Internet DRAFT - draft-zhang-pwe3-gid-app
draft-zhang-pwe3-gid-app
PWE3 Working Group Haiyan Zhang
Internet Draft Eric Li
Jixiong Dong
Yang Yang
Huawei
Expires: August 2006 February 17, 2006
Pseudowire Group ID Application
draft-zhang-pwe3-gid-app-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that
any applicable patent or other IPR claims of which he or she is
aware have been or will be disclosed, and any of which he or she
becomes aware will be disclosed, in accordance with Section 6 of
BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on August 17, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006). All Rights Reserved.
Abstract
The Pseudowire Group ID is introduced and simply defined in [PWE3-
CTRL], but how to use Pseudowire Group ID has not been definitely
expounded. This document details the applications of Pseudowire Group
ID.
Zhang Expires August 17, 2006 [Page 1]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119.
Table of Contents
1. Introduction................................................2
2. Terminology.................................................3
3. PW Group....................................................3
4. PW Group ID Application......................................3
4.1. PW Group Protection.....................................4
4.1.1. Protection Information.............................6
4.1.2. Monitoring.........................................6
4.1.3. PW Group Setup.....................................7
4.1.3.1. PW Group Setup by Static Provisioning..........7
4.1.3.2. PW Group Setup by Signaling...................8
4.1.4. PW Group Teardown..................................9
4.1.5. PW Group Protection Behavior......................10
5. Security Considerations.....................................10
6. IANA Considerations........................................10
7. Acknowledgments............................................10
8. References.................................................10
8.1. Normative References...................................10
8.2. Informative References.................................11
9. Author's Addresses.........................................11
10. Intellectual Property Statement............................12
Disclaimer of Validity........................................12
Copyright Statement...........................................12
Acknowledgment................................................13
1. Introduction
The PW Group ID is introduced in [PWE3-CTRL], and the Group ID field
in the PWid FEC element and the PW Grouping ID TLV in the Generalized
ID FEC element are defined, i.e. an arbitrary 32 bit value which
represents a group of PWs that is used to create groups in the PW
space.
But the application of PW Group ID has not been definitely expounded.
The document describes the further applications of PW Group ID in
detail.
Zhang Expires August 17, 2006 [Page 2]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
2. Terminology
The document defines the following additional terms:
- PW Group (PWG). A group of PWs, these PWs have some common
characters such as the same PW endpoints, the same PW type or the
same QoS requirements etc. A group of PWs must have the same Group
ID.
- Working PW Group (W-PWG). The PW Group is used to transmit the
service traffic. The service traffic is switched over to the
protection PW Group when the working PW Group failed.
- Protection PW Group (P-PWG). The PW Group is used to protect the
working PW Group. The service traffic is transmitted by protection
PW Group when the working PW Group failed.
- Protection Group. The collection of the Working PW Groups and the
protection PW Groups that are used to provide extra reliability
for the transport of service traffic signals in the Working PW
Groups.
- Monitored Pseudo Wire (M-PW). A monitored PW in a PWG, and the
attribute and status of the M-PW represents the attribute and
status of the PWG. The PW Group protection switching is initiated
when detecting the fault of M-PW.
3. PW Group
In [PWE3-CTRL], the PW group ID is intended to be used as a port
index or a virtual tunnel index. The Group ID field or the PW
Grouping ID TLV can be used to send "wild card" label withdrawals or
"wild card" status notification messages to remote PEs for all
affected sets of PWs.
In fact, the PW Groups may be composed of one or more, SS-PW or MS-PW
PWs by definite rules, and the PWs in the same PW Group must have the
same PW Group ID. The different rules may be adopted for the
different application.
4. PW Group ID Application
The existing protection mechanism adopts the tunnel protection. But
the defects of PWs can not be detected at tunnel. If the protection
connection of some PW goes wrong, the protection switching from the
working tunnel to the protection tunnel can not prevent the traffic
Zhang Expires August 17, 2006 [Page 3]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
loss of this PW. Furthermore, the tunnel protection is not applicable
to the MS-PW.
The PW protection mechanism described in [PWE3-PROTECT] solves the
issue of tunnel protection. But the system must monitor every PW. In
case of large numbers of PWs, the switching speed and the QoS will be
influenced.
Therefore, the PW Group protection is introduced and is implemented
by PW Group ID. One or more typical PWs in a PW Group are monitored.
Not to monitor the tunnel or every PWs, enhance the switching
efficiency and reduce the system burthen.
The following sections detail that PW Group ID is used for the End-
to-End PW Group protection. The other applications of PW Group ID
will be studied in the future.
4.1. PW Group Protection
For PW Group protection, a PW Group (PWG) must consist of PWs that
have the same PW endpoints. The other characters such as the same PW
type, the same QoS requirements and the same path etc, may be added
as the partition factors, but not be required.
The working PWGs (W-PWGs) and corresponding protection PWGs (P-PWGs),
that may have the different Group ID and protection information, are
established between two PW endpoints. According to the detection and
the preference level, the service traffic is switched between the W-
PWGs and the P-PWGs, and the protection and recovery are implemented.
There are several types for the PW Group protection, such as 1:1, 1+1
1:N or M:N architecture, revertive or non-revertive switching etc.
Zhang Expires August 17, 2006 [Page 4]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
PWG3
------- ------- -------
| PE5 |--------| PE6 |--------| PE7 |
| |--------| |--------| |
------- ------- -------
|| ||
|| ||
|| ||
------- PWG1 -------
| PE1 |.......................| PE2 |
| |.......................| |
------- -------
|| || ||
|| || ..
|| || ||PWG4
|| || ..
|| || ||
------- PWG2 -------
| PE3 |-----------------------| PE4 |
| |-----------------------| |
------- -------
Figure 1 PW Group Protection
The one or multiple W-PWGs may be protected by the relevant one or
multiple P-PWGs. In Figure 1, there are three PWGs, PWG1, PWG2 and
PWG3 between PE1 and PE2, and the three PWGs compose a protection
group. The PWG1 is W-PWG and consists of two SS-PWs. The PWG2 is P-
PWG and consists of two MS-PWs that transit two S-PEs, PE3 and PE4
along their path. The PWG3 is P-PWG and consisting of two MS-PWs that
transit three S-PEs, PE5, PE6 and PE7 along their path.
The PWs in the W-PWGs and P-PWGs are corresponding one-to-one, and
the corresponding PWs have the same characters such as PW type and
QoS requirements etc. A protection group may be established Group by
Group or according to the corresponding PWs together.
In [PWE3-CTRL], the Group ID must not be required to match in both
directions of a PW, i.e. the PWs are identified only by the PW ID or
Generalized ID FEC element.
But for PWG protection, the PWs are identified by the Group ID field
and PW ID field for PWid FEC, or the PW Grouping ID TLV and
Generalized ID FEC element for Generalized PWid FEC. For example, the
PWs that have the same PW ID and the different Group ID for PWid FEC
are different PWs. Between the two PW endpoints, the normal PWs not
adopting PWG protection must have the different Group IDs with the
PWGs for protection.
Zhang Expires August 17, 2006 [Page 5]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
4.1.1. Protection Information
When the fault takes place, the protection information of the PWGs
decided the protection behavior. The protection information includes
the protection preference level, the protection type and scheme etc.
The PWG has the highest preference level is W-PWG. The PWs in the
same PWG must have the same protection information.
Since the PWs are bidirectional, the protection information need be
manually configured or exchanged by signaling between the two PW
endpoints to achieve the consistent with each other for a PWG.
The Protection TLV defined in [PWE3-PROTECT] can be used to exchange
the protection information. But some bits of the TLV must be used to
distinguish the PWG protection from the PW protection. The PWs in the
same PWG must have the same Protection TLV.
Otherwise, a new PWG Protection TLV may be defined to indicate and
exchange the PWG protection information. In this case, the PWs in the
same PWG may have the same or the different Protection TLV and must
have the same PWG Protection TLV.
4.1.2. Monitoring
The status of a PWG can be obtained by monitoring one or more typical
PWs in the PWG. The monitored PWs (M-PWs) in W-PWGs and P-PWGs may be
inconsistent. If the PWs in a PWG have the different path, it is
proposed that there is at least one M-PW in every different path.
The protection switching and recovery may be originated by the status
change or the VCCV messages in M-PWs.
PW status signaling messages are used as the default mechanism for AC
and PW status and defect notification for MPLS PSN. The Status Codes
value allocations in [IANA] are as follows:
Bit Mask Description
0x00000000 - Pseudo Wire Forwarding (clear all failures)
0x00000001 - Pseudo Wire Not Forwarding
0x00000002 - Local Attachment Circuit (ingress) Receive Fault
0x00000004 - Local Attachment Circuit (egress) Transmit Fault
0x00000008 - Local PSN-facing PW (ingress) Receive Fault
Zhang Expires August 17, 2006 [Page 6]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
0x00000010 - Local PSN-facing PW (egress) Transmit Fault
The above statuses are periodically conveyed by PW status signaling
messages in M-PWs between the two PW endpoints. When the status
change takes place in either PW endpoint, the status is immediately
conveyed.
LRF status (0x00000008) may be produced by the PW forwarder receive
fault, interface fault of the PW endpoints, or the service layer of
the PW.
LTF status (0x00000010) may be produced by the PW forwarder transmit
fault, interface fault of the PW endpoints, or the service layer of
the PW.
When the PW endpoints detect or be notified of LRF or LTF status in
one or more M-PWs of the W-PWG, and the normal status (0x00000000) in
all M-PWs of the P-PWG, the service will be switched from the W-PWG
to the P-PWG.
The other statuses do not belong to PW status, and can not start the
PWG protection switching.
Optionally, the PW endpoints can negotiate the use of VCCV for fault
detection in M-PW.
The VCCV messages are periodically conveyed in M-PWs between the two
PW endpoints. When the PW endpoints do not receive VCCV messages in
one or more M-PWs of the W-PWG for a defined period of time, and VCCV
messages are normally received in all M-PWs of the P-PWG, the service
will be switched from the W-PWG to the P-PWG.
4.1.3. PW Group Setup
4.1.3.1. PW Group Setup by Static Provisioning
The PWs in a PWG are established with the same Group ID by the
existing SS-PW or MS-PW signaling or static configuration. The
protection information for the W-PWGs and P-PWGs is manually
configured at the two PW endpoints.
The particular protection information includes:
- Protection Mode, specify PW Protection or PWG Protection.
- Protection Type, specify Hot Standby or Warm Standby.
Zhang Expires August 17, 2006 [Page 7]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
- Protection Scheme, specify 1:1, 1+1, 1:N or M:N Protection.
- Preference Level, specify the PWGs preference level to determine
the switching preemption behavior.
- Recovery Type, specify revertive or non-revertive.
- M-PWs, specify the PWs to be monitored.
- W-PWGs and P-PWGs, bind the W-PWGs and the P-PWGs into a sigle
protection group by associating the Group IDs of W-PWGs and P-PWGs.
4.1.3.2. PW Group Setup by Signaling
The PWG protection can be implemented by Group ID, and need not
extend the existing PW control and maintenance signaling.
The document details the signaling procedures for 1:1 and 1+1 taking
example for Generalized PWid FEC. The signaling procedures for PWid
FEC are similar. The signaling procedures for 1:N and M:N will be
discussed in the future.
In Figure 1, the PE1 sends the Label Mapping messages to initiate the
setup of the PWs. The Label Mapping message for the corresponding PWs
must have the same PW FEC.
The M-PWs are identified by the initial Label Mapping message with a
Protection TLV, i.e. only the messages of the M-PWs include the
Protection TLV and the messages of the other PWs in the PWG do not
include the Protection TLV. Therefore the M-PWs must be first
established to confirm the protection attribute of the PWG by the
Protection TLV. And the M-PWs in the different PWG must have the
different protection preference level. The corresponding PWGs are
bound together to a protection group by the M-PWs with the same PW
FEC.
The PE2 receives the Label Mapping message.
If the PE2 does not support the Protection TLV, it will silently
ignore the TLV in which the U bit (Unknown message bit) is set and
continue the PW setup procedures, i.e. PE2 will send Label Mapping
message without the Protection TLV to setup the PW in the opposite
direction. But only one PW can be setup per pair of ACs between PE1
and PE2. The PE2 will reply a Label Release message if PE1 send
message to setup the extra PWs.
Zhang Expires August 17, 2006 [Page 8]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
If the PE2 detects that a Protection TLV is included in the message,
the protection mechanism should be implemented. If the protection
mode of the Protection TLV indicates the PW protection, the PW
protection should be implemented refer to [PWE3-PROTECT].
Otherwise, the protection mode of the Protection TLV indicates the
PWG protection and the Group ID is new, then a new PWG is established.
The PW is marked as the M-PW and PE2 will send Label Mapping message
with the Protection TLV to setup the PW in the opposite direction. In
this case, if the PW FEC already exists in the other PWG, then the
corresponding PWGs should be bound to a protection group.
If the protection mode of the Protection TLV indicates the PWG
protection, but the Group ID already exists and the PW FEC is new in
the PWG, then the PW will join to the PWG, and the PW is marked as
the M-PW. PE2 will send Label Mapping message with the Protection TLV
to setup the PW in the opposite direction. If the PW FEC already
exists in the PWG, i.e. there exist a PW that has the same Group ID
and PW FEC. Then the Label Mapping message is treated as the update
message for the PW. This instance is applicable to afresh specify the
M-PWs.
If the PE2 detects that a Protection TLV is not included in the
message and the Group ID is new, the PW has not protection
characteristic. PE2 sends the Label Mapping message without the
Protection TLV in opposite direction, and a normal PW will be setup.
If the PE2 detects that the Group ID already exists and the PW FEC is
new in the PWG, then the PW will join to the PWG. PE2 will send Label
Mapping message without the Protection TLV to setup the PW in the
opposite direction. If the PW FEC already exists in the PWG, i.e.
there exist a PW that has the same Group ID and PW FEC. Then the
Label Mapping message is treated as the update message for the PW.
In the above-mentioned procedures, the preference level in Protection
TLV may be specified by the original PE (PE1) or the target PE (PE2).
If specified by the target PE, the preference level field may be set
to a fixed value in the original message and be set to the usable
preference level by target PE in reverse message.
4.1.4. PW Group Teardown
Before all M-PWs in a PWG are deleted, the new one or more M-PWs must
be established by manually configuration or signaling, or the
existing one or more non M-PWs must be afresh specified to the M-PWs
by the manually configuration or Label Mapping message with the
Protection TLV.
Zhang Expires August 17, 2006 [Page 9]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
Otherwise, the fault can not be detected by monitoring the M-PWs, and
the protection switching can not be implemented in time, so as to the
service is broken off.
Once all the M-PWs in a PWG are deleted and no M-PWs exist in the PWG,
the PWG may be torn down.
Certainly, the PW Group may be torn down by the "wild card" label
withdrawal message.
4.1.5. PW Group Protection Behavior
When the faults are determined in one or more M-PWs of a W-PWG, and
the M-PWs in the P-PWG are normal, the protection switching takes
place.
After all M-PWs in a W-PWG recovery, it is decided whether the
service will revert back to the W-PWG or not according to the
specific protection mode, Revertive or non-revertive.
When protection switching takes place, if there are multiple P-PWGs,
the service will be switched into the normal P-PWG that has the sub-
highest preference level.
5. Security Considerations
This document describes the applications of the Group ID, and it has
the same security properties as in [PWE3-CTRL].
6. IANA Considerations
This document does not define the new extension, and need not the
assignment by IANA.
7. Acknowledgments
8. References
8.1. Normative References
[PWE3-CTRL] Luca Martini (ED), Toby Smith, "Pseudowire Setup and
Maintenance using the Label Distribution Protocol", draft-
ietf-pwe3-control-protocol-17.txt, June 2005.
Zhang Expires August 17, 2006 [Page 10]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
[PWE3-OAM] Thomas D. Nadeau, Monique Morrrow, Peter Busschbach,
Mustapha Aissaoui, "Pseudo Wire (PW) OAM Message Mapping",
draft-ietf-pwe3-oam-msg-map-03.txt, September 2005.
[PWE3-VCCV] T. D. Nadeau (ED), R. Aggarwal (ED), "Pseudo Wire Virtual
Circuit Connectivity Verification (VCCV)", draft-ietf-pwe3-
vccv-07, September 2005.
8.2. Informative References
[PWE3-ARCH] Bryant, S., Pate, P., "PWE3 Architecture", RFC 3985,
March 2004.
[PWE3-REQ] Xiao, X., McPherson, D., Pate, P., "Requirements for
Pseudo Wire Emulation Edge to-Edge (PWE3)", RFC 3916,
January 2004.
[PWE3-PROTECT] Ping Pan, "Pseudo Wire Protection", draft-pan-pwe3-
protection, July 2005.
[IANA] Luca Martini, "IANA Allocations for pseudo Wire Edge to Edge
Emulation (PWE3)", draft-ietf-pwe3-iana-allocation-15,
November 2005.
9. Author's Addresses
Haiyan Zhang
Huawei Technologies Co., Ltd.
Bantian industry base, Longgang district
Shenzhen, China
Email: zhanghaiyan@huawei.com
Eric Li
Huawei Technologies Co., Ltd.
Bantian industry base, Longgang district
Shenzhen, China
Email: xxl@huawei.com
Jixiong Dong
Huawei Technologies Co., Ltd.
Bantian industry base, Longgang district
Shenzhen, China
Email: dongjixiong@huawei.com
Zhang Expires August 17, 2006 [Page 11]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
Yang Yang
Huawei Technologies Co., Ltd.
Bantian industry base, Longgang district
Shenzhen, China
Email: healthinghearts@huawei.com
10. Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
Zhang Expires August 17, 2006 [Page 12]
Internet-Draft draft-zhang-pwe3-gid-app-00.txt February 2006
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Zhang Expires August 17, 2006 [Page 13]