Internet DRAFT - draft-lee-ccamp-pce-policy-recovery
draft-lee-ccamp-pce-policy-recovery
Network Working Group Y. Lee
Internet-Draft J. Zhu
Expires: December 1, 2006 Huawei
May 30, 2006
Framework for the Policy-Based Recovery Mechanism in GMPLS Network
draft-lee-ccamp-pce-policy-recovery-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 1, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This document describes a framework for policy-based protection/
restoration mechanism in GMPLS network. This document provides the
definition for recovery policy, architecture framework and the
protocol requirements to be able to support policy-based recovery
mechanism.
Lee & Zhu Expires December 1, 2006 [Page 1]
Internet-Draft Policy-based Recovery in GMPLS May 2006
Table of Contents
1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Recovery Policy Definition . . . . . . . . . . . . . . . . . . 6
4. Recovery Policy Architecture . . . . . . . . . . . . . . . . . 8
4.1. Recovery Policy Architecture in the context of the PCE . . 8
4.2. Recovery Policy Architecture with a Direct Interface
with the Signaling Engine . . . . . . . . . . . . . . . . 10
5. Communication Protocol Requirements . . . . . . . . . . . . . 13
6. Recovery Policy Object/TLV Definition . . . . . . . . . . . . 14
7. Areas for Standardization . . . . . . . . . . . . . . . . . . 16
8. Security Considerations . . . . . . . . . . . . . . . . . . . 17
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 19
10.1. Normative References . . . . . . . . . . . . . . . . . . . 19
10.2. Informative References . . . . . . . . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 21
Intellectual Property and Copyright Statements . . . . . . . . . . 22
Lee & Zhu Expires December 1, 2006 [Page 2]
Internet-Draft Policy-based Recovery in GMPLS May 2006
1. Terminology
The terminology explained herein complies with [RFC 4427], [RFC
4397], [PCE ARCH] and [RFC 2748].
A Switching layer (a Network Layer, a Layer): A set of data links
with interfaces that have the same switching and data encoding types
and switching bandwidth granularity. Examples of switching layers
are 2.5G/10G wavelength, SDH VC12, SDH VC4, ATM VP/VC, Ethernet, IP,
etc.
Integrated Mode: Recovery process that is performed integrating
multiple layers of the network.
PCC: Path Computation Client: Any client application requesting a
path computation to be performed by a Path Computation Element.
PCE: Path Computation Element: An entity (component, application or
network node) that is capable of computing a network path or route
based on a network graph and applying computational constraints.
PDP: Policy Decision Point: A policy server that contains policy
related information.
PEP: Policy Enforcement Point: A policy client that enforces policy
for its application.
Protected Path: A path subject to protection against faults.
Protection: A class of service recovery that does not require any
provisioning signaling for the alternative LSP after the failure
indication.
Protection Path: A path used for protecting a protected path in case
of failures.
Recovery: A generic term that encompasses both the service protection
and restoration.
R-PDP: Recovery Policy Decision Point: A policy server that is
responsible for making decisions on recovery policy and directives
and communicating them to the client for enforcement.
R-PEP: Recovery Policy Enforcement Point: A policy client that is
responsible for enforcing recovery policy for its application based
on the R-PDP information.
Restoration: A class of service recovery that requires some
Lee & Zhu Expires December 1, 2006 [Page 3]
Internet-Draft Policy-based Recovery in GMPLS May 2006
provisioning of the signaling for the alternative path after the
failure indication.
TED: Traffic Engineering Database which contains the topology and
resource information of the domain. The TED may be fed by IGP
extensions or potentially by other means.
Vertical Integration: A set of collaborative mechanisms within a
single node driving multiple (at least two) network layers, and the
adaptation between those layers.
Lee & Zhu Expires December 1, 2006 [Page 4]
Internet-Draft Policy-based Recovery in GMPLS May 2006
2. Motivation
Recovery mechanism in telecommunication networks has been simplistic
as the scope of recovery has been segmented into a specific layer or
a particular switching capability. Typically different organizations
are responsible for the protection/restoration of the specific layer
and/or the switching capability. As vertical and horizontal
integration is promised in the emerging GMPLS network, it is evident
that the complexity of recovery mechanism has increased. The
complexity of the recovery mechanism in the GMPLS integrated network
has many dimensions that include technical complexity as well as
organizational complexity. This complexity arises partly due to
diversity of views and practices inherent to the individual
organizations/networks that comprise of GMPLS network integration
[OKI], [MLN-RQMT].
Therefore, it is important that operators of the GMPLS networks
should be given the capability to choose recovery policies that best
fit to the practices and philosophies of the operators. To
accommodate this flexibility and need, it is necessary to define
recovery policy model. While implementation and enforcement of
policy is largely a local matter, it is important to provide
operators with the capability to choose preferred recovery policy for
their recovery operation.
This document provides a set of recovery policies. This document
also provides a high level framework for recovery policy architecture
and the protocol requirements.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Lee & Zhu Expires December 1, 2006 [Page 5]
Internet-Draft Policy-based Recovery in GMPLS May 2006
3. Recovery Policy Definition
This section provides policy definition for recovery. In order to
discuss recovery policy constraints, it is essential to understand
the scope of specific protection and restoration mechanism currently
defined by the GMPLS CCAMP Working Group. Based on the discussions
in RFC 4426, 4427, 3471 and [RECOVERY], there are two types of
protection/restoration have been defined: (i) Span (Link) Protection
and (ii) End-to-End (Path) Protection and Restoration. Under Span
(Link) Protection, the following protection types have been defined:
- Unprotected (0:1)
- (Full) Re-routing
- Re-routing without Extra Traffic
- Unidirectional 1+1 dedicated protection
- Bi-directional 1+1 dedicated protection
- Dedicated 1:1 protection with extra traffic
- Shared M:N protection
Under End-to-End (Path) protection and restoration, the following
mechanisms have been defined:
- Unidirectional 1+1 Protection
- Bi-directional 1+1 Protection
- Dedicated 1:1 Protection
- Unprotected
- Extra Traffic
Given the aforementioned Protection/Restoration schemes, there are
numbers of criteria in which operator's recovery policy can be
defined. The recovery policy constraints specified below can be
applied per protection type or globally applied to all protection
types. The list specified below is not meant to be extensive or
complete. Some of these policies are mono-layer oriented while
others are multi-layer oriented. As more recovery related policies
are identified, the list will be expanded.
- Computation of the Protection Path/Link: (i) the protection path
Lee & Zhu Expires December 1, 2006 [Page 6]
Internet-Draft Policy-based Recovery in GMPLS May 2006
can be computed before the failure (pre-computed) or (ii) the
protection path is computed after the failure (post-computed).
- Selection of the Protection Path/Link: (i) the selection of the
protection path is pre-selected before the failure (pre-selected) or
(ii) the selection of the protection path is selected after the
failure (post-selected).
- Signaling of the Protection Path/Link: (i) the protection path
setup is signaled before the failure (pre-signaled) or (ii) the
protection path setup is signaled after the failure (post-signaled).
- Allocation of Bandwidth on the Protection Path/Link: (i) pre-
allocated (the protection bandwidth is pre-allocated and therefore
reserved prior to the failure of the protected path; or (ii) post-
allocated (the protection bandwidth is allocated after the failure of
the protected path).
- Composition of the Protection Path/Link: (i) only single-layer
path/link is allowed; or (ii) multi-layer path/link is allowed.
- Protection Reversion: (i) allowed (the switching of the user
traffic from the protecting to the protected path after recovery is
allowed); or (ii) disallowed (the switching of the user traffic from
the protection to the protected path after recovery is not allowed).
We can easily see that there is a place for policy-based recovery
mechanism that would allow operators to choose appropriate policies
depending on the operator's need and integration directives. It is
to be noted that these policy-based capability provides flexibility
to the operators and facilitates operator's horizontal and vertical
integration effort. Given the complexities and varieties of the
service protection and the network conditions, the operators should
be given an ability to flexibly adapt and enforce their preferences.
Lee & Zhu Expires December 1, 2006 [Page 7]
Internet-Draft Policy-based Recovery in GMPLS May 2006
4. Recovery Policy Architecture
This section provides recovery policy architecture and its key
components. As seen in the previous section, some of the recovery
policies defined in the previous section are closely related to the
path computation element (PCE). Recovery policy architecture,
therefore, can be built on top of the existing PCE architecture as
defined in [PCE ARCH]. On the other hand, it should be also possible
to build recovery policy architecture that has a direct interface
with the Signaling Engine. This approach is based on a distributed
philosophy.
Presented in this section, therefore, are the two base architecture:
(i) Recovery Policy Architecture in the context of the PCE (ii)
Recovery Policy Architecture with a direct interface with he
Signaling Engine.
4.1. Recovery Policy Architecture in the context of the PCE
Figure 1 depicts recovery policy architecture in the context of the
PCE architecture.
+---------+ Routing Protocol
| TED |<--------------------------->
+---------+
|
|
|
\/
+------------+ +------------+ PCE-PCE Protocol
| Recovery |-->| PCE |<------------------------->
| PDP | +------------+
+------------+ /\
| PCE-PCC Protocol
|
\/
Service Request +------------+ Signaling Protocol
---------------->| Signaling |<------------------------->
| Engine |
+------------+
Figure 1: Recovery Policy Architecture in the Context of the PCE.
Lee & Zhu Expires December 1, 2006 [Page 8]
Internet-Draft Policy-based Recovery in GMPLS May 2006
Figure 1 depicts that recovery policy decision is conveyed to the PCE
by which enforcement of the recovery policy is to be performed. As
recovery and path computation are closed related, the recovery policy
can be viewed as an additional component to the PCE with this
architecture.
The invocation of the recovery policy is typically independent of the
service request or signaling flow. When operator's recovery policy
is communicated to the Recovery Policy Decision Point (R-PDP), the
R-PDP, then, communicates the recovery policy to the PCE. There are
many ways for the R-PDP to communicate the recovery policy to the
PCE. The choice of the protocol between the R-PDP and the PCE is not
the focus of this draft. Whether the R-PDP is local to the PCE or
external is also beyond the scope of this draft.
With respect to the R-PDP, the PCE depicted in Figure 1 serves as the
Policy Enforcement Point (PEP) as defined in [RFC 2748] and
[Bryskin]. The responsibility of the PCE is to disseminate the
recovery policy information to the nodes that need to implement
recovery policy during the path establishment stage. There may be
several options for the PCE to disseminate the recovery policy
information to the nodes during the path etablishment stage. One
obvious way is through the Signaling Protocol. This requires the PCE
to request to the Signaling Engine to include the recovery policy
Object/TLV during path establishment. This particular method will be
discussed in more detail in section 4.2. With the PCE architecture
where the PCE is an external entity from the LSR, the PCE could
establish a direct interface to each node under its domain control
and disseminate the recovery policy information via the PCE-PCC
protocol.
The PCE is also responsible for enforcing the recovery policy in its
path computation process. It is to be noted that some of the
recovery policy may be enforced at the PCE level while others may be
enforced at the Signaling Engine. For instance, if recovery policy
for bandwidth allocation were 'allocation before failure' on the
protection path, then this policy should be applied in the process of
reservation. The enforcement of this policy would be expected at the
Signaling Engine. On the other hand, recovery policy related to
computation (for instance, whether the protection path is computed
before the failure or not) would be enforced by the PCE as such
function is an integral part of the PCE.
Important aspect is that both the PCE and the Signaling Engine share
the same policy and coordinate each other in the enforcement of the
recovery policy. While the recovery policy information is to be
disseminated from the PCE to the Signaling Engine with this
architecture, the Signaling Engine should communicate the level of
Lee & Zhu Expires December 1, 2006 [Page 9]
Internet-Draft Policy-based Recovery in GMPLS May 2006
protection associated with a service request to the PCE. When the
Signaling Engine requests path computation to the PCE, the recovery
level (protection/restoration) should be communicated to the PCE so
that the PCE would be able to enforce the recovery policy associated
with the recovery level.
For example, let's suppose that the Signaling Engine requests path
computation for 1:1 protection for a given source-destination pair.
The PCE inspects if there are any policy constraints for 1:1
protection. Let say the recovery policies for the protection path
are: pre-computed, pre-signaled, pre-selected, pre-allocated, inter-
layer path allowed, protection reversion allowed. Then the path
computation would proceed subject to these policy constraints where
possible.
In order for the policy realized across the network domain, the
recovery policy information should be communicated between the PCE
and the Signaling Engine via the PCE-PCC protocol [PCEP], and/or
between the PCEs. Proper Object/TLV should be defined in both PCE-
PCC Protocol and/or the PCE-PCE Protocol to achieve policy
realization and dissemination across the network domain.
4.2. Recovery Policy Architecture with a Direct Interface with the
Signaling Engine
Figure 2 shows recovery policy architecture that has a direct
communication interface with the Signaling Engine.
+---------+ Routing Protocol
| TED |<------------------------->
+---------+
|
|
|
\/
+------------+ +------------+ PCE-PCE Protocol
| Recovery | | PCE |<----------------------->
| PDP | +------------+
+------------+ /\
|______ | PCE-PCC Protocol
| |
\/ \/
Service Request +------------+ Signaling Protocol
---------------->| Signaling |<----------------------->
| Engine |
+------------+
Lee & Zhu Expires December 1, 2006 [Page 10]
Internet-Draft Policy-based Recovery in GMPLS May 2006
Figure 2: Recovery Policy Architecture with a direct communication
interface with the Signaling Engine.
This architectural option does not depend on the PCE architecture as
heavily as the previous option. While the PCE component is still
needed in order to enforce recovery policy, the role of the PCE is
secondary as compared to the previous architecture option. The
Recovery-Policy Decision Point (R-PDP) conveys the recovery policy
information directly to the Signaling Engine. The Signaling Engine
is the main policy enforcement point (PEP) with this model. The
Signaling Engine is responsible for the dissemination of the recovery
policy information to the PCE as well as to adjacent nodes.
Upon a service request, the Signaling Engine would request path
computation to the PCE via the PCE-PCC protocol. In doing so, the
recovery policy information should be conveyed from the Signaling
Engine to the PCE as part of the request message so that the PCE
would apply relevant recovery policy in path computation.
As the recovery policy information resides at the Signaling Engine,
the dissemination of the recovery policy is to be performed by the
Signaling Engine to adjacent nodes associated with the path during
the path establishment stage. The Signaling Engine at the headend
node, upon a service request, would request path computation to the
PCE. The PCE would then apply the pertinent recovery policy
associated with the path request and proceed with the path
computation. The PCE then would send the reply message back to the
Signaling Engine with the result. As the Signaling Engine proceed
with the signaling to the nodes along the path, the recovery policy
information is to be sent to downstream nodes.
The recovery policy information is then stored in the Signaling
Engine in each and every downstream node on the both the protection
and protected paths. The recovery policy information can be defined
as an object/TLV of the RSVP-TE signaling. Compared to the previous
architecture, the role of the Signaling Engine is more significant.
The dissemination of the recovery policy information is based on
distributed and as-needed basis through the Signaling Protocol. When
a path is set up, the recovery policy information should be
communicated to all the nodes associated with the path such that
recovery policy would be enforced if necessary at each node along the
path. To illustrate, let's consider the following topology.
Lee & Zhu Expires December 1, 2006 [Page 11]
Internet-Draft Policy-based Recovery in GMPLS May 2006
A------B------C-------D-------E
\ /
\ /
\ /
F-------G
Figure 3: An Example topology.
Let say that the path (A-B-C-D-E) is the protected path whereas the
path (B-F-G-D) is the protection path for the segment (B-C-D) of the
path (A-B-C-D-E). Assume that the operator wants to enforce the
following recovery policy: pre-computed protection path, pre-selected
protection path, pre-signaled protection path, pre-allocated
bandwidth, multi-layer protection allowed, reversion not allowed. As
the Path message is signaled to downstream nodes along the path (A-B-
C-D-E), the recovery policy information is included as an object/TLV
in the PATH message so that each node is updated with the recovery
policy sent by the headend node A. As the RESV message is sent back
from node E, node B would initiate the path set up for the protection
path enforcing the recovery policy it previously received. All the
relevant recovery policy would be applied where possible by node B.
According to the recovery policy, node B would request computation
and selection of the protection path to the PCE.
Notice that since the policy allows multi-layer links for its
protection path, node B should communicate this policy to the PCE so
that the PCE would apply this particular policy in its path
compuation process. Upon the receipt of the reply message sent from
the PCE, node B would then proceed the signaling of the path to the
adjacent node F while allocating bandwidth for the path according to
the policy.
Assume that a link failure takes place on link (C-D). Based on the
protection scheme, traffic on the protected path would be rerouted to
the protection path (A-B-F-G-D-E). After the failure is fixed, based
on the recovery policy, traffic will not be reverted back to the
protected path.
This example illustrates why the recovery policy object/TLV should be
disseminated to the nodes that are part of the recovery. It also
shows how the recovery policy information is used in the nodes along
the protection path.
Lee & Zhu Expires December 1, 2006 [Page 12]
Internet-Draft Policy-based Recovery in GMPLS May 2006
5. Communication Protocol Requirements
This section discusses communication protocol requirements to support
the recovery policy architecture presented in the previous section.
There are four key communication interfaces whereby communication
protocol support is required to support recovery policy architecture
defined in the previous section.
- Communication between the Recovery Policy Decision Point (R-PDP)
and the Signaling Engine
- Communication between the Recovery Policy Decision Point (R-PDP)
and the PCE
- Communication between the PCE and the Signaling Engine
- Communication between the Signaling Engines (i.e., between nodes)
Communications between the R-PDP and the Signaling Engine and between
the R-PDP and the PCE can be the Common Open Policy Service (COPS)
protocol [RFC 2748], although not limited to that.
Communication between the PCE and the Signaling Engine can be done
via the Path Computation Element communication Protocol (PCEP) which
is described in [PCEP]. The notification message is intended to
notify useful information between the PCE and the Path Computation
Client (PCC) according to [PCEP]. Recovery related policy
information should to be defined as an Object/TLV compliant to the
PCEP message format.
RSVP-TE Object/TLV should be defined to be able to disseminate
recovery policy information to other nodes along the path during the
path establishment stage. When recovery policy information is
reached to other nodes, this would invoke an update to the existing
policy if any. The recovery policy information would be also used to
enforce any local decision associated with protection/restoration.
Lee & Zhu Expires December 1, 2006 [Page 13]
Internet-Draft Policy-based Recovery in GMPLS May 2006
6. Recovery Policy Object/TLV Definition
This section provides the definition for the Recovery Policy (RP)
Object/TLV. The format of the RP Object is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|P|C|S|G|B|L|R| Reserved | Link Flags|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|P|C|S|G|B|L|R| Reserved | Path Flags|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- Protected (P): 1 bit
When set to 1, it indicates that the Path/Link is a protected path/
link. When set to 0 (default), this bit indicates that the Path/Link
is a protection path/link.
- Computation (C): 1 bit
When set to 1, this bit indicates that the protection path/link is
computed after failure. When set to 0 (default), this bit indicates
that the protection path/link is computed before failure.
- Selection (S): 1 bit
When set to 1, this bit indicates that the protection path/link is
selected after failure. When set to 0 (default), this bit indicates
that protection path/link is selected before failure.
- Signaling (G): 1 bit
When set to 1, this bit indicates that the protection path/link setup
is signaled after failure. When set to 0 (default), this bit
indicates that protection path/link setup is signaled before failure.
- Bandwidth (B): 1 bit
When set to 1, this bit indicates that the protection bandwidth is
allocated after failure of the protected path/link. When set to 0,
this bit indicates that the protection bandwidth allocation is pre-
allocated prior to failure of the protected path/link.
- Layer (L): 1 bit
Lee & Zhu Expires December 1, 2006 [Page 14]
Internet-Draft Policy-based Recovery in GMPLS May 2006
When set to 1, this bit indicates that multi-layer path/link is
allowed for the path/link. When set to 0 (default), this indicates
that multi-layer path/link is not allowed for the path/link.
- Reversion (R): 1 bit
When set to 1, this bit indicates that the switching of the user
traffic from the protection to the protected path/link after recovery
is allowed. When set to 0 (default), this indicates that protection
reversion is not allowed.
- Reserved: 19 bits
- Link Flags: 6 bits
This indicates the desired link protection type (per [RFC 3471]).
Currently, the following link protection types have been defined in
[RFC 3471]: Enhanced, Dedicated 1+1, Dedicated 1:1, Shared,
Unprotected, Extra Traffic.
- Path Flag: 6 bits
This indicates the desired path recovery type. Currently, the
following path recovery types have been defined in [RECOVERY]:
Unprotected, Re-routing, Re-routing without extra traffic, 1:N
Protection with Extra Traffic, 1+1 Unidirectional Protection, 1+1 Bi-
directional Protection.
The format defined above would allow recovery policy constraints for
both the protection path/link and the protected path/link by the P
bit. It allows recovery policy constraints to be defined per
recovery type and is expandable to accommodate variety of recovery
types and their recovery policies.
Lee & Zhu Expires December 1, 2006 [Page 15]
Internet-Draft Policy-based Recovery in GMPLS May 2006
7. Areas for Standardization
The following areas require standardization in order to support
policy recovery mechanism discussed in this draft.
- Definition of the recovery policy and the MIB
- The Recovery Policy Object/TLV structure
- PCEP Protocol modifications to adopt the Recovery Policy Object/TLV
- RSVP-TE Extension modifications to adopt the Recovery Policy
Object/TLV
Lee & Zhu Expires December 1, 2006 [Page 16]
Internet-Draft Policy-based Recovery in GMPLS May 2006
8. Security Considerations
The current version of this document does not introduce any new
security considerations as it only lists a set of requirements. In
the future versions, new security requirements may be added.
Lee & Zhu Expires December 1, 2006 [Page 17]
Internet-Draft Policy-based Recovery in GMPLS May 2006
9. IANA Considerations
There are no IANA actions requested in this specification.
Lee & Zhu Expires December 1, 2006 [Page 18]
Internet-Draft Policy-based Recovery in GMPLS May 2006
10. References
10.1. Normative References
[RFC2748] Durham, D., Boyle, J., Cohen, R., Herzog, S., Rajan, R.,
and A. Sastry, "The COPS (Common Open Policy Service)
Protocol", RFC 2748, January 2000.
[RFC3471] Berger, L., "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Functional Description", RFC 3471,
January 2003.
[RFC3473] Berger, L., "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Resource ReserVation Protocol-Traffic
Engineering (RSVP-TE) Extensions", RFC 3473, January 2003.
[RFC4397] Bryskin, I. and A. Farrel, "A Lexicography for the
Interpretation of Generalized Multiprotocol Label
Switching (GMPLS) Terminology within the Context of the
ITU-T's Automatically Switched Optical Network (ASON)
Architecture", RFC 4397, February 2006.
[RFC4426] Lang, J., Rajagopalan, B., and D. Papadimitriou,
"Generalized Multi-Protocol Label Switching (GMPLS)
Recovery Functional Specification", RFC 4426, March 2006.
[RFC4427] Mannie, E. and D. Papadimitriou, "Recovery (Protection and
Restoration) Terminology for Generalized Multi-Protocol
Label Switching (GMPLS)", RFC 4427, March 2006.
10.2. Informative References
[BRYSKIN] Bryskin, I., Papadimitriou, D., and L. Berger, "Policy-
enabled Path Computation Communication Requirements,
draft-bryskin-pce-policy-enabled-path-comp-00.txt, work
in progress", October 2005.
[MLN-RQMT]
Shiomoto, K., Ed., "Requirements for GMPLS-based multi-
region and multi-layer networks (MRN/MLN),
draft-ietf-ccamp-gmpls-mln-reqs-00.txt, work in progress",
January 2006.
[OKI] Oki, E., Ed., "Framework for PCE-Based Inter-Layer MPLS
and GMPLS Traffic Engineering,
draft-ietf-pce-inter-layer-frwk-00.txt, work in progress",
April 2006.
Lee & Zhu Expires December 1, 2006 [Page 19]
Internet-Draft Policy-based Recovery in GMPLS May 2006
[PCE ARCH]
Farrel, A., Vasseur, A., and J. Ash, "A Path Computation
Element (PCE) Based Architecture,
draft-ietf-pce-architecture-05.txt, work in progress",
February 2006.
[PCEP] Vasseur, J., Ed., "Path Computation Element (PCE)
communication Protocol (PCEP) Version 1,
draft-ietf-pce-pcep-01.txt, work in progress",
February 2006.
[RECOVERY]
Lang, J., Ed., Rekhter, Y., Ed., and D. Papadimitriou,
Ed., "RSVP-TE Extensions in support of End-to-End
Generalized Multi-Protocol Label Switching (GMPLS)- based
recovery,
draft-ietf-ccamp-gmpls-recovery-e2e-signaling-03.txt",
April 2005.
Lee & Zhu Expires December 1, 2006 [Page 20]
Internet-Draft Policy-based Recovery in GMPLS May 2006
Authors' Addresses
Young Lee
Huawei Technologies (USA)
1700 Alma Drive, Suite 100
Plano, TX 75075
US
Phone: +1 972 509 0309
Fax: +1 469 229 5397
Email: ylee@huawei.com
James Zhu
Huawei Technologies (USA)
1700 Alma Drive, Suite 100
Plano, TX 75075
US
Phone: +1 972 509 0309
Fax: +1 469 229 5397
Email: zhujiangyun@huawei.com
Lee & Zhu Expires December 1, 2006 [Page 21]
Internet-Draft Policy-based Recovery in GMPLS May 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Lee & Zhu Expires December 1, 2006 [Page 22]