Internet DRAFT - draft-you-opsawg-capwap-separation-for-mp
draft-you-opsawg-capwap-separation-for-mp
Opsawg Working Group J. You
Internet-Draft H. Song
Intended status: Standards Track Huawei
Expires: November 26, 2015 R. Zhang
China Telecom
May 25, 2015
CAPWAP Control and Data Channel Separation for Multi-provider Scenario
draft-you-opsawg-capwap-separation-for-mp-01
Abstract
The CAPWAP control channel and data channel split architecture has
some benefits, such as relieving the capacity pressure of the AC.
However, the current documents are not specific to the multi-provider
scenario. This document discusses the third-party WLAN service
provider scenario (i.e. Virtual Network Operator, VNO), and proposes
to extend CAPWAP for supporting this use case.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 26, 2015.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
You, et al. Expires November 26, 2015 [Page 1]
Internet-Draft capwap separation for mp May 2015
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Split CAPWAP-CTL and CAPWAP-DATA for Multi-provider . . . . . 4
4. IEEE 802.11 WTP Alternate Tunnel Failure Indication . . . . . 6
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
6. Security considerations . . . . . . . . . . . . . . . . . . . 7
7. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 8
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 8
8.1. Normative References . . . . . . . . . . . . . . . . . . 8
8.2. Informative References . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8
1. Introduction
The CAPWAP control channel and data channel split architecture has
some benefits, such as relieving the capacity pressure of the AC,
which has been discussed in [I-D.ietf-opsawg-capwap-alt-tunnel] etc.
In this document, we introduce a third-party WLAN service provider
scenario (i.e. VNO), as shown in Figure 1, and also verify the
benefits of having this split architecture. In this scenario, the
WLAN provider owns the WTP and AC resources. Other VNOs can rent the
WTP resources from the WLAN provider for network access. The AC
belonging to the WLAN service provider controls the WTP in a
centralized location.
Given that VNOs 1/2 don't have their own network access resources,
they rent the WTP resources from the WLAN provider. VNO 1/2 provide
the services to their customers by renting the network access
resources. The users of VNO 1/2 are authenticated by VNO 1/2
themselves respectively. As the WLAN service provider isn't aware of
the users' data traffic of VNO 1/2, the data traffic from the users
can be directly routed to the corresponding Access Router (AR) of the
provider who owns the users. The data traffic directly to the AR can
significantly avoid overload on the AC.
You, et al. Expires November 26, 2015 [Page 2]
Internet-Draft capwap separation for mp May 2015
+----+
| AC |
+--+-+
CAPWAP-CTL |
+-----------------+
| CAPWAP-DATA: IEEE 802.11 Mgmt traffic
|
WLAN Provider| VNO 1
+-----+ CAPWAP-DATA (SSID1) +---------------+
SSID1 | WTP +--------------------------|Access Router 1|
SSID2 +--+-++ +---------------+
| |
| | VNO 1
| | GRE-IPv4-DATA (SSID1) +---------------+
| +---------------------------|Access Router 2|
| +---------------+
|
| VNO 2
| CAPWAP-DATA (SSID2) +---------------+
+-----------------------------|Access Router 3|
+---------------+
Figure 1: Third-party WLAN Service Provider
This document discusses the third-party WLAN service provider
scenario, and proposes to extend CAPWAP for supporting this use case.
[I-D.ietf-opsawg-capwap-alt-tunnel] describes CAPWAP Control Channel
and CAPWAP Data Channel separation (i.e. CAPWAP Split Mode), but it
is not specific to multi-provider scenario. The following section
will discuss the extension in order to support multi-provider
scenario.
2. Terminology
This section contains definitions for terms used frequently
throughout this document. However, many additional definitions can
be found in [RFC5415] and [RFC5416].
Station (STA): A device that contains an IEEE 802.11 conformant
medium access control (MAC) and physical layer (PHY) interface to
the wireless medium (WM).
Wireless Termination Point (WTP): The physical or network entity
that contains an RF antenna and wireless Physical Layer (PHY) to
transmit and receive station traffic for wireless access networks.
You, et al. Expires November 26, 2015 [Page 3]
Internet-Draft capwap separation for mp May 2015
Access Controller (AC): The network entity that provides WTP
access to the network infrastructure in the data plane, control
plane, management plane, or a combination therein.
Access Router (AR): The access server of the provider.
CAPWAP Control Channel: A bi-directional flow defined by the AC IP
Address, WTP IP Address, AC control port, WTP control port, and
the transport-layer protocol (UDP or UDP-Lite) over which CAPWAP
Control packets are sent and received.
CAPWAP Data Channel: A bi-directional flow defined by the AC IP
Address, WTP IP Address, AC data port, WTP data port, and the
transport-layer protocol (UDP or UDP-Lite) over which CAPWAP Data
packets are sent and received.
3. Split CAPWAP-CTL and CAPWAP-DATA for Multi-provider
A WTP is capable of supporting up to 16 Service Set Identifiers
(SSIDs). The WLAN provider may provide network access service for
different providers with different SSIDs. For example, in Figure 1,
SSID1 is advertised by the WTP for VNO1; and SSID2 is advertised by
the WTP for VNO2. Give that a user attaches to the network by SSID1,
the WTP needs to send the user's data traffic to AR1/AR2 of VNO1 via
CAPWAP/GRE-IPv4 data channel. So WTP needs to obtain the AR
addresses of different providers first. The AC of the WLAN service
provider needs to maintain the association of the AR addresses of the
tenant providers and SSIDs, and provide this information to the WTP.
For the above example (Figure 1), the following steps describe how
the alternate tunnels are established using the alternate tunnel
encapsulation message element [I-D.ietf-opsawg-capwap-alt-tunnel].
1. The AC provides an alternate tunnel encapsulation message
element containing the tunnel type and a tunnel-specific
information element, as shown in Figure 2. Specifically,
IEEE 802.11 WLAN Config. Request [IEEE 802.11 Add WLAN (WLAN ID 1
(mapping to SSID1)), Alternate Tunnel Encapsulation (Tunnel
Type=CAPWAP, Tunnel Info Element (AR1))];
The WTP sets up the alternate tunnel with AR1.
2. The AC provides an alternate tunnel encapsulation message
element containing the tunnel type and a tunnel-specific
information element, as shown in Figure 2. Specifically,
You, et al. Expires November 26, 2015 [Page 4]
Internet-Draft capwap separation for mp May 2015
IEEE 802.11 WLAN Config. Request [IEEE 802.11 Add WLAN (WLAN ID 1
(mapping to SSID1)), Alternate Tunnel Encapsulation (Tunnel Type=
GRE-IPv4, Tunnel Info Element (AR2))];
The WTP sets up the alternate tunnel with AR2. Multiple ARs may
be provided for load balancing for VNO1.
3. The AC provides an alternate tunnel encapsulation message
element containing the tunnel type and a tunnel-specific
information element, as shown in Figure 2. Specifically,
IEEE 802.11 WLAN Config. Request [IEEE 802.11 Add WLAN (WLAN ID 2
(mapping to SSID2)), Alternate Tunnel Encapsulation (Tunnel Type=
CAPWAP, Tunnel Info Element (AR3))];
The WTP sets up the alternate tunnel with AR3.
4. When the WTP detects an alternate tunnel failure, the WTP
informs the AC using a message element, WTP Alternate Tunnel Fail
Indication defined in [I-D.ietf-opsawg-capwap-alt-tunnel]. The
WTP needs to notify the AC of which AR(s) are unavailable.
You, et al. Expires November 26, 2015 [Page 5]
Internet-Draft capwap separation for mp May 2015
+-----------+ +-----------+
| WTP | | AC |
+-----+-----+ +-----+-----+
+---------------------------------------------------------+
|Alternative | | |
Step 1, |Tunnel |IEEE 802.11 WLAN Config. Request [ | |
Step 2, |Establishment| IEEE 802.11 Add WLAN, | |
Step 3 | | Alternate Tunnel Encapsulation ( | |
| | Tunnel Type, Tunnel Info Element) | |
| | ] | |
| |<----------------------------------------| |
| | | |
| | | |
| +-----+-----+ | |
| | Setup | | |
| | Alternate | | |
| | Tunnel | | |
| +-----+-----+ | |
| | | |
| |IEEE 802.11 WLAN Config. Response | |
| |---------------------------------------->| |
+---------------------------------------------------------+
| |
+-----+-----+ |
| Tunnel | |
| Failure | |
+-----+-----+ |
|WTP Alternate Tunnel Failure Indication |
Step 4 |[(report failure (AR Address(es)))] |
|---------------------------------------->|
| |
+------+------+ |
| Tunnel | |
| Established | |
+------+------+ |
|WTP Alternate Tunnel Failure Indication |
|(report clearing failure) |
|---------------------------------------->|
| |
Figure 2: Setup of Alternate Tunnels
4. IEEE 802.11 WTP Alternate Tunnel Failure Indication
When the WTP detects an alternate tunnel failure, the WTP informs the
AC using a message element, WTP Alternate Tunnel Fail Indication
defined in [I-D.ietf-opsawg-capwap-alt-tunnel]. For the case where
WTP establishes data tunnels with multiple ARs under VNO scenarios,
You, et al. Expires November 26, 2015 [Page 6]
Internet-Draft capwap separation for mp May 2015
the WTP needs to notify the AC of which AR(s) are unavailable, as
shown in Figure 2.
The Alternate Tunnel Failure Indication message element is extended
to contain the AR information, as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | Status | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Access Router Information Sub-Element .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: IEEE 802.11 WTP Alternate Tunnel Failure Indication
Type: IEEE 802.11 WTP Alternate Tunnel Failure Indication defined
in [I-D.ietf-opsawg-capwap-alt-tunnel].
Length: > 4
Radio ID: The Radio Identifier, whose value is between one (1) and
31, typically refers to some interface index on the WTP.
WLAN ID: An 8-bit value specifying the WLAN Identifier. The value
MUST be between one (1) and 16.
Status: An 8-bit boolean indicating whether the radio failure is
being reported or cleared. A value of zero is used to clear the
event, while a value of one is used to report the event.
Access Router Information Sub-Element
[I-D.ietf-opsawg-capwap-alt-tunnel]: IPv4 address or IPv6 address
or Fully Qualified Domain Name (FQDN), of the Access Router for
the alternate tunnel. The Access Router Information Sub-Elements
allow the WTP to notify the AC of which AR(s) are unavailable.
5. IANA Considerations
This document has no IANA actions.
6. Security considerations
This document does not constrain the use of encryption mechanisms to
protect the data channel. If there is security requirement for
CAPWAP Data Channel, Datagram Transport Layer Security (DTLS)
[RFC4347] and the IPSec mechanism [RFC2401] can be used to guarantee
the security of the CAPWAP Data Channel.
You, et al. Expires November 26, 2015 [Page 7]
Internet-Draft capwap separation for mp May 2015
7. Acknowledgement
The authors would like to thank Zongpeng Du and Jin Li for their
valuable comments.
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", RFC 2401, November 1998.
[RFC4347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security", RFC 4347, April 2006.
[RFC5415] Calhoun, P., Montemurro, M., and D. Stanley, "Control And
Provisioning of Wireless Access Points (CAPWAP) Protocol
Specification", RFC 5415, March 2009.
[RFC5416] Calhoun, P., Montemurro, M., and D. Stanley, "Control and
Provisioning of Wireless Access Points (CAPWAP) Protocol
Binding for IEEE 802.11", RFC 5416, March 2009.
8.2. Informative References
[I-D.ietf-opsawg-capwap-alt-tunnel]
Zhang, R., Cao, Z., Deng, H., Pazhyannur, R., Gundavelli,
S., and L. Xue, "Alternate Tunnel Encapsulation for Data
Frames in CAPWAP", draft-ietf-opsawg-capwap-alt-tunnel-05
(work in progress), April 2015.
Authors' Addresses
Jianjie You
Huawei
101 Software Avenue, Yuhuatai District
Nanjing 210012
China
Email: youjianjie@huawei.com
You, et al. Expires November 26, 2015 [Page 8]
Internet-Draft capwap separation for mp May 2015
Haibin Song
Huawei
101 Software Avenue, Yuhua District
Nanjing, Jiangsu 210012
China
Email: haibin.song@huawei.com
Rong Zhang
China Telecom
No.109 Zhongshandadao Avenue
Guangzhou 510630
China
Email: zhangr@gsta.com
You, et al. Expires November 26, 2015 [Page 9]