< draft-bms-optical-sdhsonet-mpls-control-frmwrk-00.txt   draft-bms-optical-sdhsonet-mpls-control-frmwrk-01.txt >
MPLS Working Group Greg Bernstein CCAMP G. Bernstein
Internet Draft Ciena Internet Draft Ciena
Document: <draft-bms-optical-sdhsonet-mpls- Document: <draft-bms-optical-sdhsonet-mpls- E. Mannie
control-frmwrk-00.txt> control-frmwrk-01.txt> Ebone
Category: Eric Mannie Category: Informational V. Sharma
Expires: May 2001 GTS Metanoia
Expires January 2002 July 2001
Vishal Sharma
Tellabs
November 2000
Framework for MPLS-based Control of Optical SDH/SONET Networks Framework for GMPLS-based Control of SDH/SONET Networks
<draft-bms-optical-sdhsonet-mpls-control-frmwrk-00.txt> <draft-bms-optical-sdhsonet-mpls-control-frmwrk-01.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026 [1]. all provisions of Section 10 of RFC2026 [1].
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Internet-Drafts are draft documents valid for a maximum of Drafts. Internet-Drafts are draft documents valid for a maximum of
six months and may be updated, replaced, or obsoleted by other six months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet- Drafts documents at any time. It is inappropriate to use Internet- Drafts
as reference material or to cite them other than as "work in as reference material or to cite them other than as "work in
progress." progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
1. Abstract 1. Abstract
The suite of protocols that define Multi-Protocol Label Switching The suite of protocols that defines Multi-Protocol Label Switching
(MPLS) is in the process of enhancement to generalize its (MPLS) is in the process of enhancement to generalize its
applicability to the control of non-packet based switching, that is, applicability to the control of non-packet based switching, that is,
optical switching. One area of prime consideration is to use this optical switching. One area of prime consideration is to use these
generalized MPLS in upgrading the control plane of optical transport generalized MPLS (GMPLS) protocols in upgrading the control plane of
networks. This paper illustrates this process by describing how optical transport networks. This document illustrates this process
MPLS is being extended to control SONET/SDH networks. SONET/SDH by describing those extensions to MPLS protocols that are directed
networks are exemplary examples of this process since they possess a towards controlling SONET/SDH networks. SONET/SDH networks make
rich multiplex structure, a variety of protection/restoration very good examples of this process since they possess a rich
options, are well defined, and are widely deployed. The extensions multiplex structure, a variety of protection/restoration options,
to MPLS routing protocols to disseminate information needed in are well defined, and are widely deployed. The document discusses
transport path computation and network operations are discussed extensions to MPLS routing protocols to disseminate information
along with the extensions to MPLS label distribution protocols needed in transport path computation and network operations together
needed for provisioning of transport circuits. New capabilities that with the extensions to MPLS label distribution protocols needed for
an MPLS control plane would bring to SONET/SDH networks, such as new the provisioning of transport circuits. New capabilities that an
MPLS control plane would bring to SONET/SDH networks, such as new
restoration methods and multi-layer circuit establishment, are also restoration methods and multi-layer circuit establishment, are also
discussed. discussed.
Mack-Crane et al Expires May 2001 1 Bernstein, Mannie, Sharma Informational - January 2002 1
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
2. Conventions used in this document 2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC-2119 [2]. this document are to be interpreted as described in RFC-2119 [2].
3. Introduction 3. Introduction
A few years ago, the Internet Engineering Task Force (IETF) began A few years ago, the Internet Engineering Task Force (IETF) began
work on the specification of a new connection-oriented transport work on the specification of a new connection-oriented transport
technology called Multi-Protocol Label Switching (MPLS). The MPLS technology called Multi-Protocol Label Switching (MPLS). The MPLS
forwarding plane was inspired mainly by concepts from virtual forwarding plane was inspired mainly by concepts from virtual
circuit switching in ATM, while its control plane was inspired circuit switching in ATM, while its control plane was inspired
mainly by the routing protocols found in IP. As work on defining mainly by the routing protocols found in IP. As work on defining the
the components of MPLS progressed, it soon became apparent that the components of MPLS progressed, it soon became apparent that the
principles upon which MPLS was based were generic, and were principles upon which MPLS technology was based were generic, and
applicable to multiple layers of the network. As such, MPLS-based were applicable to multiple layers of the transport network. As
control of other network layers, such as the TDM and optical layers such, MPLS-based control of other network layers, such as the time
was also possible. The motivation behind introducing such control division multiplexing (TDM) and optical layers was also possible.
was to provide new services, such as dynamic establishment of TDM The motivation behind introducing such control was to provide new
and optical circuits, which were hitherto not possible in transport services, such as dynamic establishment of TDM and optical circuits,
networks. With MPLS-based control, transport operators or service which were hitherto not possible in transport networks. With MPLS-
providers would be able to offer on-demand services to their based control, transport operators or service providers would be
customers, due to the reduction in provisioning time of their able to offer on-demand services to their customers, due to the
circuits, thus adding considerable flexibility in their service reduction in provisioning time of their circuits, thus adding
portfolios. considerable flexibility in their service portfolios.
The MPLS Working Group of the IETF is currently extending MPLS The CCAMP Working Group of the IETF is currently working on
protocols to support these non-packet layers and these new services. extending MPLS protocols to support multiple network layers and
This extended MPLS, which was initially known as Multi-Protocol these new services. This extended MPLS, which was initially known as
Lambda Switching, is now better referred to as Generalized MPLS (or Multi-Protocol Lambda Switching, is now better referred to as
GMPLS). The authors of this work are among the co-authors of the Generalized MPLS (or GMPLS). The authors of this work are among the
GMPLS specifications, and - focus mainly on those aspects of GMPLS co-authors of the GMPLS specifications, and - focus mainly on those
that relate to the control of SDH/SONET networks. aspects of GMPLS that relate to the control of SDH/SONET networks.
The GMPLS effort is, in fact, extending IP technology to control and The GMPLS effort is, in effect, extending IP technology to control
manage lower layers. Using the same framework and the same kinds of and manage lower layers. Using the same framework and similar
signaling and routing protocols to control multiple layers not only signaling and routing protocols to control multiple layers can not
has the potential to reduce the overall complexity of designing, only reduce the overall complexity of designing, deploying and
deploying and maintaining networks, but also has the potential to maintaining networks, but can also make it possible to operate two
make it possible to operate two contiguous layers by using either an contiguous layers by using either an overlay model, a peer model, or
overlay model, a peer model or an integrated model. The benefits of an integrated model. The benefits of using a peer or an overlay
using a peer or an overlay model between the IP layer and its model between the IP layer and its underlying layer(s) will have to
underlying layer(s) will have to be clarified and evaluated in the be clarified and evaluated in the future. In the mean time, GMPLS
future. In the mean time, GMPLS is very suitable for controlling could be used for controlling each layer independently.
each layer completely independently.
The goal of this paper is to highlight how MPLS could be used to The goal of this work is to highlight how GMPLS could be used to
dynamically establish, maintain and tear down SDH/SONET circuits. dynamically establish, maintain and tear down SDH/SONET circuits.
The objective is to provide at least the same kind of SDH/SONET The objective of using these extended MPLS protocols is to provide
at least the same kinds of SDH/SONET services as are provided today,
Bernstein, Mannie, Sharma Expires May 2001 2 but using signaling instead of provisioning via centralized
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
services as provided today, but using signaling instead of Bernstein, Mannie, Sharma Informational - January 2002 2
provisioning to establish those services. This will allow operators management to establish those services. This will allow operators to
to propose new services, and will allow clients to create SONET/SDH propose new services, and will allow clients to create SONET/SDH
paths on-demand, in real-time, through the provider network. We paths on-demand, in real-time, through the provider network. We
first review the essential properties of SDH/SONET networks and first review the essential properties of SDH/SONET networks and
their operations, and we show how the labelĘs of MPLS can be their operations, and we show how the label concept in MPLS can be
extended to the SONET/SDH case. We then look at important extended to the SONET/SDH case. We then look at important
information to be disseminated by a link state route protocol and information to be disseminated by a link state routing protocol and
look at the important signal attributes that need to be conveyed by look at the important signal attributes that need to be conveyed by
a label distribution protocol. Finally, we look at some outstanding a label distribution protocol. Finally, we look at some outstanding
issues and future possibilities. [3], [4], [5], [6], [7],[8], [9], issues and future possibilities. [3], [4], [5], [6], [7],[8], [9],
[10], [11], [12]. [10], [11], [12].
3.1 MPLS Overview 3.1. MPLS Overview
An advantage of the MPLS architecture is the clear separation A major advantage of the MPLS architecture for use as a general
between the forwarding plane, the signaling plane, and the routing network control plane is its clear separation between the forwarding
plane. This allows the work on MPLS to focus on the forwarding and plane (or data plane) the signaling (or connection control) plane,
and the routing (or topology discovery/resource status) plane. This
allows the work on MPLS extensions to focus on the forwarding and
signaling planes, while allowing well-known IP routing protocols to signaling planes, while allowing well-known IP routing protocols to
be reused in the routing plane. This clear separation also allows be reused in the routing plane. This clear separation also allows
for MPLS to be used to control networks that do not have a packet- for MPLS to be used to control networks that do not have a packet-
based forwarding plane. based forwarding plane.
In MPLS terminology, an MPLS node is called a Label Switch Router An MPLS network consists of MPLS nodes called Label Switch Routers
(LSR) and a circuit is called a Label Switched Path (LSP). An LSP is (LSRs) connected via circuits called Label Switched Paths (LSPs). An
unidirectional and could be of several different types such as LSP is unidirectional and could be of several different types such
point-to-point, point-to-multipoint, and multipoint-to-point. Border as point-to-point, point-to-multipoint, and multipoint-to-point.
LSRs in an MPLS cloud, act either as ingress or egress LSRs Border LSRs in an MPLS network, act either as ingress or egress LSRs
respective to the direction of the traffic being forwarded. depending on the direction of the traffic being forwarded.
MPLS allows the establishment of LSPs between ingress and egress Each LSP is associated with a Fowarding Equivalence Class (FEC),
LSRs. Each LSP is associated with a Fowarding Equivalence Class which may be thought of as a set of packets that receive identical
(FEC), which may be thought of as a set of packets that receive forwarding treatment at an LSR. The simplest example of an FEC might
identical forwarding treatment at an LSR. The simplest example of an be the set of destination addresses lying in a given address range.
FEC might be the set of destination addresses lying in a given All packets that have a destination address lying within this
address range. All packets that have a destination address lying address range are forwarded identically at each LSR configured with
within this address range are forwarded identically at that LSR. that FEC.
To establish an LSP, a signaling protocol such as LDP/CR-LDP or To establish an LSP, a signaling protocol (or label distribution
RSVP-TE is required. Between two adjacent LSRs, an LSP is locally protocol) such as LDP/CR-LDP or RSVP-TE is required. Between two
identified by a short, fixed length identifier called a label. This adjacent LSRs, an LSP is locally identified by a short, fixed length
label is only significant between these two LSRs. The signaling identifier called a label, which is only significant between these
protocol is responsible for the inter-node communication that two LSRs. The signaling protocol is responsible for the inter-node
assigns and maintains these labels. communication that assigns and maintains these labels.
When a packet enters an MPLS packet-based network, it is classified When a packet enters an MPLS-based packet network, it is classified
according to its FEC and, possibly, additional rules, which according to its FEC and, possibly, additional rules, which together
together determine the LSP along which the packet is sent. For that determine the LSP along which the packet must be sent. For this
purpose, the ingress LSR attaches an appropriate label to the purpose, the ingress LSR attaches an appropriate label to the
packet, and forwards the packet to the next hop. The label may be packet, and forwards the packet to the next hop. The label may be
attached to a packet in different ways. For example, -it may be in attached to a packet in different ways. For example, it may be in
the form of a header encapsulating the packet (the "shim" header) or the form of a header encapsulating the packet (the "shim" header) or
it may be written in the VPI/VCI field (or DLCI field) of the layer
Bernstein, Mannie, Sharma Expires May 2001 3 Bernstein, Mannie, Sharma Informational - January 2002 3
" it may be written in the VPI/VCI field (or DLCI field) of the layer
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 2 encapsulation of the packet. In case of SDH/SONET networks, we
will see that a label is simply associated with a segment of a
2 encapsulation of the IP data. In case of SDH/SONET networks, we
will see that a label is simply associated with a segment of a
circuit, and is mainly used in the signaling plane to identify this circuit, and is mainly used in the signaling plane to identify this
segment (e.g. a time-slot) between two adjacent nodes. segment (e.g. a time-slot) between two adjacent nodes.
When a packet reaches a core packet LSR, this LSR uses the label as When a packet reaches a core packet LSR, this LSR uses the label as
an index into a forwarding table to determine the next hop and the an index into a forwarding table to determine the next hop and the
corresponding outgoing label, writes the new label into the packet, corresponding outgoing label (and, possibly, the QoS treatment to be
and forwards the packet to the next hop. When the packet reaches the given to the packet), writes the new label into the packet, and
forwards the packet to the next hop. When the packet reaches the
egress LSR, the label is removed and the packet is forwarded using egress LSR, the label is removed and the packet is forwarded using
adequate forwarding, such as normal IP forwarding. We will see that appropriate forwarding, such as normal IP forwarding. We will see
for a SONET/SDH network these operations -do not occur in quite the that for a SONET/SDH network these operations do not occur in quite
same way. the same way.
3.2 SDH/SONET Overview 3.2. SDH/SONET Overview
There are currently two different multiplexing technologies in use
in optical networks: wavelength division multiplexing (WDM) and time
division multiplexing (TDM). This work focuses on TDM technology.
SDH and SONET are two TDM standards widely used by operators to SDH and SONET are two TDM standards widely used by operators to
transport and multiplex different tributary signals over optical transport and multiplex different tributary signals over optical
links, thus creating a multiplexing structure, which we call the links, thus creating a multiplexing structure, which we call the
SDH/SONET multiplex. SDH, which was developed by the ETSI and later SDH/SONET multiplex. SDH, which was developed by the ETSI and later
standardized by the ITU-T, is now used worldwide, while SONET, which standardized by the ITU-T, is now used worldwide, while SONET, which
was standardized by the ANSI, is mainly used in the US. However, was standardized by the ANSI, is mainly used in the US. However,
these two standards have several similarities, and to some extent these two standards have several similarities, and to some extent
SONET can be viewed as a subset of SDH. Internetworking between the SONET can be viewed as a subset of SDH. Internetworking between the
two is possible using gateways. two is possible using gateways.
The fundamental signal in SDH is the STM-1 that operates at a rate The fundamental signal in SDH is the STM-1 that operates at a rate
of about 155 Mbps while the fundamental signal in SONET is the STS-1 of about 155 Mbps, while the fundamental signal in SONET is the STS-
that operates at a rate of about 51 Mbps. These two signals are made 1 that operates at a rate of about 51 Mbps. These two signals are
of contiguous frames that consist of a transport overhead (header) made of contiguous frames that consist of transport overhead
and a payload. To solve synchronization issues, the actual data is (header) and payload. To solve synchronization issues, the actual
not directly transported in the payload but rather in another data is not transported directly in the payload but rather in
internal frame that is allowed to float over two successive another internal frame that is allowed to float over two successive
SDH/SONET payloads. This internal frame is named a Virtual Container SDH/SONET payloads. This internal frame is named a Virtual Container
(VC) in SDH and a Synchronous Payload Envelope (SPE) in SONET. (VC) in SDH and a Synchronous Payload Envelope (SPE) in SONET.
The SDH/SONET architecture identifies three different layers, each The SDH/SONET architecture identifies three different layers, each
of which corresponds to one level of communication between SDH/SONET of which corresponds to one level of communication between SDH/SONET
equipment. These are, starting with the lowest, the regenerator equipment. These are, starting with the lowest, the regenerator
section/section layer, the multiplex section/line layer, and (at the section/section layer, the multiplex section/line layer, and (at the
top) the path layer. Each of these layers has its own overhead top) the path layer. Each of these layers in turn has its own
(header). The transport overhead of a SDH/SONET frame is mainly sub- overhead (header). The transport overhead of a SDH/SONET frame is
divided in two parts that contain the regenerator section/section mainly sub-divided in two parts that contain the regenerator
overhead and the multiplex section/line overhead. In addition, a section/section overhead and the multiplex section/line overhead. In
pointer (in the form of the H1, H2 and H3 bytes) indicates the addition, a pointer (in the form of the H1, H2 and H3 bytes)
beginning of the VC/SPE in the payload. indicates the beginning of the VC/SPE in the payload of the overall
STM/SDH frame.
Bernstein, Mannie, Sharma Informational - January 2002 4
The VC/SPE itself is made up of a header (the path overhead) and a The VC/SPE itself is made up of a header (the path overhead) and a
payload. This payload can itself be subdivided into sub-elements payload. This payload can be further subdivided into sub-elements
(signals) in a fairly complex way. In the case of SDH, the STM-1 (signals) in a fairly complex way. In the case of SDH, the STM-1
frame itself may contain either one VC-4 or three multiplexed VC-3s. frame may contain either one VC-4 or three multiplexed VC-3s. The
Indeed, SDH and SONET both define a complete multiplexing structure. SONET multiplex is a pure tree, while the SDH multiplex is not a
The SONET multiplex is a pure tree, while the SDH multiplex is not a pure tree, since it contains a node that can be attached to two
Bernstein, Mannie, Sharma Expires May 2001 4
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
pure tree since it contains a node that can be attached to two
parent nodes. The structure of the SONET/SDH multiplex is shown in parent nodes. The structure of the SONET/SDH multiplex is shown in
Figure 1. In addition, we show reference points in this figure that Figure 1. In addition, we show reference points in this figure that
will be explained later on. are explained in later sections.
xN x1 xN x1
STM-N<----AUG<----AU-4<--VC4<------------------------------C-4 E4 STM-N<----AUG<----AU-4<--VC4<------------------------------C-4 E4
^ ^ ^ ^
Ix3 Ix3 Ix3 Ix3
I I x1 I I x1
I -----TUG-3<----TU-3<----VC-3<----I I -----TUG-3<----TU-3<---VC-3<---I
I ^ C-3 I ^ C-3 DS3/E3
DS3/T3/E3 -------AU-3<---VC-3<-- I ---------------------I
-------AU-3<---VC-3<-- I -----------------------I
^ I ^ I
Ix7 Ix7 Ix7 Ix7
I I x1 I I x1
-----TUG-2<----TU-2<----VC-2<---C-2 -----TUG-2<---TU-2<---VC-2<---C-2 DS2/T2
DS2/T2
^ ^ ^ ^
I I x3 I I x3
I I------TU-12<---VC-12<--C-12 E1 I I----TU-12<---VC-12<--C-12 E1
I I
I x4 I x4
I---------TU-11<---VC-11<--C-11 I-------TU-11<---VC-11<--C-11 DS1/T1
DS1/T1
xN xN
STS-N<-------------------SPE<--------------------------------- STS-N<-------------------SPE<------------------------------DS3/T3
DS3/T3 ^
^ Ix7
Ix7 I x1
I x1 I---VT-Group<---VT-6<----SPE DS2/T2
I---VT-Group<---VT-6<----SPE ^ ^ ^
DS2/T2 I I I x2
^ ^ ^ I I I-----VT-3<----SPE DS1C
I I I x2 I I
I I I-----VT-3<----SPE DS1C I I x3
I I I I--------VT-2<----SPE E1
I I x3 I
I I--------VT-2<----SPE E1 I x4
I I-----------VT-1.5<--SPE DS1/T1
I x4
I-----------VT-1.5<--SPE
DS1/T1
Figure 1. SDH and SONET multiplexing structure and typical PDH Figure 1. SDH and SONET multiplexing structure and typical PDH
payload signals. payload signals.
Bernstein, Mannie, Sharma Expires May 2001 5 Bernstein, Mannie, Sharma Informational - January 2002 5
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
The leaves of these multiplex structures are time slots (positions) The leaves of these multiplex structures are time slots (positions)
of different sizes that can contain tributary signals. These of different sizes that can contain tributary signals. These
tributary signals (e.g. E1, E3, etc) are mapped into the leaves tributary signals (e.g. E1, E3, etc) are mapped into the leaves
using standardized mapping rules. In general, a tributary signal using standardized mapping rules. In general, a tributary signal
does not fill a time slot completely, and the mapping rules define does not fill a time slot completely, and the mapping rules define
precisely how to fill it. precisely how to fill it.
What is important for the goal of this paper is to identify the What is important for the MPLS-based control of SDH/SONET circuits
elements that can be switched from an input multiplex on one is to identify the elements that can be switched from an input
interface to an output multiplex on another interface. These multiplex on one interface to an output multiplex on another
elements are only those that can be re-aligned via a pointer, i.e. a interface. The only elements that can be switched are those that can
VC-x in the case of SDH and a SPE in the case of SONET. be re-aligned via a pointer, i.e. a VC-x in the case of SDH and a
SPE in the case of SONET.
An STM-N/STS-N signal is formed from N x STM-1/STS-1 signals via An STM-N/STS-N signal is formed from N x STM-1/STS-1 signals via
byte interleaving. The VCs/SPEs in the N interleaved frames are byte interleaving. The VCs/SPEs in the N interleaved frames are
independent and float according to their own clocking. To transport independent and float according to their own clocking. To transport
tributary signals in excess of the basic STM-1/STS-1 signal, the tributary signals in excess of the basic STM-1/STS-1 signal rates,
VCs/SPEs can be concatenated, i.e., glued together. In this case the VCs/SPEs can be concatenated, i.e., glued together. In this case
their relationship with respect to each other is fixed in time and their relationship with respect to each other is fixed in time and
hence this relieves, when possible, an end system of any inverse hence this relieves, when possible, an end system of any inverse
multiplexing bonding processes. Different types of concatenations multiplexing bonding processes. Different types of concatenations
are defined, with specific rules. are defined in SDH/SONET.
For instance, the standard SONET concatenation allows the
concatenation of M x STS-1 signals within an STS-N signal with M <=
N, and M = 3, 12, 48, 192,...). The SPEs of these M x STS-1s can be
concatenated to form an STS-Mc. The STS-Mc notation is short hand
for describing an STS-M signal whose SPEs have been concatenated.
3.3 The Real World of Circuit Establishment with SDH/SONET For example, standard SONET concatenation allows the concatenation
of M x STS-1 signals within an STS-N signal with M <= N, and M = 3,
12, 48, 192,...). The SPEs of these M x STS-1s can be concatenated
to form an STS-Mc. The STS-Mc notation is short hand for describing
an STS-M signal whose SPEs have been concatenated.
Today, SDH and SONET networks are statically configured. When a 3.3. The Current State of Circuit Establishment in SDH/SONET Networks
client of an operator requests a point-to-point circuit or a ring,
it sets in motion a process that can last for weeks. This process is
indeed a chain of shorter administrative and technical tasks, some
of which can be fully automated, resulting in significant
improvements in provisioning time and in operational savings. In the
best case, the entire process can be fully automated allowing, for
example,. a CPE to contact a SDH/SONET switch to request some
bandwidth. This is, in fact, the ultimate objective that we would
like to achieve using MPLS to control SDH/SONET networks.
In the current setup, however, the provisioning process involves the Today, June 2001, SDH and SONET networks are statically configured.
following components. When a client of an operator requests a point-to-point circuit, the
request sets in motion a process that can last for several weeks or
more. This process is composed of a chain of shorter administrative
and technical tasks, some of which can be fully automated, resulting
in significant improvements in provisioning time and in operational
savings. In the best case, the entire process can be fully automated
allowing, for example, customer premise equipment (CPE) to contact a
SDH/SONET switch to request a circuit. Currently, the provisioning
process involves the following tasks.
3.3.1. Administrative Tasks 3.3.1. Administrative Tasks
The administrative tasks represent a significant part of the The administrative tasks represent a significant part of the
provisioning time. Most of them can be automated using IT provisioning time. Most of them can be automated using IT
applications, e.g., a client still has to fill a form to request a
circuit. This form can be filled via a Web-based application and can
be automatically processed by the operator. A further enhancement is
Bernstein, Mannie, Sharma Expires May 2001 6 Bernstein, Mannie, Sharma Informational - January 2002 6
to allow the client's equipment to coordinate with the operator's
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 network directly and request the desired circuit. This could be
achieved through a signaling protocol at the interface between the
applications, however, and MPLS does not help in that case. However, client equipment and an operator switch, i.e., at the UNI interface,
a client still has to fill a form to request a circuit. This form where GMPLS signaling can be used.
can be filled via a Web-based application and can be automatically
processed by the operator. A further step is to allow the client's
equipment to coordinate with the operator's network directly and
request the desired circuit. This has to be achieved through a
signaling protocol at the interface between the client equipment and
an operator switch, i.e. at the UNI interface, where MPLS can play a
role.
3.3.2. Manual Operations 3.3.2. Manual Operations
Another significant part of the time may be consumed by manual Another significant part of the time may be consumed by manual
operations that involve installing the right interface in the CPE operations that involve installing the right interface in the CPE
and installing the right cable or fiber between the CPE and the and installing the right cable or fiber between the CPE and the
operator switch. This time can be especially significant when a operator switch. This time can be especially significant when a
client is in a different time zone than the operator's main office. client is in a different time zone than the operator's main office.
This first-time connection time is frequently accounted for in the This first-time connection time is frequently accounted for in the
overall establishment time. To support our fully automated model we overall establishment time.
must, of course, assume that CPEs are pre-connected to the
operatorĘs network.
3.3.3. Planning Tool Operation 3.3.3. Planning Tool Operation
Another portion of the time is consumed by planning tools that run Another portion of the time is consumed by planning tools that run
simulations using heuristic algorithms to find an optimized simulations using heuristic algorithms to find an optimized
placement for the required circuits and/or rings. These planning placement for the required circuits. These planning tools can
tools can require a significant running time, sometimes of the order require a significant running time, sometimes on the order of days.
of days. These simulations are, in general, executed for a set of These simulations are, in general, executed for a set of demands for
demands for circuits and/or rings to improve the optimality of the circuits, i.e., a batch mode, to improve the optimality of network
solution. Today, we do not really have a means to reduce this resource usage and other parameters. Today, we do not really have a
simulation time. On the contrary, to support fast, on-line, circuit means to reduce this simulation time. On the contrary, to support
establishment, we will most probably skip this phase. It means that fast, on-line, circuit establishment, this phase may be invoked more
the network will have to be re-optimized periodically, implying that frequently, i.e., we will not "batch up" as many connection
the signaling should support re-optimization without hurting too requests before we plan out the corresponding circuits. This means
much the service. Indeed, the optimization of the network is then that the network may need to be re-optimized periodically, implying
taken out of the chain and becomes a background activity. Smart that the signaling should support re-optimization with minimum
circuit re-routing required for re-optimization is available in impact to existing services.
MPLS.
3.3.4. Circuit Provisioning 3.3.4. Circuit Provisioning
Once the first three steps have been executed, the circuits must be Once the first three steps have been completed, the circuits must be
effectively provisioned by the operator using the outputs of the provisioned by the operator using the outputs of the planning
planning tool. The time required for this provisioning is fairly process. The time required for provisioning varies greatly. It can
short, on the order of a few minutes. In many cases, operators be fairly short, on the order of a few minutes, if the operators
already have tools that help them to do the provisioning over already have tools that help them to do the provisioning over
heterogeneous equipment more or less automatically. In general, the heterogeneous equipment. Otherwise, the process can take days.
provisioning is a grouped activity, a few times per week an operator Developing these tools for each new piece of equipment and each
launches the provisioning of a set of circuits in one shot. MPLS vendor is a significant burden on the service provider. A
will reduce this provisioning time from a few minutes to a few standardized interface for provisioning, such as GMPLS signaling,
seconds and will help to transform this periodic process into a could significantly reduce or eliminate this development burden. In
real-time process. general, provisioning is a batched activity, i.e., a few times per
week an operator provisions a set of circuits. GMPLS will reduce
Bernstein, Mannie, Sharma Expires May 2001 7 this provisioning time from a few minutes to a few seconds and could
help to transform this periodic process into a real-time process.
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
When a circuit or a ring is provisioned it is not delivered directly
to a client. First, its performance and behavior is tested by the
operator and if this is successful, the circuit is delivered to the
client. This testing phase lasts, in general, for up to 24 hours.
The operator instalsl test equipment at each end and uses pre-
defined test streams to verify the performance. If successful, the
circuit is officially accepted by the client. Thus, to speed up this
process, brief automated performance testing will have to be
supported in some way.
So, it results that most of the time that can be saved is mainly due
to the fact that we change the work model of an operator. In
addition, note that signaling other than MPLS can achieve the same
result. Even an architecture based on a centralized management
achieves the same without MPLS. The benefits of using MPLS can,
however, be realized both with the use of a distributed architecture
or a centralized architecture, since MPLS supports explicit routing
(and a centralized architecture with signaling support, could
compute the route and then use signaling to establish it). Below
we will briefly look at both the centralized and the distributed
approaches to circuit provisioning.
3.4. Centralized Approach versus Distributed Approach
The debate between a centralized approach and a distributed approach
to control an SDH/SONET network or an optically switched network is
still on-going. There is probably no outstanding characteristic any
approache that will make it the universal solution. Each approach
has advantages and disadvantages. Depending on the particular
network to be controlled and operator requirements, either solution
could be the right one. The application of MPLS to SONET/SDH
networks does not preclude either model although MPLS is itself a
distributed technology. In particular, the explicit route
capability in MPLS combined with a "soft permanent LSP" (SPLSP) type
functionality could fully support a centralized approach to circuit
provisioning that would also be interoperable.
The centralized approach is typically implemented using a Network
Management System dynamically provisioning circuits. Although no
signaling protocol is used, a routing protocol is used to route the
management messages. Indeed, the management protocol acts as a
signaling protocol. Network elements stay relatively simple and are
not involved in decision making. CPEĘs can implement a simple
signaling interface with the NMS, such as the one being proposed in
the ODSI. This approach has a number of advantages in the short
term. The typical network management model used today for TDM
networks is TMN.
A distributed approach consists of using one or more distributed
routing protocols, such as IP routing protocols, and a distributed
signaling protocol. The MPLS architecture fits very well in that
case. This solution has the potential to be scalable and robust, and
enable future services like inter-domain routing. Obviously, it adds
Bernstein, Mannie, Sharma Expires May 2001 8
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
more complexity but this is the "price" to pay if we want to build a
network of SDH/SONET networks, i.e. an SDH/SONET inter-network.
A centralized approach can benefit from the management information
that is collected constantly, e.g. performance alarms, failure
alarms and traps. Once filtered and analyzed, this information can
be used to detect failure in almost real-time. However, sometimes
this approach can also be penalized if the number of management
messages is not controlled appropriately, as we will see later.
On the other hand, a distributed routing protocol relies mainly on
timers and missing routing PDUs to detect a failure between two
adjacent switching nodes. It can also use indications from the
underlying layer, if available, but it does not communicate directly
with some network elements, like amplifiers, and transponders, that
could detect problems sooner.
In addition, a NMS maintains a consistent view of all the layers,
including the physical topology, at any time. Centralized decisions
can be taken based on accurate information and can use physical
information about fibers and ducts. On the other hand, a routing
protocol builds and maintain a logical model of the network. Not all
routing entities have the same view of the network at all times, and
re-routing and crank-back are needed for the signaling protocol.
A centralized management is easier to operate, new features can be
introduced with a simple upgrade. On the contrary, updating switches
with new routing software is harder. One could easily change the
parameters of the constrained routing algorithm or the metrics of
the links. These changes will take effect instantaneously. Several
added-value tools can run in the background and easilty easily
information with the centralized decision point. Such tools might
be, circuit planning tools (for network optimization, diversity
design, performance analysis), circuit reservation tools, and VPN
tools,for example.
Finally, this approach fits well with the current network operation
structure. The major upgrade is a an IT upgrade at the operatorĘs
network operations center. The DCN used to transport the management
protocol now becomes now a critical part of the operator
infrastructure and consequently must be protected. Its availability
has a direct impact on the on-demand circuit provisioning. Of
course, ideally new SDH/SONET non-blocking switching fabrics need to
be deployed in the network. Note that this approach could have been
supported since years with the actual SDH/SONET switching fabrics,
if we took into consideration the limitations of these fabrics.
The DCN used to transport management PDUs can be a mix of out-of-
band links and in-band communication links in the SDH/SONET overhead
(like the DCC). A routing protocol is run over these links to route
the management PDUs. The TMN model uses CMIP as the network
management protocol. The interface between a NE and the NMS is
referred to as the Q3 interface and is based on the OSI model. The
Bernstein, Mannie, Sharma Expires May 2001 9
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
upper part of the protocol stack at the Q3 interface is defined in When a circuit is provisioned, it is not delivered directly to a
Q.812. Different profiles are defined in Q.811 for the lower part, client. Rather, the operator first tests its performance and
they cover LAN and WAN interfaces. Note that the upper part can also behavior and if successful, delivers the circuit to the client. This
be supported over an IP infrastructure. In general, IS-IS is the
network layer routing protocol that is used.
The topology of the DCN is more complex than the topology considered Bernstein, Mannie, Sharma Informational - January 2002 7
for the distributed approach, since all network elements, and not testing phase lasts, in general, for up to 24 hours. The operator
just the switches, must be reached. In case of failures in a installs test equipment at each end and uses pre-defined test
SDH/SONET network, bursts of hundreds or thousands of alarms can be streams to verify performance. If successful, the circuit is
sent to the management system over the DCN. In that case, officially accepted by the client. To speed up the verification
provisioning related messages can be delayed by the treatment of the (sometimes known as "proving") process, it would be necessary to
alarms if no mediation function filtering and message aggregation is support some form of automated performance testing.
available between the NMS and NEs.
In the case of the distributed approach, the routing protocol must 3.4. Centralized Approach versus Distributed Approach
only abstract the physical links between the switches and the
signaling protocol must only flow between these switches. The DCN
used for the management of the network could be re-used, or a
separate signaling network could be setup. Surprisingly, the
requirements of a DCN could be much higher than the requirements for
the distributed signaling network.
An NMS has scalability limitations. For instance, it can be limited Whether a centralized approach or a distributed approach will be
in the number of network elements that can be managed (e.g. one used to control SDH/SONET networks is an open question, since Eech
thousand). It is quite common for operators to deploy several NMSĘs approach has advantages and disadvantages. The application of GMPLS
in parallel at the Network Management Layer, each managing a to SONET/SDH networks does not preclude either model although MPLS
different zone. In that case, a layer on the top of several is itself a distributed technology.
individual NMS at the Service Management Layer must be built to take
care of end-to-end on-demand services. On the contrary, the
scalability is much better in the distributed approach, clients are
co-located with switches and distributed among these switches.
An NMS can also be a bottleneck, it has already to deal with all The basic tradeoff between the centralized and distributed
traditional management messages; now in addition, it has to take approaches is that of complexity of the network elements versus that
care of reliably handling provisioning messages, and, sometimes, UNI of the network management system (NMS). Since adding functionality
messages as well. The load due to additional and more dynamic to existing
operations, such as dynamic circuit establishment and fast SDH network elements may not be possible, a centralized approach may
restoration is also not negligible. Indeed, the distributed approach be needed in some cases. The main issue facing centralized control
has the advantage of being isolated from the burden that can be via an NMS is one of scalability. For instance, this approach may be
placed on the NMS due to network conditions. limited in the number of network elements that can be managed (e.g.
one thousand). It is, therefore, quite common for operators to
deploy several NMS’s in parallel at the Network Management Layer,
each managing a different zone. In that case, however, a Service
Management layer must be built on the top of several individual
NMS’s to take care of end-to-end on-demand services. On the other
hand, in a complex and/or dense network, restoration could be faster
with a distributed approach than with a centralized approach.
It could be expected that in a complex and/or dense network, Let's now look at how the major control plane functional components
restoration could be faster with a distributed approach than with a are handled via the centralized and distributed approaches:
centralized approach. In the first case, signaling messages travel
over exactly the same path as the affected circuits and only through
the affected. In the second case, a signaling message has to go
first to the NMS , which transmits signaling messages (in parallel)
to all concerned nodes. However, this comparison requires further
investigations.
In general , an NMS is not a single point of failure, since all 3.4.1. Topology Discovery and Resource Dissemination
operators have systems in hot stand-by and disaster recovery plans
Bernstein, Mannie, Sharma Expires May 2001 10 Currently NMS's maintain a consistent view of all the networking
layers under their purview. This can include the physical topology,
such as information about fibers and ducts. Since most of this
information is entered manually, it remains error prone.
A link state GMPLS routing protocol, on the other hand, could
perform automatic topology discovery and dissemination the topology
as well as resource status. This information would be available to
all nodes in the network, and hence also the NMS. Hence one can
look at a continuum of functionality between manually provisioned
topology information (of which there will always be some) and fully
automated discovery and dissemination as in a link state protocol.
Note that, unlike the IP datagram case, a link state routing
protocol applied to the SDH/SONET network does not have any service
impacting implications.
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Bernstein, Mannie, Sharma Informational - January 2002 8
3.4.2. Path Computation (Route Determination)
for the NMS. The DCN must now be as well protected as the transport In the SDH/SONET case, unlike the IP datagram case, there is no need
network itself. However, the survivability of the distributed for network elements to all perform the same path calculation. In
approach is likely to be better since the intelligence is addition, path determination is an area for vendors to provide a
distributed, and could even survive to a network partitioning. potentially significant value addition in terms of network
efficiency, reliability, and service differentiation. In this sense,
a centralized approach to path computation is easier to operate and
upgrade. For example, new features such as new types of path
diversity or new optimization algorithms can be introduced with a
simple NMS software upgrade. On the other hand, updating switches
with new path computation software is a more complicated task. In
addition, many of the algorithms are quite computationally intensive
and may be completely unsuitable for the embedded processing
environment available on most switches. In restoration scenarios
the ability to perform a reasonably sophisticated level of path
computation on the network element can be particularly useful for
restoring traffic during major network faults.
A distributed signaling and routing approach also appears a 3.4.3. Connection Establishment (provisioning)
reasonable solution for inter-domain operations. Having hundreds of
NMSs organized in a tree with a root NMS that controls the various
NMSs from different operators can be rather difficult, especially in
the absence of adequate NMS interoperability standards. This is
probably a significant motivation for resorting to a distributed
approach.
Having signaling and routing at each inter-domain interface does not The actual setting up of circuits, i.e., a coupled collection of
imply that we need the same inside each individual domain. However, cross connects across a network, can be done either via the NMS
inter-working between intra- and inter-domain operations will be setting up individual cross connects or via a "soft permanent LSP"
greatly facilitated if we a distributed approach is also supported (SPLSP) type approach. In the SPLSP approach, the NMS may just kick
internal to a domain. This is particularly true for the signaling, off the connection at the "ingress" switch with GMPLS signaling
using the same protocol for both intra and inter-domain operations - setting up the connection from that point onward. Connection
seems a sensible approach. establishment is the trickiest part to distribute, however, since
errors in the connection setup/tear down process are service
impacting.
Distributed approach Centralized approach Distributed approach Centralized approach
Control plane like MPLS or Management plane like TMN or Control plane like MPLS or Management plane like TMN or
PNNI SNMP PNNI SNMP
Do we really need it? Being Always needed! Already there, Do we really need it? Being Always needed! Already there,
added/specified by several proven and understood. added/specified by several proven and understood.
standardization bodies standardization bodies
High survivability (e.g. in Potential single point(s) of High survivability (e.g. in Potential single point(s) of
skipping to change at line 602 skipping to change at line 467
PNNI SNMP PNNI SNMP
Do we really need it? Being Always needed! Already there, Do we really need it? Being Always needed! Already there,
added/specified by several proven and understood. added/specified by several proven and understood.
standardization bodies standardization bodies
High survivability (e.g. in Potential single point(s) of High survivability (e.g. in Potential single point(s) of
case of partition) failure case of partition) failure
Distributed load Bottleneck: #requests and Distributed load Bottleneck: #requests and
actions to/from NMS actions to/from NMS
Individual local routing Centralized routing decision, Individual local routing Centralized routing decision,
decision can be done per block of decision can be done per block of
requests requests
Routing scalable as for the Assumes a few big Routing scalable as for the Assumes a few big
Bernstein, Mannie, Sharma Informational - January 2002 9
Internet administrative domains Internet administrative domains
Complex to change routing Very easy local upgrade (non- Complex to change routing Very easy local upgrade (non-
protocol/algorithm intrusive) protocol/algorithm intrusive)
Requires enhanced routing Better consistency Requires enhanced routing Better consistency
protocol (traffic protocol (traffic
engineering) engineering)
Ideal for inter-domain Not inter-domain friendly Ideal for inter-domain Not inter-domain friendly
Suitable for very dynamic For less dynamic demands Suitable for very dynamic For less dynamic demands
demands (longer lived) demands (longer lived)
Probably faster to restore, Probably slower to restore, but Probably faster to restore, Probably slower to restore,but
Bernstein, Mannie, Sharma Expires May 2001 11
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
but more difficult to have could effect reliable but more difficult to have could effect reliable
reliable restoration. restoration. reliable restoration. restoration.
High scalability Limited scalability: #nodes, High scalability Limited scalability: #nodes,
(hierarchical) links, circuits, messages (hierarchical) links, circuits, messages
Planning (optimization) Planning is a background Planning (optimization) Planning is a background
harder to achieve centralized activity harder to achieve centralized activity
Easier future integration Easier future integration
with other control plane with other control plane
layers layers
Table 1. Qualitative comparison between centralized and distributed Table 1. Qualitative comparison between centralized and distributed
approaches. approaches.
3.5 Why SDH/SONET will not Disappear Tomorrow 3.5. Why SDH/SONET will not Disappear Tomorrow
If the IP traffic becomes the unique traffic transported over any
transmission network, we could consider that the statistical
multiplexing of IP would completely replace the time division
multiplexing of SDH and SONET. In that case, IP over WDM will be
used everywhere and lambdas could be optically switched. A carrier's
carrier will sell dynamically controlled lambdas with each customer
building its own IP backbone over these lambdas.
This simple model implies that a carrier will sell lambdas instead
of bandwidth. The carrier will try to maximize the number of lambdas
per fiber and each customer will have to fully support the cost for
each of his end-to-end lambdas. Inthe near future, we may have
technology to support several hundreds of lambdas per fiber.
However, a world where lambdas are so cheap and abundant that every
customer can buy them, from one point to any other point, appears an
unlikely scenario today.
More realistically, there is still room for a multiplexing
technology that provides circuits with a lower granularity than a
wavelength. Not everyone needs a minimum of 10 Gbps or 40 Gbps per
circuit, and IP does not yet support all the telecom applications
(e.g. telephony).
SDH and SONET possess a rich multiplexing hierarchy that permits a
finer granularity and provides a very cheap and simple physical
separation of the transported traffic between circuits. We can
easily multiplex any kind of traffic, IP or not, synchronous or
asynchronous.
Moreover, IP is not used directly over a wavelength, a framing or As IP traffic becomes the dominant traffic transported over the
encapsulation is always required to delimit IP datagrams. The Total transport infrastructure, it is useful to compare the statistical
Length field of an IP header cannot be trusted to find the start of multiplexing of IP with the time division multiplexing of SDH and
a new datagram, since it could be corrupted and would result in a SONET.
loss of synchronization. The typical framing used today for IP over
DWDM is defined in RFC1619/RFC2615 and is also known as POS (Packet
Bernstein, Mannie, Sharma Expires May 2001 12 Consider a scenario where IP over WDM is used everywhere and lambdas
are optically switched. In such a case, a carrier's carrier would
sell dynamically controlled lambdas with each customer building
his/her own IP backbone over these lambdas.
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 This simple model implies that a carrier would sell lambdas instead
of bandwidth. The carrier’s goal will be to maximize the number of
wavelengths/lambdas per fiber, with each customer having to fully
support the cost for each end-to-end lambda whether or not the
wavelength is fully utilized. Although, inn the near future, we may
have technology to support up to several hundred lambdas per fiber,
a world where lambdas are so cheap and abundant that every
individual customer buys them, from one point to any other point,
appears an unlikely scenario today.
Over SONET/SDH). It is indeed IP over PPP (in HDLC like format) over Bernstein, Mannie, Sharma Informational - January 2002 10
SDH/SONET. More realistically, there is stillroom for a multiplexing technology
that provides circuits with a lower granularity than a wavelength.
(Not everyone needs a minimum of 10 Gbps or 40 Gbps per circuit, and
IP does not yet support all telecom applications in bulk
efficiently.)
SDH and SONET are actually efficient encapsulations for IP. For SDH and SONET possess a rich multiplexing hierarchy that permits
instance, with an average IP datagram length of 350 octets, an IP fairly fine granularity and that provides a very cheap and simple
over GBE encapsulation using an 8B/10B encoding results in 28% physical separation of the transported traffic between circuits,
overhead, an IP/ATM/SDH encapsulation results in 22% overhead and an i.e., QoS.
IP/PPP/SDH encapsulation result in 6% overhead. New simplified Moreover, even IP datagrams are not transported directly over a
encapsulations could reduce this overhead to as low as 3%, but the wavelength. A framing or encapsulation is always required to delimit
gain is not huge compared to SDH and SONET -, which have other IP datagrams. The Total Length field of an IP header cannot be
benefits as well. trusted to find the start of a new datagram, since it could be
corrupted and would result in a loss of synchronization. The typical
framing used today for IP over DWDM is defined in RFC1619/RFC2615
and known as POS (Packet Over SONET/SDH), i.e., IP over PPP (in
HDLC-like format) over SDH/SONET. SDH and SONET are actually
efficient encapsulations for IP. For instance, with an average IP
datagram length of 350 octets, an IP over GBE encapsulation using an
8B/10B encoding results in 28% overhead, an IP/ATM/SDH encapsulation
results in 22% overhead and an IP/PPP/SDH encapsulation results in
only 6% overhead. (New simplified encapsulations could reduce this
overhead to as low as 3%, but the gain is not huge compared to SDH
and SONET -, which have other benefits as well.)
Any encapsulation of IP over WDM should at least provide error Any encapsulation of IP over WDM should at least provide error
monitoring capabilities (to detect signal degradation), error monitoring capabilities (to detect signal degradation), error
correction capabilities, such as FEC (Forward Error Correction) that correction capabilities, such as FEC (Forward Error Correction) that
are particularly needed for ultra long hau transmission, sufficient are particularly needed for ultra long haul transmission, sufficient
timing information, to allow robust synchronization (that is, to timing information, to allow robust synchronization (that is, to
detect the beginning of a packet), and capacity to transport detect the beginning of a packet), and capacity to transport
signaling, routing and management messages, in order to control the signaling, routing and management messages, in order to control the
optical switches. SDH and SONET cover all these aspects natively, optical switches. SDH and SONET cover all these aspects natively,
except FECs that can be (are) supported in a proprietary way. except FEC, which tends to be supported in a proprietary way.
Since the SDH/SONET encapsulation is a good candidate and is anyway Since IP encapsulated in SDH/SONET is efficient and widely used, the
used, the only real difference between an IP over WDM network and an only real difference between an IP over WDM network and an IP over
IP over SDH over WDM network is the layers at which the switching or SDH over WDM network is the layers at which the switching or
forwarding can take place. In the first case, it can take place at forwarding can take place. In the first case, it can take place at
the IP and optical layers. In the second case, it can take place at the IP and optical layers. In the second case, it can take place at
the IP, SDH/SONET and optical layers. What we are arguing here is the IP, SDH/SONET, and optical layers.
that it makes sense to do switching or forwarding at all these Almost all transmission networks today are based on SDH or SONET. A
layers.
Almost all transmission networks today are based on SDH or SONET. A
client is connected either directly through an SDH or SONET client is connected either directly through an SDH or SONET
interface or through a PDH interface, the PDH signal being interface or through a PDH interface, the PDH signal being
transported between the ingress and the egress interfaces over SDH transported between the ingress and the egress interfaces over SDH
or SONET. The SDH and SONET technologies are widespread, very well or SONET. What we are arguing here is that it makes sense to do
understood switching or forwarding at all these layers.
4. MPLS Applied to SDH/SONET
4.1. Controlling the SDH/SONET Multiplex
Different parts of the SDH/SONET multiplex can be switched, and we 4. GMPLS Applied to SDH/SONET
have to decide which of these we would like to control through MPLS.
Basically, every SDH/SONET element that is referenced by a pointer
can be switched, through pointer adjustment. These elements are the
VC-4, VC-3s, VC-2s, VC-12s and VC-11s in the SDH case; and the SPEs
in the SONET case. The SONET case is more difficult to explain
since, unlike in SDH, SPEs in SONETdo not have individual names.
We will refer to them by identifying the structure that contains
them, namely the STS-1, VT-6s, VT-3s, VT-2s and VT-1.5s.
Bernstein, Mannie, Sharma Expires May 2001 13 Bernstein, Mannie, Sharma Informational - January 2002 11
4.1. Controlling the SDH/SONET Multiplex
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Controlling the SDH/SONET multiplex implies deciding which of the
different components of the SDH/SONET multiplex that can be switched
do we wish to control using GMPLSEssentially, every SDH/SONET
element that is referenced by a pointer can be switched. These
component signals are the VC-4, VC-3, VC-2, VC-12 and VC-11 in the
SDH case; and the VT and STS SPEs in the SONET case. The SONET case
is a bit difficult to explain since, unlike in SDH, SPEs in SONET do
not have individual names. We will refer to them by identifying the
structure that contains them, namely the STS-1, VT-6, VT-3, VT-2 and
VT-1.5.
The STS-1 SPE corresponds to a VC-3, a VT-6 SPE corresponds to a VC- The STS-1 SPE corresponds to a VC-3, a VT-6 SPE corresponds to a VC-
2, a VT-2 SPE corresponds to a VC-12, and a VT-1.5 SPE corresponds 2, a VT-2 SPE corresponds to a VC-12, and a VT-1.5 SPE corresponds
to a VC-11. The SONET VT-3 SPE has no correspondence in SDH, and the to a VC-11. The SONET VT-3 SPE has no correspondence in SDH, however
SDH VC-4 has no correspondence in SONET. A continuous flow of one of SDH's VC-4 corresponds to SONET's STS-3c SPE.
such elements constitutes an SDH or SONET signal.
In addition, it is possible to concatenate some of the structures In addition, it is possible to concatenate some of the structures
that contain these elements to build bigger elements. For instance, that contain these elements to build larger elements. For instance,
SDH allows the concatenation of X contiguous AU-4s to build a VC-4- SDH allows the concatenation of X contiguous AU-4s to build a VC-4-
Xc and of m contiguous TU-2s to build a VC-2-mc. In that case, a VC- Xc and of m contiguous TU-2s to build a VC-2-mc. In that case, a VC-
4-Xc or a VC-2-mc can be switched and controlled by MPLS. Note that 4-Xc or a VC-2-mc can be switched and controlled by MPLS. Note that
SDH defines also the virtual (non-contiguous) concatenation of TU- SDH also defines virtual (non-contiguous) concatenation of TU- 2s,
2s, but in that case each constituent VC-2 is switched individually. but in that case each constituent VC-2 is switched individually.
4.2. SDH/SONET LSR and LSP Terminology 4.2. SDH/SONET LSR and LSP Terminology
Let a SDH or SONET Terminal Multiplexer (TM), Add-Drop Multiplexer Let a SDH or SONET Terminal Multiplexer (TM), Add-Drop Multiplexer
(ADM) or cross-connect (i.e. a switch) be called an SDH/SONET LSR. A (ADM) or cross-connect (i.e. a switch) be called an SDH/SONET LSR. A
SDH/SONET path or circuit between two SDH/SONET LSRs now becomes an SDH/SONET path or circuit between two SDH/SONET LSRs now becomes a
MPLS LSP. An SDH/SONET LSP is a logical connection between the point GMPLS LSP. An SDH/SONET LSP is a logical connection between the
at which a tributary signal (client layer) is assembled into its point at which a tributary signal (client layer) is adapted into its
virtual container, and the point at which it is disassembled from virtual container, and the point at which it is extracted from its
the virtual container. The position taken r by a tributary signal in virtual container.
a virtual container will be referred to as an SDH/SONET signal.
To establish such an LSP, a signaling protocol is required to To establish such an LSP, a signaling protocol is required to
configure the input interface, switch fabric, and output interface configure the input interface, switch fabric, and output interface
of each SDH/SONET LSR along the path. An SDH/SONET LSP can be point- of each SDH/SONET LSR along the path. An SDH/SONET LSP can be point-
to-point or point-to-multipoint, but not multipoint-to-point, since to-point or point-to-multipoint, but not multipoint-to-point, since
no merging capability is possible. no merging is possible with SDH/SONET signals.
To facilitate the signaling and setup of SDH/SONET circuits, an To facilitate the signaling and setup of SDH/SONET circuits, an
SDH/SONET LSR, therefore, must identify each possible signal SDH/SONET LSRmust, therefore, identify each possible signal
individually per interface, since each signal corresponds to a individually per interface, since each signal corresponds to a
potential LSP that can be established through the SDH/SONET LSR. It potential LSP that can be established through the SDH/SONET LSR. It
turns out, however, that not all signals correspond to an LSPs and turns out, however, that not all SDH signals correspond to an LSP
therefore not all of them need be identified. In fact, only those and therefore not all of them need be identified. In fact, only
signals that can be switched need identification. those signals that can be switched need identification.
5. Decomposition of the MPLS Circuit-Switching Problem Space 5. Decomposition of the MPLS Circuit-Switching Problem Space
Bernstein, Mannie, Sharma Informational - January 2002 12
Although those familiar with MPLS may be familiar with its Although those familiar with MPLS may be familiar with its
application in a variety of application areas, e.g., ATM, Frame application in a variety of application areas, e.g., ATM, Frame
Relay, etc. we quickly review its decomposition when applied to the Relay, and so on, here we quickly review its decomposition when
optical switching problem space. applied to the optical switching problem space.
(i) Information needed to compute paths must be made globally (i) Information needed to compute paths must be made globally
available throughout the network. Since this is done via the link available throughout the network. Since this is done via the link
state route protocol, any information of this nature must either be state routing protocol, any information of this nature must either
in the existing link state advertisements (LSAs) or the LSAs must be be in the existing link state advertisements (LSAs) or the LSAs must
supplemented to convey this information. For example, if its be supplemented to convey this information. For example, if it is
desirable to offer different levels of service in a network based on desirable to offer different levels of service in a network based on
whether a circuit is routed over SDH/SONET lines that are ring whether a circuit is routed over SDH/SONET lines that are ring
protected versus being routed over those that are not ring protected
Bernstein, Mannie, Sharma Expires May 2001 14 (differentiation based on reliability), the type of protection on
a SDH/SONET line would be an important topological parameter that
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 would have to be distributed via the link state routing protocol.
protected versus not being protected (differentiation based on
reliability), the type of protection on a SDH/SONET line would be
an important topological parameter that should be distributed via
the link state route protocol..
(ii) Information that is only needed between two "adjacent" switches (ii) Information that is only needed between two "adjacent" switches
for the purposes of connection establishment is appropriate for for the purposes of connection establishment is appropriate for
distribution via one of the label distribution protocols. In fact distribution via one of the label distribution protocols. In fact,
this information may form the "virtual" label. For example in SONET this information can be thought of as the "virtual" label. For
if we are distributing information to switches concerning an end-to- example, in SONET networks, when distributing information to
end STS-1 path traversing a network, it is critical that adjacent switches concerning an end-to-end STS-1 path traversing a network,
switches agree on the multiplex entry used by this STS-1 (but this it is critical that adjacent switches agree on the multiplex entry
information is only of local significance between the two switches). used by this STS-1 (but this information is only of local
Hence, the multiplex entry number in this case can be used as a significance between those two switches). Hence, the multiplex
virtual label. Note that it is virtual in that it is not appended to entry number in this case can be used as a virtual label. Note
the payload in any way, but it is still a label in the sense that it that the label is virtual in that it is not appended to the payload
uniquely identifies the signal local to the link between the two in any way, but it is still a label in the sense that it uniquely
switches. identifies the signal locally on the link between the two switches.
(iii) Information that all switches in the path will need to know (iii) Information that all switches in the path need to know about a
about a circuit will also be distributed via the label distribution circuit will also be distributed via the label distribution
protocol. Example of such information can include bandwidth, protocol. Examples of such information include bandwidth, priority,
priority, and preemption information. and preemption for instance.
(iv) Information intended only for end systems of the connection. (iv) Information intended only for end systems of the connection.
Some of the payload type information in may fall into this category. Some of the payload type information in may fall into this category.
[8],[10]. [8],[10].
6. MPLS Routing for SDH/SONET 6. MPLS Routing for SDH/SONET
Modern transport networks based on SONET/SDH excel at Modern transport networks based on SONET/SDH excel at
interoperability in the performance monitoring (PM) and fault interoperability in the performance monitoring (PM) and fault
management (FM) areas, however, they do not inter-operate in the management (FM) areas., They do not, however, inter-operate in the
areas of topology discovery or resource status. Although link state areas of topology discovery or resource status. Although link state
route protocols, such as IS-IS and OSPF, have been used for some routing protocols, such as IS-IS and OSPF, have been used for some
time in the IP world to compute destination-based next hops for time in the IP world to compute destination-based next hops for
routes (without routing loops), their value in providing timely routes (without routing loops), their value in providing timely
topology and network status information in a distributed manner, topology and network status information in a distributed manner,
i.e., at any network node, is immense. If resource utilization i.e., at any network node, is immense. If resource utilization
information is disseminated along with the link status (as was done information is disseminated along with the link status (as was done
in ATM's PNNI routing protocol) then a very complete picture of in ATM's PNNI routing protocol) then a very complete picture of
Bernstein, Mannie, Sharma Informational - January 2002 13
network status is available to a network operator for use in network status is available to a network operator for use in
planning, provisioning and operations. planning, provisioning and operations.
Information needed to compute the path a connection will take The information needed to compute the path a connection will take
through a network is important to distribute via the routing through a network is important to distribute via the routing
protocol. In the optical TDM case this information includes, but is protocol. In the optical TDM case, this information includes, but
not limited to: the available capacity of the network links, the is not limited to: the available capacity of the network links, the
switching and termination capabilities of the nodes and interfaces, switching and termination capabilities of the nodes and interfaces,
and the protection properties of the link. and the protection properties of the link.
When applying routing to circuit switched situations it is useful to When applying routing to circuit switched networks it is useful to
compare and contrast this situation with the datagram routing case. compare and contrast this situation with the datagram routing case.
In the case of routing datagrams all routes on all nodes must be
Bernstein, Mannie, Sharma Expires May 2001 15 calculated exactly the same to avoid loops and "black holes". In
circuit switching, this is not the case since routes are established
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
In the case of routing for datagrams all routes on all nodes must be
calculated exactly the same to avoid loops and "blackholes". In the
circuit switching, this is not the case since routes are establish
per circuit and are fixed for that circuit. Hence, unlike the per circuit and are fixed for that circuit. Hence, unlike the
datagram case, routing is not service impacting in the circuit datagram case, routing is not service impacting in the circuit
switched case. This is helpful, since to accommodate the optical switched case. This is helpful, because to accommodate the optical
layer new information must be supplemented to the routing protocols, layer routing protocols need to be supplemented with new
much more than the datagram case. This information will also be used information, much more than the datagram case. This information is
in different ways for implementing different user services. Due to also likely to be used in different ways for implementing different
the increase in information transferred in the route protocol it is user services. Due to the increase in information transferred in
important to separate the relatively static parameters concerning a the routing protocol, it is important to separate the relatively
link with those that may be subject to frequent changes. This is static parameters concerning a link from those that may be subject
particularly important in the case of available capacity to frequent changes. This is particularly important in the case of
advertisements. available capacity advertisements.
6.1. Switching Capabilities 6.1. Switching Capabilities
The main switching capabilities that characterize a SONET/SDH end The main switching capabilities that characterize a SONET/SDH end
system and thus get advertised into the link state route protocol system and thus need to be advertised via the link state routing
are: the switching granularity, supported forms of concatenation, protocol are: the switching granularity, supported forms of
and the level of transparency. concatenation, and the level of transparency.
6.1.1. Switching Granularity 6.1.1. Switching Granularity
From Error! Reference source not found. and the overview section on From references [3], [4]and the overview section on SONET/SDH we see
SONET/SDH there are a number of different signals that compose the that there are a number of different signals that compose the
SONET/SDH hierarchies. Those signals that are referenced via a SONET/SDH hierarchies. Those signals that are referenced via a
pointer, i.e., the VCs in SDH and the SPEs in SONET are those that pointer, i.e., the VCs in SDH and the SPEs in SONET are those that
will actually be switched within a SONET/SDH network. These signals will actually be switched within a SONET/SDH network. These signals
are subdivided into lower order signals and higher order signals as are subdivided into lower order signals and higher order signals as
shown in Table 2. shown in Table 2.
Table 2. SDH/SONET switched signal groupings. Table 2. SDH/SONET switched signal groupings.
Signal Type SDH SONET Signal Type SDH SONET
Lower Order VC-11, VC-12, VC-2 VT-1.5 SPE, VT-2 SPE,
VT-3 SPE, VT-6 SPE
Higher VC-3, VC-4 STS-1 SPE
Order
Many manufacturers today switch signals starting at VC-4 for SDH or Lower Order VC-11, VC-12, VC-2 VT-1.5 SPE, VT-2 SPE,
STS-1 for SONET (i.e. the basic frame) and above (see concatenation VT-3 SPE, VT-6 SPE
section), but they don't allow to switch lower order signals. Some
of them allow only to switch aggregates (concatenated or not) of
signals such as 16 VC-4s, i.e. a complete STM-16, and nothing below.
Some manufacturers go down to the VC-3 for SDH. Finally, some
manufacturers allow to go lower than the VC-3/STS-1, down to lower
order signals such as VC-12s. Some combinations are also possible,
such as down to VC-12 for unprotected circuits and nothing below VC-
4 for fast restoration.
Bernstein, Mannie, Sharma Expires May 2001 16 Higher VC-3, VC-4 STS-1 SPE
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Bernstein, Mannie, Sharma Informational - January 2002 14
Order
We can see that very different granularities can be considered. Manufacturers today differ in the types of switching capabilities
These granularities can even vary between services. In order to their systems support. Many manufacturers today switch signals
cover the needs of all manufacturers and operators, we don't limit starting at VC-4 for SDH or STS-1 for SONET (i.e. the basic
the scope of our work to higher order signals and we consider that frame) and above (see concatenation section), but they do not
we have to design a solution able to control the complete SDH/SONET switch lower order signals. Some of them only allow the switching
multiplex. Of course, one could just use it to control the higher of entire aggregates (concatenated or not) of signals such as 16 VC-
order signals. 4s, i.e. a complete STM-16, and nothing finer. Some go down to the
VC-3 level for SDH. Finally, some offer highly integrated switches
that switch at the VC-3/STS-1 level down to lower order signals such
as VC-12s. In order to cover the needs of all manufacturers and
operators, GMPLS must consider both higher order and lower order
signals.
6.1.2. Signal Concatenation Capabilities 6.1.2. Signal Concatenation Capabilities
As stated in the SONET/SDH overview, to transport tributary signals As stated in the SONET/SDH overview, to transport tributary signals
in excess of the basic STM-1/STS-1 signal, the VCs/SPEs can be with rates in excess of the basic STM-1/STS-1 signal, the VCs/SPEs
concatenated, i.e., glued together. Different types of can be concatenated, i.e., glued together. Different types of
concatenations are defined: contiguious standard concatenation, concatenations are defined: contiguous standard concatenation,
arbitrary contiguous concatenation, and virtual concatenation with arbitrary concatenation, and virtual concatenation with different
different rules concerning their size, placement, and binding. rules concerning their size, placement, and binding.
Standard SONET concatenation allows the concatenation of M x STS-1 Standard SONET concatenation allows the concatenation of M x STS-1
signals within an STS-N signal with M <= N, and M = 3, 12, 48, signals within an STS-N signal with M <= N, and M = 3, 12, 48,
192,...). The SPEs of these M x STS-1s can be concatenated to form 192,...). The SPEs of these M x STS-1s can be concatenated to form
an STS-Mc. The STS-Mc notation is short hand for describing an STS-M an STS-Mc. The STS-Mc notation is short hand for describing an STS-M
signal whose SPEs have been concatenated. The multiplexing signal whose SPEs have been concatenated. The multiplexing
procedures for SONET and SDH are given in references [3], [4], [5], procedures for SONET and SDH are given in references [3]and [4].
Constraints are imposed on the size of STS-Mc signals, i.e., they Constraints are imposed on the size of STS-Mc signals, i.e., they
must be a multiple of 3, and on their starting location and must be a multiple of 3, and on their starting location and
interleaving. This has the following advantages: (a) restriction to interleaving.
multiples of 3 helps with SDH compatibility (there is no STS-1
equivalent signal in SDH); (b) the restriction to multiples of 3 This has the following advantages: (a) restriction to multiples of 3
reduces the number of connection types; (c) the restriction on the helps with SDH compatibility (there is no STS-1 equivalent signal in
placement and interleaving could allow more compact representation SDH); (b) the restriction to multiples of 3 reduces the number of
of the "label"; The major disadvantages of these restrictions are: connection types; (c) the restriction on the placement and
interleaving could allow more compact representation of the "label";
The major disadvantages of these restrictions are:
(a) Limited flexibility in bandwidth assignment (somewhat inhibits (a) Limited flexibility in bandwidth assignment (somewhat inhibits
finer grained traffic engineering). (b) The lack of flexibility in finer grained traffic engineering). (b) The lack of flexibility in
starting time slots for STS-Mc signals and in their interleaving starting time slots for STS-Mc signals and in their interleaving
(where the rest of the signal gets put in terms of STS-1 slot (where the rest of the signal gets put in terms of STS-1 slot
numbers) leads to the requirement for re-grooming (due to bandwidth numbers) leads to the requirement for re-grooming (due to bandwidth
fragmentation). fragmentation).
Due to these disadvantages some SONET framer manufacturers now Due to these disadvantages some SONET framer manufacturers now
support "flexible" or arbitrary concatenation, i.e., no support "flexible" or arbitrary concatenation, i.e., no restrictions
restrictions on the size of an STS-Mc (as long as M <= N) and no on the size of an STS-Mc (as long as M <= N) and no constraints on
constraints on the STS-1 timeslots used to convey it, i.e., the the STS-1 timeslots used to convey it, i.e., the signals can use any
signals can use any combination of available time slots. combination of available time slots.
Bernstein, Mannie, Sharma Informational - January 2002 15
Standard and flexible concatenations are network services, while Standard and flexible concatenations are network services, while
virtual concatenation is a SONET/SDH end system service recently virtual concatenation is a SONET/SDH end-system service recently
approved by the committee T1 of ANSI and ITU-T. The essence of this approved by the committee T1 of ANSI and ITU-T. The essence of this
service is to have SONET/SDH end systems "glue" together the VCs or service is to have SONET/SDH end systems "glue" together the VCs or
SPEs of separate signals rather than the signals being carried SPEs of separate signals rather than requiring that he signals be
through the network as a single unit. In one example of virtual carried through the network as a single unit. In one example of
concatenation two end systems supporting this feature could virtual concatenation, two end systems supporting this feature could
essentially "inverse multiplex" two STS-1s into a virtual STS-2c for essentially "inverse multiplex" two STS-1s into a virtual STS-2c for
Bernstein, Mannie, Sharma Expires May 2001 17
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
the efficient transport of 100Mbps Ethernet traffic. Note that this the efficient transport of 100Mbps Ethernet traffic. Note that this
inverse multiplexing process can be significantly easier with inverse multiplexing process can be significantly easier to
SONET/SDH signals rather than for packets. Virtual concatenation, implement with SONET/SDH signals rather than packets. Since virtual
being provided by end systems, is compatible with existing SONET/SDH concatenationis provided by end systems, it is compatible with
networks. Virtual concatenation is defined for higher order signals existing SONET/SDH networks. Virtual concatenation is defined for
and low order signals. Table 3 shows the nomenclature and capacity both higher order signals and low order signals. Table 3 shows the
for several low order virtually concatenated signals contained in nomenclature and capacity for several lower-order virtually
different higher order signals. concatenated signals contained within different higher-order
signals.
Table 3 Capacity of Virtually Concatenated VTn-Xv ( 9/G.707) Table 3 Capacity of Virtually Concatenated VTn-Xv ( 9/G.707)
Carried In X Capacity In steps Carried In X Capacity In steps
of of
VT1.5/V STS-1/VC-3 1 to 28 1600kbit/s to 1600kbit/s VT1.5/ STS-1/VC-3 1 to 28 1600kbit/s to 1600kbit/s
C-11-Xv 44800kbit/s VC-11-Xv 44800kbit/s
VT2/VC- STS-1/VC-3 1 to 21 2176kbit/s to 2176kbit/s VT2/ STS-1/VC-3 1 to 21 2176kbit/s to 2176kbit/s
12-Xv 45696kbit/s VC-12-Xv 45696kbit/s
VT1.5/V STS-3c/VC-4 1 to 64 1600kbit/s to 1600kbit/s VT1.5/ STS-3c/VC-4 1 to 64 1600kbit/s to 1600kbit/s
C-11-Xv 102400kbit/s VC-11-Xv 102400kbit/s
VT2/VC- STS-3c/VC-4 1 to 63 2176kbit/s to 2176kbit/s VT2/ STS-3c/VC-4 1 to 63 2176kbit/s to 2176kbit/s
12-Xv 137088kbit/s VC-12-Xv 137088kbit/s
6.1.3. SDH/SONET Transparency 6.1.3. SDH/SONET Transparency
The purposed of SONET/SDH is to carry its payload signals in a The purposed of SONET/SDH is to carry its payload signals in a
transparent manner. This can include some of the layers of SONET transparent manner. This can include some of the layers of SONET
itself, i.e., the path overhead can never be touched since it itself. For example, situations where the path overhead can never be
actually belongs to the client. This was another reason is why we touched, since it actually belongs to the client. This was another
didnĘt want to code any explicit label in SDH/SONET path overhead. reason for not coding an explicit label in SDH/SONET path overhead.
It may be useful to transport, multiplex and/or switch lower layers It may be useful to transport, multiplex and/or switch lower layers
of the SONET signal transparently. of the SONET signal transparently.
As mentioned in the introduction SONET overhead is broken into three As mentioned in the introduction, SONET overhead is broken into
layers: Section, Line and Path. All these layers are concerned with three layers: Section, Line and Path. Each of these layers is
fault and performance monitoring. Section overhead is primarily concerned with fault and performance monitoring. The Section
concerned with framing and Line overhead is primarily concerned with overhead is primarily concerned with framing, while the Line
multiplexing and protection. To perform multiplexing, a SONET overhead is primarily concerned with multiplexing and protection.
network element should be line terminating. However, not all SONET To perform multiplexing, a SONET network element should be line
multiplexers/switches perform SONET pointer adjustments on all the terminating. However, not all SONET multiplexers/switches perform
STS-1s contained within them or if they perform the pointer
adjustments they do not terminate the line overhead. For example, a
multiplexer may take four SONET STS-48 signals and multiplex them
onto an STS-192 without performing standard line pointer adjustments
on the individual STS-1s. This can be looked at as a service since
it may be desirable to pass SONET signals, like an STS-12 or STS-48,
with some level of transparency through a network and still take
advantage of TDM. Transparent multiplexing and switching can also
be viewed as a constraint, since some multiplexers and switches may
Bernstein, Mannie, Sharma Expires May 2001 18
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
not switch at as fine a granularity as others. Table 4 summarizes Bernstein, Mannie, Sharma Informational - January 2002 16
the levels of SONET/SDH transparency. SONET pointer adjustments on all the STS-1s contained within a
higher order SONET signal passing through them. Alternatively, if
they perform pointer adjustments, they do not terminate the line
overhead. For example, a multiplexer may take four SONET STS-48
signals and multiplex them onto an STS-192 without performing
standard line pointer adjustments on the individual STS-1s. This
can be looked at as a service since it may be desirable to pass
SONET signals, like an STS-12 or STS-48, with some level of
transparency through a network and still take advantage of TDM
technology. Transparent multiplexing and switching can also be
viewed as a constraint, since some multiplexers and switches may not
switch with as fine a granularity as others. Table 4 summarizes the
levels of SONET/SDH transparency.
Table 4. SONET/SDH transparency types and their properties. Table 4. SONET/SDH transparency types and their properties.
Transparency Type Comments Transparency Type Comments
Path Layer (or Line Standard higher order SONET path Path Layer (or Line Standard higher order SONET path
Terminating) switching. Line overhead is terminated or Terminating) switching. Line overhead is terminated
modified. or modified.
Line Level (or Section Preserves line overhead and switches the Line Level (or Section Preserves line overhead and switches
Terminating) entire line multiplex as a whole. Section Terminating) the entire line multiplex as a whole.
overhead is terminated or modified. Section overhead is terminated or
modified.
Section layer Preserves all section overhead, basically Section layer Preserves all section overhead,
does not touch any of the SONET/SDH bits. Basically does not touch any of the
SONET/SDH bits.
6.2. Protection 6.2. Protection
SONET and SDH networks offer a variety of protection options at both SONET and SDH networks offer a variety of protection options at both
the SONET line and SONET path level. Standardized SONET line level the SONET line (SDH multiplex section) and SONET/SDH path
protection techniques include Linear 1+1 and Linear 1:N automatic level[5][6]. Standardized SONET line level protection techniques
protection switching (APS) and both two-fiber and four-fiber bi- include Linear 1+1 and Linear 1:N automatic protection switching
directional line switched rings (BLSRs). At the path layer, SONET (APS) and both two-fiber and four-fiber bi-directional line switched
offers uni-directional path switched ring protection. Both ring and rings (BLSRs). At the path layer, SONET offers uni-directional path
1:N line protection also allow for "extra traffic" to be carried switched ring protection. Both ring and 1:N line protection also
over the protection line when that line is not being used, i.e., allow for "extra traffic" to be carried over the protection line
when it is not carrying traffic for a failed working line. These when that line is not being used, i.e., when it is not carrying
protection methods are summarized in Table 5. It should be noted traffic for a failed working line. These protection methods are
that these protection methods are completely separate of any MPLS summarized in Table 5. It should be noted that these protection
layer protection or restoration mechanisms. methods are completely separate from any MPLS layer protection or
restoration mechanisms.
Table 5. Common SONET/SDH protection mechanisms. Table 5. Common SONET/SDH protection mechanisms.
Protection Type Extra Comments Protection Type Extra Comments
Traffic Traffic
Optionally Optionally
Bernstein, Mannie, Sharma Informational - January 2002 17
Supported Supported
1+1 No Requires no coordination 1+1 No Requires no coordination
Unidirectional between the two ends of the Unidirectional between the two ends of the
circuit. Dedicated circuit. Dedicated
protection line. protection line.
1+1 Bi- No Coordination via K byte 1+1 Bi- No Coordination via K byte
directional protocol. Lines must be directional protocol. Lines must be
consistently configured. consistently configured.
Dedicated protection line. Dedicated protection line.
1:1 Yes Dedicated protection. 1:1 Yes Dedicated protection.
1:N Yes One Protection line shared 1:N Yes One Protection line shared
by N working lines.
Bernstein, Mannie, Sharma Expires May 2001 19
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
by N working lines. N @
1
4
4F-BLSR (4 Yes Dedicated protection, with 4F-BLSR (4 Yes Dedicated protection, with
fiber bi- alternative ring path. fiber bi- alternative ring path.
directional directional
line switched line switched
ring) ring)
2F-BLSR (2 Yes Dedicated protection, with 2F-BLSR (2 Yes Dedicated protection, with
fiber bi- alternative ring path fiber bi- alternative ring path
directional directional
line switched line switched
ring) ring)
UPSR (uni- No Dedicated protection via UPSR (uni- No Dedicated protection via
directional alternative ring path. directional alternative ring path.
path switched Typically used in access path switched Typically used in access
ring) networks. ring) networks.
It may be desirable to route some connections over lines that It may be desirable to route some connections over lines that
support protection of a given type, while others may be routed over support protection of a given type, while others may be routed over
unprotected lines, or as "extra data" over protection lines. Also to unprotected lines, or as "extra traffic" over protection lines.
assist in the configuration of these various protection methods it Also, to assist in the configuration of these various protection
can be extremely valuable to advertise the link protection methods it can be extremely valuable to advertise the link
attributes in the route protocol. For example suppose that a 1:N protection attributes in the routing protocol. For example suppose
protection group is being configured via two nodes. One must make that a 1:N protection group is being configured via two nodes. One
sure that the lines are "numbered the same" with respect to both end must make sure that the lines are "numbered the same" with respect
of the connection or else the APS (K1/K2 byte) protocol will not to both ends of the connection or else the APS (K1/K2 byte) protocol
correctly operate. will not correctly operate.
Table 6. Parameters defining protection mechanisms. Table 6. Parameters defining protection mechanisms.
Protection Comments Protection Comments
Related Link Related Link
Bernstein, Mannie, Sharma Informational - January 2002 18
Information Information
Protection Type Indicates which of the protection types Protection Type Indicates which of the protection types
delineated in Table 5. delineated in Table 5.
Protection Indicates which of several protection Protection Indicates which of several protection
Group Id groups (linear or ring) that a node belongs Group Id groups (linear or ring) that a node belongs
to. Must be unique for all groups that a to. Must be unique for all groups that a
node participates in node participates in
Working line Important in 1:N case and to differentiate Working line Important in 1:N case and to differentiate
number between working and protection lines number between working and protection lines
Protection line Used to indicate if the line is a Protection line Used to indicate if the line is a
number protection line. number protection line.
Extra Traffic Yes or No Extra Traffic Yes or No
Supported Supported
Layer If this protection parameter is specific to Layer If this protection parameter is specific to
Bernstein, Mannie, Sharma Expires May 2001 20
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
SONET then this parameter is unneeded, SONET then this parameter is unneeded,
otherwise it would indicate the signal otherwise it would indicate the signal
layer that the protection is applied. layer that the protection is applied.
How much information to disseminate concerning protection is an open An open issue concerning protection is the extent of information
issue with the contents of Table 6 representing one extreme and a regarding protection that must be disseminated. The contents of
simple enumerated list of: Extra-Traffic/Protection line, Table 6 represent one extreme whilea simple enumerated list of:
Unprotected, Shared (1:N)/Working line, Dedicated (1:1, 1+1)/Working Extra-Traffic/Protection line, Unprotected, Shared (1:N)/Working
Line, Enhanced (Ring) /Working Line, representing the other. line, Dedicated (1:1, 1+1)/Working Line, Enhanced (Ring) /Working
Line, represents the other.
There is also a potential implication for link bundling, that is, There is also a potential implication for link bundling, that is,
for each link, the routing protocol could advertise whether it is a for each link, the routing protocol could advertise whether that
working or protection link and possibly some parameters from Table link is a working or protection link and possibly some parameters
6. A possible drawback of this scheme is that the routing protocol from Table 6. A possible drawback of this scheme is that the routing
would be burdened with advertising properties even for those protocol would be burdened with advertising properties even for
protection links in the network that could not in fact be used for those protection links in the network that could not, in fact, be
routing working traffic, e.g., dedicated protection links. An used for routing working traffic, e.g., dedicated protection links.
alternative method, would be to bundle the working and protection An alternative method, would be to bundle the working and protection
links together and advertise the bundle instead. Now, for each links together, and advertise the bundle instead. Now, for each
bundled link, the protocol would have to advertise the amount of bundled link, the protocol would have to advertise the amount of
bandwidth available on its working links, as well as the amount of bandwidth available on its working links, as well as the amount of
bandwidth available on those protection links within the bundle that bandwidth available on those protection links within the bundle that
were capable of carrying "extra traffic." This would reduce the were capable of carrying "extra traffic." This would reduce the
amount of information to be advertised. An issue here would be to amount of information to be advertised. An issue here would be to
decide which types of working and protection links to bundle decide which types of working and protection links to bundle
together. For instance, it might be preferable to bundle working together. For instance, it might be preferable to bundle working
Bernstein, Mannie, Sharma Informational - January 2002 19
links (and their corresponding protection links) that are "shared" links (and their corresponding protection links) that are "shared"
protected separately from working links that are "dedicated" protected separately from working links that are "dedicated"
protected. protected.
6.3. Available Capacity Advertisement 6.3. Available Capacity Advertisement
Internally to each SDH/SONET LSR interface, a table is maintained
indicating each signal allocated in the multiplex structure. This is
the most complete and accurate view of the link usage and available
capacity.
This information needs to be advertised in some way to all others
SONET/SDH LSRs in the same domain for use in path computation. There
is a trade off to be reached concerning:
the amount of detail in the available capacity information to be
reported via a link state routing protocol,
the frequency or conditions under which this information is updated,
the percentage of connection establishments that are unsuccessful on
their first attempt,
the extent to which network resources can be optimized.
There are different levels of summarization that are being
considered today for the available capacity information. At one
extreme all signals that are allocated on an interface could be
Bernstein, Mannie, Sharma Expires May 2001 21
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Each SDH/SONET LSR must maintain an internal table per interface
that indicates each signal in the multiplex structure that is
allocated at that interface. This internal table is the most
complete and accurate view of the link usage and available capacity.
advertised, or on the other extreme, an single aggregated value of For use in path computation, this information needs to be advertised
the available bandwidth could be advertised. in some way to all others SONET/SDH LSRs in the same domain . There
is a trade off to be reached concerning: the amount of detail in the
available capacity information to be reported via a link state
routing protocol, the frequency or conditions under which this
information is updated, the percentage of connection establishments
that are unsuccessful on their first attempt due to the granularity
of the advertised information, and the extent to which network
resources can be optimized. There are different levels of
summarization that are being considered today for the available
capacity information. At one extreme, all signals that are allocated
on an interface could be advertised, while at the other extreme, a
single aggregated value of the available bandwidth per link could be
advertised.
Consider first the relatively simple structure of SONET and its most Consider first the relatively simple structure of SONET and its most
common current and planned usage. DS1s and DS3s are the signals most common current and planned usage. DS1s and DS3s are the signals most
often carried within a SONET STS-1. Either a single DS3 occupies often carried within a SONET STS-1. Either a single DS3 occupies
the STS-1 or up to 28 DS1s (4 each within the 7 VT groups) are the STS-1 or up to 28 DS1s (4 each within the 7 VT groups) are
carried within the STS-1. With a reasonable VT1.5 placement carried within the STS-1. With a reasonable VT1.5 placement
algorithm within each node it may be possible to just report on algorithm within each node it may be possible to just report on
aggregate bandwidth usage in terms of number of whole STS-1s aggregate bandwidth usage in terms of number of whole STS-1s
(dedicated to DS3s) used and the number of STS-1s dedicated to (dedicated to DS3s) used and the number of STS-1s dedicated to
carrying DS1sallocated for this purpose. . This way a network carrying DS1s allocated for this purpose. This way a network
optimization program could try to determine the optimal placement of optimization program could try to determine the optimal placement of
DS3s and DS1s to minimize wasted bandwidth due to half-empty STS-1s DS3s and DS1s to minimize wasted bandwidth due to half-empty STS-1s
at various places within the transport network. at various places within the transport network. Similarly consider
the set of super rate SONET signals (STS-Nc). If the links between
Similarly consider the set of super rate SONET signals (STS-Nc). If the two switches support flexible concatenation then the reporting
the links between the two switches support flexible concatenation is particularly straightforward since any of the STS-1s within an
then the reporting is particularly straightforward since any of the STS-M can be used to comprise the transported STS- Nc. However, if
STS-1s within an STS-M can be used to comprise the transported STS- only standard concatenation is supported then reporting gets
Nc. However, if only standard concatenation is supported then trickier since there are constraints on where the STS-1s can be
reporting gets trickier since there are constraints on where the placed. SDH has still more options and constraints, hence it is not
STS-1s can be placed. SDH has still more options and constraints yet clear which is the best way to advertise bandwidth resource
hence it is not yet clear yet the best way to advertise bandwidth availability/usage in SONET/SDH. However, due to the multiplexed
resource availability/usage in SONET/SDH. However, due to the nature of the signals reporting of bandwidth particular to signal
multiplexed nature of the signals reporting of bandwidth particular types rather than as a single aggregate bit rate is highly
to signal types rather than as a single aggregate bit rate is highly
desirable. desirable.
6.4. Path Computation Bernstein, Mannie, Sharma Informational - January 2002 20
6.4. Path Computation
Although a link state route protocol can be used to obtain network Although a link state routing protocol can be used to obtain network
topology and resource information, this does not imply the use of an topology and resource information, this does not imply the use of an
"open shortest path first" route. The path must be open in the sense "open shortest path first" route. The path must be open in the sense
that the links must be capable of supporting the desired signal type that the links must be capable of supporting the desired signal type
and that capacity must be available to carry the signal. Other and that capacity must be available to carry the signal. Other
constraints may include hop count, total delay (mostly propagation), constraints may include hop count, total delay (mostly propagation),
and hop count. In addition, it may be desirable to route traffic in and underlying protection.In addition, it may be desirable to route
order to optimize overall network capacity, reliability, or some traffic in order to optimize overall network capacity, or
combination of the two. Dikstra's algorithm computes the shortest reliability, or some combination of the two. Dikstra's algorithm
path with respect to link weights for a single connection at a time. computes the shortest path with respect to link weights for a single
This can be much different than the paths that would be selected in connection at a time. This can be much different than the paths that
response to a request to set up a batch of connections between a set would be selected in response to a request to set up a batch of
of endpoints in order to optimize network link utilization. One can connections between a set of endpoints in order to optimize network
think along the line of global or local optimization of the network. link utilization. One can think of this along the lines of global or
Due to the complexity of some of the route algorithms (high local optimization of the network in time.
dimensionality non-linear integer programming problems) and various
criteria by which one may optimize their network it may not be Due to the complexity of some of the connectionrouting algorithms
(high dimensionality, non-linear integer programming problems) and
various criteria by which one may optimize a network, it may not be
possible or desirable to run these algorithms on network nodes. possible or desirable to run these algorithms on network nodes.
However, it may still be desirable to have some basic path However, it may still be desirable to have some basic path
computation ability running on the network nodes, particularly in computation ability running on the network nodes, particularly for
restoration situations. Such an approach is in line with the use of use during restoration situations. Such an approach is in line
with the use of MPLS for traffic engineering, but is much
Bernstein, Mannie, Sharma Expires May 2001 22 different than typical OSPF or IS-IS usage where all nodes must
run the same routing algorithm.
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
MPLS for traffic engineering but is much different than typical OSPF
or IS-IS usage where all nodes must run the same route algorithm.
6.5. Link Bundling in Routing: Reducing Adjacencies
A brief mention is in order here about how the SDH/SONET links can
be advertised in routing protocols. We have alluded to routing
issues before, but a point worth advertising that link bundling may
be used to announce bundles of SDH/SONET links. This would
considerably reduce the amount of information advertised in routing,
as well as the number of IP addresses actually consumed by SDH/SONET
links and interfaces. Furthermore, bundled links could, in turn, be
advertised in IGP routing tables as forwarding adjacencies (Fas) for
use by subsequent lower speed circuits.
While the issue of exactly how to bundle links and the specifics of
how to advertise them have received attention in the IETF for
packet-based links, some of the details of this process, especially
for SDH/SONET networks is still under study.
7. LSP Provisioning/Signaling for SDH/SONET 7. LSP Provisioning/Signaling for SDH/SONET
Traditionally, end-to-end circuit connections in SDH/SONET networks Traditionally, end-to-end circuit connections in SDH/SONET networks
have been set up via network management systems (NMSs), which issue have been set up via network management systems (NMSs), which issue
commands (usually under the control of a human operator) to the commands (usually under the control of a human operator) to the
various network elements involved in the circuit, via an equipment various network elements involved in the circuit, via an equipment
vendor's element management system (EMS). Very little multi-vendor vendor's element management system (EMS). Very little multi-vendor
interoperability has been achieved via management systems. Hence, interoperability has been achieved via management systems. Hence,
end-to-end circuits in a multi-vendor environment typically require end-to-end circuits in a multi-vendor environment typically require
the use of multiple management systems and the infamous the use of multiple management systems and the infamous
configuration via "yellow sticky notes". As discussed in Section 2, configuration via "yellow sticky notes". As discussed in Section 2,
a common signaling protocol, such as RSVP with TE extensions or CR- a common signaling protocol, such as RSVP with TE extensions or CR-
LDP appropriately extended for circuit switching applications, could LDP appropriately extended for circuit switching applications, could
therefore help to solve these interoperability problems. In this therefore help to solve these interoperability problems. In this
section, we examine the various components involved in the automated section, we examine the various components involved in the automated
provisioning of SONET/SDH LSPs and the associated signaling. provisioning of SONET/SDH LSPs.
7.1.1. What do we Label in SDH/SONET? Frames or Circuits? 7.1.1. What do we Label in SDH/SONET? Frames or Circuits?
MPLS was initially introduced to control asynchronous technologies MPLS was initially introduced to control asynchronous technologies
like IP, where a label was attached to each individual block of like IP, where a label was attached to each individual block of
data, such as an IP packet or a Frame Relay frame. SONET and SDH, data, such as an IP packet or a Frame Relay frame. SONET and SDH,
however, are synchronous technologies that define a multiplexing
structure (see Section 1.2), which we referred to as the SDH (or
SONET) multiplex in Section 1.2. This multiplex involves a hierarchy
of signals, lower order signals embedded within successive higher
order ones (see Fig. 1). Thus, depending on its level in the
hierarchy, each signal consists of frames that repeat periodically,
with a certain number of slots per frame, and these signals can be
controlled using MPLS.
Bernstein, Mannie, Sharma Expires May 2001 23 Bernstein, Mannie, Sharma Informational - January 2002 21
however, are synchronous technologies that define a multiplexing
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 structure (see Section 3.2), which we referred to as the SDH (or
SONET) multiplex. This multiplex involves a hierarchy of signals,
lower order signals embedded within successive higher order ones
(see Fig. 1). Thus, depending on its level in the hierarchy, each
signal consists of frames that repeat periodically, with a certain
number of byte time slots per frame.
The question then arises: is it these frames that we label in MPLS? The question then arises: is it these frames that we label in GMPLS?
It will be seen in what follows that we do not consider that each It will be seen in what follows that each SONET or SDH "frame"
SONET or SDH "frame" has its own label and that we switch frames need not have its own label, nor is it necessary to switch frames
individually. Rather, the unit that is switched is a "flow" individually. Rather, the unit that is switched is a "flow"
comprised of continuous time slots that appear at a given position comprised of a continuous sequence of time slots that appear at a
in such a frame. That is, we switch an individual SONET or SDH given position in a frame. That is, we switch an individual SONET or
signal, with a label associated with each given signal. SDH signal, and a label associated with each given signal.
For instance, the payload of an SDH STM-1 frame does not fully For instance, the payload of an SDH STM-1 frame does not fully
contain a complete unit of user data. In fact, the user data is contain a complete unit of user data. In fact, the user data is
contained in a virtual container (VC) that is allowed to float over contained in a virtual container (VC) that is allowed to float over
two contiguous frames for synchronization purposes. A pointer in the two contiguous frames for synchronization purposes. A pointer in the
Section Overhead (SOH) indicates the beginning of the VC in the Section Overhead (SOH) indicates the beginning of the VC in the
payload. Thus, frames are now inter-related, since each consecutive payload. Thus, frames are now inter-related, since each consecutive
pair may share a common virtual container. From the point of view of pair may share a common virtual container. From the point of view of
MPLS, therefore, it is not the successive frames that are treated GMPLS, therefore, it is not the successive frames that are treated
independently or labeled, but rather the user signal. An identical independently or labeled, but rather the entire user signal. An
argument applies to SONET. identical argument applies to SONET.
Observe also that the MPLS signaling used to control the SDH/SONET Observe also that the GMPLS signaling used to control the SDH/SONET
multiplex must honor its hierarchy. In other words, the SDH/SONET multiplex must honor its hierarchy. In other words, the SDH/SONET
layer should not be viewed as homogeneous and flat, because this layer should not be viewed as homogeneous and flat, because this
would limit the scope of the services that it can provide. Instead, would limit the scope of the services that SDH/SONET can provide.
MPLS tunnels should be used to dynamically and hierarchically Instead, GMPLS tunnels should be used to dynamically and
control the SDH/SONET multiplex. For example, one unstructured VC-4 hierarchically control the SDH/SONET multiplex. For example, one
LSP may be established between two nodes, and later lower order LSPs unstructured VC-4 LSP may be established between two nodes, and
(e.g. VC-12) may be created within that higher order LSP. This VC-4 later lower order LSPs (e.g. VC-12) may be created within that
LSP can, in fact, be established between two non-adjacent internal higher order LSP. This VC-4 LSP can, in fact, be established
nodes in an SDH network, and later advertised by a routing protocol between two non-adjacent internal nodes in an SDH network, and
as a new (virtual) link called a Forwarding Adjacency (FA). later advertised by a routing protocol as a new (virtual) link
called a Forwarding Adjacency (FA).
An SONET/SDH-LSR will have to identify each possible signal A SONET/SDH-LSR will have to identify each possible signal
individually per interface to fulfill the MPLS operations. In order individually per interface to fulfill the GMPLS operations. In order
to stay transparent the LSR obviously should not touch the SONET/SDH to stay transparent the LSR obviously should not touch the SONET/SDH
overheads; this is why an explicit label is not encoded in the overheads; this is why an explicit label is not encoded in the
SDH/SONET overheads. Rather, a label is associated with each SDH/SONET overheads. Rather, a label is associated with each
individual signal. This approach is similar to the one considered individual signal. This approach is similar to the one considered
for lambda switching, except that it is more complex, since SONET for lambda switching, except that it is more complex, since SONET
and SDH define a richer multiplexing structure. and SDH define a richer multiplexing structure. Therefore a label
Therefore a label is associated with each signal, and is local and is associated with each signal, and is locally unique for each
unique for each signal at each interface. This signal could, and signal at each interface. This signal could, and will most probably,
will most probably, occupy different time-slots at different occupy different time-slots at different interfaces.
interfaces.
7.2. Label Structure in SDH/SONET Bernstein, Mannie, Sharma Informational - January 2002 22
7.2. Label Structure in SDH/SONET
The signaling protocol used to establish an SDH/SONET LSP must have The signaling protocol used to establish an SDH/SONET LSP must have
specific information elements in it to map a label to the particular specific information elements in it to map a label to the particular
signal type that it represents and to the position of that signal in signal type that it represents, and to the position of that signal
the SONET/SDH multiplex. As we will see shortly, however, with a in the SONET/SDH multiplex. As we will see shortly, with a
carefully chosen label structure, the label itself can be made to carefully chosen label structure, the label itself can be made to
function as this information element. function as this information element.
Bernstein, Mannie, Sharma Expires May 2001 24
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
In general, there are two ways to assign labels for signals between In general, there are two ways to assign labels for signals between
neighboring SDH/SONET LSRs. One way is for the labels to be neighboring SDH/SONET LSRs. One way is for the labels to be
allocated completely independently of any SDH/SONET semantics; e.g. allocated completely independently of any SDH/SONET semantics; e.g.
labels could just be unstructured 16 or 32 bit numbers. In that labels could just be unstructured 16 or 32 bit numbers. In that
case, in the absence of appropriate binding information, a label case, in the absence of appropriate binding information, a label
gives no visible information about the flow that it represents. From gives no visible information about the flow that it represents. From
a management and debugging point of view, therefore, it becomes a management and debugging point of view, therefore, it becomes
difficult to match a label with the corresponding signal, since , as difficult to match a label with the corresponding signal, since , as
we saw in Section 4.1.1, the label is not coded in the SDH/SONET we saw in Section 7.1.1, the label is not coded in the SDH/SONET
overhead(s)of the signal. overhead of the signal.
Another way is to use the well defined and finite structure of the Another way is to use the welldefined and finite structure of the
SDH/SONET multiplexing tree to devise a clever signal numbering SDH/SONET multiplexing tree to devise a signal numbering scheme that
scheme that makes use of the multiplex as a naming tree, and assigns makes use of the multiplex as a naming tree, and assigns each
each multiplex entry a unique associated value. This allows the multiplex entry a unique associated value. This allows the unique
unequivocal identification of each multiplex entry (signal) in terms identification of each multiplex entry (signal) in terms of its type
of its type and position in the multiplex tree. By using this and position in the multiplex tree. By using this multiplex entry
multiplex entry value itself as the label, we automatically add value itself as the label, we automatically add SDH/SONET semantics
SDH/SONET semantics to the label! Thus, simply by examining the to the label! Thus, simply by examining the label, one can now
label, one can now directly deduce the signal that it represents, as directly deduce the signal that it represents, as well as its
well as its position in the SDH/SONET multiplex. We refer to this as position in the SDH/SONET multiplex. We refer to this as
multiplex-based labeling. This is the idea that was incorporated in multiplex-based labeling. This is the idea that was incorporated in
the GMPLS signaling specifications. the GMPLS signaling specifications [7].
In the following sections, we look at this label structure in more
detail.
7.2.1. SDH/SONET Multiplex Entry Name
We will use the SDH multiplex, defined in recommendation G.707
Figure 6-1, as the basic reference to identify signals. It defines a
tree, whose root is an STM-Nsignal, and whose leaves are the signals
that can be transported (hierarchically) within the STM-N. This tree
will be used as a naming tree to create unique multiplex entry
values as discussed in the previous subsection. This entry will
identify at the same time the type of signal and its position in the
multiplex. Figure 1 shows the SDH and SONET multiplexes.
The possible leaves of that tree are VC-4, VC-3, VC-2, VC-12 or VC-
11. According to the multiplex structure there is a maximum of 1 VC-
4, 3 VC-3s, 21 VC-2s, 63 VC-12s or 84 VC-11s in one STM-1. Of
course, different VCs may be combined according to the combination
rules of the SDH multiplex.
A maximum of 172 (1+3+21+63+84) different signals, therefore, may be
identified in one STM-1. Although some of them use the same
physical space, and are therefore incompatible, for simplicity we
will give a unique name to each of them. For that purpose we extend
the well-known (K, L, M) numbering scheme defined in G.707 section
7.3..N STM-1 signals may be interleaved together to form an STM-
Nsignal. It results that we must identify the STM-1 that is itself
decomposed in sub-signals. We discuss concatenation in Section 4.3.
Bernstein, Mannie, Sharma Expires May 2001 25
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
This method is directly applicable to SONET as shown in Fig. 1,
since the SONET multiplex can be seen as a sub-tree of the SDH
multiplex tree.
7.2.2. SDH/SONET Multiplex Entry Notation
We propose the - following hierarchical multiplex entry notation:
(S, U, K, L, M) or S.U.K.L.M (in dot notation), where
S: 1 -> N : indicates a specific STM-1/STS-1 inside an STM-N/STS-
N multiplex.
U: 0 -> 4 : index of an SDH Administrative Unit (AU-4 or AU-3).
K: 0 -> 4 : index indicating the content of a VC-4.
L: 0 -> 8 : index indicating the content of a TUG-3, VC-3 or STS-
1 SPE.
M: 0 -> 10 : index indicating the content of a TUG-2 or VT Group.
Each letter indicates a possible branch number starting at the
parent node in the naming tree. Branches are numbered in the
increasing order, starting from the top of the naming tree. The
numbering starts at 1, and zero is used to indicate a non-
significant field.
S is the index of a particular STM-1/STS-1. S=1->N indicates a
specific STM-1/STS-1 inside an STM-N/STS-N multiplex. For example,
S=1 indicates the first STM-1/STS-1, and S=N indicates the last STM-
1/STS-1 of this multiplex.
U is only significant for SDH and must be ignored for SONET. It
indicates a specific VC inside a given STM-1. U=1 indicates a single
VC-4, while U=2->4 indicates a specific VC-3 inside the given STM-1.
K is only significant for SDH and must be ignored for SONET. It
indicates a specific branch of a VC-4. K=1 indicates that the VC-4
is not further sub-divided and contains a C-4. K=2->4 indicates a
specific TUG-3 inside the VC-4. K is not significant when the STM-1
is divided into VC-3s (and is easy to read and test).
L indicates a specific branch of a TUG-3, VC-3 or STS-1 SPE. It is
not significant for an unstructured VC-4. L=1 indicates that the
TUG-3/VC-3/STS-1 SPE is not further sub-divided and contains a VC-
3/C-3 in SDH or the equivalent in SONET. L=2->8 indicates a specific
TUG-2/VT Group inside the corresponding higher order signal.
M indicates a specific branch of a TUG-2/VT Group. It is not
significant for an unstructured VC-4, TUG-3, VC-3 or STS-1 SPE. M=1
indicates that the TUG-2/VT Group is not further sub-divided and
contains a VC-2/VT-6. M=2->3 indicates a specific VT-3 inside the
corresponding VT Group, these values MUST NOT be used for SDH since
Bernstein, Mannie, Sharma Expires May 2001 26
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
there is no equivalent of VT-3 with SDH. M=4->6 indicates a specific
VC-12/VT-2 inside the corresponding TUG-2/VT Group. M=7->10
indicates a specific VC-11/VT-1.5 inside the corresponding TUG-2/VT
Group. Note that M=0 denotes an unstructured VC-4, VC-3 or STS-1 SPE
(easy for debugging).
SDH SONET
unstructured VC-4/VC-3 unstructured STS-1 SPE
VC-2 VT-6
1st VT-3
2nd VT-3
1st VC-12 1st VT-2
2nd VC-12 2nd VT-2
3rd VC-12 3rd VT-2
1st VC-11 1st VT-1.5
2nd VC-11 2nd VT-1.5
3rd VC-11 3rd VT-1.5
4th VC-11 4th VT-1.5
Table 7. Encoding of the M field in the SDH/SONET multiplex entry.
This may be illustrated with the following examples.
Example 1: S>0, U=1, K=1, L=0, M=0
Denotes the unstructured VC-4 of the Sth STM-1.
Example 2: S>0, U=1, K>1, L=1, M=0
Denotes the unstructured VC-3 of the Kth-1 TUG-3 of the Sth STM-1.
Example 3: S>0, U=0, K=0, L=0, M=0
Denotes the unstructured STS-1 SPE of the Sth STS-1.
Example 4: S>0, U=0, K=0, L>1, M=1
Denotes the VT-6 in the Lth-1 VT Group in the Sth STS-1.
Example 5: S>0, U=0, K=0, L>1, M=9
Denotes the 3rd VT-1.5 in the Lth-1 VT Group in the Sth STS-1.
7.2.3. SDH/SONET Multiplex Entry Encoding:
A multiplex entry name may be used directly as a label, or may be
used in an information element of a signaling protocol to associate
a label with the corresponding multiplex entry (signal). In both
cases, a multiplex entry can be coded as described in Figure 3 .This
coding has also been proposed for the SDH/SONET labels in GMPLS.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Bernstein, Mannie, Sharma Expires May 2001 27
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
| S | U | K | L | M |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The current SDH standards only allow N to take the discrete values
0, 1, 4, 16 or 64. Today, in practice all of them are used: STM-0
(51.840 Mb/s), STM-1 (155.52 Mb/s), STM-4 (622.08 Mb/s), STM-16
(2488.32 Mb/s) and STM-64 (9953.26 Mb/s). In the future, it is
likely that N will grow up to 256 or 1024. This fixes the number of
possible different multiplex entry names to 1024 x 172 = 176128.
Note that an SDH LSR does not need to maintain a table of this
size, it just needs to maintain a list of multiplex entries that it
has allocated at any given time.
7.2.4. Hierarchical Label Allocation:
At any particular point in time, a given position in the SDH/SONET
multiplex may either be a valid position or not, according to the
signals already allocated, and if valid, may either be used or be
free. Thus, a multiplex entry (time-slot) must be interpreted in
relation tothe already allocated multiplex entries (time-slots).
The fact that two neighboring SDH/SONET LSRs allocate a label for a
particular LSP implies that the corresponding time-slot will be
enabled in the multiplex between the two LSRs. When an SDH/SONET LSP
is removed, the corresponding local label is released, and the
corresponding multiplex space may be re-used. An MPLS conservative
label retention mode must be implemented when using multiplex based
labeling.
For instance, for a downstream-on-demand label allocation, the
upstream LSR must indicate the type of signal it wants to forward.
The downstream SDH-LSR must check if such a signal is available in
its multiplex, and, if it is available, return the corresponding
label. With multiplex-based labeling, the upstream SDH/SONET LSR
can easily verify if the right type of signal was allocated by the
downstream SDH/SONET LSR , just by looking at the label.
In this case, the downstream SDH-LSR is applying a straightforward
SDH/SONET call admission control (CAC) function based on the space
available in the multiplex. Note that the two SDH/SONET LSRs should
have identical multiplex tables, so that even before requesting a
label, the upstream SDH/SONET LSR could even check its own multiplex
table for that particular interface, to see if space is available
for that signal.
The two neighboring SDH/SONET LSRs could also have a mechanism to
periodically check if their multiplex tables are identical, i.e.
fully synchronized. This can be achieved through the MPLS signaling
simply by exchanging the complete multiplex tables or the list of
currently allocated signals (labels). If the neighboring SDH-LSRs
discover that their multiplex tables are not identical, a fault
should immediately be triggered to alert a NMS
Bernstein, Mannie, Sharma Expires May 2001 28
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
Note that since an SDH-LSR may have a neighbor relationship at
different levels of the SDH/SONET hierarchy, the multiplex table
that is common between two neighboring SDH/SONET LSRs should be
understood in the context of that relationship. That is,
neighboring SDH-LSRs should compare only the list of LSPs that they
negotiated as peers at a particular level of the hierarchy
For instance, in Figure 3 (please refer to pdf document; available
from authors), SDH/SONET LSR2 and SDH/SONET LSR3 may have an
unstructured VC-4 established between them, while SDH/SONET LSRs 1
and 4 may have a VC-12 established within that VC-4. If LSR2 and
LSR21 compare their multiplex tables, LSR2 must ensure that is sends
just the view that LSR21 has of the multiplex. For example, LSR21
knows nothing about the contents of the VC-4, and so should not be
sent information about it.
7.3. Signaling Elements 7.3. Signaling Elements
In the preceding sections, we defined the meaning of a SDH/SONET In the preceding sections, we defined the meaning of a SDH/SONET
label and specified its structure. A question that arises naturally label and specified its structure. A question that arises naturally
at this point is the following. In an LSP or connection setup at this point is the following. In an LSP or connection setup
request, how do we specify the signal for which we want to establish request, how do we specify the signal for which we want to establish
a path (and for which we desire a label)? a path (and for which we desire a label)?
Clearly, information that is required to completely specify the Clearly, information that is required to completely specify the
desired signal and its characteristics must be transferred via the desired signal and its characteristics must be transferred via the
label distribution protocol, so that the switches along the path can label distribution protocol, so that the switches along the path can
be configured to correctly handle and switch the signal. As we be configured to correctly handle and switch the signal. This
explain ahead, this information is specified in three parts, each of information is specified in three parts, each of which refers to a
which refers to a different network layer. The first specifies the different network layer.
nature/type of the LSP or the desired SDH/SONET channel, in terms of
the particular signal (or collection of signals) within the
SDH/SONET multiplex that the LSP represents, and is used by all the
nodes along the path of the LSP. The second specifies the payload
carried by the LSP or SDH/SONET channel, in terms of the termination
and adaptation functions required at the end points, and is used by
the source and destination nodes of the LSP. The third specifies
certain link selection constraints, which control, at each hop, the
selection of the underlying link that is used to transport this LSP.
In the following subsections, we discuss each of these in more
detail.
7.3.1. Nature of the LSP: LSP Encoding Type, Signal Type, and
Connection Bundling
The nature of the SDH/SONET signal is specified collectively by the
LSP encoding type and signal type fields, which identify (via
appropriate rules) the specific connection point types on a
particular interface/port that may be used to switch this signal or
LSP. Another element specifying the nature of the desired LSP is the
Bernstein, Mannie, Sharma Expires May 2001 29
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
extent, if any, of connection grouping, which is specified by a
combination of two fields that denote respectively, the type of
grouping requested by the LSP and the number of components in that
grouping.
Recall that in TDM networks, the link connection points (or the
type of signals within a SDH/SONET multiplex that the link can
switch) provided by a link are limited to a fixed, discrete set.
Thus, the link connection points that are suitable for carrying a
given LSP are limited to those that match the LSP type and the
signal type, or to which the LSP type and signal type can be readily
adapted (by mapping to a container).
7.3.1.1. LSP Encoding Type and Signal Type
In particular, the LSP encoding type indicates the technology of the
LSP being requested, and includes, for example, ANSI PDH, ETSI PDH,
SDH, and SONET. The signal type field indicates the specific signal
type of the LSP being requested, and is interpreted in the context
of the technology specified in the LSP encoding type. Thus, the
signal type provides transit switches with information required to
determine the connection point types (timeslots/labels) that can
suppor t this LSP. As an example, the permitted LSP encoding types
with their permitted signal types for SDH are shown in Table 8. A
detailed discussion of the encoding types appears in [7].
LSP Encoding Type Signal Type
SDH
1 VC-11
2 VC-12
3 VC-2
4 TUG-2
5 VC-3
6 TUG-3
7 VC-4
8 STM-1
9 STM-1 MS
10 STM-1 RS
12 STM-4
13 STM-4 MS
14 STM-4 RS
16 STM-16
17 STM-16 MS
18 STM-16 RS
20 STM-64
21 STM-64 MS
22 STM-64 RS
24 STM-256
25 STM-256 MS
26 STM-256 RS
Bernstein, Mannie, Sharma Expires May 2001 30
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
Table 8 Permitted LSP encoding types and their corresponding signal
types for SDH.
By way of example, a DS3 LSP can be supported by link connections of
type DS3, or by link connections of type STS-1, if a DS3/STS-1
adaptation function is available at the source (and a corresponding
one is available at the destination of the DS3 LSP). A DS3 LSP
cannot, for instance, be routed on link connections of type VT1.5,
no matter how many are available, since the associated links do not
have the capability to switch DS3 signals. Therefore the LSP
encoding type and signal type are fundamental in indicating the
nature of the LSP requested, and in enabling the determination of
which available link connections may carry the signal.
7.3.1.2. Connection Bundling
Since a number of non concatenated STS-1s may be routed together as
a group (that is, all contained within the same SONET line or WDM
signal) and receive essentially the same delay and propagation, they
are specified by a requested grouping type (RGT) field in GMPLS.
This denotes how many connections of a given signal type are
requested together, which ensures that they meet similar routing
constraints. Since the specific group routing constraints depend on
technology, this parameter also is interpreted in the context of the
LSP encoding type. The values for SONET/SDH are no grouping, virtual
concatenation, and continuous arbitrary concatenation (or flexible
concatenation), and continuous standard concatenation, as explained
in Section 3.1.2. For virtual concatenation, all components in the
group must be routed via the same higher order container. For
contiguous standard concatenation, there must be a standard number
of components (3, 12, 48, etc.), and they must be in one higher
order container. For contiguous arbitrary concatenation, the number
of components is arbitrary (2, 3, 4, ą) and they still must be
routed in one higher order container.
Such concatenation simplifies connection establishment (especially
for batches of DS-3s that are being wholesaled) and speeds re-
routes. Since bundling may be important when establishing STS-1s
that will be used between end-systems implementing virtual
concatenation, it is recommended that the labels chosen for SONET
paths be capable of incorporating the concept of STS-1 bundling. The
bundling of larger signals, i.e., groups of STS-Mc, is for further
study.
Finally, there is also a field that indicates the requested number
of components (RNT), that is, the number of identical signal types
that are requested to be grouped into an LSP, as specified in the
RGT field. All components are assumed to have identical
characteristics, of course, and the field is set to zero when no
grouping is requested.
7.3.2 Payload Type
Bernstein, Mannie, Sharma Expires May 2001 31
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
As discussed earlier, the label request must also carry an
identifier of the payload that is carried by the LSP. The payload
identifies the client layer of that LSP, is interpreted in the
context of the LSP encoding type, and is used by the end-points of
the LSP. As an example, Table 9 depicts a suggested organization of
the generalized payload identifier (GPID) values for SDH and SONET..
LSP Encoding Type Payload/Client Type
SDH Unknown
Asynchronous mapping of E4
Asynchronous mapping of DS3
Asynchronous mapping of E3
Bit synchronous mapping of E3
Byte synchronous mapping of E3
Asynchronous mapping of DS2
Bit synchronous mapping of DS2
Byte synchronous mapping of DS2
Asynchronous mapping of E1
Byte synchronous mapping of E1
Byte synchronous mapping of 31 *
DS0
Asynchronous mapping of DS1
Bit synchronous mapping of DS1
Byte synchronous mapping of DS1
ATM mapping
SONET Unknown
DS1 SF Asynchronous
DS1 ESF Asynchronous
DS3 M23 Asynchronous
DS3 C-Bit Parity Asynchronous
VT
STS
ATM
POS
Table 9. The payload type indicator in the context of the LSP
encoding type for SDH/SONET.
A value of "unknown" indicates that the payload carried by the LSP
is either unknown or not relevant to know for the end points of the
current LSP.
7.3.3. Link Protection Type
The link protection type carried in the label request indicates the
level of protection that an LSP desires on the links at each hop
along its path. In other words, the link protection is local to the
interface between two adjacent nodes, and controls how the
underlying link at a particular hop is protected. It is, therefore,
distinct from MPLS-level protection (see [12]), which involves
Bernstein, Mannie, Sharma Expires May 2001 32
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
protection of the actual LSP (which may be done either end-to-end,
via path-based protection, or locally, via bypass tunnels).
The link protection may be represented as a vector of flags, where
one or more protection levels may be turned on simultaneously. A
value of 0 implies that this connection does not care about which,
if any, link protection is used. More than one bit may be set to
indicate when multiple protection types are acceptable. When
multiple bits are set and multiple protection types are available,
the choice of protection type is a local (policy) decision. The
following flags are defined:
Extra Traffic
Indicates that links that are reserved for automatic recovery in
case of a fault elsewhere in the network may be used for this LSP.
Observe that this means that the LSP can be disrupted whenever such
a link is needed for its assigned recovery purpose. In other words,
the LSP can be dropped even if there is not fault on the links along
which this LSP is routed.
Unprotected
"Unprotected" indicates that unprotected links may be used by this
LSP. This means that the LSP will only lose service on this hop, if
there is a fault along this particular link (a fault elsewhere will
not affect this link and therefore this LSP). In other words,
"unprotected" can be regarded as a "neutral" form of protection. The
LSP does not lose service as long as the link is up, but loses
service once this link goes down, since the link itself is not
protected by a backup link.
Shared
Indicates that protected (working) links whose protection resources
are shared with some number, say N, of other working links may be
used by this LSP.
This means that if there is a fault along this particular link, the
LSP will lose service on this hop, only if the backup link is
already in use by traffic from one of the remaining N-1 working
links (due to an earlier fault on one of those links). Thus, the
"shared" option can be regarded as a better form of protection,
since the LSP is protected as long as there is no fault on any of
the remaining N-1 working links that share the same backup link.
Dedicated
Indicates that links with dedicated protection, e.g., 1:1 or 1+1
protection, may be used by this LSP.
This means that a protection link is reserved for the working link
over which this LSP is routed, so that this LSP is always protected
against any fault on its working link. Thus, the "dedicated" option
offers a higher form of link-level protection.
Enhanced
Bernstein, Mannie, Sharma Expires May 2001 33
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000
Indicates that links that are multiply protected, such as via a ring
switch and a span switch in a 4-fiber BLSR/MS-SPRING.
Thus, the LPFs represent both a property of a link (which needs to
be appropriately advertised in routing), as well as a constraint on
which links may be used for a given path (which is signaled during
connection setup as specified above).
8. Choices for Control Channel Implementation
One question that we have not yet addressed is how the so-called
MPLS "control channel" is implemented?
It turns out that there are several implementation choices for the
control channel. One way is to use out-of-band (OOB) signaling. An
OOB control channel that has been implemented using a dedicated
wavelength works as follows.
The incoming signal on a fiber is first demultiplexed into the data
bearing wavelengths and the control bearing wavelength. While the
data wavelengths are switched by the cross-connect, the control
wavelength is passed to a control element, where it undergoes O/E
conversion to produce a digital bit stream. This bit stream is
interpreted and processed by the MPLS signaling/control element, and
the resulting control bits are converted via E/O conversion, back
into a optical signal that is multiplexed onto the outgoing fiber.
An alternative implementation is to use a dedicated network (such as
an IP network) as a control network connecting the controllers on
the optical elements.
An alternative to OOB signaling is to implement the control channel
using in-band signaling. Again, there are several ways to accomplish
this:
The first is to use a portion of a wavelength to carry control
information, which is useful when the number of wavlengths is
limited and it is not possible to dedicate an entire wavelength for
carrying control information. Essentially, the incoming signal is
demultiplexed into the data channels, which are switched by the
cross-connect, and the control bearing wavelength, which undergoes
O/E conversion to produce a data stream and control information. The
data stream is switched electronically while the control information
is interpreted and processed by the MPLS signaling/control element.
The resulting control bits and the data stream are both converted
back, via E/O conversion, into a optical signal that is multiplexed
onto the outgoing fiber.
A second option is to use sub-carrier modulation, modulating the
data carrying wavelength with an additional sub-carrier that carries
control information. This sub-carrier signal is split from the data
carrying wavelength, and processed (after O/E conversion) by the
MPLS signaling/control element, and then is used to re-modulate the
outgoing wavelength.
Bernstein, Mannie, Sharma Expires May 2001 34 The first specifies the nature/type of the LSP or the desired
SDH/SONET channel, in terms of the particular signal (or collection
of signals) within the SDH/SONET multiplex that the LSP represents,
and is used by all the nodes along the path of the LSP.
draft-bms-sdhsonet-mpls-control-frmwrk-00.txt November 2000 Bernstein, Mannie, Sharma Informational - January 2002 23
The second specifies the payload carried by the LSP or SDH/SONET
channel, in terms of the termination and adaptation functions
required at the end points, and is used by the source and
destination nodes of the LSP.
A third option is to use the overhead bytes in SONET frames or The third specifies certain link selection constraints, which
overhead bits in a digital wrapper. This requires, of course, that control, at each hop, the selection of the underlying link that is
all devices be O-E-O capable. used to transport this LSP.
9. Summary and Conclusions 8. Summary and Conclusions
In this paper, we gave a detailed account of the issues involved in We provided a detailed account of the issues involved in applying
applying MPLS-based control to TDM networks (a general overview of MPLS-based control to TDM networks.
these issues for applying GMPLS to optical networks appears in
[11]).
We began with a brief overview of MPLS and SDH/SONET networks, We began with a brief overview of MPLS and SDH/SONET networks,
discussing current circuit establishment in TDM networks, and discussing current circuit establishment in TDM networks, and
arguing why SDH/SONET technologies will not be "outdated" in the arguing why SDH/SONET technologies will not be "outdated" in the
forseable future. We then looked at MPLS applied to SDH/SONET foreseeable future. We then looked at MPLS applied to SDH/SONET
networks, where we consider why such an application makes sense, and networks, where we considered why such an application makes sense,
reviewed some MPLS terminology as applied to TDM networks. We then and reviewed some MPLS terminology as applied to TDM networks. We
considered the two main areas of application of MPLS methods to TDM then considered the two main areas of application of MPLS methods to
networks, namely routing and signaling. We considered in detail the TDM networks, namely routing and signaling. We considered in detail
switching capabilities of TDM equipment, and the requirement to the switching capabilities of TDM equipment, and the requirement to
learn about the protection capabilities of underlying links, and at learn about the protection capabilities of underlying links, and how
how these influence the available capacity advertisement in TDM these influence the available capacity advertisement in TDM
networks. We focused briefly on path computation methods, pointing networks. We focused briefly on path computation methods, pointing
out that these were not subject to standardization. We then examined out that these were not subject to standardization. We then examined
optical path provisioning or signaling, considering the issue of optical path provisioning or signaling, considering the issue of
what constitutes an appropriate label for TDM circuits, how this what constitutes an appropriate label for TDM circuits, how this
label should be structured, and we focused on the importance of label should be structured, and we focused on the importance of
hierarchical label allocation in a TDM network. We then reviewed the hierarchical label allocation in a TDM network. We then reviewed the
signaling elements involved when setting up an optical TDM circuit, signaling elements involved when setting up an optical TDM circuit,
focusing on the nature of the LSP, the type of payload it carries, focusing on the nature of the LSP, the type of payload it carries,
and the characteristics of the links that the LSP wishes to use at and the characteristics of the links that the LSP wishes to use at
each hop along its path, for achieving a certain reliability. each hop along its path, for achieving a certain reliability.
We believe our work provides a comprehensive overview of the issues 9. Security Considerations
arising in the dynamic control of optical SDH/SONET networks, and
points to several issues that will certainly require more work and
industry consensus to realize interoperable implementations of a
dynamically controlled transport network.
10. Security Considerations
This draft raises no new security issues in the MPLS specifications. This draft raises no new security issues in the MPLS specifications.
11. References 10.References
[1] Bradner, S., "The Internet Standards Process -- Revision 3", [1] Bradner, S., "The Internet Standards Process -- Revision 3",
BCP 9, RFC 2026, October 1996. BCP 9, RFC 2026, October 1996.
[2] Bradner, S., "Key words for use in RFCs to Indicate Requirement [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997 Levels", BCP 14, RFC 2119, March 1997
[3] Synchronous Optical Network (SONET) Basic Description including Bernstein, Mannie, Sharma Informational - January 2002 24
Multiplex Structure, Rates, and Formats, ANSI T1.105-1995.
[4] G.707, Network Node Interface for the Synchronous Digital Hierarchy [3] Synchronous Optical Network (SONET) Basic Description including
(SDH), International Telecommunication Union, 03/96. Multiplex Structure, Rates, and Formats, ANSI T1.105-1995.
[5] Synchronous Optical Network (SONET) Transport Systems: Common [4] G.707, Network Node Interface for the Synchronous Digital
Generic Criteria, Bellcore GR-253-CORE, Issue 2, December 1995. Hierarchy (SDH), International Telecommunication Union, 03/96.
Synchronous Optical Network (SONET) Transport Systems: Common Generic
Criteria, Bellcore GR-253-CORE, Issue 2, December 1995.
[6] Peter Ashwood-Smith and Lou Berger, Editors, "Generalized MPLS: [5] ANSI T1.105.01-1995, Synchronous Opical Network (SONET)
Signaling Functional Description," Internet Draft, Automatic Protection Switching, American National Standards
draft-ietf-mpls-generalized-signaling-01.txt, Work in Progress, institute.
November 2000. [6] G.841, Types and Characteristics of SDH Network Protection
Architectures, ITU-T, 07/95.
[7] Ben Mack-Crane, V. Sharma, Greg Bernstein, Eric Mannie, et al, [7] Peter Ashwood-Smith and Lou Berger, Editors, "Generalized MPLS:
Enhancements to GMPLS Signaling for Optical Technologies, Internet Signaling Functional Description," Internet Draft,draft-ietf-mpls-
Draft, Work in Progress, generalized-signaling-04.txt, Work in Progress, May 2001.
draft-mack-crane-gmpls-signaling-enhancements-00.txt, November 2000.
[8] E. Mannie, Greg Bernstein "Extensions to OSPF and IS-IS in support [8] E. Mannie, Editor, "GMPLS Extensions for SONET and SDH
of MPLS for SDH/SONET Control", Internet Draft, Work in Progress, Control", Internet Draft, draft-ietf-ccamp-gmpls-sonet-sdh-01.txt,
draft-mannie-mpls-sdh-ospf-isis-00.txt, July 2000. Work in Progress, June 2001.
[9] Greg Bernstein, "Some Comments on the Use of MPLS Traffic [9] E. Mannie, Greg Bernstein "Extensions to OSPF and IS-IS in
Engineering for SONET/SDH Path Establishment", Internet Draft, Work in support of MPLS for SDH/SONET Control", Internet Draft, Work in
Progress, draft-bernstein- mpls-sonet-00.txt, March 2000. Progress, draft-mannie-mpls-sdh-ospf-isis-00.txt, July 2000.
[10] E. Mannie, "MPLS for SDH Control", Internet Draft, Work in 11.Acknowledgments
Progress, draft-mannie-mpls-sdh- control-00.txt. March 2000.
[11] Greg Bernstein and Vishal Sharma, Some Comments on GMPLS and 12.Author's Addresses
Optical Technologies, Internet Draft, Work in Progress,
draft-bernstein-gmpls-optical-00.txt, November 2000.
[12] Vas Makam, V. Sharma, Ben Mack-Crane, et al, Framework for Greg Bernstein
MPLS-based Recovery, Internet Draft, Work in Progress, Ciena Corporation
draft-ietf-mpls-recovery-frmwrk-00.txt, September 2000. 10480 Ridgeview Court
Cupertino, CA 94014
Phone: +1 510 573-2237
E-mail: greg@ciena.com
Bernstein, Mannie, Sharma Expires May 2001 35 Eric Mannie
EBONE
Terhulpsesteenweg 6A
1560 Hoeilaart - Belgium
Phone: +32 2 658 56 52
Mobile: +32 496 58 56 52
Fax: +32 2 658 51 18
E-mail: eric.mannie@ebone.com
Bernstein, Mannie, Sharma Informational - January 2002 25
Vishal Sharma
Metanoia, Inc.
335 Elan Village Lane, Unit 203
San Jose, CA 95134
Phone: +1 408 943 1794
Email: v.sharma@ieee.org
Bernstein, Mannie, Sharma Informational - January 2002 26
Full Copyright Statement
"Copyright (C) The Internet Society (date). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implmentation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph
are included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into
Bernstein, Mannie, Sharma Informational - January 2002 27
Bernstein, Mannie, Sharma Informational - January 2002 28
 End of changes. 206 change blocks. 
1457 lines changed or deleted 733 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/