draft-ietf-ccamp-general-constraint-encode-17.txt   draft-ietf-ccamp-general-constraint-encode-18.txt 
Network Working Group G. Bernstein Network Working Group G. Bernstein
Internet Draft Grotto Networking Internet Draft Grotto Networking
Intended status: Standards Track Y. Lee Intended status: Standards Track Y. Lee
Expires: June 2015 D. Li Expires: June 2015 D. Li
Huawei Huawei
W. Imajuku W. Imajuku
NTT NTT
January 20, 2015 February 2, 2015
General Network Element Constraint Encoding for GMPLS Controlled General Network Element Constraint Encoding for GMPLS Controlled
Networks Networks
draft-ietf-ccamp-general-constraint-encode-17.txt draft-ietf-ccamp-general-constraint-encode-18.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79. the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 38 skipping to change at page 1, line 38
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on June 20, 2015. This Internet-Draft will expire on June 2, 2015.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
Internet-Draft General Network Element Constraint Encoding February
2015
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License. warranty as described in the Simplified BSD License.
skipping to change at page 2, line 44 skipping to change at page 2, line 47
Table of Contents Table of Contents
1. Introduction...................................................3 1. Introduction...................................................3
1.1. Node Switching Asymmetry Constraints......................3 1.1. Node Switching Asymmetry Constraints......................3
1.2. Non-Local Label Assignment Constraints....................4 1.2. Non-Local Label Assignment Constraints....................4
2. Encoding.......................................................5 2. Encoding.......................................................5
2.1. Connectivity Matrix Field.................................5 2.1. Connectivity Matrix Field.................................5
2.2. Port Label Restriction Field..............................7 2.2. Port Label Restriction Field..............................7
2.2.1. SIMPLE_LABEL.........................................8 2.2.1. SIMPLE_LABEL.........................................8
2.2.2. CHANNEL_COUNT........................................8 2.2.2. CHANNEL_COUNT........................................9
2.2.3. LABEL_RANGE..........................................9 2.2.3. LABEL_RANGE..........................................9
2.2.4. SIMPLE_LABEL & CHANNEL_COUNT........................10 2.2.4. SIMPLE_LABEL & CHANNEL_COUNT........................10
2.2.5. Link Label Exclusivity..............................10
Internet-Draft General Network Element Constraint Encoding February
2015
2.2.5. Link Label Exclusivity..............................10
2.3. Link Set Field...........................................11 2.3. Link Set Field...........................................11
2.4. Available Labels Field...................................13 2.4. Available Labels Field...................................13
2.5. Shared Backup Labels Field...............................14 2.5. Shared Backup Labels Field...............................14
2.6. Label Set Field..........................................14 2.6. Label Set Field..........................................14
2.6.1. Inclusive/Exclusive Label Lists.....................15 2.6.1. Inclusive/Exclusive Label Lists.....................15
2.6.2. Inclusive/Exclusive Label Ranges....................16 2.6.2. Inclusive/Exclusive Label Ranges....................16
2.6.3. Bitmap Label Set....................................17 2.6.3. Bitmap Label Set....................................17
3. Security Considerations.......................................17 3. Security Considerations.......................................17
4. IANA Considerations...........................................18 4. IANA Considerations...........................................18
5. Acknowledgments...............................................18 5. Acknowledgments...............................................18
skipping to change at page 3, line 49 skipping to change at page 4, line 4
WSON and are potentially applicable to a wider range of WSON and are potentially applicable to a wider range of
technologies. Such encodings can be used to extend GMPLS signaling technologies. Such encodings can be used to extend GMPLS signaling
and routing protocols. In addition these encodings could be used by and routing protocols. In addition these encodings could be used by
other mechanisms to convey this same information to a path other mechanisms to convey this same information to a path
computation element (PCE). computation element (PCE).
1.1. Node Switching Asymmetry Constraints 1.1. Node Switching Asymmetry Constraints
For some network elements, the ability of a signal or packet on a For some network elements, the ability of a signal or packet on a
particular input port to reach a particular output port may be particular input port to reach a particular output port may be
Internet-Draft General Network Element Constraint Encoding February
2015
limited. In addition, in some network elements the connectivity limited. In addition, in some network elements the connectivity
between some input ports and output ports may be fixed, e.g., a between some input ports and output ports may be fixed, e.g., a
simple multiplexer. To take into account such constraints during simple multiplexer. To take into account such constraints during
path computation, we model this aspect of a network element via a path computation, we model this aspect of a network element via a
connectivity matrix. connectivity matrix.
The connectivity matrix (ConnectivityMatrix) represents either the The connectivity matrix (ConnectivityMatrix) represents either the
potential connectivity matrix for asymmetric switches or fixed potential connectivity matrix for asymmetric switches or fixed
connectivity for an asymmetric device such as a multiplexer. Note connectivity for an asymmetric device such as a multiplexer. Note
that this matrix does not represent any particular internal blocking that this matrix does not represent any particular internal blocking
skipping to change at page 4, line 47 skipping to change at page 5, line 4
case, it may be advantageous to share the label assignment case, it may be advantageous to share the label assignment
constraint information for use in path computation. constraint information for use in path computation.
Port label restrictions (PortLabelRestriction) model the label Port label restrictions (PortLabelRestriction) model the label
restrictions that the network element (node) and link may impose on restrictions that the network element (node) and link may impose on
a port. These restrictions tell us what labels may or may not be a port. These restrictions tell us what labels may or may not be
used on a link and are intended to be relatively static. More used on a link and are intended to be relatively static. More
dynamic information is contained in the information on available dynamic information is contained in the information on available
labels. Port label restrictions are specified relative to the port labels. Port label restrictions are specified relative to the port
in general or to a specific connectivity matrix for increased in general or to a specific connectivity matrix for increased
Internet-Draft General Network Element Constraint Encoding February
2015
modeling flexibility. Reference [Switch] gives an example where both modeling flexibility. Reference [Switch] gives an example where both
switch and fixed connectivity matrices are used and both types of switch and fixed connectivity matrices are used and both types of
constraints occur on the same port. constraints occur on the same port.
2. Encoding 2. Encoding
This section provides encodings for the information elements defined This section provides encodings for the information elements defined
in [RWA-Info] that have applicability to WSON. The encodings are in [RWA-Info] that have applicability to WSON. The encodings are
designed to be suitable for use in the GMPLS routing protocols OSPF designed to be suitable for use in the GMPLS routing protocols OSPF
[RFC4203] and IS-IS [RFC5307] and in the PCE protocol (PCEP) [RFC4203] and IS-IS [RFC5307] and in the PCE protocol (PCEP)
skipping to change at page 5, line 39 skipping to change at page 5, line 46
The Connectivity Matrix is uniquely identified only by the The Connectivity Matrix is uniquely identified only by the
advertising node. There may be more than one matrix associated with advertising node. There may be more than one matrix associated with
a node as the node can partition the switch matrix into several sub- a node as the node can partition the switch matrix into several sub-
matrices for various reasons such as incremental updates, etc. When matrices for various reasons such as incremental updates, etc. When
the matrix is partitioned into sub-matrices, it is envisioned that the matrix is partitioned into sub-matrices, it is envisioned that
they are mutually exclusive to one another in representing which they are mutually exclusive to one another in representing which
ports/labels are associated with each sub-matrix. This implies that ports/labels are associated with each sub-matrix. This implies that
two matrices will not have the same {src port, src label, dst port, two matrices will not have the same {src port, src label, dst port,
dst label}. dst label}.
Each sub-matrix is assigned a unique Matrix ID to represent a
mutually exclusive set of {src port, src label, dst port, dst label}
from other sub-matrices.
A TLV encoding of this list of link set pairs is: A TLV encoding of this list of link set pairs is:
Internet-Draft General Network Element Constraint Encoding February
2015
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Conn | MatrixID | Reserved | | Conn | MatrixID | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Set A #1 | | Link Set A #1 |
: : : : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Set B #1 : | Link Set B #1 :
: : : : : :
skipping to change at page 6, line 45 skipping to change at page 7, line 5
parameter "dir" for Link Set A and B pairs: parameter "dir" for Link Set A and B pairs:
o Link Set A dir=input, Link Set B dir=output o Link Set A dir=input, Link Set B dir=output
In this case, the meaning of the pair of link sets A and B in this In this case, the meaning of the pair of link sets A and B in this
case is that any signal that inputs a link in set A can be case is that any signal that inputs a link in set A can be
potentially switched out of an output link in set B. potentially switched out of an output link in set B.
o Link Set A dir=bidirectional, Link Set B dir=bidirectional o Link Set A dir=bidirectional, Link Set B dir=bidirectional
Internet-Draft General Network Element Constraint Encoding February
2015
The meaning of the pair of link sets A and B in this case is that The meaning of the pair of link sets A and B in this case is that
any signal that inputs on the links in set A can potentially any signal that inputs on the links in set A can potentially
output on a link in set B, and any input signal on the links in output on a link in set B, and any input signal on the links in
set B can potentially output on a link in set A. set B can potentially output on a link in set A. If link set A is
an input and link set B is an output for a signal, then it
implies that link set A is an output and link set B is an input
for that signal.
See Appendix A for both types of encodings as applied to a ROADM See Appendix A for both types of encodings as applied to a ROADM
example. example.
2.2. Port Label Restriction Field 2.2. Port Label Restriction Field
Port Label Restriction Field tells us what labels may or may not be Port Label Restriction Field tells us what labels may or may not be
used on a link. used on a link.
The port label restriction can be encoded as follows: More than one The port label restriction can be encoded as follows: More than one
skipping to change at page 7, line 41 skipping to change at page 8, line 5
MatrixID: either is the value in the corresponding Connectivity MatrixID: either is the value in the corresponding Connectivity
Matrix field or takes the value 0xFF to indicate the restriction Matrix field or takes the value 0xFF to indicate the restriction
applies to the port regardless of any Connectivity Matrix. applies to the port regardless of any Connectivity Matrix.
RestrictionType can take the following values and meanings: RestrictionType can take the following values and meanings:
0: SIMPLE_LABEL (Simple label selective restriction; See 0: SIMPLE_LABEL (Simple label selective restriction; See
Section 2.2.1 for details) Section 2.2.1 for details)
Internet-Draft General Network Element Constraint Encoding February
2015
1: CHANNEL_COUNT (Channel count restriction; See Section 2.2.2 1: CHANNEL_COUNT (Channel count restriction; See Section 2.2.2
for details) for details)
2: LABEL_RANGE (Label range device with a movable center label 2: LABEL_RANGE (Label range device with a movable center label
and width; See Section 2.2.3 for details) and width; See Section 2.2.3 for details)
3: SIMPLE_LABEL & CHANNEL_COUNT (Combination of SIMPLE_LABEL 3: SIMPLE_LABEL & CHANNEL_COUNT (Combination of SIMPLE_LABEL
and CHANNEL_COUNT restriction. The accompanying label set and and CHANNEL_COUNT restriction. The accompanying label set and
channel count indicate labels permitted on the port and the channel count indicate labels permitted on the port and the
maximum number of channels that can be simultaneously used on maximum number of channels that can be simultaneously used on
skipping to change at page 8, line 38 skipping to change at page 9, line 5
| MatrixID | RstType = 0 | Switching Cap | Encoding | | MatrixID | RstType = 0 | Switching Cap | Encoding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Label Set Field | | Label Set Field |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
In this case the accompanying label set indicates the labels In this case the accompanying label set indicates the labels
permitted on the port/matrix. permitted on the port/matrix.
See Section 2.6 for the definition of label set. See Section 2.6 for the definition of label set.
Internet-Draft General Network Element Constraint Encoding February
2015
2.2.2. CHANNEL_COUNT 2.2.2. CHANNEL_COUNT
In the case of the CHANNEL_COUNT, the format is given by: In the case of the CHANNEL_COUNT, the format is given by:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MatrixID | RstType = 1 | Switching Cap | Encoding | | MatrixID | RstType = 1 | Switching Cap | Encoding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MaxNumChannels | | MaxNumChannels |
skipping to change at page 9, line 42 skipping to change at page 10, line 5
This is a generalization of the waveband device. The MaxLabelRange This is a generalization of the waveband device. The MaxLabelRange
indicates the maximum width of the waveband in terms of the channels indicates the maximum width of the waveband in terms of the channels
spacing given in the Label Set Field. The corresponding label set is spacing given in the Label Set Field. The corresponding label set is
used to indicate the overall tuning range. used to indicate the overall tuning range.
MaxLabelRange is a 32-bit integer. MaxLabelRange is a 32-bit integer.
See Section 2.6.2 for the explanation of label range. See Section 2.6.2 for the explanation of label range.
Internet-Draft General Network Element Constraint Encoding February
2015
2.2.4. SIMPLE_LABEL & CHANNEL_COUNT 2.2.4. SIMPLE_LABEL & CHANNEL_COUNT
In the case of the SIMPLE_LABEL & CHANNEL_COUNT the format is given In the case of the SIMPLE_LABEL & CHANNEL_COUNT the format is given
by: by:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MatrixID | RstType = 3 | Switching Cap | Encoding | | MatrixID | RstType = 3 | Switching Cap | Encoding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 10, line 37 skipping to change at page 11, line 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MatrixID | RstType = 4 | Switching Cap | Encoding | | MatrixID | RstType = 4 | Switching Cap | Encoding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Set Field | | Link Set Field |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
In this case the accompanying link set indicates that a label may be In this case the accompanying link set indicates that a label may be
used at most once among the ports in the link set field. See Section used at most once among the ports in the link set field. See Section
2.3 for the definition of link set. 2.3 for the definition of link set.
Internet-Draft General Network Element Constraint Encoding February
2015
2.3. Link Set Field 2.3. Link Set Field
We will frequently need to describe properties of groups of links. We will frequently need to describe properties of groups of links.
To do so efficiently we can make use of a link set concept similar To do so efficiently we can make use of a link set concept similar
to the label set concept of [RFC3471]. This Link Set Field is used to the label set concept of [RFC3471]. This Link Set Field is used
in the <ConnectivityMatrix>, which is defined in Section 2.1. The in the <ConnectivityMatrix>, which is defined in Section 2.1. The
information carried in a Link Set is defined by: information carried in a Link Set is defined by:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
skipping to change at page 11, line 42 skipping to change at page 12, line 5
there is no bound on the corresponding portion of the range. Note there is no bound on the corresponding portion of the range. Note
that the Action field can be set to 0x01 (Inclusive Range) only when that the Action field can be set to 0x01 (Inclusive Range) only when
identifier for unnumbered link is used. identifier for unnumbered link is used.
Dir: Directionality of the Link Set (2 bits) Dir: Directionality of the Link Set (2 bits)
0 -- bidirectional 0 -- bidirectional
1 -- input 1 -- input
Internet-Draft General Network Element Constraint Encoding February
2015
2 -- output 2 -- output
For example, in optical networks we think in terms of unidirectional For example, in optical networks we think in terms of unidirectional
as well as bidirectional links. For example, label restrictions or as well as bidirectional links. For example, label restrictions or
connectivity may be different for an input port, than for its connectivity may be different for an input port, than for its
"companion" output port if one exists. Note that "interfaces" such "companion" output port if one exists. Note that "interfaces" such
as those discussed in the Interfaces MIB [RFC2863] are assumed to be as those discussed in the Interfaces MIB [RFC2863] are assumed to be
bidirectional. This also applies to the links advertised in various bidirectional. This also applies to the links advertised in various
link state routing protocols. link state routing protocols.
skipping to change at page 12, line 40 skipping to change at page 13, line 5
Link Identifier: length is dependent on the link format Link Identifier: length is dependent on the link format
The link identifier represents the port which is being described The link identifier represents the port which is being described
either for connectivity or label restrictions. This can be the link either for connectivity or label restrictions. This can be the link
local identifier of [RFC4202], GMPLS routing, [RFC4203] GMPLS OSPF local identifier of [RFC4202], GMPLS routing, [RFC4203] GMPLS OSPF
routing, and [RFC5307] IS-IS GMPLS routing. The use of the link routing, and [RFC5307] IS-IS GMPLS routing. The use of the link
local identifier format can result in more compact encodings when local identifier format can result in more compact encodings when
the assignments are done in a reasonable fashion. the assignments are done in a reasonable fashion.
Internet-Draft General Network Element Constraint Encoding February
2015
2.4. Available Labels Field 2.4. Available Labels Field
The Available Labels Field consists of priority flags, and a single The Available Labels Field consists of priority flags, and a single
variable length label set field as follows: variable length label set field as follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PRI | Reserved | | PRI | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 13, line 41 skipping to change at page 14, line 5
by an LSP of priority M it may be used by an LSP of priority N < M by an LSP of priority M it may be used by an LSP of priority N < M
if LSP preemption is supported. if LSP preemption is supported.
When a label was initially advertised as available for priorities, When a label was initially advertised as available for priorities,
0, 1, ... M and once a label is used for an LSP at a priority, say N 0, 1, ... M and once a label is used for an LSP at a priority, say N
(N<=M), then this label is advertised as available for 0, ... N-1. (N<=M), then this label is advertised as available for 0, ... N-1.
Note that Label Set Field is defined in Section 2.6. See Appendix Note that Label Set Field is defined in Section 2.6. See Appendix
A.5. for illustrative examples. A.5. for illustrative examples.
Internet-Draft General Network Element Constraint Encoding February
2015
2.5. Shared Backup Labels Field 2.5. Shared Backup Labels Field
The Shared Backup Labels Field consists of priority flags, and The Shared Backup Labels Field consists of priority flags, and
single variable length label set field as follows: single variable length label set field as follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PRI | Reserved | | PRI | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 15, line 5 skipping to change at page 15, line 5
<SharedBackupLabels>, which is defined in Sections 2.4. and 2.5., <SharedBackupLabels>, which is defined in Sections 2.4. and 2.5.,
respectively. It is also used within the <SIMPLE_LABEL>, respectively. It is also used within the <SIMPLE_LABEL>,
<LABEL_RANGE>, <SIMPLE_LABEL> or <CHANNEL_COUNT>, which is defined <LABEL_RANGE>, <SIMPLE_LABEL> or <CHANNEL_COUNT>, which is defined
in Sections 2.1.1. - 2.1.4., respectively. in Sections 2.1.1. - 2.1.4., respectively.
The general format for a label set is given below. This format uses The general format for a label set is given below. This format uses
the Action concept from [RFC3471] with an additional Action to the Action concept from [RFC3471] with an additional Action to
define a "bit map" type of label set. Labels are variable in length. define a "bit map" type of label set. Labels are variable in length.
Action specific fields are defined below. Action specific fields are defined below.
Internet-Draft General Network Element Constraint Encoding February
2015
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action| Num Labels = N | Length | | Action| Num Labels = N | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Base Label | | Base Label |
| . . . | | . . . |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| (Action specific fields) | | (Action specific fields) |
skipping to change at page 16, line 5 skipping to change at page 16, line 5
meaning depending on the action value. See Sections 2.6.1 - 2.6.3 meaning depending on the action value. See Sections 2.6.1 - 2.6.3
for details. Num Labels is a 12 bit integer. for details. Num Labels is a 12 bit integer.
Length is the length in bytes of the entire label set field. Length is the length in bytes of the entire label set field.
2.6.1. Inclusive/Exclusive Label Lists 2.6.1. Inclusive/Exclusive Label Lists
In the case of the inclusive/exclusive lists the wavelength set In the case of the inclusive/exclusive lists the wavelength set
format is given by: format is given by:
Internet-Draft General Network Element Constraint Encoding February
2015
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 or 1 | Num Labels = 2 | Length | |0 or 1 | Num Labels = 2 | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Label #1 | | Label #1 |
| . . . | | . . . |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 17, line 5 skipping to change at page 17, line 5
| . . . | | . . . |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| End Label | | End Label |
| . . . | | . . . |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Note that that Start Label is the first Label in the range to be Note that that Start Label is the first Label in the range to be
included/excluded and End Label is the last label in the same range. included/excluded and End Label is the last label in the same range.
Num Labels MUST be two. Num Labels MUST be two.
Internet-Draft General Network Element Constraint Encoding February
2015
2.6.3. Bitmap Label Set 2.6.3. Bitmap Label Set
In the case of Action = 4, the bitmap the label set format is given In the case of Action = 4, the bitmap the label set format is given
by: by:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 4 | Num Labels | Length | | 4 | Num Labels | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 17, line 45 skipping to change at page 18, line 4
positions (Num Labels) and beyond) SHOULD be set to zero and MUST be positions (Num Labels) and beyond) SHOULD be set to zero and MUST be
ignored. ignored.
3. Security Considerations 3. Security Considerations
This document defines protocol-independent encodings for WSON This document defines protocol-independent encodings for WSON
information and does not introduce any security issues. information and does not introduce any security issues.
However, other documents that make use of these encodings within However, other documents that make use of these encodings within
protocol extensions need to consider the issues and risks associated protocol extensions need to consider the issues and risks associated
Internet-Draft General Network Element Constraint Encoding February
2015
with inspection, interception, modification, or spoofing of any of with inspection, interception, modification, or spoofing of any of
this information. It is expected that any such documents will this information. It is expected that any such documents will
describe the necessary security measures to provide adequate describe the necessary security measures to provide adequate
protection. A general discussion on security in GMPLS networks can protection. A general discussion on security in GMPLS networks can
be found in [RFC5920]. be found in [RFC5920].
4. IANA Considerations 4. IANA Considerations
This document provides general protocol independent information This document provides general protocol independent information
encodings. There is no IANA allocation request for the information encodings. There is no IANA allocation request for the information
elements defined in this document. IANA allocation requests will be elements defined in this document. IANA allocation requests will be
addressed in protocol specific documents based on the encodings addressed in protocol specific documents based on the encodings
defined here. defined here.
5. Acknowledgments 5. Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot. This document was prepared using 2-Word-v2.0.template.dot.
Internet-Draft General Network Element Constraint Encoding February
2015
APPENDIX A: Encoding Examples APPENDIX A: Encoding Examples
Here we give examples of the general encoding extensions applied to Here we give examples of the general encoding extensions applied to
some simple ROADM network elements and links. some simple ROADM network elements and links.
A.1. Link Set Field A.1. Link Set Field
Suppose that we wish to describe a set of input ports that are have Suppose that we wish to describe a set of input ports that are have
link local identifiers number 3 through 42. In the link set field we link local identifiers number 3 through 42. In the link set field we
set the Action = 1 to denote an inclusive range; the Dir = 1 to set the Action = 1 to denote an inclusive range; the Dir = 1 to
skipping to change at page 20, line 5 skipping to change at page 20, line 5
193.1 0 11 193.1 0 11
193.9 8 19 193.9 8 19
194.0 9 20 194.0 9 20
195.2 21 32 195.2 21 32
195.8 27 38 195.8 27 38
Using the label format defined in [RFC6205], with the Grid value set Using the label format defined in [RFC6205], with the Grid value set
to indicate an ITU-T A/2 [G.694.1] DWDM grid, C.S. set to indicate to indicate an ITU-T A/2 [G.694.1] DWDM grid, C.S. set to indicate
100GHz this lambda bit map set would then be encoded as follows: 100GHz this lambda bit map set would then be encoded as follows:
Internet-Draft General Network Element Constraint Encoding February
2015
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 4 | Num Labels = 40 | Length = 16 bytes | | 4 | Num Labels = 40 | Length = 16 bytes |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Grid | C.S. | Reserved | n for lowest frequency = -11 | |Grid | C.S. | Reserved | n for lowest frequency = -11 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0| |1 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1 0 0 0 0 0 1 0| Not used in 40 Channel system (all zeros) | |1 0 0 0 0 0 1 0| Not used in 40 Channel system (all zeros) |
skipping to change at page 20, line 45 skipping to change at page 21, line 4
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Grid | C.S. | Reserved | n for lowest frequency = 27 | |Grid | C.S. | Reserved | n for lowest frequency = 27 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
A.3. Connectivity Matrix A.3. Connectivity Matrix
Example: Example:
Suppose we have a typical 2-degree 40 channel ROADM. In addition to Suppose we have a typical 2-degree 40 channel ROADM. In addition to
its two line side ports it has 80 add and 80 drop ports. The picture its two line side ports it has 80 add and 80 drop ports. The picture
Internet-Draft General Network Element Constraint Encoding February
2015
below illustrates how a typical 2-degree ROADM system that works below illustrates how a typical 2-degree ROADM system that works
with bi-directional fiber pairs is a highly asymmetrical system with bi-directional fiber pairs is a highly asymmetrical system
composed of two unidirectional ROADM subsystems. composed of two unidirectional ROADM subsystems.
(Tributary) Ports #3-#42 (Tributary) Ports #3-#42
Input added to Output dropped from Input added to Output dropped from
West Line Output East Line Input West Line Output East Line Input
vvvvv ^^^^^ vvvvv ^^^^^
| |||.| | |||.| | |||.| | |||.|
+-----| |||.|--------| |||.|------+ +-----| |||.|--------| |||.|------+
skipping to change at page 22, line 5 skipping to change at page 22, line 5
Referring to the figure we see that the Input direction of ports #3- Referring to the figure we see that the Input direction of ports #3-
#42 (add ports) can only connect to the output on port #1. While the #42 (add ports) can only connect to the output on port #1. While the
Input side of port #2 (line side) can only connect to the output on Input side of port #2 (line side) can only connect to the output on
ports #3-#42 (drop) and to the output on port #1 (pass through). ports #3-#42 (drop) and to the output on port #1 (pass through).
Similarly, the input direction of ports #43-#82 can only connect to Similarly, the input direction of ports #43-#82 can only connect to
the output on port #2 (line). While the input direction of port #1 the output on port #2 (line). While the input direction of port #1
can only connect to the output on ports #43-#82 (drop) or port #2 can only connect to the output on ports #43-#82 (drop) or port #2
(pass through). We can now represent this potential connectivity (pass through). We can now represent this potential connectivity
matrix as follows. This representation uses only 29 32-bit words. matrix as follows. This representation uses only 29 32-bit words.
Internet-Draft General Network Element Constraint Encoding February
2015
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Conn = 1 | MatrixID | Reserved | | Conn = 1 | MatrixID | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Note: adds to line Note: adds to line
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=1 |0 1|0 0 0 0 0 0| Length = 12 | | Action=1 |0 1|0 0 0 0 0 0| Length = 12 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #3 | | Link Local Identifier = #3 |
skipping to change at page 22, line 49 skipping to change at page 23, line 4
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=0 |1 0|0 0 0 0 0 0| Length = 8 | | Action=0 |1 0|0 0 0 0 0 0| Length = 8 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #1 | | Link Local Identifier = #1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Note: adds to line Note: adds to line
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=1 |0 1|0 0 0 0 0 0| Length = 12 | | Action=1 |0 1|0 0 0 0 0 0| Length = 12 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #43 | | Link Local Identifier = #43 |
Internet-Draft General Network Element Constraint Encoding February
2015
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #82 | | Link Local Identifier = #82 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=0 |1 0|0 0 0 0 0 0| Length = 8 | | Action=0 |1 0|0 0 0 0 0 0| Length = 8 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #2 | | Link Local Identifier = #2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Note: line to drops Note: line to drops
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=0 |0 1|0 0 0 0 0 0|| Length = 8 | | Action=0 |0 1|0 0 0 0 0 0|| Length = 8 |
skipping to change at page 24, line 5 skipping to change at page 24, line 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
A.4. Connectivity Matrix with Bi-directional Symmetry A.4. Connectivity Matrix with Bi-directional Symmetry
If one has the ability to renumber the ports of the previous example If one has the ability to renumber the ports of the previous example
as shown in the next figure then we can take advantage of the bi- as shown in the next figure then we can take advantage of the bi-
directional symmetry and use bi-directional encoding of the directional symmetry and use bi-directional encoding of the
connectivity matrix. Note that we set dir=bidirectional in the link connectivity matrix. Note that we set dir=bidirectional in the link
set fields. set fields.
Internet-Draft General Network Element Constraint Encoding February
2015
(Tributary) (Tributary)
Ports #3-42 Ports #43-82 Ports #3-42 Ports #43-82
West Line Output East Line Input West Line Output East Line Input
vvvvv ^^^^^ vvvvv ^^^^^
| |||.| | |||.| | |||.| | |||.|
+-----| |||.|--------| |||.|------+ +-----| |||.|--------| |||.|------+
| +----------------------+ | | +----------------------+ |
| | | | | | | |
Output | | Unidirectional ROADM | | Input Output | | Unidirectional ROADM | | Input
-----------------+ | | +-------------- -----------------+ | | +--------------
skipping to change at page 25, line 5 skipping to change at page 25, line 5
Input | | | | Output Input | | | | Output
| | _ | | | | _ | |
| +----------------------+ | | +----------------------+ |
+-----| |||.|--------| |||.|------+ +-----| |||.|--------| |||.|------+
| |||.| | |||.| | |||.| | |||.|
vvvvv ^^^^^ vvvvv ^^^^^
Ports #3-#42 Ports #43-82 Ports #3-#42 Ports #43-82
Output dropped from Input added to Output dropped from Input added to
West Line Input East Line Output West Line Input East Line Output
Internet-Draft General Network Element Constraint Encoding February
2015
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Conn = 1 | MatrixID | Reserved | | Conn = 1 | MatrixID | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Add/Drops #3-42 to Line side #1 Add/Drops #3-42 to Line side #1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=1 |0 0|0 0 0 0 0 0| Length = 12 | | Action=1 |0 0|0 0 0 0 0 0| Length = 12 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #3 | | Link Local Identifier = #3 |
skipping to change at page 25, line 49 skipping to change at page 26, line 4
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Action=0 |0 0|0 0 0 0 0 0| Length = 8 | | Action=0 |0 0|0 0 0 0 0 0| Length = 8 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Link Local Identifier = #2 | | Link Local Identifier = #2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
A.5. Priority Flags in Available/Shared Backup Labels A.5. Priority Flags in Available/Shared Backup Labels
If one wants to make a set of labels (indicated by Label Set Field If one wants to make a set of labels (indicated by Label Set Field
#1) available only for the highest priority level (Priority Level 0) #1) available only for the highest priority level (Priority Level 0)
Internet-Draft General Network Element Constraint Encoding February
2015
while allowing a set of labels (indicated by Label Set Field #2) while allowing a set of labels (indicated by Label Set Field #2)
available to all priority levels, the following encoding will available to all priority levels, the following encoding will
express such need. express such need.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1 0 0 0 0 0 0 0| Reserved | |1 0 0 0 0 0 0 0| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Label Set Field #1 | | Label Set Field #1 |
: : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1 1 1 1 1 1 1 1| Reserved | |1 1 1 1 1 1 1 1| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Label Set Field #2 | | Label Set Field #2 |
: : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Internet-Draft General Network Element Constraint Encoding February
2015
6. References 6. References
6.1. Normative References 6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces Group [RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces Group
MIB", RFC 2863, June 2000. MIB", RFC 2863, June 2000.
skipping to change at page 28, line 5 skipping to change at page 28, line 5
(GMPLS)", RFC 4203, October 2005. (GMPLS)", RFC 4203, October 2005.
[RFC5307] Kompella, K., Ed., and Y. Rekhter, Ed., "IS-IS Extensions [RFC5307] Kompella, K., Ed., and Y. Rekhter, Ed., "IS-IS Extensions
in Support of Generalized Multi-Protocol Label Switching in Support of Generalized Multi-Protocol Label Switching
(GMPLS)", RFC 5307, October 2008. (GMPLS)", RFC 5307, October 2008.
[RFC6205] T. Otani, Ed. and D. Li, Ed., "Generalized Labels for [RFC6205] T. Otani, Ed. and D. Li, Ed., "Generalized Labels for
Lambda-Switch-Capable (LSC) Label Switching Routers", RFC Lambda-Switch-Capable (LSC) Label Switching Routers", RFC
6205, March 2011. 6205, March 2011.
Internet-Draft General Network Element Constraint Encoding February
2015
6.2. Informative References 6.2. Informative References
[RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation [RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation
Element (PCE) communication Protocol (PCEP) - Version 1", Element (PCE) communication Protocol (PCEP) - Version 1",
RFC5440. RFC5440.
[RFC5920] L. Fang, Ed., "Security Framework for MPLS and GMPLS [RFC5920] L. Fang, Ed., "Security Framework for MPLS and GMPLS
Networks", RFC 5920, July 2010. Networks", RFC 5920, July 2010.
[RFC6163] Y. Lee, G. Bernstein, W. Imajuku, "Framework for GMPLS and [RFC6163] Y. Lee, G. Bernstein, W. Imajuku, "Framework for GMPLS and
skipping to change at page 29, line 5 skipping to change at page 29, line 5
WDM Wavelength Switching Systems for Use in GMPLS and WDM Wavelength Switching Systems for Use in GMPLS and
Automated Path Computation", Journal of Optical Automated Path Computation", Journal of Optical
Communications and Networking, vol. 1, June, 2009, pp. Communications and Networking, vol. 1, June, 2009, pp.
187-195. 187-195.
[RWA-Info] G. Bernstein, Y. Lee, D. Li, W. Imajuku, "Routing and [RWA-Info] G. Bernstein, Y. Lee, D. Li, W. Imajuku, "Routing and
Wavelength Assignment Information Model for Wavelength Wavelength Assignment Information Model for Wavelength
Switched Optical Networks", work in progress: draft-ietf- Switched Optical Networks", work in progress: draft-ietf-
ccamp-rwa-info. ccamp-rwa-info.
Internet-Draft General Network Element Constraint Encoding February
2015
7. Contributors 7. Contributors
Diego Caviglia Diego Caviglia
Ericsson Ericsson
Via A. Negrone 1/A 16153 Via A. Negrone 1/A 16153
Genoa Italy Genoa Italy
Phone: +39 010 600 3736 Phone: +39 010 600 3736
Email: diego.caviglia@ericsson.com Email: diego.caviglia@ericsson.com
skipping to change at page 29, line 48 skipping to change at page 30, line 4
Infinera Infinera
Email: rrao@infinera.com Email: rrao@infinera.com
Giovanni Martinelli Giovanni Martinelli
CISCO CISCO
Email: giomarti@cisco.com Email: giomarti@cisco.com
Remi Theillaud Remi Theillaud
Internet-Draft General Network Element Constraint Encoding February
2015
Marben Marben
remi.theillaud@marben-products.com remi.theillaud@marben-products.com
Authors' Addresses Authors' Addresses
Greg M. Bernstein (ed.) Greg M. Bernstein (ed.)
Grotto Networking Grotto Networking
Fremont California, USA Fremont California, USA
Phone: (510) 573-2237 Phone: (510) 573-2237
skipping to change at page 31, line 4 skipping to change at page 31, line 4
Phone: +86-755-28973237 Phone: +86-755-28973237
Email: danli@huawei.com Email: danli@huawei.com
Wataru Imajuku Wataru Imajuku
NTT Network Innovation Labs NTT Network Innovation Labs
1-1 Hikari-no-oka, Yokosuka, Kanagawa 1-1 Hikari-no-oka, Yokosuka, Kanagawa
Japan Japan
Phone: +81-(46) 859-4315 Phone: +81-(46) 859-4315
Email: imajuku.wataru@lab.ntt.co.jp Email: imajuku.wataru@lab.ntt.co.jp
Internet-Draft General Network Element Constraint Encoding February
2015
Jianrui Han Jianrui Han
Huawei Technologies Co., Ltd. Huawei Technologies Co., Ltd.
F3-5-B R&D Center, Huawei Base, F3-5-B R&D Center, Huawei Base,
Bantian, Longgang District Bantian, Longgang District
Shenzhen 518129 P.R.China Shenzhen 518129 P.R.China
Phone: +86-755-28972916 Phone: +86-755-28972916
Email: hanjianrui@huawei.com Email: hanjianrui@huawei.com
 End of changes. 38 change blocks. 
7 lines changed or deleted 112 lines changed or added

This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/