Internet DRAFT - draft-li-mpls-seamless-mpls-mbb

draft-li-mpls-seamless-mpls-mbb




Network Working Group                                         Zhenbin Li
Internet-Draft                                                    Lei Li
Intended status: Informational                       Huawei Technologies
Expires: August 17, 2014                     Manuel Julian Lopez Morillo
                                                 Vodafone Group Networks
                                                             Tianle Yang
                                                            China Mobile
                                                       February 13, 2014


                   Seamless MPLS for Mobile Backhaul
                   draft-li-mpls-seamless-mpls-mbb-01

Abstract

   This document introduces the framework of Seamless MPLS to integrate
   the mobile backhaul network with the core network.  New requirements
   of Seamless MPLS for mobile backhaul networks are defined and
   corresponding solutions are proposed.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on August 17, 2014.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.




Zhenbin Li, et al.       Expires August 17, 2014                [Page 1]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.1.  Scenarios for Network Architecture  . . . . . . . . . . .   4
     3.2.  Scenarios for Different Edge of Labeled BGP . . . . . . .   6
   4.  Requirements and Solutions  . . . . . . . . . . . . . . . . .   9
     4.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .   9
     4.2.  Scalability . . . . . . . . . . . . . . . . . . . . . . .  12
       4.2.1.  Auto Mesh and Enhancement . . . . . . . . . . . . . .  12
       4.2.2.  Service-Driven Tunnel . . . . . . . . . . . . . . . .  13
       4.2.3.  Auto Path Computation . . . . . . . . . . . . . . . .  13
     4.3.  Access Stitching  . . . . . . . . . . . . . . . . . . . .  14
       4.3.1.  Transport Layer Stitching . . . . . . . . . . . . . .  14
       4.3.2.  Service Layer Stitching technology  . . . . . . . . .  15
     4.4.  Reliability . . . . . . . . . . . . . . . . . . . . . . .  18
       4.4.1.  MRT FRR based on LDP MT . . . . . . . . . . . . . . .  18
     4.5.  Policy Control  . . . . . . . . . . . . . . . . . . . . .  18
     4.6.  OAM . . . . . . . . . . . . . . . . . . . . . . . . . . .  18
       4.6.1.  L3VPN PM  . . . . . . . . . . . . . . . . . . . . . .  19
       4.6.2.  IPFPM (IP Flow Performance Measurement) . . . . . . .  19
       4.6.3.  Service Path Visualization  . . . . . . . . . . . . .  19
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  20
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  20
   7.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  20
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  20
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  20
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  20
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  22

1.  Introduction

   Seamless MPLS [I-D.ietf-mpls-seamless-mpls] describes an architecture
   which can be used to extend MPLS networks to integrate access and
   core/aggregation networks into a single MPLS domain.  It provides a
   highly flexible and a scalable architecture and the possibility to
   integrate 100.000 of nodes.  One of the key elements of Seamless MPLS



Zhenbin Li, et al.       Expires August 17, 2014                [Page 2]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   is the separation of the service and transport plane: it can reduce
   the service specific configurations in network transport node.

   The main purpose of Seamless MPLS is to deal with the integration of
   access networks and core/aggregation networks.  The typical access
   devices taken into account are DSLAM(Digital Subscriber Link Access
   Multiplexer), etc.  Now the mobile backhaul service has been deployed
   widely, the requirement of the integration of mobile backhaul
   networks and core networks has been proposed.  Though some approaches
   of Seamless MPLS can be reused for the integration, there has to be
   some new issues to be dealt with when integrate these networks based
   on MPLS technologies.

   This document describes new requirements and solutions for Seamless
   MPLS to extend the core domain to integrate the mobile backhaul
   networks.  It can enable a flexible deployment of an end to end
   mobile backhaul service delivery.  Though the Seamless MPLS approach
   for the integration of the core network and the mobile network tries
   to use existing and well known protocols, some new features or
   protocol extensions have to be introduced for the integrated network
   to provide the unified service.

   Currently, this document focuses on end to end unicast LSP.
   Multicast will be described in the future version.

2.  Terminology

   This document uses the following terminology:

   o  ABR: Area Border Router

   o  ASBR: AS Border Router

   o  ASG: Aggregation Site Gateway

   o  CSG: Cell Site Gateway

   o  LFA: Loop Free Alternate

   o  NPE: Network Provider Edge

   o  PE: Provider Edge

   o  RNC: Radio Network Controller

   o  RSG: RNC Site Gateway

   o  SPE: Switching Provider Edge



Zhenbin Li, et al.       Expires August 17, 2014                [Page 3]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   o  UPE: Under Provider Edge

3.  Scenarios

   Existing mobile backhaul networks have different topology and network
   architectures composed by devices with variable capability . Seamless
   MPLS should be able to adapt to different scenarios to support the
   integration of mobile backhaul networks.

3.1.  Scenarios for Network Architecture

   Mobile backhaul networks are usually built using hierarchical network
   structure with access network, aggregation network and core network.
   These networks are always separated by AS or IGP area.  Along with
   the progress of network integration, the integration network can be
   summarized as following scenarios.

   Network Architecture 1: Network separated by ASes

   In current networks it is common that the core network and the mobile
   backhaul network have different AS numbers.  The core network usually
   uses a public AS number for internet connection.  On the other hand
   the mobile backhaul network including access network and aggregation
   network usually uses a private AS number just for local services.  So
   the integrated end-to-end service means to across different ASes.

   Scenario 1: ASes connected by different ASBRs

   This is the most common scenario.  In this scenario there are
   redundant ASBRs in each AS to connect with the other AS back to back.

      |                        Service                       |
      |------------------------------------------------------|
      |       AS-X         |              |      AS-Y        |
      |(Access/Aggregation)|              |     (Core)       |
      |--------------------|              |------------------|
      |                    |              |

                        +-----+       +-----+
                     ...|ASBR1|-------|ASBR3|....
    +----+   ........   +-----+       +-----+    .......   +----+
    | PE |...                                           ...| PE |
    +----+  .....                                   .....  +----+
                 .....  +-----+       +-----+  .....
                      ..|ASBR2|-------|ASBR4|..
                        +-----+       +-----+
           Figure 1 Redundant ASBRs connected Back to Back




Zhenbin Li, et al.       Expires August 17, 2014                [Page 4]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   The transport layer of Seamless MPLS for this scenario is the same as
   the Option C Inter-AS VPN scenario defined by [RFC4364].  In this
   scenario, Seamless MPLS uses label distribution enabled IBGP and EBGP
   to establish the end-to-end BGP LSP to support services (using IPv4
   as the example).

   o  IBGP distributes the PE's 32/ route to ASBRs in source AS (P
      devices need not know the PE's 32/ route).

   o  EBGP redistributes labeled IPv4 routes from source AS to
      neighboring AS.

   o  IBGP distributes the PE's 32/ route from ASBRs to ingress PEs in
      target AS.

   Scenario 2: ASes connected by integrated ASBRs

   In this scenario there are still redundant ASBRs in each AS.  But
   these ASBRs integrates together to reduce a pair of devices.  This
   scenario can effectively reduce the number of devices and costs.
   Other devices in each AS such as PEs and Ps need not be impacted.

      |                 Service                |
      |----------------------------------------|
      |       AS-X         |       AS-Y        |
      |(Access/Aggregation)|      (Core)       |
      |--------------------|-------------------|
      |                    |                   |

                        +-----+
                     ....ASBR1|....
    +----+   ........   +-----+    .......   +----+
    | PE |...                             ...| PE |
    +----+  .....                     .....  +----+
                 .....  +-----+  .....
                      ...ASBR2|..
                        +-----+
               Figure 2 Integrated ASBRs

   The transport layer of Seamless MPLS for this scenario is similar
   with the network architecture 1 (using IPv4 as the example).

   o  The same in each AS domain.  Still use IBGP to distribute the PE's
      32/ routes.

   o  The integrated ASBR should support two different ASes and can
      redistribute the labeled IPv4 routes from one AS to neighboring
      AS.



Zhenbin Li, et al.       Expires August 17, 2014                [Page 5]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   Network Architecture 2: Different network integrated in one AS but
   separated by different IGP areas

   This scenario is far different from most of current mobile backhaul
   networks.  Core network is deployed in a same AS with access/
   aggregation network.  The core network, aggregation network and
   access network are just separated by IGP areas for scalability.

     |                 Service                |
     |----------------------------------------|
     |                   AS                   |
     |----------------------------------------|
     |       IGP-X        |        IGP-Y      |
     |(Access/Aggregation)|        (Core)     |
     |--------------------|-------------------|
     |                    |                   |
                        +----+
                    ... |ABR1|....
   +----+   ........    +----+    .......   +----+
   | PE |...                             ...| PE |
   +----+  .....                     .....  +----+
                .....   +----+  .....
                     ...|ABR2|..
                        +----+
     Figure 3 Integrated network in one AS

   In this scenario, Seamless MPLS uses labeled IBGP to establish the
   end-to-end BGP LSP to support services.

3.2.  Scenarios for Different Edge of Labeled BGP

   Devices in existing mobile backhaul networks vary in capacity.
   Labeled BGP capability may not be able to be supported by all
   devices, especially by lower level nodes in access network.  Seamless
   MPLS based on labeled BGP technology should adapt to different
   situations.  Based on the location of the edge of labeled BGP, there
   should be three possible scenarios.

   Scenario 1: Cell Site/User PE devices as the edge of labeled BGP

   The transport layer in this scenario should be totally end-to-end BGP
   LSP.  The scenario requires the ingress PE(access devices) to
   encapsulate a three-label stack on the packet.  This requirement
   maybe difficult to be satisfied by all kinds of access devices,
   especially access devices with very low capacity.






Zhenbin Li, et al.       Expires August 17, 2014                [Page 6]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


      |       AS-X         |              |       AS-Y        |
      |(Access/Aggregation)|              |      (Core)       |
      |--------------------|              |-------------------|
      |                    |              |                   |

                        +-----+       +-----+
                     ...|ASBR1|-------|ASBR3|....
    +----+   ........   +-----+       +-----+    .......   +----+
    | PE |...                                           ...| PE |
    +----+  .....                                   .....  +----+
                 .....  +-----+       +-----+  .....
                      ..|ASBR2|-------|ASBR4|..
                        +-----+       +-----+

      |                                                      |
      |                  Hierarchical BGP LSP                |
      +--------------------+--------------+------------------+
      |                    |              |                  |
      +--------------------+--------------+------------------+
      |   MPLS LDP/TE      | MPLS LDP/TE  |   MPLS LDP/TE    |
      |                    |              |                  |

         Figure 4 Labeled BGP ended at access devices

   Scenario 2: ASG nodes as the edge of labeled BGP

   In this scenario, access nodes(PEs) directly connected with eNodeB
   can not support labeled BGP.  Access nodes only support basic MPLS
   functionality with basic route functionality using static or default
   routes.  ASG devices should stitch MPLS LDP/TE LSP in access network
   and BGP LSP in aggregation/core network to support end-to-end
   services.



















Zhenbin Li, et al.       Expires August 17, 2014                [Page 7]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


      |       AS-X         |              |       AS-Y        |
      |(Access/Aggregation)|              |      (Core)       |
      |--------------------|              |-------------------|
      |                    |              |                   |

              +----+    +-----+       +-----+
              |ASG | ...|ASBR1|-------|ASBR3|....
    +----+   .+----+.   +-----+       +-----+    ...       +----+
    | PE |...                                         .....| PE |
    +----+  ..+----+                                  ..   +----+
              |ASG |..  +-----+       +-----+  .....
              +----+  ..|ASBR2|-------|ASBR4|..
                        +-----+       +-----+

   |           |            |            |                     |
   |           |Labeled IBGP|Labeled EBGP|    Labeled IBGP     |
   |           +------------+------------+---------------------+
   +-----------+            |            |                     |
   |MPLS LDP/TE+------------+            +---------------------+
   |           | MPLS LDP/TE|            |     MPLS LDP/TE     |
   |           |            |            |                     |

           Figure 5 Labeled BGP ended at ASG(P) devices

   Scenario 3: RSG(ASBR) devices as the edge of labeled BGP

   In this scenario devices in the access and aggregation network just
   support basic MPLS functionality.  ASBR nodes should stitch MPLS LDP/
   TE LSP in access/aggregation network and BGP LSP in core network for
   end-to-end service across different domains.





















Zhenbin Li, et al.       Expires August 17, 2014                [Page 8]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


      |       AS-X         |              |       AS-Y        |
      |(Access/Aggregation)|              |     (Core)        |
      |--------------------|              |-------------------|
      |                    |              |                   |

                        +-----+       +-----+
                     ...|ASBR1|-------|ASBR3|....
    +----+   ........   +-----+       +-----+    .......   +----+
    | PE |...                                           ...| PE |
    +----+  .....                                   .....  +----+
                 .....  +-----+       +-----+  .....
                      ..|ASBR2|-------|ASBR4|..
                        +-----+       +-----+

      |                    |              |                  |
      |                    | Labeled EBGP |   Labeled IBGP   |
      |                    +--------------+------------------+
      +--------------------+              +------------------+
      |    MPLS LDP/TE     |              |   MPLS LDP/TE    |

             Figure 6 Labeled BGP ended at ASBRs

4.  Requirements and Solutions

4.1.  Overview

   The typical mobile backhaul network is shown in the figure 1.  It
   usually adopts ring topology to save fiber resource and it is divided
   into the aggregate network and the access network.  Cell Site
   Gateways(CSGs) connects the eNodeBs and RNC Site Gateways(RSGs)
   connects the RNCs.  The mobile traffic is transported from CSGs to
   RSGs.



















Zhenbin Li, et al.       Expires August 17, 2014                [Page 9]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


                   ----------------
                  /                \
                 /                  \
                /                    \
   +------+   +----+    Access     +----+
   |eNodeB|---|CSG1|    Ring 1     |ASG1|-------------
   +------+   +----+               +----+             \
                \                    /                 \
                 \                  /                   +----+    +---+
                  \             +----+                  |RSG1|----|RNC|
                   -------------|    |    Aggregate     +----+    +---+
                                |ASG2|      Ring          |
                   -------------|    |                  +----+    +---+
                  /             +----+                  |RSG2|----|RNC|
                 /                  \                   +----+    +---+
                /                    \                 /
   +------+   +----+     Access     +----+            /
   |eNodeB|---|CSG2|     Ring 2     |ASG3|------------
   +------+   +----+                +----+
               \                     /
                \                   /
                 \                 /
                  -----------------

                  Figure 7 Mobile Backhaul Network

   Seamless MPLS [I-D.ietf-mpls-seamless-mpls] defines the possible
   requirements for the integration of the access network and the
   aggregation/core network.  In the mobile backhaul network, being
   different from the typical access devices(DSLAM, MSAN), CSGs and RSGs
   of the mobile backhaul network needs to support rich MPLS features
   such as path design, protection switch, OAM, etc., to provide SDH-
   like service.  On the other hand, CSGs have the same scalability
   limitations as access devices.  Seamless MPLS for mobile backhaul has
   to take into account the difference and the similarity and new
   requirements are proposed.

   1.  Requirements on MPLS TE

   In the mobile backhaul network, in order to provide SDH-like service,
   MPLS TE or MPLS TP technologies are always introduced besides MPLS
   LDP.  When integrate the core network and the mobile backhaul
   network, the interworking between IGP/BGP and RSVP-TE is inevitable.
   There are following requirements:

   -- Proxy Egress LSP and BGP LSP Stitching: When the end-to-end LSP
   setup in the Seamless MPLS domain, MPLS TE LSP in the mobile backhaul
   should be stitched with the BGP LSP in the core network.  In



Zhenbin Li, et al.       Expires August 17, 2014               [Page 10]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   addition, since the end-to-end MPLS TE LSP cannot setup spanning
   multiple areas, the proxy egress RSVP-TE LSP should be able to setup
   in the mobile backhaul network.

   -- OAM: There are complete OAM solutions for MPLS TE/MPLS-TP
   including fault management(FM) and performance monitoring(PM).  For
   IGP/BGP, the OAM mechanism, especially the performance monitoring
   mechanism is not enough.  Thus the end-to-end OAM for the mobile
   backhaul service can not be provided.  The Seamless MPLS architecture
   should propose unified OAM mechanisms to satisfy the requirements of
   the end-to-end services.

   -- Protection: The protection switch mechanism has been provided in
   the mobile backhaul network to achieve convergence in 50ms.  When
   integrate the core network, the end-to-end convergence in 50 ms
   should be guaranteed.

   -- Scalability: Comparing with MPLS LDP, there exists more
   scalability issues for MPLS TE.  Though the network scale can be
   controlled by dividing the network into multiple IGP areas in the
   Seamless MPLS domain, there is more complex configuration for MPLS TE
   than MPLS LDP since the rich MPLS TE properties should be specified.
   The provision issue has much negative effect on the scalability of
   MPLS-TE-based network.

   2.  Requirements on Ring Network

   In mobile backhaul network, CSGs always access the ring network.  The
   approaches proposed in the [I-D.ietf-mpls-seamless-mpls] face
   challenges in the ring network.

   -- LDP DoD: There exists multiple nodes from a CSG to an ASG in the
   ring network.  This means label request messages and label mapping
   messages should be sent through multiple nodes for LDP DoD.  If
   static routes are used, there are a great deal of routes which should
   be configured statically in the network.  This provision is hard to
   be accepted by the service provider.

   -- LFA(Loop Free Alternate): The route loop will be bound to happen
   in the ring network.  This means that the backup route does not exist
   in specific nodes of the ring network according to LFA.  If LDP is
   used and convergence in 50 ms must be guaranteed for the mobile
   backhaul service, the new FRR solution must be proposed to cover the
   whole network.

   3.  Requirements on L3VPN





Zhenbin Li, et al.       Expires August 17, 2014               [Page 11]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   FMC( Fixed Mobile Convergence ) is being taken into account for the
   mobile backhaul network.  In order to achieve higher scalability,
   L3VPN is provisioned to bear the mobile backhaul service besides PW.
   There are following requirements:

   -- Policy control: The routes in the L3VPN can be advertised in a
   larger scope comparing with the point-to-point PW setup in the L2VPN.
   Considering the limited capability of the access devices (CSGs),
   complex policy control on route advertisement has to be introduced.
   This cause the provision becomes complex and error-prone.
   Simplifying the policy control is mandatory in the Seamless MPLS
   domain.

   -- L3VPN OAM: There exists mature OAM mechanism based on PW for
   L2VPN.  The similar mechanism should be provided for the L3VPN to
   satisfy the SDH-like OAM requirement for the mobile backhaul service.

4.2.  Scalability

   [I-D.li-mpls-serv-driven-co-lsp-fmwk] describes the massive
   configuration issue for MPLS TE.  As the mobile backhaul service
   develops and the network scale expands, more and more LTE eNodeBs and
   associated Cell Site Gateways(CSGs) are added in the networks to
   connect the RNCs and associated RNC site gateways(RSGs).  This
   proposes the requirement of a great deal of MPLS TE tunnels which
   connect CSGs and RSGs.  Calculated using the typical MPLS TE tunnel
   configuration, there will be hundreds of thousands of command lines
   need to be configured for MPLS TE.  In addition, the return path
   issue for BFD for LSP will deteriorate the configuration work since
   the configuration is necessary to guarantee the return the path is
   the same as the forward path for MPLS TE tunnels.  Comparing with
   LDP, the provision work for MPLS TE is time-consuming and error-prone
   which has much negative effect on the scalability.  When Seamless
   MPLS is applied to the mobile backhaul network, the scalability of
   MPLS TE must be improved by effective solutions.

4.2.1.  Auto Mesh and Enhancement

   [RFC4972] proposes an automatic discovery mechanism to discover the
   set of LSR members of a mesh in order to automate the creation of
   mesh of TE LSPs.  Through Interior Gateway Protocol (IGP) routing
   extensions, the LSRs members of a specific mesh can be discovered.
   Then the LSR can trigger setup of MPLS TE tunnels to other LSRs of
   the same mesh.  [I-D.li-ccamp-role-based-automesh] proposes the
   optimization for the auto mesh mechanism.  In some application
   scenarios, it is not necessary to setup full mesh MPLS TE tunnels.
   The optimized auto mesh mechanism is to not only advertise the
   membership of a mesh, but also advertise the role of the member.



Zhenbin Li, et al.       Expires August 17, 2014               [Page 12]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   Thus the MPLS TE tunnel can setup based on both the membership and
   the role.  It can save the unnecessary setup of MPLS TE tunnels.

4.2.2.  Service-Driven Tunnel

   [I-D.li-mpls-serv-driven-co-lsp-fmwk] proposes the service-driven
   mechanism and framework for setup of MPLS TE tunnels.  LDP LSP has
   advantage over MPLS TE in scalability since LDP LSP setup is
   topology-driven which is a scalable way to adapt to the large-scale
   network.  On the other hand, MPLS TE LSP is always setup to bear
   specific services such as L3VPN and L2VPN.  That is, MPLS TE LSPs
   will not be setup aimlessly which is always inevitable for MPLS
   topology-driven LSP if there is no policy exerted on it.  So the
   service-driven mechanism is proposed to trigger MPLS TE LSP setup
   automatically by the service instead of explicitly configuring each
   tunnel and its traffic engineering attributes.  The service-driven
   method also has much advantage in the process of setting up co-routed
   TE LSPs.  The mobile backhaul service transported by MPLS TE LSPs is
   always bi-directional.  The characteristic can be utilized to setup
   the forward MPLS TE LSP and the co-routed reverse MPLS TE LSP.  The
   details of the procedures can refer to
   [I-D.li-mpls-serv-driven-co-lsp-fmwk].

4.2.3.  Auto Path Computation

   No matter the auto mesh mechanism or the service-driven mechanism is
   used to automate the creation of MPLS TE LSPs, several set of MPLS TE
   properties need to be specified for these MPLS TE tunnels.  If a
   group of tunnels can share one set of MPLS TE properties, they can be
   triggered to setup automatically.  On the contrary, if there are
   distinct MPLS TE properties for MPLS TE tunnels, the configuration
   work can not be saved since even if the auto tunnel mechanism is
   adopted the MPLS TE properties has to be configured for each tunnel
   which is like the current explicit configuring of traffic engineering
   properties of a tunnel.  For MPLS TE, the explicit path is such a
   tough thing which can have negative effect on the auto tunnel
   mechanism.  [I-D.li-ospf-auto-mbb-te-path] describes the scenarios of
   the mobile backhaul service in which the explicit path has to be
   used.  Accordingly TA (TE Area) and TL(TE Layer) are introduced for
   the design of MPLS TE network view.  Thus less MPLS TE properties
   need to be specified for MPLS TE tunnels and automation of path
   computation can be improved.  As a result the auto tunnel mechanism
   can be applied to improve the scalability of MPLS TE.








Zhenbin Li, et al.       Expires August 17, 2014               [Page 13]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


4.3.  Access Stitching

   To reduce the requirement on lower level network devices( access
   nodes/ ASG nodes, etc.) and keep these devices as simple as possible,
   the MPLS stitching technology should be deployed at the edge of
   labeled BGP nodes.  Thus nodes under the stitching points just need
   to support basic MPLS function with IGP or even just static routes.
   The position of the stitching point has been discussed in section
   3.2.  This section introduces the stitching solutions.

   1.  Transport layer stitching.  This kind of stitching technology
       ensures the transport LSP can setup end to end.  The service is
       just to deploy at the end points and the transit nodes in network
       need not perceive services.

   2.  Service layer stitching.  This kind of stitching technology
       establishes a hierarchical service end to end.  This technology
       can reduce the load of service session on access nodes.  But the
       stitching nodes need to perceive services.

4.3.1.  Transport Layer Stitching

   Transport layer stitching technology can stitch multi-segment
   transport LSPs together to establish an end-to-end LSP.

4.3.1.1.  Proxy TE

   In mobile backhaul network MPLS TE has been adopted to provide SDH-
   like service.  When the end-to-end LSP setup in the Seamless MPLS
   domain, MPLS TE LSP in the mobile backhaul network should be stitched
   with the BGP LSP in the core network.  [I-D.li-mpls-proxy-te-lsp]
   proposes the solution to setup proxy egress LSP by RSVP-TE.  When
   setup such LSP, there are two addresses will be carried by RSVP-TE
   Path/Resv messages: the actual destination address and the proxy node
   address.  RSVP-TE Path message will be sent along the path to the
   proxy node instead of the actual destination node.  When Path
   messages arrives at the proxy node, it will send back Resv message to
   allocate label and reserve resource.  The proxy node can use the
   actual destination address advertised by the Path message to stitch
   with BGP LSP.  With Proxy TE, the path for the LSP is calculated with
   the proxy node as the destination instead of its actual destination.
   So the MPLS TE information related with the path to the actual
   destination is not necessary to flood in the mobile backhaul network.
   This reduces the state maintenance and process burden of access
   nodes.






Zhenbin Li, et al.       Expires August 17, 2014               [Page 14]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


4.3.1.2.  Proxy LDP DoD

   If LDP DoD is adopted for Seamless MPLS in the mobile haul network,
   since there are multiple hops from the CSG to ASG or RSG, it is
   troublesome to configure static routes to a specific destination on
   all nodes.  Like Proxy TE, LDP can also setup proxy egress LSP by
   specifying the proxy node.  When setup such LSP, there are two
   addresses will be carried by LDP Label Request/Label Mapping
   messages: the actual destination address and the proxy node address.
   LDP Label Request message will be sent along the path to the proxy
   node instead of the actual destination node.  When Label Request
   messages arrives at the proxy node, it will sent back Label Mapping
   message to allocate label.  The proxy node can use the actual
   destination address advertised by the Label Request message to stitch
   with BGP LSP.  With Proxy LDP, the route for the proxy node will be
   used to setup LSP for the actual destination.  So the static routes
   for the actual destination are not necessary in the mobile backhaul
   network.  This reduces the route number and process burden of access
   nodes.

4.3.2.  Service Layer Stitching technology

   There is another stitching technology, which is not only just
   stitching transport layer but also stitching the service layer to
   help establish services across different domains.  Service layer
   stitching technology should coexist with common services in an MPLS
   network.
























Zhenbin Li, et al.       Expires August 17, 2014               [Page 15]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


                 +----+     +-----+       +-----+
               ..|SPE |  ...|ASBR1|-------|ASBR3|....
    +----+ .... .+----+.    +-----+       +-----+         +----+
    | UPE|.. ...                                       ...| PE |
    +----+  .....+----+                                .  +----+
                ..SPE |. .  +-----+       +-----+  ..
                 +----+   ..|ASBR2|-------|ASBR4|..
                            +-----+       +-----+

       |              Hierarchy End-to-End Service           |
       |                                                     |
       | Service1  |                 Service2                |
       +-----------+-----------------------------------------+
       |           |            |            |               |
       |           |Labeled IBGP|Labeled EBGP|  Labeled IBGP |
       |           +------------+------------+---------------+
       |           |            |            |               |
       +-----------+------------+            +---------------+
       |MPLS LDP/TE| MPLS LDP/TE|            |  MPLS LDP/TE  |
       |           |            |            |               |

          Figure 8 Architecture of Service Layer Stitching

   The general architecture of service layer stitching is shown in
   figure 8.  The service stitching technologies are related with
   different service types.

4.3.2.1.  L3 Service Stitching - Hierarchy of VPN (HoVPN)

   Hierarchy of VPN (HoVPN) can stitching two segment VPN in one domain
   together to establish a VPN service across different domains and
   simplify the process of access devices (AN/CSG).

   1.  Process of Control Plane

   o  UPEs provide the access service for users.  These UPEs act as CSG/
      AN to maintain the VPNv4 routes of the directly connected VPN
      sites and just default VPNv4 routes advertised from SPEs.  For
      transport layer UPEs just maintain LSPs to SPEs instead of
      establishing Hierarchical LSPs to all remote PEs.  For service
      layer UPEs just establish VPNv4 MP-BGP session with SPEs instead
      of establishing them with all remote PEs.

   o  SPEs maintain all VPNv4 routes of the VPN sites connected through
      the UPEs and PEs, including the routes from the local and the
      remote sites.  Instead of advertising routes from the remote sites
      to the UPEs, the SPE only advertises the default route carrying
      label to the UPEs for the specific VPN instance.  SPEs establish



Zhenbin Li, et al.       Expires August 17, 2014               [Page 16]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


      hierarchy LSPs through labeled BGP to all other PEs and basic LSPs
      /CR-LSPs through MPLS LDP/RSVP-TE to UPEs.

   2.  Process of Forwarding Plane

   o  UPEs stack two layer labels for packets to SPEs.  The bottom label
      is assigned by the SPE and it is associated with the default route
      in a particular VRF.  The top label is assigned by the UPE's IGP
      Next Hop, which is associated with to the /32 route to the SPE.

   o  When packets from UPEs arrive at SPEs, the bottom label associated
      with the default route in a particular VRF will introduce the
      packet to loop up the forwarding entry in corresponding VRF.  SPEs
      would send packets to remote PEs with three layer label stack.
      SPEs will swap the bottom label to a new bottom label which is
      assigned by remote PE.  The middle label is assigned by the ASBR,
      which is associated with the /32 route to the remote PE.  The top
      label is assigned by the SPE's IGP Next Hop, corresponding to the
      /32 route to the ASBR.

   In HoVPN, since the SPE will only advertise the label binding with
   the default route for a specific VRF to the UPE, it can greatly
   reduce the route load and the process burden in the UPE.

4.3.2.2.  L2VPN Service stitching- Multi-Segment PW

   Multi-Segment PW(MS-PW) can stitching two segment PW in one domain
   together to establish an end-to-en PW across different domains.  With
   MS-PW, it is not necessary to setup LDP remote sessions among the
   UPEs and the remote PEs.  It is just to setup LDP remote session
   among UPEs and SPEs.  Thus it can reduce the load and the process
   burden proposed by LDP remote sessions.

   1.  Process of Control Plane

   o  UPEs provide the access service for users.  These UPEs act as CSG/
      AN to establish LDP remote sessions with SPEs instead of
      establishing sessions with all remote PEs.

   o  SPEs establish SS-PW(Single-Segment PW) with UPEs and remote PEs
      and stitching(switch) these two SS-PW together to establish
      hierarchy PW services across different domains.

   2.  Process of Forwarding Plane

   The detail of process of the forwarding plane refers to
   [I-D.ietf-pwe3-ms-pw-requirements].




Zhenbin Li, et al.       Expires August 17, 2014               [Page 17]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


4.4.  Reliability

4.4.1.  MRT FRR based on LDP MT

   [I-D.li-rtgwg-ldp-mt-mrt-frr] describes the scenarios of LDP Multi-
   topology(MT) for unicast fast-reroute using Maximally Redundant
   Trees(MRT).  MRT FRR can provide 100% coverage for fast-reroute of
   unicast traffic and LDP multi-topology has been proposed to provide
   multi-topology-based unicast forwarding in the architecture.
   Combining MRT FRR and LDP MT can be easy to achieve the object of
   high reliability in IGP/LDP networks.  Ring topology has been widely
   adopted in mobile backhaul networks.  The route loop will be bound to
   happen in the ring network and the existing LFA technology cannot
   cover the whole network to implement fast reroute functionality.  MRT
   FRR based on LDP MT can be adopted in the mobile backhaul network
   using LDP to provide 100% coverage for fast-reroute.  And the
   solution can also be deployed uniformly in the core network using LDP
   to achieve high scalability.

4.5.  Policy Control

   BGP as a route protocol for inter-AS now is used for Seamless MPLS to
   establish end-to-end hierarchical LSP or deploy VPN services.  BGP
   route policy based on IP-Prefix or communities are usually used to
   control the path.  The design and configuration is complex and error-
   prone.  In fact, BGP in Seamless MPLS is used to propagate labeled
   BGP routes across different domains to implement network convergence.
   This means several contiguous BGP networks are under the uniform
   administration.  It is not like the traditional BGP networks which
   may be under the administration of different service providers.  In
   this cases, thinking on the security of the network can be reduced.
   On the contrary, when advertise routes in the Seamless MPLS domain,
   it is desirable for BGP to carry more information to help select
   routing more intelligently.  It can reduce the cost proposed by
   complex policy control design and be able to adapt to network change
   easily.

4.6.  OAM

   Mobile Backhaul is a sensitive network on latency timer, packet loss
   rate, performance and so on.  Therefore, unified OAM mechanism is
   necessary to ensure the end-to-end network management including fault
   and performance management.

   OAM mechanisms is complete and mature for L2VPN and MAC services.
   However, L3VPN are introduced in the mobile backhaul network for
   better scalability.  The OAM mechanisms for IP and L3VPN is not
   sufficient to satisfy the OAM requirement of the mobile service,



Zhenbin Li, et al.       Expires August 17, 2014               [Page 18]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   especially for performance monitoring.  On the other hand, the
   Seamless MPLS is in fact composed by multiple contiguous networks.
   More convenient mechanisms should be introduced for maintenance of
   the end-to-end path.

4.6.1.  L3VPN PM

   FMC becomes the requirement of mobile backhaul network and L3VPN is
   introduced to get better scalability for service provisioning.
   Unlike existing mature OAM mechanism based on PW for L2VPN, L3VPN
   lacks of similar mechanisms to satisfy the SDH-like OAM requirement
   for the mobile backhaul service.  [I-D.zheng-l3vpn-pm-analysis]
   analyzes the difficulty to implement performance monitoring for L3VPN
   owing to its MP2P or MP2MP service models.
   [I-D.dong-l3vpn-pm-framework] proposes the framework to implement
   L3VPN PM.  The point-to-point connection between two VRFs, called as
   VRF-to-VRF tunnel, is established.  Thus the existing MPLS OAM
   mechanisms based on P2P LSP models can be reused for L3VPN.

4.6.2.  IPFPM (IP Flow Performance Measurement)

   It is lack of effective performance monitoring mechanisms for IP-
   based mobile service.  The existing PM mechanism can not guarantee
   that the path of the injected OAM packets is same with the real
   traffic.  If out-of-order arrival of packets happens, the accuracy of
   the measurement result will be affected negatively for the IP
   service.

   [I-D.chen-coloring-based-ipfpm-framework] defines a new performance
   measurement mechanism for Service Level Agreement (SLA) verification
   and trouble shooting (e.g., fault localization or fault delimitation)
   named as IP Flow Performance Measurement (IPFPM).  This measurement
   mechanism can measure performance based on 5-tuple encapsulation
   information of IP flow without injecting any extra OAM packet to the
   flow.  The accuracy of the measurement result can be guaranteed even
   if out-of-order arrival of packets happens by setting one unused bit
   of the IP header of packets to "color" the packets into different
   color blocks.  The solution can adapt to various IP based network
   architecture (pure IP, L3VPN, etc.)

4.6.3.  Service Path Visualization

   Seamless MPLS provides an architecture to support end-to-end services
   across multi-separated IP/MPLS domains.  Existing path detect
   technologies (e.g. IP/LSP Ping and Trace) can only trace the path in
   different layers or different network segments.  So it is ineffective
   to get the end-to-end path combing these technologies for maintenance
   of the network.  On the other hand, existing technologies do not



Zhenbin Li, et al.       Expires August 17, 2014               [Page 19]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   encapsulate the same 5-tuple {source IP address, destination IP
   address, source port number, destination port number, IP protocol
   number} as the real traffic.  This means the path maybe be different
   between the OAM packets and the real flow's packets when there are
   more than one outgoing paths and the forwarding decision is
   determined by hash based on 5-tuple information in the IP packet.
   According to these new requirements, the new solution should be
   introduced to maintain the end-to-end path more conveniently.

5.  IANA Considerations

   This document makes no request of IANA.

6.  Security Considerations

   TBD.

7.  Acknowledgements

   The authors would like to thank Loa Andersson for his valuable
   comments and suggestions on this draft.  The authors would also like
   to acknowledge the important contributions of Yuanbin Yin on IPFPM
   and Service Path Visualization.

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

8.2.  Informative References

   [I-D.chen-coloring-based-ipfpm-framework]
              Chen, M., Liu, H., and Y. Yin, "Coloring based IP Flow
              Performance Measurement Framework", draft-chen-coloring-
              based-ipfpm-framework-01 (work in progress), February
              2013.

   [I-D.dong-l3vpn-pm-framework]
              Dong, J., Li, Z., and B. Parise, "A Framework for L3VPN
              Performance Monitoring", draft-dong-l3vpn-pm-framework-02
              (work in progress), January 2014.








Zhenbin Li, et al.       Expires August 17, 2014               [Page 20]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   [I-D.ietf-mpls-seamless-mpls]
              Leymann, N., Decraene, B., Filsfils, C., Konstantynowicz,
              M., and D. Steinberg, "Seamless MPLS Architecture", draft-
              ietf-mpls-seamless-mpls-05 (work in progress), January
              2014.

   [I-D.ietf-pwe3-ms-pw-requirements]
              Bocci, M. and L. Martini, "Requirements for Multi-Segment
              Pseudowire Emulation Edge-to-Edge (PWE3)", draft-ietf-pwe3
              -ms-pw-requirements-07 (work in progress), June 2008.

   [I-D.li-ccamp-role-based-automesh]
              Li, Z. and M. Chen, "Routing Extensions for Discovery of
              Role-based MPLS Label Switching Router (MPLS LSR) Traffic
              Engineering (TE) Mesh Membership", draft-li-ccamp-role-
              based-automesh-01 (work in progress), October 2013.

   [I-D.li-mpls-proxy-te-lsp]
              Li, Z. and X. Zeng, "Proxy MPLS Traffic Engineering Label
              Switched Path(LSP)", draft-li-mpls-proxy-te-lsp-00 (work
              in progress), July 2013.

   [I-D.li-mpls-serv-driven-co-lsp-fmwk]
              Li, Z. and J. Dong, "A Framework for Service-Driven Co-
              Routed MPLS Traffic Engineering LSPs", draft-li-mpls-serv-
              driven-co-lsp-fmwk-02 (work in progress), January 2014.

   [I-D.li-ospf-auto-mbb-te-path]
              Li, Z., Zhang, L., and Y. Liu, "OSPF Extensions for
              Automatic Computation of MPLS Traffic Engineering Path
              Using Traffic Engineering Layers and Areas", draft-li-
              ospf-auto-mbb-te-path-00 (work in progress), February
              2013.

   [I-D.li-rtgwg-ldp-mt-mrt-frr]
              Li, Z., Chou, T., Zhao, Q., and T. Yang, "Applicability of
              LDP Multi-Topology for Unicast Fast-reroute Using
              Maximally Redundant Trees", draft-li-rtgwg-ldp-mt-mrt-
              frr-02 (work in progress), April 2013.

   [I-D.zheng-l3vpn-pm-analysis]
              Zheng, L., Li, Z., Aldrin, S., and B. Parise, "Performance
              Monitoring Analysis for L3VPN", draft-zheng-l3vpn-pm-
              analysis-02 (work in progress), October 2013.

   [RFC4364]  Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
              Networks (VPNs)", RFC 4364, February 2006.




Zhenbin Li, et al.       Expires August 17, 2014               [Page 21]

Internet-Draft      Seamless MPLS for Mobile Backhaul      February 2014


   [RFC4972]  Vasseur, JP., Leroux, JL., Yasukawa, S., Previdi, S.,
              Psenak, P., and P. Mabbey, "Routing Extensions for
              Discovery of Multiprotocol (MPLS) Label Switch Router
              (LSR) Traffic Engineering (TE) Mesh Membership", RFC 4972,
              July 2007.

Authors' Addresses

   Zhenbin Li
   Huawei Technologies
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: lizhenbin@huawei.com


   Lei Li
   Huawei Technologies
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: lily.lilei@huawei.com


   Manuel Julian Lopez Morillo
   Vodafone Group Networks
   Parque Empresarial Castellana Norte. Isabel Colbrand 22
   Madrid  28050
   Spain

   Email: manuel-julian.lopez@vodafone.com


   Tianle Yang
   China Mobile
   32, Xuanwumenxi Ave.
   Beijing  01719
   China

   Email: yangtianle@chinamobile.com









Zhenbin Li, et al.       Expires August 17, 2014               [Page 22]