MPLS Working Group J. Ryoo, Ed. Internet-Draft ETRI Updates: 6378 (if approved) E. Gray, Ed. Intended status: Standards Track Ericsson Expires:May 31,July 23, 2014 H. van Helvoort Huawei Technologies A. D'Alessandro Telecom Italia T. Cheung ETRI E. Osborne Cisco Systems, Inc.November 27, 2013January 19, 2014 MPLS Transport Profile (MPLS-TP) Linear Protectionin Supportto Match the Operational Expectations ofITU-T's Requirements draft-ietf-mpls-tp-psc-itu-00.txtSDH, OTN and Ethernet Transport Network Operators draft-ietf-mpls-tp-psc-itu-01.txt Abstract This documentintroducesdescribes alternatewaysmechanisms to performcertain operations defined in RFC6378, "MPLSsome of the sub-functions of MPLS Transport Profile (MPLS-TP)Linear Protection",linear protection defined in RFC 6378, and also defines additionalbehaviors. This setmechanisms. The purpose ofmodifiedthese alternate and additionalbehaviors together with the protocol defined in RFC6378 meetsmechanisms is to provide operator control and experience that more closely models theITU-T'sbehavior of linear protectionswitching requirements.seen in other transport networks. This document also introduces capabilities andmodes.modes for linear protection. A capability is an individualbehavior. The capabilities ofbehavior, and anode are advertised using the method given in this document. Amode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode. This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled. This document updatesRFC6378RFC 6378 in that the capability advertisement method defined here is an addition to that document. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onMay 31,July 23, 2014. Copyright Notice Copyright (c)20132014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Conventions Used in This Document . . . . . . . . . . . . . .45 3. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4. Capability 1: PriorityModificationmodification . . . . . . . . . . . . .56 4.1. Motivations for swapping priorities of FS and SF-P . . .56 4.2. Motivation for raising the priority ofClear SFSFc . . . . .6. . 7 4.3. Motivation for introducing Freeze command . . . . . . . .67 4.4.UpdatesModifications tothe PSCRFC 6378 . . . . . . . . . . . . . . . .. 67 5. Capability 2: Modification ofNon-revertive Operationnon-revertive operation . . . .78 6. Capability 3: Support ofManual Switch to Working CommandMS-W command . .7. . . . . . . . . . 8 6.1. Motivation for addingManual Switch to WorkingMS-W . . . . .7. . . . . . . . . . 8 6.2. Terms modified to support MS-W . . . . . . . . . . . . .89 6.3. Behavior of MS-P and MS-W . . . . . . . . . . . . . . . .89 6.4. Equal priority resolution for MS . . . . . . . . . . . .89 7. Capability 4: Support of protection againstSignal Degrade . 9 7.1. Motivation for supporting protection against Signal Degrade . . . . . . . . . . . . .SD . . . . . . . 10 7.1. Motivation for supporting protection against SD . . . . .910 7.2. Terms modified to support SD . . . . . . . . . . . . . .910 7.3. Behavior of protection against SD . . . . . . . . . . . .910 7.4. Equal priority resolution . . . . . . . . . . . . . . . . 11 8. Capability 5: Support ofExercise CommandEXER command . . . . . . . . . . .12. 13 9. Capabilities andModesmodes . . . . . . . . . . . . . . . . . . .1314 9.1. Capabilities . . . . . . . . . . . . . . . . . . . . . .1314 9.1.1. Sending the Capabilities TLV . . . . . . . . . . . .1415 9.1.2. Receiving the Capabilities TLV . . . . . . . . . . .1415 9.1.3. Handling Capabilities TLV errors . . . . . . . . . . 15 9.2. Modes . . . . . . . . . . . . . . . . . . . . . . . . . . 16 9.2.1. PSC Mode . . . . . . . . . . . . . . . . . . . . . . 16 9.2.2. APS Mode . . . . . . . . . . . . . . . . . . . . . . 16 9.3. Backward compatibility . . . . . . . . . . . . . . . . .1617 10. PSC Protocol in APS Mode . . . . . . . . . . . . . . . . . . 17 10.1. Request field in PSC protocol message . . . . . . . . . 17 10.2. Priorities of local inputs and remote requests . . . . .1718 10.3. Acceptance and retention of local inputs . . . . . . . . 20 11. State Transition Tables in APS Mode . . . . . . . . . . . . .1921 11.1. State transition by local inputs . . . . . . . . . . . .2123 11.2. State transition by remote messages . . . . . . . . . .22 12. Security considerations25 11.3. State transition for 1+1 unidirectional protection . . . . . . . . . . . . . . . . . . .24 13. IANA considerations. . . . 27 12. Provisioning mismatch and protocol failure in the APS mode . . . . . . . . . . . . . . . . .24 13.1. PSC Request Field. . . . . . 28 13. Security considerations . . . . . . . . . . . . .24 13.2.. . . . . . 28 14. IANA considerations . . . . . . . . . . . . . . . . . . . . . 28 14.1. MPLS PSC Request Registry . . . . . . . . . . . . . . . 29 14.2. MPLS PSC TLV Registry . . . . . . . . . . . . . . . . . 29 14.3. MPLS PSC Capability Flag Registry . . . . . . . . . . .25 14.29 15. Acknowledgements . . . . . . . . . . . . . . . . . . . . . .25 15.30 16. References . . . . . . . . . . . . . . . . . . . . . . . . .25 15.1.30 16.1. Normative References . . . . . . . . . . . . . . . . . .25 15.2.30 16.2. Informative References . . . . . . . . . . . . . . . . .2530 Appendix A. An example of out-of-service scenarios . . . . . . .2631 Appendix B. An example of sequence diagram showing the problem with the priority level ofClear SFSFc . .27. . . 32 Appendix C. Freeze Command . . . . . . . . . . . . . . . . . . .2833 Appendix D. Operation examples of the APS mode . . . . . . . . . 34 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .2938 1. Introduction Linear protection mechanisms for the MPLS Transport Profile (MPLS-TP) are described in RFC 6378 [RFC6378] to meet the requirements described in RFC 5654 [RFC5654]. This documentintroducesdescribes alternatewaysmechanisms to performcertain operations defined in [RFC6378], "MPLS Transport Profile (MPLS-TP) Linear Protection",some of the sub-functions of linear protection, and also defines additionalbehaviors. This setmechanisms. The purpose ofmodifiedthese alternate and additionalbehaviors together withmechanisms is to provide operator control and experience that more closely models theprotocol definedbehavior of linear protection seen in[RFC6378] meets the ITU-T'sother transport networks, such as Synchronous Digital Hierarchy (SDH), Optical Transport Network (OTN) and Ethernet transport networks. Linear protectionswitching requirements. Alternative behaviorsfor SDH, OTN, and Ethernet transport networks are defined in ITU-T Recommendations G.841 [G841], G.873.1 [G873.1] and G.8031 [G8031], respectively. The reader of this document is assumed to be familiar with RFC 6378. The alternative mechanisms described in this document are for the following capabilities: 1. Priority modification, 2. non-revertive behavior modification, and the following capabilities have been added to define additionalbehaviors:mechanisms: 3. support of Manual Switch to Working path (MS-W) command, 4. support of protection against Signal Degrade (SD), and 5. support of Exercise (EXER) command. Priority modification includes priority swapping between Signal Fail ontheProtection path (SF-P) and Forced Switch (FS), and raising the priority level of ClearSF.Signal Fail (SFc). Non-revertive behavior is modified to align with the behavior defined in RFC 4427 [RFC4427] as well as tomeetfollow theITU-T'sbehavior of linear protectionswitching requirements.seen in other transport networks. Support ofManual Switch to Working (MS-W)MS-W command to revert traffic to the working path innon-revertivenon- revertive operation is covered in this document. Support of protection switching protocol againstSignal Degrade (SD)SD is covered in this document. The specifics for the method of identifying SD is out of the scope of this document similarly toSFSignal Fail (SF) for[RFC6378].RFC 6378. Support ofExerciseEXER command to test if the Protection State Coordination (PSC) communication is operating correctly is also covered in this document. More specifically,the ExerciseEXER command tests and validates the linear protection mechanism and PSC protocol including the aliveness of theLocal Requestpriority logic, the PSC state machine and the PSC message generation and reception, and the integrity of the protection path, without triggering the actual traffic switching. This document introduces capabilities and modes. A capability is an individualbehavior,behavior. The capabilities of a node are advertised using the method given in this document. A mode is a particular combination of capabilities. Two modes are defined in this document: PSC mode and Automatic Protection Switching (APS) mode. This document describes the behavior of the PSC protocol including the priority logic and the state machine when all the capabilities associated with the APS mode are enabled. This document updates[RFC6378]RFC 6378 in that the capability advertisement method defined here is an addition to that document. For an existing implementation of[RFC6378],RFC 6378, it is recommended to be updated with the bug-fixes in [I-D.ietf-mpls-psc-updates] and the capabilityadevertisementadvertisement in this document. 2. Conventions Used in This Document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 3. Acronyms This document uses the following acronyms: APS Automatic Protection Switching DNR Do-not-Revert EXER Exercise FS Forced Switch LER Label Edge Router LO Lockout of protection MS Manual Switch MS-P Manual Switch to Protection path MS-W Manual Switch to Working path MPLS-TP MPLS Transport Profile NR No Request OC Operator Clear OTN Optical Transport Network PSC Protection State Coordination RR Reverse Request SD Signal Degrade SDH Synchronous Digital Hierarchy SD-P Signal Degrade ontheProtection path SD-W Signal Degrade ontheWorking path SF Signal Fail SFc Clear Signal Fail SFDc Clear Signal Fail or Degrade SF-P Signal Fail ontheProtection path SF-W Signal Fail ontheWorking path WTR Wait to Restore 4. Capability 1: PriorityModificationmodification In this document, the priorities ofForced Switch (FS)FS andSignal Fail on the Protection path (SF-P)SF-P are swapped and the priority of Clear SF (SFc) is raised. In addition to the priority modification, this document introduces the use ofaFreeze command in Appendix C. The reasons for these changes are explained in the followingsub- sectionssub-sections from technical and network operational aspects. 4.1. Motivations for swapping priorities of FS and SF-P Defining the priority of FS higher than that ofSignal Fail on the Protection path (SF-P)SF-P can result in a situation where the protected traffic is taken out-of-service. Setting the priority of any input that is supposed to besignalledsignaled to the other end to be higher than that of SF-P can result in unpredictable protection switching state, when the protection path has failed and consequently the PSC communication stopped. An example of the out-of-service scenarios is shown in AppendixAA. According to Section 2.4 of RFC 5654 [RFC5654] it MUST be possible to operate an MPLS-TP network without using a control plane. This means that external switch commands, e.g., FS, can be transferred to thefar endremote Label Edge Router (LER) only by using the PSC communication channel and should not rely on the presence of a control plane. As the priority of SF-P has been higher than FS inopticalother transportnetworksnetworks, such as SDH, OTN and Ethernet transport networks, for network operators it is important that the MPLS-TP protection switching preserves the network operation behavior to which network operators have become accustomed. Typically,theFS command is issued before network maintenance jobs, (e.g., replacing optical cables or other network components). When an operator pulls out a cable on the protection path by mistake, the traffic should be protected and the operator expects this behavior based on his/her experience on the traditional transport network operations. 4.2. Motivation for raising the priority ofClear SFSFc The priority level of SFc defined in RFC 6378 [RFC6378] can cause traffic disruption when a node that has experienced local signal fails on both the working and the protection paths is recovering from these failures. An example of sequence diagram showing the problem with the priority level of SFc as defined in[RFC6378]RFC 6378 is shown in Appendix B. 4.3. Motivation for introducing Freeze command With the priority swapping between FS and SF-P, the traffic is always moved back to the working path when SF-P occurs in ProtectingAdministrativeadministrative state. In the case that network operators need an option to control their networks so that the traffic can remain on the protection path even when the PSC communication channel is broken, the Freeze command, which is a local command (i.e., notsignalledsignaled to the other end) can be used. The use of the Freeze command is described in Appendix C. 4.4.UpdatesModifications tothe PSCRFC 6378 The list of local requests in order of priorityshouldSHALL be modified as follows: (from higher to lower) o Clear SignalFail/DegradeFail o Signal Fail ontheProtection path o Forced Switch o Signal Fail ontheWorking path The change of the PSCcontrolControl logic including the state machine due to this priority modification is incorporated in the PSCcontrolControl logic descriptionwhen all the capabilities are enabledin Section 10 and Section11.11 when all the capabilities are enabled. 5. Capability 2: Modification ofNon-revertive Operationnon-revertive operation Non-revertive mode of protection switching is defined in RFC 4427 [RFC4427]. In this mode, the traffic does not return to the working path when switch-over requests are terminated. However, PSC protocol defined in RFC 6378 [RFC6378] supports this operation only when recovering from a defect condition, but does not operate as non-revertive when an operator's switch-over command such asForced SwitchFS or Manual Switch (MS) is cleared. To be aligned with legacy transport network behavior and[RFC4427],RFC 4427, a node should go into the Do-not-Revert (DNR) state not only when a failure condition onathe working path is cleared but also when an operator command requesting switch-over is cleared. The change of the PSCcontrolControl logic including the state machine due to the modification of non-revertive operation is incorporated into the PSCcontrolControl logic descriptionwhen all the capabilities are enabledin Section 10 and Section11.11 when all the capabilities are enabled. 6. Capability 3: Support ofManual Switch to Working CommandMS-W command 6.1. Motivation for addingManual Switch to WorkingMS-W Changing the non-revertive operation introduces necessity of a new operator command to revert traffic to the working path when inDo- not-Revert (DNR)the DNR state. When the traffic is on the protection path in the DNR state, a Manual Switch to Working (MS-W) command is issued to switch the normal traffic back totheworking path. According to Section 4.3.3.6 (Do-not-Revert State) in RFC 6378 [RFC6378], "to revert back to Normal state, the administrator SHALL issue a Lockout of protection (LO) command followed by a Clear command." However, using LO command introduces the potential risk of an unprotected situation while theLockout of protectionLO is in effect. Manual Switch-over for recovery LSP/span command, defined in RFC 4427 [RFC4427] and also defined in RFC 5654 [RFC5654], Requirement 83, as one of the mandatory external commands, should be used for this purpose, but is not included in[RFC6378].RFC 6378. Note that the "Manual Switch-over for recovery LSP/span" command is the same as MS-W command. 6.2. Terms modified to support MS-W The term "Manual Switch" and its acronym "MS" used in[RFC6378]RFC 6378 are replaced respectively by "Manual Switch toProtection"Protection path" and "MS-P" by this document to avoid confusion with "Manual Switch toWorking"Working path" and its acronym "MS-W". Also, the term "Protecting administrative state" used in[RFC6378]RFC 6378 is replaced by "Switching administrative state" by this document to include the case where traffic is switched back to the working path by administrativeManual Switch to WorkingMS-W command. 6.3. Behavior of MS-P and MS-W The MS-P and MS-W commands SHALL have the same priority. If one of these commands is already issued and accepted,andthen the other command that is issued afterwards SHALL be ignored. If two LERs are requesting opposite operations simultaneously, i.e. one LER is sending MS-P while the other LER is sending MS-W, the MS-W SHALL be considered to have a higher priority than MS-P, and MS-P SHALL beignored.ignored and cancelled. Two commands, MS-P and MS-W are represented by the same Request Field value, but differentiated by the FPath value. When traffic is switched to the protection path, the FPath field SHALL indicate that the working path is being blocked (i.e., FPath set to 1), and the Path field SHALL indicate that user data traffic is being transported on the protection path (i.e., Path set to 1). When traffic is switched to the working path, the FPath field SHALL indicate that the protection path is being blocked (i.e., FPath set to 0), and the Path field SHALL indicate that user data traffic is being transported on the working path (i.e., Path set to 0). 6.4. Equal priority resolution for MS[RFC6378]RFC 6378 defines only one rule for equal priority condition in Section 4.3.2 as "The remote message from thefar-endremote LER is assigned a priority just below the similar local input." In order to support the manual switch behavior described in Section 6.3, additional rules for equal priority resolution are required. Since the support of protection against signaldegradesdegrade also requires a similar equal priority resolution, the rules are described in Section 7.4. The change of the PSCcontrolControl logic including the state machine due to the support of MS-W command is incorporated into the PSCcontrolControl logic description in Section 10 and Section 11 when all the capabilities are enabledin Section 10 and Section 11.7. Capability 4: Support of protection againstSignal DegradeSD 7.1. Motivation for supporting protection againstSignal DegradeSD In MPLS-TP survivability framework [RFC6372], fault conditions include bothSignal Fail (SF)SF andSignal Degrade (SD)SD that can be used to trigger protection switching. RFC 6378 [RFC6378], which defines theProtection State Coordination (PSC) protocol,protection switching protocol for MPLS-TP does not specify how the SF and SD aredeclareddetected, and specifies the protection switching protocol associated with SF only. Theprotection switchingPSC protocol associated with SD is covered in this document, and the specifics for the method of identifying SD is out of the scope ofPSCthe protection protocolsimilarlysimilar to the facts that howto detectSF is detect and how MS and FS commands are initiated in a management system andsignalledsignaled toPSC.protection switching are out of its scope. 7.2. Terms modified to support SD Instead of SFc, Clear Signal Fail(SFc) includesor Degrade (SFDc) is used to indicate the clearance of either a degraded conditionin addition to the clearance ofor a failureconditioncondition. The second paragraph of Section 4.3.3.2 UnavailableStatestate in[RFC6378]RFC 6378 shows the intention of including Signal Degrade ontheProtection path (SD-P) in the Unavailable state. Even though the protection path can be partially available under the condition ofthe Signal Degrade on the Protection path,SD-P, this document follows the same state grouping as[RFC6378]RFC 6378 forSD on the protection path.SD-P. The bullet item "Protecting failure state" in Section3.6. PSC Control States3.6 in[RFC6378]RFC 6378 includes the degraded condition inProtection FailureProtecting failure state. This document follows the same state grouping as[RFC6378]RFC 6378 for Signal Degrade ontheWorking path (SD-W). 7.3. Behavior of protection against SD In order to maintain the network operation behavior to which transport network operators have become accustomed, the priorities of SD-P and SD-W are defined to be equal as in other transport networks, such as SDH, OTN andEthernet.Ethernet transport networks. Once a switch has been completed due toSignal DegradeSD on one path, it will not be overridden bySignal DegradeSD on the other path (first come, first served behavior), to avoid protection switching that cannot improve signalquality and flapping. Signal Degrade (SD)quality. SD indicates that the transmitting end point has identified a degradation of the signal, or integrity of the packet transmission on either the working path or the protection path. The FPath field SHALL identify the path that is reporting the degrade condition (i.e., if the protection path, then FPath is set to 0; if the working path, then FPath is set to 1), and the Path field SHALL indicate where the data traffic is being transported (i.e., if the working path is selected, then Path is set to 0; if the protection path is selected, then Path is set to 1). The Wait to Restore (WTR) timer is used when the protected domain is configured for revertive behavior and started at the node that recovers from a local degraded condition on the working path.If the detection of aProtection switching against SDdepends on the presence of user data packets, such a condition declared on the working pathiscleared following protection switching to the protection path ifalways provided by a selector bridgeis used, possibly resulting in flapping. To avoid flapping, the selector bridge should duplicate theduplicating user data traffic andfeedfeeding it to bothworking and protection paths under SD condition. In revertive mode, when WTR timer expires the packet duplication will be stopped and the user data traffic will be transported onthe working pathonly. In non-revertive mode, when SD is cleared the packet duplication will be stoppedand theuser data traffic will be transported on theprotection pathonly.under SD condition. Whenmultiple SDs are detected simultaneously, either asa local or remoterequests on both working and protection paths, the SD on the standby path (the path from which the selector does not select the user data traffic) is considered as having higher priority than theSD occurs on either theactive path (theworking pathfrom which the selector selectsor theuser data traffic). Therefore, no unnecessaryprotectionswitching is performed andpath, the LER SHALL duplicate user data trafficcontinues to be selected from the active path. In the preceding paragraph, "simultaneously" relatesand SHALL feed tothe occurrence of SD onboth theactiveworking path andstandby paths at input to the Protection State Control Logic in Figure 1 of [RFC6378] atthesame time, orprotection path. The packet duplication SHALL continue as long asaany SDrequest has not been acknowledged by the remote endcondition exists inbidirectional protection switching. In other words,the protected domain, and SHALL stop whena local node that has transmitted a SD message receives athere is no SDmessage that indicates a different value of data path (Path) field thancondition. Additionally, thevalue ofpacket duplication SHALL continue in thePath fieldWTR state in revertive mode. In non-revertive mode, thetransmittedpacket duplication SHALL stop when there is no SDmessage, both the local andcondition. The selector bridge with theremotepacket duplication under SDrequests arecondition, which is a non-permanent bridge, is considered tooccur simultaneously.be a 1:1 protection architecture. 7.4. Equal priority resolution In order to support the manual switch behavior described in Section 6.3 and the protection against Signal Degrade described in Section 7.3, the rules to resolve the equal priority requests are required. For the equal priority localinputs with same priority,inputs, such as MS and SD, first-come, first-served rule is applied. Once a local input is determined as the highest priority local input, then a subsequent equal priority local input requesting a different action, i.e., the action results in the same PSC Request Field but different FPath value,to the PSC control logicwill not be presented to the PSCcontrolControl logic as the highest local request. Furthermore, in the case ofMS,MS command, the subsequentMSlocalinputMS command requesting a different action will be cancelled.The remote message from the far-end LER is assigned a priority just below the similar local input. For example, a remote Forced Switch would have a priority just below a local Forced Switch but above a local Signal Fail on working input assuming that the priority modification is in place as in Section 4.4 However, ifIf the LER is in a remote state due to a remote SD (or MS) message, a subsequent local input having the same priority but requesting different action to thecontrolPSC Control logic, will be considered as having lower priority than the remote message, and will be ignored.For example, ifIf the LER is in remoteUnavailableSwitching administrative state due to a remoteSD-P,MS-P, then subsequent localSD-W input willMS-W SHALL beignored. Likewise, ifignored and automatically cancelled. If the LER is in remoteSwitching administrativeUnavailable state due to a remoteMS-P,SD-P, then subsequent localMS-WSD-W input will beignored and automatically cancelled. It shouldignored. However, the local SD-W SHALL appear in the Local Request logic as long as the SD condition exists, but SHALL NOT benoted that therethe top priority global request, which determines the state transition at the PSC Control logic. There is areversecase where one LER receives a local input and the other LER receives, simultaneously,ana local input with the same priority but requesting different action. In this case, each of the two LERs receives a subsequent remote message having the same priority but requesting different action, while the LER is in a local state due to the local input.InWhen thiscase,case happens, a priority must be set for the inputs with the same priority regardless of its origin (local input or remote message).For example, one LER receives SD-P as a local input and the other LER receives SP-W as a local input, simultaneously. Likewise, one LER receives MS-P as a local input and the other LER receives MS-W as a local input, simultaneously. When MS-WWhen MS-W and MS-P occur simultaneously at both LERs, MS-W SHALL be considered as having higher priority than MS-P at both LERs. When SD-W and SD-P occur simultaneously at both LERs,In this case,the SD on the standby path (the path from which the selector does not select the user data traffic) is considered as having higher priority than the SD on the active path (the path from which the selector selects the user data traffic) regardless of its origin (local or remote message). Therefore, no unnecessary protection switching is performed and the user data traffic continues to be selected from the active path.GivingIn thehigher prioritypreceding paragraphs, the "simultaneously" refers to the case a sent SDon(or MS) request has not been confirmed by thestandbyremote end in bidirectional protection switching. When a local node that has transmitted a SD message receives a SD (or MS) message that indicates a different value of data pathSHALL also be applied to(Path) field than theLocal Request logic when two SDs for different paths happen to be presented tovalue of theLocal Request logic exactly atPath field in thesame time.transmitted SD (or MS) message, both the local and the remote SD requests are considered to occur simultaneously. The change of the PSCcontrolControl logic including the state machine due to the support of protection against SD is incorporated into the PSCcontrolControl logic descriptionwhen all the capabilities are enabledin Section 10 and Section11.11 when all the capabilities are enabled. 8. Capability 5: Support ofExercise Command ExerciseEXER command EXER is a command to test if the PSC communication is operating correctly. More specifically,the ExerciseEXER is to test and validate the linear protection mechanism and PSC protocol including the aliveness of the Local Request logic, the PSC state machine and the PSC message generation and reception, and the integrity of the protection path, without triggering the actual traffic switching. It is used while the working path is either carrying the traffic or not. Itishas lower priority than any "real" switch request. It is only valid in bidirectional switching, since this is the only place where one can get a meaningful test by looking for a response. This command is documented in R84 of[RFC5654] and it has been identified as a requirement from ITU-T.RFC 5654 [RFC5654]. A received EXER message indicates that the remote end point is operating under an operator command to validate the protection mechanism and PSC protocol including the aliveness of the Local Request logic, the PSC state machine and the PSC message generation and reception, and the integrity of the protection path, without triggering the actual traffic switching. The valid response to EXER messagewill beis an Reverse Request (RR) with the corresponding FPath and Path numbers. Thenear end willlocal LER SHALL signal aReverse Request (RR)RR only in response to an EXER command from thefar end.remote LER. When Exercise commands are input at both ends, an EXER, instead of RR,isSHALL be transmitted from both ends. The following PSC RequestsshouldSHALL be added to PSC Request field to support Exercise:(TBD2)(3) Exercise - indicates that the transmitting end point is exercising the protection channel and mechanism. FPath and Path are set to the same value of theNR,No Request (NR), RR or DNR request that EXER replaces.(TBD1)(2) Reverse Request - indicates that the transmitting end point is responding to an EXER command from thefar end.remote LER. FPath and Path are set to the same value of theNR, RRNR or DNR request thatEXERRR replaces. The priority of ExerciseshouldSHALL be inserted between the priorities of WTR Expires and No Request. 9. Capabilities andModesmodes 9.1. Capabilities A Capability is an individual behavior whose use issignalledsignaled in a Capabilities TLV, which is placed in Optional TLVs field inside the PSCmessagesmessage shown in Figure 2 of RFC 6378 [RFC6378]. The format of the Capabilities TLV is: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = Capabilities | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Value =OptionsFlags | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: Format of Capabilities TLV The value of the Type field isTBD3TBD pending IANA allocation. The value of the Length field is the length of theOptions Value, and isFlags field in octets. TheValuelength of theCapabilities TLV canFlags field MUST beany length, as long as it isa multiple of 4octets. The length of the Value fieldoctets and MUST be the minimum required to signal all the required capabilities. Section 4 to Section 8 discuss five capabilities that aresignalledsignaled using the5five most significant bits; if a node wishes to signal these five capabilities, it MUST sendan Options Valuea Flags field of 4 octets. A node would sendan Options Valuea Flags field greater than 4 octets only if it had more than 32 Capabilities to indicate. All unused bits MUST be set to zero. If the bit assigned for an individual capability is set to 1, it indicates the sending node's intent to use that capability in the protected domain. If a bit is set to 0, the sending node does not intend to use the indicated capability in the protected domain. Note that it is not possible to distinguish between the intent not to use a capability and a node's complete non-support(i.e.(i.e., lack of implementation) of a given capability. This document defines five specific capabilities that are described from Section 4 to Section 8. Each capability is assigned bit as follows: 0x80000000: priority modification 0x40000000:modification ofnon-revertive behavior modification 0x20000000: support ofManual Switch to Working (MS-W)MS-W command 0x10000000: support of protection againstSignal Degrade (SD)SD 0x08000000: support ofExerciseEXER command9.1.1.If all the five capabilities should be used, an LER SHALL set 0xF8000000 in the Flags field. 9.1.1. Sending the Capabilities TLV PSC sends messages in response to external events and in periodic retransmission of current status. It may be expensive to send and to parse an Capabilities TLV attached to a packet intended to trigger a protection switch or otherreal- timereal-time behavior. However, if a node does not periodically send its Capabilities TLV, the receiving node cannot discriminate a deliberate omission of the Capabilities TLV for performance reasons from an accidental omission due to an implementation issue. To guard against this, a node MUST include its Capabilities TLV in every PSC message that it sends. 9.1.2. Receiving the Capabilities TLV A node MUST establish a receive timer for the Capabilities TLV. By default this MUST be 3.5 times the periodic retransmission timer of five seconds - i.e., 17.5 seconds. Both the periodic retransmission time and the timeout SHOULD be configurable by the operator. When a node receives a Capabilities TLV it resets the timer to 17.5 seconds. If the timer expires, the node behaves as in Section 9.1.3.[Editor's note: In other packet transport protection technologies, Failure of Protocol defect (dFOP) is declared when no protocol message is received on the protection path during at least 3.5 times the periodic message transmission interval (i.e., at least 17.5 seconds) and there is no defect on the protection transport entity. As the "Capabilities TLV" is included in the PSC message, this error of not receiving the Capabilities TLV can be covered by dFOP. To be discussed.]When a node receives a Capabilities TLV it MUST compare it to its most recent transmitted Capabilities TLV. If the two are equal, the protected domain is said to be running in the mode indicated by that set of capabilities (see Section 9.2). If the sent and received Capabilities TLVs are not equal, this indicates a capabilities mismatch. When this happens, the node MUST alert the operator and MUST behave as in Section 9.1.3. 9.1.3. Handling Capabilities TLV errors This section covers the two possible errors - a TLV timeout and a TLV mismatch - and the error handling procedures in both cases. 9.1.3.1. Capabilities TLV Timeout If the Capabilities TLV receive timerexpires, a nodeexpires and there issaid to have timed out. When this happens,no defect on the protection path, the node MUST alert the operator and MUST behave as in Section 9.1.3.3. 9.1.3.2. Capabilities TLV Mismatch If the sent and received Capabilities TLVs are not equal, this indicates a capabilities mismatch. When this happens, the node MUST alert the operator and MUST behave as in Section 9.1.3.3. A node MAY retain the received TLV for logging, alert or debug purposes. 9.1.3.3. Handling Capabilities TLV error conditions When a node enters in Capabilities protocol error conditions, the following actions MUST be taken: 1. Indicate the error condition (e.g., either mismatch or timeout) to the operator by the usual alert mechanisms (e.g., syslog). 2. Not make any state transitions based on the contents of any PSCMessagesmessages To expand on point 2 - assume node A is receiving NR(0,0) from its PSC peer node Z and is also receiving a mismatched set of capabilities (e.g., received0x4,0x20000000, transmitted0x5).0xA0000000). If node Z detects a local SF-W and wants to initiate a protection switch (that is, by sending SF(1,1)), node A MUST NOT react to this input by changing its state. A node MAY increase the severity or urgency of its alarms to the operator, but until the operator resolves the mismatch in the Capabilities TLV the protected domain will likely operate in an inconsistent state. 9.2. Modes A Mode is a given set of Capabilities. Modes are shorthand; referring to a set of capabilities by their individual values or by the name of their mode does not change the protocol behavior. This document defines two modes - PSC and APS. 9.2.1. PSC Mode PSC Mode is defined as the lack of any Capabilities - that is, a Capabilities set of 0x0. It is the behavior specified inRFC6378.RFC 6378. There are two ways to declare PSC Mode. A node can send a Capabilities TLV of 0x0, or it can send no Capabilities TLV at all. This is further explored in Section 9.3. 9.2.2. APS Mode APS Mode is defined as the use of allofthe five specific capabilities, which are described from Section 4 to Section 8 in this document. APS Mode is indicated witha Valuethe Flags value of 0xF8000000. 9.3. Backward compatibility As defined in Section 9.2.1, PSC Mode is indicated either with a Capabilities TLV of 0x0 or the lack of Capabilities TLV. This is to allow backward compatibility between two nodes - one which can send the Capabilities TLV, and one which cannot.[RFC6378]RFC 6378 does not define how to handle an unrecognized TLV. There may be some implementations that silently discard an unrecognized TLV, and some that take more drastic steps like refusing to allow PSC to operate. Thus, a node which has the ability to send and receive the PSC Mode Capabilities TLV MUST be able to both send the PSC Mode Capabilities TLV and send no Capabilities TLV at all. An implementation MUST be configurable between these two choices. One question that arises from this dual definition of PSC Mode is, what happens if a node which was sending a non-null Capabilities TLV (e.g., APS Mode) sends PSC packets without any Capabilities TLV? This case is handled as follows: If a node has never, during the life of a PSC session, received a Capabilities TLV froma neighbour,its peer, the lack of a Capabilities TLV is treated as receipt of a PSC Capabilities TLV. This allows forinteropinteroperability between nodes which support the PSC Mode TLV and nodes which do not, and are thus implicitly operating in PSC Mode. If a node has received a non-null Capabilities TLV (e.g., APS Mode) during the life of a PSC session and then receives a PSC packet with no Capabilities TLV, the receiving node MUST treat the lack of Capabilities TLV as simply a lack of refresh. That is, the receipt of a PSC packet with no Capabilities TLV simply does not reset the receive timer defined in Section 9.1.2. 10. PSC Protocol in APS Mode This section and Section 11definesdefine the behavior of PSC protocol when all of the aforementioned capabilities are enabled, i.e., APS mode. 10.1. Request field in PSC protocol message The values of "Request" field inthePSC protocol message, which is shown in Figure 2 of RFC 6378 [RFC6378], aredefinedredefined as follows: (14) Lockout of protection (12) Forced Switch (10) Signal Fail (7) Signal Degrade (5) Manual Switch (4) Wait-to-Restore(TBD2)(3) Exercise(TBD1)(2) Reverse Request (1) Do-not-Revert (0) No Request 10.2. Priorities of local inputs and remote requests Based on the description in Section 3 and Section 4.3.2 in[RFC6378],RFC 6378, the priorities of multiple outstanding local inputs are evaluated in the Local Requestlogic unit,logic, where the highest priority localrequestinput (highest local request) is determined. Thishigh-priorityhighest local request is passed to the PSC Control logic, that will determine the higher priority input (top priority global request) between the highestprioritylocalinputrequest and the last received remote message. When a remote message comes to the PSC Control logic, the top priority global request is determined between this remote message and the highestprioritylocalinputrequest which is present. The top priority global request is used to determine the state transition, which is described in Section 11. The priorities for both local and remote requests are defined as follows from highest to lowest: o Operator Clear (Local only) o Lockout of protection (Local and Remote) o Clear SignalFail/DegradeFail or Degrade (Local only) o Signal Fail on Protection path (Local and Remote) o Forced Switch (Local and Remote) o Signal Fail on Working path (Local and Remote) o Signal Degrade on either Protection path or Working path (Local and Remote) o Manual Switch to either Protection path or Working path (Local and Remote) o WTR Expires (Local only) o WTR (Remote only) o Exercise (Local and Remote) o Reverse Request (Remote only) o Do-Not-Revert (Remote only) o No Request (Remote and Local) Note that the "Local only" requests are not signaled to the remote LER. Likewise, the "Remote only" requests do not exist in the Local Request logic as local inputs. For example, the priority of WTR only applies to the received WTR message, which is generated from the remote LER. The remote LER that is running the WTR timer in the WTR state has no local request. The remote request from thefar-endremote LER is assigned a priority just below the same local request. However, for the equal priority requests, such asSignal Degrade on either Working or protectionSD andManual Switch to either Protection or Working path,MS, the following equal priority resolution rules are defined: o If two local inputs having the same priority but requesting different action come to the Local Request logic, then the input coming first SHALL be considered to have a higher priority than the other coming later (first-come, first-served). o If theLER receivesPSC Control logic has bothathe highest localinputrequest and a remote message with the same priority and requesting the same action, i.e., the same PSC Request Field and the same FPath value, then the local input SHALL be considered to have a higher priority than the remote message. o If theLER receivesPSC Control logic has bothathe highest localinputrequest and a remote message with the same priority but requesting differentactions, i.e.,action and thesame PSC Request Field but different FPath value, thenremote message exists when thefirst-come, first-served rulehighest local request comes to the PSC Control logic, the highest local request is ignored and the remote Request SHALL beapplied.the top priority global request. o If theremote message comes first, thenPSC Control logic has both thestate SHALL behighest local request and a remotestatemessage with the same priority but requesting different action andsubsequent local input is ignored. However, ifthe highest localinput comes first, the first-come, first-served rule cannot be applied and must be viewed as simultaneous condition. This is becauserequest exists when thesubsequentremote messagewill not be an acknowledge of the local input bycomes to thefar- end node. In this case,PSC Control logic, the top priority global request SHALL be determined by the following rules for each simultaneouscondition.condition: oIf the LER receives both MS-P and MS-W requests as both local input and remote message and the LER is in a local Switching administrative state, thenFor simultaneous MS requests, the MS-W request SHALL be considered to have a higher priority than the MS-P request.o If theThe LERreceives both SD-P and SD-W requests as boththat has localinput and remote message andMS-W request SHALL maintain the local MS-W request as the top priority global request, but the other LERis in athat has localstate, thenMS-P request SHALL clear the MS-P command and internally generate "Operator Clear" request. o For simultaneous SD requests, the SD on the standby path (the path from which the selector does not select the user data traffic) SHALL be considered as having higher priority than the SD on the active path (the path from which the selector selects the user data traffic) regardless of its origin (local or remote message).This rule of giving the higher priority toThe LER that has the SD on the standby path SHALLalso be applied to the Local Request logic when two SDs for different paths happen to be presented to the Local Request logic exactly at the same time. 11. State Transition Tables in APS Mode When there is a change inmaintain thehighest-prioritylocal SD on the standby path requestor in remote PSC messages,as the top priority globalrequest is evaluated and the state transition tables are looked up in PSC control logic.request. Thefollowing rules are applied toother LER that has local SD on theoperation relatedactive path SHALL use the remote SD on the standby path as the top priority global request to lookup the state transitiontable lookup. o Iftable. The differentiation of the active and standby paths is based upon which path had been used for the user data traffic at the time just before an LER selected its local SD as the top priority globalrequest, which determines the state transition,request. No Request is another exception to thehighestrule of assigning a remote request a prioritylocal input,just below the same local request. Since a received NR message needs to be used in the state transition table lookup when there is no outstanding local request, the received remote NR request SHALL beused to decidethenext state oftop priority global request when there is no request in the local LER.Otherwise, remote messages state transition table10.3. Acceptance and retention of local inputs A local input indicating a defect, such as SF-P, SF-W, SD-P and SD-W, SHALL beused. o Ifaccepted and retained persistently inremote state,the Local Request logic as long as the defect condition exists. If there is any higher priority local input than the local defect input, the higher priority local input is passed to the PSC Control logic as the highest local request, but the local defectcondition (SF-P, SF-W, SD-P or SD-W) SHALL alwaysinput cannot bereflectedremoved but remains in the Local RequestField and Fpath. ologic. When the higher priority local input disappears, the local defect will become the highest local request if the defect condition still exists. Operator Clear command,Clear SF/SD (SFc)SFDc and WTR Expires are not persistent. Once they appear to thelocal priorityLocal Request logic and complete the operation, theywillSHALL be disappeared. Operator LO, FS, MS, and EXER commands SHALL be rejected if there is any higher priority local input in the Local Request logic. If a new operator command is accepted, any previous lower-priority local operator command SHALL be cancelled. When any higher priority remote request is received, a lower-priority local operator command SHALL be cancelled. The cancelled operator command is forgotten and will never return, unless the operator reissues the command. 11. State Transition Tables in APS Mode When there is a change in the highest local request or in remote PSC messages, the top priority global request SHALL be evaluated and the state transition tables SHALL be looked up in the PSC Control logic. The following rules are applied to the operation related to the state transition table lookup. o If the top priority global request, which determines the state transition, is the highest local request, the local state transition table in Section 11.1 SHALL be used to decide the next state of the LER. Otherwise, remote messages state transition table in Section 11.2 SHALL be used. o If in remote state, the highest local defect condition (SF-P, SF-W, SD-P or SD-W) SHALL always be reflected in the Request Field and Fpath. o For the LER currently in the local state, if the top priority global request is changed to OC orSFcSFDc causing the next state to be Normal, WTR or DNR, then all the local and remote requests should be re-evaluated as if the LER is in the state specified in the footnotes to the state transition tables, before deciding the final state. This re-evaluation is an internal operation confined within the local LER, and PSC messages are generated according to the final state. o The WTR timer is started only when the LER which has recovered from a local failure/degradation enters the WTR state. An LER which is entering into the WTR state due to a remote WTR message does not start the WTR timer. The WTR timer is stopped when any local or remote request triggers the state change out of the WTR state. The extended states, as they appear in the table, are as follows: N Normal state UA:LO:L Unavailable state due to local LO command UA:P:L Unavailable state due to local SF-P UA:DP:L Unavailable state due to local SD-P UA:LO:R Unavailable state due to remote LO message UA:P:R Unavailable state due to remote SF-P messageUA:DP:LUA:DP:R Unavailable state due tolocalremote SD-P message PF:W:L Protecting failure state due to local SF-W PF:DW:L Protecting failure state due to local SD-W PF:W:R Protecting failure state due to remote SF-W message PF:DW:R Protecting failure state due to remote SD-W message SA:F:L Switching administrative state due to local FS command SA:MW:L Switching administrative state due to local MS-W command SA:MP:L Switching administrative state due to local MS-P command SA:F:R Switching administrative state due to remote FS message SA:MW:R Switching administrative state due to remote MS-W message SA:MP:R Switching administrative state due to remote MS-P message E::L Exercise state due to local EXER command E::R Exercise state due to remote EXER message WTR Wait-to-Restore state DNR Do-not-Revert state Each state corresponds to the transmission of a particular set of Request, FPath and Path bits. The table below lists the message that is generally sent in each particular state. If the message to be sent in a particular state deviates from the table below, it is noted in the footnotes to the state transition tables. State REQ(FP,P) ------- --------- N NR(0,0) UA:LO:L LO(0,0) UA:P:L SF(0,0) UA:DP:L SD(0,0) UA:LO:R highest local request(local FPath,0) UA:P:R highest local request(local FPath,0) UA:DP:R highest local request(local FPath,0) PF:W:L SF(1,1) PF:DW:L SD(1,1) PF:W:R highest local request(local FPath,1) PF:DW:R highest local request(local FPath,1) SA:F:L FS(1,1) SA:MW:L MS(0,0) SA:MP:L MS(1,1) SA:F:R highest local request(local FPath,1) SA:MW:Rhighest local request(local FPath,0)NR(0,0) SA:MP:Rhighest local request(local FPath,1)NR(0,1) WTR WTR(0,1) DNR DNR(0,1) E::L EXER(0,x), where x is the existing Path value when Exercise command is issued. E::R RR(0,x), where x is the existing Path value when RR message is generated. Some operation examples of the APS mode are shown in Appendix D. 11.1. State transition by local inputs | OC | LO |SFcSFDc | SF-P | FS | SF-W |--------+-----+---------+-----+--------+--------+--------+--------+-----+---------+------+--------+--------+--------+ N | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | UA:LO:L | (1) | i | i | i | i | i | UA:P:L | i | UA:LO:L | (1) | i | i | i | UA:DP:L | i | UA:LO:L | (1) | UA:P:L | SA:F:L | PF:W:L | UA:LO:R | i | UA:LO:L | i | UA:P:L | i | PF:W:L | UA:P:R | i | UA:LO:L | i | UA:P:L |PF:W:Li | PF:W:L | UA:DP:R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | PF:W:L | i | UA:LO:L | (2) | UA:P:L | SA:F:L | i | PF:DW:L | i | UA:LO:L | (2) | UA:P:L | SA:F:L | PF:W:L | PF:W:R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | PF:DW:R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | SA:F:L | (3) | UA:LO:L | i | UA:P:L | i | i | SA:MW:L | (1) | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | SA:MP:L | (3) | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | SA:F:R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | SA:MW:R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | SA:MP:R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | WTR |i(4) | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | DNR | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | E::L |(4)(5) | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | E::R | i | UA:LO:L | i | UA:P:L | SA:F:L | PF:W:L | | SD-P | SD-W | MS-W | MS-P | WTRExp | EXER --------+---------+---------+---------+---------+--------+------ N | UA:DP:L | PF:DW:L | SA:MW:L | SA:MP:L | i | E::L UA:LO:L | i | i | i | i | i | i UA:P:L | i | i | i | i | i | i UA:DP:L | i | i | i | i | i | i UA:LO:R | UA:DP:L | PF:DW:L | i | i | i | i UA:P:R | UA:DP:L | PF:DW:L | i | i | i | i UA:DP:R | UA:DP:L | PF:DW:L | i | i | i | i PF:W:L | i | i | i | i | i | i PF:DW:L | i | i | i | i | i | i PF:W:R | UA:DP:L | PF:DW:L | i | i | i | i PF:DW:R | UA:DP:L | PF:DW:L | i | i | i | i SA:F:L | i | i | i | i | i | i SA:MW:L | UA:DP:L | PF:DW:L | i | i | i | i SA:MP:L | UA:DP:L | PF:DW:L | i | i | i | i SA:F:R | UA:DP:L | PF:DW:L | i | i | i | i SA:MW:R | UA:DP:L | PF:DW:L | SA:MW:L | i | i | i SA:MP:R | UA:DP:L | PF:DW:L | i | SA:MP:L | i | i WTR | UA:DP:L | PF:DW:L | SA:MW:L | SA:MP:L | (6) | i DNR | UA:DP:L | PF:DW:L | SA:MW:L | SA:MP:L | i | E::L E::L | UA:DP:L | PF:DW:L | SA:MW:L | SA:MP:L | i | i E::R | UA:DP:L | PF:DW:L | SA:MW:L | SA:MP:L | i | E::L11.2. State transition by remote messages | LO | SF-P |NOTES: (1) Re-evaluate to determine final state as if the LER is in the Normal state. (2) In the case that both local input after SFDc and the last received remote message are no requests, the LER enters into the WTR state when the domain is configured for revertive behavior, or the LER enters into the DNR state when the domain is configured for non-revertive behavior. In all the other cases, re-evaluate to determine the final state as if the LER is in the Normal state. (3) Re-evaluate to determine final state as if the LER is in the Normal state when the domain is configured for revertive behavior, or as if the LER is in the DNR state when the domain is configured for non-revertive behavior, (4) Remain in WTR and send NR(0,1). Stop the WTR timer if it is running. (5) If Path value is 0, re-evaluate to determine final state as if the LER is in the Normal state. If Path value is 1, re-evaluate to determine final state as if the LER is in the DNR state. (6) Remain in WTR and send NR(0,1). 11.2. State transition by remote messages | LO | SF-P | FS | SF-W | SD-P | SD-W | --------+---------+--------+--------+--------+---------+---------+ N | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | UA:LO:L | i | i | i | i | i | i | UA:P:L | UA:LO:R | i | i | i | i | i | UA:DP:L | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | i |(10)(7) | UA:LO:R | i | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | UA:P:R | UA:LO:R | i | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | UA:DP:R | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | i | PF:DW:R | PF:W:L | UA:LO:R | UA:P:R | SA:F:R | i | i | i | PF:DW:L | UA:LO:R | UA:P:R | SA:F:R | PF:W:R |(11)(8) | i | PF:W:R | UA:LO:R | UA:P:R | SA:F:R | i | UA:DP:R | PF:DW:R | PF:DW:R | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R |PF:DW:Ri | SA:F:L | UA:LO:R | UA:P:R | i | i | i | i | SA:MW:L | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | SA:MP:L | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | SA:F:R | UA:LO:R | UA:P:R | i | PF:W:R | UA:DP:R | PF:DW:R | SA:MW:R | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | SA:MP:R | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | WTR | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | DNR | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | E::L | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | E::R | UA:LO:R | UA:P:R | SA:F:R | PF:W:R | UA:DP:R | PF:DW:R | | MS-W | MS-P | WTR | EXER | RR | DNR | NR--------+---------+---------+-----+------+----+-----+------------+---------+---------+-----+------+----+------+---- N | SA:MW:R | SA:MP:R | i | E::R | i | i | i UA:LO:L | i | i | i | i | i | i | i UA:P:L | i | i | i | i | i | i | i UA:DP:L | i | i | i | i | i | i | i UA:LO:R | SA:MW:R | SA:MP:R | i | E::R | i | i | N UA:P:R | SA:MW:R | SA:MP:R | i | E::R | i | i | N UA:DP:R | SA:MW:R | SA:MP:R | i | E::R | i | i | N PF:W:L | i | i | i | i | i | i | i PF:DW:L | i | i | i | i | i | i | i PF:W:R | SA:MW:R | SA:MP:R |(7)(9) | E::R | i |(8)(10) |(5)(11) PF:DW:R | SA:MW:R | SA:MP:R |(7)(9) | E::R | i |(8)(10) |(5)(11) SA:F:L | i | i | i | i | i | i | i SA:MW:L | i | i | i | i | i | i | i SA:MP:L | i | i | i | i | i | i | i SA:F:R | SA:MW:R | SA:MP:R | i | E::R | i | DNR | N SA:MW:R | i | SA:MP:R | i | E::R | i | i | N SA:MP:R | SA:MW:R | i | i | E::R | i | DNR | N WTR | SA:MW:R | SA:MP:R | i | i | i | i |(9)(12) DNR | SA:MW:R | SA:MP:R | i | E::R | i | i | i E::L | SA:MW:R | SA:MP:R |i |(13)| i | i | i | i E::R | SA:MW:R | SA:MP:R | i | i | i | DNR | N NOTES:(1) Re-evaluate to determine final state as if the LER is in(7) If theNormal state. (2) Inreceived SD-W message has Path=0, ignore thecase that both local input andmessage. If thelastreceivedremoteSD-W messageare no request after the occurrence of SFc, the LER enters into the WTRhas Path=1, go to PF:DW:R statewhen the domain is configured for revertive behavior, or the LER enters intoand transmit SD(0,1) (8) If theDNR state whenreceived SD-P message has Path=1, ignore thedomain is configured for non-revertive behavior. In allmessage. If theother cases, re-evaluatereceived SD-P message has Path=0, go todetermine the finalUA:DP:R stateas if the LER is in the Normal state. (3) Re-evaluateand transmit SD(1,0). (9) Transition todetermine final state as if the LER is in the Normal state when the domain is configured for revertive behavior, or as if the LER is in the DNRWTR statewhen the domain is configured for non-revertive behavior, (4) If Path value is 0, re-evaluateand continue todetermine final state as if the LER is insend theNormal state. If Path value is 1, re-evaluatecurrent message. (10) Transition todetermine final state as if the LER is in theDNR state(5)and continue to send the current message. (11) If the received NR message has Path=1, transition to WTR if domain configured for revertive behavior, else transition to DNR.(6) Remain in WTR, send NR(0,1). (7) Transition to WTR state and continue to sendIf thecurrent message. (8) Transition to DNR state and continuereceived NR message has Path=0, transition tosend the current message. (9)N. (12) If the receiving LER's WTR timer is running, maintain current state and message. If the WTR timer is not running, transition to N.(10) If the active path just before the SD is selected as the highest local input was the working path, then ignore. Otherwise, go(13) Transit toPF:DW:RWTR state andtransmit SD(0,1) (11) If the received SD-P message has Path=1, ignore thesend NR(0,1) message.If the received SD-P message has Path=0 and the active path just before the SDThe WTR timer isselected as the highest local input was the working path, then go to UA:DP:Rnot initiated. 11.3. State transition for 1+1 unidirectional protection The state transition tables given in Section 11.1 andtransmit SD(1,0). IfSection 11.2 are for bidirectional protection switching, where remote PSC protocol messages are used to determine thereceived SD-Pprotection switching actions. The 1+1 unidirectional protection switching does not require the remote information in PSC protocol messagehas Path=0andthe active path just before the SD is selected as the highestacts upon localinput wasinputs only. The state transition by local inputs in Section 11.1 SHALL be reused for the 1+1 unidirectional protectionpath, then ignoreunder the following conditions: o The value of Request field in the receivedSD-P message. 12. Security considerations No specific security issueremote message israised in additionignored and always assumed tothose ones already documented in [RFC6378] 13. IANA considerations 13.1. PSC Request Field This document defines two new valuesbe no request. o Replace footnote (4) with "Stop the WTR timer and transit to Normal state." o Replace footnote (6) with "Transit to Normal state." o Exercise is not applicable. 12. Provisioning mismatch and protocol failure in the"MPLS PSC Request Registry".APS mode The remote PSCRequest Fieldmessage that is4 bits, andreceived from thetwo new values have been allocated as follows: Value Description Reference ----- --------------------- --------------- TBD1 Reverse Request [this document] TBD2 Exercise [this document] [to be removed upon publication: Itremote LER isrequestedsubject toassign 2 (=TBD1)fortheReverse Request valuedetection of provisioning mismatch and3 (=TBD2) forprotocol failure conditions. In theExercise value to be aligned withAPS mode, provisioning mismatches are handled as follows: o If thepriority levels of those two requests defined in this document.] 13.2.PSCTLV This document defines a new value formessage is received from the working path due to working/protection path configuration mismatch, the node MUST alert the operator and MUST NOT perform any protection switching. o If the "Protection Type (PT)" field mismatches and two sides are unable to converge as described in Section 5.1 in [I-D.ietf-mpls-psc-updates], the node MUST alert the operator and MUST NOT perform any protection switching. o If the "Revertive (R)" bit mismatches, two sides will interwork and traffic is protected in the APS mode. The node MAY notify the operator of this event. o If the Capabilities TLVtypemismatches, the node MUST alert the operator and MUST NOT perform any protection switching. The followings are the protocol failure situations and the actions to be taken: o No match in sent "Data Path (Path)" and received "Data Path (Path)" for more than 50 ms: The node MAY continue to perform protection switching and SHOULD notify the"MPLSoperator of these events: o No PSC message is received on the protection path during at least 3.5 times the long PSC message interval (e.g. at least 17.5 seconds) and there is no defect on the protection path (The Capabilities TLV Timeout error specifies in Section 9.1.3 is included in this situation.): The node MUST alert the operator and MUST NOT perform any protection switching. 13. Security considerations No specific security issue is raised in addition to those ones already documented in RFC 6378 [RFC6378] 14. IANA considerations 14.1. MPLS PSC Request Registry In the "Multiprotocol Label Switching (MPLS) Operations, Administration, and Management (OAM) Parameters" registry, IANA maintains the "MPLS PSC Request Registry".Type TLV NameIANA is requested to assign two new code points from this registry. The values shall be allocated as follows: Value Description Reference ----- --------------------- ---------------TBD3 Capabilities [this document] [Editor's note: Need to specify2 Reverse Request (this document) 3 Exercise (this document) 14.2. MPLS PSC TLV Registry In the "Multiprotocol Label Switching (MPLS) Operations, Administration, and Management (OAM) Parameters" registry, IANA maintains the "MPLS PSC TLV Registry". This document defines aregistrynew value forValue (=options) insidethe Capabilities TLV type in the "MPLS PSC TLV Registry". Value Description Reference ------ --------------------- --------------- TBD Capabilities (this document) 14.3. MPLS PSC Capability Flag Registry IANA is requested to create and maintain alater versionnew registry within the "Multiprotocol Label Switching (MPLS) Operations, Administration, and Management (OAM) Parameters" registry called "MPLS PSC Capability Flag Registry". All flags within this registry SHALL be allocated according to the "Standards Action" procedures as specified in RFC 5226 [RFC5226]. The length of the flags MUST be a multiple of 4 octets. This document defines 4 octet flags. Flags greater than 4 octets SHALL be used only if more than 32 Capabilities need to be defined. Flags defined in thisdraft] 14. Acknowledgementsdocument are: Bit Hex Value Capability Reference ---- ---------- ----------------------------------- --------------- 0 0x80000000 priority modification (this document) 1 0x40000000 non-revertive behavior modification (this document) 2 0x20000000 support of MS-W command (this document) 3 0x10000000 support of protection against SD (this document) 4 0x08000000 support of EXER command (this document) 5-31 Unassigned (this document) 15. Acknowledgements 16. References15.1.16.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, May 2008. [RFC5654] Niven-Jenkins, B., Brungard, D., Betts, M., Sprecher, N., and S. Ueno, "Requirements of an MPLS Transport Profile", RFC 5654, September 2009. [RFC6378] Weingarten, Y., Bryant, S., Osborne, E., Sprecher, N., and A. Fulignoli, "MPLS Transport Profile (MPLS-TP) Linear Protection", RFC 6378, October 2011. [I-D.ietf-mpls-psc-updates] Osborne, E., "Updates to PSC", draft-ietf-mpls-psc- updates-00 (work in progress), October 2013.15.2.16.2. Informative References [RFC4427] Mannie, E. and D. Papadimitriou, "Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)", RFC 4427, March 2006. [RFC6372] Sprecher, N. and A. Farrel, "MPLS Transport Profile (MPLS- TP) Survivability Framework", RFC 6372, September 2011. [G841] International Telecommunications Union, "Types and characteristics of SDH network protection architectures", ITU-T Recommendation G.841, October 1998. [G873.1] International Telecommunications Union, "Optical Transport Network (OTN): Linear protection", ITU-T Recommendation G.873.1, July 2011. [G8031] International Telecommunications Union, "Ethernet Linear Protection Switching", ITU-T Recommendation G.8031/Y.1342, June 2011. Appendix A. An example of out-of-service scenarios The sequence diagram shown is an example of theout-of-service scenerios based on the priority level defined in [RFC6378].out-of-service scenarios based on the priority level defined in RFC 6378. The first PSC message which differs from the previous PSC message is shown. A Z | | (1) |-- NR(0,0) ------>| (1) |<----- NR(0,0) ---| | | | | | (FS issued at Z) | (2) (3) |<------ FS(1,1) --| |-- NR(0,1) ------>| | | | | (4) | (SF on P(A<-Z)) | | | | | | (Clear FS at Z) | (5) (6) | X <- NR(0,0) --| | | | | (1) Each end is in the Normal state, and transmits NR(0,0) messages. (2) When a FS command is issued at node Z, node Z goes into local Protecting administrative state (PA:F:L) and begins transmission of an FS(1,1) messages. (3) A remote FS message causes node A to go into remote Protecting administrative state (PA:F:R), and node A begins transmitting NR(0,1) messages. (4) When node A detects a unidirectional SF-P, node A keeps sending NR(0,1) message because SF-P is ignored under the PA:F:R state. (5) When a Clear command is issued at node Z, node Z goes into the Normal state and begins transmission of NR(0,0) messages. (6) But, node A cannot receive PSC message because of local unidirectional SF-P. Because no valid PSC message is received, over a period of several successive message intervals, the last valid received message remains applicable and the node A continue to transmit an NR(0,1) message in the PA:F:R state. Now, there exists a mismatch between the bridge/selector positions of node A (transmitting an NR(0,1)) and node Z (transmitting an NR(0,0)). It results in out-of-service even when there is neither SF-W nor FS. Appendix B. An example of sequence diagram showing the problem with the priority level of SFc An example of sequence diagram showing the problem with the priority level of SFc defined in RFC 6378 is given below. The following sequence diagram is depicted for the case of bidirectional signal fails. However, other cases with unidirectional signal fails can result in the same problem. The first PSC message which differs from the previous PSC message is shown. A Z | | (1) |-- NR(0,0) ------>| (1) |<----- NR(0,0) ---| | | | | (2) | (SF on P(A<->Z)) | (2) |-- SF(0,0) ------>| |<------ SF(0,0) --| | | | | (3) | (SF on W(A<->Z)) | (3) | | | | (4) | (Clear SF-P) | (4) | | | | (5) | (Clear SF-W) | (5) | | | | (1) Each end is in the Normal state, and transmits NR(0,0) messages. (2) When SF-P occurs, each node enters into the UA:P:L state and transmits SF(0,0) messages. Traffic remains on the working path. (3) When SF-W occurs, each node remains in the UA:P:L state as SF-W has a lower priority than SF-P. Traffic is still on the working path. Traffic cannot be delivered as both the working path and the protection path are experiencing signal fails. (4) When SF-P is cleared, local "Clear SF-P" request cannot be presented to the PSC Control logic, which takes the highest local request and runs PSC state machine, since the priority of "Clear SF-P" is lower than that of SF-W. Consequently, there is no change in state, and the selector and/or bridge keep pointing at the working path, which has signal fail condition. Now, traffic cannot be delivered while the protection path is recovered and available. It should be noted that the same problem will occur in the case that the sequence of SF-P and SF-W events is changed. If we further continue with this sequence to see what will happen after SF-W is cleared, (5) When SF-W is cleared, local "Clear SF-W" request can be passed to the PSC Control logic as there is no higher priority local input, but this will be ignored in the PSC Control logic according to the state transition definition in RFC 6378. There will be no change in state or protocol message transmitted. As SF-W is now cleared and the selector and/or bridge are still pointing at the working path, traffic delivery is resumed. However, each node is the in UA:P:L state and transmitting SF(0,0) message, while there exists no outstanding request for protection switching. Moreover, any future legitimate protection switching requests, such as SF-W, will be rejected as each node thinks the protection path is unavailable. Appendix C. Freeze Command The "Freeze" command applies only to the local LER of the protection group and is not signaled to the remote LER. This command freezes the state of the protection group. Until the Freeze is cleared, additional local commands are rejected and condition changes and received PSC information are ignored. "Clear Freeze" command clears the local freeze. When the Freeze command is cleared, the state of the protection group is recomputed based on the persistent condition of the local triggers. Because the freeze is local, if the freeze is issued at one end only, a failure of protocol can occur as the other end is open to accept any operator command or a fault condition. Appendix D. Operation examples of the APS mode The sequence diagrams shown in this section are only a few examples of the APS mode operations. The first PSC protocol message which differs from the previousPSCmessage is shown. The operation of hold- off timer is omitted. The Request, FPath and Path fields, whose values are changed during PSC message exchange are shown. For an example, SF(1, 0) represents an PSC message with the following field values: Request = SF, FPath = 1, and Path = 1. The values of the other fields remain unchanged from the initial configuration. W(A->Z) and P(A->Z) indicate the working path and the protection path in the direction of A to Z, respectively. Example 1. 1:1 bidirectional protection switching (revertive mode) - Unidirectional SF case A Z | | (1)|-- NR(0,0) ------>||<---- NR(0,0)---->| (1)|<----- NR(0,0) ---|| | | | (2) |(FS issued at Z)(SF on W(Z->A)) |(2)|---- SF(1,1)----->| (3)|<------ FS(1,1) --| |-- NR(0,1) ------>|(4) |<----- NR(0,1)----| | | | |(4)(5) |(SF on P(A<-Z))(Clear SF-W) | |---- WTR(0,1)---->| /| | | | | WTR timer | |(Clear FS at Z)|(5) (6)|X <- NR(0,0) --|| \| | (6) |---- NR(0,1)----->| (7) (8) |<----- NR(0,0)----| |---- NR(0,0)----->| (9) | | (1)Each endThe protection domain is operating without any defect, and the working path is used for delivering the traffic in the Normalstate, and transmits NR (0,0) messages.state. (2)When a Forced Switch command is issued at node Z, nodeSF-W occurs in the Zgoes into local Protecting Administrative state (PA:F:L) and begins transmission of an FS (1,1) messages. (3)to Aremote Forced Switch message causes nodedirection. Node Ato goenters intoremote Protecting Administrativethe PF:W:L state(PA:F:R),and generates SF(1, 1) message. Selector and bridge of node Abegins transmitting NR (0,1) messages. (4) When node A detects a unidirectional Signal Fail onare pointing at theProtection path,protection path. (3) Upon receiving SF(1, 1), nodeA keeps sending NR (0,1) message because SF-P is ignored underZ sets selector and bridge to thestate PA:F:R. (5) When a Clear commandprotection path. As there isissued atno local request in node Z, node Zgoes into Normal state and begins transmission of NR (0,0) messages. (6) But node A cannot receive PSCgenerates NR(0, 1) messagebecause of local unidirectional Signal Fail onin theProtection path. Because no valid PSC messagePF:W:R state. (4) Node A confirms that the remote LER isreceived, over a periodalso selecting protection path. (5) Node A detects clearing ofseveral successive message intervals,SF condition, starts thelast valid received message remains applicableWTR timer, andthe node A continue to transmit an NR (0,1)sends WTR(0, 1) message in thestateWTR state. (6) At expiration ofPA:F:R. Now, there exists a mismatch betweenthebridge/selector positions ofWTR timer, node A(transmitting an NR (0,1))sets selector andnode Z (transmitting an NR (0,0)). It results in out-of-service even when there is neither signal fail onbridge to the working pathnor FS. Appendix B. An example of sequence diagram showing the problem withand sends NR(0, 1) message. (7) Node Z is notified that thepriority level of Clear SF An example of sequence diagram showingremote request has been cleared. Node Z transits to theproblem withNormal state and sends NR(0,0) message. (8) Upon receiving NR(0,0) message, node A transits to thepriority level of Clear SF defined in [RFC6378]Normal state and sends NR(0,0) message. (9) It isgiven below. The following sequence diagramconfirmed that the remote LER isdepicted foralso selecting thecase ofworking path. Example 2. 1:1 bidirectionalsignal fails. However, other cases with unidirectional signal fails can result in the same problem. The first PSC message which differs from the previous PSC message is shown.protection switching (revertive mode) - Bidirectional SF case - Inconsistent WTR timers A Z | | (1)|-- NR(0,0) ------>||<---- NR(0,0)---->| (1)|<----- NR(0,0) ---| | | | | (2) | (SF on P(A<->Z)) | (2) |-- SF(0,0) ------>| |<------ SF(0,0) --|| | | |(3)(2) | (SF on W(A<->Z)) |(3)(2) |<---- SF(1,1)---->| | | | |(4)(3) | (ClearSF-P)SF-W) | (3) |<---- NR(0,1)---->| (4) |<--- WTR(0,1) --->| (4) /| |\ | | | |(5)WTR timer |(Clear SF-W)| WTR timer | | | | | | |/ | |<------ NR(0,1)---| (5) | | | \| | (6) |--- NR(0,1)------>| |<------ NR(0,0)---| (7) (8) |--- NR(0,0)------>| | | (1) Each end is in the Normal state, and transmitsNR (0,0)NR(0,0) messages. (2) Whensignal fail on protection (SF-P)SF-W occurs, each node enters into[UA:P:L]the PF:W:L state and transmitsSF (0,0)SF(1,1) messages. Trafficremains on workingis switched to the protection path.(3) When signal fail on working (SF-W) occurs,Upon receiving SF(1,1), each noderemains in [UA:P:L] state as SF-W has a lower priority than SF-P. Traffic is still onconfirms that theworking path. Traffic cannot be delivered as both workingremote LER is also sending andprotection paths are experiencing signal fails. (4) Whenreceiving the traffic from thesignal fail onprotection path. (3) When SF-W is cleared,local "Clear SF-P" request cannot be presentedeach node transits to thePSC control logic, which takes the highest priority local request and runs PSCPF:W:R statemachine,and transmits NR(0,1) messages as thepriority of "Clear SF-P"last received message islower than that ofSF-W.Consequently, there is no change in(4) Upon receiving NR(0,1) messages, each node goes into the WTR state, starts the WTR timer, and sends the WTR(0,1) messages. (5) At expiration of the WTR timer in node Z, node Z sends NR(0,1) as the last received APS message was WTR. When NR(0,1) arrives at node A, node A maintains the WTR state and keeps sending current WTR messages as described in the state transition table. (6) At expiration of the WTR timer in node A, node A sends NR(0,1). (7) When the NR(0,1) message arrives at node Z, node Z moves to the Normal state, sets selectorand/orand bridgekeep pointing atto the working path, and sends NR(0, 0) message. (8) The received NR(0,0) message causes node A to go to theworking path, which has signal fail condition.Normal state. Now, the trafficcannot be delivered whileis switched back to the working path. Example 3. 1:1 bidirectional protectionpath is recovered and available. It should be notedswitching - R bit mismatch This example shows thatthe same problemboth sides willoccur in the case that the sequence of SF-Pinterwork andSF-W eventsthe traffic ischanged. If we further continue with this sequence to see what will happen after SF-Wprotected when one side (node A) iscleared, (5) Whenconfigured as revertive mode and thesignal fail on workingother (node Z) iscleared, local "Clear SF-W" request can be passed to the PSC control logic (state machine)configured astherenon-revertive mode. The interworking isno higher priority local request, but this will be ignoredcovered in thePSC control logic according to thestate transitiondefinition in [RFC6378]. There will be no change in state or protocol message transmitted. As the signal failtables. (revertive) A Z (non-revertive) | | (1) |<---- NR(0,0)---->| (1) | | | | (2) | (SF onworkingW(A<->Z)) | (2) |<---- SF(1,1)---->| | | | | (3) | (Clear SF-W) | (3) |<---- NR(0,1)---->| (4) |<----- DNR(0,1)---| (4) /|-- WTR(0,1)------>| | |<----- NR(0,1)----| (5) | | | WTR timer | | | | | | | | \| | (6) |--- NR(0,1)------>| |<------ NR(0,0)---| (7) (8) |--- NR(0,0)------>| | | (1) Each end isnow cleared and the selector and/or bridge are still pointing atin theworking path, traffic delivery is resumed. However,Normal state, and transmits NR(0,0) messages. (2) When SF-W occurs, each nodeis in [UA:P:L]enters into the PF:W:L state andtransmitting SF(0,0) message, while there exists no outstanding request for protection switching. Moreover, any future legitimatetransmits SF(l,l) messages. Traffic is switched to the protectionswitching requests, such as SF-W, will be rejected aspath. Upon receiving SF(1,1), each nodethinksconfirms that theprotection pathremote LER isunavailable. Appendix C. Freeze Command The "Freeze" command applies only toalso sending and receiving thenear end (local node) oftraffic on the protectiongroup andpath. (3) When SF-W isnot signalledcleared, each node transits to thefar end. This command freezes thePF:W:R stateof the protection group. Untiland transmits NR(0,1) messages as theFreezelast received message iscleared, additional near end commands are rejected and condition changesSF-W. (4) Upon receiving NR(0,1) messages, node A goes into the WTR state, starts the WTR timer, andreceived PSC information are ignored. "Clear Freeze" command clearssends WTR(0,1) messages. At thelocal freeze.same time, node B transits to the DNR state and sends DNR(0,1) message. (5) When theFreeze command is cleared,WTR message arrives at node Z, node Z transits to the WTR stateofand send NR(0,1) message according to theprotection group is recomputed based onstate transition table. At thepersistent condition ofsame time, thelocal triggers. BecauseDNR message arrived at node Z is ignored according to thefreezestate transition table. Therefore, node Z, which islocal,configured as non-revertive mode, is operating as if in revertive mode. (6) At expiration of thefreeze is issuedWTR timer in node A, node A sends NR(0,1). (7) When the NR(0,1) message arrives atone end only, a failure of protocol can occur asnode Z, node Z moves to theother endNormal state, sets selector and bridge to the working path, and sends NR(0, 0) message. (8) The received NR(0,0) message causes node A to transits to the Normal state. Now, the traffic isopenswitched back toaccept any operator command or a fault condition.the working path. Authors' Addresses Jeong-dong Ryoo (editor) ETRI 218 Gajeongno Yuseong-gu, Daejeon 305-700 South Korea Phone: +82-42-860-5384 Email: ryoo@etri.re.kr Eric Gray (editor) Ericsson Email: eric.gray@ericsson.com Huub van Helvoort Huawei Technologies Karspeldreef 4, Amsterdam 1101 CJ the Netherlands Phone: +31 20 4300936 Email: huub.van.helvoort@huawei.com Alessandro D'Alessandro Telecom Italia via Reiss Romoli, 274 Torino 10148 Italy Phone: +39 011 2285887 Email: alessandro.dalessandro@telecomitalia.it Taesik Cheung ETRI 218 Gajeongno Yuseong-gu, Daejeon 305-700 South Korea Phone: +82-42-860-5646 Email: cts@etri.re.kr Eric Osborne Cisco Systems, Inc. Email: eosborne@cisco.com