Internet DRAFT - draft-tnbidt-ccamp-transport-nbi-analysis-uc3
draft-tnbidt-ccamp-transport-nbi-analysis-uc3
CCAMP Working Group Haomian Zheng
Internet Draft Italo Busi
Intended status: Informational Huawei
Yunbin Xu
CAICT
Ricard Vilalta
CTTC
Expires: April 2018 October 30, 2017
Analysis of Transport North Bound Interface Use Case 3
draft-tnbidt-ccamp-transport-nbi-analysis-uc3-00
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 30, 2018.
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Zheng, Busi et al. Expires April 30, 2018 [Page 1]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Abstract
This document analyses how YANG models being defined by IETF (TEAS
and CCAMP WG in particular) can be used to support Use Case 3 (multi-
domain with single-layer) scenarios as referenced later in this
document.
Table of Contents
1. Introduction...................................................3
1.1. Assumptions...............................................3
1.2. Feedbacks provided to the IETF Working Groups.............3
2. Conventions used in this document..............................3
3. Scenario Overview..............................................3
3.1. Topology Abstractions.....................................4
3.1.1. Single Domain Topology...............................5
3.1.2. Multi-domain Topology Stitching......................6
3.2. Multi-domain Service Configuration........................7
3.2.1. Procedure Description................................7
3.2.2. ODU Transit Service..................................9
3.2.3. EPL over ODU Service.................................9
3.2.4. Other OTN Client Services............................9
3.3. Protection Scenarios......................................9
3.3.1. Linear Protection (end-to-end).......................9
3.3.2. Segmented Protection.................................9
4. Topology Abstraction: detailed JSON examples..................10
5. Service Configuration: detailed JSON examples.................10
5.1. ODU Transit Service......................................10
6. Security Considerations.......................................10
7. IANA Considerations...........................................10
8. Conclusions...................................................10
9. References....................................................10
9.1. Normative References.....................................10
9.2. Informative References...................................11
10. Acknowledgments..............................................11
Zheng, Busi et al. Expires April 30, 2018 [Page 2]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
1. Introduction
This document analyses how YANG models developed by IETF (TEAS and
CCAMP WG) can be used to support Use Case 3 (multi-domain with
single-layer) scenarios as described in [TNBI-UseCases].
1.1. Assumptions
This document is using the ACTN [ACTN-Fwk] as an architecture that
deploys the IETF models. The motivation of this draft is to analyze
how existing IETF models can be used on the MPI between the PNC and
the MDSC to support the use case 3 scenarios as defined in section 6
of [TNBI-UseCases].
This document assumes the applicability of the YANG models to the
ACTN interfaces as defined in [ACTN-YANG] and therefore considers the
TE Topology YANG model defined in [TE-TOPO], with the OTN Topology
augmentation defined in [OTN-TOPO] and the TE Tunnel YANG model
defined in [TE-TUNNEL], with the OTN Tunnel augmentation defined in
[OTN-TUNNEL].
In this document, the assumptions made in section 1 of [TNBI-UseCase-
1] still apply. In summary, it is assumed that 1) MDSC uses the
explicit-route-object list on MPI to specify the ingress/egress links
for a tunnel segment request, and 2) label and TS availability
information are reported from PNC to MDSC.
1.2. Feedbacks provided to the IETF Working Groups
The analysis done in this version of this document has triggered the
following feedbacks to TEAS WG:
o Updates to the plug-id definition in [TE-TOPO] to support plug-id
also when auto-discovery (e.g., LMP based) mechanisms are used on
inter-domain links
2. Conventions used in this document
The conventions defined in section 2 of [TNBI-UseCase-1] still apply
in this document.
3. Scenario Overview
Use Case 3 is described in [TNBI-Use Cases] as a multi-domain with
single layer network scenario supporting different types of services.
This section provides a high-level overview of how IETF YANG models
Zheng, Busi et al. Expires April 30, 2018 [Page 3]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
can be used to support these uses cases at the MPI between the
Transport PNC and the MDSC.
Section 3.1 describes the different topology abstractions provided to
the MDSC by each PNC via its own MPI. The reference network and
controlling hierarchy is defined in section 6.1 of [TNBI-Use Cases].
Section 3.2 describes how the difference services, defined in section
6.3 of [TNBI-UseCases], can be setup by the MDSC by coordinating
requests to each PNC via their own MPIs.
Section 3.3 describes how the protection scenarios can be deployed,
including end-to-end protection and segment protection, for both
intra-domain and inter-domain scenario.
3.1. Topology Abstractions
The reference network is shown in Figure 1, which is the same as
Figure 3 of [TNBI-UseCases]:
Zheng, Busi et al. Expires April 30, 2018 [Page 4]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
........................
.......... : :
: : : Network domain 1 : .............
:Customer: : : : :
:domain 1: : S1 -------+ : : Network :
: : : / \ : : domain 3 : ..........
: C-R1 ------- S3 ----- S4 \ : : : : :
: : : \ \ S2 --------+ : :Customer:
: : : \ \ | : : \ : :domain 3:
: : : S5 \ | : : \ : : :
: C-R2 ------+ / \ \ | : : S31 --------- C-R7 :
: : : \ / \ \ | : : / \ : : :
: : : S6 ---- S7 ---- S8 ------ S32 S33 ------ C-R8 :
: : : / | | : : / \ / : :........:
: C-R3 ------+ | | : :/ S34 :
: : :..........|.......|...: / / :
:........: | | /:.../.......:
| | / /
...........|.......|..../..../...
: | | / / : ..........
: Network | | / / : : :
: domain 2 | | / / : :Customer:
: S11 ---- S12 / : :domain 2:
: / | \ / : : :
: S13 S14 | S15 ------------- C-R4 :
: | \ / \ | \ : : :
: | S16 \ | \ : : :
: | / S17 -- S18 --------- C-R5 :
: | / \ / : : :
: S19 ---- S20 ---- S21 ------------ C-R6 :
: : : :
:...............................: :........:
Figure 1 Reference Topology
The network is portioned in three domains with inter-domain links
connecting the domains with each other. The controlling hierarchy is
shown in Figure 3 of [TNBI-UseCases]: the three PNCs are responsible
for the topology abstraction and device configuration for their
respective domains, and the MDSC is used to coordinate the 3 domains.
3.1.1. Single Domain Topology
Each PNC reports its respective topology to the MDSC with different
abstraction method, as described in section 6.2 of [TNBI-UseCases].
Zheng, Busi et al. Expires April 30, 2018 [Page 5]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
The physical topology of domain 1 and the topology abstraction (i.e.,
white topology abstraction) provided by PNC1 are the same as those
described in section 3.1.1 of [TNBI-UseCase-1] for the single domain
topology abstraction use case.
PNC2 provides a "type A grey topology abstraction": only one abstract
node (i.e., AN2), with only inter-domain and access links, is
reported at the MPI2.
PNC3 provides a "type B grey topology abstraction": two abstract
nodes (i.e., AN31 and AN32), with internal links, inter-domain links
and access links, are reported at the MPI3.
3.1.2. Multi-domain Topology Stitching
As assumed in the beginning of this section, MDSC does not have any
knowledge of the topologies of each domain until each PNC reports its
own abstraction topology, so the MDSC needs to merge together the
abstract topologies provided by different PNCs, at the MPIs, to build
its own topology view, as described in section 4.3 of [TE-TOPO].
Given the topologies reported from multiple PNCs, the MDSC need to
stitch the multi-domain topology and obtain the full map of topology.
The topology of each domain main be in an abstracted shape (refer to
section 5.2 of [ACTN-Fwk]for different level of abstraction), while
the inter-domain link information MUST be complete and fully
configured by the MDSC.
The inter-domain link information is reported to the MDSC by the two
PNCs, controlling the two ends of the inter-domain link.
The MDSC needs to understand how to "stitch" together these inter-
domain links.
One possibility is to use the plug-id information, defined in [TE-
TOPO]: two inter-domain links reporting the same plug-id value can be
merged as a single intra-domain link within any MDSC native topology.
The value of the reported plug-id information can be either assigned
by a central network authority, and configured within the two PNC
domains, or it can be discovered using automatic discovery mechanisms
(e.g., LMP-based, as defined in [RFC6898]).
In case the plug-id values are assigned by a central authority, it is
under the central authority responsibility to assign unique values.
In case the plug-id values are automatically discovered, the
information discovered by the automatic discovery mechanisms needs to
Zheng, Busi et al. Expires April 30, 2018 [Page 6]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
be encoded as a bit string within the plug-id value. This encoding is
implementation specific but the encoding rules need to be consistent
across all the PNCs.
In case of co-existence within the same network of multiple sources
for the plug-id (e.g., central authority and automatic discovery or
even different automatic discovery mechanisms), it is RECOMMENDED
that the plug-id namespace is partitioned to avoid that different
sources assign the same plug-id value to different inter-domain link.
The encoding of the plug-id namespace within the plug-id value is
implementation specific but needs to be consistent across all the
PNCs.
Another possibility is to pre-configure, either in the adjacent PNCs
or in the MDSC, the association between the inter-domain link
identifiers (topology-id, node-id and tp-id) assigned by the two
adjacent PNCs to the same inter-domain link.
This option requires further investigation.
3.2. Multi-domain Service Configuration
Multi-domain service configuration can be found in section 6.3 of
[TNBI-Usecases].
As an example, the objective in this section is to configure a
transport service between C-R1 and C-R5. The cross-domain routing is
assumed to be C-R1 <-> S3 <-> S2 <-> S31 <-> S33 <-> S34 <->S15 <->
S18 <-> C-R5.
According to the different client signal type, there is different
adaptation required. In this document, we are trying our best to
reuse what has been defined in [TNBI-UseCase-1], which is the single
domain case.
3.2.1. Procedure Description
The service configuration procedure is assumed to be initiated (step
1 in Figure 2) at the CMI from CNC to MDSC, using XXX(LxSM,
transport-service, VN, TBD) service models. The MDSC will understand
this configure as as a request to setup a service from node A to node
Z. Analysis of the CMI models is for further study.
Zheng, Busi et al. Expires April 30, 2018 [Page 7]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
|
| {1}
V
----------------
| {2} |
| {3} MDSC |
| |
----------------
^ ^ ^
{3.1} | | |
+---------+ |{3.2} |
| | +----------+
| V |
| ---------- |{3.3}
| | PNC2 | |
| ---------- |
| ^ |
V | {4.2} |
---------- V |
| PNC1 | ----- V
---------- (Network) ----------
^ ( Domain 2) | PNC3 |
| {4.1} ( _) ----------
V ( ) ^
----- C==========D | {4.3}
(Network) / ( ) \ V
( Domain 1) / ----- \ -----
( )/ \ (Network)
A===========B \ ( Domain 3)
/ ( ) \( )
AP-1 ( ) X===========Z
----- ( ) \
( ) AP-2
-----
Figure 2 Multi-domain Service Setup
After receiving such request, MDSC determines the domain sequence,
i.e., domain 1 <-> domain 2 <-> domain 3, with corresponding PNCs and
inter-domain links (step 1 in Figure 2).
As described in [PATH-COMPUTE], the domain sequence can be determined
by running the MDSC own path computation on the MDSC internal
topology, defined in section 3.1.2, if and only if the MDSC has
enough topology information. Otherwise the MDSC can send path
computation requests to the different PNCs (steps 2.1, 2.2 and 2.3 in
Zheng, Busi et al. Expires April 30, 2018 [Page 8]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
Figure 2) and use this information to determine the optimal path on
its internal topology and therefore the domain sequence.
The MDSC will then decompose the tunnel request into a few tunnel
segments via tunnel model (including both TE tunnel model and OTN
tunnel model), and request different PNCs to setup each intra-domain
tunnel segment (steps 3, 3.1, 3.2 and 3.3 in Figure 2).
Assume that each intra-domain tunnel segment can be set up
successfully, and each PNC response to the MDSC respectively. Based
on each segment, MDSC will take care of the configuration of both the
intra-domain tunnel segment and inter-domain tunnel via corresponding
MPI (via TE tunnel model and OTN tunnel model). More specifically,
for the inter-domain configuration, the ts bitmap and tpn information
need to be configured via OTN tunnel model. . Then the end-to-end OTN
tunnel will be ready.
In any case, the access link configuration is done only on the PNCs
that control the access links (e.g., PNC-1 and PNC-3 in our example)
and not on the PNCs of transit domain (e.g., PNC-2 in our example).
Access link will be configured by MDSC after the OTN tunnel is set
up. Access configuration is different and dependent on the different
type of service. More details can be found in the following sections.
3.2.2. ODU Transit Service
To be added
3.2.3. EPL over ODU Service
To be added
3.2.4. Other OTN Client Services
To be added
3.3. Protection Scenarios
3.3.1. Linear Protection (end-to-end)
To be added
3.3.2. Segmented Protection
To be added
Zheng, Busi et al. Expires April 30, 2018 [Page 9]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
4. Topology Abstraction: detailed JSON examples
To be added
5. Service Configuration: detailed JSON examples
5.1. ODU Transit Service
To be added
6. Security Considerations
This section is for further study
7. IANA Considerations
This document requires no IANA actions.
8. Conclusions
This section is for further study
9. References
9.1. Normative References
[ACTN-Fwk] Ceccarelli, D., Lee, Y. et al., "Framework for Abstraction
and Control of Transport Networks", draft-ietf-teas-actn-
framework, work in progress.
[TNBI-UseCases] Busi, I., King, D. et al, "Transport Northbound
Interface Use Cases", draft-ietf-ccamp-transport-nbi-use-
cases, work in progress.
[TNBI-UseCase-1] Busi, I., King, D. et al, "Analysis of Transport
North Bound Interface Use Case 1", draft-tnbidt-ccamp-
transport-nbi-analysis-uc1, work in progress.
[TE-TOPO] Liu, X. et al., "YANG Data Model for TE Topologies", draft-
ietf-teas-yang-te-topo, work in progress.
[OTN-TOPO] Zheng, H. et al., "A YANG Data Model for Optical Transport
Network Topology", draft-ietf-ccamp-otn-topo-yang, work in
progress.
Zheng, Busi et al. Expires April 30, 2018 [Page 10]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
[TE-TUNNEL] Saad, T. et al., "A YANG Data Model for Traffic
Engineering Tunnels and Interfaces", draft-ietf-teas-yang-
te, work in progress.
[PATH-COMPUTE] Busi, I., Belotti, S. et al, "Yang model for
requesting Path Computation", draft-busibel-teas-yang-path-
computation, work in progress.
[OTN-TUNNEL] Zheng, H. et al., "OTN Tunnel YANG Model", draft-
sharma-ccamp-otn-tunnel-model, work in progress.
9.2. Informative References
[RFC6898] Li, D. et al., "Link Management Protocol Behavior
Negotiation and Configuration Modifications", RFC 6898,
March 2013.
[ACTN-YANG] Zhang, X. et al., "Applicability of YANG models for
Abstraction and Control of Traffic Engineered Networks",
draft-zhang-teas-actn-yang, work in progress.
[I2RS-TOPO] Clemm, A. et al., "A Data Model for Network Topologies",
draft-ietf-i2rs-yang-network-topo, work in progress.
10. Acknowledgments
The authors would like to thank all members of the Transport NBI
Design Team involved in the definition of use cases, gap analysis and
guidelines for using the IETF YANG models at the Northbound Interface
(NBI) of a Transport SDN Controller.
The authors would like to thank Xian Zhang, Anurag Sharma, Sergio
Belotti, Tara Cummings, Michael Scharf, Karthik Sethuraman, Oscar
Gonzalez de Dios, Hans Bjursrom and Italo Busi for having initiated
the work on gap analysis for transport NBI and having provided
foundations work for the development of this document.
The authors would like to thank the authors of the TE Topology and
Tunnel YANG models [TE-TOPO] and [TE-TUNNEL], in particular Igor
Bryskin, Vishnu Pavan Beeram, Tarek Saad and Xufeng Liu, for their
support in addressing any gap identified during the analysis work.
This document was prepared using 2-Word-v2.0.template.dot.
Authors' Addresses
Zheng, Busi et al. Expires April 30, 2018 [Page 11]
Internet-Draft T-NBI Use Case 3 Analysis October 2017
Haomian Zheng (Editor)
Huawei
Email: zhenghaomian@huawei.com
Italo Busi
Huawei
Email: italo.busi@huawei.com
Yunbin Xu (Editor)
CAICT
Email: xuyunbin@ritt.cn mailto:d.king@lancaster.ac.uk
Ricard Vilalta
CTTC
Email: ricard.vilalta@cttc.es
Carlo Perocchio
Ericsson
Email: carlo.perocchio@ericsson.com
Gianmarco Bruno
Ericsson
Email: gianmarco.bruno@ericsson.com
Zheng, Busi et al. Expires April 30, 2018 [Page 12]