Network Working Group                                                   
Internet Draft                                 Tomonori Takeda (Editor) 
Proposed Status: Informational                                      NTT 
Expires: May 2007                                         November 2006 
    
    
    Applicability analysis of Generalized Multiprotocol Label Switching 
     (GMPLS) protocols for the Layer 1 Virtual Private Network (L1VPN) 
                               Enhanced Mode 
                                      
            draft-ietf-l1vpn-applicability-enhanced-mode-00.txt 
    
    
Status of this Memo 
    
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet- 
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress."  
    
   The list of current Internet-Drafts can be accessed at  
   http://www.ietf.org/ietf/1id-abstracts.txt  
    
   The list of Internet-Draft Shadow Directories can be accessed at  
   http://www.ietf.org/shadow.html. 
    
Abstract 
    
   This document provides an applicability analysis on the use of 
   Generalized Multiprotocol Label Switching (GMPLS) protocols and 
   mechanisms to satisfy the requirements of the Layer 1 Virtual Private 
   Network (L1VPN) Enhanced Mode. 
    
   L1VPNs provide customer services and connectivity at layer 1 over 
   layer 1 networks. The operation of L1VPNs is divided into the Basic 
   Mode and the Enhanced Mode, where the Enhanced Mode of operation 
   features exchange of routing information between the layer 1 network 
   and the customer domain. 
    

 
 
T.Takeda, et al.           Expires May 2007                   [Page 1] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   In addition, this document identifies areas where additional protocol 
   extensions or procedures are needed to satisfy the requirements of 
   the L1VPN Enhanced Mode, and provides guidelines for potential 
   extensions. 
    
Table of Contents 
    
   1. Contributors...................................................2 
   2. Terminology....................................................3 
   3. Introduction...................................................3 
   3.1 Work Items....................................................3 
   3.2 Existing Solutions Drafts.....................................4 
   4. General Guidelines.............................................4 
   5. Overlay Extension Service Model................................5 
   5.1 Overview of the Service Model.................................5 
   5.2 Applicability of Existing Solutions...........................6 
   5.3 Additional Work Area(s).......................................6 
   6. Virtual Node Service Model.....................................6 
   6.1 Overview of the Service Model.................................6 
   6.2 Applicability of Existing Solutions...........................6 
   6.3 Additional Work Area(s).......................................7 
   7. Virtual Link Service Model.....................................7 
   7.1 Overview of the Service Model.................................7 
   7.2 Applicability of Existing Solutions...........................7 
   7.3 Additional Work Area(s).......................................7 
   8. Per-VPN Peer Service Model.....................................8 
   8.1 Overview of the Service Model.................................8 
   8.2 Applicability of Existing Solutions...........................8 
   8.3 Additional Work Area(s).......................................8 
   9. Discussion.....................................................9 
   10. Manageability Considerations..................................9 
   11. Security Considerations......................................10 
   12. References...................................................10 
   12.1 Normative References........................................10 
   12.2 Informative References......................................10 
   13. Acknowledgments..............................................12 
   14. Author's Addresses...........................................12 
   15. Intellectual Property Consideration..........................13 
   16. Full Copyright Statement.....................................13 
    
1. Contributors 
    
   The details of this document are the result of contributions from 
   several authors who are listed here in alphabetic order. Contact 
   details for these authors can be found in a separate section near the 
   end of this document. 
    
   Deborah Brungard (AT&T) 
   Adrian Farrel (Old Dog Consulting) 
 
 
T.Takeda, et al.           Expires May 2007                   [Page 2] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   Hamid Ould-Brahim (Nortel Networks) 
   Dimitri Papadimitriou (Alcatel) 
   Tomonori Takeda (NTT) 
    
2. Terminology 
    
   The reader is assumed to be familiar with the terminology in 
   [RFC3031], [RFC3209], [RFC3471], [RFC3473], [RFC4202], [RFC4026] and 
   [L1VPN-FW]. 
    
3. Introduction 
    
   This document shows the applicability of existing Generalized 
   Multiprotocol Label Switching (GMPLS) protocols and mechanisms to the 
   Layer 1 Virtual Private Network (L1VPN) Enhanced Mode. In addition, 
   this document identifies several areas where additional protocol 
   extensions or modifications are needed to meet the L1VPN Enhanced 
   Mode service requirements set out in [L1VPN-FW]. 
    
   In particular, this document shows section by section (from Section 5 
   to 8) the applicability of GMPLS protocols and mechanisms to each 
   sub-model of the Enhanced Mode mentioned in [L1VPN-FW], along with 
   additional work areas needed to fully support the requirements for 
   each sub-model. 
    
   Note that discussion in this document is limited to areas where GMPLS 
   protocols and mechanisms are relevant. 
    
   As will be described in this document, support of the Overlay 
   Extension service model and the Virtual Node service model are well 
   covered by existing protocol mechanisms already described in other 
   documents, with only minor protocol extensions required. The Virtual 
   Link service model and the Per-VPN Peer service model are not 
   explicitly covered by existing documents, but can be realized by 
   extending current GMPLS protocols and mechanisms as described in this 
   document. 
    
   The following section lists areas where additional work may be 
   required to fully support the requirements for each sub-model. Some 
   of the requirements are optional, therefore the additional work is 
   also optional. 
    
   Commonalities of mechanisms over various sub-models, as well as over 
   the L1VPN Basic Mode need to be considered. Also, various mechanisms 
   should be coordinated in such a way that services are provided in a 
   fully functional manner. 
    
3.1 Work Items 
    
 
 
T.Takeda, et al.           Expires May 2007                   [Page 3] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   This list of additional work areas is a summary derived from the main 
   body of this document. The list will be updated in later versions of 
   this document along with the development of the additional or 
   enhanced requirements and increased understanding of the issues. As 
   work progresses on protocol extensions, this list will be updated to 
   remove completed items, and the body of this document will be updated 
   to describe the analysis of protocol extensions. The intention is 
   that this whole section is removed when the work has been completed 
   and this document progresses to become an RFC. 
    
   o Routing representation (how a VPN should be represented in routing, 
     e.g., single area, multi-area, multi-AS). See Sections 6.3 and 7.3. 
   o Signaling and routing for support of the Per-VPN Peer service  
     model. See Section 8.3. 
    
3.2 Existing Solutions Drafts 
    
   This section lists existing solution documents that describe how the 
   L1VPN Enhanced Mode may be constructed using the mechanisms of GMPLS. 
   This document draws on those solutions and explains their 
   applicability and suggests further extensions to make the solutions 
   more closely match the framework described in [L1VPN-FW]. Further 
   solution documents may be listed in a future version of this  
   document. 
    
   o [GVPN] describes a suite of port-based Provider-provisioned VPN 
     services called Generalized VPNs (GVPNs) that use BGP for VPN 
     auto-discovery and GMPLS as a signaling mechanism. 
    
   o [L1VPN-BM] addresses the L1VPN Basic Mode signaling. 
    
   Note that although [L1VPN-BM] specifies signaling mechanisms for 
   L1VPN Basic Mode, it is applicable to the L1VPN Enhanced Mode, unless 
   otherwise specified. Therefore, main focus of this document is how to 
   realize routing related information exchange between a CE and a PE. 
    
4. General Guidelines 
    
   This section provides general guidelines for L1VPN solutions. Note 
   that applicability to specific sub-models will be separately 
   described in following sections. 
    
   One important general guideline is that protocol mechanisms should be 
   re-used where possible. This means that solutions should be 
   incremental, building on existing protocol mechanisms rather than 
   developing wholly new protocols. Further, as service models are 
   extended or developed resulting in the requirement for additional 
   functionalities, deltas should be added to the protocol mechanisms 
   rather than developing new techniques. [L1VPN-FW] describes how the 
 
 
T.Takeda, et al.           Expires May 2007                   [Page 4] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   service models can be seen to provide "cascaded" functionality, and 
   this should be leveraged to achieve re-use of protocol extensions so 
   that, for example, it is highly desirable that the same signaling 
   protocols and extensions are used in both the Basic Mode and the 
   Enhanced Mode. 
    
   In addition, the following are general guidelines. 
    
   - The support of L1VPNs should not necessitate any change to core (P) 
     devices. Therefore, any protocol extensions made to facilitate 
     L1VPNs need to be made in a backward compatible way allowing GMPLS 
     aware P devices to continue to function. 
   - Customer (C) devices not directly involved in providing L1VPN 
     services should also be protected from protocol extensions made to 
     support L1VPNs. Again, such protocol extensions need to be backward 
     compatible. Note however, that some L1VPN service models allow for 
     VPN connectivity between C devices rather than between CE devices: 
     in this case, the C devices may need to be aware of protocol 
     extensions. 
   - Solutions should aim to minimize the protocol extensions on CE 
     devices. 
   - Solutions should be scalable and manageable. Solutions should not 
     require L1VPN state to be maintained on the P devices as much as 
     possible. 
   - Solutions should be secure. Providers should be able to screen and 
     protect information based on their operational policies. 
   - Solutions should provide an operational view of the L1VPN for the 
     customer and provider. There should be a common operational and 
     management perspective in regard to other (L2 and L3) VPN services. 
    
5. Overlay Extension Service Model 
    
5.1 Overview of the Service Model 
    
   This service model complements the Basic Mode and may assume all of 
   the requirements, solutions and work items for that model. 
    
   In this service model, a CE receives from its attached PEs a list of 
   TE link addresses to which it can request a VPN connection (i.e., 
   membership information). 
    
   The CE may also receive some TE information concerning these CE-PE 
   links within the VPN (e.g., switching type). 
    
   The CE does not receive any of the following from the PE. 
    
   - Routing information about the core provider network. 
   - Information about P device addresses. 
   - Information about P-P, PE-P or PE-PE TE links. 
 
 
T.Takeda, et al.           Expires May 2007                   [Page 5] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   - Routing information about other customer sites. The CE may have 
     access to routing information about the remainder of the VPN (C-C 
     and CE-C links), but this is exchanged by control plane tunneling 
     on the CE-CE connections and is not passed to the CE in the control 
     plane exchange between PE and CE. 
    
5.2 Applicability of Existing Solutions 
    
   The following are required in this service model (in addition to 
   requirements in the L1VPN Basic Mode). 
    
   - VPN membership information exchange between a CE and PE. 
   - CE-PE TE link information exchange between a CE and a PE. 
    
   [GVPN] covers the requirement to exchange membership information 
   between the CE and the PE based on BGP. Furthermore, [BGP-TE] allows 
   the exchange of CE-PE TE link information between a CE and a PE. 
    
5.3 Additional Work Area(s) 
    
   None. 
    
6. Virtual Node Service Model 
    
6.1 Overview of the Service Model 
    
   In this service model, there is a private routing exchange between 
   the CE and the PE, or to be more precise between the CE routing 
   protocol instance and the VPN routing protocol instance running on 
   the PE. The provider network is considered as one private node from 
   the customer's perspective. The routing information exchanged between 
   the CE and the PE includes CE-PE TE link information, customer 
   network (i.e., remote CE sites), and may include TE links (Forwarding 
   Adjacencies) connecting CEs (or Cs) across the provider network as 
   well as control plane topology information from the customer network 
   (i.e., CE sites). 
    
6.2 Applicability of Existing Solutions 
    
   The following are required in this service model. 
    
   - VPN routing 
   - Signaling: CE-CE Label Switching Path (LSP) setup, deletion, and 
     modification 
    
   [GVPN] covers most of the requirements. 
    
   Specifically, [GVPN] handles VPN routing by a per VPN database called 
   the GVSI (Generalized Virtual Switching Instance) held in each PE. 
 
 
T.Takeda, et al.           Expires May 2007                   [Page 6] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   GVSIs are inter-connected by tunnel-based control channels, and 
   routing adjacencies are established between them. BGP is used for 
   auto-discovery of remote GVSIs (VPN auto-discovery) in the same VPN. 
   GVSIs advertise VPN routing information by using a single ROUTER_ID 
   to represent the provider network as one node. 
    
   It is also possible to use IGP-based auto-discovery (based on [L1VPN-
   OSPF-DISC]), instead of BGP-based auto-discovery. 
    
   Signaling mechanisms are covered by [L1VPN-BM]. 
    
6.3 Additional Work Area(s) 
    
   o Routing Representation 
    
     [GVPN] allows flexible routing configuration for each VPN (e.g., 
     single IGP area, multiple IGP areas, or multiple ASes). 
    
     However, it may be valuable to consider how to represent a VPN in 
     routing. This may simplify the solution (e.g., in terms of 
     scalability). This requires further discussion. 
    
7. Virtual Link Service Model 
    
7.1 Overview of the Service Model 
    
   In this service model, virtual links are established between PEs. A 
   virtual link is assigned to each VPN and disclosed to the 
   corresponding CEs. The routing information exchanged between the CE 
   and the PE includes CE-PE TE links, customer network (i.e., remote CE 
   sites), virtual links (i.e., PE-PE links) assigned to each VPN, and 
   may include CE-CE (or C-C) Forwarding Adjacencies as well as control 
   plane topology from the customer network (i.e., CE sites). 
    
7.2 Applicability of Existing Solutions 
    
   Currently, there is no solution document for this type of service 
   model. 
    
7.3 Additional Work Area(s) 
    
   Simple modifications of [GVPN], in addition to enhancements mentioned 
   in Section 6.3, may realize this type of service model. Modifications 
   could be: 
    
   - Do NOT modify the ROUTER_ID of the TE link information when 
     advertising a CE-PE TE link to the CE (in the OSPF packet header as 
     well as in the LSA header). 
    
 
 
T.Takeda, et al.           Expires May 2007                   [Page 7] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   - Set up Forwarding Adjacency LSPs (FA-LSPs, GVSI-LSPs in [GVPN] 
     terms) between PEs to construct virtual links, and advertise these 
     FAs in VPN routing. Note these FAs (virtual links) may be assigned 
     private addresses, which means customer assigned addresses (or that 
     customers are allowed to configure addresses). This may require 
    extensions to current IGP behavior. 
    
   There could be other ways to construct virtual links (e.g., virtual 
   links without actually setting up an FA-LSP [MRN-REQ]). 
    
   Resource management for a dedicated data plane is a mandatory 
   requirement for the Virtual Link service model. This could be 
   realized by assigning pre-configured FA-LSPs to each VPN routing 
   protocol instance (no protocol extensions needed) in order to 
   instantiate the necessary FAs. 
    
   Note that as in the case of the Virtual Node service model, solution 
   details may differ depending on the routing representation. This 
   requires further discussion. 
    
8. Per-VPN Peer Service Model 
    
8.1 Overview of the Service Model 
    
   In this service model, the provider partitions TE links within the 
   provider network per VPN. The routing information exchanged between 
   the CE and the PE includes CE-PE TE links, customer network (i.e., 
   remote CE sites), as well as partitioned portions of the provider 
   network, and may include CE-CE (or C-C) Forwarding Adjacencies and 
   control plane topology from customer network (i.e., CE sites). Note 
   that PEs may abstract routing information about the provider network 
   and advertise it to CEs. 
    
   Note scalability must be carefully considered for advertising 
   provider network routing information to the CE [INTER-DOMAIN-FW]. 
    
8.2 Applicability of Existing Solutions 
    
   Currently, there is no solution document for this type of service 
   model. 
    
8.3 Additional Work Area(s) 
    
   There are two approaches for this service model. 
    
   o Signaling and routing for support of the per-VPN Peer service 
     model 
    
     Option1: Virtual Link based approach 
 
 
T.Takeda, et al.           Expires May 2007                   [Page 8] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
    
       The Per-VPN Peer service model may be realized by extending the 
       virtual link technique so that not only PEs but also Ps that 
       contain end points of virtual links in the abstracted topology 
       contain VPN routing instances. There may be no additional 
       protocol extensions needed from the Virtual Link service model. 
    
     Option2: Virtual Node based approach 
    
       The Per-VPN Peer service model may be realized by extending the 
       virtual node technique so that PEs selectively advertise 
       provider internal TE links to CEs. There are several extensions 
       needed for this. 
    
   Details are for further study. 
    
9. Discussion 
    
   This section summarizes items for which existing solutions may need 
   to be extended in order to fulfill the full set of L1VPN Enhanced 
   Mode functionalities. 
    
   For the Overlay Extension service model and the Virtual Node service 
   model, the existing solutions can be applied with few extensions. 
    
   As described in Sections 7.2 and 8.2, there are no existing solutions 
   to support the Virtual Link service model and the Per-VP Peer service 
   model. For the Virtual Link service model, however, minor extensions 
   from existing solutions are expected to meet the requirements. 
    
   Note that the list of additional work areas will be updated in later 
   versions of this document with the development of additional or 
   enhanced requirements and further understanding of the issues. 
    
   o Routing representation 
     - One building block for the Enhanced Mode 
     - Further discussion required (single area, multi areas, multi  
       ASes, etc.) 
     - Impact: Details to be studied (routing etc.) 
    
   o Signaling and routing for support of the Per-VPN Peer service model 
     - Details for further study 
    
10. Manageability Considerations 
    
   Section 11 of [L1VPN-FW] describes manageability considerations for 
   L1VPNs. 
    

 
 
T.Takeda, et al.           Expires May 2007                   [Page 9] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   This document defines a following new manageability requirement 
   specific for the L1VPN Enhanced Mode. 
    
   MIB modules MUST be available for any protocol extensions for the 
   L1VPN Enhanced Mode. 
    
   A future revision of this document may cover more aspects. 
    
11. Security Considerations 
    
   Section 12 of [L1VPN-FW] describes security considerations for  
   L1VPNs. This document defines a following new security requirements 
   specific for the L1VPN Enhanced Mode. 
    
   In the L1VPN Enhanced Mode, since there is a routing adjacency 
   between a CE and a PE, care must be taken whether the provider 
   network's control plane topology information is leaked to the CE. Due 
   to security concerns, this is not recommended in general, and there 
   must be a mechanism to prevent such operation. 
    
   A future revision of this document may cover more aspects. 
    
12. References 
    
12.1 Normative References 
    
   [RFC3668]          Bradner, S., "Intellectual Property Rights in IETF 
                      Technology", BCP 79, RFC 3668, February 2004. 
    
   [L1VPN-FW]         Takeda, T., Editor "Framework and Requirements for 
                      Layer 1 Virtual Private Networks", draft-ietf- 
                      l1vpn-framework, work in progress. 
    
12.2 Informative References 
    
   For information on the availability of this document, please see 
   http://www.itu.int. 
    
   [Y.1312]           Y.1312 - Layer 1 Virtual Private Network Generic 
                      requirements and architecture elements, ITU-T 
                      Recommendation, September 2003. 
    
   For information on the availability of this document, please see 
   http://www.itu.int. 
    
   [Y.1313]           Y.1313 - Layer 1 Virtual Private Network 
                      service and network architectures, ITU-T 
                      Recommendation, July 2004. 
    
 
 
T.Takeda, et al.           Expires May 2007                  [Page 10] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   [RFC3031]          Rosen, E., Viswanathan, A. and R. Callon, 
                      "Multiprotocol label switching Architecture", RFC 
                      3031, January 2001. 
    
   [RFC3209]          Awduche, D., Berger, L., Gan, D., Li, T., 
                      Srinivasan, V.  and G. Swallow, "RSVP-TE: 
                      Extensions to RSVP for LSP Tunnels", RFC 3209, 
                      December 2001. 
    
   [RFC3471]          Berger, L., Editor, "Generalized Multi-Protocol 
                      Label Switching (GMPLS) Signaling Functional 
                      Description", RFC 3471, January 2003. 
    
   [RFC3473]          Berger, L., Editor "Generalized Multi-Protocol 
                      Label Switching (GMPLS) Signaling - Resource 
                      ReserVation Protocol-Traffic Engineering (RSVP-TE) 
                      Extensions", RFC 3473, January 2003. 
    
   [RFC4202]          Kompella, K., et al., "Routing Extensions in 
                      Support of Generalized Multi-Protocol Label 
                      Switching (GMPLS)", RFC 4202, October 2005. 
    
   [RFC4026]          Anderssion, L., and Madsen, T., "Provider 
                      Provisioned Virtual Private Network (VPN) 
                      Terminology", RFC 4026, March 2005. 
    
   [GVPN]             Ould-Brahim, H., and Rekhter, Y. Editors, "GVPN 
                      Services: Generalized VPN Services using BGP and 
                      GMPLS Toolkit", draft-ouldbrahim-ppvpn-gvpn- 
                      bgpgmpls, work in progress. 
    
   [RFC4208]          Swallow, G., et al., "Generalize Multiprotocol 
                      Label Switching(GMPLS) User-Network Interface: 
                      Resource ReserVation Protocol-Traffic Engineering 
                      (RSVP-TE) Support for the Overlay Model," RFC4208, 
                      October 2005. 
    
   [L1VPN-BM]         Fedyk, D., and Rekhter, Y., Editors, "Layer 1 
                      VPN Basic Mode," draft-fedyk-l1vpn-basic-mode, 
                      work in progress. 
    
   [L1VPN-BGP-DISC]   Ould-Brahim, H., Fedyk, D., and Rekhter, Y.,  
                      "BGP-based Auto-Discovery for L1VPNs," draft-ietf- 
                      l1vpn-bgp-auto-discovery, work in progress. 
    
   [L1VPN-OSPF-DISC]  Bryskin, I., and Berger, L., "OSPF Based L1VPN 
                      Auto-Discovery," draft-ietf-l1vpn-ospf-auto- 
                      discovery, work in progress. 
    
 
 
T.Takeda, et al.           Expires May 2007                  [Page 11] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   [INTER-DOMAIN-FW]  Farrel, A., et al., "A Framework for Inter-Domain 
                      MPLS Traffic Engineering", draft-ietf-ccamp-inter- 
                      domain-framework, work in progress. 
    
   [BGP-TE]           Ould-Brahim, H., Fedyk, D., and Rekhter, Y., 
                      "Traffic Engineering Attribute", draft-fedyk-bgp- 
                      te-attribute, work in progress. 
    
   [MRN-REQ]          Shiomoto, K., et al., "Requirements for GMPLS- 
                      based multi-region and multi-layer networks 
                      (MRN/MLN)", draft-ietf-ccamp-gmpls-mln-reqs, work 
                      in progress. 
    
13. Acknowledgments 
    
   Authors would like to thank Marco Carugi, Ichiro Inoue, and Takumi 
   Ohba for valuable comments in the early development of this document. 
    
14. Author's Addresses 
    
   Deborah Brungard (AT&T) 
   Rm. D1-3C22 - 200 S. Laurel Ave. 
   Middletown, NJ 07748, USA 
   Phone: +1 732 4201573 
   Email: dbrungard@att.com 
    
   Adrian Farrel 
   Old Dog Consulting 
   Phone:  +44 (0) 1978 860944 
   Email:  adrian@olddog.co.uk 
    
   Hamid Ould-Brahim 
   Nortel Networks 
   P O Box 3511 Station C 
   Ottawa, ON K1Y 4H7 Canada 
   Phone: +1 (613) 765 3418 
   Email: hbrahim@nortel.com 
    
   Dimitri Papadimitriou (Alcatel) 
   Francis Wellensplein 1, 
   B-2018 Antwerpen, Belgium 
   Phone: +32 3 2408491 
   Email: dimitri.papadimitriou@alcatel.be 
    
   Tomonori Takeda 
   NTT Network Service Systems Laboratories, NTT Corporation 
   3-9-11, Midori-Cho 
   Musashino-Shi, Tokyo 180-8585 Japan 
   Phone: +81 422 59 7434 
 
 
T.Takeda, et al.           Expires May 2007                  [Page 12] 
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt      November 2006 
 
 
   Email: takeda.tomonori@lab.ntt.co.jp 
    
15. Intellectual Property Consideration 
    
   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed 
   to pertain to the implementation or use of the technology 
   described in this document or the extent to which any license 
   under such rights might or might not be available; nor does it 
   represent that it has made any independent effort to identify any 
   such rights.  Information on the procedures with respect to 
   rights in RFC documents can be found in BCP 78 and BCP 79. 
    
   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use 
   of such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository 
   at http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its attention 
   any copyrights, patents or patent applications, or other 
   proprietary rights that may cover technology that may be required 
   to implement this standard.  Please address the information to the 
   IETF at ietf-ipr@ietf.org. 
    
16. Full Copyright Statement 
    
   Copyright (C) The IETF Trust (2006). 
    
   This document is subject to the rights, licenses and 
   restrictions contained in BCP 78, and except as set 
   forth therein, the authors retain all their rights. 
    
   This document and the information contained herein are provided 
   on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE 
   REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, 
   THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE 
   DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT 
   NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES 
   OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 







 
 
T.Takeda, et al.           Expires May 2007                  [Page 13]