< draft-owens-te-network-survivability-02.txt   draft-owens-te-network-survivability-03.txt >
Traffic Engineering Working Group Ken Owens (Erlang Technology) Traffic Engineering Working Group Ken Owens (Erlang Technology)
Internet Draft Vishal Sharma (Metanoia, Inc.) Internet Draft Vishal Sharma (Metanoia, Inc.)
Expiration Date: November 2002 Mathew Oommen (Optical Datacom) Expiration Date: November 2002 Mathew Oommen (Optical Datacom)
Fiffi Hellstrand (Nortel)
May 2002 May 2002
Network Survivability Considerations for Traffic Engineered IP Networks Network Survivability Considerations for Traffic Engineered IP Networks
draft-owens-te-network-survivability-02.txt draft-owens-te-network-survivability-03.txt
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with all This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026. provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Task Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups. Note that other groups Force (IETF), its areas, and its working groups. Note that other groups
may also distribute working documents as Internet-Drafts. may also distribute working documents as Internet-Drafts.
skipping to change at line 48 skipping to change at line 49
services. With the increasing sophistication of network technologies, services. With the increasing sophistication of network technologies,
survivability capabilities are becoming available at multiple layers, survivability capabilities are becoming available at multiple layers,
allowing for protection and restoration to occur at any layer of the allowing for protection and restoration to occur at any layer of the
network. This makes it important to: scrutinize the recovery features network. This makes it important to: scrutinize the recovery features
of different network layers, understand the pros and cons of performing of different network layers, understand the pros and cons of performing
recovery at each layer, and assess how the interactions between layers recovery at each layer, and assess how the interactions between layers
impact network survivability. With these objectives in mind, this draft impact network survivability. With these objectives in mind, this draft
examines the considerations for network survivability at different examines the considerations for network survivability at different
layers of the network. layers of the network.
Owens/Sharma/Oommen Expires November 2002 1 Owens et al Expires November 2002 1
Table of Contents Page Table of Contents Page
Abstract Abstract
1. Introduction 2 1. Introduction 2
2. Overview of Survivability in Traffic Engineered Networks 3 2. Overview of Survivability in Traffic Engineered Networks 3
3. Purpose of This Document 5 3. Purpose of This Document 5
4. Motivation 5 4. Motivation 5
5. Network Survivability Objectives 6 5. Network Survivability Objectives 6
6. Network Survivability Parameter Considerations 7 6. Network Survivability Parameter Considerations 7
6.1 Time-scale of Operations 8 6.1 Time-scale of Operations 8
skipping to change at line 96 skipping to change at line 97
multiple layers. multiple layers.
At the lowest layer of the stack, optical networks are now becoming At the lowest layer of the stack, optical networks are now becoming
capable of providing dynamic ring and mesh restoration functionality as capable of providing dynamic ring and mesh restoration functionality as
well as traditional 1+1 or 1:1 protection functionality. A considerable well as traditional 1+1 or 1:1 protection functionality. A considerable
body of work in the research community has dealt with the capacity and body of work in the research community has dealt with the capacity and
efficiency considerations inherent in the layout of optical lightpaths efficiency considerations inherent in the layout of optical lightpaths
for traffic protection, and work is ongoing [2],[3],[4],[5], [7] to for traffic protection, and work is ongoing [2],[3],[4],[5], [7] to
develop a signaling framework to support even more sophisticated develop a signaling framework to support even more sophisticated
Owens/Sharma/Oommen Expires November 2002 2 Owens et al Expires November 2002 2
restoration features at the optical layer for future IP-over-WDM restoration features at the optical layer for future IP-over-WDM
networks. Moving up the layered stack, the SONET/SDH layer provides networks. Moving up the layered stack, the SONET/SDH layer provides
survivability capability with automatic protection switching (APS), as survivability capability with automatic protection switching (APS), as
well as self-healing ring and mesh architectures. A similar well as self-healing ring and mesh architectures. A similar
functionality is provided by the ATM Layer, with work ongoing to also functionality is provided by the ATM Layer, with work ongoing to also
provide such functionality using technologies such as MPLS [8]. At the provide such functionality using technologies such as MPLS [8]. At the
IP layer, rerouting is used to restore service continuity following IP layer, rerouting is used to restore service continuity following
link and node outages. Rerouting at the IP layer, however, occurs after link and node outages. Rerouting at the IP layer, however, occurs after
a period of routing convergence, which may require from a few seconds a period of routing convergence, which may require from a few seconds
to several minutes to complete. to several minutes to complete.
skipping to change at line 146 skipping to change at line 147
milliseconds. milliseconds.
With the increasing need for explicit engineering of network traffic With the increasing need for explicit engineering of network traffic
loads, however, it has become imperative for traffic engineering loads, however, it has become imperative for traffic engineering
mechanisms to take network survivability considerations into account. mechanisms to take network survivability considerations into account.
An important objective of contemporary and future Internet traffic An important objective of contemporary and future Internet traffic
engineering, in fact, is to facilitate reliable network operations by engineering, in fact, is to facilitate reliable network operations by
providing mechanisms that enhance network integrity and by adopting providing mechanisms that enhance network integrity and by adopting
policies that accommodate network survivability [1]. This is important policies that accommodate network survivability [1]. This is important
Owens/Sharma/Oommen Expires November 2002 3 Owens et al Expires November 2002 3
for two reasons. First, to minimize the vulnerability of the network for two reasons. First, to minimize the vulnerability of the network
to service outages arising from errors, faults, and failures that occur to service outages arising from errors, faults, and failures that occur
within the infrastructure. Second, to optimize the performance of within the infrastructure. Second, to optimize the performance of
operational IP networks by rapidly converging to a stable state while operational IP networks by rapidly converging to a stable state while
not even letting TCP stacks know about the failure. not even letting TCP stacks know about the failure.
Network faults, be they link outages (fiber cuts, transmitter failures, Network faults, be they link outages (fiber cuts, transmitter failures,
etc.) or node outages (mis-configuration, processor or line card etc.) or node outages (mis-configuration, processor or line card
failures, power glitches, power supply failures, etc.), will continue failures, power glitches, power supply failures, etc.), will continue
to be a fact of life that network engineering will have to accommodate. to be a fact of life that network engineering will have to accommodate.
skipping to change at line 196 skipping to change at line 197
(i) The most important is its ability to ensure stable network (i) The most important is its ability to ensure stable network
operation, which is a major consideration in real-time network operation, which is a major consideration in real-time network
performance optimization. A major challenge for Internet traffic performance optimization. A major challenge for Internet traffic
engineering today is to ôexpect the unexpected.ö In other words, engineering today is to ôexpect the unexpected.ö In other words,
integrate automated control capabilities that can adapt quickly and at integrate automated control capabilities that can adapt quickly and at
a reasonable cost to significant changes in network state, while a reasonable cost to significant changes in network state, while
maintaining network stability [1]. Clearly, this challenge cannot be maintaining network stability [1]. Clearly, this challenge cannot be
met without accounting for potential network outages, and including met without accounting for potential network outages, and including
them in - traffic engineering calculations. them in - traffic engineering calculations.
Owens/Sharma/Oommen Expires November 2002 4 Owens et al Expires November 2002 4
(ii) Survivability considerations also impact the manner in which (ii) Survivability considerations also impact the manner in which
traffic is groomed at different layers (more on this in Sections 5 and traffic is groomed at different layers (more on this in Sections 5 and
6), and the manner in which it is mapped to the underlying physical or 6), and the manner in which it is mapped to the underlying physical or
logical topology at different layers of the network. An important logical topology at different layers of the network. An important
function of TE is to control the distribution of traffic across the function of TE is to control the distribution of traffic across the
network, a task that is strongly influenced by the manner in which network, a task that is strongly influenced by the manner in which
traffic is protected at different layers, and by how much traffic is traffic is protected at different layers, and by how much traffic is
protected at different network layers. An objective could be to provide protected at different network layers. An objective could be to provide
adequate protection schemes at layer 0 that can classify and treat adequate protection schemes at layer 0 that can classify and treat
different traffic types, and dynamically assign the traffic to a different traffic types, and dynamically assign the traffic to a
skipping to change at line 244 skipping to change at line 245
facilitate fast and efficient network protection. The document is facilitate fast and efficient network protection. The document is
intended to expose those areas pertaining to network survivability that intended to expose those areas pertaining to network survivability that
require further work by the Internet community, and to serve as a basis require further work by the Internet community, and to serve as a basis
for the Traffic Engineering Working Group design team to make for the Traffic Engineering Working Group design team to make
recommendations to other Working Groups about network survivability recommendations to other Working Groups about network survivability
issues that require further consideration in the respective Working issues that require further consideration in the respective Working
Groups. Groups.
4.Motivation 4.Motivation
Owens/Sharma/Oommen Expires November 2002 5 Owens et al Expires November 2002 5
The need for network survivability and for open standards in The need for network survivability and for open standards in
protection/restoration at different network layers arises because of protection/restoration at different network layers arises because of
the following: the following:
-- Lower layer mechanisms (Optical Layer and SONET/SDH Layer) have no -- Lower layer mechanisms (Optical Layer and SONET/SDH Layer) have no
visibility into higher layer operations (for example protocol errors, visibility into higher layer operations (for example protocol errors,
priority identification, and reroute calculation). Thus, while they priority identification, and reroute calculation). Thus, while they
may provide link protection for example, they cannot easily provide may provide link protection for example, they cannot easily provide
node protection unless these optical devices speak the same ôlanguageö. node protection unless these optical devices speak the same ôlanguageö.
skipping to change at line 293 skipping to change at line 294
-- Maximize network reliability and availability. -- Maximize network reliability and availability.
-- Facilitate fast recovery times where appropriate. -- Facilitate fast recovery times where appropriate.
-- Take into consideration the recovery actions of different layers. -- Take into consideration the recovery actions of different layers.
For instance, if lower layer mechanisms are utilized in conjunction For instance, if lower layer mechanisms are utilized in conjunction
with higher layer survivability mechanisms, the lower layers should with higher layer survivability mechanisms, the lower layers should
have an opportunity to restore traffic before the higher layers do. If have an opportunity to restore traffic before the higher layers do. If
lower layer restoration is slower than higher layer restoration, the lower layer restoration is slower than higher layer restoration, the
lower layer may communicate failure information to the higher layer(s), lower layer may communicate failure information to the higher layer(s),
Owens/Sharma/Oommen Expires November 2002 6 Owens et al Expires November 2002 6
and allow it to perform recovery. The coordination functionality and allow it to perform recovery. The coordination functionality
between layers must be tunable. between layers must be tunable.
-- Avoid network layering violations. That is, defects at higher -- Avoid network layering violations. That is, defects at higher
layer(s) should not normally trigger recovery actions at lower layers. layer(s) should not normally trigger recovery actions at lower layers.
-- Minimize the loss of data and packet reordering during recovery -- Minimize the loss of data and packet reordering during recovery
operations. operations.
-- Minimize the additive latency that may be incurred when recovery is -- Minimize the additive latency that may be incurred when recovery is
activated. activated.
-- Minimize the state overhead of maintaining recovery information -- Minimize the state overhead of maintaining recovery information
(such as additional paths, the association between traffic streams and (such as additional paths, the association between traffic streams and
skipping to change at line 343 skipping to change at line 344
5.3. Survivability Techniques 5.3. Survivability Techniques
Network survivability techniques SHOULD: Network survivability techniques SHOULD:
-- Be specifiable for dedicated or shared protection of working -- Be specifiable for dedicated or shared protection of working
traffic. traffic.
-- Be specifiable on an end-to-end basis or on a segment basis. (For -- Be specifiable on an end-to-end basis or on a segment basis. (For
example, at the ATM , MPLS, or IP layer survivability should be example, at the ATM , MPLS, or IP layer survivability should be
specifiable for an end-to-end path or for a segment of a path.) specifiable for an end-to-end path or for a segment of a path.)
Owens/Sharma/Oommen Expires November 2002 7 Owens et al Expires November 2002 7
-- Be specifiable for protection of traffic at different granularities -- Be specifiable for protection of traffic at different granularities
(for example, temporal, bandwidth, and QoS granularities; more on this (for example, temporal, bandwidth, and QoS granularities; more on this
in Section 6). in Section 6).
-- Be specifiable for protection of traffic having different -- Be specifiable for protection of traffic having different
transmission and/or preemption priorities. transmission and/or preemption priorities.
-- Be able to fallback on different protection schemes, should the -- Be able to fallback on different protection schemes, should the
primary scheme be unavailable. primary scheme be unavailable.
-- Be able to maintain BGP state (where appropriate), if at all -- Be able to maintain BGP state (where appropriate), if at all
possible. possible.
-- Not allow the provisioning of additional traffic if the -- Not allow the provisioning of additional traffic if the
skipping to change at line 391 skipping to change at line 392
In order to perform end-to-end and segment recovery operations, there In order to perform end-to-end and segment recovery operations, there
has to exist a signaling mechanism to notify the network recovery has to exist a signaling mechanism to notify the network recovery
operation. Some layers have this capability inherently (for example IP operation. Some layers have this capability inherently (for example IP
Layer), others (for example optical layer) -may not. (Although recently Layer), others (for example optical layer) -may not. (Although recently
there have been proposals that integrate the optical layer with Layer 3 there have been proposals that integrate the optical layer with Layer 3
routing and that allow, for example, BGP updates to be triggered upon routing and that allow, for example, BGP updates to be triggered upon
the detection of a fault at the optical layer.) The signaling the detection of a fault at the optical layer.) The signaling
mechanisms initiate the recovery operations and must be considered when mechanisms initiate the recovery operations and must be considered when
choosing the network survivability mechanism. choosing the network survivability mechanism.
Owens/Sharma/Oommen Expires November 2002 8 Owens et al Expires November 2002 8
6.4. Recovery Granularity 6.4. Recovery Granularity
The recovery granularity of the different layer recovery operations The recovery granularity of the different layer recovery operations
should be a key requirement in network survivability. In a generic should be a key requirement in network survivability. In a generic
sense, the higher the layer, the finer the granularity. The Optical and sense, the higher the layer, the finer the granularity. The Optical and
SONET Layers can only recover full pipes (i.e. OC48 Granularity), SONET Layers can only recover full pipes (i.e. OC48 Granularity),
whereas IP Layers can recover individual packets or groups of packets. whereas IP Layers can recover individual packets or groups of packets.
The recovery granularity must be considered when choosing the network The recovery granularity must be considered when choosing the network
survivability mechanism. It is conceivable that the more granularity at survivability mechanism. It is conceivable that the more granularity at
the optical layer the better it may be for recovery. However, the the optical layer the better it may be for recovery. However, the
skipping to change at line 438 skipping to change at line 439
considered when choosing the network survivability mechanism. considered when choosing the network survivability mechanism.
6.7. Fault Monitoring/Reporting 6.7. Fault Monitoring/Reporting
The key aspect of recovery operations is the ability to detect faults. The key aspect of recovery operations is the ability to detect faults.
It is important to understand the various faults that each layer can It is important to understand the various faults that each layer can
detect, the fault monitoring capabilities and the fault reporting detect, the fault monitoring capabilities and the fault reporting
mechanism. The fault monitoring and reporting mechanisms must be mechanism. The fault monitoring and reporting mechanisms must be
considered when choosing the network survivability mechanism. The considered when choosing the network survivability mechanism. The
Owens/Sharma/Oommen Expires November 2002 9 Owens et al Expires November 2002 9
reports may include not only the failed/unplaced circuits, but also reports may include not only the failed/unplaced circuits, but also
information on circuits that were placed/routed but have violated their information on circuits that were placed/routed but have violated their
performance or QoS constraints. performance or QoS constraints.
6.8. Interlayer Considerations/Layer Interactions 6.8. Interlayer Considerations/Layer Interactions
As previously mentioned in the coverage considerations, there are many As previously mentioned in the coverage considerations, there are many
advantages to providing a recovery mechanism that interoperates across advantages to providing a recovery mechanism that interoperates across
one or more layers. Any such mechanism must not violate any one-layer one or more layers. Any such mechanism must not violate any one-layer
recovery operations or cause another layer to incorrectly recover due recovery operations or cause another layer to incorrectly recover due
skipping to change at line 488 skipping to change at line 489
a backup lightpath, if configured. a backup lightpath, if configured.
Large switching granularity: the optical layer has the capacity to Large switching granularity: the optical layer has the capacity to
restore very large numbers of higher layer flows. For example, hundreds restore very large numbers of higher layer flows. For example, hundreds
of LSPs or ATM VCs that would ordinarily be affected by a single link of LSPs or ATM VCs that would ordinarily be affected by a single link
failure (such as a fiber cut) could be restored simultaneously at the failure (such as a fiber cut) could be restored simultaneously at the
optical layer without the need to invoke higher layer signaling, which optical layer without the need to invoke higher layer signaling, which
can be computationally expensive and slow (since it may require can be computationally expensive and slow (since it may require
processing by intermediate nodes, and must invariably encounter processing by intermediate nodes, and must invariably encounter
propagation delay). propagation delay).
Owens/Sharma/Oommen Expires November 2002 10 Owens et al Expires November 2002 10
Some current limitations of the optical layer are: Some current limitations of the optical layer are:
Limited range of granularity: The optical layer can only restore the Limited range of granularity: The optical layer can only restore the
traffic at lightpath or sub-lightpath granularity, and is therefore traffic at lightpath or sub-lightpath granularity, and is therefore
suitable when all the data on a lightpath or sub-lightpath requires suitable when all the data on a lightpath or sub-lightpath requires
protection/restoration. It cannot restore individual circuits or paths. protection/restoration. It cannot restore individual circuits or paths.
No discrimination between different traffic types: The optical layer No discrimination between different traffic types: The optical layer
being bit-transparent is oblivious to actual traffic content on a being bit-transparent is oblivious to actual traffic content on a
lightpath and cannot, in general, differentiate between different lightpath and cannot, in general, differentiate between different
traffic types. We note that some discrimination may be possible based traffic types. We note that some discrimination may be possible based
purely on the physical and transmission properties of the lightpaths purely on the physical and transmission properties of the lightpaths
skipping to change at line 539 skipping to change at line 540
deployment of newer, bandwidth efficient protection options, such as deployment of newer, bandwidth efficient protection options, such as
shared mesh protection. shared mesh protection.
Another consideration for the optical layer is that it cannot, in Another consideration for the optical layer is that it cannot, in
general, detect faults in the router or switching node, and so may not general, detect faults in the router or switching node, and so may not
be able to provide true path protection at the LSP or ATM VC level, be able to provide true path protection at the LSP or ATM VC level,
since faults in the switching equipment would not be detected by the since faults in the switching equipment would not be detected by the
optical layer. It is conceivable, in this case, that the reverse of the optical layer. It is conceivable, in this case, that the reverse of the
process described above could be used. Namely, if there was process described above could be used. Namely, if there was
Owens/Sharma/Oommen Expires November 2002 11 Owens et al Expires November 2002 11
communication between the routing/switching equipment and the optical communication between the routing/switching equipment and the optical
equipment, the optical layer on learning of a router/switch failure (it equipment, the optical layer on learning of a router/switch failure (it
would still not detect faults at higher layers due to misconfiguration would still not detect faults at higher layers due to misconfiguration
of the switching equipment), could initiate protection at the optical of the switching equipment), could initiate protection at the optical
layer (by causing an deliberate loss of light condition). layer (by causing an deliberate loss of light condition).
Appropriate grooming of traffic on to a lightpath must be another Appropriate grooming of traffic on to a lightpath must be another
consideration at the optical layer that would impact traffic consideration at the optical layer that would impact traffic
engineering and network planning. The grooming algorithms, which engineering and network planning. The grooming algorithms, which
traditionally are geared to most efficiently pack higher layer traffic traditionally are geared to most efficiently pack higher layer traffic
skipping to change at line 587 skipping to change at line 588
Limited topological scope: SONET protection is largely limited to ring Limited topological scope: SONET protection is largely limited to ring
topologies, which reduces the flexibility to deploy somewhat more topologies, which reduces the flexibility to deploy somewhat more
complex, but potentially more efficient, mesh-based restoration complex, but potentially more efficient, mesh-based restoration
schemes. schemes.
Lack of traffic priority: As with the optical layer, the SONET layer Lack of traffic priority: As with the optical layer, the SONET layer
also cannot distinguish between different priorities of traffic. For also cannot distinguish between different priorities of traffic. For
example, it is not possible in SONET to switch EF (expedited example, it is not possible in SONET to switch EF (expedited
forwarding) and AF (assured forwarding) streams based on priority. forwarding) and AF (assured forwarding) streams based on priority.
Owens/Sharma/Oommen Expires November 2002 12 Owens et al Expires November 2002 12
(iv) Oblivious to higher layer failure: Like the optical layer, the (iv) Oblivious to higher layer failure: Like the optical layer, the
SONET layer too is oblivious to higher layer errors or faults. Thus, SONET layer too is oblivious to higher layer errors or faults. Thus,
SONET cannot detect ATM (or MPLS) layer errors. For instance, a SONET cannot detect ATM (or MPLS) layer errors. For instance, a
corruption of packets at the ATM layer will not be detected by SONET corruption of packets at the ATM layer will not be detected by SONET
processing. processing.
7.2.1 Considerations for the SONET Layer 7.2.1 Considerations for the SONET Layer
As with the optical layer, an important area of consideration at the As with the optical layer, an important area of consideration at the
SONET layer, from a TE perspective, is also one of traffic grooming. SONET layer, from a TE perspective, is also one of traffic grooming.
skipping to change at line 638 skipping to change at line 639
the router/switch resulting in corrupted ATM or MPLS control packets), the router/switch resulting in corrupted ATM or MPLS control packets),
which can be detected by the ATM or MPLS layer. The ATM layer can do so which can be detected by the ATM or MPLS layer. The ATM layer can do so
via the F1-F5 errors and via its peering capability, whereas the MPLS via the F1-F5 errors and via its peering capability, whereas the MPLS
layer may do so via an appropriately implemented liveness message (for layer may do so via an appropriately implemented liveness message (for
example, the LDP Liveness message). example, the LDP Liveness message).
Capability to detect misconfigurations: Both the ATM and MPLS layer can Capability to detect misconfigurations: Both the ATM and MPLS layer can
detect node or software misconfiguration by the counting of errored or detect node or software misconfiguration by the counting of errored or
corrupted packets, which may be identified by looking at the ATM header corrupted packets, which may be identified by looking at the ATM header
or MPLS label. In ATM, this may involve tracking VPI/VCI mismatches, or MPLS label. In ATM, this may involve tracking VPI/VCI mismatches,
Owens/Sharma/Oommen Expires November 2002 13 Owens et al Expires November 2002 13
while in MPLS this may be accomplished by counting TTL errors or label while in MPLS this may be accomplished by counting TTL errors or label
mismatches mismatches
Other advantages of the ATM layer are the existence of an in-band OAM Other advantages of the ATM layer are the existence of an in-band OAM
functionality that can help to detect path errors along a virtual functionality that can help to detect path errors along a virtual
circuit or virtual path, and also provides faster detection and circuit or virtual path, and also provides faster detection and
restoration than is possible by relying on routing protocols alone. restoration than is possible by relying on routing protocols alone.
Some of the current limitations of the MPLS layer are: Some of the current limitations of the MPLS layer are:
skipping to change at line 686 skipping to change at line 687
layers. layers.
7.4 IP Layer 7.4 IP Layer
The IP layer is central to the IP network infrastructure. Some of the The IP layer is central to the IP network infrastructure. Some of the
advantages of the IP layer for survivability include: advantages of the IP layer for survivability include:
The ability to find optimal routes: The IP layer runs routing The ability to find optimal routes: The IP layer runs routing
algorithms that can be tuned to propagate information that facilitates algorithms that can be tuned to propagate information that facilitates
Owens/Sharma/Oommen Expires November 2002 14 Owens et al Expires November 2002 14
the calculation of optimal routes through the network, and perform the calculation of optimal routes through the network, and perform
constraint-based routing [12] constraint-based routing [12]
Better granularity of protection: Clearly, at the IP layer one obtains Better granularity of protection: Clearly, at the IP layer one obtains
a fine level of granularity at which protection can be done. This layer a fine level of granularity at which protection can be done. This layer
allows a path selection algorithm to pick paths based on priority and allows a path selection algorithm to pick paths based on priority and
other requirements of the traffic. other requirements of the traffic.
Load balancing ability: At the IP layer, one has the maximum Load balancing ability: At the IP layer, one has the maximum
flexibility to perform load sharing by distributing traffic across flexibility to perform load sharing by distributing traffic across
different paths (for example, by hashing using the source and different paths (for example, by hashing using the source and
destination address), and the flexibility to select a better path if it destination address), and the flexibility to select a better path if it
skipping to change at line 737 skipping to change at line 738
The ability to provide positive acknowledgement with retransmission The ability to provide positive acknowledgement with retransmission
(ACK). (ACK).
The finest granularity of protection-application level: Clearly, at the The finest granularity of protection-application level: Clearly, at the
TCP layer one obtains a fine level of granularity at which protection TCP layer one obtains a fine level of granularity at which protection
can be done. This layer allows a path selection algorithm to pick paths can be done. This layer allows a path selection algorithm to pick paths
based on priority and other requirements of the application. based on priority and other requirements of the application.
Some of the drawbacks of the Transport layers in terms of survivability Some of the drawbacks of the Transport layers in terms of survivability
are: are:
Owens/Sharma/Oommen Expires November 2002 15 Owens et al Expires November 2002 15
A well-known drawback of the Transport layer, of course, is that A well-known drawback of the Transport layer, of course, is that
recovery operations here are quite slow relative to the lower layers. recovery operations here are quite slow relative to the lower layers.
Connectionless recovery, due to its dependence on IP routing, can take Connectionless recovery, due to its dependence on IP routing, can take
seconds to detect loss of connectivity (via ACKS and sequence seconds to detect loss of connectivity (via ACKS and sequence
violations (TCP) or routing protocol (UDP)) thereby slowing down the violations (TCP) or routing protocol (UDP)) thereby slowing down the
recovery action. recovery action.
Another problem with the Transport layer is that it too cannot detect Another problem with the Transport layer is that it too cannot detect
physical layer faults, and fault isolation may be an issue if the physical layer faults, and fault isolation may be an issue if the
intent is not to always rely on fault recovery based on IP rerouting. intent is not to always rely on fault recovery based on IP rerouting.
skipping to change at line 786 skipping to change at line 787
layer fault that is not visible at the higher layer, so the ability to layer fault that is not visible at the higher layer, so the ability to
communicate such fault information across layers may enable a lower communicate such fault information across layers may enable a lower
layer, such as the optical layer, to take advantage of finer-scale layer, such as the optical layer, to take advantage of finer-scale
protection capabilities of the higher layers by enabling them much protection capabilities of the higher layers by enabling them much
quicker than they normally would. Some major impacts that designing quicker than they normally would. Some major impacts that designing
coordination between the different layers is how to efficiently design coordination between the different layers is how to efficiently design
the network with high reliability and availability. Additionally, the the network with high reliability and availability. Additionally, the
nature of SLAs that a provider could sign with customers will provide nature of SLAs that a provider could sign with customers will provide
another degree of design considerations. another degree of design considerations.
Owens/Sharma/Oommen Expires November 2002 16 Owens et al Expires November 2002 16
8. Service Provider Considerations 8. Service Provider Considerations
This section provides an overview of some aspects related to network This section provides an overview of some aspects related to network
survivability that service providers may consider when defining their survivability that service providers may consider when defining their
requirements. Our objective here is to lay down some initial thoughts, requirements. Our objective here is to lay down some initial thoughts,
and solicit feedback from individuals in the service provider arena. and solicit feedback from individuals in the service provider arena.
-- Understanding how important network survivability is to the service -- Understanding how important network survivability is to the service
provider organization provider organization
. Service providers might place different degrees of importance on . Service providers might place different degrees of importance on
skipping to change at line 836 skipping to change at line 837
have insight to the TE requirements of the operator environment have insight to the TE requirements of the operator environment
(through policies for example), and could therefore find a more optimal (through policies for example), and could therefore find a more optimal
route. Or is it that each layer should only provide survivability for route. Or is it that each layer should only provide survivability for
itself and leave survivability of other layers to mechanisms within itself and leave survivability of other layers to mechanisms within
those layers. those layers.
-- Collect service provider survivability strategies, performance -- Collect service provider survivability strategies, performance
objectives, and requirements to identify framework level requirements objectives, and requirements to identify framework level requirements
on survivability. on survivability.
Owens/Sharma/Oommen Expires November 2002 17 Owens et al Expires November 2002 17
-- Define the switch-over time objectives, granularity of traffic that -- Define the switch-over time objectives, granularity of traffic that
must be supported, and scope (end-to-end, segment, node, link, must be supported, and scope (end-to-end, segment, node, link,
combinations) of survivability strategies. combinations) of survivability strategies.
-- Identify the extent to which excess traffic would be utilized on -- Identify the extent to which excess traffic would be utilized on
backup paths during normal operating conditions. backup paths during normal operating conditions.
9. Security Considerations 9. Security Considerations
This document raises no new security issues for any of the protocols This document raises no new security issues for any of the protocols
skipping to change at line 878 skipping to change at line 879
Work in Progress, draft-ietf-ipo-framework-01.txt, February 2002. Work in Progress, draft-ietf-ipo-framework-01.txt, February 2002.
[4] Lang. J., et al, "Link Management Protocol for Optical Networks," [4] Lang. J., et al, "Link Management Protocol for Optical Networks,"
Work in Progress, Internet Draft, Work in Progress, draft-ietf-ccamp- Work in Progress, Internet Draft, Work in Progress, draft-ietf-ccamp-
lmp-03.txt, March 2002. lmp-03.txt, March 2002.
[5] Awduche, D. O., Rekhter, Y, ôMulti-Protocol Lambda Switching: [5] Awduche, D. O., Rekhter, Y, ôMulti-Protocol Lambda Switching:
Combining MPLS Traffic Engineering Control With Optical Crossconnects,ö Combining MPLS Traffic Engineering Control With Optical Crossconnects,ö
IEEE Commun. Magazine, vol. 39, no. 3, March 2001, pp. 111-116. IEEE Commun. Magazine, vol. 39, no. 3, March 2001, pp. 111-116.
Owens/Sharma/Oommen Expires November 2002 18 Owens et al Expires November 2002 18
[7]Berger. L. (Editor), "Generalized MPLS Signaling Functional [7]Berger. L. (Editor), "Generalized MPLS Signaling Functional
Description", draft-ietf-mpls-generalized-signaling-08.txt, Internet Description", draft-ietf-mpls-generalized-signaling-08.txt, Internet
Draft, Work in Progress, April 2002. Draft, Work in Progress, April 2002.
[8]Sharma, V., Hellstrand, F. (Editors) "A Framework for MPLS-based [8]Sharma, V., Hellstrand, F. (Editors) "A Framework for MPLS-based
Recovery," Work in Progress, Internet Draft, draft-ietf-mpls-recovery- Recovery," Work in Progress, Internet Draft, draft-ietf-mpls-recovery-
frmwrk-04.txt, May 2002. frmwrk-04.txt, May 2002.
[9]Huang, C., V. Sharma, K. Owens, V. Makam "Building Reliable MPLS [9]Huang, C., V. Sharma, K. Owens, V. Makam "Building Reliable MPLS
Networks Using a Path Protection Mechanism," IEEE Commun. Magazine, Networks Using a Path Protection Mechanism," IEEE Commun. Magazine,
skipping to change at line 911 skipping to change at line 912
11. AuthorsÆ Addresses 11. AuthorsÆ Addresses
Ken Owens Vishal Sharma Ken Owens Vishal Sharma
Erlang Technology, Inc. Metanoia, Inc. Erlang Technology, Inc. Metanoia, Inc.
1106 Fourth Street 305 Elan Village Lane, Unit 121 1106 Fourth Street 305 Elan Village Lane, Unit 121
St. Louis, MO 63126 San Jose, CA 95134-2545 St. Louis, MO 63126 San Jose, CA 95134-2545
Phone: 314-918-1579 Phone: 408-955-0910 Phone: 314-918-1579 Phone: 408-955-0910
keno@erlangtech.com v.sharma@ieee.org keno@erlangtech.com v.sharma@ieee.org
Mathew Oommen Mathew Oommen Fiffi Hellstrand
Optical Datacom Optical Datacom Nortel Networks
4150 S. 100th East Avenue 4150 S. 100th East Avenue St Eriksgatan 115
Suite 402 Suite 402 PO Box 6701
Tulsa, OK 74146 Tulsa, OK 74146 113 85 Stockholm, Sweden
720 873 3723 720 873 3723 Phone: +46 8 5088 3687
moommen@ieee.org moommen@ieee.org Fiffi@nortelnetworks.com
Full Copyright Statement Full Copyright Statement
Owens/Sharma/Oommen Expires November 2002 19 Owens et al Expires November 2002 19
"Copyright (C) The Internet Society (March 2000). All Rights Reserved. "Copyright (C) The Internet Society (March 2000). All Rights Reserved.
This document and translations of it may be copied and furnished to This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or others, and derivative works that comment on or otherwise explain it or
assist in its implementation may be prepared, copied, published and assist in its implementation may be prepared, copied, published and
distributed, in whole or in part, without restriction of any kind, distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing the document itself may not be modified in any way, such as by removing the
copyright notice or references to the Internet Society or other copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of developing Internet organizations, except as needed for the purpose of developing
Internet standards in which case the procedures for copyrights defined Internet standards in which case the procedures for copyrights defined
in the Internet Standards process must be followed, or as required to in the Internet Standards process must be followed, or as required to
translate it into languages other than English. translate it into languages other than English.
The limited permissions granted above are perpetual and will not be The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns. revoked by the Internet Society or its successors or assigns.
Owens/Sharma/Oommen Expires November 2002 20 Owens et al Expires November 2002 20
 End of changes. 23 change blocks. 
27 lines changed or deleted 28 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/