Internet DRAFT - draft-lee-network-control-function-virtualization
draft-lee-network-control-function-virtualization
Network Working Group Young Lee
Internet Draft Huawei Technologies
Intended status: Informational Greg Bernstein
Expires: April 2014 Grotto Networking
Ning So
Tata Communications
Luyuan Fang
Cisco
Daniele Ceccarelli
Ericsson
Diego Lopez
Telefonica
Oscar Gonzalez de Dios
Telefonica
October 21, 2013
Network Control Function Virtualization for Transport SDN
draft-lee-network-control-function-virtualization-01.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
Lee, et al. Expires April 21, 2014 [Page 1]
Internet-Draft Network Control Function Virtualization October 2013
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 21, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Abstract
This presentation explores the concept of network control function
virtualization for transport SDN to help evolve transport networks
to provide programmable virtual network services with infrastructure
changes to the traditional control plane architecture.
Table of Contents
1. Terminology....................................................3
2. Requirements Language..........................................3
3. Introduction...................................................3
4. Transport SDN Control Architecture.............................4
5. Transport SDN Virtual Network Service..........................6
6. Summary and Conclusion........................................11
7. References....................................................11
7.1. Informative References...................................11
8. Contributors..................................................12
Authors' Addresses...............................................12
Intellectual Property Statement..................................12
Disclaimer of Validity...........................................13
Lee, et al. Expires April21,2014 [Page 2]
Internet-Draft Network Control Function Virtualization October 2013
1. Terminology
This document uses the terminology defined in [RFC4655], and
[RFC5440].
CVI Client-VNC Interface
PNC Physical Network Control
VL virtual Link
VNC Virtual Network Control
VNE Virtual Network Element
VNS Virtual Network Service
VPI VNC-PNC Interface
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Introduction
One of the main drivers for SDN is a physical separation of the
network control plane from the forwarding plane. This separation of
the network control plane from the forwarding plane has been already
achieved with the development of GMPLS/ASON and PCE for transport
networks. In fact, in transport networks such separation of data and
control plane was dictated at the onset due to the very different
natures of the data plane (circuit switched TDM or wavelength) and a
packet switched control plane. The physical separation of the
control plane and the forwarding plane is a major step toward
allowing operators to gain the full control for optimized network
design and operation. Another attraction of SDN technology is its
logically centralized control regime which allows a global view of
the underlying networks under its control. The centralized control
of SDN helps improve network resource utilization from a distributed
network control. Transport networks have long used this centralized
model via network management systems and currently supplement it
with topology and resource status information gathered dynamically
via GMPLS routing. For transport network control, PCE technology is
Lee, et al. Expires April21,2014 [Page 3]
Internet-Draft Network Control Function Virtualization October 2013
essentially equivalent to a logically centralized control for path
computation function. By combining the strength of GMPLS/ASON
[GMPLS] and PCE [PCE], and open standard interfaces, transport
network control plane technology is readily in a position to fully
embrace the SDN concepts.
However, the current transport network control plane technology is
not suitable for virtualization and client programmability, which
are the two of the main drivers for SDN in recent years.
Virtualization refers to allowing the clients to utilize a certain
amount of network resources as if they own them and thus control
their allocated resources in a way most optimal with higher layer or
application processes. This empowerment of client control
facilitates introduction of new services and applications as the
clients are given to create, modify, and delete their virtual
network services. The level of virtual control given to the clients
can vary from a tunnel connecting two end-points to virtual network
elements that consist of a set of virtual nodes and virtual links in
a mesh network topology. As part of the VNS, a client control
concept is added to the traditional VPN along with a client specific
virtual network view. Client control is operated on the view of
virtual network resources allocated to the client. This view is
called abstracted network topology. Such a view may be specific to
the set of client services as well as the particular client. As the
client control is envisioned to support a plethora of applications,
there is another level of virtualization from the client to
individual applications.
4. Transport SDN Control Architecture
To allow virtualization, the network has to provide open,
programmable interfaces in which clients/applications can create,
replace, modify virtual network services in an interactive manner
while having no impact on other network clients. Traditional
transport network infrastructure is not suitable for providing
programmable interfaces to clients. Direct client control of
transport network elements over existing programmable interfaces
(control or management plane) is not perceived as a viable
proposition for transport network providers due to security and
policy concerns among other reasons.
Hence, the need for network control function virtualization where
there is a "virtualizer" that interfaces directly with client
control and translates/allocates resources (from physical to virtual
and vice versa) and creates abstracted network topology for each
client and interacts with physical network connection control
functions (e.g., GMPLS/ASON for provisioning, PCE for path
Lee, et al. Expires April21,2014 [Page 4]
Internet-Draft Network Control Function Virtualization October 2013
computation). The Network control function virtualizer maintains two
interfaces: one interface with physical network control functions
assumed by GMPLS/ASON and PCE, which is termed as VNC-PNC Interface
(VPI); another interface with client control of virtual network,
which is termed as Client-VNC Interface (CVI). Figure 1 depicts the
overall architecture for transport SDN control in which the virtual
network control entity provides network control function
virtualization.
------------------------------------------
| Application Layer |
------------------------------------------
/|\ /|\ /|\
| | \|/ North Bound API
| | ---------------
| \|/ | Client |
| -------------- Control |
\|/ | Client |--------
-------------- Control | /|\
| Client |------- |
| Control | /|\ |
-------------- | |
/|\ | | Client-VNC Interface
| | | (CVI)
\|/ \|/ \|/
----------------------------------
| Virtual Network Control (VNC) |
----------------------------------
/|\
| VNC-PNC Interface (VPI)
\|/
----------------------------------
| Physical Network Control (PNC) |
----------------------------------
/|\
| Control Interface to NEs
\|/
Physical Network Infrastructure
Figure 1: Transport SDN control architecture
Lee, et al. Expires April21,2014 [Page 5]
Internet-Draft Network Control Function Virtualization October 2013
Figure 1 shows that there are multiple client controls which are
independent to each other and that each client supports various
business applications over its NB API. There are layered client-
server relationships in this architecture. As various applications
are clients to client control, client control itself is also a
client to virtual network control; likewise, virtual network control
is also a client to physical network control. This layered
relationship is important in protocol definition work on NB API, CVI
and VPI interfaces as this allows third-party software developers to
program client control and virtual network control functions in such
a way to create, modify and delete virtual network services.
This architecture in Figure 1 is conceptually in alignment with the
Network Functions Virtualization (NFV) architecture [NFV-AF].
5. Transport SDN Virtual Network Service
Virtual Network Service is instantiated by the client control via
the CVI. As client control directly interfaces the application
stratum, it understands multiple application requirements and their
service needs. It is assumed that client control and VNC have the
common knowledge on the end-point interfaces based on their business
negotiation prior to service instantiation. End-point interfaces
refer to client-network physical interfaces that connect client
premise equipment to network provider equipment. Figure 2 shows an
example physical network topology that supports multiple clients. In
this example, client A has three end-points A.1, A.2 and A.3. The
interfaces between clients and transport networks are assumed to be
40G OTU links. For simplicity's sake, all network interfaces are
assumed to be 40G OTU links and all network ports support ODU
switching and grooming on the level of ODU1 and ODU2. Client control
for A provides its traffic demand matrix that describes bandwidth
requirements and other optional QoS parameters (e.g., latency,
diversity requirement, etc.) for each pair of end-point connections.
Figure 2 shows that three independent clients A, B and C provide its
respective traffic demand matrices to the VNC. The physical network
topology shown in Figure 2 is the provider's network topology
created by the PNC's topology creation engine such as the link state
database (LSDB) and Traffic Engineering DB (TEDB) based on control
plane discovery function. This topology is internal to PNC and not
available to the client. What is available to the client is
abstracted network topology (aka, virtual network topology) based on
the negotiated level of abstraction. This is a part of VNS
instantiation between a client control and VNC.
Lee, et al. Expires April21,2014 [Page 6]
Internet-Draft Network Control Function Virtualization October 2013
+------+ +------+ +------+
A.1 ------o o-----------o o----------o o------- A.2
B.1 ------o 1 | | 2 | | 3 |
C.1 ------o o-----------o o----------o o------- B.2
+-o--o-+ +-o--o-+ +-o--o-+
| | | | | |
| | | | | |
| | | | | |
| | +-o--o-+ +-o--o-+
| `-------------o o----------o o------- B.3
| | 4 | | 5 |
`----------------o o----------o o------- C.3
+-o--o-+ +------+
| |
| |
| |
C.2 A.3
Traffic Matrix Traffic Matrix Traffic Matrix
for Client A for Client B for Client C
A.1 A.2 A.3 B.1 B.2 B.3 C.1 C.2 C.3
------------------- ------------------ -----------------
A.1 - 20G 20G B.1 - 40G 40G C.1 - 20G 20G
A.2 20G - 10G B.2 40G - 20G C.2 20G - 10G
A.3 20G 10G - B.3 40G 20G - C.3 20G 10G -
Figure 2: Physical network topology shared with multiple clients
Figure 3 depicts illustrative examples of different level of
topology abstractions that can be provided by the VNC topology
abstraction engine based on physical topology base maintained by the
PNC. The level of topology abstraction is expressed in terms of the
number of virtual network elements (VNEs) and virtual links (VLs).
For example, the abstracted topology for client A shows there are 5
VNEs and 10 VLs. This is by far the most detail topology abstraction
with a minimal link hiding compared to other abstracted topologies
in Figure 3.
Lee, et al. Expires April21,2014 [Page 7]
Internet-Draft Network Control Function Virtualization October 2013
Abstracted Topology for Client A (5 VNEs and 10 VLs)
+------+ +------+ +------+
A.1 ------o o-----------o o----------o o------- A.2
| 1 | | 2 | | 3 |
| | | | | |
+-o----+ +-o----+ +-o----+
| | |
| | |
| | |
| +-o----+ +-o--o-+
| | | | |
| | 4 | | 5 |
`----------------o o----------o |
+----o-+ +------+
|
|
|
A.3
Abstracted Topology for Client B (3 VNEs and 6 VLs)
+------+ +------+
B.1 ------o o-----------------------------o o------ B.2
| 1 | | 3 |
| | | |
+-o----+ +-o----+
\ |
\ |
\ |
`------------------- |
` +-o----+
\ | o------ B.3
\ | 5 |
`-------o |
+------+
Lee, et al. Expires April21,2014 [Page 8]
Internet-Draft Network Control Function Virtualization October 2013
Abstracted Topology for Client C (1 VNE and 3 VLs)
+-------------------------------------------+
| |
| |
C.1 ------o |
| |
| |
| |
| o--------C.3
| |
+--------------------o----------------------+
|
|
|
|
C.2
Figure 3: Topology Abstraction Examples for Clients
As different client has different control/application needs,
abstracted topologies for client B and C, respectively show much
less degree of abstraction. The level of topology abstraction is
determined by the policy (e.g., the granularity level) placed for
the client and/or the path computation results by the PNC's PCE. The
more granular the abstraction topology is, the more control is given
to the client control. If the client controller has applications
that require more granular control of virtual network resources,
then abstracted topology for client A may be the right abstraction
level for such client controller. For instance, if the client is a
third-party virtual service broker/provider, then it would desire
much more sophisticated control of virtual network resources to
support differing application needs. On the other hand, if the
client were only to support simple tunnel services to its
application, then abstracted topology for client C that consists of
one VNE and three VLs would suffice.
Figure 4 shows workflows across client control, VNC and PNC for the
VNS instantiation, topology exchange, and VNS setup. Client control
"owns" a VNS and initiates by providing the instantiation identifier
with the traffic demand matrix with path selection constraints for
Lee, et al. Expires April21,2014 [Page 9]
Internet-Draft Network Control Function Virtualization October 2013
that instance. This VNS instantiation request from Client Control
triggers a path computation request by the virtual PCE (vPCE) agent
in the VNC after VNC's proxy's interlay of this request to the vPCE.
vPCE requests a concurrent path computation request that is
converted based on the traffic demand matrix as part of the VNS
instantiation request from Client Control. Upon receipt of this path
computation request, the PCE in the PNC block computes paths and
updates network topology DB and informs the vPCE agent of the VNC of
the paths and topology updates.
------------------------------------------------------------------
| Client ----------------------------------------------- |
| Control | VNS Control | |
| ----------------------------------------------- |
------------------------------------------------------------------
1.VNS | /|\ 4. Abstracted | /|\
Instantiation | | Topology | |
(instance id, | | | |
Traffic Matr.) | | | | 8. VNS
| | 5. VNS | | Set-up
\|/ | Set-up \|/ | Confirm
------------------------------------------------------------------
| Virtual ----------------------------------------------- |
| Network | VNS Proxy | |
| Control ----------------------------------------------- |
| ----------------------- ----------------------- |
| | vPCE Agent | | vConnection Agent | |
| ----------------------- ----------------------- |
------------------------------------------------------------------
2. Path | /|\ 3. PC Reply | /|\
Computation | | with updated | |
Request | | topology | |
| | 6. Network | |8.Network
| | Provisioning | |Provisioning
\|/ | Request \|/ |Confirm
------------------------------------------------------------------
| Physical ------------- -------------------------- |
| Network | PCE | | Network Provisioning ||
| Control ------------- -------------------------- |
------------------------------------------------------------------
Figure 4. Workflows across Client control, VNC and PNC
It is assumed that the PCE in PNC is a stateful PCE [PCE-S]. vPCE
agent abstracts the network topology into an abstracted topology for
the client based on the agree-upon granularity level. The abstracted
Lee, et al. Expires April21,2014 [Page 10]
Internet-Draft Network Control Function Virtualization October 2013
topology is then passed to the VNS control of the Client Control
block. The Client Control's VNS control computes and assigns virtual
network resources for its applications based on the abstracted
topology and creates VNS setup command to the VNC. The VNC's
vConnection module turns this VN setup command into network
provisioning requests over the network elements using control plane
messages such as GMPLS, etc.
6. Summary and Conclusion
This presentation explores the concept of network control function
virtualization for transport SDN to help evolve transport networks
to provide programmable virtual network services with infrastructure
changes to the traditional control plane architecture. The VNC and
its interfaces with the Client Control and the PNC provide control
plane function virtualization over programmable interfaces such as
virtual network path computation and optimization, topology
abstraction hiding details of physical topology while supporting
service-specific objectives the clients demand, maintaining virtual
network service instances and the states, policy enforcement for
virtual network services. With this evolutionary architecture,
virtual network services can be readily introduced while re-using
physical network control plane functions.
7. References
7.1. Informative References
[PCE] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path
Computation Element (PCE)-Based Architecture", IETF RFC
4655, August 2006.
[PCE-S] Crabbe, E, et. al., "PCEP extension for stateful
PCE",draft-ietf-pce-stateful-pce, work in progress.
[GMPLS] Manning, E., et al., "Generalized Multi-Protocol Label
Switching (GMPLS) Architecture", RFC 3945, October 2004.
Lee, et al. Expires April21,2014 [Page 11]
Internet-Draft Network Control Function Virtualization October 2013
[NFV-AF] "Network Functions Virtualization (NFV); Architectural
Framework", ETSI GS NFV 002 v1.1.1, October 2013.
8. Contributors
Authors' Addresses
Young Lee
Huawei Technologies
5340 Legacy Drive
Plano, TX 75023, USA
Phone: (469)277-5838
Email: leeyoung@huawei.com
Greg Bernstein
Grotto Networking
Fremont, CA, USA
Phone: (510) 573-2237
Email: gregb@grotto-networking.com
Ning So
Email: Ning.So@tatacommunications.com
Luyuan Fang
Email: luyuanf@gmail.com
Daniel Ceccarelli
Email: daniele.ceccarelli@ericsson.com
Diego Lopez
Email: diego@tid.es
Oscar Gonzalez de Dios
Email: ogondio@tid.es
Intellectual Property Statement
The IETF Trust takes no position regarding the validity or scope of
any Intellectual Property Rights or other rights that might be
claimed to pertain to the implementation or use of the technology
described in any IETF Document or the extent to which any license
Lee, et al. Expires April21,2014 [Page 12]
Internet-Draft Network Control Function Virtualization October 2013
under such rights might or might not be available; nor does it
represent that it has made any independent effort to identify any
such rights.
Copies of Intellectual Property disclosures made to the IETF
Secretariat and any assurances of licenses to be made available, or
the result of an attempt made to obtain a general license or
permission for the use of such proprietary rights by implementers or
users of this specification can be obtained from the IETF on-line
IPR repository at http://www.ietf.org/ipr
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
any standard or specification contained in an IETF Document. Please
address the information to the IETF at ietf-ipr@ietf.org.
Disclaimer of Validity
All IETF Documents and the information contained therein are
provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION
HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY,
THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Lee, et al. Expires April21,2014 [Page 13]