<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" consensus="true" docName="draft-ietf-pce-inter-area-as-applicability-08" indexInclude="true" ipr="trust200902" number="8694" prepTime="2019-12-18T20:22:25" scripts="Common,Han,Latin" sortRefs="false" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-pce-inter-area-as-applicability-08" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8694" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Applicability of PCE to MPLS and GMPLS">Applicability of the Path Computation Element to Inter-area and Inter-AS MPLS and GMPLS Traffic Engineering</title>
    <seriesInfo name="RFC" value="8694" stream="IETF"/>
    <author fullname="Daniel King" initials="D." surname="King">
      <organization showOnFrontPage="true">Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author fullname="郑好棉" asciiFullname="Haomian Zheng">
      <organization ascii="Huawei Technologies" showOnFrontPage="true">华为技术有限公司</organization>
      <address>
        <postal>
          <street ascii="H1, Huawei Xiliu Beipo Village, Songshan Lake">松山湖华为溪流背坡村H1</street>
          <city ascii="Dongguan">东莞</city>
          <region ascii="Guangdong">广东</region>
          <code>523808</code>
          <country ascii="China">中国</country>
        </postal>
        <email>zhenghaomian@huawei.com</email>
      </address>
    </author>
    <date month="12" year="2019"/>
    <workgroup>PCE Working Group</workgroup>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">
   The Path Computation Element (PCE) may be used for computing services
   that traverse multi-area and  multi-Autonomous System (multi-AS) Multiprotocol Label Switching
   (MPLS) and Generalized MPLS (GMPLS) Traffic-Engineered (TE) networks.</t>
      <t pn="section-abstract-2">
   This document examines the applicability of the PCE architecture,
   protocols, and protocol extensions for computing multi-area and
   multi-AS paths in MPLS and GMPLS networks.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by the
            Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8694" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2019 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domains">Domains</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-path-computation">Path Computation</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2.2.2">
                  <li pn="section-toc.1-1.1.2.2.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.1.2.2.2.1.1"><xref derivedContent="1.2.1" format="counter" sectionFormat="of" target="section-1.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pce-based-path-computation-">PCE-Based Path Computation Procedure</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.1.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.3.1"><xref derivedContent="1.3" format="counter" sectionFormat="of" target="section-1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-traffic-engineering-aggrega">Traffic Engineering Aggregation and Abstraction</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.4.1"><xref derivedContent="1.4" format="counter" sectionFormat="of" target="section-1.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-traffic-engineered-label-sw">Traffic-Engineered Label Switched Paths</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.5">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.5.1"><xref derivedContent="1.5" format="counter" sectionFormat="of" target="section-1.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-area-and-inter-as-cap">Inter-area and Inter-AS-capable PCE Discovery</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.6">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.6.1"><xref derivedContent="1.6" format="counter" sectionFormat="of" target="section-1.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-objective-functions">Objective Functions</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-issues-and-considerations">Issues and Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-multihoming">Multihoming</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-destination-location">Destination Location</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-confidentiality">Domain Confidentiality</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-topologies">Domain Topologies</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-selecting-domain-paths">Selecting Domain Paths</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-sizes">Domain Sizes</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-diversity">Domain Diversity</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-synchronized-path-computati">Synchronized Path Computations</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-inclusion-or-exclusi">Domain Inclusion or Exclusion</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-applicability-of-the-pce-to">Applicability of the PCE to Inter-area Traffic Engineering</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-area-routing">Inter-area Routing</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2">
                  <li pn="section-toc.1-1.5.2.1.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.5.2.1.2.1.1"><xref derivedContent="5.1.1" format="counter" sectionFormat="of" target="section-5.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-area-inclusion-and-exclusio">Area Inclusion and Exclusion</xref></t>
                  </li>
                  <li pn="section-toc.1-1.5.2.1.2.2">
                    <t keepWithNext="true" pn="section-toc.1-1.5.2.1.2.2.1"><xref derivedContent="5.1.2" format="counter" sectionFormat="of" target="section-5.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-strict-explicit-path-and-lo">Strict Explicit Path and Loose Path</xref></t>
                  </li>
                  <li pn="section-toc.1-1.5.2.1.2.3">
                    <t keepWithNext="true" pn="section-toc.1-1.5.2.1.2.3.1"><xref derivedContent="5.1.3" format="counter" sectionFormat="of" target="section-5.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-area-diverse-path-com">Inter-Area Diverse Path Computation</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-applicability-of-the-pce-to-">Applicability of the PCE to Inter-AS Traffic Engineering</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-as-routing">Inter-AS Routing</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2.1.2">
                  <li pn="section-toc.1-1.6.2.1.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.6.2.1.2.1.1"><xref derivedContent="6.1.1" format="counter" sectionFormat="of" target="section-6.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-as-inclusion-and-exclusion">AS Inclusion and Exclusion</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-as-bandwidth-guarante">Inter-AS Bandwidth Guarantees</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.6.2.3.1"><xref derivedContent="6.3" format="counter" sectionFormat="of" target="section-6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-as-recovery">Inter-AS Recovery</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.6.2.4.1"><xref derivedContent="6.4" format="counter" sectionFormat="of" target="section-6.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inter-as-pce-peering-polici">Inter-AS PCE Peering Policies</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t keepWithNext="true" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-multi-domain-pce-deployment">Multi-domain PCE Deployment Options</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-traffic-engineering-databas">Traffic Engineering Database and Synchronization</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2.1.2">
                  <li pn="section-toc.1-1.7.2.1.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.7.2.1.2.1.1"><xref derivedContent="7.1.1" format="counter" sectionFormat="of" target="section-7.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-applicability-of-bgp-ls-to-">Applicability of BGP-LS to PCE</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pre-planning-and-management">Pre-planning and Management-Based Solutions</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t keepWithNext="true" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-domain-confidentiality-2">Domain Confidentiality</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-loose-hops">Loose Hops</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-confidential-path-segments-">Confidential Path Segments and Path-Keys</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t keepWithNext="true" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-point-to-multipoint">Point to Multipoint</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t keepWithNext="true" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-optical-domains">Optical Domains</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.10.2">
              <li pn="section-toc.1-1.10.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.10.2.1.1"><xref derivedContent="10.1" format="counter" sectionFormat="of" target="section-10.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-abstraction-and-control-of-">Abstraction and Control of TE Networks (ACTN)</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.11">
            <t keepWithNext="true" pn="section-toc.1-1.11.1"><xref derivedContent="11" format="counter" sectionFormat="of" target="section-11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-policy">Policy</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t keepWithNext="true" pn="section-toc.1-1.12.1"><xref derivedContent="12" format="counter" sectionFormat="of" target="section-12"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-manageability-consideration">Manageability Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.12.2">
              <li pn="section-toc.1-1.12.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.12.2.1.1"><xref derivedContent="12.1" format="counter" sectionFormat="of" target="section-12.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-of-function-and-pol">Control of Function and Policy</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.12.2.2.1"><xref derivedContent="12.2" format="counter" sectionFormat="of" target="section-12.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-information-and-data-models">Information and Data Models</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.12.2.3.1"><xref derivedContent="12.3" format="counter" sectionFormat="of" target="section-12.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-liveness-detection-and-moni">Liveness Detection and Monitoring</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.12.2.4.1"><xref derivedContent="12.4" format="counter" sectionFormat="of" target="section-12.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-verifying-correct-operation">Verifying Correct Operation</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.5">
                <t keepWithNext="true" pn="section-toc.1-1.12.2.5.1"><xref derivedContent="12.5" format="counter" sectionFormat="of" target="section-12.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-impact-on-network-operation">Impact on Network Operation</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.13">
            <t keepWithNext="true" pn="section-toc.1-1.13.1"><xref derivedContent="13" format="counter" sectionFormat="of" target="section-13"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2">
              <li pn="section-toc.1-1.13.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.13.2.1.1"><xref derivedContent="13.1" format="counter" sectionFormat="of" target="section-13.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-multi-domain-security">Multi-domain Security</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.14">
            <t keepWithNext="true" pn="section-toc.1-1.14.1"><xref derivedContent="14" format="counter" sectionFormat="of" target="section-14"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.15">
            <t keepWithNext="true" pn="section-toc.1-1.15.1"><xref derivedContent="15" format="counter" sectionFormat="of" target="section-15"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.15.2">
              <li pn="section-toc.1-1.15.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.15.2.1.1"><xref derivedContent="15.1" format="counter" sectionFormat="of" target="section-15.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.15.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.15.2.2.1"><xref derivedContent="15.2" format="counter" sectionFormat="of" target="section-15.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.16">
            <t keepWithNext="true" pn="section-toc.1-1.16.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.17">
            <t keepWithNext="true" pn="section-toc.1-1.17.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.18">
            <t keepWithNext="true" pn="section-toc.1-1.18.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">
   Computing paths across large multi-domain environments may
   require special computational components and cooperation between
   entities in different domains capable of complex path computation.</t>
      <t pn="section-1-2">
   Issues that may exist when routing in multi-domain networks include the
      following:</t>
      <ul spacing="normal" bare="false" empty="false" pn="section-1-3">
        <li pn="section-1-3.1">There is often a lack of full topology and TE information across
     domains.</li>
        <li pn="section-1-3.2">No single node has the full visibility to determine an optimal or
     even feasible end-to-end path across domains.</li>
        <li pn="section-1-3.3">Knowing how to evaluate and select the exit point and next domain
      boundary from a domain.</li>
        <li pn="section-1-3.4">Understanding how the ingress node determines which domains should
      be used for the end-to-end path.</li>
      </ul>
      <t pn="section-1-4">
   An information exchange across multiple domains is often limited due to
   the lack of trust relationship, security issues, or scalability
   issues, even if there is a trust relationship between domains.</t>
      <t pn="section-1-5">
   The Path Computation Element (PCE) <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/> provides an architecture
   and a set of functional components to address the problem space and the
   issues highlighted above.</t>
      <t pn="section-1-6">
   A PCE may be used to compute end-to-end paths across multi-domain
   environments using a per-domain path computation technique <xref target="RFC5152" format="default" sectionFormat="of" derivedContent="RFC5152"/>.

   The so-called backward recursive PCE-based computation (BRPC) mechanism
   <xref target="RFC5441" format="default" sectionFormat="of" derivedContent="RFC5441"/> defines a path computation procedure to compute
   inter-domain constrained Multiprotocol Label Switching (MPLS) and
   Generalized MPLS (GMPLS) Traffic-Engineered (TE) networks.

 However,
   both per-domain and BRPC techniques assume that the sequence of
   domains to be crossed from source to destination is known, either
   fixed by the network operator or obtained by other means.</t>
      <t pn="section-1-7">
   In more advanced deployments (including multi-area and multi-Autonomous System (multi-AS) environments), the sequence of domains
   may not be known in advance, and the choice of domains in the end-to-end
   domain sequence might be critical to the determination of an
   optimal end-to-end path. In this case, the use of the hierarchical PCE
   <xref target="RFC6805" format="default" sectionFormat="of" derivedContent="RFC6805"/> architecture and mechanisms may be used to discover the
   intra-area path and select the optimal end-to-end domain sequence.</t>
      <t pn="section-1-8">
   This document describes the processes and procedures available when
   using the PCE architecture and protocols for computing inter-area
   and inter-AS MPLS and GMPLS Traffic-Engineered paths.</t>
      <t pn="section-1-9">
   The scope of this document does not include discussions of deployment
   scenarios for stateful PCE, active PCE, remotely initiated PCE, or 
   PCE as a central controller (PCECC).
</t>
      <section anchor="sect-1.1" numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-domains">Domains</name>
        <t pn="section-1.1-1">
   Generally, a domain can be defined as a separate administrative,
   geographic, or switching environment within the network. A domain
   may be further defined as a zone of routing or computational ability.
   Under these definitions, a domain might be categorized as an
   Autonomous System (AS) or an Interior Gateway Protocol (IGP) area
   (as per <xref target="RFC4726" format="default" sectionFormat="of" derivedContent="RFC4726"/> and <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/>).</t>
        <t pn="section-1.1-2">
   For the purposes of this document, a domain is considered to be a
   collection of network elements within an area or AS that has a
   common sphere of address management or path computational
   responsibility. Wholly or partially overlapping domains are not
   within the scope of this document.</t>
        <t pn="section-1.1-3">
   In the context of GMPLS, a particularly important example of a domain
   is the Automatically Switched Optical Network (ASON) subnetwork
   <xref target="G-8080" format="default" sectionFormat="of" derivedContent="G-8080"/>. In this case, computation of an end-to-end path requires
   the selection of nodes and links within a parent domain where some
   nodes may, in fact, be subnetworks. Furthermore, a domain might be an
   ASON routing area <xref target="G-7715" format="default" sectionFormat="of" derivedContent="G-7715"/>. A PCE may perform the path computation
   function of an ASON Routing Controller as described in <xref target="G-7715-2" format="default" sectionFormat="of" derivedContent="G-7715-2"/>.</t>
        <t pn="section-1.1-4">
   It is assumed that the PCE architecture is not applied to a large
   group of domains, such as the Internet.</t>
      </section>
      <section anchor="sect-1.2" numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-path-computation">Path Computation</name>
        <t pn="section-1.2-1">
   For the purpose of this document, it is assumed that path computation is the sole responsibility of the PCE as per the
   architecture defined in <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/>. When a path is required, the Path
   Computation Client (PCC) will send a request to the PCE. The PCE
   will apply the required constraints, compute a path, and return a
   response to the PCC. In the context of this document, it may be
   necessary for the PCE to cooperate with other PCEs in adjacent
   domains (as per BRPC <xref target="RFC5441" format="default" sectionFormat="of" derivedContent="RFC5441"/>) or with a parent PCE
   (as per <xref target="RFC6805" format="default" sectionFormat="of" derivedContent="RFC6805"/>).</t>
        <t pn="section-1.2-2">
   It is entirely feasible that an operator could compute a path across
   multiple domains without the use of a PCE if the relevant domain
   information is available to the network planner or network management
   platform. The definition of what relevant information is required to
   perform this network planning operation and how that information is
   discovered and applied is outside the scope of this document.</t>
        <section anchor="sect-1.2.1" numbered="true" toc="include" removeInRFC="false" pn="section-1.2.1">
          <name slugifiedName="name-pce-based-path-computation-">PCE-Based Path Computation Procedure</name>
          <t pn="section-1.2.1-1">
   As highlighted, the PCE is an entity capable of computing an
   inter-domain TE path upon receiving a request from a PCC. There could
   be a single PCE per domain or a single PCE responsible for all
   domains. A PCE may or may not reside on the same node as the
   requesting PCC. A path may be computed by either a single PCE node
   or a set of distributed PCE nodes that collaborate during path
   computation.</t>
          <t pn="section-1.2.1-2">
   According to <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/>, a PCC should send a path computation request
   to a particular PCE using <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> (PCC-to-PCE communication).
   This negates the need to broadcast a request to all the PCEs. Each
   PCC can maintain information about the computation capabilities
   of the PCEs it is aware of. The PCC-PCE capability awareness can be
   configured using static configurations or by automatic and dynamic
   PCE discovery procedures.</t>
          <t pn="section-1.2.1-3">
   If a network path is required, the PCC will send a path computation
   request to the PCE. A PCE may then compute the end-to-end path
   if it is aware of the topology and TE information required to
   compute the entire path. If the PCE is unable to compute the
   entire path, the PCE architecture provides cooperative PCE
   mechanisms for the resolution of path computation requests when an
   individual PCE does not have sufficient TE visibility.</t>
          <t pn="section-1.2.1-4">
   End-to-end path segments may be kept confidential through the
   application of Path-Keys to protect partial or full path
   information. A Path-Key is a token that replaces a path segment
   in an explicit route. The Path-Key mechanism is described in
   <xref target="RFC5520" format="default" sectionFormat="of" derivedContent="RFC5520"/>.</t>
        </section>
      </section>
      <section anchor="sect-1.3" numbered="true" toc="include" removeInRFC="false" pn="section-1.3">
        <name slugifiedName="name-traffic-engineering-aggrega">Traffic Engineering Aggregation and Abstraction</name>
        <t pn="section-1.3-1">
   Networks are often constructed from multiple areas or ASes that are
   interconnected via multiple interconnect points. To maintain
   network confidentiality and scalability, the TE properties of each area
   and AS are not generally advertised outside each specific area or AS.</t>
        <t pn="section-1.3-2">
   TE aggregation or abstraction provide a mechanism to hide information
   but may cause failed path setups or the selection of suboptimal end-
   to-end paths <xref target="RFC4726" format="default" sectionFormat="of" derivedContent="RFC4726"/>. The aggregation process may also have
   significant scaling issues for networks with many possible routes
   and multiple TE metrics. Flooding TE information breaks
   confidentiality and does not scale in the routing protocol.</t>
        <t pn="section-1.3-3">
   The PCE architecture and associated mechanisms provide a solution
   to avoid the use of TE aggregation and abstraction.</t>
      </section>
      <section anchor="sect-1.4" numbered="true" toc="include" removeInRFC="false" pn="section-1.4">
        <name slugifiedName="name-traffic-engineered-label-sw">Traffic-Engineered Label Switched Paths</name>
        <t pn="section-1.4-1">
   This document highlights the PCE techniques and mechanisms that exist
   for establishing TE packet and optical Label Switched Paths (LSPs) across multiple areas
   (inter-area TE LSP) and ASes (inter-AS TE LSP). In this context and
   within the remainder of this document, we consider all LSPs to be
   constraint based and traffic engineered.</t>
        <t pn="section-1.4-2">
   Three signaling options are defined for setting up an inter-area or
   inter-AS LSP <xref target="RFC4726" format="default" sectionFormat="of" derivedContent="RFC4726"/>:</t>
        <ul spacing="normal" bare="false" empty="false" pn="section-1.4-3">
          <li pn="section-1.4-3.1">Contiguous LSP</li>
          <li pn="section-1.4-3.2">Stitched LSP</li>
          <li pn="section-1.4-3.3">Nested LSP</li>
        </ul>
        <t pn="section-1.4-4">
   All three signaling methods are applicable to the architectures and
   procedures discussed in this document.</t>
      </section>
      <section anchor="sect-1.5" numbered="true" toc="include" removeInRFC="false" pn="section-1.5">
        <name slugifiedName="name-inter-area-and-inter-as-cap">Inter-area and Inter-AS-capable PCE Discovery</name>
        <t pn="section-1.5-1">
   When using a PCE-based approach for inter-area and inter-AS path
   computation, a PCE in one area or AS may need to learn information
   related to inter-AS-capable PCEs located in other ASes. The PCE
   discovery mechanism defined in <xref target="RFC5088" format="default" sectionFormat="of" derivedContent="RFC5088"/> and <xref target="RFC5089" format="default" sectionFormat="of" derivedContent="RFC5089"/> facilitates
   the discovery of PCEs and disclosure of information related to
   inter-area and inter-AS-capable PCEs.</t>
      </section>
      <section anchor="sect-1.6" numbered="true" toc="include" removeInRFC="false" pn="section-1.6">
        <name slugifiedName="name-objective-functions">Objective Functions</name>
        <t pn="section-1.6-1">
   An Objective Function (OF) <xref target="RFC5541" format="default" sectionFormat="of" derivedContent="RFC5541"/> or a set of OFs specifies the
   intentions of the path computation and so defines the "optimality"
   in the context of the computation request.</t>
        <t pn="section-1.6-2">
   An OF specifies the desired outcome of a computation. It does not
   describe or specify the algorithm to use. Also, an implementation
   may apply any algorithm or set of algorithms to achieve the result
   indicated by the OF. A number of general OFs are specified in
   <xref target="RFC5541" format="default" sectionFormat="of" derivedContent="RFC5541"/>.</t>
        <t pn="section-1.6-3">
   Various OFs may be included in the PCE computation request to
   satisfy the policies encoded or configured at the PCC, and a PCE
   may be subject to policy in determining whether it meets the OFs
   included in the computation request or whether it applies its own OFs.</t>
        <t pn="section-1.6-4">
   During inter-domain path computation, the selection of a domain
   sequence, the computation of each (per-domain) path fragment, and the
   determination of the end-to-end path may each be subject to different
   OFs and policies.
</t>
      </section>
    </section>
    <section anchor="sect-2" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t pn="section-2-1">
   This document also uses the terminology defined in <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/> and
   <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>. Additional terminology is defined below:

      </t>
      <dl newline="false" spacing="normal" indent="6" pn="section-2-2">
        <dt pn="section-2-2.1">ABR:</dt>
        <dd pn="section-2-2.2"> IGP Area Border Router -- a router that is attached to more than
	one IGP area. </dd>
        <dt pn="section-2-2.3">ASBR:</dt>
        <dd pn="section-2-2.4"> Autonomous System Border Router -- a router used to connect
	together ASes of a different or the same Service Provider via one or more inter-AS links.
	</dd>
        <dt pn="section-2-2.5">Inter-area TE LSP:</dt>
        <dd pn="section-2-2.6"> A TE LSP whose path transits through two or more
	IGP areas. </dd>
        <dt pn="section-2-2.7">Inter-AS MPLS TE LSP:</dt>
        <dd pn="section-2-2.8"> A TE LSP whose path transits through two or
	more ASes or sub-ASes (BGP confederations) </dd>
        <dt pn="section-2-2.9">SRLG:</dt>
        <dd pn="section-2-2.10"> Shared Risk Link Group.</dd>
        <dt pn="section-2-2.11">TED:</dt>
        <dd pn="section-2-2.12"> Traffic Engineering Database, which contains the
	topology and resource information of the domain.  The TED may be fed
	by Interior Gateway Protocol (IGP) extensions or potentially by other
	means.	</dd>
      </dl>
    </section>
    <section anchor="sect-3" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-issues-and-considerations">Issues and Considerations</name>
      <section anchor="sect-3.1" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-multihoming">Multihoming</name>
        <t pn="section-3.1-1">
   Networks constructed from multi-areas or multi-AS environments
   may have multiple interconnect points (multihoming). End-to-end path
   computations may need to use different interconnect points to avoid
   a single-point failure disrupting both the primary and backup services.</t>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-destination-location">Destination Location</name>
        <t pn="section-3.2-1">
   A PCC asking for an inter-domain path computation is typically
   aware of the identity of the destination node. If the PCC is aware
   of the destination domain, it may supply the destination domain
   information as part of the path computation request. However, if the
   PCC does not know the destination domain, this information must be
   determined by another method.</t>
      </section>
      <section anchor="sect-3.3" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-domain-confidentiality">Domain Confidentiality</name>
        <t pn="section-3.3-1">
   When the end-to-end path crosses multiple domains, it may be possible that
   each domain (AS or area) is administered by separate Service Providers.
   Thus, if a PCE supplies a path segment to a PCE in another domain, it may
   break confidentiality rules and could disclose AS-internal topology
   information.</t>
        <t pn="section-3.3-2">
   If confidentiality is required between domains (ASes and areas)
   belonging to different Service Providers, then cooperating PCEs
   cannot exchange path segments; otherwise, the receiving PCE or PCC will
   be able to see the individual hops through another domain.</t>
        <t pn="section-3.3-3">
   This topic is discussed further in <xref target="sect-8" format="default" sectionFormat="of" derivedContent="Section 8"/> of this document.</t>
      </section>
    </section>
    <section anchor="sect-4" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-domain-topologies">Domain Topologies</name>
      <t pn="section-4-1">
   Constraint-based inter-domain path computation is a fundamental
   requirement for operating traffic-engineered MPLS <xref target="RFC3209" format="default" sectionFormat="of" derivedContent="RFC3209"/> and
   GMPLS <xref target="RFC3473" format="default" sectionFormat="of" derivedContent="RFC3473"/> networks in inter-area and inter-AS (multi-domain)
   environments. Path computation across multi-domain networks is
   complex and requires computational cooperational entities like the
   PCE.</t>
      <section anchor="sect-4.1" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-selecting-domain-paths">Selecting Domain Paths</name>
        <t pn="section-4.1-1">
   Where the sequence of domains is known a priori, various techniques
   can be employed to derive an optimal multi-domain path. If the
   domains are connected to a simple path with no branches and single
   links between all domains or if the preferred points of
   interconnection are also known, the per-domain path computation
   <xref target="RFC5152" format="default" sectionFormat="of" derivedContent="RFC5152"/> technique may be used. Where there are multiple connections
   between domains and there is no preference for the choice of points
   of interconnection, BRPC <xref target="RFC5441" format="default" sectionFormat="of" derivedContent="RFC5441"/> can be used to derive an optimal
   path.</t>
        <t pn="section-4.1-2">
   When the sequence of domains is not known in advance or the
   end-to-end path will have to navigate a mesh of small domains
   (especially typical in optical networks), the optimum path may be
   derived through the application of a hierarchical PCE <xref target="RFC6805" format="default" sectionFormat="of" derivedContent="RFC6805"/>.</t>
      </section>
      <section anchor="sect-4.2" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-domain-sizes">Domain Sizes</name>
        <t pn="section-4.2-1">
   Very frequently, network domains are composed of dozens or hundreds of
   network elements. These network elements are usually interconnected
   in a partial-mesh fashion to provide survivability against dual
   failures and to benefit from the traffic-engineering capabilities
   of MPLS and GMPLS protocols. Network operator feedback in the
   development of the document highlighted that the node degree (the number
   of neighbors per node) typically ranges from 3 to 10 (4-5 is quite
   common).</t>
      </section>
      <section anchor="sect-4.3" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-domain-diversity">Domain Diversity</name>
        <t pn="section-4.3-1">
   Domain and path diversity may also be required when computing
   end-to-end paths. Domain diversity should facilitate the selection
   of paths that share ingress and egress domains but do not share
   transit domains. Therefore, there must be a method allowing the
   inclusion or exclusion of specific domains when computing end-to-end paths.</t>
      </section>
      <section anchor="sect-4.4" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-synchronized-path-computati">Synchronized Path Computations</name>
        <t pn="section-4.4-1">
   In some scenarios, it would be beneficial for the operator to rely on
   the capability of the PCE to perform synchronized path computation.</t>
        <t pn="section-4.4-2">
   Synchronized path computations, known as Synchronization VECtors
   (SVECs), are used for dependent path computations. SVECs are
   defined in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>, and <xref target="RFC6007" format="default" sectionFormat="of" derivedContent="RFC6007"/> provides an overview of the
   use of the PCE SVEC list for synchronized path computations when
   computing dependent requests.</t>
        <t pn="section-4.4-3">
   In hierarchical PCE (H-PCE) deployments, a child PCE will be able to request both
   dependent and synchronized domain-diverse end-to-end paths from its
   parent PCE.</t>
      </section>
      <section anchor="sect-4.5" numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-domain-inclusion-or-exclusi">Domain Inclusion or Exclusion</name>
        <t pn="section-4.5-1">
   A domain sequence is an ordered sequence of domains traversed to
   reach the destination domain.  A domain sequence may be supplied
   during path computation to guide the PCEs or are derived via the use of
   hierarchical PCE (H-PCE).</t>
        <t pn="section-4.5-2">
   During multi-domain path computation, a PCC may request
   specific domains to be included or excluded in the domain sequence
   using the Include Route Object (IRO) <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> and Exclude Route
   Object (XRO) <xref target="RFC5521" format="default" sectionFormat="of" derivedContent="RFC5521"/>. The use of Autonomous Number (AS) as an
   abstract node representing a domain is defined in <xref target="RFC3209" format="default" sectionFormat="of" derivedContent="RFC3209"/>.
   <xref target="RFC7897" format="default" sectionFormat="of" derivedContent="RFC7897"/> specifies new subobjects to include or exclude domains
   such as an IGP area or a 4-byte AS number.</t>
        <t pn="section-4.5-3">
   An operator may also need to avoid a path that uses specified nodes
   for administrative reasons.  If a specific connectivity service is 
   required to have a 1+1 protection capability, two separate disjoint 
   paths must be established.
 A mechanism known as
   Shared Risk Link Group (SRLG) information may be used to ensure
   path diversity.</t>
      </section>
    </section>
    <section anchor="sect-5" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-applicability-of-the-pce-to">Applicability of the PCE to Inter-area Traffic Engineering</name>
      <t pn="section-5-1">
   As networks increase in size and complexity, it may be required to
   introduce scaling methods to reduce the amount of information
   flooded within the network and make the network more manageable. An
   IGP hierarchy is designed to improve IGP scalability by dividing the
   IGP domain into areas and limiting the flooding scope of topology
   information to within area boundaries. This restricts visibility of
   the area to routers in a single area. If a router needs to compute
   the route to a destination located in another area, a method would
   be required to compute a path across area boundaries.</t>
      <t pn="section-5-2">
   In order to support multiple vendors in a network in cases where
   data or control-plane technologies cannot interoperate, it is useful
   to divide the network into vendor domains. Each vendor domain is
   an IGP area, and the flooding scope of the topology (as well as any
   other relevant information) is limited to the area boundaries.</t>
      <t pn="section-5-3">
   Per-domain path computation <xref target="RFC5152" format="default" sectionFormat="of" derivedContent="RFC5152"/> exists to provide a method of
   inter-area path computation. The per-domain solution is based on
   loose hop routing with an Explicit Route Object (ERO) expansion on
   each Area Border Router (ABR).  This allows an LSP to be established
   using a constrained path. However, at least two issues exist:</t>
      <ul spacing="normal" bare="false" empty="false" pn="section-5-4">
        <li pn="section-5-4.1">This method does not guarantee an optimal constrained path.</li>
        <li pn="section-5-4.2">The method may require several crankback signaling messages, as per
     <xref target="RFC4920" format="default" sectionFormat="of" derivedContent="RFC4920"/>, increasing signaling traffic and delaying the LSP setup.</li>
      </ul>
      <t pn="section-5-5">
   PCE-based architecture <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/> is designed to solve inter-area
   path computation problems. The issue of limited topology visibility
   is resolved by introducing path computation entities that are able to
   cooperate in order to establish LSPs with the source and destinations
   located in different areas.</t>
      <section anchor="sect-5.1" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-inter-area-routing">Inter-area Routing</name>
        <t pn="section-5.1-1">
   An inter-area TE-LSP is an LSP that transits through at least two
   IGP areas. In a multi-area network, topology visibility remains
   local to a given area for scaling and privacy purposes. A node
   in one area will not be able to compute an end-to-end path across
   multiple areas without the use of a PCE.</t>
        <section anchor="sect-5.1.1" numbered="true" toc="include" removeInRFC="false" pn="section-5.1.1">
          <name slugifiedName="name-area-inclusion-and-exclusio">Area Inclusion and Exclusion</name>
          <t pn="section-5.1.1-1">
   The BRPC method <xref target="RFC5441" format="default" sectionFormat="of" derivedContent="RFC5441"/> of path computation provides a more optimal
   method to specify inclusion or exclusion of an ABR. Using the BRPC
   procedure, an end-to-end path is recursively computed in reverse from
   the destination domain towards the source domain. Using this method,
   an operator might decide if an area must be included or excluded from
   the inter-area path computation.</t>
        </section>
        <section anchor="sect-5.1.2" numbered="true" toc="include" removeInRFC="false" pn="section-5.1.2">
          <name slugifiedName="name-strict-explicit-path-and-lo">Strict Explicit Path and Loose Path</name>
          <t pn="section-5.1.2-1">
   A strict explicit path is defined as a set of strict hops, while a
   loose path is defined as a set of at least one loose hop and zero or
   more strict hops.  It may be useful to indicate whether a strict explicit path is required during the path computation request. An inter-area path may be strictly explicit or loose (e.g., a
   list of ABRs as loose hops).</t>
          <t pn="section-5.1.2-2">
   A PCC request to a PCE does allow indication of whether a strict
   explicit path across specific areas (<xref target="RFC7897" format="default" sectionFormat="of" derivedContent="RFC7897"/>) is required or
   desired or whether the path request is loose.</t>
        </section>
        <section anchor="sect-5.1.3" numbered="true" toc="include" removeInRFC="false" pn="section-5.1.3">
          <name slugifiedName="name-inter-area-diverse-path-com">Inter-Area Diverse Path Computation</name>
          <t pn="section-5.1.3-1">
   It may be necessary to compute a path that is partially or entirely
   diverse from a previously computed path to avoid fate sharing of
   a primary service with a corresponding backup service. There are
   various levels of diversity in the context of an inter-area network:</t>
          <ul spacing="normal" bare="false" empty="false" pn="section-5.1.3-2">
            <li pn="section-5.1.3-2.1">Per-area diversity (the intra-area path segments are a link, node, or
     SRLG disjoint).</li>
            <li pn="section-5.1.3-2.2">Inter-area diversity (the end-to-end inter-area paths are a link,
     node, or SRLG disjoint).</li>
          </ul>
          <t pn="section-5.1.3-3">
   Note that two paths may be disjointed in the backbone area but non-disjointed in peripheral areas. Also, two paths may be node disjointed
   within areas but may share ABRs, in which case path segments within
   an area are node disjointed but end-to-end paths are not node disjointed.
   Per-domain <xref target="RFC5152" format="default" sectionFormat="of" derivedContent="RFC5152"/>, BRPC <xref target="RFC5441" format="default" sectionFormat="of" derivedContent="RFC5441"/>, and H-PCE <xref target="RFC6805" format="default" sectionFormat="of" derivedContent="RFC6805"/> mechanisms
   all support the capability to compute diverse paths across multi-area
   topologies.</t>
        </section>
      </section>
    </section>
    <section anchor="sect-6" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-applicability-of-the-pce-to-">Applicability of the PCE to Inter-AS Traffic Engineering</name>
      <t pn="section-6-1">
   As discussed in <xref target="sect-5" format="default" sectionFormat="of" derivedContent="Section 5"/> (<xref target="sect-5" format="title" sectionFormat="of" derivedContent="Applicability of the PCE to Inter-area Traffic Engineering"/>), it is necessary to divide the network into
   smaller administrative domains, or ASes. If an LSR within an AS needs
   to compute a path across an AS boundary, it must also use an inter-AS
   computation technique. <xref target="RFC5152" format="default" sectionFormat="of" derivedContent="RFC5152"/> defines mechanisms for the
   computation of inter-domain TE LSPs using network elements along the
   signaling paths to compute per-domain constrained path segments.</t>
      <t pn="section-6-2">
   The PCE was designed to be capable of computing MPLS and GMPLS paths
   across AS boundaries. This section outlines the features of a
   PCE-enabled solution for computing inter-AS paths.</t>
      <section anchor="sect-6.1" numbered="true" toc="include" removeInRFC="false" pn="section-6.1">
        <name slugifiedName="name-inter-as-routing">Inter-AS Routing</name>
        <section anchor="sect-6.1.1" numbered="true" toc="include" removeInRFC="false" pn="section-6.1.1">
          <name slugifiedName="name-as-inclusion-and-exclusion">AS Inclusion and Exclusion</name>
          <t pn="section-6.1.1-1"><xref target="RFC5441" format="default" sectionFormat="of" derivedContent="RFC5441"/> allows the specification of AS or
   ASBR inclusion or exclusion. Using this method, an operator might decide whether an AS
   must be included or excluded from the inter-AS path computation.
   Exclusion and/or inclusion could also be specified at any step in
   the LSP path computation process by a PCE (within the BRPC
   algorithm), but the best practice would be to specify them at the
   edge. In opposition to the strict and loose path, AS inclusion or
   exclusion doesn't impose topology disclosure as ASes and their
   interconnection are public
   entities.</t>
        </section>
      </section>
      <section anchor="sect-6.2" numbered="true" toc="include" removeInRFC="false" pn="section-6.2">
        <name slugifiedName="name-inter-as-bandwidth-guarante">Inter-AS Bandwidth Guarantees</name>
        <t pn="section-6.2-1">
   Many operators with multi-AS domains will have deployed the MPLS-TE
   Diffserv either across their entire network or at the domain edges
   on CE-PE links. In situations where strict QoS bounds are required,
   admission control inside the network may also be required.</t>
        <t pn="section-6.2-2">
   When the propagation delay can be bounded, the performance targets,
   such as maximum one-way transit delay, may be guaranteed by providing
   bandwidth guarantees along the Diffserv-enabled path. These
   requirements are described in <xref target="RFC4216" format="default" sectionFormat="of" derivedContent="RFC4216"/>.</t>
        <t pn="section-6.2-3">
   One typical example of the requirements in <xref target="RFC4216" format="default" sectionFormat="of" derivedContent="RFC4216"/> is to provide
   bandwidth guarantees over an end-to-end path for VoIP traffic
   classified as an EF (Expedited Forwarding) class in a Diffserv-enabled
   network. In cases where the EF path is extended across multiple
   ASes, an inter-AS bandwidth guarantee would be required.</t>
        <t pn="section-6.2-4">
   Another case for an inter-AS bandwidth guarantee is the requirement to guarantee a certain amount of transit bandwidth across one or
   multiple ASes.</t>
      </section>
      <section anchor="sect-6.3" numbered="true" toc="include" removeInRFC="false" pn="section-6.3">
        <name slugifiedName="name-inter-as-recovery">Inter-AS Recovery</name>
        <t pn="section-6.3-1">
   During a path computation process, a PCC request may contain the
   requirement to compute a backup LSP for protecting the primary LSP, such as
   1+1 protection.
   A single LSP or multiple backup LSPs may also be
   used for a group of primary LSPs; this is typically known as m:n
   protection.</t>
        <t pn="section-6.3-2">
   Other inter-AS recovery mechanisms include <xref target="RFC4090" format="default" sectionFormat="of" derivedContent="RFC4090"/>, which adds Fast
   Reroute (FRR) protection to an LSP. So, the PCE could be used to
   trigger computation of backup tunnels in order to protect inter-AS
   connectivity.</t>
        <t pn="section-6.3-3">
   Inter-AS recovery clearly requires backup LSPs for service
   protection, but it would also be advisable to have multiple PCEs
   deployed for path computation redundancy, especially for service
   restoration in the event of catastrophic network failure.</t>
      </section>
      <section anchor="sect-6.4" numbered="true" toc="include" removeInRFC="false" pn="section-6.4">
        <name slugifiedName="name-inter-as-pce-peering-polici">Inter-AS PCE Peering Policies</name>
        <t pn="section-6.4-1">
   Like BGP peering policies, inter-AS PCE peering policies are required for
   an operator. In an inter-AS BRPC process, the PCE must
   cooperate in order to compute the end-to-end LSP. Therefore, the AS path
   must not only follow technical constraints, e.g., bandwidth
   availability, but also the policies defined by the operator.</t>
        <t pn="section-6.4-2">
   Typically, PCE interconnections at an AS level must follow the agreed
   contract obligations, also known as peering agreements. The PCE
   peering policies are the result of the contract negotiation and
   govern the relation between the different PCEs.</t>
      </section>
    </section>
    <section anchor="sect-7" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-multi-domain-pce-deployment">Multi-domain PCE Deployment Options</name>
      <section anchor="sect-7.1" numbered="true" toc="include" removeInRFC="false" pn="section-7.1">
        <name slugifiedName="name-traffic-engineering-databas">Traffic Engineering Database and Synchronization</name>
        <t pn="section-7.1-1">
   An optimal path computation requires knowledge of the available
   network resources, including nodes and links, constraints,
   link connectivity, available bandwidth, and link costs.  The PCE
   operates on a view of the network topology as presented by a
   TED.  As discussed in <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/>, the TED used by a PCE may be learned
   by the relevant IGP extensions.</t>
        <t pn="section-7.1-2">
   Thus, the PCE may operate its TED by participating
   in the IGP running in the network.  In an MPLS-TE network, this
   would require OSPF-TE <xref target="RFC3630" format="default" sectionFormat="of" derivedContent="RFC3630"/> or ISIS-TE <xref target="RFC5305" format="default" sectionFormat="of" derivedContent="RFC5305"/>.  In a GMPLS
   network, it would utilize the GMPLS extensions to OSPF and IS-IS
   defined in <xref target="RFC4203" format="default" sectionFormat="of" derivedContent="RFC4203"/> and <xref target="RFC5307" format="default" sectionFormat="of" derivedContent="RFC5307"/>. Inter-AS connectivity
   information may be populated via <xref target="RFC5316" format="default" sectionFormat="of" derivedContent="RFC5316"/> and <xref target="RFC5392" format="default" sectionFormat="of" derivedContent="RFC5392"/>.</t>
        <t pn="section-7.1-3">
   An alternative method to providing network topology and resource
   information is offered by <xref target="RFC7752" format="default" sectionFormat="of" derivedContent="RFC7752"/>, which is described in the
   following section.</t>
        <section anchor="sect-7.1.1" numbered="true" toc="include" removeInRFC="false" pn="section-7.1.1">
          <name slugifiedName="name-applicability-of-bgp-ls-to-">Applicability of BGP-LS to PCE</name>
          <t pn="section-7.1.1-1">
   The concept of the exchange of TE information between Autonomous Systems
   (ASes) is discussed in <xref target="RFC7752" format="default" sectionFormat="of" derivedContent="RFC7752"/>.  The information exchanged in this
   way could be the full TE information from the AS, an aggregation of
   that information, or a representation of the potential connectivity
   across the AS.  Furthermore, that information could be updated
   frequently (for example, for every new LSP that is set up across the
   AS) or only at threshold-crossing events.</t>
          <t pn="section-7.1.1-2">
   In an H-PCE deployment, the parent PCE will require the inter-domain
   topology and link status between child domains. This information may
   be learned by a BGP-LS speaker and provided to the parent PCE.
   Furthermore, link-state performance, including delay, available
   bandwidth, and utilized bandwidth, may also be provided to the parent
   PCE for optimal path link selection.</t>
        </section>
      </section>
      <section anchor="sect-7.2" numbered="true" toc="include" removeInRFC="false" pn="section-7.2">
        <name slugifiedName="name-pre-planning-and-management">Pre-planning and Management-Based Solutions</name>
        <t pn="section-7.2-1">
   Offline path computation is performed ahead of time before the LSP
   setup is requested.  That means that it is requested by or performed
   as part of an Operation Support System (OSS) management application.
   This model can be seen in <xref target="RFC4655" section="5.5" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4655#section-5.5" derivedContent="RFC4655"/>.</t>
        <t pn="section-7.2-2">
   The offline model is particularly appropriate for long-lived LSPs
   (such as those present in a transport network) or for planned
   responses to network failures.  In these scenarios, more planning is
   normally a feature of LSP provisioning.</t>
        <t pn="section-7.2-3">
The management system may also use a PCE and BRPC to pre-plan an AS
sequence, and the source domain PCE and per-domain path
computation to be used when the actual end-to-end path is
required. This model may also be used where the operator
wishes to retain full manual control of the placement of LSPs,
using the PCE only as a computation tool to assist the operator and
not as part of an automated network.
</t>
        <t pn="section-7.2-4">
   In environments where operators peer with each other to provide end-to-end
	paths, the operator responsible for each domain must agree on the
	extent to which paths must be pre-planned or manually controlled.</t>
      </section>
    </section>
    <section anchor="sect-8" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-domain-confidentiality-2">Domain Confidentiality</name>
      <t pn="section-8-1">
   This section discusses the techniques that cooperating PCEs
   can use to compute inter-domain paths without each domain
   disclosing sensitive internal topology information (such as
   explicit nodes or links within the domain) to the other domains.</t>
      <t pn="section-8-2">
   Confidentiality typically applies to inter-provider (inter-AS) PCE
   communication. 
   Where the TE LSP crosses multiple domains (ASes or areas), the path may be
   computed by multiple PCEs that cooperate together, with each local PCE
   responsible for computing a segment of the path.  
 With each local PCE responsible for computing a segment
   of the path.</t>
      <t pn="section-8-3">
   In situations where ASes are administered by separate Service
   Providers, it would break confidentiality rules for a PCE to supply
   path segment details to a PCE responsible for another domain, thus
   disclosing AS-internal or area topology information.</t>
      <section anchor="sect-8.1" numbered="true" toc="include" removeInRFC="false" pn="section-8.1">
        <name slugifiedName="name-loose-hops">Loose Hops</name>
        <t pn="section-8.1-1">
   A method for preserving the confidentiality of the path segment is
   for the PCE to return a path containing a loose hop in place of the
   segment that must be kept confidential.  The concept of loose and
   strict hops for the route of a TE LSP is described in <xref target="RFC3209" format="default" sectionFormat="of" derivedContent="RFC3209"/>.</t>
        <t pn="section-8.1-2"><xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> supports the use of paths with
   loose hops; whether it returns a full explicit
   path with strict hops or uses loose hops is a
   local policy decision at a PCE.  A path computation
   request may require an explicit path with strict hops or may allow
   loose hops, as detailed in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>.</t>
      </section>
      <section anchor="sect-8.2" numbered="true" toc="include" removeInRFC="false" pn="section-8.2">
        <name slugifiedName="name-confidential-path-segments-">Confidential Path Segments and Path-Keys</name>
        <t pn="section-8.2-1"><xref target="RFC5520" format="default" sectionFormat="of" derivedContent="RFC5520"/> defines the concept and mechanism
   of a Path-Key. A Path-Key
   is a token that replaces the path segment information in an explicit
   route. The Path-Key allows the explicit route information to be
   encoded and is contained in the Path Computation Element Communication Protocol (PCEP) (<xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>) messages exchanged between the
   PCE and PCC.</t>
        <t pn="section-8.2-2">
   This Path-Key technique allows explicit route information to be used
   for end-to-end path computation without disclosing internal topology
   information between domains.</t>
      </section>
    </section>
    <section anchor="sect-9" numbered="true" toc="include" removeInRFC="false" pn="section-9">
      <name slugifiedName="name-point-to-multipoint">Point to Multipoint</name>
      <t pn="section-9-1">
   For inter-domain point-to-multipoint application scenarios using
   MPLS-TE LSPs, the complexity of domain sequences, domain policies,
   and the choice and number of domain interconnects is magnified compared to
   point-to-point path computations. As the size of the network
   grows, the number of leaves and branches increases, further
   increasing the complexity of the overall path computation problem.
   A solution for managing point-to-multipoint path computations may
   be achieved using the PCE inter-domain point-to-multipoint path
   computation <xref target="RFC7334" format="default" sectionFormat="of" derivedContent="RFC7334"/> procedure.</t>
    </section>
    <section anchor="sect-10" numbered="true" toc="include" removeInRFC="false" pn="section-10">
      <name slugifiedName="name-optical-domains">Optical Domains</name>
      <t pn="section-10-1">
   The International Telecommunication Union (ITU) defines the ASON
   architecture in <xref target="G-8080" format="default" sectionFormat="of" derivedContent="G-8080"/>. <xref target="G-7715" format="default" sectionFormat="of" derivedContent="G-7715"/> defines the routing architecture
   for ASON and introduces a hierarchical architecture. In this
   architecture, the Routing Areas (RAs) have a hierarchical
   relationship between different routing levels, which means a parent
   (or higher level) RA can contain multiple child RAs. The
   interconnectivity of the lower RAs is visible to the higher-level RA.</t>
      <t pn="section-10-2">
   In the ASON framework, a path computation request is termed a route
   query. This query is executed before signaling is used to establish
   an LSP, which is termed a Switched Connection (SC) or a Soft Permanent
   Connection (SPC).
  <xref target="G-7715-2" format="default" sectionFormat="of" derivedContent="G-7715-2"/> defines the requirements and
   architecture for the functions performed by Routing Controllers (RC)
   during the operation of remote route queries. An RC is synonymous
   with a PCE.</t>
      <t pn="section-10-3">
   In the ASON routing environment, an RC responsible for an RA may
   communicate with its neighbor RC to request the computation of an
   end-to-end path across several RAs. The path computation components
   and sequences are defined as follows:</t>
      <ul spacing="normal" bare="false" empty="false" pn="section-10-4">
        <li pn="section-10-4.1">Remote route query. An operation where a Routing Controller
     communicates with another Routing Controller, which does not have
     the same set of layer resources, in order to compute a routing
     path in a collaborative manner.</li>
        <li pn="section-10-4.2">Route query requester. The connection controller or RC that sends a
     route query message to a Routing Controller that requests one or
     more routing paths satisfying a set of routing constraints.</li>
        <li pn="section-10-4.3">Route query responder. An RC that performs the path computation
        upon reception of a route query message from a Routing Controller or
        connection controller, and sends a response back at the end of the
        computation.</li>
      </ul>
      <t pn="section-10-5">
   When computing an end-to-end connection, the route may be computed by
   a single RC or multiple RCs in a collaborative manner, and the two
   scenarios can be considered a centralized remote route query model
   and a distributed remote route query model. RCs in an ASON environment
   can also use the hierarchical PCE <xref target="RFC6805" format="default" sectionFormat="of" derivedContent="RFC6805"/>
   model to fully match the
   ASON hierarchical routing model.</t>
      <section anchor="sect-10.1" numbered="true" toc="include" removeInRFC="false" pn="section-10.1">
        <name slugifiedName="name-abstraction-and-control-of-">Abstraction and Control of TE Networks (ACTN)</name>
        <t pn="section-10.1-1">
   Where a single operator operates multiple TE domains (including
   optical environments), an Abstraction and Control of TE Networks
   (ACTN) framework <xref target="RFC8453" format="default" sectionFormat="of" derivedContent="RFC8453"/> may be used to create an abstracted
   (virtualized network) view of underlay-interconnected domains. This
   underlay connectivity is then exposed to higher-layer control
   entities and applications.</t>
        <t pn="section-10.1-2">
   ACTN describes the method and procedure for coordinating the
   underlay per-domain Provisioning Network Controllers (PNCs), which may
   be PCEs, via a hierarchical model to facilitate setup of
   end-to-end connections across interconnected TE domains.</t>
      </section>
    </section>
    <section anchor="sect-11" numbered="true" toc="include" removeInRFC="false" pn="section-11">
      <name slugifiedName="name-policy">Policy</name>
      <t pn="section-11-1">
   Policy is important in the deployment of new services and the
   operation of the network. <xref target="RFC5394" format="default" sectionFormat="of" derivedContent="RFC5394"/> provides a framework for PCE-based policy-enabled path computation. This framework is based on
   the Policy Core Information Model (PCIM) as defined in <xref target="RFC3060" format="default" sectionFormat="of" derivedContent="RFC3060"/> and
   further extended by <xref target="RFC3460" format="default" sectionFormat="of" derivedContent="RFC3460"/>.</t>
      <t pn="section-11-2">
   When using a PCE to compute inter-domain paths, policy may be
   invoked by specifying the following:</t>
      <ul spacing="normal" bare="false" empty="false" pn="section-11-3">
        <li pn="section-11-3.1">Each PCC must select which computations it will request from a PCE.</li>
        <li pn="section-11-3.2">Each PCC must select which PCEs it will use.</li>
        <li pn="section-11-3.3">Each PCE must determine which PCCs are allowed to use its services
     and for what computations.</li>
        <li pn="section-11-3.4">The PCE must determine how to collect the information in its TED,
     whom to trust for that information, and how to refresh/update the
     information.</li>
        <li pn="section-11-3.5">Each PCE must determine which objective functions and algorithms to apply.</li>
      </ul>
    </section>
    <section anchor="sect-12" numbered="true" toc="include" removeInRFC="false" pn="section-12">
      <name slugifiedName="name-manageability-consideration">Manageability Considerations</name>
      <t pn="section-12-1">
   General PCE management considerations are discussed in <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/>.
   In the case of multi-domains within a single service provider
   network, the management responsibility for each PCE would most
   likely be handled by the same service provider.  In the case of
   multiple ASes within different service provider networks, it will
   likely be necessary for each PCE to be configured and managed
   separately by each participating service provider, with policy
   being implemented based on a previously agreed set of principles.</t>
      <section anchor="sect-12.1" numbered="true" toc="include" removeInRFC="false" pn="section-12.1">
        <name slugifiedName="name-control-of-function-and-pol">Control of Function and Policy</name>
        <t pn="section-12.1-1">
   As per <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>, PCEP implementation allows the user to configure
   a number of PCEP session parameters. These are detailed in <xref target="RFC5440" section="8.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5440#section-8.1" derivedContent="RFC5440"/>.</t>
        <t pn="section-12.1-2">
   In H-PCE deployments, the administrative entity responsible for the
   management of the parent PCEs for multi-areas would typically be a
   single service provider. In multiple ASes (managed by different
   service providers), it may be necessary for a third party to manage
   the parent PCE.</t>
      </section>
      <section anchor="sect-12.2" numbered="true" toc="include" removeInRFC="false" pn="section-12.2">
        <name slugifiedName="name-information-and-data-models">Information and Data Models</name>
        <t pn="section-12.2-1">
   A PCEP MIB module is defined in <xref target="RFC7420" format="default" sectionFormat="of" derivedContent="RFC7420"/>,
   which describes managed
   objects for modeling PCEP communication, including:</t>
        <ul spacing="normal" bare="false" empty="false" pn="section-12.2-2">
          <li pn="section-12.2-2.1">PCEP client configuration and status.</li>
          <li pn="section-12.2-2.2">PCEP peer configuration and information.</li>
          <li pn="section-12.2-2.3">PCEP session configuration and information.</li>
          <li pn="section-12.2-2.4">Notifications to indicate PCEP session changes.</li>
        </ul>
        <t pn="section-12.2-3">
   A YANG module for PCEP has also been proposed <xref target="I-D.ietf-pce-pcep-yang" format="default" sectionFormat="of" derivedContent="PCEP-YANG"/>.</t>
        <t pn="section-12.2-4">
   An H-PCE MIB module or YANG data model will be required to
   report parent PCE and child PCE information, including:</t>
        <ul spacing="normal" bare="false" empty="false" pn="section-12.2-5">
          <li pn="section-12.2-5.1">Parent PCE configuration and status.</li>
          <li pn="section-12.2-5.2">Child PCE configuration and information.</li>
          <li pn="section-12.2-5.3">Notifications to indicate session changes between parent PCEs and
      child PCEs.</li>
          <li pn="section-12.2-5.4">Notification of parent PCE TED updates and changes.</li>
        </ul>
      </section>
      <section anchor="sect-12.3" numbered="true" toc="include" removeInRFC="false" pn="section-12.3">
        <name slugifiedName="name-liveness-detection-and-moni">Liveness Detection and Monitoring</name>
        <t pn="section-12.3-1">
   PCEP includes a keepalive mechanism to check the liveliness of a PCEP
   peer and a notification procedure allowing a PCE to advertise its
   overloaded state to a PCC. In a multi-domain environment, <xref target="RFC5886" format="default" sectionFormat="of" derivedContent="RFC5886"/>
   provides the procedures necessary to monitor the liveliness and
   performance of a given PCE chain.</t>
      </section>
      <section anchor="sect-12.4" numbered="true" toc="include" removeInRFC="false" pn="section-12.4">
        <name slugifiedName="name-verifying-correct-operation">Verifying Correct Operation</name>
        <t pn="section-12.4-1">
   It is important to verify the correct operation of PCEP. <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>
   specifies the monitoring of key parameters. These parameters are
   detailed in <xref target="RFC5520" format="default" sectionFormat="of" derivedContent="RFC5520"/>.</t>
      </section>
      <section anchor="sect-12.5" numbered="true" toc="include" removeInRFC="false" pn="section-12.5">
        <name slugifiedName="name-impact-on-network-operation">Impact on Network Operation</name>
        <t pn="section-12.5-1"><xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> states that in order to avoid any unacceptable impact on
   network operations, a PCEP implementation should allow a limit to be
   placed on the number of sessions that can be set up on a PCEP
   speaker and that it may also be practical to place a limit on the rate
   of messages sent by a PCC and received by the PCE.</t>
      </section>
    </section>
    <section anchor="sect-13" numbered="true" toc="include" removeInRFC="false" pn="section-13">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-13-1">
   PCEP security considerations are discussed in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> and <xref target="RFC6952" format="default" sectionFormat="of" derivedContent="RFC6952"/>.
   Potential vulnerabilities include spoofing, snooping, falsification,
   and using PCEP as a mechanism for denial of service attacks.</t>
      <t pn="section-13-2">
   As PCEP operates over TCP, it may make use of TCP security
   encryption mechanisms, such as Transport Layer Security (TLS) and TCP
   Authentication Option (TCP-AO). Usage of these security mechanisms
   for PCEP is described in <xref target="RFC8253" format="default" sectionFormat="of" derivedContent="RFC8253"/>, and recommendations and best
   current practices are described in <xref target="RFC7525" format="default" sectionFormat="of" derivedContent="RFC7525"/>.</t>
      <section anchor="sect-13.1" numbered="true" toc="include" removeInRFC="false" pn="section-13.1">
        <name slugifiedName="name-multi-domain-security">Multi-domain Security</name>
        <t pn="section-13.1-1">
   Any multi-domain operation necessarily involves the exchange of
   information across domain boundaries.  This represents a
   significant security and confidentiality risk.</t>
        <t pn="section-13.1-2">
   It is expected that PCEP is used between PCCs and PCEs that belong to the
   same administrative authority while also using one of the aforementioned
   encryption mechanisms.
   Furthermore, PCEP allows
   individual PCEs to maintain the confidentiality of their domain path
   information using path-keys.</t>
      </section>
    </section>
    <section anchor="sect-14" numbered="true" toc="include" removeInRFC="false" pn="section-14">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-14-1">
   This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-pce-pcep-yang" to="PCEP-YANG"/>
    <references pn="section-15">
      <name slugifiedName="name-references">References</name>
      <references pn="section-15.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC3209" target="https://www.rfc-editor.org/info/rfc3209" quoteTitle="true" derivedAnchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author initials="D." surname="Awduche" fullname="D. Awduche">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Gan" fullname="D. Gan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Li" fullname="T. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Srinivasan" fullname="V. Srinivasan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Swallow" fullname="G. Swallow">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2001" month="December"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching).  Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels.  A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC3473" target="https://www.rfc-editor.org/info/rfc3473" quoteTitle="true" derivedAnchor="RFC3473">
          <front>
            <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
            <author initials="L." surname="Berger" fullname="L. Berger" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2003" month="January"/>
            <abstract>
              <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS.  Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber).  This document presents a RSVP-TE specific description of the extensions.  A generic functional description can be found in separate documents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3473"/>
          <seriesInfo name="DOI" value="10.17487/RFC3473"/>
        </reference>
        <reference anchor="RFC4216" target="https://www.rfc-editor.org/info/rfc4216" quoteTitle="true" derivedAnchor="RFC4216">
          <front>
            <title>MPLS Inter-Autonomous System (AS) Traffic Engineering (TE) Requirements</title>
            <author initials="R." surname="Zhang" fullname="R. Zhang" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J.-P." surname="Vasseur" fullname="J.-P. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="November"/>
            <abstract>
              <t>This document discusses requirements for the support of inter-AS MPLS Traffic Engineering (MPLS TE).  Its main objective is to present a set of requirements and scenarios which would result in general guidelines for the definition, selection, and specification development for any technical solution(s) meeting these requirements and supporting the scenarios.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4216"/>
          <seriesInfo name="DOI" value="10.17487/RFC4216"/>
        </reference>
        <reference anchor="RFC4655" target="https://www.rfc-editor.org/info/rfc4655" quoteTitle="true" derivedAnchor="RFC4655">
          <front>
            <title>A Path Computation Element (PCE)-Based Architecture</title>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J.-P." surname="Vasseur" fullname="J.-P. Vasseur">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Ash" fullname="J. Ash">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="August"/>
            <abstract>
              <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks.  Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
              <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space.  This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4655"/>
          <seriesInfo name="DOI" value="10.17487/RFC4655"/>
        </reference>
        <reference anchor="RFC4726" target="https://www.rfc-editor.org/info/rfc4726" quoteTitle="true" derivedAnchor="RFC4726">
          <front>
            <title>A Framework for Inter-Domain Multiprotocol Label Switching Traffic Engineering</title>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J.-P." surname="Vasseur" fullname="J.-P. Vasseur">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Ayyangar" fullname="A. Ayyangar">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="November"/>
            <abstract>
              <t>This document provides a framework for establishing and controlling Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineered (TE) Label Switched Paths (LSPs) in multi-domain networks.</t>
              <t>For the purposes of this document, a domain is considered to be any collection of network elements within a common sphere of address management or path computational responsibility.  Examples of such domains include Interior Gateway Protocol (IGP) areas and Autonomous Systems (ASes).  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4726"/>
          <seriesInfo name="DOI" value="10.17487/RFC4726"/>
        </reference>
        <reference anchor="RFC5152" target="https://www.rfc-editor.org/info/rfc5152" quoteTitle="true" derivedAnchor="RFC5152">
          <front>
            <title>A Per-Domain Path Computation Method for Establishing Inter-Domain Traffic Engineering (TE) Label Switched Paths (LSPs)</title>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Ayyangar" fullname="A. Ayyangar" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Zhang" fullname="R. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="February"/>
            <abstract>
              <t>This document specifies a per-domain path computation technique for establishing inter-domain Traffic Engineering (TE) Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Label Switched Paths (LSPs).  In this document, a domain refers to a collection of network elements within a common sphere of address management or path computational responsibility such as Interior Gateway Protocol (IGP) areas and Autonomous Systems.</t>
              <t>Per-domain computation applies where the full path of an inter-domain TE LSP cannot be or is not determined at the ingress node of the TE LSP, and is not signaled across domain boundaries.  This is most likely to arise owing to TE visibility limitations.  The signaling message indicates the destination and nodes up to the next domain boundary.  It may also indicate further domain boundaries or domain identifiers.  The path through each domain, possibly including the choice of exit point from the domain, must be determined within the domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5152"/>
          <seriesInfo name="DOI" value="10.17487/RFC5152"/>
        </reference>
        <reference anchor="RFC5440" target="https://www.rfc-editor.org/info/rfc5440" quoteTitle="true" derivedAnchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="March"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs.  Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering.  PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC5441" target="https://www.rfc-editor.org/info/rfc5441" quoteTitle="true" derivedAnchor="RFC5441">
          <front>
            <title>A Backward-Recursive PCE-Based Computation (BRPC) Procedure to Compute Shortest Constrained Inter-Domain Traffic Engineering Label Switched Paths</title>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Zhang" fullname="R. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Bitar" fullname="N. Bitar">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="April"/>
            <abstract>
              <t>The ability to compute shortest constrained Traffic Engineering Label Switched Paths (TE LSPs) in Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks across multiple domains has been identified as a key requirement.  In this context, a domain is a collection of network elements within a common sphere of address management or path computational responsibility such as an IGP area or an Autonomous Systems.  This document specifies a procedure relying on the use of multiple Path Computation Elements (PCEs) to compute such inter-domain shortest constrained paths across a predetermined sequence of domains, using a backward-recursive path computation technique.  This technique preserves confidentiality across domains, which is sometimes required when domains are managed by different service providers.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5441"/>
          <seriesInfo name="DOI" value="10.17487/RFC5441"/>
        </reference>
        <reference anchor="RFC5520" target="https://www.rfc-editor.org/info/rfc5520" quoteTitle="true" derivedAnchor="RFC5520">
          <front>
            <title>Preserving Topology Confidentiality in Inter-Domain Path Computation Using a Path-Key-Based Mechanism</title>
            <author initials="R." surname="Bradford" fullname="R. Bradford" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="April"/>
            <abstract>
              <t>Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering (TE) Label Switched Paths (LSPs) may be computed by Path Computation Elements (PCEs).  Where the TE LSP crosses multiple domains, such as Autonomous Systems (ASes), the path may be computed by multiple PCEs that cooperate, with each responsible for computing a segment of the path.  However, in some cases (e.g., when ASes are administered by separate Service Providers), it would break confidentiality rules for a PCE to supply a path segment to a PCE in another domain, thus disclosing AS-internal topology information.  This issue may be circumvented by returning a loose hop and by invoking a new path computation from the domain boundary Label Switching Router (LSR) during TE LSP setup as the signaling message enters the second domain, but this technique has several issues including the problem of maintaining path diversity.</t>
              <t>This document defines a mechanism to hide the contents of a segment of a path, called the Confidential Path Segment (CPS).  The CPS may be replaced by a path-key that can be conveyed in the PCE Communication Protocol (PCEP) and signaled within in a Resource Reservation Protocol TE (RSVP-TE) explicit route object.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5520"/>
          <seriesInfo name="DOI" value="10.17487/RFC5520"/>
        </reference>
        <reference anchor="RFC5541" target="https://www.rfc-editor.org/info/rfc5541" quoteTitle="true" derivedAnchor="RFC5541">
          <front>
            <title>Encoding of Objective Functions in the Path Computation Element Communication Protocol (PCEP)</title>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Lee" fullname="Y. Lee">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="June"/>
            <abstract>
              <t>The computation of one or a set of Traffic Engineering Label Switched Paths (TE LSPs) in MultiProtocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks is subject to a set of one or more specific optimization criteria, referred to as objective functions (e.g., minimum cost path, widest path, etc.).</t>
              <t>In the Path Computation Element (PCE) architecture, a Path Computation Client (PCC) may want a path to be computed for one or more TE LSPs according to a specific objective function.  Thus, the PCC needs to instruct the PCE to use the correct objective function. Furthermore, it is possible that not all PCEs support the same set of objective functions; therefore, it is useful for the PCC to be able to automatically discover the set of objective functions supported by each PCE.</t>
              <t>This document defines extensions to the PCE communication Protocol (PCEP) to allow a PCE to indicate the set of objective functions it supports.  Extensions are also defined so that a PCC can indicate in a path computation request the required objective function, and a PCE can report in a path computation reply the objective function that was used for path computation.</t>
              <t>This document defines objective function code types for six objective functions previously listed in the PCE requirements work, and provides the definition of four new metric types that apply to a set of synchronized requests.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5541"/>
          <seriesInfo name="DOI" value="10.17487/RFC5541"/>
        </reference>
        <reference anchor="RFC6805" target="https://www.rfc-editor.org/info/rfc6805" quoteTitle="true" derivedAnchor="RFC6805">
          <front>
            <title>The Application of the Path Computation Element Architecture to the Determination of a Sequence of Domains in MPLS and GMPLS</title>
            <author initials="D." surname="King" fullname="D. King" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="November"/>
            <abstract>
              <t>Computing optimum routes for Label Switched Paths (LSPs) across multiple domains in MPLS Traffic Engineering (MPLS-TE) and GMPLS networks presents a problem because no single point of path computation is aware of all of the links and resources in each domain.  A solution may be achieved using the Path Computation Element (PCE) architecture.</t>
              <t>Where the sequence of domains is known a priori, various techniques can be employed to derive an optimum path.  If the domains are simply connected, or if the preferred points of interconnection are also known, the Per-Domain Path Computation technique can be used.  Where there are multiple connections between domains and there is no preference for the choice of points of interconnection, the Backward-Recursive PCE-based Computation (BRPC) procedure can be used to derive an optimal path.</t>
              <t>This document examines techniques to establish the optimum path when the sequence of domains is not known in advance.  The document shows how the PCE architecture can be extended to allow the optimum sequence of domains to be selected, and the optimum end-to-end path to be derived through the use of a hierarchical relationship between domains.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6805"/>
          <seriesInfo name="DOI" value="10.17487/RFC6805"/>
        </reference>
      </references>
      <references pn="section-15.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC3060" target="https://www.rfc-editor.org/info/rfc3060" quoteTitle="true" derivedAnchor="RFC3060">
          <front>
            <title>Policy Core Information Model -- Version 1 Specification</title>
            <author initials="B." surname="Moore" fullname="B. Moore">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Ellesson" fullname="E. Ellesson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Strassner" fullname="J. Strassner">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Westerinen" fullname="A. Westerinen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2001" month="February"/>
            <abstract>
              <t>This document presents the object-oriented information model for representing policy information developed jointly in the IETF Policy Framework WG and as extensions to the Common Information Model (CIM) activity in the Distributed Management Task Force (DMTF).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3060"/>
          <seriesInfo name="DOI" value="10.17487/RFC3060"/>
        </reference>
        <reference anchor="RFC3460" target="https://www.rfc-editor.org/info/rfc3460" quoteTitle="true" derivedAnchor="RFC3460">
          <front>
            <title>Policy Core Information Model (PCIM) Extensions</title>
            <author initials="B." surname="Moore" fullname="B. Moore" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2003" month="January"/>
            <abstract>
              <t>This document specifies a number of changes to the Policy Core Information Model (PCIM, RFC 3060).  Two types of changes are included. First, several completely new elements are introduced, for example, classes for header filtering, that extend PCIM into areas that it did not previously cover.  Second, there are cases where elements of PCIM (for example, policy rule priorities) are deprecated, and replacement elements are defined (in this case, priorities tied to associations that refer to policy rules).  Both types of changes are done in such a way that, to the extent possible, interoperability with implementations of the original PCIM model is preserved.  This document updates RFC 3060. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3460"/>
          <seriesInfo name="DOI" value="10.17487/RFC3460"/>
        </reference>
        <reference anchor="RFC3630" target="https://www.rfc-editor.org/info/rfc3630" quoteTitle="true" derivedAnchor="RFC3630">
          <front>
            <title>Traffic Engineering (TE) Extensions to OSPF Version 2</title>
            <author initials="D." surname="Katz" fullname="D. Katz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Kompella" fullname="K. Kompella">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Yeung" fullname="D. Yeung">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2003" month="September"/>
            <abstract>
              <t>This document describes extensions to the OSPF protocol version 2 to support intra-area Traffic Engineering (TE), using Opaque Link State Advertisements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3630"/>
          <seriesInfo name="DOI" value="10.17487/RFC3630"/>
        </reference>
        <reference anchor="RFC4090" target="https://www.rfc-editor.org/info/rfc4090" quoteTitle="true" derivedAnchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author initials="P." surname="Pan" fullname="P. Pan" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Swallow" fullname="G. Swallow" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Atlas" fullname="A. Atlas" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="May"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels.  These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here.  The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair.  The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints.  Both methods can be used to protect links and nodes during network failure.  The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="RFC4203" target="https://www.rfc-editor.org/info/rfc4203" quoteTitle="true" derivedAnchor="RFC4203">
          <front>
            <title>OSPF Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)</title>
            <author initials="K." surname="Kompella" fullname="K. Kompella" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="October"/>
            <abstract>
              <t>This document specifies encoding of extensions to the OSPF routing protocol in support of Generalized Multi-Protocol Label Switching (GMPLS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4203"/>
          <seriesInfo name="DOI" value="10.17487/RFC4203"/>
        </reference>
        <reference anchor="RFC4920" target="https://www.rfc-editor.org/info/rfc4920" quoteTitle="true" derivedAnchor="RFC4920">
          <front>
            <title>Crankback Signaling Extensions for MPLS and GMPLS RSVP-TE</title>
            <author initials="A." surname="Farrel" fullname="A. Farrel" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Satyanarayana" fullname="A. Satyanarayana">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Iwata" fullname="A. Iwata">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Fujita" fullname="N. Fujita">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Ash" fullname="G. Ash">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="July"/>
            <abstract>
              <t>In a distributed, constraint-based routing environment, the information used to compute a path may be out of date.  This means that Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineered (TE) Label Switched Path (LSP) setup requests may be blocked by links or nodes without sufficient resources.  Crankback is a scheme whereby setup failure information is returned from the point of failure to allow new setup attempts to be made avoiding the blocked resources.  Crankback can also be applied to LSP recovery to indicate the location of the failed link or node.</t>
              <t>This document specifies crankback signaling extensions for use in MPLS signaling using RSVP-TE as defined in "RSVP-TE: Extensions to RSVP for LSP Tunnels", RFC 3209, and GMPLS signaling as defined in "Generalized Multi-Protocol Label Switching (GMPLS) Signaling Functional Description", RFC 3473.  These extensions mean that the LSP setup request can be retried on an alternate path that detours around blocked links or nodes.  This offers significant improvements in the successful setup and recovery ratios for LSPs, especially in situations where a large number of setup requests are triggered at the same time.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4920"/>
          <seriesInfo name="DOI" value="10.17487/RFC4920"/>
        </reference>
        <reference anchor="RFC5088" target="https://www.rfc-editor.org/info/rfc5088" quoteTitle="true" derivedAnchor="RFC5088">
          <front>
            <title>OSPF Protocol Extensions for Path Computation Element (PCE) Discovery</title>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Ikejiri" fullname="Y. Ikejiri">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Zhang" fullname="R. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="January"/>
            <abstract>
              <t>There are various circumstances where it is highly desirable for a Path Computation Client (PCC) to be able to dynamically and automatically discover a set of Path Computation Elements (PCEs), along with information that can be used by the PCC for PCE selection. When the PCE is a Label Switching Router (LSR) participating in the Interior Gateway Protocol (IGP), or even a server participating passively in the IGP, a simple and efficient way to announce PCEs consists of using IGP flooding.  For that purpose, this document defines extensions to the Open Shortest Path First (OSPF) routing protocol for the advertisement of PCE Discovery information within an OSPF area or within the entire OSPF routing domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5088"/>
          <seriesInfo name="DOI" value="10.17487/RFC5088"/>
        </reference>
        <reference anchor="RFC5089" target="https://www.rfc-editor.org/info/rfc5089" quoteTitle="true" derivedAnchor="RFC5089">
          <front>
            <title>IS-IS Protocol Extensions for Path Computation Element (PCE) Discovery</title>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Ikejiri" fullname="Y. Ikejiri">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Zhang" fullname="R. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="January"/>
            <abstract>
              <t>There are various circumstances where it is highly desirable for a Path Computation Client (PCC) to be able to dynamically and automatically discover a set of Path Computation Elements (PCEs), along with information that can be used by the PCC for PCE selection. When the PCE is a Label Switching Router (LSR) participating in the Interior Gateway Protocol (IGP), or even a server participating passively in the IGP, a simple and efficient way to announce PCEs consists of using IGP flooding.  For that purpose, this document defines extensions to the Intermediate System to Intermediate System (IS-IS) routing protocol for the advertisement of PCE Discovery information within an IS-IS area or within the entire IS-IS routing domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5089"/>
          <seriesInfo name="DOI" value="10.17487/RFC5089"/>
        </reference>
        <reference anchor="RFC5305" target="https://www.rfc-editor.org/info/rfc5305" quoteTitle="true" derivedAnchor="RFC5305">
          <front>
            <title>IS-IS Extensions for Traffic Engineering</title>
            <author initials="T." surname="Li" fullname="T. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Smit" fullname="H. Smit">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="October"/>
            <abstract>
              <t>This document describes extensions to the Intermediate System to Intermediate System (IS-IS) protocol to support Traffic Engineering (TE).  This document extends the IS-IS protocol by specifying new information that an Intermediate System (router) can place in Link State Protocol Data Units (LSP).  This information describes additional details regarding the state of the network that are useful for traffic engineering computations.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5305"/>
          <seriesInfo name="DOI" value="10.17487/RFC5305"/>
        </reference>
        <reference anchor="RFC5307" target="https://www.rfc-editor.org/info/rfc5307" quoteTitle="true" derivedAnchor="RFC5307">
          <front>
            <title>IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)</title>
            <author initials="K." surname="Kompella" fullname="K. Kompella" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="October"/>
            <abstract>
              <t>This document specifies encoding of extensions to the IS-IS routing protocol in support of Generalized Multi-Protocol Label Switching (GMPLS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5307"/>
          <seriesInfo name="DOI" value="10.17487/RFC5307"/>
        </reference>
        <reference anchor="RFC5316" target="https://www.rfc-editor.org/info/rfc5316" quoteTitle="true" derivedAnchor="RFC5316">
          <front>
            <title>ISIS Extensions in Support of Inter-Autonomous System (AS) MPLS and GMPLS Traffic Engineering</title>
            <author initials="M." surname="Chen" fullname="M. Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Zhang" fullname="R. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="X." surname="Duan" fullname="X. Duan">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="December"/>
            <abstract>
              <t>This document describes extensions to the ISIS (ISIS) protocol to support Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering (TE) for multiple Autonomous Systems (ASes).  It defines ISIS-TE extensions for the flooding of TE information about inter-AS links, which can be used to perform inter- AS TE path computation.</t>
              <t>No support for flooding information from within one AS to another AS is proposed or defined in this document.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5316"/>
          <seriesInfo name="DOI" value="10.17487/RFC5316"/>
        </reference>
        <reference anchor="RFC5392" target="https://www.rfc-editor.org/info/rfc5392" quoteTitle="true" derivedAnchor="RFC5392">
          <front>
            <title>OSPF Extensions in Support of Inter-Autonomous System (AS) MPLS and GMPLS Traffic Engineering</title>
            <author initials="M." surname="Chen" fullname="M. Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Zhang" fullname="R. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="X." surname="Duan" fullname="X. Duan">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="January"/>
            <abstract>
              <t>This document describes extensions to the OSPF version 2 and 3 protocols to support Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering (TE) for multiple Autonomous Systems (ASes).  OSPF-TE v2 and v3 extensions are defined for the flooding of TE information about inter-AS links that can be used to perform inter-AS TE path computation.</t>
              <t>No support for flooding information from within one AS to another AS is proposed or defined in this document.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5392"/>
          <seriesInfo name="DOI" value="10.17487/RFC5392"/>
        </reference>
        <reference anchor="RFC5394" target="https://www.rfc-editor.org/info/rfc5394" quoteTitle="true" derivedAnchor="RFC5394">
          <front>
            <title>Policy-Enabled Path Computation Framework</title>
            <author initials="I." surname="Bryskin" fullname="I. Bryskin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Papadimitriou" fullname="D. Papadimitriou">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Ash" fullname="J. Ash">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="December"/>
            <abstract>
              <t>The Path Computation Element (PCE) architecture introduces the concept of policy in the context of path computation.  This document provides additional details on policy within the PCE architecture and also provides context for the support of PCE Policy.  This document introduces the use of the Policy Core Information Model (PCIM) as a framework for supporting path computation policy.  This document also provides representative scenarios for the support of PCE Policy.  This memo  provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5394"/>
          <seriesInfo name="DOI" value="10.17487/RFC5394"/>
        </reference>
        <reference anchor="RFC5521" target="https://www.rfc-editor.org/info/rfc5521" quoteTitle="true" derivedAnchor="RFC5521">
          <front>
            <title>Extensions to the Path Computation Element Communication Protocol (PCEP) for Route Exclusions</title>
            <author initials="E." surname="Oki" fullname="E. Oki">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Takeda" fullname="T. Takeda">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="April"/>
            <abstract>
              <t>The Path Computation Element (PCE) provides functions of path computation in support of traffic engineering (TE) in Multi-Protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks.</t>
              <t>When a Path Computation Client (PCC) requests a PCE for a route, it may be useful for the PCC to specify, as constraints to the path computation, abstract nodes, resources, and Shared Risk Link Groups (SRLGs) that are to be explicitly excluded from the computed route. Such constraints are termed "route exclusions".</t>
              <t>The PCE Communication Protocol (PCEP) is designed as a communication protocol between PCCs and PCEs.  This document presents PCEP extensions for route exclusions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5521"/>
          <seriesInfo name="DOI" value="10.17487/RFC5521"/>
        </reference>
        <reference anchor="RFC5886" target="https://www.rfc-editor.org/info/rfc5886" quoteTitle="true" derivedAnchor="RFC5886">
          <front>
            <title>A Set of Monitoring Tools for Path Computation Element (PCE)-Based Architecture</title>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Ikejiri" fullname="Y. Ikejiri">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t>A Path Computation Element (PCE)-based architecture has been specified for the computation of Traffic Engineering (TE) Label Switched Paths (LSPs) in Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks in the context of single or multiple domains (where a domain refers to a collection of network elements within a common sphere of address management or path computational responsibility such as Interior Gateway Protocol (IGP) areas and Autonomous Systems).  Path Computation Clients (PCCs) send computation requests to PCEs, and these may forward the requests to and cooperate with other PCEs forming a "path computation chain".</t>
              <t>In PCE-based environments, it is thus critical to monitor the state of the path computation chain for troubleshooting and performance monitoring purposes: liveness of each element (PCE) involved in the PCE chain and detection of potential resource contention states and statistics in terms of path computation times are examples of such metrics of interest.  This document specifies procedures and extensions to the Path Computation Element Protocol (PCEP) in order to gather such information.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5886"/>
          <seriesInfo name="DOI" value="10.17487/RFC5886"/>
        </reference>
        <reference anchor="RFC6007" target="https://www.rfc-editor.org/info/rfc6007" quoteTitle="true" derivedAnchor="RFC6007">
          <front>
            <title>Use of the Synchronization VECtor (SVEC) List for Synchronized Dependent Path Computations</title>
            <author initials="I." surname="Nishioka" fullname="I. Nishioka">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="King" fullname="D. King">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="September"/>
            <abstract>
              <t>A Path Computation Element (PCE) may be required to perform dependent path computations.  Dependent path computations are requests that need to be synchronized in order to meet specific objectives.  An example of a dependent request would be a PCE computing a set of services that are required to be diverse (disjointed) from each other.  When a PCE computes sets of dependent path computation requests concurrently, use of the Synchronization VECtor (SVEC) list is required for association among the sets of dependent path computation requests.  The SVEC object is optional and carried within the Path Computation Element Communication Protocol (PCEP) PCRequest (PCReq) message.</t>
              <t>This document does not specify the PCEP SVEC object or procedure. This informational document clarifies the use of the SVEC list for synchronized path computations when computing dependent requests. The document also describes a number of usage scenarios for SVEC lists within single-domain and multi-domain environments.   This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6007"/>
          <seriesInfo name="DOI" value="10.17487/RFC6007"/>
        </reference>
        <reference anchor="G-8080" quoteTitle="true" derivedAnchor="G-8080">
          <front>
            <title>Architecture for the automatically switched optical network</title>
            <seriesInfo name="ITU-T Recommendation" value="G.8080/Y.1304"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="February" year="2012"/>
          </front>
        </reference>
        <reference anchor="G-7715" quoteTitle="true" derivedAnchor="G-7715">
          <front>
            <title>Architecture and requirements for routing in the automatically switched optical networks</title>
            <seriesInfo name="ITU-T Recommendation" value="G.7715/Y.1706"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="June" year="2002"/>
          </front>
        </reference>
        <reference anchor="G-7715-2" quoteTitle="true" derivedAnchor="G-7715-2">
          <front>
            <title>ASON routing architecture and requirements for remote route query</title>
            <seriesInfo name="ITU-T Recommendation" value="G.7715.2/Y.1706.2"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="February" year="2007"/>
          </front>
        </reference>
        <reference anchor="RFC6952" target="https://www.rfc-editor.org/info/rfc6952" quoteTitle="true" derivedAnchor="RFC6952">
          <front>
            <title>Analysis of BGP, LDP, PCEP, and MSDP Issues According to the Keying and Authentication for Routing Protocols (KARP) Design Guide</title>
            <author initials="M." surname="Jethanandani" fullname="M. Jethanandani">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Patel" fullname="K. Patel">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Zheng" fullname="L. Zheng">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="May"/>
            <abstract>
              <t>This document analyzes TCP-based routing protocols, the Border Gateway Protocol (BGP), the Label Distribution Protocol (LDP), the Path Computation Element Communication Protocol (PCEP), and the Multicast Source Distribution Protocol (MSDP), according to guidelines set forth in Section 4.2 of "Keying and Authentication for            Routing Protocols Design Guidelines", RFC 6518.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6952"/>
          <seriesInfo name="DOI" value="10.17487/RFC6952"/>
        </reference>
        <reference anchor="RFC7334" target="https://www.rfc-editor.org/info/rfc7334" quoteTitle="true" derivedAnchor="RFC7334">
          <front>
            <title>PCE-Based Computation Procedure to Compute Shortest Constrained Point-to-Multipoint (P2MP) Inter-Domain Traffic Engineering Label Switched Paths</title>
            <author initials="Q." surname="Zhao" fullname="Q. Zhao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Dhody" fullname="D. Dhody">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="King" fullname="D. King">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Z." surname="Ali" fullname="Z. Ali">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Casellas" fullname="R. Casellas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="August"/>
            <abstract>
              <t>The ability to compute paths for constrained point-to-multipoint (P2MP) Traffic Engineering Label Switched Paths (TE LSPs) across multiple domains has been identified as a key requirement for the deployment of P2MP services in MPLS- and GMPLS-controlled networks. The Path Computation Element (PCE) has been recognized as an appropriate technology for the determination of inter-domain paths of P2MP TE LSPs.</t>
              <t>This document describes an experiment to provide procedures and extensions to the PCE Communication Protocol (PCEP) for the computation of inter-domain paths for P2MP TE LSPs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7334"/>
          <seriesInfo name="DOI" value="10.17487/RFC7334"/>
        </reference>
        <reference anchor="RFC7420" target="https://www.rfc-editor.org/info/rfc7420" quoteTitle="true" derivedAnchor="RFC7420">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Management Information Base (MIB) Module</title>
            <author initials="A." surname="Koushik" fullname="A. Koushik">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Stephan" fullname="E. Stephan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Q." surname="Zhao" fullname="Q. Zhao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="King" fullname="D. King">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Hardwick" fullname="J. Hardwick">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="December"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects for modeling of the Path Computation Element Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a Path Computation Element (PCE), or between two PCEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7420"/>
          <seriesInfo name="DOI" value="10.17487/RFC7420"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" quoteTitle="true" derivedAnchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7752" target="https://www.rfc-editor.org/info/rfc7752" quoteTitle="true" derivedAnchor="RFC7752">
          <front>
            <title>North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP</title>
            <author initials="H." surname="Gredler" fullname="H. Gredler" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Medved" fullname="J. Medved">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Previdi" fullname="S. Previdi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Ray" fullname="S. Ray">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="March"/>
            <abstract>
              <t>In a number of environments, a component external to a network is called upon to perform computations based on the network topology and current state of the connections within the network, including Traffic Engineering (TE) information.  This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol.  This is achieved using a new BGP Network Layer Reachability Information (NLRI) encoding format.  The mechanism is applicable to physical and virtual IGP links.  The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7752"/>
          <seriesInfo name="DOI" value="10.17487/RFC7752"/>
        </reference>
        <reference anchor="RFC7897" target="https://www.rfc-editor.org/info/rfc7897" quoteTitle="true" derivedAnchor="RFC7897">
          <front>
            <title>Domain Subobjects for the Path Computation Element Communication Protocol (PCEP)</title>
            <author initials="D." surname="Dhody" fullname="D. Dhody">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="U." surname="Palle" fullname="U. Palle">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Casellas" fullname="R. Casellas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="June"/>
            <abstract>
              <t>The ability to compute shortest constrained Traffic Engineering Label Switched Paths (TE LSPs) in Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks across multiple domains has been identified as a key requirement.  In this context, a domain is a collection of network elements within a common sphere of address management or path computational responsibility such as an Interior Gateway Protocol (IGP) area or an Autonomous System (AS).  This document specifies a representation and encoding of a domain sequence, which is defined as an ordered sequence of domains traversed to reach the destination domain to be used by Path Computation Elements (PCEs) to compute inter-domain constrained shortest paths across a predetermined sequence of domains.  This document also defines new subobjects to be used to encode domain identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7897"/>
          <seriesInfo name="DOI" value="10.17487/RFC7897"/>
        </reference>
        <reference anchor="RFC8253" target="https://www.rfc-editor.org/info/rfc8253" quoteTitle="true" derivedAnchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author initials="D." surname="Lopez" fullname="D. Lopez">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="O." surname="Gonzalez de Dios" fullname="O. Gonzalez de Dios">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Q." surname="Wu" fullname="Q. Wu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Dhody" fullname="D. Dhody">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="October"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP.  The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="RFC8453" target="https://www.rfc-editor.org/info/rfc8453" quoteTitle="true" derivedAnchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author initials="D." surname="Ceccarelli" fullname="D. Ceccarelli" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Lee" fullname="Y. Lee" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane.  They also have a range of management and provisioning protocols to configure and activate network resources.  These mechanisms represent key technologies for enabling flexible and dynamic networking.  The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="I-D.ietf-pce-pcep-yang" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-pce-pcep-yang-13" derivedAnchor="PCEP-YANG">
          <front>
            <title>A YANG Data Model for Path Computation Element Communications Protocol (PCEP)</title>
            <author initials="D" surname="Dhody" fullname="Dhruv Dhody">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Hardwick" fullname="Jonathan Hardwick">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V" surname="Beeram" fullname="Vishnu Beeram">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Tantsura" fullname="Jeff Tantsura">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="October" day="31" year="2019"/>
            <abstract>
              <t>This document defines a YANG data model for the management of Path Computation Element communications Protocol (PCEP) for communications between a Path Computation Client (PCC) and a Path Computation Element (PCE), or between two PCEs.  The data model includes configuration and state data.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pce-pcep-yang-13"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-pce-pcep-yang-13.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="acks" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t pn="section-appendix.a-1">
   The author would like to thank <contact fullname="Adrian Farrel"/> for his
   review and <contact fullname="Meral Shirazipour"/> and <contact fullname="Francisco Javier Jiménez Chico"/> for their comments.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-contributors">Contributors</name>
      <contact fullname="Dhruv Dhody">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <street>Divyashree Techno Park, Whitefield</street>
            <city>Bangalore</city>
            <region>Karnataka</region>
            <code>560066</code>
            <country>India</country>
          </postal>
          <email>dhruv.ietf@gmail.com</email>
        </address>
      </contact><contact fullname="Quintin Zhao">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <street>125 Nagog Technology Park</street>
            <city>Acton</city>
            <region>MA</region>
            <code>01719</code>
            <country>United States of America</country>
          </postal>
          <email>qzhao@huawei.com</email>
        </address>
      </contact><contact fullname="Julien Meuric">
        <organization showOnFrontPage="true">France Telecom</organization>
        <address>
          <postal>
            <street>2, avenue Pierre-Marzin</street>
            <city>Lannion Cedex</city>
            <code>22307</code>
            <country>France</country>
          </postal>
          <email>julien.meuric@orange.com</email>
        </address>
      </contact><contact fullname="Olivier Dugeon">
        <organization showOnFrontPage="true">France Telecom</organization>
        <address>
          <postal>
            <street>2, avenue Pierre-Marzin</street>
            <city>Lannion Cedex</city>
            <code>22307</code>
            <country>France</country>
          </postal>
          <email>olivier.dugeon@orange.com</email>
        </address>
      </contact><contact fullname="Jon Hardwick">
        <organization showOnFrontPage="true">Metaswitch Networks</organization>
        <address>
          <postal>
            <street>100 Church Street</street>
            <city>Enfield</city>
            <code>EN2 6BQ</code>
            <country>United Kingdom</country>
          </postal>
          <email>jonathan.hardwick@metaswitch.com</email>
        </address>
      </contact><contact fullname="Óscar González de Dios">
        <organization showOnFrontPage="true">Telefonica I+D</organization>
        <address>
          <postal>
            <street>Emilio Vargas 6</street>
            <city>Madrid</city>
            <country>Spain</country>
          </postal>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact></section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Daniel King" initials="D." surname="King">
        <organization showOnFrontPage="true">Old Dog Consulting</organization>
        <address>
          <email>daniel@olddog.co.uk</email>
        </address>
      </author>
      <author fullname="郑好棉" asciiFullname="Haomian Zheng">
        <organization ascii="Huawei Technologies" showOnFrontPage="true">华为技术有限公司</organization>
        <address>
          <postal>
            <street ascii="H1, Huawei Xiliu Beipo Village, Songshan Lake">松山湖华为溪流背坡村H1</street>
            <city ascii="Dongguan">东莞</city>
            <region ascii="Guangdong">广东</region>
            <code>523808</code>
            <country ascii="China">中国</country>
          </postal>
          <email>zhenghaomian@huawei.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
