Internet DRAFT - draft-liu-mpls-tp-ring-protection-switching

draft-liu-mpls-tp-ring-protection-switching






MPLS Working Group                                                G. Liu
Internet-Draft                                           ZTE Corporation
Intended status: Standards Track                                   Y. Ji
Expires: June 17, 2012                                   BUPT University
                                                                   j. Yu
                                                         ZTE Corporation
                                                       December 15, 2011


    Multiprotocol Label Switching Transport Profile Ring Protection
             draft-liu-mpls-tp-ring-protection-switching-00

Abstract

   according to RFC 5654 MPLS-TP Requirement, there is a paragraph for
   recovery requirements just as section 2.5.6.1 in RFC5654 describles:
   within the context of recovery in MPLS-TP networks,the optimization
   criteria considered in ring topologies are as follows: 1 minimize the
   number of OAM entities that are needed to trigger the recovery
   operation; 2 Minimize the number of elements of recovery in the ring;
   3 Minimize the number of labels required for the protection paths
   across the ring; 4 minimize the amount of control and management
   plane transactions during maintenance operation. this document will
   describle two types of ring protection solutions to implement these
   requirements.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.  This document may not be modified,
   and derivative works of it may not be created, and it may not be
   published except as an Internet-Draft.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on June 17, 2012.

Copyright Notice

   Copyright (c) 2011 IETF Trust and the persons identified as the



Liu, et al.               Expires June 17, 2012                 [Page 1]

Internet-Draft           MPLS-TP ring protection           December 2011


   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Conventions used in this document  . . . . . . . . . . . . . .  3
   3.  proposed ring protection solution  . . . . . . . . . . . . . .  4
     3.1.  solution 1 . . . . . . . . . . . . . . . . . . . . . . . .  4
     3.2.  solution 2 . . . . . . . . . . . . . . . . . . . . . . . .  7
       3.2.1.  P2P Instance . . . . . . . . . . . . . . . . . . . . .  7
       3.2.2.  P2MP Instance  . . . . . . . . . . . . . . . . . . . .  9
   4.  Security Considerations  . . . . . . . . . . . . . . . . . . . 12
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 12
   6.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 12
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     7.1.  Normative References . . . . . . . . . . . . . . . . . . . 13
     7.2.  Informative References . . . . . . . . . . . . . . . . . . 13
     7.3.  URL References . . . . . . . . . . . . . . . . . . . . . . 14
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14





















Liu, et al.               Expires June 17, 2012                 [Page 2]

Internet-Draft           MPLS-TP ring protection           December 2011


1.  Introduction

   this draft mainly describes two ring protection solutions, solution 1
   will use one protecting SPME to protect one working SPME when there
   is a defect on the working SPME. while solution 2 will use one
   protecting LSP to protect one working LSP.They are similar to 1:1
   linear protection. but the difference is the first solution may
   protect many LSP working paths of one SPME. and the second one may
   just protect one working LSP path.


2.  Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119.

   OAM: Operations, Administration, Maintenance

   LSP: Label Switched Path.

   TLV: Type Length Value

   LSR:Label Switching Router

   P2MP:Point to Multi-Point

   P2P:Point to Point

   APS:Automatic Protection Switch

   PSC:Protection Switching Coordination

   SD:Signal Degrade

   SF:Signal Fail

   BFD:Bidirectional Forward Detection

   MPLS:Multi-Protocol Label Switching

   MPLS-TP:Multi-Protocol Label Switching Transport Profile

   TTSI:Trail Termination Source Identifier_source LER ID+LSP ID

   MEP:MEG End Point

   LER: Label Edge Router



Liu, et al.               Expires June 17, 2012                 [Page 3]

Internet-Draft           MPLS-TP ring protection           December 2011


   CC&CV: Check continuity and connectivity verification

   SPME: Sub-Path maintenace entity


3.  proposed ring protection solution

   this section mainly proposed two types of ring protection
   solution.the two ring protection solutions need to detect and notify
   the defect by OAM and APS functions,so that the source node of
   working SPME and LSP path will switch these protected services into
   protecting SPME and LSP path.but the two ring protection solutions
   also have a few differences. solution 1 provides recovery of all LSP
   services of a defective working SPME by protecting SPME ,while
   another solution just provides one dedicate protecting path for each
   working LSP path.

3.1.  solution 1

   This ring protection solution in MPLS-TP network mainly use
   protecting SPME to protect working SPME .firstly two transfer nodes
   will be selected in the ring. and the two transfer nodes would backup
   for each other to ensure to transport service under the condition
   that one prime transfer node has failure.other nodes in the ring need
   to set up two bidirectional SPME separately in the direction of
   clockwise and anticlockwise along the ring to the two transfer nodes
   ; and use CC or CV packet to detect defect on each SPME.

   when an end point of a working SPME detects a defect on its own SPME
   , it will generate a State notify message (PSC) to be sent to another
   end point of the SPME. so that the two end point can coordinate the
   switch state. and the frame format of the state notify message is the
   following 1:


        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        | 0001|  0000 |      00000000    |   channel type (PSC)     |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |                                                           |
        |                PSC Control packet                         |
        |                                                           |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


                                 Figure 1


   when another end point of the SPME received State Notify messgae from



Liu, et al.               Expires June 17, 2012                 [Page 4]

Internet-Draft           MPLS-TP ring protection           December 2011


   peer end point, it would process the message and switch to its
   relative protecting SPME to transport all LSP Services of the
   defective working SPME. for example, there is the following ring
   including point A ,B, C,D,E and F .Point A and D are configured as
   two transfer nodes separately in the ring.while working and
   protecting SPME will be set up between the two transfer nodes A and D
   and other nodes include B,C,D,E,F.it will need to set up 16 SPME in
   the ring.  Just as C node, there need to set up four bidirectional
   SPME,which are separately working SPME(A-B-C) identified by signal
   (@) and protecting SPME ( A-F-E-D-C) identified by signal (#) between
   transfer node A and node C . at the same time, they are still
   including bidirectional working SPME (C-D) identified by signal(*)
   and protecting SPME(C-B-A-F-E-D) identified by signal($) between
   another transfer node D and node C, just as the following figure 2.



                                                   transfer node
                                                      |
                                  +---+  ########   +---+
                                  | F |-------------| A |
                                  +---+  $ $ $ $    +---+
                                  #/$                  $ \@
                                 #/$                    $ \@
                                #/$                      $ \@
                              +---+                     +---+
                 sink node----| E |                     | B |
                              +---+                     +---+
                                #\$                      $ /@
                                 #\$                    $ /@
                                  #\$                  $ /@
                                  +---+  * * * * *  +---+
                                  | D |-------------| C |
                                  +---+   ######    +---+
                                    |             source node
                                 transfer node

                           NOTE:
                           @: working sub-path tunnel between A and C
                           #: protecting sub-path tunnel between A and C
                           *: working sub-path tunnel between C and D
                           $: protecting sub-path tunnel between C and D




                                 Figure 2




Liu, et al.               Expires June 17, 2012                 [Page 5]

Internet-Draft           MPLS-TP ring protection           December 2011


   supposing a LSP service from source node C to sink node E ,under
   free-defect contidion,it would push the LSP into working SPME (w)PCA|
   LC(A)|BOS firstly,then it will POP outer SPME label and swap inner
   LSP label in the transfer node A .and then push it into another SPME
   (w)PAE|LA(E)|BOS and transport it to sink node E. here PXY denotes a
   SPME from LSR-X to LSR-Y , '|' can be used to separate each level in
   label stack .LX(Y) denotes a LSP service from LSR-X to LSR-Y.  BOS
   denotes the bottom of label stack.  Supposing a defect happened on
   the working SPME(C-B-A) by OAM function as the following figure 3.



                                                        transfer node
                                                           |
                                       +---+  # # # #    +---+
                                       | F |-------------| A |
                                       +---+             +---+
                                       #/                   \@
                                      #/                     \@
                                     #/                       \@
                                   +---+                     +---+
                      sink node----| E |                     | B |
                                   +---+                     +---+
                                     #\                       /@
                                      #\                     X
                                       #\                   /@
                                       +---+             +---+
                                       | D |-------------| C |
                                       +---+   # # # #   +---+
                                         |             source node
                                      transfer node
                                  NOTE:
                                      @: working sub-path Tunnel
                                      #: protecting sub-path Tunnel
                                      X: failure




                                 Figure 3


   for example, there is a defect on the link(C-B) just as above
   figure,all LSP services which would be carried and sent between C and
   transfer node A by working SPME(C-B-A) should switch to protecting
   SPME(C-D-E-F-A) and push it into protecting SPME(p)PCA|LC(A)|BOS and
   be transported to transfer node A if the protecting SPME has no
   failure at the same time. when it arrived at the transfer node A ,



Liu, et al.               Expires June 17, 2012                 [Page 6]

Internet-Draft           MPLS-TP ring protection           December 2011


   The outer SPME label would be popped and swap LSP label in the
   transfer node A, Then the LSP service would be pushed into another
   working SPME (w)PAE|LA(E)|BOS and be carried to sink node E .in
   addtion, when the transfer node A or the relative protecting SPME has
   failure too, another transfer node D will become transfer node for
   all LSP services which are trasfered at the transfer node A. All LSP
   services of working SPME(C-B-A) would be pushed into another working
   SPME(C-D) (w)PCD|LC(D)|BOS to be sent to backup transfer node D, and
   then POP outer SPME label and swap LSP label at the transfer node D
   .then they would be pushed into another SPME (w) PDE|LD(E)|BOS and be
   sent to sink node E.

   From the view of number of configuring SPME, if there are n nodes in
   the ring , there only need to set up and configure O(4N) SPME Tunnel.
   if configuring one working SPME and one protecting SPME between each
   node and other nodes of the ring , then there need to set up and
   configure O(n^2) SPME . so this solution maybe solve the N square
   problem.

3.2.  solution 2

   This ring protection solution can use one protecting LSP path to
   protect one working LSP path,since they are both in the same ring,
   the direction of the two LSP path is reverse in the ring. when a
   defect has been detected by section cc&cv function, a state notify
   message just as the above figure 1 will be generated and sent to all
   other nodes of the ring . when other nodes receive the state notify
   message , they would analysis which LSP service would be affected by
   the failure based by the state notify message and segment link state
   of each LSP on each node.if some working paths are affected by the
   failure, they will switch to its relative protecting path or bridge
   its service to both working path and protecting path.

3.2.1.  P2P Instance

   if the LSP service affected by the failure is P2P service in the ring
   , the source node of the LSP service would switch into its own
   protecting LSP path to transport to the egress node of the ring.
   while the egress node of the LSP service would select protecting LSP
   path to receive the service .for example , there is a LSP service
   from B to E as the following figure 4. its working LSP path is
   B-A-F-E identified by singal @, while its protecting LSP path is
   B-C-D-E identified by signal #, Under normal condition, the LSP
   service would be sent by the working LSP path(B-A-F-E).







Liu, et al.               Expires June 17, 2012                 [Page 7]

Internet-Draft           MPLS-TP ring protection           December 2011


                                  +---+  @@@@@@@@   +---+
                                  | F |-------------| A |
                                  +---+             +---+
                                  @/                   \@
                                 @/                     \@
                                @/                       \@
                              +---+                     +---+
                 sink node  --| E |                     | B |Source node
                              +---+                     +---+
                                #\                       /#
                                 #\                     /#
                                  #\                   /#
                                  +---+             +---+
                                  | D |-------------| C |
                                  +---+  # # # #    +---+

                             NOTE:
                                 @: working LSP path;
                                 #: protecting LSP path;




                                 Figure 4


   if there is a defect on the working LSP path. for example the link
   A-F has a defect as the following figure 5.node A or F would detect a
   defect by section CC&CV function firstly. then node A or F would
   generate state notify message and send it to all other nodes of the
   ring. when other nodes of the ring received the state notify message
   , they would process the state notify message and analysis which LSP
   service would be affected by the failure based by the state notify
   message and segment link state of each LSP which must save on both
   end node of each LSP.if the failure can change the segment link state
   of a LSP , the LSP will switch into the protecting path to transport
   service pakcet.  Just as the following link(A-F) failure, when both
   end nodes B and E of the LSP received the state notify message from
   node A or F, they firstly would locate where the failure happened by
   the two end node address of the failure in the state notify message.
   then they would judge whether to affect the segment link state of the
   LSP(B-A-F-E) which had saved on both node.if the segment link state
   of the LSP has be changed. the source node B of the LSP service would
   switch to protecting LSP path(B-C-D-E) to transport it.  At the same
   time, the sink node E of the LSP Service would select protecting LSP
   path to accept service.





Liu, et al.               Expires June 17, 2012                 [Page 8]

Internet-Draft           MPLS-TP ring protection           December 2011


                                  +---+  @@@@@@@@   +---+
                                  | F |-----X-------| A |
                                  +---+             +---+
                                  @/                   \@
                                 @/                     \@
                                @/                       \@
                              +---+                     +---+
                 sink node  --| E |                     | B |Source node
                              +---+                     +---+
                                #\                       /#
                                 #\                     /#
                                  #\                   /#
                                  +---+             +---+
                                  | D |-------------| C |
                                  +---+  # # # #    +---+

                             NOTE:
                                 @: working LSP path;
                                 #: protecting LSP path;
                                 X: failure




                                 Figure 5


   when the failure is clear, node A or F would generate state notify
   message of defect-free to all other nodes of the ring . so the source
   node B and the sink node E of the LSP service received the state
   notify message , they would still analysis which LSP service would be
   affected by state changing and adopt relative action.so they would
   restore to send and receive service packet by working lsp
   path(B-C-D-E).

3.2.2.  P2MP Instance


   For P2MP service of the ring , it must be unidirectional and more
   than one egress nodes. it is difficult for ingress node or egress
   node to judge and analysis which P2MP LSP service would need to be
   switch by the failure only by state notify message and segment link
   state of the p2mp path. . when a failure has been detected by section
   CC&CV function, the node which detects the failure would generate
   state notify message and send it to all other nodes of the ring. when
   other nodes received the state notify message,the root node of the
   P2MP service firstly bridge to the working path and the protecting
   path . so it send the service to its egress nodes by differently



Liu, et al.               Expires June 17, 2012                 [Page 9]

Internet-Draft           MPLS-TP ring protection           December 2011


   working path and protecting path.  For egress nodes of the p2mp
   service.  They will merge select one path to accept the service
   packet. when the defect is clear, the node which detects defect-free
   will generate a state notify message of defect-free and send it to
   all other nodes of the ring. all other nodes receive the state notify
   message and restore only working path to transport the service
   packet. for root node of the p2mp service, it only send p2mp service
   packet by working path. while egress nodes will only select working
   path to accept the p2mp service packet.

   for example, there is a p2mp service from source node B to egress
   nodes F and E. its working path is B-C-D-[E]-[F] identified by
   signal(#) ,and its protecting path is B-A-[F]-[E] identified by
   singal(@).under normal condition, the service pakcet will be
   transported by working path B-C-D-[E]-[F] .just as the following
   figure 6:




                                  +---+  @@@@@@@@   +---+
                   sink node 2--- | F |-------------| A |
                                  +---+             +---+
                                  @/#                   \@
                                 @/#                     \@
                                @/#                       \@
                              +---+                     +---+
                 sink node 1--| E |                     | B |Source node
                              +---+                     +---+
                                 \#                      # /
                                  \#                    # /
                                   \#                  # /
                                  +---+  # # # #    +---+
                                  | D |-------------| C |
                                  +---+             +---+

                             NOTE:
                                 @: working path ;
                                 #: protecting path;




                                 Figure 6


   when link C-D and link D-E failure happens, node C or node E that
   detects a defect will generate a state notify message of SF and send



Liu, et al.               Expires June 17, 2012                [Page 10]

Internet-Draft           MPLS-TP ring protection           December 2011


   it to all other nodes of the ring . when other nodes C,B,A,F receive
   the state notify message , they will make all p2mp source services be
   sent by both working path and protecting path firstly. eg. the
   service from B to E,F , root node B send the p2mp service packet
   separately by its working path B-C-D-[E]-[F] and its protecting path
   B-A-[F]-[E].  As there is a defect in separately C-D link and D-E
   link, for the egress nodes E and F, they will not receive service
   packet by its working path B-C-D-E-F. so they must select its
   protectiong path B-A-[F]-[E] to receive the service packet just as
   the following figure 7:




                                  +---+  @@@@@@@@   +---+
                   sink node 2--- | F |-------------| A |
                                  +---+             +---+
                                  @/                   \@
                                 @/                     \@
                                @/                       \@
                              +---+                     +---+
                 sink node 1--| E |                     | B |Source node
                              +---+                     +---+
                                 \                       /
                                  X                     /
                                   \                   /
                                  +---+             +---+
                                  | D |-----X------| C |
                                  +---+             +---+

                             NOTE:
                                 @: transport service by protecting path
                                 X: failure



                                 Figure 7


   when the defect is clear , the node C ,E will generate a state notify
   message of defect-free and send it to all other nodes of the ring.
   when other nodes receive the state notify message , each node will
   restore to send and receive its own service only by its own working
   path .for example,the p2mp service from B to E,F will restore to
   working path B-C-D-[E]-[F] to send and receive the p2mp service
   packet as the following 8.





Liu, et al.               Expires June 17, 2012                [Page 11]

Internet-Draft           MPLS-TP ring protection           December 2011


                                  +---+
                   sink node 2--- | F |-------------| A |
                                  +---+             +---+
                                  #/                   \
                                 #/                     \
                                #/                       \
                              +---+                     +---+
                 sink node 1--| E |                     | B |Source node
                              +---+                     +---+
                                #\                       /#
                                 #\                     /#
                                  #\                   /#
                                   #\                 /#
                                  +---+             +---+
                                  | D |-------------| C |
                                  +---+  # # # # #  +---+

                             NOTE:
                                 #: transport service
                                 X: failure



                                 Figure 8



4.  Security Considerations

   The security considerations for the authentication TLV need further
   study.


5.  IANA Considerations

   TBD.


6.  Acknowledgments

   thank Huub van Helvoort ,Italo Busi, Yaacov Weingarten, malcolm.betts
   and other experts providing some good comments and advices for this
   draft.


7.  References





Liu, et al.               Expires June 17, 2012                [Page 12]

Internet-Draft           MPLS-TP ring protection           December 2011


7.1.  Normative References

   [IETF RFC4090]
              IETF, "IETF RFC4090(Fast Reroute Extensions to RSVP-TE for
              LSP Tunnels)", May 2005.

   [IETF RFC5654]
              IETF, "IETF RFC5654(Requirements of an MPLS Transport
              Profile)", september 2009.

   [IETF RFC5921]
              IETF, "IETF RFC5921(A Framework for MPLS in Transport
              Networks)", July 2010.

   [IETF RFC6372]
              IETF, "IETF RFC6372(Multiprotocol Label Switching
              Transport Profile Survivability Framework)",
              September 2011.

   [IETF RFC6378]
              IETF, "IETF RFC6379(Multiprotocol Label Switching
              Transport Profile Linear protection)", November 2011.

   [IETF RFC6427]
              IETF, "IETF RFC6427(Multiprotocol Label Switching
              Transport Profile Fault Management)", November 2011.

   [RFC 5586]
              IETF, "IETF RFC5586(MPLS Generic Associated Channel)",
              June 2009.

7.2.  Informative References

   [ITUT-G.8132 Draft]
              ITU-T, "Draft ITU-T Recommendation G.8132(T-MPLS shared
              protection ring)", February 2008.

   [MPLS-TP Ring protection]
              Y. Weingarten,  S. Bryant, N. Sprecher, D. Ceccarelli,D.
              Caviglia, F. Fondelli, M. Corsi, "MPLS-TP Ring
              Protection", August 2010.

   [MPLS-TP Ring protection switching]
              Igor Umansky,  Huub van Helvoort, "MPLS-TP Ring Protection
              Switching (MRPS)", August 2010.






Liu, et al.               Expires June 17, 2012                [Page 13]

Internet-Draft           MPLS-TP ring protection           December 2011


7.3.  URL References

   [MPLS-TP-22]
              IETF - ITU-T Joint Working Team, "", 2008,
              <http://www.example.com/dominator.html>.


Authors' Addresses

   Liu guoman
   ZTE Corporation
   No.68, Zijinghua Road, Yuhuatai District
   Nanjing  210012
   P.R.China

   Phone: +86 025 52871606
   Email: liu.guoman@zte.com.cn


   Ji Yuefeng
   BUPT University
   Beijing University of Posts and Telecommunications
   beijing  100876
   P.R.China

   Email: jyf@bupt.edu.cn


   Yu jinghai
   ZTE Corporation
   No.68, Zijinghua Road, Yuhuatai District
   Nanjing  210012
   P.R.China

   Phone: +86 025 52877162
   Email: Yu.jinghai@zte.com.cn















Liu, et al.               Expires June 17, 2012                [Page 14]