summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4427.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc4427.txt')
-rw-r--r--doc/rfc/rfc4427.txt1235
1 files changed, 1235 insertions, 0 deletions
diff --git a/doc/rfc/rfc4427.txt b/doc/rfc/rfc4427.txt
new file mode 100644
index 0000000..4e526aa
--- /dev/null
+++ b/doc/rfc/rfc4427.txt
@@ -0,0 +1,1235 @@
+
+
+
+
+
+
+Network Working Group E. Mannie, Ed.
+Request for Comments: 4427 Perceval
+Category: Informational D. Papadimitriou, Ed.
+ Alcatel
+ March 2006
+
+
+ Recovery (Protection and Restoration) Terminology
+ for Generalized Multi-Protocol Label Switching (GMPLS)
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2006).
+
+Abstract
+
+ This document defines a common terminology for Generalized Multi-
+ Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e.,
+ protection and restoration). The terminology is independent of the
+ underlying transport technologies covered by GMPLS.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 1]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Contributors ....................................................4
+ 3. Conventions Used in this Document ...............................5
+ 4. Recovery Terminology Common to Protection and Restoration .......5
+ 4.1. Working and Recovery LSP/Span ..............................6
+ 4.2. Traffic Types ..............................................6
+ 4.3. LSP/Span Protection and Restoration ........................6
+ 4.4. Recovery Scope .............................................7
+ 4.5. Recovery Domain ............................................8
+ 4.6. Recovery Types .............................................8
+ 4.7. Bridge Types ..............................................10
+ 4.8. Selector Types ............................................10
+ 4.9. Recovery GMPLS Nodes ......................................11
+ 4.10. Switch-over Mechanism ....................................11
+ 4.11. Reversion operations .....................................11
+ 4.12. Failure Reporting ........................................12
+ 4.13. External commands ........................................12
+ 4.14. Unidirectional versus Bi-Directional Recovery Switching ..13
+ 4.15. Full versus Partial Span Recovery Switching ..............14
+ 4.16. Recovery Schemes Related Time and Durations ..............14
+ 4.17. Impairment ...............................................15
+ 4.18. Recovery Ratio ...........................................15
+ 4.19. Hitless Protection Switch-over ...........................15
+ 4.20. Network Survivability ....................................15
+ 4.21. Survivable Network .......................................16
+ 4.22. Escalation ...............................................16
+ 5. Recovery Phases ................................................16
+ 5.1. Entities Involved During Recovery .........................17
+ 6. Protection Schemes .............................................17
+ 6.1. 1+1 Protection ............................................18
+ 6.2. 1:N (N >= 1) Protection ...................................18
+ 6.3. M:N (M, N > 1, N >= M) Protection .........................18
+ 6.4. Notes on Protection Schemes ...............................19
+ 7. Restoration Schemes ............................................19
+ 7.1. Pre-Planned LSP Restoration ...............................19
+ 7.1.1. Shared-Mesh Restoration ............................19
+ 7.2. LSP Restoration ...........................................20
+ 7.2.1. Hard LSP Restoration ...............................20
+ 7.2.2. Soft LSP Restoration ...............................20
+ 8. Security Considerations ........................................20
+ 9. References .....................................................20
+ 9.1. Normative References ......................................20
+ 9.2. Informative References ....................................20
+ 10. Acknowledgements ..............................................21
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 2]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+1. Introduction
+
+ This document defines a common terminology for Generalized Multi-
+ Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e.,
+ protection and restoration).
+
+ The terminology proposed in this document is independent of the
+ underlying transport technologies and borrows from the G.808.1 ITU-T
+ Recommendation [G.808.1] and from the G.841 ITU-T Recommendation
+ [G.841]. The restoration terminology and concepts have been gathered
+ from numerous sources including IETF documents.
+
+ In the context of this document, the term "recovery" denotes both
+ protection and restoration. The specific terms "protection" and
+ "restoration" will only be used when differentiation is required.
+
+ This document focuses on the terminology for the recovery of Label
+ Switched Paths (LSPs) controlled by a GMPLS control plane. The
+ proposed terminology applies to end-to-end, segment, and span (i.e.,
+ link) recovery. Note that the terminology for recovery of the
+ control plane itself is not in the scope of this document.
+
+ Protection and restoration of switched LSPs under tight time
+ constraints is a challenging problem. This is particularly relevant
+ to optical networks that consist of Time Division Multiplex (TDM)
+ and/or all-optical (photonic) cross-connects referred to as GMPLS
+ nodes (or simply nodes, or even sometimes "Label Switching Routers,
+ or LSRs") connected in a general topology [RFC3945].
+
+ Recovery typically involves the activation of a recovery (or
+ alternate) LSP when a failure is encountered in the working LSP.
+
+ A working or recovery LSP is characterized by an ingress interface,
+ an egress interface, and a set of intermediate nodes and spans
+ through which the LSP is routed. The working and recovery LSPs are
+ typically resource disjoint (e.g., node and/or span disjoint). This
+ ensures that a single failure will not affect both the working and
+ recovery LSPs.
+
+ A bi-directional span between neighboring nodes is usually realized
+ as a pair of unidirectional spans. Therefore, the end-to-end path
+ for a bi-directional LSP consists of a series of bi-directional
+ segments (i.e., Sub-Network Connections, or SNCs, in the ITU-T
+ terminology) between the source and destination nodes, traversing
+ intermediate nodes.
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 3]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+2. Contributors
+
+ This document is the result of a joint effort by the CCAMP Working
+ Group Protection and Restoration design team. The following are the
+ authors that contributed to the present document:
+
+ Deborah Brungard (AT&T)
+ Rm. D1-3C22 - 200 S. Laurel Ave.
+ Middletown, NJ 07748, USA
+
+ EMail: dbrungard@att.com
+
+
+ Sudheer Dharanikota
+
+ EMail: sudheer@ieee.org
+
+
+ Jonathan P. Lang (Sonos)
+ 506 Chapala Street
+ Santa Barbara, CA 93101, USA
+
+ EMail: jplang@ieee.org
+
+
+ Guangzhi Li (AT&T)
+ 180 Park Avenue,
+ Florham Park, NJ 07932, USA
+
+ EMail: gli@research.att.com
+
+
+ Eric Mannie
+ Perceval
+ Rue Tenbosch, 9
+ 1000 Brussels
+ Belgium
+
+ Phone: +32-2-6409194
+ EMail: eric.mannie@perceval.net
+
+
+ Dimitri Papadimitriou (Alcatel)
+ Francis Wellesplein, 1
+ B-2018 Antwerpen, Belgium
+
+ EMail: dimitri.papadimitriou@alcatel.be
+
+
+
+
+Mannie & Papadimitriou Informational [Page 4]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ Bala Rajagopalan
+ Microsoft India Development Center
+ Hyderabad, India
+
+ EMail: balar@microsoft.com
+
+
+ Yakov Rekhter (Juniper)
+ 1194 N. Mathilda Avenue
+ Sunnyvale, CA 94089, USA
+
+ EMail: yakov@juniper.net
+
+3. Conventions Used in this Document
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+4. Recovery Terminology Common to Protection and Restoration
+
+ This section defines the following general terms common to both
+ protection and restoration (i.e., recovery). In addition, most of
+ these terms apply to end-to-end, segment, and span LSP recovery.
+ Note that span recovery does not protect the nodes at each end of the
+ span, otherwise end-to-end or segment LSP recovery should be used.
+
+ The terminology and the definitions were originally taken from
+ [G.808.1]. However, for generalization, the following language,
+ which is not directly related to recovery, has been adapted to GMPLS
+ and the common IETF terminology:
+
+ An LSP is used as a generic term to designate either an SNC (Sub-
+ Network Connection) or an NC (Network Connection) in ITU-T
+ terminology. The ITU-T uses the term transport entity to designate
+ either a link, an SNC, or an NC. The term "Traffic" is used instead
+ of "Traffic Signal". The term protection or restoration "scheme" is
+ used instead of protection or restoration "architecture".
+
+ The reader is invited to read [G.841] and [G.808.1] for references to
+ SDH protection and Generic Protection Switching terminology,
+ respectively. Note that restoration is not in the scope of
+ [G.808.1].
+
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 5]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+4.1. Working and Recovery LSP/Span
+
+ A working LSP/span is an LSP/span transporting "normal" user traffic.
+ A recovery LSP/span is an LSP/span used to transport "normal" user
+ traffic when the working LSP/span fails. Additionally, the recovery
+ LSP/span may transport "extra" user traffic (i.e., pre-emptable
+ traffic) when normal traffic is carried over the working LSP/span.
+
+4.2. Traffic Types
+
+ The different types of traffic that can be transported over an
+ LSP/span, in the context of this document, are defined hereafter:
+
+ A. Normal traffic:
+
+ User traffic that may be protected by two alternative LSPs/spans (the
+ working and recovery LSPs/spans).
+
+ B. Extra traffic:
+
+ User traffic carried over recovery resources (e.g., a recovery
+ LSP/span) when these resources are not being used for the recovery of
+ normal traffic (i.e., when the recovery resources are in standby
+ mode). When the recovery resources are required to recover normal
+ traffic from the failed working LSP/span, the extra traffic is pre-
+ empted. Extra traffic is not protected by definition, but may be
+ restored. Moreover, extra traffic does not need to commence or be
+ terminated at the ends of the LSPs/spans that it uses.
+
+ C. Null traffic:
+
+ Traffic carried over the recovery LSP/span if it is not used to carry
+ normal or extra traffic. Null traffic can be any kind of traffic
+ that conforms to the signal structure of the specific layer, and it
+ is ignored (not selected) at the egress of the recovery LSP/span.
+
+4.3. LSP/Span Protection and Restoration
+
+ The following subtle distinction is generally made between the terms
+ "protection" and "restoration", even though these terms are often
+ used interchangeably [RFC3386].
+
+ The distinction between protection and restoration is made based on
+ the resource allocation done during the recovery LSP/span
+ establishment. The distinction between different types of
+ restoration is made based on the level of route computation,
+ signaling, and resource allocation during the restoration LSP/span
+ establishment.
+
+
+
+Mannie & Papadimitriou Informational [Page 6]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ A. LSP/Span Protection
+
+ LSP/span protection denotes the paradigm whereby one or more
+ dedicated protection LSP(s)/span(s) is/are fully established to
+ protect one or more working LSP(s)/span(s).
+
+ For a protection LSP, this implies that route computation took place,
+ that the LSP was fully signaled all the way, and that its resources
+ were fully selected (i.e., allocated) and cross-connected between the
+ ingress and egress nodes.
+
+ For a protection span, this implies that the span has been selected
+ and reserved for protection.
+
+ Indeed, it means that no signaling takes place to establish the
+ protection LSP/span when a failure occurs. However, various other
+ kinds of signaling may take place between the ingress and egress
+ nodes for fault notification, to synchronize their use of the
+ protection LSP/span, for reversion, etc.
+
+ B. LSP/Span Restoration
+
+ LSP/span restoration denotes the paradigm whereby some restoration
+ resources may be pre-computed, signaled, and selected a priori, but
+ not cross-connected to restore a working LSP/span. The complete
+ establishment of the restoration LSP/span occurs only after a failure
+ of the working LSP/span, and requires some additional signaling.
+
+ Both protection and restoration require signaling. Signaling to
+ establish the recovery resources and signaling associated with the
+ use of the recovery LSP(s)/span(s) are needed.
+
+4.4. Recovery Scope
+
+ Recovery can be applied at various levels throughout the network. An
+ LSP may be subject to local (span), segment, and/or end-to-end
+ recovery.
+
+ Local (span) recovery refers to the recovery of an LSP over a link
+ between two nodes.
+
+ End-to-end recovery refers to the recovery of an entire LSP from its
+ source (ingress node end-point) to its destination (egress node end-
+ point).
+
+ Segment recovery refers to the recovery over a portion of the network
+ of a segment LSP (i.e., an SNC in the ITU-T terminology) of an end-
+ to-end LSP. Such recovery protects against span and/or node failure
+
+
+
+Mannie & Papadimitriou Informational [Page 7]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ over a particular portion of the network that is traversed by an
+ end-to-end LSP.
+
+4.5. Recovery Domain
+
+ A recovery domain is defined as a set of nodes and spans, over which
+ one or more recovery schemes are provided. A recovery domain served
+ by one single recovery scheme is referred to as a "single recovery
+ domain", while a recovery domain served by multiple recovery schemes
+ is referred to as a "multi recovery domain".
+
+ The recovery operation is contained within the recovery domain. A
+ GMPLS recovery domain must be entirely contained within a GMPLS
+ domain. A GMPLS domain (defined as a set of nodes and spans
+ controlled by GMPLS) may contain multiple recovery domains.
+
+4.6. Recovery Types
+
+ The different recovery types can be classified depending on the
+ number of recovery LSPs/spans that are protecting a given number of
+ working LSPs/spans. The definitions given hereafter are from the
+ point of view of a working LSP/span that needs to be protected by a
+ recovery scheme.
+
+ A. 1+1 type: dedicated protection
+
+ One dedicated protection LSP/span protects exactly one working
+ LSP/span, and the normal traffic is permanently duplicated at the
+ ingress node on both the working and protection LSPs/spans. No extra
+ traffic can be carried over the protection LSP/span.
+
+ This type is applicable to LSP/span protection, but not to LSP/span
+ restoration.
+
+ B. 0:1 type: unprotected
+
+ No specific recovery LSP/span protects the working LSP/span.
+ However, the working LSP/span can potentially be restored through any
+ alternate available route/span, with or without any pre-computed
+ restoration route. Note that no resources are pre-established for
+ this recovery type.
+
+ This type is applicable to LSP/span restoration, but not to LSP/span
+ protection. Span restoration can be achieved, for instance, by
+ moving all the LSPs transported over a failed span to a dynamically
+ selected span.
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 8]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ C. 1:1 type: dedicated recovery with extra traffic
+
+ One specific recovery LSP/span protects exactly one specific working
+ LSP/span, but the normal traffic is transmitted over only one LSP
+ (working or recovery) at a time. Extra traffic can be transported
+ using the recovery LSP/span resources.
+
+ This type is applicable to LSP/span protection and LSP restoration,
+ but not to span restoration.
+
+ D. 1:N (N > 1) type: shared recovery with extra traffic
+
+ A specific recovery LSP/span is dedicated to the protection of up to
+ N working LSPs/spans. The set of working LSPs/spans is explicitly
+ identified. Extra traffic can be transported over the recovery
+ LSP/span. All these LSPs/spans must start and end at the same nodes.
+
+ Sometimes, the working LSPs/spans are assumed to be resource disjoint
+ in the network so that they do not share any failure probability, but
+ this is not mandatory. Obviously, if more than one working LSP/span
+ in the set of N are affected by some failure(s) at the same time, the
+ traffic on only one of these failed LSPs/spans may be recovered over
+ the recovery LSP/span. Note that N can be arbitrarily large (i.e.,
+ infinite). The choice of N is a policy decision.
+
+ This type is applicable to LSP/span protection and LSP restoration,
+ but not to span restoration.
+
+ Note: a shared recovery where each recovery resource can be shared by
+ a maximum of X LSPs/spans is not defined as a recovery type but as a
+ recovery scheme. The choice of X is a network resource management
+ policy decision.
+
+ E. M:N (M, N > 1, N >= M) type:
+
+ A set of M specific recovery LSPs/spans protects a set of up to N
+ specific working LSPs/spans. The two sets are explicitly identified.
+ Extra traffic can be transported over the M recovery LSPs/spans when
+ available. All the LSPs/spans must start and end at the same nodes.
+
+ Sometimes, the working LSPs/spans are assumed to be resource disjoint
+ in the network so that they do not share any failure probability, but
+ this is not mandatory. Obviously, if several working LSPs/spans in
+ the set of N are concurrently affected by some failure(s), the
+ traffic on only M of these failed LSPs/spans may be recovered. Note
+ that N can be arbitrarily large (i.e., infinite). The choice of N
+ and M is a policy decision.
+
+
+
+
+Mannie & Papadimitriou Informational [Page 9]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ This type is applicable to LSP/span protection and LSP restoration,
+ but not to span restoration.
+
+4.7. Bridge Types
+
+ A bridge is the function that connects the normal traffic and extra
+ traffic to the working and recovery LSP/span.
+
+ A. Permanent bridge
+
+ Under a 1+1 type, the bridge connects the normal traffic to both the
+ working and protection LSPs/spans. This type of bridge is not
+ applicable to restoration types. There is, of course, no extra
+ traffic connected to the recovery LSP/span.
+
+ B. Broadcast bridge
+
+ For 1:N and M:N types, the bridge permanently connects the normal
+ traffic to the working LSP/span. In the event of recovery switching,
+ the normal traffic is additionally connected to the recovery
+ LSP/span. Extra traffic is either not connected or connected to the
+ recovery LSP/span.
+
+ C. Selector bridge
+
+ For 1:N and M:N types, the bridge connects the normal traffic to
+ either the working or the recovery LSP/span. Extra traffic is either
+ not connected or connected to the recovery LSP/span.
+
+4.8. Selector Types
+
+ A selector is the function that extracts the normal traffic from
+ either the working or the recovery LSP/span. Extra traffic is either
+ extracted from the recovery LSP/span, or is not extracted.
+
+ A. Selective selector
+
+ Is a selector that extracts the normal traffic from either the
+ working LSP/span output or the recovery LSP/span output.
+
+ B. Merging selector
+
+ For 1:N and M:N protection types, the selector permanently extracts
+ the normal traffic from both the working and recovery LSP/span
+
+ outputs. This alternative works only in combination with a selector
+ bridge.
+
+
+
+
+Mannie & Papadimitriou Informational [Page 10]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+4.9. Recovery GMPLS Nodes
+
+ This section defines the GMPLS nodes involved during recovery.
+
+ A. Ingress GMPLS node of an end-to-end LSP/segment LSP/span
+
+ The ingress node of an end-to-end LSP/segment LSP/span is where the
+ normal traffic may be bridged to the recovery end-to-end LSP/segment
+ LSP/span. Also known as source node in the ITU-T terminology.
+
+ B. Egress GMPLS node of an end-to-end LSP/segment LSP/span
+
+ The egress node of an end-to-end LSP/segment LSP/span is where the
+ normal traffic may be selected from either the working or the
+ recovery end-to-end LSP/segment LSP/span. Also known as sink node in
+ the ITU-T terminology.
+
+ C. Intermediate GMPLS node of an end-to-end LSP/segment LSP
+
+ A node along either the working or recovery end-to-end LSP/segment
+ LSP route between the corresponding ingress and egress nodes. Also
+ known as intermediate node in the ITU-T terminology.
+
+4.10. Switch-over Mechanism
+
+ A switch-over is an action that can be performed at both the bridge
+ and the selector. This action is as follows:
+
+ A. For the selector:
+
+ The action of selecting normal traffic from the recovery LSP/span
+ rather than from the working LSP/span.
+
+ B. For the bridge:
+
+ In case of permanent connection to the working LSP/span, the action
+ of connecting or disconnecting the normal traffic to or from the
+ recovery LSP/span. In case of non-permanent connection to the
+ working LSP/span, the action of connecting the normal traffic to the
+ recovery LSP/span.
+
+4.11. Reversion operations
+
+ A revertive recovery operation refers to a recovery switching
+ operation, where the traffic returns to (or remains on) the working
+ LSP/span when the switch-over requests are terminated (i.e., when the
+ working LSP/span has recovered from the failure).
+
+
+
+
+Mannie & Papadimitriou Informational [Page 11]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ Therefore, a non-revertive recovery switching operation is when the
+ traffic does not return to the working LSP/span when the switch-over
+ requests are terminated.
+
+4.12. Failure Reporting
+
+ This section gives (for information) several signal types commonly
+ used in transport planes to report a failure condition. Note that
+ fault reporting may require additional signaling mechanisms.
+
+ A. Signal Degrade (SD): a signal indicating that the associated data
+ has degraded.
+
+ B. Signal Fail (SF): a signal indicating that the associated data has
+ failed.
+
+ C. Signal Degrade Group (SDG): a signal indicating that the
+ associated group data has degraded.
+
+ D. Signal Fail Group (SFG): a signal indicating that the associated
+ group has failed.
+
+ Note: SDG and SFG definitions are under discussion at the ITU-T.
+
+4.13. External commands
+
+ This section defines several external commands, typically issued by
+ an operator through the Network Management System (NMS)/Element
+ Management System (EMS), that can be used to influence or command the
+ recovery schemes.
+
+ A. Lockout of recovery LSP/span:
+
+ A configuration action, initiated externally, that results in the
+ recovery LSP/span being temporarily unavailable to transport traffic
+ (either normal or extra traffic).
+
+ B. Lockout of normal traffic:
+
+ A configuration action, initiated externally, that results in the
+ normal traffic being temporarily not allowed to be routed over its
+ recovery LSP/span. Note that in this case extra-traffic is still
+ allowed on the recovery LSP/span.
+
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 12]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ C. Freeze:
+
+ A configuration action, initiated externally, that prevents any
+ switch-over action from being taken, and, as such, freezes the
+ current state.
+
+ D. Forced switch-over for normal traffic:
+
+ A switch-over action, initiated externally, that switches normal
+ traffic to the recovery LSP/span, unless an equal or higher priority
+ switch-over command is in effect.
+
+ E. Manual switch-over for normal traffic:
+
+ A switch-over action, initiated externally, that switches normal
+ traffic to the recovery LSP/span, unless a fault condition exists on
+ other LSPs/spans (including the recovery LSP/span) or an equal or
+ higher priority switch-over command is in effect.
+
+ F. Manual switch-over for recovery LSP/span:
+
+ A switch-over action, initiated externally, that switches normal
+ traffic to the working LSP/span, unless a fault condition exists on
+ the working LSP/span or an equal or higher priority switch-over
+ command is in effect.
+
+ G. Clear:
+
+ An action, initiated externally, that clears the active external
+ command.
+
+4.14. Unidirectional versus Bi-Directional Recovery Switching
+
+ A. Unidirectional recovery switching:
+
+ A recovery switching mode in which, for a unidirectional fault (i.e.,
+ a fault affecting only one direction of transmission), only the
+ normal traffic transported in the affected direction (of the LSP or
+ span) is switched to the recovery LSP/span.
+
+ B. Bi-directional recovery switching:
+
+ A recovery switching mode in which, for a unidirectional fault, the
+ normal traffic in both directions (of the LSP or span), including the
+ affected direction and the unaffected direction, are switched to the
+ recovery LSP/span.
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 13]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+4.15. Full versus Partial Span Recovery Switching
+
+ Bulk LSP recovery is initiated upon reception of either span failure
+ notification or bulk failure notification of the S LSPs carried by
+ this span. In either case, the corresponding recovery switching
+ actions are performed at the LSP level, such that the ratio between
+ the number of recovery switching messages and the number of recovered
+ LSP (in one given direction) is minimized. If this ratio equals 1,
+ one refers to full span recovery; otherwise, if this ratio is greater
+ than 1, one refers to partial span recovery.
+
+ A. Full Span Recovery
+
+ All the S LSP carried over a given span are recovered under span
+ failure condition. Full span recovery is also referred to as "bulk
+ recovery".
+
+ B. Partial Span Recovery
+
+ Only a subset s of the S LSP carried over a given span is recovered
+ under span failure condition. Both selection criteria of the
+ entities belonging to this subset, and the decision concerning the
+ recovery of the remaining (S - s) LSP, are based on local policy.
+
+4.16. Recovery Schemes Related Time and Durations
+
+ This section gives several typical timing definitions that are of
+ importance for recovery schemes.
+
+ A. Detection time:
+
+ The time between the occurrence of the fault or degradation and its
+ detection. Note that this is a rather theoretical time because, in
+ practice, this is difficult to measure.
+
+ B. Correlation time:
+
+ The time between the detection of the fault or degradation and the
+ reporting of the signal fail or degrade. This time is typically used
+ in correlating related failures or degradations.
+
+ C. Notification time:
+
+ The time between the reporting of the signal fail or degrade and the
+ reception of the indication of this event by the entities that decide
+ on the recovery switching operation(s).
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 14]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ D. Recovery Switching time:
+
+ The time between the initialization of the recovery switching
+ operation and the moment the normal traffic is selected from the
+ recovery LSP/span.
+
+ E. Total Recovery time:
+
+ The total recovery time is defined as the sum of the detection, the
+ correlation, the notification, and the recovery switching time.
+
+ F. Wait To Restore time:
+
+ A period of time that must elapse after a recovered fault before an
+ LSP/span can be used again to transport the normal traffic and/or to
+ select the normal traffic from.
+
+ Note: the hold-off time is defined as the time between the reporting
+ of signal fail or degrade, and the initialization of the recovery
+ switching operation. This is useful when multiple layers of recovery
+ are being used.
+
+4.17. Impairment
+
+ A defect or performance degradation, which may lead to SF or SD
+ trigger.
+
+4.18. Recovery Ratio
+
+ The quotient of the actual recovery bandwidth divided by the traffic
+ bandwidth that is intended to be protected.
+
+4.19. Hitless Protection Switch-over
+
+ Protection switch-over, which does not cause data loss, data
+ duplication, data disorder, or bit errors upon recovery switching
+ action.
+
+4.20. Network Survivability
+
+ The set of capabilities that allows a network to restore affected
+ traffic in the event of a failure. The degree of survivability is
+ determined by the network's capability to survive single and multiple
+ failures.
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 15]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+4.21. Survivable Network
+
+ A network that is capable of restoring traffic in the event of a
+ failure.
+
+4.22. Escalation
+
+ A network survivability action caused by the impossibility of the
+ survivability function in lower layers.
+
+5. Recovery Phases
+
+ It is commonly accepted that recovery implies that the following
+ generic operations need to be performed when an LSP/span or a node
+ failure occurs:
+
+ - Phase 1: Failure Detection
+
+ The action of detecting the impairment (defect of performance
+ degradation) as a defect condition and the consequential activation
+ of SF or SD trigger to the control plane (through internal interface
+ with the transport plane). Thus, failure detection (which should
+ occur at the transport layer closest to the failure) is the only
+ phase that cannot be achieved by the control plane alone.
+
+ - Phase 2: Failure Localization (and Isolation)
+
+ Failure localization provides, to the deciding entity, information
+ about the location (and thus the identity) of the transport plane
+ entity that causes the LSP(s)/span(s) failure. The deciding entity
+ can then make an accurate decision to achieve finer grained recovery
+ switching action(s).
+
+ - Phase 3: Failure Notification
+
+ Failure notification phase is used 1) to inform intermediate nodes
+ that LSP(s)/span(s) failure has occurred and has been detected and 2)
+ to inform the recovery deciding entities (which can correspond to any
+ intermediate or end-point of the failed LSP/span) that the
+ corresponding LSP/span is not available.
+
+ - Phase 4: Recovery (Protection or Restoration)
+
+ See Section 4.3.
+
+ - Phase 5: Reversion (Normalization)
+
+ See Section 4.11.
+
+
+
+Mannie & Papadimitriou Informational [Page 16]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ The combination of Failure Detection and Failure Localization and
+ Notification is referred to as Fault Management.
+
+5.1. Entities Involved During Recovery
+
+ The entities involved during the recovery operations can be defined
+ as follows; these entities are parts of ingress, egress, and
+ intermediate nodes, as defined previously:
+
+ A. Detecting Entity (Failure Detection):
+
+ An entity that detects a failure or group of failures; thus providing
+ a non-correlated list of failures.
+
+ B. Reporting Entity (Failure Correlation and Notification):
+
+ An entity that can make an intelligent decision on fault correlation
+ and report the failure to the deciding entity. Fault reporting can
+ be automatically performed by the deciding entity detecting the
+ failure.
+
+ C. Deciding Entity (part of the failure recovery decision process):
+
+ An entity that makes the recovery decision or selects the recovery
+ resources. This entity communicates the decision to the impacted
+ LSPs/spans with the recovery actions to be performed.
+
+ D. Recovering Entity (part of the failure recovery activation
+ process):
+
+ An entity that participates in the recovery of the LSPs/spans.
+
+ The process of moving failed LSPs from a failed (working) span to a
+ protection span must be initiated by one of the nodes that terminates
+ the span, e.g., A or B. The deciding (and recovering) entity is
+ referred to as the "master", while the other node is called the
+ "slave" and corresponds to a recovering only entity.
+
+ Note: The determination of the master and the slave may be based on
+ configured information or protocol-specific requirements.
+
+6. Protection Schemes
+
+ This section clarifies the multiple possible protection schemes and
+ the specific terminology for the protection.
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 17]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+6.1. 1+1 Protection
+
+ 1+1 protection has one working LSP/span, one protection LSP/span, and
+ a permanent bridge. At the ingress node, the normal traffic is
+ permanently bridged to both the working and protection LSP/span. At
+ the egress node, the normal traffic is selected from the better of
+ the two LSPs/spans.
+
+ Due to the permanent bridging, the 1+1 protection does not allow an
+ unprotected extra traffic signal to be provided.
+
+6.2. 1:N (N >= 1) Protection
+
+ 1:N protection has N working LSPs/spans that carry normal traffic and
+ 1 protection LSP/span that may carry extra-traffic.
+
+ At the ingress, the normal traffic is either permanently connected to
+ its working LSP/span and may be connected to the protection LSP/span
+ (case of broadcast bridge), or is connected to either its working
+ LSP/span or the protection LSP/span (case of selector bridge). At
+ the egress node, the normal traffic is selected from either its
+ working or protection LSP/span.
+
+ Unprotected extra traffic can be transported over the protection
+ LSP/span whenever the protection LSP/span is not used to carry a
+ normal traffic.
+
+6.3. M:N (M, N > 1, N >= M) Protection
+
+ M:N protection has N working LSPs/spans carrying normal traffic and M
+ protection LSP/span that may carry extra-traffic.
+
+ At the ingress, the normal traffic is either permanently connected to
+ its working LSP/span and may be connected to one of the protection
+ LSPs/spans (case of broadcast bridge), or is connected to either its
+ working LSP/span or one of the protection LSPs/spans (case of
+ selector bridge). At the egress node, the normal traffic is selected
+ from either its working or one of the protection LSP/span.
+
+ Unprotected extra traffic can be transported over the M protection
+ LSP/span whenever the protection LSPs/spans is not used to carry a
+ normal traffic.
+
+
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 18]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+6.4. Notes on Protection Schemes
+
+ All protection types are either uni- or bi-directional; obviously,
+ the latter applies only to bi-directional LSPs/spans and requires
+ coordination between the ingress and egress node during protection
+ switching.
+
+ All protection types except 1+1 unidirectional protection switching
+ require a communication channel between the ingress and the egress
+ node.
+
+ In the GMPLS context, span protection refers to the full or partial
+ span recovery of the LSPs carried over that span (see Section 4.15).
+
+7. Restoration Schemes
+
+ This section clarifies the multiple possible restoration schemes and
+ the specific terminology for the restoration.
+
+7.1. Pre-Planned LSP Restoration
+
+ Also referred to as pre-planned LSP re-routing. Before failure
+ detection and/or notification, one or more restoration LSPs are
+ instantiated between the same ingress-egress node pair as the working
+ LSP. Note that the restoration resources must be pre-computed, must
+ be signaled, and may be selected a priori, but may not cross-
+ connected. Thus, the restoration LSP is not able to carry any
+ extra-traffic.
+
+ The complete establishment of the restoration LSP (i.e., activation)
+ occurs only after failure detection and/or notification of the
+ working LSP and requires some additional restoration signaling.
+ Therefore, this mechanism protects against working LSP failure(s) but
+ requires activation of the restoration LSP after failure occurrence.
+ After the ingress node has activated the restoration LSP, the latter
+ can carry the normal traffic.
+
+ Note: when each working LSP is recoverable by exactly one restoration
+ LSP, one refers also to 1:1 (pre-planned) re-routing without extra-
+ traffic.
+
+7.1.1. Shared-Mesh Restoration
+
+ "Shared-mesh" restoration is defined as a particular case of pre-
+ planned LSP re-routing that reduces the restoration resource
+ requirements by allowing multiple restoration LSPs (initiated from
+ distinct ingress nodes) to share common resources (including links
+ and nodes.)
+
+
+
+Mannie & Papadimitriou Informational [Page 19]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+7.2. LSP Restoration
+
+ Also referred to as LSP re-routing. The ingress node switches the
+ normal traffic to an alternate LSP that is signaled and fully
+ established (i.e., cross-connected) after failure detection and/or
+ notification. The alternate LSP path may be computed after failure
+ detection and/or notification. In this case, one also refers to
+ "Full LSP Re-routing."
+
+ The alternate LSP is signaled from the ingress node and may reuse the
+ intermediate node's resources of the working LSP under failure
+ condition (and may also include additional intermediate nodes.)
+
+7.2.1. Hard LSP Restoration
+
+ Also referred to as hard LSP re-routing. A re-routing operation
+ where the LSP is released before the full establishment of an
+ alternate LSP (i.e., break-before-make).
+
+7.2.2. Soft LSP Restoration
+
+ Also referred to as soft LSP re-routing. A re-routing operation
+ where the LSP is released after the full establishment of an
+ alternate LSP (i.e., make-before-break).
+
+8. Security Considerations
+
+ Security considerations are detailed in [RFC4428] and [RFC4426].
+
+9. References
+
+9.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+9.2. Informative References
+
+ [RFC3386] Lai, W. and D. McDysan, "Network Hierarchy and
+ Multilayer Survivability", RFC 3386, November 2002.
+
+ [RFC3945] Mannie, E., "Generalized Multi-Protocol Label Switching
+ (GMPLS) Architecture", RFC 3945, October 2004.
+
+ [RFC4426] Lang, J., Rajagopalan B., and D.Papadimitriou, Editors,
+ "Generalized Multiprotocol Label Switching (GMPLS)
+ Recovery Functional Specification", RFC 4426, March
+ 2006.
+
+
+
+Mannie & Papadimitriou Informational [Page 20]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+ [RFC4428] Papadimitriou D. and E.Mannie, Editors, "Analysis of
+ Generalized Multi-Protocol Label Switching (GMPLS)-based
+ Recovery Mechanisms (including Protection and
+ Restoration)", RFC 4428, March 2006.
+
+ For information on the availability of the following documents,
+ please see http://www.itu.int
+
+ [G.808.1] ITU-T, "Generic Protection Switching - Linear trail and
+ subnetwork protection," Recommendation G.808.1, December
+ 2003.
+
+ [G.841] ITU-T, "Types and Characteristics of SDH Network
+ Protection Architectures," Recommendation G.841, October
+ 1998.
+
+10. Acknowledgements
+
+ Many thanks to Adrian Farrel for having thoroughly review this
+ document.
+
+Editors' Addresses
+
+ Eric Mannie
+ Perceval
+ Rue Tenbosch, 9
+ 1000 Brussels
+ Belgium
+
+ Phone: +32-2-6409194
+ EMail: eric.mannie@perceval.net
+
+
+ Dimitri Papadimitriou
+ Alcatel
+ Francis Wellesplein, 1
+ B-2018 Antwerpen, Belgium
+
+ Phone: +32 3 240-8491
+ EMail: dimitri.papadimitriou@alcatel.be
+
+
+
+
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 21]
+
+RFC 4427 GMPLS Recovery Terminology March 2006
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2006).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is provided by the IETF
+ Administrative Support Activity (IASA).
+
+
+
+
+
+
+
+Mannie & Papadimitriou Informational [Page 22]
+