Skip to main content

OSPF-TE Protocol Extension for Constraint-aware RSA in Flexi-Grid Networks
draft-zhangj-ccamp-flexi-grid-ospf-te-ext-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Authors Jie Zhang , Ziyan Yu , Yongli Zhao
Last updated 2011-10-24
RFC stream (None)
Formats
Additional resources
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-zhangj-ccamp-flexi-grid-ospf-te-ext-00
Network Working Group                                           J. Zhang
Internet-Draft                                                  YL. Zhao
Intended status: Informational                                    ZY. Yu
Expires: April 26, 2012                                             BUPT
                                                        October 24, 2011

   OSPF-TE Protocol Extension for Constraint-aware RSA in Flexi-Grid
                                Networks
              draft-zhangj-ccamp-flexi-grid-ospf-te-ext-00

Abstract

   ITU-T Study Group 15 has introduced a new flexible grids technology
   of DWDM network which is an effective solution to improve the
   efficiency of spectrum resource utilization.  This memo extends the
   OSPF-TE protocol to support constraint-aware routing and spectrum
   assignment (RSA) in flexi-grid networks.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 26, 2012.

Copyright Notice

   Copyright (c) 2011 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of

Zhang, et al.            Expires April 26, 2012                 [Page 1]
Internet-Draft         Routing extension for C-RSA          October 2011

   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . 3
   2.  Conventions Used in This Document . . . . . . . . . . . . . . . 3
   3.  Terminologies . . . . . . . . . . . . . . . . . . . . . . . . . 3
   4.  Motivation for Routing Protocol Extension . . . . . . . . . . . 4
     4.1.  Constraints Considerations for RSA in Flexi-Grid
           Networks  . . . . . . . . . . . . . . . . . . . . . . . . . 4
     4.2.  Consecutive Spectrum Slots Information  . . . . . . . . . . 5
     4.3.  Variable Guard Band Information . . . . . . . . . . . . . . 5
   5.  OSPF-TE Protocol Extension  . . . . . . . . . . . . . . . . . . 6
     5.1.  Consecutive Spectrum Slots Weight Sub-TLV . . . . . . . . . 6
     5.2.  Variable Guard Band Sub-TLV . . . . . . . . . . . . . . . . 7
   6.  Security Considerations . . . . . . . . . . . . . . . . . . . . 8
   7.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 8
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . . . 8
     8.1.  Normative References  . . . . . . . . . . . . . . . . . . . 8
     8.2.  Informative References  . . . . . . . . . . . . . . . . . . 8
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . . . 8

Zhang, et al.            Expires April 26, 2012                 [Page 2]
Internet-Draft         Routing extension for C-RSA          October 2011

1.  Introduction

   To enable the dynamic and effective allocation of spectrum resource
   based on the demand of the client LSP's requests, the latest revision
   of ITU-T Recommendation [G.694.1] has introduced a flexible grid
   technique in DWDM optical networks.  The flexible grid has a finer
   granularity (i.e. according to the definition of flexible grid in
   [G.694.1], the data channel can be selected on a channel spacing of
   6.25 GHz with a variable slot width measured in units of 12.5 GHz)
   for the spectrum slot.

   In the dynamic flexi-grid networks, except for selecting an
   appropriate route for the client LSP, the appropriate width of
   spectrum slot is also needed to choose and assigned to the client
   LSP.  The spectrum bandwidth assigned to the client LSP is made up of
   an appropriate number of consecutive spectrum slots from end-to-end,
   which is determined by the used modulation format, according to the
   client LSPs data rate requests and physical constraints of the
   selected path.

   The routing and spectrum assignment (RSA) of flexi-grid networks need
   to consider some constraints.  In this memo two of those constraints
   (other constraints are left for future considered) that are necessary
   for RSA are discussed in detail, and then describes the OSPF-TE
   protocol extension for these constraints related to RSA in flexi-grid
   networks.

2.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Terminologies

   CSSW: Consecutive spectrum slots weight

   GB: Guard band

   RSA: Routing and spectrum assignment

   WSON: Wavelength switched optical networks

#x27;s SOA.SERIAL, the Update RR is ignored.  In the case of a CNAME
   Update RR and a non-CNAME Zone RRset or vice versa, ignore the CNAME
   Update RR, otherwise replace the CNAME Zone RR with the CNAME Update
   RR.

   3.4.2.3. For any Update RR whose CLASS is ANY and whose TYPE is ANY,
   all Zone RRs with the same NAME are deleted, unless the NAME is the
   same as ZNAME in which case only those RRs whose TYPE is other than
   SOA or NS are deleted.  For any Update RR whose CLASS is ANY and
   whose TYPE is not ANY all Zone RRs with the same NAME and TYPE are
   deleted, unless the NAME is the same as ZNAME in which case neither
   SOA or NS RRs will be deleted.

Vixie, et. al.              Standards Track                    [Page 14]
RFC 2136                       DNS Update                     April 1997

   3.4.2.4. For any Update RR whose class is NONE, any Zone RR whose
   NAME, TYPE, RDATA and RDLENGTH are equal to the Update RR is deleted,
   unless the NAME is the same as ZNAME and either the TYPE is SOA or
   the TYPE is NS and the matching Zone RR is the only NS remaining in
   the RRset, in which case this Update RR is ignored.

   3.4.2.5. Signal NOERROR to the requestor.

   3.4.2.6 - Table Of Metavalues Used In Update Section

   CLASS    TYPE     RDATA    Meaning
   ---------------------------------------------------------
   ANY      ANY      empty    Delete all RRsets from a name
   ANY      rrset    empty    Delete an RRset
   NONE     rrset    rr       Delete an RR from an RRset
   zone     rrset    rr       Add to an RRset

   3.4.2.7 - Pseudocode For Update Section Processing

      [rr] for rr in updates
           if (rr.class == zclass)
                if (rr.type == CNAME)
                     if (zone_rrset<rr.name, ~CNAME>)
                          next [rr]
                elsif (zone_rrset<rr.name, CNAME>)
                     next [rr]
                if (rr.type == SOA)
                     if (!zone_rrset<rr.name, SOA> ||
                         zone_rr<rr.name, SOA>.serial > rr.soa.serial)
                          next [rr]
                for zrr in zone_rrset<rr.name, rr.type>
                     if (rr.type == CNAME || rr.type == SOA ||
                         (rr.type == WKS && rr.proto == zrr.proto &&
                          rr.address == zrr.address) ||
                         rr.rdata == zrr.rdata)
                          zrr = rr
                          next [rr]
                zone_rrset<rr.name, rr.type> += rr
           elsif (rr.class == ANY)
                if (rr.type == ANY)
                     if (rr.name == zname)
                          zone_rrset<rr.name, ~(SOA|NS)> = Nil
                     else
                          zone_rrset<rr.name, *> = Nil
                elsif (rr.name == zname &&
                       (rr.type == SOA || rr.type == NS))
                     next [rr]
                else

Vixie, et. al.              Standards Track                    [Page 15]
RFC 2136                       DNS Update                     April 1997

                     zone_rrset<rr.name, rr.type> = Nil
           elsif (rr.class == NONE)
                if (rr.type == SOA)
                     next [rr]
                if (rr.type == NS && zone_rrset<rr.name, NS> == rr)
                     next [rr]
                zone_rr<rr.name, rr.type, rr.data> = Nil
      return (NOERROR)

   3.5 - Stability

   When a zone is modified by an UPDATE operation, the server must
   commit the change to nonvolatile storage before sending a response to
   the requestor or answering any queries or transfers for the modified
   zone.  It is reasonable for a server to store only the update records
   as long as a system reboot or power failure will cause these update
   records to be incorporated into the zone the next time the server is
   started.  It is also reasonable for the server to copy the entire
   modified zone to nonvolatile storage after each update operation,
   though this would have suboptimal performance for large zones.

   3.6 - Zone Identity

   If the zone's SOA SERIAL is changed by an update operation, that
   change must be in a positive direction (using modulo 2**32 arithmetic
   as specified by [RFC1982]).  Attempts to replace an SOA with one
   whose SERIAL is less than the current one will be silently ignored by
   the primary master server.

   If the zone's SOA's SERIAL is not changed as a result of an update
   operation, then the server shall increment it automatically before
   the SOA or any changed name or RR or RRset is included in any
   response or transfer.  The primary master server's implementor might
   choose to autoincrement the SOA SERIAL if any of the following events
   occurs:

   (1)  Each update operation.

   (2)  A name, RR or RRset in the zone has changed and has subsequently
        been visible to a DNS client since the unincremented SOA was
        visible to a DNS client, and the SOA is about to become visible
        to a DNS client.

   (3)  A configurable period of time has elapsed since the last update
        operation.  This period shall be less than or equal to one third
        of the zone refresh time, and the default shall be the lesser of
        that maximum and 300 seconds.

Vixie, et. al.              Standards Track                    [Page 16]
RFC 2136                       DNS Update                     April 1997

   (4)  A configurable number of updates has been applied since the last
        SOA change.  The default value for this configuration parameter
        shall be one hundred (100).

   It is imperative that the zone's contents and the SOA's SERIAL be
   tightly synchronized.  If the zone appears to change, the SOA must
   appear to change as well.

   3.7 - Atomicity

   During the processing of an UPDATE transaction, the server must
   ensure atomicity with respect to other (concurrent) UPDATE or QUERY
   transactions.  No two transactions can be processed concurrently if
   either depends on the final results of the other; in particular, a
   QUERY should not be able to retrieve RRsets which have been partially
   modified by a concurrent UPDATE, and an UPDATE should not be able to
   start from prerequisites that might not still hold at the completion
   of some other concurrent UPDATE.  Finally, if two UPDATE transactions
   would modify the same names, RRs or RRsets, then such UPDATE
   transactions must be serialized.

   3.8 - Response

   At the end of UPDATE processing, a response code will be known.  A
   response message is generated by copying the ID and Opcode fields
   from the request, and either copying the ZOCOUNT, PRCOUNT, UPCOUNT,
   and ADCOUNT fields and associated sections, or placing zeros (0) in
   the these "count" fields and not including any part of the original
   update.  The QR bit is set to one (1), and the response is sent back
   to the requestor.  If the requestor used UDP, then the response will
   be sent to the requestor's source UDP port.  If the requestor used
   TCP, then the response will be sent back on the requestor's open TCP
   connection.

4 - Requestor Behaviour

   4.1. From a requestor's point of view, any authoritative server for
   the zone can appear to be able to process update requests, even
   though only the primary master server is actually able to modify the
   zone's master file.  Requestors are expected to know the name of the
   zone they intend to update and to know or be able to determine the
   name servers for that zone.

Vixie, et. al.              Standards Track                    [Page 17]
RFC 2136                       DNS Update                     April 1997

   4.2. If update ordering is desired, the requestor will need to know
   the value of the existing SOA RR.  Requestors who update the SOA RR
   must update the SOA SERIAL field in a positive direction (as defined
   by [RFC1982]) and also preserve the other SOA fields unless the
   requestor's explicit intent is to change them.  The SOA SERIAL field
   must never be set to zero (0).

   4.3. If the requestor has reasonable cause to believe that all of a
   zone's servers will be equally reachable, then it should arrange to
   try the primary master server (as given by the SOA MNAME field if
   matched by some NS NSDNAME) first to avoid unnecessary forwarding
   inside the slave servers.  (Note that the primary master will in some
   cases not be reachable by all requestors, due to firewalls or network
   partitioning.)

   4.4. Once the zone's name servers been found and possibly sorted so
   that the ones more likely to be reachable and/or support the UPDATE
   opcode are listed first, the requestor composes an UPDATE message of
   the following form and sends it to the first name server on its list:

      ID:                        (new)
      Opcode:                    UPDATE
      Zone zcount:               1
      Zone zname:                (zone name)
      Zone zclass:               (zone class)
      Zone ztype:                T_SOA
      Prerequisite Section:      (see previous text)
      Update Section:            (see previous text)
      Additional Data Section:   (empty)

   4.5. If the requestor receives a response, and the response has an
   RCODE other than SERVFAIL or NOTIMP, then the requestor returns an
   appropriate response to its caller.

   4.6. If a response is received whose RCODE is SERVFAIL or NOTIMP, or
   if no response is received within an implementation dependent timeout
   period, or if an ICMP error is received indicating that the server's
   port is unreachable, then the requestor will delete the unusable
   server from its internal name server list and try the next one,
   repeating until the name server list is empty.  If the requestor runs
   out of servers to try, an appropriate error will be returned to the
   requestor's caller.

Vixie, et. al.              Standards Track                    [Page 18]
RFC 2136                       DNS Update                     April 1997

5 - Duplicate Detection, Ordering and Mutual Exclusion

   5.1. For correct operation, mechanisms may be needed to ensure
   idempotence, order UPDATE requests and provide mutual exclusion.  An
   UPDATE message or response might be delivered zero times, one time,
   or multiple times.  Datagram duplication is of particular interest
   since it covers the case of the so-called "replay attack" where a
   correct request is duplicated maliciously by an intruder.

   5.2. Multiple UPDATE requests or responses in transit might be
   delivered in any order, due to network topology changes or load
   balancing, or to multipath forwarding graphs wherein several slave
   servers all forward to the primary master.  In some cases, it might
   be required that the earlier update not be applied after the later
   update, where "earlier" and "later" are defined by an external time
   base visible to some set of requestors, rather than by the order of
   request receipt at the primary master.

   5.3. A requestor can ensure transaction idempotence by explicitly
   deleting some "marker RR" (rather than deleting the RRset of which it
   is a part) and then adding a new "marker RR" with a different RDATA
   field.  The Prerequisite Section should specify that the original
   "marker RR" must be present in order for this UPDATE message to be
   accepted by the server.

   5.4. If the request is duplicated by a network error, all duplicate
   requests will fail since only the first will find the original
   "marker RR" present and having its known previous value.  The
   decisions of whether to use such a "marker RR" and what RR to use are
   left up to the application programmer, though one obvious choice is
   the zone's SOA RR as described below.

   5.5. Requestors can ensure update ordering by externally
   synchronizing their use of successive values of the "marker RR."
   Mutual exclusion can be addressed as a degenerate case, in that a
   single succession of the "marker RR" is all that is needed.

   5.6. A special case where update ordering and datagram duplication
   intersect is when an RR validly changes to some new value and then
   back to its previous value.  Without a "marker RR" as described
   above, this sequence of updates can leave the zone in an undefined
   state if datagrams are duplicated.

   5.7. To achieve an atomic multitransaction "read-modify-write" cycle,
   a requestor could first retrieve the SOA RR, and build an UPDATE
   message one of whose prerequisites was the old SOA RR.  It would then
   specify updates that would delete this SOA RR and add a new one with
   an incremented SOA SERIAL, along with whatever actual prerequisites

Vixie, et. al.              Standards Track                    [Page 19]
RFC 2136                       DNS Update                     April 1997

   and updates were the object of the transaction.  If the transaction
   succeeds, the requestor knows that the RRs being changed were not
   otherwise altered by any other requestor.

6 - Forwarding

   When a zone slave forwards an UPDATE message upward toward the zone's
   primary master server, it must allocate a new ID and prepare to enter
   the role of "forwarding server," which is a requestor with respect to
   the forward server.

   6.1. The set of forward servers will be same as the set of servers
   this zone slave would use as the source of AXFR or IXFR data.  So,
   while the original requestor might have used the zone's NS RRset to
   locate its update server, a forwarder always forwards toward its
   designated zone master servers.

   6.2. If the original requestor used TCP, then the TCP connection from
   the requestor is still open and the forwarder must use TCP to forward
   the message.  If the original requestor used UDP, the forwarder may
   use either UDP or TCP to forward the message, at the whim of the
   implementor.

   6.3. It is reasonable for forward servers to be forwarders
   themselves, if the AXFR dependency graph being followed is a deep one
   involving firewalls and multiple connectivity realms.  In most cases
   the AXFR dependency graph will be shallow and the forward server will
   be the primary master server.

   6.4. The forwarder will not respond to its requestor until it
   receives a response from its forward server.  UPDATE transactions
   involving forwarders are therefore time synchronized with respect to
   the original requestor and the primary master server.

   6.5. When there are multiple possible sources of AXFR data and
   therefore multiple possible forward servers, a forwarder will use the
   same fallback strategy with respect to connectivity or timeout errors
   that it would use when performing an AXFR.  This is implementation
   dependent.

   6.6. When a forwarder receives a response from a forward server, it
   copies this response into a new response message, assigns its
   requestor's ID to that message, and sends the response back to the
   requestor.

Vixie, et. al.              Standards Track                    [Page 20]
Zhang, et al.            Expires April 26, 2012                 [Page 3]
Internet-Draft         Routing extension for C-RSA          October 2011

4.  Motivation for Routing Protocol Extension

   In this section we introduce the RSA constraints and the motivation
   of routing protocol extension for of flexi-grid networks

4.1.  Constraints Considerations for RSA in Flexi-Grid Networks

   When processing RSA in flexi-grid networks, the constraints
   information (such as the information of spectrum bandwidth in a
   network link and so on.) are necessary for computing and selecting an
   appropriate backup route and a certain number of consecutive spectrum
   slots for the client LSPs effectively.

   Some of the necessary constraints are listed as follows:

   o  Spectral consecutiveness constraint

   o  Variable guard band constraint

   o  Spectral continuity constraint

   o  Impairments constraint

   o  Other constraints

   All the constraints can generate important impacts for the
   performance of the client LSPs, even for the entire network.  The
   first two constraints are mainly talked about in this memeo.

   Just like the wavelength continuity constraint in WSON, the spectral
   continuity constraint means allocation of the same spectrum slots on
   each link along a path because not all of the nodes in optical
   networks have the ability of wavelength conversion.

   The degradation of the optical signals due to impairments that
   accumulate along the path (without 3R regeneration), can result in
   unacceptable bit error rates or even a complete failure to demodulate
   and/or detect the received
   signal[draft-ietf-ccamp-wson-impairments-07].  So it is necessary to
   consider about the impairments constraint within flexi-grid networks.
   The impairments constraint in flexi-grid networks will be studied in
   future in this memo.

   Also, there may be some other constraints for RSA, other than the
   four kinds above, such as the modulation levels constraint, which are
   left for future researching.

Zhang, et al.            Expires April 26, 2012                 [Page 4]
Internet-Draft         Routing extension for C-RSA          October 2011

4.2.  Consecutive Spectrum Slots Information

   The spectral consecutiveness constraint is that the allocated
   spectrum slots must be chosen from consecutive spectrum slots in the
   spectrum space on each link of flexi-grid networks.

   Compared with the technology of WSON, the number of spectrum slots in
   flexi-grid networks will be much larger than the number of wavelength
   in WSON.  After a long running time, the situation of available
   spectrum slots will be much complex, especially the situation of the
   available consecutive spectrum slots.

   After selecting a route, the appropriate consecutive spectrum slots
   need to be assigned for the client LSP.  When we choose one of the
   backup routes for the client LSP without considering the situation
   about the available consecutive spectrum slots information, the route
   may have no enough consecutive spectrum slots which means that the
   selected route have no available resource for the LSP's request, and
   then the client LSP will be rejected or trigger another path
   computation process which will increase the blocking rate of the
   network or increase network resources consumed by communication and
   computing of new route.

   When computing a route with the knowledge of the consecutive spectrum
   slots information of the network link (for example, the number of ten
   available consecutive spectrum slots in a network link, or the number
   of twenty available consecutive spectrum slots in a network link.),
   it will be very useful to select a better route which has higher
   probability of enough available consecutive spectrum slots for the
   client LSP.  And this will improve the success rate of setting up new
   client LSPs.

4.3.  Variable Guard Band Information

   Some spectrum slots need to be reserved as Guard Band(GB) between two
   adjacent client LSPs to avoid bad impact of non-linear impairments
   and other network elements.  Since the granularity of the flexi-grid
   networks will be very small, the spectrum interval, i.e., GB need to
   be considered more carefully to avoid poor quality impact of the
   adjacent client LSPs.  Which means with the changing of network
   environment and the operating of the network, the bandwidth of the GB
   also need to change.

   In flexi-grid networks, with the increasing of the total
   transportation power and the smaller of the channel space, the
   channel crosstalk that results from non-linear effects will become
   the important factor that affects the performance of the network.
   The impact between two adjacency client LSPs may be changing based on

Zhang, et al.            Expires April 26, 2012                 [Page 5]
Internet-Draft         Routing extension for C-RSA          October 2011

   the change of crosstalk and other changes of network.  With the
   changing of those parameters, the interferences between two adjacency
   client LSPs may be increasing, if the Guard Band is fixed, the
   quality of the adjacent client LSPs and also the network's will be
   decreased.  If the GB can be varied based on the network environment
   changing, then the bad impact can be avoided.

5.  OSPF-TE Protocol Extension

   In this section, we define the enhancements to the Traffic
   Engineering (TE) properties of flexi-grid networks' TE links that can
   be announced in OSPF-TE LSAs.

   The TE LSA, which is an opaque 10 LSA with area flooding scope
   [RFC3630], has only one top-level and has one or more nested sub-TLVs
   for extensibility.  [RFC3630] also defines two top Type/Length/Value
   (TLV) triplet to support traffic engineering of OSPF, i.e. (1) Router
   Address TLV and (2) Link TLV.  In this memo, we enhance the sub-TLVs
   for the Link TLV in support of flexi-grid networks.  Specifically, we
   add the following sub-TLVs to the Link TLV:

   o  Consecutive spectrum slots weight sub-TLV

   o  Variable Guard Band sub-TLV

5.1.  Consecutive Spectrum Slots Weight Sub-TLV

   In distribution networks, we propose the CSSW as a sub-TLV of OSPF-TE
   Link TLV which represents the situation of the available consecutive
   spectrum slots in a link of the flexi-grid networks for example the
   percentage of the total bandwidth of the number of five consecutive
   spectrum slots, the percentage of the total bandwidth of the number
   of ten consecutive spectrum slots ... ).  With knowing the weight of
   available consecutive spectrum slots in a link, the spectrum resource
   assignment in the flexi-grid networks can be working more
   efficiently.

   The format of the CSSW sub-TLV is as follows:

Zhang, et al.            Expires April 26, 2012                 [Page 6]
Internet-Draft         Routing extension for C-RSA          October 2011

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |      Type = TBD               |         Length = variable     |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       |         Value = Consecutive Spectrum Slots Weight             |
       //                                                             //
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Type: TBD.

   The Type of CSSW sub-TLV is left for future to define.

   Length: Variable.

   The length of CSSW sub-TLV is based on its define of the value which
   is variable based on different implementation ways.

   Value: TBD

   The content of the CSSW sub-TLV is left for future researching.

5.2.  Variable Guard Band Sub-TLV

   The Guard Band sub-TLV (which is also short for GB sub-TLV) describes
   the spectrum interval between two client LSPs to avoid crosstalk and
   other network elements(such as impairment elements) that can affect
   the transmission performance of each client LSP.

   The format of the GB sub-TLV is as follows:

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |      Type = TBD               |          Length = TBD         |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                Value = Variable Guard Band                    |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Type: TBD.

   The Type of GB sub-TLV is left for future to define.

Zhang, et al.            Expires April 26, 2012                 [Page 7]
Internet-Draft         Routing extension for C-RSA          October 2011

   Length: TBD.

   The length of CSSW sub-TLV is based on the define of the value of it.

   Value: TBD.

   The content of the CSSW sub-TLV and it is left for future
   researching.

6.  Security Considerations

   TBD.

7.  Acknowledgments

   TBD.

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFC's to Indicate
              Requirement Levels", RFC 2119, March 1997.

   [RFC2328]  Moy, J., "OSPF Version 2", RFC 2328, April 1998.

   [RFC3630]  Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering
              (TE) Extensions to OSPF Version 2", RFC 3630,
              September 2003.

8.2.  Informative References

   [draft-ietf-ccamp-wson-impairments-07]
              Lee, Y., Bernstein, G., Li, D., and G. Martinelli, "A
              Framework for the Control of Wavelength Switched Optical
              Networks (WSON) with Impairments", July 2011.

Zhang, et al.            Expires April 26, 2012                 [Page 8]
Internet-Draft         Routing extension for C-RSA          October 2011

Authors' Addresses

   Jie Zhang
   BUPT
   No.10,Xitucheng Road,Haidian District
   Beijing  100876
   P.R.China

   Phone: +8613911060930
   Email: lgr24@bupt.edu.cn
   URI:   http://www.bupt.edu.cn/

   Yongli Zhao
   BUPT
   No.10,Xitucheng Road,Haidian District
   Beijing  100876
   P.R.China

   Phone: +8613811761857
   Email: yonglizhao@bupt.edu.cn
   URI:   http://www.bupt.edu.cn/

   Ziyan Yu
   BUPT
   No.10,Xitucheng Road,Haidian District
   Beijing  100876
   P.R.China

   Phone: +8615116984347
   Email: yzhziyan@gmail.com
   URI:   http://www.bupt.edu.cn/

Zhang, et al.            Expires April 26, 2012                 [Page 9]