NetworkCCAMP Working Group Eric Mannie(Ebone)- Editor Internet Draft Expiration date:Sept. 2002 Peter Ashwood-Smith (Nortel) Daniel Awduche (Movaz) Ayan Banerjee (Calient) Debashis Basak (Accelight) Lou Berger (Movaz) Greg Bernstein (Ciena) Sudheer Dharanikota (Nayna) John Drake (Calient) Yanhe Fan (Axiowave) Don Fedyk (Nortel) Gert Grammel (Alcatel) Dan Guo (Turin) Kireeti Kompella (Juniper) Alan Kullberg (NetPlane) Jonathan P. Lang (Calient) Fong Liaw (Zaffire) Thomas D. Nadeau (Cisco) Lyndon Ong (Ciena) Dimitri Papadimitriou (Alcatel) Dimitrios Pendarakis (Tellium) Bala Rajagopalan (Tellium) Yakov Rekhter (Juniper) Debanjan Saha (Tellium) Hal Sandick (Nortel) Vishal Sharma (Metanoia) George Swallow (Cisco) Z. Bo Tang (Tellium) Jennifer Yates (AT&T) George R. Young (Edgeflow) John Yu (Zaffire) Alex Zinin (Nexsi Systems) MarchFeb. 2003 August 2002 Generalized Multi-Protocol Label Switching (GMPLS) Architecturedraft-ietf-ccamp-gmpls-architecture-02.txtdraft-ietf-ccamp-gmpls-architecture-03.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026 [1]. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts.E. Mannie et. al. 1 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet- Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract Future data and transmission networks will consist of elements such as routers, switches, DWDM systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc that will use Generalized MPLS (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques. This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g. SDH/SONET, PDH, G.709), wavelength (lambdas), and spatial switching (e.g. incoming port or fiber to outgoing port or fiber). The main focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. E. Mannie et. al. 1 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 Table of Contents Status of this Memo................................................1 Abstract...........................................................1 Table of Contents..................................................2 1.Abstract........................................................4Contributors....................................................4 2. Conventions used in thisdocument...............................4document...............................7 3.Introduction....................................................4Introduction....................................................7 3.1. Acronyms &abbreviations......................................5abbreviations......................................7 3.2. Multiple Types of Switching and ForwardingHierarchies........5Hierarchies........8 3.3. Extension of the MPLS ControlPlane...........................7Plane..........................10 3.4. GMPLS Key Extensions toMPLS-TE..............................10MPLS-TE..............................12 4. Routing and addressingmodel...................................11model...................................13 4.1. Addressing of PSC and non-PSClayers.........................12layers.........................14 4.2. GMPLS scalabilityenhancements...............................12enhancements...............................15 4.3. TE Extensions to IP routingprotocols........................13protocols........................15 5. Unnumberedlinks...............................................14links...............................................16 5.1. Unnumbered ForwardingAdjacencies............................15Adjacencies............................17 6. Linkbundling..................................................15bundling..................................................18 6.1. Restrictions onbundling.....................................16bundling.....................................18 6.2. Routing considerations forbundling..........................16bundling..........................18 6.3. Signalingconsiderations.....................................17considerations.....................................19 6.3.1. Mechanism 1: ImplicitIndication...........................17Indication...........................20 6.3.2. Mechanism 2: Explicit Indication by Numbered InterfaceID..17ID..20 6.3.3. Mechanism 3: Explicit Indication by Unnumbered InterfaceID17ID20 6.4. Unnumbered BundledLink......................................18Link......................................20 6.5. Forming bundledlinks........................................18links........................................21 7. Relationship with theUNI......................................19UNI......................................21 7.1. Relationship with the OIFUNI................................19UNI................................22 7.2. Reachability across theUNI..................................19UNI..................................22 8. LinkManagement................................................20Management................................................23 8.1. Control channel and control channelmanagement...............21management...............23 8.2. Link propertycorrelation....................................22correlation....................................25 8.3. Link connectivityverification...............................22verification...............................25 8.4. Faultmanagement.............................................23management.............................................25 8.5 LMP for DWDM Optical Line Systems(OLSs)......................23(OLSs)......................26 9. GeneralizedSignaling..........................................25Signaling..........................................27 9.1. Overview: How to Request anLSP..............................26LSP..............................29 9.2. Generalized LabelRequest....................................27Request....................................30 9.3. SONET/SDH TrafficParameters.................................28Parameters.................................31 9.4. G.709 TrafficParameters.....................................29Parameters.....................................32 9.5. BandwidthEncoding...........................................30Encoding...........................................32 9.6. GeneralizedLabel............................................30Label............................................33 9.7. WavebandSwitching...........................................31 E. Mannie et. al. Internet-Draft September 2002 2 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002Switching...........................................33 9.8. Label Suggestion by theUpstream.............................31Upstream.............................34 9.9. Label Restriction by theUpstream............................32Upstream............................34 9.10. Bi-directionalLSP..........................................32LSP..........................................35 9.11. Bi-directional LSP ContentionResolution....................33Resolution....................36 9.12. Rapid Notification ofFailure...............................33Failure...............................36 9.13. LinkProtection.............................................34Protection.............................................37 9.14. Explicit Routing and Explicit LabelControl.................35Control.................37 9.15. Routerecording.............................................36recording.............................................38 9.16. LSP modification and LSPre-routing.........................36re-routing.........................39 9.17. LSP administrative statushandling..........................37handling..........................39 E. Mannie et. al. Internet-Draft February 2003 2 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 9.18. Control channelseparation..................................37separation..................................40 10. Forwarding Adjacencies(FA)...................................38(FA)...................................41 10.1. Routing and ForwardingAdjacencies..........................39Adjacencies..........................41 10.2. Signalingaspects...........................................40aspects...........................................42 10.3. Cascading of ForwardingAdjacencies.........................40Adjacencies.........................42 11. Routing and SignalingAdjacencies.............................41Adjacencies.............................43 12. Control Plane FaultHandling..................................42Handling..................................44 13. LSP Protection andRestoration................................43Restoration................................45 13.1. Protection escalation across domains andlayers.............43layers.............46 13.2. Mapping of Services to P&RResources........................44Resources........................46 13.3. Classification of P&R mechanismcharacteristics.............45characteristics.............47 13.4. Different Stages inP&R.....................................45P&R.....................................47 13.5. RecoveryStrategies.........................................46Strategies.........................................48 13.6. Recovery mechanisms: Protectionschemes.....................46schemes.....................48 13.7. Recovery mechanisms: Restorationschemes....................47schemes....................49 13.8. Schema selectioncriteria...................................48criteria...................................50 14. NetworkManagement............................................49Management............................................51 14.1. Network Management Systems(NMS)............................49(NMS)............................51 14.2. Management Information Base(MIB)...........................50(MIB)...........................52 14.3.Tools.......................................................50Tools.......................................................52 14.4. Fault Correlation Between MultipleLayers...................50Layers...................52 15. Securityconsiderations.......................................51considerations.......................................53 16.Acknowledgements..............................................52Acknowledgements..............................................54 17.References....................................................53References....................................................55 18. Author'sAddresses............................................55Address..............................................57 Full Copyright Statement..........................................58 E. Mannie et. al. Internet-DraftSeptember 2002February 2003 3draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002 1.Abstract Future data and transmission networks will consist of elements such as routers, switches, DWDM systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc that will use Generalized MPLS (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques. This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g. SDH/SONET, PDH, G.709), wavelength (lambdas), and spatial switching (e.g. incoming port or fiber to outgoing port or fiber). The main focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. 2. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [2]. 3. Introduction The architecture presented in this document covers the main building blocks needed to build a consistent control plane for multiple switching layers. It does not restrict the way that these layers work together. Different models can be applied: e.g. overlay, augmented or integrated. Moreover, each pair of contiguous layer may work jointly in a different way, resulting in a number of possible combinations, at the discretion of manufacturers and operators. This architecture clearly separates the control plane and the forwarding plane. In addition, it also clearly separates the control plane in two parts, the signaling plane containing the signaling protocols and the routing plane containing the routing protocols. This document is a generalization of the MPLS architecture [RFC3031], and in some cases may differ slightly from that architecture since non packet-based forwarding planes are now considered. It is not the intention of this document to describe concepts already described in the current MPLS architecture. The goal is to describe specific concepts of Generalized MPLS (GMPLS). However, some of the concepts explained hereafter are not part of the current MPLS architecture and are applicable to both MPLS and GMPLS (i.e. link bundling, unnumbered links, and LSP hierarchy). Since these concepts were introduced together with GMPLS and since they are of paramount importance for an operational GMPLS network, they will be discussed here. E. Mannie et. al. Internet-Draft September 2002 4 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 The organization of the remainder of this draft is as follows. We begin with an introduction of GMPLS. We then present the specific GMPLS building blocks and explain how they can be combined together to build an operational GMPLS networks. Specific details of the separate building blocks can be found in the corresponding documents. 3.1. Acronyms & abbreviations ABR Area Border Router AS Autonomous System ASBR Autonomous System Boundary Router BGP Border Gateway Protocol CR-LDP Constraint-based Routing LDP CSPF Constraint-based Shortest Path First DWDM Dense Wavelength Division Multiplexing FA Forwarding Adjacency GMPLS Generalized Multi-Protocol Label Switching IGP Interior Gateway Protocol LDP Label Distribution Protocol LMP Link Management Protocol LSA Link State Advertisement LSR Label Switching Router LSP Label Switched Path MIB Management Information Base MPLS Multi-Protocol Label Switching NMS Network Management System OXC Optical Cross-Connect PXC Photonic Cross-Connect RSVP ReSource reserVation Protocol SDH Synchronous Digital Hierarchy STM(-N) Synchronous Transport Module (-N) STS(-N) Synchronous Transport Signal-Level N (SONET) TE Traffic Engineering 3.2. Multiple Types of Switching and Forwarding Hierarchies Generalized MPLS (GMPLS) differs from traditional MPLS in that it supports multiple types of switching, i.e. the addition of support for TDM, lambda, and fiber (port) switching. The support for the additional types of switching has driven GMPLS to extend certain base functions of traditional MPLS and, in some cases, to add functionality. These changes and additions impact basic LSP properties, how labels are requested and communicated, the unidirectional nature of LSPs, how errors are propagated, and information provided for synchronizing the ingress and egress LSRs. The MPLS architecture [RFC3031] was defined to support the forwarding of data based on a label. In this architecture, Label Switching Routers (LSRs) were assumed to have a forwarding plane that is capable of (a) recognizing either packet or cell boundaries, and (b) being able to process either packet headers (for LSRs capable of recognizing packet boundaries) or cell headers (for LSRs capable of recognizing cell boundaries). E. Mannie et. al. Internet-Draft September 2002 5 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 The original MPLS architecture is here being extended to include LSRs whose forwarding plane recognizes neither packet, nor cell boundaries, and therefore, can't forward data based on the information carried in either packet or cell headers. Specifically, such LSRs include devices where the forwarding decision is based on time slots, wavelengths, or physical ports. So, the new set of LSRs, or more precisely interfaces on these LSRs, can be subdivided into the following classes: 1. Packet Switch Capable (PSC) interfaces: Interfaces that recognize packet boundaries and can forward data based on the content of the packet header. Examples include interfaces on routers that forward data based on the content of the IP header and interfaces on routers that forward data based on the content of the MPLS "shim" header. 2. Layer-2 Switch Capable (L2SC) interfaces: Interfaces that recognize frame/cell boundaries and can forward data based on the content of the frame/cell header. Examples include interfaces on Ethernet bridges that forward data based on the content of the MAC header and interfaces on ATM-LSRs that forward data based on the ATM VPI/VCI. 3. Time-Division Multiplex Capable (TDM) interfaces: Interfaces that forward data based on the data's time slot in a repeating cycle. An example of such an interface is that of a SDH/SONET Cross-Connect (XC), Terminal Multiplexer (TM), or Add-Drop Multiplexer (ADM). Other examples include interfaces providing G.709 TDM capabilities (the "digital wrapper") and PDH interfaces. 4. Lambda Switch Capable (LSC) interfaces: Interfaces that forward data based on the wavelength on which the data is received. An example of such an interface is that of a Photonic Cross-Connect (PXC) or Optical Cross-Connect (OXC) that can operate at the level of an individual wavelength. Additional examples include PXC interfaces that can operate at the level of a group of wavelengths, i.e. a waveband and G.709 interfaces providing optical capabilities. 5. Fiber-Switch Capable (FSC) interfaces: Interfaces that forward data based on a position of the data in the real world physical spaces. An example of such an interface is that of a PXC or OXC that can operate at the level of a single or multiple fibers. A circuit can be established only between, or through, interfaces of the same type. Depending on the particular technology being used for each interface, different circuit names can be used, e.g. SDH E. Mannie et. al. Internet-Draft September 2002 6 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 circuit, optical trail, light-path, etc. In the context of GMPLS, all these circuits are referenced by a common name: Label Switched Path (LSP). The concept of nested LSP (LSP within LSP), already available in the traditional MPLS, facilitates building a forwarding hierarchy, i.e. a hierarchy of LSPs. This hierarchy of LSPs can occur on the same interface, or between different interfaces. For example, a hierarchy can be built if an interface is capable of multiplexing several LSPs from the same technology (layer), e.g. a lower order SDH/SONET LSP (VC-12) nested in a higher order SDH/SONET LSP (VC-4). Several levels of signal (LSP) nesting are defined in the SDH/SONET multiplexing hierarchy. The nesting can also occur between interfaces. At the top of the hierarchy are FSC interfaces, followed by LSC interfaces, followed by TDM interfaces, followed by L2SC, and followed by PSC interfaces. This way, an LSP that starts and ends on a PSC interface can be nested (together with other LSPs) into an LSP that starts and ends on a L2SC interface. This LSP, in turn, can be nested (together with other LSPs) into an LSP that starts and ends on an TDM interface, which in turn can be nested (together with other LSPs) into an LSP that starts and ends on a LSC interface, which in turn can be nested (together with other LSPs) into an LSP that starts and ends on a FSC interface. 3.3. Extension of the MPLS Control Plane The establishment of LSPs that span only Packet Switch Capable (PSC) or Layer-2 Switch Capable (L2SC) interfaces is defined for the original MPLS and/or MPLS-TE control planes. GMPLS extends these control planes to support each of the five classes of interfaces (i.e. layers) defined in the previous section. Note that the GMPLS control plane supports an overlay model, an augmented model, and a peer (integrated) model. In the near term, GMPLS is very suitable for controlling each layer independently. This elegant approach will facilitate the future deployment of other models. The GMPLS control plane is made of several building blocks are described in more detail in the following sections. These building blocks are based on well-known signaling and routing protocols that have been extended and/or modified to support GMPLS. They use IPv4 and/or IPv6 addresses. Only one new specialized protocol is required to support the operations of GMPLS, a signaling protocol for link management [LMP]. GMPLS is indeed based on the Traffic Engineering (TE) extensions to MPLS, a.k.a. MPLS-TE. This because most of the technologies that can be used below the PSC level require some traffic engineering. The placement of LSPs at these levels needs in general to take several constraints into consideration (such as framing, bandwidth, E. Mannie et. al. Internet-Draft September 2002 7 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 protection capability, etc) and to bypass the legacy Shortest-Path First (SPF) algorithm. Note, however, that this is not mandatory and that in some cases SPF routing can be applied. In order to facilitate constrained-based SPF routing of LSPs, the nodes performing LSP establishment need more information about the links in the network than standard intra-domain routing protocols provide. These TE attributes are distributed using the transport mechanisms already available in IGPs (e.g. flooding) and taken into consideration by the LSP routing algorithm. Optimization of the LSP routes may also require some external simulations using heuristics that serve as input for the actual path calculation and LSP establishment process. By definition, a TE link is a representation in the ISIS/OSPF Link State advertisements and in the link state database of certain physical resources, and their properties, between two GMPLS nodes. TE Links are used by the GMPLS control plane (routing and signaling) for establishing LSPs. Extensions to traditional routing protocols and algorithms are needed to uniformly encode and carry TE link information, and explicit routes (e.g. source routes) are required in the signaling. In addition, the signaling must now be capable of transporting the required circuit (LSP) parameters such as the bandwidth, the type of signal, the desired protection and/or restoration, the position in a particular multiplex, etc. Most of these extensions have already been defined for PSC and L2SC traffic engineering with MPLS. GMPLS primarily defines additional extensions for TDM, LSC, and FSC traffic engineering. A very few elements are technology specific. Thus, GMPLS extends the two signaling protocols defined for MPLS-TE signaling, i.e. RSVP-TE and CR-LDP. However, GMPLS does not specify which one of these two signaling protocols must be used. It is the role of manufacturers and operators to evaluate the two possible solutions for their own interest. Since GMPLS is based on RSVP-TE and CR-LDP, it mandates a downstream-on-demand label allocation and distribution, with an ingress initiated ordered control. Liberal label retention is normally used, but conservative label retention mode could also be used. Furthermore, there is no restriction on the label allocation strategy, it can be request/signaling driven (obvious for circuit switching technologies), traffic/data driven, or even topology driven. There is also no restriction on the route selection; explicit routing is normally used (strict or loose) but hop-by-hop routing could be used as well. GMPLS also extends two traditional intra-domain link-state routing protocols already extended for TE purposes, i.e. OSPF-TE and IS-IS- TE. However, if explicit (source) routing is used, the routing algorithms used by these protocols no longer need to be standardized. Extensions for inter-domain routing (e.g. BGP) are for further study. E. Mannie et. al. Internet-Draft September 2002 8 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 The use of technologies like DWDM (Dense Wavelength Division Multiplexing) implies that we can now have a very large number of parallel links between two directly adjacent nodes (hundreds of wavelengths, or even thousands of wavelengths if multiple fibers are used). Such a large number of links was not originally considered for an IP or MPLS control plane, although it could be done. Some slight adaptations of that control plane are thus required if we want to better reuse it in the GMPLS context. For instance, the traditional IP routing model assumes the establishment of a routing adjacency over each link connecting two adjacent nodes. Having such a large number of adjacencies does not scale well. Each node needs to maintain each of its adjacencies one by one, and link state routing information must be flooded throughout the network. To solve this issue the concept of link bundling was introduced. Moreover, the manual configuration and control of these links, even if they are unnumbered, becomes impractical. The Link Management Protocol (LMP) was specified to solve these issues. LMP runs between data plane adjacent nodes and is used to manage TE links. Specifically, LMP provides mechanisms to maintain control channel connectivity (IP Control Channel Maintenance), verify the physical connectivity of the data-bearing links (Link Verification), correlate the link property information (Link Property Correlation), and manage link failures (Fault Localization and Fault Notification). A unique feature of LMP is that it is able to localize faults in both opaque and transparent networks (i.e. independent of the encoding scheme and bit rate used for the data). LMP is defined in the context of GMPLS, but is specified independently of the GMPLS signaling specification since it is a local protocol running between data-plane adjacent nodes. As a result, LMP can be used in other contexts with non-GMPLS signaling protocols. The MPLS signaling and routing protocols require at least one bi- directional control channel to communicate even if two adjacent nodes are connected by unidirectional links. Several control channels can be used. LMP can be used to establish, maintain and manage these control channels. GMPLS does not specify how these control channels must be implemented, but GMPLS requires IP to transport the signaling and routing protocols over them. Control channels can be either in-band or out-of-band, and several solutions can be used to carry IP. Note also that one type of LMP message (the Test message) is used in-band in the data plane and may not be transported over IP, but this is a particular case, needed to verify connectivity in the data plane. E. Mannie et. al. Internet-Draft September 2002 9 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 3.4. GMPLS Key Extensions to MPLS-TE Some key extensions brought by GMPLS to MPLS-TE are highlighted in the following. Some of them are key advantages of GMPLS to control TDM, LSC and FSC layers. - In MPLS-TE, links traversed by an LSP can include an intermix of links with heterogeneous label encoding (e.g. links between routers, links between routers and ATM-LSRs, and links between ATM-LSRs. GMPLS extends this by including links where the label is encoded as a time slot, or a wavelength, or a position in the real world physical space. - In MPLS-TE, an LSP that carries IP has to start and end on a router. GMPLS extends this by requiring an LSP to start and end on similar type of LSR. - The type of a payload that can be carried in GMPLS by an LSP is extended to allow such payloads as SONET/SDH, G.709, 1 or 10Gb Ethernet, etc. - The use of Forwarding Adjacencies (FA), provides a mechanism that can improve bandwidth utilization, when bandwidth allocation can be performed only in discrete units, as well as a mechanism to aggregate forwarding state, thus allowing the number of required labels to be reduced. - GMPLS allows for a label to be suggested by an upstream node to reduce the setup latency. This suggestion may be overridden by a downstream node but, in some cases, at the cost of higher LSP setup time. - GMPLS extends on the notion of restricting the range of labels that may be selected by a downstream node. In GMPLS, an upstream node may restrict the labels for an LSP along either a single hop or along the entire LSP path. This feature is useful in photonic networks where wavelength conversion may not be available. - While traditional TE-based (and even LDP-based) LSPs are unidirectional, GMPLS supports the establishment of bi-directional LSPs. - GMPLS supports the termination of an LSP on a specific egress port, i.e. the port selection at the destination side. - GMPLS with RSVP-TE supports an RSVP specific mechanism for rapid failure notification. Note also some other key differences between MPLS-TE and GMPLS: - For TDM, LSC and FSC interfaces, bandwidth allocation for an LSP can be performed only in discrete units.Contributors Peter Ashwood-Smith Eric Mannie Nortel Networks Corp. Ebone (GTS) P.O. Box 3511 Station C, Terhulpsesteenweg 6A Ottawa, ON K1Y 4H7 1560 Hoeilaart Canada Belgium Phone: +1 613 763-4534 Phone: +32 2 658-5652 Email: Email: eric.mannie@gts.com petera@nortelnetworks.com Daniel O. Awduche Thomas D. Nadeau Movaz Networks Cisco Systems, Inc. 7296 Jones Branch Drive 250 Apollo Drive Suite 615 Chelmsford, MA 01824 McLean, VA 22102 USA USA Phone: +1 978 244-3051 Phone: +1 703 847-7350 Email: tnadeau@cisco.com Email: awduche@movaz.com Ayan Banerjee Lyndon Ong Calient Networks Ciena Systems 5853 Rue Ferrari 10480 Ridgeview Ct San Jose, CA 95138 Cupertino, CA 95014 USA USA Phone: +1 408 972-3645 Email: lyong@ciena.com Email: abanerjee@calient.net Debashis Basak Dimitri Papadimitriou Accelight Networks Alcatel 70 Abele Road, Bldg.1200 Francis Wellesplein, 1 Bridgeville, PA 15017 B-2018 Antwerpen USA Belgium Phone: +1 412 220-2102 (ext115) Phone: +32 3 240-8491 email: dbasak@accelight.com Email: dimitri.papadimitriou@alcatel.be Lou Berger Dimitrios Pendarakis Movaz Networks, Inc. Tellium, Inc. 7926 Jones Branch Drive 2 Crescent Place Suite 615 P.O. Box 901 MCLean VA, 22102 Oceanport, NJ 07757-0901 USA USA Phone: +1 703 847-1801 Email: DPendarakis@tellium.com Email: lberger@movaz.com E. Mannie et. al. Internet-Draft February 2003 4 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 Greg Bernstein Bala Rajagopalan Ciena Corporation Tellium, Inc. 10480 Ridgeview Court 2 Crescent Place Cupertino, CA 94014 P.O. Box 901 USA Oceanport, NJ 07757-0901 Phone: +1 408 366-4713 USA Email: greg@ciena.com Phone: +1 732 923-4237 Email: braja@tellium.com Sudheer Dharanikota Yakov Rekhter Nayna Networks Inc. Juniper 481 Sycamore Drive Email: yakov@juniper.net Milpitas, CA 95035 USA Email: sudheer@nayna.com John Drake Debanjan Saha Calient Networks Tellium Optical Systems 5853 Rue Ferrari 2 Crescent Place San Jose, CA 95138 Oceanport, NJ 07757-0901 USA USA Phone: +1 408 972-3720 Phone: +1 732 923-4264 Email: jdrake@calient.net Email: dsaha@tellium.com Yanhe Fan Hal Sandick Axiowave Networks, Inc. Nortel Networks 200 Nickerson Road Email: Marlborough, MA 01752 hsandick@nortelnetworks.com USA Phone: +1 774 348-4627 Email: yfan@axiowave.com Don Fedyk Vishal Sharma Nortel Networks Corp. Metanoia, Inc. 600 Technology Park Drive 305 Elan Village Lane, Unit Billerica, MA 01821 121 USA San Jose, CA 95134-2545 Phone: +1 978 288-4506 USA Email: Phone: +1 408 895-5030 dwfedyk@nortelnetworks.com Email: vsharma87@yahoo.com Gert Grammel George Swallow Alcatel Cisco Systems, Inc. Via Trento, 30 250 Apollo Drive 20059 Vimercate (Mi) Chelmsford, MA 01824 Italy USA Email: gert.grammel@alcatel.it Phone: +1 978 244-8143 Email: swallow@cisco.com E. Mannie et. al. Internet-Draft February 2003 5 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 Dan Guo Z. Bo Tang Turin Networks, Inc. Tellium, Inc. 1415 N. McDowell Blvd, 2 Crescent Place Petaluma, CA 95454 P.O. Box 901 USA Oceanport, NJ 07757-0901 Email: dguo@turinnetworks.com USA Phone: +1 732 923-4231 Email: btang@tellium.com Kireeti Kompella Jennifer Yates Juniper Networks, Inc. AT&T 1194 N. Mathilda Ave. 180 Park Avenue Sunnyvale, CA 94089 Florham Park, NJ 07932 USA USA Email: kireeti@juniper.net Email: jyates@research.att.com Alan Kullberg George R. Young NetPlane Systems, Inc. Edgeflow 888 Washington St. 329 March Road Dedham, MA 02026 Ottawa, Ontario, K2K 2E1 USA Canada Phone: +1 781 251-5319 Email: Email: akullber@netplane.com george.young@edgeflow.com Jonathan P. Lang John Yu Calient Networks Zaffire Inc. 25 Castilian 2630 Orchard Parkway Goleta, CA 93117 San Jose, CA 95134 Email: jplang@calient.net USA Email: jzyu@zaffire.com Fong Liaw Alex Zinin Zaffire Inc. Alcatel 2630 Orchard Parkway 1420 North McDowell Ave San Jose, CA 95134 M/S 1400-HRPB6 USA Petaluma, CA 94954 Email: fliaw@zaffire.com USA Email: alex.zinin@alcatel.com E. Mannie et. al. Internet-DraftSeptember 2002 10 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 6 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002- It is expected to have (much) fewer labels on TDM, LSC or FSC links than on PSC or L2SC links, because the former are physical labels instead of logical labels. 4. Routing and addressing model GMPLS is based on the IP routing and addressing models. This assumes that IPv4 and/or IPv6 addresses are used to identify interfaces and that traditional (distributed) IP routing protocols are also reused. Indeed, the discovery of the topology and the resource state of all links in a routing domain is achieved via these routing protocols. Since control and data planes are de-coupled in GMPLS, control-plane neighbors (i.e. IGP-learnt neighbors) may not be anymore data-plane neighbors, hence mechanisms like LMP are needed to associate TE links with neighboring nodes. IP addresses are not used only to identify interfaces of IP hosts and routers, but more generally to identify any PSC and non-PSC interfaces. Similarly, IP routing protocols are used to find routes for IP datagrams with a SPF algorithm, and are also used to find routes for non-PSC circuits by using a CSPF algorithm. However, some additional mechanisms are needed to increase the scalability of these models2. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are todeal with specific traffic engineering requirements of non-PSC layers. These mechanisms willbeintroducedinterpreted as described in RFC-2119 [2]. 3. Introduction The architecture presented in this document covers thefollowing. Re-using existing IP routing protocols allows for non-PSC layersmain building blocks needed totake advantages of all the valuable developments that took place since yearsbuild a consistent control plane forIP routing, in particular inmultiple switching layers. It does not restrict thecontext of intra- domain routing (link-state routing) and inter-domain routing (policy routing). In an overlay model, each particular non-PSC layerway that these layers work together. Different models can beseen as a setapplied: e.g. overlay, augmented or integrated. Moreover, each pair ofAutonomous Systems (ASs) interconnectedcontiguous layer may work jointly inan arbitrary way. Similarly to the traditional IP routing, each AS is managed byasingle administrative authority. For instance, an AS can be an SDH/SONET network operated bydifferent way, resulting in agiven carrier. The set of interconnected ASs being an SDH/SONET Internetwork. Exchangenumber ofrouting information between ASs can be done via an inter-domain routing protocol like BGP-4. There is obviously a huge valuepossible combinations, at the discretion ofre-using well-known policy routing facilities provided by BGP in a non-PSC context. Extensions for BGP traffic engineering (BGP-TE)manufacturers and operators. This architecture clearly separates the control plane and the forwarding plane. In addition, it also clearly separates the control plane in two parts, thecontext of non-PSC layers are left for further study. Each AS can be subdivided in different routing domains,signaling plane containing the signaling protocols andeach can run a different intra-domainthe routingprotocol. In turn, each routing-domain can be divided in areas. Aplane containing the routingdomainprotocols. This document ismade of GMPLS enabled nodes (i.e. a network device includingaGMPLS entity). These nodes can be either edge E. Mannie et. al. Internet-Draft September 2002 11 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 nodes (i.e. hosts, ingress LSRs or egress LSRs), or internal LSRs. An examplegeneralization ofnon-PSC host is an SDH/SONET Terminal Multiplexer (TM). Another example is an SDH/SONET interface card within an IP router or ATM switch. Note that traffic engineering intheintra-domain requiresMPLS architecture [RFC3031], and in some cases may differ slightly from that architecture since non packet-based forwarding planes are now considered. It is not theuseintention oflink-state routing protocols like OSPF or IS-IS. GMPLS defines extensionsthis document tothese protocols. These extensions are neededdescribe concepts already described in the current MPLS architecture. The goal is todisseminatedescribe specificTDM, LSC and FSC staticconcepts of Generalized MPLS (GMPLS). However, some of the concepts explained hereafter are not part of the current MPLS architecture anddynamic characteristics relatedare applicable tonodesboth MPLS andlinks. The current focus is on intra-area traffic engineering. However, inter-area traffic engineering is also under investigation. 4.1. Addressing of PSCGMPLS (i.e. link bundling, unnumbered links, andnon-PSC layers The fact that IPv4 and/or IPv6 addressesLSP hierarchy). Since these concepts were introduced together with GMPLS and since they areused doesn't imply at all thatof paramount importance for an operational GMPLS network, theyshouldwill beallocated indiscussed here. The organization of thesame addressing space than public IPv4 and/or IPv6 addresses used forremainder of this draft is as follows. We begin with an introduction of GMPLS. We then present theInternet. Private IP addressesspecific GMPLS building blocks and explain how they can beused if they don't requirecombined together tobe exchanged with any other operator, public IP addresses are otherwise required. Of course, ifbuild anintegrated model is used, two layers could shareoperational GMPLS networks. Specific details of thesame addressing space. Noteseparate building blocks can be found in the corresponding documents. 3.1. Acronyms & abbreviations ABR Area Border Router AS Autonomous System ASBR Autonomous System Boundary Router BGP Border Gateway Protocol CR-LDP Constraint-based Routing LDP CSPF Constraint-based Shortest Path First DWDM Dense Wavelength Division Multiplexing FA Forwarding Adjacency GMPLS Generalized Multi-Protocol Label Switching IGP Interior Gateway Protocol E. Mannie et. al. Internet-Draft February 2003 7 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 LDP Label Distribution Protocol LMP Link Management Protocol LSA Link State Advertisement LSR Label Switching Router LSP Label Switched Path MIB Management Information Base MPLS Multi-Protocol Label Switching NMS Network Management System OXC Optical Cross-Connect PXC Photonic Cross-Connect RSVP ReSource reserVation Protocol SDH Synchronous Digital Hierarchy STM(-N) Synchronous Transport Module (-N) STS(-N) Synchronous Transport Signal-Level N (SONET) TE Traffic Engineering 3.2. Multiple Types of Switching and Forwarding Hierarchies Generalized MPLS (GMPLS) differs from traditional MPLS in thatthere is a benefitit supports multiple types ofusing public IPv4 and/or IPv6 Internet addresses for non-PSC layers if an integrated model withswitching, i.e. theIP layer is foreseen. If we consideraddition of support for TDM, lambda, and fiber (port) switching. The support for thescalability enhancements proposedadditional types of switching has driven GMPLS to extend certain base functions of traditional MPLS and, inthe next section, the IPv4 (32 bits)some cases, to add functionality. These changes and additions impact basic LSP properties, how labels are requested and communicated, theIPv6 (128 bits) addressing spacesunidirectional nature of LSPs, how errors areboth more than sufficientpropagated, and information provided for synchronizing the ingress and egress LSRs. The MPLS architecture [RFC3031] was defined toaccommodate any non-PSC layer. We can reasonably expectsupport the forwarding of data based on a label. In this architecture, Label Switching Routers (LSRs) were assumed to havemuch less non-PSC devices (e.g. SDH/SONET nodes) than we have today IP hostsa forwarding plane that is capable of (a) recognizing either packet or cell boundaries, androuters. 4.2. GMPLS scalability enhancements TDM, LSC(b) being able to process either packet headers (for LSRs capable of recognizing packet boundaries) or cell headers (for LSRs capable of recognizing cell boundaries). The original MPLS architecture is here being extended to include LSRs whose forwarding plane recognizes neither packet, nor cell boundaries, andFSC layers introducetherefore, can't forward data based on the information carried in either packet or cell headers. Specifically, such LSRs include devices where the forwarding decision is based on time slots, wavelengths, or physical ports. So, the newconstraintsset of LSRs, or more precisely interfaces on these LSRs, can be subdivided into theIP addressingfollowing classes: 1. Packet Switch Capable (PSC) interfaces: Interfaces that recognize packet boundaries androuting models since several hundreds of parallel physical links (e.g. wavelengths)cannow connect two nodes. Most offorward data based on thecarriers already have today several tens of wavelengths per fiber between two nodes. New generationcontent ofDWDM systems will allow several hundredsthe packet header. Examples include interfaces on routers that forward data based on the content ofwavelengths per fiber. It becomes rather impractical to associate anthe IPaddress with each end of each physical link, to represent each link as a separate routing adjacency, and to advertiseheader andto maintain link states for each of these links. Forinterfaces on routers thatpurpose, GMPLS enhances the MPLS routing and addressing models to increase their scalability. Two optional mechanisms can be used to increaseforward data based on thescalabilitycontent of theaddressing and the routing: unnumbered links and link bundling. These two mechanisms can also be combined. They require extensions to signaling (RSVP-TE and CR-LDP) and routing (OSPF-TE and IS-IS-TE) protocols.MPLS "shim" header. 2. Layer-2 Switch Capable (L2SC) interfaces: E. Mannie et. al. Internet-DraftSeptember 2002 12 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 8 draft-ietf-ccamp-gmpls-architecture-03.txt August 20024.3. TE Extensions to IP routing protocols Traditionally,Interfaces that recognize frame/cell boundaries and can forward data based on the content of the frame/cell header. Examples include interfaces on Ethernet bridges that forward data based on the content of the MAC header and interfaces on ATM-LSRs that forward data based on the ATM VPI/VCI. 3. Time-Division Multiplex Capable (TDM) interfaces: Interfaces that forward data based on the data's time slot in aTE link is advertised asrepeating cycle. An example of such anadjunct tointerface is that of a"regular" OSPFSDH/SONET Cross-Connect (XC), Terminal Multiplexer (TM), orIS-IS link, i.e., an adjacency is brought upAdd-Drop Multiplexer (ADM). Other examples include interfaces providing G.709 TDM capabilities (the "digital wrapper") and PDH interfaces. 4. Lambda Switch Capable (LSC) interfaces: Interfaces that forward data based on thelink, and whenwavelength on which thelinkdata isup, both the regular IGP propertiesreceived. An example of such an interface is that of a Photonic Cross-Connect (PXC) or Optical Cross-Connect (OXC) that can operate at thelink (basically,level of an individual wavelength. Additional examples include PXC interfaces that can operate at theSPF metric)level of a group of wavelengths, i.e. a waveband andthe TE propertiesG.709 interfaces providing optical capabilities. 5. Fiber-Switch Capable (FSC) interfaces: Interfaces that forward data based on a position of thelink are then advertised. However, GMPLS challenges this notiondata inthree ways: - First, links that are non-PSC may yet have TE properties; however,the real world physical spaces. An example of such anOSPF adjacency could notinterface is that of a PXC or OXC that can operate at the level of a single or multiple fibers. A circuit can bebrought up directlyestablished only between, or through, interfaces of the same type. Depending onsuch links. - Second, an LSPthe particular technology being used for each interface, different circuit names can beadvertised asused, e.g. SDH circuit, optical trail, light-path, etc. In the context of GMPLS, all these circuits are referenced by apoint-to-point TE linkcommon name: Label Switched Path (LSP). The concept of nested LSP (LSP within LSP), already available in therouting protocol,traditional MPLS, facilitates building a forwarding hierarchy, i.e.asaForwarding Adjacency (FA); thus, an advertised TE link need no longer behierarchy of LSPs. This hierarchy of LSPs can occur on the same interface, or betweentwo OSPF direct neighbors. Forwarding Adjacencies (FA) are further described in a separate section. - Third,different interfaces. For example, anumber of links mayhierarchy can beadvertised as a single TE link (e.g. for improved scalability), so again, therebuilt if an interface isno longer a one- to-one associationcapable of multiplexing several LSPs from the same technology (layer), e.g. aregular adjacency and a TE link. Thus we havelower order SDH/SONET LSP (VC-12) nested in amore general notionhigher order SDH/SONET LSP (VC-4). Several levels of signal (LSP) nesting are defined in the SDH/SONET multiplexing hierarchy. The nesting can also occur between interfaces. At the top of the hierarchy are FSC interfaces, followed by LSC interfaces, followed by TDM interfaces, followed by L2SC, and followed by PSC interfaces. This way, an LSP that starts and ends on aTE link. A TE link is a logical linkPSC interface can be E. Mannie et. al. Internet-Draft February 2003 9 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 nested (together with other LSPs) into an LSP thathas TE properties, some of which maystarts and ends on a L2SC interface. This LSP, in turn, can beconfigurednested (together with other LSPs) into an LSP that starts and ends onthe advertising LSR, othersan TDM interface, whichmayin turn can beobtained fromnested (together with otherLSRs by means of some protocol,LSPs) into an LSP that starts andyet othersends on a LSC interface, whichmayin turn can bededuced from the component(s)nested (together with other LSPs) into an LSP that starts and ends on a FSC interface. 3.3. Extension of theTE link. An important TE propertyMPLS Control Plane The establishment ofa TE linkLSPs that span only Packet Switch Capable (PSC) or Layer-2 Switch Capable (L2SC) interfaces isrelated to the bandwidth accountingdefined forthat link.the original MPLS and/or MPLS-TE control planes. GMPLSwill define different accounting rules for different non-PSC layers. Generic bandwidth attributes are howeverextends these control planes to support each of the five classes of interfaces (i.e. layers) definedbyin theTE routing extensionsprevious section. Note that the GMPLS control plane supports an overlay model, an augmented model, andby GMPLS, such asa peer (integrated) model. In theunreserved bandwidth,near term, GMPLS is very suitable for controlling each layer independently. This elegant approach will facilitate themaximum reservable bandwidth,future deployment of other models. The GMPLS control plane is made of several building blocks are described in more detail in themaximum LSP bandwidth. Itfollowing sections. These building blocks are based on well-known signaling and routing protocols that have been extended and/or modified to support GMPLS. They use IPv4 and/or IPv6 addresses. Only one new specialized protocol isexpected in a dynamic environmentrequired tohave frequent changessupport the operations ofbandwidth accounting information. A flexible policyGMPLS, a signaling protocol fortriggeringlinkstate updatesmanagement [LMP]. GMPLS is indeed based onbandwidth thresholds and link-dampening mechanismthe Traffic Engineering (TE) extensions to MPLS, a.k.a. MPLS-TE. This because most of the technologies that can beimplemented. TE properties associated with a link should also capture protection and restoration related characteristics. For instance, sharedused below the PSC level require some traffic engineering. The placement of LSPs at these levels needs in general to take several constraints into consideration (such as framing, bandwidth, protectioncan be elegantly combined with bundling. Protectioncapability, etc) andrestoration are mainly generic mechanisms also applicabletoMPLS. Itbypass the legacy Shortest-Path First (SPF) algorithm. Note, however, that this isexpectednot mandatory and thatthey will firstin some cases SPF routing can bedeveloped for MPLS and later on generalizedapplied. In order toGMPLS. A TE link between a pairfacilitate constrained-based SPF routing ofLSRs doesn't implyLSPs, theexistence of an IGP adjacency between these LSRs. Anodes performing LSP establishment need more information about the links in the network than standard intra-domain routing protocols provide. These TElink must also have some means by whichattributes are distributed using theadvertising LSR can know of its livenesstransport mechanisms already available in IGPs (e.g. flooding) and taken into consideration by the LSP routing algorithm. Optimization of the LSP routes may also require some external simulations usingLMP hellos). When an LSR knowsheuristics that serve as input for the actual path calculation and LSP establishment process. By definition, a TE link isup,a representation in the ISIS/OSPF Link State advertisements andcan determinein theTE link's TElink state database of certain physical resources, and their properties, between two GMPLS nodes. TE Links are used by theLSR may then advertiseGMPLS control plane (routing and signaling) for establishing LSPs. E. Mannie et. al. Internet-DraftSeptember 2002 13 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 10 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002that linkExtensions toits GMPLS enhanced OSPF or IS-IS neighbors using the TE objects/TLVs. We call the interfaces over which GMPLS enhanced OSPF or ISIS adjacencies are established "control channels". 5. Unnumbered links Unnumbered links (or interfaces)traditional routing protocols and algorithms arelinks (or interfaces) that do not have IP addresses. Using such links involves two capabilities: the abilityneeded tospecify unnumbered links in MPLSuniformly encode and carry TEsignaling,link information, and explicit routes (e.g. source routes) are required in theability to carry (TE) information about unnumbered linkssignaling. In addition, the signaling must now be capable of transporting the required circuit (LSP) parameters such as the bandwidth, the type of signal, the desired protection and/or restoration, the position inIGP TE extensionsa particular multiplex, etc. Most ofISIS-TEthese extensions have already been defined for PSC andOSPF-TE. A. The ability toL2SC traffic engineering with MPLS. GMPLS primarily defines additional extensions for TDM, LSC, and FSC traffic engineering. A very few elements are technology specific. Thus, GMPLS extends the two signaling protocols defined for MPLS-TE signaling, i.e. RSVP-TE and CR-LDP. However, GMPLS does not specifyunnumbered links in MPLS TEwhich one of these two signalingrequires extensionsprotocols must be used. It is the role of manufacturers and operators to evaluate the two possible solutions for their own interest. Since GMPLS is based on RSVP-TE andCR-LDP. The MPLS-TE signaling doesn't provide support for unnumbered links, becauseCR-LDP, itdoesnÆt providemandates away to indicate an unnumbered link in its Explicit Route Object/TLVdownstream-on-demand label allocation andin its Record Route Object (theredistribution, with an ingress initiated ordered control. Liberal label retention is normally used, but conservative label retention mode could also be used. Furthermore, there is nosuch TLVrestriction on the label allocation strategy, it can be request/signaling driven (obvious forCR-LDP).circuit switching technologies), traffic/data driven, or even topology driven. There is also no restriction on the route selection; explicit routing is normally used (strict or loose) but hop-by-hop routing could be used as well. GMPLSdefines simple extensions to indicate an unnumbered link in thesealso extends twoObjects/TLVs, using a new Unnumbered Interface ID sub-object/sub-TLV. Since unnumbered links are not identified by an IP address, thentraditional intra-domain link-state routing protocols already extended forthe purpose of MPLSTEeach end need some other identifier, local to the LSR to which the link belongs. LSRs at the two end points of an unnumbered link exchange with each otherpurposes, i.e. OSPF-TE and IS-IS- TE. However, if explicit (source) routing is used, theidentifiers they assignrouting algorithms used by these protocols no longer need tothe link. Exchanging the identifiers maybeaccomplished by configuration, by meansstandardized. Extensions for inter-domain routing (e.g. BGP) are for further study. The use of technologies like DWDM (Dense Wavelength Division Multiplexing) implies that we can now have aprotocol such as LMP ([LMP]), by meansvery large number ofRSVP/CR-LDP (especially in the case where a link is a Forwarding Adjacency, see below), or by meansparallel links between two directly adjacent nodes (hundreds ofIS-ISwavelengths, orOSPF extensions ([ISIS-GMPLS], [OSPF-GMPLS]). Consider an (unnumbered) link between LSRs A and B. LSR A chooses an identifiereven thousands of wavelengths if multiple fibers are used). Such a large number of links was not originally considered for an IP or MPLS control plane, although it could be done. Some slight adaptations of thatlink. So is LSR B. From A's perspectivecontrol plane are thus required if werefer to the identifier that A assigned to the link as the "link local identifier" (or just "local identifier"), and to the identifier that B assigned to the link as the "link remote identifier" (or just "remote identifier"). Likewise, from B's perspective the identifier that B assignedwant to better reuse it in thelink is the local identifier, andGMPLS context. For instance, theidentifier that A assigned totraditional IP routing model assumes the establishment of a routing adjacency over each linkis the remote identifier. The new Unnumbered Interface ID sub-object/sub-TLV for the ER Object/TLV contains the Router IDconnecting two adjacent nodes. Having such a large number ofthe LSR at the upstream endadjacencies does not scale well. Each node needs to maintain each ofthe unnumbered linkits adjacencies one by one, and link state routing information must be flooded throughout theoutgoing interface identifier ornetwork. To solve this issue the concept of linklocal identifier with respect to that upstream LSR. The new Unnumbered Interface ID sub-object for the RR Object contains the outgoing interface identifier with respect to the LSR that adds it inbundling was introduced. Moreover, theRR Object.manual configuration and control of these links, even E. Mannie et. al. Internet-DraftSeptember 2002 14 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 11 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002B.if they are unnumbered, becomes impractical. TheabilityLink Management Protocol (LMP) was specified tocarry (TE) information about unnumbered links in IGP TE extensions requires new sub-TLVs for the extended IS reachability TLV defined in ISIS-TEsolve these issues. LMP runs between data plane adjacent nodes andfor the TE LSA (whichisan opaque LSA) defined in OSPF-TE. A Link Local Identifier sub-TLV and a Link Remote Identifier sub-TLV are defined. 5.1. Unnumbered Forwarding Adjacencies If an LSR that originates an LSP advertises this LSP as an unnumbered FA in IS-IS or OSPF, or the LSR uses this FA as an unnumbered component link of a bundled link, the LSR must allocate an Interface IDused tothat FA. Ifmanage TE links. Specifically, LMP provides mechanisms to maintain control channel connectivity (IP Control Channel Maintenance), verify theLSP is bi-directional,physical connectivity of thetail end doesdata-bearing links (Link Verification), correlate thesamelink property information (Link Property Correlation), andallocates an Interface ID to the reverse FA. Signaling has been enhanced to carry the Interface IDmanage link failures (Fault Localization and Fault Notification). A unique feature ofa FALMP is that it is able to localize faults inthe new LSP Tunnel Interface ID object/TLV. This object/TLV contains the Router IDboth opaque and transparent networks (i.e. independent of theLSR that generates it,encoding scheme and bit rate used for theInterface ID. Itdata). LMP iscalled the Forward Interface ID when it appearsdefined ina Path/REQUEST message, and itthe context of GMPLS, but iscalledspecified independently of theReverse Interface ID whenGMPLS signaling specification since itappearsis a local protocol running between data-plane adjacent nodes. As a result, LMP can be used inthe Resv/MAPPING message. 6. Link bundlingother contexts with non-GMPLS signaling protocols. TheconceptMPLS signaling and routing protocols require at least one bi- directional control channel to communicate even if two adjacent nodes are connected by unidirectional links. Several control channels can be used. LMP can be used to establish, maintain and manage these control channels. GMPLS does not specify how these control channels must be implemented, but GMPLS requires IP to transport the signaling and routing protocols over them. Control channels can be either in-band or out-of-band, and several solutions can be used to carry IP. Note also that one type oflink bundlingLMP message (the Test message) isessentialused in-band incertain networks employingtheGMPLS controldata planeasand may not be transported over IP, but this isdefineda particular case, needed to verify connectivity in[BUNDLE]. A typical example is an optical meshed network where adjacent optical cross-connects (LSRs)the data plane. 3.4. GMPLS Key Extensions to MPLS-TE Some key extensions brought by GMPLS to MPLS-TE are highlighted in the following. Some of them areconnected by several hundredskey advantages ofparallel wavelengths.GMPLS to control TDM, LSC and FSC layers. - Inthis network, consider the applicationMPLS-TE, links traversed by an LSP can include an intermix oflink state routing protocols, like OSPF or IS-IS,links withsuitable extensions for resource discoveryheterogeneous label encoding (e.g. links between routers, links between routers anddynamic route computation. Each wavelength must be advertised separately in order to be used, except if link bundling is used. When a pair of LSRs is connectedATM-LSRs, and links between ATM-LSRs. GMPLS extends this bymultiple links, it is possible to advertise several (or all) of theseincluding links where the label is encoded as asingle link into OSPF and/or IS-IS. This process is called link bundling,time slot, orjust bundling. The resulting logical link is calledabundled link as its physical links are called component links (and are identified by interface indexes). It results thatwavelength, or acombination of three identifiers ((bundled) link identifier, component link identifier, label) is sufficient to unambiguously identifyposition in theappropriate resources used byreal world physical space. - In MPLS-TE, anLSP. The purpose of link bundling is to improve routing scalability by reducing the amount of informationLSP that carries IP has tobe handled by OSPF and/or IS-IS. This reduction is accomplished by performing information aggregation/abstraction. As with any other information aggregation/abstraction,start and end on a router. GMPLS extends thisresults in losing some of the information. To limit the amountby requiring an LSP to start and end on similar type oflosses one need to restrict theLSR. - The type ofthe informationa payload that can beaggregated/abstracted.carried in GMPLS by an LSP is extended to allow such payloads as SONET/SDH, G.709, 1 or 10Gb Ethernet, etc. E. Mannie et. al. Internet-DraftSeptember 2002 15 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 12 draft-ietf-ccamp-gmpls-architecture-03.txt August 20026.1. Restrictions on bundling- Thefollowing restrictions are required for bundling links. All component linksuse of Forwarding Adjacencies (FA), provides a mechanism that can improve bandwidth utilization, when bandwidth allocation can be performed only in discrete units, as well as abundle must begin and end onmechanism to aggregate forwarding state, thus allowing thesame pairnumber ofLSRs; and share some common characteristics or properties defined in [OSPF-TE] and [ISIS-TE], i.e. they must have the same: - Link Type (i.e. point-to-point or multi-access),required labels to be reduced. -TE Metric (i.e.GMPLS allows for a label to be suggested by anadministrative cost), - Set of Resource Classesupstream node to reduce the setup latency. This suggestion may be overridden by a downstream node but, in some cases, ateach endthe cost of higher LSP setup time. - GMPLS extends on the notion of restricting thelinks (i.e. colors). Noterange of labels thatan FAmayalsobe selected by acomponent link.downstream node. Infact, a bundle can consist of a mix of point-to-point links and FAs, but all sharing some common properties. 6.2. Routing considerationsGMPLS, an upstream node may restrict the labels forbundling A bundled link is just another kind of TE link such as those defined by [GMPLS-ROUTING]. The liveness ofan LSP along either a single hop or along thebundled linkentire LSP path. This feature isdetermined byuseful in photonic networks where wavelength conversion may not be available. - While traditional TE-based (and even LDP-based) LSPs are unidirectional, GMPLS supports theliveness of each its component links, a bundled link is alive when at least oneestablishment ofits component links is alive. The livenessbi-directional LSPs. - GMPLS supports the termination of an LSP on acomponent link can be determined by any of several means: IS-IS or OSPF hellos overspecific egress port, i.e. thecomponent link, or RSVP Hello (hop local), or LMP hellos (link local), or from layer 1 or layer 2 indications. Note that according toport selection at the destination side. - GMPLS with RSVP-TETunnel specification thesupports an RSVPHellospecific mechanismis intended tofor rapid failure notification. Note also some other key differences between MPLS-TE and GMPLS: - For TDM, LSC and FSC interfaces, bandwidth allocation for an LSP can beused when notification of link layer failuresperformed only in discrete units. - It isnot available and unnumberedexpected to have (much) fewer labels on TDM, LSC or FSC linksare not used,than on PSC orwhen the failure detection mechanisms provided byL2SC links, because thelink layerformer arenot sufficient for timely node failure detection. Once a bundled linkphysical labels instead of logical labels. 4. Routing and addressing model GMPLS isdeterminedbased on the IP routing and addressing models. This assumes that IPv4 and/or IPv6 addresses are used tobe alive, it can be advertised as a TE linkidentify interfaces andthe TE information can be flooded. If IS-IS/OSPF hellosthat traditional (distributed) IP routing protocols arerun overalso reused. Indeed, thecomponent links, IS-IS/OSPF flooding can be restricted to just onediscovery of thecomponent links. Note that advertising a (bundled) TE link between a pairtopology and the resource state ofLSRs doesn't imply that there is an IGP adjacency between these LSRs that is associated with just that link. In fact,all links incertain cases a TE link betweenapair of LSRs could be advertised even if there is no IGP adjacency at all between the LSR (e.g. when the TE linkrouting domain isan FA). Forming a bundled link consistachieved via these routing protocols. Since control and data planes are de-coupled inaggregating the identical TE parameters of each individual component linkGMPLS, control-plane neighbors (i.e. IGP-learnt neighbors) may not be anymore data-plane neighbors, hence mechanisms like LMP are needed toproduce aggregated TE parameters. Aassociate TElink as defined by [GMPLS-ROUTING] has many parameters, adequate aggregation rules must be defined for each one. Some parameters can be sumslinks with neighboring nodes. IP addresses are not used only to identify interfaces ofcomponent characteristics such as the unreserved bandwidthIP hosts andthe maximum reservable bandwidth. Bandwidth information is an important part ofrouters, but more generally to identify any PSC and non-PSC interfaces. Similarly, IP routing protocols are used to find routes for IP datagrams with abundle advertisementSPF algorithm, andit must be clearly defined since an abstraction is done.are also used to find routes for non-PSC circuits by using a CSPF algorithm. E. Mannie et. al. Internet-DraftSeptember 2002 16 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 13 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002A GMPLS node with bundled links must apply admission control on a per-component link basis. 6.3. Signaling considerations Typically, an LSP's explicit route (e.g. contained in an explicit route TLV/Object) will chooseHowever, some additional mechanisms are needed to increase thebundled linkscalability of these models and to deal with specific traffic engineering requirements of non-PSC layers. These mechanisms will beused forintroduced in theLSP, but notfollowing. Re-using existing IP routing protocols allows for non-PSC layers to take advantages of all thecomponent link(s),valuable developments that took place sinceinformation about the bundled link is flooded, but information aboutyears for IP routing, in particular in thecomponent links is not. The choicecontext ofthe component linkintra- domain routing (link-state routing) and inter-domain routing (policy routing). In an overlay model, each particular non-PSC layer can be seen as a set of Autonomous Systems (ASs) interconnected in an arbitrary way. Similarly tousethe traditional IP routing, each AS isalways mademanaged by a single administrative authority. For instance, anupstream node. If the LSPAS can be an SDH/SONET network operated by a given carrier. The set of interconnected ASs being an SDH/SONET Internetwork. Exchange of routing information between ASs can be done via an inter-domain routing protocol like BGP-4. There isbidirectional, the upstream node choosesobviously acomponent linkhuge value of re-using well-known policy routing facilities provided by BGP ineach direction. Three mechanismsa non-PSC context. Extensions forindicating this choice toBGP traffic engineering (BGP-TE) in thedownstream nodecontext of non-PSC layers arepossible. 6.3.1. Mechanism 1: Implicit Indication This mechanism requires thatleft for further study. Each AS can be subdivided in different routing domains, and eachcomponent link hascan run adedicated signaling channel (e.g. the linkdifferent intra-domain routing protocol. In turn, each routing-domain can be divided in areas. A routing domain is made of GMPLS enabled nodes (i.e. aSonet/SDH link using the DCC for in-band signaling). The upstream node tells the receiver which component link to use by sending the message over the chosen component link's dedicated signaling channel. Note that this signaling channelnetwork device including a GMPLS entity). These nodes can bein-bandeither edge nodes (i.e. hosts, ingress LSRs orout-of-band. In this last case,egress LSRs), or internal LSRs. An example of non-PSC host is an SDH/SONET Terminal Multiplexer (TM). Another example is an SDH/SONET interface card within an IP router or ATM switch. Note that traffic engineering in theassociation betweenintra-domain requires thesignaling channeluse of link-state routing protocols like OSPF or IS-IS. GMPLS defines extensions to these protocols. These extensions are needed to disseminate specific TDM, LSC andthat component link needFSC static and dynamic characteristics related tobe explicitly configured. 6.3.2. Mechanism 2: Explicit Indication by Numbered Interface ID This mechanism requires that the component link has a unique remote IP address.nodes and links. Theupstream node indicates the choice of the component link by including a new IF_ID RSVP_HOP object/IF_ID TLV carrying either ancurrent focus is on intra-area traffic engineering. However, inter-area traffic engineering is also under investigation. 4.1. Addressing of PSC and non-PSC layers The fact that IPv4or anand/or IPv6addressaddresses are used doesn't imply at all that they should be allocated in thePath/Label Request message [RSVP-TE-GMPLS] [CR-LDP-GMPLS]. For a bi-directional LSP, a component link is providedsame addressing space than public IPv4 and/or IPv6 addresses used foreach direction bytheupstream node. This mechanism does notInternet. Private IP addresses can be used if they don't requireeach component linktohave its own control channel. In fact, it doesn't even requirebe exchanged with any other operator, public IP addresses are otherwise required. Of E. Mannie et. al. Internet-Draft February 2003 14 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 course, if an integrated model is used, two layers could share thewhole (bundled) link to have its own control channel. 6.3.3. Mechanism 3: Explicit Indication by Unnumbered Interface ID With this mechanism, each component linksame addressing space. Note that there isunnumbered is assignedaunique Interface Identifier (32 bits value). The upstream node indicates the choicebenefit of using public IPv4 and/or IPv6 Internet addresses for non-PSC layers if an integrated model with thecomponent link by including a new IF_ID RSVP_HOP object/IF_ID TLVIP layer is foreseen. If we consider the scalability enhancements proposed in thePath/Label Request message [RSVP-TE-GMPLS] [CR-LDP-GMPLS]. This object/TLV carriesnext section, thecomponent interface ID inIPv4 (32 bits) and thedownstream direction for a unidirectional LSP,IPv6 (128 bits) addressing spaces are both more than sufficient to accommodate any non-PSC layer. We can reasonably expect to have much less non-PSC devices (e.g. SDH/SONET nodes) than we have today IP hosts andin additionrouters. 4.2. GMPLS scalability enhancements TDM, LSC and FSC layers introduce new constraints on thecomponent interface ID inIP addressing and routing models since several hundreds of parallel physical links (e.g. wavelengths) can now connect two nodes. Most of theupstream direction for a bi-directional LSP. E. Mannie et. al. Internet-Draft September 2002 17 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 Thecarriers already have today several tens of wavelengths per fiber between twoLSRs atnodes. New generation of DWDM systems will allow several hundreds of wavelengths per fiber. It becomes rather impractical to associate an IP address with each end ofthe bundledeach physical link, to represent each linkexchangeas a separate routing adjacency, and to advertise and to maintain link states for each of theseidentifiers. Exchanginglinks. For that purpose, GMPLS enhances theidentifiers mayMPLS routing and addressing models to increase their scalability. Two optional mechanisms can beaccomplished by configuration, by means of a protocol such as LMP (preferred solution), by meansused to increase the scalability ofRSVP/CR-LDP (especially inthecase where a componentaddressing and the routing: unnumbered links and linkis a Forwarding Adjacency), or by means of IS-IS or OSPF extensions. This mechanism does notbundling. These two mechanisms can also be combined. They requireeach component linkextensions tohave its own control channel. In fact, it doesn't even require the whole (bundled) linksignaling (RSVP-TE and CR-LDP) and routing (OSPF-TE and IS-IS-TE) protocols. 4.3. TE Extensions tohave its own control channel. 6.4. Unnumbered Bundled Link A bundled link may itself be numberedIP routing protocols Traditionally, a TE link is advertised as an adjunct to a "regular" OSPF orunnumbered independent of whetherIS-IS link, i.e., an adjacency is brought up on thecomponent links are numbered or not. This affects howlink, and when thebundledlink isadvertised in IS-IS/OSPF, andup, both theformatregular IGP properties ofLSP EROs that traversethebundled link. Furthermore, unnumbered Interface Identifiers for all unnumbered outgoing links of a given LSR (whether component links, Forwarding Adjacencies or bundled links) must be unique inlink (basically, thecontextSPF metric) and the TE properties ofthat LSR. 6.5. Forming bundled links The generic rule for bundling component links is to place those links thatthe link arecorrelated in some mannerthen advertised. However, GMPLS challenges this notion inthe same bundle. Ifthree ways: - First, links that are non-PSC may yet have TE properties; however, an OSPF adjacency could not becorrelated based on multiple properties then the bundling may be applied sequentially basedbrought up directly onthese properties. For instance, links maysuch links. - Second, an LSP can befirst grouped based onadvertised as a point-to-point TE link in thefirst property. Eachrouting protocol, i.e. as a Forwarding Adjacency (FA); thus, an advertised TE link need no longer be between two OSPF direct neighbors. Forwarding Adjacencies (FA) are further described in a separate section. E. Mannie et. al. Internet-Draft February 2003 15 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 - Third, a number ofthese groupslinks may bethen divided into smaller groups based on the second propertyadvertised as a single TE link (e.g. for improved scalability), so again, there is no longer a one- to-one association of a regular adjacency andso on. The main principle followed in this processa TE link. Thus we have a more general notion of a TE link. A TE link is a logical link thatthe propertieshas TE properties, some ofthe resulting bundles should be concisely summarizable. Link bundlingwhich may bedone automatically or by configuration. Automatic link bundling can apply bundling rules sequentially to produce bundles. For instance, the first propertyconfigured on the advertising LSR, others whichcomponent linksmay becorrelated couldobtained from other LSRs by means of some protocol, and yet others which may be deduced from theInterface Switching Capability [GMPLS- ROUTING],component(s) of thesecondTE link. An important TE propertycould beof a TE link is related to theEncoding [GMPLS-ROUTING],bandwidth accounting for that link. GMPLS will define different accounting rules for different non-PSC layers. Generic bandwidth attributes are however defined by thethird property could beTE routing extensions and by GMPLS, such as theAdministrative Weight (cost),unreserved bandwidth, thefourth property could bemaximum reservable bandwidth, theResource Classes and finally links may be correlatedmaximum LSP bandwidth. It is expected in a dynamic environment to have frequent changes of bandwidth accounting information. A flexible policy for triggering link state updates based onother metrics such as SRLG (Shared Risk Link Groups). When routing an alternate path forbandwidth thresholds and link-dampening mechanism can be implemented. TE properties associated with a link should also capture protectionpurposes, the general principle followedand restoration related characteristics. For instance, shared protection can be elegantly combined with bundling. Protection and restoration are mainly generic mechanisms also applicable to MPLS. It is expected that they will first be developed for MPLS and later on generalized to GMPLS. A TE link between a pair of LSRs doesn't imply thealternate path is not routed over anyexistence of an IGP adjacency between these LSRs. A TE linkbelonging tomust also have some means by which the advertising LSR can know of its liveness (e.g. by using LMP hellos). When anSRLGLSR knows thatsomea TE linkinis up, and can determine theprimary path belongs to. Thus,TE link's TE properties, therule to be followed isLSR may then advertise that link togroupits GMPLS enhanced OSPF or IS-IS neighbors using the TE objects/TLVs. We call the interfaces over which GMPLS enhanced OSPF or ISIS adjacencies are established "control channels". 5. Unnumbered linksbelongingUnnumbered links (or interfaces) are links (or interfaces) that do not have IP addresses. Using such links involves two capabilities: the ability toexactlyspecify unnumbered links in MPLS TE signaling, and thesame set of SRLGs. This typeability to carry (TE) information about unnumbered links in IGP TE extensions ofsequential sub-division may resultISIS-TE and OSPF-TE. A. The ability to specify unnumbered links in MPLS TE signaling requires extensions to RSVP-TE and CR-LDP. The MPLS-TE signaling doesn't provide support for unnumbered links, because it doesnÆt provide anumber of bundles between two adjacent nodes. In practice, however, theway to indicate an unnumbered link in its Explicit Route Object/TLV and in its Record Route Object (there is no such TLV for CR-LDP). GMPLS defines simple extensions to indicate an unnumbered linkproperties may not be very heterogeneous among component links between two adjacent nodes. Thus, the number of bundlesinpractice may not be large.these two Objects/TLVs, using a new Unnumbered Interface ID sub-object/sub-TLV. E. Mannie et. al. Internet-DraftSeptember 2002 18 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 16 draft-ietf-ccamp-gmpls-architecture-03.txt August 20027. Relationship with the UNI The interface betweenSince unnumbered links are not identified by anedge GMPLS node and a GMPLS LSR onIP address, then for thenetwork side may be referred to as a Userpurpose of MPLS TE each end need some other identifier, local toNetwork Interface (UNI), whiletheinterface between two network side LSRs may be referred to as a Network to Network Interface (NNI). GMPLS does not specify separately a UNI and an NNI. Edge nodes are connectedLSR toLSRs onwhich thenetwork side, and theselink belongs. LSRsare in turn connected between them. Of course,at thebehaviortwo end points of anedge node is not exactlyunnumbered link exchange with each other thesame asidentifiers they assign to thebehavior of an LSR onlink. Exchanging thenetwork side. Note also, that an edge nodeidentifiers mayrunbe accomplished by configuration, by means of arouting protocol, however it is expected that in mostprotocol such as LMP ([LMP]), by means of RSVP/CR-LDP (especially in thecases it will not (see also section 7.2 and the section about signaling with an explicit route). Conceptually,case where adifferencelink is a Forwarding Adjacency, see below), or by means of IS-IS or OSPF extensions ([ISIS-GMPLS], [OSPF-GMPLS]). Consider an (unnumbered) link betweenUNILSRs A andNNI make sense either if both interface uses completely different protocols, or if they useB. LSR A chooses an identifier for that link. So is LSR B. From A's perspective we refer to thesame protocols but with some outstanding differences. Inidentifier that A assigned to thefirst case, separate protocols are often defined successively, with more or less success. The GMPLS approach consisted in building a consistent model from day one, considering bothlink as theUNI"link local identifier" (or just "local identifier"), andNNI interfaces atto thesame time. Foridentifier thatpurpose a very few specific UNI particularities have been ignored in a first time. GMPLS has been enhancedB assigned tosupport such particularities attheUNI by some other standardization bodies (see hereafter). 7.1. Relationship withlink as theOIF UNI This section is only given for reference to"link remote identifier" (or just "remote identifier"). Likewise, from B's perspective theOIF work relatedidentifier that B assigned toGMPLS. The current OIF UNI specification [OIF-UNI] defines an interface between a client SDH/SONET equipmentthe link is the local identifier, andan SDH/SONET network, each belongingthe identifier that A assigned toa distinct administrative authority. Itthe link isdesigned for an overlay model.the remote identifier. TheOIF UNI defines additional mechanisms onnew Unnumbered Interface ID sub-object/sub-TLV for thetopER Object/TLV contains the Router ID ofGMPLS fortheUNI. For instance,LSR at theOIF service discovery procedure is a precursor to obtaining UNI services. Service discovery allows a clientupstream end of the unnumbered link and the outgoing interface identifier or the link local identifier with respect todeterminethat upstream LSR. The new Unnumbered Interface ID sub-object for thestatic parameters ofRR Object contains theinterconnectionoutgoing interface identifier with respect to thenetwork, includingLSR that adds it in theUNI signaling protocol,RR Object. B. The ability to carry (TE) information about unnumbered links in IGP TE extensions requires new sub-TLVs for thetype of concatenation,extended IS reachability TLV defined in ISIS-TE and for thetransparency level as wellTE LSA (which is an opaque LSA) defined in OSPF-TE. A Link Local Identifier sub-TLV and a Link Remote Identifier sub-TLV are defined. 5.1. Unnumbered Forwarding Adjacencies If an LSR that originates an LSP advertises this LSP as an unnumbered FA in IS-IS or OSPF, or thetypeLSR uses this FA as an unnumbered component link ofdiversity (node,a bundled link,SRLG) supported bythenetwork. SinceLSR must allocate an Interface ID to that FA. If thecurrent OIF UNI interface does not cover photonic networks, G.709 Digital Wrapper, etc, itLSP isfrom that perspective a subset ofbi-directional, theGMPLS Architecture attail end does theUNI. 7.2. Reachability acrosssame and allocates an Interface ID to theUNI This section discussesreverse FA. Signaling has been enhanced to carry theselectionInterface ID ofan explicit route by an edge node. The selectiona FA in the new LSP Tunnel Interface ID object/TLV. This object/TLV contains the Router ID of thefirstLSRby an edge node connected to multiple LSRsthat generates it, and the Interface ID. It is called the Forward Interface ID when it appears in a Path/REQUEST message, and it ispart of that problem.called the Reverse Interface ID when it appears in the Resv/MAPPING message. 6. Link bundling E. Mannie et. al. Internet-DraftSeptember 2002 19 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 17 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002An edge node (host or LSR) can participate more or less deeplyThe concept of link bundling is essential in certain networks employing the GMPLSrouting. Four different routing models can be supported at the UNI: configuration based, partial peering, silent listening and full peering. - Configuration based:control plane as is defined in [BUNDLE]. A typical example is an optical meshed network where adjacent optical cross-connects (LSRs) are connected by several hundreds of parallel wavelengths. In thisrouting model requiresnetwork, consider themanual or automatic configurationapplication ofan edge nodelink state routing protocols, like OSPF or IS-IS, with suitable extensions for resource discovery and dynamic route computation. Each wavelength must be advertised separately in order to be used, except if link bundling is used. When alistpair ofneighborLSRssortedis connected bypreference order. Automatic configuration can be achieved using DHCP for instance. No routing informationmultiple links, it isexchanged at the UNI, except maybe the ordered listpossible to advertise several (or all) ofLSRs.these links as a single link into OSPF and/or IS-IS. This process is called link bundling, or just bundling. Theonly routing information usedresulting logical link is called a bundled link as its physical links are called component links (and are identified bythe edge nodeinterface indexes). It results that a combination of three identifiers ((bundled) link identifier, component link identifier, label) isthat list. The edge node sends by default an LSP requestsufficient to unambiguously identify thepreferred LSR. ICMP redirects could be sendappropriate resources used bythis LSR to redirect some LSP requests to another LSR connectedan LSP. The purpose of link bundling is tothe edge node. GMPLS does not preclude that model. - Partial peering: limitedimprove routinginformation (mainly reachability) can be exchanged across the UNI using some extensions inscalability by reducing thesignaling plane. The reachabilityamount of informationexchanged at the UNI may be usedthat has toinitiate edge node specific routing decision over the network. GMPLS does not havebe handled by OSPF and/or IS-IS. This reduction is accomplished by performing information aggregation/abstraction. As with anycapability to support this model today. - Silent listening: the edge node can silently listen to routing protocols and take routing decisions based on theother informationobtained. An edge node receives the full routing information, including traffic engineering extensions. One LSR should forward transparently all routing pdus to the edge node. An edge node can now compute a complete explicit route taking into consideration all the end-to-end routing information. GMPLS does not precludeaggregation/abstraction, thismodel. - Full peering: In addition to silent listening,results in losing some of theedge node participates withininformation. To limit therouting, establish adjacencies with its neighbors and advertises LSAs. This is useful only if there are benefits for edge nodesamount of losses one need toadvertise themselves traffic engineering information. GMPLS does not preclude this model. 8. Link Management Inrestrict thecontexttype ofGMPLS,the information that can be aggregated/abstracted. 6.1. Restrictions on bundling The following restrictions are required for bundling links. All component links in a bundle must begin and end on the same pair ofnodes (e.g., a photonic switch) may be connected by tens of fibers,LSRs; and share some common characteristics or properties defined in [OSPF-TE] and [ISIS-TE], i.e. they must have the same: - Link Type (i.e. point-to-point or multi-access), - TE Metric (i.e. an administrative cost), - Set of Resource Classes at eachfiber may be used to transmit hundredsend ofwavelengths if DWDM is used. Multiple fibers and/or multiple wavelengthsthe links (i.e. colors). Note that an FA may also becombined into one or more bundleda component link. In fact, a bundle can consist of a mix of point-to-point linksfor routing purposes. Furthermore, to enable communication between nodes for routing, signaling,and FAs, but all sharing some common properties. 6.2. Routing considerations for bundling A bundled linkmanagement, control channels must be established between a node pair. Link managementisa collectionjust another kind ofuseful procedures between adjacent nodes that provide local servicesTE link such ascontrol channel management,those defined by [GMPLS-ROUTING]. The liveness of the bundled linkconnectivity verification,is determined by the liveness of each its component links, a bundled linkproperty correlation, and fault management.is alive when at least one of its component links is alive. TheLink Management Protocol (LMP) has been defined to fulfill these operations.liveness of a component link can be determined by any of several means: IS-IS or OSPF hellos over the component link, or RSVP Hello (hop local), or LMPwashellos (link local), or from layer 1 or layer 2 indications. E. Mannie et. al. Internet-DraftSeptember 2002 20 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 18 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002initiated inNote that according to thecontext of GMPLS butRSVP-TE Tunnel specification the RSVP Hello mechanism isa generic toolbox that canintended to bealsousedin other contexts. Control channel management and link property correlation are mandatory procedureswhen notification ofLMP. Link connectivity verificationlink layer failures is not available andfault managementunnumbered links areoptional procedures. 8.1. Control channel and control channel management LMP control channel managementnot used, or when the failure detection mechanisms provided by the link layer are not sufficient for timely node failure detection. Once a bundled link isuseddetermined toestablishbe alive, it can be advertised as a TE link andmaintain control channels between nodes. Control channels exist independently ofthe TE information can be flooded. If IS-IS/OSPF hellos are run over the component links,andIS-IS/OSPF flooding can beusedrestricted toexchange MPLS control-plane information such as signaling, routing, andjust one of the component links. Note that advertising a (bundled) TE linkmanagement information. An "LMP adjacency"between a pair of LSRs doesn't imply that there isformedan IGP adjacency betweentwo nodesthese LSRs thatsupport the same LMP capabilities. Multiple control channels mayis associated with just that link. In fact, in certain cases a TE link between a pair of LSRs could beactive simultaneously foradvertised even if there is no IGP adjacency at all between the LSR (e.g. when the TE link is an FA). Forming a bundled link consist in aggregating the identical TE parameters of eachadjacency.individual component link to produce aggregated TE parameters. Acontrol channel canTE link as defined by [GMPLS-ROUTING] has many parameters, adequate aggregation rules must beeither explicitly configured or automatically selected, however, LMP currently assume that control channels are explicitly configured while the configuration of the control channel capabilitiesdefined for each one. Some parameters can bedynamically negotiated. For the purposessums ofLMP,component characteristics such as theexact implementation ofunreserved bandwidth and thecontrol channelmaximum reservable bandwidth. Bandwidth information isleft unspecified. The control channel(s) between two adjacent nodesan important part of a bundle advertisement and it must be clearly defined since an abstraction isno longer required to use the same physical medium as the data-bearingdone. A GMPLS node with bundled linksbetween those nodes. For example, amust apply admission controlchannel could useon aseparate wavelength or fiber,per-component link basis. 6.3. Signaling considerations Typically, anEthernet link, orLSP's explicit route (e.g. contained in anIP tunnel through a separate management network. A consequence of allowingexplicit route TLV/Object) will choose thecontrol channel(s) between two nodesbundled link to bephysically diverse fromused for theassociated data-bearing linksLSP, but not the component link(s), since information about the bundled link isthatflooded, but information about thehealthcomponent links is not. The choice ofa control channel does not necessarily correlate tothehealth ofcomponent link to use is always made by an upstream node. If thedata-bearing links, and vice-versa. Therefore, new mechanisms have been developedLSP is bidirectional, the upstream node chooses a component link inLMPeach direction. Three mechanisms for indicating this choice tomanage links, both in terms of link provisioning and fault isolation. LMP does not specifythesignaling transportdownstream node are possible. 6.3.1. Mechanism 1: Implicit Indication This mechanismused in the control channel, however it statesrequires thatmessages transported overeach component link has acontroldedicated signaling channelmust be IP encoded. Furthermore, since the messages are IP encoded,(e.g. the linklevel encoding is not part of LMP. A 32-bit non-zero integer control channel identifier (CCId)isassigned to each direction ofacontrol channel. Each control channel individually negotiates its control channel parameters and maintains connectivitySonet/SDH link usinga fast Hello protocol.the DCC for in-band signaling). Thelatter is required if lower-level mechanisms are not available to detectupstream node tells the receiver which component linkfailures. The Hello protocol of LMP is intendedtobe a lightweight keep-alive mechanismuse by sending the message over the chosen component link's dedicated signaling channel. Note thatwill react to controlthis signaling channelfailures rapidly so that IGP Hellos are not lost and the associated link-state adjacencies are not removed unnecessarily.can be in-band or out-of-band. In this last case, E. Mannie et. al. Internet-DraftSeptember 2002 21 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 19 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002The Hello protocol consists of two phases: a negotiation phasethe association between the signaling channel anda keep-alive phase. The negotiation phase allows negotiation of some basic Hello protocol parameters, likethat component link need to be explicitly configured. 6.3.2. Mechanism 2: Explicit Indication by Numbered Interface ID This mechanism requires that theHello frequency.component link has a unique remote IP address. Thekeep- alive phase consistsupstream node indicates the choice of the component link by including afast lightweight bi-directional Hellonew IF_ID RSVP_HOP object/IF_ID TLV carrying either an IPv4 or an IPv6 address in the Path/Label Request messageexchange. If[RSVP-TE-GMPLS] [CR-LDP-GMPLS]. For agroup of control channels sharebi-directional LSP, acommon node pair and supportcomponent link is provided for each direction by thesame LMP capabilities, then LMPupstream node. This mechanism does not require each component link to have its own controlchannel messages (except Configuration messages, and Hello) may be transmitted over any ofchannel. In fact, it doesn't even require theactivewhole (bundled) link to have its own controlchannels without coordination between the local and remote nodes. For LMP, it is essentialchannel. 6.3.3. Mechanism 3: Explicit Indication by Unnumbered Interface ID With this mechanism, each component link thatat least one control channelisalways available. Inunnumbered is assigned a unique Interface Identifier (32 bits value). The upstream node indicates theeventchoice of the component link by including acontrol channel failure, itnew IF_ID RSVP_HOP object/IF_ID TLV in the Path/Label Request message [RSVP-TE-GMPLS] [CR-LDP-GMPLS]. This object/TLV carries the component interface ID in the downstream direction for a unidirectional LSP, and in addition the component interface ID in the upstream direction for a bi-directional LSP. The two LSRs at each end of the bundled link exchange these identifiers. Exchanging the identifiers may bepossible to use an alternate active control channel without coordination. 8.2. Link property correlation As partaccomplished by configuration, by means ofLMP,a protocol such as LMP (preferred solution), by means of RSVP/CR-LDP (especially in the case where a component linkproperty correlation exchangeisdefined. The exchange is used to aggregate multiple data-bearing links (i.e. component links) intoabundled link and exchange, correlate,Forwarding Adjacency), orchange TEby means of IS-IS or OSPF extensions. This mechanism does not require each component linkparameters. Theto have its own control channel. In fact, it doesn't even require the whole (bundled) link to have its own control channel. 6.4. Unnumbered Bundled Link A bundled linkproperty correlation exchangemay itself bedone at any time anumbered or unnumbered independent of whether the component links are numbered or not. This affects how the bundled link isup and notadvertised in IS-IS/OSPF, and theVerification process (see next section). It allowsformat of LSP EROs that traverse the bundled link. Furthermore, unnumbered Interface Identifiers forinstance to add componentall unnumbered outgoing linksto a link bundle, changeof alink's protection mechanism, change port identifiers, or changegiven LSR (whether componentidentifierslinks, Forwarding Adjacencies or bundled links) must be unique ina bundle. This mechanism is supported by an exchangethe context oflink summary messages. 8.3. Link connectivity verification Link connectivity verificationthat LSR. 6.5. Forming bundled links The generic rule for bundling component links isan optional procedureto place those links that are correlated in some manner in the same bundle. If links may be correlated based on multiple properties then the E. Mannie et. al. Internet-Draft February 2003 20 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 bundling may be applied sequentially based on these properties. For instance, links may beused to verifyfirst grouped based on thephysical connectivityfirst property. Each ofdata-bearing links as well as to exchange the link identifiers that are used inthese groups may be then divided into smaller groups based on theGMPLS signaling.second property and so on. Theuse ofmain principle followed in thisprocedureprocess isnegotiated as part of the configuration exchangethattake place duringthenegotiation phaseproperties of theHello protocol. This procedureresulting bundles should be concisely summarizable. Link bundling may be doneinitially when a data- bearingautomatically or by configuration. Automatic linkisbundling can apply bundling rules sequentially to produce bundles. For instance, the firstestablished, and subsequently,property ona periodic basis for all unallocated (free) data-bearing links. The verification procedure consists of sending Test messages in-band overwhich component links may be correlated could be thedata-bearing links. This requires thatInterface Switching Capability [GMPLS- ROUTING], theunallocated links mustsecond property could beopaque; however, multiple degrees of opaqueness (e.g., examining overhead bytes, terminatingthepayload, etc.), and hence different mechanisms to transportEncoding [GMPLS-ROUTING], theTest messages, are specified. Note thatthird property could be theTest message isAdministrative Weight (cost), theonly LMP message that is transmitted overfourth property could be thelink,Resource Classes andthat Hello messages continue tofinally links may beexchanged overcorrelated based on other metrics such as SRLG (Shared Risk Link Groups). When routing an alternate path for protection purposes, thecontrol channel duringgeneral principle followed is that the alternate path is not routed over any link belonging to an SRLG that some linkverification process. Data-bearing links are testedin thetransmit direction as E. Mannie et. al. Internet-Draft September 2002 22 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 they are unidirectional. As such, itprimary path belongs to. Thus, the rule to be followed ispossible for LMP neighboring nodestoexchangegroup links belonging to exactly theTest messages simultaneouslysame set of SRLGs. This type of sequential sub-division may result inboth directions. To initiate the link verification procedure,anode must first notify thenumber of bundles between two adjacentnode that it will begin sending Test messages over a particular data-bearing link, or overnodes. In practice, however, the link properties may not be very heterogeneous among component links between two adjacent nodes. Thus, the number ofa particular bundled link.bundles in practice may not be large. 7. Relationship with the UNI The interface between an edge GMPLS nodemust also indicateand a GMPLS LSR on thenumber of data-bearing links that arenetwork side may be referred to as a User to Network Interface (UNI), while the interface between two network side LSRs may beverified;referred to as a Network to Network Interface (NNI). GMPLS does not specify separately a UNI and an NNI. Edge nodes are connected to LSRs on theinterval at whichnetwork side, and these LSRs are in turn connected between them. Of course, thetest messages will be sent;behavior of an edge node is not exactly theencoding scheme,same as thetransport mechanismbehavior of an LSR on the network side. Note also, that an edge node may run a routing protocol, however it is expected thatare supported, data rate for Test messages; and,in most of thecase where the data-bearing links correspond to fibers, the wavelength over which the Test messagescases it willbe transmitted. Furthermore,not (see also section 7.2 and thelocalsection about signaling with an explicit route). Conceptually, a difference between UNI andremote bundled link identifiers are transmitted at this time to performNNI make sense either if both interface uses completely different protocols, or if they use thecomponent link associationsame protocols but with some outstanding differences. In thebundled link identifiers. 8.4. Fault management Fault management is an important requirementfirst case, separate protocols are often defined successively, with more or less success. The GMPLS approach consisted in building a consistent model from day one, considering both theoperational point of view. Fault management includes usually: fault detection, fault localization and fault notification. When a failure occurs and is detected (fault detection), an operator needs to know exactly where it happened (fault localization)UNI and NNI interfaces at the same time. For that purpose asource node may need to be notifiedvery few specific UNI particularities have been ignored inorder to take some actions (fault notification). Note that fault localization can also be useda first time. GMPLS has been enhanced to supportsome specific local protection/restoration mechanisms. In new technologiessuchas transparent photonic switching currently no methodE. Mannie et. al. Internet-Draft February 2003 21 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 particularities at the UNI by some other standardization bodies (see hereafter). 7.1. Relationship with the OIF UNI This section isdefinedonly given for reference tolocatethe OIF work related to GMPLS. The current OIF UNI specification [OIF-UNI] defines an interface between afault,client SDH/SONET equipment andthe mechanism by which the fault informationan SDH/SONET network, each belonging to a distinct administrative authority. It ispropagated must be sent "outdesigned for an overlay model. The OIF UNI defines additional mechanisms on the top ofband" (viaGMPLS for thecontrol plane). LMP provides a fault localizationUNI. For instance, the OIF service discovery procedurethat can be used to rapidly localize link failures, by notifyingis afault upprecursor tothe node upstream of that fault (i.e. throughobtaining UNI services. Service discovery allows afault notification procedure). A downstream LMP neighbor that detects data link failures will send an LMP messageclient toits upstream neighbor notifying it ofdetermine thefailure. When an upstream node receives a failure notification, it can correlatestatic parameters of thefailureinterconnection with thecorresponding input ports to determine ifnetwork, including thefailure is betweenUNI signaling protocol, thetwo nodes. Oncetype of concatenation, thefailure has been localized,transparency level as well as thesignaling protocols can be used to initiate link or path protection/restoration procedures. 8.5 LMP for DWDM Optical Line Systems (OLSs) In an all-optical environment, LMP focuses on peer communications (e.g. OXC-to-OXC). A great dealtype ofinformation about a link between two OXCsdiversity (node, link, SRLG) supported by the network. Since the current OIF UNI interface does not cover photonic networks, G.709 Digital Wrapper, etc, it isknownfrom that perspective a subset of the GMPLS Architecture at the UNI. 7.2. Reachability across the UNI This section discusses the selection of an explicit route by an edge node. The selection of theOLS (Optical Line System or WDM Terminal multiplexer). Exposing this informationfirst LSR by an edge node connected to multiple LSRs is part of that problem. An edge node (host or LSR) can participate more or less deeply in thecontrol planeGMPLS routing. Four different routing models canimprove network usability by further reducing required manual E. Mannie et. al. Internet-Draft September 2002 23 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002be supported at the UNI: configuration based, partial peering, silent listening andalso by greatly enhancing fault detection and recovery. LMP-WDM [LMP-WDM] defines extensions to LMP for use between and OXC and an OLS. These extensions are intended to satisfyfull peering. - Configuration based: this routing model requires theOptical Link Interface Requirements described in [OLI-REQ]. Fault detection is particularlymanual or automatic configuration of anissue when the network is using all-optical photonic switches (PXC). Onceedge node with aconnectionlist of neighbor LSRs sorted by preference order. Automatic configuration can be achieved using DHCP for instance. No routing information isestablished, PXCs have only limited visibility intoexchanged at thehealth ofUNI, except maybe theconnection. Even thoughordered list of LSRs. The only routing information used by thePXCedge node isall-optical, long-haul OLSs typically terminate channels electrically and regenerate them optically, which presentsthat list. The edge node sends by default anopportunityLSP request tomonitorthehealth of a channel between PXCs. LMP-WDM can thenpreferred LSR. ICMP redirects could beusedsend bythe OLS to providethisinformationLSR tothe PXC. In additionredirect some LSP requests tothe link information knownanother LSR connected to theOLSedge node. GMPLS does not preclude thatis exchanged through LMP-WDM, somemodel. - Partial peering: limited routing informationknown to the OXC may also(mainly reachability) can be exchangedwith the OLS through LMP-WDM. This information is useful for alarm management and link monitoring (e.g. trace monitoring). Alarm management is important becauseacross theadministrative state of a connection, known toUNI using some extensions in theOXC (e.g. thissignaling plane. The reachability information exchanged at the UNI may belearned throughused to initiate edge node specific routing decision over theAdmin Status object ofnetwork. GMPLSsignaling [GMPLS]), can be useddoes not have any capability tosuppress spurious alarms. For example,support this model today. - Silent listening: theOXC may know that a connection is "up", "down", in a "testing" mode, or being deleted ("deletion-in-progress"). The OXCedge node canuse thissilently listen to routing protocols and take routing decisions based on the information obtained. An edge node receives the full routing information, E. Mannie et. al. Internet-Draft February 2003 22 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 including traffic engineering extensions. One LSR should forward transparently all routing pdus toinhibit alarm reporting fromtheOLS whenedge node. An edge node can now compute aconnection is "down", "testing", or being deleted. It is importantcomplete explicit route taking into consideration all the end-to-end routing information. GMPLS does not preclude this model. - Full peering: In addition tonote that an OXC may peer with one or more OLSs and an OLS may peersilent listening, the edge node participates within the routing, establish adjacencies withone or more OXCs. Although there are many similarities between an OXC-OXC LMP session and an OXC-OLS LMP session, particularly for control managementits neighbors andlink verification,advertises LSAs. This is useful only if there aresome differences as well. These differences can primarily be attributedbenefits for edge nodes to advertise themselves traffic engineering information. GMPLS does not preclude this model. 8. Link Management In thenaturecontext ofan OXC-OLS link, and the purposeGMPLS, a pair ofOXC-OLS LMP sessions. The OXC-OXC links cannodes (e.g., a photonic switch) may be connected by tens of fibers, and each fiber may be used toprovide the basistransmit hundreds of wavelengths if DWDM is used. Multiple fibers and/or multiple wavelengths may also be combined into one or more bundled links forGMPLS signaling androutingat the optical layer. The information exchanged over LMP-WDM sessions is usedpurposes. Furthermore, toaugment knowledge about the linksenable communication betweenOXCs. In ordernodes forthe information exchanged over the OXC-OLS LMP sessions to be used by the OXC-OXC session, the information must be coordinated by the OXC. However, the OXC-OXC and OXC-OLS LMP sessions are run independentlyrouting, signaling, and link management, control channels must bemaintained separately. One critical requirement when running an OXC-OLS LMP session is the ability of the OLS to makeestablished between adata link transparent when not doing the verification procedure. Thisnode pair. Link management isbecause the same data link may be verifieda collection of useful procedures betweenOXC-OLSadjacent nodes that provide local services such as control channel management, link connectivity verification, link property correlation, andbetween OXC-OXC.fault management. Theverification procedure of LMP is usedLink Management Protocol (LMP) has been defined tocoordinate the Test procedure (and hencefulfill these operations. LMP was initiated in thetransparency/opaquenesscontext ofthe data links). To maintain independence between the sessions, it mustGMPLS but is a generic toolbox that can bepossible for the LMP sessions to come upalso used inany order. In particular, it must be possible for an OXC- OXC LMP session to come up without an OXC-OLS LMP session being brought up,other contexts. Control channel management andvice-versa. E. Mannie et. al. Internet-Draft September 2002 24 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 9. Generalized Signaling The GMPLS signaling extends certain base functionslink property correlation are mandatory procedures ofthe RSVP-TE and CR-LDP signaling and, in some cases, adds functionality. These changesLMP. Link connectivity verification andadditions impact basic LSP properties, how labelsfault management arerequestedoptional procedures. 8.1. Control channel andcommunicated, the unidirectional naturecontrol channel management LMP control channel management is used to establish and maintain control channels between nodes. Control channels exist independently ofLSPs, how errors are propagated,TE links, and can be used to exchange MPLS control-plane informationprovided for synchronizing the ingresssuch as signaling, routing, andegress. The core GMPLS signaling specificationlink management information. An "LMP adjacency" isavailable in three parts: 1. A signaling functional description [GMPLS-SIG]. 2. RSVP-TE extensions [RSVP-TE-GMPLS]. 3. CR-LDP extensions [CR-LDP-GMPLS]. In addition, independent parts are available per technology: 1. GMPLS extensions for SONET and SDHformed between two nodes that support the same LMP capabilities. Multiple control[SONETSDH-GMPLS]. 2. GMPLS extensionschannels may be active simultaneously forG.709each adjacency. A control[G709-GMPLS]. The following MPLS profile expressed in terms of MPLS features [RFC3031] applies to GMPLS: - Downstream-on-demand label allocation and distribution. - Ingress initiated ordered control. - Liberal (typical), or conservative (could) label retention mode. - Request, traffic/data, or topology driven label allocation strategy. - Explicit routing (typical),channel can be either explicitly configured orhop-by-hop routing. The GMPLS signaling defines the following new building blocks onautomatically selected, however, LMP currently assume that control channels are explicitly configured while thetopconfiguration ofMPLS-TE: 1. A new generic label request format. 2. Labels for TDM, LSC and FSC interfaces, generically known as Generalized Label. 3. Waveband switching support. 4. Label suggestion bytheupstream for optimizationcontrol channel capabilities can be dynamically negotiated. For the purposes(e.g. latency). 5. Label restriction byof LMP, theupstream to support some optical constraints. 6. Bi-directional LSP establishment with contention resolution. 7. Rapid failure notification extensions. 8. Protection information currently focusing on link protection, plus primary and secondary LSP indication. 9. Explicit routing with explicit label control for a fine degreeexact implementation ofcontrol. 10. Specific traffic parameters per technology. 11. LSP administrative status handling.the control channel is left unspecified. The control channel(s) between two adjacent nodes is no longer required to use the same physical medium E. Mannie et. al. Internet-DraftSeptember 2002 25 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 23 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002These building blocks will be described in mode details inas thefollowing.data-bearing links between those nodes. For example, a control channel could use a separate wavelength or fiber, an Ethernet link, or an IP tunnel through a separate management network. Acomplete specification canconsequence of allowing the control channel(s) between two nodes to befound inphysically diverse from thecorresponding documents. Note that GMPLSassociated data-bearing links ishighly generic and has many options. Only building blocks 1, 2that the health of a control channel does not necessarily correlate to the health of the data-bearing links, and10 are mandatory,vice-versa. Therefore, new mechanisms have been developed in LMP to manage links, both in terms of link provisioning andonly withinfault isolation. LMP does not specify thespecific formatsignaling transport mechanism used in the control channel, however it states thatis needed. Typically building blocks 6 and 9 shouldmessages transported over a control channel must beimplemented. Building blocks 3, 4, 5, 7, 8 and 11 are optional. A typical SDH/SONET switching network would implement building blocks: 1, 2 (the SDH/SONET label), 6, 9, 10 and 11. Building blocks 7 and 8 are optionalIP encoded. Furthermore, since theprotection/restoration can be achieved using SDH/SONET overhead bytes. A typical wavelength switching network would implement building blocks: 1, 2 (the generic format), 4, 5, 6, 7, 8, 9 and 11. Building block 3 is only needed inmessages are IP encoded, theparticular caselink level encoding is not part ofwaveband switching.LMP. Atypical fiber switching network would implement building blocks: 1, 2 (the generic format), 6, 7, 8, 932-bit non-zero integer control channel identifier (CCId) is assigned to each direction of a control channel. Each control channel individually negotiates its control channel parameters and11. A typical MPLS-IP network wouldmaintains connectivity using a fast Hello protocol. The latter is required if lower-level mechanisms are notimplement any of these building blocks, since the absenceavailable to detect link failures. The Hello protocol ofbuilding block 1 would indicate regular MPLS-IP. Note however that building block 1 and 8 canLMP is intended to beuseda lightweight keep-alive mechanism that will react tosignal MPLS-IP as well. Incontrol channel failures rapidly so thatcase, the MPLS-IP network can benefit fromIGP Hellos are not lost and thelink protection type (not available in CR-LDP,associated link-state adjacencies are not removed unnecessarily. The Hello protocol consists of two phases: a negotiation phase and a keep-alive phase. The negotiation phase allows negotiation of someverybasicform being available in RSVP-TE). Building block 2 is hereHello protocol parameters, like the Hello frequency. The keep- alive phase consists of aregular MPLS labelfast lightweight bi-directional Hello message exchange. If a group of control channels share a common node pair andno new label format is required. GMPLS does not specifysupport the same LMP capabilities, then LMP control channel messages (except Configuration messages, and Hello) may be transmitted over anyprofile for RSVP-TEof the active control channels without coordination between the local andCR-LDP implementationsremote nodes. For LMP, it is essential thathaveat least one control channel is always available. In the event of a control channel failure, it may be possible tosupport GMPLS - except for whatuse an alternate active control channel without coordination. 8.2. Link property correlation As part of LMP, a link property correlation exchange isdirectly related to GMPLS procedures. Itdefined. The exchange is used tothe manufacturer to decide which are the optional elements and procedures of RSVP-TEaggregate multiple data-bearing links (i.e. component links) into a bundled link andCR-LDP that need to be implemented. Some optional MPLS-TE elements canexchange, correlate, or change TE link parameters. The link property correlation exchange may beuseful for TDM, LSCdone at any time a link is up andFSC layers,not in the Verification process (see next section). E. Mannie et. al. Internet-Draft February 2003 24 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 It allows for instancethe setup and holding priorities that are inherited from MPLS-TE. 9.1. Overview: HowtoRequest an LSP A TDM, LSCadd component links to a link bundle, change a link's protection mechanism, change port identifiers, orFSC LSP is established by sendingchange component identifiers in aPATH/Label Request message downstream to the destination.bundle. Thismessage contains a Generalized Label Request with the type of LSP (i.e. the layer concerned), and its payload type. An Explicit Route (ERO)mechanism isalso normally added to the message, but this can be added and/or completedsupported bythe first/default LSR. The requested bandwidthan exchange of link summary messages. 8.3. Link connectivity verification Link connectivity verification isencoded inan optional procedure that may be used to verify theRSVP-TE SENDER_TSPEC object, or inphysical connectivity of data-bearing links as well as to exchange theCR-LDP Traffic Parameters TLV. Specific parameters for a given technologylink identifiers that aregivenused inthese traffic parameters, suchthe GMPLS signaling. The use of this procedure is negotiated as part of thetypeconfiguration exchange that take place during the negotiation phase ofsignal, concatenation and/or transparency for a SDH/SONET LSP. For some other technology there be could just one bandwidth parameter indicatingthebandwidth asHello protocol. This procedure should be done initially when afloating-point value. E. Mannie et. al. Internet-Draft September 2002 26 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 The requested local protection perdata- bearing linkmay be requested using the Protection Information Object/TLV. The end-to-end LSP protectionisfor further studyfirst established, andis introduced LSP protection/restoration section (see after). If the LSP issubsequently, on abi-directional LSP, an Upstream Label is also specified inperiodic basis for all unallocated (free) data-bearing links. The verification procedure consists of sending Test messages in-band over thePath/Label Request message.data-bearing links. Thislabel willrequires that the unallocated links must be opaque; however, multiple degrees of opaqueness (e.g., examining overhead bytes, terminating theonepayload, etc.), and hence different mechanisms touse intransport theupstream direction. Additionally, a Suggested Label, a Label SetTest messages, are specified. Note that the Test message is the only LMP message that is transmitted over the link, anda Waveband Label can alsothat Hello messages continue to beincludedexchanged over the control channel during the link verification process. Data-bearing links are tested in themessage. Other operationstransmit direction as they aredefinedunidirectional. As such, it is possible for LMP neighboring nodes to exchange the Test messages simultaneously inMPLS-TE. The downstream node will send backboth directions. To initiate the link verification procedure, aResv/Label Mapping message including one Generalized Label object/TLVnode must first notify the adjacent node thatcan contain several Generalized Labels. For instance, if a concatenated SDH/SONET signal is requested, several labels can be returned. In case of SDH/SONET virtual concatenation,it will begin sending Test messages over alist of labels is returned. Each label identifying one element ofparticular data-bearing link, or over thevirtual concatenated signal. This limits virtual concatenation to remain withincomponent links of asingle (component)particular bundled link.In case of any type of SDH/SONET contiguous concatenation, only one label is returned. That label isThe node must also indicate thelowest signalnumber of data-bearing links that are to be verified; thecontiguous concatenated signal (given an order specifiedinterval at which the test messages will be sent; the encoding scheme, the transport mechanism that are supported, data rate for Test messages; and, in[SONETSDH-GMPLS]). Inthe caseof SDH/SONET "multiplication", i.e. co-routing of circuits ofwhere thesame type but without concatenation but all belongingdata-bearing links correspond to fibers, thesame LSP,wavelength over which theexplicit ordered list of all signals that take part inTest messages will be transmitted. Furthermore, theLSPlocal and remote bundled link identifiers are transmitted at this time to perform the component link association with the bundled link identifiers. 8.4. Fault management Fault management isreturned. 9.2. Generalized Label Request The Generalized Label Requestan important requirement from the operational point of view. Fault management includes usually: fault detection, fault localization and fault notification. When a failure occurs and is detected (fault detection), an operator needs to know exactly where it happened (fault localization) and anew object/TLVsource node may need to beadded in an RSVP-TE Path message instead of the regular Label Request, or in a CR-LDP Request messagenotified inadditionorder tothe already existing TLVs. Only one label requesttake some actions (fault notification). E. Mannie et. al. Internet-Draft February 2003 25 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 Note that fault localization can also be usedper message, so a single LSP can be requested at a time per signaling message. The Generalized Label Request gives three major characteristics (parameters) requiredto support some specific local protection/restoration mechanisms. In new technologies such as transparent photonic switching currently no method is defined to locate a fault, and theLSP being requested: the LSP Encoding Type,mechanism by which theSwitching Type thatfault information is propagated must beused and the LSP payload type called Generalized PID (G-PID). The LSP Encoding Type indicatessent "out of band" (via theencoding typecontrol plane). LMP provides a fault localization procedure thatwillcan be usedwithto rapidly localize link failures, by notifying a fault up to the node upstream of that fault (i.e. through a fault notification procedure). A downstream LMP neighbor that detects dataassociated with the LSP, i.e. the typelink failures will send an LMP message to its upstream neighbor notifying it oftechnology being considered. For instance,the failure. When an upstream node receives a failure notification, it canbe SDH, SONET, Ethernet, ANSI PDH, etc. It representscorrelate thenature offailure with theLSP, and notcorresponding input ports to determine if the failure is between thenature oftwo nodes. Once thelinks thatfailure has been localized, theLSP traverses. This issignaling protocols can be usedhop-by-hop by each node. E. Mannie et. al. Internet-Draft September 2002 27 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 Ato initiate linkmay support a setor path protection/restoration procedures. 8.5 LMP for DWDM Optical Line Systems (OLSs) In an all-optical environment, LMP focuses on peer communications (e.g. OXC-to-OXC). A great deal ofencoding formats, where support means thatinformation about a link between two OXCs isable to carry and switch a signal of one or more of these encoding formats. The Switching Type indicates thenknown by thetype of switching that should be performed on a particular link for that LSP. ThisOLS (Optical Line System or WDM Terminal multiplexer). Exposing this informationis neededto the control plane can improve network usability by further reducing required manual configuration and also by greatly enhancing fault detection and recovery. LMP-WDM [LMP-WDM] defines extensions to LMP forlinks that advertise more than one type of switching capability. Nodes must verify thatuse between and OXC and an OLS. These extensions are intended to satisfy thetype indicatedOptical Link Interface Requirements described inthe Switching Type[OLI-REQ]. Fault detection issupported on the corresponding incoming interface; otherwiseparticularly an issue when thenode must generate a notification message withnetwork is using all-optical photonic switches (PXC). Once a"Routing problem/Switching Type" indication. The LSP payload type (G-PID) identifiesconnection is established, PXCs have only limited visibility into thepayload carried byhealth of theLSP, i.e.connection. Even though the PXC is all-optical, long-haul OLSs typically terminate channels electrically and regenerate them optically, which presents anidentifier ofopportunity to monitor theclient layerhealth ofthat LSP. For some technologies it also indicates the mappinga channel between PXCs. LMP-WDM can then be used by theclient layer, e.g. byte synchronous mapping of E1. This must be interpreted accordingOLS to provide this information to theLSP encoding type ofPXC. In addition to theLSP andlink information known to the OLS that isused byexchanged through LMP-WDM, some information known to thenodes atOXC may also be exchanged with theendpointsOLS through LMP-WDM. This information is useful for alarm management and link monitoring (e.g. trace monitoring). Alarm management is important because the administrative state of a connection, known to theLSPOXC (e.g. this information may be learned through the Admin Status object of GMPLS signaling [GMPLS]), can be used to suppress spurious alarms. For example, the OXC may knowto which client layerthat arequestconnection isdestined, and in some cases by the penultimate hop. Other technology specific parameters are not transported"up", "down", in a "testing" mode, or being deleted ("deletion-in-progress"). The OXC E. Mannie et. al. Internet-Draft February 2003 26 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 can use this information to inhibit alarm reporting from theGeneralized Label Request but in technology specific traffic parameters as explained hereafter. Currently, two set of traffic parameters are defined,OLS when a connection is "down", "testing", or being deleted. It is important to note that an OXC may peer with onefor SONET/SDHor more OLSs and an OLS may peer with one or more OXCs. Although there are many similarities between an OXC-OXC LMP session andonean OXC-OLS LMP session, particularly forG.709. Note that it is expected than specific traffic parameters willcontrol management and link verification, there are some differences as well. These differences can primarily bedefined inattributed to thefuture for photonic (all optical) switching. 9.3. SONET/SDH Traffic Parameters The GMPLS SDH/SONET traffic parameters [SONETSDH-GMPLS] specify a powerful setnature ofcapabilities for SONET (ANSI T1.105)an OXC-OLS link, andSDH (ITU-T G.707). Optional non-standard capabilities are also available in [SONETSDH-EXT-GMPLS]. The first traffic parameter specifiesthetypepurpose ofthe elementary SONET/SDH signal that comprises the requested LSP, e.g. VC-11, VT6, VC-4, STS-3c, etc. Several transformsOXC-OLS LMP sessions. The OXC-OXC links canthenbeapplied successively on the elementary Signalused tobuildprovide thefinal signal being actually requestedbasis for GMPLS signaling and routing at theLSP. These transforms are the contiguous concatenation,optical layer. The information exchanged over LMP-WDM sessions is used to augment knowledge about thevirtual concatenation,links between OXCs. In order for thetransparency andinformation exchanged over themultiplication. Each one is optional. They mustOXC-OLS LMP sessions to beapplied strictly inused by thefollowing order: - First, contiguous concatenation can be optionally applied onOXC-OXC session, theElementary Signal, resulting in a contiguously concatenated signal. - Second, virtual concatenation caninformation must beoptionally applied either directly on the elementary Signal, or oncoordinated by thecontiguously concatenated signal obtained fromOXC. However, theprevious phase. - Third, some transparency can be optionally specified when requesting a frame as signal rather than a container. Several transparency packagesOXC-OXC and OXC-OLS LMP sessions aredefined. E. Mannie et. al. Internet-Draft September 2002 28 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 - Fourth,run independently and must be maintained separately. One critical requirement when running an OXC-OLS LMP session is the ability of the OLS to make amultiplication candata link transparent when not doing the verification procedure. This is because the same data link may beoptionally applied either directly onverified between OXC-OLS and between OXC-OXC. The verification procedure of LMP is used to coordinate theelementary Signal, or onTest procedure (and hence thecontiguously concatenated signal obtained fromtransparency/opaqueness of thefirst phase, or ondata links). To maintain independence between thevirtually concatenated signal obtained fromsessions, it must be possible for thesecond phase, or on these signals combined withLMP sessions to come up in any order. In particular, it must be possible for an OXC-OXC LMP session to come up without an OXC-OLS LMP session being brought up, and vice-versa. 9. Generalized Signaling The GMPLS signaling extends certain base functions of the RSVP-TE and CR-LDP signaling and, in sometransparency. For RSVP-TE,cases, adds functionality. These changes and additions impact basic LSP properties, how labels are requested and communicated, theSONET/SDH traffic parametersunidirectional nature of LSPs, how errors arecarried in a new SENDER_TSPECpropagated, andFLOWSPEC.information provided for synchronizing the ingress and egress. Thesame formatcore GMPLS signaling specification isusedavailable in three parts: 1. A signaling functional description [GMPLS-SIG]. 2. RSVP-TE extensions [RSVP-TE-GMPLS]. 3. CR-LDP extensions [CR-LDP-GMPLS]. In addition, independent parts are available per technology: 1. GMPLS extensions for SONET and SDH control [SONETSDH-GMPLS]. 2. GMPLS extensions forboth. There is no Adspec associated with the SENDER_TSPEC, either it is omitted or a default value is used.G.709 control [G709-GMPLS]. Thecontent of the FLOWSPEC object receivedfollowing MPLS profile expressed ina Resv message should be identicalterms of MPLS features [RFC3031] applies to GMPLS: - Downstream-on-demand label allocation and distribution. - Ingress initiated ordered control. E. Mannie et. al. Internet-Draft February 2003 27 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 - Liberal (typical), or conservative (could) label retention mode. - Request, traffic/data, or topology driven label allocation strategy. - Explicit routing (typical), or hop-by-hop routing. The GMPLS signaling defines thecontent offollowing new building blocks on theSENDER_TSPECtop of MPLS-TE: 1. A new generic label request format. 2. Labels for TDM, LSC and FSC interfaces, generically known as Generalized Label. 3. Waveband switching support. 4. Label suggestion by thecorresponding Path message. In other words,upstream for optimization purposes (e.g. latency). 5. Label restriction by thereceiver is normally not allowedupstream tochange the values of the traffic parameters. Howeversupport someleveloptical constraints. 6. Bi-directional LSP establishment with contention resolution. 7. Rapid failure notification extensions. 8. Protection information currently focusing on link protection, plus primary and secondary LSP indication. 9. Explicit routing with explicit label control for a fine degree ofnegotiation may be achieved as explained in [SONETSDH-GMPLS] For CR-LDP, the SONET/SDHcontrol. 10. Specific traffic parametersare simply carriedper technology. 11. LSP administrative status handling. These building blocks will be described ina new TLV. Note that a general discussion on SDH/SONET and GMPLSmode details in the following. A complete specification can be found in[SDH/SONET-GMPLS-FRAMEWORK]. 9.4. G.709 Traffic Parameters Simply said, an ITU-T G.709 based networkthe corresponding documents. Note that GMPLS isdecomposed in two major layers: an optical layer (i.e. made of wavelengths)highly generic anda digital layer. These two layers are divided into sub-layershas many options. Only building blocks 1, 2 andswitching occurs at two specific sub-layers: at the OCh (Optical Channel) optical layer10 are mandatory, andat the ODU (Optical channel Data Unit) electrical layer. The ODUk notation is used to denotes ODUs at different bandwidths. The GMPLS G.709 traffic parameters [G709-GMPLS] specify a powerful set of capabilities for ITU-T G.709 networks. The first traffic parameter specifies the type ofonly within theelementary G.709 signalspecific format thatcomprisesis needed. Typically building blocks 6 and 9 should be implemented. Building blocks 3, 4, 5, 7, 8 and 11 are optional. A typical SDH/SONET switching network would implement building blocks: 1, 2 (the SDH/SONET label), 6, 9, 10 and 11. Building blocks 7 and 8 are optional since therequested LSP, e.g. ODU1, OCh at 40 Gbps, etc. Several transformsprotection/restoration canthenbeapplied successively on the elementary Signal to build the final signal being actually requested for the LSP. These transforms areachieved using SDH/SONET overhead bytes. A typical wavelength switching network would implement building blocks: 1, 2 (the generic format), 4, 5, 6, 7, 8, 9 and 11. Building block 3 is only needed in thevirtual concatenationparticular case of waveband switching. A typical fiber switching network would implement building blocks: 1, 2 (the generic format), 6, 7, 8, 9 andthe multiplication. Each one11. A typical MPLS-IP network would not implement any of thesetransforms is optional. They must be applied strictly inbuilding blocks, since thefollowing order: - First, virtual concatenationabsence of building block 1 would indicate regular MPLS-IP. Note however that building block 1 and 8 can beoptionally applied directly onused to signal MPLS-IP as well. In that case, theelementary Signal, - Second, a multiplicationMPLS-IP network canbe optionally applied, either directly on the elementary Signal, or on the virtually concatenated signal obtainedbenefit from thefirst phase. Additional ODUk Multiplexing traffic parameters allow indicating an ODUk mapping (ODUj into ODUk) for an ODUk multiplexing LSP request.link protection type (not available in CR-LDP, some E. Mannie et. al. Internet-DraftSeptember 2002 29 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 G.709 supports the following multiplexing capabilities: ODUj into ODUk (k > j); and ODU1 with ODU2 multiplexing into ODU3. For RSVP-TE, the SONET/SDH traffic parameters are carried in a new SENDER-TSPEC and FLOWSPEC. The same format is used for both. There is no Adspec associated with the SENDER_TSPEC, either it is omitted or a default value is used. The content of the FLOWSPEC object received in a Resv message should be identical to the content of the SENDER_TSPEC of the corresponding Path message. For CR-LDP, the SONET/SDH traffic parameters are simply carried in a new TLV. 9.5. Bandwidth Encoding Some technologies that do not have (yet) specific traffic parameters just require a bandwidth encoding transported in a generic form. Bandwidth is carried in 32-bit numberFebruary 2003 28 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 very basic form being available inIEEE floating-point format (the unitRSVP-TE). Building block 2 isbytes per second). Values are carried inhere aper protocol specific manner. For non-packet LSPs, itregular MPLS label and no new label format isusefulrequired. GMPLS does not specify any profile for RSVP-TE and CR-LDP implementations that have todefine discrete valuessupport GMPLS - except for what is directly related toidentify the bandwidth of the LSP.GMPLS procedures. Itshould be noted that this bandwidth encoding do not applyis toSONET/SDH and G.709, for which the traffic parameters fully definetherequested SONET/SDH or G.709 signal. The bandwidth is coded inmanufacturer to decide which are thePeak Data Rate fieldoptional elements and procedures ofInt-Serv objects forRSVP-TEin the SENDER_TSPEC and FLOWSPEC objects; and in the PeakandCommitted Data Rate fields of theCR-LDPTraffic Parameters TLV. 9.6. Generalized Label The Generalized Label extends the traditional MPLS label by allowing the representation of not only labels that travel in-band with associated data packets, but also (virtual) labelsthatidentify time-slots, wavelengths, or space division multiplexed positions. For example, the Generalized Label may identify (a) a single fiber in a bundle, (b) a single waveband within fiber, (c) a single wavelength within a waveband (or fiber), or (d) a set of time-slots within a wavelength (or fiber). It may also be a generic MPLS label, a Frame Relay label, or an ATM label (VCI/VPI). The format of a label canneed to beas simple as an integer value such as a wavelength label orimplemented. Some optional MPLS-TE elements can bemore elaborated such asuseful for TDM, LSC and FSC layers, for instance the setup and holding priorities that are inherited from MPLS-TE. 9.1. Overview: How to Request anSDH/SONETLSP A TDM, LSC or FSC LSP is established by sending aG.709 label. SDH and SONET define each a multiplexing structure. These multiplexing structures will be used as naming treesPATH/Label Request message downstream tocreate unique labels. Suchthe destination. This message contains alabel will identifyGeneralized Label Request with theexact position (times- lot(s))type ofa signalLSP (i.e. the layer concerned), and its payload type. An Explicit Route (ERO) is also normally added to the message, but this can be added and/or completed by the first/default LSR. The requested bandwidth is encoded in the RSVP-TE SENDER_TSPEC object, or in the CR-LDP Traffic Parameters TLV. Specific parameters for amultiplexing structure. Sincegiven technology are given in these traffic parameters, such as theSONET multiplexing structure maytype of signal, concatenation and/or transparency for a SDH/SONET LSP. For some other technology there beseencould just one bandwidth parameter indicating the bandwidth as asubset of the SDH multiplexing structure,floating-point value. The requested local protection per link may be requested using thesame format of labelProtection Information Object/TLV. The end-to-end LSP protection isusedforSDHfurther study andE. Mannie et. al. Internet-Draft September 2002 30 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 SONET. A similar conceptisapplied to buildintroduced LSP protection/restoration section (see after). If the LSP is alabel atbi-directional LSP, an Upstream Label is also specified in theG.709 ODU layer. SincePath/Label Request message. This label will be thenodes sending and receivingone to use in theGeneralizedupstream direction. Additionally, a Suggested Label, a Labelknow what kinds of link they are using, the GeneralizedSet and a Waveband Labeldoes not identify its type, insteadcan also be included in thenodesmessage. Other operations areexpected to know from the context what type of label to expect. Adefined in MPLS-TE. The downstream node will send back a Resv/Label Mapping message including one Generalized Labelonly carriesobject/TLV that can contain several Generalized Labels. For instance, if asingle level of label, i.e. itconcatenated SDH/SONET signal isnon-hierarchical. When multiple levels ofrequested, several labels(LSPs within LSPs) are required, each LSP mustcan beestablished separately. 9.7. Waveband Switching A specialreturned. In case ofwavelength switching is waveband switching. A waveband representsSDH/SONET virtual concatenation, asetlist ofcontiguous wavelengths, which can be switched together to a new waveband. For optimization reasons it may be desirable for a photonic cross-connectlabels is returned. Each label identifying one element of the virtual concatenated signal. This limits virtual concatenation tooptically switch multiple wavelengths asremain within aunit. This may reduce the distortion on the individual wavelengths and may allow tighter separationsingle (component) link. In case ofthe individual wavelengths. A Wavebandany type of SDH/SONET contiguous concatenation, only one label isdefined to support this special case. Waveband switching naturally introduces another levelreturned. That label is the lowest signal of the contiguous concatenated signal (given an order specified in [SONETSDH-GMPLS]). E. Mannie et. al. Internet-Draft February 2003 29 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 In case of SDH/SONET "multiplication", i.e. co-routing of circuits oflabel hierarchy and as suchthewaveband is treatedsame type but without concatenation but all belonging to the samewayLSP, the explicit ordered list of allother upper layer labels are treated. As far assignals that take part in theMPLS protocols are concerned thereLSP is returned. 9.2. Generalized Label Request The Generalized Label Request islittle difference betweenawaveband label andnew object/TLV to be added in an RSVP-TE Path message instead of the regular Label Request, or in awavelength label except that semanticallyCR-LDP Request message in addition to thewavebandalready existing TLVs. Only one label request can besubdivided into wavelengths whereas the wavelengthused per message, so a single LSP canonlybesubdivided intorequested at a timeor statistically multiplexed labels. Inper signaling message. The Generalized Label Request gives three major characteristics (parameters) required to support thecontext of waveband switching,LSP being requested: thegeneralized labelLSP Encoding Type, the Switching Type that must be usedto indicate a waveband contains three fields, a waveband ID, a Start Labelandan End Label.the LSP payload type called Generalized PID (G-PID). TheStart and End Labels are channel identifiers fromLSP Encoding Type indicates thesender perspectiveencoding type thatidentify respectively,will be used with thelowest value wavelengthdata associated with the LSP, i.e. the type of technology being considered. For instance, it can be SDH, SONET, Ethernet, ANSI PDH, etc. It represents the nature of the LSP, and not thehighest value wavelength making upnature of thewaveband. 9.8. Label Suggestion bylinks that theUpstream GMPLS allows for a label to be optionally suggestedLSP traverses. This is used hop-by-hop byan upstreameach node.This suggestionA link maybe overridden bysupport adownstream node but in some cases, at the cost of higher LSP setup time. The suggested label is valuable when establishing LSPs through certain kindsset ofoptical equipmentencoding formats, wherethere may besupport means that alengthy (in electrical terms) delay in configuring the switching fabric. For example micro mirrors may havelink is able tobe elevated or moved, and this physical motioncarry andsubsequent damping takes time. Ifswitch a signal of one or more of these encoding formats. The Switching Type indicates then thelabels and hencetype of switchingfabric are configuredthat should be performed on a particular link for that LSP. This information is needed for links that advertise more than one type of switching capability. Nodes must verify that the type indicated in thereverse direction (the norm)Switching Type is supported on theMAPPING/Resvcorresponding incoming interface; otherwise the node must generate a notification messagemay need to be delayedwith a "Routing problem/Switching Type" indication. The LSP payload type (G-PID) identifies the payload carried by10'sthe LSP, i.e. an identifier ofmilliseconds per hop in order to establish a usable forwarding path. It can be important for restoration purposes where alternate LSPs may need to be rapidly established as a resultthe client layer ofnetwork failures. E. Mannie et. al. Internet-Draft September 2002 31 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 9.9. Label Restriction bythat LSP. For some technologies it also indicates theUpstream An upstream node can optionally restrict (limit)mapping used by thechoice of labelclient layer, e.g. byte synchronous mapping ofa downstream nodeE1. This must be interpreted according toa set of acceptable labels. Giving lists and/or rangesthe LSP encoding type ofinclusive (acceptable) or exclusive (unacceptable) labels in a Label Set provides this restriction. If not applied, all labels fromthevalid label range may be used. There areLSP and is used by the nodes atleast four cases wherethe endpoints of the LSP to know to which client layer alabel restrictionrequest isusefuldestined, and in some cases by the"optical" domain. 1. The first case is wherepenultimate hop. Other technology specific parameters are not transported in theend equipment is only capable of transmitting and receiving on a smallGeneralized Label Request but in technology specific traffic parameters as explained hereafter. Currently, two set ofwavelengths/bands. 2. The second case is where there is a sequence of interfaces, which cannot support wavelength conversiontraffic parameters are defined, one for SONET/SDH andrequire the same wavelengthone for G.709. Note that it is expected than specific traffic parameters will beused end-to-end overdefined in the future for photonic (all optical) switching. E. Mannie et. al. Internet-Draft February 2003 30 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 9.3. SONET/SDH Traffic Parameters The GMPLS SDH/SONET traffic parameters [SONETSDH-GMPLS] specify asequencepowerful set ofhops, or even an entire path. 3.capabilities for SONET (ANSI T1.105) and SDH (ITU-T G.707). Optional non-standard capabilities are also available in [SONETSDH-EXT-GMPLS]. Thethird case is where it is desirable to limitfirst traffic parameter specifies theamounttype ofwavelength conversion being performed to reducethedistortionelementary SONET/SDH signal that comprises the requested LSP, e.g. VC-11, VT6, VC-4, STS-3c, etc. Several transforms can then be applied successively on theoptical signals. 4. The last case is where two ends of a link support different sets of wavelengths. The receiver of a Label Set must restrict its choice of labelselementary Signal to build the final signal being actually requested for the LSP. These transforms are the contiguous concatenation, the virtual concatenation, the transparency and the multiplication. Each onethatis optional. They must be applied strictly in theLabel Set. A Label Set mayfollowing order: - First, contiguous concatenation can bepresent across multiple hops. In this case each node generates it's own outgoing Label Set, possibly basedoptionally applied on theincoming Label Set andElementary Signal, resulting in a contiguously concatenated signal. - Second, virtual concatenation can be optionally applied either directly on thenode's hardware capabilities. This case is expected toelementary Signal, or on the contiguously concatenated signal obtained from the previous phase. - Third, some transparency can be optionally specified when requesting a frame as signal rather than a container. Several transparency packages are defined. - Fourth, a multiplication can be optionally applied either directly on thenorm for nodes with conversion incapable interfaces. 9.10. Bi-directional LSP GMPLS allows establishment of bi-directional symmetric LSPs (not of asymmetric LSPs). A symmetric bi-directional LSP haselementary Signal, or on the contiguously concatenated signal obtained from the first phase, or on the virtually concatenated signal obtained from the second phase, or on these signals combined with some transparency. For RSVP-TE, thesameSONET/SDH trafficengineering requirements including fate sharing, protection and restoration, LSRs, and resource requirements (e.g. latency and jitter)parameters are carried ineach direction. Ina new SENDER_TSPEC and FLOWSPEC. The same format is used for both. There is no Adspec associated with theremainderSENDER_TSPEC, either it is omitted or a default value is used. The content ofthis section,theterm "initiator" is used to refer toFLOWSPEC object received in anode that startsResv message should be identical to theestablishmentcontent ofan LSP andtheterm "terminator" is used to refer toSENDER_TSPEC of thenode thatcorresponding Path message. In other words, the receiver is normally not allowed to change thetargetvalues of theLSP.traffic parameters. However some level of negotiation may be achieved as explained in [SONETSDH-GMPLS] For CR-LDP, the SONET/SDH traffic parameters are simply carried in abi-directional LSPs, therenew TLV. Note that a general discussion on SDH/SONET and GMPLS can be found in [SDH/SONET-GMPLS-FRAMEWORK]. 9.4. G.709 Traffic Parameters Simply said, an ITU-T G.709 based network isonly one initiatordecomposed in two major layers: an optical layer (i.e. made of wavelengths) andone terminator. Normally to establishabi-directional LSP when using [RSVP-TE] or [CR-LDP]digital layer. These twounidirectional paths must be independently established. This approach has the following disadvantages: 1. The latency to establish the bi-directional LSP is equal to one round trip signaling time plus one initiator-terminator signaling transit delay. This not only extendslayers are divided into sub-layers and switching occurs at two specific sub-layers: at thesetup latency forOCh (Optical Channel) E. Mannie et. al. Internet-DraftSeptember 2002 32 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 31 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002successful LSP establishment, but it extendsoptical layer and at theworst-case latency for discovering an unsuccessful LSPODU (Optical channel Data Unit) electrical layer. The ODUk notation is used toas much as two times the initiator-terminator transit delay. These delays are particularly significant for LSPs that are establisheddenotes ODUs at different bandwidths. The GMPLS G.709 traffic parameters [G709-GMPLS] specify a powerful set of capabilities forrestoration purposes. 2.ITU-T G.709 networks. Thecontrol overhead is twice thatfirst traffic parameter specifies the type ofa unidirectional LSP. This is because separate control messages (e.g. Path and Resv) mustthe elementary G.709 signal that comprises the requested LSP, e.g. ODU1, OCh at 40 Gbps, etc. Several transforms can then begeneratedapplied successively on the elementary Signal to build the final signal being actually requested forboth segments ofthebi-directionalLSP.3. Because the resourcesThese transforms areestablished in separate segments, route selection is complicated. Therethe virtual concatenation and the multiplication. Each one of these transforms isalso additional potential race for conditionsoptional. They must be applied strictly inassignment of resources, which decreasestheoverall probability of successfully establishingfollowing order: - First, virtual concatenation can be optionally applied directly on thebi-directional connection. 4. It is more difficult to provideelementary Signal, - Second, aclean interface for SDH/SONET equipment that may relymultiplication can be optionally applied, either directly onbi-directional hop-by-hop pathsthe elementary Signal, or on the virtually concatenated signal obtained from the first phase. Additional ODUk Multiplexing traffic parameters allow indicating an ODUk mapping (ODUj into ODUk) forprotection switching. Note that existing SDH/SONET gear transmitsan ODUk multiplexing LSP request. G.709 supports thecontrol information in-bandfollowing multiplexing capabilities: ODUj into ODUk (k > j); and ODU1 with ODU2 multiplexing into ODU3. For RSVP-TE, thedata. 5. Bi-directional optical LSPs (or lightpaths)SONET/SDH traffic parameters areseen ascarried in arequirementnew SENDER-TSPEC and FLOWSPEC. The same format is used formany optical networking service providers. With bi-directional LSPs bothboth. There is no Adspec associated with thedownstream and upstream data paths, i.e. from initiator to terminator and terminator to initiator, are established usingSENDER_TSPEC, either it is omitted or asingle setdefault value is used. The content ofsignaling messages. This reducesthesetup latencyFLOWSPEC object received in a Resv message should be identical toessentially one initiator- terminator round trip time plus processing time, and limitsthecontrol overhead tocontent of thesame numberSENDER_TSPEC ofmessages asthe corresponding Path message. For CR-LDP, the SONET/SDH traffic parameters are simply carried in aunidirectional LSP.new TLV. 9.5. Bandwidth Encoding Some technologies that do not have (yet) specific traffic parameters just require a bandwidth encoding transported in a generic form. Bandwidth is carried in 32-bit number in IEEE floating-point format (the unit is bytes per second). Values are carried in a per protocol specific manner. Forbi-directionalnon-packet LSPs,two labels mustit is useful to define discrete values to identify the bandwidth of the LSP. It should beallocated. Bi- directional LSP setupnoted that this bandwidth encoding do not apply to SONET/SDH and G.709, for which the traffic parameters fully define the requested SONET/SDH or G.709 signal. The bandwidth isindicated bycoded in thepresencePeak Data Rate field ofan Upstream LabelInt-Serv objects for RSVP-TE in theappropriate signaling message. 9.11. Bi-directional LSP Contention Resolution Contention for labels may occur between two bi-directional LSP setup requests travelingSENDER_TSPEC and FLOWSPEC objects; and inopposite directions. This contention occurs when both sides allocateE. Mannie et. al. Internet-Draft February 2003 32 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 thesame resources (ports) at effectivelyPeak and Committed Data Rate fields of thesame time.CR-LDP Traffic Parameters TLV. 9.6. Generalized Label TheGMPLS signaling defines a procedure to resolve that contention, basicallyGeneralized Label extends thenodetraditional MPLS label by allowing the representation of not only labels that travel in-band with associated data packets, but also (virtual) labels that identify time-slots, wavelengths, or space division multiplexed positions. For example, thehigher node IDGeneralized Label may identify (a) a single fiber in a bundle, (b) a single waveband within fiber, (c) a single wavelength within a waveband (or fiber), or (d) a set of time-slots within a wavelength (or fiber). It may also be a generic MPLS label, a Frame Relay label, or an ATM label (VCI/VPI). The format of a label can be as simple as an integer value such as a wavelength label or can be more elaborated such as an SDH/SONET or a G.709 label. SDH and SONET define each a multiplexing structure. These multiplexing structures willwin the contention. To reducebe used as naming trees to create unique labels. Such a label will identify theprobabilityexact position (times- lot(s)) ofcontention, some mechanisms are also suggested. 9.12. Rapid Notificationa signal in a multiplexing structure. Since the SONET multiplexing structure may be seen as a subset ofFailure GMPLS defines several signaling extensions that enable expedited notificationthe SDH multiplexing structure, the same format offailureslabel is used for SDH andother eventsSONET. A similar concept is applied to build a label at the G.709 ODU layer. Since the nodesresponsible for restoring failed LSPs,sending anderror handling. E. Mannie et. al. Internet-Draft September 2002 33 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 1. Acceptable Label Set for notification onreceiving the Generalized LabelError: Thereknow what kinds of link they arecases in traditional MPLS and in GMPLS that result in an error message containing an "Unacceptable label value" indication. When these cases occur, it can useful forusing, thenode generatingGeneralized Label does not identify its type, instead theerror messagenodes are expected toindicate which labels would be acceptable. To cover this case, GMPLS introducesknow from theabilitycontext what type of label toconvey such information via the "Acceptable Label Set". An Acceptableexpect. A Generalized LabelSet is carried in appropriate protocol specific error messages. The formatonly carries a single level ofan Acceptable Label Setlabel, i.e. it isidentical to a Label Set. 2. Expedited notification: Extensions to RSVP-TE enable expedited notificationnon-hierarchical. When multiple levels offailures and other events to determined nodes. For CR-LDP therelabels (LSPs within LSPs) are required, each LSP must be established separately. 9.7. Waveband Switching A special case of wavelength switching isnot currentlywaveband switching. A waveband represents asimilar mechanism. The first extension identifies where event notifications areset of contiguous wavelengths, which can be switched together to a new waveband. For optimization reasons it may besent. The second providesdesirable forgeneral expedited event notification withaNotify message. Such extensions can be used by fast restoration mechanisms. Notificationsphotonic cross-connect to optically switch multiple wavelengths as a unit. This maybe requested in bothreduce theupstreamdistortion on the individual wavelengths anddownstream directions. The Notify message differs frommay allow tighter separation of thecurrentlyindividual wavelengths. A Waveband label is definederror messages in that it can be "targeted"toa node other than the immediate upstream or downstream neighborsupport this special case. Waveband switching naturally introduces another level of label hierarchy andthat itas such the waveband isa generalized notification mechanism. The Notify message does not replace existing error messages. The Notify message may be sent either (a) normally, where non-target nodes just forwardtreated theNotify message tosame way all other upper layer labels are treated. As far as thetarget node, similar to ResvConf processing in [RSVP]; or (b) encapsulated in a new IP header whose destinationMPLS protocols are concerned there isequal tolittle difference between a waveband label and a wavelength label except that semantically thetarget IP address. 3. Faster removal of intermediate states: A specific RSVP optimization allowing in some caseswaveband can be E. Mannie et. al. Internet-Draft February 2003 33 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 subdivided into wavelengths whereas the wavelength can only be subdivided into time or statistically multiplexed labels. In thefaster removalcontext ofintermediate states. This extension iswaveband switching, the generalized label used todeal with specific RSVP mechanisms. 9.13. Link Protection Protection information is carried in the new optional Protection Information Object/TLV. It currently indicates the desired link protection for each link of an LSP. Ifindicate aparticular protection type, i.e., 1+1, or 1:N, is requested, thenwaveband contains three fields, aconnection request is processed only ifwaveband ID, a Start Label and an End Label. The Start and End Labels are channel identifiers from thedesired protection type can be honored. Notesender perspective thatGMPLS advertisesidentify respectively, theprotection capabilities of a link inlowest value wavelength and therouting protocols. Path computation algorithms may take this information into account when computing paths for settinghighest value wavelength making upLSPs. Protection information also indicates iftheLSP is a primary or secondary LSP. A secondary LSP iswaveband. 9.8. Label Suggestion by the Upstream GMPLS allows for abackuplabel to be optionally suggested by an upstream node. This suggestion may be overridden by aprimary LSP.downstream node but in some cases, at the cost of higher LSP setup time. Theresourcessuggested label is valuable when establishing LSPs through certain kinds of optical equipment where there may be asecondary LSP are normally not used untillengthy (in electrical terms) delay in configuring theprimary LSP fails, but theyswitching fabric. For example micro mirrors may have to beused by other LSPs until the primary LSP fails overelevated or moved, and this physical motion and subsequent damping takes time. If thesecondary LSP. At that point, any LSP that is usinglabels and hence switching fabric are configured in theresources forreverse direction (the norm) thesecondary LSP mustMAPPING/Resv message may need to bepreempted. E. Mannie et. al. Internet-Draft September 2002 34 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 Six link protection types are currently defined as individual flags anddelayed by 10's of milliseconds per hop in order to establish a usable forwarding path. It can becombined: enhanced, dedicated 1+1, dedicated 1:1, shared, unprotected, extra traffic. See [GMPLS-SIG] section 7.1important for restoration purposes where alternate LSPs may need to be rapidly established as aprecise definitionresult ofeach. 9.14. Explicit Routing and Explicitnetwork failures. 9.9. LabelControl By using an explicit route the path takenRestriction byan LSPthe Upstream An upstream node canbe controlled more or less precisely. Typically,optionally restrict (limit) the choice of label of a downstream node to a set of acceptable labels. Giving lists and/or ranges of inclusive (acceptable) or exclusive (unacceptable) labels in a Label Set provides this restriction. If not applied, all labels from the valid label range may be used. There are at least four cases where a label restriction is useful in the "optical" domain. 1. The first case is where thehead-end equipment is only capable ofan LSP finds an explicit route and builds an Explicit Route Object (ERO)/ Explicit Route (ER) TLV that contains that route. Possibly, the edge node does not build any explicit route,transmitting andjust transmitreceiving on a small specific set of wavelengths/bands. 2. The second case is where there is asignaling request tosequence of interfaces, which cannot support wavelength conversion and require the same wavelength be used end-to-end over adefault neighbor LSR (as IP/MPLS hosts would). For instance,sequence of hops, or even anexplicit route could be addedentire path. 3. The third case is where it is desirable toa signaling message bylimit thefirst switching node, on behalfamount of wavelength conversion being performed to reduce theedge node. Note also that an explicit route is altered by intermediate LSRs during its progression towardsdistortion on thedestination.optical signals. 4. Theexplicit routelast case isoriginally defined by MPLS-TE aswhere two ends of alistlink support different sets ofabstract nodes (i.e. groupswavelengths. The receiver ofnodes) alonga Label Set must restrict its choice of labels to one that is in theexplicit route. Each abstract node canLabel Set. A Label Set may bean IPv4 address prefix, an IPv6 address prefix, or an AS number.present across multiple hops. In this case each node generates it's own outgoing E. Mannie et. al. Internet-Draft February 2003 34 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 Label Set, possibly based on the incoming Label Set and the node's hardware capabilities. Thiscapabilitycase is expected to be the norm for nodes with conversion incapable interfaces. 9.10. Bi-directional LSP GMPLS allows establishment of bi-directional symmetric LSPs (not of asymmetric LSPs). A symmetric bi-directional LSP has thegeneratorsame traffic engineering requirements including fate sharing, protection and restoration, LSRs, and resource requirements (e.g. latency and jitter) in each direction. In the remainder of this section, theexplicit routeterm "initiator" is used tohave incomplete information aboutrefer to a node that starts thedetailsestablishment of an LSP and thepath. Interm "terminator" is used to refer to thesimplest case, an abstractnodecan be a full IP address (32 bits)thatidentifies a specific node (calledis the target of the LSP. For asimple abstract node). MPLS-TE allows strictbi-directional LSPs, there is only one initiator andloose abstract nodes. The path betweenone terminator. Normally to establish astrict node and its preceding nodebi-directional LSP when using [RSVP-TE] or [CR-LDP] two unidirectional paths mustinclude only network nodes frombe independently established. This approach has thestrict node and its preceding abstract node.following disadvantages: 1. Thepath between a loose node and its preceding abstract node may include other network nodes that are not part oflatency to establish theloose node or its preceding abstract node.bi-directional LSP is equal to one round trip signaling time plus one initiator-terminator signaling transit delay. Thisexplicit route was extendednot only extends the setup latency for successful LSP establishment, but it extends the worst-case latency for discovering an unsuccessful LSP toinclude interface numbersasabstract nodes to support unnumbered interfaces; and further extended by GMPLS to include labelsmuch asabstract nodes. Having labelstwo times the initiator-terminator transit delay. These delays are particularly significant for LSPs that are established for restoration purposes. 2. The control overhead is twice that of a unidirectional LSP. This is because separate control messages (e.g. Path and Resv) must be generated for both segments of the bi-directional LSP. 3. Because the resources are established inan explicitseparate segments, route selection isan important feature that allows controllingcomplicated. There is also additional potential race for conditions in assignment of resources, which decreases theplacementoverall probability ofan LSP with a very fine granularity. Thissuccessfully establishing the bi-directional connection. 4. It is morelikelydifficult tobe usedprovide a clean interface forTDM, LSC and FSC links. In particular,SDH/SONET equipment that may rely on bi-directional hop-by-hop paths for protection switching. Note that existing SDH/SONET gear transmits theexplicit labelcontrolininformation in-band with theexplicit route allows terminating an LSP on a particular outgoing port of an egress node. Indeed, a label sub-object/TLV must followdata. 5. Bi-directional optical LSPs (or lightpaths) are seen as asub-object/TLV containing the IP address, or the interface identifier (in case of unnumbered interface), associated withrequirement for many optical networking service providers. With bi-directional LSPs both thelink on which it isdownstream and upstream data paths, i.e. from initiator tobe used. This can also be used when it is desirableterminator and terminator to"splice" two LSPs together, i.e. where the tailinitiator, are established using a single set of signaling messages. This reduces thefirst LSP would be "spliced" into the head ofsetup latency to essentially one initiator- terminator round trip time plus processing time, and limits thesecond LSP.E. Mannie et. al. Internet-DraftSeptember 2002February 2003 35draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002Another use is when an optimization algorithm is used for an SDH/SONET network. This algorithm can provide very detailed explicit routes, including the label (time-slot) to use on a link, in ordercontrol overhead tominimizethefragmentationsame number of messages as a unidirectional LSP. For bi-directional LSPs, two labels must be allocated. Bi- directional LSP setup is indicated by theSDH/SONET multiplex on the corresponding interface. 9.15. Route recording In order to improve the reliability and the manageabilitypresence of an Upstream Label in the appropriate signaling message. 9.11. Bi-directional LSPbeing established,Contention Resolution Contention for labels may occur between two bi-directional LSP setup requests traveling in opposite directions. This contention occurs when both sides allocate theconcept ofsame resources (ports) at effectively theroute recording was introduced in RSVP-TE to function as: - First,same time. The GMPLS signaling defines aloop detection mechanismprocedure todiscover L3 routing loops, or loops inherent inresolve that contention, basically theexplicit route (this mechanism is strictly exclusivenode with theuse of explicit routing objects). - Second, a route recording mechanism collects up-to-date detailed path information on a hop-by-hop basis duringhigher node ID will win theLSP setup process. This mechanism provides valuable information tocontention. To reduce thesourceprobability of contention, some mechanisms are also suggested. 9.12. Rapid Notification of Failure GMPLS defines several signaling extensions that enable expedited notification of failures anddestination nodes. Any intermediate routing change at setup time,other events to nodes responsible for restoring failed LSPs, and error handling. 1. Acceptable Label Set for notification on Label Error: There are cases incase of loose explicit routing, will be reported. - Third, a recorded routetraditional MPLS and in GMPLS that result in an error message containing an "Unacceptable label value" indication. When these cases occur, it canbe used as input for an explicit route. This isusefulif a source node receivesfor therecorded route from a destinationnodeand applies it as an explicit route in order to "pin down the path". Withingenerating the error message to indicate which labels would be acceptable. To cover this case, GMPLSarchitecture onlyintroduces thesecond and third functions are mainly applicable for TDM, LSC and FSC layers. 9.16. LSP modification and LSP re-routing LSP modification and re-routing are two features already available in MPLS-TE. GMPLS does not add anything new. Elegant re-routing is possible withability to convey such information via theconcept"Acceptable Label Set". An Acceptable Label Set is carried in appropriate protocol specific error messages. The format of"make-before-break" wherebyanold pathAcceptable Label Set isstill used whileidentical to anew path is set up by avoiding double reservationLabel Set. 2. Expedited notification: Extensions to RSVP-TE enable expedited notification ofresources. Then, the node performing the re-routing can swap on the new pathfailures andclose the old path. This featureother events to determined nodes. For CR-LDP there issupportednot currently a similar mechanism. The first extension identifies where event notifications are to be sent. The second provides for general expedited event notification withRSVP-TE (using shared explicit filters) and CR-LDP (using the action indicator flag). LSP modification consistsa Notify message. Such extensions can be used by fast restoration mechanisms. Notifications may be requested inchanging some LSP parameters, but normally without changing the route. It is supported using the same mechanism as re-routing. However,both thesemantic of LSP modification will differupstream and downstream directions. The Notify message differs fromone technology totheother. For instance, further studies are requiredcurrently defined error messages in that it can be "targeted" tounderstand the impact of dynamically changing some SDH/SONET circuit characteristics such asa node other than thebandwidth,immediate upstream or downstream neighbor and that it is a generalized notification mechanism. The Notify message does not replace existing error messages. The Notify message may be sent either (a) normally, where non-target nodes just forward theprotection type,Notify message to thetransparency,target node, similar to ResvConf processing in [RSVP]; or (b) encapsulated in a new IP header whose destination is equal to theconcatenation, etc.target IP address. E. Mannie et. al. Internet-DraftSeptember 2002February 2003 36draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 20029.17. LSP administrative status handling GMPLS provides the optional capability to indicate3. Faster removal of intermediate states: A specific RSVP optimization allowing in some cases theadministrative statusfaster removal ofan LSP by using a new Admin Status object/TLV. Administrative Status Informationintermediate states. This extension iscurrentlyusedin two ways. In the first usage, Admin Status the object/TLVto deal with specific RSVP mechanisms. 9.13. Link Protection Protection information is carried ina Path/Label Request or Resv/Label Mapping message to indicatetheadministrative statenew optional Protection Information Object/TLV. It currently indicates the desired link protection for each link of an LSP.In this usage, Administrative Status Information indicatesIf a particular protection type, i.e., 1+1, or 1:N, is requested, then a connection request is processed only if the desired protection type can be honored. Note that GMPLS advertises thestateprotection capabilities ofthe LSP, which include "up" or "down", if it ina"testing" mode, and if deletion islink inprogress. Based on that administrative status, a node canthe routing protocols. Path computation algorithms may takelocal decisions, like to inhibit alarm reportingthis information into account whenancomputing paths for setting up LSPs. Protection information also indicates if the LSP isin "down" or "testing" states, or to report alarms associated with the connection atapriority equal toprimary orless than "Non service affecting". Itsecondary LSP. A secondary LSP ispossible that some nodes along ana backup to a primary LSP. The resources of a secondary LSPwillare normally notsupportused until theAdmin Status Object/TLV. Inprimary LSP fails, but they may be used by other LSPs until thecase of a non-supporting transit node,primary LSP fails over theobject will pass throughsecondary LSP. At that point, any LSP that is using thenode unmodifiedresources for the secondary LSP must be preempted. Six link protection types are currently defined as individual flags andnormal processingcancontinue. In some circumstances, particularly optical networks, it is useful to set the administrative statusbe combined: enhanced, dedicated 1+1, dedicated 1:1, shared, unprotected, extra traffic. See [GMPLS-SIG] section 7.1 for a precise definition of each. 9.14. Explicit Routing and Explicit Label Control By using an explicit route the path taken by an LSPto "being deleted" before tearing it down in order to avoid non-useful generation of alarms. The ingress LSR precedescan be controlled more or less precisely. Typically, the node at the head- end of an LSPdeletion by insertingfinds anappropriate Admin Status Object/TLV in a Path/Label Request (with the modification action indicator flag set to modify) message. Transit LSRs processexplicit route and builds an Explicit Route Object (ERO)/ Explicit Route (ER) TLV that contains that route. Possibly, theAdmin Status Object/TLVedge node does not build any explicit route, andforward it. The egress LSR answers injust transmit aResv/Label Mapping (with the modification action indicator flag setsignaling request tomodify) message with the Admin Status object. Upon receiving this message and object, the ingress node sendsaPathTear/Release message downstreamdefault neighbor LSR (as IP/MPLS hosts would). For instance, an explicit route could be added toremovea signaling message by theLSP and normal RSVP/CR-LDP processing takes place. Infirst switching node, on behalf of thesecond usage,edge node. Note also that an explicit route is altered by intermediate LSRs during its progression towards theAdmin Status object/TLVdestination. The explicit route iscarried inoriginally defined by MPLS-TE as aNotification/Label Mapping (with the modification action indicator flag set to modify) message to request thatlist of abstract nodes (i.e. groups of nodes) along theingressexplicit route. Each abstract nodechange the administrative state ofcan be anLSP.IPv4 address prefix, an IPv6 address prefix, or an AS number. This capability allowsintermediate and egress nodes to triggerthesetting of administrative status. In particular this allows, intermediate or egress LSRs to request a releasegenerator ofan LSP initiated bytheingress node. 9.18. Control channel separation In GMPLS, a control channel can be separated fromexplicit route to have incomplete information about thedata channel. Indeed,details of thecontrol channelpath. In the simplest case, an abstract node can beimplemented completely out-of- band for various reasons, e.g. whena full IP address (32 bits) that identifies a specific node (called a simple abstract node). MPLS-TE allows strict and loose abstract nodes. The path between a strict node and its preceding node must include only network nodes from thedata channel cannot carry in-band control information. This issue was even originally introduced to MPLS in connection with link bundling.strict node and its preceding abstract node. The path E. Mannie et. al. Internet-DraftSeptember 2002February 2003 37draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002In traditional MPLS there is an implicit one-to-one association of a control channel to a data channel. When such an association is present, no additional or special information is required to associate a particular LSP setup transaction with a particular data channel. Otherwise it is necessary to convey additional information in signaling to identify the particular data channel being controlled. GMPLS supports explicit data channel identification by providing interface identification information. GMPLS allows the use ofbetween anumber of interface identification schemes including IPv4 or IPv6 addresses, interface indexes (for unnumbered interfaces)loose node andcomponent interfaces (for bundled interfaces), unnumbered bunled interfacesits preceding abstract node may include other network nodes that arealso supported. The choicenot part of thedataloose node or its preceding abstract node. This explicit route was extended to include interface numbers as abstract nodes tousesupport unnumbered interfaces; and further extended by GMPLS to include labels as abstract nodes. Having labels in an explicit route isalways made byan important feature that allows controlling thesenderplacement ofthe Path/Label Request message,an LSP with a very fine granularity. This is more likely to be used for TDM, LSC andindicated by includingFSC links. In particular, thedata channel's interface identifierexplicit label control in themessage usingexplicit route allows terminating an LSP on anew RSVP_HOP object sub-type/Interface TLV. For bi-directional LSPs,particular outgoing port of an egress node. Indeed, a label sub-object/TLV must follow a sub-object/TLV containing thesender choosesIP address, or thedatainterfacein each direction. In all cases but bundling,identifier (in case of unnumbered interface), associated with theupstream interfacelink on which it isimplied by the downstream interface. For bundling, the Path/Label Request sender explicitly identifies the component interfaceto be used. This can also be usedin each direction. The new object/TLVwhen it isused in Resv/Label Mapping messagedesirable toindicate"splice" two LSPs together, i.e. where thedownstream node's usagetail of theindicated interface(s). The new object/TLV can contain a list of embedded TLVs, each embedded TLV canfirst LSP would be "spliced" into the head of the second LSP. Another use is when anIPv4 address, and IPv6 address,optimization algorithm is used for aninterface index,SDH/SONET network. This algorithm can provide very detailed explicit routes, including the label (time-slot) to use on adownstream component interface ID or an upstream component interface ID. Inlink, in order to minimize thelast three cases,fragmentation of the SDH/SONET multiplex on the corresponding interface. 9.15. Route recording In order to improve theembedded TLV contains itself an IP address plus an Interface ID,reliability and theIP addressmanageability of the LSP beingused to identifyestablished, theinterface ID (it can beconcept of therouter ID for instance). There are cases where it is usefulroute recording was introduced in RSVP-TE toindicatefunction as: - First, aspecific interface associatedloop detection mechanism to discover L3 routing loops, or loops inherent in the explicit route (this mechanism is strictly exclusive withan error. To support these casestheIF_ID ERROR_SPEC RSVP Objects are defined. 10. Forwarding Adjacencies (FA) To improve scalabilityuse ofMPLS TE (and thus GMPLS) it may be useful to aggregate multiple TE LSPs insideexplicit routing objects). - Second, abigger TE LSP. Intermediate nodes seeroute recording mechanism collects up-to-date detailed path information on a hop-by-hop basis during theexternalLSPonly, they don't have to maintain forwarding states for each internal LSP, less signaling messages needsetup process. This mechanism provides valuable information tobe exchanged andtheexternal LSPsource and destination nodes. Any intermediate routing change at setup time, in case of loose explicit routing, will be reported. - Third, a recorded route can besomehow protected instead (or in addition) to the internal LSPs.used as input for an explicit route. Thiscan considerably increase the scalability of the signaling. The aggregationisaccomplished by (a) an LSR creatinguseful if aTE LSP, (b)source node receives theLSR forming a forwarding adjacency out of that LSP (advertising this LSP asrecorded route from aTraffic Engineering (TE) link into ISIS/OSPF), (c) allowing other LSRsdestination node and applies it as an explicit route in order touse forwarding adjacencies"pin down the path". Within the GMPLS architecture only the second and third functions are mainly applicable fortheir path computation,TDM, LSC and(d) nesting of LSPs originated by other LSRs intoFSC layers. 9.16. LSP modification and LSP re-routing E. Mannie et. al. Internet-DraftSeptember 2002February 2003 38draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002thatLSP(e.g. by using the label stack constructmodification and re-routing are two features already available in MPLS-TE. GMPLS does not add anything new. Elegant re-routing is possible with thecaseconcept ofIP). An LSR may (under its local configuration control) announce"make-before-break" whereby anLSP asold path is still used while aTE link into ISIS/OSPF. When this linknew path isadvertised intoset up by avoiding double reservation of resources. Then, the node performing the re-routing can swap on the new path and close the old path. This feature is supported with RSVP-TE (using shared explicit filters) and CR-LDP (using the action indicator flag). LSP modification consists in changing some LSP parameters, but normally without changing the route. It is supported using the sameinstance of ISIS/OSPFmechanism as re-routing. However, the semantic of LSP modification will differ from onethat determinestechnology to theroute taken byother. For instance, further studies are required to understand theLSP, we callimpact of dynamically changing some SDH/SONET circuit characteristics sucha link a "forwarding adjacency" (FA). We refer toas the bandwidth, the protection type, the transparency, the concatenation, etc. 9.17. LSPasadministrative status handling GMPLS provides the"forwarding adjacency LSP", or just FA- LSP. Note that sinceoptional capability to indicate theadvertised entity isadministrative status of an LSP by using alinknew Admin Status object/TLV. Administrative Status Information is currently used inISIS/OSPF, bothtwo ways. In theendpoint LSRs offirst usage, Admin Status theFA-LSP must belongobject/TLV is carried in a Path/Label Request or Resv/Label Mapping message to indicate thesame ISIS level/OSPF area (intra-area improvementadministrative state ofscalability).an LSP. Ingeneral, creation/terminationthis usage, Administrative Status Information indicates the state of the LSP, which include "up" or "down", if it in aFA"testing" mode, andits FA-LSP could be driven either by mechanisms outside of MPLS (e.g., via configuration controlif deletion is in progress. Based on that administrative status, a node can take local decisions, like to inhibit alarm reporting when an LSP is in "down" or "testing" states, or to report alarms associated with theLSRconnection atthe head-end of the adjacency), or by mechanisms within MPLS (e.g., asaresult ofpriority equal to or less than "Non service affecting". It is possible that some nodes along an LSP will not support theLSR atAdmin Status Object/TLV. In thehead-endcase of a non-supporting transit node, theadjacency receiving LSP setup requests originated by some other LSRs). ISIS/OSPF floodsobject will pass through theinformation about FAs just asnode unmodified and normal processing can continue. In some circumstances, particularly optical networks, itfloodsis useful to set theinformation about any other links. As a resultadministrative status ofthis flooding,anLSR hasLSP to "being deleted" before tearing it down in order to avoid non-useful generation of alarms. The ingress LSR precedes an LSP deletion by inserting an appropriate Admin Status Object/TLV inits TE link state database the information about not just conventional links, but FAs as well. An LSR, when performing path computation, uses not just conventional links, but FAs as well. Onceapath is computed,Path/Label Request (with the modification action indicator flag set to modify) message. Transit LSRs process the Admin Status Object/TLV and forward it. The egress LSRuses RSVP- TE/CR-LDP for establishing label binding alonganswers in a Resv/Label Mapping (with thepath. FAs need simple extensionsmodification action indicator flag set tosignaling and routing protocols. 10.1. Routingmodify) message with the Admin Status object. Upon receiving this message andForwarding Adjacencies Forwarding adjacencies may be represented as either unnumbered or numbered links. A FA can also beobject, the ingress node sends abundle of LSPs between two nodes. FAs are advertised as GMPLS TE links such as defined in [HIERARCHY]. GMPLS TE links are advertised in OSPFPathTear/Release message downstream to remove the LSP andISIS such as definednormal RSVP/CR-LDP processing takes place. E. Mannie et. al. Internet-Draft February 2003 39 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 In the second usage, the Admin Status object/TLV is carried in[OSPF-TE-GMPLS] and [ISIS-TE-GMPLS]. These last two specifications enhance [OSPF-TE] and [ISIS-TE] that defines a base TE link. WhenaFA is created dynamically, its TE attributes are inherited fromNotification/Label Mapping (with theFA-LSPmodification action indicator flag set to modify) message to request thatinduced its creation. [HIERARCHY] specifies how each TE parameter oftheFA is inherited fromingress node change theFA-LSP. Note thatadministrative state of an LSP. This allows intermediate and egress nodes to trigger thebandwidthsetting of administrative status. In particular this allows, intermediate or egress LSRs to request a release of an LSP initiated by theFA mustingress node. 9.18. Control channel separation In GMPLS, a control channel can beat least as big asseparated from theFA-LSP that induced it, but maydata channel. Indeed, the control channel can bebigger if only discrete bandwidths are availableimplemented completely out-of- band for various reasons, e.g. when theFA-LSP.data channel cannot carry in-band control information. This issue was even originally introduced to MPLS in connection with link bundling. Ingeneral, for dynamically provisioned forwarding adjacencies,traditional MPLS there is an implicit one-to-one association of apolicy-based mechanism may be needed to associate attributescontrol channel toforwarding adjacencies. A FA advertisement could contain the information about the path taken by the FA-LSP associated with that FA. Other LSRs may use this information for path computation. Thisa data channel. When such an association is present, no additional or special information iscarried inrequired to associate anew OSPF and IS-IS TLV called the Path TLV. E. Mannie et. al. Internet-Draft September 2002 39 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 Itparticular LSP setup transaction with a particular data channel. Otherwise it ispossible that the underlying pathnecessary to convey additional informationmight change over time, via configuration updates, or dynamic route modifications, resultingin signaling to identify thechange of that TLV. If forwarding adjacencies are bundled (via link bundling), and ifparticular data channel being controlled. GMPLS supports explicit data channel identification by providing interface identification information. GMPLS allows theresulting bundled link carriesuse of aPath TLV, the underlying path followed by eachnumber ofthe FA-LSPs that form theinterface identification schemes including IPv4 or IPv6 addresses, interface indexes (for unnumbered interfaces) and componentlinks must beinterfaces (for bundled interfaces), unnumbered bunled interfaces are also supported. The choice of thesame. Itdata interface to use isexpected that forwarding adjacencies will not be used for establishing ISIS/OSPF peering relation between the routers atalways made by theendssender of theadjacency. LSP hierarchy could exist both with the peer and with the overlay models. With the peer model the LSP hierarchy is realized via FAs and an LSP is both createdPath/Label Request message, andused as a TE linkindicated byexactlyincluding thesame instance ofdata channel's interface identifier in thecontrol plane. Creating LSP hierarchy with overlays doesn't involvemessage using a new RSVP_HOP object sub-type/Interface TLV. For bi-directional LSPs, theconcept of FA. Withsender chooses theoverlay model an LSP created (and maintained) by one instance ofdata interface in each direction. In all cases but bundling, theGMPLS control planeupstream interface isused as a TE linkimplied byanother instance oftheGMPLS control plane. Moreover,downstream interface. For bundling, thenodes using a TE link are expectedPath/Label Request sender explicitly identifies the component interface used in each direction. The new object/TLV is used in Resv/Label Mapping message tohave a routing and signaling adjacency. 10.2. Signaling aspects Forindicate thepurposedownstream node's usage ofprocessingtheexplicit route inindicated interface(s). The new object/TLV can contain aPath/Request messagelist ofan LSP that is toembedded TLVs, each embedded TLV can betunneled overan IPv4 address, and IPv6 address, an interface index, aforwarding adjacency,downstream component interface ID or anLSR at the head-end of the FA-LSP viewsupstream component interface ID. In theLSR atlast three cases, thetail of that FA-LSP as adjacent (oneembedded TLV contains itself an IPhop away). 10.3. Cascading of Forwarding Adjacencies Withaddress plus anintegrated model several layers are controlled usingInterface ID, thesame routing and signaling protocols. A network may then have links with different multiplexing/demultiplexing capabilities. For example, a node may be ableIP address being used tomultiplex/demultiplex individual packets on a given link, and mayidentify the interface ID (it can beablethe router ID for instance). E. Mannie et. al. Internet-Draft February 2003 40 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 There are cases where it is useful tomultiplex/demultiplex channels withinindicate aSONET payload on other links. A new OSPF and IS-IS sub-TLV has been defined to advertisespecific interface associated with an error. To support these cases themultiplexing capabilityIF_ID ERROR_SPEC RSVP Objects are defined. 10. Forwarding Adjacencies (FA) To improve scalability ofeach interface: PSC, L2SC, TDM, LSC or FSC. This sub-TLV is named the Link Multiplex Capability sub-TLV and complements the sub-TLVs defined in [OSPF-TE-GMPLS] and [ISIS-TE- GMPLS]. The information carried in this sub-TLV is used to construct LSP regions, and determine regionÆs boundaries. Path computationMPLS TE (and thus GMPLS) it maytake into account region boundaries when computingbe useful to aggregate multiple TE LSPs inside apath for anbigger TE LSP.For example, path computation may restrictIntermediate nodes see thepath taken by anexternal LSP only, they don't have toonly the links whose multiplexing/demultiplexing capability is PSC. When an LSPmaintain forwarding states for each internal LSP, less signaling messages need tocross a region boundary, it can trigger the establishment of an FA atbe exchanged and theunderlying layer (i.e.external LSP can be somehow protected instead (or in addition) to theL2SC layer).internal LSPs. This cantrigger a cascadingconsiderably increase the scalability ofFAs between layers withthefollowing obvious order: L2SC, then TDM, then LSC, and then finally FSC. E. Mannie et. al. Internet-Draft September 2002 40 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 11. Routing and Signaling Adjacencies By definition, two nodes havesignaling. The aggregation is accomplished by (a) an LSR creating arouting (ISIS/OSPF) adjacency if they are neighbors inTE LSP, (b) theISIS/OSPF sense. By definition, two nodes haveLSR forming asignaling (RSVP-TE/CR-LDP)forwarding adjacencyif they are neighbors in the RSVP-TE/CR-LDP sense. Nodes A and B are RSVP-TE neighbors if they directly exchange RSVP-TE messages (Path/Resv) (e.g.,out of that LSP (advertising this LSP asdescribed in sections 7.1.1a Traffic Engineering (TE) link into ISIS/OSPF), (c) allowing other LSRs to use forwarding adjacencies for their path computation, and7.1.2(d) nesting of[HIERARCHY]). The neighbor relationship includes exchanging RSVP-TE Hellos. By definition, a Forwarding Adjacency (FA) isLSPs originated by other LSRs into that LSP (e.g. by using the label stack construct in the case of IP). An LSR may (under its local configuration control) announce an LSP as a TELink between two GMPLS nodes whose path transits one or more other (G)MPLS nodes inlink into ISIS/OSPF. When this link is advertised into the same instance of ISIS/OSPF as the(G)MPLS control plane. If two nodes haveoneor more non-FA TE Links between them, these two nodes are expected (although not required) to havethat determines the route taken by the LSP, we call such arouting adjacency. If two nodes do not have any non-FA TE Links between them, it is expected (although not required)link a "forwarding adjacency" (FA). We refer to the LSP as the "forwarding adjacency LSP", or just FA- LSP. Note thatthese two nodes would not havesince the advertised entity is arouting adjacency. To statelink in ISIS/OSPF, both theobvious, ifendpoint LSRs of theTE links between two nodes areFA-LSP must belong tobe used for establishing LSPs,thetwo nodes must havesame ISIS level/OSPF area (intra-area improvement of scalability). In general, creation/termination of asignaling adjacency. If one wants to establish routing and/or signaling adjacency between two nodes, there mustFA and its FA-LSP could bean IP path between them. This IP path can be, for example, a TE Link with an interface switching capabilitydriven either by mechanisms outside ofPSC, anything that looks likes an IP linkMPLS (e.g.,GRE tunnel,via configuration control on the LSR at the head-end of the adjacency), or by mechanisms within MPLS (e.g., as a result of the LSR at the head-end of the adjacency receiving LSP setup requests originated by some other LSRs). ISIS/OSPF floods the information about FAs just as it floods the information about any other links. As a(bi-directional) LSP that with an interface switching capabilityresult ofPSC). Athis flooding, an LSR has in its TE linkmaystate database the information about notbe capable of being used directlyjust conventional links, but FAs as well. An LSR, when performing path computation, uses not just conventional links, but FAs as well. Once a path is computed, the LSR uses RSVP- TE/CR-LDP formaintaining routing and/orestablishing label binding along the path. FAs need simple extensions to signalingadjacencies. This is because GMPLSand routing protocols. 10.1. Routing andsignalingForwarding Adjacencies Forwarding adjacenciesrequires exchanging data on a per (IP/ISO) packet basis, and a TE link (e.g. a link between OXCs)maynotbecapable of exchanging data on a per packet basis. In this case the routing and signaling adjacencies are maintained viarepresented as either unnumbered or numbered links. A FA can also be asetbundle ofone or more control channels (see [LMP]). Two nodes may haveLSPs between two nodes. E. Mannie et. al. Internet-Draft February 2003 41 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 FAs are advertised as GMPLS TE links such as defined in [HIERARCHY]. GMPLS TE links are advertised in OSPF and ISIS such as defined in [OSPF-TE-GMPLS] and [ISIS-TE-GMPLS]. These last two specifications enhance [OSPF-TE] and [ISIS-TE] that defines a base TElink between them even if they don't havelink. When arouting adjacency. Naturally,FA is created dynamically, its TE attributes are inherited from the FA-LSP that induced its creation. [HIERARCHY] specifies how eachnodeTE parameter of the FA is inherited from the FA-LSP. Note that the bandwidth of the FA mustrun OSPF/ISIS with GMPLS extensions in order forbe at least as big as the FA-LSP thatTE link toinduced it, but may beadvertised. More precisely,bigger if only discrete bandwidths are available for thenode needs to run GMPLS extensionsFA-LSP. In general, forTE Links with an interface switching capability (see [GMPLS-ROUTING]) other than PSC, and it needsdynamically provisioned forwarding adjacencies, a policy-based mechanism may be needed torun either GMPLS or MPLS extensions for TE linksassociate attributes to forwarding adjacencies. A FA advertisement could contain the information about the path taken by the FA-LSP associated withan interface switching capability of PSC. The mechanismsthat FA. Other LSRs may use this information forControl Channel Separation [GMPLS-SIG] should be used (even if the IPpathbetween two nodescomputation. This information is carried in aTE link). I.e., RSVP-TE/CR-LDP signaling should usenew OSPF and IS-IS TLV called theInterface_ID (IF_ID) object to specify a particular TE link when establishing an LSP. E. Mannie et. al. Internet-Draft September 2002 41 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 The IPPath TLV. It is possible that the underlying pathcould consist of multiple IP hops. In this case,information might change over time, via configuration updates, or dynamic route modifications, resulting in themechanisms of sections 7.1.1 and 7.1.2change of[HIERARCHY] should be used (in addition to Control Channel Separation). 12. Control Plane Fault Handling Therethat TLV. If forwarding adjacencies aretwo major typesbundled (via link bundling), and if the resulting bundled link carries a Path TLV, the underlying path followed by each offaultsthe FA-LSPs thatcan impact a control plane. The first, referred to as control channel fault, relates toform thecase where control communicationcomponent links must be the same. It islostexpected that forwarding adjacencies will not be used for establishing ISIS/OSPF peering relation betweentwo neighboring nodes. Ifthecontrol channel is embeddedrouters at the ends of the adjacency. LSP hierarchy could exist both with thedata channel, data channel recovery procedure should solvepeer and with theproblem. Ifoverlay models. With thecontrol channelpeer model the LSP hierarchy isindependentrealized via FAs and an LSP is both created and used as a TE link by exactly the same instance of thedata channel additional procedures are required to recover from that problem. The second, referred to as nodal faults, relates tocontrol plane. Creating LSP hierarchy with overlays doesn't involve thecase where a node losses itsconcept of FA. With the overlay model an LSP created (and maintained) by one instance of the GMPLS controlstate (e.g., afterplane is used as arestart) but does not loose its data forwarding state. In transport networks, such typesTE link by another instance of the GMPLS controlplane faults should not have service impact onplane. Moreover, theexisting connections. Under such circumstances,nodes using amechanism must existTE link are expected todetecthave acontrol communication failurerouting anda recovery procedure must guarantee connection integrity at both endssignaling adjacency. 10.2. Signaling aspects For the purpose of processing thecontrol channel. For a control channel fault, once communicationexplicit route in a Path/Request message of an LSP that isrestored routing protocols are naturally abletorecover butbe tunneled over a forwarding adjacency, an LSR at theunderlying signaling protocols must indicate thathead-end of thenodes have maintained their state throughFA-LSP views thefailure. The signaling protocol must also ensure that any state changes that were instantiated duringLSR at thefailuretail of that FA-LSP as adjacent (one IP hop away). 10.3. Cascading of Forwarding Adjacencies With an integrated model several layers aresynchronized betweencontrolled using thenodes.same routing and signaling protocols. A network may then have links with different multiplexing/demultiplexing capabilities. For E. Mannie et. al. Internet-Draft February 2003 42 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 example, anodal fault,node may be able to multiplex/demultiplex individual packets on anode's control plane restartsgiven link, andlosses most of it's state information. In this case, both upstreammay be able to multiplex/demultiplex channels within a SONET payload on other links. A new OSPF anddownstream nodes must synchronize their state information with the restarted node. In order for any resynchronizationIS-IS sub-TLV has been defined tooccur the node undergoingadvertise therestart will need to preserve some information, such as it's mappingsmultiplexing capability ofincoming to outgoing labels. These issues are addressedeach interface: PSC, L2SC, TDM, LSC or FSC. This sub-TLV is named the Link Multiplex Capability sub-TLV and complements the sub-TLVs defined inprotocol specific fashions, see [RSVP- TE-GMPLS][OSPF-TE-GMPLS] and[CR-LDP-GMPLS]. Note that these cases only apply[ISIS-TE- GMPLS]. The information carried in this sub-TLV is used to construct LSP regions, and determine regionÆs boundaries. Path computation may take into account region boundaries whenthere are mechanisms to detect data channel failures independent of control channel failures. The LDP Fault tolerant draft [LDP-FT] specifiescomputing a path for an LSP. For example, path computation may restrict theprocedurespath taken by an LSP torecover from a control channel failure. [RSVP-TE-GMPLS] specifies howonly the links whose multiplexing/demultiplexing capability is PSC. When an LSP need torecover from bothcross acontrol channel failure andregion boundary, it can trigger the establishment of an FA at the underlying layer (i.e. the L2SC layer). This can trigger anode failure. E. Mannie et. al. Internet-Draft September 2002 42 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 13. LSP Protectioncascading of FAs between layers with the following obvious order: L2SC, then TDM, then LSC, andRestoration This section discusses Protectionthen finally FSC. 11. Routing andRestoration (P&R) issues for GMPLS LSPs. It is driven by the requirements outlinedSignaling Adjacencies By definition, two nodes have a routing (ISIS/OSPF) adjacency if they are neighbors in[TEWG- RESTORE] and some oftheprinciples outlinedISIS/OSPF sense. By definition, two nodes have a signaling (RSVP-TE/CR-LDP) adjacency if they are neighbors in[MPLS-RECOVERY]. It will be enhanced, as more GMPLS P&R mechanismsthe RSVP-TE/CR-LDP sense. Nodes A and B aredefined. The scopeRSVP-TE neighbors if they directly exchange RSVP-TE messages (Path/Resv) (e.g., as described in sections 7.1.1 and 7.1.2 ofthis section is clarified hereafter: - This section[HIERARCHY]). The neighbor relationship includes exchanging RSVP-TE Hellos. By definition, a Forwarding Adjacency (FA) isonly applicable whenafault impacting LSP(s) happensTE Link between two GMPLS nodes whose path transits one or more other (G)MPLS nodes in thedata/transport plane. Section 11 deals with control plane fault handling for nodal and control channel faults. - This section focuses on P&R atsame instance of theTDM, LSC and FSC layers. There are specific P&R requirements at(G)MPLS control plane. If two nodes have one or more non-FA TE Links between them, theselayerstwo nodes are expected (although notpresent at the PSC layer. - This section focuses on intra-area P&R as opposedrequired) tointer-area P&R and even inter-domain P&R. Notehave a routing adjacency. If two nodes do not have any non-FA TE Links between them, it is expected (although not required) that these two nodes would not have a routing adjacency. To state theP&R can evenobvious, if the TE links between two nodes are to bemore restricted, e.g.used for establishing LSPs, the two nodes must have a signaling adjacency. If one wants to establish routing and/or signaling adjacency between two nodes, there must be an IP path between them. This IP path can be, for example, acollectionTE Link with an interface switching capability oflike customer equipment,PSC, anything that looks likes an IP link (e.g., GRE tunnel, or acollection(bi-directional) LSP that with an interface switching capability ofequipmentPSC). A TE link may not be capable of being used directly for maintaining routing and/or signaling adjacencies. This is because GMPLS routing and signaling adjacencies requires exchanging data on a per (IP/ISO) packet basis, and a TE link (e.g. a link between OXCs) may not be E. Mannie et. al. Internet-Draft February 2003 43 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 capable oflike capabilities, in one single routing area. - This section focusesexchanging data onintra-layer P&R (horizontal hierarchy as defined in [TEWG-RESTORE]) as opposed to the inter-layer P&R (vertical hierarchy). - P&R mechanisms are in general designed to handle single failures, which makes SRLG diversityanecessity. Recovery from multiple failures requires further study. - Both mesh and ring like topologies are supported.per packet basis. In this case thefollowing, we assume that: - TDM, LSCrouting andFSC devicessignaling adjacencies aremore generally committing recovery resources inmaintained via anon best effort way. Recovery resources are either allocated and used, or at least logically reserved (usedset of one ornot by preemptable extra traffic but unavailable anyway for regular working traffic). - Shared P&R mechanisms are valuable to operatorsmore control channels (see [LMP]). Two nodes may have a TE link between them even if they don't have a routing adjacency. Naturally, each node must run OSPF/ISIS with GMPLS extensions in order for that TE link tomaximize their network utilization. - Sending preemptable excess traffic on recovery resources is a valuable featurebe advertised. More precisely, the node needs to run GMPLS extensions foroperators. 13.1. Protection escalation across domainsTE Links with an interface switching capability (see [GMPLS-ROUTING]) other than PSC, andlayers To describe the P&R architecture, one must consider two dimensions of hierarchy [TE-RESTORE]: - A horizontal hierarchy consisting of multiple P&R domains, which is important init needs to run either GMPLS or MPLS extensions for TE links with anLSP based protection scheme. The scopeinterface switching capability ofP&R E. Mannie et. al. Internet-Draft September 2002 43 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 may extend overPSC. The mechanisms for Control Channel Separation [GMPLS-SIG] should be used (even if the IP path between two nodes is a TE link). I.e., RSVP-TE/CR-LDP signaling should use the Interface_ID (IF_ID) object to specify a particular TE link(or span), an administrative domain or sub- network,when establishing anentireLSP.An administrative domain mayThe IP path could consist ofa single P&R domain or as a concatenationmultiple IP hops. In this case, the mechanisms ofseveral smaller P&R domains. The operator can configure P&R domains, based on customers' requirements, and on network topologysections 7.1.1 andtraffic engineering constraints. - A vertical hierarchy consisting7.1.2 ofmultiple layers[HIERARCHY] should be used (in addition to Control Channel Separation). 12. Control Plane Fault Handling There are two major types ofP&Rfaults that can impact a control plane. The first, referred to as control channel fault, relates to the case where control communication is lost between two neighboring nodes. If the control channel is embedded withvarying granularities (packet flows, STS trails, lightpaths, fibers, etc).the data channel, data channel recovery procedure should solve the problem. If the control channel is independent of the data channel additional procedures are required to recover from that problem. The second, referred to as nodal faults, relates to the case where a node losses its control state (e.g., after a restart) but does not loose its data forwarding state. In transport networks, such types of control plane faults should not have service impact on theabsence of adequate P&R coordination,existing connections. Under such circumstances, afault may propagate from one levelmechanism must exist tothe next withindetect aP&R hierarchy. It can lead to "collisions"control communication failure andsimultaneousa recoveryactions may lead to race conditions, reduced resource utilization, or instabilities [MANCHESTER]. Thus,procedure must guarantee connection integrity at both ends of the control channel. For aconsistent escalation strategycontrol channel fault, once communication isneededrestored routing protocols are naturally able tocoordinate recovery across domains and layers. The factrecover but the underlying signaling protocols must indicate thatGMPLS can be used at different layers could simplify this coordination. There are two types of escalation strategies: bottom-up and top- down.the nodes have maintained their state through the failure. Thebottom-up approach assumessignaling protocol must also ensure that"lower-level" recovery schemesany state changes that were instantiated during the failure aremore expedient, and therefore we can inhibit or hold off higher-level P&R. The Top-down approach attempts service P&R atsynchronized between thehigher levels before invoking "lower level" P&R. Higher- layer P&R is service selective,nodes. For a nodal fault, a node's control plane restarts andpermits "per-CoS" or "per-LSP" re-routing. SLA's between network operatorslosses most of it's state information. In this case, both upstream and downstream nodes must synchronize their state information with the restarted node. In order for any resynchronization to occur the node undergoing the restart will need to preserve some information, such as it's mappings of incoming to outgoing labels. E. Mannie et. al. Internet-Draft February 2003 44 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 These issues are addressed in protocol specific fashions, see [RSVP- TE-GMPLS] andtheir clients[CR-LDP-GMPLS]. Note that these cases only apply when there areneededmechanisms todeterminedetect data channel failures independent of control channel failures. The LDP Fault tolerant draft [LDP-FT] specifies thenecessary timescalesprocedures to recover from a control channel failure. [RSVP-TE-GMPLS] specifies how to recover from both a control channel failure and a node failure. 13. LSP Protection and Restoration This section discusses Protection and Restoration (P&R) issues forP&R at each layerGMPLS LSPs. It is driven by the requirements outlined in [TEWG- RESTORE] andat each domain. 13.2. Mappingsome ofServices tothe principles outlined in [MPLS-RECOVERY]. It will be enhanced, as more GMPLS P&RResourcesmechanisms are defined. Thechoicescope ofa P&R schemethis section is clarified hereafter: - This section is only applicable when atradeoff between network utilization (cost)fault impacting LSP(s) happens in the data/transport plane. Section 11 deals with control plane fault handling for nodal andservice interruption time. In light of this tradeoff, network service providerscontrol channel faults. - This section focuses on P&R at the TDM, LSC and FSC layers. There areexpected to support a range of different service offerings or service levels. One can classify LSPs into one of a small set of service levels. Among other things,specific P&R requirements at theseservice levels define the reliability characteristics oflayers not present at theLSP. The service level associated with a given LSP is mappedPSC layer. - This section focuses on intra-area P&R as opposed toone or moreinter-area P&Rschemes during LSP establishment. An advantage that mapping isand even inter-domain P&R. Note thatan LSP may use different P&E schemes in different segments of a network (e.g. some links may be span protected, whilst other segments oftheLSP may utilize ring protection). These details are likely toP&R can even beservice provider specific. An alternativemore restricted, e.g. tousing service levels is for an applicationa collection of like customer equipment, or a collection of equipment of like capabilities, in one single routing area. - This section focuses on intra-layer P&R (horizontal hierarchy as defined in [TEWG-RESTORE]) as opposed tospecifytheset of specificinter-layer P&R (vertical hierarchy). - P&R mechanisms are in general designed tobe used when establishinghandle single failures, which makes SRLG diversity a necessity. Recovery from multiple failures requires further study. - Both mesh and ring like topologies are supported. In theLSP. This allows greater flexibilityfollowing, we assume that: - TDM, LSC and FSC devices are more generally committing recovery resources inusing differenta non best effort way. Recovery resources are either allocated and used, or at least logically reserved (used or not by preemptable extra traffic but unavailable anyway for regular working traffic). - Shared P&R mechanisms are valuable tomeet the application requirements.operators in order to maximize their network utilization. E. Mannie et. al. Internet-DraftSeptember 2002 44 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 45 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002A differentiator between these service levels- Sending preemptable excess traffic on recovery resources isservice interruption time ina valuable feature for operators. 13.1. Protection escalation across domains and layers To describe theeventP&R architecture, one must consider two dimensions ofnetwork failures, which is defined as the lengthhierarchy [TE-RESTORE]: - A horizontal hierarchy consisting oftime between when a failure occurs and when connectivitymultiple P&R domains, which isre-established.important in an LSP based protection scheme. Thechoicescope ofservice level (orP&Rscheme) should be dictated by the service requirementsmay extend over a link (or span), an administrative domain or sub- network, an entire LSP. An administrative domain may consist ofdifferent applications. 13.3. Classificationa single P&R domain or as a concatenation of several smaller P&Rmechanism characteristicsdomains. Thefollowing figure provides a classificationoperator can configure P&R domains, based on customers' requirements, and on network topology and traffic engineering constraints. - A vertical hierarchy consisting of multiple layers of P&R with varying granularities (packet flows, STS trails, lightpaths, fibers, etc). In thepossible provisioning typesabsence of adequate P&R coordination, a fault may propagate from one level to the next within a P&R hierarchy. It can lead to "collisions" and simultaneous recoveryLSPs,actions may lead to race conditions, reduced resource utilization, or instabilities [MANCHESTER]. Thus, a consistent escalation strategy is needed to coordinate recovery across domains andof the levels of overbookinglayers. The fact thatis possible for them. + Computed on +Established +--Resources pre | demand | on demand | allocated Recovery LSP | | | Provisioning -+ Pre computed +Pre established +--Resources allocated on demand +--Dedicated - 1:1, 1 | | +-- Shared - 1:N, Ring, Shared mesh LevelGMPLS can be used at different layers could simplify this coordination. There are two types of| Overbooking ---+-- Best effort 13.4. Different Stages in P&R Recovery from a network fault or impairment takes place in several stages as discussed in [MPLS-RECOVERY], including fault detection, fault localization, notification,escalation strategies: bottom-up and top- down. The bottom-up approach assumes that "lower-level" recovery(i.e.schemes are more expedient, and therefore we can inhibit or hold off higher-level P&R. The Top-down approach attempts service P&R at the higher levels before invoking "lower level" P&R. Higher- layer P&Ritself)is service selective, andrestoral (i.e. returning the trafficpermits "per-CoS" or "per-LSP" re-routing. SLA's between network operators and their clients are needed to determine theoriginal working LSP ornecessary timescales for P&R at each layer and at each domain. 13.2. Mapping of Services toa new one)P&R Resources The choice oftraffic. - Fault detectiona P&R scheme istechnologya tradeoff between network utilization (cost) andimplementation dependent.service interruption time. Ingeneral, failureslight of this tradeoff, network service providers aredetected by lower layer mechanisms (e.g. SONET/SDH, Loss-of-Light (LOL)). When a node detects a failure, an alarm may be passed upexpected to support aGMPLS entity, which will take appropriate actions,range of different service offerings orthe alarm may be propagated at the lower layer (e.g. SONET/SDH AIS). - Fault localizationservice levels. One canbe done with the helpclassify LSPs into one ofGMPLS, e.g. using LMP for fault localization (see section 8.4). - Fault notification can also be achieved through GMPLS, e.g. using GMPLS RSVP-TE/CR-LDP notification (see section 9.12). - This section focuses ona small set of service levels. Among other things, these service levels define thedifferent mechanisms available for recovery and restoralreliability characteristics oftraffic once fault detection, localization and notification have taken place.the LSP. The service level associated with a given LSP is mapped to one or more P&R schemes during LSP establishment. An advantage that mapping is that an LSP may use E. Mannie et. al. Internet-DraftSeptember 2002 45 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 46 draft-ietf-ccamp-gmpls-architecture-03.txt August 200213.5. Recovery Strategies Network P&R techniques candifferent P&E schemes in different segments of a network (e.g. some links may bedivided into Protection and Restoration. In protection, resources betweenspan protected, whilst other segments of theprotection endpointsLSP may utilize ring protection). These details areestablished before failure, and connectivity after failurelikely to be service provider specific. An alternative to using service levels isachieved simply by switching performed at the protection end-points. In contrast, restoration uses signaling after failurefor an application toallocate resources along the recovery path. - Protection aims at extremely fast reaction times and may rely onspecify theuseset ofoverhead control fields for achieving end-point coordination. Protection for SONET/SDH networks is described in [G.841] and [ANSI-T1.105]. Protectionspecific P&R mechanismscanto befurther classified byused when establishing thelevel of redundancy and sharing. - RestorationLSP. This allows greater flexibility in using different mechanismsrely on signaling protocolstocoordinate switching actions during recovery, and may involve simple re- provisioning, i.e. signaling only atmeet the application requirements. A differentiator between these service levels is service interruption time in the event of network failures, which is defined as the length of time between when a failure occurs and when connectivity is re-established. The choice ofrecovery; or pre- signaling, i.e., signaling prior to recovery. In addition,service level (or P&Rcanscheme) should beapplied on a local or end-to-end basis. Indictated by thelocal approach,service requirements of different applications. 13.3. Classification of P&Ris focused on the local proximitymechanism characteristics The following figure provides a classification of thefault in order to reduce delay in restoring service. In the end-to- end approach, the LSP originatingpossible provisioning types of recovery LSPs, andterminating nodes control recovery. Using these strategies,of thefollowing recovery mechanisms can be defined. Editor's note: for each mechanism hereafter, itlevels of overbooking that isintended to add references to the appropriate GMPLS and/or technology specific mechanisms. 13.6.possible for them. + Computed on +Established +--Resources pre | demand | on demand | allocated Recoverymechanisms: Protection schemes Note that protection schemes are usually defined in technology specific ways, but this does not preclude other solutions.LSP | | | Provisioning -+ Pre computed +Pre established +--Resources allocated on demand +--Dedicated -1+1 Link Protection: Two pre-provisioned resources are used1:1, 1 | | +-- Shared - 1:N, Ring, Shared mesh Level of | Overbooking ---+-- Best effort 13.4. Different Stages inparallel. For example, data is transmitted simultaneously on two parallel links andP&R Recovery from aselector is used atnetwork fault or impairment takes place in several stages as discussed in [MPLS-RECOVERY], including fault detection, fault localization, notification, recovery (i.e. thereceiving nodeP&R itself) and restoral (i.e. returning the traffic tochoosethebest source. [Mechanisms referenceoriginal working LSP or tobe added].a new one) of traffic. -1:N Link Protection: WorkingFault detection is technology andprotecting resources (N working, 1 backup)implementation dependent. In general, failures arepre-provisioned. Ifdetected by lower layer mechanisms (e.g. SONET/SDH, Loss-of-Light (LOL)). When aworking resource fails, the data is switched to the protecting resource, usingnode detects acoordination mechanism (e.g. in overhead bytes). More generally, N working and M protecting resources canfailure, an alarm may beassigned for M:N link protection. [Mechanisms referencepassed up to a GMPLS entity, which will take appropriate actions, or the alarm may beadded].propagated at the lower layer (e.g. SONET/SDH AIS). -Enhanced Protection: Various mechanisms such as protection ringsFault localization can beused to enhancedone with thelevelhelp ofprotection beyond single link failures to include the ability to switch around a node failure or multiple link failures within a span, based on a pre-establishedGMPLS, e.g. using LMP for fault localization (see section 8.4). E. Mannie et. al. Internet-DraftSeptember 2002 46 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 47 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002topology of protection resources. [Mechanisms reference to be added].-1+1 LSP Protection: Simultaneous data transmission on working and protecting LSPs and tail-end selectionFault notification can also beapplied. [Mechanisms reference to be added]. 13.7. Recovery mechanisms: Restoration schemes Restoration is possible thanks to the use of a distributed control plane likeachieved through GMPLS, e.g. using GMPLSin multiple of tenths of ms. It is much harder to achieve when only an NMS is used,RSVP-TE/CR-LDP notification (see section 9.12). - This section focuses on the different mechanisms available for recovery andcan only be done in that case in a multiplerestoral ofseconds. - End-to-end LSP restoration with re-provisioning: An end-to-end restoration path is established after failure. The restoration path maytraffic once fault detection, localization and notification have taken place. 13.5. Recovery Strategies Network P&R techniques can bedynamically calculated after failure, or pre- calculated before failure (often during LSP establishment). Importantly, no signaling is used alongdivided into Protection and Restoration. In protection, resources between therestoration pathprotection endpoints are established before failure, andno restoration bandwidth is reserved. As a result, thereconnectivity after failure isno guarantee that a givenachieved simply by switching performed at the protection end-points. In contrast, restorationpath is available when auses signaling after failureoccurs. Thus one may have to crankbacktosearch for an availableallocate resources along the recovery path.[Mechanisms reference to be added].-End-to-end LSP restoration with pre-signaled recovery bandwidth reservationProtection aims at extremely fast reaction times andno label pre-selection: An end-to-end restoration pathmay rely on the use of overhead control fields for achieving end-point coordination. Protection for SONET/SDH networks ispre-calculated before failuredescribed in [G.841] anda signaling message is sent along this pre-selected path to reserve bandwidth, but labels are not selected. [Mechanisms reference to[ANSI-T1.105]. Protection mechanisms can beadded]. The resources reserved on each linkfurther classified by the level ofa restoration pathredundancy and sharing. - Restoration mechanisms rely on signaling protocols to coordinate switching actions during recovery, and maybe shared across different working LSPs that are not expectedinvolve simple re- provisioning, i.e. signaling only at the time of recovery; or pre- signaling, i.e., signaling prior tofail simultaneously. Local node policiesrecovery. In addition, P&R can be appliedto defineon a local or end-to-end basis. In thedegree to which capacity is shared across independent failures. Upon failure detection, LSP signalinglocal approach, P&R isinitiated alongfocused on therestoration pathlocal proximity of the fault in order toselect labels,reduce delay in restoring service. In the end-to- end approach, the LSP originating and terminating nodes control recovery. Using these strategies, the following recovery mechanisms can be defined. Editor's note: for each mechanism hereafter, it is intended to add references toinitiatethe appropriatecross-connections.GMPLS and/or technology specific mechanisms. 13.6. Recovery mechanisms: Protection schemes Note that protection schemes are usually defined in technology specific ways, but this does not preclude other solutions. - 1+1 Link Protection: Two pre-provisioned resources are used in parallel. For example, data is transmitted simultaneously on two parallel links and a selector is used at the receiving node to choose the best source. [Mechanisms reference to be added]. -End-to-end LSP restoration with pre-signaled recovery bandwidth reservation and label pre-selection: An end-to-end restoration path is pre-calculated before failure1:N Link Protection: Working and protecting resources (N working, 1 backup) are pre-provisioned. If asignaling procedure is initiated along this pre-selected path on which bandwidthworking resource fails, the data isreservedswitched to the protecting resource, using a coordination mechanism (e.g. in overhead bytes). More generally, N working andlabels are selected. Resources reserved on each link mayE. Mannie et. al. Internet-Draft February 2003 48 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 M protecting resources can beshared across different working LSPs that are not expectedassigned for M:N link protection. [Mechanisms reference tofail simultaneously. In networks based on TDM, LSC and FSC technology, LSP signaling isbe added]. - Enhanced Protection: Various mechanisms such as protection rings can be usedafter failure detectiontoestablish cross-connections at the intermediate switches onenhance therestoration path usinglevel of protection beyond single link failures to include thepre-selected labels.ability to switch around a node failure or multiple link failures within a span, based on a pre-established topology of protection resources. [Mechanisms reference to be added]. -Local1+1 LSPrestoration: the above approachesProtection: Simultaneous data transmission on working and protecting LSPs and tail-end selection can beapplied on a local basis rather than end-to-end, in order to reduce recovery time.applied. [Mechanisms reference to be added].E. Mannie et. al. Internet-Draft September 2002 47 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 13.8. Schema selection criteria This section discusses criteria that could be used by13.7. Recovery mechanisms: Restoration schemes Restoration is possible thanks to theoperatoruse of a distributed control plane like GMPLS inordermultiple of tenths of ms. It is much harder tomakeachieve when only an NMS is used, and can only be done in that case in achoice among the various P&R mechanisms. - Robustness: In general, the less pre-planningmultiple oftheseconds. - End-to-end LSP restorationpath, the more robustwith re-provisioning: An end-to-end restoration path is established after failure. The restoration path may be dynamically calculated after failure, or pre- calculated before failure (often during LSP establishment). Importantly, no signaling is used along the restorationschemepath before failure, and no restoration bandwidth istoreserved. As avariety of failures, provided that adequate resources are available. Restoration schemes with pre-planned paths, will not be able to recover from network failuresresult, there is no guarantee thatsimultaneously affect both the working anda given restorationpaths. Thus, these paths should ideally be chosenpath is available when a failure occurs. Thus one may have to crankback to search for an available path. [Mechanisms reference to beas disjoint as possible (i.e. SRLGadded]. - End-to-end LSP restoration with pre-signaled recovery bandwidth reservation andnode disjoint), so that any single failure event will not affect both paths. The risk of simultaneous failure of the two paths can be reduced by recalculating theno label pre-selection: An end-to-end restoration pathwhenever ais pre-calculated before failureoccursand a signaling message is sent alongit.this pre-selected path to reserve bandwidth, but labels are not selected. [Mechanisms reference to be added]. Thepre-selectionresources reserved on each link of alabel gives less flexiblity for multiple failure scenarios than no label pre-selection. If failures occur that affect tworestoration path may be shared across different working LSPs that aresharing a label at a commonnot expected to fail simultaneously. Local nodealong their restoration routes, then only one of these LSPspolicies can berecovered, unlessapplied to define thelabel assignmentdegree to which capacity ischanged. The robustness of a restoration schemeshared across independent failures. Upon failure detection, LSP signaling isalso determined by the amount of reserved restoration bandwidth - asinitiated along theamount ofrestorationbandwidth sharing increases (reserved bandwidth decreases),path to select labels, and to initiate therestoration scheme becomes less robustappropriate cross-connections. [Mechanisms reference tofailures. Restoration schemesbe added]. - End-to-end LSP restoration with pre-signaled recovery bandwidth reservation(with or withoutand labelpre-selection) can reserve adequate bandwidth to ensure recovery from any specific set of failure events, such as any single SRLG failure, any two SRLG failures etc. Clearly, morepre-selection: An end-to-end restorationcapacitypath isallocated if a greater degree ofpre-calculated before failurerecoveryand a signaling procedure isrequired. Thus, the degree toinitiated along this pre-selected path on whichthe network is protectedbandwidth isdetermined by the policy that defines the amount ofreservedrestoration bandwidth. - Recovery time:and labels are selected. Resources reserved on each link may be shared across different working LSPs that are not expected to fail simultaneously. Ingeneral,networks based on TDM, LSC and FSC technology, LSP signaling is used after failure detection to establish cross-connections at themore pre-planning ofintermediate switches on the E. Mannie et. al. Internet-Draft February 2003 49 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 restorationroute, the more rapidpath using theP&R scheme. Protection schemes generally recover faster than restoration schemes. Restoration with pre-signaled bandwidth reservation are likelypre-selected labels. [Mechanisms reference to be(significantly) faster than path restoration with re- provisioning, especially because of the elimination of any crankback.added]. - Localrestoration will generallyLSP restoration: the above approaches can befasterapplied on a local basis rather thanend-to- end schemes. Recovery time objectives for SONET/SDH protection switching (not including time to detect failure) are specifiedend-to-end, in[G.841] at 50 ms, taking into account constraints on distance, number of connections involved, andorder to reduce recovery time. [Mechanisms reference to be added]. 13.8. Schema selection criteria This section discusses criteria that could be used by the operator in order to make a choice among thecase of ring enhanced protection, numbervarious P&R mechanisms. - Robustness: In general, the less pre-planning ofnodes inthering. Recovery time objectives forrestorationmechanisms are being defined throughpath, the more robust the restoration scheme is to aseparate effort [TE-RESTORE]. E. Mannie et. al. Internet-Draft September 2002 48 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 - Resource Sharing: 1+1 and 1:N linkvariety of failures, provided that adequate resources are available. Restoration schemes with pre-planned paths, will not be able to recover from network failures that simultaneously affect both the working andLSP protection require dedicated recoveryrestoration paths. Thus, these pathswith limited abilityshould ideally be chosen toshare resources: 1+1 allows no sharing, 1:N allows some sharing of protection resourcesbe as disjoint as possible (i.e. SRLG andsupportnode disjoint), so that any single failure event will not affect both paths. The risk ofextra (preemptable) traffic. Flexibility is limited becausesimultaneous failure oftopology restrictions, e.g. fixed ring topology for traditional enhanced protection schemes. The degree to which restoration schemes allow sharing amongst multiple independent failures is directly dictated bythesize oftwo paths can be reduced by recalculating the restorationpool. In restoration schemes with re-provisioning,path whenever apoolfailure occurs along it. The pre-selection of a label gives less flexiblity for multiple failure scenarios than no label pre-selection. If failures occur that affect two LSPs that are sharing a label at a common node along their restorationcapacityroutes, then only one of these LSPs can bedefined from which all restoration routes are selected after failure. Thus,recovered, unless thedegreelabel assignment is changed. The robustness ofsharinga restoration scheme isdefinedalso determined by the amount ofavailable restoration capacity. Inreserved restorationwith pre-signaledbandwidthreservation,- as the amount ofreservedrestorationcapacity is determined by the localbandwidthreservation policies. In all restoration schemes, pre-emptable resources can use sparesharing increases (reserved bandwidth decreases), the restorationcapacity when that capacity is not being used for failure recovery. 14. Network Management Service Providers (SPs) use network management extensively to configure, monitor or provision various devices in their network. It is important to note that a SPÆs equipment may be distributed across geographically separate sites, making distributed management even more important. The service provider should utilize an NMS system and standard management protocols such as SNMP [RFC1901] [RFC1902] [RFC1903] [RFC1904] [RFC1905] [RFC1906] and its associated MIBs as standard interfaces to configure, monitor and provision devices at various locations. The service provider may also wishscheme becomes less robust touse the command line interface (CLI) provided by vendorsfailures. Restoration schemes withtheir devices, but this however, is not a standardpre-signaled bandwidth reservation (with orrecommended solution duewithout label pre-selection) can reserve adequate bandwidth tothe fact that there is no standard CLI language or interface, which results in N different CLIÆs in a network with devicesensure recovery fromN different vendors. In the contextany specific set of failure events, such as any single SRLG failure, any two SRLG failures etc. Clearly, more restoration capacity is allocated if a greater degree ofGMPLS, itfailure recovery isextremely important for standard interfaces torequired. Thus, theSPÆs devices (SNMP) to exist duedegree to which thenaturenetwork is protected is determined by the policy that defines the amount of reserved restoration bandwidth. - Recovery time: In general, thetechnology itself. Since GMPLS comprises many different layersmore pre-planning ofcontrol-plane and data-plane technology, it is important for management interfaces in this areathe restoration route, the more rapid the P&R scheme. Protection schemes generally recover faster than restoration schemes. Restoration with pre-signaled bandwidth reservation are likely to beflexible enough to allow(significantly) faster than path restoration with re- provisioning, especially because of themanagerelimination of any crankback. Local restoration will generally be faster than end-to- end schemes. Recovery time objectives for SONET/SDH protection switching (not including time tomanage GMPLS easily,detect failure) are specified in [G.841] at 50 E. Mannie et. al. Internet-Draft February 2003 50 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 ms, taking into account constraints on distance, number of connections involved, and ina standard way. 14.1. Network Management Systems (NMS) The NMS system should maintainthecollective information about each device withincase of ring enhanced protection, number of nodes in thesystem. Note thatring. Recovery time objectives for restoration mechanisms are being defined through a separate effort [TE-RESTORE]. - Resource Sharing: 1+1 and 1:N link and LSP protection require dedicated recovery paths with limited ability to share resources: 1+1 allows no sharing, 1:N allows some sharing of protection resources and support of extra (preemptable) traffic. Flexibility is limited because of topology restrictions, e.g. fixed ring topology for traditional enhanced protection schemes. The degree to which restoration schemes allow sharing amongst multiple independent failures is directly dictated by theNMS system may actually be comprisedsize ofseveral distributed applications (i.e.: alarm aggregators, configuration consoles, polling applications, etc...) that collectively comprisestheSPÆs NMS.restoration pool. Inthis way, it can make provisioning and maintenance decisionsrestoration schemes withthe full knowledgere-provisioning, a pool ofthe entire SP network. Configuration or provisioning information (i.e.: requests for new services) couldrestoration capacity can beentered into the NMS and subsequently distributed via SNMP to the remote devices, makingdefined from which all restoration routes are selected after failure. Thus, theSPÆs jobdegree ofmanagingsharing is defined by thenetwork much more compact and effortless E. Mannie et. al. Internet-Draft September 2002 49 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 than having to manage each device individually (i.e.: via CLI). Security and access control can be achieved throughamount of available restoration capacity. In restoration with pre-signaled bandwidth reservation, theuseamount ofSNMPv3 andreserved restoration capacity is determined by theView Access Control Model [SNMPv3VACM]. This approachlocal bandwidth reservation policies. In all restoration schemes, pre-emptable resources canbe very effectivelyuse spare restoration capacity when that capacity is not being usedwithin an SP network, since the SP has accessfor failure recovery. 14. Network Management Service Providers (SPs) use network management extensively to configure, monitor or provision various devices in their network. It is important to note that a SPÆs equipment may be distributed across geographically separate sites, making distributed management even more important. The service provider should utilize an NMS system and standard management protocols such as SNMP [RFC1901] [RFC1902] [RFC1903] [RFC1904] [RFC1905] [RFC1906] andcontrol over all devices withinitsdomain. Standardizedassociated MIBswill need to be developed before this approach can be used ubiquitouslyas standard interfaces toprovision, configure andconfigure, monitor and provision devicesin non-heterogeneous networksat various locations. The service provider may also wish to use the command line interface (CLI) provided by vendors with their devices, but this however, is not a standard oracross SP boundaries. 14.2. Management Information Base (MIB)recommended solution due to the fact that there is no standard CLI language or interface, which results in N different CLIÆs in a network with devices from N different vendors. In the context of GMPLS, it is extremely important for standard interfaces to the SPÆs devices (SNMP) to exist due to the nature of the technology itself. Since GMPLS comprises many different layers of control-plane and data-plane technology, it is important forSNMP MIBsmanagement interfaces in this area to be flexible enough to allow the manager to managethe entire control plane. This should be through a set of MIBs that may cooperate (i.e.: coordinated row-creation on the agent), or through more generalized MIBs that aggregate some of the desired actions to be takenGMPLS easily, andpush those details down to the devices. It is important to note that in certain circumstances, it may be necessary to duplicate some small subset of manageable objectsinnew MIBs for the convenience of management. Control of some parts of GMPLS may also be achieved thougha standard way. 14.1. Network Management Systems (NMS) The NMS system should maintain theuse of existing MIB interfaces (i.e.: existing SONET MIB), or though separate ones, which are yet to be defined. MIBs may have been previously defined incollective information about each device within theIETF or ITU. Existing MIBssystem. Note that the NMS system mayneed toactually beextended to facilitate somecomprised of several distributed applications (i.e.: alarm E. Mannie et. al. Internet-Draft February 2003 51 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 aggregators, configuration consoles, polling applications, etc...) that collectively comprises thenew functionality desired by GMPLS.SPÆs NMS. Inthese cases, the working group should work on new versions of these MIBs so that these extensionsthis way, it canbe added. 14.3. Tools As in traditional networks, standard tools such as traceroute [RFC1393] and ping [RFC1739] are needed for debugging and performance monitoring of GMPLS networks,make provisioning andmainly for the control plane topology that will mimicmaintenance decisions with thedata plane topology. Furthermore, such tools provide network reachability information. The GMPLS control protocols will need to expose certain piecesfull knowledge of the entire SP network. Configuration or provisioning informationin order(i.e.: requests forthese tools to function properlynew services) could be entered into the NMS and subsequently distributed via SNMP toprovide information germanethe remote devices, making the SPÆs job of managing the network much more compact and effortless than having toGMPLS. These tools should be made availablemanage each device individually (i.e.: via CLI). Security and access control can be achieved through theCLI. These tools should alsouse of SNMPv3 and the View Access Control Model [SNMPv3VACM]. This approach can bemade available for remote invocation viavery effectively used within an SP network, since theSNMP interface [RFC2925]. 14.4. Fault Correlation Between Multiple Layers DueSP has access to and control over all devices within its domain. Standardized MIBs will need tothe nature of GMPLS and the fact that potential layers maybeinvolveddeveloped before this approach can be used ubiquitously to provision, configure and monitor devices in non-heterogeneous networks or across SP boundaries. 14.2. Management Information Base (MIB) In thecontrol and transmissioncontext ofGMPLS data and control information,GMPLS, it istherefore required that a fault in one layer be passedextremely important for standard interfaces tothe adjacent higher and lower layers in an effortdevices tonotify them of the fault. However,exist due to the nature ofthesethe technology itself. Since GMPLS comprises manylayers, it is possible and even probable, that hundreds or even thousandsdifferent layers ofnotifications may need to transpire between layers. Thiscontrol-plane technology, it isundesirableimportant forseveral reasons. First, these notifications E. Mannie et. al. Internet-Draft September 2002 50 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 will overwhelm the device. Second, if the device(s) are programmed to emitSNMPNotifications [RFC1901] then the large number of notificationsMIBs in this area to be flexible enough to allow thedevice may attemptmanager toemit may overwhelmmanage thenetwork withentire control plane. This should be through astormset ofnotifications. Furthermore, even if the device emits the notifications, the NMSMIBs thatmust process these notifications will either be overwhelmed, or will be processing redundant information. That is, if 1000 interfaces at layer B are stacked above a single interface below it at layer A, and the interface at A goes down,may cooperate (i.e.: coordinated row-creation on theinterfaces at layer B should not emit notifications. Instead,agent), or through more generalized MIBs that aggregate some of theinterface at layer A should emit a single notification. The NMS receiving this notification shoulddesired actions to beabletaken and push those details down tocorrelatethefactdevices. It is important to note thatthis interface has many others stacked abovein certain circumstances, itand take appropriate action, if necessary. Devices that support GMPLS should provide mechanisms for aggregating, summarizing, enabling and disablingmay be necessary to duplicate some small subset ofinter-layer notificationsmanageable objects in new MIBs for thereasons described above. In the contextconvenience of management. Control of some parts ofSNMP MIBs, all MIBs that are used byGMPLSmust provide enable/disable objects for all notification objects. Furthermore, these MIBs mustmay alsoprovide notification summarization objects or functionality (as described above) as well. NMS systems and standard tools which process notifications or keep track of the many layers on any given devices mustbecapable of processingachieved though thevast amountuse ofinformationexisting MIB interfaces (i.e.: existing SONET MIB), or though separate ones, which are yet to be defined. MIBs maypotentiallyhave been previously defined in the IETF or ITU. Existing MIBs may need to beemittedextended to facilitate some of the new functionality desired bynetwork devices running GMPLS at any point in time. 15. Security considerations GMPLS defines aGMPLS. In these cases, the working group should work on newcontrol plane architecture for multiple typesversions ofnetwork elements. In general, since LSPs established using GMPLSthese MIBs so that these extensions can be added. 14.3. Tools As in traditional networks, standard tools such as traceroute [RFC1393] and ping [RFC1739] areexpected to carry high volumesneeded for debugging and performance monitoring ofdataGMPLS networks, andconsume significant network resources, security mechanisms are required to safeguard the underlying network against attacks onmainly for the control planeand/or unauthorized usage of data transport resources. Security requirements depend on the level of trust between nodestopology thatexchange GMPLS control messages as well as the exposure ofwill mimic thecontrol channel to third parties. In general, adata plane topology. Furthermore, such tools provide networknode may apply more relaxed security requirements when exchangingreachability information. The GMPLS controlmessages with nodes under the same administrative domain than when talkingprotocols will need tonodesexpose certain pieces of information ina different domain. In this respect, networkorder for these tools touser (UNI)function properly andnetwork-to-network interfaces are expectedtohave higher security requirements than node-to-node interfaces. Security mechanisms canprovidetwo main properties: authentication and confidentiality. Authentication can provide origin verification, message integrity and replay protection, while confidentiality ensures that a third party cannot decipher the contents of a message. In situations where GMPLS deployment requires primarily authentication, the respective authentication mechanisms of the GMPLS component protocols mayinformation germane to GMPLS. These tools should beused ([RFC2747], [LDP], [RFC2385], [LMP]). Additionally,made available via theIPSEC suite of protocols ([RFC2402], [RFC2406], [RFC2409]) mayCLI. These tools should also beused to provide authentication, confidentiality or both,made available fora GMPLS control channel; this optionremote invocation via the SNMP interface [RFC2925]. 14.4. Fault Correlation Between Multiple Layers E. Mannie et. al. Internet-DraftSeptember 2002 51 draft-ietf-ccamp-gmpls-architecture-02.txt MarchFebruary 2003 52 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002offersDue to thebenefit of combined protectionnature ofallGMPLScomponent protocols. Note howeverand the fact thatGMPLS itself introduces no new security considerations topotential layers may be involved in thecurrent MPLS-TE signaling (RSVP-TE, CR-LDP), routing protocols (OSPF-TE, IS-IS-TE) or network management protocols (SNMP). 16. Acknowledgements This draftcontrol and transmission of GMPLS data and control information, it is therefore required that a fault in one layer be passed to thework of numerous authorsadjacent higher andconsistslower layers in an effort to notify them ofa compositionthe fault. However, due to nature ofa numberthese many layers, it is possible and even probable, that hundreds or even thousands ofprevious drafts in this area. Many thanksnotifications may need toBen Mack-Crane (Tellabs)transpire between layers. This is undesirable forallseveral reasons. First, these notifications will overwhelm theuseful SDH/SONET discussions that we had together. Thanks alsodevice. Second, if the device(s) are programmed toPedro Falcao, Alexandre Geyssens, Michael Moelants, Xavier Neerdaels, and Philippe Noel from Ebone for their SDH/SONET and optical technical advice and support. Finally, many thanks alsoemit SNMP Notifications [RFC1901] then the large number of notifications the device may attempt toKrishna Mitra (Calient)emit may overwhelm the network with a storm of notifications. Furthermore, even if the device emits the notifications, the NMS that must process these notifications will either be overwhelmed, or will be processing redundant information. That is, if 1000 interfaces at layer B are stacked above a single interface below it at layer A, andCurtis Villamizar (Avici).the interface at A goes down, the interfaces at layer B should not emit notifications. Instead, the interface at layer Alist ofshould emit a single notification. The NMS receiving this notification should be able to correlate thedrafts from which materialfact that this interface has many others stacked above it andideas were incorporated follows: [GMPLS-SIG] draft-ietf-mpls-generalized-signaling-07.txt Generalized MPLS - Signaling Functional Description [RSVP-TE-GMPLS] draft-ietf-mpls-generalized-rsvp-te-06.txt Generalized MPLS Signaling - RSVP-TE Extensions [CR-LDP-GMPLS] draft-ietf-mpls-generalized-cr-ldp-05.txt Generalized MPLS Signaling - CR-LDP Extensions [SONETSDH-GMPLS] draft-ietf-ccamp-gmpls-sonet-sdh-03.txttake appropriate action, if necessary. Devices that support GMPLSExtensionsshould provide mechanisms forSONET and SDH Control [SONETSDH-EXT-GMPLS] draft-ietf-ccamp-gmpls-sonet-sdh-extensions- 01.txt. GMPLS Extensions to Control Non-Standard SONETaggregating, summarizing, enabling andSDH Features [G709-GMPLS] draft-fontana-ccamp-gmpls-g709-01.txt GMPLS Signaling Extensions for G.709 Optical Transport Networks Control [LMP] draft-ietf-mpls-lmp-02.txt Link Management Protocol (LMP) [LMP-WDM] draft-ietf-ccamp-lmp-wdm-00.txt LMP for WDM Optical Line Systems (LMP-WDM) [HIERARCHY] draft-ietf-mpls-lsp-hierarchy-04.txt LSP Hierarchy with MPLS TE [RSVP-TE-UNNUM] draft-ietf-mpls-rsvp-unnum-04.txt Signalling Unnumbered Links in RSVP-TE E. Mannie et. al. Internet-Draft September 2002 52 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 [CR-LDP-UNNUM] draft-ietf-mpls-crldp-unnum-04.txt Signalling Unnumbered Links in CR-LDP [BUNDLE] draft-ietf-mpls-bundle-01.txt Link Bundling in MPLS Traffic Engineering [GMPLS-ROUTING] draft-ietf-ccamp-gmpls-routing-02.txt Routing Extensions in Support of Generalized MPLS [OSPF-TE-GMPLS] draft-ietf-ccamp-ospf-gmpls-extensions-04.txt OSPF Extensions in Supportdisabling ofGeneralized MPLS [ISIS-TE-GMPLS] draft-ietf-isis-gmpls-extensions-08.txt IS-IS Extensions in Supportinter-layer notifications for the reasons described above. In the context ofGeneralized MPLS 17. References [RFC1393] G. Malkin, "Traceroute Using an IP Option", IETF RFC 1393, January 1993. [RFC1901] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Introduction to Community-based SNMPv2", IETF RFC 1901, January 1996. [RFC1902] Case, J., McCloghrie, K., Rose, M.,SNMP MIBs, all MIBs that are used by GMPLS must provide enable/disable objects for all notification objects. Furthermore, these MIBs must also provide notification summarization objects or functionality (as described above) as well. NMS systems andS. Waldbusser, "Structurestandard tools which process notifications or keep track ofManagement Information for Version 2the many layers on any given devices must be capable of processing theSimple Network Management Protocol (SNMPv2)", IETF RFC 1901, January 1996. [RFC1903] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Textual Conventionsvast amount of information which may potentially be emitted by network devices running GMPLS at any point in time. 15. Security considerations GMPLS defines a new control plane architecture forVersion 2multiple types ofthe Simple Network Management Protocol (SNMPv2)", IETF RFC 1901, January 1996. [RFC1904] Case, J., McCloghrie, K., Rose, M.,network elements. In general, since LSPs established using GMPLS are expected to carry high volumes of data andS. Waldbusser, "Conformance Statements for Version 2consume significant network resources, security mechanisms are required to safeguard the underlying network against attacks on the control plane and/or unauthorized usage of data transport resources. Security requirements depend on theSimple Network Management Protocol (SNMPv2)", IETF RFC 1901, January 1996. [RFC1905] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Protocol Operations for Version 2level of trust between nodes that exchange GMPLS control messages as well as theSimple Network Management Protocol (SNMPv2)", IETF RFC 1905, January 1996. [RFC1906] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Transport Mappings for Version 2exposure of theSimple Network Management Protocol (SNMPv2)", IETF RFC 1906, January 1996. [SNMPv3VACM] Wijnen, B., Presuhn, R.,control channel to third parties. In general, a network node may apply more relaxed security requirements when exchanging GMPLS control messages with nodes under the same administrative domain than when talking to nodes in a different domain. In this respect, network to user (UNI) andK. McCloghrie, "View- based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)", IETF RFC 2575, April 1999.network-to-network interfaces are expected to have higher security requirements than node-to-node interfaces. Security mechanisms can provide two main properties: authentication and confidentiality. Authentication can provide origin verification, E. Mannie et. al. Internet-DraftSeptember 2002February 2003 53draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002[RFC1739] G. Kessler, S. Shepard , "A Primer On Internetmessage integrity andTCP/IP Tools", RFC1739, December 1994. [RFC2328] J. Moy, "OSPF Version 2", RFC 2328, Standard Track, April 1998. [RFC2370] R. Coltun, "The OSPF Opaque LSA Option", RFC 2370 Standard Track, July 1998. [RFC2385] A. Heffernan, "Protectionreplay protection, while confidentiality ensures that a third party cannot decipher the contents of a message. In situations where GMPLS deployment requires primarily authentication, the respective authentication mechanisms of the GMPLS component protocols may be used ([RFC2747], [RFC3036], [RFC2385], [LMP]). Additionally, the IPSEC suite of protocols ([RFC2402], [RFC2406], [RFC2409]) may be used to provide authentication, confidentiality or both, for a GMPLS control channel; this option offers the benefit of combined protection of all GMPLS component protocols. Note however that GMPLS itself introduces no new security considerations to the current MPLS-TE signaling (RSVP-TE, CR-LDP), routing protocols (OSPF-TE, IS-IS-TE) or network management protocols (SNMP). 16. Acknowledgements This draft is the work of numerous authors and consists of a composition ofBGP Sessions viaa number of previous drafts in this area. Many thanks to Ben Mack-Crane (Tellabs) for all theTCP MD5 Signature Option," IETF RFC 2385. [RFC2402] S. Kentuseful SDH/SONET discussions that we had together. Thanks also to Pedro Falcao, Alexandre Geyssens, Michael Moelants, Xavier Neerdaels, andR. Atkinson, "IP Authentication Header," RFC 2402. [RFC2406] S. KentPhilippe Noel from Ebone for their SDH/SONET andR. Atkinson, "IP Encapsulating Security Payload (ESP)," IETF RFC 2406. [RFC2409] D. Harkinsoptical technical advice andD. Carrel, "The Internet Key Exchange (IKE)", IETF RFC 2409. [RFC2747] F. Baker et al., "RSVP Cryptographic Authentication", IETF RFC 2747. [RFC2925] K. White, "Definitionssupport. Finally, many thanks also to Krishna Mitra (Calient) and Curtis Villamizar (Avici). A list ofManaged Objects for Remote Ping, Traceroute,the drafts from which material andLookup Operations", IETF RFC 2925, September 2000. [RFC3031] E. Rosen, A. Viswanathan, R. Callon, "Multiprotocol Label Switching Architecture", IETF RFC 3031, January 2001. [RFC3032] E. Rosen, D. Tappan, G. Fedorkow, Y. Rekhter, D. Farinacci, T. Li, A. Conta, "ideas were incorporated follows: [GMPLS-SIG] draft-ietf-mpls-generalized-signaling-07.txt Generalized MPLSLabel Stack Encoding", IETF RFC 3032, January 2001. [LPD] L. Andersson, P. Doolan, N. Feldman, A. Fredette, B. Thomas, "LDP Specification", IETF RFC 3036, January 2001. [OSPF-TE] D. Katz, D. Yeung, and K. Kompella, "Traffic Engineering- Signaling Functional Description [RSVP-TE-GMPLS] draft-ietf-mpls-generalized-rsvp-te-06.txt Generalized MPLS Signaling - RSVP-TE Extensionsto OSPF", draft-katz-yeung-ospf- traffic-05.txt. [MPLS-TEO] D. Awduche et al., "Multi-Protocol Lambda Switching: Combining[CR-LDP-GMPLS] draft-ietf-mpls-generalized-cr-ldp-05.txt Generalized MPLSTraffic Engineering Control With Optical Crossconnects," Internet Draft, Work in Progress, draft-awduche-mpls-te-optical-03.txt, April 2001. [G.841] ITU-T Recommendation G.841, "TypesSignaling - CR-LDP Extensions [SONETSDH-GMPLS] draft-ietf-ccamp-gmpls-sonet-sdh-03.txt GMPLS Extensions for SONET andCharacteristics ofSDHNetwork Protection Architectures," July 1995.Control [SONETSDH-EXT-GMPLS] draft-ietf-ccamp-gmpls-sonet-sdh-extensions- 01.txt. GMPLS Extensions to Control Non-Standard SONET and SDH Features [G709-GMPLS] draft-ietf-ccamp-gmpls-g709-01.txt GMPLS Signaling Extensions for G.709 Optical Transport Networks Control [LMP] draft-ietf-mpls-lmp-02.txt Link Management Protocol (LMP) E. Mannie et. al. Internet-DraftSeptember 2002February 2003 54draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002[ANSI-T1.105] "Synchronous[LMP-WDM] draft-ietf-ccamp-lmp-wdm-00.txt LMP for WDM OpticalNetwork (SONET): Basic Description Including Multiplex Structure, Rates, and Formats" ANSI T1.105, 2000. [TE-RESTORE] W. Lai, D. McDysan, J. Boyle, et al, "NetworkLine Systems (LMP-WDM) [HIERARCHY] draft-ietf-mpls-lsp-hierarchy-04.txt LSP Hierarchyand Multi-layer Survivability", Internet Draft, Workwith MPLS TE [RSVP-TE-UNNUM] draft-ietf-mpls-rsvp-unnum-04.txt Signalling Unnumbered Links in RSVP-TE [CR-LDP-UNNUM] draft-ietf-mpls-crldp-unnum-04.txt Signalling Unnumbered Links in CR-LDP [BUNDLE] draft-ietf-mpls-bundle-01.txt Link Bundling inProgress, draft-team-tewg-restore-hierarchy-00.txt, July 2001. [MPLS-RECOVERY] V. Sharma and F. Hellstrand (Editors), "A Framework forMPLSRecovery", Internet Draft, WorkTraffic Engineering [GMPLS-ROUTING] draft-ietf-ccamp-gmpls-routing-02.txt Routing Extensions inProgress, draft-ietf-mpls-recovery-frmwrk-03.txt, July 2001. [SDH/SONET-GMPLS-FRAMEWORK] G. Bernstein, E. Mannie, V. Sharma, "Framework for GMPLS-based ControlSupport ofSDH/SONET Networks", Internet Draft, WorkGeneralized MPLS [OSPF-TE-GMPLS] draft-ietf-ccamp-ospf-gmpls-extensions-04.txt OSPF Extensions inProgress, draft-ccamp-optical-sdhsonet-mpls-control-frmwrk- 00.txt, February 2002. [OLI-REQ] A. Fredette (Editor), "Optical Link Interface Requirements", Internet Draft, WorkSupport of Generalized MPLS [ISIS-TE-GMPLS] draft-ietf-isis-gmpls-extensions-08.txt IS-IS Extensions inProgress, draft-ietf-ccamp-oli-reqts-00.txt, February 2002. [MANCHESTER] J. Manchester, P. Bonenfant, C. Newton, "The EvolutionSupport of Generalized MPLS 17. References [RFC1393] G. Malkin, "Traceroute Using an IP Option", IETF RFC 1393, January 1993. [RFC1901] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Introduction to Community-based SNMPv2", IETF RFC 1901, January 1996. [RFC1902] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2)", IETF RFC 1902, January 1996. [RFC1903] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Textual Conventions for Version 2 ofTransportthe Simple NetworkSurvivability," IEEE Communications, August 1999. 18. Author's Addresses Peter Ashwood-Smith Eric Mannie (editor) Nortel Networks Corp. Ebone (GTS) P.O. Box 3511 Station C, Terhulpsesteenweg 6A Ottawa, ON K1Y 4H7 1560 Hoeilaart Canada Belgium Phone: +1 613 763 4534 Phone: +32 2 658 56 52 Email: Email: eric.mannie@gts.com petera@nortelnetworks.com Daniel O. Awduche Thomas D. Nadeau Movaz Networks Cisco Systems, Inc. 7296 Jones Branch Drive 250 Apollo Drive Suite 615 Chelmsford, MA 01824 McLean, VA 22102 USA USA Phone: +1 978 244 3051 Phone: +1 703 847-7350 Email: tnadeau@cisco.com Email: awduche@movaz.com E. Mannie et. al. Internet-Draft September 2002 55 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 Ayan Banerjee Lyndon Ong Calient Networks Ciena Systems 5853 Rue Ferrari 10480 Ridgeview Ct San Jose, CA 95138 Cupertino, CA 95014 USA USA Phone: +1 408 972-3645 Email: lyong@ciena.com Email: abanerjee@calient.net Debashis Basak Dimitri Papadimitriou Accelight Networks Alcatel - IPO NSG 70 Abele Road, Bldg.1200 Francis Wellesplein, 1 Bridgeville, PA 15017 B-2018 Antwerpen USA Belgium Phone: +1 412 220-2102 (ext115) Phone: +32 3 240-84-91 email: dbasak@accelight.com Email: dimitri.papadimitriou@alcatel.be Lou Berger Dimitrios Pendarakis Movaz Networks, Inc. Tellium, Inc. 7926 Jones Branch DriveManagement Protocol (SNMPv2)", IETF RFC 1903, January 1996. [RFC1904] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Conformance Statements for Version 2Crescent Place Suite 615 P.O. Box 901 MCLean VA, 22102 Oceanport, NJ 07757-0901 USA USA Phone: +1 703 847-1801 Email: DPendarakis@tellium.com Email: lberger@movaz.com Greg Bernstein Bala Rajagopalan Ciena Corporation Tellium, Inc. 10480 Ridgeview Courtof the Simple Network Management Protocol (SNMPv2)", IETF RFC 1904, January 1996. [RFC1905] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Protocol Operations for Version 2Crescent Place Cupertino, CA 94014 P.O. Box 901 USA Oceanport, NJ 07757-0901 Phone: +1 408 366 4713 USA Email: greg@ciena.com Phone: +1 732 923 4237 Email: braja@tellium.com Sudheer Dharanikota Yakov Rekhter Nayna Networks Inc. Juniper 481 Sycamore Drive Email: yakov@juniper.net Milpitas, CA 95035 USA Email: sudheer@nayna.com John Drake Debanjan Saha Calient Networks Telliumof the Simple Network Management Protocol (SNMPv2)", IETF RFC 1905, January 1996. [RFC1906] Case, J., McCloghrie, K., Rose, M., and S. E. Mannie et. al. Internet-Draft February 2003 55 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 Waldbusser, "Transport Mappings for Version 2 of the Simple Network Management Protocol (SNMPv2)", IETF RFC 1906, January 1996. [SNMPv3VACM] Wijnen, B., Presuhn, R., and K. McCloghrie, "View- based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)", IETF RFC 2575, April 1999. [RFC1739] Kessler G. and Shepard S., "A Primer On Internet and TCP/IP Tools", IETF RFC 1739, December 1994. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, IETF RFC 2119, March 1997. [RFC2328] J. Moy, "OSPF Version 2", IETF RFC 2328, Standard Track, April 1998. [RFC2370] R. Coltun, "The OSPF Opaque LSA Option", IETF RFC 2370 Standard Track, July 1998. [RFC2385] A. Heffernan, "Protection of BGP Sessions via the TCP MD5 Signature Option", IETF RFC 2385, August 1998. [RFC2402] S. Kent and R. Atkinson, "IP Authentication Header", IETF RFC 2402, November 1998. [RFC2406] S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)", IETF RFC 2406, November 1998. [RFC2409] D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)", IETF RFC 2409, November 1998. [RFC2747] F. Baker et al., "RSVP Cryptographic Authentication", IETF RFC 2747, January 2000. [RFC2925] K. White, "Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations", IETF RFC 2925, September 2000. [RFC3031] E. Rosen, A. Viswanathan, R. Callon, "Multiprotocol Label Switching Architecture", IETF RFC 3031, January 2001. [RFC3032] E. Rosen, D. Tappan, G. Fedorkow, Y. Rekhter, D. Farinacci, T. Li, A. Conta, "MPLS Label Stack Encoding", IETF RFC 3032, January 2001. [RFC3036] L. Andersson, P. Doolan, N. Feldman, A. Fredette, B. Thomas, "LDP Specification", IETF RFC 3036, January 2001. [OSPF-TE] D. Katz, D. Yeung, and K. Kompella, "Traffic Engineering Extensions to OSPF", draft-katz-yeung-ospf- E. Mannie et. al. Internet-Draft February 2003 56 draft-ietf-ccamp-gmpls-architecture-03.txt August 2002 traffic-06.txt. [MPLS-TEO] D. Awduche et al., "Multi-Protocol Lambda Switching: Combining MPLS Traffic Engineering Control With OpticalSystems 5853 Rue Ferrari 2 Crescent Place San Jose, CA 95138 Oceanport, NJ 07757-0901 USA USA Phone: +1 408 972 3720 Phone: +1 732 923 4264 Email: jdrake@calient.net Email: dsaha@tellium.comCrossconnects", Internet Draft, Work in Progress, draft-awduche-mpls-te-optical-03.txt, April 2001. [G.841] ITU-T Recommendation G.841, "Types and Characteristics of SDH Network Protection Architectures", October 1998. [ANSI-T1.105] "Synchronous Optical Network (SONET): Basic Description Including Multiplex Structure, Rates, and Formats", ANSI T1.105, 2000. [TE-RESTORE] W. Lai, D. McDysan, J. Boyle, et al, "Network Hierarchy and Multi-layer Survivability", Internet Draft, Work in Progress, draft-ietf-tewg-restore-hierarchy-00.txt, October 2001. [MPLS-RECOVERY] V. Sharma and F. Hellstrand (Editors), "A Framework for MPLS Recovery", Internet Draft, Work in Progress, draft-ietf-mpls-recovery-frmwrk-06.txt, July 2002. [SDH/SONET-GMPLS-FRAMEWORK] G. Bernstein, E. Mannie, V. Sharma, "Framework for GMPLS-based Control of SDH/SONET Networks", Internet Draft, Work in Progress, draft-ietf-ccamp-sdhsonet-control-01.txt, May 2002. [OLI-REQ] A. Fredette (Editor), "Optical Link Interface Requirements", Internet Draft, Work in Progress, draft-ietf-ccamp-oli-reqts-00.txt, February 2002. [MANCHESTER] J. Manchester, P. Bonenfant, C. Newton, "The Evolution of Transport Network Survivability", IEEE Communications, August 1999. 18. Author's Address Eric Mannieet. al. Internet-Draft September 2002 56 draft-ietf-ccamp-gmpls-architecture-02.txt March 2002 Yanhe Fan Hal Sandick Axiowave Networks, Inc. Nortel Networks 200 Nickerson Road Email: Marlborough, MA 01752 hsandick@nortelnetworks.com USA Phone: +1 774 348 4627 Email: yfan@axiowave.com Don Fedyk Vishal Sharma Nortel Networks Corp. Metanoia, Inc. 600 Technology Park Drive 305 Elan Village Lane, Unit Billerica, MA 01821 121 USA San Jose, CA 95134-2545 Phone: +1-978-288-4506 USA Email: Phone: +1 408 895 50 30 dwfedyk@nortelnetworks.com Email: vsharma87@yahoo.com Gert Grammel George Swallow Alcatel Cisco Systems, Inc. Via Trento, 30 250 Apollo Drive 20059 Vimercate (Mi) Chelmsford, MA 01824 Italy USA Email: gert.grammel@alcatel.itEbone (GTS) Terhulpsesteenweg 6A 1560 Hoeilaart Belgium Phone:+1 978 244 8143 Email: swallow@cisco.com Dan Guo Z. Bo Tang Turin Networks, Inc. Tellium, Inc. 1415 N. McDowell Blvd,+32 2Crescent Place Petaluma, CA 95454 P.O. Box 901 USA Oceanport, NJ 07757-0901 Email: dguo@turinnetworks.com USA Phone: +1 732 923 4231 Email: btang@tellium.com Kireeti Kompella Jennifer Yates Juniper Networks, Inc. AT&T 1194 N. Mathilda Ave. 180 Park Avenue Sunnyvale, CA 94089 Florham Park, NJ 07932 USA USA Email: kireeti@juniper.net Email: jyates@research.att.com Alan Kullberg George R. Young NetPlane Systems, Inc. Edgeflow 888 Washington 329 March Road St.Dedham, MA 02026 Ottawa, Ontario, K2K 2E1 USA Canada Phone: +1 781 251-5319658-5652 Email:Email: akullber@netplane.com george.young@edgeflow.comeric.mannie@gts.com E. Mannie et. al. Internet-DraftSeptember 2002February 2003 57draft-ietf-ccamp-gmpls-architecture-02.txt Marchdraft-ietf-ccamp-gmpls-architecture-03.txt August 2002Jonathan P. Lang John Yu Calient Networks Zaffire Inc. 25 Castilian 2630 Orchard Parkway Goleta, CA 93117 San Jose, CA 95134 Email: jplang@calient.net USA Email: jzyu@zaffire.com Fong Liaw Alex Zinin Zaffire Inc. Nexsi Systems 2630 Orchard Parkway 178 East Tasman Dr San Jose, CA 95134 San Jose, CA 95134 USA USA Email: fliaw@zaffire.comFull Copyright Statement "Copyright (C) The Internet Society (date). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE." E. Mannie et. al. Internet-DraftSeptember 2002February 2003 58