Internet DRAFT - draft-beeram-ccamp-gmpls-uni-bcp

draft-beeram-ccamp-gmpls-uni-bcp







 CCAMP Working Group                                       V.Beeram (Ed) 
 Internet Draft                                                I.Bryskin  
 Intended status: Standards Track                               W.Doonan 
                                                 ADVA Optical Networking 
                                                            J.Drake (Ed) 
                                                               G.Grammel 
                                                        Juniper Networks  
                                                             Manuel Paul 
                                                          Ruediger Kunze 
                                                        Deutsche Telekom 
                                                    Friedrich Armbruster 
                                                           Cyril Magaria 
                                                                     NSN 
                                                  Oscar Gonzalez de Dios  
                                                              Telefonica 
                                                   
 Expires: September 12, 2012                              March 12, 2012 
                                         
      
                                         
                                           
                                GMPLS-UNI BCP 
                    draft-beeram-ccamp-gmpls-uni-bcp-01.txt 


 Status of this Memo 

    This Internet-Draft is submitted in full conformance with the 
    provisions of BCP 78 and BCP 79.  

    Internet-Drafts are working documents of the Internet Engineering 
    Task Force (IETF), its areas, and its working groups.  Note that 
    other groups may also distribute working documents as Internet-
    Drafts. 

    Internet-Drafts are draft documents valid for a maximum of six 
    months and may be updated, replaced, or obsoleted by other documents 
    at any time.  It is inappropriate to use Internet-Drafts as 
    reference material or to cite them other than as "work in progress." 

    The list of current Internet-Drafts can be accessed at 
    http://www.ietf.org/ietf/1id-abstracts.txt 

    The list of Internet-Draft Shadow Directories can be accessed at 
    http://www.ietf.org/shadow.html 

    This Internet-Draft will expire on September, 2012. 

 Copyright Notice 
      
      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 1] 
    




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    Copyright (c) 2012 IETF Trust and the persons identified as the 
    document authors. All rights reserved. 

    This document is subject to BCP 78 and the IETF Trust's Legal 
    Provisions Relating to IETF Documents 
    (http://trustee.ietf.org/license-info) in effect on the date of 
    publication of this document.  Please review these documents 
    carefully, as they describe your rights and restrictions with 
    respect to this document.  Code Components extracted from this 
    document must include Simplified BSD License text as described in 
    Section 4.e of the Trust Legal Provisions and are provided without 
    warranty as described in the Simplified BSD License. 

 Abstract 

    This document pools together the best current practices that are 
    being used to apply the GMPLS Overlay model at the User-Network 
    Interface (UNI) reference point (as defined in [G.8080])  

 Table of Contents 

         
    1. Introduction...................................................3 
    2. Multi-Layered Approach.........................................3 
    3. Traffic Engineering............................................4 
       3.1. Augmenting the Client-Layer Topology......................6 
          3.1.1. Virtual TE Links.....................................7 
       3.2. Macro SRLGs...............................................8 
       3.3. MELGs.....................................................9 
       3.4. Switching Constraints....................................10 
    4. Connection Setup..............................................10 
    5. Path computation aspects......................................11 
    6. L1VPNs........................................................12 
    7. Use cases.....................................................13 
       7.1. Service optimization and restoration in Multi-Layer Networks
       ..............................................................13 
       7.2. IP/MPLS Offloading with UNI automation...................14 
       7.3. Use of PCE and VNTM in Multilayer Network Operation......15 
    8. Security Considerations.......................................15 
    9. IANA Considerations...........................................15 
    10. References...................................................15 
       10.1. Normative References....................................15 
       10.2. Informative References..................................16 
    11. Acknowledgments..............................................16 
         

      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 2] 
         





 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

 1. Introduction 

    Generalized Multiprotocol Label Switching (GMPLS) provides tools to 
    create end-to-end services in various transport technologies. These 
    tools can be used to support service management in different types 
    of deployment models. [RFC 4208] discusses how GMPLS can be applied 
    to the overlay model. There are a good number of implementations 
    that have built on the basic concepts discussed in [RFC 4208] and 
    have successfully demonstrated interoperability. This document is an 
    attempt to pool together the best current practices that are being 
    used to apply the GMPLS Overlay model at the User-Network Interface 
    (UNI) reference point (as defined in [G.8080]).  

    [RFC 4208] recommends the use of hierarchical service activation 
    when GMPLS is used for the core network and section 7.3.3 of 
    [RFC4847], "Virtual Link Service Model" augments this by introducing 
    a representation of server-layer network resources into a client-
    layer network topology.  This memo explains how this augmentation 
    enhances client-layer networking in an overlay model. The concepts 
    discussed in this document are based primarily on experiences drawn 
    from interoperating GMPLS-enabled IP routers with Optical Transport 
    elements, but any GMPLS supported technology may be used in the 
    client and server-layer networks. 

      

         

 2. Multi-Layered Approach 

    When an end-to-end service crosses a boundary between two regions of 
    dissimilar transport technology, it is necessary to execute distinct 
    forms of service activation within each region.  

                      Fig 1: Sample Hybrid Topology 
                            (See PDF version) 
                                
    For example, in the hybrid network illustrated in Fig 1, 
    provisioning a transport service between two GMPLS-enabled IP 
    routers on either side of the optical WDM transport topology 
    requires operations in two distinct layer networks; the client-layer 
    network interconnecting the routers themselves, and the server-layer 
    network interconnecting the optical transport elements in between 
    the routers.  

      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 3] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    Activation of the end-to-end service begins with a path 
    determination process, followed by the initiation of a signaling 
    process from the ingress along the determined path, per the set of 
    figures shown in Fig 2. 

                      Fig 2: Hierarchical Service Action 
                              (see PDF version) 
         

 3. Traffic Engineering 

    The previous section outlines the basic method for activating end-
    to-end services across a multi-layer network.  As a necessary part 
    of that process an initial path selection process was performed, 
    whereby an appropriate path between the desired endpoints was 
    determined through some means. Further, per expectations set 
    through current practices with regard to service provisioning in 
    homogeneous networks, operators expect that the underlying control 
    plane system will provide automated mechanisms for computing the 
    desired path or paths between network endpoints.   

    In particular, operators do not expect under normal circumstances to 
    be required to explicitly specify the end-to-end path; rather, 
    operators expect to be able to specify just the endpoints of the 
    path and rely on an automated computational process to identify and 
    qualify all the elements and links on the path between them.  Hence 
    when operating a hybrid network such as that described in Fig 1, it 
    is necessary to extend existing traffic engineering and path 
    computation mechanisms to operate in a similar manner. 

    Path computation and qualification operations occur at the path 
    computation element (PCE) selected by ingress element of an end-to-
    end service.  In order to be able to compute and qualify paths, the 
    PCE must SHOULD be provided with information regarding the traffic 
    engineering capabilities of the layer network to which it is 
    associated, in particular the topology of the layer network and what 
    layer-specific transport capabilities exist at the various nodes 
    and links in that topology. 

    It is important to note that topology information is layer-specific; 
    e.g. path computation and qualification operations occur within a 
    given layer, and hence information about topology and resource 
    availability are required for the specific layer to which the 
    connection belongs. The topology and resource availability 
    information required by elements in the client-layer is quite 
    distinct from that required by the elements in the server-layer 
     
      
      
 Beeram, et al         Expires September 10, 2012               [Page 4] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    network. Hence, the server-layer traffic engineering links are of no 
    importance for the client-layer network, and it is actually 
    desirable to block their advertisements into the client TE domain by 
    the server-layer border nodes. 

    For example, in the sample hybrid network (Fig 1) there are multiple 
    optical transport elements supporting the connection between the 
    GMPLS-enabled IP routers, and hence the physical topology between 
    them includes several nodes and links. However, the optical 
    elements between the IP routers are not able to switch traffic 
    within the client-layer network of routers (e.g. IP/MPLS), as the 
    optical elements are lambda switches, not IP/MPLS switches.  Hence 
    while the intervening optical elements may physically exist along 
    the path, they are not a part of the topology available to the 
    IP/MPLS routers for the purposes of traffic engineering in the 
    client-layer network. 
    
    An example of what the client-layer Traffic Engineering topology 
    would look like for the sample hybrid network is shown in the top 
    half of Fig 3. 

              Fig 3: Traffic Engineering - ERO with "loose hop" 
                              (See PDF version) 
         

    In this example, the TE topology associated with the client-layer 
    network is indicated by the links and nodes colored yellow, whereas 
    the TE topology associated with the server-layer network is 
    indicated by the links and nodes colored green.  The nodes at the 
    edge of the server-layer network are visible in both the topologies. 
    The yellow topology is capable of switching traffic within the 
    client-layer, whereas the green topology is capable of switching 
    traffic within the server-layer.  

    In this example, if the "B" router attempts to determine a path to 
    the "D" router it will be unable to do so, as the yellow topology to 
    which the B and D routers is connected does not include a fully-
    yellow path between them. The only way to setup an end-to-end path 
    in this case is to use an ERO with a "loose hop" across the server-
    layer domain as illustrated in Fig 3. This would cause the server-
    layer to create the necessary link in the client-layer topology on 
    the fly. However, this approach has a few drawbacks - [a] the 
    necessity for the operator to specify the ERO with the "loose" hop; 
    [b] potential sub-optimal usage of server-layer network resources; 
    and [c] unpredictability with regard to the fate-sharing of the new 

      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 5] 
        




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    link (that is created on the fly) with other links of the client-
    layer topology.  

    In order to be able to compute an end-to-end path between the two 
    client-layer endpoints, the yellow topology  MUST  be sufficiently 
    augmented to indicate where there are paths through the green 
    topology which can provide connectivity between nodes in the yellow 
    topology. In other words, in order for a client to compute path(s) 
    across the server-layer network to other clients, the feasible paths 
    across the server-layer network  SHOULD be periodically computed by 
    the server-layer network and made available (in terms of TE links 
    and nodes that exist in the client-layer network) to all the 
    clients. This is discussed in detail in the next section. 

    In the overlay model the client and network domains, generally 
    speaking, exist in separate layer networks. One important use case, 
    however, is when the client and network topologies are in the same 
    layer network. For example, IP routers that are connected via GMPLS 
    UNI to a WDM network may be capable of terminating optical trails 
    that are lambda switched by the network. Because the network domain 
    normally would not want to leak its actual topology information into 
    the client domain, clients would not be able to compute end-to-end 
    paths across the network domain despite that client and network 
    links belong to the same (WDM) layer network. The method described 
    in the following sections of this document solves the problem of 
    partitioned client topology for this case as well. 

         

 3.1. Augmenting the Client-Layer Topology 

    In the example hybrid network shown below in Fig 4, consider a 
    scenario where each GMPLS-enabled IP router is connected to the 
    optical WDM transport network via a transponder.  Further consider 
    the situation where the transponder at node F can be connected to 
    the transponder in node J via the optical path F-G-H-J. A lambda LSP 
    can be provisioned in the server-layer along this path, and then 
    advertised as a TE link into the client-layer. With the availability 
    of this link, the path computation function at node A is able to 
    compute an end-to-end path from A to C. 

          Fig 4: Traffic Engineering - End to End Path Computation 
                              (See PDF version) 
         


      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 6] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    In this case, in order for the TE link to be made available in the 
    client-layer network topology, the network resources corresponding 
    to the underlying server-layer LSP MUST be fully provisioned 
    beforehand.  

    As another scenario, consider a network configuration where the 
    transponders at nodes E, F, J and I are connected to each other via 
    directionless ROADM components. It is physically possible to 
    connect any transponder to any other transponder in the server-layer 
    network. As there are transport capabilities available in the 
    server-layer network between every element containing an adaptation 
    function to the client-layer network, the operator in this case 
    would not wish to reserve any network resources in the server-layer 
    network until a client LSP is signaled. The next section proposes a 
    method to address this common operational requirement.   

 3.1.1. Virtual TE Links 

    A "Virtual TE Link" as defined in section 7.3.3 of [RFC4847] is a TE 
    link that is advertised into the client-layer network, with the 
    available but not necessarily reserved/commuted resources in the 
    server-layer network necessary to support that TE link.  In other 
    words, "Virtual TE Links" represent specific transport capabilities 
    available in the server-layer network which can support the 
    establishment of LSPs in the client-layer network.  

    The two fundamental properties of a Virtual TE Link are: [a] it is 
    advertised just like a real TE link and thus contributes to the 
    buildup of the client-layer network topology; and [b] it does not 
    require allocation of resources at the server-layer until used, thus 
    allowing the sharing of server-layer network resources with other 
    Virtual TE links. 

         

         

        Fig 5: Traffic Engineering - End to End Path Computation (w/ 
                             "Virtual TE Links") 
                              (See PDF version) 
         

    In the example shown in Fig 5, the availability of a lambda channel 
    along the path F-G-H-J results in the advertisement by nodes F and J 
    of a Virtual TE Link between F and J into the client-layer network 
    topology (yellow line).  With the advertisement of this Virtual TE 
      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 7] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    Link, the path computation function at node A is able to compute an 
    end-to-end path from A to C. 

    Whenever a Virtual TE Link gets selected and signaled in the ERO of 
    a client-layer connection, it ceases temporarily to be "virtual" and 
    transforms into a regular TE-link. When this transformation takes 
    place, the clients will notice the change in the advertised 
    available bandwidth of this TE-link. Also, all other Virtual TE 
    links that share resources with the TE-link in question start 
    advertising "zero" available bandwidth. Likewise, the TE network 
    image reverts back to the original form as soon as the last client-
    layer connection, going through the TE link in question, is 
    released, i.e. Virtual TE Link becomes "virtual" again 

 3.2. Macro SRLGs 

    The Virtual TE links that are advertised into the client-layer 
    network topology cannot be assumed to be totally independent. It is 
    quite possible for a given Virtual TE Link to share fate with one or 
    more other Virtual TE Link(s). This is because the underlying 
    server-layer LSPs (real or potential) can traverse the same server-
    layer network link and/or node, and failure of any such shared 
    link/node would make all such LSPs inoperable (along with the 
    Virtual TE Links supported by the LSPs). If diverse end-to-end paths 
    for client-layer LSPs are to be computed, the fate-sharing 
    information of the Virtual TE Links needs to be taken into account. 
    The standard way of addressing this problem is to use SRLGs as a 
    part of Virtual TE Link advertisements.  

    A traditional SRLG represents a shared physical network resource 
    upon which normal function of a link depends. Such SRLGs can also be 
    referred to as physical SRLGs.  Zero, one or more physical SRLGs 
    could be identified and advertised for every TE link in a given 
    layer network. However, there is a scalability issue with physical 
    SRLGs in multi-layer environments. For example, if a WDM layer LSP 
    serves an IP layer link, every WDM link and node traversed by the 
    LSP MUST be considered as a separate SRLG. The number of SRLGs to be 
    advertised to client (e.g. IP) layer per TE link would be directly 
    proportional to the number of hops traversed by the underlying 
    server-layer LSP. 

    The notion of Macro SRLGs addresses this scaling problem. Macro 
    SRLGs have the same protocol format as their physical counterparts 
    and can be assigned automatically for each Virtual TE Link that is 
    advertised into the client-layer network as a result of the 
    existence of an underlying server-layer LSP (instantiated or 
      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 8] 
         





 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    otherwise). A Macro SRLG represents a set of shared path segments 
    that are traversed by two or more of the underlying server-layer 
    LSPs. Each shared path segment can be viewed as a sequence of shared 
    resources where each individual resource has a physical SRLG 
    associated with it (example depicted in Fig 6). The actual procedure 
    for deriving these Macro SRLGs is beyond the scope of this document. 

                            Fig 6: Macro SRLGs 
                            (See PDF version) 
                                          
 3.3. MELGs 

    If two or more Virtual TE Links share fate, it means that the links 
    could be concurrently activated and used by client LSPs with a 
    caveat that the links could be taken out of service by a single 
    network failure, and, thus, cannot be used in the same protection 
    scheme. There could be a stronger (than fate sharing) relationship 
    between two or more Virtual TE Links. Because a set of Virtual TE 
    Links could be mapped onto the same uncommitted network resources, 
    the situation can arise when only one Virtual TE Link from the set 
    could be activated at any given time. In other words, two or more 
    Virtual TE Links could be mutually exclusive.  

    One example of mutually exclusive Virtual TE Links is when the paths 
    for the network domain LSPs supporting the Virtual TE Links not only 
    intersect, but also require usage of the same resource (e.g. lambda 
    channel) on the intersection. Another example is when the said paths 
    depend on a common physical resource (e.g. transponder, regenerator, 
    wavelength converter, etc.) that could be used only by one LSP at a 
    time. 

    For a client path computation function (especially a centralized one 
    capable of concurrent computation of multiple end-to-end paths) it 
    is important to know about such mutually exclusive relationship 
    between Virtual TE Links. This memo introduces a concept of Mutually 
    Exclusive Link Group (MELG) and suggests a new sub-TLV - MELGs sub-
    TLV - to be added to the top level TE Link TLV. The purpose of the 
    MELGs sub-TLV is: 

    - To indicate via a separate network unique number (MELG ID) an 
      element or a situation that makes the advertised Virtual TE Link 
      to belong to one or more mutually exclusive link groups. Path 
      computer will be able to decide on whether two or more Virtual TE 
      Links are mutually exclusive or not by finding the overlap of 

      
      
      
 Beeram, et al         Expires September 10, 2012               [Page 9] 
         





 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

      advertised MELGs (similar to deciding on whether two or more TE 
      Links share fate or not by finding common SRLGs) 
    - To indicate whether the advertised Virtual TE link is committed or 
      not at the moment of the advertising. Such bit of information is 
      important for a path computer: committing new  Virtual TE links 
      (vs. re-using committed ones) has a consequence of committing more 
      network resources and disabling other Virtual TE links that have 
      common MELGs with newly committed Virtual TE Link 

    Exact format of the MELGs sub-TLV is described in [MELG]  

                         [TBD: MELG Figure/Example] 

         

 3.4. Switching Constraints 

    Certain types of network configurations necessitate the 
    specification of connectivity constraints in the Virtual TE Link 
    advertisements. If the switching constraints associated with the 
    binding of Virtual and access TE links terminated on a given network 
    border node do not get advertised into the client domain, there is a 
    risk of an invalid path being computed (Fig 7). This document 
    recommends the use of the extensions specified in [GEN_CNSTR] to 
    address this issue. 

         
                        Fig 7: Switching Constraints 
                              (See PDF version) 

      

 4. Connection Setup 

    Experience with control plane operations in multi-layer networks 
    indicates there are benefits to coordinating certain signaling 
    operations, in the following manner. Consider the scenario where the  
    network domain is a WDM layer topology comprising of ROADMs. The 
    set-up time for a service at the WDM layer can be fairly long, as it 
    can involve time-consuming power-equalization procedures, amongst 
    other layer-specific operations. This means that at very least, the 
    setup timers for the client-layer service would need to be somehow 
    coordinated with that of the server-layer service. To avoid this 
    operationally awkward issue, a phased connection setup process as 
    depicted in Fig 8 is proposed. 
      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 10] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

                       Fig 8: Phased Connection Setup 
                              (See PDF version) 
         

    As long as the LSP segment across the server-layer network is not 
    completely "UP" (e.g., Fully Power Equalized), the nodes at the edge 
    of the server-layer network through which the LSP passes would 
    signal the client-layer PATH/RESV messages with the T (Testing) bit 
    set in the ADMIN_STATUS. The T bit would be cleared in these 
    messages only after the LSP segment across the server-layer network 
    is deemed fully operable.   

 5. Path computation aspects 

    It is assumed that a client domain path computation function makes 
    use of advertised client domain TE links as well as Virtual TE Links 
    while computing end-to-end paths for client LSPs. The said path 
    computation function could be local (i.e. located on client LSP 
    ingress nodes, (Corresponding to RFC4655 Composite PCE node) or 
    remote (i.e. network/External PCEs). Path computations could be 
    triggered by client nodes or NMS. Generally speaking, the 
    responsibility of the client domain path computation function is to 
    compute one or two paths for each source-destination pair of the TE-
    LSPs. Path computation SHOULD  be subject to one or more path 
    optimization criterions (such as shortest path, minimal latency, 
    etc.) and path computation constraints (e.g. link unreserved 
    bandwidth, link colors, layer-specific constraints, explicit 
    exclusions, etc.) 

    As the augmented topology does hide server layer links and nodes, it 
    is RECOMMENDED to support SRLG diverse path computation. 

    Furthermore the path computation  SHOULD consider the connectivity 
    and switching constraint in addition to all usual TE path 
    computation constraints (e.g. unreserved bandwidth, link colors, 
    layer-specific constraint) when available. 

    When using PCE architecture and PCEP protocol those aspects are 
    covered by RFC5440, RFC5521 and RFC5541.  

    As described in section 3.3. Virtual TE link may not only share risk 
    but may also depend on the same also server layer resources, thus 
    creating mutual exclusivity between Virtual TE Links. Therefore, 
    network topologies containing Virtual TE links have an increased 
    probability of LSP setup failures. In such topologies concurrent 
    path computation that takes in consideration MELG will reduce 
      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 11] 
         





 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    signaling failures (Not considering MELGs may result, for example, 
    in two LSPs routed on two Virtual TE-Links sharing the same server 
    layer resource). PCEP supports concurrent path computation per 
    RFC5440, expressing MELG constraint is out of scope of this document 
    (defined in [MELG]) 

    Core domain path computation and Inter-PCE path computation is out 
    of scope for this document. 

 6. L1VPNs 

    [RFC4208] implies that multiple independent sets of clients, located 
    in the same or different layer networks, could be connected to the 
    same network domain, providing the connectivity between the clients 
    within each set, while blocking the connectivity between the clients 
    from different sets (i.e. allows for the L1VPNs application).  
    This document suggests: 

    - New sub-TLV - VPN IDs sub-TLV - to be added to the top level TE 
      Link TLV. Exact format of the VPN IDs sub-TLV is described in 
      [GMPLS UNI RTG]  
    - Configuring on the network end of each access TE link zero, one or 
      more network unique VPN IDs and adding the configured information 
      as VPN IDs sub-TLV to the TE link advertisement; 
    - Configuring zero, one or more network unique VPN IDs for each 
      Virtual TE Link and adding the configured information as VPN IDs 
      sub-TLV to the TE link advertisement; 
    - Making the network responsible for proper filtering of the TE Link 
      advertisements, so that the information pertinent to VPN X is 
      leaked only to the clients that are members of the said VPN X 

    This approach would achieve the following: 

    - Automatic VPN member auto-discovery; 
    - Providing to the clients VPN specific view of the network ; 
    - Partitioning network resources between VPNs; 
    - Ensuring successful path computations (and therefore connectivity) 
      only between members of the same VPN  

    [RFC4208] implies that access TE Links could be named from a single 
    or a separate (per-VPN) name space. This draft takes the former 
    approach, that is, regardless of the associated VPNs, all access and 
    Virtual TE Links MUST be named from the same (specifically, network) 
    name space. Apart from simplicity, one reason for such choice is the 
    following consideration: a GMPLS LSP established between a pair of 
      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 12] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    clients is likely to be advertised as a TE Link into the client's 
    layer TE domain. For example, a GMPLS LSP established between a pair 
    of IP routers is likely to be advertised as a TE Link into IP/MPLS 
    layer TE domain. This means that neither access nor Virtual TE Links 
    belong to the "real" client layer network. Hence assigning addresses 
    for access and Virtual TE links from the network name space would 
    not cause address collisions/re-configurations in the client layer. 

                         [TBD: L1VPN Figure/Example] 

         

 7. Use cases 

 7.1. Service optimization and restoration in Multi-Layer Networks 

        
    Multi-layer networks, as described in this document, are a reality 
    today and they are operated by different groups following different 
    operational procedures. 

    This requires an independent optimization of the client and server 
    layer networks, and this could lead to the situation where the re-
    routing of a client layer LSP fails because some of the resources on 
    the selected alternate path share fate with some of the resources on 
    the LSP's failed path.  This would happen due to lack of knowledge 
    of the server layer network when the client layer path computation 
    function selects the alternative path. 

    The high percentage of IP traffic in operator networks today makes 
    it necessary that client and server layer share sufficient 
    information to enable an optimized transport for IP/MPLS services 
    and address existing inefficiencies. One important point from the 
    carrier perspective is that the usage of server-layer SRLG 
    information by the client layer path computation is essential to 
    address these issues. 

    In a typical multi-layer network, in which the IP/MPLS network is 
    the client network and the WDM/OTN network is the server network, it 
    is the client layer network that is responsible for the protection 
    of the IP/MPLS traffic using mechanisms such as FRR and/or LFA.  
    Regardless of the mechanism that is used, SRLG information from the 
    server layer network helps to optimize the client layer network with 
    respect to reduced link utilization and reliable and efficient 
    protection of the client traffic. 

      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 13] 
         





 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    Today server layer network SRLGs are used mainly to calculate 
    diverse alternative paths for the IP/MPLS client layer network. 
    Therefore the following procedure MUST be periodically performed: 

    - Build traffic matrix for the server layer network  
      (based on IP links) 
    - Solve traffic engineering problems in the server layer network 
    - Calculate new SRLGs for the client layer network 
    - Simulate failure scenarios 
         

    GMPLS UNI reduces the OPEX costs of doing these procedures manually 
    by providing: 

    - the advertisement of server layer network SRLG information into 
      client layer network via common routing protocol 
    - the client layer network path computation function uses this SRLG 
      information in selecting maximally diverse paths.  
         
 7.2. IP/MPLS Offloading with UNI automation 

    A typical application in multi-layer (IP/MPLS over optical) networks 
    is termed 'IP Offloading', in which the network responds to the 
    increase in traffic of a particular service or across a network 
    segment in the IP network by placing IP traffic into GMPLS LSPs in 
    the server layer network in order to reduce the load on intermediate 
    IP routers. The increase in traffic is typically caused by an 
    elevated number of high traffic flows/services traversing an IP 
    network segment, which requires core routers to forward large IP 
    traffic volumes.   

    The decision process driving IP offloading is complex and is 
    constrained by a set of rules that reduce the cost of running the 
    multi-layer network while ensuring that it remains stable.  

    Automation of IP Offloading poses a number of challenges. It must 
    establish GMPLS LSPs in the server layer (e.g. optical) network and 
    automatically assign them identifiers, either numbered or 
    unnumbered, in the client layer network.  This information can be 
    automatically exchanged using the procedures from [RFC 4203]. 
    However, such procedures are not always implemented in commercial 
    equipment. Consequently, this information may need to be configured 
    manually as part of the initial set-up/installation of these LSPs. 


      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 14] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    Later, when the GMPLS LSP tunnel needs to be established, the 
    hierarchical TE Link addresses MUST be included in the UNI path 
    request.  

 7.3. Use of PCE and VNTM in Multilayer Network Operation 

    Two key elements have been proposed to help in the management and 
    coordination of multi-layer networks: the Path Computation Element 
    (PCE) and the Virtual Network Topology Manager (VNTM). PCE is 
    responsible for the calculation of paths between endpoints, 
    particularly in complex scenarios involving, for example, WDM layer 
    physical impairments.  VNTM is in charge of maintaining the topology 
    of the client layer network by instantiating GMPLS LSPs, in the 
    server layer network.  I.e., in can be used to provide TE links to 
    the client layer network in real time. 

    Several cooperation modes between PCE, VNTM and the NMS have been 
    proposed in [RFC 5623]. For instance, the operator can request a new 
    MPLS path via the NMS, which consults a PCE with information of the 
    multi-layer network. The PCE, in case that there are enough 
    resources in the MPLS layer, returns a path made of real TE links. 
    On the other hand, if there is a lack of resources at the MPLS 
    layer, the response may contain a path with one or more Virtual TE-
    Links. In this case, the NMS can cooperate with the VNTM to suggest 
    the set-up of a GMPLS LSP(s) in the server layer network. The VNTM, 
    based on the local policies, can accept the suggestion and cause the 
    set-up of the GMPLS LSPs in the server layer network. 

    In order for the computation to be effective, the PCE needs 
    knowledge of the augmented topology (SRLGs, MELGs, TE metrics of the 
    Virtual TE-Links), which can be provided via GMPLS-UNI.  

 8. Security Considerations 

    TBD 

 9. IANA Considerations 

    This document has no actions for IANA. 

 10. References 

 10.1. Normative References 

    [RFC2119]        Bradner, S., "Key words for use in RFCs to Indicate 
                     Requirement Levels", BCP 14, RFC 2119, March 1997. 
      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 15] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

         
    [G.8080]         Architecture for the automatically switched optical 
                     network (ASON) 
         
    [RFC4208]        G. Swallow, J.Drake, H. Ishimatsu, and Y. Rekhter, 
                     "GMPLS UNI: RSVP-TE Support for the Overlay Model",  
                     RFC 4208, October 2005. 
         
    [MELG]           Mutually Exclusive Link Group,  
                     [draft-<tbd>-melg-00.txt]  
         
    [GEN CNSTR]      G.Bernstein, Y.Lee, D.Li, W.Imajuku, "General  
                     Network Element Constraint Encoding for GMPLS  
                     Controlled Networks"  
                     [draft-ietf-ccamp-general-constraint-encode-07.txt] 
         
    [GMPLS UNI RTG]  GMPLS UNI Routing Extensions  
                     [draft-<tbd>-gmpls-uni-routing-00.txt]  
         
 10.2. Informative References 

    [RFC4847]        T. Takeda, "Framework and Requirements for Layer 1  
                     VPNs", RFC 4847, April 2007. 
         

 11. Acknowledgments 

    TBD 

 Authors' Addresses 

    Vishnu Pavan Beeram 
    ADVA Optical Networking 
         
    Email: vbeeram@advaoptical.com 

         

    Igor Bryskin 
    ADVA Optical Networking 
         
    Email: ibryskin@advaoptical.com 

         

    Wes Doonan 
      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 16] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    ADVA Optical Networking 
         
    Email: wdoonan@advaoptical.com 

         

    John Drake 
    Juniper Networks 
         
    Email: jdrake@juniper.net 

         

    Gert Grammel 
    Juniper Networks 
         
    Email: ggrammel@juniper.net 

         
    Manuel Paul 
    Deutsche Telekom 
         
    Email: Manuel.Paul@telekom.de 

       
    Ruediger Kunze 
    Deutsche Telekom 
         
    Email: Ruediger.Kunze@telekom.de 

         
         
    Oscar Gonzalez de Dios  
    Telefonica 
         
    Email: ogondio@tid.es 

         

    Cyril Margaria 
    Nokia Siemens Networks 
         
    Email: cyril.margaria@nsn.com 

            

      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 17] 
         




 Internet-Draft              GMPLS-UNI BCP                    March 2012 
         

    Friedrich Armbruster 
    Nokia Siemens Networks 
         
    Email: friedrich.armbruster@nsn.com 

      








































      
      
      
 Beeram, et al         Expires September 10, 2012              [Page 18]