draft-ietf-teas-actn-framework-07.txt | draft-ietf-teas-actn-framework-08.txt | |||
---|---|---|---|---|
TEAS Working Group Daniele Ceccarelli (Ed) | TEAS Working Group Daniele Ceccarelli (Ed) | |||
Internet Draft Ericsson | Internet Draft Ericsson | |||
Intended status: Informational Young Lee (Ed) | Intended status: Informational Young Lee (Ed) | |||
Expires: January 19, 2018 Huawei | Expires: April 3, 2018 Huawei | |||
July 20, 2017 | October 4, 2017 | |||
Framework for Abstraction and Control of Traffic Engineered Networks | Framework for Abstraction and Control of Traffic Engineered Networks | |||
draft-ietf-teas-actn-framework-07 | draft-ietf-teas-actn-framework-08 | |||
Abstract | Abstract | |||
Traffic Engineered networks have a variety of mechanisms to | Traffic Engineered networks have a variety of mechanisms to | |||
facilitate the separation of the data plane and control plane. They | facilitate the separation of the data plane and control plane. They | |||
also have a range of management and provisioning protocols to | also have a range of management and provisioning protocols to | |||
configure and activate network resources. These mechanisms | configure and activate network resources. These mechanisms | |||
represent key technologies for enabling flexible and dynamic | represent key technologies for enabling flexible and dynamic | |||
networking. | networking. | |||
skipping to change at page 2, line 7 ¶ | skipping to change at page 2, line 7 ¶ | |||
Internet-Drafts are draft documents valid for a maximum of six | Internet-Drafts are draft documents valid for a maximum of six | |||
months and may be updated, replaced, or obsoleted by other documents | months and may be updated, replaced, or obsoleted by other documents | |||
at any time. It is inappropriate to use Internet-Drafts as | at any time. It is inappropriate to use Internet-Drafts as | |||
reference material or to cite them other than as "work in progress." | reference material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This Internet-Draft will expire on January 19, 2018. | This Internet-Draft will expire on April 3, 2018. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with | carefully, as they describe your rights and restrictions with | |||
respect to this document. Code Components extracted from this | respect to this document. Code Components extracted from this | |||
document must include Simplified BSD License text as described in | document must include Simplified BSD License text as described in | |||
Section 4.e of the Trust Legal Provisions and are provided without | Section 4.e of the Trust Legal Provisions and are provided without | |||
warranty as described in the Simplified BSD License. | warranty as described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction...................................................3 | 1. Introduction...................................................3 | |||
1.1. Terminology...............................................5 | 2. Overview.......................................................4 | |||
2. Business Model of ACTN.........................................9 | 2.1. Terminology...............................................5 | |||
2.1. Customers................................................10 | 2.2. VNS Model of ACTN.........................................7 | |||
2.2. Service Providers........................................10 | 2.2.1. Customers............................................9 | |||
2.3. Network Providers........................................12 | 2.2.2. Service Providers....................................9 | |||
3. Virtual Network Service.......................................12 | 2.2.3. Network Providers...................................10 | |||
4. ACTN Base Architecture........................................13 | 3. ACTN Base Architecture........................................10 | |||
4.1. Customer Network Controller..............................15 | 3.1. Customer Network Controller..............................12 | |||
4.2. Multi Domain Service Coordinator.........................16 | 3.2. Multi-Domain Service Coordinator.........................13 | |||
4.3. Physical Network Controller..............................17 | 3.3. Physical Network Controller..............................13 | |||
4.4. ACTN Interfaces..........................................17 | 3.4. ACTN Interfaces..........................................14 | |||
5. Advanced ACTN architectures...................................18 | 4. Advanced ACTN Architectures...................................15 | |||
5.1. MDSC Hierarchy for scalability...........................18 | 4.1. MDSC Hierarchy...........................................15 | |||
5.2. Functional Split of MDSC Functions in Orchestrators......19 | 4.2. Functional Split of MDSC Functions in Orchestrators......16 | |||
6. Topology Abstraction Method...................................21 | 5. Topology Abstraction Methods..................................17 | |||
6.1. Abstraction Factors......................................22 | 5.1. Abstraction Factors......................................17 | |||
6.2. Abstraction Types........................................23 | 5.2. Abstraction Types........................................18 | |||
6.2.1. Native/White Topology...............................23 | 5.2.1. Native/White Topology...............................18 | |||
6.2.2. Black Topology......................................24 | 5.2.2. Black Topology......................................18 | |||
6.2.3. Grey Topology.......................................25 | 5.2.3. Grey Topology.......................................19 | |||
5.3. Methods of Building Grey Topologies......................20 | ||||
6.3. Building Methods of Grey Topology........................27 | 5.3.1. Automatic Generation of Abstract Topology by | |||
6.3.1. Automatic generation of abstract topology by | Configuration..............................................21 | |||
configuration..............................................27 | 5.3.2. On-demand Generation of Supplementary Topology via Path | |||
6.3.2. On-demand generation of supplementary topology via path | Compute Request/Reply......................................21 | |||
compute request/reply......................................28 | 5.4. Hierarchical Topology Abstraction Example................22 | |||
6.4. Abstraction Configuration Consideration..................29 | 6. Access Points and Virtual Network Access Points...............23 | |||
6.4.1. Packet Networks.....................................29 | 6.1. Dual-Homing Scenario.....................................25 | |||
6.4.2. OTN Networks........................................29 | 7. Advanced ACTN Application: Multi-Destination Service..........26 | |||
6.4.3. WSON Networks.......................................30 | 7.1. Pre-Planned End Point Migration..........................27 | |||
6.5. Topology Abstraction Granularity Level example...........30 | 7.2. On the Fly End-Point Migration...........................28 | |||
7. Access Points and Virtual Network Access Points...............32 | 8. Manageability Considerations..................................28 | |||
7.1. Dual homing scenario.....................................34 | 8.1. Policy...................................................29 | |||
8. Advanced ACTN Application: Multi-Destination Service..........35 | 8.2. Policy Applied to the Customer Network Controller........30 | |||
8.1. Pre-Planned End Point Migration..........................36 | 8.3. Policy Applied to the Multi Domain Service Coordinator...30 | |||
8.2. On the Fly End Point Migration...........................37 | 8.4. Policy Applied to the Physical Network Controller........30 | |||
9. Advanced Topic................................................37 | 9. Security Considerations.......................................31 | |||
10. Manageability Considerations.................................37 | 9.1. CNC-MDSC Interface (CMI).................................32 | |||
10.1. Policy..................................................38 | 9.2. MDSC-PNC Interface (MPI).................................32 | |||
10.2. Policy applied to the Customer Network Controller.......39 | 10. References...................................................32 | |||
10.3. Policy applied to the Multi Domain Service Coordinator..39 | 10.1. Informative References..................................32 | |||
10.4. Policy applied to the Physical Network Controller.......39 | 11. Contributors.................................................33 | |||
11. Security Considerations......................................40 | Authors' Addresses...............................................35 | |||
11.1. Interface between the Customer Network Controller and Multi | APPENDIX A - Example of MDSC and PNC Functions Integrated in A | |||
Domain Service Coordinator (MDSC), CNC-MDSC Interface (CMI)...41 | Service/Network Orchestrator.....................................35 | |||
11.2. Interface between the Multi Domain Service Coordinator and | APPENDIX B - Example of IP + Optical network with L3VPN service..36 | |||
Physical Network Controller (PNC), MDSC-PNC Interface (MPI)...41 | ||||
12. References...................................................42 | ||||
12.1. Informative References..................................42 | ||||
13. Contributors.................................................43 | ||||
Authors' Addresses...............................................44 | ||||
APPENDIX A - Example of MDSC and PNC functions integrated in | ||||
Service/Network Orchestrator.....................................45 | ||||
APPENDIX B - Example of IP + Optical network with L3VPN service..45 | ||||
1. Introduction | 1. Introduction | |||
Traffic Engineered networks have a variety of mechanisms to | The term "Traffic Engineered network" refers to a network that uses | |||
facilitate separation of data plane and control plane including | any connection-oriented technology under the control of a | |||
distributed signaling for path setup and protection, centralized | distributed or centralized control plane to support dynamic | |||
path computation for planning and traffic engineering, and a range | provisioning of end-to-end connectivity. Traffic Engineered (TE) | |||
of management and provisioning protocols to configure and activate | networks have a variety of mechanisms to facilitate separation of | |||
network resources. These mechanisms represent key technologies for | data plane and control plane including distributed signaling for | |||
enabling flexible and dynamic networking. | path setup and protection, centralized path computation for planning | |||
and traffic engineering, and a range of management and provisioning | ||||
The term Traffic Engineered network is used in this document to | protocols to configure and activate network resources. These | |||
refer to a network that uses any connection-oriented technology | mechanisms represent key technologies for enabling flexible and | |||
under the control of a distributed or centralized control plane to | dynamic networking. Some examples of networks that are in scope of | |||
support dynamic provisioning of end-to-end connectivity. Some | this definition are optical networks, MPLS Transport Profile (MPLS- | |||
examples of networks that are in scope of this definition are | TP) networks [RFC5654], and MPLS-TE networks [RFC2702]. | |||
optical networks, MPLS Transport Profile (MPLS-TP) networks | ||||
[RFC5654], and MPLS Traffic Engineering (MPLS-TE) networks | ||||
[RFC2702]. | ||||
One of the main drivers for Software Defined Networking (SDN) | One of the main drivers for Software Defined Networking (SDN) | |||
[RFC7149] is a decoupling of the network control plane from the data | [RFC7149] is a decoupling of the network control plane from the data | |||
plane. This separation of the control plane from the data plane has | plane. This separation has been achieved for TE networks with the | |||
been already achieved with the development of MPLS/GMPLS [GMPLS] and | development of MPLS/GMPLS [RFC3945] and the Path Computation Element | |||
the Path Computation Element (PCE) [RFC4655] for TE-based networks. | (PCE) [RFC4655]. One of the advantages of SDN is its logically | |||
One of the advantages of SDN is its logically centralized control | centralized control regime that allows a global view of the | |||
regime that allows a global view of the underlying networks. | underlying networks. Centralized control in SDN helps improve | |||
Centralized control in SDN helps improve network resource | network resource utilization compared with distributed network | |||
utilization compared with distributed network control. For TE-based | control. For TE-based networks, a PCE may serve as a logically | |||
networks, PCE is essentially equivalent to a logically centralized | centralized path computation function. | |||
path computation function. | ||||
This document describes a set of management and control functions | ||||
used to operate one or more TE networks to construct virtual | ||||
networks that can be represented to customers and that are built | ||||
from abstractions of the underlying TE networks so that, for | ||||
example, a link in the customer's network is constructed from a path | ||||
or collection of paths in the underlying networks. We call this set | ||||
of function "Abstraction and Control of Traffic Engineered Networks" | ||||
(ACTN). | ||||
2. Overview | ||||
Three key aspects that need to be solved by SDN are: | Three key aspects that need to be solved by SDN are: | |||
. Separation of service requests from service delivery so that | . Separation of service requests from service delivery so that | |||
the orchestration of a network is transparent from the point of | the configuration and operation of a network is transparent | |||
view of the customer but remains responsive to the customer's | from the point of view of the customer, but remains responsive | |||
services and business needs. | to the customer's services and business needs. | |||
. Network abstraction: As described in [RFC7926], abstraction is | . Network abstraction: As described in [RFC7926], abstraction is | |||
the process of applying policy to a set of information about a | the process of applying policy to a set of information about a | |||
TE network to produce selective information that represents the | TE network to produce selective information that represents the | |||
potential ability to connect across the domain. The process of | potential ability to connect across the network. The process | |||
abstraction presents the connectivity graph in a way that is | of abstraction presents the connectivity graph in a way that is | |||
independent of the underlying network technologies, | independent of the underlying network technologies, | |||
capabilities, and topology so that it can be used to plan and | capabilities, and topology so that the graph can be used to | |||
deliver network services in a uniform way | plan and deliver network services in a uniform way | |||
. Coordination of resources across multiple domains and multiple | . Coordination of resources across multiple independent networks | |||
layers to provide end-to-end services regardless of whether the | and multiple technology layers to provide end-to-end services | |||
domains use SDN or not. | regardless of whether the networks use SDN or not. | |||
As networks evolve, the need to provide separated service | As networks evolve, the need to provide support for distinct | |||
request/orchestration and resource abstraction has emerged as a key | services, separated service orchestration, and resource abstraction | |||
requirement for operators. In order to support multiple clients each | have emerged as key requirements for operators. In order to support | |||
with its own view of and control of the server network, a network | multiple customers each with its own view of and control of the | |||
operator needs to partition (or "slice") the network resources. The | server network, a network operator needs to partition (or "slice") | |||
resulting slices can be assigned to each client for guaranteed usage | or manage sharing of the network resources. Network slices can be | |||
which is a step further than shared use of common network resources. | assigned to each customer for guaranteed usage which is a step | |||
further than shared use of common network resources. | ||||
Furthermore, each network represented to a client can be built from | Furthermore, each network represented to a customer can be built | |||
abstractions of the underlying networks so that, for example, a link | from virtualization of the underlying networks so that, for example, | |||
in the client's network is constructed from a path or collection of | a link in the customer's network is constructed from a path or | |||
paths in the underlying network. | collection of paths in the underlying network. | |||
We call the set of management and control functions used to provide | We call the set of management and control functions used to provide | |||
these features Abstraction and Control of Traffic Engineered | these features Abstraction and Control of Traffic Engineered | |||
Networks (ACTN). | Networks (ACTN). | |||
Particular attention needs to be paid to the multi-domain case, ACTN | ACTN can facilitate virtual network operation via the creation of a | |||
can facilitate virtual network operation via the creation of a | single virtualized network or a seamless service. This supports | |||
single virtualized network or a seamless service. This supports | ||||
operators in viewing and controlling different domains (at any | operators in viewing and controlling different domains (at any | |||
dimension: applied technology, administrative zones, or vendor- | dimension: applied technology, administrative zones, or vendor- | |||
specific technology islands) as a single virtualized network. | specific technology islands) and presenting virtualized networks to | |||
their customers. | ||||
The ACTN framework described in this document facilitates: | The ACTN framework described in this document facilitates: | |||
. Abstraction of the underlying network resources to higher-layer | . Abstraction of the underlying network resources to higher-layer | |||
applications and customers [RFC7926]. | applications and customers [RFC7926]. | |||
. Virtualization of particular underlying resources, whose | . Virtualization of particular underlying resources, whose | |||
selection criterion is the allocation of those resources to a | selection criterion is the allocation of those resources to a | |||
particular customer, application or service [ONF-ARCH]. | particular customer, application or service [ONF-ARCH]. | |||
. Network slicing of infrastructure to meet specific customers' | . Network slicing of infrastructure to meet specific customers' | |||
service requirements. | service requirements. | |||
. Creation of a virtualized environment allowing operators to | . Creation of a virtualized environment allowing operators to | |||
view and control multi-domain networks as a single virtualized | view and control multi-domain networks as a single virtualized | |||
network. | network. | |||
. The presentation to customers of networks as a virtual network | . The presentation to customers of networks as a virtual network | |||
via open and programmable interfaces. | via open and programmable interfaces. | |||
1.1. Terminology | 2.1. Terminology | |||
The following terms are used in this document. Some of them are | The following terms are used in this document. Some of them are | |||
newly defined, some others reference existing definition: | newly defined, some others reference existing definitions: | |||
. Network Slicing: In the context of ACTN, network slicing is a | . Domain: A domain [RFC4655] is any collection of network | |||
collection of resources that are used to establish logically | elements within a common sphere of address management or path | |||
dedicated virtual networks over TE networks. It allows a | computation responsibility. Specifically within this document | |||
network provider to provide dedicated virtual networks for | we mean a part of an operator's network that is under common | |||
application/customer over a common network infrastructure. The | management. Network elements will often be grouped into | |||
logically dedicated resources are a part of the larger common | domains based on technology types, vendor profiles, and | |||
network infrastructures that are shared among various network | geographic proximity. | |||
slice instances which are the end-to-end realization of network | ||||
slicing, consisting of the combination of physically or | . Abstraction: This process is defined in [RFC7926]. | |||
logically dedicated resources. | ||||
. Network Slicing: In the context of ACTN, a network slice is a | ||||
collection of resources that is used to establish a logically | ||||
dedicated virtual network over one or more TE network. Network | ||||
slicing allows a network provider to provide dedicated virtual | ||||
networks for applications/customers over a common network | ||||
infrastructure. The logically dedicated resources are a part | ||||
of the larger common network infrastructures that are shared | ||||
among various network slice instances which are the end-to-end | ||||
realization of network slicing, consisting of the combination | ||||
of physically or logically dedicated resources. | ||||
. Node: A node is a vertex on the graph representation of a TE | . Node: A node is a vertex on the graph representation of a TE | |||
topology. In a physical network topology, a node corresponds to | topology. In a physical network topology, a node corresponds | |||
a physical network element (NE). In an abstract network | to a physical network element (NE) such as a router. In an | |||
topology, a node (sometimes called an abstract node) is a | abstract network topology, a node (sometimes called an abstract | |||
representation as a single vertex of one or more physical NEs | node) is a representation as a single vertex of one or more | |||
and their connecting physical connections. The concept of a | physical NEs and their connecting physical connections. The | |||
node represents the ability to connect from any access to the | concept of a node represents the ability to connect from any | |||
node (a link end) to any other access to that node, although | access to the node (a link end) to any other access to that | |||
"limited cross-connect capabilities" may also be defined to | node, although "limited cross-connect capabilities" may also be | |||
restrict this functionality. Just as network slicing and | defined to restrict this functionality. Just as network | |||
network abstraction may be applied recursively, so a node in a | slicing and network abstraction may be applied recursively, so | |||
topology may be created by applying slicing or abstraction on | a node in one topology may be created by applying slicing or | |||
the nodes in the underlying topology. | abstraction to the nodes in the underlying topology. | |||
. Link: A link is an edge on the graph representation of a TE | . Link: A link is an edge on the graph representation of a TE | |||
topology. Two nodes connected by a link are said to be | topology. Two nodes connected by a link are said to be | |||
"adjacent" in the TE topology. In a physical network topology, | "adjacent" in the TE topology. In a physical network topology, | |||
a link corresponds to a physical connection. In an abstract | a link corresponds to a physical connection. In an abstract | |||
network topology, a link (sometimes called an abstract link) is | network topology, a link (sometimes called an abstract link) is | |||
a representation of the potential to connect a pair of points | a representation of the potential to connect a pair of points | |||
with certain TE parameters (see RFC 7926 for details). Network | with certain TE parameters (see [RFC7926] for details). | |||
slicing/virtualization and network abstraction may be applied | Network slicing/virtualization and network abstraction may be | |||
recursively, so a link in a topology may be created by applying | applied recursively, so a link in one topology may be created | |||
slicing and/or abstraction on the links in the underlying | by applying slicing and/or abstraction to the links in the | |||
topology. | underlying topology. | |||
. CNC: A Customer Network Controller is responsible for | ||||
communicating customer's virtual network service requirements | ||||
to network provider. It has knowledge of the end-point | ||||
associated with virtual network service, service policy, and | ||||
other QoS information related to the service it is responsible | ||||
for instantiating. | ||||
. PNC: A Physical Network Controller is responsible for | ||||
controlling devices or NEs under its direct control. The PNC | ||||
functions can be implemented as part of an SDN domain | ||||
controller, a Network Management System (NMS), an Element | ||||
Management System (EMS), an active PCE-based controller or any | ||||
other means to dynamically control a set of nodes and that is | ||||
implementing an NBI compliant with ACTN specification. | ||||
. PNC domain: A PNC domain includes all the resources under the | ||||
control of a single PNC. It can be composed of different | ||||
routing domains and administrative domains, and the resources | ||||
may come from different layers. The interconnection between PNC | ||||
domains can be a link or a node. | ||||
_______ Border Link _______ | ||||
_( )================( )_ | ||||
_( )_ _( )_ | ||||
( ) ---- ( ) | ||||
( PNC )| |( PNC ) | ||||
( Domain X )| |( Domain Y ) | ||||
( )| |( ) | ||||
(_ _) ---- (_ _) | ||||
(_ _) Border (_ _) | ||||
(_______) Node (_______) | ||||
Figure 1: PNC Domain Borders | ||||
. MDSC: A multi-domain Service Coordinator is a functional block | . Abstract Link: The term "abstract link" is defined in | |||
that implements all four ACTN main functions, i.e., multi | [RFC7926]. | |||
domain coordination, virtualization/abstraction, customer | ||||
mapping/translation, and virtual service coordination. The | ||||
first two functions of the MDSC, namely, multi domain | ||||
coordination and virtualization/abstraction are referred to as | ||||
network-related functions while the last two functions, namely, | ||||
customer mapping/translation and virtual service coordination | ||||
are referred to as service-related functions. See details on | ||||
these functions in Section 4.2. In some implementation, PNC and | ||||
MDSC functions can be co-located and implemented in the same | ||||
box. | ||||
. A Virtual Network (VN) is a customer view of the TE | . Abstract Topology: The topology of abstract nodes and abstract | |||
network. Depending on the agreement between client and | links presented through the process of abstraction by a lower | |||
provider various VN operations and VN views are possible as | layer network for use by a higher layer network. | |||
follows: | ||||
o VN Creation - VN could be pre-configured and created via | . A Virtual Network (VN) is a network provided by a service | |||
offline negotiation between customer and provider. In | provider to a customer for the customer to use in any way it | |||
other cases, the VN could also be created dynamically | wants as though it was a physical network. There are two views | |||
based on a request from the customer with given SLA | of a VN as follows: | |||
attributes which satisfy the customer's objectives. | ||||
o Dynamic Operations - The VN could be further modified or | a) The VN can be seen as a set of edge-to-edge links (a Type 1 | |||
deleted based on a customer request. The customer can | VN). Each link is referred as a VN member and is formed as | |||
further act upon the virtual network resources to perform | an end-to-end tunnel across the underlying networks. Such | |||
end-to-end tunnel management (set-up/release/modify). | tunnels may be constructed by recursive slicing or | |||
These changes will result in subsequent LSP management at | abstraction of paths in the underlying networks and can | |||
the operator's level. | encompass edge points of the customer's network, access | |||
links, intra-domain paths, and inter-domain links. | ||||
o VN Type: | b) The VN can also be seen as a topology of virtual nodes and | |||
virtual links (a Type 2 VN). The provider needs to map the | ||||
VN to actual resource assignment, which is known as virtual | ||||
network embedding. The nodes in this case include physical | ||||
end points, border nodes, and internal nodes as well as | ||||
abstracted nodes. Similarly the links include physical | ||||
access links, inter-domain links, and intra-domain links as | ||||
well as abstract links. | ||||
a. The VN can be seen as set of end-to-end tunnels from a | Clearly a Type 1 VN is a special case of a Type 2 VN. | |||
customer point of view, where each tunnel is referred | ||||
as a VN member. Each VN member can then be formed by | ||||
recursive slicing or abstraction of paths in | ||||
underlying networks. Such end-to-end tunnels may | ||||
comprise of customer end points, access links, intra- | ||||
domain paths, and inter-domain links. In this view, VN | ||||
is thus a set of VN members (which is referred to as | ||||
Type 1 VN) | ||||
b. The VN can also be seen as a topology comprising of | . Access link: A link between a customer node and a provider | |||
physical, sliced, and abstract nodes and links. This | node. | |||
VN is referred to as Type 2 VN. The nodes in this case | ||||
include physical customer end points, border nodes, | ||||
and internal nodes as well as abstracted nodes. | ||||
Similarly the links include physical access links, | ||||
inter-domain links, and intra-domain links as well as | ||||
abstract links. With VN type 2, it is still possible | ||||
to view VN member-level. | ||||
. Virtual Network Service (VNS) is requested by the customer and | . Inter-domain link: A link between domains under distinct | |||
negotiated with the provider. There are three types of VNS | management administration. | |||
defined in this document. Type 1 VNS refers to VNS in which | ||||
customer is allowed to create and operate a Type 1 VN. Type 2a | ||||
and 2b VNS refers to the VNS in which customer is allowed to | ||||
create and operates a Type 2 VN. With Type 2a VNS, once the VN | ||||
is statically created at service configuration time, the | ||||
customer is not allowed to change the topology (i.e., adding or | ||||
deleting abstract nodes/links). Type 2b VNS is the same as Type | ||||
2a VNS except that the customer is allowed to change topology | ||||
dynamically from the initial topology created at service | ||||
configuration time. See Section 3 for details. | ||||
. Abstraction. This process is defined in [RFC7926]. | . Access Point (AP): An AP is a logical identifier shared between | |||
the customer and the provider used to identify an access link. | ||||
The AP is used by the customer when requesting a VNS. | ||||
. Abstract Link: The term "abstract link" is defined in | . VN Access Point (VNAP): A VNAP is the binding between an AP and | |||
[RFC7926]. | a given VN. | |||
. Abstract Topology: The topology of abstract nodes and abstract | 2.2. VNS Model of ACTN | |||
links presented through the process of abstraction by a lower | ||||
layer network for use by a higher layer network. | ||||
. Access link: A link between a customer node and a provider | A Virtual Network Service (VNS) is the service agreement between a | |||
node. | customer and provider to provide a VN. There are three types of VNS | |||
defined in this document. | ||||
. Inter-domain link: A link between domains managed by different | o Type 1 VNS refers to a VNS in which the customer is allowed | |||
PNCs. The MDSC is in charge of managing inter-domain links. | to create and operate a Type 1 VN. | |||
. Access Point (AP): An access point is used to keep | o Type 2a and 2b VNS refer to VNSs in which the customer is | |||
confidentiality between the customer and the provider. It is a | allowed to create and operates a Type 2 VN. With a Type | |||
logical identifier shared between the customer and the | 2a VNS, the VN is statically created at service | |||
provider, used to map the end points of the border node in both | configuration time and the customer is not allowed to | |||
the customer and the provider NW. The AP can be used by the | change the topology (e.g., by adding or deleting abstract | |||
customer when requesting VN service to the provider. | nodes and links). A Type 2b VNS is the same as a Type 2a | |||
VNS except that the customer is allowed to make dynamic | ||||
changes to the initial topology created at service | ||||
configuration time. | ||||
. VN Access Point (VNAP): A VNAP is defined as the binding | VN Operations are functions that a customer can exercise on a VN | |||
between an AP and a given VN and is used to identify the | depending on the agreement between the customer and the provider. | |||
portion of the access and/or inter-domain link dedicated to a | ||||
given VN. | ||||
2. Business Model of ACTN | o VN Creation allows a customer to request the instantiation | |||
of a VN. This could be through off-line pre-configuration | ||||
or through dynamic requests specifying attributes to a | ||||
Service Level Agreement (SLA) to satisfy the customer's | ||||
objectives. | ||||
The Virtual Private Network (VPN) [RFC4026] and Overlay Network (ON) | o Dynamic Operations allow a customer to modify or delete the | |||
models [RFC4208] are built on the premise that the network provider | VN. The customer can further act upon the virtual network | |||
provides all virtual private or overlay networks to its customers. | to create/modify/delete virtual links and nodes. These | |||
These models are simple to operate but have some disadvantages in | changes will result in subsequent tunnel management in the | |||
accommodating the increasing need for flexible and dynamic network | operator's networks. | |||
virtualization capabilities. | ||||
There are three key entities in the ACTN model: | There are three key entities in the ACTN VNS model: | |||
- Customers | - Customers | |||
- Service Providers | - Service Providers | |||
- Network Providers | - Network Providers | |||
These are described in the following sections. | These entities are related in a three tier model as shown in Figure | |||
1. | ||||
2.1. Customers | +----------------------+ | |||
| Customer | | ||||
+----------------------+ | ||||
| | ||||
VNS || | /\ VN | ||||
Request || | || Reply | ||||
\/ | || | ||||
+----------------------+ | ||||
| Service Provider | | ||||
+----------------------+ | ||||
/ | \ | ||||
/ | \ | ||||
/ | \ | ||||
Within the ACTN framework, different types of customers may be taken | / | \ | |||
into account depending on the type of their resource needs, and on | +------------------+ +------------------+ +------------------+ | |||
their number and type of access. For example, it is possible to | |Network Provider 1| |Network Provider 2| |Network Provider 3| | |||
group them into two main categories: | +------------------+ +------------------+ +------------------+ | |||
Basic Customer: Basic customers include fixed residential users, | Figure 1: The Three Tier Model. | |||
mobile users and small enterprises. Usually, the number of basic | ||||
customers for a service provider is high: they require small amounts | ||||
of resources and are characterized by steady requests (relatively | ||||
time invariant). A typical request for a basic customer is for a | ||||
bundle of voice services and internet access. Moreover, basic | ||||
customers do not modify their services themselves: if a service | ||||
change is needed, it is performed by the provider as a proxy and the | ||||
services generally have very few dedicated resources (such as for | ||||
subscriber drop), with everything else shared on the basis of some | ||||
Service Level Agreement (LSA), which is usually best-efforts. | ||||
Advanced Customer: Advanced customers typically include enterprises, | The commercial roles of these entities are described in the | |||
governments and utilities. Such customers can ask for both point-to | following sections. | |||
point and multipoint connectivity with high resource demands varying | ||||
significantly in time and from customer to customer. This is one of | ||||
the reasons why a bundled service offering is not enough and it is | ||||
desirable to provide each advanced customer with a customized | ||||
virtual network service. | ||||
Advanced customers may own dedicated virtual resources, or share | 2.2.1. Customers | |||
resources. They may also have the ability to modify their service | ||||
Basic customers include fixed residential users, mobile users, and | ||||
small enterprises. Each requires a small amount of resources and is | ||||
characterized by steady requests (relatively time invariant). Basic | ||||
customers do not modify their services themselves: if a service | ||||
change is needed, it is performed by the provider as a proxy. | ||||
Advanced customers include enterprises, governments, and utility | ||||
companies. Such customers ask for both point-to point and | ||||
multipoint connectivity with high resource demands varying | ||||
significantly in time. This is one of the reasons why a bundled | ||||
service offering is not enough and it is desirable to provide each | ||||
advanced customer with a customized virtual network service. | ||||
Advanced customers may also have the ability to modify their service | ||||
parameters within the scope of their virtualized environments. The | parameters within the scope of their virtualized environments. The | |||
primary focus of ACTN is Advanced Customers. | primary focus of ACTN is Advanced Customers. | |||
As customers are geographically spread over multiple network | As customers are geographically spread over multiple network | |||
provider domains, they have to interface to multiple providers and | provider domains, they have to interface to multiple providers and | |||
may have to support multiple virtual network services with different | may have to support multiple virtual network services with different | |||
underlying objectives set by the network providers. To enable these | underlying objectives set by the network providers. To enable these | |||
customers to support flexible and dynamic applications they need to | customers to support flexible and dynamic applications they need to | |||
control their allocated virtual network resources in a dynamic | control their allocated virtual network resources in a dynamic | |||
fashion, and that means that they need a view of the topology that | fashion, and that means that they need a view of the topology that | |||
spans all of the network providers. Customers of a given service | spans all of the network providers. Customers of a given service | |||
provider can in turn offer a service to other customers in a | provider can in turn offer a service to other customers in a | |||
recursive way. | recursive way. | |||
2.2. Service Providers | 2.2.2. Service Providers | |||
Service providers are the providers of virtual network services (see | ||||
Section 3 for details) to their customers. Service providers may or | ||||
may not own physical network resources (i.e, may or may not be | ||||
network providers as described in Section 2.3). When a service | ||||
provider is the same as the network provider, this is similar to | ||||
existing VPN models applied to a single provider. This approach | ||||
works well when the customer maintains a single interface with a | ||||
single provider. When customer spans multiple independent network | ||||
provider domains, then it becomes hard to facilitate the creation of | ||||
end-to-end virtual network services with this model. | ||||
A more interesting case arises when network providers only provide | ||||
infrastructure, while distinct service providers interface to the | ||||
customers. In this case, service providers are, themselves customers | ||||
of the network infrastructure providers. One service provider may | ||||
need to keep multiple independent network providers as its end-users | ||||
span geographically across multiple network provider domains. | ||||
The ACTN network model is predicated upon this three tier model and | ||||
is summarized in Figure 2: | ||||
+----------------------+ | ||||
| customer | | ||||
+----------------------+ | ||||
| | ||||
VNS || | /\ VNS | ||||
Request || | || Reply | ||||
\/ | || | ||||
+----------------------+ | ||||
| Service Provider | | ||||
+----------------------+ | ||||
/ | \ | ||||
/ | \ | ||||
/ | \ | ||||
/ | \ | ||||
+------------------+ +------------------+ +------------------+ | ||||
|Network Provider 1| |Network Provider 2| |Network Provider 3| | ||||
+------------------+ +------------------+ +------------------+ | ||||
Figure 2: Three tier model. | ||||
There can be multiple service providers to which a customer may | ||||
interface. | ||||
There are multiple types of service providers, for example: | In the scope of ACTN, service providers deliver VNSs to their | |||
customers. Service providers may or may not own physical network | ||||
resources (i.e., may or may not be network providers as described in | ||||
Section 2.2.3). When a service provider is the same as the network | ||||
provider, this is similar to existing VPN models applied to a single | ||||
provider although it may be hard to use this approach when the | ||||
customer spans multiple independent network provider domains. | ||||
. Data Center providers can be viewed as a service provider type | When network providers supply only infrastructure, while distinct | |||
as they own and operate data center resources for various WAN | service providers interface to the customers, the service providers | |||
customers, and they can lease physical network resources from | are themselves customers of the network infrastructure providers. | |||
network providers. | One service provider may need to keep multiple independent network | |||
. Internet Service Providers (ISP) are service providers of | providers because its end-users span geographically across multiple | |||
internet services to their customers while leasing physical | network provider domains. | |||
network resources from network providers. | ||||
. Mobile Virtual Network Operators (MVNO) provide mobile services | ||||
to their end-users without owning the physical network | ||||
infrastructure. | ||||
2.3. Network Providers | 2.2.3. Network Providers | |||
Network Providers are the infrastructure providers that own the | Network Providers are the infrastructure providers that own the | |||
physical network resources and provide network resources to their | physical network resources and provide network resources to their | |||
customers. The layered model described in this architecture | customers. The layered model described in this architecture | |||
separates the concerns of network providers and customers, with | separates the concerns of network providers and customers, with | |||
service providers acting as aggregators of customer requests. | service providers acting as aggregators of customer requests. | |||
3. Virtual Network Service | 3. ACTN Base Architecture | |||
Virtual Network Service (VNS) is requested by the customer and | ||||
negotiated with the provider. There are three types of VNS defined | ||||
in this document. | ||||
Type 1 VNS refers to VNS in which customer is allowed to create and | ||||
operate a Type 1 VN. Type 1 VN is a VN that comprises a set of end- | ||||
to-end tunnels from a customer point of view, where each tunnel is | ||||
referred as a VN member. With Type 1 VNS, the network operator does | ||||
not need to provide additional abstract VN topology associated with | ||||
the Type 1 VN. | ||||
Type 2a VNS refer to VNS in which customer is allowed to create and | ||||
operates a Type 2 VN, but not allowed to change topology once it is | ||||
configured at service configuration time. Type 2 VN is an abstract | ||||
VN topology that may comprise of virtual/abstract nodes and links. | ||||
The nodes in this case may include physical customer end points, | ||||
border nodes, and internal nodes as well as abstracted nodes. | ||||
Similarly, the links may include physical access links, inter-domain | ||||
links, and intra-domain links as well as abstract links. | ||||
Type 2b VNS refers to VNS in which customer is allowed to create and | ||||
operate a Type 2 VN and the customer is allowed to dynamically | ||||
change abstract VN topology from the initially configured abstract | ||||
VN topology at service configuration time. | ||||
From an implementation standpoint, Type 2a VNS and Type 2b VNS | ||||
differentiation might be fulfilled via local policy. | ||||
In all types of VNS, customer can specify a set of service related | ||||
parameters such as connectivity type, VN traffic matrix (e.g., | ||||
bandwidth, latency, diversity, etc.), VN survivability, VN service | ||||
policy and other characteristics. | ||||
4. ACTN Base Architecture | ||||
This section provides a high-level model of ACTN showing the | This section provides a high-level model of ACTN showing the | |||
interfaces and the flow of control between components. | interfaces and the flow of control between components. | |||
The ACTN architecture is aligned with the ONF SDN architecture [ONF- | The ACTN architecture is based on a 3-tier reference model and | |||
ARCH] and presents a 3-tiers reference model. It allows for | allows for hierarchy and recursion. The main functionalities within | |||
hierarchy and recursiveness not only of SDN controllers but also of | an ACTN system are: | |||
traditionally controlled domains that use a control plane. It | ||||
defines three types of controllers depending on the functionalities | ||||
they implement. The main functionalities that are identified are: | ||||
. Multi-domain coordination function: This function oversees the | . Multi-domain coordination: This function oversees the specific | |||
specific aspects of the different domains and builds a single | aspects of different domains and builds a single abstracted | |||
abstracted end-to-end network topology in order to coordinate | end-to-end network topology in order to coordinate end-to-end | |||
end-to-end path computation and path/service provisioning. | path computation and path/service provisioning. Domain | |||
Domain sequence path calculation/determination is also a part | sequence path calculation/determination is also a part of this | |||
of this function. | function. | |||
. Virtualization/Abstraction function: This function provides an | . Virtualization/Abstraction: This function provides an | |||
abstracted view of the underlying network resources for use by | abstracted view of the underlying network resources for use by | |||
the customer - a customer may be the client or a higher level | the customer - a customer may be the client or a higher level | |||
controller entity. This function includes network path | controller entity. This function includes network path | |||
computation based on customer service connectivity request | computation based on customer service connectivity request | |||
constraints, path computation based on the global network-wide | constraints, path computation based on the global network-wide | |||
abstracted topology, and the creation of an abstracted view of | abstracted topology, and the creation of an abstracted view of | |||
network resources allocated to each customer. These operations | network resources allocated to each customer. These operations | |||
depend on customer-specific network objective functions and | depend on customer-specific network objective functions and | |||
customer traffic profiles. | customer traffic profiles. | |||
. Customer mapping/translation function: This function is to map | . Customer mapping/translation: This function is to map customer | |||
customer requests/commands into network provisioning requests | requests/commands into network provisioning requests that can | |||
that can be sent to the Physical Network Controller (PNC) | be sent to the Physical Network Controller (PNC) according to | |||
according to business policies provisioned statically or | business policies provisioned statically or dynamically at the | |||
dynamically at the OSS/NMS. Specifically, it provides mapping and | OSS/NMS. Specifically, it provides mapping and translation of | |||
translation of a customer's service request into a set of | a customer's service request into a set of parameters that are | |||
parameters that are specific to a network type and technology | specific to a network type and technology such that network | |||
such that network configuration process is made possible. | configuration process is made possible. | |||
. Virtual service coordination function: This function translates | . Virtual service coordination: This function translates customer | |||
customer service-related information into virtual network | service-related information into virtual network service | |||
service operations in order to seamlessly operate virtual | operations in order to seamlessly operate virtual networks | |||
networks while meeting a customer's service requirements. In | while meeting a customer's service requirements. In the | |||
the context of ACTN, service/virtual service coordination | context of ACTN, service/virtual service coordination includes | |||
includes a number of service orchestration functions such as | a number of service orchestration functions such as multi- | |||
multi-destination load balancing, guarantees of service | destination load balancing, guarantees of service quality, | |||
quality, bandwidth and throughput. It also includes | bandwidth and throughput. It also includes notifications for | |||
notifications for service fault and performance degradation and | service fault and performance degradation and so forth. | |||
so forth. | ||||
Figure 3 depicts the base ACTN architecture with three controller | The base ACTN architecture defines three controller types and the | |||
types and the corresponding interfaces between these controllers. | corresponding interfaces between these controllers. The following | |||
The types of controller defined in the ACTN architecture are shown | types of controller are shown in Figure 2: | |||
in Figure 3 below and are as follows: | ||||
. CNC - Customer Network Controller | . CNC - Customer Network Controller | |||
. MDSC - Multi Domain Service Coordinator | . MDSC - Multi Domain Service Coordinator | |||
. PNC - Physical Network Controller | . PNC - Physical Network Controller | |||
Figure 3 also shows the following interfaces: | Figure 2 also shows the following interfaces: | |||
. CMI - CNC-MDSC Interface | . CMI - CNC-MDSC Interface | |||
. MPI - MDSC-PNC Interface | . MPI - MDSC-PNC Interface | |||
. SBI - South Bound Interface | . SBI - South Bound Interface | |||
+--------------+ +---------------+ +--------------+ | +---------+ +---------+ +---------+ | |||
| CNC-A | | CNC-B | | CNC-C | | | CNC | | CNC | | CNC | | |||
|(DC provider) | | (ISP) | | (MVNO) | | +---------+ +---------+ +---------+ | |||
+--------------+ +---------------+ +--------------+ | \ | / | |||
\ | / | Business \ | / | |||
Business \ | / | Boundary =============\==================|=====================/======= | |||
Boundary =======\========================|=========================/======= | Between \ | / | |||
Between \ | CMI / | Customer & ----------- | CMI -------------- | |||
Customer & ----------- | -------------- | Network Provider \ | / | |||
Network Provider \ | / | +---------------+ | |||
+-----------------------+ | | MDSC | | |||
| MDSC | | +---------------+ | |||
+-----------------------+ | / | \ | |||
/ | \ | ------------ | MPI --------------- | |||
------------ |MPI ---------------- | / | \ | |||
/ | \ | +-------+ +-------+ +-------+ | |||
+-------+ +-------+ +-------+ | | PNC | | PNC | | PNC | | |||
| PNC | | PNC | | PNC | | +-------+ +-------+ +-------+ | |||
+-------+ +-------+ +-------+ | | SBI / | / \ | |||
| GMPLS / | / \ | | / | SBI / \ | |||
| trigger / |SBI / \ | --------- ----- | / \ | |||
-------- ----- | / \ | ( ) ( ) | / \ | |||
( ) ( ) | / \ | - Control - ( Phys. ) | / ----- | |||
- - ( Phys. ) | / ----- | ( Plane ) ( Net ) | / ( ) | |||
( GMPLS ) ( Net ) | / ( ) | ( Physical ) ----- | / ( Phys. ) | |||
( Physical ) ---- | / ( Phys. ) | ( Network ) ----- ----- ( Net ) | |||
( Network ) ----- ----- ( Net ) | - - ( ) ( ) ----- | |||
- - ( ) ( ) ----- | ( ) ( Phys. ) ( Phys. ) | |||
( ) ( Phys. ) ( Phys. ) | --------- ( Net ) ( Net ) | |||
-------- ( Net ) ( Net ) | ||||
----- ----- | ----- ----- | |||
Figure 3: ACTN Base Architecture | Figure 2: ACTN Base Architecture | |||
4.1. Customer Network Controller | Note that this is a functional architecture: an implementation and | |||
deployment might collocate one or more of the functional components. | ||||
A Virtual Network Service is instantiated by the Customer Network | 3.1. Customer Network Controller | |||
Controller via the CNC-MDSC Interface (CMI). As the Customer Network | ||||
Controller directly interfaces to the applications, it understands | ||||
multiple application requirements and their service needs. It is | ||||
assumed that the Customer Network Controller and the MDSC have a | ||||
common knowledge of the end-point interfaces based on their business | ||||
negotiations prior to service instantiation. End-point interfaces | ||||
refer to customer-network physical interfaces that connect customer | ||||
premise equipment to network provider equipment. | ||||
4.2. Multi Domain Service Coordinator | A Customer Network Controller (CNC) is responsible for communicating | |||
a customer's VNS requirements to the network provider over the CNC- | ||||
MDSC Interface (CMI). It has knowledge of the end-points associated | ||||
with the VNS (expressed as APs), the service policy, and other QoS | ||||
information related to the service. | ||||
The Multi Domain Service Coordinator (MDSC) sits between the CNC | As the Customer Network Controller directly interfaces to the | |||
that issues connectivity requests and the Physical Network | applications, it understands multiple application requirements and | |||
Controllers (PNCs) that manage the physical network resources. The | their service needs. | |||
MDSC can be collocated with the PNC. | ||||
The internal system architecture and building blocks of the MDSC are | 3.2. Multi-Domain Service Coordinator | |||
out of the scope of ACTN. Some examples can be found in the | ||||
Application Based Network Operations (ABNO) architecture [RFC7491] | ||||
and the ONF SDN architecture [ONF-ARCH]. | ||||
The MDSC is the only building block of the architecture that can | A Multi-Domain Service Coordinator (MDSC) is a functional block that | |||
implement all four ACTN main functions, i.e., multi domain | implements all of the ACTN functions listed in Section 3 and | |||
coordination, virtualization/abstraction, customer | described further in Section 4.2. The MDSC sits at the center of | |||
mapping/translation, and virtual service coordination. The first two | the ACTN model between the CNC that issues connectivity requests and | |||
functions of the MDSC, namely, multi domain coordination and | the Physical Network Controllers (PNCs) that manage the physical | |||
virtualization/abstraction are referred to as network-related | network resources. | |||
functions while the last two functions, namely, customer | ||||
mapping/translation and virtual service coordination are referred to | ||||
as service-related functions. | ||||
The key point of the MDSC (and of the whole ACTN framework) is | The key point of the MDSC (and of the whole ACTN framework) is | |||
detaching the network and service control from underlying technology | detaching the network and service control from underlying technology | |||
to help the customer express the network as desired by business | to help the customer express the network as desired by business | |||
needs. The MDSC envelopes the instantiation of the right technology | needs. The MDSC envelopes the instantiation of the right technology | |||
and network control to meet business criteria. In essence it | and network control to meet business criteria. In essence it | |||
controls and manages the primitives to achieve functionalities as | controls and manages the primitives to achieve functionalities as | |||
desired by the CNC. | desired by the CNC. | |||
In order to allow for multi-domain coordination a 1:N relationship | In order to allow for multi-domain coordination a 1:N relationship | |||
must be allowed between MDSCs and between MDSCs and PNCs (i.e. 1 | must be allowed between MDSCs and PNCs. | |||
parent MDSC and N child MDSC or 1 MDSC and N PNCs). | ||||
In addition to that, it could also be possible to have an M:1 | In addition to that, it could also be possible to have an M:1 | |||
relationship between MDSCs and PNC to allow for network resource | relationship between MDSCs and PNC to allow for network resource | |||
partitioning/sharing among different customers not necessarily | partitioning/sharing among different customers not necessarily | |||
connected to the same MDSC (e.g., different service providers). | connected to the same MDSC (e.g., different service providers) but | |||
all using the resources of a common network infrastructure provider. | ||||
4.3. Physical Network Controller | 3.3. Physical Network Controller | |||
The Physical Network Controller (PNC) oversees configuring the | The Physical Network Controller (PNC) oversees configuring the | |||
network elements, monitoring the topology (physical or virtual) of | network elements, monitoring the topology (physical or virtual) of | |||
the network, and passing information about the topology (either raw | the network, and collecting information about the topology (either | |||
or abstracted) to the MDSC. | raw or abstracted). | |||
The internal architecture of the PNC, its building blocks, and the | The PNC functions can be implemented as part of an SDN domain | |||
way it controls its domain are out of the scope of ACTN. Some | controller, a Network Management System (NMS), an Element Management | |||
examples can be found in the Application Based Network Operations | System (EMS), an active PCE-based controller [Centralized] or any | |||
(ABNO) architecture [RFC7491] and the ONF SDN architecture [ONF- | other means to dynamically control a set of nodes and that is | |||
ARCH] | implementing an NBI compliant with ACTN specification. | |||
The PNC, in addition to being in charge of controlling the physical | A PNC domain includes all the resources under the control of a | |||
network, is able to implement two of the four main ACTN main | single PNC. It can be composed of different routing domains and | |||
functions: multi domain coordination and virtualization/abstraction | administrative domains, and the resources may come from different | |||
function. | layers. The interconnection between PNC domains is illustrated in | |||
Note that from an implementation point of view it is possible to | Figure 3. | |||
integrate one or more MDSC functions and one or more PNC functions | ||||
within the same controller. | ||||
4.4. ACTN Interfaces | _______ _______ | |||
_( )_ _( )_ | ||||
_( )_ _( )_ | ||||
( ) Border ( ) | ||||
( PNC ------ Link ------ PNC ) | ||||
( Domain X |Border|========|Border| Domain Y ) | ||||
( | Node | | Node | ) | ||||
( ------ ------ ) | ||||
(_ _) (_ _) | ||||
(_ _) (_ _) | ||||
(_______) (_______) | ||||
The network has to provide open, programmable interfaces, through | Figure 3: PNC Domain Borders | |||
which customer applications can create, replace and modify virtual | ||||
network resources and services in an interactive, flexible and | ||||
dynamic fashion while having no impact on other customers. Direct | ||||
customer control of transport network elements and virtualized | ||||
services is not perceived as a viable proposition for transport | ||||
network providers due to security and policy concerns among other | ||||
reasons. In addition, the network control plane for transport | ||||
networks has been separated from the data plane and as such it is | ||||
not viable for the customer to directly interface with transport | ||||
network elements. | ||||
. CMI Interface: The CNC-MDSC Interface (CMI) is an interface | 3.4. ACTN Interfaces | |||
between a CNC and an MDSC. As depicted in Figure 3, the CMI is | ||||
a business boundary between customer and network provider. It | ||||
is used to request virtual network services required for the | ||||
applications. Note that all service related information such as | ||||
specific service properties, including virtual network service | ||||
type, topology, bandwidth, and constraint information are | ||||
conveyed over this interface. Most of the information over this | ||||
interface is technology agnostic; however, there are some | ||||
cases, e.g., access link configuration, where it should be | ||||
possible to explicitly request for a VN to be created at a | ||||
given layer in the network (e.g. ODU VN or MPLS VN). | ||||
. MPI Interface: The MDSC-PNC Interface (MPI) is an interface | Direct customer control of transport network elements and | |||
between an MDSC and a PNC. It communicates the creation | virtualized services is not a viable proposition for network | |||
requests for new connectivity or for bandwidth changes in the | providers due to security and policy concerns. In addition, some | |||
physical network. In multi-domain environments, the MDSC needs | networks may operate a control plane and as such it is not practical | |||
to establish multiple MPIs, one for each PNC, as there is one | for the customer to directly interface with network elements. | |||
PNC responsible for control of each domain. The MPI could have | Therefore, the network has to provide open, programmable interfaces, | |||
different degrees of abstraction and present an abstracted | through which customer applications can create, replace and modify | |||
topology hiding technology specific aspects of the network or | virtual network resources and services in an interactive, flexible | |||
convey technology specific parameters to allow for path | and dynamic fashion while having no impact on other customers. | |||
computation at the MDSC level. Please refer to CCAMP Transport | ||||
NBI work for the latter case [Transport NBI]. | ||||
. SBI Interface: This interface is out of the scope of ACTN. It | Three interfaces exist in the ACTN architecture as shown in Figure | |||
is shown in Figure 3 for reference reason only. | 2. | |||
Please note that for all the three interfaces, when technology | . CMI: The CNC-MDSC Interface (CMI) is an interface between a CNC | |||
specific information needs to be included, this info will be add-ons | and an MDSC. The CMI is a business boundary between customer | |||
on top of the general abstract topology. As far as general topology | and network provider. It is used to request a VNS for an | |||
abstraction standpoint, all interfaces are still recursive in | application. All service-related information is conveyed over | |||
nature. | this interface (such as the VNS type, topology, bandwidth, and | |||
service constraints). Most of the information over this | ||||
interface is technology agnostic (the customer is unaware of | ||||
the network technologies used to deliver the service), but | ||||
there are some cases (e.g., access link configuration) where it | ||||
is necessary to specify technology-specific details. | ||||
5. Advanced ACTN architectures | . MPI: The MDSC-PNC Interface (MPI) is an interface between an | |||
MDSC and a PNC. It communicates requests for new connectivity | ||||
or for bandwidth changes in the physical network. In multi- | ||||
domain environments, the MDSC needs to communicate with | ||||
multiple PNCs each responsible for control of a domain. The | ||||
MPI presents an abstracted topology to the MDSC hiding | ||||
technology specific aspects of the network and hiding topology | ||||
according to policy. | ||||
This section describes advanced forms of ACTN architectures as | . SBI: The Southbound Interface (SBI) is out of scope of ACTN. | |||
possible implementation choices. | Many different SBIs have been defined for different | |||
environments, technologies, standards organizations, and | ||||
vendors. It is shown in Figure 3 for reference reason only. | ||||
5.1. MDSC Hierarchy for scalability | 4. Advanced ACTN Architectures | |||
This section describes advanced configurations of the ACTN | ||||
architecture. | ||||
4.1. MDSC Hierarchy | ||||
A hierarchy of MDSCs can be foreseen for many reasons, among which | A hierarchy of MDSCs can be foreseen for many reasons, among which | |||
are scalability, administrative choices or putting together | are scalability, administrative choices, or putting together | |||
different layers and technologies in the network. In the case where | different layers and technologies in the network. In the case where | |||
there is a hierarchy of MDSCs, we introduce the higher-level MDSC | there is a hierarchy of MDSCs, we introduce the terms higher-level | |||
(MDSC-H) the lower-level MDSC (MDSC-L) and the interface between | MDSC (MDSC-H) and lower-level MDSC (MDSC-L). The interface between | |||
them is basically of a recursive nature of the MPI. An | them is a recursion of the MPI. An implementation of an MDSC-H | |||
implementation choice could foresee the usage of an MDSC-L for all | makes provisioning requests as normal using the MPI, but an MDSC-L | |||
the PNCs related to a given network layer or technology (e.g. | must be able to receive requests as normal at the CMI and also at | |||
IP/MPLS) a different MDSC-L for the PNCs related to another | the MPI. The hierarchy of MDSCs can be seen in Figure 4. | |||
layer/technology (e.g. OTN/WDM) and an MDSC-H to coordinate them. | ||||
Figure 4 shows this case. | Another implementation choice could foresee the usage of an MDSC-L | |||
for all the PNCs related to a given network layer or technology | ||||
(e.g. IP/MPLS) a different MDSC-L for the PNCs related to another | ||||
layer/technology (e.g. OTN/WDM) and an MDSC-H to coordinate them. | ||||
+--------+ | +--------+ | |||
| CNC | | | CNC | | |||
+--------+ | +--------+ | |||
| | | +-----+ | |||
| | | CMI | CNC | | |||
+----------+ | +----------+ +-----+ | |||
--------| MDSC-H |-------- | -------| MDSC-H |---- | | |||
| +----------+ | | | +----------+ | | CMI | |||
| | | MPI | MPI | | | |||
| | | | ||||
+---------+ +---------+ | +---------+ +---------+ | |||
| MDSC-L | | MDSC-L | | | MDSC-L | | MDSC-L | | |||
+---------+ +---------+ | +---------+ +---------+ | |||
MPI | | | | | ||||
| | | | | ||||
----- ----- ----- ----- | ||||
| PNC | | PNC | | PNC | | PNC | | ||||
----- ----- ----- ----- | ||||
Figure 4: MDSC Hierarchy | Figure 4: MDSC Hierarchy | |||
Note that both the MDSC-H and the MDSC-L in general cases implement | 4.2. Functional Split of MDSC Functions in Orchestrators | |||
all four functions of the MDSC discussed in Section 3.2. | ||||
5.2. Functional Split of MDSC Functions in Orchestrators | ||||
Another implementation choice could foresee the separation of MDSC | An implementation choice could separate the MDSC functions into two | |||
functions into two groups (i.e., one group for service-related | groups, one group for service-related functions and the other for | |||
functions and another group for network-related functions) which | network-related functions. This enables the implementation of a | |||
will result in a service orchestrator for providing service-related | service orchestrator that provides the service-related functions of | |||
functions of MDSC and other non-ACTN functions and a network | the MDSC and a network orchestrator that provides the network- | |||
orchestrator for providing network-related functions of MDSC and | related functions of the MDSC. This split is consistent with the | |||
other non-ACTN functions. Figure 5 shows this case and it also | YANG service model architecture described in [Service-YANG]. Figure | |||
depicts the mapping between ACTN architecture and the YANG service | 5 depicts this and shows how the ACTN interfaces may map to YANG | |||
model architecture described in [Service-YANG]. This mapping is | models. | |||
helpful for the readers who are not familiar with some TEAS specific | ||||
terminology used in this document. A number of key ACTN interfaces | ||||
exist for deployment and operation of ACTN-based networks. These are | ||||
highlighted in Figure 5 (ACTN Interfaces). | ||||
+------------------------------+ | +--------------------+ | |||
| Customer | | | Customer | | |||
| +-----+ +----------+ | | | +-----+ | | |||
| | CNC | |Other fns.| | | | | CNC | | | |||
| +-----+ +----------+ | | | +-----+ | | |||
+------------------------------+ | +--------------------+ | |||
| Customer Service Model | CMI | Customer Service Model | |||
| | | | |||
+-----------------------------------------------+ | +---------------------------------------+ | |||
********|********************** Service Orchestrator | | | Service | | |||
* MDSC | +------+ +------+ * +-----------+ | | ********|*********************** Orchestrator | | |||
* | | MDSC | | MDSC | * | Other fns.| | | * MDSC | +-----------------+ * | | |||
* | | F1 | | F2 | * | (non-ACTN)| | | * | | Service-related | * | | |||
* | +------+ +------+ * +-----------+ | | * | | Functions | * | | |||
* +---------------------*-------------------------+ | * | +-----------------+ * | | |||
* * | Service Delivery Model | * +----------------------*----------------+ | |||
* * | | * * | Service Delivery Model | |||
* +---------------------*-------------------------+ | * * | | |||
* | * Network Orchestrator | | * +----------------------*----------------+ | |||
* | +------+ +------+ * +-----------+ | | * | * Network | | |||
* | | MDSC | | MDSC | * | Other fns.| | | * | +-----------------+ * Orchestrator | | |||
* | | F3 | | F4 | * | (non-ACTN)| | | * | | Network-related | * | | |||
* | +------+ +------+ * +-----------+ | | * | | Functions | * | | |||
********|********************** | | * | +-----------------+ * | | |||
+-----------------------------------------------+ | ********|*********************** | | |||
| Network Configuration Model | +---------------------------------------+ | |||
MPI | Network Configuration Model | ||||
| | | | |||
+-------------------------------------------+ | +------------------------+ | |||
| Domain Controller | | | Domain | | |||
| +------+ +-----------+ | | | +------+ Controller | | |||
| | PNC | | Other fns.| | | | | PNC | | | |||
| +------+ | (non-ACTN)| | | | +------+ | | |||
| +-----------+ | | +------------------------+ | |||
+-------------------------------------------+ | SBI | Device Configuration Model | |||
| Device Configuration Model | ||||
| | | | |||
-------- | +--------+ | |||
| Device | | | Device | | |||
-------- | +--------+ | |||
Figure 5: ACTN Architecture in the context of YANG Service Models | ||||
In Figure 5, MDSC F1 and F2 correspond to customer | ||||
mapping/translation, and virtual service coordination, respectively, | ||||
which are the MDSC service-related functions as defined in Section | ||||
4. MDSC F3 and F4 correspond to multi domain coordination, | ||||
virtualization/abstraction, respectively, which are the MDSC | ||||
network-related functions as defined in Section 4. In some | ||||
implementation, MDSC F1 and F2 can be implemented as part of a | ||||
Service Orchestrator which may support other non-ACTN functions. | ||||
Likewise, the MDSC F3 and F4 can be implemented as part of a Network | ||||
Orchestrator which may support other non-ACTN MDSC functions. | ||||
Also note that the PNC is not same as domain controller. Domain | ||||
controller in general has a larger set of functions than that of | ||||
PNC. The main functions of PNC are explained in Section 3.3. | ||||
Likewise, Customer has a larger set of functions than that of the | ||||
CNC. | ||||
Customer service model describes a service as offer or delivered to | ||||
a customer by a network operator as defined in [Service-YANG]. The | ||||
CMI is a subset of a customer service model to support VNS. This | ||||
model encompasses other non-TE/non-ACTN models to control non-ACTN | ||||
services (e.g., L3SM). | ||||
Service delivery model is used by a network operator to define and | ||||
configure how a service is provided by the network as defined in | ||||
[Service-YANG]. This model is similar to the MPI model as the | ||||
network-related functions of the MDSC, i.e., F3 and F4, provide an | ||||
abstract topology view of the E2E network to the service-related | ||||
functions of the MDSC, i.e., F1 and F2, which translate customer's | ||||
request at the CMI into the network configuration at the MPI. | ||||
Network configuration model is used by a network orchestrator to | ||||
provide network-level configuration model to a controller as defined | ||||
in [Service-YANG]. The MPI is a subset of network configuration | ||||
model to support TE configuration. This model encompasses the MPI | ||||
model plus other non-TE/non-ACTN models to control non-ACTN | ||||
functions of the domain controller (e.g., L3VPN). | ||||
Device configuration model is used by a controller to configure | ||||
physical network elements. | ||||
6. Topology Abstraction Method | ||||
This section discusses topology abstraction factors, types and their | Figure 5: ACTN Architecture in the Context of the YANG Service | |||
context in ACTN architecture. Topology abstraction is useful in ACTN | Models | |||
architecture as a way to scale multi-domain network operation. Note | 5. Topology Abstraction Methods | |||
that this is the abstraction performed by the PNC to the MDSC or by | ||||
the MDSC-L to the MDSC-H, and that this is different from the VN | ||||
Type 2 topology (that is created and negotiated between the CNC and | ||||
the MDSC as part of the VNS). The purpose of topology abstraction | ||||
discussed in this section is for an efficient internal network | ||||
operation based on abstraction principle. | ||||
6.1. Abstraction Factors | Topology abstraction is described in [RFC7926]. This section | |||
discusses topology abstraction factors, types, and their context in | ||||
the ACTN architecture. | ||||
This section provides abstraction factors in the ACTN architecture. | Abstraction in ACTN is performed by the PNC when presenting | |||
available topology to the MDSC, or by an MDSC-L when presenting | ||||
topology to an MDSC-H. This function is different to the creation | ||||
of a VN (and particularly a Type 2 VN) which is not abstraction but | ||||
construction of virtual resources. | ||||
The MDSC oversees the specific aspects of the different domains and | 5.1. Abstraction Factors | |||
builds a single abstracted end-to-end network topology in order to | ||||
coordinate end-to-end path computation and path/service | ||||
provisioning. In order for the MDSC to perform its coordination | ||||
function, it depends on the coordination with the PNCs which are the | ||||
domain-level controllers especially as to what level of domain | ||||
network resource abstraction is agreed upon between the MDSC and the | ||||
PNCs. | ||||
As discussed in [RFC7926], abstraction is tied with policy of the | As discussed in [RFC7926], abstraction is tied with policy of the | |||
networks. For instance, per an operational policy, the PNC would not | networks. For instance, per an operational policy, the PNC would | |||
be allowed to provide any technology specific details (e.g., optical | not provide any technology specific details (e.g., optical | |||
parameters for WSON) in its update. In such case, the abstraction | parameters for WSON) in the abstract topology it provides to the | |||
level of the update will be in a generic nature. In order for the | MDSC. | |||
MDSC to get technology specific topology information from the PNC, a | ||||
request/reply mechanism may be employed. | ||||
In some cases, abstraction is also tied with the controller's | ||||
capability of abstraction as it involves some rules and algorithms | ||||
to be applied to the actual network resource information (which is | ||||
also known as network topology). | ||||
[TE-Topology] describes YANG models for TE-network abstraction. | ||||
[PCEP-LS] describes PCEP Link-state mechanism that also allows for | ||||
transport of abstract topology in the context of Hierarchical PCE. | ||||
There are factors that may impact the choice of abstraction. Here | ||||
are the most relevant: | ||||
- The nature of underlying domain networks: Abstraction depends on | There are many factors that may impact the choice of abstraction: | |||
the nature of the underlying domain networks. For instance, packet | ||||
networks may have different level of abstraction requirements from | ||||
that of optical networks. Within optical networks, WSON may have | ||||
different level of abstraction requirements than the OTN networks. | ||||
- The capability of the PNC: Abstraction depends on the capability | - Abstraction depends on the nature of the underlying domain | |||
of the PNCs. As abstraction requires hiding details of the | networks. For instance, packet networks may be abstracted with | |||
underlying resource network resource information, the PNC | fine granularity while abstraction of optical networks depends on | |||
capability to run some internal optimization algorithm impacts the | the switching units (such as wavelengths) and the end-to-end | |||
feasibility of abstraction. Some PNC may not have the ability to | continuity and cross-connect limitations within the network. | |||
abstract native topology while other PNCs may have such an ability | ||||
to abstract actual topology by using sophisticated algorithms. | ||||
- Scalability factor: Abstraction is a function of scalability. If | - Abstraction also depends on the capability of the PNCs. As | |||
the actual network resource information is of small size, then the | abstraction requires hiding details of the underlying network | |||
need for abstraction would be less than the case where the native | resources, the PNC's capability to run algorithms impacts the | |||
network resource information is of large size. In some cases, | feasibility of abstraction. Some PNC may not have the ability to | |||
abstraction may not be needed at all. | abstract native topology while other PNCs may have the ability to | |||
use sophisticated algorithms. | ||||
- The frequency of topology updates: The proper abstraction level | - Abstraction is a tool that can improve scalability. Where the | |||
may depend on the frequency of topology updates and vice versa. | native network resource information is of large size there is a | |||
specific scaling benefit to abstraction. | ||||
- The capability/nature of the MDSC: The nature of the MDSC impacts | - The proper abstraction level may depend on the frequency of | |||
the degree/level of abstraction. If the MDSC is not capable of | topology updates and vice versa. | |||
handling optical parameters such as those specific to OTN/WSON, | ||||
then white topology abstraction may not work well. | ||||
- The confidentiality: In some cases where the PNC would like to | - The nature of the MDSC's support for technology-specific | |||
hide key internal topological data from the MDSC, the abstraction | parameters impacts the degree/level of abstraction. If the MDSC | |||
method should consider this aspect. | is not capable of handling such parameters then a higher level of | |||
abstraction is needed. | ||||
- The scope of abstraction: All of the aforementioned factors are | - In some cases, the PNC is required to hide key internal | |||
equally applicable to both the MPI (MDSC-PNC Interface) and the | topological data from the MDSC. Such confidentiality can be | |||
CMI (CNC-MDSC Interface). | achieved through abstraction. | |||
6.2. Abstraction Types | 5.2. Abstraction Types | |||
This section defines the following three types of topology | This section defines the following three types of topology | |||
abstraction: | abstraction: | |||
. Native/White Topology (Section 6.2.1) | . Native/White Topology (Section 5.2.1) | |||
. Black Topology (Section 6.2.2) | . Black Topology (Section 5.2.2) | |||
. Grey Topology (Section 6.2.3) | . Grey Topology (Section 5.2.3) | |||
6.2.1. Native/White Topology | 5.2.1. Native/White Topology | |||
This is a case where the PNC provides the actual network topology to | This is a case where the PNC provides the actual network topology to | |||
the MDSC without any hiding or filtering of information as shown in | the MDSC without any hiding or filtering of information. I.e., no | |||
Figure 6a. In this case, the MDSC has the full knowledge of the | abstraction is performed. In this case, the MDSC has the full | |||
underlying network topology and as such there is no need for the | knowledge of the underlying network topology and can operate on it | |||
MDSC to send a path computation request to the PNC. The computation | directly. | |||
burden will fall on the MDSC to find an optimal end-to-end path and | 5.2.2. Black Topology | |||
optimal per domain paths. | ||||
+--+ +--+ +--+ +--+ | ||||
+-+ +-----+ +-----+ +-----+ +-+ | ||||
++-+ ++-+ +-++ +-++ | ||||
| | | | | ||||
| | | | | ||||
| | | | | ||||
| | | | | ||||
++-+ ++-+ +-++ +-++ | ||||
+-+ +-----+ +-----+ +-----+ +-+ | ||||
+--+ +--+ +--+ +--+ | ||||
Figure 6a: The native/white topology | ||||
6.2.2. Black Topology | ||||
The entire domain network is abstracted as a single virtual node | ||||
(see the definition of virtual node in [RFC7926]) with the | ||||
access/egress links without disclosing any node internal | ||||
connectivity information. | ||||
Figure 6b depicts a native topology with the corresponding black | ||||
topology with one virtual node and inter-domain links. In this case, | ||||
the MDSC has to make path computation requests to the PNCs before it | ||||
can determine an end-to-end path. If there are a large number of | ||||
inter-connected domains, this abstraction method may impose a heavy | ||||
coordination load at the MDSC level in order to find an optimal end- | ||||
to-end path. | ||||
The black topology would not give the MDSC any critical network | ||||
resource information other than the border nodes/links information | ||||
and as such it is likely to have a need for complementary | ||||
communications between the MDSC and the PNCs (e.g., Path computation | ||||
Request/Reply). | ||||
+--+ +--+ +--+ +--+ | ||||
+-+ +-----+ +-----+ +-----+ +-+ | ||||
++-+ ++-+ +-++ +-++ | ||||
| | | | | ||||
| | | | | ||||
| | | | | ||||
| | | | | ||||
++-+ ++-+ +-++ +-++ | ||||
+-+ +-----+ +-----+ +-----+ +-+ | ||||
+--+ +--+ +--+ +--+ | ||||
+--------+ | ||||
+--+ +--+ | ||||
| | | ||||
| | | ||||
| | | ||||
| | | ||||
| | | ||||
| | | ||||
+--+ +--+ | ||||
+--------+ | ||||
Figure 6b: The native topology and the corresponding black topology | ||||
with one virtual node and inter-domain links | ||||
6.2.3. Grey Topology | ||||
This abstraction level, referred to a grey topology, represents a | A black topology replaces a full network with a minimal | |||
compromise between black and white topology from a granularity point | representation of the edge-to-edge topology without disclosing any | |||
of view. As shown in Figures 7a and 7b, we may further differentiate | node internal connectivity information. The entire domain network | |||
from a perspective of how to abstract internal TE resources between | may be abstracted as a single abstract node with the network's | |||
the pairs of border nodes: | access/egress links appearing as the ports to the abstract node and | |||
. Grey topology type A: border nodes with a TE links between them | the implication that any port can be 'cross-connected' to any other. | |||
in a full mesh fashion (See Figure 7a). | Figure 6 depicts a native topology with the corresponding black | |||
topology with one virtual node and inter-domain links. In this | ||||
case, the MDSC has to make a provisioning request to the PNCs to | ||||
establish the port-to-port connection. If there is a large number | ||||
of inter-connected domains, this abstraction method may impose a | ||||
heavy coordination load at the MDSC level in order to find an | ||||
optimal end-to-end path since the abstraction hides so much | ||||
information that it is not possible to determine whether an end-to- | ||||
end path is feasible without asking each PNC to set up each path | ||||
fragment. For this reason, the MPI might need to be enhanced to | ||||
allow the PNCs to be queried for the practicality and | ||||
characteristics of paths across the abstract node. | ||||
..................................... | ||||
: PNC Domain : | ||||
: +--+ +--+ +--+ +--+ : | ||||
------+ +-----+ +-----+ +-----+ +------ | ||||
: ++-+ ++-+ +-++ +-++ : | ||||
: | | | | : | ||||
: | | | | : | ||||
: | | | | : | ||||
: | | | | : | ||||
: ++-+ ++-+ +-++ +-++ : | ||||
------+ +-----+ +-----+ +-----+ +------ | ||||
: +--+ +--+ +--+ +--+ : | ||||
:.................................... | ||||
+--+ +--+ +--+ +--+ | +----------+ | |||
+-+ +-----+ +-----+ +-----+ +-+ | ---+ +--- | |||
++-+ ++-+ +-++ +-++ | | Abstract | | |||
| | | | | | Node | | |||
| | | | | ---+ +--- | |||
| | | | | +----------+ | |||
| | | | | ||||
++-+ ++-+ +-++ +-++ | ||||
+-+ +-----+ +-----+ +-----+ +-+ | ||||
+--+ +--+ +--+ +--+ | ||||
+--+ +--+ | Figure 6: Native Topology with Corresponding Black Topology Expressed | |||
+-+ +----+ +-+ | as an Abstract Node | |||
++-+ +-++ | ||||
| \ / | | ||||
| \/ | | ||||
| /\ | | ||||
| / \ | | ||||
++-+ +-++ | ||||
+-+ +----+ +-+ | ||||
+--+ +--+ | ||||
Figure 7a: The native topology and the corresponding grey topology | 5.2.3. Grey Topology | |||
type A with TE links between border nodes | ||||
For each pair of ingress and egress nodes (i.e., border nodes | A grey topology represents a compromise between black and white | |||
to/from the domain), TE link metric is provided with TE attributes | topologies from a granularity point of view. In this case the PNC | |||
such as max bandwidth available, link delay, etc. This abstraction | exposes an abstract topology that comprises nodes and links. The | |||
depends on the underlying TE networks. | nodes and links may be physical of abstract while the abstract | |||
Note that this grey topology can also be represented as a single | topology represents the potential of connectivity across the PNC | |||
abstract node with the connectivity matrix defined in [TE-Topology], | domain. | |||
abstracting the internal connectivity information. The only thing | Two modes of grey topology are identified: | |||
might be different is some additional information about the end | . In a type A grey topology type border nodes are connected by a | |||
points of the links of the border nodes (i.e., links outward | full mesh of TE links (see Figure 7). | |||
customer-facing) as they cannot be included in the connectivity | . In a type B grey topology border nodes are connected over a | |||
matrix's termination points. | more detailed network comprising internal abstract nodes and | |||
abstracted links. This mode of abstraction supplies the MDSC | ||||
with more information about the internals of the PNC domain and | ||||
allows it to make more informed choices about how to route | ||||
connectivity over the underlying network. | ||||
. Grey topology type B: border nodes with some internal | ..................................... | |||
abstracted nodes and abstracted links (See Figure 7b) | : PNC Domain : | |||
+--+ +--+ +--+ | : +--+ +--+ +--+ +--+ : | |||
+-+ +-----+ +-----+ +-+ | ------+ +-----+ +-----+ +-----+ +------ | |||
++-+ ++-+ +-++ | : ++-+ ++-+ +-++ +-++ : | |||
| | | : | | | | : | |||
| | | : | | | | : | |||
| | | : | | | | : | |||
| | | : | | | | : | |||
++-+ ++-+ +-++ | : ++-+ ++-+ +-++ +-++ : | |||
+-+ +-----+ +-----+ +-+ | ------+ +-----+ +-----+ +-----+ +------ | |||
+--+ +--+ +--+ | : +--+ +--+ +--+ +--+ : | |||
:.................................... | ||||
Figure 7b: The grey topology type B with abstract nodes/links | .................... | |||
between border nodes | : Abstract Network : | |||
: : | ||||
: +--+ +--+ : | ||||
-------+ +----+ +------- | ||||
: ++-+ +-++ : | ||||
: | \ / | : | ||||
: | \/ | : | ||||
: | /\ | : | ||||
: | / \ | : | ||||
: ++-+ +-++ : | ||||
-------+ +----+ +------- | ||||
: +--+ +--+ : | ||||
:..................: | ||||
The grey abstraction type B would allow the MDSC to have more | Figure 7: Native Topology with Corresponding Grey Topology | |||
information about the internals of the domain networks by the PNCs | ||||
so that the MDSC can flexibly determine optimal paths. The MDSC may | ||||
configure some of the internal virtual nodes (e.g., cross-connect) | ||||
to redirect its traffic as it sees changes from the domain networks. | ||||
6.3. Building Methods of Grey Topology | 5.3. Methods of Building Grey Topologies | |||
This section discusses two different methods of building a grey | This section discusses two different methods of building a grey | |||
topology: | topology: | |||
. Automatic generation of abstract topology by configuration | . Automatic generation of abstract topology by configuration | |||
(Section 6.3.1) | (Section 5.3.1) | |||
. On-demand generation of supplementary topology via path | . On-demand generation of supplementary topology via path | |||
computation request/reply (Section 6.3.2) | computation request/reply (Section 5.3.2) | |||
6.3.1. Automatic generation of abstract topology by configuration | 5.3.1. Automatic Generation of Abstract Topology by Configuration | |||
The "Automatic generation" method is based on the | Automatic generation is based on the abstraction/summarization of | |||
abstraction/summarization of the whole domain by the PNC and its | the whole domain by the PNC and its advertisement on the MPI. The | |||
advertisement on MPI interface once the abstraction level is | level of abstraction can be decided based on PNC configuration | |||
configured. The level of abstraction advertisement can be decided | parameters (e.g., "provide the potential connectivity between any PE | |||
based on some PNC configuration parameters (e.g. provide the | and any ASBR in an MPLS-TE network"). | |||
potential connectivity between any PE and any ASBR in an MPLS-TE | ||||
network. | ||||
Note that the configuration parameters for this potential topology | Note that the configuration parameters for this abstract topology | |||
can include available B/W, latency, or any combination of defined | can include available bandwidth, latency, or any combination of | |||
parameters. How to generate such tunnel information is beyond the | defined parameters. How to generate such information is beyond the | |||
scope of this document. | scope of this document. | |||
Such potential topology needs to be periodically or | This abstract topology may need to be periodically or incrementally | |||
incrementally/asynchronously updated every time that a failure, a | updated when there is a change in the underlying network or the use | |||
recovery or the setup of new VNs causes a change in the | of the network resources that make connectivity more or less | |||
characteristics of the advertised grey topology (e.g. in our | available. | |||
previous case if due to changes in the network is it now possible to | ||||
provide connectivity between a given PE and a given ASBR with a | ||||
higher delay in the update). | ||||
6.3.2. On-demand generation of supplementary topology via path compute | 5.3.2. On-demand Generation of Supplementary Topology via Path Compute | |||
request/reply | Request/Reply | |||
The "on-demand generation" of supplementary topology is to be | While abstract topology is generated and updated automatically by | |||
distinguished from automatic generation of abstract topology. While | configuration as explained in Section 5.3.1, additional | |||
abstract topology is generated and updated automatically by | supplementary topology may be obtained by the MDSC via a path | |||
configuration as explained in Section 6.3.1, additional | compute request/reply mechanism. | |||
supplementary topology may be obtained by the MDSC via path compute | ||||
request/reply mechanism. Starting with a black topology | ||||
advertisement from the PNCs, the MDSC may need additional | ||||
information beyond the level of black topology from the PNCs. | ||||
It is assumed that the black topology advertisement from PNCs would | The abstract topology advertisements from PNCs give the MDSC the | |||
give the MDSC each domain's the border node/link information. Under | border node/link information for each domain. Under this scenario, | |||
this scenario, when the MDSC needs to allocate a new VN, the MDSC | when the MDSC needs to create a new VN, the MDSC can issue path | |||
can issue a number of Path Computation requests as described in | computation requests to PNCs with constraints matching the VN | |||
[ACTN-YANG] to different PNCs with constraints matching the VN | request as described in [ACTN-YANG]. An example is provided in | |||
request. An example is provided in Figure 4, where the MDSC is | Figure 8, where the MDSC is creating a P2P VN between AP1 and AP2. | |||
requesting to setup a P2P VN between AP1 and AP2. The MDSC can use | The MDSC could use two different inter-domain links to get from | |||
two different inter-domain links to get from Domain X to Domain Y, | Domain X to Domain Y, but in order to choose the best end-to-end | |||
namely the one between ASBRX.1 and ASBRY.1 and the one between | path it needs to know what domain X and Y can offer in terms of | |||
ASBRX.2 and ASBRY.2, but in order to choose the best end to end path | connectivity and constraints between the PE nodes and the border | |||
it needs to know what domain X and Y can offer in term of | ||||
connectivity and constraints between the PE nodes and the ASBR | ||||
nodes. | nodes. | |||
------- ------- | ------- -------- | |||
( ) ( ) | ( ) ( ) | |||
- ASBRX.1------- ASBRY.1 - | - BrdrX.1------- BrdrY.1 - | |||
(+---+ ) ( +---+) | (+---+ ) ( +---+) | |||
-+---( |PE1| Dom.X ) ( Dom.Y |PE2| )---+- | -+---( |PE1| Dom.X ) ( Dom.Y |PE2| )---+- | |||
| (+---+ ) ( +---+) | | | (+---+ ) ( +---+) | | |||
AP1 - ASBRX.2------- ASBRY.2 - AP2 | AP1 - BrdrX.2------- BrdrY.2 - AP2 | |||
( ) ( ) | ( ) ( ) | |||
------- ------- | ------- -------- | |||
Figure 4: A multi-domain networks example | ||||
A path computation request will be issued to PNC.X asking for | ||||
potential connectivity between PE1 and ASBRX.1 and between PE1 and | ||||
ASBRX.2 with related objective functions and TE metric constraints. | ||||
A similar request will be issued to PNC.Y and the results merged | ||||
together at the MDSC to be able to compute the optimal end-to-end | ||||
path including the inter domain links. | ||||
The info related to the potential connectivity may be cached by the | ||||
MDSC for subsequent path computation processes or discarded, but in | ||||
this case the PNCs are not requested to keep the grey topology | ||||
updated. | ||||
6.4. Abstraction Configuration Consideration | ||||
This section provides a set of abstraction configuration | ||||
considerations. | ||||
It is expected that the abstraction level be configured between the | ||||
CNC and the MDSC (i.e., the CMI) depending on the capability of the | ||||
CNC. This negotiated level of abstraction on the CMI may also impact | ||||
the way the MDSC and the PNCs configure and encode the abstracted | ||||
topology. For example, if the CNC is capable of sophisticated | ||||
technology specific operation, then this would impact the level of | ||||
abstraction at the MDSC with the PNCs. On the other hand, if the CNC | ||||
asks for a generic topology abstraction, then the level of | ||||
abstraction at the MDSC with the PNCs can be less technology | ||||
specific than the former case. | ||||
The subsequent sections provide a list of possible abstraction | ||||
levels for various technology domain networks. | ||||
6.4.1. Packet Networks | ||||
- For grey abstraction, the type of abstraction and its parameters | ||||
can be defined and configured. | ||||
o Abstraction Level 1: TE-tunnel abstraction for all (S-D) | ||||
border pairs with: | ||||
. Maximum B/W available per Priority Level | ||||
. Minimum Latency | ||||
6.4.2. OTN Networks | ||||
For OTN networks, max bandwidth available may be per ODU 0/1/2/3 | ||||
switching level or aggregated across all ODU switching levels (i.e., | ||||
ODUj/k). Clearly, there is a trade-off between these two abstraction | ||||
methods. Some OTN switches can switch any level of ODUs and in such | ||||
case there is no need for ODU level abstraction. | ||||
- For grey abstraction, the type of abstraction and its parameters | ||||
can be defined and configured. | ||||
o Abstraction Level 1: Per ODU Switching level (i.e., ODU type | ||||
and number) TE-tunnel abstraction for all (S-D) border pairs | ||||
with: | ||||
. Maximum B/W available per Priority Level | ||||
. Minimum Latency | ||||
o Abstraction Level 2: Aggregated TE-tunnel abstraction for all | ||||
(S-D) border pairs with: | ||||
. Maximum B/W available per Priority Level | ||||
. Minimum Latency | ||||
6.4.3. WSON Networks | ||||
For WSON networks, max bandwidth available may be per | ||||
lambda/frequency level (OCh) or aggregated across all | ||||
lambda/frequency level. Per OCh level abstraction gives more | ||||
detailed data to the MDSC at the expense of more information | ||||
processing. Either OCh-level or aggregated level abstraction should | ||||
factor in the RWA constraint (i.e., wavelength continuity) at the | ||||
PNC level. This means the PNC should have this capability and | ||||
advertise it as such. | ||||
For grey abstraction, the type of abstraction and its parameters can | Figure 8: A Multi-Domain Example | |||
be defined and configured as follows: | The MDSC issues a path computation request to PNC.X asking for | |||
potential connectivity between PE1 and border node BrdrX.1 and | ||||
between PE1 and BrdrX.2 with related objective functions and TE | ||||
metric constraints. A similar request for connectivity from the | ||||
border nodes in Domain Y to PE2 will be issued to PNC.Y. The MDSC | ||||
merges the results to compute the optimal end-to-end path including | ||||
the inter domain links. The MDSC can use the result of this | ||||
computation to request the PNCs to provision the underlying | ||||
networks, and the MDSC can then use the end-to-end path as a virtual | ||||
link in the VN it delivers to the customer. | ||||
o Abstraction Level 1: Per Lambda/Frequency level TE-tunnel | 5.4. Hierarchical Topology Abstraction Example | |||
abstraction for all (S-D) border pairs with: | ||||
. Maximum B/W available per Priority Level | ||||
. Minimum Latency | ||||
o Abstraction Level 2: Aggregated TE-tunnel abstraction for all | This section illustrates how topology abstraction operates in | |||
(S-D) border pairs with: | different levels of a hierarchy of MDSCs as shown in Figure 9. | |||
. Maximum B/W available per Priority Level | ||||
6.5. Topology Abstraction Granularity Level example | +-----+ | |||
| CNC | CNC wants to create a VN | ||||
+-----+ between CE A and CE B | ||||
| | ||||
| | ||||
+-----------------------+ | ||||
| MDSC-H | | ||||
+-----------------------+ | ||||
/ \ | ||||
/ \ | ||||
+---------+ +---------+ | ||||
| MDSC-L1 | | MDSC-L2 | | ||||
+---------+ +---------+ | ||||
/ \ / \ | ||||
/ \ / \ | ||||
+----+ +----+ +----+ +----+ | ||||
CE A o----|PNC1| |PNC2| |PNC3| |PNC4|----o CE B | ||||
+----+ +----+ +----+ +----+ | ||||
This section illustrates how topology abstraction operates in | Virtual Network Delivered to CNC | |||
different level of granularity over a hierarchy of MDSCs which is | ||||
shown in Figure 8 below. | ||||
+-----+ | CE A o==============o CE B | |||
| CNC | CNC wants to create a VN | ||||
+-----+ between CE A and CE B | ||||
| | ||||
| | ||||
+-----------------------+ | ||||
| MDSC-H | | ||||
+-----------------------+ | ||||
/ \ | ||||
/ \ | ||||
+--------+ +--------+ | ||||
| MDSC-L1| | MDSC-L2| | ||||
+--------+ +--------+ | ||||
/ \ / \ | ||||
/ \ / \ | ||||
+-----+ +-----+ +-----+ +-----+ | ||||
CE A o----|PNC 1| |PNC 2| |PNC 3| |PNC 4|----o CE B | ||||
+-----+ +-----+ +-----+ +-----+ | ||||
Topology operated by MDSC-H | Topology operated on by MDSC-H | |||
--o=o=o=o-- | CE A o----o==o==o===o----o CE B | |||
Topology operated by MDSC-L1 Topology operated by MDSC-L2 | Topology operated on by MDSC-L1 Topology operated on by MDSC-L2 | |||
_ _ _ _ | _ _ _ _ | |||
( ) ( ) ( ) ( ) | ( ) ( ) ( ) ( ) | |||
( ) ( ) ( ) ( ) | ( ) ( ) ( ) ( ) | |||
--(o---o)==(o---o)== ==(o---o)==(o---o)-- | CE A o--(o---o)==(o---o)==Dom.3 Dom.2==(o---o)==(o---o)--o CE B | |||
( ) ( ) ( ) ( ) | ( ) ( ) ( ) ( ) | |||
(_) (_) (_) (_) | (_) (_) (_) (_) | |||
Actual Topology | Actual Topology | |||
___ ___ ___ ___ | ___ ___ ___ ___ | |||
( ) ( ) ( ) ( ) | ( ) ( ) ( ) ( ) | |||
( o ) ( o ) ( o--o) ( o ) | ( o ) ( o ) ( o--o) ( o ) | |||
( / \ ) ( |\ ) ( | | ) ( / \ ) | ( / \ ) ( |\ ) ( | | ) ( / \ ) | |||
----(o-o---o-o)==(o-o-o-o-o)==(o--o--o-o)==(o-o-o-o-o)---- | CE A o---(o-o---o-o)==(o-o-o-o-o)==(o--o--o-o)==(o-o-o-o-o)---o CE B | |||
( \ / ) ( | |/ ) ( | | ) ( \ / ) | ( \ / ) ( | |/ ) ( | | ) ( \ / ) | |||
( o ) (o-o ) ( o--o) ( o ) | ( o ) (o-o ) ( o--o) ( o ) | |||
(___) (___) (___) (___) | (___) (___) (___) (___) | |||
Domain 1 Domain 2 Domain 3 Domain 4 | Domain 1 Domain 2 Domain 3 Domain 4 | |||
Where o is a node and -- is a link and === a border link | Where | |||
o is a node | ||||
--- is a link | ||||
=== border link | ||||
Figure 8: Illustration of topology abstraction granularity levels | Figure 9: Illustration of Hierarchical Topology Abstraction | |||
In the example depicted in Figure 8, there are four domains under | ||||
control of the respective PNCs, namely, PNC 1, PNC 2, PNC3 and PNC4. | ||||
Assume that MDSC L-1 is controlling PNC 1 and PNC 2 while MDSC L-2 | ||||
is controlling PNC 3 and PNC 4. Let us assume that each of the PNCs | ||||
provides a grey topology abstraction in which to present only border | ||||
nodes and links within and outside the domain. The abstract topology | ||||
MDSC-L1 would operate is basically a combination of the two | ||||
topologies the PNCs (PNC 1 and PNC 2) provide. Likewise, the | ||||
abstract topology MDSC-L2 would operate is shown in Figure 8. Both | ||||
MDSC-L1 and MDSC-L2 provide a black topology abstraction in which | ||||
each PNC domain is presented as one virtual node to its top level | ||||
MDSC-H. Then the MDSC-H combines these two topologies updated by | ||||
MDSC-L1 and MDSC-L2 to create the abstraction topology to which it | ||||
operates. MDSC-H sees the whole four domain networks as four virtual | ||||
nodes connected via virtual links. The top level MDSC may operate on | ||||
a higher level of abstraction (i.e., less granular level) than the | ||||
lower level MSDCs. | ||||
7. Access Points and Virtual Network Access Points | In the example depicted in Figure 9, there are four domains under | |||
control of PNCs PNC1, PNC2, PNC3, and PNC4. MDSC-L1 controls PNC1 | ||||
and PNC2 while MDSC-L2 controls PNC3 and PNC4. Each of the PNCs | ||||
provides a grey topology abstraction that presents only border nodes | ||||
and links across and outside the domain. The abstract topology | ||||
MDSC-L1 that operates is a combination of the two topologies from | ||||
PNC1 and PNC2. Likewise, the abstract topology that MDSC-L2 | ||||
operates is shown in Figure 9. Both MDSC-L1 and MDSC-L2 provide a | ||||
black topology abstraction to MSDC-H in which each PNC domain is | ||||
presented as a single virtual node. MDSC-H combines these two | ||||
topologies to create the abstraction topology on which it operates. | ||||
MDSC-H sees the whole four domain networks as four virtual nodes | ||||
connected via virtual links. | ||||
In order not to share unwanted topological information between the | 6. Access Points and Virtual Network Access Points | |||
customer domain and provider domain, a new entity is defined which | ||||
is referred to as the Access Point (AP). See the definition of AP in | ||||
Section 1.1. | ||||
A customer node will use APs as the end points for the request of | In order to map identification of connections between the customer's | |||
VNS as shown in Figure 9. | sites and the TE networks and to scope the connectivity requested in | |||
the VNS, the CNC and the MDSC refer to the connections using the | ||||
Access Point (AP) construct as shown in Figure 10. | ||||
------------- | ------------- | |||
( ) | ( ) | |||
- - | - - | |||
+---+ X ( ) Z +---+ | +---+ X ( ) Z +---+ | |||
|CE1|---+----( )---+---|CE2| | |CE1|---+----( )---+---|CE2| | |||
+---+ | ( ) | +---+ | +---+ | ( ) | +---+ | |||
AP1 - - AP2 | AP1 - - AP2 | |||
( ) | ( ) | |||
------------- | ------------- | |||
Figure 9: APs definition customer view | Figure 10: Customer View of APs | |||
Let's take as an example a scenario shown in Figure 7. CE1 is | Let's take as an example a scenario shown in Figure 10. CE1 is | |||
connected to the network via a 10Gb link and CE2 via a 40Gb link. | connected to the network via a 10Gb link and CE2 via a 40Gb link. | |||
Before the creation of any VN between AP1 and AP2 the customer view | Before the creation of any VN between AP1 and AP2 the customer view | |||
can be summarized as shown in Table 1: | can be summarized as shown in Table 1. | |||
+----------+------------------------+ | +----------+------------------------+ | |||
|End Point | Access Link Bandwidth | | |End Point | Access Link Bandwidth | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
|AP id| CE,port | MaxResBw | AvailableBw | | |AP id| CE,port | MaxResBw | AvailableBw | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
| AP1 |CE1,portX | 10Gb | 10Gb | | | AP1 |CE1,portX | 10Gb | 10Gb | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
| AP2 |CE2,portZ | 40Gb | 40Gb | | | AP2 |CE2,portZ | 40Gb | 40Gb | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
Table 1: AP - customer view | Table 1: AP - Customer View | |||
On the other hand, what the provider sees is shown in Figure 10. | On the other hand, what the provider sees is shown in Figure 11. | |||
------- ------- | ------- ------- | |||
( ) ( ) | ( ) ( ) | |||
- - - - | - - - - | |||
W (+---+ ) ( +---+) Y | W (+---+ ) ( +---+) Y | |||
-+---( |PE1| Dom.X )----( Dom.Y |PE2| )---+- | -+---( |PE1| Dom.X )----( Dom.Y |PE2| )---+- | |||
| (+---+ ) ( +---+) | | | (+---+ ) ( +---+) | | |||
AP1 - - - - AP2 | AP1 - - - - AP2 | |||
( ) ( ) | ( ) ( ) | |||
------- ------- | ------- ------- | |||
Figure 10: Provider view of the AP | Figure 11: Provider view of the AP | |||
Which results in a summarization as shown in Table 2. | Which results in a summarization as shown in Table 2. | |||
+----------+------------------------+ | +----------+------------------------+ | |||
|End Point | Access Link Bandwidth | | |End Point | Access Link Bandwidth | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
|AP id| PE,port | MaxResBw | AvailableBw | | |AP id| PE,port | MaxResBw | AvailableBw | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
| AP1 |PE1,portW | 10Gb | 10Gb | | | AP1 |PE1,portW | 10Gb | 10Gb | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
| AP2 |PE2,portY | 40Gb | 40Gb | | | AP2 |PE2,portY | 40Gb | 40Gb | | |||
+-----+----------+----------+-------------+ | +-----+----------+----------+-------------+ | |||
Table 2: AP - provider view | Table 2: AP - Provider View | |||
A Virtual Network Access Point (VNAP) needs to be defined as binding | A Virtual Network Access Point (VNAP) needs to be defined as binding | |||
between the AP that is linked to a VN and that is used to allow for | between the AP that is linked to a VN and that is used to allow for | |||
different VNs to start from the same AP. It also allows for traffic | different VNs to start from the same AP. It also allows for traffic | |||
engineering on the access and/or inter-domain links (e.g., keeping | engineering on the access and/or inter-domain links (e.g., keeping | |||
track of bandwidth allocation). A different VNAP is created on an AP | track of bandwidth allocation). A different VNAP is created on an | |||
for each VN. | AP for each VN. | |||
In the simple scenario depicted above we suppose we want to create | In this simple scenario we suppose we want to create two virtual | |||
two virtual networks. The first with VN identifier 9 between AP1 and | networks. The first with VN identifier 9 between AP1 and AP2 with | |||
AP2 with bandwidth of 1Gbps, while the second with VN id 5, again | bandwidth of 1Gbps, while the second with VN identifier 5, again | |||
between AP1 and AP2 and with bandwidth 2Gbps. | between AP1 and AP2 and with bandwidth 2Gbps. | |||
The provider view would evolve as shown in Table 3. | The provider view would evolve as shown in Table 3. | |||
+----------+------------------------+ | +----------+------------------------+ | |||
|End Point | Access Link/VNAP Bw | | |End Point | Access Link/VNAP Bw | | |||
+---------+----------+----------+-------------+ | +---------+----------+----------+-------------+ | |||
|AP/VNAPid| PE,port | MaxResBw | AvailableBw | | |AP/VNAPid| PE,port | MaxResBw | AvailableBw | | |||
+---------+----------+----------+-------------+ | +---------+----------+----------+-------------+ | |||
|AP1 |PE1,portW | 10Gbps | 7Gbps | | |AP1 |PE1,portW | 10Gbps | 7Gbps | | |||
| -VNAP1.9| | 1Gbps | N.A. | | | -VNAP1.9| | 1Gbps | N.A. | | |||
| -VNAP1.5| | 2Gbps | N.A | | | -VNAP1.5| | 2Gbps | N.A | | |||
+---------+----------+----------+-------------+ | +---------+----------+----------+-------------+ | |||
|AP2 |PE2,portY | 40Gbps | 37Gbps | | |AP2 |PE2,portY | 40Gbps | 37Gbps | | |||
| -VNAP2.9| | 1Gbps | N.A. | | | -VNAP2.9| | 1Gbps | N.A. | | |||
| -VNAP2.5| | 2Gbps | N.A | | | -VNAP2.5| | 2Gbps | N.A | | |||
+---------+----------+----------+-------------+ | +---------+----------+----------+-------------+ | |||
Table 3: AP and VNAP - Provider View after VNS Creation | ||||
Table 3: AP and VNAP - provider view after VNS creation | ||||
7.1. Dual homing scenario | 6.1. Dual-Homing Scenario | |||
Often there is a dual homing relationship between a CE and a pair of | Often there is a dual homing relationship between a CE and a pair of | |||
PEs. This case needs to be supported by the definition of VN, APs | PEs. This case needs to be supported by the definition of VN, APs | |||
and VNAPs. Suppose CE1 connected to two different PEs in the | and VNAPs. Suppose CE1 connected to two different PEs in the | |||
operator domain via AP1 and AP2 and that the customer needs 5Gbps of | operator domain via AP1 and AP2 and that the customer needs 5Gbps of | |||
bandwidth between CE1 and CE2. This is shown in Figure 11. | bandwidth between CE1 and CE2. This is shown in Figure 12. | |||
____________ | ____________ | |||
AP1 ( ) AP3 | AP1 ( ) AP3 | |||
-------(PE1) (PE3)------- | -------(PE1) (PE3)------- | |||
W / ( ) \X | W / ( ) \ X | |||
+---+/ ( ) \+---+ | +---+/ ( ) \+---+ | |||
|CE1| ( ) |CE2| | |CE1| ( ) |CE2| | |||
+---+\ ( ) /+---+ | +---+\ ( ) /+---+ | |||
Y \ ( ) /Z | Y \ ( ) / Z | |||
-------(PE2) (PE4)------- | -------(PE2) (PE4)------- | |||
AP2 (____________) | AP2 (____________) | |||
Figure 11: Dual homing scenario | Figure 12: Dual-Homing Scenario | |||
In this case, the customer will request for a VN between AP1, AP2 | In this case, the customer will request for a VN between AP1, AP2, | |||
and AP3 specifying a dual homing relationship between AP1 and AP2. | and AP3 specifying a dual homing relationship between AP1 and AP2. | |||
As a consequence no traffic will flow between AP1 and AP2. The dual | As a consequence no traffic will flow between AP1 and AP2. The dual | |||
homing relationship would then be mapped against the VNAPs (since | homing relationship would then be mapped against the VNAPs (since | |||
other independent VNs might have AP1 and AP2 as end points). | other independent VNs might have AP1 and AP2 as end points). | |||
The customer view would be shown in Table 4. | The customer view would be shown in Table 4. | |||
+----------+------------------------+ | +----------+------------------------+ | |||
|End Point | Access Link/VNAP Bw | | |End Point | Access Link/VNAP Bw | | |||
+---------+----------+----------+-------------+-----------+ | +---------+----------+----------+-------------+-----------+ | |||
|AP/VNAPid| CE,port | MaxResBw | AvailableBw |Dual Homing| | |AP/VNAPid| CE,port | MaxResBw | AvailableBw |Dual Homing| | |||
+---------+----------+----------+-------------+-----------+ | +---------+----------+----------+-------------+-----------+ | |||
|AP1 |CE1,portW | 10Gbps | 5Gbps | | | |AP1 |CE1,portW | 10Gbps | 5Gbps | | | |||
| -VNAP1.9| | 5Gbps | N.A. | VNAP2.9 | | | -VNAP1.9| | 5Gbps | N.A. | VNAP2.9 | | |||
+---------+----------+----------+-------------+-----------+ | +---------+----------+----------+-------------+-----------+ | |||
|AP2 |CE1,portY | 40Gbps | 35Gbps | | | |AP2 |CE1,portY | 40Gbps | 35Gbps | | | |||
| -VNAP2.9| | 5Gbps | N.A. | VNAP1.9 | | | -VNAP2.9| | 5Gbps | N.A. | VNAP1.9 | | |||
+---------+----------+----------+-------------+-----------+ | +---------+----------+----------+-------------+-----------+ | |||
|AP3 |CE2,portX | 40Gbps | 35Gbps | | | |AP3 |CE2,portX | 40Gbps | 35Gbps | | | |||
| -VNAP3.9| | 5Gbps | N.A. | NONE | | | -VNAP3.9| | 5Gbps | N.A. | NONE | | |||
+---------+----------+----------+-------------+-----------+ | +---------+----------+----------+-------------+-----------+ | |||
Table 4: Dual homing - customer view after VN creation | Table 4: Dual-Homing - Customer View after VN Creation | |||
8. Advanced ACTN Application: Multi-Destination Service | 7. Advanced ACTN Application: Multi-Destination Service | |||
A further advanced application of ACTN is in the case of Data Center | A further advanced application of ACTN is in the case of Data Center | |||
selection, where the customer requires the Data Center selection to | selection, where the customer requires the Data Center selection to | |||
be based on the network status; this is referred to as Multi- | be based on the network status; this is referred to as Multi- | |||
Destination in [ACTN-REQ]. In terms of ACTN, a CNC could request a | Destination in [ACTN-REQ]. In terms of ACTN, a CNC could request a | |||
connectivity service (virtual network) between a set of source Aps | connectivity service (virtual network) between a set of source Aps | |||
and destination APs and leave it up to the network (MDSC) to decide | and destination APs and leave it up to the network (MDSC) to decide | |||
which source and destination access points to be used to set up the | which source and destination access points to be used to set up the | |||
connectivity service (virtual network). The candidate list of source | connectivity service (virtual network). The candidate list of | |||
and destination APs is decided by a CNC (or an entity outside of | source and destination APs is decided by a CNC (or an entity outside | |||
ACTN) based on certain factors which are outside the scope of ACTN. | of ACTN) based on certain factors which are outside the scope of | |||
ACTN. | ||||
Based on the AP selection as determined and returned by the network | Based on the AP selection as determined and returned by the network | |||
(MDSC), the CNC (or an entity outside of ACTN) should further take | (MDSC), the CNC (or an entity outside of ACTN) should further take | |||
care of any subsequent actions such as orchestration or service | care of any subsequent actions such as orchestration or service | |||
setup requirements. These further actions are outside the scope of | setup requirements. These further actions are outside the scope of | |||
ACTN. | ACTN. | |||
Consider a case as shown in Figure 12, where three data centers are | Consider a case as shown in Figure 13, where three data centers are | |||
available, but the customer requires the data center selection to be | available, but the customer requires the data center selection to be | |||
based on the network status and the connectivity service setup | based on the network status and the connectivity service setup | |||
between the AP1 (CE1) and one of the destination APs (AP2 (DC-A), | between the AP1 (CE1) and one of the destination APs (AP2 (DC-A), | |||
AP3 (DC-B), and AP4 (DC-C)). The MDSC (in coordination with PNCs) | AP3 (DC-B), and AP4 (DC-C)). The MDSC (in coordination with PNCs) | |||
would select the best destination AP based on the constraints, | would select the best destination AP based on the constraints, | |||
optimization criteria, policies, etc., and setup the connectivity | optimization criteria, policies, etc., and setup the connectivity | |||
service (virtual network). | service (virtual network). | |||
------- ------- | ------- ------- | |||
( ) ( ) | ( ) ( ) | |||
- - - - | - - - - | |||
+---+ ( ) ( ) +----+ | +---+ ( ) ( ) +----+ | |||
|CE1|---+----( Domain X )----( Domain Y )---+---|DC-A| | |CE1|---+---( Domain X )----( Domain Y )---+---|DC-A| | |||
+---+ | ( ) ( ) | +----+ | +---+ | ( ) ( ) | +----+ | |||
AP1 - - - - AP2 | AP1 - - - - AP2 | |||
( ) ( ) | ( ) ( ) | |||
---+--- ---+--- | ---+--- ---+--- | |||
AP3 | AP4 | | | | | |||
+----+ +----+ | AP3-+ AP4-+ | |||
|DC-B| |DC-C| | | | | |||
+----+ +----+ | +----+ +----+ | |||
|DC-B| |DC-C| | ||||
+----+ +----+ | ||||
Figure 12: End point selection based on network status | Figure 13: End-Point Selection Based on Network Status | |||
8.1. Pre-Planned End Point Migration | 7.1. Pre-Planned End Point Migration | |||
Further in case of Data Center selection, customer could request for | Furthermore, in case of Data Center selection, customer could | |||
a backup DC to be selected, such that in case of failure, another DC | request for a backup DC to be selected, such that in case of | |||
site could provide hot stand-by protection. As shown in Figure 13 | failure, another DC site could provide hot stand-by protection. As | |||
DC-C is selected as a backup for DC-A. Thus, the VN should be setup | shown in Figure 14 DC-C is selected as a backup for DC-A. Thus, the | |||
by the MDSC to include primary connectivity between AP1 (CE1) and | VN should be setup by the MDSC to include primary connectivity | |||
AP2 (DC-A) as well as protection connectivity between AP1 (CE1) and | between AP1 (CE1) and AP2 (DC-A) as well as protection connectivity | |||
AP4 (DC-C). | between AP1 (CE1) and AP4 (DC-C). | |||
------- ------- | ------- ------- | |||
( ) ( ) | ( ) ( ) | |||
- - __ - - | - - __ - - | |||
+---+ ( ) ( ) +----+ | +---+ ( ) ( ) +----+ | |||
|CE1|---+----( Domain X )----( Domain Y )---+---|DC-A| | |CE1|---+----( Domain X )----( Domain Y )---+---|DC-A| | |||
+---+ | ( ) ( ) | +----+ | +---+ | ( ) ( ) | +----+ | |||
AP1 - - - - AP2 | | AP1 - - - - AP2 | | |||
( ) ( ) | | ( ) ( ) | | |||
---+--- ---+--- | | ---+--- ---+--- | | |||
AP3 | AP4 | HOT STANDBY | | | | | |||
AP3-+ AP4-+ HOT STANDBY | ||||
| | | | ||||
+----+ +----+ | | +----+ +----+ | | |||
|DC-D| |DC-C|<------------- | |DC-D| |DC-C|<------------- | |||
+----+ +----+ | +----+ +----+ | |||
Figure 13: Pre-planned end point migration | Figure 14: Pre-planned End-Point Migration | |||
8.2. On the Fly End Point Migration | 7.2. On the Fly End-Point Migration | |||
Compared to pre-planned end point migration, on the fly end point | Compared to pre-planned end point migration, on the fly end point | |||
selection is dynamic in that the migration is not pre-planned but | selection is dynamic in that the migration is not pre-planned but | |||
decided based on network condition. Under this scenario, the MDSC | decided based on network condition. Under this scenario, the MDSC | |||
would monitor the network (based on the VN SLA) and notify the CNC | would monitor the network (based on the VN SLA) and notify the CNC | |||
in case where some other destination AP would be a better choice | in case where some other destination AP would be a better choice | |||
based on the network parameters. The CNC should instruct the MDSC | based on the network parameters. The CNC should instruct the MDSC | |||
when it is suitable to update the VN with the new AP if it is | when it is suitable to update the VN with the new AP if it is | |||
required. | required. | |||
9. Advanced Topic | 8. Manageability Considerations | |||
This section describes how ACTN architecture supports some | ||||
deployment scenarios. See Appendix A for details on MDSC and PNC | ||||
functions integrated in Service/Network Orchestrator and Appendix B | ||||
for IP + Optical with L3VPN service. | ||||
10. Manageability Considerations | ||||
The objective of ACTN is to manage traffic engineered resources, and | The objective of ACTN is to manage traffic engineered resources, and | |||
provide a set of mechanism to allow clients to request virtual | provide a set of mechanisms to allow customers to request virtual | |||
connectivity across server network resources. ACTN will support | connectivity across server network resources. ACTN supports | |||
multiple clients each with its own view of and control of the server | multiple customers each with its own view of and control of a | |||
network, the network operator will need to partition (or "slice") | virtual network built on the server network, the network operator | |||
their network resources, and manage them resources accordingly. | will need to partition (or "slice") their network resources, and | |||
manage the resources accordingly. | ||||
The ACTN platform will, itself, need to support the request, | The ACTN platform will, itself, need to support the request, | |||
response, and reservations of client and network layer connectivity. | response, and reservations of client and network layer connectivity. | |||
It will also need to provide performance monitoring and control of | It will also need to provide performance monitoring and control of | |||
traffic engineered resources. The management requirements may be | traffic engineered resources. The management requirements may be | |||
categorized as follows: | categorized as follows: | |||
. Management of external ACTN protocols | . Management of external ACTN protocols | |||
. Management of internal ACTN protocols | . Management of internal ACTN interfaces/protocols | |||
. Management and monitoring of ACTN components | . Management and monitoring of ACTN components | |||
. Configuration of policy to be applied across the ACTN system | . Configuration of policy to be applied across the ACTN system | |||
10.1. Policy | 8.1. Policy | |||
It is expected that a policy will be an important aspect of ACTN | Policy is an important aspect of ACTN control and management. | |||
control and management. Typically, policies are used via the | Policies are used via the components and interfaces, during | |||
components and interfaces, during deployment of the service, to | deployment of the service, to ensure that the service is compliant | |||
ensure that the service is compliant with agreed policy factors | with agreed policy factors and variations (often described in SLAs), | |||
(often described in Service Level Agreements - SLAs), these include, | these include, but are not limited to: connectivity, bandwidth, | |||
but are not limited to: connectivity, bandwidth, geographical | geographical transit, technology selection, security, resilience, | |||
transit, technology selection, security, resilience, and economic | and economic cost. | |||
cost. | ||||
Depending on the deployment the ACTN deployment architecture, some | Depending on the deployment of the ACTN architecture, some policies | |||
policies may have local or global significance. That is, certain | may have local or global significance. That is, certain policies | |||
policies may be ACTN component specific in scope, while others may | may be ACTN component specific in scope, while others may have | |||
have broader scope and interact with multiple ACTN components. Two | broader scope and interact with multiple ACTN components. Two | |||
examples are provided below: | examples are provided below: | |||
. A local policy might limit the number, type, size, and | . A local policy might limit the number, type, size, and | |||
scheduling of virtual network services a customer may request | scheduling of virtual network services a customer may request | |||
via its CNC. This type of policy would be implemented locally on | via its CNC. This type of policy would be implemented locally | |||
the MDSC. | on the MDSC. | |||
. A global policy might constrain certain customer types (or | . A global policy might constrain certain customer types (or | |||
specific customer applications) to only use certain MDSCs, and | specific customer applications) to only use certain MDSCs, and | |||
be restricted to physical network types managed by the PNCs. A | be restricted to physical network types managed by the PNCs. A | |||
global policy agent would govern these types of policies. | global policy agent would govern these types of policies. | |||
This objective of this section is to discuss the applicability of | The objective of this section is to discuss the applicability of | |||
ACTN policy: requirements, components, interfaces, and examples. | ACTN policy: requirements, components, interfaces, and examples. | |||
This section provides an analysis and does not mandate a specific | This section provides an analysis and does not mandate a specific | |||
method for enforcing policy, or the type of policy agent that would | method for enforcing policy, or the type of policy agent that would | |||
be responsible for propagating policies across the ACTN components. | be responsible for propagating policies across the ACTN components. | |||
It does highlight examples of how policy may be applied in the | It does highlight examples of how policy may be applied in the | |||
context of ACTN, but it is expected further discussion in an | context of ACTN, but it is expected further discussion in an | |||
applicability or solution specific document, will be required. | applicability or solution specific document, will be required. | |||
10.2. Policy applied to the Customer Network Controller | 8.2. Policy Applied to the Customer Network Controller | |||
A virtual network service for a customer application will be | A virtual network service for a customer application will be | |||
requested from the CNC. It will reflect the application requirements | requested by the CNC. The request will reflect the application | |||
and specific service policy needs, including bandwidth, traffic type | requirements and specific service needs, including bandwidth, | |||
and survivability. Furthermore, application access and type of | traffic type and survivability. Furthermore, application access and | |||
virtual network service requested by the CNC, will be need adhere to | type of virtual network service requested by the CNC, will be need | |||
specific access control policies. | adhere to specific access control policies. | |||
10.3. Policy applied to the Multi Domain Service Coordinator | 8.3. Policy Applied to the Multi Domain Service Coordinator | |||
A key objective of the MDSC is to help the customer express the | A key objective of the MDSC is to support the customer's expression | |||
application connectivity request via its CNC as set of desired | of the application connectivity request via its CNC as set of | |||
business needs, therefore policy will play an important role. | desired business needs, therefore policy will play an important | |||
role. | ||||
Once authorized, the virtual network service will be instantiated | Once authorized, the virtual network service will be instantiated | |||
via the CNC-MDSC Interface (CMI), it will reflect the customer | via the CNC-MDSC Interface (CMI), it will reflect the customer | |||
application and connectivity requirements, and specific service | application and connectivity requirements, and specific service | |||
transport needs. The CNC and the MDSC components will have agreed | transport needs. The CNC and the MDSC components will have agreed | |||
connectivity end-points, use of these end-points should be defined | connectivity end-points, use of these end-points should be defined | |||
as a policy expression when setting up or augmenting virtual network | as a policy expression when setting up or augmenting virtual network | |||
services. Ensuring that permissible end-points are defined for CNCs | services. Ensuring that permissible end-points are defined for CNCs | |||
and applications will require the MDSC to maintain a registry of | and applications will require the MDSC to maintain a registry of | |||
permissible connection points for CNCs and application types. | permissible connection points for CNCs and application types. | |||
It may also be necessary for the MDSC to resolve policy conflicts, | ||||
or at least flag any issues to administrator of the MDSC itself. | ||||
Conflicts may occur when virtual network service optimization | Conflicts may occur when virtual network service optimization | |||
criterion are in competition. For example, to meet objectives for | criteria are in competition. For example, to meet objectives for | |||
service reachability a request may require an interconnection point | service reachability a request may require an interconnection point | |||
between multiple physical networks; however, this might break a | between multiple physical networks; however, this might break a | |||
confidentially policy requirement of specific type of end-to-end | confidentially policy requirement of specific type of end-to-end | |||
service. This type of situation may be resolved using hard and soft | service. Thus an MDSC may have to balance a number of the | |||
policy constraints. | constraints on a service request and between different requested | |||
services. It may also have to balance requested services with | ||||
operational norms for the underlying physical networks. This | ||||
balancing may be resolved using configured policy and using hard and | ||||
soft policy constraints. | ||||
10.4. Policy applied to the Physical Network Controller | 8.4. Policy Applied to the Physical Network Controller | |||
The PNC is responsible for configuring the network elements, | The PNC is responsible for configuring the network elements, | |||
monitoring physical network resources, and exposing connectivity | monitoring physical network resources, and exposing connectivity | |||
(direct or abstracted) to the MDSC. It is therefore expected that | (direct or abstracted) to the MDSC. It is therefore expected that | |||
policy will dictate what connectivity information will be exported | policy will dictate what connectivity information will be exported | |||
between the PNC, via the MDSC-PNC Interface (MPI), and MDSC. | between the PNC, via the MDSC-PNC Interface (MPI), and MDSC. | |||
Policy interactions may arise when a PNC determines that it cannot | Policy interactions may arise when a PNC determines that it cannot | |||
compute a requested path from the MDSC, or notices that (per a | compute a requested path from the MDSC, or notices that (per a | |||
locally configured policy) the network is low on resources (for | locally configured policy) the network is low on resources (for | |||
example, the capacity on key links become exhausted). In either | example, the capacity on key links become exhausted). In either | |||
case, the PNC will be required to notify the MDSC, which may (again | case, the PNC will be required to notify the MDSC, which may (again | |||
per policy) act to construct a virtual network service across | per policy) act to construct a virtual network service across | |||
another physical network topology. | another physical network topology. | |||
Furthermore, additional forms of policy-based resource management | Furthermore, additional forms of policy-based resource management | |||
will be required to provide virtual network service performance, | will be required to provide virtual network service performance, | |||
security and resilience guarantees. This will likely be implemented | security and resilience guarantees. This will likely be implemented | |||
via a local policy agent and subsequent protocol methods. | via a local policy agent and additional protocol methods. | |||
11. Security Considerations | 9. Security Considerations | |||
The ACTN framework described in this document defines key components | The ACTN framework described in this document defines key components | |||
and interfaces for managed traffic engineered networks. Securing the | and interfaces for managed traffic engineered networks. Securing | |||
request and control of resources, confidentially of the information, | the request and control of resources, confidentially of the | |||
and availability of function, should all be critical security | information, and availability of function, should all be critical | |||
considerations when deploying and operating ACTN platforms. | security considerations when deploying and operating ACTN platforms. | |||
Several distributed ACTN functional components are required, and as | Several distributed ACTN functional components are required, and | |||
a rule implementations should consider encrypting data that flow | implementations should consider encrypting data that flows between | |||
between components, especially when they are implemented at remote | components, especially when they are implemented at remote nodes, | |||
nodes, regardless if these are external or internal network | regardless these data flows are on external or internal network | |||
interfaces. | interfaces. | |||
The ACTN security discussion is further split into two specific | The ACTN security discussion is further split into two specific | |||
categories described in the following sub-sections: | categories described in the following sub-sections: | |||
. Interface between the Customer Network Controller and Multi | . Interface between the Customer Network Controller and Multi | |||
Domain Service Coordinator (MDSC), CNC-MDSC Interface (CMI) | Domain Service Coordinator (MDSC), CNC-MDSC Interface (CMI) | |||
. Interface between the Multi Domain Service Coordinator and | . Interface between the Multi Domain Service Coordinator and | |||
Physical Network Controller (PNC), MDSC-PNC Interface (MPI) | Physical Network Controller (PNC), MDSC-PNC Interface (MPI) | |||
From a security and reliability perspective, ACTN may encounter many | From a security and reliability perspective, ACTN may encounter many | |||
risks such as malicious attack and rogue elements attempting to | risks such as malicious attack and rogue elements attempting to | |||
connect to various ACTN components. Furthermore, some ACTN | connect to various ACTN components. Furthermore, some ACTN | |||
components represent a single point of failure and threat vector, | components represent a single point of failure and threat vector, | |||
and must also manage policy conflicts, and eavesdropping of | and must also manage policy conflicts, and eavesdropping of | |||
communication between different ACTN components. | communication between different ACTN components. | |||
The conclusion is that all protocols used to realize the ACTN | The conclusion is that all protocols used to realize the ACTN | |||
framework should have rich security features, and customer, | framework should have rich security features, and customer, | |||
application and network data should be stored in encrypted data | application and network data should be stored in encrypted data | |||
stores. Additional security risks may still exist. Therefore, | stores. Additional security risks may still exist. Therefore, | |||
discussion and applicability of specific security functions and | discussion and applicability of specific security functions and | |||
protocols will be better described in documents that are use case | protocols will be better described in documents that are use case | |||
and environment specific. | and environment specific. | |||
11.1. Interface between the Customer Network Controller and Multi | 9.1. CNC-MDSC Interface (CMI) | |||
Domain Service Coordinator (MDSC), CNC-MDSC Interface (CMI) | ||||
The role of the MDSC is to detach the network and service control | ||||
from underlying technology to help the customer express the network | ||||
as desired by business needs. It should be noted that data stored by | ||||
the MDSC will reveal details of the virtual network services, and | ||||
which CNC and application is consuming the resource. The data stored | ||||
must therefore be considered as a candidate for encryption. | ||||
CNC Access rights to an MDSC must be managed. MDSC resources must be | Data stored by the MDSC will reveal details of the virtual network | |||
properly allocated, and methods to prevent policy conflicts, | services, and which CNC and customer/application is consuming the | |||
resource wastage and denial of service attacks on the MDSC by rogue | resource. The data stored must therefore be considered as a | |||
CNCs, should also be considered. | candidate for encryption. | |||
A CNC-MDSC protocol interface will likely be an external protocol | CNC Access rights to an MDSC must be managed. The MDSC must | |||
interface. Again, suitable authentication and authorization of each | allocate resources properly, and methods to prevent policy | |||
CNC connecting to the MDSC will be required, especially, as these | conflicts, resource wastage, and denial of service attacks on the | |||
are likely to be implemented by different organizations and on | MDSC by rogue CNCs, should also be considered. | |||
separate functional nodes. Use of the AAA-based mechanisms would | ||||
also provide role-based authorization methods, so that only | ||||
authorized CNC's may access the different functions of the MDSC. | ||||
11.2. Interface between the Multi Domain Service Coordinator and | The CMI will likely be an external protocol interface. Suitable | |||
Physical Network Controller (PNC), MDSC-PNC Interface (MPI) | authentication and authorization of each CNC connecting to the MDSC | |||
will be required, especially, as these are likely to be implemented | ||||
by different organizations and on separate functional nodes. Use of | ||||
the AAA-based mechanisms would also provide role-based authorization | ||||
methods, so that only authorized CNC's may access the different | ||||
functions of the MDSC. | ||||
The function of the Physical Network Controller (PNC) is to | 9.2. MDSC-PNC Interface (MPI) | |||
configure network elements, provide performance and monitoring | ||||
functions of the physical elements, and export physical topology | ||||
(full, partial, or abstracted) to the MDSC. | ||||
Where the MDSC must interact with multiple (distributed) PNCs, a | Where the MDSC must interact with multiple (distributed) PNCs, a | |||
PKI-based mechanism is suggested, such as building a TLS or HTTPS | PKI-based mechanism is suggested, such as building a TLS or HTTPS | |||
connection between the MDSC and PNCs, to ensure trust between the | connection between the MDSC and PNCs, to ensure trust between the | |||
physical network layer control components and the MDSC. | physical network layer control components and the MDSC. | |||
Which MDSC the PNC exports topology information to, and the level of | Which MDSC the PNC exports topology information to, and the level of | |||
detail (full or abstracted) should also be authenticated and | detail (full or abstracted) should also be authenticated and | |||
specific access restrictions and topology views, should be | specific access restrictions and topology views, should be | |||
configurable and/or policy-based. | configurable and/or policy-based. | |||
12. References | 10. References | |||
12.1. Informative References | 10.1. Informative References | |||
[RFC2702] Awduche, D., et. al., "Requirements for Traffic | [RFC2702] Awduche, D., et. al., "Requirements for Traffic | |||
Engineering Over MPLS", RFC 2702, September 1999. | Engineering Over MPLS", RFC 2702, September 1999. | |||
[RFC4026] L. Andersson, T. Madsen, "Provider Provisioned Virtual | ||||
Private Network (VPN) Terminology", RFC 4026, March 2005. | ||||
[RFC4208] G. Swallow, J. Drake, H.Ishimatsu, Y. Rekhter, | ||||
"Generalized Multiprotocol Label Switching (GMPLS) User- | ||||
Network Interface (UNI): Resource ReserVation Protocol- | ||||
Traffic Engineering (RSVP-TE) Support for the Overlay | ||||
Model", RFC 4208, October 2005. | ||||
[RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path | [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path | |||
Computation Element (PCE)-Based Architecture", IETF RFC | Computation Element (PCE)-Based Architecture", IETF RFC | |||
4655, August 2006. | 4655, August 2006. | |||
[RFC5654] Niven-Jenkins, B. (Ed.), D. Brungard (Ed.), and M. Betts | [RFC5654] Niven-Jenkins, B. (Ed.), D. Brungard (Ed.), and M. Betts | |||
(Ed.), "Requirements of an MPLS Transport Profile", RFC | (Ed.), "Requirements of an MPLS Transport Profile", RFC | |||
5654, September 2009. | 5654, September 2009. | |||
[RFC7149] Boucadair, M. and Jacquenet, C., "Software-Defined | [RFC7149] Boucadair, M. and Jacquenet, C., "Software-Defined | |||
Networking: A Perspective from within a Service Provider | Networking: A Perspective from within a Service Provider | |||
Environment", RFC 7149, March 2014. | Environment", RFC 7149, March 2014. | |||
[RFC7926] A. Farrel (Ed.), "Problem Statement and Architecture for | [RFC7926] A. Farrel (Ed.), "Problem Statement and Architecture for | |||
Information Exchange between Interconnected Traffic- | Information Exchange between Interconnected Traffic- | |||
Engineered Networks", RFC 7926, July 2016. | Engineered Networks", RFC 7926, July 2016. | |||
[GMPLS] Manning, E., et al., "Generalized Multi-Protocol Label | [RFC3945] Manning, E., et al., "Generalized Multi-Protocol Label | |||
Switching (GMPLS) Architecture", RFC 3945, October 2004. | Switching (GMPLS) Architecture2, RFC 3945, October 2004. | |||
[ONF-ARCH] Open Networking Foundation, "SDN architecture", Issue | [ONF-ARCH] Open Networking Foundation, "SDN architecture", Issue | |||
1.1, ONF TR-521, June 2016. | 1.1, ONF TR-521, June 2016. | |||
[RFC7491] King, D., and Farrel, A., "A PCE-based Architecture for | [Centralized] Farrel, A., et al., "An Architecture for Use of PCE | |||
Application-based Network Operations", RFC 7491, March | and PCEP in a Network with Central Control", draft-ietf- | |||
2015. | teas-pce-central-control, work in progress. | |||
[Transport NBI] Busi, I., et al., "Transport North Bound Interface | [Service-YANG] Lee, Y., Dhody, D., and Ceccarrelli, C., "Traffic | |||
Use Cases", draft-tnbidt-ccamp-transport-nbi-use-cases, | Engineering and Service Mapping Yang Model", draft-lee- | |||
work in progress. | teas-te-service-mapping-yang, work in progress. | |||
[ACTN-Abstraction] Y. Lee, et al., "Abstraction and Control of TE | [ACTN-YANG] Lee, Y., et al., "A Yang Data Model for ACTN VN | |||
Networks (ACTN) Abstraction Methods", draft-lee-teas-actn- | Operation", draft-lee-teas-actn-vn-yang, work in progress. | |||
abstraction, work in progress. | ||||
13. Contributors | [ACTN-REQ] Lee, Y., et al., "Requirements for Abstraction and | |||
Control of TE Networks", draft-ietf-teas-actn- | ||||
requirements, work in progress. | ||||
11. Contributors | ||||
Adrian Farrel | Adrian Farrel | |||
Old Dog Consulting | Old Dog Consulting | |||
Email: adrian@olddog.co.uk | Email: adrian@olddog.co.uk | |||
Italo Busi | Italo Busi | |||
Huawei | Huawei | |||
Email: Italo.Busi@huawei.com | Email: Italo.Busi@huawei.com | |||
Khuzema Pithewan | Khuzema Pithewan | |||
skipping to change at page 43, line 22 ¶ | skipping to change at page 34, line 4 ¶ | |||
Old Dog Consulting | Old Dog Consulting | |||
Email: adrian@olddog.co.uk | Email: adrian@olddog.co.uk | |||
Italo Busi | Italo Busi | |||
Huawei | Huawei | |||
Email: Italo.Busi@huawei.com | Email: Italo.Busi@huawei.com | |||
Khuzema Pithewan | Khuzema Pithewan | |||
Infinera | Infinera | |||
Email: kpithewan@infinera.com | Email: kpithewan@infinera.com | |||
Michael Scharf | Michael Scharf | |||
Nokia | Nokia | |||
Email: michael.scharf@nokia.com | Email: michael.scharf@nokia.com | |||
Authors' Addresses | ||||
Daniele Ceccarelli (Editor) | ||||
Ericsson | ||||
Torshamnsgatan,48 | ||||
Stockholm, Sweden | ||||
Email: daniele.ceccarelli@ericsson.com | ||||
Young Lee (Editor) | ||||
Huawei Technologies | ||||
5340 Legacy Drive | ||||
Plano, TX 75023, USA | ||||
Phone: (469)277-5838 | ||||
Email: leeyoung@huawei.com | ||||
Luyuan Fang | Luyuan Fang | |||
Microsoft | eBay | |||
Email: luyuanf@gmail.com | Email: luyuanf@gmail.com | |||
Diego Lopez | Diego Lopez | |||
Telefonica I+D | Telefonica I+D | |||
Don Ramon de la Cruz, 82 | Don Ramon de la Cruz, 82 | |||
28006 Madrid, Spain | 28006 Madrid, Spain | |||
Email: diego@tid.es | Email: diego@tid.es | |||
Sergio Belotti | Sergio Belotti | |||
Alcatel Lucent | Alcatel Lucent | |||
skipping to change at page 45, line 5 ¶ | skipping to change at page 35, line 5 ¶ | |||
Huawei Technologies | Huawei Technologies | |||
Divyashree Techno Park, Whitefield | Divyashree Techno Park, Whitefield | |||
Bangalore, Karnataka 560066 | Bangalore, Karnataka 560066 | |||
India | India | |||
Email: dhruv.ietf@gmail.com | Email: dhruv.ietf@gmail.com | |||
Gert Grammel | Gert Grammel | |||
Juniper Networks | Juniper Networks | |||
Email: ggrammel@juniper.net | Email: ggrammel@juniper.net | |||
APPENDIX A - Example of MDSC and PNC functions integrated in | Authors' Addresses | |||
Daniele Ceccarelli | ||||
Ericsson | ||||
Torshamnsgatan,48 | ||||
Stockholm, Sweden | ||||
Email: daniele.ceccarelli@ericsson.com | ||||
Young Lee | ||||
Huawei Technologies | ||||
5340 Legacy Drive | ||||
Plano, TX 75023, USA | ||||
Phone: (469)277-5838 | ||||
Email: leeyoung@huawei.com | ||||
APPENDIX A - Example of MDSC and PNC Functions Integrated in A | ||||
Service/Network Orchestrator | Service/Network Orchestrator | |||
This section provides an example of a possible deployment scenario, | This section provides an example of a possible deployment scenario, | |||
in which Service/Network Orchestrator can include a number of | in which Service/Network Orchestrator can include a number of | |||
functionalities, among which, in the example below, PNC | functionalities, among which, in the example below, PNC | |||
functionalities for domain 2 and MDSC functionalities to coordinate | functionalities for domain 2 and MDSC functionalities to coordinate | |||
the PNC1 functionalities (hosted in a separate domain controller) | the PNC1 functionalities (hosted in a separate domain controller) | |||
and PNC2 functionalities (co-hosted in the network orchestrator). | and PNC2 functionalities (co-hosted in the network orchestrator). | |||
Customer | Customer | |||
+-------------------------------+ | +-------------------------------+ | |||
| +-----+ | | | +-----+ | | |||
| | CNC | | | | | CNC | | | |||
| +-----+ | | | +-----+ | | |||
+-------|-----------------------+ | +-------|-----------------------+ | |||
|-CMI | | | |||
Service/Network | | Service/Network | CMI | |||
Orchestrator | | Orchestrator | | |||
+-------|------------------------+ | +-------|------------------------+ | |||
| +------+ MPI +------+ | | | +------+ MPI +------+ | | |||
| | MDSC |----|--> | PNC2 | | | | | MDSC |---------| PNC2 | | | |||
| +------+ +------+ | | | +------+ +------+ | | |||
+-------|------------------|-----+ | +-------|------------------|-----+ | |||
|-MPI | | | MPI | | |||
Domain Controller | | | Domain Controller | | | |||
+-------|-----+ | | +-------|-----+ | | |||
| +-----+ | | | | +-----+ | | SBI | |||
| |PNC1 | | | | | |PNC1 | | | | |||
| +-----+ | | | | +-----+ | | | |||
+-------|-----+ | | +-------|-----+ | | |||
v v | v SBI v | |||
------- ------- | ------- ------- | |||
( ) ( ) | ( ) ( ) | |||
- - - - | - - - - | |||
( ) ( ) | ( ) ( ) | |||
( Domain 1 )----( Domain 2 ) | ( Domain 1 )----( Domain 2 ) | |||
( ) ( ) | ( ) ( ) | |||
- - - - | - - - - | |||
( ) ( ) | ( ) ( ) | |||
------- ------- | ------- ------- | |||
APPENDIX B - Example of IP + Optical network with L3VPN service | APPENDIX B - Example of IP + Optical network with L3VPN service | |||
skipping to change at page 46, line 17 ¶ | skipping to change at page 36, line 32 ¶ | |||
to end service fulfilment. An example of service configuration | to end service fulfilment. An example of service configuration | |||
function in the Service/Network Orchestrator is discussed in [I- | function in the Service/Network Orchestrator is discussed in [I- | |||
D.dhjain-bess-bgp-l3vpn-yang]. | D.dhjain-bess-bgp-l3vpn-yang]. | |||
Customer | Customer | |||
+-------------------------------+ | +-------------------------------+ | |||
| +-----+ | | | +-----+ | | |||
| | CNC | | | | | CNC | | | |||
| +-----+ | | | +-----+ | | |||
+-------|--------+--------------+ | +-------|--------+--------------+ | |||
|-CMI | Customer Service Model | | | Customer Service Model | |||
| | (non-ACTN interface) | | CMI | (non-ACTN interface) | |||
Service/Network | | | Service/Network | | | |||
Orchestrator | | | Orchestrator | | | |||
+-------|--------|--------------------------+ | +-------|--------|--------------------------+ | |||
| | +-------------------------+ | | | | +-------------------------+ | | |||
| | |Service Mapping Function | | | | | |Service Mapping Function | | | |||
| | +-------------------------+ | | | | +-------------------------+ | | |||
| | | | | | | | | | | | |||
| +------+ | +---------------+ | | | +------+ | +---------------+ | | |||
| | MDSC |--- |Service Config.| | | | | MDSC |--- |Service Config.| | | |||
| +------+ +---------------+ | | | +------+ +---------------+ | | |||
+------|------------------|-----------------+ | +------|------------------|-----------------+ | |||
MPI-| +------------+ (non-ACTN Interf.) | MPI | +------------+ (non-ACTN Interf.) | |||
| / | | / | |||
+-----------/------------+ | +-----------/------------+ | |||
IP/MPLS | / | | IP/MPLS | / | | |||
Domain | / | Optical Domain | Domain | / | Optical Domain | |||
Controller | / | Controller | Controller | / | Controller | |||
+--------|-------/----+ +---|--------------+ | +--------|-------/----+ +---|--------------+ | |||
| +-----+ +-----+ | | +-----+ | | | +-----+ +-----+ | | +-----+ | | |||
| |PNC1 | |Serv.| | | |PNC2 | | | | |PNC1 | |Serv.| | | |PNC2 | | | |||
| +-----+ +-----+ | | +-----+ | | | +-----+ +-----+ | | +-----+ | | |||
+---------------------+ +------------------+ | +---------------------+ +------------------+ | |||
| | | SBI | | | |||
v | | v | | |||
+---------------------------------+ | | +---------------------------------+ | SBI | |||
/ IP/MPLS Network \ | | / IP/MPLS Network \ | | |||
+-------------------------------------+ | | +-------------------------------------+ | | |||
V | v | |||
+--------------------------------------+ | +--------------------------------------+ | |||
/ Optical Network \ | / Optical Network \ | |||
+------------------------------------------+ | +------------------------------------------+ | |||
End of changes. 240 change blocks. | ||||
1331 lines changed or deleted | 998 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |