Internet DRAFT - draft-huang-i2rs-mpls-te-usecases
draft-huang-i2rs-mpls-te-usecases
Routing Area Working Group T. Huang
Internet-Draft Z. Li
Intended status: Informational S. Hares
Expires: January 5, 2015 Huawei Technologies
July 4, 2014
Use Cases for an Interface to MPLS TE
draft-huang-i2rs-mpls-te-usecases-02
Abstract
Network services based on Virtual Networks (VN) or Virtual Circuits
(VC) may be run over MPLS-TE links, and support network
configurations such as hub-spoke, service routing, or on-demand
networks. An MPLS Traffic Engineering(TE) network is typically
configured and the results of its operation analyzed through network
management interfaces (CLI, SNMP or NETCONF). These interactions
control each of the MPLS TE links, and diagnose operations issues
concerning link configuration, MPLS TE protection, and traffic
switching-over. The network management functions also monitor MPLS
TE links and provide fault detection.
The Interface to the Routing System (I2RS) (draft-ietf-i2rs-
architecture) programmatic interface to the routing system provides
an alternative way to control the configuration and diagnose the
operation of MPLS links. I2RS may be used for the configuration,
manipulation, polling, or analyzing MPLS TE. This document describes
a set of use cases for which I2RS can be used for MPLS TE. It is
intended to provide a base for a solution draft describing I2RS
information models and protocol functions that will support virtual
networks that utilize MPLS TE.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
Huang, et al. Expires January 5, 2015 [Page 1]
Internet-Draft I2RS MPLS LDP July 2014
This Internet-Draft will expire on January 5, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. I2RS Requirements from the MPLS TE Use cases . . . . . . . . 3
3. MPLS TE Configuration . . . . . . . . . . . . . . . . . . . . 5
3.1. Static CR-LSP Configuration . . . . . . . . . . . . . . . 5
3.2. RSVP-TE Policy Configuration . . . . . . . . . . . . . . 6
4. MPLS TE Protection . . . . . . . . . . . . . . . . . . . . . 6
5. MPLS TE Traffic Switch Overs . . . . . . . . . . . . . . . . 7
5.1. Failure Detection . . . . . . . . . . . . . . . . . . . . 7
5.2. Network Upgrading . . . . . . . . . . . . . . . . . . . . 7
5.3. Handling Node Overload . . . . . . . . . . . . . . . . . 8
6. Monitoring of MPLS TE . . . . . . . . . . . . . . . . . . . . 8
6.1. Performance Monitoring . . . . . . . . . . . . . . . . . 8
6.2. Fault Monitoring . . . . . . . . . . . . . . . . . . . . 9
6.3. LSP Monitoring . . . . . . . . . . . . . . . . . . . . . 9
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
8. Security Considerations . . . . . . . . . . . . . . . . . . . 10
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 11
9.1. Normative References . . . . . . . . . . . . . . . . . . 11
9.2. Informative References . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12
1. Introduction
Network services based on Virtual Networks (VN) or Virtual Circuits
(VC) may be run over MPLS-TE links, and support network
configurations such as hub-spoke, service routing, or on-demand
networks. Typically, MPLS TE networks are configured and results of
its operation analyzed through network management interfaces (CLI,
SNMP or NETCONF). These interactions to control MPLS TE links and
Huang, et al. Expires January 5, 2015 [Page 2]
Internet-Draft I2RS MPLS LDP July 2014
diagnose their operation encompass: MPLS TE configuration, MPLS TE
protection, traffic switching-over, traffic detection, and fault
detection.
The I2RS architecture and protocol as defined in
[[I-D.ietf-i2rs-architecture]] may be used to control network
protocols like MPLS TE using a set of programmatic interfaces. These
programmatic interfaces allow one I2RS client to control the MPLS TE
network by analyzing its operational state and TE LSP data, plus
manipulating TE LSP's configuration to achieve various goals. I2RS
is not intented to replace any replace any existing network
management or configuration mechanisms, (E.g. Command Line Interface
or NETCONF). Instead, I2RS is intended to augment these existing
mechanisms by defining a standardized set of programmatic interfaces
to enable easier configuration, interrogation, and analysis of the
protocol.
This document describes set of use cases for which I2RS's
programmatic interfaces can be used to control and analyze the
operation of MPLS TE. The use cases described in this document cover
the following aspects of MPLS TE: MPLS TE configuration, MPLS TE
protection, MPLS TE traffic switch-over, monitoring of MPLS TE and
fault detection. The goal is to increase the community's
understanding of where the I2RS MPLS TE extensions fit within the
overall I2RS architecture. It is intended to provide a basis for the
solutions draft describing the set of Interfaces to the MPLS TE.
2. I2RS Requirements from the MPLS TE Use cases
This section summarize the requirements from the MPLS TE use cases.
Each of these requirements has been given an an ID number of MPLS-TE-
REQ-nn for ease of reference. While this summary provides a handy
reference, the reader is advised to review the full details of the
MPLS TE scenario.
The requirements from the Traffic Steering use case are:
o MPLS-TE-REQ-01: Network programming software managing the static
CR-LSP devices may incorporate an I2RS Client along with a path
calculation entity, a label management entity, and a bandwidth
management entity. The I2RS Client should be abl to communicate
the static configuration to the network nodes, and monitor the
status of the CR-LSPs.
o MPLS-TE-REQ-02: The I2Client should be able to synchronously send
the configuration for all of the network nodes from egress node to
ingress node via the I2RS Agents attached to each node, and be
able to delay the final ingress node configuration until all the
Huang, et al. Expires January 5, 2015 [Page 3]
Internet-Draft I2RS MPLS LDP July 2014
I2RS AGents on all other nodes toward the egress have denoted a
successful path set-up.
o [MPLS-TE-REQ-03:] MPLS TE defines abundant constraints such as
explicit path, bandwidth, affinity, SRLG, priority, hop limit, and
others. The I2RS Client Agent exchange should be able to signal
concurrent local path calculation could obtain an optimized result
and allow more services to be held in a TE network. The I2RS
Agent should be able to trigger a global concurrent re-
optimization at a specific time on multiple nodes by communicating
with each node's I2RS agent.
o [MPLS-TE-REQ-04:] The I2RS client should be able to manually
calculate a re-optimization of the the MPLS TE network and send
the new constraints including the calculated path to each node via
the I2RS agent with an indication to re-signal the TE LSPs with
make-before-break method.
o [MPLS-TE-REQ-05] With I2RS, the node's I2RS agent should be able
to send to an I2RS client a status notification that not enough
resources exist for a back up LSP and TE tunnel. Upon receiving
this notification the I2RS client should be able to trigger
concurrent calculation for the failed path calculation of the
backup LSP or TE tunnel and send the updated paths to I2RS agents
with a command to re-signal the TE LSPS with make-before-break
Method.
o [MPLS-TE-REQ-06] With I2RS, upon receipt the failure notification
from an I2RS Agent, the I2RS client would create a global
concurrent optimization to handle the failure event. This would
occur by the I2RS client signalling the I2RS agents on all nodes
to: a) trigger a new concurrent calculation of the backup LSP or
TE tunnel via failed path calculation, and b) re-signal updates to
the TE LSPs process with a make-before-break method.
o [MPLS-TE-REQ-07] Upon receiving a signal an upgrade event signal
(from operator), the I2RS client could calculate another path for
the affected TE tunnels to deviate traffic away from the resource
being upgraded, and then send the request to I2RS agents on the
appropriate nodes to move the traffic. After the upgrade
completes, the I2RS client can simply remove I2RS configurations
causing the traffic to revert to the original path. Or, the I2RS
can re-optimize the TE tunnels for another pathways (E.g. as a
part of a sequence of upgrades).
o [MPLS-TE-REQ-08] I2RS agents can notify I2RS Clients of impending
or existing MPLS TE overload conditions that might cause TE LSP
Huang, et al. Expires January 5, 2015 [Page 4]
Internet-Draft I2RS MPLS LDP July 2014
rejections. This overload conditions include: due to CPU, memory,
LSP label space, or LSP numbers.
o [MPLS-TE-09] Automatic bandwidth adjustment applications can also
be linked to the I2RS clients need to monitor the traffic on TE
tunnels in order to provide traffic analysis. The I2RS client
should be able to read the TE Tunnel topology and the bandwidth
analysis in order to automatically calculate a new path for the TE
tunnel if it is needed. The I2RS Client also needs to be able to
the I2RS agents in the nodes to install the new TE Tunnels with
the make-before-break option.
o [MPLS-TE-REQ-10] With I2RS, the node failure or link failure can
be part of the notification stream sent by an I2RS Agent to an
I2RS Client on a centralized server gathering information.
o [MPLS-TE-REQ-11] The I2RS client can notify the I2RS agents on
specific nodes (or devices) to re-signal TE LSPs one by one if
there is a resource dependency. [MPLS-TE-REQ-12] The I2RS Client
can gather the TE LSPs' state from I2RS Agents on all nodes in
order to coordinate such handling of LSP resources.
o [MPLS-TE-REQ-13] The I2RS Clients collecting information from I2RS
Agents can be arranged in a hierarchy to provide scaling of
collections. An application hosting an I2RS client collecting
information from I2RS Agents on nodes can have an I2RS Agent that
reports combined information to a single location.
3. MPLS TE Configuration
There are two types of TE LSP: static CR-LSP and dynamic TE LSP
created by protocol of RSVP-TE or CR-LDP. Static CR-LSP is
configured with forwarding items such as interface, label and
bandwidth, etc. node by node. Dynamic TE LSP is configured with MPLS
TE parameters which are used to calculate path and set up TE LSP by
protocol. Both configurations are complex.
The following cases will introduce how to improve configuration
efficiency with I2RS and I2RS client.
3.1. Static CR-LSP Configuration
Currently, nodes and interfaces to be configured with a Static CR-LSP
are assigned label and bandwidth values before the static CR-LSP is
configured through some network management configuration interface
(e.g. CLI or NETCONF). Due to this complex configuration, Static
CR-LSP is only used in small, simple topologies with few services.
Huang, et al. Expires January 5, 2015 [Page 5]
Internet-Draft I2RS MPLS LDP July 2014
[MPLS-TE-REQ-01] Network programming software managing the static CR-
LSP devices may incorporate an I2RS Client along with a path
calculation entity, a label management entity, and a bandwidth
management entity. The I2RS Client will communicate the static
configuration to the network nodes, and monitor the status of the CR-
LSPs.
Currently the downloading of CR-LSP forwarding is processed node by
node. When an ingress node finishes download before all other nodes
have completed, the forwarding path will not be set-up and the
traffic will be lost.
[MPLS-TE-REQ-02] With I2RS, the I2RS client may send the
configuration for all of the network nodes from egress node to
ingress node. The final ingress node configuration may delayed until
all other nodes toward the egress have denoted a successful path set-
up.
3.2. RSVP-TE Policy Configuration
MPLS TE defines abundant constraints such as explicit path,
bandwidth, affinity, SRLG, priority, hop limit, and others. A local
path calculation entity would calculate an appropriate path according
to the constraints. It is common knowledge that the calculated
results are closely related with the request order, different
calculation order may have different results. Concurrent calculation
could obtain an optimized result and allow more services to be held
in a TE network.
[MPLS-TE-REQ-03:] With I2RS, an I2RS client could trigger global
concurrent re-optimization at a specific time on multiple nodes by
communicating with each node's I2RS agent.
[MPLS-TE-REQ-04:] Alternatively, the I2RS client could manually re-
optimize the MPLS TE network and send the new constraints including
the calculated path to each node via the I2RS agent with an
indication to re-signal the TE LSPs with make-before-break method.
4. MPLS TE Protection
There are many kinds of protection for MPLS TE, such as TE tunnel
protection, TE LSP protection and TE FRR protection. Further, each
protection may have two methods: 1:1 and 1+1 protection. FRR may
have another two methods: link and node protection. With I2RS, I2RS
client can define the protection mode according to the service
requirement and transmit to the I2RS agent on each node.
Huang, et al. Expires January 5, 2015 [Page 6]
Internet-Draft I2RS MPLS LDP July 2014
In addition, typically when one node's calculations determine that
there is not enough resource for the backup LSP or TE tunnel, it is
usually not true in the distributed network. If the existing LSP or
TE tunnel could be adjusted to bypass some links or nodes, the
necessary resources will be released to provide the backup LSP or TE
tunnel.
[MPLS-TE-REQ-05] With I2RS, the node's I2RS agent can send to an I2RS
client the status notification of not enough resources for back up
LSP and TE tunnel. Upon receiving this notification the I2RS client
could trigger concurrent calculation for the failed path calculation
of the backup LSP or TE tunnel and send the updated paths to I2RS
agents with a command to re-signal the TE LSPS with make-before-break
Method.
5. MPLS TE Traffic Switch Overs
This section describes use cases for the MPLS TE traffic switch over
caused by failure detection, network upgrading, overloading, and
schedule traffic movements.
5.1. Failure Detection
There are many failure detection technologies such as Ethernet OAM/
BFD/ OAM/RSVP Hello. When a failure is detected, traffic will be
switched over to the backup path. Re-optimization of the TE tunnel
may fail for insufficient resource.
[MPLS-TE-REQ-06] With I2RS, upon receipt the failure notification
from an I2RS Agent, the I2RS client would create a global concurrent
optimization to handle the failure event. This would occur by the
I2RS client signaling the I2RS agents on all nodes to: a) trigger a
new concurrent calculation of the backup LSP or TE tunnel via failed
path calculation, and b) re-signal updates to the TE LSPs process
with a make-before-break method.
5.2. Network Upgrading
When upgrades in a network are planned (e.g., for maintenance
purposes), some graceful mechanisms can be used to avoid traffic
disruption by gracefully shutting down MPLS-TE or GMPLS-TE resources.
The resources include TE links, component links within bundled TE
links, label resources, and an entire TE node. Typically IGP or
RSVP-TE protocol is extended to notify ingress node to bypass the
shut down point.
[MPLS-TE-REQ-07] With I2RS, the operator signals the upgrade event to
the application associated with the I2RS client. The I2RS client
Huang, et al. Expires January 5, 2015 [Page 7]
Internet-Draft I2RS MPLS LDP July 2014
could calculate another path for the affected TE tunnels to deviate
traffic away from the resource being upgraded. The I2RS client would
then communicate with I2RS agents on the appropriate nodes to move
the traffic. After the upgrade completes, the I2RS client can simply
remove I2RS configurations causing the traffic to revert to the
original path. Or, the I2RS can re-optimize the TE tunnels for
another pathways (E.g. as a part of a sequence of upgrades).
5.3. Handling Node Overload
When a node with MPLS TE support becomes overloaded due to the usage
exceeding maximums of CPU, memory, LSP label space, or LSP number
space, the setup of new TE LSPs should be rejected. The overload
condition may also impact existing LSPs, and even cause flapping of
MPLS TEs. Typically, a threshold value is set to avoid the overload
condition so that existing TE LSPs will not be impacted. Normally,
IGP protocols or RSVP-TE would be extended to notify all other nodes
of the overload condition. This notification allows ingress nodes to
bypass the overloaded node.
[MPLS-TE-REQ-08] I2RS agents can notify I2RS Clients of impending or
existing MPLS TE overload conditions that might cause TE LSP
rejections. This overload conditions include: due to CPU, memory,
LSP label space, or LSP numbers.
6. Monitoring of MPLS TE
6.1. Performance Monitoring
Typically, performance measurement such as traffic statistics is done
in the ingress node of TE tunnel. Applications such as traffic
analysis or traffic forecasts depend on these traffic statistics
being reported to centralize site for processing
With I2RS, the I2RS client can be attached to the application as
gather the traffic statistics from I2RS agents running on the ingress
nodes.
[MPLS-TE-REQ09] Automatic bandwidth adjustment applications can also
be linked to the I2RS clients that monitor the traffic on TE tunnels
and provide analysis. The I2RS client can read the TE Tunnel
topology and the bandwidth analysis in order to automatically
calculate a new path for the TE tunnel if it is needed. The I2RS
Client would then signal the I2RS agents in the nodes to install the
new TE Tunnels with the make-before-break option.
Huang, et al. Expires January 5, 2015 [Page 8]
Internet-Draft I2RS MPLS LDP July 2014
6.2. Fault Monitoring
When node or link failure happens, traffic will be switched over to
the backup path. At the same time, the failure information will be
reported and recorded. Network operators will process network
management and maintenance based on the failed information.
[MPLS-TE-REQ-10] With I2RS, the node failure or link failure can be
part of the notification stream sent by an I2RS Agent to an I2RS
Client on a centralized server gathering information.
6.3. LSP Monitoring
In the global concurrent re-optimization process in section 2.2, an
LSP update may depend on another LSP to release resources for it.
[MPLS-TE-REQ-11] The I2RS client can notify the I2RS agents on
specific nodes (or devices) to re-signal TE LSPs one by one if there
is a resource dependency. [MPLS-TE-REQ-12] The I2RS Client can
gather the TE LSPs' state from I2RS Agents on all nodes in order to
coordinate such handling of LSP resources.
[MPLS-TE-REQ-13] The I2RS Clients collecting information from I2RS
Agents can be arranged in a hierarchy to provide scaling of
collections. An application hosting an I2RS client collecting
information from I2RS Agents on nodes can have an I2RS Agent that
reports combined information to a centralized service as shown in the
figure 1 below
Huang, et al. Expires January 5, 2015 [Page 9]
Internet-Draft I2RS MPLS LDP July 2014
+--------------------------+
| Centralized LSP |
| Monitoring Application |
| I2RS Client-L2 |
+-----------+--------------+
^
/|\ (1-N I2RS Client-2 to I2RS Agents)
|
+-----------^----------------------------+
| I2RS Agent-L2 |
| Traffic Statistics Collection |
| Collection Application |
| I2RS Client-L1 |
+-+---------------+-----------------|----+
^ ^ ^
/|\ 1-N nodes /|\ 1-N Nodes /|\
| | |
+------^---------+ +--^------------+ +---------------+
| I2RS Agent-L1 | | I2RS Agent-L1 | | I2RS Agent-L1 |
| Performance | | LSP State | | Fault |
| Monitoring | | Monitoring | | Monitoring |
+----------------+ +---------------+ +---------------+
| | : : : : !
| | : : : : !
| | : : : : !
| ................: : : : !
| : | .......: : :........ !
| : | : : : !
| : | : : : !
+-V--V--+ +-V--V--+ +---V---+ +---V-----V--+
|MPLS-TE| |MPLS-TE| |MPLS-TE| | MPLS-TE |
| Link | | Link | | Link | | Link |
+-------+ +-------+ +-------+ +------------+
Figure 1: I2Client-Agent pairs
for scalable monitoring
7. IANA Considerations
This document includes no request to IANA.
8. Security Considerations
The MPLS TE use cases described in this document assumes use of
I2RS's programmatic interfaces described in the I2RS framework
mentioned in [I-D.ietf-i2rs-architecture], and as a use case does not
change the underlying security issues.
Huang, et al. Expires January 5, 2015 [Page 10]
Internet-Draft I2RS MPLS LDP July 2014
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
9.2. Informative References
[I-D.hares-i2rs-use-case-vn-vc]
Hares, S. and M. Chen, "Use Cases for Virtual Connections
on Demand (VCoD) and Virtual Network on Demand (VNoD)
using Interface to Routing System", draft-hares-i2rs-use-
case-vn-vc-02 (work in progress), February 2014.
[I-D.ietf-i2rs-architecture]
Atlas, A., Halpern, J., Hares, S., Ward, D., and T.
Nadeau, "An Architecture for the Interface to the Routing
System", draft-ietf-i2rs-architecture-04 (work in
progress), June 2014.
[I-D.ietf-i2rs-problem-statement]
Atlas, A., Nadeau, T., and D. Ward, "Interface to the
Routing System Problem Statement", draft-ietf-i2rs-
problem-statement-04 (work in progress), June 2014.
[I-D.ietf-i2rs-rib-info-model]
Bahadur, N., Folkes, R., Kini, S., and J. Medved, "Routing
Information Base Info Model", draft-ietf-i2rs-rib-info-
model-03 (work in progress), May 2014.
[I-D.ietf-mpls-ldp-dod]
Beckhaus, T., Decraene, B., Tiruveedhula, K.,
Konstantynowicz, M., and L. Martini, "LDP Downstream-on-
Demand in Seamless MPLS", draft-ietf-mpls-ldp-dod-09 (work
in progress), July 2013.
[I-D.ietf-mpls-ldp-ip-pw-capability]
Raza, K. and S. Boutros, "Controlling State Advertisements
Of Non-negotiated LDP Applications", draft-ietf-mpls-ldp-
ip-pw-capability-07 (work in progress), April 2014.
[I-D.ietf-mpls-seamless-mpls]
Leymann, N., Decraene, B., Filsfils, C., Konstantynowicz,
M., and D. Steinberg, "Seamless MPLS Architecture", draft-
ietf-mpls-seamless-mpls-07 (work in progress), June 2014.
Huang, et al. Expires January 5, 2015 [Page 11]
Internet-Draft I2RS MPLS LDP July 2014
[RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
Networks (VPNs)", RFC 4364, February 2006.
[RFC4447] Martini, L., Rosen, E., El-Aawar, N., Smith, T., and G.
Heron, "Pseudowire Setup and Maintenance Using the Label
Distribution Protocol (LDP)", RFC 4447, April 2006.
[RFC4762] Lasserre, M. and V. Kompella, "Virtual Private LAN Service
(VPLS) Using Label Distribution Protocol (LDP) Signaling",
RFC 4762, January 2007.
[RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP
Specification", RFC 5036, October 2007.
[RFC5283] Decraene, B., Le Roux, JL., and I. Minei, "LDP Extension
for Inter-Area Label Switched Paths (LSPs)", RFC 5283,
July 2008.
Authors' Addresses
Tieying Huang
Huawei Technologies
Huawei Bld., No.156 Beiqing Rd.
Beijing 100095
China
Email: Huangtieying@huawei.com
Zhenbin Li
Huawei Technologies
Huawei Bld., No.156 Beiqing Rd.
Beijing 100095
China
Email: lizhenbin@huawei.com
Susan Hares
Huawei Technologies
7453 Hickory Hill
Saline, MI 48176
USA
Email: shares@ndzh.com
Huang, et al. Expires January 5, 2015 [Page 12]