draft-ietf-mpls-tp-temporal-hitless-psm-03.txt | draft-ietf-mpls-tp-temporal-hitless-psm-04.txt | |||
---|---|---|---|---|
MPLS Working Group A. D'Alessandro | MPLS Working Group A. D'Alessandro | |||
Internet Draft Telecom Italia | Internet Draft Telecom Italia | |||
M.Paul | M.Paul | |||
Deutsche Telekom | Deutsche Telekom | |||
Intended status: Informational S. Ueno | Intended status: Informational S. Ueno | |||
NTT Communications | NTT Communications | |||
Y.Koike | Y.Koike | |||
NTT | NTT | |||
Expires: Nov7, 2013 May 8, 2013 | Expires: Mar. 20, 2014 Oct 21, 2013 | |||
Temporal and hitless path segment monitoring | Temporal and hitless path segment monitoring | |||
draft-ietf-mpls-tp-temporal-hitless-psm-03.txt | draft-ietf-mpls-tp-temporal-hitless-psm-04.txt | |||
Status of this Memo | Status of this Memo | |||
This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
other groups may also distribute working documents as Internet-Drafts. | other groups may also distribute working documents as Internet-Drafts. | |||
skipping to change at page 1, line 36 | skipping to change at page 1, line 36 | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
This Internet-Draft will expire on November 7, 2013. | This Internet-Draft will expire on March 20, 2014. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2011 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents carefully, | publication of this document. Please review these documents carefully, | |||
skipping to change at page 2, line 42 | skipping to change at page 2, line 42 | |||
This document is a product of a joint Internet Engineering Task Force | This document is a product of a joint Internet Engineering Task Force | |||
(IETF) / International Telecommunications Union Telecommunications | (IETF) / International Telecommunications Union Telecommunications | |||
Standardization Sector (ITU-T) effort to include an MPLS Transport | Standardization Sector (ITU-T) effort to include an MPLS Transport | |||
Profile within the IETF MPLS and PWE3 architectures to support the | Profile within the IETF MPLS and PWE3 architectures to support the | |||
capabilities and functionalities of a packet transport network. | capabilities and functionalities of a packet transport network. | |||
Table of Contents | Table of Contents | |||
1. Introduction ................................................ 4 | 1. Introduction ................................................ 4 | |||
2. Conventions used in this document ............................ 4 | 2. Conventions used in this document............................ 4 | |||
2.1. Terminology ............................................ 5 | 2.1. Terminology ............................................ 5 | |||
2.2. Definitions ............................................ 5 | 2.2. Definitions ............................................ 5 | |||
3. Network objectives for monitoring ............................ 5 | 3. Network objectives for monitoring............................ 5 | |||
4. Problem statement ........................................... 6 | 4. Problem statement ........................................... 6 | |||
5. OAM functions using segment monitoring ...................... 10 | 5. OAM functions using segment monitoring ...................... 10 | |||
6. Further consideration of requirements for enhanced segment | 6. Further consideration of requirements for enhanced segment | |||
monitoring .................................................... 10 | monitoring .................................................... 10 | |||
6.1. Necessity of on-demand single-level monitoring.......... 11 | 6.1. Necessity of on-demand single-level monitoring.......... 11 | |||
6.2. Necessity of on-demand monitoring independent from end-to-end | 6.2. Necessity of on-demand monitoring independent from end-to-end | |||
proactive monitoring........................................ 11 | proactive monitoring........................................ 11 | |||
6.3. Necessity of arbitrary segment monitoring .............. 12 | 6.3. Necessity of arbitrary segment monitoring .............. 12 | |||
6.4. Fault during HPSM in case of protection ................ 13 | 6.4. Fault during HPSM in case of protection ................ 13 | |||
7. Summary .................................................... 15 | 7. Summary .................................................... 15 | |||
8. Security Considerations ..................................... 16 | 8. Security Considerations..................................... 16 | |||
9. IANA Considerations ........................................ 16 | 9. IANA Considerations ........................................ 16 | |||
10. References ................................................ 16 | 10. References ................................................ 16 | |||
10.1. Normative References .................................. 16 | 10.1. Normative References.................................. 16 | |||
10.2. Informative References ................................ 16 | 10.2. Informative References................................ 16 | |||
11. Acknowledgments ........................................... 16 | 11. Acknowledgments ........................................... 16 | |||
1. Introduction | 1. Introduction | |||
A packet transport network will enable carriers or service providers | A packet transport network will enable carriers or service providers | |||
to use network resources efficiently, reduce operational complexity | to use network resources efficiently, reduce operational complexity | |||
and provide carrier-grade network operation. Appropriate maintenance | and provide carrier-grade network operation. Appropriate maintenance | |||
functions, supporting fault location, survivability, performance | functions, supporting fault location, survivability, performance | |||
monitoring and preliminary or in-service measurements, are essential | monitoring and preliminary or in-service measurements, are essential | |||
to ensure quality and reliability of a network. They are essential in | to ensure quality and reliability of a network. They are essential in | |||
End of changes. 7 change blocks. | ||||
8 lines changed or deleted | 8 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |