1 / 6

Introduction

Time-to-Live TLV for LSP-Ping draft-boutros-mpls-lsp-ping-ttl-tlv-00 Sami Boutros Siva Sivabalan George Swallow. Introduction. This draft specifies a method to verify connectivity of a segment of a Multi-Segment PseudoWire (MS-PW) from any node on the path of the MS-PW. Problem Definition.

moe
Download Presentation

Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Time-to-Live TLV for LSP-Pingdraft-boutros-mpls-lsp-ping-ttl-tlv-00Sami Boutros Siva Sivabalan George Swallow

  2. Introduction • This draft specifies a method to verify connectivity of a segment of a Multi-Segment PseudoWire (MS-PW) from any node on the path of the MS-PW.

  3. Problem Definition MS-PW LSR-1 LSR-2 LSR-3 LSR-4 LSR-5 A MS-PW can span across multiple service provider networks. To allow Service Providers (SP) to verify segments of a MS- PW from any node on the path of the MS-PW. If the originator node is not at the end of the MS-PW, the receiver of the echo request MAY need to know how many hops away the originator of the echo request is so that it can set the TTL value on the MPLS header for the echo reply to be intercepted at the originator node.

  4. Proposed Solution MS-PW LSR-1 LSR-2 LSR-3 LSR-4 LSR-5 • Assume a MS-PW going through the LSRs. • An operator wants to perform a connectivity check between LSR-2 and LSR-4 from LSR-2. • An LSP-Ping request with the TTL TLV is originated from LSR-2 and sent towards LSR-4. • The echo request packet contains the FEC of the PW Segment between LSFR-3 and LSR-4. • The value field of the TTL TLV and the TTL field of the MPLS label are set to 2. • The echo request is intercepted at LSR-4 because of TTL expiry. LSR-4 detects the TTL TLV in the request, and use the TTL value (i.e., 2) specified in the TLV on the MPLS label of the echo reply. • The echo reply will be intercepted by LSR-2 because of TTL expiry.

  5. Time To Live TLV • 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 • +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • | type = TBD | Length = 8 | • +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • | value | • +-+-+-+-+-+-+-+-+ • This TLV shall be included in the echo request by the originator of request.

  6. Thank You

More Related