Internet DRAFT - draft-lee-teas-actn-poi-applicability

draft-lee-teas-actn-poi-applicability



TEAS Working Group                                               Y. Lee
Internet Draft                                                Futurewei
Intended status: Informational
Expires: December 20, 2019                                D. Ceccarelli
                                                               Ericsson

                                                            J. Tantsura
                                                                 Apstra

                                                          June 20, 2019



     Applicability of ACTN to Support Packet and Optical Integration

                  draft-lee-teas-actn-poi-applicability-00
Abstract

     This document outlines the applicability of Abstraction and
     Control of Traffic Engineered Networks (ACTN) to Packet & Optical
     Integration (POI). It also identifies a number of deployment
     scenarios to support L3VPN and L2VPN in operator's networks and
     provides implementation guidelines.

Status of this Memo

     This Internet-Draft is submitted to IETF in full conformance with
     the provisions of BCP 78 and BCP 79.
     
     Internet-Drafts are working documents of the Internet Engineering
     Task Force (IETF), its areas, and its working groups.  Note that
     other groups may also distribute working documents as Internet-
     Drafts.

     Internet-Drafts are draft documents valid for a maximum of six
     months and may be updated, replaced, or obsoleted by other
     documents at any time.  It is inappropriate to use Internet-Drafts
     as reference material or to cite them other than as "work in
     progress."

     The list of current Internet-Drafts can be accessed at
     http://www.ietf.org/ietf/1id-abstracts.txt

     The list of Internet-Draft Shadow Directories can be accessed at
     http://www.ietf.org/shadow.html.

     This Internet-Draft will expire on December 20, 2019.

Copyright Notice





Lee, et al.             Expires February 2019                  [Page 1]

Internet-Draft        ACTN Applicability to POI               June 2019

     Copyright (c) 2019 IETF Trust and the persons identified as the
     document authors. All rights reserved.
     This document is subject to BCP 78 and the IETF Trust's Legal
     Provisions Relating to IETF Documents
     (http://trustee.ietf.org/license-info) in effect on the date of
     publication of this document.  Please review these documents
     carefully, as they describe your rights and restrictions with
     respect to this document.  Code Components extracted from this
     document must include Simplified BSD License text as described in
     Section 4.e of the Trust Legal Provisions and are provided without
     warranty as described in the Simplified BSD License.

Table of Contents

     1. Introduction.................................................3
      1.1. Requirements Language.....................................3
     2. POI with L2/L3VPN Service Under Single Network Operator Control
     ................................................................3
      2.1. L2/L3VPN/VN Service Request by the Customer...............5
      2.2. Service and Network Orchestration.........................7
      2.3. IP/MPLS Domain Controller and NE Functions...............10
         2.3.1. Scenario A: Shared Tunnel Selection.................10
            2.3.1.1. Domain Tunnel Selection........................11
            2.3.1.2. VPN/VRF Provisioning for L3VPN.................12
            2.3.1.3. VSI Provisioning for L2VPN.....................13
            2.3.1.4. Inter-domain Links Update......................13
            2.3.1.5. End-to-end Tunnel Management...................13
         2.3.2. Scenario B: Isolated VN/Tunnel Establishment........14
      2.4. Optical Domain Controller and NE Functions...............14
      2.5. Orchestrator-Controllers-NEs Communication Protocol Flows16
     3. POI with VN Recursion Under Multiple Network Operators Control
     ...............................................................17
      3.1. Service Request Process between Multiple Operators.......19
      3.2. Service/network Orchestration of Operator 2..............19
     4. Security Considerations.....................................20
     5. IANA Considerations.........................................21
     6. Acknowledgements............................................21
     7. References..................................................21
      7.1. Normative References.....................................21
      7.2. Informative References...................................21
     8. Contributors................................................22
     Authors' Addresses.............................................22




Lee, et al.             Expires December 2019                  [Page 2]

Internet-Draft        ACTN Applicability to POI               June 2019

1. Introduction

     Abstraction and Control of Traffic Engineered Networks (ACTN)
     describes a set of management and control functions used to
     operate one or more TE networks to construct virtual networks that
     can be represented to customers and that are built from
     abstractions of the underlying TE networks so that, for example, a
     link in the customer's network is constructed from a path or
     collection of paths in the underlying networks [RFC8453].

     This document outlines the applicability of Abstraction and
     Control of Traffic Engineered Networks (ACTN) to Packet and
     Optical Integration. It also identifies a number of deployment
     scenarios to support POI in operator's networks and provides
     implementation guidelines.

1.1. Requirements Language

     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
     NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
     in this document are to be interpreted as described in [RFC2119].

2. POI with L2/L3VPN Service Under Single Network Operator Control

     This section provides a number of deployment scenarios for packet
     and optical integration (POI). Specifically, this section provides
     a deployment scenario in which ACTN hierarchy is deployed to
     control a multi-layer and multi-domain network via two IP/MPLS
     PNCs and two Optical PNCs with coordination with L-MDSC. This
     scenario is in the context of an upper layer service configuration
     (e.g. L3VPN) across two AS domains which are transported by two
     transport underlay domains (e.g. OTN).

     The provisioning of the L3VPN service is outside ACTN scope but it
     is worth showing how the L3VPN service provisioning is integrated
     for the end-to-end service fulfilment in ACTN context. An example
     of service configuration function in the Service/Network
     Orchestrator is discussed in [bess-l3vpn].

     Figure 1 shows an ACTN POI Reference Architecture where it shows
     ACTN components as well as non-ACTN components that are necessary
     for the end-to-end service fulfilment. Both IP/MPLS and Optical
     Networks are multi-domain. Each IP/MPLS domain network is
     controlled by its' domain controller and all the optical domains
     are controlled by a hierarchy of optical domain controllers. The
     L-MDSC function of the optical domain controllers provides an
     abstract view of the whole optical network to the Service/Network
     Orchestrator. It is assumed that all these components of the


Lee, et al.             Expires December 2019                  [Page 3]

Internet-Draft        ACTN Applicability to POI               June 2019

     network belong to one single network operator domain under the
     control of the service/network orchestrator.


     Customer
              +-------------------------------+
              |    +-----+    +------------+  |
              |    | CNC |----| Service Op.|  |
              |    +-----+    +------------+  |
              +-------|------------------|----+
                      | ACTN interface   | Non-ACTN interface
                      | CMI              | (Customer Service model)
       Service/Network|                  +----------------+
       Orchestrator   |                                   |
               +------|-----------------------------------|-----------+
               |   +----------------------------------+   |           |
               |   |MDSC TE & Service Mapping Function|   |           |
               |   +----------------------------------+   |           |
               |      |                           |       |           |
               |   +------------------+       +---------------------+ |
               |   | MDSC NP Function |-------|Service Config. Func.| |
               |   +------------------+       +---------------------+ |
               +------|---------------------------|-------------------+
                  MPI |      +---------------------+--+
                      |     / Non-ACTN interface       \
               +-------+---/-------+------------+       \
     IP/MPLS   |          /        |Optical     |        \   IP/MPLS
     Domain 1  |         /         |Domain      |         \  Domain 2
     Controller|        /          |Controller  |          \ Controller
        +------|-------/--+    +---|-----+   +--|-----------\----+
        | +-----+  +-----+|    | +-----+ |   |+------+   +------+|
        | |PNC1 |  |Serv.||    | |PNC  | |   || PNC2 |   | Serv.||
        | +-----+  +----- |    | +-----+ |   |+------+   +------+|
        +-----------------+    +---------+   +-------------------+
            SBI |                  |                     | SBI
                v                  |                     V
         +------------------+      |         +------------------+
        /   IP/MPLS Network  \     |        /   IP/MPLS Network  \
       +----------------------+    |  SBI  +----------------------+
                                   v
                    +-------------------------------+
                   /           Optical Network       \
                  +-----------------------------------+


                  Figure 1. ACTN POI Reference Architecture


     Figure 1 shows ACTN POI Reference Architecture where it depicts:

       . CMI (CNC-MDSC Interface) interfacing CNC with MDSC function
          in the Service/Network Orchestrator. This is where TE &
          Service Mapping [TSM] and either ACTN VN [ACTN-VN] or TE-
          topology [TE-Topo]model is exchanged over CMI.


Lee, et al.             Expires December 2019                  [Page 4]

Internet-Draft        ACTN Applicability to POI               June 2019


       . Customer Service Model Interface: Non-ACTN interface in the
          Customer Portal interfacing Service/Network Orchestrator's
          Service Configuration Function. This is the interface where
          L3SM information is exchanged.

       . MPI (MDSC-PNC Interface) interfacing IP/MPLS Domain
          Controllers and Optical Domain Controllers.

       . Service Configuration Interface: Non-ACTN interface in
          Service/Network Orchestrator interfacing with the IP/MPLS
          Domain Controllers to coordinate L2/L3VPN multi-domain
          service configuration. This is where service specific
          information such as VPN, VPN binding policy (e.g., new
          underlay tunnel creation for isolation), etc. are conveyed.

       . SBI (South Bound Interface): Non-ACTN interface in the domain
          controller interfacing network elements in the domain.

     Please note that MPI and Service Configuration Interface can be
     implemented as the same interface with the two different
     capabilities. The split is just functional but doesn't have to be
     also logical.

     The following sections are provided to describe key functions that
     are necessary for the vertical as well as horizontal end-to-end
     service fulfilment of POI.

2.1. L2/L3VPN/VN Service Request by the Customer

     A customer can request L3VPN services with TE requirements using
     ACTN CMI models (i.e., ACTN VN YANG, TE & Service Mapping YANG)
     and non-ACTN customer service models such as L2SM/L3SM YANG
     together. Figure 2 shows detailed control flow between customer
     and service/network orchestrator to instantiate L2/L3VPN/VN
     service request.














Lee, et al.             Expires December 2019                  [Page 5]

Internet-Draft        ACTN Applicability to POI               June 2019

               Customer
                 +-------------------------------------------+
                 |    +-----+              +------------+    |
                 |    | CNC |--------------| Service Op.|    |
                 |    +-----+              +------------+    |
                 +-------|------------------------|----------+
         2. VN & TE/Svc  |                        | 1.L2/3SM
            Mapping      |                        |   |
                  |      |  ^                     |   |
                  |      |  |                     |   |
                  v      |  | 3. Update VN        |   v
                         |       & TE/Svc         |
      Service/Network    |       mapping          |
       Orchestrator      |                        |
      +------------------|------------------------|-----------+
      |   +----------------------------------+    |           |
      |   |MDSC TE & Service Mapping Function|    |           |
      |   +----------------------------------+    |           |
      |       |                           |       |           |
      |   +------------------+       +---------------------+  |
      |   | MDSC NP Function |-------|Service Config. Func.|  |
      |   +------------------+       +---------------------+  |
      +-------|-----------------------------------|-----------+

     NP: Network Provisioning

                      Figure 2. Service Request Process


     . ACTN VN YANG provides VN Service configuration, as specified in
        [ACTN-VN].

          o It provides the profile of VN in terms of VN members, each
             of which corresponds to an edge-to-edge link between
             customer end-points (VNAPs). It also provides the mappings
             between the VNAPs with the LTPs and between the
             connectivity matrix with the VN member from which the
             associated traffic matrix (e.g., bandwidth, latency,
             protection level, etc.) of VN member is expressed (i.e.,
             via the TE-topology's connectivity matrix).

          o The model also provides VN-level preference information
             (e.g., VN member diversity) and VN-level admin-status and
             operational-status.

     . L2SM YANG [RFC8466] provides all L2VPN service configuration
        and site information from a customer/service point of view.




Lee, et al.             Expires December 2019                  [Page 6]

Internet-Draft        ACTN Applicability to POI               June 2019

     . L3SM YANG [RFC8299] provides all L3VPN service configuration
        and site information from a customer/service point of view.

     . The TE & Service Mapping YANG model [TE & Service] provides TE-
        service mapping as well as site mapping.

          o TE-service mapping provides the mapping of L3VPN instance
             from [RFC8299] with the corresponding ACTN VN instance.

          o The TE-service mapping also provides the service mapping
             requirement type as to how each L2/L3VPN/VN instance is
             created with respect to the underlay TE tunnels (e.g.,
             whether the L3VPN requires a new and isolated set of TE
             underlay tunnels or not, etc.). See Section 2.2 for
             detailed discussion on the mapping requirement types.

          o Site mapping provides the site reference information
             across L2/L3VPN Site ID, ACTN VN Access Point ID, and the
             LTP of the access link.


2.2. Service and Network Orchestration

     The Service/Network orchestrator shown in Figure 1 interfaces the
     customer and decouples the ACTN MDSC functions from the customer
     service configuration functions.

     An implementation can choose to split the Service/Network
     orchestration functions, as described in [RFC8309] and in section
     4.2 of [RFC8453], between a top-level Service Orchestrator
     interfacing the customer and two low-level Network Orchestrators,
     one controlling a multi-domain IP/MPLS network and the other
     controlling the Optical networks.

     Another implementation can choose to combine the L-MDSC functions
     of the Optical hierarchical controller, providing multi-domain
     coordination of the Optical network together with the MDSC
     functions in the Service/Network orchestrator.

     Without loss of generality, this assumes that the service/network
     orchestrator as depicted in Figure 1 would include all the
     required functionalities as in a hierarchical orchestration case.

     One of the important service functions the Service/Network
     orchestrator performs is to identify which TE Tunnels should carry
     the L3VPN traffic (from TE & Service Mapping Model) and to relay
     this information to the IP/MPLS domain controllers, via non-ACTN



Lee, et al.             Expires December 2019                  [Page 7]

Internet-Draft        ACTN Applicability to POI               June 2019

     interface, to ensure proper IP/VRF forwarding table be populated
     according to the TE binding requirement for the L3VPN.

     [Editor's Note: What mechanism would convey on the interface to
     the IP/MPLS domain controllers as well as on the SBI (between
     IP/MPLS domain controllers and IP/MPLS PE routers) the TE binding
     policy dynamically for the L3VPN? Typically, VRF is the function
     of the device that participate MP-BGP in MPLS VPN. With current
     MP-BGP implementation in MPLS VPN, the VRF's BGP next hop is the
     destination PE and the mapping to a tunnel (either an LDP or a BGP
     tunnel) toward the destination PE is done by automatically without
     any configuration. It is to be determined the impact on the PE VRF
     operation when the tunnel is an optical bypass tunnel which does
     not participate either LDP or BGP.

     Figure 3 shows service/network orchestrator interactions with
     various domain controllers to instantiate tunnel provisioning as
     well as service configuration.


             +-------|----------------------------------|-----------+
             |   +----------------------------------+   |           |
             |   |MDSC TE & Service Mapping Function|   |           |
             |   +----------------------------------+   |           |
             |       |                          |       |           |
             |   +------------------+       +---------------------+ |
             |   | MDSC NP Function |-------|Service Config. Func.| |
             |   +------------------+       +---------------------+ |
             +-------|------------------------------|---------------+
                     |                              |
                     |          +-------------------+------+  3.
     2. Inter-layer  |         /                            \ VPN Serv.
        tunnel +-----+--------/-------+-----------------+    \provision
        binding|             /        | 1. Optical      |     \
               |            /         | tunnel creation |      \
          +----|-----------/-+    +---|------+    +-----|-------\---+
          | +-----+  +-----+ |    | +------+ |    | +-----+  +-----+|
          | |PNC1 |  |Serv.| |    | | PNC  | |    | |PNC2 |  |Serv.||
          | +-----+  +-----+ |    | +------+ |    | +-----+  +-----+|
          +------------------+    +----------+    +-----------------+

             Figure 3. Service and Network Orchestration Process


     . TE binding requirement types [TE-service mapping] are:

          1. Hard Isolation with deterministic latency: Customer would
             request an L3VPN service [RFC8299] using a set of TE


Lee, et al.             Expires December 2019                  [Page 8]

Internet-Draft        ACTN Applicability to POI               June 2019

             Tunnels with a deterministic latency requirement and that
             cannot be not shared with other L3VPN services nor compete
             for bandwidth with other Tunnels.

          2. Hard Isolation: This is similar to the above case without
             deterministic latency requirements.

          3. Soft Isolation: Customer would request an L3VPN service
             using a set of MPLS-TE tunnel which cannot be shared with
             other L3VPN services.

          4. Sharing: Customer would accept sharing the MPLS-TE Tunnels
             supporting its L3VPN service with other services.

     For the first three types, there could be additional TE binding
     requirements with respect to different VN members of the same VN
     associated with an L3VPN service. For the first two cases, VN
     members can be hard-isolated, soft-isolated, or shared. For the
     third case, VN members can be soft-isolated or shared.


     . When "Hard Isolation with or w/o deterministic latency" (i.e.,
        the first and the second type) TE binding requirement is
        applied for a L3VPN, a new optical layer tunnel has to be
        created (Step 1 in Figure 3). This operation requires the
        following control level mechanisms as follows:

          o The MDSC function of the Service/Network Orchestrator
             identifies only the domains in the IP/MPLS layer in which
             the VPN needs to be forwarded.

          o Once the IP/MPLS layer domains are determined, the MDSC
             function of the Service/Network Orchestrator needs to
             identify the set of optical ingress and egress points of
             the underlay optical tunnels providing connectivity
             between the IP/MPLS layer domains.

          o Once both IP/MPLS layers and optical layer are determined,
             the MDSC needs to identify the inter-layer peering points
             in both IP/MPLS domains as well as the optical domain(s).
             This implies that the L3VPN traffic will be forwarded to
             an MPLS-TE tunnel that starts at the ingress PE (in one
             IP/MPLS domain) and terminates at the egress PE (in
             another IP/MPLS domain) via a dedicated underlay optical
             tunnel.

     . The MDSC function of the Service/Network Orchestrator needs to
        first request the optical L-MDSC to instantiate an optical


Lee, et al.             Expires December 2019                  [Page 9]

Internet-Draft        ACTN Applicability to POI               June 2019

        tunnel for the optical ingress and egress. This is referred to
        as optical tunnel creation (Step 1 in Figure 3). Note that it
        is L-MDSC responsibility to perform multi-domain optical
        coordination with its underlying optical PNCs, for setting up a
        multi-domain optical tunnel.

     . Once the optical tunnel is established, then the MDSC function
        of the Service/Network Orchestrator needs to coordinate with
        the PNC functions of the IP/MPLS Domain Controllers (under
        which the ingress and egress PEs belong) the setup of a multi-
        domain MPLS-TE Tunnel, between the ingress and egress PEs. This
        setup is carried by the created underlay optical tunnel (Step 2
        in Figure 3).

     . It is the responsibility of the Service Configuration Function
        of the Service/Network Orchestrator to identify
        interfaces/labels on both ingress and egress PEs and to convey
        this information to both the IP/MPLS Domain Controllers (under
        which the ingress and egress PEs belong) for proper
        configuration of the L3VPN (BGP and VRF function of the PEs) in
        their domain networks (Step 3 in Figure 3).


2.3. IP/MPLS Domain Controller and NE Functions

     IP/MPLS networks are assumed to have multiple domains and each
     domain is controlled by IP/MPLS domain controller in which the
     ACTN PNC functions and non-ACTN service functions are performed by
     the IP/MPLS domain controller.

     Among the functions of the IP/MPLS domain controller are VPN
     service aspect provisioning such as VRF control and management for
     VPN services, etc. It is assumed that BGP is running in the inter-
     domain IP/MPLS networks for L2/L3VPN and that the IP/MPLS domain
     controller is also responsible for configuring the BGP speakers
     within its control domain if necessary.

     Depending on the TE binding requirement types discussed in Section
     2.2., there are two possible deployment scenarios.

2.3.1. Scenario A: Shared Tunnel Selection

     When the L2/L3VPN does not require isolation (either hard or
     soft), it can select an existing MPLS-TE and Optical tunnel
     between ingress and egress PE, without creating any new TE
     tunnels. Figure 4 shows this scenario.




Lee, et al.             Expires December 2019                 [Page 10]

Internet-Draft        ACTN Applicability to POI               June 2019

          IP/MPLS Domain 1                    IP/MPLS Domain 2
              Controller                          Controller

        +------------------+               +------------------+
        | +-----+  +-----+ |               | +-----+  +-----+ |
        | |PNC1 |  |Serv.| |               | |PNC2 |  |Serv.| |
        | +-----+  +-----+ |               | +-----+  +-----+ |
        +--|-----------|---+               +--|-----------|---+
           | 1.Tunnel  | 2.VPN/VRF            | 1.Tunnel  |2.VPN/VRF
           | Selection | Provisioning         | Selection |Provisioning
           V           V                      V           V
         +---------------------+            +---------------------+
    CE  / PE     tunnel 1   ASBR\          /ASBR    tunnel 2    PE \ CE
    o--/---o..................o--\--------/--o..................o---\-o
       \                         /        \                         /
        \       AS Domain 1     /          \      AS Domain 2      /
         +---------------------+            +---------------------+

                              End-to-end tunnel
           <---------------------------------------------------->

             Figure 4. IP/MPLS Domain Controller & NE Functions


     How VPN is disseminated across the network is out of the scope of
     this document. We assume that MP-BGP is running in IP/MPLS
     networks and VPN is made known to ABSRs and PEs by each IP/MPLS
     domain controllers. See RFC 4364 [RFC4364] for detailed
     descriptions on how MP-BGP works.

     There are several functions IP/MPLS domain controllers need to
     provide in order to facilitate tunnel selection for the VPN in
     both domain level and end-to-end level.

2.3.1.1. Domain Tunnel Selection

     Each domain IP/MPLS controller is responsible for selecting its
     domain level tunnel for the L3VPN. First it needs to determine
     which existing tunnels would fit for the L2/L3VPN requirements
     allotted to the domain by the Service/Network Orchestrator (e.g.,
     tunnel binding, bandwidth, latency, etc.). If there are existing
     tunnels that are feasible to satisfy the L3VPN requirements, the
     IP/MPLS domain controller selects the optimal tunnel from the
     candidate pool. Otherwise, an MPLS tunnel with modified bandwidth
     or a new MPLS Tunnel needs to be setup. Note that with no
     isolation requirement for the L3VPN, existing MPLS tunnel can be
     selected. With soft isolation requirement for the L3VPN, an
     optical tunnel can be shared with other L2/L3VPN services while


Lee, et al.             Expires December 2019                 [Page 11]

Internet-Draft        ACTN Applicability to POI               June 2019

     with hard isolation requirement for the L2/L3VPN, a dedicated
     MPLS-TE and a dedicated optical tunnel MUST be provisioned for the
     L2/L3VPN.

2.3.1.2. VPN/VRF Provisioning for L3VPN

     Once the domain level tunnel is selected for a domain, the Service
     Function of the IP/MPLS domain controller maps the L3VPN to the
     selected MPLS-TE tunnel and assigns a label (e.g., MPLS label)
     with the PE. Then the PE creates a new entry for the VPN in the
     VRF forwarding table so that when the VPN packet arrives to the
     PE, it will be able to direct to the right interface and PUSH the
     label assigned for the VPN. When the PE forwards a VPN packet, it
     will push the VPN label signaled by BGP and, in case of option A
     and B [RFC4364], it will also push the LSP label assigned to the
     configured MPLS-TE Tunnel to reach the ASBR next hop and forwards
     the packet to the MPLS next-hop of this MPLS-TE Tunnel.

     In case of option C [RFC4364], the PE will push one MPLS LSP label
     signaled by BGP to reach the destination PE and a second MPLS LSP
     label assigned to the configured MPLS-TE Tunnel to reach the ASBR
     next-hop and forward the packet to the MPLS next-hop of this MPLS-
     TE Tunnel.

     With Option C, the ASBR of the first domain interfacing the next
     domain should keep the VPN label intact to the ASBR of the next
     domain so that the ASBR in the next domain sees the VPN packets as
     if they are coming from a CE. With Option B, the VPN label is
     swapped. With option A, the VPN label is removed.

     With Option A and B, the ASBR of the second domain does the same
     procedure that includes VPN/VRF tunnel mapping and interface/label
     assignment with the IP/MPLS domain controller. With option A, the
     ASBR operations are the same as of the PEs. With option B, the
     ASBR operates with VPN labels so it can see the VPN the traffic
     belongs to. With option C, the ASBR operates with the end-to-end
     tunnel labels so it may be not aware of the VPN the traffic
     belongs to.


     This process is repeated in each domain. The PE of the last domain
     interfacing the destination CE should recognize the VPN label when
     the VPN packets arrive and thus POP the VPN label and forward the
     packets to the CE.




Lee, et al.             Expires December 2019                 [Page 12]

Internet-Draft        ACTN Applicability to POI               June 2019

2.3.1.3. VSI Provisioning for L2VPN

     The VSI provisioning for L2VPN is similar to the VPN/VRF provision
     for L3VPN. L2VPN service types include:

   o  Point-to-point Virtual Private Wire Services (VPWSs) that use
      LDP-signaled Pseudowires or L2TP-signaled Pseudowires [RFC6074];

   o  Multipoint Virtual Private LAN Services (VPLSs) that use LDP-
      signaled Pseudowires or L2TP-signaled Pseudowires [RFC6074];

   o  Multipoint Virtual Private LAN Services (VPLSs) that use a Border
      Gateway Protocol (BGP) control plane as described in [RFC4761]
      And [RFC6624];

   o  IP-Only LAN-Like Services (IPLSs) that are a functional subset of
      VPLS services [RFC7436];

   o  BGP MPLS-based Ethernet VPN Services as described in [RFC7432]
      and [RFC7209];

   o  Ethernet VPN VPWS specified in [RFC8214] and [RFC7432].


2.3.1.4. Inter-domain Links Update

     In order to facilitate inter-domain links for the VPN, we assume
     that the service/network orchestrator would know the inter-domain
     link status and its resource information (e.g., bandwidth
     available, protection/restoration policy, etc.) via some
     mechanisms (which are beyond the scope of this document). We also
     assume that the inter-domain links are pre-configured prior to
     service instantiation.


2.3.1.5. End-to-end Tunnel Management

     It is foreseen that the Service/Network orchestrator should
     control and manage end-to-end tunnels for VPNs per VPN policy.

     As discussed in [ACTN-PM], the Orchestrator is responsible to
     collect domain LSP-level performance monitoring data from domain
     controllers and to derive and report end-to-end tunnel performance
     monitoring information to the customer.



Lee, et al.             Expires December 2019                 [Page 13]

Internet-Draft        ACTN Applicability to POI               June 2019



2.3.2. Scenario B: Isolated VN/Tunnel Establishment

     When the L3VPN requires hard-isolated Tunnel establishment,
     optical layer tunnel binding with IP/MPLS layer is necessary. As
     such, the following functions are necessary.

     . The IP/MPLS Domain Controller of Domain 1 needs to send the VRF
        instruction to the PE:

          o To the Ingress PE of AS Domain 1: Configuration for each
             L3VPN destination IP address (in this case the remote CE's
             IP address for the VPN or any customer's IP addresses
             reachable through a remote CE) of the associated VPN label
             assigned by the Egress PE and of the MPLS-TE Tunnel to be
             used to reach the Egress PE: so that the proper VRF table
             is populated to forward the VPN traffic to the inter-layer
             optical interface with the VPN label.


     . The Egress PE, upon the discovery of a new IP address, needs to
       send the mapping information (i.e., VPN to IP address) to its'
       IP/MPLS Domain Controller of Domain 2 which sends, in turn, to
       the service orchestrator. The service orchestrator would then
       propagate this mapping information to the IP/MPLS Domain
       Controller of Domain 1 which sends it, in turn, to the ingress
       PE so that it may override the VPN/VRF forwarding or VSI
       forwarding, respectively for L3VPN and L2VPN. As a result, when
       packets arriving at the ingress PE with that IP destination
       address, the ingress PE would then forward this packet to the
       inter-layer optical interface.

       [Editor's Note: in case of hard isolated tunnel required for the
       VPN, we need to create a separate MPLS TE tunnel and encapsulate
       the MPLS packets of the MPLS Tunnel into the ODU so that the
       optical NE would route this MPLS Tunnel to a separate optical
       tunnel from other tunnels.]

2.4. Optical Domain Controller and NE Functions

     Optical network provides the underlay connectivity services to
     IP/MPLS networks. The multi-domain optical network coordination is
     performed by the L-MDSC function shown in Figure 1 so that the
     whole multi-domain optical network appears to the service/network
     orchestrator as one optical network. The coordination of
     Packet/Optical multi-layer and IP/MPLS multi-domain is done by the



Lee, et al.             Expires December 2019                 [Page 14]

Internet-Draft        ACTN Applicability to POI               June 2019

     service/network orchestrator where it interfaces two IP/MPLS
     domain controllers and one optical L-MDSC.

     Figure 5 shows how the Optical Domain Controllers create a new
     optical tunnel and the related interaction with IP/MPLS domain
     controllers and the NEs to bind the optical tunnel with proper
     forwarding instruction so that the VPN requiring hard isolation
     can be fulfilled.



         IP/MPLS Domain 1       Optical Domain    IP/MPLS Domain 2
             Controller            Controller         Controller

      +------------------+    +---------+   +------------------+
      | +-----+  +-----+ |    | +-----+ |   | +-----+  +-----+ |
      | |PNC1 |  |Serv.| |    | |PNC  | |   | |PNC2 |  |Serv.| |
      | +-----+  +-----+ |    | +-----+ |   | +-----+  +-----+ |
      +--|-----------|---+    +----|----+   +--|----------|----+
         | 2.Tunnel  | 3.VPN/VRF   |           |2.Tunnel  |3.VPN/VRF
         | Binding   | Provisioning|           |Binding   |Provisioning
         V           V             |           V          V
        +-------------------+      |    +-------------------+
   CE  / PE              ASBR\     |   /ASBR              PE \   CE
   o--/---o                o--\----|--/--o                o---\--o
      \   :                   /    |  \                   :   /
       \  :    AS Domain 1   /     |   \   AS Domain 2    :  /
        +-:-----------------+      |    +-----------------:-+
          :                        |                         :
          :                        | 1. Optical              :
          :                        | Tunnel Creation         :
          :                        v                         :
        +-:--------------------------------------------------:-+
       /  :                                                  :  \
      /   o..................................................o   \
     |                      Optical Tunnel                        |
      \                                                          /
       \                    Optical Domain                      /
        +------------------------------------------------------+

        Figure 5. Domain Controller & NE Functions (Isolated Optical
                                   Tunnel)



          . As discussed in 2.2., in case that VPN has requirement for
             hard-isolated tunnel establishment, the service/network
             orchestrator will coordinate across IP/MPLS domain


Lee, et al.             Expires December 2019                 [Page 15]

Internet-Draft        ACTN Applicability to POI               June 2019

             controllers and Optical L-MDSC to ensure the creation of a
             new optical tunnel for the VPN in proper sequence. Figure
             5 shows this scenario.

               o The MDSC of the service/network orchestrator requests
                  the L-MDSC to setup and Optical tunnel providing
                  connectivity between the inter-layer interfaces at
                  the ingress and egress PEs and requests the two
                  IP/MPLS domain controllers to setup an inter-domain
                  IP link between these interfaces

               o The MDSC of the service/network orchestrator then
                  should provide the ingress IP/MPLS domain controller
                  with the routing instruction for the VPN so that the
                  ingress IP/MPLS domain controller would help its
                  ingress PE to populate forwarding table. The packet
                  with the VPN label should be forwarded to the optical
                  interface the MDSC provided.


             The Ingress Optical Domain PE needs to recognize MPLS-TE
             label on its ingress interface from IP/MPLS domain PE and
             encapsulate the MPLS packets of this MPLS-TE Tunnel into
             the ODU.
             [Editor's Note: We assumed that the Optical PE is LSR.]

          . The Egress Optical Domain PE needs to POP the ODU label
             before sending the packet (with MPLS-TE label kept intact
             at the top level) to the Egress PE in the IP/MPLS Domain
             to which the packet is destined.

     [Editor's Note: If there are two VPNs having the same destination
     CE requiring non-shared optical tunnels from each other, we need
     to explain this case with a need for additional Label to
     differentiate the VPNs]

2.5. Orchestrator-Controllers-NEs Communication Protocol Flows

     This section provides generic communication protocol flows across
     orchestrator, controllers and NEs in order to facilitate the POI
     scenarios discussed in Section 2.3.2 for dynamic optical Tunnel
     establishment. Figure 6 shows the communication flows.



    +---------+   +-------+    +------+   +------+   +------+  +------+
    |Orchestr.|   |Optical|    |Packet|   |Packet|   |Ing.PE|  |Egr.PE|


Lee, et al.             Expires December 2019                 [Page 16]

Internet-Draft        ACTN Applicability to POI               June 2019

    |         |   |  Ctr. |    |Ctr-D1|   |Ctr-D2|   |  D1  |  |  D2  |
    +---------+   +-------+    +------+   +------+   +------+  +------+
       |                 |         |           |           |          |
       |                 |         |           |           |<--BGP--->|
       |                 |         |           |VPN Update |          |
       |                 |         | VPN Update|<---------------------|
       |<--------------------------------------|(Dest, VPN)|          |
       |                 |         |(Dest, VPN)|           |          |
       |  Tunnel Create  |         |           |           |          |
       |---------------->|         |           |           |          |
       |(VPN,Ingr/Egr if)|         |           |           |          |
       |                 |         |           |           |          |
       |  Tunnel Confirm |         |           |           |          |
       |<----------------|         |           |           |          |
       | (Tunnel ID)     |         |           |           |          |
       |                 |         |           |           |          |
       |  Tunnel Bind    |         |           |           |          |
       |-------------------------->|           |           |          |
       | (Tunnel ID, VPN, Ingr if) | Forward. Mapping      |          |
       |                 |         |---------------------->| (1)      |
       |      Tunnel Bind Confirm  | (Dest, VPN, Ingr if   |          |
       |<--------------------------|           |           |          |
       |                 |         |           |           |          |
       |  Tunnel Bind    |         |           |           |          |
       |-------------------------------------->|           |          |
       | (Tunnel ID, VPN, Egr if)  |           |           |          |
       |                 |         |           | Forward. Mapping  (2)|
       |                 |         |           |--------------------->|
       |                 |         |           | (Dest, VPN , Egr if) |
       |                 | Tunnel Bind Confirm |           |          |
       |<--------------------------------------|           |          |
       |                 |         |           |           |          |
     
       Figure 6. Communication Flows for Optical Tunnel Establishment
                 and binding.


     When Domain Packet Controller 1 sends the forwarding mapping
     information as indicated in (1) in Figure 6, the Ingress PE in
     Domain 1 will need to provision the VRF forwarding table based on
     the information it receives. Please see the detailed procedure in
     Section 2.3.1.2. A similar procedure is to be done at the Egress
     PE in Domain 2.


3. POI with VN Recursion Under Multiple Network Operators Control

     [RFC8453] briefly introduces a case for the VN supplied to a
     customer may be built using resources from different technology
     layers operated by different operators.  For example, one operator
     may run a packet TE network and use optical connectivity provided
     by another operator.


Lee, et al.             Expires December 2019                 [Page 17]

Internet-Draft        ACTN Applicability to POI               June 2019


     Figure 7 extracted from [RFC8453] shows the case where a customer
     asks for end-to-end connectivity between CE A and CE B, a virtual
     network.  The customer's CNC makes a request to Operator 1's MDSC.
     The MDSC works out which network resources need to be configured
     and sends instructions to the appropriate PNCs.  However, the link
     between Q and R is a virtual link supplied by Operator 2: Operator
     1 is a customer of Operator 2.

     To support this, Operator 1 has a CNC that communicates with
     Operator 2's MDSC.  Note that Operator 1's CNC in Figure 10 is a
     functional component that does not dictate implementation: it may
     be embedded in a PNC.



            Virtual     CE A o===============================o CE B
            Network

                                         -----    CNC wants to create
           Customer                     | CNC |   a VN between CE A
                                         -----    and CE B
                                           :
                    *********************************************** CMI
                                           :
           Operator 1         ---------------------------
                             |           MDSC            |
                              ---------------------------
                               :           :           :
                               :           :           :
                             -----   -------------   -----
                            | PNC | |     PNC     | | PNC |
                             -----   -------------   -----
                               :     :     :     :     :
           Higher              v     v     :     v     v
           Layer      CE A o---P-----Q===========R-----S---o CE B
           Network                   |     :     |
                                     |     :     |
                                     |   -----   |
                                     |  | CNC |  | CNC wants to create
                                     |   -----   | a VN between Q and R
                                     |     :     |
                    *********************************************** CMI
                                     |     :     |
           Operator 2                |  ------   |
                                     | | MDSC |  |
                                     |  ------   |



Lee, et al.             Expires December 2019                 [Page 18]

Internet-Draft        ACTN Applicability to POI               June 2019

                                     |     :     |
                                     |  -------  |
                                     | |  PNC  | |
                                     |  -------  |
                                      \ :  :  : /
           Lower                       \v  v  v/
           Layer                        X--Y--Z
           Network

           Where

           --- is a link
           === is a virtual link

                   Figure 7: VN Recursion with Network Layers


     The CMI in Figure 7 interfaces Operator 1's CNC with Operator 2's
     MDSC. The functions to perform and the information carried over
     the inter-operator CMI are identical to those of the Customer's
     CNC and Operator 1's MDSC. In other words, the two CMIs depicted
     in Figure 7 are recursive in nature.

3.1. Service Request Process between Multiple Operators

     As discussed previously, the reclusiveness principle applies
     seamlessly over the two CMIs. This implies that Operator 1's MDSC
     needs to pass all customer service requirements transparently to
     Operator 2's MDSC so that Operator 2 should provision its underlay
     network tunnels to meet the service requirements of the original
     customer. The MDSC of Operator 1 should translate/map the original
     customer's intent and service requirements and pass down to the
     corresponding PNC(s) which is(are) responsible for interfacing
     another operator (in this example, Operator 2) that provides
     transport services for the segment of the customer's VN. The PNC
     in turn performs as a CNC when interfacing its southbound with
     Operator 2's MDSC.

     It is possible that additional recursive relationships may also
     exist between Operator 2 and other operators.

3.2. Service/network Orchestration of Operator 2





Lee, et al.             Expires December 2019                 [Page 19]

Internet-Draft        ACTN Applicability to POI               June 2019

     Operator 2 that provides transport service for Operator 1 may also
     need to perform service/network orchestration function just as the
     case for Operator 1.


4. Security Considerations


     From a security and reliability perspective, ACTN may encounter
     many risks such as malicious attack and rogue elements attempting
     to connect to various ACTN components.  Furthermore, some ACTN
     components represent a single point of failure and threat vector
     and must also manage policy conflicts and eavesdropping of
     communication between different ACTN components.

     All protocols used to realize the ACTN framework should have rich
     security features, and customer, application and network data
     should be stored in encrypted data stores.  Additional security
     risks may still exist.  Therefore, discussion and applicability of
     specific security functions and protocols will be better described
     in documents that are use case and environment specific.

     The CMI will likely be an external protocol interface.  Suitable
     authentication and authorization of each CNC connecting to the
     MDSC will be required; especially, as these are likely to be
     implemented by different organizations and on separate functional
     nodes.  Use of the AAA-based mechanisms would also provide role-
     based authorization methods so that only authorized CNC's may
     access the different functions of the MDSC.

     Where the MDSC must interact with multiple (distributed) PNCs, a
     PKI-based mechanism is suggested, such as building a TLS or HTTPS
     connection between the MDSC and PNCs, to ensure trust between the
     physical network layer control components and the MDSC.  Trust
     anchors for the PKI can be configured to use a smaller (and
     potentially non-intersecting) set of trusted Certificate
     Authorities (CAs) than in the Web PKI. Which MDSC the PNC exports
     topology information to, and the level of detail (full or
     abstracted), should also be authenticated, and specific access
     restrictions and topology views should be configurable and/or
     policy based.




Lee, et al.             Expires December 2019                 [Page 20]

Internet-Draft        ACTN Applicability to POI               June 2019

5. IANA Considerations

     This document has no IANA actions.

6. Acknowledgements

     The authors thank Adrian Farrel for useful discussions and their
     suggestions for this work.

7. References

7.1. Normative References

   [RFC2119] S. Bradner, "Key words for use in RFCs to Indicate
             Requirement Levels", RFC 2119, March 1997.

   [RFC8453] D. Ceccarelli and Y. Lee, "Framework for Abstraction and
             Control of Transport Networks", RFC 8453, August 2018.

7.2. Informative References


   [bgp-l3vpn] D. Jain, et al. "Yang Data Model for BGP/MPLS L3 VPNs",
             draft-ietf-bess-l3vpn-yang, work in progress.

   [RFC4364] E. Rosen and Y. Rekhter, "BGP/MPLS IP Virtual Private
             Networks (VPNs)", RFC 4364, February 2006.

   [RFC4761] K. Kompella, Ed., Y. Rekhter, Ed., "Virtual Private LAN
             Service (VPLS) Using BGP for Auto-Discovery and
             Signaling", RFC 4761, January 2007.

   [ACTN-VN] Y. Lee, et al., "A Yang Data Model for ACTN VN Operation",
             draft-ietf-teas-actn-vn-yang, work in progress.

   [TSM] Y. Lee, et al., "Traffic Engineering and Service Mapping Yang
             Model", draft-ietf-teas-te-service-mapping-yang, work in
             progress.

   [ACTN-PM] Y. Lee, et al., "YANG models for VN & TE Performance
             Monitoring Telemetry and Scaling Intent Autonomics",
             draft-lee-teas-actn-pm-telemetry-autonomics, work in
             progress.

   [TE-Topo] X. Liu, et al., "YANG Data Model for Traffic Engineering
             (TE) Topologies", draft-ietf-teas-yang-te-topo, work in
             progress.


Lee, et al.             Expires December 2019                 [Page 21]

Internet-Draft        ACTN Applicability to POI               June 2019


   [RFC6074] E. Rosen, B. Davie, V. Radoaca, and W. Luo, "Provisioning,
             Auto-Discovery, and Signaling in Layer 2 Virtual Private
             Networks (L2VPNs)", RFC 6074, January 2011.

   [RFC6624] K. Kompella, B. Kothari, and R. Cherukuri, "Layer 2
             Virtual Private Networks Using BGP for Auto-Discovery and
             Signaling", RFC 6624, May 2012.

   [RFC7209] A. Sajassi, R. Aggarwal, J. Uttaro, N. Bitar, W.
             Henderickx, and A. Isaac, "Requirements for Ethernet VPN
             (EVPN)", RFC 7209, May 2014.

   [RFC7432] A. Sajassi, Ed., et al., "BGP MPLS-Based Ethernet VPN",
             RFC 7432, February 2015.

   [RFC7436] H. Shah, E. Rosen, F. Le Faucheur, and G. Heron, "IP-Only
             LAN Service (IPLS)", RFC 7436, January 2015.

   [RFC8214] S. Boutros, A. Sajassi, S. Salam, J. Drake, and J.
             Rabadan, "Virtual Private Wire Service Support in Ethernet
             VPN", RFC 8214, August 2017.

   [RFC8309] Q. Wu, W. Liu, and A. Farrel, "Service Model Explained",
             RFC 8309, January 2018.

   [RFC8299] Q. Wu, S. Litkowski, L. Tomotaki, and K. Ogaki, "YANG Data
             Model for L3VPN Service Delivery", RFC 8299, January 2018.

   [RFC8466] G. Fioccola, ed., "A YANG Data Model for Layer 2 Virtual
             Private Network (L2VPN) Service Delivery", RFC8466,
             October 2018.

8. Contributors

Authors' Addresses

     Y. Lee
     Futurewei Technologies
     Email: younglee.tx@gmail.com

     D. Ceccarelli
     Ericsson
     Email: daniele.ceccarelli@ericsson.com

     J. Tantsura
     Apstra
     Email: jefftant.ietf@gmail.com


Lee, et al.             Expires December 2019                 [Page 22]

Internet-Draft        ACTN Applicability to POI               June 2019



















































Lee, et al.             Expires December 2019                 [Page 23]