<?xml version="1.0" encoding="US-ASCII"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc toc="yes"?>
<?rfc sortrefs="no"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc category="info" number="4834">
  <front>
    <title abbrev="L3VPN Mcast Reqs">Requirements for Multicast in Layer 3
    Provider-Provisioned Virtual Private Networks (PPVPNs)</title>

    <author fullname="Thomas Morin" initials="T" role="editor" surname="Morin">
      <organization abbrev="France Telecom R&amp;D">France Telecom
      R&amp;D</organization>

      <address>
        <postal>
          <street>2, avenue Pierre Marzin</street>

          <code>22307</code>

          <city>Lannion</city>

          <country>France</country>
        </postal>

        <email>thomas.morin@orange-ftgroup.com</email>
      </address>
    </author>

    <date month="April" year="2007" />

    <workgroup>l3vpn Working Group</workgroup>

    <abstract>
      <t>This document presents a set of functional requirements for network
      solutions that allow the deployment of IP multicast within Layer 3 (L3)
      Provider-Provisioned Virtual Private Networks (PPVPNs). It specifies
      requirements both from the end user and service provider standpoints. It
      is intended that potential solutions specifying the support of IP
      multicast within such VPNs will use these requirements as
      guidelines.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction" toc="default">
      <t>Virtual Private Network (VPN) services satisfying the requirements
      defined in <xref format="default" pageno="false"
      target="RFC4031"></xref> are now being offered by many service providers
      throughout the world. VPN services are popular because customers need
      not be aware of the VPN technologies deployed in the provider network.
      They scale well for the following reasons:<list style="symbols">
          <t>because P routers (Provider Routers) need not be aware of VPN
          service details</t>

          <t>because the addition of a new VPN member requires only limited
          configuration effort</t>
        </list></t>

      <t>There is also a growing need for support of IP multicast-based
      services. Efforts to provide efficient IP multicast routing protocols
      and multicast group management have been made in standardization bodies
      which has led, in particular, to the definition of Protocol Independent
      Multicast (PIM) and Internet Group Management Protocol (IGMP).</t>

      <t>However, multicast traffic is not natively supported within existing
      L3 PPVPN solutions. Deploying multicast over an L3VPN today, with only
      currently standardized solutions, requires designing customized
      solutions which will be inherently limited in terms of scalability,
      operational efficiency, and bandwidth usage.</t>

      <t>This document complements the generic <xref format="default"
      pageno="false" target="RFC4031">L3VPN requirements </xref> document, by
      specifying additional requirements specific to the deployment within
      PPVPNs of services based on IP multicast. It clarifies the needs of both
      VPN clients and providers and formulates the problems that should be
      addressed by technical solutions with the key objective being to remain
      solution agnostic. There is no intent in this document to specify either
      solution-specific details or application-specific requirements. Also,
      this document does NOT aim at expressing multicast-related requirements
      that are not specific to L3 PPVPNs.</t>

      <t>It is expected that solutions that specify procedures and protocol
      extensions for multicast in L3 PPVPNs SHOULD satisfy these
      requirements.</t>
    </section>

    <?rfc needLines="10"?>

    <section title="Conventions Used in This Document" toc="default">
      <section anchor="terminology" title="Terminology" toc="default">
        <t>Although the reader is assumed to be familiar with the terminology
        defined in <xref format="default" pageno="false"
        target="RFC4031"></xref>, <xref format="default" pageno="false"
        target="RFC4364"></xref>, <xref format="default" pageno="false"
        target="RFC4601"></xref>, and <xref format="default" pageno="false"
        target="RFC4607"></xref>, the following glossary of terms may be
        worthwhile.</t>

        <t>We also propose here generic terms for concepts that naturally
        appear when multicast in VPNs is discussed.</t>

        <t><list style="hanging">
            <t hangText="ASM:"><vspace blankLines="0" />Any Source Multicast.
            One of the two multicast service models, in which a terminal
            subscribes to a multicast group to receive data sent to the group
            by any source.</t>

            <t
            hangText="Multicast-enabled VPN, multicast VPN, or             mVPN:"><vspace
            blankLines="0" />A VPN that supports IP multicast capabilities,
            i.e., for which some PE devices (if not all) are multicast-enabled
            and whose core architecture supports multicast VPN routing and
            forwarding.</t>

            <t hangText="PPVPN:"><vspace blankLines="0" />Provider-Provisioned
            Virtual Private Network.</t>

            <t hangText="PE, CE:"><vspace blankLines="0" />"Provider Edge",
            "Customer Edge" (as defined in <xref format="default"
            pageno="false" target="RFC4026"></xref>). As suggested in <xref
            format="default" pageno="false" target="RFC4026"></xref>, we will
            use these notations to refer to the equipments/routers/devices
            themselves. Thus, "PE" will refer to the router on the provider's
            edge, which faces the "CE", the router on the customer's edge.</t>

            <t hangText="VRF or VR:"><vspace blankLines="0" />By these terms,
            we refer to the entity defined in a PE dedicated to a specific VPN
            instance. "VRF" refers to "VPN Routing and Forwarding table" as
            defined in <xref format="default" pageno="false"
            target="RFC4364"></xref>, and "VR" to "Virtual Router" as defined
            in <xref target="VRs"></xref> terminology.</t>

            <t hangText="MDTunnel:"><vspace blankLines="0" />Multicast
            Distribution Tunnel. The means by which the customer's multicast
            traffic will be transported across the SP network. This is meant
            in a generic way: such tunnels can be either point-to-point or
            point-to-multipoint. Although this definition may seem to assume
            that distribution tunnels are unidirectional, the wording also
            encompasses bidirectional tunnels.</t>

            <t hangText="S:"><vspace blankLines="0" />Denotes a multicast
            source.</t>

            <t hangText="G:"><vspace blankLines="0" />Denotes a multicast
            group.</t>

            <t hangText="Multicast channel:"><vspace blankLines="0" />In the
            multicast SSM model <xref format="default" pageno="false"
            target="RFC4607"></xref>, a "multicast channel" designates traffic
            from a specific source S to a multicast group G. Also denominated
            as "(S,G)".</t>

            <t hangText="SP:"><vspace blankLines="0" />Service provider.</t>

            <t hangText="SSM:"><vspace blankLines="0" />Source Specific
            Multicast. One of the two multicast service models, where a
            terminal subscribes to a multicast group to receive data sent to
            the group by a specific source.</t>

            <t hangText="RP:"><vspace blankLines="0" />Rendezvous Point (<xref
            format="default" pageno="false" target="RFC4601"> Protocol
            Independent Multicast - Sparse Mode (PIM-SM)</xref>).</t>

            <t hangText="P2MP, MP2MP:"><vspace blankLines="0" /> Designate
            "Point-to-Multipoint" and "Multipoint-to-Multipoint" replication
            trees.</t>

            <t hangText="L3VPN, VPN:"><vspace blankLines="0" />Throughout this
            document, "L3VPN" or even just "VPN" will refer to
            "Provider-Provisioned Layer 3 Virtual Private Network" (PP
            L3VPNs), and will be preferred for readability.</t>
          </list>Please refer to <xref format="default" pageno="false"
        target="RFC4026"></xref> for details about terminology specifically
        relevant to VPN aspects, and to <xref format="default" pageno="false"
        target="RFC2432"></xref> for multicast performance or quality of
        service (QoS)-related terms.</t>
      </section>

      <section title="Conventions" toc="default">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
        document are to be interpreted as described in <xref format="default"
        pageno="false" target="RFC2119"></xref>.</t>
      </section>
    </section>

    <?rfc needLines="10"?>

    <section title="Problem Statement" toc="default">
      <section anchor="motivations" title="Motivations" toc="default">
        <t>More and more L3VPN customers use IP multicast services within
        their private infrastructures. Naturally, they want to extend these
        multicast services to remote sites that are connected via a VPN.</t>

        <t>For instance, the customer could be a national TV channel with
        several geographical locations that wants to broadcast a TV program
        from a central point to several regional locations within its VPN.</t>

        <t>A solution to support multicast traffic could consist of
        point-to-point tunnels across the provider network and requires the
        PEs (Provider Edge routers) to replicate traffic. This would obviously
        be sub-optimal as it would place the replication burden on the PE and
        hence would have very poor scaling characteristics. It would also
        probably waste bandwidth and control plane resources in the provider's
        network.</t>

        <t>Thus, to provide multicast services for L3VPN networks in an
        efficient manner (that is, with a scalable impact on signaling and
        protocol state as well as bandwidth usage), in a large-scale
        environment, new mechanisms are required to enhance existing L3VPN
        solutions for proper support of multicast-based services.</t>
      </section>

      <section title="General Requirements" toc="default">
        <t>This document sets out requirements for L3 provider-provisioned VPN
        solutions designed to carry customers' multicast traffic. The main
        requirement is that a solution SHOULD first satisfy the requirements
        documented in <xref format="default" pageno="false"
        target="RFC4031"></xref>: as far as possible, a multicast service
        should have the same characteristics as the unicast equivalent,
        including the same simplicity (technology unaware), the same quality
        of service (if any), the same management (e.g., performance
        monitoring), etc.</t>

        <t>Moreover, it also has to be clear that a multicast VPN solution
        MUST interoperate seamlessly with current unicast VPN solutions. It
        would also make sense that multicast VPN solutions define themselves
        as extensions to existing L3 provider-provisioned VPN solutions (such
        as for instance, <xref format="default" pageno="false"
        target="RFC4364"></xref> or <xref format="none" pageno="false"
        target="VRs">[VRs]</xref>) and retain consistency with those, although
        this is not a core requirement.</t>

        <t>The requirements in this document are equally applicable to IPv4
        and IPv6, for both customer- and provider-related matters.</t>
      </section>

      <section anchor="scalvsoptim"
               title="Scaling vs. Optimizing Resource Utilization"
               toc="default">
        <t>When transporting multicast VPN traffic over a service provider
        network, there intrinsically is tension between scalability and
        resource optimization, since the latter is likely to require the
        maintenance of control plane states related to replication trees in
        the core network <xref format="default" pageno="false"
        target="RFC3353"></xref>.</t>

        <t>Consequently, any deployment will require a trade-off to be made.
        This document will express some requirements related to this
        trade-off.</t>
      </section>
    </section>

    <?rfc needLines="10"?>

    <section title="Use Cases" toc="default">
      <t>The goal of this section is to highlight how different applications
      and network contexts may have a different impact on how a multicast VPN
      solution is designed, deployed, and tuned. For this purpose, we describe
      some typical use case scenarios and express expectations in terms of
      deployment orders of magnitude.</t>

      <t>Most of the content of these sections originates from a survey done
      in summer 2005, among institutions and providers that expect to deploy
      such solutions. The full survey text and raw results (13 responses) were
      published separately, and we only present here the most relevant facts
      and expectations that the survey exposed.</t>

      <t>For scalability figures, we considered that it was relevant to
      highlight the highest expectations, those that are expected to have the
      greatest impact on solution design. For balance, we do also mention
      cases where such high expectations were expressed in only a few
      answers.</t>

      <section anchor="scenarios" title="Scenarios" toc="default">
        <t>We don't provide here an exhaustive set of scenarios that a
        multicast VPN solution is expected to support -- no solution should
        restrict the scope of multicast applications and deployments that can
        be done over a multicast VPN.</t>

        <t>Hence, we only give here a short list of scenarios that are
        expected to have a large impact on the design of a multicast VPN
        solution.</t>

          <?rfc needLines="8"?>

        <section title="Live Content Broadcast" toc="default">
          <t>Under this label, we group all applications that distribute
          content (audio, video, or other content) with the property that this
          content is expected to be consulted at once ("live") by the
          receiver. <?rfc needLines="3"?> Typical applications are broadcast
          TV, production studio connectivity, and distribution of market data
          feeds.</t>

          <t>The characteristics of such applications are the following:<list
              style="symbols">
              <t>one or few sources to many receivers</t>

              <t>sources are often in known locations; receivers are in less
              predictable locations (this latter point may depend on
              applications)</t>

              <t>in some cases, it is expected that the regularity of audience
              patterns may help improve how the bandwidth/state trade-off is
              handled</t>

              <t>the number of streams can be as high as hundreds, or even
              thousands, of streams</t>

              <t>bandwidth will depend on the application, but may vary
              between a few tens/hundreds of Kb/s (e.g., audio or low-quality
              video media) and tens of Mb/s (high-quality video), with some
              demanding professional applications requiring as much as
              hundreds of Mb/s.</t>

              <t>QoS requirements include, in many cases, a low multicast
              group join delay</t>

              <t>QoS of these applications is likely to be impacted by packet
              loss (some applications may be robust to low packet loss) and to
              have low robustness against jitter</t>

              <t>delay sensitivity will depend on the application: some
              applications are not so delay sensitive (e.g., broadcast TV),
              whereas others may require very low delay (professional studio
              applications)</t>

              <t>some of these applications may involve rapid changes in
              customer multicast memberships as seen by the PE, but this will
              depend on audience patterns and on the amount of provider
              equipments deployed close to VPN customers</t>
            </list></t>
        </section>

          <?rfc needLines="8"?>

        <section title="Symmetric Applications" toc="default">
          <t>Some use cases exposed by the survey can be grouped under this
          label, and include many-to-many applications such as conferencing
          and server cluster monitoring.</t>

          <?rfc needLines="4"?>

          <t>They are characterized by the relatively high number of streams
          that they can produce, which has a direct impact on scalability
          expectations.</t>

          <t>A sub-case of this scenario is the case of symmetric applications
          with small groups, when the number of receivers is low compared to
          the number of sites in the VPNs (e.g., video conferencing and
          e-learning applications).</t>

          <t>This latter case is expected to be an important input to solution
          design, since it may significantly impact how the bandwidth/state is
          managed.</t>

          <t>Optimizing bandwidth may require introducing dedicated states in
          the core network (typically as much as the number of groups) for the
          following reasons: <list style="symbols">
              <t>small groups, and low predictability of the location of
              participants ("sparse groups")</t>

              <t>possibly significantly high bandwidth (a few Mb/s per
              participant)</t>
            </list></t>

          <t>Lastly, some of these applications may involve real-time
          interactions and will be highly sensitive to packet loss, jitter,
          and delay.</t>
        </section>


        <section title="Data Distribution" toc="default">
          <t>Some applications that are expected to be deployed on multicast
          VPNs are non-real-time applications aimed at distributing data from
          few sources to many receivers.</t>

          <t>Such applications may be considered to have lower expectations
          than their counterparts proposed in this document, since they would
          not necessarily involve more data streams and are more likely to
          adapt to the available bandwidth and to be robust to packet loss,
          jitter, and delay.</t>

          <t>One important property is that such applications may involve
          higher bandwidths (hundreds of Mb/s).</t>
        </section>

          <?rfc needLines="8"?>

        <section title="Generic Multicast VPN Offer" toc="default">
          <t>This ISP scenario is a deployment scenario where IP-multicast
          connectivity is proposed for every VPN: if a customer requests a
          VPN, then this VPN will support IP multicast by default. In this
          case, the number of multicast VPNs equals the number of VPNs. This
          implies <?rfc needLines="5"?> a quite important scalability
          requirement (e.g., hundreds of PEs, hundreds of VPNs per PE, with a
          potential increase by one order of magnitude in the future).</t>

          <t>The per-mVPN traffic behavior is not predictable because how the
          service is used is completely up to the customer. This results in a
          traffic mix of the scenarios mentioned in Section <xref
          format="counter" pageno="false" target="scenarios"></xref>. QoS
          requirements are similar to typical unicast scenarios, with the need
          for different classes. Also, in such a context, a reasonably large
          range of protocols should be made available to the customer for use
          at the PE-CE level.</t>

          <t>Also, in such a scenario, customers may want to deploy multicast
          connectivity between two or more multicast VPNs as well as access to
          Internet Multicast.</t>
        </section>
      </section>

      <section anchor="scalability-figures"
               title="Scalability Orders of Magnitude" toc="default">
        <t>This section proposes orders of magnitude for different scalability
        metrics relevant for multicast VPN issues. It should be noted that the
        scalability figures proposed here relate to scalability expectations
        of future deployments of multicast VPN solutions, as the authors chose
        to not restrict the scope to only currently known deployments.</t>

        <section title="Number of VPNs with Multicast Enabled" toc="default">
          <t>From the survey results, we see a broad range of expectations.
          There are extreme answers: from 5 VPNs (1 answer) to 10k VPNs (1
          answer), but more typical answers are split between the low range of
          tens of VPNs (7 answers) and the higher range of hundreds or
          thousands of VPNs (2 + 4 answers).</t>

          <t>A solution SHOULD support a number of multicast VPNs ranging from
          one to several thousands.</t>

          <t>A solution SHOULD NOT limit the proportion of multicast VPNs
          among all (unicast) VPNs.</t>
        </section>

        <section title="Number of Multicast VPNs per PE" toc="default">
          <t>The majority of survey answers express a number of multicast VPNs
          per PE of around tens (8 responses between 5 and 50); a significant
          number of them (4) expect deployments with hundreds or thousands (1
          response) of multicast VPNs per PE.</t>

          <?rfc needLines="4"?>

          <t>A solution SHOULD support a number of multicast VPNs per PE of
          several hundreds, and may have to scale up to thousands of VPNs per
          PE.</t>
        </section>

        <?rfc needLines="5"?>

        <section title="Number of CEs per Multicast VPN per PE" toc="default">
          <t>Survey responses span from 1 to 2000 CEs per multicast VPN per
          PE. Most typical responses are between tens (6 answers) and hundreds
          (4 responses).</t>

          <t>A solution SHOULD support a number of CEs per multicast VPN per
          PE going up to several hundreds (and may target the support of
          thousands of CEs).</t>
        </section>

        <section title="PEs per Multicast VPN" toc="default">
          <t>People who answered the survey typically expect deployments with
          the number of PEs per multicast VPN in the range of hundreds of PEs
          (6 responses) or tens of PEs (4 responses). Two responses were in
          the range of thousands (one mentioned a 10k figure).</t>

          <t>A multicast VPN solution SHOULD support several hundreds of PEs
          per multicast VPN, and MAY usefully scale up to thousands.</t>

          <section title="... with Sources" toc="default">
            <t>The number of PEs (per VPN) that would be connected to sources
            seems to be significantly lower than the number of PEs per VPN.
            This is obviously related to the fact that many respondents
            mentioned deployments related to content broadcast applications
            (one to many).</t>

            <t>Typical numbers are tens (6 responses) or hundreds (4
            responses) of source-connected PEs. One respondent expected a
            higher number of several thousands.</t>

            <t>A solution SHOULD support hundreds of source-connected PEs per
            VPN, and some deployment scenarios involving many-to-many
            applications may require supporting a number of source-connected
            PEs equal to the number of PEs (hundreds or thousands).</t>
          </section>

          <section title="... with Receivers" toc="default">
            <t>The survey showed that the number of PEs with receivers is
            expected to be of the same order of magnitude as the number of PEs
            in a multicast VPN. This is consistent with the intrinsic nature
            of most multicast applications, which have few source-only
            participants.</t>
          </section>
        </section>

        <section title="PEs with Multicast VRFs" toc="default">
          <t>A solution SHOULD scale up to thousands of PEs having multicast
          service enabled.</t>
        </section>

        <section title="Number of Streams Sourced" toc="default">
          <t>Survey responses led us to retain the following orders of
          magnitude for the number of streams that a solution SHOULD
          support:</t>

          <t><list style="hanging">
              <t hangText="per VPN:">hundreds or thousands of streams</t>

              <t hangText="per PE:">hundreds of streams</t>
            </list></t>
        </section>
      </section>
    </section>

    <?rfc needLines="10"?>

    <section title="Requirements for Supporting IP Multicast within L3 PPVPNs"
             toc="default">
      <t>Again, the aim of this document is not to specify solutions but to
      give requirements for supporting IP multicast within L3 PPVPNs.</t>

      <t>In order to list these requirements, we have taken the standpoint of
      two different important entities: the end user (the customer using the
      VPN) and the service provider.</t>

      <t>In the rest of the document, by "a solution" or "a multicast VPN
      solution", we mean a solution that allows multicast in an L3
      provider-provisioned VPN, and which addresses the requirements listed in
      this document.</t>

      <section title="End User/Customer Standpoint" toc="default">
        <section anchor="service-definition" title="Service Definition"
                 toc="default">
          <t>As for unicast, the multicast service MUST be provider
          provisioned and SHALL NOT require customer devices (CEs) to support
          any extra features compared to those required for multicast in a
          non-VPN context. Enabling a VPN for multicast support SHOULD be
          possible with no impact (or very limited impact) on existing
          multicast protocols possibly already deployed on the CE devices.</t>
        </section>

        <section anchor="pece-reqs"
                 title="CE-PE Multicast Routing and Group Management Protocols"
                 toc="default">
          <t>Consequently to <xref format="default" pageno="false"
          target="service-definition"></xref>, multicast-related protocol
          exchanges between a CE and its directly connected PE SHOULD happen
          via existing multicast protocols.</t>

          <?rfc needLines="5"?>

          <t>Such protocols include: <xref format="default" pageno="false"
          target="RFC4601">PIM-SM</xref>, <xref format="default"
          pageno="false" target="BIDIR-PIM">bidirectional-PIM</xref>, <xref
          format="default" pageno="false" target="RFC3973">PIM - Dense Mode
          (DM)</xref>, and <xref format="default" pageno="false"
          target="RFC3376">IGMPv3</xref> (this version implicitly supports
          hosts that only implement <xref format="default" pageno="false"
          target="RFC1112">IGMPv1</xref> or <xref format="default"
          pageno="false" target="RFC2236">IGMPv2</xref>).</t>

          <t>Among those protocols, the support of PIM-SM (which includes the
          SSM model) and either IGMPv3 (for IPv4 solutions) and/or <xref
          format="default" pageno="false" target="RFC3810">Multicast Listener
          Discovery Version 2 (MLDv2)</xref> (for IPv6 solutions) is REQUIRED.
          Bidir-PIM support at the PE-CE interface is RECOMMENDED. And
          considering deployments, PIM-DM is considered OPTIONAL.</t>

          <t>When a multicast VPN solution is built on a VPN solution
          supporting IPv6 unicast, it MUST also support v6 variants of the
          above protocols, including MLDv2, and PIM-SM IPv6-specific
          procedures. For a multicast VPN solution built on a unicast VPN
          solution supporting only IPv4, it is RECOMMENDED that the design
          favors the definition of procedures and encodings that will provide
          an easy adaptation to IPv6.</t>
        </section>

        <section title="Quality of Service (QoS)" toc="default">
           

          <t>Firstly, general considerations regarding QoS in L3VPNs expressed
          in Section 5.5 of <xref format="default" pageno="false"
          target="RFC4031" /> are also relevant to this section.</t>

           

          <t>QoS is measured in terms of delay, jitter, packet loss, and
          availability. These metrics are already defined for the current
          unicast PPVPN services and are included in Service Level Agreements
          (SLAs). In some cases, the agreed SLA may be different between
          unicast and multicast, and that will require differentiation
          mechanisms in order to monitor both SLAs.</t>

           

          <t>The level of availability for the multicast service SHOULD be on
          par with what exists for unicast traffic. For instance, comparable
          traffic protection mechanisms SHOULD be available for customer
          multicast traffic when it is carried over the service provider's
          network.</t>

           

          <t>A multicast VPN solution SHALL allow a service provider to define
          at least the same level of quality of service as exists for unicast,
          and as exists for multicast in a non-VPN context. From this
          perspective, the deployment of multicast-based services within an
          L3VPN environment SHALL benefit from <xref format="default"
          pageno="false" target="RFC2475">Diffserv</xref> mechanisms that
          include multicast traffic identification, classification, and
          marking capabilities, as well as multicast traffic policing,
          scheduling, and conditioning capabilities. Such capabilities MUST
          therefore be supported by any participating device in the
          establishment and the maintenance of the multicast distribution
          tunnel within the VPN.</t>

           

          <?rfc needLines="4"?>

           

          <t>As multicast is often used to deliver high-quality services such
          as TV broadcast, a multicast VPN solution MAY provide additional
          features to support high QoS such as bandwidth reservation and
          admission control.</t>

           e 

          <?rfc needLines="4"?>

           

          <t>Also, considering that multicast reception is receiver-triggered,
          group join delay (as defined in <xref format="default"
          pageno="false" target="RFC2432" />) is also considered one important
          QoS parameter. It is thus RECOMMENDED that a multicast VPN solution
          be designed appropriately in this regard.</t>

           

          <t>The group leave delay (as defined in <xref format="default"
          pageno="false" target="RFC2432" />) may also be important on the
          CE-PE link for some usage scenarios: in cases where the typical
          bandwidth of multicast streams is close to the bandwidth of a PE-CE
          link, it will be important to have the ability to stop the emission
          of a stream on the PE-CE link as soon as it stops being requested by
          the CE, to allow for fast switching between two different
          high-throughput multicast streams. This implies that it SHOULD be
          possible to tune the multicast routing or group management protocols
          (e.g., IGMP/MLD or PIM) used on the PE-CE adjacency to reduce the
          group leave delay to the minimum.</t>

           

          <t>Lastly, a multicast VPN solution SHOULD as much as possible
          ensure that client multicast traffic packets are neither lost nor
          duplicated, even when changes occur in the way a client multicast
          data stream is carried over the provider network. Packet loss issues
          also have to be considered when a new source starts to send traffic
          to a group: any receiver interested in receiving such traffic SHOULD
          be serviced accordingly.</t>

           
        </section>

        <section title="Operations and Management" toc="default">
          <t>The requirements and definitions for operations and management
          (OAM) of L3VPNs that are defined in <xref format="default"
          pageno="false" target="RFC4176"></xref> equally apply to multicast,
          and are not extensively repeated in this document. This sub-section
          mentions the most important guidelines and details points of
          particular relevance in the context of multicast in L3VPNs.</t>

          <t>A multicast VPN solution SHOULD allow a multicast VPN customer to
          manage the capabilities and characteristics of their multicast VPN
          services.</t>

          <t>A multicast VPN solution MUST support SLA monitoring
          capabilities, which SHOULD rely upon techniques similar to those
          used for the unicast service for the same monitoring purposes.
          Multicast SLA-related metrics SHOULD be available through means
          similar to the ones already used for unicast-related monitoring,
          such as Simple Network Management Protocol (SNMP) <xref
          format="default" pageno="false" target="RFC3411"></xref> or IPFIX
          <xref format="default" pageno="false"
          target="IPFIX-PROT"></xref>.</t>

          <t>Multicast-specific characteristics that may be monitored include:
          multicast statistics per stream, end-to-end delay, and group
          join/leave delay (time to start/stop receiving a multicast group's
          traffic across the VPN, as defined in <xref format="default"
          pageno="false" target="RFC2432"></xref>, Section 3).</t>

          <t>The monitoring of multicast-specific parameters and statistics
          MUST include multicast traffic statistics:
          total/incoming/outgoing/dropped traffic, by period of time. It MAY
          include IP Performance Metrics related information (IPPM, <xref
          target="RFC2330"></xref>) that is relevant to the multicast traffic
          usage: such information includes the one-way packet delay, the
          inter-packet delay variation, etc. See <xref
          target="MULTIMETRICS"></xref>.</t>

          <t>A generic discussion of SLAs is provided in <xref
          format="default" pageno="false" target="RFC3809"></xref>.</t>

          <t>Apart from statistics on multicast traffic, customers of a
          multicast VPN will need information concerning the status of their
          multicast resource usage (multicast routing states and bandwidth).
          Indeed, as mentioned in <xref format="default" pageno="false"
          target="isp-control-mechanisms"></xref>, for scalability purposes, a
          service provider may limit the number (and/or throughput) of
          multicast streams that are received/sent to/from a client site. In
          such a case, a multicast VPN solution SHOULD allow customers to find
          out their current resource usage (multicast routing states and
          throughput), and to receive some kind of feedback if their usage
          exceeds the agreed bounds. Whether this issue will be better handled
          at the protocol level at the PE-CE interface or at the Service
          Management Level interface <xref format="default" pageno="false"
          target="RFC4176"></xref> is left for further discussion.</t>

          <t>It is RECOMMENDED that any OAM mechanism designed to trigger
          alarms in relation to performance or resource usage metrics
          integrate the ability to limit the rate at which such alarms are
          generated (e.g., some form of a hysteresis mechanism based on
          low/high thresholds defined for the metrics).</t>
        </section>

        <section anchor="customer-sec" title="Security Requirements"
                 toc="default">
          <t>Security is a key point for a customer who uses a VPN service.
          For instance, the <xref format="default" pageno="false"
          target="RFC4364"></xref> model offers some guarantees concerning the
          security level of data transmission within the VPN.</t>

          <t>A multicast VPN solution MUST provide an architecture with the
          same level of security for both unicast and multicast traffic.</t>

          <t>Moreover, the activation of multicast features SHOULD be
          possible:<list style="symbols">
              <t>per VRF / per VR</t>

              <t>per CE interface (when multiple CEs of a VPN are connected to
              a common VRF/VR)</t>

              <t>per multicast group and/or per channel</t>

              <t>with a distinction between multicast reception and
              emission</t>
            </list></t>

          <?rfc needLines="3"?>

          <t>A multicast VPN solution may choose to make the
          optimality/scalability trade-off stated in <xref format="default"
          pageno="false" target="scalvsoptim"></xref> by sometimes
          distributing multicast traffic of a client group to a larger set of
          PE routers that may include PEs that are not part of the VPN. From a
          security standpoint, this may be a problem for some VPN customers;
          thus, a multicast VPN solution using such a scheme MAY offer ways to
          avoid this for specific customers (and/or specific customer
          multicast streams).</t>
        </section>

        <section anchor="extranet" title="Extranet" toc="default">
          <t>In current PP L3VPN models, a customer site may be set up to be
          part of multiple VPNs, and this should still be possible when a VPN
          is multicast-enabled. In practice, it means that a VRF or VR can be
          part of more than one VPN.</t>

          <t>A multicast VPN solution MUST support such deployments.</t>

          <t>For instance, it must be possible to configure a VRF so that an
          enterprise site participating in a BGP/MPLS multicast-enabled VPN
          and connected to that VRF can receive a multicast stream from (or
          originate a multicast stream towards) another VPN that would be
          associated to that VRF.</t>

          <t>This means that a multicast VPN solution MUST offer means for a
          VRF to be configured so that multicast connectivity can be set up
          for a chosen set of extranet VPNs. More precisely, it MUST be
          possible to configure a VRF so that:<list style="symbols">
              <t>receivers behind attached CEs can receive multicast traffic
              sourced in the configured set of extranet VPNs</t>

              <t>sources behind attached CEs can reach multicast traffic
              receivers located in the configured set of extranet VPNs</t>

              <t>multicast reception and emission can be independently enabled
              for each of the extranet VPNs</t>
            </list></t>

          <t>Moreover, a solution MUST allow service providers to control an
          extranet's multicast connectivity independently from the extranet's
          unicast connectivity. More specifically:<list style="symbols">
              <t>enabling unicast connectivity to another VPN MUST be possible
              without activating multicast connectivity with that VPN</t>

              <?rfc needLines="6"?>

              <t>enabling multicast connectivity with another VPN SHOULD NOT
              require more than the strict minimal unicast routing. Sending
              multicast to a VPN SHOULD NOT require having unicast routes to
              that VPN; receiving multicast from a VPN SHOULD be possible with
              nothing more than unicast routes to the relevant multicast
              sources of that VPN</t>

              <?rfc needLines="4"?>

              <t>when unicast routes from another VPN are imported into a
              VR/VRF, for multicast Reverse Path Forwarding (RPF) resolution,
              this SHOULD be possible without making those routes available
              for unicast routing</t>
            </list></t>

          <t>Proper support for this feature SHOULD NOT require replicating
          multicast traffic on a PE-CE link, whether it is a physical or
          logical link.</t>
        </section>

        <section title="Internet Multicast" toc="default">
          <t>Connectivity with Internet Multicast is a particular case of the
          previous section, where sites attached to a VR/VRF would need to
          receive/send multicast traffic from/to the Internet.</t>

          <t>This should be considered OPTIONAL given the additional
          considerations, such as security, needed to fulfill the requirements
          for providing Internet Multicast.</t>
        </section>

        <section anchor="csc" title="Carrier's Carrier" toc="default">
          <t>Many L3 PPVPN solutions, such as <xref format="default"
          pageno="false" target="RFC4364"></xref> and <xref format="none"
          pageno="false" target="VRs">[VRs]</xref>, define the "Carrier's
          Carrier" model, where a "carrier's carrier" service provider
          supports one or more customer ISPs, or "sub-carriers". A multicast
          VPN solution SHOULD support the carrier's carrier model in a
          scalable and efficient manner.</t>

          <t>Ideally, the range of tunneling protocols available for the
          sub-carrier ISP should be the same as those available for the
          carrier's carrier ISP. This implies that the protocols that may be
          used at the PE-CE level SHOULD NOT be restricted to protocols
          required as per <xref format="default" pageno="false"
          target="pece-reqs"></xref> and SHOULD include some of the protocols
          listed in <xref format="default" pageno="false"
          target="tunneling"></xref>, such as for instance P2MP MPLS signaling
          protocols.</t>

          <t>In the context of MPLS-based L3VPN deployments, such as <xref
          format="default" pageno="false" target="RFC4364">BGP/MPLS VPNs
          </xref>, this means that MPLS label distribution SHOULD happen at
          the PE-CE level, giving the ability to the sub-carrier to use
          multipoint LSPs as a tunneling mechanism.</t>
        </section>

        <section title="Multi-Homing, Load Balancing, and Resiliency"
                 toc="default">
          <t>A multicast VPN solution SHOULD be compatible with current
          solutions that aim at improving the service robustness for customers
          such as multi-homing, CE-PE link load balancing, and fail-over. A
          multicast VPN solution SHOULD also be able to offer those same
          features for multicast traffic.</t>

          <t>Any solution SHOULD support redundant topology of CE-PE links. It
          SHOULD minimize multicast traffic disruption and fail-over.</t>
        </section>

        <section title="RP Engineering" toc="default">
          <t>When PIM-SM (or bidir-PIM) is used in ASM mode on the VPN
          customer side, the RP function (or RP-address in the case of
          bidir-PIM) has to be associated to a node running PIM, and
          configured on this node.</t>

          <section title="RP Outsourcing" toc="default">
            <t>In the case of PIM-SM in ASM mode, engineering of the RP
            function requires the deployment of specific protocols and
            associated configurations. A service provider may offer to manage
            customers' multicast protocol operation on their behalf. This
            implies that it is necessary to consider cases where a customer's
            RPs are outsourced (e.g., on PEs). Consequently, a VPN solution
            MAY support the hosting of the RP function in a VR or VRF.</t>
          </section>

          <section title="RP Availability" toc="default">
            <t>Availability of the RP function (or address) is required for
            proper operation of PIM-SM (ASM mode) and bidir-PIM. Loss of
            connectivity to the RP from a receiver or source will impact the
            multicast service. For this reason, different mechanisms exist,
            such as <xref format="default" pageno="false"
            target="PIM-BSR">BSR</xref> or anycast-RP (<xref format="default"
            pageno="false" target="RFC3446"> Multicast Source Discovery
            Protocol (MSDP)-based</xref> or <xref format="default"
            pageno="false" target="RFC4610">PIM-based</xref>).</t>

            <t>These protocols and procedures SHOULD work transparently
            through a multicast VPN, and MAY if relevant, be implemented in a
            VRF/VR.</t>

            <t>Moreover, a multicast VPN solution MAY improve the robustness
            of the ASM multicast service regarding loss of connectivity to the
            RP, by providing specific features that help: <list
                style="hanging">
                <t hangText="a)">maintain ASM multicast service among all the
                sites within an MVPN that maintain connectivity among
                themselves, even when the site(s) hosting the RP lose their
                connectivity to the MVPN</t>

                <t hangText="b)">maintain ASM multicast service within any
                site that loses connectivity to the service provider</t>
              </list></t>
          </section>

          <section title="RP Location" toc="default">
            <t>In the case of PIM-SM, when a source starts to emit traffic
            toward a group (in ASM mode), if sources and receivers are located
            in VPN sites that are different than that of the RP, then traffic
            may transiently flow twice through the SP network and the CE-PE
            link of the RP (from source to RP, and then from RP to receivers).
            This traffic peak, even short, may not be convenient depending on
            the traffic and link bandwidth.</t>

            <t>Thus, a VPN solution MAY provide features that solve or help
            mitigate this potential issue.</t>
          </section>
        </section>

        <section title="Addressing" toc="default">
          <t>A multicast provider-provisioned L3VPN SHOULD NOT impose
          restrictions on multicast group addresses used by VPN customers.</t>

          <t>In particular, like unicast traffic, an overlap of multicast
          group address sets used by different VPN customers MUST be
          supported.</t>

          <t>The use of globally unique means of multicast-based service
          identification at the scale of the domain where such services are
          provided SHOULD be recommended. For IPv4 multicast, this implies the
          use of the multicast administratively scoped range (239/8 as defined
          by <xref format="default" pageno="false" target="RFC2365"></xref>)
          for services that are to be used only inside the VPN, and of either
          SSM-range addresses (232/8 as defined by <xref format="default"
          pageno="false" target="RFC4607"></xref>) or globally assigned group
          addresses (e.g., <xref format="default" pageno="false"
          target="RFC3180">GLOP</xref>, 233/8) for services for which traffic
          may be transmitted outside the VPN.</t>
        </section>

        <section title="Minimum MTU" toc="default">
          <t anchor="TM">For customers, it is often a serious issue whether or
          not transmitted packets will be fragmented. In particular, some
          multicast applications might have different requirements than those
          that make use of unicast, and they may expect services that
          guarantee available packet length not to be fragmented.</t>

          <t>Therefore, a multicast VPN solution SHOULD be designed with these
          considerations in mind. In practice:<list style="symbols">
              <t>the encapsulation overhead of a multicast VPN solution SHOULD
              be minimized, so that customer devices can be free of
              fragmentation and reassembly activity as much as possible</t>

              <t>a multicast VPN solution SHOULD enable the service provider
              to commit to a minimum path MTU usable by multicast VPN
              customers</t>

              <t>a multicast VPN solution SHOULD be compatible with path MTU
              discovery mechanisms (see <xref format="default" pageno="false"
              target="RFC1191"></xref> and <xref format="default"
              pageno="false" target="RFC4459"></xref>), and particular care
              SHOULD be given to means to help troubleshoot MTU issues</t>
            </list> <?rfc needLines="4"?> Moreover, since Ethernet LAN
          segments are often located at first and last hops, a multicast VPN
          solution SHOULD be designed to allow for a minimum 1500-byte IP MTU
          for VPN customers multicast packet, when the provider backbone
          design allows it.</t>
        </section>
      </section>

      <section title="Service Provider Standpoint" toc="default">
        <t>Note: To avoid repetition and confusion with terms used in solution
        specifications, we introduced in <xref format="default" pageno="false"
        target="terminology"></xref> the term MDTunnel (for Multicast
        Distribution Tunnel), which designates the data plane means used by
        the service provider to forward customer multicast traffic over the
        core network.</t>

        <section title="General Requirement" toc="default">
          <t>The deployment of a multicast VPN solution SHOULD be possible
          with no (or very limited) impact on existing deployments of
          standardized multicast-related protocols on P and PE routers.</t>
        </section>

        <section anchor="scalability" title="Scalability" toc="default">
          <t>Some currently standardized and deployed L3VPN solutions have the
          major advantage of being scalable in the core regarding the number
          of customers and the number of customer routes. For instance, in the
          <xref format="default" pageno="false" target="RFC4364"></xref> and
          <xref format="default" pageno="false" target="VRs">Virtual
          Router</xref> models, a P router sees a number of MPLS tunnels that
          is only linked to the number of PEs and not to the number of VPNs,
          or customer sites.</t>

          <t>As far as possible, this independence in the core, with respect
          to the number of customers and to customer activity, is recommended.
          Yet, it is recognized that in our context scalability and resource
          usage optimality are competing goals, so this requirement may be
          reduced to giving the possibility of bounding the quantity of states
          that the service provider needs to maintain in the core for
          MDTunnels, with a bound being independent of the multicast activity
          of VPN customers.</t>

          <?rfc needLines="6"?>

          <t>It is expected that multicast VPN solutions will use some kind of
          point-to-multipoint technology to efficiently carry multicast VPN
          traffic, and because such technologies require maintaining state
          information, this will use resources in the control plane of P and
          PE routers (memory and processing, and possibly address space).</t>

          <t>Scalability is a key requirement for multicast VPN solutions.
          Solutions MUST be designed to scale well with an increase in any of
          the following: <list style="symbols">
              <t>the number of PEs</t>

              <t>the number of customer VPNs (total and per PE)</t>

              <t>the number of PEs and sites in any VPN</t>

              <t>the number of client multicast channels (groups or
              source-groups)</t>
            </list></t>

          <t>Please consult Section <xref format="counter" pageno="false"
          target="scalability-figures"></xref> for typical orders of magnitude
          up to which a multicast VPN solution is expected to scale.</t>

          <t>Scalability of both performance and operation MUST be
          considered.</t>

          <t>Key considerations SHOULD include:<list style="symbols">
              <t>the processing resources required by the control plane
              (neighborhood or session maintenance messages, keep-alives,
              timers, etc.)</t>

              <t>the memory resources needed for the control plane</t>

              <t>the amount of protocol information transmitted to manage a
              multicast VPN (e.g., signaling throughput)</t>

              <t>the amount of control plane processing required on PE and P
              routers to add or remove a customer site (or a customer from a
              multicast session)</t>

              <t>the number of multicast IP addresses used (if IP multicast in
              ASM mode is proposed as a multicast distribution tunnel)</t>

              <t>other particular elements inherent to each solution that
              impact scalability (e.g., if a solution uses some distribution
              tree inside the core, topology of the tree and number of leaf
              nodes may be some of them)</t>
            </list></t>

          <t>It is expected that the applicability of each solution will be
          evaluated with regards to the aforementioned scalability
          criteria.</t>

          <t>These considerations naturally lead us to believe that proposed
          solutions SHOULD offer the possibility of sharing such resources
          between different multicast streams (between different VPNs, between
          different multicast streams of the same or of different VPNs). This
          means, for instance, if MDTunnels are trees, being able to share an
          MDTunnel between several customers.</t>

          <t>Those scalability issues are expected to be more significant on P
          routers, but a multicast VPN solution SHOULD address both P and PE
          routers as far as scalability is concerned.</t>
        </section>

        <section title="Resource Optimization" toc="default">
          <section title="General Goals" toc="default">
            <t>One of the aims of the use of multicast instead of unicast is
            resource optimization in the network.</t>

            <t>The two obvious suboptimal behaviors that a multicast VPN
            solution would want to avoid are needless duplication (when the
            same data travels twice or more on a link, e.g., when doing
            ingress PE replication) and needless reception (e.g., a PE
            receiving traffic that it does not need because there are no
            downstream receivers).</t>
          </section>

          <section title="Trade-off and Tuning" toc="default">
            <t>As previously stated in this document, designing a scalable
            solution that makes an optimal use of resources is considered
            difficult. Thus, what is expected from a multicast VPN solution is
            that it addresses the resource optimization issue while taking
            into account the fact that some trade-off has to be made.</t>

            <t>Moreover, it seems that a "one size fits all" trade-off
            probably does not exist either. Thus, a multicast VPN solution
            SHOULD offer service providers appropriate configuration settings
            that let them tune the trade-off according to their particular
            constraints (network topology, platforms, customer applications,
            level of service offered etc.).</t>

            <t>As an illustration, here are some example bounds of the
            trade-off space:<list style="hanging">

          <?rfc needLines="8"?>
                <t hangText="Bandwidth optimization:">setting up optimized
                core MDTunnels whose topology (PIM or P2MP LSP trees, etc.)
                precisely follows a customer's multicast routing changes. This
                requires managing a large amount of state in the core, and
                also quick reactions of the core to customer multicast routing
                changes. This approach can be advantageous in terms of
                bandwidth, but it is poor in terms of state management.</t>

                <t hangText="State optimization:">setting up MDTunnels that
                aggregate multiple customer multicast streams (all or some of
                them, across different VPNs or not). This will have better
                scalability properties, but at the expense of bandwidth since
                some MDTunnel leaves will very likely receive traffic they
                don't need, and because increased constraints will make it
                harder to find optimal MDTunnels.</t>
              </list></t>
          </section>

          <section anchor="TE" title="Traffic Engineering" toc="default">
            <t>If the VPN service provides traffic engineering (TE) features
            for the connection used between PEs for unicast traffic in the VPN
            service, the solution SHOULD provide equivalent features for
            multicast traffic.</t>

            <t>A solution SHOULD offer means to support key TE objectives as
            defined in <xref format="default" pageno="false"
            target="RFC3272"></xref>, for the multicast service.</t>

            <t>A solution MAY also usefully support means to address
            multicast-specific traffic engineering issues: it is known that
            bandwidth resource optimization in the point-to-multipoint case is
            an NP-hard problem, and that techniques used for unicast TE may
            not be applicable to multicast traffic.</t>

            <t>Also, it has been identified that managing the trade-off
            between resource usage and scalability may incur uselessly sending
            traffic to some PEs participating in a multicast VPN. For this
            reason, a multicast VPN solution MAY permit that the
            bandwidth/state tuning take into account the relative cost or
            availability of bandwidth toward each PE.</t>
          </section>
        </section>

        <section anchor="tunneling" title="Tunneling Requirements"
                 toc="default">
          <section title="Tunneling Technologies" toc="default">
            <t>Following the principle of separation between the control plane
            and the forwarding plane, a multicast VPN solution SHOULD be
            designed so that control and forwarding planes are not
            interdependent: the control plane SHALL NOT depend on which
            forwarding plane is used (and vice versa), and the choice of
            forwarding plane SHOULD NOT be limited</t> 

          <?rfc needLines="8"?>

<t>by the design of the
            solution. Also, the solution SHOULD NOT be tied to a specific
            tunneling technology.</t>

            <t>In a multicast VPN solution extending a unicast L3 PPVPN
            solution, consistency in the tunneling technology has to be
            favored: such a solution SHOULD allow the use of the same
            tunneling technology for multicast as for unicast. Deployment
            consistency, ease of operation, and potential migrations are the
            main motivations behind this requirement.</t>

            <t>For MDTunnels, a solution SHOULD be able to use a range of
            tunneling technologies, including point-to-point and
            point-to-multipoint, such as: <list style="symbols">
                 

                <t><xref target="RFC2784">Generic Routing Encapsulation
                (GRE)</xref> (including GRE in multicast IP trees),</t>

                 

                <t><xref target="RFC3031">MPLS</xref> (including P2P or MP2P
                tunnels, and multipoint tunnels signaled with <xref
                target="P2MP-RSVP-TE">MPLS P2MP extensions to the Resource
                Reservation Protocol (RSVP)</xref> or Label Distribution
                Protocol (LDP) <xref target="P2MP-LDP-REQS" /> <xref
                target="P2MP-LDP" />),</t>

                 

                <t>Layer-2 Tunneling Protocol (L2TP) (including <xref
                target="RFC4045">L2TP for multicast</xref>),</t>

                 

                <t>
                  <xref target="RFC4031">IPsec</xref>
                </t>

                 , 

                <t><xref target="RFC2003">IP-in-IP</xref>, etc.</t>

                 
              </list></t>

            <t>Naturally, it is RECOMMENDED that a solution is built so that
            it can leverage the point-to-multipoint variants of these
            techniques. These variants allow for packet replications to happen
            along a tree in the provider core network, and they may help
            improve bandwidth efficiency in a multicast VPN context.</t>
          </section>

          <section title="MTU and Fragmentation" toc="default">
            <t>A solution SHOULD support a method that provides the minimum
            MTU of the MDTunnel (e.g., to discover MTU, to communicate MTU via
            signaling, etc.) so that:</t>

            <t><list style="symbols">
                <t>fragmentation inside the MDTunnel does not happen, even
                when allowed by the underlying tunneling technology</t>

                <t>proper troubleshooting can be performed if packets that are
                too big for the MDTunnel happen to be encapsulated in the
                MDTunnel</t>
              </list></t>
          </section>
        </section>

        <section anchor="isp-control-mechanisms" title="Control Mechanisms"
                 toc="default">
          <t>The solution MUST provide some mechanisms to control the sources
          within a VPN. This control includes the number of sources that are
          entitled to send traffic on the VPN, and/or the total bit rate of
          all the sources.</t>

          <t>At the reception level, the solution MUST also provide mechanisms
          to control the number of multicast groups or channels VPN users are
          entitled to subscribe to and/or the total bit rate represented by
          the corresponding multicast traffic.</t>

          <t>All these mechanisms MUST be configurable by the service provider
          in order to control the amount of multicast traffic and state within
          a VPN.</t>

          <t>Moreover, it MAY be desirable to be able to impose some bound on
          the quantity of state used by a VPN in the core network for its
          multicast traffic, whether on each P or PE router, or globally. The
          motivation is that it may be needed to avoid out-of-resources
          situations (e.g., out of memory to maintain PIM state if IP
          multicast is used in the core for multicast VPN traffic, or out of
          memory to maintain RSVP state if MPLS P2MP is used, etc.).</t>
        </section>

        <section title="Support of Inter-AS, Inter-Provider Deployments"
                 toc="default">
          <t>A solution MUST support inter-AS (Autonomous System) multicast
          VPNs, and SHOULD support inter-provider multicast VPNs.
          Considerations about coexistence with unicast inter-AS VPN Options
          A, B, and C (as described in Section 10 of <xref format="default"
          pageno="false" target="RFC4364"></xref>) are strongly
          encouraged.</t>

          <t>A multicast VPN solution SHOULD provide inter-AS mechanisms
          requiring the least possible coordination between providers, and
          keep the need for detailed knowledge of providers' networks to a
          minimum -- all this being in comparison with corresponding unicast
          VPN options.<list style="symbols">
              <t>Within each service provider, the service provider SHOULD be
              able on its own to pick the most appropriate tunneling mechanism
              to carry (multicast) traffic among PEs (just like what is done
              today for unicast)</t>

              <t>If a solution does require a single tunnel to span P routers
              in multiple ASs, the solution SHOULD provide mechanisms to
              ensure that the inter-provider coordination to set up such a
              tunnel is minimized</t>
            </list></t>

          <?rfc needLines="8"?>
          <t>Moreover, such support SHOULD be possible without compromising
          other requirements expressed in this requirement document, and SHALL
          NOT incur penalties on scalability and bandwidth-related
          efficiency.</t>
        </section>

        <section title="Quality-of-Service Differentiation" toc="default">
          <t>A multicast VPN solution SHOULD give a VPN service provider the
          ability to offer, guarantee and enforce differentiated levels of QoS
          for its different customers.</t>
        </section>

        <section anchor="isp-sec" title="Infrastructure security"
                 toc="default">
          <t>The solution SHOULD provide the same level of security for the
          service provider as what currently exists for unicast VPNs (for
          instance, as developed in the Security sections of <xref
          format="default" pageno="false" target="RFC4364"></xref> and <xref
          format="default" pageno="false" target="VRs"></xref>). For instance,
          traffic segregation and intrinsic protection against DoS (Denial of
          Service) and DDoS (Distributed Denial of Service) attacks of the
          BGP/MPLS VPN solution must be supported by the multicast
          solution.</t>

          <t>Moreover, since multicast traffic and routing are intrinsically
          dynamic (receiver-initiated), some mechanism SHOULD be proposed so
          that the frequency of changes in the way client traffic is carried
          over the core can be bounded and not tightly coupled to dynamic
          changes of multicast traffic in the customer network. For example,
          multicast route dampening functions would be one possible
          mechanism.</t>

          <t>Network devices that participate in the deployment and the
          maintenance of a given L3VPN MAY represent a superset of the
          participating devices that are also involved in the establishment
          and maintenance of the multicast distribution tunnels. As such, the
          activation of IP multicast capabilities within a VPN SHOULD be
          device-specific, not only to make sure that only the relevant
          devices will be multicast-enabled, but also to make sure that
          multicast (routing) information will be disseminated to the
          multicast-enabled devices only, hence limiting the risk of
          multicast-inferred DOS attacks.</t>

          <t>Traffic of a multicast channel for which there are no members in
          a given multicast VPN MUST NOT be propagated within the multicast
          VPN, most particularly if the traffic comes from another VPN or from
          the Internet.</t>

          <t>Security considerations are particularly important for inter-AS
          and inter-provider deployments. In such cases, it is RECOMMENDED
          that a multicast VPN solution support means to ensure the integrity
          and authenticity of multicast-related exchanges across inter-AS or
          inter-provider borders. It is RECOMMENDED that corresponding
          procedures require the least possible coordination between
          providers; more precisely, when specific configurations or
          cryptographic keys have to be deployed, this shall be limited to
          ASBRs (Autonomous System Border Routers) or a subset of them, and
          optionally BGP Route Reflectors (or a subset of them).</t>

          <t>Lastly, control mechanisms described in <xref format="default"
          pageno="false" target="isp-control-mechanisms"></xref> are also to
          be considered from this infrastructure security point of view.</t>
        </section>

        <section title="Robustness" toc="default">
          <t>Resiliency is also crucial to infrastructure security; thus, a
          multicast VPN solution SHOULD either avoid single points of failures
          or propose some technical solution making it possible to implement a
          fail-over mechanism.</t>

          <?rfc needLines="5"?>

          <t>As an illustration, one can consider the case of a solution that
          would use PIM-SM as a means to set up MDTunnels. In such a case, the
          PIM RP might be a single point of failure. Such a solution SHOULD be
          compatible with a solution implementing RP resiliency, such as <xref
          format="default" pageno="false" target="RFC4610">anycast-RP</xref>
          or <xref format="default" pageno="false"
          target="PIM-BSR">BSR</xref>.</t>
        </section>

        <section title="Operation, Administration, and Maintenance"
                 toc="default">
          <t>The operation of a multicast VPN solution SHALL be as light as
          possible, and providing automatic configuration and discovery SHOULD
          be a priority when designing a multicast VPN solution. Particularly,
          the operational burden of setting up multicast on a PE or for a
          VR/VRF SHOULD be as low as possible.</t>

          <t>Also, as far as possible, the design of a solution SHOULD
          carefully consider the number of protocols within the core network:
          if any additional protocols are introduced compared with the unicast
          VPN service, the balance between their advantage and operational
          burden SHOULD be examined thoroughly.</t>

          <t>Moreover, monitoring of multicast-specific parameters and
          statistics SHOULD be offered to the service provider, following the
          requirements expressed in <xref format="default" pageno="false"
          target="RFC4176"></xref>.</t>

          <t>Most notably, the provider SHOULD have access to:<list
              style="symbols">
              <t>Multicast traffic statistics (incoming/outgoing/dropped/total
              traffic conveyed, by period of time)</t>

              <t>Information about client multicast resource usage (multicast
              routing state and bandwidth usage)</t>

              <t>Alarms when limits are reached on such resources</t>

              <t>The IPPM (<xref format="default" pageno="false"
              target="RFC2330">IP Performance Metrics</xref>)-related
              information that is relevant to the multicast traffic usage:
              such information includes the one-way packet delay, the
              inter-packet delay variation, etc.</t>

              <t>Statistics on decisions related to how client traffic is
              carried on distribution tunnels (e.g., "traffic switched onto a
              multicast tree dedicated to such groups or channels")</t>

              <t>Statistics on parameters that could help the provider to
              evaluate its optimality/state trade-off</t>
            </list></t>

          <t>This information SHOULD be made available through standardized
          <xref format="default" pageno="false" target="RFC2578">SMIv2</xref>
          Management Information Base (MIB) modules to be used with <xref
          format="default" pageno="false" target="RFC3411">SNMP</xref>, or
          through <xref format="default" pageno="false"
          target="IPFIX-PROT">IPFIX </xref>. For instance, in the context of
          BGP/MPLS VPNs <xref format="default" pageno="false"
          target="RFC4364"></xref>, multicast extensions to MIBs defined in
          <xref format="default" pageno="false" target="RFC4382"></xref>
          SHOULD be proposed, with proper integration with <xref
          format="default" pageno="false" target="RFC3811"></xref>, <xref
          format="default" pageno="false" target="RFC3812"></xref>, <xref
          format="default" pageno="false" target="RFC3813"></xref>, and <xref
          format="default" pageno="false" target="RFC3814"></xref> when
          applicable.</t>

          <t>Mechanisms similar to those described in <xref format="default"
          pageno="false" target="troubleshooting"></xref> SHOULD also exist
          for proactive monitoring of the MDTunnels.</t>

          <t>Proposed OAM mechanisms and procedures for multicast VPNs SHOULD
          be scalable with respect to the parameters mentioned in <xref
          format="default" pageno="false" target="scalability"></xref>. In
          particular, it is RECOMMENDED that particular attention is given to
          the impact of monitoring mechanisms on performances and QoS.</t>

          <t>Moreover, it is RECOMMENDED that any OAM mechanism designed to
          trigger alarms in relation to performance or resource usage metrics
          integrate the ability to limit the rate at which such alarms are
          generated (e.g., some form of a hysteresis mechanism based on
          low/high thresholds defined for the metrics).</t>
        </section>

        <section title="Compatibility and Migration Issues" toc="default">
          <t>It is a requirement that unicast and multicast services MUST be
          able to coexist within the same VPN.</t>

          <t>Likewise, a multicast VPN solution SHOULD be designed so that its
          activation in devices that participate in the deployment and
          maintenance of a multicast VPN SHOULD be as smooth as possible,
          i.e., without affecting the overall quality of the services that are
          already supported by the underlying infrastructure.</t>

          <t>A multicast VPN solution SHOULD prevent compatibility and
          migration issues, for instance, by focusing on providing mechanisms
          facilitating forward compatibility. Most notably, a solution
          supporting only a subset of the requirements expressed in this
          document SHOULD be designed to allow compatibility to be introduced
          in further revisions.</t>

          <t>It SHOULD be an aim of any multicast VPN solution to offer as
          much backward compatibility as possible. Ideally, a solution would
          have the ability to offer multicast VPN services across a network
          containing some legacy routers that do not support any multicast
          VPN-specific features.</t>

          <t>In any case, a solution SHOULD state a migration policy from
          possibly existing deployments.</t>
        </section>

        <section anchor="troubleshooting" title="Troubleshooting"
                 toc="default">
          <t>A multicast VPN solution that dynamically adapts the way some
          client multicast traffic is carried over the provider's network may
          incur the disadvantage of being hard to troubleshoot. In such a
          case, to help diagnose multicast network issues, a multicast VPN
          solution SHOULD provide monitoring information describing how client
          traffic is carried over the network (e.g., if a solution uses
          multicast-based MDTunnels, which provider multicast group is used
          for a given client multicast stream). A solution MAY also provide
          configuration options to avoid any dynamic changes, for multicast
          traffic of a particular VPN or a particular multicast stream.</t>

          <t>Moreover, a solution MAY provide mechanisms that allow network
          operators to check that all VPN sites that advertised interest in a
          particular customer multicast stream are properly associated with
          the corresponding MDTunnel. Providing operators with means to check
          the proper setup and operation of MDTunnels MAY also be provided
          (e.g., when P2MP MPLS is used for MDTunnels, troubleshooting
          functionalities SHOULD integrate mechanisms compliant with <xref
          format="default" pageno="false" target="RFC4687"></xref>, such as
          LSP Ping <xref format="default" pageno="false"
          target="RFC4379"></xref><xref format="default" pageno="false"
          target="LSP-PING"></xref>). Depending on the implementation, such
          verification could be initiated by a source-PE or a receiver-PE.</t>
        </section>
      </section>
    </section>

    <?rfc needLines="8"?>

    <section title="Security Considerations" toc="default">
      <t>This document does not by itself raise any particular security
      issue.</t>

      <t>A set of security issues has been identified that MUST be addressed
      when considering the design and deployment of multicast-enabled L3
      PPVPNs. Such issues have been described in <xref format="default"
      pageno="false" target="customer-sec"></xref> and <xref format="default"
      pageno="false" target="isp-sec"></xref>.</t>
    </section>

    <?rfc needLines="10"?>

    <section title="Contributors" toc="default">
      <t>The main contributors to this document are listed below, in
      alphabetical order:<list style="symbols">
          <t>Christian Jacquenet<vspace blankLines="0" />France Telecom<vspace
          blankLines="0" />3, avenue Francois Chateau<vspace
          blankLines="0" />CS 36901 35069 RENNES Cedex, France<vspace
          blankLines="0" />Email: christian.jacquenet@orange-ftgroup.com</t>

          <t>Yuji Kamite<vspace blankLines="0" />NTT Communications
          Corporation<vspace blankLines="0" />Tokyo Opera City Tower 3-20-2
          Nishi Shinjuku, Shinjuku-ku<vspace blankLines="0" />Tokyo 163-1421,
          Japan<vspace blankLines="0" />Email: y.kamite@ntt.com</t>

          <t>Jean-Louis Le Roux<vspace blankLines="0" />France Telecom R&amp;D
          <vspace blankLines="0" />2, avenue Pierre-Marzin<vspace
          blankLines="0" />22307 Lannion Cedex, France<vspace
          blankLines="0" />Email: jeanlouis.leroux@orange-ftgroup.com</t>

          <t>Nicolai Leymann<vspace blankLines="0" />Deutsch Telecom<vspace
          blankLines="0" />Engineering Networks, Products &amp;
          Services<vspace blankLines="0" />Goslarer Ufer 3510589 Berlin,
          Germany<vspace blankLines="0" />Email:
          nicolai.leymann@t-systems.com</t>

          <t>Renaud Moignard<vspace blankLines="0" />France Telecom R&amp;D
          <vspace blankLines="0" />2, avenue Pierre-Marzin<vspace
          blankLines="0" />22307 Lannion Cedex, France<vspace
          blankLines="0" />Email: renaud.moignard@orange-ftgroup.com</t>

          <t>Thomas Morin<vspace blankLines="0" />France Telecom R&amp;D
          <vspace blankLines="0" />2, avenue Pierre-Marzin<vspace
          blankLines="0" />22307 Lannion Cedex, France<vspace
          blankLines="0" />Email: thomas.morin@orange-ftgroup.com</t>
        </list></t>
    </section>

    <section title="Acknowledgments" toc="default">
      <t>The authors would like to thank, in rough chronological order,
      Vincent Parfait, Zubair Ahmad, Elodie Hemon-Larreur, Sebastien Loye,
      Rahul Aggarwal, Hitoshi Fukuda, Luyuan Fang, Adrian Farrel, Daniel King,
      Yiqun Cai, Ronald Bonica, Len Nieman, Satoru Matsushima, Netzahualcoyotl
      Ornelas, Yakov Rekhter, Marshall Eubanks, Pekka Savola, Benjamin
      Niven-Jenkins, and Thomas Nadeau, for their review, valuable input, and
      feedback.</t>

      <t>We also thank the people who kindly answered the survey, and Daniel
      King, who took care of gathering and anonymizing its results.</t>
    </section>
  </middle>

  <back>
<?rfc needLines="10"?>
    <references title="Normative References">
      <!-- Begin inclusion reference.RFC.2119.xml. -->

      <reference anchor="RFC2119">
        <front>
          <title abbrev="RFC Key Words">Key words for use in RFCs to Indicate
          Requirement Levels</title>

          <author fullname="Scott Bradner" initials="S." surname="Bradner">
            <organization>Harvard University</organization>

            <address>
              <postal>
                <street>1350 Mass. Ave.</street>

                <street>Cambridge</street>

                <street>MA 02138</street>
              </postal>

              <phone>- +1 617 495 3864</phone>

              <email>sob@harvard.edu</email>
            </address>
          </author>

          <date month="March" year="1997" />

          <area>General</area>

          <keyword>keyword</keyword>

          <abstract>
            <t>In many standards track documents several words are used to
            signify the requirements in the specification. These words are
            often capitalized. This document defines these words as they
            should be interpreted in IETF documents. Authors who follow these
            guidelines should incorporate this phrase near the beginning of
            their document: <list>
                <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
                "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
                "OPTIONAL" in this document are to be interpreted as described
                in RFC 2119.</t>
              </list></t>

            <t>Note that the force of these words is modified by the
            requirement level of the document in which they are used.</t>
          </abstract>
        </front>

        <seriesInfo name="BCP" value="14" />

        <seriesInfo name="RFC" value="2119" />

        <format octets="4723" target="ftp://ftp.isi.edu/in-notes/rfc2119.txt"
                type="TXT" />

        <format octets="16553"
                target="http://xml.resource.org/public/rfc/html/rfc2119.html"
                type="HTML" />

        <format octets="5703"
                target="http://xml.resource.org/public/rfc/xml/rfc2119.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2119.xml. -->

      <!-- Begin inclusion reference.RFC.4031.xml. -->

      <reference anchor="RFC4031">
        <front>
          <title>Service Requirements for Layer 3 Provider-Provisioned Virtual
          Private Networks (PPVPNs)</title>

          <author fullname="M. Carugi" initials="M." surname="Carugi">
            <organization></organization>
          </author>

          <author fullname="D. McDysan" initials="D." surname="McDysan">
            <organization></organization>
          </author>

          <date month="April" year="2005" />

          <abstract>
            <t>&lt;p&gt;This document provides requirements for Layer 3
            Virtual Private Networks (L3VPNs). It identifies requirements
            applicable to a number of individual approaches that a Service
            Provider may use to provision a Virtual Private Network (VPN)
            service. This document expresses a service provider perspective,
            based upon past experience with IP-based service offerings and the
            ever-evolving needs of the customers of such services. Toward this
            end, it first defines terminology and states general requirements.
            Detailed requirements are expressed from a customer perspective as
            well as that of a service provider. This memo provides information
            for the Internet community.&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4031" />

        <format octets="118568"
                target="ftp://ftp.isi.edu/in-notes/rfc4031.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4031.xml. -->

      <!-- Begin inclusion reference.RFC.4026.xml. -->

      <reference anchor="RFC4026">
        <front>
          <title>Provider-Provisioned Virtual Private Network (VPN)
          Terminology</title>

          <author fullname="L. Andersson" initials="L." surname="Andersson">
            <organization></organization>
          </author>

          <author fullname="T. Madsen" initials="T." surname="Madsen">
            <organization></organization>
          </author>

          <date month="March" year="2005" />

          <abstract>
            <t>&lt;p&gt;The widespread interest in provider-provisioned
            Virtual Private Network (VPN) solutions lead to memos proposing
            different and overlapping solutions. The IETF working groups
            (first Provider-Provisioned VPNs and later Layer 2 VPNs and Layer
            3 VPNs) have discussed these proposals and documented
            specifications. This has lead to the development of a partially
            new set of concepts used to describe the set of VPN services.
            &lt;/p&gt;&lt;p&gt; To a certain extent, more than one term covers
            the same concept, and sometimes the same term covers more than one
            concept. This document seeks to make the terminology in the area
            clearer and more intuitive. This memo provides information for the
            Internet community. &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4026" />

        <format octets="42124" target="ftp://ftp.isi.edu/in-notes/rfc4026.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4026.xml. -->

      <!-- Begin inclusion reference.RFC.4601.xml. -->

      <?rfc needLines="4"?>

      <reference anchor="RFC4601">
        <front>
          <title>Protocol Independent Multicast - Sparse Mode (PIM-SM):
          Protocol Specification (Revised)</title>

          <author fullname="B. Fenner" initials="B." surname="Fenner">
            <organization></organization>
          </author>

          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization></organization>
          </author>

          <author fullname="H. Holbrook" initials="H." surname="Holbrook">
            <organization></organization>
          </author>

          <author fullname="I. Kouvelas" initials="I." surname="Kouvelas">
            <organization></organization>
          </author>

          <date month="August" year="2006" />

          <abstract>
            <t>&lt;p&gt;This document specifies Protocol Independent Multicast
            - Sparse Mode (PIM-SM). PIM-SM is a multicast routing protocol
            that can use the underlying unicast routing information base or a
            separate multicast-capable routing information base. It builds
            unidirectional shared trees rooted at a Rendezvous Point (RP) per
            group, and optionally creates shortest-path trees per
            source.&lt;/p&gt;&lt;p&gt; This document obsoletes RFC 2362, an
            Experimental version of PIM-SM. [STANDARDS TRACK]&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4601" />

        <format octets="340632"
                target="ftp://ftp.isi.edu/in-notes/rfc4601.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4601.xml. -->

      <!-- Begin inclusion reference.RFC.4607.xml. -->

      <reference anchor="RFC4607">
        <front>
          <title>Source-Specific Multicast for IP</title>

          <author fullname="H. Holbrook" initials="H." surname="Holbrook">
            <organization></organization>
          </author>

          <author fullname="B. Cain" initials="B." surname="Cain">
            <organization></organization>
          </author>

          <date month="August" year="2006" />

          <abstract>
            <t>&lt;p&gt;IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0
            to 232.255.255.255) range are designated as source-specific
            multicast (SSM) destination addresses and are reserved for use by
            source-specific applications and protocols. For IP version 6
            (IPv6), the address prefix FF3x::/32 is reserved for
            source-specific multicast use. This document defines an extension
            to the Internet network service that applies to datagrams sent to
            SSM addresses and defines the host and router requirements to
            support this extension. [STANDARDS TRACK]&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4607" />

        <format octets="42990" target="ftp://ftp.isi.edu/in-notes/rfc4607.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4607.xml. -->

      <!-- Begin inclusion reference.RFC.3376.xml. -->

      <reference anchor="RFC3376">
        <front>
          <title>Internet Group Management Protocol, Version 3</title>

          <author fullname="B. Cain" initials="B." surname="Cain">
            <organization></organization>
          </author>

          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization></organization>
          </author>

          <author fullname="I. Kouvelas" initials="I." surname="Kouvelas">
            <organization></organization>
          </author>

          <author fullname="B. Fenner" initials="B." surname="Fenner">
            <organization></organization>
          </author>

          <author fullname="A. Thyagarajan" initials="A."
                  surname="Thyagarajan">
            <organization></organization>
          </author>

          <date month="October" year="2002" />
        </front>

        <seriesInfo name="RFC" value="3376" />

        <format octets="119726"
                target="ftp://ftp.isi.edu/in-notes/rfc3376.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3376.xml. -->

      <!-- Begin inclusion reference.RFC.3810.xml. -->

      <reference anchor="RFC3810">
        <front>
          <title>Multicast Listener Discovery Version 2 (MLDv2) for
          IPv6</title>

          <author fullname="R. Vida" initials="R." surname="Vida">
            <organization></organization>
          </author>

          <author fullname="L. Costa" initials="L." surname="Costa">
            <organization></organization>
          </author>

          <date month="June" year="2004" />

          <abstract>
            <t>&lt;p&gt;This document updates RFC 2710, and it specifies
            Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD
            is used by an IPv6 router to discover the presence of multicast
            listeners on directly attached links, and to discover which
            multicast addresses are of interest to those neighboring nodes.
            MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the
            ability for a node to report interest in listening to packets with
            a particular multicast address only from specific source addresses
            or from all sources except for specific source addresses.
            [STANDARDS TRACK] &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3810" />

        <format octets="153579"
                target="ftp://ftp.isi.edu/in-notes/rfc3810.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3810.xml. -->

      <!-- Begin inclusion reference.RFC.4176.xml. -->

      <reference anchor="RFC4176">
        <front>
          <title>Framework for Layer 3 Virtual Private Networks (L3VPN)
          Operations and Management</title>

          <author fullname="Y. El Mghazli" initials="Y." surname="El Mghazli">
            <organization></organization>
          </author>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <author fullname="M. Boucadair" initials="M." surname="Boucadair">
            <organization></organization>
          </author>

          <author fullname="K. Chan" initials="K." surname="Chan">
            <organization></organization>
          </author>

          <author fullname="A. Gonguet" initials="A." surname="Gonguet">
            <organization></organization>
          </author>

          <date month="October" year="2005" />

          <abstract>
            <t>&lt;p&gt;This document provides a framework for the operation
            and management of Layer 3 Virtual Private Networks (L3VPNs). This
            framework intends to produce a coherent description of the
            significant technical issues that are important in the design of
            L3VPN management solutions. The selection of specific approaches,
            and making choices among information models and protocols are
            outside the scope of this document. This memo provides information
            for the Internet community.&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4176" />

        <format octets="46348" target="ftp://ftp.isi.edu/in-notes/rfc4176.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4176.xml. -->

      <!-- Begin inclusion reference.RFC.3973.xml. -->

      <reference anchor="RFC3973">
        <front>
          <title>Protocol Independent Multicast - Dense Mode (PIM-DM):
          Protocol Specification (Revised)</title>

          <author fullname="A. Adams" initials="A." surname="Adams">
            <organization></organization>
          </author>

          <author fullname="J. Nicholas" initials="J." surname="Nicholas">
            <organization></organization>
          </author>

          <author fullname="W. Siadak" initials="W." surname="Siadak">
            <organization></organization>
          </author>

          <date month="January" year="2005" />

          <abstract>
            <t>&lt;p&gt;This document specifies Protocol Independent Multicast
            - Dense Mode (PIM-DM). PIM-DM is a multicast routing protocol that
            uses the underlying unicast routing information base to flood
            multicast datagrams to all multicast routers. Prune messages are
            used to prevent future messages from propagating to routers
            without group membership information. This memo defines an
            Experimental Protocol for the Internet community. &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3973" />

        <format octets="136708"
                target="ftp://ftp.isi.edu/in-notes/rfc3973.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3973.xml. -->
    </references>

    <references title="Informative References">
      <!-- Begin inclusion reference.RFC.4364.xml. -->

      <reference anchor="RFC4364">
        <front>
          <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>

          <author fullname="E. Rosen" initials="E." surname="Rosen">
            <organization></organization>
          </author>

          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization></organization>
          </author>

          <date month="February" year="2006" />

          <abstract>
            <t>&lt;p&gt;This document describes a method by which a Service
            Provider may use an IP backbone to provide IP Virtual Private
            Networks (VPNs) for its customers. This method uses a "peer
            model", in which the customers' edge routers (CE routers) send
            their routes to the Service Provider's edge routers (PE routers);
            there is no "overlay" visible to the customer's routing algorithm,
            and CE routers at different sites do not peer with each other.
            Data packets are tunneled through the backbone, so that the core
            routers do not need to know the VPN routes. [STANDARDS
            TRACK]&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4364" />

        <format octets="116446"
                target="ftp://ftp.isi.edu/in-notes/rfc4364.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4364.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-l3vpn-vpn-vr.xml. -->

      <reference anchor="VRs">
        <front>
          <title>Network based IP VPN Architecture Using Virtual
          Routers</title>

          <author fullname="Hamid Ould-Brahim" initials="H"
                  surname="Ould-Brahim">
            <organization></organization>
          </author>

          <date day="6" month="March" year="2006" />

          <abstract>
            <t>This document describes a network-based Virtual Private Network
            (VPN) architecture using the virtual router (VR) concept. Multiple
            VRs can exist in a single physical device. A VR emulates all the
            functionality of a physical router, and therefore inherits all
            existing mechanisms and tools for configuration, operation,
            accounting, and maintenance. Any routing protocol can be used to
            distribute VPN reachability information among VRs, and no VPN-
            related modifications or extensions are needed to the routing
            protocol for achieving VPN reachability. Direct VR-to-VR
            connectivity may be configured through layer-2 links or through
            IP- or MPLS-based tunnels. Traffic from VRs belonging to different
            VPNs may be aggregated over a "backbone VR" network, which greatly
            simplifies VPN provisioning. This architecture accommodates
            various backbone deployment scenarios, both where the VPN service
            provider owns the backbone, and where the VPN service provider
            obtains backbone service from one or more other service
            providers.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-l3vpn-vpn-vr-03.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-l3vpn-vpn-vr.xml. -->

      <!-- Begin inclusion reference.RFC.2432.xml. -->

      <reference anchor="RFC2432">
        <front>
          <title>Terminology for IP Multicast Benchmarking</title>

          <author fullname="Kevin Dubray" initials="K." surname="Dubray">
            <organization>IronBridge Networks</organization>

            <address>
              <postal>
                <street>55 Hayden Avenue</street>

                <street>Lexington</street>

                <street>MA 02421</street>

                <country>USA</country>
              </postal>

              <phone>781 372 8118</phone>

              <email>kdubray@ironbridgenetworks.com</email>
            </address>
          </author>

          <date month="October" year="1998" />

          <area>Internet</area>

          <keyword>multicast</keyword>

          <abstract>
            <t>The purpose of this document is to define terminology specific
            to the benchmarking of multicast IP forwarding devices. It builds
            upon the tenets set forth in RFC 1242, RFC 2285, and other IETF
            Benchmarking Methodology Working Group (BMWG) efforts. This
            document seeks to extend these efforts to the multicast
            paradigm.</t>

            <t>The BMWG produces two major classes of documents: Benchmarking
            Terminology documents and Benchmarking Methodology documents. The
            Terminology documents present the benchmarks and other related
            terms. The Methodology documents define the procedures required to
            collect the benchmarks cited in the corresponding Terminology
            documents.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="2432" />

        <format octets="29758" target="ftp://ftp.isi.edu/in-notes/rfc2432.txt"
                type="TXT" />

        <format octets="46401"
                target="http://xml.resource.org/public/rfc/html/rfc2432.html"
                type="HTML" />

        <format octets="32970"
                target="http://xml.resource.org/public/rfc/xml/rfc2432.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2432.xml. -->

      <!-- Begin inclusion reference.RFC.3031.xml. -->

      <reference anchor="RFC3031">
        <front>
          <title>Multiprotocol Label Switching Architecture</title>

          <author fullname="E. Rosen" initials="E." surname="Rosen">
            <organization></organization>
          </author>

          <author fullname="A. Viswanathan" initials="A."
                  surname="Viswanathan">
            <organization></organization>
          </author>

          <author fullname="R. Callon" initials="R." surname="Callon">
            <organization></organization>
          </author>

          <date month="January" year="2001" />

          <abstract>
            <t>&lt;p&gt;This document specifies the architecture for
            Multiprotocol Label Switching (MPLS). [STANDARDS TRACK]
            &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3031" />

        <format octets="147175"
                target="ftp://ftp.isi.edu/in-notes/rfc3031.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3031.xml. -->

      <!-- Begin inclusion reference.RFC.1112.xml. -->

      <reference anchor="RFC1112">
        <front>
          <title>Host extensions for IP multicasting</title>

          <author fullname="Steve Deering" initials="S." surname="Deering">
            <organization>Stanford University, Computer Science
            Department</organization>

            <address>
              <postal>
                <street></street>

                <city>Stanford</city>

                <region>CA</region>

                <code>94305-2140</code>

                <country>US</country>
              </postal>

              <phone>+1 415 723 9427</phone>

              <email>deering@PESCADERO.STANFORD.EDU</email>
            </address>
          </author>

          <date day="1" month="August" year="1989" />
        </front>

        <seriesInfo name="STD" value="5" />

        <seriesInfo name="RFC" value="1112" />

        <format octets="39904" target="ftp://ftp.isi.edu/in-notes/rfc1112.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.1112.xml. -->

      <!-- Begin inclusion reference.RFC.2236.xml. -->

      <reference anchor="RFC2236">
        <front>
          <title abbrev="Internet Group Management Protocol">Internet Group
          Management Protocol, Version 2</title>

          <author fullname="William C. Fenner" initials="W.C."
                  surname="Fenner">
            <organization>Xerox PARC</organization>

            <address>
              <postal>
                <street>3333 Coyote Hill Road</street>

                <street>Palo Alto</street>

                <street>CA 94304</street>
              </postal>

              <phone>+1 650 812 4816</phone>

              <email>fenner@parc.xerox.com</email>
            </address>
          </author>

          <date month="November" year="1997" />

          <area>Internet</area>

          <keyword>internet group multicast protocol</keyword>

          <keyword>multicast</keyword>

          <keyword>routing</keyword>

          <abstract>
            <t>This memo documents IGMPv2, used by IP hosts to report their
            multicast group memberships to routers. It updates STD 5, RFC
            1112.</t>

            <t>IGMPv2 allows group membership termination to be quickly
            reported to the routing protocol, which is important for
            high-bandwidth multicast groups and/or subnets with highly
            volatile group membership.</t>

            <t>This document is a product of the Inter-Domain Multicast
            Routing working group within the Internet Engineering Task Force.
            Comments are solicited and should be addressed to the working
            group's mailing list at idmr@cs.ucl.ac.uk and/or the
            author(s).</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="2236" />

        <format octets="51048" target="ftp://ftp.isi.edu/in-notes/rfc2236.txt"
                type="TXT" />

        <format octets="65437"
                target="http://xml.resource.org/public/rfc/html/rfc2236.html"
                type="HTML" />

        <format octets="50863"
                target="http://xml.resource.org/public/rfc/xml/rfc2236.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2236.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-mpls-rsvp-te-p2mp.xml. -->

      <reference anchor="P2MP-RSVP-TE">
        <front>
          <title>Extensions to RSVP-TE for Point-to-Multipoint TE LSPs</title>

          <author fullname="Rahul Aggarwal" initials="R" surname="Aggarwal">
            <organization></organization>
          </author>

          <date day="4" month="August" year="2006" />

          <abstract>
            <t>This document describes extensions to Resource Reservation
            Protocol - Traffic Engineering (RSVP-TE) for the set up of Traffic
            Engineered (TE) point-to-multipoint (P2MP) Label Switched Paths
            (LSPs) in Multi- Protocol Label Switching (MPLS) and Generalized
            MPLS (GMPLS) networks. The solution relies on RSVP-TE without
            requiring a multicast routing protocol in the Service Provider
            core. Protocol elements and procedures for this solution are
            described. There can be various applications for P2MP TE LSPs such
            as IP multicast. Specification of how such applications will use a
            P2MP TE LSP is outside the scope of this document.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-mpls-rsvp-te-p2mp-06.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-mpls-rsvp-te-p2mp.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-pim-sm-bsr.xml. -->

      <reference anchor="PIM-BSR">
        <front>
          <title>Bootstrap Router (BSR) Mechanism for PIM</title>

          <author fullname="Nidhi Bhaskar" initials="N" surname="Bhaskar">
            <organization></organization>
          </author>

          <date day="23" month="June" year="2006" />

          <abstract>
            <t>This document specifies the Bootstrap Router (BSR) mechanism
            for the class of multicast routing protocols in the PIM (Protocol
            Independent Multicast) family that use the concept of a Rendezvous
            Point as a means for receivers to discover the sources that send
            to a particular multicast group. BSR is one way that a multicast
            router can learn the set of group-to-RP mappings required in order
            to function. The mechanism is dynamic, largely self-configuring,
            and robust to router failure.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-pim-sm-bsr-09.txt"
                type="TXT" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-pim-sm-bsr-09.ps"
                type="PS" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-pim-sm-bsr.xml. -->

      <!-- Begin inclusion reference.RFC.4610.xml. -->

      <reference anchor="RFC4610">
        <front>
          <title>Anycast-RP Using Protocol Independent Multicast (PIM)</title>

          <author fullname="D. Farinacci" initials="D." surname="Farinacci">
            <organization></organization>
          </author>

          <author fullname="Y. Cai" initials="Y." surname="Cai">
            <organization></organization>
          </author>

          <date month="August" year="2006" />

          <abstract>
            <t>&lt;p&gt;This specification allows Anycast-RP (Rendezvous
            Point) to be used inside a domain that runs Protocol Independent
            Multicast (PIM) only. Other multicast protocols (such as Multicast
            Source Discovery Protocol (MSDP), which has been used
            traditionally to solve this problem) are not required to support
            Anycast-RP. [STANDARDS TRACK]&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4610" />

        <format octets="22490" target="ftp://ftp.isi.edu/in-notes/rfc4610.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4610.xml. -->

      <!-- Begin inclusion reference.RFC.3446.xml. -->

      <reference anchor="RFC3446">
        <front>
          <title>Anycast Rendevous Point (RP) mechanism using Protocol
          Independent Multicast (PIM) and Multicast Source Discovery Protocol
          (MSDP)</title>

          <author fullname="D. Kim" initials="D." surname="Kim">
            <organization></organization>
          </author>

          <author fullname="D. Meyer" initials="D." surname="Meyer">
            <organization></organization>
          </author>

          <author fullname="H. Kilmer" initials="H." surname="Kilmer">
            <organization></organization>
          </author>

          <author fullname="D. Farinacci" initials="D." surname="Farinacci">
            <organization></organization>
          </author>

          <date month="January" year="2003" />

          <abstract>
            <t>&lt;p&gt;This document describes a mechanism to allow for an
            arbitrary number of Rendevous Points (RPs) per group in a single
            shared-tree Protocol Independent Multicast-Sparse Mode (PIM-SM)
            domain. This memo provides information for the Internet community.
            &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3446" />

        <format octets="14792" target="ftp://ftp.isi.edu/in-notes/rfc3446.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3446.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-mpls-ldp-p2mp.xml. -->

      <reference anchor="P2MP-LDP">
        <front>
          <title>Label Distribution Protocol Extensions for
          Point-to-Multipoint and Multipoint-to-Multipoint Label Switched
          Paths</title>

          <author fullname="Ina Minei" initials="I" surname="Minei">
            <organization></organization>
          </author>

          <date day="20" month="October" year="2006" />

          <abstract>
            <t>This document describes extensions to the Label Distribution
            Protocol (LDP) for the setup of point to multi-point (P2MP) and
            multipoint-to- multipoint (MP2MP) Label Switched Paths (LSPs) in
            Multi-Protocol Label Switching (MPLS) networks. The solution
            relies on LDP without requiring a multicast routing protocol in
            the network. Protocol elements and procedures for this solution
            are described for building such LSPs in a receiver-initiated
            manner. There can be various applications for P2MP/MP2MP LSPs, for
            example IP multicast or support for multicast in BGP/MPLS L3VPNs.
            Specification of how such applications can use a LDP signaled
            P2MP/MP2MP LSP is outside the scope of this document.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-mpls-ldp-p2mp-02.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-mpls-ldp-p2mp.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-mpls-mp-ldp-reqs.xml. -->

      <reference anchor="P2MP-LDP-REQS">
        <front>
          <title>Requirements for point-to-multipoint extensions to the Label
          Distribution Protocol</title>

          <author fullname="Jean-Louis Le Roux" initials="J" surname="Roux">
            <organization></organization>
          </author>

          <date day="22" month="June" year="2006" />

          <abstract>
            <t>This document lists a set of functional requirements for Label
            Distribution Protocol (LDP) extensions for setting up point-to-
            multipoint (P2MP) Label Switched Paths (LSP), in order to deliver
            point-to-multipoint applications over a Multi Protocol Label
            Switching (MPLS) infrastructure. It is intended that solutions
            that specify LDP procedures for setting up P2MP LSP satisfy these
            requirements.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-mpls-mp-ldp-reqs-01.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-mpls-mp-ldp-reqs.xml. -->

      <!-- Begin inclusion reference.RFC.4687.xml. -->

          <?rfc needLines="8"?>
      <reference anchor="RFC4687">
        <front>
          <title>Operations and Management (OAM) Requirements for
          Point-to-Multipoint MPLS Networks</title>

          <author fullname="S. Yasukawa" initials="S." surname="Yasukawa">
            <organization></organization>
          </author>

          <author fullname="A. Farrel" initials="A." surname="Farrel">
            <organization></organization>
          </author>

          <author fullname="D. King" initials="D." surname="King">
            <organization></organization>
          </author>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <date month="September" year="2006" />

          <abstract>
            <t>&lt;p&gt;Multi-Protocol Label Switching (MPLS) has been
            extended to encompass point-to-multipoint (P2MP) Label Switched
            Paths (LSPs). As with point-to-point MPLS LSPs, the requirement to
            detect, handle, and diagnose control and data plane defects is
            critical.&lt;/p&gt;&lt;p&gt; For operators deploying services
            based on P2MP MPLS LSPs, the detection and specification of how to
            handle those defects are important because such defects not only
            may affect the fundamentals of an MPLS network, but also may
            impact service level specification commitments for customers of
            their network.&lt;/p&gt;&lt;p&gt; This document describes
            requirements for data plane operations and management for P2MP
            MPLS LSPs. These requirements apply to all forms of P2MP MPLS
            LSPs, and include P2MP Traffic Engineered (TE) LSPs and multicast
            LSPs. This memo provides information for the Internet
            community.&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4687" />

        <format octets="30486" target="ftp://ftp.isi.edu/in-notes/rfc4687.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4687.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-pim-bidir.xml. -->

      <reference anchor="BIDIR-PIM">
        <front>
          <title>Bi-directional Protocol Independent Multicast
          (BIDIR-PIM)</title>

          <author fullname="Mark Handley" initials="M" surname="Handley">
            <organization></organization>
          </author>

          <date day="25" month="October" year="2005" />

          <abstract>
            <t>This document discusses Bi-directional PIM, a variant of PIM
            Sparse-Mode that builds bi-directional shared trees connecting
            multicast sources and receivers. Bi-directional trees are built
            using a fail-safe Designated Forwarder (DF) election mechanism
            operating on each link of a multicast topology. With the
            assistance of the DF, multicast data is natively forwarded from
            sources to the Rendezvous-Point and hence along the shared tree to
            receivers without requiring source-specific state. The DF election
            takes place at RP discovery time and provides the route to the RP
            thus eliminating the requirement for data-driven protocol
            events.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-pim-bidir-08.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-pim-bidir.xml. -->

      <!-- Begin inclusion reference.RFC.2003.xml. -->

      <reference anchor="RFC2003">
        <front>
          <title abbrev="IP-within-IP">IP Encapsulation within IP</title>

          <author fullname="Charles Perkins" initials="C." surname="Perkins">
            <organization>Room H3-D34</organization>

            <address>
              <postal>
                <street>T. J. Watson Research Center</street>

                <street>IBM Corporation</street>

                <street>30 Saw Mill River Rd.</street>

                <street>Hawthorne</street>

                <street>NY 10532</street>
              </postal>

              <facsimile>+1-914-784-6205</facsimile>

              <email>perk@watson.ibm.com</email>
            </address>
          </author>

          <date month="October" year="1996" />

          <area>Internet</area>

          <keyword>encapsulate</keyword>

          <keyword>mobile ip</keyword>

          <keyword>routing</keyword>

          <keyword>wireless</keyword>

          <abstract>
            <t>This document specifies a method by which an IP datagram may be
            encapsulated (carried as payload) within an IP datagram.
            Encapsulation is suggested as a means to alter the normal IP
            routing for datagrams, by delivering them to an intermediate
            destination that would otherwise not be selected by the (network
            part of the) IP Destination Address field in the original IP
            header. Encapsulation may serve a variety of purposes, such as
            delivery of a datagram to a mobile node using Mobile IP.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="2003" />

        <format octets="30291" target="ftp://ftp.isi.edu/in-notes/rfc2003.txt"
                type="TXT" />

        <format octets="46253"
                target="http://xml.resource.org/public/rfc/html/rfc2003.html"
                type="HTML" />

        <format octets="33466"
                target="http://xml.resource.org/public/rfc/xml/rfc2003.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2003.xml. -->

      <!-- Begin inclusion reference.RFC.3353.xml. -->

      <reference anchor="RFC3353">
        <front>
          <title>Overview of IP Multicast in a Multi-Protocol Label Switching
          (MPLS) Environment</title>

          <author fullname="D. Ooms" initials="D." surname="Ooms">
            <organization></organization>
          </author>

          <author fullname="B. Sales" initials="B." surname="Sales">
            <organization></organization>
          </author>

          <author fullname="W. Livens" initials="W." surname="Livens">
            <organization></organization>
          </author>

          <author fullname="A. Acharya" initials="A." surname="Acharya">
            <organization></organization>
          </author>

          <author fullname="F. Griffoul" initials="F." surname="Griffoul">
            <organization></organization>
          </author>

          <author fullname="F. Ansari" initials="F." surname="Ansari">
            <organization></organization>
          </author>

          <date month="August" year="2002" />
        </front>

        <seriesInfo name="RFC" value="3353" />

        <format octets="65860" target="ftp://ftp.isi.edu/in-notes/rfc3353.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3353.xml. -->

      <!-- Begin inclusion reference.RFC.3272.xml. -->

      <reference anchor="RFC3272">
        <front>
          <title>Overview and Principles of Internet Traffic
          Engineering</title>

          <author fullname="D. Awduche" initials="D." surname="Awduche">
            <organization></organization>
          </author>

          <author fullname="A. Chiu" initials="A." surname="Chiu">
            <organization></organization>
          </author>

          <author fullname="A. Elwalid" initials="A." surname="Elwalid">
            <organization></organization>
          </author>

          <author fullname="I. Widjaja" initials="I." surname="Widjaja">
            <organization></organization>
          </author>

          <author fullname="X. Xiao" initials="X." surname="Xiao">
            <organization></organization>
          </author>

          <date month="May" year="2002" />

          <abstract>
            <t>&lt;p&gt;This memo describes the principles of Traffic
            Engineering (TE) in the Internet. The document is intended to
            promote better understanding of the issues surrounding traffic
            engineering in IP networks, and to provide a common basis for the
            development of traffic engineering capabilities for the Internet.
            The principles, architectures, and methodologies for performance
            evaluation and performance optimization of operational IP networks
            are discussed throughout this document. This memo provides
            information for the Internet community. &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3272" />

        <format octets="190384"
                target="ftp://ftp.isi.edu/in-notes/rfc3272.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3272.xml. -->

      <!-- Begin inclusion reference.RFC.2784.xml. -->

      <reference anchor="RFC2784">
        <front>
          <title abbrev="Generic Routing Encapsulation">Generic Routing
          Encapsulation (GRE)</title>

          <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
            <organization>Procket Networks</organization>

            <address>
              <postal>
                <street>3850 No. First St.</street>

                <street>Ste. C</street>

                <city>San Jose</city>

                <region>CA</region>

                <code>95134</code>

                <country>US</country>
              </postal>

              <email>dino@procket.com</email>
            </address>
          </author>

          <author fullname="Tony Li" initials="T." surname="Li">
            <organization>Procket Networks</organization>

            <address>
              <postal>
                <street>3850 No. First St.</street>

                <street>Ste. C</street>

                <city>San Jose</city>

                <region>CA</region>

                <code>95134</code>

                <country>US</country>
              </postal>

              <phone>+1 408 954 7903</phone>

              <facsimile>+1 408 987 6166</facsimile>

              <email>tony1@home.net</email>
            </address>
          </author>

          <author fullname="Stan Hanks" initials="S." surname="Hanks">
            <organization>Enron Communications</organization>

            <address>
              <email>stan_hanks@enron.net</email>
            </address>
          </author>

          <author fullname="David Meyer" initials="D." surname="Meyer">
            <organization>Cisco Systems, Inc.</organization>

            <address>
              <postal>
                <street>170 Tasman Drive</street>

                <city>San Jose</city>

                <region>CA</region>

                <code>95134</code>

                <country>US</country>
              </postal>

              <email>dmm@cisco.com</email>
            </address>
          </author>

          <author fullname="Paul Traina" initials="P." surname="Traina">
            <organization>Juniper Networks</organization>

            <address>
              <email>pst@juniper.net</email>
            </address>
          </author>

          <date month="March" year="2000" />

          <abstract>
            <t>This document specifies a protocol for encapsulation of an
            arbitrary network layer protocol over another arbitrary network
            layer protocol.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="2784" />

        <format octets="16627" target="ftp://ftp.isi.edu/in-notes/rfc2784.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.2784.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-ipfix-protocol.xml. -->

      <reference anchor="IPFIX-PROT">
        <front>
          <title>Specification of the IPFIX Protocol for the Exchange</title>

          <author fullname="Benoit Claise" initials="B" surname="Claise">
            <organization></organization>
          </author>

          <date day="9" month="November" year="2006" />

          <abstract>
            <t>This document specifies the IPFIX protocol that serves for
            transmitting IP traffic flow information over the network. In
            order to transmit IP traffic flow information from an exporting
            process to an information collecting process, a common
            representation of flow data and a standard means of communicating
            them is required. This document describes how the IPFIX data and
            templates records are carried over a number of transport protocols
            from an IPFIX exporting process to an IPFIX collecting
            process.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-ipfix-protocol-24.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-ipfix-protocol.xml. -->

      <!-- Begin inclusion reference.RFC.4045.xml. -->

      <reference anchor="RFC4045">
        <front>
          <title>Extensions to Support Efficient Carrying of Multicast Traffic
          in Layer-2 Tunneling Protocol (L2TP)</title>

          <author fullname="G. Bourdon" initials="G." surname="Bourdon">
            <organization></organization>
          </author>

          <date month="April" year="2005" />

          <abstract>
            <t>&lt;p&gt;The Layer Two Tunneling Protocol (L2TP) provides a
            method for tunneling PPP packets. This document describes an
            extension to L2TP, to make efficient use of L2TP tunnels within
            the context of deploying multicast services whose data will have
            to be conveyed by these tunnels. This memo defines an Experimental
            Protocol for the Internet community.&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4045" />

        <format octets="59140" target="ftp://ftp.isi.edu/in-notes/rfc4045.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4045.xml. -->

      <!-- Begin inclusion reference.RFC.3809.xml. -->

      <reference anchor="RFC3809">
        <front>
          <title>Generic Requirements for Provider-Provisioned Virtual Private
          Networks (PPVPN)</title>

          <author fullname="A. Nagarajan" initials="A." surname="Nagarajan">
            <organization></organization>
          </author>

          <date month="June" year="2004" />

          <abstract>
            <t>&lt;p&gt;This document describes generic requirements for
            Provider-Provisioned Virtual Private Networks (PPVPN). The
            requirements are categorized into service requirements, provider
            requirements and engineering requirements. These requirements are
            not specific to any particular type of PPVPN technology, but
            rather apply to all PPVPN technologies. All PPVPN technologies are
            expected to meet the umbrella set of requirements described in
            this document. This memo provides information for the Internet
            community. &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3809" />

        <format octets="60576" target="ftp://ftp.isi.edu/in-notes/rfc3809.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3809.xml. -->

      <!-- Begin inclusion reference.RFC.3811.xml. -->

      <reference anchor="RFC3811">
        <front>
          <title>Definitions of Textual Conventions (TCs) for Multiprotocol
          Label Switching (MPLS) Management</title>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <author fullname="J. Cucchiara" initials="J." surname="Cucchiara">
            <organization></organization>
          </author>

          <date month="June" year="2004" />

          <abstract>
            <t>&lt;p&gt;This memo defines a Management Information Base (MIB)
            module which contains Textual Conventions to represent commonly
            used Multiprotocol Label Switching (MPLS) management information.
            The intent is that these TEXTUAL CONVENTIONS (TCs) will be
            imported and used in MPLS related MIB modules that would otherwise
            define their own representations. [STANDARDS TRACK] &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3811" />

        <format octets="40353" target="ftp://ftp.isi.edu/in-notes/rfc3811.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3811.xml. -->

      <!-- Begin inclusion reference.RFC.3812.xml. -->

      <reference anchor="RFC3812">
        <front>
          <title>Multiprotocol Label Switching (MPLS) Traffic Engineering (TE)
          Management Information Base (MIB)</title>

          <author fullname="C. Srinivasan" initials="C." surname="Srinivasan">
            <organization></organization>
          </author>

          <author fullname="A. Viswanathan" initials="A."
                  surname="Viswanathan">
            <organization></organization>
          </author>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <date month="June" year="2004" />

          <abstract>
            <t>&lt;p&gt;This memo defines a portion of the Management
            Information Base (MIB) for use with network management protocols
            in the Internet community. In particular, it describes managed
            objects for Multiprotocol Label Switching (MPLS) based traffic
            engineering (TE). [STANDARDS TRACK] &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3812" />

        <format octets="136475"
                target="ftp://ftp.isi.edu/in-notes/rfc3812.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3812.xml. -->

      <!-- Begin inclusion reference.RFC.3813.xml. -->

      <reference anchor="RFC3813">
        <front>
          <title>Multiprotocol Label Switching (MPLS) Label Switching Router
          (LSR) Management Information Base (MIB)</title>

          <author fullname="C. Srinivasan" initials="C." surname="Srinivasan">
            <organization></organization>
          </author>

          <author fullname="A. Viswanathan" initials="A."
                  surname="Viswanathan">
            <organization></organization>
          </author>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <date month="June" year="2004" />

          <abstract>
            <t>&lt;p&gt;This memo defines an portion of the Management
            Information Base (MIB) for use with network management protocols
            in the Internet community. In particular, it describes managed
            objects to configure and/or monitor a Multiprotocol Label
            Switching (MPLS) Label Switching Router (LSR). [STANDARDS TRACK]
            &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3813" />

        <format octets="116120"
                target="ftp://ftp.isi.edu/in-notes/rfc3813.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3813.xml. -->

      <!-- Begin inclusion reference.RFC.3814.xml. -->

      <reference anchor="RFC3814">
        <front>
          <title>Multiprotocol Label Switching (MPLS) Forwarding Equivalence
          Class To Next Hop Label Forwarding Entry (FEC-To-NHLFE) Management
          Information Base (MIB)</title>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <author fullname="C. Srinivasan" initials="C." surname="Srinivasan">
            <organization></organization>
          </author>

          <author fullname="A. Viswanathan" initials="A."
                  surname="Viswanathan">
            <organization></organization>
          </author>

          <date month="June" year="2004" />

          <abstract>
            <t>&lt;p&gt;This memo defines a portion of the Management
            Information Base (MIB) for use with network management protocols
            in the Internet community. In particular, it describes managed
            objects for defining, configuring, and monitoring Forwarding
            Equivalence Class (FEC) to Next Hop Label Forwarding Entry (NHLFE)
            mappings and corresponding actions for use with Multiprotocol
            Label Switching (MPLS). [STANDARDS TRACK] &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3814" />

        <format octets="87518" target="ftp://ftp.isi.edu/in-notes/rfc3814.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3814.xml. -->

      <!-- Begin inclusion reference.RFC.2365.xml. -->

      <reference anchor="RFC2365">
        <front>
          <title>Administratively Scoped IP Multicast</title>

          <author fullname="David Meyer" initials="D." surname="Meyer">
            <organization>Cisco Systems</organization>

            <address>
              <postal>
                <street>San Jose</street>

                <country>CA</country>
              </postal>

              <email>dmm@cisco.com</email>
            </address>
          </author>

          <date month="July" year="1998" />

          <area>Internet</area>

          <keyword>multicast</keyword>
        </front>

        <seriesInfo name="BCP" value="23" />

        <seriesInfo name="RFC" value="2365" />

        <format octets="17770" target="ftp://ftp.isi.edu/in-notes/rfc2365.txt"
                type="TXT" />

        <format octets="30863"
                target="http://xml.resource.org/public/rfc/html/rfc2365.html"
                type="HTML" />

        <format octets="19908"
                target="http://xml.resource.org/public/rfc/xml/rfc2365.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2365.xml. -->

      <!-- Begin inclusion reference.RFC.2330.xml. -->

      <reference anchor="RFC2330">
        <front>
          <title>Framework for IP Performance Metrics</title>

          <author fullname="Vern Paxson" initials="V." surname="Paxson">
            <organization>MS 50B/2239</organization>

            <address>
              <postal>
                <street>Lawrence Berkeley National Laboratory</street>

                <street>University of California</street>

                <city>Berkeley</city>

                <region>CA</region>

                <code>94720</code>

                <country>USA</country>
              </postal>

              <phone>+1 510/486-7504</phone>

              <email>vern@ee.lbl.gov</email>
            </address>
          </author>

          <author fullname="Guy Almes" initials="G." surname="Almes">
            <organization>Advanced Network &amp; Services, Inc.</organization>

            <address>
              <postal>
                <street>200 Business Park Drive</street>

                <city>Armonk</city>

                <region>NY</region>

                <code>10504</code>

                <country>USA</country>
              </postal>

              <phone>+1 914/765-1120</phone>

              <email>almes@advanced.org</email>
            </address>
          </author>

          <author fullname="Jamshid Mahdavi" initials="J." surname="Mahdavi">
            <organization>Pittsburgh Supercomputing Center</organization>

            <address>
              <postal>
                <street>4400 5th Avenue</street>

                <city>Pittsburgh</city>

                <region>PA</region>

                <code>15213</code>

                <country>USA</country>
              </postal>

              <phone>+1 412/268-6282</phone>

              <email>mahdavi@psc.edu</email>
            </address>
          </author>

          <author fullname="Matt Mathis" initials="M." surname="Mathis">
            <organization>Pittsburgh Supercomputing Center</organization>

            <address>
              <postal>
                <street>4400 5th Avenue</street>

                <city>Pittsburgh</city>

                <region>PA</region>

                <code>15213</code>

                <country>USA</country>
              </postal>

              <phone>+1 412/268-3319</phone>

              <email>mathis@psc.edu</email>
            </address>
          </author>

          <date month="May" year="1998" />

          <area>Internet</area>

          <area>Operations</area>

          <keyword>IP</keyword>

          <keyword>metrics</keyword>
        </front>

        <seriesInfo name="RFC" value="2330" />

        <format octets="94387" target="ftp://ftp.isi.edu/in-notes/rfc2330.txt"
                type="TXT" />

        <format octets="108716"
                target="http://xml.resource.org/public/rfc/html/rfc2330.html"
                type="HTML" />

        <format octets="92593"
                target="http://xml.resource.org/public/rfc/xml/rfc2330.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2330.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-ippm-multimetrics.xml. -->

      <reference anchor="MULTIMETRICS">
        <front>
          <title>IP Performance Metrics (IPPM) for spatial and
          multicast</title>

          <author fullname="Emile Stephan" initials="E" surname="Stephan">
            <organization></organization>
          </author>

          <date day="25" month="October" year="2006" />

          <abstract>
            <t>The IETF IP Performance Metrics (IPPM) working group has
            standardized metrics for measuring end-to-end performance between
            2 points. This memo defines 2 sets of metrics to extend these
            end-to-end ones. It defines spatial metrics for measuring the
            performance of segments along a path and metrics for measuring the
            performance of a group of users in multiparty communications.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-ippm-multimetrics-02.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-ippm-multimetrics.xml. -->

      <!-- Begin inclusion reference.RFC.2475.xml. -->

      <?rfc needLines="3"?>

      <reference anchor="RFC2475">
        <front>
          <title abbrev="Architecture for Differentiated Services">An
          Architecture for Differentiated Services</title>

          <author fullname="Steven Blake" initials="S." surname="Blake">
            <organization>Torrent Networking Technologies</organization>

            <address>
              <postal>
                <street>3000 Aerial Center, Suite 140</street>

                <city>Morrisville</city>

                <region>NC</region>

                <code>27560</code>

                <country>USA</country>
              </postal>

              <phone>+1 919 468 8466 x232</phone>

              <email>slblake@torrentnet.com</email>
            </address>
          </author>

          <author fullname="David L. Black" initials="D.L." surname="Black">
            <organization>EMC Corporation</organization>

            <address>
              <postal>
                <street>35 Parkwood Drive</street>

                <city>Hopkinton</city>

                <region>MA</region>

                <code>01748</code>

                <country>USA</country>
              </postal>

              <phone>+1 508 435 1000 x76140</phone>

              <email>black_david@emc.com</email>
            </address>
          </author>

          <author fullname="Mark A. Carlson" initials="M.A." surname="Carlson">
            <organization>Sun Microsystems, Inc.</organization>

            <address>
              <postal>
                <street>2990 Center Green Court South</street>

                <city>Boulder</city>

                <region>CO</region>

                <code>80301</code>

                <country>USA</country>
              </postal>

              <phone>+1 303 448 0048 x115</phone>

              <email>mark.carlson@sun.com</email>
            </address>
          </author>

          <author fullname="Elwyn Davies" initials="E." surname="Davies">
            <organization>Nortel UK</organization>

            <address>
              <postal>
                <street>London Road</street>

                <street>Harlow, Essex CM17 9NA</street>

                <country>UK</country>
              </postal>

              <phone>+44 1279 405498</phone>

              <email>elwynd@nortel.co.uk</email>
            </address>
          </author>

          <author fullname="Zheng Wang" initials="Z." surname="Wang">
            <organization>Bell Labs Lucent Technologies</organization>

            <address>
              <postal>
                <street>101 Crawfords Corner Road</street>

                <city>Holmdel</city>

                <region>NJ</region>

                <code>07733</code>

                <country>USA</country>
              </postal>

              <email>zhwang@bell-labs.com</email>
            </address>
          </author>

          <author fullname="Walter Weiss" initials="W." surname="Weiss">
            <organization>Lucent Technologies</organization>

            <address>
              <postal>
                <street>300 Baker Avenue, Suite 100</street>

                <city>Concord</city>

                <region>MA</region>

                <code>01742-2168</code>

                <country>USA</country>
              </postal>

              <email>wweiss@lucent.com</email>
            </address>
          </author>

          <date month="December" year="1998" />

          <area>Internet</area>

          <keyword>type of service</keyword>

          <abstract>
            <t>This document defines an architecture for implementing scalable
            service differentiation in the Internet. This architecture
            achieves scalability by aggregating traffic classification state
            which is conveyed by means of IP-layer packet marking using the DS
            field . Packets are classified and marked to receive a particular
            per-hop forwarding behavior on nodes along their path.
            Sophisticated classification, marking, policing, and shaping
            operations need only be implemented at network boundaries or
            hosts. Network resources are allocated to traffic streams by
            service provisioning policies which govern how traffic is marked
            and conditioned upon entry to a differentiated services-capable
            network, and how that traffic is forwarded within that network. A
            wide variety of services can be implemented on top of these
            building blocks.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="2475" />

        <format octets="94786" target="ftp://ftp.isi.edu/in-notes/rfc2475.txt"
                type="TXT" />

        <format octets="111685"
                target="http://xml.resource.org/public/rfc/html/rfc2475.html"
                type="HTML" />

        <format octets="107423"
                target="http://xml.resource.org/public/rfc/xml/rfc2475.xml"
                type="XML" />
      </reference>

      <!-- End inclusion reference.RFC.2475.xml. -->

      <!-- Begin inclusion reference.RFC.3180.xml. -->

      <reference anchor="RFC3180">
        <front>
          <title>GLOP Addressing in 233/8</title>

          <author fullname="D. Meyer" initials="D." surname="Meyer">
            <organization></organization>
          </author>

          <author fullname="P. Lothberg" initials="P." surname="Lothberg">
            <organization></organization>
          </author>

          <date month="September" year="2001" />

          <abstract>
            <t>&lt;p&gt;This document defines the policy for the use of 233/8
            for statically e assigned multicast addresses. This document
            specifies an Internet Best Current Practices for the Internet
            Community, and requests discussion and suggestions for
            improvements. &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="BCP" value="53" />

        <seriesInfo name="RFC" value="3180" />

        <format octets="8225" target="ftp://ftp.isi.edu/in-notes/rfc3180.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3180.xml. -->

      <!-- Begin inclusion reference.RFC.3411.xml. -->

      <reference anchor="RFC3411">
        <front>
          <title>An Architecture for Describing Simple Network Management
          Protocol (SNMP) Management Frameworks</title>

          <author fullname="D. Harrington" initials="D." surname="Harrington">
            <organization></organization>
          </author>

          <author fullname="R. Presuhn" initials="R." surname="Presuhn">
            <organization></organization>
          </author>

          <author fullname="B. Wijnen" initials="B." surname="Wijnen">
            <organization></organization>
          </author>

          <date month="December" year="2002" />

          <abstract>
            <t>&lt;p&gt;This document describes an architecture for describing
            Simple Network Management Protocol (SNMP) Management Frameworks.
            The architecture is designed to be modular to allow the evolution
            of the SNMP protocol standards over time. The major portions of
            the architecture are an SNMP engine containing a Message
            Processing Subsystem, a Security Subsystem and an Access Control
            Subsystem, and possibly multiple SNMP applications which provide
            specific functional processing of management data. This document
            obsoletes RFC 2571. [STANDARDS TRACK] &lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="STD" value="62" />

        <seriesInfo name="RFC" value="3411" />

        <format octets="140096"
                target="ftp://ftp.isi.edu/in-notes/rfc3411.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.3411.xml. -->

      <!-- Begin inclusion reference.RFC.2578.xml. -->

      <reference anchor="RFC2578">
        <front>
          <title abbrev="SMIv2">Structure of Management Information Version 2
          (SMIv2)</title>

          <author fullname="Keith McCloghrie" initials="K." role="editor"
                  surname="McCloghrie">
            <organization>Cisco Systems, Inc.</organization>

            <address>
              <postal>
                <street>170 West Tasman Drive</street>

                <city>San Jose</city>

                <region>CA</region>

                <code>95134-1706</code>

                <country>US</country>
              </postal>

              <phone>+1 408 526 5260</phone>

              <email>kzm@cisco.com</email>
            </address>
          </author>

          <author fullname="David Perkins" initials="D." role="editor"
                  surname="Perkins">
            <organization>SNMPinfo</organization>

            <address>
              <postal>
                <street>3763 Benton Street</street>

                <city>Santa Clara</city>

                <region>CA</region>

                <code>95051</code>

                <country>US</country>
              </postal>

              <phone>+1 408 221 8702</phone>

              <email>dperkins@snmpinfo.com</email>
            </address>
          </author>

          <author fullname="Juergen Schoenwaelder" initials="J." role="editor"
                  surname="Schoenwaelder">
            <organization>TU Braunschweig</organization>

            <address>
              <postal>
                <street>Bueltenweg 74/75</street>

                <street>38106 Braunschweig</street>

                <country>DE</country>
              </postal>

              <phone>+49 531 3913283</phone>

              <email>schoenw@ibr.cs.tu-bs.de</email>
            </address>
          </author>

          <date month="April" year="1999" />
        </front>

        <seriesInfo name="STD" value="58" />

        <seriesInfo name="RFC" value="2578" />

        <format octets="89712" target="ftp://ftp.isi.edu/in-notes/rfc2578.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.2578.xml. -->

      <!-- Begin inclusion reference.RFC.1191.xml. -->

      <reference anchor="RFC1191">
        <front>
          <title>Path MTU discovery</title>

          <author fullname="Jeffrey Mogul" initials="J." surname="Mogul">
            <organization>Digital Equipment Corporation (DEC) , Western
            Research Laboratory</organization>

            <address>
              <postal>
                <street>100 Hamilton Avenue</street>

                <city>Palo Alto</city>

                <region>CA</region>

                <code>94301</code>

                <country>US</country>
              </postal>

              <phone>+1 415 853 6643</phone>

              <email>mogul@decwrl.dec.com</email>
            </address>
          </author>

          <author fullname="Steve Deering" initials="S." surname="Deering">
            <organization>Xerox Palo Alto Research Center</organization>

            <address>
              <postal>
                <street>3333 Coyote Hill Road</street>

                <city>Palo Alto</city>

                <region>CA</region>

                <code>94304</code>

                <country>US</country>
              </postal>

              <phone>+1 415 494 4839</phone>

              <email>deering@xerox.com</email>
            </address>
          </author>

          <date day="1" month="November" year="1990" />

          <abstract>
            <t>This memo describes a technique for dynamically discovering the
            maximum transmission unit (MTU) of an arbitrary internet path. It
            specifies a small change to the way routers generate one type of
            ICMP message. For a path that passes through a router that has not
            been so changed, this technique might not discover the correct
            Path MTU, but it will always choose a Path MTU as accurate as, and
            in many cases more accurate than, the Path MTU that would be
            chosen by current practice.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="1191" />

        <format octets="47936" target="ftp://ftp.isi.edu/in-notes/rfc1191.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.1191.xml. -->

      <!-- Begin inclusion reference.RFC.4382.xml. -->

      <reference anchor="RFC4382">
        <front>
          <title>MPLS/BGP Layer 3 Virtual Private Network (VPN) Management
          Information Base</title>

          <author fullname="T. Nadeau" initials="T." surname="Nadeau">
            <organization></organization>
          </author>

          <author fullname="H. van der Linde" initials="H."
                  surname="van der Linde">
            <organization></organization>
          </author>

          <date month="February" year="2006" />

          <abstract>
            <t>&lt;p&gt;This memo defines a portion of the Management
            Information Base (MIB) for use with network management protocols
            in the Internet community. In particular, it describes managed
            objects to configure and/or monitor Multiprotocol Label Switching
            Layer-3 Virtual Private Networks on a Multiprotocol Label
            Switching (MPLS) Label Switching Router (LSR) supporting this
            feature. [STANDARDS TRACK]&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4382" />

        <format octets="85594" target="ftp://ftp.isi.edu/in-notes/rfc4382.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4382.xml. -->

      <!-- Begin inclusion reference.RFC.4379.xml. -->

      <reference anchor="RFC4379">
        <front>
          <title>Detecting Multi-Protocol Label Switched (MPLS) Data Plane
          Failures</title>

          <author fullname="K. Kompella" initials="K." surname="Kompella">
            <organization></organization>
          </author>

          <author fullname="G. Swallow" initials="G." surname="Swallow">
            <organization></organization>
          </author>

          <date month="February" year="2006" />

          <abstract>
            <t>&lt;p&gt;This document describes a simple and efficient
            mechanism that can be used to detect data plane failures in
            Multi-Protocol Label Switching (MPLS) Label Switched Paths (LSPs).
            There are two parts to this document: information carried in an
            MPLS "echo request" and "echo reply" for the purposes of fault
            detection and isolation, and mechanisms for reliably sending the
            echo reply. [STANDARDS TRACK]&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4379" />

        <format octets="116872"
                target="ftp://ftp.isi.edu/in-notes/rfc4379.txt" type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4379.xml. -->

      <!-- Begin inclusion reference.I-D.ietf-mpls-p2mp-lsp-ping.xml. -->

      <reference anchor="LSP-PING">
        <front>
          <title>Detecting Data Plane Failures in Point-to-Multipoint
          Multiprotocol</title>

          <author fullname="Adrian  Farrel" initials="A" surname="Farrel">
            <organization></organization>
          </author>

          <author fullname="Seisho Yasukawa" initials="S" surname="Yasukawa">
            <organization></organization>
          </author>

          <date day="24" month="September" year="2006" />

          <abstract>
            <t>Recent proposals have extended the scope of Multiprotocol Label
            Switching (MPLS) Label Switched Paths (LSPs) to encompass
            point-to-multipoint (P2MP) LSPs. The requirement for a simple and
            efficient mechanism that can be used to detect data plane failures
            in point-to-point (P2P) MPLS LSPs has been recognised and has led
            to the development of techniques for fault detection and isolation
            commonly referred to as "LSP Ping". The scope of this document is
            fault detection and isolation for P2MP MPLS LSPs. This documents
            does not replace any of the mechanism of LSP Ping, but clarifies
            their applicability to MPLS P2MP LSPs, and extends the techniques
            and mechanisms of LSP Ping to the MPLS P2MP environment.</t>
          </abstract>
        </front>

        <seriesInfo name="Work" value="in Progress" />

        <format target="http://www.ietf.org/internet-drafts/draft-ietf-mpls-p2mp-lsp-ping-02.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.I-D.ietf-mpls-p2mp-lsp-ping.xml. -->

      <!-- Begin inclusion reference.RFC.4459.xml. -->

      <reference anchor="RFC4459">
        <front>
          <title>MTU and Fragmentation Issues with In-the-Network
          Tunneling</title>

          <author fullname="P. Savola" initials="P." surname="Savola">
            <organization></organization>
          </author>

          <date month="April" year="2006" />

          <abstract>
            <t>&lt;p&gt;Tunneling techniques such as IP-in-IP when deployed in
            the middle of the network, typically between routers, have certain
            issues regarding how large packets can be handled: whether such
            packets would be fragmented and reassembled (and how), whether
            Path MTU Discovery would be used, or how this scenario could be
            operationally avoided. This memo justifies why this is a common,
            non-trivial problem, and goes on to describe the different
            solutions and their characteristics at some length. This memo
            provides information for the Internet community.&lt;/p&gt;</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4459" />

        <format octets="32051" target="ftp://ftp.isi.edu/in-notes/rfc4459.txt"
                type="TXT" />
      </reference>

      <!-- End inclusion reference.RFC.4459.xml. -->
    </references>
  </back>
</rfc>
