Internet DRAFT - draft-pan-sdn-bod-problem-statement-and-use-case
draft-pan-sdn-bod-problem-statement-and-use-case
IETF Ping Pan
Internet Draft (Infinera)
Lyndon Ong
(Ciena)
Shane Amante
(Level 3)
Expires: April 31, 2012 October 31, 2011
Software-Defined Network (SDN) Use Case for
Bandwidth on Demand Applications
draft-pan-sdn-bod-problem-statement-and-use-case-01.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. This document may not be modified,
and derivative works of it may not be created, and it may not be
published except as an Internet-Draft.
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. This document may not be modified,
and derivative works of it may not be created, except to publish it
as an RFC and to translate it into languages other than English.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Pan et.al Expires April 31, 2012 [Page 1]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on January 31, 2012.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document.
Abstract
Bandwidth on Demand services are offered by network operators in
industry and research sectors to support the needs of selected
customers needing high bandwidth point-to-point connections.
Without a standard interface for controlling the use of network
resources, user applications and services are subject to limits of
layering, security and interoperability across multiple vendors of
network equipment.
In this document, we argue the necessity in providing network
information to the applications, thereby enabling the applications
to directly provision network elements associated with the relevant
applications.
Pan et.al Expires April 31, 2012 [Page 2]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
Table of Contents
1. Introduction...................................................3
2. Related Work...................................................4
3. Problem Definition.............................................4
4. The Role of an SDN Layer.......................................6
5. Use Cases......................................................7
5.1. Scheduled/ Dynamic Bandwidth On-Demand Service............7
5.2. Multi-Layer BoD Support...................................8
5.3. Virtualized Network Service...............................9
5.4. BoD Actions Supported by the SDN Orchestrator.............9
6. Security Consideration........................................10
7. IANA Considerations...........................................10
8. Normative References..........................................10
9. Acknowledgments...............................................11
1. Introduction
Bandwidth on Demand services are offered by network operators in
industry and research sectors to support the needs of selected
customers needing high bandwidth point-to-point connections. Such
services take advantage of dynamic control of the underlying network
to set up forwarding and resource allocation as requested by the
customer. Some control is given directly to the customer via a
portal so that there is no need to go through an intermediate
stage of service order provisioning on the part of the network
operator.
Currently such services are often based on management interfaces to
vendor equipment that are vendor-specific, and as a result the
operator must redesign its supporting control application for each
vendor domain, or limit their offering to a single vendor domain.
In this document, we propose that providing a common interface to
networks of different vendors and technologies would enable the
network provider to offer Bandwidth on Demand and other services
that are faster to deploy across a wide range of network equipment
by using additional network information.
Here are some of the conventions used in this document. The key
words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
Pan et.al Expires April 31, 2012 [Page 3]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
2. Related Work
There has been much work in this area in recent years. OpenFlow has
defined an architecture for offering virtualized network control
through a centralized controller and proxies called FlowVisors.
These allow users to configure forwarding of packets within slices
of the network partitioned off for their use. The controller is
designed to control each network element directly through a
dedicated control interface. It is not designed to work with
existing control plane protocols.
More generally, TMF has developed models and interfaces for
operations and administration of networks through the north-bound
interface provided by the element management system. These
interfaces are not intended for real-time control of the network
element and need to take into account variations in the design and
features of different types of equipment.
PCE is a client-server protocol that operates in MPLS networks that
enables the network operators to compute and potentially provision
optimal point-to-point and point-to-multipoint connections. However,
PCE does not interface with applications to optimize traffic from
user applications.
3. Problem Definition
Figure 1 illustrates the relationship between application and
network today, where customer control of bandwidth on demand is
provided through applications created by the network operator
supporting the user interface, features and backend accounting for
the service. Such applications are used in single domain
deployments and have limited visibility of underlying IP/MPLS and
Transport networks and, most importantly, resource availability on
those networks.
Pan et.al Expires April 31, 2012 [Page 4]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
+-------------+ +-------------+
| Application | | Application |
| #1 | | #2 |
+-------------+ +-------------+
| |
| |
+------------------+ +------------------+
| Network | | Network |
| Domain #1 | | Domain #2 |
+------------------+ +------------------+
Figure 1: Application to network relationship today
This presents a number of challenges and problems. Without a
standard interface to the network elements that comprise one or more
network domains and their associated control software, each
bandwidth on demand supporting application must be built for a
specific set of vendor equipment and is not easily generalizable to
different vendors or even different equipment offered by a single
vendor. While signaling interfaces such as the UNI could offer
standardized access to network control, such interfaces have not
been adopted because they provide minimal security and functionality
and are designed for more of a peer relationship between network
elements, traditionally at only a single (peer) layer of the
network.
Similarly, bandwidth on demand applications must be designed for a
single technology, which restricts the range of use and potential
users. If Domain #1 uses SDH, for example, and Domain #2 uses OTN
it may be necessary to design supporting Application #2 from scratch
even though Application #1 has been successfully offering service.
Ideally the interface should allow some level of technology
independence, as well as potentially integration to permit control
of multiple layers simultaneously (esp. packet and circuit).
Third, the application is generally limited to simple services
connecting a source to destination, because interfaces hide network
topology and do not allow visualization of the topology for
different customer views. For some services users may wish to
exercise control over path routing aspects such as shared risk,
required latency characteristics or inclusion or exclusion of areas
for policy reasons.
Pan et.al Expires April 31, 2012 [Page 5]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
4. The Role of an SDN Layer
To solve the above problem, the proposal is to introduce a software-
driven network (SDN) layer (as shown in Figure 2), that is
responsible for network virtualization, programmability and
monitoring, between supporting applications and the network.
+-------------+ +-------------+ +-------------+
| Application | | Application | | Application |
| #1 | | #2 | | #3 |
+-------------+ +-------------+ +-------------+
| | |
| | |
+---------------------------------------------------+
| SDN Layer |
| (Network virtualization, programmability |
| and Monitoring) |
+---------------------------------------------------+
| |
| |
+------------------+ +------------------+
| Physical Network | | Physical Network |
| Domain #1 | | Domain #2 |
+------------------+ +------------------+
Figure 2: Application to network relationship for SDN
The purpose of the SDN Layer is to enable the applications
supporting bandwidth on demand services to access information about
and control (aggregate) traffic flows at various layers of the
network through a standard, secure and customizable interface.
Applications can visualize the traffic flows at the network layer,
and manage the mapping or binding between its traffic flows from
edge-to-edge through the associated networks.
The implementation of an SDN Layer involves interfacing among
different types of applications and different types of network
domains, based on technology or vendor, administrative or policy
control. Standardized interfaces must be defined to support this.
The architecture should be agnostic as to the type of network
control plan used in a supporting domain. The focus of work should
Pan et.al Expires April 31, 2012 [Page 6]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
be on providing richer access to control of network resources rather
than on the scheme for network control used in the domain.
5. Use Cases
5.1. Scheduled/ Dynamic Bandwidth On-Demand Service
Figure 3 illustrates the flow of a scheduled or dynamic bandwidth
service. In the simplest case, connectivity may already be provided
between user-specified endpoints, however the bandwidth allocated
between endpoints can be varied within some overall limit based on a
predefined schedule or on spontaneous customer request. Note that
allowing bandwidth to be partitioned so that a scheduling
application has control over some pre-allocated set of resources is
necessary to support the scheduled BoD service. Also, the SDN layer
ideally hides the specific technology used to support the
connection, offering control of the service with associated rate,
latency and recovery features.
In more sophisticated services, the customer may be allowed to
create new connections within a specified set of endpoints and
delete such connections when the connectivity is no longer required.
User
Req's +------------+
-------->| Controller |
+------------+
|
| <----- North-bound protocol to adjust connections
|
\|/
+---------+ +--------+
| PE1 | | PE2 |
| |===== Provisioned Connection ===>| |
+---------+ +--------+
Figure 3: Scheduled/Dynamic BoD Service
Pan et.al Expires April 31, 2012 [Page 7]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
5.2. Multi-Layer BoD Support
User
Req's +------------+
-------->| Controller |
+------------+
|
| <----- North-bound protocol to map packets to circuits
|
\|/
+--------------------+ +--------------------+
Pkt | PE1 | Transport | PE2 | Pkt
====>| Classifer<->Tunnel |<=== Circuit ===>| Classifer<->Tunnel |====>
+--------------------+ +--------------------+
Figure 4: Multi-Layer BoD service
Figure 4 illustrates a BoD service that supports multi-layer network
control. This extends allows the network operator's supporting
applications to combine control of packet forwarding through
guaranteed bandwidth tunnels that connect sites in a (virtual)
private network as requested dynamically by the BoD customer.
Different transport network technologies may be used to provide the
server layer transport functions so that the application can evolve
easily with new transport technologies.
Pan et.al Expires April 31, 2012 [Page 8]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
5.3. Virtualized Network Service
User
Req's +------------+
-------->| Controller |
+------------+
/|\ |
Topology --->| |<----- North-bound protocol to adjust connections
Gathering | |
| \|/
+---------+ +--------+
| PE1 | | PE2 |
| |===== Provisioned Connection ===>| |
+---------+ +--------+
Figure 5: Virtualized network service
Figure 5 illustrates the flow of a virtualized network service that
offers some degree of topology visibility and control in addition to
the features of scheduled or dynamic BoD. For some customers it may
be desirable to provide visibility into the topology of the
resources they control, in order for the customer so they may
control the physical and/or virtual topology of the resources used
within their dedicated domain.
If this topology information is provided together with associated
cost, latency, SRLG, etc. for the links and nodes in the topology,
the customer is provided with additional flexibility to manipulate
routing of their data flows so as to balance the cost, latency,
energy efficiency or survivability using knowledge of client
applications and their particular needs and priorities.
At this time such visibility is not possible to provide, as
protocols provide either no visibility into topology or full
visibility into topology. For security reasons it is likely that a
supporting network operator will want to limit visibility and
control to some virtualized topology using functionality provided by
the SDN orchestrator.
5.4. BoD Actions Supported by the SDN Orchestrator
Pan et.al Expires April 31, 2012 [Page 9]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
The following summarizes actions that would be supported by
the SDN orchestrator as part of a BoD service:
- increase or decrease bandwidth on an existing path between
two, or more, network clients;
- dynamically learn if resources are available, (e.g.: bandwidth,
latency, SRLG, etc.) to create a path between two, or more,
network clients;
- create a path and assign associated characteristics, (e.g.:
bandwidth, latency, SRLG, etc.) that connect two, or more, network
clients;
- configure mapping of packets, Ethernet frames, OTN frames, etc.
from a client interface into a specified network path (or paths)
connecting the appropriate ingress and egress client interfaces;
- configure some partition of network resources (e.g., links and
link capacity connecting some set of nodes and client endpoints)
to be controlled by a specific application;
- provide real or virtual topology information (links, nodes and
associated information such as costs, latency, etc.) for this
partition to the associated application.
6. Security Consideration
TBD
7. IANA Considerations
This document has no actions for IANA.
8. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[2] Crocker, D. and Overell, P.(Editors), "Augmented BNF for
Syntax Specifications: ABNF", RFC 2234, Internet Mail
Consortium and Demon Internet Ltd., November 1997.
Pan et.al Expires April 31, 2012 [Page 10]
Internet-Draft Shared Mesh Protection in MPLS-TP October 2011
9. Acknowledgments
This work is based on the conversation with many people, including
Thomas Nadeau and Benson Schliesser.
Authors' Addresses
Ping Pan
Email: ppan@infinera.com
Lyndon Ong
Email: lyong@ciena.com
Shane Amante
Email: shane@level3.net
Pan et.al Expires April 31, 2012 [Page 11]