TEAS Working Group A. Wang Internet-Draft China Telecom Intended status: Informational X. Huang Expires:February 27,March 2, 2020 C. Kou BUPT Z. Li China Mobile P. Mi Huawei Technologies August26,30, 2019 Scenarios and Simulation Results of PCE in Native IP Networkdraft-ietf-teas-native-ip-scenarios-07draft-ietf-teas-native-ip-scenarios-08 AbstractThe requirementsRequirements for providing the End to End(E2E) performance assurance are emerging within the service providernetwork,network. While there are varioussolutions to meet such demands, buttechnology solutions, there is no one solution which canmeetfulfill these requirementsinfor a native IPnetwork, especially onenetwork. One universal (E2E) solution which can cover both intra-domain and inter-domain scenariostogether.is needed. One feasible E2E traffic engineering solution is the use of a Path Computation Elements (PCE) in a native IP network. This document describesthevarious complex scenarios and simulation resultsfor Path Computation Elements (PCE)when applying a PCE in a native IPnetwork, whichnetwork. This solution, referred to as Centralized Control Dynamic Routing (CCDR), integrates the advantage of using distributedprotocols,protocols and the power ofcentrallya centralized controltechnologies to provide one feasible traffic engineering solution in various complex scenarios for the service provider.technology. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onFebruary 27,March 2, 2020. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. CCDR Scenarios. . . . . . . . . . . . . . . . . . . . . . . . 4 3.1. QoS Assurance for Hybrid Cloud-based Application. . . . . 4 3.2. Link Utilization Maximization . . . . . . . . . . . . . . 5 3.3. Traffic Engineering for Multi-Domain . . . . . . . . . . 6 3.4. Network Temporal Congestion Elimination. . . . . . . . . 7 4. CCDR Simulation. . . . . . . . . . . . . . . . . . . . . . . 7 4.1. Topology Simulation . . . . . . . . . . . . . . . . . . . 7 4.2. Traffic Matrix Simulation. . . . . . . . . . . . . . . . 8 4.3. CCDR End-to-End Path Optimization . . . . . . . . . . . . 8 4.4. Network Temporal Congestion Elimination . . . . . . . . . 10 5. CCDR Deployment Consideration. . . . . . . . . . . . . . . . 11 6. Security Considerations . . . . . . . . . . . . . . . . . . . 12 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 12 9. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 12 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 10.1. Normative References . . . . . . . . . . . . . . . . . . 12 10.2. Informative References . . . . . . . . . . . . . . . . .1312 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 1. IntroductionServiceA service provider network is composed of thousands of routers that run distributedprotocolprotocols to exchange the reachabilityinformation between them.information. The path for the destination network is mainlycalculatedcalculated, andcontrolledcontrolled, by the distributed protocols. These distributed protocols are robust enough to supportthe current evolution of Internetmost applications, but have some difficultieswhen application requiressupporting the complexities needed for traffic engineering applications, e.g. E2E performance assurance, orin the situation that the service provider wants to maximizemaximizing the link utilization withintheiran IP network. Multiprotocol Label Switching (MPLS)forusing TrafficEngineering(TE)Engineering (TE) technology[RFC3209]is(MPLS-TE)[RFC3209]is one solution forfinely plannedtraffic engineering network but itmainly applies to the MPLS network. Even forintroduces an MPLSnetwork,network and related technology which would be an overlay of theMPLS- TEIP network. MPLS-TE technology is often used for Label Switched Path (LSP)protection.protection and complex path set-up within a domain. Itis seldom usedhas not been widely deployed for meeting E2E (especially in inter- domain) dynamic performance assurance requirementswithin real time trafficfor an IP network. Segment Routing [RFC8402] is another solution that integrates some advantages of using a distributed protocol and a centrally controlmode,technology, but it requires the underlying network, especially the provider edgerouterrouter, to do a label push and pop action in-depth, andneed complex mechanism foradds complexity, when coexisting with the Non-Segment Routing network. Additionally, it can only maneuver the E2Epathpaths for MPLS and IPv6 traffic via different mechanisms. Deterministic Networking (DetNet)[RFC8578]describes use casesis another possible solution. It is primarily focused on providing bounded latency fordiverse industries that haveacommon need for "deterministic flows", which can provide guaranteed bandwidth, bounded latency,flow andother properties germane tointroduces additional requirements on thetransport of time-sensitive data.domain edge router. The current DetNet scope is within one domain. The use casesfocus mainly ondefined in this document do not require theindustrial critical applications within one centrally controlled network and are out of scopeadditional complexity ofthis draft.deterministic properties and so differ from the DetNet use cases. This draft describes scenariosinfor a native IP network thatthe Centrallya Centralized Control Dynamic Routing (CCDR) framework can easily solve, withouttherequiring a change of the data plane behaviour on the router. It alsogives theprovides path optimization simulation results to illustrate the applicability of the CCDR framework. 2. Terminology This document uses the following terms defined in [RFC5440]: PCE. The following terms are defined in this document: o BRAS: Broadband Remote Access Server o CD: Congestion Degree o CR: Core Router o CCDR:CentralCentralized Control Dynamic Routing o E2E: End to End o IDC: Internet Data Center o MAN: Metro Area Network o QoS: Quality of Service o SR: Service Router o UID: Utilization Increment Degree o WAN: Wide Area Network 3. CCDR Scenarios. The following sections describesomevarious deployment scenariosthatfor applying the CCDRframework is suitable for deployment.framework. 3.1. QoS Assurance for Hybrid Cloud-based Application. With theemergeemergence of cloud computing technologies, enterprises are putting more and more services onthea public oriented cloud environment, butkeepkeeping core business within their private cloud. The communication between the private and public cloud sites will span the Wide Area Network (WAN) network. The bandwidth requirements between them are variable and the background traffic between these two siteschanges from time tovaries over time. Enterprise applicationsjust want to exploit the network capabilities to assurerequire assurance of the E2E Quality of Service(QoS) performance ondemand.demand for variable bandwidth services. CCDR, which integrates the merits of distributedprotocolprotocols and the power ofcentrallycentralized control, is suitable for this scenario. The possible solution framework is illustrated below: +------------------------+ | Cloud Based Application| +------------------------+ | +-----------+ | PCE | +-----------+ | | //--------------\\ ///// \\\\\ Private Cloud Site || Distributed |Public Cloud Site | Control Network | \\\\\ ///// \\--------------// Figure 1: Hybrid Cloud Communication Scenario By default, the traffic path between the private and public cloud site will be determined by the distributed control network. When applications require the E2E QoS assurance, it can send these requirements to the PCE, and let the PCE compute one E2E path which is based on the underlying network topology and the real traffic information, to accommodate the application's QoS requirements.The proposed solution can refer the draft [I-D.ietf-teas-pce-native-ip].Section 4 of this document describes thedetailsimulationprocess and the result.results for this use case. 3.2. Link Utilization Maximization Network topology within a Metro Area Network (MAN) is generally in a star mode as illustrated in Figure 2, with different devicesconnectconnected to different customer types. The traffic from these customers is often in a tidalpattern thatpattern, with the links between the Core Router(CR)/Broadband Remote Access Server(BRAS) and CR/ServiceRouter(SR) will experienceRouter(SR), experiencing congestion in different periods, because the subscribers underBRASBRAS, often use the network atnightnight, and the dedicated line users underSRSR, often use the network during the daytime. The uplink between BRAS/SR and CR must satisfy the maximum traffic volume between them respectively and this causes these links oftenin underutilization situation.to be under-utilized. +--------+ | CR | +----|---+ | --------|--------|-------| | | | | +--|-+ +-|- +--|-+ +-|+ |BRAS| |SR| |BRAS| |SR| +----+ +--+ +----+ +--+ Figure 2: Star-mode Network Topology within MAN If we considerto connectconnecting the BRAS/SR with a local link loop (which ismore cheaper),usually lower cost), and control the overall MAN topology with the CCDR framework, we can exploit the tidal phenomena betweenBRAS/CRthe BRAS/ CR and SR/CR links,maximizemaximizing thelinks (which is more expensive)utilization ofthem .these links (which are usually higher cost). +-------+ ----- PCE | | +-------+ +----|---+ | CR | +----|---+ | --------|--------|-------| | | | | +--|-+ +-|- +--|-+ +-|+ |BRAS-----SR| |BRAS-----SR| +----+ +--+ +----+ +--+ Figure 3: Link Utilization Maximization via CCDR 3.3. Traffic Engineering for Multi-DomainThe serviceService provider networks are often comprised of different domains, interconnected with eachother,formother,forming a very complex topologythatas illustrated inFigure.4.Figure 4. Due to the traffic pattern to/from the MAN and IDC, the utilization of the links between them are often asymmetric. It is almost impossible to balance the utilization of these links viathea distributed protocol, but this unbalancephenomenoncan be overcomeviautilizing the CCDR framework. +---+ +---+ |MAN|-----------------IDC| +-|-| | +-|-+ | ---------| | ------|BackBone|------ | ----|----| | | | | +-|-- | ----+ |IDC|----------------|MAN| +---| |---+ Figure 4: Traffic Engineering for Complex Multi-Domain TopologySolutionA solution for this scenario requires thegathergathering of NetFlow information, analysis of the source/destinationAS of themAS, anddeterminedetermining what is the main cause of the congested link. After this, the operator can use themultiexternal Border Gateway Protocol(eBGP) sessionsdescribed in [I-D.ietf-teas-pce-native-ip]toto schedule the traffic among the different domains. 3.4. Network Temporal Congestion Elimination. In more generalsituation,situations, there are often temporal congestions within the service provider's network. Such congestion phenomena often appearrepeatedlyrepeatedly, and if the service provider hassomemethods to mitigate it, it will certainly improve their network operations capabilities and increasethe degree ofsatisfaction for their customers. CCDR is also suitable for suchscenario in such manner that the distributed protocol process most of the traffic forwarding andscenarios, as the controller can schedulesometraffic out of thecongestion links to lowercongested links, lowering the utilization ofthem.them during these times. Section 4 describes the simulationprocess andresultsabout suchof this scenario. 4. CCDR Simulation. The following sections describe the topology, traffic matrix, E2E path optimization and congestion elimination in CCDR applied scenarios. 4.1. Topology Simulation The network topology mainly contains nodes and links information. Nodes used in the simulation have two types: core node and edge node. The core nodes are fully linked to each other. The edge nodes are connected only with some of the core nodes. Figure 5 is a topology example of 4 core nodes and 5 edge nodes. In this CCDR simulation, 100 core nodes and 400 edge nodes are generated. +----+ /|Edge|\ | +----+ | | | | | +----+ +----+ +----+ |Edge|----|Core|-----|Core|---------+ +----+ +----+ +----+ | / | \ / | | +----+ | \ / | | |Edge| | X | | +----+ | / \ | | \ | / \ | | +----+ +----+ +----+ | |Edge|----|Core|-----|Core| | +----+ +----+ +----+ | | | | | +------\ +----+ | ---|Edge| +-----------------/ +----+ Figure 5: Topology of Simulation The number of links connecting one edge node to the set of core nodes is randomly between 2 to 30, and the total number of links is more than 20000. Each link hasitsa congestion threshold. 4.2. Traffic Matrix Simulation. The traffic matrix is generated based on the link capacity of topology. It can result in many kinds of situations, such as congestion, mild congestion and non-congestion. In the CCDR simulation, the dimension of the traffic matrix is 500*500. About 20% links are overloaded when the Open Shortest Path First (OSPF) protocol is used in the network. 4.3. CCDR End-to-End Path Optimization The CCDR E2E path optimization is to find the best path which is the lowest in metric value and each link of the path is far below link's threshold. Based on the current state of the network, the PCE within CCDR framework combines the shortest path algorithm with a penalty theory of classical optimization and graph theory. Given a background trafficmatrixmatrix, which is unscheduled, when a set of new flows comes into the network, the E2E path optimization finds the optimal paths for them. The selected paths bring the least congestion degree to the network. The link Utilization IncrementDegree(UID)Degree(UID), when the new flows are added into thenetworknetwork, is shown in Figure 6. The first graph in Figure 6 is the UID with OSPF and the second graph is the UID with CCDR E2E path optimization. The average UID of the first graph is more than 30%. After path optimization, the average UID is less than 5%. The results show that the CCDR E2E path optimization has an eye- catchingdecreasingdecrease in UID relative to the path chosen based on OSPF. +-----------------------------------------------------------+ | * * * *| 60| * * * * * *| |* * ** * * * * * ** * * * * **| |* * ** * * ** *** ** * * ** * * * ** * * *** **| |* * * ** * ** ** *** *** ** **** ** *** **** ** *** **| 40|* * * ***** ** *** *** *** ** **** ** *** ***** ****** **| UID(%)|* * ******* ** *** *** ******* **** ** *** ***** *********| |*** ******* ** **** *********** *********** ***************| |******************* *********** *********** ***************| 20|******************* ***************************************| |******************* ***************************************| |***********************************************************| |***********************************************************| 0+-----------------------------------------------------------+ 0 100 200 300 400 500 600 700 800 900 1000 +-----------------------------------------------------------+ | | 60| | | | | | | | 40| | UID(%)| | | | | | 20| | | *| | * *| | * * * * * ** * *| 0+-----------------------------------------------------------+ 0 100 200 300 400 500 600 700 800 900 1000 Flow Number Figure 6: Simulation Result with Congestion Elimination 4.4. Network Temporal Congestion Elimination Differentdegreedegrees of network congestionsarewere simulated. The Congestion Degree (CD) is defined as the link utilization beyond its threshold. The CCDR congestion elimination performance is shown in Figure 7. The first graph is the CD distribution before the process of congestion elimination. The average CD of all congested links is more than 10%. The second graph shown in Figure 7 is the CD distribution after using the congestion elimination process. It shows only 12 links among totally 20000 links exceed the threshold, and all the CD values are less than 3%. Thus, after scheduling of the trafficin congestionaway from the congested paths, the degree of network congestion is greatly eliminated and the network utilization is in balance. Before congestion elimination +-----------------------------------------------------------+ | * ** * ** ** *| 20| * * **** * ** ** *| |* * ** * ** ** **** * ***** *********| |* * * * * **** ****** * ** *** **********************| 15|* * * ** * ** **** ********* *****************************| |* * ****** ******* ********* *****************************| CD(%) |* ********* ******* ***************************************| 10|* ********* ***********************************************| |*********** ***********************************************| |***********************************************************| 5|***********************************************************| |***********************************************************| |***********************************************************| 0+-----------------------------------------------------------+ 0 0.5 1 1.5 2 After congestion elimination +-----------------------------------------------------------+ | | 20| | | | | | 15| | | | CD(%) | | 10| | | | | | 5 | | | | | * ** * * * ** * ** * | 0 +-----------------------------------------------------------+ 0 0.5 1 1.5 2 Link Number(*10000) Figure 7: Simulation Result with Congestion Elimination 5. CCDR Deployment Consideration. With the above CCDR scenarios and simulation results, wecan knowdemonstrate it isnecessary andfeasible to find one general solution to cope with various complexsituationssituations. Integrated use of a centralized controller for the more complex optimal pathcomputation in centrally mannercomputations in a native IP networkbased onresults in significant improvements without impacting the underlay networktopology and the real time traffic. [I-D.ietf-teas-pce-native-ip] gives theinfrastructure. A proposed solutionfor above scenarios, such thoughts can be extended to cover requirements in other situationsis described infuture.draft[I-D.ietf-teas-pce-native-ip] . 6. Security Considerations This document considers mainly the integration of distributedprotocolprotocols and the central control capability of a PCE. While It certainly can ease the management of network in various traffic engineering scenarios as described in this document,butthecentralcentralized controlmanneralso bringthea new point that may be easily attacked. Solutions for CCDR scenariosshould keep these in mind andneed to considermore for theprotection of the PCEandtheircommunication with the underlaydevices, as that described in documentdevices. [RFC5440] and [RFC8253] provide additional information. 7. IANA Considerations This document does not require any IANA actions. 8. Contributors Lu Huangcontributescontributed to the content of this draft. 9. Acknowledgement The author would like to thank Deborah Brungard, Adrian Farrel, Huaimo Chen, Vishnu Beeram and Lou Berger for theirsupportssupport and comments on this draft. 10. References 10.1. Normative References[I-D.ietf-teas-pce-native-ip] Wang, A., Zhao, Q., Khasanov, B., Chen, H., and R. Mallya, "PCE in Native IP Network", draft-ietf-teas-pce-native- ip-03 (work in progress), April 2019.[RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation Element (PCE) Communication Protocol (PCEP)", RFC 5440, DOI 10.17487/RFC5440, March 2009, <https://www.rfc-editor.org/info/rfc5440>. [RFC8253] Lopez, D., Gonzalez de Dios, O., Wu, Q., and D. Dhody, "PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)", RFC 8253, DOI 10.17487/RFC8253, October 2017, <https://www.rfc-editor.org/info/rfc8253>. 10.2. Informative References [I-D.ietf-teas-pce-native-ip] Wang, A., Zhao, Q., Khasanov, B., Chen, H., and R. Mallya, "PCE in Native IP Network", draft-ietf-teas-pce-native- ip-03 (work in progress), April 2019. [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, <https://www.rfc-editor.org/info/rfc3209>. [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., Decraene, B., Litkowski, S., and R. Shakir, "Segment Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, July 2018, <https://www.rfc-editor.org/info/rfc8402>. [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", RFC 8578, DOI 10.17487/RFC8578, May 2019, <https://www.rfc-editor.org/info/rfc8578>. Authors' Addresses Aijun Wang China Telecom Beiqijia Town, Changping District Beijing, Beijing 102209 China Email: wangaj3@chinatelecom.cn Xiaohong Huang Beijing University of Posts and Telecommunications No.10 Xitucheng Road, Haidian District Beijing China Email: huangxh@bupt.edu.cn Caixia Kou Beijing University of Posts and Telecommunications No.10 Xitucheng Road, Haidian District Beijing China Email: koucx@lsec.cc.ac.cn Zhenqiang Li China Mobile 32 Xuanwumen West Ave, Xicheng District Beijing 100053 China Email: li_zhenqiang@hotmail.com Penghui Mi Huawei Technologies Tower C of Bldg.2, Cloud Park, No.2013 of Xuegang Road Shenzhen, Bantian,Longgang District 518129 China Email: mipenghui@huawei.com