Internet DRAFT - draft-zhang-tictoc-pdv-lsp
draft-zhang-tictoc-pdv-lsp
Network Working Group J. Zhang
Internet-Draft L. Xia
Intended status: Standards Track ZTE Corporation
Expires: April 22, 2012 Oct 20, 2011
PDV-based PTP LSP Setup,Reoptimization and Recovery
draft-zhang-tictoc-pdv-lsp-00
Abstract
This document defines a mechanism for the setup,reoptimization and
recovery of PTP LSP based on the PDV metrics between the 1588 Master
and the 1588 Slave.
When a PTP communication path goes through the third party networks
(e.g. the MPLS networks), the PDV noise caused by the third party
networks will have a significant impact on the synchronization
performance. So, the PDV metrics should be considered in the setup
of PTP LSP.
In addition, when the PDV noise exceeds to a certain degree, it is
necessary to notify the head-end LSR(i.e. the 1588 Master) to switch
to the backup PTP LSP and to reoptimize the primary PTP LSP in order
to improve the PTP reliability.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 22, 2012.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
Zhang & Xia Expires April 22, 2012 [Page 1]
Internet-Draft PDV-based PTP LSP Oct 2011
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Conventions Used in This Document . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 4
4. PTP LSP setup and reoptimization . . . . . . . . . . . . . . . 5
4.1. Advertisement of the capability of reserving bandwidth . . 6
4.2. PTP LSP setup . . . . . . . . . . . . . . . . . . . . . . 6
4.3. Congestion detection . . . . . . . . . . . . . . . . . . . 7
4.4. PTP LSP reoptimization . . . . . . . . . . . . . . . . . . 7
5. PTP LSP recovery mechanisms . . . . . . . . . . . . . . . . . 8
5.1. PDV measurement and PDV network limits . . . . . . . . . . 8
5.2. PTP LSP recovery . . . . . . . . . . . . . . . . . . . . . 8
5.3. PTP Master recovery . . . . . . . . . . . . . . . . . . . 9
6. Protocal extensions . . . . . . . . . . . . . . . . . . . . . 11
6.1. IGP extensions . . . . . . . . . . . . . . . . . . . . . . 11
6.2. RSVP-TE extensions . . . . . . . . . . . . . . . . . . . . 13
7. Other considerations . . . . . . . . . . . . . . . . . . . . . 13
8. Security Considerations . . . . . . . . . . . . . . . . . . . 14
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 14
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
10.1. IANA Considerations for OSPF . . . . . . . . . . . . . . . 14
10.2. IANA Considerations for IS-IS . . . . . . . . . . . . . . 14
10.3. IANA Considerations for RSVP . . . . . . . . . . . . . . . 15
11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
11.1. Normative References . . . . . . . . . . . . . . . . . . . 15
11.2. Informative References . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 16
Zhang & Xia Expires April 22, 2012 [Page 2]
Internet-Draft PDV-based PTP LSP Oct 2011
1. Introduction
There are many applications that need frequency or phase/time
synchronization, and there is an emerging need to distribute highly
accurate time and frequency information over IP and over MPLS packet
switched networks (PSNs), especially with the development of the
telecom network. [IEEE] defines PTP for clock and time
synchronization. PTP version 2 contains three clock type, they are
Ordinary Clock(OC), Boundary Clock(BC) and Transparent Clock(TC).
Transparent Clocks modify a "correction field" (CF) within the
synchronization messages to compensate for residence and propagation
delays. So, Transparent Clock can eliminate the impact of the PDV
noise.
With the large-scale deployment of the MPLS networks and the 1588
networks, there is an increasing need to transport PTP messages over
the MPLS networks. The MPLS networks could be a transit network
between the 1588 Master and the 1588 Slave. But the PDV noise
between the 1588 Master and the 1588 Slave may be excessive and
therefore the 1588 Slave may not be able to properly recover the
clock and time of day. Therefore, it is necessary to setup PTP LSP
based on the PDV attributes, and when the PDV noise exceeds a certain
degree, the 1588 Master will switch to the backup PTP LSP and
reoptimize the primary PTP LSP.
1.1. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Terminology
PTN: Packet Transport Network;
1588: The timing and synchronization as defined by IEEE 1588;
PTP: The timing and synchronization protocol used by 1588;
Master: The Source of 1588 Timing and clock. This will be a port in
master state on a Grandmaster Clock or on a Boundary Clock;
Slave: The Destination of 1588 Timing and clock that tries to follow
the Master clock. This will be a port in slave state on a boundary
clock or on a Slave-Only Ordinary Clock;
Zhang & Xia Expires April 22, 2012 [Page 3]
Internet-Draft PDV-based PTP LSP Oct 2011
OC: Ordinary Clock - a device with a single PTP port;
TC: Transparent Clock, a time stamping method applied by intermediate
nodes between Master and Slave;
BC: Boundary Clock, is a node that recovers the Master clock via a
Slave function and uses that clock as the Master for other Slaves;
PDV: Packet Delay Variation;
PTP LSP: An LSP dedicated to carry PTP messages;
PDV PTP LSP: An PTP LSP based on the PDV attributes;
ACR: Adaptive Clock Recovery;
MBB: make-before-break;
LSR: Label Switch Router;
3. Problem Statement
With the development of telecom networks, there is an increasing need
to transport PTP or CES over the third part networks(e.g. MPLS
networks). Two main applications are addressed in ITU-T G.8261.1:
(1) the distribution of a synchronization network clock signal via
packet based method (e.g. using PTP);
(2) the distribution of a service clock signal over a packet network
according to the ACR method (e.g. clock recovery of CES using
Adaptive Method). The packet networks are Ethernet, MPLS, T-MPLS or
IP. For these applications, frequency synchronization information is
carried via packets and is recovered according to adaptive clock
recovery(ACR) method. But the third part networks(e.g. MPLS
networks) may introduce the PDV noise which will have a significant
impact on the ACR Methods and the synchronization performance.
The method for transporting PTP messages (PDUs) over an MPLS network
is defined in [I-D.ietf-tictoc-1588overmpls]. This document defines
a "1588-aware LSR" that is able to identify 1588 timing flows carried
over MPLS. Transparent Clock (TC) function requires a 1588-aware LSR
in the middle of an LSP to properly handle the PTP messages.
However, this specification does not mandate that all LSRs in path of
a PTP LSP be 1588-aware, Non-1588-aware LSRs don't perform any TC
processing. Therefore, these LSRs may introduce additional PDV
Zhang & Xia Expires April 22, 2012 [Page 4]
Internet-Draft PDV-based PTP LSP Oct 2011
noise, although the PTP messages are treated with the highest
priority and Green for drop eligibility, because the other flows may
use the same queue.
Just as MPLS-TE setup a TE LSP based on TE metrics(e.g. bandwidth),
it is necessary to setup a PTP LSP based-on the PDV metrics, and if
the PDV noise between the 1588 Master and the 1588 Slave has
deteriorated into a certain degree, then the 1588 Master switchs to
the backup PTP LSP and reoptimizes the primary PTP LSP. So, it is
useful for clock recovery algorithms to improve the performance of
clock recovery.
4. PTP LSP setup and reoptimization
The PDV noise introduced by the MPLS networks is critical for the
clock recovery algorithm and the synchronization performance. The
main factor caused the PDV noise is congestion in the network nodes.
In order to minimize the PDV noise between the 1588 Master and the
1588 Slave, the 1588 Master SHOULD discover a PTP LSP along which the
number of the Non-1588-aware LSRs is minimum.
MPLS-TE support setting up TE-LSP based on the reserved bandwidth
which can prevent TE-flow from congestion. But due to the complexity
of implementation and the cost of HW, some of the network nodes don't
support the capability of reserving bandwidth. In this case,
congestion detection MUST be enabled on these nodes. If congestion
occurred on one of these nodes, then the node MUST notify the 1588
Master(i.e. the head-end node ), therefore the 1588 Master is able to
reoptimize the TE-LSP and to avoid the congested nodes so that the
PDV noise between the 1588 Master and the 1588 Slave can be
minimized.
It is possible that after a PTP LSP has been established, a more
efficient path for the PTP becomes available, perhaps because one or
more new 1588aware links have been advertised or because some other
services have been torn down causing resources in the network to be
released. When a better path can be found for one of the previously
computed paths, the node or component that originally requested the
path can be notified. In order to take advantage of the new path,
the ingress node must re-route the PTP onto the new path using the
reoptimization technique(e.g. make-before-break).
Zhang & Xia Expires April 22, 2012 [Page 5]
Internet-Draft PDV-based PTP LSP Oct 2011
Mpls Network
head-end +--------------------------------+ tail-end
(the 1588 Master)| |(the 1588 Slave)
+------| PTP LSP |-------+
======> | | = = = = = = = = = = = = = = > | |======>
+------| |-------+
| |
+--------------------------------+
Figure 1. 1588 over MPLS Network
4.1. Advertisement of the capability of reserving bandwidth
Due to the complexity of implement and the cost of HW, some of the
network nodes don't support the capability of reserving bandwidth
based on the LSP , so that these network nodes may introduce
jitter(i.e. PDV).
Just as the capability of 1588-aware which can compensate for
residence time by updating the PTP packet Correction Field and
eliminate the delay and jitter, it is useful to advertise data plane
TE router link capabilities within the whole network, such as the
capability of reserving bandwidth. This capability MUST then be
taken into account during path computation to prefer links that
advertise themselves as reserving bandwidth , so that the PTP LSPs
can be properly handled.
For this purpose, the following sections specify extensions to OSPF
and IS-IS in order to advertise the capability of reserving
bandwidth.
4.2. PTP LSP setup
The Procedures for setting up LSP Tunnels are defined in [RFC3209].
To setup PTP LSP, more constraints information MUST be taken into
account, for examples, 1588-aware, reserving bandwidth, and so on. .
After all TE information were advertised by link state protocol(e.g.
OSPF or IS-IS), the TE database at the head-end node contains all the
links and their characteristics or attributes and includes 1588-aware
and reserving bandwidth. From this MPLS TE database, path
calculation (PCALC) or constrained SPF (CSPF) calculates the shortest
route that still adheres to all the constraints from the head-end
LSR(i.e. the 1588 Master) to the tail-end LSR(i.e. the 1588 Slave).
Zhang & Xia Expires April 22, 2012 [Page 6]
Internet-Draft PDV-based PTP LSP Oct 2011
4.3. Congestion detection
Quality of service (QoS) has become popular the past few years. Few
networks have unlimited bandwidth, so congestion is always a
possibility in the network. QoS is a means to prioritize important
traffic over less important traffic and make sure it is delivered.
Congestion may happen at different points within a network node.
Each congestion point represents a potential source of delay, jitter,
and loss for traffic streams.
If neither the capability of 1588-aware nor the capability of
reserving bandwidth is supported at a node, then this node may
introduce jitter(i.e. PDV), although the LSP tunnel is treated with
the highest priority.
So, after PTP LSP has been set up, the head-end node(i.e. the 1588
Master) MUST request those network nodes which support neither 1588-
aware nor reserving bandwidth to enable congestion detection. When
congestion occurs or disappears on the node, the node MUST send a
notification message to the head-end node, so that the head-end node
can reoptimizes the PTP LSP and sets up another new PTP LSP which
doesn't pass through these congested network nodes.
Because a PTP LSP is related to a special output port and a special
priority, the data plane can detect congestion based on the output
port and the corresponding queue. When congestion has occurred, the
data plane will notify the control plane which will sends a notify
message to the head-end.
4.4. PTP LSP reoptimization
As mentioned above, it is possible that a more efficient path for the
PTP becomes available, for example, the deployment of new 1588-aware
LSRs,and so on. In order to improve the synchronization performance,
the head-end MUST re-route the PTP onto the new path. It is assumed
that the head-end node has received the congestion notifications from
the congested nodes along the PTP LSP, and the PDV noise between the
1588 Master and the 1588 Slave exceeds a certain degree. At this
time, the tail-end node(e.g. the 1588 Slave) MUST send a
reoptimization notification message to the head-end node, the receipt
of such of message will then trigger a reoptimization on the head-end
node for the affected PTP LSP. Because the head-end node has learned
about which network nodes are 1588-aware and which network nodes has
occurred congestion, so it can reoptimize the affected PTP LSP and
avoid those congested nodes..
There are several reoptimization triggers, including timer-based
reoptimization ,event-driven reoptimization and operator-driven
Zhang & Xia Expires April 22, 2012 [Page 7]
Internet-Draft PDV-based PTP LSP Oct 2011
reoptimization. Note that reoptimization or recovery may also
introduce the PDV. Therefore, PTP LSP reoptimization MUST be
triggered by the PDV metrics.
5. PTP LSP recovery mechanisms
One kind of network fault is packets arriving at a network node which
the node has no forwarding information or incorrect forwarding
information. This problem can be detected by the control
information. Another kind of problem is the one in which the control
plane information is correct but the data plane fails. In this case,
LSP ping, LSP traceroute and Bidirectional Forwarding Detection (BFD)
are tools that can detect problems in the MPLS control and data
planes.
The above network problems are all due to connection failure. But
for the synchronization application(e.g. PTP), it is tolerant of an
occasional missed message, duplicated message, or message that
arrived out of order,which means that an occasional connection
failure is insignificant to the synchronization performance.
However, the PDV by the packet timing signal as it traverses the
network from the 1588 Master to the 1588 Slave is critical to the
synchronization performance. So, it is reasonable to recover the
synchronization application based on the PDV metrics.
5.1. PDV measurement and PDV network limits
ITU-T G.826x concerns frequency synchronization aspects in packet
networks. In particular it specifies the Hypothetical Reference
Model and the PDV network limits applicable when frequency
synchronization is carried via packets and is recovered according to
adaptive clock recovery method as defined in G.8261 and G.8260. It
specifies the minimum equipment tolerance to packet delay variation
in terms of the metrics defined in ITU-T G.8260 at boundary of these
packet networks.
PDV measurement is at the input of the 1588 Slave. If the PDV exceed
the network limits, then the 1588 Slave MUST send native indications
over the PTP LSP to notify the 1588 Master of the PDV fault condition
and to recover the synchronization application based on the PDV
metrics.
5.2. PTP LSP recovery
The three main components are the 1588 Master, the 1588 Slave and the
packet network. A packet timing signal generated by the 1588 Master
is transported over the packet network so that the 1588 Slave can
Zhang & Xia Expires April 22, 2012 [Page 8]
Internet-Draft PDV-based PTP LSP Oct 2011
generate a clock frequency traceable to the input timing signal
available at the 1588 Master.
Mpls Network
head-end +---------------------------+ tail-end
(the 1588 Master)| primary PTP LSP |(the 1588 Slave)
+------| = = = = = = = = = = = = =>|-------+
======> | | | |======>
+------| = = = = = = = = = = = = =>|-------+
| backup PTP LSP |
+---------------------------+
Figure 2. PTP LSP recovery
In this case, there is only a 1588 Master to which the 1588 Slaves
are synchronized. It is REQUIRED to set up the primary and the
backup PTP LSP, because the PDV metrics is critical to the
synchronization performance. This document defines the following
functions:
1) The head-end node sets up dedicated bidirectional 1+1 path
protection which contain the primary and the backup PTP LSP;
2) The head-end node and the tail-end all send the Announce message
to each other and to establish the synchronization hierarchy.
3) The 1588 Master initiates simultaneously the synchronization
message exchange over the primary and the backup PTP LSPs. The 1588
Slave obtains the timestamp t1,t2,t3 and t4 which is used for PDV
measurement.
4) The 1588 Slave compares the PDV performance of primary path with
the PDV performance of backup path to determine which PTP LSP should
be selected, and the 1588 Slave synchronizes to the PTP LSP which the
PDV performance is better.
5) If the PDV perfermance of primary path is exceed the PDV network
limits, then the PTP LSP will switch to the backup path and
synchronize to it. At the same time, the 1588 Slave sends a notify
message to the 1588 Master to reoptimize the primary PTP LSP.
5.3. PTP Master recovery
In traditional synchronization networks, timing availability is
enhanced by the use of timing protection where by the timing to a
Zhang & Xia Expires April 22, 2012 [Page 9]
Internet-Draft PDV-based PTP LSP Oct 2011
1588 Slave clock (e.g. SEC, or EEC) may be provided over one or more
alternative network paths. In the case of the packet based timing
architecture, the 1588 Slave may have visibility to two or more 1588
Masters. 1588 Master protection is stated in In ITU-T G.8265 section
7.2.1.
Mpls Network
head-end1 +-------------------------------+
(the 1588 Master1) | |
+------| | tail-end
======> | | PTP LSP1 |(the 1588 Slave)
+------| = = = = = = = = == = = = = => |-------+
head-end2 | | |======>
(the 1588 Master2) | PTP LSP2 | |
+------| = = = = = = = = == = = = = = >|-------+
======>| | |
+------| |
+-------------------------------+
Figure 3. PTP Master recovery
In this case, there are two 1588 Masters to which the 1588 Slave is
synchronized. The following details 1588 Master recovery process:
1) The primary Master and the backup Master are set up respectively a
bidirectional PTP LSP to the 1588 Slave.
2) The 1588 Masters and the 1588 Slave all send the Announce message
to each other and to establish the synchronization hierarchy.
3) The primary Master and the backup Master initiate respectively the
synchronization message exchange over the PTP LSP. The 1588 Slave
obtains the timestamp t1,t2,t3 and t4 which is used for PDV
measurement from the primary Master and the backup Master.
4) The 1588 Slave compares the PDV performance of the primary Master
with the PDV performance of the backup Master to determine which 1588
Master should be selected. According to ITU-T G.8265.1 6.7.3 "Master
selection process", the following parameters contribute to the 1588
Master selection process: (1)Quality Level(QL), (2)Packet Timing
Signal Fail(PTSF-lossSync,PTSF-lossAnnounce,PTSF-unusable) and
Priority. PTSF-unusable means that the PTP packet timing signal is
not usable for the 1588 Slave to achieve the performance target (e.g.
violates the 1588 Slave input tolerance because of excessive PDV
noise), then a PTSF-unusable associated to this 1588 Master must
occur.
Zhang & Xia Expires April 22, 2012 [Page 10]
Internet-Draft PDV-based PTP LSP Oct 2011
6. Protocal extensions
6.1. IGP extensions
MPLS-TE routing relies on extensions to OSPF [RFC2328] [RFC5340] and
IS-IS [ISO] [RFC1195] in order to advertise Traffic Engineering (TE)
link information used for constraint-based routing. Indeed, it is
useful to advertise data plane TE router link capabilities, such as
the capability for a router to be reserving-bandwidth. This
capability MUST then be taken into account during path computation to
prefer links that advertise themselves as reserving- bandwidth, so
that the PTP LSPs can be properly handled. For this purpose, the
following sections specify extensions to OSPF and IS-IS in order to
advertise reserving-bandwidth capabilities of a link.
1. reserving-bandwidth Capability for OSPF OSPF uses the Link TLV
(Type 2) that is itself carried within either the Traffic Engineering
LSA specified in [RFC3630] or the OSPFv3 Intra-Area-TE LSA (function
code 10) defined in [RFC5329] to advertise the TE related information
for the locally attached router links. For an LSA Type 10, one LSA
can contain one Link TLV information for a single link. This
extension defines a new reserving-bandwidth capability sub-TLV that
can be carried as part of the Link TLV.
The reserving-bandwidth capability sub-TLV is OPTIONAL and MUST NOT
appear more than once within the Link TLV. If a second instance of
the reserving-bandwidth capability sub-TLV is present, the receiving
system MUST only process the first instance of the sub-TLV. It is
defined as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags |
+-+-+-+-+-+-+-+-+
Figure 4: reserving-bandwidth Capability TLV
Where:
Type, 16 bits: reserving-bandwidth Capability TLV where the value is
TBD;
Length, 16 bits: Gives the length of the flags field in octets, and
Zhang & Xia Expires April 22, 2012 [Page 11]
Internet-Draft PDV-based PTP LSP Oct 2011
is currently set to 1;
Flags, 8 bits: The bits are defined least-significant-bit (LSB)
first, so bit 7 is the least significant bit of the flags octet.
0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+
| Reserved |R|
+-+-+-+-+-+-+-+-+
Figure 5: Flags Format
Reserving bandwidth (R) field, 1 bit: Setting the R bit to 1
indicates that the node is capable of supporting reserving-bandwidth
capability. When this is set to 0, it means that this node cannot
reserve bandwidth for PTP LSP.
Reserved, 7 bits: Reserved for future use. The reserved bits must be
ignored by the receiver. The reserving-bandwidth Capability sub-TLV
is applicable to both OSPFv2 and OSPFv3. 2. reserving-bandwidth
Capability for IS-IS The IS-IS Traffic Engineering [RFC3784] defines
the intra-area traffic engineering enhancements and uses the Extended
IS Reachability TLV (Type 22) [RFC5305] to carry the per link TE-
related information. This extension defines a new reserving-
bandwidth capability sub-TLV that can be carried as part of the
Extended IS Reachability TLV. The reserving-bandwidth capability
sub-TLV is OPTIONAL and MUST NOT appear more than once within the
Extended IS Reachability TLV or the Multi-Topology (MT) Intermediate
Systems TLV (type 222) specified in [RFC5120]. If a second instance
of the reserving-bandwidth capability sub-TLV is present, the
receiving system MUST only process the first instance of the sub-TLV.
The format of the IS-IS reserving-bandwidth sub-TLV is identical to
the TLV format used by the Traffic Engineering Extensions to IS-IS
[RFC3784]. That is, the TLV is comprised of 1 octet for the type, 1
octet specifying the TLV length, and a value field. The Length field
defines the length of the value portion in octets.
0 1 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 6: reserving-bandwidth Capability sub-TLV
Where:
Zhang & Xia Expires April 22, 2012 [Page 12]
Internet-Draft PDV-based PTP LSP Oct 2011
Type, 8 bits: reserving-bandwidth Capability sub-TLV where the value
is TBD;
Length, 8 bits: Gives the length of the flags field in octets, and is
currently set to 1 Flags, 8 bits: The bits are defined least-
significant-bit (LSB) first, so bit 7 is the least significant bit of
the flags octet.
0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+
| Reserved |R|
+-+-+-+-+-+-+-+-+
Figure 7: Flags Format
Reserving bandwidth (R) field, 1 bit: Setting the R bit to 1
indicates that the node is capable of supporting reserving-bandwidth
capability. When this is set to 0, it means that this node cannot
reserve bandwidth for PTP LSP.
Reserved, 7 bits: Reserved for future use. The reserved bits must be
ignored by the receiver.
6.2. RSVP-TE extensions
A new flag in the SESSION ATTRIBUTE object and new Error Value sub-
codes in the ERROR SPEC object are proposed in this document.
1.PTP LSP Congestion Detection Request The following new flag of the
SESSION_ATTRIBUTE object (C-Type 1 and 7) is defined: Path congestion
detection request: 0x40 This flag indicates that a PTP LSP congestion
detection (of the current PTP LSP in use) is requested.
2.New Error Value Sub-Codes As defined in [RFC3209], the Error Code
25 in the ERROR SPEC object corresponds to a Notify Error. This
document adds a new Error Value sub-codes:
9,PDV degradation.
7. Other considerations
Network congestion may also led to PTP packets being dropped. So, in
addition to the PDV, the statistics for packet loss rate SHOULD be
collected by the 1588 Slave. When packet loss rate has going up a
Zhang & Xia Expires April 22, 2012 [Page 13]
Internet-Draft PDV-based PTP LSP Oct 2011
certain threshold, the 1588 Slave send a notify message to the 1588
master that decides to reoptimize the PTP LSP or not.
8. Security Considerations
An experimental security protocol is defined in [IEEE]. The PTP
security extension and protocol provides group source authentication,
message integrity, and replay attack protection for PTP messages.
9. Acknowledgements
The authors would like to thank Li He, Liang Xia, Lizhong Jin,Zhitao
Fu,Weilian Jiang and other members for their suggestions and helpful
comments during the discussions of this document.
10. IANA Considerations
10.1. IANA Considerations for OSPF
IANA has defined a sub-registry for the sub-TLVs carried in an OSPF
TE Link TLV (type 2). IANA is requested to assign a new sub-TLV
codepoint for the reserving-bandwidth capability sub-TLV carried
within the Router Link TLV.
Value Sub-TLV References
------ ------------------------------- ----------
TBD reserving-bandwidth node sub-TLV (this document)
10.2. IANA Considerations for IS-IS
IANA has defined a sub-registry for the sub-TLVs carried in the IS-IS
Extended IS Reacability TLV. IANA is requested to assign a new. sub-
TLV code-point for the reserving-bandwidth capability sub-TLV carried
within the Extended IS Reacability TLV.
Value Sub-TLV References
----- ------------------------------- ----------
TBD reserving-bandwidth node sub-TLV (this document)
Zhang & Xia Expires April 22, 2012 [Page 14]
Internet-Draft PDV-based PTP LSP Oct 2011
10.3. IANA Considerations for RSVP
IANA assigned three new error sub-code values for the RSVP PathErr
Notify message (Error code=25): 9, PDV degradation.
11. References
11.1. Normative References
[I-D.ietf-tictoc-1588overmpls]
S. Davari,A. Oren,M. Bhatia,P. Roberts,L. Montini,
"Transporting PTP messages (1588) over MPLS Networks",
draft-ietf-tictoc-1588overmpls-02 , October 2011.
[IEEE] "IEEE 1588-2008, "IEEE Standard for a Precision Clock
Synchronization Protocol for Networked Measurement and
Control Systems", , 2008.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
Tunnels", RFC 3209, December 2001.
[RFC3985] Bryant, S. and P. Pate, "Pseudo Wire Emulation Edge-to-
Edge (PWE3) Architecture", RFC 3985, March 2005.
[RFC4736] Vasseur, JP., Ikejiri, Y., and R. Zhang, "Reoptimization
of Multiprotocol Label Switching (MPLS) Traffic
Engineering (TE) Loosely Routed Label Switched Path
(LSP)", RFC 4736, November 2006.
[RFC5880] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
(BFD)", RFC 5880, June 2010.
[RFC5884] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow,
"Bidirectional Forwarding Detection (BFD) for MPLS Label
Switched Paths (LSPs)", RFC 5884, June 2010.
11.2. Informative References
[ISO] "ISO/IEC 10589:1992, "Intermediate system to Intermediate
system routeing information exchange protocol for use in
conjunction with the Protocol for providing the
Connectionless-mode Network Service (ISO 8473)", , 1992.
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, December 1990.
Zhang & Xia Expires April 22, 2012 [Page 15]
Internet-Draft PDV-based PTP LSP Oct 2011
[RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998.
[RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering
(TE) Extensions to OSPF Version 2", RFC 3630,
September 2003.
[RFC3784] Smit, H. and T. Li, "Intermediate System to Intermediate
System (IS-IS) Extensions for Traffic Engineering (TE)",
RFC 3784, June 2004.
[RFC4970] Lindem, A., Shen, N., Vasseur, JP., Aggarwal, R., and S.
Shaffer, "Extensions to OSPF for Advertising Optional
Router Capabilities", RFC 4970, July 2007.
[RFC4971] Vasseur, JP., Shen, N., and R. Aggarwal, "Intermediate
System to Intermediate System (IS-IS) Extensions for
Advertising Router Information", RFC 4971, July 2007.
[RFC5120] Przygienda, T., Shen, N., and N. Sheth, "M-ISIS: Multi
Topology (MT) Routing in Intermediate System to
Intermediate Systems (IS-ISs)", RFC 5120, February 2008.
[RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic
Engineering", RFC 5305, October 2008.
[RFC5329] Ishiguro, K., Manral, V., Davey, A., and A. Lindem,
"Traffic Engineering Extensions to OSPF Version 3",
RFC 5329, September 2008.
Authors' Addresses
Junhui Zhang
ZTE Corporation
No.50 Ruanjian Ave,Yuhuatai District
Nanjing 210012
P.R.China
Email: zhang.junhui1@zte.com.cn
URI: http://www.zte.com.cn/
Zhang & Xia Expires April 22, 2012 [Page 16]
Internet-Draft PDV-based PTP LSP Oct 2011
Liang Xia
ZTE Corporation
No.50 Ruanjian Ave,Yuhuatai District
Nanjing 210012
P.R.China
Email: xia.liang2@zte.com.cn
URI: http://www.zte.com.cn/
Zhang & Xia Expires April 22, 2012 [Page 17]