Internet DRAFT - draft-li-rtgwg-igp-cc-reqs

draft-li-rtgwg-igp-cc-reqs






Network Working Group                                              Z. Li
Internet-Draft                                                     N. Wu
Intended status: Informational                       Huawei Technologies
Expires: January 5, 2015                                    July 4, 2014


  Requirements of Interior Gateway Protocol (IGP) for Central Control
                     draft-li-rtgwg-igp-cc-reqs-00

Abstract

   Interior Gateway Protocol(IGP) such as IS-IS or OSPF is a fundamental
   building block for traditional routing system which is based on
   distributed computation model.  Routing in networks based on
   centralized computation model such as Software Defined Network(SDN)
   may require special IGP extension to facilitate its operation in
   multi-domain, multi-region, or multi-layer networks.

   This document introduces an architecture of deploying IGP for
   central-controlled network, but it does not aim to provide a detailed
   description of all the architectural components.  It also specifies a
   set of functional requirements which can be fulfilled by IGP with
   proper extension for the central-controlled network.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 5, 2015.





Li & Wu                  Expires January 5, 2015                [Page 1]

Internet-Draft   Requirements of IGP for Central Control       July 2014


Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Overview of Central Control Architecture  . . . . . . . . . .   3
     3.1.  Reference Model . . . . . . . . . . . . . . . . . . . . .   3
     3.2.  Deployment Mode . . . . . . . . . . . . . . . . . . . . .   4
   4.  Requirements of IGP for Central Control . . . . . . . . . . .   4
     4.1.  Building Connectivity . . . . . . . . . . . . . . . . . .   4
     4.2.  Roles Auto-Discovery  . . . . . . . . . . . . . . . . . .   5
     4.3.  Capability Advertisement  . . . . . . . . . . . . . . . .   5
     4.4.  Network Topology Acquirement  . . . . . . . . . . . . . .   5
     4.5.  Application Specific Requirement  . . . . . . . . . . . .   6
     4.6.  Summary of IGP Extension Requirements . . . . . . . . . .   6
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   6
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .   7
     7.2.  Informative References  . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   7

1.  Introduction

   Interior Gateway Protocol(IGP) such as IS-IS[ISO.10589.1992] or
   OSPF[RFC2328] is a fundamental building block for traditional routing
   system which is based on distributed computation model.  Routing in
   networks based on centralized computation model such as Software
   Defined Network(SDN) may require special IGP extension to facilitate
   its operation in multi-domain, multi-region, or multi-layer networks.

   This document introduces an architecture of deploying IGP for
   central-controlled network, but it does not aim to provide a detailed
   description of all the architectural components.  It also specifies a



Li & Wu                  Expires January 5, 2015                [Page 2]

Internet-Draft   Requirements of IGP for Central Control       July 2014


   set of functional requirements which can be fulfilled by IGP with
   proper extension for the central-controlled network.

   The internet is the most popular network which is based on
   distributed computation model.  The architecture and requirements
   this document proposes here are not going to be used to contradict or
   replace current internet model but rather can be used to augment
   functionality in the scenarios where the Internet model can not
   supply adequate solutions.

2.  Terminology

   SDN: Software Defined Network

   IGP: Interior Gateway Protocol

   IS-IS: Intermediate System-Intermediate System

   OSPF: Open Shortest Path First

   BGP: Border Gateway Protocol

3.  Overview of Central Control Architecture

   This section gives an overview of the architecture of IGP-based
   central control.  It can help to get a good understanding when
   reading the detailed requirements in next section.  As stated above,
   this section does not aim to provide a detailed explanation for each
   building block of the architecture.

3.1.  Reference Model

   The following figure depicts a typical architecture of IGP-based
   central control.  It consists of two essential network elements:
   controller and client.  The controller controls all the clients
   within its administrative domain by communicating with them using IGP
   protocols such as IS-IS or OSPF.  And the controllers will also
   exchange the information between each other through some protocol
   extensions which is out of scope of this document.












Li & Wu                  Expires January 5, 2015                [Page 3]

Internet-Draft   Requirements of IGP for Central Control       July 2014


   +------------------------------+    +------------------------------+
   |   Central Control Domain 1   |    |   Central Control Domain 2   |
   |         +----------+         |    |         +----------+         |
   |         |          |         |    |         |          |         |
   |         |  Central |------------------------|  Central |         |
   |         |Controller|         |    |         |Controller|         |
   |         |          |         |    |         |          |         |
   |         +----------+         |    |         +----------+         |
   |         /          \         |    |         /          \         |
   |        IGP         IGP       |    |       IGP           IGP      |
   |       /              \       |    |       /              \       |
   | +--------+        +--------+ |    | +--------+        +--------+ |
   | |        |        |        | |    | |        |        |        | |
   | | CLIENT | ..IGP..| CLIENT | |    | | CLIENT | ..IGP..| CLIENT | |
   | | NODE 1 |        | NODE n | |    | | NODE 1 |        | NODE n | |
   | |        |        |        | |    | |        |        |        | |
   | +--------+        +--------+ |    | +--------+        +--------+ |
   |                              |    |                              |
   +------------------------------+    +------------------------------+

          Figure 1: An Architecture of IGP-based Central Control

3.2.  Deployment Mode

   The controller can run on a general-purpose server or a network
   device.  If the controller runs on a network device, it supports both
   central-controlled functionality and forwarding functionality.  In
   this scenario, besides the centralized point of controlling, the
   controller can also work as a centralized point of forwarding to
   receive traffic from one node to others.  The forwarding model in
   this scenario is just like hub-spoke forwarding model.  If the
   controller runs on a server, it will not be involved in the actual
   forwarding.  It only works as the centralized point of control to
   manage the forwarding behaviors of the nodes.  In this scenario the
   traffic will be distributed in the controlled nodes.

   More than one controller can be deployed in a central control domain.
   These controllers can work on master-slave mode or load-sharing mode.

4.  Requirements of IGP for Central Control

4.1.  Building Connectivity

   IGP protocol is essential to establish connectivity in the central
   control domain.  When a new device connects to the this domain, the
   connectivity with the other nodes and the controller should be built
   at first.  The connectivity SHOULD be achieved through Plug and Play
   way since the number of devices in this domain can be huge.  Base on



Li & Wu                  Expires January 5, 2015                [Page 4]

Internet-Draft   Requirements of IGP for Central Control       July 2014


   this initialization process, the controller can download the
   necessary configuration to this new node to drive it to set up
   adjacency with its neighbors and the controller.  Then the topology
   information can be synchronized in the central control domain and the
   connectivity can be built.

   REQ 01: IGP extensions SHOULD be provided to building the
   connectivity between the central controller and client nodes for the
   purpose of operation and management.

4.2.  Roles Auto-Discovery

   As stated in the architecture, there are two basic roles in the
   central control domain: controllers and clients.  Both controllers
   and clients MUST advertise their own roles in proper IGP protocol
   extensions through IGP flooding mechanism.  Through the role
   information flooded in the network, if there are multiple central
   controllers in the network, the controller can determine which client
   nodes should be under its control or the client nodes can decide
   which controller to join in.

   REQ 02: IGP extensions SHOULD be provided to advertise controller and
   client role information to determine the control domain of the
   central controller.

4.3.  Capability Advertisement

   Along with the role information, the capability information of the
   controller and clients nodes can also be advertised for the purpose
   of capability negotiation.  For example, if the controller has the
   capability to control the edge client nodes of the network, after the
   capability information is advertised, the edge client nodes can set
   up BGP sessions with the central controller.

   REQ 03: IGP extensions SHOULD be provided to advertise the capability
   information of the central controller and client nodes.

4.4.  Network Topology Acquirement

   In traditional network, it is very difficult for the application to
   get and use the topology information.  The topology information is
   only contained and expressed in protocols' specific link-state
   messages which are obscure and difficult to fetch in application's
   defend.  In some scenarios, the application has to communicate with
   these protocols directly to get the necessary information.  In the
   IGP-based central controlled network, the topology acquirement
   procedures SHOULD be simplified.  All topology related information
   SHOULD be able to be collected by IGP.  Thus the complexity of



Li & Wu                  Expires January 5, 2015                [Page 5]

Internet-Draft   Requirements of IGP for Central Control       July 2014


   network operation and management can be reduced.  In the IGP-base
   central controlled network, the controller can get the whole topology
   information of the central control domain which can be easily
   provided to applications through public interface.

   REQ 04: IGP extensions SHOULD be provided to unify the topology
   information acquirement.

4.5.  Application Specific Requirement

   Based on the central control architecture, new application can be
   proposed such as:

   -- Centralized MPLS TE: In the IGP-based Central Controlled network,
   the controller can implement better traffic engineering functionality
   based on complete topology information and state information of the
   whole network.

   -- Applications based on global label allocated by IGP:
   [I-D.li-mpls-global-label-usecases] proposes possible use cases based
   on MPLS global label.  IGP extensions can be introduced to allocate
   global labels by the central controller to client nodes to support
   corresponding applications.

   These IGP extensions are application-specific and out of scope of
   this document.

4.6.  Summary of IGP Extension Requirements

   REQ 01: IGP extensions SHOULD be provided to building the
   connectivity between the central controller and client nodes for the
   purpose of operation and management.

   REQ 02: IGP extensions SHOULD be provided to advertise controller and
   client role information to determine the control domain of the
   central controller.

   REQ 03: IGP extensions SHOULD be provided to advertise the capability
   information of the central controller and client nodes.

   REQ 04: IGP extensions SHOULD be provided to unify the topology
   information acquirement.

5.  IANA Considerations

   TBD.





Li & Wu                  Expires January 5, 2015                [Page 6]

Internet-Draft   Requirements of IGP for Central Control       July 2014


6.  Security Considerations

   TBD.

7.  References

7.1.  Normative References

   [ISO.10589.1992]
              International Organization for Standardization,
              "Intermediate system to intermediate system intra-domain-
              routing routine information exchange protocol for use in
              conjunction with the protocol for providing the
              connectionless-mode Network Service (ISO 8473)", ISO
              Standard 10589, 1992.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2328]  Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998.

7.2.  Informative References

   [I-D.li-mpls-global-label-usecases]
              Li, Z., Zhao, Q., Yang, T., and R. Raszuk, "Use Cases of
              MPLS Global Label", draft-li-mpls-global-label-usecases-02
              (work in progress), July 2014.

Authors' Addresses

   Zhenbin Li
   Huawei Technologies
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: lizhenbin@huawei.com


   Nan Wu
   Huawei Technologies
   Boston, MA
   USA

   Email: huaimo.chen@huawei.com






Li & Wu                  Expires January 5, 2015                [Page 7]