| < draft-pate-pwe3-tdm-02.txt | draft-pate-pwe3-tdm-03.txt > | |||
|---|---|---|---|---|
| Internet Draft Prayson Pate | Internet Draft Prayson Pate | |||
| Document: draft-pate-pwe3-tdm-02.txt Overture Networks | Document: draft-pate-pwe3-tdm-03.txt Overture Networks | |||
| Expires: May 21, 2002 Ron Cohen | Expires: July, 2002 Ron Cohen | |||
| Lycium Networks | Lycium Networks | |||
| David Zelig | David Zelig | |||
| Corrigent Systems | Corrigent Systems | |||
| TDM Service Specification for | TDM Service Specification for | |||
| Pseudo-Wire Emulation Edge-to-Edge (PWE3) | Pseudo-Wire Emulation Edge-to-Edge (PWE3) | |||
| draft-pate-pwe3-tdm-02.txt | draft-pate-pwe3-tdm-03.txt | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC 2026. Internet-Drafts are | all provisions of Section 10 of RFC 2026. Internet-Drafts are | |||
| working documents of the Internet Engineering Task Force (IETF), its | working documents of the Internet Engineering Task Force (IETF), its | |||
| areas, and its working groups. Note that other groups may also | areas, and its working groups. Note that other groups may also | |||
| distribute working documents as Internet-Drafts. | distribute working documents as Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| skipping to change at page 2, line ? ¶ | skipping to change at page 2, line ? ¶ | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Abstract | Abstract | |||
| This document describes the service-specific implementation and | This document describes the service-specific implementation and | |||
| requirements for Pseudo-Wires Emulation Edge-to-Edge (PWE3) of TDM | requirements for Pseudo-Wire Emulation Edge-to-Edge (PWE3) of TDM | |||
| circuits. It discusses the emulation of circuits (such as T1, E1, T3 | circuits. It discusses the emulation of circuits (such as T1, E1, T3 | |||
| and E3) over packet networks using IP, L2TP or MPLS. | and E3) over packet networks using IP or MPLS. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The Internet Society (2001). All Rights Reserved. | Copyright (C) The Internet Society (2001). All Rights Reserved. | |||
| Table of Contents | Table of Contents | |||
| 1 Introduction ................................................. 3 | 1 Introduction ................................................. 3 | |||
| 1.1 Goals ...................................................... 3 | ||||
| 1.2 Non-Goals .................................................. 3 | ||||
| 1.3 Acronyms ................................................... 3 | ||||
| 2 Example Network Diagrams ..................................... 4 | 2 Example Network Diagrams ..................................... 4 | |||
| 3 Encapsulation Overview ....................................... 5 | 2.1 Example 1 - T1 Transport ................................... 4 | |||
| 4 VT Encapsulation ............................................. 7 | 2.2 Example 2 - T1 Access ...................................... 5 | |||
| 5 Fractional STS-1 Encapsulation ............................... 9 | 3 Encapsulation Overview ....................................... 9 | |||
| 6 DS3 Encapsulation ............................................ 11 | 3.1 Packet Format .............................................. 9 | |||
| 7 Operational Considerations ................................... 11 | 3.2 TDM Encapsulation .......................................... 9 | |||
| 8 Security Considerations ...................................... 12 | 4 VT Encapsulation ............................................. 11 | |||
| 9 References ................................................... 12 | 4.1 Multi-frame Format ......................................... 11 | |||
| 10 Authors' Addresses .......................................... 12 | 4.2 VT Header .................................................. 12 | |||
| 11 Full Copyright Section ...................................... 13 | 5 Fractional STS-1 Encapsulation ............................... 12 | |||
| 5.1 Fractional STS-1 Mapping ................................... 13 | ||||
| 5.2 Fractional STS-1 CEP header ................................ 14 | ||||
| 5.3 BIP ........................................................ 15 | ||||
| 6 DS3 Encapsulation ............................................ 15 | ||||
| 7 Operational Considerations ................................... 15 | ||||
| 7.1 Payload Size ............................................... 15 | ||||
| 7.2 Operational Modes .......................................... 16 | ||||
| 7.3 Time Slot Assignment (TSA) ................................. 17 | ||||
| 7.4 Timing ..................................................... 17 | ||||
| 7.5 Loopbacks .................................................. 18 | ||||
| 7.6 Performance Processing and Reports ......................... 19 | ||||
| 7.7 Alarms and Failure Propagation ............................. 19 | ||||
| 7.8 Session Multiplexing ....................................... 21 | ||||
| 7.9 Packet Length Considerations ............................... 21 | ||||
| 8 Security Considerations ...................................... 21 | ||||
| 9 References ................................................... 22 | ||||
| 10 Authors' Addresses .......................................... 22 | ||||
| 11 Full Copyright Section ...................................... 23 | ||||
| 1. Introduction | 1. Introduction | |||
| This document describes the service-specific implementation and | This document describes the service-specific implementation and | |||
| requirements for Pseudo-Wires Emulation Edge-to-Edge (PWE3) of TDM | requirements for Pseudo-Wire Emulation Edge-to-Edge (PWE3) of TDM | |||
| circuits. It discusses the emulation of circuits (such as T1, E1, T3 | circuits. It discusses the emulation of circuits (such as T1, E1, T3 | |||
| and E3) over packet networks using IP, L2TP or MPLS. It is | and E3) over packet networks using IP or MPLS. It is structured as | |||
| structured as an extension to [MALIS]. | an extension to [MALIS]. | |||
| See [PATE] and [XIAO] for background, motivation and requirements | See [PATE] and [XIAO] for background, motivation and requirements | |||
| concerning circuit emulation over PSNs. [MARTINI] and [MALIS] | concerning circuit emulation over PSNs. [MARTINI] and [MALIS] | |||
| provide information on the very similar emulation of SONET circuits. | provide information on the very similar emulation of SONET circuits. | |||
| 1.1. Goals | 1.1. Goals | |||
| o Definition of encapsulation for T1, E1, DS1C, DS2 and T3 as an | - Definition of encapsulation for T1, E1, DS1C, DS2 and T3 as an | |||
| extension to [MALIS]. | extension to [MALIS]. | |||
| o Definition of mapping to IP, MPLS and L2TP PSNs. | - Definition of mapping to IP and MPLS PSNs. | |||
| o Compatibility with existing circuit networks. | - Compatibility with existing circuit networks. | |||
| o Compatibility with ongoing work in PWE3. | - Compatibility with ongoing work in PWE3. | |||
| 1.2. Non-Goals | 1.2. Non-Goals | |||
| o Replication of existing works. | - Replication of existing works. | |||
| 1.3. Acronyms | 1.3. Acronyms | |||
| ADM Add Drop Multiplexer | ADM Add Drop Multiplexer | |||
| AIS Alarm Indication Signal | AIS Alarm Indication Signal | |||
| BIP Interleaved Parity | BIP Interleaved Parity | |||
| BITS Building Integrated Timing Supply | BITS Building Integrated Timing Supply | |||
| CEP Circuit Emulation over Packet - see [MALIS] | CEP Circuit Emulation over Packet - see [MALIS] | |||
| CI Customer Installation | ||||
| DBA Dynamic Bandwidth Allocation - see [MALIS] | DBA Dynamic Bandwidth Allocation - see [MALIS] | |||
| L2TP Layer Two Tunneling Protocol | EBM Equipped Bit Mask | |||
| LOF Loss of Frame | LOF Loss of Frame | |||
| LOS Loss of Signal | LOS Loss of Signal | |||
| NI Network Interface | ||||
| NPRM Network Performance Report Message | NPRM Network Performance Report Message | |||
| PSN Packet Switched Network | PSN Packet Switched Network | |||
| POH Path Overhead | POH Path Overhead | |||
| PTE Path Terminating Equipment | ||||
| PWE3 Pseudo-Wire Emulation Edge-to-Edge | PWE3 Pseudo-Wire Emulation Edge-to-Edge | |||
| RAI Remote Alarm Indication | RAI Remote Alarm Indication | |||
| SDH Synchronous Digital Hierarchy | SDH Synchronous Digital Hierarchy | |||
| SONET Synchronous Optical Network | SONET Synchronous Optical Network | |||
| SPRM Supplementary Performance Report Message | ||||
| TDM Time Division Multiplexing | TDM Time Division Multiplexing | |||
| TSA Time Slot Assignment | TSA Time Slot Assignment | |||
| VT Virtual Tributary | VT Virtual Tributary | |||
| VTG Virtual Tributary Group | VTG Virtual Tributary Group | |||
| 2. Example Network Diagrams | 2. Example Network Diagrams | |||
| Figure 1 below shows a pair of T1s being carried over a TDM/SONET | 2.1. Example 1 - T1 Transport | |||
| network. The node marked "M" is an M13 multiplexer, while the nodes | ||||
| marked "S" are SONET ADMs. Note that the physical T1s are terminated | Figure 1 below shows a T1 being used to connect Sites A and B via a | |||
| at the M13 and SONET ADM, but the framing and payload are carried | TDM/SONET network. The node marked "M" is an M13 multiplexer, while | |||
| transparently to the hub site. | the nodes marked "S" are SONET ADMs. The framing would be terminated | |||
| at the M13 and SONET ADM in a structured application and carried | ||||
| transparently in an unstructured application. | ||||
| Note that Figure 1 is also applicable for the transport of E1 and | ||||
| DS3. | ||||
| SONET/TDM Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ Physical T1s | ||||
| +------+ / \__/ \ | | ||||
| |Site A| / +---+ DS3 \ | Hub Site | ||||
| |T1 #1=|=================|\M/|-------------+-----+ \ | +------+ | ||||
| | | ^ \ |/ \|=============|\ /| \ v | | | ||||
| +------+ | /\ +---+-------------| \ / |========|=T1 #1| | ||||
| Physical T1s / | S | / | | | ||||
| +------+ | / +---+-------------| / \ |========|=T1 #2| | ||||
| |Site B| v \ |\S/|=============|/ \| \ | | | ||||
| |T1 #2=|=================|/ \|-------------+-----+ / +------+ | ||||
| | | \ +---+ OC3 __ / | ||||
| +------+ \ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 1: T1 Transport Example Diagram | ||||
| Figure 2 below shows the same pair of T1s being carried over a packet | ||||
| network using the VT encapsulation defined in Section 4 of this | ||||
| draft. Here the emulation is performed by the boxes marked "E", and | ||||
| the routers marked "R" carry the resulting packets. Note that the | ||||
| emulation, routing and/or SONET functions could be combined in the | ||||
| same device. | ||||
| SONET/TDM/Packet Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ Physical T1s | ||||
| +------+ /+-+ \__/ \_ | | ||||
| |Site A| / | | +---+ \ | Hub Site | ||||
| |T1 #1=|=============|P|=| R | +---+ +-+ +-----+ \ | +------+ | ||||
| | | ^ \ |E| | |===| | | |=|\ /| \ v | | | ||||
| +------+ | /\+-+ +---+ | | | | | \ / |========|=T1 #1| | ||||
| Physical T1s / | R |=|P| | S | / | | | ||||
| +------+ | / +-+ +---+ | | |E| | / \ |========|=T1 #2| | ||||
| |Site B| v \ |P| | R |===| | | |=|/ \| \ | | | ||||
| |T1 #2=|=============|E|=| | +---+ +-+ +-----+ / +------+ | ||||
| | | \ | | +---+ __ / | ||||
| +------+ \ +-+ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 2: T1 Transport Emulation Example Diagram | ||||
| 2.2. Example 2 - T1 Access | ||||
| Figure 3 below shows a pair of T1s being carried over a TDM/SONET | ||||
| network. This example differs from the previous one in that the | ||||
| signal format differs between the ingress and egress nodes. | ||||
| Note that Figure 3 is also applicable for E1 and DS3 access. | ||||
| SONET/TDM Network | SONET/TDM Network | |||
| ____ ___ ____ | ____ ___ ____ | |||
| _/ \___/ \ _/ \__ | _/ \___/ \ _/ \__ | |||
| +------+ Physical / \__/ \ | +------+ Physical / \__/ \ | |||
| |Site A| T1 / +---+ DS3 \ Hub Site | |Site A| T1 / +---+ DS3 \ Hub Site | |||
| |T1 #1=|=================|\M/|-------------+-----+ \ OC12+------+ | |T1 #1=|=================|\M/|-------------+-----+ \ OC12+------+ | |||
| | | \ |/ \|=============|\ /| \----| | | | | \ |/ \|=============|\ /| \----| | | |||
| +------+ /\ +---+-------------| \ / |========|=T1 #1| | +------+ /\ +---+-------------| \ / |========|=T1 #1| | |||
| / | S | / | | | / | S | / | | | |||
| +------+ Physical/ +---+-------------| / \ |========|=T1 #2| | +------+ Physical/ +---+-------------| / \ |========|=T1 #2| | |||
| |Site B| T1 \ |\S/|=============|/ \| \----| | | |Site B| T1 \ |\S/|=============|/ \| \----| | | |||
| |T1 #2=|=================|/ \|-------------+-----+ / +------+ | |T1 #2=|=================|/ \|-------------+-----+ / +------+ | |||
| | | \ +---+ OC3 __ / | | | \ +---+ OC3 __ / | |||
| +------+ \ __/ \ / | +------+ \ __/ \ / | |||
| \ ___ ___ / \_/ | \ ___ ___ / \_/ | |||
| \_/ \____/ \___/ | \_/ \____/ \___/ | |||
| Figure 1: T1/SONET Example Diagram | Figure 3: T1 Access Example Diagram | |||
| Figure 2 below shows the same pair of T1s being carried over a packet | Figure 4 below shows the same pair of T1s being carried over a packet | |||
| network. Here the emulation is performed by the boxes marked "E", | network, again using the VT encapsulation defined in Section 4 of | |||
| and the routers marked "R" carry the resulting packets. Note that | this draft. As with the previous example, the emulation, routing | |||
| the emulation, routing and/or SONET functions could be combined in | and/or SONET functions could be combined in the same device. Such | |||
| the same device. Such combinations are likely, so an encapsulation | combinations are likely, so the VT encapsulation format defined in | |||
| format should be easy to incorporate into such applications and | this draft facilitates implementation of such applications and | |||
| devices. | devices. | |||
| SONET/TDM/Packet Network | SONET/TDM/Packet Network | |||
| ____ ___ ____ | ____ ___ ____ | |||
| _/ \___/ \ _/ \__ | _/ \___/ \ _/ \__ | |||
| +------+ Physical / \__/ \_ | +------+ Physical /+-+ \__/ \_ | |||
| |Site A| T1 / +-+ +---+ \ Hub Site | |Site A| T1 / | | +---+ \ Hub Site | |||
| |T1 #1=|=============|E|=| R | +---+ +-+ +-----+ \ OC12+------+ | |T1 #1=|=============|P|=| R | +---+ +-+ +-----+ \ OC12+------+ | |||
| | | \ +-+ | |===| | | |=|\ /| \----| | | | | \ |E| | |===| | | |=|\ /| \----| | | |||
| +------+ /\ +---+ | | | | | \ / |========|=T1 #1| | +------+ /\+-+ +---+ | | | | | \ / |========|=T1 #1| | |||
| / | R |=|E| | S | / | | | / | R |=|P| | S | / | | | |||
| +------+ Physical/ +---+ | | | | | / \ |========|=T1 #2| | +------+ Physical/ +-+ +---+ | | |E| | / \ |========|=T1 #2| | |||
| |Site B| T1 \ +-+ | R |===| | | |=|/ \| \----| | | |Site B| T1 \ |P| | R |===| | | |=|/ \| \----| | | |||
| |T1 #2=|=============|E|=| | +---+ +-+ +-----+ / +------+ | |T1 #2=|=============|E|=| | +---+ +-+ +-----+ / +------+ | |||
| | | \ +-+ +---+ __ / | | | \ | | +---+ __ / | |||
| +------+ \ +-+ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 4: T1 Access Emulation Example Diagram | ||||
| 2.2.1. Example 3 - Fractional SONET Transport | ||||
| Figure 5 below shows an example of fractional SONET transport. OC3 | ||||
| #1 and OC3 #2 are both channelized and are partially equipped. | ||||
| SONET Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ | ||||
| +------+ Physical / \__/ \ | ||||
| |Site A| OC3 / +---+ OC3 \ Hub Site | ||||
| |OC3#1=|=================|\S/|-------------+-----+ \ OC12+------+ | ||||
| | | \ |/ \|=============|\ /| \----| | | ||||
| +------+ /\ +---+-------------| \ / |========|=OC3#1| | ||||
| / | S | / | | | ||||
| +------+ Physical/ +---+-------------| / \ |========|=OC3#2| | ||||
| |Site B| OC3 \ |\S/|=============|/ \| \----| | | ||||
| |OC3#2=|=================|/ \|-------------+-----+ / +------+ | ||||
| | | \ +---+ OC3 __ / | ||||
| +------+ \ __/ \ / | +------+ \ __/ \ / | |||
| \ ___ ___ / \_/ | \ ___ ___ / \_/ | |||
| \_/ \____/ \___/ | \_/ \____/ \___/ | |||
| Figure 2: T1 Emulation Example Diagram | Figure 5: Fractional SONET Transport Example Diagram | |||
| Figure 6 below shows the same pair of OC3s being emulated over a PSN | ||||
| using the fractional STS mapping defined in Section 5 of this draft. | ||||
| Note that the PWE3 emulation device is not acting as Path Terminating | ||||
| Equipment (PTE) and should preserve the path BIP and OAM functions. | ||||
| SONET/TDM/Packet Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ | ||||
| +------+ Physical /+-+ \__/ \_ | ||||
| |Site A| OC3 / | | +---+ \ Hub Site | ||||
| |OC3#1=|=============|P|=| R | +---+ +-+ +-----+ \ OC12+------+ | ||||
| | | \ |E| | |===| | | |=|\ /| \----| | | ||||
| +------+ /\+-+ +---+ | | | | | \ / |========|=OC3#1| | ||||
| / | R |=|P| | S | / | | | ||||
| +------+ Physical/ +-+ +---+ | | |E| | / \ |========|=OC3#2| | ||||
| |Site B| OC3 \ |P| | R |===| | | |=|/ \| \----| | | ||||
| |OC3#2=|=============|E|=| | +---+ +-+ +-----+ / +------+ | ||||
| | | \ | | +---+ __ / | ||||
| +------+ \ +-+ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 6: Fractional SONET Transport Emulation Example Diagram | ||||
| 2.2.2. Example 4 - SONET Interconnect | ||||
| Figure 7 below shows an example of SONET interconnect. As with the | ||||
| previous example, OC3 #1 and OC3 #2 are both channelized and are | ||||
| partially equipped. However, the VTs in OC3 #1 and OC3 #2 are | ||||
| groomed into OC3 #3. The right hand SONET ADM is acting as PTE, and | ||||
| the path BIP and OAM functions are terminated. | ||||
| SONET Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ | ||||
| +------+ Physical / \__/ \ | ||||
| |Site A| OC3 / +---+ OC3 \ Hub Site | ||||
| |OC3#1=|=================|\S/|-------------+-----+ \ +------+ | ||||
| | | \ |/ \|=============|\ /| \ | | | ||||
| +------+ /\ +---+-------------| \ / | / | | | ||||
| / | S |========|=OC3#3| | ||||
| +------+ Physical/ +---+-------------| / \ | \ | | | ||||
| |Site B| OC3 \ |\S/|=============|/ \| \ | | | ||||
| |OC3#2=|=================|/ \|-------------+-----+ / +------+ | ||||
| | | \ +---+ OC3 __ / | ||||
| +------+ \ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 7: SONET Interconnect Example Diagram | ||||
| Figure 8 below shows the same pair of OC3s being emulated over a PSN, | ||||
| again using the fractional STS mapping defined in Section 5 of this | ||||
| draft. | ||||
| SONET/TDM/Packet Network | ||||
| ____ ___ ____ | ||||
| _/ \___/ \ _/ \__ | ||||
| +------+ Physical /+-+ \__/ \_ | ||||
| |Site A| OC3 / | | +---+ \ Hub Site | ||||
| |OC3#1=|=============|P|=| R | +---+ +-+ +-----+ \ +------+ | ||||
| | | \ |E| | |===| | | |=|\ /| \ | | | ||||
| +------+ /\+-+ +---+ | | | | | \ / | / | | | ||||
| / | R |=|P| | S |========|=OC3#3| | ||||
| +------+ Physical/ +-+ +---+ | | |E| | / \ | \ | | | ||||
| |Site B| OC3 \ |P| | R |===| | | |=|/ \| \ | | | ||||
| |OC3#2=|=============|E|=| | +---+ +-+ +-----+ / +------+ | ||||
| | | \ | | +---+ __ / | ||||
| +------+ \ +-+ __/ \ / | ||||
| \ ___ ___ / \_/ | ||||
| \_/ \____/ \___/ | ||||
| Figure 8: SONET Interconnect Emulation Example Diagram | ||||
| 3. Encapsulation Overview | 3. Encapsulation Overview | |||
| 3.1. Packet Format | 3.1. Packet Format | |||
| Section 4 of [MALIS] defines a mapping for SONET SPEs into a format | Section 4 of [MALIS] defines a mapping for SONET SPEs into a format | |||
| for transport over various Packet Switched Networks (PSNs). That | for transport over various Packet Switched Networks (PSNs). That | |||
| format is extended here to sub-SPE rates using the standard VT | format is extended here to sub-SPE rates using the standard VT | |||
| (virtual tributary) mapping mechanism. The format for a TDM CEP | (virtual tributary) mapping mechanism. The format for a TDM CEP | |||
| (Circuit Emulation over Packet) packet is shown in Figure 3 below. | (Circuit Emulation over Packet) packet is shown in Figure 9 below. | |||
| +-----------------------------------+ | +---------------------------------------------+ | |||
| | PSN Header | | | PSN Header | | |||
| | IPv4/IPv6, MPLS, L2TP | | | IPv4, IPv6, MPLS | | |||
| +-----------------------------------+ | +---------------------------------------------+ | |||
| | PW Label (MARTINI) | | | PW Label (MARTINI) | | |||
| +-----------------------------------+ | +---------------------------------------------+ | |||
| | CEP Header (MALIS) | | | CEP Header (MALIS) | | |||
| +-----------------------------------+ | +---------------------------------------------+ | |||
| | | | | Extended Fractional STS-1 Header (optional) | | |||
| | TDM Data | | +---------------------------------------------+ | |||
| | | | | | | |||
| +-----------------------------------+ | | TDM Data | | |||
| | | | ||||
| +---------------------------------------------+ | ||||
| Figure 3: TDM CEP Packet Format | Figure 9: TDM CEP Packet Format | |||
| The "PSN Header" could be an IP or GRE header, MPLS label or L2TP | The "PSN Header" could be an IP or GRE header or MPLS label. See | |||
| header. See section 4 of [MALIS] for a description of the overall | Section 4 of [MALIS] for a description of the overall structure, and | |||
| structure, and for the definition of the CEP Header. The format of | for the definition of the CEP Header. The formats of the "Extended | |||
| the "TDM Data" is described in the following sections. | Fractional STS-1 Header" and "TDM Data" are described in the | |||
| following sections. | ||||
| 3.2. TDM Encapsulation | 3.2. TDM Encapsulation | |||
| This document builds upon existing standards for defining its | This document builds upon the existing standards for its definitions | |||
| encapsulations. The SONET VT mapping for DS1/T1, E1, DS1C and DS2 | of encapsulations. The SONET VT mapping for DS1/T1, E1, DS1C and DS2 | |||
| into VT1.5, VT2, VT3 and VT6 is defined in [GR253]. [G.707] defines | into VT1.5, VT2, VT3 and VT6 is defined in [GR253]. [G.707] defines | |||
| the mapping of T1s, E1s and DS2 into VC-11, VC-12 and VC-2 containers | the mapping of T1s, E1s and DS2 into VC-11, VC-12 and VC-2 containers | |||
| within the SDH hierarchy. Mapping of E3 and T3 into SDH VC-3 | within the SDH hierarchy. Mapping of E3 and T3 into SDH VC-3 | |||
| container and to the SONET STS-1 container are defined as well. Both | container and to the SONET STS-1 container are defined as well. Both | |||
| synchronous and asynchronous mappings are defined for E1s and T1s. | synchronous and asynchronous mappings are defined for E1s and T1s. | |||
| These mapping are well known and widely used for various | These mapping are well known and widely used for various | |||
| applications. This draft extends SONET/SDH circuit emulation [MALIS] | applications. This draft extends SONET/SDH circuit emulation [MALIS] | |||
| to carry the tributary TDM signals. | to carry the tributary TDM signals. | |||
| In order to save paper and wear and tear on the reader's eyeballs, | In order to save paper and wear and tear on the reader's eyeballs, | |||
| SONET terminology is used throughout this document. All SONET | SONET terminology is used throughout this document. All SONET | |||
| discussions are applicable for SDH terminology as well. | discussions are applicable for SDH terminology as well. | |||
| An example of VT1.5 mapping into an STS-1 SPE is shown in Figure 4 | An example of VT1.5 mapping into an STS-1 SPE is shown in Figure 10 | |||
| below. | below. | |||
| 1 2 3 * * * 29 30 31 32 * * * 58 59 60 61 * * * 87 | 1 2 3 * * * 29 30 31 32 * * * 58 59 60 61 * * * 87 | |||
| +--+------------------+-+------------------+-+------------------+ | +--+------------------+-+------------------+-+------------------+ | |||
| 1 |J1| Byte 1 (V1-V4) |R| | | | |R| | | | | | 1 |J1| Byte 1 (V1-V4) |R| | | | |R| | | | | | |||
| +--+---+---+------+---+-+------------------+-+------------------+ | +--+---+---+------+---+-+------------------+-+------------------+ | |||
| 2 |B3|VT | | | |R| | | | |R| | | | | | 2 |B3|VT | | | |R| | | | |R| | | | | | |||
| +--+1.5| | | +-+---+---+------+---+-+------------------+ | +--+1.5| | | +-+---+---+------+---+-+------------------+ | |||
| 3 |C2| | | | |R| | | | |R| | | | | | 3 |C2| | | | |R| | | | |R| | | | | | |||
| +--+ | | | +-+---+---+------+---+-+------------------+ | +--+ | | | +-+---+---+------+---+-+------------------+ | |||
| skipping to change at page 6, line 48 ¶ | skipping to change at page 10, line 31 ¶ | |||
| +--+ | | | +-+---+---+------+---+-+------------------+ | +--+ | | | +-+---+---+------+---+-+------------------+ | |||
| 7 |Z3| | | | |R| | | | |R| | | | | | 7 |Z3| | | | |R| | | | |R| | | | | | |||
| +--+ | | | +-+---+---+------+---+-+------------------+ | +--+ | | | +-+---+---+------+---+-+------------------+ | |||
| 8 |Z4| | | | |R| | | | |R| | | | | | 8 |Z4| | | | |R| | | | |R| | | | | | |||
| +--+ | | | +-+---+---+------+---+-+------------------+ | +--+ | | | +-+---+---+------+---+-+------------------+ | |||
| 9 |Z5| | | | |R| | | | |R| | | | | | 9 |Z5| | | | |R| | | | |R| | | | | | |||
| +--+---+---+------+---+-+---+---+------+---+-+------------------+ | +--+---+---+------+---+-+---+---+------+---+-+------------------+ | |||
| | | | | | | | | |||
| +-- Path Overhead +--------------------+-- Fixed Stuffs | +-- Path Overhead +--------------------+-- Fixed Stuffs | |||
| Figure 4: SONET SPE Mapping of VT1.5 | Figure 10: SONET SPE Mapping of VT1.5 | |||
| The SPE always contains seven interleaved VT groups (VTGs). Each VTG | The SPE always contains seven interleaved VT groups (VTGs). Each VTG | |||
| contains a single type of VT, and each VTG occupies 12 columns (108 | contains a single type of VT, and each VTG occupies 12 columns (108 | |||
| bytes) within each SPE. A VTG can contain 4 VT1.5s (T1s), 3 VT2s | bytes) within each SPE. A VTG can contain 4 VT1.5s (T1s), 3 VT2s | |||
| (E1s), 2 VT3s or a single VT6. Altogether, the SPE can carry 28 T1s | (E1s), 2 VT3s or a single VT6. Altogether, the SPE can carry 28 T1s | |||
| or carry 21 E1s. SONET carries DS3 signals within a single STS-1, | or carry 21 E1s. SONET carries DS3 signals within a single STS-1, | |||
| The encapsulations described in this document use SONET containers to | The encapsulations described in this document use SONET containers to | |||
| carry TDM signals. Three formats are defined in this document: | carry TDM signals. Three formats are defined in this document: | |||
| o The VT encapsulation maps a single T1, E1, DS1C or DS2 into a VT | - The VT encapsulation maps a single T1, E1, DS1C or DS2 into a VT | |||
| and then into packets. | and then into packets. | |||
| o The fractional STS-1 encapsulation defined herein can carry any | - The fractional STS-1 encapsulation defined herein can carry any | |||
| number of VTs up to the maximal allowed within a single STS-1. | number of VTs up to the maximal allowed within a single STS-1. | |||
| o A DS3 is encapsulated within an STS-1 container and sent over an | - A DS3 is encapsulated within an STS-1 container and sent over an | |||
| STS-1 emulated circuit. | STS-1 emulated circuit. | |||
| These encapsulations are described in more detail in the following | These encapsulations are described in more detail in the following | |||
| sections. | sections. | |||
| 4. VT Encapsulation | 4. VT Encapsulation | |||
| The VT encapsulation carries a single VT1.5 (T1), VT2 (E2), VT3 or | The VT encapsulation carries a single VT1.5 (T1), VT2 (E2), VT3 or | |||
| VT6 circuit. Structured and unstructured modes are supported. | VT6 circuit. The E1 or T1 signal may be carried either in | |||
| byte-synchronous mapping or asynchronous mapping. This format is | ||||
| suitable for applications that carry only one TDM signal between | ||||
| sites, such as those shown in Figures 2 and 4. Byte-synchronous mode | ||||
| is typically used for applications that require DS0 access for voice | ||||
| switching, CCS and fractional data transfer (e.g. for Frame Relay). | ||||
| Byte-synchronous mapping may require that a framer is available at | ||||
| the T1 or E1 connection point. A framer is needed for performance | ||||
| monitoring on the incoming signal, loopback commands detection and | ||||
| extracting and insertion of the CCS signaling for T1 within the | ||||
| overheads bytes. In this case the T1 or E1 signals MAY be mapped | ||||
| using the byte-synchronous mode as defined in section 3.4.1.1 in | ||||
| [GR253]. If transparent transmission of the data and clock signals | ||||
| is required, without changing the framing patterns, bit-asynchronous | ||||
| mapping is used as defined in section 3.4.1.2 in [GR253]. | ||||
| Bit-asynchronous mapping does not require a framer at the T1 | ||||
| connection point. | ||||
| 4.1. Multi-frame Format | 4.1. Multi-frame Format | |||
| VTs are organized in SONET multi-frames, where a SONET multi-frame is | VTs are organized in SONET multi-frames, where a SONET multi-frame is | |||
| a sequence of four SONET SPEs. The SPE path overhead byte H4 | a sequence of four SONET SPEs. The SPE path overhead byte H4 | |||
| indicates the SPE number within the multi-frame. The VT overhead | indicates the SPE number within the multi-frame. The VT overhead | |||
| bytes (V1, V2, V3 and V4) of each VT occupy the same SPE byte at a | bytes (V1, V2, V3 and V4) of each VT occupy the same SPE byte at a | |||
| fixed position in SPEs 1, 2, 3 and 4 of the multi-frame, | fixed position in SPEs 1, 2, 3 and 4 of the multi-frame, | |||
| respectively. The VT data can float relative to the SPE position. | respectively. The VT data can float relative to the SPE position. | |||
| The VT overhead bytes V1, V2 and V3 are used as pointer and stuffing | The VT overhead bytes V1, V2 and V3 are used as pointer and stuffing | |||
| byte similar to the use of the H1, H2 and H3 TOH bytes. V4 is | byte similar to the use of the H1, H2 and H3 TOH bytes. V4 is | |||
| currently unused. | currently unused. | |||
| The structured VT mode does not carry the overhead bytes V1-V4 within | The VT encapsulation does not carry the overhead bytes V1-V4 within | |||
| the payload, but rather maps them into the CEP pointer and N/P | the payload, but rather maps the relevant information into the CEP | |||
| indications. The CEP pointer indicates the V5 byte within the | pointer and N/P indications. The CEP pointer indicates the position | |||
| payload. The unstructured mode carries these overhead bytes within | of the V5 byte within the payload. | |||
| the payload, and uses the pointer to indicate the beginning of the | ||||
| multi-frame byte by pointing to the V1 byte. | ||||
| Figure 5 below indicates the number of bytes occupied by a VT within | Figure 11 below indicates the number of bytes occupied by a VT within | |||
| a multi-frame. | a multi-frame. | |||
| Mapping Bytes per Multi-frame Reference | Mapping Bytes per Multi-frame Reference | |||
| ------------------------------------------------------------- | ------------------------------------------------------------- | |||
| VT1.5 108 bytes [GR253] section 3.4.1.1 | VT1.5 108 bytes [GR253] Section 3.4.1.1 | |||
| VT2 144 bytes [G.707] section 10.1.4.1 | VT2 144 bytes [G.707] Section 10.1.4.1 | |||
| VT3 216 bytes [GR253] section 3.4.1.3 | VT3 216 bytes [GR253] Section 3.4.1.3 | |||
| VT6 432 bytes [GR253] section 3.4.1.4 | VT6 432 bytes [GR253] Section 3.4.1.4 | |||
| Figure 5: Number of Bytes in a Multi-Frame | Figure 11: Number of Bytes in a Multi-Frame | |||
| Each CEP packet carries a fixed payload size that can go up to a | Each CEP packet carries a fixed payload size that can go up to a | |||
| single SONET multi-frame. This limitation is due to the restriction | single SONET multi-frame. This limitation is due to the restriction | |||
| of carrying only one pointer within each CEP header. In particular, | of carrying only one pointer within each CEP header. In particular, | |||
| a VT1.5 emulation packet can carry up to 108 bytes of payload in | a VT1.5 emulation packet can carry up to 104 bytes of payload | |||
| unstructured mode and up to 104 bytes in structured mode (leaving out | (leaving out V1-V4). | |||
| V1-V4). | ||||
| 4.2. VT Header | 4.2. VT Header | |||
| The basic VT CEP header is defined in Figure 6 per section 4 of | The basic VT CEP header is defined in Figure 12 per Section 4 of | |||
| [MALIS]: | [MALIS]: | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| |0|R|D|N|P| Structure Pointer[0:12] | Sequence Number[0:13] | | |E|R|D|N|P| Structure Pointer[0:12] | Sequence Number[0:13] | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 6: Basic VT CEP Header Format | Figure 12: Basic VT CEP Header Format | |||
| The following fields are used within the header: | The following fields are used within the header: | |||
| o R bit: RDI indication. The RDI indication is sent whenever a | - E: Extension bit. The E bit indicates whether the extended header | |||
| remote defect indication needs to be sent to the far side. | (to be defined in future revision of [MALIS]) is used. | |||
| o D bit: Support for DBA mode for unequipped and AIS indication | E=0: indicates that extended header is not used. | |||
| payload. See [MALIS] for more details. | ||||
| o N/P bits: (structured mode only) Indicate negative and positive | E=1: indicates that extended header is carried within the | |||
| pointer adjustment events. They are also used to relay SONET/SDH | packet. | |||
| maintenance signals such as AIS-V. N indicates a negative pointer | ||||
| event, and P indicates a positive pointer event. Both N and P are | ||||
| set to 1 to indicate AIS-V signal. | ||||
| o Structure pointer: | - R bit: RDI indication. The RDI indication is sent whenever a | |||
| remote defect indication needs to be sent to the PW far side. See | ||||
| [MALIS] for more details. | ||||
| - In structured mode, the Structure Pointer MUST contain the | - D bit: Support for DBA mode for unequipped and AIS indication | |||
| offset of the V5 byte within the VT Fragment. A value 0 means | payload. See Section 7.7.2 below for more details. | |||
| the first byte after the CEP header. The maximal structure | ||||
| pointer value corresponds to the maximal number of VT bytes | ||||
| contained within a multi-frame, minus the 4 overhead bytes. The | ||||
| Structure Pointer MUST be set to 0x1FF if a packet does not | ||||
| carry the V5 byte. | ||||
| - In unstructured mode, the Structure Pointer MUST contain the | - N/P bits: Indicate negative and positive pointer adjustment events. | |||
| offset of the V1 byte within the VT Fragment. Value 0 means the | They are also used to relay SONET/SDH maintenance signals such as | |||
| first byte after the CEP header. The maximal structure pointer | AIS-V. N indicates a negative pointer event, and P indicates a | |||
| value corresponds to the maximal number of VT bytes contained | positive pointer event. Both N and P are set to 1 to indicate the | |||
| within a multi-frame. The Structure Pointer MUST be set to | AIS-V signal. | |||
| 0x1FF if a packet does not carry the V1 byte. | ||||
| - Structure pointer: The Structure Pointer MUST contain the offset of | ||||
| the V5 byte within the VT Fragment. A value 0 means the first byte | ||||
| after the CEP header. The maximal structure pointer value | ||||
| corresponds to the maximal number of VT bytes contained within a | ||||
| multi-frame, minus the 4 overhead bytes. The Structure Pointer | ||||
| MUST be set to 0x1FF if a packet does not carry the V5 byte. | ||||
| 5. Fractional STS-1 Encapsulation | 5. Fractional STS-1 Encapsulation | |||
| The fractional STS-1 encapsulation carries VTs within an STS-1 | The fractional STS-1 encapsulation carries VTs within an STS-1 | |||
| container. The STS-1 container includes the path overhead bytes, and | container. This format is suitable for applications such as those | |||
| the normal SONET encapsulation is used. The additional benefit in | shown in Figures 6 and 8. | |||
| using the fractional STS-1 encapsulation is that it does not require | ||||
| sending any unused VTs. | The STS-1 container includes the path overhead bytes, and the normal | |||
| SONET encapsulation is used. The additional benefit in using the | ||||
| fractional STS-1 encapsulation is that it does not require sending | ||||
| any unused VTs, giving the ability to be used as a compressed version | ||||
| of the STS-1 encapsulation defined in [MALIS]. | ||||
| The fractional STS-1 encapsulation can optionally carry a bit mask | The fractional STS-1 encapsulation can optionally carry a bit mask | |||
| that specifies which VT is carried within the STS-1 payload and which | that specifies which VTs are carried within the STS-1 payload and | |||
| VTs have been removed. This optional bit mask attribute allows the | which VTs have been removed. This optional bit mask attribute allows | |||
| ingress circuit emulation node to remove an unequipped VT on the fly, | the ingress circuit emulation node to remove an unequipped VT on the | |||
| providing the egress circuit emulation node enough information for | fly, providing the egress circuit emulation node enough information | |||
| reconstructing the VTs in the right order. In particular, the | for reconstructing the VTs in the right order. The use of bit mask | |||
| fractional STS-1 encapsulation can be used as a compressed version of | enables "on the fly" compression, whereby only equipped VTs (carrying | |||
| the STS-1 encapsulation defined in [MALIS]. | actual data) are sent. This compression saves bandwidth in the PSN. | |||
| 5.1. Fractional STS-1 Mapping | 5.1. Fractional STS-1 Mapping | |||
| Figure 7 below shows a mapping of 3 VT1.5s, designated 1-1, 2-1 and | Figure 13 below shows a mapping of 3 VT1.5s, designated 1-1, 2-1 and | |||
| 3-1. Note that the fixed stuffs shown in Figure 4 are not sent when | 3-1. | |||
| using this mode. | ||||
| POH|VT1 VT2 VT3 VT1 VT2 VT3 VT1 VT2 VT3 | POH|VT1 VT2 VT3 VT1 VT2 VT3 VT1 VT2 VT3 | |||
| +---+---+---+---+---+---+---+---+---+---+ | +---+---+---+---+---+---+---+---+---+---+ | |||
| 1 |J1 | V1-V4 | | | | | | | | 1 |J1 | V1-V4 | | | | | | | | |||
| +---+---+---+---+ | | | | | | | +---+---+---+---+ | | | | | | | |||
| 2 |B3 | | | | | | | | | | | 2 |B3 | | | | | | | | | | | |||
| +---+ | | | | | | | | | | +---+ | | | | | | | | | | |||
| 3 |C2 | | | | | | | | | | | 3 |C2 | | | | | | | | | | | |||
| +---+ | | | | | | | | | | +---+ | | | | | | | | | | |||
| 4 |G1 | | | | | | | | | | | 4 |G1 | | | | | | | | | | | |||
| skipping to change at page 9, line 49 ¶ | skipping to change at page 13, line 46 ¶ | |||
| +---+1-1|2-1|3-1|1-1|2-1|3-1|1-1|2-1|3-1| | +---+1-1|2-1|3-1|1-1|2-1|3-1|1-1|2-1|3-1| | |||
| 6 |H4 | | | | | | | | | | | 6 |H4 | | | | | | | | | | | |||
| +---+ | | | | | | | | | | +---+ | | | | | | | | | | |||
| 7 |Z3 | | | | | | | | | | | 7 |Z3 | | | | | | | | | | | |||
| +---+ | | | | | | | | | | +---+ | | | | | | | | | | |||
| 8 |Z4 | | | | | | | | | | | 8 |Z4 | | | | | | | | | | | |||
| +---+ | | | | | | | | | | +---+ | | | | | | | | | | |||
| 9 |Z5 | | | | | | | | | | | 9 |Z5 | | | | | | | | | | | |||
| +---+---+---+---+---+---+---+---+---+---+ | +---+---+---+---+---+---+---+---+---+---+ | |||
| Figure 7: Fractional SPE Mapping of VT1.5 | Figure 13: Fractional SPE Mapping of VT1.5 | |||
| Note that Figure 7 shows the bytes from the VTs interleaved, as with | Note that the fixed stuffs shown in Figure 10 are not sent when using | |||
| the SONET SPE shown in Figure 4. This interleaving reduces the | this mode. Also note that Figure 13 shows the bytes from the VTs | |||
| buffering required at the ingress and egress PEs. It also helps | interleaved, as with the SONET SPE shown in Figure 10. This | |||
| simplify the construction of combined PW/ADM PEs to operate in | interleaving reduces the buffering required at the ingress and egress | |||
| networks such as that shown in Figure 2. The "fractional" SPE in | PEs. It also helps simplify the construction of combined PW/ADM PEs | |||
| Figure 7 could be expanded out to a full SPE by the addition of | to operate in networks such as that shown in Figure 1. The | |||
| "dummy" VTs, Path Overhead and fixed stuffs. | "fractional" SPE in Figure 13 could be expanded out to a full SPE by | |||
| the addition of "dummy" VTs, Path Overhead and fixed stuffs. | ||||
| Section 3.3.3 of [GR253] states that "Four bytes (V5, J2, Z6 and Z7) | Section 3.3.3 of [GR253] states that "Four bytes (V5, J2, Z6 and Z7) | |||
| are allocated for VT POH." The same section also defines how these | are allocated for VT POH." The same section also defines how these | |||
| bits are set. | bits are set. | |||
| 5.2. Fractional STS-1 CEP header | 5.2. Fractional STS-1 CEP header | |||
| The fractional STS-1 CEP header uses the STS-1 CEP header | The fractional STS-1 CEP header uses the STS-1 CEP header | |||
| encapsulation as defined in [MALIS]. Optionally, an additional 4 | encapsulation as defined in [MALIS]. Optionally, an additional 4 | |||
| byte header extension word is added. The extended header is | byte header extension word is added. The extended header is | |||
| described in Figure . The E bit is set to 1 to indicate use of the | described in Figure 14. | |||
| extended header [MALIS] | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| |E|R|D|N|P| Structure Pointer[0:12] | Sequence Number[0:13] | | |E|R|D|N|P| Structure Pointer[0:12] | Sequence Number[0:13] | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| |0|0|0|0| Unequipped Bit Mask [0:27] | | |E|0|0|0| Equipped Bit Mask (EBM) [0:27] | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 8: Extended fractional STS-1 Header | Figure 14: Extended Fractional STS-1 Header | |||
| The following fields are used within the extended header: | The following fields are used within the extended header: | |||
| o R, D, N, P, Structured Pointer, Sequence Number: All fields are | - R, D, N, P, Structured Pointer and Sequence Number: All fields | |||
| used as defined in [MALIS] for STS-1 encapsulation. | are used as defined in [MALIS] for STS-1 encapsulation. | |||
| o E: Extension bit. E = 1 indicates that extended header is used. | - E: Extension bit. | |||
| E = 0 indicates that extended header is not carried within the | ||||
| packet. | ||||
| o Unequipped Bit Mask: Each bit within the bit mask refers to a | E=0: indicates that extended header is not used. | |||
| different VT within the STS-1 container. Bit zero refers to the | ||||
| first VT within the STS-1 SPE. For an STS-1 carrying VT1.5s, | E=1: indicates that extended header is carried within the | |||
| all 28 bits are used. For an STS-1 carrying VT2s, only the | packet. | |||
| first 21 bits are used. A bit set to 0 indicates that the | ||||
| fractional STS-1 payload carries the corresponding VT. | The E bit in the first word is set to 1 to indicate use of the | |||
| Equipped Bit Mask (EBM). The E bit in the second word indicates | ||||
| whether the extended header (to be defined in future revision of | ||||
| [MALIS]) is used. | ||||
| - EBM: Each bit within the bit mask refers to a different VT | ||||
| within the STS-1 container. A bit set to 1 indicates that the | ||||
| corresponding VT is equipped, hence carried within the | ||||
| fractional STS-1 payload. | ||||
| The format of the EBM is defined in Figure 15. | ||||
| 0 1 2 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | VTG1 | VTG2 | VTG3 | VTG4 | VTG5 | VTG6 | VTG7 | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| Figure 15: Equipped Bit Mask (EBM) | ||||
| The 28 bits of the EBM are divided into groups of 4 bits, each | ||||
| corresponding to a different VTG within the STS container. All 4 | ||||
| bits are used to indicate whether VT1.5 (T1) tributaries are carried | ||||
| within a VTG. The first 3 bits are used to indicate whether VT2 (E1) | ||||
| tributaries are carried within a VTG. For example, the EBM of a | ||||
| fully occupied STS-1 with VT1.5 is all ones, while that of an STS-1 | ||||
| fully occupied with VT2 (E1) tributaries has the binary value | ||||
| 1110111011101110111011101110. | ||||
| 5.3. BIP | 5.3. BIP | |||
| The B3 byte within the POH indicates the bit wise parity of the | The B3 byte within the POH indicates the bit-wise parity of the | |||
| payload. In applications where the Path is terminated at the PE | payload. | |||
| (i.e. the fractional STS-1 is used to carry TDM signals between the | ||||
| ingress and egress emulation edges), the B3 is generated and should | 5.3.1. Case 1: Path Terminating Equipment (PTE) | |||
| equal the bit-wise parity of the VTs carried within the fractional | ||||
| STS-1 payload. In applications where the Path is not terminated at | In some applications the Path is terminated at the PE, and some PEs | |||
| the PE (i.e. the fractional STS-1 is used to carry a compressed | may integrate many fractional STS-1's into one STS-1. Figure 8 shows | |||
| STS-1), the B3 value should be modified to reflect the removal of the | an example of PTE, where a PE is using a fractional STS-1 to carry | |||
| unequipped VTs. Let B3* be the bit wise parity of the removed | TDM signals between the ingress and egress emulation edges. In these | |||
| cases B3 is re-generated at the concentrating PE toward the SONET | ||||
| equipment, and B3 is calculated as the payload is sent, including VTs | ||||
| and POH bytes. | ||||
| 5.3.2. Case 2: Non-PTE | ||||
| In some applications the Path is not terminated at the PE. For | ||||
| example, the PEs in Figure 6 are using a fractional STS-1 to carry a | ||||
| partially-equipped STS-1, and are not acting as PTEs. | ||||
| In this case the B3 value should be modified to reflect the removal | ||||
| of the unequipped VTs. Let B3* be the bit-wise parity of the removed | ||||
| unequipped VTs, and let B3p be the value carried within the | unequipped VTs, and let B3p be the value carried within the | |||
| fractional STS-1 payload. Then B3p = B3 || B3*, where || indicates a | fractional STS-1 payload. Then B3p = B3 || B3*, where || indicates a | |||
| bit-wise OR operation. The egress PE can reconstruct the unequipped | bit-wise OR operation. The egress PE can reconstruct the unequipped | |||
| VTs and modify the B3p value in the same manner to accommodate for | VTs and modify the B3p value in the same manner to accommodate for | |||
| the additional VTs added. In this way the end-to-end B3 parity is | the additional VTs added. In this way the end-to-end BIP is | |||
| preserved. | preserved. | |||
| 6. DS3 Encapsulation | 6. DS3 Encapsulation | |||
| A DS3 is encapsulated into an STS-1 SPE using the format defined in | A DS3 is encapsulated asynchronously into an STS-1 SPE using the | |||
| sections 3.4.2.1 (synchronous) and 3.4.2.2 (asynchronous) of [GR253]. | format defined in section 3.4.2.2 of [GR253]. The STS-1 SPE is then | |||
| The STS-1 SPE is then encapsulated as defined in section 4 of | encapsulated as defined in Section 4 of [MALIS]. | |||
| [MALIS]. | ||||
| 7. Operational Considerations | 7. Operational Considerations | |||
| 7.1. Time Slot Assignment (TSA) | 7.1. Payload Size | |||
| For an application like that shown in Figure 2, it may be desirable | Payload sizes are statically provisioned for each TDM stream as | |||
| described in [MALIS], using the same management information base | ||||
| [MIB]. CEP packets are normally fixed in length for all of the | ||||
| packets of a particular emulated TDM stream. The exceptions are DBA | ||||
| CEP packets and on the fly compression within the fractional STS-1 | ||||
| mode. When the fractional STS-1 encapsulation does not carry the | ||||
| equipped flag indications, the VTs to be transmitted MUST be | ||||
| statically provisioned at both ends. The static EBM provisioned at | ||||
| the egress must equal in the number of VTs equipped at the ingress, | ||||
| but the actual VT positions could vary. The length of each CEP | ||||
| packet does not need to be carried in the CEP header because it can | ||||
| be uniquely determined for each CEP packet as a function of the | ||||
| provisioned payload size, the type of VTs carried within the STS-1 | ||||
| signal, the DBA indication and the equipped flags (either dynamically | ||||
| or statically provisioned). | ||||
| Only the following payload lengths can be statically provisioned for | ||||
| fractional STS-1 encapsulations: | ||||
| 1. Full SPE length (783 bytes) | ||||
| 2. Third of SPE length (261 bytes) | ||||
| The actual payload sizes would be smaller, depending on the number of | ||||
| virtual tributaries carried within the fractional SPE. Figure 16 | ||||
| provides the actual payload length as a function of N, the number of | ||||
| tributaries carried within the fractional STS-1. | ||||
| In particular, when all VTs are equipped, the fractional STS-1 full | ||||
| SPE payload size is 765 bytes. | ||||
| VT Type Full SPE SPE/3 | ||||
| ---------------------------------------------- | ||||
| VT1.5 (T1) 27*N+9 9*N+3 N=0..28 | ||||
| VT2 (E1) 36*N+9 12*N+3 N=0..21 | ||||
| Figure 16: Fractional STS-1 Actual Payload Size | ||||
| 7.2. Operational Modes | ||||
| Figure 17 defines the various options for PW encapsulations and user | ||||
| interfaces physical connections. | ||||
| +---------+--------------+-----------------+ | ||||
| | Mode # |User Interface| PW Encapsulation| | ||||
| +---------+--------------+-----------------+ | ||||
| | 1 * | T1 | VT | | ||||
| | 2 | T1 |Fractional STS-1 | | ||||
| | 3 | STS-1 | VT | | ||||
| | 4 * | STS-1 |Fractional STS-1 | | ||||
| +---------+--------------+-----------------+ | ||||
| * Most common uses. | ||||
| Figure 17: PW Encapsulations Related to User Interfaces | ||||
| 7.3. Time Slot Assignment (TSA) | ||||
| For an application like that shown in Figure 8, it may be desirable | ||||
| to change the TSA for a given VT. For example, an operator may | to change the TSA for a given VT. For example, an operator may | |||
| desire to take an E1 appearing in the first VT on the ingress side | desire to take an E1 appearing in the first VT on the ingress side | |||
| and place it in a different E1 on the egress side. The PE MAY allow | and place it in a different VT on the egress side. The PE MAY allow | |||
| the operator to configure the assignment of Time Slots at each end of | the operator to configure the assignment of Time Slots at each end of | |||
| the PW. | the PW. | |||
| 7.2. Timing | 7.4. Timing | |||
| See section 8 of [MALIS]. | This section will describe some clarifications about the EPAR | |||
| operation and its applicability to this document in the various modes | ||||
| defined above. The term REFCLK is used to indicate the local PE node | ||||
| system clock that is synchronized via the network timing distribution | ||||
| to the source clock feeding the peer PE system clock. | ||||
| 7.3. Loopbacks | Mode #1: The VT framing timing is based on the REFCLK. If | |||
| asynchronous mode is used, there is no use of pointer | ||||
| adjustments on the CEP VT header, and timing differences | ||||
| between the incoming T1 signal and REFCLCK are accommodated | ||||
| by the use of stuffing bits as defined in [GR253]. If | ||||
| byte-synchronous mode is used, the timing difference is | ||||
| accommodated by the use of pointer adjustments indication on | ||||
| the VT CEP header. | ||||
| When operating in a structured mode, a PE SHOULD process loopback | Mode #2: The signal is first mapped to a VT as defined in [GR253], | |||
| messages as defined in [T1.403]. This allows better isolation of | which than maps for into fractional STS-1. The T1 to VT | |||
| faults in a network. It also facilitates the certification of | timing differences are accommodated as defined in [GR-253] | |||
| equipment for operation in a carrier's network. | (based on the relevant mode - byte synchronize or | |||
| asynchronous) and the pointers at the CEP level are fixed. | ||||
| There are also inband loopbacks that are used for voice equipment. | Mode #3: Relative pointer adjustments of the incoming STS to REFCLCK | |||
| These are falling out of favor due to their incompatibility with data | are added to the VT to STS pointer adjustments and played on | |||
| services. A PE that implements inband loopbacks must have the | the VT CEP header as defined in [MALIS]. | |||
| capability to disable them. | ||||
| 7.4. Performance Processing | Mode #4: Same as in [MALIS]. | |||
| [T1.403] defines a Network Performance Report Message (NPRM) that | Notes: | |||
| carries periodic reports on the performance of the link. A PE | ||||
| operating in a structured mode SHOULD generate these messages, as | ||||
| they are frequently used for surveillance and trouble-shooting. | ||||
| 7.5. LOS/AIS | 1) In mode #1 the originator of the PW is not known to be operating | |||
| in mode #1 or mode #3, so the receiver may need to accommodate | ||||
| both stuffing bits and CEP VT pointer adjustments. | ||||
| 2) If one STS-1 is created from multiple sources, the timing of the | ||||
| generated STS-1 toward the user is typically based on the local | ||||
| REFCLCK. In this case each VT's pointer bytes should be played to | ||||
| reflect the pointer adjustments on the incoming CEP header + the | ||||
| VT itself V1-V4 pointer adjustments (if they exist on the incoming | ||||
| encapsulation). | ||||
| Each pointer justification in [MALIS] is indicated by 3 consecutive | ||||
| CEP header marking. The same procedure is used for the fractional | ||||
| STS-1 encapsulation. For VT encapsulation, pointer justification | ||||
| events are indicated only on the packet(s) that carry the justified | ||||
| multi-frame. | ||||
| 7.5. Loopbacks | ||||
| Figure 18 below shows a T1 being delivered to a customer site. The | ||||
| nomenclature at the top of the figure is that used in Figure 7 of | ||||
| [T1.403]. | ||||
| NT2 NT1 Network | ||||
| DSU CSU Interface | ||||
| +-------+-+ +-------------+ | | ||||
| | |F| | | | | ||||
| | /->|r|=========>|---\ /-->|======>|====> | ||||
| | | |a| Physical | | | | | | ||||
| | | |m| T1 | | | | | | ||||
| | \--|e|<=========|<--/ \---|<======|<==== | ||||
| | |r| | | | | ||||
| +-------+-+ +-------------+ | ||||
| Payload CI/CSU Line | ||||
| Loopback Loopback Loopback | ||||
| Figure 18: T1 Loopback Example | ||||
| Note there are two types of loopback commands: | ||||
| - Inband patterns as defined in Section 9.4.1 of [T1.403]. This | ||||
| type of loopback command was originally defined for voice | ||||
| equipment, and it often causes problems when used with data | ||||
| systems. Processing of inband loopbacks is usually disabled in | ||||
| newer equipment and applications and SHOULD NOT be implemented | ||||
| in a PE. | ||||
| - FDL messages that carry loopback commands as defined in Section | ||||
| 9.4.2 of [T1.403]. Support of these messages requires the use | ||||
| of a framer. | ||||
| Depending on the application, it may be desirable to process loopback | ||||
| messages and inband codes. The relevant considerations are: | ||||
| - Whether the PE implements a CSU functionality. If not, the | ||||
| appropriate hardware may not be present to implement the | ||||
| loopbacks. | ||||
| - What administrative domains are involved. A carrier will not | ||||
| want a customer to send commands that can interfere with network | ||||
| operation. | ||||
| - Whether the T1 service is structured or unstructured. | ||||
| Processing of FDL loopback commands requires the use of a | ||||
| framer. | ||||
| Whenever loopback processing is supported, there MUST be a means to | ||||
| disable such processing. | ||||
| The following examples point out when it may be appropriate to | ||||
| process loopback commands. | ||||
| 7.5.1. Neither End of T1 is in Carrier's Administrative Domain | ||||
| A network like that shown in Figure 2 may be providing T1 transport. | ||||
| In this case, the carrier may not wish to generate or process any | ||||
| loopback messages. | ||||
| 7.5.2. One End of T1 is in Carrier's Administrative Domain | ||||
| Consider the left-hand PEs in Figure 4. These PEs are within the | ||||
| administrative domain of the carrier. If these PEs are implementing | ||||
| the CSU functionality, then it would be desirable for these PEs to | ||||
| process loopback messages originating from within the carrier's | ||||
| network e.g. from the ADM on the right side. | ||||
| 7.6. Performance Processing and Reports | ||||
| [T1.403] defines a Network Performance Report Message (NPRM) and a | ||||
| Supplementary Performance Report Message (SPRM). These messages are | ||||
| periodic reports on the performance of the link. A PE operating in a | ||||
| structured mode SHOULD generate these messages, as they are | ||||
| frequently used for surveillance and trouble-shooting. Many framers | ||||
| automatically generate and send these reports. | ||||
| 7.7. Alarms and Failure Propagation | ||||
| 7.7.1. Performance Monitoring | ||||
| [MALIS] defines CEP level Errored Seconds (ES), Severely Errored | ||||
| Seconds (SES) and handling and reporting of CEP defects and failures. | ||||
| The same functionality is applicable here for both the fractional STS | ||||
| encapsulation and the VT encapsulation. | ||||
| 7.7.2. DBA Operation | ||||
| A TDM multiplexer, switch or other path-terminating device generates | A TDM multiplexer, switch or other path-terminating device generates | |||
| AIS in the downstream direction in response to a LOS or LOF | AIS in the downstream direction in response to a LOS or LOF | |||
| condition. This is done by sending a certain pattern in the data | condition. This is done by sending a certain pattern in the data | |||
| stream. Bandwidth can be saved by suppressing the AIS signal in the | stream. Bandwidth can be saved by suppressing the AIS signal in the | |||
| emulated stream and sending instead an indication in the control | emulated stream and sending instead an indication in the control | |||
| overhead. [MALIS] discusses the propagation of AIS using the pointer | overhead. [MALIS] discusses the propagation of AIS using the pointer | |||
| bits in the TDM control word. | bits in the TDM control word. | |||
| A PE emulating TDM circuit must either replicate the AIS indication | 7.7.2.1. Mandatory Procedures | |||
| or indicate this condition in the control overhead. | ||||
| 7.6. Session Multiplexing | These procedures MUST be implemented in equipment that does not | |||
| support VT level DBA. The term AIS-P and UNEQ-P are related to the | ||||
| STS PW encapsulation indication, AIS-V and UNEQ-V are either for the | ||||
| VT encapsulation indications or the VT inside a compressed STS, | ||||
| depending on the context. For all modes: If a PW was set up but an | ||||
| association to a user interface is not yet available, or the PW is in | ||||
| an administrative down state, then the relevant UNEQ indication MUST | ||||
| be sent toward the PSN. | ||||
| Mode #1: | ||||
| PW Ingress: T1 is propagated transparently inside the VT. Physical | ||||
| layer defects are propagated as T1 AIS inside the VT. | ||||
| PW Egress: AIS-V or UNEQ-V indications are played out as T1 AIS on | ||||
| the user interface. | ||||
| Mode #2: | ||||
| PW Ingress: T1 AIS is propagated transparently inside the VT | ||||
| containing the T1 on the STS. Physical layer defects | ||||
| are propagated as T1 AIS inside the VT. | ||||
| PW Egress: AIS-P, UNEQ-P, TIM-P (if activated and supported), | ||||
| PLM-P (if supported) , LOP-V, AIS-V and UNEQ-V | ||||
| indication are played out as T1 AIS on the user | ||||
| interface. | ||||
| Mode #3: | ||||
| PW Ingress: Section/line layer defects, AIS-P, UNEQ-P, LOP-P, TIM-P | ||||
| (if activated), PLM-P, or LOP-V defects generate AIS-V. | ||||
| PW Egress: AIS-V, UNEQ-V and LOP-V will be propagated inside the | ||||
| relevant VT inside the STS-1. | ||||
| Mode #4: Same as in [MALIS]. | ||||
| 7.7.2.2. Optional Procedures | ||||
| These procedures MAY be implemented when a VT encapsulation is used | ||||
| on the PW to conserve BW for AIS and UNEQ states. | ||||
| Mode #1: | ||||
| PW Ingress: T1 AIS or T1 physical layer defects are propagated as | ||||
| VT AIS DBA. | ||||
| Mode #2: No special procedures defined. | ||||
| Mode #3: | ||||
| PW Ingress: Section/line layer defects, AIS-P, UNEQ-P, LOP-P, TIM-P | ||||
| (if activated), PLM-P, or LOP-V defects generate AIS-V | ||||
| DBA. The signaling of DBA capability is the same as | ||||
| defined for CEP in [MALIS]. | ||||
| 7.7.3. Missing Packet | ||||
| In the case of a missing packet, all ones should be inserted instead | ||||
| of the missing bytes at the output signal. The only exception is | ||||
| where a single STS-1 is fed by multiple PWs. In this case the output | ||||
| POH is generated normally as this PE is PTE, and the all ones should | ||||
| be generated for the affected VTs only. | ||||
| 7.8. Session Multiplexing | ||||
| Session multiplexing is accomplished by use of the PW label shown in | Session multiplexing is accomplished by use of the PW label shown in | |||
| Figure 3. | Figure 9. | |||
| 7.9. Packet Length Considerations | ||||
| While the MTU introduced in this document is not an issue for packet | ||||
| networks (783 bytes for fully equipped STS-1 + PW + PSN header), some | ||||
| networks may have minimum packet length requirements. The following | ||||
| is defined to handle these cases: | ||||
| a. DBA operation: As specified in [MALIS], the DBA packet may be an | ||||
| arbitrary length. This length may be configured at the PW ingress | ||||
| side to handle minimum packet length requirements. The PW egress | ||||
| ignores the DBA packet length (i.e. does not consider it as length | ||||
| error), eliminating the need to negotiate the DBA length. PW | ||||
| edges SHOULD support the ability to set the DBA packet length to | ||||
| accommodate minimum packet length requirements. | ||||
| b. VT encapsulation: Selection of the packet length should be done | ||||
| based on the PSN minimum packet length requirement. | ||||
| c. Fractional STS-1: PW ingress SHOULD have the option to be | ||||
| configured to add padding to the PW packet if the packet is less | ||||
| than the minimum packet requirement. At egress, the PE can | ||||
| calculate the number of payload byte using the procedures defined | ||||
| in Section 7.1. The PE MUST ignore the additional padding bytes | ||||
| and should not consider padding bytes as length errors. | ||||
| 8. Security Considerations | 8. Security Considerations | |||
| See section 11 of [MALIS]. | See Section 11 of [MALIS]. | |||
| 9. References | 9. References | |||
| [MARTINI] Martini et al, "Transport of Layer 2 Frames Over MPLS", | [MARTINI] Martini et al, "Transport of Layer 2 Frames Over MPLS", | |||
| draft-martini-l2circuit-trans-mpls-08.txt, work in progress, | draft-martini-l2circuit-trans-mpls-08.txt, work in progress, | |||
| November 2001. | November 2001. | |||
| [GR253] Bellcore, "Synchronous Optical Network (SONET) Transport | [GR253] Bellcore, "Synchronous Optical Network (SONET) Transport | |||
| Systems: Common Generic Criteria" (GR253CORE), Issue 3, | Systems: Common Generic Criteria" (GR253CORE), Issue 3, | |||
| September 2000. | September 2000. | |||
| [G.707] ITU, ITU Recommendation G.707, "Network Node Interface For | [G.707] ITU, ITU Recommendation G.707, "Network Node Interface For | |||
| The Synchronous Digital Hierarchy", 1996. | The Synchronous Digital Hierarchy", 1996. | |||
| [T1.403] ANSI, "Network and Customer Installation Interfaces - DS1 | [T1.403] ANSI, "Network and Customer Installation Interfaces - DS1 | |||
| Electrical Interfaces", T1.403-1999, May 24, 1999. | Electrical Interfaces", T1.403-1999, May 24, 1999. | |||
| [XIAO] Xiao et al, "Requirements for Pseudo Wire Emulation Edge-to- | [XIAO] Xiao et al, "Requirements for Pseudo Wire Emulation | |||
| Edge (PWE3)" (draft-pwe3-requirements-01.txt), work in | Edge-to-Edge (PWE3)" (draft-pwe3-requirements-02.txt), work | |||
| progress, July 2001. | in progress, November 2001. | |||
| [PATE] Pate et al, "Framework for Pseudo-Wire Emulation Edge-to- | [PATE] Pate et al, "Framework for Pseudo-Wire Emulation | |||
| Edge (PWE3)" (draft-pate-pwe3-framework-02.txt), work in | Edge-to-Edge (PWE3)" (draft-pate-pwe3-framework-02.txt), | |||
| progress, September 2001. | work in progress, September 2001. | |||
| [MALIS] Malis et al, "SONET/SDH Circuit Emulation over Packet (CEP)" | [MALIS] Malis et al, "SONET/SDH Circuit Emulation over Packet (CEP)" | |||
| (draft-malis-pwe3-sonet-01.txt), work in progress, November | (draft-malis-pwe3-sonet-01.txt), work in progress, November | |||
| 2001. | 2001. | |||
| [MIB] Danenberg et al, "SONET/SDH Circuit Emulation Service Over | ||||
| PSN (CEP) Management Information Base Using SMIv2", | ||||
| draft-danenberg-pw-cem-mib-01.txt, work in progress, July | ||||
| 2001. | ||||
| 10. Authors' Addresses | 10. Authors' Addresses | |||
| Prayson Pate | Prayson Pate | |||
| Overture Networks, Inc. | Overture Networks, Inc. | |||
| P. O. Box 14864 | P. O. Box 14864 | |||
| RTP, NC, USA 27709 | RTP, NC, USA 27709 | |||
| Email: prayson.pate@overturenetworks.com | Email: prayson.pate@overturenetworks.com | |||
| Ron Cohen | Ron Cohen | |||
| Lycium Networks | Lycium Networks | |||
| P.O.Box 12256 | P. O. Box 12256 | |||
| Herzeliya, Israel 46733 | Herzeliya, Israel 46733 | |||
| Email: ronc@lyciumnetworks.com | Email: ronc@lyciumnetworks.com | |||
| David Zelig | David Zelig | |||
| Corrigent Systems LTD. | Corrigent Systems LTD. | |||
| 126, Yigal Alon st. | 126, Yigal Alon st. | |||
| Tel Aviv, Israel | Tel Aviv, Israel | |||
| EMail: Davidz@corrigent.com | EMail: Davidz@corrigent.com | |||
| 11. Full Copyright Section | 11. Full Copyright Section | |||
| Copyright (C) The Internet Society (2000). All Rights Reserved. | Copyright (C) The Internet Society (2000). All Rights Reserved. | |||
| This document and translations of it may be copied and furnished to | This document and translations of it may be copied and furnished to | |||
| others, and derivative works that comment on or otherwise explain it | others, and derivative works that comment on or otherwise explain it | |||
| or assist in its implementation may be prepared, copied, published | or assist in its implementation may be prepared, copied, published | |||
| and distributed, in whole or in part, without restriction of any | and distributed, in whole or in part, without restriction of any | |||
| kind, provided that the above copyright notice and this paragraph are | kind, provided that the above copyright notice and this paragraph are | |||
| included on all such copies and derivative works. However, this | included on all such copies and derivative works. However, this | |||
| End of changes. 88 change blocks. | ||||
| 205 lines changed or deleted | 699 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||