Internet DRAFT - draft-li-i2rs-mpls-lsps-use-case
draft-li-i2rs-mpls-lsps-use-case
Network Working Group X. Li
Internet-Draft R. Zhang
Intended status: Informational K. Li
Expires: May 18, 2015 S. Chen
Beijing University of Posts and Telecommunications
November 14, 2014
I2RS MPLS LSPs Use Case
draft-li-i2rs-mpls-lsps-use-case-00
Abstract
The Label-switched paths (LSPs) play fundument role in MPLS domain.
Traditionally Label-switched paths (LSPs) are established by the
network operator via CLI, SNMP or NETCONF for a variety of purposes,
such as to create network-based IP virtual private networks or to
route traffic along specified paths through the network. Interface
to the Routing System's (I2RS) Programmatic interfaces provides an
alternate way to create and maintain the LSPs.This document describes
requirement and use case for which I2RS can be used for LSPs
management.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC 2119
[RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 18, 2015.
Li, et al. Expires May 18, 2015 [Page 1]
Internet-Draft I2RS MPLS LSPs Use Case November 2014
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. LSPs Configure . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. LSPs Connection . . . . . . . . . . . . . . . . . . . . 3
2.2. Capability negotiation . . . . . . . . . . . . . . . . . 5
3. LSPs Events . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1. Notification of LSP Events . . . . . . . . . . . . . . . 5
3.2. LSPs Statistics . . . . . . . . . . . . . . . . . . . . . 5
4. Security Considerations . . . . . . . . . . . . . . . . . . . 6
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
6.1. Normative References . . . . . . . . . . . . . . . . . . 6
6.2. Informative References . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
The Label Swicth Paths (LSPs) is a fundement element that play key
role for package trsanport in MPLS domain. Traditionally LSP may be
managed via CLI, SNMP or NETCONF.
Interface to Routing System (I2RS) architecture
[I-D.ietf-i2rs-architecture] defines a standard, programmatic
interface to routing system. The I2RS is not intended to replace any
existing configuration mechanisms. Instead, I2RS is intended to
augment those existing mechanisms by defining a standardized set of
programmatic interfaces to enable easier configuration, management
and analysis of the networks source
This document describes requirement and use case for which I2RS can
be used for establishing LSPs connection. The use case described in
this document encompass: LSPs configure, LSPs events.
Li, et al. Expires May 18, 2015 [Page 2]
Internet-Draft I2RS MPLS LSPs Use Case November 2014
2. LSPs Configure
LSPs is fundment element in the MPLS domain's network.By I2RS
interface the network application can setup LSPs through policy
configure.The application can select proper programmatic interface.
2.1. LSPs Connection
The basic stage of LSPs includes establishing, maintaining and
revocation. Paths computation in large MPLS-domain networks is
complex and may require special computational components and
cooperation between the different elements.
Traditionally in order to configure a static LSP that need
configuring the ingress router and each router along the path and
including the egress router.The tasks encompass:Configuring the
Ingress Router,Configuring the Intermediate (Transit) and Egress
Routers and etc. The ingress router computes path according to the
network topology and the request of user , and hop-by- hop down the
request to establish the path.The ingress edge router knows the
current topology of the network,But it does not know the available
resource information of router along the path. so it needs to
establish sessions-by-hop to issue a label request until it reaches
the egress router, and then again along the reverse path established
LSP.In this case, if a router on the path does not meet the
demand,the ingress router accepts the request must recalculate path
or other paths in low service level which have the required router
may be sacrificed in order to meet LSP.
******************** ***************** *****************
* Application LSP * * Application B * * Application C *
******************** ***************** *****************
^ ^ ^
| | |
|--------------| | |--------------|
| | |
v v v
***************
* Client A *
***************
^ ^ ^ ^
| | | |
|-------------| | | |-----------------|
| | | |
| | | |
**************** v ************* | | ***************** v ************
* +---------------------+ * | | * +---------------------+ *
Li, et al. Expires May 18, 2015 [Page 3]
Internet-Draft I2RS MPLS LSPs Use Case November 2014
* | Edge Agent | * | | * | Edge Agent | *
* +---------------------+ * | | * +---------------------+ *
* ^ ^ ^ ^ * | | * ^ ^ ^ ^ *
* | | | | * | | * | | | | *
* v | | v * | | * v | | v *
* +---------+ | | +--------+ * | | * +---------+ | | +--------+ *
* | Routing | | | | Local | * | | * | Routing | | | | Local | *
* | and | | | | Config | * | | * | and | | | | Config | *
* |Signaling| | | +--------+ * | | * |Signaling| | | +--------+ *
* +---------+ | | ^ * | | * +---------+ | | ^ *
* ^ | | | * | | * ^ | | | *
* | |----| | | * | | * | |----| | | *
* v | v v * | | * v | v v *
* +----------+ +------------+ * | | * +----------+ +------------+ *
* | Dynamic | | Static | * | | * | Dynamic | | Static | *
* | System | | System | * | | * | System | | System | *
* | State | | State | * | | * | State | | State | *
* +----------+ +------------+ * | | * +----------+ +------------+ *
* * | | * *
* Routing Element 1 * | | * Routing Element 4 *
******************************** | | ********************************
| |
|---------------| |-----------------|
| |
**************** v ************* ***************** v ************
* +---------------------+ * * +---------------------+ *
* | Agent LSR1 | * * | Agent LSR2 | *
* +---------------------+ * * +---------------------+ *
* ^ ^ ^ ^ * * ^ ^ ^ ^ *
* | | | | * * | | | | *
* v | | v * * v | | v *
* +---------+ | | +--------+ * * +---------+ | | +--------+ *
* | Routing | | | | Local | * * | Routing | | | | Local | *
* | and | | | | Config | * * | and | | | | Config | *
* |Signaling| | | +--------+ * * |Signaling| | | +--------+ *
* +---------+ | | ^ * * +---------+ | | ^ *
* ^ | | | * * ^ | | | *
* | |----| | | * * | |----| | | *
* v | v v * * v | v v *
* +----------+ +------------+ * * +----------+ +------------+ *
* | Dynamic | | Static | * * | Dynamic | | Static | *
* | System | | System | * * | System | | System | *
* | State | | State | * * | State | | State | *
* +----------+ +------------+ * * +----------+ +------------+ *
* * * *
* Routing Element 2 * * Routing Element 3 *
******************************** ********************************
Li, et al. Expires May 18, 2015 [Page 4]
Internet-Draft I2RS MPLS LSPs Use Case November 2014
Figure 1: Use case for MPLS establishing LSPs of I2RS
In the I2RS architecture , edge router agent connected with client in
MPLS domain.To establish an LSP, operator may make a request to edge
router agent, then edge router transmit to client, operator can also
make a request to client. By I2rs architecture , client can get
real-time topology of the entire network and local router resource
view , so client can be computed LSPs according to the demand of
user, and issuing LSR FIB under the corresponding resource
requirements on the path. if there is a resource conflict,client can
coordinate and adjust the paths associated with the LSPs according to
application service level.
2.2. Capability negotiation
LSPs Connection supports some policy configuration which are used to
control the allocation of network source,to avoide the specify
router/switch and acceptance of optimal recommend path and so on.
With I2RS a network operator can push LSPs demand request policy
configuration using a programmatic API from an I2RS client to
specific agent according to the service requirement.
3. LSPs Events
I2RS could provide a publish-subscribe capability to applications to
subscribe state and number of LSPs and related events according to
demand.
3.1. Notification of LSP Events
Some applications adopt LSPs established to carry service and the
end-user would care about the state of such LSPs and hope to know and
the changes of their state immediately .There are many technologies
to detect LSPs failures, such as OAM/RSVP hello,When a LSP failure is
detected, the end-user hope receive the immediately notification.
3.2. LSPs Statistics
There are several statistics related to LSPs like the count of
LSPs.These statistics can help network operators know about the
status of the resources network makes use of.
Some access device has limited capacity resource and need restricting
the maximum capacity of LSP. The network administrator wants to know
whether the current capacity of LSP is close to the maximum capacity.
Li, et al. Expires May 18, 2015 [Page 5]
Internet-Draft I2RS MPLS LSPs Use Case November 2014
The application can set the maximum number of LSPs by I2RS
programmatic API. The application can set the warning threshold too.
When LSPs reaches the threshold the warning message will be triggered
and notify the application in the I2RS client. The operator can take
some action according to the warning message.
4. Security Considerations
The LSPs use cases described in this document assumes use of I2RS's
programmatic interfaces described in the I2RS archtechture mentioned
in [I-D.ietf-i2rs-architecture]. This document does not change the
underlying security issues inherent in the existing.
5. IANA Considerations
This document makes no request of IANA.
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP
Specification", RFC 5036, October 2007.
6.2. Informative References
[I-D.chen-i2rs-mpls-ldp-usecases]
Chen, X. and Z. Li, "Use Cases for an Interface to LDP
Protocol", draft-chen-i2rs-mpls-ldp-usecases-00 (work in
progress), October 2013.
[I-D.ietf-i2rs-architecture]
Atlas, A., Halpern, J., Hares, S., Ward, D., and T.
Nadeau, "An Architecture for the Interface to the Routing
System", draft-ietf-i2rs-architecture-05 (work in
progress), July 2014.
[I-D.ietf-pce-stateful-pce]
Crabbe, E., Minei, I., Medved, J., and R. Varga, "PCEP
Extensions for Stateful PCE", draft-ietf-pce-stateful-
pce-10 (work in progress), October 2014.
Li, et al. Expires May 18, 2015 [Page 6]
Internet-Draft I2RS MPLS LSPs Use Case November 2014
[I-D.keyupate-i2rs-bgp-usecases]
Patel, K., Fernando, R., Gredler, H., Amante, S., White,
R., and S. Hares, "Use Cases for an Interface to BGP
Protocol", draft-keyupate-i2rs-bgp-usecases-04 (work in
progress), July 2014.
Authors' Addresses
Xin Li
Beijing University of Posts and Telecommunications
No 10, Xitucheng Road, Haidian District
Beijing 100876
China
Email: cplalx@163.com
Rongbo Zhang
Beijing University of Posts and Telecommunications
No 10, Xitucheng Road, Haidian District
Beijing 100876
China
Email: duba213@163.com
Ke Li
Beijing University of Posts and Telecommunications
No 10, Xitucheng Road, Haidian District
Beijing 100876
China
Email: lico200912@163.com
Shanzhi Chen
Beijing University of Posts and Telecommunications
No 10, Xitucheng Road, Haidian District
Beijing 100876
China
Email: chensz@datanggroup.cn
Li, et al. Expires May 18, 2015 [Page 7]