Internet DRAFT - draft-belotti-app-statement-l1vpn-em
draft-belotti-app-statement-l1vpn-em
Network Working Group Sergio Belotti
Internet Draft Don Fedyk
Intended status: Informational Dimitri Papadimitriou
Alcatel-Lucent
Daniele Ceccarelli
Ericsson
Fatai Zhang
Huawei Technologies
Yuji Tochio
Fujitsu
Expires: Dec 2013 June 6, 2013
Applicability Statement for Layer 1 Virtual Private Network (L1VPN)
Enhanced Mode
draft-belotti-app-statement-l1vpn-em-02.txt
Abstract
This document provides an applicability statement on the use of
Generalized Multiprotocol Label Switching (GMPLS) protocols and
mechanisms to satisfy the requirements of the Layer 1 Virtual
Private Network (L1VPN) Enhanced Mode.
L1VPNs provide customer services and connectivity at layer 1 over
layer 1 networks. The operation of L1VPNs is divided into the Basic
Mode and the Enhanced Mode, where the Enhanced Mode of operation may
also include exchange of routing information between the layer 1
network and the customer domain.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress".
Belotti and al. Expires December 6, 2013 [Page 1]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright Notice and License Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Belotti and al. Expires December 6, 2013 [Page 2]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
Table of Contents
1. Introduction................................................3
2. Conventions Used in This Document............................4
3. Terminology.................................................4
4. Existing Solutions..........................................4
5. General Guidelines..........................................4
6. Overlay Extension Service Model..............................6
6.1. Overview of the Service Model...........................6
6.2. Applicability of Existing Solutions.....................6
6.3. Incremental protocol extensions.........................7
7. Virtual Node Service Model...................................7
7.1. Overview of the Service Model...........................7
7.2. Applicability of Existing Solutions.....................8
8. Virtual Link Service Model...................................8
8.1. Overview of the Service Model...........................8
8.2. Applicability of Existing Solutions.....................8
9. Per-VPN Peer Service Model...................................8
9.1. Overview of the Service Model...........................8
9.2. Applicability of Existing Solutions.....................9
10. Manageability Considerations................................9
11. Security Considerations....................................9
12. IANA Considerations........................................9
13. References................................................10
13.1. Normative References..................................10
13.2. Informative References................................10
14. Acknowledgments...........................................12
15. Author's Addresses........................................12
1. Introduction
This document provides an applicability statement on the use of
existing Generalized Multiprotocol Label Switching (GMPLS) protocols
and mechanisms to the Layer 1 Virtual Private Network (L1VPN)
Enhanced Mode.
In particular, this document shows section by section (from Section
5 to 8) the applicability of GMPLS protocols and mechanisms to each
sub-model of the Enhanced Mode mentioned in [RFC4847].
Note that discussion in this document is limited to areas where
GMPLS protocols and mechanisms are relevant.
As will be described in this document, support of the Overlay
Extension service model and the Virtual Node service model are well
Belotti and al. Expires December 6, 2013 [Page 3]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
covered by existing protocol mechanisms already described in other
documents, with only minor protocol extensions required. The Virtual
Link service model and the Per-VPN Peer service model are not
explicitly covered by existing documents, and would require
extension of current GMPLS protocols and mechanisms
Solutions should be scalable and manageable per RFC 4847. Solutions
should not require L1VPN state to be maintained on the P devices as
much as possible.
2. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
3. Terminology
The reader is assumed to be familiar with the terminology in
[RFC3031], [RFC3209], [RFC3471], [RFC3473], [RFC4202], [RFC4026] and
[RFC4847], [RFC4874], [RFC5251], [RFC5253], [RFC5252] and [RFC4208].
4. Existing Solutions
This section lists existing solution documents that describe how the
L1VPN Enhanced Mode may be constructed using the mechanisms of
GMPLS. This document draws on those solutions and explains their
applicability with respect to the framework described in [RFC4847].
Further solution documents may be listed in a future version of this
document.
- [RFC5251] addresses L1VPN Basic Mode signaling.
- [RFC4208] addresses the application of GMPLS to the Overlay model.
- [RFC5252] describes OSPF based autodiscovery mechanisms.
Note that although [RFC5251] specifies signaling mechanisms for
L1VPN Basic Mode, it is applicable to the L1VPN Enhanced Mode,
unless otherwise specified.
5. General Guidelines
This section provides general guidelines for L1VPN solutions. Note
Belotti and al. Expires December 6, 2013 [Page 4]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
that applicability to specific sub-models will be separately
described in following sections. One important general design
guideline is that protocol mechanisms should be re-used where
possible. This means that solutions should be incremental, building
on existing protocol mechanisms rather than developing wholly new
protocols. Further, as service models are extended or developed
resulting in the requirement for additional functionalities, deltas
should be added to the protocol mechanisms rather than developing
new techniques. [RFC4847] describes how the service models can be
seen to provide "cascaded" functionality, and this should be
leveraged to achieve re-use of protocol extensions so that, for
example, it is highly desirable that the same signaling protocols
and extensions are used in both the Basic Mode and the Enhanced
Mode.
In addition, the following are general guidelines:
- The support of L1VPNs should not necessitate any change to core
(P)devices. Therefore, any protocol extensions made to facilitate
L1VPNs need to be made in a backward compatible way allowing GMPLS
aware P devices to continue to function.
- Customer (C) devices not directly involved in providing L1VPN
- Services should also be protected from protocol extensions made to
support L1VPNs. Again, such protocol extensions need to be
backwards compatible. Note however, that some L1VPN service models
allow for VPN connectivity between C devices rather than between
CE devices: in this case, the C devices may need to be aware of
protocol extensions.
- Solutions should aim to minimize the protocol extensions on CE
devices.
- Solutions should be scalable and manageable per RFC 4847.
Solutions should not require L1VPN state to be maintained on the P
devices as much as possible.
- Solutions should be secure. Providers should be able to screen and
protect information based on their operational policies per RFC
4847.
- Solutions should provide an operational view of the L1VPN for the
customer and provider. There should be a common operational and
management perspective in regard to other (L2 and L3) VPN services
per RFC 4847.
Belotti and al. Expires December 6, 2013 [Page 5]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
6. Overlay Extension Service Model
6.1. Overview of the Service Model
This service model complements the Basic Mode and may assume all of
the requirements, solutions and work items for that model.
In this service model, a CE receives from its attached PEs a list of
TE link addresses to which it can request a VPN connection (i.e.,
membership information).
The CE may also receive some TE information concerning these CE-PE
links within the VPN (e.g., switching type).
Further information may be found in [draft-fedyk-ccamp-l1vpn-extnd-
overlay].
The CE does not receive any of the following from the PE:
- Routing information about the core provider network.
- Information about P device addresses.
- Information about P-P, PE-P or PE-PE TE links.
- Routing information about other customer sites. The CE may have
access to routing information about the remainder of the VPN (C-C
and CE-C links), but this is exchanged by control plane tunneling
on the CE-CE connections and is not passed to the CE in the
control plane exchange between PE and CE.
6.2. Applicability of Existing Solutions
The following are required in this service model (in addition to
requirements in the L1VPN Basic Mode:
- Interactions between an edge node (CE) and it's adjacent (at the
data plane) core-node (PE).
- VPN membership information exchange between a CE and PE.
- CE-PE TE link information exchange between a CE and a PE.
RFC 4208 addresses RSVP-TE procedures between an edge-node and a
core-node in the overlay model. RFC5252 enables PE devices using
OSPF to dynamically learn about the existence of each other, and
Belotti and al. Expires December 6, 2013 [Page 6]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
attributes of configured CE links and their association with L1VPNs.
Furthermore, [RFC5252] allows the exchange of CE-PE TE link
information between a CE and a PE.
6.3. Incremental protocol extensions
It can be useful for the ingress node to be able to convey TE
metrics (e.g., IGP metric, TE metric, hop counts, latency, etc.)
that the path computation algorithm (at the remote node performing
route computation or expansion) can optimize for. Similarly, it can
be useful for the ingress node to be able to indicate a TE metric
bound for the loose segment being expanded by the remote node,
(e.g., [DRAFT-TE-METRIC-BOUND]).
In a similar manner, as described in [DRAFT-TE-METRIC-RECORD], there
are RSVP-TE requirements for the support of the automatic discovery
of cost, latency and latency variation attributes of an LSP. These
requirements are very similar to the requirement for discovering the
Shared Risk Link Groups (SRLGs) associated with the route taken by
an LSP (e.g., [DRAFT-SRLG-RECORDING]).
It is also possible to improve route diversity for single-homed and
dual-homed customer LSPs, which is a common requirement. This may
be achieved via signaling extensions that provide shared constraint
information for path diversity. Specifically, mechanisms that
enable communication to the node computing/expanding the LSP
signaled, information to exclude the route taken by a particular LSP
or the route taken by all LSPs belonging to a single tunnel(e.g.,
[DRAFT-DIV-LATENCY-EXT]).
7. Virtual Node Service Model
7.1. Overview of the Service Model
In this service model, there is a private routing exchange between
the CE and the PE, or to be more precise between the CE routing
protocol instance and the VPN routing protocol instance running on
the PE. The provider network is considered as one private node from
the customer's perspective. The routing information exchanged
between the CE and the PE includes CE-PE TE link information,
customer network (i.e., remote CE sites), and may include TE links
(Forwarding Adjacencies) connecting CEs (or Cs) across the provider
network as well as control plane topology information from the
customer network (i.e., CE sites).
Belotti and al. Expires December 6, 2013 [Page 7]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
7.2. Applicability of Existing Solutions
The following are required in this service model:
- VPN routing
- CE-CE Label Switching Path (LSP) setup, deletion, and modification
signaling.
It is possible to use IGP-based auto-discovery (based on [RFC5252]).
Signaling mechanisms are covered by [RFC5251].
8. Virtual Link Service Model
8.1. Overview of the Service Model
In this service model, virtual links are established between PEs. A
virtual link is assigned to each VPN and disclosed to the
corresponding CEs. The routing information exchanged between the CE
and the PE includes CE-PE TE links, customer network (i.e., remote
CE sites), virtual links (i.e., PE-PE links) assigned to each VPN,
and may include CE-CE (or C-C) Forwarding Adjacencies as well as
control plane topology from the customer network (i.e., CE sites).
NOTE - Resource management for a dedicated data plane is a
mandatory requirement for the Virtual Link service model. This
could be realized by assigning pre-configured FA-LSPs to each VPN
routing protocol instance (no protocol extensions needed) in order
to instantiate the necessary FAs.
8.2. Applicability of Existing Solutions
Currently, there is no solution document for this type of service
model.
9. Per-VPN Peer Service Model
9.1. Overview of the Service Model
In this service model, the provider partitions TE links within the
provider network per VPN. The routing information exchanged between
the CE and the PE includes CE-PE TE links, customer network (i.e.,
Belotti and al. Expires December 6, 2013 [Page 8]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
remote CE sites), as well as partitioned portions of the provider
network, and may include CE-CE (or C-C) Forwarding Adjacencies and
control plane topology from customer network (i.e., CE sites). Note
that PEs may abstract routing information about the provider network
and advertise it to CEs.
Note scalability must be carefully considered for advertising
provider network routing information to the CE [RFC4726].
9.2. Applicability of Existing Solutions
Currently, there is no solution document for this type of service
model.
10. Manageability Considerations
Section 11 of [RFC4847] describes manageability considerations for
L1VPNs.
This document defines a following new manageability requirement
specific for the L1VPN Enhanced Mode.
MIB modules MUST be available for any protocol extensions for the
L1VPN Enhanced Mode.
A future revision of this document may cover more aspects.
11. Security Considerations
Section 12 of [RFC4847] describes security considerations for
L1VPNs. This document defines a following new security requirements
specific for the L1VPN Enhanced Mode.
In the L1VPN Enhanced Mode, since there is a routing adjacency
between a CE and a PE, care must be taken whether the provider
network's control plane topology information is leaked to the CE.
Due to security concerns, this is not recommended in general, and
there must be a mechanism to prevent such operation. A future
revision of this document may cover more aspects.
12. IANA Considerations
This document requires no IANA actions.
Belotti and al. Expires December 6, 2013 [Page 9]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
13. References
13.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC4208] Swallow, G., et al., "Generalize Multiprotocol Label
Switching(GMPLS) User-Network Interface: Resource
ReserVation Protocol-Traffic Engineering(RSVP-TE)
Support for the Overlay Model," RFC 4208, October
2005.
[RFC4847] Takeda, T., Editor "Framework and Requirements Layer
1 Virtual Private Networks", RFC 4847,
[RFC5251] Fedyk, D., et al., "Layer 1 VPN Basic Mode", RFC
5251, July 2008.
[RFC5252] Bryskin, I., Berger, L., "OSPF-Based Layer 1 VPN
Auto-Discovery", RFC 5252, July 2008.
[RFC5253] Takeda, T. et al., "Applicability Statement for Layer
1 Virtual Private Network (L1VPN) Basic Mode", RFC
5253, July 2008.
13.2. Informative References
[Y.1312] Y.1312 - Layer 1 Virtual Private Network Generic
requirements and architecture elements, ITU-T
Recommendation, September 2003.
[Y.1313] Y.1313 - Layer 1 Virtual Private Network service and
network architectures, ITU-T Recommendation, July
2004.
[RFC3031] Rosen, E., Viswanathan, A. and R. Callon,
"Multiprotocol label switching Architecture", RFC
3031, January 2001.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T.,
Srinivasan, V. and G. Swallow, "RSVP-TE Extensions
to RSVP for LSP Tunnels", RFC 3209, December 2001.
Belotti and al. Expires December 6, 2013 [Page 10]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
[RFC3471] Berger, L., Editor, "Generalized Multi-Protocol
Label Switching (GMPLS) Signaling Functional
Description", RFC 3471, January 2003.
[RFC3473] Berger, L., Editor "Generalized Multi-Protocol
Label Switching (GMPLS) Signaling - Resource
ReserVation Protocol-Traffic Engineering (RSVP-TE)
Extensions", RFC 3473, January 2003.
[RFC4202] Kompella, K., et al., "Routing Extensions in Support
of Generalized Multi-Protocol Label Switching
(GMPLS)", RFC 4202, October 2005.
[RFC4026] Anderssion, L., and Madsen, T., "Provider
Provisioned Virtual Private Network (VPN)
Terminology", RFC 4026, March 2005.
[RFC4874] Lee, CY., Farrel, A., and S. De Cnodder, "Exclude
Routes - Extension to Resource ReserVation
Protocol-Traffic Engineering (RSVP-TE)", RFC 874,
April 2007.
[RFC4726] Farrel, A., et al., "A Framework for Inter-Domain
Multiprotocl Label Switching Traffic Engineering",
RFC 4726, November 2006.
[DRAFT-TE-METRIC-BOUND] Ali Z., et al., Resource ReserVation
Protocol - Traffic Engineering (RSVP-TE) extension
for signaling Objective Function and Metric Bound
draft-ali-ccamp-rc-objective-function-metric-bound-
02, work in progress
[DRAFT-SRLG-RECORDING] F. Zhang, D. Li, O. Gonzalez de Dios, C.
Margaria. C, " RSVP-TE Extensions for Collecting
SRLG Information ", draft-ietf-ccamp-rsvp-te-srlg-
collect-02, work in progress.
[DRAFT-TE-METRIC-RECORD] ALI Z.,et al., "Resource ReserVation
Protocol- Traffic Engineering (RSVP-TE) extension
for recording TE Metric of a Label Switched Path",
Belotti and al. Expires December 6, 2013 [Page 11]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
draft-ietf-ccamp-te-metric-recording-01.txt, work
in progress.
[DRAFT-DIV-LATENCY-EXT] Fedyk D., et al., "Layer 1 VPN Enhanced
Mode - Overlay Extension Service Model", draft-
fedyk-ccamp-uni-extension-01, work in progress.
14. Acknowledgments
The authors would like to thank the editor and authors of draft-
ietf-l1vpn-applicability-enhanced-mode (Tomonori Takeda, Hamid Ould-
Brahim, Adrian Farrel, Deborah Brungard) and the members of the
L1VPN working group for their contribution, in recognition that most
of the text in this draft derives from their effort.
The authors would also like to thank Dieter Beller, Lieven Levrau,
and Eve Varma for their contributions to this work.
15. Author's Addresses
Sergio Belotti (Alcatel-Lucent)
VIA TRENTO 30
20059 Vimercate
Italy
Phone: +39 039 686 3033
sergio.belotti@alcatel-lucent.com
Don Fedyk (Alcatel-Lucent)
Groton,MA 01450
United States
Phone: +1 978 467 5645
Email: Donald.Fedyk@alcatel-lucent.com
Dimitri Papadimitriou (Alcatel-Lucent)
Copernicuslaan 50
2018 Antwerp
Belgium
Phone: +32 3 2408491
Belotti and al. Expires December 6, 2013 [Page 12]
Internet-Draft Applicability of L1VPN Enhanced Mode June 2013
Email: dimitri.papadimitriou@alcatel-lucent.com
Daniele Ceccarelli (Ericsson)
Via A. Negrone 1/A
Genova - Sestri Ponente
Italy
Email: daniele.ceccarelli@ericsson.com
Fatai Zhang
Huawei Technologies
F3-5-B R&D Center, Huawei Base
Shenzhen 518129 P.R.China Bantian, Longgang District
Phone: +86-755-28972912
Email: zhangfatai@huawei.com
Yuji Tochio (Fujitsu)
4-1-1 Kamikodanaka, Nakahara-Ku
Kawasaki
Japan
Email: tochio@jp.fujitsu.com
Belotti and al. Expires December 6, 2013 [Page 13]