Network Working GroupInternet Engineering Task Force (IETF) R. PapnejaInternet-DraftRequest for Comments: 6894 Huawei TechnologiesIntended status:Category: Informational S. VapiwalaExpires: May 28, 2013ISSN: 2070-1721 J. Karthik Cisco Systems S. Poretsky Allot Communications S. Rao Qwest Communications JL. Le Roux France TelecomNovember 29, 2012March 2013 Methodology for BenchmarkingMPLS-TEMPLS Traffic Engineered (MPLS-TE) Fast Reroute Protectiondraft-ietf-bmwg-protection-meth-14.txtAbstract Thisdraftdocument describes the methodology for benchmarking MPLS Fast Reroute (FRR) protection mechanisms for link and node protection. This document provides test methodologies and testbed setup for measuring failover times of Fast Reroute techniques while considering factors (such as underlying links) that might impact recovery times for real-time applications bound to MPLStraffic engineeredTraffic Engineered (MPLS-TE) tunnels. Status ofthisThis Memo ThisInternet-Draftdocument issubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsnot an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are amaximumcandidate for any level ofsix monthsInternet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on May 9, 2013.http://www.rfc-editor.org/info/rfc6894. Copyright Notice Copyright (c)20122013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English. Table of Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 5....................................................3 2. Document Scope. . . . . . . . . . . . . . . . . . . . . . . . 6..................................................5 3. Existing Definitions and Requirements. . . . . . . . . . . . 6...........................5 4. General Reference Topology. . . . . . . . . . . . . . . . . . 7......................................6 5. Test Considerations. . . . . . . . . . . . . . . . . . . . . 8.............................................7 5.1. Failover Events[RFC 6414] . . . . . . . . . . . . . . . . 8............................................7 5.2. Failure Detection[RFC 6414] . . . . . . . . . . . . . . . 9..........................................8 5.3. Use of Data Traffic for MPLS Protectionbenchmarking . . . 10Benchmarking .......8 5.4. LSP and Route Scaling. . . . . . . . . . . . . . . . . . 10......................................9 5.5. Selection of IGP. . . . . . . . . . . . . . . . . . . . . 10...........................................9 5.6. Restoration and Reversion[RFC 6414] . . . . . . . . . . . 10..................................9 5.7. Offered Load. . . . . . . . . . . . . . . . . . . . . . . 11...............................................9 5.8. Tester Capabilities. . . . . . . . . . . . . . . . . . . 11.......................................10 5.9. Failover Time Measurement Methods. . . . . . . . . . . . 12.........................10 6. Reference Test Setup. . . . . . . . . . . . . . . . . . . . . 12...........................................11 6.1. Link Protection. . . . . . . . . . . . . . . . . . . . . 13...........................................12 6.1.1. LinkProtection - 1 hop primaryProtection: 1-Hop Primary (from PLR) and1 hop backup TE tunnels . . . . . . . . . . . . . . . . 131-Hop Backup Tail-End Tunnels ..................12 6.1.2. LinkProtection - 1 hop primaryProtection: 1-Hop Primary (from PLR) and2 hop backup TE tunnels . . . . . . . . . . . . . . . . 142-Hop Backup Tail-End Tunnels ..................13 6.1.3. LinkProtection - 2+ hopProtection: 2-Hop (or More) Primary (from PLR)primaryand1 hop backup TE tunnels . . . . . . . . . . . . . . . . 141-Hop Backup Tail-End Tunnels ..................14 6.1.4. LinkProtection - 2+ hopProtection: 2-Hop (or More) Primary (from PLR)primaryand2 hop backup TE tunnels . . . . . . . . . . . . . . . . 152-Hop Backup Tail-End Tunnels ..................15 6.2. Node Protection. . . . . . . . . . . . . . . . . . . . . 16...........................................16 6.2.1. NodeProtection - 2 hop primaryProtection: 2-Hop Primary (from PLR) and1 hop backup TE tunnels . . . . . . . . . . . . . . . . 161-Hop Backup Tail-End Tunnels ..................16 6.2.2. NodeProtection - 2 hop primaryProtection: 2-Hop Primary (from PLR) and2 hop backup TE tunnels . . . . . . . . . . . . . . . . 172-Hop Backup Tail-End Tunnels ..................17 6.2.3. NodeProtection - 3+ hop primaryProtection: 3-Hop (or More) Primary (from PLR) and1 hop backup TE tunnels . . . . . . . . . . . . . . . . 181-Hop Backup Tail-End Tunnels ..................18 6.2.4. NodeProtection - 3+ hop primaryProtection: 3-Hop (or More) Primary (from PLR) and2 hop backup TE tunnels . . . . . . . . . . . . . . . . 192-Hop Backup Tail-End Tunnels ..................19 7. Test Methodology. . . . . . . . . . . . . . . . . . . . . . . 20...............................................19 7.1.MPLS FRRMPLS-FRR Forwarding Performance. . . . . . . . . . . . . 20...........................20 7.1.1.HeadendHead-End PLR Forwarding Performance. . . . . . . . . . 20................20 7.1.2.Mid-PointMidpoint PLR Forwarding Performance. . . . . . . . . 21................21 7.2.HeadendHead-End PLR with Link Failure. . . . . . . . . . . . . . 23............................22 7.3.Mid-PointMidpoint PLR with Link Failure. . . . . . . . . . . . . 24............................24 7.4.HeadendHead-End PLR with Node Failure. . . . . . . . . . . . . . 26............................25 7.5.Mid-PointMidpoint PLR with Node Failure. . . . . . . . . . . . . 27............................26 8. Reporting Format. . . . . . . . . . . . . . . . . . . . . . . 28...............................................27 9. Security Considerations. . . . . . . . . . . . . . . . . . . 30........................................29 10.IANA Considerations . . . . . . . . . . . . . . . . . . . . . 30 11.Acknowledgements. . . . . . . . . . . . . . . . . . . . . . . 30 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 30 12.1. Informative..............................................29 11. References. . . . . . . . . . . . . . . . . . 30 12.2.....................................................29 11.1. Normative References. . . . . . . . . . . . . . . . . . . 30.....................................29 11.2. Informative References ...................................30 Appendix A. Fast Reroute Scalability Table. . . . . . . . . . . 30........................31 Appendix B. Abbreviations. . . . . . . . . . . . . . . . . . . . 33 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 34.........................................34 1. Introduction This document describes the methodology for benchmarking MPLS Fast Reroute (FRR) protection mechanisms. This document uses much of the terminology defined in[RFC 6414].[RFC6414]. Protection mechanisms provide recovery of client services from a planned or an unplanned link or nodefailures. MPLS FRRfailure. MPLS-FRR protection mechanisms are generally deployed in a network infrastructure where MPLS is used for the provisioning of point-to-point traffic engineered tunnels (tunnel).MPLS FRRMPLS-FRR protection mechanisms aim to reduce the service disruption period by minimizing recovery time from most common failures. Network elements from different manufacturers behave differently to network failures, which impacts the network's ability and performance for failure recovery.It thereforeTherefore, it becomes imperative for service providers to have a common benchmark to understand the performance behaviors of network elements. There are two factors impacting service availability: frequency of failures and duration for which the failures persist. Failures can be classified further into two types: correlated and uncorrelated. Correlated and uncorrelated failures may be planned or unplanned. Planned failures are generally predictable. Network implementations should be able to handle both planned and unplanned failures and recover gracefully within a time frame to maintain service assurance. Hence, failover recovery time is one of the most importantbenchmarkbenchmarks that a service provider considers in choosing the building blocks for their network infrastructure. A correlated failure is a result of the occurrence of two or more failures. A typical example is failure of a logical resource(e.g. layer-2(e.g., Layer-2 (L2) links) due to a dependency on a common physical resource(e.g.(e.g., common conduit) that fails. Within the context of MPLS protection mechanisms, failures that arise due to Shared Risk Link Groups(SRLG) [RFC 4202](SRLGs) [RFC4202] can be considered as correlated failures.MPLS FRR [RFC 4090]MPLS-FRR [RFC4090] allows for the possibility that the Label Switched Paths (LSPs) can bere-optimizedreoptimized in the minutes followingFailover.failover. IPTraffictraffic would bere-routedrerouted according to the preferred path for the post-failure topology. Thus, MPLS-FRR may include additional steps following the occurrence of the failure detection[RFC 6414]and failover event[RFC 6414].[RFC6414]. (1) Failover Event - PrimaryPath (Working Path)path (working path) fails (2) FailureDetection-Detection - FailoverEventevent is detected(3) a.(3a) Failover - WorkingPathpath switched toBackupbackup pathb. Re-Optimization(3b) Reoptimization ofWorking Pathworking path (possible change fromBackup Path)backup path) (4) Restoration[RFC 6414](see Section 3.3.5 of [RFC6414]) (5) Reversion[RFC 6414](see Section 3.3.6 of [RFC6414]) 2. Document Scope This document provides detailed test cases along with different topologies and scenarios that should be considered to effectively benchmarkMPLS FRRMPLS-FRR protection mechanisms and failover times on theData Plane.data plane. DifferentFailover Eventsfailover events and scaling considerations are also provided in this document. All benchmarkingtest-casestest cases defined in this document apply toFacilityfacility backup[RFC 4090].[RFC4090]. The test cases cover a set of interesting failure scenarios and the associated procedures benchmark the performance of the Device Under Test (DUT) to recover from failures.Data planeData-plane traffic is used to benchmark failover times. Testing scenarios related to MPLS-TE protection mechanisms when applied to MPLS Transport Profile and IP fast reroute applied to MPLS networks were not considered and areout ofoutside the scope of this document. However, the test setups considered forMPLS based Layer 3MPLS-based L3 andLayer 2L2 services consider LDP over MPLS RSVP-TE configurations. Benchmarking of correlated failures isout ofoutside the scope of this document. Detection usingBi-directionalBidirectional Forwarding Detection (BFD) is outside the scope of this document, but it is mentioned in discussion sections. ThePerformanceperformance of the control plane is outside the scope of thisbenchmarking.document. As described above, MPLS-FRR may include aRe-optimizationreoptimization of theWorking Path,working path, with possible packet transfer impairments. Characterization ofRe-optimizationreoptimization is beyond the scope of this memo. 3. Existing Definitions and Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP14, [RFC 2119].14 [RFC2119]. While[RFC 2119][RFC2119] defines the use of these key words primarily for Standards Trackdocuments however,documents, this Informationaltrackdocumentmay useuses some ofusesthesekeywords.key words. The reader is assumed to be familiar with the commonly used MPLS terminology, some of which is defined in[RFC 4090].[RFC4090]. This document uses much of the terminology defined in[RFC 6414].[RFC6414]. This document also uses existing terminology defined in other BMWGWork [RFC 1242], [RFC 2285], [RFC 4689].documents [RFC1242] [RFC2285] [RFC4689]. Appendix Bprovideprovides abbreviations used in thedocumentdocument. 4. General Reference Topology Figure 1 illustrates the general reference topology. It shows the basic reference testbed and is applicable to all the test cases defined in this document. The Tester is comprised of a Traffic Generator (TG)& Testand Traffic Analyzer (TA) and Emulator. A Tester is connected to the test networkandand, depending upon the test case, the DUT could vary. The Tester sends and receives IP traffic to the tunnel ingress and performs signaling protocol emulation to simulate real network scenarios in a lab environment. The Tester may also support MPLS-TE signaling to act as the ingress node to the MPLS tunnel. The lines in figures represent physical connections. +---------------------------+ | +------------|---------------+ | | | | | | | | +--------+ +--------+ +--------+ +--------+ +--------+ TG--| R1 |-----| R2 |----| R3 | | R4 | | R5 | | |-----| |----| |----| |---| | +--------+ +--------+ +--------+ +--------+ +--------+ | | | | | | | | | | | +--------+ | | TA +---------| R6 |---------+ | | |----------------------+ +--------+Fig.Figure 1Fast Reroute TopologyThe tester MUST record the number of lost, duplicate, andout-of-orderout-of- order packets. It should further record arrival and departure times so thatFailover Time,failover time, Additive Latency, and Reversion Time can be measured. The tester may be a single device or a test system emulating all the different roles along a primary or backup path. The label stack is dependentofon the following3three entities: (1) Type of protection (LinkVsversus Node) (2)#Number of remaining hops of the primary tunnel from thePLR[RFC 6414]Point of Local Repair (PLR) [RFC6414] (3)#Number of remaining hops of the backup tunnel from the PLR Due to this dependency, it is RECOMMENDED that the benchmarking of failover times be performed on all the topologies provided insectionSection 6. 5. Test Considerations This section discusses the fundamentals of MPLS Protection testing: (1) The types of network events thatcausescause failover(section(Section 5.1) (2) Indications for failover(section(Section 5.2) (3)theThe use of data traffic(section(Section 5.3) (4)LSPLabel Switched Path Scaling (Section 5.4) (5) IGP Selection (Section 5.5) (6) Reversion of LSP (Section 5.6) (7) Traffic generation(section(Section 5.7) 5.1. Failover Events[RFC 6414]The failover to the backup tunnel is primarily triggered by either link or node failures observed downstream of the Point of LocalrepairRepair (PLR). The failure events [RFC6414] are listed below. Link Failure Events - Interface Shutdown on PLR side with physical/linkAlarmalarm - Interface Shutdown on remote side with physical/linkAlarmalarm - Interface Shutdown on PLR side with RSVP hello enabled - Interface Shutdown on remote side with RSVP hello enabled - Interface Shutdown on PLR side with BFD - Interface Shutdown on remote side with BFD - Fiber Pull on the PLR side(Both TX & RX(both Transmit (TX) and Receive (RX) or just the TX) - Fiber Pull on the remote side(Both(both TX&and RX or just the RX) - OnlineinsertionInsertion andremovalRemoval (OIR) on PLR side - OIR on remote side - Sub-interface failure on PLR side(e.g.(e.g., shutting down of a VLAN) - Sub-interface failure on remote side - Parent interface shutdown on PLR side (an interface bearing multiple sub-interfaces) - Parent interface shutdown on remote side Node Failure Events - A System reload initiatedeitherby either a graceful shutdown orbya powerfailure.failure - A system crash due to a software failure or anassert.assert 5.2. Failure Detection[RFC 6414]Link failure detection [RFC6414] time depends on the link type and failure detection protocols running. ForSONET/SDH,Synchronous Optical Network (SONET) / Synchronous Digital Hierarchy (SDH), the alarm type (such as LOS, AIS, or RDI) can be used. Other link types havelayer-twoL2 alarms, but they may not provide a short enough failure detection time.Ethernet basedEthernet-based links enabled with MPLS/IP do not havelayer 2L2 failureindicators, and therefore reliesindicators; therefore, they rely onlayer 3L3 signaling for failure detection.HoweverHowever, for directly connected devices, remote fault indication in the ethernet auto-negotiation scheme could be considered as a type oflayer 2L2 link failure indicator. MPLS has different failure detectiontechniquestechniques, such as BFD, or use of RSVP hellos. These methods can be used for thelayer 3L3 failure indicators required byEthernet based links,ethernet-based links or for some other non-Ethernet basedethernet-based links to help improve failure detection time. However, these fast failure detection mechanisms are out of scope. The test procedures in this document can be used foralocal failure or remote failure scenarios for comprehensive benchmarking and to evaluate failover performance independent of the failure detection techniques. 5.3. Use of Data Traffic for MPLS Protectionbenchmarking CurrentlyBenchmarking Currently, end customers use packet loss as a key metric forFailover Time [RFC 6414].failover time [RFC6414]. Failover Packet Loss[RFC 6414][RFC6414] is an externally observable event and has a direct impact on application performance. MPLS protection is expected to minimizethepacket loss in the event of a failure. For thisreasonreason, it is important to develop a standard router benchmarking methodology for measuring MPLS protection that uses packet loss as a metric. At a known rate of forwarding, packet loss can be measured and the failover time can be determined. Measurement ofcontrol planecontrol-plane signaling to establish backup paths is not enough to verify failover. Failover is best determined when packets are actually traversing the backup path. An additional benefit of using packet loss for calculation of failover time is that it allows use of a black-box test environment. Data traffic is offered at line-rate to thedevice under test (DUT)DUT, an emulated network failure event is forced to occur, and packet loss is externally measured to calculate the convergence time. This setup is independent of the DUT architecture. In addition, this methodology considers the packets in error and duplicate packets[RFC 4689][RFC4689] that could have been generated during the failover process. The methodologies consider lost, out-of-order[RFC 4689][RFC4689], and duplicate packets to be impaired packets that contribute to theFailover Time.failover time. 5.4. LSP and Route Scaling Failover time performance may vary with the number of established primary and backup tunnellabel switched paths (LSP)LSPs and installed routes.HoweverHowever, the procedure outlined here should be used for any number of LSPs (L) and any number of routes protected byPLR(R).the PLR (R). Theamountvalues of L and R must be recorded. 5.5. Selection of IGP The underlying IGP could be ISIS-TE or OSPF-TE for the methodology proposed here. See[RFC 6412][RFC6412] for IGP options to consider and report. 5.6. Restoration and Reversion[RFC 6414]Path restoration [RFC6414] provides a method to restore an alternate primary LSP upon failure and to switch traffic from theBackup Pathbackup path to the restoredPrimary Path (Reversion).primary path (reversion). In MPLS-FRR,Reversionreversion [RFC6414] can be implemented as Global Reversion or Local Reversion. It is important to includeRestorationrestoration andReversionreversion as a step in each test case to measure the amount of packet loss,out of orderout-of-order packets, or duplicate packets thatisare produced. Note: In addition to restoration and reversion,re-optimizationreoptimization can take place while the failure is still not recovered but it depends on the userconfiguration,configuration andre-optimizationreoptimization timers. 5.7. Offered Load It is suggested that there be three or more traffic streams as long as there is a steady and constant rate of flow for all of the streams. In order to monitor the DUT performance for recovery times, a set of route prefixes should be advertised before traffic is sent. The traffic should be configured towards these routes. Prefix-dependency behaviors are key inIPIP, and tests withroute-specificroute- specific flows spread across the routing table will reveal this dependency. Generating traffic to all of the prefixes reachable by the protected tunnel (probably in a Round-Robin fashion, where the traffic is destined to all the prefixes but one prefix at a time in a cyclic manner) is not recommended. Round-Robin traffic generation is not recommended to all prefixes, as time to hit all the prefixes may be higher than the failover time. This phenomenon will reduce the granularity of the measuredresultsresults, and the results observed may not be accurate. 5.8. Tester Capabilities It is RECOMMENDED that the Tester used to execute each test case have the following capabilities:1.Ability1. Ability to establish MPLS-TE tunnels and push/pop labels.2.Ability2. Ability to produceFailover Event [RFC 6414]. 3.Abilitya failover event [RFC6414]. 3. Ability to insert a timestamp in each data packet's IP payload.4.An4. An internal time clock to control timestamping, time measurements, and time calculations.5.Ability5. Ability to disable or tune specificLayer-2L2 andLayer-3L3 protocol functions on anyinterface(s). 6.Abilityinterface. 6. Ability to react upon the receipt of path error from thePLRPLR. The Tester MAY be capableto make non-data planeof making non-data-plane convergence observations and use those observations for measurements. 5.9. Failover Time Measurement Methods FailoverTimetime [RFC6414] is calculated using one of the following threemethodsmethods: 1.Packet-Loss Based methodPacket-Loss-Based Method (PLBM): (Number of packets dropped/ packets per second * 1000) milliseconds. This method could also be referred to as the Loss-Derived method. 2. Time-Based Loss Method (TBLM): This method relies on the ability of theTraffictraffic generators to provide statisticswhichthat reveal the duration of failure in milliseconds based on when the packet loss occurred (interval between non-zero packet loss and zero loss). 3.Timestamp BasedTimestamp-Based Method (TBM): This method of failover calculation is based on the timestamp that gets transmitted as payload in the packets originated by the generator. TheTraffic Analyzertraffic analyzer records the timestamp of the last packet received before the failover event and the first packet after the failover and derives the time based on the difference between these2two timestamps. Note: The payload could also contain sequence numbers for out-of-order packet calculation and duplicate packets.The timestamp based method methodTBM would be able to detectReversionreversion impairments beyondloss, thusloss; thus, it is RECOMMENDEDmethodasa Failover Timethe failover time method. 6. Reference Test Setup In addition to the general reference topology shown infigureFigure 1, this section provides detailed insight into various proposed test setups that should be considered for comprehensively benchmarking the failover time in different roles along the primarytunneltunnel. This section proposes a set of topologies that covers all the scenarios for local protection. All of these topologies can be mapped to the reference topology shown in Figure 1. Topologies provided in this section refer to the testbed required to benchmark failover time when the DUT is configured as a PLR in eitherHeadendhead-end or midpoint role. Provided with each topology below is the label stack at the PLR. Penultimate Hop Popping (PHP) MAY be used and must be reported when used. Figures 2thruthrough 9 use the following convention and are subset offigureFigure 1: a) HE isHeadendHead-End b)TET/E is Tail-End c) MID isMid pointMidpoint d) MP is Merge Point e) PLR is Point of Local Repair f) PRI is Primary Path g) BKP denotes Backup Path and Nodes h) UR is Upstream Router 6.1. Link Protection 6.1.1. LinkProtection - 1 hop primaryProtection: 1-Hop Primary (from PLR) and1 hop backup TE tunnels1-Hop Backup Tail-End Tunnels +-------+ +--------+ +--------+ | R1 | | R2 | PRI| R3 | | UR/HE |--| HE/MID |----|MP/TEMP/T/E | | | | PLR |----| | +-------+ +--------+ BKP+--------+ Figure2.2 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 0 0 Layer3 VPN (PE-PE) 1 1 Layer3 VPN (PE-P) 2 2 Layer2 VC (PE-PE) 1 1 Layer2 VC (PE-P) 2 2Mid-pointMidpoint LSPs 0 0Note:Please note the following: a) For the P-P case, R2 and R3actsact as P routers b) For the PE-PEcase,R2cases, R2 acts as a PE and R3 acts as a remote PE c) For the PE-Pcase,R2cases, R2 acts as a PE router, R3 acts as a Prouterrouter, and R5 acts as a remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1,R2R2, and R3 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.1.2. LinkProtection - 1 hop primaryProtection: 1-Hop Primary (from PLR) and2 hop backup TE tunnels2-Hop Backup Tail-End Tunnels +-------+ +--------+ +--------+ | R1 | | R2 | | R3 | | UR/HE | | HE/MID |PRI |MP/TEMP/T/E | | |----| PLR |----| | +-------+ +--------+ +--------+ |BKP | | +--------+ | | | R6 | | |----| BKP |----| | MID | +--------+ Figure3.3 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 0 1 Layer3 VPN (PE-PE) 1 2 Layer3 VPN (PE-P) 2 3 Layer2 VC (PE-PE) 1 2 Layer2 VC (PE-P) 2 3Mid-pointMidpoint LSPs 0 1Note:Please note the following: a) For the P-P case, R2 and R3actsact as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R3 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R3 acts as a Prouterrouter, and R5 acts as a remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1,R2R2, and R3 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.1.3. LinkProtection - 2+ hopProtection: 2-Hop (or More) Primary (from PLR)primaryand1 hop backup TE tunnels1-Hop Backup Tail-End Tunnels +--------+ +--------+ +--------+ +--------+ | R1 | | R2 |PRI | R3 |PRI | R4 | | UR/HE |----| HE/MID |----| MP/MID |------|TET/E | | | | PLR |----| | | | +--------+ +--------+ BKP+--------+ +--------+ Figure4.4 TrafficNumNo. of Labels Num of labels before failure after failure IP TRAFFIC (P-P) 1 1 Layer3 VPN (PE-PE) 2 2 Layer3 VPN (PE-P) 3 3 Layer2 VC (PE-PE) 2 2 Layer2 VC (PE-P) 3 3Mid-pointMidpoint LSPs 1 1Note:Please note the following: a) For the P-P case, R2,R3R3, and R4actsact as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R4 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R3 acts as a Prouterrouter, and R5 acts as remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1, R2,R3R3, and R4 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.1.4. LinkProtection - 2+ hopProtection: 2-Hop (or More) Primary (from PLR)primaryand2 hop backup TE tunnels2-Hop Backup Tail-End Tunnels +--------+ +--------+PRI +--------+ PRI +--------+ | R1 | | R2 | | R3 | | R4 | | UR/HE |----| HE/MID |----| MP/MID|------|TET/E | | | | PLR | | | | | +--------+ +--------+ +--------+ +--------+ BKP| | | +--------+ | | | R6 | | +---| BKP |- | MID | +--------+ Figure5.5 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 1 2 Layer3 VPN (PE-PE) 2 3 Layer3 VPN (PE-P) 3 4 Layer2 VC (PE-PE) 2 3 Layer2 VC (PE-P) 3 4Mid-pointMidpoint LSPs 1 2Note:Please note the following: a) For the P-P case, R2,R3R3, and R4actsact as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R4 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R3 acts as a Prouterrouter, and R5 acts as remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1, R2, R3 and R4 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.2. Node Protection 6.2.1. NodeProtection - 2 hop primaryProtection: 2-Hop Primary (from PLR) and1 hop backup TE tunnels1-Hop Backup Tail-End Tunnels +--------+ +--------+ +--------+ +--------+ | R1 | | R2 |PRI | R3 | PRI | R4 | | UR/HE |----| HE/MID |----| MID |------|MP/TEMP/T/E | | | | PLR | | | | | +--------+ +--------+ +--------+ +--------+ |BKP | ----------------------------- Figure6.6 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 1 0 Layer3 VPN (PE-PE) 2 1 Layer3 VPN (PE-P) 3 2 Layer2 VC (PE-PE) 2 1 Layer2 VC (PE-P) 3 2Mid-pointMidpoint LSPs 1 0Note:Please note the following: a) For the P-P case, R2,R3R3, andR3 actsR4 act as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R4 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R4 acts as a Prouterrouter, and R5 acts as remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1, R2,R3R3, and R4 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.2.2. NodeProtection - 2 hop primaryProtection: 2-Hop Primary (from PLR) and2 hop backup TE tunnels2-Hop Backup Tail-End Tunnels +--------+ +--------+ +--------+ +--------+ | R1 | | R2 | | R3 | | R4 | | UR/HE | | HE/MID |PRI | MID |PRI |MP/TEMP/T/E | | |----| PLR |----| |----| | +--------+ +--------+ +--------+ +--------+ | | BKP| +--------+ | | | R6 | | ---------| BKP |--------- | MID | +--------+ Figure7.7 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 1 1 Layer3 VPN (PE-PE) 2 2 Layer3 VPN (PE-P) 3 3 Layer2 VC (PE-PE) 2 2 Layer2 VC (PE-P) 3 3Mid-pointMidpoint LSPs 1 1Note:Please note the following: a) For the P-P case, R2,R3R3, and R4actsact as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R4 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R4 acts as a Prouterrouter, and R5 acts as remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1, R2,R3R3, and R4 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.2.3. NodeProtection - 3+ hop primaryProtection: 3-Hop (or More) Primary (from PLR) and1 hop backup TE tunnels1-Hop Backup Tail-End Tunnels +--------+ +--------+PRI+--------+PRI+--------+PRI+--------+ | R1 | | R2 | | R3 | | R4 | | R5 | | UR/HE |--| HE/MID |---| MID |---| MP |---|TET/E | | | | PLR | | | | | | | +--------+ +--------+ +--------+ +--------+ +--------+ BKP| | -------------------------- Figure8.8 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 1 1 Layer3 VPN (PE-PE) 2 2 Layer3 VPN (PE-P) 3 3 Layer2 VC (PE-PE) 2 2 Layer2 VC (PE-P) 3 3Mid-pointMidpoint LSPs 1 1Note:Please note the following: a) For the P-P case, R2, R3,R4R4, and R5actsact as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R5 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R4 acts as a Prouterrouter, and R5 acts as remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1, R2, R3,R4R4, and R5 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 6.2.4. NodeProtection - 3+ hop primaryProtection: 3-Hop (or More) Primary (from PLR) and2 hop backup TE tunnels2-Hop Backup Tail-End Tunnels +--------+ +--------+ +--------+ +--------+ +--------+ | R1 | | R2 | | R3 | | R4 | | R5 | | UR/HE | | HE/MID |PRI| MID |PRI| MP |PRI|TET/E | | |-- | PLR |---| |---| |---| | +--------+ +--------+ +--------+ +--------+ +--------+ BKP| | | +--------+ | | | R6 | | ---------| BKP |------- | MID | +--------+ Figure9.9 TrafficNumNo. of LabelsNumNo. of labels before failure after failure IP TRAFFIC (P-P) 1 2 Layer3 VPN (PE-PE) 2 3 Layer3 VPN (PE-P) 3 4 Layer2 VC (PE-PE) 2 3 Layer2 VC (PE-P) 3 4Mid-pointMidpoint LSPs 1 2Note:Please note the following: a) For the P-P case, R2, R3,R4R4, and R5actsact as P routers b) For PE-PEcase,R2cases, R2 acts as a PE and R5 acts as a remote PE c) For PE-Pcase,R2cases, R2 acts as a PE router, R4 acts as a Prouterrouter, and R5 acts as remote PE router(Please(please refer tofigureFigure 1 for complete setup) d) ForMid-pointthe midpoint case, R1, R2, R3,R4R4, and R5 act asshown in above figureHE,Midpoint/PLRmidpoint/PLR, andTEtail-end, respectively (as shown in the figure above) 7. Test Methodology The procedure described in this section can be applied to allthe 8eight base test cases and the associated topologies. The backup as well as the primary tunnels are configured to be alike in terms of bandwidth usage. In order to benchmark failover with all possible label stack depth applicableas(as seen with currentdeployments,deployments), it is RECOMMENDED to perform all of the test cases provided in this section. The forwarding performance test cases insectionSection 7.1 MUST be performed prior to performing the failover test cases. The considerations of Section 4 of[RFC 2544][RFC2544] are applicable when evaluating the results obtained using these methodologies as well. 7.1.MPLS FRRMPLS-FRR Forwarding Performance BenchmarkingFailover Time [RFC 6414]failover time [RFC6414] for MPLS protection first requires a baseline measurement of the forwarding performance of the testtopologytopology, including the DUT. Forwarding performance is benchmarked by theThroughputthroughput as defined in[RFC 5695][RFC5695] and measured in unitspps.of packets per second (pps). This section provides two test cases to benchmark forwarding performance. These are with the DUT configured as aHeadendhead-end PLR,Mid-Pointmidpoint PLR, andEgressegress PLR. 7.1.1.HeadendHead-End PLR Forwarding Performance Objective: To benchmark the maximum rate (pps) on the PLR (asheadend)head-end) over the primary LSP and backup LSP. Test Setup: A. Select any one topology out of the8eight fromsectionSection 6. B. Select or enable IP,Layer 3 VPNL3 VPN, orLayer 2L2 VPN services with the DUT asHeadendhead-end PLR. C. The DUT will also have2two interfaces connected to the trafficGenerator/analyzer.generator/analyzer. (If the node downstream of the PLR is not a simulated node, then theIngressingress of the tunnel should have one link connected to the trafficgeneratorgenerator, and the node downstreamtoof the PLR or the egress of the tunnel should have a link connected to the traffic analyzer). Procedure: 1. Establish the primary LSP on R2 required by the topology selected. 2. Establish the backup LSP on R2 required by the selected topology. 3. Verify that primary and backup LSPs are up and that the primary is protected. 4. Verify that Fast Reroute protection is enabled and ready. 5.SetupSet up traffic streams as described insectionSection 5.7. 6. Send MPLS traffic over the primary LSP at theThroughputthroughput supported by the DUT(section 6, RFC 2544).(Section 6 of [RFC2544]). 7. Record theThroughputthroughput over the primary LSP. 8. Trigger a link failure as described insectionSection 5.1. 9. Verify that the offered load gets mapped to the backup tunnel and measure the Additive Backup Delay(RFC 6414).[RFC6414]. 10. 30 seconds afterFailover,failover, stop the offered load and measure theThroughput, Packet Loss, Out-of-Order Packets,throughput, packet loss, out-of-order packets, andDuplicate Packetsduplicate packets over theBackupbackup LSP. 11. Adjust the offered load and repeat steps 6 through 10 until theThroughputthroughput values for the primary and backup LSPs are equal. 12. Record the finalThroughput,throughput, which corresponds to the offered load that will be used for theHeadendhead-end PLR failover test cases. 7.1.2.Mid-PointMidpoint PLR Forwarding Performance Objective: To benchmark the maximum rate (pps) on the PLR (asmid-point)midpoint) over the primary LSP and backup LSP. Test Setup: A. Select any one topology out of the8eight fromsectionSection 6. B. The DUT will also have2two interfaces connected to the traffic generator. Procedure: 1. Establish the primary LSP on R1 required by the topology selected. 2. Establish the backup LSP on R2 required by the selected topology. 3. Verify that primary and backup LSPs are up and that the primary is protected. 4. Verify that Fast Reroute protection is enabled and ready. 5.SetupSet up traffic streams as described insectionSection 5.7. 6. Send MPLS traffic over the primary LSP at theThroughputthroughput supported by the DUT(section 6, RFC 2544).(Section 6 of [RFC2544]). 7. Record theThroughputthroughput over the primary LSP. 8. Trigger a link failure as described insectionSection 5.1. 9. Verify that the offered load gets mapped to the backup tunnel and measure the Additive Backup Delay(RFC 6414).[RFC6414]. 10. 30 seconds afterFailover,failover, stop the offered load and measure theThroughput, Packet Loss, Out-of-Order Packets,throughput, packet loss, out-of-order packets, andDuplicate Packetsduplicate packets over theBackupbackup LSP. 11. Adjust the offered load and repeat steps 6 through 10 until theThroughputthroughput values for the primary and backup LSPs are equal. 12. Record the finalThroughputthroughput, which corresponds to the offered load that will be used for theMid-Pointmidpoint PLR failover test cases. 7.2.HeadendHead-End PLR with Link Failure Objective: To benchmark the MPLS failover time due to link failure events described insectionSection 5.1 experienced by theDUTDUT, which is theHeadendhead-end PLR. Test Setup: A. Select any one topology out of the8eight fromsectionSection 6. B. Select or enable IP,Layer 3 VPNL3 VPN, orLayer 2L2 VPN services with the DUT asHeadendhead-end PLR. C. The DUT will also have2two interfaces connected to the trafficGenerator/analyzer.generator/analyzer. (If the node downstream of the PLR is not a simulated node, then theIngressingress of the tunnel should have one link connected to the trafficgeneratorgenerator, and the node downstream to the PLR or the egress of the tunnel should have a link connected to the traffic analyzer). Test Configuration: 1. Configure the number of primaries on R2 and the backups on R2 as required by the topology selected. 2. Configure the test setup to supportReversion.reversion. 3. Advertise prefixes (as per the FRR Scalability Tabledescribedin Appendix A) by thetail end.tail-end. Procedure:Test Case "7.1.1. HeadendThe test case in Section 7.1.1, "Head-End PLR ForwardingPerformance"Performance", MUST be completed first to obtain theThroughputthroughput to use as the offered load. 1. Establish the primary LSP on R2 required by the topology selected. 2. Establish the backup LSP on R2 required by the selected topology. 3. Verify that primary and backup LSPs are up and that the primary is protected. 4. Verify that Fast Reroute protection is enabled and ready. 5.SetupSet up traffic streams for the offered load as described insectionSection 5.7. 6. Provide the offered load from the tester at theThroughput [RFC 1242]throughput [RFC1242] level obtained from the test case in Section 7.1.1. 7. Verify that traffic is switched overPrimarythe primary LSP without packet loss. 8. Trigger a link failure as described insectionSection 5.1. 9. Verify that the offered load gets mapped to the backup tunnel and measure the Additive BackupDelay.Delay [RFC6414]. 10. 30 seconds afterFailover [RFC 6414],failover, stop the offered load and measure the totalFailover Packet Loss [RFC 6414].failover packet loss [RFC6414]. 11. Calculate theFailover Time [RFC 6414]failover time benchmark using the selectedFailover Time Calculation Methodfailover time calculation method (TBLM, PLBM, or TBM)[RFC 6414].[RFC6414]. 12. Restart the offered load and restore the primary LSP to verifyReversion [RFC 6414]that reversion occurs and measure the Reversion Packet Loss[RFC 6414].[RFC6414]. 13. Calculate the Reversion Time[RFC 6414]benchmark using the selectedFailover Time Calculation Methodfailover time calculation method (TBLM, PLBM, or TBM)[RFC 6414].[RFC6414]. 14. VerifyHeadendthat the head-end signals new LSP and protection should be in place again.ITIt is RECOMMENDED that this procedure be repeated for each of the link failure triggers defined insectionSection 5.1. 7.3.Mid-PointMidpoint PLR with Link Failure Objective: To benchmark the MPLS failover time due to link failure events described insectionSection 5.1 experienced by theDUTDUT, which is theMid- Pointmidpoint PLR. Test Setup: A. Select any one topology out of the8eight fromsectionSection 6. B. The DUT will also have2two interfaces connected to the traffic generator. Test Configuration: 1. Configure the number of primaries on R1 and the backups on R2 as required by the topology selected. 2. Configure the test setup to supportReversion.reversion. 3. Advertise prefixes (as per the FRR Scalability Tabledescribedin Appendix A) by thetail end.tail-end. Procedure:Test Case "7.1.2. Mid-PointThe test case in Section 7.1.2, "Midpoint PLR ForwardingPerformance"Performance", MUST be completed first to obtain theThroughputthroughput to use as the offered load. 1. Establish the primary LSP on R1 as required by the topology selected. 2. Establish the backup LSP on R2 as required by the selected topology. 3. Perform steps 3 through 14 fromsection 7.2 HeadendSection 7.2, "Head-End PLR with LinkFailure. ITFailure". It is RECOMMENDED that this procedure be repeated for each of the link failure triggers defined in section 5.1. 7.4.HeadendHead-End PLR with Node Failure Objective: To benchmark the MPLS failover time due toNodenode failure events described insectionSection 5.1 experienced by theDUTDUT, which is theHeadendhead-end PLR. Test Setup: A. Select any one topology out of the8eight fromsectionSection 6. B. Select or enable IP,Layer 3 VPNL3 VPN, orLayer 2L2 VPN services with the DUT asHeadendhead-end PLR. C. The DUT will also have2two interfaces connected to the traffic generator/analyzer. Test Configuration: 1. Configure the number of primaries on R2 and the backups on R2 as required by the topology selected. 2. Configure the test setup to supportReversion.reversion. 3. Advertise prefixes (as per the FRR Scalability Tabledescribedin Appendix A) by thetail end.tail-end. Procedure:Test Case "7.1.1. HeadendThe test case in Section 7.1.1, "Head-End PLR ForwardingPerformance"Performance", MUST be completed first to obtain theThroughputthroughput to use as the offered load. 1. Establish the primary LSP on R2 as required by the topology selected. 2. Establish the backup LSP on R2 as required by the selected topology. 3. Verify that the primary and backup LSPs are up and that the primary is protected. 4. Verify that Fast Reroute protection is enabled and ready. 5.SetupSet up traffic streams for the offered load as described insectionSection 5.7. 6. Provide the offered load from the tester at theThroughput [RFC 1242]throughput [RFC1242] level obtained from the test case in Section 7.1.1. 7. Verify that traffic is switched overPrimarythe primary LSP without packet loss. 8. Trigger a node failure as described insectionSection 5.1. 9. Perform steps 9 through 14 in7.2 HeadendSection 7.2, "Head-End PLR with LinkFailure. ITFailure". It is RECOMMENDED that this procedure be repeated for each of the node failure triggers defined insectionSection 5.1. 7.5.Mid-PointMidpoint PLR with Node Failure Objective: To benchmark the MPLS failover time due toNodenode failure events described insectionSection 5.1 experienced by theDUTDUT, which is theMid- Pointmidpoint PLR. Test Setup: A. Select any one topology fromsectionSections 6.1 to 6.2. B. The DUT will also have2two interfaces connected to the traffic generator. Test Configuration: 1. Configure the number of primaries on R1 and the backups on R2 as required by the topology selected. 2. Configure the test setup to supportReversion.reversion. 3. Advertise prefixes (as per the FRR Scalability Tabledescribedin Appendix A) by thetail end.tail-end. Procedure:Test Case "7.1.1. Mid-PointThe test case in Section 7.1.1, "Midpoint PLR ForwardingPerformance"Performance", MUST be completed first to obtain theThroughputthroughput to use as the offered load. 1. Establish the primary LSP on R1 as required by the topology selected. 2. Establish the backup LSP on R2 as required by the selected topology. 3. Verify that the primary and backup LSPs are up and that the primary is protected. 4. Verify that Fast Reroute protection is enabled and ready. 5.SetupSet up traffic streams for the offered load as described insectionSection 5.7. 6. Provide the offered load from the tester at theThroughput [RFC 1242]throughput [RFC1242] level obtained from the test case in Section 7.1.1. 7. Verify that traffic is switched overPrimarythe primary LSP without packet loss. 8. Trigger a node failure as described insectionSection 5.1. 9. Perform steps 9 through 14 in7.2 HeadendSection 7.2, "Head-End PLR with LinkFailure. ITFailure". It is RECOMMENDED that this procedure be repeated for each of the node failure triggers defined insectionSection 5.1. 8. Reporting Format For each test, it is RECOMMENDED that the results be reported in the following format. Parameter Units IGP used for the testISIS-TE/ISIS-TE / OSPF-TE Interface typesGige,POS,ATM,VLANGige,POS,ATM,VLAN, etc. Packet Sizes offered to the DUT Bytes (atlayer 3)L3) Offered Load (Throughput)packetsPackets per second IGP routes advertised Number of IGP routes Penultimate Hop Popping Used/Not Used RSVP hello timers Milliseconds Number of Protected tunnels Number of tunnels Number of VPN routes installed Number of VPN routes on theHeadendhead-end Number of VC tunnels Number of VC tunnels Number ofmid-pointmidpoint tunnels Number of tunnels Number of Prefixes protected by Number of LSPs Primary Topology being used Section number, and figure reference FailoverEventevent Event typeRe-optimizationReoptimization Yes/No Benchmarks (to be recorded for each test case): Failover- Failover Time seconds Failover Packet Loss packets Additive Backup Delay seconds Out-of-Order Packets packets Duplicate Packets packets Failover Time Calculation Method Method Used Reversion- Reversion Time seconds Reversion Packet Loss packets Additive Backup Delay seconds Out-of-Order Packets packets Duplicate Packets packets Failover Time Calculation Method Method Used 9. Security Considerations Benchmarking activities as described in this memo are limited to technology characterization using controlled stimuli in a laboratory environment, with dedicated address space and the constraints specified in the sections above. The benchmarking network topology will be an independent test setup and MUST NOT be connected to devices that may forward the test traffic into a production network, or misroute traffic to the test management network. Further, benchmarking is performed on a "black-box" basis, relying solely on measurements observable external to the DUT/SUT. Special capabilities SHOULD NOT exist in the DUT/SUT specifically for benchmarking purposes. Any implications for network security arising from the DUT/SUT SHOULD be identical in the lab and in production networks. 10.IANA Considerations This draft does not require any new allocations by IANA. 11.Acknowledgements We would like to thank Jean Philip Vasseur for his invaluable input to the document, Curtis Villamizar for his contribution in suggesting text on the definition and need for benchmarking Correlatedfailuresfailures, and Bhavani Parise for his textual input and review.AdditionallyAdditionally, we would like to thank Al Morton, Arun Gandhi, Amrit Hanspal, Karu Ratnam, Raveesh Janardan, Andrey Kiselev, and Mohan Nanduri for their formal reviews of this document.12. References 12.1. Informative11. References[RFC 2285] Mandeville, R., "Benchmarking Terminology for LAN Switching Devices", RFC 2285, February 1998. [RFC 4689] Poretsky, S., Perser, J., Erramilli, S., and S. Khurana, "Terminology for Benchmarking Network-layer Traffic Control Mechanisms", RFC 4689, October 2006. [RFC 4202] Kompella, K., Rekhter, Y., "Routing Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 4202, October 2005. 12.2.11.1. Normative References[RFC 1242][RFC1242] Bradner, S., "BenchmarkingterminologyTerminology fornetwork interconnection devices",Network Interconnection Devices", RFC 1242, July 1991.[RFC 2119][RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.[RFC 4090][RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for Network Interconnect Devices", RFC 2544, March 1999. [RFC4090] Pan, P., Ed., Swallow, G., Ed., and A. Atlas, Ed., "Fast Reroute Extensions to RSVP-TE for LSP Tunnels", RFC 4090, May 2005.[RFC 5695][RFC5695] Akhter, A., Asati, R., and C. Pignataro, "MPLS Forwarding Benchmarking Methodology for IP Flows", RFC 5695, November 2009.[RFC 6414][RFC6412] Poretsky, S., Imhoff, B., and K. Michielsen, "Terminology for Benchmarking Link-State IGP Data-Plane Route Convergence", RFC 6412, November 2011. [RFC6414] Poretsky, S., Papneja, R., Karthik, J., and S. Vapiwala, "Benchmarking Terminology for Protection Performance", RFC 6414, November 2011.[RFC 2544] Bradner, S. and J. McQuaid,11.2. Informative References [RFC2285] Mandeville, R., "BenchmarkingMethodologyTerminology forNetwork InterconnectLAN Switching Devices", RFC2544, March 1999. [RFC 6412]2285, February 1998. [RFC4202] Kompella, K., Ed., and Y. Rekhter, Ed., "Routing Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 4202, October 2005. [RFC4689] Poretsky, S.,Imhoff, B.,Perser, J., Erramilli, S., andK. Michielsen,S. Khurana, "Terminology for BenchmarkingLink-State IGP Data-Plane Route Convergence",Network-layer Traffic Control Mechanisms", RFC6412, November 2011.4689, October 2006. Appendix A. Fast Reroute Scalability Table This section provides the recommended numbers for evaluating the scalability of fast reroute implementations. It also recommends the typical numbers for IGP/VPNv4 Prefixes, LSPTunnelsTunnels, and VC entries. Based on the features supported by thedevice under test (DUT),DUT, appropriate scaling limits can be used for thetest bed. A1.testbed. A.1. FRR IGP Table No. ofHeadendHead-End TE Tunnels IGP Prefixes 1 100 1 500 1 1000 1 2000 1 5000 2 (Load Balance) 100 2 (Load Balance) 500 2 (Load Balance) 1000 2 (Load Balance) 2000 2 (Load Balance) 5000 100 100 500 500 1000 1000 2000 2000A2.A.2. FRR VPN Table No. ofHeadendHead-End TE Tunnels VPNv4 Prefixes 1 100 1 500 1 1000 1 2000 1 5000 1 10000 1 20000 1 Max 2 (Load Balance) 100 2 (Load Balance) 500 2 (Load Balance) 1000 2 (Load Balance) 2000 2 (Load Balance) 5000 2 (Load Balance) 10000 2 (Load Balance) 20000 2 (Load Balance) MaxA3.A.3. FRRMid-PointMidpoint LSP TableNoThe number ofMid-pointmidpoint TE LSPs could be configured at recommended levels--- 100, 500, 1000, 2000, or max supported number.A2.A.4. FRR VC Table No. ofHeadendHead-End TE Tunnels VC entries 1 100 1 500 1 1000 1 2000 1 Max 100 100 500 500 1000 1000 2000 2000 Appendix B. Abbreviations AIS - Alarm Indication Signal BFD - Bidirectional Fault Detection BGP - Border GatewayprotocolProtocol BKP - Backup Path and Nodes CE - Customer Edge DUT - Device Under Test FRR - Fast Reroute HE - Head-End IGP - Interior Gateway Protocol IP - Internet Protocol LOS - Loss of Signal LSP - Label Switched Path MID - Midpoint MP - Merge Point MPLS -Multi ProtocolMultiprotocol Label Switching N-Nhop - Next - Next Hop Nhop - Next Hop OIR - Online Insertion and Removal P - Provider PE - Provider Edge PHP - Penultimate Hop Popping PLBM - Packet-Loss-Based Method PLR - Point of Local Repair PRI - Primary Path RSVP - Resource reSerVation Protocol RX - Receive SRLG - Shared Risk Link Group TA - Traffic Analyzer TBM - Timestamp-Based Method TE - Traffic Engineering TG - Traffic Generator TX - Transmit UR - Upstream Router VC - Virtual Circuit VPN - Virtual Private Network Authors' Addresses Rajiv Papneja Huawei Technologies 2330 Central Expressway Santa Clara, CA 95050 USAEmail:EMail: rajiv.papneja@huawei.com Samir Vapiwala Cisco Systems 300 Beaver Brook Road Boxborough, MA 01719 USAEmail:EMail: svapiwal@cisco.com Jay Karthik Cisco Systems 300 Beaver Brook Road Boxborough, MA 01719 USAEmail:EMail: jkarthik@cisco.com Scott Poretsky Allot Communications 300 TradeCenter Woburn, MA 01801 USAEmail:EMail: sporetsky@allot.com Shankar Rao Qwest Communications 950 17th Street Suite 1900 Denver, CO 80210 USAEmail:EMail: shankar.rao@du.edu JL. Le Roux France Telecom 2 av Pierre Marzin 22300 Lannion FranceEmail:EMail: jeanlouis.leroux@orange.com