ALTO WG | G. M. Bernstein, Ed. |
Internet-Draft | Grotto Networking |
Intended status: Informational | Y. Yang, Ed. |
Expires: April 24, 2014 | Yale University |
Y. Lee, Ed. | |
Huawei Technologies | |
October 21, 2013 |
ALTO Topology Service: Uses Cases, Requirements, and Framework
draft-bernstein-alto-topo-00
Exposing additional topology information of networks to applications and users beyond that of the current ALTO protocol can enable many important existing and emerging use cases, and many network providers already provide additional information about their networks. At the same time, there is no standard for exposing network topology in a manner that provides simplification via abstraction to the application layer and information hiding via abstraction to the network provider. In this document, we provide a survey of use-cases for extended network topology information, present some initial requirements for such services, and then give a framework of how to integrate such an extended ALTO topology service with network control infrastructure.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 24, 2014.
Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
Topology is a basic property of a network. Hence there is a spectrum of use cases where an application (or user) can benefit from obtaining some knowledge of the topology of the network that it uses or considers using, beyond the "single-switch"abstraction topology abstraction presented in the ALTO Base Protocol [I-D.ietf-alto-protocol] as discussed in [I-D.yang-alto-topology].
As a simple case, many networks already provide public views to their topologies so that current or potential users of their networks can learn more about their networks; for example, see Verizon; Comcast; CenturyLink; BT; China Telecom; Internet 2. A user (application) with such information may conduct a wide variety of analysis, for example, in determining its service provider(s).
For more advanced use cases such as in a programmatic setting, a topology manager of a network may expose a topology of the network to an application so that the application can provide its input regarding the operations of the network. A concrete example setting is the recent development of Software Defined Networking (SDN); for example see OpenDayLight; Maple.
The objective of this document is three folds: (1) it surveys general uses cases and existing designs of how network topologies are exposed to applications; (2) it presents the requirements in exposing network topologies; and (3) it gives a framework of how network topologies to applications can be integrated into network control.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].
Uses cases generally relate to some type of cost metric optimization, application policy, resource requirements (bandwidth), and/or performance criteria such as delay. In the following we give a non-exhaustive list of uses cases for a extended ALTO topology service.
Here we furnish a partial list of examples that illustrate one or more properties desirable in an extended ALTO topology service.
Formal requirements to come...
The framework portion of this document, like most IETF frameworks, is an informational section that shows how various systems could come together to form an extended ALTO topology service.
References [I-D.lee-alto-app-net-info-exchange] and [I-D.yang-alto-topology] provide tentative models and encodings for abstract topology representation.
From management systems, to proprietary interfaces to routing systems, to i2rs...
Although only the topology/resource abstraction format would be subject to standardization, this section will illustrate some techniques that can be efficiently used to derived service and client specific topology abstractions. References [I-D.lee-alto-app-net-info-exchange] and [I-D.yang-alto-topology] give examples of how raw network topology information can be processed into abstracted application specific form. A lengthier paper with more examples and technology considerations can be found at http://www.grotto-networking.com/files/BandwidthConstraintModeling.pdf.
As mentioned in the requirements ALTO topology extensions must be able to work with technologies that require resource reservations as well as those that don't. In implementing an overall system the information supplied by an extended ALTO topology service will need to be compatible with a "reservation system" if there is one.
At the IETF we have seem similar requirements for compatibility between GMPLS routing and signaling systems, particularly via the concept of loose routes.
Hopefully we'll have lots of interested folks commenting and we'll give them credit here.
This memo includes no request to IANA.
All drafts are required to have a security considerations section and this will as we flesh it out.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[min_ref] | authSurName, authInitials., "Minimal Reference", 2006. |
[I-D.lee-alto-app-net-info-exchange] | Lee, Y., Dhody, D., Wu, Q., Bernstein, G. and T. Choi, "ALTO Extensions to Support Application and Network Resource Information Exchange for High Bandwidth Applications ", Internet-Draft draft-lee-alto-app-net-info-exchange-03, October 2013. |
[I-D.bernstein-alto-large-bandwidth-cases] | Bernstein, G. and Y. Lee, "Use Cases for High Bandwidth Query and Control of Core Networks", Internet-Draft draft-bernstein-alto-large-bandwidth-cases-00, June 2011. |
[I-D.yang-alto-topology] | Yang, Y., "ALTO Topology Considerations", Internet-Draft draft-yang-alto-topology-00, July 2013. |
[RFC3945] | Mannie, E., "Generalized Multi-Protocol Label Switching (GMPLS) Architecture", RFC 3945, October 2004. |
[RFC4202] | Kompella, K. and Y. Rekhter, "Routing Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 4202, October 2005. |
[OptControl] | Bernstein, G. M., Rajagopalan, B. and D. Saha, "Optical Network Control", 2004. |
[I-D.ietf-alto-protocol] | Alimi, R., Penno, R. and Y. Yang, "ALTO Protocol", Internet-Draft draft-ietf-alto-protocol-20, October 2013. |