rfc8735xml2.original.xml | rfc8735.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="US-ASCII"?> | <?xml version="1.0" encoding="US-ASCII"?> | |||
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com) | <rfc category="info" consensus="true" | |||
by Daniel M Kohn (private) --> | docName="draft-ietf-teas-native-ip-scenarios-12" ipr="trust200902" | |||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | number="8735" obsoletes="" sortRefs="true" submissionType="IETF" | |||
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | symRefs="true" tocDepth="3" tocInclude="true" updates="" version="3" | |||
RFC.2119.xml"> | xml:lang="en"> | |||
]> | ||||
<?rfc toc="yes"?> | ||||
<?rfc tocompact="yes"?> | ||||
<?rfc tocdepth="3"?> | ||||
<?rfc tocindent="yes"?> | ||||
<?rfc symrefs="yes"?> | ||||
<?rfc sortrefs="yes"?> | ||||
<?rfc comments="yes"?> | ||||
<?rfc inline="yes"?> | ||||
<?rfc compact="yes"?> | ||||
<?rfc subcompact="no"?> | ||||
<rfc category="info" docName="draft-ietf-teas-native-ip-scenarios-12" | ||||
ipr="trust200902"> | ||||
<front> | <front> | |||
<title abbrev="CCDR Scenario and Simulation Results">Scenarios and | <title abbrev="CCDR Scenario and Simulation Results">Scenarios and | |||
Simulation Results of PCE in Native IP Network</title> | Simulation Results of PCE in a Native IP Network</title> | |||
<seriesInfo name="RFC" value="8735"/> | ||||
<author fullname="Aijun Wang" initials="A" surname="Wang"> | <author fullname="Aijun Wang" initials="A" surname="Wang"> | |||
<organization>China Telecom</organization> | <organization>China Telecom</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>Beiqijia Town, Changping District</street> | <street>Beiqijia Town, Changping District</street> | |||
<city>Beijing</city> | <city>Beijing</city> | |||
skipping to change at line 85 ¶ | skipping to change at line 75 ¶ | |||
<region/> | <region/> | |||
<code/> | <code/> | |||
<country>China</country> | <country>China</country> | |||
</postal> | </postal> | |||
<phone/> | <phone/> | |||
<facsimile/> | ||||
<email>koucx@lsec.cc.ac.cn</email> | <email>koucx@lsec.cc.ac.cn</email> | |||
<uri/> | <uri/> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Zhenqiang Li" initials="Z" surname="Li"> | <author fullname="Zhenqiang Li" initials="Z" surname="Li"> | |||
<organization>China Mobile</organization> | <organization>China Mobile</organization> | |||
<address> | <address> | |||
skipping to change at line 111 ¶ | skipping to change at line 99 ¶ | |||
<region/> | <region/> | |||
<code>100053</code> | <code>100053</code> | |||
<country>China</country> | <country>China</country> | |||
</postal> | </postal> | |||
<phone/> | <phone/> | |||
<facsimile/> | ||||
<email>li_zhenqiang@hotmail.com</email> | <email>li_zhenqiang@hotmail.com</email> | |||
<uri/> | <uri/> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Penghui Mi" initials="P" surname="Mi"> | <author fullname="Penghui Mi" initials="P" surname="Mi"> | |||
<organization>Huawei Technologies</organization> | <organization>Huawei Technologies</organization> | |||
<address> | <address> | |||
skipping to change at line 138 ¶ | skipping to change at line 124 ¶ | |||
<region>Bantian,Longgang District</region> | <region>Bantian,Longgang District</region> | |||
<code>518129</code> | <code>518129</code> | |||
<country>China</country> | <country>China</country> | |||
</postal> | </postal> | |||
<phone/> | <phone/> | |||
<facsimile/> | ||||
<email>mipenghui@huawei.com</email> | <email>mipenghui@huawei.com</email> | |||
<uri/> | <uri/> | |||
</address> | </address> | |||
</author> | </author> | |||
<date day="29" month="October" year="2019"/> | <date month="February" year="2020"/> | |||
<area>RTG Area</area> | <area>RTG Area</area> | |||
<workgroup>TEAS Working Group</workgroup> | <workgroup>TEAS Working Group</workgroup> | |||
<keyword>RFC</keyword> | <keyword>CCDR, Traffic Engineering,</keyword> | |||
<abstract> | <abstract> | |||
<t>Requirements for providing the End to End(E2E) performance assurance | <t>Requirements for providing the End-to-End (E2E) performance assurance | |||
are emerging within the service provider networks. While there are | are emerging within the service provider networks. While there are | |||
various technology solutions, there is no single solution that can | various technology solutions, there is no single solution that can | |||
fulfill these requirements for a native IP network. In particular, there | fulfill these requirements for a native IP network. In particular, there | |||
is a need for a universal (E2E) solution that can cover both intra- and | is a need for a universal E2E solution that can cover both intra- and | |||
inter-domain scenarios.</t> | inter-domain scenarios.</t> | |||
<t>One feasible E2E traffic engineering solution is the addition of | <t>One feasible E2E traffic-engineering solution is the addition of | |||
central control in a native IP network. This document describes various | central control in a native IP network. This document describes various | |||
complex scenarios and simulation results when applying the Path | complex scenarios and simulation results when applying the Path | |||
Computation Element (PCE) in a native IP network. This solution, | Computation Element (PCE) in a native IP network. This solution, | |||
referred to as Centralized Control Dynamic Routing (CCDR), integrates | referred to as Centralized Control Dynamic Routing (CCDR), integrates | |||
the advantage of using distributed protocols and the power of a | the advantage of using distributed protocols and the power of a | |||
centralized control technology, providing traffic engineering for native | centralized control technology, providing traffic engineering for native | |||
IP networks in a manner that applies equally to intra- and inter-domain | IP networks in a manner that applies equally to intra- and inter-domain | |||
scenarios.</t> | scenarios.</t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="intro" title="Introduction"> | <section anchor="intro" numbered="true" toc="default"> | |||
<name>Introduction</name> | ||||
<t>A service provider network is composed of thousands of routers that | <t>A service provider network is composed of thousands of routers that | |||
run distributed protocols to exchange the reachability information. The | run distributed protocols to exchange reachability information. The path | |||
path for the destination network is mainly calculated, and controlled, | for the destination network is mainly calculated, and controlled, by the | |||
by the distributed protocols. These distributed protocols are robust | distributed protocols. These distributed protocols are robust enough to | |||
enough to support most applications, however, they have some | support most applications; however, they have some difficulties | |||
difficulties supporting the complexities needed for traffic engineering | supporting the complexities needed for traffic-engineering applications, | |||
applications, e.g. E2E performance assurance, or maximizing the link | e.g., E2E performance assurance, or maximizing the link utilization | |||
utilization within an IP network.</t> | within an IP network.</t> | |||
<t>Multiprotocol Label Switching (MPLS) using Traffic Engineering (TE) | <t>Multiprotocol Label Switching (MPLS) using Traffic-Engineering (TE) | |||
technology (MPLS-TE)<xref target="RFC3209"/>is one solution for traffic | technology (MPLS-TE) <xref format="default" target="RFC3209"/> is one | |||
engineering networks but it introduces an MPLS network and related | solution for TE networks, but it introduces an MPLS network along with | |||
technology which would be an overlay of the IP network. MPLS-TE | related technology, which would be an overlay of the IP network. MPLS-TE | |||
technology is often used for Label Switched Path (LSP) protection and | technology is often used for Label Switched Path (LSP) protection and | |||
complex path set-up within a domain. It has not been widely deployed for | setting up complex paths within a domain. It has not been widely | |||
meeting E2E (especially in inter-domain) dynamic performance assurance | deployed for meeting E2E (especially in inter-domain) dynamic | |||
requirements for an IP network.</t> | performance assurance requirements for an IP network.</t> | |||
<t>Segment Routing <xref target="RFC8402"/> is another solution that | <t>Segment Routing <xref format="default" target="RFC8402"/> is another | |||
integrates some advantages of using a distributed protocol and a | solution that integrates some advantages of using a distributed protocol | |||
centrally control technology, but it requires the underlying network, | and central control technology, but it requires the underlying network, | |||
especially the provider edge router, to do a label push and pop action | especially the provider edge router, to do an in-depth label push and | |||
in-depth, and adds complexity when coexisting with the Non-Segment | pop action while adding complexity when coexisting with the non-segment | |||
Routing network. Additionally, it can only maneuver the E2E paths for | routing network. Additionally, it can only maneuver the E2E paths for | |||
MPLS and IPv6 traffic via different mechanisms.</t> | MPLS and IPv6 traffic via different mechanisms.</t> | |||
<t>Deterministic Networking (DetNet)<xref target="RFC8578"/> is another | <t>Deterministic Networking (DetNet) <xref format="default" | |||
possible solution. It is primarily focused on providing bounded latency | target="RFC8578"/> is another possible solution. It is primarily focused | |||
for a flow and introduces additional requirements on the domain edge | on providing bounded latency for a flow and introduces additional | |||
router. The current DetNet scope is within one domain. The use cases | requirements on the domain edge router. The current DetNet scope is | |||
defined in this document do not require the additional complexity of | within one domain. The use cases defined in this document do not require | |||
deterministic properties and so differ from the DetNet use cases.</t> | the additional complexity of deterministic properties and so differ from | |||
the DetNet use cases.</t> | ||||
<t>This draft describes several scenarios for a native IP network where | <t>This document describes several scenarios for a native IP network | |||
a Centralized Control Dynamic Routing (CCDR) framework can produce | where a Centralized Control Dynamic Routing (CCDR) framework can produce | |||
qualitative improvement in efficiency without requiring a change of the | qualitative improvement in efficiency without requiring a change to the | |||
data-plane behavior on the router. Using knowledge of BGP(Border Gateway | data-plane behavior on the router. Using knowledge of the Border Gateway | |||
Protocol) session-specific prefixes advertised by a router, the network | Protocol (BGP) session-specific prefixes advertised by a router, the | |||
topology and the near real time link utilization information from | network topology and the near-real-time link-utilization information | |||
network management systems, a central PCE is able to compute an optimal | from network management systems, a central PCE is able to compute an | |||
path and give the underlay routers the destination address to use to | optimal path and give the underlying routers the destination address to | |||
reach the BGP nexthop, such that the distributed routing protocol will | use to reach the BGP nexthop, such that the distributed routing protocol | |||
use the computed path via traditional recursive lookup procedure. Some | will use the computed path via traditional recursive lookup procedure. | |||
results from simulations of path optimization are also presented, to | Some results from simulations of path optimization are also presented to | |||
concretely illustrate a variety of scenarios where CCDR shows | concretely illustrate a variety of scenarios where CCDR shows | |||
significant improvement over traditional distributed routing | significant improvement over traditional distributed routing | |||
protocols.</t> | protocols.</t> | |||
<t>This draft is the base document of the following two drafts: the | <t>This document is the base document of the following two documents: | |||
universal solution draft, which is suitable for intra-domain and | the universal solution document, which is suitable for intra-domain and | |||
inter-domain TE scenario, is described in <xref | inter-domain TE scenario, is described in <xref format="default" | |||
target="I-D.ietf-teas-pce-native-ip"/>; the related protocol extension | target="I-D.ietf-teas-pce-native-ip"/>; and the related protocol | |||
contents is described in <xref | extension contents is described in <xref format="default" | |||
target="I-D.ietf-pce-pcep-extension-native-ip"/></t> | target="I-D.ietf-pce-pcep-extension-native-ip"/>.</t> | |||
</section> | </section> | |||
<section title="Terminology"> | <section numbered="true" toc="default"> | |||
<t>This document uses the following terms defined in <xref | <name>Terminology</name> | |||
target="RFC5440"/>: PCE.</t> | ||||
<t>The following terms are defined in this document:</t> | <t>In this document, PCE is used as defined in <xref format="default" | |||
target="RFC5440"/>. The following terms are used as described here:</t> | ||||
<t><list style="symbols"> | <dl indent="8" spacing="normal"> | |||
<t>BRAS: Broadband Remote Access Server</t> | <dt>BRAS:</dt> | |||
<t>CD: Congestion Degree</t> | <dd>Broadband Remote Access Server</dd> | |||
<t>CR: Core Router</t> | <dt>CD:</dt> | |||
<t>CCDR: Centralized Control Dynamic Routing</t> | <dd>Congestion Degree</dd> | |||
<t>E2E: End to End</t> | <dt>CR:</dt> | |||
<t>IDC: Internet Data Center</t> | <dd>Core Router</dd> | |||
<t>MAN: Metro Area Network</t> | <dt>CCDR:</dt> | |||
<t>QoS: Quality of Service</t> | <dd>Centralized Control Dynamic Routing</dd> | |||
<t>SR: Service Router</t> | <dt>E2E:</dt> | |||
<t>TE: Traffic Engineering</t> | <dd>End to End</dd> | |||
<t>UID: Utilization Increment Degree</t> | <dt>IDC:</dt> | |||
<t>WAN: Wide Area Network</t> | <dd>Internet Data Center</dd> | |||
</list></t> | ||||
<dt>MAN:</dt> | ||||
<dd>Metro Area Network</dd> | ||||
<dt>QoS:</dt> | ||||
<dd>Quality of Service</dd> | ||||
<dt>SR:</dt> | ||||
<dd>Service Router</dd> | ||||
<dt>TE:</dt> | ||||
<dd>Traffic Engineering</dd> | ||||
<dt>UID:</dt> | ||||
<dd>Utilization Increment Degree</dd> | ||||
<dt>WAN:</dt> | ||||
<dd>Wide Area Network</dd> | ||||
</dl> | ||||
</section> | </section> | |||
<section title="CCDR Scenarios"> | <section numbered="true" toc="default"> | |||
<name>CCDR Scenarios</name> | ||||
<t>The following sections describe various deployment scenarios where | <t>The following sections describe various deployment scenarios where | |||
applying the CCDR framework is intuitively expected to produce | applying the CCDR framework is intuitively expected to produce | |||
improvements, based on the macro-scale properties of the framework and | improvements based on the macro-scale properties of the framework and | |||
the scenario.</t> | the scenario.</t> | |||
<section title="QoS Assurance for Hybrid Cloud-based Application"> | <section numbered="true" toc="default"> | |||
<name>QoS Assurance for Hybrid Cloud-Based Application</name> | ||||
<t>With the emergence of cloud computing technologies, enterprises are | <t>With the emergence of cloud computing technologies, enterprises are | |||
putting more and more services on a public oriented cloud environment, | putting more and more services on a public-oriented cloud environment | |||
but keeping core business within their private cloud. The | while keeping core business within their private cloud. The | |||
communication between the private and public cloud sites will span the | communication between the private and public cloud sites spans the | |||
Wide Area Network (WAN) network. The bandwidth requirements between | WAN. The bandwidth requirements between them are variable, and the | |||
them are variable and the background traffic between these two sites | background traffic between these two sites varies over time. | |||
varies over time. Enterprise applications require assurance of the E2E | Enterprise applications require assurance of the E2E QoS performance | |||
Quality of Service(QoS) performance on demand for variable bandwidth | on demand for variable bandwidth services.</t> | |||
services.</t> | ||||
<t>CCDR, which integrates the merits of distributed protocols and the | <t>CCDR, which integrates the merits of distributed protocols and the | |||
power of centralized control, is suitable for this scenario. The | power of centralized control, is suitable for this scenario. The | |||
possible solution framework is illustrated below:</t> | possible solution framework is illustrated below:</t> | |||
<figure> | <figure anchor="hybrid-cloud-comm" | |||
<artwork><![CDATA[ +------------------------ | title="Hybrid Cloud Communication Scenario"> | |||
+ | <artwork align="left" alt="" name="" type=""><![CDATA[ | |||
| Cloud Based Application| | +------------------------+ | |||
+------------------------+ | | Cloud-Based Application| | |||
| | +------------------------+ | |||
+-----------+ | | | |||
| PCE | | +-----------+ | |||
+-----------+ | | PCE | | |||
| | +-----------+ | |||
| | | | |||
//--------------\\ | | | |||
///// \\\\\ | //--------------\\ | |||
Private Cloud Site || Distributed |Public Cloud Site | ///// \\\\\ | |||
| Control Network | | Private Cloud Site || Distributed |Public Cloud Site | |||
\\\\\ ///// | | Control Network | | |||
\\--------------// | \\\\\ ///// | |||
\\--------------// | ||||
Figure 1: Hybrid Cloud Communication Scenario | ||||
]]></artwork> | ]]></artwork> | |||
</figure> | </figure> | |||
<t>As illustrated in Figure 1, the source and destination of the | <t>As illustrated in <xref target="hybrid-cloud-comm"/>, the source | |||
"Cloud Based Application" traffic are located at "Private Cloud Site" | and destination of the "Cloud-Based Application" traffic are located | |||
and "Public Cloud Site" respectively.</t> | at "Private Cloud Site" and "Public Cloud Site", respectively.</t> | |||
<t hangText="Section 4">By default, the traffic path between the | <t>By default, the traffic path between the private and public cloud | |||
private and public cloud site is determined by the distributed control | site is determined by the distributed control network. When an | |||
network. When application requires the E2E QoS assurance, it can send | application requires E2E QoS assurance, it can send these requirements | |||
these requirements to the PCE, and let the PCE compute one E2E path | to the PCE and let the PCE compute one E2E path, which is based on the | |||
which is based on the underlying network topology and the real traffic | underlying network topology and real traffic information, in order to | |||
information, to accommodate the application's QoS requirements. <xref | accommodate the application's QoS requirements. <xref format="default" | |||
target="Section-4.4"/> of this document describes the simulation | target="Section-4.4"/> of this document describes the simulation | |||
results for this use case.</t> | results for this use case.</t> | |||
</section> | </section> | |||
<section title="Link Utilization Maximization"> | <section numbered="true" toc="default"> | |||
<t>Network topology within a Metro Area Network (MAN) is generally in | <name>Link Utilization Maximization</name> | |||
a star mode as illustrated in Figure 2, with different devices | ||||
connected to different customer types. The traffic from these | ||||
customers is often in a tidal pattern, with the links between the Core | ||||
Router(CR)/Broadband Remote Access Server(BRAS) and CR/Service | ||||
Router(SR) experiencing congestion in different periods, because the | ||||
subscribers under BRAS often use the network at night, and the leased | ||||
line users under SR often use the network during the daytime. The link | ||||
between BRAS/SR and CR must satisfy the maximum traffic volume between | ||||
them, respectively, and this causes these links often to be | ||||
under-utilized.</t> | ||||
<figure> | <t>Network topology within a Metro Area Network (MAN) is generally in | |||
<artwork><![CDATA[ +--------+ | a star mode as illustrated in <xref target="star-mode-man"/>, with | |||
| CR | | different devices connected to different customer types. The traffic | |||
+----|---+ | from these customers is often in a tidal pattern with the links | |||
| | between the Core Router (CR) / roadband Remote Access Server (BRAS) | |||
--------|--------|-------| | and CR/Service Router (SR) experiencing congestion in different | |||
| | | | | periods due to subscribers under BRAS often using the network at night | |||
+--|-+ +-|- +--|-+ +-|+ | and the leased line users under SR often using the network during the | |||
|BRAS| |SR| |BRAS| |SR| | daytime. The link between BRAS/SR and CR must satisfy the maximum | |||
+----+ +--+ +----+ +--+ | traffic volume between them, respectively, which causes these links to | |||
often be underutilized.</t> | ||||
Figure 2: Star-mode Network Topology within MAN]]></artwork> | <figure anchor="star-mode-man" | |||
title="Star-Mode Network Topology within MAN"> | ||||
<artwork align="left" alt="" name="" type=""><![CDATA[ | ||||
+--------+ | ||||
| CR | | ||||
+----|---+ | ||||
| | ||||
|-------|--------|-------| | ||||
| | | | | ||||
+--|-+ +-|+ +--|-+ +-|+ | ||||
|BRAS| |SR| |BRAS| |SR| | ||||
+----+ +--+ +----+ +--+ | ||||
]]></artwork> | ||||
</figure> | </figure> | |||
<t>If we consider connecting the BRAS/SR with a local link loop (which | <t>If we consider connecting the BRAS/SR with a local link loop (which | |||
is usually lower cost), and control the overall MAN topology with the | is usually lower cost) and control the overall MAN topology with the | |||
CCDR framework, we can exploit the tidal phenomena between the BRAS/CR | CCDR framework, we can exploit the tidal phenomena between the BRAS/CR | |||
and SR/CR links, maximizing the utilization of these central trunk | and SR/CR links, maximizing the utilization of these central trunk | |||
links (which are usually higher cost than the local loops).</t> | links (which are usually higher cost than the local loops).</t> | |||
<t><figure> | <figure anchor="link-max-ccdr" | |||
<artwork><![CDATA[ +-------+ | title="Link Utilization Maximization via CCDR"> | |||
----- PCE | | <artwork align="left" alt="" name="" type=""><![CDATA[ | |||
| +-------+ | +-------+ | |||
+----|---+ | ----- PCE | | |||
| CR | | | +-------+ | |||
+----|---+ | +----|---+ | |||
| | | CR | | |||
--------|--------|-------| | +----|---+ | |||
| | | | | | | |||
+--|-+ +-|- +--|-+ +-|+ | |-------|--------|-------| | |||
|BRAS-----SR| |BRAS-----SR| | | | | | | |||
+----+ +--+ +----+ +--+ | +--|-+ +-|+ +--|-+ +-|+ | |||
|BRAS-----SR| |BRAS-----SR| | ||||
Figure 3: Link Utilization Maximization via CCDR]]></artwork> | +----+ +--+ +----+ +--+ | |||
</figure></t> | ]]></artwork> | |||
</figure> | ||||
</section> | </section> | |||
<section title="Traffic Engineering for Multi-Domain"> | <section numbered="true" toc="default"> | |||
<name>Traffic Engineering for Multi-domain</name> | ||||
<t>Service provider networks are often comprised of different domains, | <t>Service provider networks are often comprised of different domains, | |||
interconnected with each other, forming a very complex topology as | interconnected with each other, forming a very complex topology as | |||
illustrated in Figure 4. Due to the traffic pattern to/from the MAN | illustrated in <xref target="te-topology"/>. Due to the traffic | |||
and IDC, the utilization of the links between them are often | pattern to/from the MAN and IDC, the utilization of the links between | |||
asymmetric. It is almost impossible to balance the utilization of | them are often asymmetric. It is almost impossible to balance the | |||
these links via a distributed protocol, but this unbalance can be | utilization of these links via a distributed protocol, but this | |||
overcome utilizing the CCDR framework.</t> | unbalance can be overcome utilizing the CCDR framework.</t> | |||
<t><figure> | ||||
<artwork><![CDATA[ +---+ +---+ | ||||
|MAN|-----------------IDC| | ||||
+-|-| | +-|-+ | ||||
| ---------| | | ||||
------|BackBone|------ | ||||
| ----|----| | | ||||
| | | | ||||
+-|-- | ----+ | ||||
|IDC|----------------|MAN| | ||||
+---| |---+ | ||||
Figure 4: Traffic Engineering for Complex Multi-Domain Topology]]></artwork | <figure anchor="te-topology" | |||
> | title="Traffic Engineering for Complex Multi-domain Topology"> | |||
</figure></t> | <artwork align="left" alt="" name="" type=""><![CDATA[ | |||
+---+ +---+ | ||||
|MAN|----------------|IDC| | ||||
+---+ | +---+ | ||||
| ---------- | | ||||
|-----|Backbone|-----| | ||||
| ----|----- | | ||||
| | | | ||||
+---+ | +---+ | ||||
|IDC|----------------|MAN| | ||||
+---+ +---+ | ||||
]]></artwork> | ||||
</figure> | ||||
<t>A solution for this scenario requires the gathering of NetFlow | <t>A solution for this scenario requires the gathering of NetFlow | |||
information, analysis of the source/destination AS, and determining | information, analysis of the source/destination autonomous system | |||
what is the main cause of the congested link(s). After this, the | (AS), and determining what the main cause of the congested link(s) is. | |||
operator can use the external Border Gateway Protocol(eBGP) sessions | After this, the operator can use the external Border Gateway Protocol | |||
to schedule the traffic among the different domains according to the | (eBGP) sessions to schedule the traffic among the different domains | |||
solution described in CCDR framework.</t> | according to the solution described in the CCDR framework.</t> | |||
</section> | </section> | |||
<section title="Network Temporal Congestion Elimination"> | <section numbered="true" toc="default"> | |||
<t>In more general situations, there are often temporal congestion | <name>Network Temporal Congestion Elimination</name> | |||
within the service provider’s network, for example due to daily | ||||
or weekly periodic bursts, or large events that are scheduled well in | <t>In more general situations, there is often temporal congestion | |||
within the service provider's network, for example, due to daily or | ||||
weekly periodic bursts or large events that are scheduled well in | ||||
advance. Such congestion phenomena often appear regularly, and if the | advance. Such congestion phenomena often appear regularly, and if the | |||
service provider has methods to mitigate it, it will certainly improve | service provider has methods to mitigate it, it will certainly improve | |||
their network operations capabilities and increase satisfaction for | their network operation capabilities and increase satisfaction for | |||
their customers. CCDR is also suitable for such scenarios, as the | customers. CCDR is also suitable for such scenarios, as the controller | |||
controller can schedule traffic out of the congested links, lowering | can schedule traffic out of the congested links, lowering their | |||
the utilization of them during these times. <xref | utilization during these times. <xref format="default" | |||
target="Section-4.5"/> describes the simulation results of this | target="Section-4.5"/> describes the simulation results of this | |||
scenario.</t> | scenario.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="Section-4" title="CCDR Simulation"> | <section anchor="Section-4" numbered="true" toc="default"> | |||
<name>CCDR Simulation</name> | ||||
<t>The following sections describe a specific case study to illustrate | <t>The following sections describe a specific case study to illustrate | |||
the workings of the CCDR algorithm with concrete paths/metrics, as well | the workings of the CCDR algorithm with concrete paths/metrics, as well | |||
as a procedure for generating topology and traffic matrices and the | as a procedure for generating topology and traffic matrices and the | |||
results from simulations applying CCDR for E2E QoS (assured path and | results from simulations applying CCDR for E2E QoS (assured path and | |||
congestion elimination) over the generated topologies and traffic | congestion elimination) over the generated topologies and traffic | |||
matrices. In all cases examined, the CCDR algorithm produces | matrices. In all cases examined, the CCDR algorithm produces | |||
qualitatively significant improvement over the reference (OSPF) | qualitatively significant improvement over the reference (OSPF) | |||
algorithm, suggesting that CCDR will have broad applicability.</t> | algorithm, suggesting that CCDR will have broad applicability.</t> | |||
<t>The structure and scale of the simulated topology is similar to that | <t>The structure and scale of the simulated topology is similar to that | |||
of the real networks. Multiple different traffic matrices were generated | of the real networks. Multiple different traffic matrices were generated | |||
to simulate different congestion conditions in the network. Only one of | to simulate different congestion conditions in the network. Only one of | |||
them is illustrated since the others produce similar results.</t> | them is illustrated since the others produce similar results.</t> | |||
<section title="Case Study for CCDR Algorithm"> | <section numbered="true" toc="default"> | |||
<t>In this section we consider a specific network topology for case | <name>Case Study for CCDR Algorithm</name> | |||
study, examining the path selected by OSPF and CCDR and evaluating how | ||||
and why the paths differ. Figure 5 depicts the topology of the network | ||||
in this case. There are 8 forwarding devices in the network. The | ||||
original cost and utilization are marked on it, as shown in the | ||||
figure. For example, the original cost and utilization for the link | ||||
(1,2) are 3 and 50% respectively. There are two flows: f1 and f2. Both | ||||
of these two flows are from node 1 to node 8. For simplicity, it is | ||||
assumed that the bandwidth of the link in the network is 10Mb/s. The | ||||
flow rate of f1 is 1Mb/s, and the flow rate of f2 is 2Mb/s. The | ||||
threshold of the link in congestion is 90%.</t> | ||||
<t>If OSPF protocol (ISIS is similar, because it also use the | <t>In this section, we consider a specific network topology for case | |||
Dijstra's algorithm) is applied in the network, which adopts | study: examining the path selected by OSPF and CCDR and evaluating how | |||
Dijkstra's algorithm, the two flows from node 1 to node 8 can only use | and why the paths differ. <xref target="ccdr-algo"/> depicts the | |||
the OSPF path (p1: 1->2->3->8). It is because Dijkstra's | topology of the network in this case. There are eight forwarding | |||
algorithm mainly considers original cost of the link. Since CCDR | devices in the network. The original cost and utilization are marked | |||
considers cost and utilization simultaneously, the same path as OSPF | on it as shown in the figure. For example, the original cost and | |||
will not be selected due to the severe congestion of the link (2,3). | utilization for the link (1, 2) are 3 and 50%, respectively. There are | |||
In this case, f1 will select the path (p2: 1->5->6->7->8) | two flows: f1 and f2. Both of these two flows are from node 1 to node | |||
since the new cost of this path is better than that of OSPF path. | 8. For simplicity, it is assumed that the bandwidth of the link in the | |||
network is 10 Mb/s. The flow rate of f1 is 1 Mb/s and the flow rate of | ||||
f2 is 2 Mb/s. The threshold of the link in congestion is 90%.</t> | ||||
<t>If the OSPF protocol, which adopts Dijkstra's algorithm (IS-IS is | ||||
similar because it also uses Dijkstra's algorithm), is applied in the | ||||
network, the two flows from node 1 to node 8 can only use the OSPF | ||||
path (p1: 1->2->3->8). This is because Dijkstra's algorithm | ||||
mainly considers the original cost of the link. Since CCDR considers | ||||
cost and utilization simultaneously, the same path as OSPF will not be | ||||
selected due to the severe congestion of the link (2, 3). In this | ||||
case, f1 will select the path (p2: 1->5->6->7->8) since | ||||
the new cost of this path is better than that of the OSPF path. | ||||
Moreover, the path p2 is also better than the path (p3: | Moreover, the path p2 is also better than the path (p3: | |||
1->2->4->7->8) for for flow f1. However, f2 will not | 1->2->4->7->8) for flow f1. However, f2 will not select | |||
select the same path since it will cause the new congestion in the | the same path since it will cause new congestion in the link (6, 7). | |||
link (6,7). As a result, f2 will select the path (p3: | As a result, f2 will select the path (p3: | |||
1->2->4->7->8).</t> | 1->2->4->7->8).</t> | |||
<t><figure> | <figure anchor="ccdr-algo" title="Case Study for CCDR's Algorithm"> | |||
<artwork><![CDATA[ | <artwork align="left" alt="" name="" type=""><![CDATA[ | |||
+----+ f1 +-------> +-----+ ----> +-----+ | +----+ f1 +-------> +-----+ ----> +-----+ | |||
|Edge|-----------+ |+--------| 3 |-------| 8 | | |Edge|-----------+ |+--------| 3 |-------| 8 | | |||
|Node|---------+ | ||+-----> +-----+ ----> +-----+ | |Node|---------+ | ||+-----> +-----+ ----> +-----+ | |||
+----+ | | 4/95%||| 6/50% | | +----+ | | 4/95%||| 6/50% | | |||
| | ||| 5/60%| | | | ||| 5/60%| | |||
| v ||| | | | v ||| | | |||
+----+ +-----+ -----> +-----+ +-----+ +-----+ | +----+ +-----+ -----> +-----+ +-----+ +-----+ | |||
|Edge|-------| 1 |--------| 2 |------| 4 |------| 7 | | |Edge|-------| 1 |--------| 2 |------| 4 |------| 7 | | |||
|Node|-----> +-----+ -----> +-----+7/60% +-----+5/45% +-----+ | |Node|-----> +-----+ -----> +-----+7/60% +-----+5/45% +-----+ | |||
+----+ f2 | 3/50% | | +----+ f2 | 3/50% | | |||
| | | | | | |||
| 3/60% +-----+ 5/55%+-----+ 3/75% | | | 3/60% +-----+ 5/55%+-----+ 3/75% | | |||
+-----------| 5 |------| 6 |---------+ | +-----------| 5 |------| 6 |---------+ | |||
+-----+ +-----+ | +-----+ +-----+ | |||
(a) Dijkstra's Algorithm (OSPF/ISIS) | (a) Dijkstra's Algorithm (OSPF/IS-IS) | |||
+----+ f1 +-----+ ----> +-----+ | ||||
|Edge|-----------+ +--------| 3 |-------| 8 | | ||||
|Node|---------+ | | +-----+ ----> +-----+ | ||||
+----+ | | 4/95% | 6/50% ^|^ | ||||
| | | 5/60%||| | ||||
| v | ||| | ||||
+----+ +-----+ -----> +-----+ ---> +-----+ ---> +-----+ | ||||
|Edge|-------| 1 |--------| 2 |------| 4 |------| 7 | | ||||
|Node|-----> +-----+ +-----+7/60% +-----+5/45% +-----+ | ||||
+----+ f2 || 3/50% |^ | ||||
|| || | ||||
|| 3/60% +-----+5/55% +-----+ 3/75% || | ||||
|+-----------| 5 |------| 6 |---------+| | ||||
+----------> +-----+ ---> +-----+ ---------+ | ||||
(b) CCDR Algorithm | ||||
Figure 5: Case Study for CCDR's Algorithm | +----+ f1 +-----+ ----> +-----+ | |||
|Edge|-----------+ +--------| 3 |-------| 8 | | ||||
|Node|---------+ | | +-----+ ----> +-----+ | ||||
+----+ | | 4/95% | 6/50% ^|^ | ||||
| | | 5/60%||| | ||||
| v | ||| | ||||
+----+ +-----+ -----> +-----+ ---> +-----+ ---> +-----+ | ||||
|Edge|-------| 1 |--------| 2 |------| 4 |------| 7 | | ||||
|Node|-----> +-----+ +-----+7/60% +-----+5/45% +-----+ | ||||
+----+ f2 || 3/50% |^ | ||||
|| || | ||||
|| 3/60% +-----+5/55% +-----+ 3/75% || | ||||
|+-----------| 5 |------| 6 |---------+| | ||||
+----------> +-----+ ---> +-----+ ---------+ | ||||
(b) CCDR Algorithm | ||||
]]></artwork> | ]]></artwork> | |||
</figure></t> | </figure> | |||
</section> | </section> | |||
<section title="Topology Simulation"> | <section numbered="true" toc="default"> | |||
<name>Topology Simulation</name> | ||||
<t>Moving on from the specific case study, we now consider a class of | <t>Moving on from the specific case study, we now consider a class of | |||
networks more representative of real deployments, with a fully-linked | networks more representative of real deployments, with a fully linked | |||
core network that serves to connect edge nodes, which themselves | core network that serves to connect edge nodes, which themselves | |||
connect to only a subset of the core. An example of such a topology is | connect to only a subset of the core. An example of such a topology is | |||
shown in Figure 6, for the case of 4 core nodes and 5 edge nodes. The | shown in <xref target="top-sim"/> for the case of 4 core nodes and 5 | |||
CCDR simulations presented in this work use topologies involving 100 | edge nodes. The CCDR simulations presented in this work use topologies | |||
core nodes and 400 edge nodes. While the resulting graph does not fit | involving 100 core nodes and 400 edge nodes. While the resulting graph | |||
on this page, this scale of network is similar to what is deployed in | does not fit on this page, this scale of network is similar to what is | |||
production environments.</t> | deployed in production environments.</t> | |||
<t><figure> | ||||
<artwork><![CDATA[ +----+ | ||||
/|Edge|\ | ||||
| +----+ | | ||||
| | | ||||
| | | ||||
+----+ +----+ +----+ | ||||
|Edge|----|Core|-----|Core|---------+ | ||||
+----+ +----+ +----+ | | ||||
/ | \ / | | | ||||
+----+ | \ / | | | ||||
|Edge| | X | | | ||||
+----+ | / \ | | | ||||
\ | / \ | | | ||||
+----+ +----+ +----+ | | ||||
|Edge|----|Core|-----|Core| | | ||||
+----+ +----+ +----+ | | ||||
| | | | ||||
| +------\ +----+ | ||||
| ---|Edge| | ||||
+-----------------/ +----+ | ||||
Figure 6: Topology of Simulation | <figure anchor="top-sim" title="Topology of Simulation"> | |||
<artwork align="left" alt="" name="" type=""><![CDATA[ | ||||
+----+ | ||||
/|Edge|\ | ||||
| +----+ | | ||||
| | | ||||
| | | ||||
+----+ +----+ +----+ | ||||
|Edge|----|Core|-----|Core|---------+ | ||||
+----+ +----+ +----+ | | ||||
/ | \ / | | | ||||
+----+ | \ / | | | ||||
|Edge| | X | | | ||||
+----+ | / \ | | | ||||
\ | / \ | | | ||||
+----+ +----+ +----+ | | ||||
|Edge|----|Core|-----|Core| | | ||||
+----+ +----+ +----+ | | ||||
| | | | ||||
| +------\ +----+ | ||||
| ---|Edge| | ||||
+-----------------/ +----+ | ||||
]]></artwork> | ]]></artwork> | |||
</figure></t> | </figure> | |||
<t>For the simulations, the number of links connecting one edge node | <t>For the simulations, the number of links connecting one edge node | |||
to the set of core nodes is randomly chosen between 2 to 30, and the | to the set of core nodes is randomly chosen between two and thirty, | |||
total number of links is more than 20000. Each link has a congestion | and the total number of links is more than 20,000. Each link has a | |||
threshold, which can be arbitrarily set to (e.g.) 90% of the nominal | congestion threshold, which can be arbitrarily set, for example, to | |||
link capacity without affecting the simulation results.</t> | 90% of the nominal link capacity without affecting the simulation | |||
results.</t> | ||||
</section> | </section> | |||
<section title="Traffic Matrix Simulation"> | <section numbered="true" toc="default"> | |||
<name>Traffic Matrix Simulation</name> | ||||
<t>For each topology, a traffic matrix is generated based on the link | <t>For each topology, a traffic matrix is generated based on the link | |||
capacity of topology. It can result in many kinds of situations, such | capacity of the topology. It can result in many kinds of situations | |||
as congestion, mild congestion and non-congestion.</t> | such as congestion, mild congestion, and non-congestion.</t> | |||
<t>In the CCDR simulation, the dimension of the traffic matrix is | <t>In the CCDR simulation, the dimension of the traffic matrix is | |||
500*500 (100 core nodes plus 400 edge nodes). About 20% of links are | 500*500 (100 core nodes plus 400 edge nodes). About 20% of links are | |||
overloaded when the Open Shortest Path First (OSPF) protocol is used | overloaded when the Open Shortest Path First (OSPF) protocol is used | |||
in the network.</t> | in the network.</t> | |||
</section> | </section> | |||
<section anchor="Section-4.4" title="CCDR End-to-End Path Optimization"> | <section anchor="Section-4.4" numbered="true" toc="default"> | |||
<t>The CCDR E2E path optimization is to find the best path which is | <name>CCDR End-to-End Path Optimization</name> | |||
the lowest in metric value and for each link of the path, the | ||||
utilizatioin is far below link’s congestion threshold. Based on | <t>The CCDR E2E path optimization entails finding the best path, which | |||
the current state of the network, the PCE within CCDR framework | is the lowest in metric value, as well as having utilization far below | |||
combines the shortest path algorithm with a penalty theory of | the congestion threshold for each link of the path. Based on the | |||
classical optimization and graph theory.</t> | current state of the network, the PCE within CCDR framework combines | |||
the shortest path algorithm with a penalty theory of classical | ||||
optimization and graph theory.</t> | ||||
<t>Given a background traffic matrix, which is unscheduled, when a set | <t>Given a background traffic matrix, which is unscheduled, when a set | |||
of new flows comes into the network, the E2E path optimization finds | of new flows comes into the network, the E2E path optimization finds | |||
the optimal paths for them. The selected paths bring the least | the optimal paths for them. The selected paths bring the least | |||
congestion degree to the network.</t> | congestion degree to the network.</t> | |||
<t>The link Utilization Increment Degree(UID), when the new flows are | <t>The link Utilization Increment Degree (UID), when the new flows are | |||
added into the network, is shown in Figure 7. The first graph in | added into the network, is shown in <xref | |||
Figure 7 is the UID with OSPF and the second graph is the UID with | target="sim-congestion-elimination"/>. The first graph in <xref | |||
CCDR E2E path optimization. The average UID of the first graph is more | target="sim-congestion-elimination"/> is the UID with OSPF, and the | |||
than 30%. After path optimization, the average UID is less than 5%. | second graph is the UID with CCDR E2E path optimization. The average | |||
The results show that the CCDR E2E path optimization has an | UID of the first graph is more than 30%. After path optimization, the | |||
eye-catching decrease in UID relative to the path chosen based on | average UID is less than 5%. The results show that the CCDR E2E path | |||
OSPF.</t> | optimization has an eye-catching decrease in UID relative to the path | |||
chosen based on OSPF.</t> | ||||
<t>While real-world results invariably differ from simulations (for | <t>While real-world results invariably differ from simulations (for | |||
example, real-world topologies are likely to exhibit correlation in | example, real-world topologies are likely to exhibit correlation in | |||
the attachment patterns for edge nodes to the core, which are not | the attachment patterns for edge nodes to the core, which are not | |||
reflected in these results), the dramatic nature of the improvement in | reflected in these results), the dramatic nature of the improvement in | |||
UID and the choice of simulated topology to resemble real-world | UID and the choice of simulated topology to resemble real-world | |||
conditions suggests that real-world deployments will also experience | conditions suggest that real-world deployments will also experience | |||
significant improvement in UID results.</t> | significant improvement in UID results.</t> | |||
<t><figure> | <figure anchor="sim-congestion-elimination" | |||
<artwork><![CDATA[ +---------------------------------------- | title="Simulation Results with Congestion Elimination"> | |||
-------------------+ | <artwork align="left" alt="" name="" type=""><![CDATA[ | |||
| * * * *| | +-----------------------------------------------------------+ | |||
60| * * * * * *| | | * * * *| | |||
|* * ** * * * * * ** * * * * **| | 60| * * * * * *| | |||
|* * ** * * ** *** ** * * ** * * * ** * * *** **| | |* * ** * * * * * ** * * * * **| | |||
|* * * ** * ** ** *** *** ** **** ** *** **** ** *** **| | |* * ** * * ** *** ** * * ** * * * ** * * *** **| | |||
40|* * * ***** ** *** *** *** ** **** ** *** ***** ****** **| | |* * * ** * ** ** *** *** ** **** ** *** **** ** *** **| | |||
UID(%)|* * ******* ** *** *** ******* **** ** *** ***** *********| | 40|* * * ***** ** *** *** *** ** **** ** *** ***** ****** **| | |||
|*** ******* ** **** *********** *********** ***************| | UID(%)|* * ******* ** *** *** ******* **** ** *** ***** *********| | |||
|******************* *********** *********** ***************| | |*** ******* ** **** *********** *********** ***************| | |||
20|******************* ***************************************| | |******************* *********** *********** ***************| | |||
|******************* ***************************************| | 20|******************* ***************************************| | |||
|***********************************************************| | |******************* ***************************************| | |||
|***********************************************************| | |***********************************************************| | |||
0+-----------------------------------------------------------+ | |***********************************************************| | |||
0 100 200 300 400 500 600 700 800 900 1000 | 0+-----------------------------------------------------------+ | |||
+-----------------------------------------------------------+ | 0 100 200 300 400 500 600 700 800 900 1000 | |||
| | | +-----------------------------------------------------------+ | |||
60| | | | | | |||
| | | 60| | | |||
| | | | | | |||
| | | | | | |||
40| | | | | | |||
UID(%)| | | 40| | | |||
| | | UID(%)| | | |||
| | | | | | |||
20| | | | | | |||
| *| | 20| | | |||
| * *| | | *| | |||
| * * * * * ** * *| | | * *| | |||
0+-----------------------------------------------------------+ | | * * * * * ** * *| | |||
0 100 200 300 400 500 600 700 800 900 1000 | 0+-----------------------------------------------------------+ | |||
Flow Number | 0 100 200 300 400 500 600 700 800 900 1000 | |||
Flow Number | ||||
Figure 7: Simulation Result with Congestion Elimination | ||||
]]></artwork> | ]]></artwork> | |||
</figure></t> | </figure> | |||
</section> | </section> | |||
<section anchor="Section-4.5" | <section anchor="Section-4.5" numbered="true" toc="default"> | |||
title="Network Temporal Congestion Elimination"> | <name>Network Temporal Congestion Elimination</name> | |||
<t>During the simulations, different degrees of network congestion | <t>During the simulations, different degrees of network congestion | |||
were considered. To examine the effect of CCDR on link congestion, we | were considered. To examine the effect of CCDR on link congestion, we | |||
consider the Congestion Degree (CD) of a link, defined as the link | consider the Congestion Degree (CD) of a link, defined as the link | |||
utilization beyond its threshold.</t> | utilization beyond its threshold.</t> | |||
<t>The CCDR congestion elimination performance is shown in Figure 8. | <t>The CCDR congestion elimination performance is shown in <xref | |||
The first graph is the CD distribution before the process of | target="sim-congestion-elimination-2"/>. The first graph is the CD | |||
congestion elimination. The average CD of all congested links is about | distribution before the process of congestion elimination. The average | |||
20%. The second graph shown in Figure 8 is the CD distribution after | CD of all congested links is about 20%. The second graph shown in | |||
using the congestion elimination process. It shows that only 12 links | <xref target="sim-congestion-elimination-2"/> is the CD distribution | |||
among the total of 20000 links exceed the threshold, and all the CD | after using the congestion elimination process. It shows that only | |||
values are less than 3%. Thus, after scheduling of the traffic away | twelve links among the total 20,000 exceed the threshold, and all the | |||
CD values are less than 3%. Thus, after scheduling the traffic away | ||||
from the congested paths, the degree of network congestion is greatly | from the congested paths, the degree of network congestion is greatly | |||
eliminated and the network utilization is in balance.</t> | eliminated and the network utilization is in balance.</t> | |||
<t><figure> | <figure anchor="sim-congestion-elimination-2" | |||
<artwork><![CDATA[ Before congestion elimina | title="Simulation Results with Congestion Elimination"> | |||
tion | <artwork align="left" alt="" name="" type=""><![CDATA[ | |||
+-----------------------------------------------------------+ | Before congestion elimination | |||
| * ** * ** ** *| | +-----------------------------------------------------------+ | |||
20| * * **** * ** ** *| | | * ** * ** ** *| | |||
|* * ** * ** ** **** * ***** *********| | 20| * * **** * ** ** *| | |||
|* * * * * **** ****** * ** *** **********************| | |* * ** * ** ** **** * ***** *********| | |||
15|* * * ** * ** **** ********* *****************************| | |* * * * * **** ****** * ** *** **********************| | |||
|* * ****** ******* ********* *****************************| | 15|* * * ** * ** **** ********* *****************************| | |||
CD(%) |* ********* ******* ***************************************| | |* * ****** ******* ********* *****************************| | |||
10|* ********* ***********************************************| | CD(%) |* ********* ******* ***************************************| | |||
|*********** ***********************************************| | 10|* ********* ***********************************************| | |||
|***********************************************************| | |*********** ***********************************************| | |||
5|***********************************************************| | |***********************************************************| | |||
|***********************************************************| | 5|***********************************************************| | |||
|***********************************************************| | |***********************************************************| | |||
0+-----------------------------------------------------------+ | |***********************************************************| | |||
0 0.5 1 1.5 2 | 0+-----------------------------------------------------------+ | |||
0 0.5 1 1.5 2 | ||||
After congestion elimination | ||||
+-----------------------------------------------------------+ | ||||
| | | ||||
20| | | ||||
| | | ||||
| | | ||||
15| | | ||||
| | | ||||
CD(%) | | | ||||
10| | | ||||
| | | ||||
| | | ||||
5 | | | ||||
| | | ||||
| * ** * * * ** * ** * | | ||||
0 +-----------------------------------------------------------+ | ||||
0 0.5 1 1.5 2 | ||||
Link Number(*10000) | ||||
Figure 8: Simulation Result with Congestion Elimination | After congestion elimination | |||
+-----------------------------------------------------------+ | ||||
| | | ||||
20| | | ||||
| | | ||||
| | | ||||
15| | | ||||
| | | ||||
CD(%) | | | ||||
10| | | ||||
| | | ||||
| | | ||||
5 | | | ||||
| | | ||||
| * ** * * * ** * ** * | | ||||
0 +-----------------------------------------------------------+ | ||||
0 0.5 1 1.5 2 | ||||
Link Number(*10000) | ||||
]]></artwork> | ]]></artwork> | |||
</figure></t> | </figure> | |||
<t>It is clear that using an active path-computation mechanism that is | <t>It is clear that by using an active path-computation mechanism that | |||
able to take into account observed link traffic/congestion, the | is able to take into account observed link traffic/congestion, the | |||
occurrence of congestion events can be greatly reduced. Only when a | occurrence of congestion events can be greatly reduced. Only when a | |||
preponderance of links in the network are near their congestion | preponderance of links in the network are near their congestion | |||
threshold will the central controller be unable to find a clear path, | threshold will the central controller be unable to find a clear path | |||
as opposed to when a static metric-based procedure is used, which will | as opposed to when a static metric-based procedure is used, which will | |||
produce congested paths once a single bottleneck approaches its | produce congested paths once a single bottleneck approaches its | |||
capacity. More detailed information about the algorithm can be found | capacity. More detailed information about the algorithm can be found | |||
in<xref target="PTCS"/> .</t> | in <xref format="default" target="PTCS"/>.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section title="CCDR Deployment Consideration"> | <section numbered="true" toc="default"> | |||
<name>CCDR Deployment Consideration</name> | ||||
<t>The above CCDR scenarios and simulation results demonstrate that a | <t>The above CCDR scenarios and simulation results demonstrate that a | |||
single general solution can be found that copes with multiple complex | single general solution can be found that copes with multiple complex | |||
situations. The specific situations considered are not known to have any | situations. The specific situations considered are not known to have any | |||
special properties, so it is expected that the benefits demonstrated | special properties, so it is expected that the benefits demonstrated | |||
will have general applicability. Accordingly, the integrated use of a | will have general applicability. Accordingly, the integrated use of a | |||
centralized controller for the more complex optimal path computations in | centralized controller for the more complex optimal path computations in | |||
a native IP network should result in significant improvements without | a native IP network should result in significant improvements without | |||
impacting the underlay network infrastructure.</t> | impacting the underlying network infrastructure.</t> | |||
<t>For intra-domain or inter-domain native IP TE scenarios, the | <t>For intra-domain or inter-domain native IP TE scenarios, the | |||
deployment of a CCDR solution is similar, with the centralized | deployment of a CCDR solution is similar with the centralized controller | |||
controller being able to compute paths and no changes required to the | being able to compute paths along with no changes being required to the | |||
underlying network infrastructure. This universal deployment | underlying network infrastructure. This universal deployment | |||
characteristic can facilitate a generic traffic engineering solution, | characteristic can facilitate a generic traffic-engineering solution | |||
where operators do not need to differentiate between intra-domain and | where operators do not need to differentiate between intra-domain and | |||
inter-domain TE cases.</t> | inter-domain TE cases.</t> | |||
<t>To deploy the CCDR solution, the PCE should collect the underlay | <t>To deploy the CCDR solution, the PCE should collect the underlying | |||
network topology dynamically, for example via BGP-LS<xref | network topology dynamically, for example, via Border Gateway Protocol - | |||
target="RFC7752"/>. It also needs to gather the network traffic | Link State (BGP-LS) <xref format="default" target="RFC7752"/>. It also | |||
information periodically from the network management platform. The | needs to gather the network traffic information periodically from the | |||
simulation results show that the PCE can compute the E2E optimal path | network management platform. The simulation results show that the PCE | |||
within seconds, thus it can cope with the change of underlay network on | can compute the E2E optimal path within seconds; thus, it can cope with | |||
the scale of minutes. More agile requirements would need to increase the | a change to the underlying network in a matter of minutes. More agile | |||
sample rate of underlay network and decrease the detection and | requirements would need to increase the sample rate of the underlying | |||
notification interval of the underlay network. The methods to gather and | network and decrease the detection and notification interval of the | |||
decrease the latency of these information are out of the scope of this | underlying network. The methods of gathering this information as well as | |||
draft.</t> | decreasing its latency are out of the scope of this document.</t> | |||
</section> | </section> | |||
<section title="Security Considerations"> | <section numbered="true" toc="default"> | |||
<name>Security Considerations</name> | ||||
<t>This document considers mainly the integration of distributed | <t>This document considers mainly the integration of distributed | |||
protocols and the central control capability of a PCE. While it | protocols and the central control capability of a PCE. While it can | |||
certainly can ease the management of network in various traffic | certainly simplify the management of a network in various | |||
engineering scenarios as described in this document, the centralized | traffic-engineering scenarios as described in this document, the | |||
control also bring a new point that may be easily attacked. Solutions | centralized control also brings a new point that may be easily attacked. | |||
for CCDR scenarios need to consider protection of the PCE and | Solutions for CCDR scenarios need to consider protection of the PCE and | |||
communication with the underlay devices.</t> | communication with the underlying devices.</t> | |||
<t><xref target="RFC5440"/> and <xref target="RFC8253"/> provide | <t><xref format="default" target="RFC5440"/> and <xref format="default" | |||
additional information.</t> | target="RFC8253"/> provide additional information.</t> | |||
<t>The control priority and interaction process should also be carefully | <t>The control priority and interaction process should also be carefully | |||
designed for the combination of distributed protocol and central | designed for the combination of the distributed protocol and central | |||
control. Generally, the central control instruction should have higher | control. Generally, the central control instructions should have higher | |||
priority than the forwarding actions determined by the distributed | priority than the forwarding actions determined by the distributed | |||
protocol. When the communication between PCE and the underlay devices is | protocol. When communication between PCE and the underlying devices is | |||
not in function, the distributed protocol should take over the control | disrupted, the distributed protocol should take control of the | |||
right of the underlay network. <xref | underlying network. <xref format="default" | |||
target="I-D.ietf-teas-pce-native-ip"/> provides more considerations | target="I-D.ietf-teas-pce-native-ip"/> provides more considerations | |||
corresponding to the solution.</t> | corresponding to the solution.</t> | |||
</section> | </section> | |||
<section title="IANA Considerations"> | <section numbered="true" toc="default"> | |||
<t>This document does not require any IANA actions.</t> | <name>IANA Considerations</name> | |||
</section> | ||||
<section title="Contributors"> | ||||
<t>Lu Huang contributed to the content of this draft.</t> | ||||
</section> | ||||
<section title="Acknowledgement"> | ||||
<t>The author would like to thank Deborah Brungard, Adrian Farrel, | ||||
Huaimo Chen, Vishnu Beeram and Lou Berger for their support and comments | ||||
on this draft.</t> | ||||
<t>Thanks Benjamin Kaduk for his careful review and valuable suggestions | <t>This document has no IANA actions.</t> | |||
to this draft. Also thanks Roman Danyliw, Alvaro Retana and Éric | ||||
Vyncke for their views and comments.</t> | ||||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<references title="Normative References"> | <displayreference target="I-D.ietf-teas-pce-native-ip" | |||
<?rfc include="reference.RFC.5440"?> | to="PCE-NATIVE-IP"/> | |||
<?rfc include="reference.RFC.7752"?> | <displayreference target="I-D.ietf-pce-pcep-extension-native-ip" | |||
to="PCEP-NATIVE-IP-EXT"/> | ||||
<?rfc include="reference.RFC.8253"?> | <references> | |||
</references> | <name>References</name> | |||
<references title="Informative References"> | <references> | |||
<?rfc include="reference.RFC.3209"?> | <name>Normative References</name> | |||
<?rfc include="reference.RFC.8402"?> | <xi:include | |||
href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5440.x | ||||
ml" | ||||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
<?rfc include="reference.RFC.8578"?> | <xi:include | |||
href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7752.x | ||||
ml" | ||||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
<?rfc include="reference.I-D.ietf-teas-pce-native-ip"?> | <xi:include | |||
href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8253.x | ||||
ml" | ||||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
</references> | ||||
<?rfc include="reference.I-D.ietf-pce-pcep-extension-native-ip"?> | <references> | |||
<name>Informative References</name> | ||||
<reference anchor="PTCS" | <xi:include | |||
target="http://ieeexplore.ieee.org/document/8657733"> | href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3209.x | |||
<front> | ml" | |||
<title>A Practical Traffic Control Scheme With Load Balancing Based | xmlns:xi="http://www.w3.org/2001/XInclude"/> | |||
on PCE Architecture</title> | ||||
<author fullname="Pei Zhang" initials="P." surname="Zhang"> | <xi:include | |||
<organization/> | href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8402.x | |||
</author> | ml" | |||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
<author fullname="Kun Xie" initials="K." surname="Xie"> | <xi:include | |||
<organization/> | href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8578.x | |||
</author> | ml" | |||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
<author fullname="Caixia Kou" initials="C." surname="Kou"> | <xi:include | |||
<organization/> | href="https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf- | |||
</author> | teas-pce-native-ip.xml" | |||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
<author fullname="Xiaohong Huang" initials="X." surname="Huang"> | <xi:include | |||
<organization/> | href="https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf- | |||
</author> | pce-pcep-extension-native-ip.xml" | |||
xmlns:xi="http://www.w3.org/2001/XInclude"/> | ||||
<author fullname="Aijun Wang" initials="A." surname="Wang"> | <reference anchor="PTCS" | |||
<organization/> | target="https://ieeexplore.ieee.org/document/8657733"> | |||
</author> | <front> | |||
<title>A Practical Traffic Control Scheme With Load Balancing | ||||
Based on PCE Architecture</title> | ||||
<author fullname="Qiong Sun" initials="Q." surname="Sun"> | <seriesInfo name="DOI" value="10.1109/ACCESS.2019.2902610"/> | |||
<organization/> | ||||
</author> | ||||
<date day="4" month="March" year="2019"/> | <seriesInfo name="IEEE Access" value="18526773"/> | |||
<abstract> | <author fullname="Pei Zhang" initials="P." surname="Zhang"> | |||
<t>This document describes a framework by which Integrated | <organization/> | |||
Services may be supported over Diffserv networks. This memo | </author> | |||
provides information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="IEEE Access" value="18526773"/> | <author fullname="Kun Xie" initials="K." surname="Xie"> | |||
<organization/> | ||||
</author> | ||||
<seriesInfo name="DOI" value="10.1109/ACCESS.2019.2902610"/> | <author fullname="Caixia Kou" initials="C." surname="Kou"> | |||
</reference> | <organization/> | |||
</author> | ||||
<?rfc ?> | <author fullname="Xiaohong Huang" initials="X." surname="Huang"> | |||
<organization/> | ||||
</author> | ||||
<author fullname="Aijun Wang" initials="A." surname="Wang"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="Qiong Sun" initials="Q." surname="Sun"> | ||||
<organization/> | ||||
</author> | ||||
<date month="March" year="2019"/> | ||||
</front> | ||||
</reference> | ||||
</references> | ||||
</references> | </references> | |||
<section numbered="false" toc="default"> | ||||
<name>Acknowledgements</name> | ||||
<t>The authors would like to thank <contact | ||||
fullname="Deborah Brungard"/>, <contact | ||||
fullname="Adrian Farrel"/>, <contact fullname="Huaimo Chen"/>, <contact | ||||
fullname="Vishnu Beeram"/>, and <contact fullname="Lou Berger"/> for | ||||
their support and comments on this document.</t> | ||||
<t>Thanks to <contact fullname="Benjamin Kaduk"/> for his careful review | ||||
and valuable suggestions on this document. Also, thanks to <contact | ||||
fullname="Roman Danyliw"/>, <contact fullname="Alvaro Retana"/>, and | ||||
<contact fullname="Eric Vyncke"/> for their reviews and comments.</t> | ||||
</section> | ||||
<section numbered="false" toc="default"> | ||||
<name>Contributors</name> | ||||
<t><contact fullname="Lu Huang"/> contributed to the content of this | ||||
document.</t> | ||||
</section> | ||||
</back> | </back> | |||
</rfc> | </rfc> | |||
End of changes. 111 change blocks. | ||||
500 lines changed or deleted | 573 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |