Skip to main content

Mechanism for performing LSP-Ping over RSVP protection paths
draft-nitinb-lsp-ping-rsvp-protection-01

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Nitin Bahadur , Kireeti Kompella , Kenji Kumaki
Last updated 2008-12-01
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes methods for performing lsp ping over mpls rsvp-te protection paths, when the protection paths are not in use. Conventional LSP-Ping follows the same path as data traffic. In some cases, it might be useful to follow the data path of protection paths (detours and bypasses) to ensure that the those paths are fully functional. This document describes enhancements to LSP-Ping to perform ping over such paths.

Authors

Nitin Bahadur
Kireeti Kompella
Kenji Kumaki

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)