Internet DRAFT - draft-nadeau-ip-basedtool-requirements

draft-nadeau-ip-basedtool-requirements





Network Working Group                         Thomas D. Nadeau
Internet Draft                                  Monique Morrow
Expires: April 2003                             George Swallow
                                           Cisco Systems, Inc.
                                                  October 2002
                               
                               
         IP-based Tool Requirements for MPLS Networks
        draft-nadeau-ip-basedtool-requirements-00.txt


Status of this Memo
   
   This document is an Internet-Draft and is in full
   conformance with all provisions of Section 10 of RFC 2026
   [RFC2026].
   
   Internet-Drafts are working documents of the Internet
   Engineering Task Force (IETF), its areas, and its working
   groups.  Note that other groups may also distribute working
   documents as Internet-Drafts.
   
   Internet-Drafts are draft documents valid for a maximum of
   six months and may be updated, replaced, or obsoleted by
   other documents at any time.  It is inappropriate to use
   Internet-Drafts as reference material or to cite them other
   than as "work in progress."
   
   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.
   
   The list of Internet-Draft Shadow Directories can be
   accessed at http://www.ietf.org/shadow.html.




Abstract
   
   This memo describes requirements for operations and
   management (OAM) based on IP-based tools for Multi-Protocol 
   Label Switching (MPLS) [RFC3031] networks. As customers 
   gain deployment experience with MPLS, managing these networks 
   and services becomes pivotal to the service provider business. 
   Minimal requirements include the ability to detect a break in 
   the LSP data path and trace the source of the failure.
   Therefore, maintaining core integrity is key in identifying
   requirements for MPLS OAM.  The document scope is IP-based
   tool requirement capture for fault detection, diagnostics,
   and statistic reporting and security management.


1. Introduction
   



Nadeau et al.               Expires April 2003               [Page 1]

Internet Draft      IP-based Tools Requirements      October 28, 2002



   This document identifies a set of OAM requirements
   gathered from network operators in various workshops by the
   authors of this document. No specific mechanisms are
   proposed to address these requirements at this time.
   
   Comments should be made directly to the MPLS mailing list
   at mpls@uu.net.
   
   This memo does not, in its draft form, specify a standard
   for the Internet community.


2. Terminology
   
   This document uses terminology from the MPLS architecture
   document [MPLSArch], CCAMP Architecture [CCAMPArch] and
   various MPLS-related MIBs such as the MPLS-TC-MIB [TCMIB],
   MPLS-LSR-MIB [LSRMIB], MPLS-TE-MIB [TEMIB], MPLS-LDP-MIB
   [LDPMIB], MPLS-FTN-MIB [FTNMIB], and the MPLS-LINK-BUNDLING-
   MIB [LBMIB].
   
   Defect:      Any error condition that prevents an LSR from
             functioning correctly. For example, loss of an
             IGP path will most likely also result in an LSP
             not being able to deliver traffic to its
             destination. Another example is the breakage of
             a TE tunnel.  These may be due to physical
             circuit failures or failure of switching nodes
             to operate as expected.
   
   


3. Requirements

  We have compiled requirements from a diverse group of
  network operators that have much experience running MPLS
  networks.
  
  The following are requirements for MPLS Label Switching
  Router OAM functions that have been identified directly
  from operators deploying MPLS.
  
        a) Detection and diagnosis of broken Label Switch Path (LSP)
           that does not require manual hop-by-hop troubleshooting 
           across the data path, specifically an LSP path-tracing 
           tool.

        b) LSP tunnel trace capability [TUNTRACE] from both head-end
           Label Switch Router (LSR) and mid-point LSR.

        c) Automation of LSP path tracing for LSPs originating on a
           Provider Edge (PE) and ability to raise alarms when 
           failures are detected.

Nadeau et al.               Expires April 2003               [Page 2]

Internet Draft      IP-based Tools Requirements      October 28, 2002


          
        d) Lightweight IP-layer ping function to validate customer
           edge (CE) to CE connectivity in order to demonstrate true 
           end-to-end connectivity for the customer [LSPPING]. This 
           mechanism should allow for configuration of automatic path 
           tracing as described in b upon discovery of a ping failure. 
           Other automatic actions may be necessary as well.

        e) VPN integrity by providing a mechanism to detect LSP mis-
           merging.

        f) Service Level Agreement (SLA) support by providing a
           mechanism to measure LSP latency.
  
        g) Error Detection and Recovery. A mechanism needed to detect
           an error, recover from it and alert the network operator prior
           to the customer informing the network operator of the error
           condition. It is however, sometimes a requirement that the
           customer be notified of the defect condition at the same time
           that the network operator is made aware of the defect.
           Depending on the device's capabilities, the device may be
           programmed to take automatic corrective actions as a result of
           detection of defect conditions. These actions may be user or
           operator-specified, or may simply be inherent to the
           underlying transport technology (i.e.: MPLS Fast-Reroute).

        h) Ability to detect failures on any parallel paths of LSPs
           which loadshare traffic across parallel paths.  (LSRs may
           split traffic using, for example, hashing of fields within the
           packet header.  It is important that to detect failures on all
           operational paths as failure of any branch may lead to loss of
           traffic.)

        i) Ability to perform OAM functions both point-to-point LSPs
           (such as those created by RSVP-TE) and multipoint to point
           LSPs (such as those created by LDP DU).

        j) Operator configurable OAM and frequency of OAM execution.

        k) Data plane OAM packets must follow the same path as for
           customer, however under certain conditions, for example, when
           there is load-balancing in the LSP, the OAM ping and customer
           data packets may take different paths.
        
        l) The OAM function can be extended for Service Level
           Agreement (SLA) measurement and limited to latency.
        
        m) OAM packet statistics that measure quantity (i.e.: number
           of packets) and quality (i.e.: latency measure) of OAM packets
           generated and received at each end of the tested LSP.
        
        n) Ability to suppress unnecessary alarms. For example, if an



Nadeau et al.               Expires April 2003               [Page 3]

Internet Draft      IP-based Tools Requirements      October 28, 2002



           underlying LSP that carries many VCs is not operational, it 
           is unnecessary for the LSR to generate one alarm for every 
           VC within the affected LSP. The operator Elemental 
           Management System (EMS) can instead determine the affected 
           VCs and VPNs by correlating the single LSP alarm with the 
           LSRĘs configuration.  Another example is the failure of 
           an LSP at the bottom of the label stack may result in the 
           failure of many other LSPs. OAM functions should suppress 
           alarms on nested LSPs in this case.

        o) Allow for the integration of standard MPLS-related MIBs
           [LSRMIB][TEMIB][LBMIB][FTNMIB] for fault and statistics
           management.

        p) Allow for detection of Denial of Service attacks via an
           OAM filtering mechanism as part of security management.

        q) An LSR supporting OAM functions for pseudo-wire functions
           that join one or more networking technologies over MPLS must
           be able to translate an MPLS defect into the native
           technology's error condition. For example, errors occurring
           over the MPLS LSP must translate into native ATM OAM cells at
           the edges of the pseudo-wire.

        r) Separation of Data and Control Plane OAM. The inherent
           separation of control and data planes in MPLS lends itself to
           being sometimes implemented independently within an MPLS LSR.
           For example, in a multi-slot LSR, one slot may run a control
           process responsible for running MPLS control protocols such as
           LDP and RSVP, and then programming line cards residing in
           other slots to forward traffic accordingly. In doing so, the
           switch separates out the data plane from the control plane in
           such as way that it is possible for the line card to be mis-
           programmed whilst the control card is unaware. This leads to a
           potential for the line card to black hole data plane traffic.
           This is one example of why it is important for LSRs to possess
           functions that allow an operator to detect data plane
           liveliness. Data Plane liveliness MUST use the exact same path
           as data.


4. Security Considerations
   
   Detection and recovery from LSP mis-merging is a clear
   security consideration and is identified as a requirement
   for MPLS OAM.


5. Acknowledgments
   



Nadeau et al.               Expires April 2003               [Page 4]

Internet Draft      IP-based Tools Requirements      October 28, 2002



   The authors wish to acknowledge and thank the following
   individuals for their valuable comments to this document:
   Adrian Smith, British Telecom; Chou Lan Pok, SBC; Mr.
   Ikejiri, NTT Communications and Mr.Kumaki of KDDI.


6. References
   
   [LSPPING]     Kompella, K., Pan, P., Sheth, N., Cooper,
                 D., Swallow, G., Wadhwa, S., Bonica, R., "
                 Detecting Data Plane Liveliness in MPLS",
                 Internet Draft <draft-ietf-mpls-lsp-ping-
                 00.txt>, March 2002.
   
   [TUNTRACE]    Bonica, R., Kompella, K., Meyer, D.,
                 "Tracing Requirements for Generic Tunnels",
                 Internet Draft <draft-bonica-tunneltrace-
                 02.txt>, November 2001.
   
   [GTTP]        Bonica, R., Kompella, K., Meyer, D.,
                 "Generic Tunnel Tracing Protocol (GTTP)
                 Specification", Internet Draft <draft-bonica-
                 tunproto-01.txt>, July 2001.
   
   [LSRMIB]      Srinivasan, C., Viswanathan, A. and T.
                 Nadeau, "MPLS Label Switch Router Management
                 Information Base Using SMIv2", Internet
                 Draft <draft-ietf-mpls-lsr-mib-07.txt>,
                 January 2001.
   
   [TEMIB]       Srinivasan, C., Viswanathan, A. and T.
                 Nadeau, "MPLS Traffic Engineering Management
                 Information Base Using SMIv2", Internet
                 Draft <draft-ietf-mpls-te-mib-07.txt>,
                 August 2001.
   
   [FTNMIB]      Nadeau, T., Srinivasan, C., and A.
                 Viswanathan, "Multiprotocol Label Switching
                 (MPLS) FEC-To-NHLFE (FTN) Management
                 Information Base", Internet Draft <draft-
                 ietf-mpls-ftn-mib-03.txt>, August 2001.
   
   [LBMIB]       Dubuc, M., Dharanikota, S., Nadeau, T., J.
                 Lang, "Link Bundling Management Information
                 Base Using SMIv2", Internet Draft <draft-
                 ietf-mpls-bundle-mib-00.txt>, September
                 2001.
   
   [PWE3FRAME]   Pate, P., Xiao, X., White., C., Kompella.,
                 K., Malis, A., Johnson, T., and T. Nadeau,



Nadeau et al.               Expires April 2003               [Page 5]

Internet Draft      IP-based Tools Requirements      October 28, 2002



                 "Framework for Pseudo Wire Emulation Edge-to-
                 Edge (PWE3)", Internet Draft <draft-ietf-
                 pwe3-framework-00.txt>, September, 2001.
   
   [PPVPNFW]     Callon, R., Suzuki, M., Gleeson, B., Malis,
                 A., Muthukrishnan, K., Rosen, E., Sargor,
                 C., and J. Yu, "A Framework for Provider
                 Provisioned Virtual Private Networks",
                 Internet Draft <draft-ietf-ppvpn-framework-
                 01.txt>, July 2001.
   
   [RFC1155]     Rose, M., and K. McCloghrie, "Structure and
                 Identification of Management Information for
                 TCP/IP-based Internets", RFC 1155, May 1990.
   
   [RFC1157]     Case, J., Fedor, M., Schoffstall, M., and J.
                 Davin, "Simple Network Management Protocol",
                 RFC 1157, May 1990.
   
   [RFC1212]     Rose, M., and K. McCloghrie, "Concise MIB
                 Definitions", RFC 1212, March 1991.
   
   [RFC1215]     M. Rose, "A Convention for Defining Traps
                 for use with the SNMP", RFC 1215, March
                 1991.
   
   [RFC1901]     Case, J., McCloghrie, K., Rose, M., and S.
                 Waldbusser, "Introduction to Community-based
                 SNMPv2", RFC 1901, January 1996.
   
   [RFC1905]     Case, J., McCloghrie, K., Rose, M., and S.
                 Waldbusser, "Protocol Operations for Version
                 2 of the Simple Network Management Protocol
                 (SNMPv2)", RFC 1905, January 1996.
   
   [RFC1906]     Case, J., McCloghrie, K., Rose, M., and S.
                 Waldbusser, "Transport Mappings for Version
                 2 of the Simple Network Management Protocol
                 (SNMPv2)", RFC 1906, January 1996.
   
   [RFC2026]     S. Bradner, "The Internet Standards Process
                 -- Revision 3", RFC 2026, October 1996.
   
   [RFC2233]     McCloghrie, K. and F. Kastenholtz, "The
                 Interface Group MIB Using SMIv2", RFC 2233,
                 November 1997.
   
   [RFC3031]     Rosen, E., Viswanathan, A., and R. Callon,
                 "Multiprotocol Label Switching
                 Architecture", RFC 3031, January 2001.



Nadeau et al.               Expires April 2003               [Page 6]

Internet Draft      IP-based Tools Requirements      October 28, 2002



   
   [ITU-T]          Draft Recommendation Y.17fw (MPLS
                 Management Framework)


7. Authors' Addresses

  Thomas D. Nadeau
  Cisco Systems, Inc.
  300 Apollo Drive
  Chelmsford, MA 01824
  Phone: +1-978-244-3051
  Email: tnadeau@cisco.com

  Monique Jeanne Morrow
  Cisco Systems, Inc.
  Glatt-Com, 2nd Floor
  CH-8301
  Switzerland
  Voice: +41 (0)1 878-9412
  EMail: mmorrow@cisco.com

  George Swallow
  Cisco Systems, Inc.
  250 Apollo Drive
  Chelmsford, MA 01824
  Voice: +1 978 244 8143
  Email: swallow@cisco.com



8. Full Copyright Statement
   
   Copyright (C) The Internet Society (2001). All Rights
   Reserved.
   
   This document and translations of it may be copied and
   furnished to others, and derivative works that comment on
   or otherwise explain it or assist in its implementation may
   be prepared, copied, published and distributed, in whole or
   in part, without restriction of any kind, provided that the
   above copyright notice and this paragraph are included on
   all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by
   removing the copyright notice or references to the Internet
   Society or other Internet organizations, except as needed
   for the purpose of developing Internet standards in which
   case the procedures for copyrights defined in the Internet
   Standards process must be followed, or as required to
   translate it into languages other than English.



Nadeau et al.               Expires April 2003               [Page 7]

Internet Draft      IP-based Tools Requirements      October 28, 2002



   
   The limited permissions granted above are perpetual and
   will not be revoked by the Internet Society or its
   successors or assigns. This document and the information
   contained herein is provided on an "AS IS" basis and THE
   INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
   DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
   NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
   PURPOSE.
   
   








































Nadeau et al.               Expires April 2003               [Page 8]