ITU-T Y 1711-2004 Operation and maintenance mechanism for MPLS networks (Study Group 13)《MPLS网络的AOM机制 系列Y 第13研究组》.pdf
《ITU-T Y 1711-2004 Operation and maintenance mechanism for MPLS networks (Study Group 13)《MPLS网络的AOM机制 系列Y 第13研究组》.pdf》由会员分享,可在线阅读,更多相关《ITU-T Y 1711-2004 Operation and maintenance mechanism for MPLS networks (Study Group 13)《MPLS网络的AOM机制 系列Y 第13研究组》.pdf(36页珍藏版)》请在麦多课文档分享上搜索。
1、 INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.1711TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2004) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT GENERATION NETWORKS Internet protocol aspects Operation, administration and maintenance Operation users of this
2、 Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation doe
3、s not give it, as a stand-alone document, the status of a Recommendation. 2.1 Normative references 1 ITU-T Recommendation I.610 (1999), B-ISDN operation and maintenance principles and functions. 2 ITU-T Recommendation G.805 (2000), Generic functional architecture of transport networks. 3 ITU-T Recom
4、mendation M.20 (1992), Maintenance philosophy for telecommunication networks. 4 ITU-T Recommendation Y.1710 (2002), Requirements for Operation or ii) the LSP terminating LSR for all MPLS layer defects. ITU-T Rec. Y.1711 (02/2004) 5 BDI: The BDI flow is injected on a return path (such as a return LSP
5、) to inform the upstream LSR (which is the source of the forward LSP) that there is a defect at the downstream LSPs LSR sink point. BDI therefore tracks FDI in terms of its period of generation. BDI packets may be useful in 1:1/N instances of protection switching. Performance: These are FFS. However
6、, the intention is to have an on-demand method of determining packet/octet loss on an LSP in order to aid trouble-shooting. They are not intended to be used as a temporally permanent OAM function (unlike the CV flow), but they could be. Note that path trace, performance monitoring and loopback funct
7、ions are FFS. BDI and loopback transactions use a return path. A return path could be: A dedicated return LSP; A shared return LSP, which is shared between many forward LSPs; A non-MPLS return path, such as an out-of-band IP path. This option has potential security issues. For example, the return pa
8、th could be terminated on a different LSR interface, and potentially a malicious user could generate a BDI and send it to the ingress LSR. Therefore, due to the possibility of DoS attack, additional security measures must be taken. Operators should use the optional TTSI field in BDI packets in order
9、 to assure authentication of such packets so that the receivers of BDI OAM packets may verify that the sender of the packet is valid. All OAM packets are identified within a LSP traffic stream by the use of globally well-known and reserved label codepoint (of 14). Further details on the encoding of
10、OAM packets are provided later. It is strongly recommended that CV OAM or FFD OAM packets be generated on each LSP (in order to detect all defects and potentially provide protection against traffic leakage both in and out of LSPs). It is also recommended that FDI OAM packets be used to suppress alar
11、m storms. BDI packets are a useful tool for single-ended monitoring of both directions and also, in some protection-switching cases. However, these are only recommendations, and operators can choose to use some or all of the OAM packets as they see fit. Appendix I discusses some of the options for g
12、enerating and processing CV flows. OAM techniques are applied on a per LSP basis. If a segment of a given LSP at layer N is to be monitored for some reason (e.g., via a CV or P flow say), one way to do this is by creating a new server layer LSP (i.e., at layer N + 1) to cover the segment at layer N.
13、 5.1 Overview of functionality The OAM defect detection function is based on the periodic transmission of CV or FFD packets from ingress to egress of an LSP. CV packet generation rate is 1 packet per second whereas recommended packet generation rate for FFD packets is 20 per second. Each CV and FFD
14、packet carries a unique TTSI (Trail Termination Source Identifier), which is composed of the source LSR identifier, and the LSP identifier. An LSP enters a defect state when one of the defects noted in clause 3 occurs (these are defined in detail later in terms of precise entry/exit criteria and con
15、sequent actions). In addition to the CV packet, there are other OAM packet types defined that provide consequential fault handling or performance monitoring functions. These will be defined later. All OAM packets are identified in terms of a function type by the first octet of the OAM packet payload
16、 as follows (see Table 1): 6 ITU-T Rec. Y.1711 (02/2004) Table 1/Y.1711 OAM function type codepoints OAM function type codepoint (Hex) First octet of OAM packet payload function type and purpose 00 Reserved 01 CV (Connectivity Verification) 02 FDI (Forward Defect Indicator) 03 BDI (Backward Defect I
17、ndicator) 04 Reserved for Performance packets 05 Reserved for LB-Req (Loopback Request) 06 07 Reserved for LB-Rsp (Loopback Response) FFD (Fast Failure Detection) All other OAM Function Type codepoints are reserved for possible future standardization. 5.2 Identification of OAM packets from normal us
18、er-plane traffic The label structure defined in 6 indicates a single label field of 20 bits. Some label field values have already been reserved for special functions 6. This Recommendation introduces a new globally reserved label value, herein referred to as the “OAM Alert Label“. The recommended nu
19、merical value for the OAM Alert Label is 14 11. 5.3 OAM payload The payload of an OAM packet is composed of the OAM Function Type, the specific OAM function type data and a common BIP16 error detection mechanism. All OAM packets must have a minimum payload length of 44 octets to facilitate ease of p
20、rocessing and to support minimum packet size requirements of current L2 technologies (e.g., Ethernet). This is achieved by padding the specific OAM type data field with all 0s when necessary. All padding bits are reserved for possible future standardization. The order of transmission is from left to
21、 right, most significant bit (MSB) to least significant bit (LSB). 5.4 Handling of errored OAM packets Each OAM packet uses a BIP16 (in the last two octets of the OAM payload area) to detect errors. The BIP16 remainder is computed over all the fields of the OAM payload, including the Function Type a
22、nd the BIP16 bit positions (which are all pre-set to zero for initial calculation purposes). The BIP16 generator polynomial is G(x) = x16+ 1. BIP16 processing must be performed on all OAM packets prior to being able to reliably pass their payload for further processing. Any OAM packets that show a B
23、IP16 violation upon reception processing should be discarded. In the case of the CV or FFD packet flow, persistent BIP16 violations will cause a Loss of Connectivity Verification (dLOCV). This behaviour is consistent with the nature of the actual defect being experienced. However, it is recommended
24、that at a local equipment level some notification is given to the Network Management System to indicate when any BIP16 discards are occurring, especially if these give rise to an associated dLOCV. ITU-T Rec. Y.1711 (02/2004) 7 In the case of the other OAM packet types, i.e., the FDI, BDI and P packe
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTY17112004OPERATIONANDMAINTENANCEMECHANISMFORMPLSNETWORKSSTUDYGROUP13MPLS 网络 AOM 机制 系列 13 研究 PDF

链接地址:http://www.mydoc123.com/p-806268.html