I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-06.txt
internet-drafts@ietf.org Tue, 29 April 2014 20:34 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id DE8AC1A09C2; Tue, 29 Apr 2014 13:34:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No,
score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VEJ91TtcHXx7;
Tue, 29 Apr 2014 13:34:23 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com
(Postfix) with ESMTP id 2D1E61A09C4; Tue, 29 Apr 2014 13:34:22 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-06.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 5.4.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20140429203422.14260.12719.idtracker@ietfa.amsl.com>
Date: Tue, 29 Apr 2014 13:34:22 -0700
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/3rfYqFdh7XqSHA8LA2K73DWHJLg
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>,
<mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>,
<mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 20:34:30 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Layer 2 Virtual Private Networks Working Group of the IETF.
Title : PIM Snooping over VPLS
Authors : Olivier Dornon
Jayant Kotalwar
Venu Hemige
Ray Qiu
Filename : draft-ietf-l2vpn-vpls-pim-snooping-06.txt
Pages : 40
Date : 2014-04-29
Abstract:
This document describes the procedures and recommendations for VPLS
PEs to facilitate replication of multicast traffic to only certain
ports (behind which there are interested PIM routers and/or IGMP
hosts) via PIM Snooping and PIM Proxy.
With PIM Snooping, PEs passively listen to certain PIM control
messages to build control and forwarding states while transparently
flooding those messages. With PIM Proxy, PEs do not flood PIM Join/
Prune messages but only generate their own and send out of certain
ports, based on the control states built from downstream Join/Prune
messages. PIM Proxy is required when PIM Join suppression is enabled
on the CE devices and useful to reduce PIM control traffic in a VPLS
domain.
The document also describes PIM Relay, which can be viewed as light-
weight proxy, where all downstream Join/Prune messages are simply
forwarded out of certain ports but not flooded to avoid triggering
PIM Join suppression on CE devices.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-l2vpn-vpls-pim-snooping/
There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-l2vpn-vpls-pim-snooping-06
A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-l2vpn-vpls-pim-snooping-06
Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
- I-D Action: draft-ietf-l2vpn-vpls-pim-snooping-06… internet-drafts