MPLS Working Group GregCCAMP G. Bernstein Internet Draft Ciena Document: <draft-bms-optical-sdhsonet-mpls-control-frmwrk-00.txt> Category: EricE. MannieExpires: May 2001 GTS Vishalcontrol-frmwrk-01.txt> Ebone Category: Informational V. SharmaTellabs November 2000Metanoia Expires January 2002 July 2001 Framework forMPLS-basedGMPLS-based Control ofOpticalSDH/SONET Networks<draft-bms-optical-sdhsonet-mpls-control-frmwrk-00.txt><draft-bms-optical-sdhsonet-mpls-control-frmwrk-01.txt> Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026 [1]. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet- Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Abstract The suite of protocols thatdefinedefines Multi-Protocol Label Switching (MPLS) is in the process of enhancement to generalize its applicability to the control of non-packet based switching, that is, optical switching. One area of prime consideration is to usethisthese generalized MPLS (GMPLS) protocols in upgrading the control plane of optical transport networks. Thispaperdocument illustrates this process by describinghow MPLS is being extendedthose extensions tocontrolMPLS protocols that are directed towards controlling SONET/SDH networks. SONET/SDH networksare exemplarymake very good examples of this process since they possess a rich multiplex structure, a variety of protection/restoration options, are well defined, and are widely deployed. The document discusses extensions to MPLS routing protocols to disseminate information needed in transport path computation and network operationsare discussed alongtogether with the extensions to MPLS label distribution protocols needed for the provisioning of transport circuits. New capabilities that an MPLS control plane would bring to SONET/SDH networks, such as new restoration methods and multi-layer circuit establishment, are also discussed.Mack-Crane et al Expires May 2001Bernstein, Mannie, Sharma Informational - January 2002 1draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 20002. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [2]. 3. Introduction A few years ago, the Internet Engineering Task Force (IETF) began work on the specification of a new connection-oriented transport technology called Multi-Protocol Label Switching (MPLS). The MPLS forwarding plane was inspired mainly by concepts from virtual circuit switching in ATM, while its control plane was inspired mainly by the routing protocols found in IP. As work on defining the components of MPLS progressed, it soon became apparent that the principles upon which MPLS technology was based were generic, and were applicable to multiple layers of the transport network. As such, MPLS-based control of other network layers, such as theTDMtime division multiplexing (TDM) and optical layers was also possible. The motivation behind introducing such control was to provide new services, such as dynamic establishment of TDM and optical circuits, which were hitherto not possible in transport networks. WithMPLS-basedMPLS- based control, transport operators or service providers would be able to offer on-demand services to their customers, due to the reduction in provisioning time of their circuits, thus adding considerable flexibility in their service portfolios. TheMPLSCCAMP Working Group of the IETF is currently working on extending MPLS protocols to supportthese non-packetmultiple network layers and these new services. This extended MPLS, which was initially known as Multi-Protocol Lambda Switching, is now better referred to as Generalized MPLS (or GMPLS). The authors of this work are among the co-authors of the GMPLS specifications, and - focus mainly on those aspects of GMPLS that relate to the control of SDH/SONET networks. The GMPLS effort is, infact,effect, extending IP technology to control and manage lower layers. Using the same framework andthe same kinds ofsimilar signaling and routing protocols to control multiple layers can not onlyhas the potential toreduce the overall complexity of designing, deploying and maintaining networks, but can alsohas the potential tomake it possible to operate two contiguous layers by using either an overlay model, a peermodelmodel, or an integrated model. The benefits of using a peer or an overlay model between the IP layer and its underlying layer(s) will have to be clarified and evaluated in the future. In the mean time, GMPLSis very suitablecould be used for controlling each layercompletelyindependently. The goal of thispaperwork is to highlight howMPLSGMPLS could be used to dynamically establish, maintain and tear down SDH/SONET circuits. The objective of using these extended MPLS protocols is to provide at least the samekindkinds of SDH/SONETBernstein, Mannie, Sharma Expires May 2001 2 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000services as are provided today, but using signaling instead of provisioning via centralized Bernstein, Mannie, Sharma Informational - January 2002 2 management to establish those services. This will allow operators to propose new services, and will allow clients to create SONET/SDH paths on-demand, in real-time, through the provider network. We first review the essential properties of SDH/SONET networks and their operations, and we show how thelabelÆs oflabel concept in MPLS can be extended to the SONET/SDH case. We then look at important information to be disseminated by a link staterouterouting protocol and look at the important signal attributes that need to be conveyed by a label distribution protocol. Finally, we look at some outstanding issues and future possibilities. [3], [4], [5], [6], [7],[8], [9], [10], [11], [12].3.13.1. MPLS OverviewAnA major advantage of the MPLS architecture for use as a general network control plane istheits clear separation between the forwardingplane,plane (or data plane) the signaling (or connection control) plane, and the routing (or topology discovery/resource status) plane. This allows the work on MPLS extensions to focus on the forwarding and signaling planes, while allowing well-known IP routing protocols to be reused in the routing plane. This clear separation also allows for MPLS to be used to control networks that do not have a packet- based forwarding plane.InAn MPLSterminology, annetwork consists of MPLSnode isnodes calledaLabel SwitchRouter (LSR) and a circuit isRouters (LSRs) connected via circuits calledaLabel SwitchedPath (LSP).Paths (LSPs). An LSP is unidirectional and could be of several different types such as point-to-point, point-to-multipoint, and multipoint-to-point. Border LSRs in an MPLScloud,network, act either as ingress or egress LSRsrespective todepending on the direction of the traffic being forwarded.MPLS allows the establishment of LSPs between ingress and egress LSRs.Each LSP is associated with a Fowarding Equivalence Class (FEC), which may be thought of as a set of packets that receive identical forwarding treatment at an LSR. The simplest example of an FEC might be the set of destination addresses lying in a given address range. All packets that have a destination address lying within this address range are forwarded identically at each LSR configured with thatLSR.FEC. To establish an LSP, a signaling protocol (or label distribution protocol) such as LDP/CR-LDP or RSVP-TE is required. Between two adjacent LSRs, an LSP is locally identified by a short, fixed length identifier called alabel. This labellabel, which is only significant between these two LSRs. The signaling protocol is responsible for the inter-node communication that assigns and maintains these labels. When a packet enters anMPLS packet-basedMPLS-based packet network, it is classified according to its FEC and, possibly, additional rules, which together determine the LSP along which the packetismust be sent. Forthatthis purpose, the ingress LSR attaches an appropriate label to the packet, and forwards the packet to the next hop. The label may be attached to a packet in different ways. For example,-itit may be in the form of a header encapsulating the packet (the "shim" header) or Bernstein, Mannie, Sharma Informational - January 2002 3 it may be written in the VPI/VCI field (or DLCI field) of the layerBernstein, Mannie, Sharma Expires May 2001 3 " draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 20002 encapsulation of theIP data.packet. In case of SDH/SONET networks, we will see that a label is simply associated with a segment of a circuit, and is mainly used in the signaling plane to identify this segment (e.g. a time-slot) between two adjacent nodes. When a packet reaches a core packet LSR, this LSR uses the label as an index into a forwarding table to determine the next hop and the corresponding outgoinglabel,label (and, possibly, the QoS treatment to be given to the packet), writes the new label into the packet, and forwards the packet to the next hop. When the packet reaches the egress LSR, the label is removed and the packet is forwarded usingadequateappropriate forwarding, such as normal IP forwarding. We will see that for a SONET/SDH network these operations-dodo not occur in quite the same way.3.23.2. SDH/SONET Overview There are currently two different multiplexing technologies in use in optical networks: wavelength division multiplexing (WDM) and time division multiplexing (TDM). This work focuses on TDM technology. SDH and SONET are two TDM standards widely used by operators to transport and multiplex different tributary signals over optical links, thus creating a multiplexing structure, which we call the SDH/SONET multiplex. SDH, which was developed by the ETSI and later standardized by the ITU-T, is now used worldwide, while SONET, which was standardized by the ANSI, is mainly used in the US. However, these two standards have several similarities, and to some extent SONET can be viewed as a subset of SDH. Internetworking between the two is possible using gateways. The fundamental signal in SDH is the STM-1 that operates at a rate of about 155MbpsMbps, while the fundamental signal in SONET is theSTS-1STS- 1 that operates at a rate of about 51 Mbps. These two signals are made of contiguous frames that consist ofatransport overhead (header) andapayload. To solve synchronization issues, the actual data is notdirectlytransported directly in the payload but rather in another internal frame that is allowed to float over two successive SDH/SONET payloads. This internal frame is named a Virtual Container (VC) in SDH and a Synchronous Payload Envelope (SPE) in SONET. The SDH/SONET architecture identifies three different layers, each of which corresponds to one level of communication between SDH/SONET equipment. These are, starting with the lowest, the regenerator section/section layer, the multiplex section/line layer, and (at the top) the path layer. Each of these layers in turn has its own overhead (header). The transport overhead of a SDH/SONET frame is mainlysub- dividedsub-divided in two parts that contain the regenerator section/section overhead and the multiplex section/line overhead. In addition, a pointer (in the form of the H1, H2 and H3 bytes) indicates the beginning of the VC/SPE in thepayload.payload of the overall STM/SDH frame. Bernstein, Mannie, Sharma Informational - January 2002 4 The VC/SPE itself is made up of a header (the path overhead) and a payload. This payload canitselfbe further subdivided into sub-elements (signals) in a fairly complex way. In the case of SDH, the STM-1 frameitselfmay contain either one VC-4 or three multiplexed VC-3s.Indeed, SDH and SONET both define a complete multiplexing structure.The SONET multiplex is a pure tree, while the SDH multiplex is not aBernstein, Mannie, Sharma Expires May 2001 4 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000puretreetree, since it contains a node that can be attached to two parent nodes. The structure of the SONET/SDH multiplex is shown in Figure 1. In addition, we show reference points in this figure thatwill beare explained in lateron.sections. xN x1 STM-N<----AUG<----AU-4<--VC4<------------------------------C-4 E4 ^ ^ Ix3 Ix3 I I x1 I-----TUG-3<----TU-3<----VC-3<----I-----TUG-3<----TU-3<---VC-3<---I I ^ C-3DS3/T3/E3DS3/E3 -------AU-3<---VC-3<-- I-----------------------I---------------------I ^ I Ix7 Ix7 I I x1-----TUG-2<----TU-2<----VC-2<---C-2-----TUG-2<---TU-2<---VC-2<---C-2 DS2/T2 ^ ^ I I x3 II------TU-12<---VC-12<--C-12I----TU-12<---VC-12<--C-12 E1 I I x4I---------TU-11<---VC-11<--C-11I-------TU-11<---VC-11<--C-11 DS1/T1 xNSTS-N<-------------------SPE<--------------------------------- DS3/T3STS-N<-------------------SPE<------------------------------DS3/T3 ^ Ix7 I x1 I---VT-Group<---VT-6<----SPE DS2/T2 ^ ^ ^ I I I x2 I I I-----VT-3<----SPE DS1C I I I I x3 I I--------VT-2<----SPE E1 I I x4 I-----------VT-1.5<--SPE DS1/T1 Figure 1. SDH and SONET multiplexing structure and typical PDH payload signals. Bernstein, Mannie, SharmaExpires May 2001Informational - January 2002 5draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000The leaves of these multiplex structures are time slots (positions) of different sizes that can contain tributary signals. These tributary signals (e.g. E1, E3, etc) are mapped into the leaves using standardized mapping rules. In general, a tributary signal does not fill a time slot completely, and the mapping rules define precisely how to fill it. What is important for thegoalMPLS-based control ofthis paperSDH/SONET circuits is to identify the elements that can be switched from an input multiplex on one interface to an output multiplex on another interface.TheseThe only elements that can be switched areonlythose that can be re-aligned via a pointer, i.e. a VC-x in the case of SDH and a SPE in the case of SONET. An STM-N/STS-N signal is formed from N x STM-1/STS-1 signals via byte interleaving. The VCs/SPEs in the N interleaved frames are independent and float according to their own clocking. To transport tributary signals in excess of the basic STM-1/STS-1signal,signal rates, the VCs/SPEs can be concatenated, i.e., glued together. In this case their relationship with respect to each other is fixed in time and hence this relieves, when possible, an end system of any inverse multiplexing bonding processes. Different types of concatenations aredefined, with specific rules.defined in SDH/SONET. Forinstance, theexample, standard SONET concatenation allows the concatenation of M x STS-1 signals within an STS-N signal with M <= N, and M = 3, 12, 48, 192,...). The SPEs of these M x STS-1s can be concatenated to form an STS-Mc. The STS-Mc notation is short hand for describing an STS-M signal whose SPEs have been concatenated.3.33.3. TheReal WorldCurrent State of Circuit Establishmentwithin SDH/SONET Networks Today, June 2001, SDH and SONET networks are statically configured. When a client of an operator requests a point-to-pointcircuit or a ring, itcircuit, the request sets in motion a process that can last forweeks.several weeks or more. This process isindeedcomposed of a chain of shorter administrative and technical tasks, some of which can be fully automated, resulting in significant improvements in provisioning time and in operational savings. In the best case, the entire process can be fully automated allowing, forexample,. a CPEexample, customer premise equipment (CPE) to contact a SDH/SONET switch to requestsome bandwidth. This is, in fact, the ultimate objective that we would like to achieve using MPLS to control SDH/SONET networks. In the current setup, however,a circuit. Currently, the provisioning process involves the followingcomponents.tasks. 3.3.1. Administrative Tasks The administrative tasks represent a significant part of the provisioning time. Most of them can be automated using ITBernstein, Mannie, Sharma Expires May 2001 6 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000applications,however, and MPLS does not help in that case. However,e.g., a client still has to fill a form to request a circuit. This form can be filled via a Web-based application and can be automatically processed by the operator. A furtherstepenhancement is Bernstein, Mannie, Sharma Informational - January 2002 6 to allow the client's equipment to coordinate with the operator's network directly and request the desired circuit. Thishas tocould be achieved through a signaling protocol at the interface between the client equipment and an operator switch,i.e.i.e., at the UNI interface, whereMPLSGMPLS signaling canplay a role.be used. 3.3.2. Manual Operations Another significant part of the time may be consumed by manual operations that involve installing the right interface in the CPE and installing the right cable or fiber between the CPE and the operator switch. This time can be especially significant when a client is in a different time zone than the operator's main office. This first-time connection time is frequently accounted for in the overall establishment time.To support our fully automated model we must, of course, assume that CPEs are pre-connected to the operatorÆs network.3.3.3. Planning Tool Operation Another portion of the time is consumed by planning tools that run simulations using heuristic algorithms to find an optimized placement for the requiredcircuits and/or rings.circuits. These planning tools can require a significant running time, sometimesofon the order of days. These simulations are, in general, executed for a set of demands forcircuits and/or ringscircuits, i.e., a batch mode, to improve the optimality ofthe solution.network resource usage and other parameters. Today, we do not really have a means to reduce this simulation time. On the contrary, to support fast, on-line, circuit establishment, this phase may be invoked more frequently, i.e., we willmost probably skip this phase. Itnot "batch up" as many connection requests before we plan out the corresponding circuits. This means that the networkwill havemay need to be re-optimized periodically, implying that the signaling should support re-optimizationwithout hurting too much the service. Indeed, the optimization of the network is then taken out of the chain and becomes a background activity. Smart circuit re-routing required for re-optimization is available in MPLS.with minimum impact to existing services. 3.3.4. Circuit Provisioning Once the first three steps have beenexecuted,completed, the circuits must beeffectivelyprovisioned by the operator using the outputs of the planningtool.process. The time required forthisprovisioningisvaries greatly. It can be fairly short, on the order of a fewminutes. In many cases,minutes, if the operators already have tools that help them to do the provisioning over heterogeneous equipment. Otherwise, the process can take days. Developing these tools for each new piece of equipmentmoreand each vendor is a significant burden on the service provider. A standardized interface for provisioning, such as GMPLS signaling, could significantly reduce orless automatically.eliminate this development burden. In general,theprovisioning is agroupedbatched activity, i.e., a few times per week an operatorlaunches the provisioning ofprovisions a set ofcircuits in one shot. MPLScircuits. GMPLS will reduce this provisioning time from a few minutes to a few seconds andwillcould help to transform this periodic process into a real-time process.Bernstein, Mannie, Sharma Expires May 2001 7 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000When a circuitor a ringisprovisionedprovisioned, it is not delivered directly to a client.First,Rather, the operator first tests its performance and behavioris tested by the operatorand ifthis issuccessful, delivers the circuitis deliveredto the client. This Bernstein, Mannie, Sharma Informational - January 2002 7 testing phase lasts, in general, for up to 24 hours. The operatorinstalslinstalls test equipment at each end and usespre- definedpre-defined test streams to verifytheperformance. If successful, the circuit is officially accepted by the client.Thus, toTo speed upthisthe verification (sometimes known as "proving") process,brief automated performance testing will have to be supported in some way. So,itresults that most of the time that canwould besaved is mainly duenecessary tothe fact that we change the work model of an operator. In addition, note that signaling other than MPLS can achieve the same result. Even an architecture based on a centralized management achieves the same without MPLS. The benefits of using MPLS can, however, be realized both with the usesupport some form ofa distributed architecture or a centralized architecture, since MPLS supports explicit routing (and a centralized architecture with signaling support, could compute the route and then use signaling to establish it). Below we will briefly look at both the centralized and the distributed approaches to circuit provisioning.automated performance testing. 3.4. Centralized Approach versus Distributed ApproachThe debate betweenWhether a centralized approachandor a distributed approach will be used to controlanSDH/SONETnetwork or an optically switched network is still on-going. Therenetworks isprobably no outstanding characteristic any approache that will make it the universal solution. Eachan open question, since Eech approach has advantages and disadvantages.Depending on the particular network to be controlled and operator requirements, either solution could be the right one.The application ofMPLSGMPLS to SONET/SDH networks does not preclude either model although MPLS is itself a distributed technology.In particular, the explicit route capability in MPLS combined with a "soft permanent LSP" (SPLSP) type functionality could fully support a centralized approach to circuit provisioning that would also be interoperable.Thecentralized approach is typically implemented using a Network Management System dynamically provisioning circuits. Although no signaling protocol is used, a routing protocol is used to route the management messages. Indeed, the management protocol acts as a signaling protocol. Network elements stay relatively simple and are not involved in decision making. CPEÆs can implement a simple signaling interface with the NMS, such as the one being proposed in the ODSI. This approach has a number of advantages inbasic tradeoff between theshort term. The typical network management model used today for TDM networks is TMN. A distributed approach consists of using one or more distributed routing protocols, such as IP routing protocols,centralized andadistributedsignaling protocol. The MPLS architecture fits very well in that case. This solution has the potential to be scalable and robust, and enable future services like inter-domain routing. Obviously, it adds Bernstein, Mannie, Sharma Expires May 2001 8 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 more complexity but thisapproaches isthe "price" to pay if we want to build a network of SDH/SONET networks, i.e. an SDH/SONET inter-network. A centralized approach can benefit from the management informationthatis collected constantly, e.g. performance alarms, failure alarms and traps. Once filtered and analyzed, this information can be used to detect failure in almost real-time. However, sometimes this approach can also be penalized if the numberofmanagement messages is not controlled appropriately, as we will see later. On the other hand, a distributed routing protocol relies mainly on timers and missing routing PDUs to detect a failure between two adjacent switching nodes. It can also use indications fromcomplexity of theunderlying layer, if available, but it does not communicate directly with somenetworkelements, like amplifiers, and transponders,elements versus thatcould detect problems sooner. In addition, a NMS maintains a consistent view of all the layers, including the physical topology, at any time. Centralized decisions can be taken based on accurate information and can use physical information about fibers and ducts. On the other hand, a routing protocol builds and maintain a logical model of the network. Not all routing entities have the same viewof the networkat all times, and re-routing and crank-back are needed for the signaling protocol. A centralizedmanagementis easiersystem (NMS). Since adding functionality tooperate, new features can be introduced with a simple upgrade. On the contrary, updating switches with new routing software is harder. One could easily change the parameters of the constrained routing algorithm or the metrics of the links. These changes will take effect instantaneously. Several added-value tools can run in the background and easilty easily information with the centralized decision point. Such tools might be, circuit planning tools (for network optimization, diversity design, performance analysis), circuit reservation tools, and VPN tools,for example. Finally, this approach fits well with the current network operation structure. The major upgrade is a an IT upgrade at the operatorÆsexisting SDH networkoperations center. The DCN used to transport the management protocol now becomes now a critical part of the operator infrastructure and consequently mustelements may not beprotected. Its availability haspossible, adirect impact on the on-demand circuit provisioning. Of course, ideally new SDH/SONET non-blocking switching fabrics need to be deployed in the network. Note that thiscentralized approachcould have been supported since years with the actual SDH/SONET switching fabrics, if we took into consideration the limitations of these fabrics. The DCN used to transport management PDUs canmay bea mix of out-of- band links and in-band communication linksneeded inthe SDH/SONET overhead (like the DCC). A routing protocol is run over these links to route the management PDUs. The TMN model uses CMIP as the network management protocol. The interface between a NE and the NMS is referred to as the Q3 interface and is based on the OSI model.some cases. TheBernstein, Mannie, Sharma Expires May 2001 9 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 upper part of the protocol stack at the Q3 interface is defined in Q.812. Different profiles are defined in Q.811 for the lower part, they cover LAN and WAN interfaces. Note that the upper part can also be supported overmain issue facing centralized control via anIP infrastructure. In general, IS-IS is the network layer routing protocol that is used. The topology of the DCN is more complex than the topology considered for the distributed approach, since all network elements, and not just the switches, must be reached. In case of failures in a SDH/SONET network, bursts of hundreds or thousands of alarms can be sent to the management system over the DCN. In that case, provisioning related messages can be delayed by the treatment of the alarms if no mediation function filtering and message aggregation is available between theNMSand NEs. In the case of the distributed approach, the routing protocol must only abstract the physical links between the switches and the signaling protocol must only flow between these switches. The DCN used for the management of the network could be re-used, or a separate signaling network could be setup. Surprisingly, the requirementsis one ofa DCN could be much higher than the requirements for the distributed signaling network. An NMS has scalability limitations.scalability. For instance,it canthis approach may be limited in the number of network elements that can be managed (e.g. one thousand). Itisis, therefore, quite common for operators to deploy severalNMSÆsNMS’s in parallel at the Network Management Layer, each managing a different zone. In that case, however, a Service Management layer must be built on the top of several individualNMS at the Service Management Layer must be builtNMS’s to take care of end-to-end on-demand services. On thecontrary, the scalability is much better in the distributed approach, clients are co-located with switches and distributed among these switches. An NMS can also be a bottleneck, it has already to deal with all traditional management messages; now in addition, it has to take care of reliably handling provisioning messages, and, sometimes, UNI messages as well. The load due to additional and more dynamic operations, such as dynamic circuit establishment and fast restoration is also not negligible. Indeed, the distributed approach has the advantage of being isolated from the burden that can be placed on the NMS due to network conditions. It could be expected thatother hand, in a complex and/or dense network, restoration could be faster with a distributed approach than with a centralized approach.InLet's now look at how thefirst case, signaling messages travel over exactlymajor control plane functional components are handled via thesame pathcentralized and distributed approaches: 3.4.1. Topology Discovery and Resource Dissemination Currently NMS's maintain a consistent view of all the networking layers under their purview. This can include the physical topology, such as information about fibers and ducts. Since most of this information is entered manually, it remains error prone. A link state GMPLS routing protocol, on theaffected circuitsother hand, could perform automatic topology discovery andonly throughdissemination theaffected. Intopology as well as resource status. This information would be available to all nodes in thesecondnetwork, and hence also the NMS. Hence one can look at a continuum of functionality between manually provisioned topology information (of which there will always be some) and fully automated discovery and dissemination as in a link state protocol. Note that, unlike the IP datagram case, asignaling message has to go firstlink state routing protocol applied to theNMS , which transmits signaling messages (in parallel) to all concerned nodes. However, this comparison requires further investigations. In general , an NMS isSDH/SONET network does nota single point of failure, since all operatorshavesystems in hot stand-by and disaster recovery plansany service impacting implications. Bernstein, Mannie, SharmaExpires May 2001 10 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 forInformational - January 2002 8 3.4.2. Path Computation (Route Determination) In theNMS. The DCN must now be as well protected asSDH/SONET case, unlike thetransportIP datagram case, there is no need for networkitself. However,elements to all perform thesurvivabilitysame path calculation. In addition, path determination is an area for vendors to provide a potentially significant value addition in terms ofthe distributednetwork efficiency, reliability, and service differentiation. In this sense, a centralized approach to path computation islikelyeasier to operate and upgrade. For example, new features such as new types of path diversity or new optimization algorithms can bebetter sinceintroduced with a simple NMS software upgrade. On theintelligenceother hand, updating switches with new path computation software isdistributed,a more complicated task. In addition, many of the algorithms are quite computationally intensive andcould even survivemay be completely unsuitable for the embedded processing environment available on most switches. In restoration scenarios the ability to perform a reasonably sophisticated level of path computation on the networkpartitioning. A distributed signaling and routing approach also appears a reasonable solutionelement can be particularly useful forinter-domain operations. Having hundredsrestoring traffic during major network faults. 3.4.3. Connection Establishment (provisioning) The actual setting up ofNMSs organized incircuits, i.e., atree withcoupled collection of cross connects across aroot NMS that controls the various NMSs from different operatorsnetwork, can berather difficult, especially indone either via theabsence of adequateNMSinteroperability standards. This is probably a significant motivation for resorting tosetting up individual cross connects or via adistributed"soft permanent LSP" (SPLSP) type approach.Having signaling and routingIn the SPLSP approach, the NMS may just kick off the connection ateach inter-domain interface does not imply that we needthesame inside each individual domain. However, inter-working between intra- and inter-domain operations will be greatly facilitated if we a distributed approach is also supported internal to a domain. This"ingress" switch with GMPLS signaling setting up the connection from that point onward. Connection establishment isparticularly true forthesignaling, usingtrickiest part to distribute, however, since errors in thesame protocol for both intra and inter-domain operations - seems a sensible approach.connection setup/tear down process are service impacting. Distributed approach Centralized approach Control plane like MPLS or Management plane like TMN or PNNI SNMP Do we really need it? Being Always needed! Already there, added/specified by several proven and understood. standardization bodies High survivability (e.g. in Potential single point(s) of case of partition) failure Distributed load Bottleneck: #requests and actions to/from NMS Individual local routing Centralized routing decision, decision can be done per block of requests Routing scalable as for the Assumes a few big Bernstein, Mannie, Sharma Informational - January 2002 9 Internet administrative domains Complex to change routing Very easy local upgrade (non- protocol/algorithm intrusive) Requires enhanced routing Better consistency protocol (traffic engineering) Ideal for inter-domain Not inter-domain friendly Suitable for very dynamic For less dynamic demands demands (longer lived) Probably faster to restore, Probably slower torestore, but Bernstein, Mannie, Sharma Expires May 2001 11 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000restore,but but more difficult to have could effect reliable reliable restoration. restoration. High scalability Limited scalability: #nodes, (hierarchical) links, circuits, messages Planning (optimization) Planning is a background harder to achieve centralized activity Easier future integration with other control plane layers Table 1. Qualitative comparison between centralized and distributed approaches.3.53.5. Why SDH/SONET will not Disappear TomorrowIf theAs IP traffic becomes theuniquedominant traffic transported overany transmission network, we could consider thatthe transport infrastructure, it is useful to compare the statistical multiplexing of IPwould completely replacewith the time division multiplexing of SDH and SONET.In that case,Consider a scenario where IP over WDMwill beis used everywhere and lambdascould beare optically switched.AIn such a case, a carrier's carrierwillwould sell dynamically controlled lambdas with each customer buildingitshis/her own IP backbone over these lambdas. This simple model implies that a carrierwillwould sell lambdas instead of bandwidth. Thecarriercarrier’s goal willtrybe to maximize the number oflambdaswavelengths/lambdas perfiber andfiber, with each customerwill havehaving to fully support the cost for eachof hisend-to-endlambdas. Inthelambda whether or not the wavelength is fully utilized. Although, inn the near future, we may have technology to support up to severalhundreds ofhundred lambdas perfiber. However,fiber, a world where lambdas are so cheap and abundant that every individual customercan buybuys them, from one point to any other point, appears an unlikely scenario today. Bernstein, Mannie, Sharma Informational - January 2002 10 More realistically, there isstill roomstillroom for a multiplexing technology that provides circuits with a lower granularity than a wavelength.Not(Not everyone needs a minimum of 10 Gbps or 40 Gbps per circuit, and IP does not yet support allthetelecom applications(e.g. telephony).in bulk efficiently.) SDH and SONET possess a rich multiplexing hierarchy that permitsa finerfairly fine granularity and that provides a very cheap and simple physical separation of the transported traffic betweencircuits. We can easily multiplex any kind of traffic, IP or not, synchronous or asynchronous.circuits, i.e., QoS. Moreover, even IPisdatagrams are notusedtransported directly over awavelength, awavelength. A framing or encapsulation is always required to delimit IP datagrams. The Total Length field of an IP header cannot be trusted to find the start of a new datagram, since it could be corrupted and would result in a loss of synchronization. The typical framing used today for IP over DWDM is defined in RFC1619/RFC2615 andis alsoknown as POS (PacketBernstein, Mannie, Sharma Expires May 2001 12 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000OverSONET/SDH). It is indeedSONET/SDH), i.e., IP over PPP (inHDLC likeHDLC-like format) over SDH/SONET. SDH and SONET are actually efficient encapsulations for IP. For instance, with an average IP datagram length of 350 octets, an IP over GBE encapsulation using an 8B/10B encoding results in 28% overhead, an IP/ATM/SDH encapsulation results in 22% overhead and an IP/PPP/SDH encapsulationresultresults in only 6% overhead.New(New simplified encapsulations could reduce this overhead to as low as 3%, but the gain is not huge compared to SDH and SONET -, which have other benefits aswell.well.) Any encapsulation of IP over WDM should at least provide error monitoring capabilities (to detect signal degradation), error correction capabilities, such as FEC (Forward Error Correction) that are particularly needed for ultra longhauhaul transmission, sufficient timing information, to allow robust synchronization (that is, to detect the beginning of a packet), and capacity to transport signaling, routing and management messages, in order to control the optical switches. SDH and SONET cover all these aspects natively, exceptFECs that canFEC, which tends to be(are)supported in a proprietary way. SincetheIP encapsulated in SDH/SONETencapsulationisa good candidateefficient andis anywaywidely used, the only real difference between an IP over WDM network and an IP over SDH over WDM network is the layers at which the switching or forwarding can take place. In the first case, it can take place at the IP and optical layers. In the second case, it can take place at the IP,SDH/SONETSDH/SONET, and optical layers.What we are arguing here is that it makes sense to do switching or forwarding at all these layers.Almost all transmission networks today are based on SDH or SONET. A client is connected either directly through an SDH or SONET interface or through a PDH interface, the PDH signal being transported between the ingress and the egress interfaces over SDH or SONET.The SDH and SONET technologiesWhat we arewidespread, very well understoodarguing here is that it makes sense to do switching or forwarding at all these layers. 4.MPLSGMPLS Applied to SDH/SONET Bernstein, Mannie, Sharma Informational - January 2002 11 4.1. Controlling the SDH/SONET MultiplexDifferent partsControlling the SDH/SONET multiplex implies deciding which of the different components of the SDH/SONET multiplex that can beswitched, and we have to decide which of theseswitched do wewould likewish to controlthrough MPLS. Basically,using GMPLSEssentially, every SDH/SONET element that is referenced by a pointer can beswitched, through pointer adjustment.switched. Theseelementscomponent signals are the VC-4,VC-3s, VC-2s, VC-12sVC-3, VC-2, VC-12 andVC-11sVC-11 in the SDH case; and the VT and STS SPEs in the SONET case. The SONET case ismorea bit difficult to explain since, unlike in SDH, SPEs inSONETdoSONET do not have individual names. We will refer to them by identifying the structure that contains them, namely the STS-1,VT-6s, VT-3s, VT-2sVT-6, VT-3, VT-2 andVT-1.5s. Bernstein, Mannie, Sharma Expires May 2001 13 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000VT-1.5. The STS-1 SPE corresponds to a VC-3, a VT-6 SPE corresponds to a VC- 2, a VT-2 SPE corresponds to a VC-12, and a VT-1.5 SPE corresponds to a VC-11. The SONET VT-3 SPE has no correspondence in SDH,and the SDHhowever SDH's VC-4has no correspondence in SONET. A continuous flow of one of such elements constitutes an SDH or SONET signal.corresponds to SONET's STS-3c SPE. In addition, it is possible to concatenate some of the structures that contain these elements to buildbiggerlarger elements. For instance, SDH allows the concatenation of X contiguous AU-4s to build a VC-4- Xc and of m contiguous TU-2s to build a VC-2-mc. In that case, a VC- 4-Xc or a VC-2-mc can be switched and controlled by MPLS. Note that SDHdefinesalsothedefines virtual (non-contiguous) concatenation of TU- 2s, but in that case each constituent VC-2 is switched individually. 4.2. SDH/SONET LSR and LSP Terminology Let a SDH or SONET Terminal Multiplexer (TM), Add-Drop Multiplexer (ADM) or cross-connect (i.e. a switch) be called an SDH/SONET LSR. A SDH/SONET path or circuit between two SDH/SONET LSRs now becomesan MPLSa GMPLS LSP. An SDH/SONET LSP is a logical connection between the point at which a tributary signal (client layer) isassembledadapted into its virtual container, and the point at which it isdisassembledextracted fromtheits virtual container.The position taken r by a tributary signal in a virtual container will be referred to as an SDH/SONET signal.To establish such an LSP, a signaling protocol is required to configure the input interface, switch fabric, and output interface of each SDH/SONET LSR along the path. An SDH/SONET LSP can be point- to-point or point-to-multipoint, but not multipoint-to-point, since no mergingcapabilityispossible.possible with SDH/SONET signals. To facilitate the signaling and setup of SDH/SONET circuits, an SDH/SONETLSR,LSRmust, therefore,mustidentify each possible signal individually per interface, since each signal corresponds to a potential LSP that can be established through the SDH/SONET LSR. It turns out, however, that not all SDH signals correspond to anLSPsLSP and therefore not all of them need be identified. In fact, only those signals that can be switched need identification. 5. Decomposition of the MPLS Circuit-Switching Problem Space Bernstein, Mannie, Sharma Informational - January 2002 12 Although those familiar with MPLS may be familiar with its application in a variety of application areas, e.g., ATM, Frame Relay,etc.and so on, here we quickly review its decomposition when applied to the optical switching problem space. (i) Information needed to compute paths must be made globally available throughout the network. Since this is done via the link staterouterouting protocol, any information of this nature must either be in the existing link state advertisements (LSAs) or the LSAs must be supplemented to convey this information. For example, ifitsit is desirable to offer different levels of service in a network based on whether a circuit is routed over SDH/SONET lines that are ringBernstein, Mannie, Sharma Expires May 2001 14 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000protected versusnotbeing routed over those that are not ring protected (differentiation based on reliability), the type of protection on a SDH/SONET line would be an important topological parameter thatshouldwould have to be distributed via the link stateroute protocol..routing protocol. (ii) Information that is only needed between two "adjacent" switches for the purposes of connection establishment is appropriate for distribution via one of the label distribution protocols. Infactfact, this informationmay formcan be thought of as the "virtual" label. Forexampleexample, in SONETif we arenetworks, when distributing information to switches concerning anend-to- endend-to-end STS-1 path traversing a network, it is critical that adjacent switches agree on the multiplex entry used by this STS-1 (but this information is only of local significance betweenthethose two switches). Hence, the multiplex entry number in this case can be used as a virtual label. Note thatitthe label is virtual in that it is not appended to the payload in any way, but it is still a label in the sense that it uniquely identifies the signallocal tolocally on the link between the two switches. (iii) Information that all switches in the pathwillneed to know about a circuit will also be distributed via the label distribution protocol.ExampleExamples of such informationcaninclude bandwidth, priority, and preemptioninformation.for instance. (iv) Information intended only for end systems of the connection. Some of the payload type information in may fall into this category. [8],[10]. 6. MPLS Routing for SDH/SONET Modern transport networks based on SONET/SDH excel at interoperability in the performance monitoring (PM) and fault management (FM)areas, however, theyareas., They donotnot, however, inter-operate in the areas of topology discovery or resource status. Although link staterouterouting protocols, such as IS-IS and OSPF, have been used for some time in the IP world to compute destination-based next hops for routes (without routing loops), their value in providing timely topology and network status information in a distributed manner, i.e., at any network node, is immense. If resource utilization information is disseminated along with the link status (as was done in ATM's PNNI routing protocol) then a very complete picture of Bernstein, Mannie, Sharma Informational - January 2002 13 network status is available to a network operator for use in planning, provisioning and operations.InformationThe information needed to compute the path a connection will take through a network is important to distribute via the routing protocol. In the optical TDMcasecase, this information includes, but is not limited to: the available capacity of the network links, the switching and termination capabilities of the nodes and interfaces, and the protection properties of the link. When applying routing to circuit switchedsituationsnetworks it is useful to compare and contrast this situation with the datagram routing case.Bernstein, Mannie, Sharma Expires May 2001 15 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000In the case of routingfordatagrams all routes on all nodes must be calculated exactly the same to avoid loops and"blackholes"."black holes". Inthecircuit switching, this is not the case since routes areestablishestablished per circuit and are fixed for that circuit. Hence, unlike the datagram case, routing is not service impacting in the circuit switched case. This is helpful,sincebecause to accommodate the optical layernew information mustrouting protocols need to be supplementedto the routing protocols,with new information, much more than the datagram case. This informationwillis also likely to be used in different ways for implementing different user services. Due to the increase in information transferred in theroute protocolrouting protocol, it is important to separate the relatively static parameters concerning a linkwithfrom those that may be subject to frequent changes. This is particularly important in the case of available capacity advertisements. 6.1. Switching Capabilities The main switching capabilities that characterize a SONET/SDH end system and thusgetneed to be advertisedintovia the link staterouterouting protocol are: the switching granularity, supported forms of concatenation, and the level of transparency. 6.1.1. Switching Granularity FromError! Reference source not found. andreferences [3], [4]and the overview section on SONET/SDH we see that there are a number of different signals that compose the SONET/SDH hierarchies. Those signals that are referenced via a pointer, i.e., the VCs in SDH and the SPEs in SONET are those that will actually be switched within a SONET/SDH network. These signals are subdivided into lower order signals and higher order signals as shown in Table 2. Table 2. SDH/SONET switched signal groupings. Signal Type SDH SONET Lower Order VC-11, VC-12, VC-2 VT-1.5 SPE, VT-2 SPE, VT-3 SPE, VT-6 SPE Higher VC-3, VC-4 STS-1 SPE Bernstein, Mannie, Sharma Informational - January 2002 14 Order Manufacturers today differ in the types of switching capabilities their systems support. Many manufacturers today switch signals starting at VC-4 for SDH or STS-1 for SONET (i.e. the basic frame) and above (see concatenation section), but theydon't allow todo not switch lower order signals. Some of themallowonlyto switchallow the switching of entire aggregates (concatenated or not) of signals such as 16VC-4s,VC- 4s, i.e. a complete STM-16, and nothingbelow.finer. Somemanufacturersgo down to the VC-3 level for SDH. Finally, somemanufacturers allow to go lower thanoffer highly integrated switches that switch at theVC-3/STS-1,VC-3/STS-1 level down to lower order signals such as VC-12s.Some combinations are also possible, such as down to VC-12 for unprotected circuits and nothing below VC- 4 for fast restoration. Bernstein, Mannie, Sharma Expires May 2001 16 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 We can see that very different granularities can be considered. These granularities can even vary between services.In order to cover the needs of all manufacturers and operators,we don't limit the scope of our work toGMPLS must consider both higher ordersignalsandwe consider that we have to design a solution able to control the complete SDH/SONET multiplex. Of course, one could just use it to control the higherlower order signals. 6.1.2. Signal Concatenation Capabilities As stated in the SONET/SDH overview, to transport tributary signals with rates in excess of the basic STM-1/STS-1 signal, the VCs/SPEs can be concatenated, i.e., glued together. Different types of concatenations are defined:contiguiouscontiguous standard concatenation, arbitrarycontiguousconcatenation, and virtual concatenation with different rules concerning their size, placement, and binding. Standard SONET concatenation allows the concatenation of M x STS-1 signals within an STS-N signal with M <= N, and M = 3, 12, 48, 192,...). The SPEs of these M x STS-1s can be concatenated to form an STS-Mc. The STS-Mc notation is short hand for describing an STS-M signal whose SPEs have been concatenated. The multiplexing procedures for SONET and SDH are given in references[3], [4], [5],[3]and [4]. Constraints are imposed on the size of STS-Mc signals, i.e., they must be a multiple of 3, and on their starting location and interleaving. This has the following advantages: (a) restriction to multiples of 3 helps with SDH compatibility (there is no STS-1 equivalent signal in SDH); (b) the restriction to multiples of 3 reduces the number of connection types; (c) the restriction on the placement and interleaving could allow more compact representation of the "label"; The major disadvantages of these restrictions are: (a) Limited flexibility in bandwidth assignment (somewhat inhibits finer grained traffic engineering). (b) The lack of flexibility in starting time slots for STS-Mc signals and in their interleaving (where the rest of the signal gets put in terms of STS-1 slot numbers) leads to the requirement for re-grooming (due to bandwidth fragmentation). Due to these disadvantages some SONET framer manufacturers now support "flexible" or arbitrary concatenation, i.e., no restrictions on the size of an STS-Mc (as long as M <= N) and no constraints on the STS-1 timeslots used to convey it, i.e., the signals can use any combination of available time slots. Bernstein, Mannie, Sharma Informational - January 2002 15 Standard and flexible concatenations are network services, while virtual concatenation is a SONET/SDHend systemend-system service recently approved by the committee T1 of ANSI and ITU-T. The essence of this service is to have SONET/SDH end systems "glue" together the VCs or SPEs of separate signals rather thantherequiring that he signalsbeingbe carried through the network as a single unit. In one example of virtualconcatenationconcatenation, two end systems supporting this feature could essentially "inverse multiplex" two STS-1s into a virtual STS-2c forBernstein, Mannie, Sharma Expires May 2001 17 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000the efficient transport of 100Mbps Ethernet traffic. Note that this inverse multiplexing process can be significantly easier to implement with SONET/SDH signals rather thanforpackets.Virtual concatenation, beingSince virtual concatenationis provided by end systems, it is compatible with existing SONET/SDH networks. Virtual concatenation is defined for both higher order signals and low order signals. Table 3 shows the nomenclature and capacity for severallow orderlower-order virtually concatenated signals containedinwithin differenthigher orderhigher-order signals. Table 3 Capacity of Virtually Concatenated VTn-Xv ( 9/G.707) Carried In X Capacity In steps ofVT1.5/VVT1.5/ STS-1/VC-3 1 to 28 1600kbit/s to 1600kbit/sC-11-XvVC-11-Xv 44800kbit/sVT2/VC-VT2/ STS-1/VC-3 1 to 21 2176kbit/s to 2176kbit/s12-XvVC-12-Xv 45696kbit/sVT1.5/VVT1.5/ STS-3c/VC-4 1 to 64 1600kbit/s to 1600kbit/sC-11-XvVC-11-Xv 102400kbit/sVT2/VC-VT2/ STS-3c/VC-4 1 to 63 2176kbit/s to 2176kbit/s12-XvVC-12-Xv 137088kbit/s 6.1.3. SDH/SONET Transparency The purposed of SONET/SDH is to carry its payload signals in a transparent manner. This can include some of the layers of SONETitself, i.e.,itself. For example, situations where the path overhead can never betouchedtouched, since it actually belongs to the client. This was another reasonis why we didnÆt want to code anyfor not coding an explicit label in SDH/SONET path overhead. It may be useful to transport, multiplex and/or switch lower layers of the SONET signal transparently. As mentioned in theintroductionintroduction, SONET overhead is broken into three layers: Section, Line and Path.AllEach of these layersareis concerned with fault and performance monitoring. The Section overhead is primarily concerned withframing andframing, while the Line overhead is primarily concerned with multiplexing and protection. To perform multiplexing, a SONET network element should be line terminating. However, not all SONET multiplexers/switches perform Bernstein, Mannie, Sharma Informational - January 2002 16 SONET pointer adjustments on all the STS-1s contained withinthem ora higher order SONET signal passing through them. Alternatively, if they performthepointeradjustmentsadjustments, they do not terminate the line overhead. For example, a multiplexer may take four SONET STS-48 signals and multiplex them onto an STS-192 without performing standard line pointer adjustments on the individual STS-1s. This can be looked at as a service since it may be desirable to pass SONET signals, like an STS-12 or STS-48, with some level of transparency through a network and still take advantage ofTDM.TDM technology. Transparent multiplexing and switching can also be viewed as a constraint, since some multiplexers and switches mayBernstein, Mannie, Sharma Expires May 2001 18 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000not switchatwith as fine a granularity as others. Table 4 summarizes the levels of SONET/SDH transparency. Table 4. SONET/SDH transparency types and their properties. Transparency Type Comments Path Layer (or Line Standard higher order SONET path Terminating) switching. Line overhead is terminated or modified. Line Level (or Section Preserves line overhead and switchestheTerminating) the entire line multiplex as a whole. Section overhead is terminated or modified. Section layer Preserves all section overhead,basicallyBasically does not touch any of the SONET/SDH bits. 6.2. Protection SONET and SDH networks offer a variety of protection options at both the SONET line (SDH multiplex section) andSONETSONET/SDH pathlevel.level[5][6]. Standardized SONET line level protection techniques include Linear 1+1 and Linear 1:N automatic protection switching (APS) and both two-fiber and four-fiberbi- directionalbi-directional line switched rings (BLSRs). At the path layer, SONET offers uni-directional path switched ring protection. Both ring and 1:N line protection also allow for "extra traffic" to be carried over the protection line when that line is not being used, i.e., when it is not carrying traffic for a failed working line. These protection methods are summarized in Table 5. It should be noted that these protection methods are completely separateoffrom any MPLS layer protection or restoration mechanisms. Table 5. Common SONET/SDH protection mechanisms. Protection Type Extra Comments Traffic Optionally Bernstein, Mannie, Sharma Informational - January 2002 17 Supported 1+1 No Requires no coordination Unidirectional between the two ends of the circuit. Dedicated protection line. 1+1 Bi- No Coordination via K byte directional protocol. Lines must be consistently configured. Dedicated protection line. 1:1 Yes Dedicated protection. 1:N Yes One Protection line sharedBernstein, Mannie, Sharma Expires May 2001 19 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000by N working lines.N @ 1 44F-BLSR (4 Yes Dedicated protection, with fiber bi- alternative ring path. directional line switched ring) 2F-BLSR (2 Yes Dedicated protection, with fiber bi- alternative ring path directional line switched ring) UPSR (uni- No Dedicated protection via directional alternative ring path. path switched Typically used in access ring) networks. It may be desirable to route some connections over lines that support protection of a given type, while others may be routed over unprotected lines, or as "extradata"traffic" over protection lines.AlsoAlso, to assist in the configuration of these various protection methods it can be extremely valuable to advertise the link protection attributes in therouterouting protocol. For example suppose that a 1:N protection group is being configured via two nodes. One must make sure that the lines are "numbered the same" with respect to bothendends of the connection or else the APS (K1/K2 byte) protocol will not correctly operate. Table 6. Parameters defining protection mechanisms. Protection Comments Related Link Bernstein, Mannie, Sharma Informational - January 2002 18 Information Protection Type Indicates which of the protection types delineated in Table 5. Protection Indicates which of several protection Group Id groups (linear or ring) that a node belongs to. Must be unique for all groups that a node participates in Working line Important in 1:N case and to differentiate number between working and protection lines Protection line Used to indicate if the line is a number protection line. Extra Traffic Yes or No Supported Layer If this protection parameter is specific toBernstein, Mannie, Sharma Expires May 2001 20 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000SONET then this parameter is unneeded, otherwise it would indicate the signal layer that the protection is applied.How much information to disseminateAn open issue concerning protection isan open issue withthe extent of information regarding protection that must be disseminated. The contents of Table 6representingrepresent one extremeand awhilea simple enumerated list of: Extra-Traffic/Protection line, Unprotected, Shared (1:N)/Working line, Dedicated (1:1, 1+1)/Working Line, Enhanced (Ring) /Working Line,representingrepresents the other. There is also a potential implication for link bundling, that is, for each link, the routing protocol could advertise whetheritthat link is a working or protection link and possibly some parameters from Table 6. A possible drawback of this scheme is that the routing protocol would be burdened with advertising properties even for those protection links in the network that couldnotnot, infactfact, be used for routing working traffic, e.g., dedicated protection links. An alternative method, would be to bundle the working and protection linkstogethertogether, and advertise the bundle instead. Now, for each bundled link, the protocol would have to advertise the amount of bandwidth available on its working links, as well as the amount of bandwidth available on those protection links within the bundle that were capable of carrying "extra traffic." This would reduce the amount of information to be advertised. An issue here would be to decide which types of working and protection links to bundle together. For instance, it might be preferable to bundle working Bernstein, Mannie, Sharma Informational - January 2002 19 links (and their corresponding protection links) that are "shared" protected separately from working links that are "dedicated" protected. 6.3. Available Capacity AdvertisementInternally to eachEach SDH/SONET LSRinterface, amust maintain an internal tableis maintained indicatingper interface that indicates each signalallocatedin the multiplexstructure.structure that is allocated at that interface. This internal table is the most complete and accurate view of the link usage and available capacity.ThisFor use in path computation, this information needs to be advertised in some way to all others SONET/SDH LSRs in the same domainfor use in path computation.. There is a trade off to be reached concerning: the amount of detail in the available capacity information to be reported via a link state routing protocol, the frequency or conditions under which this information is updated, the percentage of connection establishments that are unsuccessful on their firstattempt,attempt due to the granularity of the advertised information, and the extent to which network resources can be optimized. There are different levels of summarization that are being considered today for the available capacity information. At oneextremeextreme, all signals that are allocated on an interface could beBernstein, Mannie, Sharma Expires May 2001 21 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000advertised,or onwhile at the other extreme,ana single aggregated value of the available bandwidth per link could be advertised. Consider first the relatively simple structure of SONET and its most common current and planned usage. DS1s and DS3s are the signals most often carried within a SONET STS-1. Either a single DS3 occupies the STS-1 or up to 28 DS1s (4 each within the 7 VT groups) are carried within the STS-1. With a reasonable VT1.5 placement algorithm within each node it may be possible to just report on aggregate bandwidth usage in terms of number of whole STS-1s (dedicated to DS3s) used and the number of STS-1s dedicated to carryingDS1sallocatedDS1s allocated for this purpose..This way a network optimization program could try to determine the optimal placement of DS3s and DS1s to minimize wasted bandwidth due to half-empty STS-1s at various places within the transport network. Similarly consider the set of super rate SONET signals (STS-Nc). If the links between the two switches support flexible concatenation then the reporting is particularly straightforward since any of the STS-1s within an STS-M can be used to comprise the transported STS- Nc. However, if only standard concatenation is supported then reporting gets trickier since there are constraints on where the STS-1s can be placed. SDH has still more options andconstraintsconstraints, hence it is not yet clearyetwhich is the best way to advertise bandwidth resource availability/usage in SONET/SDH. However, due to the multiplexed nature of the signals reporting of bandwidth particular to signal types rather than as a single aggregate bit rate is highly desirable. Bernstein, Mannie, Sharma Informational - January 2002 20 6.4. Path Computation Although a link staterouterouting protocol can be used to obtain network topology and resource information, this does not imply the use of an "open shortest path first" route. The path must be open in the sense that the links must be capable of supporting the desired signal type and that capacity must be available to carry the signal. Other constraints may include hop count, total delay (mostly propagation), andhop count. Inunderlying protection.In addition, it may be desirable to route traffic in order to optimize overall network capacity, or reliability, or some combination of the two. Dikstra's algorithm computes the shortest path with respect to link weights for a single connection at a time. This can be much different than the paths that would be selected in response to a request to set up a batch of connections between a set of endpoints in order to optimize network link utilization. One can think of this along thelinelines of global or local optimization of thenetwork.network in time. Due to the complexity of some of therouteconnectionrouting algorithms (highdimensionalitydimensionality, non-linear integer programming problems) and various criteria by which one may optimizetheir networka network, it may not be possible or desirable to run these algorithms on network nodes. However, it may still be desirable to have some basic path computation ability running on the network nodes, particularlyinfor use during restoration situations. Such an approach is in line with the use ofBernstein, Mannie, Sharma Expires May 2001 22 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000MPLS for trafficengineeringengineering, but is much different than typical OSPF or IS-IS usage where all nodes must run the sameroute algorithm. 6.5. Link Bundling in Routing: Reducing Adjacencies A brief mention is in order here about how the SDH/SONET links can be advertised in routing protocols. We have alluded to routing issues before, but a point worth advertising that link bundling may be used to announce bundles of SDH/SONET links. This would considerably reduce the amount of information advertised in routing, as well as the number of IP addresses actually consumed by SDH/SONET links and interfaces. Furthermore, bundled links could, in turn, be advertised in IGProutingtables as forwarding adjacencies (Fas) for use by subsequent lower speed circuits. While the issue of exactly how to bundle links and the specifics of how to advertise them have received attention in the IETF for packet-based links, some of the details of this process, especially for SDH/SONET networks is still under study.algorithm. 7. LSP Provisioning/Signaling for SDH/SONET Traditionally, end-to-end circuit connections in SDH/SONET networks have been set up via network management systems (NMSs), which issue commands (usually under the control of a human operator) to the various network elements involved in the circuit, via an equipment vendor's element management system (EMS). Very little multi-vendor interoperability has been achieved via management systems. Hence, end-to-end circuits in a multi-vendor environment typically require the use of multiple management systems and the infamous configuration via "yellow sticky notes". As discussed in Section 2, a common signaling protocol, such as RSVP with TE extensions or CR- LDP appropriately extended for circuit switching applications, could therefore help to solve these interoperability problems. In this section, we examine the various components involved in the automated provisioning of SONET/SDHLSPs and the associated signaling.LSPs. 7.1.1. What do we Label in SDH/SONET? Frames or Circuits? MPLS was initially introduced to control asynchronous technologies like IP, where a label was attached to each individual block of data, such as an IP packet or a Frame Relay frame. SONET and SDH, Bernstein, Mannie, Sharma Informational - January 2002 21 however, are synchronous technologies that define a multiplexing structure (see Section1.2),3.2), which we referred to as the SDH (or SONET)multiplex in Section 1.2.multiplex. This multiplex involves a hierarchy of signals, lower order signals embedded within successive higher order ones (see Fig. 1). Thus, depending on its level in the hierarchy, each signal consists of frames that repeat periodically, with a certain number of byte time slots perframe, and these signals can be controlled using MPLS. Bernstein, Mannie, Sharma Expires May 2001 23 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000frame. The question then arises: is it these frames that we label inMPLS?GMPLS? It will be seen in what follows thatwe do not consider thateach SONET or SDH "frame"hasneed not have its ownlabel and that welabel, nor is it necessary to switch frames individually. Rather, the unit that is switched is a "flow" comprised of a continuous sequence of time slots that appear at a given position insucha frame. That is, we switch an individual SONET or SDH signal,withand a label associated with each given signal. For instance, the payload of an SDH STM-1 frame does not fully contain a complete unit of user data. In fact, the user data is contained in a virtual container (VC) that is allowed to float over two contiguous frames for synchronization purposes. A pointer in the Section Overhead (SOH) indicates the beginning of the VC in the payload. Thus, frames are now inter-related, since each consecutive pair may share a common virtual container. From the point of view ofMPLS,GMPLS, therefore, it is not the successive frames that are treated independently or labeled, but rather the entire user signal. An identical argument applies to SONET. Observe also that theMPLSGMPLS signaling used to control the SDH/SONET multiplex must honor its hierarchy. In other words, the SDH/SONET layer should not be viewed as homogeneous and flat, because this would limit the scope of the services thatitSDH/SONET can provide. Instead,MPLSGMPLS tunnels should be used to dynamically and hierarchically control the SDH/SONET multiplex. For example, one unstructured VC-4 LSP may be established between two nodes, and later lower order LSPs (e.g. VC-12) may be created within that higher order LSP. This VC-4 LSP can, in fact, be established between two non-adjacent internal nodes in an SDH network, and later advertised by a routing protocol as a new (virtual) link called a Forwarding Adjacency (FA).AnA SONET/SDH-LSR will have to identify each possible signal individually per interface to fulfill theMPLSGMPLS operations. In order to stay transparent the LSR obviously should not touch the SONET/SDH overheads; this is why an explicit label is not encoded in the SDH/SONET overheads. Rather, a label is associated with each individual signal. This approach is similar to the one considered for lambda switching, except that it is more complex, since SONET and SDH define a richer multiplexing structure. Therefore a label is associated with each signal, and islocal andlocally unique for each signal at each interface. This signal could, and will most probably, occupy different time-slots at different interfaces. Bernstein, Mannie, Sharma Informational - January 2002 22 7.2. Label Structure in SDH/SONET The signaling protocol used to establish an SDH/SONET LSP must have specific information elements in it to map a label to the particular signal type that itrepresentsrepresents, and to the position of that signal in the SONET/SDH multiplex. As we will see shortly,however,with a carefully chosen label structure, the label itself can be made to function as this information element.Bernstein, Mannie, Sharma Expires May 2001 24 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000In general, there are two ways to assign labels for signals between neighboring SDH/SONET LSRs. One way is for the labels to be allocated completely independently of any SDH/SONET semantics; e.g. labels could just be unstructured 16 or 32 bit numbers. In that case, in the absence of appropriate binding information, a label gives no visible information about the flow that it represents. From a management and debugging point of view, therefore, it becomes difficult to match a label with the corresponding signal, since , as we saw in Section4.1.1,7.1.1, the label is not coded in the SDH/SONEToverhead(s)ofoverhead of the signal. Another way is to use thewell definedwelldefined and finite structure of the SDH/SONET multiplexing tree to devise acleversignal numbering scheme that makes use of the multiplex as a naming tree, and assigns each multiplex entry a unique associated value. This allows theunequivocalunique identification of each multiplex entry (signal) in terms of its type and position in the multiplex tree. By using this multiplex entry value itself as the label, we automatically add SDH/SONET semantics to the label! Thus, simply by examining the label, one can now directly deduce the signal that it represents, as well as its position in the SDH/SONET multiplex. We refer to this as multiplex-based labeling. This is the idea that was incorporated in the GMPLS signalingspecifications. In the following sections, we look at this label structure in more detail. 7.2.1. SDH/SONET Multiplex Entry Name We will use the SDH multiplex, defined in recommendation G.707 Figure 6-1, as the basic reference to identify signals. It defines a tree, whose root is an STM-Nsignal, and whose leaves are the signals that can be transported (hierarchically) within the STM-N. This tree will be used as a naming tree to create unique multiplex entry values as discussed in the previous subsection. This entry will identify at the same time the type of signal and its position in the multiplex. Figure 1 shows the SDH and SONET multiplexes. The possible leaves of that tree are VC-4, VC-3, VC-2, VC-12 or VC- 11. According to the multiplex structure there is a maximum of 1 VC- 4, 3 VC-3s, 21 VC-2s, 63 VC-12s or 84 VC-11s in one STM-1. Of course, different VCs may be combined according to the combination rules of the SDH multiplex. A maximum of 172 (1+3+21+63+84) different signals, therefore, may be identified in one STM-1. Although some of them use the same physical space, and are therefore incompatible, for simplicity we will give a unique name to each of them. For that purpose we extend the well-known (K, L, M) numbering scheme defined in G.707 section 7.3..N STM-1 signals may be interleaved together to form an STM- Nsignal. It results that we must identify the STM-1 that is itself decomposed in sub-signals. We discuss concatenation in Section 4.3. Bernstein, Mannie, Sharma Expires May 2001 25 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 This method is directly applicable to SONET as shown in Fig. 1, since the SONET multiplex can be seen as a sub-tree of the SDH multiplex tree. 7.2.2. SDH/SONET Multiplex Entry Notation We propose the - following hierarchical multiplex entry notation: (S, U, K, L, M) or S.U.K.L.M (in dot notation), where S: 1 -> N : indicates a specific STM-1/STS-1 inside an STM-N/STS- N multiplex. U: 0 -> 4 : index of an SDH Administrative Unit (AU-4 or AU-3). K: 0 -> 4 : index indicating the content of a VC-4. L: 0 -> 8 : index indicating the content of a TUG-3, VC-3 or STS- 1 SPE. M: 0 -> 10 : index indicating the content of a TUG-2 or VT Group. Each letter indicates a possible branch number starting at the parent node in the naming tree. Branches are numbered in the increasing order, starting from the top of the naming tree. The numbering starts at 1, and zero is used to indicate a non- significant field. S is the index of a particular STM-1/STS-1. S=1->N indicates a specific STM-1/STS-1 inside an STM-N/STS-N multiplex. For example, S=1 indicates the first STM-1/STS-1, and S=N indicates the last STM- 1/STS-1 of this multiplex. U is only significant for SDH and must be ignored for SONET. It indicates a specific VC inside a given STM-1. U=1 indicates a single VC-4, while U=2->4 indicates a specific VC-3 inside the given STM-1. K is only significant for SDH and must be ignored for SONET. It indicates a specific branch of a VC-4. K=1 indicates that the VC-4 is not further sub-divided and contains a C-4. K=2->4 indicates a specific TUG-3 inside the VC-4. K is not significant when the STM-1 is divided into VC-3s (and is easy to read and test). L indicates a specific branch of a TUG-3, VC-3 or STS-1 SPE. It is not significant for an unstructured VC-4. L=1 indicates that the TUG-3/VC-3/STS-1 SPE is not further sub-divided and contains a VC- 3/C-3 in SDH or the equivalent in SONET. L=2->8 indicates a specific TUG-2/VT Group inside the corresponding higher order signal. M indicates a specific branch of a TUG-2/VT Group. It is not significant for an unstructured VC-4, TUG-3, VC-3 or STS-1 SPE. M=1 indicates that the TUG-2/VT Group is not further sub-divided and contains a VC-2/VT-6. M=2->3 indicates a specific VT-3 inside the corresponding VT Group, these values MUST NOT be used for SDH since Bernstein, Mannie, Sharma Expires May 2001 26 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 there is no equivalent of VT-3 with SDH. M=4->6 indicates a specific VC-12/VT-2 inside the corresponding TUG-2/VT Group. M=7->10 indicates a specific VC-11/VT-1.5 inside the corresponding TUG-2/VT Group. Note that M=0 denotes an unstructured VC-4, VC-3 or STS-1 SPE (easy for debugging). SDH SONET unstructured VC-4/VC-3 unstructured STS-1 SPE VC-2 VT-6 1st VT-3 2nd VT-3 1st VC-12 1st VT-2 2nd VC-12 2nd VT-2 3rd VC-12 3rd VT-2 1st VC-11 1st VT-1.5 2nd VC-11 2nd VT-1.5 3rd VC-11 3rd VT-1.5 4th VC-11 4th VT-1.5 Table 7. Encoding of the M field in the SDH/SONET multiplex entry. This may be illustrated with the following examples. Example 1: S>0, U=1, K=1, L=0, M=0 Denotes the unstructured VC-4 of the Sth STM-1. Example 2: S>0, U=1, K>1, L=1, M=0 Denotes the unstructured VC-3 of the Kth-1 TUG-3 of the Sth STM-1. Example 3: S>0, U=0, K=0, L=0, M=0 Denotes the unstructured STS-1 SPE of the Sth STS-1. Example 4: S>0, U=0, K=0, L>1, M=1 Denotes the VT-6 in the Lth-1 VT Group in the Sth STS-1. Example 5: S>0, U=0, K=0, L>1, M=9 Denotes the 3rd VT-1.5 in the Lth-1 VT Group in the Sth STS-1. 7.2.3. SDH/SONET Multiplex Entry Encoding: A multiplex entry name may be used directly as a label, or may be used in an information element of a signaling protocol to associate a label with the corresponding multiplex entry (signal). In both cases, a multiplex entry can be coded as described in Figure 3 .This coding has also been proposed for the SDH/SONET labels in GMPLS. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Bernstein, Mannie, Sharma Expires May 2001 27 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 | S | U | K | L | M | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The current SDH standards only allow N to take the discrete values 0, 1, 4, 16 or 64. Today, in practice all of them are used: STM-0 (51.840 Mb/s), STM-1 (155.52 Mb/s), STM-4 (622.08 Mb/s), STM-16 (2488.32 Mb/s) and STM-64 (9953.26 Mb/s). In the future, it is likely that N will grow up to 256 or 1024. This fixes the number of possible different multiplex entry names to 1024 x 172 = 176128. Note that an SDH LSR does not need to maintain a table of this size, it just needs to maintain a list of multiplex entries that it has allocated at any given time. 7.2.4. Hierarchical Label Allocation: At any particular point in time, a given position in the SDH/SONET multiplex may either be a valid position or not, according to the signals already allocated, and if valid, may either be used or be free. Thus, a multiplex entry (time-slot) must be interpreted in relation tothe already allocated multiplex entries (time-slots). The fact that two neighboring SDH/SONET LSRs allocate a label for a particular LSP implies that the corresponding time-slot will be enabled in the multiplex between the two LSRs. When an SDH/SONET LSP is removed, the corresponding local label is released, and the corresponding multiplex space may be re-used. An MPLS conservative label retention mode must be implemented when using multiplex based labeling. For instance, for a downstream-on-demand label allocation, the upstream LSR must indicate the type of signal it wants to forward. The downstream SDH-LSR must check if such a signal is available in its multiplex, and, if it is available, return the corresponding label. With multiplex-based labeling, the upstream SDH/SONET LSR can easily verify if the right type of signal was allocated by the downstream SDH/SONET LSR , just by looking at the label. In this case, the downstream SDH-LSR is applying a straightforward SDH/SONET call admission control (CAC) function based on the space available in the multiplex. Note that the two SDH/SONET LSRs should have identical multiplex tables, so that even before requesting a label, the upstream SDH/SONET LSR could even check its own multiplex table for that particular interface, to see if space is available for that signal. The two neighboring SDH/SONET LSRs could also have a mechanism to periodically check if their multiplex tables are identical, i.e. fully synchronized. This can be achieved through the MPLS signaling simply by exchanging the complete multiplex tables or the list of currently allocated signals (labels). If the neighboring SDH-LSRs discover that their multiplex tables are not identical, a fault should immediately be triggered to alert a NMS Bernstein, Mannie, Sharma Expires May 2001 28 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Note that since an SDH-LSR may have a neighbor relationship at different levels of the SDH/SONET hierarchy, the multiplex table that is common between two neighboring SDH/SONET LSRs should be understood in the context of that relationship. That is, neighboring SDH-LSRs should compare only the list of LSPs that they negotiated as peers at a particular level of the hierarchy For instance, in Figure 3 (please refer to pdf document; available from authors), SDH/SONET LSR2 and SDH/SONET LSR3 may have an unstructured VC-4 established between them, while SDH/SONET LSRs 1 and 4 may have a VC-12 established within that VC-4. If LSR2 and LSR21 compare their multiplex tables, LSR2 must ensure that is sends just the view that LSR21 has of the multiplex. For example, LSR21 knows nothing about the contents of the VC-4, and so should not be sent information about it.specifications [7]. 7.3. Signaling Elements In the preceding sections, we defined the meaning of a SDH/SONET label and specified its structure. A question that arises naturally at this point is the following. In an LSP or connection setup request, how do we specify the signal for which we want to establish a path (and for which we desire a label)? Clearly, information that is required to completely specify the desired signal and its characteristics must be transferred via the label distribution protocol, so that the switches along the path can be configured to correctly handle and switch the signal.As we explain ahead, thisThis information is specified in three parts, each of which refers to a different network layer. The first specifies the nature/type of the LSP or the desired SDH/SONET channel, in terms of the particular signal (or collection of signals) within the SDH/SONET multiplex that the LSP represents, and is used by all the nodes along the path of the LSP. Bernstein, Mannie, Sharma Informational - January 2002 23 The second specifies the payload carried by the LSP or SDH/SONET channel, in terms of the termination and adaptation functions required at the end points, and is used by the source and destination nodes of the LSP. The third specifies certain link selection constraints, which control, at each hop, the selection of the underlying link that is used to transport this LSP.In the following subsections, we discuss each of these in more detail. 7.3.1. Nature of the LSP: LSP Encoding Type, Signal Type, and Connection Bundling The nature of the SDH/SONET signal is specified collectively by the LSP encoding type and signal type fields, which identify (via appropriate rules) the specific connection point types on a particular interface/port that may be used to switch this signal or LSP. Another element specifying the nature of the desired LSP is the Bernstein, Mannie, Sharma Expires May 2001 29 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 extent, if any, of connection grouping, which is specified by a combination of two fields that denote respectively, the type of grouping requested by the LSP and the number of components in that grouping. Recall that in TDM networks, the link connection points (or the type of signals within a SDH/SONET multiplex that the link can switch) provided by a link are limited to a fixed, discrete set. Thus, the link connection points that are suitable for carrying a given LSP are limited to those that match the LSP type and the signal type, or to which the LSP type and signal type can be readily adapted (by mapping to a container). 7.3.1.1. LSP Encoding Type and Signal Type In particular, the LSP encoding type indicates the technology of the LSP being requested, and includes, for example, ANSI PDH, ETSI PDH, SDH, and SONET. The signal type field indicates the specific signal type of the LSP being requested, and is interpreted in the context of the technology specified in the LSP encoding type. Thus, the signal type provides transit switches with information required to determine the connection point types (timeslots/labels) that can suppor t this LSP. As an example, the permitted LSP encoding types with their permitted signal types for SDH are shown in Table 8. A detailed discussion of the encoding types appears in [7]. LSP Encoding Type Signal Type SDH 1 VC-11 2 VC-12 3 VC-2 4 TUG-2 5 VC-3 6 TUG-3 7 VC-4 8 STM-1 9 STM-1 MS 10 STM-1 RS 12 STM-4 13 STM-4 MS 14 STM-4 RS 16 STM-16 17 STM-16 MS 18 STM-16 RS 20 STM-64 21 STM-64 MS 22 STM-64 RS 24 STM-256 25 STM-256 MS 26 STM-256 RS Bernstein, Mannie, Sharma Expires May 2001 30 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Table 8 Permitted LSP encoding types and their corresponding signal types for SDH. By way of example, a DS3 LSP can be supported by link connections of type DS3, or by link connections of type STS-1, if a DS3/STS-1 adaptation function is available at the source (and a corresponding one is available at the destination of the DS3 LSP). A DS3 LSP cannot, for instance, be routed on link connections of type VT1.5, no matter how many are available, since the associated links do not have the capability to switch DS3 signals. Therefore the LSP encoding type and signal type are fundamental in indicating the nature of the LSP requested, and in enabling the determination of which available link connections may carry the signal. 7.3.1.2. Connection Bundling Since a number of non concatenated STS-1s may be routed together as a group (that is, all contained within the same SONET line or WDM signal) and receive essentially the same delay and propagation, they are specified by a requested grouping type (RGT) field in GMPLS. This denotes how many connections of a given signal type are requested together, which ensures that they meet similar routing constraints. Since the specific group routing constraints depend on technology, this parameter also is interpreted in the context of the LSP encoding type. The values for SONET/SDH are no grouping, virtual concatenation, and continuous arbitrary concatenation (or flexible concatenation), and continuous standard concatenation, as explained in Section 3.1.2. For virtual concatenation, all components in the group must be routed via the same higher order container. For contiguous standard concatenation, there must be a standard number of components (3, 12, 48, etc.), and they must be in one higher order container. For contiguous arbitrary concatenation, the number of components is arbitrary (2, 3, 4, à) and they still must be routed in one higher order container. Such concatenation simplifies connection establishment (especially for batches of DS-3s that are being wholesaled) and speeds re- routes. Since bundling may be important when establishing STS-1s that will be used between end-systems implementing virtual concatenation, it is recommended that the labels chosen for SONET paths be capable of incorporating the concept of STS-1 bundling. The bundling of larger signals, i.e., groups of STS-Mc, is for further study. Finally, there is also a field that indicates the requested number of components (RNT), that is, the number of identical signal types that are requested to be grouped into an LSP, as specified in the RGT field. All components are assumed to have identical characteristics, of course, and the field is set to zero when no grouping is requested. 7.3.2 Payload Type Bernstein, Mannie, Sharma Expires May 2001 31 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 As discussed earlier, the label request must also carry an identifier of the payload that is carried by the LSP. The payload identifies the client layer of that LSP, is interpreted in the context of the LSP encoding type, and is used by the end-points of the LSP. As an example, Table 9 depicts a suggested organization of the generalized payload identifier (GPID) values for SDH and SONET.. LSP Encoding Type Payload/Client Type SDH Unknown Asynchronous mapping of E4 Asynchronous mapping of DS3 Asynchronous mapping of E3 Bit synchronous mapping of E3 Byte synchronous mapping of E3 Asynchronous mapping of DS2 Bit synchronous mapping of DS2 Byte synchronous mapping of DS2 Asynchronous mapping of E1 Byte synchronous mapping of E1 Byte synchronous mapping of 31 * DS0 Asynchronous mapping of DS1 Bit synchronous mapping of DS1 Byte synchronous mapping of DS1 ATM mapping SONET Unknown DS1 SF Asynchronous DS1 ESF Asynchronous DS3 M23 Asynchronous DS3 C-Bit Parity Asynchronous VT STS ATM POS Table 9. The payload type indicator in the context of the LSP encoding type for SDH/SONET. A value of "unknown" indicates that the payload carried by the LSP is either unknown or not relevant to know for the end points of the current LSP. 7.3.3. Link Protection Type The link protection type carried in the label request indicates the level of protection that an LSP desires on the links at each hop along its path. In other words, the link protection is local to the interface between two adjacent nodes, and controls how the underlying link at a particular hop is protected. It is, therefore, distinct from MPLS-level protection (see [12]), which involves Bernstein, Mannie, Sharma Expires May 2001 32 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 protection of the actual LSP (which may be done either end-to-end, via path-based protection, or locally, via bypass tunnels). The link protection may be represented as a vector of flags, where one or more protection levels may be turned on simultaneously. A value of 0 implies that this connection does not care about which, if any, link protection is used. More than one bit may be set to indicate when multiple protection types are acceptable. When multiple bits are set and multiple protection types are available, the choice of protection type is a local (policy) decision. The following flags are defined: Extra Traffic Indicates that links that are reserved for automatic recovery in case of a fault elsewhere in the network may be used for this LSP. Observe that this means that the LSP can be disrupted whenever such a link is needed for its assigned recovery purpose. In other words, the LSP can be dropped even if there is not fault on the links along which this LSP is routed. Unprotected "Unprotected" indicates that unprotected links may be used by this LSP. This means that the LSP will only lose service on this hop, if there is a fault along this particular link (a fault elsewhere will not affect this link and therefore this LSP). In other words, "unprotected" can be regarded as a "neutral" form of protection. The LSP does not lose service as long as the link is up, but loses service once this link goes down, since the link itself is not protected by a backup link. Shared Indicates that protected (working) links whose protection resources are shared with some number, say N, of other working links may be used by this LSP. This means that if there is a fault along this particular link, the LSP will lose service on this hop, only if the backup link is already in use by traffic from one of the remaining N-1 working links (due to an earlier fault on one of those links). Thus, the "shared" option can be regarded as a better form of protection, since the LSP is protected as long as there is no fault on any of the remaining N-1 working links that share the same backup link. Dedicated Indicates that links with dedicated protection, e.g., 1:1 or 1+1 protection, may be used by this LSP. This means that a protection link is reserved for the working link over which this LSP is routed, so that this LSP is always protected against any fault on its working link. Thus, the "dedicated" option offers a higher form of link-level protection. Enhanced Bernstein, Mannie, Sharma Expires May 2001 33 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Indicates that links that are multiply protected, such as via a ring switch and a span switch in a 4-fiber BLSR/MS-SPRING. Thus, the LPFs represent both a property of a link (which needs to be appropriately advertised in routing), as well as a constraint on which links may be used for a given path (which is signaled during connection setup as specified above).8.Choices for Control Channel Implementation One question that we have not yet addressed is how the so-called MPLS "control channel" is implemented? It turns out that there are several implementation choices for the control channel. One way is to use out-of-band (OOB) signaling. An OOB control channel that has been implemented using a dedicated wavelength works as follows. The incoming signal on a fiber is first demultiplexed into the data bearing wavelengths and the control bearing wavelength. While the data wavelengths are switched by the cross-connect, the control wavelength is passed to a control element, where it undergoes O/E conversion to produce a digital bit stream. This bit stream is interpreted and processed by the MPLS signaling/control element, and the resulting control bits are converted via E/O conversion, back into a optical signal that is multiplexed onto the outgoing fiber. An alternative implementation is to use a dedicated network (such as an IP network) as a control network connecting the controllers on the optical elements. An alternative to OOB signaling is to implement the control channel using in-band signaling. Again, there are several ways to accomplish this: The first is to use a portion of a wavelength to carry control information, which is useful when the number of wavlengths is limited and it is not possible to dedicate an entire wavelength for carrying control information. Essentially, the incoming signal is demultiplexed into the data channels, which are switched by the cross-connect, and the control bearing wavelength, which undergoes O/E conversion to produce a data stream and control information. The data stream is switched electronically while the control information is interpreted and processed by the MPLS signaling/control element. The resulting control bits and the data stream are both converted back, via E/O conversion, into a optical signal that is multiplexed onto the outgoing fiber. A second option is to use sub-carrier modulation, modulating the data carrying wavelength with an additional sub-carrier that carries control information. This sub-carrier signal is split from the data carrying wavelength, and processed (after O/E conversion) by the MPLS signaling/control element, and then is used to re-modulate the outgoing wavelength. Bernstein, Mannie, Sharma Expires May 2001 34 draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 A third option is to use the overhead bytes in SONET frames or overhead bits in a digital wrapper. This requires, of course, that all devices be O-E-O capable. 9.Summary and ConclusionsIn this paper, we gaveWe provided a detailed account of the issues involved in applying MPLS-based control to TDMnetworks (a general overview of these issues for applying GMPLS to optical networks appears in [11]).networks. We began with a brief overview of MPLS and SDH/SONET networks, discussing current circuit establishment in TDM networks, and arguing why SDH/SONET technologies will not be "outdated" in theforseableforeseeable future. We then looked at MPLS applied to SDH/SONET networks, where weconsiderconsidered why such an application makes sense, and reviewed some MPLS terminology as applied to TDM networks. We then considered the two main areas of application of MPLS methods to TDM networks, namely routing and signaling. We considered in detail the switching capabilities of TDM equipment, and the requirement to learn about the protection capabilities of underlying links, andathow these influence the available capacity advertisement in TDM networks. We focused briefly on path computation methods, pointing out that these were not subject to standardization. We then examined optical path provisioning or signaling, considering the issue of what constitutes an appropriate label for TDM circuits, how this label should be structured, and we focused on the importance of hierarchical label allocation in a TDM network. We then reviewed the signaling elements involved when setting up an optical TDM circuit, focusing on the nature of the LSP, the type of payload it carries, and the characteristics of the links that the LSP wishes to use at each hop along its path, for achieving a certain reliability.We believe our work provides a comprehensive overview of the issues arising in the dynamic control of optical SDH/SONET networks, and points to several issues that will certainly require more work and industry consensus to realize interoperable implementations of a dynamically controlled transport network. 10.9. Security Considerations This draft raises no new security issues in the MPLS specifications.11. References10.References [1] Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9, RFC 2026, October 1996. [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997 Bernstein, Mannie, Sharma Informational - January 2002 24 [3] Synchronous Optical Network (SONET) Basic Description including Multiplex Structure, Rates, and Formats, ANSI T1.105-1995. [4] G.707, Network Node Interface for the Synchronous Digital Hierarchy (SDH), International Telecommunication Union, 03/96. [5] ANSI T1.105.01-1995, SynchronousOptical Network (SONET) Transport Systems: Common Generic Criteria, Bellcore GR-253-CORE, Issue 2, December 1995. Synchronous OpticalOpical Network (SONET)Transport Systems: Common Generic Criteria, Bellcore GR-253-CORE, Issue 2, December 1995.Automatic Protection Switching, American National Standards institute. [6] G.841, Types and Characteristics of SDH Network Protection Architectures, ITU-T, 07/95. [7] Peter Ashwood-Smith and Lou Berger, Editors, "Generalized MPLS: Signaling Functional Description," InternetDraft, draft-ietf-mpls-generalized-signaling-01.txt,Draft,draft-ietf-mpls- generalized-signaling-04.txt, Work in Progress,November 2000. [7] Ben Mack-Crane, V. Sharma, Greg Bernstein, EricMay 2001. [8] E. Mannie,et al, Enhancements to GMPLS SignalingEditor, "GMPLS Extensions forOptical Technologies,SONET and SDH Control", Internet Draft, draft-ietf-ccamp-gmpls-sonet-sdh-01.txt, Work in Progress,draft-mack-crane-gmpls-signaling-enhancements-00.txt, November 2000. [8]June 2001. [9] E. Mannie, Greg Bernstein "Extensions to OSPF and IS-IS in support of MPLS for SDH/SONET Control", Internet Draft, Work in Progress, draft-mannie-mpls-sdh-ospf-isis-00.txt, July 2000.[9]11.Acknowledgments 12.Author's Addresses Greg Bernstein Ciena Corporation 10480 Ridgeview Court Cupertino, CA 94014 Phone: +1 510 573-2237 E-mail: greg@ciena.com Eric Mannie EBONE Terhulpsesteenweg 6A 1560 Hoeilaart - Belgium Phone: +32 2 658 56 52 Mobile: +32 496 58 56 52 Fax: +32 2 658 51 18 E-mail: eric.mannie@ebone.com Bernstein,"Some Comments on the Use of MPLS Traffic Engineering for SONET/SDH Path Establishment", Internet Draft, Work in Progress, draft-bernstein- mpls-sonet-00.txt, March 2000. [10] E.Mannie,"MPLS for SDH Control",Sharma Informational - January 2002 25 Vishal Sharma Metanoia, Inc. 335 Elan Village Lane, Unit 203 San Jose, CA 95134 Phone: +1 408 943 1794 Email: v.sharma@ieee.org Bernstein, Mannie, Sharma Informational - January 2002 26 Full Copyright Statement "Copyright (C) The InternetDraft, WorkSociety (date). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist inProgress, draft-mannie-mpls-sdh- control-00.txt. March 2000. [11] Greg Bernsteinits implmentation may be prepared, copied, published andVishal Sharma, Some Commentsdistributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included onGMPLSall such copies andOptical Technologies, Internet Draft, Workderivative works. However, this document itself may not be modified inProgress, draft-bernstein-gmpls-optical-00.txt, November 2000. [12] Vas Makam, V. Sharma, Ben Mack-Crane, et al, Frameworkany way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed forMPLS-based Recovery,the purpose of developing InternetDraft, Workstandards inProgress, draft-ietf-mpls-recovery-frmwrk-00.txt, September 2000.which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into Bernstein, Mannie, SharmaExpires May 2001 35Informational - January 2002 27 Bernstein, Mannie, Sharma Informational - January 2002 28