Internet DRAFT - draft-zhang-ccamp-transport-ctrlnorth-yang
draft-zhang-ccamp-transport-ctrlnorth-yang
CCAMP Working Group Xian Zhang
Internet-Draft Huawei
Intended status: Standards Track R. Jing
China Telecom
W. Jian
China Unicom
Jeong-dong Ryoo
ETRI
Y. Xu
CAICT
Daniel King
Lancaster University
Expires: September 05, 2016 March 07, 2016
YANG Models for the Northbound Interface of a Transport Network
Controller: Requirements, Functions, and a List of YANG Models
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt
Abstract
A transport network is a server-layer network designed to provide
connectivity services for a client-layer network to carry the client
traffic opaquely across the server-layer network resources. A
transport network may be constructed from equipment utilizing any of
a number of different transport technologies such as the evolving
optical transport infrastructure (Synchronous Optical Networking
(SONET) / Synchronous Digital Hierarchy (SDH) and Optical Transport
Network (OTN)) or packet transport as epitomized by the MPLS
Transport Profile (MPLS-TP).
All transport networks have high benchmarks for reliability and
operational simplicity. This suggests a common, technology-
independent management/control paradigm that can be extended to
represent and configure specific technology attributes.
This document describes the requirements facing transport networks
in order to provide open interfaces for resource programmability and
control/management automation. A list of existing and additional
YANG models is provided to fulfill the functional requirements.
Zhang et al Expires September 2016 [Page 1]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 05, 2016.
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction ................................................ 3
2. Conventions used in this document............................ 4
3. Terminology and Notations.................................... 4
4. Functional Requirements...................................... 5
4.1. Scenarios ............................................. 5
4.2. Function Requirement Summary ........................... 8
5. Function Analysis ........................................... 9
Zhang et al Expires September 2016 [Page 2]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
5.1. Toplogy Related Functions .............................. 9
5.1.1 Obtaining Access Point Info ...................... 9
5.1.2 Obtaining Topology ............................... 9
5.1.3 Virtual Network Operations ...................... 10
5.2. Tunnel Operations ..................................... 10
5.3. Service Requests ...................................... 10
6. Security Considerations..................................... 17
7. Manageability Considerations................................ 17
8. IANA Considerations ........................................ 18
9. Acknowledgements ........................................... 18
10. References ................................................ 18
10.1. Normative References............................... 18
10.2. Informative References............................. 18
11. Contributors' Address...................................... 19
Authors' Addresses ............................................. 19
1. Introduction
A transport network is a server-layer network designed to provide
connectivity services, or more advanced services like Virtual
Private Networks (VPN) for a client-layer network to carry the
client traffic opaquely across the server-layer network resources.
It acts as a pipe provider for upper-layer networks, such as IP
network and mobile networks.
Transport networks, such as Synchronous Optical Networking (SONET) /
Synchronous Digital Hierarchy (SDH), Optical Transport Network (OTN),
Wavelength Division Multiplexing (WDM), and flexi-grid networks, are
often built using equipment from a single vendor and are managed
using private interfaces to dedicated Element Management Systems
(EMS) / Network Management Systems (NMS). All transport networks
have high benchmarks for reliability and operational simplicity.
This suggests a common, technology-independent management/control
paradigm that is extended to represent and configure specific
technology attributes.
The need of network providers to manage multi-vendor and multi-
domain transport networks (where each domain is an island of
equipment from a single supplier) has been further stressed by the
expansion in network size. At the same time, applications such as
data center interconnection require larger and more dynamic
connectivity matrices. Therefore, transport networks face new
challenges going beyond automatic provisioning of tunnel setup
enabled by GMPLS (Generalized Multi-Protocol Label Switching)
protocols to achieve automatic service provisioning, as well as
Zhang et al Expires September 2016 [Page 3]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
address opportunities enabled by partitioning the network through
the process of resource slicing. With lower operational expenditure
(OPEX) and capital expenditure (CAPEX) as the usual objectives, open
interfaces to transport networks are considered by network providers
as a way to meet these requirements. The concept of Software
Defined Networking (SDN) leverages these ideas.
The YANG language [RFC6020] is currently the data modeling language
of choice within the IETF and has been adopted by a number of
industry-wide open management and control initiatives. YANG may be
used to model both configuration and operational states; it is
vendor-neutral and supports extensible APIs for control and
management of elements.
This document analyzes typical scenarios that need transport network
control/management openness, and lists functions desired to enable
deployment. Moreover, a list of YANG models and their relationships
have been identified that can help facilitate the deployment and
operation of transport network open interfaces. Note that some of
the models discussed meet the requirements described, and are
already being developed in the IETF. Thus, this document provides a
reference of existing models, and provides information of the
missing ones which need further work.
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
3. Terminology and Notations
A simplified graphical representation of the data model is used in
this document. The meaning of the symbols in the YANG data tree
presented later in this draft is defined in [ietf-netmod-rfc6087bis].
They are provided below for reference.
o Brackets "[" and "]" enclose list keys.
o Abbreviations before data node names: "rw" means configuration
(read-write) and "ro" state data (read-only).
o Symbols after data node names: "?" means an optional node, "!"
means a presence container, and "*" denotes a list and leaf-list.
o Parentheses enclose choice and case nodes, and case nodes are
also marked with a colon (":").
Zhang et al Expires September 2016 [Page 4]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
o Ellipsis ("...") stands for contents of subtrees that are not
shown.
4. Functional Requirements
4.1. Scenarios
There are several scenarios where an open interface to access
server-layer (transport) network resources would be useful. Here two
typical scenarios are provided.
The first one is depicted as below (Figure 1):
/--\ +------+ +------+ /--\
| 1 ~~~| A +------------------| B |~~~~~ 3 |
\--/ +-----++ +--+---+ \--/
| |
| |
| |
++-----+ +---+--+
| F +------------+ C |
++-----+ +--+---+
| |
| |
| |
| |
| |
+---+-+ +---+-+ /---\
| E +---------------+ D |~~~~ 4 |
/--\~~~~~+-----+ +-----+ \---/
| 2 |
\--/
+----+ /--\
| | Transport NE | | DC
+----+ \--/
----- Transport Link ~~~ Transport-DC link
(a) Data Centers interconnected via a transport network
+---------------------+
| Data Center Network |
| Controller |
+---------+-----------+
Zhang et al Expires September 2016 [Page 5]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
|
|
|
| Open Interface
|
|
+---------+-----------+
| Transport Network |
| Controller |
+---------------------+
(b) The controller architecture for data center interconnection
Figure 1: Scenario 1: Data centers interconnected via a transport
network and the controller architecture
For the data center operator, assuming the objective is to trigger
the transport network to provide connectivity on demand, the
following capabilities, at a minimum, would be required on the open
itnerface between the two contollers illustrated in Figure 1:
A: The ability to obtain information about a set of access points of
the transport network facing the client side, including information
such as access point identifiers, capabilities, etc.; for instance,
transport-network-side end point identifiers related to the access
link between DC1 and Transport NE A.
B: The capability to send a request for a service using the
aforementioned access point information, as well as the ability to
retrieve a list of service requests and their statuses. In this
request, it should at least be possible to include source node,
destination node, and requested bandwidth to request the transport
network to set up tunnels/paths so as to provide the requested
connectivitiy for the service request.
C: Note that in this case acquistion of the topology, be it physical
or logical, of the transport network is not a compulsory requirement,
but it may indeed be able to give data center providers more control
over the transport resource usage. Furtheremore, the client
controller can impose a virtual network of its own choice by
requesting a slice of network resource with its choice of network
parameters (such as network topology type, bandwidth etc.).
The second scenario, more complicated than the first, is depicted as
below (Figure 2). In this example, we focus on the management and
control via open interfaces for multi-domain networks with
homogeneous technologies (such as OTN), but it can be extended
Zhang et al Expires September 2016 [Page 6]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
further to multi-domain networks with heterogeneous technologies
with higher complexity.
+-------------------------------------------------+
| Orchestrator/Coordinator |
+---------+--------------+-------------------+----+
| | |
| | |
+------------+--+ | +----------+----------+
| Controller 1 | | | Controller 2 |
+---------+-----+ | +-------+-------------+
# +----------------+ #
#Qx | Controller 3 | #
# +----------------+ #TL1
# # #
----+----- # ----+-----
____/ \____ # ____/ \____
| | # | |
| | # | |
| Network Domain +***********+ Network Domain |
| 1 | # | 2 |
|____ ___| # |____ ___|
\ / #PCEP \ /
----------- # *----------
* * # * *
* * # * *
* * # * *
* * # * *
* * # * *
* * # * *
* *----+-----* *
* ____/ \____ *
*| |*
| |
| Network Domain |
| 3 |
|____ ___|
\ /
----------
***** inter-domain links
----- Open Interfaces
##### Controller-device interfaces
Figure 2: Scenario 2: Multi-domain network control and management
Zhang et al Expires September 2016 [Page 7]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
For the second scenario, the orchestrator/coordinator controls and
manages three distinct network domains, each controlled/managed by
their domain controller. In order to orchestrate across
domains/layers, the orchestrator needs its interface between domain
controllers to be equipped with the following functions:
A: Access to the topologies reported by each domain controller,
including cross-domain links for the purpose of planning and
requesting the paths of end-to-end tunnels. Multiple technologies
within a domain (i.e., a multi-layer network), this might be
reflected in the reported topology. Depending on the abstraction
level of the reported topology, the orchestrator has different
control granularities.
B: The ability to set up, delete and modify tunnels, be it within
one domain or across multiple domains. Furthermore, it should have
the abilty to view the tunnels created within each domain as well as
thouse that cross domains as reported by each domain controller.
4.2. Function Requirement Summary
For the open interface of a transport controller towards a
northbound client, five functions are derived from the scenarios
explained in the last section. They are summarized in the table
below and we also match these functions with YANG models that are
being developed in existing drafts.
Analysis and descriptions of whether and how these functions are
supported by the YANG models are provided in more detail in Section
5.
+-------------+-----------------------+-----------------------+
| Functions | Description | Related Existing |
| | | YANG Models |
|-------------+-----------------------+-----------------------+
| Obtaining |Getting the necessary | |
| Access |access points info | [TE-Topo] |
| Point Info | | |
+-------------+-----------------------+-----------------------+
| Obtaining |Getting the topology |[TE-Topo], [WDM-Topo] |
| Topology |info |[ODU-Topo] |
+-------------+-----------------------+-----------------------+
| Tunnel |Tunnel Setup, Deletion | |
| Operations |Modification and Info | [TE-Tunnel] |
| |Retrieval | |
+-------------+-----------------------+-----------------------+
Zhang et al Expires September 2016 [Page 8]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
| Service |Requesting connectivity| |
| Request |service and retrieval | [this I.D.] |
| |the list of service | |
| |request | |
+-------------+-----------------------+-----------------------+
| Virtual |Requesting a virtual | |
| Network |network and related |[TE-Topo], [WDM topo] |
| Operations |control operations, |[ODU-Topo] |
| |(e.g.,update, deletion)| |
+-------------+-----------------------+-----------------------+
5. Function Analysis
5.1. Toplogy Related Functions
As shown in Section 4, the functions of obtaining access point
information, obtaining topology, and imposing virtual network
operations can take advantages of the same set of topology YANG
models. These functions are briefly explained further in the
following sub-sections.
5.1.1 Obtaining Access Point Info
For cases such as scenario 1, a client may have no interest in
directly controlling network resources, but might want an automated
open control interface for initiating service requests. In this
case, a transport controller may provide the access point
information. This information can then be used in service request
sent over the open interface.
The TE Topology YANG model provided in [TE-topo] can be used to
provide a list of links. If the remote node and termination point
information is unknown, it is omitted from the reported information.
If the client-side node and termination point information is
obtained via configuration or a distributed discovery mechanism,
then it can also be added into the reported information.
Technology-specific details might also be needed to further express
the constraints/attributes associated with the access points. Note
that all of this information is usually read only.
5.1.2 Obtaining Topology
Refer to [TE-Topo] for explanations and examples on how to obtain
the topology. For technology specific topology information, other
models such as those provided in [WDM-Topo] and [ODU-Topo] maybe
used.
Zhang et al Expires September 2016 [Page 9]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
5.1.3 Virtual Network Operations
There are two ways to request the creation of a virtual network.
One is to define the topology explicitly using the model provided in
the topology YANG drafts listed in Section 5.1.2.. The other way is
to provide an estimated traffic information (a traffic matrix) and
ask for a network controller of the provider network to provide a
virtual network that can fulfill the demand. This second approach
does not have a supporting model and need further work.
5.2. Tunnel Operations
Thecurrent [TE-Tunnel] provides a technology agnostic Traffic-
Engieering (TE) device tunnel. The model included in that draft is
currently being developed to make it generic for both controller and
device usage. It is expected that the next version of this draft
will provide such a generic TE tunnel model that can cater to the
base requirementss for tunnel operations but it may need to be
augmented to support controller-specific operations.
Futhermore, technology-specific augmentations of the base generic TE
tunnel models are needed. For example, for Optical Channel (OCh)
tunnels in WDM networks, information such as the lambda resource
usage is needed. Similarly, for ODU tunnels, information such as
the usage of tributary slots is needed.
5.3. Service Requests
The service model is an important model that enables automated
operations between a client controller and a provider controller.
The transport connectivity service model is different from the model
of a tunnel since the transport connectivity service model hides
technical details from a client.
A transport connectivity service model is provided below:
module: ietf-transport-service
+--rw transport_service
| +--rw service* [service-id]
| +--rw service-id uint32
| +--rw service-name? string
| +--rw source
| | +--rw node-id? node-id
| | +--rw tp-id? tp-id
| +--rw destination
| | +--rw node-id? node-id
Zhang et al Expires September 2016 [Page 10]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
| | +--rw tp-id? tp-id
| +--rw service-type? service-types
| +--rw supporting-tunnel* [name]
| | +--rw name string
| +--rw bandwidth decimal64
| +--rw SLA? SLAtypes
| +--rw intended-policies
| +--rw schedule
| +--rw schedules
| +--rw schedule* [schedule-id]
| +--rw schedule-id uint32
| +--rw start? yang:date-and-time
| +--rw schedule-duration? string
| +--rw repeat-interval? string
+--rw service-state
+--ro service* [service-id]
+--ro service-id uint32
+--ro service-name? string
+--ro source
| +--ro node-id? node-id
| +--ro tp-id? tp-id
+--ro destination
| +--ro node-id? node-id
| +--ro tp-id? tp-id
+--ro service-type? service-types
+--ro supporting-tunnel* [name]
| +--ro name string
+--ro bandwidth decimal64
+--ro SLA? SLAtypes
+--ro applied-policies
| +--ro schedule
| +--ro schedules
| +--ro schedule* [schedule-id]
| +--ro schedule-id uint32
| +--ro start? yang:date-and-time
| +--ro schedule-duration? string
| +--ro repeat-interval? string
+--ro status? state-types
The corresponding YANG code is provided below:
<CODE BEGINS> file " ietf-transport-service@2016-3-7.yang"
module ietf-transport-service {
yang-version 1;
namespace "urn:ietf:params:xml:ns:yang:ietf_transport_service";
prefix tser;
Zhang et al Expires September 2016 [Page 11]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
import ietf-inet-types {
prefix inet;
}
import ietf-schedule {
prefix "sch";
}
organization "TBD";
contact
"WILL-BE-DEFINED-LATER";
description
"this module describes a service module that is essential
API for a client to ask for a provider network for a path
without the need to care about underlying technologies.
Capability to specify constraints/policies are provided as
optional features.";
revision 2016-03-07 {
description
"Initial revision.";
reference "to add the draft name";
}
typedef tp-id { //client termination port
type union {
type uint32;
type inet:ip-address; // IPv4 or IPv6 address
}
description
"the client termination port of a transport device";
}
typedef node-id { //client termination port
type union {
type uint32;
type inet:ip-address; // IPv4 or IPv6 address
}
description
"the node id of a transport device";
}
typedef service-types {
type enumeration {
enum "EPL" {
Zhang et al Expires September 2016 [Page 12]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
value 0;
description
"EPL service";
}
enum "EVPL" {
value 1;
description
"EVPL";
}
enum "EPLAN" {
value 2;
description
"EPLAN";
}
enum "EVPLAN" {
value 3;
description
"EVPLAN";
}
}
description "the type of a service request";
}
typedef state-types{
type enumeration {
enum "NORMAL" {
value 0;
description
"service is normal/up and running";
}
enum "DOWN" {
value 1;
description
"service is down.";
}
enum "DEGRADED"{
value 2;
description
"service is in degraded state.";
}
}
description "the state of a service.";
}
typedef SLAtypes{
type enumeration{
enum "1+1+R"{
Zhang et al Expires September 2016 [Page 13]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
value 0;
description
"A reroute will be provided after both the working and
protection path fails.";
}
enum "1+1"{
value 1;
description
"a protection path is provided.";
}
enum "Rerouting"{
value 2;
description
"rerouting after the working path fails";
}
enum "unprotected"{
value 3;
description
"no protection provided";
}
}
}
grouping service-basics {
//later put all service under so that it can reused
// in states.
leaf service-id {
type uint32;
description "an unique identificaiton of a service.";
}
leaf service-name{
type string;
description "name for a service";
}
container source{
leaf node-id {
type node-id;
description "node id";
}
leaf tp-id {
type tp-id;
description "TBD";
}
description "Service source information";
}
Zhang et al Expires September 2016 [Page 14]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
container destination{
leaf node-id {
type node-id;
description "node id";
}
leaf tp-id {
type tp-id;
description "TBD";
}
description "Service destination information";
}
leaf service-type {
type service-types;
description "the type of a service request";
}
list supporting-tunnel{
key "name";
leaf name{
type string;
description "the name of a tunnel";
}
description "the list of tunnesl to support the list";
}
leaf bandwidth {
type decimal64 {
fraction-digits 2;
}
mandatory true;
description "the bandwidth requested by a service.";
}
leaf SLA{
type SLAtypes;
description "the type of protection expected for this
service";
}
}
container transport_service {
description
"serves as a top-level container for a list of services";
Zhang et al Expires September 2016 [Page 15]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
list service {
key "service-id";
description
"an unique identifier of a service";
uses service-basics;
container intended-policies {
container schedule {
uses sch:schedules;
description "to specify bandwidth scheduling
information of this service.";
}
description "specify the policy associated with a
service";
}//end of policy
}//end of service list
}//service top container
container service-state
{
list service {
config false;
key "service-id";
description "operational state of a service";
uses service-basics;
container applied-policies{
container schedule {
uses sch:schedules;
description "to specify bandwidth scheduling
information of this service.";
}
}
leaf status {
type state-types;
description "TBD";
}
}//end of a service state
}//end of state
}
<CODE ENDS>
Zhang et al Expires September 2016 [Page 16]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
6. Security Considerations
Clearly modifying server-layer resources will have a significant
impact on network infrastructure. More specifically they will
provide the services and applications running across client-layers,
which the server-layer is supporting. Therefore, security must be an
important consideration when implementing the architecture, models
and protocol mechanisms discussed in this document.
Communicating service and network information (including access
point identifiers, capabilities, topologies, etc.) across external
interfaces represents a security risk. Thus, mechanisms to encrypt
or preserve the domain topology confidentiality should be used.
A key consideration are the external protocols (those shown as
entering or leaving the orchestrator and controllers shown in Figure
2 (Scenario 2: Multi-domain network control and management)) which
must be appropriately secured. This security should include
authentication and authorization to control access to different
functions that the orchestrator may perform to modify or create
state in the server-layer, and the establishment and management of
the orchestrator to controller relationship.
The orchestrator will contain significant data about the network
domains, the services carried by each domain, and customer type
information. Therefore, access to information held in the
orchestrator must be secured. Since such access will be largely
through external mechanisms, it may be pertinent to apply policy-
based controls to restrict access and functions.
7. Manageability Considerations
The core objectives of this document are to assist in the deployment
and operation of transport services across server-layer network
infrastructure. The model-driven management/control principles,
which are vendor-neutral and supported by extensible APIs, should be
utilized.
The open models described in this document are based on YANG
[RFC6020] and the RESTCONF [RESTCONF] messaging protocol, a REST-
Zhang et al Expires September 2016 [Page 17]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
like protocol running over HTTP for accessing data defined in YANG,
may also be used.
8. IANA Considerations
TBD.
9. Acknowledgements
Thank Igor Bryskin for useful discussions on relevant YANG models.
10. References
10.1. Normative References
[RFC2119] S. Bradner, "Key words for use in RFCs to indicate
requirements levels", RFC 2119, March 1997.
[RFC6020] Bjorklund, M., "YANG - A Data Modeling Language for the
Network Configuration Protocol (NETCONF)", RFC 6020,
October 2010.
[ietf-netmod-rfc6087bis] Bierman, A., "Guidelines for Authors and
Reviewers of YANG Data Model Documents", draft-ietf-
netmod-rfc6087bis-01, work in progress, October 2014.
10.2. Informative References
[TE-Topo] Liu X., Bryskin I., et al, "YANG Data Model for TE
Topologies", draft-ietf-teas-yang-te-topo-02, October 2015.
[WDM-Topo] Lee Y., et al, "A Yang Data Model for WSON Optical
Networks", draft-lee-ccamp-wson-yang-02, work in progress,
July 2015.
[ODU-Topo] Zhang X., Rao B., Liu X., "A YANG Data Model for Layer 1
Network Topology", draft-zhang-ccamp-l1-topo-yang-02,
December 2015.
[TE-Tunnel] Saad T., Gandhi R., Liu X., et al, "A YANG Data Model
for Traffic Engineering Tunnels and Interfaces", draft-
ietf-teas-yang-te-02, October, 2015.
[RESTCONF] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
Protocol", Work in Progress, draft-ietf-netconf-restconf-
09, December 2015.
Zhang et al Expires September 2016 [Page 18]
draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt March 2016
11. Contributors' Address
Sergio Belotti
Nokia
Sergio.belotti@nokia.com
Young Lee
Futurewei Technologies
leeyoung@huawei.com
Aihua Guo
Huawei Technologies Canada
aihuaguo@huawei.com
Authors' Addresses
Xian Zhang
Huawei Technologies
Email: zhang.xian@huawei.com
Ruiquan Jing
China Telecom
jingrq@ctbri.com.cn
Wei Jian
China Unicom
jianwei@chinaunicom.cn
Jeong-dong Ryoo
ETRI
ryoo@etri.re.kr
Yunbin Xu
China Academy of Information and Communication Technology (CAICT)
xuyunbin@ritt.cn
Daniel King
Lancaster University
d.king@lancaster.ac.uk
Zhang et al Expires September 2016 [Page 19]