summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc3945.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc3945.txt')
-rw-r--r--doc/rfc/rfc3945.txt3867
1 files changed, 3867 insertions, 0 deletions
diff --git a/doc/rfc/rfc3945.txt b/doc/rfc/rfc3945.txt
new file mode 100644
index 0000000..4aecc8c
--- /dev/null
+++ b/doc/rfc/rfc3945.txt
@@ -0,0 +1,3867 @@
+
+
+
+
+
+
+Network Working Group E. Mannie, Ed.
+Request for Comments: 3945 October 2004
+Category: Standards Track
+
+
+ Generalized Multi-Protocol Label Switching (GMPLS) Architecture
+
+Status of this Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2004).
+
+Abstract
+
+ Future data and transmission networks will consist of elements such
+ as routers, switches, Dense Wavelength Division Multiplexing (DWDM)
+ systems, Add-Drop Multiplexors (ADMs), photonic cross-connects
+ (PXCs), optical cross-connects (OXCs), etc. that will use Generalized
+ Multi-Protocol Label Switching (GMPLS) to dynamically provision
+ resources and to provide network survivability using protection and
+ restoration techniques.
+
+ This document describes the architecture of GMPLS. GMPLS extends
+ MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709),
+ wavelength (lambdas), and spatial switching (e.g., incoming port or
+ fiber to outgoing port or fiber). The focus of GMPLS is on the
+ control plane of these various layers since each of them can use
+ physically diverse data or forwarding planes. The intention is to
+ cover both the signaling and the routing part of that control plane.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 1]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+Table of Contents
+
+ 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 1.1. Acronyms & Abbreviations. . . . . . . . . . . . . . . . 4
+ 1.2. Multiple Types of Switching and Forwarding Hierarchies. 5
+ 1.3. Extension of the MPLS Control Plane . . . . . . . . . . 7
+ 1.4. GMPLS Key Extensions to MPLS-TE . . . . . . . . . . . . 10
+ 2. Routing and Addressing Model. . . . . . . . . . . . . . . . . 11
+ 2.1. Addressing of PSC and non-PSC layers. . . . . . . . . . 13
+ 2.2. GMPLS Scalability Enhancements. . . . . . . . . . . . . 13
+ 2.3. TE Extensions to IP Routing Protocols . . . . . . . . . 14
+ 3. Unnumbered Links. . . . . . . . . . . . . . . . . . . . . . . 15
+ 3.1. Unnumbered Forwarding Adjacencies . . . . . . . . . . . 16
+ 4. Link Bundling . . . . . . . . . . . . . . . . . . . . . . . . 16
+ 4.1. Restrictions on Bundling. . . . . . . . . . . . . . . . 17
+ 4.2. Routing Considerations for Bundling . . . . . . . . . . 17
+ 4.3. Signaling Considerations. . . . . . . . . . . . . . . . 18
+ 4.3.1. Mechanism 1: Implicit Indication. . . . . . . . 18
+ 4.3.2. Mechanism 2: Explicit Indication by Numbered
+ Interface ID. . . . . . . . . . . . . . . . . . 19
+ 4.3.3. Mechanism 3: Explicit Indication by Unnumbered
+ Interface ID. . . . . . . . . . . . . . . . . . 19
+ 4.4. Unnumbered Bundled Link . . . . . . . . . . . . . . . . 19
+ 4.5. Forming Bundled Links . . . . . . . . . . . . . . . . . 20
+ 5. Relationship with the UNI . . . . . . . . . . . . . . . . . . 20
+ 5.1. Relationship with the OIF UNI . . . . . . . . . . . . . 21
+ 5.2. Reachability across the UNI . . . . . . . . . . . . . . 21
+ 6. Link Management . . . . . . . . . . . . . . . . . . . . . . . 22
+ 6.1. Control Channel and Control Channel Management. . . . . 23
+ 6.2. Link Property Correlation . . . . . . . . . . . . . . . 24
+ 6.3. Link Connectivity Verification. . . . . . . . . . . . . 24
+ 6.4. Fault Management. . . . . . . . . . . . . . . . . . . . 25
+ 6.5. LMP for DWDM Optical Line Systems (OLSs). . . . . . . . 26
+ 7. Generalized Signaling . . . . . . . . . . . . . . . . . . . . 27
+ 7.1. Overview: How to Request an LSP . . . . . . . . . . . . 29
+ 7.2. Generalized Label Request . . . . . . . . . . . . . . . 30
+ 7.3. SONET/SDH Traffic Parameters. . . . . . . . . . . . . . 31
+ 7.4. G.709 Traffic Parameters. . . . . . . . . . . . . . . . 32
+ 7.5. Bandwidth Encoding. . . . . . . . . . . . . . . . . . . 33
+ 7.6. Generalized Label . . . . . . . . . . . . . . . . . . . 34
+ 7.7. Waveband Switching. . . . . . . . . . . . . . . . . . . 34
+ 7.8. Label Suggestion by the Upstream. . . . . . . . . . . . 35
+ 7.9. Label Restriction by the Upstream . . . . . . . . . . . 35
+ 7.10. Bi-directional LSP. . . . . . . . . . . . . . . . . . . 36
+ 7.11. Bi-directional LSP Contention Resolution. . . . . . . . 37
+ 7.12. Rapid Notification of Failure . . . . . . . . . . . . . 37
+ 7.13. Link Protection . . . . . . . . . . . . . . . . . . . . 38
+ 7.14. Explicit Routing and Explicit Label Control . . . . . . 39
+
+
+
+Mannie Standards Track [Page 2]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ 7.15. Route Recording . . . . . . . . . . . . . . . . . . . . 40
+ 7.16. LSP Modification and LSP Re-routing . . . . . . . . . . 40
+ 7.17. LSP Administrative Status Handling. . . . . . . . . . . 41
+ 7.18. Control Channel Separation. . . . . . . . . . . . . . . 42
+ 8. Forwarding Adjacencies (FA) . . . . . . . . . . . . . . . . . 43
+ 8.1. Routing and Forwarding Adjacencies. . . . . . . . . . . 43
+ 8.2. Signaling Aspects . . . . . . . . . . . . . . . . . . . 44
+ 8.3. Cascading of Forwarding Adjacencies . . . . . . . . . . 44
+ 9. Routing and Signaling Adjacencies . . . . . . . . . . . . . . 45
+ 10. Control Plane Fault Handling. . . . . . . . . . . . . . . . . 46
+ 11. LSP Protection and Restoration. . . . . . . . . . . . . . . . 47
+ 11.1. Protection Escalation across Domains and Layers . . . . 48
+ 11.2. Mapping of Services to P&R Resources. . . . . . . . . . 49
+ 11.3. Classification of P&R Mechanism Characteristics . . . . 49
+ 11.4. Different Stages in P&R . . . . . . . . . . . . . . . . 50
+ 11.5. Recovery Strategies . . . . . . . . . . . . . . . . . . 50
+ 11.6. Recovery mechanisms: Protection schemes . . . . . . . . 51
+ 11.7. Recovery mechanisms: Restoration schemes. . . . . . . . 52
+ 11.8. Schema Selection Criteria . . . . . . . . . . . . . . . 53
+ 12. Network Management. . . . . . . . . . . . . . . . . . . . . . 54
+ 12.1. Network Management Systems (NMS). . . . . . . . . . . . 55
+ 12.2. Management Information Base (MIB) . . . . . . . . . . . 55
+ 12.3. Tools . . . . . . . . . . . . . . . . . . . . . . . . . 56
+ 12.4. Fault Correlation Between Multiple Layers . . . . . . . 56
+ 13. Security Considerations . . . . . . . . . . . . . . . . . . . 57
+ 14. Acknowledgements. . . . . . . . . . . . . . . . . . . . . . . 58
+ 15. References. . . . . . . . . . . . . . . . . . . . . . . . . . 58
+ 15.1. Normative References. . . . . . . . . . . . . . . . . . 58
+ 15.2. Informative References. . . . . . . . . . . . . . . . . 59
+ 16. Contributors. . . . . . . . . . . . . . . . . . . . . . . . . 63
+ 17. Author's Address. . . . . . . . . . . . . . . . . . . . . . . 68
+ Full Copyright Statement. . . . . . . . . . . . . . . . . . . 69
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 3]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+1. Introduction
+
+ The architecture described in this document covers the main building
+ blocks needed to build a consistent control plane for multiple
+ switching layers. It does not restrict the way that these layers
+ work together. Different models can be applied, e.g., overlay,
+ augmented or integrated. Moreover, each pair of contiguous layers
+ may collaborate in different ways, resulting in a number of possible
+ combinations, at the discretion of manufacturers and operators.
+
+ This architecture clearly separates the control plane and the
+ forwarding plane. In addition, it also clearly separates the control
+ plane in two parts, the signaling plane containing the signaling
+ protocols and the routing plane containing the routing protocols.
+
+ This document is a generalization of the Multi-Protocol Label
+ Switching (MPLS) architecture [RFC3031], and in some cases may differ
+ slightly from that architecture since non packet-based forwarding
+ planes are now considered. It is not the intention of this document
+ to describe concepts already described in the current MPLS
+ architecture. The goal is to describe specific concepts of
+ Generalized MPLS (GMPLS).
+
+ However, some of the concepts explained hereafter are not part of the
+ current MPLS architecture and are applicable to both MPLS and GMPLS
+ (i.e., link bundling, unnumbered links, and LSP hierarchy). Since
+ these concepts were introduced together with GMPLS and since they are
+ of paramount importance for an operational GMPLS network, they will
+ be discussed here.
+
+ The organization of the remainder of this document is as follows. We
+ begin with an introduction of GMPLS. We then present the specific
+ GMPLS building blocks and explain how they can be combined together
+ to build an operational GMPLS network. Specific details of the
+ separate building blocks can be found in the corresponding documents.
+
+1.1. Acronyms & Abbreviations
+
+ AS Autonomous System
+ BGP Border Gateway Protocol
+ CR-LDP Constraint-based Routing LDP
+ CSPF Constraint-based Shortest Path First
+ DWDM Dense Wavelength Division Multiplexing
+ FA Forwarding Adjacency
+ GMPLS Generalized Multi-Protocol Label Switching
+ IGP Interior Gateway Protocol
+ LDP Label Distribution Protocol
+ LMP Link Management Protocol
+
+
+
+Mannie Standards Track [Page 4]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ LSA Link State Advertisement
+ LSR Label Switching Router
+ LSP Label Switched Path
+ MIB Management Information Base
+ MPLS Multi-Protocol Label Switching
+ NMS Network Management System
+ OXC Optical Cross-Connect
+ PXC Photonic Cross-Connect
+ RSVP ReSource reserVation Protocol
+ SDH Synchronous Digital Hierarchy
+ SONET Synchronous Optical Networks
+ STM(-N) Synchronous Transport Module (-N)
+ STS(-N) Synchronous Transport Signal-Level N (SONET)
+ TDM Time Division Multiplexing
+ TE Traffic Engineering
+
+1.2. Multiple Types of Switching and Forwarding Hierarchies
+
+ Generalized MPLS (GMPLS) differs from traditional MPLS in that it
+ supports multiple types of switching, i.e., the addition of support
+ for TDM, lambda, and fiber (port) switching. The support for the
+ additional types of switching has driven GMPLS to extend certain base
+ functions of traditional MPLS and, in some cases, to add
+ functionality. These changes and additions impact basic LSP
+ properties: how labels are requested and communicated, the
+ unidirectional nature of LSPs, how errors are propagated, and
+ information provided for synchronizing the ingress and egress LSRs.
+
+ The MPLS architecture [RFC3031] was defined to support the forwarding
+ of data based on a label. In this architecture, Label Switching
+ Routers (LSRs) were assumed to have a forwarding plane that is
+ capable of (a) recognizing either packet or cell boundaries, and (b)
+ being able to process either packet headers (for LSRs capable of
+ recognizing packet boundaries) or cell headers (for LSRs capable of
+ recognizing cell boundaries).
+
+ The original MPLS architecture is here being extended to include LSRs
+ whose forwarding plane recognizes neither packet, nor cell
+ boundaries, and therefore, cannot forward data based on the
+ information carried in either packet or cell headers. Specifically,
+ such LSRs include devices where the switching decision is based on
+ time slots, wavelengths, or physical ports. So, the new set of LSRs,
+ or more precisely interfaces on these LSRs, can be subdivided into
+ the following classes:
+
+
+
+
+
+
+
+Mannie Standards Track [Page 5]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ 1. Packet Switch Capable (PSC) interfaces:
+
+ Interfaces that recognize packet boundaries and can forward data
+ based on the content of the packet header. Examples include
+ interfaces on routers that forward data based on the content of
+ the IP header and interfaces on routers that switch data based on
+ the content of the MPLS "shim" header.
+
+ 2. Layer-2 Switch Capable (L2SC) interfaces:
+
+ Interfaces that recognize frame/cell boundaries and can switch
+ data based on the content of the frame/cell header. Examples
+ include interfaces on Ethernet bridges that switch data based on
+ the content of the MAC header and interfaces on ATM-LSRs that
+ forward data based on the ATM VPI/VCI.
+
+ 3. Time-Division Multiplex Capable (TDM) interfaces:
+
+ Interfaces that switch data based on the data's time slot in a
+ repeating cycle. An example of such an interface is that of a
+ SONET/SDH Cross-Connect (XC), Terminal Multiplexer (TM), or Add-
+ Drop Multiplexer (ADM). Other examples include interfaces
+ providing G.709 TDM capabilities (the "digital wrapper") and PDH
+ interfaces.
+
+ 4. Lambda Switch Capable (LSC) interfaces:
+
+ Interfaces that switch data based on the wavelength on which the
+ data is received. An example of such an interface is that of a
+ Photonic Cross-Connect (PXC) or Optical Cross-Connect (OXC) that
+ can operate at the level of an individual wavelength. Additional
+ examples include PXC interfaces that can operate at the level of a
+ group of wavelengths, i.e., a waveband and G.709 interfaces
+ providing optical capabilities.
+
+ 5. Fiber-Switch Capable (FSC) interfaces:
+
+ Interfaces that switch data based on a position of the data in the
+ (real world) physical spaces. An example of such an interface is
+ that of a PXC or OXC that can operate at the level of a single or
+ multiple fibers.
+
+ A circuit can be established only between, or through, interfaces of
+ the same type. Depending on the particular technology being used for
+ each interface, different circuit names can be used, e.g., SDH
+ circuit, optical trail, light-path, etc. In the context of GMPLS,
+ all these circuits are referenced by a common name: Label Switched
+ Path (LSP).
+
+
+
+Mannie Standards Track [Page 6]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ The concept of nested LSP (LSP within LSP), already available in the
+ traditional MPLS, facilitates building a forwarding hierarchy, i.e.,
+ a hierarchy of LSPs. This hierarchy of LSPs can occur on the same
+ interface, or between different interfaces.
+
+ For example, a hierarchy can be built if an interface is capable of
+ multiplexing several LSPs from the same technology (layer), e.g., a
+ lower order SONET/SDH LSP (e.g., VT2/VC-12) nested in a higher order
+ SONET/SDH LSP (e.g., STS-3c/VC-4). Several levels of signal (LSP)
+ nesting are defined in the SONET/SDH multiplexing hierarchy.
+
+ The nesting can also occur between interface types. At the top of
+ the hierarchy are FSC interfaces, followed by LSC interfaces,
+ followed by TDM interfaces, followed by L2SC, and followed by PSC
+ interfaces. This way, an LSP that starts and ends on a PSC interface
+ can be nested (together with other LSPs) into an LSP that starts and
+ ends on a L2SC interface. This LSP, in turn, can be nested (together
+ with other LSPs) into an LSP that starts and ends on a TDM interface.
+ In turn, this LSP can be nested (together with other LSPs) into an
+ LSP that starts and ends on a LSC interface, which in turn can be
+ nested (together with other LSPs) into an LSP that starts and ends on
+ a FSC interface.
+
+1.3. Extension of the MPLS Control Plane
+
+ The establishment of LSPs that span only Packet Switch Capable (PSC)
+ or Layer-2 Switch Capable (L2SC) interfaces is defined for the
+ original MPLS and/or MPLS-TE control planes. GMPLS extends these
+ control planes to support each of the five classes of interfaces
+ (i.e., layers) defined in the previous section.
+
+ Note that the GMPLS control plane supports an overlay model, an
+ augmented model, and a peer (integrated) model. In the near term,
+ GMPLS appears to be very suitable for controlling each layer
+ independently. This elegant approach will facilitate the future
+ deployment of other models.
+
+ The GMPLS control plane is made of several building blocks as
+ described in more details in the following sections. These building
+ blocks are based on well-known signaling and routing protocols that
+ have been extended and/or modified to support GMPLS. They use IPv4
+ and/or IPv6 addresses. Only one new specialized protocol is required
+ to support the operations of GMPLS, a signaling protocol for link
+ management [LMP].
+
+ GMPLS is indeed based on the Traffic Engineering (TE) extensions to
+ MPLS, a.k.a. MPLS-TE [RFC2702]. This, because most of the
+ technologies that can be used below the PSC level requires some
+
+
+
+Mannie Standards Track [Page 7]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ traffic engineering. The placement of LSPs at these levels needs in
+ general to consider several constraints (such as framing, bandwidth,
+ protection capability, etc) and to bypass the legacy Shortest-Path
+ First (SPF) algorithm. Note, however, that this is not mandatory and
+ that in some cases SPF routing can be applied.
+
+ In order to facilitate constrained-based SPF routing of LSPs, nodes
+ that perform LSP establishment need more information about the links
+ in the network than standard intra-domain routing protocols provide.
+ These TE attributes are distributed using the transport mechanisms
+ already available in IGPs (e.g., flooding) and taken into
+ consideration by the LSP routing algorithm. Optimization of the LSP
+ routes may also require some external simulations using heuristics
+ that serve as input for the actual path calculation and LSP
+ establishment process.
+
+ By definition, a TE link is a representation in the IS-IS/OSPF Link
+ State advertisements and in the link state database of certain
+ physical resources, and their properties, between two GMPLS nodes.
+ TE Links are used by the GMPLS control plane (routing and signaling)
+ for establishing LSPs.
+
+ Extensions to traditional routing protocols and algorithms are needed
+ to uniformly encode and carry TE link information, and explicit
+ routes (e.g., source routes) are required in the signaling. In
+ addition, the signaling must now be capable of transporting the
+ required circuit (LSP) parameters such as the bandwidth, the type of
+ signal, the desired protection and/or restoration, the position in a
+ particular multiplex, etc. Most of these extensions have already
+ been defined for PSC and L2SC traffic engineering with MPLS. GMPLS
+ primarily defines additional extensions for TDM, LSC, and FSC traffic
+ engineering. A very few elements are technology specific.
+
+ Thus, GMPLS extends the two signaling protocols defined for MPLS-TE
+ signaling, i.e., RSVP-TE [RFC3209] and CR-LDP [RFC3212]. However,
+ GMPLS does not specify which one of these two signaling protocols
+ must be used. It is the role of manufacturers and operators to
+ evaluate the two possible solutions for their own interest.
+
+ Since GMPLS signaling is based on RSVP-TE and CR-LDP, it mandates a
+ downstream-on-demand label allocation and distribution, with ingress
+ initiated ordered control. Liberal label retention is normally used,
+ but conservative label retention mode could also be used.
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 8]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Furthermore, there is no restriction on the label allocation
+ strategy, it can be request/signaling driven (obvious for circuit
+ switching technologies), traffic/data driven, or even topology
+ driven. There is also no restriction on the route selection;
+ explicit routing is normally used (strict or loose) but hop-by-hop
+ routing could be used as well.
+
+ GMPLS also extends two traditional intra-domain link-state routing
+ protocols already extended for TE purposes, i.e., OSPF-TE [OSPF-TE]
+ and IS-IS-TE [ISIS-TE]. However, if explicit (source) routing is
+ used, the routing algorithms used by these protocols no longer need
+ to be standardized. Extensions for inter-domain routing (e.g., BGP)
+ are for further study.
+
+ The use of technologies like DWDM (Dense Wavelength Division
+ Multiplexing) implies that we can now have a very large number of
+ parallel links between two directly adjacent nodes (hundreds of
+ wavelengths, or even thousands of wavelengths if multiple fibers are
+ used). Such a large number of links was not originally considered
+ for an IP or MPLS control plane, although it could be done. Some
+ slight adaptations of that control plane are thus required if we want
+ to better reuse it in the GMPLS context.
+
+ For instance, the traditional IP routing model assumes the
+ establishment of a routing adjacency over each link connecting two
+ adjacent nodes. Having such a large number of adjacencies does not
+ scale well. Each node needs to maintain each of its adjacencies one
+ by one, and link state routing information must be flooded throughout
+ the network.
+
+ To solve this issue the concept of link bundling was introduced.
+ Moreover, the manual configuration and control of these links, even
+ if they are unnumbered, becomes impractical. The Link Management
+ Protocol (LMP) was specified to solve these issues.
+
+ LMP runs between data plane adjacent nodes and is used to manage TE
+ links. Specifically, LMP provides mechanisms to maintain control
+ channel connectivity (IP Control Channel Maintenance), verify the
+ physical connectivity of the data-bearing links (Link Verification),
+ correlate the link property information (Link Property Correlation),
+ and manage link failures (Fault Localization and Fault Notification).
+ A unique feature of LMP is that it is able to localize faults in both
+ opaque and transparent networks (i.e., independent of the encoding
+ scheme and bit rate used for the data).
+
+ LMP is defined in the context of GMPLS, but is specified
+ independently of the GMPLS signaling specification since it is a
+ local protocol running between data-plane adjacent nodes.
+
+
+
+Mannie Standards Track [Page 9]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Consequently, LMP can be used in other contexts with non-GMPLS
+ signaling protocols.
+
+ MPLS signaling and routing protocols require at least one bi-
+ directional control channel to communicate even if two adjacent nodes
+ are connected by unidirectional links. Several control channels can
+ be used. LMP can be used to establish, maintain and manage these
+ control channels.
+
+ GMPLS does not specify how these control channels must be
+ implemented, but GMPLS requires IP to transport the signaling and
+ routing protocols over them. Control channels can be either in-band
+ or out-of-band, and several solutions can be used to carry IP. Note
+ also that one type of LMP message (the Test message) is used in-band
+ in the data plane and may not be transported over IP, but this is a
+ particular case, needed to verify connectivity in the data plane.
+
+1.4. GMPLS Key Extensions to MPLS-TE
+
+ Some key extensions brought by GMPLS to MPLS-TE are highlighted in
+ the following. Some of them are key advantages of GMPLS to control
+ TDM, LSC and FSC layers.
+
+ - In MPLS-TE, links traversed by an LSP can include an intermix of
+ links with heterogeneous label encoding (e.g., links between
+ routers, links between routers and ATM-LSRs, and links between
+ ATM-LSRs. GMPLS extends this by including links where the label is
+ encoded as a time slot, or a wavelength, or a position in the
+ (real world) physical space.
+
+ - In MPLS-TE, an LSP that carries IP has to start and end on a
+ router. GMPLS extends this by requiring an LSP to start and end
+ on similar type of interfaces.
+
+ - The type of a payload that can be carried in GMPLS by an LSP is
+ extended to allow such payloads as SONET/SDH, G.709, 1Gb or 10Gb
+ Ethernet, etc.
+
+ - The use of Forwarding Adjacencies (FA) provides a mechanism that
+ can improve bandwidth utilization, when bandwidth allocation can
+ be performed only in discrete units. It offers also a mechanism
+ to aggregate forwarding state, thus allowing the number of
+ required labels to be reduced.
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 10]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ - GMPLS allows suggesting a label by an upstream node to reduce the
+ setup latency. This suggestion may be overridden by a downstream
+ node but in some cases, at the cost of higher LSP setup time.
+
+ - GMPLS extends on the notion of restricting the range of labels
+ that may be selected by a downstream node. In GMPLS, an upstream
+ node may restrict the labels for an LSP along either a single hop
+ or the entire LSP path. This feature is useful in photonic
+ networks where wavelength conversion may not be available.
+
+ - While traditional TE-based (and even LDP-based) LSPs are
+ unidirectional, GMPLS supports the establishment of bi-directional
+ LSPs.
+
+ - GMPLS supports the termination of an LSP on a specific egress
+ port, i.e., the port selection at the destination side.
+
+ - GMPLS with RSVP-TE supports an RSVP specific mechanism for rapid
+ failure notification.
+
+ Note also some other key differences between MPLS-TE and GMPLS:
+
+ - For TDM, LSC and FSC interfaces, bandwidth allocation for an LSP
+ can be performed only in discrete units.
+
+ - It is expected to have (much) fewer labels on TDM, LSC or FSC
+ links than on PSC or L2SC links, because the former are physical
+ labels instead of logical labels.
+
+2. Routing and Addressing Model
+
+ GMPLS is based on the IP routing and addressing models. This assumes
+ that IPv4 and/or IPv6 addresses are used to identify interfaces but
+ also that traditional (distributed) IP routing protocols are reused.
+ Indeed, the discovery of the topology and the resource state of all
+ links in a routing domain is achieved via these routing protocols.
+
+ Since control and data planes are de-coupled in GMPLS, control-plane
+ neighbors (i.e., IGP-learnt neighbors) may not be data-plane
+ neighbors. Hence, mechanisms like LMP are needed to associate TE
+ links with neighboring nodes.
+
+ IP addresses are not used only to identify interfaces of IP hosts and
+ routers, but more generally to identify any PSC and non-PSC
+ interfaces. Similarly, IP routing protocols are used to find routes
+ for IP datagrams with a SPF algorithm; they are also used to find
+ routes for non-PSC circuits by using a CSPF algorithm.
+
+
+
+
+Mannie Standards Track [Page 11]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ However, some additional mechanisms are needed to increase the
+ scalability of these models and to deal with specific traffic
+ engineering requirements of non-PSC layers. These mechanisms will be
+ introduced in the following.
+
+ Re-using existing IP routing protocols allows for non-PSC layers
+ taking advantage of all the valuable developments that took place
+ since years for IP routing, in particular, in the context of intra-
+ domain routing (link-state routing) and inter-domain routing (policy
+ routing).
+
+ In an overlay model, each particular non-PSC layer can be seen as a
+ set of Autonomous Systems (ASs) interconnected in an arbitrary way.
+ Similarly to the traditional IP routing, each AS is managed by a
+ single administrative authority. For instance, an AS can be an
+ SONET/SDH network operated by a given carrier. The set of
+ interconnected ASs can be viewed as SONET/SDH internetworks.
+
+ Exchange of routing information between ASs can be done via an
+ inter-domain routing protocol like BGP-4. There is obviously a huge
+ value of re-using well-known policy routing facilities provided by
+ BGP in a non-PSC context. Extensions for BGP traffic engineering
+ (BGP-TE) in the context of non-PSC layers are left for further study.
+
+ Each AS can be sub-divided in different routing domains, and each can
+ run a different intra-domain routing protocol. In turn, each
+ routing-domain can be divided in areas.
+
+ A routing domain is made of GMPLS enabled nodes (i.e., a network
+ device including a GMPLS entity). These nodes can be either edge
+ nodes (i.e., hosts, ingress LSRs or egress LSRs), or internal LSRs.
+ An example of non-PSC host is an SONET/SDH Terminal Multiplexer (TM).
+ Another example is an SONET/SDH interface card within an IP router or
+ ATM switch.
+
+ Note that traffic engineering in the intra-domain requires the use of
+ link-state routing protocols like OSPF or IS-IS.
+
+ GMPLS defines extensions to these protocols. These extensions are
+ needed to disseminate specific TDM, LSC and FSC static and dynamic
+ characteristics related to nodes and links. The current focus is on
+
+
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 12]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ intra-area traffic engineering. However, inter-area traffic
+ engineering is also under investigation.
+
+2.1. Addressing of PSC and non-PSC Layers
+
+ The fact that IPv4 and/or IPv6 addresses are used does not imply at
+ all that they should be allocated in the same addressing space than
+ public IPv4 and/or IPv6 addresses used for the Internet. Private IP
+ addresses can be used if they do not require to be exchanged with any
+ other operator; public IP addresses are otherwise required. Of
+ course, if an integrated model is used, two layers could share the
+ same addressing space. Finally, TE links may be "unnumbered" i.e.,
+ not have any IP addresses, in case IP addresses are not available, or
+ the overhead of managing them is considered too high.
+
+ Note that there is a benefit of using public IPv4 and/or IPv6
+ Internet addresses for non-PSC layers if an integrated model with the
+ IP layer is foreseen.
+
+ If we consider the scalability enhancements proposed in the next
+ section, the IPv4 (32 bits) and the IPv6 (128 bits) addressing spaces
+ are both more than sufficient to accommodate any non-PSC layer. We
+ can reasonably expect to have much less non-PSC devices (e.g.,
+ SONET/SDH nodes) than we have today IP hosts and routers.
+
+2.2. GMPLS Scalability Enhancements
+
+ TDM, LSC and FSC layers introduce new constraints on the IP
+ addressing and routing models since several hundreds of parallel
+ physical links (e.g., wavelengths) can now connect two nodes. Most
+ of the carriers already have today several tens of wavelengths per
+ fiber between two nodes. New generation of DWDM systems will allow
+ several hundreds of wavelengths per fiber.
+
+ It becomes rather impractical to associate an IP address with each
+ end of each physical link, to represent each link as a separate
+ routing adjacency, and to advertise and to maintain link states for
+ each of these links. For that purpose, GMPLS enhances the MPLS
+ routing and addressing models to increase their scalability.
+
+ Two optional mechanisms can be used to increase the scalability of
+ the addressing and the routing: unnumbered links and link bundling.
+ These two mechanisms can also be combined. They require extensions
+ to signaling (RSVP-TE and CR-LDP) and routing (OSPF-TE and IS-IS-TE)
+ protocols.
+
+
+
+
+
+
+Mannie Standards Track [Page 13]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+2.3. TE Extensions to IP Routing Protocols
+
+ Traditionally, a TE link is advertised as an adjunct to a "regular"
+ OSPF or IS-IS link, i.e., an adjacency is brought up on the link.
+ When the link is up, both the regular IGP properties of the link
+ (basically, the SPF metric) and the TE properties of the link are
+ then advertised.
+
+ However, GMPLS challenges this notion in three ways:
+
+ - First, links that are non-PSC may yet have TE properties; however,
+ an OSPF adjacency could not be brought up directly on such links.
+
+ - Second, an LSP can be advertised as a point-to-point TE link in
+ the routing protocol, i.e., as a Forwarding Adjacency (FA); thus,
+ an advertised TE link need no longer be between two OSPF direct
+ neighbors. Forwarding Adjacencies (FA) are further described in
+ Section 8.
+
+ - Third, a number of links may be advertised as a single TE link
+ (e.g., for improved scalability), so again, there is no longer a
+ one-to-one association of a regular adjacency and a TE link.
+
+ Thus, we have a more general notion of a TE link. A TE link is a
+ logical link that has TE properties. Some of these properties may be
+ configured on the advertising LSR, others may be obtained from other
+ LSRs by means of some protocol, and yet others may be deduced from
+ the component(s) of the TE link.
+
+ An important TE property of a TE link is related to the bandwidth
+ accounting for that link. GMPLS will define different accounting
+ rules for different non-PSC layers. Generic bandwidth attributes are
+ however defined by the TE routing extensions and by GMPLS, such as
+ the unreserved bandwidth, the maximum reservable bandwidth and the
+ maximum LSP bandwidth.
+
+ It is expected in a dynamic environment to have frequent changes of
+ bandwidth accounting information. A flexible policy for triggering
+ link state updates based on bandwidth thresholds and link-dampening
+ mechanism can be implemented.
+
+ TE properties associated with a link should also capture protection
+ and restoration related characteristics. For instance, shared
+ protection can be elegantly combined with bundling. Protection and
+ restoration are mainly generic mechanisms also applicable to MPLS. It
+ is expected that they will first be developed for MPLS and later on
+ generalized to GMPLS.
+
+
+
+
+Mannie Standards Track [Page 14]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ A TE link between a pair of LSRs does not imply the existence of an
+ IGP adjacency between these LSRs. A TE link must also have some
+ means by which the advertising LSR can know of its liveness (e.g., by
+ using LMP hellos). When an LSR knows that a TE link is up, and can
+ determine the TE link's TE properties, the LSR may then advertise
+ that link to its GMPLS enhanced OSPF or IS-IS neighbors using the TE
+ objects/TLVs. We call the interfaces over which GMPLS enhanced OSPF
+ or IS-IS adjacencies are established "control channels".
+
+3. Unnumbered Links
+
+ Unnumbered links (or interfaces) are links (or interfaces) that do
+ not have IP addresses. Using such links involves two capabilities:
+ the ability to specify unnumbered links in MPLS TE signaling, and the
+ ability to carry (TE) information about unnumbered links in IGP TE
+ extensions of IS-IS-TE and OSPF-TE.
+
+ A. The ability to specify unnumbered links in MPLS TE signaling
+ requires extensions to RSVP-TE [RFC3477] and CR-LDP [RFC3480].
+ The MPLS-TE signaling does not provide support for unnumbered
+ links, because it does not provide a way to indicate an unnumbered
+ link in its Explicit Route Object/TLV and in its Record Route
+ Object (there is no such TLV for CR-LDP). GMPLS defines simple
+ extensions to indicate an unnumbered link in these two
+ Objects/TLVs, using a new Unnumbered Interface ID sub-object/sub-
+ TLV.
+
+ Since unnumbered links are not identified by an IP address, then
+ for the purpose of MPLS TE each end need some other identifier,
+ local to the LSR to which the link belongs. LSRs at the two end-
+ points of an unnumbered link exchange with each other the
+ identifiers they assign to the link. Exchanging the identifiers
+ may be accomplished by configuration, by means of a protocol such
+ as LMP ([LMP]), by means of RSVP-TE/CR-LDP (especially in the case
+ where a link is a Forwarding Adjacency, see below), or by means of
+ IS-IS or OSPF extensions ([ISIS-TE-GMPLS], [OSPF-TE-GMPLS]).
+
+ Consider an (unnumbered) link between LSRs A and B. LSR A chooses
+ an identifier for that link. So does LSR B. From A's perspective
+ we refer to the identifier that A assigned to the link as the
+ "link local identifier" (or just "local identifier"), and to the
+ identifier that B assigned to the link as the "link remote
+ identifier" (or just "remote identifier"). Likewise, from B's
+ perspective the identifier that B assigned to the link is the
+ local identifier, and the identifier that A assigned to the link
+ is the remote identifier.
+
+
+
+
+
+Mannie Standards Track [Page 15]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ The new Unnumbered Interface ID sub-object/sub-TLV for the ER
+ Object/TLV contains the Router ID of the LSR at the upstream end
+ of the unnumbered link and the link local identifier with respect
+ to that upstream LSR.
+
+ The new Unnumbered Interface ID sub-object for the RR Object
+ contains the link local identifier with respect to the LSR that
+ adds it in the RR Object.
+
+ B. The ability to carry (TE) information about unnumbered links in
+ IGP TE extensions requires new sub-TLVs for the extended IS
+ reachability TLV defined in IS-IS-TE and for the TE LSA (which is
+ an opaque LSA) defined in OSPF-TE. A Link Local Identifier sub-
+ TLV and a Link Remote Identifier sub-TLV are defined.
+
+3.1. Unnumbered Forwarding Adjacencies
+
+ If an LSR that originates an LSP advertises this LSP as an unnumbered
+ FA in IS-IS or OSPF, or the LSR uses this FA as an unnumbered
+ component link of a bundled link, the LSR must allocate an Interface
+ ID to that FA. If the LSP is bi-directional, the tail end does the
+ same and allocates an Interface ID to the reverse FA.
+
+ Signaling has been enhanced to carry the Interface ID of a FA in the
+ new LSP Tunnel Interface ID object/TLV. This object/TLV contains the
+ Router ID (of the LSR that generates it) and the Interface ID. It is
+ called the Forward Interface ID when it appears in a Path/REQUEST
+ message, and it is called the Reverse Interface ID when it appears in
+ the Resv/MAPPING message.
+
+4. Link Bundling
+
+ The concept of link bundling is essential in certain networks
+ employing the GMPLS control plane as is defined in [BUNDLE]. A
+ typical example is an optical meshed network where adjacent optical
+ cross-connects (LSRs) are connected by several hundreds of parallel
+ wavelengths. In this network, consider the application of link state
+ routing protocols, like OSPF or IS-IS, with suitable extensions for
+ resource discovery and dynamic route computation. Each wavelength
+ must be advertised separately to be used, except if link bundling is
+ used.
+
+ When a pair of LSRs is connected by multiple links, it is possible to
+ advertise several (or all) of these links as a single link into OSPF
+ and/or IS-IS. This process is called link bundling, or just
+ bundling. The resulting logical link is called a bundled link as its
+ physical links are called component links (and are identified by
+ interface indexes).
+
+
+
+Mannie Standards Track [Page 16]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ The result is that a combination of three identifiers ((bundled) link
+ identifier, component link identifier, label) is sufficient to
+ unambiguously identify the appropriate resources used by an LSP.
+
+ The purpose of link bundling is to improve routing scalability by
+ reducing the amount of information that has to be handled by OSPF
+ and/or IS-IS. This reduction is accomplished by performing
+ information aggregation/abstraction. As with any other information
+ aggregation/abstraction, this results in losing some of the
+ information. To limit the amount of losses one need to restrict the
+ type of the information that can be aggregated/abstracted.
+
+4.1. Restrictions on Bundling
+
+ The following restrictions are required for bundling links. All
+ component links in a bundle must begin and end on the same pair of
+ LSRs; and share some common characteristics or properties defined in
+ [OSPF-TE] and [ISIS-TE], i.e., they must have the same:
+
+ - Link Type (i.e., point-to-point or multi-access),
+ - TE Metric (i.e., an administrative cost),
+ - Set of Resource Classes at each end of the links (i.e., colors).
+
+ Note that a FA may also be a component link. In fact, a bundle can
+ consist of a mix of point-to-point links and FAs, but all sharing
+ some common properties.
+
+4.2. Routing Considerations for Bundling
+
+ A bundled link is just another kind of TE link such as those defined
+ by [GMPLS-ROUTING]. The liveness of the bundled link is determined
+ by the liveness of each its component links. A bundled link is alive
+ when at least one of its component links is alive. The liveness of a
+ component link can be determined by any of several means: IS-IS or
+ OSPF hellos over the component link, or RSVP Hello (hop local), or
+ LMP hellos (link local), or from layer 1 or layer 2 indications.
+
+ Note that (according to the RSVP-TE specification [RFC3209]) the RSVP
+ Hello mechanism is intended to be used when notification of link
+ layer failures is not available and unnumbered links are not used, or
+ when the failure detection mechanisms provided by the link layer are
+ not sufficient for timely node failure detection.
+
+ Once a bundled link is determined to be alive, it can be advertised
+ as a TE link and the TE information can be flooded. If IS-IS/OSPF
+ hellos are run over the component links, IS-IS/OSPF flooding can be
+ restricted to just one of the component links.
+
+
+
+
+Mannie Standards Track [Page 17]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Note that advertising a (bundled) TE link between a pair of LSRs does
+ not imply that there is an IGP adjacency between these LSRs that is
+ associated with just that link. In fact, in certain cases a TE link
+ between a pair of LSRs could be advertised even if there is no IGP
+ adjacency at all between the LSR (e.g., when the TE link is an FA).
+
+ Forming a bundled link consist in aggregating the identical TE
+ parameters of each individual component link to produce aggregated TE
+ parameters. A TE link as defined by [GMPLS-ROUTING] has many
+ parameters; adequate aggregation rules must be defined for each one.
+
+ Some parameters can be sums of component characteristics such as the
+ unreserved bandwidth and the maximum reservable bandwidth. Bandwidth
+ information is an important part of a bundle advertisement and it
+ must be clearly defined since an abstraction is done.
+
+ A GMPLS node with bundled links must apply admission control on a
+ per-component link basis.
+
+4.3. Signaling Considerations
+
+ Typically, an LSP's explicit route (e.g., contained in an explicit
+ route Object/TLV) will choose the bundled link to be used for the
+ LSP, but not the component link(s). This because information about
+ the bundled link is flooded but information about the component links
+ is not.
+
+ The choice of the component link to use is always made by an upstream
+ node. If the LSP is bi-directional, the upstream node chooses a
+ component link in each direction.
+
+ Three mechanisms for indicating this choice to the downstream node
+ are possible.
+
+4.3.1. Mechanism 1: Implicit Indication
+
+ This mechanism requires that each component link has a dedicated
+ signaling channel (e.g., the link is a Sonet/SDH link using the DCC
+ for in-band signaling). The upstream node tells the receiver which
+ component link to use by sending the message over the chosen
+ component link's dedicated signaling channel. Note that this
+ signaling channel can be in-band or out-of-band. In this last case,
+ the association between the signaling channel and that component link
+ need to be explicitly configured.
+
+
+
+
+
+
+
+Mannie Standards Track [Page 18]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+4.3.2. Mechanism 2: Explicit Indication by Numbered Interface ID
+
+ This mechanism requires that the component link has a unique remote
+ IP address. The upstream node indicates the choice of the component
+ link by including a new IF_ID RSVP_HOP object/IF_ID TLV carrying
+ either an IPv4 or an IPv6 address in the Path/Label Request message
+ (see [RFC3473]/[RFC3472], respectively). For a bi-directional LSP, a
+ component link is provided for each direction by the upstream node.
+
+ This mechanism does not require each component link to have its own
+ control channel. In fact, it does not even require the whole
+ (bundled) link to have its own control channel.
+
+4.3.3. Mechanism 3: Explicit Indication by Unnumbered Interface ID
+
+ With this mechanism, each component link that is unnumbered is
+ assigned a unique Interface Identifier (32 bits value). The upstream
+ node indicates the choice of the component link by including a new
+ IF_ID RSVP_HOP object/IF_ID TLV in the Path/Label Request message
+ (see [RFC3473]/[RFC3472], respectively).
+
+ This object/TLV carries the component interface ID in the downstream
+ direction for a unidirectional LSP, and in addition, the component
+ interface ID in the upstream direction for a bi-directional LSP.
+
+ The two LSRs at each end of the bundled link exchange these
+ identifiers. Exchanging the identifiers may be accomplished by
+ configuration, by means of a protocol such as LMP (preferred
+ solution), by means of RSVP-TE/CR-LDP (especially in the case where a
+ component link is a Forwarding Adjacency), or by means of IS-IS or
+ OSPF extensions.
+
+ This mechanism does not require each component link to have its own
+ control channel. In fact, it does not even require the whole
+ (bundled) link to have its own control channel.
+
+4.4. Unnumbered Bundled Link
+
+ A bundled link may itself be numbered or unnumbered independent of
+ whether the component links are numbered or not. This affects how
+ the bundled link is advertised in IS-IS/OSPF and the format of LSP
+ EROs that traverse the bundled link. Furthermore, unnumbered
+ Interface Identifiers for all unnumbered outgoing links of a given
+ LSR (whether component links, Forwarding Adjacencies or bundled
+ links) must be unique in the context of that LSR.
+
+
+
+
+
+
+Mannie Standards Track [Page 19]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+4.5. Forming Bundled Links
+
+ The generic rule for bundling component links is to place those links
+ that are correlated in some manner in the same bundle. If links may
+ be correlated based on multiple properties then the bundling may be
+ applied sequentially based on these properties. For instance, links
+ may be first grouped based on the first property. Each of these
+ groups may be then divided into smaller groups based on the second
+ property and so on. The main principle followed in this process is
+ that the properties of the resulting bundles should be concisely
+ summarizable. Link bundling may be done automatically or by
+ configuration. Automatic link bundling can apply bundling rules
+ sequentially to produce bundles.
+
+ For instance, the first property on which component links may be
+ correlated could be the Interface Switching Capability
+ [GMPLS-ROUTING], the second property could be the Encoding
+ [GMPLS-ROUTING], the third property could be the Administrative
+ Weight (cost), the fourth property could be the Resource Classes and
+ finally links may be correlated based on other metrics such as SRLG
+ (Shared Risk Link Groups).
+
+ When routing an alternate path for protection purposes, the general
+ principle followed is that the alternate path is not routed over any
+ link belonging to an SRLG that belongs to some link of the primary
+ path. Thus, the rule to be followed is to group links belonging to
+ exactly the same set of SRLGs.
+
+ This type of sequential sub-division may result in a number of
+ bundles between two adjacent nodes. In practice, however, the link
+ properties may not be very heterogeneous among component links
+ between two adjacent nodes. Thus, the number of bundles in practice
+ may not be large.
+
+5. Relationship with the UNI
+
+ The interface between an edge GMPLS node and a GMPLS LSR on the
+ network side may be referred to as a User to Network Interface (UNI),
+ while the interface between two-network side LSRs may be referred to
+ as a Network to Network Interface (NNI).
+
+ GMPLS does not specify separately a UNI and an NNI. Edge nodes are
+ connected to LSRs on the network side, and these LSRs are in turn
+ connected between them. Of course, the behavior of an edge node is
+ not exactly the same as the behavior of an LSR on the network side.
+ Note also, that an edge node may run a routing protocol, however it
+ is expected that in most of the cases it will not (see also section
+ 5.2 and the section about signaling with an explicit route).
+
+
+
+Mannie Standards Track [Page 20]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Conceptually, a difference between UNI and NNI make sense either if
+ both interface uses completely different protocols, or if they use
+ the same protocols but with some outstanding differences. In the
+ first case, separate protocols are often defined successively, with
+ more or less success.
+
+ The GMPLS approach consisted in building a consistent model from day
+ one, considering both the UNI and NNI interfaces at the same time
+ [GMPLS-OVERLAY]. For that purpose, a very few specific UNI
+ particularities have been ignored in a first time. GMPLS has been
+ enhanced to support such particularities at the UNI by some other
+ standardization bodies (see hereafter).
+
+5.1. Relationship with the OIF UNI
+
+ This section is only given for reference to the OIF work related to
+ GMPLS. The current OIF UNI specification [OIF-UNI] defines an
+ interface between a client SONET/SDH equipment and an SONET/SDH
+ network, each belonging to a distinct administrative authority. It
+ is designed for an overlay model. The OIF UNI defines additional
+ mechanisms on the top of GMPLS for the UNI.
+
+ For instance, the OIF service discovery procedure is a precursor to
+ obtaining UNI services. Service discovery allows a client to
+ determine the static parameters of the interconnection with the
+ network, including the UNI signaling protocol, the type of
+ concatenation, the transparency level as well as the type of
+ diversity (node, link, SRLG) supported by the network.
+
+ Since the current OIF UNI interface does not cover photonic networks,
+ G.709 Digital Wrapper, etc, it is from that perspective a subset of
+ the GMPLS Architecture at the UNI.
+
+5.2. Reachability across the UNI
+
+ This section discusses the selection of an explicit route by an edge
+ node. The selection of the first LSR by an edge node connected to
+ multiple LSRs is part of that problem.
+
+ An edge node (host or LSR) can participate more or less deeply in the
+ GMPLS routing. Four different routing models can be supported at the
+ UNI: configuration based, partial peering, silent listening and full
+ peering.
+
+ - Configuration based: this routing model requires the manual or
+ automatic configuration of an edge node with a list of neighbor
+ LSRs sorted by preference order. Automatic configuration can be
+ achieved using DHCP for instance. No routing information is
+
+
+
+Mannie Standards Track [Page 21]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ exchanged at the UNI, except maybe the ordered list of LSRs. The
+ only routing information used by the edge node is that list. The
+ edge node sends by default an LSP request to the preferred LSR.
+ ICMP redirects could be send by this LSR to redirect some LSP
+ requests to another LSR connected to the edge node. GMPLS does
+ not preclude that model.
+
+ - Partial peering: limited routing information (mainly reachability)
+ can be exchanged across the UNI using some extensions in the
+ signaling plane. The reachability information exchanged at the
+ UNI may be used to initiate edge node specific routing decision
+ over the network. GMPLS does not have any capability to support
+ this model today.
+
+ - Silent listening: the edge node can silently listen to routing
+ protocols and take routing decisions based on the information
+ obtained. An edge node receives the full routing information,
+ including traffic engineering extensions. One LSR should forward
+ transparently all routing PDUs to the edge node. An edge node can
+ now compute a complete explicit route taking into consideration
+ all the end-to-end routing information. GMPLS does not preclude
+ this model.
+
+ - Full peering: in addition to silent listening, the edge node
+ participates within the routing, establish adjacencies with its
+ neighbors and advertises LSAs. This is useful only if there are
+ benefits for edge nodes to advertise themselves traffic
+ engineering information. GMPLS does not preclude this model.
+
+6. Link Management
+
+ In the context of GMPLS, a pair of nodes (e.g., a photonic switch)
+ may be connected by tens of fibers, and each fiber may be used to
+ transmit hundreds of wavelengths if DWDM is used. Multiple fibers
+ and/or multiple wavelengths may also be combined into one or more
+ bundled links for routing purposes. Furthermore, to enable
+ communication between nodes for routing, signaling, and link
+ management, control channels must be established between a node pair.
+
+ Link management is a collection of useful procedures between adjacent
+ nodes that provide local services such as control channel management,
+ link connectivity verification, link property correlation, and fault
+ management. The Link Management Protocol (LMP) [LMP] has been
+ defined to fulfill these operations. LMP has been initiated in the
+ context of GMPLS but is a generic toolbox that can be also used in
+ other contexts.
+
+
+
+
+
+Mannie Standards Track [Page 22]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ In GMPLS, the control channels between two adjacent nodes are no
+ longer required to use the same physical medium as the data links
+ between those nodes. Moreover, the control channels that are used to
+ exchange the GMPLS control-plane information exist independently of
+ the links they manage. Hence, LMP was designed to manage the data
+ links, independently of the termination capabilities of those data
+ links.
+
+ Control channel management and link property correlation procedures
+ are mandatory per LMP. Link connectivity verification and fault
+ management procedures are optional.
+
+6.1. Control Channel and Control Channel Management
+
+ LMP control channel management is used to establish and maintain
+ control channels between nodes. Control channels exist independently
+ of TE links, and can be used to exchange MPLS control-plane
+ information such as signaling, routing, and link management
+ information.
+
+ An "LMP adjacency" is formed between two nodes that support the same
+ LMP capabilities. Multiple control channels may be active
+ simultaneously for each adjacency. A control channel can be either
+ explicitly configured or automatically selected, however, LMP
+ currently assume that control channels are explicitly configured
+ while the configuration of the control channel capabilities can be
+ dynamically negotiated.
+
+ For the purposes of LMP, the exact implementation of the control
+ channel is left unspecified. The control channel(s) between two
+ adjacent nodes is no longer required to use the same physical medium
+ as the data-bearing links between those nodes. For example, a
+ control channel could use a separate wavelength or fiber, an Ethernet
+ link, or an IP tunnel through a separate management network.
+
+ A consequence of allowing the control channel(s) between two nodes to
+ be physically diverse from the associated data-bearing links is that
+ the health of a control channel does not necessarily correlate to the
+ health of the data-bearing links, and vice-versa. Therefore, new
+ mechanisms have been developed in LMP to manage links, both in terms
+ of link provisioning and fault isolation.
+
+ LMP does not specify the signaling transport mechanism used in the
+ control channel, however it states that messages transported over a
+ control channel must be IP encoded. Furthermore, since the messages
+ are IP encoded, the link level encoding is not part of LMP. A 32-bit
+ non-zero integer Control Channel Identifier (CCId) is assigned to
+ each direction of a control channel.
+
+
+
+Mannie Standards Track [Page 23]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Each control channel individually negotiates its control channel
+ parameters and maintains connectivity using a fast Hello protocol.
+ The latter is required if lower-level mechanisms are not available to
+ detect link failures.
+
+ The Hello protocol of LMP is intended to be a lightweight keep-alive
+ mechanism that will react to control channel failures rapidly so that
+ IGP Hellos are not lost and the associated link-state adjacencies are
+ not removed uselessly.
+
+ The Hello protocol consists of two phases: a negotiation phase and a
+ keep-alive phase. The negotiation phase allows negotiation of some
+ basic Hello protocol parameters, like the Hello frequency. The
+ keep-alive phase consists of a fast lightweight bi-directional Hello
+ message exchange.
+
+ If a group of control channels share a common node pair and support
+ the same LMP capabilities, then LMP control channel messages (except
+ Configuration messages, and Hello's) may be transmitted over any of
+ the active control channels without coordination between the local
+ and remote nodes.
+
+ For LMP, it is essential that at least one control channel is always
+ available. In case of control channel failure, it may be possible to
+ use an alternate active control channel without coordination.
+
+6.2. Link Property Correlation
+
+ As part of LMP, a link property correlation exchange is defined. The
+ exchange is used to aggregate multiple data-bearing links (i.e.,
+ component links) into a bundled link and exchange, correlate, or
+ change TE link parameters. The link property correlation exchange
+ may be done at any time a link is up and not in the Verification
+ process (see next section).
+
+ It allows, for instance, the addition of component links to a link
+ bundle, change of a link's minimum/maximum reservable bandwidth,
+ change of port identifiers, or change of component identifiers in a
+ bundle. This mechanism is supported by an exchange of link summary
+ messages.
+
+6.3. Link Connectivity Verification
+
+ Link connectivity verification is an optional procedure that may be
+ used to verify the physical connectivity of data-bearing links as
+ well as to exchange the link identifiers that are used in the GMPLS
+ signaling.
+
+
+
+
+Mannie Standards Track [Page 24]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ This procedure should be performed initially when a data-bearing link
+ is first established, and subsequently, on a periodic basis for all
+ unallocated (free) data-bearing links.
+
+ The verification procedure consists of sending Test messages in-band
+ over the data-bearing links. This requires that the unallocated
+ links must be opaque; however, multiple degrees of opaqueness (e.g.,
+ examining overhead bytes, terminating the payload, etc.), and hence
+ different mechanisms to transport the Test messages, are specified.
+ Note that the Test message is the only LMP message that is
+ transmitted over the data-bearing link, and that Hello messages
+ continue to be exchanged over the control channel during the link
+ verification process. Data-bearing links are tested in the transmit
+ direction as they are unidirectional. As such, it is possible for
+ LMP neighboring nodes to exchange the Test messages simultaneously in
+ both directions.
+
+ To initiate the link verification procedure, a node must first notify
+ the adjacent node that it will begin sending Test messages over a
+ particular data-bearing link, or over the component links of a
+ particular bundled link. The node must also indicate the number of
+ data-bearing links that are to be verified; the interval at which the
+ test messages will be sent; the encoding scheme, the transport
+ mechanisms that are supported, the data rate for Test messages; and,
+ in the case where the data-bearing links correspond to fibers, the
+ wavelength over which the Test messages will be transmitted.
+ Furthermore, the local and remote bundled link identifiers are
+ transmitted at this time to perform the component link association
+ with the bundled link identifiers.
+
+6.4. Fault Management
+
+ Fault management is an important requirement from the operational
+ point of view. Fault management includes usually: fault detection,
+ fault localization and fault notification. When a failure occurs and
+ is detected (fault detection), an operator needs to know exactly
+ where it happened (fault localization) and a source node may need to
+ be notified in order to take some actions (fault notification).
+
+ Note that fault localization can also be used to support some
+ specific (local) protection/restoration mechanisms.
+
+ In new technologies such as transparent photonic switching currently
+ no method is defined to locate a fault, and the mechanism by which
+ the fault information is propagated must be sent "out of band" (via
+ the control plane).
+
+
+
+
+
+Mannie Standards Track [Page 25]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ LMP provides a fault localization procedure that can be used to
+ rapidly localize link failures, by notifying a fault up to the node
+ upstream of that fault (i.e., through a fault notification
+ procedure).
+
+ A downstream LMP neighbor that detects data link failures will send
+ an LMP message to its upstream neighbor notifying it of the failure.
+ When an upstream node receives a failure notification, it can
+ correlate the failure with the corresponding input ports to determine
+ if the failure is between the two nodes. Once the failure has been
+ localized, the signaling protocols can be used to initiate link or
+ path protection/restoration procedures.
+
+6.5. LMP for DWDM Optical Line Systems (OLSs)
+
+ In an all-optical environment, LMP focuses on peer communications
+ (e.g., OXC-to-OXC). A great deal of information about a link between
+ two OXCs is known by the OLS (Optical Line System or WDM Terminal
+ multiplexer). Exposing this information to the control plane can
+ improve network usability by further reducing required manual
+ configuration, and by greatly enhancing fault detection and recovery.
+
+ LMP-WDM [LMP-WDM] defines extensions to LMP for use between an OXC
+ and an OLS. These extensions are intended to satisfy the Optical
+ Link Interface Requirements described in [OLI-REQ].
+
+ Fault detection is particularly an issue when the network is using
+ all-optical photonic switches (PXC). Once a connection is
+ established, PXCs have only limited visibility into the health of the
+ connection. Although the PXC is all-optical, long-haul OLSs
+ typically terminate channels electrically and regenerate them
+ optically. This provides an opportunity to monitor the health of a
+ channel between PXCs. LMP-WDM can then be used by the OLS to provide
+ this information to the PXC.
+
+ In addition to the link information known to the OLS that is
+ exchanged through LMP-WDM, some information known to the OXC may also
+ be exchanged with the OLS through LMP-WDM. This information is
+ useful for alarm management and link monitoring (e.g., trace
+ monitoring). Alarm management is important because the
+ administrative state of a connection, known to the OXC (e.g., this
+ information may be learned through the Admin Status object of GMPLS
+ signaling [RFC3471]), can be used to suppress spurious alarms. For
+ example, the OXC may know that a connection is "up", "down", in a
+ "testing" mode, or being deleted ("deletion-in-progress"). The OXC
+ can use this information to inhibit alarm reporting from the OLS when
+ a connection is "down", "testing", or being deleted.
+
+
+
+
+Mannie Standards Track [Page 26]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ It is important to note that an OXC may peer with one or more OLSs
+ and an OLS may peer with one or more OXCs. Although there are many
+ similarities between an OXC-OXC LMP session and an OXC-OLS LMP
+ session, particularly for control management and link verification,
+ there are some differences as well. These differences can primarily
+ be attributed to the nature of an OXC-OLS link, and the purpose of
+ OXC-OLS LMP sessions. The OXC-OXC links can be used to provide the
+ basis for GMPLS signaling and routing at the optical layer. The
+ information exchanged over LMP-WDM sessions is used to augment
+ knowledge about the links between OXCs.
+
+ In order for the information exchanged over the OXC-OLS LMP sessions
+ to be used by the OXC-OXC session, the information must be
+ coordinated by the OXC. However, the OXC-OXC and OXC-OLS LMP
+ sessions are run independently and must be maintained separately. One
+ critical requirement when running an OXC-OLS LMP session is the
+ ability of the OLS to make a data link transparent when not doing the
+ verification procedure. This is because the same data link may be
+ verified between OXC-OLS and between OXC-OXC. The verification
+ procedure of LMP is used to coordinate the Test procedure (and hence
+ the transparency/opaqueness of the data links). To maintain
+ independence between the sessions, it must be possible for the LMP
+ sessions to come up in any order. In particular, it must be possible
+ for an OXC-OXC LMP session to come up without an OXC-OLS LMP session
+ being brought up, and vice-versa.
+
+7. Generalized Signaling
+
+ The GMPLS signaling extends certain base functions of the RSVP-TE and
+ CR-LDP signaling and, in some cases, adds functionality. These
+ changes and additions impact basic LSP properties: how labels are
+ requested and communicated, the unidirectional nature of LSPs, how
+ errors are propagated, and information provided for synchronizing the
+ ingress and egress.
+
+ The core GMPLS signaling specification is available in three parts:
+
+ 1. A signaling functional description [RFC3471].
+ 2. RSVP-TE extensions [RFC3473].
+ 3. CR-LDP extensions [RFC3472].
+
+ In addition, independent parts are available per technology:
+
+ 1. GMPLS extensions for SONET and SDH control [RFC3946].
+ 2. GMPLS extensions for G.709 control [GMPLS-G709].
+
+
+
+
+
+
+Mannie Standards Track [Page 27]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ The following MPLS profile expressed in terms of MPLS features
+ [RFC3031] applies to GMPLS:
+
+ - Downstream-on-demand label allocation and distribution.
+
+ - Ingress initiated ordered control.
+
+ - Liberal (typical), or conservative (could) label retention mode.
+
+ - Request, traffic/data, or topology driven label allocation
+ strategy.
+
+ - Explicit routing (typical), or hop-by-hop routing.
+
+ The GMPLS signaling defines the following new building blocks on the
+ top of MPLS-TE:
+
+ 1. A new generic label request format.
+ 2. Labels for TDM, LSC and FSC interfaces, generically known as
+ Generalized Label.
+ 3. Waveband switching support.
+ 4. Label suggestion by the upstream for optimization purposes (e.g.,
+ latency).
+ 5. Label restriction by the upstream to support some optical
+ constraints.
+ 6. Bi-directional LSP establishment with contention resolution.
+ 7. Rapid failure notification extensions.
+ 8. Protection information currently focusing on link protection,
+ plus primary and secondary LSP indication.
+ 9. Explicit routing with explicit label control for a fine degree of
+ control.
+ 10. Specific traffic parameters per technology.
+ 11. LSP administrative status handling.
+ 12. Control channel separation.
+
+ These building blocks will be described in more details in the
+ following. A complete specification can be found in the
+ corresponding documents.
+
+ Note that GMPLS is highly generic and has many options. Only
+ building blocks 1, 2 and 10 are mandatory, and only within the
+ specific format that is needed. Typically, building blocks 6 and 9
+ should be implemented. Building blocks 3, 4, 5, 7, 8, 11 and 12 are
+ optional.
+
+
+
+
+
+
+
+Mannie Standards Track [Page 28]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ A typical SONET/SDH switching network would implement building
+ blocks: 1, 2 (the SONET/SDH label), 6, 9, 10 and 11. Building blocks
+ 7 and 8 are optional since the protection can be achieved using
+ SONET/SDH overhead bytes.
+
+ A typical wavelength switching network would implement building
+ blocks: 1, 2 (the generic format), 4, 5, 6, 7, 8, 9 and 11. Building
+ block 3 is only needed in the particular case of waveband switching.
+
+ A typical fiber switching network would implement building blocks:
+ 1, 2 (the generic format), 6, 7, 8, 9 and 11.
+
+ A typical MPLS-IP network would not implement any of these building
+ blocks, since the absence of building block 1 would indicate regular
+ MPLS-IP. Note however that building block 1 and 8 can be used to
+ signal MPLS-IP as well. In that case, the MPLS-IP network can
+ benefit from the link protection type (not available in CR-LDP, some
+ very basic form being available in RSVP-TE). Building block 2 is
+ here a regular MPLS label and no new label format is required.
+
+ GMPLS does not specify any profile for RSVP-TE and CR-LDP
+ implementations that have to support GMPLS - except for what is
+ directly related to GMPLS procedures. It is to the manufacturer to
+ decide which are the optional elements and procedures of RSVP-TE and
+ CR-LDP that need to be implemented. Some optional MPLS-TE elements
+ can be useful for TDM, LSC and FSC layers, for instance the setup and
+ holding priorities that are inherited from MPLS-TE.
+
+7.1. Overview: How to Request an LSP
+
+ A TDM, LSC or FSC LSP is established by sending a PATH/Label Request
+ message downstream to the destination. This message contains a
+ Generalized Label Request with the type of LSP (i.e., the layer
+ concerned), and its payload type. An Explicit Route Object (ERO) is
+ also normally added to the message, but this can be added and/or
+ completed by the first/default LSR.
+
+ The requested bandwidth is encoded in the RSVP-TE SENDER_TSPEC
+ object, or in the CR-LDP Traffic Parameters TLV. Specific parameters
+ for a given technology are given in these traffic parameters, such as
+ the type of signal, concatenation and/or transparency for a SONET/SDH
+ LSP. For some other technology there be could just one bandwidth
+ parameter indicating the bandwidth as a floating-point value.
+
+ The requested local protection per link may be requested using the
+ Protection Information Object/TLV. The end-to-end LSP protection is
+ for further study and is introduced LSP protection/restoration
+ section (see after).
+
+
+
+Mannie Standards Track [Page 29]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ If the LSP is a bi-directional LSP, an Upstream Label is also
+ specified in the Path/Label Request message. This label will be the
+ one to use in the upstream direction.
+
+ Additionally, a Suggested Label, a Label Set and a Waveband Label can
+ also be included in the message. Other operations are defined in
+ MPLS-TE.
+
+ The downstream node will send back a Resv/Label Mapping message
+ including one Generalized Label object/TLV that can contain several
+ Generalized Labels. For instance, if a concatenated SONET/SDH signal
+ is requested, several labels can be returned.
+
+ In case of SONET/SDH virtual concatenation, a list of labels is
+ returned. Each label identifying one element of the virtual
+ concatenated signal. This limits virtual concatenation to remain
+ within a single (component) link.
+
+ In case of any type of SONET/SDH contiguous concatenation, only one
+ label is returned. That label is the lowest signal of the contiguous
+ concatenated signal (given an order specified in [RFC3946]).
+
+ In case of SONET/SDH "multiplication", i.e., co-routing of circuits
+ of the same type but without concatenation but all belonging to the
+ same LSP, the explicit ordered list of all signals that take part in
+ the LSP is returned.
+
+7.2. Generalized Label Request
+
+ The Generalized Label Request is a new object/TLV to be added in an
+ RSVP-TE Path message instead of the regular Label Request, or in a
+ CR-LDP Request message in addition to the already existing TLVs. Only
+ one label request can be used per message, so a single LSP can be
+ requested at a time per signaling message.
+
+ The Generalized Label Request gives three major characteristics
+ (parameters) required to support the LSP being requested: the LSP
+ Encoding Type, the Switching Type that must be used and the LSP
+ payload type called Generalized PID (G-PID).
+
+ The LSP Encoding Type indicates the encoding type that will be used
+ with the data associated with the LSP, i.e., the type of technology
+ being considered. For instance, it can be SDH, SONET, Ethernet, ANSI
+ PDH, etc. It represents the nature of the LSP, and not the nature of
+ the links that the LSP traverses. This is used hop-by-hop by each
+ node.
+
+
+
+
+
+Mannie Standards Track [Page 30]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ A link may support a set of encoding formats, where support means
+ that a link is able to carry and switch a signal of one or more of
+ these encoding formats. The Switching Type indicates then the type
+ of switching that should be performed on a particular link for that
+ LSP. This information is needed for links that advertise more than
+ one type of switching capability.
+
+ Nodes must verify that the type indicated in the Switching Type is
+ supported on the corresponding incoming interface; otherwise, the
+ node must generate a notification message with a "Routing
+ problem/Switching Type" indication.
+
+ The LSP payload type (G-PID) identifies the payload carried by the
+ LSP, i.e., an identifier of the client layer of that LSP. For some
+ technologies, it also indicates the mapping used by the client layer,
+ e.g., byte synchronous mapping of E1. This must be interpreted
+ according to the LSP encoding type and is used by the nodes at the
+ endpoints of the LSP to know to which client layer a request is
+ destined, and in some cases by the penultimate hop.
+
+ Other technology specific parameters are not transported in the
+ Generalized Label Request but in technology specific traffic
+ parameters as explained hereafter. Currently, two set of traffic
+ parameters are defined, one for SONET/SDH and one for G.709.
+
+ Note that it is expected than specific traffic parameters will be
+ defined in the future for photonic (all optical) switching.
+
+7.3. SONET/SDH Traffic Parameters
+
+ The GMPLS SONET/SDH traffic parameters [RFC3946] specify a powerful
+ set of capabilities for SONET [ANSI-T1.105] and SDH [ITUT-G.707].
+
+ The first traffic parameter specifies the type of the elementary
+ SONET/SDH signal that comprises the requested LSP, e.g., VC-11, VT6,
+ VC-4, STS-3c, etc. Several transforms can then be applied
+ successively on the elementary Signal to build the final signal being
+ actually requested for the LSP.
+
+ These transforms are the contiguous concatenation, the virtual
+ concatenation, the transparency and the multiplication. Each one is
+ optional. They must be applied strictly in the following order:
+
+ - First, contiguous concatenation can be optionally applied on the
+ Elementary Signal, resulting in a contiguously concatenated
+ signal.
+
+
+
+
+
+Mannie Standards Track [Page 31]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ - Second, virtual concatenation can be optionally applied either
+ directly on the elementary Signal, or on the contiguously
+ concatenated signal obtained from the previous phase.
+
+ - Third, some transparency can be optionally specified when
+ requesting a frame as signal rather than a container. Several
+ transparency packages are defined.
+
+ - Fourth, a multiplication can be optionally applied either directly
+ on the elementary Signal, or on the contiguously concatenated
+ signal obtained from the first phase, or on the virtually
+ concatenated signal obtained from the second phase, or on these
+ signals combined with some transparency.
+
+ For RSVP-TE, the SONET/SDH traffic parameters are carried in a new
+ SENDER_TSPEC and FLOWSPEC. The same format is used for both. There
+ is no Adspec associated with the SENDER_TSPEC, it is omitted or a
+ default value is used. The content of the FLOWSPEC object received
+ in a Resv message should be identical to the content of the
+ SENDER_TSPEC of the corresponding Path message. In other words, the
+ receiver is normally not allowed to change the values of the traffic
+ parameters. However, some level of negotiation may be achieved as
+ explained in [RFC3946].
+
+ For CR-LDP, the SONET/SDH traffic parameters are simply carried in a
+ new TLV.
+
+ Note that a general discussion on SONET/SDH and GMPLS can be found in
+ [SONET-SDH-GMPLS-FRM].
+
+7.4. G.709 Traffic Parameters
+
+ Simply said, an [ITUT-G.709] based network is decomposed in two major
+ layers: an optical layer (i.e., made of wavelengths) and a digital
+ layer. These two layers are divided into sub-layers and switching
+ occurs at two specific sub-layers: at the OCh (Optical Channel)
+ optical layer and at the ODU (Optical channel Data Unit) electrical
+ layer. The ODUk notation is used to denote ODUs at different
+ bandwidths.
+
+ The GMPLS G.709 traffic parameters [GMPLS-G709] specify a powerful
+ set of capabilities for ITU-T G.709 networks.
+
+ The first traffic parameter specifies the type of the elementary
+ G.709 signal that comprises the requested LSP, e.g., ODU1, OCh at 40
+ Gbps, etc. Several transforms can then be applied successively on
+ the elementary Signal to build the final signal being actually
+ requested for the LSP.
+
+
+
+Mannie Standards Track [Page 32]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ These transforms are the virtual concatenation and the
+ multiplication. Each one of these transforms is optional. They must
+ be applied strictly in the following order:
+
+ - First, virtual concatenation can be optionally applied directly on
+ the elementary Signal,
+
+ - Second, a multiplication can be optionally applied, either
+ directly on the elementary Signal, or on the virtually
+ concatenated signal obtained from the first phase.
+
+ Additional ODUk Multiplexing traffic parameters allow indicating an
+ ODUk mapping (ODUj into ODUk) for an ODUk multiplexing LSP request.
+ G.709 supports the following multiplexing capabilities: ODUj into
+ ODUk (k > j) and ODU1 with ODU2 multiplexing into ODU3.
+
+ For RSVP-TE, the G.709 traffic parameters are carried in a new
+ SENDER-TSPEC and FLOWSPEC. The same format is used for both. There
+ is no Adspec associated with the SENDER_TSPEC, it is omitted or a
+ default value is used. The content of the FLOWSPEC object received
+ in a Resv message should be identical to the content of the
+ SENDER_TSPEC of the corresponding Path message.
+
+ For CR-LDP, the G.709 traffic parameters are simply carried in a new
+ TLV.
+
+7.5. Bandwidth Encoding
+
+ Some technologies that do not have (yet) specific traffic parameters
+ just require a bandwidth encoding transported in a generic form.
+ Bandwidth is carried in 32-bit number in IEEE floating-point format
+ (the unit is bytes per second). Values are carried in a per protocol
+ specific manner. For non-packet LSPs, it is useful to define
+ discrete values to identify the bandwidth of the LSP.
+
+ It should be noted that this bandwidth encoding do not apply to
+ SONET/SDH and G.709, for which the traffic parameters fully define
+ the requested SONET/SDH or G.709 signal.
+
+ The bandwidth is coded in the Peak Data Rate field of Int-Serv
+ objects for RSVP-TE in the SENDER_TSPEC and FLOWSPEC objects and in
+ the Peak and Committed Data Rate fields of the CR-LDP Traffic
+ Parameters TLV.
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 33]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+7.6. Generalized Label
+
+ The Generalized Label extends the traditional MPLS label by allowing
+ the representation of not only labels that travel in-band with
+ associated data packets, but also (virtual) labels that identify
+ time-slots, wavelengths, or space division multiplexed positions.
+
+ For example, the Generalized Label may identify (a) a single fiber in
+ a bundle, (b) a single waveband within fiber, (c) a single wavelength
+ within a waveband (or fiber), or (d) a set of time-slots within a
+ wavelength (or fiber). It may also be a generic MPLS label, a Frame
+ Relay label, or an ATM label (VCI/VPI). The format of a label can be
+ as simple as an integer value such as a wavelength label or can be
+ more elaborated such as an SONET/SDH or a G.709 label.
+
+ SDH and SONET define each a multiplexing structure. These
+ multiplexing structures will be used as naming trees to create unique
+ labels. Such a label will identify the exact position (times-lot(s))
+ of a signal in a multiplexing structure. Since the SONET
+ multiplexing structure may be seen as a subset of the SDH
+ multiplexing structure, the same format of label is used for SDH and
+ SONET. A similar concept is applied to build a label at the G.709
+ ODU layer.
+
+ Since the nodes sending and receiving the Generalized Label know what
+ kinds of link they are using, the Generalized Label does not identify
+ its type. Instead, the nodes are expected to know from the context
+ what type of label to expect.
+
+ A Generalized Label only carries a single level of label i.e., it is
+ non-hierarchical. When multiple levels of labels (LSPs within LSPs)
+ are required, each LSP must be established separately.
+
+7.7. Waveband Switching
+
+ A special case of wavelength switching is waveband switching. A
+ waveband represents a set of contiguous wavelengths, which can be
+ switched together to a new waveband. For optimization reasons, it
+ may be desirable for a photonic cross-connect to optically switch
+ multiple wavelengths as a unit. This may reduce the distortion on
+ the individual wavelengths and may allow tighter separation of the
+ individual wavelengths. A Waveband label is defined to support this
+ special case.
+
+ Waveband switching naturally introduces another level of label
+ hierarchy and as such the waveband is treated the same way, all other
+ upper layer labels are treated. As far as the MPLS protocols are
+ concerned, there is little difference between a waveband label and a
+
+
+
+Mannie Standards Track [Page 34]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ wavelength label. Exception is that semantically the waveband can be
+ subdivided into wavelengths whereas the wavelength can only be
+ subdivided into time or statistically multiplexed labels.
+
+ In the context of waveband switching, the generalized label used to
+ indicate a waveband contains three fields, a waveband ID, a Start
+ Label and an End Label. The Start and End Labels are channel
+ identifiers from the sender perspective that identify respectively,
+ the lowest value wavelength and the highest value wavelength making
+ up the waveband.
+
+7.8. Label Suggestion by the Upstream
+
+ GMPLS allows for a label to be optionally suggested by an upstream
+ node. This suggestion may be overridden by a downstream node but in
+ some cases, at the cost of higher LSP setup time. The suggested
+ label is valuable when establishing LSPs through certain kinds of
+ optical equipment where there may be a lengthy (in electrical terms)
+ delay in configuring the switching fabric. For example, micro
+ mirrors may have to be elevated or moved, and this physical motion
+ and subsequent damping takes time. If the labels and hence switching
+ fabric are configured in the reverse direction (the norm), the
+ Resv/MAPPING message may need to be delayed by 10's of milliseconds
+ per hop in order to establish a usable forwarding path. It can be
+ important for restoration purposes where alternate LSPs may need to
+ be rapidly established as a result of network failures.
+
+7.9. Label Restriction by the Upstream
+
+ An upstream node can optionally restrict (limit) the choice of label
+ of a downstream node to a set of acceptable labels. Giving lists
+ and/or ranges of inclusive (acceptable) or exclusive (unacceptable)
+ labels in a Label Set provides this restriction. If not applied, all
+ labels from the valid label range may be used. There are at least
+ four cases where a label restriction is useful in the "optical"
+ domain.
+
+ Case 1: the end equipment is only capable of transmitting and
+ receiving on a small specific set of wavelengths/wavebands.
+
+ Case 2: there is a sequence of interfaces, which cannot support
+ wavelength conversion and require the same wavelength be used
+ end-to-end over a sequence of hops, or even an entire path.
+
+ Case 3: it is desirable to limit the amount of wavelength conversion
+ being performed to reduce the distortion on the optical signals.
+
+ Case 4: two ends of a link support different sets of wavelengths.
+
+
+
+Mannie Standards Track [Page 35]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ The receiver of a Label Set must restrict its choice of labels to one
+ that is in the Label Set. A Label Set may be present across multiple
+ hops. In this case, each node generates its own outgoing Label Set,
+ possibly based on the incoming Label Set and the node's hardware
+ capabilities. This case is expected to be the norm for nodes with
+ conversion incapable interfaces.
+
+7.10. Bi-directional LSP
+
+ GMPLS allows establishment of bi-directional symmetric LSPs (not of
+ asymmetric LSPs). A symmetric bi-directional LSP has the same
+ traffic engineering requirements including fate sharing, protection
+ and restoration, LSRs, and resource requirements (e.g., latency and
+ jitter) in each direction.
+
+ In the remainder of this section, the term "initiator" is used to
+ refer to a node that starts the establishment of an LSP; the term
+ "terminator" is used to refer to the node that is the target of the
+ LSP. For a bi-directional LSPs, there is only one initiator and one
+ terminator.
+
+ Normally to establish a bi-directional LSP when using RSVP-TE
+ [RFC3209] or CR-LDP [RFC3212] two unidirectional paths must be
+ independently established. This approach has the following
+ disadvantages:
+
+ 1. The latency to establish the bi-directional LSP is equal to one
+ round trip signaling time plus one initiator-terminator signaling
+ transit delay. This not only extends the setup latency for
+ successful LSP establishment, but it extends the worst-case
+ latency for discovering an unsuccessful LSP to as much as two
+ times the initiator-terminator transit delay. These delays are
+ particularly significant for LSPs that are established for
+ restoration purposes.
+
+ 2. The control overhead is twice that of a unidirectional LSP. This
+ is because separate control messages (e.g., Path and Resv) must be
+ generated for both segments of the bi-directional LSP.
+
+ 3. Because the resources are established in separate segments, route
+ selection is complicated. There is also additional potential race
+ for conditions in assignment of resources, which decreases the
+ overall probability of successfully establishing the bi-
+ directional connection.
+
+
+
+
+
+
+
+Mannie Standards Track [Page 36]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ 4. It is more difficult to provide a clean interface for SONET/SDH
+ equipment that may rely on bi-directional hop-by-hop paths for
+ protection switching. Note that existing SONET/SDH equipment
+ transmits the control information in-band with the data.
+
+ 5. Bi-directional optical LSPs (or lightpaths) are seen as a
+ requirement for many optical networking service providers.
+
+ With bi-directional LSPs both the downstream and upstream data paths,
+ i.e., from initiator to terminator and terminator to initiator, are
+ established using a single set of signaling messages. This reduces
+ the setup latency to essentially one initiator-terminator round trip
+ time plus processing time, and limits the control overhead to the
+ same number of messages as a unidirectional LSP.
+
+ For bi-directional LSPs, two labels must be allocated. Bi-
+ directional LSP setup is indicated by the presence of an Upstream
+ Label in the appropriate signaling message.
+
+7.11. Bi-directional LSP Contention Resolution
+
+ Contention for labels may occur between two bi-directional LSP setup
+ requests traveling in opposite directions. This contention occurs
+ when both sides allocate the same resources (ports) at effectively
+ the same time. GMPLS signaling defines a procedure to resolve that
+ contention: the node with the higher node ID will win the contention.
+ To reduce the probability of contention, some mechanisms are also
+ suggested.
+
+7.12. Rapid Notification of Failure
+
+ GMPLS defines several signaling extensions that enable expedited
+ notification of failures and other events to nodes responsible for
+ restoring failed LSPs, and error handling.
+
+ 1. Acceptable Label Set for notification on Label Error:
+
+ There are cases in traditional MPLS and in GMPLS that result in an
+ error message containing an "Unacceptable label value" indication.
+ When these cases occur, it can useful for the node generating the
+ error message to indicate which labels would be acceptable. To
+ cover this case, GMPLS introduces the ability to convey such
+ information via the "Acceptable Label Set". An Acceptable Label
+ Set is carried in appropriate protocol specific error messages.
+ The format of an Acceptable Label Set is identical to a Label Set.
+
+
+
+
+
+
+Mannie Standards Track [Page 37]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ 2. Expedited notification:
+
+ Extensions to RSVP-TE enable expedited notification of failures
+ and other events to determined nodes. For CR-LDP, there is not
+ currently a similar mechanism. The first extension identifies
+ where event notifications are to be sent. The second provides for
+ general expedited event notification with a Notify message. Such
+ extensions can be used by fast restoration mechanisms.
+ Notifications may be requested in both the upstream and downstream
+ directions.
+
+ The Notify message is a generalized notification mechanism that
+ differs from the currently defined error messages in that it can
+ be "targeted" to a node other than the immediate upstream or
+ downstream neighbor. The Notify message does not replace existing
+ error messages. The Notify message may be sent either (a)
+ normally, where non-target nodes just forward the Notify message
+ to the target node, similar to ResvConf processing in [RFC2205];
+ or (b) encapsulated in a new IP header whose destination is equal
+ to the target IP address.
+
+ 3. Faster removal of intermediate states:
+
+ A specific RSVP optimization allowing in some cases the faster
+ removal of intermediate states. This extension is used to deal
+ with specific RSVP mechanisms.
+
+7.13. Link Protection
+
+ Protection information is carried in the new optional Protection
+ Information Object/TLV. It currently indicates the desired link
+ protection for each link of an LSP. If a particular protection type,
+ i.e., 1+1, or 1:N, is requested, then a connection request is
+ processed only if the desired protection type can be honored. Note
+ that GMPLS advertises the protection capabilities of a link in the
+ routing protocols. Path computation algorithms may consider this
+ information when computing paths for setting up LSPs.
+
+ Protection information also indicates if the LSP is a primary or
+ secondary LSP. A secondary LSP is a backup to a primary LSP. The
+ resources of a secondary LSP are normally not used until the primary
+ LSP fails, but they may be used by other LSPs until the primary LSP
+ fails over the secondary LSP. At that point, any LSP that is using
+ the resources for the secondary LSP must be preempted.
+
+
+
+
+
+
+
+Mannie Standards Track [Page 38]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Six link protection types are currently defined as individual flags
+ and can be combined: enhanced, dedicated 1+1, dedicated 1:1, shared,
+ unprotected, extra traffic. See [RFC3471] section 7.1 for a precise
+ definition of each.
+
+7.14. Explicit Routing and Explicit Label Control
+
+ By using an explicit route, the path taken by an LSP can be
+ controlled more or less precisely. Typically, the node at the head-
+ end of an LSP finds an explicit route and builds an Explicit Route
+ Object (ERO)/ Explicit Route (ER) TLV that contains that route.
+ Possibly, the edge node does not build any explicit route, and just
+ transmit a signaling request to a default neighbor LSR (as IP/MPLS
+ hosts would). For instance, an explicit route could be added to a
+ signaling message by the first switching node, on behalf of the edge
+ node. Note also that an explicit route is altered by intermediate
+ LSRs during its progression towards the destination.
+
+ The explicit route is originally defined by MPLS-TE as a list of
+ abstract nodes (i.e., groups of nodes) along the explicit route.
+ Each abstract node can be an IPv4 address prefix, an IPv6 address
+ prefix, or an AS number. This capability allows the generator of the
+ explicit route to have incomplete information about the details of
+ the path. In the simplest case, an abstract node can be a full IP
+ address (32 bits) that identifies a specific node (called a simple
+ abstract node).
+
+ MPLS-TE allows strict and loose abstract nodes. The path between a
+ strict node and its preceding node must include only network nodes
+ from the strict node and its preceding abstract node. The path
+ between a loose node and its preceding abstract node may include
+ other network nodes that are not part of the loose node or its
+ preceding abstract node.
+
+ This explicit route was extended to include interface numbers as
+ abstract nodes to support unnumbered interfaces; and further extended
+ by GMPLS to include labels as abstract nodes. Having labels in an
+ explicit route is an important feature that allows controlling the
+ placement of an LSP with a very fine granularity. This is more
+ likely to be used for TDM, LSC and FSC links.
+
+ In particular, the explicit label control in the explicit route
+ allows terminating an LSP on a particular outgoing port of an egress
+ node. Indeed, a label sub-object/TLV must follow a sub-object/TLV
+ containing the IP address, or the interface identifier (in case of
+ unnumbered interface), associated with the link on which it is to be
+ used.
+
+
+
+
+Mannie Standards Track [Page 39]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ This can also be used when it is desirable to "splice" two LSPs
+ together, i.e., where the tail of the first LSP would be "spliced"
+ into the head of the second LSP.
+
+ When used together with an optimization algorithm, it can provide
+ very detailed explicit routes, including the label (timeslot) to use
+ on a link, in order to minimize the fragmentation of the SONET/SDH
+ multiplex on the corresponding interface.
+
+7.15. Route Recording
+
+ In order to improve the reliability and the manageability of the LSP
+ being established, the concept of the route recording was introduced
+ in RSVP-TE to function as:
+
+ - First, a loop detection mechanism to discover L3 routing loops, or
+ loops inherent in the explicit route (this mechanism is strictly
+ exclusive with the use of explicit routing objects).
+
+ - Second, a route recording mechanism collects up-to-date detailed
+ path information on a hop-by-hop basis during the LSP setup
+ process. This mechanism provides valuable information to the
+ source and destination nodes. Any intermediate routing change at
+ setup time, in case of loose explicit routing, will be reported.
+
+ - Third, a recorded route can be used as input for an explicit
+ route. This is useful if a source node receives the recorded
+ route from a destination node and applies it as an explicit route
+ in order to "pin down the path".
+
+ Within the GMPLS architecture, only the second and third functions
+ are mainly applicable for TDM, LSC and FSC layers.
+
+7.16. LSP Modification and LSP Re-routing
+
+ LSP modification and re-routing are two features already available in
+ MPLS-TE. GMPLS does not add anything new. Elegant re-routing is
+ possible with the concept of "make-before-break" whereby an old path
+ is still used while a new path is set up by avoiding double
+ reservation of resources. Then, the node performing the re-routing
+ can swap on the new path and close the old path. This feature is
+ supported with RSVP-TE (using shared explicit filters) and CR-LDP
+ (using the action indicator flag).
+
+ LSP modification consists in changing some LSP parameters, but
+ normally without changing the route. It is supported using the same
+ mechanism as re-routing. However, the semantic of LSP modification
+ will differ from one technology to the other. For instance, further
+
+
+
+Mannie Standards Track [Page 40]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ studies are required to understand the impact of dynamically changing
+ some SONET/SDH circuit characteristics such as the bandwidth, the
+ protection type, the transparency, the concatenation, etc.
+
+7.17. LSP Administrative Status Handling
+
+ GMPLS provides the optional capability to indicate the administrative
+ status of an LSP by using a new Admin Status object/TLV.
+ Administrative Status information is currently used in two ways.
+
+ In the first usage, the Admin Status object/TLV is carried in a
+ Path/Label Request or Resv/Label Mapping message to indicate the
+ administrative state of an LSP. In this usage, Administrative Status
+ information indicates the state of the LSP, which include "up" or
+ "down", if it in a "testing" mode, and if deletion is in progress.
+
+ Based on that administrative status, a node can take local decisions,
+ like inhibit alarm reporting when an LSP is in "down" or "testing"
+ states, or report alarms associated with the connection at a priority
+ equal to or less than "Non service affecting".
+
+ It is possible that some nodes along an LSP will not support the
+ Admin Status Object/TLV. In the case of a non-supporting transit
+ node, the object will pass through the node unmodified and normal
+ processing can continue.
+
+ In some circumstances, particularly optical networks, it is useful to
+ set the administrative status of an LSP to "being deleted" before
+ tearing it down in order to avoid non-useful generation of alarms.
+ The ingress LSR precedes an LSP deletion by inserting an appropriate
+ Admin Status Object/TLV in a Path/Label Request (with the
+ modification action indicator flag set to modify) message. Transit
+ LSRs process the Admin Status Object/TLV and forward it. The egress
+ LSR answers in a Resv/Label Mapping (with the modification action
+ indicator flag set to modify) message with the Admin Status object.
+ Upon receiving this message and object, the ingress node sends a
+ PathTear/Release message downstream to remove the LSP and normal
+ RSVP-TE/CR-LDP processing takes place.
+
+ In the second usage, the Admin Status object/TLV is carried in a
+ Notification/Label Mapping (with the modification action indicator
+ flag set to modify) message to request that the ingress node change
+ the administrative state of an LSP. This allows intermediate and
+ egress nodes triggering the setting of administrative status. In
+ particular, this allows intermediate or egress LSRs requesting a
+ release of an LSP initiated by the ingress node.
+
+
+
+
+
+Mannie Standards Track [Page 41]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+7.18. Control Channel Separation
+
+ In GMPLS, a control channel be separated from the data channel.
+ Indeed, the control channel can be implemented completely out-of-
+ band for various reason, e.g., when the data channel cannot carry
+ in-band control information. This issue was even originally
+ introduced to MPLS in the context of link bundling.
+
+ In traditional MPLS, there is an implicit one-to-one association of a
+ control channel to a data channel. When such an association is
+ present, no additional or special information is required to
+ associate a particular LSP setup transaction with a particular data
+ channel.
+
+ Otherwise, it is necessary to convey additional information in
+ signaling to identify the particular data channel being controlled.
+ GMPLS supports explicit data channel identification by providing
+ interface identification information. GMPLS allows the use of a
+ number of interface identification schemes including IPv4 or IPv6
+ addresses, interface indexes (for unnumbered interfaces) and
+ component interfaces (for bundled interfaces), unnumbered bundled
+ interfaces are also supported.
+
+ The choice of the data interface to use is always made by the sender
+ of the Path/Label Request message, and indicated by including the
+ data channel's interface identifier in the message using a new
+ RSVP_HOP object sub-type/Interface TLV.
+
+ For bi-directional LSPs, the sender chooses the data interface in
+ each direction. In all cases but bundling, the upstream interface is
+ implied by the downstream interface. For bundling, the Path/Label
+ Request sender explicitly identifies the component interface used in
+ each direction. The new object/TLV is used in Resv/Label Mapping
+ message to indicate the downstream node's usage of the indicated
+ interface(s).
+
+ The new object/TLV can contain a list of embedded TLVs, each embedded
+ TLV can be an IPv4 address, and IPv6 address, an interface index, a
+ downstream component interface ID or an upstream component interface
+ ID. In the last three cases, the embedded TLV contains itself an IP
+ address plus an Interface ID, the IP address being used to identify
+ the interface ID (it can be the router ID for instance).
+
+ There are cases where it is useful to indicate a specific interface
+ associated with an error. To support these cases the IF_ID
+ ERROR_SPEC RSVP Objects are defined.
+
+
+
+
+
+Mannie Standards Track [Page 42]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+8. Forwarding Adjacencies (FA)
+
+ To improve scalability of MPLS TE (and thus GMPLS) it may be useful
+ to aggregate multiple TE LSPs inside a bigger TE LSP. Intermediate
+ nodes see the external LSP only. They do not have to maintain
+ forwarding states for each internal LSP, less signaling messages need
+ to be exchanged and the external LSP can be somehow protected instead
+ (or in addition) to the internal LSPs. This can considerably
+ increase the scalability of the signaling.
+
+ The aggregation is accomplished by (a) an LSR creating a TE LSP, (b)
+ the LSR forming a forwarding adjacency out of that LSP (advertising
+ this LSP as a Traffic Engineering (TE) link into IS-IS/OSPF), (c)
+ allowing other LSRs to use forwarding adjacencies for their path
+ computation, and (d) nesting of LSPs originated by other LSRs into
+ that LSP (e.g., by using the label stack construct in the case of
+ IP).
+
+ ISIS/OSPF floods the information about "Forwarding Adjacencies" FAs
+ just as it floods the information about any other links. Consequently
+ to this flooding, an LSR has in its TE link state database the
+ information about not just conventional links, but FAs as well.
+
+ An LSR, when performing path computation, uses not just conventional
+ links, but FAs as well. Once a path is computed, the LSR uses RSVP-
+ TE/CR-LDP for establishing label binding along the path. FAs need
+ simple extensions to signaling and routing protocols.
+
+8.1. Routing and Forwarding Adjacencies
+
+ Forwarding adjacencies may be represented as either unnumbered or
+ numbered links. A FA can also be a bundle of LSPs between two nodes.
+
+ FAs are advertised as GMPLS TE links such as defined in [HIERARCHY].
+ GMPLS TE links are advertised in OSPF and IS-IS such as defined in
+ [OSPF-TE-GMPLS] and [ISIS-TE-GMPLS]. These last two specifications
+ enhance [OSPF-TE] and [ISIS-TE] that defines a base TE link.
+
+ When a FA is created dynamically, its TE attributes are inherited
+ from the FA-LSP that induced its creation. [HIERARCHY] specifies how
+ each TE parameter of the FA is inherited from the FA-LSP. Note that
+ the bandwidth of the FA must be at least as big as the FA-LSP that
+ induced it, but may be bigger if only discrete bandwidths are
+ available for the FA-LSP. In general, for dynamically provisioned
+ forwarding adjacencies, a policy-based mechanism may be needed to
+ associate attributes to forwarding adjacencies.
+
+
+
+
+
+Mannie Standards Track [Page 43]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ A FA advertisement could contain the information about the path taken
+ by the FA-LSP associated with that FA. Other LSRs may use this
+ information for path computation. This information is carried in a
+ new OSPF and IS-IS TLV called the Path TLV.
+
+ It is possible that the underlying path information might change over
+ time, via configuration updates, or dynamic route modifications,
+ resulting in the change of that TLV.
+
+ If forwarding adjacencies are bundled (via link bundling), and if the
+ resulting bundled link carries a Path TLV, the underlying path
+ followed by each of the FA-LSPs that form the component links must be
+ the same.
+
+ It is expected that forwarding adjacencies will not be used for
+ establishing IS-IS/OSPF peering relation between the routers at the
+ ends of the adjacency.
+
+ LSP hierarchy could exist both with the peer and with the overlay
+ models. With the peer model, the LSP hierarchy is realized via FAs
+ and an LSP is both created and used as a TE link by exactly the same
+ instance of the control plane. Creating LSP hierarchies with
+ overlays does not involve the concept of FA. With the overlay model
+ an LSP created (and maintained) by one instance of the GMPLS control
+ plane is used as a TE link by another instance of the GMPLS control
+ plane. Moreover, the nodes using a TE link are expected to have a
+ routing and signaling adjacency.
+
+8.2. Signaling Aspects
+
+ For the purpose of processing the explicit route in a Path/Request
+ message of an LSP that is to be tunneled over a forwarding adjacency,
+ an LSR at the head-end of the FA-LSP views the LSR at the tail of
+ that FA-LSP as adjacent (one IP hop away).
+
+8.3. Cascading of Forwarding Adjacencies
+
+ With an integrated model, several layers are controlled using the
+ same routing and signaling protocols. A network may then have links
+ with different multiplexing/demultiplexing capabilities. For
+ example, a node may be able to multiplex/demultiplex individual
+ packets on a given link, and may be able to multiplex/demultiplex
+ channels within a SONET payload on other links.
+
+ A new OSPF and IS-IS sub-TLV has been defined to advertise the
+ multiplexing capability of each interface: PSC, L2SC, TDM, LSC or
+ FSC. This sub-TLV is called the Interface Switching Capability
+ Descriptor sub-TLV, which complements the sub-TLVs defined in
+
+
+
+Mannie Standards Track [Page 44]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ [OSPF-TE-GMPLS] and [ISIS-TE-GMPLS]. The information carried in this
+ sub-TLV is used to construct LSP regions, and determine region's
+ boundaries.
+
+ Path computation may take into account region boundaries when
+ computing a path for an LSP. For example, path computation may
+ restrict the path taken by an LSP to only the links whose
+ multiplexing/demultiplexing capability is PSC. When an LSP need to
+ cross a region boundary, it can trigger the establishment of an FA at
+ the underlying layer (i.e., the L2SC layer). This can trigger a
+ cascading of FAs between layers with the following obvious order:
+ L2SC, then TDM, then LSC, and then finally FSC.
+
+9. Routing and Signaling Adjacencies
+
+ By definition, two nodes have a routing (IS-IS/OSPF) adjacency if
+ they are neighbors in the IS-IS/OSPF sense.
+
+ By definition, two nodes have a signaling (RSVP-TE/CR-LDP) adjacency
+ if they are neighbors in the RSVP-TE/CR-LDP sense. Nodes A and B are
+ RSVP-TE neighbors if they directly exchange RSVP-TE messages
+ (Path/Resv) (e.g., as described in sections 7.1.1 and 7.1.2 of
+ [HIERARCHY]). The neighbor relationship includes exchanging RSVP-TE
+ Hellos.
+
+ By definition, a Forwarding Adjacency (FA) is a TE Link between two
+ GMPLS nodes whose path transits one or more other (G)MPLS nodes in
+ the same instance of the (G)MPLS control plane. If two nodes have
+ one or more non-FA TE Links between them, these two nodes are
+ expected (although not required) to have a routing adjacency. If two
+ nodes do not have any non-FA TE Links between them, it is expected
+ (although not required) that these two nodes would not have a routing
+ adjacency. To state the obvious, if the TE links between two nodes
+ are to be used for establishing LSPs, the two nodes must have a
+ signaling adjacency.
+
+ If one wants to establish routing and/or signaling adjacency between
+ two nodes, there must be an IP path between them. This IP path can
+ be, for example, a TE Link with an interface switching capability of
+ PSC, anything that looks likes an IP link (e.g., GRE tunnel, or a
+ (bi-directional) LSP that with an interface switching capability of
+ PSC).
+
+ A TE link may not be capable of being used directly for maintaining
+ routing and/or signaling adjacencies. This is because GMPLS routing
+ and signaling adjacencies requires exchanging data on a per frame/
+ packet basis, and a TE link (e.g., a link between OXCs) may not be
+ capable of exchanging data on a per packet basis. In this case, the
+
+
+
+Mannie Standards Track [Page 45]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ routing and signaling adjacencies are maintained via a set of one or
+ more control channels (see [LMP]).
+
+ Two nodes may have a TE link between them even if they do not have a
+ routing adjacency. Naturally, each node must run OSPF/IS-IS with
+ GMPLS extensions in order for that TE link to be advertised. More
+ precisely, the node needs to run GMPLS extensions for TE Links with
+ an interface switching capability (see [GMPLS-ROUTING]) other than
+ PSC. Moreover, this node needs to run either GMPLS or MPLS
+ extensions for TE links with an interface switching capability of
+ PSC.
+
+ The mechanisms for Control Channel Separation [RFC3471] should be
+ used (even if the IP path between two nodes is a TE link). I.e.,
+ RSVP-TE/CR-LDP signaling should use the Interface_ID (IF_ID) object
+ to specify a particular TE link when establishing an LSP.
+
+ The IP path could consist of multiple IP hops. In this case, the
+ mechanisms of sections 7.1.1 and 7.1.2 of [HIERARCHY] should be used
+ (in addition to Control Channel Separation).
+
+10. Control Plane Fault Handling
+
+ Two major types of faults can impact a control plane. The first,
+ referred to as control channel fault, relates to the case where
+ control communication is lost between two neighboring nodes. If the
+ control channel is embedded with the data channel, data channel
+ recovery procedure should solve the problem. If the control channel
+ is independent of the data channel, additional procedures are
+ required to recover from that problem.
+
+ The second, referred to as nodal faults, relates to the case where
+ node loses its control state (e.g., after a restart) but does not
+ loose its data forwarding state.
+
+ In transport networks, such types of control plane faults should not
+ have service impact on the existing connections. Under such
+ circumstances, a mechanism must exist to detect a control
+ communication failure and a recovery procedure must guarantee
+ connection integrity at both ends of the control channel.
+
+ For a control channel fault, once communication is restored routing
+ protocols are naturally able to recover but the underlying signaling
+ protocols must indicate that the nodes have maintained their state
+ through the failure. The signaling protocol must also ensure that
+ any state changes that were instantiated during the failure are
+ synchronized between the nodes.
+
+
+
+
+Mannie Standards Track [Page 46]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ For a nodal fault, a node's control plane restarts and loses most of
+ its state information. In this case, both upstream and downstream
+ nodes must synchronize their state information with the restarted
+ node. In order for any resynchronization to occur the node
+ undergoing the restart will need to preserve some information, such
+ as it's mappings of incoming to outgoing labels.
+
+ These issues are addressed in protocol specific fashions, see
+ [RFC3473], [RFC3472], [OSPF-TE-GMPLS] and [ISIS-TE-GMPLS]. Note that
+ these cases only apply when there are mechanisms to detect data
+ channel failures independent of control channel failures.
+
+ The LDP Fault tolerance (see [RFC3479]) specifies the procedures to
+ recover from a control channel failure. [RFC3473] specifies how to
+ recover from both a control channel failure and a node failure.
+
+11. LSP Protection and Restoration
+
+ This section discusses Protection and Restoration (P&R) issues for
+ GMPLS LSPs. It is driven by the requirements outlined in [RFC3386]
+ and some of the principles outlined in [RFC3469]. It will be
+ enhanced, as more GMPLS P&R mechanisms are defined. The scope of
+ this section is clarified hereafter:
+
+ - This section is only applicable when a fault impacting LSP(s)
+ happens in the data/transport plane. Section 10 deals with
+ control plane fault handling for nodal and control channel faults.
+
+ - This section focuses on P&R at the TDM, LSC and FSC layers. There
+ are specific P&R requirements at these layers not present at the
+ PSC layer.
+
+ - This section focuses on intra-area P&R as opposed to inter-area
+ P&R and even inter-domain P&R. Note that P&R can even be more
+ restricted, e.g., to a collection of like customer equipment, or a
+ collection of equipment of like capabilities, in one single
+ routing area.
+
+ - This section focuses on intra-layer P&R (horizontal hierarchy as
+ defined in [RFC3386]) as opposed to the inter-layer P&R (vertical
+ hierarchy).
+
+ - P&R mechanisms are in general designed to handle single failures,
+ which makes SRLG diversity a necessity. Recovery from multiple
+ failures requires further study.
+
+ - Both mesh and ring-like topologies are supported.
+
+
+
+
+Mannie Standards Track [Page 47]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ In the following, we assume that:
+
+ - TDM, LSC and FSC devices are more generally committing recovery
+ resources in a non-best effort way. Recovery resources are either
+ allocated (thus used) or at least logically reserved (whether used
+ or not by preemptable extra traffic but unavailable anyway for
+ regular working traffic).
+
+ - Shared P&R mechanisms are valuable to operators in order to
+ maximize their network utilization.
+
+ - Sending preemptable excess traffic on recovery resources is a
+ valuable feature for operators.
+
+11.1. Protection Escalation across Domains and Layers
+
+ To describe the P&R architecture, one must consider two dimensions of
+ hierarchy [RFC3386]:
+
+ - A horizontal hierarchy consisting of multiple P&R domains, which
+ is important in an LSP based protection scheme. The scope of P&R
+ may extend over a link (or span), an administrative domain or
+ sub-network, an entire LSP.
+
+ An administrative domain may consist of a single P&R domain or as
+ a concatenation of several smaller P&R domains. The operator can
+ configure P&R domains, based on customers' requirements, and on
+ network topology and traffic engineering constraints.
+
+ - A vertical hierarchy consisting of multiple layers of P&R with
+ varying granularities (packet flows, STS trails, lightpaths,
+ fibers, etc).
+
+ In the absence of adequate P&R coordination, a fault may propagate
+ from one level to the next within a P&R hierarchy. It can lead to
+ "collisions" and simultaneous recovery actions may lead to race
+ conditions, reduced resource utilization, or instabilities
+ [MANCHESTER]. Thus, a consistent escalation strategy is needed to
+ coordinate recovery across domains and layers. The fact that
+ GMPLS can be used at different layers could simplify this
+ coordination.
+
+ There are two types of escalation strategies: bottom-up and top-
+ down. The bottom-up approach assumes that "lower-level" recovery
+ schemes are more expedient. Therefore we can inhibit or hold off
+
+
+
+
+
+
+Mannie Standards Track [Page 48]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ higher-level P&R. The Top-down approach attempts service P&R at
+ the higher levels before invoking "lower level" P&R. Higher-layer
+ P&R is service selective, and permits "per-CoS" or "per-LSP" re-
+ routing.
+
+ Service Level Agreements (SLAs) between network operators and their
+ clients are needed to determine the necessary time scales for P&R at
+ each layer and at each domain.
+
+11.2. Mapping of Services to P&R Resources
+
+ The choice of a P&R scheme is a tradeoff between network utilization
+ (cost) and service interruption time. In light of this tradeoff,
+ network service providers are expected to support a range of
+ different service offerings or service levels.
+
+ One can classify LSPs into one of a small set of service levels.
+ Among other things, these service levels define the reliability
+ characteristics of the LSP. The service level associated with a
+ given LSP is mapped to one or more P&R schemes during LSP
+ establishment. An advantage that mapping is that an LSP may use
+ different P&E schemes in different segments of a network (e.g., some
+ links may be span protected, whilst other segments of the LSP may
+ utilize ring protection). These details are likely to be service
+ provider specific.
+
+ An alternative to using service levels is for an application to
+ specify the set of specific P&R mechanisms to be used when
+ establishing the LSP. This allows greater flexibility in using
+ different mechanisms to meet the application requirements.
+
+ A differentiator between these service levels is service interruption
+ time in case of network failures, which is defined as the length of
+ time between when a failure occurs and when connectivity is re-
+ established. The choice of service level (or P&R scheme) should be
+ dictated by the service requirements of different applications.
+
+11.3. Classification of P&R Mechanism Characteristics
+
+ The following figure provides a classification of the possible
+ provisioning types of recovery LSPs, and of the levels of overbooking
+ that is possible for them.
+
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 49]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ +-Computed on +-Established +-Resources pre-
+ | demand | on demand | allocated
+ | | |
+ Recovery LSP | | |
+ Provisioning -+-Pre computed +-Pre established +-Resources allocated
+ on demand
+
+ +--- Dedicated (1:1, 1+1)
+ |
+ |
+ +--- Shared (1:N, Ring, Shared mesh)
+ |
+ Level of |
+ Overbooking ---+--- Best effort
+
+11.4. Different Stages in P&R
+
+ Recovery from a network fault or impairment takes place in several
+ stages as discussed in [RFC3469], including fault detection, fault
+ localization, notification, recovery (i.e., the P&R itself) and
+ reversion of traffic (i.e., returning the traffic to the original
+ working LSP or to a new one).
+
+ - Fault detection is technology and implementation dependent. In
+ general, failures are detected by lower layer mechanisms (e.g.,
+ SONET/SDH, Loss-of-Light (LOL)). When a node detects a failure,
+ an alarm may be passed up to a GMPLS entity, which will take
+ appropriate actions, or the alarm may be propagated at the lower
+ layer (e.g., SONET/SDH AIS).
+
+ - Fault localization can be done with the help of GMPLS, e.g., using
+ LMP for fault localization (see section 6.4).
+
+ - Fault notification can also be achieved through GMPLS, e.g., using
+ GMPLS RSVP-TE/CR-LDP notification (see section 7.12).
+
+ - This section focuses on the different mechanisms available for
+ recovery and reversion of traffic once fault detection,
+ localization and notification have taken place.
+
+11.5. Recovery Strategies
+
+ Network P&R techniques can be divided into Protection and
+ Restoration. In protection, resources between the protection
+ endpoints are established before failure, and connectivity after
+ failure is achieved simply by switching performed at the protection
+ end-points. In contrast, restoration uses signaling after failure to
+ allocate resources along the recovery path.
+
+
+
+Mannie Standards Track [Page 50]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ - Protection aims at extremely fast reaction times and may rely on
+ the use of overhead control fields for achieving end-point
+ coordination. Protection for SONET/SDH networks is described in
+ [ITUT-G.841] and [ANSI-T1.105]. Protection mechanisms can be
+ further classified by the level of redundancy and sharing.
+
+ - Restoration mechanisms rely on signaling protocols to coordinate
+ switching actions during recovery, and may involve simple re-
+ provisioning, i.e., signaling only at the time of recovery; or
+ pre-signaling, i.e., signaling prior to recovery.
+
+ In addition, P&R can be applied on a local or end-to-end basis. In
+ the local approach, P&R is focused on the local proximity of the
+ fault in order to reduce delay in restoring service. In the end-to-
+ end approach, the LSP originating and terminating nodes control
+ recovery.
+
+ Using these strategies, the following recovery mechanisms can be
+ defined.
+
+11.6. Recovery mechanisms: Protection schemes
+
+ Note that protection schemes are usually defined in technology
+ specific ways, but this does not preclude other solutions.
+
+ - 1+1 Link Protection: Two pre-provisioned resources are used in
+ parallel. For example, data is transmitted simultaneously on two
+ parallel links and a selector is used at the receiving node to
+ choose the best source (see also [GMPLS-FUNCT]).
+
+ - 1:N Link Protection: Working and protecting resources (N working,
+ 1 backup) are pre-provisioned. If a working resource fails, the
+ data is switched to the protecting resource, using a coordination
+ mechanism (e.g., in overhead bytes). More generally, N working
+ and M protecting resources can be assigned for M:N link protection
+ (see also [GMPLS-FUNCT]).
+
+ - Enhanced Protection: Various mechanisms such as protection rings
+ can be used to enhance the level of protection beyond single link
+ failures to include the ability to switch around a node failure or
+ multiple link failures within a span, based on a pre-established
+ topology of protection resources (note: no reference available at
+ publication time).
+
+ - 1+1 LSP Protection: Simultaneous data transmission on working and
+ protecting LSPs and tail-end selection can be applied (see also
+ [GMPLS-FUNCT]).
+
+
+
+
+Mannie Standards Track [Page 51]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+11.7. Recovery mechanisms: Restoration schemes
+
+ Thanks to the use of a distributed control plane like GMPLS,
+ restoration is possible in multiple of tenths of milliseconds. It is
+ much harder to achieve when only an NMS is used and can only be done
+ in that case in a multiple of seconds.
+
+ - End-to-end LSP restoration with re-provisioning: an end-to-end
+ restoration path is established after failure. The restoration
+ path may be dynamically calculated after failure, or pre-
+ calculated before failure (often during LSP establishment).
+ Importantly, no signaling is used along the restoration path
+ before failure, and no restoration bandwidth is reserved.
+ Consequently, there is no guarantee that a given restoration path
+ is available when a failure occurs. Thus, one may have to
+ crankback to search for an available path.
+
+ - End-to-end LSP restoration with pre-signaled recovery bandwidth
+ reservation and no label pre-selection: an end-to-end restoration
+ path is pre-calculated before failure and a signaling message is
+ sent along this pre-selected path to reserve bandwidth, but labels
+ are not selected (see also [GMPLS-FUNCT]).
+
+ The resources reserved on each link of a restoration path may be
+ shared across different working LSPs that are not expected to fail
+ simultaneously. Local node policies can be applied to define the
+ degree to which capacity is shared across independent failures.
+ Upon failure detection, LSP signaling is initiated along the
+ restoration path to select labels, and to initiate the appropriate
+ cross-connections.
+
+ - End-to-end LSP restoration with pre-signaled recovery bandwidth
+ reservation and label pre-selection: An end-to-end restoration
+ path is pre-calculated before failure and a signaling procedure is
+ initiated along this pre-selected path on which bandwidth is
+ reserved and labels are selected (see also [GMPLS-FUNCT]).
+
+ The resources reserved on each link may be shared across different
+ working LSPs that are not expected to fail simultaneously. In
+ networks based on TDM, LSC and FSC technology, LSP signaling is
+ used after failure detection to establish cross-connections at the
+ intermediate switches on the restoration path using the pre-
+ selected labels.
+
+ - Local LSP restoration: the above approaches can be applied on a
+ local basis rather than end-to-end, in order to reduce recovery
+ time (note: no reference available at publication time).
+
+
+
+
+Mannie Standards Track [Page 52]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+11.8. Schema Selection Criteria
+
+ This section discusses criteria that could be used by the operator in
+ order to make a choice among the various P&R mechanisms.
+
+ - Robustness: In general, the less pre-planning of the restoration
+ path, the more robust the restoration scheme is to a variety of
+ failures, provided that adequate resources are available.
+ Restoration schemes with pre-planned paths will not be able to
+ recover from network failures that simultaneously affect both the
+ working and restoration paths. Thus, these paths should ideally
+ be chosen to be as disjoint as possible (i.e., SRLG and node
+ disjoint), so that any single failure event will not affect both
+ paths. The risk of simultaneous failure of the two paths can be
+ reduced by recalculating the restoration path whenever a failure
+ occurs along it.
+
+ The pre-selection of a label gives less flexibility for multiple
+ failure scenarios than no label pre-selection. If failures occur
+ that affect two LSPs that are sharing a label at a common node
+ along their restoration routes, then only one of these LSPs can be
+ recovered, unless the label assignment is changed.
+
+ The robustness of a restoration scheme is also determined by the
+ amount of reserved restoration bandwidth - as the amount of
+ restoration bandwidth sharing increases (reserved bandwidth
+ decreases), the restoration scheme becomes less robust to
+ failures. Restoration schemes with pre-signaled bandwidth
+ reservation (with or without label pre-selection) can reserve
+ adequate bandwidth to ensure recovery from any specific set of
+ failure events, such as any single SRLG failure, any two SRLG
+ failures etc. Clearly, more restoration capacity is allocated if
+ a greater degree of failure recovery is required. Thus, the
+ degree to which the network is protected is determined by the
+ policy that defines the amount of reserved restoration bandwidth.
+
+ - Recovery time: In general, the more pre-planning of the
+ restoration route, the more rapid the P&R scheme. Protection
+ schemes generally recover faster than restoration schemes.
+ Restoration with pre-signaled bandwidth reservation are likely to
+ be (significantly) faster than path restoration with re-
+ provisioning, especially because of the elimination of any
+ crankback. Local restoration will generally be faster than end-
+ to-end schemes.
+
+
+
+
+
+
+
+Mannie Standards Track [Page 53]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Recovery time objectives for SONET/SDH protection switching (not
+ including time to detect failure) are specified in [ITUT-G.841] at
+ 50 ms, taking into account constraints on distance, number of
+ connections involved, and in the case of ring enhanced protection,
+ number of nodes in the ring.
+
+ Recovery time objectives for restoration mechanisms are being
+ defined through a separate effort [RFC3386].
+
+ - Resource Sharing: 1+1 and 1:N link and LSP protection require
+ dedicated recovery paths with limited ability to share resources:
+ 1+1 allows no sharing, 1:N allows some sharing of protection
+ resources and support of extra (pre-emptable) traffic.
+ Flexibility is limited because of topology restrictions, e.g.,
+ fixed ring topology for traditional enhanced protection schemes.
+
+ The degree to which restoration schemes allow sharing amongst
+ multiple independent failures is directly dictated by the size of
+ the restoration pool. In restoration schemes with re-
+ provisioning, a pool of restoration capacity can be defined from
+ which all restoration routes are selected after failure. Thus,
+ the degree of sharing is defined by the amount of available
+ restoration capacity. In restoration with pre-signaled bandwidth
+ reservation, the amount of reserved restoration capacity is
+ determined by the local bandwidth reservation policies. In all
+ restoration schemes, pre-emptable resources can use spare
+ restoration capacity when that capacity is not being used for
+ failure recovery.
+
+12. Network Management
+
+ Service Providers (SPs) use network management extensively to
+ configure, monitor or provision various devices in their network. It
+ is important to note that a SP's equipment may be distributed across
+ geographically separate sites thus making distributed management even
+ more important. The service provider should utilize an NMS system
+ and standard management protocols such as SNMP (see [RFC3410],
+ [RFC3411] and [RFC3416]) and the relevant MIB modules as standard
+ interfaces to configure, monitor and provision devices at various
+ locations. The service provider may also wish to use the command
+ line interface (CLI) provided by vendors with their devices. However,
+ this is not a standard or recommended solution because there is no
+ standard CLI language or interface, which results in N different CLIs
+ in a network with devices from N different vendors. In the context of
+ GMPLS, it is extremely important for standard interfaces to the SP's
+ devices (e.g., SNMP) to exist due to the nature of the technology
+ itself. Since GMPLS comprises many different layers of control-plane
+
+
+
+
+Mannie Standards Track [Page 54]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ and data-plane technology, it is important for management interfaces
+ in this area to be flexible enough to allow the manager to manage
+ GMPLS easily, and in a standard way.
+
+12.1. Network Management Systems (NMS)
+
+ The NMS system should maintain the collective information about each
+ device within the system. Note that the NMS system may actually be
+ comprised of several distributed applications (i.e., alarm
+ aggregators, configuration consoles, polling applications, etc.)
+ that collectively comprises the SP's NMS. In this way, it can make
+ provisioning and maintenance decisions with the full knowledge of the
+ entire SP's network. Configuration or provisioning information
+ (i.e., requests for new services) could be entered into the NMS and
+ subsequently distributed via SNMP to the remote devices. Thus,
+ making the SP's task of managing the network much more compact and
+ effortless rather than having to manage each device individually
+ (i.e., via CLI).
+
+ Security and access control can be achieved using the SNMPv3 User-
+ based Security Model (USM) [RFC3414] and the View-based Access
+ Control Model (VACM) [RFC3415]. This approach can be very
+ effectively used within a SP's network, since the SP has access to
+ and control over all devices within its domain. Standardized MIBs
+ will need to be developed before this approach can be used
+ ubiquitously to provision, configure and monitor devices in non-
+ heterogeneous networks or across SP's network boundaries.
+
+12.2. Management Information Base (MIB)
+
+ In the context of GMPLS, it is extremely important for standard
+ interfaces to devices to exist due to the nature of the technology
+ itself. Since GMPLS comprises many different layers of control-plane
+ technology, it is important for SNMP MIB modules in this area to be
+ flexible enough to allow the manager to manage the entire control
+ plane. This should be done using MIB modules that may cooperate
+ (i.e., coordinated row-creation on the agent) or through more
+ generalized MIB modules that aggregate some of the desired actions to
+ be taken and push those details down to the devices. It is important
+ to note that in certain circumstances, it may be necessary to
+ duplicate some small subset of manageable objects in new MIB modules
+ for management convenience. Control of some parts of GMPLS may also
+ be achieved using existing MIB interfaces (i.e., existing SONET MIB)
+ or using separate ones, which are yet to be defined. MIB modules may
+ have been previously defined in the IETF or ITU. Current MIB modules
+ may need to be extended to facilitate some of the new functionality
+
+
+
+
+
+Mannie Standards Track [Page 55]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ desired by GMPLS. In these cases, the working group should work on
+ new versions of these MIB modules so that these extensions can be
+ added.
+
+12.3. Tools
+
+ As in traditional networks, standard tools such as traceroute
+ [RFC1393] and ping [RFC2151] are needed for debugging and performance
+ monitoring of GMPLS networks, and mainly for the control plane
+ topology, that will mimic the data plane topology. Furthermore, such
+ tools provide network reachability information. The GMPLS control
+ protocols will need to expose certain pieces of information in order
+ for these tools to function properly and to provide information
+ germane to GMPLS. These tools should be made available via the CLI.
+ These tools should also be made available for remote invocation via
+ the SNMP interface [RFC2925].
+
+12.4. Fault Correlation between Multiple Layers
+
+ Due to the nature of GMPLS, and that potential layers may be involved
+ in the control and transmission of GMPLS data and control
+ information, it is required that a fault in one layer be passed to
+ the adjacent higher and lower layers to notify them of the fault.
+ However, due to nature of these many layers, it is possible and even
+ probable, that hundreds or even thousands of notifications may need
+ to transpire between layers. This is undesirable for several
+ reasons. First, these notifications will overwhelm the device.
+ Second, if the device(s) are programmed to emit SNMP Notifications
+ [RFC3417] then the large number of notifications the device may
+ attempt to emit may overwhelm the network with a storm of
+ notifications. Furthermore, even if the device emits the
+ notifications, the NMS that must process these notifications either
+ will be overwhelmed or will be processing redundant information. That
+ is, if 1000 interfaces at layer B are stacked above a single
+ interface below it at layer A, and the interface at A goes down, the
+ interfaces at layer B should not emit notifications. Instead, the
+ interface at layer A should emit a single notification. The NMS
+ receiving this notification should be able to correlate the fact that
+ this interface has many others stacked above it and take appropriate
+ action, if necessary.
+
+ Devices that support GMPLS should provide mechanisms for aggregating,
+ summarizing, enabling and disabling of inter-layer notifications for
+ the reasons described above. In the context of SNMP MIB modules, all
+ MIB modules that are used by GMPLS must provide enable/disable
+ objects for all notification objects. Furthermore, these MIBs must
+ also provide notification summarization objects or functionality (as
+ described above) as well. NMS systems and standard tools which
+
+
+
+Mannie Standards Track [Page 56]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ process notifications or keep track of the many layers on any given
+ devices must be capable of processing the vast amount of information
+ which may potentially be emitted by network devices running GMPLS at
+ any point in time.
+
+13. Security Considerations
+
+ GMPLS defines a control plane architecture for multiple technologies
+ and types of network elements. In general, since LSPs established
+ using GMPLS may carry high volumes of data and consume significant
+ network resources, security mechanisms are required to safeguard the
+ underlying network against attacks on the control plane and/or
+ unauthorized usage of data transport resources. The GMPLS control
+ plane should therefore include mechanisms that prevent or minimize
+ the risk of attackers being able to inject and/or snoop on control
+ traffic. These risks depend on the level of trust between nodes that
+ exchange GMPLS control messages, as well as the realization and
+ physical characteristics of the control channel. For example, an in-
+ band, in-fiber control channel over SONET/SDH overhead bytes is, in
+ general, considered less vulnerable than a control channel realized
+ over an out-of-band IP network.
+
+ Security mechanisms can provide authentication and confidentiality.
+ Authentication can provide origin verification, message integrity and
+ replay protection, while confidentiality ensures that a third party
+ cannot decipher the contents of a message. In situations where GMPLS
+ deployment requires primarily authentication, the respective
+ authentication mechanisms of the GMPLS component protocols may be
+ used (see [RFC2747], [RFC3036], [RFC2385] and [LMP]). Additionally,
+ the IPsec suite of protocols (see [RFC2402], [RFC2406] and [RFC2409])
+ may be used to provide authentication, confidentiality or both, for a
+ GMPLS control channel. IPsec thus offers the benefits of combined
+ protection for all GMPLS component protocols as well as key
+ management.
+
+ A related issue is that of the authorization of requests for
+ resources by GMPLS-capable nodes. Authorization determines whether a
+ given party, presumable already authenticated, has a right to access
+ the requested resources. This determination is typically a matter of
+ local policy control [RFC2753], for example by setting limits on the
+ total bandwidth available to some party in the presence of resource
+ contention. Such policies may become quite complex as the number of
+ users, types of resources and sophistication of authorization rules
+ increases.
+
+ After authenticating requests, control elements should match them
+ against the local authorization policy. These control elements must
+ be capable of making decisions based on the identity of the
+
+
+
+Mannie Standards Track [Page 57]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ requester, as verified cryptographically and/or topologically. For
+ example, decisions may depend on whether the interface through which
+ the request is made is an inter- or intra-domain one. The use of
+ appropriate local authorization policies may help in limiting the
+ impact of security breaches in remote parts of a network.
+
+ Finally, it should be noted that GMPLS itself introduces no new
+ security considerations to the current MPLS-TE signaling (RSVP-TE,
+ CR-LDP), routing protocols (OSPF-TE, IS-IS-TE) or network management
+ protocols (SNMP).
+
+14. Acknowledgements
+
+ This document is the work of numerous authors and consists of a
+ composition of a number of previous documents in this area.
+
+ Many thanks to Ben Mack-Crane (Tellabs) for all the useful SONET/SDH
+ discussions we had together. Thanks also to Pedro Falcao, Alexandre
+ Geyssens, Michael Moelants, Xavier Neerdaels, and Philippe Noel from
+ Ebone for their SONET/SDH and optical technical advice and support.
+ Finally, many thanks also to Krishna Mitra (Consultant), Curtis
+ Villamizar (Avici), Ron Bonica (WorldCom), and Bert Wijnen (Lucent)
+ for their revision effort on Section 12.
+
+15. References
+
+15.1. Normative References
+
+ [RFC3031] Rosen, E., Viswanathan, A., and R. Callon,
+ "Multiprotocol Label Switching Architecture",
+ RFC 3031, January 2001.
+
+ [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T.,
+ Srinivasan, V., and G. Swallow, "RSVP-TE:
+ Extensions to RSVP for LSP Tunnels", RFC 3209,
+ December 2001.
+
+ [RFC3212] Jamoussi, B., Andersson, L., Callon, R., Dantu,
+ R., Wu, L., Doolan, P., Worster, T., Feldman,
+ N., Fredette, A., Girish, M., Gray, E.,
+ Heinanen, J., Kilty, T., and A. Malis,
+ "Constraint-Based LSP Setup using LDP", RFC
+ 3212, January 2002.
+
+ [RFC3471] Berger, L., "Generalized Multi-Protocol Label
+ Switching (GMPLS) Signaling Functional
+ Description", RFC 3471, January 2003.
+
+
+
+
+Mannie Standards Track [Page 58]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ [RFC3472] Ashwood-Smith, P. and L. Berger, "Generalized
+ Multi-Protocol Label Switching (GMPLS)
+ Signaling Constraint-based Routed Label
+ Distribution Protocol (CR-LDP) Extensions", RFC
+ 3472, January 2003.
+
+ [RFC3473] Berger, L., "Generalized Multi-Protocol Label
+ Switching (GMPLS) Signaling Resource
+ ReserVation Protocol-Traffic Engineering
+ (RSVP-TE) Extensions", RFC 3473, January 2003.
+
+15.2. Informative References
+
+ [ANSI-T1.105] "Synchronous Optical Network (SONET): Basic
+ Description Including Multiplex Structure,
+ Rates, And Formats," ANSI T1.105, 2000.
+
+ [BUNDLE] Kompella, K., Rekhter, Y., and L. Berger, "Link
+ Bundling in MPLS Traffic Engineering", Work in
+ Progress.
+
+ [GMPLS-FUNCT] Lang, J.P., Ed. and B. Rajagopalan, Ed.,
+ "Generalized MPLS Recovery Functional
+ Specification", Work in Progress.
+
+ [GMPLS-G709] Papadimitriou, D., Ed., "GMPLS Signaling
+ Extensions for G.709 Optical Transport Networks
+ Control", Work in Progress.
+
+ [GMPLS-OVERLAY] Swallow, G., Drake, J., Ishimatsu, H., and Y.
+ Rekhter, "GMPLS UNI: RSVP Support for the
+ Overlay Model", Work in Progress.
+
+ [GMPLS-ROUTING] Kompella, K., Ed. and Y. Rekhter, Ed., "Routing
+ Extensions in Support of Generalized Multi-
+ Protocol Label Switching", Work in Progress.
+
+ [RFC3946] Mannie, E., Ed. and Papadimitriou D., Ed.,
+ "Generalized Multi-Protocol Label Switching
+ (GMPLS) Extensions for Synchronous Optical
+ Network (SONET) and Synchronous Digital
+ Hierarchy (SDH) Control", RFC 3946, October
+ 2004.
+
+ [HIERARCHY] Kompella, K. and Y. Rekhter, "LSP Hierarchy
+ with Generalized MPLS TE", Work in Progress.
+
+
+
+
+
+Mannie Standards Track [Page 59]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ [ISIS-TE] Smit, H. and T. Li, "Intermediate System to
+ Intermediate System (IS-IS) Extensions for
+ Traffic Engineering (TE)", RFC 3784, June 2004.
+
+ [ISIS-TE-GMPLS] Kompella, K., Ed. and Y. Rekhter, Ed., "IS-IS
+ Extensions in Support of Generalized Multi-
+ Protocol Label Switching", Work in Progress.
+
+ [ITUT-G.707] ITU-T, "Network Node Interface for the
+ Synchronous Digital Hierarchy", Recommendation
+ G.707, October 2000.
+
+ [ITUT-G.709] ITU-T, "Interface for the Optical Transport
+ Network (OTN)," Recommendation G.709 version
+ 1.0 (and Amendment 1), February 2001 (and
+ October 2001).
+
+ [ITUT-G.841] ITU-T, "Types and Characteristics of SDH
+ Network Protection Architectures,"
+ Recommendation G.841, October 1998.
+
+ [LMP] Lang, J., Ed., "Link Management Protocol
+ (LMP)", Work in Progress.
+
+ [LMP-WDM] Fredette, A., Ed. and J. Lang Ed., "Link
+ Management Protocol (LMP) for Dense Wavelength
+ Division Multiplexing (DWDM) Optical Line
+ Systems", Work in Progress.
+
+ [MANCHESTER] J. Manchester, P. Bonenfant and C. Newton, "The
+ Evolution of Transport Network Survivability,"
+ IEEE Communications Magazine, August 1999.
+
+ [OIF-UNI] The Optical Internetworking Forum, "User
+ Network Interface (UNI) 1.0 Signaling
+ Specification - Implementation Agreement OIF-
+ UNI-01.0," October 2001.
+
+ [OLI-REQ] Fredette, A., Ed., "Optical Link Interface
+ Requirements," Work in Progress.
+
+ [OSPF-TE-GMPLS] Kompella, K., Ed. and Y.
+ Rekhter, Ed., "OSPF Extensions in Support of
+ Generalized Multi-Protocol Label Switching",
+ Work in Progress.
+
+
+
+
+
+
+Mannie Standards Track [Page 60]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ [OSPF-TE] Katz, D., Kompella, K., and D. Yeung, "Traffic
+ Engineering (TE) Extensions to OSPF Version 2",
+ RFC 3630, September 2003.
+
+ [RFC1393] Malkin, G., "Traceroute Using an IP Option",
+ RFC 1393, January 1993.
+
+ [RFC2151] Kessler, G. and S. Shepard, "A Primer On
+ Internet and TCP/IP Tools and Utilities", RFC
+ 2151, June 1997.
+
+ [RFC2205] Braden, R., Zhang, L., Berson, S., Herzog, S.,
+ and S. Jamin, "Resource ReSerVation Protocol
+ (RSVP) -- Version 1 Functional Specification",
+ RFC 2205, September 1997.
+
+ [RFC2385] Heffernan, A., "Protection of BGP Sessions via
+ the TCP MD5 Signature Option", RFC 2385, August
+ 1998.
+
+ [RFC2402] Kent, S. and R. Atkinson, "IP Authentication
+ Header", RFC 2402, November 1998.
+
+ [RFC2406] Kent, S. and R. Atkinson, "IP Encapsulating
+ Security Payload (ESP)", RFC 2406, November
+ 1998.
+
+ [RFC2409] Harkins, D. and D. Carrel, "The Internet Key
+ Exchange (IKE)", RFC 2409, November 1998.
+
+ [RFC2702] Awduche, D., Malcolm, J.,
+ Agogbua, J., O'Dell, M., and J. McManus,
+ "Requirements for Traffic Engineering Over
+ MPLS", RFC 2702, September 1999.
+
+ [RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP
+ Cryptographic Authentication", RFC 2747,
+ January 2000.
+
+ [RFC2753] Yavatkar, R., Pendarakis, D., and R. Guerin, "A
+ Framework for Policy-based Admission Control",
+ RFC 2753, January 2000.
+
+ [RFC2925] White, K., "Definitions of Managed Objects for
+ Remote Ping, Traceroute, and Lookup
+ Operations", RFC 2925, September 2000.
+
+
+
+
+
+Mannie Standards Track [Page 61]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ [RFC3036] Andersson, L., Doolan, P., Feldman, N.,
+ Fredette, A., and B. Thomas, "LDP
+ Specification", RFC 3036, January 2001.
+
+ [RFC3386] Lai, W. and D. McDysan, "Network Hierarchy and
+ Multilayer Survivability", RFC 3386, November
+ 2002.
+
+ [RFC3410] Case, J., Mundy, R., Partain, D., and B.
+ Stewart, "Introduction and Applicability
+ Statements for Internet-Standard Management
+ Framework", RFC 3410, December 2002.
+
+ [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An
+ Architecture for Describing Simple Network
+ Management Protocol (SNMP) Management
+ Frameworks", STD 62, RFC 3411, December 2002.
+
+ [RFC3414] Blumenthal, U. and B. Wijnen, "User-based
+ Security Model (USM) for version 3 of the
+ Simple Network Management Protocol (SNMPv3)",
+ STD 62, RFC 3414, December 2002.
+
+ [RFC3415] Wijnen, B., Presuhn, R., and K. McCloghrie,
+ "View-based Access Control Model (VACM) for the
+ Simple Network Management Protocol (SNMP)", STD
+ 62, RFC 3415, December 2002.
+
+ [RFC3416] Presuhn, R., "Version 2 of the Protocol
+ Operations for the Simple Network Management
+ Protocol (SNMP)", STD 62, RFC 3416, December
+ 2002.
+
+ [RFC3417] Presuhn, R., "Transport Mappings for the Simple
+ Network Management Protocol (SNMP)", STD 62,
+ RFC 3417, December 2002.
+
+ [RFC3469] Sharma, V. and F. Hellstrand, "Framework for
+ Multi-Protocol Label Switching (MPLS)-based
+ Recovery", RFC 3469, February 2003.
+
+ [RFC3477] Kompella, K. and Y. Rekhter, "Signalling
+ Unnumbered Links in Resource ReSerVation
+ Protocol - Traffic Engineering (RSVP-TE)", RFC
+ 3477, January 2003.
+
+
+
+
+
+
+Mannie Standards Track [Page 62]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ [RFC3479] Farrel, A., "Fault Tolerance for the Label
+ Distribution Protocol (LDP)", RFC 3479,
+ February 2003.
+
+ [RFC3480] Kompella, K., Rekhter, Y., and A. Kullberg,
+ "Signalling Unnumbered Links in CR-LDP
+ (Constraint-Routing Label Distribution
+ Protocol)", RFC 3480, February 2003.
+
+ [SONET-SDH-GMPLS-FRM] Bernstein, G., Mannie, E., and V. Sharma,
+ "Framework for GMPLS-based Control of SDH/SONET
+ Networks", Work in Progress.
+
+16. Contributors
+
+ Peter Ashwood-Smith
+ Nortel
+ P.O. Box 3511 Station C,
+ Ottawa, ON K1Y 4H7, Canada
+
+ EMail: petera@nortelnetworks.com
+
+
+ Eric Mannie
+ Consult
+ Phone: +32 2 648-5023
+ Mobile: +32 (0)495-221775
+
+ EMail: eric_mannie@hotmail.com
+
+
+ Daniel O. Awduche
+ Consult
+
+ EMail: awduche@awduche.com
+
+
+ Thomas D. Nadeau
+ Cisco
+ 250 Apollo Drive
+ Chelmsford, MA 01824, USA
+
+ EMail: tnadeau@cisco.com
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 63]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Ayan Banerjee
+ Calient
+ 5853 Rue Ferrari
+ San Jose, CA 95138, USA
+
+ EMail: abanerjee@calient.net
+
+
+ Lyndon Ong
+ Ciena
+ 10480 Ridgeview Ct
+ Cupertino, CA 95014, USA
+
+ EMail: lyong@ciena.com
+
+
+ Debashis Basak
+ Accelight
+ 70 Abele Road, Bldg.1200
+ Bridgeville, PA 15017, USA
+
+ EMail: dbasak@accelight.com
+
+
+ Dimitri Papadimitriou
+ Alcatel
+ Francis Wellesplein, 1
+ B-2018 Antwerpen, Belgium
+
+ EMail: dimitri.papadimitriou@alcatel.be
+
+
+ Lou Berger
+ Movaz
+ 7926 Jones Branch Drive
+ MCLean VA, 22102, USA
+
+ EMail: lberger@movaz.com
+
+
+ Dimitrios Pendarakis
+ Tellium
+ 2 Crescent Place, P.O. Box 901
+ Oceanport, NJ 07757-0901, USA
+
+ EMail: dpendarakis@tellium.com
+
+
+
+
+
+Mannie Standards Track [Page 64]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Greg Bernstein
+ Grotto
+
+ EMail: gregb@grotto-networking.com
+
+
+ Bala Rajagopalan
+ Tellium
+ 2 Crescent Place, P.O. Box 901
+ Oceanport, NJ 07757-0901, USA
+
+ EMail: braja@tellium.com
+
+
+ Sudheer Dharanikota
+ Consult
+
+ EMail: sudheer@ieee.org
+
+
+ Yakov Rekhter
+ Juniper
+ 1194 N. Mathilda Ave.
+ Sunnyvale, CA 94089, USA
+
+ EMail: yakov@juniper.net
+
+
+ John Drake
+ Calient
+ 5853 Rue Ferrari
+ San Jose, CA 95138, USA
+
+ EMail: jdrake@calient.net
+
+
+ Debanjan Saha
+ Tellium
+ 2 Crescent Place
+ Oceanport, NJ 07757-0901, USA
+
+ EMail: dsaha@tellium.com
+
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 65]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Yanhe Fan
+ Axiowave
+ 200 Nickerson Road
+ Marlborough, MA 01752, USA
+
+ EMail: yfan@axiowave.com
+
+
+ Hal Sandick
+ Shepard M.S.
+ 2401 Dakota Street
+ Durham, NC 27705, USA
+
+ EMail: sandick@nc.rr.com
+
+
+ Don Fedyk
+ Nortel
+ 600 Technology Park Drive
+ Billerica, MA 01821, USA
+
+ EMail: dwfedyk@nortelnetworks.com
+
+
+ Vishal Sharma
+ Metanoia
+ 1600 Villa Street, Unit 352
+ Mountain View, CA 94041, USA
+
+ EMail: v.sharma@ieee.org
+
+ Gert Grammel
+ Alcatel
+ Lorenzstrasse, 10
+ 70435 Stuttgart, Germany
+
+ EMail: gert.grammel@alcatel.de
+
+
+ George Swallow
+ Cisco
+ 250 Apollo Drive
+ Chelmsford, MA 01824, USA
+
+ EMail: swallow@cisco.com
+
+
+
+
+
+
+Mannie Standards Track [Page 66]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Dan Guo
+ Turin
+ 1415 N. McDowell Blvd,
+ Petaluma, CA 95454, USA
+
+ EMail: dguo@turinnetworks.com
+
+
+ Z. Bo Tang
+ Tellium
+ 2 Crescent Place, P.O. Box 901
+ Oceanport, NJ 07757-0901, USA
+
+ EMail: btang@tellium.com
+
+
+ Kireeti Kompella
+ Juniper
+ 1194 N. Mathilda Ave.
+ Sunnyvale, CA 94089, USA
+
+ EMail: kireeti@juniper.net
+
+
+ Jennifer Yates
+ AT&T
+ 180 Park Avenue
+ Florham Park, NJ 07932, USA
+
+ EMail: jyates@research.att.com
+
+ Alan Kullberg
+ NetPlane
+ 888 Washington
+ St.Dedham, MA 02026, USA
+
+ EMail: akullber@netplane.com
+
+
+ George R. Young
+ Edgeflow
+ 329 March Road
+ Ottawa, Ontario, K2K 2E1, Canada
+
+ EMail: george.young@edgeflow.com
+
+
+
+
+
+
+Mannie Standards Track [Page 67]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+ Jonathan P. Lang
+ Rincon Networks
+
+ EMail: jplang@ieee.org
+
+
+ John Yu
+ Hammerhead Systems
+ 640 Clyde Court
+ Mountain View, CA 94043, USA
+
+ EMail: john@hammerheadsystems.com
+
+
+ Fong Liaw
+ Solas Research
+ Solas Research, LLC
+
+ EMail: fongliaw@yahoo.com
+
+
+ Alex Zinin
+ Alcatel
+ 1420 North McDowell Ave
+ Petaluma, CA 94954, USA
+
+ EMail: alex.zinin@alcatel.com
+
+17. Author's Address
+
+ Eric Mannie (Consultant)
+ Avenue de la Folle Chanson, 2
+ B-1050 Brussels, Belgium
+ Phone: +32 2 648-5023
+ Mobile: +32 (0)495-221775
+
+ EMail: eric_mannie@hotmail.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mannie Standards Track [Page 68]
+
+RFC 3945 GMPLS Architecture October 2004
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2004).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
+ REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
+ INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
+ IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed
+ to pertain to the implementation or use of the technology
+ described in this document or the extent to which any license
+ under such rights might or might not be available; nor does it
+ represent that it has made any independent effort to identify any
+ such rights. Information on the IETF's procedures with respect to
+ rights in IETF Documents can be found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use
+ of such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository
+ at http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention
+ any copyrights, patents or patent applications, or other
+ proprietary rights that may cover technology that may be required
+ to implement this standard. Please address the information to the
+ IETF at ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Mannie Standards Track [Page 69]
+