One document matched: draft-wadhwa-gsmp-l2control-configuration-02.txt
Differences from draft-wadhwa-gsmp-l2control-configuration-01.txt
Working Group Name Sanjay Wadhwa
Internet Draft Juniper Networks
Expires: April 22, 2007
Jerome Moisand
Juniper Networks
Swami Subramanian
Juniper Networks
Thomas Haag
T-Systems
Norbert Voigt
Siemens
October 22, 2006
GSMP extensions for Access Node Control Mechanism
draft-wadhwa-gsmp-l2control-configuration-02.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts. Internet-Drafts are draft documents valid for a maximum of
six months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 22, 2007.
Wadhwa et.al Expires April 22, 2007 [Page 1]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Copyright Notice
Copyright (C) The Internet Society (2006). All Rights Reserved.
Abstract
This document describes proposed extensions to the GSMPv3 protocol to
allow its use in a broadband environment, as a control plane between
Access Nodes (e.g. DSLAM) and Broadband Network Gateways (e.g. BRAS).
These proposed extensions are required to realize a protocol for
“Access Node Control” mechanism as described in [9]. The resulting
protocol with the proposed extensions to GSMPv3 [4] is referred to as
“Access Node Control Protocol” (ANCP). This document focuses on
specific use cases of access node control mechanism for topology
discovery, line configuration, and OAM. It is intended to be
augmented by additional protocol specification for future use cases
considered in scope by the ANCP charter.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [1].
Table of Contents
1 Specification Requirements 4
2 Introduction4
3 Broadband Access Aggregation 4
3.1 ATM-based broadband aggregation..........................4
3.2 Ethernet-based broadband aggregation.....................6
4 Access Node Control Protocol 7
4.1 Overview.................................................7
4.2 ANCP based Access Topology Discovery.....................8
4.2.1 Goals..............................................8
4.2.2 Message Flow.......................................9
4.3 ANCP based Line Configuration...........................10
4.3.1 Goals.............................................10
4.3.2 Message Flow......................................11
4.4 ANCP based Transactional Multicast......................12
4.5 ANCP based OAM..........................................13
Wadhwa et.al Expires April 22, 2007 [Page 2]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
4.5.1 Message Flow......................................13
5 Access Node Control Protocol (ANCP) 14
5.1 ANCP/TCP connection establishment.......................14
5.2 ANCP Connection keep-alive..............................15
5.3 Capability negotiation..................................16
5.4 GSMP Message Extensions for Access Node Control.........18
5.4.1 General Extensions................................18
5.4.2 Topology Discovery Extensions.....................21
5.4.3 Line Configuration Extensions.....................30
5.4.4 OAM Extensions....................................32
5.5 ATM-specific considerations.............................35
5.6 Ethernet-specific considerations........................36
6 IANA Considerations 36
7 Security Considerations 36
8 References 37
Author's Addresses38
Intellectual Property Statement 38
Disclaimer of Validity 39
Copyright Statement 39
Acknowledgment 39
Wadhwa et.al Expires April 22, 2007 [Page 3]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
1 Specification Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
“SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119.
2 Introduction
DSL is a widely deployed access technology for Broadband Access for
Next Generation Networks. Several specifications like [1-3] describe
possible architectures for these access networks. In the scope of
these specifications are the delivery of voice, video and data
services.
When deploying value-added services across DSL access networks,
special attention regarding quality of service and service control is
required, which implies a tighter coordination between network
elements in the broadband access network without burdening the OSS
layer.
This draft defines extensions and modifications to GSMPv3 (specified
in [4]) and certain new mechanisms to realize a control plane between
a service-oriented layer 3 edge device (the BRAS) and a layer2 Access
Node (e.g. DSLAM) in order to perform QoS-related, service-related
and subscriber-related operations. The control protocol as a result
of these extensions and mechanisms is referred to as “Access Node
Control Protocol” (ANCP).
In addition to specifying extensions and modifications to relevant
GSMP messages applicable to access node control mechanism, this draft
also defines values that ANCP should set for relevant fields in these
GSMP messages. However, to understand the basic semantics of various
fields in GSMP messages, the reader is referred to [4].
3 Broadband Access Aggregation
3.1 ATM-based broadband aggregation
End to end DSL network consists of network and application service
provider networks (NSP and ASP networks), regional/access network,
and customer premises network. Fig 1. shows ATM broadband access
network components.
Wadhwa et.al Expires April 22, 2007 [Page 4]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
The NSP authenticates access and provides and manages the IP address
to subscribers. It is responsible for overall service assurance and
includes internet service providers. ASP provides application
services to the application subscriber (gaming, video, content on
demand, IP telephony etc.).
The Regional/Access Network consists of the Regional Network,
Broadband Remote Access Server, and the Access Network as show in Fig
1. Its primary function is to provide end-to-end transport between
the customer premises and the NSP or ASP. The Regional/Access Network
may also provide higher layer functions such as QoS and content
distribution.
The Regional Network connects one or more BRAS and associated Access
Network to NSPs and ASPs. It supports aggregation of traffic from
multiple Access Networks and hands off larger geographic locations to
NSPs and ASPs – relieving a potential requirement for them to build
infrastructure to attach more directly to the various Access
Networks.
The Access Node terminates the DSL signal. It could consist of DSLAM
in the central office , or remote DSLAM, or a Remote Access
Multiplexer (RAM). A DSLAM hub can be used in a central office to
aggregate traffic from multiple remote physical devices, and is
considered logically to be a part of the Access Node. Access node is
the first point in the network where traffic on multiple DSL lines
will be aggregated onto a single network. In an ATM access network,
access Node is primarily an ATM concentrator, mapping PVCs from the
DSL modem to PVCs in the ATM core.
The BRAS performs multiple functions in the network. The BRAS is the
aggregation point for the subscriber traffic. It provides aggregation
capabilities (e.g. IP, PPP, ATM) between the Regional/Access Network
and the NSP or ASP. These include traditional ATM-based offerings and
newer, more native IP-based services. This includes support for
Point-to-Point Protocol over ATM (PPPoA) and PPP over Ethernet
(PPPoE), as well as direct IP services encapsulated over an
appropriate layer II transport.
Beyond aggregation, BRAS is also the injection point for policy
management and IP QoS in the Regional/Access Networks. In order to
allow IP QoS support over an existing non-IP-aware layer 2 access
network without using multiple layer 2 QoS classes, a mechanism based
on hierarchical scheduling is used. This mechanism defined in [1],
preserves IP QoS over the ATM network between the BRAS and the RGs by
Wadhwa et.al Expires April 22, 2007 [Page 5]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
carefully controlling downstream traffic in the BRAS, so that
significant queuing and congestion does not occur further down the
ATM network. This is achieved by using a diffserv-aware hierarchical
scheduler in the BRAS that will account for downstream trunk
bandwidths and DSL synch rates.
Routing Gateway is a customer premises functional element that
provides IP routing and QOS capabilities. It may be integrated into
or be separate from the modem.
Access Customer
<--- Aggregation ---> <------- Premises ------->
Network Network
+-------------------+ +--------------------------+
+----------+ +-----+ | +-----+ +------+ |--|+-----+ +--+ +----------+ |
| | +-|BRAS |---| |ATM |--|Access| | ||DSL |-|RG|-|Subscriber| |
NSP---+Regional | | +-----+ | +-----+ | Node | | ||Modem| +--+ |Devices | |
|Broadband | | +-----+ | +------+ | |+-----+ +----------+ |
|Network |-+-|BRAS | +---------------|---+ +--------------------------+
ASP---+ | | +-----+ | +--------------------------+
| | | +-----+ | | +-----+ +--+ +----------+|
+----------+ +-|BRAS | +------| | DSL |-|RG|-|Subscriber||
+-----+ | |Modem| +--+ |Devices ||
| +-----+ +----------+|
+--------------------------+
RG : Routing Gateway
BRAS : Broadband Remote Access Server
Fig.1 ATM Broadband Aggregation Topology
3.2 Ethernet-based broadband aggregation
The Ethernet aggregation network architecture builds on the Ethernet
bridging/switching concepts defined in IEEE 802. The Ethernet
aggregation network provides traffic aggregation, class of service
distinction, and customer separation and traceability. VLAN tagging
defined in IEEE 802.1Q and being enhanced by IEEE 802.1ad is used as
standard virtualization mechanism in the Ethernet aggregation network.
The aggregation devices are “provider edge bridges” defined in IEEE
802.ad.
Stacked VLAN tags provide one possible way to create equivalent of
“virtual paths” and “virtual circuits” in the aggregation network. The
Wadhwa et.al Expires April 22, 2007 [Page 6]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
“outer” vlan could be used to create a form of “virtual path” between a
given DSLAM and a given BRAS. And “inner” VLAN tags to create a form of
“virtual circuit” on a per DSL line basis. This is 1:1 VLAN allocation
model. An alternative model is to bridge sessions from multiple
subscribers behind a DSLAM into a single VLAN in the aggregation
network. This is N:1 VLAN allocation model. Architectural and
topological models of an Ethernet aggregation network in context of DSL
aggregation are defined in [8].
4 Access Node Control Protocol
4.1 Overview
There is a requirement for a control plane between service-oriented
layer 3 edge device (the BRAS) and a layer 2 Access Node (e.g. DSLAM)
in order to perform QoS-related, service-related and subscriber-
related operations. A dedicated control protocol between BRAS and
access nodes can facilitate "BRAS managed" tight QOS control in the
access network, simplified OSS infrastructure for service management,
optimized multicast replication to enable video services over DSL,
subscriber statistics retrieval on the BRAS for accounting purposes,
and fault isolation capability on the BRAS for the underlying access
technology. This dedicated control plane is referred to as “Access
Node Control Protocol” (ANCP). This document specifies relevant
extensions to GSMPv3 as defined [4] to realize ANCP.
Following sections discuss the use of ANCP for implementing:
. Dynamic discovery of access topology by the BRAS to provide
tight QOS control in the access network.
. Pushing to the access-nodes, subscriber and service data
retrieved by the BRAS from an OSS system (e.g. radius server),
to simplify OSS infrastructure for service management.
. Optimized, "BRAS controlled and managed" multicast replication
by access-nodes at L2 layer.
. BRAS controlled, on-demand access-line test capability
(rudimentary end-to-end OAM).
In addition to DSL, alternate broadband access technologies (e.g.
Metro-Ethernet, Passive Optical Networking, WiMax) will have similar
challenges to address, and could benefit from the same approach of a
control plane between a BRAS and an Access Node (e.g. OLT), providing
a unified control and management architecture for multiple access
Wadhwa et.al Expires April 22, 2007 [Page 7]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
technologies, hence facilitating migration from one to the other
and/or parallel deployments.
GSMPv3 is an ideal fit for implementing ANCP. It is extensible and
can be run over TCP/IP, which makes it possible to run over different
access technologies.
4.2 ANCP based Access Topology Discovery
4.2.1 Goals
[1] discusses various queuing/scheduling mechanisms to avoid
congestion in the access network while dealing with multiple flows
with distinct QoS requirements. Such mechanisms require that the BRAS
gains knowledge about the topology of the access network, the various
links being used and their respective rates. Some of the information
required is somewhat dynamic in nature (e.g. DSL sync rate), hence
cannot come from a provisioning and/or inventory management OSS
system. Some of the information varies less frequently (e.g. capacity
of a DSLAM uplink), but nevertheless needs to be kept strictly in
sync between the actual capacity of the uplink and the image the BRAS
has of it.
OSS systems are rarely able to enforce in a reliable and scalable
manner the consistency of such data, notably across organizational
boundaries. Dynamic and automated discovery of the access network
topology would help to address these issues, notably when performed
by an interoperable and standardized protocol. Following section
describes ANCP messages that allow the Access Node (e.g. DSLAM) to
communicate to the BRAS, access network topology information and any
corresponding updates.
Some of the parameters that can be communicated from the DSLAM to the
BRAS include DSL line state, actual upstream and downstream data
rates of a synchronized DSL link, maximum attainable upstream and
downstream data rates, interleaving delay etc. Topology discovery is
specifically important in case the net data rate of the DSL line
changes over time. The DSL net data rate may be different every time
the DSL modem is turned on. Additionally, during the time the DSL
modem is active, data rate changes can occur due to environmental
conditions (the DSL line can get "out of sync" and can retrain to a
lower value.
Wadhwa et.al Expires April 22, 2007 [Page 8]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
4.2.2 Message Flow
When a DSL line initially comes up or resynchronizes to a different
rate, the DSLAM generates and transmits a GSMP PORT UP EVENT message to
the BRAS. The extension field in the message carries the TLVs containing
DSL line specific parameters. On a loss of signal on the DSL line, a
GSMP PORT DOWN message is generated by the DSLAM to the BRAS. In order
to provide expected service level, BRAS needs to learn the initial
attributes of the DSL line before the subscriber can log in and access
the provisioned services for the subscriber.
<----- Port UP(EVENT Message) <----- DSL
(default line parameters) Signal
1. BRAS ----------------------- DSLAM ----------- Routing ----- Subscriber
Gateway
<----- Port UP (EVENT Message) <----- DSL
(updated line parameters) Resynch
2. BRAS ----------------------- DSLAM ----------- Routing ------ Subscriber
Gateway
<--- Port DOWN (EVENT Message) <---- DSL
Loss of Signal
3. BRAS ---------------------- DSLAM ------------- Routing ----- Subscriber
Gateway
Fig 2. Message flow (ANCP mapping) for topology discovery
The Event message with PORT UP message type (80) is used for
conveying DSL line attributes to the BRAS. This message with relevant
extensions is defined in section 5.4.2.
Wadhwa et.al Expires April 22, 2007 [Page 9]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
4.3 ANCP based Line Configuration
4.3.1 Goals
Following dynamic discovery of access topology (identification of DSL
line and its attributes) as assisted by the mechanism described in
the previous section (topology discovery), the BRAS could then query
a subscriber management OSS system (e.g. RADIUS server) to
retrieve subscriber authorization data (service profiles, aka user
entitlement). Most of such service mechanisms are typically enforced
by the BRAS itself, but there are a few cases where it might be
useful to push such service parameter to the DSLAM for local
enforcement of a mechanism (e.g. DSL-related) on the corresponding
subscriber line. One such example of a service parameter that can be
pushed to the DSLAM for local enforcement is DSL "interleaving
delay". Longer interleaving delay (and hence stringent error
correction) is required for a video service to ensure better video
"quality of experience", whereas for a VoIP service or for "shoot
first" gaming service, a very short interleaving delay is more
appropriate. Another relevant application is downloading per
subscriber multicast channel entitlement information in IPTV
applications where the DSLAM is performing IGMP snooping or IGMP
proxy function. Using ANCP, the BRAS could achieve the goal of
pushing line configuration to the DSLAM by an interoperable and
standardized protocol.
If a subscriber wants to choose a different service, it can require
an OPEX intensive reconfiguration of the line via a network operator,
possibly implying a business-to-business transaction between an ISP
and an access provider. Using ANCP for line configuration from the
BRAS dramatically simplifies the OSS infrastructure for service
management, allowing fully centralized subscriber-related service
data (e.g. RADIUS server back-end) and avoiding complex cross-
organization B2B interactions.
Therefore, proposed ANCP based line configuration support provides
for more flexible approach for achieving "service on demand". More
generally several service/subscriber DSL parameters (e.g. inter-
leaving delay, rate etc.) could benefit from such flexible approach
to enable a "service on demand" model.
The best way to change line parameters would be by using profiles.
These profiles (DSL profiles for different services) are pre-
configured on the DSLAMs. The BRAS can then indicate a reference to
the right DSL profile via ANCP. Alternatively, discrete DSL
parameters can also be conveyed by the BRAS in ANCP.
Wadhwa et.al Expires April 22, 2007 [Page 10]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
4.3.2 Message Flow
Triggered by topology information reporting a new DSL line or triggered
by a subsequent user session establishment (PPP or DHCP), the BRAS may
send line configuration information (e.g. reference to a DSL profile) to
the DSLAM using GSMP Port Management messages. The BRAS may get such
line configuration data from a policy server (e.g. RADIUS). Figure 3
summarizes the interaction.
1.DSL Signal
<-----------
2. Port UP (EVENT Message)
(Access Topology Discovery)
<--------------------------
3. PPP/DHCP Session
<-----------------------------------------------------
4. Authorization
& Authentication
<-------------------
Port Management Message
(Line Configuration)
5. ---------------->
+-------------+ +-----+ +-------+ +----------+ +-----------+
|Radius/AAA |------|BRAS |---------| DSLAM |------ | Routing |------ |Subscriber |
|Policy Server| +-----+ +-------+ | Gateway | +-----------+
+-------------+ +----------+
Fig 3. Message flow - ANCP mapping for Initial Line Configuration
The BRAS may update the line configuration due to a subscriber service
change (e.g. triggered by the policy server). Figure 4 summarizes the
interaction
Wadhwa et.al Expires April 22, 2007 [Page 11]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
1. PPP/DHCP Session
<------------------------------------------
+-------------+ 2. Service On Demand
| |<------------------------------------------------
| Web portal |
| OSS etc | 3.Change of 4.Port Management
| | Authorization Message
| Radius AAA | --------> (Updated Line
| Policy | Config - New Profile)
| | -------------.
| | +------+ +-------+ +---------+ +----------+
| |----| BRAS |-----| DSLAM |---| Routing |--|Subscriber|
| | +------+ +-------+ | Gateway | +----------+
+-------------+ +---------+
Fig 4. Message flow - ANCP mapping for Updated Line Configuration
The format of relevant extensions to port management message is
defined in section 5.4.3. The line configuration models could be
viewed as a form of delegation of authorization from the BRAS to the
DSLAM.
4.4 ANCP based Transactional Multicast
Typical IP multicast in access networks involves the BRAS terminating
user requests for receiving multicast channels via IGMP. The BRAS
authorizes the subscriber, and dynamically determines the multicast
subscription rights for the subscriber. Based on the user's
subscription, the BRAS can replicate the same multicast stream to
multiple subscribers. This leads to a waste of access bandwidth if
multiple subscribers access network services via the same access-node
(e.g. DSLAM). The amount of multicast replication is of the order of
number of subscribers rather than the number of access-nodes.
It is ideal for BRAS to send a single copy of the multicast stream to
a given access-node, and let the access-node perform multicast
replication by layer2 means (e.g. ATM point-to-multipoint cell
replication or ethernet data-link bridging) for subscribers behind
the access-node. However, operationally, BRAS is the ideal choice to
handle subscriber management functions (authentication,
authorization, accounting and address management), multicast policies
Wadhwa et.al Expires April 22, 2007 [Page 12]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
such as per-channel authorization, and complex multicast routing
protocols. Therefore, some means is needed for the BRAS to setup
multicast replication state in the access-nodes. In ATM access
networks, ANCP can be used by the BRAS to setup P2MP cross-connects
in the DSLAMs. Protocol support for this use-case will be provided in
future.
4.5 ANCP based OAM
In case of an ATM based access aggregation network and an ATM based
local loop, end-to-end ATM OAM can be used for on-demand connectivity
testing, monitoring and fault localization. However, in case the
aggregation network between the BRAS and access-node is ethernet
based, end-to-end ATM OAM test can not be used. Ideally in Ethernet
based aggregation, end-to-end ethernet OAM as specified by ITU and
IEEE (801.ag / Y.17 ethoam) can provide access-line connectivity
testing and fault isolation. However, most DSL modems do not yet
support these standard ethernet OAM procedures. Also, various
technologies exist in the access network - ATM, EFM (ethernet in the
first mile, standardized in IEEE 802.3ah), GPON etc. These
technologies have their own link-based OAM mechanisms that have been
standardized or are under standardization in different standard
bodies. Inter-working between 802.1ag and different link-OAM
mechanisms are a work in progress and are being evaluated on a case
by case basis.
However, a simple solution based on ANCP can provide BRAS with an
access-line test capability and to some extent fault isolation.
Controlled by a local management interface the BRAS can use an ANCP
operation to trigger the access-node to perform a loopback test on
the local-loop (between the access-node and the CPE). The access-node
can respond via another ANCP operation the result of the triggered
loopback test. In case of ATM based local-loop the ANCP operation can
trigger the access-node to generate ATM (F4/F5) loopback cells on the
local loop. In case of Ethernet, the access-node can trigger an
ethernet loopback message(per EFM OAM) on the local-loop.
4.5.1 Message Flow
“Port Management” message can be used by the BRAS to request access
node to trigger a “remote loopback” test on the local loop. The
result of the loopback test can be asynchronously conveyed by the
access node to the BRAS in a “Port Management” response message. The
format of relevant extensions to port management message is defined
in section 5.4.4.
Wadhwa et.al Expires April 22, 2007 [Page 13]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Port Management Message
(Remote Loopback ATM loopback
Trigger Request) OR EFM Loopback
1. ----------------> 2. ---------->
<---------+
+-------------+ +-----+ +-------+ +-----------------+
|Radius/AAA |------|BRAS |---------| DSLAM |-------------| CPE |
|Policy Server| +-----+ +-------+ | (DSL Modem + |
+-------------+ | Routing Gateway)|
+-----------------+
3. <---------------
Port Management Message
(Remote Loopback Test Response)
5 Access Node Control Protocol (ANCP)
5.1 ANCP/TCP connection establishment
ANCP will use TCP for exchanging protocol messages. [5] defines the
GSMP message encapsulation for TCP. The TCP session is initiated
from the DSLAM (access node) to the BRAS (controller). This is
necessary to avoid static provisioning on the BRAS for all the DSLAMs
that are being served by the BRAS. It is easier to configure a given
DSLAM with the single IP address of the BRAS that serves the DSLAM.
This is a deviation from [5] which indicates that the controller
initiates the TCP connection to the switch.
BRAS listens for incoming connections from the access nodes. Port
6068 is used for TCP connection. Adjacency protocol messages, which
are used to synchronize the BRAS and access-nodes and maintain
handshakes, are sent after the TCP connection is established. ANCP
messages other than adjacency protocol messages may be sent only
after the adjacency protocol has achieved synchronization.
In the case of ATM access, a separate PVC (control channel) capable
of transporting IP would be configured between BRAS and the DSLAM for
ANCP messages.
Wadhwa et.al Expires April 22, 2007 [Page 14]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
5.2 ANCP Connection keep-alive
GSMPv3 defines an adjacency protocol. The adjacency protocol is used
to synchronize states across the link, to negotiate which version of
the GSMP protocol to use, to discover the identity of the entity at
the other end of a link, and to detect when it changes. GSMP is a
hard state protocol. It is therefore important to detect loss of
contact between switch and controller, and to detect any change of
identity of switch or controller. No protocol messages other than
those of the adjacency protocol may be sent across the link until the
adjacency protocol has achieved synchronization. There are no changes
to the base GSMP adjacency protocol for implementing ANCP.
The BRAS will set the M-flag in the SYN message (signifying it is the
master). Once the adjacency is established, periodic adjacency
messages (type ACK) are exchanged. The default ACK interval as
advertised in the adjacency messages is 10 sec for ANCP. It SHOULD be
configurable and is an implementation choice. It is recommended that
both ends specify the same timer value. However, it is not necessary
for the timer values to match.
The GSMP adjacency message defined in [4] is extended for ANCP and is
shown in section 5.3 immediately following this section. The 8-bit
“version” field in the adjacency protocol messages is modified to
carry the version and sub-version of the GSMP protocol for version
negotiation. ANCP uses version 3 and sub-version 1 of GSMP protocol.
The semantics and suggested values for Code, “Sender Name”, “Receiver
Name”, “Sender Instance”, and “Receiver Instance” fields are as
defined in [4]. The “Sender Port”, and “Receiver Port” should be set
to 0 by both ends. The pType field should be set to 0. The pFlag
should be set to 1.
If the adjacency times out on either end, due to not receiving an
adjacency message for a duration of (3 * Timer value), where the
timer value is specified in the adjacency message, all the state
received from the ANCP neighbor should be cleaned up, and the TCP
connection should be closed. The BRAS would continue to listen for
new connection requests. The DSLAM will try to re-establish the TCP
connection and both sides will attempt to re-establish the adjacency.
The handling defined above will need some modifications when ANCP
graceful restart procedures are defined. These procedures will be
defined in a separate draft.
Wadhwa et.al Expires April 22, 2007 [Page 15]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
5.3 Capability negotiation
The adjacency message as defined in [4] is extended to carry
technology specific "Capability TLVs". Both the BRAS and the access
node will advertise supported capabilities in the originated
adjacency messages. If a received adjacency message indicates absence
of support for a capability that is supported by the receiving
device, it will turn off the capability locally and will send an
updated adjacency message with the capability turned off to match the
received capability set. This process will eventually result in both
sides agreeing on the minimal set of supported capabilities. The
adjacency will not come up unless the capabilities advertised by the
controller and the controlled device match.
After initial synchronization, if at anytime a capability mismatch is
detected, the adjacency will be brought down (RSTACK will be
generated by the device detecting the mismatch), and synchronization
will be re-attempted.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ver | Sub | Message Type | Timer |M| Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Name |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| Receiver Name |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Receiver Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PType | PFlag | Sender Instance |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Partition ID | Receiver Instance |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Tech Type | # of TLVs | Total Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ Capability TLVs ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Wadhwa et.al Expires April 22, 2007 [Page 16]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
The format of capability TLV is:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Capability Type | Capability Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ ~
~ Capability Data ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Tech Type field type indicates the technology to which the
capability extension applies. For access node control in case of DSL
networks, new type "DSL" is proposed. The value for this field is
0x05. This is the first available value in the range that is not
currently allocated. It will need to be reserved with IANA.
Capability length is the number of actual bytes contained in the
value portion of the TLV. The TLV is padded to a 4-octet alignment.
Therefore, a TLV with no data will contain a zero in the length field
(if capability data is three octets, the length field will contain a
three, but the size of the actual TLV is eight octets).
Capability data field can be empty if the capability is just a
boolean. In case the capability is a boolean, it is inferred from the
presence of the TLV (with no data). Capability data provides the
flexibility to advertise more than mere presence or absence of a
capability. Capability types can be registered with IANA. Following
capabilities are defined for ANCP as applied to DSL access:
1. Capability Type : Dynamic-Topology-Discovery = 0x01
Length (in bytes) : 0
Capability Data : NULL
2. Capability Type : Line-Configuration = 0x02
Length (in bytes) : 0
Capability Data : NULL
Wadhwa et.al Expires April 22, 2007 [Page 17]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
3. Capability Type : Transactional-Multicast = 0x03 (controller
i.e. BRAS terminates IGMP messages from subscribers, and via l2
control protocol, signals state to the access-nodes (e.g.
DSLAMs) to enable layer2 replication of multicast streams. In
ATM access network this implies that BRAS instructs the access-
node to setup a P2MP cross-connect. The details of this will be
covered in a separate ID [6].
Length (in bytes) : 0
Capability Data : NULL
4. Capability Type : OAM = 0x04
Length (in bytes) : 0
Capability Data : NULL
5. Capability Type : Bulk Transaction = 0x05 (defined in section
5.4.1.2).
Length (in bytes) : 0
Capability Data : NULL
5.4 GSMP Message Extensions for Access Node Control
5.4.1 General Extensions
Extensions to GSMP messages for various use-cases of “Acess Node
Control” mechanism are defined in sections 5.4.2 to 5.4.4. However,
sub-sections 5.4.1.1 and 5.4.1.2 below define extensions to GSMP that
have general applicability.
5.4.1.1 Extension TLV
In order to provide flexibility and extensibility certain GSMP
messages such as “PORT MANAGEMENT” and “EVENT” messages defined in
[4] have been modified to include an extension block that follows a
TLV structure. Individual messages in the following sections describe
the usage and format of the extension block.
Wadhwa et.al Expires April 22, 2007 [Page 18]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
All Extension TLV's will be designated as follow:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|x|x|x|x|x|x|x|x| Message Type | Tech Type | Block Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ Extension Value ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
x: Reserved Flags
These are generally used by specific messages and will be
defined in those messages.
Message Type
An 8-bit field corresponding to the message type where the
extension block is used.
Tech Type
An 8-bit field indicating the applicable technology type value.
The Message Type plus the Tech Value uniquely define a single
Extension Type and can be treated as a single 16 bit extension
type. “Tech Type” value of 0x05 SHOULD be used by ANCP for DSL
technology.
0x00 Extension block not it use.
0x01 – 0x04 Already in use by various technologies
0x05 DSL
0x06 - 0xFE Reserved
Wadhwa et.al Expires April 22, 2007 [Page 19]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
0xFF Base Specification Use
Block Length
A 8-bit field indicating the length of the Extension Value
field in bytes. When the Tech Type = 0x00, the length value
MUST be set to 0.
Extension Value
A variable length field that is an integer number of 32 bit
words long. The Extension Value field is interpreted according
to the specific definitions provided by the messages in the
following sections.
5.4.1.2 Bulk Transaction Message
ANCP elements MAY support a bulk transaction capability. This
capability is negotiated during adjacency synchronization and follows
general ANCP capability negotiation rules.
In a bulk transaction, several messages can be bundled together in a
single transaction. Bulk transaction uses message type 13. Reception
of “Bulk Transaction Message” by a node that has not advertised bulk
transaction capability MUST silently discard the received message.
The Bulk Transaction message has the following format:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vers | Sub | Message Type | Result| Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Partition ID | Transaction Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|I| SubMessage Number | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ Message Payload ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Wadhwa et.al Expires April 22, 2007 [Page 20]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
In a Bulk Transaction Message, each of the message in the payload is
framed with a complete header and is acted on individually. The
response to the Bulk Transaction message contains the response
message that would have been generated by each of the messages had it
been sent individually. Each response message will have the
appropriate result and code field filled. Any message can be included
in the bulk Transaction message except for adjacency message and
another bulk transaction message. If a prohibited message is included
in a bulk Transaction message, it MUST be included in the Bulk
response with a failure response. The response code for that failure
is 0x81 (“Message type prohibited in bulk Transaction”). While the
individual message would fail, this would not constitute a failure
for the Bulk Transaction message
5.4.2 Topology Discovery Extensions
The GSMP Event message with PORT UP message type (80) is used for
conveying DSL line attributes to the BRAS. The version field should be
set to 3, and the sub field should be set to 1. The I and subMessage
fields SHOULD be set to 1 to signify no fragmentation. The Port and
Label fields should be set to 0. The “Port Session Number” should be set
to 0, and the “Event Sequence Number” should be 0. The Tech Type field
is extended with new type "DSL". The value for this field is 0x05. The
message SHOULD be generated when a line first comes UP, or any of the
attributes of the line change e.g. the line re-trains to a different
rate or one or more of the configured line attributes are
administratively modified. Also, when the ANCP session first comes up,
the DSLSM SHOULD transmit a PORT UP message to the BRAS for each line
that is up. A DSLAM MAY use a Bulk Transaction message as defined in [4]
to aggregate the transmission of PORT UP messages.
When a DSL line goes down (idle or silent), the DSLAM SHOULD transmit an
Event message with PORT DOWN message type (81) to the BRAS. It is
recommended that the DSLAMs use a dampening mechanism per DSL line to
control the rate of state changes per DSL line, communicated to the
BRAS.
Wadhwa et.al Expires April 22, 2007 [Page 21]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vers | Sub | Message Type | Result| Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Partition ID | Transaction Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|I| SubMessage Number | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Port Session Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Event Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|x|S|x|x| |
+-+-+-+-+ Label |
~ ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|x|x|x|x|x|x|x|x| Message Type | Tech Type | Block Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ Extension Value ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The format of the "Extension Value" field for Tech Type “DSL” is
as follows :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| # of TLVs | Extension block length (bytes)|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ ~
~ TLVs ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The “Extension Value” contains one or more TLVs to identify a DSL line
and define it’s characteristics. A TLV can consist of multiple sub-TLVs.
First 2 byte of the “Extension Value” contains the number of TLVs that
follow. The next 2 bytes contain the total length of the TLVs carried in
the extension block in bytes (existing “Block Length” field in the GSMP
message is limited to 255 bytes and is not sufficient).
Wadhwa et.al Expires April 22, 2007 [Page 22]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
General format of a TLV is :
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ ~
~ Value ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The value field in each TLV is padded to a 4-octet alignment. The Length
field in each TLV contains the actual number of bytes in the TLV (not
including the padding if present). If a TLV is not understood by the
BRAS, it is silently ignored. Currently defined types start from 0x01.
Following TLVs are currently defined:
1. Type (Access-Loop-Circuit-ID = 0x01): This is a mandatory TLV and
contains an identifier of the subscriber’s connection to the access
node (i.e. “local loop”). The “local loop” can be ATM based or
Ethernet based. The “Access Loop Circuit ID” has local significance
at the access node. The exact usage on the BRAS is beyond the scope
of this document. The format used for “local loop” identification
in ANCP messages MUST be identical to what is used by the access
nodes in subscriber signaling messages when the access nodes act as
“signaling relay agents” as outlined in [7] and [8].
Length : (upto 63 bytes)
Value : ASCII string.
For an ATM based local loop the string consists of slot/port and
VPI/VCI information corresponding to the subscriber’s DSL
connection. Default syntax for the string inserted by the access
node as per [8] is:
“Access-Node-Identifier atm slot/port:vpi.vci”
The Access-Node-Identifier uniquely identifies the access node in
the access network. The slot/port and VPI/VCI uniquely identifies
the DSL line on the access node. Also, there is one to one
Wadhwa et.al Expires April 22, 2007 [Page 23]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
correspondence between DSL line and the VC between the access node
and the BRAS.
For local loop which is Ethernet based (and tagged), the string
consists of slot/port and VLAN tag corresponding to the
subscriber. Default syntax for the string inserted by the access
node as per [8] is:
"Access-Node-Identifier eth slot/port[:vlan-id]"
2. Type (Access-Loop-Remote-Id = 0x02): This is an optional TLV and
contains an identifier to uniquely identify a user on a local loop
on the access node. The exact usage on the BRAS is out of scope of
this document. It is desirable that the format used for the field
is similar to what is used by the access nodes in subscriber
signaling messages when the access nodes act as “signaling relay
agents” as outlined in [7] and [8].
Length : (upto 63 bytes)
Value : ASCII string
3. Type (Access-Aggregation-Circuit-ID-Binary = 0x06)
Length : (8 bytes)
Value : two 32 bit integers.
For ethernet access aggregation, where a per-subscriber (stacked)
VLAN can be applied (1:1 model defined in [8]), the VLAN stack
provides a convenient way to uniquely identify the DSL line. The
outer VLAN is equivalent to virtual path between a DSLAM and the
BRAS and inner VLAN is equivalent to a virtual circuit on a per DSL
line basis. In this scenario, any subscriber data received by the
access node and transmitted out the uplink to the aggregation
network will be tagged with the VLAN stack assigned by the access
node
This TLV can carry the VLAN tags assigned by the access node in the
ANCP messages. The VLAN tags can uniquely identify the DSL line
being referred to in the ANCP messages, assuming the VLAN tags are
not in any way translated in the aggregation network and are unique
across physical ports. Each 32 bit integer (least significant bits)
Wadhwa et.al Expires April 22, 2007 [Page 24]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
contains a 12 bit VLAN identifier (which is part of the VLAN tag
defined by IEEE 802.1Q).
Also, in case of an ATM aggregation network, where the DSLAM is
directly connected to the BRAS (without an intermediate ATM
switch), the two values can contain VPI and VCI on the DSLAM uplink
(and can uniquely identify the DSL line on the DSLAM).
This TLV is optional.
4. Type (Access-Aggregation-Circuit-ID-ASCII = 0x03)
Length : (upto 63 bytes)
Value : ASCII string.
This field contains information pertaining to an uplink on the
access node. For Ethernet access aggregation, assuming the access
node assigns VLAN tags (1:1 model), typical format for the string
is:
“Access-Node-Identifier eth slot/port [:inner-vlan-id][:outer-vlan-id]”
The slot/port corresponds to the ethernet uplink on the access node
towards the BRAS.
For an ATM aggregation network, typical format for the string is:
“Access-Node-Identifier atm slot/port:vpi.vci”
This TLV allows the BRAS to associate the information contained in
the ANCP messages to the DSL line on the access node.
If the access node inserts this string in the ANCP messages, when
referring to local loop characteristics (e.g. DSL line in case of a
DSLAM), then it should be able to map the information contained in
the string uniquely to the local loop (e.g. DSL line).
On the BRAS, the information contained in this string can be used
to derive an “aggregation network” facing construct (e.g. an IP
interface) corresponding to the local loop (e.g. DSL line). The
association could be based on “local configuration” on the BRAS.
The access node can also convey to the BRAS, the characteristics
(e.g. bandwidth) of the uplink on the access node. This TLV then
Wadhwa et.al Expires April 22, 2007 [Page 25]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
serves the purpose of uniquely identifying the uplink whose
characteristics are being defined. A separate set of sub-TLVs will
be defined for the uplink characteristics (TBD).
This TLV is optional.
5. Type (DSL Line Attributes = 0x04):
Length : variable (up to 1024 bytes)
Value : This consists of one or more Sub-TLVs corresponding to DSL
line attributes. No sub-TLVs other than the “DSL type” and “DSL
line state” SHOULD be included in a PORT DOWN message.
The general format of the sub-TLVs is identical to the general TLV
format. The value field in each sub-TLV is padded to a 4-octet
alignment. The Length field in each sub-TLV contains the actual
number of bytes in the TLV (not including the padding if present).
Current defined sub-TLV types are start from 0x81.
Following sub-TLVs are currently defined :
. Type (DSL-Type = 0x91) : Defines the type of transmission system
in use. This is a mandatory TLV.
Length : (4 bytes)
Value : (Transmission system : ADSL1 = 0x01, ADSL2 = 0x02,
ADSL2+ = 0x03, VDSL1 = 0x04, VDSL2 = 0x05, SDSL = 0x06, UNKNOWN
= 0x07).
. Type (Actual-Data-Rate-Upstream = 0x81) : Actual data rate
upstream of a synchronized DSL line. This is a mandatory TLV.
This rate value and all the subsequent ones account for the DSL
overhead (i.e. signify the net rate).
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Actual-Data-Rate-Downstream = 0x82) : Actual data rate
downstream of a synchronized DSL line. This is a mandatory TLV.
Length : (4 bytes)
Wadhwa et.al Expires April 22, 2007 [Page 26]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Value : (Rate in Kb/sec)
. Type (Minimum-Data-Rate-Upstream = 0x83) : Minimum data rate
desired by the operator. This is optional.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Minimum-Data-Rate-Downstream = 0x84) : Minimum data rate
desired by the operator. This is optional.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Attainable-Data-Rate-Upstream = 0x85) : Maximum upstream
rate that can be attained on the DSL line. This is an optional
TLV.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Attainable-Data-Rate-Downstream = 0x86) : Maximum
downstream rate that can be attained on the DSL line. This is
an optional TLV.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Maximum-Data-Rate-Upstream = 0x87) : Maximum data rate
desired by the operator. This is optional.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Maximum-Data-Rate-Downstream = 0x88) : Maximum data rate
desired by the operator. This is optional.
Length : (4 bytes)
Value : (Rate in Kb/sec)
Wadhwa et.al Expires April 22, 2007 [Page 27]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
. Type (Minimum-Low-Power-Data-Rate-Upstream = 0x89) : Minimum
data rate desired by the operator in low power state. This is
optional.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Minimum-Low-Power-Data-Rate-Downstream = 0x8A) : Minimum
data rate desired by the operator in low power state. This is
optional.
Length : (4 bytes)
Value : (Rate in Kb/sec)
. Type (Maximum-Interleaving-Delay-Upstream = 0x8B) : maximum one
way interleaving delay. This is optional.
Length : (4 bytes)
Value : (Time in msec)
. Type (Actual-Interleaving-Delay-Upstream = 0x8C) : Value
corresponding to the interleaver setting. This is optional.
Length : (4 bytes)
Value : (Time in msec)
. Type (Maximum-Interleaving-Delay-Downstream = 0x8D) : maximum
one way interleaving delay. This is optional.
Length : (4 bytes)
Value : (Time in msec)
. Type (Actual-Interleaving-Delay-Downstream = 0x8E) : Value
corresponding to the interleaver setting. This is optional.
Length : (4 bytes)
Value : (Time in msec)
Wadhwa et.al Expires April 22, 2007 [Page 28]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
. Type (DSL line state = 0x8F) : The state of the DSL line. For
PORT UP message, at this time, the TLV is optional (since the
message type implicitly conveys the state of the line). For PORT
DOWN, the TLV is mandatory, since it further communicates the
state of the line as IDLE or SILENT.
Length : (4 bytes)
Value : { SHOWTIME = 0x01, IDLE = 0x02, SILENT = 0x03 }
. Type (Access Loop Encapsulation = 0x90) : The data link protocol
and, optionally the encapsulation overhead on the access loop.
This is an optional TLV. However, when this TLV is present, the
data link protocol MUST minimally be indicated. The
encapsulation overhead can be optionally indicated.
Length : (3 bytes)
Value : The three bytes (most to least significant) and valid
set of values for each byte are defined below.
Data Link (1 byte): {ATM AAL5 = 0,
ETHERNET = 1}
Encaps 1 (1 byte): {NA = 0,
Untagged Ethernet = 1,
Single-tagged Ethernet = 2}
Encaps 2 (1 byte):{ NA = 0,
PPPoA LLC = 1,
PPPoA NULL = 2,
IPoA LLC = 3,
IPoA NuLL = 4,
Ethernet over AAL5 LLC with FCS = 5,
Ethernet over AAL5 LLC without FCS = 6,
Ethernet over AAL5 NULL with FCS = 7,
Wadhwa et.al Expires April 22, 2007 [Page 29]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Ethernet over AAL5 NULL without FCS = 8}
If this TLV is present, the Data Link protocol MUST be indicated as
defined above. However, the Access Node can choose to not convey the
encapsulation on the access loop by specifying a value of 0 (NA) for the
two encapsulation fields.
5.4.3 Line Configuration Extensions
The BRAS uses extension block in the Port Management messages to convey
service attributes of the DSL lines to the DSLAM. TLVs are defined for
DSL line identification and service data for the DSL lines. Port number
is set to 0 in the message. A new action type "Configure Connection
Service Data" (value 0x8) is defined. The "Function" field is set to the
action type. This action type indicates to the device being controlled
(access-node i.e. DSLAM) to apply service configuration data contained
in the extension value (TLVs), to the DSL line (identified by one of the
TLVs in the extension value). The Tech Type field is extended with new
type "DSL". The value for this field is 0x05.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vers | Sub | Message Type | Result| Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Partition ID | Transaction Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|I| SubMessage Number | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Port Session Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Event Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|R|x|x|x|x|x|x|x| Duration | Function | X-Function |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Event Flags | Flow Control Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|x|x|x|x|x|x|x|x| Message Type | Tech Type | Block Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ Extension Value ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Wadhwa et.al Expires April 22, 2007 [Page 30]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
The format of the "Extension Value" field is as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| # of TLVs | Extension Block length (bytes)|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ ~
~ TLVs ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The “Extension Value” field contains one or more TLVs containing DSL
line identifier and desired service attributes of the the DSL line.
First 2 byte of the “Extension Value” contains the number of TLVs
that follow. The next 2 bytes contain the total length of the
extension block in bytes (existing “Block Length” field in the GSMP
message is limited to 255 bytes and is not sufficient).
General format of a TLV is:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
~ ~
~ Value ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The value field is padded to a 4-octet alignment. The Length field in
each TLV contains the actual number of bytes in the TLV (not
including the padding if present). If a TLV is not understood by the
access-node, it is silently ignored. Depending upon the deployment
scenario, the BRAS may specify “Access Loop Circuit-ID” or the
“Access Aggregation Circuit-ID) as defined in section 5.4.1.
Following TLVs can appear in this message:
o Type (Access-Loop-Circuit-ID = 0x01) : defined in section 5.4.1
Wadhwa et.al Expires April 22, 2007 [Page 31]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
o Type (Access-Aggregation-Circuit-ID-Binary = 0x06): defined in
section 5.4.1.
o Type (Access-Aggregation-Circuit-ID-ASCII = 0x03): defined in
section 5.4.1.
o Type (Service-Profile-Name = 0x05): Reference to a pre-configured
profile on the DSLAM that contains service specific data for the
subscriber.
Length : (upto 64 bytes)
Value : ASCII string containing the profile name (BRAS learns
from a policy server after a subscriber is authorized).
In future, more TLVs MAY be defined for individual service attributes
of a DSL line (e.g. rates, interleaving delay, multicast channel
entitlement access-list etc).
5.4.4 OAM Extensions
GSMP “Port Management” message (type 32) SHOULD be used by the BRAS
to trigger access node to run a loopback test on the local loop. The
message format is defined in section 5.4.2. The version field SHOULD
be set to 3 and sub-version field SHOULD be set to 1. The remaining
fields in the GSMP header have standard semantics. The function type
used in the request message SHOULD be set to “remote loopback” (type
= 0x09). The port, “port session number”, “event sequence number”,
duration, “event flags”, “flow control flags” and code fields SHOULD
all be set to 0. The result field SHOULD be set to “AckAll” to
indicate requirement for the access node to send a success for
failure response. The transaction ID SHOULD contain a sequence number
inserted by the BRAS in each request that it generates. The extension
field format is also defined above in section 5.4.2. The extension
value field can contain one or more TLVs including the access-line
identifier on the DSLAM and OAM test characteristics desired by the
BRAS.
The TLV format is defined above in section 5.4.2. The value field is
padded to a 4-octet alignment. The Length field in each TLV contains
the actual number of bytes in the TLV (not including the padding if
present). If a TLV is not understood by the BRAS, it is silently
ignored. Depending upon the deployment scenario, the BRAS may specify
“Access Loop Circuit-ID” or the “Access Aggregation Circuit-ID) as
defined in section 5.4.1. Following TLVs can appear in this message:
Wadhwa et.al Expires April 22, 2007 [Page 32]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
o Type (Access-Loop-Circuit-ID = 0x01) : defined in section 5.4.1
o Type (Access-Aggregation-Circuit-ID-Binary = 0x06): defined in
section 5.4.1.
o Type (Access-Aggregation-Circuit-ID-ASCII = 0x03): defined in
section 5.4.1.
o Type (OAM-Loopback-Test-Parameters = 0x07): Parameters related to
loopback test. This is an optional TLV. If this TLV is not present
in the request message, the DSLAM SHOULD use locally determined
default values for the test parameters.
Length: 4 bytes
Value : two 1 byte numbers (listed in order of most to least
significant)
o Count (1 byte) : Number of loopback cells/messages that should
be generated on the local loop as part of the loopback test.
The BRAS SHOULD restrict the “count” to be greater than 0 and
less than or equal to 32. The DSLAM SHOULD discard the request
for a loopback test, if the received test parameters contain
an out of range value for the “count” field. The DSLAM MAY
optionally send a failure response to the BRAS with the code
“invalid test parameter”.
o Timeout (1 byte) : Upper bound on the time in seconds that the
BRAS would wait for a response from the DSLAM. If the total
time taken by the DSLAM to complete a test with requested
parameters, exceeds the specified “timeout” value, it can
choose to omit the generation of a response to the BRAS. DSLAM
SHOULD use a locally determined value for the “timeout”, if
the received value of the “timeout” parameter is 0.
o Type (Opaque-Data = 0x08) : This is an optional TLV. If present in
the request message, the DSLAM SHOULD reflect it back in the
response unmodified.
Length : 8 bytes
Value : Two 32 bit integers inserted by the BRAS (not to be
interpreted by the DSLAM, but just reflected back in the
response).
Wadhwa et.al Expires April 22, 2007 [Page 33]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
The access node generates a success or failure response when it deems
the loopback test to be complete. “Port Management” message (type 32)
is used. The result field SHOULD be set to success or failure. The
function type SHOULD be set to 0x09. The transaction ID SHOULD be
copied from the sequence number contained in the corresponding
request. The other parameters not explicitly defined here SHOULD be
set as specified in the request message above. The code field SHOULD
be set to a value in the range 0x500 to 0x5ff (to be reserved with
IANA) to indicate the status of the executed test. The valid values
defined are (can be extended in future):
0x500 : Specified access line does not exist.
0x501 : Loopback test timed out.
0x502 : Reserved
0x503 : DSL line status showtime.
0x504 : DSL line status idle.
0x505 : DSL line status silent.
0x506 : DSL line status training.
0x507 : DSL line integrity error.
0x508 : DSLAM resource not available.
0x509 : Invalid test parameter.
The Extension value can contain one or more TLVs including the TLV to
identify the access line on which the test was performed, and details
from executing the test. The access line identifier SHOULD be identical
to what was contained in the request. The relevant TLVs are:
o Type (Access-Loop-Circuit-ID = 0x01) : defined in section 5.4.1
o Type (Access-Aggregation-Circuit-ID-Binary = 0x06): defined in
section 5.4.1.
o Type (Access-Aggregation-Circuit-ID-ASCII = 0x03): defined in
section 5.4.1.
o Type (Opaque-Data = 0x08) : Data inserted by the BRAS in the
request reflected back by the DSLAM.
Wadhwa et.al Expires April 22, 2007 [Page 34]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Length : 8 bytes
Value : Two 32 bit integers as received in the request (opaque to
the DSLAM).
o Type (OAM-Loopback-Test-Response-String = 0x09)
Length (upto 128 bytes)
Value : Suitably formatted ASCII string containing useful details
about the test that the BRAS will display for the operator,
exactly as received from the DSLAM (no manipulation/interpretation
by the BRAS). This is an optional TLV, but it is strongly
recommended, that in case of ATM based local loop, the DSLAM at
the very least indicates via this TLV, the total loopback cells
generated and the total loopback cells successfully received as
part of executing the requested loopback test.
5.5 ATM-specific considerations
The topology discovery and line configuration involve the DSL line
attributes. For ATM based access networks, the DSL line on the DSLAM
is identified by the port and PVP/PVC corresponding to the
subscriber. The DSLAMs are connected to the BRAS via an ATM access
aggregation network. Since, the DSLAM (access-node) is not directly
connected to the BRAS, the BRAS needs a mechanism to learn the DSL
line identifier (more generally referred to as "Access Loop Circuit-
ID") corresponding to a subscriber. The "Access loop circuit-ID" has
no local significance on the BRAS. The ANCP messages for topology
discovery and line configuration carry opaque "Access loop Circuit-
ID" which has only local significance on the DSLAMs.
The access loop circuit identifier can be carried as an ASCII string
in the ANCP messages. This allows ANCP to be decoupled from the
specifics of the underlying access technology being controlled. On
the other hand, this requires a BRAS mechanism by which such
identifier can be correlated to the context of an “aggregation
network” facing IP interface (corresponding to the subscriber) on the
BRAS. This would typically require local configuration of such IP
interfaces, or of the underlying ATM interfaces.
Wadhwa et.al Expires April 22, 2007 [Page 35]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
5.6 Ethernet-specific considerations
One possible way of approaching the use of Ethernet technology in the
access aggregation network is to recreate the equivalent of Virtual
Paths (VPs) and Virtual Circuits (VCs) by using stacked Virtual LAN
tags. As an example, one could use an “outer” VLAN to create a form of
“virtual path” between a given DSLAM and a given BRAS. And then use
“inner” VLAN tags to create a form of “virtual circuit” on a per DSL
line basis. In this case, VLAN tags conveyed in topology discovery and
line configuration messages will allow to uniquely identify the DSL line
in a straightforward manner, assuming the VLAN tags are not translated
in some way by the aggregation network, and are unique across physical
ports.
However, some carriers do not wish to use this “connection oriented”
approach. Therefore, an alternative model is to bridge sessions from
multiple subscribers behind a DSLAM to a single VLAN in the aggregation
network. This is the N:1 model. In this model, or in the case where user
traffic is sent untagged, the access node needs to insert the exact
identity of the DSL line in the topology discovery and line
configuration messages, and then have a mechanism by which this can be
correlated to the context of an “aggregation network” facing IP
interface (for the subscriber) on the BRAS. This can either be based on
local configuration on the BRAS, or on the fact that such DSLAM (access
node) typically inserts the “Access Loop Circuit ID” in subscriber
signaling messages relayed to the BRAS (i.e. DHCP or PPPoE discovery
messages).
Section 5.4.1 defines “Access Loop Circuit ID”.
6 IANA Considerations
New Tech-Type, capability types, sub-TLV types related to topology
discovery and line configuration will need to be reserved.
7 Security Considerations
The BRAS and DSLAMs are implicitly in a trusted domain, so security
for ANCP is not a strong requirement. However, if needed security can
be provided using IP security as indicated in [RFC3293].
Wadhwa et.al Expires April 22, 2007 [Page 36]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
8 References
[1] DSLForum TR-059, DSL Evolution - Architecture Requirements for
the Support of QoS-Enabled IP Services, Tom Anschutz (BellSouth
Telecommunications), 09/2003.
[2] DSLForum TR-058, Multi-Service Architecture & Framework
Requirements, Mark Elias (SBC) and Sven Ooghe (Alcatel),
09/2003.
[3] DSLForum TR-092, Broadband Remote access server requirements
document.
[4] Doria, A. et al, "General Switch Management Protocol- V3" (GSMP
v3), RFC 3292, June 2002.
[5] Worster, T., Doria, A. and J. Buerkle, "General Switch
Management Protocol (GSMP) Packet Encapsulations for
Asynchronous Transfer Mode (ATM), Ethernet and Transmission
Control Protocol (TCP)", RFC 3293, June 2002.
[6] GSMP extensions for ANCP - Transactional Multicast, draft-
moisand-gsmp-ancp-multicast-00 (work in progress).
[7] “DHCP Relay Agent Information Option”, RFC 3046, January 2001.
[8] Architecture & Transport: Migration to Ethernet Based DSL
Aggregation, DSL Forum WT-101, Cohen et al.
[9] Framework for Access Node Control Mechanism in Broadband
Networks, draft-ietf-ancp-framework-00.txt.
Wadhwa et.al Expires April 22, 2007 [Page 37]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Author's Addresses
Sanjay Wadhwa
Juniper Networks
10 Technology Park Drive
Westford, MA 01886
Email: swadhwa@juniper.net
Jerome Moisand
Juniper Networks
10 Technology Park Drive
Westford, MA 01886
Email: jmoisand@juniper.net
Swami Subramanian
Juniper Networks
10 Technology Park Drive
Westford, MA 01886
Email: ssubramanian@juniper.net
Thomas Haag
T-systems
Email: thomas.haag@t-systems.com
Norber Voigt
Siemens
Email: norbert.voigt@siemens.com
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Wadhwa et.al Expires April 22, 2007 [Page 38]
Internet-Draft draft-wadhwa-gsmp-l2control-configuration-02 October 2006
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
Acknowledgment
Thanks to Peter Arberg, Josef Froehler, Derek Harkness, Kim
Hyldgaard, Sandy Ng, Robert Peschi, and Michel Platnic for their
input to this document.
Wadhwa et.al Expires April 22, 2007 [Page 39]
| PAFTECH AB 2003-2026 | 2026-04-24 06:01:09 |