Internet DRAFT - draft-liu-mpls-tp-p2mp-linear-protection

draft-liu-mpls-tp-p2mp-linear-protection







MPLS Working Group                                                G. Liu
Internet-Draft                                           ZTE Corporation
Intended status: Informational                            March 13, 2013
Expires: September 14, 2013


          Applicability of MPLS-TP Linear protection for p2mp
              draft-liu-mpls-tp-p2mp-linear-protection-01

Abstract

   In MPLS-TP requirement document(rfc5654), there is a requirement to
   support 1+1 and 1:n protection for p2mp connectivity.  The
   requirement was described in MPLS-TP Survivability Framework
   document(RFC 6372) and draft-ietf-mpls-tp-p2mp-framework.  The basic
   protocol for linear protection was specified in the MPLS-TP Linear
   Protection document [RFC 6378] but is limited to 1+1 and 1:1
   protection for p2p connectivity.  in addtion, The 1:N protection in
   which all of working transport paths and the protection path have the
   same end points was specified in MPLS-TP 1:N protection document
   (draft-ietf-mpls-tp-1toN-protection).This document applies the
   existing PSC(RFC 6378) and extensive PSC protocol(draft-ietf-mpls-tp-
   1toN-protection) to support scenarios of protecting the p2mp path by
   extending the existing p2p linear protection mechanism.  .


   This document is a product of a joint Internet Engineering Task
   Force(IETF) / International Telecommunications Union
   Telecommunications Standardization Sector (ITU-T) effort to include
   an MPLS Transport Profile within the IETF MPLS and PWE3 architectures
   to support the capabilities and functionalities of a packet transport
   network as defined by the ITU-T.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."




Liu                    Expires September 14, 2013               [Page 1]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   This Internet-Draft will expire on September 14, 2013.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

   This document may not be modified, and derivative works of it may not
   be created, and it may not be published except as an Internet-Draft.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  1+1 p2mp protection . . . . . . . . . . . . . . . . . . .   3
     1.2.  1:1 p2mp per-tree protection  . . . . . . . . . . . . . .   4
     1.3.  1:1 p2mp per-leaf protection  . . . . . . . . . . . . . .   5
     1.4.  1:1 p2mp branch path protection . . . . . . . . . . . . .   5
     1.5.  1:n p2mp shared protection  . . . . . . . . . . . . . . .   6
   2.  Conventions used in this document . . . . . . . . . . . . . .   7
   3.  Coordination protocol . . . . . . . . . . . . . . . . . . . .   8
   4.  Switch Procedure  . . . . . . . . . . . . . . . . . . . . . .   8
     4.1.  1+1 protection operation  . . . . . . . . . . . . . . . .   9
     4.2.  1:1 p2mp per-tree protection operation  . . . . . . . . .   9
     4.3.  1:1 p2mp per-leaf protection operation  . . . . . . . . .   9
     4.4.  1:1 p2mp branch path protection operation . . . . . . . .  10
     4.5.  1:n p2mp shared protection operation  . . . . . . . . . .  10
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   7.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  11
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  11
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  11
     8.3.  URL References  . . . . . . . . . . . . . . . . . . . . .  11
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  11

1.  Introduction





Liu                    Expires September 14, 2013               [Page 2]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   The MPLS Transport Profile(MPLS-TP) Requirement document(RFC5654) and
   MPLS-TP P2MP Framework document both describe the requirement that
   unidirectional 1+1 and 1:n protection for p2mp connectivity must be
   supported.  while the MPLS-TP Survivability Framework(RFC6372) is
   only a framework for survivability in MPLS-TP network.

   MPLS-TP Linear protection document(RFC6378) defines a Protection
   State Coordination(PSC) protocol that supports 1+1 and 1:1 protection
   architectures descirbed in MPLS-TP Survivability Framework.  The PSC
   protocol is a single-phase protocol that allows the two endpoints of
   the protection domain to coordinate the protection switching
   operation when a change of state is detected on the transport path of
   the protection domain.

   MPLS-TP 1:N protection document(draft-ietf-mpls-tp-1toN-protection)
   uses a two-phase extensive PSC protocol to protect multiple working
   paths by a single protection path.

   As for the p2mp path, It has multiple leaf nodes and is still
   undirectional, so it is not good for p2mp path to use the protection
   mechanism in RFC6378 and draft-ietf-mpls-tp-1toN-protection.  The
   document is an applicability of the existing PSC protocol and the
   extensive PSC protocol to support protection of p2mp path by
   extending the existing linear protection mechanism.

1.1.  1+1 p2mp protection

   This protection is a specific protection that use one designated
   protection path to protect one working path.  It is fully pre-
   allocated in the sense that the route and bandwidth resource of the
   protection path is reserved for the working path, The source root
   node will bridge both the working path and the protection path at the
   same time.  while the sink leaf nodes will select one of the two
   paths to receive the traffic . As it is unnecessary to coordinate the
   switch state between the root node and the leaf nodes , the PSC
   protocol is not needed in the 1+1 protection mechanism.




                                                            +---+
                                                           +| L1|
                                                          + +---+
                                                        +   @
                                                      +    @
                                                    +     @
                     +---+           +-------------+     @
                     | r |+ + + + +->| woking path |    @



Liu                    Expires September 14, 2013               [Page 3]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


                     +---+           |             |   @
                          @          +-------------+  @
                            @                       +
                              @                     @  +
                                @     +------------+     +    +---+
                                  @   | protection | @ @ @ @  | L2|
                                    @ |   path     |          +---+
                                      +------------+





                     NOTE:
                        @@@@@@: p2mp protection  path
                        +++++:  p2mp working path





                       Figure 1: 1+1 p2mp protection

   Figure 1 shows a protection domain with one working path and its
   corresponding protection path.For 1+1 protection mechanism, the p2mp
   traffic must be transported on both working path and protection path
   at any time.  So the source root node always bridges the p2mp traffic
   into both working path and protection path.  While the sink leaf node
   L1 and L2 will select one of the two paths to receive the traffic
   based on the performance of the two paths.  It isn't necessary to
   coordinate the switch state between the source root node and the sink
   leaf nodes.  So it can't use the PSC protocol for the protection
   mechanism;

1.2.  1:1 p2mp per-tree protection

   The protection mechanism will still use one designated p2mp
   protection path to protect one p2mp working path.While the source
   root node only bridges one of the two paths at any time.  All sink
   leaf nodes select the same p2mp path to receive the traffic.  In
   addition, As the root node and leaf nodes need to coordinate to
   select the same p2mp path to send and receive the p2mp traffic.  it
   Must use the existing PSC protocol to coordinate the switch state
   between the root node and the leaf nodes.

   Just as the above figure 1, Under normal condition, The p2mp traffic
   will be transported by only the working path from node r to node L1
   and L2.  When a defect is detected on the working path.  the source



Liu                    Expires September 14, 2013               [Page 4]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   node r will bridge the traffic into its corresponding protection
   path.  Then it should send PSC packet to all leaf nodes L1 and L2 to
   notify them to select the protection path to receive the p2mp
   traffic.

1.3.  1:1 p2mp per-leaf protection

   This protection is similar to the above protection mechanism.It still
   needs to pre-configure one p2mp protection path to protect a p2mp
   working path.  When a defect is detected on the working path.  the
   source root node firstly bridge both the working path and the
   protection path to send the traffic on both paths.  While the leaf
   nodes will select one of the two paths to receive the traffic based
   on whether the working path has defect.  Here it is unnecessary to
   use PSC protocol to coordinate the switch state between the root node
   and the leaf nodes.

   Just as the above figure 1,When a defect is detected on one branch
   path of the p2mp working path, For example, Path(r-L1) or path(r-L2)
   has a defect, The source root node r will firstly send the traffic on
   both the working path and the protection path.  L1 or L2 will select
   one of the two paths to receive the traffic based on whether to have
   a defect on its branch path(r-L1) or path(r-L2)..

1.4.  1:1 p2mp branch path protection

   The protection mechanism will pre-configure one p2p protection path
   for each branch path of a p2mp working path.  Each branch path is
   disjointed from its p2p protection path.  The protection mechanism is
   similar to 1:1 protection mechanism in MPLS-TP linear
   protection(RFC3678), It needs to use the PSC protocol to coordinate
   the switch state between the root node and the leaf nodes.



                                                            +---+
                                           @  @  @  @  @  @ | L1|
                                        @                  ++---+
                                    @                    +
                                 @                     +
                              @                     +
                     +---+ @         +-------------+
                     | r |+ + + + +->| woking path |
                     +---+           |             |
                           @         +-------------+
                               @                    +
                                   @                   +
                                       @                 +    +---+



Liu                    Expires September 14, 2013               [Page 5]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


                                            @               + | L2|
                                                @  @  @   @   +---+






                     NOTE:
                        @@@@@@: p2p protection  path
                        +++++:  p2mp working path





                                 Figure 2

   Just as the above figure 2, It will pre-configure one p2p protection
   path for each branch path(r-L1) and (r-L2) individually.When a defect
   is detected on the branch path.  the root node r will send PSC packet
   to its peer leaf node L1 or L2 immediately , Then the protected
   traffic will be switched into its p2p protection path to be
   transported.  While the leaf node L1 or L2 will select the protection
   path to receive the traffic

1.5.  1:n p2mp shared protection

   The protection will pre-configure one p2mp shared protection path to
   protect multiple p2mp working paths which maybe have differnet end
   points.  So the leaf nodes of the p2mp shared protection path are all
   leaf nodes of these protected p2mp working paths.When a defect is
   deteced on a working path, the root node of the protection path will
   send the existing extensive PSC protocol packet to its leaf nodes to
   identify which p2mp working path will be selected to be protected.
   When the leaf node receives the PSC packet and decides how to process
   the traffic packet from the p2mp shared protection path.Just as
   figure 3.



                                                              +---+
                                                           +->| L1|
                                                          +   +---+
                                                        +   @
                                                      +    @
                                                    +     @
                     +---+           +-------------+     @



Liu                    Expires September 14, 2013               [Page 6]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


                     | r |+ + + + +->| P2MP path 1 |    @
                     +---+           |             |   @
                       $  @          +-------------+  @
                            @                         +
                        $      @                     @  +
                                @     +------------+     +     +---+
                          $       @   | protection | @ @ @ @-> | L2|
                                    @ |   path     |          $+---+
                            $         +------------+       $
                                                     @   $
                               $                       @
                                      +------------+ $  @     +---+
                                 $    |  P2MP      |$ $ $ @-> | L3|
                                   $  |  Path 2    |          +---+
                                      +------------+



                     NOTE:
                        @@@@@@: p2mp shared protection path
                        +++++:  p2mp working path 1
                        $$$$$:  p2mp working path 2





                                 Figure 3

   A single p2mp shared protection path is used to protect p2mp working
   path 1 and p2mp working path 2.  node L1 and L2 are the sink leaf
   nodes of the p2mp working path 1.  While node L2 and L3 are the sink
   leaf nodes of the p2mp working path 2.  The leaf nodes of the p2mp
   shared protection path are L1 , L2 and L3.When a defect is detected
   on both the working path 1 and the working path 2 at the same time.
   The root node r of the p2mp shared protection path will select a
   higher priority working path to be protected.  Then the source root
   node sends extensive PSC protocol packet to all leaf nodes L1,L2 and
   L3 by the p2mp shared protection path.The leaf nodes L1,L2 and L3 can
   judge whether to receive the traffic from the protection path based
   on the extensive PSC protocol packet.

2.  Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119.




Liu                    Expires September 14, 2013               [Page 7]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   OAM: Operations, Administration, Maintenance

   LSP: Label Switched Path.

   TLV: Type Length Value

   P2MP:Point to Multi-Point

   P2P:Point to Point

   PSC:Protection State Coordination

   SD:Signal Degrade

   SF:Signal Fail

   NR No Request

   MPLS:Multi-Protocol Label Switching

   MPLS-TP:Multi-Protocol Label Switching Transport Profile

3.  Coordination protocol

   Some protection mechanisms in this document need PSC protocol to
   coordinate switch state between end points of a protection domain.
   It will use the existing PSC protocol to be defined in MPLS-TP Linear
   protection(RFC6378) in the 1:1 p2mp protection scenario including 1:1
   p2mp per-tree protection , 1:1 P2MP branch path protection.  The PSC
   protocol in detail maybe reference to the MPLS-TP linear
   protection(RFC6378).  While 1:n shared p2mp protection may use the
   extensive PSC protocol defined in the MPLS-TP 1:N protection(draft-
   ietf-mpls-tp-1ton-protection) to implement the protection.So the
   procedure of extensive PSC protocol maybe reference to the mpls-tp
   1:N protection document.  But the 1:n shared p2mp protection in this
   document only uses single-phase protocol which is different from the
   1:n protection for p2p path.  And it is only non-locking operation
   and the value of L field can't be set.  In addition, It is
   unnecessary for the protection mechanism to wait for peer node's
   Acknowledge(WFA), So the parameter of WFA timer isn't necessary in
   this document.

4.  Switch Procedure








Liu                    Expires September 14, 2013               [Page 8]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   In all above protection mechanisms, They must firstly pre-configure
   protection path for one or multiple p2mp working path.  Then They
   detect whether to have a defect on the working path.  If a defect is
   detected, the end point of the p2mp working path will swich the
   traffic from its working path to its pre-configurated protection path

4.1.  1+1 protection operation

   The procedure of 1+1 protection operation is the following :

   1 Under normal condition, The root node bridges the protected p2mp
   traffic into its working path and protection path, While its sink
   leaf nodes will select the working path to receive the traffic.

   2 A defect is detected on the working path, some leaf nodes will
   select its protection path to receive the traffic packet which have
   defect on their branch path.of the working path

4.2.  1:1 p2mp per-tree protection operation

   The procedure of this protection switch is the following phase:

   1 Under normal condition, The root node and leaf nodes will send or
   receive the traffic by their working path.And the root node will send
   NR(0,0) to all leaf nodes by PSC packet.

   2 When a defect is already detected on the working path, the root
   node will bridge from the working path to its corresponding
   protection path.  Then send SF(1,1) to all leaf nodes by PSC packet..

   3 The leaf nodes receive the SF(1,1) PSC packet, All of them will
   switch to receive the traffic by their protection path.

4.3.  1:1 p2mp per-leaf protection operation

   The procedure of the protection is the following :

   1 The root node will select its working path to send the traffic
   under normal condition ,And each leaf node still selects the working
   path to receive the traffic.

   2 When a defect is detected on a branch path of the p2mp working
   path.  the root node will bridge both the working path and the
   protection path . The leaf node will select one of the two paths to
   receive the traffic based on whether a defect happens on the working
   path.





Liu                    Expires September 14, 2013               [Page 9]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   3 If a leaf node detect a defect on its branch path of the p2mp
   working path, IT will select its corresponding protection path to
   receive the p2mp traffic packet.  or else, it will continue to
   receive the p2mp traffic packet from its working path.

4.4.  1:1 p2mp branch path protection operation

   The procedure of the protection operation is the following :

   1 Under normal condition, The root node and all leaf nodes of a p2mp
   traffic will select their p2mp working path to send and receive the
   traffic.  At the same time, The root node sends NR(0,0) PSC packet to
   each leaf node by its p2p protection path periodically.

   2 When a defect is detected on a branch path of the p2mp working
   path, The root node will bridge the traffic into its corresponding
   p2p protection path and send SF(1,1) PSC packet to the leaf node of
   the failed branch path.

   3 The leaf node receives SF(1,1) PSC packet,It will switch from the
   working path to the p2p protection path to receive the traffic.Other
   leaf nodes will still receive the traffic from the working path.

4.5.  1:n p2mp shared protection operation

   the procedure of this protection operation is the following :

   1 Under normal condition, The root node and all leaf nodes will
   select their p2mp working path to send and receive the traffic, The
   root node sends NR(0,0) PSC packet to all leaf nodes of the p2mp
   protection path periodically.

   2 A defect is detected on one or multiple p2mp working path , The
   root node will select the highest priority working path to be
   protected.and send SF(n,n) to all leaf nodes of the shared protection
   path.  Here n indicates the identifier index of the p2mp working path
   to be protected.At the same time, The root node begin to send the
   traffic to be selected on the p2mp shared protection path.

   3 When all leaf nodes of the p2mp shared protection path receive
   SF(n,n) PSC packet.  they will know whether to receive the traffic
   from the p2mp shared protection path.  If a leaf node is a sink node
   of the p2mp working path to be protected, it will receive the traffic
   from the shared protection path.  or else, It directly abandon the
   traffic from the p2mp shared protection path.

5.  Security Considerations




Liu                    Expires September 14, 2013              [Page 10]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   TBD

6.  IANA Considerations

   TBD

7.  Acknowledgments

   TBD

8.  References

8.1.  Normative References

   [RFC5654]  IETF, "IETF RFC5654(MPLS-TP requirement) ", September
              2009.

   [RFC5921]  IETF, "IETF RFC5654(MPLS-TP framework) ", July 2010.

   [RFC6372]  IETF, "MPLS Transport Profile (MPLS-TP) Survivability
              Framework ", September 2011.

   [RFC6378]  IETF, "MPLS Transport Profile (MPLS-TP) Linear Protection
              ", November 2011.

8.2.  Informative References

   [draft-ietf-mpls-tp-1ton-protection-00]
              E. Osborne, F. Zhang, Y. Weingarten, , "MPLS-TP 1toN
              Protection ", August 2012.

   [draft-ietf-mpls-tp-p2mp-framework-00]
              D. Frost, S. Bryant,M. Bocci, L. Berger, , "A Framework
              for Point-to-Multipoint MPLS in Transport Networks",
              January 2013.

8.3.  URL References

   [MPLS-TP-22]
              IETF - ITU-T Joint Working Team, 2008,
              <http://www.example.com/dominator.html>.

Author's Address








Liu                    Expires September 14, 2013              [Page 11]

Internet-Draft       MPLS-TP P2MP Linear protection           March 2013


   Guoman Liu
   ZTE Corporation
   No.50, Ruanjian Road, Yuhuatai District
   Nanjing  210012
   P.R.China

   Phone: +86 025 88014227
   Email: liu.guoman@zte.com.cn










































Liu                    Expires September 14, 2013              [Page 12]