Working Group Name                                     Sanjay Wadhwa 
     Internet Draft                                         Juniper Networks 
     Expires: May 19, 2008                                    
                                                            Jerome Moisand 
                                                            Juniper Networks 
                                                                             
                                                            Swami Subramanian 
                                                             Juniper Networks 
      
                                                            Thomas Haag 
                                                            T-Systems      
      
                                                             Norbert Voigt 
                                                             Siemens 
      
                                                            November 19, 2007  
                                           
          Protocol for Access Node Control Mechanism in Broadband Networks 


                                           
                           draft-ietf-ancp-protocol-02.txt 


         

     Status of this Memo                                               

         

        By submitting this Internet-Draft, each author represents that any 
        applicable patent or other IPR claims of which he or she is aware 
        have been or will be disclosed, and any of which he or she becomes 
        aware will be disclosed, in accordance with section 6 of BCP 79. 

        Internet-Drafts are working documents of the Internet Engineering 
        Task Force (IETF), its areas, and its working groups.  Note that 
        other groups may also distribute working documents as Internet-
        Drafts. Internet-Drafts are draft documents valid for a maximum of 
        six months and may be updated, replaced, or obsoleted by other 
        documents at any time.  It is inappropriate to use Internet-Drafts as 
        reference material or to cite them other than as "work in progress." 

        The list of current Internet-Drafts can be accessed at     
        http://www.ietf.org/ietf/1id-abstracts.txt 

        The list of Internet-Draft Shadow Directories can be accessed at     
        http://www.ietf.org/shadow.html 

        This Internet-Draft will expire on May 19, 2008. 
      
      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 1] 
      
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     Copyright Notice 

        Copyright (C) The IETF Trust (2007).   

     Abstract 

        This document describes proposed extensions to the GSMPv3 protocol to 
        allow its use in a broadband environment, as a control plane between   
        Access Nodes (e.g. DSLAM) and Broadband Network Gateways (e.g. NAS). 
        These proposed extensions are required to realize a protocol for 
        “Access Node Control” mechanism as described in [8]. The resulting 
        protocol with the proposed extensions to GSMPv3 [4] is referred to as 
        “Access Node Control Protocol” (ANCP).  This document currently 
        focuses on specific use cases of access node control mechanism for 
        topology discovery, line configuration, and OAM as described in ANCP 
        framework document [8]. It is intended to be augmented by additional 
        protocol specification for future use cases considered in scope by 
        the ANCP charter.  

        ANCP framework document [8] describes the ANCP use-cases in detail. 
        Illustrative text for the use-cases is included here to help the 
        protocol implementer understand the greater context of ANCP protocol 
        interactions. 

     Table of Contents 

        1  Specification Requirements                                     4 

        2  Introduction                                                   4 

           2.1   Terminology..............................................5 
        3  Broadband Access Aggregation                                   5 

           3.1   ATM-based broadband aggregation..........................5 
           3.2   Ethernet-based broadband aggregation.....................7 
        4  Access Node Control Protocol                                   8 

           4.1   Overview.................................................8 
           4.2   ANCP based Access Topology Discovery.....................9 
              4.2.1    Goals..............................................9 
              4.2.2    Message Flow.......................................9 
           4.3   ANCP based Line Configuration...........................10 
              4.3.1    Goals.............................................10 
              4.3.2    Message Flow......................................11 
           4.4   ANCP based Transactional Multicast......................13 
           4.5   ANCP based OAM..........................................14 
              4.5.1    Message Flow......................................14 
      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 2] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        5  Access Node Control Protocol (ANCP) 15 

           5.1   ANCP/TCP connection establishment.......................17 
           5.2   ANCP Connection keep-alive..............................17 
           5.3   Capability negotiation..................................18 
           5.4   GSMP Message Extensions for Access Node Control.........21 
              5.4.1    General Extensions................................21 
              5.4.2    Topology Discovery Extensions.....................24 
              5.4.3    Line Configuration Extensions.....................33 
              5.4.4    OAM Extensions....................................36 
           5.5   ATM-specific considerations.............................39 
           5.6   Ethernet-specific considerations........................39 
        6  IANA Considerations  40 

        7  Security Considerations 40 

        8  References  40 

        Author's Addresses42 

        Full Copyright Statement42 

        Copyright (C) The IETF Trust (2007).42 

        Intellectual Property43 

        Acknowledgment 43 

         


















      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 3] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

         

     1  Specification Requirements  

      
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL 
        NOT",“SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in 
        this document are to be interpreted as described in RFC 2119. 

     2  Introduction 

        DSL is a widely deployed access technology for Broadband Access for 
        Next Generation Networks. Several specifications like [1-3] describe 
        possible architectures for these access networks. In the scope of 
        these specifications are the delivery of voice, video and data 
        services. 

        When deploying value-added services across DSL access networks, 
        special attention regarding quality of service and service control is 
        required, which implies a tighter coordination between network 
        elements in the broadband access network without burdening the OSS 
        layer.  

        This draft defines extensions and modifications to GSMPv3 (specified 
        in [4]) and certain new mechanisms to realize a control plane between 
        a service-oriented layer 3 edge device (the NAS) and a layer2 Access 
        Node (e.g. DSLAM) in order to perform QoS-related, service-related 
        and subscriber-related operations. The control protocol as a result 
        of these extensions and mechanisms is referred to as “Access Node 
        Control Protocol” (ANCP).  

        ANCP uses the option of transporting GSMPv3 over TCP/IP. TCP 
        encapsulation for GSMPv3 is defined in [5]. GSMPv3 encapsulation 
        directly over Ethernet and ATM as defined in [5] is not considered 
        for ANCP.  

        ANCP uses a subset of GSMPv3 messages to implement currently defined 
        use-cases. These relevant GSMPv3 messages are identified in section 
        5. GSMPv3 procedures with suitable extensions, as used by ANCP, are 
        described in sections 5.1, 5.2 and 5.3. GSMPv3 general extensions and 
        GSMPv3 message specific extensions required by ANCP are described in 
        sub-sections of 5.4. In addition to specifying extensions and 
        modifications to relevant GSMP messages applicable to ANCP, this 
        draft also defines the usage of these messages by ANCP, and indicates 
        the values that ANCP should set for relevant fields in these GSMP 
        messages. However, to understand the basic semantics of various 
        fields in GSMP messages, the reader is referred to [4]. 
      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 4] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     2.1 Terminology 

        o Access Node (AN): Network device, usually located at a service 
          provider central office or street cabinet that terminates access 
          (local) loop connections from subscribers. In case the access loop 
          is a Digital Subscriber Line (DSL), the Access Node provides DSL 
          signal termination, and is referred to as DSL Access Multiplexer 
          (DSLAM).  

        o Network Access Server (NAS): Network element which aggregates 
          subscriber traffic from a number of Access Nodes. The NAS is an 
          injection point for policy management and IP QoS in the access 
          network. IT is also referred to as Broadband Network Gateway (BNG) 
          or Broadband Remote Access Server (BRAS).  

        o Home Gateway (HGW): Network element that connects subscriber 
          devices to the Access Node and the access network. In case of DSL, 
          the Home Gateway is a DSL network termination that could either 
          operate as a layer 2 bridge or as a layer 3 router. In the latter 
          case, such a device is also referred to as a Routing Gateway (RG). 

        o Net Data Rate: portion of the total data rate of the DSL line that 
          can be used to transmit actual user information (e.g. ATM cells of 
          Ethernet frames). It excludes overhead that pertains to the 
          physical transmission mechanism (e.g. trellis coding in case of 
          DSL). This is defined in section 3.39 of ITU-T G.993.2. 

        o DSL line (synch) rate: the total data rate of the DSL line, 
          including the overhead attributable to the physical transmission 
          mechanism.  

        o DSL multi-pair bonding: method for bonding (or aggregating) 
          multiple xDSL lines into a single bi-directional logical link, 
          henceforth referred to in this draft as “DSL bonded circuit”. DSL 
          “multi-pair” bonding allows an operator to combine the data rates 
          on two or more copper pairs, and deliver the aggregate data rate 
          to a single customer.  ITU-T recommendations G.998.1 and G.998.2 
          respectively describe ATM and Ethernet based multi-pair bonding.  

         
     3  Broadband Access Aggregation  

         
     3.1 ATM-based broadband aggregation  

        End to end DSL network consists of network and application service 
        provider networks (NSP and ASP networks), regional/access network, 
      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 5] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        and customer premises network. Fig1. shows ATM broadband access 
        network components. 

        The Regional/Access Network consists of the Regional Network, Network 
        Access Server, and the Access Network as show in Fig 1. Its primary 
        function is to provide end-to-end transport between the customer 
        premises and the NSP or ASP. The Access Node terminates the DSL 
        signal. It could consist of DSLAM in the central office, or remote 
        DSLAM, or a Remote Access Multiplexer (RAM). Access node is the first 
        point in the network where traffic on multiple DSL lines will be 
        aggregated onto a single network.  

        The NAS performs multiple functions in the network. The NAS is the 
        aggregation point for the subscriber traffic. It provides aggregation 
        capabilities (e.g. IP, PPP, ATM) between the Regional/Access Network 
        and the NSP or ASP. These include traditional ATM-based offerings and 
        newer, more native IP-based services. This includes support for 
        Point-to-Point Protocol over ATM (PPPoA) and PPP over Ethernet 
        (PPPoE), as well as direct IP services encapsulated over an 
        appropriate layer 2 transport.  

        Beyond aggregation, NAS is also the injection point for policy 
        management and IP QoS in the Regional/Access Networks. In order to 
        allow IP QoS support over an existing non-IP-aware layer 2 access 
        network without using multiple layer 2 QoS classes, a mechanism based 
        on hierarchical scheduling is used. This mechanism defined in [1], 
        preserves IP QoS over the ATM network between the NAS and the RGs by    
        carefully controlling downstream traffic in the NAS, so that   
        significant queuing and congestion does not occur further down the  


















      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 6] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        ATM network. This is achieved by using a diffserv-aware hierarchical 
        scheduler in the NAS that will account for downstream trunk 
        bandwidths and DSL synch rates. 
        [8] provides detailed definition and functions of each network 
        element in the broadband reference architecture. 
         
         
                                            Access                     Customer  
                                      <--- Aggregation --->   <------- Premises ------->  
                                            Network                     Network 
                            
                                      +-------------------+ +----------------------------+ 
              +----------+   +-----+  | +-----+  +------+ |--|+-----+ +---+  +---------+ | 
              |          | +-|NAS  |--| |ATM  |--|Access| |  ||DSL  |-|HGW|--|Subscriber|| 
        NSP---+Regional  | | +-----+  | +-----+  | Node | |  ||Modem| +---+  |Devices   || 
              |Broadband | | +-----+  |          +------+ |  |+-----+        +----------+| 
              |Network   |-+-|NAS  |  +---------------|---+  +---------------------------+ 
        ASP---+          | | +-----+                  |     +----------------------------+ 
              |          | | +-----+                  |     | +-----+ +---+  +----------+| 
              +----------+ +-|NAS  |                  +-----| | DSL |-|HGW|--|Subscriber|| 
                             +-----+                        | |Modem| +---+  |Devices   || 
                                                            | +-----+        +----------+| 
                                                            +----------------------------+ 
         HGW   : Home Gateway 
         NAS   : Network Access Server 
                     
                       Fig.1  ATM Broadband Aggregation Topology 
         
         

     3.2 Ethernet-based broadband aggregation  

     The Ethernet aggregation network architecture builds on the Ethernet 
     bridging/switching concepts defined in IEEE 802. The Ethernet 
     aggregation network provides traffic aggregation, class of service 
     distinction, and customer separation and traceability. VLAN tagging 
     defined in IEEE 802.1Q and being enhanced by IEEE 802.1ad is used as 
     standard virtualization mechanism in the Ethernet aggregation network. 
     The aggregation devices are “provider edge bridges” defined in IEEE 
     802.ad.  
     Stacked VLAN tags provide one possible way to create equivalent of 
     “virtual paths” and “virtual circuits” in the aggregation network. The 
     “outer” vlan could be used to create a form of “virtual path” between a 
     given DSLAM and a given NAS. And “inner” VLAN tags to create a form of 
     “virtual circuit” on a per DSL line basis. This is 1:1 VLAN allocation 
     model. An alternative model is to bridge sessions from multiple 
     subscribers behind a DSLAM into a single VLAN in the aggregation 
      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 7] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     network. This is N:1 VLAN allocation model. Architectural and 
     topological models of an Ethernet aggregation network in context of DSL 
     aggregation are defined in [7].  
         

     4  Access Node Control Protocol 

     4.1 Overview 

        A dedicated control protocol between NAS and access nodes can 
        facilitate "NAS managed" tight QOS control in the access network, 
        simplified OSS infrastructure for service management, optimized 
        multicast replication to enable video services over DSL, subscriber 
        statistics retrieval on the NAS for accounting purposes, and fault 
        isolation capability on the NAS for the underlying access technology. 
        This dedicated control plane is referred to as “Access Node Control 
        Protocol” (ANCP). This document specifies relevant extensions to 
        GSMPv3 as defined [4] to realize ANCP. 

        Following sections discuss the use of ANCP for implementing: 

          . Dynamic discovery of access topology by the NAS to provide tight 
             QOS control in the access network. 

          . Pushing to the access-nodes, subscriber and service data 
             retrieved by the NAS from an OSS system (e.g. radius server), to 
             simplify OSS infrastructure for service management. 

          . Optimized, "NAS controlled and managed" multicast replication by 
             access-nodes at L2 layer.  

          . NAS controlled, on-demand access-line test capability 
             (rudimentary end-to-end OAM).    

        In addition to DSL, alternate broadband access technologies (e.g. 
        Metro-Ethernet, Passive Optical Networking, WiMax) will have similar 
        challenges to address, and could benefit from the same approach of a 
        control plane between a NAS and an Access Node (e.g. OLT), providing 
        a unified control and management architecture for multiple access 
        technologies, hence facilitating migration from one to the other 
        and/or parallel deployments.  

        GSMPv3 is an ideal fit for implementing ANCP. It is extensible and 
        can be run over TCP/IP, which makes it possible to run over different 
        access technologies. 

         
      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 8] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     4.2 ANCP based Access Topology Discovery 

     4.2.1 Goals 

        [1] discusses various queuing/scheduling mechanisms to avoid 
        congestion in the access network while dealing with multiple flows 
        with distinct QoS requirements. Such mechanisms require that the NAS 
        gains knowledge about the topology of the access network, the various 
        links being used and their respective net data rates. Some of the 
        information required is somewhat dynamic in nature (e.g. DSL sync 
        rate, and therefore also the net data rate), hence cannot come from a 
        provisioning and/or inventory management OSS system. Some of the 
        information varies less frequently (e.g. capacity of a DSLAM uplink), 
        but nevertheless needs to be kept strictly in sync between the actual 
        capacity of the uplink and the image the NAS has of it.  

        Following section describes ANCP messages that allow the Access Node 
        (e.g. DSLAM) to communicate to the NAS, access network topology 
        information and any corresponding updates.  

        Some of the parameters that can be communicated from the DSLAM to the 
        NAS include DSL line state, actual upstream and downstream net data 
        rates of a synchronized DSL link, maximum attainable upstream and 
        downstream net data rates, interleaving delay etc. Topology discovery 
        is specifically important in case the net data rate of the DSL line 
        changes over time. The DSL net data rate may be different every time 
        the DSL modem is turned on. Additionally, during the time the DSL 
        modem is active, data rate changes can occur due to environmental 
        conditions (the DSL line can get "out of sync" and can retrain to a 
        lower value).  

     4.2.2 Message Flow  

     When a DSL line initially comes up or resynchronizes to a different 
     rate, the DSLAM generates and transmits a GSMP PORT UP EVENT message to     
     the NAS. The extension field in the message carries the TLVs containing 
     DSL line specific parameters. On a loss of signal on the DSL line, a    
     GSMP PORT DOWN message is generated by the DSLAM to the NAS. In order to 
     provide expected service level, NAS needs to learn the initial     
     attributes of the DSL line before the subscriber can log in and access 
     the provisioned services for the subscriber.   

         




      
      
     Wadhwa et.al             Expires May 19, 2008                  [Page 9] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

                 <----- Port UP(EVENT Message)  <----- DSL  
                      (default line parameters)       Signal 
         
        1.  NAS ----------------------- Access -----------  Home ----- Subscriber 
                                          Node              Gateway            
         
            
                 <----- Port UP (EVENT Message)  <----- DSL  
                       (updated line parameters)       Resynch 
         2.  NAS ----------------------- Access ----------- Home ------ Subscriber 
                                    Node          Gateway 

                                                              

                <--- Port DOWN (EVENT Message) <---- DSL  
                                                   Loss of Signal  
                                                     
        3.  NAS ---------------------- Access ------------- Home ----- Subscriber                
                                          Node              Gateway 

                Fig 2. Message flow (ANCP mapping) for topology discovery      
         

         

        The Event message with PORT UP message type (80) is used for 
        conveying DSL line attributes to the NAS. This message with relevant 
        extensions is defined in section 5.4.2.  

             

     4.3 ANCP based Line Configuration 

     4.3.1 Goals 

        Following dynamic discovery of access topology (identification of DSL 
        line and its attributes) as assisted by the mechanism described    in 
        the previous section (topology discovery), the NAS could then query a 
        subscriber management OSS system (e.g. RADIUS server) to     retrieve 
        subscriber authorization data (service profiles, aka user 
        entitlement). Most of such service mechanisms are typically enforced     
        by the NAS itself, but there are a few cases where it might be useful 
        to push such service parameter to the DSLAM for local enforcement of 
        a mechanism (e.g. DSL-related) on the corresponding subscriber line. 
        One such example of a service parameter that can be pushed to the 
        DSLAM for local enforcement is DSL "interleaving delay". Longer 
        interleaving delay (and hence stringent error correction) is required 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 10] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        for a video service to ensure better video "quality of experience", 
        whereas for a VoIP service or for "shoot first" gaming service, a 
        very short interleaving delay is more appropriate. Another relevant 
        application is downloading per subscriber multicast channel 
        entitlement information in IPTV applications where the DSLAM is 
        performing IGMP snooping or IGMP proxy function. Using ANCP, the NAS 
        could achieve the goal of pushing line configuration to the DSLAM by 
        an interoperable and standardized protocol.  

        If a subscriber wants to choose a different service, it can require 
        an OPEX intensive reconfiguration of the line via a network operator, 
        possibly implying a business-to-business transaction between an ISP 
        and an access provider. Using ANCP for line configuration from the 
        NAS dramatically simplifies the OSS infrastructure for service 
        management, allowing fully centralized subscriber-related service 
        data (e.g. RADIUS server back-end) and avoiding complex cross-
        organization B2B interactions.  

        The best way to change line parameters would be by using profiles. 
        These profiles (DSL profiles for different services) are pre-
        configured on the DSLAMs. The NAS can then indicate a reference to 
        the right DSL profile via ANCP. Alternatively, discrete DSL 
        parameters can also be conveyed by the NAS in ANCP. 

         

     4.3.2 Message Flow  

     Triggered by topology information reporting a new DSL line or triggered 
     by a subsequent user session establishment (PPP or DHCP), the NAS may 
     send line configuration information (e.g. reference to a DSL profile) to 
     the DSLAM using GSMP Port Management messages. The NAS may get such line 
     configuration data from a policy server (e.g. RADIUS). Figure 3 
     summarizes the interaction.    













      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 11] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

                                                           
                                                                                      
         
                                       1.DSL Signal 
                                              <----------- 
                      2. Port UP (EVENT Message) 
                         (Access Topology Discovery) 
                       <--------------------------                         
                                         3. PPP/DHCP Session 
                         <----------------------------------------------------- 
       4. Authorization 
         & Authentication 
       <------------------- 
                         Port Management Message  
                         (Line Configuration) 
                       5. ----------------> 
     +-------------+      +-----+         +-------+       +----------+       +-----------+            
     |Radius/AAA    |------| NAS |---------|   AN  |------ |  Home    |------ |Subscriber |    
     |Policy Server|      +-----+         +-------+       | Gateway  |       +-----------+            
     +-------------+                                      +----------+        
       
                     
        Fig 3. Message flow - ANCP mapping for Initial Line Configuration 
         

     The NAS may update the line configuration due to a subscriber service 
     change (e.g. triggered by the policy server). Figure 4 summarizes the 
     interaction 



















      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 12] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

         
                                                            1. PPP/DHCP Session 
                                          <------------------------------------------ 
         
                     +-------------+                        2. Service On Demand 
                     |             |<------------------------------------------------ 
                     | Web portal  | 
                     |  OSS etc    | 3.Change of   4.Port Management 
                     |             | Authorization   Message  
                     | Radius AAA  | -------->     (Updated Line  
                     |  Policy     |                Config - New Profile) 
                     |             |          -------------.  
                     |             |    +------+     +-------+   +---------+  +----------+           
                     |             |----| NAS  |-----|  AN   |---|  Home   |--|Subscriber| 
                     |             |    +------+     +-------+   | Gateway |  +----------+           
                     +-------------+                             +---------+   
          
                    Fig 4. Message flow - ANCP mapping for Updated Line Configuration 
         
      

        The format of relevant extensions to port management message is 
        defined in section 5.4.3. The line configuration models could be 
        viewed as a form of delegation of authorization from the NAS to the 
        DSLAM. 

   

     4.4 ANCP based Transactional Multicast 

        Typical IP multicast in access networks involves the NAS terminating 
        user requests for receiving multicast channels via IGMP. The NAS 
        authorizes the subscriber, and dynamically determines the multicast 
        subscription rights for the subscriber. Based on the user's 
        subscription, the NAS can replicate the same multicast stream to 
        multiple subscribers. This leads to a waste of access bandwidth if 
        multiple subscribers access network services via the same access-node 
        (e.g. DSLAM). The amount of multicast replication is of the order of 
        number of subscribers rather than the number of access-nodes. 

        It is ideal for NAS to send a single copy of the multicast stream to 
        a given access-node, and let the access-node perform multicast 
        replication   by layer2 means (e.g. ATM point-to-multipoint cell 
        replication or ethernet data-link bridging) for subscribers behind 
        the access-node. However, operationally, NAS is the ideal choice to 
        handle subscriber management functions (authentication, 
        authorization, accounting and address management), multicast policies 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 13] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        such as per-channel authorization, and complex multicast routing 
        protocols. Therefore, some means is needed for the NAS to setup 
        multicast replication state in the access-nodes. In ATM access 
        networks, ANCP can be used by the NAS to setup P2MP cross-connects in 
        the DSLAMs. Protocol support for this use-case will be provided in 
        future. 

      

     4.5 ANCP based OAM 

        In a mixed Ethernet and ATM access network (including the local 
        loop), it is desirable to provide similar mechanisms for connectivity 
        checks and fault isolation, as those used in an ATM based 
        architecture. This can be achieved using an ANCP based mechanism 
        until end-to-end Ethernet OAM mechanisms are more widely implemented 
        in various network elements. 

        A simple solution based on ANCP can provide NAS with an access-line 
        test capability and to some extent fault isolation. Controlled by a 
        local management interface the NAS can use an ANCP operation to 
        trigger the access-node to perform a loopback test on the local-loop 
        (between the access-node and the CPE). The access-node can respond 
        via another ANCP operation the result of the triggered loopback test. 
        In case of ATM based local-loop the ANCP operation can trigger the 
        access-node to generate ATM (F4/F5) loopback cells on the local loop. 
        In case of Ethernet, the access-node can trigger an ethernet loopback 
        message(per EFM OAM) on the local-loop. 

     4.5.1 Message Flow  

        “Port Management” message can be used by the NAS to request access 
        node to trigger a “remote loopback” test on the local loop. The 
        result of the loopback test can be asynchronously conveyed by the 
        access node to the NAS in a “Port Management” response message. The 
        format of relevant extensions to port management message is defined 
        in section 5.4.4. 










      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 14] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

      

                         Port Management Message  
                         (Remote Loopback          ATM loopback  
                          Trigger Request)         OR EFM Loopback 
                       1.  ---------------->     2. ----------> 
                                                    <---------+ 
     +-------------+      +-----+         +-------+             +-----------------+                   
     |Radius/AAA    |------|NAS  |---------| DSLAM |-------------|     CPE         |       
     |Policy Server|      +-----+         +-------+             |  (DSL Modem +   |                   
     +-------------+                                            | Routing Gateway)|                   
                                                                +-----------------+ 
                         3. <---------------                         
                     Port Management Message 
                       (Remote Loopback Test Response) 
                              
         
         
         
         
         
     5  Access Node Control Protocol (ANCP) 

        ANCP uses a subset of GSMPv3 messages described in [4] to implement 
        currently defined use-cases. GSMPv3 general message format, used by 
        all GSMP messages other than adjacency protocol messages, is defined 
        in section 3.1.1 of GSMPv3 RFC [4]. ANCP modifies this base GSMPv3 
        message format. The modified GSMPv3 message format is defined as 
        follows: 

            0                   1                   2                   3 
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | Vers  |  Sub  | Message Type  | Result|        Code           | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | Partition ID  |            Transaction Identifier             | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |I|      SubMessage Number      |           Length              | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                                                               | 
           ~                          Message Payload                      ~ 
           |                                                               | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         

         

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 15] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        The 8-bit version field in the base GSMPv3 message header is split 
        into two 4 bit fields for carrying the version and a sub-version of 
        the GSMP protocol. ANCP uses version 3 and sub-version 1 of the GSMP 
        protocol. An ANCP implementation SHOULD always set the version field 
        to 3, and the sub-version field to 1. The Result field in the message 
        header has been modified to be 4 bits long, and the Code field to be 
        12 bits long. The definition and semantics of all the fields in the 
        header are described in section 3.1.1 of GSMPv3 RFC [4]. An ANCP 
        implementation SHOULD set the I and subMessage fields to 1 to signify 
        no fragmentation.  

        Following are the relevant GSMPv3 messages defined in [4], that are 
        currently used by ANCP. Other than the message types explicitly 
        listed below, no other GSMPv3 messages are used by ANCP currently.    

       o Event Messages 

           o Port UP message 

           o Port DOWN message 

           These messages are used by ANCP topology discovery use-case. 

       o Port Management Messages 

           These messages are used by ANCP “line configuration” use-case and 
           ANCP OAM use-case. 

       o Adjacency Protocol Messages  

           These messages are used to bring up a protocol adjacency between a 
           NAS and an AN. 

        The basic format and semantics of various fields in these GSMPv3 
        messages identified above are described in GSMPv3 RFC [4]. However, 
        the usage of these messages by ANCP, along with relevant 
        modifications and extensions required by ANCP, are described in 
        sections 5.3, 5.4.1, 5.4.2 and 5.4.3 of this document. Messages used 
        by ANCP multicast use-case will be described in future versions of 
        this document. 

        ANCP modifies and extends few basic GSMPv3 procedures. These 
        modifications and extensions are summarized below, and described in 
        more detail in the succeeding sections. 



      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 16] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

           o ANCP provides support for a capability negotiation mechanism 
              between ANCP peers by extending the GSMPv3 adjacency protocol. 
              This mechanism and corresponding adjacency message extensions 
              are defined in section 5.3. 

           o TCP connection establishment procedure in ANCP deviates 
              slightly from the connection establishment in GSMPv3 as 
              specified in [5]. This is described in section 5.1. 

           o ANCP makes GSMPv3 messages extensible and flexible by adding a 
              general “extension block” to the end of the relevant GSMPv3 
              messages. The “extension block” contains a TLV structure to 
              carry information relevant to each ANCP use-case. The format of 
              the “extension block” is defined in section 5.4.1.1. 

           o ANCP extends GSMPv3 message exchange with a “bulk transaction” 
              capability, where multiple GSMPv3 messages can be bundled into 
              a single GSMPv3 transaction. This is described in section 
              5.4.1.2. 

     5.1 ANCP/TCP connection establishment 

        ANCP will use TCP for exchanging protocol messages. [5] defines the 
        GSMP message encapsulation for TCP. The TCP   session is initiated 
        from the DSLAM (access node) to the NAS (controller). This is 
        necessary to avoid static provisioning on the NAS for all the DSLAMs 
        that are being served by the NAS. It is easier to configure a given 
        DSLAM with the single IP address of the NAS that serves the DSLAM. 
        This is a deviation from [5] which indicates that the controller 
        initiates the TCP connection to the switch. 

        NAS listens for incoming connections from the access nodes. Port 6068 
        is used for TCP connection. Adjacency protocol messages, which are 
        used to synchronize the NAS and access-nodes and maintain handshakes, 
        are sent after the TCP connection is established. ANCP messages other 
        than adjacency protocol messages may be sent only after the adjacency 
        protocol has achieved synchronization. 

        In the case of ATM access, a separate PVC (control channel) capable 
        of transporting IP would be configured between NAS and the DSLAM for     
        ANCP messages.  

     5.2 ANCP Connection keep-alive 

        GSMPv3 defines an adjacency protocol.  The adjacency protocol is used 
        to synchronize states across the link, to negotiate which version of 
        the GSMP protocol to use, to discover the identity of the entity at 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 17] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        the other end of a link, and to detect when it changes. GSMP is a 
        hard     state protocol.  It is therefore important to detect loss of 
        contact between switch and controller, and to detect any change of 
        identity    of switch or controller. No protocol messages other than 
        those of the adjacency protocol may be sent across the link until the 
        adjacency protocol has achieved synchronization. There are no changes 
        to the base GSMP adjacency protocol for implementing ANCP. 

        The NAS will set the M-flag in the SYN message (signifying it is the 
        master). Once the adjacency is established, periodic adjacency 
        messages     (type ACK) are exchanged. The default ACK interval as 
        advertised in the adjacency messages is 10 sec for ANCP. It SHOULD be 
        configurable and is an implementation choice. It is recommended that 
        both ends specify the same timer value. However, it is not necessary 
        for the timer values to match. 

        The GSMP adjacency message defined in [4] is extended for ANCP and is 
        shown in section 5.3 immediately following this section. The 8-bit 
        “version” field in the adjacency protocol messages is modified to 
        carry the version and sub-version of the GSMP protocol for version 
        negotiation. ANCP uses version 3 and sub-version 1 of GSMP protocol. 
        The semantics and suggested values for Code, “Sender Name”, “Receiver 
        Name”, “Sender Instance”, and “Receiver Instance” fields are as 
        defined in [4]. The “Sender Port”, and “Receiver Port” should be set 
        to 0 by both ends. The pType field should be set to 0. The pFlag 
        should be set to 1. 

        If the adjacency times out on either end, due to not receiving an 
        adjacency message for a duration of (3 * Timer value), where the 
        timer value is specified in the adjacency message, all the state 
        received from the ANCP neighbor should be cleaned up, and the TCP 
        connection should be closed. The NAS would continue to listen for new 
        connection requests. The DSLAM will try to re-establish the TCP 
        connection and both sides will attempt to re-establish the adjacency. 

        The handling defined above will need some modifications when ANCP 
        graceful restart procedures are defined. These procedures will be 
        defined in a separate draft. 

          

     5.3 Capability negotiation 

        The adjacency message as defined in [4] is extended to carry 
        technology specific "Capability TLVs". Both the NAS and the access 
        node will advertise supported capabilities in the originated 
        adjacency messages. If a received adjacency message indicates absence 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 18] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        of support for a capability that is supported by the receiving 
        device, it will turn off the capability locally and will send an 
        updated adjacency message with the capability turned off to match the 
        received capability set. This process will eventually result in both 
        sides agreeing on the minimal set of supported capabilities. The 
        adjacency will not come up unless the capabilities advertised by the 
        controller and the controlled device match. 

        After initial synchronization, if at anytime a capability mismatch is 
        detected, the adjacency will be brought down (RSTACK will be 
        generated by the device detecting the mismatch), and synchronization 
        will be re-attempted. 

         

            0                   1                   2                   3 
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |   Ver |  Sub  | Message Type  |     Timer     |M|     Code    | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                          Sender Name                          | 
           +                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                               |                               | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               + 
           |                         Receiver Name                         | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                          Sender Port                          | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                         Receiver Port                         | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | PType | PFlag |               Sender Instance                 | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | Partition ID  |              Receiver Instance                | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | Tech Type     | # of TLVs     | Total Length                  | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                                                               | 
           ~                   Capability TLVs                             ~ 
           |                                                               | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
            

           

         

         The format of capability TLV is: 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 19] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |     Capability Type         |   Capability Length             | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                                                               | 
           ~                                                               ~ 
           ~                   Capability Data                             ~  
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         

        The Tech Type field type indicates the technology to which the 
        capability extension applies. For access node control in case of DSL 
        networks, new type "DSL" is proposed. The value for this field is 
        0x05. This is the first available value in the range that is not 
        currently allocated. It will need to be reserved with IANA. 

        Capability length is the number of actual bytes contained in the 
        value portion of the TLV. The TLV is padded to a 4-octet alignment. 
        Therefore, a TLV with no data will contain a zero in the length field 
        (if capability data is three octets, the length field will contain a 
        three, but the size of the actual TLV is eight octets). 

        Capability data field can be empty if the capability is just a 
        boolean. In case the capability is a boolean, it is inferred from the 
        presence of the TLV (with no data). Capability data provides the 
        flexibility to advertise more than mere presence or absence of a 
        capability. Capability types can be registered with IANA. Following 
        capabilities are defined for ANCP as applied to DSL access: 

          1. Capability Type : Dynamic-Topology-Discovery = 0x01 

             Length (in bytes) : 0 

             Capability Data : NULL 

         

          2. Capability Type : Line-Configuration = 0x02 

             Length (in bytes) : 0 

             Capability Data : NULL 

         

          3. Capability Type : Transactional-Multicast = 0x03 (controller 
             i.e. NAS terminates IGMP messages from subscribers, and via l2 
             control protocol, signals state to the access-nodes (e.g. 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 20] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

             DSLAMs) to enable layer2 replication of multicast streams. In 
             ATM access network this implies that NAS instructs the access-
             node to setup a P2MP cross-connect. The details of this will be 
             covered in a separate ID [6].  

             Length (in bytes) : 0 

             Capability Data : NULL 

         

          4. Capability Type : OAM = 0x04  

             Length (in bytes) : 0 

             Capability Data : NULL 

          5. Capability Type : Bulk Transaction = 0x05 (defined in section 
             5.4.1.2).  

             Length (in bytes) : 0 

             Capability Data : NULL 

         

     5.4 GSMP Message Extensions for Access Node Control 

     5.4.1 General Extensions 

        Extensions to GSMP messages for various use-cases of “Acess Node 
        Control” mechanism are defined in sections 5.4.2 to 5.4.4. However, 
        sub-sections 5.4.1.1 and 5.4.1.2 below define extensions to GSMP that 
        have general applicability.     

     5.4.1.1  Extension TLV 

        In order to provide flexibility and extensibility certain GSMP 
        messages such as “PORT MANAGEMENT” and “EVENT” messages defined in 
        [4] have been modified to include an extension block that follows a 
        TLV structure. Individual messages in the following sections describe 
        the usage and format of the extension block. 

      
         
      
      
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 21] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

      
      
           All Extension TLV's will be designated as follow: 

         
            0                   1                   2                   3 
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |x|x|x|x|x|x|x|x| Message Type  |   Tech Type   | Block Length  | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                                                               | 
           ~                         Extension Value                       ~ 
           |                                                               | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
         

           x: Reserved Flags 

              These are generally used by specific messages and will be 
              defined in those messages. 

           Message Type 

              An 8-bit field corresponding to the message type where the   
              extension block is used. 

           Tech Type 

              An 8-bit field indicating the applicable technology type value.      
              The Message Type plus the Tech Value uniquely define a single    
              Extension Type and can be treated as a single 16 bit extension 
              type. “Tech Type” value of 0x05 SHOULD be used by ANCP for DSL 
              technology. 

              0x00          Extension block not it use. 

              0x01 – 0x04   Already in use by various technologies 

              0x05          DSL 

              0x06 - 0xFE   Reserved 

              0xFF          Base Specification Use 

           Block Length 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 22] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

              A 8-bit field indicating the length of the Extension Value 
              field in bytes.  When the Tech Type = 0x00, the length value 
              MUST be set to 0. 

           Extension Value 

              A variable length field that is an integer number of 32 bit 
              words long.  The Extension Value field is interpreted according 
              to the specific definitions provided by the messages in the 
              following sections. 

     5.4.1.2  Bulk Transaction Message 

        ANCP elements MAY support a bulk transaction capability.  This 
        capability is negotiated during adjacency synchronization and follows 
        general ANCP capability negotiation rules.  

        In a bulk transaction, several messages can be bundled together in a 
        single transaction. Bulk transaction uses message type 13. Reception 
        of “Bulk Transaction Message” by a node that has not advertised bulk 
        transaction capability MUST silently discard the received message. 

        The Bulk Transaction message has the following format: 

      
            0                   1                   2                   3 
            0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | Vers  |  Sub  | Message Type  | Result|        Code           | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           | Partition ID  |            Transaction Identifier             | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |I|      SubMessage Number      |           Length              | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |              Reserved         |           Count               | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
           |                                                               | 
           ~                          Message Payload                      ~ 
           |                                                               | 
           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
      
        In a Bulk Transaction Message, each of the message in the payload is   
        framed with a complete header and is acted on individually.  The   
        response to the Bulk Transaction message contains the response   
        message that would have been generated by each of the messages had it 
        been sent individually. Each response message will have the 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 23] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        appropriate result and code field filled. Any message can be included 
        in the bulk Transaction message except for adjacency message and 
        another bulk transaction message. If a prohibited message is included 
        in a bulk Transaction message, it MUST be included in the Bulk 
        response with a failure response. The response code for that failure 
        is 0x81 (“Message type prohibited in bulk Transaction”). While the 
        individual message would fail, this would not   constitute a failure 
        for the Bulk Transaction message 

     5.4.2 Topology Discovery Extensions 

     The GSMP Event message with PORT UP message type (80) is used for 
     conveying DSL line attributes to the NAS. The version field should be 
     set to 3, and the sub field should be set to 1. The I and subMessage 
     fields SHOULD be set to 1 to signify no fragmentation. The Port and 
     Label fields should be set to 0. The “Port Session Number” should be set 
     to 0, and the “Event Sequence Number” should be 0. The Tech Type field 
     is extended with new type "DSL". The value for this field is 0x05. The 
     message SHOULD be generated when a line first comes UP, or any of the 
     attributes of the line change e.g. the line re-trains to a different 
     rate or one or more of the configured line attributes are 
     administratively modified. Also, when the ANCP session first comes up, 
     the DSLSM SHOULD transmit a PORT UP message to the NAS for each line 
     that is up. A DSLAM MAY use a Bulk Transaction message as defined in 
     5.4.1.2 to aggregate the transmission of PORT UP messages. 

     When a DSL line goes down (idle or silent), the DSLAM SHOULD transmit an 
     Event message with PORT DOWN message type (81) to the NAS. It is 
     recommended that the DSLAMs use a dampening mechanism per DSL line to 
     control the rate of state changes per DSL line, communicated to the NAS.  

     In case of bonded copper loops to the customer premise (as per DSL 
     multi-pair bonding described by [9] and [10]), the DSLAM MUST report the 
     aggregate net data rate and other attributes for the “DSL bonded 
     circuit” (represented as a single logical port) to the NAS in a PORT UP 
     message. Any change in the aggregate net data rate of the “DSL bonded 
     circuit” (due to a change in net data rate of individual constituent DSL 
     lines or due to change in state of the individual constituent DSL lines) 
     MUST be reported by the DSLAM to the NAS in a PORT UP message. The DSLAM 
     MUST also report the “aggregate” state of the “DSL bonded circuit” to 
     the NAS via PORT UP and PORT DOWN messages. 






      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 24] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

         0                   1                   2                   3 
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        | Vers  |  Sub  | Message Type  | Result|        Code           | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        | Partition ID  |            Transaction Identifier             |     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |I|      SubMessage Number      |           Length              | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                             Port                              | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                      Port Session Number                      | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                     Event Sequence Number                     | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |x|S|x|x|                                                       | 
        +-+-+-+-+                     Label                             | 
        ~                                                               ~ 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |x|x|x|x|x|x|x|x| Message Type  |   Tech Type   | Block Length  | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                                                               | 
        ~                         Extension Value                       ~ 
        |                                                               | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
         
        The format of the "Extension Value" field for Tech Type “DSL” is  
        as follows : 
         
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+        
        |             # of TLVs         | Extension block length (bytes)| 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+             
        |                                                               | 
        ~                                                               ~ 
        ~                           TLVs                                ~  
        |                                                               | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      

     The “Extension Value” contains one or more TLVs to identify a DSL line 
     and define it’s characteristics. A TLV can consist of multiple sub-TLVs. 
     First 2 byte of the “Extension Value” contains the number of TLVs that 
     follow. The next 2 bytes contain the total length of the TLVs carried in 
     the extension block in bytes (existing “Block Length” field in the GSMP 
     message is limited to 255 bytes and is not sufficient). 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 25] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

      

        General format of a TLV is :  

         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+        
        |            Type               |             Length            | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+             
        |                                                               | 
        ~                                                               ~ 
        ~                           Value                               ~  
        |                                                               | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         

     The value field in each TLV is padded to a 4-octet alignment. The Length 
     field in each TLV contains the actual number of bytes in the TLV (not 
     including the padding if present). If a TLV is not understood by the 
     NAS, it is silently ignored. Currently defined types start from 0x01. 

     Following TLVs are currently defined: 

       1. Type (Access-Loop-Circuit-ID = 0x01): This is a mandatory TLV and 
          contains an identifier of the subscriber’s connection to the access 
          node (i.e.  “local loop”). The “local loop” can be ATM based or 
          Ethernet based. The “Access Loop Circuit ID” has local significance 
          at the access node. The exact usage on the NAS is beyond the scope 
          of this document. The format used for “local loop” identification 
          in ANCP messages MUST be identical to what is used by the access 
          nodes in subscriber signaling messages when the access nodes act as 
          “signaling relay agents” as outlined in [6] and [7]. 

          Length : (upto 63 bytes)  

          Value : ASCII string.                       

          For an ATM based local loop the string consists of slot/port and   
          VPI/VCI information corresponding to the subscriber’s DSL 
          connection. Default syntax for the string inserted by the access 
          node as per [7] is: 

           “Access-Node-Identifier atm slot/port:vpi.vci”  

          The Access-Node-Identifier uniquely identifies the access node in 
          the access network. The slot/port and VPI/VCI uniquely identifies 
          the DSL line on the access node. Also, there is one to one 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 26] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

          correspondence between DSL line and the VC between the access node 
          and the NAS.  

           For local loop which is Ethernet based (and tagged), the string 
           consists of slot/port and VLAN tag corresponding to the 
           subscriber. Default syntax for the string inserted by the access 
           node as per [7] is: 

            "Access-Node-Identifier eth slot/port[:vlan-id]"  
      
           
       2. Type (Access-Loop-Remote-Id = 0x02): This is an optional TLV and 
          contains an identifier to uniquely identify a user on a local loop 
          on the access node. The exact usage on the NAS is out of scope of 
          this document. It is desirable that the format used for the field 
          is similar to what is used by the access nodes in subscriber 
          signaling messages when the access nodes act as “signaling relay 
          agents” as outlined in [6] and [7]. 

          Length : (upto 63 bytes) 

          Value  :  ASCII string 

               

       3. Type (Access-Aggregation-Circuit-ID-Binary = 0x06) 

          Length : (8 bytes)  

          Value : two 32 bit integers. 

          For ethernet access aggregation, where a per-subscriber (stacked) 
          VLAN can be applied (1:1 model defined in [7]), the VLAN stack 
          provides a convenient way to uniquely identify the DSL line. The 
          outer VLAN is equivalent to virtual path between a DSLAM and the 
          NAS and inner VLAN is equivalent to a virtual circuit on a per DSL 
          line basis. In this scenario, any subscriber data received by the 
          access node and transmitted out the uplink to the aggregation 
          network will be tagged with the VLAN stack assigned by the access 
          node 

          This TLV can carry the VLAN tags assigned by the access node in the 
          ANCP messages. The VLAN tags can uniquely identify the DSL line 
          being referred to in the ANCP messages, assuming the VLAN tags are 
          not in any way translated in the aggregation network and are unique 
          across physical ports. Each 32 bit integer (least significant bits) 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 27] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

          contains a 12 bit VLAN identifier (which is part of the VLAN tag 
          defined by IEEE 802.1Q). 

          Also, in case of an ATM aggregation network, where the DSLAM is 
          directly connected to the NAS (without an intermediate ATM switch), 
          the two values can contain VPI and VCI on the DSLAM uplink (and can 
          uniquely identify the DSL line on the DSLAM). 

          This TLV is optional. 

      

       4. Type (Access-Aggregation-Circuit-ID-ASCII = 0x03) 

          Length : (upto 63 bytes)  

          Value : ASCII string. 

          This field contains information pertaining to an uplink on the 
          access node. For Ethernet access aggregation, assuming the access 
          node assigns VLAN tags (1:1 model), typical format for the string 
          is: 

          “Access-Node-Identifier eth slot/port [:inner-vlan-id][:outer-vlan-id]”   

          The slot/port corresponds to the ethernet uplink on the access node 
          towards the NAS. 

          For an ATM aggregation network, typical format for the string is: 

          “Access-Node-Identifier atm slot/port:vpi.vci” 

          This TLV allows the NAS to associate the information contained in 
          the ANCP messages to the DSL line on the access node. 

          If the access node inserts this string in the ANCP messages, when 
          referring to local loop characteristics (e.g. DSL line in case of a 
          DSLAM), then it should be able to map the information contained in 
          the string uniquely to the local loop (e.g. DSL line). 

          On the NAS, the information contained in this string can be used to 
          derive an “aggregation network” facing construct (e.g. an IP 
          interface) corresponding to the local loop (e.g. DSL line). The 
          association could be based on “local configuration” on the NAS. 

          The access node can also convey to the NAS, the characteristics 
          (e.g. bandwidth) of the uplink on the access node. This TLV then 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 28] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

          serves the purpose of uniquely identifying the uplink whose 
          characteristics are being defined. A separate set of sub-TLVs will 
          be defined for the uplink characteristics (TBD). 

          This TLV is optional. 

          

       5. Type (DSL Line Attributes = 0x04): 

          Length : variable (up to 1024 bytes) 

          Value : This consists of one or more Sub-TLVs corresponding to DSL     
          line attributes. No sub-TLVs other than the “DSL type” and “DSL 
          line state” SHOULD be included in a PORT DOWN message. 

          The general format of the sub-TLVs is identical to the general TLV   
          format. The value field in each sub-TLV is padded to a 4-octet 
          alignment. The Length field in each sub-TLV contains the actual 
          number of bytes in the TLV (not including the padding if present). 
          Current defined sub-TLV types are start from 0x81. 

          Following sub-TLVs are currently defined : 

          . Type (DSL-Type = 0x91) : Defines the type of transmission system 
             in use. This is a mandatory TLV. 

             Length :  (4 bytes)   

             Value  : (Transmission system : ADSL1 = 0x01, ADSL2 = 0x02,     
             ADSL2+ = 0x03, VDSL1 = 0x04, VDSL2 = 0x05, SDSL = 0x06, UNKNOWN 
             = 0x07). 

          . Type (Actual-Net-Data-Upstream = 0x81): Actual upstream net data 
             rate on a DSL line. This is a mandatory TLV.  

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 

          . Type (Actual-Net-Data-Rate-Downstream = 0x82) : Actual 
             downstream net data rate on a DSL line. This is a mandatory TLV. 

             Length :  (4 bytes) 

             Value  :  (Rate in Kb/sec) 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 29] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

          . Type (Minimum-Net-Data-Rate-Upstream = 0x83) : Minimum net data 
             rate desired by the operator. This is optional.  

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 

          . Type (Minimum-Net-Data-Rate-Downstream = 0x84) : Minimum net 
             data rate desired by the operator. This is optional.  

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 

          . Type (Attainable-Net-Data-Rate-Upstream = 0x85) : Maximum net 
             upstream rate that can be attained on the DSL line. This is an 
             optional TLV. 

            Length  :  (4 bytes) 

             Value   : (Rate in Kb/sec) 

          . Type (Attainable-Net-Data-Rate-Downstream = 0x86) : Maximum net 
             downstream rate that can be attained on the DSL line. This is  
             an optional TLV. 

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 

          . Type (Maximum-Net-Data-Rate-Upstream = 0x87) : Maximum net data 
             rate desired by the  operator. This is optional.  

            Length  :  (4 bytes)  

            Value   : (Rate in Kb/sec) 

           

          . Type (Maximum-Net-Data-Rate-Downstream = 0x88) : Maximum net 
             data rate desired by the operator. This is optional.  

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 


      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 30] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

          . Type (Minimum-Net-Low-Power-Data-Rate-Upstream = 0x89) : Minimum 
             net data rate desired by the operator in low power state. This 
             is optional. 

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 

          . Type (Minimum-Net-Low-Power-Data-Rate-Downstream = 0x8A) : 
             Minimum net data rate desired by the operator in low power 
             state. This is optional. 

            Length  :  (4 bytes) 

            Value   : (Rate in Kb/sec) 

          . Type (Maximum-Interleaving-Delay-Upstream = 0x8B) : maximum one 
             way interleaving delay. This is optional. 

            Length  :  (4 bytes) 

            Value   : (Time in msec) 

          . Type (Actual-Interleaving-Delay-Upstream = 0x8C) : Value 
             corresponding to the interleaver setting. This is optional. 

            Length  :  (4 bytes) 

            Value   : (Time in msec) 

          . Type (Maximum-Interleaving-Delay-Downstream = 0x8D) : maximum 
             one way interleaving delay. This is optional. 

            Length  :  (4 bytes) 

            Value   : (Time in msec) 

           

          . Type (Actual-Interleaving-Delay-Downstream = 0x8E) : Value 
             corresponding to the interleaver setting. This is optional. 

            Length  :  (4 bytes) 

            Value   : (Time in msec) 


      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 31] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

          . Type (DSL line state = 0x8F) : The state of the DSL line. For 
             PORT UP message, at this time, the TLV is optional (since the 
             message type implicitly conveys the state of the line). For PORT 
             DOWN, the TLV is mandatory, since it further communicates the 
             state of the line as IDLE or SILENT.  

            Length  :  (4 bytes) 

             Value   :  { SHOWTIME = 0x01, IDLE = 0x02, SILENT = 0x03 } 

          . Type (Access Loop Encapsulation = 0x90) : The data link protocol 
             and, optionally the encapsulation overhead on the access loop. 
             This is an optional TLV. However, when this TLV is present, the 
             data link protocol MUST minimally be indicated. The 
             encapsulation overhead can be optionally indicated. 

              Length  :  (3 bytes) 

              Value : The three bytes (most to least significant) and valid   
              set of values for each byte are defined below. 

                   Data Link (1 byte): {ATM AAL5 = 0,  

                                         ETHERNET = 1} 

                    Encaps 1 (1 byte): {NA = 0,  

                                        Untagged Ethernet = 1, 

                                        Single-tagged Ethernet = 2}      

                    Encaps 2 (1 byte):{ NA = 0,  

                                     PPPoA LLC = 1,  

                                     PPPoA NULL = 2, 

                                     IPoA LLC = 3,  

                                     IPoA NuLL = 4,  

                                     Ethernet over AAL5 LLC with FCS = 5, 

                                     Ethernet over AAL5 LLC without FCS = 6, 

                                     Ethernet over AAL5 NULL with FCS = 7, 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 32] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

                                     Ethernet over AAL5 NULL without FCS = 8} 

     If this TLV is present, the Data Link protocol MUST be indicated as 
     defined above. However, the Access Node can choose to not convey the 
     encapsulation on the access loop by specifying a value of 0 (NA) for the 
     two encapsulation fields.    

     5.4.3 Line Configuration Extensions 

     The Port Management message format defined in [4] has been modified to 
     contain an extension block (described above in section 5.4.1.1) at the 
     end of the message. Also, the original two byte Function field has been 
     modified to contain one byte for the Function field indicating a 
     specific action to be taken by the recipient of the message, and one 
     byte for X-Function field, which could further qualify the action 
     specified in the Function field. Any Function specific data MUST be 
     carried in the extension block. 

     The NAS uses the extension block in the Port Management messages to 
     convey service attributes of the DSL lines to the DSLAM. TLVs are 
     defined for DSL line identification and service data for the DSL lines. 
     Port number is set to 0 in the message. A new action type "Configure 
     Connection Service Data" (value 0x8) is defined. The "Function" field is 
     set to the action type. This action type indicates to the device being 
     controlled (Access Node i.e. DSLAM) to apply service configuration data 
     contained in the extension value (TLVs), to the DSL line (identified by 
     one of the TLVs in the extension value). For the action type “Configure 
     Connection Service Data”, X-Function field MUST be set to 0. The Tech 
     Type field is extended with new type "DSL". The value for this field is 
     0x05. 

















      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 33] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

         0                   1                   2                   3 
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        | Vers  |  Sub  | Message Type  | Result|        Code           | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        | Partition ID  |            Transaction Identifier             | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |I|      SubMessage Number      |           Length              | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                             Port                              | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                      Port Session Number                      | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                     Event Sequence Number                     | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |R|x|x|x|x|x|x|x|   Duration    |    Function   | X-Function    | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |           Event Flags         |        Flow Control Flags     | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |x|x|x|x|x|x|x|x| Message Type  |   Tech Type   | Block Length  | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                                                               | 
        ~                         Extension Value                       ~ 
        |                                                               | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      

      

           

        The format of the "Extension Value" field is as follows: 
         
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |             # of TLVs         | Extension Block length (bytes)| 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
        |                                                               | 
        ~                                                               ~ 
        ~                            TLVs                               ~  
        |                                                               | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      

        The “Extension Value” field contains one or more TLVs containing DSL 
        line identifier and desired service attributes of the the DSL line. 
        First 2 byte of the “Extension Value” contains the number of TLVs 
        that follow. The next 2 bytes contain the total length of the 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 34] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        extension block in bytes (existing “Block Length” field in the GSMP 
        message is limited to 255 bytes and is not sufficient). 

        General format of a TLV is:  

         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+        
        |            Type               |             Length            | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+             
        |                                                               | 
        ~                                                               ~ 
        ~                           Value                               ~  
        |                                                               | 
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         

        The value field is padded to a 4-octet alignment. The Length field in 
        each TLV contains the actual number of bytes in the TLV (not 
        including the padding if present). If a TLV is not understood by the 
        access-node, it is silently ignored. Depending upon the deployment 
        scenario, the NAS may specify “Access Loop Circuit-ID” or the “Access 
        Aggregation Circuit-ID) as defined in section 5.4.1. Following TLVs 
        can appear in this message: 

       o Type (Access-Loop-Circuit-ID = 0x01) : defined in section 5.4.1    

       o Type (Access-Aggregation-Circuit-ID-Binary = 0x06): defined in 
         section 5.4.1. 

       o Type (Access-Aggregation-Circuit-ID-ASCII = 0x03): defined in section 
         5.4.1.      

       o Type (Service-Profile-Name = 0x05): Reference to a pre-configured 
         profile on the DSLAM that contains service specific data for the 
         subscriber.    

         Length : (upto 64 bytes) 

         Value  : ASCII string containing the profile name (NAS learns  
         from a policy server after a subscriber is authorized). 

        In future, more TLVs MAY be defined for individual service attributes 
        of a DSL line (e.g. rates, interleaving delay,  multicast channel 
        entitlement access-list etc). 

         

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 35] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     5.4.4 OAM Extensions 

        GSMP “Port Management” message (type 32) SHOULD be used by the NAS to 
        trigger access node to run a loopback test on the local loop. The 
        message format is defined in section 5.4.2. The version field SHOULD 
        be set to 3 and sub-version field SHOULD be set to 1. The remaining 
        fields in the GSMP header have standard semantics. The function type 
        used in the request message SHOULD be set to “remote loopback” (type 
        = 0x09). The port, “port session number”, “event sequence number”, 
        duration, “event flags”, “flow control flags” and code fields SHOULD 
        all be set to 0. The result field SHOULD be set to “AckAll” to 
        indicate requirement for the access node to send a success for 
        failure response. The transaction ID SHOULD contain a sequence number 
        inserted by the NAS in each request that it generates. The extension 
        field format is also defined above in section 5.4.2. The extension 
        value field can contain one or more TLVs including the access-line 
        identifier on the DSLAM and OAM test characteristics desired by the 
        NAS.  

        The TLV format is defined above in section 5.4.2. The value field is 
        padded to a 4-octet alignment. The Length field in each TLV contains 
        the actual number of bytes in the TLV (not including the padding if 
        present). If a TLV is not understood by the NAS, it is silently 
        ignored. Depending upon the deployment scenario, the NAS may specify 
        “Access Loop Circuit-ID” or the “Access Aggregation Circuit-ID) as 
        defined in section 5.4.1. Following TLVs can appear in this message: 

       o Type (Access-Loop-Circuit-ID = 0x01) : defined in section 5.4.1    

       o Type (Access-Aggregation-Circuit-ID-Binary = 0x06): defined in 
         section 5.4.1. 
 
       o Type (Access-Aggregation-Circuit-ID-ASCII = 0x03): defined in section 
         5.4.1.  

       o Type (OAM-Loopback-Test-Parameters = 0x07): Parameters related to  
         loopback test. This is an optional TLV. If this TLV is not present 
         in the request message, the DSLAM SHOULD use locally determined 
         default values for the test parameters.  

           Length: 4 bytes 

           Value  : two 1 byte numbers described below (listed in order of 
           most to least  significant). Thus, the 4 bytes consist of 1 byte 
           of Count, followed by 1 byte of Timeout, followed by two pad bytes 
           of zero. 

      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 36] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

           o  Count (1 byte) : Number of loopback cells/messages that should 
              be generated on the local loop as part of the loopback test. 
              The NAS SHOULD restrict the “count” to be greater than 0 and 
              less than or equal to 32. The DSLAM SHOULD discard the request 
              for a loopback test, if the received test parameters contain an 
              out of range value for the “count” field. The DSLAM MAY 
              optionally send a failure response to the NAS with the code 
              “invalid test parameter”.         

           o  Timeout (1 byte) : Upper bound on the time in seconds that the 
              NAS would wait for a response from the DSLAM. If the total time 
              taken by the DSLAM to complete a test with requested 
              parameters, exceeds the specified “timeout” value, it can 
              choose to omit the generation of a response to the NAS. DSLAM 
              SHOULD use a locally determined value for the “timeout”, if the 
              received value of the “timeout” parameter is 0. 

              

       o Type (Opaque-Data = 0x08) : This is an optional TLV. If present in 
         the request message, the DSLAM SHOULD reflect it back in the 
         response unmodified. 

         Length : 8 bytes 

         Value : Two 32 bit integers inserted by the NAS (not to be 
         interpreted by the DSLAM, but just reflected back in the 
         response). 

        The access node generates a success or failure response when it deems 
        the loopback test to be complete. “Port Management” message (type 32) 
        is used. The result field SHOULD be set to success or failure. The 
        function type SHOULD be set to 0x09. The transaction ID SHOULD be 
        copied from the sequence number contained in the corresponding 
        request. The other parameters not explicitly defined here SHOULD be 
        set as specified in the request message above. The code field SHOULD 
        be set to a value in the range 0x500 to 0x5ff (to be reserved with 
        IANA) to indicate the status of the executed test. The valid values 
        defined are (can be extended in future): 

           0x500 : Specified access line does not exist. 

           0x501 : Loopback test timed out. 

           0x502 : Reserved 

           0x503 : DSL line status showtime. 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 37] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

           0x504 : DSL line status idle. 

           0x505 : DSL line status silent. 

           0x506 : DSL line status training. 

           0x507 : DSL line integrity error. 

           0x508 : DSLAM resource not available. 

           0x509 : Invalid test parameter. 

     The Extension value can contain one or more TLVs including the TLV to 
     identify the access line on which the test was performed, and details 
     from executing the test. The access line identifier SHOULD be identical 
     to what was contained in the request. The relevant TLVs are: 
 
       o Type (Access-Loop-Circuit-ID = 0x01) : defined in section 5.4.1    

       o Type (Access-Aggregation-Circuit-ID-Binary = 0x06): defined in 
         section 5.4.1. 

       o Type (Access-Aggregation-Circuit-ID-ASCII = 0x03): defined in section 
         5.4.1.  

       o Type (Opaque-Data = 0x08) : Data inserted by the NAS in the request 
         reflected back by the DSLAM. 

         Length : 8 bytes 

         Value : Two 32 bit integers as received in the request (opaque to 
         the DSLAM). 

       o Type (OAM-Loopback-Test-Response-String = 0x09) 

         Length (upto 128 bytes) 

         Value : Suitably formatted ASCII string containing useful details 
         about the test that the NAS will display for the operator, exactly 
         as received from the DSLAM (no manipulation/interpretation by the 
         NAS). This is an optional TLV, but it is strongly recommended, 
         that in case of ATM based local loop, the DSLAM at the very least 
         indicates via this TLV, the total loopback cells generated and the 
         total loopback cells successfully received as part of executing 
         the requested loopback test.      

             
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 38] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     5.5 ATM-specific considerations 

        The topology discovery and line configuration involve the DSL line 
        attributes. For ATM based access networks, the DSL line on the DSLAM 
        is identified by the port and PVP/PVC corresponding to the 
        subscriber. The DSLAMs are connected to the NAS via an ATM access 
        aggregation network. Since, the   DSLAM (access-node) is not directly 
        connected to the NAS, the NAS needs a mechanism to learn the DSL line 
        identifier (more generally referred to as "Access Loop Circuit-ID") 
        corresponding to a subscriber. The "Access loop circuit-ID" has no 
        local significance on the NAS. The ANCP messages for topology 
        discovery and line configuration carry opaque "Access loop Circuit-
        ID" which has only local significance on the DSLAMs.  

        The access loop circuit identifier can be carried as an ASCII string 
        in the ANCP messages. This allows ANCP to be decoupled from the 
        specifics of the underlying access technology being controlled. On 
        the other hand, this requires a NAS mechanism by which such 
        identifier can be correlated to the context of an “aggregation 
        network” facing IP interface (corresponding to the subscriber) on the 
        NAS. This would typically require local configuration of such IP 
        interfaces, or of the underlying ATM interfaces.  

         

     5.6 Ethernet-specific considerations 

     One possible way of approaching the use of Ethernet technology in the 
     access aggregation network is to recreate the equivalent of Virtual 
     Paths (VPs) and Virtual Circuits (VCs) by using stacked Virtual LAN 
     tags. As an example, one could use an “outer” VLAN to create a form of 
     “virtual path” between a given DSLAM and a given NAS. And then use 
     “inner” VLAN tags to create a form of “virtual circuit” on a per DSL 
     line basis. In this case, VLAN tags conveyed in topology discovery and 
     line configuration messages will allow to uniquely identify the DSL line 
     in a straightforward manner, assuming the VLAN tags are not translated 
     in some way by the aggregation network, and are unique across physical 
     ports. 
      
     However, some carriers do not wish to use this “connection oriented” 
     approach. Therefore, an alternative model is to bridge sessions from 
     multiple subscribers behind a DSLAM to a single VLAN in the aggregation 
     network. This is the N:1 model. In this model, or in the case where user 
     traffic is sent untagged, the access node needs to insert the exact 
     identity of the DSL line in the topology discovery and line 
     configuration messages, and then have a mechanism by which this can be 
     correlated to the context of an “aggregation network” facing IP 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 39] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     interface (for the subscriber) on the NAS. This can either be based on 
     local configuration on the NAS, or on the fact that such DSLAM (access 
     node) typically inserts the “Access Loop Circuit ID” in subscriber 
     signaling messages relayed to the NAS (i.e. DHCP or PPPoE discovery 
     messages). 
       
     Section 5.4.1 defines “Access Loop Circuit ID”.  
                                                                     

     6  IANA Considerations 

        New Tech-Type, capability types, sub-TLV types related to topology 
        discovery and line configuration will need to be reserved. 

     7  Security Considerations 

        The NAS and DSLAMs are implicitly in a trusted domain, so security        
        for ANCP is not a strong requirement. However, if needed security can 
        be provided using IP security as indicated in [RFC3293].  

         

     8  References 

        [1]   DSLForum TR-059, DSL Evolution - Architecture Requirements for 
              the Support of QoS-Enabled IP Services, Tom Anschutz (BellSouth 
              Telecommunications), 09/2003. 

        [2]   DSLForum TR-058, Multi-Service Architecture & Framework 
              Requirements, Mark Elias (SBC) and Sven Ooghe (Alcatel), 
              09/2003. 

        [3]   DSLForum TR-092, Broadband Remote access server requirements 
              document. 

        [4]   Doria, A. et al, "General Switch Management Protocol- V3" (GSMP 
              v3), RFC 3292, June 2002. 

        [5]   Worster, T., Doria, A. and J. Buerkle, "General Switch 
              Management Protocol (GSMP) Packet Encapsulations for 
              Asynchronous Transfer Mode (ATM), Ethernet and Transmission 
              Control Protocol (TCP)", RFC 3293, June 2002. 

        [6]    “DHCP Relay Agent Information Option”, RFC 3046, January 2001. 

        [7]   Architecture & Transport: Migration to Ethernet Based DSL 
              Aggregation, DSL Forum WT-101, Cohen et al.  
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 40] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        [8]   Framework for Access Node Control Mechanism in Broadband 
              Networks, draft-ietf-ancp-framework-00.txt. 

        [9]   ITU-T recommendation G.998.1, ATM-based multi-pair bonding, 
              2005. 

        [10]  ITU-T recommendation G.998.2, Ethernet-based multi-pair 
              bonding, 2005. 

         





































      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 41] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

     Author's Addresses 

        Sanjay Wadhwa  
        Juniper Networks 
        10 Technology Park Drive 
        Westford, MA 01886 
         
        Email: swadhwa@juniper.net 
            
        Jerome Moisand 
        Juniper Networks 
        10 Technology Park Drive 
        Westford, MA 01886 
         
            
        Email: jmoisand@juniper.net 
         
        Swami Subramanian 
        Juniper Networks 
        10 Technology Park Drive 
        Westford, MA 01886 
         
            
        Email: ssubramanian@juniper.net 
         
        Thomas Haag 
        T-systems 
         
        Email: thomas.haag@t-systems.com 
         
        Norber Voigt 
        Siemens 
         
        Email: norbert.voigt@siemens.com 
         
      

      

     Full Copyright Statement 

        Copyright (C) The IETF Trust (2007). 

        This document is subject to the rights, licenses and restrictions      
        contained in BCP 78, and except as set forth therein, the authors   
        retain all their rights. This document and the information contained 
        herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE 
      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 42] 
         
     Internet-Draft       draft-ietf-ancp-protocol-02        November 2007 
         

        ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE 
        INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK 
        FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT 
        LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL 
        NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY 
        OR FITNESS FOR A PARTICULAR PURPOSE. 

     Intellectual Property  

        The IETF takes no position regarding the validity or scope of any 
        Intellectual Property Rights or other rights that might be claimed to 
        pertain to the implementation or use of the technology described in 
        this document or the extent to which any license under such rights 
        might or might not be available; nor does it represent that it has 
        made any independent effort to identify any such rights.  Information 
        on the procedures with respect to rights in RFC documents can be 
        found in BCP 78 and BCP 79. 

        Copies of IPR disclosures made to the IETF Secretariat and any 
        assurances of licenses to be made available, or the result of an 
        attempt made to obtain a general license or permission for the use of 
        such proprietary rights by implementers or users of this 
        specification can be obtained from the IETF on-line IPR repository at 
        http://www.ietf.org/ipr. 

        The IETF invites any interested party to bring to its attention any 
        copyrights, patents or patent applications, or other proprietary 
        rights that may cover technology that may be required to implement 
        this standard.  Please address the information to the IETF at 
        ietf-ipr@ietf.org 

       

     Acknowledgment     

        Thanks to Peter Arberg, Josef Froehler, Derek Harkness, Kim 
        Hyldgaard, Sandy Ng, Robert Peschi, Michel Platnic, Stefaan DE 
        Cnodder and Wojciech Dec for their input to this document.  









      
      
     Wadhwa et.al             Expires May 19, 2008                 [Page 43]