rfc9730.original | rfc9730.txt | |||
---|---|---|---|---|
TEAS Working Group Haomian Zheng | ||||
Internet Draft Yi Lin | ||||
Category: Informational Huawei Technologies | ||||
Yang Zhao | ||||
China Mobile | ||||
Yunbin Xu | ||||
CAICT | ||||
Dieter Beller | ||||
Nokia | ||||
Expires: March 7, 2025 September 3, 2024 | ||||
Interworking of GMPLS Control and Centralized Controller Systems | Internet Engineering Task Force (IETF) H. Zheng | |||
Request for Comments: 9730 Y. Lin | ||||
Category: Informational Huawei Technologies | ||||
ISSN: 2070-1721 Y. Zhao | ||||
China Mobile | ||||
Y. Xu | ||||
CAICT | ||||
D. Beller | ||||
Nokia | ||||
January 2025 | ||||
draft-ietf-teas-gmpls-controller-inter-work-17 | Interworking of GMPLS Control and Centralized Controller Systems | |||
Abstract | Abstract | |||
Generalized Multi-Protocol Label Switching (GMPLS) control allows | Generalized Multiprotocol Label Switching (GMPLS) control allows each | |||
each network element (NE) to perform local resource discovery, | network element (NE) to perform local resource discovery, routing, | |||
routing and signaling in a distributed manner. | and signaling in a distributed manner. | |||
The advancement of software-defined transport networking technology | The advancement of software-defined transport networking technology | |||
enables a group of NEs to be managed through centralized controller | enables a group of NEs to be managed through centralized controller | |||
hierarchies. This helps to tackle challenges arising from multiple | hierarchies. This helps to tackle challenges arising from multiple | |||
domains, vendors, and technologies. An example of such a centralized | domains, vendors, and technologies. An example of such a centralized | |||
architecture is the Abstraction and Control of Traffic Engineered | architecture is the Abstraction and Control of Traffic-Engineered | |||
Networks (ACTN) controller hierarchy, as described in RFC 8453. | Networks (ACTN) controller hierarchy, as described in RFC 8453. | |||
Both the distributed and centralized control planes have their | Both the distributed and centralized control planes have their | |||
respective advantages and should complement each other in the | respective advantages and should complement each other in the system, | |||
system, rather than competing. This document outlines how the GMPLS | rather than compete. This document outlines how the GMPLS | |||
distributed control plane can work together with a centralized | distributed control plane can work together with a centralized | |||
controller system in a transport network. | controller system in a transport network. | |||
Status of this Memo | Status of This Memo | |||
This Internet-Draft is submitted to IETF in full conformance with | ||||
the provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF), its areas, and its working groups. Note that | ||||
other groups may also distribute working documents as Internet- | ||||
Drafts. | ||||
Internet-Drafts are draft documents valid for a maximum of six | This document is not an Internet Standards Track specification; it is | |||
months and may be updated, replaced, or obsoleted by other documents | published for informational purposes. | |||
at any time. It is inappropriate to use Internet-Drafts as | ||||
reference material or to cite them other than as "work in progress." | ||||
The list of current Internet-Drafts can be accessed at | ||||
http://www.ietf.org/ietf/1id-abstracts.txt. | ||||
The list of Internet-Draft Shadow Directories can be accessed at | This document is a product of the Internet Engineering Task Force | |||
http://www.ietf.org/shadow.html. | (IETF). It represents the consensus of the IETF community. It has | |||
received public review and has been approved for publication by the | ||||
Internet Engineering Steering Group (IESG). Not all documents | ||||
approved by the IESG are candidates for any level of Internet | ||||
Standard; see Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on March 7, 2025. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9730. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2024 IETF Trust and the persons identified as the | Copyright (c) 2025 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with | carefully, as they describe your rights and restrictions with respect | |||
respect to this document. Code Components extracted from this | to this document. Code Components extracted from this document must | |||
document must include Simplified BSD License text as described in | include Revised BSD License text as described in Section 4.e of the | |||
Section 4.e of the Trust Legal Provisions and are provided without | Trust Legal Provisions and are provided without warranty as described | |||
warranty as described in the Simplified BSD License. | in the Revised BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction ................................................... 3 | 1. Introduction | |||
2. Abbreviations .................................................. 4 | 2. Abbreviations | |||
3. Overview ....................................................... 5 | 3. Overview | |||
3.1. Overview of GMPLS Control Plane ........................... 5 | 3.1. Overview of GMPLS Control Plane | |||
3.2. Overview of Centralized Controller System ................. 5 | 3.2. Overview of Centralized Controller System | |||
3.3. GMPLS Control Interworking with a Centralized Controller | 3.3. GMPLS Control Interworking with a Centralized Controller | |||
System ......................................................... 6 | System | |||
4. Discovery Options .............................................. 8 | 4. Discovery Options | |||
4.1. LMP ....................................................... 8 | 4.1. LMP | |||
5. Routing Options ................................................ 8 | 5. Routing Options | |||
5.1. OSPF-TE ................................................... 9 | 5.1. OSPF-TE | |||
5.2. IS-IS-TE .................................................. 9 | 5.2. IS-IS-TE | |||
5.3. NETCONF/RESTCONF .......................................... 9 | 5.3. NETCONF/RESTCONF | |||
6. Path Computation ............................................... 9 | 6. Path Computation | |||
6.1. Controller-based Path Computation ......................... 9 | 6.1. Controller-Based Path Computation | |||
6.2. Constraint-based Path Computing in GMPLS Control ......... 10 | 6.2. Constraint-Based Path Computing in GMPLS Control | |||
6.3. Path Computation Element (PCE) ........................... 10 | 6.3. Path Computation Element (PCE) | |||
7. Signaling Options ............................................. 10 | 7. Signaling Options | |||
7.1. RSVP-TE .................................................. 11 | 7.1. RSVP-TE | |||
8. Interworking Scenarios ........................................ 11 | 8. Interworking Scenarios | |||
8.1. Topology Collection & Synchronization .................... 11 | 8.1. Topology Collection and Synchronization | |||
8.2. Multi-domain Service Provisioning ........................ 11 | 8.2. Multi-Domain Service Provisioning | |||
8.3. Multi-layer Service Provisioning ......................... 15 | 8.3. Multi-Layer Service Provisioning | |||
8.3.1. Multi-layer Path Computation ........................ 15 | 8.3.1. Multi-Layer Path Computation | |||
8.3.2. Cross-layer Path Creation ........................... 18 | 8.3.2. Cross-Layer Path Creation | |||
8.3.3. Link Discovery ...................................... 19 | 8.3.3. Link Discovery | |||
8.4. Recovery ................................................. 19 | 8.4. Recovery | |||
8.4.1. Span Protection ..................................... 20 | 8.4.1. Span Protection | |||
8.4.2. LSP Protection ...................................... 20 | 8.4.2. LSP Protection | |||
8.4.3. Single-domain LSP Restoration ....................... 20 | 8.4.3. Single-Domain LSP Restoration | |||
8.4.4. Multi-domain LSP Restoration ........................ 21 | 8.4.4. Multi-Domain LSP Restoration | |||
8.4.5. Fast Reroute ........................................ 25 | 8.4.5. Fast Reroute | |||
8.5. Controller Reliability ................................... 25 | 8.5. Controller Reliability | |||
9. Manageability Considerations .................................. 26 | 9. Manageability Considerations | |||
10. Security Considerations ...................................... 26 | 10. Security Considerations | |||
11. IANA Considerations........................................... 27 | 11. IANA Considerations | |||
12. References ................................................... 27 | 12. References | |||
12.1. Normative References .................................... 27 | 12.1. Normative References | |||
12.2. Informative References .................................. 29 | 12.2. Informative References | |||
13. Contributors ................................................. 32 | Acknowledgements | |||
14. Authors' Addresses ........................................... 32 | Contributors | |||
Acknowledgements ................................................. 32 | Authors' Addresses | |||
1. Introduction | 1. Introduction | |||
Generalized Multi-Protocol Label Switching (GMPLS) [RFC3945] extends | Generalized Multiprotocol Label Switching (GMPLS) [RFC3945] extends | |||
MPLS to support different classes of interfaces and switching | MPLS to support different classes of interfaces and switching | |||
capabilities such as Time-Division Multiplex Capable (TDM), Lambda | capabilities such as Time-Division Multiplex Capable (TDM), Lambda | |||
Switch Capable (LSC), and Fiber-Switch Capable (FSC). Each network | Switch Capable (LSC), and Fiber-Switch Capable (FSC). Each network | |||
element (NE) running a GMPLS control plane collects network | element (NE) running a GMPLS control plane collects network | |||
information from other NEs and supports service provisioning through | information from other NEs and supports service provisioning through | |||
signaling in a distributed manner. A more generic description of | signaling in a distributed manner. A more generic description of | |||
Traffic-engineering networking information exchange can be found in | traffic-engineering networking information exchange can be found in | |||
[RFC7926]. | [RFC7926]. | |||
On the other hand, Software-Defined Networking (SDN) technologies | On the other hand, Software-Defined Networking (SDN) technologies | |||
have been introduced to control the transport network centrally. | have been introduced to control the transport network centrally. | |||
Centralized controllers can collect network information from each | Centralized controllers can collect network information from each | |||
node and provision services on corresponding nodes. One example is | node and provision services on corresponding nodes. One example is | |||
the Abstraction and Control of Traffic Engineered Networks (ACTN) | the Abstraction and Control of Traffic-Engineered Networks (ACTN) | |||
[RFC8453], which defines a hierarchical architecture with | [RFC8453], which defines a hierarchical architecture with the | |||
Provisioning Network Controller (PNC), Multi-domain Service | Provisioning Network Controller (PNC), Multi-Domain Service | |||
Coordinator (MDSC) and Customer Network Controller (CNC) as | Coordinator (MDSC), and Customer Network Controller (CNC) as | |||
centralized controllers for different network abstraction levels. A | centralized controllers for different network abstraction levels. A | |||
Path Computation Element (PCE) based approach has been proposed as | PCE-based approach has been proposed in [RFC7491]: Application-Based | |||
Application-Based Network Operations (ABNO) in [RFC7491]. | Network Operations (ABNO). | |||
GMPLS can be used to control Network Elements (NEs) in such | GMPLS can be used to control network elements (NEs) in such | |||
centralized controller architectures. A centralized controller may | centralized controller architectures. A centralized controller may | |||
support GMPLS-enabled domains and communicate with a GMPLS-enabled | support GMPLS-enabled domains and communicate with a GMPLS-enabled | |||
domain where the GMPLS control plane handles service provisioning | domain where the GMPLS control plane handles service provisioning | |||
from ingress to egress. In this scenario, the centralized controller | from ingress to egress. In this scenario, the centralized controller | |||
sends a request to the entry node and does not need to configure all | sends a request to the entry node and does not need to configure all | |||
NEs along the path within the domain from ingress to egress, thus | NEs along the path within the domain from ingress to egress, thus | |||
leveraging the GMPLS control plane. This document describes how the | leveraging the GMPLS control plane. This document describes how the | |||
GMPLS control plane interworks with a centralized controller system | GMPLS control plane interworks with a centralized controller system | |||
in a transport network. | in a transport network. | |||
2. Abbreviations | 2. Abbreviations | |||
The following abbreviations are used in this document. | The following abbreviations are used in this document. | |||
ACTN Abstraction and Control of Traffic Engineered Networks | ACTN: Abstraction and Control of Traffic-Engineered Networks | |||
([RFC8453]) | [RFC8453] | |||
APS Automatic Protection Switching ([G.808.1]) | ||||
BRPC Backward-Recursive PCE-Based Computation ([RFC5441]) | ||||
CSPF Constraint-based Shortest Path First | ||||
DoS Denial-of-Service | ||||
E2E End-to-end | ||||
ERO Explicit Route Object | ||||
FA Forwarding Adjacency | ||||
FRR Fast Reroute | ||||
GMPLS Generalized Multi-Protocol Label Switching ([RFC3945]) | ||||
H-PCE Hierarchical PCE ([RFC8685]) | ||||
IDS Intrusion Detection System | ||||
IGP Interior Gateway Protocol | ||||
IoC Indicators of Compromise ([RFC9424]) | ||||
IPS Intrusion Prevention System | ||||
IS-IS Intermediate System to Intermediate System protocol | ||||
LMP Link Management Protocol ([RFC4204]) | ||||
LSP Label Switched Path | ||||
LSP-DB LSP Database | ||||
MD Multi-domain | ||||
MDSC Multi-domain Service Coordinator([RFC8453]) | ||||
MITM Man-In-The-Middle | ||||
ML Multi-layer | ||||
MPI MDSC to PNC Interface ([RFC8453]) | ||||
NE Network element | ||||
NETCONF Network Configuration Protocol ([RFC6241]) | ||||
NMS Network Management System | ||||
OSPF Open Shortest Path First protocol | ||||
PCC Path Computation Client ([RFC4655]) | ||||
PCE Path Computation Element ([RFC4655]) | ||||
PCEP Path Computation Element communication Protocol ([RFC5440]) | ||||
PCEP-LS Link-state PCEP ([PCEP-LS]) | ||||
PLR Point of Local Repair | ||||
PNC Provisioning Network Controller ([RFC8453]) | ||||
RSVP Resource Reservation Protocol | ||||
SBI Southbound Interface | ||||
SDN Software-Defined Networking | ||||
TE Traffic Engineering | ||||
TED Traffic Engineering Database | ||||
TLS Transport Layer Security ([RFC8446]) | ||||
VNTM Virtual Network Topology Manager ([RFC5623]) | ||||
3. Overview | APS: Automatic Protection Switching [G.808.1] | |||
BRPC: Backward Recursive PCE-Based Computation [RFC5441] | ||||
CSPF: Constrained Shortest Path First | ||||
DoS: Denial of Service | ||||
E2E: end to end | ||||
ERO: Explicit Route Object | ||||
FA: Forwarding Adjacency | ||||
FRR: Fast Reroute | ||||
GMPLS: Generalized Multiprotocol Label Switching [RFC3945] | ||||
H-PCE: Hierarchical PCE [RFC8685] | ||||
IDS: Intrusion Detection System | ||||
IGP: Interior Gateway Protocol | ||||
IoCs: Indicators of Compromise [RFC9424] | ||||
IPS: Intrusion Prevention System | ||||
IS-IS: Intermediate System to Intermediate System protocol | ||||
LMP: Link Management Protocol [RFC4204] | ||||
LSP: Label Switched Path | ||||
LSP-DB: LSP Database | ||||
MD: multi-domain | ||||
MDSC: Multi-Domain Service Coordinator [RFC8453] | ||||
MITM: Man in the Middle | ||||
ML: multi-layer | ||||
MPI: MDSC to PNC Interface [RFC8453] | ||||
NE: network element | ||||
NETCONF: Network Configuration Protocol [RFC6241] | ||||
NMS: Network Management System | ||||
OSPF: Open Shortest Path First protocol | ||||
PCC: Path Computation Client [RFC4655] | ||||
PCE: Path Computation Element [RFC4655] | ||||
PCEP: PCE Communication Protocol [RFC5440] | ||||
PCEP-LS: Link State PCEP [PCEP-LS] | ||||
PLR: Point of Local Repair | ||||
PNC: Provisioning Network Controller [RFC8453] | ||||
RSVP: Resource Reservation Protocol | ||||
SBI: Southbound Interface | ||||
SDN: Software-Defined Networking | ||||
TE: Traffic Engineering | ||||
TED: Traffic Engineering Database | ||||
TLS: Transport Layer Security [RFC8446] | ||||
VNTM: Virtual Network Topology Manager [RFC5623] | ||||
3. Overview | ||||
This section provides an overview of the GMPLS control plane, | This section provides an overview of the GMPLS control plane, | |||
centralized controller systems and their interactions in transport | centralized controller systems, and their interactions in transport | |||
networks. | networks. | |||
A transport network [RFC5654] is a server-layer network designed to | A transport network [RFC5654] is a server-layer network designed to | |||
provide connectivity services for client-layer connectivity. This | provide connectivity services for client-layer connectivity. This | |||
setup allows client traffic to be carried seamlessly across the | setup allows client traffic to be carried seamlessly across the | |||
server-layer network resources. | server-layer network resources. | |||
3.1. Overview of GMPLS Control Plane | 3.1. Overview of GMPLS Control Plane | |||
GMPLS separates the control plane and the data plane to support | GMPLS separates the control plane and the data plane to support time- | |||
time-division, wavelength, and spatial switching, which are | division, wavelength, and spatial switching, which are significant in | |||
significant in transport networks. For the NE level control in | transport networks. For the NE level control in GMPLS, each node | |||
GMPLS, each node runs a GMPLS control plane instance. | runs a GMPLS control plane instance. Functionalities such as service | |||
Functionalities such as service provisioning, protection, and | provisioning, protection, and restoration can be performed via GMPLS | |||
restoration can be performed via GMPLS communication among multiple | communication among multiple NEs. At the same time, the GMPLS | |||
NEs. At the same time, the GMPLS control plane instance can also | control plane instance can also collect information about node and | |||
collect information about node and link resources in the network to | link resources in the network to construct the network topology and | |||
construct the network topology and compute routing paths for serving | compute routing paths for serving service requests. | |||
service requests. | ||||
Several protocols have been designed for the GMPLS control plane | Several protocols have been designed for the GMPLS control plane | |||
[RFC3945], including link management [RFC4204], signaling [RFC3471], | [RFC3945], including link management [RFC4204], signaling [RFC3471], | |||
and routing [RFC4202] protocols. The GMPLS control plane instances | and routing [RFC4202] protocols. The GMPLS control plane instances | |||
applying these protocols communicate with each other to exchange | applying these protocols communicate with each other to exchange | |||
resource information and establish Label Switched Paths (LSPs). In | resource information and establish LSPs. In this way, GMPLS control | |||
this way, GMPLS control plane instances in different nodes in the | plane instances in different nodes in the network have the same view | |||
network have the same view of the network topology and provision | of the network topology and provision services based on local | |||
services based on local policies. | policies. | |||
3.2. Overview of Centralized Controller System | 3.2. Overview of Centralized Controller System | |||
With the development of SDN technologies, a centralized controller | With the development of SDN technologies, a centralized controller | |||
architecture has been introduced to transport networks. One example | architecture has been introduced to transport networks. One example | |||
architecture can be found in ACTN [RFC8453]. In such systems, a | architecture can be found in ACTN [RFC8453]. In such systems, a | |||
controller is aware of the network topology and is responsible for | controller is aware of the network topology and is responsible for | |||
provisioning incoming service requests. | provisioning incoming service requests. | |||
Multiple hierarchies of controllers are designed at different levels | Multiple hierarchies of controllers are designed at different levels | |||
to implement different functions. This kind of architecture enables | to implement different functions. This kind of architecture enables | |||
multi-vendor, multi-domain, and multi-technology control. For | multi-vendor, multi-domain, and multi-technology control. For | |||
example, a higher-level controller coordinates several lower-level | example, a higher-level controller coordinates several lower-level | |||
controllers controlling different domains, for topology collection | controllers controlling different domains for topology collection and | |||
and service provisioning. Vendor-specific features can be abstracted | service provisioning. Vendor-specific features can be abstracted | |||
between controllers, and a standard API (e.g., generated from | between controllers, and a standard API (e.g., generated from | |||
RESTCONF [RFC8040] / YANG [RFC7950]) may be used. | RESTCONF [RFC8040] / YANG [RFC7950]) may be used. | |||
3.3. GMPLS Control Interworking with a Centralized Controller System | 3.3. GMPLS Control Interworking with a Centralized Controller System | |||
Besides GMPLS and the interactions among the controller hierarchies, | Besides GMPLS and the interactions among the controller hierarchies, | |||
it is also necessary for the controllers to communicate with the | it is also necessary for the controllers to communicate with the | |||
network elements. Within each domain, GMPLS control can be applied | network elements. Within each domain, GMPLS control can be applied | |||
to each NE. The bottom-level centralized controller can act as an NE | to each NE. The bottom-level centralized controller can act as an NE | |||
to collect network information and initiate LSPs. Figure 1 shows an | to collect network information and initiate LSPs. Figure 1 shows an | |||
example of GMPLS interworking with centralized controllers (ACTN | example of GMPLS interworking with centralized controllers (ACTN | |||
terminologies are used in the figure). | terminologies are used in the figure). | |||
+-------------------+ | +-------------------+ | |||
| Orchestrator | | | Orchestrator | | |||
| (MDSC) | | | (MDSC) | | |||
+-------------------+ | +-------------------+ | |||
^ ^ ^ | ^ ^ ^ | |||
| | | | | | | | |||
+-------------+ | +-------------+ | +-------------+ | +--------------+ | |||
| |RESTCONF/YANG models | | | |RESTCONF/YANG modules | | |||
V V V | V V V | |||
+-------------+ +-------------+ +-------------+ | +-------------+ +-------------+ +-------------+ | |||
|Controller(N)| |Controller(G)| |Controller(G)| | |Controller(N)| |Controller(G)| |Controller(G)| | |||
| (PNC) | | (PNC) | | (PNC) | | | (PNC) | | (PNC) | | (PNC) | | |||
+-------------+ +-------------+ +-------------+ | +-------------+ +-------------+ +-------------+ | |||
^ ^ ^ ^ ^ ^ | ^ ^ ^ ^ ^ ^ | |||
| | | | | | | | | | | | | | |||
NETCONF| |PCEP NETCONF| |PCEP NETCONF| |PCEP | NETCONF| |PCEP NETCONF| |PCEP NETCONF| |PCEP | |||
/YANG | | /YANG | | /YANG | | | /YANG | | /YANG | | /YANG | | | |||
V V V V V V | V V V V V V | |||
.----------. Inter- .----------. Inter- .----------. | .----------. Inter- .----------. Inter- .----------. | |||
/ \ domain / \ domain / \ | / \ domain / \ domain / \ | |||
| | link | LMP | link | LMP | | | | link | LMP | link | LMP | | |||
| |======| OSPF-TE |======| OSPF-TE | | | |======| OSPF-TE |======| OSPF-TE | | |||
| | | RSVP-TE | | RSVP-TE | | | | | RSVP-TE | | RSVP-TE | | |||
\ / \ / \ / | \ / \ / \ / | |||
`----------` `----------` `----------` | `----------` `----------` `----------` | |||
Non-GMPLS domain 1 GMPLS domain 2 GMPLS domain 3 | Non-GMPLS domain 1 GMPLS domain 2 GMPLS domain 3 | |||
Controller(N): A domain controller controlling a non-GMPLS domain | Figure 1: Example of GMPLS/non-GMPLS Interworking with Controllers | |||
Controller(G): A domain controller controlling a GMPLS domain | ||||
Figure 1: Example of GMPLS/non-GMPLS interworking with Controllers | Controller(N): A domain controller controlling a non-GMPLS domain | |||
Controller(G): A domain controller controlling a GMPLS domain | ||||
Figure 1 shows the scenario with two GMPLS domains and one non-GMPLS | Figure 1 shows the scenario with two GMPLS domains and one non-GMPLS | |||
domain. This system supports the interworking among non-GMPLS | domain. This system supports the interworking among non-GMPLS | |||
domain, GMPLS domain and the controller hierarchies. | domains, GMPLS domains, and the controller hierarchies. | |||
For domain 1, the network elements were not enabled with GMPLS so | For domain 1, the network elements were not enabled with GMPLS, so | |||
the control is purely from the controller, via Network Configuration | the control is purely from the controller, via Network Configuration | |||
Protocol (NETCONF) [RFC6241] / YANG and/or PCE Communication | Protocol (NETCONF) [RFC6241] / YANG and/or PCE Communication Protocol | |||
Protocol (PCEP) [RFC5440]. | (PCEP) [RFC5440]. | |||
For domains 2 and 3: | For domains 2 and 3: | |||
- Each domain has the GMPLS control plane enabled at the physical | * Each domain has the GMPLS control plane enabled at the physical | |||
network level. The Provisioning Network Controller (PNC) can | network level. The Provisioning Network Controller (PNC) can | |||
exploit GMPLS capabilities implemented in the domain to listen to | exploit GMPLS capabilities implemented in the domain to listen to | |||
the IGP routing protocol messages (OSPF LSAs, for example) that | the IGP routing protocol messages (for example, OSPF Link State | |||
the GMPLS control plane instances are disseminating into the | Advertisements (LSAs)) that the GMPLS control plane instances are | |||
network and thus learn the network topology. For path computation | disseminating into the network and thus learn the network | |||
in the domain with PNC implementing a PCE, Path Computation | topology. For path computation in the domain with the PNC | |||
Clients (PCCs) (e.g. NEs, other controller/PCE) use PCEP to ask | implementing a PCE, Path Computation Clients (PCCs) (e.g., NEs, | |||
the PNC for a path and get replies. The Multi-Domain Service | other controllers/PCEs) use PCEP to ask the PNC for a path and get | |||
Coordinator (MDSC) communicates with PNCs using, for example | replies. The Multi-Domain Service Coordinator (MDSC) communicates | |||
REST/RESTCONF based on YANG data models. As a PNC has learned its | with PNCs using, for example, Representational State Transfer | |||
domain topology, it can report the topology to the MDSC. When a | (REST) / RESTCONF based on YANG data models. As a PNC has learned | |||
service arrives, the MDSC computes the path and coordinates PNCs | its domain topology, it can report the topology to the MDSC. When | |||
to establish the corresponding LSP segment; | a service arrives, the MDSC computes the path and coordinates PNCs | |||
to establish the corresponding LSP segment. | ||||
- Alternatively, the NETCONF protocol can be used to retrieve | * Alternatively, the NETCONF protocol can be used to retrieve | |||
topology information utilizing the [RFC8795] YANG model and the | topology information utilizing the YANG module in [RFC8795] and | |||
technology-specific YANG model augmentations required for the | the technology-specific YANG module augmentations required for the | |||
specific network technology. The PNC can retrieve topology | specific network technology. The PNC can retrieve topology | |||
information from any NE (the GMPLS control plane instance of each | information from any NE (the GMPLS control plane instance of each | |||
NE in the domain has the same topological view), construct the | NE in the domain has the same topological view), construct the | |||
topology of the domain, and export an abstract view to the MDSC. | topology of the domain, and export an abstract view to the MDSC. | |||
Based on the topology retrieved from multiple PNCs, the MDSC can | Based on the topology retrieved from multiple PNCs, the MDSC can | |||
create a topology graph of the multi-domain network, and can use | create a topology graph of the multi-domain network and can use it | |||
it for path computation. To set up a service, the MDSC can exploit | for path computation. To set up a service, the MDSC can exploit | |||
the [TE-Tunnel] YANG model together with the technology-specific | the YANG module in [YANG-TE] together with the technology-specific | |||
YANG model augmentations. | YANG module augmentations. | |||
This document focuses on the interworking between GMPLS and the | This document focuses on the interworking between GMPLS and the | |||
centralized controller system, including: | centralized controller system, including: | |||
- The interworking between the GMPLS domains and the centralized | * the interworking between the GMPLS domains and the centralized | |||
controllers (including the orchestrator, if it exists) controlling | controllers (including the orchestrator, if it exists) controlling | |||
the GMPLS domains; | the GMPLS domains and | |||
- The interworking between a non-GMPLS domain (which is controlled | * the interworking between a non-GMPLS domain (which is controlled | |||
by a centralized controller system) and a GMPLS domain, through | by a centralized controller system) and a GMPLS domain, through | |||
the controller hierarchy architecture. | the controller hierarchy architecture. | |||
For convenience, this document uses the following terminologies for | For convenience, this document uses the following terminologies for | |||
the controller and the orchestrator: | the controller and the orchestrator: | |||
- Controller(G): A domain controller controlling a GMPLS domain (the | Controller(G): A domain controller controlling a GMPLS domain (the | |||
controller(G) of the GMPLS domains 2 and 3 in Figure 1); | Controller(G) of the GMPLS domains 2 and 3 in Figure 1) | |||
- Controller(N): A domain controller controlling a non-GMPLS domain | Controller(N): A domain controller controlling a non-GMPLS domain | |||
(the controller(N) of the non-GMPLS domain 1 in Figure 1); | (the Controller(N) of the non-GMPLS domain 1 in Figure 1) | |||
- H-Controller(G): A domain controller controlling the higher-layer | H-Controller(G): A domain controller controlling the higher-layer | |||
GMPLS domain, in the context of multi-layer networks; | GMPLS domain, in the context of multi-layer networks | |||
- L-Controller(G): A domain controller controlling the lower-layer | L-Controller(G): A domain controller controlling the lower-layer | |||
GMPLS domain, in the context of multi-layer networks; | GMPLS domain, in the context of multi-layer networks | |||
- H-Controller(N): A domain controller controlling the higher-layer | H-Controller(N): A domain controller controlling the higher-layer | |||
non-GMPLS domain, in the context of multi-layer networks; | non-GMPLS domain, in the context of multi-layer networks | |||
- L-Controller(N): A domain controller controlling the lower-layer | L-Controller(N): A domain controller controlling the lower-layer | |||
non-GMPLS domain, in the context of multi-layer networks; | non-GMPLS domain, in the context of multi-layer networks | |||
- Orchestrator(MD): An orchestrator used to orchestrate the multi- | Orchestrator(MD): An orchestrator used to orchestrate the multi- | |||
domain networks; | domain networks | |||
- Orchestrator(ML): An orchestrator used to orchestrate the multi- | Orchestrator(ML): An orchestrator used to orchestrate the multi- | |||
layer networks. | layer networks | |||
4. Discovery Options | 4. Discovery Options | |||
In GMPLS control, the link connectivity must be verified between | In GMPLS control, the link connectivity must be verified between each | |||
each pair of nodes. In this way, link resources, which are | pair of nodes. In this way, link resources, which are fundamental | |||
fundamental resources in the network, are discovered by both ends of | resources in the network, are discovered by both ends of the link. | |||
the link. | ||||
4.1. LMP | 4.1. LMP | |||
Link management protocol (LMP) [RFC4204] runs between nodes and | The Link Management Protocol (LMP) [RFC4204] runs between nodes and | |||
manages TE links. In addition to the setup and maintenance of | manages TE links. In addition to the setup and maintenance of | |||
control channels, LMP can be used to verify the data link | control channels, LMP can be used to verify the data link | |||
connectivity and correlate the link properties. | connectivity and correlate the link properties. | |||
5. Routing Options | 5. Routing Options | |||
In GMPLS control, link state information is flooded within the | In GMPLS control, link state information is flooded within the | |||
network as defined in [RFC4202]. Each node in the network can build | network as defined in [RFC4202]. Each node in the network can build | |||
the network topology according to the flooded link state | the network topology according to the flooded link state information. | |||
information. Routing protocols such as OSPF-TE [RFC4203] and IS-IS- | Routing protocols such as OSPF-TE [RFC4203] and IS-IS-TE [RFC5307] | |||
TE [RFC5307] have been extended to support different interfaces in | have been extended to support different interfaces in GMPLS. | |||
GMPLS. | ||||
In a centralized controller system, the centralized controller can | In a centralized controller system, the centralized controller can be | |||
be placed in the GMPLS network and passively receives the IGP | placed in the GMPLS network and passively receives the IGP | |||
information flooded in the network. In this way, the centralized | information flooded in the network. In this way, the centralized | |||
controller can construct and update the network topology. | controller can construct and update the network topology. | |||
5.1. OSPF-TE | 5.1. OSPF-TE | |||
OSPF-TE is introduced for TE networks in [RFC3630]. OSPF extensions | OSPF-TE is introduced for TE networks in [RFC3630]. OSPF extensions | |||
have been defined in [RFC4203] to enable the capability of link | have been defined in [RFC4203] to enable the capability of link state | |||
state information for the GMPLS network. Based on this work, OSPF | information for the GMPLS network. Based on this work, OSPF has been | |||
has been extended to support technology-specific routing. The | extended to support technology-specific routing. The routing | |||
routing protocol for Optical Transport Network (OTN), Wavelength | protocols for the Optical Transport Network (OTN), Wavelength | |||
Switched Optical Network (WSON) and optical flexi-grid networks are | Switched Optical Network (WSON), and optical flexi-grid networks are | |||
defined in [RFC7138], [RFC7688] and [RFC8363], respectively. | defined in [RFC7138], [RFC7688], and [RFC8363], respectively. | |||
5.2. IS-IS-TE | 5.2. IS-IS-TE | |||
IS-IS-TE is introduced for TE networks in [RFC5305] and is extended | IS-IS-TE is introduced for TE networks in [RFC5305], is extended to | |||
to support GMPLS routing functions [RFC5307], and has been updated | support GMPLS routing functions [RFC5307], and has been updated | |||
to [RFC7074] to support the latest GMPLS switching capability and | [RFC7074] to support the latest GMPLS switching capability and Types | |||
Types fields. | fields. | |||
5.3. NETCONF/RESTCONF | 5.3. NETCONF/RESTCONF | |||
NETCONF [RFC6241] and RESTCONF [RFC8040] protocols are originally | NETCONF [RFC6241] and RESTCONF [RFC8040] protocols are originally | |||
used for network configuration. These protocols can also utilize | used for network configuration. These protocols can also utilize | |||
topology-related YANG models, such as [RFC8345] and [RFC8795]. These | topology-related YANG modules, such as those in [RFC8345] and | |||
protocols provide a powerful mechanism for notification (in addition | [RFC8795]. These protocols provide a powerful mechanism for the | |||
to provisioning and monitoring) of topology changes to the client. | notification (in addition to the provisioning and monitoring) of | |||
topology changes to the client. | ||||
6. Path Computation | 6. Path Computation | |||
6.1. Controller-based Path Computation | 6.1. Controller-Based Path Computation | |||
Once a controller learns the network topology, it can utilize the | Once a controller learns the network topology, it can utilize the | |||
available resources to serve service requests by performing path | available resources to serve service requests by performing path | |||
computation. Due to abstraction, the controllers may not have | computation. Due to abstraction, the controllers may not have | |||
sufficient information to compute the optimal path. In this case, | sufficient information to compute the optimal path. In this case, | |||
the controller can interact with other controllers by sending, for | the controller can interact with other controllers by sending, for | |||
example, YANG-based Path Computation requests [PAT-COMP] or PCEP, to | example, YANG-based path computation requests [PATH-COMP] or PCEP to | |||
compute a set of potential optimal paths and then, based on its | compute a set of potential optimal paths; and then, based on its | |||
constraints, policy, and specific knowledge (e.g. cost of access | constraints, policy, and specific knowledge (e.g., cost of access | |||
link) can choose the more feasible path for end-to-end (E2E) service | link), the controller can choose the more feasible path for end-to- | |||
path setup. | end (E2E) service path setup. | |||
Path computation is one of the key objectives in various types of | Path computation is one of the key objectives in various types of | |||
controllers. In the given architecture, it is possible for different | controllers. In the given architecture, it is possible for different | |||
components that have the capability to compute the path. | components that have the capability to compute the path. | |||
6.2. Constraint-based Path Computing in GMPLS Control | 6.2. Constraint-Based Path Computing in GMPLS Control | |||
In GMPLS control, a routing path may be computed by the ingress node | In GMPLS control, a routing path may be computed by the ingress node | |||
([RFC3473]) based on the ingress node Traffic Engineering Database | [RFC3473] based on the ingress node Traffic Engineering Database | |||
(TED). In this case, constraint-based path computation is performed | (TED). In this case, constraint-based path computation is performed | |||
according to the local policy of the ingress node. | according to the local policy of the ingress node. | |||
6.3. Path Computation Element (PCE) | 6.3. Path Computation Element (PCE) | |||
The PCE was first introduced in [RFC4655] as a functional component | The PCE was first introduced in [RFC4655] as a functional component | |||
that offers services for computing paths within a network. In | that offers services for computing paths within a network. In | |||
[RFC5440], path computation is achieved using the TED, which | [RFC5440], path computation is achieved using the TED, which | |||
maintains a view of the link resources in the network. The | maintains a view of the link resources in the network. The | |||
introduction of PCE has significantly improved the quality of | introduction of the PCE has significantly improved the quality of | |||
network planning and offline computation. However, there is a | network planning and offline computation. However, there is a | |||
potential risk that the computed path may be infeasible when there | potential risk that the computed path may be infeasible when there is | |||
is a diversity requirement, as stateless PCE lacks knowledge about | a diversity requirement, as a stateless PCE lacks knowledge about | |||
previously computed paths. | previously computed paths. | |||
To address this issue, stateful PCE has been proposed in [RFC8231]. | To address this issue, a stateful PCE has been proposed in [RFC8231]. | |||
Besides the TED, an additional LSP Database (LSP-DB) is introduced | Besides the TED, an additional LSP Database (LSP-DB) is introduced to | |||
to archive each LSP computed by the PCE. This way, PCE can easily | archive each LSP computed by the PCE. This way, the PCE can easily | |||
determine the relationship between the computing path and former | determine the relationship between the computing path and former | |||
computed paths. In this approach, PCE provides computed paths to | computed paths. In this approach, the PCE provides computed paths to | |||
PCC, and then PCC decides which path is deployed and when to be | the PCC, and then the PCC decides which path is deployed and when it | |||
established. | is to be established. | |||
With PCE-Initiated LSPs [RFC8281], PCE can trigger the PCC to | With PCE-initiated LSPs [RFC8281], the PCE can trigger the PCC to | |||
perform setup, maintenance, and teardown of the PCE-initiated LSP | perform setup, maintenance, and teardown of the PCE-initiated LSP | |||
under the stateful PCE model. This would allow a dynamic network | under the stateful PCE model. This would allow a dynamic network | |||
that is centrally controlled and deployed. | that is centrally controlled and deployed. | |||
In a centralized controller system, the PCE can be implemented | In a centralized controller system, the PCE can be implemented within | |||
within the centralized controller. The centralized controller then | the centralized controller. The centralized controller then | |||
calculates paths based on its local policies. Alternatively, the PCE | calculates paths based on its local policies. Alternatively, the PCE | |||
can be located outside of the centralized controller. In this | can be located outside of the centralized controller. In this | |||
scenario, the centralized controller functions as a PCC and sends a | scenario, the centralized controller functions as a PCC and sends a | |||
path computation request to the PCE using the PCEP. A reference | path computation request to the PCE using the PCEP. A reference | |||
architecture for this can be found in [RFC7491]. | architecture for this can be found in [RFC7491]. | |||
7. Signaling Options | 7. Signaling Options | |||
Signaling mechanisms are used to set up LSPs in GMPLS control. | Signaling mechanisms are used to set up LSPs in GMPLS control. | |||
Messages are sent hop by hop between the ingress node and the egress | Messages are sent hop by hop between the ingress node and the egress | |||
node of the LSP to allocate labels. Once the labels are allocated | node of the LSP to allocate labels. Once the labels are allocated | |||
along the path, the LSP setup is accomplished. Signaling protocols | along the path, the LSP setup is accomplished. Signaling protocols | |||
such as Resource Reservation Protocol - Traffic Engineering (RSVP- | such as Resource Reservation Protocol - Traffic Engineering (RSVP-TE) | |||
TE) [RFC3473] have been extended to support different interfaces in | [RFC3473] have been extended to support different interfaces in | |||
GMPLS. | GMPLS. | |||
7.1. RSVP-TE | 7.1. RSVP-TE | |||
RSVP-TE is introduced in [RFC3209] and extended to support GMPLS | RSVP-TE is introduced in [RFC3209] and extended to support GMPLS | |||
signaling in [RFC3473]. Several label formats are defined for a | signaling in [RFC3473]. Several label formats are defined for a | |||
generalized label request, a generalized label, a suggested label | generalized label request, a generalized label, a suggested label, | |||
and label sets. Based on [RFC3473], RSVP-TE has been extended to | and label sets. Based on [RFC3473], RSVP-TE has been extended to | |||
support technology-specific signaling. The RSVP-TE extensions for | support technology-specific signaling. The RSVP-TE extensions for | |||
OTN, WSON, and optical flexi-grid network are defined in [RFC7139], | the OTN, WSON, and optical flexi-grid network are defined in | |||
[RFC7689], and [RFC7792], respectively. | [RFC7139], [RFC7689], and [RFC7792], respectively. | |||
8. Interworking Scenarios | 8. Interworking Scenarios | |||
8.1. Topology Collection & Synchronization | 8.1. Topology Collection and Synchronization | |||
Topology information is necessary on both network elements and | Topology information is necessary on both network elements and | |||
controllers. The topology on a network element is usually raw | controllers. The topology on a network element is usually raw | |||
information, while the topology used by the controller can be either | information, while the topology used by the controller can be either | |||
raw, reduced, or abstracted. Three different abstraction methods | raw, reduced, or abstracted. Three different abstraction methods | |||
have been described in [RFC8453], and different controllers can | have been described in [RFC8453], and different controllers can | |||
select the corresponding method depending on the application. | select the corresponding method depending on the application. | |||
When there are changes in the network topology, the impacted network | When there are changes in the network topology, the impacted network | |||
elements need to report changes to all the other network elements, | elements need to report changes to all the other network elements, | |||
together with the controller, to sync up the topology information. | together with the controller, to sync up the topology information. | |||
The inter-NE synchronization can be achieved via protocols mentioned | The inter-NE synchronization can be achieved via protocols mentioned | |||
in Sections 4 and 5. The topology synchronization between NEs and | in Sections 4 and 5. The topology synchronization between NEs and | |||
controllers can either be achieved by routing protocols OSPF- | controllers can either be achieved by routing protocols OSPF-TE/PCEP- | |||
TE/PCEP-LS in [PCEP-LS] or NETCONF protocol notifications with YANG | LS in [PCEP-LS] or NETCONF protocol notifications with a YANG module. | |||
model. | ||||
8.2. Multi-domain Service Provisioning | 8.2. Multi-Domain Service Provisioning | |||
Service provisioning can be deployed based on the topology | Service provisioning can be deployed based on the topology | |||
information on controllers and network elements. Many methods have | information on controllers and network elements. Many methods have | |||
been specified for single-domain service provisioning, such as the | been specified for single-domain service provisioning, such as the | |||
PCEP and RSVP-TE methods. | PCEP and RSVP-TE methods. | |||
Multi-domain service provisioning would require coordination among | Multi-domain service provisioning would require coordination among | |||
the controller hierarchies. Given the service request, the end-to- | the controller hierarchies. Given the service request, the end-to- | |||
end delivery procedure may include interactions at any level (i.e. | end delivery procedure may include interactions at any level (i.e., | |||
interface) in the hierarchy of the controllers (e.g. MPI and SBI for | interface) in the hierarchy of the controllers (e.g., MPI and SBI for | |||
ACTN). The computation for a cross-domain path is usually completed | ACTN). The computation for a cross-domain path is usually completed | |||
by controllers who have a global view of the topologies. Then the | by controllers who have a global view of the topologies. Then the | |||
configuration is decomposed into lower-level controllers, to | configuration is decomposed into lower-level controllers to configure | |||
configure the network elements to set up the path. | the network elements to set up the path. | |||
A combination of centralized and distributed protocols may be | A combination of centralized and distributed protocols may be | |||
necessary to interact between network elements and controllers. | necessary to interact between network elements and controllers. | |||
Several methods can be used to create the inter-domain path: | Several methods can be used to create the inter-domain path: | |||
1) With end-to-end RSVP-TE session: | 1) With an end-to-end RSVP-TE session: | |||
In this method, all the domains need to support the RSVP-TE protocol | In this method, all the domains need to support the RSVP-TE | |||
and thus need to be GMPLS domains. The Controller(G) of the source | protocol and thus need to be GMPLS domains. The Controller(G) of | |||
domain triggers the source node to create the end-to-end RSVP-TE | the source domain triggers the source node to create the end-to- | |||
session, and the assignment and distribution of the labels on the | end RSVP-TE session; and the assignment and distribution of the | |||
inter-domain links are done by the border nodes of each domain, | labels on the inter-domain links are done by the border nodes of | |||
using RSVP-TE protocol. Therefore, this method requires the | each domain, using RSVP-TE protocol. Therefore, this method | |||
interworking of RSVP-TE protocols between different domains. | requires the interworking of RSVP-TE protocols between different | |||
domains. | ||||
There are two possible methods: | There are two possible methods: | |||
1.1) One single end-to-end RSVP-TE session | 1.1) One single end-to-end RSVP-TE session: | |||
In this method, an end-to-end RSVP-TE session from the source node | In this method, an end-to-end RSVP-TE session from the | |||
to the destination node will be used to create the inter-domain | source node to the destination node will be used to create | |||
path. A typical example would be the PCE Initiation scenario, in | the inter-domain path. A typical example would be the PCE | |||
which a PCE message (PCInitiate) is sent from the controller(G) to | initiation scenario, in which a PCE message (PCInitiate) is | |||
the source node, triggering an RSVP procedure along the path. | sent from the Controller(G) to the source node, triggering | |||
Similarly, the interaction between the controller and the source | an RSVP procedure along the path. Similarly, the | |||
node of the source domain can be achieved by using the NETCONF | interaction between the controller and the source node of | |||
protocol with corresponding YANG models, and then it can be | the source domain can be achieved by using the NETCONF | |||
completed by running RSVP among the network elements. | protocol with corresponding YANG modules, and then it can | |||
be completed by running RSVP among the network elements. | ||||
1.2) LSP Stitching | 1.2) LSP Stitching: | |||
The LSP stitching method defined in [RFC5150] can also create the | The LSP stitching method defined in [RFC5150] can also | |||
E2E LSP. I.e., when the source node receives an end-to-end path | create the E2E LSP. That is, when the source node receives | |||
creation request (e.g., using PCEP or NETCONF protocol), the source | an end-to-end path creation request (e.g., using PCEP or | |||
node starts an end-to-end RSVP-TE session along the endpoints of | NETCONF protocol), the source node starts an end-to-end | |||
each LSP segment (refers to S-LSP in [RFC5150]) of each domain, to | RSVP-TE session along the endpoints of each LSP segment | |||
assign the labels on the inter-domain links between each pair of | (S-LSP) (refers to S-LSP in [RFC5150]) of each domain, to | |||
neighbor S-LSPs, and stitch the end-to-end LSP to each S-LSP. See | assign the labels on the inter-domain links between each | |||
Figure 2 as an example. Note that the S-LSP in each domain can be | pair of neighbor S-LSPs and to stitch the end-to-end LSP to | |||
either created by its Controller(G) in advance, or created | each S-LSP. See Figure 2 as an example. | |||
dynamically triggered by the end-to-end RSVP-TE session. | ||||
+------------------------+ | Note that the S-LSP in each domain can be either created by | |||
| Orchestrator(MD) | | its Controller(G) in advance or created dynamically | |||
+-----------+------------+ | triggered by the end-to-end RSVP-TE session. | |||
| | ||||
+---------------+ +------V-------+ +---------------+ | ||||
| Controller(G) | | Controller(G)| | Controller(G) | | ||||
+-------+-------+ +------+-------+ +-------+-------+ | ||||
| | | | ||||
+--------V--------+ +-------V--------+ +--------V--------+ | ||||
|Client | | | | Client| | ||||
|Signal Domain 1| | Domain 2 | |Domain 3 Signal| | ||||
| | | | | | | | | ||||
|+-+-+ | | | | +-+-+| | ||||
|| | | +--+ +--+| |+--+ +--+ +--+| |+--+ +--+ | | || | ||||
|| | | | | | || || | | | | || || | | | | | || | ||||
|| ******************************************************** || | ||||
|| | | | | || || | | | | || || | | | | || | ||||
|+---+ +--+ +--+| |+--+ +--+ +--+| |+--+ +--+ +---+| | ||||
+-----------------+ +----------------+ +-----------------+ | ||||
| . . . . . . | | ||||
| .<-S-LSP 1->. .<- S-LSP 2 -->. .<-S-LSP 3->. | | ||||
| . . . . | | ||||
|-------------->.---->.------------->.---->.-------------->| | ||||
|<--------------.<----.<-------------.<----.<--------------| | ||||
| End-to-end RSVP-TE session for LSP stitching | | ||||
Figure 2: LSP stitching | +------------------------+ | |||
| Orchestrator(MD) | | ||||
+-----------+------------+ | ||||
| | ||||
+---------------+ +------V-------+ +---------------+ | ||||
| Controller(G) | | Controller(G)| | Controller(G) | | ||||
+-------+-------+ +------+-------+ +-------+-------+ | ||||
| | | | ||||
+--------V--------+ +-------V--------+ +--------V--------+ | ||||
|Client | | | | Client| | ||||
|Signal Domain 1| | Domain 2 | |Domain 3 Signal| | ||||
| | | | | | | | | ||||
|+-+-+ | | | | +-+-+| | ||||
|| | | +--+ +--+| |+--+ +--+ +--+| |+--+ +--+ | | || | ||||
|| | | | | | || || | | | | || || | | | | | || | ||||
|| ******************************************************** || | ||||
|| | | | | || || | | | | || || | | | | || | ||||
|+---+ +--+ +--+| |+--+ +--+ +--+| |+--+ +--+ +---+| | ||||
+-----------------+ +----------------+ +-----------------+ | ||||
| . . . . . . | | ||||
| .<-S-LSP 1->. .<- S-LSP 2 -->. .<-S-LSP 3->. | | ||||
| . . . . | | ||||
|-------------->.---->.------------->.---->.-------------->| | ||||
|<--------------.<----.<-------------.<----.<--------------| | ||||
| End-to-end RSVP-TE session for LSP stitching | | ||||
2) Without end-to-end RSVP-TE session: | Figure 2: LSP Stitching | |||
In this method, each domain can be a GMPLS domain or a non-GMPLS | 2) Without an end-to-end RSVP-TE session: | |||
domain. Each controller (may be a Controller(G) or a Controller(N)) | ||||
is responsible for creating the path segment within its domain. The | ||||
border node does not need to communicate with other border nodes in | ||||
other domains for the distribution of labels on inter-domain links, | ||||
so end-to-end RSVP-TE session through multiple domains is not | ||||
required, and the interworking of RSVP-TE protocol between different | ||||
domains is not needed. | ||||
Note that path segments in the source domain and the destination | In this method, each domain can be a GMPLS domain or a non-GMPLS | |||
domain are "asymmetrical" segments, because the configuration of | domain. Each controller (which may be a Controller(G) or a | |||
client signal mapping into server layer tunnel is needed at only one | Controller(N)) is responsible for creating the path segment | |||
end of the segment, while configuration of server layer cross- | within its domain. The border node does not need to communicate | |||
connect is needed at the other end of the segment. See the example | with other border nodes in other domains for the distribution of | |||
in Figure 3. | labels on inter-domain links, so an end-to-end RSVP-TE session | |||
through multiple domains is not required, and the interworking of | ||||
the RSVP-TE protocol between different domains is not needed. | ||||
+------------------------+ | Note that path segments in the source domain and the destination | |||
| Orchestrator(MD) | | domain are "asymmetrical" segments, because the configuration of | |||
+-----------+------------+ | client signal mapping into the server-layer tunnel is needed at | |||
| | only one end of the segment, while configuration of the server- | |||
+---------------+ +------V-------+ +---------------+ | layer cross-connect is needed at the other end of the segment. | |||
| Controller | | Controller | | Controller | | See the example in Figure 3. | |||
+-------+-------+ +------+-------+ +-------+-------+ | ||||
| | | | ||||
+--------V--------+ +-------V--------+ +--------V--------+ | ||||
|Client Domain 1| | Domain 2 | | Domain 3 Client| | ||||
|Signal | | | | Signal| | ||||
| | Server layer| | | | | | | ||||
| | tunnel | | | | | | | ||||
|+-+-+ ^ | | | | +-+-+| | ||||
|| | | +--+ |+--+| |+--+ +--+ +--+| |+--+ +--+ | | || | ||||
|| | | | | || || || | | | | || || | | | | | || | ||||
|| ******************************************************** || | ||||
|| | | | | || . || | | | | || . || | | | | || | ||||
|+---+ +--+ +--+| . |+--+ +--+ +--+| . |+--+ +--+ +---+| | ||||
+-----------------+ . +----------------+ . +-----------------+ | ||||
. . . . | ||||
.<-Path Segment 1->.<--Path Segment 2-->.<-Path Segment 3->. | ||||
Figure 3: Example of asymmetrical path segment | +------------------------+ | |||
| Orchestrator(MD) | | ||||
+-----------+------------+ | ||||
| | ||||
+---------------+ +------V-------+ +---------------+ | ||||
| Controller | | Controller | | Controller | | ||||
+-------+-------+ +------+-------+ +-------+-------+ | ||||
| | | | ||||
+--------V--------+ +-------V--------+ +--------V--------+ | ||||
|Client Domain 1| | Domain 2 | | Domain 3 Client| | ||||
|Signal | | | | Signal| | ||||
| | Server layer| | | | | | | ||||
| | tunnel | | | | | | | ||||
|+-+-+ ^ | | | | +-+-+| | ||||
|| | | +--+ |+--+| |+--+ +--+ +--+| |+--+ +--+ | | || | ||||
|| | | | | || || || | | | | || || | | | | | || | ||||
|| ******************************************************** || | ||||
|| | | | | || . || | | | | || . || | | | | || | ||||
|+---+ +--+ +--+| . |+--+ +--+ +--+| . |+--+ +--+ +---+| | ||||
+-----------------+ . +----------------+ . +-----------------+ | ||||
. . . . | ||||
.<-Path Segment 1->.<--Path Segment 2-->.<-Path Segment 3->. | ||||
The PCEP / GMPLS protocols should support the creation of such | Figure 3: Example of an Asymmetrical Path Segment | |||
asymmetrical segments. | ||||
Note also that mechanisms to assign the labels in the inter-domain | The PCEP / GMPLS protocols should support the creation of such | |||
links also need to be considered. There are two possible methods: | asymmetrical segments. | |||
2.1) Inter-domain labels assigned by NEs: | Note also that mechanisms to assign the labels in the inter- | |||
domain links also need to be considered. There are two possible | ||||
methods: | ||||
The concept of Stitching Label that allows stitching local path | 2.1) Inter-domain labels assigned by NEs: | |||
segments was introduced in [RFC5150] and [sPCE-ID], in order to form | ||||
the inter-domain path crossing several different domains. It also | ||||
describes the Backward-Recursive PCE-Based Computation (BRPC) | ||||
[RFC5441] and Hierarchical Path Computation Element (H-PCE) | ||||
[RFC8685] PCInitiate procedure, i.e., the ingress node of each | ||||
downstream domain assigns the stitching label for the inter-domain | ||||
link between the downstream domain and its upstream neighbor domain, | ||||
and this stitching label will be passed to the upstream neighbor | ||||
domain by PCE protocol, which will be used for the path segment | ||||
creation in the upstream neighbor domain. | ||||
2.2) Inter-domain labels assigned by controller: | The concept of a stitching label that allows stitching | |||
local path segments was introduced in [RFC5150] and | ||||
[SPCE-ID], in order to form the inter-domain path crossing | ||||
several different domains. It also describes the Backward | ||||
Recursive PCE-Based Computation (BRPC) [RFC5441] and | ||||
Hierarchical PCE (H-PCE) [RFC8685] PCInitiate procedure, | ||||
i.e., the ingress node of each downstream domain assigns | ||||
the stitching label for the inter-domain link between the | ||||
downstream domain and its upstream neighbor domain; and | ||||
this stitching label will be passed to the upstream | ||||
neighbor domain by PCE protocol, which will be used for the | ||||
path segment creation in the upstream neighbor domain. | ||||
If the resources of inter-domain links are managed by the | 2.2) Inter-domain labels assigned by the controller: | |||
orchestrator(MD), each domain controller can provide to the | ||||
orchestrator(MD) the list of available labels (e.g. timeslots if OTN | ||||
is the scenario) using the IETF Topology YANG model and related | ||||
technology specific extension. Once the orchestrator(MD) has | ||||
computed the E2E path, RSVP-TE or PCEP can be used in the different | ||||
domains to set up the related segment tunnel consisting of label | ||||
inter-domain information, e.g. for PCEP, the label Explicit Route | ||||
Object (ERO) can be included in the PCInitiate message to indicate | ||||
the inter-domain labels, so that each border node of each domain can | ||||
configure the correct cross-connect within itself. | ||||
8.3. Multi-layer Service Provisioning | If the resources of inter-domain links are managed by the | |||
Orchestrator(MD), each domain controller can provide to the | ||||
Orchestrator(MD) the list of available labels (e.g., time | ||||
slots, if the OTN is the scenario) using the IETF Topology | ||||
YANG module and a related technology-specific extension. | ||||
Once the Orchestrator(MD) has computed the E2E path, RSVP- | ||||
TE or PCEP can be used in the different domains to set up | ||||
the related segment tunnel consisting of label inter-domain | ||||
information; for example, for PCEP, the label Explicit | ||||
Route Object (ERO) can be included in the PCInitiate | ||||
message to indicate the inter-domain labels so that each | ||||
border node of each domain can configure the correct cross- | ||||
connect within itself. | ||||
8.3. Multi-Layer Service Provisioning | ||||
GMPLS can interwork with centralized controller systems in multi- | GMPLS can interwork with centralized controller systems in multi- | |||
layer networks. | layer networks. | |||
+----------------+ | +----------------+ | |||
|Orchestrator(ML)| | |Orchestrator(ML)| | |||
+------+--+------+ | +------+--+------+ | |||
| | Higher-layer Network | | | Higher-layer Network | |||
| | .--------------------. | | | .--------------------. | |||
| | / \ | | | / \ | |||
skipping to change at page 15, line 39 ¶ | skipping to change at line 749 ¶ | |||
| . . | | . . | |||
| .---.------------.---. | | .---.------------.---. | |||
| / . . \ | | / . . \ | |||
| +--------------+ | +--+ +--+ +--+ | | | +--------------+ | +--+ +--+ +--+ | | |||
+----->| L-Controller +----->| | ============== | | | +----->| L-Controller +----->| | ============== | | | |||
+--------------+ | +--+ +--+ +--+ | | +--------------+ | +--+ +--+ +--+ | | |||
\ H-LSP / | \ H-LSP / | |||
`-------------------` | `-------------------` | |||
Lower-layer Network | Lower-layer Network | |||
Figure 4: GMPLS-controller interworking in multi-layer networks | Figure 4: GMPLS-controller Interworking in Multi-Layer Networks | |||
An example with two layers of network is shown in Figure 4. In this | An example with two layers of network is shown in Figure 4. In this | |||
example, the GMPLS control plane is enabled in at least one layer | example, the GMPLS control plane is enabled in at least one layer | |||
network (otherwise, it is out of the scope of this document) and | network (otherwise, it is out of the scope of this document) and | |||
interworks with the controller of its domain (H-Controller and L- | interworks with the controller of its domain (H-Controller and | |||
Controller, respectively). The Orchestrator(ML) is used to | L-Controller, respectively). The Orchestrator(ML) is used to | |||
coordinate the control of the multi-layer network. | coordinate the control of the multi-layer network. | |||
8.3.1. Multi-layer Path Computation | 8.3.1. Multi-Layer Path Computation | |||
[RFC5623] describes three inter-layer path computation models and | [RFC5623] describes three inter-layer path computation models and | |||
four inter-layer path control models: | four inter-layer path control models: | |||
- 3 Path computation: | * 3 path computation models: | |||
o Single PCE path computation model | - Single PCE path computation model | |||
o Multiple PCE path computation with inter-PCE communication | - Multiple PCE path computation with inter-PCE communication | |||
model | model | |||
o Multiple PCE path computation without inter-PCE communication | - Multiple PCE path computation without inter-PCE communication | |||
model | model | |||
- 4 Path control: | * 4 path control models: | |||
o PCE-Virtual Network Topology Manager (PCE-VNTM) cooperation | - PCE Virtual Network Topology Manager (PCE-VNTM) cooperation | |||
model | model | |||
o Higher-layer signaling trigger model | - Higher-layer signaling trigger model | |||
o Network Management System-VNTM (NMS-VNTM) cooperation model | - Network Management System VNTM (NMS-VNTM) cooperation model | |||
(integrated flavor) | (integrated flavor) | |||
o NMS-VNTM cooperation model (separate flavor) | - NMS-VNTM cooperation model (separate flavor) | |||
Section 4.2.4 of [RFC5623] also provides all the possible | Section 4.2.4 of [RFC5623] also provides all the possible | |||
combinations of inter-layer path computation and inter-layer path | combinations of inter-layer path computation and inter-layer path | |||
control models. | control models. | |||
To apply [RFC5623] in multi-layer network with GMPLS-controller | To apply [RFC5623] in a multi-layer network with GMPLS-controller | |||
interworking, the H-Controller and the L-Controller can act as the | interworking, the H-Controller and the L-Controller can act as the | |||
PCE Hi and PCE Lo respectively, and typically, the Orchestrator(ML) | PCE Hi and PCE Lo, respectively; and typically, the Orchestrator(ML) | |||
can act as a VNTM because it has the abstracted view of both the | can act as a VNTM because it has the abstracted view of both the | |||
higher-layer and lower-layer networks. | higher-layer and lower-layer networks. | |||
Table 1 shows all possible combinations of path computation and path | Table 1 shows all possible combinations of path computation and path | |||
control models in multi-layer network with GMPLS-controller | control models in multi-layer network with GMPLS-controller | |||
interworking: | interworking: | |||
Table 1: Combinations of path computation and path control models | +=====================+=================+===========+===========+ | |||
| Path computation / | Single PCE (Not | Multiple | Multiple | | ||||
| Path control | applicable) | PCE with | PCE w/o | | ||||
| | | inter-PCE | inter-PCE | | ||||
+=====================+=================+===========+===========+ | ||||
| PCE-VNTM | N/A | Yes | Yes | | ||||
| cooperation | | | | | ||||
+---------------------+-----------------+-----------+-----------+ | ||||
| Higher-layer | N/A | Yes | Yes | | ||||
| signaling trigger | | | | | ||||
+---------------------+-----------------+-----------+-----------+ | ||||
| NMS-VNTM | N/A | Yes (1) | No (1) | | ||||
| cooperation | | | | | ||||
| (integrated flavor) | | | | | ||||
+---------------------+-----------------+-----------+-----------+ | ||||
| NMS-VNTM | N/A | No (1) | Yes (1) | | ||||
| cooperation | | | | | ||||
| (separate flavor) | | | | | ||||
+---------------------+-----------------+-----------+-----------+ | ||||
--------------------------------------------------------- | Table 1: Combinations of Path Computation and Path Control Models | |||
| Path computation |Single PCE | Multiple | Multiple | | ||||
| \ | (Not | PCE with | PCE w/o | | ||||
| Path control |applicable)| inter-PCE | inter-PCE | | ||||
|---------------------+-----------+-----------+-----------| | ||||
| PCE-VNTM | ...... | | | | ||||
| cooperation | . -- . | Yes | Yes | | ||||
| | . . | | | | ||||
|---------------------+--.----.---+-----------+-----------| | ||||
| Higher-layer | . . | | | | ||||
| signaling trigger | . -- . | Yes | Yes | | ||||
| | . . | | | | ||||
|---------------------+--.----.---+-----------+-----------| | ||||
| NMS-VNTM | . . | .........|....... | | ||||
| cooperation | . -- . | .Yes | No . | | ||||
| (integrated flavor) | . . | . | . | | ||||
|---------------------+--.----.---+--.--------+------.----| | ||||
| NMS-VNTM | . . | . | . | | ||||
| cooperation | . -- . | .No | Yes. | | ||||
| (separate flavor) | ...... | .........|....... | | ||||
---------------------+----|------+--------|--+----------- | ||||
V V | ||||
Not applicable because Typical models to be used | ||||
there are multiple PCEs | ||||
Note that: | Note that: | |||
- Since there is one PCE in each layer network, the path computation | * Since there is one PCE in each layer network, the path computation | |||
model "Single PCE path computation" is not applicable. | model "Single PCE path computation" is not applicable (N/A). | |||
- For the other two path computation models "Multiple PCE with | * For the other two path computation models "Multiple PCE with | |||
inter-PCE" and "Multiple PCE w/o inter-PCE", the possible | inter-PCE" and "Multiple PCE w/o inter-PCE", the possible | |||
combinations are the same as defined in [RFC5623]. More | combinations are the same as defined in [RFC5623]. More | |||
specifically: | specifically: | |||
o The path control models "NMS-VNTM cooperation (integrated | - (1) The path control models "NMS-VNTM cooperation (integrated | |||
flavor)" and "NMS-VNTM cooperation (separate flavor)" are the | flavor)" and "NMS-VNTM cooperation (separate flavor)" are the | |||
typical models to be used in multi-layer network with GMPLS- | typical models to be used in a multi-layer network with GMPLS- | |||
controller interworking. This is because in these two models, | controller interworking. This is because, in these two models, | |||
the path computation is triggered by the NMS or VNTM. And in | the path computation is triggered by the NMS or VNTM. And in | |||
the centralized controller system, the path computation | the centralized controller system, the path computation | |||
requests are typically from the Orchestrator(ML) (acts as | requests are typically from the Orchestrator(ML) (acts as | |||
VNTM). | VNTM). | |||
o For the other two path control models "PCE-VNTM cooperation" | - For the other two path control models "PCE-VNTM cooperation" | |||
and "Higher-layer signaling trigger", the path computation is | and "Higher-layer signaling trigger", the path computation is | |||
triggered by the NEs, i.e., NE performs PCC functions. These | triggered by the NEs, i.e., the NE performs PCC functions. | |||
two models are still possible to be used, although they are not | These two models are still possible to be used, although they | |||
the main methods. | are not the main methods. | |||
8.3.2. Cross-layer Path Creation | 8.3.2. Cross-Layer Path Creation | |||
In a multi-layer network, a lower-layer LSP in the lower-layer | In a multi-layer network, a lower-layer LSP in the lower-layer | |||
network can be created, which will construct a new link in the | network can be created, which will construct a new link in the | |||
higher-layer network. Such lower-layer LSP is called Hierarchical | higher-layer network. Such a lower-layer LSP is called Hierarchical | |||
LSP, or H-LSP for short, see [RFC6107]. | LSP, or H-LSP for short; see [RFC6107]. | |||
The new link constructed by the H-LSP can then be used by the | The new link constructed by the H-LSP can then be used by the higher- | |||
higher-layer network to create new LSPs. | layer network to create new LSPs. | |||
As described in [RFC5212], two methods are introduced to create the | As described in [RFC5212], two methods are introduced to create the | |||
H-LSP: the static (pre-provisioned) method and the dynamic | H-LSP: the static (pre-provisioned) method and the dynamic | |||
(triggered) method. | (triggered) method. | |||
1) Static (pre-provisioned) method | 1) Static (pre-provisioned) method: | |||
In this method, the H-LSP in the lower-layer network is created in | In this method, the H-LSP in the lower-layer network is created | |||
advance. After that, the higher-layer network can create LSPs using | in advance. After that, the higher-layer network can create LSPs | |||
the resource of the link constructed by the H-LSP. | using the resource of the link constructed by the H-LSP. | |||
The Orchestrator(ML) is responsible to decide the creation of H-LSP | The Orchestrator(ML) is responsible to decide the creation of | |||
in the lower-layer network if it acts as a VNTM. It then requests | H-LSP in the lower-layer network if it acts as a VNTM. Then it | |||
the L-Controller to create the H-LSP via, for example, MPI interface | requests the L-Controller to create the H-LSP via, for example, | |||
under the ACTN architecture. See Section 3.3.2 of [TE-Tunnel]. | an MPI interface under the ACTN architecture. See Section 3.3.2 | |||
of [YANG-TE]. | ||||
If the lower-layer network is a GMPLS domain, the L-Controller(G) | If the lower-layer network is a GMPLS domain, the L-Controller(G) | |||
can trigger the GMPLS control plane to create the H-LSP. As a | can trigger the GMPLS control plane to create the H-LSP. As a | |||
typical example, the PCInitiate message can be used for the | typical example, the PCInitiate message can be used for the | |||
communication between the L-Controller and the source node of the H- | communication between the L-Controller and the source node of the | |||
LSP. And the source node of the H-LSP can trigger the RSVP-TE | H-LSP. And the source node of the H-LSP can trigger the RSVP-TE | |||
signaling procedure to create the H-LSP, as described in [RFC6107]. | signaling procedure to create the H-LSP, as described in | |||
[RFC6107]. | ||||
If the lower-layer network is a non-GMPLS domain, other methods may | If the lower-layer network is a non-GMPLS domain, other methods | |||
be used by the L-Controller(N) to create the H-LSP, which is out of | may be used by the L-Controller(N) to create the H-LSP, which is | |||
scope of this document. | out of scope of this document. | |||
2) Dynamic (triggered) method | 2) Dynamic (triggered) method: | |||
In this method, the signaling of LSP creation in the higher-layer | In this method, the signaling of LSP creation in the higher-layer | |||
network will trigger the creation of H-LSP in the lower-layer | network will trigger the creation of H-LSP in the lower-layer | |||
network dynamically, if it is necessary. Therefore, both the higher- | network dynamically, if it is necessary. Therefore, both the | |||
layer and lower-layer networks need to support the RSVP-TE protocol | higher-layer and lower-layer networks need to support the RSVP-TE | |||
and thus need to be GMPLS domains. | protocol and thus need to be GMPLS domains. | |||
In this case, after the cross-layer path is computed, the | In this case, after the cross-layer path is computed, the | |||
Orchestrator(ML) requests the H-Controller(G) for the cross-layer | Orchestrator(ML) requests the H-Controller(G) for the cross-layer | |||
LSP creation. As a typical example, the MPI interface under the ACTN | LSP creation. As a typical example, the MPI interface under the | |||
architecture could be used. | ACTN architecture could be used. | |||
The H-Controller(G) can trigger the GMPLS control plane to create | The H-Controller(G) can trigger the GMPLS control plane to create | |||
the LSP in the higher-layer network. As a typical example, the | the LSP in the higher-layer network. As a typical example, the | |||
PCInitiate message can be used for the communication between the H- | PCInitiate message can be used for the communication between the | |||
Controller(G) and the source node of the Higher-layer LSP, as | H-Controller(G) and the source node of the higher-layer LSP, as | |||
described in Section 4.3 of [RFC8282]. At least two sets of ERO | described in Section 4.3 of [RFC8282]. At least two sets of ERO | |||
information should be included to indicate the routes of higher- | information should be included to indicate the routes of higher- | |||
layer LSP and lower-layer H-LSP. | layer LSP and lower-layer H-LSP. | |||
The source node of the Higher-layer LSP follows the procedure | The source node of the higher-layer LSP follows the procedure | |||
defined in Section 4 of [RFC6001], to trigger the GMPLS control | defined in Section 4 of [RFC6001] to trigger the GMPLS control | |||
plane in both higher-layer network and lower-layer network to create | plane in both the higher-layer network and the lower-layer | |||
the higher-layer LSP and the lower-layer H-LSP. | network to create the higher-layer LSP and the lower-layer H-LSP. | |||
On success, the source node of the H-LSP should report the | On success, the source node of the H-LSP should report the | |||
information of the H-LSP to the L-Controller(G) via, for example, | information of the H-LSP to the L-Controller(G) via, for example, | |||
PCRpt message. | the PCRpt message. | |||
8.3.3. Link Discovery | 8.3.3. Link Discovery | |||
If the higher-layer network and the lower-layer network are under | If the higher-layer network and the lower-layer network are under the | |||
the same GMPLS control plane instance, the H-LSP can be a Forwarding | same GMPLS control plane instance, the H-LSP can be a Forwarding | |||
Adjacency LSP (FA-LSP). Then the information of the link constructed | Adjacency LSP (FA-LSP). Then the information of the link constructed | |||
by this FA-LSP, called Forwarding Adjacency (FA), can be advertised | by this FA-LSP can be advertised in the routing instance, so that the | |||
in the routing instance, so that the H-Controller can be aware of | H-Controller can be aware of this new FA. [RFC4206] and the | |||
this new FA. [RFC4206] and the following updates to it (including | following updates to it (including [RFC6001] and [RFC6107]) describe | |||
[RFC6001] and [RFC6107]) describe the detailed extensions to support | the detailed extensions to support advertisement of an FA. | |||
advertisement of an FA. | ||||
If the higher-layer network and the lower-layer network are under | If the higher-layer network and the lower-layer network are under | |||
separate GMPLS control plane instances, or one of the layer networks | separate GMPLS control plane instances or if one of the layer | |||
is a non-GMPLS domain, after an H-LSP is created in the lower-layer | networks is a non-GMPLS domain, after an H-LSP is created in the | |||
network, the link discovery procedure will be triggered in the | lower-layer network, the link discovery procedure will be triggered | |||
higher-layer network to discover the information of the link | in the higher-layer network to discover the information of the link | |||
constructed by the H-LSP. LMP protocol defined in [RFC4204] can be | constructed by the H-LSP. The LMP protocol defined in [RFC4204] can | |||
used if the higher-layer network supports GMPLS. The information of | be used if the higher-layer network supports GMPLS. The information | |||
this new link will be advertised to the H-Controller. | of this new link will be advertised to the H-Controller. | |||
8.4. Recovery | 8.4. Recovery | |||
The GMPLS recovery functions are described in [RFC4426]. Span | The GMPLS recovery functions are described in [RFC4426]. Span | |||
protection, end-to-end protection and restoration, are discussed | protection and end-to-end protection and restoration are discussed | |||
with different protection schemes and message exchange requirements. | with different protection schemes and message exchange requirements. | |||
Related RSVP-TE extensions to support end-to-end recovery is | Related RSVP-TE extensions to support end-to-end recovery are | |||
described in [RFC4872]. The extensions in [RFC4872] include | described in [RFC4872]. The extensions in [RFC4872] include | |||
protection, restoration, preemption, and rerouting mechanisms for an | protection, restoration, preemption, and rerouting mechanisms for an | |||
end-to-end LSP. Besides end-to-end recovery, a GMPLS segment | end-to-end LSP. Besides end-to-end recovery, a GMPLS segment | |||
recovery mechanism is defined in [RFC4873], which also intends to be | recovery mechanism is defined in [RFC4873], which also intends to be | |||
compatible with Fast Reroute (FRR) (see [RFC4090] which defines | compatible with Fast Reroute (FRR) (see [RFC4090], which defines | |||
RSVP-TE extensions for the FRR mechanism, and [RFC8271] which | RSVP-TE extensions for the FRR mechanism, and [RFC8271], which | |||
described the updates of GMPLS RSVP-TE protocol for FRR of GMPLS TE- | describes the updates of the GMPLS RSVP-TE protocol for FRR of GMPLS | |||
LSPs). | TE-LSPs). | |||
8.4.1. Span Protection | 8.4.1. Span Protection | |||
Span protection refers to the protection of the link between two | Span protection refers to the protection of the link between two | |||
neighboring switches. The main protocol requirements include: | neighboring switches. The main protocol requirements include: | |||
- Link management: Link property correlation on the link protection | * Link management: Link property correlation on the link protection | |||
type; | type | |||
- Routing: announcement of the link protection type; | * Routing: Announcement of the link protection type | |||
- Signaling: indication of link protection requirement for that LSP. | * Signaling: Indication of link protection requirement for that LSP | |||
GMPLS already supports the above requirements, and there are no new | GMPLS already supports the above requirements, and there are no new | |||
requirements in the scenario of interworking between GMPLS and | requirements in the scenario of interworking between GMPLS and a | |||
centralized controller system. | centralized controller system. | |||
8.4.2. LSP Protection | 8.4.2. LSP Protection | |||
The LSP protection includes end-to-end and segment LSP protection. | The LSP protection includes end-to-end and segment LSP protection. | |||
For both cases: | For both cases: | |||
- In the provisioning phase: | * In the provisioning phase: | |||
In both single-domain and multi-domain scenarios, the disjoint | In both single-domain and multi-domain scenarios, the disjoint | |||
path computation can be done by the centralized controller system, | path computation can be done by the centralized controller system, | |||
as it has the global topology and resource view. And the path | as it has the global topology and resource view. And the path | |||
creation can be done by the procedure described in Section 8.2. | creation can be done by the procedure described in Section 8.2. | |||
- In the protection switchover phase: | * In the protection switchover phase: | |||
In both single-domain and multi-domain scenarios, the existing | In both single-domain and multi-domain scenarios, the existing | |||
standards provide the distributed way to trigger the protection | standards provide the distributed way to trigger the protection | |||
switchover. For example, data plane Automatic Protection Switching | switchover, for example, the data plane Automatic Protection | |||
(APS) mechanism described in [G.808.1], [RFC7271] and [RFC8234], | Switching (APS) mechanism described in [G.808.1], [RFC7271], and | |||
or GMPLS Notify mechanism described in [RFC4872] and [RFC4873]. In | [RFC8234] or the GMPLS Notify mechanism described in [RFC4872] and | |||
the scenario of interworking between GMPLS and centralized | [RFC4873]. In the scenario of interworking between GMPLS and a | |||
controller system, using these distributed mechanisms rather than | centralized controller system, using these distributed mechanisms | |||
centralized mechanism (i.e., the controller triggers the | rather than a centralized mechanism (i.e., the controller triggers | |||
protection switchover) can significantly shorten the protection | the protection switchover) can significantly shorten the | |||
switching time. | protection switching time. | |||
8.4.3. Single-domain LSP Restoration | 8.4.3. Single-Domain LSP Restoration | |||
- Pre-planned LSP protection (including shared-mesh restoration): | * Pre-planned LSP protection (including shared-mesh restoration): | |||
In pre-planned protection, the protecting LSP is established only | In pre-planned protection, the protecting LSP is established only | |||
in the control plane in the provisioning phase, and will be | in the control plane in the provisioning phase and will be | |||
activated in the data plane once failure occurs. | activated in the data plane once failure occurs. | |||
In the scenario of interworking between GMPLS and centralized | In the scenario of interworking between GMPLS and a centralized | |||
controller system, the route of protecting LSP can be computed by | controller system, the route of protecting LSP can be computed by | |||
the centralized controller system. This takes the advantage of | the centralized controller system. This takes the advantage of | |||
making better use of network resource, especially for the resource | making better use of network resources, especially for the | |||
sharing in shared-mesh restoration. | resource-sharing in shared-mesh restoration. | |||
- Full LSP rerouting: | * Full LSP rerouting: | |||
In full LSP rerouting, the normal traffic will be switched to an | In full LSP rerouting, the normal traffic will be switched to an | |||
alternate LSP that is fully established only after failure | alternate LSP that is fully established only after a failure | |||
occurrence. | occurrence. | |||
As described in [RFC4872] and [RFC4873], the alternate route can | As described in [RFC4872] and [RFC4873], the alternate route can | |||
be computed on demand when failure occurrence, or pre-computed and | be computed on demand when there is a failure occurrence or can be | |||
stored before failure occurrence. | pre-computed and stored before a failure occurrence. | |||
In a fully distributed scenario, the pre-computation method offers | In a fully distributed scenario, the pre-computation method offers | |||
faster restoration time, but has the risk that the pre-computed | a faster restoration time but has the risk that the pre-computed | |||
alternate route may become out of date due to the changes of the | alternate route may become out-of-date due to the changes of the | |||
network. | network. | |||
In the scenario of interworking between GMPLS and centralized | In the scenario of interworking between GMPLS and a centralized | |||
controller system, the pre-computation of the alternate route | controller system, the pre-computation of the alternate route | |||
could take place in the centralized controller (and may be stored | could take place in the centralized controller (and may be stored | |||
in the controller or the head-end node of the LSP). In this way, | in the controller or the head-end node of the LSP). In this way, | |||
any changes in the network can trigger the refreshment of the | any changes in the network can trigger the refreshment of the | |||
alternate route by the centralized controller. This makes sure | alternate route by the centralized controller. This makes sure | |||
that the alternate route will not become out of date. | that the alternate route will not become out-of-date. | |||
8.4.4. Multi-domain LSP Restoration | 8.4.4. Multi-Domain LSP Restoration | |||
A working LSP may traverse multiple domains, each of which may or | A working LSP may traverse multiple domains, each of which may or may | |||
may not support GMPLS distributed control plane. | not support a GMPLS distributed control plane. | |||
If all the domains support GMPLS, both the end-to-end rerouting | If all the domains support GMPLS, both the end-to-end rerouting | |||
method and the domain segment rerouting method could be used. | method and the domain segment rerouting method could be used. | |||
If only some domains support GMPLS, the domain segment rerouting | If only some domains support GMPLS, the domain segment rerouting | |||
method could be used in those GMPLS domains. For other domains which | method could be used in those GMPLS domains. For other domains that | |||
do not support GMPLS, other mechanisms may be used to protect the | do not support GMPLS, other mechanisms may be used to protect the LSP | |||
LSP segments, which are out of scope of this document. | segments, which are out of scope of this document. | |||
1) End-to-end rerouting: | 1) End-to-end rerouting: | |||
In this scenario, a failure on the working LSP inside any domain or | In this scenario, a failure on the working LSP inside any domain | |||
on the inter-domain links will trigger the end-to-end restoration. | or on the inter-domain links will trigger the end-to-end | |||
restoration. | ||||
In both pre-planned and full LSP rerouting, the end-to-end | In both pre-planned and full LSP rerouting, the end-to-end | |||
protecting LSP could be computed by the centralized controller | protecting LSP could be computed by the centralized controller | |||
system, and could be created by the procedure described in Section | system and could be created by the procedure described in | |||
8.2. Note that the end-to-end protecting LSP may traverse different | Section 8.2. Note that the end-to-end protecting LSP may | |||
domains from the working LSP, depending on the result of multi- | traverse different domains from the working LSP, depending on the | |||
domain path computation for the protecting LSP. | result of multi-domain path computation for the protecting LSP. | |||
+----------------+ | +----------------+ | |||
|Orchestrator(MD)| | |Orchestrator(MD)| | |||
+-------.--------+ | +-------.--------+ | |||
............................................ | ............................................ | |||
. . . . | . . . . | |||
+----V-----+ +----V-----+ +----V-----+ +----V-----+ | +----V-----+ +----V-----+ +----V-----+ +----V-----+ | |||
|Controller| |Controller| |Controller| |Controller| | |Controller| |Controller| |Controller| |Controller| | |||
| (G) 1 | | (G) 2 | | (G) 3 | | (G) 4 | | | (G) 1 | | (G) 2 | | (G) 3 | | (G) 4 | | |||
+----.-----+ +-------.--+ +-------.--+ +----.-----+ | +----.-----+ +-------.--+ +-------.--+ +----.-----+ | |||
. . . . | . . . . | |||
+----V--------+ +-V-----------+ . +-------V-----+ | +----V--------+ +-V-----------+ . +-------V-----+ | |||
| Domain 1 | | Domain 2 | . | Domain 4 | | | Domain 1 | | Domain 2 | . | Domain 4 | | |||
|+---+ +---+| |+---+ +---+| . |+---+ +---+| | |+---+ +---+| |+---+ +---+| . |+---+ +---+| | |||
|| ===/~/======/~~~/================================ || | || ===/~/======/~~~/================================ || | |||
|+-*-+ +---+| |+---+ +---+| . |+---+ +-*-+| | |+-*-+ +---+| |+---+ +---+| . |+---+ +-*-+| | |||
| * | +-------------+ . | * | | | * | +-------------+ . | * | | |||
| * | . | * | | | * | . | * | | |||
| * | +-------------+ . | * | | | * | +-------------+ . | * | | |||
| * | | Domain 3 <... | * | | | * | | Domain 3 <... | * | | |||
|+-*-+ +---+| |+---+ +---+| |+---+ +-*-+| | |+-*-+ +---+| |+---+ +---+| |+---+ +-*-+| | |||
|| ************************************************* || | || ************************************************* || | |||
|+---+ +---+| |+---+ +---+| |+---+ +---+| | |+---+ +---+| |+---+ +---+| |+---+ +---+| | |||
+-------------+ +-------------+ +-------------+ | +-------------+ +-------------+ +-------------+ | |||
====: Working LSP ****: Protecting LSP /~/: Failure | ====: Working LSP ****: Protecting LSP /~/: Failure | |||
Figure 5: End-to-end restoration | Figure 5: End-to-End Restoration | |||
2) Domain segment rerouting: | 2) Domain segment rerouting: | |||
2.1) Intra-domain rerouting: | 2.1) Intra-domain rerouting: | |||
If failure occurs on the working LSP segment in a GMPLS domain, the | If failure occurs on the working LSP segment in a GMPLS | |||
segment rerouting ([RFC4873]) could be used for the working LSP | domain, the segment rerouting [RFC4873] could be used for | |||
segment in that GMPLS domain. Figure 6 shows an example of intra- | the working LSP segment in that GMPLS domain. Figure 6 | |||
domain rerouting. | shows an example of intra-domain rerouting. | |||
The intra-domain rerouting of a non-GMPLS domain is out of scope of | The intra-domain rerouting of a non-GMPLS domain is out of | |||
this document. | scope of this document. | |||
+----------------+ | +----------------+ | |||
|Orchestrator(MD)| | |Orchestrator(MD)| | |||
+-------.--------+ | +-------.--------+ | |||
............................................ | ............................................ | |||
. . . . | . . . . | |||
+----V-----+ +----V-----+ +----V-----+ +----V-----+ | +----V-----+ +----V-----+ +----V-----+ +----V-----+ | |||
|Controller| |Controller| |Controller| |Controller| | |Controller| |Controller| |Controller| |Controller| | |||
| (G) 1 | |(G)/(N) 2 | |(G)/(N) 3 | |(G)/(N) 4 | | | (G) 1 | |(G)/(N) 2 | |(G)/(N) 3 | |(G)/(N) 4 | | |||
+----.-----+ +-------.--+ +-------.--+ +----.-----+ | +----.-----+ +-------.--+ +-------.--+ +----.-----+ | |||
. . . . | . . . . | |||
+----V--------+ +-V-----------+ . +-------V-----+ | +----V--------+ +-V-----------+ . +-------V-----+ | |||
| Domain 1 | | Domain 2 | . | Domain 4 | | | Domain 1 | | Domain 2 | . | Domain 4 | | |||
|+---+ +---+| |+---+ +---+| . |+---+ +---+| | |+---+ +---+| |+---+ +---+| . |+---+ +---+| | |||
|| ===/~/=========================================== || | || ===/~/=========================================== || | |||
|+-*-+ +-*-+| |+---+ +---+| . |+---+ +---+| | |+-*-+ +-*-+| |+---+ +---+| . |+---+ +---+| | |||
| * * | +-------------+ . | | | | * * | +-------------+ . | | | |||
| * * | . | | | | * * | . | | | |||
| * * | +-------------+ . | | | | * * | +-------------+ . | | | |||
| * * | | Domain 3 <... | | | | * * | | Domain 3 <... | | | |||
|+-*-+ +-*-+| |+---+ +---+| |+---+ +---+| | |+-*-+ +-*-+| |+---+ +---+| |+---+ +---+| | |||
|| ********* || || | | || || | | || | || ********* || || | | || || | | || | |||
|+---+ +---+| |+---+ +---+| |+---+ +---+| | |+---+ +---+| |+---+ +---+| |+---+ +---+| | |||
+-------------+ +-------------+ +-------------+ | +-------------+ +-------------+ +-------------+ | |||
====: Working LSP ****: Rerouting LSP segment /~/: Failure | ====: Working LSP ****: Rerouting LSP segment /~/: Failure | |||
Figure 6: Intra-domain segment rerouting | Figure 6: Intra-Domain Segment Rerouting | |||
2.2) Inter-domain rerouting: | 2.2) Inter-domain rerouting: | |||
If intra-domain segment rerouting failed (e.g., due to lack of | If intra-domain segment rerouting failed (e.g., due to lack | |||
resource in that domain), or if failure occurs on the working LSP on | of resource in that domain), or if failure occurs on the | |||
an inter-domain link, the centralized controller system may | working LSP on an inter-domain link, the centralized | |||
coordinate with other domain(s), to find an alternative path or path | controller system may coordinate with other domain(s) to | |||
segment to bypass the failure, and then trigger the inter-domain | find an alternative path or path segment to bypass the | |||
rerouting procedure. Note that the rerouting path or path segment | failure and then trigger the inter-domain rerouting | |||
may traverse different domains from the working LSP. | procedure. Note that the rerouting path or path segment | |||
may traverse different domains from the working LSP. | ||||
The domains involved in the inter-domain rerouting procedure need to | The domains involved in the inter-domain rerouting | |||
be GMPLS domains, which support the RSVP-TE signaling for the | procedure need to be GMPLS domains, which support the RSVP- | |||
creation of rerouting LSP segment. | TE signaling for the creation of a rerouting LSP segment. | |||
For inter-domain rerouting, the interaction between GMPLS and | For inter-domain rerouting, the interaction between GMPLS | |||
centralized controller system is needed: | and a centralized controller system is needed: | |||
- Report of the result of intra-domain segment rerouting to its | * A report of the result of intra-domain segment rerouting | |||
Controller(G), and then to the Orchestrator(MD). The former one | to its Controller(G) and then to the Orchestrator(MD). | |||
could be supported by the PCRpt message in [RFC8231], while the | The former could be supported by the PCRpt message in | |||
latter one could be supported by the MPI interface of ACTN. | [RFC8231], while the latter could be supported by the | |||
MPI interface of ACTN. | ||||
- Report of inter-domain link failure to the two Controllers (e.g., | * A report of inter-domain link failure to the two | |||
Controller(G) 1 and Controller(G) 2 in Figure 7) by which the two | Controllers (e.g., Controller(G) 1 and Controller(G) 2 | |||
ends of the inter-domain link are controlled respectively, and | in Figure 7) by which the two ends of the inter-domain | |||
then to the Orchestrator(MD). The former one could be done as | link are controlled, respectively, and then to the | |||
described in Section 8.1 of this document, while the latter one | Orchestrator(MD). The former could be done as described | |||
could be supported by the MPI interface of ACTN. | in Section 8.1, while the latter could be supported by | |||
the MPI interface of ACTN. | ||||
- Computation of rerouting path or path segment crossing multi- | * The computation of a rerouting path or path segment | |||
domains by the centralized controller system (see [PAT-COMP]); | crossing multi-domains by the centralized controller | |||
system (see [PATH-COMP]); | ||||
- Creation of rerouting LSP segment in each related domain. The | * The creation of a rerouting LSP segment in each related | |||
Orchestrator(MD) can send the LSP segment rerouting request to the | domain. The Orchestrator(MD) can send the LSP segment | |||
source Controller(G) (e.g., Controller(G) 1 in Figure 7) via MPI | rerouting request to the source Controller(G) (e.g., | |||
interface, and then the Controller(G) can trigger the creation of | Controller(G) 1 in Figure 7) via MPI interface, and then | |||
rerouting LSP segment through multiple GMPLS domains using GMPLS | the Controller(G) can trigger the creation of a | |||
rerouting signaling. Note that the rerouting LSP segment may | rerouting LSP segment through multiple GMPLS domains | |||
traverse a new domain which the working LSP does not traverse | using GMPLS rerouting signaling. Note that the | |||
(e.g., Domain 3 in Figure 7). | rerouting LSP segment may traverse a new domain that the | |||
working LSP does not traverse (e.g., Domain 3 in | ||||
Figure 7). | ||||
+----------------+ | +----------------+ | |||
|Orchestrator(MD)| | |Orchestrator(MD)| | |||
+-------.--------+ | +-------.--------+ | |||
.................................................. | .................................................. | |||
. . . . | . . . . | |||
+-----V------+ +-----V------+ +-----V------+ +-----V------+ | +-----V------+ +-----V------+ +-----V------+ +-----V------+ | |||
| Controller | | Controller | | Controller | | Controller | | | Controller | | Controller | | Controller | | Controller | | |||
| (G) 1 | | (G) 2 | | (G) 3 | | (G)/(N) 4 | | | (G) 1 | | (G) 2 | | (G) 3 | | (G)/(N) 4 | | |||
+-----.------+ +------.-----+ +-----.------+ +-----.------+ | +-----.------+ +------.-----+ +-----.------+ +-----.------+ | |||
. . . . | . . . . | |||
+-----V-------+ +----V--------+ . +------V------+ | +-----V-------+ +----V--------+ . +------V------+ | |||
| Domain 1 | | Domain 2 | . | Domain 4 | | | Domain 1 | | Domain 2 | . | Domain 4 | | |||
|+---+ +---+| |+---+ +---+| . |+---+ +---+| | |+---+ +---+| |+---+ +---+| . |+---+ +---+| | |||
|| | | || || | | || . || | | || | || | | || || | | || . || | | || | |||
|| ============/~/========================================== || | || ============/~/========================================== || | |||
|| * | | || || | | * || . || | | || | || * | | || || | | * || . || | | || | |||
|+-*-+ +---+| |+---+ +-*-+| . |+---+ +---+| | |+-*-+ +---+| |+---+ +-*-+| . |+---+ +---+| | |||
| * | +----------*--+ . | | | | * | +----------*--+ . | | | |||
| * | ***** . | | | | * | ***** . | | | |||
| * | +----------*-----V----+ | | | | * | +----------*-----V----+ | | | |||
| * | | *Domain 3 | | | | | * | | *Domain 3 | | | | |||
|+-*-+ +---+| |+---+ +-*-+ +---+| |+---+ +---+| | |+-*-+ +---+| |+---+ +-*-+ +---+| |+---+ +---+| | |||
|| * | | || || | | * | | || || | | || | || * | | || || | | * | | || || | | || | |||
|| ******************************* | | || || | | || | || ******************************* | | || || | | || | |||
|| | | || || | | | | || || | | || | || | | || || | | | | || || | | || | |||
|+---+ +---+| |+---+ +---+ +---+| |+---+ +---+| | |+---+ +---+| |+---+ +---+ +---+| |+---+ +---+| | |||
+-------------+ +---------------------+ +-------------+ | +-------------+ +---------------------+ +-------------+ | |||
====: Working LSP ****: Rerouting LSP segment /~/: Failure | ====: Working LSP ****: Rerouting LSP segment /~/: Failure | |||
Figure 7: Inter-domain segment rerouting | Figure 7: Inter-Domain Segment Rerouting | |||
8.4.5. Fast Reroute | 8.4.5. Fast Reroute | |||
[RFC4090] defines two methods of fast reroute, the one-to-one backup | [RFC4090] defines two methods of fast reroute: the one-to-one backup | |||
method and the facility backup method. For both methods: | method and the facility backup method. For both methods: | |||
1) Path computation of protecting LSP: | 1) Path computation of protecting LSP: | |||
In Section 6.2 of [RFC4090], the protecting LSP (detour LSP in one- | In Section 6.2 of [RFC4090], the protecting LSP (detour LSP in | |||
to-one backup, or bypass tunnel in facility backup) could be | one-to-one backup or bypass tunnel in facility backup) could be | |||
computed by the Point of Local Repair (PLR) using, for example, | computed by the Point of Local Repair (PLR) using, for example, a | |||
Constraint-based Shortest Path First (CSPF) computation. In the | Constrained Shortest Path First (CSPF) computation. In the | |||
scenario of interworking between GMPLS and centralized controller | scenario of interworking between GMPLS and a centralized | |||
system, the protecting LSP could also be computed by the centralized | controller system, the protecting LSP could also be computed by | |||
controller system, as it has the global view of the network | the centralized controller system, as it has the global view of | |||
topology, resource and information of LSPs. | the network topology, resources, and information of LSPs. | |||
2) Protecting LSP creation: | 2) Protecting LSP creation: | |||
In the scenario of interworking between GMPLS and centralized | In the scenario of interworking between GMPLS and a centralized | |||
controller system, the Protecting LSP could still be created by the | controller system, the protecting LSP could still be created by | |||
RSVP-TE signaling protocol as described in [RFC4090] and [RFC8271]. | the RSVP-TE signaling protocol as described in [RFC4090] and | |||
[RFC8271]. | ||||
In addition, if the protecting LSP is computed by the centralized | In addition, if the protecting LSP is computed by the centralized | |||
controller system, the Secondary Explicit Route Object defined in | controller system, the Secondary Explicit Route Object defined in | |||
[RFC4873] could be used to explicitly indicate the route of the | [RFC4873] could be used to explicitly indicate the route of the | |||
protecting LSP. | protecting LSP. | |||
3) Failure detection and traffic switchover: | 3) Failure detection and traffic switchover: | |||
If a PLR detects that failure occurs, it may significantly shorten | If a PLR detects that failure occurs, it may significantly | |||
the protection switching time by using the distributed mechanisms | shorten the protection switching time by using the distributed | |||
described in [RFC4090] to switch the traffic to the related detour | mechanisms described in [RFC4090] to switch the traffic to the | |||
LSP or bypass tunnel, rather than in a centralized way. | related detour LSP or bypass tunnel rather than doing so in a | |||
centralized way. | ||||
8.5. Controller Reliability | 8.5. Controller Reliability | |||
The reliability of the controller is crucial due to its important | The reliability of the controller is crucial due to its important | |||
role in the network. It is essential that if the controller is shut | role in the network. It is essential that if the controller is shut | |||
down or disconnected from the network, all currently provisioned | down or disconnected from the network, all currently provisioned | |||
services in the network continue to function and carry traffic. In | services in the network continue to function and carry traffic. In | |||
addition, protection switching to pre-established paths should also | addition, protection switching to pre-established paths should also | |||
work. It is desirable to have protection mechanisms, such as | work. It is desirable to have protection mechanisms, such as | |||
redundancy, to maintain full operational control even if one | redundancy, to maintain full operational control even if one instance | |||
instance of the controller fails. This can be achieved through | of the controller fails. This can be achieved through controller | |||
controller backup or functionality backup. There are several | backup or functionality backup. There are several controller backup | |||
controller backup or federation mechanisms in the literature. It is | or federation mechanisms in the literature. It is also more reliable | |||
also more reliable to have function backup in the network element to | to have function backup in the network element to guarantee | |||
guarantee performance in the network. | performance in the network. | |||
9. Manageability Considerations | 9. Manageability Considerations | |||
Each network entity, including controllers and network elements, | Each network entity, including controllers and network elements, | |||
should be managed properly and with the relevant trust and security | should be managed properly and with the relevant trust and security | |||
policies applied (see Section 10 of this document), as they will | policies applied (see Section 10), as they will interact with other | |||
interact with other entities. The manageability considerations in | entities. The manageability considerations in controller hierarchies | |||
controller hierarchies and network elements still apply, | and network elements still apply, respectively. The overall | |||
respectively. The overall manageability of the protocols applied in | manageability of the protocols applied in the network should also be | |||
the network should also be a key consideration. | a key consideration. | |||
The responsibility of each entity should be clarified. The control | The responsibility of each entity should be clarified. The control | |||
of function and policy among different controllers should be | of function and policy among different controllers should be | |||
consistent via a proper negotiation process. | consistent via a proper negotiation process. | |||
10. Security Considerations | 10. Security Considerations | |||
This document outlines the interworking between GMPLS and controller | This document outlines the interworking between GMPLS and controller | |||
hierarchies. The security requirements specific to both systems | hierarchies. The security requirements specific to both systems | |||
remain applicable. Protocols referenced herein possess security | remain applicable. Protocols referenced herein possess security | |||
considerations, which must be adhered to, with their core | considerations, which must be adhered to, with their core | |||
specifications and identified risks detailed earlier in this | specifications and identified risks detailed earlier in this | |||
document. | document. | |||
Security is a critical aspect in both GMPLS and controller-based | Security is a critical aspect in both GMPLS and controller-based | |||
networks. Ensuring robust security mechanisms in these environments | networks. Ensuring robust security mechanisms in these environments | |||
is paramount to safeguard against potential threats and | is paramount to safeguard against potential threats and | |||
vulnerabilities. Below are expanded security considerations and some | vulnerabilities. Below are expanded security considerations and some | |||
relevant IETF RFC references. | relevant IETF RFC references. | |||
- Authentication and Authorization: It is essential to implement | * Authentication and Authorization: It is essential to implement | |||
strong authentication and authorization mechanisms to control | strong authentication and authorization mechanisms to control | |||
access to the controller from multiple network elements. This | access to the controller from multiple network elements. This | |||
ensures that only authorized devices and users can interact with | ensures that only authorized devices and users can interact with | |||
the controller, preventing unauthorized access that could lead to | the controller, preventing unauthorized access that could lead to | |||
network disruptions or data breaches. Transport Layer Security | network disruptions or data breaches. "The Transport Layer | |||
(TLS) Protocol [RFC8446] and Enrollment over Secure Transport | Security (TLS) Protocol Version 1.3" [RFC8446] and "Enrollment | |||
[RFC7030] provide guidelines on secure communication and | over Secure Transport" [RFC7030] provide guidelines on secure | |||
certificate-based authentication that can be leveraged for these | communication and certificate-based authentication that can be | |||
purposes. | leveraged for these purposes. | |||
- Controller Security: The controller's security is crucial as it | * Controller Security: The controller's security is crucial as it | |||
serves as the central control point for the network elements. The | serves as the central control point for the network elements. The | |||
controller must be protected against various attacks, such as | controller must be protected against various attacks, such as | |||
Denial-of-Service (DoS), Man-In-The-Middle (MITM), and | Denial of Service (DoS), Man in the Middle (MITM), and | |||
unauthorized access. Security mechanisms should include regular | unauthorized access. Security mechanisms should include regular | |||
security audits, application of security patches, and firewalls | security audits, application of security patches, firewalls, and | |||
and Intrusion Detection/Prevention Systems (IDS/IPS). | Intrusion Detection Systems (IDSs) / Intrusion Prevention Systems | |||
(IPSs). | ||||
- Data Transport Security: Security mechanisms on the controller | * Data Transport Security: Security mechanisms on the controller | |||
should also safeguard the underlying network elements against | should also safeguard the underlying network elements against | |||
unauthorized usage of data transport resources. This includes | unauthorized usage of data transport resources. This includes | |||
encryption of data in transit to prevent eavesdropping and | encryption of data in transit to prevent eavesdropping and | |||
tampering, as well as ensuring data integrity and confidentiality. | tampering as well as ensuring data integrity and confidentiality. | |||
- Secure Protocol Implementation: Protocols used within the GMPLS | * Secure Protocol Implementation: Protocols used within the GMPLS | |||
and controller frameworks must be implemented with security in | and controller frameworks must be implemented with security in | |||
mind. Known vulnerabilities should be addressed, and secure | mind. Known vulnerabilities should be addressed, and secure | |||
versions of protocols should be used wherever possible. | versions of protocols should be used wherever possible. | |||
Finally, robust network security often depends on Indicators of | Finally, robust network security often depends on Indicators of | |||
Compromise (IoCs) to detect, trace, and prevent malicious activities | Compromise (IoCs) to detect, trace, and prevent malicious activities | |||
in networks or endpoints. These are described in [RFC9424] along | in networks or endpoints. These are described in [RFC9424] along | |||
with the fundamentals, opportunities, operational limitations, and | with the fundamentals, opportunities, operational limitations, and | |||
recommendations for IoC use. | recommendations for IoC use. | |||
11. IANA Considerations | 11. IANA Considerations | |||
This document requires no IANA actions. | This document has no IANA actions. | |||
12. References | 12. References | |||
12.1. Normative References | 12.1. Normative References | |||
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., | [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., | |||
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP | and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP | |||
Tunnels", RFC 3209, December 2001. | Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, | |||
<https://www.rfc-editor.org/info/rfc3209>. | ||||
[RFC3473] Berger, L., Ed., "Generalized Multi-Protocol Label | [RFC3473] Berger, L., Ed., "Generalized Multi-Protocol Label | |||
Switching (GMPLS) Signaling Resource ReserVation Protocol- | Switching (GMPLS) Signaling Resource ReserVation Protocol- | |||
Traffic Engineering (RSVP-TE) Extensions", RFC 3473, | Traffic Engineering (RSVP-TE) Extensions", RFC 3473, | |||
January 2003. | DOI 10.17487/RFC3473, January 2003, | |||
<https://www.rfc-editor.org/info/rfc3473>. | ||||
[RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering | [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering | |||
(TE) Extensions to OSPF Version 2", RFC 3630, September | (TE) Extensions to OSPF Version 2", RFC 3630, | |||
2003. | DOI 10.17487/RFC3630, September 2003, | |||
<https://www.rfc-editor.org/info/rfc3630>. | ||||
[RFC3945] Mannie, E., Ed., "Generalized Multi-Protocol Label | [RFC3945] Mannie, E., Ed., "Generalized Multi-Protocol Label | |||
Switching (GMPLS) Architecture", RFC 3945, October 2004. | Switching (GMPLS) Architecture", RFC 3945, | |||
DOI 10.17487/RFC3945, October 2004, | ||||
<https://www.rfc-editor.org/info/rfc3945>. | ||||
[RFC4090] Pan, P., Ed., Swallow, G., Ed., and A. Atlas, Ed., "Fast | [RFC4090] Pan, P., Ed., Swallow, G., Ed., and A. Atlas, Ed., "Fast | |||
Reroute Extensions to RSVP-TE for LSP Tunnels", RFC 4090, | Reroute Extensions to RSVP-TE for LSP Tunnels", RFC 4090, | |||
May 2005. | DOI 10.17487/RFC4090, May 2005, | |||
<https://www.rfc-editor.org/info/rfc4090>. | ||||
[RFC4203] Kompella, K., Ed. and Y. Rekhter, Ed., "OSPF Extensions in | [RFC4203] Kompella, K., Ed. and Y. Rekhter, Ed., "OSPF Extensions in | |||
Support of Generalized Multi-Protocol Label Switching | Support of Generalized Multi-Protocol Label Switching | |||
(GMPLS)", RFC 4203, October 2005. | (GMPLS)", RFC 4203, DOI 10.17487/RFC4203, October 2005, | |||
<https://www.rfc-editor.org/info/rfc4203>. | ||||
[RFC4206] Kompella, K. and Rekhter Y., "Label Switched Paths (LSP) | [RFC4206] Kompella, K. and Y. Rekhter, "Label Switched Paths (LSP) | |||
Hierarchy with Generalized Multi-Protocol Label Switching | Hierarchy with Generalized Multi-Protocol Label Switching | |||
(GMPLS) Traffic Engineering (TE)", RFC 4206, October 2005. | (GMPLS) Traffic Engineering (TE)", RFC 4206, | |||
DOI 10.17487/RFC4206, October 2005, | ||||
<https://www.rfc-editor.org/info/rfc4206>. | ||||
[RFC4655] Farrel, A., Vasseur, J., and J. Ash, "A Path Computation | [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path | |||
Element (PCE)-Based Architecture", RFC 4655, August 2006. | Computation Element (PCE)-Based Architecture", RFC 4655, | |||
DOI 10.17487/RFC4655, August 2006, | ||||
<https://www.rfc-editor.org/info/rfc4655>. | ||||
[RFC4872] Lang, J., Ed., Rekhter, Y., Ed., and D. Papadimitriou, | [RFC4872] Lang, J.P., Ed., Rekhter, Y., Ed., and D. Papadimitriou, | |||
Ed., "RSVP-TE Extensions in Support of End-to-End | Ed., "RSVP-TE Extensions in Support of End-to-End | |||
Generalized Multi-Protocol Label Switching (GMPLS) | Generalized Multi-Protocol Label Switching (GMPLS) | |||
Recovery", RFC 4872, May 2007. | Recovery", RFC 4872, DOI 10.17487/RFC4872, May 2007, | |||
<https://www.rfc-editor.org/info/rfc4872>. | ||||
[RFC4873] Berger, L., Bryskin, I., Papadimitriou, D., and A. Farrel, | [RFC4873] Berger, L., Bryskin, I., Papadimitriou, D., and A. Farrel, | |||
"GMPLS Segment Recovery", RFC 4873, May 2007. | "GMPLS Segment Recovery", RFC 4873, DOI 10.17487/RFC4873, | |||
May 2007, <https://www.rfc-editor.org/info/rfc4873>. | ||||
[RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic | [RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic | |||
Engineering", RFC 5305, October 2008. | Engineering", RFC 5305, DOI 10.17487/RFC5305, October | |||
2008, <https://www.rfc-editor.org/info/rfc5305>. | ||||
[RFC5307] Kompella, K., Ed. and Y. Rekhter, Ed., "IS-IS Extensions | [RFC5307] Kompella, K., Ed. and Y. Rekhter, Ed., "IS-IS Extensions | |||
in Support of Generalized Multi-Protocol Label Switching | in Support of Generalized Multi-Protocol Label Switching | |||
(GMPLS)", RFC 5307, October 2008. | (GMPLS)", RFC 5307, DOI 10.17487/RFC5307, October 2008, | |||
<https://www.rfc-editor.org/info/rfc5307>. | ||||
[RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation | [RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation | |||
Element (PCE) Communication Protocol (PCEP)", RFC 5440, | Element (PCE) Communication Protocol (PCEP)", RFC 5440, | |||
March 2009. | DOI 10.17487/RFC5440, March 2009, | |||
<https://www.rfc-editor.org/info/rfc5440>. | ||||
[RFC6001] Papadimitriou D., Vigoureux M., Shiomoto K., Brungard D. | [RFC6001] Papadimitriou, D., Vigoureux, M., Shiomoto, K., Brungard, | |||
and Le Roux JL., "Generalized MPLS (GMPLS) Protocol | D., and JL. Le Roux, "Generalized MPLS (GMPLS) Protocol | |||
Extensions for Multi-Layer and Multi-Region Networks | Extensions for Multi-Layer and Multi-Region Networks (MLN/ | |||
(MLN/MRN)", RFC 6001, October 2010. | MRN)", RFC 6001, DOI 10.17487/RFC6001, October 2010, | |||
<https://www.rfc-editor.org/info/rfc6001>. | ||||
[RFC6107] Shiomoto K. and Farrel A., "Procedures for Dynamically | [RFC6107] Shiomoto, K., Ed. and A. Farrel, Ed., "Procedures for | |||
Signaled Hierarchical Label Switched Paths", RFC 6107, | Dynamically Signaled Hierarchical Label Switched Paths", | |||
February 2011. | RFC 6107, DOI 10.17487/RFC6107, February 2011, | |||
<https://www.rfc-editor.org/info/rfc6107>. | ||||
[RFC6241] Enns, R., Bjorklund, M., Schoenwaelder J., Bierman A., | [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | |||
"Network Configuration Protocol (NETCONF)", RFC 6241, June | and A. Bierman, Ed., "Network Configuration Protocol | |||
2011. | (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | |||
<https://www.rfc-editor.org/info/rfc6241>. | ||||
[RFC7030] Pritikin, M., Yee, P. and Harkins, D., "Enrollment over | [RFC7030] Pritikin, M., Ed., Yee, P., Ed., and D. Harkins, Ed., | |||
Secure Transport", RFC 7030, October 2013. | "Enrollment over Secure Transport", RFC 7030, | |||
DOI 10.17487/RFC7030, October 2013, | ||||
<https://www.rfc-editor.org/info/rfc7030>. | ||||
[RFC7074] Berger, L. and J. Meuric, "Revised Definition of the GMPLS | [RFC7074] Berger, L. and J. Meuric, "Revised Definition of the GMPLS | |||
Switching Capability and Type Fields", RFC 7074, November | Switching Capability and Type Fields", RFC 7074, | |||
2013. | DOI 10.17487/RFC7074, November 2013, | |||
<https://www.rfc-editor.org/info/rfc7074>. | ||||
[RFC7491] King, D., Farrel, A., "A PCE-Based Architecture for | [RFC7491] King, D. and A. Farrel, "A PCE-Based Architecture for | |||
Application-Based Network Operations", RFC 7491, March | Application-Based Network Operations", RFC 7491, | |||
2015. | DOI 10.17487/RFC7491, March 2015, | |||
<https://www.rfc-editor.org/info/rfc7491>. | ||||
[RFC7926] Farrel, A., Drake, J., Bitar, N., Swallow, G., Ceccarelli, | [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., | |||
D. and Zhang, X., "Problem Statement and Architecture for | Ceccarelli, D., and X. Zhang, "Problem Statement and | |||
Information Exchange between Interconnected Traffic- | Architecture for Information Exchange between | |||
Engineered Networks", RFC 7926, July 2016. | Interconnected Traffic-Engineered Networks", BCP 206, | |||
RFC 7926, DOI 10.17487/RFC7926, July 2016, | ||||
<https://www.rfc-editor.org/info/rfc7926>. | ||||
[RFC7950] Bjorklund, M., "The YANG 1.1 Data Modeling Language", RFC | [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | |||
7950, August 2016. | RFC 7950, DOI 10.17487/RFC7950, August 2016, | |||
<https://www.rfc-editor.org/info/rfc7950>. | ||||
[RFC8040] Bierman, A., Bjorklund, M., Watsen, K., "RESTCONF | [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | |||
Protocol", RFC 8040, January 2017. | Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | |||
<https://www.rfc-editor.org/info/rfc8040>. | ||||
[RFC8271] Taillon M., Saad T., Gandhi R., Ali Z. and Bhatia M., | [RFC8271] Taillon, M., Saad, T., Ed., Gandhi, R., Ed., Ali, Z., and | |||
"Updates to the Resource Reservation Protocol for Fast | M. Bhatia, "Updates to the Resource Reservation Protocol | |||
Reroute of Traffic Engineering GMPLS Label Switched | for Fast Reroute of Traffic Engineering GMPLS Label | |||
Paths", RFC 8271, October 2017. | Switched Paths (LSPs)", RFC 8271, DOI 10.17487/RFC8271, | |||
October 2017, <https://www.rfc-editor.org/info/rfc8271>. | ||||
[RFC8282] Oki E., Takeda T., Farrel A. and Zhang F., "Extensions to | [RFC8282] Oki, E., Takeda, T., Farrel, A., and F. Zhang, "Extensions | |||
the Path Computation Element Communication Protocol (PCEP) | to the Path Computation Element Communication Protocol | |||
for Inter-Layer MPLS and GMPLS Traffic Engineering", RFC | (PCEP) for Inter-Layer MPLS and GMPLS Traffic | |||
8282, December 2017. | Engineering", RFC 8282, DOI 10.17487/RFC8282, December | |||
2017, <https://www.rfc-editor.org/info/rfc8282>. | ||||
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | |||
Version 1.3", RFC 8446, August 2018. | Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | |||
<https://www.rfc-editor.org/info/rfc8446>. | ||||
[RFC8453] Ceccarelli, D. and Y. Lee, "Framework for Abstraction and | [RFC8453] Ceccarelli, D., Ed. and Y. Lee, Ed., "Framework for | |||
Control of Traffic Engineered Networks", RFC 8453, August | Abstraction and Control of TE Networks (ACTN)", RFC 8453, | |||
2018. | DOI 10.17487/RFC8453, August 2018, | |||
<https://www.rfc-editor.org/info/rfc8453>. | ||||
[RFC8685] Zhang F., Zhao Q., Gonzalez de Dios O., Casellas R. and | [RFC8685] Zhang, F., Zhao, Q., Gonzalez de Dios, O., Casellas, R., | |||
King D., "Path Computation Element Communication Protocol | and D. King, "Path Computation Element Communication | |||
(PCEP) Extensions for the Hierarchical Path Computation | Protocol (PCEP) Extensions for the Hierarchical Path | |||
Element (H-PCE) Architecture", RFC 8685, December 2019. | Computation Element (H-PCE) Architecture", RFC 8685, | |||
DOI 10.17487/RFC8685, December 2019, | ||||
<https://www.rfc-editor.org/info/rfc8685>. | ||||
[RFC8795] Liu, X., Bryskin, I., Beeram, V., Saad, T., Shah, H., | [RFC8795] Liu, X., Bryskin, I., Beeram, V., Saad, T., Shah, H., and | |||
Gonzalez De Dios, O., "YANG Data Model for Traffic | O. Gonzalez de Dios, "YANG Data Model for Traffic | |||
Engineering (TE) Topologies", RFC 8795, August 2020. | Engineering (TE) Topologies", RFC 8795, | |||
DOI 10.17487/RFC8795, August 2020, | ||||
<https://www.rfc-editor.org/info/rfc8795>. | ||||
[RFC9424] Paine, K., Whitehouse, O., Sellwood, J. and Shaw, A., | [RFC9424] Paine, K., Whitehouse, O., Sellwood, J., and A. Shaw, | |||
"Indicators of Compromise (IoCs) and Their Role in Attack | "Indicators of Compromise (IoCs) and Their Role in Attack | |||
Defence", RFC 9424, August 2023. | Defence", RFC 9424, DOI 10.17487/RFC9424, August 2023, | |||
<https://www.rfc-editor.org/info/rfc9424>. | ||||
12.2. Informative References | 12.2. Informative References | |||
[RFC3471] Berger, L., Ed., "Generalized Multi-Protocol Label | [G.808.1] ITU-T, "Generic protection switching - Linear trail and | |||
Switching (GMPLS) Signaling Functional Description", RFC | subnetwork protection", ITU-T Recommendation G.808.1, May | |||
3471, January 2003. | 2014, <https://www.itu.int/rec/T-REC-G.808.1-201405-I/en>. | |||
[RFC4202] Kompella, K., Ed. and Y. Rekhter, Ed., "Routing Extensions | [PATH-COMP] | |||
in Support of Generalized Multi-Protocol Label Switching | Busi, I., Belotti, S., de Dios, O. G., Sharma, A., and Y. | |||
(GMPLS)", RFC 4202, October 2005. | Shi, "A YANG Data Model for requesting path computation", | |||
Work in Progress, Internet-Draft, draft-ietf-teas-yang- | ||||
path-computation-23, 19 August 2024, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-teas- | ||||
yang-path-computation-23>. | ||||
[RFC4204] Lang, J., Ed., "Link Management Protocol (LMP)", RFC 4204, | [PCEP-LS] Dhody, D., Peng, S., Lee, Y., Ceccarelli, D., Wang, A., | |||
October 2005. | and G. S. Mishra, "PCEP extensions for Distribution of | |||
Link-State and TE Information", Work in Progress, | ||||
Internet-Draft, draft-ietf-pce-pcep-ls-02, 20 October | ||||
2024, <https://datatracker.ietf.org/doc/html/draft-ietf- | ||||
pce-pcep-ls-02>. | ||||
[RFC4426] Lang, J., Ed., Rajagopalan, B., Ed., and D. Papadimitriou, | [RFC3471] Berger, L., Ed., "Generalized Multi-Protocol Label | |||
Ed., "Generalized Multi-Protocol Label witching (GMPLS) | Switching (GMPLS) Signaling Functional Description", | |||
Recovery Functional Specification", RFC 4426, March 2006. | RFC 3471, DOI 10.17487/RFC3471, January 2003, | |||
<https://www.rfc-editor.org/info/rfc3471>. | ||||
[RFC5150] Ayyangar, A., Kompella, K., Vasseur, J.P., Farrel, A., | [RFC4202] Kompella, K., Ed. and Y. Rekhter, Ed., "Routing Extensions | |||
"Label Switched Path Stitching with Generalized | in Support of Generalized Multi-Protocol Label Switching | |||
Multiprotocol Label Switching Traffic Engineering (GMPLS | (GMPLS)", RFC 4202, DOI 10.17487/RFC4202, October 2005, | |||
TE)", RFC 5150, February, 2008. | <https://www.rfc-editor.org/info/rfc4202>. | |||
[RFC5212] Shiomoto K., Papadimitriou D., Le Roux JL., Vigoureux M. | [RFC4204] Lang, J., Ed., "Link Management Protocol (LMP)", RFC 4204, | |||
and Brungard D., "Requirements for GMPLS-Based Multi- | DOI 10.17487/RFC4204, October 2005, | |||
Region and Multi-Layer Networks (MRN/MLN)", RFC 5212, July | <https://www.rfc-editor.org/info/rfc4204>. | |||
2008. | ||||
[RFC5441] Vasseur JP., Zhang R., Bitar N. and Le Roux JL., "A | [RFC4426] Lang, J., Ed., Rajagopalan, B., Ed., and D. Papadimitriou, | |||
Backward-Recursive PCE-Based Computation (BRPC) Procedure | Ed., "Generalized Multi-Protocol Label Switching (GMPLS) | |||
to Compute Shortest Constrained Inter-Domain Traffic | Recovery Functional Specification", RFC 4426, | |||
Engineering Label Switched Paths", RFC 5441, April 2009. | DOI 10.17487/RFC4426, March 2006, | |||
<https://www.rfc-editor.org/info/rfc4426>. | ||||
[RFC5623] Oki E., Takeda T., Le Roux JL. and Farrel A., "Framework | [RFC5150] Ayyangar, A., Kompella, K., Vasseur, JP., and A. Farrel, | |||
for PCE-Based Inter-Layer MPLS and GMPLS Traffic | "Label Switched Path Stitching with Generalized | |||
Engineering", RFC 5623, September 2009. | Multiprotocol Label Switching Traffic Engineering (GMPLS | |||
TE)", RFC 5150, DOI 10.17487/RFC5150, February 2008, | ||||
<https://www.rfc-editor.org/info/rfc5150>. | ||||
[RFC5654] Niven-Jenkins B., Ed., Brungard D., Ed., Betts M., Ed., | [RFC5212] Shiomoto, K., Papadimitriou, D., Le Roux, JL., Vigoureux, | |||
Sprecher N., Ueno S., "Requirements of an MPLS Transport | M., and D. Brungard, "Requirements for GMPLS-Based Multi- | |||
Profile", RFC 5654, September 2009. | Region and Multi-Layer Networks (MRN/MLN)", RFC 5212, | |||
DOI 10.17487/RFC5212, July 2008, | ||||
<https://www.rfc-editor.org/info/rfc5212>. | ||||
[RFC7138] Ceccarelli, D., Ed., Zhang, F., Belotti, S., Rao, R., and | [RFC5441] Vasseur, JP., Ed., Zhang, R., Bitar, N., and JL. Le Roux, | |||
J. Drake, "Traffic Engineering Extensions to OSPF for | "A Backward-Recursive PCE-Based Computation (BRPC) | |||
GMPLS Control of Evolving G.709 Optical Transport | Procedure to Compute Shortest Constrained Inter-Domain | |||
Networks", RFC 7138, March 2014. | Traffic Engineering Label Switched Paths", RFC 5441, | |||
DOI 10.17487/RFC5441, April 2009, | ||||
<https://www.rfc-editor.org/info/rfc5441>. | ||||
[RFC7139] Zhang, F., Ed., Zhang, G., Belotti, S., Ceccarelli, D., | [RFC5623] Oki, E., Takeda, T., Le Roux, JL., and A. Farrel, | |||
and K. Pithewan, "GMPLS Signaling Extensions for Control | "Framework for PCE-Based Inter-Layer MPLS and GMPLS | |||
of Evolving G.709 Optical Transport Networks", RFC 7139, | Traffic Engineering", RFC 5623, DOI 10.17487/RFC5623, | |||
March 2014. | September 2009, <https://www.rfc-editor.org/info/rfc5623>. | |||
[RFC7271] Ryoo, J., Ed., Gray, E., Ed., van Helvoort, H., | [RFC5654] Niven-Jenkins, B., Ed., Brungard, D., Ed., Betts, M., Ed., | |||
D'Alessandro, A., Cheung, T., and Osborne, E., "MPLS | Sprecher, N., and S. Ueno, "Requirements of an MPLS | |||
Transport Profile (MPLS-TP) Linear Protection to Match the | Transport Profile", RFC 5654, DOI 10.17487/RFC5654, | |||
Operational Expectations of Synchronous Digital Hierarchy, | September 2009, <https://www.rfc-editor.org/info/rfc5654>. | |||
Optical Transport Network, and Ethernet Transport Network | ||||
Operators", RFC 7271, June 2014. | ||||
[RFC7688] Lee, Y., Ed. and G. Bernstein, Ed., "GMPLS OSPF | [RFC7138] Ceccarelli, D., Ed., Zhang, F., Belotti, S., Rao, R., and | |||
Enhancement for Signal and Network Element Compatibility | J. Drake, "Traffic Engineering Extensions to OSPF for | |||
for Wavelength Switched Optical Networks", RFC 7688, | GMPLS Control of Evolving G.709 Optical Transport | |||
November 2015. | Networks", RFC 7138, DOI 10.17487/RFC7138, March 2014, | |||
<https://www.rfc-editor.org/info/rfc7138>. | ||||
[RFC7689] Bernstein, G., Ed., Xu, S., Lee, Y., Ed., Martinelli, G., | [RFC7139] Zhang, F., Ed., Zhang, G., Belotti, S., Ceccarelli, D., | |||
and H. Harai, "Signaling Extensions for Wavelength | and K. Pithewan, "GMPLS Signaling Extensions for Control | |||
Switched Optical Networks", RFC 7689, November 2015. | of Evolving G.709 Optical Transport Networks", RFC 7139, | |||
DOI 10.17487/RFC7139, March 2014, | ||||
<https://www.rfc-editor.org/info/rfc7139>. | ||||
[RFC7792] Zhang, F., Zhang, X., Farrel, A., Gonzalez de Dios, O., | [RFC7271] Ryoo, J., Ed., Gray, E., Ed., van Helvoort, H., | |||
and D. Ceccarelli, "RSVP-TE Signaling Extensions in | D'Alessandro, A., Cheung, T., and E. Osborne, "MPLS | |||
Support of Flexi-Grid Dense Wavelength Division | Transport Profile (MPLS-TP) Linear Protection to Match the | |||
Multiplexing (DWDM) Networks", RFC 7792, March 2016. | Operational Expectations of Synchronous Digital Hierarchy, | |||
Optical Transport Network, and Ethernet Transport Network | ||||
Operators", RFC 7271, DOI 10.17487/RFC7271, June 2014, | ||||
<https://www.rfc-editor.org/info/rfc7271>. | ||||
[RFC8231] Crabbe, E., Minei, I., Medved, J., and R. Varga, "Path | [RFC7688] Lee, Y., Ed. and G. Bernstein, Ed., "GMPLS OSPF | |||
Computation Element Communication Protocol (PCEP) | Enhancement for Signal and Network Element Compatibility | |||
Extensions for Stateful PCE", RFC 8231, September 2017. | for Wavelength Switched Optical Networks", RFC 7688, | |||
DOI 10.17487/RFC7688, November 2015, | ||||
<https://www.rfc-editor.org/info/rfc7688>. | ||||
[RFC8234] Ryoo, J., Cheung, T., van Helvoort, H., Busi, I. and Wen | [RFC7689] Bernstein, G., Ed., Xu, S., Lee, Y., Ed., Martinelli, G., | |||
G., "Updates to MPLS Transport Profile (MPLS-TP) Linear | and H. Harai, "Signaling Extensions for Wavelength | |||
Protection in Automatic Protection Switching (APS) Mode", | Switched Optical Networks", RFC 7689, | |||
RFC 8234, August 2017. | DOI 10.17487/RFC7689, November 2015, | |||
<https://www.rfc-editor.org/info/rfc7689>. | ||||
[RFC8281] Crabbe, E., Minei, I., Sivabalan, S., and R. Varga, "PCEP | [RFC7792] Zhang, F., Zhang, X., Farrel, A., Gonzalez de Dios, O., | |||
Extensions for PCE-initiated LSP Setup in a Stateful PCE | and D. Ceccarelli, "RSVP-TE Signaling Extensions in | |||
Model", RFC 8281, October 2017. | Support of Flexi-Grid Dense Wavelength Division | |||
Multiplexing (DWDM) Networks", RFC 7792, | ||||
DOI 10.17487/RFC7792, March 2016, | ||||
<https://www.rfc-editor.org/info/rfc7792>. | ||||
[RFC8345] Clemm, A., Medved, J., Varga, R., Bahadur, N., | [RFC8231] Crabbe, E., Minei, I., Medved, J., and R. Varga, "Path | |||
Ananthakrishnan, H., Liu, X., "A YANG Data Model for | Computation Element Communication Protocol (PCEP) | |||
Network Topologies", RFC 8345, March 2018. | Extensions for Stateful PCE", RFC 8231, | |||
DOI 10.17487/RFC8231, September 2017, | ||||
<https://www.rfc-editor.org/info/rfc8231>. | ||||
[RFC8363] Zhang, X., Zheng, H., Casellas, R., Dios, O., and D. | [RFC8234] Ryoo, J., Cheung, T., van Helvoort, H., Busi, I., and G. | |||
Ceccarelli, "GMPLS OSPF-TE Extensions in support of Flexi- | Wen, "Updates to MPLS Transport Profile (MPLS-TP) Linear | |||
grid DWDM networks", RFC 8363, February 2017. | Protection in Automatic Protection Switching (APS) Mode", | |||
RFC 8234, DOI 10.17487/RFC8234, August 2017, | ||||
<https://www.rfc-editor.org/info/rfc8234>. | ||||
[PAT-COMP] Busi, I., Belotti, S., Gonzalez de Dios, O., Sharma, A., | [RFC8281] Crabbe, E., Minei, I., Sivabalan, S., and R. Varga, "Path | |||
Shi, Y., "Yang model for requesting Path Computation", | Computation Element Communication Protocol (PCEP) | |||
draft-ietf-teas-yang-path-computation, work in progress. | Extensions for PCE-Initiated LSP Setup in a Stateful PCE | |||
Model", RFC 8281, DOI 10.17487/RFC8281, December 2017, | ||||
<https://www.rfc-editor.org/info/rfc8281>. | ||||
[PCEP-LS] Dhody, D., Peng S., Lee, Y., Ceccarelli, D., Wang A. and | [RFC8345] Clemm, A., Medved, J., Varga, R., Bahadur, N., | |||
Mishra G., "PCEP Extensions for Distribution of Link-State | Ananthakrishnan, H., and X. Liu, "A YANG Data Model for | |||
and TE Information", draft-ietf-pce-pcep-ls, work in | Network Topologies", RFC 8345, DOI 10.17487/RFC8345, March | |||
progress. | 2018, <https://www.rfc-editor.org/info/rfc8345>. | |||
[TE-Tunnel] Saad, T. et al., "A YANG Data Model for Traffic | [RFC8363] Zhang, X., Zheng, H., Casellas, R., Gonzalez de Dios, O., | |||
Engineering Tunnels and Interfaces", draft-ietf-teas-yang- | and D. Ceccarelli, "GMPLS OSPF-TE Extensions in Support of | |||
te, work in progress. | Flexi-Grid Dense Wavelength Division Multiplexing (DWDM) | |||
Networks", RFC 8363, DOI 10.17487/RFC8363, May 2018, | ||||
<https://www.rfc-editor.org/info/rfc8363>. | ||||
[sPCE-ID] Dugeon, O. et al., "PCEP Extension for Stateful Inter- | [SPCE-ID] Dugeon, O., Meuric, J., Lee, Y., and D. Ceccarelli, "PCEP | |||
Domain Tunnels", draft-ietf-pce-stateful-interdomain, work | Extension for Stateful Inter-Domain Tunnels", Work in | |||
in progress. | Progress, Internet-Draft, draft-ietf-pce-stateful- | |||
interdomain-06, 6 January 2025, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-pce- | ||||
stateful-interdomain-06>. | ||||
[G.808.1] ITU-T, "Generic protection switching - Linear trail and | [YANG-TE] Saad, T., Gandhi, R., Liu, X., Beeram, V. P., and I. | |||
subnetwork protection", G.808.1, May 2014. | Bryskin, "A YANG Data Model for Traffic Engineering | |||
Tunnels, Label Switched Paths and Interfaces", Work in | ||||
Progress, Internet-Draft, draft-ietf-teas-yang-te-37, 9 | ||||
October 2024, <https://datatracker.ietf.org/doc/html/ | ||||
draft-ietf-teas-yang-te-37>. | ||||
13. Contributors | Acknowledgements | |||
The authors would like to thank Jim Guichard, Area Director of IETF | ||||
Routing Area; Vishnu Pavan Beeram, Chair of TEAS WG; Jia He and | ||||
Stewart Bryant, RTGDIR reviewers; Thomas Fossati, Gen-ART reviewer; | ||||
Yingzhen Qu, OPSDIR reviewer; David Mandelberg, SECDIR reviewer; | ||||
David Dong, IANA Services Sr. Specialist; and Éric Vyncke and Murray | ||||
Kucherawy, IESG reviewers for their reviews and comments on this | ||||
document. | ||||
Contributors | ||||
Xianlong Luo | Xianlong Luo | |||
Huawei Technologies | Huawei Technologies | |||
G1, Huawei Xiliu Beipo Village, Songshan Lake | G1, Huawei Xiliu Beipo Village, Songshan Lake | |||
Dongguan | Dongguan | |||
Guangdong, 523808 China | Guangdong, 523808 | |||
China | ||||
Email: luoxianlong@huawei.com | Email: luoxianlong@huawei.com | |||
Sergio Belotti | Sergio Belotti | |||
Nokia | Nokia | |||
Email: sergio.belotti@nokia.com | Email: sergio.belotti@nokia.com | |||
14. Authors' Addresses | Authors' Addresses | |||
Haomian Zheng | Haomian Zheng | |||
Huawei Technologies | Huawei Technologies | |||
H1, Huawei Xiliu Beipo Village, Songshan Lake | H1, Huawei Xiliu Beipo Village, Songshan Lake | |||
Dongguan | Dongguan | |||
Guangdong, 523808 China | Guangdong, 523808 | |||
China | ||||
Email: zhenghaomian@huawei.com | Email: zhenghaomian@huawei.com | |||
Yunbin Xu | Yi Lin | |||
CAICT | Huawei Technologies | |||
Email: xuyunbin@caict.ac.cn | H1, Huawei Xiliu Beipo Village, Songshan Lake | |||
Dongguan | ||||
Guangdong, 523808 | ||||
China | ||||
Email: yi.lin@huawei.com | ||||
Yang Zhao | Yang Zhao | |||
China Mobile | China Mobile | |||
Email: zhaoyangyjy@chinamobile.com | Email: zhaoyangyjy@chinamobile.com | |||
Yunbin Xu | ||||
CAICT | ||||
Email: xuyunbin@caict.ac.cn | ||||
Dieter Beller | Dieter Beller | |||
Nokia | Nokia | |||
Email: Dieter.Beller@nokia.com | Email: Dieter.Beller@nokia.com | |||
Yi Lin | ||||
Huawei Technologies | ||||
H1, Huawei Xiliu Beipo Village, Songshan Lake | ||||
Dongguan | ||||
Guangdong, 523808 China | ||||
Email: yi.lin@huawei.com | ||||
Acknowledgements | ||||
The authors would like to thank Jim Guichard, Area Director of IETF | ||||
Routing Area, Vishnu Pavan Beeram, Chair of TEAS WG, Jia He and | ||||
Stewart Bryant, rtgdir reviewers, Thomas Fossati, Gen-ART reviewer, | ||||
Yingzhen Qu, opsdir reviewer, David Mandelberg, secdir reviewer, | ||||
David Dong, IANA Services Sr. Specialist, and Éric Vyncke and Murray | ||||
Kucherawy, IESG reviewers, for their reviews and comments on this | ||||
document. | ||||
End of changes. 311 change blocks. | ||||
993 lines changed or deleted | 1136 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |