IPO and MPLS Working Groups N. Chandhok Internet Draft Ohio State University Expires: July 2001 A. Durresi Document: draft-osu-ipo-mpls-issues-01.txt Ohio State University Category: Informational R. Jagannathan Ohio State University R. Jain Nayna Networks K. Vinodkrishnan Ohio State University March 2001 IP over Optical Networks: A Summary of Issues Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026 except that the right to produce derivative works is not granted. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsolete by other documents at any time. It is inappropriate to use Internet- Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Abstract This draft presents a summary of issues related to transmission of IP packets over optical networks. This is a compilation of many drafts presented so far in IETF. The goal is to create a common document, which by including all the views and proposals will serve as a better reference point for further discussion. The novelty of this draft is that we try to cover all the main areas of integration and deployment of IP and optical networks including architecture, routing, signaling, management, and survivability. Several existing and proposed network architectures are discussed. The two-layer model, which aims at a tighter integration between IP and optical layers, offers a series of important advantages over the Many Authors Informational - Expires September 2001 Page 1 of 53 IP over Optical Networks: Summary of Issues March 2001 current multi-layer architecture. The benefits include more flexibility in handling higher capacity networks, better network scalability, more efficient operations and better traffic engineering. Multiprotocol Label Switching (MPLS) and its extension Generalized Multiprotocol Label Switching (GMPLS) have been proposed as the integrating structure between IP and optical layers. Routing in the non-optical and optical parts of the hybrid IP network needs to be coordinated. Several models have been proposed including overlay, augmented, and peer-to-peer models. These models and the required enhancements to IP routing protocols, such as, OSPF and IS-IS are provided. Control in the IP over Optical networks is facilitated by MPLS control plane. Each node consists of an integrated IP router and optical layer crossconnect (OLXC). The interaction between the router and OLXC layers is defined. Signaling among various nodes is achieved using CR-LDP and RSVP-TE protocols. The management functionality in optical networks is still being developed. The issues of link initialization and performance monitoring are summarized in this document. With the introduction of IP in telecommunications networks, there is tremendous focus on reliability and availability of the new IP- optical hybrid infrastructures. Automated establishment and restoration of end to end paths in such networks require standardized signaling and routing mechanisms. Layering models that facilitate fault restoration are discussed. A better integration between IP and optical will provide opportunities to implement a better fault restoration. This 01 revision contains updated discussion on GMPLS (Section 2), routing (Section 3), control plane signaling (Section 4) and fault restoration (Section 6). 2. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119. Contents: 1. Overview 1.1 Introduction 1.2 Network Models 2. Optical Switch Architecture Many Authors Informational - Expires September 2001 Page 2 of 53 IP over Optical Networks: Summary of Issues March 2001 2.1 Multi Protocol Label Switching (MPLS). 2.2 Isomorphic Relations and Distinctions between OXCs and LSRs 2.3 Isomorphic Relations and Distinctions between LSPs and Lightpaths 2.4 General Requirements for the OXC Control Plane 2.4.1 Overview of the MPLS Traffic Engineering Control 2.4.2 OXC Enhancements to Support MPLS Control Plane 2.4.3 MPLS Control Plane Enhancements 2.5 MPLS Traffic Engineering Control Plane with OXCs 2.6 Generalized MPLS 3. IP over Optical Networks 3.1 Service Models 3.1.1 Client Server Model 3.1.2 Integrated Service Model 3.2 IP Optical Interaction Models 3.2.1 Overlay Model 3.2.2 Peer Model 3.2.3 Augmented Model 3.3 Routing approaches 3.3.1 Fully Peered Routing Model 3.3.2 Domain Specific Routing 3.3.3 Overlay Routing 3.4 Path Selection 3.5 Constraints on Routing 4. Control 4.1 MPLS Control Plane 4.2 Addressing 4.3 Path Setup 4.3.1 UNI Path provisioning 4.3.2 Basic Path Setup Procedure for NNI 4.4 Signaling protocols 4.4.1 CR-LDP Extensions for Path Setup 4.4.2 RSVP-TE Extensions for Path Setup 4.5 Stream Control Transmission Protocol (SCTP) 4.6 Configuration Control Using GSMP 4.7 Resource Discovery Using NHRP 5. Optical Network Management 5.1 Link Initialization 5.1.1 Control Channel Management 5.1.2 Verifying Link Connectivity 5.1.3 Fault Localization 5.2 Optical Performance Monitoring (OPM) 6. Fault restoration in Optical networks 6.1 Layering 6.1.1 SONET Layer Protection 6.1.2 Optical Layer Protection 6.1.3 IP Layer Protection 6.1.4 MPLS Layer Protection Many Authors Informational - Expires September 2001 Page 3 of 53 IP over Optical Networks: Summary of Issues March 2001 6.2 Failure Detection 6.3 Failure Notification 6.3.1 Reverse Notification Tree (RNT) 6.4 Protection Options 6.4.1 Dynamic Protection 6.4.2 Pre-negotiated Protection 6.4.3 End to end repair 6.4.4 Local Repair 6.4.5 Link Protection 6.4.6 Path Protection 6.4.7 Revertive Mode 6.4.8 Non-revertive Mode 6.4.9 1+1 Protection 6.4.10 1:1, 1:n, and n:m Protection 6.4.11 Recovery Granularity 6.5 Signaling Requirements related to Restoration 6.6 Pre-computed, Priority based restoration mechanism 6.7 RSVP-TE/CR-LDP Support for Restoration 7. Security Considerations 8. Acronyms 9. Terminology 10. References 11. Author's Addresses 1. Overview 1.1 Introduction Challenges presented by the exponential growth of the Internet have resulted in the intense demand for broadband services. In satisfying the increasing demand for bandwidth, optical network technologies represent a unique opportunity because of their almost unlimited potential bandwidth. Recent developments in wavelength-division multiplexing (WDM) technology have dramatically increased the traffic capacities of optical networks. Research is ongoing to introduce more intelligence in the control plane of the optical transport systems, which will make them more survivable, flexible, controllable and open for traffic engineering. Some of the essential desirable attributes of optical transport networks include real-time provisioning of lightpaths, providing capabilities that enhance network survivability, providing interoperability functionality between vendor-specific optical sub-networks, and enabling protection and restoration capabilities in operational contexts. The research efforts now are focusing on the efficient internetworking of higher layers, primarily IP with WDM layer. Along with this WDM network, IP networks, SONET networks, ATM backbones shall all coexist. Various standardization bodies have been involved in determining an architectural framework for the interoperability of all these systems. Many Authors Informational - Expires September 2001 Page 4 of 53 IP over Optical Networks: Summary of Issues March 2001 One approach for sending IP traffic on WDM networks would use a multi-layered architecture comprising of IP/MPLS layer over ATM over SONET over WDM. If an appropriate interface is designed to provide access to the optical network, multiple higher layer protocols can request lightpaths to peers connected across the optical network. This architecture has 4 management layers. One can also use a packet over SONET approach, doing away with the ATM layer, by putting IP/PPP/HDLC into SONET framing. This architecture has 3 management layers. A few problems of such multi layered architectures have been studied. +---------------+ | | | IP/MPLS | | | +---------------+ +---------------+ | | | | | ATM | | IP/MPLS | | | | | +---------------+ +---------------+ +-------------+ | | | | | | | SONET | | SONET | | IP/MPLS | | | | | | | +---------------+ +---------------+ +-------------+ | | | | | | | WDM | | WDM | | WDM | | | | | | | +---------------+ +---------------+ +-------------+ (4 LAYERS) (3 LAYERS) (2 LAYERS) Figure 1: Layering Architectures Possible The fact that it supports multiple protocols, will increase complexity for IP-WDM integration because of various edge- interworkings required to route, map and protect client signals across WDM subnetworks. The existence of separate optical layer protocols may increase management costs for service providers. One of the main goals of the integration architecture is to make optical channel provisioning driven by IP data paths and traffic engineering mechanisms. This will require a tight cooperation of routing and resource management protocols at the two layers. The multi-layered protocols architecture can complicate the timely flow of the possibly large amount of topological and resource information. Another problem is with respect to survivability. There are various proposals stating that the optical layer itself should provide restoration/protection capabilities of some form. This will require careful coordination with the mechanisms of the higher layers such Many Authors Informational - Expires September 2001 Page 5 of 53 IP over Optical Networks: Summary of Issues March 2001 as the SONET Automatic Protection Switching (APS) and the IP re- routing strategies. Hold-off timers have been proposed to inhibit higher layers backup mechanisms. Problems can also arise from the high level of multiplexing done. The optical fiber links contain a large number of higher layer flows such as SONET/SDH, IP flows or ATM VCs. Since these have their own mechanisms, a flooding of alarm messages can take place. Hence, a much closer IP/WDM integration is required. The discussions, henceforth in this document, shall be of such an architecture. There exist, clouds of IP networks, clouds of WDM networks. Transfer of packets from a source IP router to a destination is required. How the combination does signaling to find an optimal path, route the packet, and ensure survivability are the topics of discussion. Multi-Protocol Label Switching (MPLS) for IP packets is believed to be the best integrating structure between IP and WDM. MPLS brings two main advantages. First, it can be used as a powerful instrument for traffic engineering. Second, it fits naturally to WDM when wavelengths are used as labels. This extension of the MPLS is called the Multi-protocol lambda switching. This document starts off with a description of the optical network model. Section 2 describes the correspondence between the optical network model and the MPLS architecture and how it can bring about the inter-working. Section 3 is on routing in this architecture. It also describes 3 models for looking at the IP cloud and the Optical cloud namely the Overlay model, the augmented model and the peer model. Sections 4 and 5 are on control, signaling and management, respectively. Section 6 is on restoration. Acronyms and glossary are defined in Sections 8 and 9. 1.2 Network Model In this draft, all the discussions assume the network model shown in Figure 2 [Luciani00]. Here, we consider a network model consisting of IP routers attached to an optical core network and connected to their peers over dynamically switched lightpaths. The optical core network is assumed to consist of multi-vendor optical sub-networks and are incapable of processing IP packets. In this network model, a switched lightpath has to be established between a pair of IP routers for their communication. The lightpath might have to traverse multiple optical sub-networks and be subject to different provisioning and restoration procedures in each sub-network. For this network model, two logical control interfaces are identified, viz., the client-optical network interface (UNI), and the optical sub-network interface (NNI). The UNI represents a technology boundary between the client and optical networks. And, the NNI represents a technology boundary across multi-vendor optical sub-networks [Luciani00]. Many Authors Informational - Expires September 2001 Page 6 of 53 IP over Optical Networks: Summary of Issues March 2001 The physical control structure used to realize these logical interfaces may vary depending on the context and service models, which are discussed later in this draft. +---------------------------------------+ | Optical Network | +--------------+ | | | | | +------------+ +------------+ | | IP | | | | | | | | Network +--UNI--+ Optical +---NNI--+ Optical | | | | | | Subnetwork | | Subnetwork | | +--------------+ | | | +-----+ | | | +------+-----+ | +------+-----+ | | | | | | | NNI NNI NNI | +--------------+ | | | | | | | | +------+-----+ | +------+-----+ | | IP +--UNI--| +--+ | | | | Network | | | Optical | | Optical | | | | | | Subnetwork +---NNI--+ Subnetwork | | +--------------+ | | | | | | | +------+-----+ +------+-----+ | | | | | +-------UNI-------------------UNI-------+ | | | | +------+-------+ +------------+ | | | | | Other Client | |Other Client| | Network | | Network | | (e.g., ATM) | | | +--------------+ +------------+ Figure 2: Network Model 2. Optical Switch Architecture It has been realized that optical networks must be survivable, flexible, and controllable. And hence, there is ongoing trend to introduce intelligence in the control plane of optical networks to make them more versatile. There is general consensus in the industry that the optical network control plane should utilize IP- based protocols for dynamic provisioning and restoration of lightpaths within and across optical sub-networks. In the existing IP-centric data network domain, these functionalities are performed by the Multi Protocol Label Switching (MPLS) traffic engineering control plane and currently in the optical domain it is achieved by Multi Protocol Lambda Switching (MPLambdaS), where wavelength is used as a label for switching the data at each hop. In this section, we identify the similarities that exist between the all- optical crossconnects (OXCs) of the optical networks and the label Many Authors Informational - Expires September 2001 Page 7 of 53 IP over Optical Networks: Summary of Issues March 2001 switch routers (LSRs) of the MPLS networks and identify how the control plane model of MPLS traffic engineering (TE) can be applied to that of optical transport network. 2.1 Multi Protocol Label Switching (MPLS) Multi Protocol Label Switching is a switching method in which a label field in the incoming packets is used to determine the next hop. At each hop, the incoming label is replaced by another label that is used at the next hop. The path thus realized is called a Label Switched Path (LSP). Devices which base their forwarding decision based solely on the incoming labels (and ports) are called Label Switched Routers (LSRs). In an IP-centric optical internetworking environment, OXCs and LSRs are used to switch the LSPs in the optical domain and the IP domain respectively. The OXCs are programmable and may support wavelength conversion and translation. It is important here to enumerate the relations and distinctions between OXCs and LSRs to expose the reusable software artifacts from the MPLS traffic engineering control plane model. Both OXCs and LSRs emphasize problem decomposition by architecturally decoupling the control plane from the data plane. 2.2 Isomorphic Relations and Distinctions between OXCs And LSRs While an LSR's data plane uses the label swapping paradigm to transfer a labeled packet from an input port to an output port, the data plane of an OXC uses a switch matrix to provision a lightpath from an input port to an output port. LSR's control plane is used to discover, distribute, and maintain relevant state information related to the MPLS network, and to instantiate and maintain label switched paths (LSPs) under various MPLS traffic engineering rules and policies. OXC's control plane is used to discover, distribute, and maintain relevant state information associated with the Optical Transport Network (OTN), and to establish and maintain lightpaths under various optical internetworking traffic engineering rules and policies [Awuduche]. Current generation of OXCs and LSRs differ in certain characteristics. While LSRs are datagram devices that can perform certain packet level operations in the data plane, OXCs cannot. They cannot perform packet level processing in the data plane. Another difference is that the forwarding information is carried explicitly in LSRs as part of the labels appended to the data packets unlike OXCs, where the switching information is implied from the wavelength or the optical channel. 2.3 Isomorphic Relations and Distinctions between LSPs and Lightpaths Both the explicit LSPs and lightpaths exhibit certain commonalties. For example, both of them are the abstractions of unidirectional, point-to-point virtual path connections. [Awuduche]. Another commonality is that the payload carried by both LSPs and lightpaths Many Authors Informational - Expires September 2001 Page 8 of 53 IP over Optical Networks: Summary of Issues March 2001 are transparent along their respective paths. They can be parameterized to stipulate their performance, behavioral, and survivability requirements from the network. There are certain similarities in the allocation of labels to LSPs and in the allocation of wavelengths to lightpaths. There is one major distinction between LSPs and lightpaths in that LSPs support label stacking, but the concept similar to label stacking, i.e., wavelength stacking doesn't exist in the optical domain at this time. 2.4 General Requirements for the OXC Control Plane This section describes some of the requirements for the OXC control plane with emphasis on the routing components. Some of the key aspects to these requirements are: (a) to expedite the capability to establish lightpaths, (b) to support traffic engineering functions, and (c) to support various protection and restoration schemes. Since the historical implementation of the "control plane" of optical transport networks via network management has detrimental effects like slow restoration, preclusion of distributed dynamic routing control, etc., motivation is to improve the responsiveness of the optical transport network and to increase the level of interoperability within and between service provider networks. In the following sections, we give a brief overview of MPLS traffic engineering (MPLS-TE), summarize the enhancements that are required in the OXCs to support the MPLS TE as well as the changes required in the MPLS control plane to adapt to the OXCs. 2.4.1 Overview Of The MPLS Traffic Engineering Control The components of the MPLS traffic engineering control plane model include the following modules [Awuduche]: (a) Resource discovery. (b) State information dissemination to distribute relevant information concerning the state of the network, like network topology, resource availability information. (c) Path selection that is used to select an appropriate route through the MPLS network for explicit routing. (d) Path management, which includes label distribution, path placement, path maintenance, and path revocation. The above components of the MPLS traffic engineering control plane are separable, and independent of each other, and hence it allows an MPLS control plane to be implemented using a composition of best of breed modules. 2.4.2 OXC Enhancements to Support MPLS Control Plane Many Authors Informational - Expires September 2001 Page 9 of 53 IP over Optical Networks: Summary of Issues March 2001 This section discusses some of the enhancements to OXCs to support wavelength switching. This extension, which has now been superceded with Generalized MPLS (GMPLS) was originally called Multiprotocol Lambda Switching or MPL(ambda)S. There are three key enhancements. First, there should be a mechanism to exchange control information between OXCs, and between OXCs and other LSRs. This can be accomplished in-band or quasi-in-band using the same links that are used to carry data-plane traffic, or out-of-band via a separate network. Second, an OXC should be able to provide the MPLS traffic engineering control plane with pertinent information regarding the state of individual fibers attached to that OXC, as well the state of individual lightpaths or lightpaths within each fiber. Third, even when an edge LSR does not have WDM capabilities, it should still have the capability to exchange control information with the OXCs in the domain. 2.4.3 MPLS Control Plane Enhancements This section discusses the enhancements that are to be made in the MPLS control plane to support MPL(ambda)S. An MPLS domain may consist of links with different properties depending upon the type of network elements at the endpoints of the links. Within the context of MPL(ambda)S, the properties of a link consisting of a fiber with WDM that interconnects two OXCs are different from that of a SONET link that interconnects two LSRs. As an example, a conventional LSP cannot be terminated on a link connected to a pure OXC. However, a conventional LSP can certainly be terminated on a link connected to a frame-based LSR. These differences should be taken into account when performing path computations to determine an explicit route for an LSP. It is also feasible to have the capability to restrict the path of some LSPs to links with certain characteristics. Path computation algorithms may then take this information into account when computing paths LSPs. If there are multiple control channels and bearer channels between two OXCs, then there must be procedures to associate bearer channels to corresponding control channels. Procedures are required to de- multiplex the control traffic for different bearer channels if a control channel is associated with multiple bearer channels. Procedures are also needed to activate and deactivate bearer channels, to identify the bearer channels associated with any given physical link, to identify spare bearer channels for protection purposes, and to identify impaired bearer channels, particularly, in the situation where the physical links carrying the bearer channel are not impaired. Signaling protocols (RSVP-TE and CR-LDP) need to be extended with objects that can provide sufficient details to establish reconfiguration parameters for OXC switch elements. Interior Gateway Protocols (IGPs) should be extended to carry information about the physical diversity of the fibers. IGPs should be able to Many Authors Informational - Expires September 2001 Page 10 of 53 IP over Optical Networks: Summary of Issues March 2001 distribute information regarding the allocatable bandwidth granularity of any particular link. 2.5 MPLS Traffic Engineering Control Plane with OXCs In IP-centric optical interworking systems, given that both OXCs and LSRs require control planes, one option would be to have two separate and independent control planes [Awuduche]. Another option is to develop a uniform control plane that can be used for both LSRs and OXCs. This option of having a uniform control plane will eliminate the administrative complexity of managing hybrid optical internetworking systems with separate, dissimilar control and operational semantics. Specialization may be introduced in the control plane, as necessary, to account for inherent peculiarities of the underlying technologies and networking contexts. A single control plane would be able to span both routers and OXCs. In such an environment, a LSP could traverse an intermix of routers and OXCs, or could span just routers, or just OXCs. This offers the potential for real bandwidth-on-demand networking, in which an IP router may dynamically request bandwidth services from the optical transport network. To bootstrap the system, OXCs must be able to exchange control information. One way to support this is to pre-configure a dedicated control wavelength between each pair of adjacent OXCs, or between an OXC and a router, and to use this wavelength as a supervisory channel for exchange of control traffic. Another possibility would be to construct a dedicated out-of-band IP network for the distribution of control traffic. Though an OXC equipped with MPLS traffic engineering control plane would resemble a Label Switching Router; there are some important distinctions and limitations. As discussed earlier, the distinction concerns the fact that there are no analogs of label merging in the optical domain, which implies that an OXC cannot merge several wavelengths into one wavelength. Another major distinction is that an OXC cannot perform the equivalent of label push and pop operation in the optical domain. This is due to lack of the concept of pushing and popping wavelengths is infeasible with contemporary commercial optical technologies. Finally, there is another important distinction, which is concerned with the granularity of resource allocation. An MPLS router operating in the electrical domain can potentially support an arbitrary number of LSPs with arbitrary bandwidth reservation granularities, whereas an OXC can only support a relatively small number of lightpaths, each of which will have coarse discrete bandwidth granularities. 2.6 Generalized MPLS (GMPLS) The Multi Protocol Lambda Switching architecture has recently been extended to include routers whose forwarding plane recognizes neither packet, nor cell boundaries, and therefore, can't forward data based on the information carried in either packet or cell Many Authors Informational - Expires September 2001 Page 11 of 53 IP over Optical Networks: Summary of Issues March 2001 headers. Specifically, such routers include devices where the forwarding decision is based on time slots, wavelengths, or physical ports. GMPLS differs from traditional MPLS in that it supports multiple types of switching, i.e., the addition of support for TDM, lambda, and fiber (port) switching. The support for the additional types of switching has driven generalized MPLS to extend certain base functions of traditional MPLS [GMPLS]. While traditional MPLS links are unidirectional, generalized MPLS supports the establishment of bi-directional paths. The need for bi- directional LSPs comes from its extent of reach. Bi-directional paths also have the benefit of lower setup latency and lower number of messages required during setup. Other features supported by generalized MPLS are rapid failure notification and termination of a path on a specific egress port. To deal with the widening scope of MPLS into the optical and time domain, several new forms of "label" are required. These new forms of label are collectively referred to as a "generalized label". A generalized label contains enough information to allow the receiving node to program its crossconnect. Since the nodes sending and receiving this new form of label know what kinds of link they are using, the generalized label does not contain a type field, instead the nodes are expected to know from context what type of label to expect. Currently, label formats supported by GMPLS are the Generalized Label, the Waveband Switching Label (which apparently uses the same Generalized Label format), the Suggested Label and the Label Set [GMPLS00]. (1) The Generalized Label: It extends the traditional Label Object in that it allows the representation of not only labels which travel in-band with associated data packets, but also labels which identify time-slots, wavelengths, or space division multiplexed positions. A Generalized Label only carries a single level of label, i.e., it is non-hierarchical. When multiple levels of label (LSPs within LSPs) are required, each LSP must be established separately. (2) Waveband Switching Label: Waveband switching label format uses the same format as the generalized label. Waveband switching is a special case of lambda switching, where a set of contiguous wavelengths are represented as a waveband and can be switched together to a new waveband. (3) Suggested Label: The Suggested Label is used to provide a downstream node with the upstream node's label preference, which permits the upstream node to start configuring its hardware with the proposed label before the label is communicated by the downstream node. This feature is valuable to systems where it takes non- trivial time to establish a label in hardware and thus reducing setup latency. One use of suggested labels is to indicate preferred wavelength. Many Authors Informational - Expires September 2001 Page 12 of 53 IP over Optical Networks: Summary of Issues March 2001 (4) Label Set: The Label Set is used to limit the label choices of a downstream node to a set of acceptable labels. This limitation applies on a per hop basis. Label Set is used to restrict label ranges that may be used for a particular LSP between two peers. The receiver of a Label Set must restrict its choice of labels to one which is in Label Set. Conceptually, the absence of a Label Set implies a Label Set whose value is the set of all valid labels. 3. IP over Optical Networks 3.1 Service models The optical network model considered in this draft consists of multiple Optical Crossconnects (OXCs) interconnected by optical links in a general topology (referred to as an "optical mesh network"). Each OXC is assumed to be capable of switching a data stream from a given input port to a given output port. This switching function is controlled by appropriately configuring a crossconnect table. Conceptually, the crossconnect table consists of entries of the form , indicating that data stream entering input port i will be switched to output port j. An "lightpath" from an ingress port in an OXC to an egress port in a remote OXC is established by setting up suitable crossconnects in the ingress, the egress and a set of intermediate OXCs such that a continuous physical path exists from the ingress to the egress port. Lightpaths are assumed to be bi-directional, i.e., the return path from the egress port to the ingress port follows the same path as the forward path.It is assumed that one or more control channels exist between neighboring OXCs for signaling purposes. In this section two possible service models are discussed in brief. The first being at the optical UNI and the second being at the optical sub-network NNI[Luciani00]. 3.1.1 Client Server Model Under this model the optical network primarily provides a set of high bandwidth pipes to the client requesting such. Standardized signaling can be used to invoke the following: 1. Lightpath creation. 2. Lightpath deletion. 3. Lightpath modification. 4. Lightpath status enquiry. The continued operation of the system requires that the client systems continuously register with the optical network. Signalling extensions need to be added to allow clients to register, deregister and query other clients for an optical-networked administered address so that lightpaths can be established with other clients across the optical network. Along with these signaling extensions a service discovery mechanism needs to be added which will allow the client to discover the static parameters of the link along with the Many Authors Informational - Expires September 2001 Page 13 of 53 IP over Optical Networks: Summary of Issues March 2001 UNI signaling protocol being used on the link. In this service model the routing protocols inside the optical network are exclusive of what is followed inside the client network. Only a minimal set of messages need to be defined between the router and the optical network. RSVP-TE, LDP or a TCP based control channel can be used for the same. Within the optical cloud NNI interface is defined between the various optical subnetworks. Details of the UNI and NNI signaling requirements are provided further on in this document. 3.1.2 Integrated Service Model In the Integrated Service Model the IP and the optical networks are treated as a single network and there is no distinction between the optical switches and the IP routers as far as the control plane goes. MPLS would be the preferred method for control and routing and there is no distinction between the UNI , NNI or any other router- router interface. Under this model, optical network services are provisioned using MPLS signaling as specified in [GMPLS]. In this service model the edge router can do the creation and modification of the label switched paths across the optical network. In some sense this resembles the client server model just presented, but it seems to promise seamless integration when compared to the client server model. OSPF with TE extensions to support optical networks could be used to exchange topology information and do the routing .It might happen in an optical network that a LSP across the optical network may be a conduit for a lot of other LSPs. This can be advertised as a virtual link inside a forward adjacency in protocols like OSPF. Thus from the point of view of the data plane an overlay is created between two edge routers across the optical network. 3.2 IP Optical Interaction Models The previous section presented possible service models for IP over optical networks. The models differ in the way routing is implemented. It is important to examine the architectural alternatives for routing information exchange between IP routers and optical switches. The aim of this exercise is to allow service discovery, automated establishment and seamless integration with minimal intervention. MPLS based signaling is assumed in the following discussion. Some of the proposed models for interaction between IP and optical components in a hybrid network are [Luciani00]: (1) Overlay model (2) Integrated/Augmented model (3) Peer model The key consideration in deciding the type of model is whether there is a single or separate monolithic routing and signaling protocol spanning the IP and the Optical domains. If there are separate instances of routing protocols running for each domain then the following three considerations help determine the model: Many Authors Informational - Expires September 2001 Page 14 of 53 IP over Optical Networks: Summary of Issues March 2001 1. What is the interface defined between the two protocol instances? 2. What kind of information is exchanged between the protocol instances? 3. What are policies regarding provisioning of the lightpaths across the optical domain between edge routers? This includes access control accounting and security. 3.2.1 Overlay Model Under the overlay model, IP domain is more or less independent of the optical domain. That is IP domain acts as a client to the Optical domain. In this scenario, the optical network provides point to point connection to the IP domain. The IP/MPLS routing protocols are independent of the routing and signaling protocols of the optical layer. The overlay model may be statically provisioned using a Network Management System or may be dynamically provisioned. Static provisioning solution may not be scalable though. 3.2.2 Peer Model In the peer model the optical routers and optical switches act as peers and there is only one instance of a routing protocol running in the optical domain and in the IP domain. A common IGP like OSPF or IS-IS may be used to exchange topology information. OSPF opaque Link State Advertisements (LSAs) and extended type-length-value encoded fields (TLVs) may be used in the case of IS-IS. The assumption in this model is that all the optical switches and the routers have a common addressing scheme. 3.2.3 Augmented Model In the augmented model, there are actually separate routing instances in the IP and optical domains but information from one routing instance is leaked into the other routing instance. For example IP addresses could be assigned to optical network elements and carried by optical routing protocols to allow reachability information to be shared with the IP domain to support some degree of automated discovery. 3.3 Routing Approaches 3.3.1 Fully peered routing model This routing model is used for the peer model described above. Under this approach there is only one instance of the routing protocol running in the IP and Optical domains. An IGP like OSPF or IS-IS with suitable optical extensions is used to exchange topology information. These optical extensions will capture the unique optical link parameters. The OXCs and the routers maintain the same link state database. The routers can then compute end-to-end paths to other routers across the OXCs. Such a Label Switched Path (LSP) can then be signaled using MPLS signaling protocols like RSVP-TE or Many Authors Informational - Expires September 2001 Page 15 of 53 IP over Optical Networks: Summary of Issues March 2001 CR-LDP. This lighpath is always a tunnel across the optical network between edge routers. Once created such lightpaths are treated as virtual links and are used in traffic engineering and route computation. As and when forwarding adjacencies (FAs) are introduced in the link state corresponding links over the IP Optical interface are removed from the link state advertisements. Finally the details of the optical network are completely replaced by the FAs advertised in the link state. 3.3.2 Domain Specific Routing This routing model supports the augmented routing model. In this model the routing between the optical and the IP domains is separated with a specific routing protocol running between the domains. The focus is on the routing information to be exchanged at the IP optical interface. Interdomain routing protocols like BGP may be used to exchange information between the IP and optical domain. OSPF areas may also be used to exchange routing information across the two domains. 3.3.2.1 Routing using BGP BGP will allow IP networks to advertise IP addresses within its network to external optical networks while receiving external IP prefixes from the optical network. Edge routers and OXCs can run External BGP (EBGP). Within the optical network EBGP can be used between optical subnetworks across the NNI and Internal BGP (IBGP) can be used within the optical network. Using this scheme it is essential to identify the optical network corresponding to the egress IP addresses. The reason is as follows. Whenever an edge router wants to setup a LSP across an optical network it is just going to specify the destination IP. Now if the edge router has to request another path to the destination it must know if there already exist lightpaths with residual capacity to the destination. To determine this it needs to know which ingress ports in an OXC correspond to which external destination. Thus a border OXC receiving external IP addresses by way of EBGP must include information about its IP address and pass it on to the edge router. The edge router must store this association between the OXCs and the external IP addresses and need not propagate the egress address further. Specific mechanisms to propagate the BGP egress addresses are yet to be determined. 3.3.2.2 Routing using OSPF OSPF supports the concept of hierarchical routing using OSPF areas. Information across a UNI can be exchanged using this concept of a hierarchy. Routing within each area is flat. Routers attached to more than one areas are called Area Border Routers (ABR). An ABR propogates IP addressing information from one area to another using a summary LSA. Domain specific routing can be done within each area. Optical networks can be implemented as an area with an enhanced version of OSPF with optical extensions running on it. IP client Many Authors Informational - Expires September 2001 Page 16 of 53 IP over Optical Networks: Summary of Issues March 2001 networks can be running OSPF with TE extensions. Summary LSAs exchanged between the two areas would provide enough information for the establishment of lightpaths across the optical network. Domain specific information in the optical network can be hidden from the client network. OSPF or BGP help in route discovery and collecting reachability information. Determination of paths and setting up of the LSPs is a traffic engineering decision. 3.3.3 Overlay Routing Overlay routing is much like the IP over ATM and supports the overlay connection model. IP overlays are setup across the optical network. Address resolution similar to that in IP over ATM is used. The optical network can maintain a registry of IP addresses and VPN identifiers it is connected to. On querying the database for an external IP address it would return the appropriate egress port address on the OXC. Once an initial set of lightpaths are created VPN wide routing adjacencies can be formed using OSPF. The IP VPN would then be "overlayed" on the underlying optical network which could have an independent way of routing. 3.4 Path Selection A possible scenario for path selection is presented in Figure 3. +--------+ +--------+ +--------+ | |<----->|Path | |OSPF | | CR-LDP | +-->|Selector| | | | | | | | |TE EXT | +--------+ | +---+----+ +---|OPT EXT | | | | +--------+ | v | | +--------+ | +--------+ +--------+ | |TE | | |IS-IS | | | | |Database| | | | | RSVP-TE|<--+ | | | |TE EXT | | | | |<--+---|OPT EXT | +--------+ +--------+ +--------+ Figure 3: Lightpath Selection These systems use CR-LDP or RSVP-TE to signal MPLS paths. These protocols can source route by consulting a traffic engineering database, which is maintained along with the IGP database. This information is carried opaquely by the IGP for constraint based routing. If RSVP-TE or CR-LDP is used solely for label provisioning, the IP router functionality must be present at every label switch hop along the way. Once the label has been provisioned by the protocol then at each hop the traffic is switched using the native capabilities of the device to the eventual egress LSR. Many Authors Informational - Expires September 2001 Page 17 of 53 IP over Optical Networks: Summary of Issues March 2001 Path selection can be online or offline. An offline computation is normally centralized while as an online computation is normally distributed. An offline computation is facilitated by simulation or network planning tools and can be used to provide guidance to subsequent real time computations. An online computation may be done whenever a connection request comes in. A combination of offline and online computations may be used by a network operator. Offline computations are used when complicated traffic engineering, demand planning, cost planning and global optimization is a priority. In case of online computations there can be two choices when it comes to routing. 1) Explicit routing using a global view of the network can be used to calculate the most optimal solution taking into consideration constraints other than link metrics. 2) Hop by hop routing using path calculation at every node. This may not be able to provide an optimal solution taking into consideration constraints other than non additive link metrics. 3.5 Constraints on Routing The constraints highlighted here apply to any circuit switched networks but differences with an optical network are explained where applicable[GMPLS-CONTROL]. One of the main services provided by any transport network is restoration. Restoration introduces the constraint of physically diverse routing. Restoration can be provided by pre-computed paths or computing the backup path in real time. The backup path has to be diverse from the primary path at least in the failed link or completely physically diverse. A logical attribute like the Shared Risk Link Group (SRLG) is abstracted by the operators from various physical attributes like trench ID and destructive areas. Such an attribute may be needed to be considered when making a decision about which path to take in a network. Two links which share a SRLG cant be the backup for one another because they both may go down at the same time. In order to satisfy such constraints path selection algorithms are needed to find two disjoint paths in a graph. Suurballe's algorithm as discussed [Suurballe] is a good example of an algorithm to find two node disjoint paths in a network. Another restoration mechanism is restoration in a shared mesh architecture wherein backup bandwidth may be shared among circuits. It may be the case that two link disjoint paths share a backup path in the network. This may be possible because a single failure scenario is assumed. A few heuristics to optimize the bandwidth allocated to a backup path in a mesh architecture have already been proposed [Bell-Labs]. Optimal routing requires considerable network level information and the most optimal solutions still require further study. Detailed protection and restoration mechanisms are discussed in later sections of this document. Many Authors Informational - Expires September 2001 Page 18 of 53 IP over Optical Networks: Summary of Issues March 2001 Another constraint of interest is the concept of node, link, LSP inclusion or exclusion, propagation delay, wavelength convertibility and connection bandwidth among other things. A service provider may want to exclude a set of nodes due to the geographic location of the nodes. An example would be nodes lying in an area which is earthquake prone. Propagation delay may be another constraint for a large global network. Traffic from the US to Europe, shouldn't normally be routed over links across the Pacific ocean but instead should use links over the Atlantic ocean since propagation delay in this case would be much less. Wavelength convertibility is a problem encountered in waveband networks. It refers to ability of OXC to crossconnect two different wavelengths. The wavelengths may be completely different or slightly different. Since wavelength convertibility currently involves an optical-electrical-optical (OEO) conversion, vendors may selectively deploy these converters inside the network. Therein lies the problem of routing a circuit over a network using the same wavelength. This requires that the path selection algorithms know the availability of each wavelength on each link along the route. With link bundling, this is difficult since information about all the wavelengths may be included in the same bundle. Link probing may have to be employed at the source router to find out the number of wavelengths available along the path. Bandwidth availability is another consideration in routing. This is simplified in a wavelength optical network since requests are end to end. However, in a TDM transport network such as a SONET/SDH network, requests can be variable bandwidth. Routing needs to ensure that sufficient capacity is available end to end. There are further difficulties introduced due to the different concatenation schemes in the SONET/SDH schemes. An example would be a concatenated STS-3c channel, which would require three adjacent time slots to be allocated. This implies that a time slot map of the link has to be distributed to the entire network to facilitate a routing decision. Alternatively in a logical link representation one would need N different logical links to represent all possible STS-N signals. But then this would take up too much control bandwidth. A preferred approach would be to advertise just the largest block of time slots available on a logical link instead of the entire time slot map. This is sufficient to determine if a connection can be supported on a link. Detailed resource information on local resource availability is only used for routing decisions. 4. Signaling & Control Signaling refers to messages used to communicate characteristics of services requested or provided. This section discusses a few of the signaling procedures. It is assumed that there exists some default communication mechanism between routers prior to using any of the routing and signaling mechanisms. 4.1 MPLS Control Plane Many Authors Informational - Expires September 2001 Page 19 of 53 IP over Optical Networks: Summary of Issues March 2001 A candidate system architecture for an OXC equipped with an MPLS control plane model is shown in Figure 4. The salient feature of the network architecture is that every node in the network consists of an IP router and a reconfigurable OLXC. The IP router is responsible for all non-local management functions, including the management of optical resources, configuration and capacity management, addressing, routing, traffic engineering, topology discovery, exception handling and restoration. In general, the router may be traffic bearing, or it may function purely as a controller for the optical network and carry no IP data traffic. Although the IP protocols are used to perform all management and control functions, lightpaths may carry arbitrary types of traffic. The IP router implements the necessary IP protocols and uses IP for signaling to establish lightpaths. Specifically, optical resource management requires resource availability per link to be propagated, implying link state protocols such as OSPF. Between each pair of neighbors in the network, one communication channel exists that allows router to router connectivity over the channel. These signaling channels reflect the physical topology. All traffic on the signaling channel is IP traffic and is processed or forwarded by the router. Multiple signaling channels may exist between two neighbors and some may be reserved for restoration. Therefore, we can assume that as long as the link between two neighbors is functional, there is a signaling channel between those neighbors. -------------------------------- | OXC WITH MPLS CONTROL PLANE | | | | ------------------- | | | | | | | MPLS Control Plane| | | | | | | ------------------- | | | | | ------------------- | | | | | | |Control Adaptation | | | ------------------- | | | OXC Switch | | | | Controller | | | ------------------- | | | | | ------------------- | | | | | | | OXC Switch Fabric | | | | OXC Data Plane | | | ------------------- | | | -------------------------------- Figure 4: OXC Architecture Many Authors Informational - Expires September 2001 Page 20 of 53 IP over Optical Networks: Summary of Issues March 2001 The IP router module communicates with the OLXC device through a logical interface. The interface defines a set of basic primitives to configure the OLXC, and to enable the OLXC to convey information to the router. The mediation device translates the logical primitives to and from the proprietary controls of the OLXC. Ideally, this interface is both explicit and open. We recognize that a particular realization may integrate the router and the OLXC into a single box and use a proprietary interface implementation. Figure 5 illustrates this implementation. The following interface primitives are examples of a proposal for communication between the router and the OLXC within a node: a) Connect(input link, input channel, output link, output channel): Commands sent from the router to the OLXC requesting that the OLXC crossconnect input channel on the input link to the output channel on the output link. b) Disconnect(input link, input channel, output link, output channel): Command sent from the router to the OLXC requesting that it disconnect the output channel on the output link from the connected input channel on the input link. +-------------------------------+ | | | Router module | | | | | | | | | | | Primitives | | | | /|\ | | | | | | | | | +--+---------+----+----------+--+ Control Channel | | | | | | ----------+--+ | | +--+--------- ----------+---------- | \|/ ----------+--------- ----------+---------- ----------+--------- ----------+---------- ----------+--------- ----------+---------- ----------+--------- | OLXC | | | | | +-------------------------------+ Figure 5: Control Plane Architecture c) Bridge(input link, input channel, output link, output channel): Command sent from the router controller to the OLXC requesting the bridging of a connected input channel on input link to another output channel on output link. Many Authors Informational - Expires September 2001 Page 21 of 53 IP over Optical Networks: Summary of Issues March 2001 d) Switch(old input link, old input channel, new input link, new input channel, output link, output channel): Switch output port from the currently connected input channel on the input link to the new input channel on the new input link. The switch primitive is equivalent to atomically implementing a disconnect(old input channel, old input link, output channel, output link) followed by a connect(new input link, new input channel, output link, output channel). e) Alarm(exception, object): Command sent from the OLXC to the router informing it of a failure detected by the OLXC. The object represents the element for which the failure has been detected. For all of the above interfaces, the end of the connection can also be a drop port. 4.2 Addressing Every network addressable element must have an IP address. Typically these elements include each node and every optical link and IP router port. When it is desirable to have the ability to address individual optical channels those are assigned IP addresses as well. The IP addresses must be globally unique if the element is globally addressable. Otherwise domain unique addresses suffice. A client must also have an IP address by which it is identified. However, optical lightpaths could potentially be established between devices that do not support IP (i.e., are not IP aware), and consequently do not have IP addresses. This could be handled either by assigning an IP address to the device, or by assigning an address to the OLXC port to which the device is attached. Whether or not a client is IP aware can be discovered by the network using traditional IP mechanisms. 4.3 Path Setup This section describes a protocol proposed for setting up an end-to- end lightpath for a channel. A complete path might contain the two endpoints and an array of intermediate OXCs for transport across the optical network. This section describes the handshake used for ad- hoc establishment of lightpaths in the network. Provisioning an end- to-end optical path across multiple sub-networks involves the establishment of path segments in each sub-network sequentially. Inside the optical domain, a path segment is established from the source OXC to a border OXC in the source sub-network. From this border OXC, signaling across the NNI is performed to establish a path segment to a border OXC in the next sub-network. Provisioning continues this way until the destination OXC is reached. The link state information is used to compute the routes for lightpaths being established. It is assumed that a request to establish a lightpath may originate from an IP router (over the Many Authors Informational - Expires September 2001 Page 22 of 53 IP over Optical Networks: Summary of Issues March 2001 UNI), a border node (over the NNI) , or a management system. This request carries all required parameters. After computing the route, the actual path establishment commences. However, once path setup is complete the data transfer happens passively and is straightforward without much intervention from the control plane. The connection needs to be maintained as per the service level agreements. To automate this process, there are certain initiation procedures so as to determine the route for each segment (viz. IP host _ IP border router, IP border router - border OXC, between border OXCs). * Resource Discovery Routing within the optical network relies on knowledge of network topology and resource availability. The first step towards network- wide link state determination is the discovery of the status of local links to all neighbors by each OXC. The end result is that each OXC creates a port state database. Topology information is distributed and maintained using standard routing algorithms, e.g., OSPF and IS-IS. On boot, each network node goes through neighbor discovery. By combining neighbor discovery with local configuration, each node creates an inventory of local resources and resource hierarchies, namely: channels, channel capacity, wavelengths, and links. * Route calculation Different mechanisms for routing exist [Luciani00]. The route computation, after receiving all network parameters in the form of link state packets, reduces to a mathematical problem. It involves solving a problem of Routing and Wavelength Assignment (RWA) for the new connection. The problem is simplified if there exists a wavelength converter at every hop in the optical network. 4.3.1 UNI Path Provisioning The real handshake between the client network and the optical backbone happens after performing the initial service & neighbor discovery. The continued operation of the system requires that client systems constantly register with the optical network. The registration procedure aids in verifying local port connectivity between the optical and client devices, and allows each device to learn the IP address of the other to establish a UNI control channel. The following procedures may be made available over the UNI: * Client Registration: This service allows a client to register its address(es) and user group identifier(s) with the optical network. Many Authors Informational - Expires September 2001 Page 23 of 53 IP over Optical Networks: Summary of Issues March 2001 * Client De-Registration: This service allows a client to withdraw its address(es) and user group identifier(s) from the optical network. The optical network primarily offers discrete capacity, high bandwidth connectivity in the form of lightpaths. The properties of the lightpaths are defined by the attributes specified during lightpath establishment or via acceptable modification requests. To ensure operation of the domain services model, the following actions need to be supported at the UNI so as to offer all essential lightpath services. The UNI signaling messages are structured as requests and responses [UNI00]. 1. Lightpath creation: This action allows a lightpath with the specified attributes to be created between a pair of termination points. Each lightpath is assigned a unique identifier by the optical network, called the lightpath ID. Lightpath creation may be subject to network-defined policies and security procedures. 2. Lightpath deletion: This action, originating from either end, allows an existing lightpath (referenced by its ID) to be deleted. 3. Lightpath modification: This action allows certain parameters of the lightpath (referenced by its ID) to be modified. Lightpath modification must not result in the loss of the original lightpath. 4. Lightpath status enquiry: This service allows the status of certain parameters of the lightpath (referenced by its ID) to be queried. 5. Notification: This action sends an autonomous message from the optical network to the client to indicate a change in the status of the lightpath (e.g., non-restorable lightpath failure). Thus, the above actions provision both edges of the overall connection, while NNI provisioning builds the central portion of the setup 4.3.2 Basic Path Setup Procedure for NNI The model for provisioning an optical path across optical sub- networks is as follows. A provisioning request may be received by a source OXC from the client border IP router (or from a management system), specifying the source and destination end-points. The source end-point is implicit and the destination endpoint is identified by the IP address. In both cases, the routing of an optical path inside the optical backbone is done as follows [Pendarakis00]: Many Authors Informational - Expires September 2001 Page 24 of 53 IP over Optical Networks: Summary of Issues March 2001 * The source OXC looks up its routing information corresponding to the specified destination IP address. If the destination is an OXC in the source sub-network, a path maybe directly computed to it. If the destination is an external address, the routing information will indicate a border OXC that would terminate the path in the source sub-network. A path is computed to the border OXC. * The computed path is signaled from the source to the destination OXC within the source sub-network. The destination OXC in the source sub-network determines if it is the ultimate destination of the path. if it is, then it completes the path set-up process. Otherwise, it determines the address of a border OXC in an adjacent sub-network that leads to the final destination. The path set-up is signaled to this OXC using NNI signaling. The next OXC then acts as the source for the path and the same steps are repeated. Thus, NNI provisioning involves looking up in the routing table computed by various schemes mentioned previously and performing path setup within an optical sub-network. Techniques for link provisioning within the optical sub-network depends upon whether the OXCs do or do not have wavelength conversion. Both these cases are discussed below. 4.3.2.1 Network with Wavelength Converters In an optical network with wavelength conversion, channel allocation can be performed independently on different links along a route. A lightpath request from a source is received by the first-hop router. (The term router here denotes the routing entity in the optical nodes or OXCs). The first-hop router creates a lightpath setup message and sends it towards the destination of the lightpath where it is received by the last-hop router. The lightpath setup is sent from the first-hop router on the default routed lightpath as the payload of a normal IP packet with router alert. A router alert ensures that the packet is processed by every router in the path. A channel is allocated for the lightpath on the downstream link at every node traversed by the setup. The identifier of the allocated channel is written to the setup message. Note that the lightpath is established over the links traversed by the lightpath setup packet. After a channel has been allocated at a node, the router communicates with the OLXC to reconfigure the OLXC to provide the desired connectivity. After processing the setup, the destination (or the last-hop router) returns an acknowledgement to the source. The acknowledgment indicates that a channel has been allocated on each hop of the lightpath. It does not, however, confirm that the lightpath has been successfully implemented (or configured). If no channel is available on some link, the setup fails, and a message is returned to the first-hop router informing it that the lightpath cannot be established. If the setup fails, the first-hop router issues a release message to release resources allocated for Many Authors Informational - Expires September 2001 Page 25 of 53 IP over Optical Networks: Summary of Issues March 2001 the partially constructed lightpath. Upon failure, the first-hop router may attempt to establish the lightpath over an alternate route, before giving up on satisfying the original user request. The first-hop router is obligated to establish the complete path. Only if it fails on all possible routes does it give a failure notification to the true source. 4.3.2.2 Network without wavelength converters However, if wavelength converters are not available, then a common wavelength must be located on each link along the entire route, which requires some degree of coordination between different nodes in choosing an appropriate wavelength. Sections of a network that do not have wavelength converters are thus referred to as being wavelength continuous. A common wavelength must be chosen on each link along a wavelength continuous section of a lightpath. Whatever wavelength is chosen on the first link defines the wavelength allocation along the rest of the section. A wavelength assignment algorithm must thus be used to choose this wavelength. Wavelength selection within the network must be performed within a subset of client wavelengths. Optical non-linearity, chromatic dispersion, amplifier spontaneous emission and other factors together may limit the scalability of an all-optical network. Routing in such networks may then have to take into account noise accumulation and dispersion to ensure that lightpaths are established with adequate signal qualities. Hence, all routes become geographically constrained so that they will have adequate signal quality, and physical layer attributes can be ignored during routing and wavelength assignment. One approach to provisioning in a network without wavelength converters would be to propagate information throughout the network about the state of every wavelength on every link in the network. However, the state required and the overhead involved in maintaining this information would be excessive. By not propagating individual wavelength availability information around the network, we must select a route and wavelength upon which to establish a new lightpath, without detailed knowledge of wavelength availability. A probe message can be used to determine available wavelengths along wavelength continuous routes. A vector of the same size as the number of wavelengths on the first link is sent out to each node in turn along the desired route. This vector represents wavelength availability, and is set at the first node to the wavelength availability on the first link along the wavelength continuous section. If a wavelength on a link is not available or does not exist, then this is noted in the wavelength availability vector (i.e. the wavelength is set to being unavailable). Once the entire route has been traversed, the wavelength availability vector will denote the wavelengths that are available on every link along the route. The vector is returned to the source OXC, and a wavelength Many Authors Informational - Expires September 2001 Page 26 of 53 IP over Optical Networks: Summary of Issues March 2001 is chosen from amongst the available wavelengths using an arbitrary wavelength assignment scheme, such as first-fit. The construction of a bi-directional lightpath differs from the construction of a unidirectional lightpath above only in that upon receiving the setup request, the last-hop router returns the setup message using the reverse of the explicit route of the forward path. Both directions of a bi-directional lightpath share the same characteristics, i.e., set of nodes, bandwidth and restoration requirements. For more general bi-directional connectivity, a user simply requests multiple individual lightpaths. A lightpath must be removed when it is no longer required. To achieve this, an explicit release request is sent by the first-hop router along the lightpath route. Each router in the path processes the release message by releasing the resources allocated to the lightpath, and removing the associated state. It is worth noting that the release message is an optimization and need not be sent reliably, as if it is lost or never issued (e.g., due to customer premise equipment failure) the softness of the lightpath state ensures that it will eventually expire and be released. 4.4 Signaling protocols The OXCs in the optical network are responsible for switching streams based on the labels present. The MPLS architecture for IP networks defines protocols for associating labels to individual paths. The signaling protocols are used to provision such paths in the optical networks. There are two options for MPLS-based signaling protocols_Resource reSerVation Protocol Traffic Engineering Extensions (RSVP-TE) or Constraint Based Routing Label Distribution Protocol (CR-LDP). There are some basic differences between the two protocols, but both essentially allow hop-by-hop signaling from a source to a destination node and in the reverse direction. Each of these protocols are capable of providing quality of service (QoS) and traffic engineering. Not all features present in these protocols are necessary to support lightpath provisioning. On the other hand, certain new features must be introduced in these protocols for lightpath provisioning, including support for bi-directional paths, support for switches without wavelength conversion, support for establishing shared backup paths, and fault tolerance. The connection request may include bandwidth parameters and channel type, reliability parameters, restoration options, setup and holding priorities for the path etc. On receipt of the request, the ingress node computes a suitable route for the requested path, following applicable policies and constraints. Once the route has been computed, the ingress node invokes RSVP-TE / CR-LDP to set up the path. Many Authors Informational - Expires September 2001 Page 27 of 53 IP over Optical Networks: Summary of Issues March 2001 4.4.1 CR-LDP Extensions for Path Setup Label Distribution Protocol (LDP) is defined for distribution of labels inside one MPLS domain. CR-LDP is the constraint-based extension of LDP. One of the most important services that may be offered using MPLS in general and CR-LDP in particular is support for constraint-based routing of lightpaths across the routed network. Constraint-based routing offers the opportunity to extend the information used to setup paths beyond what is available for the routing protocol. For instance, an LSP can be setup based on explicit route constraints, QoS constraints, and other constraints. Constraint-based routing (CR) is a mechanism used to meet traffic- engineering requirements that have been proposed. A Label Request message is used by an upstream LSR to request a label binding from the downstream LSR for a specified forwarding equivalency class (FEC) and CR-LSP. In optical networks, a Label Request message may be used by the upstream OXC to request a port (and wavelength) assignment from the downstream OXC for the lightpath being established. Using downstream-on-demand and ordered control mode, a Label Request message is initially generated at the ingress OXC and is propagated to the egress OXC. Also, a protocol is required to determine the port mappings. To incorporate the above mentioned constraints, the following extensions to current version of CR-LDP have been proposed: * Inclusion of Signaling Port ID * Signaling Optical Switched Path Identifier * Signaling the two end points of the path being set up * Signaling requirements for both span and path protection * Recording the precise route of the path being established 4.4.2 RSVP-TE Extensions for Path Setup Resource reSerVation Protocol with Traffic Engineering extensions (RSVP-TE) is a unicast and multicast signaling protocol designed to install and maintain reservation state information at each routing engine along a path [Luciani00]. The key characteristics of RSVP are that it is simplex, receiver-oriented and soft. It makes reservations for unidirectional data flows. The receiver of a data flow generally initiates and maintains the resource reservation used for that flow. It maintains "soft" state in routing engines. The "path" messages are propagated from the source towards potential recipients. The receivers interested in communicating with the source send the "Resv" messages. The following extensions to RSVP-TE have been proposed to support path setup : - Reduction of lightpath establishment latency - Establishment of bi-directional lightpaths - Fast failure notification Many Authors Informational - Expires September 2001 Page 28 of 53 IP over Optical Networks: Summary of Issues March 2001 - Bundling of notifications 4.5 Stream Control Transmission Protocol (SCTP) There is further discussion on which transport layer protocol to use for the signaling messages encapsulated in CR-LDP / RSVP-TE. The requirements of the transport layer is to provide a reliable channel for transmitting information (both data / control). The IETF Sigtran workgroup came up with designs for a new protocol called SCTP, which could be used in lieu of TCP, and is designed especially for signaling purposes[SCTP]. Like TCP it runs directly over IP but offers some signaling tailored features: * Datagram-oriented (TCP is byte-stream-oriented) * Fragmentation and re-assembly for large datagrams * Multiplexing of several small datagrams into one IP packet * Support of multi-homing (an SCTP endpoint may have several IP addresses) * Path monitoring by periodic heartbeat messages * Retransmission over a different path, if available * Selective acknowledgements * Fast retransmit * 32 bit checksum over the whole payload * Avoids IP fragmentation due to MTU discovery * Protection against SYN attacks and blind masquerade attacks SCTP is far from complete and is quite immature compared to its nemesis TCP. Current implementation of the signaling protocol shall thereby use TCP for its reliable transmissions. 4.6 Configuration Control using GSMP In a general mesh network where the OXCs do not participate in topology distribution protocols, General Switch Management Protocol (GSMP) can be used to communicate crossconnect information. This ensures that the OXCs on the lightpath maintain appropriate databases. The first hop router having complete knowledge of LP, L2 and L3 topology acts as the "controller" to the OXCs in the lightpath. GSMP is a master-slave protocol [GSMP]. The controller issues request messages to the switch. Each request message indicates whether a response is required from the switch (and contains a transaction identifier to enable the response to be associated with the request). The switch replies with a response message indicating either a successful result or a failure. The switch may also generate asynchronous Event messages to inform the controller of asynchronous events. 4.7 Resource Discovery Using NHRP Many Authors Informational - Expires September 2001 Page 29 of 53 IP over Optical Networks: Summary of Issues March 2001 The Next Hop Resolution Protocol (NHRP) allows a source station (a host or router), wishing to communicate over a Non-Broadcast, Multi- Access (NBMA) subnetwork, to determine the internetworking layer addresses and NBMA addresses of suitable "NBMA next hops" toward a destination station [NHRP]. A subnetwork can be non-broadcast either because it technically doesn't support broadcasting (e.g., an X.25 subnetwork) or because broadcasting is not feasible for one reason or another (e.g., a Switched Multi-megabit Data Service multicast group or an extended Ethernet would be too large). If the destination is connected to the NBMA subnetwork, then the NBMA next hop is the destination station itself. Otherwise, the NBMA next hop is the egress router from the NBMA subnetwork that is "nearest" to the destination station. NHRP is intended for use in a multiprotocol internetworking layer environment over NBMA subnetworks. In short, NHRP may be applied as a resource discovery to find the egress OXC in an optical network. To request this information, the existing packet format for the NHRP Resolution Request would be used with a new extension in the form of a modified Forward Transit NHS Extension. The extension would include enough information at each hop (including the source and destination) * to uniquely identify which wavelength. * to use when bypassing each routed/forwarded hop and which port that the request was received on. Essentially a shortcut is setup from ingress to egress using this protocol. 5. Optical Network Management The management functionality in all-optical networks is still in the rudimentary phase. Management in a system refers to set of functionalities like performance monitoring, link initialization and other network diagnostics to verify safe and continued operation of the network. The wavelengths in the optical domain will require routing, add/drop, and protection functions, which can only be achieved through the implementation of network-wide management and monitoring capabilities. Current proposals for link initialization and performance monitoring are summarized below. 5.1 Link Initialization The links between OXCs will carry a number of user bearer channels and possibly one or more associated control channels. This section describes a link management protocol (LMP) that can be run between neighboring OXCs and can be used for both link provisioning and fault isolation. A unique feature of LMP is that it is able to isolate faults independent of the encoding scheme used for the bearer channels. LMP will be used to maintain control channel Many Authors Informational - Expires September 2001 Page 30 of 53 IP over Optical Networks: Summary of Issues March 2001 connectivity, verify bearer channel connectivity, and isolate link, fiber, or channel failures within the optical network. 5.1.1 Control Channel Management For LMP, it is essential that a control channel is always available for a link, and in the event of a control channel failure, an alternate (or backup) control channel should be made available to reestablish communication with the neighboring OXC. If the control channel cannot be established on the primary (fiber, wavelength) pair, then a backup control channel should be tried. The control channel of a link can be either explicitly configured or automatically selected. The control channel can be used to exchange: a) MPLS control-plane information such as link provisioning and fault isolation information (implemented using a messaging protocol such as LMP, proposed in this section), b) path management and label distribution information (implemented using a signaling protocol such as RSVP-TE or CR-LDP), and c) topology and state distribution information (implemented using traffic engineering extended protocols such as OSPF and IS-IS). Once a control channel is configured between two OXCs, a Hello protocol can be used to establish and maintain connectivity between the OXCs and to detect link failures. The Hello protocol of LMP is intended to be a lightweight keep-alive mechanism that will react to control channel failures rapidly. A protocol similar to the HDLC frame exchange is used to continue the handshake. [Lang00] 5.1.2 Verifying Link Connectivity In this section, we describe the mechanism used to verify the physical connectivity of the bearer channels. This will be done initially when a link is established, and subsequently, on a periodic basis for all free bearer channels on the link. To ensure proper verification of bearer channel connectivity, it is required that until the bearer channels are allocated, they should be opaque. As part of the link verification protocol, the control channel is first verified, and connectivity maintained, using the Hello protocol discussed in Section 5.1.1. Once the control channel has been established between the two OXCs, bearer channel connectivity is verified by exchanging Ping-type Test messages over all of the bearer channels specified in the link. It should be noted that all messages except for the Test message are exchanged over the control channel and that Hello messages continue to be exchanged over the control channel during the bearer channel verification process. The Test message is sent over the bearer channel that is being verified. Bearer channels are tested in the transmit direction as they are unidirectional, and as such, it may be possible for both OXCs to exchange the Test messages simultaneously [Lang00]. Many Authors Informational - Expires September 2001 Page 31 of 53 IP over Optical Networks: Summary of Issues March 2001 5.1.3 Fault Localization Fault detection is delegated to the physical layer (i.e., loss of light or optical monitoring of the data) instead of the layer 2 or layer 3. Hence, detection should be handled at the layer closest to the failure; for optical networks, this is the physical (optical) layer. One measure of fault detection at the physical layer is simply detecting loss of light (LOL). Other techniques for monitoring optical signals are still being developed. A link connecting two OXCs consists of a control channel and a number of bearer channels. If bearer channels fail between two OXCs, a mechanism should be used to rapidly locate the failure so that appropriate protection/restoration mechanisms can be initiated. This is discussed further in Section 6.10. 5.2 Optical Performance Monitoring (OPM) Current-generation WDM networks are monitored, managed, and protected within the digital domain, using SONET and its associated support systems. However, to leverage the full potential of wavelength-based networking, the provisioning, switching, management and monitoring functions have to move from the digital to the optical domain. The information generated by the performance monitoring operation can be used to ensure safe operation of the optical network. In addition to verifying the service level provided by the network to the user, performance monitoring is also necessary to ensure that the users of the network comply with the requirements that were negotiated between them and the network operator. For example, one function may be to monitor the wavelength and power levels of signals being input to the network to ensure that they meet the requirements imposed by the network. Current performance monitoring in optical networks requires termination of a channel at an optical- electrical-optical conversion point to detect bits related to BER of the payload or frame (e.g., SONET LTE monitoring). However, while these bits indicate if errors have occurred, they do not supply channel-performance data. This makes it very difficult to assess the actual cause of the degraded performance. Fast and accurate determination of the various performance measures of a wavelength channel implies that measurements have to be done while leaving it in optical format. One possible way of achieving this is by tapping a portion of the optical power from the main channel using a low loss tap of about 1%. In this scenario, the most basic form of monitoring will utilize a power-averaging receiver to detect loss of signal at the optical power tap point. Existing WDM systems use optical time-domain reflectometers to measure the parameters of the optical links. Many Authors Informational - Expires September 2001 Page 32 of 53 IP over Optical Networks: Summary of Issues March 2001 Another problem lies in determining the threshold values for the various parameters at which alarms should be declared. Very often these values depend on the bit rate on the channel and should ideally be set depending on the bit rate. In addition, since a signal is not terminated at an intermediate node, if a wavelength fails, all nodes along the path downstream of the failed wavelength could trigger an alarm. This can lead to a large number of alarms for a single failure, and makes it somewhat more complicated to determine the cause of the alarm (alarm correlation). A list of such optical parameters to be monitored periodically have been proposed . Optical cross talk, dispersion, and insertion loss are key parameters to name a few. Care needs to be taken in exchanging these performance parameters. The vast majority of existing telecommunication networks use framing and data formatting overhead as the means to communicate between network elements and management systems. It is worth mentioning that while the signaling is used to communicate all monitoring results, the monitoring itself is done on the actual data channel, or some range of bandwidth around the channel. Therefore, all network elements must be guaranteed to pass this bandwidth in order for monitoring to happen at any point in the network. One of the options being considered for transmitting the information is the framing and formatting bits of the SONET interface. But, it hampers transparency. It is clear that truly transparent and open photonic networks can only be built with transparent signaling support. The MPLS control plane architecture suggested can be extended beyond simple bandwidth provisioning to include optical performance monitoring. 6. Fault restoration in Optical networks Telecom networks have traditionally been designed with rapid fault detection, rapid fault isolation and recovery. With the introduction of IP and WDM in these networks, these features need to be provided in the IP and WDM layers also. Automated establishment and restoration of end-to-end paths in such networks requires standardized signaling, routing, and restoration mechanisms. Survivability techniques are being made available at multiple layers in the network. Each layer has certain recovery features and one needs to understand the impact of interaction between these layers. The central idea is that the lower layers can provide fast protection while the higher layers can provide intelligent restoration. It is desirable to avoid too many layers with functional overlaps. The IP over MPLS scheme can provide a smooth mapping of IP into WDM layer, thus bringing about a integrated protection/restoration capability, which is coordinated at both the layers. 6.1 Layering Many Authors Informational - Expires September 2001 Page 33 of 53 IP over Optical Networks: Summary of Issues March 2001 Clearly the layering and architecture for service restoration is a major component for IP to optical internetworking. This section summarizes some schemes, which aid in optical protection at the lower layers, SONET and Optical. 6.1.1 SONET Layer Protection The SONET standards specify an end-to-end two-way availability objective of 99.98% for inter office applications (0.02% unavailability or 105 minutes/year maximum down time) and 99.99 % for loop transport between the central office and the customer's premises. To conform to these standards, failure/restoration times have to be short. For both, point-to-point and ring systems, automatic protection switching (APS) is used, the network performs failure restoration in tens of milliseconds (approximately 50 milliseconds). Architectures composed of SONET add-drop multiplexers (ADMs) interconnected in a ring provide a method of APS that allows facilities to be shared while protecting traffic within an acceptable restoration time. There are 2 possible ring architectures: * UPSR: Unidirectional path switched ring architecture is a 1+1 single-ended, unidirectional, SONET path layer dedicated protection architecture. The nodes are connected in a ring configuration with one fiber pair connecting adjacent nodes. One fiber on a link is used as the working and other is protection. They operate in opposite directions. So there is a working ring in one direction and a protection ring in the opposite direction. The optical signal is sent on both outgoing fibers. The receiver compares the 2 signals and selects the better of the two based on signal quality. This transmission on both fibers is called 1+1 protection. * BLSR: In bi-directional line switched ring architecture, a bi- directional connection between 2 nodes traverses the same intermediate nodes and links in opposite directions. In contrast to the UPSR, where the protection capacity is dedicated, the BLSR shares protection capacity among all spans on the ring. They are also called Shared Protection ring (SPRing) architectures. In BLSR architecture, switching is coordinated by the nodes on either side of a failure in the ring, so that a signaling protocol is required to perform a line switch and to restore the network. These architectures are more difficult to operate than UPSRs where no signaling is required. The disadvantage of the SONET layer is that it is usually restricted to ring type architectures. These are extremely bandwidth inefficient. The bandwidth along each segment of the ring ahs to be equal to the bandwidth of the busiest segment. It does not incorporate traffic priorities. It cannot detect higher layer errors. Many Authors Informational - Expires September 2001 Page 34 of 53 IP over Optical Networks: Summary of Issues March 2001 6.1.2 Optical Layer Protection The concept of SONET ring architectures can be extended to WDM self- healing optical rings (SHRs). As in SONET, WDM SHRs can be either path switched or line switched. In recent testbed experiments, lithium niobate protection switches have been used to achieve 10- microsecond restoration times in WDM Shared protection Rings. Multi-wavelength systems add extra complexity to the restoration problem. Under these circumstances, simple ring architecture may not suffice. Hence, arbitrary mesh architectures become important. Usually, for such architectures, restoration is usually performed after evaluation at the higher layer. But this takes a lot of time. 6.1.2.1 Point-to-Point Mechanisms In case of point to point, one can provide 1+1, 1:1 or 1:N protection. In 1+1, the same information is sent through 2 paths and the better one is selected at the receiver. The receiver makes a blind switch when the selected (working) path's signal is poor. Unlike SONET, a continuous comparison of 2 signals is not done in the optical layer. In 1:1 protection, signal is sent only on the working path while a protection path is also set but it can be used for lower priority signals that are preempted if the working path fails. A signaling channel is required to inform the transmitter to switch path if the receiever detects a failure in the working path. A generalization of 1:1 protection is 1:N protection in which one protection fiber is shared among N working fibers. It is usually applied for equipment protection [JOHNSON99]. 6.1.2.2 Ring systems [MANCHESTER99] Ring mechanisms are broadly classified into: Dedicated linear protection and Shared protection rings. Dedicated linear protection is an extension of 1+1 protection applied to a ring. It is effectively a path protection mechanism. Entire path from source to the destination node is protected. Since each channel constitutes a separate path, it is also called Optical Channel Subnetwork Connection Protection (OCh-SNCP). From each node, the working and protection signals are transmitted in opposite directions along the 2 fibers. At the receiving end, if the working path signal is weak, the receiver switches to the protection path signal. Bidirectional traffic between two nodes, travels along the same direction of the ring. The ring through put is restricted to that of a single fiber. This is usually applied to hubbed transport scenarios, near access rings. For other types of connections, it is very expensive [GERSTEL00]. Shared protection rings (SPRings) protect a link rather than a path. This is conceptually similar to the SONET BLSR architecture. Bidirectional traffic between 2 nodes travels along opposite directions and between the same intermediate nodes. The wavelength used in one part of the network can be re-used in another non- Many Authors Informational - Expires September 2001 Page 35 of 53 IP over Optical Networks: Summary of Issues March 2001 overlapping part of the ring also. Thus this permits reusing of wavelengths. Moreover, unless there is a fault, only half the capacity is used at any time. So the protection bandwidth can be used by a some other traffic. These are also easier to setup and are the more common ring protection mechanisms. In a 2-fiber SPRings case with two counter-rotating rings, half the wavelengths in each fiber are reserved for protection. If a link failure occurs, the OADM adjacent to the link failure bridges its outgoing channels in a direction opposite to that of the failure and selects its incoming working channels from the incoming protection channels in the direction away from the failure. This is called ring switching. In a 4-fiber SPRing, two fibers each are allocated for working and protection. The operation is similar to that of the 2-fiber SPRing. However, this system can allow span switching in addition to ring switching. Span switching means that if only the working fiber in a link fails, the traffic can use the protection fiber in the same span. In case of 2-fiber systems, it will have to take the longer path around the ring. The 2 fiber and 4 fiber SPRing architectures have signaling complexities associated with them, because these rings perform switching at intermediate nodes. Sometimes the need arises to protect against isolated optoelectronic failures that will affect only a single optical channel at a time. Thus, we need a protection architecture that performs channel level switching based on channel level indications. The Optical Multiplexed Section (OMS) SPRings, discussed so far, switch a group of channels within the fiber. The Optical Channel (OCh) SPRings are capable of protecting OChs independent of one another based on OCh level failure indication. An N-Channel OADM based 4-fiber ring can support upto N independent OCh SPRings. SPRing architectures are referred to as Bidirectional line switched ring (BLSR) architectures. OCh SPRings are referred to as Bidirectional Wavelength Line Switched Ring technology, (BWLSR). ITU-T draft recommendation G.872 describes a transoceanic switching protocol for 4-fiber OMS SPRings. This protocols requires that after a span switching a path should not traverse any span more than once. When ring switching occurs, this may not be true. This protocol is essential in long-distance undersea transmissions to avoid unnecessary delay. 6.1.2.3 Mesh Architectures Along a single fiber, any two connections cannot use the same wavelength. The whole problem of routing in a WDM network with proper allocation of a minimum number of wavelengths is called the routing and wavelength assignment (RWA) problem. It is found that in arbitrary mesh architectures, where the connectivity of each node is Many Authors Informational - Expires September 2001 Page 36 of 53 IP over Optical Networks: Summary of Issues March 2001 high, the number of wavelengths required greatly decreases. This is the advantage of having a mesh architecture. Moreover addition of new nodes and removing existing nodes becomes very easy. However, with mesh architectures, finding an alternate path every time a failure occurs would be a time consuming process. Hence, an automatic protection switching mechanism, like that for the rings, is required. Three alternatives are briefly discussed here: Ring Covers The whole mesh configuration is divided into smaller cycles in such a way that each edge comes under atleast one cycle. Along each cycle, a protection fiber is laid. It may so happen that certain edges come under more than one cycle. In these edges, more than one protection fiber will have to be laid. Hence, the idea is to divide the graph into cycles in such a way that this redundancy is minimized [WU]. However, in most cases the redundancy required is more than 100%. Protection Cycles [ELLINAS] This method reduces the redundancy to exactly 100%. The networks considered have a pair of bi-directional working and protection fibers. Fault protection against link failures is possible in all networks that are modeled by 2-edge connected digraphs. The idea is to find a family of directed cycles so that all protection fibers are used exactly once and in any directed cycle a pair of protection fibers is not used in both directions unless they belong to a bridge. For planar graphs, such directed cycles are along the faces of the graph. For non-planar graphs, the directed cycles are taken along the orientable cycle double covers, which are conjectured to exist for every digraph. Heuristic algorithms exist for obtaining cyclic double covers for every non-planar graph. Thus, the main advantage of optical layer mechanisms is the fast restoration. It also has the capacity of large switching granularity in the sense that it can restore a large number of higher layer flows by a single switching. The disadvantage is that it cannot carry traffic engineering capabilities. It can only operate at the lightpath level and cannot differentiate between different data types. Also the switching speed comes into play only if all the nodes which can detect a fault have switching capabilities. Building such an architecture is extremely expensive. 6.1.3 IP Layer Protection The IP layer plays a major role in the IP network infrastructure. There are some advantages of having survivability mechanism in this layer. It can find optimal routes in the system. It provides a finer Many Authors Informational - Expires September 2001 Page 37 of 53 IP over Optical Networks: Summary of Issues March 2001 granularity at which protection can be done, enabling the system to have priorities. It also possesses load balancing capabilities. However the recovery operations are very slow. It also cannot detect physical layer faults. 6.1.4 MPLS Layer Protection The rerouting capability of the optical layer can be expanded and newer bandwidth efficient protection can be facilitated if there is some controlled coordination between the optical layer and a higher layer that has a signaling mechanism. Similarly, the optical layer which cannot detect faults in the router or switching node, could learn of the faults if the higher layer communicated this to it. Then, the optical layer can initiate protection at the lower layer. Fast signaling is the main advantage of the MPLS layer in protection. Since MPLS binds packets to a route (or path) via the labels, it is imperative that MPLS be able to provide protection and restoration of traffic. In fact, a protection priority could be used as a differentiating mechanism for premium services that require high reliability. The MPLs layer has visibility into the lower layer. The lower layer can inform this layer about faults by a liveness message, basically signaling. When we talk of the IP/MPLS over WDM architecture, we may seal off SONET APS protection from the discussion and the WDM optical layer can provide the same kind of restoration capabilities at the lower layer. Thus there has to be interaction only between the MPLS and optical layer and not with the SONET layer. The following sections present a summary of techniques being proposed for implementing survivability in the MPLS layer. These include signaling requirements, architectural considerations and timing considerations. 6.2 Failure detection [OWENS00] Loss of Signal (LOS) is a lower layer impairment that arises when a signal is not detected at an interface, for example, a SONET LOS. In this case, enough time should be provided for the lower layer to detect LOS and take corrective action. A Link Failure (LF) is declared when the link probing mechanism fails. An example of a probing mechanism is the Liveness message that is exchanged periodically along the working path between peer LSRs. A LF is detected when a certain number k of consecutive Liveness messages are either not received from a peer LSR or are received in error. Many Authors Informational - Expires September 2001 Page 38 of 53 IP over Optical Networks: Summary of Issues March 2001 A Loss of Packets (LOP) occurs when there is excessive discarding of packets at an LSR interface, either due to label mismatches or due to time-to-live (TTL) errors. LOP due to label mismatch may be detected simply by counting the number of packets dropped at an interface because an incoming label did not match any label in the forwarding table. Likewise, LOP due to invalid TTL may be detected by counting the number of packets that were dropped at an interface because the TTL decrements to zero. 6.3 Failure Notification [OWENS00] Protection switching relies on rapid notification of failures. Once a failure is detected, the node that detected the failure must send out a notification of the failure by transmitting a failure indication signal (FIS) to those of its upstream LSRs that were sending traffic on the working path that is affected by the failure. This notification is relayed hop-by-hop by each subsequent LSR to its upstream neighbor, until it eventually reaches a PSL. The PSL is the LSR that originates both the working and protection paths, and the LSR that is the termination point of both the FIS and the failure recovery signal (FRS). Note that the PSL need not be the origin of the working LSP. The PML is the LSR that terminates both the working path and its corresponding protection path. Depending on whether or not the PML is a destination, it may either pass the traffic on to the higher layers or may merge the incoming traffic on to a single outgoing LSR. Thus, the PML need not be the destination of the working LSP. An LSR that is neither a PSL nor a PML is called an intermediate LSR. The intermediate LSR could be either on the working or the protection path, and could be a merging LSR (without being a PML). 6.3.1 Reverse Notification Tree (RNT) Since the LSPs are unidirectional entities and protection requires the notification of failures, the failure indication and the failure recovery notification both need to travel along a reverse path of the working path from the point of failure back to the PSL(s). When label merging occurs, the working paths converge to form a multipoint-to-point tree, with the PSLs as the leaves and the PML as the root. The reverse notification tree is a point-multipoint tree rooted at the PML along which the FIS and the FRS travel, and which is an exact mirror image of the converged working paths. The establishment of the protection path requires identification of the working path, and hence the protection domain. In most cases, the working path and its corresponding protection path would be specified via administrative configuration, and would be established between the two nodes at the boundaries of the protection domain (the PSL and PML) via explicit (or source) routing using LDP, RSVP, signaling (alternatively, using manual configuration). Many Authors Informational - Expires September 2001 Page 39 of 53 IP over Optical Networks: Summary of Issues March 2001 The RNT is used for propagating the FIS and the FRS, and can be created very easily by a simple extension to the LSP setup process. During the establishment of the working path, the signaling message carries with it the identity (address) of the upstream node that sent it. Each LSR along the path simply remembers the identity of its immediately prior upstream neighbor on each incoming link. The node then creates an inverse crossconnect table that for each protected outgoing LSP maintains a list of the incoming LSPs that merge into that outgoing LSP, together with the identity of the upstream node that each incoming LSP comes from. Upon receiving an FIS, an LSR extracts the labels contained in it (which are the labels of the protected LSPs that use the outgoing link that the FIS was received on) consults its inverse crossconnect table to determine the identity of the upstream nodes that the protected LSPs come from, and creates and transmits an FIS to each of them. 6.4 Protection options [SHARMA00] When using the MPLS layer for providing survivability, we can have different options, just like in any other layer. Each has its own advantages depending on requirements. 6.4.1 Dynamic Protection These protection mechanisms dynamically create protection paths for restoring traffic, based upon failure information, bandwidth allocation and optimized reroute assignment. Thus, upon detecting failure, the LSPs crossing a failed link or LSR are broken at the point of failure and reestablished using signaling. These methods may increase resource utilization because capacity or bandwidth is not reserved beforehand and because it is available for use by other (possibly lower priority) traffic, when the protection path does not require this capacity. They may, however, require longer restoration times, since it is difficult to instantaneously switch over to a protection entity, following the detection of a failure. 6.4.2 Pre-negotiated Protection These are dedicated protection mechanisms, where for each working path there exists a pre-established protection path, which is node and link disjoint with the primary/working path, but may merge with other working paths that are disjoint with the primary. The resources (bandwidth, buffers, processing) on the backup entity may be either pre-determined and reserved beforehand (and unused), or may be allocated dynamically by displacing lower priority traffic that was allowed to use them in the absence of a failure on the working path. 6.4.3 End-to-end Repair Many Authors Informational - Expires September 2001 Page 40 of 53 IP over Optical Networks: Summary of Issues March 2001 In end-to-end repair, upon detection of a failure on the primary path, an alternate or backup path is re-established starting at the source. Thus, protection is always activated on an end-to-end basis, irrespective of where along a working path a failure occurs. This method might be slower than the local repair method discussed below, since the failure information has to propagate all the way back to the source before a protection switch is accomplished. 6.4.4 Local Repair In local repair, upon detecting a failure on the primary path, an alternate path is re-established starting from the point of failure. Thus protection is activated by each LSR along the path in a distributed fashion on an as-needed basis. While this method has an advantage in terms of the time taken to react to a fault, it introduces the complication that every LSR along a working path may now have to function as a protection switch LSR (PSL). 6.4.5 Link Protection The intent is to protect against a single link failure. For example, the protection path may be configured to route around certain links deemed to be potentially risky. If static configuration is used, several protection paths may be pre- configured, depending on the specific link failure that each protects against. Alternatively, if dynamic configuration is used, upon the occurrence of a failure on the working path, the protection path is rebuilt such that it detours around the failed link. 6.4.6 Path Protection The intention is to protect against any link or node failure on the entire working path. This has the advantage of protecting against multiple simultaneous failures on the working path, and possibly being more bandwidth efficient than link protection. 6.4.7 Revertive Mode In the revertive mode of operation, the traffic is automatically restored to the working path once repairs have been affected, and the PSL(s) are informed that the working path is up. This is useful, since once traffic is switched to the protection path it is, in general, unprotected. Thus, revertive switching ensures that the traffic remains unprotected only for the shortest amount of time. This could have the disadvantage, however, of producing oscillation of traffic in the network, by altering link loads. 6.4.8 Non-revertive Mode In the non-revertive mode of operation, traffic once switched to the protection path is not automatically restored to the working path, even if the working path is repaired. Thus, some form of administrative intervention is needed to invoke the restoration Many Authors Informational - Expires September 2001 Page 41 of 53 IP over Optical Networks: Summary of Issues March 2001 action. The advantage is that only one protection switch is needed per working path. A disadvantage is that the protection path remains unprotected until administrative action (or manual reconfiguration) is taken to either restore the traffic back to the working path or to configure a backup path for the protection path. 6.4.9 1+1 Protection In 1+1 protection, the resources (bandwidth, buffers, processing capacity) on the backup path are fully reserved to carry only working traffic. This bandwidth is used to transmit an exact copy of the working traffic, with a selection between the traffic on the working and protection paths being made at the protection merge LSR (PML). 6.4.10 1:1, 1:n, and n:m Protection In 1:1 protection, the resources (bandwidth, buffers, and processing capacity) allocated on the protection path are fully available to preemptable low priority traffic when the protection path is not in use by the working traffic. In other words, in 1:1 protection, the working traffic normally travels only on the working path, and is switched to the protection path only when the working entity is unavailable. Once the protection switch is initiated, all the low priority traffic being carried on the protection path is discarded to free resources for the working traffic. This method affords a way to make efficient use of the backup path, since resources on the protection path are not locked and can be used by other traffic when the backup path is not being used to carry working traffic. Similarly, in 1:n protection, up to n working paths are protected using only one backup path, while in m:n protection, up to n working paths are protected using up to m backup paths. 6.4.11 Recovery Granularity Another dimension of recovery considers the amount of traffic requiring protection. This may range from a fraction of a path to a bundle of paths. 6.4.11.1 Selective Traffic Recovery This option allows for the protection of a fraction of traffic within the same path. The portion of the traffic on an individual path that requires protection is called a protected traffic portion (PTP). A single path may carry different classes of traffic, with different protection requirements. The protected portion of this traffic may be identified by its class, as for example, via the EXP bits in the MPLS shim header or via the cell loss priority (CLP) bit in the ATM header. 6.4.11.2 Bundling Many Authors Informational - Expires September 2001 Page 42 of 53 IP over Optical Networks: Summary of Issues March 2001 Bundling is a technique used to group multiple working paths together in order to recover them simultaneously. The logical bundling of multiple working paths requiring protection, each of which is routed identically between a PSL and a PML, is called a protected path group (PPG). When a fault occurs on the working path carrying the PPG, the PPG as a whole can be protected either by being switched to a bypass tunnel or by being switched to a recovery path. 6.5 Signaling Requirements related to restoration [SAHA00] Signaling mechanisms for optical networks should be tailored to the needs of optical networking. Some signaling requirements directed towards restoration in optical networks are: 1. Signaling mechanisms should minimize the need for manual configuration of relevant information, such as local topology. 2. Lightpaths are fixed bandwidth pipes. There is no need to convey complex traffic characterization or other QoS parameters in signaling messages. On the other hand, new service related parameters such as restoration priority, protection scheme desired, etc., may have to be conveyed. 3. Signaling for path establishment should be quick and reliable. It is especially important to minimize signaling delays during restoration. 4. Lightpaths are typically bi-directional. Both directions of the path should generally be established along the same physical route. 5. OXCs are subject to high reliability requirements. A transient failure that does not affect the data plane of the established paths should not result in these paths being torn down. 6. Restoration schemes in mesh networks rely on sharing backup path among many primary paths. Signaling protocols should support this feature. 7. The interaction between path establishment signaling and automatic protection schemes should be well defined to avoid false restoration attempts during path set-up or tear down. 6.6 Pre-computed, Priority-Based Restoration The previous sections have discussed so far, the different requirements for restoration in optical networks and has seen a number of methods possible. This section tries to summarize that and brings together the best of the options. Many Authors Informational - Expires September 2001 Page 43 of 53 IP over Optical Networks: Summary of Issues March 2001 A simple restoration strategy is possible for rings. But the mesh architectures promise flexible use of bandwidth. Hence the goal is to find a solution to provide fast alternate paths in a mesh based optical network. The optical network will be surrounded by edge switches, which are the entry and exit points for wavelength paths. Hence, these edge switches will compute the path through the optical network from source to destination. They shall also have the task of having an alternate path ready, incase of faults in the network. Each of the switches inside the network are called core switches. In case of a fault, these switches should propagate the information back to the entry switch. If the edge switch tries to obtain an alternate path on the spur of the moment, it will be time consuming. Hence a pre-computation strategy would work better. Link based restoration methods re-route disrupted traffic around the failed link. This mechanism saves some signaling time, but it requires alternate paths from each node. Computation is tougher. Also restoration would be tougher in case of a node failure. So a path based re-routing is sought, which replaces the whole path between two end points. The selection of the protection path should be such that, the links along working and protection path should be mutually exclusive. Also, in case of any single failure, the total bandwidth on any of the diverted links should not exceed its capacity. Algorithms for alternate path finding are discussed in [Bell-Labs]. The next thing is to incorporate priority inside the procedure. When an edge swich gets a request to route a traffic through the optical network, it will include priority information. Let these be categorized into 3 levels, 1, 2 and 3 from highest to lowest. For traffic no. 1, the switch will compute 2 paths. Also, if the protection path is not found, it will preempt a lower priority traffic and establish 2 paths during the creation phase itself. In other words, this would be a 1+1 style protection. For traffic no.2, a working path will be established. The protection path will be pre-computed, but need not necessarily be available in terms of bandwidth or wavelength at the time of creation. All the switches along the path would be pre-configured with the information. In case of failure, the lower priority path along those switches would be preempted and the traffic no. 2 would be restored. If this preemption capacity is built into the switches itself, that would be the fastest and at the optical layer itself. Otherwise, some time is lost in signaling. But still, this can meet the 50mS requirement set by SONET. Many Authors Informational - Expires September 2001 Page 44 of 53 IP over Optical Networks: Summary of Issues March 2001 Traffic no.3 has the lowest priority. It has no requested back up paths. It is set up along the backup paths of the existing traffic 2 working paths, unless extra bandwidth is available. Thus bandwidth is used efficiently, in providing restoration and classes are considered in the above mechanism. Other protection priorities like longer protection paths and shorter paths can also be taken into account while setting up the paths. Also, given a steady traffic flow, with no new paths being created, algorithms to optimize the paths selected would enhance the performance of the network. The next thing required is the signaling messages to set up these paths and release them. [Hahm00] 6.7 RSVP-TE/CR-LDP Support for Restoration [BALA00] Special requirements for protecting and restoring lightpaths and the extensions to RSVP-TE and CR-LDP have been identified. Some of the proposed extensions are as follows: a. A new SESSION_ATTRIBUTE object has been proposed, which indicates whether the path is unidirectional/bi-directional, primary/backup. Local protection 1+1 or 1:N can also be specified. b. Setup Priority: The priority of the session with respect to taking resources. The Setup Priority is used in deciding whether this session can preempt another session. c. Holding Priority: The priority of the session with respect to holding resources. Holding Priority is used in deciding whether this session can be preempted by another session. Note that for the shared backup paths the crossconnects can not be setup during the signaling for the backup path since multiple backup paths may share the same resource and can over-subscribe it. The idea behind shared backups is to make soft reservations and to claim the resource only when it is required. 7. Security Considerations This document raises no new security issues for MPL(ambda) Switching implementation over optical networks. Security considerations are for future study. 8. Acronyms 3R - Regeneration with Retiming and Reshaping AIS - Alarm Indication Signal Many Authors Informational - Expires September 2001 Page 45 of 53 IP over Optical Networks: Summary of Issues March 2001 APS - Automatic Protection Switching BER - Bit Error Rate BGP - Border Gateway Protocol BLSR _ Bi-directional Line-Switched Ring CR-LPD - Constraint-Based Routing LDP CSPF - Constraint Shortest Path First FA - Forwarding Adjacency FA-LSP _ Forwarding Adjacency Label Switched Path FA-TDM _ Time Division Multiplexing capable Forwarding Adjacency FA-LSC _ Lambda Switch Capable Forwarding Adjacency FA-PSC _ Packet Switch Capable Forwarding Adjacency FA-FSC _ Fiber Switch Capable Forwarding Adjacency FEC - Forwarding Equivalence Class FIS - Failure Indication Signal FRS - Failure Recovery Signal GSMP - General Switch Management Protocol IGP - Interior Gateway Protocol IS-IS _ Intermediate System to Intermediate System Protocol ITU-T _ International Telecommunications Union _ Telecommunications Sector LDP - Label Distribution Protocol LF - Link Failure LMP - Link Management Protocol LMT - Link Media Type LOL - Loss of Light LOP - Loss of Packets LOS - Loss Of Signal LP - Lightpath LSA - Link State Advertisement LSC - Lambda Switch Capable LSP - Label Switched Path LSR - Label Switched Router MPLS - Multi-Protocol Lambda Switching MTG - MPLS Traffic Group NBMA - Non-Broadcast Multi-Access NHRP - Next Hop Resolution Protocol OCT - Optical Channel Trail OLXC - Optical layer crossconnect OMS - Optical Multiplex Section OPM - Optical Performance Monitoring OSPF - Open Shortest Path First OTN - Optical Transport Network OTS - Optical Transmission Section OXC - Optical Crossconnect PML - Protection Merge LSR PMTG - Protected MPLS Traffic Group PMTP - Protected MPLS Traffic Portion PPG - Protected Path Group PSC - Packet Switch Capable PSL - Protection Switch LSR PTP - Protected Traffic Portion PVC - Permanent Virtual Circuit PXC - Photonic Crossconnect Many Authors Informational - Expires September 2001 Page 46 of 53 IP over Optical Networks: Summary of Issues March 2001 QoS - Quality of Service RNT - Reverse Notification Tree RSVP - Resource reSerVation Protocol RSVP-TE - Resource reSerVation Protocol with Traffic Engineering SHR - Self-healing Ring SPRing - Shared Protection ring SRLG _ Shared Risk Link Group TDM - Time Division Multiplexing TE - Traffic Engineering TLV - Type Length Value TTL - Time to Live UNI - User to Network Interface UPSR _ Unidirectional Path-Switched Ring VC - Virtual Circuit WDM _ Wavelength Division Multiplexing 9. Terminology Channel: A channel is a unidirectional optical tributary connecting two OLXCs. Multiple channels are multiplexed optically at the WDM system. One direction of an OC-48/192 connecting two immediately neighboring OLXCs is an example of a channel. A channel can generally be associated with a specific wavelength in the WDM system. A single wavelength may transport multiple channels multiplexed in the time domain. Downstream node: In a unidirectional lightpath, this is the next node closer to destination. Failure Indication Signal: A signal that indicates that a failure has been detected at a peer LSR. It consists of a sequence of failure indication packets transmitted by a downstream LSR to an upstream LSR repeatedly. It is relayed by each intermediate LSR to its upstream neighbor, until it reaches an LSR that is setup to perform a protection switch. Failure Recovery Signal: A signal that indicates that a failure along the path of an LSP has been repaired. It consists of a sequence of recovery indication packets that are transmitted by a downstream LSR to its upstream LSR, repeatedly. Again, like the failure indication signal, it is relayed by each intermediate LSR to its upstream neighbor, until is reaches the LSR that performed the original protection switch. First-hop router: The first router within the domain of concern along the lightpath route. If the source is a router in the network, it is also its own first-hop router. Many Authors Informational - Expires September 2001 Page 47 of 53 IP over Optical Networks: Summary of Issues March 2001 Intermediate LSR: LSR on the working or protection path that is neither a PSL nor a PML. Last-hop router: The last router within the domain of concern along the lightpath route. If the destination is a router in the network, it is also its own last-hop router. Lightpath: This denotes an Optical Channel Trail in the context of this document. See "Optical Channel Trail" later in this section. Link Failure: A link failure is defined as the failure of the link probing mechanism, and is indicative of the failure of either the underlying physical link between adjacent LSRs or a neighbor LSR itself. (In case of a bi-directional link implemented as two unidirectional links, it could mean that either one or both unidirectional links are damaged.) Liveness Message: A message exchanged periodically between two adjacent LSRs that serves as a link probing mechanism. It provides an integrity check of the forward and the backward directions of the link between the two LSRs as well as a check of neighbor aliveness. Loss of Signal: A lower layer impairment that occurs when a signal is not detected at an interface. This may be communicated to the MPLS layer by the lower layer. Loss of Packet: An MPLS layer impairment that is local to the LSR and consists of excessive discarding of packets at an interface, either due to label mismatch or due to TTL errors. Working or Active LSP established to carry traffic from a source LSR to a destination LSR under normal conditions, that is, in the absence of failures. In other words, a working LSP is an LSP that contains streams that require protection. MPLS Traffic Group: A logical bundling of multiple, working LSPs, each of which is routed identically between a PSL and a PML. Thus, each LSP in a traffic group shares the same redundant routing between the PSL and the PML. MPLS Protection Domain: The set of LSRs over which a working path and its corresponding protection path are routed. The protection domain is denoted as: (working path, protection path). Non-revertive: Many Authors Informational - Expires September 2001 Page 48 of 53 IP over Optical Networks: Summary of Issues March 2001 A switching option in which streams are not automatically switched back from a protection path to its corresponding working path upon the restoration of the working path to a fault-free condition. Opaque: Used to denote a bearer channel characteristic where it is capable of being terminated. Optical Channel Trail: The elementary abstraction of optical layer connectivity between two end points is a unidirectional Optical Channel Trail. An Optical Channel Trail is a fixed bandwidth connection between two network elements established via the OLXCs. A bi-directional Optical Channel Trail consists of two associated Optical Channel Trails in opposite directions routed over the same set of nodes. Optical layer crossconnect (OLXC): A switching element which connects an optical channel from an input port to an output port. The switching fabric in an OLXC may be either electronic or optical. Protected MPLS Traffic Group (PMTG): An MPLS traffic group that requires protection. Protected MPLS Traffic Portion: The portion of the traffic on an individual LSP that requires protection. A single LSP may carry different classes of traffic, with different protection requirements. The protected portion of this traffic may be identified by its class, as for example, via the EXP bits in the MPLS shim header or via the priority bit in the ATM header. Protection Merge LSR: LSR that terminates both a working path and its corresponding protection path, and either merges their traffic into a single outgoing LSP, or, if it is itself the destination, passes the traffic on to the higher layer protocols. Protection Switch LSR: LSR that is the origin of both the working path and its corresponding protection path. Upon learning of a failure, either via the FIS or via its own detection mechanism, the protection switch LSR switches protected traffic from the working path to the corresponding backup path. Protection or Backup LSP (or Protection or Backup Path): A LSP established to carry the traffic of a working path (or paths) following a failure on the working path (or on one of the working paths, if more than one) and a subsequent protection switch by the PSL. A protection LSP may protect either a segment of a working LSP (or a segment of a PMTG) or an entire working LSP (or PMTG). A protection path is denoted by the sequence of LSRs that it traverses. Many Authors Informational - Expires September 2001 Page 49 of 53 IP over Optical Networks: Summary of Issues March 2001 Reverse Notification Tree: A point-to-multipoint tree that is rooted at a PML and follows the exact reverse path of the multipoint-to-point tree formed by merging of working paths (due to label merging). The reverse notification tree allows the FIS to travel along its branches towards the PSLs, which perform the protection switch. Revertive: A switching option in which streams are automatically switched back from the protection path to the working path upon the restoration of the working path to a fault-free condition. Soft state: It has an associated time-to-live, and expires and may be discarded once that time is passed. To avoid expiration the state should be periodically refreshed. To reduce the overhead of the state maintenance, the expiration period may be increased exponentially over time to a predefined maximum. This way the longer a state has survived the fewer the number of refresh messages that are required. Traffic Trunk: An abstraction of traffic flow that follows the same path between two access points which allows some characteristics and attributes of the traffic to be parameterized. Upstream node: In a unidirectional lightpath, this is the node closer to the source. Working or Active Path: The portion of a working LSP that requires protection. (A working path can be a segment of an LSP (or a segment of a PMTG) or a complete LSP (or PMTG).) The working path is denoted by the sequence of LSRs that it tranverses. 10. References [Awuduche] D. Awduche, Y. Rekhter, J. Drake, R. Coltun, "Multi- Protocol Lambda Switching: Combining MPLS Traffic Engineering Control With Optical Crossconnects," Internet Draft draft-awduche- mpls-te-optical-02.txt, Work in Progress, July 2000. [BALA00] Bala rajagopalan, D.Saha, B.tang, _RSVP extensions for signaling optical paths," Internet Draft draft-saha-rsvp-optical- signalling-00.txt, Work in Progress, September 2000. [Bell-Labs] B. Doshi, S. Dravida, P. Harshavardhana, et. al,"Optical Network Design and Restoration," Bell Labs Technical Journal, Jan- March, 1999. Many Authors Informational - Expires September 2001 Page 50 of 53 IP over Optical Networks: Summary of Issues March 2001 [CRLDP] B. Jamoussi, et. al. "Constraint-Based LSP Setup using LDP," Internet Draft draft-ietf-mpls-cr-ldp-04.txt, Work in Progress, July 2000. [ELLINAS] G. N. Ellinas, "Fault Restoration in Optical Networks: General Methodology and Implementation," PhD thesis, Columbia University. [GERSTEL00] Gerstel and R. Ramaswami, "Optical layer survivability: A Services Perspective," IEEE Communications, March 2000, pp.104 _ 113. [GHANI01] N.Ghani et al.,"Architectural Framework for automatic protection provisioning in dynamic optical rings," Internet draft, draft-ghani-optical-rings-00.txt, Work in Progress, January 2000. [GMPLS00] P. Ashwood-Smith et al., "Generalized MPLS - Signaling Functional Description," Internet Draft draft-ietf-mpls-generalized- mpls-signaling-01.txt, Work in progress, November 2000. [GMPLS-CONTROL] Y. Xu et al, "GMPLS Control Plane Architecture for Automatic Switched Transport Network," Nov 2000 [GSMP] A. Doria, et. al. "General Switch Management Protocol V3,"Internet Draft draft-ietf-gsmp-08.txt, Work in Progress, November 2000. [HAHM00] Jin Ho hahm, K.Lee, "Bandwidth provisioning and restoration mechanism in Optical networks", Internet draft, draft-hahm-optical- restoration-01.txt, Work in Progress, December 2000. [ISIS] ISO 10589, "Intermediate System to Intermediate System Intra- Domain Routing Exchange Protocol for use in Conjunction with the Protocol for Providing the Connectionless-mode Network Service." [ISISTE] Henk Smit, Tony Li, "IS-IS extensions for Traffic Engineering," Internet Draft, draft-ietf-isis-traffic-02.txt, work in progress, March 2000. [Johnson99] D. Johnson, N. Hayman and P. Veitch, "The Evolution of a Reliable Transport Network," IEEE Communications , August 1999, pp. 52-57. [Kompella00-b] Kompella, K., Rekhter, Y., "Link Bundling in MPLS Traffic Engineering," draft-kompella-mpls-bundle-04.txt, Work in Progress, November 2000. [Lang00] J.P. Lang, "Link Management Protocol (LMP)," Internet Draft draft-lang-mpls-lmp-02.txt, Work in Progress, July 2000. [Luciani00] J. Luciani, B. Rajagopalan, D. Awuduche, B. Cain, Bilel Jamoussi, Debanjan Saha, "IP Over Optical Networks - A Many Authors Informational - Expires September 2001 Page 51 of 53 IP over Optical Networks: Summary of Issues March 2001 Framework," Internet Draft draft-many-ip-optical-framework-01.txt, Work in Progress, November 2000. [MANCHESTER99] J. Manchester, P. Bonenfant and C. Newton, "The Evolution of Transport Network Survivability," IEEE Communications, August 1999, pp. 44-51. [NHRP] Luciani, et. al. "NBMA Next Hop Resolution Protocol (NHRP)," RFC 2332, April 1998. [ODSI00] G.Bernstein et. al., "Optical Domain Service Interconnect (ODSI) Functional Specification," ODSI Coalition, April 2000. [OSPF] Moy, J., _"OSPF Version 2," RFC 1583, March 1994 [OWENS00] Ken Owens, Srinivas Makam, Vishal Sharma, Ben Mack-Crane, Changcheng Huan, "A Path Protection/Restoration mechanism for MPLS networks," Internet Draft draft-chang-mpls-path-protection-02.txt, Work in progress, November 2000 [Pendarakis00] D. Pendarakis, B. Rajagopalan, D. Saha, "Routing Information Exchange in Optical Networks," Internet Draft draft-prs- optical-routing-01.txt, Work in progress, November 2000. [SAHA00] B. Rajagopalan, D.Saha, B. Tang, K. Bala , "Signaling framework for automated provisioning and restoration of paths in optical mesh networks," Internet Draft draft-rstb-optical-signaling- framework-01.txt [SCTP] R.R. Stewart et al., "Stream Control Transmission Protocol," RFC 2960, October 2000. [SHARMA00] Vishal Sharma et al. "Framework for MPLS-based recovery," Internet Draft draf-ietf-mpls-recovery-frmwrk-01.txt, Work in progress, November 2000 [Suurballe] J. Suurballe, "Disjoint Paths in a Network," Networks, vol. 4, 1974. [UNI00] O. S. Aboul-Magd et al., "Signaling Requirements at the Optical UNI," Internet Draft draft-bala-mpls-optical-uni-signaling- 01.txt, Work in Progress, November 2000. [WU] T.H. Wu, "A Passive Protected Self Healing Mesh Network Architecture and Applications," IEEE Transactions on Networking, Vol. 2, No. 1, February 1994. 11. Author's Addresses N. Chandhok, A. Durresi, R. Jagannathan, S. Seetharaman, K. vinodkrishnan Many Authors Informational - Expires September 2001 Page 52 of 53 IP over Optical Networks: Summary of Issues March 2001 Department of Computer and Information Science The Ohio State University 2015 Neil Avenue, Columbus, OH 43210-1277, USA Phone: (614)-292-3989 Email: {chandhok, durresi, rjaganna, seethara, vinodkri}@cis.ohio- state.edu Raj Jain Nayna Networks, Inc. 157 Topaz Street Milpitas, CA 95035 Phone: (408)-956-8000X309 Email: raj@nayna.com Full Copyright Statement "Copyright (C) The Internet Society (date). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implmentation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into. Many Authors Informational - Expires September 2001 Page 53 of 53