Internet DRAFT - draft-allan-mpls-unified-ic-req-frmwk
draft-allan-mpls-unified-ic-req-frmwk
MPLS Working Group Dave Allan, Ed.
Internet Draft Ericsson
Intended status: Standards Track
Expires: September 2012 March 2012
Requirements and Framework for Unified MPLS Sub-Network
Interconnection
draft-allan-mpls-unified-ic-req-frmwk-01
Abstract
The definition of a transport profile for MPLS means that MPLS
network architectures will emerge that combines both managed and
control plane driven MPLS sub-networks and requires interconnection
of same to achieve a unified MPLS architecture.
This document generalizes the problem of sub-network interconnect,
discusses issues in general and suggests ways forward.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC2119 [1].
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance
with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet
Engineering Task Force (IETF), its areas, and its working
groups. Note that other groups may also distribute working
documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-
Drafts as reference material or to cite them other than as "work
in progress".
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
Allan et al., Expires September 2012 [Page 1]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire in September 2012.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described
in Section 4.e of the Trust Legal Provisions and are provided
without warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction...................................................3
2. Conventions used in this document..............................4
2.1. Terminology..................................................4
2.2. Acronyms.....................................................4
3. Sub-Network Interconnect Scenarios.............................4
4. Sub-Network Interconnect Mechanisms............................5
4.1. Border Node..................................................5
4.2. Border Link..................................................5
5. Sub-network types..............................................5
5.1. Infrastructure sub-network types.............................5
5.2. Service Sub-network types....................................6
6. Issues & Requirements..........................................6
6.1. Alignment of OAM functionality...............................7
6.2. OAM identifier mismatches....................................7
6.3. OAM encapsulation............................................7
6.4. Protection Mechanisms........................................8
6.5. Label space management.......................................8
6.6. Path maintenance and re-sizing...............................8
6.7. Sub-network migration........................................9
6.8. (Non)Interworking of DP and CP notifications.................9
7. Operational Decoupling.........................................9
8. Acknowledgments...............................................10
9. IANA Considerations...........................................10
10. Security Considerations......................................10
11. References...................................................10
11.1. Informative References.....................................10
Allan et al., Expires July, 2012 [Page 2]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
1. Introduction
Networks that provide an end-to-end service infrastructure are
typically deployed as multiple domains or sub-networks in order to
scale. These different domains may be operated by different
technologies using different control plane technology (e.g.
management driven control plane (centralized) or distributed control
plane).
Within the MPLS control plane there exist a number of functional
behaviors that are typically associated with a single control
protocol and function autonomously from the other control protocols.
That is to say when a labeled layer and associated control protocol
is overlaid on another, there is frequently no operational coupling
between them. When two control protocols are operated side by side
the same is true (e.g. ships in the night). An example of the former
would be pseudo wires over a PSN. An example of the latter would be
L2 and L3 virtual private networks (VPNs) sharing a common packet
switched network (PSN).
The introduction of transport functions to MPLS and the intent to
deploy, merge or otherwise combine networks that will concatenate
sub-networks that have different operational characteristics and/or
control planes (including management) introduces the requirement to
integrate operations across multiple sub-networks. This frequently is
manifested in requirements on nodes at sub-network boundaries and/or
alignment of identifiers in order to construct a unified end-to-end
MPLS based service plane.
By having a unified MPLS based service plane, a network operator is
able to provide services across different MPLS domains instrumented
with common management and control functionality in order to provide
scalable service offerings on a common MPLS technology base.
This document is a framework that postulates models and functional
requirements for sub-network interconnect to achieve a unified end to
end MPLS based service plane or "Unified MPLS".
Allan et al., Expires July, 2012 [Page 3]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
2. Conventions used in this document
2.1. Terminology
Binding: Is the mechanism for association and interconnection of
label switched path (LSP) or pseudo wire (PW) segments that exist in
different sub-networks.
Section: As per RFC 5960[17].
Segment: A part of a PW or LSP that has one or more contiguous
sections in a common sub-network. This usage is as per RFC 6372[18].
Sub-network: A portion of a larger MPLS network that is operated by a
single system and whose boundaries are set by the scope of the
system. The system may be a control plane or management system.
Similarly it could be a sub-layer stacked on another sub-network.
2.2. Acronyms
LIB - label information base
LSP - label switched path
MEG - Maintenance Entity Group
MEP - Maintenance Entity Group End Point
MIP - Maintenance Entity Group Intermediate Point
PSN - packet switched network
PW - pseudo wire
SPME - Sub-path Maintenance Entity
VPWS - Virtual Private Wire Service
VPMS - Virtual Private Multicast Service
3. Sub-Network Interconnect Scenarios
The combination of MPLS label swapping and label stacking makes it
possible to consider a number of atomic interconnect scenarios,
briefly summarized here:
Peer Model - is the scenario when an LSP or PW has segments in
different sub-networks.
Allan et al., Expires July, 2012 [Page 4]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
Segmentation Model - is the scenario when a client LSP or PW with
common establishment and maintenance procedures has sections in
separate sub-networks. This model can recurse arbitrarily.
Overlay Model - is the simplest case of the segmentation model in
which a section of an LSP or PW is a distinct sub-network. This is
currently the common deployment scenario for MPLS, and normally has
minimal dependencies. In the specific case of MPLS & GMPLS, the
requirements are examined in RFC 5146[21].
Termination Model - is the scenario where a non-MPLS or PW transfer
function separates the sub-networks. The termination model logically
isolates the sub-networks and is included simply for completeness.
4. Sub-Network Interconnect Mechanisms
There are two interconnect mechanisms considered. The first (Border
node) postulates a node that spans two sub-networks and both likely
operated by a single provider. The second (Border link) postulates a
link connecting sub-networks of two distinct organizations within a
provider or two distinct providers.
4.1. Border Node
A border node is one that implements, interconnects and interworks
LSPs or PWs with segments or sections in different sub-networks. The
interworking function at the border node will either terminate, swap
or encapsulate labels.
4.2. Border Link
A border link is the case whereby two border nodes are connected back
to back in an MPLS sub-network that consists of a single link. This
can be a physical link or a logical link (e.g. an MPLS section).
5. Sub-network types
In the current MPLS architecture the following sub-network types
exist:
5.1. Infrastructure sub-network types
The infrastructure sub-network types are:
MPLS-TD: Topology driven MPLS. LSP setup is via the LDP protocol [6]
with path routing determined by the IGP. ECMP, merging and PHP are
are included in the set of possible dataplane behaviors. LSPs are
unidirectional only. P2mp and mp2mp LSPs are supported by mLDP [7].
Allan et al., Expires July, 2012 [Page 5]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
MPLS-TE: LSP setup is via the RSVP-TE protocol[8] with path routing
determined by a TE enabled IGP (e.g. OSPF-TE) according to bandwidth
and QoS constraints. PHP is included in the set of dataplane
behaviors. LSPs are unidirectional only. Bandwidth allocations, class
of service or priority(PHB) are typically part of traffic handling.
Managed MPLS-TP: LSP setup is via management action. LSPs can be uni-
directional, bi-directional or associated bi-directional. LSPs are
purely connection oriented p2p or p2mp (where p2mp is unidirectional
only).
Signalled MPLS-TP: LSP setup is via RSVP-TE GMPLS[9]. LSPs can be
uni-directional, bi-directional or associated bi-directional. LSPs
are purely connection oriented p2p or p2mp (where p2mp is
unidirectional only).
And it is possible to consider
GMPLS for non-MPLS dataplanes:
5.2. Service Sub-network types
L3VPN: VPN setup is via the BGP protocol as per RFC 4364[10]. Note
that this can be an IP-VPN (via IGP peering with the VRF) or an MPLS-
VPN (via a combination of IGP and MPLS CP peering with the VRF).
L2VPN: VPN setup is via the PW Control Protocol per RFC 4447 (LDP in
targeted mode) or BGP protocols. A broadcast domain is emulated which
will have the effect of limiting sub-network interconnect to a single
point to avoid loops.
VPWS: VPWS setup is via the PW Control Protocol per RFC 4447 (LDP in
targeted mode).
VPMS: VPMS setup is currently an L2VPN work item .
[20].
6. Issues & Requirements
In theory, any ingress label can be mapped to one or more egress
labels or label stack permutations via the ILM to NHLFE mapping
defined in RFC 3031[2]. Further one carrier"s infrastructure layer
may be a client of another carrier"s infrastructure. More
considerations need to come into play in order to produce a tractable
set of sub-network interworking scenarios. The following is a partial
list of some of the issues to be considered and/or addressed:
Allan et al., Expires July, 2012 [Page 6]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
6.1. Alignment of OAM functionality
Not all OAM encapsulations guarantee fate sharing with the LSP of
interest across all of the sub-network types in MPLS. This not only
means that failures may not be detected or detected in a timely
manner, it also means that "false positives" are a possibility as
failures may occur on the path taken by the OAM PDUs.
Any OAM encapsulation using a reserved label, e.g. the GAL[12], or
Router Alert as used by VCCV type 2[13], or without a PW control word
will not have predictable control over fate sharing with normal
payload for any LSP or PW that has a section that transits a MPLS-TD
sub network that implements ECMP[11]. Specifying that ECMP
implementations exclude reserved labels from consideration would
permit ECMP and LAG approaches that limit the sources of entropy to
the label stack (e.g. FAT PWs [ref] or the entropy label [ref]) to be
employed and be correctly and reliably instrumented by OAM that used
a reserved label.
A separate issue is interconnecting sub networks where the LSPs have
a different cardinality of end points (e.g. concatenating mp2p to
p2p), implying a different number of maintenance entities than would
be suggested by an implementation dimensioned to a single sub
network"s characteristics.
6.2. OAM identifier mismatches
MEG, MEP, MIP and nodal addressing will not pose identifier mismatch
problems. Where such problems will arise is in the use of RFC 4379
LSP Ping [3]. This is because LSP-PING uses identifiers associated
with a specific sub-network type in the FEC stack as part of the
processing to detect inconsistencies between the control plane and
the data plane.
[Issue: The on demand CV draft provides for the Static LSP and Static
PW TLVs for the FEC stack which allows intermediate nodes to validate
the FEC stack against the MEG ID for the local MIP. The applicability
for this should be generalized such that it can be used end to end
across domains. This will also raise the problem of disseminating MEG
information to non-transport sub networks as not all defined MPLS
sub-network types use the current fields in the IP based LSP MEG ID]
6.3. OAM encapsulation
The MPLS architecture permits multiple OAM encapsulations that may or
may nor have an IP header. Any interconnect mechanism needs to be
able to align not only capability but encapsulations end to end. This
Allan et al., Expires July, 2012 [Page 7]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
document assumes that translation of encapsulations by MIPs will not
be specified or implemented.
6.4. Protection Mechanisms
An MPLS LSP or PW sub-network may be made resilient by any number of
mechanisms. There are also three scenarios of note, end to end
protection, end to end restoration and sub-network protection.
End to end protection offers minimal complications in sub-network
interconnect as the interworking functions is common to that of the
unprotected case, that is to say transit nodes do not participate in
protection switching.
Sub-network protection is universally offered by the use of
mechanisms that operate within the level such as detours [19] and may
require label merging at the border node. Mechanisms that operate at
nested MPLS label levels (e.g. SPMEs or FRR facility protection) have
no impact on sub-network interconnect.
End to end restoration is a bit more complicated as it involves
coordinating dynamic action between sub-networks.
It also becomes possible to consider sub-network restoration with
many of the same considerations as path maintenance and re-sizing.
6.5. Label space management
The MPLS architecture has always been based around local
administration of a node"s label space. As such mechanisms to
partition the label space between multiple administrative entities is
not currently supported and would be difficult to retrofit.
A consequence of this is that a border node is potentially required
to provide labels from a common pool to both a control and management
plane, e.g. a management system be required to obtain label values
from the node prior to populating the LIB vs. being delegated a pool.
This suggests that such a mechanism be carried forward for all
managed nodes such that only a single mechanism need be implemented.
However this is an implementation decision.
6.6. Path maintenance and re-sizing
It must be possible to make operational modifications to a path
segment in a hitless fashion. The normal procedure for MPLS-TE is
known as "make before break". This gives rise to two scenarios, the
first is end to end "make before break", and the other is make before
break confined to a sub-network with the border node as a pinned
Allan et al., Expires July, 2012 [Page 8]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
waypoint. This means the design of the inter-sub-network binding
information permit make before break modification of one segment of
the LSP.
6.7. Sub-network migration
The practical considerations are documented in RFC 5950[4] and by
reference RFC 5493[5].
6.8. (Non)Interworking of DP and CP notifications
Within the MPLS architecture there are techniques for propagating the
status of adjacent sections of either a native service or PW section
in both the data plane and the control plane. One example
(documenting both) is RFC 6310[14].
When concatenating sub networks the interworking of dataplane fault
notifications [15] or protection switching coordination [16] and
control plane indications will not be possible. The reason is that
data plane indications flow end to end on a labeled path therefore
will not be visible to border nodes, a requirement to enable
interworking of dataplane notifications with the control plane in any
useful form.
When connecting a sub network restricted to data plane only
notifications to a sub network that will support either dataplane or
control plane notifications, the border node will be required to
negotiate exclusive use of dataplane notifications in any control
plane signaling during the path setup. This will have implications in
both the interconnect data model, and potential enhancements to
signaling.
7. Operational Decoupling
The objective of any sub-network interconnect solution is to decouple
the operation of the interconnected systems in order to minimize any
dependencies.
The sub-network interconnect must accommodate interconnecting LSPs
and PWs with different establishment and persistency characteristics.
This is determined by whether the LSP, PW or segment is provisioned
or signaled, where from a persistency point of view, a provisioned
entry is permanent and exists until removed by management action,
while a signaled entity fate shares with a control plane adjacency
and may come and go during the life time of the inter sub-network
binding.
Allan et al., Expires July, 2012 [Page 9]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
The state present at a border node to bind the LSP or PW spanning the
sub networks together should exist independently of the
characteristics of the LSPs or associated control or management
planes.
This also requires a level of indirection such that the management
action is decoupled from the mechanics of label assignment in each
sub-network and may work with sub-network resiliency mechanisms.
So the state "connect whatever label from sub-network A associated
with FOO to whatever label from sub-network B is associated with BAR"
should be persistent.
8. Acknowledgments
Loa Andersson, Mach Chen, Eric Gray, David Sinicrope and Greg Mirsky
contributed to the development of this document.
9. IANA Considerations
This document does not require IANA action.
10. Security Considerations
Sub-network interconnect in a single provider scenario does not
introduce any new security exposures to the MPLS architecture that do
not already exist.
Sub-network interconnect in a multi-provider scenario (e.g. border
link) introduces a number of potential exposures, and requires a
strong trust model for the co-ordination of the set up if interdomain
LSPs. This is particularly true for the peer model. This is somewhat
mitigated when operational decoupling techniques are employed as
discussed in section 7, as the scope of what a provider can ask of a
peer network is explicitly scoped.
11. References
11.1. Informative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[2] Rosen et.al. Multiprotocol Label Switching Architecture, IETF
RFC 3031, January 2001
[3] Kompella et.al. Detecting Multi-Protocol Label Switched (MPLS)
Data Plane Failures, IETF RFC 4379, February 2006
Allan et al., Expires July, 2012 [Page 10]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
[4] Mansfield et. al. Network Management Framework for MPLS-based
Transport Networks, IETF RFC 5950, September 2010
[5] Caviglia, D., Bramanti, D., Li, D., and D. McDysan,
"Requirements for the Conversion between Permanent Connections and
Switched Connections in a Generalized Multiprotocol Label
Switching (GMPLS) Network", RFC 5493, April 2009.
[6] Andersson et.al. "LDP Specification", IETF RFC 5036, October
2007
[7] Minei, I. et.al. "Label Distribution Protocol Extensions for
Point-to-Multipoint and Multipoint-to-Multipoint Label Switched
Paths", IETF RFC 6388
[8] Awduche et.al. "RSVP-TE: Extensions to RSVP for LSP Tunnels",
IETF RFC 3209, December 2001
[9] Berger et.al. "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Functional Description", IETF RFC 3471, January
2003
[10] Rosen et.al. "BGP/MPLS IP Virtual Private Networks (VPNs)",
IETF RFC 4364, February 2006
[11] Swallow et.al. "Avoiding Equal Cost Multipath Treatment in MPLS
Networks", IETF RFC 4928, June 2007
[12] Bocci et.al. "MPLS Generic Associated Channel", IETF RFC 5586,
June 2009
[13] Nadeau et.al "Pseudowire Virtual Circuit Connectivity
Verification (VCCV) A Control Channel for Pseudowires", IETF RFC
5085, December 2007
[14] Aissaoui et.al. "Pseudowire (PW) Operations, Administration,
and Maintenance (OAM) Message Mapping", IETF RFC 6310, July 2011
[15] Swallow et.al. "MPLS Fault Management OAM", IETF RFC 6427,
November 2011
[16] Bryant et.al. "MPLS-TP Linear Protection", IETF RFC 6378,
October 2011
[17] Frost et.al. "MPLS Transport Profile Data Plane Architecture",
IETF RFC 5960, August 2010
Allan et al., Expires July, 2012 [Page 11]
Internet-Draft draft-allan-mpls-unified-ic-req-frmwk-01 March 2012
[18] Sprecher et.al. "MPLS Transport Profile (MPLS-TP) Survivability
Framework", IETF RFC 6372, September 2011
[19] Pan et.al. "Fast Reroute Extensions to RSVP-TE for LSP
Tunnels", IETF RFC 4090, May 2005
[20] Kamite et.al., "Framework and Requirements for Virtual Private
Multicast Service (VPMS)", IETF work in progress, draft-ietf-
l2vpn-vpms-frmwk-requirements-04.txt, July 2011
[21] Kumaki et.al., Interworking Requirements to Support Operation
of MPLS-TE over GMPLS Networks, IETF RFC 5146, March 2008
Authors' Addresses
Dave Allan
Ericsson
Email: david.i.allan@ericsson.com
Allan et al., Expires July, 2012 [Page 12]