TEAS Working Group Italo Busi Internet Draft Huawei Intended status: Informational Sergio Belotti Expires: May 2017 Nokia Victor Lopez Oscar Gonzalez de Dios Telefonica Anurag Sharma Infinera Yan Shi China Unicom Ricard Vilalta CTTC Karthik Sethuraman NEC November 15, 2016 Yang model for requesting Path Computation draft-busibel-teas-yang-path-computation-01.txt Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt Busi, Belotti, al. Expires May 15, 2017 [Page 1] Internet-DraftYang model for requesting Path Computation November 2016 The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire on May 15, 2016. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Abstract There are scenarios, typically in a hierarchical SDN context, in which an orchestrator may not have detailed information to be able to perform an end-to-end path computation and would need to request lower layer/domain controllers to calculate some (partial) feasible paths. Multiple protocol solutions can be used for communication between different controller hierarchical levels. This document assumes that the controllers are communicating using YANG-based protocols (e.g., NETCONF or RESTCONF). This document describes some use cases for a YANG model to request path computation. Table of Contents 1. Introduction...................................................3 2. Use Cases......................................................4 2.1. IP-Optical integration....................................4 2.1.1. Inter-layer path computation.........................6 2.1.2. Route Diverse IP Services............................8 2.2. Multi-domain TE Networks..................................8 Busi, Belotti, et al. Expires May 15, 2017 [Page 2] Internet-DraftYang model for requesting Path Computation November 2016 2.3. Data center interconnections..............................9 3. Interactions with TE Topology.................................11 3.1. TE Topology Aggregation using the "virtual link model"...11 3.2. TE Topology Abstraction..................................14 3.3. Complementary use of TE topology and path computation....15 4. Motivation for a YANG Model...................................17 4.1. Benefits of common data models...........................17 4.2. Benefits of a single interface...........................18 4.3. Extensibility............................................19 5. Path Optimization Request.....................................19 6. YANG Model for requesting Path Computation....................19 6.1. YANG model for stateless TE path computation.............20 6.1.1. YANG Tree...........................................20 6.1.2. YANG Module.........................................33 7. Security Considerations.......................................42 8. IANA Considerations...........................................42 9. References....................................................42 9.1. Normative References.....................................42 9.2. Informative References...................................42 10. Acknowledgments..............................................43 1. Introduction There are scenarios, typically in a hierarchical SDN context, in which an orchestrator may not have detailed information to be able to perform an end-to-end path computation and would need to request lower layer/domain controllers to calculate some (partial) feasible paths. When we are thinking to this type of scenarios we have in mind specific level of interfaces on which this request can be applied. We can reference ABNO Control Interface [RFC7491] in which an Application Service Coordinator can request ABNO controller to take in charge path calculation (see Figure 1 in the RFC) and/or ACTN [ACTN-frame],where controller hierarchy is defined, the need for path computation arises on both interfaces CMI (interface between Customer Network Controller(CNC) and Multi Domain Service Coordinator (MDSC)) and/or MPI (interface between MSDC-PNC).[ACTN- Info] describes an information model for the Path Computation request. Multiple protocol solutions can be used for communication between different controller hierarchical levels. This document assumes that Busi, Belotti, et al. Expires May 15, 2017 [Page 3] Internet-DraftYang model for requesting Path Computation November 2016 the controllers are communicating using YANG-based protocols (e.g., NETCONF or RESTCONF). Path Computation Elements, Controllers and Orchestrators perform their operations based on Traffic Engineering Databases (TED). Such TEDs can be described, in a technology agnostic way, with the YANG Data Model for TE Topologies [TE-TOPO]. Furthermore, the technology specific details of the TED are modeled in the augmented TE topology models (e.g. [L1-TOPO] for Layer-1 ODU technologies). The availability of such topology models allows providing the TED using YANG-based protocols (e.g., NETCONF or RESTCONF). Furthermore, it enables a PCE/Controller performing the necessary abstractions or modifications and offering this customized topology to another PCE/Controller or high level orchestrator. The tunnels that can be provided over the networks described with the topology models can be also set-up, deleted and modified via YANG-based protocols (e.g., NETCONF or RESTCONF)using the TE-Tunnel Yang model [TE-TUNNEL]. This document describes some use cases where a path computation request, via YANG-based protocols (e.g., NETCONF or RESTCONF), can be needed. 2. Use Cases This section presents different use cases, where an orchestrator needs to request underlying SDN controllers for path computation. The presented uses cases have been grouped, depending on the different underlying topologies: a) IP-Optical integration; b) Multi-domain Traffic Engineered (TE) Networks; and c) Data center interconnections. 2.1. IP-Optical integration In these use cases, an Optical domain is used to provide connectivity between IP routers which are connected with the Optical domains using access links (see Figure 1). Busi, Belotti, et al. Expires May 15, 2017 [Page 4] Internet-DraftYang model for requesting Path Computation November 2016 -------------------------------------------------------------------- I I I I I I I IP+Optical Use Cases I I I I I I I I I I (only in PDF version) I I I I I I I I I I I I I I I -------------------------------------------------------------------- Figure 1 - IP+Optical Use Cases It is assumed that the Optical domain controller provides to the orchestrator an abstracted view of the Optical network. A possible abstraction shall be representing the optical domain as one "virtual node" with "virtual ports" connected to the access links. The path computation request helps the orchestrator to know which are the real connections that can be provided at the optical domain. Busi, Belotti, et al. Expires May 15, 2017 [Page 5] Internet-DraftYang model for requesting Path Computation November 2016 -------------------------------------------------------------------- I I I I I I I I I I I IP+Optical Topology Abstraction I I I I I I I I I I (only in PDF version) I I I I I I I I I I I I I -------------------------------------------------------------------- Figure 2 - IP+Optical Topology Abstraction 2.1.1. Inter-layer path computation In this use case, the orchestrator needs to setup an optimal path between two IP routers R1 and R2. As depicted in Figure 2, the Orchestrator has only an "abstracted view" of the physical network, and it does not know the feasibility or the cost of the possible optical paths (e.g., VP1-VP4 and VP2- VP5), which depend from the current status of the physical resources within the optical network and on vendor-specific optical attributes. The orchestrator can request the underlying Optical domain controller to compute a set of potential optimal paths, taking into account optical constraints. Then, based on its own constraints, policy and knowledge (e.g. cost of the access links), it can choose Busi, Belotti, et al. Expires May 15, 2017 [Page 6] Internet-DraftYang model for requesting Path Computation November 2016 which one of these potential paths to use to setup the optimal e2e path crossing optical network. -------------------------------------------------------------------- I I I IP+Optical Path Computation Example I I I I I I (only in PDF version) I I I -------------------------------------------------------------------- Figure 3 - IP+Optical Path Computation Example For example, in Figure 3, the Orchestrator can request the Optical domain controller to compute the paths between VP1-VP4 and VP2-VP5 and then decide to setup the optimal end-to-end path using the VP2- VP5 Optical path even this is not the optimal path from the Optical domain perspective. Considering the dynamicity of the connectivity constraints of an Optical domain, it is possible that a path computed by the Optical domain controller when requested by the Orchestrator is no longer valid when the Orchestrator requests it to be setup up. It is worth noting that with the approach proposed in this document, the likelihood for this issue to happen can be quite small since the time window between the path computation request and the path setup request should be quite short (especially if compared with the time that would be needed to update the information of a very detailed abstract connectivity matrix). If this risk is still not acceptable, the Orchestrator may also optionally request the Optical domain controller not only to compute the path but also to keep track of its resources (e.g., these resources can be reserved to avoid being used by any other connection). In this case, some mechanism (e.g., a timeout) needs to be defined to avoid having stranded resources within the Optical domain. These issues and solutions can be fine-tuned during the design of the YANG model for requesting Path Computation. Busi, Belotti, et al. Expires May 15, 2017 [Page 7] Internet-DraftYang model for requesting Path Computation November 2016 2.1.2. Route Diverse IP Services This is for further study. 2.2. Multi-domain TE Networks In this use case there are two TE domains which are interconnected together by multiple inter-domains links. A possible example could be a multi-domain optical network. -------------------------------------------------------------------- I I I I I I I I I I I I I Multi-domain multi-link interconnection I I I I I I I I I I (only in PDF version) I I I I I I I I I I I I I -------------------------------------------------------------------- Figure 4 - Multi-domain multi-link interconnection In order to setup an end-to-end multi-domain TEpath (e.g., between nodes A and H), the orchestrator needs to know the feasibility or the cost of the possible TE paths within the two TE domains, which depend from the current status of the physical resources within each TE network. This is more challenging in case of optical networks because the optimal paths depend also on vendor-specific optical attributes (which may be different in the two domains if they are provided by different vendors). Busi, Belotti, et al. Expires May 15, 2017 [Page 8] Internet-DraftYang model for requesting Path Computation November 2016 In order to setup a multi-domain TE path (e.g., between nodes A and H), Orchestrator can request the TE domain controllers to compute a set of intra-domain optimal paths and take decisions based on the information received. For example: o The Orchestrator asks TE domain controllers to provide set of paths between A-C, A-D, E-H and F-H o TE domain controllers return a set of feasible paths with the associated costs: the path A-C is not part of this set(in optical networks, it is typical to have some paths not being feasible due to optical constraints that are known only by the optical domain controller) o The Orchestrator will select the path A- D-F- H since it is the only feasible multi-domain path and then request the TE domain controllers to setup the A-D and F-H intra-domain paths o If there are multiple feasible paths, the Orchestrator can select the optimal path knowing the cost of the intra-domain paths (provided by the TE domain controllers) and the cost of the inter-domain links (known by the Orchestrator) This approach may have some scalability issues when the number of TE domains is quite big (e.g. 20). In this case, it would be worthwhile using the abstract TE topology information provided by the domain controllers to limit the number of potential optimal end-to-end paths and then request path computation to fewer domain controllers in order to decide what the optimal path within this limited set is. For more details, see section 3.3. 2.3. Data center interconnections In these use case, there is an TE domain which is used to provide connectivity between data centers which are connected with the TE domain using access links. Busi, Belotti, et al. Expires May 15, 2017 [Page 9] Internet-DraftYang model for requesting Path Computation November 2016 -------------------------------------------------------------------- I I I I I I I I I I I I I Data Center Interconnection Use Case I I I I I I I I (only in PDF version) I I I I I I I I I I I I I -------------------------------------------------------------------- Figure 5 - Data Center Interconnection Use Case In this use case, a virtual machine within Data Center 1 (DC1) needs to transfer data to another virtual machine that can reside either in DC2 or in DC3. The optimal decision depends both on the cost of the TE path (DC1- DC2 or DC1-DC3) and of the computing power (data center resources) within DC2 or DC3. The Cloud Orchestrator may not be able to make this decision because it has only an abstract view of the TE network (as in use case in 2.1). The cloud orchestrator can request to the TE domain controller to compute the cost of the possible TE paths (e.g., DC1-DC2 and DC1- DC3) and to the DC controller to compute the cost of the computing power (DC resources) within DC2 and DC3 and then it can take the decision about the optimal solution based on this information and its policy. Busi, Belotti, et al. Expires May 15, 2017 [Page 10] Internet-DraftYang model for requesting Path Computation November 2016 3. Interactions with TE Topology The use cases described in section 2 have been described assuming that the topology view exported by each underlying SDN controller to the orchestrator is aggregated using the "virtual node model", defined in [RFC7926]. TE Topology information, e.g., as provided by [TE-TOPO], could in theory be used by an underlying SDN controllers to provide TE information to the orchestrator thus allowing the Path Computation Element (PCE) within the Orchestrator to perform multi-domain path computation by its own, without requesting path computations to the underlying SDN controllers. This section analyzes the need for an orchestrator to request underlying SDN controllers for path computation even in these scenarios as well as how the TE Topology information and the path computation can be complementary. In nutshell, there is a scalability trade-off between providing all the TE information needed by the Orchestrator's PCE to take optimal path computation decisions by its own versus requesting the Orchestrator to ask to too many underlying SDN Domain Controllers a set of feasible optimal intra-domain TE paths. 3.1. TE Topology Aggregation using the "virtual link model" Using the TE Topology model, as defined in [TE-TOPO], the underlying SDN controller can export the whole TE domain as a single abstract TE node with a "detailed connectivity matrix", which extends the "connectivity matrix", defined in [RFC7446], with specific TE attributes (e.g., delay, SRLGs and summary TE metrics). The information provided by the "detailed abstract connectivity matrix" would be equivalent to the information that should be provided by "virtual link model" as defined in [RFC 7926]. For example, in the IP-Optical integration use case, described in section 2.1, the Optical domain controller can make the information shown in Figure 3 available to the Orchestrator as part of the TE Topology information and the Orchestrator could use this information to calculate by its own the optimal path between routers R1 and R2, without requesting any additional information to the Optical Domain Controller. Busi, Belotti, et al. Expires May 15, 2017 [Page 11] Internet-DraftYang model for requesting Path Computation November 2016 However, there is a tradeoff between the accuracy (i.e., providing "all" the information that might be needed by the Orchestrator's PCE) and scalability to be considered when designing the amount of information to provide within the "detailed abstract connectivity matrix". Figure 6 below shows another example, similar to Figure 3, where there are two possible Optical paths between VP1 and VP4 with different properties (e.g., available bandwidth and cost). -------------------------------------------------------------------- I I I IP+Optical Path Computation Example I I with multiple choices I I I I I I (only in PDF version) I I I -------------------------------------------------------------------- Figure 6 - IP+Optical Path Computation Example with multiple choices Reporting all the information, as in Figure 6, using the "detailed abstract connectivity matrix", is quite challenging from a scalability perspective. The amount of this information is not just based on number of end points (which would scale as N-square), but also on many other parameters, including client rate, user constraints / policies for the service, e.g. max latency < N ms, max cost, etc., exclusion policies to route around busy links, min OSNR margin, max preFEC BER etc. All these constraints could be different based on connectivity requirements. It is also worth noting that the "connectivity matrix" has been originally defined in WSON, [RFC7446] to report the connectivity constrains of a physical node within the WDM network: the information it contains is pretty "static" and therefore, once taken and stored in the TE data base, it can be always being considered valid and up-to-date in path computation request. Using the "connectivity matrix" with an abstract node to abstract the information regarding the connectivity constraints of an Optical domain, would make this information more "dynamic" since the Busi, Belotti, et al. Expires May 15, 2017 [Page 12] Internet-DraftYang model for requesting Path Computation November 2016 connectivity constraints of an Optical domain can change over time because some optical paths that are feasible at a given time may become unfeasible at a later time when e.g., another optical path is established. The information in the "detailed abstract connectivity matrix" is even more dynamic since the establishment of another optical path may change some of the parameters (e.g., delay or available bandwidth) in the "detailed abstract connectivity matrix" while not changing the feasibility of the path. "Connectivity matrix" is sometimes confused with optical reach table that contain multiple (e.g. k-shortest) regen-free reachable paths for every A-Z node combination in the network. Optical reach tables can be calculated offline, utilizing vendor optical design and planning tools,and periodically uploaded to the Controller: these optical path reach tables are fairly static. However, to get the connectivity matrix, between any two sites, either a regen free path can be used, if one is available, or multiple regen free paths are concatenated to get from src to dest, which can be a very large combination. Additionally, when the optical path within optical domain needs to be computed, it can result in different paths based on input objective, constraints, and network conditions. In summary, even though "optical reachability table" is fairly static, which regen free paths to build the connectivity matrix between any source and destination is very dynamic, and is done using very sophisticated routing algorithms. There is therefore the need to keep the information in the "connectivity matrix" updated which means that there another tradeoff between the accuracy (i.e., providing "all" the information that might be needed by the Orchestrator's PCE) and having up-to- date information. The more the information is provided and the longer it takes to keep it up-to-date which increases the likelihood that the Orchestrator's PCE computes paths using not updated information. It seems therefore quite challenging to have a "detailed abstract connectivity matrix" that provides accurate, scalable and updated information to allow the Orchestrator's PCE to take optimal decisions by its own. If the information in the "detailed abstract connectivity matrix" is not complete/accurate, we can have the following drawbacks considering for example the case in Figure 6: Busi, Belotti, et al. Expires May 15, 2017 [Page 13] Internet-DraftYang model for requesting Path Computation November 2016 o If only the VP1-VP4 path with available bandwidth of 2 Gb/s and cost 50 is reported, the Orchestrator's PCE will fail to compute a 5 Gb/s path between routers R1 and R2, although this would be feasible; o If only the VP1-VP4 path with available bandwidth of 10 Gb/s and cost 60 is reported, the Orchestrator's PCE will compute, as optimal, the 1 Gb/s path between R1 and R2 going through the VP2- VP5 path within the Optical domain while the optimal path would actually be the one going thought the VP1-VP4 sub-path (with cost 50) within the Optical domain. Instead, using the approach proposed in this document, the Orchestrator, when it needs to setup an end-to-end path, it can request the Optical domain controller to compute a set of optimal paths (e.g., for VP1-VP4 and VP2-VP5) and take decisions based on the information received: o When setting up a 5 Gb/s path between routers R1 and R2, the Optical domain controller may report only the VP1-VP4 path as the only feasible path: the Orchestrator can successfully setup the end-to-end path passing though this Optical path; o When setting up a 1 Gb/s path between routers R1 and R2, the Optical domain controller (knowing that the path requires only 1 Gb/s) can report both the VP1-VP4 path, with cost 50, and the VP2-VP5 path, with cost 65. The Orchestrator can then compute the optimal path which is passing thought the VP1-VP4 sub-path (with cost 50) within the Optical domain. 3.2. TE Topology Abstraction Using the TE Topology model, as defined in [TE-TOPO], the underlying SDN controller can export an abstract TE Topology, composed by a set of TE nodes and TE links, which are abstracting the topology controlled by each domain controller. Considering the example in Figure 4, the TE domain controller 1 can export a TE Topology encompassing the TE nodes A, B, C and D and the TE Link interconnecting them. In a similar way, TE domain controller 2 can export a TE Topology encompassing the TE nodes E, F, G and H and the TE Link interconnecting them. In this example, for simplicity reasons, each abstract TE node maps with each physical node, but this is not necessary. Busi, Belotti, et al. Expires May 15, 2017 [Page 14] Internet-DraftYang model for requesting Path Computation November 2016 In order to setup a multi-domain TE path (e.g., between nodes A and H), the Orchestrator can compute by its own an optimal end-to-end path based on the abstract TE topology information provided by the domain controllers. For example: o Orchestrator's PCE, based on its own information, can compute the optimal multi-domain path being A-B-C-E-G-H, and then request the TE domain controllers to setup the A-B-C and E-G-H intra-domain paths o But, during path setup, the domain controller may find out that A-B-C intra-domain path is not feasible (as discussed in section 2.2, in optical networks it is typical to have some paths not being feasible due to optical constraints that are known only by the optical domain controller), while only the path A-B-D is feasible o So what the hierarchical controller computed is not good and need to re-start the path computation from scratch As discussed in section 3.1, providing more extensive abstract information from the TE domain controllers to the multi-domain Orchestator may lead to scalability problems. In a sense this is similar to the problem of routing and wavelength assignment within an Optical domain. It is possible to do first routing (step 1) and then wavelength assignment (step 2), but the chances of ending up with a good path is low. Alternatively, it is possible to do combined routing and wavelength assignment, which is known to be a more optimal and effective way for Optical path setup. Similarly, it is possible to first compute an abstract end-to-end path within the multi-domain Orchestrator (step 1) and then compute an intra-domain path within each Optical domain (step 2), but there are more chances not to find a path or to get a suboptimal path that performing per-domain path computation and then stitch them. 3.3. Complementary use of TE topology and path computation As discussed in section 2.2, there are some scalability issues with path computation requests in a multi-domain TE network with many TE domains, in terms of the number of requests to send to the TE domain controllers. It would therefore be worthwhile using the TE topology information provided by the domain controllers to limit the number of requests. Busi, Belotti, et al. Expires May 15, 2017 [Page 15] Internet-DraftYang model for requesting Path Computation November 2016 An example can be described considering the multi-domain abstract topology shown in Figure 7. In this example, an end-to-end TE path between domains A and F needs to be setup. The transit domain should be selected between domains B, C, D and E. -------------------------------------------------------------------- I I I I I I I Multi-domain with many domains I I (Topology information) I I I I I I (only in PDF version) I I I I I I I -------------------------------------------------------------------- Figure 7 - Multi-domain with many domains (Topology information) The actual cost of each intra-domain path is not known a priori from the abstract topology information. The Orchestrator only knows, from the TE topology provided by the underlying domain controllers, the feasibility of some intra-domain paths and some upper-bound and/or lower-bound cost information. With this information, together with the cost of inter-domain links, the Orchestrator can understand by its own that: o Domain B cannot be selected as the path connecting domains A and E is not feasible; o Domain E cannot be selected as a transit domain since it is know from the abstract topology information provided by domain controllers that the cost of the multi-domain path A-E-F (which is 100, in the best case) will be always be higher than the cost of the multi-domain paths A-D-F (which is 90, in the worst case) and A-E-F (which is 80, in the worst case) Therefore, the Orchestrator can understand by its own that the optimal multi-domain path could be either A-D-F or A-E-F but it Busi, Belotti, et al. Expires May 15, 2017 [Page 16] Internet-DraftYang model for requesting Path Computation November 2016 cannot known which one of the two possible option actually provides the optimal end-to-end path. The Orchestrator can therefore request path computation only to the TE domain controllers A, D, E and F (and not to all the possible TE domain controllers). -------------------------------------------------------------------- I I I I I I I Multi-domain with many domains I I (Path Computation information) I I I I I I (only in PDF version) I I I I I I I -------------------------------------------------------------------- Figure 8 - Multi-domain with many domains (Path Computation information) Based on these requests, the Orchestrator can know the actual cost of each intra-domain paths which belongs to potential optimal end- to-end paths, as shown in Figure 8, and then compute the optimal end-to-end path (e.g., A-D-F, having total cost of 50, instead of A- C-F having a total cost of 70). 4. Motivation for a YANG Model 4.1. Benefits of common data models Path computation requests should be closely aligned with the YANG data models that provide (abstract) TE topology information, i.e., [TE-TOPO] as well as that are used to configure and manage TE Tunnels, i.e., [TE-TUNNEL]. Otherwise, an error-prone mapping or correlation of information would be required. For instance, there is benefit in using the same endpoint identifiers in path computation requests and in the topology modeling. Also, the attributes used in path computation constraints could use the same or similar data Busi, Belotti, et al. Expires May 15, 2017 [Page 17] Internet-DraftYang model for requesting Path Computation November 2016 models. As a result, there are many benefits in aligning path computation requests with YANG models for TE topology information and TE Tunnels configuration and management. 4.2. Benefits of a single interface A typical use case for path computation requests is the interface between an orchestrator and a domain controller. The system integration effort is typically lower if a single, consistent interface is used between such systems, i.e., one data modeling language (i.e., YANG) and a common protocol (e.g., NETCONF or RESTCONF). Practical benefits of using a single, consistent interface include: 1. Simple authentication and authorization: The interface between different components has to be secured. If different protocols have different security mechanisms, ensuring a common access control model may result in overhead. For instance, there may be a need to deal with different security mechanisms, e.g., different credentials or keys. This can result in increased integration effort. 2. Consistency: Keeping data consistent over multiple different interfaces or protocols is not trivial. For instance, the sequence of actions can matter in certain use cases, or transaction semantics could be desired. While ensuring consistency within one protocol can already be challenging, it is typically cumbersome to achieve that across different protocols. 3. Testing: System integration requires comprehensive testing, including corner cases. The more different technologies are involved, the more difficult it is to run comprehensive test cases and ensure proper integration. 4. Middle-box friendliness: Provider and consumer of path computation requests may be located in different networks, and middle-boxes such as firewalls, NATs, or load balancers may be deployed. In such environments it is simpler to deploy a single protocol. Also, it may be easier to debug connectivity problems. 5. Tooling reuse: Implementers may want to implement path computation requests with tools and libraries that already exist in controllers and/or orchestrators, e.g., leveraging the rapidly growing eco-system for YANG tooling. Busi, Belotti, et al. Expires May 15, 2017 [Page 18] Internet-DraftYang model for requesting Path Computation November 2016 4.3. Extensibility Path computation is only a subset of the typical functionality of a controller. In many use cases, issuing path computation requests comes along with the need to access other functionality on the same system. In addition to obtaining TE topology, for instance also configuration of services (setup/modification/deletion) may be required, as well as: 1. Receiving notifications for topology changes as well as integration with fault management 2. Performance management such as retrieving monitoring and telemetry data 3. Service assurance, e.g., by triggering OAM functionality 4. Other fulfilment and provisioning actions beyond tunnels and services, such as changing QoS configurations YANG is a very extensible and flexible data modeling language that can be used for all these use cases. Adding support for path computation requests to YANG models would seamlessly complement with [TE-TOPO] and [TE-TUNNEL] in the use cases where YANG-based protocols (e.g., NETCONF or RESTCONF) are used. 5. Path Optimization Request This is for further study 6. YANG Model for requesting Path Computation Work on extending the TE Tunnel YANG model to support the need to request path computation has recently started also in the context of the [TE-TUNNEL] draft. It is possible to request path computation by configuring a "compute-only" TE tunnel and retrieving the computed path(s) in the LSP(s) Record-Route Object (RRO) list as described in [TE-TUNNEL]. This is a stateful solution since the state of each created "compute-only" TE tunnel needs to be maintained and updated, when underlying network conditions change. Busi, Belotti, et al. Expires May 15, 2017 [Page 19] Internet-DraftYang model for requesting Path Computation November 2016 The need also for a stateless solution, based on an RPC, has been recognized: section 6.1 describes an initial proposal for a stateless RPC to request path computation. This is intended as an input for further evaluation and discussion with the authors of [TE-TUNNEL] Internet-Draft and TEAS WG participants, about the technical solution as well as whether this RPC should be merged with the YANG model defined in [TE-TUNNEL]. 6.1. YANG model for stateless TE path computation 6.1.1. YANG Tree Figure 9 below shows the tree diagram of the YANG model defined in module ietf-te-path-computation.yang. module: ietf-te-path-computation +--ro path* [path-id] | +--ro _telink* [link-ref] | | +--ro link-ref -> /nd:networks/network[nd:network- id=current()/../network-ref]/lnk:link/link-id | | +--ro network-ref? -> /nd:networks/network/network-id | +--ro _routingConstraint | | +--ro requestedCapacity? decimal64 | | +--ro pathConstraints | | | +--ro path-constraints | | | +--ro topology-id? te-types:te-topology-id | | | +--ro cost-limit? uint32 | | | +--ro hop-limit? uint8 | | | +--ro metric-type? identityref | | | +--ro tiebreaker-type? identityref | | | +--ro ignore-overload? boolean | | | +--ro path-affinities {named-path-affinities}? | | | | +--ro (style)? | | | | +--:(values) | | | | | +--ro value? uint32 | | | | | +--ro mask? uint32 | | | | +--:(named) | | | | +--ro constraints* [usage] | | | | +--ro usage identityref | | | | +--ro constraint Busi, Belotti, et al. Expires May 15, 2017 [Page 20] Internet-DraftYang model for requesting Path Computation November 2016 | | | | +--ro affinity-names* [name] | | | | +--ro name string | | | +--ro path-srlgs | | | +--ro (style)? | | | +--:(values) | | | | +--ro usage? identityref | | | | +--ro values* te-types:srlg | | | +--:(named) | | | +--ro constraints* [usage] | | | +--ro usage identityref | | | +--ro constraint | | | +--ro srlg-names* [name] | | | +--ro name string | | +--ro _avoidTopology | | +--ro provider-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:provider-id | | +--ro client-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:client-id | | +--ro te-topology-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:te-topology-id | | +--ro network-ref? -> /nw:networks/network/network-id | +--ro path-id yang-types:uuid +--rw pathComputationService +--ro _path-ref* -> /path/path-id +--rw _servicePort | +--ro src-tp-ref | | +--ro tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | +--ro node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | +--ro network-ref? -> /nd:networks/network/network-id | +--ro dst-tp-ref Busi, Belotti, et al. Expires May 15, 2017 [Page 21] Internet-DraftYang model for requesting Path Computation November 2016 | | +--ro tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | +--ro node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | +--ro network-ref? -> /nd:networks/network/network-id | +--ro serviceLayer | +--ro switching-capability? identityref | +--ro encoding? identityref | +--ro inter-layer-lock-id? uint32 | +--ro protection-type? identityref | +--ro local-link-connectivity* [link-tp-ref] | +--ro link-tp-ref -> ../../../../../nt:termination-point/tp-id | +--ro label-restriction* [inclusive-exclusive label- start] | | +--ro inclusive-exclusive enumeration | | +--ro label-start te- types:generalized-label | | +--ro label-end? te- types:generalized-label | | +--ro range-bitmap? binary | +--ro max-lsp-bandwidth* [priority] | | +--ro priority uint8 | | +--ro bandwidth? te-bandwidth | +--ro max-link-bandwidth? te-bandwidth | +--ro max-resv-link-bandwidth? te-bandwidth | +--ro unreserved-bandwidth* [priority] | | +--ro priority uint8 | | +--ro bandwidth? te-bandwidth | +--ro te-default-metric? uint32 | +--ro te-delay-metric? uint32 | +--ro te-srlgs | +--ro value* te-types:srlg +--rw _routingConstraint | +--ro requestedCapacity? decimal64 | +--ro pathConstraints Busi, Belotti, et al. Expires May 15, 2017 [Page 22] Internet-DraftYang model for requesting Path Computation November 2016 | | +--ro path-constraints | | +--ro topology-id? te-types:te-topology-id | | +--ro cost-limit? uint32 | | +--ro hop-limit? uint8 | | +--ro metric-type? identityref | | +--ro tiebreaker-type? identityref | | +--ro ignore-overload? boolean | | +--ro path-affinities {named-path-affinities}? | | | +--ro (style)? | | | +--:(values) | | | | +--ro value? uint32 | | | | +--ro mask? uint32 | | | +--:(named) | | | +--ro constraints* [usage] | | | +--ro usage identityref | | | +--ro constraint | | | +--ro affinity-names* [name] | | | +--ro name string | | +--ro path-srlgs | | +--ro (style)? | | +--:(values) | | | +--ro usage? identityref | | | +--ro values* te-types:srlg | | +--:(named) | | +--ro constraints* [usage] | | +--ro usage identityref | | +--ro constraint | | +--ro srlg-names* [name] | | +--ro name string | +--ro _avoidTopology | +--ro provider-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:provider-id | +--ro client-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:client-id | +--ro te-topology-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:te-topology-id Busi, Belotti, et al. Expires May 15, 2017 [Page 23] Internet-DraftYang model for requesting Path Computation November 2016 | +--ro network-ref? -> /nw:networks/network/network-id +--rw _objectiveFunction | +--ro objectiveFunction? ObjectiveFunction +--rw _optimizationConstraint +--ro trafficInterruption? DirectiveValue rpcs: +---x statelessComputeP2PPath | +---w input | | +---w servicePort* | | | +---w src-tp-ref | | | | +---w tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | | | +---w node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | | | +---w network-ref? -> /nd:networks/network/network-id | | | +---w dst-tp-ref | | | | +---w tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | | | +---w node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | | | +---w network-ref? -> /nd:networks/network/network-id | | | +---w serviceLayer | | | +---w switching-capability? identityref | | | +---w encoding? identityref | | | +---w inter-layer-lock-id? uint32 | | | +---w protection-type? identityref | | | +---w local-link-connectivity* [link-tp-ref] | | | +---w link-tp-ref -> ../../../../../nt:termination-point/tp-id Busi, Belotti, et al. Expires May 15, 2017 [Page 24] Internet-DraftYang model for requesting Path Computation November 2016 | | | +---w label-restriction* [inclusive-exclusive label-start] | | | | +---w inclusive-exclusive enumeration | | | | +---w label-start te- types:generalized-label | | | | +---w label-end? te- types:generalized-label | | | | +---w range-bitmap? binary | | | +---w max-lsp-bandwidth* [priority] | | | | +---w priority uint8 | | | | +---w bandwidth? te-bandwidth | | | +---w max-link-bandwidth? te-bandwidth | | | +---w max-resv-link-bandwidth? te-bandwidth | | | +---w unreserved-bandwidth* [priority] | | | | +---w priority uint8 | | | | +---w bandwidth? te-bandwidth | | | +---w te-default-metric? uint32 | | | +---w te-delay-metric? uint32 | | | +---w te-srlgs | | | +---w value* te-types:srlg | | +---w routingConstraint | | | +---w requestedCapacity? decimal64 | | | +---w pathConstraints | | | | +---w path-constraints | | | | +---w topology-id? te-types:te-topology-id | | | | +---w cost-limit? uint32 | | | | +---w hop-limit? uint8 | | | | +---w metric-type? identityref | | | | +---w tiebreaker-type? identityref | | | | +---w ignore-overload? boolean | | | | +---w path-affinities {named-path-affinities}? | | | | | +---w (style)? | | | | | +--:(values) | | | | | | +---w value? uint32 | | | | | | +---w mask? uint32 | | | | | +--:(named) | | | | | +---w constraints* [usage] | | | | | +---w usage identityref | | | | | +---w constraint Busi, Belotti, et al. Expires May 15, 2017 [Page 25] Internet-DraftYang model for requesting Path Computation November 2016 | | | | | +---w affinity-names* [name] | | | | | +---w name string | | | | +---w path-srlgs | | | | +---w (style)? | | | | +--:(values) | | | | | +---w usage? identityref | | | | | +---w values* te-types:srlg | | | | +--:(named) | | | | +---w constraints* [usage] | | | | +---w usage identityref | | | | +---w constraint | | | | +---w srlg-names* [name] | | | | +---w name string | | | +---w _avoidTopology | | | +---w provider-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:provider-id | | | +---w client-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:client-id | | | +---w te-topology-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:te-topology-id | | | +---w network-ref? -> /nw:networks/network/network-id | | +---w objectiveFunction | | +---w objectiveFunction? ObjectiveFunction | +--ro output | +--ro pathCompService | +--ro _path-ref* -> /path/path-id | +--ro _servicePort | | +--ro src-tp-ref | | | +--ro tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | | +--ro node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id Busi, Belotti, et al. Expires May 15, 2017 [Page 26] Internet-DraftYang model for requesting Path Computation November 2016 | | | +--ro network-ref? -> /nd:networks/network/network-id | | +--ro dst-tp-ref | | | +--ro tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | | +--ro node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | | +--ro network-ref? -> /nd:networks/network/network-id | | +--ro serviceLayer | | +--ro switching-capability? identityref | | +--ro encoding? identityref | | +--ro inter-layer-lock-id? uint32 | | +--ro protection-type? identityref | | +--ro local-link-connectivity* [link-tp-ref] | | +--ro link-tp-ref -> ../../../../../nt:termination-point/tp-id | | +--ro label-restriction* [inclusive-exclusive label-start] | | | +--ro inclusive-exclusive enumeration | | | +--ro label-start te- types:generalized-label | | | +--ro label-end? te- types:generalized-label | | | +--ro range-bitmap? binary | | +--ro max-lsp-bandwidth* [priority] | | | +--ro priority uint8 | | | +--ro bandwidth? te-bandwidth | | +--ro max-link-bandwidth? te-bandwidth | | +--ro max-resv-link-bandwidth? te-bandwidth | | +--ro unreserved-bandwidth* [priority] | | | +--ro priority uint8 | | | +--ro bandwidth? te-bandwidth | | +--ro te-default-metric? uint32 | | +--ro te-delay-metric? uint32 | | +--ro te-srlgs Busi, Belotti, et al. Expires May 15, 2017 [Page 27] Internet-DraftYang model for requesting Path Computation November 2016 | | +--ro value* te-types:srlg | +--ro _routingConstraint | | +--ro requestedCapacity? decimal64 | | +--ro pathConstraints | | | +--ro path-constraints | | | +--ro topology-id? te-types:te-topology- id | | | +--ro cost-limit? uint32 | | | +--ro hop-limit? uint8 | | | +--ro metric-type? identityref | | | +--ro tiebreaker-type? identityref | | | +--ro ignore-overload? boolean | | | +--ro path-affinities {named-path-affinities}? | | | | +--ro (style)? | | | | +--:(values) | | | | | +--ro value? uint32 | | | | | +--ro mask? uint32 | | | | +--:(named) | | | | +--ro constraints* [usage] | | | | +--ro usage identityref | | | | +--ro constraint | | | | +--ro affinity-names* [name] | | | | +--ro name string | | | +--ro path-srlgs | | | +--ro (style)? | | | +--:(values) | | | | +--ro usage? identityref | | | | +--ro values* te-types:srlg | | | +--:(named) | | | +--ro constraints* [usage] | | | +--ro usage identityref | | | +--ro constraint | | | +--ro srlg-names* [name] | | | +--ro name string | | +--ro _avoidTopology | | +--ro provider-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:provider-id Busi, Belotti, et al. Expires May 15, 2017 [Page 28] Internet-DraftYang model for requesting Path Computation November 2016 | | +--ro client-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:client-id | | +--ro te-topology-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:te-topology-id | | +--ro network-ref? -> /nw:networks/network/network-id | +--ro _objectiveFunction | | +--ro objectiveFunction? ObjectiveFunction | +--ro _optimizationConstraint | +--ro trafficInterruption? DirectiveValue +---x optimizeP2PPath +---w input | +---w pathIdOrName? string | +---w routingConstraint | | +---w requestedCapacity? decimal64 | | +---w pathConstraints | | | +---w path-constraints | | | +---w topology-id? te-types:te-topology-id | | | +---w cost-limit? uint32 | | | +---w hop-limit? uint8 | | | +---w metric-type? identityref | | | +---w tiebreaker-type? identityref | | | +---w ignore-overload? boolean | | | +---w path-affinities {named-path-affinities}? | | | | +---w (style)? | | | | +--:(values) | | | | | +---w value? uint32 | | | | | +---w mask? uint32 | | | | +--:(named) | | | | +---w constraints* [usage] | | | | +---w usage identityref | | | | +---w constraint | | | | +---w affinity-names* [name] | | | | +---w name string | | | +---w path-srlgs | | | +---w (style)? | | | +--:(values) Busi, Belotti, et al. Expires May 15, 2017 [Page 29] Internet-DraftYang model for requesting Path Computation November 2016 | | | | +---w usage? identityref | | | | +---w values* te-types:srlg | | | +--:(named) | | | +---w constraints* [usage] | | | +---w usage identityref | | | +---w constraint | | | +---w srlg-names* [name] | | | +---w name string | | +---w _avoidTopology | | +---w provider-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:provider-id | | +---w client-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:client-id | | +---w te-topology-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:te-topology-id | | +---w network-ref? -> /nw:networks/network/network-id | +---w optimizationConstraint | | +---w trafficInterruption? DirectiveValue | +---w objectiveFunction | +---w objectiveFunction? ObjectiveFunction +--ro output +--ro pathCompService +--ro _path-ref* -> /path/path-id +--ro _servicePort | +--ro src-tp-ref | | +--ro tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | +--ro node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | +--ro network-ref? -> /nd:networks/network/network-id | +--ro dst-tp-ref Busi, Belotti, et al. Expires May 15, 2017 [Page 30] Internet-DraftYang model for requesting Path Computation November 2016 | | +--ro tp-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node[nd:node-id=current()/../node-ref]/lnk:termination- point/tp-id | | +--ro node-ref? -> /nd:networks/network[nd:network-id=current()/../network- ref]/node/node-id | | +--ro network-ref? -> /nd:networks/network/network-id | +--ro serviceLayer | +--ro switching-capability? identityref | +--ro encoding? identityref | +--ro inter-layer-lock-id? uint32 | +--ro protection-type? identityref | +--ro local-link-connectivity* [link-tp-ref] | +--ro link-tp-ref -> ../../../../../nt:termination-point/tp-id | +--ro label-restriction* [inclusive-exclusive label-start] | | +--ro inclusive-exclusive enumeration | | +--ro label-start te- types:generalized-label | | +--ro label-end? te- types:generalized-label | | +--ro range-bitmap? binary | +--ro max-lsp-bandwidth* [priority] | | +--ro priority uint8 | | +--ro bandwidth? te-bandwidth | +--ro max-link-bandwidth? te-bandwidth | +--ro max-resv-link-bandwidth? te-bandwidth | +--ro unreserved-bandwidth* [priority] | | +--ro priority uint8 | | +--ro bandwidth? te-bandwidth | +--ro te-default-metric? uint32 | +--ro te-delay-metric? uint32 | +--ro te-srlgs | +--ro value* te-types:srlg +--ro _routingConstraint | +--ro requestedCapacity? decimal64 Busi, Belotti, et al. Expires May 15, 2017 [Page 31] Internet-DraftYang model for requesting Path Computation November 2016 | +--ro pathConstraints | | +--ro path-constraints | | +--ro topology-id? te-types:te-topology- id | | +--ro cost-limit? uint32 | | +--ro hop-limit? uint8 | | +--ro metric-type? identityref | | +--ro tiebreaker-type? identityref | | +--ro ignore-overload? boolean | | +--ro path-affinities {named-path-affinities}? | | | +--ro (style)? | | | +--:(values) | | | | +--ro value? uint32 | | | | +--ro mask? uint32 | | | +--:(named) | | | +--ro constraints* [usage] | | | +--ro usage identityref | | | +--ro constraint | | | +--ro affinity-names* [name] | | | +--ro name string | | +--ro path-srlgs | | +--ro (style)? | | +--:(values) | | | +--ro usage? identityref | | | +--ro values* te-types:srlg | | +--:(named) | | +--ro constraints* [usage] | | +--ro usage identityref | | +--ro constraint | | +--ro srlg-names* [name] | | +--ro name string | +--ro _avoidTopology | +--ro provider-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:provider-id | +--ro client-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:client-id Busi, Belotti, et al. Expires May 15, 2017 [Page 32] Internet-DraftYang model for requesting Path Computation November 2016 | +--ro te-topology-ref? -> /nw:networks/network[nw:network-id = current()/../network- ref]/tet:te-topology-id | +--ro network-ref? -> /nw:networks/network/network-id +--ro _objectiveFunction | +--ro objectiveFunction? ObjectiveFunction +--ro _optimizationConstraint +--ro trafficInterruption? DirectiveValue Figure 9 - TE path computation tree 6.1.2. YANG Module file " ietf-te-path-computation.yang " module ietf-te-path-computation { yang-version 1.1; namespace "urn:ietf:params:xml:ns:yang:ietf-te-path-computation"; // replace with IANA namespace when assigned prefix "tepc"; import ietf-yang-types { prefix "yang-types"; } import ietf-te-types { prefix "te-types"; } import ietf-te-topology { prefix "tet"; } import ietf-network-topology { prefix "nt"; } Busi, Belotti, et al. Expires May 15, 2017 [Page 33] Internet-DraftYang model for requesting Path Computation November 2016 organization "Traffic Engineering Architecture and Signaling (TEAS) Working Group"; contact "WG Web: WG List: WG Chair: Lou Berger WG Chair: Vishnu Pavan Beeram "; description "YANG model for stateless TE path computation"; revision "2016-10-10" { description "Initial revision"; reference "YANG model for stateless TE path computation"; } /* * Features */ feature stateless-path-computation { description "This feature indicates that the system supports stateless path computation."; } /* * Typedefs */ typedef DirectiveValue { type enumeration { Busi, Belotti, et al. Expires May 15, 2017 [Page 34] Internet-DraftYang model for requesting Path Computation November 2016 enum MINIMIZE { description "Minimize directive."; } enum MAXIMIZE { description "Maximize directive."; } enum ALLOW { description "Allow directive."; } enum DISALLOW { description "Disallow directive."; } enum DONT_CARE { description "Don't care directive."; } } description "Value to determine optimization type."; } typedef ObjectiveFunction { type enumeration { enum MCP { description "MCP."; } enum MLP { description "MLP."; } enum MBP { description "MBP."; } enum MBC { description "MBC."; } enum MLL { description "MLL."; } enum MCC { description "MCC."; } Busi, Belotti, et al. Expires May 15, 2017 [Page 35] Internet-DraftYang model for requesting Path Computation November 2016 } description "RFC 5541 - Encoding of Objective Functions in the Path Computation Element Communication Protocol (PCEP)"; } /* * Groupings */ grouping Path { list _telink { key 'link-ref'; config false; uses nt:link-ref; description "List of telink refs."; } container _routingConstraint { config false; uses RoutingConstraint; description "Extended routing constraints."; } leaf path-id { type yang-types:uuid; config false; description "path-id ref."; } description "Path is described by an ordered list of TE Links."; } grouping PathCompServicePort { container src-tp-ref { uses nt:tp-ref; config false; description "Source termination point reference."; } container dst-tp-ref { uses nt:tp-ref; config false; description "Destination termination point reference."; Busi, Belotti, et al. Expires May 15, 2017 [Page 36] Internet-DraftYang model for requesting Path Computation November 2016 } /**leaf direction { type PortDirection; config false; description "The orientation of defined flow."; }*/ container serviceLayer { uses tet:te-node-tunnel-termination-attributes; config false; description "Service Layer."; } description "Path Computation Service Port grouping."; } grouping PathComputationService { leaf-list _path-ref { type leafref { path '/path/path-id'; } config false; description "List of previously computed path references."; } container _servicePort { uses PathCompServicePort; description "Path Computation Service Port."; } container _routingConstraint { uses RoutingConstraint; description "Routing constraints."; } container _objectiveFunction { uses PathObjectiveFunction; description "Path Objective Function."; } container _optimizationConstraint { uses PathOptimizationConstraint; description "Path Optimization Constraint."; } description "Path computation service."; Busi, Belotti, et al. Expires May 15, 2017 [Page 37] Internet-DraftYang model for requesting Path Computation November 2016 } grouping PathObjectiveFunction { leaf objectiveFunction { type ObjectiveFunction; config false; description "Objective Function."; } description "Path Objective Function."; } grouping PathOptimizationConstraint { leaf trafficInterruption { type DirectiveValue; config false; description "Traffic Interruption."; } description "Path Optimization Constraint."; } grouping RoutingConstraint { leaf requestedCapacity { type decimal64 { fraction-digits 2; } config false; description "Capacity required for connectivity service."; } container pathConstraints { config false; uses te-types:path-constraints; description "Service connectivity path selection properties"; } // path-constaints contains include topology /*leaf _includeTopology { uses te-types:te-topology-ref; config false; }*/ container _avoidTopology { Busi, Belotti, et al. Expires May 15, 2017 [Page 38] Internet-DraftYang model for requesting Path Computation November 2016 uses tet:te-topology-ref; config false; description "Topology to be avoided."; } // path-constrains already include/exclude path /*list _includePath { key 'link-ref'; config false; uses nt:link-ref; }*/ /*list _excludePath { key 'link-ref'; config false; uses nt:link-ref; }*/ description "Extended routing constraints. Created to align with path-constaints."; } /* * Lists */ list path { key "path-id"; uses Path; config false; description "List of previous computed paths."; } container pathComputationService { uses PathComputationService; description "Service for computing paths."; } /*********************** * package Interfaces **********************/ rpc statelessComputeP2PPath { description "statelessComputeP2PPath"; Busi, Belotti, et al. Expires May 15, 2017 [Page 39] Internet-DraftYang model for requesting Path Computation November 2016 input { list servicePort { min-elements 2; max-elements 2; uses PathCompServicePort; description "List of service ports."; } container routingConstraint { uses RoutingConstraint; description "routing constraint."; } container objectiveFunction { uses PathObjectiveFunction; description "objective function."; } } output { container pathCompService { uses PathComputationService; description "Path computation service."; } } } /**rpc computeP2PPath { input { list servicePort { min-elements 2; max-elements 2; uses PathCompServicePort; } container routingConstraint { uses RoutingConstraint; } container objectiveFunction { uses PathObjectiveFunction; } } output { Busi, Belotti, et al. Expires May 15, 2017 [Page 40] Internet-DraftYang model for requesting Path Computation November 2016 container pathCompService { uses PathComputationService; } } }*/ rpc optimizeP2PPath { description "optimizeP2PPath."; input { leaf pathIdOrName { type string; description "path id or path name."; } container routingConstraint { uses RoutingConstraint; description "routing constraint."; } container optimizationConstraint { uses PathOptimizationConstraint; description "optimizationConstraint."; } container objectiveFunction { uses PathObjectiveFunction; description "objective function."; } } output { container pathCompService { uses PathComputationService; description "path computation service."; } } } /**rpc deleteP2PPath { input { leaf pathIdOrName { type string; } Busi, Belotti, et al. Expires May 15, 2017 [Page 41] Internet-DraftYang model for requesting Path Computation November 2016 } output { container pathCompService { uses PathComputationService; } } }*/ } Figure 10 - TE path computation YANG module 7. Security Considerations This is for further study 8. IANA Considerations This document requires no IANA actions. 9. References 9.1. Normative References [RFC7926] Farrel, A. et al., "Problem Statement and Architecture for Information Exchange Between Interconnected Traffic Engineered Networks", RFC 7926, July 2016. [TE-TOPO] Liu, X. et al., "YANG Data Model for TE Topologies", draft-ietf-teas-yang-te-topo, work in progress. [TE-TUNNEL] Xhang, X. et al., "A YANG Data Model for Traffic Engineering Tunnels and Interfaces", draft-ietf-teas-yang- te, work in progress. 9.2. Informative References [RFC7446] Lee, Y. et al., "Routing and Wavelength Assignment Information Model for Wavelength Switched Optical Networks", RFC 7446, February 2015. Busi, Belotti, et al. Expires May 15, 2017 [Page 42] Internet-DraftYang model for requesting Path Computation November 2016 [L1-TOPO] Zhang, X. et al., "A YANG Data Model for Layer 1 (ODU) Network Topology", draft-zhang-ccamp-l1-topo-yang, work in progress. [ACTN-Frame] D, Ceccarelli and Y. Lee (editors), "Framework for Abstraction and Control of Transport Networks," draft- ceccarelli-actn-framework, work in progress. [ACTN-Info] Y. Lee and S. Belotti, D. Dhody and D. Ceccarelli, "Information Model for Abstraction and Control of Transport Networks", draft-leebelotti-actn-info, work in progress. 10. Acknowledgments The authors would like to thank Igor Bryskin and Xian Zhang for participating in discussions and providing valuable insights. This document was prepared using 2-Word-v2.0.template.dot. Busi, Belotti, et al. Expires May 15, 2017 [Page 43] Internet-DraftYang model for requesting Path Computation November 2016 Contributors Dieter Beller Nokia Email: dieter.beller@nokia.com Authors' Addresses Italo Busi Huawei Email: italo.busi@huawei.com Sergio Belotti Nokia Email: sergio.belotti@nokia.com Victor Lopez Telefonica Email: victor.lopezalvarez@telefonica.com Oscar Gonzalez de Dios Telefonica Email: oscar.gonzalezdedios@telefonica.com Anurag Sharma Infinera Email: AnSharma@infinera.com Yan Shi China Unicom Email: shiyan49@chinaunicom.cn Ricard Vilalta CTTC Email: ricard.vilalta@cttc.es Busi, Belotti, et al. Expires May 15, 2017 [Page 44] Internet-DraftYang model for requesting Path Computation November 2016 Karthik Sethuraman NEC Email: karthik.sethuraman@necam.com Michael Scharf Nokia Email: michael.scharf@nokia.com Daniele Ceccarelli Ericsson Email: daniele.ceccarelli@ericsson.com Busi, Belotti, et al. Expires May 15, 2017 [Page 45]