Internet DRAFT - draft-chen-mpls-mldp-deployment-via-p2p-tunnels
draft-chen-mpls-mldp-deployment-via-p2p-tunnels
Network Working Group Emily Chen
Internet-Draft Quintin Zhao
Intended status: Standards Track Huawei Technology
Expires: January 14, 2013 July 13, 2012
Deploying mLDP Through P2P LSP Tunnels
draft-chen-mpls-mldp-deployment-via-p2p-tunnels-01.txt
Abstract
The existing specification for Multipoint Label Distribution Protocol
(mLDP) functionality assumes that a pair of LDP speakers which
support the P2MP/MP2MP capability are directly connected, or they can
reach each other through targeted LDP session and transparent
tunnel(s). However, the real deployment may not satisfy these
assumptions, especially in the case where the targeted LDP session
and the transparent tunnel(s) have to be pre-established. This
document provides an automatic solution for finding the nearest
upstream node which supports the LDP P2MP/MP2MP along the path from
the current node to the root node, and triggering the targeted LDP
session and transparent tunnel(s) when needed.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 14, 2013.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Chen & Zhao Expires January 14, 2013 [Page 1]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Chen & Zhao Expires January 14, 2013 [Page 2]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1. Specification of Requirements . . . . . . . . . . . . . . 4
1.2. Motivation . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. mLDP Deployment Through Transparent Tunnels . . . . . . . . . 5
2.1. Signaling Procedures . . . . . . . . . . . . . . . . . . . 6
2.2. Protocol Extensions . . . . . . . . . . . . . . . . . . . 7
3. mLDP Tunnel Through Capability . . . . . . . . . . . . . . . . 8
4. Handling Route Change Or Failure Event . . . . . . . . . . . . 8
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
7. Security Considerations . . . . . . . . . . . . . . . . . . . 9
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
8.1. Normative References . . . . . . . . . . . . . . . . . . . 10
8.2. Informative References . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Chen & Zhao Expires January 14, 2013 [Page 3]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
1. Introduction
1.1. Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
1.2. Motivation
In practical world, it is extremely hard to synchronously upgrade all
the nodes in a huge network, especially upgrading all the hardware at
the same time. Thus, unless users choose to deploy mLDP by building
a completely new network, otherwise there must be a migration period
from non-mLDP to mLDP capable. During this period, in order to setup
Point-to-MultiPoint (P2MP) Label Switched Paths (LSPs) and
Multipoint-to-Multipoint (MP2MP) LSPs through the non-mLDP node(s), a
common solution is to make mLDP LSPs going through targeted LDP
sessions and transparent tunnels.
The motivation of this draft is to trigger such kind of mLDP LSP
automatically, so that several benefits can be brought in. First of
all, the manual configuration of the targeted LDP sessions and
transparent tunnels can be waived, correspondingly the network
operation cost can be reduced. Secondly, users don't need to worry
about traffic lost, because no matter whether the necessary targeted
LDP sessions and transparent tunnels are correctly predicted and pre-
configured, they will be automatically triggered when needed.
Besides, because the targeted LDP sessions and transparent tunnels
are built on demand, the resource consumption of system can be
minimal.
1.3. Overview
As specified by [RFC6388], mLDP Label Mapping message would be
stopped when there is no mLDP-capable upstream node. Take the
following scenario as an example, where the R4 node finds out that
its upstream node R3 doesn't support mLDP, and there is no other node
which R4 can use as its upstream node towards Root node, then this
mLDP LSP establishment would fail.
Chen & Zhao Expires January 14, 2013 [Page 4]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
+------------+
| R1 | mLDP node
+------------+
/ \
+-----------+ +-----------+
mLDP node | R2 | | R3 | non-mLDP node
+-----------+ +-----------+
\
+-----------+
| R4 | mLDP node
+-----------+
/ \
+-----------+ +-----------+
mLDP node | R5 | | R6 | mLDP node
+-----------+ +-----------+
This document specifies a mechanism for deploying the mLDP with the
nodes supporting mLDP completely in the control plane and also in the
forwarding plan, mixed with the nodes which do not support the mLDP
but can propagate the mLDP mapping message toward the root until it
finds the node which supports the mLDP. Both the protocol extensions
and processing procedures are specified in this documents.
2. mLDP Deployment Through Transparent Tunnels
+------------+
| R1 | mLDP node
+------------+
/ \
+-----------+ +-----------+ non-mLDP node with mLDP
mLDP node | R2 | | R3 | Tunnel Through capability
+-----------+ +-----------+
\
+-----------+
| R4 | mLDP node
+-----------+
/ \
+-----------+ +-----------+
mLDP node | R5 | | R6 | mLDP node
+-----------+ +-----------+
mLDP Deployment Through Transparent Tunnels
Chen & Zhao Expires January 14, 2013 [Page 5]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
Figure 1
In the figure above, when the R4 finds out that the upstream router
R3 doesn't support mLDP completely but it supports the mLDP Tunnel
Through capability, R4 will send out a notification message with its
LSR-ID. When the R3 receives this notification message, it will
propagate the notification message to is upstream router until
arriving the nearest mLDP capable router, such as R1 in this case.
When R1 receives the notification message, it will trigger the
establishment of targeted LDP session and transparent tunnel to R4.
When finished, R1 will notify R4 to consider it as an upstream
router. Then mLDP advertisement is able to continue.
+------------+
| R1 | mLDP node
+------------+
/ \
+-----------+ +-----------+
mLDP node | R2 | | R3 | mLDP node
+-----------+ +-----------+
\
+-----------+ non-mLDP node with mLDP
| R4 | Tunnel Through capability
+-----------+
/ \
+-----------+ +-----------+
mLDP node | R5 | | R6 | mLDP node
+-----------+ +-----------+
mLDP Deployment Through Transparent Tunnels for Branch Node
Figure 2
In the figure above, assume that R5 has already setup targeted LDP
session and transparent tunnel with R3. When the R6 joins this mLDP
LSP and finds out that the upstream router R4 doesn't support mLDP
completely but it supports the mLDP Tunnel Through capability, R6
will trigger another targeted LDP session and transparent tunnel
between R6 and R3. In this case, R3 will become the branch node for
this mLDP LSP, where the outgoing two branches are implemented by
using two tranparent tunnels.
2.1. Signaling Procedures
Chen & Zhao Expires January 14, 2013 [Page 6]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
o LDP speakers advertise their capabilities in Initialization
message or Capability message.
o Assume that the node D is setting up the MP-LSP <R, X>, D finds
out that the direct connected "upstream LSR" for <R, X> does not
support mLDP, but it supports mLDP Tunnel Through capability.
o The node D sends an notification message to this upstream node
with its local LSR-ID and mLDP LSP's root node IP address.
o The next hop node propagate the notification message to its
upstream node until it reaches the node which supports the full
mLDP capability.
o When the first node which has mLDP full capability receives this
notification, it will trigger LDP target session(s) and
transparent tunnel(s) with the node D identified by the LSR-ID in
the notification message. When finished, this first node will
tell the node D identified by the LSR-ID to chose it as the
upstream router for the mLDP LSP establishment.
o Once the node with the LSR-ID receives this notification from the
first node, it will setup the mLDP LSP as its upstream node to the
root of the mLDP using the method superficies in
draft-napierala-mpls-targeted-mldp.
2.2. Protocol Extensions
Two new types of LDP MP Status Value Element are defined, following
the MP Status TLV specification in [RFC6388]. One of them is used to
identify the root node address of the mLDP, the other is used for
identifying the LSR which needs the p2p tunnel to setup the mLDP LSP.
Their encoding are as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type 1 (TBD) | Length | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| LSR Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Chen & Zhao Expires January 14, 2013 [Page 7]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type 2 (TBD) | Length |C|S| Reserved|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Root IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Capability (C) Flag : 0 = Setting up P2MP LSP
1 = Setting up MP2MP LSP
Signaling (S) Flag : 0 = Advertising the mLDP LSP
1 = Withdrawing the mLDP LSP
3. mLDP Tunnel Through Capability
The mLDP Tunnel Through Capability is advertised among the LDP peers.
The encoding of mLDP Tunnel Through Capability Parameter TLV is:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1|0| mLDP Tunnel Through (TBD) | Length (= 1) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|S| Reserved |
+-+-+-+-+-+-+-+-+
S: As specified in [RFC5561]
If one router does not received the mLDP Tunnel Through Capability
advertisement from its neighbor, it should not send the mLDP Tunnel
Through related messages to this neighbor. If one router receives
the mLDP capability annoucement with the mLDP Tunnel Through
capbility, it will silently ignore the mLDP Tunnel Through capability
and consider the sender supports fully mLDP capability. Also if the
router has not advertised the mLDP Tunnel Through Capability, and it
receives the mLDP Tunnel Through related messages, then the receiver
of the message will treat this error as same as it treats for other
unrecognized messages.
4. Handling Route Change Or Failure Event
Assume that the targeted LDP session between the two LSRs with the
Chen & Zhao Expires January 14, 2013 [Page 8]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
mLDP capabilities is established, if there is a route change event
and as the result of this, the downstream router of these two LSR
will have a new upstream router to the root for a specific mLDP LSP,
then the downstream router will treat this similar as the normal re-
route cases. If there is no Make Before Break (MBB) supported, then
the downstream router will delete the LSP setup through targeted
session, then delete the useless targeted session and transparent
tunnel(s). If there is MBB deployed, then the downstream router will
setup the new LSP first and then delete the existing LSP using the
MBB procedures.
If the route from mLDP node to Root node doesn't change, but the
route from the lightweight mLDP node to Root node changes, this
lightweight mLDP node needs to withdraw the previous notification and
advertise a new one to the new upstream node.
5. Acknowledgements
We would like to thank authors of draft-ietf-mpls-mp-ldp-reqs and the
authors of draft-napierala-mpls-targeted-mldp from which some text of
this document has been inspired.
6. IANA Considerations
This memo includes the following requests to IANA:
o mLDP Tunnel Through Capability.
o mLDP LSP Through Transparent Tunnel Status Code for LSR
Identifier.
o mLDP LSP Through Transparent Tunnel Status Code for Root IP
Address.
7. Security Considerations
The same security considerations apply as for the base LDP
specification, as described in [RFC5036].
8. References
Chen & Zhao Expires January 14, 2013 [Page 9]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
Label Switching Architecture", RFC 3031, January 2001.
[RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP
Specification", RFC 5036, October 2007.
[RFC5561] Thomas, B., Raza, K., Aggarwal, S., Aggarwal, R., and JL.
Le Roux, "LDP Capabilities", RFC 5561, July 2009.
[RFC6348] Le Roux, JL. and T. Morin, "Requirements for Point-to-
Multipoint Extensions to the Label Distribution Protocol",
RFC 6348, September 2011.
[RFC6388] Wijnands, IJ., Minei, I., Kompella, K., and B. Thomas,
"Label Distribution Protocol Extensions for Point-to-
Multipoint and Multipoint-to-Multipoint Label Switched
Paths", RFC 6388, November 2011.
8.2. Informative References
[I-D.napierala-mpls-targeted-mldp]
Napierala, M. and E. Rosen, "Using LDP Multipoint
Extensions on Targeted LDP Sessions",
draft-napierala-mpls-targeted-mldp-02 (work in progress),
October 2011.
Authors' Addresses
Emily Chen
Huawei Technology
2330 Central Expressway
Santa Clara, CA 95050
US
Email: emily.chenying@huawei.com
Chen & Zhao Expires January 14, 2013 [Page 10]
Internet-Draft Deploying mLDP Through P2P LSP Tunnels July 2012
Quintin Zhao
Huawei Technology
125 Nagog Technology Park
Acton, MA 01719
US
Email: quintin.zhao@huawei.com
Chen & Zhao Expires January 14, 2013 [Page 11]