[Nsi-wg] NML topology
Jerry Sobieski
jerry at nordu.net
Mon Feb 22 22:45:59 CST 2010
Good idea Guy...I have a couple of posts...here is the first:.
I suggest we focus on which NSI service request parameters or semantics
have topological significance and what those are. For instance:
*1. NSI: A Connection request must, at a minimum, specify the ingress
point and the egress point. The Connection request may also specify
intermediate transit points for the connection. The semantics of loose
hop request is PO={A,B,C}, is equivalent to Connection A>B concatenated
with Connection B>C. *
Topo Requirement: Each of these "point" identifiers must uniquely
determine and map to a location in the transport topology. What is the
NSI definition of a "point"used in this context? It seems to correspond
to our STP discussion...so we need to decide what a point in the Path
Object really refers to topologically.
*2. NSI: A Provider NSA is responsible for decomposing the Connection
request (into piecewise segments defined by the PO) and forwarding
sub-requests to other service agents** as it deems appropriate or
necessary**, and insuring the returned sub-segments can be assembled
into a single fully satisfied Connection and returning that Connection
result to the Requesting NSA. *
Requirement: Define how the NSA handles Connection requests.
a) The NSA decomposes the request into a set of sub-segments as
defined by the PO.
b) The NSA must forward each sub-request to/towards the NSA that
owns the ingress STP of the sub-request, /[Here is where topology comes
into play - how do we know where to send a request? Must map STP to NSA
owner or have reachability in the topology..] /
c) If an NSA receives a request whose ingress STP is in the local
Domain, the NSA invokes the PathFinder to reserve a Path towards the
next STP [/NSA must be able to recognize STPs in its local domain/]
d) Upon successful reservation, the returned POs of the sub-requests
are merged into a single PO and returned to the originating Requester.
*3. NSI: Upon successfull reservation, a Path Object is returned to the
user describing the resulting Path. This PO will contain the STPs
stipulated by the originating request, and will contain either a) STPs
of the as-built Connection, or b) named Path Object(s) for opaque
as-built information.*
Requirement: Path Object definition. Including opaque Named POs that
are only revealed to authorized requesters. A PO must contain STPs, but
must also include a Named PO - which must carry some authorization
policy. How do these Named POs get resolved? what do they look like,
how are names constructed, etc.
The above notion that we forward requests from one NSA to another based
upon some ownership means we must define that ownership concept.
Therein lies the notions of grouping resources into Networks, and a
single NSA King for each Network kingdom :-) If STPs are part of that
group, what are they and how do we summarize such info?
However, we do not have a trust relationship with all NSAs - its scaling
problem. We must assume that we will connect directly with some
neighbor Networks, and have a trusted relationship with them. But we
will not (cannot) directly connect to every network, and therefore some
such "far-away" networks will not recognize and trust our local NSA.
For these latter cases, the only way we will know of that far-away
domain is if one of our direct neighbors offers to act as transit to to
Far-Away domain by announcing all or some of Far-Away's topology. In
this case, we see far-away, but we must rely on our neighbor to forward
any requests to Far-Away. If our NSA encounters an STP that lives in
Far-Away, and our peering table has no trust with Far-Away, then we
must send our request to our neighbor who acts as intermediary. (In
point of fact, our neighbor acts no differently than it would for any
other request - it sees the Far-Away STP and forwards the request likewise.)
This may generate another topology requirement- that of reachability.
I.e. how do we describe the set of points (STPs) reachable within (or
through) a given domain? We have to recognize that our reachable end
systems or STPs will almost immediately be counted in the thousands.
We probably need some sort of hierarchichal naming scheme.
thoughts?
Jerry
Guy Roberts wrote:
> I suggest the following 10 requirements as a starter:
>
> Requirement 1: The model should be able to describe a grouping of network resources that are owned and controlled by a single provider or NSA. (I will call this a NETWORK for the moment)
>
> Requirement 2: The model should be able to describe a grouping of NETWORKs. (e.g. a federation of providers with shared policy)
> Requirement 3: The model should be able to describe resources (ports/points) in a NETWORK that are available for connecting to other NETWORKs. (I will call this a network connection point NCP for the moment)
> Requirement 4: These NPs should be able to be performed at the end of a link that is internal to the domain as well as to ports on a device. (in my opinion the NCP on a link requirement needs a use-case)
> Requirement 5: The model should be able to describe an arbitrary number of layers of logical ports within a NCP.
> Requirement 6: The model should be able to describe connectivity between NETWORKs. (I will call this inter network connection (INCs) for the moment)
> Requirement 7: The model should be able to describe groups of INCs.
> Requirement 8: The resources that make up INCs should have ownership by a clearly identifiable provider. (i.e. resources without NSA ownership are not allowed). (note: Does this also include the patch cord between providers?)
> Requirement 9: The model should allow policy to be assigned to INCs, even where the INC is wholly or partly made up of passive resources.
> Requirement 10: The model should be able to fully describe a circuit (i.e. NSI service) that transits the topology.
>
> Any thoughts on these and other requirements would be helpful.
>
> Guy
>
>
> -----Original Message-----
> From: Freek Dijkstra [mailto:Freek.Dijkstra at sara.nl]
> Sent: 22 February 2010 13:52
> To: NSI WG
> Cc: Guy Roberts; Jeroen van der Ham; John Vollbrecht
> Subject: Re: [Nsi-wg] NML topology
>
> Can I summarize this discussion as follows?
>
> Requirement: It should be possible to assign a policy to an
> (interdomain) link.
>
> Of course, I can think of a solution (e.g. make that link part of a
> topology, like John's second picture, assign the topology to a
> networkdomain, and assign a policy to that networkdomain). However, this
> seems out of scope. I think the best way forward is to describe this and
> other requirements and forward them to the NML and ask the NML folks to
> come up with a solution for the requirement. I also wholeheartedly
> invite all NSI group members to become a "NML folk" too by joining the
> NML list!
>
> Regards,
> Freek
> _______________________________________________
> nsi-wg mailing list
> nsi-wg at ogf.org
> http://www.ogf.org/mailman/listinfo/nsi-wg
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.ogf.org/pipermail/nsi-wg/attachments/20100222/fe84ec94/attachment.html
More information about the nsi-wg
mailing list