Applications aware LDP Targeted Session
draft-esale-mpls-appl-aware-ldp-targeted-session-00

Document Type Expired Internet-Draft (individual)
Authors Santosh Esale  , Raveendra Torvi  , Chris Bowers 
Last updated 2014-10-04 (latest revision 2014-04-02)
Stream (None)
Formats
Expired & archived
pdf htmlized bibtex
Additional Resources
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-esale-mpls-appl-aware-ldp-targeted-session-00.txt

Abstract

Recent Targeted LDP applications such as Remote LFA and BGP auto discovery FEC 129 pseudowire may automatically establish a targeted LDP session to any LSR in the core network. The sender LSR has information about the targeted applications to administratively control initiation of the session. However the receiver LSR has no such information to control the acceptance of this session. This document defines a mechanism to advertise Targeted Application Capability during session initialization. As the receiver LSR becomes aware of targeted LDP applications, it may establish a limited number of sessions for certain applications. In addition, each targeted application is mapped to LDP FEC Elements to advertise only necessary LDP FEC label bindings over the session.

Authors

Santosh Esale (sesale@juniper.net)
Raveendra Torvi (rtorvi@juniper.net)
Chris Bowers (cbowers@juniper.net)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)