Current Meeting Report
Slides


2.5.1 Forwarding and Control Element Separation (forces)


In addition to this official charter maintained by the IETF Secretariat, there is additional information about this working group on the Web at:

       http://www.sstanamera.com/~forces -- Additional FORCES Web Page
NOTE: This charter is a snapshot of the 54th IETF Meeting in Yokohama, Japan. It may now be out-of-date.

Last Modifield: 06/05/2002

Chair(s):
Patrick Droz <dro@zurich.ibm.com>
David Putzolu <David.Putzolu@intel.com>
Routing Area Director(s):
Bill Fenner <fenner@research.att.com>
Alex Zinin <zinin@psg.com>
Routing Area Advisor:
Alex Zinin <zinin@psg.com>
Mailing Lists:
General Discussion: forces@peach.ease.lsoft.com
To Subscribe: listserv@peach.ease.lsoft.com
In Body: subscribe forces (your name)
Archive: http://peach.ease.lsoft.com/archives/FORCES.html
Description of Working Group:
The emergence of off-the-shelf network processor devices that implement the fast path or forwarding plane in network devices such as routers, along with the appearance of a new generation of third party signaling, routing, and other router control plane software, has created the need for standard mechanisms to allow these components to be combined into functional wholes. ForCES aims to define a framework and associated mechanisms for standardizing the exchange of information between the logically separate functionality of the control plane, including entities such as routing protocols, admission control, and signaling, and the forwarding plane, where per-packet activities such as packet forwarding, queuing, and header editing occur. By defining a set of standard mechanisms for control and forwarding separation, ForCES will enable rapid innovation in both the control and forwarding planes. A standard separation mechanism allows the control and forwarding planes to innovate in parallel while maintaining interoperability.

The products of this working group will be:

o A set of requirements for mechanisms to logically separate the control and data forwarding planes of an IP network element (NE)

o An applicability statement for the ForCES model and protocol

o Informational RFCs as necessary documenting current approaches to the functional model and controlled objects therein

o An architectural framework defining the entities comprising a ForCES network element and identifying the interactions between them.

o A description of the functional model of a Forwarding Element

o A formal definition of the controlled objects in the functional model of a forwarding element. This includes IP forwarding, IntServ and DiffServ QoS. An existing specification language shall be used for this task.

o Specification of IP-based protocol for transport of the controlled objects. When the control and forwarding devices are separated beyond a single hop, ForCES will make use of an existing RFC2914 compliant L4 protocol with adequate reliability, security and congestion control (e.g. TCP, SCTP) for transport purposes.

The main focus area of the working group will be control and forwarding separation for IP forwarding devices where the control and forwarding elements are in close (same room/small number of hops) or very close (same box/one hop) proximity. Other scenarios will be considered but at not the main focus of the work. The functional model of the forwarding element will include QoS (DiffServ and IntServ) capabilities of modern networking devices such as routers. In order to minimize the effort to integrate forwarding elements and control elements, a mechanism for auto discovery and capability information exchange will form an integral part of the standardized interface.

ForCES will coordinate with other standards bodies and working groups as appropriate. Examples of such bodies include IETF/GSMP, IETF/Megaco, the Network Processing Forum (NPF), the Multiservice Switching Forum (MSF), IEEE P1520, and SoftSwitch. ForCES will review relevant protocol efforts such as GSMP and Megaco and will extend or reuse them if appropriate. If protocol reuse is accepted as satisfactory for fulfilling the ForCES requirements then ForCES may recharter to adopt specific deliverables around the selected protocol.

Goals and Milestones:
MAY 02  Submit requirements document to IESG
JUL 02  Submit framework document to IESG
NOV 02  Submit formal definition of controlled objects in functional model
NOV 02  Submit forwarding element functional model document to IESG
MAR 03  Submit applicability statement to IESG
MAR 03  Submit protocol selection/definition document to IESG
Internet-Drafts:
  • - draft-ietf-forces-netlink-03.txt
  • - draft-ietf-forces-requirements-04.txt
  • - draft-ietf-forces-applicability-00.txt
  • - draft-ietf-forces-framework-00.txt
  • No Request For Comments

    Current Meeting Report

    IETF 54, Yokohama, ForCES Minutes
    ---------------------------------

    About 80 people attending the meeting.

    Agenda bashing & list of draft to be reviewed.
    WG status: 2 drafts on last call

    ForCES Model - Draft 0 (Joel presenting)
    ------------
    Individual contribution: ForCES Functional Model
    Draft about ForCES models:
    - How to represent models (on the wire and in the doc)?
    - How complex a capabilities model?
    - What Elements for the State Model?

    Capabilites & State models should share representation & element
    identification. Should we use a combined document / on the wire
    representation (XML based?) Should we use an existing one (SMI, SPPI)
    We should not build our own

    Q? No opinion on which aspect is used. Instead up level the problem
    that we're trying to solve by picking one of these solutions? What are
    the requirements e.g. do things going on the wire must be small, easy
    to troubleshoot,

    Q: (Margaret) Want a language that is easy to use to pass the
    information around.

    A: (Joel): Important for the model draft to at least have the human
    readable aspect. Important to also consider it from the protocol
    angle.

    Q: Some people want an open model where capabilities and state info
    might be exchanged over existing protocol.

    A: (Joel) Don't want to mix multiple protocols here. Hope for a
    consistent framework for the control protocol.

    Q: (Margaret): Don't think we're at the point to define the protocols
    in the WG.

    CAPABILITIES MODEL:
    Current doc calls for a simple model, however
    there is now existing work on which to base a more complex
    capabilities model. Framework PIB Diff. Serv. QoS PIB.

    Joel: Should we go for the simple case called for in the document or
    should we make use of the capabilities information of the Framework
    PIB & DiffServ. PIB on our framework? How complex the capability
    model should we include? What is the language to define the
    capabilities?

    Q: What do we need to define the capabilities and not the language
    only?
    A: (Joel): Need to define the capabilities where we want
    interoperability.

    STATE MODEL
    Need to build a good but not excessive set, DiffServ set would seem a
    good starting point for QoS Also need a forwarding set (and forwarding
    capabilities)

    Q: (Sue)? How do you match the capabilities and the blocks? You have a
    n x n matrix.
    A: (Joel) No. Capabilities about a number of state elements.

    Q: Doesn't work for the forwarding blocks, this FE link to this FE.
    A: (Joel) Capabilities deal with Forwarding blocks. State model deals
    with the blocks.

    Q: Do we want an FE be controlled by two CE? If yes the model becomes
    more complex. How does topology info between the interconnection of FE
    interact with the protocol?

    Q: FE wants to do mcast. FE from one block to n-blocks. CE setup the FE, mcast forwarding table.

    A: (Joel) Disagreement on whether it works or not. Take if off line.


    NetLink - Draft 03 (no presentation)
    -------
    Will declare last call completed if no comment

    Requirement document - Draft 04 (Margaret presenting)
    --------------------
    Last call period ended on the meeting date
    Changes:
    High availability -> CE redundancy
    Include possibility for multiple protocols
    Added requirements to query statistics.

    Last call comments:
    Support both Capability & State model
    Support for failure notifications from FE
    Added text for off-loaded functions

    Is last call complete? Design team thinks so. Doc will be forwarded

    Applicability Statement (David presenting)
    -----------------------
    3 main changes to align Applicability stmt with Req. draft
    Added Purpose section
    Changed CE Redundancy/Failover to align with Requirements Draft
    Changed Sections on Locality, per rough consensus on list

    Q: (Russ) - Draft don't say locality are that close (e.g. the room).
    A: (David) Current language is that the Locality is very close (fate sharing)
    David will comment on the list after checking the exact text.
    Q: (Russ) Will propose some text to clarify.

    Architectural framework (Lily presenting)
    -----------------------
    What's new?
    CE Redundancy support
    FE Topology examples
    Message exchange examples

    Q: (Alex): Routing/Forwarding table needs to be clarified. Who does
    ARP need to be specified.

    Q? (Chin Choi): What kinds of messages are exchanged between FE?
    A: Mostly data packets that will be routed.

    Fwd & Control Element Protocol (FACT)
    No slides








    Slides

    None received.