Internet DRAFT - draft-bardalai-ccamp-overlay-path-comp
draft-bardalai-ccamp-overlay-path-comp
INTERNET-DRAFT Snigdho Bardalai
Intended Status: Informational Khuzema Pithewan
Expires: April 17, 2014 Rajan Rao
Infinera Corp.
October 14, 2013
Overlay Network - Path Computation Approaches
draft-bardalai-ccamp-overlay-path-comp-02
Abstract
This document discusses various path computations approaches which
are applicable to overlay networks [framework doc ref]. It discusses
how the customer edge nodes uses the information advertised by the
provider network to compute a path between two customer edge nodes or
how it can request the provider network to compute a path and setup
an end-2-end LSP.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright and License Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
Bardalai et.al Expires April 17, 2014 [Page 1]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Network Configuration . . . . . . . . . . . . . . . . . . . . . 3
3. Network Configuration Usecases . . . . . . . . . . . . . . . . 4
3.1 ONI is located between CE-PE nodes. . . . . . . . . . . . . 4
3.2 ONI is located between CE and PE nodes. . . . . . . . . . . 4
3.3 Nested ONIs . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Path Computation Use-cases . . . . . . . . . . . . . . . . . . 6
5. Path Computation Approaches . . . . . . . . . . . . . . . . . . 7
5.1 Virtual Topology Approach . . . . . . . . . . . . . . . . . 8
5.2 PCE Approach . . . . . . . . . . . . . . . . . . . . . . . . 9
5.3 Hybrid Approach . . . . . . . . . . . . . . . . . . . . . . 11
6. CE-PE / PE-PE Interface . . . . . . . . . . . . . . . . . . . . 12
7 Security Considerations . . . . . . . . . . . . . . . . . . . . 12
8 IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 12
9 References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
9.1 Normative References . . . . . . . . . . . . . . . . . . . 12
9.2 Informative References . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13
Bardalai et.al Expires April 17, 2014 [Page 2]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
1 Introduction
This document attempts to describe possible ways to advertise
information required for customer network CE nodes to compute a path
for LSPs between two points in two customer network islands connected
by a provider network, so as to adhere a set of constraints in
provider network without knowledge of the detailed provider network
topology. These constraints could be, but not limited to, diversity,
latency, jitter, skew etc. Connectivity between customer network
islands is presumed to be an "overlay" over provider network.
1.1 Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
2. Network Configuration
Multi-layer, multi-domain network typically involve overlay
boundaries, where routing information sharing is restricted in
nature. These are typically administrative boundaries coupled with
technology boundaries.
Overlay network boundaries can be envisioned on two axes.
a. Technology Boundary : This typically involves different types of
switching technologies i.e. Packet, OTN, DWDM. These technologies are
also known as client or server technologies. Client technologies are
typically enabled by Packet, OTN switching, while server technologies
are enabled by OTN, DWDM technologies.
b. Administrative Boundary: This boundaries are enforced by
administrative contracts that bars exchange of routing information
for operational reasons, hence creating a need for special mechanism
that facilitates circuit provisioning in such environment.
Customer and Provider domains are the examples of distinct
administrative domains.
Intersecting a and b will give us following unique network
configurations
UseCase i : Tech boundary coincides with administrative boundary
UseCase ii : Tech boundary is part of provider domain
UseCase iii : stacking of UNI interfaces in provider domain.
Bardalai et.al Expires April 17, 2014 [Page 3]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
following section discuss these usecases in more detail.
3. Network Configuration Usecases
In this section, ONI, overlay network interface terminology is
used to indicate the administrative boundary that imposes
restriction on routing information exchange.Client layer is assumed
to be using packet/OTN technologies while server layer could be
Packet,OTN, DWDM etc. the technology transition could be in
customer or provider network.
C is referred to as customer network node and P is referred to as
provider network node. CE is referred to as Customer Edge and PE
is referred to as Provider edge.
3.1 ONI is located between CE-PE nodes.
|<----------------- Client Layer LSP -------------------->|
| |
| |<========= Overlay FA-LSP ============>| |
| | | |
| | |<- Server Layer LSP -->| | |
V V ONI | | V V
+---+ __ +---+ | V _ _ V +---+ __ +---+
| |/ \| | V +---+ _/ \_ +---+ _/ \_ +---+ | |/ \| |
|C1 | |CE1|---| |/ \| |/ \| |---|CE2| |C2 |
| |\__/| | | | | | | | | |\__/| |
+---+ +---+ | | | | | | +---+ +---+
|PE1| |P1 | |PE2|
+---+ __ +---+ | | | | | | +---+ __ +---+
| |/ \| | | | | | | | | |/ \| |
|C3 | |CE3|---| |\_ _/| |\_ _/| |---|CE4| |C4 |
| |\__/| | +---+ \_/ +---+ \_/ +---+ | |\__/| |
+---+ +---+ +---+ +---+
Figure. 1
Here server layer is assumed to be OTN/DWDM. There are couple of
scenarios possible here :
i. CE-PE link could be Packet Link, so layer transition from
Packet to OTN/DWDM will happen in PE node ii. CE-PE link could
be OTN/DWDM link, so layer transition from packet to OTN/DWDM
will happen in CE node
3.2 ONI is located between CE and PE nodes.
Bardalai et.al Expires April 17, 2014 [Page 4]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
|<----------------- Client Layer LSP -------------------->|
| |
| |<========= Overlay FA-LSP ============>| |
| | | |
| | Server Layer | |
| | |<-- LSP -->| | |
V V ONI | | V V
+---+ __ +---+ | _ V _ V +---+ __ +---+
| |/ | | V +---+ _/ \_ +---+ _/ \_ +---+ | |/ \| |
|C1 | |CE1|---| |/ \| |/ \| |---|CE2| |C2 |
| |\__/| | | | | | | | | |\__/| |
+---+ +---+ | | | | | | +---+ +---+
|PE1| |P1 | |PE2|
+---+ __ +---+ | | | | | | +---+ __ +---+
| |/ \| | | | | | | | | |/ \| |
|C3 | |CE3|---| |\_ _/| |\_ _/| |---|CE4| |C4 |
| |\__/| | +---+ \_/ +---+ \_/ +---+ | |\__/| |
+---+ +---+ +---+ +---+
Figure. 2 In Figure 2, the Packet
switching continues from cutomer to provider network and
transitions to OTN/DWDM at P1. This kind of configuration is
possible in multi-party client and server network, where the
provider operates multi-layer network and provide services to its
customers.
3.3 Nested ONIs
This is multi-layer network having ONIs between CE and PE, and also
between PE and PE (PE2/4 - PE5)
|<----------------------- Client Layer LSP -------------------->|
| |
| |<============== Overlay FA-LSP ===============>| |
| | | |
| | |<------ Server Layer LSP ----->| | |
V V ONI | | V V
+---+ _ +---+ | V _ _ V +---+ _ +---+
| |/ \| | V +---+ _/ \_ +---+ +---+ _/ \_ +---+ | |/ \| |
|C1 | |CE1|---| |/ \| | | |/ \| |---|CE2| |C2 |
| |\_/| | |PE1| D-1 |PE2|---| | | | | |\_/| |
+---+ +---+ /| |\_ _/| | | | | | +---+ +---+
| +---+ \_/ +---+ | | | |
| _ | |PE5| D-3 |PE6|
| +---+ _/ \_ +---+ | | | |
+---+ _ +---+ | | |/ \| | | | | | +---+ _ +---+
| |/ \| |/ |PE3| D-2 |PE4|---| | | | | |/ \| |
|C3 | |CE3|---| |\_ _/| | ^ | |\_ _/| |---|CE4| |C4 |
| |\_/| | +---+ \_/ +---+ | +---+ \_/ +---+ | |\_/| |
+---+ +---+ | +---+ +---+
Bardalai et.al Expires April 17, 2014 [Page 5]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
ONI
Figure. 3
Because of multiple server layer technologies, it is possible that
a layer closer to packet layer is digital (OTN), which is supported
by pure optical layer (DWDM) to achieve better aggregation and
improved restoration and protection capabilities.
In this configuration it is assumed that digital layer is playing
dual role of customer to provider of optical layer and provider to
customer that operates packet layer. In figure 3, domains D-1 and D-
2 can be assumed to be digital layer, which is interfacing with
packet layer through ONI between PE and CE. Digital domains D-1 and
D-2 are also interfacing with optical D-3, again through ONI. If OTN
and DWDM multi-layer network belongs to same IGP, then this becomes
a multi-layer path-computation and signaling case, and it is out of
scope of this document.
4. Path Computation Use-cases
In case of overlay networks it is required to compute a path between
the customer edge nodes for the overlay FA-LSP as shown in the figure
4.
|<========= Overlay FA-LSP ============>|
| |
V V
+---+ __ +---+ _ _ +---+ __ +---+
| |/ \| | +---+ _/ \_ +---+ _/ \_ +---+ | |/ \| |
|C1 | |CE1|---| |/ \| |/ \| |---|CE2| |C2 |
| |\__/| | | | | | | | | |\__/| |
+---+ +---+ | | | | | | +---+ +---+
|PE1| |P1 | |PE2|
+---+ __ +---+ | | | | | | +---+ __ +---+
| |/ \| | | | | | | | | |/ \| |
|C3 | |CE3|---| |\_ _/| |\_ _/| |---|CE4| |C4 |
| |\__/| | +---+ \_/ +---+ \_/ +---+ | |\__/| |
+---+ +---+ +---+ +---+
Figure. 4
The typical path computation use-cases are the following:
1. Point-to-point overlay path.
2. Multiple point-to-point diverse overlay paths sharing common LSP
head and tail ends.
Bardalai et.al Expires April 17, 2014 [Page 6]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
3. Multiple point-to-point diverse overlay paths that do not share
common LSP head and tail ends.
4. Point-to-multipoint overlay paths.
5. Overlay paths over multi-domain (i.e. Multi-area or multi-AS)
provider networks.
The typical TE constraints are:
1. Bandwidth or resource (this is technology specific).
2. Include or exclude nodes/links/SRLG or paths identified by
path-keys.
3. Latency, jitter, max-hop requirements.
4. Optimization options - minimize cost, minimize latency etc.
5. Path Computation Approaches
There are three path computation approaches
1. Virtual-topology approach
2. PCE approach
3. Hybrid approach - combined virtual topology and PCE approach
Bardalai et.al Expires April 17, 2014 [Page 7]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
5.1 Virtual Topology Approach
This path computation approach uses a virtual topology that is
advertised by the provider network by the customer edge nodes.
Customer Network Customer Network
Island 1 Island 2
__ __
/ \ Virtual Links / \
C1 < > CE1-----------PE1======== =========PE3------ CE3 < >C5
\C3/ ++++ \/ ++++++ \C4/
/ \ + /\ + / \
C2 < > CE2-----+---- PE2======== =========PE4-+-----CE4 < >C6
\__/ +++ + + + \__/
----------------- +--+----------------------------+----+-------
+ + ____ ____ + +
+ + / \ / \ + +
+ ++ PE1 < >P1< >PE3++ +
+ \_P3_/ \_P4_/ +
Provider + / \ / \ +
Network ++++++ PE2< >P2< >PE4+++++++
\____/ \____/
Figure. 5
In Figure 5, Provider Network has 4 interconnected rings supports
full node diversity to connect any 2 Provider Edge Nodes.
PE1, PE2, PE3, PE4 are provider edge nodes.
P1, P2, P3, P4 are internal provider Network nodes, that must not be
known to the customer network.
Customer Network has two islands connected by provider network.
C1, C2, C3, C4, C5, C6 are internal customer network nodes.
CE1, CE2, CE3, CE4 are customer network edge nodes connected to
provider network edge nodes PE1, PE2, PE3, PE4.
Virtual Link Set : Virtual Link set is defined as set of one or more
virtual links between any two provider edge nodes. The virtual links
in the virtual link set, when realized may take different paths
within provider domain, having different SRLGs and other TE metrics.
Above example topology has following Virtual Link Sets
a/ [PE1, PE2]
b/ [PE1, PE3]
c/ [PE1, PE4]
d/ [PE2, PE3]
Bardalai et.al Expires April 17, 2014 [Page 8]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
e/ [PE2, PE4]
f/ [PE3, PE4]
The PEs in provider network do full peering with its attached CEs for
virtual topology. So provider network virtual Links along with its
SRLG IDs and other TE metrics are advertised into customer network.
Customer network internal Nodes C1..C6 can see provider network
virtual TE Links and can compute paths between two points in customer
network islands across provider network satisfying required diversity
and TE metrics.
5.2 PCE Approach
An alternative approach for a CE node to obtain a path to another
remote CE node would be by making a request to a provider network
PCE. This approach requires either provider network PE nodes to
advertise the PCE's IP address to CE nodes or CE Nodes should be
configured with Provider Network PCE IP address. CE nodes needs to
advertise the TE link-state of the CE-PE interface. This allows the
PCE to build the overlay network topology link-state data-base.
In Figure. 1 above, the example depicted shows the provider network
with a single IGP area and the provider network PCE has visibility to
the detailed topology and TE information representing the server
layer forwarding plane plus the CE-PE interface link-states that have
been learned from the CE nodes. The server layer topology in addition
to the CE-PE interface link-states constitutes the overlay network
topology.
Figure. 2 above shows the case in which the provider network is a
multi-layer network and the server layer boundary does not coincide
with the provider network boundary. Again, the provider network PCE
can have visibility to a single IGP area as described for MLN or
alternatively there could be multiple IGP instances as described in
[RFC6107], one instance for the overlay network and another instance
for the server layer.
Figure. 3 above shows a multi-area or multi-AS provider network
(generalized as a multi-domain provider network in this document).
For multi-domain networks a hierarchical PCE could be deployed and
the IP address of the hierarchical PCE is advertised to the CE nodes.
The hierarchical PCE could maintain a multi-domain virtual topology
instead of detailed topology of each domain.
In all three cases the head-end CE node is assumed to be aware of the
address in the remote CE node for which the path is to be computed.
Bardalai et.al Expires April 17, 2014 [Page 9]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
The exact manner by which this knowledge becomes available is beyond
the scope of this document. The head-end CE node then makes a request
to the provider network PCE with the remote address and the required
set of TE constraints that need to be satisfied by the computed
path.
In each case of the provider networks PCE uses the overlay network
topology to compute the path. In case of the provider network example
shown in Figure. 4 the hierarchical PCE computes the domain-level or
inter-domain path first and then computes the intra-domain paths. The
exact mechanism could be using the BRPC procedure in order to compute
optimal intra-domain paths.
Once the computation is complete the PCE responds back with the path.
The path generated by the PCE is expected to contain both real and
virtual links and nodes. In case there is a need to maintain
confidentiality with respect to the details of the provider network
topology from the customer network then the response can include a
path-key. In case there is a need to compute diverse paths one of two
approaches could be followed - simultaneous computation approach in
which case the response will have multiple paths or path-keys or the
request could include the exclude hops or exclude path-key.
In the example below the procedure of computing a set of diverse
paths using the PCE approach is explained.
|<------------------ Client Layer LSP -------------------->|
| |
| |<=========== Overlay FA-LSP ===========>| |
| | | |
| | Server | |
| | RSVP-TE|<-----Layer LSP-------->| | |
V V PCEP | | V V
+---+ __ +---+ | V _ _ V +---+ __ +---+
| |/ \| | V +---+ _/ \_ +---+ _/ \_ +---+ | |/ \| |
|C1 | |CE1|---| |/ \| |/ \| |---|CE2| |C2 |
| |\__/| | |PE1| | | |PE2| | |\__/| |
+---+ +---+ +---+ | | +---+ +---+ +---+
| |P1 | |
+---+ __ +---+ +---+ | | +---+ +---+ __ +---+
| |/ \| | | | | | | | | |/ \| |
|C3 | |CE3|---|PE3|\_ _/| |\_ _/|PE4|---|CE4| |C4 |
| |\__/| | +---+ \_/ +---+ \_/ +---+ | |\__/| |
+---+ +---+ +---+ +---+
Figure. 6
Bardalai et.al Expires April 17, 2014 [Page 10]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
Step-1: CE1 requests computation of diverse paths between PE1-PE2 and
PE3-PE4.
Step-2: PE1 responds with 2 sets of EROs or 2 path-keys.
Step-3: CE1 initiates signaling of LSP PE1-PE2 with ERO or path-key.
Step-4: ERO or path-key is transferred to CE3.
Step-5: CE3 initiates signaling of LSP PE3-PE4 with ERO or path-key.
This approach uses a single computation for a pair of diverse paths.
An alternative approach is by computing diverse paths separately as
follows:
Step-1: CE1 requests computation of a path between PE1-PE2.
Step-2: PE1 responds with a set of EROs or a path-key.
Step-3: CE1 initiates signaling of LSP PE1-PE2 with ERO or path-key.
Step-4: PE1-PE2 path ERO or path-key is transferred to CE3.
Step-5: CE3 request computation of a path between PE3-PE4 with XRO(=
PE1-PE2 ERO or path-key).
Step-6: PE3 responds with a set of EROs or path-key.
Step-7: CE3 initiates signaling of LSP PE3-PE4 with ERO or path-key.
5.3 Hybrid Approach
In the absence of a hierarchical PCE for a multi-domain provider
network, it is possible a CE node learns of multiple PCE IP addresses
from multiple PE nodes. This is possible in case each PE node lies in
separate areas or ASs and with PCEs deployed per-area or per-AS. In
such a situation it will be necessary for the CE node to pick one of
the PCEs to send the path computation request. One way to select the
appropriate PCE would be to advertise a virtual-topology associated
with each PCE IP address to provide sufficient information for the CE
node to determine whether a path to the remote CE address can be
computed by the specific PCE.
In Figure. 4 above, CE3 has a dual-homed connectivity with the multi-
domain provider network (i.e. CE3 to D-1 and D-2 via PE1 and PE3
Bardalai et.al Expires April 17, 2014 [Page 11]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
respectively). In the absence of a hierarchical PCE, PE1 can
advertise a virtual topology with connectivity to a set of CE nodes.
Similarly PE3 advertises a virtual topology with connectivity to
another set of CE nodes. This can happen in cases when there is no
available bandwidth to a specific CE node via a specific domain. CE3
can determine using the virtual topologies which PCE should it send
the path computation request.
6. CE-PE / PE-PE Interface
The CE-PE or PE-PE interface requires a routing interface in order to
be able to exchange topology information and a path-computation
interface in order to be able to send path computation requests and
responses. For signaling the overlay LSP a signaling interface is
requried as well.
7 Security Considerations
TBD
8 IANA Considerations
TBD
9 References
9.1 Normative References
[KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC1776] Crocker, S., "The Address is the Message", RFC 1776, April
1 1995.
[TRUTHS] Callon, R., "The Twelve Networking Truths", RFC 1925,
April 1 1996.
9.2 Informative References
[EVILBIT] Bellovin, S., "The Security Flag in the IPv4 Header",
RFC 3514, April 1 2003.
[RFC5513] Farrel, A., "IANA Considerations for Three Letter
Acronyms", RFC 5513, April 1 2009.
[RFC5514] Vyncke, E., "IPv6 over Social Networks", RFC 5514, April 1
Bardalai et.al Expires April 17, 2014 [Page 12]
INTERNET DRAFT draft-bardalai-ccamp-overlay-path-comp-02October 14, 2013
2009.
Authors' Addresses
Snigdho Bardalai
sbardalai@infinera.com
Rajan Rao
rrao@infinera.com
Khuzema Pithewan
kpithewan@infinera.com
Bardalai et.al Expires April 17, 2014 [Page 13]