One document matched: draft-allan-pw-o-pbt-01.txt
Differences from draft-allan-pw-o-pbt-00.txt
Internet Draft David Allan
Document: draft-allan-pw-o-pbt-01.txt Florin Balus, Nigel Bragg
Category: Standards Track
Nortel
July 2006
Pseudo Wires over Provider Backbone Transport
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire in January 2007.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This memo describes architecture and procedures for the operation of
pseudo wires over provider backbone transport (PBT).
1. Introduction
Provider backbone transport offers a mechanism to permit scalable
p2p trunks to be configured or signaled in an Ethernet subnetwork.
Such trunks are suitable to function in the role of PSN in the PWE3
architecture.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
Allan et.al Expires January 2007 Page 1
Pseudo Wires over Provider Backbone Transport
"OPTIONAL" in this document are to be interpreted as described in
RFC 2119.
In addition to well understood GMPLS terms, this memo uses
terminology from IEEE 802.1 and introduces a few new terms:
B-MAC Backbone MAC
B-VID Backbone VLAN ID
B-VLAN Backbone Virtual LAN
C-MAC Customer MAC
C-VID Customer VLAN ID
C-VLAN Customer Virtual LAN
DA Destination Address
LLC Logical Link Control
MAC Media Access Control
PBB Provider Backbone Bridge
PBT Provider Backbone Transport
RTP Real time protocol
SA Source Address
VID VLAN ID
VLAN Virtual LAN
3. PWoPBT architecture
PBT permits Ethernet bi-directional p2p trunks to be configured
across an Ethernet subnetwork. These trunks can be either
configured by management or signaled as described in [FEDYK].
Frequently more than one diversely routed trunk is set up to form a
protection group, the most common instantiation being 1:1
protection switching.
+---------------------+ +-------------------------+
| Payload |------------->| Raw payload if possible |
/=====================\ +-------------------------+
H Payload Convergence H-----------+->| Flags, seq #, etc. |
H---------------------H / +-------------------------+
H Timing H---------/--->| RTP |
H---------------------H / +-------------+ |
H Sequencing H----one of | |
\=====================/ \ | +-----------+
| PW Demultiplexer |---------+--->| PW service label |
+---------------------+ +-------------------------+
| PSN Convergence |------------->| Not needed |
+---------------------+ +-------------------------+
| PSN |------------->| PBT |
+---------------------+ +-------------------------+
| Data-Link |------------->| Data-link |
+---------------------+ +-------------------------+
| Physical |------------->| Physical |
+---------------------+ +-------------------------+
Allan et.al. Expires January 2007 Page 2
Pseudo Wires over Provider Backbone Transport
Figure 1. PWE3 architecture illustrating role of PBT
Figure 1 illustrates the role of PBT in the PWE3 architecture [PW-
ARCH}. Where PBT Ethernet PDUs are carried directly over an
Ethernet PHY, the PBT, data-link and physical layers are
effectively a single layer from the point of view of control and
management.
The PWoPBT architecture takes advantage of the fact that the
Ethernet LLC permits multiple protocols to be simultaneously
multiplexed over a PBT protection group. This permits both MPLS/PW
payload/PDUs and IP control and OAM PDUs to be multiplexed
together.
+-ATM +-PING
+-Ethernet +-BFD
+-FR +-ETHOAM
+-HDLC |
+-PPP |
+-SaTOP |
| (etc.) |
+----------+ +--------+
|PW payload| | PW OAM |
+----------+ +--------+
| |
0000 0001 +--------------+
\ / | LDP |
+-------------------+ +--------------+
| PW CW | | TCP |
+-------------------+ +--------------+ +--------------+
| PW label | | IP | |802.1ag/Y.1731|
+-------------------+ +--------------+ +--------------+
| | |
=0x8847 =0x0800 =TBD
\ | /
/+-------------------------------------------------+\
/ | etype | \
/ +-------------------------------------------------+ \
/ | VLAN | PBT
802.1Q+-------------------------------------------------+ PSN
header| SA-MAC | /
\ +-------------------------------------------------+ /
\ | DA-MAC | /
\+-------------------------------------------------+/
Figure 2: Multiplexing of PW bearer, PW OAM, PW control & trunk
OAM over PBT trunk
Further, control, bearer and OAM PDUs inherently share fate with
the PBT trunk or (where used) protection group simplifying the job
of proactive monitoring of connectivity. Where a protection group
is used control, OAM and bearer traffic is forwarded on the
currently active path of the protection group. Further the PW
Allan et.al. Expires January 2007 Page 3
Pseudo Wires over Provider Backbone Transport
service may directly inherit availability status from the trunk or
protection group.
In addition to the regular IP Infrastructure that may be
established to support PSN Control Plane (routing, GMPLS signaling)
exchanges, a PBT trunk may appear as a single IP hop. The IP
control channel allows the mode of operation to be directly
analogous to channel associated signaling. PW labels offered over
the signaling channel are directly bound to the PBT trunk and
inherit the QoS characteristics of the trunk directly.
PBT trunks/protection groups may interconnect two U-PEs, a U-PE to
an S-PE, an S-PE to an S-PE. Connecting a U-PE to diverse S-PEs is
for further study.
4. Signaling Procedures
4.1 Adjacency Establishment and Session Initialization
PW control assumes an a-priori existence of one or more PBT
protection groups between a given pair of PEs.
One hello adjacency will be established between any two PEs per PBT
protection group. The preferred method of indicating the transport
address of the PE is implicit (source address in the Hello
exchange). A PE implements only one transport IP address. It is
common to all PBT trunk terminations. This is typically the PE
loopback address.
LDP extended discovery is used over the working path of the PBT
protection group.
The label space indicated in the LDP Link Hello message MUST be the
per-platform label space.
4.2 Signaling Procedures
Once the Hello adjacency has been established, LDP session
initialization proceeds as per [RFC 3036].
Label exchange procedures are as per [PWE-CONTROL] for single
segment pseudo wires and as per [MS-PW] for multi-segment pseudo
wires.
4.3 Fault scenarios
Failure of a single PBT trunk in the protection group will not
disrupt either the bearer path or the control adjacency. Failure of
all trunks in a protection group or the failure of a PE at a
terminating end to a protection group will disrupt the service. If
the network has not been completely severed by link failures, PBT
may be able to recover connectivity prior to expiration of the LDP
hold timer.
Allan et.al. Expires January 2007 Page 4
Pseudo Wires over Provider Backbone Transport
4.4 Interworking MS-PWs
PBT introduces no new procedures into the interworking of MS-PWs.
It simply takes the role of a PSN Tunnel in one or more segments.
Bi-directional PBT trunks are consistent with the requirement for
both directions of an MS-PW to transit common S-PE devices.
5. OAM Procedures
5.1 Capability Indication
OAM capability indication procedures as per [VCCV] and extended in
[MOHAN] is used unmodified.
5.2 Control Channel
In-band VCCV may be used for both SS and MS PWs without
modifications to procedures described in [VCCV] and [MS-PW].
5.3 VCCV BFD
For a single segment PW, use of VCCV BFD is not required as the PW
is 1:1 congruent with the transporting PBT protection group (which
does not implement load spreading such as ECMP) so the PBT OAM
effectively instruments connectivity for the set of PWs carried.
For MS-PWs where a least one segment transits a non PBT network
such as ECMP/LDP, VCCV BFD may be used as PSN OAM congruency with
the PW layer cannot be guaranteed.
5.4 VCCV-PING
Normally the return path for a VCCV-PING reply is the PW in the
reverse direction. This is indicated by LSP-PING reply mode 2. It
is also possible to indicate that the reply traverse each segment
of a MS-PW by indicating a reply mode of 3 (use of router alert in
the reply message) although this only slightly modifies the return
path congruency for pure PBT architectures, and is of primary use
in decoupling the return path from the PW in other PSN types.
5.5 VCCV-ETHOAM
[MOHAN] proposes the use of [802.1ag] and [Y.1731] OAM PDUs in
conjunction with the VCCV channel. In this scenario MEPs are co-
located with the PW end points and for MS-PWs, MIPs are co-located
with the S-PEs.
6. Security Considerations
The use of PBT as a PSN introduces no new security vulnerabilities
to the PWE architecture.
7. References
[FEDYK] GMPLS Control of Ethernet, IETF Internet Draft, draft-
fedyk-gmpls-ethernet-pbt-00.txt, June 2006
[MOHAN] VCCV Extension for Ethernet OAM, IETF Internet Draft
draft-mohan-pwe3-vccv-eth-00.txt, June 2006
Allan et.al. Expires January 2007 Page 5
Pseudo Wires over Provider Backbone Transport
[MS-PW] Dynamic Placement of Multi Segment Pseudo Wires, IETF
Internet Draft, draft-ietf-pwe3-dynamic-ms-pw-01.txt,
June 2006
[PW-ARCH] Pseudo Wire Emulation Edge-to-Edge (PWE3)
Architecture, IETF RFC 3985, March 2005
[PW-CONTROL] Pseudowire Setup and Maintenance using the Label
Distribution Protocol, IETF RFC 4447, April 2006
[RFC 3036] LDP Specification, IETF RFC 3036, January 2001
[VCCV] Pseudo Wire Virtual Circuit Connectivity Verification
(VCCV), IETF Internet Draft, draft-ietf-pwe3-vccv-
10.txt, June 2006
[Y.1731] Y.1731 (2006), ITU-T Recommendation, OAM functions and
mechanisms for Ethernet based networks
[802.1ag] Connectivity Fault Management, IEEE 802.1ag draft 6.1,
work in progress.
8. Author's Address
Dave Allan
Nortel Networks Phone: 1-613-763-6362
3500 Carling Ave. Email: dallan@nortel.com
Ottawa, Ontario, CANADA
Florin Balus
Nortel Networks Phone: 1-613-768-4997
3500 Carling Ave. Email: balus@nortel.com
Ottawa, Ontario, CANADA
Nigel Bragg
Nortel Networks UK Limited Phone +44 (0) 1279 40 2052
London Road, Harlow, Essex, Email nbragg@nortel.com
CM17 9NA, UK
9. Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
Allan et.al. Expires January 2007 Page 6
Pseudo Wires over Provider Backbone Transport
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
10.Disclaimer of Validity
This document and the information contained herein are provided
on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT
THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR
ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
11.Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
12.Acknowledgments
The authors would like to thank Dinesh Mohan for his contributions
to this document.
| PAFTECH AB 2003-2026 | 2026-04-23 06:58:13 |