IPO Working Group D. Papadimitriou Document: draft-papadimitriou-optical-rings-02.txt Alcatel Category: Internet Draft Expires: May 2002 November 2001 Optical Rings and Hybrid Mesh-Ring Optical Networks draft-papadimitriou-optical-rings-02.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026 except that the right to produce derivative works is not granted. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Conventions used in this document: The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [1]. Abstract The scope of this draft is to specify the IP-based signaled protection mechanisms for optical rings and hybrid optical mesh-ring topologies. With the dynamic ring configuration process, we determine the information to be distributed to dynamically emulate optical rings on top of a meshed optical network topology. This information exchange further enables the specification of Optical Ring Traffic Engineering. Within the IP Control-based signaling plane, we also specify the mechanisms to provide dynamic and fast-protection Papadimitriou D. - Internet Draft - Expires May 2002 1 draft-papadimitriou-optical-rings-02.txt November 2001 switching, and distributed LSP route computation on top of ring-based and hybrid mesh-rings optical networks. 1. Introduction The concept of optical ring emulation applies when considering the ring configuration on top of optical mesh topology including Optical Cross-Connects (OXC) and not only Optical Add-Drop-Multiplexers (O- ADM). Compared to the approach proposed in [IPO-RFR] and developed in [IPO-OMR], emulated optical rings add configuration flexibility when considering optical network protection. The mechanisms developed here are quite general and enable the deployment of hybrid mesh-rings optical network topologies. It also provides a clear separation between the dynamic ring configuration and the dynamic ring resource allocation. This allows a greater ring resource management flexibility that fits more suitably the bandwidth on demand requirements for optical networks. The complexity of ring emulation arises when defining several rings on top of a mesh topology including Optical Cross-Connects (OXC) connected through fiber trunks. This because by configuring several optical rings on top of a meshed topology, a ring cover is defined. Consequently, the shared protection of some parts of ring - specifically the links and the nodes - with other contiguous rings implies the definition of specific as described in [OPT-NET] and [OPT-RINGS]. The corresponding fast link protection mechanism is performed at the node level is completely distributed and autonomous. Note that it still requires signalling message exchange in order to recover unidirectional link failures. The approach developed here combines distributed fast link protection mechanism and signalling message exchange between nodes when a failure is detected on a link connecting to adjacent nodes belonging to the same ring. In order to specify these mechanisms, we first describe the optical ring concept currently under development at the ITU-T to determine the corresponding mechanism for all-optical rings. 2. Optical Rings - Concepts 2.1 ITU-T Optical Rings The aim of this section is neither to describe the pro and cons of optical rings with respect to optical mesh network nor to explain in detail the well known ITU-T ring technology [ITUT-G841]. Many references can be found comparing, the architecture, the protection as well as the resource use of both kinds of topologies. The objective is to determine the requirements and the functional aspects of these ring technologies in order to define the corresponding mechanisms for all-optical rings. For that purpose, we first describe the ring technology and types of protected rings currently defined (by using ITU-T terminology): Papadimitriou D. - Internet Draft - Expires May 2002 2 draft-papadimitriou-optical-rings-02.txt November 2001 - Optical Channel Dedicated Protection Ring (OCh-DPRing) or O-UPSR (Optical Unidirectional Path Switched Ring). Dedicated protection can also be provided through Single Optical Channel (1+1) Sub- network Connection Protection (OCh-SNCP). - Optical Channel Shared Protection Ring (OCh-SPRing) or O-BPSR (Optical Bi-directional Path Switched Ring) existing in two flavors: 2 Fiber O-BPSR (O-BPSR/2) and 4-Fiber O-BPSR (O-BPSR/4) and 2 switching strategies: ring switch (2- and 4-Fiber) and span switch (4-Fiber only). - Optical Multiplex-Section Dedicated Protection Ring (OMS-DPRing) or O-ULSR (Optical Unidirectional Line Switched Ring) - Optical Multiplex-Section Shared Protection Ring (OMS-SPRing) or O- BLSR (Optical Bi-directional Line Switched Ring) existing in 2 flavors: 2 Fiber O-BLSR (O-BLSR/2) and 4-Fiber O-BLSR (O-BLSR/4) and 2 switching strategies: ring switch and span switch. Details about the corresponding SDH ring architectures can be found in ITU-T G.841 (for SDH/Sonet networks). The ITU-T is currently defining Optical Transport Network (OTN) Ring Architecture by extending the G.841 specification. These ring types can be treated separately if we differentiate the unidirectional (OMS and OCh) Dedicated Protection Rings (DPRing) from the bi-directional (OMS and OCh) Shared Protection Rings (SPRing). This by taking into account that switched rings are also referred to as self-healing rings (SHR) since they protect automatically against failures. The main feature of self-healing rings is their ability to recover any LSP in case of link (i.e. fiber) failure and part of the LSP in case of node failure. SHR applied on optical rings are referred to as WDM-SHR. The corresponding protection mechanism are briefly described here: 1. OMS-DPRing (or O-ULSR): - Unidirectional OMS protection is achieved by using 1+1 fast protection switching at the OMS-layer. - One fiber is dedicated as working fiber and the other is dedicated as protection fiber. Working and protection fibers operate in opposite directions: the working ring operates on the clockwise direction on the protection ring on the counter clockwise direction. The protection ring carries the same signal than the working fiber but in the opposite direction. The same mechanism applies if we replace the term fiber by wavelength. - Since single-ended protection (or unidirectional protection switching) is used, OMS-DPRing does not require coordinated O-APS signalling at the OMS-layer. Papadimitriou D. - Internet Draft - Expires May 2002 3 draft-papadimitriou-optical-rings-02.txt November 2001 2. OMS-SPRing (or O-BLSR): - OMS switched rings are based on optical automatic protection switching (O-APS) protocol through signalling channel by using OMS overhead bytes (or equivalent). The O-APS mechanism enables coordinated actions at the OMS-layer between nodes when a failure occurs. - OMS-SPRing performs bulk OCh-layer switching based on OMS- level failure indications through OMS-layer O-APS signaling; all optical-channels are protected (i.e. switched) as a group within the OMS (so incapable of protecting optical channels independently of one another based on OCh-layer failure indications. - Ring switching protection (2-fiber and 4-fiber) is based on loopback protection switching and activated when both working and protection link failure occurs simultaneously. By using O- APS signalling, when a link failure occurs, the working lines (wavelength) from the working fiber are looped back onto the opposite direction on protection wavelength on the protection fiber in the opposite direction. Note that combination of working and protection link failure and node failure should also be considered. - Span switching protection (4-fiber only) is activated when only working link failure occurs. When a link failure occurs, the working lines (wavelengths) from the working fiber are switched to the protection fiber in the same direction. Span switching protection is also referred to as non-loopback switched protection. - In terms of SHR, OMS-SPRings are referred to as Shared Line switched WDM-SHR (SLs-WDM-SHR) since they rely on shared line switched protection. 3. OCh-DPRing (or O-UPSR) - Unidirectional path switched-protection is achieved by using 1+1 fast protection switching at the OCh-layer. - One fiber is dedicated as working fiber and the other is dedicated as protection fiber. Working and protection fibers operate in opposite directions: the working ring operates on the clockwise direction on the protection ring on the counter clockwise direction. The protection ring carries the same signal than the working fiber but in the opposite direction so that the protection ring fully protects the working ring. The mechanism applies if we replace the term fiber by wavelength. - Since single-ended protection (or unidirectional protection switching) is used, OCh-DPRing does not require coordinated O- APS OCh-layer signalling. If a working OCh failure occurs, only one direction is affected and for that direction OCh switching is performed at the far-end. In the other direction, no OCh-layer switching is performed. - OCh-layer protection is based on optical channel resilient schemes by protecting individual path; so this protection allows a selective recovery of the OMS between nodes Papadimitriou D. - Internet Draft - Expires May 2002 4 draft-papadimitriou-optical-rings-02.txt November 2001 - In terms of SHR, OCh-DPRings are referred to as Dedicated Path switched WDM-SHR (DPs-WDM-SHR) since they rely on dedicated path switched protection. 4. OCh-SPRing (or O-BPSR) - Bi-directional path switched protection requires the need for a protection architecture performing OCh switching based on independent OCh failure detection. - This implies the specification of an O-APS signalling protocol at the OCh-layer using the OCh overhead byte. - Ring switching protection can also be defined for 2- and 4- Fiber OCh-SPRings. Span switching protection can be defined for 4-Fiber OCh-SPRings. - In terms of SHR, OCh-SPRings are referred to as Shared Path switched WDM-SHR (SPs-WDM-SHR) since they rely on shared path switched protection The distinction between Working and Protected path is defined as follows: - Working path: carrying optical channel defined between the source and the destination node - Protecting path: non-carrying optical channel defined between the source and the destination node transported over the complement of the ring The distinction between Working and Protected line is defined as follows: - Working line: carrying OMS defined between the source and an intermediate node or between intermediate nodes or between an intermediate node and the destination node transported over the complement of the ring - Protection line: non-carrying OMS defined between the source and an intermediate node or between intermediate nodes or between an intermediate node and the destination node transported over the complement of the ring The following table gives the equivalence between the linear (mesh networks) and ring protection. -------------------------------------------------------------------- Linear Protection Ring Protection -------------------------------------------------------------------- Dedicated Line Protection 1+1 OMS-DPRing (O-ULSR) Shared Line Protection 1:1 - 1:N - M:N OMS-SPRing (O-BLSR) Dedicated Path Protection 1+1 OCh-DPRing (O-UPSR) Shared Path Protection 1:1 - 1:N - M:N OCh-SPRing (O-BPSR) -------------------------------------------------------------------- 2.3 Transparent and All-Optical Rings The previous section detailed the ring technologies and types for Optical Transport Networks (i.e. ITU-T G.709 based OTN). The Papadimitriou D. - Internet Draft - Expires May 2002 5 draft-papadimitriou-optical-rings-02.txt November 2001 objective here is to define the same kind of mechanisms for pure optical rings. A pure optical ring is defined as a ring including Optical Cross- Connects (OXC) and Photonic Cross-Connects (PXC). The difference between OXC and PXC is that O/E/O conversion is performed at each of its interface while PXCs do not perform O/E/O conversion at all. An all-optical ring is defined as ring including only PXC while a transparent ring is defined as including at least one OXC. In order to be independent of physical layer concerns like chromatic dispersion, PMD (affecting the edge-to-edge distance), OSNR (affecting the number of optical spans), crosstalk, etc., only transparent optical rings are considered in the remaining parts of this document. We refer to these transparent optical rings as optical rings. The fundamental problem of optical rings is to determine to which extend the IP control-based signaling plane need to be considered for defining ring protection mechanism. In the model developed in this memo, we try to extract the relevant information needed in order to provide the same level of resiliency as the one currently available with SDH/Sonet DXC-based rings [ITUT-G841] and the corresponding extension under definition for Optical Transport Networks (OTN). This implies the definition at IP control-plane level of the required O- APS signalling protocol by keeping independence from the current protection mechanisms defined for SDH/Sonet rings. The information needed to dynamically configure an optical ring on top of a mesh optical network topology and the corresponding link (and wavelengths) resources management information depends on: - the ring identification - the ring protection type - the ring directionality - the ring architecture Based on this information, the dynamic ring configuration is performed (cf. Section 3). When the optical ring has been configured (i.e. emulated on top of the mesh topology), the ring resources allocation to the Lambda-switched LSPs (i.e. the optical channels) segments or tunnels can be computed for this emulated ring. The equivalence between ITU-T rings and the corresponding protection mechanism in all-optical networks is summarized in the following table: --------------------------------------------------------- ITU-T Rings | Corresponding protection mechanism --------------------------------------------------------- OMS-DPRing | 1+1 dedicated fiber link (or wavelength) --------------------------------------------------------- Papadimitriou D. - Internet Draft - Expires May 2002 6 draft-papadimitriou-optical-rings-02.txt November 2001 OMS-SPRing | M:N shared fiber link (or wavelength) --------------------------------------------------------- OCh-DPRing | 1+1 dedicated LSP segment protection --------------------------------------------------------- OCh-SPRing | M:N shared LSP segment protection --------------------------------------------------------- The OMS-layer protection (dedicated or shared) concept corresponds to the protection of a wavelength bundle transported on a fiber link between two adjacent nodes. The OCh-layer protection (dedicated or shared) concept corresponds to the protection of LSP segment(s) transported on a wavelength switched path (i.e. partial LSP path) between the ingress and the egress node of a given ring. Knowing each of the SDH/Sonet and OTN ring functional aspects and the mapping of the underlying concepts with their counterparts in all- optical networks, the corresponding ring protection mechanism can be defined. 2.3 Meshed Optical Network Topology The basic assumptions concerning the optical network topology are to be considered within the scope of [GMPLS-ARCH]: - Mesh (and transparent) optical network including Optical Cross- Connect (OXC) connected through fiber trunks as described in [IPO- SRLG]. - OXC interfaces or ports are Lambda-Switch Capable (LSC) interfaces as described in [GMPLS-SIG] meaning that any OXC interface includes DWDM capabilities. OXC or eventually fiber switch capable (FSC) interfaces (but they are considered as a particular outside the main scope of this document). - Each of these OXCs has its own IP controller that may be or not included within the same device. Each controller is uniquely identified by its IP Address. The inter-connection of the IP controllers defines the IP based control-plane of the optical network. - Signaling channels between the IP-based controllers of OXCs is realized through either dedicated Optical Signalling Channels (out- of-band/in-fiber) or through a dedicated out-of-band/out-of-fiber network. - Signaling protocol is based on Generalized MPLS signaling as described in [GMPLS-SIG] in combination with Generalized RSVP-TE [GMPLS-RSVPTE] and Generalized CR-LDP [GMPLS-CRLDP] extensions. The basic meshed topology of the optical network can be represented as a planar graph: Papadimitriou D. - Internet Draft - Expires May 2002 7 draft-papadimitriou-optical-rings-02.txt November 2001 A ------ B ------ C | | | | | | | | | D ------ E ------ F | | | | | | | | | G ------ H ------ I Each of the nodes (vertex) of this topology is an OXC. Nodes are connected through fiber links. This topology (see above figure as example) also defines a planar graph [OPT-NET], G(V,E) where V is the vertex and E the edge of the planar graph. The considerations developed here take into account this representation of the optical network topology. The non-planar case is left for further study. 3. Optical Ring Emulation Ring emulation concept refers to the configuration of optical rings on top of a meshed optical topology including OXCs and not only O- ADMs. This approach provides the advantage of ring configuration flexibility without having to move or replace the devices already included in the optical network. The emulation concept provides also more flexibility during the (dynamic) configuration of optical ring covers and the resource allocation between the different rings included in the cover. 3.1 Optical Ring Covers A ring cover is defined as a set of closed paths that covers all links in the optical network at least once. So, a (complete) optical meshed topology ring cover of the meshed optical topology will be achieved when every node can be connected to at least one ring. Two types of ring covers can be defined: - non-overlapping ring cover: several rings covering (any node, in case of complete ring-covers) the optical network are emulated on top of a mesh topology; each of these nodes belongs to only one ring except boundary nodes; non-overlapping ring covers can be complete (covering the whole meshed topology) or incomplete (partially covering the meshed topology) - overlapping ring cover (or multi-ring cover): several rings covering (any node in case of complete ring-covers) are configured on top of an optical meshed topology; each of these nodes can be a boundary node However, in the first release of this document, we only consider non- overlapping incomplete or complete ring covers. This choice is motivated by the complexity of the multi-ring covers as described in Papadimitriou D. - Internet Draft - Expires May 2002 8 draft-papadimitriou-optical-rings-02.txt November 2001 [OPT-MWS] and [OPT-RINGS] where double covers of non-planar graphs are studied. In ring covers, fiber links shared between more than one ring are referred to as shared links. However, wavelengths are dynamically assigned to one (and defined as dedicated protection wavelengths) or more than one ring (and defined as shared protection wavelengths). Consequently, the emulation of an optical ring on top of meshed optical network topology requires that: - the configuration of the OXC optical switching matrix included within a ring is designed to provide O-ADM functions (add, drop, drop-and-continue, protection switching, etc.) - in a shared link, each of the wavelengths belongs (for a given time period) to one and only one ring precluding the usage of the dynamically assigned wavelengths by the other ring In the following mesh topology, a non-overlapping ring cover is defined for instance by the following set of rings: - Ring 1: A-B-E-D-A - Ring 2: B-C-F-E-B - Ring 3: E-F-I-H-E - Ring 4: D-E-H-G-D In this topology: - Node C is an internal node since it belongs only to Ring 2 - Node D is a boundary node since it belongs to Ring 1 and Ring4 A ------ B ------ C | | | | Ring 1 | Ring 2 | | | | D ------ E ------ F | | | | Ring 4 | Ring 3 | | | | G ------ H ------ I Node E has a particular situation in this topology since this boundary node belongs to the four rings simultaneously. So, if we consider each ring as an abstract node, the same topology can also represented as follows B,E R1 --------------- R2 | \ / | | \ / | | \ E / | E,D| =====x===== |E,F | / E \ | | / \ | Papadimitriou D. - Internet Draft - Expires May 2002 9 draft-papadimitriou-optical-rings-02.txt November 2001 | / \ | R4 --------------- R3 E,H As a result, if a node N1 connected to the ring R1 requests an LSP to a node N2 connected to ring R3, the shortest ringed path is the one going through Node E. This shows clearly that additional information is required that takes into account the working (and protection) load of the ring. This load information has to be shared between the rings and between the rings and the external nodes to the rings. In the same topology, an overlapping ring cover is defined by the following set of rings: - Ring 1: A-B-C-F-E-D-A - Ring 2: D-E-F-I-H-G-D - Ring 3: E-F-I-H-E A ------ B ------ C | | | | Ring 1 | | | | D ------ E ------ F | | | | Ring 2 | | | Ring 3 | G ------ H ------ I As mentioned previously, overlapping ring covers are not considered in the first release of this document. 3.2 Dynamic Optical Ring Configuration The emulation of a ring on top of optical meshed topology is determined by the exchange of the following information between OXC: - each ring is defined by a Ring ID (32-bit field) - each ring shares a unique Virtual IPv4 Address (32-bit field) - a Loopback IPv4 Address (32-bit field) is allocated per node belonging to a given ring and per ring contiguous to a given node such that neighboring nodes see a given ring as a single abstract node identified by its loopback IPv4 address - each ring is characterized by a Ring Protection Type (8-bit field) which enables to select a given protection-type when establishing a LSP over that ring - each ring knows the complete list of identifiers describing the SRLGs to which a given link belongs. - each ring owns an associated Ring Metric used to bootstrap the initial ring resource allocation during the ring configuration process Papadimitriou D. - Internet Draft - Expires May 2002 10 draft-papadimitriou-optical-rings-02.txt November 2001 - each ring defines a internal Ring Policy (8-bit field) including ring protection strategy, the ring protection scheme, and the priority/preemption support Consequently, the dynamic ring configuration includes the exchange of basic identification information: the Ring Identifier, the Ring Protection-Type, the Ring Virtual IP Address, the Ring Metric and the Ring Policy. 3.2.1 Ring ID Each of the node belonging to a given ring is identified by a node ID defined as a Loopback IPv4 Address (in the future we will include IPv6 node identification). So that a specific common identifier need to exchanged between nodes belonging to the same ring. For this purpose, a Ring ID defined as a 32-bit integer field that uniquely identifies a given ring within a given optical domain (i.e. administrative authority). The ring ID is exchanged between neighboring nodes until reaching a loop (on top of the meshed topology) constituted by nodes having the same Ring ID. The Ring ID verification process at each node is straightforward and does not require additional explanations. 3.2.2 Virtual IP Address Each node included within a given ring shares a unique virtual IPv4 Address with other nodes belonging to the same ring. The IPv4 address is uniquely defined per optical domain (i.e. administrative authority). By using a Virtual IPv4 Address to address a ring, a network management system can reach any node of a given ring included within a complex optical ringed topology without knowing the status of the ring node or the corresponding ring topology. Example: If we refer to the previous optical network topology (see figure), we have the following IP reachability between the multi-ring cover: - Ring 1 is identified by the Ring ID 1 and Virtual IP Address 1 - Ring 2 ... Ring ID 2 and Virtual IP Address 2 - Ring 3 ... Ring ID 3 and Virtual IP Address 3 - Ring 4 ... Ring ID 4 and Virtual IP Address 4 3.2.3 Loopback IPv4 Address In order to avoid the use of interface address and so potentially experience disrupted communication between nodes belonging to the same, a loopback IPv4 address is allocated per node. Papadimitriou D. - Internet Draft - Expires May 2002 11 draft-papadimitriou-optical-rings-02.txt November 2001 For each ring contiguous to a given node, an additional loopback IPv4 address is allocated to this node. A ring can be considered as an abstract single node for its neighboring OXC. Consequently, this IP address identifies the abstract node constituted by a ring with respect to the rings connected to this node. From the neighboring rings point-of-view, this loopback IPv4 address enables to reach a given node at any time independently of the status of its incoming links. The loopback IPv4 address is exchanged with the ring contiguous to the node owner of this address but also between nodes belonging to the same ring. These loopback IPv4 addresses are exchanged between neighboring nodes in order to avoid the use of interface address for intra-ring communication and duplicated loopback IPv4 address that are subsequently distributed to neighboring rings. Example: From a nodal point of view, the neighbor relationship is determined by local loopback IPv4 address to each of the neighboring ring from a given node: - Node B (belonging to ring 1 and ring 2) has 2 neighboring rings: - Ring 1 identified by Loopback IP address B01 - Ring 2 identified by Loopback IP address B02 - Node 1 connected has 1 neighboring ring: - Ring 1 identified by Loopback IP address A1 - Node 3 connected has 2 neighboring rings: - Ring 1 identified by Loopback IP address D1 - Ring 2 identified by Loopback IP address D2 From a ring point of view, the neighbor relationship is determined by the local loopback IPv4 address: - Ring 1 has 3 neighboring rings: - Ring 2 identified by Loopback IP address B21 and E21 - Ring 3 identified by Loopback IP address E31 - Ring 4 identified by Loopback IP address D41 and E41 Consequently, a boundary node belonging to two rings owns two virtual IP addresses. In order to pass from one to ring to the other, the boundary node performs a shortcut. Imagine that Node 1 connected to Ring 1 (through Node A) communicates with the Node 2 connected to Ring 3 (through Node I). Then, the explicit route computed and selected by Node 1 can be [A1 - E3 - Node 2]. However, the actual route followed by the signalling message is [Node 1 - A1 (tunnel1) E3 (tunnel2) I3 - Node 2] where tunnel1 could. Papadimitriou D. - Internet Draft - Expires May 2002 12 draft-papadimitriou-optical-rings-02.txt November 2001 Node 1 ------ A ------ B ------ C | | | | Ring 1 | Ring 2 | | | | Node 3 ------ D ------ E ------ F | | | | Ring 4 | Ring 3 | | | | G ------ H ------ I ------ Node 2 3.2.4 Optical Ring Protection Type The Optical Ring Protection Type defines the protection technology supported by nodes belonging to the same ring. The Optical Ring Protection Type (which can be encoded as an 8-bit field) is defined as the combination of the following parameters: - Ring technology: Optical (= 0) or OTH-based (= 1) - Ring protection type: Dedicated (= 0) or Shared (= 1) - Ring protection level: Link-level (= 0) or Path-level (= 1) - Ring protection fibers: 2-fiber (= 0) or 4-fiber (= 1) - Ring switching: ring-switch (= 0) or span-switch (= 1) - Other values (3 bits) are reserved for future use So for a instance, an OCh-DPRing is defined by a 0xA0 protection type and an 4-fiber shared path-level optical ring is defined by a 0x70 protection type. Since span-switch is only supported with 4-fiber rings, one must avoid the 2-fiber and span-switch combination. Note the ring technology could also be defined as Transparent (= 0) and All-Optical (= 1) when the optical network topology includes only OXC or PXC respectively. 3.2.5 Ring Link Diversity - SRLG The shared link risk groups (SRLGs) are exchanged between nodes belonging to the same ring. This in order to potentially avoid the use of a shared resource that can affect all links belonging to this group in case of failure of this shared resource. For instance, as described in [IPO-SRLG], two LSPs flowing through the same fiber link in the same fiber trunk. [IPO-BUNDLE] extends the SRLGs concept by demonstrating that a given link could belong to more than one SRLG, and two links belonging to a given SRLG may individually belong to two other SRLGs. 3.2.6 Ring Metric The ring metric is used to bootstrap the initial ring resource allocation during the ring configuration process. This metric is exchanged during the initial ring configuration and only considered Papadimitriou D. - Internet Draft - Expires May 2002 13 draft-papadimitriou-optical-rings-02.txt November 2001 by a node if its ring ID corresponds to the one advertised with the ring metric. The ring metric is a composed metric including the following components: the ring absolute weight, the ring capacity and the ring maximum restoration time. 1. Ring absolute weight The ring absolute weight translates the number of nodes that belongs to the ring. This value is used during the initial configuration process to determine the number of non-adjacent nodes belonging to the same ring. For instance, it the ring absolute weight metric of given ring is N then by receiving this value (or simply by consulting this value), a node belonging to a given ring knows that the number of non-adjacent nodes belonging to the same ring equals N-3. 2. Ring Capacity During the initial configuration process, the ring capacity defines the number of incoming, outgoing and dropped channels (or wavelengths) provisioned at a given node for a given ring ID. These values are defined for the working as well as the protection capacity. The number of potentially available but unused wavelengths by this ring is also announced during the initial configuration phase. These wavelengths are consequently left free for other rings that can be defined using the same node. The ring capacity (per node) is exchanged between adjacent nodes until each node belonging to the same ring has received (N-1) copy of the ring capacity. The knowledge of these values will enable to determine the initial working ring load, protection ring load and spare capacity (also defined as non-allocated ring load) for the newly configured ring. This in turn provides the required information for each node to compute the number of potential LSPs that can pass through (i.e. bar- state) or be dropped (i.e. cross-state). 3. Maximum Restoration Time Typically, this static value defines the maximum restoration time (MRT) for a given ring type at the initial configuration time. The MRT values are distributed between nodes in order to know the performance of the other nodes belonging to the same ring. With the current state of the usage of all-optical (for instance, MEMS) technology in OXC enabling less than 10 ms switching time, typical MRT values range between 10 to 50 ms for bi-directional Papadimitriou D. - Internet Draft - Expires May 2002 14 draft-papadimitriou-optical-rings-02.txt November 2001 rings. For unidirectional rings using optical splitters (as described in [IPO-MULT], typical MRT values are within 1 ms. Note that these values are statically configured and only during the initial ring configuration period. So, they are not considered during the working period of the ring. 3.2.6 Ring Protection Policy Ring protection policy refers to the different strategies applicable to optical rings. The ring protection policy includes mainly the ring protection strategy, the ring protection scheme and ring protection priority. 1. Strategy The ring protection strategy could be revertive (default for dedicated 1:1 ring protection or shared protection 1:N and M:N ring protection) or non-revertive (default for 1+1 rings). Depending on the ring protection type, the ring protection strategy is determined by the under-laying hardware (or low-layer) opto(- electro-)-mechanical technology providing the automatic protection switching function. However, these considerations are outside of the scope of this document. 2. Scheme The ring policy scheme can be configured as provisioned or non- provisioned. The non-provisioned scheme refers to restoration (or re- routing) so that this scheme is not generally used when considering ring protection in optical networks. The provisioned scheme is one used when the protection path or lines are left unused and fully dedicated to protection purposes; switching to these paths will only occur if a working path or line failure need to be recovered. 3. Priority/Preemption The prioritization capability refers to the support of initial setup and recovery priority associated with the subsequent link working and protection allocated to the LSP established on top of the emulated ring. Note that the priority support extends to the signalling support of prioritized working and protection LSPs created on a given ring. The preemption capability refers to the support of link working and protection resources pre-emptability in case of link or node failure within a given ring. 3.2.7 Summary Papadimitriou D. - Internet Draft - Expires May 2002 15 draft-papadimitriou-optical-rings-02.txt November 2001 Consequently, the exchange of information between nodes belonging to the same ring enables the common knowledge of the identification and properties that uniquely define a given optical ring. - Ring Identifier - Ring Virtual IP Address - Ring Protection Type - Ring SRLG per link - Ring Metric including the absolute ring weight, the ring capacity and the ring MRT - Ring Policy including ring protection strategy, the ring protection scheme, and the priority/preemption support 4. Dynamic Ring Resource Allocation The dynamic ring resource allocation process is closely related to intra-ring traffic engineering (intra-ring TE). The ring resource allocation process is required to dynamically setup Lambda-switched LSP segments on top of emulated rings. 4.1 Link TE Resource Link TE resources are dynamically exchanged between nodes belonging to the same ring to provide the necessary information for intra-ring TE. Dynamic Ring Resource Allocation is based on the knowledge of the following link TE resource-related information: - Link identification (or link bundle identification) - Maximum available bandwidth per link - Minimum and maximum reservable bandwidth per link - Link protection type including unprotected 0:1, dedicated 1:1, shared M:N and dedicated 1+1 protection - Link priority associated to the minimum/maximum reservable bandwidth per link - Link priority associated with the link protection type - List of SRLGs per link (in order to compute disjoint working and protection LSP, for instance) - Resource Class/Color defined per link The dynamic exchange of this information (IGP link-state advertisements) during the working period of the ring enables the real-time computation of the value(s) (i.e. the component values) defined for the ring TE metric. 4.2 Ring TE Metric The ring traffic engineering metric (ring TE metric) can be considered as a dynamic ring metric whose component value(s) are periodically re-evaluated during the working period of the emulated ring. This ring metric is a composed TE metric including the following components: - a ring weight - a ring load Papadimitriou D. - Internet Draft - Expires May 2002 16 draft-papadimitriou-optical-rings-02.txt November 2001 - a ring maximum restoration time 1. Ring weight In the previous example, the Node A does not know the number of nodes the (i.e. hop count) within a given neighboring ring. To make the distinction between rings, we introduce the concept of ring weight. Ring weight is inversely proportional to number of nodes belonging to a ring multiply by 100. The ring weight is defined as: Working ring weight = (1/[Number of nodes] x 100) x r1 where r1 is a weighted integer factor r1 is a user customizable integer whose default value equal 1 For instance, in the above example each ring have a weight of 25 since 1/[Number of nodes = 4] x 100. However, this definition does not allow discriminating between working and protection path. So we define a working ring weight and a protection ring weight (this applies only to bi-directional rings). For bi-directional rings, the ring weight is defined in two flavors: - Working ring weight = (1/[Number of nodes] x 100) x r1 - Protection ring weight = (100 - [Working ring weight]) x r2 where r1 and r2 are weighted integer factors defined by default as r1 = 1 and r2 = 1. 2. Ring Load The ring load is only defined for bi-directional rings. The working ring load quantity defines, for each direction of propagation, the largest number of working LSPs (in any fiber link) flowing in opposite direction of the protection LSPs. The working ring load is defined at each time interval as: Working ring load = [Number of working LSP] However, this definition does not give the relative working load of the ring compared to its total capacity. So, to normalize the working ring load, this value is divided by the total ring capacity (in terms of total number of LSPs). Working ring load = [Number of working LSP]/[Total number of LSPs] Correspondingly, the protection ring load will be defined as the number of protection LSPs divided by the total ring capacity (in terms of total number of LSPs). The protection ring load is defined at each time interval as: Papadimitriou D. - Internet Draft - Expires May 2002 17 draft-papadimitriou-optical-rings-02.txt November 2001 Protection ring load = [Number of protection LSP]/[Total number of LSPs] Consequently, the working ring load, the protection ring load and the non-allocated ring load are defined by the following formulas: Working Ring Load = ([Number of working LSP]/[Ring capacity] x 100) x r3 Protection Ring Load = ([Number of protection LSP]/[Ring capacity] x 100) x r4 Unallocated Ring Load = ((1 - ([Working Ring Load] + [Protection Ring Load])/[Ring Capacity]) x 100) x Mean(r3,r4) Where the r3 and r4 parameters are weighted integer factors, defined by default as r3 = 1 = r4. 3. Maximum Restoration Time Typically, this value defines the maximum restoration time (MRT) for a given ring type. Typical values are: - Bi-directional rings (shared protection): 10 to 50 ms - Unidirectional rings (dedicated protection): 1 ms So, we define the associated metric value as: MRT = (MRT[N+1] x 100) x r5 In this definition, the r5 parameter is a weighted integer factor defined by default as equal to 1. Comparing to the MRT defined in the ring metric, the values considered here are dynamic. The maximum restoration time computation per ring depends on the failure history of that ring. Each time a failure is experienced by a ring the MRT value is adapted through the use of the following computation: If MRT[N+1] > MRT[N] then MaxMRT[N+1] = MRT[N] + (k1 x MRT[N]) and MRT[N+1] = Mean(MaxMRT[N+1]; MRT[N]) If MRT[N+1] < MRT[N] then MinMRT[N] = MRT[N] - (k2 x MRT[N]) and MRT[N+1] = Mean(MRT[N]; MinMRT[N+1]) Where MRT[N+1] is defined as the Maximum Restoration Time when a given ring has already experienced N failures (so that N defines the number of ring restoration process occurrence). The k1 and k2 are defined as weighting factors (0 < k1 < 1 and 0 < k2 < 1) whose values are by default k1 = 1 and k2 = 1. Consequently, the Ring TE Metric is defined as: Papadimitriou D. - Internet Draft - Expires May 2002 18 draft-papadimitriou-optical-rings-02.txt November 2001 Ring TE Metric = (Working Ring Weight x r1 | Protection Weight x r2) + (Working Ring Load x r3 | Protection Load x r4) + (Maximum Restoration Time x r5) The corresponding advertisement will include both the working and the protection part of the metric. 5. Ring Protection in Optical Networks Within optical networks, the purpose of the ring protection mechanisms is to incorporate optical layer survivability in network- layered structures. Even if some of the higher layers have their own protection mechanisms, by incorporating survivability mechanisms at multiple layers leads to the following issues: - the protection function allocation to each of the layers - the coordination of the protection functions applied at each layer during failure recovery process Nevertheless, as described in [OPT-MRPS], providing optical layer survivability through ring protection has been strongly suggested by arguing a combination of optical ring protection with optical linear protection as well as additional restoration mechanism provides the best optical network survivability. 5.1 Escalation Strategy The escalation strategy is defined by the set of detection functions describing the originating failure, the protection functions applied within recovery process to recover the failure and the interaction between the upper and/or lower layers protection functions applied during the recovery process. The escalation strategies are governed either by arbitrarily setting failure detection and recovery completion time (using hold-off timers) or by explicit message exchange between the layers. Escalation strategies (also referred to as inter-working strategy) have been proposed in [IPO-POES] and summarized here: - Bottom-up strategy starts at closest layer to the failure (generally the bottom layer) and escalates toward the upper layer upon expiration of the recovery timer (hold timer). This timer is defined in such a way that is allocates "enough time" the lower layer(s) to detect the failure, execute the recovery process and recovery completion time before triggering recovery process defined at the higher layer(s). - Top-down strategy starts at the upper(most) layer and escalates downward to the lower layer(s); depending on the working level, the top-down strategy is suitable when each of the layers define Class- of-Services (CoS) so that the escalation strategy might take this CoS into account when executing the recovery process. 5.2 Bottom-Up Strategy Papadimitriou D. - Internet Draft - Expires May 2002 19 draft-papadimitriou-optical-rings-02.txt November 2001 We assume here a classical Bottom-up strategy since it has the shortest recovery time (with respect to the Top-down escalation strategy), and define the threshold at which the upper-layer protection needs to be "executed". In optical rings, the following escalation strategy can be defined (here we do not assume FSC capable OXC interfaces, so that GMPLS signalling is not considered at the lowest layer) Packet Layer <==> PSC interface <==> GMPLS Signalling ^ ^ | | | | | | Lambda Layer <==> LSC interface <==> GMPLS Signalling ^ ^ | | | | | | Fiber Layer <==> FSC Interface <==> Layer-1 Mechanism Compared to TDM SDH/Sonet Rings control through GMPLS signalling [GMPLS-SIG] or Optical Transport Networks as defined in [ITUT-G872] and [ITUT-G709]): Packet Layer <==> PSC interface <==> GMPLS Signalling ^ ^ | | | | | | Path (OCh) Layer <==> OCh (G.709) interface <==> GMPLS Signalling ^ ^ | | | | | | MS (OMS) Layer <==> Physical interface <==> Layer-1 Mechanism ^ ^ | | | | | | RS (OTS) Layer <==> Physical interface <==> Layer-1 Mechanism Note: Layer-1 mechanism can be used in conjunction with [LMP] and [LMP-WDM]. Or eventually when considering the G.709 ODUk Switching Layer (also referred to as Digital Path Layer): Papadimitriou D. - Internet Draft - Expires May 2002 20 draft-papadimitriou-optical-rings-02.txt November 2001 Packet Layer <==> PSC interface <==> GMPLS Signalling ^ ^ | | | | | | Packet Layer <==> TDM (G.709) interface <==> GMPLS Signalling ^ ^ | | | | | | Path (OCh) Layer <==> OCh (G.709) interface <==> GMPLS Signalling ^ ^ | | | | | | MS/RS (OMS/OTS) <==> Physical interface <==> Layer-1 Mechanism This approach is based on the common coordination achieved by resorting escalation strategies. At each level, the resiliency scheme is activated sequentially starting from the lower to the upper layer. This implies that at each level the detection of a failure condition (and restoration time) triggers either a protection/restoration mechanism and if the protection/restoration completion time is reached then triggers an upper-layer protection/restoration mechanism. 5.3 Ring Protection Mechanisms In this section the two generic ring protection mechanisms are discussed. The main difference between these mechanisms is that the dedicated protection performs a physical-layer level protection switching while the shared protection needs a dedicated O-APS signalling protocol to synchronize the execution of the protection switching mechanism. 5.3.1 Dedicated Protection Dedicated LSP protection can be easily achieved by splitting the incoming optical signal and send the one copy of the output signal into working wavelength (or fiber) and the other copy into the protection wavelength (or fiber). This results in two copies of the signal propagating the ring in opposite directions. The far-end (or receive-end) switches to the protection wavelength (or fiber) if a degradation or failure occurs. The proposed mechanism can restore a single link failure or a single node failure. Moreover, since the far-end (receiving end) needs to notify the near- end (transmitting end) of the failure, an O-APS signalling mechanism is not required. However, when a link failure is detected on the working ring, the far-end switch to the protection ring (in the Papadimitriou D. - Internet Draft - Expires May 2002 21 draft-papadimitriou-optical-rings-02.txt November 2001 opposite direction) but for any wavelength flowing through this link, so that only a bulk LSP protection switching is achieved by using this technique. By using the optical signal splitting technique (as described in [IPO-MULT]), fast protection is provided for 1+1 LSP protection. However, this technique applies only for unidirectional LSP protection rings. With this type of rings the optical signal is split on both wavelengths (fibers) at the transmission end. 5.3.2 Shared Protection Shared protection is mainly based on the use of an O-APS signalling protocol (using the signalling IP-based control-plane). The requirements as well as the specifications for the specification of such an IP-based protocol need to be seriously determined in order to achieve a fast protection switching mechanism. The specifications of the O-APS protocol are extensively detailed in [IPO-OAPS]. 6. Routing in Optical Rings and Hybrid Mesh-Ring Networks In optical networks, the following hierarchical routing model can be considered: - the intra-domain interfaces are included in an IGP (more precisely link-state routing protocols) routing protocol instance included within the same autonomous-system (AS) - the inter-domain interfaces are defined between autonomous-systems running over eBGP routing protocol. The eBGP protocol is running between border LSRs (which from the OSPF point-of-view are considered as an Autonomous System Boundary Router - ASBR). The hierarchical optical network model provides the capacity to connect several autonomous systems (i.e. optical domains) together through eBGP protocol. 6.1 Intra-Domain Routing The optical network architecture considered here is build such as the corresponding control plane defines an hierarchical optical topology as described in [IPO-FRAME]. Consequently, intra-domain routing can be considered when the IP-based control plane defines an OSPF Autonomous System (AS) on top of an hierarchical optical domain (which defines the transport plane). The same considerations can be applied when using IS-IS IGP protocol in hierarchical optical networks. With the intra-domain architecture, transparent optical network devices (i.e. OXC including O/E/O conversion) are located at the border of the corresponding areas. Consequently, OXC might be considered as internal LSR as well as border LSR. All-optical network devices (i.e. PXC without O/E/O conversion) are predominantly Papadimitriou D. - Internet Draft - Expires May 2002 22 draft-papadimitriou-optical-rings-02.txt November 2001 configured as internal LSR but might in particular cases be configured as border LSR. ++++++++++++++ ++++++++++++++ + A ------ B + + H ------ I + + | | + + | | + + | Area10 | + + | Area20 | + + | | XXXXXXXXXX | | + + D ------ C ---------- E ------ J + +++++++++X | | X+++++++++ X | | X X | Area 0 | X X | | X +++++++++X | | X+++++++++ + K ------ G ---------- F ------ N + + | | XXXXXXXXXX | | + + | Area30 | + + | Area40 | + + | | + + | | + + M ------ L + + P ------ O + ++++++++++++++ ++++++++++++++ Taking into account this optical network topology: - Ring CEFG defines backbone area 0 - Ring ABCD, HIJE, KGLM and FNOP define non-backbone area In this hierarchical network topology, each of these nodes can be considered as an abstract node so that each of them can also be considered as defining an optical ring. Moreover, each of these areas can include internal all-optical rings. However, in that case, the only restriction is related to the Area Border Routers (ABR i.e. border LSR) that can not be all-optical PXC. In order to avoid optical signal regeneration related problems, one can consider here that border LSRs are O/E/O transparent devices like OXCs. 6.2 Inter-domain Routing Inter-domain Optical Routing is considered when defining inter- optical domain routing between several carriers. In the most basic network topology, optical domains (i.e. BGP AS) are inter-connected through direct links (or redundant links) combined with linear protection mechanisms as represented in the following figure: ++++++++++++++ ++++++++++++++ + A ------ B + + H ------ I + + | | + + | | + + | AS 10 | + + | AS 20 | + + | | + + | | + + D ------ C ========= E ------ J + +++++++++++|++ ++|+++++++++++ | | Papadimitriou D. - Internet Draft - Expires May 2002 23 draft-papadimitriou-optical-rings-02.txt November 2001 direct --> | | | | +++++++++++|++ ++|+++++++++++ + K ------ G ========= F ------ N + + | | + + | | + + | AS 30 | + + | AS 40 | + + | | + + | | + + M ------ L + + P ------ O + ++++++++++++++ ++++++++++++++ In this topology, the Nodes CEFG can define an inter-domain ring. This enhancement provides higher resiliency to the classical inter- domain connections since in that case ring protection mechanism can be used. However, the most reliable topology will be achieved when the optical domains are inter-connected through a BGP Transit AS. When considering a Transit AS, the Client AS can be inter-connected by using optical rings or direct links to the Transit AS. As mentioned above the use of a meshed inter-connectivity between nodes does not preclude the use linear protection (and restoration) mechanisms such as dedicated 1+1 or shared (1:1, 1:N, M:N) LSP protection. The following figure compares optical ring from direct link inter- connection approach: + + + + —|—+————————+—|— | + + | ---—C-+--------+-E—--- ---C-+--------+-E--- +++—+++ +++—+++ +++++++ +++++++ —| |— | | +—++++++++++++++—+ ++++++++++++++++++ +—Q------------R—+ + Q------------R + +—|————————————|—+ + | | + + | Transit AS | + + | Transit AS | + +—|————————————|—+ + | | + +—T------------S—+ + T------------S + +—++++++++++++++—+ ++++++++++++++++++ —| |— | | +++—+++ +++—+++ +++++++ +++++++ ---—G-+--------+-F—--- ---G-+--------+-F--- —|—+————————+—|— | + + | + + + + Optical Rings Direct Links As mentioned before, a trade-off between link (or wavelength) redundancy and lost capacity need to be defined. However, these considerations are out of the scope of this document. 6.3 Inter-Ring Traffic-Engineering Papadimitriou D. - Internet Draft - Expires May 2002 24 draft-papadimitriou-optical-rings-02.txt November 2001 As described in the previous section, the network hierarchical model considered is divided into Autonomous Systems (ASs), where each AS is divided into IGP areas to allow the hiding, aggregation and summarization of routing information. The hierarchical routing model currently can be extended for traffic engineering as it hides the route taken by a LSP to the destinations in the other routing areas. Hence, from the TE perspective, requirements such as path selection and crank-back mechanism need different architectural additions to the existing link-state routing and signaling protocols for inter- area LSP setup. The protection requirements as well as crank-back mechanisms can be implemented by using the optical ring techniques described in this document. Note that in a fully distributed approach, since LSRs in different AS's have different views of the network at any given time, re- routing and crank-back mechanisms are needed. This approach requires also to clearly defining when the steady state of the optical network is reached in order to execute the protection/restoration mechanisms specified in the escalation strategy to apply when failure(s) occurs. The problems related to LSP protection/restoration are also described in [IPO-REST]. Traffic engineering (TE) practice currently involves the setup and use of Label Switched Paths (LSPs) as dedicated bandwidth pipes between two end points (i.e. between an ingress and an egress LSR). LSPs can be setup across several LSRs through the use of dynamically computed path. Since this memo focuses on fully distributed CSPF path computation, we consider here that the routes can be computed dynamically through the use of online constraint-based routing algorithms such as incremental Linear or Heap Dijkstra Algorithm (or Dijkstra-like algorithms for non-additive metrics) as described for instance in [SPT-DYN]). The online constraint-based routing model requires: (1) a set of flooding mechanism to maintain the state of TE-related information within the optical network topology (2) a constraint-based routing process implemented on certain LSRs that serve as ingress LSRs for the LSPs, (3) a topology change(s) within the optical domain does not result in a complete re-computation of the routes Most of the traffic engineering extensions for intra-area TE routing are described in [OSPF-TE] and [GMPLS-OSPF] the latter in particular when considering intra-area GMPLS TE routing. Note that new traffic engineering attributes can be defined in future versions of this document. We describe here the TE extensions for inter-ring TE routing in optical ring topologies when considering summarization of the TE values at boundaries (see also [OSPF-IRTE] concerning summarization of TE attributes). Papadimitriou D. - Internet Draft - Expires May 2002 25 draft-papadimitriou-optical-rings-02.txt November 2001 As described in [OSPF-IRTE], traffic engineering (TE) summary LSA can be originated at Area Border Router (ABR) into an area. This TE summary LSA is a type-10 opaque LSA flooded within the area. The functionality of the TE summary LSA is similar to the one of summary LSA of standard OSPF [RFC2328], but in addition it carries the traffic engineering metrics to the remote destination (IP network or ASBR). The inter-ring TE summary LSA described here has exactly the same functionality except that the corresponding LSA is generated at ring boundary nodes. 6.3.1 Ring Count The ring count is the cost in rings to reach the destination network (or the destination ring) from the source node (or the source ring). This parameter is equivalent to the hop count defined in [OSPF-IRTE] since a ring appears as an abstract node for the neighboring rings or OXCs (not belonging to the same ring). The ring count (as the hop count) is an additive metric. Note that the ring count can be generalized to an additive weighted metric. 6.3.2 Maximum Reservable Bandwidth The maximum reservable bandwidth is defined as the smallest maximum reservable bandwidth among all the rings included into the path from the source to the destination. Note the maximum reservable bandwidth should be the same for the working and the protected path. 6.3.3 Minimum Reservable Bandwidth The minimum reservable bandwidth is defined as the largest minimum reservable bandwidth among all the rings included into the path from the source to the destination. Note the minimum reservable bandwidth should be the same for the working and the protected path. 6.3.4 Delay The delay attribute is defined as the delay cost to reach the destination ring in microseconds. The delay is defined an average delay taking into account the delay introduced by the worst case protection path and best case working path since this value can not up to now be updated dynamically. The delay is an additive metric that could be generalized to an additive weighted metric. Note that the delay of the working path could be different from the delay of the protected path. 6.3.5 Resource Class/Coloring Papadimitriou D. - Internet Draft - Expires May 2002 26 draft-papadimitriou-optical-rings-02.txt November 2001 The resource class or color of the destination network is a combination of the colors for the various ringed paths to the destination network. Path coloring technique can be found in [IPO- PATH]. Path coloring can be used to prune resources as a first step of the LSP route computation and as a tie when two distinct routes having the same Inter-Ring TE Metric (see section 6.3.6) to the same destination network may be used but only differ from their color. In that case, the choice of one route or another is a local policy matter. 6.3.6 Inter-ring TE Metric The inter-ring TE metric is defined as the TE metric representing the TE cost of reaching the destination network (or the destination ring) from the advertising ring. This metric is composition of ring TE metrics (described in section 4.2) defined by the following formula: Inter-Ring TE Metric = (Working Ring Weight x r1 | Protected Weight x r2) + (Working Ring Load x r3 | Protected Load x r4) + (Maximum Restoration Time x r5) So that the inter-ring TE metric is defined as the weighted sum of the ring metrics and representing the traffic-engineering cost of reaching the destination ring (i.e. Ring N) from the advertising ring (i.e. Ring 1). Ring TE Metric = k[1] x Ring Metric 1 + k[2] x Ring Metric 2 k[n-1] Ring Metric N-1 ... k[n] x Ring Metric N 6.4 Routing Protocol Extensions for Dynamic Ring Configuration We describe here the IGP routing protocol extensions needed in order to enable dynamic ring configuration within an area (intra-area routing) between areas (inter-area routing). 6.4.1 Opaque LSA Opaque LSA are application specific link-state advertisements defined in [OSPF-OPA] used mainly for IGP traffic engineering (TE) extension purposes, see for instance [OSPF-TE] concerning intra-area TE routing and [OSPF-IRTE] concerning inter-area TE routing. The [RFC2370] describing the Opaque LSAs concepts for application specific information distributed additionally to the IGP routing information. In [OSPF-OPA], three types of Opaque LSA were defined: - Type-9 Opaque LSA: link-local scope - Type-10 Opaque LSA: area-local scope (or intra-area scope) Papadimitriou D. - Internet Draft - Expires May 2002 27 draft-papadimitriou-optical-rings-02.txt November 2001 - Type-11 Opaque LSA: Autonomous System (AS) scope (or inter-area scope) The flooding scope associated with each Opaque link-state type is defined as follows. - Type-9 Opaque LSAs are not flooded beyond the local sub-network. - Type-10 Opaque LSAs are not flooded beyond the borders of their associated area. - Type-11 Opaque LSAs are flooded throughout the Autonomous System (AS) and is equivalent to the flooding scope of AS-external (type- 5) LSAs. As a generic rule, see [RFC2370], when flooding Opaque-LSAs to adjacent neighbors, an opaque-capable router looks at the neighbor's opaque capability. Opaque LSAs are only flooded to opaque-capable neighbors. When a non-opaque-capable router inadvertently receive Opaque LSAs, it simply discard the Opaque LSA. Consequently, to achieve intra-area dynamic ring configuration we use Opaque LSAs of Type 10 area-local flooding scope. 6.4.2 Opaque LSA Header Opaque LSAs are types 9, 10 and 11 link-state advertisements. The Link-State ID [RFC2328] of the Opaque LSA is divided into an Opaque Type field (8-bit sub-field) and a Opaque Type-specific ID (24-bit sub-field). The range of topological distribution (i.e., the flooding scope) of an Opaque LSA is identified by its link-state type. In Opaque LSAs are application specific LSAs meaning that their payload has meaning only within a certain application; otherwise, they will be ignored. The Opaque Type that is contained in the Opaque Type field identifies the type of the application. The Opaque Type-specific ID (i.e. Opaque ID) is a 24-bit sub-field sub-divided in a reserved sub-field (8 MSB) and a Source specific sub-field (16 LSB). 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LS age | Options | LS Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque Type | Opaque ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Advertising Node ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LS sequence number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LS checksum | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Papadimitriou D. - Internet Draft - Expires May 2002 28 draft-papadimitriou-optical-rings-02.txt November 2001 where LS Type value = 9, 10 or 11 For the purpose of dynamic ring configuration, only Opaque LSA Type- 10 will be considered. Moreover the dynamic ring configuration Opaque Type still remains to be determined. 6.4.3 Opaque LSA Payload As described in [OSPF-OPA], the Opaque LSA payload consists of one or more nested Type/Length/Value (TLV) structures. The format of the Opaque LSA TLV structure is defined as: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length (in bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The following additional TLV need to be defined in order to enable dynamic ring configuration through the use of application-specific Opaque LSAs. 1. Ring ID TLV The Ring ID is defined as a 32-bit integer field that uniquely identifies a given ring within a given optical domain (i.e. administrative authority). 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Ring ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ A additional field might be defined in the future to identify the Autonomous System number (16-bit) into which the ring is included. 2. Ring Virtual Address TLV Each node included within a given ring shares a unique virtual IPv4 Address with other nodes belonging to the same ring. The IPv4 address is uniquely defined per administrative authority. This information is exchanged between nodes by using the following TLV: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | 4 | Papadimitriou D. - Internet Draft - Expires May 2002 29 draft-papadimitriou-optical-rings-02.txt November 2001 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Virtual IPv4 Ring Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 3. Loopback IP Address TLV One loopback IPv4 address is allocated per node in order to avoid communication disruption between nodes belonging to the same ring when a given node interface becomes unreachable. The local loopback IPv4 address must be the first one included in the loopback IPv4 address list. For each ring contiguous to a given node, an additional loopback IPv4 address is allocated. Since a ring is viewed as an abstract single node for its neighboring OXC, these loopback IP addresses identify the abstract node constituted by a ring for the neighboring nodes (external to this ring) and neighboring rings. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | n x 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Loopback IPv4 Address 1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | / ... / | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Loopback IPv4 Address n | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 4. Ring Protection Type TLV The Optical Ring Protection Type (encoded as an 8-bit flagged field) is defined as: - Ring technology: Optical (Bit0=0) or OTH-based (Bit0=1) - Ring Protection: Dedicated (Bit1=0) or Shared (Bit1=1) - Ring Protection level: Link-level (Bit2=0) or Path-level (Bit2=1) - Ring Protection fibers: 2-fiber (Bit3=0) or 4-fiber (Bit3=1) - Ring switching: ring-switch (Bit4=0) or span-switch (Bit4=1) - Other values (3 bits) are reserved for future use The corresponding TLV is defined as: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Protection | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Papadimitriou D. - Internet Draft - Expires May 2002 30 draft-papadimitriou-optical-rings-02.txt November 2001 5. Link TLV To encode the list of SRLG(s) to which a given link belongs, we propose to use the Link TLV by including the following sub-TLVs: - Link ID (32-bit) - Link Local Interface ID (32-bit) - Link Remote Interface ID (32-bit) - Link Encoding Type (8-bit) - Link Protection Type (8-bit) - List of SRLG(s) (n x 32-bit) The corresponding TLV are already defined in [GMPLS-OSPF] and [OSPF- TE]. Note that for optical rings, the relevant Link Protection Type are dedicated 1+1, dedicated 1:1, shared M:N and unprotected 0:1. Additional sub-TLVs can also be included within the Link TLV for intra-ring traffic engineering purposes. So, we can refer to these sub-TLVs as Link TE sub-TLVs: - Maximum Available Bandwidth per link - Minimum and Maximum Reservable Bandwidth per link - Link Priority associated to Minimum/Maximum Reservable Bandwidth - Link Priority associated with the Link Protection Type - Resource Class/Color defined per link The link resource allocation is performed dynamically here; consequently the Link TLV does not need to include the Ring ID to which this link might be allocated (or de-allocated) during the working period of the ring. A given link can include several wavelengths belonging to more than one ring if this is a shared link. This means that the per-ring resource allocation Note also that even if a fiber link can belong to more than one ring (if the link is defined as a boundary link) the wavelengths available on that link when allocated to one ring, they can not be shared by the other ring. 6. Ring Metric TLV As described in section 3.6, the ring metric is a component metric including the ring absolute weight, the ring initial MRT and the ring capacity. The corresponding TLV is defined as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | 20 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Weight | Initial MRT | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Papadimitriou D. - Internet Draft - Expires May 2002 31 draft-papadimitriou-optical-rings-02.txt November 2001 | R | Incoming | Outgoing | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | R | Dropped | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | R | Incoming | Outgoing | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | R | Unused | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The Ring Metric TLV includes: - Ring absolute weight (8-bit): number of nodes belonging to the same ring ID - Ring initial MRT (24-bit): in microsecond units - Ring capacity: . number of working wavelengths: incoming (15-bit), outgoing (15-bit) and dropped (15-bit) . number of protection wavelengths: incoming (15-bit) and outgoing (15-bit) . number of unused wavelengths (30-bit) for this ring 7. Ring Protection Policy TLV Ring protection policy refers to the different strategies applicable to optical rings. The ring protection policy includes mainly the ring protection strategy, the ring protection scheme and ring resource priority and preemptability support. The Ring Protection Policy TLV format is defined as: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0|1|2|3| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The values are defined as follows: The ring protection strategy (bit-0): - Bit 0 set to 0 defines a non-revertive strategy - Bit 0 set to 1 defines a revertive strategy The ring protection scheme (bit-1): - Bit 1 set to 0 defines a provisioned scheme - Bit 1 set to 1 defines a non-provisioned scheme The ring resource Priority-Preemption (bit-2 and bit-3): - Bit 2 set to 0 enables setup pre-emptability of working and protection link resources during LSP setup process (meaning implicit priority support for link resources) Papadimitriou D. - Internet Draft - Expires May 2002 32 draft-papadimitriou-optical-rings-02.txt November 2001 - Bit 2 set to 1 disables setup pre-emptability of working and protection link resources during LSP setup process - Bit 3 set to 0 enables recovery pre-emptability of working and protection link resources during LSP recovery process (meaning implicit priority support for link resources) - Bit 3 set to 1 disables recovery pre-emptability of working and protection link resources during LSP recovery process Other bits (bit 4 to 31) are reserved for future use. 6.5 Routing Protocol Extensions for Dynamic Ring Resource Allocation The only additional TLVs to define as additional Opaque LSA payload is the Ring TE Metric TLV. Other traffic engineering extensions such as Link TE TLVs have already been defined in [OSPF-TE] and [GMPLS- OSPF]. 1. Ring TE Metric TLV The Ring TE Metric is a component metric including the ring weight, the ring load and the ring MRT. The Working TE Metric (16-bit) part of the Ring TE Metric includes the following components - the working ring weight - the working ring load - the computed MRT The Protection TE Metric (16-bit) part of the Ring TE Metric includes the following components: - the protection ring weight - the protection ring load - the computed MRT The Ring TE Metric TLV is encoded as: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type (TBD) | 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Working TE Metric | Protection TE Metric | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 7. Signaling Extensions in Ring Protected optical networks The signaling extensions are related to the following functions: - signalling of the working and the protected path from source ring node to the destination ring node - specific signaling extension in order to support drop-and-continue functionality; this is equivalent to define signalling extension for point-to-multipoint LSP Papadimitriou D. - Internet Draft - Expires May 2002 33 draft-papadimitriou-optical-rings-02.txt November 2001 Drop-and-continue function can be required when considering protected ring interconnection: - For dedicated-protection ring inter-connection: drop-and-continue function is used together with path selector function - For shared-protection ring inter-connection: drop-and-continue function is used together with service selector function - For both type of ring are inter-connected: drop-and-continued is used together with path selector function (dedicated-protection ring) and service selector function (shared-protection ring) 7.1 Intra-ring signalling extension When entering the ring, the signaling of the working and the protected channel need to be executed simultaneously. The principle defined for this purpose is to 'split' the signaling message (corresponding to the LSP create message) for the working and protected path through the corresponding signalling channel. For this purpose, the same technique as the one defined in [IPO-REST] can be applied. The proposed mechanism applied to emulated rings provides the suitable signalling extensions for the creation of backup LSP segments from the ingress to egress ring node when LSP protection is required. [IPO-MULT] proposes a more efficient mechanism to achieve this by considering the split of the physical optical signal. In that case, fast protection is provided for the 1+1 protected LSP. However, this technique applies only for unidirectional LSP protection rings. With this type of rings the optical signal is split on both wavelengths (fibers) at the transmission end. This results in two copies of the signal propagating the ring in opposite directions. The far-end (or receive-end) switches to the protection wavelength (or fiber) if a failure occurs. The proposed mechanism can restore a single link failure or a single node failure. When using 1+1 LSP protection, since the far-end (receiving end) does need to notify the near-end (transmitting end) of the failure, an O- APS signalling mechanism is not required. The decision is made at the far-end on an LSP-by-LSP basis. 7.2 Inter-ring signalling extension Inter-ring signalling extensions are considered for drop-and-continue ring inter-connection. In this case, the signalling message (i.e. the LSP create message) need to be continued meaning duplicated when reaching the primary destination node (far end) for that LSP. However only one LSP must be defined (in particular only one LSP segment needs to be defined from the ingress to egress ring nodes). Details concerning inter-ring signalling extensions are left for further study. Papadimitriou D. - Internet Draft - Expires May 2002 34 draft-papadimitriou-optical-rings-02.txt November 2001 8. Security Considerations Security considerations are left for further study. 9. References 1. [GMPLS-ARCH] E. Mannie et al., 'Generalized Multi-Protocol Label Switching (GMPLS) Architecture,' Internet Draft, draft-ietf-ccamp- gmpls-architecture-00.txt, July 2001. 2. [GMPLS-CRLDP] P. Ashwood-Smith, L. Berger et al., 'Generalized MPLS Signaling - CR-LDP Extensions,' Internet Draft, draft-ietf- mpls-generalized-cr-ldp-04.txt, July 2001. 3. [GMPLS-ISIS] K. Kompella et al., 'IS-IS Extensions in Support of Generalized MPLS,' Internet Draft, draft-kompella-isis-gmpls- extensions-04.txt, September 2001. 4. [GMPLS-OSPF] K. Kompella et al., 'OSPF Extensions in Support of Generalized MPLS,' Internet Draft, draft-ietf-ccamp-ospf-gmpls- extensions-00.txt, September 2001. 5. [GMPLS-RSVP] P. Ashwood-Smith, L. Berger et al., 'Generalized MPLS Signaling - RSVP-TE Extensions,' Internet Draft, draft-ietf-mpls- generalized-rsvp-te-05.txt, October 2001. 6. [GMPLS-SIG] P. Ashwood-Smith, L. Berger et al., 'Generalized MPLS Signaling - Signaling Functional Requirements,' Internet Draft, draft-ietf-mpls-generalized-signaling-06, October 2001. 7. [GMPLS-BUNDLE] K. Kompella et al., 'Link Bundling in MPLS Traffic Engineering,' Internet Draft, draft-kompella-mpls-bundle-05.txt, March 2001. 8. [IPO-OAPS] D.Guo, D. Papadimitriou et al., 'Optical Automatic Protection Switching - An IP-based Protocol', Work in Progress, draft-guo-optical-aps-00.txt, November 2001. 9. [IPO-BUNDLE] B. Rajagopalan et al., 'Link Bundling in Optical Networks,' Internet Draft, draft-rs-optical-bundling-01.txt, November 2000. 10. [IPO-FRAME] B. Rajagopalan et al., 'IP over Optical Networks: A Framework,' Internet Draft, draft-ietf-ip-optical-framework- 00.txt, July 2001. 11. [IPO-MPLS] D. Awduche et al., 'Multi-Protocol Lambda Switching: Combining MPLS Traffic Engineering Control With Optical Crossconnects,' Internet Draft, draft-awduche-mpls-te-optical- 03.txt, April 2001. Papadimitriou D. - Internet Draft - Expires May 2002 35 draft-papadimitriou-optical-rings-02.txt November 2001 12. [IPO-MULT] D. Papadimitriou et al., 'Optical Multicast - An Architectural Framework,' Internet Draft, draft-poj-optical- multicast-02.txt, November 2001. 13. [IPO-POES] D. Papadimitriou et al., 'Packet-Optical Escalation Strategies,' Internet Draft, draft-pbh-packet-optical-escalation- 01.txt, May 2001. 14. [IPO-REST] J. Hahm et al., 'Restoration Mechanisms and Signaling in Optical Networks,' Internet Draft, draft-many-optical- restoration-02.txt, February 2001. 15. [IPO-RFRM] N. Ghani et al., 'Architectural Framework for Automatic Protection Provisioning In Dynamic Optical Rings,' Internet Draft, draft-ghani-optical-rings-01.txt, March 2001. 16. [IPO-OMR] D. Guo et al, 'Hybrid Mesh-Ring Optical Networks,' Internet Draft, draft-guo-optical-mesh-rings, January 2001. 17. [IPO-SRLG] D. Papadimitriou et al., 'Inference of Shared Risk Link Groups,' Internet Draft, draft-many-inference-srlg-02.txt, November 2001. 18. [LMP] J. Lang et al., 'Link Management Protocol (LMP) v1.0', Internet Draft, Work in progress, draft-ietf-ccamp-lmp-02.txt, October 2001. 19. [LMP-WDM] A. Fredette et al., 'Link Management Protocol (LMP) for WDM Transmission Systems,' Internet Draft, draft-fredette- lmp-wdm-02.txt, July 2001. 20. [MPLS-CRLDP] B. Jamoussi et al., 'Constraint-Based LDP Setup using LDP,' Internet Draft, draft-ietf-mpls-cr-ldp-05.txt, March 2001. 21. [OPT-MWS] T. Stern and K. Bala, 'Multiwavelength Optical Network - A Layered Approach,' Addison Wesley Longman, Inc, May 1999. 22. [OPT-RINGS] G. Ellinas et al, 'Protection Cycles in Mesh WDM Networks,' IEEE Journal on Selected Areas in Communications, Volume 18, Number 10, October 2000. 23. [OSPF-TE] D. Katz and D. Yeung, "Traffic Engineering Extensions to OSPF,' Internet Draft, draft-katz-yeung-ospf-traffic-06.txt, September 2001. 24. [OSPF-IRTE] S. Venkatachalam et al, 'OSPF Extensions to Support Inter-Area Traffic Engineering,' Internet draft, draft- venkatachalam-ospf-traffic-00.txt, November 2000. 25. [RFC2328] J. Moy, 'OSPF Version 2,' Internet RFC - Standard Track, April 1998. Papadimitriou D. - Internet Draft - Expires May 2002 36 draft-papadimitriou-optical-rings-02.txt November 2001 26. [RFC2370] R. Coltun, 'The OSPF Opaque LSA Option,' Internet RFC 2370 - Standard Track, July 1998. 27. [SPT-DYN] P. Narvaez et al., 'New Dynamic Algorithms for Shortest Path Tree Computation,' IEEE/ACM Transactions on Networking, Volume 8, Number 6, December 2000. 10. Acknowledgments The authors would like to be thank Bernard Sales, Emmanuel Desmet, Hans De Neve, Fabrice Poppe, Stefan Ansorge, Katrien Skerra, Mathieu Garnot, Gert Grammel and Jim Jones for their constructive comments, suggestions and inputs. 11. Author's Addresses Dimitri Papadimitriou Alcatel Francis Wellesplein 1, B-2018 Antwerpen, Belgium Phone: +32 3 240-84-91 Email: Dimitri.Papadimitriou@alcatel.be Papadimitriou D. - Internet Draft - Expires May 2002 37 draft-papadimitriou-optical-rings-02.txt November 2001 Full Copyright Statement "Copyright (C) The Internet Society (date). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE." Papadimitriou D. - Internet Draft - Expires May 2002 38