Home Articles FAQs XREF Games Software Instant Books BBS About FOLDOC RFCs Feedback Sitemap
irt.Org

Request For Comments - RFC3985

You are here: irt.org | RFCs | RFC3985 [ previous next ]






Network Working Group                                     S. Bryant, Ed.
Request for Comments: 3985                                 Cisco Systems
Category: Informational                                     P. Pate, Ed.
                                                 Overture Networks, Inc.
                                                              March 2005


         Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document describes an architecture for Pseudo Wire Emulation
   Edge-to-Edge (PWE3).  It discusses the emulation of services such as
   Frame Relay, ATM, Ethernet, TDM, and SONET/SDH over packet switched
   networks (PSNs) using IP or MPLS.  It presents the architectural
   framework for pseudo wires (PWs), defines terminology, and specifies
   the various protocol elements and their functions.

Table of Contents

   1.   Introduction. . . . . . . . . . . . . . . . . . . . . . . . .  2
        1.1.  Pseudo Wire Definition. . . . . . . . . . . . . . . . .  2
        1.2.  PW Service Functionality. . . . . . . . . . . . . . . .  3
        1.3.  Non-Goals of This Document. . . . . . . . . . . . . . .  4
        1.4.  Terminology . . . . . . . . . . . . . . . . . . . . . .  4
   2.   PWE3 Applicability. . . . . . . . . . . . . . . . . . . . . .  6
   3.   Protocol Layering Model . . . . . . . . . . . . . . . . . . .  6
        3.1.  Protocol Layers . . . . . . . . . . . . . . . . . . . .  7
        3.2.  Domain of PWE3. . . . . . . . . . . . . . . . . . . . .  8
        3.3.  Payload Types . . . . . . . . . . . . . . . . . . . . .  8
   4.   Architecture of Pseudo Wires. . . . . . . . . . . . . . . . . 11
        4.1.  Network Reference Model . . . . . . . . . . . . . . . . 12
        4.2.  PWE3 Pre-processing . . . . . . . . . . . . . . . . . . 12
        4.3.  Maintenance Reference Model . . . . . . . . . . . . . . 16
        4.4.  Protocol Stack Reference Model. . . . . . . . . . . . . 17
        4.5.  Pre-processing Extension to Protocol Stack Reference
              Model . . . . . . . . . . . . . . . . . . . . . . . . . 17
   5.   PW Encapsulation. . . . . . . . . . . . . . . . . . . . . . . 18



Bryant & Pate               Standards Track                     [Page 1]



RFC 3985                   PWE3 Architecture                  March 2005


        5.1.  Payload Convergence Layer . . . . . . . . . . . . . . . 19
        5.2.  Payload-independent PW Encapsulation Layers . . . . . . 21
        5.3.  Fragmentation . . . . . . . . . . . . . . . . . . . . . 24
        5.4.  Instantiation of the Protocol Layers. . . . . . . . . . 24
   6.   PW Demultiplexer Layer and PSN Requirements . . . . . . . . . 27
        6.1.  Multiplexing. . . . . . . . . . . . . . . . . . . . . . 27
        6.2.  Fragmentation . . . . . . . . . . . . . . . . . . . . . 28
        6.3.  Length and Delivery . . . . . . . . . . . . . . . . . . 28
        6.4.  PW-PDU Validation . . . . . . . . . . . . . . . . . . . 28
        6.5.  Congestion Considerations . . . . . . . . . . . . . . . 28
   7.   Control Plane . . . . . . . . . . . . . . . . . . . . . . . . 29
        7.1.  Set-up or Teardown of Pseudo Wires. . . . . . . . . . . 29
        7.2.  Status Monitoring . . . . . . . . . . . . . . . . . . . 30
        7.3.  Notification of Pseudo Wire Status Changes. . . . . . . 30
        7.4.  Keep-alive. . . . . . . . . . . . . . . . . . . . . . . 31
        7.5.  Handling Control Messages of the Native Services. . . . 32
   8.   Management and Monitoring . . . . . . . . . . . . . . . . . . 32
        8.1.  Status and Statistics . . . . . . . . . . . . . . . . . 32
        8.2.  PW SNMP MIB Architecture. . . . . . . . . . . . . . . . 33
        8.3.  Connection Verification and Traceroute. . . . . . . . . 36
   9.   IANA Considerations . . . . . . . . . . . . . . . . . . . . . 37
   10.  Security Considerations . . . . . . . . . . . . . . . . . . . 37
   11.  Acknowledgements. . . . . . . . . . . . . . . . . . . . . . . 38
   12.  References. . . . . . . . . . . . . . . . . . . . . . . . . . 38
        12.1.  Normative References . . . . . . . . . . . . . . . . . 38
        12.2.  Informative References . . . . . . . . . . . . . . . . 39
   13.  Co-Authors. . . . . . . . . . . . . . . . . . . . . . . . . . 40
   14.  Editors' Addresses. . . . . . . . . . . . . . . . . . . . . . 41
        Full Copyright Statement. . . . . . . . . . . . . . . . . . . 42

1.  Introduction

   This document describes an architecture for Pseudo Wire Emulation
   Edge-to-Edge (PWE3) in support of [RFC3916].  It discusses the
   emulation of services such as Frame Relay, ATM, Ethernet, TDM, and
   SONET/SDH over packet switched networks (PSNs) using IP or MPLS.  It
   presents the architectural framework for pseudo wires (PWs), defines
   terminology, and specifies the various protocol elements and their
   functions.

1.1.  Pseudo Wire Definition

   PWE3 is a mechanism that emulates the essential attributes of a
   telecommunications service (such as a T1 leased line or Frame Relay)
   over a PSN.  PWE3 is intended to provide only the minimum necessary
   functionality to emulate the wire with the required degree of
   faithfulness for the given service definition.  Any required
   switching functionality is the responsibility of a forwarder function



Bryant & Pate               Standards Track                     [Page 2]



RFC 3985                   PWE3 Architecture                  March 2005


   (FWRD).  Any translation or other operation needing knowledge of the
   payload semantics is carried out by native service processing (NSP)
   elements.  The functional definition of any FWRD or NSP elements is
   outside the scope of PWE3.

   The required functions of PWs include encapsulating service-specific
   bit streams, cells, or PDUs arriving at an ingress port and carrying
   them across an IP path or MPLS tunnel.  In some cases it is necessary
   to perform other operations such as managing their timing and order,
   to emulate the behavior and characteristics of the service to the
   required degree of faithfulness.

   From the perspective of Customer Edge Equipment (CE), the PW is
   characterized as an unshared link or circuit of the chosen service.
   In some cases, there may be deficiencies in the PW emulation that
   impact the traffic carried over a PW and therefore limit the
   applicability of this technology.  These limitations must be fully
   described in the appropriate service-specific documentation.

   For each service type, there will be one default mode of operation
   that all PEs offering that service type must support.  However,
   optional modes may be defined to improve the faithfulness of the
   emulated service, if it can be clearly demonstrated that the
   additional complexity associated with the optional mode is offset by
   the value it offers to PW users.

1.2.  PW Service Functionality

   PWs provide the following functions in order to emulate the behavior
   and characteristics of the native service.

       o Encapsulation of service-specific PDUs or circuit data arriving
         at the PE-bound port (logical or physical).
       o Carriage of the encapsulated data across a PSN tunnel.
       o Establishment of the PW, including the exchange and/or
         distribution of the PW identifiers used by the PSN tunnel
         endpoints.
       o Managing the signaling, timing, order, or other aspects of the
         service at the boundaries of the PW.
       o Service-specific status and alarm management.











Bryant & Pate               Standards Track                     [Page 3]



RFC 3985                   PWE3 Architecture                  March 2005


1.3.  Non-Goals of This Document

   The following are non-goals for this document:

      o  The on-the-wire specification of PW encapsulations.
      o  The detailed definition of the protocols involved in PW setup
         and maintenance.

   The following are outside the scope of PWE3:

      o  Any multicast service not native to the emulated medium.  Thus,
         Ethernet transmission to a "multicast" IEEE-48 address is in
         scope, but multicast services such as MARS [RFC2022] that are
         implemented on top of the medium are not.
      o  Methods to signal or control the underlying PSN.

1.4.  Terminology

   This document uses the following definitions of terms.  These terms
   are illustrated in context in Figure 2.


   Attachment Circuit   The physical or virtual circuit attaching
   (AC)                 a CE to a PE. An attachment Circuit may be, for
                        example, a Frame Relay DLCI, an ATM VPI/VCI, an
                        Ethernet port, a VLAN, a PPP connection on a
                        physical interface, a PPP session from an L2TP
                        tunnel, or an MPLS LSP.  If both physical and
                        virtual ACs are of the same technology (e.g.,
                        both ATM, both Ethernet, both Frame Relay), the
                        PW is said to provide "homogeneous transport";
                        otherwise, it is said to provide "heterogeneous
                        transport".

   CE-bound             The traffic direction in which PW-PDUs are
                        received on a PW via the PSN, processed, and
                        then sent to the destination CE.

   CE Signaling         Messages sent and received by the CE's control
                        plane.  It may be desirable or even necessary
                        for the PE to participate in or to monitor this
                        signaling in order to emulate the service
                        effectively.

   Control Word (CW)    A four-octet header used in some encapsulations
                        to carry per-packet information when the PSN is
                        MPLS.




Bryant & Pate               Standards Track                     [Page 4]



RFC 3985                   PWE3 Architecture                  March 2005


   Customer Edge (CE)   A device where one end of a service originates
                        and/or terminates.  The CE is not aware that it
                        is using an emulated service rather than a
                        native service.

   Forwarder (FWRD)     A PE subsystem that selects the PW to use in
                        order to transmit a payload received on an AC.

   Fragmentation        The action of dividing a single PDU into
                        multiple PDUs before transmission with the
                        intent of the original PDU being reassembled
                        elsewhere in the network.  Packets may undergo
                        fragmentation if they are larger than the MTU of
                        the network they will traverse.

   Maximum Transmission The packet size (excluding data link header)
   unit (MTU)           that an interface can transmit without needing
                        to fragment.

   Native Service       Processing of the data received by the PE
   Processing (NSP)     from the CE before presentation to the PW for
                        transmission across the core, or processing of
                        the data received from a PW by a PE before it is
                        output on the AC.  NSP functionality is defined
                        by standards bodies other than the IETF, such as
                        ITU-T,ANSI, or ATMF.)

   Packet Switched      Within the context of PWE3, this is a
   Network (PSN)        network using IP or MPLS as the mechanism for
                        packet forwarding.

   PE-Bound             The traffic direction in which information from
                        a CE is adapted to a PW, and PW-PDUs are sent
                        into the PSN.

   PE/PW Maintenance    Used by the PEs to set up, maintain, and tear
                        down the PW.  It may be coupled with CE
                        Signaling in order to manage the PW effectively.

   Protocol Data        The unit of data output to, or received
   Unit (PDU)           from, the network by a protocol layer.

   Provider Edge (PE)   A device that provides PWE3 to a CE.

   Pseudo Wire (PW)     A mechanism that carries the essential elements
                        of an emulated service from one PE to one or
                        more other PEs over a PSN.




Bryant & Pate               Standards Track                     [Page 5]



RFC 3985                   PWE3 Architecture                  March 2005


   Pseudo Wire          A mechanism that emulates the essential
   Emulation Edge to    attributes of service (such as a T1 leased
   Edge (PWE3)          line or Frame Relay) over a PSN.

   Pseudo Wire PDU      A PDU sent on the PW that contains all of
   (PW-PDU)             the data and control information necessary to
                        emulate the desired service.

   PSN Tunnel           A tunnel across a PSN, inside which one or more
                        PWs can be carried.

   PSN Tunnel           Used to set up, maintain, and tear down the
   Signaling            underlying PSN tunnel.

   PW Demultiplexer     Data-plane method of identifying a PW
                        terminating at a PE.

   Time Domain          Time Division Multiplexing.  Frequently used
   Multiplexing (TDM)   to refer to the synchronous bit streams at rates
                        defined by G.702.

   Tunnel               A method of transparently carrying information
                        over a network.

2.  PWE3 Applicability

   The PSN carrying a PW will subject payload packets to loss, delay,
   delay variation, and re-ordering.  During a network transient there
   may be a sustained period of impaired service.  The applicability of
   PWE3 to a particular service depends on the sensitivity of that
   service (or the CE implementation) to these effects, and on the
   ability of the adaptation layer to mask them.  Some services, such as
   IP over FR over PWE3, may prove quite resilient to IP and MPLS PSN
   characteristics.  Other services, such as the interconnection of PBX
   systems via PWE3, will require more careful consideration of the PSN
   and adaptation layer characteristics.  In some instances, traffic
   engineering of the underlying PSN will be required, and in some cases
   the constraints may make the required service guarantees impossible
   to provide.

3.  Protocol Layering Model

   The PWE3 protocol-layering model is intended to minimize the
   differences between PWs operating over different PSN types.  The
   design of the protocol-layering model has the goals of making each PW
   definition independent of the underlying PSN, and of maximizing the
   reuse of IETF protocol definitions and their implementations.




Bryant & Pate               Standards Track                     [Page 6]



RFC 3985                   PWE3 Architecture                  March 2005


3.1.  Protocol Layers

   The logical protocol-layering model required to support a PW is shown
   in Figure 1.

          +---------------------------+
          |         Payload           |
          +---------------------------+
          |      Encapsulation        | <==== may be empty
          +---------------------------+
          |     PW Demultiplexer      |
          +---------------------------+
          |     PSN Convergence       | <==== may be empty
          +---------------------------+
          |           PSN             |
          +---------------------------+
          |         Data-Link         |
          +---------------------------+
          |          Physical         |
          +---------------------------+

                    Figure 1.  Logical Protocol Layering Model

   The payload is transported over the Encapsulation Layer.  The
   Encapsulation Layer carries any information, not already present
   within the payload itself, that is needed by the PW CE-bound PE
   interface to send the payload to the CE via the physical interface.
   If no further information is needed in the payload itself, this layer
   is empty.

   The Encapsulation Layer also provides support for real-time
   processing, and if needed for sequencing.

   The PW Demultiplexer layer provides the ability to deliver multiple
   PWs over a single PSN tunnel.  The PW demultiplexer value used to
   identify the PW in the data plane may be unique per PE, but this is
   not a PWE3 requirement.  It must, however, be unique per tunnel
   endpoint.  If it is necessary to identify a particular tunnel, then
   that is the responsibility of the PSN layer.

   The PSN Convergence layer provides the enhancements needed to make
   the PSN conform to the assumed PSN service requirement.  Therefore,
   this layer provides a consistent interface to the PW, making the PW
   independent of the PSN type.  If the PSN already meets the service
   requirements, this layer is empty.






Bryant & Pate               Standards Track                     [Page 7]



RFC 3985                   PWE3 Architecture                  March 2005


   The PSN header, MAC/Data-Link, and Physical Layer definitions are
   outside the scope of this document.  The PSN can be IPv4, IPv6, or
   MPLS.

3.2.  Domain of PWE3

   PWE3 defines the Encapsulation Layer, the method of carrying various
   payload types, and the interface to the PW Demultiplexer Layer.  It
   is expected that the other layers will be provided by tunneling
   methods such as L2TP or MPLS over the PSN.

3.3.  Payload Types

   The payload is classified into the following generic types of native
   data units:

       o Packet
       o Cell
       o Bit stream
       o Structured bit stream

   Within these generic types there are specific service types:

       Generic Payload Type    PW Service
       --------------------    ----------
       Packet                  Ethernet (all types), HDLC framing,
                               Frame Relay, ATM AAL5 PDU.

       Cell                    ATM.

       Bit stream              Unstructured E1, T1, E3, T3.

       Structured bit stream   SONET/SDH (e.g., SPE, VT, NxDS0).

3.3.1.  Packet Payload

   A packet payload is a variable-size data unit delivered to the PE via
   the AC.  A packet payload may be large compared to the PSN MTU.  The
   delineation of the packet boundaries is encapsulation specific.  HDLC
   or Ethernet PDUs can be considered examples of packet payloads.
   Typically, a packet will be stripped of transmission overhead such as
   HDLC flags and stuffing bits before transmission over the PW.

   A packet payload would normally be relayed across the PW as a single
   unit.  However, there will be cases where the combined size of the
   packet payload and its associated PWE3 and PSN headers exceeds the
   PSN path MTU.  In these cases, some fragmentation methodology has to
   be applied.  This may, for example, be the case when a user provides



Bryant & Pate               Standards Track                     [Page 8]



RFC 3985                   PWE3 Architecture                  March 2005


   the service and attaches to the service provider via Ethernet, or
   when nested pseudo-wires are involved.  Fragmentation is discussed in
   more detail in section 5.3.

   A packet payload may need sequencing and real-time support.

   In some situations, the packet payload may be selected from the
   packets presented on the emulated wire on the basis of some sub-
   multiplexing technique.  For example, one or more Frame Relay PDUs
   may be selected for transport over a particular pseudo wire based on
   the Frame Relay Data-Link Connection Identifier (DLCI), or, in the
   case of Ethernet payloads, by using a suitable MAC bridge filter.
   This is a forwarder function, and this selection would therefore be
   made before the packet was presented to the PW Encapsulation Layer.

3.3.2.  Cell Payload

   A cell payload is created by capturing, transporting, and replaying
   groups of octets presented on the wire in a fixed-size format.  The
   delineation of the group of bits that comprise the cell is specific
   to the encapsulation type.  Two common examples of cell payloads are
   ATM 53-octet cells, and the larger 188-octet MPEG Transport Stream
   packets [DVB].

   To reduce per-PSN packet overhead, multiple cells may be concatenated
   into a single payload.  The Encapsulation Layer may consider the
   payload complete on the expiry of a timer, after a fixed number of
   cells have been received or when a significant cell (e.g., an ATM OAM
   cell) has been received.  The benefit of concatenating multiple PDUs
   should be weighed against a possible increase in packet delay
   variation and the larger penalty incurred by packet loss.  In some
   cases, it may be appropriate for the Encapsulation Layer to perform
   some type of compression, such as silence suppression or voice
   compression.

   The generic cell payload service will normally need sequence number
   support and may also need real-time support.  The generic cell
   payload service would not normally require fragmentation.

   The Encapsulation Layer may apply some form of compression to some of
   these sub-types (e.g., idle cells may be suppressed).

   In some instances, the cells to be incorporated in the payload may be
   selected by filtering them from the stream of cells presented on the
   wire.  For example, an ATM PWE3 service may select cells based on
   their VCI or VPI fields.  This is a forwarder function, and the
   selection would therefore be made before the packet was presented to
   the PW Encapsulation Layer.



Bryant & Pate               Standards Track                     [Page 9]



RFC 3985                   PWE3 Architecture                  March 2005


3.3.3.  Bit Stream

   A bit stream payload is created by capturing, transporting, and
   replaying the bit pattern on the emulated wire, without taking
   advantage of any structure that, on inspection, may be visible within
   the relayed traffic (i.e., the internal structure has no effect on
   the fragmentation into packets).

   In some instances it is possible to apply suppression to bit streams.
   For example, E1 and T1 send "all-ones" to indicate failure.  This
   condition can be detected without any knowledge of the structure of
   the bit stream, and transmission of packetized can be data
   suppressed.

   This service will require sequencing and real-time support.

3.3.4.  Structured Bit Stream

   A structured bit stream payload is created by using some knowledge of
   the underlying structure of the bit stream to capture, transport, and
   replay the bit pattern on the emulated wire.

   Two important points distinguish structured and unstructured bit
   streams:

       o Some parts of the original bit stream may be stripped in the
         PSN-bound direction by an NSP block.  For example, in
         Structured SONET the section and line overhead (and possibly
         more) may be stripped.  A framer is required to enable such
         stripping.  It is also required for frame/payload alignment for
         fractional T1/E1 applications.

       o The PW must preserve the structure across the PSN so that the
         CE-bound NSP block can insert it correctly into the
         reconstructed unstructured bit stream.  The stripped
         information (such as SONET pointer justifications) may appear
         in the encapsulation layer to facilitate this reconstitution.

   As an option, the Encapsulation Layer may also perform silence/idle
   suppression or similar compression on a structured bit stream.

   Structured bit streams are distinguished from cells in that the
   structures may be too long to be carried in a single packet.  Note
   that "short" structures are indistinguishable from cells and may
   benefit from the use of methods described in section 3.3.2.

   This service requires sequencing and real-time support.




Bryant & Pate               Standards Track                    [Page 10]



RFC 3985                   PWE3 Architecture                  March 2005


3.3.5.  Principle of Minimum Intervention

   To minimize the scope of information, and to improve the efficiency
   of data flow through the Encapsulation Layer, the payload should be
   transported as received, with as few modifications as possible
   [RFC1958].

   This minimum intervention approach decouples payload development from
   PW development and requires fewer translations at the NSP in a system
   with similar CE interfaces at each end.  It also prevents unwanted
   side effects due to subtle misrepresentation of the payload in the
   intermediate format.

   An approach that does intervene can be more wire efficient in some
   cases and may result in fewer translations at the NSP whereby the CE
   interfaces are of different types.  Any intermediate format
   effectively becomes a new framing type, requiring documentation and
   assured interoperability.  This increases the amount of work for
   handling the protocol that the intermediate format carries and is
   undesirable.

4.  Architecture of Pseudo Wires

   This section describes the PWE3 architectural model.



























Bryant & Pate               Standards Track                    [Page 11]



RFC 3985                   PWE3 Architecture                  March 2005


4.1.  Network Reference Model

   Figure 2 illustrates the network reference model for point-to-point
   PWs.

            |<-------------- Emulated Service ---------------->|
            |                                                  |
            |          |<------- Pseudo Wire ------>|          |
            |          |                            |          |
            |          |    |<-- PSN Tunnel -->|    |          |
            |          V    V                  V    V          |
            V    AC    +----+                  +----+     AC   V
      +-----+    |     | PE1|==================| PE2|     |    +-----+
      |     |----------|............PW1.............|----------|     |
      | CE1 |    |     |    |                  |    |     |    | CE2 |
      |     |----------|............PW2.............|----------|     |
      +-----+  ^ |     |    |==================|    |     | ^  +-----+
            ^  |       +----+                  +----+     | |  ^
            |  |   Provider Edge 1         Provider Edge 2  |  |
            |  |                                            |  |
      Customer |                                            | Customer
      Edge 1   |                                            | Edge 2
               |                                            |
               |                                            |
         Native service                               Native service

                   Figure 2.  PWE3 Network Reference Model

   The two PEs (PE1 and PE2) have to provide one or more PWs on behalf
   of their client CEs (CE1 and CE2) to enable the client CEs to
   communicate over the PSN.  A PSN tunnel is established to provide a
   data path for the PW.  The PW traffic is invisible to the core
   network, and the core network is transparent to the CEs.  Native data
   units (bits, cells, or packets) arrive via the AC, are encapsulated
   in a PW-PDU, and are carried across the underlying network via the
   PSN tunnel.  The PEs perform the necessary encapsulation and
   decapsulation of PW-PDUs and handle any other functions required by
   the PW service, such as sequencing or timing.

4.2.  PWE3 Pre-processing

   Some applications have to perform operations on the native data units
   received from the CE (including both payload and signaling traffic)
   before they are transmitted across the PW by the PE.  Examples
   include Ethernet bridging, SONET cross-connect, translation of
   locally-significant identifiers such as VCI/VPI, or translation to
   another service type.  These operations could be carried out in
   external equipment, and the processed data could be sent to the PE



Bryant & Pate               Standards Track                    [Page 12]



RFC 3985                   PWE3 Architecture                  March 2005


   over one or more physical interfaces.  In most cases, could be in
   undertaking these operations within the PE provides cost and
   operational benefits.  Processed data is then presented to the PW via
   a virtual interface within the PE.  These pre-processing operations
   are included in the PWE3 reference model to provide a common
   reference point, but the detailed description of these operations is
   outside the scope of the PW definition given here.

                       PW
                    End Service
                        |
                        |<------- Pseudo Wire ------>|
                        |                            |
                        |    |<-- PSN Tunnel -->|    |
                        V    V                  V    V     PW
                  +-----+----+                  +----+ End Service
       +-----+    |PREP | PE1|==================| PE2|     |    +-----+
       |     |    |     |............PW1.............|----------|     |
       | CE1 |----|     |    |                  |    |     |    | CE2 |
       |     | ^  |     |............PW2.............|----------|     |
       +-----+ |  |     |    |==================|    |     | ^  +-----+
               |  +-----+----+                  +----+     | |
               |        ^                                  | |
               |        |                                  | |
               |        |<------- Emulated Service ------->| |
               |        |                                    |
               | Virtual physical                            |
               |  termination                                |
               |        ^                                    |
          CE1 native    |                                CE2 native
           service      |                                service
                        |
                   CE2 native
                    service

       Figure 3.  Pre-processing within the PWE3 Network Reference Model

   Figure 3 shows the interworking of one PE with pre-processing (PREP),
   and a second without this functionality.  This reference point
   emphasizes that the functional interface between PREP and the PW is
   that represented by a physical interface carrying the service.  This
   effectively defines the necessary inter-working specification.

   The operation of a system in which both PEs include PREP
   functionality is also supported.






Bryant & Pate               Standards Track                    [Page 13]



RFC 3985                   PWE3 Architecture                  March 2005


   The required pre-processing can be divided into two components:

       o Forwarder (FWRD)
       o Native Service Processing (NSP)

4.2.1.  Forwarders

   Some applications have to forward payload elements selectively from
   one or more ACs to one or more PWs.  In such cases, there will also be
   a need to perform the inverse function on PWE3-PDUs received by a PE
   from the PSN.  This is the function of the forwarder.

   The forwarder selects the PW based on, for example, the incoming AC,
   the contents of the payload, or some statically and/or dynamically
   configured forwarding information.

               +----------------------------------------+
               |                PE Device               |
               +----------------------------------------+
        Single |                 |                      |
        AC     |                 |        Single        | PW Instance
       <------>o   Forwarder     +      PW Instance     X<===========>
               |                 |                      |
               +----------------------------------------+

                   Figure 4a.  Simple Point-to-Point Service

               +----------------------------------------+
               |                PE Device               |
               +----------------------------------------+
       Multiple|                 |        Single        | PW Instance
       AC      |                 +      PW Instance     X<===========>
       <------>o                 |                      |
               |                 |----------------------|
       <------>o                 |        Single        | PW Instance
               |    Forwarder    +      PW Instance     X<===========>
       <------>o                 |                      |
               |                 |----------------------|
       <------>o                 |        Single        | PW Instance
               |                 +      PW Instance     X<===========>
       <------>o                 |                      |
               +----------------------------------------+

               Figure 4b.  Multiple AC to Multiple PW Forwarding

   Figure 4a shows a simple forwarder that performs some type of
   filtering operation.  Because the forwarder has a single input and a
   single output interface, filtering is the only type of forwarding



Bryant & Pate               Standards Track                    [Page 14]



RFC 3985                   PWE3 Architecture                  March 2005


   operation that applies.  Figure 4b shows a more general forwarding
   situation where payloads are extracted from one or more ACs and
   directed to one or more PWs.  In this case filtering, direction, and
   combination operations may be performed on the payloads.  For
   example, if the AC were Frame Relay, the forwarder might perform
   Frame Relay switching and the PW instances might be the inter-switch
   links.

4.2.2.  Native Service Processing

   Some applications required some form of data or address translation,
   or some other operation requiring knowledge of the semantics of the
   payload.  This is the function of the Native Service Processor (NSP).

   The use of the NSP approach simplifies the design of the PW by
   restricting a PW to homogeneous operation.  NSP is included in the
   reference model to provide a defined interface to this functionality.
   The specification of the various types of NSP is outside the scope of
   PWE3.

                +----------------------------------------+
                |                PE Device               |
        Multiple+----------------------------------------+
        AC      |      |          |        Single        | PW Instance
        <------>o  NSP #          +      PW Instance     X<===========>
                |      |          |                      |
                |------|          |----------------------|
                |      |          |        Single        | PW Instance
        <------>o  NSP #Forwarder +      PW Instance     X<===========>
                |      |          |                      |
                |------|          |----------------------|
                |      |          |        Single        | PW Instance
        <------>o  NSP #          +      PW Instance     X<===========>
                |      |          |                      |
                +----------------------------------------+

          Figure 5.  NSP in a Multiple AC to Multiple PW Forwarding PE

   Figure 5 illustrates the relationship between NSP, forwarder, and PWs
   in a PE.  The NSP function may apply any transformation operation
   (modification, injection, etc.) on the payloads as they pass between
   the physical interface to the CE and the virtual interface to the
   forwarder.  These transformation operations will, of course, be
   limited to those that have been implemented in the data path, and
   that are enabled by the PE configuration.  A PE device may contain
   more than one forwarder.





Bryant & Pate               Standards Track                    [Page 15]



RFC 3985                   PWE3 Architecture                  March 2005


   This model also supports the operation of a system in which the NSP
   functionality includes terminating the data-link, and the application
   of Network Layer processing to the payload.

4.3.  Maintenance Reference Model

   Figure 6 illustrates the maintenance reference model for PWs.

             |<------- CE (end-to-end) Signaling ------>|
             |     |<---- PW/PE Maintenance ----->|     |
             |     |     |<-- PSN Tunnel -->|     |     |
             |     |     |    Signaling     |     |     |
             |     V     V  (out of scope)  V     V     |
             v     +-----+                  +-----+     v
       +-----+     | PE1 |==================| PE2 |     +-----+
       |     |-----|.............PW1..............|-----|     |
       | CE1 |     |     |                  |     |     | CE2 |
       |     |-----|.............PW2..............|-----|     |
       +-----+     |     |==================|     |     +-----+
                   +-----+                  +-----+
       Customer   Provider                 Provider     Customer
        Edge 1     Edge 1                   Edge 2       Edge 2

                  Figure 6.  PWE3 Maintenance Reference Model

   The following signaling mechanisms are required:

       o The CE (end-to-end) signaling is between the CEs.  This
         signaling could be Frame Relay PVC status signaling, ATM SVC
         signaling, TDM CAS signaling, etc.

       o The PW/PE Maintenance is used between the PEs (or NSPs) to set
         up, maintain, and tear down PWs, including any required
         coordination of parameters.

       o The PSN Tunnel signaling controls the PW multiplexing and some
         elements of the underlying PSN.  Examples are L2TP control
         protocol, MPLS LDP, and RSVP-TE.  The definition of the
         information that PWE3 needs signaled is within the scope of
         PWE3, but the signaling protocol itself is not.











Bryant & Pate               Standards Track                    [Page 16]



RFC 3985                   PWE3 Architecture                  March 2005


4.4.  Protocol Stack Reference Model

   Figure 7 illustrates the protocol stack reference model for PWs.

    +-----------------+                           +-----------------+
    |Emulated Service |                           |Emulated Service |
    |(e.g., TDM, ATM) |<==== Emulated Service ===>|(e.g., TDM, ATM) |
    +-----------------+                           +-----------------+
    |    Payload      |                           |    Payload      |
    |  Encapsulation  |<====== Pseudo Wire ======>|  Encapsulation  |
    +-----------------+                           +-----------------+
    |PW Demultiplexer |                           |PW Demultiplexer |
    |   PSN Tunnel,   |<======= PSN Tunnel ======>|  PSN Tunnel,    |
    | PSN & Physical  |                           | PSN & Physical  |
    |     Layers      |                           |    Layers       |
    +-------+---------+        ___________        +---------+-------+
            |                /             \                |
            +===============/     PSN       \===============+
                            \               /
                             \_____________/

               Figure 7.  PWE3 Protocol Stack Reference Model

   The PW provides the CE with an emulated physical or virtual
   connection to its peer at the far end.  Native service PDUs from the
   CE are passed through an Encapsulation Layer at the sending PE and
   then sent over the PSN.  The receiving PE removes the encapsulation
   and restores the payload to its native format for transmission to the
   destination CE.

4.5.  Pre-processing Extension to Protocol Stack Reference Model

   Figure 8 illustrates how the protocol stack reference model is
   extended to include the provision of pre-processing (forwarding and
   NSP).  This shows the placement of the physical interface relative to
   the CE.















Bryant & Pate               Standards Track                    [Page 17]



RFC 3985                   PWE3 Architecture                  March 2005


     /======================================\
     H             Forwarder                H<----Pre-processing
     H----------------======================/
     H Native Service H   |                 |
     H  Processing    H   |                 |
     \================/   |                 |
     |                |   | Emulated        |
     | Service        |   | Service         |
     | Interface      |   | (TDM, ATM,      |
     | (TDM, ATM,     |   | Ethernet,       |<== Emulated Service ==
     | Ethernet,      |   | Frame Relay,    |
     | Frame Relay,   |   | etc.)           |
     | etc.)          |   +-----------------+
     |                |   |    Payload      |
     |                |   | Encapsulation   |<=== Pseudo Wire ======
     |                |   +-----------------+
     |                |   |PW Demultiplexer |
     |                |   |  PSN Tunnel,    |
     |                |   | PSN & Physical  |<=== PSN Tunnel =======
     |                |   |    Headers      |
     +----------------+   +-----------------+
     |   Physical     |   |   Physical      |
     +-------+--------+   +-------+---------+
             |                    |
             |                    |
             |                    |
             |                    |
             |                    |
             |                    |
   To CE <---+                    +---> To PSN

       Figure 8.  Protocol Stack Reference Model with Pre-processing

5.  PW Encapsulation

   The PW Encapsulation Layer provides the necessary infrastructure to
   adapt the specific payload type being transported over the PW to the
   PW Demultiplexer Layer used to carry the PW over the PSN.

   The PW Encapsulation Layer consists of three sub-layers:

       o Payload Convergence
       o Timing
       o Sequencing

   The PW Encapsulation sub-layering and its context with the protocol
   stack are shown in Figure 9.




Bryant & Pate               Standards Track                    [Page 18]



RFC 3985                   PWE3 Architecture                  March 2005


          +---------------------------+
          |         Payload           |
          /===========================\ <------ Encapsulation
          H    Payload Convergence    H         Layer
          H---------------------------H
          H          Timing           H
          H---------------------------H
          H        Sequencing         H
          \===========================/
          |     PW Demultiplexer      |
          +---------------------------+
          |     PSN Convergence       |
          +---------------------------+
          |           PSN             |
          +---------------------------+
          |         Data-Link         |
          +---------------------------+
          |          Physical         |
          +---------------------------+

                  Figure 9.  PWE3 Encapsulation Layer in Context

   The Payload Convergence sub-layer is highly tailored to the specific
   payload type.  However grouping a number of target payload types into
   a generic class, and then providing a single convergence sub-layer
   type common to the group, reduces the number of payload convergence
   sub-layer types.  This decreases implementation complexity.  The
   provision of per-packet signaling and other out-of-band information
   (other than sequencing or timing) is undertaken by this layer.

   The Timing and Sequencing Layers provide generic services to the
   Payload Convergence Layer for all payload types that require them.

5.1.  Payload Convergence Layer

5.1.1.  Encapsulation

   The primary task of the Payload Convergence Layer is the
   encapsulation of the payload in PW-PDUs.  The native data units to be
   encapsulated may contain an L2 header or L1 overhead.  This is
   service specific.  The Payload Convergence header carries the
   additional information needed to replay the native data units at the
   CE-bound physical interface.  The PW Demultiplexer header is not
   considered part of the PW header.







Bryant & Pate               Standards Track                    [Page 19]



RFC 3985                   PWE3 Architecture                  March 2005


   Not all the additional information needed to replay the native data
   units have to be carried in the PW header of the PW PDUs.  Some
   information (e.g., service type of a PW) may be stored as state
   information at the destination PE during PW set up.

5.1.2.  PWE3 Channel Types

   The PW Encapsulation Layer and its associated signaling require one
   or more of the following types of channels from its underlying PW
   Demultiplexer and PSN Layers (channel type 1 plus one or more of
   channel types 2 through 4):

   1. A reliable control channel for signaling line events, status
      indications, and, in exceptional cases, CE-CE events that must be
      translated and sent reliably between PEs.  PWE3 may need this type
      of control channel to provide faithful emulation of complex data-
      link protocols.

   2. A high-priority, unreliable, sequenced channel.  A typical use is
      for CE-to-CE signaling.  "High priority" may simply be indicated
      via the DSCP bits for IP or the EXP bits for MPLS, giving the
      packet priority during transit.  This channel type could also use
      a bit in the tunnel header itself to indicate that packets
      received at the PE should be processed with higher priority
      [RFC2474].

   3. A sequenced channel for data traffic that is sensitive to packet
      reordering (one classification for use could be for any non-IP
      traffic).

   4. An unsequenced channel for data traffic insensitive to packet
      order.

   The data channels (2, 3, and 4 above) should be carried "in band"
   with one another to as much of a degree as is reasonably possible on
   a PSN.

   Where end-to-end connectivity may be disrupted by address translation
   [RFC3022], access-control lists, firewalls, etc., the control channel
   may be able to pass traffic and setup the PW, while the PW data
   traffic is blocked by one or more of these mechanisms.  In these
   cases unless the control channel is also carried "in band", the
   signaling to set up the PW will not confirm the existence of an end-
   to-end data path.  In some cases there is a need to synchronize CE
   events with the data carried over a PW.  This is especially the case






Bryant & Pate               Standards Track                    [Page 20]



RFC 3985                   PWE3 Architecture                  March 2005


   with TDM circuits (e.g., the on-hook/off-hook events in PSTN switches
   might be carried over a reliable control channel whereas the
   associated bit stream is carried over a sequenced data channel).

   PWE3 channel types that are not needed by the supported PWs need not
   be included in such an implementation.

5.1.3.  Quality of Service Considerations

   Where possible, it is desirable to employ mechanisms to provide PW
   Quality of Service (QoS) support over PSNs.

5.2.  Payload-Independent PW Encapsulation Layers

   Two PWE3 Encapsulation sub-layers provide common services to all
   payload types: Sequencing and Timing.  These services are optional
   and are only used if a particular PW instance needs them.  If the
   service is not needed, the associated header may be omitted in order
   to conserve processing and network resources.

   Sometimes a specific payload type will require transport with or
   without sequence and/or real-time support.  For example, an invariant
   of Frame Relay transport is the preservation of packet order.  Some
   Frame Relay applications expect delivery in order and may not cope
   with reordering of the frames.  However, where the Frame Relay
   service is itself only being used to carry IP, it may be desirable to
   relax this constraint to reduce per-packet processing cost.

   The guiding principle is that, when possible, an existing IETF
   protocol should be used to provide these services.  When a suitable
   protocol is not available, the existing protocol should be extended
   or modified to meet the PWE3 requirements, thereby making that
   protocol available for other IETF uses.  In the particular case of
   timing, more than one general method may be necessary to provide for
   the full scope of payload timing requirements.

5.2.1.  Sequencing

   The sequencing function provides three services: frame ordering,
   frame duplication detection, and frame loss detection.  These
   services allow the emulation of the invariant properties of a
   physical wire.  Support for sequencing depends on the payload type
   and may be omitted if it is not needed.








Bryant & Pate               Standards Track                    [Page 21]



RFC 3985                   PWE3 Architecture                  March 2005


   The size of the sequence-number space depends on the speed of the
   emulated service, and on the maximum time of the transient conditions
   in the PSN.  A sequence number space greater than 2^16 may therefore
   be needed to prevent the sequence number space from wrapping during
   the transient.

5.2.1.1.  Frame Ordering

   When packets carrying the PW-PDUs traverse a PSN, they may arrive out
   of order at the destination PE.  For some services, the frames
   (control frames, data frames, or both) must be delivered in order.
   For these services, some mechanism must be provided for ensuring in-
   order delivery.  Providing a sequence number in the sequence sub-
   layer header for each packet is one possible approach.
   Alternatively, it can be noted that sequencing is a subset of the
   problem of delivering timed packets, and that a single combined
   mechanism such as [RFC3550] may be employed.

   There are two possible misordering strategies:

       o Drop misordered PW PDUs.

       o Try to sort PW PDUs into the correct order.

   The choice of strategy will depend on

       o how critical the loss of packets is to the operation of the PW
         (e.g., the acceptable bit error rate),

       o the speeds of the PW and PSN,

       o the acceptable delay (as delay must be introduced to reorder),
         and

       o the expected incidence of misordering.

5.2.1.2.  Frame Duplication Detection

   In rare cases, packets traversing a PW may be duplicated by the
   underlying PSN.  For some services, frame duplication is not
   acceptable.  For these services, some mechanism must be provided to
   ensure that duplicated frames will not be delivered to the
   destination CE.  The mechanism may be the same as that used to ensure
   in-order frame delivery.







Bryant & Pate               Standards Track                    [Page 22]



RFC 3985                   PWE3 Architecture                  March 2005


5.2.1.3.  Frame Loss Detection

   A destination PE can determine whether a frame has been lost by
   tracking the sequence numbers of the PW PDUs received.

   In some instances, if a PW PDU fails to arrive within a certain time,
   a destination PE will have to presume that it is lost.  If a PW-PDU
   that has been processed as lost subsequently arrives, the destination
   PE must discard it.

5.2.2.  Timing

   A number of native services have timing expectations based on the
   characteristics of the networks they were designed to travel over.
   The emulated service may have to duplicate these network
   characteristics as closely as possible: e.g., in delivering native
   traffic with bitrate, jitter, wander, and delay characteristics
   similar to those received at the sending PE.

   In such cases, the receiving PE has to play out the native traffic as
   it was received at the sending PE.  This relies on timing information
   either sent between the two PEs, or in some cases received from an
   external reference.

   Therefore, Timing Sub-layer must support two timing functions:  clock
   recovery and timed payload delivery.  A particular payload type may
   require either or both of these services.

5.2.2.1.  Clock Recovery

   Clock recovery is the extraction of output transmission bit timing
   information from the delivered packet stream, and it requires a
   suitable mechanism.  A physical wire carries the timing information
   natively, but extracting timing from a highly jittered source, such
   as packet stream, is a relatively complex task.  Therefore, it is
   desirable that an existing real-time protocol such as [RFC3550] be
   used for this purpose, unless it can be shown that this is unsuitable
   or unnecessary for a particular payload type.

5.2.2.2.  Timed Delivery

   Timed delivery is the delivery of non-contiguous PW PDUs to the PW
   output interface with a constant phase relative to the input
   interface.  The timing of the delivery may be relative to a clock
   derived from the packet stream received over the PSN clock recovery,
   or to an external clock.





Bryant & Pate               Standards Track                    [Page 23]



RFC 3985                   PWE3 Architecture                  March 2005


5.3.  Fragmentation

   Ideally, a payload would be relayed across the PW as a single unit.
   However, there will be cases where the combined size of the payload
   and its associated PWE3 and PSN headers will exceed the PSN path MTU.
   When a packet size exceeds the MTU of a given network, fragmentation
   and reassembly have to be performed for the packet to be delivered.
   Since fragmentation and reassembly generally consume considerable
   network resources, as compared to simply switching a packet in its
   entirety, the need for fragmentation and reassembly throughout a
   network should be reduced or eliminated to the extent possible.  Of
   particular concern for fragmentation and reassembly are aggregation
   points where large numbers of PWs are processed (e.g., at the PE).

   Ideally, the equipment originating the traffic sent over the PW will
   have adaptive measures in place (e.g., [RFC1191], [RFC1981]) that
   ensure that packets needing to be fragmented are not sent.  When this
   fails, the point closest to the sending host with fragmentation and
   reassembly capabilities should attempt to reduce the size of packets
   to satisfy the PSN MTU.  Thus, in the reference model for PWE3
   (Figure 3), fragmentation should first be performed at the CE if
   possible.  Only if the CE cannot adhere to an acceptable MTU size for
   the PW should the PE attempt its own fragmentation method.

   In cases where MTU management fails to limit the payload to a size
   suitable for transmission of the PW, the PE may fall back to either a
   generic PW fragmentation method or, if available, the fragmentation
   service of the underlying PSN.

   It is acceptable for a PE implementation not to support
   fragmentation.  A PE that does not will drop packets that exceed the
   PSN MTU, and the management plane of the encapsulating PE may be
   notified.

   If the length of a L2/L1 frame, restored from a PW PDU, exceeds the
   MTU of the destination AC, it must be dropped.  In this case, the
   management plane of the destination PE may be notified.

5.4.  Instantiation of the Protocol Layers

   This document does not address the detailed mapping of the Protocol
   Layering model to existing or future IETF standards.  The
   instantiation of the logical Protocol Layering model is shown in
   Figure 9.







Bryant & Pate               Standards Track                    [Page 24]



RFC 3985                   PWE3 Architecture                  March 2005


5.4.1.  PWE3 over an IP PSN

   The protocol definition of PWE3 over an IP PSN should employ existing
   IETF protocols where possible.

       +---------------------+              +-------------------------+
       |      Payload        |------------->| Raw payload if possible |
       /=====================\              +-------------------------+
       H Payload Convergence H-----------+->|     Flags, seq #, etc.  |
       H---------------------H          /   +-------------------------+
       H       Timing        H---------/--->|            RTP          |
       H---------------------H        /     +-------------+           |
       H     Sequencing      H----one of    |             |
       \=====================/        \     |             +-----------+
       |  PW Demultiplexer   |---------+--->|     L2TP, MPLS, etc.    |
       +---------------------+              +-------------------------+
       |  PSN Convergence    |------------->|       Not needed        |
       +---------------------+              +-------------------------+
       |        PSN          |------------->|            IP           |
       +---------------------+              +-------------------------+
       |      Data-Link      |------------->|         Data-link       |
       +---------------------+              +-------------------------+
       |       Physical      |------------->|          Physical       |
       +---------------------+              +-------------------------+

                        Figure 10.  PWE3 over an IP PSN

   Figure 10 shows the protocol layering for PWE3 over an IP PSN.  As a
   rule, the payload should be carried as received from the NSP, with
   the Payload Convergence Layer provided when needed.  However, in
   certain circumstances it may be justifiable to transmit the payload
   in some processed form.  The reasons for this must be documented in
   the Encapsulation Layer definition for that payload type.

   Where appropriate, explicit timing is provided by RTP [RFC3550],
   which, when used, also provides a sequencing service.  When the PSN
   is UDP/IP, the RTP header follows the UDP header and precedes the PW
   control field.  For all other cases the RTP header follows the PW
   control header.

   The encapsulation layer may additionally carry a sequence number.
   Sequencing is to be provided either by RTP or by the PW encapsulation
   layer, but not by both.








Bryant & Pate               Standards Track                    [Page 25]



RFC 3985                   PWE3 Architecture                  March 2005


   PW Demultiplexing is provided by the PW label, which may take the
   form specified in a number of IETF protocols;  e.g., an MPLS label
   [MPLSIP], an L2TP session ID [RFC3931], or a UDP port number
   [RFC768].  When PWs are carried over IP, the PSN Convergence Layer
   will not be needed.

   As a special case, if the PW Demultiplexer is an MPLS label, the
   protocol architecture of section 5.4.2 can be used instead of the
   protocol architecture of this section.

5.4.2.  PWE3 over an MPLS PSN

   The MPLS ethos places importance on wire efficiency.  By using a
   control word, some components of the PWE3 protocol layers can be
   compressed to increase this efficiency.

   +---------------------+
   |      Payload        |
   /=====================\
   H Payload Convergence H--+
   H---------------------H  |       +--------------------------------+
   H       Timing        H--------->|              RTP               |
   H---------------------H  |       +--------------------------------+
   H     Sequencing      H--+------>| Flags, Frag, Len, Seq #, etc   |
   \=====================/  |       +--------------------------------+
   |  PW Demultiplexer   |--------->|           PW Label             |
   +---------------------+  |       +--------------------------------+
   |  PSN Convergence    |--+  +--->| Outer Label or MPLS-in-IP encap|
   +---------------------+     |    +--------------------------------+
   |        PSN          |-----+
   +---------------------+
   |      Data-Link      |
   +---------------------+
   |       Physical      |
   +---------------------+

          Figure 11.  PWE3 over an MPLS PSN Using a Control Word

   Figure 11 shows the protocol layering for PWE3 over an MPLS PSN.  An
   inner MPLS label is used to provide the PW demultiplexing function.
   A control word is used to carry most of the information needed by the
   PWE3 Encapsulation Layer and the PSN Convergence Layer in a compact
   format.  The flags in the control word provide the necessary payload
   convergence.  A sequence field provides support for both in-order
   payload delivery and a PSN fragmentation service within the PSN
   Convergence Layer (supported by a fragmentation control method).
   Ethernet pads all frames to a minimum size of 64 bytes.  The MPLS
   header does not include a length indicator.  Therefore, to allow PWE3



Bryant & Pate               Standards Track                    [Page 26]



RFC 3985                   PWE3 Architecture                  March 2005


   to be carried in MPLS to pass correctly over an Ethernet data-link, a
   length correction field is needed in the control word.  As with an IP
   PSN, where appropriate, timing is provided by RTP [RFC3550].

   In some networks, it may be necessary to carry PWE3 over MPLS over
   IP.  In these circumstances, the PW is encapsulated for carriage over
   MPLS as described in this section, and then a method of carrying MPLS
   over an IP PSN (such as GRE [RFC2784], [RFC2890]) is applied to the
   resultant PW-PDU.

5.4.3.  PW-IP Packet Discrimination

   For MPLS PSNs, there is an additional constraint on the PW packet
   format.  Some label switched routers detect IP packets based on the
   initial four bits of the packet content.  To facilitate proper
   functioning, these bits in PW packets must not be the same as an IP
   version number in current use.

6.  PW Demultiplexer Layer and PSN Requirements

   PWE3 places three service requirements on the protocol layers used to
   carry it across the PSN:

       o Multiplexing
       o Fragmentation
       o Length and Delivery

6.1.  Multiplexing

   The purpose of the PW Demultiplexer Layer is to allow multiple PWs to
   be carried in a single tunnel.  This minimizes complexity and
   conserves resources.

   Some types of native service are capable of grouping multiple
   circuits into a "trunk"; e.g., multiple ATM VCs in a VP, multiple
   Ethernet VLANs on a physical media, or multiple DS0 services within a
   T1 or E1.  A PW may interconnect two end-trunks.  That trunk would
   have a single multiplexing identifier.

   When a MPLS label is used as a PW Demultiplexer, setting of the TTL
   value [RFC3032] in the PW label is application specific.










Bryant & Pate               Standards Track                    [Page 27]



RFC 3985                   PWE3 Architecture                  March 2005


6.2.  Fragmentation

   If the PSN provides a fragmentation and reassembly service of
   adequate performance, it may be used to obtain an effective MTU that
   is large enough to transport the PW PDUs.  See section 5.3 for a full
   discussion of the PW fragmentation issues.

6.3.  Length and Delivery

   PDU delivery to the egress PE is the function of the PSN Layer.

   If the underlying PSN does not provide all the information necessary
   to determine the length of a PW-PDU, the Encapsulation Layer must
   provide it.

6.4.  PW-PDU Validation

   It is a common practice to use an error detection mechanism such as a
   CRC or similar mechanism to ensure end-to-end integrity of frames.
   The PW service-specific mechanisms must define whether the packet's
   checksum shall be preserved across the PW or be removed from PE-bound
   PDUs and then be recalculated for insertion in CE-bound data.

   The former approach saves work, whereas the latter saves bandwidth.
   For a given implementation, the choice may be dictated by hardware
   restrictions, which may not allow the preservation of the checksum.

   For protocols such as ATM and FR, the scope of the checksum is
   restricted to a single link.  This is because the circuit identifiers
   (e.g., FR DLCI or ATM VPI/VCI) only have local significance and are
   changed on each hop or span.  If the circuit identifier (and thus
   checksum) were going to change as part of the PW emulation, it would
   be more efficient to strip and recalculate the checksum.

   The service-specific document for each protocol must describe the
   validation scheme to be used.

6.5.  Congestion Considerations

   The PSN carrying the PW may be subject to congestion.  The congestion
   characteristics will vary with the PSN type, the network architecture
   and configuration, and the loading of the PSN.

   If the traffic carried over the PW is known to be TCP friendly (by,
   for example, packet inspection), packet discard in the PSN will
   trigger the necessary reduction in offered load, and no additional
   congestion avoidance action is necessary.




Bryant & Pate               Standards Track                    [Page 28]



RFC 3985                   PWE3 Architecture                  March 2005


   If the PW is operating over a PSN that provides enhanced delivery,
   the PEs should monitor packet loss to ensure that the requested
   service is actually being delivered.  If it is not, then the PE
   should assume that the PSN is providing a best-effort service and
   should use the best-effort service congestion avoidance measures
   described below.

   If best-effort service is being used and the traffic is not known to
   be TCP friendly, the PEs should monitor packet loss to ensure that
   the loss rate is within acceptable parameters.  Packet loss is
   considered acceptable if a TCP flow across the same network path and
   experiencing the same network conditions would achieve an average
   throughput, measured on a reasonable timescale, not less than that
   which the PW flow is achieving.  This condition can be satisfied by
   implementing a rate-limiting measure in the NSP, or by shutting down
   one or more PWs.  The choice of which approach to use depends upon
   the type of traffic being carried.  Where congestion is avoided by
   shutting down a PW, a suitable mechanism must be provided to prevent
   it from immediately returning to service and causing a series of
   congestion pulses.

   The comparison to TCP cannot be specified exactly but is intended as
   an "order-of-magnitude" comparison in timescale and throughput.  The
   timescale on which TCP throughput is measured is the round-trip time
   of the connection.  In essence, this requirement states that it is
   not acceptable to deploy an application (using PWE3 or any other
   transport protocol) on the best-effort Internet, which consumes
   bandwidth arbitrarily and does not compete fairly with TCP within an
   order of magnitude.  One method of determining an acceptable PW
   bandwidth is described in [RFC3448].

7.  Control Plane

   This section describes PWE3 control plane services.

7.1.  Setup or Teardown of Pseudo Wires

   A PW must be set up before an emulated service can be established and
   must be torn down when an emulated service is no longer needed.

   Setup or teardown of a PW can be triggered by an operator command,
   from the management plane of a PE, by signaling set-up or teardown of
   an AC (e.g., an ATM SVC), or by an auto-discovery mechanism.

   During the setup process, the PEs have to exchange information (e.g.,
   learn each other's capabilities).  The tunnel signaling protocol may
   be extended to provide mechanisms that enable the PEs to exchange all
   necessary information on behalf of the PW.



Bryant & Pate               Standards Track                    [Page 29]



RFC 3985                   PWE3 Architecture                  March 2005


   Manual configuration of PWs can be considered a special kind of
   signaling and is allowed.

7.2.  Status Monitoring

   Some native services have mechanisms for status monitoring.  For
   example, ATM supports OAM for this purpose.  For these services, the
   corresponding emulated services must specify how to perform status
   monitoring.

7.3.  Notification of Pseudo Wire Status Changes

7.3.1.  Pseudo Wire Up/Down Notification

   If a native service requires bi-directional connectivity, the
   corresponding emulated service can only be signaled as being up when
   the PW and PSN tunnels (if used), are functional in both directions.

   Because the two CEs of an emulated service are not adjacent, a
   failure may occur at a place so that one or both physical links
   between the CEs and PEs remain up.  For example, in Figure 2, if the
   physical link between CE1 and PE1 fails, the physical link between
   CE2 and PE2 will not be affected and will remain up.  Unless CE2 is
   notified about the remote failure, it will continue to send traffic
   over the emulated service to CE1.  Such traffic will be discarded at
   PE1.  Some native services have failure notification so that when the
   services fail, both CEs will be notified.  For these native services,
   the corresponding PWE3 service must provide a failure notification
   mechanism.

   Similarly, if a native service has notification mechanisms so that
   all the affected services will change status from "Down" to "Up" when
   a network failure is fixed, the corresponding emulated service must
   provide a similar mechanism for doing so.

   These mechanisms may already be built into the tunneling protocol.
   For example, the L2TP control protocol [RFC2661] [RFC3931] has this
   capability, and LDP has the ability to withdraw the corresponding
   MPLS label.

7.3.2.  Misconnection and Payload Type Mismatch

   With PWE3, misconnection and payload type mismatch can occur.
   Misconnection can breach the integrity of the system.  Payload
   mismatch can disrupt the customer network.  In both instances, there
   are security and operational concerns.





Bryant & Pate               Standards Track                    [Page 30]



RFC 3985                   PWE3 Architecture                  March 2005


   The services of the underlying tunneling mechanism and its associated
   control protocol can be used to mitigate this.  As part of the PW
   setup, a PW-TYPE identifier is exchanged.  This is then used by the
   forwarder and the NSP to verify the compatibility of the ACs.

7.3.3.  Packet Loss, Corruption, and Out-of-Order Delivery

   A PW can incur packet loss, corruption, and out-of-order delivery on
   the PSN path between the PEs.  This can affect the working condition
   of an emulated service.  For some payload types, packet loss,
   corruption, and out-of-order delivery can be mapped either to a bit
   error burst, or to loss of carrier on the PW.  If a native service
   has some mechanism to deal with bit error, the corresponding PWE3
   service should provide a similar mechanism.

7.3.4.  Other Status Notification

   A PWE3 approach may provide a mechanism for other status
   notifications, if any are needed.

7.3.5.  Collective Status Notification

   The status of a group of emulated services may be affected
   identically by a single network incident.  For example, when the
   physical link (or sub-network) between a CE and a PE fails, all the
   emulated services that go through that link (or sub-network) will
   fail.  It is likely that a group of emulated services all terminate
   at a remote CE.  There may also be multiple such CEs affected by the
   failure.  Therefore, it is desirable that a single notification
   message be used to notify failure of the whole group of emulated
   services.

   A PWE3 approach may provide a mechanism for notifying status changes
   of a group of emulated circuits.  One possible method is to associate
   each emulated service with a group ID when the PW for that emulated
   service is set up.  Multiple emulated services can then be grouped by
   associating them with the same group ID.  In status notification,
   this group ID can be used to refer all the emulated services in that
   group.  The group ID mechanism should be a mechanism provided by the
   underlying tunnel signaling protocol.

7.4.  Keep-Alive

   If a native service has a keep-alive mechanism, the corresponding
   emulated service must provide a mechanism to propagate it across the
   PW.  Transparently transporting keep-alive messages over the PW would
   follow the principle of minimum intervention.  However, to reproduce




Bryant & Pate               Standards Track                    [Page 31]



RFC 3985                   PWE3 Architecture                  March 2005


   the semantics of the native mechanism accurately, some PWs may
   require an alternative approach, such as piggy-backing on the PW
   signaling mechanism.

7.5.  Handling Control Messages of the Native Services

   Some native services use control messages for circuit maintenance.
   These control messages may be in-band (e.g., Ethernet flow control,
   ATM performance management, or TDM tone signaling) or out-of-band,
   (e.g., the signaling VC of an ATM VP, or TDM CCS signaling).

   Given the principle of minimum intervention, it is desirable that the
   PEs participate as little as possible in the signaling and
   maintenance of the native services.  This principle should not,
   however, override the need to emulate the native service
   satisfactorily.

   If control messages are passed through, it may be desirable to send
   them by using either a higher priority or a reliable channel provided
   by the PW Demultiplexer layer.  See Section 5.1.2, PWE3 Channel
   Types.

8.  Management and Monitoring

   This section describes the management and monitoring architecture for
   PWE3.

8.1.  Status and Statistics

   The PE should report the status of the interface and tabulate
   statistics that help monitor the state of the network and help
   measure service-level agreements (SLAs).  Typical counters include
   the following:

       o Counts of PW-PDUs sent and received, with and without errors.
       o Counts of sequenced PW-PDUs lost.
       o Counts of service PDUs sent and received over the PSN, with and
         without errors (non-TDM).
       o Service-specific interface counts.
       o One-way delay and delay variation.

   These counters would be contained in a PW-specific MIB, and they
   should not replicate existing MIB counters.








Bryant & Pate               Standards Track                    [Page 32]



RFC 3985                   PWE3 Architecture                  March 2005


8.2.  PW SNMP MIB Architecture

   This section describes the general architecture for SNMP MIBs used to
   manage PW services and the underlying PSN.  The intent here is to
   provide a clear picture of how all the pertinent MIBs fit together to
   form a cohesive management framework for deploying PWE3 services.
   Note that the names of MIB modules used below are suggestions and do
   not necessarily require that the actual modules used to realize the
   components in the architecture be named exactly so.

8.2.1.  MIB Layering

   The SNMP MIBs created for PWE3 should fit the architecture shown in
   Figure 12.  The architecture provides a layered modular model into
   which any supported emulated service can be connected to any
   supported PSN type.  This model fosters reuse of as much
   functionality as possible.  For instance, the emulated service layer
   MIB modules do not redefine the existing emulated service MIB module;
   rather, they only associate it with the pseudo wires used to carry
   the emulated service over the configured PSN.  In this way, the PWE3
   MIB architecture follows the overall PWE3 architecture.

   The architecture does allow for the joining of unsupported emulated
   service or PSN types by simply defining additional MIB modules to
   associate new types with existing ones.  These new modules can
   subsequently be standardized.  Note that there is a separate MIB
   module for each emulated service, as well as one for each underlying
   PSN.  These MIB modules may be used in various combinations as
   needed.






















Bryant & Pate               Standards Track                    [Page 33]



RFC 3985                   PWE3 Architecture                  March 2005


       Native
    Service MIBs    ...           ...               ...
                     |             |                 |
               +-----------+ +-----------+     +-----------+
     Service   |    CEP    | | Ethernet  |     |    ATM    |
      Layer    |Service MIB| |Service MIB| ... |Service MIB|
               +-----------+ +-----------+     +-----------+
                       \           |             /
                         \         |           /
   - - - - - - - - - - - - \ - - - | - - - - / - - - - - - -
                             \     |       /
               +-------------------------------------------+
    Generic PW |            Generic PW MIBs                |
      Layer    +-------------------------------------------+
                            /             \
   - - - - - - - - - - - - / - - - - - - - - \ - - - - - - -
                         /                     \
                       /                         \
               +--------------+             +----------------+
     PSN VC    |L2TP VC MIB(s)|             | MPLS VC MIB(s) |
      Layer    +--------------+             +----------------+
                      |                              |
     Native     +-----------+                  +-----------+
      PSN       |L2TP MIB(s)|                  |MPLS MIB(s)|
      MIBs      +-----------+                  +-----------+

               Figure 12.  MIB Module Layering Relationship
























Bryant & Pate               Standards Track                    [Page 34]



RFC 3985                   PWE3 Architecture                  March 2005


   Figure 13 shows an example for a SONET PW carried over MPLS Traffic
   Engineering Tunnel and an LDP-signaled LSP.

                            +-----------------+
                            |    SONET MIB    |  RFC3592
                            +-----------------+
                                     |
                       +------------------------------+
            Service    | Circuit Emulation Service MIB|
             Layer     +------------------------------+
           - - - - - - - - - - - - - | - - - - - - - - - - - - -
                            +-----------------+
           Generic PW       | Generic PW MIB  |
             Layer          +-----------------+
           - - - - - - - - - - - - - | - - - - - - - - - - - - -
                            +-----------------+
             PSN VC         |   MPLS VC MIBs  |
             Layer          +-----------------+
                               |           |
                  +-----------------+  +------------------+
                  | MPLS-TE-STD-MIB |  | MPLS-LSR-STD-MIB |
                  +-----------------+  +------------------+

            Figure 13.  SONET PW over MPLS PSN Service-Specific Example

8.2.2.  Service Layer MIB Modules

   This conceptual layer in the model contains MIB modules used to
   represent the relationship between emulated PWE3 services such as
   Ethernet, ATM, or Frame Relay and the pseudo-wire used to carry that
   service across the PSN.  This layer contains corresponding MIB
   modules used to mate or adapt those emulated services to the generic
   pseudo-wire representation these are represented in the "Generic PW
   MIB" functional block in Figure 13 above.  This working group should
   not produce any MIB modules for managing the general service; rather,
   it should produce just those modules used to interface or adapt the
   emulated service onto the PWE3 management framework as shown above.
   For example, the standard SONET-MIB [RFC3592] is designed and
   maintained by another working group.  The SONET-MIB is designed to
   manage the native service without PW emulation.  However, the PWE3
   working group is chartered to produce standards that show how to
   emulate existing technologies such as SONET/SDH over pseudo-wires
   rather than reinvent those modules.








Bryant & Pate               Standards Track                    [Page 35]



RFC 3985                   PWE3 Architecture                  March 2005


8.2.3.  Generic PW MIB Modules

   The middle layer in the architecture is referred to as the Generic PW
   Layer.  MIBs in this layer are responsible for providing pseudo-wire
   specific counters and service models used for monitoring and
   configuration of PWE3 services over any supported PSN service.  That
   is, this layer provides a general model of PWE3 abstraction for
   management purposes.  This MIB is used to interconnect the MIB
   modules residing in the Service Layer to the PSN VC Layer MIBs (see
   section 8.2.4).

8.2.4.  PSN VC Layer MIB Modules

   The third layer in the PWE3 management architecture is referred to as
   the PSN VC Layer.  It is composed of MIBs that are specifically
   designed to associate pseudo-wires onto those underlying PSN
   transport technologies that carry the pseudo-wire payloads across the
   PSN.  In general, this means that the MIB module provides a mapping
   between the emulated service that is mapped to the pseudo-wire via
   the Service Layer and the Generic PW MIB Layer onto the native PSN
   service.  For example, in the case of MPLS, for example, it is
   required that the general VC service be mapped into MPLS LSPs via the
   MPLS-LSR-STD-MIB [RFC3813] or Traffic-Engineered (TE) Tunnels via the
   MPLS-TE-STD-MIB [RFC3812].  In addition, the MPLS-LDP-STD-MIB
   [RFC3815] may be used to reveal the MPLS labels that are distributed
   over the MPLS PSN in order to maintain the PW service.  As with the
   native service MIB modules described earlier, the MIB modules used to
   manage the native PSN services are produced by other working groups
   that design and specify the native PSN services.  These MIBs should
   contain the appropriate mechanisms for monitoring and configuring the
   PSN service that the emulated PWE3 service will function correctly.

8.3.  Connection Verification and Traceroute

   A connection verification mechanism should be supported by PWs.
   Connection verification and other alarm mechanisms can alert the
   operator that a PW has lost its remote connection.  The opaque nature
   of a PW means that it is not possible to specify a generic connection
   verification or traceroute mechanism that passes this status to the
   CEs over the PW.  If connection verification status of the PW is
   needed by the CE, it must be mapped to the native connection status
   method.

   For troubleshooting purposes, it is sometimes desirable to know the
   exact functional path of a PW between PEs.  This is provided by the
   traceroute service of the underlying PSN.  The opaque nature of the
   PW means that this traceroute information is only available within
   the provider network; e.g., at the PEs.



Bryant & Pate               Standards Track                    [Page 36]



RFC 3985                   PWE3 Architecture                  March 2005


9.  IANA Considerations

   IANA considerations will be identified in the PWE3 documents that
   define the PWE3 encapsulation, control, and management protocols.

10.  Security Considerations

   PWE3 provides no means of protecting the integrity, confidentiality,
   or delivery of the native data units.  The use of PWE3 can therefore
   expose a particular environment to additional security threats.
   Assumptions that might be appropriate when all communicating systems
   are interconnected via a point-to-point or circuit-switched network
   may no longer hold when they are interconnected with an emulated wire
   carried over some types of PSN.  It is outside the scope of this
   specification to fully analyze and review the risks of PWE3,
   particularly as these risks will depend on the PSN.  An example
   should make the concern clear.  A number of IETF standards employ
   relatively weak security mechanisms when communicating nodes are
   expected to be connected to the same local area network.  The Virtual
   Router Redundancy Protocol [RFC3768] is one instance.  The relatively
   weak security mechanisms represent a greater vulnerability in an
   emulated Ethernet connected via a PW.

   Exploitation of vulnerabilities from within the PSN may be directed
   to the PW Tunnel end point so that PW Demultiplexer and PSN tunnel
   services are disrupted.  Controlling PSN access to the PW Tunnel end
   point is one way to protect against this.  By restricting PW Tunnel
   end point access to legitimate remote PE sources of traffic, the PE
   may reject traffic that would interfere with the PW Demultiplexing
   and PSN tunnel services.

   Protection mechanisms must also address the spoofing of tunneled PW
   data.  The validation of traffic addressed to the PW Demultiplexer
   end-point is paramount in ensuring integrity of PW encapsulation.
   Security protocols such as IPSec [RFC2401] may be used by the PW
   Demultiplexer Layer in order provide authentication and data
   integrity of the data between the PW Demultiplexer End-points.

   IPSec may provide authentication, integrity, and confidentiality, of
   data transferred between two PEs.  It cannot provide the equivalent
   services to the native service.

   Based on the type of data being transferred, the PW may indicate to
   the PW Demultiplexer Layer that enhanced security services are
   required.  The PW Demultiplexer Layer may define multiple protection
   profiles based on the requirements of the PW emulated service.  CE-
   to-CE signaling and control events emulated by the PW and some data
   types may require additional protection mechanisms.  Alternatively,



Bryant & Pate               Standards Track                    [Page 37]



RFC 3985                   PWE3 Architecture                  March 2005


   the PW Demultiplexer Layer may use peer authentication for every PSN
   packet to prevent spoofed native data units from being sent to the
   destination CE.

   The unlimited transformation capability of the NSP may be perceived
   as a security risk.  In practice the type of operation that the NSP
   may perform will be limited to those that have been implemented in
   the data path.  A PE designed and managed to best current practice
   will have controls in place that protect and validate its
   configuration, and these will be sufficient to ensure that the NSP
   behaves as expected.

11.  Acknowledgements

   We thank Sasha Vainshtein for his work on Native Service Processing
   and advice on bit stream over PW services and Thomas K. Johnson for
   his work on the background and motivation for PWs.

   We also thank Ron Bonica, Stephen Casner, Durai Chinnaiah, Jayakumar
   Jayakumar, Ghassem Koleyni, Danny McPherson, Eric Rosen, John
   Rutemiller, Scott Wainner, and David Zelig for their comments and
   contributions.

12.  References

12.1.  Normative References

   [RFC3931]   Lau, J., Townsley, M., and I. Goyret, "Layer Two
               Tunneling Protocol - Version 3 (L2TPv3), RFC 3931, March
               2005.

   [RFC768]    Postel, J., "User Datagram Protocol", STD 6, RFC 768,
               August 1980.

   [RFC2401]   Kent, S. and R. Atkinson, "Security Architecture for the
               Internet Protocol", RFC 2401, November 1998.

   [RFC2474]   Nichols, K., Blake, S., Baker, F., and D. Black,
               "Definition of the Differentiated Services Field (DS
               Field) in the IPv4 and IPv6 Headers", RFC 2474, December
               1998.

   [RFC3592]   Tesink, K., "Definitions of Managed Objects for the
               Synchronous Optical Network/Synchronous Digital Hierarchy
               (SONET/SDH) Interface Type", RFC 3592, September 2003.






Bryant & Pate               Standards Track                    [Page 38]



RFC 3985                   PWE3 Architecture                  March 2005


   [RFC2661]   Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn,
               G., and B. Palter, "Layer Two Tunneling Protocol "L2TP"",
               RFC 2661, August 1999.

   [RFC2784]   Farinacci, D., Li, T., Hanks, S., Meyer, D., and P.
               Traina, "Generic Routing Encapsulation (GRE)", RFC 2784,
               March 2000.

   [RFC2890]   Dommety, G., "Key and Sequence Number Extensions to GRE",
               RFC 2890, September 2000.

   [RFC3032]   Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y.,
               Farinacci, D., Li, T., and A. Conta, "MPLS Label Stack
               Encoding", RFC 3032, January 2001.

   [RFC3550]   Schulzrinne, H.,  Casner, S., Frederick, R., and V.
               Jacobson, "RTP: A Transport Protocol for Real-Time
               Applications", STD 64, RFC 3550, July 2003.

12.2. Informative References

   [DVB]       EN 300 744 Digital Video Broadcasting (DVB); Framing
               structure, channel coding and modulation for digital
               terrestrial television (DVB-T), European
               Telecommunications Standards Institute (ETSI).

   [RFC3815]   Cucchiara, J., Sjostrand, H., and J. Luciani,
               "Definitions of Managed Objects for the Multiprotocol
               Label Switching (MPLS), Label Distribution Protocol
               (LDP)", RFC 3815, June 2004.

   [RFC3813]   Srinivasan, C., Viswanathan, A., and T. Nadeau,
               "Multiprotocol Label Switching (MPLS) Label Switching
               Router (LSR) Management Information Base (MIB)", RFC
               3813, June 2004.

   [MPLSIP]    Rosen et al, "Encapsulating MPLS in IP or Generic Routing
               Encapsulation (GRE)", Work in Progress, March 2004.

   [RFC1191]   Mogul, J. and S. Deering, "Path MTU discovery", RFC 1191,
               November 1990.

   [RFC1958]   Carpenter, B., "Architectural Principles of the
               Internet", RFC 1958, June 1996.

   [RFC1981]   McCann, J., Deering, S., and J. Mogul, "Path MTU
               Discovery for IP version 6", RFC 1981, August 1996.




Bryant & Pate               Standards Track                    [Page 39]



RFC 3985                   PWE3 Architecture                  March 2005


   [RFC2022]   Armitage, G., "Support for Multicast over UNI 3.0/3.1
               based ATM Networks", RFC 2022, November 1996.

   [RFC3768]   Hinden, R., "Virtual Router Redundancy Protocol (VRRP)",
               RFC 3768, April 2004.

   [RFC3022]   Srisuresh, P. and K. Egevang, "Traditional IP Network
               Address Translator (Traditional NAT)", RFC 3022, January
               2001.

   [RFC3448]   Handley, M., Floyd, S., Padhye, J., and J. Widmer, "TCP
               Friendly Rate Control (TFRC): Protocol Specification",
               RFC 3448, January 2003.

   [RFC3812]   Srinivasan, C., Viswanathan, A., and T. Nadeau,
               "Multiprotocol Label Switching (MPLS) Traffic Engineering
               (TE) Management Information Base (MIB)", RFC 3812, June
               2004.

   [RFC3916]   Xiao, X., McPherson, D., and P. Pate, Eds, "Requirements
               for Pseudo-Wire Emulation Edge-to-Edge (PWE3)", RFC 3916,
               September 2004.

13.  Co-Authors

   The following are co-authors of this document:

   Thomas K. Johnson
   Litchfield Communications

   Kireeti Kompella
   Juniper Networks, Inc.

   Andrew G. Malis
   Tellabs

   Thomas D. Nadeau
   Cisco Systems

   Tricci So
   Caspian Networks

   W. Mark Townsley
   Cisco Systems







Bryant & Pate               Standards Track                    [Page 40]



RFC 3985                   PWE3 Architecture                  March 2005


   Craig White
   Level 3 Communications, LLC.

   Lloyd Wood
   Cisco Systems

14.  Editors' Addresses

   Stewart Bryant
   Cisco Systems
   250, Longwater
   Green Park
   Reading, RG2 6GB,
   United Kingdom

   EMail: stbryant@cisco.com


   Prayson Pate
   Overture Networks, Inc.
   507 Airport Boulevard
   Morrisville, NC, USA 27560

   EMail: prayson.pate@overturenetworks.com



























Bryant & Pate               Standards Track                    [Page 41]



RFC 3985                   PWE3 Architecture                  March 2005


Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







Bryant & Pate               Standards Track                    [Page 42]



©2018 Martin Webb