Network Working GroupInternet Engineering Task Force (IETF) Y. Jiang, Ed.Internet-DraftRequest for Comments: 8024 Y. LuoIntended status:Category: Standards Track Huawei ISSN: 2070-1721 E. Mallette, Ed. Charter Communications Y. Shen Juniper Networks W. Cheng China MobileExpires: March 2017 September 28,November 2016Multi-chassisMulti-Chassis Passive Optical Network(PON)(MC-PON) Protection in MPLSdraft-ietf-pals-mc-pon-05AbstractMulti-ProtocolMultiprotocol Label Switching (MPLS) is being extended to the edge of operator networks including the network access nodes.SeparatelySeparately, network access nodes such as Passive Optical Network (PON) Optical Line Terminations (OLTs) have evolved to support first-mile access protection, where one or more physical OLTs provide first-mile diversity to the customer edge.Multi-homingMultihoming support is needed on the MPLS-enabled PON OLT to provide resiliency for provided services. This document describes themulti-chassisMulti-Chassis PON (MC-PON) protection architecture in MPLS and also specifies the Inter-Chassis Communication Protocol (ICCP) extension to support it. Status ofthisThis Memo ThisInternet-Draftissubmitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsan Internet Standards Track document. This document is a product of the Internet Engineering Task Force(IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum(IETF). It represents the consensus ofsix monthsthe IETF community. It has received public review andmay be updated, replaced, or obsoletedhas been approved for publication byother documents at any time. Itthe Internet Engineering Steering Group (IESG). Further information on Internet Standards isinappropriate to use Internet-Drafts as reference material or to cite them other than as "workavailable inprogress." The listSection 2 of RFC 7841. Information about the currentInternet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The liststatus ofInternet-Draft Shadow Directories canthis document, any errata, and how to provide feedback on it may beaccessedobtained athttp://www.ietf.org/shadow.html This Internet-Draft will expire on March 28, 2017.http://www.rfc-editor.org/info/rfc8024. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction.............................................. 3. . . . . . . . . . . . . . . . . . . . . . . . 2 1.1. ConventionsusedUsed inthis document ......................This Document . . . . . . . . . . . . 5 1.2. Terminology............................................. . . . . . . . . . . . . . . . . . . . . . . 5 2. ICCP Protocol Extensions.................................. 6. . . . . . . . . . . . . . . . . . 5 2.1.Multi-chassisMulti-Chassis PON Application TLVs..................... 6. . . . . . . . . . . 5 2.1.1. PON Connect TLV..................................... 6. . . . . . . . . . . . . . . . . . . 5 2.1.2. PON Disconnect TLV................................... . . . . . . . . . . . . . . . . 7 2.1.3. PONSystemConfiguration TLV........................ 8. . . . . . . . . . . . . . . . 7 2.1.4. PON State TLV....................................... 9. . . . . . . . . . . . . . . . . . . . 8 3. Considerations on PON ONU Database Synchronization....... 10. . . . . 9 4.Multi-chassisMulti-Chassis PONapplication procedures ................. 10Application Procedures . . . . . . . . . . 9 4.1. ProtectionprocedureProcedure upon PONlink failures ........... 12Link Failures . . . . . . . 11 4.2. ProtectionprocedureProcedure upon PWfailures ................. 12Failures . . . . . . . . . . 11 4.3. ProtectionprocedureProcedure upon theworkingWorking OLTfailure ..... 13Failure . . . . 12 4.4. Protection Procedure for a Dual-Homing PE . . . . . . . . 12 5. Security Considerations................................... . . . . . . . . . . . . . . . . . . 12 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 136. IANA Considerations ...................................... 14 7. References ............................................... 147.1. Normative References.................................. 14. . . . . . . . . . . . . . . . . . 13 7.2. Informative References................................. . . . . . . . . . . . . . . . . 13 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 148. Acknowledgments .......................................... 15Contributors.................................................. 15. . . . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses............................................ 16. . . . . . . . . . . . . . . . . . . . . . . 15 1. IntroductionMulti-ProtocolMultiprotocol Label Switching (MPLS) is being extended to the edge of operator networks, as is described in theMulti-Segment Pseudowiresmulti-segment pseudowires (PWs) with Passive Optical Network (PON) access use case [RFC6456]. Combining MPLS with Optical Line Termination (OLT) access further facilitates alow costlow-cost, multi-service convergence. Tens of millions of Fiber-to-the-x(FTTx, x(FTTx) (x = H for home, P for premises, C for curb) lines have been deployed over the years, with many of those lines being some PON variant. PON provides operators a cost-effective solution for delivering high bandwidth(1Gbps(1 Gbps or even10Gbps)10 Gbps) to a dozen or more subscribers simultaneously. In the past, access technologies such as PON and Digital Subscriber Line (DSL) are usually used for subscribers, and no redundancy is provided in their deployment.ButBut, with the rapid growth of mobile data traffic, more and more Long Term Evolution (LTE) small cells and Wi-Fi hotspots are deployed. PON is considered a viablelow costlow-cost backhaul solution for these mobile services. Besides its high bandwidth and scalability, PON further provides frequency andtime synchronizationtime-synchronization features, e.g., SyncE [G.8261] and IEEE 1588v2 [IEEE-1588] functionality, which can fulfill synchronization needs of mobile backhaul services. The Broadband Forum specifies reference architecture for mobile backhaulnetworknetworks using MPLS transport in [TR-221] where PON can be the access technology. Unlike typical residential service where a single or handful of end- usershangshang off a single PON OLT port in a physical optical distribution network, a PON port that supports a dozen LTE small cells or Wi-Fi hotspots could be providing service to hundreds of simultaneous subscribers.Small cellSmall-cell backhaul often demands the economics of a PONfirst-milefirst mile and yet expects first-mile protection commonly available in a point-to-point access portfolio. Some optical layer protection mechanisms, such as Trunk and Tree protection, are specified in [IEEE-1904.1] to avoid a single point of failure in the access. They are called Type B and Type Cprotection respectivelyprotection, respectively, in [G.983.1]. Trunk protection architecture is an economical PON resiliency mechanism, where the working OLT and the working link between the working splitter port and the working OLT (i.e., the working trunk fiber) is protected by a redundant protection OLT and a redundant trunk fiber between the protection splitter port and the protectionOLT, howeverOLT; however, it only protects a portion of the optical path from OLT to Optical Network Units (ONUs). This is different from the more complex and costly Tree protection architecture where there is a working optical distribution network path from the working OLT and a complete protected optical distribution network path from the protection OLT to the ONUs. Figure 1 depicts a typical scenario of Trunk protection. | | |<--Optical Distribution Network->| | | | branch trunk +-----+ +-----+ fibers fibers | | Base ------| | | | . OLT | Stations ------| ONU |\ | | ,'`| A | ------| | \ V V -` +-----+ +-----+ \ .' . \ +----------+ ,-` +-----+ . \| -` Working Base ------| | . | Optical | Stations ------| ONU |---------| Splitter | ------| | . /| -, Protection +-----+ . / +----------+ `'., / `-, +-----+ +-----+ / `'.,| | Base ------| |/ | OLT | Stations ------| ONU | | B | ------| | +-----+ +-----+ Figure11: Trunk Protection Architecture in PON Besidessmall cellsmall-cell backhaul, this protection architecture can also be applicable to other services, for example,Digital Subscriber Line (DSL)DSL andMulti-SystemMultiple System Operator (MSO) services. In that case, an ONU in Figure 1 can play the similar role as a Digital Subscriber Line Access Multiplexer (DSLAM) or aDOCSISData Over Cable Service Interface Specification (DOCSIS) RemotePHYPhysical Layer (PHY) device [remote-phy], and it may further be attached with dozens of CustomerPremisePremises devices. In some deployments, it is also possible that only some ONUs need to be protected. The PON architecture as depicted in Figure 1 can provide redundancy in its physicaltopology,topology; however, alltraffictraffic, including link Operation Administration and Maintenance(OAM) are(OAM), is blocked on the protectionlinklink, which frustratesend to endend-to-end protection mechanisms such as those specified in ITU-T G.8031 [G.8031]. Therefore, some standard signaling mechanisms are needed between OLTs to exchange information, for example, PON link status, registered ONU information, and network status, so that protection and restoration can be done rapidly and reliably, especially when the OLTs also support MPLS.Inter-Chassis Communication Protocol (ICCP)ICCP [RFC7275] provides a framework for inter-chassis synchronization of state and configuration data between a set of two or more Provider Edges (PEs).CurrentlyCurrently, ICCP only definesapplication specificapplication-specific messages for Pseudowire(PW) redundancyRedundancy (PW-RED) and Multi-Chassis LACP (mLACP), but it can be easily extended to support PON as an Attachment Circuit (AC) redundancy. This document proposes the extension of ICCP to supportMulti-multi- chassis PON protection in MPLS. 1.1. ConventionsusedUsed inthis documentThis Document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 1.2. TerminologyDSLDSL: Digital Subscriber LineFTTxFTTx: Fiber-to-the-x(FTTx, x(FTTx) (x = H for home, P for premises, C for curb)ICCPICCP: Inter-Chassis Communication ProtocolOLTOLT: Optical Line TerminationONUONU: Optical Network UnitMPLS Multi-ProtocolMPLS: Multiprotocol Label SwitchingPONPON: Passive Optical NetworkRGRG: Redundancy Group 2. ICCP Protocol Extensions 2.1.Multi-chassisMulti-Chassis PON Application TLVs A set ofmulti-chassis PONMC-PON application Type-Length-Values (TLVs) are defined in the followingsub-sections.subsections. 2.1.1. PON Connect TLV This TLV is included in theRedundancy Group (RG)RG Connect message to signal the establishment of PON application connection. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0xTBD1Type=0x200D | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Protocol Version |A| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | ~ ~ | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-o U and FBits,bits: both are set to 0.- Type,o Type: set to0xTBD10x200D for "PON Connect TLV".- Length, Lengtho Length: length of the TLV in octets excluding the U-bit, F-bit, Type, and Length fields.-o ProtocolVersion,Version: the version of thisPON specificPON-specific protocol for the purposes of inter-chassis communication. This is set to 0x0001.-o ABit,bit: AcknowledgementBit.bit. It MUST be set to 1 if the sender has received a PON Connect TLV from the recipient. Otherwise, set to 0.- Reserved, Reservedo Reserved: reserved for futureuse,use and MUST be set to zero.-o OptionalSub-TLVs,Sub-TLVs: there are no optional Sub-TLVs defined for this version of the protocol. The structure ofOptionaloptional Sub-TLVs is defined as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+||U|F| Sub-TLV Type | Length |Variable Length Value |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Variable Length Value | |"| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-o U bit: set to 1. TheOptionalunknown Sub-TLV is silently ignored. o F bit: set to 0. o The optional Sub-TLV Type values will beallocated by IANA in a registry of name "TLV Type Name Space" for Label Distribution Protocol (LDP) Parameters. Processing of the Sub-TLV Types should continue when unknown Sub-TLV Type parameters are encountered, and they MUST be silently ignored. - The Length field is defined as theallocated by IANA in a registry named "ICC RG Parameter Types" for Pseudowire Name Spaces (PWE3). o Length: length of theSub-TLV Type includingTLV in octets, excluding theSub-TLV Type fieldU-bit, F-bit, Type, and Lengthfield itself.fields. 2.1.2. PON Disconnect TLV This TLV is included in the RG Disconnect message to indicate that the connection for the PON application is to be terminated. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0xTBD2Type=0x200E | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optional Sub-TLVs | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-o U and FBits,bits: both are set to 0.- Type,o Type: set to0xTBD20x200E for "PON Disconnect TLV".- Length, Lengtho Length: length of the TLV in octets excluding the U-bit, F-bit, Type, and Length fields.-o OptionalSub-TLVs,Sub-TLVs: there are no optional Sub-TLVs defined for this version of the protocol. 2.1.3. PONSystemConfiguration TLV The "PONSystemConfiguration TLV" is included in the "RG Application Data"message,message and announces an OLT's system parameters to other members in the same RG. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0xTBD3Type=0x200F | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | System ID | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | System Priority | Port ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-o U and FBits,bits: both are set to 0.- Type,o Type: set to0xTBD30x200F for "PONSystemConfiguration TLV".- Length, Lengtho Length: length of the TLV in octets excluding the U-bit, F-bit, Type, and Length fields.-o SystemID,ID: 8 octets encoding the System ID used by the OLT, which is theChassis MACchassis Media Access Control (MAC) address. If a6 octet6-octet System ID is used, the least significant 2 octets of the 8-octet field will be encoded as 0000.-o SystemPriority,Priority: a 2-octet value assigned by management or administrationpolicy,policy; the OLT with the numerically lower value of System Priority has the higher priority.-o PortID, 2 octetsID: 2-octet PON Port ID. 2.1.4. PON State TLV The "PON State TLV" is included in the "RG Application Data"message,message and used by an OLT to report its PON states to other members in the same RG. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F|Type=0xTBD4Type=0x2010 | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ROID | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Local PON PortstateState | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Remote PON PortstateState | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-o U and FBits,bits: both are set to 0.- Type,o Type: set to0xTBD40x2010 for "PON StateTLV" - Length, LengthTLV". o Length: length of the TLV in octets excluding the U-bit, F-bit, Type, and Length fields.- ROID,o ROID: Redundant Object ID (ROID) as defined in Section 4.3 of [RFC7275].-o Local PON PortState,State: the status of the local PON port as determined by the sending OLT (PE). The last bit is defined as Fault indication of the PON Port associated with this PW (1 - in fault; 0 - in normal).-o Remote PON PortState,State: the status of the remote PON port as determined by the remote peer of the sending OLT (i.e., the sending PE). The last bit is defined as Fault indication of the PON Port associated with this PW (1 - in fault; 0 - in normal). 3. Considerations on PON ONU Database Synchronization Without an effective mechanism to communicate the registered ONUs between the working and protection OLT, all registered ONUs would be de-registered and go through re-registration during a switchover, which would significantly increase protection time. To enable faster switchover capability, the working and protection OLTs need to know about the protected ONUs. To enable servicecontinuitycontinuity, a mechanism needs to be employed such that the operational state and significant configuration data of both the protected ONU and the services provisioned to it can be distributed to the working and protection OLT. The specificONUsONU's configuration and operational data can be synchronized by some policy mechanism or provisioned in the management plane.AlternativelyAlternatively, said synchronization could occur by some other signaling options. Describing how to synchronize the configuration objects associated with both protected ONU as well as the services constructed to the ONU(e.g.(e.g., ONU MAC address, IPv4 addresses, IPv6 addresses, VLAN identifiers, etc.) is outside of the scope of this document. 4.Multi-chassisMulti-Chassis PONapplication proceduresApplication Procedures Two typical MPLS protection network architectures for PON access are depicted inFig.2Figures 2 andFig.33 (their PON access segments are the same as inFig.1Figure 1 and thus omitted for simplification). OLTs with MPLS functionality are connected to a single PE(Fig.2)(Figure 2) ordual homedual-homing PEs(Fig.3)(Figure 3), respectively, i.e., the working OLT to PE1 by a working PW and the protection OLT to PE1 or PE2 by a protectionPW, thusPW; thus, these devices constitute an MPLS networkwhichthat provides PW transport services between ONUs and a Customer Edge (CE), and the PWs can provide protection for each other. +-----+ | | |OLT -, | A | `., +-----+ ', PW1 `', `., +-----+ +-----+ ', | | | | `. PE1 ------------ CE | .'`| | | | ,-` +-----+ +-----+ .` +-----+ .'` PW2 | | ,-` |OLT -` | B | +-----+ Figure22: An MPLS Network with a Single PE +-----+ +-----+ | | PW1 | | |OLT ----------------- PE1 -, | A | | | ', +-----+ +--/--+ ', | `. | `. +-----+ | `' | | | CE | | . | | ,'+-----+ | ,-` +-----+ +--\--+ ,' | | PW2 | | .` |OLT ----------------- PE2 -` | B | | | +-----+ +-----+ Figure33: An MPLS Network withDual-homingDual-Homing PEs Faults may be encountered in PON accesslinks,links or in the MPLS network (including the working OLT). Procedures for these cases are described in this section (it is assumed that both OLTs and PEs are working in the independent mode of PW redundancy [RFC6870]). 4.1. ProtectionprocedureProcedure upon PONlink failuresLink Failures When a fault is detected on a working PON link, a working OLT switches to the corresponding protection PON link attached with its protection OLT, i.e., the working OLT turns off its faulty PON interface so that the protection trunk link to its protection OLT can be activated.TheThen, the working OLTthenMUST send an LDP fault notification message (i.e., with the status bit "Local AC (ingress) Receive Fault" being set) to its peer PE on the remote end of the PW. At the same time, the working OLT MUST send an ICCP message with PON State TLV withlocalLocal PON Port State being set to notify the protection OLT of the PON fault. Upon receiving a PON state TLV where Local PON PortstateState is set, a protection OLT MUST activate the protection PON link in the protectiongroup,group and advertise a notification message for the protection PW with the Preferential Forwarding status bit of active to the remote PE. According to [RFC6870], the remote PE(s) can match the local and remote Preferential Forwarding status and select PW2 as the new active PW over which data traffic is sent. 4.2. ProtectionprocedureProcedure upon PWfailures UsuallyFailures Usually, MPLS networks haveitstheir own protection mechanism such asLSPLabel Switched Path (LSP) protection or Fast Reroute (FRR).ButBut, in alink sparselink-sparse access or aggregation network where protection for a PW is impossible in its LSP layer, the following PW layer protection procedures can be enabled. When a fault is detected on its working PW (e.g., byVCCV BFD),Virtual Circuit Connectivity Verification (VCCV) Bidirectional Forwarding Detection (BFD)), a working OLT SHOULD turn off its associated PON interface and then send an ICCP message with PON State TLV withlocalLocal PON Port State being set to notify the protection OLT of the PON fault. Upon receiving a PON state TLV where Local PON PortstateState is set, the protection OLT MUST activate its PON interface to the protection trunk fiber. At the same time, the protection OLT MUST send a notification message for the protection PW with the Preferential Forwarding status bit of active to the remote PE, so that traffic can be switched to the protection PW. 4.3. ProtectionprocedureProcedure upon theworkingWorking OLTfailureFailure As depicted inFig.Figure 2, a service is provisioned with a working PW and a protection PW, and bothPWPWs are terminated on PE1. If PE1 lost its connection to the working OLT, it SHOULD send an LDP notification message on the protection PW with the Request Switchover bit set. Upon receiving an LDP notification message from its remote PE with the Request Switchover bit set, a protection OLT MUST activate its optical interface to the protection trunk fiber and activate the associated protection PW, so that traffic can be reliably switched to the protection trunk PON link and the protection PW. 4.4. Protection Procedure for a Dual-Homing PE In the case ofFig.3,Figure 3, the PW-RED State TLV as described in Section 7.1 of [RFC7275] can be used by PE1 to notify PE2 of the faults in all the scenarios, and PE2 operates the same as described inSection 5.1Sections 4.1 to5.3.4.3 of this document. 5. Security Considerations Similar to ICCP itself, this ICCP application SHOULD only be used in well-managed and highly monitored service provider PON access networks in a single administrative domain, including the implementation of rogue ONU attachment detection and mitigation via device authentication.ThusThus, many of the security considerations as described in [RFC7275] apply here as well. Again, similar to ICCP, activity on the attachment circuits may cause security threats or be exploited to create denial-of-service attacks. In many passive optical networks, the optical paths between OLT and ONUs traverse publicly accessible facilities including public attachments(e.g.(e.g., telephone poles), which opens up the risk of excessive link bouncing by optical layer impairment. While ICCP for MC-PON interconnects in the MPLS domain and does not traverse the PON network, risks do include introduction of a malicious ONUwhichthat could cause, for example, excessive link bouncing. This link bouncing could result in increased ICCP exchanges similar to the malicious CE case described in [RFC7275]. Operators of such networks should take additional care to restrict unauthorized ONUs and to limit the impact of link bouncing at the OLT, as these could result in service impairment. 6. IANA ConsiderationsTheIANA maintains a top-level registry called "Pseudowire Name Spaces (PWE3)". It has a subregistry called "ICC RG Parameter Types". The following valuesare requestedhave been allocated from this subregistry:0xTBD10x200D PON Connect TLV0xTBD20x200E PON Disconnect TLV0xTBD30x200F PON Configuration TLV0xTBD40x2010 PON State TLV[Note to IANA, to be removed by the RFC Editor: consecutive values in the IETF Review range are requested.]7. References 7.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March19971997, <http://www.rfc-editor.org/info/rfc2119>. [RFC6870] Muley, P., Ed. and M. Aissaoui,M.,Ed., "Pseudowire Preferential Forwarding Status Bit", RFC 6870, DOI 10.17487/RFC6870, February20132013, <http://www.rfc-editor.org/info/rfc6870>. [RFC7275] Martini,L. et al,L., Salam, S., Sajassi, A., Bocci, M., Matsushima, S., and T. Nadeau, "Inter-Chassis Communication Protocol forL2VPN PELayer 2 Virtual Private Network (L2VPN) Provider Edge (PE) Redundancy", RFC 7275, DOI 10.17487/RFC7275, June20142014, <http://www.rfc-editor.org/info/rfc7275>. 7.2. Informative References[RFC6456] Li, H., Zheng, R., and Farrel, A., "Multi-Segment Pseudowires in Passive Optical Networks", RFC 6456, November 2011 [G.983.1] ITU-T, "Broadband optical access systems based on Passive Optical Networks (PON)", ITU-T G.983.1, January, 2005[G.8031]ITU-T,International Telecommunications Union, "Ethernet Linear Protection Switching", ITU-T Recommendation G.8031,January, 2015January 2015. [G.8261]ITU-T,International Telecommunications Union, "Timing and synchronization aspects in packet networks", ITU-T Recommendation G.8261,August, 2013August 2013. [G.983.1] International Telecommunications Union, "Broadband optical access systems based on Passive Optical Networks (PON)", ITU-T Recommendation G.983.1, January 2005. [IEEE-1588]IEEE Std. 1588,IEEE, "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems", IEEEInstrumentation and Measurement Society, July, 2008Std 1588-2008, DOI 10.1109/IEEESTD.2008.4579760, July 2008. [IEEE-1904.1]IEEE Std. 1904.1,IEEE, "Standard for Service Interoperability in Ethernet Passive Optical Networks (SIEPON)", IEEEComputer Society, June, 2013Std 1904.1-2013, DOI 10.1109/IEEESTD.2013.6605490, June 2013. [remote-phy] CableLabs, "Remote PHY Specification", DCN: CM-SP-R-PHY- I05-160923, September 2016. [RFC6456] Li, H., Zheng, R., and A. Farrel, "Multi-Segment Pseudowires in Passive Optical Networks", RFC 6456, DOI 10.17487/RFC6456, November 2011, <http://www.rfc-editor.org/info/rfc6456>. [TR-221]BBF TR-221,The Broadband Forum, "Technical Specifications for MPLS in Mobile Backhaul Networks",https://www.broadband- forum.org/technical/download/TR-221.pdf, the Broadband Forum, October, 2011 [remote-phy] CableLabs, "Remote PHY Specification", http://www.cablelabs.com/wp-content/uploads/specdocs/CM- SP-R-PHY-I01_150615.pdf, June, 2015 8. AcknowledgmentsBBF TR-221, October 2011. Acknowledgements The authors would like to thank Min Ye, Hongyu Li, Wei Lin, Xifeng Wan, Yannick Legoff, Shrinivas Joshi, AlexeyMelnikovMelnikov, and Stephen Farrell for their valuable discussions and comments. Contributors The following people made significant contributions to this document: Chengbin Shen China Telecom 1835 South Pudong Road Shanghai 200122, China Email: shencb@sttri.com.cn Guangtao Zhou China Unicom No.9 Shouti South Road Beijing 100048, China Email: zhouguangtao@chinaunicom.cn Authors' Addresses Yuanlong Jiang(Editor)(editor) HuaweiTechnologies Co., Ltd.Bantian, Longgang district Shenzhen518129,518129 China Email: jiangyuanlong@huawei.com Yong Luo HuaweiTechnologies Co., Ltd.Bantian, Longgang district Shenzhen518129,518129 China Email: dennis.luoyong@huawei.com Edwin Mallette(Editor)(editor) Charter Communications 4145 S. Falkenburg Road Tampa, FL 33578USAUnited States of America Email: edwin.mallette@gmail.com Yimin Shen Juniper Networks 10 Technology Park Drive Westford, MA01886, USA01886 United States of America Email: yshen@juniper.net Weiqiang Cheng China Mobile No.32 Xuanwumen West Street Beijing100053,100053 China Email: chengweiqiang@chinamobile.com