Network Working Group K. Kompella (Juniper Networks)
Internet Draft Y. Rekhter (Cisco Systems)
Expiration Date: March 2001 A. Banerjee (Calient Networks)
J. Drake (Calient Networks)
G. Bernstein (Ciena)
D. Fedyk (Nortel Networks)
E. Mannie (GTS Network)
D. Saha (Tellium)
V. Sharma (Tellabs)
IS-IS Extensions in Support of Generalized MPLS
draft-ietf-isis-gmpls-extensions-00.txt
1. Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as ``work in progress.''
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
draft-ietf-isis-gmpls-extensions-00.txt [Page 1]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
2. Abstract
This document specifies extensions to the IS-IS routing protocol in
support of Generalized Multi-Protocol Label Switching (previously
known as Multi-Protocol Lambda Switching).
3. Introduction
This document specifies extensions to the IS-IS routing protocol in
support of carrying link state information for Generalized Multi-
Protocol Label Switching (GMPLS, previously known as Multi-Protocol
Lambda Switching, MPL(ambda)S). For motivations and overall
architecture of MPL(ambda)S see [1]. The set of required
enhancements to IS-IS are outlined in [2]. This document enhances
the routing extensions [3] required to support MPLS Traffic
Engineering. Some of these enhancements also need to be carried in
the signaling protocols [6].
The organization of the remainder of the document is as follows. In
Section 4, we describe the types of links that may be advertised in
IS-IS TE LSAs (we call Link State PDUs LSAs to avoid confusion with
Label Switched Paths). In Section 5, we define a new set of
Type/Length/Value (TLV) triplets, as well as extend a proposed TLV,
and describe their formats.
4. GMPLS Links
In this section we describe the various types of links that can be
announced in IS-IS TE LSAs, namely, normal links, non-packet links,
and forwarding adjacencies.
4.1. Normal links
If the nodes on both ends of a link can send and receive on a packet-
by-packet basis, this link is a normal link. Control packets (IS-IS
protocol packets and signaling packets) and data packets can be sent
over the link, so nothing special needs to be done.
4.2. Non-packet links
If either node on the end of a bi-directional link cannot
multiplex/demultiplex individual packets on that link (see [5]) then
that link cannot be used for sending IS-IS hellos and LSAs. In this
case, a proxy control channel is needed for sending and receiving
draft-ietf-isis-gmpls-extensions-00.txt [Page 2]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
control packets. From IS-IS's point of view, the combination of the
data link (in the context of this document, a non-packet link is also
called a bearer channel) and the control channel is a single link;
the TE attributes associated with this link are those of the bearer
channel, but are sent over the control channel.
The association of a bearer channel with a control channel is by
configuration. Note that for a bearer channel D to be associated
with a control channel C, D and C should have the same end points,
and that the same association must be made at both ends. The means
by which it is verified that the two ends have the same associations
is outside the scope of this document, however, see [7].
If there are several non-packet links between the same pair of nodes,
the associated control channels may be logical interfaces over the
same physical control link.
4.2.1. Excluding data traffic from control channels
The control channels between nodes in a GMPLS network, such as
optical cross-connects (OXCs) (see [1], [2]), SONET cross-connects
and/or routers, are generally meant for control and administrative
traffic. These control channels are advertised into IS-IS as normal
IS links as mentioned in the previous section; this allows the
routing of (for example) RSVP messages and telnet sessions. However,
if routers on the edge of the optical domain attempt to forward data
traffic over these channels, the channel capacity will quickly be
exhausted.
If one assumes that data traffic is sent to BGP destinations, and
control traffic to IGP destinations, then one can exclude data
traffic from the control plane by restricting BGP nexthop resolution.
(It is assumed that OXCs are not BGP speakers.) Suppose that a
router R is attempting to install a route to a BGP destination D. R
looks up the BGP nexthop for D in its IGP's routing table. Say R
finds that the path to the nexthop is over interface I. R then
checks if it has an entry in its Link State database associated with
the interface I. If it does, and the link is not packet-switch
capable (see [5]), R installs a discard route for destination D.
Otherwise, R installs (as usual) a route for destination D with
nexthop I. Note that R need only do this check if it has packet-
switch incapable links; if all of its links are packet-switch
capable, then clearly this check is redundant.
Other techniques for excluding data traffic from control channels may
also be needed.
draft-ietf-isis-gmpls-extensions-00.txt [Page 3]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
4.3. Forwarding Adjacency
An LSR uses MPLS TE procedures to create and maintain an LSP. The
LSR then may (under its local configuration control) to announce this
LSP as a link into IS-IS. When this link is advertised into the same
instance of IS-IS as the one that determines the route taken by the
LSP, we call such a link a "forwarding adjacency" (FA). For details
about FAs (for example, their TE properties, the methodology for
their use in constrained SPF path computation, etc) see [5].
4.4. Link Bundling
For each type of link just described, it is possible to "bundle"
several links together, i.e., treat them as a single link from IS-
IS's point of view. For example, several normal links can be
advertised as a single normal link.
The mechanisms for bundling, including the restrictions on when links
can be bundled and the TE attributes of the bundle are described in
[4].
5. IS-IS Routing Enhancements
In this section we define the routing enhancements on the various
types of links that can be announced in IS-IS TE LSAs, namely, normal
links, non-packet links, and forwarding adjacencies. In this
document, we enhance the sub-TLVs for the extended IS reachability
TLV (see [3]) in support of GMPLS. Specifically, we add the
following sub-TLV:
Sub-TLV Type Length Name
20 1 Link Protection Type
We further add two new TLVs.
TLV Type Length Name
136 (TBD) variable Link Descriptor
138 (TBD) variable Shared Risk Link Group
draft-ietf-isis-gmpls-extensions-00.txt [Page 4]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
5.1. Link Protection Type sub-TLV
The Link Protection Type sub-TLV represents the protection capability
that exists on a link. It is desirable to carry this information so
that it may be used by the path computation algorithm to set up LSPs
with appropriate protection characteristics. This is a sub-TLV (of
type 20) of the extended IS reachability TLV (type 22) as defined in
[3].
If the link has 1+1 protection, it means that a disjoint backup
bearer channel is reserved and dedicated for protecting the primary
bearer channel. This backup bearer channel is not shared by any
other connection, and traffic is duplicated and carried
simultaneously over both channels.
If the link has 1:N protection, it means that for N primary bearer
channels, there is one disjoint backup bearer channel reserved to
carry the traffic. Additionally, the protection bearer channel MAY
carry low-priority preemptable traffic. The bandwidth of backup
bearer channels will be announced in the unreserved bandwidth sub-TLV
at the appropriate priority.
If the link has ring protection, it means that the primary bearer
channel is protected by the presence of an alternate link possibly
using other links and nodes in the network.
The Link Protection Type sub-TLV has a length of two octets, the
first of which can take one of the following values:
Value Link Protection Type
0 Reserved (see signaling draft [6])
1 None
2 1+1
3 1:N
4 Ring
The second octet gives a priority value, such that a new connection
with a priority value higher than this value is guaranteed to be
setup on a primary (or working) channel, and not on a secondary (or
protect) channel.
The Link Protection Type sub-TLV is optional and if an LSA does not
carry the TLV, then the Link Protection Type is unknown.
draft-ietf-isis-gmpls-extensions-00.txt [Page 5]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
5.2. Link Descriptor TLV
The Link Descriptor TLV represents the characteristics of the link,
in particular the link type and the bit transmission rate. These
characteristics represent one of the constraints on the type of LSPs
that could be carried over a link.
These characteristics should not be confused with the physical link
encoding or multiplex structure (if any). For example there are
systems where four OC-48s are switched and transported over a single
fiber via wavelength division multiplexing (WDM) technology. There
are systems where four OC-48s are transported in a transparent OC-192
time division multiplex (TDM) structure, i.e., all the overheads of
the OC-48's are persevered. In both these cases the essential
information from a routing perspective is that both of the links can
transport media of type OC-48.
The proposed Link Descriptor TLV (of type 136 TBD) contains a new
data structure consisting of:
7 octets of System ID and Pseudonode Number
4 octets of IPv4 interface address
4 octets of IPv4 neighbor address
and a list of Link Descriptors, where each element in the list has 10
octets. The length of the TLV is thus 15+10*n octets, where n is the
number of elements in the list.
Each Link descriptor element consists of the following fields: the
first field is a one-octet value which defines the link encoding
type, the second field is a one-octet value which defines the lowest
priority at which that link encoding type is available, the third
field is four-octets and specifies the minimum reservable bandwidth
(in IEEE floating point format, the units being bytes per second) for
this link encoding type, and the last field is four-octets and
specifies the maximum reservable bandwidth (in IEEE floating point
format, the units being bytes per second) for this link encoding
type. Link encoding type values are taken from the following list:
Value Link Encoding Type
1 Standard SONET
2 Arbitrary SONET
3 Standard SDH
4 Arbitrary SDH
5 Clear
6 GigE
7 10GigE
A link having Standard SONET (or Standard SDH) link encoding type can
switch data at a minimum rate, which is given by the Minimum
draft-ietf-isis-gmpls-extensions-00.txt [Page 6]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
Reservable Bandwidth on that link, and the maximum rate is given by
the Maximum Reservable Bandwidth on that link. In other words, the
Minimum and Maximum Reservable Bandwidth represents the leaf and the
root of one branch within the structure of the SONET (or SDH)
hierarchy. An LSP on that link may reserve any bit transmission rate
that is allowed by the SONET (or SDH) hierarchy between the minimum
and maximum reservable values (the spectrum is discrete). For
example, consider a branch of SONET multiplexing tree : VT-1.5,
STS-1, STS-3c, STS-12c, STS-48c, STS-192c. If it is possible to
establish all these connections on a OC-192 link, it can be
advertised as follows: Minimum Reservable Bandwidth VT-1.5 and
Maximum Reservable Bandwidth STS-192.
A link having Arbitrary SONET (or Arbitrary SDH) link encoding type
can switch data at a minimum rate, which is given by the Minimum
Reservable Bandwidth on that link, and the maximum rate is given by
the Maximum Reservable Bandwidth on that link. An LSP on that link
may reserve any bit transmission rate that is a multiple of the
Minimum Reservable Bandwidth between the minimum and maximum
reservable values (the spectrum is discrete).
To handle the case where a link could support multiple branches of
the SONET (or SDH) multiplexing hierarchy, one could use multiple LSP
descriptors. For example, if a link supports VT-1.5 and VT-2 (which
are not part of same branch of SONET multiplexing tree), then it
could advertise two LSP descriptors one for each one.
For a link with Clear encoding, the minimum and maximum reservable
bandwidth will imply that the optical path is tuned to carry traffic
within those range of values. (Note that it should be possible to
carry OC-x as well as GigE or any other encoding format, as long as
the bit transmission rate of the data to be carried is within this
range).
For other encoding types, the minimum and maximum reservable
bandwidth should be set to have the same values.
Link Descriptors present a new constraint for LSP path computation.
On a bundled link we assume that either the whole link is configured
with the Link Descriptor Types, or each of its component links are
configured with the Link Descriptor Types. In the latter case, the
Link Descriptor Type of the bundled link is set to the set union of
the Link Descriptor Types for all the component links.
It is possible that Link Descriptor TLV will change over time,
reflecting the allocation/deallocation of component links. In
general, creation/deletion of an LSP on a link doesn't necessarily
draft-ietf-isis-gmpls-extensions-00.txt [Page 7]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
result in changing the Link Descriptor of that link. For example,
assume that STS-1, STS-3c, STS-12c, STS-48c and STS-192c LSPs can be
established on a OC-192 link whose Link Type is SONET. Thus,
initially in the Link Descriptor the minimum reservable bandwidth is
set to STS-1, and the maximum reservable bandwidth is set of STS-192.
As soon as an LSP of STS-1 size is established on the link, it is no
longer capable of STS-192c. Therefore, the node advertises a
modified Link Descriptor indicating that the maximum reservable
bandwidth is no longer STS-192, but STS-48. If subsequently there is
another STS-1 LSP, there is no change in the Link Descriptor. The
Link Descriptor remains the same until the node can no longer
establish a STS-48c LSP over the link (which means that at this point
more than 144 time slots are taken by LSPs on the link). Once this
happened, the Link Descriptor is modified again, and the modified
Link Descriptor is advertised to other nodes.
Note that changes to the Link Descriptor TLV will also affect the
Unreserved Bandwidth sub-TLV with respect to bandwidth available on
the link.
5.3. Shared Risk Link Group TLV
A set of links may constitute a 'shared risk link group' (SRLG) if
they share a resource whose failure may affect all links in the set.
For example, two fibers in the same conduit would be in the same
SRLG. A link may belong to multiple SRLGs. Thus the SRLG TLV
describes a list of SRLGs that the link belongs to. An SRLG is
identified by a 32 bit number that is unique within an IGP domain.
The SRLG of a LSP is the union of the SRLGs of the links in the LSP.
The SRLG of a bundled link is the union of the SRLGs of all the
component links. The SRLG values are an unordered list of 4 octet
numbers that the link belongs to.
If an LSR is required to have multiple diversely routed LSPs to
another LSR, the path computation should attempt to route the paths
so that they do not have any links in common, and such that the path
SRLGs are disjoint.
The proposed SRLG (of type 138 TBD) contains a new data structure
consisting of:
7 octets of System ID and Pseudonode Number
4 octets of IPv4 interface address
4 octets of IPv4 neighbor address
and a list of SRLG values, where each element in the list has 4
octets. The length of the TLV is thus 15+4*n octets, where n is the
number of elements in the list.
draft-ietf-isis-gmpls-extensions-00.txt [Page 8]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
The SRLG TLV starts with a configured value and does not change over
time, unless manually reconfigured. The SRLG TLV is optional and if
an LSA doesn't carry the SRLG TLV, then it means that SRLG of that
link is unknown.
6. Security Considerations
The sub-TLVs proposed in this document does not raise any new
security concerns.
7. Acknowledgements
The authors would like to thank Suresh Katukam, Jonathan Lang and
Quaizar Vohra for their comments on the draft.
8. References
[1] Awduche, D., Rekhter, Y., Drake, J., Coltun, R., "Multi-
Protocol Lambda Switching: Combining MPLS Traffic Engineering
Control With Optical Crossconnects",
draft-awduche-mpls-te-optical-02.txt (work in progress)
[2] Basak, D., Awduche, D., Drake, J., Rekhter, Y., "Multi-
protocol Lambda Switching: Issues in Combining MPLS Traffic
Engineering Control With Optical Crossconnects",
draft-basak-mpls-oxc-issues-01.txt (work in progress)
[3] Smit, H., Li, T., "IS-IS Extensions for Traffic Engineering",
draft-ietf-isis-traffic-02.txt (work in progress)
[4] Kompella, K., Rekhter, Y., Berger, L., "Link Bundling in MPLS
Traffic Engineering", draft-kompella-mpls-bundle-02.txt (work
in progress)
[5] Kompella, K., Rekhter, Y., "LSP Hierarchy with MPLS TE",
draft-ietf-mpls-lsp-hierarchy-00.txt (work in progress)
[6] Optical MPLS Group, "MPLS Optical/Switching Signaling Functional
Description" (work in progress)
[7] Lang J., Mitra K., Drake J., Kompella K., Rekhter Y., Berger L.,
Saha, D., Sandick, H., and Basak D., "Link Management Protocol",
draft-lang-mpls-lmp-01.txt (work in progress)
draft-ietf-isis-gmpls-extensions-00.txt [Page 9]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
9. Authors' Information
Kireeti Kompella
Juniper Networks, Inc.
1194 N. Mathilda Ave
Sunnyvale, CA 94089
Email: kireeti@juniper.net
Yakov Rekhter
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
Email: yakov@cisco.com
Ayan Banerjee
Calient Networks
5853 Rue Ferrari
San Jose, CA 95138
Phone: +1.408.972.3645
Email: abanerjee@calient.net
John Drake
Calient Networks
5853 Rue Ferrari
San Jose, CA 95138
Phone: (408) 972-3720
Email: jdrake@calient.net
Greg Bernstein
Ciena Corporation
10480 Ridgeview Court
Cupertino, CA 94014
Phone: (408) 366-4713
Email: greg@ciena.com
draft-ietf-isis-gmpls-extensions-00.txt [Page 10]
Internet Draft draft-ietf-isis-gmpls-extensions-00.txt September 2000
Don Fedyk
Nortel Networks Corp.
600 Technology Park Drive
Billerica, MA 01821
Phone: +1-978-288-4506
Email: dwfedyk@nortelnetworks.com
Eric Mannie
GTS Network Services
RDI Department, Core Network Technology Group
Terhulpsesteenweg, 6A
1560 Hoeilaart, Belgium
Phone: +32-2-658.56.52
E-mail: eric.mannie@gtsgroup.com
Debanjan Saha
Tellium Optical Systems
2 Crescent Place
P.O. Box 901
Ocean Port, NJ 07757
Phone: (732) 923-4264
Email: dsaha@tellium.com
Vishal Sharma
Tellabs Research Center
One Kendall Square
Bldg. 100, Ste. 121
Cambridge, MA 02139-1562
Phone: (617) 577-8760
Email: Vishal.Sharma@tellabs.com
draft-ietf-isis-gmpls-extensions-00.txt [Page 11]