within the node.  The MEG the OAM packet belongs to is associated
   with the MPLS label, whether the label is used to infer the MEG or
   the content of the OAM packet is an implementation choice.  In the
   latter case, the MPLS label is checked to be the expected one.

   The use of TTL expiry to deliver OAM packets to a specific MIP is not
   a fully reliable delivery mechanism because the TTL distance of a MIP
   from a MEP can change.  Any MPLS-TP node silently discards any OAM
   packet that is received with an expired TTL and that is not addressed
   to any of its MIPs or MEPs.  An MPLS-TP node that does not support
   OAM is also expected to silently discard any received OAM packet.

   Packets directed to a MIP may not necessarily carry specific MIP
   identification information beyond that of TTL distance.  In this
   case, a MIP would promiscuously respond to all MEP queries on its
   MEG.  This capability could be used for discovery functions (e.g.,
   route tracing as defined in Section 6.4) or when it is desirable to
   leave to the originating MEP the job of correlating TTL and MIP
   identifiers and noting changes or irregularities (via comparison with
   information previously extracted from the network).




Busi & Allan                  Informational                    [Page 19]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   MIPs are associated to the MEG they belong to, and their identity is
   unique within the MEG.  However, their identity is not necessarily
   unique to the MEG, e.g., all nodal MIPs in a node can have a common
   identity.

   A node hosting a MEP can also support per-interface Up MEPs and per-
   interface MIPs on either side of the forwarding engine.

   Once a MEG is configured, the operator can enable/disable the MIPs on
   the nodes within the MEG.  All the intermediate nodes and possibly
   the end nodes host MIP(s).  Local policy allows them to be enabled
   per function and per MEG.  The local policy is controlled by the
   management system, which may delegate it to the control plane.  A
   disabled MIP silently discards any received OAM packets.

3.5.  Server MEPs

   A server MEP is a MEP of a MEG that is either:

   o  defined in a layer network that is "below", which is to say
      encapsulates and transports the MPLS-TP layer network being
      referenced; or

   o  defined in a sub-layer of the MPLS-TP layer network that is
      "below", which is to say encapsulates and transports the sub-layer
      being referenced.

   A server MEP can coincide with a MIP or a MEP in the client (MPLS-TP)
   (sub-)layer network.

   A server MEP also provides server-layer OAM indications to the
   client/server adaptation function between the client (MPLS-TP)
   (sub-)layer network and the server (sub-)layer network.  The
   adaptation function maintains state on the mapping of MPLS-TP
   transport paths that are set up over that server (sub-)layer's
   transport path.

   For example, a server MEP can be:

   o  a non-MPLS MEP at a termination point of a physical link (e.g.,
      802.3, an SDH Virtual Circuit, or OTN Optical Data Unit (ODU)),
      for the MPLS-TP Section layer network, defined in Section 4.1;

   o  an MPLS-TP Section MEP for MPLS-TP LSPs, defined in Section 4.2;

   o  an MPLS-TP LSP MEP for MPLS-TP PWs, defined in Section 4.3;





Busi & Allan                  Informational                    [Page 20]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   o  an MPLS-TP SPME MEP used for LSP path segment monitoring, as
      defined in Section 4.4, for MPLS-TP LSPs or higher-level SPMEs
      providing LSP path segment monitoring; or

   o  an MPLS-TP SPME MEP used for PW path segment monitoring, as
      defined in Section 4.5, for MPLS-TP PWs or higher-level SPMEs
      providing PW path segment monitoring.

   The server MEP can run appropriate OAM functions for fault detection
   within the server (sub-)layer network and provides a fault indication
   to its client MPLS-TP layer network via the client/server adaptation
   function.  When the server layer is not MPLS-TP, server MEP OAM
   functions are simply assumed to exist but are outside the scope of
   this document.

3.6.  Configuration Considerations

   When a control plane is not present, the management plane configures
   these functional components.  Otherwise, they can be configured by
   either the management plane or the control plane.

   Local policy allows disabling the usage of any available "out-of-
   band" return path, as defined in [8], irrespective of what is
   requested by the node originating the OAM packet.

   SPMEs are usually instantiated when the transport path is created by
   either the management plane or the control plane (if present).
   Sometimes an SPME can be instantiated after the transport path is
   initially created.

3.7.  P2MP Considerations

   All the traffic sent over a P2MP transport path, including OAM
   packets generated by a MEP, is sent (multicast) from the root to all
   the leaves.  As a consequence:

   o  To send an OAM packet to all leaves, the source MEP can send a
      single OAM packet that will be delivered by the forwarding plane
      to all the leaves and processed by all the leaves.  Hence, a
      single OAM packet can simultaneously instrument all the MEs in a
      P2MP MEG.

   o  To send an OAM packet to a single leaf, the source MEP sends a
      single OAM packet that will be delivered by the forwarding plane
      to all the leaves but contains sufficient information to identify
      a target leaf, and therefore is processed only by the target leaf
      and can be silently discarded by the other leaves.




Busi & Allan                  Informational                    [Page 21]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   o  To send an OAM packet to a single MIP, the source MEP sends a
      single OAM packet with the TTL field indicating the number of hops
      necessary to reach the node where the MIP resides.  This packet
      will be delivered by the forwarding plane to all intermediate
      nodes at the same TTL distance of the target MIP and to any leaf
      that is located at a shorter distance.  The OAM packet must
      contain sufficient information to identify the target MIP and
      therefore is processed only by the target MIP and can be silently
      discarded by the others.

   o  In order to send an OAM packet to M leaves (i.e., a subset of all
      the leaves), the source MEP sends M different OAM packets targeted
      to each individual leaf in the group of M leaves.  Aggregating or
      subsetting mechanisms are outside the scope of this document.

   A bud node with a Down MEP or a per-node MEP will both terminate and
   relay OAM packets.  Similar to how fault coverage is maximized by the
   explicit utilization of Up MEPs, the same is true for MEPs on a bud
   node.

   P2MP paths are unidirectional; therefore, any return path to an
   originating MEP for on-demand transactions will be out-of-band.  A
   mechanism to target "on-demand" transactions to a single MEP or MIP
   is required as it relieves the originating MEP of an arbitrarily
   large processing load and of the requirement to filter and discard
   undesired responses.  This is because normally TTL exhaustion will
   address all MIPs at a given distance from the source, and failure to
   exhaust TTL will address all MEPs.

3.8.  Further Considerations of Enhanced Segment Monitoring

   Segment monitoring, like any in-service monitoring, in a transport
   network should meet the following network objectives:

   1. The monitoring and maintenance of existing transport paths has to
      be conducted in service without traffic disruption.

   2. Segment monitoring must not modify the forwarding of the segment
      portion of the transport path.

   SPMEs defined in Section 3.2 meet the above two objectives, when they
   are pre-configured or pre-instantiated as exemplified in Section 3.6.
   However, sometimes pre-design and pre-configuration of all the
   considered patterns of SPME are not preferable in real operation due
   to the burden of design works, a number of header consumptions,
   bandwidth consumption, and so on.





Busi & Allan                  Informational                    [Page 22]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   When SPMEs are configured or instantiated after the transport path
   has been created, network objective (1) can be met: application and
   removal of SPME to a faultless monitored transport entity can be
   performed in such a way as not to introduce any loss of traffic,
   e.g., by using a non-disruptive "make before break" technique.

   However, network objective (2) cannot be met due to new assignment of
   MPLS labels.  As a consequence, generally speaking, the results of
   SPME monitoring are not necessarily correlated with the behavior of
   traffic in the monitored entity when it does not use SPME.  For
   example, application of SPME to a problematic/faulty monitoring
   entity might "fix" the problem encountered by the latter -- for as
   long as SPME is applied.  And vice versa, application of SPME to a
   faultless monitored entity may result in making it faulty -- again,
   as long as SPME is applied.

   Support for a more sophisticated segment-monitoring mechanism
   (temporal and hitless segment monitoring) to efficiently meet the two
   network objectives may be necessary.

   One possible option to instantiate non-intrusive segment monitoring
   without the use of SPMEs would require the MIPs selected as
   monitoring end points to implement enhanced functionality and state
   for the monitored transport path.

   For example, the MIPs need to be configured with the TTL distance to
   the peer or with the address of the peer, when out-of-band return
   paths are used.

   A further issue that would need to be considered is events that
   result in changing the TTL distance to the peer monitoring entity,
   such as protection events that may temporarily invalidate OAM
   information gleaned from the use of this technique.

   Further considerations on this technique are outside the scope of
   this document.

4.  Reference Model

   The reference model for the MPLS-TP OAM framework builds upon the
   concept of a MEG, and its associated MEPs and MIPs, to support the
   functional requirements specified in RFC 5860 [11].

   The following MPLS-TP MEGs are specified in this document:

   o  A Section Maintenance Entity Group (SMEG), allowing monitoring and
      management of MPLS-TP Sections (between MPLS LSRs).




Busi & Allan                  Informational                    [Page 23]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   o  An LSP Maintenance Entity Group (LMEG), allowing monitoring and
      management of an end-to-end LSP (between LERs).

   o  A PW Maintenance Entity Group (PMEG), allowing monitoring and
      management of an end-to-end Single-Segment Pseudowire (SS-PW) or
      MS-PW (between T-PEs).

   o  An LSP SPME ME Group (LSMEG), allowing monitoring and management
      of an SPME (between a given pair of LERs and/or LSRs along an
      LSP).

   o  A PW SPME ME Group (PSMEG), allowing monitoring and management of
      an SPME (between a given pair of T-PEs and/or S-PEs along an
      (MS-)PW).

   The MEGs specified in this MPLS-TP OAM framework are compliant with
   the architecture framework for MPLS-TP [8] that includes both MS-PWs
   [4] and LSPs [1].

   Hierarchical LSPs are also supported in the form of SPMEs.  In this
   case, each LSP in the hierarchy is a different sub-layer network that
   can be monitored, independently from higher- and lower-level LSPs in
   the hierarchy, on an end-to-end basis (from LER to LER) by an SPME.
   It is possible to monitor a portion of a hierarchical LSP by
   instantiating a hierarchical SPME between any LERs/LSRs along the
   hierarchical LSP.

























Busi & Allan                  Informational                    [Page 24]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


    Native |<------------------ MS-PW1Z ---------------->|  Native
    Layer  |                                             |   Layer
   Service |    |<LSP13>|    |<-LSP3X->|    |<LSPXZ>|    |  Service
    (AC1)  V    V       V    V         V    V       V    V   (AC2)
           +----+ +---+ +----+         +----+ +---+ +----+
   +----+  |T-PE| |LSR| |S-PE|         |S-PE| |LSR| |T-PE|   +----+
   |    |  | 1  | | 2 | | 3  |         | X  | | Y | | Z  |   |    |
   |    |  |    |=======|    |=========|    |=======|    |   |    |
   | CE1|--|.......PW13......|...PW3X..|......PWXZ.......|---|CE2 |
   |    |  |    |=======|    |=========|    |=======|    |   |    |
   |    |  |    | |   | |    |         |    | |   | |    |   |    |
   +----+  |    | |   | |    |         |    | |   | |    |   +----+
           +----+ +---+ +----+         +----+ +---+ +----+
           .                 .         .                 .
           |                 |         |                 |
           |<--- Domain 1 -->|         |<--- Domain Z -->|
           ^----------------- PW1Z  PMEG ----------------^
           ^--- PW13 PSMEG --^         ^--- PWXZ PSMEG --^
                ^-------^                   ^-------^
                LSP13 LMEG                  LSPXZ LMEG
                ^--^ ^--^    ^---------^    ^--^ ^--^
               Sec12 Sec23      Sec3X      SecXY SecYZ
                SMEG  SMEG       SMEG       SMEG  SMEG

   ^---^ ME
   ^     MEP
   ====  LSP
   .... PW

   T-PE 1: Terminating Provider Edge 1
   LSR 2:  Label Switching Router 2
   S-PE 3: Switching Provider Edge 3
   S-PE X: Switching Provider Edge X
   LSR Y:  Label Switching Router Y
   T-PE Z: Terminating Provider Edge Z

        Figure 5: Reference Model for the MPLS-TP OAM Framework

   Figure 5 depicts a high-level reference model for the MPLS-TP OAM
   framework.  The figure depicts portions of two MPLS-TP-enabled
   network domains, Domain 1 and Domain Z.  In Domain 1, T-PE 1 is
   adjacent to LSR 2 via the MPLS-TP Section Sec12, and LSR 2 is
   adjacent to S-PE 3 via the MPLS-TP Section Sec23.  Similarly, in
   Domain Z, S-PE X is adjacent to LSR Y via the MPLS-TP Section SecXY,
   and LSR Y is adjacent to T-PE Z via the MPLS-TP Section SecYZ.  In
   addition, S-PE 3 is adjacent to S-PE X via the MPLS-TP Section Sec3X.





Busi & Allan                  Informational                    [Page 25]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Figure 5 also shows a bidirectional MS-PW (MS-PW1Z) between AC1 on
   T-PE1 and AC2 on T-PE Z.  The MS-PW consists of three bidirectional
   PW path segments: 1) PW13 path segment between T-PE 1 and S-PE 3 via
   the bidirectional LSP13 LSP, 2) PW3X path segment between S-PE 3 and
   S-PE X via the bidirectional LSP3X LSP, and 3) PWXZ path segment
   between S-PE X and T-PE Z via the bidirectional LSPXZ LSP.

   The MPLS-TP OAM procedures that apply to a MEG are expected to
   operate independently from procedures on other MEGs.  Yet, this does
   not preclude that multiple MEGs may be affected simultaneously by the
   same network condition -- for example, a fiber cut event.

   Note that there are no constraints imposed by this OAM framework on
   the number or type (P2P, P2MP, LSP, or PW), of MEGs that may be
   instantiated on a particular node.  In particular, when looking at
   Figure 5, it should be possible to configure one or more MEPs on the
   same node if that node is the end point of one or more MEGs.

   Figure 5 does not describe a PW3X PSMEG because typically SPMEs are
   used to monitor an OAM domain (like PW13 and PWXZ PSMEGs) rather than
   the segment between two OAM domains.  However, the OAM framework does
   not pose any constraints on the way SPMEs are instantiated as long as
   they are not overlapping.

   The subsections below define the MEGs specified in this MPLS-TP OAM
   architecture framework document.  Unless otherwise stated, all
   references to domains, LSRs, MPLS-TP Sections, LSPs, pseudowires, and
   MEGs in this section are made in relation to those shown in Figure 5.

4.1.  MPLS-TP Section Monitoring (SMEG)

   An MPLS-TP Section MEG (SMEG) is an MPLS-TP maintenance entity
   intended to monitor an MPLS-TP Section.  An SMEG may be configured on
   any MPLS-TP section.  SMEG OAM packets must fate-share with the user
   data packets sent over the monitored MPLS-TP Section.

   An SMEG is intended to be deployed for applications where it is
   preferable to monitor the link between topologically adjacent (next
   hop in this layer network) MPLS-TP LSRs rather than monitoring the
   individual LSP or PW path segments traversing the MPLS-TP Section and
   where the server-layer technology does not provide adequate OAM
   capabilities.









Busi & Allan                  Informational                    [Page 26]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Figure 5 shows five Section MEGs configured in the network between
   AC1 and AC2:

   1. Sec12 MEG associated with the MPLS-TP Section between T-PE 1 and
      LSR 2,

   2. Sec23 MEG associated with the MPLS-TP Section between LSR 2 and
      S-PE 3,

   3. Sec3X MEG associated with the MPLS-TP Section between S-PE 3 and
      S-PE X,

   4. SecXY MEG associated with the MPLS-TP Section between S-PE X and
      LSR Y, and

   5. SecYZ MEG associated with the MPLS-TP Section between LSR Y and
      T-PE Z

4.2.  MPLS-TP LSP End-to-End Monitoring Group (LMEG)

   An MPLS-TP LSP MEG (LMEG) is an MPLS-TP maintenance entity group
   intended to monitor an end-to-end LSP between its LERs.  An LMEG may
   be configured on any MPLS LSP.  LMEG OAM packets must fate-share with
   user data packets sent over the monitored MPLS-TP LSP.

   An LMEG is intended to be deployed in scenarios where it is desirable
   to monitor an entire LSP between its LERs, rather than, say,
   monitoring individual PWs.

   Figure 5 depicts two LMEGs configured in the network between AC1 and
   AC2: 1) the LSP13 LMEG between T-PE 1 and S-PE 3, and 2) the LSPXZ
   LMEG between S-PE X and T-PE Z.  Note that the presence of a LSP3X
   LMEG in such a configuration is optional, and hence, not precluded by
   this framework.  For instance, the network operator may prefer to
   monitor the MPLS-TP Section between the two LSRs rather than the
   individual LSPs.

4.3.  MPLS-TP PW Monitoring (PMEG)

   An MPLS-TP PW MEG (PMEG) is an MPLS-TP maintenance entity intended to
   monitor a SS-PW or MS-PW between its T-PEs.  A PMEG can be configured
   on any SS-PW or MS-PW.  PMEG OAM packets must fate-share with the
   user data packets sent over the monitored PW.

   A PMEG is intended to be deployed in scenarios where it is desirable
   to monitor an entire PW between a pair of MPLS-TP-enabled T-PEs
   rather than monitoring the LSP that aggregates multiple PWs between
   PEs.



Busi & Allan                  Informational                    [Page 27]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Figure 5 depicts an MS-PW (MS-PW1Z) consisting of three path segments
   (PW13, PW3X, and PWXZ) and its associated end-to-end PMEG (PW1Z
   PMEG).

4.4.  MPLS-TP LSP SPME Monitoring (LSMEG)

   An MPLS-TP LSP SPME MEG (LSMEG) is an MPLS-TP SPME with an associated
   maintenance entity group intended to monitor an arbitrary part of an
   LSP between the MEPs instantiated for the SPME, independent from the
   end-to-end monitoring (LMEG).  An LSMEG can monitor an LSP path
   segment, and it may also include the forwarding engine(s) of the
   node(s) at the edge(s) of the path segment.

   When an SPME is established between non-adjacent LSRs, the edges of
   the SPME become adjacent at the LSP sub-layer network and any LSR
   that was previously in between becomes an LSR for the SPME.

   Multiple hierarchical LSMEGs can be configured on any LSP.  LSMEG OAM
   packets must fate-share with the user data packets sent over the
   monitored LSP path segment.

   A LSME can be defined between the following entities:

   o  The LER and LSR of a given LSP.

   o  Any two LSRs of a given LSP.

   An LSMEG is intended to be deployed in scenarios where it is
   preferable to monitor the behavior of a part of an LSP or set of LSPs
   rather than the entire LSP itself, for example, when there is a need
   to monitor a part of an LSP that extends beyond the administrative
   boundaries of an MPLS-TP-enabled administrative domain.



















Busi & Allan                  Informational                    [Page 28]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


            |<-------------------- PW1Z ------------------->|
            |                                               |
            |    |<-------------LSP1Z LSP------------->|    |
            |    |<-LSP13->|    |<LSP3X>|    |<-LSPXZ->|    |
            V    V         V    V       V    V         V    V
            +----+  +---+  +----+       +----+  +---+  +----+
   +----+   | PE |  |LSR|  |DBN |       |DBN |  |LSR|  | PE |   +----+
   |    |   | 1  |  | 2 |  | 3  |       | X  |  | Y |  | Z  |   |    |
   |    |AC1|    |=====================================|    |AC2|    |
   | CE1|---|.....................PW1Z......................|---|CE2 |
   |    |   |    |=====================================|    |   |    |
   |    |   |    |  |   |  |    |       |    |  |   |  |    |   |    |
   +----+   |    |  |   |  |    |       |    |  |   |  |    |   +----+
            +----+  +---+  +----+       +----+  +---+  +----+
            .                   .       .                   .
            |                   |       |                   |
            |<---- Domain 1 --->|       |<---- Domain Z --->|

                 ^---------^                 ^---------^
                 LSP13 LSMEG                 LSPXZ LSMEG
                 ^-------------------------------------^
                                LSP1Z LMEG

   DBN: Domain Border Node

   PE 1:  Provider Edge 1
   LSR 2: Label Switching Router 2
   DBN 3: Domain Border Node 3
   DBN X: Domain Border Node X
   LSR Y: Label Switching Router Y
   PE Z:  Provider Edge Z

                 Figure 6: MPLS-TP LSP SPME MEG (LSMEG)

   Figure 6 depicts a variation of the reference model in Figure 5 where
   there is an end-to-end LSP (LSP1Z) between PE 1 and PE Z.  LSP1Z
   consists of, at least, three LSP Concatenated Segments: LSP13, LSP3X,
   and LSPXZ.  In this scenario, there are two separate LSMEGs
   configured to monitor the LSP1Z: 1) a LSMEG monitoring the LSP13
   Concatenated Segment on Domain 1 (LSP13 LSMEG), and 2) a LSMEG
   monitoring the LSPXZ Concatenated Segment on Domain Z (LSPXZ LSMEG).

   It is worth noticing that LSMEGs can coexist with the LMEG monitoring
   the end-to-end LSP and that LSMEG MEPs and LMEG MEPs can be
   coincident in the same node (e.g., PE 1 node supports both the LSP1Z
   LMEG MEP and the LSP13 LSMEG MEP).





Busi & Allan                  Informational                    [Page 29]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


4.5.  MPLS-TP MS-PW SPME Monitoring (PSMEG)

   An MPLS-TP MS-PW SPME Monitoring MEG (PSMEG) is an MPLS-TP SPME with
   an associated maintenance entity group intended to monitor an
   arbitrary part of an MS-PW between the MEPs instantiated for the
   SPME, independently of the end-to-end monitoring (PMEG).  A PSMEG can
   monitor a PW path segment, and it may also include the forwarding
   engine(s) of the node(s) at the edge(s) of the path segment.  A PSMEG
   is no different than an SPME; it is simply named as such to discuss
   SPMEs specifically in a PW context.

   When SPME is established between non-adjacent S-PEs, the edges of the
   SPME become adjacent at the MS-PW sub-layer network, and any S-PE
   that was previously in between becomes an LSR for the SPME.

   S-PE placement is typically dictated by considerations other than
   OAM.  S-PEs will frequently reside at operational boundaries such as
   the transition from distributed control plane (CP) to centralized
   Network Management System (NMS) control or at a routing area
   boundary.  As such, the architecture would appear not to have the
   flexibility that arbitrary placement of SPME segments would imply.
   Support for an arbitrary placement of PSMEG would require the
   definition of additional PW sub-layering.  Multiple hierarchical
   PSMEGs can be configured on any MS-PW.  PSMEG OAM packets fate-share
   with the user data packets sent over the monitored PW path Segment.

   A PSMEG does not add hierarchical components to the MPLS
   architecture; it defines the role of existing components for the
   purposes of discussing OAM functionality.

   A PSME can be defined between the following entities:

   o  The T-PE and any S-PE of a given MS-PW.

   o  Any two S-PEs of a given MS-PW.

   Note that, in line with the SPME description in Section 3.2, when a
   PW SPME is instantiated after the MS-PW has been instantiated, the
   TTL distance of the MIPs may change and MIPs in the PW SPME are no
   longer part of the encompassing MEG.  This means that the S-PE nodes
   hosting these MIPs are no longer S-PEs but P nodes at the SPME LSP
   level.  The consequences are that the S-PEs hosting the PSMEG MEPs
   become adjacent S-PEs.  This is no different than the operation of
   SPMEs in general.

   A PSMEG is intended to be deployed in scenarios where it is
   preferable to monitor the behavior of a part of an MS-PW rather than
   the entire end-to-end PW itself, for example, when monitoring an MS-



Busi & Allan                  Informational                    [Page 30]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   PW path segment within a given network domain of an inter-domain MS-
   PW.

   Figure 5 depicts an MS-PW (MS-PW1Z) consisting of three path
   segments: PW13, PW3X, and PWXZ with two separate PSMEGs: 1) a PSMEG
   monitoring the PW13 MS-PW path segment on Domain 1 (PW13 PSMEG) and
   2) a PSMEG monitoring the PWXZ MS-PW path segment on Domain Z with
   (PWXZ PSMEG).

   It is worth noticing that PSMEGs can coexist with the PMEG monitoring
   the end-to-end MS-PW and that PSMEG MEPs and PMEG MEPs can be
   coincident in the same node (e.g., T-PE 1 node supports both the PW1Z
   PMEG MEP and the PW13 PSMEG MEP).

4.6.  Fate-Sharing Considerations for Multilink

   Multilink techniques are in use today and are expected to continue to
   be used in future deployments.  These techniques include Ethernet
   link aggregation [22] and the use of link bundling for MPLS [18]
   where the option to spread traffic over component links is supported
   and enabled.  While the use of link bundling can be controlled at the
   MPLS-TP layer, use of link aggregation (or any server-layer-specific
   multilink) is not necessarily under the control of the MPLS-TP layer.
   Other techniques may emerge in the future.  These techniques
   frequently share the characteristic that an LSP may be spread over a
   set of component links and therefore be reordered, but no flow within
   the LSP is reordered (except when very infrequent and minimally
   disruptive load rebalancing occurs).

   The use of multilink techniques may be prohibited or permitted in any
   particular deployment.  If multilink techniques are used, the
   deployment can be considered to be only partially MPLS-TP compliant;
   however, this is unlikely to prevent their use.

   The implications for OAM are that not all components of a multilink
   will be exercised, independent server-layer OAM being required to
   exercise the aggregated link components.  This has further
   implications for MIP and MEP placement, as per-interface MIPs or Down
   MEPs on a multilink interface are akin to a layer violation, as they
   instrument at the granularity of the server layer.  The implications
   for reduced OAM loss measurement functionality are documented in
   Sections 5.5.3 and 6.2.3.









Busi & Allan                  Informational                    [Page 31]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


5.  OAM Functions for Proactive Monitoring

   In this document, proactive monitoring refers to OAM operations that
   are either configured to be carried out periodically and continuously
   or preconfigured to act on certain events such as alarm signals.

   Proactive monitoring is usually performed "in-service".  Such
   transactions are universally MEP to MEP in operation, while
   notifications can be node to node (e.g., some MS-PW transactions) or
   node to MEPs (e.g., AIS).  The control and measurement considerations
   are:

   1. Proactive monitoring for a MEG is typically configured at the
      creation time of the transport path.

   2. The operational characteristics of in-band measurement
      transactions (e.g., CV, Loss Measurement (LM), etc.) are
      configured at the MEPs.

   3. Server-layer events are reported by OAM packets originating at
      intermediate nodes.

   4. The measurements resulting from proactive monitoring are typically
      reported outside of the MEG (e.g., to a management system) as
      notification events such as faults or indications of performance
      degradations (such as signal degrade conditions).

   5. The measurements resulting from proactive monitoring may be
      periodically harvested by an NMS.

   Proactive fault reporting is assumed to be subject to unreliable
   delivery and soft-state, and it needs to operate in cases where a
   return path is not available or faulty.  Therefore, periodic
   repetition is assumed to be used for reliability, instead of
   handshaking.

   Delay measurement also requires periodic repetition to allow
   estimation of the packet delay variation for the MEG.

   For statically provisioned transport paths, the above information is
   statically configured; for dynamically established transport paths,
   the configuration information is signaled via the control plane or
   configured via the management plane.

   The operator may enable/disable some of the consequent actions
   defined in Section 5.1.2.





Busi & Allan                  Informational                    [Page 32]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


5.1.  Continuity Check and Connectivity Verification

   Proactive Continuity Check functions, as required in Section 2.2.2 of
   RFC 5860 [11], are used to detect a loss of continuity (LOC) defect
   between two MEPs in a MEG.

   Proactive Connectivity Verification functions, as required in Section
   2.2.3 of RFC 5860 [11], are used to detect an unexpected connectivity
   defect between two MEGs (e.g., mismerging or misconnection), as well
   as unexpected connectivity within the MEG with an unexpected MEP.

   Both functions are based on the (proactive) generation, at the same
   rate, of OAM packets by the source MEP that are processed by the peer
   sink MEP(s).  As a consequence, in order to save OAM bandwidth
   consumption, CV, when used, is linked with CC into Continuity Check
   and Connectivity Verification (CC-V) OAM packets.

   In order to perform proactive Connectivity Verification, each CC-V
   OAM packet also includes a globally unique Source MEP identifier,
   whose value needs to be configured on the source MEP and on the peer
   sink MEP(s).  In some cases, to avoid the need to configure the
   globally unique Source MEP identifier, it is preferable to perform
   only proactive Continuity Check.  In this case, the CC-V OAM packet
   does not need to include any globally unique Source MEP identifier.
   Therefore, a MEG can be monitored only for CC or for both CC and CV.
   CC-V OAM packets used for CC-only monitoring are called CC OAM
   packets, while CC-V OAM packets used for both CC and CV are called CV
   OAM packets.

   As a consequence, it is not possible to detect misconnections between
   two MEGs monitored only for continuity as neither the OAM packet type
   nor the OAM packet content provides sufficient information to
   disambiguate an invalid source.  To expand:

   o  For a CC OAM packet leaking into a CC monitored MEG -
      undetectable.

   o  For a CV OAM packet leaking into a CC monitored MEG - reception of
      CV OAM packets instead of a CC OAM packets (e.g., with the
      additional Source MEP identifier) allows detecting the fault.

   o  For a CC OAM packet leaking into a CV monitored MEG - reception of
      CC OAM packets instead of CV OAM packets (e.g., lack of additional
      Source MEP identifier) allows detecting the fault.

   o  For a CV OAM packet leaking into a CV monitored MEG - reception of
      CV OAM packets with different Source MEP identifier permits fault
      to be identified.



Busi & Allan                  Informational                    [Page 33]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Having a common packet format for CC-V OAM packets would simplify
   parsing in a sink MEP to properly detect all the misconfiguration
   cases described above.

   MPLS-TP OAM supports different formats of MEP identifiers to address
   different environments.  When an alternative to IP addressing is
   desired (e.g., MPLS-TP is deployed in transport network environments
   where consistent operations with other transport technologies defined
   by the ITU-T are required), the ITU Carrier Code (ICC)-based format
   for MEP identification is used: this format is under definition in
   [25].  When MPLS-TP is deployed in an environment where IP
   capabilities are available and desired for OAM, the IP-based MEP
   identification is used: this format is described in [24].

   CC-V OAM packets are transmitted at a regular, operator-configurable
   rate.  The default CC-V transmission periods are application
   dependent (see Section 5.1.3).

   Proactive CC-V OAM packets are transmitted with the "minimum loss
   probability PHB" within the transport path (LSP, PW) they are
   monitoring.  For E-LSPs, this PHB is configurable on the network
   operator's basis, while for L-LSPs this is determined as per RFC 3270
   [23].  PHBs can be translated at the network borders by the same
   function that translates them for user data traffic.  The implication
   is that CC-V fate-shares with much of the forwarding implementation,
   but not all aspects of PHB processing are exercised.  Either on-
   demand tools are used for finer-grained fault finding or an
   implementation may utilize a CC-V flow per PHB to ensure a CC-V flow
   fate-shares with each individual PHB.

   In a co-routed or associated, bidirectional point-to-point transport
   path, when a MEP is enabled to generate proactive CC-V OAM packets
   with a configured transmission rate, it also expects to receive
   proactive CC-V OAM packets from its peer MEP at the same transmission
   rate.  This is because a common SLA applies to all components of the
   transport path.  In a unidirectional transport path (either point-to-
   point or point-to-multipoint), the source MEP is enabled only to
   generate CC-V OAM packets, while each sink MEP is configured to
   expect these packets at the configured rate.

   MIPs, as well as intermediate nodes not supporting MPLS-TP OAM, are
   transparent to the proactive CC-V information and forward these
   proactive CC-V OAM packets as regular data packets.

   During path setup and tear down, situations arise where CC-V checks
   would give rise to alarms, as the path is not fully instantiated.  In
   order to avoid these spurious alarms, the following procedures are
   recommended.  At initialization, the source MEP function (generating



Busi & Allan                  Informational                    [Page 34]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   proactive CC-V packets) should be enabled prior to the corresponding
   sink MEP function (detecting continuity and connectivity defects).
   When disabling the CC-V proactive functionality, the sink MEP
   function should be disabled prior to the corresponding source MEP
   function.

   It should be noted that different encapsulations are possible for
   CC-V packets, and therefore it is possible that in case of
   misconfigurations or mis-connectivity, CC-V packets are received with
   an unexpected encapsulation.

   There are practical limitations to detecting unexpected
   encapsulation.  It is possible that there are misconfiguration or
   mis-connectivity scenarios where OAM packets can alias as payload,
   e.g., when a transport path can carry an arbitrary payload without a
   pseudowire.

   When CC-V packets are received with an unexpected encapsulation that
   can be parsed by a sink MEP, the CC-V packet is processed as if it
   were received with the correct encapsulation.  If it is not a
   manifestation of a mis-connectivity defect, a warning is raised (see
   Section 5.1.1.4).  Otherwise, the CC-V packet may be silently
   discarded as unrecognized and a LOC defect may be detected (see
   Section 5.1.1.1).

   The defect conditions are described in no specific order.

5.1.1.  Defects Identified by CC-V

   Proactive CC-V functions allow a sink MEP to detect the defect
   conditions described in the following subsections.  For all of the
   described defect cases, a sink MEP should notify the equipment fault
   management process of the detected defect.

   Sequential consecutive loss of CC-V packets is considered indicative
   of an actual break and not of congestive loss or physical-layer
   degradation.  The loss of 3 packets in a row (implying a detection
   interval that is 3.5 times the insertion time) is interpreted as a
   true break and a condition that will not clear by itself.

   A CC-V OAM packet is considered to carry an unexpected globally
   unique Source MEP identifier if it is a CC OAM packet received by a
   sink MEP monitoring the MEG for CV; it is a CV OAM packet received by
   a sink MEP monitoring the MEG for CC, or it is a CV OAM packet
   received by a sink MEP monitoring the MEG for CV but carrying a
   unique Source MEP identifier that is different that the expected one.
   Conversely, the CC-V packet is considered to have an expected
   globally unique Source MEP identifier; it is a CC OAM packet received



Busi & Allan                  Informational                    [Page 35]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   by a sink MEP monitoring the MEG for CC, or it is a CV OAM packet
   received by a sink MEP monitoring the MEG for CV and carrying a
   unique Source MEP identifier that is equal to the expected one.

5.1.1.1.  Loss of Continuity Defect

   When proactive CC-V is enabled, a sink MEP detects a loss of
   continuity (LOC) defect when it fails to receive proactive CC-V OAM
   packets from the source MEP.

   o  Entry criteria:  If no proactive CC-V OAM packets from the source
      MEP (and in the case of CV, this includes the requirement to have
      the expected globally unique Source MEP identifier) are received
      within the interval equal to 3.5 times the receiving MEP's
      configured CC-V reception period.

   o  Exit criteria: A proactive CC-V OAM packet from the source MEP
      (and again in the case of CV, with the expected globally unique
      Source MEP identifier) is received.

5.1.1.2.  Mis-Connectivity Defect

   When a proactive CC-V OAM packet is received, a sink MEP identifies a
   mis-connectivity defect (e.g., mismerge, misconnection, or unintended
   looping) when the received packet carries an unexpected globally
   unique Source MEP identifier.

   o  Entry criteria: The sink MEP receives a proactive CC-V OAM packet
      with an unexpected globally unique Source MEP identifier or with
      an unexpected encapsulation.

   o  Exit criteria: The sink MEP does not receive any proactive CC-V
      OAM packet with an unexpected globally unique Source MEP
      identifier for an interval equal at least to 3.5 times the longest
      transmission period of the proactive CC-V OAM packets received
      with an unexpected globally unique Source MEP identifier since
      this defect has been raised.  This requires the OAM packet to
      self-identify the CC-V periodicity, as not all MEPs can be
      expected to have knowledge of all MEGs.

5.1.1.3.  Period Misconfiguration Defect

   If proactive CC-V OAM packets are received with the expected globally
   unique Source MEP identifier but with a transmission period different
   than the locally configured reception period, then a CC-V period
   misconfiguration defect is detected.





Busi & Allan                  Informational                    [Page 36]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   o  Entry criteria: A MEP receives a CC-V proactive packet with the
      expected globally unique Source MEP identifier but with a
      transmission period different than its own CC-V-configured
      transmission period.

   o  Exit criteria: The sink MEP does not receive any proactive CC-V
      OAM packet with the expected globally unique Source MEP identifier
      and an incorrect transmission period for an interval equal at
      least to 3.5 times the longest transmission period of the
      proactive CC-V OAM packets received with the expected globally
      unique Source MEP identifier and an incorrect transmission period
      since this defect has been raised.

5.1.1.4.  Unexpected Encapsulation Defect

   If proactive CC-V OAM packets are received with the expected globally
   unique Source MEP identifier but with an unexpected encapsulation,
   then a CC-V unexpected encapsulation defect is detected.

   It should be noted that there are practical limitations to detecting
   unexpected encapsulation (see Section 5.1.1).

   o  Entry criteria: A MEP receives a CC-V proactive packet with the
      expected globally unique Source MEP identifier but with an
      unexpected encapsulation.

   o  Exit criteria: The sink MEP does not receive any proactive CC-V
      OAM packet with the expected globally unique Source MEP identifier
      and an unexpected encapsulation for an interval equal at least to
      3.5 times the longest transmission period of the proactive CC-V
      OAM packets received with the expected globally unique Source MEP
      identifier and an unexpected encapsulation since this defect has
      been raised.

5.1.2.  Consequent Action

   A sink MEP that detects any of the defect conditions defined in
   Section 5.1.1 declares a defect condition and performs the following
   consequent actions.

   If a MEP detects a mis-connectivity defect, it blocks all the traffic
   (including also the user data packets) that it receives from the
   misconnected transport path.

   If a MEP detects a LOC defect that is not caused by a period
   misconfiguration, it should block all the traffic (including also the
   user data packets) that it receives from the transport path, if this
   consequent action has been enabled by the operator.



Busi & Allan                  Informational                    [Page 37]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   It is worth noticing that the OAM requirements document [11]
   recommends that CC-V proactive monitoring be enabled on every MEG in
   order to reliably detect connectivity defects.  However, CC-V
   proactive monitoring can be disabled by an operator for a MEG.  In
   the event of a misconnection between a transport path that is
   proactively monitored for CC-V and a transport path that is not, the
   MEP of the former transport path will detect a LOC defect
   representing a connectivity problem (e.g., a misconnection with a
   transport path where CC-V proactive monitoring is not enabled)
   instead of a continuity problem, with a consequence of delivery of
   traffic to an incorrect destination.  For these reasons, the traffic
   block consequent action is applied even when a LOC condition occurs.
   This block consequent action can be disabled through configuration.
   This deactivation of the block action may be used for activating or
   deactivating the monitoring when it is not possible to synchronize
   the function activation of the two peer MEPs.

   If a MEP detects a LOC defect (Section 5.1.1.1) or a mis-connectivity
   defect (Section 5.1.1.2), it declares a signal fail condition of the
   ME.

   It is a matter of local policy whether or not a MEP that detects a
   period misconfiguration defect (Section 5.1.1.3) declares a signal
   fail condition of the ME.

   The detection of an unexpected encapsulation defect does not have any
   consequent action: it is just a warning for the network operator.  An
   implementation able to detect an unexpected encapsulation but not
   able to verify the source MEP ID may choose to declare a mis-
   connectivity defect.

5.1.3.  Configuration Considerations

   At all MEPs inside a MEG, the following configuration information
   needs to be configured when a proactive CC-V function is enabled:

   o  MEG-ID: the MEG identifier to which the MEP belongs.

   o  MEP-ID: the MEP's own identity inside the MEG.

   o  list of the other MEPs in the MEG.  For a point-to-point MEG, the
      list would consist of the single MEP ID from which the OAM packets
      are expected.  In case of the root MEP of a P2MP MEG, the list is
      composed of all the leaf MEP IDs inside the MEG.  In case of the
      leaf MEP of a P2MP MEG, the list is composed of the root MEP ID
      (i.e., each leaf needs to know the root MEP ID from which it
      expects to receive the CC-V OAM packets).




Busi & Allan                  Informational                    [Page 38]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   o  PHB for E-LSPs.  It identifies the per-hop behavior of a CC-V
      packet.  Proactive CC-V packets are transmitted with the "minimum
      loss probability PHB" previously configured within a single
      network operator.  This PHB is configurable on network operator's
      basis.  PHBs can be translated at the network borders.

   o  transmission rate.  The default CC-V transmission periods are
      application dependent (depending on whether they are used to
      support fault management, performance monitoring, or protection-
      switching applications):

      *  Fault Management: default transmission period is 1 s (i.e.,
         transmission rate of 1 packet/second).

      *  Performance Management: default transmission period is 100 ms
         (i.e., transmission rate of 10 packets/second).  CC-V
         contributes to the accuracy of performance monitoring
         statistics by permitting the defect-free periods to be properly
         distinguished as described in Sections 5.5.1 and 5.6.1.

      *  Protection Switching: If protection switching with CC-V, defect
         entry criteria of 12 ms is required (for example, in
         conjunction with the requirement to support 50 ms recovery time
         as indicated in RFC 5654 [5]), then an implementation should
         use a default transmission period of 3.33 ms (i.e.,
         transmission rate of 300 packets/second).  Sometimes, the
         requirement of 50 ms recovery time is associated with the
         requirement for a CC-V defect entry criteria period of 35 ms;
         in these cases a transmission period of 10 ms (i.e.,
         transmission rate of 100 packets/second) can be used.
         Furthermore, when there is no need for so small CC-V defect
         entry criteria periods, a larger transmission period can be
         used.

   It should be possible for the operator to configure these
   transmission rates for all applications, to satisfy specific network
   requirements.

   Note that the reception period is the same as the configured
   transmission rate.

   For management-provisioned transport paths, the above parameters are
   statically configured; for dynamically signaled transport paths, the
   configuration information is distributed via the control plane.

   The operator should be able to enable/disable some of the consequent
   actions.  Which consequent actions can be enabled/disabled is
   described in Section 5.1.2.



Busi & Allan                  Informational                    [Page 39]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


5.2.  Remote Defect Indication

   The Remote Defect Indication (RDI) function, as required in Section
   2.2.9 of RFC 5860 [11], is an indicator that is transmitted by a sink
   MEP to communicate to its source MEP that a signal fail condition
   exists.  In case of co-routed and associated bidirectional transport
   paths, RDI is associated with proactive CC-V, and the RDI indicator
   can be piggy-backed onto the CC-V packet.  In case of unidirectional
   transport paths, the RDI indicator can be sent only using an out-of-
   band return path if it exists and its usage is enabled by policy
   actions.

   When a MEP detects a signal fail condition (e.g., in case of a
   continuity or connectivity defect), it should begin transmitting an
   RDI indicator to its peer MEP.  When incorporated into CC-V, the RDI
   information will be included in all proactive CC-V packets that it
   generates for the duration of the signal fail condition's existence.

   A MEP that receives packets from a peer MEP with the RDI information
   should determine that its peer MEP has encountered a defect condition
   associated with a signal fail condition.

   MIPs as well as intermediate nodes not supporting MPLS-TP OAM are
   transparent to the RDI indicator and forward OAM packets that include
   the RDI indicator as regular data packets, i.e., the MIP should not
   perform any actions nor examine the indicator.

   When the signal fail condition clears, the MEP should stop
   transmitting the RDI indicator to its peer MEP.  When incorporated
   into CC-V, the RDI indicator will not be set for subsequent
   transmission of proactive CC-V packets.  A MEP should clear the RDI
   defect upon reception of an RDI indicator cleared.

5.2.1.  Configuration Considerations

   In order to support RDI, the indication may be carried in a unique
   OAM packet or may be embedded in a CC-V packet.  The in-band RDI
   transmission rate and PHB of the OAM packets carrying RDIs should be
   the same as that configured for CC-V to allow both far-end and near-
   end defect conditions being resolved in a timeframe that has the same
   order of magnitude.  This timeframe is application specific as
   described in Section 5.1.3.  Methods of the out-of-band return paths
   will dictate how out-of-band RDIs are transmitted.








Busi & Allan                  Informational                    [Page 40]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


5.3.  Alarm Reporting

   The Alarm Reporting function, as required in Section 2.2.8 of RFC
   5860 [11], relies upon an Alarm Indication Signal (AIS) packet to
   suppress alarms following detection of defect conditions at the
   server (sub-)layer.

   When a server MEP asserts a signal fail condition, it notifies that
   to the co-located MPLS-TP client/server adaptation function that then
   generates OAM packets with AIS information in the downstream
   direction to allow the suppression of secondary alarms at the MPLS-TP
   MEP in the client (sub-)layer.

   The generation of packets with AIS information starts immediately
   when the server MEP asserts a signal fail condition.  These periodic
   OAM packets, with AIS information, continue to be transmitted until
   the signal fail condition is cleared.

   It is assumed that to avoid spurious alarm generation a MEP detecting
   a loss of continuity defect (see Section 5.1.1.1) will wait for a
   hold-off interval prior to asserting an alarm to the management
   system.  Therefore, upon receiving an OAM packet with AIS
   information, an MPLS-TP MEP enters an AIS defect condition and
   suppresses reporting of alarms to the NMS on the loss of continuity
   with its peer MEP, but it does not block traffic received from the
   transport path.  A MEP resumes loss of continuity alarm generation
   upon detecting loss of continuity defect conditions in the absence of
   AIS condition.

   MIPs, as well as intermediate nodes, do not process AIS information
   and forward these AIS OAM packets as regular data packets.

   For example, let's consider a fiber cut between T-PE 1 and LSR 2 in
   the reference network of Figure 5.  Assuming that all of the MEGs
   described in Figure 5 have proactive CC-V enabled, a LOC defect is
   detected by the MEPs of Sec12 SMEG, LSP13 LMEG, PW1 PSMEG, and PW1Z
   PMEG; however, in a transport network, only the alarm associated to
   the fiber cut needs to be reported to an NMS, while all secondary
   alarms should be suppressed (i.e., not reported to the NMS or
   reported as secondary alarms).

   If the fiber cut is detected by the MEP in the physical layer (in LSR
   2), LSR 2 can generate the proper alarm in the physical layer and
   suppress the secondary alarm associated with the LOC defect detected
   on Sec12 SMEG.  As both MEPs reside within the same node, this
   process does not involve any external protocol exchange.  Otherwise,





Busi & Allan                  Informational                    [Page 41]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   if the physical layer does not have enough OAM capabilities to detect
   the fiber cut, the MEP of Sec12 SMEG in LSR 2 will report a LOC
   alarm.

   In both cases, the MEP of Sec12 SMEG in LSR 2 notifies the adaptation
   function for LSP13 LMEG that then generates AIS packets on the LSP13
   LMEG in order to allow its MEP in S-PE 3 to suppress the LOC alarm.
   S-PE 3 can also suppress the secondary alarm on PW13 PSMEG because
   the MEP of PW13 PSMEG resides within the same node as the MEP of
   LSP13 LMEG.  The MEP of PW13 PSMEG in S-PE 3 also notifies the
   adaptation function for PW1Z PMEG that then generates AIS packets on
   PW1Z PMEG in order to allow its MEP in T-PE Z to suppress the LOC
   alarm.

   The generation of AIS packets for each MEG in the MPLS-TP client
   (sub-)layer is configurable (i.e., the operator can enable/disable
   the AIS generation).

   The AIS condition is cleared if no AIS packet has been received in
   3.5 times the AIS transmission period.

   The AIS transmission period is traditionally one per second, but an
   option to configure longer periods would be also desirable.  As a
   consequence, OAM packets need to self-identify the transmission
   period such that proper exit criteria can be established.

   AIS packets are transmitted with the "minimum loss probability PHB"
   within a single network operator.  For E-LSPs, this PHB is
   configurable on network operator's basis, while for L-LSPs, this is
   determined as per RFC 3270 [23].

5.4.  Lock Reporting

   The Lock Reporting function, as required in Section 2.2.7 of RFC 5860
   [11], relies upon a Lock Report (LKR) packet used to suppress alarms
   following administrative locking action in the server (sub-)layer.

   When a server MEP is locked, the MPLS-TP client (sub-)layer
   adaptation function generates packets with LKR information to allow
   the suppression of secondary alarms at the MEPs in the client
   (sub-)layer.  Again, it is assumed that there is a hold-off for any
   loss of continuity alarms in the client-layer MEPs downstream of the
   node originating the Lock Report.  In case of client (sub-)layer co-
   routed bidirectional transport paths, the LKR information is sent on
   both directions.  In case of client (sub-)layer unidirectional
   transport paths, the LKR information is sent only in the downstream
   direction.  As a consequence, in case of client (sub-)layer point-to-
   multipoint transport paths, the LKR information is sent only to the



Busi & Allan                  Informational                    [Page 42]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   MEPs that are downstream from the server (sub-)layer that has been
   administratively locked.  Client (sub-)layer associated bidirectional
   transport paths behave like co-routed bidirectional transport paths
   if the server (sub-)layer that has been administratively locked is
   used by both directions; otherwise, they behave like unidirectional
   transport paths.

   The generation of packets with LKR information starts immediately
   when the server MEP is locked.  These periodic packets, with LKR
   information, continue to be transmitted until the locked condition is
   cleared.

   Upon receiving a packet with LKR information, an MPLS-TP MEP enters
   an LKR defect condition and suppresses the loss of continuity alarm
   associated with its peer MEP but does not block traffic received from
   the transport path.  A MEP resumes loss of continuity alarm
   generation upon detecting loss of continuity defect conditions in the
   absence of the LKR condition.

   MIPs, as well as intermediate nodes, do not process the LKR
   information; they forward these LKR OAM packets as regular data
   packets.

   For example, let's consider the case where the MPLS-TP Section
   between T-PE 1 and LSR 2 in the reference network of Figure 5 is
   administratively locked at LSR 2 (in both directions).

   Assuming that all the MEGs described in Figure 5 have proactive CC-V
   enabled, a LOC defect is detected by the MEPs of LSP13 LMEG, PW1
   PSMEG, and PW1Z PMEG; however, in a transport network all these
   secondary alarms should be suppressed (i.e., not reported to the NMS
   or reported as secondary alarms).

   The MEP of Sec12 SMEG in LSR 2 notifies the adaptation function for
   LSP13 LMEG that then generates LKR packets on the LSP13 LMEG in order
   to allow its MEPs in T-PE 1 and S-PE 3 to suppress the LOC alarm.
   S-PE 3 can also suppress the secondary alarm on PW13 PSMEG because
   the MEP of PW13 PSMEG resides within the same node as the MEP of
   LSP13 LMEG.  The MEP of PW13 PSMEG in S-PE 3 also notifies the
   adaptation function for PW1Z PMEG that then generates AIS packets on
   PW1Z PMEG in order to allow its MEP in T-PE Z to suppress the LOC
   alarm.

   The generation of LKR packets for each MEG in the MPLS-TP client
   (sub-)layer is configurable (i.e., the operator can enable/disable
   the LKR generation).





Busi & Allan                  Informational                    [Page 43]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   The locked condition is cleared if no LKR packet has been received
   for 3.5 times the transmission period.

   The LKR transmission period is traditionally one per second, but an
   option to configure longer periods would be also desirable.  As a
   consequence, OAM packets need to self-identify the transmission
   period such that proper exit criteria can be established.

   LKR packets are transmitted with the "minimum loss probability PHB"
   within a single network operator.  For E-LSPs, this PHB is
   configurable on network operator's basis, while for L-LSPs, this is
   determined as per RFC 3270 [23].

5.5.  Packet Loss Measurement

   Packet Loss Measurement (LM) is one of the capabilities supported by
   the MPLS-TP Performance Monitoring (PM) function in order to
   facilitate reporting of Quality of Service (QoS) information for a
   transport path as required in Section 2.2.11 of RFC 5860 [11].  LM is
   used to exchange counter values for the number of ingress and egress
   packets transmitted and received by the transport path monitored by a
   pair of MEPs.

   Proactive LM is performed by periodically sending LM OAM packets from
   a MEP to a peer MEP and by receiving LM OAM packets from the peer MEP
   (if a co-routed or associated bidirectional transport path) during
   the lifetime of the transport path.  Each MEP performs measurements
   of its transmitted and received user data packets.  These
   measurements are then correlated in real time with the peer MEP in
   the ME to derive the impact of packet loss on a number of performance
   metrics for the ME in the MEG.  The LM transactions are issued such
   that the OAM packets will experience the same PHB scheduling class as
   the measured traffic while transiting between the MEPs in the ME.

   For a MEP, near-end packet loss refers to packet loss associated with
   incoming data packets (from the far-end MEP), while far-end packet
   loss refers to packet loss associated with egress data packets
   (towards the far-end MEP).

   Proactive LM can be operated in two ways:

   o  One-way: a MEP sends an LM OAM packet to its peer MEP containing
      all the required information to facilitate near-end packet loss
      measurements at the peer MEP.

   o  Two-way: a MEP sends an LM OAM packet with an LM request to its
      peer MEP, which replies with an LM OAM packet as an LM response.
      The request/response LM OAM packets contain all the required



Busi & Allan                  Informational                    [Page 44]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


      information to facilitate both near-end and far-end packet loss
      measurements from the viewpoint of the originating MEP.

   One-way LM is applicable to both unidirectional and bidirectional
   (co-routed or associated) transport paths, while two-way LM is
   applicable only to bidirectional (co-routed or associated) transport
   paths.

   MIPs, as well as intermediate nodes, do not process the LM
   information; they forward these proactive LM OAM packets as regular
   data packets.

5.5.1.  Configuration Considerations

   In order to support proactive LM, the transmission rate and, for
   E-LSPs, the PHB class (associated with the LM OAM packets originating
   from a MEP) need to be configured as part of the LM provisioning.  LM
   OAM packets should be transmitted with the PHB that yields the lowest
   drop precedence within the measured PHB Scheduling Class (see RFC
   3260 [17]), in order to maximize reliability of measurement within
   the traffic class.

   If that PHB class is not an ordered aggregate where the ordering
   constraint is all packets with the PHB class being delivered in
   order, LM can produce inconsistent results.

   Performance monitoring (e.g., LM) is only relevant when the transport
   path is defect free.  CC-V contributes to the accuracy of PM
   statistics by permitting the defect-free periods to be properly
   distinguished.  Therefore, support of proactive LM has implications
   on the CC-V transmission period (see Section 5.1.3).

5.5.2.  Sampling Skew

   If an implementation makes use of a hardware forwarding path that
   operates in parallel with an OAM processing path, whether hardware or
   software based, the packet and byte counts may be skewed if one or
   more packets can be processed before the OAM processing samples
   counters.  If OAM is implemented in software, this error can be quite
   large.

5.5.3.  Multilink Issues

   If multilink is used at the ingress or egress of a transport path,
   there may not be a single packet-processing engine where an LM packet
   can be injected or extracted as an atomic operation while having
   accurate packet and byte counts associated with the packet.




Busi & Allan                  Informational                    [Page 45]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   In the case where multilink is encountered along the route of the
   transport path, the reordering of packets within the transport path
   can cause inaccurate LM results.

5.6.  Packet Delay Measurement

   Packet Delay Measurement (DM) is one of the capabilities supported by
   the MPLS-TP PM function in order to facilitate reporting of QoS
   information for a transport path as required in Section 2.2.12 of RFC
   5860 [11].  Specifically, proactive DM is used to measure the long-
   term packet delay and packet delay variation in the transport path
   monitored by a pair of MEPs.

   Proactive DM is performed by sending periodic DM OAM packets from a
   MEP to a peer MEP and by receiving DM OAM packets from the peer MEP
   (if a co-routed or associated bidirectional transport path) during a
   configurable time interval.

   Proactive DM can be operated in two ways:

   o  One-way: a MEP sends a DM OAM packet to its peer MEP containing
      all the required information to facilitate one-way packet delay
      and/or one-way packet delay variation measurements at the peer
      MEP.  Note that this requires precise time synchronization at
      either MEP by means outside the scope of this framework.

   o  Two-way: a MEP sends a DM OAM packet with a DM request to its peer
      MEP, which replies with a DM OAM packet as a DM response.  The
      request/response DM OAM packets contain all the required
      information to facilitate two-way packet delay and/or two-way
      packet delay variation measurements from the viewpoint of the
      originating MEP.

   One-way DM is applicable to both unidirectional and bidirectional
   (co-routed or associated) transport paths, while two-way DM is
   applicable only to bidirectional (co-routed or associated) transport
   paths.

   MIPs, as well as intermediate nodes, do not process the DM
   information; they forward these proactive DM OAM packets as regular
   data packets.

5.6.1.  Configuration Considerations

   In order to support proactive DM, the transmission rate and, for
   E-LSPs, the PHB (associated with the DM OAM packets originating from
   a MEP) need to be configured as part of the DM provisioning.  DM OAM
   packets should be transmitted with the PHB that yields the lowest



Busi & Allan                  Informational                    [Page 46]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   drop precedence within the measured PHB Scheduling Class (see RFC
   3260 [17]).

   Performance monitoring (e.g., DM) is only relevant when the transport
   path is defect free.  CC-V contributes to the accuracy of PM
   statistics by permitting the defect-free periods to be properly
   distinguished.  Therefore, support of proactive DM has implications
   on the CC-V transmission period (see Section 5.1.3).

5.7.  Client Failure Indication

   The Client Failure Indication (CFI) function, as required in Section
   2.2.10 of RFC 5860 [11], is used to help process client defects and
   propagate a client signal defect condition from the process
   associated with the local attachment circuit where the defect was
   detected (typically the source adaptation function for the local
   client interface).  It is propagated to the process associated with
   the far-end attachment circuit (typically the source adaptation
   function for the far-end client interface) for the same transmission
   path, in case the client of the transport path does not support a
   native defect/alarm indication mechanism, e.g., AIS.

   A source MEP starts transmitting a CFI to its peer MEP when it
   receives a local client signal defect notification via its local
   client signal fail indication.  Mechanisms to detect local client
   signal fail defects are technology specific.  Similarly, mechanisms
   to determine when to cease originating client signal fail indication
   are also technology specific.

   A sink MEP that has received a CFI reports this condition to its
   associated client process via its local CFI function.  Consequent
   actions toward the client attachment circuit are technology specific.

   There needs to be a 1:1 correspondence between the client and the
   MEG; otherwise, when multiple clients are multiplexed over a
   transport path, the CFI packet requires additional information to
   permit the client instance to be identified.

   MIPs, as well as intermediate nodes, do not process the CFI
   information; they forward these proactive CFI OAM packets as regular
   data packets.

5.7.1.  Configuration Considerations

   In order to support CFI indication, the CFI transmission rate and,
   for E-LSPs, the PHB of the CFI OAM packets should be configured as
   part of the CFI configuration.




Busi & Allan                  Informational                    [Page 47]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


6.  OAM Functions for On-Demand Monitoring

   In contrast to proactive monitoring, on-demand monitoring is
   initiated manually and for a limited amount of time, usually for
   operations such as diagnostics to investigate a defect condition.

   On-demand monitoring covers a combination of "in-service" and "out-
   of-service" monitoring functions.  The control and measurement
   implications are:

   1. A MEG can be directed to perform an "on-demand" functions at
      arbitrary times in the lifetime of a transport path.

   2. "Out-of-service" monitoring functions may require a priori
      configuration of both MEPs and intermediate nodes in the MEG
      (e.g., data-plane loopback) and the issuance of notifications into
      client layers of the transport path being removed from service
      (e.g., lock reporting)

   3. The measurements resulting from "on-demand" monitoring are
      typically harvested in real time, as they are frequently initiated
      manually.  These do not necessarily require different harvesting
      mechanisms than for harvesting proactive monitoring telemetry.

   The functions that are exclusively out-of-service are those described
   in Section 6.3.  The remainder are applicable to both in-service and
   out-of-service transport paths.

6.1.  Connectivity Verification

   The on-demand connectivity verification function, as required in
   Section 2.2.3 of RFC 5860 [11], is a transaction that flows from the
   originating MEP to a target MIP or MEP to verify the connectivity
   between these points.

   Use of on-demand CV is dependent on the existence of a bidirectional
   ME or an associated return ME, or the availability of an out-of-band
   return path, because it requires the ability for target MIPs and MEPs
   to direct responses to the originating MEPs.

   One possible use of on-demand CV would be to perform fault management
   without using proactive CC-V, in order to preserve network resources,
   e.g., bandwidth, processing time at switches.  In this case, network
   management periodically invokes on-demand CV.







Busi & Allan                  Informational                    [Page 48]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   An additional use of on-demand CV would be to detect and locate a
   problem of connectivity when a problem is suspected or known to be
   based on other tools.  In this case, the functionality will be
   triggered by the network management in response to a status signal or
   alarm indication.

   On-demand CV is based upon generation of on-demand CV packets that
   should uniquely identify the MEG that is being checked.  The on-
   demand functionality may be used to check either an entire MEG (end-
   to-end) or between the originating MEP and a specific MIP.  This
   functionality may not be available for associated bidirectional
   transport paths or unidirectional paths, as the MIP may not have a
   return path to the originating MEP for the on-demand CV transaction.

   When on-demand CV is invoked, the originating MEP issues a sequence
   of on-demand CV packets that uniquely identifies the MEG being
   verified.  The number of packets and their transmission rate should
   be pre-configured at the originating MEP to take into account normal
   packet-loss conditions.  The source MEP should use the mechanisms
   defined in Sections 3.3 and 3.4 when sending an on-demand CV packet
   to a target MEP or target MIP, respectively.  The target MEP/MIP
   shall return a reply on-demand CV packet for each packet received.
   If the expected number of on-demand CV reply packets is not received
   at the originating MEP, this is an indication that a connectivity
   problem may exist.

   On-demand CV should have the ability to carry padding such that a
   variety of MTU sizes can be originated to verify the MTU transport
   capability of the transport path.

   MIPs that are not targeted by on-demand CV packets, as well as
   intermediate nodes, do not process the CV information; they forward
   these on-demand CV OAM packets as regular data packets.

6.1.1.  Configuration Considerations

   For on-demand CV, the originating MEP should support the
   configuration of the number of packets to be transmitted/received in
   each sequence of transmissions and their packet size.

   In addition, when the CV packet is used to check connectivity toward
   a target MIP, the number of hops to reach the target MIP should be
   configured.

   For E-LSPs, the PHB of the on-demand CV packets should be configured
   as well.  This permits the verification of correct operation of QoS
   queuing as well as connectivity.




Busi & Allan                  Informational                    [Page 49]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


6.2.  Packet Loss Measurement

   On-demand Packet Loss Measurement (LM) is one of the capabilities
   supported by the MPLS-TP Performance Monitoring function in order to
   facilitate the diagnosis of QoS performance for a transport path, as
   required in Section 2.2.11 of RFC 5860 [11].

   On-demand LM is very similar to proactive LM described in Section
   5.5.  This section focuses on the differences between on-demand and
   proactive LM.

   On-demand LM is performed by periodically sending LM OAM packets from
   a MEP to a peer MEP and by receiving LM OAM packets from the peer MEP
   (if a co-routed or associated bidirectional transport path) during a
   pre-defined monitoring period.  Each MEP performs measurements of its
   transmitted and received user data packets.  These measurements are
   then correlated to evaluate the packet-loss performance metrics of
   the transport path.

   Use of packet loss measurement in an out-of-service transport path
   requires a traffic source such as a test device that can inject
   synthetic traffic.

6.2.1.  Configuration Considerations

   In order to support on-demand LM, the beginning and duration of the
   LM procedures, the transmission rate, and, for E-LSPs, the PHB class
   (associated with the LM OAM packets originating from a MEP) must be
   configured as part of the on-demand LM provisioning.  LM OAM packets
   should be transmitted with the PHB that yields the lowest drop
   precedence as described in Section 5.5.1.

6.2.2.  Sampling Skew

   The same considerations described in Section 5.5.2 for the proactive
   LM are also applicable to on-demand LM implementations.

6.2.3.  Multilink Issues

   Multilink issues are as described in Section 5.5.3.

6.3.  Diagnostic Tests

   Diagnostic tests are tests performed on a MEG that has been taken out
   of service.






Busi & Allan                  Informational                    [Page 50]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


6.3.1.  Throughput Estimation

   Throughput estimation is an on-demand out-of-service function, as
   required in Section 2.2.5 of RFC 5860 [11], that allows verifying the
   bandwidth/throughput of an MPLS-TP transport path (LSP or PW) before
   it is put in service.

   Throughput estimation is performed between MEPs and between a MEP and
   a MIP.  It can be performed in one-way or two-way modes.

   According to RFC 2544 [12], this test is performed by sending OAM
   test packets at increasing rates (up to the theoretical maximum),
   computing the percentage of OAM test packets received, and reporting
   the rate at which OAM test packets begin to drop.  In general, this
   rate is dependent on the OAM test packet size.

   When configured to perform such tests, a source MEP inserts OAM test
   packets with a specified packet size and transmission pattern at a
   rate to exercise the throughput.

   The throughput test can create congestion within the network, thus
   impacting other transport paths.  However, the test traffic should
   comply with the traffic profile of the transport path under test, so
   the impact of the test will not be worse than the impact caused by
   the customers, whose traffic would be sent over that transport path,
   sending the traffic at the maximum rate allowed by their traffic
   profiles.  Therefore, throughput tests are not applicable to
   transport paths that do not have a defined traffic profile, such as
   LSPs in a context where statistical multiplexing is leveraged for
   network capacity dimensioning.

   For a one-way test, the remote sink MEP receives the OAM test packets
   and calculates the packet loss.  For a two-way test, the remote MEP
   loops the OAM test packets back to the original MEP, and the local
   sink MEP calculates the packet loss.

   It is worth noting that two-way throughput estimation is only
   applicable to bidirectional (co-routed or associated) transport paths
   and can only evaluate the minimum of available throughput of the two
   directions.  In order to estimate the throughput of each direction
   uniquely, two one-way throughput estimation sessions have to be set
   up.  One-way throughput estimation requires coordination between the
   transmitting and receiving test devices as described in Section 6 of
   RFC 2544 [12].

   It is also worth noting that if throughput estimation is performed on
   transport paths that transit oversubscribed links, the test may not
   produce comprehensive results if viewed in isolation because the



Busi & Allan                  Informational                    [Page 51]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   impact of the test on the surrounding traffic needs to also be
   considered.  Moreover, the estimation will only reflect the bandwidth
   available at the moment when the measure is made.

   MIPs that are not targeted by on-demand test OAM packets, as well as
   intermediate nodes, do not process the throughput test information;
   they forward these on-demand test OAM packets as regular data
   packets.

6.3.1.1.  Configuration Considerations

   Throughput estimation is an out-of-service tool.  The diagnosed MEG
   should be put into a locked state before the diagnostic test is
   started.

   A MEG can be put into a locked state either via an NMS action or
   using the Lock Instruct OAM tool as defined in Section 7.

   At the transmitting MEP, provisioning is required for a test signal
   generator that is associated with the MEP.  At a receiving MEP,
   provisioning is required for a test signal detector that is
   associated with the MEP.

   In order to ensure accurate measurement, care needs to be taken to
   enable throughput estimation only if all the MEPs within the MEG can
   process OAM test packets at the same rate as the payload data rates
   (see Section 6.3.1.2).

6.3.1.2.  Limited OAM Processing Rate

   If an implementation is able to process payload at much higher data
   rates than OAM test packets, then accurate measurement of throughput
   using OAM test packets is not achievable.  Whether OAM packets can be
   processed at the same rate as payload is implementation dependent.

6.3.1.3.  Multilink Considerations

   If multilink is used, then it may not be possible to perform
   throughput measurement, as the throughput test may not have a
   mechanism for utilizing more than one component link of the
   aggregated link.

6.3.2.  Data-Plane Loopback

   Data-plane loopback is an out-of-service function, as required in
   Section 2.2.5 of RFC 5860 [11].  This function consists in placing a
   transport path, at either an intermediate or terminating node, into a
   data-plane loopback state, such that all traffic (including both



Busi & Allan                  Informational                    [Page 52]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   payload and OAM) received on the looped back interface is sent on the
   reverse direction of the transport path.  The traffic is looped back
   unmodified except for normal per-hop processing such as TTL
   decrement.

   The data-plane loopback function requires that the MEG is locked such
   that user data traffic is prevented from entering/exiting that MEG.
   Instead, test traffic is inserted at the ingress of the MEG.  This
   test traffic can be generated from an internal process residing
   within the ingress node or injected by external test equipment
   connected to the ingress node.

   It is also normal to disable proactive monitoring of the path as the
   MEP located upstream with respect to the node set in the data-plane
   loopback mode will see all the OAM packets originated by itself, and
   this may interfere with other measurements.

   The only way to send an OAM packet (e.g., to remove the data-plane
   loopback state) to the MIPs or MEPs hosted by a node set in the data-
   plane loopback mode is via TTL expiry.  It should also be noted that
   MIPs can be addressed with more than one TTL value on a co-routed
   bidirectional path set into data-plane loopback.

   If the loopback function is to be performed at an intermediate node,
   it is only applicable to co-routed bidirectional paths.  If the
   loopback is to be performed end to end, it is applicable to both co-
   routed bidirectional and associated bidirectional paths.

   It should be noted that data-plane loopback function itself is
   applied to data-plane loopback points that can reside on different
   interfaces from MIPs/MEPs.  Where a node implements data-plane
   loopback capability and whether it implements it in more than one
   point is implementation dependent.

6.3.2.1.  Configuration Considerations

   Data-plane loopback is an out-of-service tool.  The MEG that defines
   a diagnosed transport path should be put into a locked state before
   the diagnostic test is started.  However, a means is required to
   permit the originated test traffic to be inserted at the ingress MEP
   when data-plane loopback is performed.

   A transport path, at either an intermediate or terminating node, can
   be put into data-plane loopback state via an NMS action or using an
   OAM tool for data-plane loopback configuration.






Busi & Allan                  Informational                    [Page 53]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   If the data-plane loopback point is set somewhere at an intermediate
   point of a co-routed bidirectional transport path, the side of the
   loopback function (east/west side or both sides) needs to be
   configured.

6.4.  Route Tracing

   It is often necessary to trace a route covered by a MEG from an
   originating MEP to the peer MEP(s) including all the MIPs in between.
   This may be conducted after provisioning an MPLS-TP transport path
   for, e.g., troubleshooting purposes such as fault localization.

   The route tracing function, as required in Section 2.2.4 of RFC 5860
   [11], is providing this functionality.  Based on the fate-sharing
   requirement of OAM flows, i.e., OAM packets receive the same
   forwarding treatment as data packets, route tracing is a basic means
   to perform connectivity verification and, to a much lesser degree,
   continuity check.  For this function to work properly, a return path
   must be present.

   Route tracing might be implemented in different ways, and this
   document does not preclude any of them.

   Route tracing should always discover the full list of MIPs and of
   peer MEPs.  In case a defect exists, the route tracing function will
   only be able to trace up to the defect, and it needs to be able to
   return the incomplete list of OAM entities that it was able to trace
   so that the fault can be localized.

6.4.1.  Configuration Considerations

   The configuration of the route tracing function must at least support
   the setting of the number of trace attempts before it gives up.

6.5.  Packet Delay Measurement

   Packet Delay Measurement (DM) is one of the capabilities supported by
   the MPLS-TP PM function in order to facilitate reporting of QoS
   information for a transport path, as required in Section 2.2.12 of
   RFC 5860 [11].  Specifically, on-demand DM is used to measure packet
   delay and packet delay variation in the transport path monitored by a
   pair of MEPs during a pre-defined monitoring period.

   On-demand DM is performed by sending periodic DM OAM packets from a
   MEP to a peer MEP and by receiving DM OAM packets from the peer MEP
   (if a co-routed or associated bidirectional transport path) during a
   configurable time interval.




Busi & Allan                  Informational                    [Page 54]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   On-demand DM can be operated in two modes:

   o  One-way: a MEP sends a DM OAM packet to its peer MEP containing
      all the required information to facilitate one-way packet delay
      and/or one-way packet delay variation measurements at the peer
      MEP.  Note that this requires precise time synchronization at
      either MEP by means outside the scope of this framework.

   o  Two-way: a MEP sends a DM OAM packet with a DM request to its peer
      MEP, which replies with a DM OAM packet as a DM response.  The
      request/response DM OAM packets contain all the required
      information to facilitate two-way packet delay and/or two-way
      packet delay variation measurements from the viewpoint of the
      originating MEP.

   MIPs, as well as intermediate nodes, do not process the DM
   information; they forward these on-demand DM OAM packets as regular
   data packets.

6.5.1.  Configuration Considerations

   In order to support on-demand DM, the beginning and duration of the
   DM procedures, the transmission rate and, for E-LSPs, the PHB
   (associated with the DM OAM packets originating from a MEP) need to
   be configured as part of the DM provisioning.  DM OAM packets should
   be transmitted with the PHB that yields the lowest drop precedence
   within the measured PHB Scheduling Class (see RFC 3260 [17]).

   In order to verify different performances between long and short
   packets (e.g., due to the processing time), it should be possible for
   the operator to configure the packet size of the on-demand OAM DM
   packet.

7.  OAM Functions for Administration Control

7.1.  Lock Instruct

   The Lock Instruct (LKI) function, as required in Section 2.2.6 of RFC
   5860 [11], is a command allowing a MEP to instruct the peer MEP(s) to
   put the MPLS-TP transport path into a locked condition.

   This function allows single-side provisioning for administratively
   locking (and unlocking) an MPLS-TP transport path.

   Note that it is also possible to administratively lock (and unlock)
   an MPLS-TP transport path using two-side provisioning, where the NMS
   administratively puts both MEPs into an administrative lock
   condition.  In this case, the LKI function is not required/used.



Busi & Allan                  Informational                    [Page 55]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   MIPs, as well as intermediate nodes, do not process the Lock Instruct
   information; they forward these on-demand LKI OAM packets as regular
   data packets.

7.1.1.  Locking a Transport Path

   A MEP, upon receiving a single-side administrative lock command from
   an NMS, sends an LKI request OAM packet to its peer MEP(s).  It also
   puts the MPLS-TP transport path into a locked state and notifies its
   client (sub-)layer adaptation function upon the locked condition.

   A MEP, upon receiving an LKI request from its peer MEP, can either
   accept or reject the instruction and replies to the peer MEP with an
   LKI reply OAM packet indicating whether or not it has accepted the
   instruction.  This requires either an in-band or out-of-band return
   path.  The LKI reply is needed to allow the MEP to properly report to
   the NMS the actual result of the single-side administrative lock
   command.

   If the lock instruction has been accepted, it also puts the MPLS-TP
   transport path into a locked state and notifies its client
   (sub-)layer adaptation function upon the locked condition.

   Note that if the client (sub-)layer is also MPLS-TP, Lock Report
   (LKR) generation at the client MPLS-TP (sub-)layer is started, as
   described in Section 5.4.

7.1.2.  Unlocking a Transport Path

   A MEP, upon receiving a single-side administrative unlock command
   from NMS, sends an LKI removal request OAM packet to its peer MEP(s).

   The peer MEP, upon receiving an LKI removal request, can either
   accept or reject the removal instruction and replies with an LK
   removal reply OAM packet indicating whether or not it has accepted
   the instruction.  The LKI removal reply is needed to allow the MEP to
   properly report to the NMS the actual result of the single-side
   administrative unlock command.

   If the lock removal instruction has been accepted, it also clears the
   locked condition on the MPLS-TP transport path and notifies its
   client (sub-)layer adaptation function of this event.

   The MEP that has initiated the LKI clear procedure, upon receiving a
   positive LKI removal reply, also clears the locked condition on the
   MPLS-TP transport path and notifies this event to its client
   (sub-)layer adaptation function.




Busi & Allan                  Informational                    [Page 56]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Note that if the client (sub-)layer is also MPLS-TP, Lock Report
   (LKR) generation at the client MPLS-TP (sub-)layer is terminated, as
   described in Section 5.4.

8.  Security Considerations

   A number of security considerations are important in the context of
   OAM applications.

   OAM traffic can reveal sensitive information, such as performance
   data and details, about the current state of the network.  Insertion
   or modification of OAM transactions can mask the true operational
   state of the network, and in the case of transactions for
   administration control, such as lock or data-plane loopback
   instructions, these can be used for explicit denial-of-service
   attacks.  The effect of such attacks is mitigated only by the fact
   that, for in-band messaging, the managed entities whose state can be
   masked is limited to those that transit the point of malicious access
   to the network internals due to the fate-sharing nature of OAM
   messaging.  This is not true when an out-of-band return path is
   employed.

   The sensitivity of OAM data therefore suggests that one solution is
   that some form of authentication, authorization, and encryption is in
   place.  This will prevent unauthorized access to vital equipment, and
   it will prevent third parties from learning about sensitive
   information about the transport network.  However, it should be
   observed that the combination of the frequency of some OAM
   transactions, the need for timeliness of OAM transaction exchange,
   and all permutations of unique MEP to MEP, MEP to MIP, and
   intermediate-system-originated transactions mitigates against the
   practical establishment and maintenance of a large number of security
   associations per MEG either in advance or as required.

   For this reason, it is assumed that the internal links of the network
   are physically secured from malicious access such that OAM
   transactions scoped to fault and performance management of individual
   MEGs are not encumbered with additional security.  Further, it is
   assumed in multi-provider cases where OAM transactions originate
   outside of an individual provider's trusted domain that filtering
   mechanisms or further encapsulation will need to constrain the
   potential impact of malicious transactions.  Mechanisms that the
   framework does not specify might be subject to additional security
   considerations.

   In case of misconfiguration, some nodes can receive OAM packets that
   they cannot recognize.  In such a case, these OAM packets should be
   silently discarded in order to avoid malfunctions whose effects may



Busi & Allan                  Informational                    [Page 57]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   be similar to malicious attacks (e.g., degraded performance or even
   failure).  Further considerations about data-plane attacks via G-ACh
   are provided in RFC 5921 [8].

9.  Acknowledgments

   The authors would like to thank all members of the teams (the Joint
   Working Team, the MPLS Interoperability Design Team in IETF, and the
   Ad Hoc Group on MPLS-TP in ITU-T) involved in the definition and
   specification of the MPLS Transport Profile.

   The editors gratefully acknowledge the contributions of Adrian
   Farrel, Yoshinori Koike, Luca Martini, Yuji Tochio, and Manuel Paul
   for the definition of per-interface MIPs and MEPs.

   The editors gratefully acknowledge the contributions of Malcolm
   Betts, Yoshinori Koike, Xiao Min, and Maarten Vissers for the Lock
   Report and Lock Instruct descriptions.

   The authors would also like to thank Alessandro D'Alessandro, Loa
   Andersson, Malcolm Betts, Dave Black, Stewart Bryant, Rui Costa,
   Xuehui Dai, John Drake, Adrian Farrel, Dan Frost, Xia Liang, Liu
   Gouman, Peng He, Russ Housley, Feng Huang, Su Hui, Yoshionori Koike,
   Thomas Morin, George Swallow, Yuji Tochio, Curtis Villamizar, Maarten
   Vissers, and Xuequin Wei for their comments and enhancements to the
   text.

10.  References

10.1.  Normative References

   [1]  Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol Label
        Switching Architecture", RFC 3031, January 2001.

   [2]  Bryant, S., Ed., and P. Pate, Ed., "Pseudo Wire Emulation Edge-
        to-Edge (PWE3) Architecture", RFC 3985, March 2005.

   [3]  Nadeau, T., Ed., and C. Pignataro, Ed., "Pseudowire Virtual
        Circuit Connectivity Verification (VCCV): A Control Channel for
        Pseudowires", RFC 5085, December 2007.

   [4]  Bocci, M. and S. Bryant, "An Architecture for Multi-Segment
        Pseudowire Emulation Edge-to-Edge", RFC 5659, October 2009.

   [5]  Niven-Jenkins, B., Ed., Brungard, D., Ed., Betts, M., Ed.,
        Sprecher, N., and S. Ueno, "Requirements of an MPLS Transport
        Profile", RFC 5654, September 2009.




Busi & Allan                  Informational                    [Page 58]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   [6]  Agarwal, P. and B. Akyol, "Time To Live (TTL) Processing in
        Multi-Protocol Label Switching (MPLS) Networks", RFC 3443,
        January 2003.

   [7]  Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant, Ed., "MPLS
        Generic Associated Channel", RFC 5586, June 2009.

   [8]  Bocci, M., Ed., Bryant, S., Ed., Frost, D., Ed., Levrau, L., and
        L. Berger, "A Framework for MPLS in Transport Networks", RFC
        5921, July 2010.

   [9]  Bocci, M., Levrau, L., and D. Frost, "MPLS Transport Profile
        User-to-Network and Network-to-Network Interfaces", RFC 6215,
        April 2011.

   [10] Frost, D., Ed., Bryant, S., Ed., and M. Bocci, Ed., "MPLS
        Transport Profile Data Plane Architecture", RFC 5960, August
        2010.

   [11] Vigoureux, M., Ed., Ward, D., Ed., and M. Betts, Ed.,
        "Requirements for Operations, Administration, and Maintenance
        (OAM) in MPLS Transport Networks", RFC 5860, May 2010.

   [12] Bradner, S. and J. McQuaid, "Benchmarking Methodology for
        Network Interconnect Devices", RFC 2544, March 1999.

   [13] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W.
        Weiss, "An Architecture for Differentiated Service", RFC 2475,
        December 1998.

   [14] ITU-T Recommendation G.806 (01/09), "Characteristics of
        transport equipment - Description methodology and generic
        functionality", January 2009.

10.2.  Informative References

   [15] Sprecher, N. and L. Fang, "An Overview of the OAM Tool Set for
        MPLS based Transport Networks", Work in Progress, June 2011.

   [16] Nichols, K., Blake, S., Baker, F., and D. Black, "Definition of
        the Differentiated Services Field (DS Field) in the IPv4 and
        IPv6 Headers", RFC 2474, December 1998.

   [17] Grossman, D., "New Terminology and Clarifications for Diffserv",
        RFC 3260, April 2002.

   [18] Kompella, K., Rekhter, Y., and L. Berger, "Link Bundling in MPLS
        Traffic Engineering (TE)", RFC 4201, October 2005.



Busi & Allan                  Informational                    [Page 59]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   [19] ITU-T Recommendation G.707/Y.1322 (01/07), "Network node
        interface for the synchronous digital hierarchy (SDH)", January
        2007.

   [20] ITU-T Recommendation G.805 (03/00), "Generic functional
        architecture of transport networks", March 2000.

   [21] ITU-T Recommendation Y.1731 (02/08), "OAM functions and
        mechanisms for Ethernet based networks", February 2008.

   [22] IEEE Standard 802.1AX-2008, "IEEE Standard for Local and
        Metropolitan Area Networks - Link Aggregation", November 2008.

   [23] Le Faucheur, F., Wu, L., Davie, B., Davari, S., Vaananen, P.,
        Krishnan, R., Cheval, P., and J. Heinanen, "Multi-Protocol Label
        Switching (MPLS) Support of Differentiated Services", RFC 3270,
        May 2002.

   [24] Bocci, M., Swallow, G., and E. Gray, "MPLS Transport Profile
        (MPLS-TP) Identifiers", RFC 6370, September 2011.

   [25] Winter, R., Ed., van Helvoort, H., and M. Betts, "MPLS-TP
        Identifiers Following ITU-T Conventions", Work in Progress, July
        2011.

11.  Contributing Authors

   Ben Niven-Jenkins
   Velocix

   EMail: ben@niven-jenkins.co.uk


   Annamaria Fulignoli
   Ericsson

   EMail: annamaria.fulignoli@ericsson.com


   Enrique Hernandez-Valencia
   Alcatel-Lucent

   EMail: Enrique.Hernandez@alcatel-lucent.com








Busi & Allan                  Informational                    [Page 60]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


   Lieven Levrau
   Alcatel-Lucent

   EMail: Lieven.Levrau@alcatel-lucent.com


   Vincenzo Sestito
   Alcatel-Lucent

   EMail: Vincenzo.Sestito@alcatel-lucent.com


   Nurit Sprecher
   Nokia Siemens Networks

   EMail: nurit.sprecher@nsn.com


   Huub van Helvoort
   Huawei Technologies

   EMail: hhelvoort@huawei.com


   Martin Vigoureux
   Alcatel-Lucent

   EMail: Martin.Vigoureux@alcatel-lucent.com


   Yaacov Weingarten
   Nokia Siemens Networks

   EMail: yaacov.weingarten@nsn.com


   Rolf Winter
   NEC

   EMail: Rolf.Winter@nw.neclab.eu











Busi & Allan                  Informational                    [Page 61]

RFC 6371         OAM Framework for MPLS-Based Transport   September 2011


Authors' Addresses

   Dave Allan
   Ericsson

   EMail: david.i.allan@ericsson.com


   Italo Busi
   Alcatel-Lucent

   EMail: Italo.Busi@alcatel-lucent.com







































Busi & Allan                  Informational                    [Page 62]