Internet DRAFT - draft-cheng-supa-ddc-use-cases
draft-cheng-supa-ddc-use-cases
Network Working Group Y. Cheng
Internet-Draft China Unicom
Intended status: Informational D. Zhang
Expires: December 30, 2015 Aliababa Group
JF. Tremblay
Viagenie
S. Zhu
Alibaba Group
J. Bi
Tsinghua University
L. M. Contreras
Telefonica I+D
June 30, 2015
Use Case for Distributed Data Center in SUPA
draft-cheng-supa-ddc-use-cases-08
Abstract
Large scale Distributed Data Centers (DDCs) can provide various
services and usually consist of numbers of internal and external
links where various VPNs are built upon. The Service provisioning
and network connectivity configurations could be complex and dynamic,
and manual configuration is onerous and error-prone. This draft
analyzes the use cases in DDCs, in which some VPN scenarios are
covered, and the applicability of Simplified Use of Policy
Abstractions (SUPA) data models which can be used for better and
automated resource usage and easy service/network deployment/
configuration.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 6, 2015.
Cheng, et al. Expires December 6, 2015 [Page 1]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Challenges Faced by Data Center ISPs . . . . . . . . . . . . 4
5. SUPA Benefits . . . . . . . . . . . . . . . . . . . . . . . . 4
6. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 5
6.1. Scenario:Inter DC Connectivity . . . . . . . . . . . . . 5
6.2. Scenario:vDC Connectivity . . . . . . . . . . . . . . . . 8
6.3. Scenario:Dynamic Link Configuration for DC . . . . . . . 11
6.4. Scenario:DC Connectivity for Virtual Private Clouds (VPC) 12
7. Security Considerations . . . . . . . . . . . . . . . . . . . 14
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15
10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 15
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 15
11.1. Normative References . . . . . . . . . . . . . . . . . . 15
11.2. informative References . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16
1. Introduction
The SUPA (Simplified Use of Policy Abstractions) work aims at
providing data models, including network service data models, policy
data models, to easily, accurately, and efficiently select and use
the available communication network capabilities. An example of the
data model can be found in
[I-D.zaalouk-supa-vpn-service-management-model]. Service Manager
(SM) is used by an a communications service provider and/or operator
to deploy and manage services on top of network facilities. An
example of SM is a set of applications used by an Operational Support
System (OSS) entity to perform network configuration. Several SUPA
Cheng, et al. Expires December 6, 2015 [Page 2]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
use cases have been introduced in the problem statement document.
This document reviews various scenarios for Distributed Data Center
(DDC) use case.
A large-scale Distributed Data Center (DDC) operator may have to
maintain multiple data centers and the inter-connecting networks in
order to provide server hosting, leased line, and value-added
services to enterprises and ISPs, and have multiple data centers. In
this DDC network, traffic at each site is routed via configuring
policy routes and the operator may be able to adjust routes
prioritization to choose an outgoing link. This type of static
provisioning comes with high costs and poor operability,and as
a result the bandwidth resources intra/inter-data centers are not
efficiently utilized.
In quite a few scenarios, the links between DCs are VPNs (MPLS, SSL,
IPsec, and etc.). SUPA will be mainly used for those VPN
configurations. Although there may be some cases where physical
links are used, but those are out of the scope of this draft.
DC and network may belong to different operators. If a DC operator
needs to configure network connectivity for DCs, it may need to
cooperate with network operators providing such connectivity.
Network operators can define and provide data models to enable this.
This document illustrates several distributed datacenter (DDC)
applications and explains how an operator could use SUPA to provide
these applications.
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Terminology
The terminology used in the SUPA problem statement draft
[I-D.zhou-supa-framework] and
[I-D.karagiannis-supa-problem-statement] apply also to this draft.
DC Data Center
DDC Distributed Data Center
ECA Event Condition Action
NM/NC Network Manager / Controller
Cheng, et al. Expires December 6, 2015 [Page 3]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
OSS Operational Support System
SM Service Manager
SUPA Simplified Use of Policy Abstractions
TTM Time to Market
VAS Value Added Service
vDC virtual Data Center
VPC Virtual Private Cloud (PC)
4. Challenges Faced by Data Center ISPs
There are many challenges in traditional DDCs:
1. The infrastructure and network links rent from other operators,
are normally dependent on manual planning and design, which leads
to inflexibility and low efficiency of resource usages. SUPA can
benefit the DDC operators to manage the network resources rent
from others in a more flexible way.
2. Service expansion is limited in a single physical DC. Each DC
resource is isolated, so service and resource can only be
deployed in one single DC.
3. VAS (Value Added Service) is provisioned via static
configuration, which brings complex training, long service TTM
time and poor flexibility. This could not meet the requirements
of complex use cases, e.g., lot of VAS devices, significant
differences between various services.
5. SUPA Benefits
There are requirements from DDC operators to optimize and automate
the service deployment. Also, a tenant may expect the traffic
steering capabilities in order to use the rent links more
efficiently. SUPA can show its advantages in above cases since it is
able to:
o Support an open network architecture: standardizaed data models
enable an open architecture and make it possible for unified
service / network planning, which can interconnect with third
party cloud platform, supporting fast service innovation.
Cheng, et al. Expires December 6, 2015 [Page 4]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
o Support overall DC resource integration: SUPA data models can be
used for network resource virtualization; inter-DC resource,
virtual DC (vDC) resource, etc, can be integrated and controlled
by a centralized functional entity.
o Support automatic E2E service delivery: Network (including virtual
network), computing, inter-DC management of storage resource,
automatic service delivery, automatic VPN connection
configurations between DCs, which improves operation efficiency.
o Improve DDC network usage by means of Intelligent scheduling of
DDC traffic, improving link usage.
o Support VAS service on-demand provisioning automatically: Create
or delete VAS nodes on-demand, based on various service
requirements; network forwarding policy based on the VAS routing,
to achieve automatic draining and automatic configuration of VAS
device policy.
Please refer to [I-D.zhou-supa-framework] and other SUPA related
documents for more details of SUPA features.
The following sections will illustrate three typical cases in
distributed data center which could benefit from SUPA architecture.
6. Scenarios
In the following uses, Service Manager (SM) is used for service and
policy definition; and Network Manager (Controller) is used for
network topology maintenance and mapping data models to detail
network configurations, as defined in [I-D.zhou-supa-framework].
6.1. Scenario:Inter DC Connectivity
Cheng, et al. Expires December 6, 2015 [Page 5]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
+---------------------------+
| Service Manager |
| |
| +----------+ +----------+ |
| |Service | |Policy | |
| |Data Model| |Data Model| |
| +----------+ +----------+ |
| |
+---------------------------+
^
|
|
|
v
+--------------------------+
| Network |
| Manager / Controller |
+--------------------------+
/ \
/ \
+---------+ \
/| DC1 |\ \
/ +---------+ \ +-----------+
| | d1 \___a1________| DC-A |
| | | |
| +---------+ +-----------+
d3 | | DC2 |\
| +---------+ \ +-----------+
| | d2 \___a2________| DC-B |
| | ____a3________| |
\ +---------+ / +-----------+
\| DC3 |/
+---------+
Inter DC Connectivity
There can be a number of links between data centers, and the
configuration of such links could complex. As shown in Figure 1,
service data models and policy data models can be defined to automate
the configuration procedures. The service data model for
connectivity is used for specifying attributes of (virtual) links,
e.g. the end points of links, bandwidth, QoS and availability
parameters, etc. The policy model can specify some high level
requirements to the links, like routing strategy (via and not via)
and price/cost strategy. The policy data model can also define the
policy rules that drive the security requirements.
Cheng, et al. Expires December 6, 2015 [Page 6]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
An application example is, the links interconnecting two DCs together
should guarantee a minimum bandwidth, certain QoS parameters, and
provide availability guarantees.
Anothe service policy example in Figure 1, for traffic from DC2 to
DC-B, if the load on a link exceeds a threshold (e.g., 90%), some
(new) traffic can be redirect to another link.
Requirements and configurations derived from above application
scenarios can be described by service data model and policy data
model.
module: ietf-supa-ddc
+--rw ddc-services
+--rw ...... other possible attributes
+--rw ddc-service* [name]
| +--rw name string
| +--rw connection-type? enumeration
| +--rw connection-name string
| +--rw bandwidth uint32
| +--rw latency uint32
+--rw ...... other possible attributes
Service Data Model for Inter DC Connectivity
The above service data model can be used to describe links attributes
for a VPN, including bandwidth , latency, etc.
module: ietf-supa-policy
+--rw supa-policy
+--rw ...... other possible attributes
+--rw supa-policy-atomic
| +--rw supa-ECA-policy-rule
| +--rw policy-rule-name? string
| +--rw has-policy-events? boolean
| +--rw has-policy-conditions? boolean
| +--rw has-policy-actions? boolean
+--rw ...... other possible attributes
ECA Policy Data Model
The above policy data model can be used to describe the requirement
that when the load on a link exceed a threashold. In this case,
Cheng, et al. Expires December 6, 2015 [Page 7]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
"event" is the bandwidth of a link, "condition" is "load >= 80%",
"action" is "redirect some traffic to another link".
module: ietf-supa-policy
+--rw policy-set
+--rw ...... other possible attributes
+--rw policy-rule
+--rw rule-name? string
+--rw rule-type? enumeration
+--rw policy-rule-priority? uint8
+--rw intent-policy-rule
| +--rw desired-state
| | +--rw constraint? string
| | +--rw constraint-priority? uint8
| +--rw behavior-constraint
| +--rw constraint? string
| +--rw constraint-priority? uint8
+--rw ...... other possible attributes
Policy Data Model for high level requirements
The policy model shown above can be used to express some
sophisticated requirements, e.g. the number of hop of any link should
be less than 5, or any links should not share any network nodes in
between and should be completely independent to each other so as to
achieve high availablity in case of network node failure.
Inter DC connections can be classified into two types: connections
within a single administrative domain and connections across multiple
administrative domains. Links d1, d2 and d3 are within an
administrative domain; and links a1, a2 and 3 are across domains.
The difference between them is that connections across multiple
administrative domain require extra negotiation and authentication/
authorization, which can be achieved via communications between SMs.
Data models for this purpose should also be defined.
6.2. Scenario:vDC Connectivity
+---------------------------+
| Service Manager |
| |
| +----------+ +----------+ |
| |Service | |Policy | |
| |Data Model| |Data Model| |
| +----------+ +----------+ |
| |
Cheng, et al. Expires December 6, 2015 [Page 8]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
+---------------------------+
^
|
|
|
v
+--------------------------+
| Network |
| Manager / Controller |
+--------------------------+
/ | \
/ | \
/ | \
/ +-------------------+ \
/ | DC2 | \
/ | +---------------+ | \
/ | |Tenant1 (vDC) | | \
/ | +---------------+ | \
/ | | \
/ | +---------------+ | \
/ | | Tenantn (vDC) | | \
| | +---------------+ | |
| +-------------------+ |
| |vDC link |
| +-------------+ |
| | | |
| /| Cloud |\ |
| / +-------------+ \ |
| vDC link / \vDC link|
| / \ |
+-------------------+ +-------------------+
| DC1 | | DC3 |
| +---------------+ | | +---------------+ |
| | Tenant1 (vDC) | | | | Tenant1 (vDC) | |
| +---------------+ | | +---------------+ |
| | | |
| +---------------+ | | +---------------+ |
| | TenantK (VDC) | | | | TenantN (vDC) | |
| +---------------+ | | +---------------+ |
+-------------------+ +-------------------+
vDC Connectivity
A DC tenant may have resources, e.g. network, computing, storage,
etc, in multiple physical DCs. DC operators will provide internal
network connectivity for these distributed resources, and make it
Cheng, et al. Expires December 6, 2015 [Page 9]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
look like one seamless entity, which can be called as virtual DC
(vDC).
The internal links for vDC can be implemented via tunneling overlay
technologies, e.g. VPN or VxLAN, etc. The tunnels need to be
dynamically established, managed and released.
As show in Figure 5, service data model and policy data model can be
defined to automate the links configuration for vDCs. A service data
model should specify the attributes of the tunnels, e.g., bandwidth,
QoS and availability parameters. Policy systems can dynamically
scale the DC resources assigned to a tenant, and the policy rules
that drive the prioritization of resource assignments. The
networking resources assigned to a tenant should scale proportionally
to the compute resources assigned to a tenant. The traffic should be
prioritized to resources owned by tenants that offer interactive
services according to the time zone the DC is located in. Because a
DC serving enterprise may require higher priority in working hour,
and a DC providing entertainment service may need higher network
priority in non-working hours.
module: ietf-supa-policy
+--rw supa-policy
+--rw ...... other possible attributes
+--rw supa-policy-validity-period
| +--rw start? yang:date-and-time
| +--rw end? yang:date-and-time
| +--rw duration? uint32
| +--rw periodicity? enumeration
+--rw supa-policy-atomic
| +--rw supa-ECA-policy-rule
| +--rw policy-rule-name? string
| +--rw has-policy-events? boolean
| +--rw has-policy-conditions? boolean
| +--rw has-policy-actions? boolean
+--rw ...... other possible attributes
Policy Data Model for vDC Connectivity
In the above policy data model, events and conditions may not be
necessary; the actions will be based on the time; and two actions
will be required: set the VPN priority to low or high.
Cheng, et al. Expires December 6, 2015 [Page 10]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
6.3. Scenario:Dynamic Link Configuration for DC
Static and over provisioning for DC links is not always a good
solution. Sometimes dynamic configuration is necessary.
+---------------------------+
| Service Manager |
| |
| +----------+ +----------+ |
| |Service | |Policy | |
| |Data Model| |Data Model| |
| +----------+ +----------+ |
| |
+---------------------------+
^
|
|
|
v
+--------------------------+
| Network |
| Manager / Controller |______________
+--------------------------+ \
/ \ \
/ \ \
/ \ |
+--------------+ +-------------------+ |
| | | | |
| | | DC2 |
| |--------------- | | |
| DC1 | +-------------------+ |
| | |
| | \ |
| | \ +-------------------+ |
| | \ | | /
| | \__________| DC2 |/
+--------------| | |
+-------------------+
Dynamic Link Configuration for DC
One case is virtual machine migration and large amount of data
transfer between DCs. But this kind of activity does not happen
frequently. A dedicated link with constant bandwidth for this
purpose is too expensive. The network operator should allow the DC
operator to create a link on demand when necessary. This link may
Cheng, et al. Expires December 6, 2015 [Page 11]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
have large bandwidth but last for a limited time period. An
alternative is to create short-term dedicated links for backups and
migrations.
As shown in Figure 7, data models can help to automate these kind of
configurations. In the data models, the attributes of links
(bandwidth, QoS and availability parameters) should be specified.
The policy concerning strict and soft bounds on the lifetime of such
links, and the policy concerning the scheduling of dedicated links
(e.g., based on the current load) and the services using the
dedicated links can also be specified.
When the traffic volume between DCs exceeds a certain threshold, the
policy-driven service manager requests that traffic schedules may be
adjusted within bounds in order to balance load on the links (e.g.,
delay backups and migrations until the network has the necessary
capacity).
In this case, the ECA policy model will apply, but the action is
different -- change the bandwidth of link(s) with time period
constraints, as shown in Figure6.
6.4. Scenario:DC Connectivity for Virtual Private Clouds (VPC)
Cheng, et al. Expires December 6, 2015 [Page 12]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
+---------------------------+
| Service Manager |
| |
| +----------+ +----------+ |
| |Service | |Policy | |
| |Data Model| |Data Model| |
| +----------+ +----------+ |
| |
+---------------------------+
^
|
|
|
v
+--------------------------+
| Network |
| Manager / Controller |______________
+--------------------------+ \
/ \ \
/ \ \
/ \ |
+-------------------+ +-------------------+ |
| DC3 | | | |
| +---------------+ | VPN | DC1 (Database) | |
| | VPC1 |-----------------| | |
| +---------------+ \ +-------------------+ |
| +---------------+ |\ |
| | VPC2 | | \ |
| +---------------+ | \ +-------------------+ |
| +---------------+ | \ VPN | | /
| | ...... | | \__________| DC2 (Storage) |/
| +---------------+ | | |
+-------------------+ +-------------------+
VPC to DC Connectivity
In practice, a public cloud operator can virtualize its cloud
resources into different isolated virtualized private clouds and
provided them for different tenants. Such a virtualized private
cloud is referred to as a VPC. In a typical VPC provided by, e.g.,
Alibaba or Amazon, through the control portal, a tenant can establish
and manage its network easily, for instance, deploying or removing
virtualized network devices (e.g., virtualized routers and
virtualized switches), adjusting the topology of VPC
networks,specifying packet forwarding policies, and deploying or un-
deploying virtual services (e.g., load balancers, firewalls,
databases, DNS, etc.). The network functionalities that the tenant
can accessed are virtualized and actually performed by the VMs
Cheng, et al. Expires December 6, 2015 [Page 13]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
located on the servers connected through physical or overlay
networks. Note that the servers may be located in different data
centers which are geographically distributed.
The manipulation of the virtualized VPC network may also affect the
configuration of physical networks. For instance, when a tenant
newly deploys two VMs in its VPC which are located in different DCs,
the VPC control mechanism may have to generate a VPN between two DCs
for the internal VPC communication. Therefore, the control mechanism
for a VPC should be able to adjust the underlying network when a
tenant changes the network or service deployment of the virtual VPC
network.
In many cases, a tenant may need to specify how the VPCs is connected
to its enterprise cloud networks. For instance, a tenant may want to
deploy multiple VPNs to connect the VPC with its private cloud
networks and specify the policies to steer the traffics through
different VPNs in different conditions. Note that the VPCs that the
tenant may be located in different geographic regions, and the VPNs
to those VPCs may need to be generated at run time.
In addition, a VPC, often provides other value added services (e.g.,
database Services, DNS) for VMs in certain VPCs. The VMs and the
value added services could be located in different DCs, or even
provided by different vendors. VPNs are configured for the VPCs to
provide connection to the internal services, and to create and manage
VPNs to internal services. The access of VMs to data resources
should be controlled. For instance, the VMs in a VPC can access the
database services only when the tenant has deployed database into its
VPC through the control portal.
As shown in figure 4, service data models and policy data models can
be defined to automate the configurations of links between VPC and DC
where service is located. The data models should specify the policy
controlling authentication and authorization concerning access to
data residing in internal services.
7. Security Considerations
Security is a key aspect of any protocol that allows state
installation and extracting of detailed configuration states. More
investigation remains to fully define the security requirements, such
as authorization and authentication levels.
Cheng, et al. Expires December 6, 2015 [Page 14]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
8. IANA Considerations
Not applicable.
9. Acknowledgements
The authors of this draft would like to thank the following persons
for review, discussion, and valuable comments: Cathy Zhou, Georgios
Karagiannis, Scott O. Bradner, James Huang, Bob Natale.
10. Contributors
The following persons contribute use case and text to this draft, and
are listed below:
Scott O. Bradner
sob@sobco.com
Dacheng Zhang
dacheng.zdc@alibaba-inc.com
11. References
11.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
11.2. informative References
[I-D.karagiannis-supa-problem-statement]
Karagiannis, G., Qiong, Q., Contreras, L., Yegani, P., and
J. Bi, "Problem Statement for Simplified Use of Policy
Abstractions (SUPA)", draft-karagiannis-supa-problem-
statement-06 (work in progress), March 2015.
[I-D.zaalouk-supa-vpn-service-management-model]
Zhang, D., Zaalouk, A., Pentikousis, K., and Y. Cheng,
"VPN Service Management YANG Data Model", draft-zaalouk-
supa-vpn-service-management-model-03 (work in progress),
April 2015.
[I-D.zhou-supa-framework]
Zhou, C., Contreras, L., Qiong, Q., and P. Yegani, "The
Framework of Simplified Use of Policy Abstractions
(SUPA)", draft-zhou-supa-framework-01 (work in progress),
February 2015.
Cheng, et al. Expires December 6, 2015 [Page 15]
Internet-Draft Use cases for DDC Applications in SUPA June 2015
Authors' Addresses
Ying Cheng
China Unicom
P.R. China
Email: chengying10@chinaunicom.cn
Dacheng Zhang
Aliababa Group
Email: dacheng.zdc@alibaba-inc.com
JF Tremblay
Viagenie
Email: jean-francois.tremblay@viagenie.ca
Shunmin zhu
Alibaba Group
Email: jianghe.zsm@taobao.com
Jun Bi
Tsinghua University
Bei Jing
China
Email: junbi@cernet.edu.cn
Luis M. Contreras
Telefonica I+D
Ronda de la Comunicacion, Sur-3 building, 3rd floor
Madrid 28050
Spain
Email: luismiguel.contrerasmurillo@telefonica.com
Cheng, et al. Expires December 6, 2015 [Page 16]