| < draft-pate-pwe3-framework-02.txt | draft-pate-pwe3-framework-03.txt > | |||
|---|---|---|---|---|
| Internet Draft Prayson Pate, Editor | Internet Draft Prayson Pate, Editor | |||
| Document: draft-pate-pwe3-framework-02.txt Overture Networks, Inc. | Document: draft-pate-pwe3-framework-03.txt Overture Networks, Inc. | |||
| XiPeng Xiao | XiPeng Xiao | |||
| Photuris Inc. | Photuris Inc. | |||
| Craig White Tricci So | Craig White Tricci So | |||
| Level 3 Communications, LLC. Caspian Networks | Level 3 Communications, LLC. Caspian Networks | |||
| Kireeti Kompella Andrew G. Malis | Kireeti Kompella Andrew G. Malis | |||
| Juniper Networks, Inc. Vivace Networks | Juniper Networks, Inc. Vivace Networks | |||
| Thomas K. Johnson Thomas D. Nadeau | Thomas K. Johnson Thomas D. Nadeau | |||
| Litchfield Communications Cisco Systems, Inc. | Litchfield Communications Stewart Bryant | |||
| Cisco Systems | ||||
| Framework for Pseudo Wire Emulation Edge-to-Edge (PWE3) | Framework for Pseudo Wire Emulation Edge-to-Edge (PWE3) | |||
| draft-pate-pwe3-framework-02.txt | draft-pate-pwe3-framework-03.txt | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC 2026. Internet-Drafts are | all provisions of Section 10 of RFC 2026. Internet-Drafts are | |||
| working documents of the Internet Engineering Task Force (IETF), its | working documents of the Internet Engineering Task Force (IETF), its | |||
| areas, and its working groups. Note that other groups may also | areas, and its working groups. Note that other groups may also | |||
| distribute working documents as Internet-Drafts. | distribute working documents as Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet- Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Abstract | Abstract | |||
| This document describes a framework for Pseudo Wires Emulation Edge- | This document describes a framework for Pseudo Wire Emulation | |||
| to-Edge (PWE3). It discusses the emulation of circuits (such as T1, | Edge-to-Edge (PWE3). It discusses the emulation of circuits (such as | |||
| E1, T3, E3 and SONET/SDH) and services (such as ATM and Frame Relay) | T1, E1, T3, E3 and SONET/SDH) and services (such as ATM and Frame | |||
| over packet switched networks (PSNs) using IP, L2TP or MPLS. It | Relay) over packet switched networks (PSNs) using IP or MPLS. It | |||
| presents an architectural framework for pseudo wires (PWs), defines | presents an architectural framework for pseudo wires (PWs), defines | |||
| terminology, specifies the various protocol elements and their | terminology, specifies the various protocol elements and their | |||
| functions, overviews some of the services that will be supported and | functions, overviews some of the services that will be supported and | |||
| discusses how PWs fit into the broader context of protocols. | discusses how PWs fit into the broader context of protocols. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The Internet Society (2001). All Rights Reserved. | Copyright (C) The Internet Society (2002). All Rights Reserved. | |||
| Table of Contents | Table of Contents | |||
| 1 Introduction ................................................. 3 | 1 Introduction ................................................. 3 | |||
| 2 Background and Motivation .................................... 5 | 1.1 What Are Pseudo Wires? .................................... 3 | |||
| 3 Architecture of Pseudo Wires ................................. 8 | 1.2 Goals of This Document ..................................... 4 | |||
| 4 Layer 1 (Circuit) Applications ............................... 15 | 1.3 Non-Goals .................................................. 4 | |||
| 5 Layer 2 (Packet/Cell) Applications ........................... 25 | 1.4 Terminology ................................................ 4 | |||
| 6 PW Maintenance ............................................... 36 | 2 Background and Motivation .................................... 7 | |||
| 7 Packet Switched Networks ..................................... 44 | 2.1 Current Network Architecture ............................... 7 | |||
| 8 Acknowledgments .............................................. 46 | 2.2 PWE3 as a Path to Convergence .............................. 9 | |||
| 9 References ................................................... 47 | 2.3 Suitable Applications for PWE3 ............................. 10 | |||
| 10 Security Considerations ..................................... 50 | 2.4 Summary .................................................... 10 | |||
| 11 Authors' Addresses .......................................... 50 | 3 Architecture of Pseudo Wires ................................. 10 | |||
| 12 Full Copyright Section ...................................... 51 | 3.1 Network Reference Model .................................... 11 | |||
| 3.2 Maintenance Reference Model ................................ 11 | ||||
| 3.3 Maintenance Architecture ................................... 12 | ||||
| 3.4 Protocol Stack Reference Model ............................. 12 | ||||
| 3.5 Logical Protocol Layering Model ............................ 13 | ||||
| 3.6 Architecture Assumptions ................................... 16 | ||||
| 4 Design Considerations ........................................ 16 | ||||
| 4.1 PW-PDU Validation .......................................... 16 | ||||
| 4.2 PW-PDU Sequencing .......................................... 17 | ||||
| 4.3 Session Multiplexing ....................................... 17 | ||||
| 4.4 Security ................................................... 17 | ||||
| 4.5 Encapsulation Control ...................................... 17 | ||||
| 4.6 Statistics ................................................. 18 | ||||
| 4.7 Traceroute ................................................. 18 | ||||
| 4.8 Congestion Considerations .................................. 19 | ||||
| 4.9 PW SNMP MIB Architecture ................................... 19 | ||||
| 5 Acknowledgments .............................................. 21 | ||||
| 6 References ................................................... 21 | ||||
| 7 Security Considerations ...................................... 23 | ||||
| 8 IANA Considerations .......................................... 23 | ||||
| 9 Authors' Addresses ........................................... 23 | ||||
| 10 Full Copyright Section ...................................... 24 | ||||
| 1. Introduction | 1. Introduction | |||
| This document describes a framework for Pseudo Wires Emulation Edge- | This document describes a framework for Pseudo Wire Emulation | |||
| to-Edge (PWE3). It discusses the emulation of circuits (such as T1, | Edge-to-Edge (PWE3). It discusses the emulation of circuits (such as | |||
| E1, T3, E3 and SONET/SDH) and services (such as ATM and Frame Relay) | T1, E1, T3, E3 and SONET/SDH) and services (such as ATM and Frame | |||
| over packet switched networks (PSNs) using IP, L2TP or MPLS. It | Relay) over packet switched networks (PSNs) using IP or MPLS. It | |||
| presents an architectural framework for pseudo wires (PWs), defines | presents an architectural framework for pseudo wires (PWs), defines | |||
| terminology, specifies the various protocol elements and their | terminology, specifies the various protocol elements and their | |||
| functions, overviews the services supported and discusses how PWs fit | functions, overviews the services supported and discusses how PWs fit | |||
| into the broader context of protocols. See [XIAO] for the | into the broader context of protocols. See [XIAO] for the | |||
| requirements for PWs. | requirements for PWs. | |||
| 1.1. What Are Pseudo Wires? | 1.1. What Are Pseudo Wires? | |||
| 1.1.1. Definition | 1.1.1. Definition | |||
| PWE3 is a mechanism that emulates the essential attributes of a | PWE3 is a mechanism that emulates the essential attributes of a | |||
| service (such as a T1 leased line or Frame Relay) over a PSN. The | service (such as a T1 leased line or Frame Relay) over a PSN. The | |||
| required functions of PWs include encapsulating service-specific bit- | required functions of PWs include encapsulating service-specific | |||
| streams or PDUs arriving at an ingress port, and carrying them across | bit-streams or PDUs arriving at an ingress port, and carrying them | |||
| a path or tunnel, managing their timing and order, and any other | across a path or tunnel, managing their timing and order, and any | |||
| operations required to emulate the behavior and characteristics of | other operations required to emulate the behavior and characteristics | |||
| the service as faithfully as possible. | of the service as faithfully as possible. | |||
| From the customer perspective, the PW is perceived as an unshared | From the customer perspective, the PW is perceived as an unshared | |||
| link or circuit of the chosen service. However, there may be | link or circuit of the chosen service. However, there may be | |||
| deficiencies that impede some applications from being carried on a | deficiencies that impede some applications from being carried on a | |||
| PW. These limitations should be fully described in the appropriate | PW. These limitations should be fully described in the appropriate | |||
| service-specific Applicability Statements (ASes). | service-specific Encapsulation, Emulation and Maintenance Documents | |||
| (EEMDs) and Applicability Statements (ASes). | ||||
| 1.1.2. Functions | 1.1.2. Functions | |||
| PWs provide the following functions in order to emulate the behavior | PWs provide the following functions in order to emulate the behavior | |||
| and characteristics of the desired service. | and characteristics of the desired service. | |||
| - Encapsulation of service-specific PDUs or circuit data arriving at | - Encapsulation of service-specific PDUs or circuit data arriving at | |||
| an ingress port (logical or physical). | an ingress port (logical or physical). | |||
| - Carrying the encapsulated data across a tunnel. | - Carrying the encapsulated data across a tunnel. | |||
| - Managing the signaling, timing, order or other aspects of the | - Managing the signaling, timing, order or other aspects of the | |||
| service at the boundaries of the PW. | service at the boundaries of the PW. | |||
| - Service-specific status and alarm management. | - Service-specific status and alarm management. | |||
| ASes for each service will describe any shortfalls of the emulation's | EEMDs and/or ASes for each service will describe any shortfalls of | |||
| faithfulness. | the emulation's faithfulness. | |||
| 1.2. Goals of This Document | 1.2. Goals of This Document | |||
| - Description of the motivation for creating PWs, and some background | - Description of the motivation for creating PWs, and some background | |||
| on how they may be deployed. | on how they may be deployed. | |||
| - Description of an architecture and terminology for PWs. | - Description of an architecture and terminology for PWs. | |||
| - Description of the relevant services that will be supported by PWs, | ||||
| including any relevant service-specific considerations. | ||||
| - Description of methods to ensure in-order final PDU delivery, | ||||
| - Description of methods to perform clock recovery, as needed or | ||||
| appropriate. | ||||
| - Description of methods to perform edge-to-edge/inband maintenance | ||||
| functions across the PSN, as needed or appropriate. | ||||
| - Description of the statistics and other network management | - Description of the statistics and other network management | |||
| information needed for tunnel operation and management. | information needed for tunnel operation and management. | |||
| - Description of the security mechanisms to be used to protect the | ||||
| control of the PW technology. The protection of the encapsulated | ||||
| content (e.g., payload encryption) of the PW is outside of the | ||||
| current scope for the PWE3 working group. | ||||
| - Description of a mechanism to exchange encapsulation control | ||||
| information at an administrative boundary of the PSN, including | ||||
| security methods. | ||||
| - Whenever possible, relevant requirements from existing IETF | - Whenever possible, relevant requirements from existing IETF | |||
| documents and other sources will be incorporated by reference. | documents and other sources will be incorporated by reference. | |||
| 1.3. Non-Goals | 1.3. Non-Goals | |||
| The following are out of scope: | The following are non-goals for this document: | |||
| - The protection of the encapsulated content of the PW. | - The detailed specification of the bits and bytes of the | |||
| encapsulations of the various services. This description is | ||||
| contained in an EEMD and/or ES. | ||||
| - The detailed definition of the protocols involved in PW setup and | ||||
| maintenance. | ||||
| The following are outside the scope of PWE3: | ||||
| - Discussion of the protection of the encapsulated content of the PW. | ||||
| - Any multicast service not native to the emulated medium. Thus, | - Any multicast service not native to the emulated medium. Thus, | |||
| Ethernet transmission to a "multicast" IEEE-48 address is in scope, | Ethernet transmission to a "multicast" IEEE-48 address is in scope, | |||
| while multicast services like MARS that are implemented on top of | while multicast services like MARS that are implemented on top of | |||
| the medium are out of scope. | the medium are out of scope. | |||
| - Methods to signal or control the underlying PSN. | - Methods to signal or control the underlying PSN. | |||
| 2. Background and Motivation | 1.4. Terminology | |||
| Many of today's service providers are struggling with the dilemma of | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALLNOT", | |||
| moving to an optical network based on IP and/or MPLS. How do they | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| realize the capital and operational benefits of a new packet-based | document are to be interpreted as described in RFC 2119. Below are | |||
| optical infrastructure, while leveraging the existing base of SONET | the definitions for the terms used throughout the document. | |||
| (Synchronous Optical Network) gear, and while also protecting the | ||||
| large revenue stream associated with this equipment? How do they | ||||
| move from mature Frame Relay or ATM networks, while still being able | ||||
| to provide these lucrative services? One possibility is the | ||||
| emulation of circuits or services via PWs. Circuit emulation over | ||||
| ATM and interworking of Frame Relay and ATM have already been | ||||
| standardized. Emulation allows existing circuits and/or services to | ||||
| be carried across the new infrastructure, and thus enables the | ||||
| interworking of disparate networks. [ATMCES] provides some insight | ||||
| into the requirements for such a service: | ||||
| There is a user demand for carrying certain types of | Packet Switched Network | |||
| constant bit rate (CBR) or "circuit" traffic over | A Packet Switched Network (PSN) is a network using | |||
| Asynchronous Transfer Mode (ATM) networks. As ATM is | IP or MPLS as the unit of switching. | |||
| essentially a packet- rather than circuit-oriented | ||||
| transmission technology, it must emulate circuit | ||||
| characteristics in order to provide good support for CBR | ||||
| traffic. | ||||
| A critical attribute of a Circuit Emulation Service (CES) | Pseudo Wire Emulation Edge to Edge | |||
| is that the performance realized over ATM should be | Pseudo Wire Emulation Edge to Edge (PWE3) is a | |||
| comparable to that experienced with the current PDH/SDH | mechanism that emulates the essential attributes of | |||
| technology. | a service (such as a T1 leased line or Frame Relay) | |||
| over a PSN. | ||||
| Section 4 of [ANAVI] gives more background on why such emulation is | Customer Edge A Customer Edge (CE) is a device where one end of an | |||
| desirable: | emulated service originates and terminates. The CE | |||
| is not aware that it is using an emulated service | ||||
| rather than a "real" service. | ||||
| The simplicity of TDMoIP translates into initial | Provider Edge A Provider Edge (PE) is a device that provides PWE3 | |||
| expenditure and operational cost benefits. In addition, due | to a CE. | |||
| to its transparency TDMoIP can support mixed voice, data | ||||
| and video services. It is transparent to both protocols and | Pseudo Wire A Pseudo Wire (PW) is a connection between two PEs | |||
| signaling, irrespective of whether they are standards based | carried over a PSN. The PE provides the adaptation | |||
| or proprietary with full timing support and the capability | between the CE and the PW. | |||
| of maintaining the integrity of framed and unframed DS1 | ||||
| formats. | PW End Service A Pseudo Wire End Service (PWES) is the interface | |||
| between a PE and a CE. This can be a physical | ||||
| interface like a T1 or Ethernet, or a virtual | ||||
| interface like a VC or VLAN. | ||||
| Pseudo Wire PDU A Pseudo Wire PDU is a PDU sent on the PW that | ||||
| contains all of the data and control information | ||||
| necessary to provide the desired service. | ||||
| PSN Tunnel A PSN Tunnel is a tunnel inside which multiple PWs | ||||
| can be nested so that they are transparent to core | ||||
| network devices. | ||||
| PW Domain A PW Domain (PWD) is a collection of instances of | ||||
| PWs that are within the scope of a single | ||||
| homogeneous administrative domain (e.g. PW over MPLS | ||||
| network or PW over IP network etc.). | ||||
| Path-oriented PW A Path-oriented PW is a PW for which the network | ||||
| devices of the underlying PSN must maintain path | ||||
| state information. | ||||
| Non-path-oriented PW | ||||
| A Non-path-oriented PW is a PW for which the network | ||||
| devices of the underlying PSN need not maintain path | ||||
| state information. | ||||
| Interworking Interworking is used to express interactions between | ||||
| networks, between end systems, or between parts | ||||
| thereof, with the aim of providing a functional | ||||
| entity capable of supporting an end-to-end | ||||
| communication. The interactions required to provide | ||||
| a functional entity rely on functions and on the | ||||
| means to select these functions. | ||||
| Interworking Function | ||||
| An Interworking Function (IWF) is a functional | ||||
| entity that facilitates interworking between two | ||||
| dissimilar networks (e.g., ATM & MPLS, ATM & L2TP, | ||||
| etc.). A PE performs the IWF function. | ||||
| Service Interworking | ||||
| In Service Interworking, the IWF (Interworking | ||||
| Function) between two dissimilar protocols (e.g., | ||||
| ATM & MPLS, Frame Relay & ATM, ATM & IP, ATM & L2TP, | ||||
| etc.) terminates the protocol used in one network | ||||
| and translates (i.e. maps) its Protocol Control | ||||
| Information (PCI) to the PCI of the protocol used in | ||||
| other network for User, Control and Management Plane | ||||
| functions to the extent possible. In general, since | ||||
| not all functions may be supported in one or other | ||||
| of the networks, the translation of PCI may be | ||||
| partial or non-existent. However, this should not | ||||
| result in any loss of user data since the payload is | ||||
| not affected by PCI conversion at the service | ||||
| interworking IWF. | ||||
| Network Interworking | ||||
| In Network Interworking, the PCI (Protocol Control | ||||
| Information) of the protocol and the payload | ||||
| information used in two similar networks are | ||||
| transferred transparently by an IWF of the PE across | ||||
| the PSN. Typically the IWF of the PE encapsulates | ||||
| the information which is transmitted by means of an | ||||
| adaptation function and transfers it transparently | ||||
| to the other network. | ||||
| Applicability Statement | ||||
| Each PW service will have an Applicability Statement | ||||
| (AS) that describes the applicability of PWs for | ||||
| that service. | ||||
| Encapsulation, Emulation and Maintenance Documents | ||||
| Each PW service will have an Encapsulation, | ||||
| Emulation and Maintenance Document (EEMDs) that | ||||
| described the particulars of PWs for that service, | ||||
| as well as the degree of faithfulness to that | ||||
| service. | ||||
| Inbound The traffic direction where information from a CE is | ||||
| adapted to a PW, and PW-PDUs are sent into the PSN. | ||||
| Outbound The traffic direction where PW-PDUs are received on | ||||
| a PW from the PSN, re-converted back in the emulated | ||||
| service, and sent out to a CE. | ||||
| CE Signaling CE (end-to-end) Signaling refers to messages sent | ||||
| and received by the CEs. It may be desirable or | ||||
| even necessary for the PE to participate in or | ||||
| monitor this signaling in order to effectively | ||||
| emulate the service. | ||||
| PE/PW Maintenance | ||||
| PE/PW Maintenance is used by the PEs to set up, | ||||
| maintain and tear down the PW. It may be coupled | ||||
| with CE signaling in order to effectively manage the | ||||
| PW. | ||||
| PSN Tunnel Signaling | ||||
| PSN Tunnel Signaling is used to set up, maintain and | ||||
| remove the underlying PSN tunnel. An example would | ||||
| be LDP in MPLS for maintaining LSPs. | ||||
| 2. Background and Motivation | ||||
| Why is anyone interested in PWs? This section gives some background | ||||
| on where networks are today and why they are changing. It also talks | ||||
| about the motivation to provide converged networks while continuing | ||||
| to support existing services. Finally it discusses how PWs can be a | ||||
| solution for this dilemma. | ||||
| 2.1. Current Network Architecture | 2.1. Current Network Architecture | |||
| 2.1.1. Multiple Networks | 2.1.1. Multiple Networks | |||
| For any given service provider delivering multiple services, the | For any given service provider delivering multiple services, the | |||
| current "network" usually consists of parallel or "overlay" networks. | current "network" usually consists of parallel or "overlay" networks. | |||
| Each of these networks implements a specific service, such as voice, | Each of these networks implements a specific service, such as voice, | |||
| Frame Relay, Internet access, etc. This is quite expensive, both in | Frame Relay, Internet access, etc. This is quite expensive, both in | |||
| terms of capital expense as well as in operational costs. | terms of capital expense as well as in operational costs. | |||
| skipping to change at page 6, line 32 ¶ | skipping to change at page 8, line 8 ¶ | |||
| - T1, E1 and T3 circuits are sometimes carried over ATM networks | - T1, E1 and T3 circuits are sometimes carried over ATM networks | |||
| using [ATMCES]. | using [ATMCES]. | |||
| - Voice is carried over ATM (using AAL2), Frame Relay (using FRF.11 | - Voice is carried over ATM (using AAL2), Frame Relay (using FRF.11 | |||
| VoFR), IP (using VoIP) and MPLS (using VoMPLS) networks. | VoFR), IP (using VoIP) and MPLS (using VoMPLS) networks. | |||
| Deployment of these examples range from limited (ATM CES) to fairly | Deployment of these examples range from limited (ATM CES) to fairly | |||
| common (FRF.5 interworking) to rapidly growing (VoIP). | common (FRF.5 interworking) to rapidly growing (VoIP). | |||
| 2.2. The Emerging Converged Network | 2.1.3. The Emerging Converged Network | |||
| Many service providers are finding that the new IP-based and MPLS- | Many service providers are finding that the new IP-based and | |||
| based switching systems are much less costly to acquire, deploy and | MPLS-based switching systems are much less costly to acquire, deploy | |||
| maintain than the systems that they replace. The new systems take | and maintain than the systems that they replace. The new systems | |||
| advantage of advances in technology in these ways: | take advantage of advances in technology in these ways: | |||
| - The newer systems leverage mass production of ASICs and optical | - The newer systems leverage mass production of ASICs and optical | |||
| interfaces to reduce capital expense. | interfaces to reduce capital expense. | |||
| - The bulk of the traffic in the network today originates from packet | - The bulk of the traffic in the network today originates from packet | |||
| sources. Packet switches can economically switch and deliver this | sources. Packet switches can economically switch and deliver this | |||
| traffic natively. | traffic natively. | |||
| - Variable-length switches have lower system costs than ATM due to | - Variable-length switches have lower system costs than ATM due to | |||
| simpler switching mechanisms as well as elimination of segmentation | simpler switching mechanisms as well as elimination of segmentation | |||
| and reassembly (SAR) at the edges of the network. | and reassembly (SAR) at the edges of the network. | |||
| - Deployment of services is simpler due to the connectionless nature | - Deployment of services is simpler due to the connectionless nature | |||
| of IP services or the rapid provisioning of MPLS applications. | of IP services or the rapid provisioning of MPLS applications. | |||
| 2.3. Transition to a IP-Optimized Converged Network | 2.1.4. Transition to a Packet-Optimized Converged Network | |||
| The greatest assets for many service providers are the physical | The greatest assets for many service providers are the physical | |||
| communications links that they own. The time and costs associated | communications links that they own. The time and costs associated | |||
| with acquiring the necessary rights of way, getting the required | with acquiring the necessary rights of way, getting the required | |||
| governmental approvals, and physically installing the cabling over a | governmental approvals, and physically installing the cabling over a | |||
| variety of terrains and obstacles represents a significant asset that | variety of terrains and obstacles represents a significant asset that | |||
| is difficult to replace. Their greatest on-going costs are the | is difficult to replace. Their greatest on-going costs are the | |||
| operational expenses associated with maintaining and operating their | operational expenses associated with maintaining and operating their | |||
| networks. In order to maximize the return on their assets and | networks. In order to maximize the return on their assets and | |||
| minimize their operating costs, service providers often look to | minimize their operating costs, service providers often look to | |||
| consolidate the delivery of multiple service types onto a single | consolidate the delivery of multiple service types onto a single | |||
| networking technology. | networking technology. | |||
| The first generation converged network was based on TDM (time- | The first generation converged network was based on TDM | |||
| division multiplexing) technology. Voice, video, and data traffic | (time-division multiplexing) technology. Voice, video, and data | |||
| have been carried successfully across TDM/DACS-based networks for | traffic have been carried successfully across TDM/DACS-based networks | |||
| decades. TDM technology has some significant drawbacks as a | for decades. TDM technology has some significant drawbacks as a | |||
| converged networking technology. Operational costs for TDM networks | converged networking technology. Operational costs for TDM networks | |||
| remain relatively high because the provisioning of end-to-end TDM | remain relatively high because the provisioning of end-to-end TDM | |||
| circuits is typically a tedious and labor-intensive task. In | circuits is typically a tedious and labor-intensive task. In | |||
| addition, TDM switching does not make the best use of the | addition, TDM switching does not make the best use of the | |||
| communications links. This is because fixed assignment of timeslots | communications links. This is because fixed assignment of timeslots | |||
| does not allow for the statistical multiplexing of bursty data | does not allow for the statistical multiplexing of bursty data | |||
| traffic (i.e. temporarily unused bandwidth on one timeslot cannot be | traffic (i.e. temporarily unused bandwidth on one timeslot cannot be | |||
| dynamically re-allocated to another service). | dynamically re-allocated to another service). | |||
| The second generation of converged network was based on ATM | The second generation of converged network was based on ATM | |||
| skipping to change at page 7, line 42 ¶ | skipping to change at page 9, line 20 ¶ | |||
| communications links. In addition, ATM SPVC technology is often used | communications links. In addition, ATM SPVC technology is often used | |||
| to automatically provision end-to-end services, providing an | to automatically provision end-to-end services, providing an | |||
| additional advantage over traditional TDM networks. However, ATM has | additional advantage over traditional TDM networks. However, ATM has | |||
| several significant drawbacks. One of the most frequently cited | several significant drawbacks. One of the most frequently cited | |||
| problems with ATM is the so-called cell-tax, which refers to the 5 | problems with ATM is the so-called cell-tax, which refers to the 5 | |||
| bytes out of 53 used as an ATM cell header. Another significant | bytes out of 53 used as an ATM cell header. Another significant | |||
| problem with ATM is the AAL5 SAR, which becomes extremely difficult | problem with ATM is the AAL5 SAR, which becomes extremely difficult | |||
| to implement above 1 Gbps. There are also issues with the long-term | to implement above 1 Gbps. There are also issues with the long-term | |||
| scalability of ATM, especially as a switching layer beneath IP. | scalability of ATM, especially as a switching layer beneath IP. | |||
| As IP traffic takes up a larger and larger portion of the available | As packet traffic takes up a larger and larger portion of the | |||
| network bandwidth, it becomes increasingly useful to optimize public | available network bandwidth, it becomes increasingly useful to | |||
| networks for the Internet Protocol. However, many service providers | optimize public networks for the Internet Protocol. However, many | |||
| are confronting several obstacles in engineering IP-optimized | service providers are confronting several obstacles in engineering | |||
| networks. Although Internet traffic is the fastest growing traffic | packet-optimized networks. Although Internet traffic is the fastest | |||
| segment, it does not generate the highest revenue per bit. For | growing traffic segment, it does not generate the highest revenue per | |||
| example, Frame Relay traffic currently generates a higher revenue per | bit. For example, Frame Relay traffic currently generates a higher | |||
| bit than do native IP services. Private line TDM services still | revenue per bit than do native IP services. Private line TDM | |||
| generate even more revenue per bit than does Frame Relay. In | services still generate even more revenue per bit than does Frame | |||
| addition, there is a tremendous amount of legacy equipment deployed | Relay. In addition, there is a tremendous amount of legacy equipment | |||
| within public networks that does not communicate using the Internet | deployed within public networks that does not communicate using the | |||
| Protocol. Service providers continue to utilize non-IP equipment to | Internet Protocol. Service providers continue to utilize non-IP | |||
| deploy a variety of services, and see a need to interconnect this | equipment to deploy a variety of services, and see a need to | |||
| legacy equipment over their IP-optimized core networks. | interconnect this legacy equipment over their IP-optimized core | |||
| networks. | ||||
| 2.4. Summary | ||||
| To maximize the return on their assets and minimize their operational | ||||
| costs, many service providers are looking to consolidate the delivery | ||||
| of multiple service offerings and traffic types onto a single IP- | ||||
| optimized network. | ||||
| In order to create this next-generation converged network, standard | ||||
| methods must be developed to emulate existing telecommunications | ||||
| formats such as Ethernet, Frame Relay, ATM, and TDM over IP-optimized | ||||
| core networks. This document describes a framework accomplishing | ||||
| this goal. | ||||
| 3. Architecture of Pseudo Wires | ||||
| 3.1. Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALLNOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | ||||
| document are to be interpreted as described in RFC 2119. Below are | ||||
| the definitions for the terms used throughout the document. | ||||
| Packet Switched Network | ||||
| A Packet Switched Network (PSN) is a network | ||||
| using IP, MPLS or L2TP as the unit of | ||||
| switching. | ||||
| Pseudo Wire Emulation Edge to Edge | ||||
| Pseudo Wire Emulation Edge to Edge (PWE3) is a | ||||
| mechanism that emulates the essential | ||||
| attributes of a service (such as a T1 leased | ||||
| line or Frame Relay) over a PSN. | ||||
| Customer Edge A Customer Edge (CE) is a device where one end | ||||
| of an emulated service originates and | ||||
| terminates. The CE is not aware that it is | ||||
| using an emulated service rather than a "real" | ||||
| service. | ||||
| Provider Edge A Provider Edge (PE) is a device that provides | ||||
| PWE3 to a CE. | ||||
| Pseudo Wire A Pseudo Wire (PW) is a connection between two | ||||
| PEs carried over a PSN. The PE provides the | ||||
| adaptation between the CE and the PW. | ||||
| PW End Service A Pseudo Wire End Service (PWES) is the | ||||
| interface between a PE and a CE. This can be a | ||||
| physical interface like a T1 or Ethernet, or a | ||||
| virtual interface like a VC or VLAN. | ||||
| Pseudo Wire PDU A Pseudo Wire PDU is a PDU sent on the PW that | ||||
| contains all of the data and control | ||||
| information necessary to provide the desired | ||||
| service. | ||||
| PSN Tunnel A PSN Tunnel is a tunnel inside which multiple | 2.2. PWE3 as a Path to Convergence | |||
| PWs can be nested so that they are transparent | ||||
| to core network devices. | ||||
| Pseudo Wire Domain A PW Domain (PWD) is a collection of instances | How do service providers realize the capital and operational benefits | |||
| of PWs that are within the scope of a single | of a new packet-based infrastructure, while leveraging the existing | |||
| homogenous administrative domain (e.g. PW over | base of SONET (Synchronous Optical Network) gear, and while also | |||
| MPLS network or PW over IP network etc.). | protecting the large revenue stream associated with this equipment? | |||
| How do they move from mature Frame Relay or ATM networks, while still | ||||
| being able to provide these lucrative services? | ||||
| Path-oriented PW A Path-oriented PW is a PW for which the | One possibility is the emulation of circuits or services via PWs. | |||
| network devices of the underlying PSN must | Circuit emulation over ATM and interworking of Frame Relay and ATM | |||
| maintain state information. | have already been standardized. Emulation allows existing circuits | |||
| and/or services to be carried across the new infrastructure, and thus | ||||
| enables the interworking of disparate networks. [ATMCES] provides | ||||
| some insight into the requirements for such a service: | ||||
| Non-path-oriented PW A Non-path-oriented PW is a PW for which the | There is a user demand for carrying certain types of | |||
| network devices of the underlying PSN need not | constant bit rate (CBR) or "circuit" traffic over | |||
| maintain state information. | Asynchronous Transfer Mode (ATM) networks. As ATM is | |||
| essentially a packet- rather than circuit-oriented | ||||
| transmission technology, it must emulate circuit | ||||
| characteristics in order to provide good support for CBR | ||||
| traffic. | ||||
| Interworking Interworking is used to express interactions | A critical attribute of a Circuit Emulation Service (CES) | |||
| between networks, between end systems, or | is that the performance realized over ATM should be | |||
| between parts thereof, with the aim of | comparable to that experienced with the current PDH/SDH | |||
| providing a functional entity capable of | technology. | |||
| supporting an end-to-end communication. The | ||||
| interactions required to provide a functional | ||||
| entity rely on functions and on the means to | ||||
| select these functions. | ||||
| Interworking Function An Interworking Function (IWF) is a functional | Implemented correctly, PWE3 can provide a means for supporting | |||
| entity that facilitates interworking between | today's services over a new network. | |||
| two dissimilar networks (e.g., ATM & MPLS, ATM | ||||
| & L2TP, etc.). A PE performs the IWF function. | ||||
| Service Interworking In Service Interworking, the IWF (Interworking | 2.3. Suitable Applications for PWE3 | |||
| Function) between two dissimilar protocols | ||||
| (e.g., ATM & MPLS, Frame Relay & ATM, ATM & IP, | ||||
| ATM & L2TP, etc.) terminates the protocol used | ||||
| in one network and translates (i.e. maps) its | ||||
| Protocol Control Information (PCI) to the PCI | ||||
| of the protocol used in other network for User, | ||||
| Control and Management Plane functions to the | ||||
| extent possible. In general, since not all | ||||
| functions may be supported in one or other of | ||||
| the networks, the translation of PCI may be | ||||
| partial or non-existent. However, this should | ||||
| not result in any loss of user data since the | ||||
| payload is not affected by PCI conversion at | ||||
| the service interworking IWF. | ||||
| Network Interworking In Network Interworking, the PCI (Protocol | What makes an application suitable (or not) for PWE3 emulation? When | |||
| Control Information) of the protocol and the | considering PWs as a means of providing an application, the following | |||
| payload information used in two similar | questions must be considered: | |||
| networks are transferred transparently by an | ||||
| IWF of the PE across the PSN. Typically the | ||||
| IWF of the PE encapsulates the information | ||||
| which is transmitted by means of an adaptation | ||||
| function and transfers it transparently to the | ||||
| other network. | ||||
| Applicability Statement | - Is the application sufficiently deployed to warrant emulation? | |||
| Each PW service will have an Applicability | ||||
| Statement (AS) that describes the particulars | ||||
| of PWs for that service, as well as the degree | ||||
| of faithfulness to that service. | ||||
| Inbound The traffic direction where information from a | - Is there interest on the part of service providers in providing an | |||
| CE is adapted to a PW, and PW-PDUs are sent | emulation for the given application? | |||
| into the PSN. | ||||
| Outbound The traffic direction where PW-PDUs are | - Is there interest on the part of equipment manufacturers in | |||
| received on a PW from the PSN, re-converted | providing products for the emulation of a given application? | |||
| back in the emulated service, and sent out to a | ||||
| CE. | ||||
| CE Signaling CE (end-to-end) Signaling refers to messages | - Are the complexities and limitations of providing an emulation | |||
| sent and received by the CEs. It may be | worth the savings in capital and operational expenses? | |||
| desirable or even necessary for the PE to | ||||
| participate in or monitor this signaling in | ||||
| order to effectively emulate the service. | ||||
| PE/PW Maintenance PE/PW Maintenance is used by the PEs to set up, | If the answer to all four questions is "yes", then the application is | |||
| maintain and tear down the PW. It may be | likely to be a good candidate for PWE3. Otherwise, there may not be | |||
| coupled with CE signaling in order to | sufficient overlap between the customers, service providers, | |||
| effectively manage the PW. | equipment manufacturers and technology to warrant providing such an | |||
| emulation. | ||||
| PSN Tunnel Signaling PSN Tunnel Signaling is used to set up, | 2.4. Summary | |||
| maintain and remove the underlying PSN tunnel. | ||||
| An example would be LDP in MPLS for maintaining | ||||
| LSPs. This type of signaling is not within the | ||||
| scope of PWE3. | ||||
| 3.2. Reference Models | To maximize the return on their assets and minimize their operational | |||
| costs, many service providers are looking to consolidate the delivery | ||||
| of multiple service offerings and traffic types onto a single | ||||
| IP-optimized network. | ||||
| 3.2.1. Network Reference Model | In order to create this next-generation converged network, standard | |||
| methods must be developed to emulate existing telecommunications | ||||
| formats such as Ethernet, Frame Relay, ATM, and TDM over IP-optimized | ||||
| core networks. This document describes a framework accomplishing | ||||
| this goal. | ||||
| Figure 1 below shows the network reference model for PWs. | 3. Architecture of Pseudo Wires | |||
| 3.1. Network Reference Model | ||||
| |<------- Pseudo Wire ------>| | Figure 1 below shows the network reference model for PWs. As shown, | |||
| | | | the PW provides an emulated service between the customer edges (CEs). | |||
| | |<-- PSN Tunnel -->| | | ||||
| PW V V V V PW | ||||
| End Service +----+ +----+ End Service | ||||
| +-----+ | | PE1|==================| PE2| | +-----+ | ||||
| | |----------|............PW1.............|----------| | | ||||
| | CE1 | | | | | | | | CE2 | | ||||
| | |----------|............PW2.............|----------| | | ||||
| +-----+ | | |==================| | | +-----+ | ||||
| ^ +----+ +----+ | ^ | ||||
| | Provider Edge 1 Provider Edge 2 | | ||||
| | | | ||||
| |<-------------- Emulated Service ---------------->| | ||||
| Customer Customer | |<------- Pseudo Wire ------>| | |||
| Edge 1 Edge 2 | | |<-- PSN Tunnel -->| | | |||
| PW V V V V PW | ||||
| End Service +----+ +----+ End Service | ||||
| +-----+ | | PE1|==================| PE2| | +-----+ | ||||
| | |----------|............PW1.............|----------| | | ||||
| | CE1 | | | | | | | | CE2 | | ||||
| | |----------|............PW2.............|----------| | | ||||
| +-----+ | | |==================| | | +-----+ | ||||
| Customer^ +----+ +----+ | ^Customer | ||||
| Edge 1 | Provider Edge 1 Provider Edge 2 | Edge 1 | ||||
| |<-------------- Emulated Service ---------------->| | ||||
| Figure 1: PWE3 Network Reference Model | Figure 1: PWE3 Network Reference Model | |||
| As shown, the PW provides an emulated service between the customer | Any bits or packets presented at the PW End Service (PWES) are | |||
| edges (CEs). Any bits or packets presented at the PW End Service | encapsulated in a PW-PDU and carried across the underlying network. | |||
| (PWES) are encapsulated in a PW-PDU and carried across the underlying | The PEs perform the encapsulation, decapsulation, order management, | |||
| network. The PEs perform the encapsulation, decapsulation, order | timing and any other functions required by the service. In some | |||
| management, timing and any other functions required by the service. | cases the PWES can be treated as a virtual interfaces into a further | |||
| In some cases the PWES can be treated as a virtual interfaces into a | processing (like switching or bridging) of the original service | |||
| further processing (like switching or bridging) of the original | before the physical connection to the CE. Examples include Ethernet | |||
| service before the physical connection to the CE. Examples include | bridging, SONET cross-connect, translation of locally-significant | |||
| Ethernet bridging, SONET cross-connect, translation of locally- | identifiers such as VCI/VPI, etc. to other service type, etc. The | |||
| significant identifiers such as VCI/VPI, etc. to other service type, | underlying PSN is not involved in any of these service-specific | |||
| etc. | ||||
| The underlying PSN is not involved in any of these service-specific | ||||
| operations. | operations. | |||
| 3.2.2. Signaling Reference Model | 3.2. Maintenance Reference Model | |||
| Figure 2 below shows the signaling reference model for PWs. | Figure 2 below shows the maintenance reference model for PWs. | |||
| |<------- CE (end-to-end) Signaling ------>| | |<------- CE (end-to-end) Signaling ------>| | |||
| | | | ||||
| | | | ||||
| | |<---- PW/PE Maintenance ----->| | | | |<---- PW/PE Maintenance ----->| | | |||
| | | | | | ||||
| | | |<-- PSN Tunnel -->| | | | | | |<-- PSN Tunnel -->| | | | |||
| | | | Signaling | | | | | | | Signaling | | | | |||
| | V V (out of scope) V V | | | V V (out of scope) V V | | |||
| v +-----+ +-----+ v | v +-----+ +-----+ v | |||
| +-----+ | PE1 |==================| PE2 | +-----+ | +-----+ | PE1 |==================| PE2 | +-----+ | |||
| | |-----|.............PW1..............|-----| | | | |-----|.............PW1..............|-----| | | |||
| | CE1 | | | | | | CE2 | | | CE1 | | | | | | CE2 | | |||
| | |-----|.............PW2..............|-----| | | | |-----|.............PW2..............|-----| | | |||
| +-----+ | |==================| | +-----+ | +-----+ | |==================| | +-----+ | |||
| +-----+ +-----+ | +-----+ +-----+ | |||
| Customer Provider Provider Customer | Customer Provider Provider Customer | |||
| Edge 1 Edge 1 Edge 2 Edge 2 | Edge 1 Edge 1 Edge 2 Edge 2 | |||
| Figure 2: PWE3 Signaling Reference Model | Figure 2: PWE3 Maintenance Reference Model | |||
| - The CE (end-to-end) signaling is between the CEs. This signaling | - The CE (end-to-end) signaling is between the CEs. This signaling | |||
| includes Frame Relay PVC status signaling, ATM SVC signaling, etc. | includes Frame Relay PVC status signaling, ATM SVC signaling, etc. | |||
| - The PW/PE Maintenance is used between the PEs to set up, maintain | - The PW/PE Maintenance is used between the PEs to set up, maintain | |||
| and tear down PWs, including any required coordination of | and tear down PWs, including any required coordination of | |||
| parameters between the two ends. | parameters between the two ends. | |||
| - The PSN Tunnel signaling controls the underlying PSN. An example | - The PSN Tunnel signaling controls the underlying PSN. An example | |||
| would be LDP in MPLS for maintaining LSPs. This type of signaling | would be LDP in MPLS for maintaining LSPs. This type of signaling | |||
| is not within the scope of PWE3. | is not within the scope of PWE3. | |||
| 3.2.3. Protocol Stack Reference Model | 3.3. Maintenance Architecture | |||
| Figure 3 below shows the protocol stack reference model for PWs. The | ||||
| PW provides the CE with what appears to be a connection to its peer | ||||
| at the far end. Bits or PDUs from the CE are passed through an | ||||
| encapsulation layer. | ||||
| +-------------+ +-------------+ | ||||
| | Emulated | | Emulated | | ||||
| | Service | | Service | | ||||
| | (TDM, ATM, | Emulated Service | (TDM, ATM, | | ||||
| | Ethernet, |<=================================>| Ethernet, | | ||||
| |Frame Relay, | |Frame Relay, | | ||||
| | etc. | | etc. | | ||||
| +-------------+ Pseudo Wire +-------------+ | ||||
| |Encapsulation|<=================================>|Encapsulation| | ||||
| +-------------+ +-------------+ | ||||
| | PSN | PSN Tunnel | PSN | | ||||
| |IP/MPLS/L2TP |<=================================>|IP/MPLS/L2TP | | ||||
| +-------------+ +-------------+ | ||||
| | Physical | | Physical | | ||||
| +-----+-------+ +-----+-------+ | ||||
| | | | ||||
| | IP/MPLS/L2TP Network | | ||||
| | ____ ___ ____ | | ||||
| | _/ \___/ \ _/ \__ | | ||||
| | / \__/ \_ | | ||||
| | / \ | | ||||
| +=========/ |=====+ | ||||
| \ / | ||||
| \ / | ||||
| \ ___ ___ __ _/ | ||||
| \_/ \____/ \___/ \____/ | ||||
| Figure 3: PWE3 Protocol Stack Reference Model | ||||
| 3.3. Architecture Assumptions | ||||
| 1) The current design is focused on a point-to-point and same-to-same | ||||
| service interface at both end of the PW. Only network | ||||
| interworking will be performed at the edge or the PW. Support for | ||||
| service interworking is for further study. | ||||
| 2) The initial design of PWE3 is focused on a single homogenous | ||||
| administrative PWD (e.g. PW over MPLS or PW over IP etc. ONLY). | ||||
| Interworking between different PW types and the support of inter- | ||||
| domain PWs are for further study. | ||||
| 3) The design of PW will not perfectly emulate the characteristics of | ||||
| the native service. It will be dependent on both the emulated | ||||
| service, as well as on the network implementation. An AS shall be | ||||
| created for each service to describe the degree of faithfulness of | ||||
| a PW to the native service. | ||||
| 4) Only the permanent emulated circuit type (e.g. PVC/PVP) is | ||||
| considered initially. The switched emulated circuit type (e.g. | ||||
| SVC/SVP) will be for further study. | ||||
| 5) The creation and placement of the PSN tunnel to support the PW is | ||||
| not within the scope. | ||||
| 6) The current PW encapsulation approach considerations are focused | ||||
| on IPv4, IPv6, L2TP and MPLS. Other encapsulation approaches are | ||||
| for further study. | ||||
| 7) Current PW service applications are focused on Ethernet (i.e. | ||||
| Ethernet II (DIX), 802.3 "raw", Ethernet 802.2, Ethernet SNAP, | ||||
| 802.3ac VLAN), Frame Relay, ATM, TDM (e.g. DS1, DS3, E1, SONET/SDH | ||||
| etc.) and MPLS. | ||||
| 8) Within the single administrative PWD, the design of the PW assumes | ||||
| the inheritance of the security mechanism that has been applied to | ||||
| the emulated services. No PW specific security mechanism will be | ||||
| specified. | ||||
| 3.4. Suitable Applications for PWE3 | ||||
| What make an application suitable (or not) for PWE3 emulation? When | ||||
| considering PWs as a means of providing an application, the following | ||||
| questions must be considered: | ||||
| - Is the application sufficiently deployed to warrant emulation? | ||||
| - Is there interest on the part of service providers in providing an | ||||
| emulation for the given application? | ||||
| - Is there interest on the part of equipment manufacturers in | ||||
| providing products for the emulation of a given application? | ||||
| - Are the complexities and limitations of providing an emulation | ||||
| worth the savings in capital and operational expenses? | ||||
| If the answer to all four questions is "yes", then the application is | ||||
| likely to be a good candidate for PWE3. Otherwise, there may not be | ||||
| sufficient overlap between the customers, service providers, | ||||
| equipment manufacturers and technology to warrant providing such an | ||||
| emulation. | ||||
| 3.5. Design Issues | ||||
| If an application appears to be suitable, what are the design issues | ||||
| that must be considered? | ||||
| - Preservation of Order - Does the application require in-order | ||||
| delivery of data? Emulation of an application that requires in- | ||||
| order delivery over a PSN that does not guarantee such delivery may | ||||
| be difficult. On the other hand, the required complexity may more | ||||
| than pay for itself in terms of other savings in capital and | ||||
| operational costs. | ||||
| - Preservation of Timing - Does the application require fine-grain | ||||
| preservation of timing? If so, the adaptation may be complicated | ||||
| by providing such timing where it is not normally available. | ||||
| - Natural Delineation - What is the "natural" boundary for | ||||
| delineation of data for encapsulation? (Note: For bit/byte- | ||||
| oriented services, such as TDM emulation, this "natural" | ||||
| delineation may not necessarily be the overriding consideration for | ||||
| determining the best "chunk" for packetizing the service.) | ||||
| - Packet Size - Are the encapsulated packets variable or fixed in | ||||
| size? Variable size packets may required a length field, whereas | ||||
| fixed size packet may not. Does the packet size of the emulated | ||||
| service exceed the MTU of the underlying PSN? If it does, then | ||||
| segmentation and reassembly may be required. | ||||
| - Data Rate - Is the data rate presented at the interface fixed or | ||||
| variable? | ||||
| Each of these factors requires consideration in an AS for a given | ||||
| PWE3 service. | ||||
| 4. Layer 1 (Circuit) Applications | ||||
| For circuit applications the entire bit stream (or at least the | ||||
| payload) needs to be recreated at the far end of the PW. As with ATM | ||||
| CES, the physical layer coding is terminated and re-generated on the | ||||
| far end. In addition, framing may be terminated and regenerated, | ||||
| depending on the application. | ||||
| 4.1. Reference Model | ||||
| Figure 4 below shows a pair of T1s being carried over a TDM/SONET | ||||
| network. The node marked "M" is an M13 multiplexer, while the nodes | ||||
| marked "S" are SONET Add-Drop Multiplexers (ADMs). Note that the | ||||
| physical interface of the circuit may change without affecting the | ||||
| circuit. For example, the T1s in Figure 4 below enter the network as | ||||
| physical T1s but exit the network as Virtual Tributaries (VTs) in a | ||||
| physical OC12. | ||||
| SONET/TDM Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ | ||||
| +------+ Physical / \__/ \ | ||||
| |Site A| T1 / +---+ DS3 \ Hub Site | ||||
| |T1 #1=|=================|\M/|-------------+-----+ \ OC12+------+ | ||||
| | | \ |/ \|=============|\ /| \----| | | ||||
| +------+ /\ +---+-------------| \ / |========|=T1 #1| | ||||
| / | S | / | | | ||||
| +------+ Physical/ +---+-------------| / \ |========|=T1 #2| | ||||
| |Site B| T1 \ |\S/|=============|/ \| \----| | | ||||
| |T1 #2=|=================|/ \|-------------+-----+ / +------+ | ||||
| | | \ +---+ OC3 __ / | ||||
| +------+ \ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 4: T1/SONET Example Diagram | ||||
| Figure 5 below shows the same pair of T1s being carried over a packet | ||||
| network. Here the emulation is performed by the PEs marked "PE", and | ||||
| the routers marked "R" carry the resulting packets. Note that the | ||||
| PE, routing and/or SONET functions could be combined in the same | ||||
| device. Such combinations are likely and should be considered when | ||||
| creating an encapsulation format. | ||||
| SONET/TDM/Packet Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ | ||||
| +------+ Physical /+-+ \__/ \_ | ||||
| |Site A| T1 / | | +---+ \ Hub Site | ||||
| |T1 #1=|=============|P|=| R | +---+ +-+ +-----+ \ OC12+------+ | ||||
| | | \ |E| | |===| | | |=|\ /| \----| | | ||||
| +------+ /\+-+ +---+ | | | | | \ / |========|=T1 #1| | ||||
| / | R |=|P| | S | / | | | ||||
| +------+ Physical/ +-+ +---+ | | |E| | / \ |========|=T1 #2| | ||||
| |Site B| T1 \ |P| | R |===| | | |=|/ \| \----| | | ||||
| |T1 #2=|=============|E|=| | +---+ +-+ +-----+ / +------+ | ||||
| | | \ | | +---+ __ / | ||||
| +------+ \ +-+ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 5: T1 Emulation Example Diagram | ||||
| 4.2. Operational Considerations | ||||
| 4.2.1. Transparency | ||||
| Circuits such as T1/E1/T3/E3/SONET/SDH lines need a greater degree of | ||||
| transparency than Layer 2 services described in Section 5. These | ||||
| circuits may be carrying the services described in the Section 5, but | ||||
| in the Layer 1 scenario the higher layer application is irrelevant | ||||
| and is ignored. In general, circuits are "bits in, bits out" | ||||
| applications. | ||||
| In this application a circuit or bit stream is encapsulated in frames | ||||
| and sent over the PSN. These frames are typically of a fixed size | ||||
| sent at a fixed rate, but features such as compression and/or | ||||
| suppression of idle circuits could introduce variability. The | ||||
| emulated stream must be delivered in a reliable and predictable | ||||
| fashion to the far end. Absolute delay and delay variation (also | ||||
| called jitter or wander) must be minimized. Excess delay and delay | ||||
| variation may cause problems with the application carried by the | ||||
| TDM/SONET CEs. | ||||
| 4.2.2. Structured Versus Unstructured Mode For TDM Circuits | ||||
| As discussed in [ATMCES], emulation of a T1, E1 or other circuit can | ||||
| be done in a structured (framed) mode or in an unstructured | ||||
| (unframed) mode. This same distinction can be applied to higher rate | ||||
| circuits such as DS3, E3, and SONET/SDH. | ||||
| Unstructured mode generally involves collecting all bits received | ||||
| from a physical port (including transport framing), and packing them | ||||
| into packets for transport through the PSN. The fact that the | ||||
| received bit stream contains a framed signal is more or less | ||||
| irrelevant to the adaptation function. | ||||
| Structured mode requires the use of a framer to identify and | ||||
| terminate the incoming transport framing, and possibly delineate | ||||
| logical TDM channels within the TDM bit stream for emulation. In | ||||
| addition, TDM framers are generally needed to detect maintenance | ||||
| signals such as Alarm Indication Signal (AIS) and Remote Defect | ||||
| Indication (RDI). Framers are also used to measure various | ||||
| performance parameters such as Errored Seconds, Frame Errored | ||||
| Seconds, etc. Lastly, a framer is needed to generate and terminate | ||||
| the Facility Data Link (FDL) as well as the SONET/SDH Data | ||||
| Communications Channels (DCCs). | ||||
| The capabilities described in the rest of this section (except for | ||||
| LOS) are predicated on structured mode and the presence of a framer. | ||||
| 4.2.3. Fractional T1/E1 | ||||
| A fractional T1 or E1 is composed of a number of concatenated DS0s | ||||
| and is sometimes referred to as NxDS0. It may be emulated by | ||||
| replicating the contents of the relevant DS0s at the other end of the | ||||
| tunnel. The value of the other timeslots and/or framing are | ||||
| irrelevant and are not transported in leased line application. Even | ||||
| though the framing is not transported, a framer is still needed to | ||||
| delineate the timeslots for encapsulation. | ||||
| 4.2.4. STS-1/Nc | ||||
| The SONET/SDH equivalent to Structured T1/E1 services are STS-1/Nc | ||||
| and their SDH equivalents. For STS-1/Nc services, a single SONET | ||||
| timeslot or a concatenation of multiple timeslots is used to carry a | ||||
| single logical circuit. As with structured T1/E1 services, the | ||||
| transport framing (i.e. SONET Section and Line Overhead) is | ||||
| terminated, and only the relevant SONET timeslots are carried through | ||||
| the packet network. A single physical SONET interface can be the | ||||
| source of multiple STS-1/Nc services, each of which may be emulated | ||||
| as an independent PWE3 service. | ||||
| 4.2.5. Loopbacks | ||||
| It could be useful for a PE to process loopback messages such as | ||||
| those defined in [T1.403]. These loopbacks allow for isolation of | ||||
| faults in a network. They also facilitate the certification of | ||||
| equipment for operation in a carrier's network. | ||||
| There are also inband loopback commands that are used for voice | ||||
| equipment. These loopback commands are triggered by patterns carried | ||||
| in the data itself. Voice is limited in the patterns it can present, | ||||
| so it won't falsely mimic the inband loopback commands. These inband | ||||
| commands are falling out of favor due to their incompatibility with | ||||
| data services. The inband pattern for the loopback may inadvertently | ||||
| appear in a data stream due to its arbitrary nature. A PE device | ||||
| that implements inband loopbacks should have the capability to | ||||
| disable them. | ||||
| 4.2.6. Performance Processing | ||||
| [T1.403] defines a Network Performance Report Message (NPRM) that | ||||
| carry periodic reports on the performance of the link. It would be | ||||
| useful for a PE to generate these messages, as they are frequently | ||||
| used for surveillance and trouble-shooting. | ||||
| 4.2.7. LOS/LOF/AIS | ||||
| Figure 6 shows an example for the generation of AIS and RAI. | ||||
| <-- Upstream Downstream --> | ||||
| LOS +-----+ AIS | ||||
| ------X----->|\ /|---------> | ||||
| | \ / | | ||||
| | / \ | | ||||
| <------------|/ \|<--------- | ||||
| RAI/RDI+Data +-----+ Data | ||||
| Figure 6: Generation of AIS and RAI/RDI | ||||
| A TDM multiplexer, SONET ADM, switch or other line terminating | ||||
| equipment (LTE) must respond to an LOS (Loss of Signal), LOF (Loss of | ||||
| Frame) or AIS (Alarm Indication Signal) condition (traditionally | ||||
| known as "red alarms") by generating AIS in the "downstream" | ||||
| direction i.e. the same direction in which the LOS was detected. AIS | ||||
| is conveyed by sending a certain pattern in the data stream. It may | ||||
| also send RAI (or RDI in SONET) in the "upstream" direction i.e. the | ||||
| opposite direction from that where the LOS was detected. See section | ||||
| 9 of [T1.403] for more information on T1 AIS and RAI. See section | ||||
| section 6.2.1 in [GR253] for more information on the SONET AIS-L and | ||||
| RDI-L signals. | ||||
| Bandwidth can be saved by suppressing the AIS signal in the emulated | ||||
| stream and sending instead an indication in the control overhead. | ||||
| This also applies to a received AIS signal. [MALIS] discusses the | ||||
| propagation of AIS using the pointer bits in the TDM control word. | ||||
| A device emulating TDM circuit must either replicate the AIS | ||||
| indication or indicate this condition in the control overhead. | ||||
| 4.2.8. SONET/SDH STS Unequipped | ||||
| The "STS Unequipped" indication may be treated in a fashion similar | ||||
| to that for LOS/AIS. As discussed in [MALIS], bandwidth can be saved | ||||
| by suppressing the payload in the emulated stream and sending instead | ||||
| an indication in the control overhead. | ||||
| 4.3. Encapsulations | ||||
| Encapsulation options for TDM services may be compared on the | ||||
| following criteria. | ||||
| - Timing - TDM services are very sensitive to timing and timing | ||||
| variations ("jitter"). The encapsulation may need to provide | ||||
| additional information (such as [RTP] timestamps) to help convey | ||||
| timing across the PW. | ||||
| - Line Signals - The encapsulation should provide a means to convey | ||||
| signals such as AIS and line conditions such as LOF. | ||||
| - Overhead - The encapsulation should minimize overhead. | ||||
| 4.4. Timing | ||||
| In the recent Ken Burns Jazz television series, it was said of Louis | ||||
| Armstrong that he was very economical with his notes, but that the | ||||
| timing of those notes was everything. The timing of the | ||||
| reconstructed bit stream is similarly important. This section | ||||
| describes the various approaches to this problem. A summary is also | ||||
| provided at the end of the section. | ||||
| 4.4.1. Reference Model | ||||
| Consider the example network shown in Figure 7. In this network, CE1 | ||||
| and CE2 are connected by a PW provided by PE1, S1, S2 and PE2. | ||||
| +---------------+ +---------------+ | ||||
| | PE1 | | PE2 | G | ||||
| | | | | | | ||||
| | | | | v | ||||
| +---+ | +-+ +-+ +-+ | +--+ +--+ | +-+ +-+ +-+ | +---+ | ||||
| | | | |P| |D| |P| | | | | | | |P| |E| |P| | | | | ||||
| | |<===|h|<:|e|<:|h|<:::| |<::| |<:::|h|<:|n|<=|h|<===| | | ||||
| | | | |y| |c| |y| | | | | | | |y| |c| |y| | | | | ||||
| | C | | +-+ +-+ +-+ | | | | | | +-+ +-+ +-+ | | C | | ||||
| | E | | | |S1| |S2| | | | E | | ||||
| | 1 | | +-+ +-+ +-+ | | | | | | +-+ +-+ +-+ | | 2 | | ||||
| | | | |P| |E| |P| | | | | | | |P| |D| |P| | | | | ||||
| | |===>|h|=>|n|:>|h|:::>| |::>| |:::>|h|:>|e|=>|h|===>| | | ||||
| | | | |y| |c| |y| | | | | | | |y| |c| |y| | | | | ||||
| +---+ | +-+ +-+ +-+ | +--+ +--+ | +-+ +-+ +-+ | +---+ | ||||
| ^ ^ | | ^ ^ ^ | | | ^ ^ ^ | ^ ^ | ||||
| | | | |B | | | |<------+------>| |D | | | | | | | ||||
| | A | +--+ +--+-C | | | +--+ +--+-E | F | | ||||
| | +---------------+ +-+ +---------------+ | | ||||
| | |I| | | ||||
| | +-+ | | ||||
| | | | | ||||
| +-----------------------------+-----------------------------+ | ||||
| Where: | ||||
| "CEn" is the TDM edge device | ||||
| "PEn" is the PE adaptation device | ||||
| "Sn" is a core switch | ||||
| "A" - "I" are clocks | ||||
| "=" is the T1 Bit Stream | ||||
| ":" is the switched connection | ||||
| "Phy" is a physical interface | ||||
| "Enc" is a PWE3 encapsulation device | ||||
| "Dec" is a PWE3 decapsulation device | ||||
| Figure 7: Timing Recovery Reference Diagram | ||||
| For this application to work, CE2 needs to be clocked (by clock E) at | ||||
| the same frequency as CE1 (which is being clocked by clock A). A | ||||
| jitter correction buffer at PE2 can handle short-term differences | ||||
| between these two clocks, but over time any absolute difference is | ||||
| going to cause this buffer to overflow or underflow. | ||||
| Bits are clocked into an encapsulation function in PE1 according to | ||||
| clock B, which is recovered from the incoming data stream. Clocks A | ||||
| and B will have the same frequency. | ||||
| The bits are packed into frames and clocked out according to clock C. | ||||
| Clock C could be related to clock B, but in most cases these clocks | ||||
| are completely independent. | ||||
| The frames arrive at switch S1, and are clocked out according to the | ||||
| internal oscillator on the output interface of switch S1. The frames | ||||
| will depart at the same average rate at which they arrived, but the | ||||
| instantaneous rate will be different on each side of S1. Note that | ||||
| there could be short-term variations due to congestion, but S1 can't | ||||
| experience long-term congestion with respect to the frames carrying | ||||
| emulated data, or the service won't work. | ||||
| The frames travel on to switch S2, which again forwards them. Note | ||||
| that switch S2 introduces yet another clock, which it uses to | ||||
| transmit the packets toward PE2. Again the average rate is | ||||
| preserved, but the instantaneous rate will vary. | ||||
| The frames arrive at PE2 and are clocked into the decapsulation | ||||
| function when they arrive (using clock D). Note that clock D will | ||||
| have the same average frequency as A and B, but will have short-term | ||||
| variations. The bits are clocked out of the FIFO according to clock | ||||
| E. Clock F at CE2 is recovered from the bit stream and therefore | ||||
| runs at the same frequency as clock E. | ||||
| 4.4.2. Recreating the Timing | ||||
| The big question is: where does clock E in Figure 7 come from? There | ||||
| are 5 possibilities, and these are detailed in the following | ||||
| sections. | ||||
| 1) Clock E is derived from an external source such as clock I or B | ||||
| (indirectly via A) at CE1 and G (indirectly via H) at CE2. This | ||||
| method is described in the "External Timing" section below. | ||||
| 2) Clock E could be derived from Clock I and the pointers. This | ||||
| approach is described in the "SONET Pointer Justification" section | ||||
| below. | ||||
| 3) Clock E is derived from the average rate of Clock D. This is the | ||||
| "Adaptive Timing" scenario described in a subsequent section. | ||||
| 4) Clock E is derived from a combination of the local oscillator at | ||||
| PE2 and received SRTS timestamps. The "Differential (SRTS)" | ||||
| section below describes this approach. | ||||
| 5) Clock E is derived from inband RTP timestamps. This method is | ||||
| discussed in the "RTP" section below. | ||||
| 4.4.2.1. External Timing | ||||
| The simplest method for communicating timing from one end of a system | ||||
| to the other is an external timing source, such as clock I in Figure | ||||
| 7. This external timing source is normally a T1 or E1, but it could | ||||
| be delivered via SONET or a GPS receiver. Its 8 KHz frame rate is | ||||
| extracted and used to directly clock the reconstructed data streams, | ||||
| or as an input to a phase-locked loop to synthesize the desired | ||||
| clock. The drawback to this method is that a common external clock | ||||
| is not commonly available in a data network or in a multi-carrier | ||||
| network. | ||||
| Note that clock I may actually be two separate clocks of a particular | ||||
| accuracy or stratum. The difference in frequency will eventually | ||||
| cause the FIFO to slip, but if the clock is of a high enough accuracy | ||||
| then the slips will be very infrequent. For example, a stratum 1 | ||||
| clock is accurate to one part in 10**11 [G.811]. This gives a | ||||
| frequency slip rate of 15.4**-6 bit-slip/sec: | ||||
| slip rate = 1.544 Mbps * 10**-11 | ||||
| = 15.4**-6 bit-slip/sec | ||||
| Taking the reciprocal yields 18 hours/bit-slip: | ||||
| bit slip period = 1 / ( 15.4**-6 bit-slip/sec * 3600 s/h) | ||||
| = 18 hours/bit-slip. | ||||
| A typical multiplexer has a buffer that is two frames deep. Assuming | ||||
| that it starts out centered, the expected time for a slip would be | ||||
| almost 5 months: | ||||
| frame slip period = 18 hours/bit-slip * 193 bits/frame | ||||
| = 3474 hours | ||||
| = 145 days | ||||
| = 4.8 months | ||||
| This slip rate could be higher or lower depending on the bit rate, | ||||
| clock accuracy and the depth of the FIFO. | ||||
| 4.4.2.2. SONET Pointer Justification | ||||
| SONET defines layers of pointers that allow for the multiplexing and | ||||
| transmission of asynchronous signals. These pointers convey the | ||||
| timing of the carried signal with respect to the timing of the | ||||
| encapsulating signal. Each SONET ADM must manipulate these pointers | ||||
| to preserve the timing. This method has the advantage of being well- | ||||
| defined and understood. | ||||
| One way to apply this method to a packet-based network would be to | ||||
| ensure that all of the links on a given path are synchronous. This | ||||
| would be difficult for Gigabit Ethernet or POS links. | ||||
| Another way would be for each router to update the pointers as the | ||||
| packet traversed the router. This would be compute intensive. | ||||
| The method defined in [MALIS] requires pointer manipulation only at | ||||
| the end points. It does require an external clock as a reference for | ||||
| the pointer adjustments. | ||||
| 4.4.2.3. Adaptive Timing | ||||
| Adaptive timing is used when an external reference is not available. | ||||
| [ATMCES] describes adaptive timing as follows: | ||||
| The adaptive technique does not require a network-wide | ||||
| synchronization signal to regenerate the input Service | ||||
| clock at the output IWF. A variety of techniques could be | ||||
| used to implement Adaptive clock recovery. For example, | ||||
| the depth of the reassembly buffer in the output IWF could | ||||
| be monitored: | ||||
| 1. When the buffer depth is too great or tends to increase | ||||
| with time, the frequency of the Service clock could be | ||||
| increased to cause the buffer to drain more quickly. | ||||
| 2. When the buffer contains fewer than the configured | ||||
| number of bits, the Service clock could be slowed to | ||||
| cause the buffer to drain less quickly. Wander may be | ||||
| introduced by the Adaptive clock recovery technique if | ||||
| there is a low-frequency component to the Cell Delay | ||||
| Variation inserted by the ATM network carrying cells | ||||
| from the input to output IWF. | ||||
| Careful design is required to make adaptive timing work | ||||
| well. The instantaneous buffer depth must be filtered to | ||||
| extract the average frequency and to reject the jitter and | ||||
| wander. | ||||
| Adaptive timing is ideal for many network applications where there is | ||||
| no external timing reference available (needed for SRTS), and where | ||||
| the packet rate is decoupled from the line rate (as in a routed | ||||
| network). Adaptive timing may not meet the requirements of [G.823], | ||||
| [G.824] and other similar specifications. | ||||
| 4.4.2.4. Differential (SRTS) | ||||
| [ATMCES] describes the SRTS (Synchronous Residual Time Stamp) method: | ||||
| The SRTS technique measures the Service Interface input | ||||
| clock frequency against a network-wide synchronization | ||||
| signal that must be present in the IWF, and sends | ||||
| difference signals, called Residual Time Stamps, in the | ||||
| AAL1 header to the reassembly IWF. At the output IWF, the | ||||
| differences can be combined with the network-wide | ||||
| synchronization signal to re-create the input Service | ||||
| Interface clock. | ||||
| The requirement for a network-wide signal is reasonable in a Telco or | ||||
| SONET environment, where such clocks are commonly available. It may | ||||
| be problematic in a packet network. | ||||
| Here is the correspondence between the clocks in Figure 7 and | ||||
| [I.363.1]. | ||||
| Description I.363.1 Figure 7 | ||||
| ------------------------------------------ | ||||
| Service Clock Fs A, B | ||||
| Network Clock Fn C | ||||
| Derived Reference Fnx Based on C | ||||
| 4.4.2.5. RTP | ||||
| [RTP] uses an absolute timestamp to play out the bits at the same | ||||
| rate that they were received and packetized. RTCP (RTP Control | ||||
| Protocol) provides a means to synchronize the transmit and receive | ||||
| clocks. | ||||
| 4.4.2.5.1. RTP Timestamps | ||||
| Section 4 of [RTP] defines a timestamp that is either 32-bits or | ||||
| 64-bits in size: | ||||
| Wallclock time (absolute time) is represented using the | ||||
| timestamp format of the Network Time Protocol (NTP), which | ||||
| is in seconds relative to 0h UTC on 1 January 1900 [NTP]. | ||||
| The full resolution NTP timestamp is a 64-bit unsigned | ||||
| fixed-point number with the integer part in the first 32 | ||||
| bits and the fractional part in the last 32 bits. In some | ||||
| fields where a more compact representation is appropriate, | ||||
| only the middle 32 bits are used; that is, the low 16 bits | ||||
| of the integer part and the high 16 bits of the fractional | ||||
| part. The high 16 bits of the integer part must be | ||||
| determined independently. | ||||
| A 32-bit absolute time stamp with a 16-bit fractional part would give | ||||
| a 15 us granularity (= 1/65535), which is too coarse for circuit | ||||
| emulation. This means that the 64-bit timestamp must be used, with a | ||||
| granularity of 23 ns. | ||||
| The transmit timestamps are created according to clocks B and C at | ||||
| PE1 and interpreted according to clocks D and E at PE2. These two | ||||
| oscillators will vary by some amount, even if they are very accurate. | ||||
| This drift means that RTCP, NTP or some other means must be used to | ||||
| synchronize the clocks at each end. | ||||
| 4.4.3. Summary of Timing Recovery Methods | ||||
| All of the previously described methods for timing recovery can be | ||||
| made to work for Layer 1 circuit services. How then can we compare | ||||
| them? Here are some criteria: | ||||
| - Is an external timing source required? This might be a direct | ||||
| timing source as described in "External Timing", or it could be an | ||||
| indirect source as with SRTS. | ||||
| - Must the PE synthesize clocks? Synthesis of clocks generally | ||||
| requires a Phase-Locked Loop (PLL) to create one clock from | ||||
| another. | ||||
| - Is the method provably correct? Some methods such as external | ||||
| timing and SRTS can be proven to meet specifications. The | ||||
| performance of others, such as adaptive timing, is more dependent | ||||
| on particular implementations. | ||||
| Figure 8 below shows a summary of the methods for timing recovery. | ||||
| +-----------------------------+------+-----+-----+----+-----+ | ||||
| | Method->| Ext. |SONET|SRTS |RTP/|Adap-| | ||||
| |Parameter |Source| Ptr | |RTCP|tive | | ||||
| +-----------------------------+------+-----+-----+----+-----+ | ||||
| |External timing required? | yes | yes | yes | no | no | | ||||
| |Clock synthesis? | no | yes | yes | yes| yes | | ||||
| |Provably correct? | yes | yes | yes | ? | ? | | ||||
| +-----------------------------+------+-----+-----+----+-----+ | ||||
| Figure 8: Summary of Timing Recovery Methods | ||||
| 5. Layer 2 (Packet/Cell) Applications | ||||
| 5.1. Layer 2 PW Reference Model | ||||
| Figure 9 below shows the reference model for Layer 2 PWs. The Layer | ||||
| 2 emulated protocols/services include ATM VCC, ATM VPC, Frame Relay | ||||
| DLCI, IEEE 802.1Q VLAN, IEEE 802.3x link, etc. The nodes marked "S" | ||||
| are protocol-specific switches e.g. Frame Relay switches. | ||||
| Carrier A Carrier B | ||||
| ____ ___ | ||||
| Layer 2 _/ \___/ \ ___ | ||||
| +-------+ Link / \____ / \__ Layer 2 | ||||
| |Site A |---------/ +---+ \ / \ Link | ||||
| | CE#1=|===============|\S/| || +-----+ \ +------+ | ||||
| | |--------\ |/ \|===============|\ /| \--|Site C| | ||||
| +-------+ \ +---+ || | \ / |=====|=CE#3 | | ||||
| / || | S | / | | | ||||
| +-------+ / +---+ || | / \ |=====|=CE#4 | | ||||
| |Site B |--------\ |\S/|===============|/ \| \--| | | ||||
| | CE#2=|===============|/ \| || +-----+ _/ +------+ | ||||
| | |---------\ +---+ / \__ / | ||||
| +-------+ \ / \ _/ | ||||
| \ ___ ___ \ \_/ | ||||
| \_/ \___/ \___/ | ||||
| Figure 9: Layer 2 Interconnect Reference Model | ||||
| Figure 10 below shows the reference model for PW emulation of Layer 2 | ||||
| services. | ||||
| Carrier A Carrier B | ||||
| ____ ___ | ||||
| Layer 2 _/ \___/ \ ___ | ||||
| +-------+ Link /+-+ \____ / \__ Layer 2 | ||||
| |Site A |--------/ |P| +---+ +---+ \ / \ Link | ||||
| | CE#1=|==========|W|=| R | | R | +-+ | | +-----+ \ +------+ | ||||
| | |-------\ |E| | |==| |=| |=|==|=|\ /| | |Site C| | ||||
| +-------+ \ +-+ +---+ +---+ |P| | | | \ / |=|===|=CE#3 | | ||||
| /\ |W| | | | S | | | | | ||||
| +-------+ / +-+ +---+ +---+ |E| | | | / \ |=|===|=CE#4 | | ||||
| |Site B |-------\ |P|=| R |==| R |=| |=|==|=|/ \| | | | | ||||
| | CE#2=|==========|W| | | | | | | | | +-----+ | +------+ | ||||
| | |--------\ |E| +---+ +---+ +-+ | | | | ||||
| +-------+ \+-+ / \_______/ | ||||
| \ / | ||||
| \ _ __ / | ||||
| \_/ \___/ \____/ | ||||
| Figure 10: Layer 2 PW Emulation | ||||
| 5.2. Ethernet | ||||
| 5.2.1. Reference Model | ||||
| Carriers are starting to offer Ethernet services. Today these are | ||||
| mostly full-duplex, point-to-point services provided in a | ||||
| metropolitan area. Therefore, PW emulation of Ethernet would | ||||
| probably make the most sense operating as a point-to-point trunk. | ||||
| An Ethernet interface can operate in a half-duplex or full-duplex | ||||
| mode. Control functions such as IEEE 802.1D Spanning Tree [802.1D] | ||||
| are not within the scope of PWs. However, service definitions and | ||||
| VLANS as defined in IEEE 802.1P,Q [802.1Q] should be considered in an | ||||
| Ethernet AS. | ||||
| 5.2.2. Operational Considerations | ||||
| 5.2.2.1. Operational Modes | ||||
| The design of the Ethernet PW should consider the support of two | ||||
| operational modes. Both modes should be supported for all Ethernet | ||||
| interfaces, i.e. from 10 Mbps to 10,000 Mbps, and the design of the | ||||
| Ethernet PW functions should be agnostic to the Ethernet's link | ||||
| capacity. Both modes should transparently support the address | ||||
| resolution protocols, i.e. ARP, InverseARP, proxy ARP and Ethernet- | ||||
| based control protocol (e.g. Generic Attribute Registration Protocol | ||||
| (GARP), GARP VLAN Registration Protocol (GVRP) etc.). | ||||
| - Opaque Trunking - In this mode, the ingress PE relays all of the | ||||
| traffic from an Ethernet port into the PW. | ||||
| - Transparent Trunking - This mode is particularly designed for | ||||
| support of Virtual LANs (VLAN). VLAN types include Port-based | ||||
| VLANs, MAC-Address-Based VLANs, IP-Based VLANs, 802.1Q Tag-based | ||||
| VLANs and 802.10 Security-based VLANs. | ||||
| In this mode, the ingress PE could pay attention to the MAC header | ||||
| and other relevant VLAN classification information based on the | ||||
| configuration policy. The Ethernet PW could carry traffic from | ||||
| multiple VLANs and extend them across the PWD. | ||||
| The PE could provide translation of the VLAN_ID in order to | ||||
| facilitate deployment. Note that this does not increase the | ||||
| VLAN_ID space, so it has no effect on scalability. | ||||
| 5.2.2.2. Quality Of Service Support Considerations | ||||
| The Ethernet AS should describe the faithfulness of the PW with | ||||
| respect to these attributes described in IEEE 802.1p [802.1Q]. | ||||
| - Service Availability - Service availability is measured as ratio | ||||
| between times when MAC service is unavailable and when it is | ||||
| available. | ||||
| - Frame Loss - Ethernet does not provide guaranteed delivery of | ||||
| service data units. However, the Ethernet PW system should | ||||
| consider monitoring frame loss. | ||||
| - Frame Misorder - Ethernet does not permit reordering frames within | ||||
| the same user-priority for a source and destination address pair. | ||||
| - Frame Duplication - Ethernet does not permit duplicating frames. | ||||
| - Transit Delay Performance - IEEE 802.1p [802.1Q] defines frame | ||||
| transit delay as the elapsed time between an MA_UNITDATA.request | ||||
| and corresponding MA_UNITDATA.indication on a successful transfer. | ||||
| - Undetected Frame Error Rate - By using the Frame Checksum (FCS) | ||||
| calculation for each frame, the undetected frame error rate should | ||||
| be low. | ||||
| - Maximum Service Data Unit Size - The maximum service data unit size | ||||
| is dependent on the access media used. In general, it is the | ||||
| lowest common denominator of the two adjacent Ethernet interface. | ||||
| - Priority Tags and Traffic Classes - IEEE 802.1p defines eight | ||||
| traffic classes (priority). The PRI bits on the VLAN fields should | ||||
| be carried transparently over the PW. COS differentiation on the | ||||
| PW level based on the received 802.1p bits is possible but is out- | ||||
| of-scope. | ||||
| 5.3. Frame Relay | ||||
| 5.3.1. Reference Model | ||||
| Frame Relay service offerings often have a different physical format | ||||
| and speed at each end of the link. For example, a hub and spoke | ||||
| deployment of Frame Relay might provide fractional T1 access at the | ||||
| spokes and a clear channel T3 to the hub. The Virtual Circuits (VCs) | ||||
| are aggregated by switches in the Frame Relay network. This is shown | ||||
| in figure 11 below, where the Frame Relay switches are marked with an | ||||
| "F". | ||||
| Wide Area Frame Relay Network | ||||
| Carrier A Carrier B | ||||
| ____ ___ | ||||
| Fractional _/ \___/ \ ___ | ||||
| +------+ T1 / \____ / \__ | ||||
| |Site A|-----------/ +---+ \ / \ Hub Site | ||||
| |VC #1=|=================|\F/| || +-----+ \ DS3+------+ | ||||
| | |----------\ |/ \|===============|\ /| \---| | | ||||
| +------+ \ +---+ || | \ / |======|=VC #1| | ||||
| /\ || | F | / | | | ||||
| +------+ / +---+ || | / \ |======|=VC #2| | ||||
| |Site B|----------\ |\F/|===============|/ \| \---| | | ||||
| |VC #2=|=================|/ \| || +-----+ _/ +------+ | ||||
| | |-----------\ +---+ / \__ / | ||||
| +------+ Trans- \ / \ _/ | ||||
| Atlantic E1 \ ___ ___ \ \_/ | ||||
| \_/ \___/ \___/ | ||||
| Figure 11: Frame Relay Example Model | ||||
| Figure 12 shows an emulated network, where Carrier "A" is providing a | ||||
| transparent Frame Relay emulation connection to Carrier "B". | ||||
| Wide Area Frame Relay/Router Network | ||||
| Carrier A Carrier B | ||||
| ____ ___ | ||||
| Fractional _/ \___/ \ ___ | ||||
| +------+ T1 /+-+ \____ / \__ | ||||
| |Site A|------------/ | | +---+ \ / \ Hub Site | ||||
| |VC #1=|==============|P|=| R | +---+ +-+ || +-----+ \ DS3+------+ | ||||
| | |-----------\ |E| | |==| |=| |====|\ /| \---| | | ||||
| +------+ \ +-+ +---+ | | | | || | \ / |======|=VC #1| | ||||
| / \ | R | |P| || | F | / | | | ||||
| +------+ / +-+ +---+ | | |E| || | / \ |======|=VC #2| | ||||
| |Site B|----------\ |P| | R |==| |=| |====|/ \| \---| | | ||||
| |VC #2=|==============|E|=| | +---+ +-+ || +-----+ / +------+ | ||||
| | |-----------\ | | +---+ / \_ / | ||||
| +------+ Trans- \ +-+ / \ _/ | ||||
| Atlantic E1 \___ ___ __ \ \__/ | ||||
| \_/ \___/ \__/ | ||||
| Figure 12: Frame Relay Emulation Example Diagram For Transparent | ||||
| Emulation | ||||
| Here the emulation is performed by the PEs marked "PE", and the | ||||
| resulting packets are carried by the routers marked "R". In this | ||||
| case, the emulated VCs can transparently carry the PVC status | ||||
| signaling (if any) and need not perform any higher layer function. | ||||
| Also, note that the emulation and routing functions could be combined | ||||
| in the same device. | ||||
| If the Frame Relay switches are to be completely eliminated (as shown | ||||
| in figure 13 below), then the emulation service must implement Frame | ||||
| Relay PVC status signaling and/or connection signaling for SVCs. As | ||||
| previously noted, the PE and routing functions could be combined in | ||||
| the same device. | ||||
| Wide Area Frame Relay/Router Network | ||||
| Carrier A Carrier B | ||||
| ____ ___ | ||||
| Fractional _/ \___/ \ _____ | ||||
| +------+ T1 /+-+ \____ / \__ | ||||
| |Site A|----------/ | | +---+ \ / \ Hub Site | ||||
| |VC #1=|============|P|=| R | +---+ +-+ || \ DS3 +------+ | ||||
| | |---------\ |E| | |==| |=| | || \----| | | ||||
| +------+ \ +-+ +---+ | | | |====================|=VC #1| | ||||
| /\ | R | |P| || / | | | ||||
| +------+ / +-+ +---+ | | |E|====================|=VC #2| | ||||
| |Site B|---------\ |P| | R |==| |=| | || \----| | | ||||
| |VC #2=|============|E|=| | +---+ +-+ || _/ +------+ | ||||
| | |----------\ | | +---+ / \__ / | ||||
| +------+ Trans- \+-+ / \ _/ | ||||
| Atlantic E1 \___ ___ _ \ \__/ | ||||
| \_/ \__/ \___/ | ||||
| Figure 13: Frame Relay Emulation Example Diagram For Non-Transparent | ||||
| Emulation | ||||
| 5.3.2. Operational Considerations | ||||
| Frame Relay provides a connection-oriented circuit-based carriage of | ||||
| variable-sized frames. There are two types of virtual circuits | ||||
| supported in Frame Relay: Permanent Virtual Circuits (PVCs) and | ||||
| Switched Virtual Circuits (SVCs). The following sections describe | ||||
| the considerations to support the operation of Frame Relay over the | ||||
| PW. | ||||
| 5.3.2.1. Frame Sequence | ||||
| The PW must deliver frames in the proper sequence. | ||||
| 5.3.2.2. Frame Size | ||||
| In general, the maximum frame size for Frame Relay is 1600 bytes per | ||||
| [FRF.1.2]. This can be made larger in some implementations. If the | ||||
| MTU of the PW is less than (1600 bytes - size of PW headers), a | ||||
| fragmentation and reassembly mechanism may be needed. | ||||
| 5.3.2.3. End-to-End Characteristics | ||||
| [FRF.5] and [FRF.13] define a set of traffic parameters to support | ||||
| Service Level Agreements (SLAs). The design of the PW may be | ||||
| required to preserve these end-to-end transport characteristics. | ||||
| 5.3.2.4. Connection Management and Congestion Control | ||||
| Each Frame Relay header contains some connection management | ||||
| information, including | ||||
| - a command/response (CR) bit | ||||
| - a discard eligibility (DE) bit | ||||
| - a connection ID (DLCI) | ||||
| - an address extension indicator (EA) | ||||
| - Forward/Backward Congestion Notification (FECN/BECN). Figure 14 | ||||
| shows an example of how BECN and FECN are sent. | ||||
| --Congestion-> | ||||
| +-----+ Data+FECN | ||||
| ------------>|\ /|---------> | ||||
| | \ / | | ||||
| | / \ | | ||||
| <------------|/ \|<--------- | ||||
| BECN+Data +-----+ Data | ||||
| Figure 14: Generation of BECN and FECN | ||||
| All of this information is vital to the integrity of the Frame Relay | ||||
| circuit. The Frame Relay PW AS must define a means to preserve such | ||||
| information across the PWD. | ||||
| 5.3.2.5. Link Management Support | ||||
| Frame Delay defines a set of link management functions for PVC Status | ||||
| Management as specified in [T1.617D] and [Q.933A]. Link Management | ||||
| runs on a dedicated PVC; therefore, its operation does not impact | ||||
| actual user data. The management functions include: | ||||
| - a heartbeat exchange that verifies that the link is operational | ||||
| - a report regarding the status of one or more individual DLCIs | ||||
| For some networks, such as the one shown in Figure 13, this link | ||||
| management is the only means to verify the end-to-end integrity of | ||||
| the Frame Relay virtual circuit. The PE may required to emulate such | ||||
| functions. These functions will be transparent to the underlying | ||||
| network. | ||||
| Another important consideration is that there should be some | ||||
| coordination between the PW's link status and the associated Frame | ||||
| Relay VCs. For example, it might be necessary to tear down the VCs | ||||
| in the presence of a network fault. | ||||
| 5.3.2.6. DLCI Association | ||||
| There are two scopes of DLCI addressing that have been defined by | ||||
| ANSI and ITU-T: Local and Global DLCIs. | ||||
| - Local DLCI addressing means that DLCI numbers are only significant | ||||
| at one end of a Frame Relay virtual circuit. | ||||
| - Global DLCI addressing is an extension to PVC status management | ||||
| that allows a DLCI number to have universal significance. A global | ||||
| DLCI identifies the same VC at both ends of the network. | ||||
| In the case when the DLCI is locally significant, the management of | ||||
| the PWD must provide a mechanism to coordinate the DLCIs at the two | ||||
| ends of the PW. The association can be done via PW maintenance or by | ||||
| configuration. | ||||
| 5.3.2.7. Multiplexing VCs over PWs | ||||
| To preserve PW tunnel space and to enhance scalability of PWs, it | ||||
| would be very valuable to allow one or more VCs to be multiplexed | ||||
| onto the same PW. One scenario might be to associate an entire Frame | ||||
| Relay logical interface to a PW. Another possibility is that the | ||||
| assignment of VCs to the PW could be done via signaling or | ||||
| management. In either of these cases, the DLCI for each frame would | ||||
| need to be preserved across the PW. | ||||
| If such multiplexing approach is used, the earlier discussion related | <Editor's Note: Luca Martini has asked that a section be added | |||
| to the packet sequencing, end-to-end characteristics, SLA | describing the architecture of the maintenance protocol(s). This | |||
| preservation and link status management needs to be considered. | section will contain that architecture. Some possible topics are | |||
| listed below.> | ||||
| 5.3.2.8. Signaling Transparency | 3.3.1. PW Setup | |||
| Since Frame Relay supports SVCs, the PE may need to support signaling | How are PWs set up? | |||
| interworking at the PWES. InverseARP frames should be passed on | ||||
| without interpretation. In either case, these frames will be | ||||
| transparent to the underlying PSN. | ||||
| 5.3.2.9. Soft PVC Support | 3.3.2. PW Integrity | |||
| One type of connection service that is provided by Frame Relay | How do we ensure the sanity or connectivity of the PW over the PSN? | |||
| networks is called a Soft PVC (SPVC). A SPVC may be considered to be | ||||
| composed of three parts: two peer-to-peer PVCs at each side of the | ||||
| core, and a SVC between them. | ||||
| Figure 15 shows the SPVC interconnection example. | 3.3.3. Service Maintenance | |||
| +---+ +---+ +---+ +---+ +---+ | How does CE maintenance behavior e.g. FR LMI, ATM AIS/RDI, etc. | |||
| | E |========| C |:::::::| C |:::::::| C |======| E | | affect the PW? | |||
| +---+ +---+ +---+ +---+ +---+ | ||||
| Where: | 3.4. Protocol Stack Reference Model | |||
| "E" is the edge switch | ||||
| "C" is the core switch | ||||
| "=" is the permanent connection | ||||
| ":" is the switched connection | ||||
| Figure 15: Example of an SPVC Over a Frame Relay Network | Figure 3 below shows the protocol stack reference model for PWs. | |||
| The creation of the SPVC within the core is triggered by detecting | +----------------+ +----------------+ | |||
| the existence of the PVCs at the edges. This detection is done | |Emulated Service| Emulated Service |Emulated Service| | |||
| either by network management or by some proprietary signaling. | |(TDM, ATM, etc).|<===========================>|(TDM, ATM, etc.)| | |||
| +----------------+ Pseudo Wire +----------------+ | ||||
| | Encapsulation |<===========================>| Encapsulation | | ||||
| +----------------+ PSN Tunnel +----------------+ | ||||
| | IP/MPLS |<===========================>| IP/MPLS | | ||||
| +----------------+ +----------------+ | ||||
| | Physical | | Physical | | ||||
| +-------+--------+ _____________ +--------+-------+ | ||||
| | / \ | | ||||
| +===============/ PSN \===============+ | ||||
| \ / | ||||
| \_____________/ | ||||
| Now consider the case where the core switches are replaced by PEs as | Figure 3: PWE3 Protocol Stack Reference Model | |||
| shown in Figure 12. The SVC connection within the core is replaced | The PW provides the CE with what appears to be a connection to its | |||
| by the PW. The PVCs configuration which are maintained by the | peer at the far end. Bits or PDUs from the CE are passed through an | |||
| ingress and the egress CEs of the PWD should remain the same. The | encapsulation layer. | |||
| ingress and egress PEs shall maintain the SPVC behavior such that it | ||||
| is transparent to the CEs. | ||||
| 5.4. ATM | 3.5. Logical Protocol Layering Model | |||
| 5.4.1. Reference Model | 3.5.1. Protocol Layers | |||
| As far as PWE3 is concerned, ATM is very similar to Frame Relay. We | The logical protocol-layering model needed to support a PW is shown | |||
| will use the same reference network (Figure 11) for ATM as we did for | in Figure 4 below. | |||
| Frame Relay. Of course, the Frame Relay switches would be ATM | ||||
| switches instead. Likewise, the PE networks shown in Figures 12 and | ||||
| 13 are applicable to ATM. | ||||
| 5.4.2. Operational Considerations | +---------------------------+ | |||
| | Payload | | ||||
| +---------------------------+ | ||||
| | Encapsulation Layer | | ||||
| +---------------------------+ | ||||
| | Multiplexing Layer | | ||||
| +---------------------------+ | ||||
| | PSN Header | | ||||
| +---------------------------+ | ||||
| | MAC/Datalink | | ||||
| +---------------------------+ | ||||
| | Physical | | ||||
| +---------------------------+ | ||||
| Like Frame Relay, ATM provides connection-oriented circuit-based | Figure 4: Logical Protocol Layering Model | |||
| carriage of fixed-size cells. There are two types of virtual circuit | ||||
| supported in ATM: PVC and SVC. In addition to virtual circuit | ||||
| connections (VCCs), ATM also supports virtual path connections | ||||
| (VPCs). There are also permanent virtual paths (PVPs) and switched | ||||
| virtual paths (SVPs). | ||||
| ATM carries data in fixed size (53 byte) frames called "cells". | The logical protocol-layering model shown in Figure 4 above minimizes | |||
| Higher layer frames are adapted to these fixed size cells via ATM | the differences between the PWs operating over different PSN types. | |||
| Adaptation Layers (e.g. AAL1, AAL2 and AAL5) and SAR. Different | ||||
| types of AALs have different cell header formats, and the cells may | ||||
| contain signaling information. | ||||
| The following sections describe the set of considerations for PW | The payload is transported over the Encapsulation Layer that carries | |||
| support of ATM. | any information that is not available in the payload itself and which | |||
| is needed by the PW outbound interface to send the reconstructed | ||||
| service to the CE. If needed, this layer also provides support for | ||||
| real-time processing, sequencing and indication of length. | ||||
| 5.4.2.1. Cell Sequence | The Multiplexing Layer provides the ability to deliver multiple PWs | |||
| over a single PSN tunnel. | ||||
| The PW must deliver cells in the proper sequence. | The PSN header, MAC/datalink and physical layer definitions are | |||
| outside the scope of this framework. | ||||
| 5.4.2.2. End-to-end Transport Characteristics | 3.5.2. Instantiation of the Protocol Layers | |||
| The ITU-T [I.356] and the ATM Forum [TM4.0] each define a set of | The instantiation of the logical protocol-layering model of Figure 4 | |||
| traffic and QoS parameters. The AS for ATM PWs should specify how | is shown in Figure 5 below. | |||
| the PW will maintain the end-to-end characteristics for such VCs. | ||||
| 5.4.2.3. ATM SLA | Where possible, the components shown below use existing IETF | |||
| standards and common work in progress. Otherwise, the goal was to | ||||
| call for the design of components that have the wider application | ||||
| within the IETF. | ||||
| The ITU-T [I.371] defines performance targets for managing ATM | +=========================================+ - - - - - - - - - - | |||
| traffic and congestion control. These targets may be used by some | | Payload (circuit/cell/packet) | Payload | |||
| service providers to define their ATM SLAs. The AS for ATM PWs | +=========================================+ - - - - - - - - - - | |||
| should specify how SLA transparency will be achieved. | | Encapsulation-specific information | | |||
| | Sequencing (optional) | Encapsulation | ||||
| | Length (payload/PSN-specific) | Layer | ||||
| | Timing Information (payload-specific) | | ||||
| +============+============================+ - - - - - - - - - - | ||||
| | L2TPv3 | MPLS shim | Multiplexing Layer | ||||
| +------------+-------+--------------------+ - - - - - - - - - - | ||||
| | IPv4/v6 | MPLS | PSN Header | ||||
| +====================+====================+ - - - - - - - - - - | ||||
| | MAC/Data-link | | ||||
| +=========================================+ | ||||
| | Physical | | ||||
| +=========================================+ | ||||
| 5.4.2.4. Connection Management and Congestion Control | Figure 5: Instantiated Protocol Layering | |||
| The ATM header contains some connection management and congestion | 3.5.2.1. Payload | |||
| control information, as defined in [I.371]: | ||||
| - Cell Loss priority (CLP) | The payload is generically classified into three types: circuit, cell | |||
| and packet. Within these generic types there will be specific service | ||||
| types. For example, the generic packet type includes Frame Relay and | ||||
| Ethernet. The design of the encapsulation layer, and the choice | ||||
| between transporting the payload in a native or intermediate format, | ||||
| will be defined in the service-specific EEMD and/or AS. | ||||
| - Connection Identifier (VPI/VCI) | 3.5.2.1.1. Circuit Payload | |||
| - Payload Type Identifier (PTI) - distinguishes between an OAM | A circuit payload is a sampled set of bits relayed across the PW. | |||
| (Operations, Administration and Management) cell and a user cell | This service will need sequencing and real-time support. | |||
| - Explicit Forward Congestion Indication (EFCI) | 3.5.2.1.2. Cell Payload | |||
| All of this information is vital to the integrity of the ATM circuit. | A cell payload is one, or more, ATM cells relayed across the PW. This | |||
| The ATM PW AS must define a means to preserve such information across | service will need sequence number support, and may also need | |||
| the PWD. | real-time support. The payload may consist of a single cell or a | |||
| cluster of cells. The cells to be incorporated in the payload may be | ||||
| selected by filtering on VCI/VPI. In the case of a trunked interface | ||||
| the payload may be considered complete on the expiry of a timer or | ||||
| when a fixed number of cells have been received or both. | ||||
| 5.4.2.5. OAM Support | 3.5.2.1.3. Packet Payload | |||
| ATM OAM functions are defined in the ITU-T standard [I.610]. OAM | A packet payload would normally be relayed across the PW as a single | |||
| cells are used to provide functions like fault management, | unit. A packet payload may need sequencing or sequencing and | |||
| performance management and continuity checks. | real-time support. A packet payload may additionally require | |||
| fragmentation | ||||
| 3.5.2.2. Sequencing | ||||
| OAM is implemented differently in VCCs and VPCs. In the case of a | Support for sequencing depends on the payload type, and may be | |||
| VCC, the OAM cell is sent along the same VC as the user cells. For a | omitted if not needed. For example, Frame Relay always requires the | |||
| VPC, the OAM cell is sent over a dedicated VC within the VPC. OAM | preservation of packet order. However, where the Frame Relay service | |||
| flows are also classified as end-to-end flows (covering the entire | is only being used to carry IP, it may be desirable to relax that | |||
| virtual connection) or as segment flows (covering only parts of the | constraint in return for reduced per-packet processing cost. | |||
| virtual connection). | ||||
| The PE may emulate the end-to-end OAM flows by encapsulating the OAM | [RTP] or encapsulation-specific sequence numbers may be used for | |||
| cells in a PW-PDU. A PE that supports the OAM function should | sequencing. | |||
| support coordination between the OAM behavior between the PE peers. | ||||
| For example, an OAM AIS cell at one end can result in PW signaling | ||||
| that causes the PW link to go down at the far end. If the PE does | ||||
| support OAM, the emulation of the OAM function shall be transparent | ||||
| to the underlying network. | ||||
| 5.4.2.6. ILMI Support | 3.5.2.3. Timing | |||
| The Integrated Local Management Interface [ILMI] protocol facilitates | A suitable real-time protocol is RTP [RTP]. This is an extensible | |||
| network deployment and management in several ways: | protocol designed to be extended to carry new payload types over a | |||
| transport layer running over an IP network. It includes a control | ||||
| protocol for managing the timing service. RTP is not currently | ||||
| defined for operation over L2TP. A short document describing the | ||||
| correct method of multiplexing the RTP control and data over LT2Pv3 | ||||
| is required. | ||||
| - ILMI allows an ATM node to determine the various features supported | 3.5.2.4. Multiplexing Layer | |||
| by its neighbors (such as type of signaling, size of connection | ||||
| space etc). | ||||
| - ILMI allows for smoother administration of ATM addresses through | Suitable protocols for use as a multiplexing layer are L2TPv3 [LAU] | |||
| address registration. | and MPLS [MPLS]. | |||
| - ILMI facilitates automatic configuration of private interfaces. | - The updated definition of L2TP in [LAU] is specified to operate | |||
| directly over a PSN, and in the limiting case the L2TP data | ||||
| encapsulation reduces to a four-octet opaque data field. L2TPv3 is | ||||
| specified for operation in both manually configured and negotiated | ||||
| mode. The associated control protocol is extensible and may be | ||||
| used to signal PW-specific configuration or run-time information. | ||||
| - ILMI supports procedures for detecting loss of connectivity through | - MPLS may also be used in the multiplexing layer. In this case, an | |||
| periodic polling. | MPLS tag is used as a "shim" to identify the particular PW of | |||
| interest. | ||||
| For some networks, such as the one shown in Figure 13, ILMI is the | 3.5.2.5. PSN Layer | |||
| only means to verify the end-to-end integrity of the ATM virtual | ||||
| circuit. It may be desirable for the PE to emulate such functions. | ||||
| If supported, these functions must be transparent to the underlying | ||||
| network. | ||||
| 5.4.2.7. VC Associations | The three PSN types within the scope of the IETF are IPv4, IPv6 and | |||
| MPLS. IPv4 and IPv6 both provide the necessary switching, length and | ||||
| fragmentation services needed to support all IETF specified transport | ||||
| protocols. L2TPv3 is specified to run directly over IPv4 and IPv6. | ||||
| When the PSN is IPv4 or IPv6 no PSN convergence layer is needed. | ||||
| Each ATM connection identifier has local significance only. Local | MPLS provides switching service, but no length or fragmentation | |||
| significance means that each ATM connection identifier (VPI and/or | service. When MPLS is used as the PSN, the encapsulation must provide | |||
| VCI) is only significant at a local ATM interface, and is independent | length and fragmentation services, if needed. | |||
| from the identifier at the other end of the link. The management of | ||||
| the PWD must provide a mechanism to coordinate the identifiers at the | ||||
| two ends of the PW. The association can be done via PW maintenance | ||||
| or by configuration. | ||||
| 5.4.2.8. Multiplexing ATM VCs over PWs | 3.6. Architecture Assumptions | |||
| See the discussion in the "Multiplexing VCs over PWs" sub-section of | 1) The current design is focused on a point-to-point and same-to-same | |||
| the previous "Frame Relay" section of this document. | service interface at both end of the PW. Only network | |||
| interworking will be performed at the edge or the PW. Support for | ||||
| service interworking is for out of scope. | ||||
| 5.4.2.9. ATM Signaling Transparency | 2) The initial design of PWE3 is focused on a single homogeneous | |||
| administrative PWD (e.g. PW over MPLS or PW over IP etc. ONLY). | ||||
| Interworking between different PW types and the support of | ||||
| inter-domain PWs are for further study. | ||||
| See the discussion in the "Signaling Transparency" sub-section of the | 3) The design of PW will not perfectly emulate the characteristics of | |||
| previous "Frame Relay" section of this document. | the native service. It will be dependent on both the emulated | |||
| service, as well as on the network implementation. An EEMD and AS | ||||
| shall be created for each service to describe the degree of | ||||
| faithfulness of a PW to the native service. | ||||
| 5.4.2.10. Soft PVC Support | 4) Only the permanent emulated circuit type (e.g. PVC/PVP) is | |||
| considered initially. The switched emulated circuit type (e.g. | ||||
| SVC/SVP) will be for further study. | ||||
| See the discussion and figures in the "Soft PVC Support" sub-section | 5) The creation and placement of the PSN tunnel to support the PW is | |||
| of the previous "Frame Relay" section of this document. | not within the scope. | |||
| 5.4.2.11. Segmentation and Reassembly (SAR) | 6) The current PW encapsulation approach considerations are focused | |||
| on IPv4, IPv6 and MPLS. Other encapsulation approaches are for | ||||
| further study. | ||||
| The bandwidth overhead of the ATM cell is about 10% (= 5 overhead | 7) Current PW service applications are focused on Ethernet (i.e. | |||
| bytes out of 53 bytes total). For AAL5 traffic [I.363.5], it may be | Ethernet II (DIX), 802.3 "raw", Ethernet 802.2, Ethernet SNAP, | |||
| more efficient in terms of bandwidth to carry the re-assembled AAL5 | 802.3ac VLAN, 802.1Q), Frame Relay, ATM and TDM (e.g. DS1, DS3, | |||
| frames instead of the individual ATM cells. This would involve some | E1, SONET/SDH etc.). | |||
| cost in terms of a SAR operation at each end of the PW. In some | ||||
| cases, especially if OAM is required to be supported over the PW, the | ||||
| PW may have no choice but to transport the ATM traffic in cell | ||||
| format. | ||||
| Whether the ATM traffic is transported in a frame or cell format, it | 8) Within the single administrative PWD, the design of the PW assumes | |||
| is the responsibility of the PE to emulate the OAM functions to the | the inheritance of the security mechanism that has been applied to | |||
| adjacent ATM interface at each end. | the emulated services. The PW also inherits any security features | |||
| from the PSN e.g. IPsec for an IP PSN. No PW-specific security | ||||
| mechanism will be specified. | ||||
| 6. PW Maintenance | 4. Design Considerations | |||
| 6.1. PW-PDU Validation | 4.1. PW-PDU Validation | |||
| It is a common practice to use a checksum, CRC or FCS to assure end- | It is a common practice to use a checksum, CRC or FCS to assure | |||
| to-end integrity of frames. The PW service-specific mechanisms must | end-to-end integrity of frames. The PW service-specific mechanisms | |||
| define whether the packet's checksum shall be preserved across the | must define whether the packet's checksum shall be preserved across | |||
| PWD or be removed at the ingress PE and then be re-calculated at the | the PWD or be removed at the ingress PE and then be re-calculated at | |||
| egress PE. The former approach saves work, while the later saves | the egress PE. The former approach saves work, while the later saves | |||
| bandwidth. | bandwidth. | |||
| For protocols like ATM and Frame Relay, the checksum is only | For protocols like ATM and Frame Relay, the checksum is only | |||
| applicable to a single link. This is because the circuit identifiers | applicable to a single link. This is because the circuit identifiers | |||
| (e.g. Frame Relay DLCI or ATM VPI/VCI) have only local significance | (e.g. Frame Relay DLCI or ATM VPI/VCI) have only local significance | |||
| and are changed on each hop or span. If the circuit identifier (and | and are changed on each hop or span. If the circuit identifier (and | |||
| thus checksum) is going to change as a part of the PW emulation, it | thus checksum) is going to change as a part of the PW emulation, it | |||
| would be more efficient to strip and re-calculate the checksum. | would be more efficient to strip and re-calculate the checksum. | |||
| Other PDU headers (e.g. UDP in IP) do not change during transit. It | Other PDU headers (e.g. UDP in IP) do not change during transit. It | |||
| would make sense to preserve these types of checksums. | would make sense to preserve these types of checksums. | |||
| The AS for each protocol must describe the validation scheme to be | The EEMD for each protocol must describe the validation scheme to be | |||
| used. | used. | |||
| 6.2. PW-PDU Sequencing | 4.2. PW-PDU Sequencing | |||
| One major consideration of PW design is how to ensure in-sequence | One major consideration of PW design is how to ensure in-sequence | |||
| delivery of packets, if needed. The design of the PW for each | delivery of packets, if needed. The design of the PW for each | |||
| protocol must consider the support of the PSN for in-order delivery | protocol must consider the support of the PSN for in-order delivery | |||
| as well as the requirements of the particular application. for | as well as the requirements of the particular application. for | |||
| example, IP is connectionless and does not guarantee in-order | example, IP is connectionless and does not guarantee in-order | |||
| delivery. When using IP, a PW sequence number may be needed for some | delivery. When using IP, a PW sequence number may be needed for some | |||
| applications (such as TDM). | applications (such as TDM). | |||
| 6.3. Session Multiplexing | 4.3. Session Multiplexing | |||
| One way to facilitate scaling is to increase the number of PWs per | One way to facilitate scaling is to increase the number of PWs per | |||
| underlying tunnel. There are two ways to achieve this: | underlying tunnel. There are two ways to achieve this: | |||
| - For a service like Relay or ATM, all of the VCs on a given port | - For a service like Relay or ATM, all of the VCs on a given port | |||
| could be lumped together. VCs would not be distinguishable within | could be lumped together. VCs would not be distinguishable within | |||
| the PWD. | the PWD. | |||
| - Service SDUs could be distinguished within a PW-PDU by port, | - Service SDUs could be distinguished within a PW-PDU by port, | |||
| channel or VC identifiers. This approach would allow for switching | channel or VC identifiers. This approach would allow for switching | |||
| or grooming in the PWD. | or grooming in the PWD. | |||
| 6.4. Security | 4.4. Security | |||
| Each AS must specify a means to protect the control of the PWE and | Each EEMD must specify a means to protect the control of the PWE and | |||
| the PE/PW signaling. The security-related protection of the | the PE/PW signaling. The security-related protection of the | |||
| encapsulated content of the PW is outside of scope. | encapsulated content of the PW is outside of scope. | |||
| 6.5. Encapsulation Control | 4.5. Encapsulation Control | |||
| 6.5.1. Scalability | 4.5.1. Scalability | |||
| Different service types may be required between CEs. Support of | Different service types may be required between CEs. Support of | |||
| multiple services implies that a range of PWD label spaces may be | multiple services implies that a range of PWD label spaces may be | |||
| needed. If the PWD spans a PSN supporting traffic engineering, then | needed. If the PWD spans a PSN supporting traffic engineering, then | |||
| the ability to supporting label stacking would be desirable. | the ability to supporting label stacking would be desirable. | |||
| 6.5.2. Service Integration | 4.5.2. Service Integration | |||
| It may be desirable to design a PW to transport a variety of services | It may be desirable to design a PW to transport a variety of services | |||
| which have different transport characteristics. To achieve this | which have different transport characteristics. To achieve this | |||
| integration it may be useful to allow the service requirements to be | integration it may be useful to allow the service requirements to be | |||
| mapped to the tunneling label in such a way that the PWD can apply | mapped to the tunneling label in such a way that the PWD can apply | |||
| the appropriate service and transport management to the PW. | the appropriate service and transport management to the PW. | |||
| 6.6. Statistics | 4.6. Statistics | |||
| The PE can tabulate statistics that help monitor the state of the | The PE can tabulate statistics that help monitor the state of the | |||
| network, and to help with measurement of SLAs. Typical counters | network, and to help with measurement of SLAs. Typical counters | |||
| include: | include: | |||
| - Counts of PW-PDUs sent and received, with and without errors. | - Counts of PW-PDUs sent and received, with and without errors. | |||
| - Counts of PW-PDUs lost (TDM only). | - Counts of PW-PDUs lost (TDM only). | |||
| - Counts of service PDUs sent and received, with and without errors | - Counts of service PDUs sent and received, with and without errors | |||
| (non-TDM). | (non-TDM). | |||
| - Service-specific interface counts. | - Service-specific interface counts. | |||
| These counters would be contained in a MIB, they should not replicate | These counters would be contained in a MIB, they should not replicate | |||
| existing MIB counters. | existing MIB counters. | |||
| 6.7. Traceroute | 4.7. Traceroute | |||
| Tracing functionality is desirable for emulated circuits and | Tracing functionality is desirable for emulated circuits and | |||
| services, because it allows verification and remediation of the | services, because it allows verification and remediation of the | |||
| operation and configuration of the forwarding plane. [BONICA] | operation and configuration of the forwarding plane. [BONICA] | |||
| describes the requirements for a generic route tracing application. | describes the requirements for a generic route tracing application. | |||
| Applicability of these requirements to PWE3 is an interesting | Applicability of these requirements to PWE3 is an interesting | |||
| problem, as many of the emulated services have no equivalent | problem, as many of the emulated services have no equivalent | |||
| function. In general, there is not a way to trace the forwarding | function. In general, there is not a way to trace the forwarding | |||
| plane of an TDM or Frame Relay PVC. ATM does provide an option in | plane of an TDM or Frame Relay PVC. ATM does provide an option in | |||
| the loopback OAM cell to return each intermediate hop (see [I.610]). | the loopback OAM cell to return each intermediate hop (see [I.610]). | |||
| skipping to change at page 38, line 33 ¶ | skipping to change at page 19, line 5 ¶ | |||
| emulated services to reveal their internal forwarding details. A | emulated services to reveal their internal forwarding details. A | |||
| common mechanism for all emulated services over a particular PSN may | common mechanism for all emulated services over a particular PSN may | |||
| be possible. For example, if MPLS is the PSN, the path for a VC LSP | be possible. For example, if MPLS is the PSN, the path for a VC LSP | |||
| could be revealed via the signaling from the underlying TE tunnel | could be revealed via the signaling from the underlying TE tunnel | |||
| LSP, or perhaps via the proposed MPLS OAM. However, when we are | LSP, or perhaps via the proposed MPLS OAM. However, when we are | |||
| trying to trace the entire emulated service, starting from the CE | trying to trace the entire emulated service, starting from the CE | |||
| (e.g. an ATM VCC), then a uniform approach probably will not work and | (e.g. an ATM VCC), then a uniform approach probably will not work and | |||
| different approaches would be required for different emulated | different approaches would be required for different emulated | |||
| services. | services. | |||
| 6.8. Congestion Considerations | 4.8. Congestion Considerations | |||
| [CONGEST] describes how devices connected to the Internet should | ||||
| handle congestion. The discussion of congestion with respect to PWE3 | ||||
| will be broken into two sections: VBR applications and CBR | ||||
| applications. | ||||
| 6.8.1. VBR Applications | ||||
| VBR applications include Ethernet, Frame Relay, and ATM (other than | ||||
| AAL CES). During periods of congestion the PE may be able to take | ||||
| action to communicate to the CE the need to slow down. | ||||
| 6.8.1.1. Frame Relay | ||||
| In the presence of congestion, the PE could perform several actions. | ||||
| These are the same actions that a Frame Relay switch might take. If | ||||
| available, a measure of the degree of congestion would be useful. | ||||
| - While a service provide may define an SLA for a Frame Relay | ||||
| Service, Frame Relay itself does not have a guarantee of delivery. | ||||
| Given this fact, one option would be for the PE to take no action | ||||
| in the face of congestion. The Frame Relay application at the CE | ||||
| would then have to detect congestion and act appropriately. | ||||
| - Frame Relay defines BECN as an indication to a Frame Relay device | ||||
| that traffic that it sent is experiencing congestion. See Figure | ||||
| 14 for an example of how BECN is sent. For mild congestion, the PE | ||||
| could send BECN back to the CE. The CE could then reduce the | ||||
| amount of traffic being sent. It is worth nothing that many Frame | ||||
| Relay devices ignore BECN. | ||||
| - The CE could also send FECN in the direction in which congestion is | ||||
| occurring. See Figure 14 for an example of how FECN is sent. | ||||
| - During congestion, the PE could discard all frames with DE set. | ||||
| - If the PE was aware of the CIR for the VCs, it could drop any | ||||
| traffic in excess of CIR. | ||||
| - For severe congestion the PE could take the interface down. If the | ||||
| PE was generating the PVC status signaling then these messages | ||||
| could be used to convey the problem to the CE. This approach is | ||||
| not elegant and may not work well with existing Frame Relay | ||||
| applications. | ||||
| 6.8.1.2. ATM | ||||
| ATM has a forward notification of congestion (EFCI), but unlike Frame | ||||
| Relay there is no backwards notification. This leaves the following | ||||
| choices of action. These are the same actions that an ATM switch | ||||
| might take. | ||||
| - Do nothing and let the ATM application at the CE handle the | ||||
| problem. This may work for some applications, but it will make it | ||||
| difficult for service providers to guarantee a high QoS on the VC. | ||||
| - If the PE was aware of the traffic parameters for the VCs, it could | ||||
| drop any traffic that was out of profile. | ||||
| - For severe congestion the PE could take the interface down. This | ||||
| may be worse than doing nothing. | ||||
| 6.8.1.3. Ethernet | ||||
| A PE providing a PW to an Ethernet CE could react to congestion in | ||||
| one of the following ways. | ||||
| - A PE could use Ethernet flow control during congestion by sending a | ||||
| PAUSE frame as described in Annex 31B of [802.3]. | ||||
| - A PE could do nothing and let the Ethernet application at the CE | ||||
| handle the problem. | ||||
| - For severe congestion the PE could take the interface down. This | ||||
| may be worse than doing nothing. | ||||
| 6.8.2. CBR Applications | The PSN carrying the PW may be subject to congestion. The congestion | |||
| characteristics will vary with the PSN type, the network architecture | ||||
| and configuration, and the loading of the PSN. | ||||
| CBR applications include layer 1 applications such as emulated | Each PW EEMD and/or AS will have to specify whether it needs an | |||
| TDM/SONET streams, as well as layer 2 applications such as ATM AAL1 | appropriate mechanism for operating in the presence of this | |||
| CES. These applications present a constant load on the network at | congestion, including methods of mapping between its native | |||
| all times. They cannot slow down; they are either running at full | congestion reporting and avoidance mechanisms, and those provided by | |||
| speed, or they are impaired. If congestion causes an excessive | the PW. | |||
| number of packets to be lost, the PE could take down the interface | ||||
| and send AIS to the CE. There is probably not much point in doing | ||||
| this if the PE is operating in an unstructured mode, as the framer in | ||||
| the CE will probably declare a LOS condition anyway. A PE operating | ||||
| in a structured (framed) mode would always send a clean frame pattern | ||||
| to the CE, so it might be desirable to send AIS to notify the CE that | ||||
| there are problems with the PW. | ||||
| 6.9. PW SNMP MIB Architecture | 4.9. PW SNMP MIB Architecture | |||
| This section describes the general architecture for SNMP MIBs used to | This section describes the general architecture for SNMP MIBs used to | |||
| manage PW services and the underlying PSN. The intent here is to | manage PW services and the underlying PSN. The intent here is to | |||
| provides a clear picture of how all of the pertinent MIBs fit | provides a clear picture of how all of the pertinent MIBs fit | |||
| together to form a cohesive management framework for deploying PWE3 | together to form a cohesive management framework for deploying PWE3 | |||
| services. | services. | |||
| 6.9.1. MIB Layering | 4.9.1. MIB Layering | |||
| The SNMP MIBs created for PWE3 should fit the architecture shown in | The SNMP MIBs created for PWE3 should fit the architecture shown in | |||
| Figure 16. | Figure 6. | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| Service | CEM | | Ethernet | | ATM | | Service | CEM | | Ethernet | | ATM | | |||
| Layer |Service MIB| |Service MIB| ... |Service MIB| | Layer |Service MIB| |Service MIB| ... |Service MIB| | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| \ | / | \ | / | |||
| \ | / | \ | / | |||
| - - - - - - - - - - - - \ - - - | - - - - / - - - - - - - | - - - - - - - - - - - - \ - - - | - - - - / - - - - - - - | |||
| \ | / | \ | / | |||
| \ | / | ||||
| +-------------------------------------------+ | +-------------------------------------------+ | |||
| Generic PW | Generic PW MIBs | | Generic PW | Generic PW MIBs | | |||
| Layer +-------------------------------------------+ | Layer +-------------------------------------------+ | |||
| / | \ | ||||
| / | \ | / | \ | |||
| - - - - - - - - - - - - / - - - | - - - - \ - - - - - - - | - - - - - - - - - - - - / - - - | - - - - \ - - - - - - - | |||
| / | \ | / | \ | |||
| / | \ | / | \ | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| PSN VC | GRE | | L2TP | | MPLS | | PSN VC |GRE VC MIB | |L2TP VC MIB| |MPLS VC MIB| | |||
| Layer | VC MIB | | VC MIB | ... | VC MIB | | Layer +-----------+ +-----------+ +-----------+ | |||
| +-----------+ +-----------+ +-----------+ | ||||
| | | | | | | | | |||
| - - - - - - - - - | - - - - - - | - - - - - - - - | - - - | - - - - - - - - - | - - - - - - | - - - - - - - - | - - - | |||
| | | | | | | | | |||
| +-----------+ +-----------+ +-----------+ | +-----------+ +-----------+ +-----------+ | |||
| PSN | GRE | | L2TP | | MPLS | | PSN |GRE MIB(s) | |L2TP MIB(s)| |MPLS MIB(s)| | |||
| Layer | MIB(s) | | MIB(s) | ... | MIB(s) | | Layer +-----------+ +-----------+ +-----------+ | |||
| +-----------+ +-----------+ +-----------+ | ||||
| Figure 16: Relationship of SNMP MIBs | Figure 6: Relationship of SNMP MIBs | |||
| Note that there is a separate MIB for each emulated service as well | Figure 7 shows an example for a TDM PW carried over MPLS. | |||
| as one for each underlying PSN. These MIBs may be used in various | ||||
| combinations as needed. Figure 17 shows an example for a TDM PW | ||||
| carried over MPLS. | ||||
| +-----------+ | +-----------------+ | |||
| | SONET | RFC2558 | | SONET MIB | RFC2558 | |||
| | MIB | | +-----------------+ | |||
| +-----------+ | | | |||
| | | +-----------------+ | |||
| +-----------+ | Service |SONET Service MIB| pw-cem-mib | |||
| Service | SONET | pw-cem-mib | Layer +-----------------+ | |||
| Layer |Service MIB| | - - - - - - - - - - | - - - - - - - - - - - - - - - | |||
| +-----------+ | +-----------------+ | |||
| | | Generic PW | Generic PW MIBS | pw-tc-mib | |||
| - - - - - - - - - | - - - - - - - - - | Layer +-----------------+ pw-mib | |||
| | | - - - - - - - - - - | - - - - - - - - - - - - - - - | |||
| +-----------+ | +-----------------+ | |||
| Generic PW |Generic PW | pw-tc-mib | PSN VC | MPLS VC MIBS | pw-mpls-mib | |||
| Layer | MIBs | pw-mib | Layer +-----------------+ | |||
| +-----------+ | - - - - - - - - - - | - - - - - - - - - - - - - - - | |||
| | | +-----------------+ | |||
| - - - - - - - - - | - - - - - - - - - | PSN | MPLS MIBs | mpls-te-mib | |||
| | | Layer +-----------------+ mpls-lsr-mib | |||
| +-----------+ | ||||
| PSN VC | MPLS VC | pw-mpls-mib | ||||
| Layer | MIBs | | ||||
| +-----------+ | ||||
| | | ||||
| - - - - - - - - - | - - - - - - - - - | ||||
| | | ||||
| +-----------+ | ||||
| PSN | MPLS | draft-ietf-mpls-te-mib | ||||
| Layer | MIBs | draft-ietf-mpls-lsr-mib | ||||
| +-----------+ | ||||
| Figure 17: Service-specific Example for MIBs | Figure 7: Service-specific Example for MIBs | |||
| 6.9.2. Service Layer MIBs | Note that there is a separate MIB for each emulated service as well | |||
| as one for each underlying PSN. These MIBs may be used in various | ||||
| combinations as needed. | ||||
| 4.9.2. Service Layer MIBs | ||||
| The first layer is referred to as the Service Layer. It contains | The first layer is referred to as the Service Layer. It contains | |||
| MIBs for PWE3 services such as Ethernet, ATM, circuits and Frame | MIBs for PWE3 services such as Ethernet, ATM, circuits and Frame | |||
| Relay. This layer contains those corresponding MIBs used to mate or | Relay. This layer contains those corresponding MIBs used to mate or | |||
| adapt those emulated services to the underlying services. This | adapt those emulated services to the underlying services. This | |||
| working group should not produce any MIBs for managing the general | working group should not produce any MIBs for managing the general | |||
| service; rather, it should produce just those MIBs that are used to | service; rather, it should produce just those MIBs that are used to | |||
| interface or adapt the emulated service onto the PWE3 management | interface or adapt the emulated service onto the PWE3 management | |||
| framework. For example, the standard SONET MIB [SONETMIB] is | framework. For example, the standard SONET MIB [SONETMIB] is | |||
| designed and maintained by another working group. Also, the SONET MIB | designed and maintained by another working group. Also, the SONET MIB | |||
| is designed to manage the native service without PW emulation. Since | is designed to manage the native service without PW emulation. Since | |||
| the PWE3 working group is chartered to produce the corresponding | the PWE3 working group is chartered to produce the corresponding | |||
| adaptation MIB, in this case, it would produce the PW-CEM-MIB that | adaptation MIB, in this case, it would produce the PW-CEM-MIB | |||
| would be used to adapt SONET services to the underlying PSN that | [PWMPLSMIB] that would be used to adapt SONET services to the | |||
| carries the PWE3 service. | underlying PSN that carries the PWE3 service. | |||
| 6.9.3. Generic PW MIBs | 4.9.3. Generic PW MIBs | |||
| The second layer is referred to as the Generic PW Layer. This layer | The second layer is referred to as the Generic PW Layer. This layer | |||
| is composed of two MIBs: the PWE-TC-MIB [PWTCMIB] and the PWE-MIB | is composed of two MIBs: the PWE-TC-MIB [PWTCMIB] and the PWE-MIB | |||
| [PWMIB]. These MIBs are responsible for providing general PWE3 | [PWMIB]. These MIBs are responsible for providing general PWE3 | |||
| counters and service models used for monitoring and configuration of | counters and service models used for monitoring and configuration of | |||
| PWE3 services over any supported PSN service. That is, this MIB | PWE3 services over any supported PSN service. That is, this MIB | |||
| provides a general model of PWE3 abstraction for management purposes. | provides a general model of PWE3 abstraction for management purposes. | |||
| This MIB is used to interconnect the Service Layer MIBs to the PSN VC | This MIB is used to interconnect the Service Layer MIBs to the PSN VC | |||
| Layer MIBs. The latter will be described in the next section. This | Layer MIBs. The latter will be described in the next section. This | |||
| layer also provides the PW-TC-MIB [PWTCMIB]. This MIB contains common | layer also provides the PW-TC-MIB [PWTCMIB]. This MIB contains common | |||
| SMI textual conventions [SMIv2] that may be used by any PW MIB. | SMI textual conventions [SMIv2] that may be used by any PW MIB. | |||
| 6.9.4. PSN VC Layer MIBs | 4.9.4. PSN VC Layer MIBs | |||
| The third layer in the PWE3 management architecture is referred to as | The third layer in the PWE3 management architecture is referred to as | |||
| the PSN VC layer. This layer is comprised of MIBs that are | the PSN VC layer. This layer is comprised of MIBs that are | |||
| specifically designed to interface general PWE3 services (VCs) onto | specifically designed to interface general PWE3 services (VCs) onto | |||
| those underlying PSN services. In general this means that the MIB | those underlying PSN services. In general this means that the MIB | |||
| provides a means with which an operator can map the pseudo-wire | provides a means with which an operator can map the PW service onto | |||
| service onto the native PSN service. For example, in the case of | the native PSN service. For example, in the case of MPLS, it is | |||
| MPLS, it is required that the general VC service be layered onto MPLS | required that the general VC service be layered onto MPLS LSPs or | |||
| LSPs or Traffic Engineered (TE) Tunnels [MPLS]. In this case, the PW- | Traffic Engineered (TE) Tunnels [MPLS]. In this case, the PW-MPLS-MIB | |||
| MPLS-MIB [PWMPLSMIB] was created to adapt the general PWE3 circuit | [PWMPLSMIB] was created to adapt the general PWE3 circuit services | |||
| services onto MPLS. Like the Service Layer described above the PWE3 | onto MPLS. Like the Service Layer described above the PWE3 working | |||
| working group should produce these MIBs. | group should produce these MIBs. | |||
| 6.9.5. PSN Layer MIBs | 4.9.5. PSN Layer MIBs | |||
| The fourth and final layer in the PWE3 management architecture is | The fourth and final layer in the PWE3 management architecture is | |||
| referred to as the PSN layer. This layer is comprised of those MIBs | referred to as the PSN layer. This layer is comprised of those MIBs | |||
| that control the PSN service-specific services. For example, in the | that control the PSN service-specific services. For example, in the | |||
| case of the MPLS [MPLS] PSN service, the MPLS-LSR-MIB [LSRMIB] and | case of the MPLS [MPLS] PSN service, the MPLS-LSR-MIB [LSRMIB] and | |||
| MPLS-TE-MIB [TEMIB] are used to interface general PWE3 services onto | the MPLS-TE-MIB [TEMIB] are used to interface the general PWE3 VC | |||
| native MPLS LSPs and/or TE tunnels to carry the emulated services. | services onto native MPLS LSPs and/or TE tunnels to carry the | |||
| The MIBs in this layer are produced by other working groups which | emulated services. In addition, the MPLS-LDP-MIB [LDPMIB] may be | |||
| design and specify the native PSN services. These MIBs should contain | used to reveal the MPLS labels that are distributed over the MPLS PSN | |||
| the appropriate mechanisms for monitoring and configuring the PSN | in order to maintain the PW service. The MIBs in this layer are | |||
| service such that the emulated PWE3 service will function correctly. | produced by other working groups that design and specify the native | |||
| PSN services. These MIBs should contain the appropriate mechanisms | ||||
| 7. Packet Switched Networks | for monitoring and configuring the PSN service such that the emulated | |||
| PWE3 service will function correctly. | ||||
| This section discusses various types of PSNs for providing the PW | ||||
| transport. The areas of considerations are: | ||||
| - Explicit Multi-protocol Encapsulation Identifier | ||||
| - Transport Integrity | ||||
| - Traffic Engineering Ability | ||||
| - Session Multiplexing | ||||
| - Flow and Congestion Control | ||||
| - Packet Ordering | ||||
| - Tunnel Maintenance | ||||
| - Scalability | ||||
| - Overhead | ||||
| - QoS and Traffic Management | ||||
| 7.1. IP | ||||
| Below is a description of the aspects of the Internet Protocol [IP]. | ||||
| Explicit MP Encap ID No support for a full range of multi-service | ||||
| protocols e.g. there is no protocol type | ||||
| assigned for ATM or MPLS. | ||||
| Transport Integrity IP has a checksum over the header but not | ||||
| over the payload. | ||||
| Traffic Engineering The TOS bits may be used as DiffServ code | ||||
| points. | ||||
| Session Multiplexing No support for session multiplexing. | ||||
| Packet Order No support for preservation of order. | ||||
| Tunnel Maintenance Protocols such as L2TP may be used to | ||||
| establish tunnels using IP packets. | ||||
| Flow/Congestion Control No built-in flow control to manage | ||||
| congestion. IP relies on the upper layer | ||||
| protocol, e.g. TCP, to perform the | ||||
| congestion management. | ||||
| Scalability It would be hard to imagine a protocol more | ||||
| scalable than IP. | ||||
| Transport Overhead Minimum of 20-byte header. | ||||
| QoS/Traffic Management No built-in QoS and traffic management. | ||||
| However, one can apply DiffServ to select a | ||||
| per-hop behavior for a class of traffic. | ||||
| 7.2. L2TP | ||||
| Layer 2 Tunneling (L2TP) [L2TP] provides a virtual extension of PPP | ||||
| across an IP PSN. | ||||
| Explicit MP Encap ID Supports any routed protocol, e.g. IP, IPX | ||||
| and AppleTalk that is supported by PPP. | ||||
| Transport Integrity Support a checksum for the entire | ||||
| encapsulated frame. | ||||
| Traffic Engineering No companion traffic engineering mechanism | ||||
| to support L2TP tunnel establishment. | ||||
| Session Multiplexing Supports two levels of session multiplexing | ||||
| via the use of the "tunnel-id" and "session- | ||||
| id" fields. | ||||
| Packet Order By supporting the optional sequence number, | ||||
| packet re-ordering can be done at the PWE | ||||
| Tunnel Maintenance L2TP uses control messages to establish, | ||||
| terminate and monitor the status of the | ||||
| logical PPP sessions. These are independent | ||||
| of the data messages. L2TP also provides an | ||||
| optional keep-alive mechanism to detect non- | ||||
| operational tunnel. | ||||
| Flow/Congestion Control L2TP defines flow and congestion control | ||||
| mechanisms for the control traffic only; no | ||||
| control for the data traffic. Even so, the | ||||
| PE could apply value-added functions such as | ||||
| admission control, policing and shaping of | ||||
| the L2TP tunnel at the aggregate flows | ||||
| level, e.g. DiffServ-TE. | ||||
| Scalability Lack of label stacking ability. | ||||
| Transport Overhead Minimum overhead is 44-byte (20-byte IP | ||||
| header + 12-byte UDP header + 8-byte minimum | ||||
| L2TP header + 4-byte PPP header) to support | ||||
| L2TP encapsulation | ||||
| QoS/Traffic Management No built-in QoS and traffic management. | ||||
| However, one can apply IntServ or DiffServ | ||||
| to select the preferred transport behavior | ||||
| for the entire tunnel, i.e. one traffic | ||||
| class per L2TP tunnel. | ||||
| 7.3. MPLS | ||||
| Multi-protocol Label Switching [MPLS] is designed to combine Layer 2 | ||||
| switching and Layer 3 routing technology to provide efficient packet | ||||
| processing and forwarding over a variety of link layer and transport | ||||
| technologies e.g. ATM, Frame Relay and SONET. | ||||
| Explicit MP Encap ID No defined standard to identify the | ||||
| encapsulated multi-protocol PDU. | ||||
| Transport Integrity No checksum support. | ||||
| Traffic Engineering Designed with many signaling, routing and | ||||
| traffic management extensions to support | ||||
| traffic engineering. | ||||
| Session Multiplexing Supports session multiplexing via the MPLS | ||||
| label and the EXP field. | ||||
| Packet Order Connection-oriented transport that typically | ||||
| (but not necessarily) provides in-sequence | ||||
| delivery. | ||||
| Tunnel Maintenance MPLS signaling provides the ability to | ||||
| establish, terminate and monitor the status | ||||
| of the LSP. | ||||
| Flow and Congestion Control | ||||
| MPLS-TE assumes external admission control, | ||||
| policy and shaping mechanism to provide flow | ||||
| and congestion control at the aggregate | ||||
| traffic level. | ||||
| Scalability Label stacking facilitates scalability. | ||||
| Transport Overhead Minimum overhead is 4-byte + any MPLS | ||||
| extension to support multi-protocol | ||||
| encapsulation and transport. | ||||
| QoS/Traffic Management MPLS-TE supports QoS and traffic management. | ||||
| 8. Acknowledgments | 5. Acknowledgments | |||
| This document was created by the PWE3 Framework design team. | This document was created by the PWE3 Framework design team. | |||
| Valuable input was also provided by John Rutemiller, David Zelig, | Valuable input was also provided by John Rutemiller, David Zelig, | |||
| Durai Chinnaiah, Jayakumar Jayakumar, Ron Bonica and Ghassem Koleyni. | Durai Chinnaiah, Jayakumar Jayakumar, Ron Bonica, Ghassem Koleyni, | |||
| and Eric Rosen. | ||||
| 9. References | ||||
| 9.1. IETF RFCs | 6. References | |||
| [L2TP] W.M. Townsley, A. Valencia, A. Rubens, G. Singh Pall, G. | [L2TP] W.M. Townsley, A. Valencia, A. Rubens, G. Singh Pall, G. | |||
| Zorn, B. Palter, "Layer Two Tunneling Protocol (L2TP)", RFC | Zorn, B. Palter, "Layer Two Tunneling Protocol (L2TP)", RFC | |||
| 2661, August 1999. | 2661, August 1999. | |||
| [RTP] H. Schulzrinne et al, "RTP: A Transport Protocol for Real- | [RTP] H. Schulzrinne et al, "RTP: A Transport Protocol for | |||
| Time Applications", RFC1889, January 1996. | Real-Time Applications", RFC1889, January 1996. | |||
| [NTP] D. Mills, "Network Time Protocol Version 3", RFC1305, March | ||||
| 1992. | ||||
| [MPLS] E. Rosen, "Multiprotocol Label Switching Architecture", | [MPLS] E. Rosen, "Multiprotocol Label Switching Architecture", | |||
| RFC3031, January 2001. | RFC3031, January 2001. | |||
| [IP] DARPA, "Internet Protocol", RFC791, September 1981. | [IP] DARPA, "Internet Protocol", RFC791, September 1981. | |||
| [CONGEST] S. Floyd, "Congestion Control Principles", RFC2914, | [CONGEST] S. Floyd, "Congestion Control Principles", RFC2914, | |||
| September 2000. | September 2000. | |||
| [SONETMIB] K. Tesink, "Definitions of Managed Objects for the SONET/SDH | [SONETMIB] K. Tesink, "Definitions of Managed Objects for the SONET/SDH | |||
| Interface Type", RFC2558, March 1999. | Interface Type", RFC2558, March 1999. | |||
| [SMIv2] Case et al, "Structure of Management Information for Version | [SMIv2] Case et al, "Structure of Management Information for Version | |||
| 2 of the Simple Network Management Protocol (SNMPv2)", | 2 of the Simple Network Management Protocol (SNMPv2)", | |||
| RFC1902, January 1996. | RFC1902, January 1996. | |||
| 9.2. IETF Drafts | [MALIS] Malis et al, "SONET/SDH Circuit Emulation over Packet (CEP)" | |||
| (draft-malis-pwe3-sonet-01.txt), work in progress, November | ||||
| [ANAVI] Anavi et al, "TDM over IP" draft-anavi-tdmoip-02.txt, work | 2001. | |||
| in progress, August 2001. | ||||
| [MALIS] Malis et al, "SONET/SDH Circuit Emulation over Packet | ||||
| (CEP)", (draft-malis-pwe3-sonet-00.txt) work in progress, | ||||
| September 2001. | ||||
| [XIAO] Xiao et al, "Requirements for Pseudo Wire Emulation Edge-to- | [XIAO] Xiao et al, "Requirements for Pseudo Wire Emulation | |||
| Edge (PWE3)" (draft-pwe3-requirements-01.txt), work in | Edge-to-Edge (PWE3)" (draft-pwe3-requirements-02.txt), work | |||
| progress, July 2001. | in progress, November 2001. | |||
| [BONICA] Bonica et al, "Tracing Requirements for Generic Tunnels" | [BONICA] Bonica et al, "Tracing Requirements for Generic Tunnels" | |||
| (draft-bonica-tunneltrace-01.txt), work in progress, | (draft-bonica-tunneltrace-01.txt), work in progress, | |||
| February 2001. | February 2001. | |||
| [LAU] J Lau et al, Layer Two Tunneling Protocol "L2TP", | ||||
| (draft-ietf-l2tpext-l2tp-base-01.txt) work in progress, | ||||
| October 2001. | ||||
| [PWMIB] Zelig et al, "Pseudo Wire (PW) Management Information Base | [PWMIB] Zelig et al, "Pseudo Wire (PW) Management Information Base | |||
| Using SMIv2", (draft-zelig-pw-mib-00.txt), work in progress, | Using SMIv2", (draft-zelig-pw-mib-00.txt), work in progress, | |||
| July 2001. | July 2001. | |||
| [PWTCMIB] Nadeau et al, "Definitions for Textual Conventions and | [PWTCMIB] Nadeau et al, "Definitions for Textual Conventions and | |||
| OBJECT-IDENTITIES for Pseudo-Wires Management" (draft- | OBJECT-IDENTITIES for Pseudo-Wires Management" | |||
| nadeau-pw-tc-mib-00.txt), work in progress, July 2001. | (draft-nadeau-pw-tc-mib-00.txt), work in progress, July | |||
| 2001. | ||||
| [PWMPLSMIB] Danenberg et al, "SONET/SDH Circuit Emulation Service Over | [PWMPLSMIB] Danenberg et al, "SONET/SDH Circuit Emulation Service Over | |||
| MPLS (CEM) Management Information Base Using SMIv2", (draft- | MPLS (CEM) Management Information Base Using SMIv2", | |||
| danenberg-pw-cem-mib-00.txt), work in progress, July 2001. | (draft-danenberg-pw-cem-mib-00.txt), work in progress, July | |||
| 2001. | ||||
| [LSRMIB] Srinivasan et al, "MPLS Label Switch Router Management | [LSRMIB] Srinivasan et al, "MPLS Label Switch Router Management | |||
| Information Base Using SMIv2", draft-ietf-mpls-lsr- | Information Base Using SMIv2", | |||
| mib-07.txt, work in progress, January 2001. | draft-ietf-mpls-lsr-mib-07.txt, work in progress, January | |||
| 2001. | ||||
| [TEMIB] Srinivasan et al, "Traffic Engineering Management | [TEMIB] Srinivasan et al, "Traffic Engineering Management | |||
| Information Base Using SMIv2", <draft-ietf-mpls-te- | Information Base Using SMIv2", | |||
| mib-05.txt>, work in progress, November 2000. | <draft-ietf-mpls-te-mib-05.txt>, work in progress, November | |||
| 2000. | ||||
| 9.3. ATM Forum | [LDP-MIB] Cucchiara, J., Sjostrand, H., and Luciani, J., "Definitions | |||
| of Managed Objects for the Multiprotocol Label Switching, | ||||
| Label Distribution Protocol (LDP)", | ||||
| <draft-ietf-mpls-ldp-mib-08.txt>, work in progress, August | ||||
| 2001. | ||||
| [ATMCES] ATM Forum, "Circuit Emulation Service Interoperability | [ATMCES] ATM Forum, "Circuit Emulation Service Interoperability | |||
| Specification Version 2.0" (af-vtoa-0078-000), January 1997. | Specification Version 2.0" (af-vtoa-0078-000), January 1997. | |||
| [TM4.0] ATM Forum, "Traffic Management Specification Version 4.0", | ||||
| (af-tm-0056.000), April, 1996. | ||||
| [ILMI] ATM Forum, "Integrated Local Management Interface (ILMI) | ||||
| Specification Version 4.0", (af-ilmi-0065.000), September, | ||||
| 1996. | ||||
| 9.4. Frame Relay Forum | ||||
| [FRF.1.2] D. Sinicrope, "PVC User-to-Network Interface (UNI) | ||||
| Implementation Agreement", Frame Relay Forum FRF.1.2, July | ||||
| 2000. | ||||
| [FRF.5] O'Leary et al, "Frame Relay/ATM PVC Network Interworking | [FRF.5] O'Leary et al, "Frame Relay/ATM PVC Network Interworking | |||
| Implementation Agreement", Frame Relay Forum FRF.5, December | Implementation Agreement", Frame Relay Forum FRF.5, December | |||
| 20, 1994. | 20, 1994. ITU Recommendation Q.933, Annex A, Geneva, 1995. | |||
| [FRF.13] K. Rehbehn, "Service Level Definitions Implementation | ||||
| Agreement", Frame Relay Forum FRF.13, August 4, 1998. | ||||
| 9.5. ITU | ||||
| [Q.933A] ITU, "ISDN Signaling Specifications for Frame Mode Switched | ||||
| and Permanent Virtual Connections Control and Status | ||||
| Monitoring" ITU Recommendation Q.933, Annex A, Geneva, 1995. | ||||
| [I.356] ITU, "B-ISDN ATM Layer Cell Transfer Performance", ITU | ||||
| Recommendation I.356, March, 2000. | ||||
| [I.363.1] ITU, "B-ISDN ATM Adaptation Layer specification: Type 1 | [I.363.1] ITU, "B-ISDN ATM Adaptation Layer specification: Type 1 | |||
| AAL", Recommendation I.363.1, August, 1996. | AAL", Recommendation I.363.1, August, 1996. | |||
| [I.363.5] ITU, "B-ISDN ATM Adaptation Layer specification: Type 5 | ||||
| AAL", Recommendation I.363.5, August, 1996. | ||||
| [I.371] ITU, "Traffic Control and Congestion Control in B-ISDN" ITU | ||||
| Recommendation I.371, March, 2000. | ||||
| [I.610] ITU, "B-ISDN Operation and Maintenance Principles and | [I.610] ITU, "B-ISDN Operation and Maintenance Principles and | |||
| Functions", ITU Recommendation I.610, February, 1999. | Functions", ITU Recommendation I.610, February, 1999. | |||
| [G.811] ITU, "Timing Characteristics of Primary Reference Clocks", | ||||
| ITU Recommendation G.811, September 1997. | ||||
| [G.823] "The Control of Jitter and Wander Within Digital Networks | ||||
| Which Are Based on the 2048 kbit/s Hierarchy", ITU | ||||
| Recommendation G.823, March 2000. | ||||
| [G.824] "The Control of Jitter and Wander Within Digital Networks | ||||
| Which Are Based on the 1544 kbit/s Hierarchy", ITU | ||||
| Recommendation G.824, March 2000. | ||||
| 9.6. IEEE | ||||
| [802.1D] IEEE, "ISO/IEC 15802-3:1998,(802.1D, 1998 Edition), | ||||
| Information technology --Telecommunications and information | ||||
| exchange between systems --IEEE standard for local and | ||||
| metropolitan area networks --Common specifications--Media | ||||
| access control (MAC) Bridges", June, 1998. | ||||
| [802.1Q] ANSI/IEEE Standard 802.1Q, "IEEE Standards for Local and | ||||
| Metropolitan Area Networks: Virtual Bridged Local Area | ||||
| Networks", 1998 . | ||||
| [802.3] IEEE, "ISO/IEC 8802-3: 2000 (E), Information | [802.3] IEEE, "ISO/IEC 8802-3: 2000 (E), Information | |||
| technology--Telecommunications and information exchange | technology--Telecommunications and information exchange | |||
| between systems --Local and metropolitan area networks | between systems --Local and metropolitan area networks | |||
| --Specific requirements --Part 3: Carrier Sense Multiple | --Specific requirements --Part 3: Carrier Sense Multiple | |||
| Access with Collision Detection (CSMA/CD) Access Method and | Access with Collision Detection (CSMA/CD) Access Method and | |||
| Physical Layer Specifications", 2000. | Physical Layer Specifications", 2000. | |||
| 9.7. ANSI | 7. Security Considerations | |||
| [T1.403] ANSI, "Network and Customer Installation Interfaces - DS1 | ||||
| Electrical Interfaces", T1.403-1999, May 24, 1999. | ||||
| [T1.617D] ANSI, "Digital Subscriber System No. 1 DSS1 Signaling | ||||
| Specification for Frame Relay Bearer Service", ANSI | ||||
| T1.617-1991 (R1997), Annex D. | ||||
| 9.8. Telcordia | ||||
| [GR253] Telcordia, "Synchronous Optical Network (SONET) Transport | ||||
| Systems: Common Generic Criteria" (GR253CORE), Issue 3, | ||||
| September 2000. | ||||
| 10. Security Considerations | ||||
| It may be desirable to define methods for ensuring security during | It may be desirable to define methods for ensuring security during | |||
| exchange of encapsulation control information at an administrative | exchange of encapsulation control information at an administrative | |||
| boundary of the PSN. | boundary of the PSN. | |||
| 11. Authors' Addresses | 8. IANA Considerations | |||
| Prayson Pate | ||||
| Overture Networks, Inc. | ||||
| P. O. Box 14864 | ||||
| RTP, NC, USA 27709 | ||||
| Email: prayson.pate@overturenetworks.com | ||||
| XiPeng Xiao | ||||
| Photuris, Inc. | ||||
| 2025 Stierlin Court | ||||
| Mountain View, CA 94043 | ||||
| Email: xxiao@photuris.com | ||||
| Tricci So | There are no IANA considerations for this document. | |||
| Caspian Networks | ||||
| 170 Baytech Dr. | ||||
| San Jose, CA 95134 | ||||
| E-Mail: tso@caspiannetworks.com | ||||
| Craig White | 9. Authors' Addresses | |||
| Level 3 Communications, LLC. | ||||
| 1025 Eldorado Blvd. | ||||
| Broomfield, CO, 80021 | ||||
| e-mail: Craig.White@Level3.com | ||||
| Kireeti Kompella | Prayson Pate XiPeng Xiao | |||
| Juniper Networks, Inc. | Overture Networks, Inc. Photuris, Inc. | |||
| 1194 N. Mathilda Ave. | P. O. Box 14864 2025 Stierlin Court | |||
| Sunnyvale, CA 94089 | RTP, NC, USA 27709 Mountain View, CA 94043 | |||
| Email: kireeti@juniper.net | prayson.pate@overturenetworks.com xiaoxipe@cse.msu.edu | |||
| Andrew G. Malis | Tricci So Craig White | |||
| Vivace Networks, Inc. | Caspian Networks Level 3 Communications, LLC. | |||
| 2730 Orchard Parkway | 170 Baytech Dr. 1025 Eldorado Blvd. | |||
| San Jose, CA 95134 | San Jose, CA 95134 Broomfield, CO, 80021 | |||
| Email: Andy.Malis@vivacenetworks.com | tso@caspiannetworks.com Craig.White@Level3.com | |||
| Kireeti Kompella Andrew G. Malis | ||||
| Juniper Networks, Inc. Vivace Networks, Inc. | ||||
| 1194 N. Mathilda Ave. 2730 Orchard Parkway | ||||
| Sunnyvale, CA 94089 San Jose, CA 95134 | ||||
| kireeti@juniper.net Andy.Malis@vivacenetworks.com | ||||
| Thomas K. Johnson | Thomas K. Johnson Thomas D. Nadeau | |||
| Litchfield Communications | Litchfield Communications Cisco Systems, Inc. | |||
| 76 Westbury Park Rd. | 76 Westbury Park Rd. 250 Apollo Drive | |||
| Watertown, CT 06795 | Watertown, CT 06795 Chelmsford, MA 01824 | |||
| Email: tom_johnson@litchfieldcomm.com | tom_johnson@litchfieldcomm.com tnadeau@cisco.com | |||
| Thomas D. Nadeau | Stewart Bryant | |||
| Cisco Systems, Inc. | Cisco Systems Ltd | |||
| 250 Apollo Drive | 4, The Square | |||
| Chelmsford, MA 01824 | Stockley Park | |||
| Email: tnadeau@cisco.com | Uxbridge UB11 1BL UK | |||
| stbryant@cisco.com | ||||
| 12. Full Copyright Section | 10. Full Copyright Section | |||
| Copyright (C) The Internet Society (2001). All Rights Reserved. | Copyright (C) The Internet Society (2002). All Rights Reserved. | |||
| This document and translations of it may be copied and furnished to | This document and translations of it may be copied and furnished to | |||
| others, and derivative works that comment on or otherwise explain it | others, and derivative works that comment on or otherwise explain it | |||
| or assist in its implementation may be prepared, copied, published | or assist in its implementation may be prepared, copied, published | |||
| and distributed, in whole or in part, without restriction of any | and distributed, in whole or in part, without restriction of any | |||
| kind, provided that the above copyright notice and this paragraph are | kind, provided that the above copyright notice and this paragraph are | |||
| included on all such copies and derivative works. However, this | included on all such copies and derivative works. However, this | |||
| document itself may not be modified in any way, such as by removing | document itself may not be modified in any way, such as by removing | |||
| the copyright notice or references to the Internet Society or other | the copyright notice or references to the Internet Society or other | |||
| Internet organizations, except as needed for the purpose of | Internet organizations, except as needed for the purpose of | |||
| End of changes. 164 change blocks. | ||||
| 1857 lines changed or deleted | 630 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||