Network Working Group J. Lang, Editor Internet Draft (Rincon Networks) Category: Standards Track Expires: April 2004 October 2003 Link Management Protocol (LMP) draft-ietf-ccamp-lmp-10.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract For scalability purposes, multiple data links can be combined to form a single traffic engineering (TE) link. Furthermore, the management of TE links is not restricted to in-band messaging, but instead can be done using out-of-band techniques. This document specifies a link management protocol (LMP) that runs between a pair of nodes and is used to manage TE links. Specifically, LMP will be used to maintain control channel connectivity, verify the physical connectivity of the data links, correlate the link property information, suppress downstream alarms, and localize link failures for protection/restoration purposes in multiple kinds of networks. J. Lang, Editor Standards Track [Page 1] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Table of Contents 1 Introduction ................................................ 5 1.1 Terminology ............................................. 5 2 LMP Overview ................................................ 8 3 Control Channel Management .................................. 10 3.1 Parameter Negotiation ................................... 11 3.2 Hello Protocol .......................................... 12 3.2.1 Hello Parameter Negotiation ...................... 12 3.2.2 Fast Keep-alive .................................. 13 3.2.3 Control Channel Down ............................. 14 3.2.4 Degraded State ................................... 14 4 Link Property Correlation ................................... 15 5 Verifying Link Connectivity ................................. 16 5.1 Example of Link Connectivity Verification ............... 19 6 Fault Management ............................................ 20 6.1 Fault Detection ......................................... 20 6.2 Fault Localization Procedure ............................ 21 6.3 Examples of Fault Localization .......................... 21 6.4 Channel Activation Indication ........................... 22 6.5 Channel Deactivation Indication ......................... 23 7 Message_Id Usage ............................................ 23 8 Graceful Restart ............................................ 24 9 Addressing .................................................. 25 10 Exponential Back-off Procedures ............................. 26 10.1 Operation............................................... 26 10.2 Retransmission Algorithm ............................... 27 11 LMP Finite State Machines ................................... 27 11.1 Control Channel FSM .................................... 27 11.1.1 Control Channel States .......................... 27 11.1.2 Control Channel Events .......................... 28 11.1.3 Control Channel FSM Description ................. 30 11.2 TE Link FSM ............................................ 31 11.2.1 TE Link States .................................. 31 11.2.2 TE Link Events .................................. 31 11.2.3 TE Link FSM Description ......................... 32 11.3 Data Link FSM .......................................... 33 11.3.1 Data Link States ................................ 33 11.3.2 Data Link Events ................................ 33 11.3.3 Active Data Link FSM Description ................ 35 11.3.4 Passive Data Link FSM Description ............... 35 12 LMP Message Formats ......................................... 36 12.1 Common Header .......................................... 36 12.2 LMP Object Format ...................................... 38 12.3 Parameter Negotiation Messages ......................... 39 12.4 Hello Message .......................................... 40 12.5 Link Verification Messages ............................. 41 12.6 Link Summary Messages .................................. 44 12.7 Fault Management Messages .............................. 46 13 LMP Object Definitions ...................................... 47 14 Intellectual Property Considerations ........................ 64 15 References .................................................. 65 J. Lang, Editor Standards Track [Page 2] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 16 Security Considerations ..................................... 66 16.1 Security Requirements .................................. 66 16.2 Security Mechanisms .................................... 67 17 IANA Considerations ......................................... 69 18 Acknowledgements ............................................ 75 19 Contributors ................................................ 75 20 Contact Address ............................................. 75 21 Full Copyright Statement .................................... 77 J. Lang, Editor Standards Track [Page 3] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 [Editor's note: "Changes from previous version" notes can be removed prior to publication as an RFC.] Changes from previous version: o Editorial changes resulting from IESG review. o The following changes were made to the Security Considerations section: - Removed stale text about channel identifier. - Made changes to ensure manual keying is a SHOULD and dynamic keying is a MUST. For dynamic key exchange protocols IKE MUST be the key exchange protocol. - Text was added to indicate a more specific selector can be used by specifying the ports explicitly. - Added text about the caveats of using manual keying. - Made ESP Tunnel mode a MUST. J. Lang, Editor Standards Track [Page 4] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 1. Introduction Networks are being developed with routers, switches, crossconnects, dense wavelength division multiplexed (DWDM) systems, and add-drop multiplexors (ADMs) that use a common control plane [e.g., Generalized MPLS (GMPLS)] to dynamically allocate resources and to provide network survivability using protection and restoration techniques. A pair of nodes may have thousands of interconnects, where each interconnect may consist of multiple data links when multiplexing (e.g., Frame Relay DLCIs at Layer 2, time division multiplexed (TDM) slots or wavelength division multiplexed (WDM) wavelengths at Layer 1) is used. For scalability purposes, multiple data links may be combined into a single traffic-engineering (TE) link. To enable communication between nodes for routing, signaling, and link management, there must be a pair of IP interfaces that are mutually reachable. We call such a pair of interfaces a control channel. Note that "mutually reachable" does not imply that these two interfaces are (directly) connected by an IP link; there may be an IP network between the two. Furthermore, the interface over which the control messages are sent/received may not be the same interface over which the data flows. This document specifies a link management protocol (LMP) that runs between a pair of nodes and is used to manage TE links and verify reachability of the control channel. For the purposes of this document, such nodes are considered "LMP neighbors" or simply "neighboring nodes". In GMPLS, the control channels between two adjacent nodes are no longer required to use the same physical medium as the data links between those nodes. For example, a control channel could use a separate virtual circuit, wavelength, fiber, Ethernet link, an IP tunnel routed over a separate management network, or a multi-hop IP network. A consequence of allowing the control channel(s) between two nodes to be logically or physically diverse from the associated data links is that the health of a control channel does not necessarily correlate to the health of the data links, and vice- versa. Therefore, a clean separation between the fate of the control channel and data links must be made. New mechanisms must be developed to manage the data links, both in terms of link provisioning and fault management. Among the tasks that LMP accomplishes is checking that the grouping of links into TE links as well as the properties of those links are the same at both end points of the links -- this is called "link property correlation". Also, LMP can communicate these link properties to the IGP module, which can then announce them to other nodes in the network. LMP can also tell the signaling module the mapping between TE links and control channels. Thus, LMP performs a valuable "glue" function in the control plane. J. Lang, Editor Standards Track [Page 5] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Note that while the existence of the control network (single or multi-hop) is necessary for enabling communication, it is by no means sufficient. For example, if the two interfaces are separated by an IP network, faults in the IP network may result in the lack of an IP path from one interface to another, and therefore in an interruption of communication between the two interfaces. On the other hand, not every failure in the control network affects a given control channel, hence the need for establishing and managing control channels. For the purposes of this document, a data link may be considered by each node that it terminates on as either a 'port' or a 'component link' depending on the multiplexing capability of the endpoint on that link; component links are multiplex capable, whereas ports are not multiplex capable. This distinction is important since the management of such links (including, for example, resource allocation, label assignment, and their physical verification) is different based on their multiplexing capability. For example, a Frame Relay switch is able to demultiplex an interface into virtual circuits based on DLCIs; similarly, a SONET crossconnect with OC-192 interfaces may be able to demultiplex the OC-192 stream into four OC-48 streams. If multiple interfaces are grouped together into a single TE link using link bundling [BUNDLE], then the link resources must be identified using three levels: Link_Id, component interface Id, and label identifying virtual circuit, timeslot, etc. Resource allocation happens at the lowest level (labels), but physical connectivity happens at the component link level. As another example, consider the case where an optical switch (e.g., PXC) transparently switches OC-192 lightpaths. If multiple interfaces are once again grouped together into a single TE link, then link bundling [BUNDLE] is not required and only two levels of identification are required: Link_Id and Port_Id. In this case, both resource allocation and physical connectivity happen at the lowest level (i.e. port level). To ensure interworking between data links with different multiplexing capabilities, LMP capable devices SHOULD allow sub- channels of a component link to be locally configured as (logical) data links. For example, if a Router with 4 OC-48 interfaces is connected through a 4:1 MUX to a cross-connect with OC-192 interfaces, the cross-connect should be able to configure each sub- channel (e.g., STS-48c SPE if the 4:1 MUX is a SONET MUX) as a data link. LMP is designed to support aggregation of one or more data links into a TE link (either ports into TE links, or component links into TE links). The purpose of forming a TE link is to group/map the information about certain physical resources (and their properties) into the information that is used by Constrained SPF for the purpose of path computation, and by GMPLS signaling. J. Lang, Editor Standards Track [Page 6] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 1.1. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. The reader is assumed to be familiar with the terminology in [RFC3471], [GMPLS-RTG], and [BUNDLE]. Bundled Link: As defined in [BUNDLE], a bundled link is a TE link such that for the purpose of GMPLS signaling a combination of is not sufficient to unambiguously identify the appropriate resources used by an LSP. A bundled link is composed of two or more component links. Control Channel: A control channel is a pair of mutually reachable interfaces that are used to enable communication between nodes for routing, signaling, and link management. Component Link: As defined in [BUNDLE], a component link is a subset of resources of a TE Link such that (a) the partition is minimal, and (b) within each subset a label is sufficient to unambiguously identify the appropriate resources used by an LSP. Data Link: A data link is a pair of interfaces that are used to transfer user data. Note that in GMPLS, the control channel(s) between two adjacent nodes are no longer required to use the same physical medium as the data links between those nodes. Link Property Correlation: This is a procedure to correlate the local and remote properties of a TE link. Multiplex Capability: The ability to multiplex/demultiplex a data stream into sub-rate streams for switching purposes. Node_Id: J. Lang, Editor Standards Track [Page 7] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 For a node running OSPF, the LMP Node_Id is the same as the address contained in the OSPF Router Address TLV. For a node running IS-IS and advertising the TE Router ID TLV, the Node_Id is the same as the advertised Router ID. Port: An interface that terminates a data link. TE Link: As defined in [GMPLS-RTG], a TE link is a logical construct that represents a way to group/map the information about certain physical resources (and their properties) that interconnect LSRs into the information that is used by Constrained SPF for the purpose of path computation, and by GMPLS signaling. Transparent: A device is called X-transparent if it forwards incoming signals from input to output without examining or modifying the X aspect of the signal. For example, a Frame Relay switch is network-layer transparent; an all-optical switch is electrically transparent. 2. LMP Overview The two core procedures of LMP are control channel management and link property correlation. Control channel management is used to establish and maintain control channels between adjacent nodes. This is done using a Config message exchange and a fast keep-alive mechanism between the nodes. The latter is required if lower-level mechanisms are not available to detect control channel failures. Link property correlation is used to synchronize the TE link properties and verify the TE link configuration. LMP requires that a pair of nodes have at least one active bi- directional control channel between them. Each direction of the control channel is identified by a Control Channel Id (CC_Id), and the two directions are coupled together using the LMP Config message exchange. Except for Test messages, which may be limited by the transport mechanism for in-band messaging, all LMP packets are run over UDP with an LMP port number. The link level encoding of the control channel is outside the scope of this document. An "LMP adjacency" is formed between two nodes when at least one bi- directional control channel is established between them. Multiple control channels may be active simultaneously for each adjacency; control channel parameters, however, MUST be individually negotiated for each control channel. If the LMP fast keep-alive is used over a control channel, LMP Hello messages MUST be exchanged over the control channel. Other LMP messages MAY be transmitted over any of the active control channels between a pair of adjacent nodes. One or J. Lang, Editor Standards Track [Page 8] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 more active control channels may be grouped into a logical control channel for signaling, routing, and link property correlation purposes. The link property correlation function of LMP is designed to aggregate multiple data links (ports or component links) into a TE link and to synchronize the properties of the TE link. As part of the link property correlation function, a LinkSummary message exchange is defined. The LinkSummary message includes the local and remote Link_Ids, a list of all data links that comprise the TE link, and various link properties. A LinkSummaryAck or LinkSummaryNack message MUST be sent in response to the receipt of a LinkSummary message indicating agreement or disagreement on the link properties. LMP messages are transmitted reliably using Message_Ids and retransmissions. Message_Ids are carried in MESSAGE_ID objects. No more than one MESSAGE_ID object may be included in an LMP message. For control channel specific messages, the Message_Id is within the scope of the control channel over which the message is sent. For TE link specific messages, the Message_Id is within the scope of the LMP adjacency. The value of the Message_Id is monotonically increasing and wraps when the maximum value is reached. In this document, two additional LMP procedures are defined: link connectivity verification and fault management. These procedures are particularly useful when the control channels are physically diverse from the data links. Link connectivity verification is used for data plane discovery, Interface_Id exchange (Interface_Ids are used in GMPLS signaling, either as port labels or component link identifiers, depending on the configuration), and physical connectivity verification. This is done by sending Test messages over the data links and TestStatus messages back over the control channel. Note that the Test message is the only LMP message that must be transmitted over the data link. The ChannelStatus message exchange is used between adjacent nodes for both the suppression of downstream alarms and the localization of faults for protection and restoration. For LMP link connectivity verification, the Test message is transmitted over the data links. For X-transparent devices, this requires examining and modifying the X aspect of the signal. The LMP link connectivity verification procedure is coordinated using a BeginVerify message exchange over a control channel. To support various aspects of transparency, a Verify Transport Mechanism is included in the BeginVerify and BeginVerifyAck messages. Note that there is no requirement that all data links must lose their transparency simultaneously, but at a minimum, it must be possible to terminate them one at a time. There is also no requirement that the control channel and TE link use the same physical medium; however, the control channel MUST be terminated by the same two control elements that control the TE link. Since the BeginVerify message exchange coordinates the Test procedure, it also naturally J. Lang, Editor Standards Track [Page 9] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 coordinates the transition of the data links in and out of the transparent mode. The LMP fault management procedure is based on a ChannelStatus message exchange using the following messages: ChannelStatus, ChannelStatusAck, ChannelStatusRequest, and ChannelStatusResponse. The ChannelStatus message is sent unsolicited and is used to notify an LMP neighbor about the status of one or more data channels of a TE link. The ChannelStatusAck message is used to acknowledge receipt of the ChannelStatus message. The ChannelStatusRequest message is used to query an LMP neighbor for the status of one or more data channels of a TE Link. The ChannelStatusResponse message is used to acknowledge receipt of the ChannelStatusRequest message and indicate the states of the queried data links. 3. Control Channel Management To initiate an LMP adjacency between two nodes, one or more bi- directional control channels MUST be activated. The control channels can be used to exchange control-plane information such as link provisioning and fault management information (implemented using a messaging protocol such as LMP, proposed in this document), path management and label distribution information (implemented using a signaling protocol such as RSVP-TE [RFC3209]), and network topology and state distribution information (implemented using traffic engineering extensions of protocols such as OSPF [OSPF-TE] and IS-IS [ISIS-TE]). For the purposes of LMP, the exact implementation of the control channel is not specified; it could be, for example, a separate wavelength or fiber, an Ethernet link, an IP tunnel through a separate management network, or the overhead bytes of a data link. Rather, each node assigns a node-wide unique 32-bit non-zero integer control channel identifier (CC_Id). This identifier comes from the same space as the unnumbered interface Id. Furthermore, LMP packets are run over UDP with an LMP port number. Thus, the link level encoding of the control channel is not part of the LMP specification. To establish a control channel, the destination IP address on the far end of the control channel must be known. This knowledge may be manually configured or automatically discovered. Note that for in- band signaling, a control channel could be explicitly configured on a particular data link. In this case, the Config message exchange can be used to dynamically learn the IP address on the far end of the control channel. This is done by sending the Config message with the unicast IP source address and the multicast IP destination address (224.0.0.1 or ff02::1). The ConfigAck and ConfigNack messages MUST be sent to the source IP address found in the IP header of the received Config message. J. Lang, Editor Standards Track [Page 10] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Control channels exist independently of TE links and multiple control channels may be active simultaneously between a pair of nodes. Individual control channels can be realized in different ways; one might be implemented in-fiber while another one may be implemented out-of-fiber. As such, control channel parameters MUST be negotiated over each individual control channel, and LMP Hello packets MUST be exchanged over each control channel to maintain LMP connectivity if other mechanisms are not available. Since control channels are electrically terminated at each node, it may be possible to detect control channel failures using lower layers (e.g., SONET/SDH). There are four LMP messages that are used to manage individual control channels. They are the Config, ConfigAck, ConfigNack, and Hello messages. These messages MUST be transmitted on the channel to which they refer. All other LMP messages may be transmitted over any of the active control channels between a pair of LMP adjacent nodes. In order to maintain an LMP adjacency, it is necessary to have at least one active control channel between a pair of adjacent nodes (recall that multiple control channels can be active simultaneously between a pair of nodes). In the event of a control channel failure, alternate active control channels can be used and it may be possible to activate additional control channels as described below. 3.1. Parameter Negotiation Control channel activation begins with a parameter negotiation exchange using Config, ConfigAck, and ConfigNack messages. The contents of these messages are built using LMP objects, which can be either negotiable or non-negotiable (identified by the N bit in the object header). Negotiable objects can be used to let LMP peers agree on certain values. Non-negotiable objects are used for the announcement of specific values that do not need, or do not allow, negotiation. To activate a control channel, a Config message MUST be transmitted to the remote node, and in response, a ConfigAck message MUST be received at the local node. The Config message contains the Local Control Channel Id (CC_Id), the sender's Node_Id, a Message_Id for reliable messaging, and a CONFIG object. It is possible that both the local and remote nodes initiate the configuration procedure at the same time. To avoid ambiguities, the node with the higher Node_Id wins the contention; the node with the lower Node_Id MUST stop transmitting the Config message and respond to the Config message it received. If the Node_Ids are equal, then one (or both) nodes have been misconfigured. The nodes MAY continue to retransmit Config messages in hopes that the misconfiguration is corrected. Note that the problem may be solved by an operator changing the Node_Ids on one or both nodes. J. Lang, Editor Standards Track [Page 11] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The ConfigAck message is used to acknowledge receipt of the Config message and express agreement on ALL of the configured parameters (both negotiable and non-negotiable). The ConfigNack message is used to acknowledge receipt of the Config message, indicate which (if any) non-negotiable CONFIG objects are unacceptable, and propose alternate values for the negotiable parameters. If a node receives a ConfigNack message with acceptable alternate values for negotiable parameters, the node SHOULD transmit a Config message using these values for those parameters. If a node receives a ConfigNack message with unacceptable alternate values, the node MAY continue to retransmit Config messages in hopes that the misconfiguration is corrected. Note that the problem may be solved by an operator changing parameters on one or both nodes. In the case where multiple control channels use the same physical interface, the parameter negotiation exchange is performed for each control channel. The various LMP parameter negotiation messages are associated with their corresponding control channels by their node- wide unique identifiers (CC_Ids). 3.2. Hello Protocol Once a control channel is activated between two adjacent nodes, the LMP Hello protocol can be used to maintain control channel connectivity between the nodes and to detect control channel failures. The LMP Hello protocol is intended to be a lightweight keep-alive mechanism that will react to control channel failures rapidly so that IGP Hellos are not lost and the associated link- state adjacencies are not removed unnecessarily. 3.2.1. Hello Parameter Negotiation Before sending Hello messages, the HelloInterval and HelloDeadInterval parameters MUST be agreed upon by the local and remote nodes. These parameters are exchanged in the Config message. The HelloInterval indicates how frequently LMP Hello messages will be sent, and is measured in milliseconds (ms). For example, if the value were 150, then the transmitting node would send the Hello message at least every 150ms. The HelloDeadInterval indicates how long a device should wait to receive a Hello message before declaring a control channel dead, and is measured in milliseconds (ms). The HelloDeadInterval MUST be greater than the HelloInterval, and SHOULD be at least 3 times the value of HelloInterval. If the fast keep-alive mechanism of LMP is not used, the HelloInterval and HelloDeadInterval parameters MUST be set to zero. J. Lang, Editor Standards Track [Page 12] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The values for the HelloInterval and HelloDeadInterval should be selected carefully to provide rapid response time to control channel failures without causing congestion. As such, different values will likely be configured for different control channel implementations. When the control channel is implemented over a directly connected link, the suggested default values for the HelloInterval is 150 ms and for the HelloDeadInterval is 500 ms. When a node has either sent or received a ConfigAck message, it may begin sending Hello messages. Once it has sent a Hello message and received a valid Hello message (i.e., with expected sequence numbers; see Section 3.2.2), the control channel moves to the up state. (It is also possible to move to the up state without sending Hellos if other methods are used to indicate bi-directional control- channel connectivity. For example, indication of bi-directional connectivity may be learned from the transport layer.) If, however, a node receives a ConfigNack message instead of a ConfigAck message, the node MUST not send Hello messages and the control channel SHOULD NOT move to the up state. See Section 11.1 for the complete control channel FSM. 3.2.2. Fast Keep-alive Each Hello message contains two sequence numbers: the first sequence number (TxSeqNum) is the sequence number for the Hello message being sent and the second sequence number (RcvSeqNum) is the sequence number of the last Hello message received from the adjacent node over this control channel. There are two special sequence numbers. TxSeqNum MUST NOT ever be 0. TxSeqNum = 1 is used to indicate that the sender has just started or has restarted and has no recollection of the last TxSeqNum that was sent. Thus, the first Hello sent has a TxSeqNum of 1 and an RxSeqNum of 0. When TxSeqNum reaches (2^32)-1, the next sequence number used is 2, not 0 or 1, as these have special meanings. Under normal operation, the difference between the RcvSeqNum in a Hello message that is received and the local TxSeqNum that is generated will be at most 1. This difference can be more than one only when a control channel restarts or when the values wrap. Since the 32-bit sequence numbers may wrap, the following expression may be used to test if a newly received TxSeqNum value is less than a previously received value: If ((int) old_id - (int) new_id > 0) { New value is less than old value; } Having sequence numbers in the Hello messages allows each node to verify that its peer is receiving its Hello messages. By including J. Lang, Editor Standards Track [Page 13] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 the RcvSeqNum in Hello packets, the local node will know which Hello packets the remote node has received. The following example illustrates how the sequence numbers operate. Note that only the operation at one node is shown, and alternative scenarios are possible: 1) After completing the configuration stage, Node A sends Hello messages to Node B with {TxSeqNum=1;RcvSeqNum=0}. 2) Node A receives a Hello from Node B with {TxSeqNum=1;RcvSeqNum=1}. When the HelloInterval expires on Node A, it sends Hellos to Node B with {TxSeqNum=2;RcvSeqNum=1}. 3) Node A receives a Hello from Node B with {TxSeqNum=2;RcvSeqNum=2}. When the HelloInterval expires on Node A, it sends Hellos to Node B with {TxSeqNum=3;RcvSeqNum=2}. 3.2.3. Control Channel Down To allow bringing a control channel down gracefully for administration purposes, a ControlChannelDown flag is available in the Common Header of LMP packets. When data links are still in use between a pair of nodes, a control channel SHOULD only be taken down administratively when there are other active control channels that can be used to manage the data links. When bringing a control channel down administratively, a node MUST set the ControlChannelDown flag in all LMP messages sent over the control channel. The node that initiated the control channel down procedure may stop sending Hello messages after HelloDeadInterval seconds have passed, or if it receives an LMP message over the same control channel with the ControlChannelDown flag set. When a node receives an LMP packet with the ControlChannelDown flag set, it SHOULD send a Hello message with the ControlChannelDown flag set and move the control channel to the down state. 3.2.4. Degraded State A consequence of allowing the control channels to be physically diverse from the associated data links is that there may not be any active control channels available while the data links are still in use. For many applications, it is unacceptable to tear down a link that is carrying user traffic simply because the control channel is no longer available; however, the traffic that is using the data links may no longer be guaranteed the same level of service. Hence, the TE link is in a Degraded state. When a TE link is in the Degraded state, routing and signaling SHOULD be notified so that new connections are not accepted and the TE link is advertised with no unreserved resources. J. Lang, Editor Standards Track [Page 14] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 4. Link Property Correlation As part of LMP, a link property correlation exchange is defined for TE links using the LinkSummary, LinkSummaryAck, and LinkSummaryNack messages. The contents of these messages are built using LMP objects, which can be either negotiable or non-negotiable (identified by the N flag in the object header). Negotiable objects can be used to let both sides agree on certain link parameters. Non-negotiable objects are used for announcement of specific values that do not need, or do not allow, negotiation. Each TE link has an identifier (Link_Id) that is assigned at each end of the link. These identifiers MUST be the same type (i.e, IPv4, IPv6, unnumbered) at both ends. If a LinkSummary message is received with different local and remote TE link types, then a LinkSummaryNack message MUST be sent with Error Code "Bad TE Link Object". Similarly, each data link is assigned an identifier (Interface_Id) at each end. These identifiers MUST also be the same type at both ends. If a LinkSummary message is received with different local and remote Interface_Id types then a LinkSummaryNack message MUST be sent with Error Code "Bad Data Link Object". Link property correlation SHOULD be done before the link is brought up and MAY be done at any time a link is up and not in the Verification process. The LinkSummary message is used to verify for consistency the TE and data link information on both sides. Link Summary messages are also used to aggregate multiple data links (either ports or component links) into a TE link; exchange, correlate (to determine inconsistencies), or change TE link parameters; and exchange, correlate (to determine inconsistencies), or change Interface_Ids (used either Port_Ids or component link identifiers). The LinkSummary message includes a TE_LINK object followed by one or more DATA_LINK objects. The TE_LINK object identifies the TE link's local and remote Link_Id and indicates support for fault management and link verification procedures for that TE link. The DATA_LINK objects are used to characterize the data links that comprise the TE link. These objects include the local and remote Interface_Ids, and may include one or more sub-objects further describing the properties of the data links. If the LinkSummary message is received from a remote node and the Interface_Id mappings match those that are stored locally, then the two nodes have agreement on the Verification procedure (see Section 5) and data link identification configuration. If the verification procedure is not used, the LinkSummary message can be used to verify agreement on manual configuration. J. Lang, Editor Standards Track [Page 15] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The LinkSummaryAck message is used to signal agreement on the Interface_Id mappings and link property definitions. Otherwise, a LinkSummaryNack message MUST be transmitted, indicating which Interface mappings are not correct and/or which link properties are not accepted. If a LinkSummaryNack message indicates that the Interface_Id mappings are not correct and the link verification procedure is enabled, the link verification process SHOULD be repeated for all mismatched free data links; if an allocated data link has a mapping mismatch, it SHOULD be flagged and verified when it becomes free. If a LinkSummaryNack message includes negotiable parameters, then acceptable values for those parameters MUST be included. If a LinkSummaryNack message is received and includes negotiable parameters, then the initiator of the LinkSummary message SHOULD send a new LinkSummary message. The new LinkSummary message SHOULD include new values for the negotiable parameters. These values SHOULD take into account the acceptable values received in the LinkSummaryNack message. It is possible that the LinkSummary message could grow quite large due to the number of DATA LINK objects. An LMP implementation SHOULD be able to fragment when transmitting LMP messages, and MUST be able to re-assemble IP fragments when receiving LMP messages. 5. Verifying Link Connectivity In this section, an optional procedure is described that may be used to verify the physical connectivity of the data links and dynamically learn (i.e., discover) the TE link and Interface_Id associations. The procedure SHOULD be done when establishing a TE link, and subsequently, on a periodic basis for all unallocated (free) data links of the TE link. Support for this procedure is indicated by setting the "Link Verification Supported" flag in the TE_LINK object of the LinkSummary message. If a BeginVerify message is received and link verification is not supported for the TE link, then a BeginVerifyNack message MUST be transmitted with Error Code indicating, "Link Verification Procedure not supported for this TE Link." A unique characteristic of transparent devices is that the data is not modified or examined in normal operation. This characteristic poses a challenge for validating the connectivity of the data links and establish the label mappings. Therefore, to ensure proper verification of data link connectivity, it is required that until the data links are allocated for user traffic, they must be opaque (i.e., lose their transparency). To support various degrees of opaqueness (e.g., examining overhead bytes, terminating the IP payload, etc.), and hence different mechanisms to transport the Test messages, a Verify Transport Mechanism field is included in the BeginVerify and BeginVerifyAck messages. J. Lang, Editor Standards Track [Page 16] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 There is no requirement that all data links be terminated simultaneously, but at a minimum, the data links MUST be able to be terminated one at a time. Furthermore, for the link verification procedure it is assumed that the nodal architecture is designed so that messages can be sent and received over any data link. Note that this requirement is trivial for opaque devices since each data link is electrically terminated and processed before being forwarded to the next opaque device, but that in transparent devices this is an additional requirement. To interconnect two nodes, a TE link is defined between them, and at a minimum, there MUST be at least one active control channel between the nodes. For link verification, a TE link MUST include at least one data link. Once a control channel has been established between the two nodes, data link connectivity can be verified by exchanging Test messages over each of the data links specified in the TE link. It should be noted that all LMP messages except the Test message are exchanged over the control channels and that Hello messages continue to be exchanged over each control channel during the data link verification process. The Test message is sent over the data link that is being verified. Data links are tested in the transmit direction as they are unidirectional, and therefore, it may be possible for both nodes to (independently) exchange the Test messages simultaneously. To initiate the link verification procedure, the local node MUST send a BeginVerify message over a control channel. To limit the scope of Link Verification to a particular TE Link, the local Link_Id MUST be non-zero. If this field is zero, the data links can span multiple TE links and/or they may comprise a TE link that is yet to be configured. For the case where the local Link_Id field is zero, the "Verify all Links" flag of the BEGIN_VERIFY object is used to distinguish between data links that span multiple TE links and those that have not yet been assigned to a TE link. Specifically, verification of data links that span multiple TE links is indicated by setting the local Link_Id field to zero and setting the "Verify all Links" flag. Verification of data links that have not yet been assigned to a TE link is indicated by setting the local Link_Id field to zero and clearing the "Verify all Links" flag. The BeginVerify message also contains the number of data links that are to be verified; the interval (called VerifyInterval) at which the Test messages will be sent; the encoding scheme and transport mechanisms that are supported; the data rate for Test messages; and, when the data links correspond to fibers, the wavelength identifier over which the Test messages will be transmitted. If the remote node receives a BeginVerify message and it is ready to process Test messages, it MUST send a BeginVerifyAck message back to J. Lang, Editor Standards Track [Page 17] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 the local node specifying the desired transport mechanism for the TEST messages. The remote node includes a 32-bit node unique Verify_Id in the BeginVerifyAck message. The Verify_Id MAY be randomly selected, however, it MUST NOT overlap any other Verify_Id currently being used by the node selecting it. The Verify_Id is then used in all corresponding verification messages to differentiate them from different LMP peers and/or parallel Test procedures. When the local node receives a BeginVerifyAck message from the remote node, it may begin testing the data links by transmitting periodic Test messages over each data link. The Test message includes the Verify_Id and the local Interface_Id for the associated data link. The remote node MUST send either a TestStatusSuccess or a TestStatusFailure message in response for each data link. A TestStatusAck message MUST be sent to confirm receipt of the TestStatusSuccess and TestStatusFailure messages. Unacknowledged TestStatusSuccess and TestStatusFailure messages SHOULD be retransmitted until the message is acknowledged or until a retry limit is reached (see also Section 10). It is also permissible for the sender to terminate the Test procedure anytime after sending the BeginVerify message. An EndVerify message SHOULD be sent for this purpose. Message correlation is done using message identifiers and the Verify_Id; this enables verification of data links, belonging to different link bundles or LMP sessions, in parallel. When the Test message is received, the received Interface_Id (used in GMPLS as either a Port label or component link identifier depending on the configuration) is recorded and mapped to the local Interface_Id for that data link, and a TestStatusSuccess message MUST be sent. The TestStatusSuccess message includes the local Interface_Id along with the Interface_Id and Verify_Id received in the Test message. The receipt of a TestStatusSuccess message indicates that the Test message was detected at the remote node and the physical connectivity of the data link has been verified. When the TestStatusSuccess message is received, the local node SHOULD mark the data link as up and send a TestStatusAck message to the remote node. If, however, the Test message is not detected at the remote node within an observation period (specified by the VerifyDeadInterval), the remote node MUST send a TestStatusFailure message over the control channel indicating that the verification of the physical connectivity of the data link has failed. When the local node receives a TestStatusFailure message, it SHOULD mark the data link as FAILED and send a TestStatusAck message to the remote node. When all the data links on the list have been tested, the local node SHOULD send an EndVerify message to indicate that testing is complete on this link. If the local/remote data link mappings are known, then the link verification procedure can be optimized by testing the data links in J. Lang, Editor Standards Track [Page 18] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 a defined order known to both nodes. The suggested criterion for this ordering is in increasing value of the remote Interface_Id. Both the local and remote nodes SHOULD maintain the complete list of Interface_Id mappings for correlation purposes. 5.1. Example of Link Connectivity Verification Figure 1 shows an example of the link verification scenario that is executed when a link between Node A and Node B is added. In this example, the TE link consists of three free ports (each transmitted along a separate fiber) and is associated with a bi-directional control channel (indicated by a "c"). The verification process is as follows: o A sends a BeginVerify message over the control channel to B indicating it will begin verifying the ports that form the TE link. The LOCAL_LINK_ID object carried in the BeginVerify message carries the identifier (IP address or interface index) that A assigns to the link. o Upon receipt of the BeginVerify message, B creates a Verify_Id and binds it to the TE Link from A. This binding is used later when B receives the Test messages from A, and these messages carry the Verify_Id. B discovers the identifier (IP address or interface index) that A assigns to the TE link by examining the LOCAL_LINK_ID object carried in the received BeginVerify message. (If the data ports are not yet assigned to the TE Link, the binding is limited to the Node_Id of A.) In response to the BeginVerify message, B sends to A the BeginVerifyAck message. The LOCAL_LINK_ID object carried in the BeginVerifyAck message is used to carry the identifier (IP address or interface index) that B assigns to the TE link. The REMOTE_LINK_ID object carried in the BeginVerifyAck message is used to bind the Link_Ids assigned by both A and B. The Verify_Id is returned to A in the BeginVerifyAck message over the control channel. o When A receives the BeginVerifyAck message, it begins transmitting periodic Test messages over the first port (Interface Id=1). The Test message includes the Interface_Id for the port and the Verify_Id that was assigned by B. o When B receives the Test messages, it maps the received Interface_Id to its own local Interface_Id = 10 and transmits a TestStatusSuccess message over the control channel back to Node A. The TestStatusSuccess message includes both the local and received Interface_Ids for the port as well as the Verify_Id. The Verify_Id is used to determine the local/remote TE link identifiers (IP addresses or interface indices) for which the data links belong. o A will send a TestStatusAck message over the control channel back to B indicating it received the TestStatusSuccess message. o The process is repeated until all of the ports are verified. o At this point, A will send an EndVerify message over the control channel to B to indicate that testing is complete. J. Lang, Editor Standards Track [Page 19] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 o B will respond by sending an EndVerifyAck message over the control channel back to A. Note that this procedure can be used to "discover" the connectivity of the data ports. +---------------------+ +---------------------+ + + + + + Node A +<-------- c --------->+ Node B + + + + + + + + + + 1 +--------------------->+ 10 + + + + + + + + + + 2 + /---->+ 11 + + + /----/ + + + + /---/ + + + 3 +----/ + 12 + + + + + + + + + + 4 +--------------------->+ 14 + + + + + +---------------------+ +---------------------+ Figure 1: Example of link connectivity between Node A and Node B. 6. Fault Management In this section, an optional LMP procedure is described that is used to manage failures by rapid notification of the status of one or more data channels of a TE Link. The scope of this procedure is within a TE link, and as such, the use of this procedure is negotiated as part of the LinkSummary exchange. The procedure can be used to rapidly isolate data link and TE link failures, and is designed to work for both unidirectional and bi-directional LSPs. An important implication of using transparent devices is that traditional methods that are used to monitor the health of allocated data links in may no longer be appropriate. Instead, fault detection is delegated to the physical layer (i.e., loss of light or optical monitoring of the data) instead of layer 2 or layer 3. Recall that a TE link connecting two nodes may consist of a number of data links. If one or more data links fail between two nodes, a mechanism must be used for rapid failure notification so that appropriate protection/restoration mechanisms can be initiated. If the failure is subsequently cleared, then a mechanism must be used to notify that the failure is clear and the channel status is OK. 6.1. Fault Detection J. Lang, Editor Standards Track [Page 20] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Fault detection should be handled at the layer closest to the failure; for optical networks, this is the physical (optical) layer. One measure of fault detection at the physical layer is detecting loss of light (LOL). Other techniques for monitoring optical signals are still being developed and will not be further considered in this document. However, it should be clear that the mechanism used for fault notification in LMP is independent of the mechanism used to detect the failure, but simply relies on the fact that a failure is detected. 6.2. Fault Localization Procedure In some situations, a data link failure between two nodes is propagated downstream such that all the downstream nodes detect the failure without localizing the failure. To avoid multiple alarms stemming from the same failure, LMP provides failure notification through the ChannelStatus message. This message may be used to indicate that a single data channel has failed, multiple data channels have failed, or an entire TE link has failed. Failure correlation is done locally at each node upon receipt of the failure notification. To localize a fault to a particular link between adjacent nodes, a downstream node (downstream in terms of data flow) that detects data link failures will send a ChannelStatus message to its upstream neighbor indicating that a failure has been detected (bundling together the notification of all of the failed data links). An upstream node that receives the ChannelStatus message MUST send a ChannelStatusAck message to the downstream node indicating it has received the ChannelStatus message. The upstream node should correlate the failure to see if the failure is also detected locally for the corresponding LSP(s). If, for example, the failure is clear on the input of the upstream node or internally, then the upstream node will have localized the failure. Once the failure is correlated, the upstream node SHOULD send a ChannelStatus message to the downstream node indicating that the channel is failed or is ok. If a ChannelStatus message is not received by the downstream node, it SHOULD send a ChannelStatusRequest message for the channel in question. Once the failure has been localized, the signaling protocols may be used to initiate span or path protection and restoration procedures. If all of the data links of a TE link have failed, then the upstream node MAY be notified of the TE link failure without specifying each data link of the failed TE link. This is done by sending failure notification in a ChannelStatus message identifying the TE Link without including the Interface_Ids in the CHANNEL_STATUS object. 6.3. Examples of Fault Localization In Figure 2, a sample network is shown where four nodes are connected in a linear array configuration. The control channels are J. Lang, Editor Standards Track [Page 21] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 bi-directional and are labeled with a "c". All LSPs are also bi- directional. In the first example [see Fig. 2(a)], there is a failure on one direction of the bi-directional LSP. Node 4 will detect the failure and will send a ChannelStatus message to Node 3 indicating the failure (e.g., LOL) to the corresponding upstream node. When Node 3 receives the ChannelStatus message from Node 4, it returns a ChannelStatusAck message back to Node 4 and correlates the failure locally. When Node 3 correlates the failure and verifies that the failure is clear, it has localized the failure to the data link between Node 3 and Node 4. At that time, Node 3 should send a ChannelStatus message to Node 4 indicating that the failure has been localized. In the second example [see Fig. 2(b)], a single failure (e.g., fiber cut) affects both directions of the bi-directional LSP. Node 2 (Node 3) will detect the failure of the upstream (downstream) direction and send a ChannelStatus message to the upstream (in terms of data flow) node indicating the failure (e.g., LOL). Simultaneously (ignoring propagation delays), Node 1 (Node 4) will detect the failure on the upstream (downstream) direction, and will send a ChannelStatus message to the corresponding upstream (in terms of data flow) node indicating the failure. Node 2 and Node 3 will have localized the two directions of the failure. +-------+ +-------+ +-------+ +-------+ + Node1 + + Node2 + + Node3 + + Node4 + + +-- c ---+ +-- c ---+ +-- c ---+ + ----+---\ + + + + + + + <---+---\\--+--------+-------+---\ + + + /--+---> + \--+--------+-------+---\\---+-------+---##---+---//--+---- + + + + \---+-------+--------+---/ + + + + + + + (a) + + ----+-------+--------+---\ + + + + + <---+-------+--------+---\\--+---##---+--\ + + + + + + \--+---##---+--\\ + + + + + + + (b) + \\--+--------+-------+---> + + + + + \--+--------+-------+---- + + + + + + + + +-------+ +-------+ +-------+ +-------+ Figure 2: Two types of data link failures are shown (indicated by ## in the figure): (A) a data link corresponding to the downstream direction of a bi-directional LSP fails, (B) two data links corresponding to both directions of a bi-directional LSP fail. The control channel connecting two nodes is indicated with a "c". 6.4. Channel Activation Indication J. Lang, Editor Standards Track [Page 22] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The ChannelStatus message may also be used to notify an LMP neighbor that the data link should be actively monitored. This is called Channel Activation Indication. This is particularly useful in networks with transparent nodes where the status of data links may need to be triggered using control channel messages. For example, if a data link is pre-provisioned and the physical link fails after verification and before inserting user traffic, a mechanism is needed to indicate the data link should be active or the failure may not be able to be detected. The ChannelStatus message is used to indicate that a channel or group of channels are now active. The ChannelStatusAck message MUST be transmitted upon receipt of a ChannelStatus message. When a ChannelStatus message is received, the corresponding data link(s) MUST be put into the Active state. If upon putting them into the Active state, a failure is detected, the ChannelStatus message SHOULD be transmitted as described in Section 6.2. 6.5. Channel Deactivation Indication The ChannelStatus message may also be used to notify an LMP neighbor that the data link no longer needs to be actively monitored. This is the counterpart to the Channel Active Indication. When a ChannelStatus message is received with Channel Deactive Indication, the corresponding data link(s) MUST be taken out of the Active state. 7. Message_Id Usage The MESSAGE_ID and MESSAGE_ID_ACK objects are included in LMP messages to support reliable message delivery. This section describes the usage of these objects. The MESSAGE_ID and MESSAGE_ID_ACK objects contain a Message_Id field. Only one MESSAGE_ID/MESSAGE_ID_ACK object may be included in any LMP message. For control channel specific messages, the Message_Id field is within the scope of the CC_Id. For TE link specific messages, the Message_Id field is within the scope of the LMP adjacency. The Message_Id field of the MESSAGE_ID object contains a generator- selected value. This value MUST be monotonically increasing. A value is considered to be previously used when it has been sent in an LMP message with the same CC_Id (for control channel specific messages) or LMP adjacency (for TE Link specific messages). The Message_Id field of the MESSAGE_ID_ACK object contains the Message_Id field of the message being acknowledged. J. Lang, Editor Standards Track [Page 23] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Unacknowledged messages sent with the MESSAGE_ID object SHOULD be retransmitted until the message is acknowledged or until a retry limit is reached (see also Section 10). Note that the 32-bit Message_Id value may wrap. The following expression may be used to test if a newly received Message_Id value is less than a previously received value: If ((int) old_id - (int) new_id > 0) { New value is less than old value; } Nodes processing incoming messages SHOULD check to see if a newly received message is out of order and can be ignored. Out-of-order messages can be identified by examining the value in the Message_Id field. If a message is determined to be out-of-order, that message should be silently dropped. If the message is a Config message, and the Message_Id value is less than the largest Message_Id value previously received from the sender for the CC_Id, then the message SHOULD be treated as being out-of-order. If the message is a LinkSummary message and the Message_Id value is less than the largest Message_Id value previously received from the sender for the TE Link, then the message SHOULD be treated as being out-of-order. If the message is a ChannelStatus message and the Message_Id value is less than the largest Message_Id value previously received from the sender for the specified TE link, then the receiver SHOULD check the Message_Id value previously received for the state of each data channel included in the ChannelStatus message. If the Message_Id value is greater than the most recently received Message_Id value associated with at least one of the data channels included in the message, the message MUST NOT be treated as out of order; otherwise the message SHOULD be treated as being out of order. However, the state of any data channel MUST NOT be updated if the Message_Id value is less than the most recently received Message_Id value associated with the data channel. All other messages MUST NOT be treated as out-of-order. 8. Graceful Restart This section describes the mechanism to resynchronize the LMP state after a control plane restart. A control plane restart may occur when bringing up the first control channel after a control communications failure. A control communications failure may be the result of an LMP adjacency failure or a nodal failure wherein the LMP control state is lost, but the data plane is unaffected. The latter is detected by setting the "LMP Restart" bit in the Common J. Lang, Editor Standards Track [Page 24] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Header of the LMP messages. When the control plane fails due to the loss of the control channel, the LMP link information should be retained. It is possible that a node may be capable of retaining the LMP link information across a nodal failure. However, in both cases the status of the data channels MUST be synchronized. It is assumed the Node_Id and Local Interface_Ids remain stable across a control plane restart. After the control plane of a node restarts, the control channel(s) must be re-established using the procedures of Section 3.1. When re- establishing control channels, the Config message SHOULD be sent using the unicast IP source and destination addresses. If the control plane failure was the result of a nodal failure where the LMP control state is lost, then the "LMP Restart" flag MUST be set in LMP messages until a Hello message is received with the RcvSeqNum equal to the local TxSeqNum. This indicates that the control channel is up and the LMP neighbor has detected the restart. The following assumes that the LMP component restart only occurred on one end of the TE Link. If the LMP component restart occurred on both ends of the TE Link, the normal procedures for LinkSummary should be used, as described in Section 4. Once a control channel is up, the LMP neighbor MUST send a LinkSummary message for each TE Link across the adjacency. All the objects of the LinkSummary message MUST have the N-bit set to 0 indicating that the parameters are non-negotiable. This provides the local/remote Link_Id and Interface_Id mappings, the associated data link parameters, and indication of which data links are currently allocated to user traffic. When a node receives the LinkSummary message, it checks its local configuration. If the node is capable of retaining the LMP link information across a restart, it must process the LinkSummary message as described in Section 4 with the exception that the allocated/de-allocated flag of the DATA_LINK object received in the LinkSummary message MUST take precedence over any local value. If, however, the node was not capable of retaining the LMP link information across a restart, the node MUST accept the data link parameters of the received LinkSummary message and respond with a LinkSummaryAck message. Upon completion of the LinkSummary exchange, the node that has restarted the control plane SHOULD send a ChannelStatusRequest message for that TE link. The node SHOULD also verify the connectivity of all unallocated data channels. 9. Addressing All LMP messages are run over UDP with an LMP port number (except, in some cases, the Test messages which may be limited by the J. Lang, Editor Standards Track [Page 25] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 transport mechanism for in-band messaging). The destination address of the IP packet MAY be either the address learned in the Configuration procedure (i.e., the Source IP address found in the IP header of the received Config message), an IP address configured on the remote node, or the Node_Id. The Config message is an exception as described below. The manner in which a Config message is addressed may depend on the signaling transport mechanism. When the transport mechanism is a point-to-point link, Config messages SHOULD be sent to the Multicast address (224.0.0.1 or ff02::1). Otherwise, Config messages MUST be sent to an IP address on the neighboring node. This may be configured at both ends of the control channel or may be automatically discovered. 10. Exponential Back-off Procedures This section is based on [RFC2961] and provides exponential back-off procedures for message retransmission. Implementations MUST use the described procedures or their equivalent. 10.1. Operation The following operation is one possible mechanism for exponential back-off retransmission of unacknowledged LMP messages. The sending node retransmits the message until an acknowledgement message is received or until a retry limit is reached. When the sending node receives the acknowledgement, retransmission of the message is stopped. The interval between message retransmission is governed by a rapid retransmission timer. The rapid retransmission timer starts at a small interval and increases exponentially until it reaches a threshold. The following time parameters are useful to characterize the procedures: Rapid retransmission interval Ri: Ri is the initial retransmission interval for unacknowledged messages. After sending the message for the first time, the sending node will schedule a retransmission after Ri milliseconds. Rapid retry limit Rl: Rl is the maximum number of times a message will be transmitted without being acknowledged. Increment value Delta: J. Lang, Editor Standards Track [Page 26] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Delta governs the speed with which the sender increases the retransmission interval. The ratio of two successive retransmission intervals is (1 + Delta). Suggested default values for an initial retransmission interval (Ri) of 500ms, a power of 2 exponential back-off (Delta = 1) and a retry limit of 3. 10.2. Retransmission Algorithm After a node transmits a message requiring acknowledgement, it should immediately schedule a retransmission after Ri seconds. If a corresponding acknowledgement message is received before Ri seconds, then message retransmission SHOULD be canceled. Otherwise, it will retransmit the message after (1+Delta)*Ri seconds. The retransmission will continue until either an appropriate acknowledgement message is received or the rapid retry limit, Rl, has been reached. A sending node can use the following algorithm when transmitting a message that requires acknowledgement: Prior to initial transmission, initialize Rk = Ri and Rn = 0. while (Rn++ < Rl) { transmit the message; wake up after Rk milliseconds; Rk = Rk * (1 + Delta); } /* acknowledged message or no reply from receiver and Rl reached*/ do any needed clean up; exit; Asynchronously, when a sending node receives a corresponding acknowledgment message, it will change the retry count, Rn, to Rl. Note that the transmitting node does not advertise or negotiate the use of the described exponential back-off procedures in the Config or LinkSummary messages. 11. LMP Finite State Machines 11.1. Control Channel FSM The control channel FSM defines the states and logics of operation of an LMP control channel. 11.1.1. Control Channel States A control channel can be in one of the states described below. Every state corresponds to a certain condition of the control J. Lang, Editor Standards Track [Page 27] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 channel and is usually associated with a specific type of LMP message that is periodically transmitted to the far end. Down: This is the initial control channel state. In this state, no attempt is being made to bring the control channel up and no LMP messages are sent. The control channel parameters should be set to the initial values. ConfSnd: The control channel is in the parameter negotiation state. In this state the node periodically sends a Config message, and is expecting the other side to reply with either a ConfigAck or ConfigNack message. The FSM does not transition into the Active state until the remote side positively acknowledges the parameters. ConfRcv: The control channel is in the parameter negotiation state. In this state, the node is waiting for acceptable configuration parameters from the remote side. Once such parameters are received and acknowledged, the FSM can transition to the Active state. Active: In this state the node periodically sends a Hello message and is waiting to receive a valid Hello message. Once a valid Hello message is received, it can transition to the up state. Up: The CC is in an operational state. The node receives valid Hello messages and sends Hello messages. GoingDown: A CC may go into this state because of administrative action. While a CC is in this state, the node sets the ControlChannelDown bit in all the messages it sends. 11.1.2. Control Channel Events Operation of the LMP control channel is described in terms of FSM states and events. Control channel events are generated by the underlying protocols and software modules, as well as by the packet processing routines and FSMs of associated TE links. Every event has its number and a symbolic name. Description of possible control channel events is given below. 1 : evBringUp: This is an externally triggered event indicating that the control channel negotiation should begin. This event, for example, may be triggered by an operator command, by the successful completion of a control channel bootstrap procedure, or by configuration. Depending on the configuration, this will trigger either 1a) the sending of a Config message, J. Lang, Editor Standards Track [Page 28] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 1b) a period of waiting to receive a Config message from the remote node. 2 : evCCDn: This event is generated when there is indication that the control channel is no longer available. 3 : evConfDone: This event indicates a ConfigAck message has been received, acknowledging the Config parameters. 4 : evConfErr: This event indicates a ConfigNack message has been received, rejecting the Config parameters. 5 : evNewConfOK: New Config message was received from neighbor and positively acknowledged. 6 : evNewConfErr: New Config message was received from neighbor and rejected with a ConfigNack message. 7 : evContenWin: New Config message was received from neighbor at the same time a Config message was sent to the neighbor. The local node wins the contention. As a result, the received Config message is ignored. 8 : evContenLost: New Config message was received from neighbor at the same time a Config message was sent to the neighbor. The local node loses the contention. 8a) The Config message is positively acknowledged. 8b) The Config message is negatively acknowledged. 9 : evAdminDown: The administrator has requested that the control channel is brought down administratively. 10: evNbrGoesDn: A packet with ControlChannelDown flag is received from the neighbor. 11: evHelloRcvd: A Hello packet with expected SeqNum has been received. 12: evHoldTimer: The HelloDeadInterval timer has expired indicating that no Hello packet has been received. This moves the control channel back into the Negotiation state, and depending on the local configuration, this will trigger either 12a) the sending of periodic Config messages, 12b) a period of waiting to receive Config messages from the remote node. 13: evSeqNumErr: A Hello with unexpected SeqNum received and discarded. J. Lang, Editor Standards Track [Page 29] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 14: evReconfig: Control channel parameters have been reconfigured and require renegotiation. 15: evConfRet: A retransmission timer has expired and a Config message is resent. 16: evHelloRet: The HelloInterval timer has expired and a Hello packet is sent. 17: evDownTimer: A timer has expired and no messages have been received with the ControlChannelDown flag set. 11.1.3. Control Channel FSM Description Figure 3 illustrates operation of the control channel FSM in a form of FSM state transition diagram. +--------+ +----------------->| |<--------------+ | +--------->| Down |<----------+ | | |+---------| |<-------+ | | | || +--------+ | | | | || | ^ 2,9| 2| 2| | ||1b 1a| | | | | | || v |2,9 | | | | || +--------+ | | | | || +->| |<------+| | | | || 4,7,| |ConfSnd | || | | | || 14,15+--| |<----+ || | | | || +--------+ | || | | | || 3,8a| | | || | | | || +---------+ |8b 14,12a| || | | | || | v | || | | | |+-|------>+--------+ | || | | | | | +->| |-----|-|+ | | | | |6,14| |ConfRcv | | | | | | | | +--| |<--+ | | | | | | | +--------+ | | | | | | | | 5| ^ | | | | | | | +---------+ | | | | | | | | | | | | | | | | | | | v v |6,12b | | | | | | |10 +--------+ | | | | | | +----------| | | | | | | | | +--| Active |---|-+ | | | 10,17| | 5,16| | |-------|---+ | +-------+ 9 | 13 +->| | | | | | Going |<--|----------+--------+ | | | | Down | | 11| ^ | | | +-------+ | | |5 | | | ^ | v | 6,12b| | | |9 |10 +--------+ | |12a,14 | J. Lang, Editor Standards Track [Page 30] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 | +----------| |---+ | | | | Up |-------+ | +------------------| |---------------+ +--------+ | ^ | | +---+ 11,13,16 Figure 3: Control Channel FSM Event evCCDn always forces the FSM to the down state. Events evHoldTimer evReconfig always force the FSM to the Negotiation state (either ConfSnd or ConfRcv). 11.2. TE Link FSM The TE Link FSM defines the states and logics of operation of the LMP TE Link. 11.2.1. TE Link States An LMP TE link can be in one of the states described below. Every state corresponds to a certain condition of the TE link and is usually associated with a specific type of LMP message that is periodically transmitted to the far end via the associated control channel or in-band via the data links. Down: There are no data links allocated to the TE link. Init: Data links have been allocated to the TE link, but the configuration has not yet been synchronized with the LMP neighbor. The LinkSummary message is periodically transmitted to the LMP neighbor. Up: This is the normal operational state of the TE link. At least one LMP control channel is required to be operational between the nodes sharing the TE link. As part of normal operation, the LinkSummary message may be periodically transmitted to the LMP neighbor or generated by an external request. Degraded: In this state, all LMP control channels are down, but the TE link still includes some data links that are allocated to user traffic. 11.2.2. TE Link Events Operation of the LMP TE link is described in terms of FSM states and events. TE Link events are generated by the packet processing J. Lang, Editor Standards Track [Page 31] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 routines and by the FSMs of the associated control channel(s) and the data links. Every event has its number and a symbolic name. Description of possible events is given below. 1 : evDCUp: One or more data channels have been enabled and assigned to the TE Link. 2 : evSumAck: LinkSummary message received and positively acknowledged. 3 : evSumNack: LinkSummary message received and negatively acknowledged. 4 : evRcvAck: LinkSummaryAck message received acknowledging the TE Link Configuration. 5 : evRcvNack: LinkSummaryNack message received. 6 : evSumRet: Retransmission timer has expired and LinkSummary message is resent. 7 : evCCUp: First active control channel goes up. 8 : evCCDown: Last active control channel goes down. 9 : evDCDown: Last data channel of TE Link has been removed. 11.2.3. TE Link FSM Description Figure 4 illustrates operation of the LMP TE Link FSM in a form of FSM state transition diagram. 3,7,8 +--+ | | | v +--------+ | | +------------>| Down |<---------+ | | | | | +--------+ | | | ^ | | 1| |9 | | v | | | +--------+ | | | |<-+ | | | Init | |3,5,6 |9 | | |--+ 7,8 | 9| +--------+ | | | | | 2,4| | | v | J. Lang, Editor Standards Track [Page 32] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 +--------+ 7 +--------+ | | |------>| |----------+ | Deg | | Up | | |<------| | +--------+ 8 +--------+ | ^ | | +--+ 2,3,4,5,6 Figure 4: LMP TE Link FSM In the above FSM, the sub-states that may be implemented when the link verification procedure is used have been omitted. 11.3. Data Link FSM The data link FSM defines the states and logics of operation of a data link within an LMP TE link. Operation of a data link is described in terms of FSM states and events. Data links can either be in the active (transmitting) mode, where Test messages are transmitted from them, or the passive (receiving) mode, where Test messages are received through them. For clarity, separate FSMs are defined for the active/passive data links; however, a single set of data link states and events are defined. 11.3.1. Data Link States Any data link can be in one of the states described below. Every state corresponds to a certain condition of the data link. Down: The data link has not been put in the resource pool (i.e., the link is not 'in service') Test: The data link is being tested. An LMP Test message is periodically sent through the link. PasvTest: The data link is being checked for incoming test messages. Up/Free: The link has been successfully tested and is now put in the pool of resources (in-service). The link has not yet been allocated to data traffic. Up/Alloc: The link is up and has been allocated for data traffic. 11.3.2. Data Link Events Data link events are generated by the packet processing routines and by the FSMs of the associated control channel and the TE link. J. Lang, Editor Standards Track [Page 33] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Every event has its number and a symbolic name. Description of possible data link events is given below: 1 :evCCUp: First active control channel goes up. 2 :evCCDown: LMP neighbor connectivity is lost. This indicates the last LMP control channel has failed between neighboring nodes. 3 :evStartTst: This is an external event that triggers the sending of Test messages over the data link. 4 :evStartPsv: This is an external event that triggers the listening for Test messages over the data link. 5 :evTestOK: Link verification was successful and the link can be used for path establishment. (a) This event indicates the Link Verification procedure (see Section 5) was successful for this data link and a TestStatusSuccess message was received over the control channel. (b) This event indicates the link is ready for path establishment, but the Link Verification procedure was not used. For in-band signaling of the control channel, the control channel establishment may be sufficient to verify the link. 6 :evTestRcv: Test message was received over the data port and a TestStatusSuccess message is transmitted over the control channel. 7 :evTestFail: Link verification returned negative results. This could be because (a) a TestStatusFailure message was received, or (b) the Verification procedure has ended without receiving a TestStatusSuccess or TestStatusFailure message for the data link. 8 :evPsvTestFail:Link verification returned negative results. This indicates that a Test message was not detected and either (a) the VerifyDeadInterval has expired or (b) the Verification procedure has ended and the VerifyDeadInterval has not yet expired. 9 :evLnkAlloc: The data link has been allocated. 10:evLnkDealloc: The data link has been de-allocated. 11:evTestRet: A retransmission timer has expired and the Test message is resent. J. Lang, Editor Standards Track [Page 34] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 12:evSummaryFail: The LinkSummary did not match for this data port. 13:evLocalizeFail: A Failure has been localized to this data link. 14:evdcDown: The data channel is no longer available. 11.3.3. Active Data Link FSM Description Figure 5 illustrates operation of the LMP active data link FSM in a form of FSM state transition diagram. +------+ | |<-------+ +--------->| Down | | | +----| |<-----+ | | | +------+ | | | |5b 3| ^ | | | | | |7 | | | | v | | | | | +------+ | | | | | |<-+ | | | | | Test | |11 | | | | | |--+ | | | | +------+ | | | | 5a| 3^ | | | | | | | | | | v | | | |12 | +---------+ | | | +-->| |14 | | | | Up/Free |----+ | +---------| | | +---------+ | 9| ^ | | | | v |10 | +---------+ | | |13 | |Up/Alloc |------+ | | +---------+ Figure 5: Active LMP Data Link FSM 11.3.4. Passive Data Link FSM Description Figure 6 illustrates operation of the LMP passive data link FSM in a form of FSM state transition diagram. J. Lang, Editor Standards Track [Page 35] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 +------+ | |<------+ +---------->| Down | | | +-----| |<----+ | | | +------+ | | | |5b 4| ^ | | | | | |8 | | | | v | | | | | +----------+ | | | | | PasvTest | | | | | +----------+ | | | | 6| 4^ | | | | | | | | | | v | | | |12 | +---------+ | | | +--->| Up/Free |14 | | | | |---+ | +----------| | | +---------+ | 9| ^ | | | | v |10 | +---------+ | | |13 | |Up/Alloc |-----+ | | +---------+ Figure 6: Passive LMP Data Link FSM 12. LMP Message Formats All LMP messages (except, in some cases, the Test messages which, are limited by the transport mechanism for in-band messaging) are run over UDP with an LMP port number to be assigned by IANA. 12.1. Common Header In addition to the UDP header and standard IP header, all LMP messages (except, in some cases, the Test messages which may be limited by the transport mechanism for in-band messaging) have the following common header: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Vers | (Reserved) | Flags | Msg Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LMP Length | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ J. Lang, Editor Standards Track [Page 36] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The Reserved field should be sent as zero and ignored on receipt. All values are defined in network byte order (i.e., big-endian byte order). Vers: 4 bits Protocol version number. This is version 1. Flags: 8 bits The following bit-values are defined. All other bits are reserved and should be sent as zero and ignored on receipt. 0x01: ControlChannelDown 0x02: LMP Restart This bit is set to indicate that a nodal failure has occured and the LMP control state has been lost. This flag may be reset to 0 when a Hello message is received with RcvSeqNum equal to the local TxSeqNum. Msg Type: 8 bits The following values are defined. All other values are reserved 1 = Config 2 = ConfigAck 3 = ConfigNack 4 = Hello 5 = BeginVerify 6 = BeginVerifyAck 7 = BeginVerifyNack 8 = EndVerify 9 = EndVerifyAck 10 = Test 11 = TestStatusSuccess 12 = TestStatusFailure J. Lang, Editor Standards Track [Page 37] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 13 = TestStatusAck 14 = LinkSummary 15 = LinkSummaryAck 16 = LinkSummaryNack 17 = ChannelStatus 18 = ChannelStatusAck 19 = ChannelStatusRequest 20 = ChannelStatusResponse All of the messages are sent over the control channel EXCEPT the Test message, which is sent over the data link that is being tested. LMP Length: 16 bits The total length of this LMP message in bytes, including the common header and any variable-length objects that follow. 12.2. LMP Object Format LMP messages are built using objects. Each object is identified by its Object Class and Class-type. Each object has a name, which is always capitalized in this document. LMP objects can be either negotiable or non-negotiable (identified by the N bit in the object header). Negotiable objects can be used to let the devices agree on certain values. Non-negotiable objects are used for announcement of specific values that do not need or do not allow negotiation. All values are defined in network byte order (i.e., big-endian byte order). The format of the LMP object is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |N| C-Type | Class | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // (object contents) // | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ N: 1 bit J. Lang, Editor Standards Track [Page 38] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The N flag indicates if the object is negotiable (N=1) or non- negotiable (N=0). C-Type: 7 bits Class-type, unique within an Object Class. Values are defined in Section 13. Class: 8 bits The Class indicates the object type. Each object has a name, which is always capitalized in this document. Length: 16 bits The Length field indicates the length of the object in bytes, including the N, C-Type, Class, and Length fields. 12.3. Parameter Negotiation Messages 12.3.1. Config Message (Msg Type = 1) The Config message is used in the control channel negotiation phase of LMP. The contents of the Config message are built using LMP objects. The format of the Config message is as follows: ::= The above transmission order SHOULD be followed. The MESSAGE_ID object is within the scope of the LOCAL_CCID object. The Config message MUST be periodically transmitted until (1) it receives a ConfigAck or ConfigNack message, (2) a retry limit has been reached and no ConfigAck or ConfigNack message has been received, or (3) it receives a Config message from the remote node and has lost the contention (e.g., the Node_Id of the remote node is higher than the Node_Id of the local node). Both the retransmission interval and the retry limit are local configuration parameters. 12.3.2. ConfigAck Message (Msg Type = 2) The ConfigAck message is used to acknowledge receipt of the Config message and indicate agreement on all parameters. ::= The above transmission order SHOULD be followed. J. Lang, Editor Standards Track [Page 39] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The contents of the REMOTE_CCID, MESSAGE_ID_ACK, and REMOTE_NODE_ID objects MUST be obtained from the Config message being acknowledged. 12.3.3. ConfigNack Message (Msg Type = 3) The ConfigNack message is used to acknowledge receipt of the Config message and indicate disagreement on non-negotiable parameters or propose other values for negotiable parameters. Parameters where agreement was reached MUST NOT be included in the ConfigNack Message. The format of the ConfigNack message is as follows: ::= The above transmission order SHOULD be followed. The contents of the REMOTE_CCID, MESSAGE_ID_ACK, and REMOTE_NODE_ID objects MUST be obtained from the Config message being negatively acknowledged. It is possible that multiple parameters may be invalid in the Config message. If a negotiable CONFIG object is included in the ConfigNack message, it MUST include acceptable values for the parameters. If the ConfigNack message includes CONFIG objects for non-negotiable parameters, they MUST be copied from the CONFIG objects received in the Config message. If the ConfigNack message is received and only includes CONFIG objects that are negotiable, then a new Config message SHOULD be sent. The values in the CONFIG object of the new Config message SHOULD take into account the acceptable values included in the ConfigNack message. If a node receives a Config message and recognizes the CONFIG object but does not recognize the C-Type, a ConfigNack message including the unknown CONFIG object MUST be sent. 12.4. Hello Message (Msg Type = 4) The format of the Hello message is as follows: ::= The above transmission order SHOULD be followed. The Hello message MUST be periodically transmitted at least once every HelloInterval msec. If no Hello message is received within the HelloDeadInterval, the control channel is assumed to have failed. J. Lang, Editor Standards Track [Page 40] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 12.5. Link Verification Messages 12.5.1. BeginVerify Message (Msg Type = 5) The BeginVerify message is sent over the control channel and is used to initiate the link verification process. The format is as follows: ::= [] The above transmission order SHOULD be followed. To limit the scope of Link Verification to a particular TE Link, the Link_Id field of the LOCAL_LINK_ID object MUST be non-zero. If this field is zero, the data links can span multiple TE links and/or they may comprise a TE link that is yet to be configured. In the special case where the local Link_Id field is zero, the "Verify all Links" flag of the BEGIN_VERIFY object is used to distinguish between data links that span multiple TE links and those that have not yet been assigned to a TE link (see Section 5). The REMOTE_LINK_ID object may be included if the local/remote Link_Id mapping is known. The Link_Id field of the REMOTE_LINK_ID object MUST be non-zero if included. The BeginVerify message MUST be periodically transmitted until (1) the node receives either a BeginVerifyAck or BeginVerifyNack message to accept or reject the verify process or (2) a retry limit has been reached and no BeginVerifyAck or BeginVerifyNack message has been received. Both the retransmission interval and the retry limit are local configuration parameters. 12.5.2. BeginVerifyAck Message (Msg Type = 6) When a BeginVerify message is received and Test messages are ready to be processed, a BeginVerifyAck message MUST be transmitted. ::= [] The above transmission order SHOULD be followed. The LOCAL_LINK_ID object may be included if the local/remote Link_Id mapping is known or learned through the BeginVerify message. The Link_Id field of the LOCAL_LINK_ID MUST be non-zero if included. J. Lang, Editor Standards Track [Page 41] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The contents of the MESSAGE_ID_ACK object MUST be obtained from the BeginVerify message being acknowledged. The VERIFY_ID object contains a node-unique value that is assigned by the generator of the BeginVerifyAck message. This value is used to uniquely identify the Verification process from multiple LMP neighbors and/or parallel Test procedures between the same LMP neighbors. 12.5.3. BeginVerifyNack Message (Msg Type = 7) If a BeginVerify message is received and a node is unwilling or unable to begin the Verification procedure, a BeginVerifyNack message MUST be transmitted. ::= [] The above transmission order SHOULD be followed. The contents of the MESSAGE_ID_ACK object MUST be obtained from the BeginVerify message being negatively acknowledged. If the Verification process is not supported, the ERROR_CODE MUST indicate "Link Verification Procedure not supported". If Verification is supported, but the node is unable to begin the procedure, the ERROR_CODE MUST indicate "Unwilling to verify". If a BeginVerifyNack message is received with such an ERROR_CODE, the node that originated the BeginVerify SHOULD schedule a BeginVerify retransmission after Rf seconds, where Rf is a locally defined parameter. If the Verification Transport mechanism is not supported, the ERROR_CODE MUST indicate, "Unsupported verification transport mechanism". If remote configuration of the Link_Id is not supported and the content of the REMOTE_LINK_ID object (included in the BeginVerify message) does not match any configured values, the ERROR_CODE MUST indicate "Link_Id configuration error". If a node receives a BeginVerify message and recognizes the BEGIN_VERIFY object but does not recognize the C-Type, the ERROR_CODE MUST indicate, "Unknown object C-Type". 12.5.4. EndVerify Message (Msg Type = 8) The EndVerify message is sent over the control channel and is used to terminate the link verification process. The EndVerify message J. Lang, Editor Standards Track [Page 42] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 may be sent at any time the initiating node desires to end the Verify procedure. The format is as follows: ::= The above transmission order SHOULD be followed. The EndVerify message will be periodically transmitted until (1) an EndVerifyAck message has been received or (2) a retry limit has been reached and no EndVerifyAck message has been received. Both the retransmission interval and the retry limit are local configuration parameters. 12.5.5. EndVerifyAck Message (Msg Type =9) The EndVerifyAck message is sent over the control channel and is used to acknowledge the termination of the link verification process. The format is as follows: ::= The above transmission order SHOULD be followed. The contents of the MESSAGE_ID_ACK object MUST be obtained from the EndVerify message being acknowledged. 12.5.6. Test Message (Msg Type = 10) The Test message is transmitted over the data link and is used to verify its physical connectivity. Unless explicitly stated, these messages MUST be transmitted over UDP like all other LMP messages. The format of the Test messages is as follows: ::= The above transmission order SHOULD be followed. Note that this message is sent over a data link and NOT over the control channel. The transport mechanism for the Test message is negotiated using Verify Transport Mechanism field of the BEGIN_VERIFY object and the Verify Transport Response field of the BEGIN_VERIFY_ACK object (see Sections 13.8 and 13.9). The local (transmitting) node sends a given Test message periodically (at least once every VerifyInterval ms) on the corresponding data link until (1) it receives a correlating TestStatusSuccess or TestStatusFailure message on the control channel from the remote (receiving) node or (2) all active control channels between the two nodes have failed. The remote node will send a given TestStatus message periodically over the control J. Lang, Editor Standards Track [Page 43] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 channel until it receives either a correlating TestStatusAck message or an EndVerify message is received over the control channel. 12.5.7. TestStatusSuccess Message (Msg Type = 11) The TestStatusSuccess message is transmitted over the control channel and is used to transmit the mapping between the local Interface_Id and the Interface_Id that was received in the Test message. ::= The above transmission order SHOULD be followed. The contents of the REMOTE_INTERFACE_ID object MUST be obtained from the corresponding Test message being positively acknowledged. 12.5.8. TestStatusFailure Message (Msg Type = 12) The TestStatusFailure message is transmitted over the control channel and is used to indicate that the Test message was not received. ::= The above transmission order SHOULD be followed. 12.5.9. TestStatusAck Message (Msg Type = 13) The TestStatusAck message is used to acknowledge receipt of the TestStatusSuccess or TestStatusFailure messages. ::= The above transmission order SHOULD be followed. The contents of the MESSAGE_ID_ACK object MUST be obtained from the TestStatusSuccess or TestStatusFailure message being acknowledged. 12.6. Link Summary Messages 12.6.1. LinkSummary Message (Msg Type = 14) The LinkSummary message is used to synchronize the Interface_Ids and correlate the properties of the TE link. The format of the LinkSummary message is as follows: J. Lang, Editor Standards Track [Page 44] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 ::= [...] The above transmission order SHOULD be followed. The LinkSummary message can be exchanged at any time a link is not in the Verification process. The LinkSummary message MUST be periodically transmitted until (1) the node receives a LinkSummaryAck or LinkSummaryNack message or (2) a retry limit has been reached and no LinkSummaryAck or LinkSummaryNack message has been received. Both the retransmission interval and the retry limit are local configuration parameters. 12.6.2. LinkSummaryAck Message (Msg Type = 15) The LinkSummaryAck message is used to indicate agreement on the Interface_Id synchronization and acceptance/agreement on all the link parameters. It is on the reception of this message that the local node makes the Link_Id associations. ::= The above transmission order SHOULD be followed. 12.6.3. LinkSummaryNack Message (Msg Type = 16) The LinkSummaryNack message is used to indicate disagreement on non- negotiated parameters or propose other values for negotiable parameters. Parameters where agreement was reached MUST NOT be included in the LinkSummaryNack message. ::= [...] The above transmission order SHOULD be followed. The DATA_LINK objects MUST include acceptable values for all negotiable parameters. If the LinkSummaryNack includes DATA_LINK objects for non-negotiable parameters, they MUST be copied from the DATA_LINK objects received in the LinkSummary message. If the LinkSummaryNack message is received and only includes negotiable parameters, then a new LinkSummary message SHOULD be sent. The values received in the new LinkSummary message SHOULD take into account the acceptable parameters included in the LinkSummaryNack message. If the LinkSummary message is received with unacceptable non- negotiable parameters, the ERROR_CODE MUST indicate "Unacceptable non-netotiable LINK_SUMMARY parameters." J. Lang, Editor Standards Track [Page 45] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 If the LinkSummary message is received with unacceptable negotiable parameters, the ERROR_CODE MUST indicate "Renegotiate LINK_SUMMARY parameters." If the LinkSummary message is received with an invalid TE_LINK object, the ERROR_CODE MUST indicate "Invalid TE_LINK object." If the LinkSummary message is received with an invalid DATA_LINK object, the ERROR_CODE MUST indicate "Invalid DATA_LINK object." If the LinkSummary message is received with a TE_LINK object but the C-Type is unknown, the ERROR_CODE MUST indicate, "Unknown TE_LINK object C-Type." If the LinkSummary message is received with a DATA_LINK object but the C-Type is unknown, the ERROR_CODE MUST indicate, "Unknown DATA_LINK object C-Type." 12.7. Fault Management Messages 12.7.1. ChannelStatus Message (Msg Type = 17) The ChannelStatus message is sent over the control channel and is used to notify an LMP neighbor of the status of a data link. A node that receives a ChannelStatus message MUST respond with a ChannelStatusAck message. The format is as follows: ::= The above transmission order SHOULD be followed. If the CHANNEL_STATUS object does not include any Interface_Ids, then this indicates the entire TE Link has failed. 12.7.2. ChannelStatusAck Message (Msg Type = 18) The ChannelStatusAck message is used to acknowledge receipt of the ChannelStatus Message. The format is as follows: ::= The above transmission order SHOULD be followed. The contents of the MESSAGE_ID_ACK object MUST be obtained from the ChannelStatus message being acknowledged. 12.7.3. ChannelStatusRequest Message (Msg Type = 19) The ChannelStatusRequest message is sent over the control channel and is used to request the status of one or more data link(s). A J. Lang, Editor Standards Track [Page 46] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 node that receives a ChannelStatusRequest message MUST respond with a ChannelStatusResponse message. The format is as follows: ::= [] The above transmission order SHOULD be followed. If the CHANNEL_STATUS_REQUEST object is not included, then the ChannelStatusRequest is being used to request the status of ALL of the data link(s) of the TE Link. 12.7.4. ChannelStatusResponse Message (Msg Type = 20) The ChannelStatusResponse message is used to acknowledge receipt of the ChannelStatusRequest Message and notify the LMP neighbor of the status of the data channel(s). The format is as follows: ::= The above transmission order SHOULD be followed. The contents of the MESSAGE_ID_ACK objects MUST be obtained from the ChannelStatusRequest message being acknowledged. 13. LMP Object Definitions 13.1. CCID (Control Channel ID) Class Class = 1 o C-Type = 1, LOCAL_CCID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CC_Id | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ CC_Id: 32 bits This MUST be node-wide unique and non-zero. The CC_Id identifies the control channel of the sender associated with the message. This object is non-negotiable. o C-Type = 2, REMOTE_CCID 0 1 2 3 J. Lang, Editor Standards Track [Page 47] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CC_Id | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ CC_Id: 32 bits This identifies the remote node's CC_Id and MUST be non-zero. This object is non-negotiable. 13.2. NODE_ID Class Class = 2 o C-Type = 1, LOCAL_NODE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Node_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Node_Id: This identities the node that originated the LMP packet. This object is non-negotiable. o C-Type = 2, REMOTE_NODE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Node_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Node_Id: This identities the remote node. This object is non-negotiable. 13.3. LINK_ID Class Class = 3 o C-Type = 1, IPv4 LOCAL_LINK_ID o C-Type = 2, IPv4 REMOTE_LINK_ID 0 1 2 3 J. Lang, Editor Standards Track [Page 48] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Link_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 3, IPv6 LOCAL_LINK_ID o C-Type = 4, IPv6 REMOTE_LINK_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Link_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 5, Unnumbered LOCAL_LINK_ID o C-Type = 6, Unnumbered REMOTE_LINK_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Link_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Link_Id: For LOCAL_LINK_ID, this identifies the sender's Link associated with the message. This value MUST be non-zero. For REMOTE_LINK_ID, this identifies the remote node's Link_Id and MUST be non-zero. This object is non-negotiable. 13.4. INTERFACE_ID Class Class = 4 o C-Type = 1, IPv4 LOCAL_INTERFACE_ID o C-Type = 2, IPv4 REMOTE_INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 J. Lang, Editor Standards Track [Page 49] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 3, IPv6 LOCAL_INTERFACE_ID o C-Type = 4, IPv6 REMOTE_INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Interface_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 5, Unnumbered LOCAL_INTERFACE_ID o C-Type = 6, Unnumbered REMOTE_INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Interface_Id: For the LOCAL_INTERFACE_ID, this identifies the data link. This value MUST be node-wide unique and non-zero. For the REMOTE_INTERFACE_ID, this identifies the remote node's data link. The Interface_Id MUST be non-zero. This object is non-negotiable. 13.5. MESSAGE_ID Class Class = 5 o C-Type=1, MessageId 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message_Id | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ J. Lang, Editor Standards Track [Page 50] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Message_Id: The Message_Id field is used to identify a message. This value is incremented and only decreases when the value wraps. This is used for message acknowledgment. This object is non-negotiable. o C-Type = 2, MessageIdAck 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message_Id | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Message_Id: The Message_Id field is used to identify the message being acknowledged. This value is copied from the MESSAGE_ID object of the message being acknowledged. This object is non-negotiable. 13.6. CONFIG Class Class = 6. o C-Type = 1, HelloConfig 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | HelloInterval | HelloDeadInterval | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ HelloInterval: 16 bits. Indicates how frequently the Hello packets will be sent and is measured in milliseconds (ms). HelloDeadInterval: 16 bits. If no Hello packets are received within the HelloDeadInterval, the control channel is assumed to have failed. The HelloDeadInterval is measured in milliseconds (ms). The HelloDeadInterval MUST be greater than the HelloInterval, and SHOULD be at least 3 times the value of HelloInterval. If the fast keep-alive mechanism of LMP is not used, the HelloInterval and HelloDeadInterval MUST be set to zero. J. Lang, Editor Standards Track [Page 51] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 13.7. HELLO Class Class = 7 o C-Type = 1, Hello 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TxSeqNum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RcvSeqNum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ TxSeqNum: 32 bits This is the current sequence number for this Hello message. This sequence number will be incremented when the sequence number is reflected in the RcvSeqNum of a Hello packet that is received over the control channel. TxSeqNum=0 is not allowed. TxSeqNum=1 is used to indicate that this is the first Hello message sent over the control channel. RcvSeqNum: 32 bits This is the sequence number of the last Hello message received over the control channel. RcvSeqNum=0 is used to indicate that a Hello message has not yet been received. This object is non-negotiable. 13.8. BEGIN_VERIFY Class Class = 8 o C-Type = 1 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | VerifyInterval | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Number of Data Links | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | EncType | (Reserved) | Verify Transport Mechanism | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TransmissionRate | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Wavelength | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ J. Lang, Editor Standards Track [Page 52] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The Reserved field should be sent as zero and ignored on receipt. Flags: 16 bits The following flags are defined: 0x0001 Verify all Links If this bit is set, the verification process checks all unallocated links; else it only verifies new ports or component links that are to be added to this TE link. 0x0002 Data Link Type If set, the data links to be verified are ports, otherwise they are component links VerifyInterval: 16 bits This is the interval between successive Test messages and is measured in milliseconds (ms). Number of Data Links: 32 bits This is the number of data links that will be verified. EncType: 8 bits This is the encoding type of the data link. The defined EncType values are consistent with the LSP Encoding Type values of [RFC3471]. Verify Transport Mechanism: 16 bits This defines the transport mechanism for the Test Messages. The scope of this bit mask is restricted to each encoding type. The local node will set the bits corresponding to the various mechanisms it can support for transmitting LMP test messages. The receiver chooses the appropriate mechanism in the BeginVerifyAck message. The following flag is defined across all Encoding Types. All other flags are dependent on the Encoding Type. 0x8000 Payload:Test Message transmitted in the payload Capable of transmitting Test messages in the payload. The Test message is sent as an IP packet as defined above. TransmissionRate: 32 bits J. Lang, Editor Standards Track [Page 53] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 This is the transmission rate of the data link over which the Test messages will be transmitted. This is expressed in bytes per second and represented in IEEE floating-point format. Wavelength: 32 bits When a data link is assigned to a port or component link that is capable of transmitting multiple wavelengths (e.g., a fiber or waveband-capable port), it is essential to know which wavelength the test messages will be transmitted over. This value corresponds to the wavelength at which the Test messages will be transmitted over and has local significance. If there is no ambiguity as to the wavelength over which the message will be sent, then this value SHOULD be set to 0. 13.9. BEGIN_VERIFY_ACK Class Class = 9 o C-Type = 1 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | VerifyDeadInterval | Verify_Transport_Response | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ VerifyDeadInterval: 16 bits If a Test message is not detected within the VerifyDeadInterval, then a node will send the TestStatusFailure message for that data link. Verify_Transport_Response: 16 bits The recipient of the BeginVerify message (and the future recipient of the TEST messages) chooses the transport mechanism from the various types that are offered by the transmitter of the Test messages. One and only one bit MUST be set in the verification transport response. This object is non-negotiable. 13.10. VERIFY_ID Class Class = 10 o C-Type = 1 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 J. Lang, Editor Standards Track [Page 54] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Verify_Id | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Verify_Id: 32 bits This is used to differentiate Test messages from different TE links and/or LMP peers. This is a node-unique value that is assigned by the recipient of the BeginVerify message. This object is non-negotiable. 13.11. TE_LINK Class Class = 11 o C-Type = 1, IPv4 TE_LINK 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Local_Link_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Remote_Link_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 2, IPv6 TE_LINK 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Local_Link_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Remote_Link_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ J. Lang, Editor Standards Track [Page 55] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 o C-Type = 3, Unnumbered TE_LINK 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Local_Link_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Remote_Link_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The Reserved field should be sent as zero and ignored on receipt. Flags: 8 bits The following flags are defined. All other bit-values are reserved and should be sent as zero and ignored on receipt. 0x01 Fault Management Supported. 0x02 Link Verification Supported. Local_Link_Id: This identifies the node's local Link_Id and MUST be non-zero. Remote_Link_Id: This identifies the remote node's Link_Id and MUST be non-zero. 13.12. DATA_LINK Class Class = 12 o C-Type = 1, IPv4 DATA_LINK 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Local_Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Remote_Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // (Subobjects) // | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 2, IPv6 DATA_LINK J. Lang, Editor Standards Track [Page 56] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Local_Interface_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Remote_Interface_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // (Subobjects) // | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 3, Unnumbered DATA_LINK 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Local_Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Remote_Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // (Subobjects) // | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The Reserved field should be sent as zero and ignored on receipt. Flags: 8 bits The following flags are defined. All other bit-values are reserved and should be sent as zero and ignored on receipt. 0x01 Interface Type: If set, the data link is a port, otherwise it is a component link. J. Lang, Editor Standards Track [Page 57] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 0x02 Allocated Link: If set, the data link is currently allocated for user traffic. If a single Interface_Id is used for both the transmit and receive data links, then this bit only applies to the transmit interface. 0x04 Failed Link: If set, the data link is failed and not suitable for user traffic. Local_Interface_Id: This is the local identifier of the data link. This MUST be node-wide unique and non-zero. Remote_Interface_Id: This is the remote identifier of the data link. This MUST be non-zero. Subobjects The contents of the DATA_LINK object consist of a series of variable-length data items called subobjects. The subobjects are defined in Section 13.12.1 below. A DATA_LINK object may contain more than one subobject. More than one subobject of the same Type may appear if multiple capabilities are supported over the data link. 13.12.1. Data Link Subobjects The contents of the DATA_LINK object include a series of variable- length data items called subobjects. Each subobject has the form: 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+---------------//--------------+ | Type | Length | (Subobject contents) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+--------------//---------------+ Type: 8 bits The Type indicates the type of contents of the subobject. Currently defined values are: Type = 1, Interface Switching Type Type = 2, Wavelength Length: 8 bits J. Lang, Editor Standards Track [Page 58] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The Length contains the total length of the subobject in bytes, including the Type and Length fields. The Length MUST be at least 4, and MUST be a multiple of 4. 13.12.1.1. Subobject Type 1: Interface Switching Type 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Switching Type| EncType | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Minimum Reservable Bandwidth | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Maximum Reservable Bandwidth | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Switching Type: 8 bits This is used to identify the local Interface Switching Type of the TE link as defined in [RFC3471]. EncType: 8 bits This is the encoding type of the data link. The defined EncType values are consistent with the LSP Encoding Type values of [RFC3471]. Minimum Reservable Bandwidth: 32 bits This is measured in bytes per second and represented in IEEE floating point format. Maximum Reservable Bandwidth: 32 bits This is measured in bytes per second and represented in IEEE floating point format. If the interface only supports a fixed rate, the minimum and maximum bandwidth fields are set to the same value. 13.12.1.2. Subobject Type 2: Wavelength 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Wavelength | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The Reserved field should be sent as zero and ignored on receipt. J. Lang, Editor Standards Track [Page 59] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Wavelength: 32 bits This value indicates the wavelength carried over the port. Values used in this field only have significance between two neighbors. 13.13. CHANNEL_STATUS Class Class = 13 o C-Type = 1, IPv4 INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A|D| Channel Status | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | : | // : // | : | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A|D| Channel Status | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 2, IPv6 INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Interface_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A|D| Channel Status | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | : | // : // | : | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Interface_Id (16 bytes) + J. Lang, Editor Standards Track [Page 60] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A|D| Channel Status | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ o C-Type = 3, Unnumbered INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A|D| Channel Status | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | : | // : // | : | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A|D| Channel_Status | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Active bit: 1 bit This indicates that the Channel is allocated to user traffic and the data link should be actively monitored. Direction bit: 1 bit This indicates the direction (transmit/receive) of the data channel referred to in the CHANNEL_STATUS object. If set, this indicates the data channel is in the transmit direction. Channel_Status: 30 bits This indicates the status condition of a data channel. The following values are defined. All other values are reserved. 1 Signal Okay (OK): Channel is operational 2 Signal Degrade (SD): A soft failure caused by a BER exceeding a preselected threshold. The specific BER used to define the threshold is configured. 3 Signal Fail (SF): A hard signal failure including (but not limited to) loss of signal (LOS), loss of frame (LOF), or Line AIS. This object contains one or more Interface_Ids followed by a Channel_Status field. J. Lang, Editor Standards Track [Page 61] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 To indicate the status of the entire TE Link, there MUST only be one Interface_Id and it MUST be zero. This object is non-negotiable. 13.14. CHANNEL_STATUS_REQUEST Class Class = 14 o C-Type = 1, IPv4 INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | : | // : // | : | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ This object contains one or more Interface_Ids. The Length of this object is 4 + 4N in bytes, where N is the number of Interface_Ids. o C-Type = 2, IPv6 INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Interface_Id (16 bytes) + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | : | // : // | : | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Interface_Id (16 bytes) + | | + + | | J. Lang, Editor Standards Track [Page 62] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ This object contains one or more Interface_Ids. The Length of this object is 4 + 16N in bytes, where N is the number of Interface_Ids. o C-Type = 3, Unnumbered INTERFACE_ID 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | : | // : // | : | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interface_Id (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ This object contains one or more Interface_Ids. The Length of this object is 4 + 4N in bytes, where N is the number of Interface_Ids. This object is non-negotiable. 13.15. ERROR_CODE Class Class = 20 o C-Type = 1, BEGIN_VERIFY_ERROR 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ERROR CODE | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The following bit-values are defined in network byte order (i.e., big-endian byte order): 0x01 = Link Verification Procedure not supported. 0x02 = Unwilling to verify. 0x04 = Unsupported verification transport mechanism. 0x08 = Link_Id configuration error. 0x10 = Unknown object C-Type. All other bit-values are reserved and should be sent as zero and ignored on receipt. J. Lang, Editor Standards Track [Page 63] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Multiple bits may be set to indicate multiple errors. This object is non-negotiable. If a BeginVerifyNack message is received with Error Code 2, the node that originated the BeginVerify SHOULD schedule a BeginVerify retransmission after Rf seconds, where Rf is a locally defined parameter. o C-Type = 2, LINK_SUMMARY_ERROR 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ERROR CODE | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The following bit-values are defined in network byte order (i.e., big-endian byte order): 0x01 =Unacceptable non-negotiable LINK_SUMMARY parameters. 0x02 =Renegotiate LINK_SUMMARY parameters. 0x04 =Invalid TE_LINK Object. 0x08 =Invalid DATA_LINK Object. 0x10 =Unknown TE_LINK object C-Type. 0x20 =Unknown DATA_LINK object C-Type. All other bit-values are reserved and should be sent as zero and ignored on receipt. Multiple bits may be set to indicate multiple errors. This object is non-negotiable. 14. Intellectual Property Considerations The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF Secretariat. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary J. Lang, Editor Standards Track [Page 64] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 rights which may cover technology that may be required to practice this standard. Please address the information to the IETF Executive Director. 15. References 15.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [BUNDLE] Kompella, K., Rekhter, Y., Berger, L., "Link Bundling in MPLS Traffic Engineering," (work in progress). [GMPLS-RTG] Kompella, K., Rekhter, Y. et al, "Routing Extensions in Support of Generalized MPLS," (work in progress). [RFC2961] Berger, L., Gan, D., et al, "RSVP Refresh Overhead Reduction Extensions," RFC 2961, April 2001. [RFC2402] Kent, S., Atkinson, R., "IP Authentication Header," RFC 2402, November 1998. [RFC2406] Kent, S., Atkinson, R., "IP Encapsulating Security Payload (ESP)," RFC 2406, November 1998. [RFC2407] Piper, D., "The Internet IP Security Domain of Interpretation for ISAKMP," RFC 2407, November 1998 [RFC2409] Harkins, D., Carrel, D., "The Internet Key Exchange (IKE)," RFC 2409, November 1998. [RFC3471] Ashwood-Smith, P., Banerjee, A., et al, "Generalized MPLS - Signaling Functional Description," RFC 3473, January 2003. 15.2. Informative References [OSPF-TE] Katz, D., Yeung, D., Kompella, K., "Traffic Engineering Extensions to OSPF," (work in progress). [ISIS-TE] Li, T., Smit, H., "IS-IS extensions for Traffic Engineering," (work in progress). [RFC2401] Kent, S., Atkinson, R., "Security Architecture for the Internet Protocol," RFC 2401, November 1998 [RFC2434] Narten, T. and Alvestrand, H., "Guidelines for Writing an IANA Considerations Section in RFCs," RFC 2434, October 1998. J. Lang, Editor Standards Track [Page 65] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 [RFC3209] Awduche, D. O., Berger, L, et al, "Extensions to RSVP for LSP Tunnels," Internet Draft, RFC 3209, December 2001. 16. Security Considerations There are number of attacks that an LMP protocol session can potentially experience. Some examples include: o an adversary may spoof control packets; o an adversary may modify the control packets in transit; o an adversary may replay control packets; o an adversary may study a number of control packets and try to break the key using cryptographic tools. If the hash/encryption algorithm used has known weaknesses than it becomes easy for the adversary to discover the key using simple tools. This section specifies an IPsec-based security mechanism for LMP. 16.1. Security Requirements The following requirements are applied to the mechanism described in this section. o LMP security MUST be able to provide authentication, integrity, and replay protection. o For LMP traffic, confidentiality is not needed. Only authentication is needed to ensure the control packets (packets sent along the LMP Control Channel) are originating from the right place and have not been modified in transit. LMP Test packets exchanged through the data links do not need to be protected. o For LMP traffic, protecting the identity of LMP end-points is not commonly required. o Security mechanism should provide for well defined key management schemes. The key management schemes should be well analyzed to be cryptographically secure. The key management schemes should be scalable. In addition, the key management system should be automatic. o The algorithms used for authentication MUST be cryptographically sound. Also the security protocol MUST allow for negotiating and using different authentication algorithms. J. Lang, Editor Standards Track [Page 66] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 16.2. Security Mechanisms IPsec is a protocol suite that is used to secure communication at the network layer between two peers. This protocol is comprised of IP Security architecture document [RFC2401], IKE [RFC2409], IPsec AH [RFC2402], and IPsec ESP [RFC2406]. IKE is the key management protocol for IP networks while AH and ESP are used to protect IP traffic. IKE is defined specific to IP domain of interpretation. Considering the requirements described in Section 16.1, it is recommended that where security is needed for LMP, implementations use IPsec as described below: 1. Implementations of LMP over IPsec protocol SHOULD support manual keying mode. Manual keying mode provides an easy way to set up and diagnose IPsec functionality. However, note that manual keying mode can not effectively support features such as replay protection and automatic re-keying. An implementer using manual keys must be aware of these limits. It is recommended that an implementer use manual keying only for diagnostic purpose and use dynamic keying protocol to make use of features such as replay protection and automatic re-keying. 2. IPsec ESP with trailer authentication in tunnel mode MUST be supported. 3. Implementations MUST support authenticated key exchange protocols. IKE [RFC2409] MUST be used as the key exchange protocol if keys are dynamically negotiated between peers. 4. Implementation MUST use the IPsec DOI [RFC2407]. 5. For IKE protocol, the identities of the SAs negotiated in Quick Mode represent the traffic that the peers agree to protect and are comprised of address space, protocol, and port information. For LMP over IPsec, it is recommended that the identity payload for Quick mode contain the following information: The identities MUST be of type IP addresses and the value of the identities SHOULD be the IP addresses of the communicating peers. The protocol field MUST be UDP. The port field SHOULD be set to zero to indicate port fields should be ignored. This implies all UDP traffic between the peers must be sent through the IPsec tunnel. If an implementation supports port based selectors it can opt for a finer grained selector by specifying the port field to LMP port. If, however, the peer does not use port based J. Lang, Editor Standards Track [Page 67] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 selectors, the implementation MUST fall back to using port selector value of 0. 6. Aggressive mode of IKE negotiation MUST be supported. When IPsec is configured to be used with a peer, all LMP messages are expected to be sent over the IPsec tunnel (crypto channel). Similarly a LMP receiver configured to use Ipsec with a peer, should reject any LMP traffic not coming through the crypto channel. The crypto channel can be pre-setup with the LMP neighbor or the first LMP message message sent to the peer could trigger the creation of the IPsec tunnel. A set of control channels can share the same crypto channel. When LMP Hellos are used to monitor the status of the control channel, it is important to keep in mind that the keep-alive failure in a control channel may also be due to a failure in the crypto channel. The following method is recommended to ensure an LMP communication path between two peers is working properly. o If LMP Hellos detect a failure on a control channel, switch to an alternate control channel and/or try to establish a new control channel. o Ensure the health of the control channels using LMP Hellos. If all control channels indicate a failure and it is not possible to bring up a new control channel, tear down all existing control channels. Also tear down the crypto channel (both the IKE SA and IPsec SAs). o Reestablish the crypto channel. Failure to establish a crypto channel indicates a fatal failure for LMP communication. o Bring up the control channel. Failure to bring up the control channel indicates a fatal failure for LMP communication. When LMP peers are dynamically discovered (particularly the initiator), the following points should be noted: When using pre-shared key authentication in identity protection mode (main mode), the pre-shared key is required to compute the value of SKEYID (used for deriving keys to encrypt messages during key exchange). In main mode of IKE, the pre-shared key to be used has to be identified before receiving the peerÆs identity payload. The pre-shared key is required for calculating SKEYID. The only information available about the peer at this point is its IP address from which the negotiation came from. Keying off the IP address of a peer to get the pre-shared key is not possible since the addresses are dynamic and not known beforehand. J. Lang, Editor Standards Track [Page 68] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Aggressive mode key exchange can be used since identification payloads are sent in the first message. Note, however, that aggressive mode is prone to passive denial of service attacks. Using a shared secret (group shared secret) among a number of peers is strongly discourages as this opens up the solution to man-in-the-middle attacks. Digital signature based authentication is not prone to such problems. It is RECOMMENDED to use digital signature based authentication mechanism where possible. If pre-shared key based authentication is required, then aggressive mode SHOULD be used. IKE pre-shared authentication key values SHOULD be protected in a manner similar to the user's account password. 17. IANA Considerations LMP requires that a UDP port number be assigned. In the following, guidelines are given for IANA assignment for each LMP name space. Ranges are specified ôfor Private Useö, ôto be assigned by Expert Reviewö, and ôto be assigned by Standards Actionö (as defined in [RFC2434]. Assignments made from LMP number spaces set aside for Private Use (i.e., for proprietary extensions) need not be documented. Independent RSVP implementations using the same Private Ues code points will in general not interoperate, so care should be exercised in using these code points in a multi-vendor network. Assignments made from LMP number spaces to be assigned by Expert Review are to be reviewed by an Expert designated by the IESG. The intent in this document is that code points from these ranges are used for Experimental extensions; as such,assignments MUST be accompanied by Experimental RFCs. If deployment suggests that these extensions are useful, then they should be described in Standards Track RFCs, and new code points from the Standards Action ranges MUST be assigned. Assignments from LMP number spaces to be assigned by Standards Action MUST be documented by a Standards Track RFC, typically submitted to an IETF Working Group, but in any case following the usual IETF procedures for Proposed Standards. The Reserved bits of the LMP Common Header should be allocated by Standards Action, pursuant to the policies outlined in [RFC2434]. LMP defines the following name spaces that require management: - LMP Message Type. J. Lang, Editor Standards Track [Page 69] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 - LMP Object Class. - LMP Object Class type (C-Type). These are unique within the Object Class. - LMP Sub-object Class type (Type). These are unique within the Object Class. The LMP Message Type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-127 are allocated by Standards Action, 128-240 are allocated through an Expert Review, and 241-255 are reserved for Private Use. The LMP Object Class name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range of 0-127 are allocated by Standards Action, 128-247 are allocated through an Expert Review, and 248-255 are reserved for Private Use. The policy for allocating values out of the LMP Object Class name space is part of the definition of the specific Class instance. When a Class is defined, its definition must also include a description of the policy under which the Object Class names are allocated. The policy for allocating values out of the LMP Sub-object Class name space is part of the definition of the specific Class instance. When a Class is defined, its definition must also include a description of the policy under which sub-objects are allocated. The following name spaces need to be assigned initially: [Note to RFC Editor: Please drop all text enclosed in parentheses in this section once the IANA assignments are made. The values are included for reference only and should be considered unassigned.] ------------------------------------------------------------------ LMP Message Type name space o Config message (suggested Message type = 1) o ConfigAck message (suggested Message type = 2) o ConfigNack message (suggested Message type = 3) o Hello message (suggested Message type = 4) o BeginVerify message (suggested Message type = 5) o BeginVerifyAck message (suggested Message type = 6) o BeginVerifyNack message (suggested Message type = 7) o EndVerify message (suggested Message type = 8) J. Lang, Editor Standards Track [Page 70] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 o EndVerifyAck message (suggested Message type = 9) o Test message (suggested Message type = 10) o TestStatusSuccess message (suggested Message type = 11) o TestStatusFailure message (suggested Message type = 12) o TestStatusAck message (suggested Message type = 13) o LinkSummary message (suggested Message type = 14) o LinkSummaryAck message (suggested Message type = 15) o LinkSummaryNack message (suggested Message type = 16) o ChannelStatus message (suggested Message type = 17) o ChannelStatusAck message (suggested Message type = 18) o ChannelStatusRequest message (suggested Message type = 19) o ChannelStatusResponse message (suggested Message type = 20) ------------------------------------------------------------------ LMP Object Class name space and Class type (C-Type) o CCID Class name (suggested = 1) The CCID Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - LOCAL_CCID (suggested C-Type = 1) - REMOTE_CCID (suggested C-Type = 2) o NODE_ID Class name (suggested = 2) The NODE ID Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - LOCAL_NODE_ID (suggested C-Type = 1) - REMOTE_NODE_ID (suggested C-Type = 2) o LINK_ID Class name (suggested = 3) J. Lang, Editor Standards Track [Page 71] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The LINK_ID Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - IPv4 LOCAL_LINK_ID (suggested C-Type = 1) - IPv4 REMOTE_LINK_ID (suggested C-Type = 2) - IPv6 LOCAL_LINK_ID (suggested C-Type = 3) - IPv6 REMOTE_LINK_ID (suggested C-Type = 4) - Unnumbered LOCAL_LINK_ID (suggested C-Type = 5) - Unnumbered REMOTE_LINK_ID (suggested C-Type = 6) o INTERFACE_ID Class name (suggested = 4) The INTERFACE_ID Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - IPv4 LOCAL_INTERFACE_ID (suggested C-Type = 1) - IPv4 REMOTE_INTERFACE_ID (suggested C-Type = 2) - IPv6 LOCAL_INTERFACE_ID (suggested C-Type = 3) - IPv6 REMOTE_INTERFACE_ID (suggested C-Type = 4) - Unnumbered LOCAL_INTERFACE_ID (suggested C-Type = 5) - Unnumbered REMOTE_INTERFACE_ID (suggested C-Type = 6) o MESSAGE_ID Class name (suggested = 5) The MESSAGE_ID Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - MESSAGE_ID (suggested C-Type = 1) - MESSAGE_ID_ACK (suggested C-Type = 2) o CONFIG Class name (suggested = 6) The CONFIG Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - HELLO_CONFIG (suggested C-Type = 1) o HELLO Class name (suggested = 7) J. Lang, Editor Standards Track [Page 72] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The HELLO Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - HELLO (suggested C-Type = 1) o BEGIN_VERIFY Class name (suggested = 8) The BEGIN_VERIFY Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - Type 1 (suggested C-Type = 1) o BEGIN_VERIFY_ACK Class name (suggested = 9) The BEGIN_VERIFY_ACK Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - Type 1 (suggested C-Type = 1) o VERIFY_ID Class name (suggested = 10) The VERIFY_ID Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - Type 1 (suggested C-Type = 1) o TE_LINK Class name (suggested = 11) The TE_LINK Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - IPv4 TE_LINK (suggested C-Type = 1) - IPv6 TE_LINK (suggested C-Type = 2) - Unnumbered TE_LINK (suggested C-Type = 3) o DATA_LINK Class name (suggested = 12) J. Lang, Editor Standards Track [Page 73] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 The DATA_LINK Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - IPv4 DATA_LINK (suggested C-Type = 1) - IPv6 DATA_LINK (suggested C-Type = 2) - Unnumbered DATA_LINK (suggested C-Type = 3) The DATA_LINK Sub-object Class name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range of 0-127 are allocated by Standards Action, 128-247 are allocated through an Expert Review, and 248-255 are reserved for Private Use. - Interface Switching Type (suggested sub-object Type = 1) - Wavelength (suggested sub-object Type = 2) o CHANNEL_STATUS Class name (suggested = 13) The CHANNEL_STATUS Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112- 119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - IPv4 INTERFACE_ID (suggested C-Type = 1) - IPv6 INTERFACE_ID (suggested C-Type = 2) - Unnumbered INTERFACE_ID (suggested C-Type = 3) o CHANNEL_STATUS_REQUESTClass name (suggested = 14) The CHANNEL_STATUS_REQUEST Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - IPv4 INTERFACE_ID (suggested C-Type = 1) - IPv6 INTERFACE_ID (suggested C-Type = 2) - Unnumbered INTERFACE_ID (suggested C-Type = 3) o ERROR_CODE Class name (suggested = 20) The ERROR_CODE Object Class type name space should be allocated as follows: pursuant to the policies outlined in [RFC2434], the numbers in the range 0-111 are allocated by Standards Action, 112-119 are allocated through an Expert Review, and 120-127 are reserved for Private Use. - BEGIN_VERIFY_ERROR (suggested C-Type = 1) J. Lang, Editor Standards Track [Page 74] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 - LINK_SUMMARY_ERROR (suggested C-Type = 2) 18. Acknowledgements The authors would like to thank Andre Fredette for his many contributions to this document. We would also like to thank Ayan Banerjee, George Swallow, Andre Fredette, Adrian Farrel, Dimitri Papadimitriou, Vinay Ravuri, and David Drysdale for their insightful comments and suggestions. We would also like to thank John Yu, Suresh Katukam, and Greg Bernstein for their helpful suggestions for the in-band control channel applicability. 19. Contributors Jonathan P. Lang Krishna Mitra Rincon Networks Independent Consultant 829 De La Vina, Suite 220 email: kmitra@earthlink.net Santa Barbara, CA 93101 Email: jplang@ieee.org John Drake Kireeti Kompella Calient Networks Juniper Networks, Inc. 5853 Rue Ferrari 1194 North Mathilda Avenue San Jose, CA 95138 Sunnyvale, CA 94089 email: jdrake@calient.net email: kireeti@juniper.net Yakov Rekhter Lou Berger Juniper Networks, Inc. Movaz Networks 1194 North Mathilda Avenue email: lberger@movaz.com Sunnyvale, CA 94089 email: yakov@juniper.net Debanjan Saha Debashis Basak IBM Watson Research Center Accelight Networks email: dsaha@us.ibm.com 70 Abele Road, Suite 1201 Bridgeville, PA 15017-3470 email: dbasak@accelight.com Hal Sandick Alex Zinin Shepard M.S. Alcatel 2401 Dakota Street email: alex.zinin@alcatel.com Durham, NC 27705 email: sandick@nc.rr.com Bala Rajagopalan Sankar Ramamoorthi Tellium Optical Systems Juniper Networks, Inc. 2 Crescent Place 1194 North Mathilda Avenue Oceanport, NJ 07757-0901 Sunnyvale, CA 94089 email: braja@tellium.com email: sankarr@juniper.net 20. Contact Address J. Lang, Editor Standards Track [Page 75] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 Jonathan P. Lang Rincon Networks 829 De La Vina, Suite 220 Goleta, CA 93101 Email: jplang@ieee.org J. Lang, Editor Standards Track [Page 76] Internet Draft draft-ietf-ccamp-lmp-10.txt October 2003 21. Full Copyright Statement Copyright (C) The Internet Society (2003). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. J. Lang, Editor Standards Track [Page 77]