< draft-ietf-ccamp-gmpls-general-constraints-ospf-te-05.txt | draft-ietf-ccamp-gmpls-general-constraints-ospf-te-07.txt > | |||
---|---|---|---|---|
Network work group Fatai Zhang | Network work group Fatai Zhang | |||
Internet Draft Young Lee | Internet Draft Young Lee | |||
Intended status: Standards Track Jianrui Han | Intended status: Standards Track Jianrui Han | |||
Huawei | Huawei | |||
G. Bernstein | G. Bernstein | |||
Grotto Networking | Grotto Networking | |||
Yunbin Xu | Yunbin Xu | |||
CATR | CATR | |||
Expires: December 26, 2013 June 26, 2013 | Expires: August 5, 2014 February 5, 2014 | |||
OSPF-TE Extensions for General Network Element Constraints | OSPF-TE Extensions for General Network Element Constraints | |||
draft-ietf-ccamp-gmpls-general-constraints-ospf-te-05.txt | draft-ietf-ccamp-gmpls-general-constraints-ospf-te-07.txt | |||
Status of this Memo | Status of this Memo | |||
This Internet-Draft is submitted to IETF in full conformance with | This Internet-Draft is submitted to IETF in full conformance with | |||
the provisions of BCP 78 and BCP 79. | the provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
Drafts. | Drafts. | |||
skipping to change at page 1, line 38 | skipping to change at page 1, line 38 | |||
months and may be updated, replaced, or obsoleted by other documents | months and may be updated, replaced, or obsoleted by other documents | |||
at any time. It is inappropriate to use Internet-Drafts as | at any time. It is inappropriate to use Internet-Drafts as | |||
reference material or to cite them other than as "work in progress." | reference material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
This Internet-Draft will expire on December 26, 2013. | This Internet-Draft will expire on August 5, 2014. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with | carefully, as they describe your rights and restrictions with | |||
respect to this document. Code Components extracted from this | respect to this document. Code Components extracted from this | |||
document must include Simplified BSD License text as described in | document must include Simplified BSD License text as described in | |||
Section 4.e of the Trust Legal Provisions and are provided without | Section 4.e of the Trust Legal Provisions and are provided without | |||
warranty as described in the Simplified BSD License. | warranty as described in the Simplified BSD License. | |||
Abstract | Abstract | |||
Generalized Multiprotocol Label Switching can be used to control a | Generalized Multiprotocol Label Switching (GMPLS) can be used to | |||
wide variety of technologies including packet switching (e.g., MPLS), | control a wide variety of technologies including packet switching | |||
time-division (e.g., SONET/SDH, OTN), wavelength (lambdas), and | (e.g., MPLS), time-division (e.g., SONET/SDH, Optical Transport | |||
spatial switching (e.g., incoming port or fiber to outgoing port or | Network (OTN)), wavelength (lambdas), and spatial switching (e.g., | |||
fiber). In some of these technologies network elements and links may | incoming port or fiber to outgoing port or fiber). In some of these | |||
impose additional routing constraints such as asymmetric switch | technologies, network elements and links may impose additional | |||
connectivity, non-local label assignment, and label range | routing constraints such as asymmetric switch connectivity, non- | |||
limitations on links. This document describes OSPF routing protocol | local label assignment, and label range limitations on links. This | |||
document describes Open Shortest Path First (OSPF) routing protocol | ||||
extensions to support these kinds of constraints under the control | extensions to support these kinds of constraints under the control | |||
of Generalized MPLS (GMPLS). | of GMPLS. | |||
Conventions used in this document | Conventions used in this document | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in RFC-2119 [RFC2119]. | document are to be interpreted as described in RFC-2119 [RFC2119]. | |||
Table of Contents | Table of Contents | |||
1. Introduction...................................................3 | 1. Introduction...................................................3 | |||
2. Node Information...............................................3 | 2. Node Information...............................................3 | |||
2.1. Connectivity Matrix.......................................4 | 2.1. Connectivity Matrix.......................................4 | |||
3. Link Information...............................................5 | 3. Link Information...............................................4 | |||
3.1. Port Label Restrictions...................................5 | 3.1. Port Label Restrictions...................................5 | |||
4. Routing Procedures.............................................6 | 4. Routing Procedures.............................................5 | |||
5. Scalability and Timeliness.....................................6 | 5. Scalability and Timeliness.....................................6 | |||
5.1. Different Sub-TLVs into Multiple LSAs.....................7 | 5.1. Different Sub-TLVs into Multiple LSAs.....................6 | |||
5.2. Decomposing a Connectivity Matrix into Multiple Matrices..7 | 5.2. Decomposing a Connectivity Matrix into Multiple Matrices..7 | |||
6. Security Considerations........................................7 | 6. Security Considerations........................................7 | |||
7. IANA Considerations............................................8 | 7. IANA Considerations............................................7 | |||
7.1. Node Information..........................................8 | 7.1. Node Information..........................................8 | |||
7.2. Link Information..........................................8 | 7.2. Link Information..........................................8 | |||
8. References.....................................................8 | 8. References.....................................................8 | |||
8.1. Normative References......................................8 | 8.1. Normative References......................................8 | |||
8.2. Informative References....................................9 | 8.2. Informative References....................................9 | |||
9. Authors' Addresses .............................................9 | 9. Authors' Addresses .............................................9 | |||
Acknowledgment...................................................11 | Acknowledgment...................................................11 | |||
1. Introduction | 1. Introduction | |||
Some data plane technologies that wish to make use of a GMPLS | Some data plane technologies that require the use of a GMPLS control | |||
control plane contain additional constraints on switching capability | plane impose additional constraints on switching capability and | |||
and label assignment. In addition, some of these technologies should | label assignment. In addition, some of these technologies should be | |||
be capable of performing non-local label assignment based on the | capable of performing non-local label assignment based on the nature | |||
nature of the technology, e.g., wavelength continuity constraint in | of the technology, e.g., wavelength continuity constraint in | |||
WSON [RFC6163]. Such constraints can lead to the requirement for | Wavelength Switched Optical Network (WSON) [RFC6163]. Such | |||
link by link label availability in path computation and label | constraints can lead to the requirement for link by link label | |||
assignment. | availability in path computation and label assignment. | |||
[GEN-Encode] provides efficient encodings of information needed by | [GEN-Encode] provides efficient encodings of information needed by | |||
the routing and label assignment process in technologies such as | the routing and label assignment process in technologies such as | |||
WSON and are potentially applicable to a wider range of | WSON and are potentially applicable to a wider range of | |||
technologies. | technologies. The encoding provided in [GEN-Encode] is protocol- | |||
neutral and can be used in routing, signaling and/or Path | ||||
Computation Element communication protocol extensions. | ||||
This document defines extensions to the OSPF routing protocol based | This document defines extensions to the OSPF routing protocol based | |||
on [GEN-Encode] to enhance the Traffic Engineering (TE) properties | on [GEN-Encode] to enhance the Traffic Engineering (TE) properties | |||
of GMPLS TE which are defined in [RFC3630], [RFC4202], and [RFC4203]. | of GMPLS TE which are defined in [RFC3630], [RFC4202], and [RFC4203]. | |||
The enhancements to the Traffic Engineering (TE) properties of GMPLS | The enhancements to the TE properties of GMPLS TE links can be | |||
TE links can be announced in OSPF TE LSAs. The TE LSA, which is an | advertised in OSPF TE LSAs. The TE LSA, which is an opaque LSA with | |||
opaque LSA with area flooding scope [RFC3630], has only one top- | area flooding scope [RFC3630], has only one top-level | |||
level Type/Length/Value (TLV) triplet and has one or more nested | Type/Length/Value (TLV) triplet and has one or more nested sub-TLVs | |||
sub-TLVs for extensibility. The top-level TLV can take one of three | for extensibility. The top-level TLV can take one of three values (1) | |||
values (1) Router Address [RFC3630], (2) Link [RFC3630], (3) Generic | Router Address [RFC3630], (2) Link [RFC3630], (3) Node Attribute | |||
Node Attribute defined in Section 2. In this document, we enhance | defined in Section 2. In this document, we enhance the sub-TLVs for | |||
the sub-TLVs for the Link TLV and define a new top-level TLV | the Link TLV in support of the general network element constraints | |||
(Generic Node Attribute TLV) in support of the general network | under the control of GMPLS. | |||
element constraints under the control of GMPLS. | ||||
The detailed encoding of OSPF extensions are not defined in this | The detailed encoding of OSPF extensions are not defined in this | |||
document. [GEN-Encode] provides encoding detail. | document. [GEN-Encode] provides encoding details. | |||
2. Node Information | 2. Node Information | |||
According to [GEN-Encode], the additional node information | According to [GEN-Encode], the additional node information | |||
representing node switching asymmetry constraints includes Node ID, | representing node switching asymmetry constraints includes Node ID | |||
connectivity matrix. Except for the Node ID which should comply with | and connectivity matrix. Except for the Node ID, which should comply | |||
Routing Address described in [RFC3630], the other pieces of | with Routing Address described in [RFC3630], the other pieces of | |||
information are defined in this document. | information are defined in this document. | |||
This document defines a new top TLV named the Generic Node Attribute | ||||
TLV which carries attributes related to a general network element. | ||||
This Generic Node Attribute TLV contains one or more sub-TLVs | ||||
Per [GEN-Encode], we have identified the following new Sub-TLVs to | Per [GEN-Encode], we have identified the following new Sub-TLVs to | |||
the Generic Node Attribute TLV. Detail description for each newly | the Node Attribute TLV as defined in [RFC5786]. Detailed description | |||
defined Sub-TLV is provided in subsequent sections: | for each newly defined Sub-TLV is provided in subsequent sections: | |||
Sub-TLV Type Length Name | Sub-TLV Type Length Name | |||
TBD variable Connectivity Matrix | 14 (Suggested) variable Connectivity Matrix | |||
In some specific technologies, e.g., WSON networks, Connectivity | In some specific technologies, e.g., WSON networks, the Connectivity | |||
Matrix sub-TLV may be optional, which depends on the control plane | Matrix sub-TLV may be optional, which depends on the control plane | |||
implementations. Usually, for example, in WSON networks, | implementations. Usually, for example, in WSON networks, | |||
Connectivity Matrix sub-TLV may appear in the LSAs because WSON | Connectivity Matrix sub-TLV may be advertised in the LSAs since WSON | |||
switches are asymmetric at present. It is assumed that the switches | switches are currently asymmetric. If no Connectivity Matrix sub-TLV | |||
are symmetric switching, if there is no Connectivity Matrix sub-TLV | is included, it is assumed that the switches support symmetric | |||
in the LSAs. | switching. | |||
2.1. Connectivity Matrix | 2.1. Connectivity Matrix | |||
It is necessary to identify which ingress ports and labels can be | If the switching devices supporting certain data plane technology is | |||
switched to some specific labels on a specific egress port, if the | asymmetric, it is necessary to identify which input ports and labels | |||
switching devices in some technology are highly asymmetric. | can be switched to some specific labels on a specific output port. | |||
The Connectivity Matrix is used to identify these restrictions, | The Connectivity Matrix is used to identify these restrictions, | |||
which can represent either the potential connectivity matrix for | which can represent either the potential connectivity matrix for | |||
asymmetric switches (e.g. ROADMs and such) or fixed connectivity for | asymmetric switches (e.g., ROADMs and such) or fixed connectivity | |||
an asymmetric device such as a multiplexer as defined in [WSON- | for an asymmetric device such as a multiplexer as defined in [WSON- | |||
Info]. | Info]. | |||
The Connectivity Matrix is a sub-TLV (the type is TBD by IANA) of | The Connectivity Matrix is a sub-TLV of the Node Attribute TLV. The | |||
the Generic Node Attribute TLV. The length is the length of value | length is the length of value field in octets. The meaning and | |||
field in octets. The meaning and format of this sub-TLV are defined | format of this sub-TLV value field are defined in Section 2.1 of | |||
in Section 5.3 of [GEN-Encode]. One sub-TLV contains one matrix. The | [GEN-Encode]. One sub-TLV contains one matrix. The Connectivity | |||
Connectivity Matrix sub-TLV may occur more than once to contain | Matrix sub-TLV may occur more than once to contain multiple matrices | |||
multi-matrices within the Generic Node Attribute TLV. In addition a | within the Node Attribute TLV. In addition a large connectivity | |||
large connectivity matrix can be decomposed into smaller separate | matrix can be decomposed into smaller sub-matrices for transmission | |||
matrices for transmission in multiple LSAs as described in Section 5. | in multiple LSAs as described in Section 5. | |||
3. Link Information | 3. Link Information | |||
The most common link sub-TLVs nested to link top-level TLV are | The most common link sub-TLVs nested in the top-level link TLV are | |||
already defined in [RFC3630], [RFC4203]. For example, Link ID, | already defined in [RFC3630], [RFC4203]. For example, Link ID, | |||
Administrative Group, Interface Switching Capability Descriptor | Administrative Group, Interface Switching Capability Descriptor | |||
(ISCD), Link Protection Type, Shared Risk Link Group Information | (ISCD), Link Protection Type, Shared Risk Link Group Information | |||
(SRLG), and Traffic Engineering Metric are among the typical link | (SRLG), and Traffic Engineering Metric are among the typical link | |||
sub-TLVs. | sub-TLVs. | |||
Per [GEN-Encode], we add the following additional link sub-TLVs to | Per [GEN-Encode], we add the following additional link sub-TLVs to | |||
the link-TLV in this document. | the link TLV in this document. | |||
Sub-TLV Type Length Name | Sub-TLV Type Length Name | |||
TBD variable Port Label Restrictions | 26 (suggested) variable Port Label Restrictions | |||
Generally all the sub-TLVs above are optional, which depends on the | Generally all the sub-TLVs above are optional, which depends on the | |||
control plane implementations. If it is default no restrictions on | control plane implementations. The Port Label Restrictions sub-TLV | |||
labels, Port Label Restrictions sub-TLV may not appear in the LSAs. | will not be advertised when there are no restrictions on label | |||
assignment. | ||||
3.1. Port Label Restrictions | 3.1. Port Label Restrictions | |||
Port label restrictions describe the label restrictions that the | Port label restrictions describe the label restrictions that the | |||
network element (node) and link may impose on a port. These | network element (node) and link may impose on a port. These | |||
restrictions represent what labels may or may not be used on a link | restrictions represent what labels may or may not be used on a link | |||
and are intended to be relatively static. More dynamic information | and are intended to be relatively static. For increased modeling | |||
is contained in the information on available labels. Port label | flexibility, port label restrictions may be specified relative to | |||
restrictions are specified relative to the port in general or to a | the port in general or to a specific connectivity matrix. | |||
specific connectivity matrix for increased modeling flexibility. | ||||
For example, Port Label Restrictions describes the wavelength | For example, the Port Label Restrictions describes the wavelength | |||
restrictions that the link and various optical devices such as OXCs, | restrictions that the link and various optical devices such as OXCs, | |||
ROADMs, and waveband multiplexers may impose on a port in WSON. | ROADMs, and waveband multiplexers may impose on a port in WSON. | |||
These restrictions represent what wavelength may or may not be used | These restrictions represent what wavelength may or may not be used | |||
on a link and are relatively static. The detailed information about | on a link and are relatively static. The detailed information about | |||
Port label restrictions is described in [WSON-Info]. | port label restrictions is described in [WSON-Info]. | |||
The Port Label Restrictions is a sub-TLV (the type is TBD by IANA) | The Port Label Restrictions sub-TLV is a sub-TLV of the Link TLV. | |||
of the Link TLV. The length is the length of value field in octets. | The length is the length of value field in octets. The meaning and | |||
The meaning and format of this sub-TLV are defined in Section 5.4 of | format of this sub-TLV value field are defined in Section 2.2 of | |||
[GEN-Encode]. The Port Label Restrictions sub-TLV may occur more | [GEN-Encode]. The Port Label Restrictions sub-TLV may occur more | |||
than once to specify a complex port constraint within the link TLV. | than once to specify a complex port constraint within the link TLV. | |||
4. Routing Procedures | 4. Routing Procedures | |||
All the sub-TLVs are nested to top-level TLV(s) and contained in | All the sub-TLVs are nested in top-level TLV(s) and contained in | |||
Opaque LSAs. The flooding of Opaque LSAs must follow the rules | Opaque LSAs. The flooding rules of Opaque LSAs are specified in | |||
specified in [RFC2328], [RFC5250], [RFC3630], [RFC4203]. | [RFC2328], [RFC5250], [RFC3630], and [RFC4203]. | |||
Considering the routing scalability issues in some cases, the | Considering the routing scalability issues in some cases, the | |||
routing protocol should be capable of supporting the separation of | routing protocol should be capable of supporting the separation of | |||
dynamic information from relatively static information to avoid | dynamic information from relatively static information to avoid | |||
unnecessary updates of static information when dynamic information | unnecessary updates of static information when dynamic information | |||
is changed. A standard-compliant approach is to separate the dynamic | is changed. A standards-compliant approach is to separate the | |||
information sub-TLVs from the static information sub-TLVs, each | dynamic information sub-TLVs from the static information sub-TLVs, | |||
nested to top-level TLV ([RFC3630 and RFC5876]), and advertise them | each nested in a separate top-level TLV ([RFC3630 and RFC5876]), and | |||
in the separate OSPF TE LSAs. | advertise them in the separate OSPF TE LSAs. | |||
For node information, since the Connectivity Matrix information is | For node information, since the Connectivity Matrix information is | |||
static, the LSA containing the Generic Node Attribute TLV can be | static, the LSA containing the Node Attribute TLV can be updated | |||
updated with a lower frequency to avoid unnecessary updates. | with a lower frequency to avoid unnecessary updates. | |||
For link information, a mechanism MAY be applied such that static | For link information, a mechanism MAY be applied such that static | |||
information and dynamic information of one TE link are contained in | information and dynamic information of one TE link are contained in | |||
separate Opaque LSAs. For example, the Port Label Restrictions | separate Opaque LSAs. For example, the Port Label Restrictions | |||
information sub-TLV could be nested to the top level link TLVs and | information sub-TLV could be nested in separate top level link TLVs | |||
advertised in the separate LSAs. | and advertised in the separate LSAs. | |||
Note that as with other TE information, an implementation SHOULD | As with other TE information, an implementation typically takes | |||
take measures to avoid rapid and frequent updates of routing | measures to avoid rapid and frequent updates of routing information | |||
information that could cause the routing network to become swamped. | that could cause the routing network to become swamped. See | |||
A threshold mechanism MAY be applied such that updates are only | [RFC3630] Section 3 for related details. | |||
flooded when a number of changes have been made to the label | ||||
availability information (e.g., wavelength availability) within a | ||||
specific time. Such mechanisms MUST be configurable if they are | ||||
implemented. | ||||
5. Scalability and Timeliness | 5. Scalability and Timeliness | |||
This document has defined four sub-TLVs for describing generic | This document has defined two sub-TLVs for describing generic | |||
routing contraints. The examples given in [Gen-Encode] show that | routing contraints. The examples given in [GEN-Encode] show that | |||
very large systems, in terms of label count or ports can be very | very large systems, in terms of label count or ports, can be very | |||
efficiently encoded. However there has been concern expressed that | efficiently encoded. However there has been concern expressed that | |||
some possible systems may produce LSAs that exceed the IP Maximum | some possible systems may produce LSAs that exceed the IP Maximum | |||
Transmission Unit (MTU) and that methods be given to allow for the | Transmission Unit (MTU) and that methods be given to allow for the | |||
splitting of general constraint LSAs into smaller LSA that are under | splitting of general constraint LSAs into smaller LSAs that are | |||
the MTU limit. This section presents a set of techniques that can be | under the MTU limit. This section presents a set of techniques that | |||
used for this purpose. | can be used for this purpose. | |||
5.1. Different Sub-TLVs into Multiple LSAs | 5.1. Different Sub-TLVs into Multiple LSAs | |||
Two sub-TLVs are defined in this document: | Two sub-TLVs are defined in this document: | |||
1. Connectivity Matrix (Generic Node Attribute TLV) | 1. Connectivity Matrix (Node Attribute TLV) | |||
2. Port Label Restrictions (Link TLV) | 2. Port Label Restrictions (Link TLV) | |||
Except for the Connectivity Matrix all these are carried in an Link | The Connectivity Matrix can be carried in the Node Attribute TLV as | |||
TLV of which there can be at most one in an LSA [RFC3630]. Of these | defined in [RFC5786] while the Port Label Restrictions can be | |||
sub-TLVs the Port Label Restrictions are relatively static, i.e., | carried in an Link TLV of which there can be at most one in an LSA | |||
only would change with hardware changes or significant system | as defined in [RFC3630]. Note that the Port Label Restrictions are | |||
reconfiguration. | relatively static, i.e., only would change with hardware changes or | |||
significant system reconfiguration. | ||||
5.2. Decomposing a Connectivity Matrix into Multiple Matrices | 5.2. Decomposing a Connectivity Matrix into Multiple Matrices | |||
In the highly unlikely event that a Connectivity matrix sub-TLV by | In the highly unlikely event that a Connectivity Matrix sub-TLV by | |||
itself would result in an LSA exceeding the MTU, a single large | itself would result in an LSA exceeding the MTU, a single large | |||
matrix can be decomposed into sub-matrices. Per [GEN-Encode] a | matrix can be decomposed into sub-matrices. Per [GEN-Encode] a | |||
connectivity matrix just consists of pairs of input and output ports | connectivity matrix just consists of pairs of input and output ports | |||
that can reach each other and hence such this decomposition would be | that can reach each other and hence such this decomposition would be | |||
straightforward. Each of these sub-matrices would get a unique | straightforward. Each of these sub-matrices would get a unique | |||
matrix identifier per [GEN-Encode]. | matrix identifier per [GEN-Encode]. | |||
From the point of view of a path computation process, prior to | From the point of view of a path computation process, prior to | |||
receiving an LSA with a Connectivity Matrix sub-TLV, no connectivity | receiving an LSA with a Connectivity Matrix sub-TLV, no connectivity | |||
restrictions are assumed, i.e., the standard GMPLS assumption of any | restrictions are assumed, i.e., the standard GMPLS assumption of any | |||
skipping to change at page 7, line 44 | skipping to change at page 7, line 31 | |||
sub-TLVs received to understand the complete connectivity potential | sub-TLVs received to understand the complete connectivity potential | |||
of the system. Prior to receiving any Connectivity Matrix sub-TLVs | of the system. Prior to receiving any Connectivity Matrix sub-TLVs | |||
path computation may compute a path through the system when in fact | path computation may compute a path through the system when in fact | |||
no path exists. In between the reception of an additional | no path exists. In between the reception of an additional | |||
Connectivity Matrix sub-TLV path computation may not be able to find | Connectivity Matrix sub-TLV path computation may not be able to find | |||
a path through the system when one actually exists. Both cases are | a path through the system when one actually exists. Both cases are | |||
currently encountered and handled with existing GMPLS mechanisms. | currently encountered and handled with existing GMPLS mechanisms. | |||
Due to the reliability mechanisms in OSPF the phenomena of late or | Due to the reliability mechanisms in OSPF the phenomena of late or | |||
missing Connectivity Matrix sub-TLVs would be relatively rare. | missing Connectivity Matrix sub-TLVs would be relatively rare. | |||
In case where the new sub-TLVs or their attendant encodings are | ||||
malformed, the proper action would be to log the problem and ignore | ||||
just the sub-TLVs in GMPLS path computations rather than ignoring | ||||
the entire LSA. | ||||
6. Security Considerations | 6. Security Considerations | |||
This document does not introduce any further security issues other | This document does not introduce any further security issues other | |||
than those discussed in [RFC 3630], [RFC 4203]. | than those discussed in [RFC 3630], [RFC 4203]. | |||
7. IANA Considerations | For general security aspects relevant to Generalized Multiprotocol | |||
Label Switching (GMPLS)-controlled networks, please refer to | ||||
[RFC5920]. | ||||
[RFC3630] says that the top level Types in a TE LSA and Types for | 7. IANA Considerations | |||
sub-TLVs for each top level Types must be assigned by Expert Review, | ||||
and must be registered with IANA. | ||||
IANA is requested to allocate new Types for the TLV or sub-TLVs as | IANA is requested to allocate new sub-TLVs as defined in Sections 2 | |||
defined in Sections 2 and 3 as follows: | and 3 as follows: | |||
7.1. Node Information | 7.1. Node Information | |||
This document introduces a new Top Level Node TLV (Generic Node | This document defines a new sub-TLV of the Node Attribute TLV (Value | |||
Attribute TLV) under the OSPF TE LSA defined in [RFC3630]. | 5). The assignment of the following new type in the "Types for sub- | |||
TLVs of TE Node Attribute TLV" portion of the "Open Shortest Path | ||||
Value TLV Type | First (OSPF) Traffic Engineering TLVs" registry is needed: | |||
TBA Generic Node Attribute | ||||
This document also introduces the following sub-TLVs of Generic Node | This document introduces the following sub-TLVs of Node Attribute | |||
Attribute TLV: | TLV (Value 5): | |||
Type sub-TLV | Type sub-TLV | |||
TBD Connectivity Matrix | 14 (suggested, to be assigned by IANA) Connectivity Matrix | |||
7.2. Link Information | 7.2. Link Information | |||
This document introduces the following sub-TLV of TE Link TLV (Value | This document defines a new sub-TLV of the TE Link TLV (Value 2). | |||
2): | The assignment of the following new type in the "Types for sub-TLVs | |||
of TE Link TLV" portion of the "Open Shortest Path First (OSPF) | ||||
Traffic Engineering TLVs" registry is needed: | ||||
Type sub-TLV | Type sub-TLV | |||
TBD Port Label Restrictions | 26 (suggested, to be assigned by IANA) Port Label Restrictions | |||
8. References | 8. References | |||
8.1. Normative References | 8.1. Normative References | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
[RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998. | [RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998. | |||
[RFC5250] L. Berger, I. Bryskin, A. Zinin, R. Coltun "The OSPF | ||||
Opaque LSA Option", RFC 5250, July 2008. | ||||
[RFC3630] Katz, D., Kompella, K., and Yeung, D., "Traffic | [RFC3630] Katz, D., Kompella, K., and Yeung, D., "Traffic | |||
Engineering (TE) Extensions to OSPF Version 2", RFC 3630, | Engineering (TE) Extensions to OSPF Version 2", RFC 3630, | |||
September 2003. | September 2003. | |||
[RFC4202] Kompella, K., Ed., and Y. Rekhter, Ed., "Routing | [RFC4202] Kompella, K., Ed., and Y. Rekhter, Ed., "Routing | |||
Extensions in Support of Generalized Multi-Protocol Label | Extensions in Support of Generalized Multi-Protocol Label | |||
Switching (GMPLS)", RFC 4202, October 2005 | Switching (GMPLS)", RFC 4202, October 2005 | |||
[RFC4203] Kompella, K., Ed., and Y. Rekhter, Ed., "OSPF Extensions | [RFC4203] Kompella, K., Ed., and Y. Rekhter, Ed., "OSPF Extensions | |||
in Support of Generalized Multi-Protocol Label Switching | in Support of Generalized Multi-Protocol Label Switching | |||
(GMPLS)", RFC 4203, October 2005. | (GMPLS)", RFC 4203, October 2005. | |||
[GEN-Encode] G. Bernstein, Y. Lee, D. Li, W. Imajuku, " General | [RFC5250] L. Berger, I. Bryskin, A. Zinin, R. Coltun "The OSPF | |||
Network Element Constraint Encoding for GMPLS Controlled | Opaque LSA Option", RFC 5250, July 2008. | |||
Networks", work in progress: draft-ietf-ccamp-general- | ||||
constraint-encode. | ||||
[RFC6205] T. Otani, H. Guo, K. Miyazaki, D. Caviglia, " Generalized | [RFC5786] R. Aggarwal and K. Kompella,"Advertising a Router's Local | |||
Labels for Lambda-Switching Capable Label Switching | Addresses in OSPF Traffic Engineering (TE) Extensions", | |||
Routers", RFC 6205, January 2011. | RFC 5786, March 2010.[GEN-Encode] G. Bernstein, Y. Lee, D. | |||
Li, W. Imajuku, " General Network Element Constraint | ||||
Encoding for GMPLS Controlled Networks", work in progress: | ||||
draft-ietf-ccamp-general-constraint-encode. | ||||
8.2. Informative References | 8.2. Informative References | |||
[RFC6163] Y. Lee, G. Bernstein, W. Imajuku, "Framework for GMPLS and | [RFC6163] Y. Lee, G. Bernstein, W. Imajuku, "Framework for GMPLS and | |||
PCE Control of Wavelength Switched Optical Networks | PCE Control of Wavelength Switched Optical Networks | |||
(WSON)", RFC 6163, February 2011. | (WSON)", RFC 6163, February 2011. | |||
[WSON-Info] Y. Lee, G. Bernstein, D. Li, W. Imajuku, "Routing and | [WSON-Info] Y. Lee, G. Bernstein, D. Li, W. Imajuku, "Routing and | |||
Wavelength Assignment Information Model for Wavelength | Wavelength Assignment Information Model for Wavelength | |||
Switched Optical Networks", work in progress: draft-ietf- | Switched Optical Networks", work in progress: draft-ietf- | |||
ccamp-rwa-info. | ccamp-rwa-info. | |||
[RFC5920] L. Fang, Ed., "Security Framework for MPLS and GMPLS | ||||
Networks", RFC 5920, July 2010. | ||||
9. Authors' Addresses | 9. Authors' Addresses | |||
Fatai Zhang | Fatai Zhang | |||
Huawei Technologies | Huawei Technologies | |||
F3-5-B R&D Center, Huawei Base | F3-5-B R&D Center, Huawei Base | |||
Bantian, Longgang District | Bantian, Longgang District | |||
Shenzhen 518129 P.R.China | Shenzhen 518129 P.R.China | |||
Phone: +86-755-28972912 | Phone: +86-755-28972912 | |||
Email: zhangfatai@huawei.com | Email: zhangfatai@huawei.com | |||
Young Lee | Young Lee | |||
Huawei Technologies | Huawei Technologies | |||
1700 Alma Drive, Suite 100 | 5360 Legacy Drive, Building 3 | |||
Plano, TX 75075 | Plano, TX 75023 | |||
USA | USA | |||
Phone: (469)277-5838 | ||||
Phone: (972) 509-5599 (x2240) | Email: leeyoung@huawei.com | |||
Email: ylee@huawei.com | ||||
Jianrui Han | Jianrui Han | |||
Huawei Technologies Co., Ltd. | Huawei Technologies Co., Ltd. | |||
F3-5-B R&D Center, Huawei Base | F3-5-B R&D Center, Huawei Base | |||
Bantian, Longgang District | Bantian, Longgang District | |||
Shenzhen 518129 P.R.China | Shenzhen 518129 P.R.China | |||
Phone: +86-755-28977943 | Phone: +86-755-28977943 | |||
Email: hanjianrui@huawei.com | Email: hanjianrui@huawei.com | |||
skipping to change at page 12, line 32 | skipping to change at page 12, line 22 | |||
any standard or specification contained in an IETF Document. Please | any standard or specification contained in an IETF Document. Please | |||
address the information to the IETF at ietf-ipr@ietf.org. | address the information to the IETF at ietf-ipr@ietf.org. | |||
The definitive version of an IETF Document is that published by, or | The definitive version of an IETF Document is that published by, or | |||
under the auspices of, the IETF. Versions of IETF Documents that are | under the auspices of, the IETF. Versions of IETF Documents that are | |||
published by third parties, including those that are translated into | published by third parties, including those that are translated into | |||
other languages, should not be considered to be definitive versions | other languages, should not be considered to be definitive versions | |||
of IETF Documents. The definitive version of these Legal Provisions | of IETF Documents. The definitive version of these Legal Provisions | |||
is that published by, or under the auspices of, the IETF. Versions | is that published by, or under the auspices of, the IETF. Versions | |||
of these Legal Provisions that are published by third parties, | of these Legal Provisions that are published by third parties, | |||
including those that are translated into other languages, should | including those that are translated into other languages, should not | |||
not be considered to be definitive versions of these Legal | be considered to be definitive versions of these Legal Provisions. | |||
Provisions. | ||||
For the avoidance of doubt, each Contributor to the IETF Standards | For the avoidance of doubt, each Contributor to the IETF Standards | |||
Process licenses each Contribution that he or she makes as part of | Process licenses each Contribution that he or she makes as part of | |||
the IETF Standards Process to the IETF Trust pursuant to the | the IETF Standards Process to the IETF Trust pursuant to the | |||
provisions of RFC 5378. No language to the contrary, or terms, | provisions of RFC 5378. No language to the contrary, or terms, | |||
conditions or rights that differ from or are inconsistent with the | conditions or rights that differ from or are inconsistent with the | |||
rights and licenses granted under RFC 5378, shall have any effect | rights and licenses granted under RFC 5378, shall have any effect | |||
and shall be null and void, whether published or posted by such | and shall be null and void, whether published or posted by such | |||
Contributor, or included with or in such Contribution. | Contributor, or included with or in such Contribution. | |||
Disclaimer of Validity | Disclaimer of Validity | |||
All IETF Documents and the information contained therein are | All IETF Documents and the information contained therein are | |||
provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION | provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION | |||
HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET | HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, | |||
SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE | THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL | |||
DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT | WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY | |||
LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN | WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE | |||
WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF | ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS | |||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | FOR A PARTICULAR PURPOSE. | |||
Full Copyright Statement | Full Copyright Statement | |||
Copyright (c) 2010 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with | carefully, as they describe your rights and restrictions with | |||
respect to this document. Code Components extracted from this | respect to this document. Code Components extracted from this | |||
document must include Simplified BSD License text as described in | document must include Simplified BSD License text as described in | |||
Section 4.e of the Trust Legal Provisions and are provided without | Section 4.e of the Trust Legal Provisions and are provided without | |||
End of changes. 60 change blocks. | ||||
155 lines changed or deleted | 153 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://www.tools.ietf.org/tools/rfcdiff/ |