Internet DRAFT - draft-wright-ccamp-op-policy-prot-links

draft-wright-ccamp-op-policy-prot-links







Internet Engineering Task Force                           B. Wright, Ed.
Internet-Draft                                               J. Hardwick
Intended status: Informational                       Metaswitch Networks
Expires: December 03, 2013                                     V. Shukla
                                                                 Verizon
                                                                   J. Li
                                China Telecom Beijing Research Institute
                                                               June 2013


    Requirements for operator policy in GMPLS networks consisting of
                            protected links
               draft-wright-ccamp-op-policy-prot-links-00

Abstract

   This document describes policy options required by network operators
   in networks including APS links or links with an inherent protection
   capability.  It also identifies gaps in the current GMPLS standards
   which may prevent these policy options from being implemented.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on December 03, 2013.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect



Wright, et al.          Expires December 03, 2013               [Page 1]

Internet-Draft draft-wright-ccamp-op-policy-prot-links-00      June 2013


   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   2
   2.  Protected Links . . . . . . . . . . . . . . . . . . . . . . .   2
   3.  Operator requirements . . . . . . . . . . . . . . . . . . . .   3
     3.1.  Operational considerations  . . . . . . . . . . . . . . .   4
   4.  Gap Analysis  . . . . . . . . . . . . . . . . . . . . . . . .   4
   5.  Contributors  . . . . . . . . . . . . . . . . . . . . . . . .   4
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   4
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .   4
     8.2.  Informative References  . . . . . . . . . . . . . . . . .   5
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   As described in [RFC4202], GMPLS networks frequently contain links
   which have an inherent protection capability, for example SONET APS
   links or abstract links which represent a bundle of lower layer LSPs.
   An operator may wish to configure different policies which, in the
   event of a failure that causes a change in the available protection
   capability of a link, affect both path computation and provisioned
   services.  This draft describes some of these policy behaviors, and
   identifies where these behaviours cannot be implemented using
   existing GMPLS standards.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

2.  Protected Links

   A link can be said to have an inherent protection capability if, in
   the event of a data plane failure affecting some part of the link,
   the link can continue to carry data.  We call links which have an
   inherent protection capability "Protected Links".  Figure 1 below
   shows an example of a Protected Link.





Wright, et al.          Expires December 03, 2013               [Page 2]

Internet-Draft draft-wright-ccamp-op-policy-prot-links-00      June 2013


                           Logical Protected Link
                                    |
                +--------+          v         +--------+
                |        |====================|        |
                |  NE A  |                    |  NE B  |
                |        |--------------------|        |
                |        |--------------------|        |
                +--------+          ^         +--------+
                                    |
                     Lower Layer LSPs providing protection


         Figure 1: Diagram showing an example of a protected link

   In this example, a bundle of LSPs transport data between the two
   network elements, as described in [RFC4201].  These LSPs are
   advertised as a single link into the client layer IGP.  A protection
   scheme (such as 1+1, as described in [RFC4427]) can be configured for
   the link bundle to ensure that if one link in the bundle fails,
   traffic will be unaffected because other links in the bundle carry
   the data.  Hence the link in the client layer has its own protection
   capabilities, which it can advertise as per [RFC4202].  However,
   failures of lower-layer LSPs can mean that, whilst the overall link
   bundle is still able to carry traffic, the protection capabilities
   that are still configured, are no longer present.  Such links are
   referred to as "Protection Impaired".

3.  Operator requirements

   Operators have the following requirements which SHOULD be met in
   networks containing Protection Impaired links.

      R1.  It SHOULD be possible to include or exclude a Protection
      Impaired link from a path computed for an LSP, depending on the
      type of service that will use the LSP.  For example, an operator's
      policy may allow LSPs corresponding to high priority unprotected
      services to be provisioned over the Protection-Impaired Link, but
      prevent lower priority LSPs from using it (because once the
      failure has been repaired, bandwidth on a high-value protected
      link would be used for low-priority LSPs).

      R2.  Depending on the service-level of a given LSP, it SHOULD be
      possible to configure a policy to reroute an existing LSP when a
      link it traverses becomes Protection Impaired (for example, if
      there are other links available which still have currently active
      protection capabilities).  If the fault is repaired, then it
      SHOULD be possible to automatically revert the LSP to the original
      path.



Wright, et al.          Expires December 03, 2013               [Page 3]

Internet-Draft draft-wright-ccamp-op-policy-prot-links-00      June 2013


3.1.  Operational considerations

   It is often advantageous to centralize policy configuration on as few
   network elements as possible.  This makes network-wide policy changes
   easier to implement for operators.  For example, in networks where
   Path Computation is performed by only a subset of the network
   elements (e.g. PCEs), it is preferable that the policy configuration
   relating to Path Computation is applied solely to those network
   elements.

4.  Gap Analysis

   An analysis of the current GMPLS protocols against the above
   requirements is as follows.

   R1.  As per [RFC4202], the current link protection type can be
   advertised by the OSPF-TE or ISIS-TE protocols so elements performing
   Path Computation can understand the currently available protection
   type.  Per-Network Element level policy can determine the how the
   protection type is set when the link is advertised.  However, there
   is no way currently to advertise both the configured link protection
   type and the current link protection type.  Therefore, it is not
   possible to implement the Path Computation behavior described above
   if a different policy is required for different LSPs.

   R2.  A node which detects a failure MAY use the procedures defined in
   [RFC5712] to inform the head-end LSR.  The head-end LSR MAY then
   elect to use this as a trigger to perform Path Computation to
   determine whether an alternative route exists and possibly re-route
   the LSP.  However, there is no similar mechanism to inform the head-
   end LSR when a failure has been cleared.

5.  Contributors

6.  IANA Considerations

   This memo includes no request to IANA.

7.  Security Considerations

   TBD

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.



Wright, et al.          Expires December 03, 2013               [Page 4]

Internet-Draft draft-wright-ccamp-op-policy-prot-links-00      June 2013


   [RFC4201]  Kompella, K., Rekhter, Y., and L. Berger, "Link Bundling
              in MPLS Traffic Engineering (TE)", RFC 4201, October 2005.

   [RFC4202]  Kompella, K. and Y. Rekhter, "Routing Extensions in
              Support of Generalized Multi-Protocol Label Switching
              (GMPLS)", RFC 4202, October 2005.

   [RFC4427]  Mannie, E. and D. Papadimitriou, "Recovery (Protection and
              Restoration) Terminology for Generalized Multi-Protocol
              Label Switching (GMPLS)", RFC 4427, March 2006.

   [RFC5712]  Meyer, M. and JP. Vasseur, "MPLS Traffic Engineering Soft
              Preemption", RFC 5712, January 2010.

8.2.  Informative References

   [G.808.1]  ITU-T, "Generic Protection Switching - Linear trail and
              subnetwork protection", Recommendation G.808.1, December
              2003.

   [I-D.narten-iana-considerations-rfc2434bis]
              Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", draft-narten-iana-
              considerations-rfc2434bis-09 (work in progress), March
              2008.

   [RFC2629]  Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
              June 1999.

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552, July
              2003.

Authors' Addresses

   Ben Wright (editor)
   Metaswitch Networks
   100 Church Street
   Enfield, Middlesex
   UK

   Phone: +44 2083661177
   Email: ben.wright@metaswitch.com








Wright, et al.          Expires December 03, 2013               [Page 5]

Internet-Draft draft-wright-ccamp-op-policy-prot-links-00      June 2013


   Jon Hardwick
   Metaswitch Networks
   100 Church Street
   Enfield, Middlesex
   UK

   Phone: +44 2083661177
   Email: jon.hardwick@metaswitch.com


   Vishnu Shukla
   Verizon
   60 Sylvan Road
   Waltham, MA  02451
   USA

   Email: vishnu.shukla@verizon.com


   Junjie Li
   China Telecom Beijing Research Institute
   118 Xizhimenneidajie
   Xicheng, Beijing
   China

   Email: lijj@ctbri.com.cn

























Wright, et al.          Expires December 03, 2013               [Page 6]