1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453
  
     | 
    
      <pre>Internet Engineering Task Force (IETF)                       Z. Ali, Ed.
Request for Comments: 8390                                 Cisco Systems
Updates: <a href="./rfc4874">4874</a>                                            G. Swallow, Ed.
Category: Standards Track                                           SETC
ISSN: 2070-1721                                            F. Zhang, Ed.
                                                                  Huawei
                                                          D. Beller, Ed.
                                                                   Nokia
                                                               July 2018
               <span class="h1">RSVP-TE Path Diversity Using Exclude Route</span>
Abstract
   RSVP-TE provides support for the communication of exclusion
   information during Label Switched Path (LSP) setup.  A typical LSP
   diversity use case is for protection, where two LSPs should follow
   different paths through the network in order to avoid single points
   of failure, thus greatly improving service availability.  This
   document specifies an approach that can be used for network scenarios
   where the full path(s) is not necessarily known by use of an abstract
   identifier for the path.  Three types of abstract identifiers are
   specified: client based, Path Computation Element (PCE) based, and
   network based.  This document specifies two new diversity subobjects
   for the RSVP eXclude Route Object (XRO) and the Explicit Exclusion
   Route Subobject (EXRS).
   For the protection use case, LSPs are typically created at a slow
   rate and exist for a long time so that it is reasonable to assume
   that a given (reference) path currently existing (with a well-known
   identifier) will continue to exist and can be used as a reference
   when creating the new diverse path.  Re-routing of the existing
   (reference) LSP, before the new path is established, is not
   considered.
<span class="grey">Ali, et al.                  Standards Track                    [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
Status of This Memo
   This is an Internet Standards Track document.
   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in <a href="./rfc7841#section-2">Section 2 of RFC 7841</a>.
   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   <a href="https://www.rfc-editor.org/info/rfc8390">https://www.rfc-editor.org/info/rfc8390</a>.
Copyright Notice
   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.
   This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (<a href="https://trustee.ietf.org/license-info">https://trustee.ietf.org/license-info</a>) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.
<span class="grey">Ali, et al.                  Standards Track                    [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
Table of Contents
   <a href="#section-1">1</a>.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   <a href="#page-3">3</a>
     <a href="#section-1.1">1.1</a>.  Conventions Used in This Document . . . . . . . . . . . .   <a href="#page-6">6</a>
     <a href="#section-1.2">1.2</a>.  Terms and Abbreviations . . . . . . . . . . . . . . . . .   <a href="#page-6">6</a>
     <a href="#section-1.3">1.3</a>.  Client-Initiated Identifier . . . . . . . . . . . . . . .   <a href="#page-7">7</a>
     <a href="#section-1.4">1.4</a>.  PCE-Allocated Identifier  . . . . . . . . . . . . . . . .   <a href="#page-7">7</a>
     <a href="#section-1.5">1.5</a>.  Network-Assigned Identifier . . . . . . . . . . . . . . .   <a href="#page-9">9</a>
   <a href="#section-2">2</a>.  RSVP-TE Signaling Extensions  . . . . . . . . . . . . . . . .  <a href="#page-10">10</a>
     <a href="#section-2.1">2.1</a>.  Diversity XRO Subobject . . . . . . . . . . . . . . . . .  <a href="#page-10">10</a>
     <a href="#section-2.2">2.2</a>.  Diversity EXRS Subobject  . . . . . . . . . . . . . . . .  <a href="#page-16">16</a>
     2.3.  Processing Rules for the Diversity XRO and EXRS
           Subobjects  . . . . . . . . . . . . . . . . . . . . . . .  <a href="#page-16">16</a>
   <a href="#section-3">3</a>.  Security Considerations . . . . . . . . . . . . . . . . . . .  <a href="#page-20">20</a>
   <a href="#section-4">4</a>.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  <a href="#page-21">21</a>
     <a href="#section-4.1">4.1</a>.  New XRO Subobject Types . . . . . . . . . . . . . . . . .  <a href="#page-21">21</a>
     <a href="#section-4.2">4.2</a>.  New EXRS Subobject Types  . . . . . . . . . . . . . . . .  <a href="#page-21">21</a>
     <a href="#section-4.3">4.3</a>.  New RSVP Error Sub-codes  . . . . . . . . . . . . . . . .  <a href="#page-22">22</a>
   <a href="#section-5">5</a>.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  <a href="#page-22">22</a>
     <a href="#section-5.1">5.1</a>.  Normative References  . . . . . . . . . . . . . . . . . .  <a href="#page-22">22</a>
     <a href="#section-5.2">5.2</a>.  Informative References  . . . . . . . . . . . . . . . . .  <a href="#page-23">23</a>
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  <a href="#page-24">24</a>
   Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  <a href="#page-24">24</a>
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <a href="#page-26">26</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>.  Introduction</span>
   Path diversity for multiple connections is a well-known operational
   requirement.  Diversity constraints ensure that Label Switched Paths
   (LSPs) can be established without sharing network resources, thus
   greatly reducing the probability of simultaneous connection failures.
   The source node can compute diverse paths for LSPs when it has full
   knowledge of the network topology and is permitted to signal an
   Explicit Route Object (ERO).  However, there are scenarios where
   different nodes perform path computations, and therefore there is a
   need for relevant diversity constraints to be signaled to those
   nodes.  These include (but are not limited to):
   o  LSPs with loose hops in the Explicit Route Object, e.g., inter-
      domain LSPs; and
   o  Generalized Multiprotocol Label Switching (GMPLS) User-Network
      Interface (UNI), where the core node may perform path computation
      [<a href="./rfc4208" title=""Generalized Multiprotocol Label Switching (GMPLS) User- Network Interface (UNI): Resource ReserVation Protocol- Traffic Engineering (RSVP-TE) Support for the Overlay Model"">RFC4208</a>].
<span class="grey">Ali, et al.                  Standards Track                    [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   [<a id="ref-RFC4874">RFC4874</a>] introduced a means of specifying nodes and resources to be
   excluded from a route using the eXclude Route Object (XRO) and
   Explicit Exclusion Route Subobject (EXRS).  It facilitates the
   calculation of diverse paths for LSPs based on known properties of
   those paths including addresses of links and nodes traversed and
   Shared Risk Link Groups (SRLGs) of traversed links.  Employing these
   mechanisms requires that the source node that initiates signaling
   knows the relevant properties of the path(s) from which diversity is
   desired.  However, there are circumstances under which this may not
   be possible or desirable, including (but not limited to):
   o  Exclusion of a path that does not originate, terminate, or
      traverse the source node of the diverse LSP, in which case the
      addresses of links and SRLGs of the path from which diversity is
      required are unknown to the source node.
   o  Exclusion of a path that is known to the source node of the
      diverse LSP for which the node has incomplete or no path
      information, e.g., due to operator policy.  In this case, the
      source node is aware of the existence of the reference path, but
      the information required to construct an XRO object to guarantee
      diversity from the reference path is not fully known.  Inter-
      domain and GMPLS overlay networks can impose such restrictions.
   This is illustrated in Figure 1, where the overlay reference model
   from [<a href="./rfc4208" title=""Generalized Multiprotocol Label Switching (GMPLS) User- Network Interface (UNI): Resource ReserVation Protocol- Traffic Engineering (RSVP-TE) Support for the Overlay Model"">RFC4208</a>] is shown.
<span class="grey">Ali, et al.                  Standards Track                    [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      Overlay                                                  Overlay
      Network       +----------------------------------+       Network
    +---------+     |                                  |     +---------+
    |  +----+ |     |  +-----+    +-----+    +-----+   |     | +----+  |
    |  |    | | UNI |  |     |    |     |    |     |   | UNI | |    |  |
    | -+ EN1+-+-----+--+ CN1 +----+ CN2 +----+ CN3 +---+-----+-+ EN3+- |
    |  |    | |  +--+--+     |    |     |    |     |   | +---+-|    |  |
    |  +----+ |  |  |  +--+--+    +--+--+    +--+--+   | |   | +----+  |
    +---------+  |  |     |          |          |      | |   +---------+
                 |  |     |          |          |      | |
    +---------+  |  |  +--+--+       |       +--+--+   | |   +---------+
    |  +----+ |  |  |  |     |       +-------+     +-----+   | +----+  |
    |  |    +-+--+  |  | CN4 +---------------+ CN5 |   |     | |    |  |
    | -+ EN2+-+-----+--+     |               |     +---+-----+-+ EN4+- |
    |  |    | | UNI |  +-----+               +-----+   | UNI | |    |  |
    |  +----+ |     |                                  |     | +----+  |
    +---------+     +----------------------------------+     +---------+
      Overlay                 Core Network                     Overlay
      Network                                                  Network
                         Legend:  EN  -  Edge Node
                                  CN  -  Core Node
                Figure 1: Overlay Reference Model [<a href="./rfc4208" title=""Generalized Multiprotocol Label Switching (GMPLS) User- Network Interface (UNI): Resource ReserVation Protocol- Traffic Engineering (RSVP-TE) Support for the Overlay Model"">RFC4208</a>]
   Figure 1 depicts two types of UNI connectivity: single-homed and
   dual-homed ENs (which also applies to higher-order multihomed
   connectivity).  Single-homed EN devices are connected to a single CN
   device via a single UNI link.  This single UNI link may constitute a
   single point of failure.  UNI connection between EN1 and CN1 is an
   example of singled-homed UNI connectivity.
   Such a single point of failure can be avoided when the EN device is
   connected to two different CN devices, as depicted for EN2 in
   Figure 1.  For the dual-homing case, it is possible to establish two
   different UNI connections from the same source EN device to the same
   destination EN device.  For example, two connections from EN2 to EN3
   may use the two UNI links EN2-CN1 and EN2-CN4.  To avoid single
   points of failure within the provider network, it is necessary to
   also ensure path (LSP) diversity within the core network.
   In a network providing a set of UNI interfaces between ENs and CNs
   such as that shown in Figure 1, the CNs typically perform path
   computation.  Information sharing across the UNI boundary is
   restricted based on the policy rules imposed by the core network.
   Typically, the core network topology information as well as LSP path
   information is not exposed to the ENs.  In the network shown in
   Figure 1, consider a use case where an LSP from EN2 to EN4 needs to
   be SRLG diverse from an LSP from EN1 to EN3.  In this case, EN2 may
<span class="grey">Ali, et al.                  Standards Track                    [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   not know SRLG attributes of the EN1-EN3 LSP and hence cannot
   construct an XRO to exclude these SRLGs.  In this example, EN2 cannot
   use the procedures described in [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>].  Similarly, an LSP from
   EN2 to EN3 traversing CN1 needs to be diverse from an LSP from EN2 to
   EN3 going via CN4.  Again, in this case, exclusions based on
   [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>] cannot be used.
   This document addresses these diversity requirements by introducing
   an approach of excluding the path taken by these particular LSP(s).
   Each reference LSP or route from which diversity is required is
   identified by an abstract "identifier".  The type of identifier to
   use is highly dependent on the core network operator's networking
   deployment scenario; it could be client initiated (provided by the
   EN), provided by a PCE, or allocated by the (core) network.  This
   document defines three different types of identifiers corresponding
   to these three cases: a client-initiated identifier, a PCE-allocated
   identifier, and an identifier allocated by the CN ingress node
   (UNI-N), i.e., a network-assigned identifier.
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>.  Conventions Used in This Document</span>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a> [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>] [<a href="./rfc8174" title=""Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words"">RFC8174</a>] when, and only when, they appear in all
   capitals, as shown here.
<span class="h3"><a class="selflink" id="section-1.2" href="#section-1.2">1.2</a>.  Terms and Abbreviations</span>
   Diverse LSP:  A diverse Label Switched Path (LSP) is an LSP that has
      a path that does not have any link or SRLG in common with the path
      of a given LSP.  Diverse LSPs are meaningful in the context of
      protection or restoration.
   ERO:  Explicit Route Object as defined in [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>].
   EXRS:  Explicit Exclusion Route Subobject as defined in [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>].
   SRLG:  Shared Risk Link Group as defined in [<a href="./rfc4202" title=""Routing Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)"">RFC4202</a>].
   Reference Path:  The reference path is the path of an existing LSP to
      which the path of a diverse LSP shall be diverse.
   XRO:  eXclude Route Object as defined in [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>].
<span class="grey">Ali, et al.                  Standards Track                    [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
<span class="h3"><a class="selflink" id="section-1.3" href="#section-1.3">1.3</a>.  Client-Initiated Identifier</span>
   The following fields MUST be used to represent the client-initiated
   identifier: IPv4/IPv6 tunnel sender address, IPv4/IPv6 tunnel
   endpoint address, Tunnel ID, and Extended Tunnel ID.  Based on local
   policy, the client MAY also include the LSP ID to identify a specific
   LSP within the tunnel.  These fields are defined in Sections <a href="#section-4.6.1.1">4.6.1.1</a>
   and 4.6.2.1 of [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>].
   The usage of the client-initiated identifier is illustrated by
   Figure 1.  Suppose an LSP from EN2 to EN4 needs to be diverse with
   respect to an LSP from EN1 to EN3.
   The LSP identifier of the EN1-EN3 LSP is LSP-IDENTIFIER1, where LSP-
   IDENTIFIER1 is defined by the tuple
      (tunnel-id = T1,
      LSP ID = L1,
      source address = EN1.RID (Route Identifier),
      destination address = EN3.RID,
      extended tunnel-id = EN1.RID).
   Similarly, the LSP identifier of the EN2-EN4 LSP is LSP-IDENTIFIER2,
   where LSP-IDENTIFIER2 is defined by the tuple
      (tunnel-id = T2,
      LSP ID = L2,
      source address = EN2.RID,
      destination address = EN4.RID,
      extended tunnel-id = EN2.RID).
   The EN1-EN3 LSP is signaled with an exclusion requirement from LSP-
   IDENTIFIER2, and the EN2-EN4 LSP is signaled with an exclusion
   requirement from LSP-IDENTIFIER1.  In order to maintain diversity
   between these two connections within the core network, the core
   network SHOULD implement crankback signaling extensions as defined in
   [<a href="./rfc4920" title=""Crankback Signaling Extensions for MPLS and GMPLS RSVP-TE"">RFC4920</a>].  Note that crankback signaling is known to lead to slower
   setup times and suboptimal paths under some circumstances as
   described by [<a href="./rfc4920" title=""Crankback Signaling Extensions for MPLS and GMPLS RSVP-TE"">RFC4920</a>].
<span class="h3"><a class="selflink" id="section-1.4" href="#section-1.4">1.4</a>.  PCE-Allocated Identifier</span>
   In scenarios where a PCE is deployed and used to perform path
   computation, typically the ingress node of the core network (e.g.,
   node CN1 in Figure 1) could consult a PCE to allocate identifiers,
   which are used to signal path diversity constraints.  In other
   deployment scenarios, a PCE is deployed at a network node(s) or it is
<span class="grey">Ali, et al.                  Standards Track                    [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   part of a Network Management System (NMS).  In all these cases, the
   PCE is consulted and the Path Key, as defined in [<a href="./rfc5520" title=""Preserving Topology Confidentiality in Inter-Domain Path Computation Using a Path-Key-Based Mechanism"">RFC5520</a>], can be
   used in RSVP signaling as the identifier to ensure diversity.
   An example of specifying LSP diversity using a Path Key is shown in
   Figure 2, where a simple network with two domains is shown.  It is
   desired to set up a pair of path-disjoint LSPs from the source in
   Domain 1 to the destination in Domain 2, but the domains keep strict
   confidentiality about all path and topology information.
   The first LSP is signaled by the source with ERO {A, B, loose Dst}
   and is set up with the path {Src, A, B, U, V, W, Dst}.  However, when
   sending the Record Route Object (RRO) out of Domain 2, node U would
   normally strip the path and replace it with a loose hop to the
   destination.  With this limited information, the source is unable to
   include enough detail in the ERO of the second LSP to avoid it
   taking, for example, the path {Src, C, D, X, V, W, Dst} for path-
   disjointness.
          ---------------------    -----------------------------
         | Domain 1            |  |                    Domain 2 |
         |                     |  |                             |
         |        ---    ---   |  |   ---    ---     ---        |
         |       | A |--| B |--+--+--| U |--| V |---| W |       |
         |      / ---    ---   |  |   ---    ---     --- \      |
         |  ---/               |  |          /       /    \---  |
         | |Src|               |  |         /       /     |Dst| |
         |  ---\               |  |        /       /      /---  |
         |      \ ---    ---   |  |   --- /   --- /  --- /      |
         |       | C |--| D |--+--+--| X |---| Y |--| Z |       |
         |        ---    ---   |  |   ---     ---    ---        |
         |                     |  |                             |
          ---------------------    -----------------------------
                  Figure 2: A Simple Multi-domain Network
   In order to support LSP diversity, node U consults the PCE and
   replaces the path segment {U, V, W} in the RRO with a Path Key
   subobject.  The PCE function assigns an "identifier" and puts it into
   the Path Key field of the Path Key subobject.  The PCE ID in the
   message indicates that this replacement operation was performed by
   node U.
   With this additional information, the source node is able to signal
   the subsequent LSPs with the ERO set to {C, D, exclude Path Key
   (signaled in the EXRS RSVP subobject), loose Dst}.  When the
   signaling message reaches node X, it can consult the PCE function
   associated with node U to expand the Path Key in order to calculate a
<span class="grey">Ali, et al.                  Standards Track                    [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   path that is diverse with respect to the first LSP.  Alternatively,
   the source node could use an ERO of {C, D, loose Dst} and include an
   XRO containing the Path Key.
   This mechanism can work with all the Path Key resolution mechanisms,
   as detailed in <a href="./rfc5553#section-3.1">Section 3.1 of [RFC5553]</a>.  A PCE, co-located or not,
   may be used to resolve the Path Key, but the node (i.e., a Label
   Switching Router (LSR)) can also use the Path Key information to
   index a path segment previously supplied to it by the entity that
   originated the Path Key (for example, the LSR that inserted the Path
   Key in the RRO or a management system).
<span class="h3"><a class="selflink" id="section-1.5" href="#section-1.5">1.5</a>.  Network-Assigned Identifier</span>
   There are scenarios in which the network provides diversity-related
   information for a service that allows the client device to include
   this information in the signaling message.  If the Shared Risk Link
   Group (SRLG) identifier information is both available and shareable
   (by policy) with the ENs, the procedure defined in [<a href="./rfc8001" title=""RSVP-TE Extensions for Collecting Shared Risk Link Group (SRLG) Information"">RFC8001</a>] can be
   used to collect SRLG identifiers associated with an LSP (LSP1).  When
   a second LSP (LSP2) needs to be diverse with respect to LSP1, the EN
   constructing the RSVP signaling message for setting up LSP2 can
   insert the SRLG identifiers associated with LSP1 as diversity
   constraints into the XRO using the procedure described in [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>].
   However, if the core network SRLG identifiers are either not
   available or not shareable with the ENs based on policies enforced by
   the core network, existing mechanisms cannot be used.
   In this document, a signaling mechanism is defined where information
   signaled to the CN via the UNI does not require shared knowledge of
   core network SRLG information.  For this purpose, the concept of a
   Path Affinity Set (PAS) is defined for abstracting SRLG information.
   The motive behind the introduction of the PAS is to minimize the
   exchange of diversity information between the core network (CNs) and
   the client devices (ENs).  The PAS contains an abstract SRLG
   identifier associated with a given path rather than a detailed SRLG
   list.  The PAS is a single identifier that can be used to request
   diversity and associate diversity.  The means by which the processing
   node determines the path corresponding to the PAS is beyond the scope
   of this document.
   A CN on the core network boundary interprets the specific PAS
   identifier (e.g., "123") as meaning to exclude the core network SRLG
   information (or equivalent) that has been allocated by LSPs
   associated with this PAS identifier value.  For example, if a path
   exists for the LSP with the PAS identifier "123", the CN would use
   local knowledge of the core network SRLGs associated with the LSPs
   tagged with PAS attribute "123" and use those SRLGs as constraints
<span class="grey">Ali, et al.                  Standards Track                    [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   for path computation.  If a PAS identifier is used as an exclusion
   identifier in the connection request, the CN (UNI-N) in the core
   network is assumed to be able to determine the existing core network
   SRLG information and calculate a path that meets the determined
   diversity constraints.
   When a CN satisfies a connection setup for an SRLG-diverse signaled
   path, the CN may optionally record the core network SRLG information
   for that connection in terms of CN-based parameters and associate
   that with the EN addresses in the Path message.  Specifically, for
   Layer 1 Virtual Private Networks (L1VPNs), Port Information Tables
   (PITs) [<a href="./rfc5251" title=""Layer 1 VPN Basic Mode"">RFC5251</a>] can be leveraged to translate between client (EN)
   addresses and core network addresses.
   The means to distribute the PAS information within the core network
   is beyond the scope of this document.  For example, the PAS and the
   associated SRLG information can be distributed within the core
   network by an Interior Gateway Protocol (IGP) or by other means such
   as configuration.  Regardless of means used to distribute the PAS
   information, the information is kept inside the core network and is
   not shared with the overlay network (see Figure 1).
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>.  RSVP-TE Signaling Extensions</span>
   This section describes the signaling extensions required to address
   the aforementioned requirements and use cases.
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>.  Diversity XRO Subobject</span>
   New Diversity XRO subobjects are defined below for the IPv4 and IPv6
   address families.  Most of the fields in the IPv4 and IPv6 Diversity
   XRO subobjects are common and are described following the definition
   of the two subobjects.
   The IPv4 Diversity XRO subobject is defined as follows:
       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |L|  XRO Type   |     Length    |DI Type|A-Flags|E-Flags| Resvd |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |           IPv4 Diversity Identifier Source Address            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                  Diversity Identifier Value                   |
      //                            ...                              //
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<span class="grey">Ali, et al.                  Standards Track                   [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   Similarly, the IPv6 Diversity XRO subobject is defined as follows:
       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |L|  XRO Type   |     Length    |DI Type|A-Flags|E-Flags| Resvd |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |           IPv6 Diversity Identifier Source Address            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |         IPv6 Diversity Identifier Source Address (cont.)      |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |         IPv6 Diversity Identifier Source Address (cont.)      |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |         IPv6 Diversity Identifier Source Address (cont.)      |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                  Diversity Identifier Value                   |
      //                            ...                              //
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   L:
      The L flag is used in the same way as for the XRO subobjects
      defined in [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>], that is:
      0 indicates that the diversity constraints MUST be satisfied, and
      1 indicates that the diversity constraints SHOULD be satisfied.
   XRO Type:
      The value is set to 38 for the IPv4 Diversity XRO subobject.  The
      value is set to 39 for the IPv6 Diversity XRO subobject.
   Length:
      Per [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>], the Length contains the total length of the
      IPv4/IPv6 subobject in bytes, including the XRO Type and Length
      fields.  The Length is variable, depending on the Diversity
      Identifier Value.
<span class="grey">Ali, et al.                  Standards Track                   [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   Diversity Identifier Type (DI Type):
      Diversity Identifier Type (DI Type) indicates the way the
      reference LSP(s) or route(s) with which diversity is required is
      identified in the IPv4/IPv6 Diversity subobjects.  The following
      three DI Type values are defined in this document:
         DI Type value   Definition
         -------------   --------------------------------
               1         Client-Initiated Identifier
               2         PCE-Allocated Identifier
               3         Network-Assigned Identifier
   Attribute Flags (A-Flags):
      The Attribute Flags (A-Flags) are used to communicate desirable
      attributes of the LSP being signaled in the IPv4/IPv6 Diversity
      subobjects.  Each flag acts independently.  Any combination of
      flags is permitted.
      0x01 = Destination node exception
         Indicates that the exclusion does not apply to the destination
         node of the LSP being signaled.
      0x02 = Processing node exception
         Indicates that the exclusion does not apply to the node(s)
         performing ERO expansion for the LSP being signaled.  An
         ingress UNI-N node is an example of such a node.
      0x04 = Penultimate node exception
         Indicates that the penultimate node of the LSP being signaled
         MAY be shared with the excluded path even when this violates
         the exclusion flags.  This flag is useful, for example, when an
         EN is not dual homed (like EN4 in Figure 1, where all LSPs have
         to go through CN5).
         The "Penultimate node exception" flag is typically set when the
         destination node is single homed (e.g., EN1 or EN4 in
         Figure 2).  In such a case, LSP diversity can only be
         accomplished inside the core network up to the egress node and
         the penultimate hop must be the same for the LSPs.
      0x08 = LSP ID to be ignored
         This flag is used to indicate tunnel-level exclusion.
         Specifically, this flag is used to indicate that if the
         diversity identifier contains an LSP ID field, then the LSP ID
         is to be ignored, and the exclusion applies to any LSP matching
         the rest of the diversity identifier.
<span class="grey">Ali, et al.                  Standards Track                   [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   Exclusion Flags (E-Flags):
      The Exclusion Flags are used to communicate the desired type(s) of
      exclusion requested in the IPv4/IPv6 Diversity subobjects.  The
      following flags are defined.  Any combination of these flags is
      permitted.  Please note that the exclusion specified by these
      flags may be modified by the value of the A-Flags.  For example,
      the node exclusion flag is ignored for the penultimate node if the
      "Penultimate node exception" flag of the A-Flags is set.
      0x01 = SRLG exclusion
         Indicates that the path of the LSP being signaled is requested
         to be SRLG disjoint with respect to the excluded path specified
         by the IPv4/IPv6 Diversity XRO subobject.
      0x02 = Node exclusion
         Indicates that the path of the LSP being signaled is requested
         to be "node diverse" from the excluded path specified by the
         IPv4/IPv6 Diversity XRO subobject.
      0x04 = Link exclusion
         Indicates that the path of the LSP being signaled is requested
         to be "link diverse" from the path specified by the IPv4/IPv6
         Diversity XRO subobject.
      0x08 = Reserved
         This flag is reserved.  It MUST be set to zero on transmission
         and MUST be ignored on receipt for both IPv4/IPv6 Diversity XRO
         subobjects.
   Resvd:
      This field is reserved.  It MUST be set to zero on transmission
      and MUST be ignored on receipt for both IPv4/IPv6 Diversity XRO
      subobjects.
   IPv4/IPv6 Diversity Identifier Source Address:
      This field MUST be set to the IPv4/IPv6 address of the node that
      assigns the diversity identifier.  Depending on the Diversity
      Identifier Type, the diversity identifier source may be a client
      node, PCE entity, or network node.  Specifically:
      *  When the Diversity Identifier Type is set to the "Client-
         Initiated Identifier", the value MUST be set to IPv4/IPv6
         tunnel sender address of the reference LSP against which
         diversity is desired.  The IPv4/IPv6 tunnel sender address is
         as defined in [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>].
<span class="grey">Ali, et al.                  Standards Track                   [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      *  When the Diversity Identifier Type is set to "PCE-Allocated
         Identifier", the value MUST be set to the IPv4/IPv6 address of
         the node that assigned the Path Key identifier and that can
         return an expansion of the Path Key or use the Path Key as
         exclusion in a path computation.  The Path Key is defined in
         [<a href="./rfc5553" title=""Resource Reservation Protocol (RSVP) Extensions for Path Key Support"">RFC5553</a>].  The PCE ID is carried in the Diversity Identifier
         Source Address field of the subobject.
      *  When the Diversity Identifier Type is set to "Network-Assigned
         Identifier", the value MUST be set to the IPv4/IPv6 address of
         the node allocating the Path Affinity Set (PAS).
   Diversity Identifier Value:  Encoding for this field depends on the
      Diversity Identifier Type, as defined in the following.
      When the Diversity Identifier Type is set to "Client-Initiated
      Identifier" in the IPv4 Diversity XRO subobject, the Diversity
      Identifier Value MUST be encoded as follows:
       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                 IPv4 Tunnel Endpoint Address                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |          Must Be Zero         |     Tunnel ID                 |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                       Extended Tunnel ID                      |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |          Must Be Zero         |            LSP ID             |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      The IPv4 Tunnel Endpoint Address, Tunnel ID, Extended Tunnel ID,
      and LSP ID are as defined in [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>].
<span class="grey">Ali, et al.                  Standards Track                   [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      When the Diversity Identifier Type is set to "Client-Initiated
      Identifier" in the IPv6 Diversity XRO subobject, the Diversity
      Identifier Value MUST be encoded as follows:
       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                 IPv6 Tunnel Endpoint Address                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |             IPv6 Tunnel Endpoint Address (cont.)              |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |             IPv6 Tunnel Endpoint Address (cont.)              |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |             IPv6 Tunnel Endpoint Address (cont.)              |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |          Must Be Zero         |     Tunnel ID                 |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                       Extended Tunnel ID                      |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   Extended Tunnel ID (cont.)                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   Extended Tunnel ID (cont.)                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   Extended Tunnel ID (cont.)                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |          Must Be Zero         |            LSP ID             |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      The IPv6 Tunnel Endpoint Address, Tunnel ID, IPv6 Extended Tunnel
      ID, and LSP ID are as defined in [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>].
      When the Diversity Identifier Type is set to "PCE-Allocated
      Identifier" in the IPv4 or IPv6 Diversity XRO subobject, the
      Diversity Identifier Value MUST be encoded as follows:
       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |         Must Be Zero          |           Path Key            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      The Path Key is defined in [<a href="./rfc5553" title=""Resource Reservation Protocol (RSVP) Extensions for Path Key Support"">RFC5553</a>].
<span class="grey">Ali, et al.                  Standards Track                   [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      When the Diversity Identifier Type is set to "Network-Assigned
      Identifier" in the IPv4 or IPv6 Diversity XRO subobject, the
      Diversity Identifier Value MUST be encoded as follows:
       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |             Path Affinity Set (PAS) Identifier                |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      The Path Affinity Set (PAS) Identifier field is a 32-bit value
      that is scoped by (i.e., is only meaningful when used in
      combination with) the Diversity Identifier Source Address field.
      There are no restrictions on how a node selects a PAS identifier
      value.  <a href="#section-1.3">Section 1.3</a> defines the PAS term and provides context on
      how values may be selected.
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>.  Diversity EXRS Subobject</span>
   [<a id="ref-RFC4874">RFC4874</a>] defines the EXRS ERO subobject.  An EXRS is used to
   identify abstract nodes or resources that must not or should not be
   used on the path between two inclusive abstract nodes or resources in
   the explicit route.  An EXRS contains one or more subobjects of its
   own, called EXRS subobjects [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>].
   An EXRS MAY include a Diversity subobject as specified in this
   document.  The same type values 38 and 39 MUST be used.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>.  Processing Rules for the Diversity XRO and EXRS Subobjects</span>
   The procedure defined in [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>] for processing the XRO and EXRS is
   not changed by this document.  The processing rules for the Diversity
   XRO and EXRS subobjects are similar unless the differences are
   explicitly described.  Similarly, IPv4 and IPv6 Diversity XRO
   subobjects and IPv4 and IPv6 Diversity EXRS subobjects follow the
   same processing rules.
   If the processing node cannot recognize the Diversity XRO/EXRS
   subobject, the node is expected to follow the procedure defined in
   [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>].
   An XRO/EXRS object MAY contain multiple Diversity subobjects of the
   same DI Type.  For example, in order to exclude multiple Path Keys, a
   node MAY include multiple Diversity XRO subobjects, each with a
   different Path Key.  Similarly, in order to exclude the routes taken
   by multiple LSPs, a node MAY include multiple Diversity XRO/EXRS
   subobjects, each with a different LSP identifier.  Likewise, to
   exclude multiple PAS identifiers, a node MAY include multiple
<span class="grey">Ali, et al.                  Standards Track                   [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   Diversity XRO/EXRS subobjects, each with a different PAS identifier.
   However, all Diversity subobjects in an XRO/EXRS MUST contain the
   same Diversity Identifier Type.  If a Path message contains an XRO/
   EXRS with multiple Diversity subobjects of different DI Types, the
   processing node MUST return a PathErr with the error code "Routing
   Problem" (24) and error sub-code "XRO/EXRS Too Complex" (68/69).
   If the processing node recognizes the Diversity XRO/EXRS subobject
   but does not support the DI Type, it MUST return a PathErr with the
   error code "Routing Problem" (24) and error sub-code "Unsupported
   Diversity Identifier Type" (36).
   In the case of DI Type "Client-Initiated Identifier", all nodes along
   the path SHOULD process the diversity information signaled in the
   XRO/EXRS Diversity subobjects to verify that the signaled diversity
   constraint is satisfied.  If a diversity violation is detected,
   crankback signaling MAY be initiated.
   In the case of DI Type "PCE-Allocated Identifier" and "Network-
   Assigned Identifier", the nodes in the domain that perform path
   computation SHOULD process the diversity information signaled in the
   XRO/EXRS Diversity subobjects as follows.  In the PCE case, the
   ingress node of a domain sends a path computation request for a path
   from ingress node to egress node, including diversity constraints to
   a PCE.  Or, in the PAS case, the ingress node is capable of
   calculating the path for the new LSP from ingress node to the egress
   node, taking the diversity constraints into account.  The calculated
   path is then carried in the Explicit Route Object (ERO).  Hence, the
   transit nodes in a domain and the domain egress node SHOULD NOT
   process the signaled diversity information unless path computation is
   performed.
   While processing the EXRS object, if a loose hop expansion results in
   the creation of another loose hop in the outgoing ERO, the processing
   node MAY include the EXRS in the newly created loose hop for further
   processing by downstream nodes.
   The A-Flags affect the processing of the Diversity XRO/EXRS subobject
   as follows:
   o  When the "Processing node exception" flag is set, the exclusion
      MUST be ignored for the node processing the XRO or EXRS subobject.
   o  When the "Destination node exception" flag is set, the exclusion
      MUST be ignored for the destination node in processing the XRO
      subobject.  The destination node exception for the EXRS subobject
      applies to the explicit node identified by the ERO subobject that
<span class="grey">Ali, et al.                  Standards Track                   [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      identifies the next abstract node.  When the "Destination node
      exception" flag is set in the EXRS subobject, exclusion MUST be
      ignored for said node (i.e., the next abstract node).
   o  When the "Penultimate node exception" flag is set in the XRO
      subobject, the exclusion MUST be ignored for the penultimate node
      on the path of the LSP being established.
      The penultimate node exception for the EXRS subobject applies to
      the node before the explicit node identified by the ERO subobject
      that identifies the next abstract node.  When the "Penultimate
      node exception" flag is set in the EXRS subobject, the exclusion
      MUST be ignored for said node (i.e., the node before the next
      abstract node).
   If the L-flag of the Diversity XRO subobject or Diversity EXRS
   subobject is not set, the processing node proceeds as follows.
   o  If the Diversity Identifier Type is set to "Client-Initiated
      Identifier", the processing node MUST ensure that the path
      calculated/expanded for the signaled LSP is diverse from the route
      taken by the LSP identified in the Diversity Identifier Value
      field.
   o  If the Diversity Identifier Type is set to "PCE-Allocated
      Identifier", the processing node MUST ensure that any path
      calculated for the signaled LSP is diverse from the route
      identified by the Path Key.  The processing node MAY use the PCE
      identified by the Diversity Identifier Source Address in the
      subobject for route computation.  The processing node MAY use the
      Path Key resolution mechanisms described in [<a href="./rfc5553" title=""Resource Reservation Protocol (RSVP) Extensions for Path Key Support"">RFC5553</a>].
   o  If the Diversity Identifier Type is set to "Network-Assigned
      Identifier", the processing node MUST ensure that the path
      calculated for the signaled LSP is diverse with respect to the
      values associated with the PAS Identifier and Diversity Identifier
      Source Address fields.
   o  Regardless of whether the path computation is performed locally or
      at a remote node (e.g., PCE), the processing node MUST ensure that
      any path calculated for the signaled LSP is diverse from the
      requested Exclusion Flags.
   o  If the excluded path referenced in the XRO subobject is unknown to
      the processing node, the processing node SHOULD ignore the
      Diversity XRO subobject and SHOULD proceed with the signaling
      request.  After sending the Resv for the signaled LSP, the
<span class="grey">Ali, et al.                  Standards Track                   [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      processing node MUST return a PathErr with the error code "Notify
      Error" (25) and error sub-code "Route of XRO LSP identifier
      unknown" (14) for the signaled LSP.
   o  If the processing node fails to find a path that meets the
      requested constraint, the processing node MUST return a PathErr
      with the error code "Routing Problem" (24) and error sub-code
      "Route blocked by Exclude Route" (67).
   If the L-flag of the Diversity XRO subobject or Diversity EXRS
   subobject is set, the processing node proceeds as follows:
   o  If the Diversity Identifier Type is set to "Client-Initiated
      Identifier", the processing node SHOULD ensure that the path
      calculated/expended for the signaled LSP is diverse from the route
      taken by the LSP identified in the Diversity Identifier Value
      field.
   o  If the Diversity Identifier Type is set to "PCE-Allocated
      Identifier", the processing node SHOULD ensure that the path
      calculated for the signaled LSP is diverse from the route
      identified by the Path Key.
   o  If the Diversity Identifier Type is set to "Network-Assigned
      Identifier", the processing node SHOULD ensure that the path
      calculated for the signaled LSP is diverse with respect to the
      values associated with the PAS Identifier and Diversity Identifier
      Source Address fields.
   o  If the processing node fails to find a path that meets the
      requested constraint, it SHOULD proceed with signaling using a
      suitable path that meets the constraint as far as possible.  After
      sending the Resv for the signaled LSP, it MUST return a PathErr
      message with error code "Notify Error" (25) and error sub-code
      "Failed to satisfy Exclude Route" (15) to the source node.
   If, subsequent to the initial signaling of a diverse LSP, an excluded
   path referenced in the XRO subobject becomes known to the processing
   node or a change in the excluded path becomes known to the processing
   node, the processing node MUST re-evaluate the exclusion and
   diversity constraints requested by the diverse LSP to determine
   whether they are still satisfied.
   o  In the case where the L-flag was not set in the initial setup
      message, the exclusion and diversity constraints were satisfied at
      the time of the initial setup.  If the processing node re-
      evaluating the exclusion and diversity constraints for a diverse
      LSP detects that the exclusion and diversity constraints are no
<span class="grey">Ali, et al.                  Standards Track                   [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
      longer met, it MUST send a PathErr message for the diverse LSP
      with the error code "Routing Problem" (24) and error sub-code
      "Route blocked by Exclude Route" (67).  The Path_State_Removed
      (PSR) flag [<a href="./rfc3473" title=""Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol- Traffic Engineering (RSVP-TE) Extensions"">RFC3473</a>] MUST NOT be set.  A source node receiving a
      PathErr message with this error code and sub-code combination
      SHOULD take appropriate actions and move the diverse LSP to a new
      path that meets the original constraints.
   o  In the case where the L-flag was set in the initial setup message,
      the exclusion and diversity constraints may or may not be
      satisfied at any given time.  If the exclusion constraints for a
      diverse LSP were satisfied before, and if the processing node re-
      evaluating the exclusion and diversity constraints for a diverse
      LSP detects that exclusion and diversity constraints are no longer
      met, it MUST send a PathErr message for the diverse LSP with the
      error code "Notify Error" (25) and error sub-code "Failed to
      satisfy Exclude Route" (15).  The PSR flag MUST NOT be set.  The
      source node MAY take no consequent action and keep the LSP along
      the path that does not meet the original constraints.  Similarly,
      if the exclusion constraints for a diverse LSP were not satisfied
      before, and if the processing node re-evaluating the exclusion and
      diversity constraints for a diverse LSP detects that the exclusion
      constraints are met, it MUST send a PathErr message for the
      diverse LSP with the error code "Notify Error" (25) and a new
      error sub-code "Compliant path exists" (16).  The PSR flag MUST
      NOT be set.  A source node receiving a PathErr message with this
      error code and sub-code combination MAY move the diverse LSP to a
      new path that meets the original constraints.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>.  Security Considerations</span>
   This document does not introduce any additional security issues in
   addition to those identified in [<a href="./rfc5920" title=""Security Framework for MPLS and GMPLS Networks"">RFC5920</a>], [<a href="./rfc2205" title=""Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification"">RFC2205</a>], [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>],
   [<a href="./rfc3473" title=""Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol- Traffic Engineering (RSVP-TE) Extensions"">RFC3473</a>], [<a href="./rfc2747" title=""RSVP Cryptographic Authentication"">RFC2747</a>], [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>], [<a href="./rfc5520" title=""Preserving Topology Confidentiality in Inter-Domain Path Computation Using a Path-Key-Based Mechanism"">RFC5520</a>], and [<a href="./rfc5553" title=""Resource Reservation Protocol (RSVP) Extensions for Path Key Support"">RFC5553</a>].
   The diversity mechanisms defined in this document rely on the new
   diversity subobject that is carried in the XRO or EXRS, respectively.
   In <a href="./rfc4874#section-7">Section 7 of [RFC4874]</a>, it is noted that some administrative
   boundaries may remove the XRO due to security concerns on explicit
   route information exchange.  However, when the diversity subobjects
   specified in this document are used, removing at the administrative
   boundary an XRO containing these diversity subobjects would result in
   the request for diversity being dropped at the boundary, and path
   computation would be unlikely to produce the requested diverse path.
   As such, diversity subobjects MUST be retained in an XRO crossing an
   administrative boundary, even if other subobjects are removed.  This
<span class="grey">Ali, et al.                  Standards Track                   [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   retention would be based on operator policy.  The use of diversity
   subobjects is based on mutual agreement.  This avoids the need to
   share the identity of network resources when supporting diversity.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>.  IANA Considerations</span>
   IANA has assigned new values defined in this document and summarized
   in this section.
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>.  New XRO Subobject Types</span>
   In the IANA registry for RSVP parameters, under "Class Names, Class
   Numbers, and Class Types", this document defines two new subobjects
   for the EXCLUDE_ROUTE object [<a href="./rfc4874" title=""Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)"">RFC4874</a>], C-Type 1 (see "Class Types or
   C-Types - 232 EXCLUDE_ROUTE" on <<a href="https://www.iana.org/assignments/rsvp-parameters">https://www.iana.org/assignments/</a>
   <a href="https://www.iana.org/assignments/rsvp-parameters">rsvp-parameters</a>>).
                        +----------------+-------+
                        | Description    | Value |
                        +----------------+-------+
                        | IPv4 Diversity | 38    |
                        | IPv6 Diversity | 39    |
                        +----------------+-------+
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>.  New EXRS Subobject Types</span>
   The Diversity XRO subobjects are also defined as new EXRS subobjects
   (see "Class Types or C-Types - 20 EXPLICIT_ROUTE" on
   <<a href="https://www.iana.org/assignments/rsvp-parameters">https://www.iana.org/assignments/rsvp-parameters</a>>).  The same
   numeric values have been assigned:
                        +----------------+-------+
                        | Description    | Value |
                        +----------------+-------+
                        | IPv4 Diversity | 38    |
                        | IPv6 Diversity | 39    |
                        +----------------+-------+
<span class="grey">Ali, et al.                  Standards Track                   [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a>.  New RSVP Error Sub-codes</span>
   In the IANA registry for RSVP parameters, under "Error Codes and
   Globally Defined Error Value Sub-Codes", for Error Code "Routing
   Problem" (24) (see [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>]), the following sub-codes are defined
   (see "Sub-Codes - 24 Routing Problem" on
   <<a href="https://www.iana.org/assignments/rsvp-parameters">https://www.iana.org/assignments/rsvp-parameters</a>>).
       +-------+---------------------------------------+-----------+
       | Value | Description                           | Reference |
       +-------+---------------------------------------+-----------+
       | 36    | Unsupported Diversity Identifier Type | <a href="./rfc8390">RFC 8390</a>  |
       +-------+---------------------------------------+-----------+
   For Error Code "Notify Error" (25) (see [<a href="./rfc3209" title=""RSVP-TE: Extensions to RSVP for LSP Tunnels"">RFC3209</a>]), the following
   sub-codes are defined (see "Sub-Codes - 25 Notify Error" on
   <<a href="https://www.iana.org/assignments/rsvp-parameters">https://www.iana.org/assignments/rsvp-parameters</a>>).
        +-------+-------------------------------------+-----------+
        | Value | Description                         | Reference |
        +-------+-------------------------------------+-----------+
        | 14    | Route of XRO LSP identifier unknown | <a href="./rfc8390">RFC 8390</a>  |
        | 15    | Failed to satisfy Exclude Route     | <a href="./rfc8390">RFC 8390</a>  |
        | 16    | Compliant path exists               | <a href="./rfc8390">RFC 8390</a>  |
        +-------+-------------------------------------+-----------+
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>.  References</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>.  Normative References</span>
   [<a id="ref-RFC2119">RFC2119</a>]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>,
              DOI 10.17487/RFC2119, March 1997,
              <<a href="https://www.rfc-editor.org/info/rfc2119">https://www.rfc-editor.org/info/rfc2119</a>>.
   [<a id="ref-RFC2747">RFC2747</a>]  Baker, F., Lindell, B., and M. Talwar, "RSVP Cryptographic
              Authentication", <a href="./rfc2747">RFC 2747</a>, DOI 10.17487/RFC2747, January
              2000, <<a href="https://www.rfc-editor.org/info/rfc2747">https://www.rfc-editor.org/info/rfc2747</a>>.
   [<a id="ref-RFC3209">RFC3209</a>]  Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
              and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
              Tunnels", <a href="./rfc3209">RFC 3209</a>, DOI 10.17487/RFC3209, December 2001,
              <<a href="https://www.rfc-editor.org/info/rfc3209">https://www.rfc-editor.org/info/rfc3209</a>>.
<span class="grey">Ali, et al.                  Standards Track                   [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   [<a id="ref-RFC3473">RFC3473</a>]  Berger, L., Ed., "Generalized Multi-Protocol Label
              Switching (GMPLS) Signaling Resource ReserVation Protocol-
              Traffic Engineering (RSVP-TE) Extensions", <a href="./rfc3473">RFC 3473</a>,
              DOI 10.17487/RFC3473, January 2003,
              <<a href="https://www.rfc-editor.org/info/rfc3473">https://www.rfc-editor.org/info/rfc3473</a>>.
   [<a id="ref-RFC4202">RFC4202</a>]  Kompella, K., Ed. and Y. Rekhter, Ed., "Routing Extensions
              in Support of Generalized Multi-Protocol Label Switching
              (GMPLS)", <a href="./rfc4202">RFC 4202</a>, DOI 10.17487/RFC4202, October 2005,
              <<a href="https://www.rfc-editor.org/info/rfc4202">https://www.rfc-editor.org/info/rfc4202</a>>.
   [<a id="ref-RFC4874">RFC4874</a>]  Lee, CY., Farrel, A., and S. De Cnodder, "Exclude Routes -
              Extension to Resource ReserVation Protocol-Traffic
              Engineering (RSVP-TE)", <a href="./rfc4874">RFC 4874</a>, DOI 10.17487/RFC4874,
              April 2007, <<a href="https://www.rfc-editor.org/info/rfc4874">https://www.rfc-editor.org/info/rfc4874</a>>.
   [<a id="ref-RFC4920">RFC4920</a>]  Farrel, A., Ed., Satyanarayana, A., Iwata, A., Fujita, N.,
              and G. Ash, "Crankback Signaling Extensions for MPLS and
              GMPLS RSVP-TE", <a href="./rfc4920">RFC 4920</a>, DOI 10.17487/RFC4920, July 2007,
              <<a href="https://www.rfc-editor.org/info/rfc4920">https://www.rfc-editor.org/info/rfc4920</a>>.
   [<a id="ref-RFC5553">RFC5553</a>]  Farrel, A., Ed., Bradford, R., and JP. Vasseur, "Resource
              Reservation Protocol (RSVP) Extensions for Path Key
              Support", <a href="./rfc5553">RFC 5553</a>, DOI 10.17487/RFC5553, May 2009,
              <<a href="https://www.rfc-editor.org/info/rfc5553">https://www.rfc-editor.org/info/rfc5553</a>>.
   [<a id="ref-RFC8174">RFC8174</a>]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in <a href="./rfc2119">RFC</a>
              <a href="./rfc2119">2119</a> Key Words", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc8174">RFC 8174</a>, DOI 10.17487/RFC8174,
              May 2017, <<a href="https://www.rfc-editor.org/info/rfc8174">https://www.rfc-editor.org/info/rfc8174</a>>.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>.  Informative References</span>
   [<a id="ref-RFC2205">RFC2205</a>]  Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S.
              Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
              Functional Specification", <a href="./rfc2205">RFC 2205</a>, DOI 10.17487/RFC2205,
              September 1997, <<a href="https://www.rfc-editor.org/info/rfc2205">https://www.rfc-editor.org/info/rfc2205</a>>.
   [<a id="ref-RFC4208">RFC4208</a>]  Swallow, G., Drake, J., Ishimatsu, H., and Y. Rekhter,
              "Generalized Multiprotocol Label Switching (GMPLS) User-
              Network Interface (UNI): Resource ReserVation Protocol-
              Traffic Engineering (RSVP-TE) Support for the Overlay
              Model", <a href="./rfc4208">RFC 4208</a>, DOI 10.17487/RFC4208, October 2005,
              <<a href="https://www.rfc-editor.org/info/rfc4208">https://www.rfc-editor.org/info/rfc4208</a>>.
   [<a id="ref-RFC5251">RFC5251</a>]  Fedyk, D., Ed., Rekhter, Y., Ed., Papadimitriou, D.,
              Rabbat, R., and L. Berger, "Layer 1 VPN Basic Mode",
              <a href="./rfc5251">RFC 5251</a>, DOI 10.17487/RFC5251, July 2008,
              <<a href="https://www.rfc-editor.org/info/rfc5251">https://www.rfc-editor.org/info/rfc5251</a>>.
<span class="grey">Ali, et al.                  Standards Track                   [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   [<a id="ref-RFC5520">RFC5520</a>]  Bradford, R., Ed., Vasseur, JP., and A. Farrel,
              "Preserving Topology Confidentiality in Inter-Domain Path
              Computation Using a Path-Key-Based Mechanism", <a href="./rfc5520">RFC 5520</a>,
              DOI 10.17487/RFC5520, April 2009,
              <<a href="https://www.rfc-editor.org/info/rfc5520">https://www.rfc-editor.org/info/rfc5520</a>>.
   [<a id="ref-RFC5920">RFC5920</a>]  Fang, L., Ed., "Security Framework for MPLS and GMPLS
              Networks", <a href="./rfc5920">RFC 5920</a>, DOI 10.17487/RFC5920, July 2010,
              <<a href="https://www.rfc-editor.org/info/rfc5920">https://www.rfc-editor.org/info/rfc5920</a>>.
   [<a id="ref-RFC8001">RFC8001</a>]  Zhang, F., Ed., Gonzalez de Dios, O., Ed., Margaria, C.,
              Hartley, M., and Z. Ali, "RSVP-TE Extensions for
              Collecting Shared Risk Link Group (SRLG) Information",
              <a href="./rfc8001">RFC 8001</a>, DOI 10.17487/RFC8001, January 2017,
              <<a href="https://www.rfc-editor.org/info/rfc8001">https://www.rfc-editor.org/info/rfc8001</a>>.
Acknowledgements
   The authors would like to thank Xihua Fu for his contributions.  The
   authors also would like to thank Luyuan Fang and Walid Wakim for
   their review and comments.
Contributors
   Igor Bryskin
   Huawei Technologies
   Email: Igor.Bryskin@huawei.com
   Daniele Ceccarelli
   Ericsson
   Email: Daniele.Ceccarelli@ericsson.com
   Dhruv Dhody
   Huawei Technologies
   Email: dhruv.ietf@gmail.com
   Don Fedyk
   Hewlett-Packard Enterprise
   Email: don.fedyk@hpe.com
   Clarence Filsfils
   Cisco Systems, Inc.
   Email: cfilsfil@cisco.com
   Gabriele Maria Galimberti
   Cisco Systems
   Email: ggalimbe@cisco.com
<span class="grey">Ali, et al.                  Standards Track                   [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
   Ori Gerstel
   SDN Solutions Ltd.
   Email: origerstel@gmail.com
   Oscar Gonzalez de Dios
   Telefonica I+D
   Email: ogondio@tid.es
   Matt Hartley
   Cisco Systems
   Email: mhartley@cisco.com
   Kenji Kumaki
   KDDI Corporation
   Email: ke-kumaki@kddi.com
   Ruediger Kunze
   Deutsche Telekom AG
   Email: Ruediger.Kunze@telekom.de
   Lieven Levrau
   Nokia
   Email: Lieven.Levrau@nokia.com
   Cyril Margaria
   Email: cyril.margaria@gmail.com
   Julien Meuric
   France Telecom Orange
   Email: julien.meuric@orange.com
   Yuji Tochio
   Fujitsu
   Email: tochio@jp.fujitsu.com
   Xian Zhang
   Huawei Technologies
   Email: zhang.xian@huawei.com
<span class="grey">Ali, et al.                  Standards Track                   [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc8390">RFC 8390</a>                 RVSP-TE Path Diversity                July 2018</span>
Authors' Addresses
   Zafar Ali (editor)
   Cisco Systems.
   Email: zali@cisco.com
   George Swallow (editor)
   Southend Technical Center
   Email: swallow.ietf@gmail.com
   Fatai Zhang (editor)
   Huawei Technologies
   Email: zhangfatai@huawei.com
   Dieter Beller (editor)
   Nokia
   Email: Dieter.Beller@nokia.com
Ali, et al.                  Standards Track                   [Page 26]
</pre>
 
     |