Internet DRAFT - draft-ietf-teas-te-topo-and-tunnel-modeling

draft-ietf-teas-te-topo-and-tunnel-modeling



TEAS Working Group                                         Igor Bryskin
Internet Draft                                               Individual
Intended status: Informational                      Vishnu Pavan Beeram
                                                             Tarek Saad
                                                       Juniper Networks
                                                             Xufeng Liu
                                                         Volta Networks





Expires: January 12, 2021                                 July 12, 2020


          TE Topology and Tunnel Modeling for Transport Networks
              draft-ietf-teas-te-topo-and-tunnel-modeling-06


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on January 12, 2021.

Copyright Notice

   Copyright (c) 2020 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents




Bryskin, et al.        Expires January 12, 2021                [Page 1]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Abstract

   This document describes how to model TE topologies and tunnels for
   transport networks, by using the TE topology YANG model [I-D.ietf-
   teas-yang-te-topo] and the TE tunnel YANG model [I-D.ietf-teas-yang-
   te].

Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 [RFC2119].


Table of Contents

   1. Modeling Considerations........................................3
      1.1. TE Topology Model.........................................3
      1.2. TE Topology Modeling Constructs...........................5
      1.3. Abstract TE Topology Calculation, Configuration and
      Maintenance...................................................22
         1.3.1. Single-Node Abstract TE Topology....................23
         1.3.2. Full Mesh Link Abstract TE Topology.................25
         1.3.3. Star-n-Spokes Abstract TE Topology..................27
         1.3.4. Arbitrary Abstract TE Topology......................28
         1.3.5. Customized Abstract TE Topologies...................29
         1.3.6. Hierarchical Abstract TE Topologies.................30
      1.4. Merging TE Topologies Provided By Multiple Providers.....31
         1.4.1. Dealing With Multiple Abstract TE Topologies Provided By
         The Same Provider..........................................34
      1.5. Configuring Abstract TE Topologies.......................36
      1.6. TE Tunnel Model..........................................37
      1.7. TE Tunnel/Transport Service Modeling Constructs..........39
         1.7.1. Bidirectional Tunnels...............................53
      1.8. Transport Service Mapping................................55
      1.9. Multi-Domain Transport Service Coordination..............56
   2. Use Cases.....................................................61
      2.1. Use Case 1. Transport service control on a single layer
      multi-domain transport network................................61


Bryskin, et al.        Expires January 12, 2021                [Page 2]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


      2.2. Use Case 2. End-to-end TE tunnel control on a single layer
      multi-domain transport network................................69
      2.3. Use Case 3. Transport service control on a ODUk/Och multi-
      domain transport network with Ethernet access links...........73
      2.4. Use Case 4. Transport service control on a ODUk/Och multi-
      domain transport network with multi-function access links.....80
      2.5. Use Case 5. Real time updates of IP/MPLS layer TE link
      attributes that depend on supporting transport connectivity (e.g.
      transport SRLGs, propagation delay, etc.).....................83
      2.6. Use Case 6. Virtual Network Service......................84
   3. Security Considerations.......................................87
   4. IANA Considerations...........................................87
   5. References....................................................88
      5.1. Normative References.....................................88
      5.2. Informative References...................................88
   6. Acknowledgments...............................................88
   Appendix A. Data Examples........................................89
      A.1. Use Case 1...............................................89
         A.1.1. Domain 1............................................89
         A.1.2. Domain 2............................................96
         A.1.3. Domain 3...........................................102
   Authors' Addresses..............................................108

1. Modeling Considerations

1.1. TE Topology Model

   The TE Topology Model is written in YANG modeling language. It is
   defined and developed by the IETF TEAS WG and is documented as "YANG
   Data Model for TE Topologies" [I-D.ietf-teas-yang-te-topo]. The model
   describes a TE network provider's Traffic Engineering data store as
   it is seen by a client. It allows for the provider to convey to each
   of its clients:

   o  information on network resources available to the client in the
      form of one or several native TE topologies (for example, one for
      each layer network supported by the provider);

   o  one or several abstract TE topologies, customized on per-client
      basis and sorted according to the provider's preference as to how
      the abstract TE topologies are to be used by the client;

   o  updates with incremental changes happened to the previously
      provided abstract/native TE topology elements;

   o  updates on telemetry/state information the client has expressed
      interest in;


Bryskin, et al.        Expires January 12, 2021                [Page 3]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  overlay/underlay relationships between the TE topologies provided
      to the client (e.g. TE path computed in an underlay TE topology
      supporting a TE link in an overlay TE topology);

   o  client/server inter-layer adaptation relationships between the TE
      topologies provided to the client in the form of TE inter-layer
      locks or transitional links;

   The TE Topology Model allows a network client to:

   o  (Re-)configure/negotiate abstract TE topologies provided to the
      client by a TE network provider, so that said abstract TE
      topologies optimally satisfy the client's needs, constraints and
      optimization criteria, based on the client's network planning,
      service forecasts, telemetry information extracted from the
      network, previous history of service provisioning and performance
      monitoring, etc.;

   o  Obtain abstract/native TE topologies from multiple providers and
      lock them horizontally (inter-domain) and vertically (inter-layer)
      into the client's own native TE topologies;

   o  Configure, with each provider the trigger, frequency and contents
      of the TE topology update notifications;

   o  Configure, with each provider the trigger, frequency and contents
      of the TE topology telemetry (e.g. statistics counters) update
      notifications.





















Bryskin, et al.        Expires January 12, 2021                [Page 4]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


1.2. TE Topology Modeling Constructs



















                           Figure 1. TE Topology


   o  TE domain - a multi-layer traffic engineered network under direct
      and complete control of a single authority, network provider. TE
      domain can be described by one or more TE topologies. For example,
      separate TE topologies can describe each of the domain's layer
      networks. TE domain can hierarchically encompass/parent other
      (child) TE domains, and can be encompassed by its own parent.

   o  TE topology - a graphical representation of a TE domain. TE
      topology is comprised of TE nodes (TE graph vertices)
      interconnected via TE links (TE graph edges).

   _____________________________________________________________________

      /* TE topology */
      augment /nw:networks/nw:network:
         /* TE topology global ID */
         +--rw provider-id?      te-types:te-global-id
         +--rw client-id?        te-types:te-global-id
         +--rw te-topology-id?   te-types:te-topology-id
      ..................................................................
         /* TE topology general parameters */
           |  +--rw preference?               uint8
           |  +--rw optimization-criterion?   identityref
      ..................................................................


Bryskin, et al.        Expires January 12, 2021                [Page 5]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


               /* TE topology list of TE nodes */
      augment /nw:networks/nw:network/nw:node:
         +--rw te-node-id?   te-types:te-node-id
      ..................................................................
               /* TE topology list of TE links */
      augment /nw:networks/nw:network/nt:link:
      ..................................................................
              /* TE topology list of TE link termination points */
      augment /nw:networks/nw:network/nw:node/nt:termination-point:
         +--rw te-tp-id?   te-types:te-tp-id
      ..................................................................
   _____________________________________________________________________




























                             Figure 2. TE Node







Bryskin, et al.        Expires January 12, 2021                [Page 6]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  TE node - an element of a TE topology (appears as a vertex on TE
      graph). A TE node represents one or several nodes (physical
      switches), or a fraction of a node. A TE node belongs to and is
      fully defined in exactly one TE topology. A TE node is assigned a
      TE topology scope-unique ID. TE node attributes include
      information related to the data plane aspects of the associated
      node(s) (e.g. TE node's connectivity matrix), as well as
      configuration data (such as TE node name). A given TE node can be
      reached on the TE graph, representing the TE topology, over one of
      TE links terminated by the TE node.


   _____________________________________________________________________

      /* TE node */
      augment /nw:networks/nw:network/nw:node:
         /* TE node ID */
         +--rw te-node-id?   te-types:te-node-id
      ..................................................................
         /* TE node general attributes */
            |  +--rw te-node-attributes */
      ..................................................................
         /* TE node connectivity matrices */
            |     +--rw connectivity-matrices
      ..................................................................
         /* TE node underlay TE topology */
                 |     +--rw underlay-topology {te-topology-hierarchy}?
                 |        +--rw network-ref?   leafref
      ..................................................................
         /* TE node information sources*/
            |  +--ro information-source-entry* [information-source]
      ..................................................................
        /* TE node statistics */
           +--ro statistics
      ..................................................................
        /* TE node TTP list */
           +--rw tunnel-termination-point* [tunnel-tp-id]
      ..................................................................
   _____________________________________________________________________










Bryskin, et al.        Expires January 12, 2021                [Page 7]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  TE link - an element of a TE topology (appears as an edge on TE
      graph), TE link is unidirectional and its arrow indicates the TE
      link's direction. Edges with two arrows on the TE topology graph
      (see Figure 1) represent bi-directional combinations of two
      parallel oppositely directed TE links. A TE link represents one or
      several physical links or a fraction of a physical link.  A TE
      link belongs to and is fully defined in exactly one TE topology. A
      TE link is assigned a TE topology scope-unique ID. TE link
      attributes include parameters related to the data plane aspects of
      the associated link(s) (e.g. unreserved bandwidth, resource
      maps/pools, etc.), as well as the configuration data (such as
      remote node/link IDs, SRLGs, administrative colors, etc.) A TE
      link is connected to a TE node, terminating the TE link via
      exactly one TE link termination point (LTP).


   _____________________________________________________________________

      /* TE link */
      augment /nw:networks/nw:network/nt:link:
      /* TE link bundle information */
            |  +--rw (bundle-stack-level)?
            |  |  |  +--rw bundled-links
            |  |     +--rw component-links
      ..................................................................
      /* TE link general attributes */
          |  +--rw te-link-attributes

      ..................................................................
      /* TE link underlay TE topology */
            |     +--rw underlay! {te-topology-hierarchy}?
            |     |  +--rw primary-path
            |     |  +--rw backup-path* [index]

      ..................................................................
      /* TE link layer network */
           |     +--rw interface-switching-capability* [switching-
      capability encoding]

      ..................................................................
      /* TE link protection type */
           |     |  +--rw protection-type?   uint16

      ..................................................................

      /* TE link supporting TE tunnels */
          |     |  +--rw tunnels


Bryskin, et al.        Expires January 12, 2021                [Page 8]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020



      ..................................................................
      /* TE link transitional link flag */
           |  +--ro is-transitional?            empty


      ..................................................................
      /* TE link information sources */
            |  +--ro information-source?         te-info-source

      ..................................................................
      /* TE link statistics */
           +--ro statistics

      ..................................................................
   _____________________________________________________________________



   o  Intra-domain TE link - TE link connecting two TE nodes within the
      same TE topology representing a TE network domain (e.g. L14 in
      Figure 1). From the point of view of the TE topology where the
      intra-domain TE link is defined, the TE link is close-ended, that
      is, both local and remote TE nodes of the link are defined in the
      same TE topology.

   o  Inter-domain TE link -  TE link connecting two border TE nodes
      that belong to separate TE topologies describing neighboring TE
      network domains (e.g. L3x in Figure 1). From the point of view of
      the TE topology where the inter-domain TE link is defined, the TE
      link is open-ended, that is, the remote TE node of the link is not
      defined in the TE topology where the local TE node and the TE link
      itself are defined.

      [Note: from the point of view of a TE node terminating an inter-
      domain TE link there is no difference between inter-domain and
      access TE links]

   o  Access TE link - TE link connecting a border TE node of a TE
      topology describing a TE network domain to a TE node of a TE
      topology describing a customer network site (e.g. L1x in Figure 1)
      From the point of view of the TE topology where the access TE link
      is defined, the TE link is open-ended, that is, the remote TE node
      of the link (t.e. TE node representing customer network
      element(s)) is not defined in the TE topology where the local TE
      node and the TE link itself are defined.



Bryskin, et al.        Expires January 12, 2021                [Page 9]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


      [Note: from the point of view of a TE node terminating an access
      TE link there is no difference between access and inter-domain TE
      links]

   o  Dynamic TE link -  a TE link that shows up in (and disappears
      from) a TE topology as a result of multi-layer traffic
      engineering. Dynamic TE link (supported by a hierarchy TE tunnel
      dynamically set up in a server layer network) is automatically
      (i.e. without explicit configuration request) added to a client
      layer network TE topology to augment the topology with additional
      flexibility to ensure successful completion of the path
      computation for and provisioning of a client layer network
      connection/LSP. For example, an ODUk hierarchy TE tunnel can
      support a dynamic Ethernet layer TE link to enable provisioning of
      an Ethernet layer connection on a network that does not have
      sufficient static Ethernet layer connectivity. Likewise, dynamic
      TE link is automatically removed from the TE topology (and its
      supporting hierarchy TE tunnel released) as soon as the TE link
      stops carrying client layer connections/LSPs.

   o  TE link termination point (LTP) - a conceptual point of connection
      of a TE node to one of the TE links terminated by the TE node (see
      Figure 2a). Unlike TE link, LTP is bi-directional - an inbound TE
      link and an oppositely directed outbound TE link have to be
      connected to the TE node via the same LTP to constitute a bi-
      directional TE link combination.






     Figure 2a. Bi-directional TE link combination (left), independent
                     uni-directional TE links (right)


   _____________________________________________________________________

      /* LTP */
      augment /nw:networks/nw:network/nw:node/nt:termination-point:
      /* LTP ID */
         +--rw te-tp-id?   te-types:te-tp-id
      /* LTP network layer ID */
            |  +--rw interface-switching-capability* [switching-
      capability encoding]
            |  |  +--rw switching-capability    identityref


Bryskin, et al.        Expires January 12, 2021               [Page 10]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |  +--rw encoding                identityref
      /* LTP bandwidth information */
            |  |  +--rw max-lsp-bandwidth* [priority]
            |  |     +--rw priority     uint8
            |  |     +--rw bandwidth?   te-bandwidth
      /* LTP inter-layer locks */
            |  +--rw inter-layer-lock-id?              uint32

      ..................................................................
   _____________________________________________________________________



   o  TE tunnel termination point (TTP) - an element of TE topology
      representing one or several potential TE tunnel
      termination/adaptation points (e.g. OCh layer transponder). A TTP
      is hosted by exactly one TE node (see Figure 2). A TTP is assigned
      a TE node scope-unique ID. Depending on the TE node's internal
      constraints, a given TTP hosted by the TE node could be accessed
      via one, several or all TE links originated/terminated from/by the
      TE node. TTP's important attributes include Local Link
      Connectivity List, Adaptation Client Layer List, TE inter-layer
      locks (see below), Unreserved Adaptation Bandwidth (announcing the
      TTP's remaining adaptation resources sharable between all
      potential client LTPs), and Property Flags (indicating
      miscellaneous properties of the TTP, such as capability to support
      1+1 protection for a TE tunnel terminated on the TTP).


   _____________________________________________________________________

      /* TTP */
           +--rw tunnel-termination-point* [tunnel-tp-id]
      /* TTP ID */
               +--rw tunnel-tp-id                           binary
      /* TTP layer network ID */
               |  +--rw switching-capability?        identityref
               |  +--rw encoding?                    identityref
      //* Inter-layer-locks supported by TTP */
               |  +--rw inter-layer-lock-id?         uint32
      /* TTP's protection capabilities */
               |  +--rw protection-type?             identityref
      /* TTP's list of client layer users */
               |  +--rw client-layer-adaptation

      ..................................................................
      /* TTP's Local Link Connectivity List (LLCL) */


Bryskin, et al.        Expires January 12, 2021               [Page 11]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


               |  +--rw local-link-connectivities

      ..................................................................
   _____________________________________________________________________



   o  Label - in the context of circuit switched layer networks
      identifies a particular resource on a TE link (e.g. Och
      wavelength, ODUk container)

      +--:(label)
         +--rw value?   rt-types:generalized-label























                Figure 3. TTP Local Link Connectivity List











Bryskin, et al.        Expires January 12, 2021               [Page 12]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  TTP basic local link connectivity list (basic LLCL) - a list of TE
      link/label combinations terminated by the TTP-hosting TE node
      (effectively the same as LTP/label pairs), which the TTP could be
      connected to (see Figure 3, upper left). From the point of view of
      a potential TE path, basic LLCL provides a list of permissible
      LTP/label pairs the TE path needs to start/stop on for a
      connection, taking the TE path, to be successfully terminated on
      the TTP in question.

   o  TTP detailed local link connectivity list (detailed LLCL) - basic
      LLCL extended to provide a set of costs (such as intra-node
      summary TE metric, delay, SRLGs, etc.) associated with each LLCL
      entry (see Figure 3, upper right)


   _____________________________________________________________________

      /* TTP LLCL */
      |  +--rw local-link-connectivities
          |     +--rw number-of-entries?         uint16
          /* LLCL entry */

          /* LLCL entry LTP */
          |        +--rw link-tp-ref                leafref

      ..................................................................

      /* LLC entry label range */
      |     +--rw label-restriction* [inclusive-exclusive label-start]
      |     |  +--rw inclusive-exclusive    enumeration
      |     |  +--rw label-start            rt-types:generalized-label
            |     |  +--rw label-end?             rt-types:generalized-
      label
            |     |  +--rw range-bitmap?          binary

      /* LLCL entry underlay TE path(s) */
      |     +--rw underlay! {te-topology-hierarchy}?
      |     |  +--rw primary-path
      |     |  +--rw backup-path* [index]
      /* LLCL entry protection type */
      |     |  +--rw protection-type?   uint16
      /* LLCL entry supporting TE tunnels */
      |     |  +--rw tunnels
      /* LLCL entry bandwidth parameters */
      |     +--rw max-lsp-bandwidth* [priority]

      ..................................................................


Bryskin, et al.        Expires January 12, 2021               [Page 13]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


      /* LLCL entry metrics  (vector of costs) */
      |     +--rw te-default-metric?         uint32
      |     +--rw te-delay-metric?           uint32
      |     +--rw te-srlgs
      |     |  +--rw value*   te-types:srlg
      |     +--rw te-nsrlgs {nsrlg}?

      ..................................................................
      /* LLCL entry ID */
      |     |  +--rw id*   uint32
   _____________________________________________________________________



   o  TTP adaptation client layer list - a list of client layers that
      could be directly adopted by the TTP. This list is necessary to
      describe complex multi-layer (more than two layer) client-server
      layer hierarchies and, in particular, to identify the position of
      the TTP in said hierarchies.


   _____________________________________________________________________

      /* TTP adaptation client layer list */
               |  +--rw client-layer-adaptation
               |  |  +--rw switching-capability* [switching-capability
      encoding]
               /* Client layer ID */
               |  |     +--rw switching-capability    identityref
               |  |     +--rw encoding                identityref
               /* Adaptation bandwidth available for the client layer */
               |  |     +--rw bandwidth?              te-bandwidth
   _____________________________________________________________________
















Bryskin, et al.        Expires January 12, 2021               [Page 14]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


























                   Figure 4. TE Node Connectivity Matrix


   o  TE node basic connectivity matrix - a TE node attribute describing
      the TE node's switching capabilities/limitations in the form of
      permissible switching combinations of the TE node's LTP/label
      pairs (see Figure 4, upper left). From the point of view of a
      potential TE path arriving at the TE node at a given inbound
      LTP/label, the node's basic connectivity matrix describes
      permissible outbound LTP/label pairs for the TE path to leave the
      TE node.

   o  TE node detailed connectivity matrix - TE node basic connectivity
      matrix extended to provide a set of costs (such as intra-node
      summary TE metric, delay, SRLGs, etc.) associated with each
      connectivity matrix entry (see Figure 4, upper right).


   _____________________________________________________________________

      /* TE node connectivity matrix */
               |  +--rw connectivity-matrix* [id]
               |     +--rw id                         uint32


Bryskin, et al.        Expires January 12, 2021               [Page 15]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


               |     +--rw from  /* left LTP */
               |     |  +--rw tp-ref?   leafref
               |     +--rw to    /* right LTP */
               |     |  +--rw tp-ref?   leafref
               |     +--rw is-allowed?                boolean

               /* Connectivity matrix entry label range */
               |     +--rw label-restriction* [inclusive-exclusive
      label-start]
               |     |  +--rw inclusive-exclusive    enumeration
               |     |  +--rw label-start            rt-
      types:generalized-label
               |     |  +--rw label-end?             rt-
      types:generalized-label
               |     |  +--rw range-bitmap?          binary

              /* Connectivity matrix entry underlay TE path(s) */
               |     +--rw underlay! {te-topology-hierarchy}?
               |     |  +--rw primary-path
               |     |  +--rw backup-path* [index]
               /* Connectivity matrix entry protection type */
               |     |  +--rw protection-type?   uint16
               /* Connectivity matrix entry supporting TE tunnels */
               |     |  +--rw tunnels
               /* Connectivity matrix entry bandwidth parameters */
               |     +--rw max-lsp-bandwidth* [priority]

      ..................................................................
               /* Connectivity matrix entry metrics (vector of costs) */
               |     +--rw te-default-metric?         uint32
               |     +--rw te-delay-metric?           uint32
               |     +--rw te-srlgs
               |     |  +--rw value*   te-types:srlg
               |     +--rw te-nsrlgs {nsrlg}?

      ..................................................................
               /* Connectivity matrix entry ID */
               |     |  +--rw id*   uint32
   _____________________________________________________________________










Bryskin, et al.        Expires January 12, 2021               [Page 16]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020




















                            Figure 5.  TE Path


   o  TE path - an ordered list of TE node/link IDs (each possibly
      augmented with labels) that interconnects over a TE topology a
      pair of TTPs and could be used by a connection (see Figure 5). A
      TE path could, for example, be a product of a successful path
      computation performed for a given TE tunnel


   _____________________________________________________________________

      /* TE path */

            /* TE topology the path is defined in */
       |     |  |  +--rw network-ref?    leafref
            /* Path type (IRO, XRO, ERO, RRO) */
       |     |  |  +--rw path-type?    identityref

            /* TE path elements */
       |     |  |  +--rw path-element* [path-element-id]
       |     |  |     +--rw path-element-id    uint32
       |     |  |     +--rw index?             uint32
       |     |  |     +--rw (type)?
             /* Numbered TE link path element */
       |     |  |        +--:(ip-address)
       |     |  |        |  +--rw ip-address-hop
       |     |  |        |     +--rw address?    inet:ip-address


Bryskin, et al.        Expires January 12, 2021               [Page 17]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


       |     |  |        |     +--rw hop-type?   te-hop-type
             /* AS number path element */
       |     |  |        +--:(as-number)
       |     |  |        |  +--rw as-number-hop
       |     |  |        |     +--rw as-number?   binary
       |     |  |        |     +--rw hop-type?    te-hop-type
             /* Unnumbered TE link path element */
       |     |  |        +--:(unnumbered-link)
       |     |  |        |  +--rw unnumbered-hop
       |     |  |        |     +--rw te-node-id?      inet:ip-address
       |     |  |        |     +--rw tp-id?   uint32
       |     |  |        |     +--rw hop-type?       te-hop-type
             /* Label path element */
       |     |  |        +--:(label)
       |     |  |        |  +--rw label-hop
       |     |  |        |     +--rw value?   rt-types:generalized-label
       |     |  |        |     +--rw direction?       boolean
       |     |  |        +--:(sid)
       |     |  |           +--rw sid-hop
       |     |  |              +--rw sid?   rt-types:generalized-label
   _____________________________________________________________________



   o  TE path segment - a contiguous fragment of a TE path

















                       Figure 6. TE Inter-Layer Lock






Bryskin, et al.        Expires January 12, 2021               [Page 18]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  TE inter-layer lock - a modeling concept describing client-server
      layer adaptation relationships important for multi-layer traffic
      engineering. It is an association of M client layer LTPs and N
      server layer TTPs, within which data arriving at any of the client
      layer LTPs could be adopted onto any of the server layer TTPs. A
      TE inter-layer lock is identified by inter-layer lock ID, which is
      unique across all TE topologies provided by the same provider. The
      client layer LTPs and the server layer TTPs associated by a given
      TE inter-layer lock share the same inter-layer lock ID value.

      In Figure 6 a TE inter-layer lock IL_1 associates six client layer
      LTPs (C_LTP_1 - C_LTP_6) with two server layer TTPs (S_TTP_1 and
      S_TTP_2). As mentioned, they all have the same attribute -inter-
      layer lock ID:  IL_1, which is the only parameter/value indicating
      the association.  A given LTP may have zero, one or more inter-
      layer lock IDs.  In the case of multiple inter-layer lock IDs,
      this implies that the data arriving at the LTP can be adopted onto
      any of TTPs associated with all specified inter-layer locks.  For
      example, C_LTP_1 may be attributed with two inter-layer locks-
      IL_1 and IL_2. This would mean that C_LTP_1 for adaptation
      purposes can use not just TTPs associated with inter-layer lock
      IL_1 (i.e. S_TTP_1 and S_TTP_2 in the Figure), but any of TTPs
      associated with inter-layer lock IL_2. Likewise, a given TTP may
      have one or more inter-layer locks, meaning that it can offer the
      adaptation service to any client layer LTP having an inter-layer
      lock matching one of its own.

      LTPs and TTPs associated within the same TE inter-layer lock may
      be hosted by the same (hybrid, multi-layer) TE node or by multiple
      TE nodes defined in the same or separate TE topologies. The latter
      case is especially important because TE topologies of different
      layer networks could be modeled by separate augmentations of the
      basic (common to all layers) TE topology model.

              |  +--rw inter-layer-lock-id?         uint32

   o  Transitional link - an alternative method of modeling of client-
      server adaptation relationship. Transitional link is a bi-
      directional link connecting an LTP in a client layer to an LTP in
      a server layer, which is associated (via TTP's LLCL) with a server
      layer TTP capable of adopting of the client layer data onto a TE
      tunnel terminated by the TTP. Important attributes pf a
      transitional link are loca;/remote LTP IDs, TE metric and
      available adaptation bandwidth.





Bryskin, et al.        Expires January 12, 2021               [Page 19]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


























               Figure 7.  Native and Abstract TE Topologies


   o  Native TE topology - a TE topology as it is known (to full extent
      and unmodified) to the TE topology provider (see lower part of
      Figure 7.). A native TE topology might be discovered via various
      routing protocols and/or subscribe/publish techniques. For
      example, a first-level TE topology provider (such as a T-SDN
      Domain Controller, DC) may auto-discover its native TE
      topology(ies) by participating in the domain's OSPF-TE protocol
      instance; while a second-level TE topology provider (such as a
      Hierarchical T-SDN Controller. HC) normally builds its native TE
      topology(ies) based on TE topologies exposed by each of the
      subordinate, first- level TE topology providers.

   o  Underlay TE topology - a TE topology that serves as a base for
      constructing overlay TE topologies.







Bryskin, et al.        Expires January 12, 2021               [Page 20]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Overlay TE topology - a TE topology constructed based on one or
      more underlay TE topologies. Each TE node of the overlay TE
      topology represents a separate underlay TE topology (that could be
      mapped onto an arbitrary segment of a native TE topology). Each TE
      link of the overlay TE topology represents, generally speaking, an
      arbitrary TE path in one of the underlay TE topologies. The
      overlay TE topology and the supporting underlay TE topologies may
      represent separate layer networks (e.g. OTN/ODUk and WDM/OCh
      respectively) or the same layer network.

   o  Abstract TE topology - an overlay TE topology created by a
      provider to describe its network in some abstract way. An abstract
      TE topology contains at least one abstract TE topology element,
      such as TE node or TE link. An abstract TE topology is built based
      on contents of one or more of the provider's native TE topologies
      (serving as underlay(s)), the provider's policies and the client's
      preferences (see upper part of Figure 7).

   o  Customized TE topology - a TE topology tailored for a given
      provider's client. A customized TE topology is usually but not
      always an abstract TE topology. For example, a given abstract TE
      topology could be exposed to a group or all provider's clients (in
      which case the abstract TE topology is not a customized TE
      topology). Likewise, a given naive TE topology could be customized
      for a given client (for example, by removing high delay TE links
      the client does not care about). So customized TE topology is not
      an abstract TE topology, because it does not contain abstract TE
      topology elements

   o  TE inter-domain plug - a TE link attribute meaningful for open-
      ended inter-domain/access TE links. It contains a network-wide
      unique value (inter-domain plug ID) that identifies in the network
      a connectivity supporting the inter-domain/access TE link in
      question. It is expected that a given pair of neighboring domain
      TE topologies (provided by separate providers) will have each at
      least one open-ended inter-domain/access TE link with a TE inter-
      domain plug matching to one provided by its neighbor, thus
      allowing for a client of both domains to identify adjacent nodes
      in the separate neighboring TE topologies and resolve the open-
      ended inter-domain/access TE links by connecting them regardless
      of the links respective local/remote node ID/link ID attributes.
      Inter-domain plug IDs may be assigned and managed by a central
      network authority. Alternatively, inter-domain plug IDs could be
      dynamically auto-discovered (e.g. via LMP protocol).

   _____________________________________________________________________



Bryskin, et al.        Expires January 12, 2021               [Page 21]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020



           +--rw external-domain
              |  +--rw network-ref?            leafref
              |  +--rw remote-te-node-id?      te-types:te-node-id
              |  +--rw remote-te-link-tp-id?   te-types:te-tp-id
              |  +--rw plug-id?                uint32
   _____________________________________________________________________



1.3. Abstract TE Topology Calculation, Configuration and Maintenance

   The TE Topology Model does not prescribe what and how abstract TE
   topologies are computed, configured, manipulated and supported by a
   TE network (e.g. transport network) provider. However, it is assumed
   that:

   o  All TE topologies, native or abstract, conveyed to the same or
      different clients, are largely independent one from another. This
      implies that each TE topology, generally speaking, has an
      independent name space for TE node and link IDs, SRLGs, etc.
      (possibly overlapping with the name spaces of other TE
      topologies);

   o  All abstract TE topologies are bound to the respective underlay
      native or abstract TE topologies only by the overlay/underlay
      relationships defined by the TE Topology Model, but, otherwise,
      the abstract TE topologies are decoupled from their respective
      underlay TE topologies.

   It is envisioned that an original set of abstract TE topologies is
   produced by a TE network provider for each of its clients based on
   the provider's local configurations and/or policies, as well as the
   client-specific profiles. The original set of abstract TE topologies
   offered to a client may be accepted by the client as-is.
   Alternatively, the client may choose to negotiate/re-configure the
   abstract TE topologies, so that the latter optimally satisfy the
   client's needs. In particular, for each of the abstract TE topologies
   the client may request adding/removing TE nodes, TE links, TTPs
   and/or modifying re-configurable parameters of the existing
   components. The client may also request different optimization
   criteria as compared to those used for the original abstract TE
   topology optimization, or/and specify various topology-level
   constraints. The provider may accept or reject all or some abstract
   TE topology re-configuration requests. Hence, the abstract TE
   topology negotiation process may take multiple iterations before the
   provider and each of its clients agree upon a set of abstract TE


Bryskin, et al.        Expires January 12, 2021               [Page 22]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   topologies and their contents. Furthermore, the negotiation process
   could be repeated over time to produce new abstract TE topologies
   optimal to best suit evolving circumstances.

















   Figure 8. Native Transport Network Domain TE Topology as an Underlay
                        for Abstract TE Topologies


   Let's assume that a native transport network domain TE topology to be
   as depicted in Figure 8. The popular types of abstract TE topologies
   based on this native TE topology as an underlay are described in the
   following sections.

1.3.1. Single-Node Abstract TE Topology















     Figure 9.  Blocking/Asymmetrical TE Node with Basic Connectivity
                             Matrix Attribute


Bryskin, et al.        Expires January 12, 2021               [Page 23]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   In Figure 9, the transport network domain is presented to a client as
   a one-node abstract TE topology, where the single TE node (AN1)
   represents the entire domain and terminates all of the inter-
   domain/access TE links connecting the domain to its adjacent domains
   (i.e. TE links L1...L8). Because AN1 represents the entire domain the
   node's Underlay TE Topology attribute matches the ID of one of the
   domain's native TE topologies (e.g. one presented in Figure 8).
   [Note: all or some of the underlay TE topologies a given abstract TE
   topology depends on could be catered to the client by the provider
   along with the abstract TE topology in question or upon separate
   request(s) issued by the client.]

   One important caveat about abstract TE node AN1 is that it should be
   considered as an asymmetrical/blocking switch, because, generally
   speaking, it is not guaranteed that a suitable TE path exists between
   any given pair of inter-domain TE links into/out of the domain. This
   means from the TE Topology model point of view that there are certain
   limitations as to how AN1's LTPs could be interconnected
   inside/across the TE node. The model allows for asymmetrical/blocking
   switches by specifying for the associated TE nodes a non-empty basic
   connectivity matrix attribute describing permissible inbound-outbound
   TE link/label switching combinations. It is assumed that the
   provider's path computer can compute a set of optimal TE paths,
   connecting inbound TE link/label_x <=> outbound TE link/label_y
   combinations inside the abstract TE node over the TE node's underlay
   TE topology. Based on the results of such computations, AN1's
   connectivity matrix can be (re-)generated and (re-)conveyed to the
   abstract TE topology client.

   A richer version of the basic connectivity matrix is the detailed
   connectivity matrix. The latter not only describes permissible
   inbound TE link/label_x <=> TE link/label  TE link/label_y switching
   combinations, but also provides connectivity matrix entry specific
   vectors of various costs/metrics (in terms of delay, bandwidth,
   intra-node SRLGs and summary TE metrics) that a potential TE path
   will accrue, should a given connectivity matrix entry be selected by
   the path for crossing the TE node (see Figure 10).












Bryskin, et al.        Expires January 12, 2021               [Page 24]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020
















   Figure 10.  Blocking/Asymmetrical TE Node with Detailed Connectivity
                             Matrix Attribute


1.3.2. Full Mesh Link Abstract TE Topology

















              Figure 11.  Full Mesh Link Abstract TE Topology


   In Figure 11, the transport network domain is abstracted in the
   following way.








Bryskin, et al.        Expires January 12, 2021               [Page 25]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Each of the underlay native TE topology border TE nodes (i.e., the
      TE nodes terminating at least one inter-domain/access TE link,
      such as TE nodes S3 or S11 in Figure 8) is represented in the
      abstract TE topology as a separate abstract TE node, matching one-
      for-one to the respective border TE node of the underlay TE
      topology. For example, S3' of the abstract TE topology represents
      S3 of the underlay TE topology in Figure 8. [Note that such a
      relationship is modeled via Supporting Node attribute of TE node
      S3' specifying the ID of S3, as well as the ID of the TE topology
      where S3 is defined (i.e. TE topology in Figure 8)]. Likewise, S9'
      represents S9, S11' represents S11 and so forth;

   o  TE nodes S3', S5', S8', S9' and S11' are interconnected via a full
      mesh of abstract TE links. It is assumed that the provider's path
      computer can compute a set of optimal TE paths over one or more of
      underlay TE topologies (such as presented in Figure 8)- one for
      each of said abstract TE links; and the provider can set up the TE
      tunnels in the network supporting each of the abstract TE links,
      either during the abstract TE topology configuration (in the case
      of committed/pre-established abstract TE links), or at the time
      the first client's connection is placed on the abstract TE link in
      question (the case of uncommitted abstract TE links). [Note that
      so (re-)computed TE paths, as well as the IDs of respective
      underlay TE topologies used for their computation are normally
      catered to the client in the Underlay TE path attribute of the
      associated abstract TE links]

   The configuration parameters of each of the abstract TE links (such
   as layer ID, bandwidth and protection requirements, preferred TE
   paths across the underlay TE topology for the primary and backup
   connections, etc.) are expected to be found in the abstract TE
   topology profiles/templates locally configured with the provider or
   pushed to the provider by the client via the policy NBI. Each of the
   abstract TE links may be later re-configured or removed by direct
   configuration requests issued by the client via TE Topology NBI.
   Likewise, additional abstract TE links may be requested by the client
   at any time.

   Some possible variants/flavors of the Full Mesh Link Abstract TE
   Topology described above are:

   o  Partial Mesh Link Abstract TE Topology (where some of the abstract
      TE links from the full mesh are missing);

   o  Double Mesh Link Abstract TE Topology (where each pair of abstract
      TE nodes is connected via two diverse abstract TE links).



Bryskin, et al.        Expires January 12, 2021               [Page 26]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


1.3.3. Star-n-Spokes Abstract TE Topology
















               Figure 12. Star-n-Spoke Abstract TE Topology


   The Full Mesh Link Abstract TE Topology suffers from the n-squared
   problem; that is, the number of required abstract TE links is
   proportional to square of the number of native TE topology border TE
   nodes. This problem can be mitigated (i.e., the number of required
   abstract TE links may be significantly reduced) by adding, to the
   abstract TE topology, an additional abstract TE node (the star)
   representing one or several interconnected non-border TE nodes from
   the native TE topology. Abstract TE links in the Star-n-Spokes
   Topology connect the star with all other TE nodes of the topology
   (the spokes). For example, abstract TE node AN1 in Figure 12 could
   represent collectively TE nodes S7, S10 and S4 of the native TE
   topology (see Figure 8) with abstract TE links connecting AN1 with
   all other TE nodes in the Star-n-Spokes Abstract TE Topology in
   Figure 12.

   In order to introduce a composite abstract TE node, (e.g. AN1 in
   Figure 12) representing in a given abstract TE topology an arbitrary
   segment of another TE topology (e.g. TE nodes S7, S12 and S4 of the
   TE topology in Figure 8) the TE topology provider is expected to
   perform the following operations:

   o  Copy the TE topology segment to be represented by the abstract TE
      node (i.e. TE nodes S7, S10 and S4 in Figure 8, as well as the TE
      links interconnecting them) into a separate  auxiliary TE topology
      (with a separate TE topology ID);



Bryskin, et al.        Expires January 12, 2021               [Page 27]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Set for each TE node and TE link of the auxiliary TE topology the
      Supporting Node/Link attribute matching the original TE topology
      ID, as well as the ID of the respective original TE node/link of
      the original TE topology.  For example, if S7" of the auxiliary TE
      topology is a copy of S7 of the original TE topology, the
      Supporting Node attribute of S7" will specify the ID of the
      original  TE topology (presented in figure 8) and the ID of S7;

   o  Set for the abstract TE node AN1 the Underlay TE Topology
      attribute matching the auxiliary TE Topology ID

   Furthermore, the Star-n-Spokes Abstract TE topology provider is
   expected to:

   o  Compute/provision TE paths/tunnels supporting each of the abstract
      TE links in Figure 12 (i.e. abstract TE links connecting the
      spokes to the star, AN1) as described in 1.3.2;

   o  Generate the AN1's Basic/Detailed Connectivity Matrix attribute
      based on intra-node path computations performed on the AN1's
      underlay (i.e. auxiliary) TE topology and describing permissible
      inbound TE link/label_x. outbound TE link/label_y switching
      combinations as described in 1.3.1

1.3.4. Arbitrary Abstract TE Topology

















                 Figure 13. Arbitrary Abstract TE Topology


   To achieve an optimal tradeoff between the number of components, the
   amount of information exposed by a transport network provider and the


Bryskin, et al.        Expires January 12, 2021               [Page 28]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   amount of path computations required to keep said information up-to-
   date, the provider may present the TE network domain as an arbitrary
   abstract TE topology comprised of any number of abstract TE nodes
   interconnected by abstract TE links (see Figure 13). Each of the
   abstract TE nodes can represent a single or several interconnected TE
   nodes from the domain's underlay (native or lower level abstract) TE
   topology, or a fraction of an underlay TE node. [Note that each of
   the abstract TE nodes of the TE topology in Figure 13 is expected to
   be introduced and maintained by the provider following the
   instructions as described in 1.3.3; likewise, each of the abstract TE
   links of the topology is expected to be computed, provisioned and
   maintained as described in 1.3.2]

1.3.5. Customized Abstract TE Topologies

























             Figure 14.  Customized Abstract TE Topology(ies)


   A transport network/domain provider may serve more than one client.
   In such a case, the provider "slices" the network/domain resources
   and exposes a slice for each of the clients in the form of a
   customized abstract TE topology. In Figure 14, the provider serves


Bryskin, et al.        Expires January 12, 2021               [Page 29]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   two clients (Blue and Red). Client Blue is provided with the Blue
   abstract TE topology supported by the blue TE tunnels or paths in the
   underlay (native) TE topology (depicted in the Figure with blue
   broken lines). Likewise, client Red is provided with the Red abstract
   TE topology supported by the red TE tunnels or paths in the underlay
   TE topology.

1.3.6. Hierarchical Abstract TE Topologies





















              Figure 15. Hierarchy of Abstract TE Topologies


   As previously mentioned, an underlay TE topology for a given abstract
   TE topology component does not have to be one of the domain's native
   TE topologies - another (lower level) domain's abstract TTE topology
   can be used instead. This means that abstract TE topologies are
   hierarchical in nature.

   Figure 15 provides an example of abstract TE topology hierarchy. In
   this Figure the blue topology is a top level abstract TE topology
   catered to by the provider to one of the domain's clients. One of the
   TE links of the blue topology - link EF - is supported by a TE path
   E'-M-P-Q-N-F' computed in the underlay TE topology (red topology),
   which happens to be domain's (lower level) abstract TE topology..
   Furthermore, as shown, the TE link PQ - one of the TE links
   comprising the E'-M-P-Q-N-F' path - is supported by its own underlay


Bryskin, et al.        Expires January 12, 2021               [Page 30]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   TE path, P'-X-Q' - computed on one of the domain's native TE
   topologies.

   Importantly, each TE link and TE node of a given abstract TE topology
   has, generally speaking, its individual stack/hierarchy of underlay
   TE topologies.

1.4. Merging TE Topologies Provided By Multiple Providers

   A client may receive TE topologies provided by multiple providers,
   each of which managing a separate domain of an interconnected multi-
   domain transport network. In order to make use of said topologies,
   the client is expected to merge (inter-connect) the provided TE
   topologies into one or more client's native TE topologies, each of
   which homogeneously representing the multi-domain transport network.
   This makes it possible for the client to select end-to-end TE paths
   for its TE tunnel connections traversing multiple domains.

   In particular, the process of merging TE topologies includes:

   o  Identifying neighboring TE domains and locking their TE topologies
      horizontally by connecting their inter-domain open-ended TE links;

   o  Renaming TE node, link, and SRLG IDs into ones allocated from a
      separate name space; this is necessary because all TE topologies
      are considered to be, generally speaking, independent with a
      possibility of clashes among TE node, link or SRLG IDs. Original
      TE node/link IDs along with the original TE topology ID are stored
      in the Source attribute of the respective TE nodes/links of the
      merged TE topology;

   o  Locking, TE topologies associated with different layer networks
      vertically according to provided TE inter-layer locks; this is to
      facilitate inter-layer path computations across multiple TE
      topologies provided by the same topology provider.














Bryskin, et al.        Expires January 12, 2021               [Page 31]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020



























                  Figure 16. Merging Domain TE Topologies


   Figure 16 illustrates the process of merging, by the client, of TE
   topologies provided by the client's providers.

   In the Figure, each of the two providers caters to the client a TE
   topology (abstract or native), describing the network domain under
   the respective provider's control. The client, by consulting the
   attributes of the open-ended inter-domain/access TE links - such as
   TE inter-domain plugs or remote TE node/link IDs - is able to
   determine that:

     1. the two domains are adjacent and are interconnected via three
        inter-domain TE links, and;

     2. each domain is connected to a separate customer site, connecting
        the left domain in the Figure to customer devices C-11 and C-12,
        and the right domain to customer devices C-21, C-22 and C-23.





Bryskin, et al.        Expires January 12, 2021               [Page 32]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   Therefore, the client interconnects the open-ended TE links, as shown
   on the upper part of the Figure.

   As mentioned, one way to interconnect the open-ended inter-
   domain/access TE links of neighboring domains is to mandate the
   providers to specify remote nodeID/linkID attributes in the provided
   inter-domain/access TE links. This, however, may prove to be not
   flexible. For example, the providers may not be aware of the
   respective remote nodeID/linked values. More importantly, this option
   does not allow for the client to mix-n-match multiple (more than one)
   TE topologies catered by the same providers (see the next section).
   Another, more flexible, option to resolve the open-ended inter-
   domain/access TE links is by decorating them with the TE inter-domain
   plug attribute. The attribute specifies inter-domain plug ID - a
   network-wide unique value that identifies on the network connectivity
   supporting a given inter-domain/access TE link. Instead of specifying
   remote node ID/link ID, an inter-domain/access TE link may provide a
   non-zero inert-domain plug ID. It is expected that two neighboring
   domain TE topologies (provided by separate providers) will have each
   at least one open-ended inter-domain/access TE link with a TE inter-
   domain plug matching to one provided by its neighbor. For example,
   the inter-domain TE link originating from node S5 of the Domain 1 TE
   topology (Figure 8) and the inter-domain TE link coming from node S3
   of Domain2 TE topology may specify matching TE inter-domain plugs
   (i.e. carrying the same inter-domain plug ID). This would allow for
   the client to identify adjacent nodes in the separate neighboring TE
   topologies and resolve the inter-domain/access TE links connecting
   them regardless of their respective nodeIDs/linkIDs (which, as
   mentioned, could be allocated from independent name spaces).

   Inter-domain plug IDs may be assigned and managed by a central
   network authority. Alternatively, inter-domain plug IDs could be
   dynamically auto-discovered (e.g. via LMP protocol).

   Furthermore, the client renames the TE nodes, links and SRLGs offered
   in the abstract TE topologies by assigning to them IDs allocated from
   a separate name space managed by the client. Such renaming is
   necessary, because the two abstract TE topologies may have their own
   name spaces, generally speaking, independent one from another; hence,
   ID overlaps/clashes are possible. For example, both TE topologies
   have TE nodes named S7, which, after renaming, appear in the merged
   TE topology as S17 and S27 respectively. IDs of the original (i.e.
   abstract TE topology) TE nodes/links along with the ID of the
   abstract TE topology they belong to are stored in the Source
   attribute of the respective TE nodes/links of the merged TE topology.
   For example, the Source attribute of S27 will contain S7 and the TE
   topology ID of the abstract TE topology describing domain 2.


Bryskin, et al.        Expires January 12, 2021               [Page 33]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020




   Once the merging process is complete, the client can use the merged
   TE topology for path computations across both domains, for example,
   to compute a TE path connecting C-11 to C-23.

1.4.1. Dealing With Multiple Abstract TE Topologies Provided By The Same
   Provider























    Figure 17. Multiple Abstract TE Topologies Provided By TE Topology
                                 Providers


   A given provider may expose more than one abstract TE topology to the
   client. For example, one abstract TE topology could be optimized
   based on a lowest-cost criterion, while another one could be based on
   best possible delay metrics, while yet another one could be based on
   maximum bandwidth availability for the client connections.
   Furthermore, the client may request all or some providers to expose
   additional abstract TE topologies, possibly of a different type
   and/or optimized differently, as compared to already-provided TE
   topologies. In any case, the client should be prepared for a provider
   to offer to the client more than one abstract TE topology.



Bryskin, et al.        Expires January 12, 2021               [Page 34]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   It should be up to the client to decide how to mix-and-match multiple
   abstract TE topologies provided by each of the providers, as well as
   how to merge them into the client's native TE topologies. The client
   also decides how many such merged TE topologies it needs to produce
   and maintain. For example, in addition to the merged TE topology
   depicted on the upper part of Figure 16, the client may merge the
   abstract TE topologies received from the two providers, as shown in
   Figure 17, into the client's additional native TE topologies, as
   shown in Figure 18.

   [Note: allowing for the client mix-n-matching of multiple TE
   topologies assumes that TE inter-domain plugs (rather than remote
   nodeID/linked) option is used for identifying neighboring domains and
   inter-domain/access TE link resolution.]






























        Figure 18. Multiple Native (Merged) Client's TE Topologies




Bryskin, et al.        Expires January 12, 2021               [Page 35]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   It is important to keep in mind that each of the three native
   (merged) TE topologies could be used by the client for computing TE
   paths for any of the multi-domain connections. The choice as to which
   topology to use for a given connection depends on the
   connection/tunnel parameters/requirements and the topology's style
   and optimization criteria.

1.5. Configuring Abstract TE Topologies

   When a client receives one or more abstract TE topologies from one of
   its providers, it may accept the topologies as-is and merge then into
   one or more of its own native TE topologies. Alternatively, the
   client may choose to request a re-configuration of one, some or all
   abstract TE topologies provided by the providers. Specifically, with
   respect to a given abstract TE topology, some of its TE nodes/links
   may be requested to be removed, while additional ones may be
   requested to be added. It is also possible that existing TE
   nodes/links may be asked to be re-configured. For example, a set of
   TE links may be requested to be disjoint from each other by
   configuring the same Non Sharing Risk Link Group (NSRLG) attribute
   for all links from the set. Such a configuration would force the
   provider to place TE tunnels supporting the TE links from the set
   onto sufficiently disjoint TE paths computed in the tunnels underlay
   TE topology. Furthermore, the topology-wide optimization criteria may
   be requested to be changed. For example, underlay TE paths supporting
   the abstract TE links, currently optimized to be shortest (least-
   cost) paths, may be requested to be re-optimized based on the minimal
   delay criteria. Additionally, the client may request the providers to
   configure entirely new abstract TE topologies and/or to remove
   existing ones. Furthermore, future periodic or one time additions,
   removals and/or re-configurations of abstract TE topology elements
   and/or their attributes could be (re-)scheduled by the client ahead
   of time.

   It is the responsibility of the client to implement the logic behind
   the above-described abstract TE topology negotiation. It is expected
   that the logic is influenced by the client's local
   configuration/templates, policies conveyed by client's clients, input
   from the network planning process, telemetry processor, analytics
   systems and/or direct human operator commands. Figure 19 exemplifies
   the abstract TE topology negotiation process. As shown in the Figure,
   the original abstract TE topology exposed by a provider was requested
   to be re-configured. Specifically, one of the abstract TE links was
   asked to be removed, while three new ones were asked to be added to
   the abstract TE topology.




Bryskin, et al.        Expires January 12, 2021               [Page 36]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020























       Figure 19.  Provider. Client Abstract TE Topology Negotiation


1.6. TE Tunnel Model

   The TE Tunnel Model is written in YANG modeling language. It is
   defined and developed by the IETF TEAS WG and is documented as "YANG
   Data Model for Traffic Engineering Tunnels and Interfaces" [I-D.ietf-
   teas-yang-te]. Among other things the model describes a TE network
   provider's TE Tunnel data store as it is seen and influenced by a
   client.

   The TE Tunnel Model allows for the provider to convey to each of its
   clients:

   o  information on TE tunnels provided to the client that are fully
      contained within the controlled network domain,

   o  information on multi-domain TE tunnel segments across the network
      domain controlled by the provider;

   o  information on connections/LSPs, supporting TE tunnels and TE
      tunnel segments;

   o  updates in response to changes to the client's active TE
      tunnels/segments and the connections supporting them,


Bryskin, et al.        Expires January 12, 2021               [Page 37]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  updates in response to the TE tunnel/segment telemetry/state
      information the client has expressed an interest in.

   The TE Tunnel Model allows for a TE network client to:

   o  Issue configuration requests to set up, tear down, replace, modify
      and manipulate end-to-end TE tunnels, as well as segments of
      multi-domain TE tunnels across the network controlled by the
      provider;

   o  Request and obtain information on active TE tunnels/segments and
      connections supporting them;

   o  Subscribe to and configure with the provider triggers, pace and
      contents of the TE tunnel/segment change update notifications;

   o  Subscribe to and configure with the provider triggers, pace and
      contents of the TE tunnel/segment event notifications, such as
      detected alarms, faults, protection/restoration actions, etc..

   o  Subscribe to and configure with the provider triggers, pace and
      contents of TE tunnel/segment telemetry (e.g. statistics counters)
      update notifications.


























Bryskin, et al.        Expires January 12, 2021               [Page 38]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


1.7. TE Tunnel/Transport Service Modeling Constructs




























                           Figure 20. TE tunnel


   o  TE tunnel - a connection-oriented service provided by a layer
      network of delivery of a client's data between source and
      destination tunnel termination points. A TE tunnel in a server
      layer network may support a link in a client layer network (e.g.
      OCh layer TE tunnel supporting ODU4 link). In Figure 20, a TE
      tunnel interconnects tunnel termination points resident on
      switches C-R2 and C-R3. A TE tunnel is realized via (supported by,
      mapped onto) one or more layer network connections/LSPs


   _____________________________________________________________________

      /* TE tunnel */
       |  +--rw tunnel* [name]
            |  |  +--rw name                   leafref


Bryskin, et al.        Expires January 12, 2021               [Page 39]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |  +--rw identifier?            leafref
      /* TE tunnel configuration parameters */
            |  |  +--rw config
            |  |  |  +--rw name?                   string
            |  |  |  +--rw type?                   identityref
            |  |  |  +--rw identifier?             uint16
            |  |  |  +--rw description?            string
            |  |  |  +--rw switchcap?              identityref
            |  |  |  +--rw encoding?               identityref
            |  |  |  +--rw protection-type?        identityref
            |  |  |  +--rw admin-status?           identityref
            |  |  |  +--rw preference?             uint8
            |  |  |  +--rw reoptimize-timer?       uint16
            |  |  |  +--rw source?                 inet:ip-address
            |  |  |  +--rw destination?            inet:ip-address
            |  |  |  +--rw src-tp-id?              binary
            |  |  |  +--rw dst-tp-id?              binary
            |  |  |  +--rw topology-id?            te-types:te-topology-
      id
            |  |  |  +--rw ignore-overload?        boolean
            |  |  |  +--rw bandwidth-generic?      te-types:te-bandwidth
            |  |  |  +--rw disjointness?           te-types:te-path-
      disjointness
            |  |  |  +--rw setup-priority?         uint8
            |  |  |  +--rw hold-priority?          uint8
            |  |  |  +--rw signaling-type?         identityref
      /* Hierarchy TE tunnel parameters */
            |  |  |  +--rw hierarchical-link-id
            |  |  |  |  +--rw local-te-node-id?      te-types:te-node-id
            |  |  |  |  +--rw local-te-link-tp-id?   te-types:te-tp-id
            |  |  |  |  +--rw remote-te-node-id?     te-types:te-node-id
            |  |  |  |  +--rw te-topology-id?        te-types:te-
      topology-id
      /* Bidirectional TE tunnel parameters */
            |  |  |  +--rw bidirectional
            |  |  |     +--rw association
            |  |  |        +--rw id?              uint16
            |  |  |        +--rw source?          inet:ip-address
            |  |  |        +--rw global-source?   inet:ip-address
            |  |  |        +--rw type?            identityref
            |  |  |        +--rw provisioing?     identityref
      /* TE tunnel state */
            |  |  +--ro state
            |  |  |  +--ro name?                   string
            |  |  |  +--ro type?                   identityref
            |  |  |  +--ro identifier?             uint16
      ..............................................................


Bryskin, et al.        Expires January 12, 2021               [Page 40]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |  |  +--ro oper-status?            identityref
      /* TE tunnel primary path and LSP container */
            |  |  +--rw p2p-primary-paths
            |  |  |  +--rw p2p-primary-path* [name]
            |  |  |     +--rw name
                     /* Configuration */
      leafref
            |  |  |     +--rw config
            |  |  |     |  +--rw name?                      string
            |  |  |     |  +--rw preference?                uint8
            |  |  |     |  +--rw path-setup-protocol?       identityref
            |  |  |     |  +--rw path-computation-method?   identityref
            |  |  |     |  +--rw path-computation-server?   inet:ip-
      address
            |  |  |     |  +--rw compute-only?              empty
            |  |  |     |  +--rw use-cspf?                  boolean
            |  |  |     |  +--rw verbatim?                  empty
            |  |  |     |  +--rw lockdown?                  empty
            |  |  |     |  +--rw named-explicit-path?       leafref
            |  |  |     |  +--rw named-path-constraint?     leafref {te-
      types:named-path-constraints}?
                      /* state */
            |  |  |     +--ro state
            |  |  |     |  +--ro name?                       string
            |  |  |     |  +--ro preference?                 uint8
            |  |  |     |  +--ro path-setup-protocol?        identityref
            |  |  |     |  +--ro path-computation-method?    identityref
            |  |  |     |  +--ro path-computation-server?    inet:ip-
      address
            |  |  |     |  +--ro compute-only?               empty
            |  |  |     |  +--ro use-cspf?                   boolean
            |  |  |     |  +--ro verbatim?                   empty
            |  |  |     |  +--ro lockdown?                   empty
            |  |  |     |  +--ro named-explicit-path?        leafref
            |  |  |     |  +--ro named-path-constraint?      leafref
      {te-types:named-path-constraints}?
                        /* Computed path */
                        /* Computed path properties/metrics /
            |  |  |     |  +--ro computed-path-properties
            |  |  |     |  |  +--ro path-metric* [metric-type]
            |  |  |     |  |  |  +--ro metric-type           identityref
            |  |  |     |  |  |  +--ro accumulative-value?   uint64
                        /* Computed path affinities */
            |  |  |     |  |  +--ro path-affinities
            |  |  |     |  |  |  +--ro constraints* [usage]
            |  |  |     |  |  |     |  +--ro usage?
      identityref


Bryskin, et al.        Expires January 12, 2021               [Page 41]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |  |     |  |  |     |  +--ro (style)?
            |  |  |     |  |  |     |     +--:(value)
            |  |  |     |  |  |     |     |  +--ro value?            te-
      types:admin-groups
            |  |  |     |  |  |     |     +--:(named)
            |  |  |     |  |  |     |        +--ro affinity-names*
      [name]
            |  |  |     |  |  |     |           +--ro name    string
                        /* Computed path SRLGs */
            |  |  |     |  |  +--ro path-srlgs
            |  |  |     |  |  |  +--ro (style)?
            |  |  |     |  |  |     +--:(values)
            |  |  |     |  |  |     |  +--ro usage?         identityref
            |  |  |     |  |  |     |  +--ro values*        te-
      types:srlg
            |  |  |     |  |  |     +--:(named)
            |  |  |     |  |  |        +--ro constraints* [usage]
            |  |  |     |  |  |           +--ro usage
      identityref
            |  |  |     |  |  |           +--ro constraint
            |  |  |     |  |  |              +--ro srlg-names* [name]
            |  |  |     |  |  |                 +--ro name    string
                        /* Computed path sub-objects */
            |  |  |     |  |  +--ro path-computed-route-objects
      ..............................................................
                        /* LSP (provisioned path) */
            |  |  |     |     +--ro lsp* [source destination tunnel-id
      lsp-id extended-tunnel-id type]
                        /* LSP parameters */
            |  |  |     |        +--ro source                leafref
            |  |  |     |        +--ro destination           leafref
            |  |  |     |        +--ro tunnel-id             leafref
            |  |  |     |        +--ro lsp-id                leafref
            |  |  |     |        +--ro extended-tunnel-id    leafref
            |  |  |     |        +--ro type                  leafref
            |  |  |     |        +--ro signaling-type?       identityref
            |  |  |     +--rw candidate-p2p-secondary-paths
            |  |  |        +--rw candidate-p2p-secondary-path*
      [secondary-path]
            |  |  |           +--rw secondary-path    leafref
            |  |  |           +--rw config
            |  |  |           |  +--rw secondary-path?        leafref
            |  |  |           |  +--rw priority?              uint16
            |  |  |           |  +--rw path-setup-protocol?
      identityref
            |  |  |           +--ro state
            |  |  |              +--ro secondary-path?        leafref


Bryskin, et al.        Expires January 12, 2021               [Page 42]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |  |              +--ro priority?              uint16
            |  |  |              +--ro path-setup-protocol?
      identityref
            |  |  |              +--ro active?                boolean

      /* TE tunnel secondary path and LSP container */

            |  |  +--rw p2p-secondary-paths
            |  |  |  +--rw p2p-secondary-path* [name]
      ......................................................
            |  |  |     +--rw name      leafref
            |  |  |     +--rw config (same as for primary path )
      .....................................................
            |  |  |     +--ro state  (same as for primary, except for
      disjointedness_state )
         |        |  +--ro disjointness_state?        te-types:te-path-
      disjointness.....................................................
            |  |  |        +--ro computed-path-properties (same as for
      primary path)
      ..........................................................
          |  |  |        |  +--ro path-affinities (same as for primary
      path)
      ..........................................................
            |  |  |        |  +--ro path-srlgs    (same as for primary
      path)
      ..........................................................
            |  |  |        |  +--ro path-computed-route-objects
      .........................................................
                           /* LSP (provisioned path) */
            |  |  |        +--ro lsp  (same as for the primary LSP)
      ........................................................
   _____________________________________________________________________

















Bryskin, et al.        Expires January 12, 2021               [Page 43]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Tunnel termination point (TTP) - a physical device inside a given
      node/switch realizing a TE tunnel termination function in a given
      layer network, as well as the TE tunnel's adaptation function
      provided for client layer network(s). One example of tunnel
      termination point is an OCh layer transponder. [Note: Tunnel
      termination points are not to be confused with TE tunnel
      termination points, which are TE representations of physical
      tunnel termination points. Similar to physical switches and links
      of the network, such as depicted in Figure 20, being  represented
      on a TE topology describing the network as TE nodes and TE links,
      (physical) tunnel termination points (TTPs) are represented as TE
      tunnel termination points (TE TTPs, see 1.2) hosted by the TE
      nodes. For example, a provisioned connection/LSP starts on a
      source TTP, goes through a chain of physical links and stops on a
      destination TTP. In contrast, TE path (e.g. result of a path
      computation) starts on a source TE TTP, goes through a chain of TE
      links and stops on a destination TE TTP.]


   _____________________________________________________________________

            |  |  |  +--rw source?                 inet:ip-address
            |  |  |  +--rw destination?            inet:ip-address
            |  |  |  +--rw src-tp-id?              binary
            |  |  |  +--rw dst-tp-id?              binary
   _____________________________________________________________________



   o  TE tunnel hand-off point - an access link or inter-domain link by
      which a multi-domain TE tunnel enters or exits a given network
      domain, in conjunction with a layer network resource (such as a
      wavelength channel or ODUk container) allocated on the
      access/inter-domain link for the TE tunnel.

   o  TE tunnel segment - a part of a multi-domain TE tunnel that spans
      a given network domain and is directly and fully controlled by the
      domain's controller, DC. TE tunnel segment is a fragment of a
      multi-domain TE tunnel between

     1. the source tunnel termination point and the TE tunnel hand-off
        point outbound from the TE tunnel's first domain (head TE tunnel
        segment);

     2. inbound and outbound TE tunnel hand-off points into/from a given
        domain (transit TE tunnel segment);



Bryskin, et al.        Expires January 12, 2021               [Page 44]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


     3. inbound TE tunnel hand-off point into the TE tunnel's last
        domain and the destination tunnel termination point (tail TE
        tunnel segment);

   o  Transport service -  the same as TE tunnel segment

   o  Hierarchy TE tunnel - a server layer TE tunnel that supports a
      dynamically created TE link in the client layer network topology
      (e.g. see 1.2)


   _____________________________________________________________________

      /* Hierarchy TE tunnel parameters */
            |  |  |  +--rw hierarchical-link-id
            |  |  |  |  +--rw local-te-node-id?      te-types:te-node-id
            |  |  |  |  +--rw local-te-link-tp-id?   te-types:te-tp-id
            |  |  |  |  +--rw remote-te-node-id?     te-types:te-node-id
            |  |  |  |  +--rw te-topology-id?        te-types:te-
      topology-id
   _____________________________________________________________________



   o  Hierarchy transport service -  the first or the last segment of a
      multi-domain hierarchy TE tunnel

   o  Dependency TE tunnel - a hierarchical TE tunnel provisioned or to
      be provisioned in an immediayely adjacent server layer a given
      client layer TE tunnel depends on (i.e. carried or to be carried
      within)

   o  Potential TE tunnel/segment - a TE tunnel/segment configured in
      COMPUTE_ONLY mode. For such a TE tunnel/segment TE paths to be
      taken by supporting connection(s) is/are computed and monitored,
      but the connection(s) are not provisioned


   _____________________________________________________________________

            |  |  |     |  +--rw path-computation-method?   identityref
            |  |  |     |  +--rw path-computation-server?   inet:ip-
      address
            |  |  |     |  +--rw compute-only?              empty
            |  |  |     |  +--rw use-cspf?                  Boolean
   _____________________________________________________________________



Bryskin, et al.        Expires January 12, 2021               [Page 45]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020































                  Figure 20a. TE Tunnel Connections/LSPs


   o  Layer network connection/connection/LSP - a layer network path
      supporting a TE tunnel by realizing its implied forwarding
      function. Said path is provisioned in a given layer network's data
      plane over a chain of links and cross-connected over switches
      terminating the links. It interconnects the supported TE tunnel's
      source and destination termination points (in the case of end-to-
      end connection) or TE tunnel's hand-off points (in the case of
      transport service connection) or the TE tunnel's two split-merge
      points (in the case of segment protection connection.

      Example: ODU2 connection supporting an ODU2 TE tunnel.

   _____________________________________________________________________



Bryskin, et al.        Expires January 12, 2021               [Page 46]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                        /* LSP (provisioned path) */
            |  |  |     |     +--ro lsp* [source destination tunnel-id
      lsp-id extended-tunnel-id type]
                        /* LSP parameters */
            |  |  |     |        +--ro source                leafref
            |  |  |     |        +--ro destination           leafref
            |  |  |     |        +--ro tunnel-id             leafref
            |  |  |     |        +--ro lsp-id                leafref
            |  |  |     |        +--ro extended-tunnel-id    leafref
            |  |  |     |        +--ro type                  leafref
            |  |  |     |        +--ro signaling-type?       identityref
      ..................................................................
            |  |  |              +--ro priority?              uint16
            |  |  |              +--ro path-setup-protocol?
      identityref
            |  |  |              +--ro active?                Boolean
   _____________________________________________________________________



   o  Working connection - the primary connection of the supported TE
      tunnel or transport service (see Figure 20a).

   o  End-to-end protection connection - a secondary end-to-end
      connection of the supported TE tunnel (e.g. end-to-end 1+1
      protection connection, see Figure 20a).

   o  Segment protection connection - a secondary connection of the
      supported transport service protecting the service over a given
      network domain (e.g. 1+1 segment protection connection, see Figure
      20a)

   o  Restored connection - a connection after successful network
      failure  restorationrestoration procedures

   o  Current connection - the same as restored connection

   o  Nominal connection - a connection as (re-)provisioned upon a
      client configuration request (i.e. a connection before any
      automatic network failure restoration re-configurations are
      carroed out, also a connection after restoration reversion
      procedures are successfully completed)

   o  Unprotected TE tunnel/transport service - TE tunnel/transport
      service supported by a single (working/primary) connection/LSP




Bryskin, et al.        Expires January 12, 2021               [Page 47]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Protected TE tunnel/transport service - TE tunnel/transport
      service supported by one working connection/LSP and at least one
      protection/secondary connection/LSP

   o  Restorable TE tunnel/transport service - TE tunnel/transport
      service with pre-configured automatic network failure restoration
      capabilities

   o  TE tunnel/transport service automatic protection switchover - a
      process of switching of carrying user payload from the
      tunnel's/service's affected by a network failure working
      connection onto one of the tunnel's/service's healthy protection
      connection

   o  TE tunnel/transport service automatic protection reversion - a
      process of switching of carrying user payload from the
      tunnel's/service's protection connection  back onto the
      tunnel's/service's working connection after the latter was
      repaired from network failure

   o  TE tunnel/transport service protection external command - a
      command, typically issued by an operator, which influences the
      automatic protection switchover and reversion.

      External commands are defined in [ITU-T G.800] and [RFC 4427]:

        . Freeze: A temporary configuration action that prevents any
           switch action to be taken and as such freezes the current
           state.

        . Clear Freeze: An action that clears the active Freeze state.

        . Lockout of Normal: A temporary configuration action that
           ensures that the normal traffic is not allowed to use the
           protection transport entity.

           As described in [ITU-T G.808], this command should be issued
           at both ends.

        . Clear Lockout of Normal: An action that clears the active
           Lockout of Normal state.

        . Lockout of Protection: A temporary configuration action that
           ensures that the protection transport entity is temporarily
           not available to transport a traffic signal (either normal or
           extra traffic).



Bryskin, et al.        Expires January 12, 2021               [Page 48]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


        . Forced Switch: A switch action that swithes the extra traffic
           signal, the normal traffic signal, or the null signal to the
           protection transport entity, unless an equal or higher
           priority switch command is in effect.

        . Manual Switch: A switch action that switches the extra
           traffic signal, the normal traffic signal #i, or the null
           signal to the protection transport entity, unless a fault
           condition exists on other transport entities or an equal or
           higher priority switch command is in effect.

        . Exercise: An action to start testing if the APS communication
           is operating correctly. It is lower priority than any other
           state or command.

        . Clear: An action that clears the active near-end lockout of
           protection, forced switch, manual switch, WTR state, or
           exercise command

   o  TE tunnel/transport service protection Hold-off time - a
      configured period of time to expire between the moment of
      detecting of the first network failure affecting the
      tunnel's/service's working connection and the begining of the
      tunnel's/service's automatic protection switchover procedures

   o  TE tunnel/transport service protection WTR time - a configured
      period of time to expire between the moment of repairing the last
      network failure affecting the tunnel's/service's working
      connection and the begining of the tunnel's/service's automatic
      protection reversion procedures

   o  TE tunnel/transport service automatic network failure restoration
      - a process of replacing of the tunnel's/service's connection(s)
      affected by one or more network failures away from the point(s) of
      failue

   o  TE tunnel/transport service restoration reversion- a process of
      replacing of the tunnel's/service's connection(s) back onto the
      nominal connection paths after all network failures affecting the
      tunnel's/service's nominal connection(s) are repaired

   o  TE tunnel/transport service restoration Hold-off time - a
      configured period of time to expire between the moment of
      detecting of the first network failure affecting the
      tunnel's/service's nominal or current connection and the beginning
      of the automatic connection restoration procedures



Bryskin, et al.        Expires January 12, 2021               [Page 49]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  TE tunnel/transport service restoration WTR time - a configured
      period of time to expire between the moment of repairing the last
      network failure affecting the tunnel's/service's nominal
      connection and the begining of the connection automatic
      restoration reversion procedures

   o  Configured restoration path - a TE path specified by the client to
      be used during the automatic network failure restoration operation
      on one of the TE tunnel's/transport service's nominal or current
      connections

   o  Pre-computed restoration path - a configured restoration path to
      be validated by a path computer during the TE tunnel/transport
      service setup or client triggered modification

   o  Pre-provisioned restoration path - a pre-computed restoration path
      to be pre-provisioned/pre-signaled in the network (with all
      associated network resources allocated but not necessarily bound
      into cross-connects) during the TE tunnel/transport service setup
      or client triggered modification

   o  Connection configured path - a TE path (see 1.2) over a TE
      topology describing a layer network/domain that specifies (loosely
      or strictly) the client's requirements with respect to an ordered
      list of network nodes, links and resources on the links a given
      connection should go through


   _____________________________________________________________________

      |  |        +--rw explicit-route-object* [index]
            |  |           +--rw index                   leafref
            |  |           +--rw explicit-route-usage?   identityref
      (INCLUDE/EXCLUDE)
            |  |           |  +--rw index?            uint32
            |  |           |  +--rw (type)?
            |  |           |     +--:(numbered)
            |  |           |     |  +--rw numbered-hop
            |  |           |     |     +--rw address?    te-types:te-tp-
      id
            |  |           |     |     +--rw hop-type?   te-hop-type
            |  |           |     +--:(as-number)
            |  |           |     |  +--rw as-number-hop
            |  |           |     |     +--rw as-number?   binary
            |  |           |     |     +--rw hop-type?    te-hop-type
            |  |           |     +--:(unnumbered)
            |  |           |     |  +--rw unnumbered-hop


Bryskin, et al.        Expires January 12, 2021               [Page 50]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |           |     |     +--rw node-id?      te-types:te-
      node-id
            |  |           |     |     +--rw link-tp-id?   te-types:te-
      tp-id
            |  |           |     |     +--rw hop-type?     te-hop-type
            |  |           |     +--:(label)
            |  |           |     |  +--rw label-hop
            |  |           |     |     +--rw value?   rt-
      types:generalized-label
            |  |           |     +--:(sid)
            |  |           |        +--rw sid-hop
            |  |           |           +--rw sid?   rt-
      types:generalized-label
   _____________________________________________________________________



   o  Connection exclusion path - a TE path over a TE topology
      describing a layer network/domain that specifies the client's
      requirements with respect to an unordered list of network nodes,
      links and resources on the links to be avoided  by a given
      connection


   _____________________________________________________________________

      |        |  +--rw route-object-exclude-always* [index]
            |        |  |  +--rw index     leafref
            |        |  |  |  +--rw index?            uint32
            |        |  |  |  +--rw (type)?
            |        |  |  |     +--:(numbered)
            |        |  |  |     |  +--rw numbered-hop
            |        |  |  |     |     +--rw address?    te-types:te-tp-
      id
            |        |  |  |     +--:(as-number)
            |        |  |  |     |  +--rw as-number-hop
            |        |  |  |     |     +--rw as-number?   binary
            |        |  |  |     +--:(unnumbered)
            |        |  |  |     |  +--rw unnumbered-hop
            |        |  |  |     |     +--rw node-id?      te-types:te-
      node-id
            |        |  |  |     |     +--rw link-tp-id?   te-types:te-
      tp-id
            |        |  |  |     +--:(label)
            |        |  |  |     |  +--rw label-hop
            |        |  |  |     |     +--rw value?   rt-
      types:generalized-label


Bryskin, et al.        Expires January 12, 2021               [Page 51]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |        |  |  |     +--:(sid)
            |        |  |  |        +--rw sid-hop
            |        |  |  |           +--rw sid?   rt-
      types:generalized-label
   _____________________________________________________________________



   o  Connection computed path - a TE path over a TE topology describing
      a layer network/domain as computed (subject to all configured
      constraints and optimization criteria) for a given connection to
      take. Computed connection path could be thought as the TE path
      intended to be taken by the connection


   _____________________________________________________________________

       /* Computed path */
                        /* Computed path properties/metrics /
            |  |  |     |  +--ro computed-path-properties
            |  |  |     |  |  +--ro path-metric* [metric-type]
            |  |  |     |  |  |  +--ro metric-type           identityref
            |  |  |     |  |  |  +--ro accumulative-value?   uint64
                        /* Computed path affinities */
            |  |  |     |  |  +--ro path-affinities
            |  |  |     |  |  |  +--ro constraints* [usage]
            |  |  |     |  |  |     |  +--ro usage?
      identityref
            |  |  |     |  |  |     |  +--ro (style)?
            |  |  |     |  |  |     |     +--:(value)
            |  |  |     |  |  |     |     |  +--ro value?            te-
      types:admin-groups
            |  |  |     |  |  |     |     +--:(named)
            |  |  |     |  |  |     |        +--ro affinity-names*
      [name]
            |  |  |     |  |  |     |           +--ro name    string
                        /* Computed path SRLGs */
            |  |  |     |  |  +--ro path-srlgs
            |  |  |     |  |  |  +--ro (style)?
            |  |  |     |  |  |     +--:(values)
            |  |  |     |  |  |     |  +--ro usage?         identityref
            |  |  |     |  |  |     |  +--ro values*        te-
      types:srlg
            |  |  |     |  |  |     +--:(named)
            |  |  |     |  |  |        +--ro constraints* [usage]
            |  |  |     |  |  |           +--ro usage
      identityref


Bryskin, et al.        Expires January 12, 2021               [Page 52]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


            |  |  |     |  |  |           +--ro constraint
            |  |  |     |  |  |              +--ro srlg-names* [name]
            |  |  |     |  |  |                 +--ro name    string
                        /* Computed path sub-objects */
            |  |  |     |  |  +--ro path-computed-route-objects
      ..............................................................
   _____________________________________________________________________



   o  Connection actual path - an active connection's path as
      provisioned in the layer network's data plane in the form of a TE
      path over a TE topology describing the layer network/domain

1.7.1. Bidirectional Tunnels

   The TE Tunnel model supports the setup of unidirectional connections
   as well as multiple types of bidirectional connections.

   The bidirectional flag is used to indicate whether the TE Tunnel is
   unidirectional or bidirectional. In case of bidirectional TE Tunnels,
   the p2p-reverse-primary-path presense container is used to indicate
   whether the bidirectional TE Tunnel is native or not. This presense
   container cannot be instantiated for unidirectional TE Tunnels.

   Unidirectional TE Tunnel: the bidirectional flag is set to "False".

   The unidirectional path constraints are configured in the p2p-
   primary-path container (the p2p-reverse-primary-path presense
   container is not created).

   The server computes one unidirectional path and report it and its
   properties within the p2p-primary-path container.

   The server setup unidirectional LSPs and reports them under the p2p-
   primary-path container.

   Native bidirectional TE Tunnel: the bidirectional flag is set to
   "True" and the p2p-reverse-primary-path container is not created.

   The path constraints, applicable to both directions, are configured
   in the p2p-primary-path container.

   The server computes one bidirectional path and report it and its
   properties within the p2p-primary-path container.




Bryskin, et al.        Expires January 12, 2021               [Page 53]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   The server setup bidirectional LSPs and reports them under the p2p-
   primary-path container.

   Note that asymmetric bandwdith configuration is not supported with
   native bidirectional tunnels.

   Bidirectional (non-courouted) TE Tunnel: the bidirectional flag is
   set to "True" and the p2p-reverse-primary-path container is created.

   The path constraints, applicable to the forward direction, are
   configured in the p2p-primary-path container, while the path
   constraints applicable to the reverse direction are configured in the
   p2p-reverse-primary-path container. It is therefore possible to
   configure different set of path constraints, including different
   bandwdith, in the two directions. If there are no path constraints
   applicable to the backward direction, the p2p-reverse-primary-path
   container can be empty (but it shall be present).

   The server computes two indepedent paths in the forward and reverse
   direction: the computed path in the forward direction and its
   properties are reported within the p2p-primary-path container, while
   the computed path in the reverse direction and its properties
   reported within the p2p-reverse-primary-path container.

   The server setup associated unidirectional LSPs in both directions:
   unidirectional LSPs setup in the forward direction are reported
   within the p2p-primary-path container, while unidirectional LSPs
   setup in the backward direction are reported within the p2p-reverse-
   primary-path container.

   Bidirectional courouted TE Tunnel with asymmetric constraints: the
   bidirectional flag is set to "True" and the p2p-reverse-primary-path
   container is created.

   The path constraints, applicable to the forward direction, are
   configured in the p2p-primary-path container. The p2p-reverse-
   primary-path container is configured with use-path-computation flag
   set to False and an empty route-object-exclude-always container (to
   indicate that the directions should be corouted). It is possible to
   configure different bandwdiths in the two directions but no different
   path constraints.

   Note that in case of a bidirectional (non-courouted) TE Tunnel it is
   also possible to configure the p2p-reverse-primary-path container
   with the use-path-computation flag set to False, when the reverse
   path is configured by the client and not computed by the server: in



Bryskin, et al.        Expires January 12, 2021               [Page 54]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   this case route-object-exclude-always container is not empty but
   specifies the complete explicit-path within the.

   The server computes one bidirectional path and report it and its
   properties within the p2p-primary-path container. No path properties
   are reported within the p2p-reverse-primary-path container.

   The server setup associated unidirectional LSPs in both directions:
   unidirectional LSPs setup in the forward direction are reported
   within the p2p-primary-path container, while unidirectional LSPs
   setup in the backward direction are reported within the p2p-reverse-
   primary-path container.

   The label hops used in bidirectional routers (either for path
   constraints or for path routes or for LSP routes) should report the
   labels used in the two directions (forward and backward):

   o  in case the same label is used in both direction, there will be
      only one label hop with an empty direction leaf;

   o  in case different labels are used in the two directions, there
      will be two label hops, one specifying the label in the forward
      direction and another for the label in the reverse direction.

   Associated unidirectional TE Tunnels: two unidirectional TE Tunnels
   (with the bidirectional flag is set to "False") are configured in the
   forward and reverse direction and associated for bidirectionality
   using the association container.

1.8. Transport Service Mapping











                   Figure 21. Transport Service Mapping


   Let's assume that a provider has exposed to a client its network
   domain in the form of an abstract TE topology, as shown on the left


Bryskin, et al.        Expires January 12, 2021               [Page 55]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   side of Figure 21. From then on, the provider should be prepared to
   receive from the client, a request to set up or manipulate a
   transport service with TE path(s) computed for the service
   connection(s) based on and expressed in terms of the provided
   abstract TE topology (as, for example, displayed in red broken line
   on the right side of Figure 21). When this happens, the provider is
   expected to set up the TE tunnels supporting all yet uncommitted
   abstract TE links (e. g, TE link S3'-S8' in the Figure).

   Furthermore, it is the responsibility of the provider to:

   o  Perform all the necessary abstract-to-native translations for the
      specified TE paths (i.e. the transport service connection
      configured paths);

   o  Provision working and protection connections supporting the
      transport service; as well as replace/modify/delete them in
      accordance with subsequent client's configuration requests;

   o  Perform all the requested recovery operations upon detecting
      network failures affecting the transport service;

   o  Notify the client about all parameter changes, events and other
      telemetry information the client has expressed an interest in,
      with respect to the transport service in question.

1.9. Multi-Domain Transport Service Coordination

   A client of multiple TE network domains may need to
   orchestrate/coordinate its transport service setup/manipulation
   across some or all the domains. One example of such a client is a
   Hierarchical T-SDN Controller, HC, managing a connected multi-domain
   transport network where each of the domains is controlled by a
   separate Domain T-SDN Controller, DC. Said DCs are expected to expose
   TE Topology and TE Tunnel North Bound Interfaces, NBIs,, supported
   respectively by IETF TE Topology and TE Tunnel models (and their
   network layer specific augmentations). HC is assumed to establish
   client-provider relationship with each of the DCs and make use of
   said NBIs to extract from the domains various information (such as TE
   topologies and telemetry), as well as to convey instructions to
   coordinate across multiple domains its transport services set up and
   manipulation.







Bryskin, et al.        Expires January 12, 2021               [Page 56]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020





























                  Figure 22. Two-Domain Transport Network


   Let's consider, for example, a two-domain transport network as
   represented in Figure 22. Suppose that HC is requested to set up an
   unprotected transport service to provide connectivity between
   customer network elements C-R1 and C-R6. It is assumed that by the
   time the request has arrived, the two DCs have already provided
   abstract TE topologies describing their respective domains, and that
   HC has merged the provided TE topologies into one that homogeneously
   describes the entire transport network (as shown in Figure 23).











Bryskin, et al.        Expires January 12, 2021               [Page 57]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020



























         Figure 23. Two-Domain Transport Network (Abstracted View)


   Consider that HC, using the merged TE topology, selected a TE path to
   be taken by the requested transport service connection as shown on
   the upper part of Figure 24.

   The multi-domain transport service set up coordination includes:

   o  Splitting selected for the transport service TE path(s) into
      segments - one set of segments per each domain involved in the
      service setup;

   o  Issuing a configuration request to each of the involved DCs to set
      up the transport service across the respective domain. Note that
      the connection configured paths are required to be expressed in
      terms of respective abstract TE topologies as exposed to HC by DCs
      (see lower part of Figure 24).






Bryskin, et al.        Expires January 12, 2021               [Page 58]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Waiting for the set up complete confirmation from each of the
      involved DCs. In case one of the DCs reports a failure, HC is
      responsible to carry out the cleanup/rollback procedures by
      requesting all involved DCs to tear down the successfully created
      segments


























   Figure 24. Transport Service Placement Based on Abstract TE Topology


   While processing the received from HC configuration request to set up
   the transport service, each DC is expected to carry out the transport
   service mapping procedures (as described in 1.8) resulting in the set
   up of all the necessary underlay TE tunnels, as well as one or more
   connections supporting the transport service. As a result, the
   requested transport service will be provisioned as shown in Figure
   25.







Bryskin, et al.        Expires January 12, 2021               [Page 59]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  In the example above the TE tunnel segments that each DC has to
      set up are the head TE tunnel segment (for domain 1) and the tail
      TE tunnel segment (for domain 2). For head TE tunnel segment HC
      can specify in the configuration request only the source TTP
      (located in node s3 in the example), but not the tunnel's
      destination TTP, because it is outside of the domain controlled by
      the DC.

      Therefore, the outbound hand-off point (in the form of outbound
      inter-domain TE link ID/label pair) of each connection segment
      supporting a TE tunnel non-tail segment (such as head or transit
      tunnel segment) is expected to be found at the end of the route-
      object-include-exclude list of the explicit-route-objects
      configured for that connection segment.

   o  Likewise, the inbound hand-off point (in the form of inbound
      inter-domain TE link ID/label pair) of each connection segment
      supporting a TE tunnel non-head segment (such as tail or transit
      tunnel segment) is expected to be found at the beginning of the
      route-object-include-exclude list of the explicit-route-objects
      configured for that connection segments.

   o  For example, in the figure above the HC can specify the outbound
      hand-off point of the primary path supporting the head TE tunnel
      segment. The configuration is to be the in the form of the pair of
      the TE link ID, identifying the inter domain link terminating on
      node s7, and of the TE label used on that link.

   o  In case (not present in this example) we need to setup a Transit
      Tunnel Segment since the endpoints of the E2E Tunnel are both
      outside the domain controlled by that DC, the HC would not specify
      any source or destination TTP (i.e., it would leave the source,
      destination, src-tp-id and dst-tp-id attributes empty)and it would
      use the the route-object-include-exclude list of the explicit-
      route-objects to specify the inbound and outbound hand-off points
      of each connection segment supporting the Transit Tunnel Segment.

   The multi-domain transport service tear down coordination entails
   issuing to each of the involved DCs a configuration request to delete
   the transport service in the controlled by the DC domain. DCs are
   expected in this case to release all network resources allocated for
   the transport service.







Bryskin, et al.        Expires January 12, 2021               [Page 60]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   The multi-domain transport service modify coordination implies
   issuing to each of the involved DCs a configuration request to
   replace the transport service connections according to the newly
   provided paths and/or modify the connection parameters according to
   the newly provided configuration.




























         Figure 25. Multi-domain transport service is provisioned


2. Use Cases

2.1. Use Case 1. Transport service control on a single layer multi-
   domain transport network

   Configuration (Figure 26):

   o  Three-domain multi-vendor ODUk/Och transport network;

   o  The domains are interconnected via ODUk inter-domain links;



Bryskin, et al.        Expires January 12, 2021               [Page 61]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   o  Each of the domains is comprised of ODUk/Och network elements
      (switches) from a separate vendor and is controlled by a single
      (vendor specific) T-SDN Domain Controller (DC);

   o  All DCs expose IETF TE Topology and TE Tunnel model based NBIs;

   o  The transport network as a whole is controlled by a single
      hierarchical T-SDN controller (HC);

   o  HC  makes use of the NBIs to set up client-provider relationship
      with each of the DCs and controls via the DCs their respective
      network domains;

   o  Three customer IP/MPLS sites are connected to the transport
      network via ODUk access links;

   o  The customer IP/MPLS routers and the router transport ports
      connecting the routers to the transport network are managed
      autonomously and independently from the transport network.






























Bryskin, et al.        Expires January 12, 2021               [Page 62]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020




























    Figure 26 Three-domain ODUk/Och transport network with ODUk access
                          and inter-domain links


   Objective: Set up/manipulate/delete a shortest delay unprotected or
   protected transport service to provide connectivity between customer
   network elements C-R2 and C-R5

  1) TE Topology discovery

   All DCs provide to HC respective domain ODUk layer abstract TE
   topologies. Let's assume that each such topology is a single-node TE
   topology (as described in 1.3.1, abstract TE topology of this type
   represents the entire domain as a single asymmetrical/blocking TE
   node). Let's further assume that the abstract TE nodes representing
   the domains are attributed with detailed connectivity matrices
   optimized according to the shortest delay criterion. [Note: single-
   node abstract TE topologies are assumed for simplicity sake.
   Alternatively, any DC could have provided an abstract TE topology of
   any type described in 1.3].


Bryskin, et al.        Expires January 12, 2021               [Page 63]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   HC merges the provided TE topologies into its own native TE topology
   (the TE topology merging procedures are discussed in 1.4). The merged
   TE topology, as well as the TE topologies provided by DCs, are
   depicted in Figure 27. The merged TE topology homogeneously describes
   the entire transport network and hence is suitable for path
   computations across the network. Note that the dotted lines in the
   Figure connecting the topology access TE links with customer devices
   illustrate that HC in this use case has neither control nor
   information on the customer devices/ports and, therefore, can only
   provide a connectivity between the requested transport service
   ingress and egress access links (on assumption that the customer
   transport ports are provisioned independently)































    Figure 27. Three-domain single layer transport network abstract TE
                                 topology




Bryskin, et al.        Expires January 12, 2021               [Page 64]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


  2) Transport service path computation

   Using the merged TE topology (Figure 27, upper part) HC selects one
   or more optimal and sufficiently disjoint from each other TE path(s)
   for the requested transport service connection(s). Resulting TE paths
   for the requested end-to-end protected transport service, for
   example, could be as marked on the upper part of Figure 28.

   It is important to keep in mind that HC's path computer is capable of
   performing the necessary path selection only as long as the merged TE
   topology provides the necessary TE visibility for the path selection,
   both intra-domain (e.g. by virtue of provided by the abstract TE
   nodes detailed connectivity matrices) and inter-domain (because of
   provided inter-domain TE link attributes). In case one or more DCs
   is/are not capable of or willing to provide the detailed connectivity
   matrices (that is, DCs expose the respective domains as black boxes -
   unconstrained TE nodes terminating the inter-domain TE links), HC
   will not be able to select the end-to-end TE path(s) for the
   requested transport service on its own. In such a case HC may opt for
   making use of the Path Computation NBI, exposed by the DCs to
   explore/evaluate intra-domain TE path availability in real time. IETF
   TE Tunnel model supports the Path Computation NBI by allowing for the
   configuration of transport services in COMPUTE_ONLY mode. In this
   mode the provider is expected to compute TE paths for a requested
   transport service connections and return the paths in the request's
   response without triggering the connection provisioning in the
   network.

   Consider, for example, the case when none of the DCs has provided the
   detailed connectivity matrix attribute for the abstract TE nodes
   representing the respective domain. In such a case HC may:

     1. Request the ingress domain DC (i.e. DC1) to compute intra-domain
        TE paths connecting the ingress access TE link (i.e. the link
        facing C-R2) with each of the inter-domain TE links (i.e. links
        connecting Domain 1 to Domain 2 and Domain 3 respectively);

     2. Grow the TE paths returned by DC1 in (1) over the respective
        outbound inter-domain TE links;

     3. Request the neighboring DC(s) (e.g. DC3) to compute all intra-
        domain TE paths connecting across the domain all inbound into
        the domain inter-domain TE links reached by the path growing
        process in (2) with all other (outbound) domain's inter-domain
        TE links;




Bryskin, et al.        Expires January 12, 2021               [Page 65]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


     4. Augment the TE paths produced in step (2) with the TE paths
        determined in step (3);

     5. Repeat steps (2), (3) and (4) until the resulting TE paths reach
        the egress  domain (i.e. Domain 2);

     6. Request the egress domain DC (i.e. DC2) to grow each of the TE
        paths across the domain to connect them to the egress access TE
        link (i.e. the link facing C-R5);

     7. Select one (or more) most optimal and sufficiently disjoint from
        each other TE path(s) from the list produced in step (6).

   [Note: The transport service path selection method based on Path
   Computation NBIs exposed by DCs does not scale well and the more
   domains comprise the network and the more inter-domain links
   interconnect them, the worse the method works. Realistically, this
   approach will not work sufficiently well for the networks with more
   than 3 domains]






























Bryskin, et al.        Expires January 12, 2021               [Page 66]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020






























     Figure 28. TE paths computed for the protected transport service


  3) Transport service setup coordination

   HC carries out the multi-domain transport service setup coordination
   as described in 1.9. In particular, HC splits the computed TE path(s)
   into 3 sets of TE path segments - one set per domain (as shown on the
   lower part of Figure 28), and issues a TE tunnel configuration
   request to each of the DCs to set up the requested transport service
   across the domain under the DC's control.  The primary (and
   secondary) connection explicit path(s) is/are specified in the
   requests in terms of respective domain abstract TE topologies.

   While processing the configuration request, each DC performs the
   transport service mapping (as described in 1.8). In particular, the
   DC translates the specified explicit path(s) from abstract into
   native TE topology terms, sets up supporting underlay TE tunnels



Bryskin, et al.        Expires January 12, 2021               [Page 67]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   (e.g. Och TE tunnels), and, then, allocates required ODUk containers
   on the selected links and provisions the ODUk cross-connects on the
   switches terminating the links.

   If the setup is successfully completed in all three domains, the
   transport service connection(s) will be provisioned as depicted in
   Figure 29. If one of the DCs fails to set up its part, all
   successfully provisioned segments will be asked by HC to be released.

  4) Transport service teardown coordination

   HC issues to each of DCs a configuration request to release the
   transport service over the controlled domain, as well as the server
   layer TE tunnels supporting dynamically created links.



























                Figure 29. Transport service is provisioned






Bryskin, et al.        Expires January 12, 2021               [Page 68]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


2.2. Use Case 2. End-to-end TE tunnel control on a single layer multi-
   domain transport network

   Configuration (Figure 26): the same as in use case 1, except that HC
   in this use case controls customer devices/ports by extracting
   information from and pushing configuration to the customer site SDN
   controller(s)  managing the customer devices directly.

   Objective: Set up//delete an unprotected shortest delay TE tunnel
   interconnecting end-to-end C-R2 and C-R5

  1) TE Topology discovery

   As in use case 1 all DCs provide to HC domain ODUk layer abstract TE
   topologies. Additionally in this use the three customer site
   controllers expose the TE Topology and Tunnel model based NBIs to HC.
   Using the TE Topology NBI each customer controller provides to HC the
   respective customer site domain abstract TE topology. Customer site
   abstract TE topologies contain abstract TE nodes representing the
   devices which are directly connected to the transport network. Said
   abstract TE nodes host TE tunnel termination points, TTPs,
   representing the ports over which the customer devices are connected
   to the transport network, and terminate access TE links the TTPs are
   accessible from (see Figure 30).

























Bryskin, et al.        Expires January 12, 2021               [Page 69]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020






























   Figure 30. Abstract TE topologies provided by all network domains and
                              customer sites


















Bryskin, et al.        Expires January 12, 2021               [Page 70]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   HC merges the provided topologies into its own native TE Topology
   (the TE topology merging procedures are discussed in 1.4). The merged
   TE topology is depicted in Figure 31. It homogeneously describes end-
   to-end not only the entire transport network, but also the customer
   sites connected to the network and hence is suitable for TE tunnel
   end to end path computations.

























     Figure 31. Abstract TE topology describing transport network and
                      connected to it customer sites


  2) TE tunnel path computation

   Using the merged TE topology (Figure 31) HC selects an optimal TE
   path for the requested TE tunnel connecting end-to-end the specified
   TE tunnel termination points, TTPs. The resulting TE path, for
   example, could be as marked on the upper part of Figure 32.







Bryskin, et al.        Expires January 12, 2021               [Page 71]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


































               Figure 32. TE path computed for the TE tunnel


  3) TE tunnel setup coordination

   HC carries out the multi-domain TE tunnel setup coordination as
   described for use case 1, except that in this use case HC
   additionally initiates and controls the setup of the TE tunnel's head
   and tail segments on the respective customer sites. Note that the
   customer site controllers behave exactly as transport network domain
   DCs. In particular, they receive issued by HC configuration requests
   to set up the TE tunnel's head and tail segments respectively. While
   processing the requests the customer site controllers perform the
   necessary provisioning of the TE tunnel's source and destination
   termination points, as well as of the local sides of the selected


Bryskin, et al.        Expires January 12, 2021               [Page 72]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   access links. If all segments are successfully provisioned on
   customer sites and network domains, the TE tunnel connection will be
   provisioned as marked in Figure 33.

  4) TE tunnel teardown coordination

   HC issues to each of DCs and customer site controllers a
   configuration request to release respective segments of the TE
   tunnel, as well as the server layer TE tunnels supporting dynamically
   created links.



























                    Figure 33. TE tunnel is provisioned


2.3. Use Case 3. Transport service control on a ODUk/Och multi-domain
   transport network with Ethernet access links

   Configuration (Figure 34): the same as in use case 1, except that all
   access links in this use case are Ethernet layer links (depicted as



Bryskin, et al.        Expires January 12, 2021               [Page 73]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   blue lines in the Figure), while all inter-domain links remain to be
   ODUk layer links.



























     Figure 34. Three-domain ODUk/Och transport network with Ethernet
                            layer access links


   Objective: Set up//delete an unprotected shortest delay transport
   service supporting connectivity between C-R2 and C-R5

  1) TE Topology discovery

   In order to make possible for the necessary in this use case multi-
   layer path computation, each DC exposes to HC two (ODUk layer and
   Ethernet layer) abstract TE topologies,  Additionally, the lower
   layer (ODUk) TE nodes announce hosted by them TE tunnel termination
   points, TTPs, capable of adopting the payload carried over the
   Ethernet layer access links, From the TE Topology model point of view
   this means that said TTPs are attributed with TE inter-layer locks



Bryskin, et al.        Expires January 12, 2021               [Page 74]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   matching ones attributed to Ethernet TE links (i.e. TE links provided
   within Ethernet layer abstract TE topologies).

   Ethernet and ODUk layer single node abstract TE topologies catered to
   HC by each of the DCs are presented in Figure 35.

   HC merges the provided TE topologies into its own native TE Topology
   (the merging procedures are described in 1.4). Importantly in this
   case HC locks the provided TE topologies not only horizontally, but
   vertically as well, thus producing a two-layer TE topology
   homogenously describing both layers of the entire transport network,
   as well as the client-server layer adaptation relationships between
   the two layers. This makes the merged TE topology suitable for multi-
   layer/inter-layer multi-domain transport service path computations.
   The merged TE topology is presented in Figure 36.


















   Figure 35. ODUk and Ethernet layer abstract TE topologies exposed by
                                    DCs













Bryskin, et al.        Expires January 12, 2021               [Page 75]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020






























      Figure 36. Two-layer three-domain transport network abstract TE
                                 topology


  2) Transport service path computation

   Using the merged TE topology (Figure 36) HC selects an optimal TE
   path for the requested transport service.

   Note that if HC's path computer considered only Ethernet layer TE
   nodes and links, the path computation would .fail. This is because
   the Ethernet layer TE nodes (i.e. D1-e, D2-e and D3-e in the Figure)
   are disconnected from each other. However, the inter-layer
   associations (in the form of the TE inter-layer locks) make possible
   for the path computer to select TE path(s) in the lower (ODUk) layer
   that can be used to set up hierarchy TE tunnel(s) supporting
   additional dynamic TE link(s) in the upper (Ethernet ) layer in order
   for the requested transport service path computation to succeed.


Bryskin, et al.        Expires January 12, 2021               [Page 76]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   Let's sssume that the resulting TE path is as marked in Figure 37.
   The red line in the Figure marks the TE path selected for the ODUk
   layer hierarchy TE tunnel supporting the required Ethernet layer
   dynamic TE link.






























     Figure 37. Multi-layer TE path computed for the transport service














Bryskin, et al.        Expires January 12, 2021               [Page 77]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


  3) Transport service setup coordination

   HC sets up the requested Ethernet layer transport service in two
   stages. First, it coordinates the end-to-end setup of the ODUk layer
   hierarchy TE tunnel between the selected TTPs. If this operation
   succeeds, a new Ethernet layer dynamic TE link (blue line connecting
   TE nodes D1-e and D2-e in Figure 38) is automatically added to the
   merged abstract TE topology. Importantly, as a part of the hierarchy
   transport service setup both DC1 and DC 2 add a new open-ended
   Ethernet layer inter-domain dynamic TE link to their respective
   abstract TE topologies. Second, HC coordinates the setup of the
   requested (Ethernet layer) transport service. The required TE path
   for the second stage is marked as fat blue line in the Figure. Note
   that DC3 controlling domain 3 is only involved in the first stage,
   but is oblivious to the second stage.





























    Figure 38. A new Ethernet layer TE link supported by ODUk layer TE
     tunnel is added to the provided and merged abstract TE topologies


Bryskin, et al.        Expires January 12, 2021               [Page 78]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   IF all involved DCs confirm successful setup completion, the
   requested transport service, as well as the supporting server layer
   hierarchy TE tunnel, will be provisioned as depicted in Figure 39. If
   one of the DCs fails to set up its segment in either of the layers,
   all successfully provisioned segments will be requested by HC to be
   released.



























    Figure 39. Ethernet transport service and supporting ODUk TE tunnel
                              are provisioned


  4) Transport service teardown coordination

   First, HC issues to DC1 and DC2 a configuration request to release
   the Ethernet layer transport service in the respective domains. After
   that, all three DCs are requested to release the segments of the
   supporting ODUk layer hierarchy TE tunnel. While processing the
   request DC1 and DC2 also remove the dynamic Ethernet layer TE links
   supported by the respective hierarchy TE tunnel's segments, thus the



Bryskin, et al.        Expires January 12, 2021               [Page 79]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   network's abstract TE topologies are reverted back to the state as
   shown in Figures 35 and 36.

2.4. Use Case 4. Transport service control on a ODUk/Och multi-domain
   transport network with multi-function access links

   Configuration (Figure 40): the same as in use case 3, except that all
   access links in this use case are multi-function links (depicted in
   the Figure as blue compound lines). Let's assume that, depending on
   configuration, the multi-function access links in this use case can
   carry either Ethernet or SDH/STM16 layer payload.

   Objective: Set up//delete an unprotected shortest delay SDH/STM16
   layer transport service interconnecting C-R2 and C-R5



























      Figure 40. Three-domain ODUk/Och transport network with multi-
                           function access links





Bryskin, et al.        Expires January 12, 2021               [Page 80]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


  1) TE Topology discovery

   The TE Topology model considers multi-function links as parallel
   mutually exclusive TE links each belonging to a separate layer
   network. For this use case each DC exposes to HC three (ODUk-,
   Ethernet- and SDH/STM16-layer) abstract TE topologies (generally
   speaking, one abstract TE topology per each layer network supported
   by at least one access or inter-domain link).  Like in use case 3,
   the lower layer (ODUk) TE nodes announce hosted by them TE tunnel
   termination points, TTPs, capable in this case of adopting Ethernet,
   SDH/STM16 or both layer payloads, The TTPs are attributed with TE
   inter-layer locks matching ones specified for Ethernet and/or
   SDH/STM16 TE links.

   Ethernet, SDH/STM16 and ODUk layer single-node abstract TE topologies
   catered to HC by each of the DCs are presented in Figure 41.

   HC merges the provided topologies into its own native TE Topology
   (the merging procedures are described in 1.4). As in use case 3 HC
   locks the provided TE topologies not only horizontally (i.e. between
   domains), but vertically (between layers) as well, thus producing a
   three-layer TE topology homogenously describing the three layers of
   the entire transport network, as well as the client-server layer
   adaptation relationships between the layers. This makes the merged TE
   topology suitable for multi-layer/inter-layer multi-domain transport
   service path computations. The merged TE topology is presented in
   Figure 42.

















   Figure 41. ODUk, Ethernet and SDH/STM16 layer abstract TE topologies
                              exposed by DCs


Bryskin, et al.        Expires January 12, 2021               [Page 81]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020



























     Figure 42. Three-layer three-domain transport network abstract TE
                                 topology


  2) Transport service path computation

   Using the merged TE topology (Figure 42) HC's path computer selects a
   TE path for the requested transport service. For example, for the
   SDH/STM16 layer unprotected transport service the resulting TE path
   could be determined as marked in Figure 43.













Bryskin, et al.        Expires January 12, 2021               [Page 82]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020



























   Figure 43. Multi-layer TE path computed for SDH/STM16 layer transport
                                  service


  3) Transport service setup coordination

   Same as in use case 3.

  4) Transport service teardown coordination

   Same as in use case 3.

2.5. Use Case 5. Real time updates of IP/MPLS layer TE link attributes
   that depend on supporting transport connectivity (e.g. transport
   SRLGs, propagation delay, etc.)

   Configuration (Figure 26): the same as in use case 1,

   Objective: A transport service interconnecting transport ports of two
   IP routers across a transport network is likely to serve a link in
   IP/MPLS layer network, which is usually controlled by a client of the


Bryskin, et al.        Expires January 12, 2021               [Page 83]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   transport network, such as IP/MPLS Controller. Performance of TE
   applications (e.g. path computer) running on the IP/MPLS Controller
   depends on the accuracy of IP/MPLS layer TE link attributes. Some of
   these attributes can change over time and are known real-time only to
   a transport network controller, such as HC. Examples of said
   attributes are transport SRLGs, propagation delay metric, protection
   capacities and status, etc. The objective of this use case is to
   ensure up-to-date state of said attributes in the IP/MPLS
   Controller's internal TED via necessary updates provided in a timely
   manner by the controller (e.g. HC) managing transport connectivity
   supporting IP/MPLS layer links.

   Realization:

   o  HC exposes and supports IETF TE Topology and TE Tunnel model based
      NBIs (the same NBIs that are exposed by DCs serving HC);

   o  IP/MPLS Controller makes use of the exposed NBIs to set up the
      respective client-provider relationships with HC;

   o  IP/MPLS Controller uses the TE Tunnel NBI to configure with HC a
      transport service interconnecting transport ports of a pair of IP
      routers desired to be adjacent in the IP/MPLS layer network. The
      TE Tunnel model allows for specifying in the transport service
      configuration request the TE topology and link IDs of the IP/MPLS
      TE link the requested transport service will be serving;

   o  IP/MPLS Controller uses the TE Topology NBI to subscribe with HC
      on the IP/MPLS TE link notifications with respect to changes in
      the TE link's attributes, such as SRLGs, propagation delay,
      protection capabilities/status, etc.;

   o  HC uses the TE Topology NBI to convey the requested notifications
      when HC learns the attributes IP/MPLS has expressed interest in or
      detects any changes since previous notifications (for example, due
      to network failure restoration/reversion procedures happened to
      the transport connectivity that supports the failure affected
      IP/MPLS links)

2.6. Use Case 6. Virtual Network Service

   Configuration (Figure 26): the same as in use case 1,

   Objective: Set up two Virtual Networks for the client, with Virtual
   Network 1 interconnecting customer IP routers C-R1, C-R7 and C-R4
   over a single-node abstract TE topology, and Virtual Network 2



Bryskin, et al.        Expires January 12, 2021               [Page 84]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   interconnecting customer IP routers C-R2, C-R3, C-R8, C-R5 and C-R6
   over a full mesh link abstract TE topology as depicted in Figure 44.

   [Note: A client of a transport network may want to limit the
   transport network connectivity of a particular type and quality
   within distinct subsets of its network elements interconnected across
   the transport network. Furthermore, a given transport network may
   serve more than one client. In this case some or all clients may want
   to ensure the availability of transport network resources in case
   dynamic (re-)connecting of their network elements across the
   transport network is envisioned. In all such cases a client may want
   to set up one or more Virtual Networks over provided transport
   network]

  1) Virtual Network setup

   From the client's point of view a Virtual Network setup includes the
   following procedures:

   o  Identifying the Virtual Network membership - a subset of the
      client's network elements/ports to be interconnected over the
      abstract TE topology configured for the Virtual Network. Note that
      from the transport network provider's point of view this
      effectively determines the list of abstract TE topology's open-
      ended access TE links;

   o  Deciding on the Virtual Network's abstract TE topology type (e.g.
      single-node vs. link mesh), optimization criterion (e.g. shortest
      delay vs. smallest cost), bandwidth, link disjointedness,
      adaptation capabilities and other requirements/constraints, as
      well as, whether the TE tunnels supporting the abstract TE
      topology need to be pre-established or established on demand (i.e.
      when respective abstract TE topology elements are selected for a
      client transport service);

   o  Using the IETF TE Topology model based NBI exposed by the
      transport network controller (i.e. HC), configure the Virtual
      Network's abstract TE topology. Let's assume that in this use case
      the abstract TE topology for Virtual Network 1 is configured as a
      single-node abstract TE topology (see section 1.3.1) with the
      abstract TE node's detailed connectivity matrix optimized
      according to the shortest delay criteria. Likewise, the abstract
      TE topology for Virtual Network 2 is configured as a full-mesh
      link abstract TE topology (see section 1.3.2) optimized according
      to the smallest cost criteria with each of the abstract TE links
      to be supported by pre-established end-to-end protected TE
      tunnels.


Bryskin, et al.        Expires January 12, 2021               [Page 85]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


      [Note: Virtual Network's abstract TE topology (re-
      )configuration/negotiation process is no different from one that
      happens, for example, between HC and its providers, DCs, and is
      described in section 1.5]








































    Figure 44. Virtual Networks provided for a transport network client



Bryskin, et al.        Expires January 12, 2021               [Page 86]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


  2) Using Virtual Network

   Recall that use case 1 was about setting up a transport service
   interconnecting customer network elements C-R2 and C-R5 across the
   transport network. With the Virtual Network 2 in place, the client
   could have used the Virtual Network's TE topology to select a TE path
   for the service. The TE Tunnel model based NBI allows for the client
   to specify the Virtual Network's TE topology ID, as well, as the
   selected TE path (for example, as marked in Figure 45) as a
   configured path attribute in the transport service configuration
   request to ensure that the intended transport network resources are
   used for the service.





















   Figure 45. Transport service TE path is selected on Virtual Network's
                                TE topology


3. Security Considerations

   This document does not define networking protocols and data, hence
   are not directly responsible for security risks.

4. IANA Considerations

   This document has no actions for IANA.



Bryskin, et al.        Expires January 12, 2021               [Page 87]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


5. References

5.1. Normative References

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, March 1997.


   [I-D.ietf-teas-yang-te-topo]
             Liu, X., Bryskin, I., Beeram, V., Saad, T., Shah, H., and
             O. Dios, "YANG Data Model for TE Topologies", draft-ietf-
             teas-yang-te-topo-15 (work in progress), February 2018.

   [I-D.ietf-teas-yang-te]

             Saad, T., Gandhi, R., Liu, X., Beeram, V., Shah, H., and I.
             Bryskin, "A YANG Data Model for Traffic Engineering Tunnels
             and Interfaces", draft-ietf-teas-yang-te-13 (work in
             progress), March 2018.

5.2. Informative References

   [RFC2702] Awduche, D., "Requirements for Traffic Engineering Over
             MPLS", RFC 2702, September 1999.

6. Acknowledgments

   TBD.





















Bryskin, et al.        Expires January 12, 2021               [Page 88]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


Appendix A.                 Data Examples

   This section contains examples of an instance data in the JSON
   encoding [RFC7951].

A.1. Use Case 1

   In the use case described in Section 2.1. , there are three provider
   network domains, each of them is represented as an abstract TE
   topology. The JSON encoded example data configurations for the three
   domains are:

A.1.1. Domain 1

   {
     "networks": {
       "network": [
         {
           "network-types": {
             "te-topology": {}
           },
           "network-id": "otn-domain1-abs",
           "provider-id": 201,
           "client-id": 300,
           "te-topology-id": "te-topology:otn-domain1-abs",
           "node": [
             {
               "node-id": "D1",
               "te-node-id": "2.0.1.1",
               "te": {
                 "te-node-attributes": {
                   "domain-id" : 1,
                   "is-abstract": [null],
                   "underlay-topology": "domain1-och",
                   "connectivity-matrices": {
                     "is-allowed": true,
                     "path-constraints": {
                       "bandwidth-generic": {
                         "te-bandwidth": {
                           "otn": [
                             {
                               "rate-type": "odu1",
                               "counter": 2


Bryskin, et al.        Expires January 12, 2021               [Page 89]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                             }
                           ]
                         }
                       }
                     }
                     "connectivity-matrix": [
                       {
                         "id": 10302,
                         "from": "1-0-3",
                         "to": "1-2-0"
                       },
                       {
                         "id": 10203,
                         "from": "1-0-2",
                         "to": "1-3-0"
                       },
                       {
                         "id": 10311,
                         "from": "1-0-3",
                         "to": "1-11-0"
                       },
                       {
                         "id": 11103,
                         "from": "1-0-11",
                         "to": "1-3-0"
                       },
                       {
                         "id": 10903,
                         "from": "1-0-9",
                         "to": "1-3-0"
                       },
                       {
                         "id": 10309,
                         "from": "1-0-3",
                         "to": "1-9-0"
                       },
                       {
                         "id": 10910,
                         "from": "1-0-9",
                         "to": "1-10-0"
                       },


Bryskin, et al.        Expires January 12, 2021               [Page 90]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                       {
                         "id": 11009,
                         "from": "1-0-10",
                         "to": "1-9-0"
                       },
                       {
                         "id": 20910,
                         "from": "1-1-9",
                         "to": "1-10-0"
                       },
                       {
                         "id": 21009,
                         "from": "1-0-10",
                         "to": "1-9-1"
                       },
                       {
                         "id": 20911,
                         "from": "1-1-9",
                         "to": "1-11-0"
                       },
                       {
                         "id": 21109,
                         "from": "1-0-11",
                         "to": "1-9-1"
                       }
                     ]
                   }
                 }
               },
               "termination-point": [
                 {
                   "tp-id": "1-0-3",
                   "te-tp-id": 10003
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                         }
                     ]
                   }


Bryskin, et al.        Expires January 12, 2021               [Page 91]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                 },
                 {
                   "tp-id": "1-3-0",
                   "te-tp-id": 10300
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                           "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-9",
                   "te-tp-id": 10009
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-9-0",
                   "te-tp-id": 10900
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-1-9",
                   "te-tp-id": 10109
                   "te": {


Bryskin, et al.        Expires January 12, 2021               [Page 92]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-9-1",
                   "te-tp-id": 10901
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-2",
                   "te-tp-id": 10002
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-2-0",
                   "te-tp-id": 10200
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }


Bryskin, et al.        Expires January 12, 2021               [Page 93]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-10",
                   "te-tp-id": 10010
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-10-0",
                   "te-tp-id": 11000
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-11",
                   "te-tp-id": 10011
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-11-0",


Bryskin, et al.        Expires January 12, 2021               [Page 94]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                   "te-tp-id": 11100
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-1-11",
                   "te-tp-id": 10111
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-11-1",
                   "te-tp-id": 11101
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 }
               ]
             }
           ]
         }
       ]
     }
   }


Bryskin, et al.        Expires January 12, 2021               [Page 95]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


A.1.2. Domain 2

   {
     "networks": {
       "network": [
         {
           "network-types": {
             "te-topology": {}
           },
           "network-id": "otn-domain2-abs",
           "provider-id": 202,
           "client-id": 300,
           "te-topology-id": "te-topology:otn-domain2-abs",
           "node": [
             {
               "node-id": "D2",
               "te-node-id": "2.0.2.2",
               "te": {
                 "te-node-attributes": {
                   "is-abstract": [null],
                   "underlay-topology": "domain2-och",
                   "connectivity-matrices": {
                     "is-allowed": true,
                     "path-constraints": {
                       "bandwidth-generic": {
                         "te-bandwidth": {
                           "otn": [
                             {
                               "rate-type": "odu1",
                               "counter": 2
                             }
                           ]
                         }
                       }
                     }
                     "connectivity-matrix": [
                       {
                         "id": 12125,
                         "from": "1-0-21",
                         "to": "1-25-0"
                       },



Bryskin, et al.        Expires January 12, 2021               [Page 96]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                       {
                         "id": 12521,
                         "from": "1-0-25",
                         "to": "1-21-0"
                         },
                       {
                         "id": 12128,
                         "from": "1-0-21",
                         "to": "1-28-0"
                       },
                       {
                         "id": 12821,
                         "from": "1-0-28",
                         "to": "1-21-0"
                       },
                       {
                         "id": 12231,
                         "from": "1-0-22",
                         "to": "1-31-0"
                         },
                       {
                         "id": 13122,
                         "from": "1-0-31",
                         "to": "1-22-0"
                       },
                       {
                         "id": 22228,
                         "from": "1-1-22",
                         "to": "1-28-0"
                       },
                       {
                         "id": 22822,
                         "from": "1-0-28",
                         "to": "1-22-1"
                       },
                       {
                         "id": 12528,
                         "from": "1-0-25",
                         "to": "1-28-0"
                       },
                       {


Bryskin, et al.        Expires January 12, 2021               [Page 97]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                         "id": 12825,
                         "from": "1-0-28",
                         "to": "1-25-0"
                       }
                     ]
                   }
                 }
               },
               "termination-point": [
                 {
                   "tp-id": "1-0-21",
                   "te-tp-id": 10021
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-21-0",
                   "te-tp-id": 12100
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-22",
                   "te-tp-id": 10022
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"


Bryskin, et al.        Expires January 12, 2021               [Page 98]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-22-0",
                   "te-tp-id": 12200
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-1-22",
                   "te-tp-id": 10122
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-22-1",
                   "te-tp-id": 12201
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {


Bryskin, et al.        Expires January 12, 2021               [Page 99]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                   "tp-id": "1-0-25",
                   "te-tp-id": 10025
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-25-0",
                   "te-tp-id": 12500
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-1-25",
                   "te-tp-id": 10125
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-25-1",
                   "te-tp-id": 12501
                   "te": {
                     "interface-switching-capability": [
                       {


Bryskin, et al.        Expires January 12, 2021              [Page 100]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-28",
                   "te-tp-id": 10028
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-28-0",
                   "te-tp-id": 12800
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-31",
                   "te-tp-id": 10031
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }


Bryskin, et al.        Expires January 12, 2021              [Page 101]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                 },
                 {
                   "tp-id": "1-31-0",
                   "te-tp-id": 13100
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 }
               ]
             }
           ]
         }
       ]
     }
   }

A.1.3. Domain 3

   {
     "networks": {
       "network": [
         {
           "network-types": {
             "te-topology": {}
           },
           "network-id": "otn-domain3-abs",
           "provider-id": 203,
           "client-id": 300,
           "te-topology-id": "te-topology:otn-domain3-abs",
           "node": [
             {
               "node-id": "D3",
               "te-node-id": "2.0.3.3",
               "te": {
                 "te-node-attributes": {
                   "is-abstract": [null],



Bryskin, et al.        Expires January 12, 2021              [Page 102]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                   "underlay-topology": "domain3-och",
                   "connectivity-matrices": {
                     "is-allowed": true,
                     "path-constraints": {
                       "bandwidth-generic": {
                         "te-bandwidth": {
                           "otn": [
                             {
                               "rate-type": "odu1",
                               "counter": 2
                             }
                           ]
                         }
                       }
                     }
                     "connectivity-matrix": [
                       {
                         "id": 13638,
                         "from": "1-0-38",
                         "to": "1-38-0"
                       },
                       {
                         "id": 13836,
                         "from": "1-0-38",
                         "to": "1-36-0"
                       },
                       {
                         "id": 13639,
                         "from": "1-0-36",
                         "to": "1-39-0"
                       },
                       {
                         "id": 13936,
                         "from": "1-0-39",
                         "to": "1-36-0"
                       },
                       {
                         "id": 23636,
                         "from": "1-0-36",
                         "to": "1-36-1"
                       },


Bryskin, et al.        Expires January 12, 2021              [Page 103]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                       {
                         "id": 33636,
                         "from": "1-1-36",
                         "to": "1-36-0"
                       },
                       {
                         "id": 13739,
                         "from": "1-0-37",
                         "to": "1-39-0"
                       },
                       {
                         "id": 13937,
                         "from": "1-0-39",
                         "to": "1-37-0"
                       },
                       {
                         "id": 23737,
                         "from": "1-0-37",
                         "to": "1-37-1"
                       },
                       {
                         "id": 33737,
                         "from": "1-1-37",
                         "to": "1-37-0"
                       }
                     ]
                   }
                 }
               },
               "termination-point": [
                 {
                   "tp-id": "1-0-36",
                   "te-tp-id": 10036
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }


Bryskin, et al.        Expires January 12, 2021              [Page 104]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                 },
                 {
                   "tp-id": "1-36-0",
                   "te-tp-id": 13600
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-37",
                   "te-tp-id": 10037
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-37-0",
                   "te-tp-id": 13700
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-1-37",
                   "te-tp-id": 10137
                   "te": {


Bryskin, et al.        Expires January 12, 2021              [Page 105]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-37-1",
                   "te-tp-id": 13701
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-39",
                   "te-tp-id": 10039
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-39-0",
                   "te-tp-id": 13900
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }


Bryskin, et al.        Expires January 12, 2021              [Page 106]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-36",
                   "te-tp-id": 10036
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-36-0",
                   "te-tp-id": 13600
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-0-38",
                   "te-tp-id": 10038
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 },
                 {
                   "tp-id": "1-38-0",


Bryskin, et al.        Expires January 12, 2021              [Page 107]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


                   "te-tp-id": 13800
                   "te": {
                     "interface-switching-capability": [
                       {
                         "switching-capability": "switching-otn",
                         "encoding": "lsp-encoding-oduk"
                       }
                     ]
                   }
                 }
               ]
             }
           ]
         }
       ]
     }
   }

Contributors

   Italo Busi
   Huawei
   Email: italo.busi@huawei.com


   Sergio Belotti
   Nokia
   Email: sergio.belotti@nokia.com


Authors' Addresses

   Igor Bryskin
   Individual
   Email: i_bryskin@yahoo.com

   Vishnu Pavan Beeram
   Juniper Networks
   Email: vbeeram@juniper.net

   Tarek Saad
   Juniper Networks
   Email: tsaad@juniper.net



Bryskin, et al.        Expires January 12, 2021              [Page 108]

Internet-Draft     TE Topology and Tunnel Modeling            July 2020


   Xufeng Liu
   Volta Networks
   Email: xufeng.liu.ietf@gmail.com














































Bryskin, et al.        Expires January 12, 2021              [Page 109]