One document matched: draft-ietf-l1vpn-applicability-enhanced-mode-00.txt
Network Working Group
Internet Draft Tomonori Takeda (Editor)
Proposed Status: Informational NTT
Expires: May 2007 November 2006
Applicability analysis of Generalized Multiprotocol Label Switching
(GMPLS) protocols for the Layer 1 Virtual Private Network (L1VPN)
Enhanced Mode
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This document provides an applicability analysis on the use of
Generalized Multiprotocol Label Switching (GMPLS) protocols and
mechanisms to satisfy the requirements of the Layer 1 Virtual Private
Network (L1VPN) Enhanced Mode.
L1VPNs provide customer services and connectivity at layer 1 over
layer 1 networks. The operation of L1VPNs is divided into the Basic
Mode and the Enhanced Mode, where the Enhanced Mode of operation
features exchange of routing information between the layer 1 network
and the customer domain.
T.Takeda, et al. Expires May 2007 [Page 1]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
In addition, this document identifies areas where additional protocol
extensions or procedures are needed to satisfy the requirements of
the L1VPN Enhanced Mode, and provides guidelines for potential
extensions.
Table of Contents
1. Contributors...................................................2
2. Terminology....................................................3
3. Introduction...................................................3
3.1 Work Items....................................................3
3.2 Existing Solutions Drafts.....................................4
4. General Guidelines.............................................4
5. Overlay Extension Service Model................................5
5.1 Overview of the Service Model.................................5
5.2 Applicability of Existing Solutions...........................6
5.3 Additional Work Area(s).......................................6
6. Virtual Node Service Model.....................................6
6.1 Overview of the Service Model.................................6
6.2 Applicability of Existing Solutions...........................6
6.3 Additional Work Area(s).......................................7
7. Virtual Link Service Model.....................................7
7.1 Overview of the Service Model.................................7
7.2 Applicability of Existing Solutions...........................7
7.3 Additional Work Area(s).......................................7
8. Per-VPN Peer Service Model.....................................8
8.1 Overview of the Service Model.................................8
8.2 Applicability of Existing Solutions...........................8
8.3 Additional Work Area(s).......................................8
9. Discussion.....................................................9
10. Manageability Considerations..................................9
11. Security Considerations......................................10
12. References...................................................10
12.1 Normative References........................................10
12.2 Informative References......................................10
13. Acknowledgments..............................................12
14. Author's Addresses...........................................12
15. Intellectual Property Consideration..........................13
16. Full Copyright Statement.....................................13
1. Contributors
The details of this document are the result of contributions from
several authors who are listed here in alphabetic order. Contact
details for these authors can be found in a separate section near the
end of this document.
Deborah Brungard (AT&T)
Adrian Farrel (Old Dog Consulting)
T.Takeda, et al. Expires May 2007 [Page 2]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
Hamid Ould-Brahim (Nortel Networks)
Dimitri Papadimitriou (Alcatel)
Tomonori Takeda (NTT)
2. Terminology
The reader is assumed to be familiar with the terminology in
[RFC3031], [RFC3209], [RFC3471], [RFC3473], [RFC4202], [RFC4026] and
[L1VPN-FW].
3. Introduction
This document shows the applicability of existing Generalized
Multiprotocol Label Switching (GMPLS) protocols and mechanisms to the
Layer 1 Virtual Private Network (L1VPN) Enhanced Mode. In addition,
this document identifies several areas where additional protocol
extensions or modifications are needed to meet the L1VPN Enhanced
Mode service requirements set out in [L1VPN-FW].
In particular, this document shows section by section (from Section 5
to 8) the applicability of GMPLS protocols and mechanisms to each
sub-model of the Enhanced Mode mentioned in [L1VPN-FW], along with
additional work areas needed to fully support the requirements for
each sub-model.
Note that discussion in this document is limited to areas where GMPLS
protocols and mechanisms are relevant.
As will be described in this document, support of the Overlay
Extension service model and the Virtual Node service model are well
covered by existing protocol mechanisms already described in other
documents, with only minor protocol extensions required. The Virtual
Link service model and the Per-VPN Peer service model are not
explicitly covered by existing documents, but can be realized by
extending current GMPLS protocols and mechanisms as described in this
document.
The following section lists areas where additional work may be
required to fully support the requirements for each sub-model. Some
of the requirements are optional, therefore the additional work is
also optional.
Commonalities of mechanisms over various sub-models, as well as over
the L1VPN Basic Mode need to be considered. Also, various mechanisms
should be coordinated in such a way that services are provided in a
fully functional manner.
3.1 Work Items
T.Takeda, et al. Expires May 2007 [Page 3]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
This list of additional work areas is a summary derived from the main
body of this document. The list will be updated in later versions of
this document along with the development of the additional or
enhanced requirements and increased understanding of the issues. As
work progresses on protocol extensions, this list will be updated to
remove completed items, and the body of this document will be updated
to describe the analysis of protocol extensions. The intention is
that this whole section is removed when the work has been completed
and this document progresses to become an RFC.
o Routing representation (how a VPN should be represented in routing,
e.g., single area, multi-area, multi-AS). See Sections 6.3 and 7.3.
o Signaling and routing for support of the Per-VPN Peer service
model. See Section 8.3.
3.2 Existing Solutions Drafts
This section lists existing solution documents that describe how the
L1VPN Enhanced Mode may be constructed using the mechanisms of GMPLS.
This document draws on those solutions and explains their
applicability and suggests further extensions to make the solutions
more closely match the framework described in [L1VPN-FW]. Further
solution documents may be listed in a future version of this
document.
o [GVPN] describes a suite of port-based Provider-provisioned VPN
services called Generalized VPNs (GVPNs) that use BGP for VPN
auto-discovery and GMPLS as a signaling mechanism.
o [L1VPN-BM] addresses the L1VPN Basic Mode signaling.
Note that although [L1VPN-BM] specifies signaling mechanisms for
L1VPN Basic Mode, it is applicable to the L1VPN Enhanced Mode, unless
otherwise specified. Therefore, main focus of this document is how to
realize routing related information exchange between a CE and a PE.
4. General Guidelines
This section provides general guidelines for L1VPN solutions. Note
that applicability to specific sub-models will be separately
described in following sections.
One important general guideline is that protocol mechanisms should be
re-used where possible. This means that solutions should be
incremental, building on existing protocol mechanisms rather than
developing wholly new protocols. Further, as service models are
extended or developed resulting in the requirement for additional
functionalities, deltas should be added to the protocol mechanisms
rather than developing new techniques. [L1VPN-FW] describes how the
T.Takeda, et al. Expires May 2007 [Page 4]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
service models can be seen to provide "cascaded" functionality, and
this should be leveraged to achieve re-use of protocol extensions so
that, for example, it is highly desirable that the same signaling
protocols and extensions are used in both the Basic Mode and the
Enhanced Mode.
In addition, the following are general guidelines.
- The support of L1VPNs should not necessitate any change to core (P)
devices. Therefore, any protocol extensions made to facilitate
L1VPNs need to be made in a backward compatible way allowing GMPLS
aware P devices to continue to function.
- Customer (C) devices not directly involved in providing L1VPN
services should also be protected from protocol extensions made to
support L1VPNs. Again, such protocol extensions need to be backward
compatible. Note however, that some L1VPN service models allow for
VPN connectivity between C devices rather than between CE devices:
in this case, the C devices may need to be aware of protocol
extensions.
- Solutions should aim to minimize the protocol extensions on CE
devices.
- Solutions should be scalable and manageable. Solutions should not
require L1VPN state to be maintained on the P devices as much as
possible.
- Solutions should be secure. Providers should be able to screen and
protect information based on their operational policies.
- Solutions should provide an operational view of the L1VPN for the
customer and provider. There should be a common operational and
management perspective in regard to other (L2 and L3) VPN services.
5. Overlay Extension Service Model
5.1 Overview of the Service Model
This service model complements the Basic Mode and may assume all of
the requirements, solutions and work items for that model.
In this service model, a CE receives from its attached PEs a list of
TE link addresses to which it can request a VPN connection (i.e.,
membership information).
The CE may also receive some TE information concerning these CE-PE
links within the VPN (e.g., switching type).
The CE does not receive any of the following from the PE.
- Routing information about the core provider network.
- Information about P device addresses.
- Information about P-P, PE-P or PE-PE TE links.
T.Takeda, et al. Expires May 2007 [Page 5]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
- Routing information about other customer sites. The CE may have
access to routing information about the remainder of the VPN (C-C
and CE-C links), but this is exchanged by control plane tunneling
on the CE-CE connections and is not passed to the CE in the control
plane exchange between PE and CE.
5.2 Applicability of Existing Solutions
The following are required in this service model (in addition to
requirements in the L1VPN Basic Mode).
- VPN membership information exchange between a CE and PE.
- CE-PE TE link information exchange between a CE and a PE.
[GVPN] covers the requirement to exchange membership information
between the CE and the PE based on BGP. Furthermore, [BGP-TE] allows
the exchange of CE-PE TE link information between a CE and a PE.
5.3 Additional Work Area(s)
None.
6. Virtual Node Service Model
6.1 Overview of the Service Model
In this service model, there is a private routing exchange between
the CE and the PE, or to be more precise between the CE routing
protocol instance and the VPN routing protocol instance running on
the PE. The provider network is considered as one private node from
the customer's perspective. The routing information exchanged between
the CE and the PE includes CE-PE TE link information, customer
network (i.e., remote CE sites), and may include TE links (Forwarding
Adjacencies) connecting CEs (or Cs) across the provider network as
well as control plane topology information from the customer network
(i.e., CE sites).
6.2 Applicability of Existing Solutions
The following are required in this service model.
- VPN routing
- Signaling: CE-CE Label Switching Path (LSP) setup, deletion, and
modification
[GVPN] covers most of the requirements.
Specifically, [GVPN] handles VPN routing by a per VPN database called
the GVSI (Generalized Virtual Switching Instance) held in each PE.
T.Takeda, et al. Expires May 2007 [Page 6]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
GVSIs are inter-connected by tunnel-based control channels, and
routing adjacencies are established between them. BGP is used for
auto-discovery of remote GVSIs (VPN auto-discovery) in the same VPN.
GVSIs advertise VPN routing information by using a single ROUTER_ID
to represent the provider network as one node.
It is also possible to use IGP-based auto-discovery (based on [L1VPN-
OSPF-DISC]), instead of BGP-based auto-discovery.
Signaling mechanisms are covered by [L1VPN-BM].
6.3 Additional Work Area(s)
o Routing Representation
[GVPN] allows flexible routing configuration for each VPN (e.g.,
single IGP area, multiple IGP areas, or multiple ASes).
However, it may be valuable to consider how to represent a VPN in
routing. This may simplify the solution (e.g., in terms of
scalability). This requires further discussion.
7. Virtual Link Service Model
7.1 Overview of the Service Model
In this service model, virtual links are established between PEs. A
virtual link is assigned to each VPN and disclosed to the
corresponding CEs. The routing information exchanged between the CE
and the PE includes CE-PE TE links, customer network (i.e., remote CE
sites), virtual links (i.e., PE-PE links) assigned to each VPN, and
may include CE-CE (or C-C) Forwarding Adjacencies as well as control
plane topology from the customer network (i.e., CE sites).
7.2 Applicability of Existing Solutions
Currently, there is no solution document for this type of service
model.
7.3 Additional Work Area(s)
Simple modifications of [GVPN], in addition to enhancements mentioned
in Section 6.3, may realize this type of service model. Modifications
could be:
- Do NOT modify the ROUTER_ID of the TE link information when
advertising a CE-PE TE link to the CE (in the OSPF packet header as
well as in the LSA header).
T.Takeda, et al. Expires May 2007 [Page 7]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
- Set up Forwarding Adjacency LSPs (FA-LSPs, GVSI-LSPs in [GVPN]
terms) between PEs to construct virtual links, and advertise these
FAs in VPN routing. Note these FAs (virtual links) may be assigned
private addresses, which means customer assigned addresses (or that
customers are allowed to configure addresses). This may require
extensions to current IGP behavior.
There could be other ways to construct virtual links (e.g., virtual
links without actually setting up an FA-LSP [MRN-REQ]).
Resource management for a dedicated data plane is a mandatory
requirement for the Virtual Link service model. This could be
realized by assigning pre-configured FA-LSPs to each VPN routing
protocol instance (no protocol extensions needed) in order to
instantiate the necessary FAs.
Note that as in the case of the Virtual Node service model, solution
details may differ depending on the routing representation. This
requires further discussion.
8. Per-VPN Peer Service Model
8.1 Overview of the Service Model
In this service model, the provider partitions TE links within the
provider network per VPN. The routing information exchanged between
the CE and the PE includes CE-PE TE links, customer network (i.e.,
remote CE sites), as well as partitioned portions of the provider
network, and may include CE-CE (or C-C) Forwarding Adjacencies and
control plane topology from customer network (i.e., CE sites). Note
that PEs may abstract routing information about the provider network
and advertise it to CEs.
Note scalability must be carefully considered for advertising
provider network routing information to the CE [INTER-DOMAIN-FW].
8.2 Applicability of Existing Solutions
Currently, there is no solution document for this type of service
model.
8.3 Additional Work Area(s)
There are two approaches for this service model.
o Signaling and routing for support of the per-VPN Peer service
model
Option1: Virtual Link based approach
T.Takeda, et al. Expires May 2007 [Page 8]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
The Per-VPN Peer service model may be realized by extending the
virtual link technique so that not only PEs but also Ps that
contain end points of virtual links in the abstracted topology
contain VPN routing instances. There may be no additional
protocol extensions needed from the Virtual Link service model.
Option2: Virtual Node based approach
The Per-VPN Peer service model may be realized by extending the
virtual node technique so that PEs selectively advertise
provider internal TE links to CEs. There are several extensions
needed for this.
Details are for further study.
9. Discussion
This section summarizes items for which existing solutions may need
to be extended in order to fulfill the full set of L1VPN Enhanced
Mode functionalities.
For the Overlay Extension service model and the Virtual Node service
model, the existing solutions can be applied with few extensions.
As described in Sections 7.2 and 8.2, there are no existing solutions
to support the Virtual Link service model and the Per-VP Peer service
model. For the Virtual Link service model, however, minor extensions
from existing solutions are expected to meet the requirements.
Note that the list of additional work areas will be updated in later
versions of this document with the development of additional or
enhanced requirements and further understanding of the issues.
o Routing representation
- One building block for the Enhanced Mode
- Further discussion required (single area, multi areas, multi
ASes, etc.)
- Impact: Details to be studied (routing etc.)
o Signaling and routing for support of the Per-VPN Peer service model
- Details for further study
10. Manageability Considerations
Section 11 of [L1VPN-FW] describes manageability considerations for
L1VPNs.
T.Takeda, et al. Expires May 2007 [Page 9]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
This document defines a following new manageability requirement
specific for the L1VPN Enhanced Mode.
MIB modules MUST be available for any protocol extensions for the
L1VPN Enhanced Mode.
A future revision of this document may cover more aspects.
11. Security Considerations
Section 12 of [L1VPN-FW] describes security considerations for
L1VPNs. This document defines a following new security requirements
specific for the L1VPN Enhanced Mode.
In the L1VPN Enhanced Mode, since there is a routing adjacency
between a CE and a PE, care must be taken whether the provider
network's control plane topology information is leaked to the CE. Due
to security concerns, this is not recommended in general, and there
must be a mechanism to prevent such operation.
A future revision of this document may cover more aspects.
12. References
12.1 Normative References
[RFC3668] Bradner, S., "Intellectual Property Rights in IETF
Technology", BCP 79, RFC 3668, February 2004.
[L1VPN-FW] Takeda, T., Editor "Framework and Requirements for
Layer 1 Virtual Private Networks", draft-ietf-
l1vpn-framework, work in progress.
12.2 Informative References
For information on the availability of this document, please see
http://www.itu.int.
[Y.1312] Y.1312 - Layer 1 Virtual Private Network Generic
requirements and architecture elements, ITU-T
Recommendation, September 2003.
For information on the availability of this document, please see
http://www.itu.int.
[Y.1313] Y.1313 - Layer 1 Virtual Private Network
service and network architectures, ITU-T
Recommendation, July 2004.
T.Takeda, et al. Expires May 2007 [Page 10]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
[RFC3031] Rosen, E., Viswanathan, A. and R. Callon,
"Multiprotocol label switching Architecture", RFC
3031, January 2001.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T.,
Srinivasan, V. and G. Swallow, "RSVP-TE:
Extensions to RSVP for LSP Tunnels", RFC 3209,
December 2001.
[RFC3471] Berger, L., Editor, "Generalized Multi-Protocol
Label Switching (GMPLS) Signaling Functional
Description", RFC 3471, January 2003.
[RFC3473] Berger, L., Editor "Generalized Multi-Protocol
Label Switching (GMPLS) Signaling - Resource
ReserVation Protocol-Traffic Engineering (RSVP-TE)
Extensions", RFC 3473, January 2003.
[RFC4202] Kompella, K., et al., "Routing Extensions in
Support of Generalized Multi-Protocol Label
Switching (GMPLS)", RFC 4202, October 2005.
[RFC4026] Anderssion, L., and Madsen, T., "Provider
Provisioned Virtual Private Network (VPN)
Terminology", RFC 4026, March 2005.
[GVPN] Ould-Brahim, H., and Rekhter, Y. Editors, "GVPN
Services: Generalized VPN Services using BGP and
GMPLS Toolkit", draft-ouldbrahim-ppvpn-gvpn-
bgpgmpls, work in progress.
[RFC4208] Swallow, G., et al., "Generalize Multiprotocol
Label Switching(GMPLS) User-Network Interface:
Resource ReserVation Protocol-Traffic Engineering
(RSVP-TE) Support for the Overlay Model," RFC4208,
October 2005.
[L1VPN-BM] Fedyk, D., and Rekhter, Y., Editors, "Layer 1
VPN Basic Mode," draft-fedyk-l1vpn-basic-mode,
work in progress.
[L1VPN-BGP-DISC] Ould-Brahim, H., Fedyk, D., and Rekhter, Y.,
"BGP-based Auto-Discovery for L1VPNs," draft-ietf-
l1vpn-bgp-auto-discovery, work in progress.
[L1VPN-OSPF-DISC] Bryskin, I., and Berger, L., "OSPF Based L1VPN
Auto-Discovery," draft-ietf-l1vpn-ospf-auto-
discovery, work in progress.
T.Takeda, et al. Expires May 2007 [Page 11]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
[INTER-DOMAIN-FW] Farrel, A., et al., "A Framework for Inter-Domain
MPLS Traffic Engineering", draft-ietf-ccamp-inter-
domain-framework, work in progress.
[BGP-TE] Ould-Brahim, H., Fedyk, D., and Rekhter, Y.,
"Traffic Engineering Attribute", draft-fedyk-bgp-
te-attribute, work in progress.
[MRN-REQ] Shiomoto, K., et al., "Requirements for GMPLS-
based multi-region and multi-layer networks
(MRN/MLN)", draft-ietf-ccamp-gmpls-mln-reqs, work
in progress.
13. Acknowledgments
Authors would like to thank Marco Carugi, Ichiro Inoue, and Takumi
Ohba for valuable comments in the early development of this document.
14. Author's Addresses
Deborah Brungard (AT&T)
Rm. D1-3C22 - 200 S. Laurel Ave.
Middletown, NJ 07748, USA
Phone: +1 732 4201573
Email: dbrungard@att.com
Adrian Farrel
Old Dog Consulting
Phone: +44 (0) 1978 860944
Email: adrian@olddog.co.uk
Hamid Ould-Brahim
Nortel Networks
P O Box 3511 Station C
Ottawa, ON K1Y 4H7 Canada
Phone: +1 (613) 765 3418
Email: hbrahim@nortel.com
Dimitri Papadimitriou (Alcatel)
Francis Wellensplein 1,
B-2018 Antwerpen, Belgium
Phone: +32 3 2408491
Email: dimitri.papadimitriou@alcatel.be
Tomonori Takeda
NTT Network Service Systems Laboratories, NTT Corporation
3-9-11, Midori-Cho
Musashino-Shi, Tokyo 180-8585 Japan
Phone: +81 422 59 7434
T.Takeda, et al. Expires May 2007 [Page 12]
draft-ietf-l1vpn-applicability-enhanced-mode-00.txt November 2006
Email: takeda.tomonori@lab.ntt.co.jp
15. Intellectual Property Consideration
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology
described in this document or the extent to which any license
under such rights might or might not be available; nor does it
represent that it has made any independent effort to identify any
such rights. Information on the procedures with respect to
rights in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention
any copyrights, patents or patent applications, or other
proprietary rights that may cover technology that may be required
to implement this standard. Please address the information to the
IETF at ietf-ipr@ietf.org.
16. Full Copyright Statement
Copyright (C) The IETF Trust (2006).
This document is subject to the rights, licenses and
restrictions contained in BCP 78, and except as set
forth therein, the authors retain all their rights.
This document and the information contained herein are provided
on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY,
THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
T.Takeda, et al. Expires May 2007 [Page 13]
| PAFTECH AB 2003-2026 | 2026-04-23 16:04:58 |