RFC4090: Fast Reroute Extensions to RSVP-TE for LSP Tunnels

Download in PDF format Download in text format






Network Working Group                                        P. Pan, Ed.
Request for Comments: 4090                            Hammerhead Systems
Category: Standards Track                                G. Swallow, Ed.
                                                           Cisco Systems
                                                           A. Atlas, Ed.
                                                           Avici Systems
                                                                May 2005


           Fast Reroute Extensions to RSVP-TE for LSP Tunnels

Status of This Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document defines RSVP-TE extensions to establish backup label-
   switched path (LSP) tunnels for local repair of LSP tunnels.  These
   mechanisms enable the re-direction of traffic onto backup LSP tunnels
   in 10s of milliseconds, in the event of a failure.

   Two methods are defined here.  The one-to-one backup method creates
   detour LSPs for each protected LSP at each potential point of local
   repair.  The facility backup method creates a bypass tunnel to
   protect a potential failure point; by taking advantage of MPLS label
   stacking, this bypass tunnel can protect a set of LSPs that have
   similar backup constraints.  Both methods can be used to protect
   links and nodes during network failure.  The described behavior and
   extensions to RSVP allow nodes to implement either method or both and
   to interoperate in a mixed network.












Pan, et al.                 Standards Track                     [Page 1]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


Table of Contents

   1.  Introduction ...................................................3
       1.1.  Background ...............................................4
   2.  Terminology ....................................................4
   3.  Local Repair Techniques ........................................6
       3.1.  One-to-One Backup ........................................6
       3.2.  Facility Backup ..........................................7
   4.  RSVP Extensions ................................................8
       4.1.  FAST_REROUTE Object ......................................8
       4.2.  DETOUR Object ...........................................11
             4.2.1. DETOUR Object for IPv4 Address ...................11
             4.2.2. DETOUR Object for IPv6 Address ...................12
       4.3.  SESSION_ATTRIBUTE Flags .................................13
       4.4.  RRO IPv4/IPv6 Sub-object Flags ..........................14
   5.  Head-End Behavior .............................................15
   6.  Point of Local Repair (PLR) Behavior ..........................16
       6.1.  Signaling a Backup Path .................................17
             6.1.1. Backup Path Identification: Sender
                    Template-Specific ................................19
             6.1.2. Backup Path Identification: Path-Specific ........19
       6.2.  Procedures for Backup Path Computation ..................20
       6.3.  Signaling Backups for One-to-One Protection .............21
             6.3.1. Make-before-Break with Detour LSPs ...............22
             6.3.2. Message Handling .................................23
             6.3.3. Local Reroute of Traffic onto Detour LSP .........23
        6.4. Signaling for Facility Protection .......................24
             6.4.1. Discovering Downstream Labels ....................24
             6.4.2. Procedures for the PLR before Local Repair .......24
             6.4.3. Procedures for the PLR during Local Repair .......25
             6.4.4. Processing Backup Tunnel's ERO ...................26
        6.5. PLR Procedures during Local Repair ......................26
             6.5.1. Notification of Local Repair .....................26
             6.5.2. Revertive Behavior ...............................27
   7.  Merge Node Behavior ...........................................28
       7.1.  Handling Backup Path Messages before Failure ............28
             7.1.1. Merging Backup Paths using the Sender
                    Template-Specific Method .........................29
             7.1.2. Merging Detours using the Path-Specific Method ...29
             7.1.3. Message Handling for Merged Detours ..............31
       7.2.  Handling Failures .......................................31
   8.  Behavior of All LSRs ..........................................32
       8.1.  Merging Detours in the Path-Specific Method .............32
   9.  Security Considerations .......................................33
   10. IANA Considerations ...........................................33
   11. Contributors ..................................................35
   12. Acknowledgments ...............................................36
   13. Normative References ..........................................36



Pan, et al.                 Standards Track                     [Page 2]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


1.  Introduction

   This document extends RSVP [RSVP] to establish backup label-switched
   path (LSP) tunnels for the local repair of LSP tunnels.  This
   extension will meet the needs of real-time applications such as voice
   over IP, for which user traffic should be redirected onto backup LSP
   tunnels in 10s of milliseconds.  This timing requirement can be
   satisfied by computing and signaling backup LSP tunnels in advance of
   failure and by re-directing traffic as close to the failure point as
   possible.  In this way, the time for redirection includes no path
   computation and no signaling delays, including delays to propagate
   failure notification between label-switched routers (LSRs).  Speed of
   repair is the primary advantage of the methods and extensions
   described here.  The term local repair is used when referring to
   techniques that re-direct traffic to a backup LSP tunnel in response
   to a local failure.

   A protected LSP is an explicitly-routed LSP that is provided with
   protection.  The repair methods described here are applicable only to
   explicitly-routed LSPs.  Application of these methods to LSPs that
   dynamically change their routes, such as LSPs used in unicast IGP
   routing, is beyond the scope of this document.

   Section 2 covers new terminology used in this document.  Section 3
   describes two basic methods for creating backup LSPs.  Section 4
   describes the RSVP protocol extensions to support local protection.
   Section 5 presents the behavior of an LSR that seeks to request local
   protection for an LSP.  The behavior of a potential point of local
   repair (PLR) is given in Section 6, which describes how to determine
   the appropriate strategy for protecting an LSP and how to implement
   each of the strategies.  Section 7 describes the behavior of a merge
   node, the LSR where a protected LSP and its backup LSP rejoin.
   Finally, Section 8 discusses the required behavior of other nodes in
   the network.

   The methods discussed in this document depend upon three assumptions:

      o    An LSR that is on the path of a protected LSP should always
           assume that it is a merge point.  This is necessary because
           the facility backup method does not signal backups through a
           bypass tunnel before failure.

      o    If the one-to-one backup method is used and a DETOUR object
           is included, the LSRs in the traffic-engineered network
           should support the DETOUR object.  This is necessary so that
           the Path message containing the DETOUR object is not
           rejected.




Pan, et al.                 Standards Track                     [Page 3]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      o    Understanding the DETOUR object is required to support the
           path-specific method, which requires that LSRs in the
           traffic-engineered network be capable of merging detours.

1.1.  Background

   Several years before work began on this document, operational
   networks had deployed two independent methods of doing fast reroute;
   these methods are called here one-to-one backup and facility backup.
   Vendors trying to support both methods experienced compatibility
   problems in attempting to produce a single implementation capable of
   interoperating with both methods.  There are technical tradeoffs
   between the methods.  These tradeoffs are so topologically dependent
   that the community has not converged on a single approach.

   This document rationalizes the RSVP signaling for both methods so
   that any implementation can recognize all fast reroute requests and
   clearly respond.  The response may be positive if the method can be
   performed, or it may be a clear error to inform the requester to seek
   alternate backup means.  This document also allows a single
   implementation to support both methods, thereby providing a range of
   capabilities.  The described behavior and extensions to RSVP allow
   LERs and LSRs to implement either method or both.

   While the two methods could in principle be used in a single network,
   it is expected that operators will continue to deploy either one or
   the other.  The goal of this document is to standardize the RSVP
   signaling so that a network composed of LSRs that implement both
   methods or a network composed of some LSRs that support one method
   and others that support both can properly signal among those LSRs to
   achieve fast restoration.

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC2119 [RFC-WORDS].

   The reader is assumed to be familiar with the terminology in [RSVP]
   and [RSVP-TE].

      LSR: Label-Switch Router.

      LSP: An MPLS Label-Switched Path.  In this document, an LSP will
            always be explicitly routed.

      Local Repair: Techniques used to repair LSP tunnels quickly when a
            node or link along the LSP's path fails.



Pan, et al.                 Standards Track                     [Page 4]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      PLR: Point of Local Repair.  The head-end LSR of a backup tunnel
            or a detour LSP.

      One-to-One Backup: A local repair method in which a backup LSP is
            separately created for each protected LSP at a PLR.

      Facility Backup: A local repair method in which a bypass tunnel is
            used to protect one or more protected LSPs that traverse the
            PLR, the resource being protected, and the Merge Point in
            that order.

      Protected LSP: An LSP is said to be protected at a given hop if it
            has one or multiple associated backup tunnels originating at
            that hop.

      Detour LSP: The LSP that is used to re-route traffic around a
            failure in one-to-one backup.

      Bypass Tunnel: An LSP that is used to protect a set of LSPs
            passing over a common facility.

      Backup Tunnel: The LSP that is used to backup up one of the many
            LSPs in many-to-one backup.

      NHOP Bypass Tunnel: Next-Hop Bypass Tunnel.  A backup tunnel that
            bypasses a single link of the protected LSP.

      NNHOP Bypass Tunnel: Next-Next-Hop Bypass Tunnel.  A backup tunnel
            that bypasses a single node of the protected LSP.

      Backup Path: The LSP that is responsible for backing up one
            protected LSP.  A backup path refers to either a detour LSP
            or a backup tunnel.

      MP: Merge Point.  The LSR where one or more backup tunnels rejoin
            the path of the protected LSP downstream of the potential
            failure.  The same LSR may be both an MP and a PLR
            simultaneously.

      DMP: Detour Merge Point.  In the case of one-to-one backup, this
            is an LSR where multiple detours converge.  Only one detour
            is signaled beyond that LSR.

      Reroutable LSP: Any LSP for which the head-end LSR requests local
            protection.  See Section 5 for more detail.

      CSPF: Constraint-based Shortest Path First.




Pan, et al.                 Standards Track                     [Page 5]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      SRLG Disjoint: A path is considered to be SRLG disjoint from a
            given link or node if the path does not use any links or
            nodes which belong to the same SRLG as that given link or
            node.

3.  Local Repair Techniques

   Two different methods for local protection are described.  In the
   one-to-one backup method, a PLR computes a separate backup LSP,
   called a detour LSP, for each LSP that the PLR protects.  In the
   facility backup method, the PLR creates a single bypass tunnel that
   can be used to protect multiple LSPs.

3.1.  One-to-One Backup

   In the one-to-one backup method, a label-switched path is established
   that intersects the original LSP somewhere downstream of the point of
   link or node failure.  A separate backup LSP is established for each
   LSP that is backed up.

              [R1]----[R2]----[R3]------[R4]------[R5]
                  \       \       \    /    \    /
                   [R6]----[R7]----[R8]------[R9]

              Protected LSP:  [R1->R2->R3->R4->R5]
              R1's Backup:    [R1->R6->R7->R8->R3]
              R2's Backup:    [R2->R7->R8->R4]
              R3's Backup:    [R3->R8->R9->R5]
              R4's Backup:    [R4->R9->R5]

              Example 1.  One-to-One Backup Technique

   In the simple topology shown in Example 1, the protected LSP runs
   from R1 to R5.  R2 can provide user traffic protection by creating a
   partial backup LSP that merges with the protected LSP at R4.  We
   refer to a partial one-to-one backup LSP [R2->R7->R8->R4] as a
   detour.

   To protect an LSP that traverses N nodes fully, there could be as
   many as (N - 1) detours.  Example 1 shows the paths for the detours
   necessary to protect fully the LSP in the example.  To minimize the
   number of LSPs in the network, it is desirable to merge a detour back
   to its protected LSP, when feasible.  When a detour LSP intersects
   its protected LSP at an LSR with the same outgoing interface, it will
   be merged.






Pan, et al.                 Standards Track                     [Page 6]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   When a failure occurs along the protected LSP, the PLR redirects
   traffic onto the local detour.  For instance, if the link [R2->R3]
   fails in Example 1, R2 will switch traffic received from R1 onto the
   protected LSP along link [R2->R7], using the label received when R2
   created the detour.  When R4 receives traffic with the label provided
   for R2's detour, R4 will switch that traffic onto link [R4-R5], using
   the label received from R5 for the protected LSP.  At no point does
   the depth of the label stack increase as a result of the detour.
   While R2 is using its detour, traffic will take the path
   [R1->R2->R7->R8->R4->R5].

3.2.  Facility Backup

   The facility backup method takes advantage of the MPLS label stack.
   Instead of creating a separate LSP for every backed-up LSP, a single
   LSP is created that serves to back up a set of LSPs.  We call such an
   LSP tunnel a bypass tunnel.

   The bypass tunnel must intersect the path of the original LSP(s)
   somewhere downstream of the PLR.  Naturally, this constrains the set
   of LSPs being backed up via that bypass tunnel to those that pass
   through some common downstream node.  All LSPs that pass through the
   point of local repair and through this common node that do not also
   use the facilities involved in the bypass tunnel are candidates for
   this set of LSPs.

                 [R8]
                     \
               [R1]---[R2]----[R3]-----[R4]---[R5]
                          \           /    \
                           [R6]===[R7]      [R9]

                Protected LSP 1:   [R1->R2->R3->R4->R5]
                Protected LSP 2:   [R8->R2->R3->R4]
                Protected LSP 3:   [R2->R3->R4->R9]
                Bypass LSP Tunnel: [R2->R6->R7->R4]

                    Example 2.  Facility Backup Technique

   In Example 2, R2 has built a bypass tunnel that protects against the
   failure of link [R2->R3] and node [R3].  The doubled lines represent
   this tunnel.  This technique provides a scalability improvement, in
   that the same bypass tunnel can also be used to protect LSPs from any
   of R1, R2, or R8 to any of R4, R5, or R9.  Example 2 describes three
   different protected LSPs that are using the same bypass tunnel for
   protection.





Pan, et al.                 Standards Track                     [Page 7]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   As with the one-to-one method, there could be as many as (N-1) bypass
   tunnels to fully protect an LSP that traverses N nodes.  However,
   each of those bypass tunnels could protect a set of LSPs.

   When a failure occurs along a protected LSP, the PLR redirects
   traffic into the appropriate bypass tunnel.  For instance, if link
   [R2->R3] fails in Example 2, R2 will switch traffic received from R1
   on the protected LSP onto link [R2->R6].  The label will be switched
   for one which will be understood by R4 to indicate the protected LSP,
   and the bypass tunnel's label will then be pushed onto the label-
   stack of the redirected packets.  If penultimate-hop-popping is used,
   the merge point in Example 2, R4, will receive the redirected packet
   with a label indicating the protected LSP that the packet is to
   follow.  If penultimate-hop-popping is not used, R4 will pop the
   bypass tunnel's label and examine the label underneath to determine
   the protected LSP that the packet is to follow.  When R2 is using the
   bypass tunnel for protected LSP 1, the traffic takes the path
   [R1->R2->R6->R7->R4->R5]; the bypass tunnel is the connection between
   R2 and R4.

4.  RSVP Extensions

   This specification defines two additional objects, FAST_REROUTE and
   DETOUR, to extend RSVP-TE for fast-reroute signaling.  These new
   objects are backward compatible with LSRs that do not recognize them
   (see section 3.10 in [RSVP]).  Both objects can only be carried in
   RSVP Path messages.

   The SESSION_ATTRIBUTE and RECORD_ROUTE objects are also extended to
   support bandwidth and node protection features.

4.1.  FAST_REROUTE Object

   The FAST_REROUTE object is used to control the backup used for the
   protected LSP.  This specifies the setup and hold priorities, session
   attribute filters, and bandwidth to be used for protection.  It also
   allows a specific local protection method to be requested.  This
   object MUST only be inserted into the PATH message by the head-end
   LER and MUST NOT be changed by downstream LSRs.  The FAST_REROUTE
   object has the following format:











Pan, et al.                 Standards Track                     [Page 8]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      Class-Num = 205
      C-Type = 1

             0             1             2             3
      +-------------+-------------+-------------+-------------+
      |       Length (bytes)      |  Class-Num  |   C-Type    |
      +-------------+-------------+-------------+-------------+
      | Setup Prio  | Hold Prio   | Hop-limit   |    Flags    |
      +-------------+-------------+-------------+-------------+
      |                  Bandwidth                            |
      +-------------+-------------+-------------+-------------+
      |                  Include-any                          |
      +-------------+-------------+-------------+-------------+
      |                  Exclude-any                          |
      +-------------+-------------+-------------+-------------+
      |                  Include-all                          |
      +-------------+-------------+-------------+-------------+

      Setup Priority

         The priority of the backup path with respect to taking
         resources, in the range 0 to 7.  The value 0 is the highest
         priority.  Setup Priority is used in deciding whether this
         session can preempt another session.  See [RSVP-TE] for the
         usage on priority.

      Holding Priority

         The priority of the backup path with respect to holding
         resources, in the range 0 to 7.  The value 0 is the highest
         priority.  Holding Priority is used in deciding whether this
         session can be preempted by another session.  See [RSVP-TE] for
         the usage on priority.

      Hop-limit

         The maximum number of extra hops the backup path is allowed to
         take, from current node (a PLR) to an MP, with PLR and MP
         excluded from the count.  For example, hop-limit of 0 means
         that only direct links between PLR and MP can be considered.

      Flags

         0x01  One-to-One Backup Desired

            Requests protection via the one-to-one backup method.





Pan, et al.                 Standards Track                     [Page 9]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


         0x02  Facility Backup Desired

            Requests protection via the facility backup method.

      Bandwidth

         Bandwidth estimate; 32-bit IEEE floating point integer, in
         bytes per second.

      Exclude-any

         A 32-bit vector representing a set of attribute filters
         associated with a backup path, any of which renders a link
         unacceptable.

      Include-any

         A 32-bit vector representing a set of attribute filters
         associated with a backup path, any of which renders a link
         acceptable (with respect to this test).  A null set (all bits
         set to zero) automatically passes.

      Include-all

         A 32-bit vector representing a set of attribute filters
         associated with a backup path, all of which must be present for
         a link to be acceptable (with respect to this test).  A null
         set (all bits set to zero) automatically passes.

   The two high-order bits of the Class-Num (11) cause nodes that do not
   understand the object to ignore it and pass it forward unchanged.

   For informational purposes, a different C-Type value and format for
   the FAST_REROUTE object are specified below.  This is used by legacy
   implementations.  The meaning of the fields is the same as that
   described for C-Type 1.















Pan, et al.                 Standards Track                    [Page 10]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      Class-Num = 205
      C-Type = 7

             0             1             2             3
      +-------------+-------------+-------------+-------------+
      |       Length (bytes)      |  Class-Num  |   C-Type    |
      +-------------+-------------+-------------+-------------+
      | Setup Prio  | Hold Prio   | Hop-limit   | Reserved    |
      +-------------+-------------+-------------+-------------+
      |                  Bandwidth                            |
      +-------------+-------------+-------------+-------------+
      |                  Include-any                          |
      +-------------+-------------+-------------+-------------+
      |                  Exclude-any                          |
      +-------------+-------------+-------------+-------------+

   Unknown C-Types should be treated as specified in [RSVP] Section
   3.10.

4.2.  DETOUR Object

   The DETOUR object is used in the one-to-one backup method to identify
   detour LSPs.

4.2.1.  DETOUR Object for IPv4 Address

      Class-Num = 63
      C-Type = 7

            0             1              2             3
       +-------------+-------------+-------------+-------------+
       |       Length (bytes)      |  Class-Num  |   C-Type    |
       +-------------+-------------+-------------+-------------+
       |                      PLR_ID  1                        |
       +-------------+-------------+-------------+-------------+
       |                    Avoid_Node_ID 1                    |
       +-------------+-------------+-------------+-------------+
      //                        ....                          //
       +-------------+-------------+-------------+-------------+
       |                      PLR_ID  n                        |
       +-------------+-------------+-------------+-------------+
       |                    Avoid_Node_ID  n                   |
       +-------------+-------------+-------------+-------------+

      PLR_ID  (1 - n)

         IPv4 address identifying the PLR that is the beginning point of
         the detour.  Any local address on the PLR can be used.



Pan, et al.                 Standards Track                    [Page 11]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      Avoid_Node_ID  (1 - n)

         IPv4 address identifying the immediate downstream node that the
         PLR is trying to avoid.  Any local address of the downstream
         node can be used.  This field is mandatory and is used by the
         MP for the merging rules discussed below.

4.2.2.  DETOUR Object for IPv6 Address

      Class-Num = 63
      C-Type = 8

             0             1              2             3
        +-------------+-------------+-------------+-------------+
        |       Length (bytes)      |  Class-Num  |   C-Type    |
        +-------------+-------------+-------------+-------------+
        |                      PLR_ID  1                        |
        +-------------+-------------+-------------+-------------+
        |                      PLR_ID  1 (continued)            |
        +-------------+-------------+-------------+-------------+
        |                      PLR_ID  1 (continued)            |
        +-------------+-------------+-------------+-------------+
        |                      PLR_ID  1 (continued)            |
        +-------------+-------------+-------------+-------------+
        |                    Avoid_Node_ID 1                    |
        +-------------+-------------+-------------+-------------+
        |                    Avoid_Node_ID 1 (continued)        |
        +-------------+-------------+-------------+-------------+
        |                    Avoid_Node_ID 1 (continued)        |
        +-------------+-------------+-------------+-------------+
        |                    Avoid_Node_ID 1 (continued)        |
        +-------------+-------------+-------------+-------------+
       //                        ....                          //
        +-------------+-------------+-------------+-------------+

      PLR_ID  (1 - n)

         An IPv6 128-bit unicast host address identifying the PLR that
         is the beginning point of the detour.  Any local address on the
         PLR can be used.

      Avoid_Node_ID  (1 - n)

         An IPv6 128-bit unicast host address identifying the immediate
         downstream node that the PLR is trying to avoid.  Any local
         address on the downstream node can be used.  This field is





Pan, et al.                 Standards Track                    [Page 12]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


         mandatory and is used by the MP for the merging rules discussed
         below.

   There can be more than one pair of (PLR_ID, Avoid_Node_ID) entries in
   a DETOUR object.  If detour merging is desired, after each merging
   operation, the Detour Merge Point should combine all the merged
   detours in subsequent Path messages.

   The high-order bit of the Class-Num is zero; LSRs that do not support
   the DETOUR objects MUST reject any Path message containing a DETOUR
   object and send a PathErr to notify the PLR.  This PathErr SHOULD be
   generated as specified in [RSVP] for unknown objects with a Class-Num
   of the form "0bbbbbbb".

   Unknown C-Types should be treated as specified in [RSVP] Section
   3.10.

4.3.  SESSION_ATTRIBUTE Flags

   To request bandwidth and node protection explicitly, two new flags
   are defined in the SESSION_ATTRIBUTE object.

   For both C-Type 1 and 7, the SESSION_ATTRIBUTE object currently has
   the following flags defined [RSVP-TE]:

      Local protection desired:   0x01

         This flag permits transit routers to use a local repair
         mechanism that may result in violation of the explicit route
         object.  When a fault is detected on an adjacent downstream
         link or node, a transit node may reroute traffic for fast
         service restoration.

      Label recording desired:   0x02

         This flag indicates that label information should be included
         when doing a route record.

      SE Style desired:   0x04

         This flag indicates that the tunnel ingress node may choose to
         reroute this tunnel without tearing it down.  A tunnel egress
         node SHOULD use the SE Style when responding with a Resv
         message.  When requesting fast reroute, the head-end LSR SHOULD
         set this flag; this is not necessary for the path-specific
         method of the one-to-one backup method.





Pan, et al.                 Standards Track                    [Page 13]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   The following new flags are defined:

      Bandwidth protection desired:  0x08

         This flag indicates to the PLRs along the protected LSP path
         that a backup path with a bandwidth guarantee is desired.  The
         bandwidth to be guaranteed is that of the protected LSP, if no
         FAST_REROUTE object is included in the PATH message; if a
         FAST_REROUTE object is in the PATH message, then the bandwidth
         specified therein is to be guaranteed.

      Node protection desired: 0x10

         This flag indicates to the PLRs along a protected LSP path that
         a backup path that bypasses at least the next node of the
         protected LSP is desired.

4.4.  RRO IPv4/IPv6 Sub-object Flags

   To report whether bandwidth and/or node protection are provided as
   requested, we define two new flags in the RRO IPv4 sub-object.

   The RRO IPv4 and IPv6 address sub-objects currently have the
   following flags defined [RSVP-TE]:

      Local protection available:  0x01

         Indicates that the link downstream of this node is protected
         via a local repair mechanism, which can be either one-to-one or
         facility backup.

      Local protection in use:  0x02

         Indicates that a local repair mechanism is in use to maintain
         this tunnel (usually in the face of an outage of the link it
         was previously routed over, or an outage of the neighboring
         node).

   Two new flags are defined:

      Bandwidth protection:  0x04

         The PLR will set this bit when the protected LSP has a backup
         path that is guaranteed to provide the desired bandwidth that
         is specified in the FAST_REROUTE object or the bandwidth of the
         protected LSP, if no FAST_REROUTE object was included.  The PLR
         may set this whenever the desired bandwidth is guaranteed; the
         PLR MUST set this flag when the desired bandwidth is guaranteed



Pan, et al.                 Standards Track                    [Page 14]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


         and the "bandwidth protection desired" flag was set in the
         SESSION_ATTRIBUTE object.  If the requested bandwidth is not
         guaranteed, the PLR MUST NOT set this flag.

      Node protection:  0x08

         The PLR will set this bit when the protected LSP has a backup
         path that provides protection against a failure of the next LSR
         along the protected LSP.  The PLR may set this whenever node
         protection is provided by the protected LSP's backup path; the
         PLR MUST set this flag when the node protection is provided and
         the "node protection desired" flag was set in the
         SESSION_ATTRIBUTE object.  If node protection is not provided,
         the PLR MUST NOT set this flag.  Thus, if a PLR could only set
         up a link-protection backup path, the "Local protection
         available" bit will be set, but the "Node protection" bit will
         be cleared.

5.  Head-End Behavior

   The head-end of an LSP determines whether local protection should be
   requested for that LSP and which local protection method is desired
   for the protected LSP.  The head-end also determines what constraints
   should be requested for the backup paths of a protected LSP.

   To indicate that an LSP should be locally protected, the head-end LSR
   MUST either set the "local protection desired" flag in the
   SESSION_ATTRIBUTE object or include a FAST_REROUTE object in the PATH
   message, or both.  The "local protection desired" flag in the
   SESSION_ATTRIBUTE object SHOULD always be set.  If a head-end LSR
   signals a FAST_REROUTE object, it MUST be stored for Path refreshes.

   The head-end LSR of a protected LSP MUST set the "label recording
   desired" flag in the SESSION_ATTRIBUTE object.  This facilitates the
   use of the facility backup method.  If node protection is desired,
   the head-end LSR should set the "node protection desired" flag in the
   SESSION_ATTRIBUTE object; otherwise, this flag should be cleared.
   Similarly, if a guarantee of bandwidth protection is desired, then
   the "bandwidth protection desired" flag in the SESSION_ATTRIBUTE
   object should be set; otherwise, this flag should be cleared.  If the
   head-end LSR determines that control of the backup paths for the
   protected LSP is desired, then the LSR should include the
   FAST_REROUTE object.  The PLRs will use the attribute filters,
   bandwidth, hop-limit, and priorities to determine the backup paths.

   If the head-end LSR desires that the one-to-one backup method be used
   for the protected LSP, then the head-end LSR should include a
   FAST_REROUTE object and set the "one-to-one backup desired" flag.  If



Pan, et al.                 Standards Track                    [Page 15]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   the head-end LSR desires that the protected LSP be protected via the
   facility backup method, then the head-end LSR should include a
   FAST_REROUTE object and set the "facility backup desired" flag.  The
   lack of a FAST_REROUTE object, or having both these flags clear,
   should be treated by PLRs as a lack of preference.  If both flags are
   set, a PLR may use either method or both.

   The head-end LSR of a protected LSP MUST support the additional flags
   defined in Section 4.4 being set or clear in the RRO IPv4 and IPv6
   sub-objects.  The head-end LSR of a protected LSP MUST support the
   RRO Label sub-object.

   If the head-end LSR of an LSP determines that local protection is
   newly desired, this SHOULD be signaled via make-before-break.

6.  Point of Local Repair (PLR) Behavior

   Every LSR along a protected LSP (except the egress) MUST follow the
   PLR behavior described in this document.

   A PLR SHOULD support the FAST_REROUTE object, the "local protection
   desired", "label recording desired", "node protection desired", and
   "bandwidth protection desired" flags in the SESSION_ATTRIBUTE object,
   and the "local protection available", "local protection in use",
   "bandwidth protection", and "node protection" flags in the RRO IPv4
   and IPv6 sub-objects.  A PLR MAY support the DETOUR object.

   A PLR MUST consider an LSP to have asked for local protection if the
   "local protection desired" flag is set in the SESSION_ATTRIBUTE
   object and/or the FAST_REROUTE object is included.  If the
   FAST_REROUTE object is included, a PLR SHOULD consider providing
   one-to-one protection if the "one-to-one desired" is set, and it
   SHOULD consider providing facility backup if the "facility backup
   desired" flag is set.  If the "node protection desired" flag is set,
   the PLR SHOULD try to provide node protection; if this is not
   feasible, the PLR SHOULD then try to provide link protection.  If the
   "bandwidth protection guaranteed" flag is set, the PLR SHOULD try to
   provide a bandwidth guarantee; if this is not feasible, the PLR
   SHOULD then try to provide a backup without a guarantee of the full
   bandwidth.











Pan, et al.                 Standards Track                    [Page 16]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   The following treatment for the RRO IPv4 or IPv6 sub-object's flags
   must be followed if an RRO is included in the protected LSP's RESV
   message.  Based on this additional information, the head-end may take
   appropriate actions.

    - Until a PLR has a backup path available, the PLR MUST clear the
      relevant four flags in the corresponding RRO IPv4 or IPv6 sub-
      object.

    - Whenever the PLR has a backup path available, the PLR MUST set the
      "local protection available" flag.  If no established one-to-one
      backup LSP or bypass tunnel exists, or if the one-to-one LSP and
      the bypass tunnel is in "DOWN" state, the PLR MUST clear the
      "local protection available" flag in its IPv4 (or IPv6) address
      sub-object of the RRO and SHOULD send the updated RESV.

    - The PLR MUST clear the "local protection in use" flag unless it is
      actively redirecting traffic into the backup path instead of along
      the protected LSP.

    - The PLR SHOULD also set the "node protection" flag if the backup
      path protects against the failure of the immediate downstream
      node, and, if the path does not, the PLR SHOULD clear the "node
      protection" flag.  This MUST be done if the "node protection
      desired" flag was set in the SESSION_ATTRIBUTE object.

    - The PLR SHOULD set the "bandwidth protection" flag if the backup
      path offers a bandwidth guarantee, and, if the path does not, the
      PLR SHOULD clear the "bandwidth protection" flag.  This MUST be
      done if the "bandwidth protection desired" flag was set in the
      SESSION_ATTRIBUTE object.

6.1.  Signaling a Backup Path

   A number of objectives must be met to obtain a satisfactory signaling
   solution.  These are summarized as follows:

      1. Unambiguously and uniquely identifying backup paths.

      2. Unambiguously associating protected LSPs with their backup
         paths.

      3. Working with both global and non-global label spaces.

      4. Allowing merging of backup paths.

      5. Maintaining RSVP state during and after fail-over.




Pan, et al.                 Standards Track                    [Page 17]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   LSP tunnels are identified by a combination of the SESSION and
   SENDER_TEMPLATE objects [RSVP-TE].  The relevant fields are as
   follows.

      IPv4 (or IPv6) tunnel end point address

         IPv4 (or IPv6) address of the egress node for the tunnel.

      Tunnel ID

         A 16-bit identifier used in the SESSION that remains constant
         over the life of the tunnel.

      Extended Tunnel ID

         A 32-bit (IPv4) or 128-bit (IPv6) identifier used in the
         SESSION that remains constant over the life of the tunnel.
         Normally it is set to all zero.  Ingress nodes that wish to
         narrow the scope of a SESSION to the ingress-egress pair may
         place their IP address here as a globally unique identifier.

      IPv4 (or IPv6) tunnel sender address

         IPv4 (or IPv6) address for a sender node.

      LSP ID

         A 16-bit identifier used in the SENDER_TEMPLATE and the
         FILTER_SPEC, which can be changed to allow a sender to share
         resources with itself.

   The first three of these are in the SESSION object and are the basic
   identification for the tunnel.  Setting the "Extended Tunnel ID" to
   an IP address of the head-end LSR allows the scope of the SESSION to
   be narrowed to only LSPs sent by that LSR.  A backup LSP is
   considered part of the same session as its protected LSP; therefore
   these three cannot be varied.

   The last two are in the SENDER_TEMPLATE.  Multiple LSPs in the same
   SESSION may be protected and may take different routes; this is
   common when a tunnel is rerouted using make-before-break.  A backup
   path must be clearly identified with its protected LSP to allow
   correct merging and state treatment.  Therefore, a backup path must
   inherit its LSP ID from the associated protected LSP.  Thus, the only
   field in the SESSION and SENDER_TEMPLATE objects that could be varied
   between a backup path and a protected LSP is the "IPv4 (or IPv6)
   tunnel sender address" in the SENDER_TEMPLATE.




Pan, et al.                 Standards Track                    [Page 18]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   There are two different methods to uniquely identify a backup path,
   described below.

6.1.1.  Backup Path Identification: Sender Template-Specific

   In this approach, the SESSION object and the LSP_ID are copied from
   the protected LSP.  The "IPv4 tunnel sender address" is set to an
   address of the PLR.  If the head-end of a tunnel is also acting as
   the PLR, it MUST choose an IP address different from the one used in
   the SENDER_TEMPLATE of the original LSP tunnel.

   When the sender template-specific approach is used, the protected
   LSPs and the backup paths SHOULD use the Shared Explicit (SE) style.
   This allows bandwidth sharing between multiple backup paths.  The
   backup paths and the protected LSP MAY be merged by the Detour Merge
   Points, when the ERO from the MP to the egress is the same on each
   LSP to be merged, as specified in [RSVP-TE].

6.1.2.  Backup Path Identification: Path-Specific

   In this approach, rather than vary the SESSION or SENDER_TEMPLATE
   objects, an implementation uses a new object, the DETOUR object, to
   distinguish between PATH messages for a backup path and the protected
   LSP.

   Thus, the backup paths use the same SESSION and SENDER_TEMPLATE
   objects as the ones used in the protected LSP.  The presence of a
   DETOUR object in Path messages signifies a backup path; the presence
   of a FAST_REROUTE object and/or the "local protection requested" flag
   in the SESSION_ATTRIBUTE object indicates a protected LSP.

   In the path message-specific approach, an LSR merges Path messages
   that are received with the same SESSION and SENDER_TEMPLATE objects
   and that also have the same next-hop object.  Without this behavior,
   it would be impossible to associate the multiple RESV messages with
   the backup paths.  However, this merging behavior reduces the total
   number of RSVP states inside the network at the expense of merging
   LSPs with different EROs.













Pan, et al.                 Standards Track                    [Page 19]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


6.2.  Procedures for Backup Path Computation

   Before a PLR can create a detour or a bypass tunnel, the desired
   explicit route must be determined.  This can be done using a CSPF
   (Constraint-based Shortest Path First) computation.  Before this CSPF
   computation, the following information must be collected at a PLR:

      - The list of downstream nodes that the protected LSP passes
        through.  This information is readily available from the
        RECORD_ROUTE objects during LSP setup.  This information is also
        available from the ERO.  However, if the ERO contains loose
        sub-objects, the ERO may not provide adequate information.

      - The downstream links/nodes that we want to protect against.
        Once again, this information is learned from the RECORD_ROUTE
        objects.  Whether node protection is desired is determined by
        the "node protection" flag in the SESSION_ATTRIBUTE object and
        local policy.

      - The upstream uni-directional links that the protected LSP passes
        through.  This information is learned from the RECORD_ROUTE
        objects; it is only needed for setting up one-to-one protection.
        In the path-specific method, it is necessary to avoid the detour
        and the protected LSP sharing a common next-hop upstream of the
        failure.  In the sender template-specific mode, this same
        restriction is necessary to avoid sharing bandwidth between the
        detour and its protected LSP, where that bandwidth has been
        reserved only once.

      - The link attribute filters to be applied.  These are derived
        from the FAST_REROUTE object, if it is included in the PATH
        message, or from the SESSION_ATTRIBUTE object otherwise.

      - The bandwidth to be used is found in the FAST_REROUTE object, if
        it is included in the PATH message, or in the SESSION_ATTRIBUTE
        object otherwise.  Local policy may modify the bandwidth to be
        reserved.

      - The hop-limit, if a FAST_REROUTE object was included in the PATH
        message.

   When a CSPF algorithm is used to compute the backup route, the
   following constraints must be satisfied:

      - For detour LSPs, the destination MUST be the tail-end of the
        protected LSP.  For bypass tunnels (Section 7), the destination
        MUST be the address of the MP.




Pan, et al.                 Standards Track                    [Page 20]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      - When one-to-one protection is set up by using the path-specific
        method, a detour MUST not traverse the upstream links of the
        protected LSP in the same direction.  This prevents the
        possibility of early merging of the detour into the protected
        LSP.  When one-to-one protection is set up using the sender-
        template-specific method, a detour should not traverse the
        upstream links of the protected LSP in the same direction.  This
        prevents sharing the bandwidth between a protected LSP and its
        backup upstream of the failure where the bandwidth would be used
        twice in the event of a failure.

      - The backup LSP cannot traverse the downstream node and/or link
        whose failure is being protected against.  Note that if the PLR
        is the penultimate hop, node protection is not possible, and
        only the downstream link can be avoided.  The backup path may be
        computed to be SRLG disjoint from the downstream node and/or
        link being avoided.

      - The backup path must satisfy the resource requirements of the
        protected LSP.  This includes the link attribute filters,
        bandwidth, and hop limits determined from the FAST_REROUTE
        object and the SESSION_ATTRIBUTE object.

   If such computation succeeds, the PLR should attempt to establish a
   backup path.  The PLR may schedule a re-computation at a later time
   to discover better paths that might have emerged.  If for any reason,
   the PLR is unable to bring up a backup path, it must schedule a retry
   at a later time.

6.3.  Signaling Backups for One-to-One Protection

   Once a PLR has decided to protect an LSP locally with one-to-one
   backup and has identified the desired path, it signals for the
   detour.

   The following describes the transformation to be performed upon the
   protected LSP's PATH message to create the detour LSP's PATH message.

      - If the sender template-specific method is to be used, then the
        PLR MUST change the "IPv4 (or IPv6) tunnel sender address" of
        the SENDER_TEMPLATE to an address belonging to the PLR that is
        not the same as that used for the protected LSP.  Additionally,
        the DETOUR object MAY be added to the PATH message.

      - If the path-specific method is to be used, then the PLR MUST add
        a DETOUR object to the PATH message.





Pan, et al.                 Standards Track                    [Page 21]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


      - The SESSION_ATTRIBUTE flags "Local protection desired",
        "Bandwidth protection desired", and "Node protection desired"
        MUST be cleared.  The "Label recording desired" flag MAY be
        modified.  If the Path Message contained a FAST_REROUTE object
        and the ERO is not completely strict, the Include-any, Exclude-
        any, and Include-all fields of the FAST_REROUTE object SHOULD be
        copied to the corresponding fields of the SESSION_ATTRIBUTE
        object.

      - If the protected LSP's Path message contained a FAST_REROUTE
        object, this object MUST be removed from the detour LSP's PATH
        message.

      - The PLR MUST generate an EXPLICIT_ROUTE object toward the
        egress.  First, the PLR must remove all sub-objects preceding
        the first address belonging to the Merge Point.  Then the PLR
        SHOULD add sub-objects corresponding to the desired backup path
        between the PLR and the MP.

      - The SENDER_TSPEC object SHOULD contain the bandwidth information
        from the received FAST_REROUTE object, if included in the
        protected LSP's PATH message.

      - The RSVP_HOP object containing one of the PLR's IP address.

      - The detour LSPs MUST use the same reservation style as the
        protected LSP.  This must be correctly reflected in the
        SESSION_ATTRIBUTE object.

     Detour LSPs operate like regular LSPs.  Once a detour path is
     successfully computed and the detour LSP is established, the PLR
     need not compute detour routes again, unless (1) the contents of
     FAST_REROUTE have changed or (2) the downstream interface and/or
     the nexthop router for a protected LSP has changed.  The PLR may
     recompute detour routes at any time.

6.3.1.  Make-before-Break with Detour LSPs

   If the sender template-specific method is used, it is possible to do
   make-before-break with detour LSPs.  This is done using two different
   IP addresses belonging to the PLR (which were not used in the
   SENDER_TEMPLATE of the protected LSP).  If the current detour LSP
   uses the first IP address in its SENDER_TEMPLATE, then the new detour
   LSP should be signaled by using the second IP address in its
   SENDER_TEMPLATE.  Once the new detour LSP has been created, the
   current detour LSP can be torn down.  By alternating the use of these
   IP addresses, the current and new detour LSPs will have different
   SENDER_TEMPLATES and, thus, different state in the downstream LSRs.



Pan, et al.                 Standards Track                    [Page 22]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   This make-before-break mechanism, which changes the PLR IP address in
   the DETOUR object instead, is not feasible with the path-specific
   method, as the PATH messages for new and current detour LSPs may be
   merged if they share a common next-hop.

6.3.2.  Message Handling

   LSRs must process the detour LSPs independently of the protected LSPs
   to avoid triggering the LSP loop detection procedure described in
   [RSVP-TE].

   The PLR MUST not mix the messages for the protected and the detour
   LSPs.  When a PLR receives Resv, ResvTear, and PathErr messages from
   the downstream detour destination, the messages MUST not be forwarded
   upstream.  Similarly, when a PLR receives ResvErr and ResvConf
   messages from a protected LSP, it MUST not propagate them onto the
   associated detour LSP.

   A session tear-down request is normally originated by the sender via
   PathTear messages.  When a PLR node receives a PathTear message from
   upstream, it MUST delete both the protected and the detour LSPs.  The
   PathTear messages MUST propagate to both protected and detour LSPs.
   During error conditions, the LSRs may send ResvTear messages to fix
   problems on the failing path.  When a PLR node receives the ResvTear
   messages from downstream for a protected LSP, as long as a detour is
   up, the ResvTear messages MUST not be sent further upstream.
   PathErrs should be treated similarly.

6.3.3.  Local Reroute of Traffic onto Detour LSP

   When the PLR detects a failure on the protected LSP, the PLR MUST
   rapidly switch packets to the protected LSP's backup LSP instead of
   to the protected LSP's normal out-segment.  The goal of this method
   is to effect the redirection within 10s of milliseconds.

               L32      L33      L34      L35
           R1-------R2-------R3-------R4-------R5
                    |                 |
               L46  |                 | L44
                    |       L47       |
                    R6----------------R7

            Protected LSP: [R1->R2->R3->R4->R5]
            Detour LSP:    [R2->R6->R7->R4]

                 Example 3.  Redirect to Detour





Pan, et al.                 Standards Track                    [Page 23]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   In Example 3, if the link [R2->R3] fails, R2 would do the following.
   Any traffic received on link [R1->R2] with label L32 would be sent on
   link [R2->R6] with label L46 (along the detour LSP) instead of on
   link [R3->R4] with label L34 (along the protected LSP).  The merge
   point R4 would recognize that packets received on link [R7->R4] with
   label L44 should be sent on link [R4->R5] with label L35 and that
   they should be merged with the protected LSP.

6.4.  Signaling for Facility Protection

   A PLR may use one or more bypass tunnels to protect against the
   failure of a link and/or a node.  These bypass tunnels may be set up
   in advance or may be dynamically created as new protected LSPs are
   signaled.

6.4.1.  Discovering Downstream Labels

   To support facility backup, the PLR must determine a label that will
   indicate to the MP that packets received with that label should be
   switched along the protected LSP.  This can be done without
   explicitly signaling the backup path if the MP uses a label space
   global to that LSR.

   As described in Section 6, the head-end LSR MUST set the "label
   recording requested" flag in the SESSION_ATTRIBUTE object for LSPs
   requesting local protection.  This will cause (as specified in
   [RSVP-TE]) all LSRs to record their INBOUND labels and to note via a
   flag whether the label is global to the LSR.  Thus, when a protected
   LSP is first signaled through a PLR, the PLR can examine the RRO in
   the Resv message and learn about the incoming labels that are used by
   all downstream nodes for this LSP

   When MPs use per-interface label spaces, the PLR must send Path
   messages (for each protected LSP using a bypass tunnel) via that
   bypass tunnel prior to the failure in order to discover the
   appropriate MP label.  The signaling procedures for this are in
   Section 6.4.3 below.

6.4.2.  Procedures for the PLR before Local Repair

   A PLR that determines to use facility-backup to protect a given LSP
   should select a bypass tunnel to use, taking into account whether
   node protection is to be provided, what bandwidth was requested,
   whether a bandwidth guarantee is desired, and what link attribute
   filters were specified in the FAST_REROUTE object.  The selection of
   a bypass tunnel for a protected LSP is performed by the PLR when the
   LSP is first set up.




Pan, et al.                 Standards Track                    [Page 24]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


6.4.3.  Procedures for the PLR during Local Repair

   When the PLR detects a link or/and node failure condition, it has to
   reroute the data traffic onto the bypass tunnel and to start sending
   the control traffic for the protected LSP onto the bypass tunnel.

   The backup tunnel is identified by using the sender template-specific
   method.  The procedures to follow are similar to those described in
   Section 6.3.

      - The SESSION is unchanged.

      - The SESSION_ATTRIBUTE is unchanged except as follows:  The
        "Local protection desired", "Bandwidth protection desired", and
        "Node protection desired" flags SHOULD be cleared.  The "Label
        recording desired" MAY be modified.

      - The IPv4 (or IPv6) tunnel sender address of the SENDER_TEMPLATE
        is set to an address belonging to the PLR.

      - The RSVP_HOP object MUST contain an IP source address belonging
        to the PLR.  Consequently, the MP will send messages back to the
        PLR with that IP address as the destination.

      - The PLR MUST generate an EXPLICIT_ROUTE object toward the
        egress.  Detailed ERO processing is described below.

      - The RRO object may have to be updated as described in Section
        6.5.

   The PLR sends Path, PathTear, and ResvConf messages via the backup
   tunnel.  The MP sends Resv, ResvTear, and PathErr messages by sending
   them directly to the address in the RSVP_HOP object, as specified in
   [RSVP].

   If it is necessary to signal the backup prior to failure to determine
   the MP label to use, then the same Path message is sent.  In this
   case, the PLR SHOULD continue to send Path messages for the protected
   LSP along the normal route.  PathTear messages should be duplicated,
   with one sent along the normal route and one sent through the bypass
   tunnel.  The MP should duplicate the Resv and ResvTear messages and
   send them to both the PLR and the LSR indicated by the protected
   LSP's RSVP_HOP object.








Pan, et al.                 Standards Track                    [Page 25]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


6.4.4.  Processing Backup Tunnel's ERO

   Procedures for ERO processing are described in [RSVP-TE].  This
   section describes additional ERO update procedures for Path messages
   that are sent over bypass tunnels.  If normal ERO processing rules
   were followed, the Merge Point would examine the first sub-object and
   likely reject it (Bad initial sub-object).  This is because the
   unmodified ERO might contain the IP address of a bypassed node (in
   the case of a NNHOP Bypass Tunnel) or of an interface that is
   currently down (in the case of a NHOP Backup Tunnel).  For this
   reason, the PLR invokes the following ERO procedures before sending a
   Path message via a bypass tunnel.

      Sub-objects belonging to abstract nodes that precede the Merge
      Point are removed, along with the first sub-object belonging to
      the MP.  A sub-object identifying the Backup Tunnel destination is
      then added.

      More specifically, the PLR MUST:

         - remove all the sub-objects proceeding the first address
           belonging to the MP, and

         - replace this first MP address with an IP address of the MP.
           (Note that this could be same address that was just removed.)

6.5.  PLR Procedures during Local Repair

   In addition to the method-specific signaling and packet treatment,
   there is common signaling that should be followed.

   During fast reroute, for each protected LSP containing an RRO object,
   the PLR obtains the RRO from the protected LSP's stored RESV.  The
   PLR MUST update the IPv4 or IPv6 sub-object it inserted into the RRO
   by setting the "Local protection in use" and "Local Protection
   Available" flags.

6.5.1.  Notification of Local Repair

   In many situations, the route used during local repair will be less
   than optimal.  The purpose of local repair is to keep high priority
   and loss-sensitive traffic flowing while a more optimal re-routing of
   the tunnel can be effected by the head-end of the tunnel.  Thus, the
   head-end has to know of the failure so that it may re-signal an
   optimal LSP.






Pan, et al.                 Standards Track                    [Page 26]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   To provide this notification, the PLR SHOULD send a Path Error
   message with error code of "Notify" (Error code = 25) and an error
   value field of ss00 cccc cccc cccc, where ss=00 and the sub-code = 3
   ("Tunnel locally repaired") (see [RSVP-TE]).

   Additionally, a head-end may detect that an LSP has to be moved to a
   more optimal path by noticing failures reported via the IGP.  Note
   that in the case of inter-area TE LSP (TE LSP spanning areas), the
   head-end LSR will have to rely exclusively on Path Error messages to
   be informed of failures in another area.

6.5.2.  Revertive Behavior

   Upon a failure event, a protected TE LSP is locally repaired by the
   PLR.  There are two basic strategies for restoring the TE LSP to a
   full working path.

    - Global revertive mode: The head-end LSR of each tunnel is
      responsible for reoptimizing the TE LSPs that used the failed
      resource.  There are several potential reoptimization triggers:
      RSVP error messages, inspection of OSPF LSAs or ISIS LSPs, and
      timers.  Note that this re-optimization process may proceed as
      soon as the failure is detected.  It is not tied to the
      restoration of the failed resource.

    - Local revertive mode: Upon detecting that the resource is
      restored, the PLR re-signals each of the TE LSPs that used to be
      routed over the restored resource.  Every TE LSP successfully
      re-signaled along the restored resource is switched back.

   There are several circumstances in which a local revertive mode might
   not be desirable.  In the case of resource flapping (not an uncommon
   failure type), this could generate multiple traffic disruptions.
   Therefore, in the local revertive mode, the PLR should implement a
   means to dampen the re-signaling process in order to limit potential
   disruptions due to flapping.

   In the local revertive mode, any TE LSP will be switched back,
   without any distinction, whereas in the global revertive mode, the
   decision to reuse the restored resource is made by the head-end LSR
   based on the TE LSP attributes.  When the head-end learns of the
   failure, it may reoptimize the protected LSP tunnel along a different
   and more optimal path, as it has a more complete view of the
   resources and TE LSP constraints.  This means that the old LSP that
   has been reverted to may no longer be optimal.  Note that in the case
   of inter-area LSP, where the TE LSP path computation might be done on
   some Path Computation Element, the reoptimization process can




Pan, et al.                 Standards Track                    [Page 27]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   still be triggered on the Head-End LSP.  The local revertive mode
   is optional.

   However, there are circumstances in which the head-end does not have
   the ability to reroute the TE LSP (e.g., if the protected LSP is
   pinned down, as may be desirable if the paths are determined by using
   an off-line optimization tool), or if the head-end does not have the
   complete TE topology information (depending on the path computation
   scenario).  In those cases, the local revertive mode might be an
   interesting option.

   The globally revertive mode SHOULD always be used.  Note that a link
   or node "failure" may be due to the facility being permanently taken
   out of service.  Local revertive mode is optional.  When used in
   combination, the global mode may rely solely on timers to do the
   reoptimization.  When local revertive mode is not used, head-end LSRs
   SHOULD react to RSVP error messages and/or IGP indications in order
   to make a timely response.

   Interoperability: If a PLR is configured with the local revertive
   mode but the MP is not, any attempt from the PLR to resignal the TE
   LSP over the restored resource will fail, as the MP will not send any
   Resv message.  The PLR will still refresh the TE LSP over the backup
   tunnel.  The TE LSP will not revert to the restored resource;
   instead, it will continue to use the backup until it is re-optimized.

7.  Merge Node Behavior

   An LSR is a Merge Point if it receives the Path message for a
   protected LSP and one or more messages for a backup LSP that is
   merged into that protected LSP.  In the one-to-one backup method, the
   LSR is aware that it is a merge node prior to failure.  In the
   facility backup method, the LSR may not know that it is a Merge Point
   until a failure occurs and it receives a backup LSP's Path message.
   Therefore, an LSR that is on the path of a protected LSP SHOULD
   always assume that it is a merge point.

   When a MP receives a backup LSP's Path message through a bypass
   tunnel, the Send_TTL in the Common Header may not match the TTL of
   the IP packet within which the Path message was transported.  This is
   expected behavior.

7.1.  Handling Backup Path Messages before Failure

   There are two circumstances in which a Merge Point will receive Path
   messages for a backup path prior to failure.  In the first case, if a
   PLR is providing local protection via the one-to-one backup method,
   the detour will be signaled and must be properly handled by the MP.



Pan, et al.                 Standards Track                    [Page 28]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   In this case, the backup LSP may be signaled via the sender
   template-specific method or via the path-specific method.

   In the second case, if the Merge Point does not provide labels global
   to the MP and record them in a Label sub-object of the RRO, or if the
   PLR does not use such recorded information, the PLR may signal the
   backup path as described in Section 6.4.1.  This will determine the
   label to use if the PLR is providing protection according to the
   facility backup method.  In this case, the backup LSP is signaled via
   the sender template-specific method.

   The reception of a backup LSP's path message does not indicate that a
   failure has occurred or that the incoming protected LSP will no
   longer be used.

7.1.1.  Merging Backup Paths using the Sender Template-Specific Method

   An LSR may receive multiple Path messages for one or more backup LSPs
   and, possibly, for the protected LSP.  Each of these Path messages
   will have a different SENDER_TEMPLATE.  The protected LSP can be
   recognized because it will include the FAST_REROUTE object or have
   the "local protection desired" flag set in the SESSION_ATTRIBUTE
   object, or both.

   If the outgoing interface and next-hop LSR are the same, then the
   Path messages are eligible for merging.  Similarly to the
   specification in [RSVP-TE] for merging of RESV messages, only Path
   messages whose ERO from that LSR to the egress is the same can be
   merged.  If merging occurs and one of the Path messages merged was
   for the protected LSP, then the final Path message to be sent MUST be
   that of the protected LSP.  This merges the backup LSPs into the
   protected LSP at that LSR.  Once the final Path message has been
   identified, the MP MUST start to refresh it downstream periodically.

   If merging occurs and all the Path messages were for backup LSPs,
   then the DETOUR object, if any, should be altered as specified in
   Section 8.1

7.1.2.  Merging Detours using the Path-Specific Method

   An LSR (that is, an MP) may receive multiple Path messages from
   different interfaces with identical SESSION and SENDER_TEMPLATE
   objects.  In this case, Path state merging is REQUIRED.  The merging
   rule is as follows:

   If all Path messages have neither a FAST_REROUTE nor a DETOUR object,
   or if the MP is the egress of the LSP, no merging is required.  The
   messages are processed according to [RSVP-TE].



Pan, et al.                 Standards Track                    [Page 29]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   Otherwise, the MP MUST record the Path state and the incoming
   interface.  If the Path messages do not share an outgoing interface
   and a next-hop LSR, the MP MUST consider them to be independent LSPs
   and MUST NOT merge them.

   For all the Path messages that share the same outgoing interface and
   next-hop LSR, the MP runs the following procedure to create a Path
   message to forward downstream.

     1. If one or more of the Path messages is for the protected LSP (a
        protected LSP is one originated from this node, or with the
        FAST_REROUTE object, or without the DETOUR object), one of these
        must become the chosen Path message.  There could be more than
        one; in that case, which one to forward is a local decision.
        Quit.

     2. From the remaining set of Detour Path messages, eliminate from
        consideration those that traverse nodes that others want to
        avoid.

     3. If several still remain, which one to forward is a local
        decision.  If none remain, then the MP MAY try to find a new
        route that avoids all nodes that merging Detour Paths want to
        avoid; it will forward a Path message with that ERO.

   Once the final Path message has been identified, the MP MUST start to
   refresh it downstream periodically.  Other LSPs are considered merged
   at this node.  For bandwidth reservations on the outgoing link, any
   merging should be considered to have occurred before bandwidth is
   reserved.  Thus, even though Fixed Filter style is specified,
   multiple detours and/or their protected LSP (which are to be merged
   due to sharing an outgoing interface and next-hop LSR) will reserve
   only the bandwidth of the final Path message on that outgoing
   interface.

   If no merged Path message can be constructed, the MP SHOULD send a
   PathErr in response to the most recently received detour Path
   message.  If a protected Path is chosen to be forwarded but it
   traverses nodes that some detours want to avoid, PathErrs SHOULD be
   sent in response to those detour Paths which cannot merge.











Pan, et al.                 Standards Track                    [Page 30]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


7.1.2.1.  An Example of Path Message Merging

                R7---R8---R9-\
                |    |    |   \
           R1---R2---R3---R4---R5---R6

           Protected LSP:  [R1->R2->R3->R4->R5->R6]
           R2's Detour:    [R2->R7->R8->R9->R4->R5->R6]
           R3's Detour:    [R3->R8->R9->R5->R6]

           Example 4.  Path Message Merging

   In Example 4, R8 will receive Path messages that have the same
   SESSION and SENDER_TEMPLATE from detours for R2 and R3.  During
   merging at R8, because detour R3 has a shorter ERO path length (that
   is, ERO is [R9->R5->R6], and path length is 3), R8 will select it as
   the final LSP and will only propagate its Path messages downstream.
   Upon receiving a Resv (or a ResvTear) message, R8 must relay the
   messages toward both R2 and R3.

   R5 has to merge as well, and it will select the main LSP, since it
   has the FAST_REROUTE object.  Thus, the detour LSP terminates at R5.

7.1.3.  Message Handling for Merged Detours

   When an LSR receives a ResvTear for an LSP, the LSR must determine
   whether it has an alternate associated LSP.  For instance, if the
   ResvTear was received for a protected LSP but an associated backup
   LSP has not received a ResvTear, then the LSR has an alternate
   associated LSP.  If the LSR does not have an alternate associated
   LSP, then the MP MUST propagate the ResvTear toward the LSP's
   ingress, and, for each backup LSP merged into that LSP at this LSR,
   the ResvTear SHOULD also be propagated along the backup LSP.

   The MP may receive PathTear messages for some of the merging LSPs.
   PathTear messages SHOULD NOT be propagated downstream until the MP
   has received PathTear messages for each of the merged LSPs.  However,
   the fact that one or more of the merged LSPs has been torn down
   should be reflected in the downstream message, such as by changing
   the DETOUR object, if there is one.

7.2.  Handling Failures

   When a downstream LSR detects a local link failure, for any protected
   LSPs routed over the failed link, Path and Resv state MUST NOT be
   cleared, and PathTear and ResvErr messages MUST NOT be sent
   immediately.  If this is not the case, then the facility backup
   method will not work.  Furthermore, a downstream LSR SHOULD reset the



Pan, et al.                 Standards Track                    [Page 31]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


   refresh timers for these LSPs as if they had just been refreshed.
   This is to allow time for the PLR to begin refreshing state via the
   bypass tunnel.  State MUST be removed if it has not been refreshed
   before the refresh timer expires.  This allows the facility backup
   method to work without requiring that it signal backup paths through
   the bypass tunnel before failure.

   After a failure has occurred, the MP must still send Resv messages
   for the backup LSPs associated with the protected LSPs that have
   failed.  If the backup LSP was sent through a bypass tunnel, then the
   PHOP object in its Path message will have the IP address of the
   associated PLR.  This will ensure that Resv state is refreshed.

   Once the local link has recovered, the MP may or may not accept Path
   messages for existing protected LSPs that had failed over to their
   backup.

8.  Behavior of All LSRs

   The objects and methods defined in this document require behavior
   from all LSRs in the traffic-engineered network, even if an LSR is
   not along the path of a protected LSP.

   First, if a DETOUR object is included in the backup LSP's path
   message for the sender template-specific method, the LSRs in the
   traffic-engineered network should support the DETOUR object.

   Second, if the path-specific method is to be supported for the one-
   to-one backup method, it is necessary that the LSRs in the traffic-
   engineered network be capable of merging detours as specified in
   Section 8.1.

   It is possible to avoid specific LSRs that do not support this
   behavior by assigning a link attribute to all the links of those LSPs
   and then requesting that backup paths exclude this link attribute.

8.1.  Merging Detours in the Path-Specific Method

   If multiple Path Messages for different detours are received with the
   same SESSION, SENDER_TEMPLATE, outgoing interface, and next-hop LSR,
   then the LSR must function as a Detour Merge Point and merge the
   detour Path Messages.  This merging should occur as specified in
   Section 7.1.2 and shown in Example 4.

   In addition, it is necessary to update the DETOUR object to reflect
   the merging that has taken place.  This is done using the following
   algorithm to format the outgoing DETOUR object for the final LSP:




Pan, et al.                 Standards Track                    [Page 32]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


     - Combine all the (PLR_ID, Avoid_Node_ID) pairs from all the DETOUR
       objects of all merged LSPs into a new object.  Ordering is
       insignificant.

9.  Security Considerations

   This document does not introduce new security issues.  The security
   considerations pertaining to the original RSVP protocol [RSVP] remain
   relevant.

   Note that the facility backup method requires that a PLR and its
   selected merge point trust RSVP messages received from each other.

10.  IANA Considerations

   IANA [RFC-IANA] has assigned the following RSVP Class Numbers for
   objects defined in this document.

10.1.  DETOUR Object

   IANA has assigned:

      63  DETOUR

          Class Types or C-Types:

             7  IPv4
             8  IPv6

   Future C-Types will be assigned using the following guidelines:

       C-Types 0 through 127 are assigned by Standards Action.

       C-Types 128 through 191 are assigned by Expert Review.

       C-Types 192 through 255 are reserved for Vendor Private Use.

   For C-Types in the range 192 through 255, the first four octets of
   the DETOUR object after the C-Type must be the Vendor's SMI Network
   Management Private Enterprise Code (see [ENT]) in network byte order.











Pan, et al.                 Standards Track                    [Page 33]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


10.2.  FAST_REROUTE Object

   IANA has assigned:

      205  FAST_REROUTE

           Class Types or C-Types:

             1   FAST_REROUTE Type 1
             7   RESERVED

   In the FAST_REROUTE object, C-Type 7 is reserved as it is still used
   by pre-standard implementations.  Future C-Types will be assigned
   using the following guidelines:

       C-Types 0 through 127 are assigned by Standards Action.

       C-Types 128 through 191 are assigned by Expert Review.

       C-Types 192 through 255 are reserved for Vendor Private Use.

   For C-Types in the range 192 through 255, the first four octets of
   the FAST_REROUTE object after the C-Type must be the Vendor's SMI
   Network Management Private Enterprise Code (see [ENT]) in network
   byte order.


























Pan, et al.                 Standards Track                    [Page 34]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


11.  Contributors

   This document was written by George Swallow, Ping Pan, Alia Atlas,
   Jean Philippe Vasseur, Markus Jork, Der-Hwa Gan, and Dave Cooper.

   Jean Philippe Vasseur
   Cisco Systems, Inc.
   300 Beaver Brook Road
   Boxborough, MA 01719
   USA

   Phone:  +1 978 497 6238
   EMail: jpv@cisco.com


   Markus Jork
   Quarry Technologies
   8 New England Executive Park
   Burlington, MA 01803
   USA

   Phone: +1 781 359 5071
   EMail: mjork@quarrytech.com


   Der-Hwa Gan
   Juniper Networks
   1194 N.Mathilda Ave
   Sunnyvale, CA 94089
   USA

   Phone: +1 408 745 2074
   EMail: dhg@juniper.net


   Dave Cooper
   Global Crossing
   960 Hamlin Court
   Sunnyvale, CA 94089
   USA

   Phone: +1 916 415 0437
   EMail: dcooper@gblx.net








Pan, et al.                 Standards Track                    [Page 35]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


12.  Acknowledgments

   We would like to acknowledge input and helpful comments from Rob
   Goguen, Tony Li, Yakov Rekhter and Curtis Villamizar.  Especially, we
   thank those, who have been involved in interoperability testing and
   field trails, and provided invaluable ideas and suggestions.  They
   are Rob Goguen, Carol Iturralde, Brook Bailey, Safaa Hasan, Richard
   Southern, and Bijan Jabbari.

13.  Normative References

   [RSVP]       Braden, R., Zhang, L., Berson, S., Herzog, S., and S.
                Jamin, "Resource ReSerVation Protocol (RSVP) -- Version
                1 Functional Specification", RFC 2205, September 1997.

   [RSVP-TE]    Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan,
                V., and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
                Tunnels", RFC 3209, December 2001.

   [RFC-WORDS]  Bradner, S., "Key words for use in RFCs to Indicate
                Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC-IANA]   Narten, T. and H. Alvestrand, "Guidelines for Writing an
                IANA Considerations Section in RFCs", BCP 26, RFC 2434,
                October 1998.

   [ENT]        IANA PRIVATE ENTERPRISE NUMBERS,
                http://www.iana.org/assignments/enterprise-numbers























Pan, et al.                 Standards Track                    [Page 36]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


Authors' Addresses

   George Swallow
   Cisco Systems, Inc.
   300 Beaver Brook Road
   Boxborough, MA 01719
   USA

   Phone:  +1 978 244 8143
   EMail:  swallow@cisco.com


   Ping Pan
   Hammerhead Systems
   640 Clyde Court
   Mountain View, CA 94043
   USA

   EMail: ppan@hammerheadsystems.com


   Alia Atlas
   Avici Systems
   101 Billerica Avenue
   N. Billerica, MA 01862
   USA

   Phone: +1 978 964 2070
   EMail: aatlas@avici.com






















Pan, et al.                 Standards Track                    [Page 37]

RFC 4090                  RSVP-TE Fast Reroute                  May 2005


Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







Pan, et al.                 Standards Track                    [Page 38]