[Nsi-wg] NML topology

Guy Roberts Guy.Roberts at dante.net
Tue Feb 23 03:43:31 CST 2010


Jerry,

I like what you have done here - the point is to first state clearly what the NSI 'Connection Service' needs to do, and then to derive the topology requirements from these service functions.

Will you be able to make tomorrow's call?  I would like to make this  make this a topic for discussion.

Guy





From: Jerry Sobieski [mailto:jerry at nordu.net]
Sent: 23 February 2010 04:46
To: Guy Roberts
Cc: Freek Dijkstra; NSI WG
Subject: Re: [Nsi-wg] NML topology

Good idea Guy...I have a couple of posts...here is the first:.

I suggest we focus on which NSI service request parameters or semantics have topological significance and what those are.  For instance:


1. NSI:    A Connection request must, at a minimum, specify the ingress point and the egress point.  The Connection request may also specify intermediate transit points for the connection.   The semantics of loose hop request is PO={A,B,C}, is equivalent to Connection A>B concatenated with Connection B>C.

Topo Requirement:    Each of these "point" identifiers must uniquely determine and map to a location in the transport topology.  What is the NSI definition of a "point"used in this context?  It seems to correspond to our STP discussion...so we need to decide what a point in the Path Object really refers to topologically.


2. NSI:  A Provider NSA is responsible for decomposing the Connection request (into piecewise segments defined by the PO) and forwarding sub-requests to other service agents as it deems appropriate or necessary, and insuring the returned sub-segments can be assembled into a single fully satisfied Connection and returning that Connection result to the Requesting NSA.

Requirement:  Define how the NSA handles Connection requests.
    a) The NSA decomposes the request into a set of sub-segments as defined by the PO.
    b) The NSA must forward each sub-request to/towards the NSA that owns the ingress STP of the sub-request, [Here is where topology comes into play - how do we know where to send a request?  Must map STP to NSA owner or have reachability in the topology..]
    c) If an NSA receives a request whose ingress STP is in the local Domain, the NSA invokes the PathFinder to reserve a Path towards the next STP  [NSA must be able to recognize STPs in its local domain]
    d) Upon successful reservation, the returned POs of the sub-requests are merged into a single PO and returned to the originating Requester.

3. NSI:  Upon successfull reservation, a Path Object is returned to the user describing the resulting Path.  This PO will contain the STPs stipulated by the originating request, and will contain either a) STPs of the as-built Connection, or b) named Path Object(s) for opaque as-built information.

Requirement:   Path Object definition.   Including opaque Named POs that are only revealed to authorized requesters.  A PO must contain STPs, but must also include a Named PO - which must carry some authorization policy.  How do these Named POs get resolved?  what do they look like, how are names constructed, etc.

The above notion that we forward requests from one NSA to another based upon some ownership means we must define that ownership concept.  Therein lies the notions of grouping resources into Networks, and a single NSA King for each Network kingdom :-)  If STPs are part of that group, what are they and how do we summarize such info?

However, we do not have a trust relationship with all NSAs - its scaling problem.   We must assume that we will connect directly with some neighbor Networks, and have a trusted relationship with them.  But we will not (cannot) directly connect to every network, and therefore some such "far-away" networks will not recognize and trust our local NSA.  For these latter cases, the only way we will know of that far-away domain is if one of our direct neighbors offers to act as transit to to Far-Away domain by announcing all or some of Far-Away's topology.   In this case, we see far-away, but we must rely on our neighbor to forward any requests to Far-Away.   If our NSA encounters an STP that lives in Far-Away,  and our peering table has no trust with Far-Away, then we must send our request to our neighbor who acts as intermediary.  (In point of fact, our neighbor acts no differently than it would for any other request - it sees the Far-Away STP and forwards the request likewise.)

This may generate another topology requirement- that of reachability.  I.e. how do we describe the set of points (STPs) reachable within (or through) a given domain?   We have to recognize that our reachable end systems or STPs will almost immediately be counted in the thousands.   We probably need some sort of hierarchichal naming scheme.

thoughts?
Jerry


Guy Roberts wrote:



I suggest the following 10 requirements as a starter:



Requirement 1: The model should be able to describe a grouping of network resources that are owned and controlled by a single provider or NSA. (I will call this a NETWORK for the moment)



Requirement 2: The model should be able to describe a grouping of NETWORKs. (e.g. a federation of providers with shared policy)

Requirement 3: The model should be able to describe resources (ports/points) in a NETWORK that are available for connecting to other NETWORKs.  (I will call this a network connection point NCP for the moment)

Requirement 4: These NPs should be able to be performed at the end of a link that is internal to the domain as well as to ports on a device.  (in my opinion the NCP on a link requirement needs a use-case)

Requirement 5: The model should be able to describe an arbitrary number of layers of logical ports within a NCP.

Requirement 6: The model should be able to describe connectivity between NETWORKs. (I will call this inter network connection (INCs) for the moment)

Requirement 7: The model should be able to describe groups of INCs.

Requirement 8: The resources that make up INCs should have ownership by a clearly identifiable provider. (i.e. resources without NSA ownership are not allowed).  (note: Does this also include the patch cord between providers?)

Requirement 9: The model should allow policy to be assigned to INCs, even where the INC is wholly or partly made up of passive resources.

Requirement 10: The model should be able to fully describe a circuit (i.e. NSI service) that transits the topology.



Any thoughts on these and other requirements would be helpful.



Guy





-----Original Message-----

From: Freek Dijkstra [mailto:Freek.Dijkstra at sara.nl]

Sent: 22 February 2010 13:52

To: NSI WG

Cc: Guy Roberts; Jeroen van der Ham; John Vollbrecht

Subject: Re: [Nsi-wg] NML topology



Can I summarize this discussion as follows?



Requirement: It should be possible to assign a policy to an

(interdomain) link.



Of course, I can think of a solution (e.g. make that link part of a

topology, like John's second picture, assign the topology to a

networkdomain, and assign a policy to that networkdomain). However, this

seems out of scope. I think the best way forward is to describe this and

other requirements and forward them to the NML and ask the NML folks to

come up with a solution for the requirement. I also wholeheartedly

invite all NSI group members to become a "NML folk" too by joining the

NML list!



Regards,

Freek

_______________________________________________

nsi-wg mailing list

nsi-wg at ogf.org<mailto:nsi-wg at ogf.org>

http://www.ogf.org/mailman/listinfo/nsi-wg


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.ogf.org/pipermail/nsi-wg/attachments/20100223/ecb45099/attachment.html 


More information about the nsi-wg mailing list