| < draft-rabbat-fnp-applicability-00.txt | draft-rabbat-fnp-applicability-01.txt > | |||
|---|---|---|---|---|
| CCAMP Working Group Richard Rabbat (Fujitsu Labs. of America) | CCAMP Working Group Richard Rabbat (Fujitsu Labs. of America) | |||
| Internet Draft Ching-Fong Su (Fujitsu Labs. of America) | Internet Draft Ching-Fong Su (Fujitsu Labs. of America) | |||
| Expires: April 2004 Vishal Sharma (Metanoia, Inc.) | Expires: December 2004 Vishal Sharma (Metanoia, Inc.) | |||
| October 2003 | June 2004 | |||
| Observations on the Applicability of the Fault Notification Protocol | Observations on the Applicability of the Fault Notification Protocol | |||
| draft-rabbat-fnp-applicability-00.txt | draft-rabbat-fnp-applicability-01.txt | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026 [1]. | all provisions of Section 10 of RFC2026 [1]. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
| Drafts. | Drafts. | |||
| skipping to change at page 1, line 38 ¶ | skipping to change at page 1, line 38 ¶ | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Abstract | Abstract | |||
| The Fault Notification Protocol (FNP) is a set of procedures designed | The Fault Notification Protocol (FNP) is a set of procedures designed | |||
| to enable time-bounded failure notification in networks using an IP- | to enable time-bounded failure notification in networks using an IP- | |||
| based control plane. This document discusses the applicability of FNP | based control plane. This document discusses the applicability of FNP | |||
| in the context of optical transport networks. It highlights the | in the context of optical transport networks. It highlights the | |||
| protocol’s principles of operation, and then describes the network, | protocolÆs principles of operation, and then describes the network, | |||
| node, fault, and operational models in optical networks for which the | node, fault, and operational models in optical networks for which the | |||
| protocol is designed. It also discusses the relationship to higher | protocol is designed. It also discusses the relationship to higher | |||
| layers, and issues of scalability. Some guidelines for deployment are | layers, and issues of scalability. Some guidelines for deployment are | |||
| also provided. | also provided. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction...................................................2 | 1. Introduction...................................................2 | |||
| 2. Terminology....................................................2 | 2. Terminology....................................................2 | |||
| 3. Operational Overview of FNP....................................3 | 3. Operational Overview of FNP....................................3 | |||
| skipping to change at page 2, line 22 ¶ | skipping to change at page 2, line 22 ¶ | |||
| 4.2 Node Architecture.............................................4 | 4.2 Node Architecture.............................................4 | |||
| 4.3 Fault Model (Types of faults supported).......................4 | 4.3 Fault Model (Types of faults supported).......................4 | |||
| 4.4 Network Layer at which FNP Applies............................5 | 4.4 Network Layer at which FNP Applies............................5 | |||
| 4.5 Relationship to Higher (Packet) Layers........................5 | 4.5 Relationship to Higher (Packet) Layers........................5 | |||
| 4.6 Operational Model.............................................5 | 4.6 Operational Model.............................................5 | |||
| 4.7 Framing and Data Plane Considerations.........................6 | 4.7 Framing and Data Plane Considerations.........................6 | |||
| 4.8 Scalability Considerations....................................6 | 4.8 Scalability Considerations....................................6 | |||
| 4.9 Guidelines for Deployment.....................................7 | 4.9 Guidelines for Deployment.....................................7 | |||
| 5. Conclusion.....................................................7 | 5. Conclusion.....................................................7 | |||
| 6. Acknowledgements...............................................7 | 6. Acknowledgements...............................................7 | |||
| 7. Intellectual Property Considerations...........................7 | 7. Intellectual Property Considerations...........................8 | |||
| 8. References.....................................................8 | 8. References.....................................................8 | |||
| 9. Authors' Addresses.............................................9 | 9. Authors' Addresses.............................................9 | |||
| 10. Full Copyright Statement.....................................10 | 10. Full Copyright Statement......................................9 | |||
| 1. | 1. Introduction | |||
| Introduction | ||||
| As carriers move towards offering advanced services on their | As carriers move towards offering advanced services on their | |||
| networks, with a tighter integration of the different network layers, | networks, with a tighter integration of the different network layers, | |||
| the ability to provide rapid, scalable, and timely restoration is | the ability to provide rapid, scalable, and timely restoration is | |||
| crucial for meeting agreed-upon SLAs, either between providers or | crucial for meeting agreed-upon SLAs, either between providers or | |||
| between the end-customer and a provider. In this context, time- | between the end-customer and a provider. In this context, time- | |||
| bounded fault notification will be a key component of the overall | bounded fault notification will be a key component of the overall | |||
| carrier restoration strategy. | carrier restoration strategy. | |||
| The Fault Notification Protocol (FNP) [2] is a protocol developed to | The Fault Notification Protocol (FNP) [2] is a protocol developed to | |||
| meet this service provider requirement. It is designed to facilitate | meet this service provider requirement. It is designed to facilitate | |||
| rapid restoration by enabling time-bounded fault notification in | rapid recovery by enabling time-bounded fault notification in | |||
| networks that use an IP-based control plane. | networks that use an IP-based control plane. | |||
| The purpose of this memo is to discuss the applicability of FNP in | The purpose of this memo is to discuss the applicability of FNP in | |||
| the context of optical transport networks. | the context of optical transport networks. | |||
| 2. | 2. Terminology | |||
| Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [3]. | document are to be interpreted as described in RFC 2119 [3]. | |||
| 3. | 3. Operational Overview of FNP | |||
| Operational Overview of FNP | ||||
| In this section, we briefly review the basic operation of FNP while | In this section, we briefly review the basic operation of FNP while | |||
| confining our discussion here to optical transport networks. | confining our discussion here to optical transport networks. | |||
| Fundamentally, FNP is a set of procedures designed to provide time- | Fundamentally, FNP is a set of procedures designed to provide time- | |||
| bounded fault notification in a network with shared protection. That | bounded fault notification in a network with shared protection. That | |||
| is, a network where either the protection route between two nodes | is, a network where either the protection route between two nodes | |||
| carries “extra traffic” from two or more disjoint trails, or the | carries ôextra trafficö from two or more disjoint trails, or the | |||
| provider implements M:N type shared restoration. | provider implements M:N type shared restoration. | |||
| Once a network fault is detected, the node detecting the fault sends | Once a network fault is detected at T-detect, and a set hold-off time | |||
| out a fault notification message to each of its neighbors on the | T2 has expired at time T-start-ntf, the node detecting the fault | |||
| control plane. The message essentially identifies the resource | sends out a fault notification message to each of its neighbors on | |||
| the control plane. The message essentially identifies the resource | ||||
| (fiber, lambda, or node) at fault; this allows any network node | (fiber, lambda, or node) at fault; this allows any network node | |||
| receiving a fault notification message to determine whether it lies | receiving a fault notification message to determine whether it lies | |||
| on the path of a backup LSP corresponding to a working LSP affected | on the path of a backup LSP corresponding to a working LSP affected | |||
| by the fault. The message also carries the time (per the local clock) | by the fault. The message also carries the time (per the local clock) | |||
| at which the fault was detected. | at which the notification process started T-start-ntf. | |||
| Each network node, upon the receipt of a fault notification message | Each network node, upon the receipt of a fault notification message | |||
| first transmits the message on each of its remaining outgoing | first transmits the message on each of its remaining outgoing | |||
| interfaces, and then processes the message to determine whether it | interfaces, and then processes the message to determine whether it | |||
| lies on the path of a backup LSP(s) that needs to be activated as a | lies on the path of a backup LSP(s) that needs to be activated as a | |||
| result of that fault. If so, the node first drops any extra-traffic | result of that fault. If so, the node first drops any extra-traffic | |||
| that was using the resources originally reserved for this backup LSP, | that was using the resources originally reserved for this backup LSP, | |||
| and reconfigures its cross-connect hardware so that the working | and reconfigures its cross-connect hardware so that the working | |||
| traffic arriving on the backup LSP can be directed to the appropriate | traffic arriving on the backup LSP can be directed to the appropriate | |||
| outgoing link/interface. | outgoing link/interface. | |||
| The flooding mechanism ensures that information about the fault is | The flooding mechanism ensures that information about the fault is | |||
| propagated to each network node in the minimum number of hops on the | propagated to each network node in the minimum number of hops on the | |||
| control plane and, provided that the fault notification packet gets | control plane and, provided that the fault notification packet gets | |||
| high-priority in the transmission queues at each node, also that | high-priority in the transmission queues at each node, also that | |||
| fault notification is propagated in the shortest possible time. | fault notification is propagated in the shortest possible time. | |||
| A protection switching node, upon receiving the notification message, | An ingress node, upon receiving the notification message, waits for | |||
| waits for an amount of time that is the difference of the | an amount of time that is the difference of the upper bound on the | |||
| notification time bound (Tntf) and the time at which the fault was | notification time (T-ntf) and the time at which the fault | |||
| detected (Tdetect), and then switches traffic from the affected | notification started (T-start-ntf), and then switches traffic from | |||
| working path(s) to the backup path(s). Note that this eliminates a | the affected working path(s) to the backup path(s). Note that this | |||
| phase of signaling that would typically be needed in a signaling- | eliminates a phase of signaling that would typically be needed in a | |||
| based approach to activate the nodes along the backup LSP. | signaling-based approach to activate the nodes along the backup LSP. | |||
| The key is to ensure that by the time a protection-switching node | The key is to ensure that by the time a protection-switching node | |||
| performs the switch, all intermediate nodes along the associated | performs the switch, all intermediate nodes along the associated | |||
| backup path(s) will have configured themselves. This is assured by | backup path(s) will have configured themselves. This is assured by | |||
| selecting a backup path in such a way that for any fault on the | selecting a backup path in such a way that for any fault on the | |||
| corresponding working path, all of the nodes along the backup path | corresponding working path, all of the nodes along the backup path | |||
| will have been informed (and will have reconfigured themselves) | will have been informed (and will have reconfigured themselves) | |||
| within a time Tntf following Tdetect. Therefore, a protection- | within a time bound T-ntf following T-start-ntf. Therefore, each node | |||
| switching node performs the switch [Tntf – (Tcurrent – Tdetect)] ms | on the recovery path performs the switch [T-ntf û (T-current û T- | |||
| after learning of the fault via a fault notification message. | start-ntf)] milliseconds after learning of the fault via a fault | |||
| notification message. | ||||
| 4. | 4. FNP Applicability | |||
| FNP Applicability | ||||
| Our objective in this section is to clearly specify how and where FNP | Our objective in this section is to clearly specify how and where FNP | |||
| applies in the context of optical transport networks, by discussing | applies in the context of optical transport networks, by discussing | |||
| its applicability along several dimensions, as outlined below. | its applicability along several dimensions, as outlined below. | |||
| 4.1 | 4.1 Network Model | |||
| Network Model | ||||
| FNP is initially designed to operate within a single IGP area, where | FNP is initially designed to operate within a single IGP area, where | |||
| fine-grained signaling is used. | fine-grained signaling is used. | |||
| In fine-grained signaling, the entire backup resource (link, lambda, | In fine-grained signaling, the entire backup resource (link, lambda, | |||
| and hence, label) is selected during the initial signaling phase for | and hence, label) is selected during the initial signaling phase for | |||
| the backup path. Although FNP could also apply to coarse-grained | the backup path. Although FNP could also apply to coarse-grained | |||
| signaling (where only a link bundle is selected during the signaling | signaling (where only a link bundle is selected during the signaling | |||
| of the backup path, but the specific lambda and, hence, label, is | of the backup path, but the specific lambda and, hence, label, is | |||
| selected upon the occurrence of a failure) that requires coordination | selected upon the occurrence of a failure) that requires coordination | |||
| with signaling between adjacent nodes, and is left for further study. | with signaling between adjacent nodes, and is left for further study. | |||
| FNP is useful in contexts where either: (a) the provider implements | FNP is useful in contexts where either: (a) the provider implements | |||
| 1:1 restoration and allows the bandwidth on the backup path to be | 1:1 restoration and allows the bandwidth on the backup path to be | |||
| shared by trails that originate and terminate at nodes other than the | shared by trails that originate and terminate at nodes other than the | |||
| s-d of the backup path, or (b) the provider implements more general | s-d of the backup path, or (b) the provider implements more general | |||
| shared-mesh restoration, where multiple working LSPs with disjoint | shared-mesh restoration, where multiple working LSPs with disjoint | |||
| paths share backup resources. | paths share backup resources. | |||
| 4.2 | 4.2 Node Architecture | |||
| Node Architecture | ||||
| FNP is designed to work in networks with OEO nodes. Its applicability | FNP is designed to work in networks with OEO nodes. Its applicability | |||
| to networks with OOO nodes (that is, fully transparent all-optical | to networks with OOO nodes (that is, fully transparent all-optical | |||
| networks) depends on the monitoring capabilities of the OOO systems | networks) depends on the monitoring capabilities of the OOO systems | |||
| deployed, and is for further study. | deployed, and is for further study. | |||
| For a network with OEO nodes, the fault detection and correlation | For a network with OEO nodes, the fault detection and correlation | |||
| (which happens before FNP is activated, and is outside the scope of | (which happens before FNP is activated, and is outside the scope of | |||
| this document) occurs at the node closest to the fault. Once the | this document) occurs at the node closest to the fault. Once the | |||
| detection procedure has determined that a bonafide fault has | detection procedure has determined that a bonafide fault has | |||
| occurred, it activates FNP for fault notification. | occurred, it activates FNP for fault notification. | |||
| 4.3 | 4.3 Fault Model (Types of faults supported) | |||
| Fault Model (Types of faults supported) | ||||
| FNP is designed to support three types of faults in an optical | FNP is designed to support three types of faults in an optical | |||
| transport network – fiber cuts, transponder failures, and switch | transport network û fiber cuts, transponder failures, and switch | |||
| failures. These correspond, respectively, to link faults, lightpath | failures. These correspond, respectively, to link faults, lightpath | |||
| or LSP faults, and node faults. | or LSP faults, and node faults. | |||
| 4.4 | 4.4 Network Layer at which FNP Applies | |||
| Network Layer at which FNP Applies | ||||
| In the case of optical transport networks, FNP is designed to operate | In the case of optical transport networks, FNP is designed to operate | |||
| at the fiber and optical lightpath layers. The protocol works in the | at the fiber and optical lightpath layers. The protocol works in the | |||
| context of an optical transport layer that is controlled by an IP- | context of an optical transport layer that is controlled by an IP- | |||
| based control plane. | based control plane. | |||
| The operation of FNP in a multi-layer context, is a complex problem, | The operation of FNP in a multi-layer context, is a complex problem, | |||
| and is for further study. (For example, in a multi-layer situation, | and is for further study. (For example, in a multi-layer situation, | |||
| the goal might be to perform notification both at the layer closest | the goal might be to perform notification both at the layer closest | |||
| to the fault (as FNP currently does) and at the service layer (for | to the fault (as FNP currently does) and at the service layer (for | |||
| example at the level of a VT1.5 circuit that may typically be | example at the level of a VT1.5 circuit that may typically be | |||
| embedded inside a larger SONET/SDH circuit on a lightpath).) | embedded inside a larger SONET/SDH circuit on a lightpath).) | |||
| 4.5 | 4.5 Relationship to Higher (Packet) Layers | |||
| Relationship to Higher (Packet) Layers | ||||
| A key aspect of using FNP at the optical transport layer to provide | A key aspect of using FNP at the optical transport layer to provide | |||
| time-bounded notification (and hence recovery) is to be able to | time-bounded notification (and hence recovery) is to be able to | |||
| provide the higher (packet) layer some guarantees on how long the | provide the higher (packet) layer some guarantees on how long the | |||
| optical transport layer would take to respond to a failure. | optical transport layer would take to respond to a failure. | |||
| This allows carriers to implement appropriate hold-off timers at the | This allows carriers to implement appropriate hold-off timers at the | |||
| higher-layers, and to use this information to craft adequate SLA’s | higher-layers, and to use this information to craft adequate SLAÆs | |||
| with their customers. | with their customers. | |||
| In the event where the client layers (higher (packet) layers) and the | In the event where the client layers (higher (packet) layers) and the | |||
| server layer (the optical transport layer) are under the control of | server layer (the optical transport layer) are under the control of | |||
| different providers, it is reasonable to expect that the inter- | different providers, it is reasonable to expect that the inter- | |||
| provider agreements between the carriers would incorporate protection | provider agreements between the carriers would incorporate protection | |||
| switching timing bounds. In that case, notification timing bound | switching timing bounds. In that case, notification timing bound | |||
| guarantees provided by the carrier owning/operating the server layer | guarantees provided by the carrier owning/operating the server layer | |||
| would be useful to enable the carrier owning/operating the client | would be useful to enable the carrier owning/operating the client | |||
| layer to, in turn, incorporate these in the SLAs it signs. This | layer to, in turn, incorporate these in the SLAÆs it signs. This | |||
| notion could be applied recursively between pairs of adjacent | notion could be applied recursively between pairs of adjacent | |||
| carriers. | carriers. | |||
| 4.6 | 4.6 Operational Model | |||
| Operational Model | ||||
| FNP is applicable in a hierarchical network layering model, for | FNP is applicable in a hierarchical network layering model, for | |||
| example, packet over SONET/SDH over lambda over fiber, with the | example, packet over SONET/SDH over lambda over fiber, with the | |||
| recognition that the SONET/SDH layer is itself a layered architecture | recognition that the SONET/SDH layer is itself a layered architecture | |||
| (for example, VT1.5 in STS-1 in STS-3 in STS-12/48). | (for example, VT1.5 in STS-1 in STS-3 in STS-12/48). | |||
| Note that FNP does not by itself impose any requirements on the | Note that FNP does not by itself impose any requirements on the | |||
| policy that the provider uses to devise pre-emption schemes in the | policy that the provider uses to devise pre-emption schemes in the | |||
| case where shared restoration and extra-traffic are used. As a | case where shared restoration and extra-traffic are used. As a | |||
| practical matter, however, the carrier (or carriers) involved would | practical matter, however, the carrier (or carriers) involved would | |||
| have to devise pre-emption schemes that are not susceptible to a | have to devise pre-emption schemes that are not susceptible to a | |||
| domino effect (where the removal of some extra-traffic LSP causes a | domino effect (where the removal of some extra-traffic LSP causes a | |||
| cascading effect, triggering the pre-emption of a series of LSPs). A | cascading effect, triggering the pre-emption of a series of LSPs). A | |||
| carrier would be expected to ensure this simply to maintain network | carrier would be expected to ensure this simply to maintain network | |||
| stability. | stability. | |||
| 4.7 | 4.7 Framing and Data Plane Considerations | |||
| Framing and Data Plane Considerations | ||||
| FNP is a control-plane mechanism for disseminating fault information | FNP is a control-plane mechanism for disseminating fault information | |||
| throughout a network. As explained in Section 3, in the context of | throughout a network. As explained in Section 3, in the context of | |||
| transport networks, the flooding mechanism of FNP accomplishes both | transport networks, the flooding mechanism of FNP accomplishes both | |||
| notification and node reconfiguration simultaneously. That is, it | notification and node reconfiguration simultaneously. That is, it | |||
| informs the intermediate nodes along a backup LSP corresponding to an | informs the intermediate nodes along a backup LSP corresponding to an | |||
| affected working LSP of a fault, thus allowing them to reconfigure | affected working LSP of a fault, thus allowing them to reconfigure | |||
| themselves, while at the same time notifying the edge nodes | themselves, while at the same time notifying the edge nodes | |||
| responsible for taking a restoration action to recover the affected | responsible for taking a restoration action to recover the affected | |||
| LSP(s). | LSP(s). | |||
| When appropriate digital framing of the optical signal is available | When appropriate digital framing of the optical signal is available | |||
| in the data plane (e.g. G.709 digital wrapper or SONET/SDH framing), | in the data plane (e.g. G.709 digital wrapper or SONET/SDH framing), | |||
| and the optical transport nodes can process and interpret the framing | and the optical transport nodes can process and interpret the framing | |||
| overhead, FNP can interwork with the fault notification mechanisms | overhead, FNP can interwork with the fault notification mechanisms | |||
| available in the data plane (e.g. the Forward/Backward Defect | available in the data plane (e.g. the Forward/Backward Defect | |||
| Indication signals embedded in the framing overhead). In this case, | Indication signals embedded in the framing overhead). In this case, | |||
| even though notification of the end nodes may occur in the data | even though notification of the end nodes may occur in the data | |||
| plane, the notification of the nodes along the backup paths of the | plane, the notification of the nodes along the backup paths of the | |||
| affected working paths is still needed so that they can reconfigure | affected working paths is still needed so that they can reconfigure | |||
| themselves. This can be accomplished via FNP. | themselves. This can be accomplished via FNP. | |||
| 4.8 | 4.8 Scalability Considerations | |||
| Scalability Considerations | ||||
| FNP ensures that at most one message is exchanged on every control | FNP ensures that at most one message is exchanged on every control | |||
| channel link, whereas fault notification using signaling may lead to | channel link, whereas fault notification using signaling may lead to | |||
| a large number of signaling messages per link, as explained shortly. | a large number of signaling messages per link, as explained shortly. | |||
| This leads to a scalability advantage for DWDM networks that have a | This leads to a scalability advantage for DWDM networks that have a | |||
| large number of wavelengths or when there are numerous LSPs, each | large number of wavelengths or when there are numerous LSPs, each | |||
| corresponding to a small granularity SONET/SDH channel. | corresponding to a small granularity SONET/SDH channel. | |||
| Let us define the length of a control channel between two adjacent | Let us define the length of a control channel between two adjacent | |||
| nodes to be the number of hops that a control message takes to go | nodes to be the number of hops that a control message takes to go | |||
| from one node to the other. Thus, an in-band control channel has | from one node to the other. Thus, an in-band control channel has | |||
| length one. By extension, the length of a path in the control plane | length one. By extension, the length of a path in the control plane | |||
| is the sum of lengths of control channels used in this path. In | is the sum of lengths of control channels used in this path. In | |||
| practice, the maximum number of messages using signaling per failed | practice, the maximum number of messages using signaling per failed | |||
| LSP is equal to the length of the path that the notification message | LSP is equal to the length of the path that the notification message | |||
| takes from the detecting node to the protection switching point "s" | takes from the detecting node to the protection switching point "s" | |||
| plus twice sum of the lengths of the control channels corresponding | plus twice sum of the lengths of the control channels corresponding | |||
| to each hop of the protection path from s to d (s-d protection path | to each hop of the protection path from s to d (s-d protection path | |||
| on the control channel). For the set of affected LSPs, that value is | on the control channel). For the set of affected LSPs, that value is | |||
| multiplied by the number of LSPs affected by the fault. The number | multiplied by the number of LSPs affected by the fault that have | |||
| of messages, in the worst case, is thus directly proportional to the | unique sources (the assumption being that a bundled notification | |||
| number of LSPs affected. This compares to a maximum number of | message can be sent to sources that originate multiple LSPs affected | |||
| messages for FNP equal to the sum of the lengths of all control | by the same fault). The number of messages, in the worst case, is | |||
| channels in the network. | thus directly proportional to the number of LSPs affected (assuming | |||
| each affected LSP originates at a unique source). This compares to a | ||||
| maximum number of messages for FNP equal to the sum of the lengths of | ||||
| all control channels in the network. | ||||
| 4.9 | 4.9 Guidelines for Deployment | |||
| Guidelines for Deployment | ||||
| While use of FNP can be appropriate in a variety of situations, we | While use of FNP can be appropriate in a variety of situations, we | |||
| provide some initial thoughts on deployment considerations here. | provide some initial thoughts on deployment considerations here. | |||
| FNP is expected to be very useful in core optical networks where the | FNP is expected to be very useful in core optical networks where the | |||
| provider deploys a mesh-based topology and has a large number of | provider deploys a mesh-based topology and has a large number of | |||
| active lambdas (or the possibility of having several lambdas turned | active lambdas (or the possibility of having several lambdas turned | |||
| on as the network grows). As explained earlier, this would save on | on as the network grows). As explained earlier, this would save on | |||
| the signaling overhead of individually activating each backup LSP. | the signaling overhead of individually activating each backup LSP. | |||
| As explained in Section 4.5, FNP is applicable in situations where | As explained in Section 4.5, FNP is applicable in situations where | |||
| adjacent client and server layers are under the control of different | adjacent client and server layers are under the control of different | |||
| providers. Although FNP does not impose a limit on how many | providers. Although FNP does not impose a limit on how many | |||
| providers may be involved in offering service to the end customer, | providers may be involved in offering service to the end customer, | |||
| practical considerations would dictate that this “recursion” of | practical considerations would dictate that this ôrecursionö of | |||
| provider client-server relationships not be more than a few levels | provider client-server relationships not be more than a few levels | |||
| deep. | deep. | |||
| 5. | 5. Conclusion | |||
| Conclusion | ||||
| This document has provided an overview of the domain of applicability | This document has provided an overview of the domain of applicability | |||
| of the FNP protocol in the context of optical transport networks. By | of the FNP protocol in the context of optical transport networks. By | |||
| outlining the network, node, and fault models to which FNP applies, | outlining the network, node, and fault models to which FNP applies, | |||
| the document has provided guidelines on where FNP is currently | the document has provided guidelines on where FNP is currently | |||
| usable, and outlined areas of further work. | usable, and outlined areas of further work. | |||
| 6. | 6. Acknowledgements | |||
| Acknowledgements | ||||
| We would like to thank the members of the CCAMP WG for on-line and | We would like to thank the members of the CCAMP WG for on-line and | |||
| off-line discussions that helped shape some of the ideas behind this | off-line discussions that helped shape some of the ideas behind this | |||
| document. In particular, Adrian Farrel, Zafar Ali, Neil Harisson, | document. In particular, Adrian Farrel, Zafar Ali, Neil Harisson, | |||
| Jonathan Sadler, Jonathan Lang, Fabio Ricciato and Roberto Albanese. | Jonathan Sadler, Jonathan Lang, Fabio Ricciato and Roberto Albanese. | |||
| 7. | 7. Intellectual Property Considerations | |||
| Intellectual Property Considerations | ||||
| This section is taken from Section 10.4 of RFC2026 [1]. | ||||
| The IETF takes no position regarding the validity or scope of any | The IETF takes no position regarding the validity or scope of any | |||
| intellectual property or other rights that might be claimed to | Intellectual Property Rights or other rights that might be claimed to | |||
| pertain to the implementation or use of the technology described in | pertain to the implementation or use of the technology described in | |||
| this document or the extent to which any license under such rights | this document or the extent to which any license under such rights | |||
| might or might not be available; neither does it represent that it | might or might not be available; nor does it represent that it has | |||
| has made any effort to identify any such rights. Information on the | made any independent effort to identify any such rights. Information | |||
| IETF's procedures with respect to rights in standards-track and | on the procedures with respect to rights in RFC documents can be | |||
| standards-related documentation can be found in BCP-11. Copies of | found in BCP 78 and BCP 79. | |||
| claims of rights made available for publication and any assurances of | ||||
| licenses to be made available, or the result of an attempt made to | Copies of IPR disclosures made to the IETF Secretariat and any | |||
| obtain a general license or permission for the use of such | assurances of licenses to be made available, or the result of an | |||
| proprietary rights by implementors or users of this specification can | attempt made to obtain a general license or permission for the use of | |||
| be obtained from the IETF Secretariat. | such proprietary rights by implementers or users of this | |||
| specification can be obtained from the IETF on-line IPR repository at | ||||
| http://www.ietf.org/ipr. | ||||
| The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
| copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
| rights, which may cover technology that may be required to practice | rights that may cover technology that may be required to implement | |||
| this standard. Please address the information to the IETF Executive | this standard. Please address the information to the IETF at ietf- | |||
| Director. | ipr@ietf.org. | |||
| 8. | 8. References | |||
| References | ||||
| [1] Bradner, S., "The Internet Standards Process -- Revision 3", BCP | [1] Bradner, S., "The Internet Standards Process -- Revision 3", BCP | |||
| 9, IETF RFC 2026, October 1996. | 9, IETF RFC 2026, October 1996. | |||
| [2] Rabbat, R., and V. Sharma (Eds.), "Fault Notification Protocol | [2] Rabbat, R., and V. Sharma (Eds.), "Fault Notification Protocol | |||
| for GMPLS-Based Recovery", Internet Draft, work in progress, | for GMPLS-Based Recovery", Internet Draft, work in progress, | |||
| draft-rabbat-fault-notification-protocol-03.txt, June 2003. | draft-rabbat-fault-notification-protocol-05.txt, May 2004. | |||
| [3] Bradner, S., "Key words for use in RFCs to Indicate Requirement | [3] Bradner, S., "Key words for use in RFCs to Indicate Requirement | |||
| Levels," BCP 14, IETF RFC 2119, March 1997. | Levels," BCP 14, IETF RFC 2119, March 1997. | |||
| 9. | 9. Authors' Addresses | |||
| Authors' Addresses | ||||
| Richard Rabbat | ||||
| Fujitsu Labs of America, Inc. | ||||
| 1240 E. Arques Ave, MS 345 | ||||
| Sunnyvale, CA 94085 | ||||
| United States of America | ||||
| Phone: +1-408-530-4537 | ||||
| Email: rabbat@fla.fujitsu.com | ||||
| Ching-Fong Su | Richard Rabbat Ching-Fong Su | |||
| Fujitsu Labs of America, Inc. | Fujitsu Labs of America, Inc. Fujitsu Labs of America, Inc. | |||
| 1240 E. Arques Ave | 1240 E. Arques Ave, MS 345 1240 E. Arques Ave, MS 345 | |||
| Sunnyvale, CA 94085 | Sunnyvale, CA 94085 Sunnyvale, CA 94085 | |||
| United States of America | United States of America United States of America | |||
| Phone: +1-408-530-4572 | Phone: +1-408-530-4537 Phone: +1-408-530-4572 | |||
| Email: csu@fla.fujitsu.com. | Email: rabbat@alum.mit.edu Email: csu@fla.fujitsu.com | |||
| Vishal Sharma | Vishal Sharma | |||
| Metanoia, Inc. | Metanoia, Inc. | |||
| 1600 Villa Street, Unit 352 | 888 Villa St, Suite 200B | |||
| Mountain View, CA 94041 | Mountain View, CA 94041 | |||
| United States of America | United States of America | |||
| Phone: +1-408-530-8313 | Phone: +1-408-530-8313 | |||
| Email: v.sharma@ieee.org | Email: v.sharma@ieee.org | |||
| 10. | 10. Full Copyright Statement | |||
| Full Copyright Statement | ||||
| "Copyright (C) The Internet Society (2003). All Rights Reserved. | "Copyright (C) The Internet Society (2003). All Rights Reserved. | |||
| This document and translations of it may be copied and furnished to | This document and translations of it may be copied and furnished to | |||
| others, and derivative works that comment on or otherwise explain it | others, and derivative works that comment on or otherwise explain it | |||
| or assist in its implementation may be prepared, copied, published | or assist in its implementation may be prepared, copied, published | |||
| and distributed, in whole or in part, without restriction of any | and distributed, in whole or in part, without restriction of any | |||
| kind, provided that the above copyright notice and this paragraph are | kind, provided that the above copyright notice and this paragraph are | |||
| included on all such copies and derivative works. However, this | included on all such copies and derivative works. However, this | |||
| document itself may not be modified in any way, such as by removing | document itself may not be modified in any way, such as by removing | |||
| the copyright notice or references to the Internet Society or other | the copyright notice or references to the Internet Society or other | |||
| End of changes. 47 change blocks. | ||||
| 107 lines changed or deleted | 84 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||