| < draft-dang-detnet-deployment-00.txt | draft-dang-detnet-deployment-01.txt > | |||
|---|---|---|---|---|
| DetNet J. Dang, Ed. | DetNet J. Dang, Ed. | |||
| Internet-Draft Huawei | Internet-Draft Huawei | |||
| Intended status: Informational Z. Du | Intended status: Informational Z. Du | |||
| Expires: January 13, 2022 China Mobile | Expires: 12 April 2022 China Mobile | |||
| July 12, 2021 | L. Li, Ed. | |||
| Huawei | ||||
| 9 October 2021 | ||||
| Services Deployment Guideline in DetNet Network | Services Deployment Guideline in DetNet Network | |||
| draft-dang-detnet-deployment-00 | draft-dang-detnet-deployment-01 | |||
| Abstract | Abstract | |||
| Deterministic Networking (DetNet) defined in [RFC8655] provides a | Deterministic Networking (DetNet) defined in [RFC8655] provides a | |||
| capability for the delivery of data flows with extremely low packet | capability for the delivery of data flows with extremely low packet | |||
| loss rates and bounded end-to-end delivery latency. DetNet network | loss rates and bounded end-to-end delivery latency. DetNet network | |||
| administrators worldwide can deploy DetNet services into their | administrators worldwide can deploy DetNet services into their | |||
| networks. This document aims to provide a guideline for DetNet | networks. This document aims to provide a guideline for DetNet | |||
| network administrators. | network administrators. | |||
| skipping to change at page 1, line 36 ¶ | skipping to change at page 1, line 38 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on January 13, 2022. | This Internet-Draft will expire on 12 April 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | license-info) in effect on the date of publication of this document. | |||
| publication of this document. Please review these documents | Please review these documents carefully, as they describe your rights | |||
| carefully, as they describe your rights and restrictions with respect | and restrictions with respect to this document. Code Components | |||
| to this document. Code Components extracted from this document must | extracted from this document must include Simplified BSD License text | |||
| include Simplified BSD License text as described in Section 4.e of | as described in Section 4.e of the Trust Legal Provisions and are | |||
| the Trust Legal Provisions and are provided without warranty as | provided without warranty as described in the Simplified BSD License. | |||
| described in the Simplified BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 2 | 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Terminology & Abbreviations . . . . . . . . . . . . . . . . . 3 | 3. Terminology & Abbreviations . . . . . . . . . . . . . . . . . 3 | |||
| 4. Preparation of DetNet networks . . . . . . . . . . . . . . . 3 | 4. Preparation and Planning of DetNet networks . . . . . . . . . 3 | |||
| 5. How to Introduce Deterministic Flow into DetNet network . . . 4 | 4.1. Collecting and Planning information of DetNet system . . 4 | |||
| 5.1. Parameter Specification . . . . . . . . . . . . . . . . . 4 | 4.2. Collecting and Planning parameters of DetNet service and | |||
| 5.1.1. Definition of Deterministic Flow . . . . . . . . . . 5 | DetNet flow . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 5.1.2. Establishing Explicit Path . . . . . . . . . . . . . 6 | 4.2.1. Explicit Path and Service Protection . . . . . . . . 5 | |||
| 5.2. DetNet Network Element Configuration and Functions . . . 9 | 4.2.2. Encapsulation Type of Networking Technology . . . . . 5 | |||
| 6. How to Maintain Deterministic Flow in DetNet network . . . . 9 | 4.2.3. Type of Queuing Mechanism . . . . . . . . . . . . . . 6 | |||
| 7. How to Withdraw Deterministic Flow in DetNet network . . . . 10 | 4.3. DetNet Resource Evaluation . . . . . . . . . . . . . . . 6 | |||
| 8. Deployment Trial Experience . . . . . . . . . . . . . . . . . 10 | 4.3.1. DetNet Bandwidth Evaluation and Reservation . . . . . 7 | |||
| 9. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | 4.3.2. DetNet Latency Evaluation . . . . . . . . . . . . . . 8 | |||
| 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 10 | 4.3.3. DetNet Jitter Evaluation . . . . . . . . . . . . . . 8 | |||
| 11. Normative References . . . . . . . . . . . . . . . . . . . . 10 | 5. Controller Processing and Operation . . . . . . . . . . . . . 8 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11 | 6. Performed Functions on DetNet Network Node . . . . . . . . . 9 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | ||||
| 8. Normative References . . . . . . . . . . . . . . . . . . . . 10 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12 | ||||
| 1. Introduction | 1. Introduction | |||
| Deterministic Networking (DetNet) defined in [RFC8655] provides a | Deterministic Networking (DetNet) defined in [RFC8655] provides a | |||
| capability for the delivery of data flows with extremely low packet | capability for the delivery of data flows with extremely low packet | |||
| loss rates and bounded end-to-end delivery latency. The diverse | loss rates and bounded end-to-end delivery latency. The diverse | |||
| industries in [RFC8578] have in common a need for "deterministic | industries in [RFC8578] have in common a need for "deterministic | |||
| flows". How to introduce deterministic flows to the DetNet network | flows". How to introduce deterministic flows to the DetNet network | |||
| is required. | is required. | |||
| While the DetNet technologies are becoming mature, the DetNet | While the DetNet technologies are becoming mature, it's the right | |||
| deployment is about to enter the live network experiment and even to | time for DetNet deployment to do the live network experiments and | |||
| large-scale commercial deployment. The DetNet network is actively | even large-scale commercial deployments. The DetNet network is | |||
| managed by a network operations entity (the "administrator", whether | actively managed by a network operations entity (the "administrator", | |||
| a single person or a department of administrators). A network | whether a single person or a department of administrators). A | |||
| administrator is responsible for the deployment of DetNet services, | network administrator is responsible for the deployment of DetNet | |||
| who can must master the skills of how to introduce deterministic | services, who can must master the skills of how to introduce | |||
| flows into DetNet networks and the related maintenance. | deterministic flows into DetNet networks and the related maintenance. | |||
| This document is intended as guidance for DetNet network | This document is intended as guidance for DetNet network | |||
| administrators. | administrators. And the DetNet network belongs to the L3 layer | |||
| network. | ||||
| The processes of consists of deployment preparation, planning and | ||||
| configuration. Session 4 illustrates what information needs to be | ||||
| collected and how to use them and how to input the collected | ||||
| parameters into the network planning system. In session 5, the | ||||
| controller executes the operation instructions to generate | ||||
| configurations and even calculates specific explicit paths. Session | ||||
| 6 and the network element node performs configuration and path | ||||
| information received from the controller. | ||||
| 2. Requirements Language | 2. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119. | document are to be interpreted as described in RFC 2119. | |||
| 3. Terminology & Abbreviations | 3. Terminology & Abbreviations | |||
| DetNet UPE | DetNet UPE | |||
| skipping to change at page 3, line 27 ¶ | skipping to change at page 3, line 42 ¶ | |||
| A DetNet edge node, where DetNet flows leave DetNet network. | A DetNet edge node, where DetNet flows leave DetNet network. | |||
| DetNet source | DetNet source | |||
| An end system is capable of originating a DetNet flow. | An end system is capable of originating a DetNet flow. | |||
| DetNet Destination | DetNet Destination | |||
| An end system is capable of terminating a DetNet flow. | An end system is capable of terminating a DetNet flow. | |||
| 4. Preparation of DetNet networks | 4. Preparation and Planning of DetNet networks | |||
| The premise of this section is that the network has not yet enabled | ||||
| DetNet capability. First of all, a network administrator must enable | ||||
| the DetNet capability of the network on demand. | ||||
| The DetNet network administrator must plan the scope of DetNet | ||||
| network, DetNet network topology and DetNet network element roles. | ||||
| As usual, the network controller has collected the topology of the | ||||
| entire network. So the DetNet network administrators only need to | ||||
| specify the scope of DetNet networks, DetNet network topology and | ||||
| DetNet network element roles on the controller interface. When the | ||||
| scope of the DetNet network is determined, the DetNet network | ||||
| administrators can naturally get the DetNet network topology. At | ||||
| that time, the DetNet network administrators must figure out whether | ||||
| the DetNet network is in a single domain or in multiple domains. | ||||
| o If in a single domain, it contains DetNet Ingress UPE nodes, | ||||
| DetNet P nodes, DetNet PE nodes. In fact, a P node may be | ||||
| connected to multiple different UPE devices or PE nodes or P node. | ||||
| o If in multiple domains, it also contains ASBR nodes in addition to | ||||
| Ingress UPE nodes, DetNet P nodes and DetNet PE nodes, for the | ||||
| purpose of cross-domain interconnection. | ||||
| The example is shown in Figure 1, which contain DetNet Ingress UPE | ||||
| node, DetNet P nodes, DetNet PE node. In fact, a P node may be | ||||
| connected to multiple different UPE devices or PE nodes or P node. | ||||
| DetNet DetNet | ||||
| Source Destination | ||||
| DetNet-UNI (U) | ||||
| +--+--+ | +--+--+ | ||||
| | | | | | | ||||
| +--+--+ v +--+--+ | ||||
| | | | ||||
| | +----+ +---+ +---+ +---+ | | ||||
| +----U PE +---+ P +---+...+---+ PE+----+ | ||||
| +----+ +---+ +---+ +---+ | ||||
| | | | ||||
| | End-to-End Service | | ||||
| |------------------------------------->| | ||||
| | Explicit Routes (DetNet Network) | | ||||
| | |--------------------------->| | | ||||
| Figure-1: DetNet Network | ||||
| 5. How to Introduce Deterministic Flow into DetNet network | ||||
| For the next work, the DetNet network administrator must specify the | ||||
| following information on the controller. | ||||
| 1. Definition of Deterministic Flow | ||||
| 2. Establishing Explicit Path for Deterministic Flow | ||||
| * Definition of Deterministic Flow | ||||
| * Specifying Encapsulation Type of Networking Technology | ||||
| * Specifying Type of Queuing Mechanism | ||||
| * Definition of Service Protection | ||||
| * Network Resource Evaluation and Reservation | Before deployment, a DetNet network administrator must first fully | |||
| understand the concept of DetNet service defined in session 4.3 of | ||||
| RFC 8655, DetNet flow defined in RFC 9016, and explicit route defined | ||||
| in defined in session 3.2.3 of RFC8655. The essence of DetNet | ||||
| service deployment is to map the DetNet service to the corresponding | ||||
| DetNet flow, and then use the relevant explicit path to transmit on | ||||
| the network. | ||||
| The section 5.1 focus on how to use these parameters. | Next, the DetNet network administrator must investigate and | |||
| understand the status of the network. After that she/he should input | ||||
| the information collected onto the DetNet planning tool, which may be | ||||
| integrated in the controller or appears as an independent system. | ||||
| The DetNet planning tool should have a certain degree of automation | ||||
| capabilities. | ||||
| 5.1. Parameter Specification | In this document, we do not introduce the connectivity deployment | |||
| 5.1.1. Definition of Deterministic Flow | (such as IGP, BGP) of the basic network, and assume that the basic | |||
| network connections are ready. | ||||
| A DetNet network administrator must figure out | 4.1. Collecting and Planning information of DetNet system | |||
| o how to identify a deterministic flow, | The DetNet network administrator must figure out the related DetNet | |||
| system where DetNet service to be deployed. The DetNet system should | ||||
| include DetNet Edge and Transit Nodes, which node the DetNet flow | ||||
| will passes through via explicit paths. The DetNet network | ||||
| administrator must know the specific location of the relevant network | ||||
| nodes of DetNet system, which should be single-domain or cross- | ||||
| domain. If the DetNet network is cross-domain, some Transit Nodes | ||||
| may also perform the functions of ASBR. | ||||
| o the related DetNet SLA requirements, | 4.2. Collecting and Planning parameters of DetNet service and DetNet | |||
| flow | ||||
| o which node the DetNet flow is accessed from and which node the | The DetNet network administrator should collect the parameters of | |||
| DetNet flow leaves from. | DetNet service and DetNet flow. | |||
| This above information must be given the DetNet network administrator | According to session 6 of RFC 9016, the management ID, delivery type, | |||
| by DetNet service providers who initiate or terminate DetNet flows. | delivery profile, connectivity type and BiDir requirement and rank of | |||
| the Detnet services should be collected. | ||||
| The flow identification in [RFC9016] let the DetNet UPE node identify | According to session 5 of RFC9016, the management ID, payload type, | |||
| the flow. Flow identification for MPLS and IP Data Planes are | format, identification and specification, endpoints, rank, | |||
| requirement and BiDir Requirement of the Detnet flows should be | ||||
| collected. The flow identification for MPLS and IP Data Planes are | ||||
| described in [RFC8939] , [RFC8964], and Ethernet information (such as | described in [RFC8939] , [RFC8964], and Ethernet information (such as | |||
| MAC address, VLAN) respectively. | MAC address, VLAN) respectively. | |||
| o IP Data plane: five tuple | The DetNet network administrator must plan how to map the DetNet | |||
| services into a DetNet flow. If a DetNet service wants to join | ||||
| o Ethernet data plane: MAC address or VLAN | DetNet flow, the premise is that the encapsulation types of both of | |||
| them must be the same and DetNet Edges to be used are same. About | ||||
| o MPLS or SR data plane: label | the encapsulation types, that is, the Delivery Type of the DetNet | |||
| Service must be equal to the Payload Type of the DetNet Flow. Then | ||||
| The SLA information of DetNet flow in section 5.9 of [RFC9016] are | it is necessary to determine whether the Requirements of the DetNet | |||
| listed as follows. | Flow can meet the requirements of the Delivery Profile of the DetNet | |||
| Service. First, it is seen if MaxLatency, MaxLatencyVariation, | ||||
| o MinBandwidth | MaxLoss, MaxConsecutiveLossTolerance, MaxMisordering are satisfied. | |||
| If they are satisfied, it is judged whether MinBandwidth can be | ||||
| o MaxLatency | satisfied. The above work should be done using automation functions. | |||
| It is finally determined that the DetNet services will join a DetNet | ||||
| o MaxLoss | flow, then a Management ID of the DetNet Flow is assigend to this | |||
| DetNet services. To explain further, Management ID of the DetNet | ||||
| o MaxConsecutiveLossTolerance | Flow, which is a unique identifier for identifying each DetNet flow, | |||
| can be used to define the N:1 mapping of DetNet flows to a DetNet | ||||
| service. | ||||
| o MaxMisordering | If a DetNet flow deployed needs to be canceled, the network | |||
| administrator will execute the corresponding undo operation through | ||||
| the controller, and the network will release the corresponding | ||||
| resources. | ||||
| If the deterministic flow has requirement for Jitter, a new parameter | 4.2.1. Explicit Path and Service Protection | |||
| named jitter needs to be added. | ||||
| In the follow-up work, the DetNet network administrator creates | In the follow-up work, the DetNet network administrator creates | |||
| explicit route defined in section 3.2.3 of [RFC8655] according to the | explicit route defined in section 3.2.3 of [RFC8655] according to the | |||
| information which node the DetNet flow is accessed from and which | information which node the DetNet flow is accessed from and which | |||
| node the DetNet flow leaves from. | node the DetNet flow leaves from. | |||
| 5.1.2. Establishing Explicit Path | The endpoints, where the Detnet service will access to and explicit | |||
| paths will be running between, must be within the scope of the DetNet | ||||
| system. Based on the endpoints of the DetNet flow, the related | ||||
| DetNet Ingress PE and Egress PE are determined. The DetNet Ingress | ||||
| PE and Egress PE can run more than one explicit path to implement | ||||
| service protection and reordering on DetNet Edge nodes. | ||||
| The DetNet network administrator must pay attention to the | The DetNet network administrator can consider how to do with service | |||
| encapsulation type of the explicit route, which is added to the | protection to meet MaxLoss, MaxConsecutiveLossTolerance and | |||
| DetNet flows when DetNet flow enters the UPE node. The DetNet | MaxMisordering of a deterministic flow. The premise of service | |||
| network administrator may freely choose encapsulation type of the | protection is that there are multiple available explicit paths for a | |||
| networking technology according to his/her preferences. The way of | DetNet flow. These types of packet loss can be greatly reduced by | |||
| IP over SR or [IP-Over-MPLS] or IP over SR) is recommended. | spreading the data over multiple disjointed forwarding paths. The | |||
| PREOF embeded in the PE node ensures that packets are not out of | ||||
| order. | ||||
| 5.1.2.1. Encapsulation Type of Networking Technology | 4.2.2. Encapsulation Type of Networking Technology | |||
| The DetNet network administrator must pay attention to the | The DetNet network administrator must pay attention to the | |||
| encapsulation type of the explicit route, which is added to the | encapsulation type of the explicit route, which is added to the | |||
| DetNet flows when DetNet flow enters the UPE node. The DetNet | DetNet flows when DetNet flow enters the UPE node. The DetNet | |||
| network administrator may freely choose encapsulation type of the | network administrator may freely choose encapsulation type of the | |||
| networking technology according to his/her preferences. The way of | networking technology according to his/her preferences. The way of | |||
| IP over SR or [IP-Over-MPLS] or IP over SR) is recommended. | IP over SR or [IP-Over-MPLS] or IP over SR is recommended. | |||
| 5.1.2.2. Type of Queuing Mechanism | 4.2.3. Type of Queuing Mechanism | |||
| Based on the traffic specification and rank of the DetNet flow, the | ||||
| buffer settings of the queue, including Guaranteed-Service IntServ, | ||||
| Cyclic Queuing and Forwarding and so on, need to refer to Internal, | ||||
| MaxPacketsPerInterval, MaxPayloadSize, MinPacketsPerInterval and | ||||
| DnFlowRank within them. | ||||
| The DetNet network administrator obtains or sets the queuing type | The DetNet network administrator obtains or sets the queuing type | |||
| used by the network. If the cyclic queuing mechanism is used in the | used by the network. For examplem, if the cyclic queuing mechanism | |||
| network, the parameters of the queuing need to be set as follows. | is used in the network, the parameters of the queuing. This | |||
| This mechanism must allow multiple deterministic flows to share a | mechanism must allow multiple deterministic flows to share a periodic | |||
| periodic buffer. | buffer. | |||
| o CyclicBufferSize: the length of the cyclic buffer | * CyclicBufferSize: the length of the cyclic buffer | |||
| o CyclicInterval: duration of periodic scheduling | * CyclicInterval: duration of periodic scheduling | |||
| o BufferNumber: the number of the cyclic buffer | * BufferNumber: the number of the cyclic buffer | |||
| o MinBurstSize: the minimum burst size that can be tolerated by | * MinBurstSize: the minimum burst size that can be tolerated by | |||
| cyclic queue mechanism, which is specified in octets per second | cyclic queue mechanism, which is specified in octets per second | |||
| and excludes additional DetNet header (if any).Bandwidth used | and excludes additional DetNet header (if any).Bandwidth used | |||
| above the Committed Information rate is called Burst traffic. It | above the Committed Information rate is called Burst traffic. It | |||
| is used when the bandwidth available is more than CIR. | is used when the bandwidth available is more than CIR. | |||
| MinBurstSize is the minimum burst size that has to be guaranteed | MinBurstSize is the minimum burst size that has to be guaranteed | |||
| for the DetNet traffic. The queuing mechanism needs to pay | for the DetNet traffic. The queuing mechanism needs to pay | |||
| attention to how to shape burst size traffic into buffers. | attention to how to shape burst size traffic into buffers. | |||
| 5.1.2.3. Definition of Service Protection | 4.3. DetNet Resource Evaluation | |||
| The DetNet network administrator can consider how to do with service | The DetNet network administrator can enable network resource | |||
| protection to meet MaxLoss, MaxConsecutiveLossTolerance and | evaluation and reservation of the controller. The requirements of | |||
| MaxMisordering of a deterministic flow. The premise of service | DetNet flow in section 5.9 of [RFC9016] include MinBandwidth, | |||
| protection is that there are multiple available explicit paths for a | MaxLatency, MaxLoss, MaxConsecutiveLossTolerance and MaxMisordering. | |||
| DetNet flow. These types of packet loss can be greatly reduced by | If the deterministic flow has requirement for Jitter, a new parameter | |||
| spreading the data over multiple disjointed forwarding paths. The | named jitter needs to be added. | |||
| PREOF embeded in the PE node ensures that packets are not out of | ||||
| order. | ||||
| 5.1.2.4. Network Resource Evaluation and Reservation | In fact, the network may support a distributed protocol similar to | |||
| RSVP defined in [draft-trossen-detnet-rsvp-tsn], so this function can | ||||
| rely on the distributed protocol. | ||||
| The DetNet network administrator can enable network resource | Based on Requirements of DetNet flow, the resource reservation | |||
| evaluation and reservation of the controller. In fact, the network | algorithm must completely satisfy them. Regarding MaxLatency, there | |||
| may support a distributed protocol similar to RSVP defined in | are different precision degree of mechanisms, one is to seek a | |||
| [draft-trossen-detnet-rsvp-tsn], so this function can rely on the | maximum degree of approximation, the other is to ensure accuracy. | |||
| distributed protocol. | The CFQ mechanism is recommended when resource reservation works | |||
| well. | ||||
| The DetNet SLA requirements to the DetNet flow generally have | The DetNet SLA requirements to the DetNet flow generally have | |||
| deterministic bandwidth, bounded latency and bounded jitter. But in | deterministic bandwidth, bounded latency and bounded jitter. But in | |||
| fact these three parameters are interrelated. For example, the | fact these three parameters are interrelated. For example, the | |||
| insufficient bandwidth reservation might introduce the additional | insufficient bandwidth reservation might introduce the additional | |||
| delay or the additional jitter. Therefore, the bandwidth reservation | delay or the additional jitter. Therefore, the bandwidth reservation | |||
| should consider the latency and jitter requirements. | should consider the latency and jitter requirements. | |||
| There are three methods here to do with, one is to get it through | There are three methods here to do with, one is to get it through | |||
| centralized calculation provided by controller or other centralized | centralized calculation provided by controller or other centralized | |||
| skipping to change at page 7, line 40 ¶ | skipping to change at page 7, line 29 ¶ | |||
| These centralized and distributed solutions can cooperate with each | These centralized and distributed solutions can cooperate with each | |||
| other, for example, if the centralized system is offline, the | other, for example, if the centralized system is offline, the | |||
| distributed system functions will be enabled. Or in order to support | distributed system functions will be enabled. Or in order to support | |||
| rapid network decision-making, the priority is given to using | rapid network decision-making, the priority is given to using | |||
| distributed systems for deployment, and the centralized systems are | distributed systems for deployment, and the centralized systems are | |||
| responsible for global optimization. | responsible for global optimization. | |||
| The algorithm on the network resource reservation is not discussed | The algorithm on the network resource reservation is not discussed | |||
| now in this document. | now in this document. | |||
| 5.1.2.4.1. DetNet Bandwidth Evaluation and Reservation | 4.3.1. DetNet Bandwidth Evaluation and Reservation | |||
| The DetNet network administrator must know the bandwidth resource | The DetNet network administrator must know the bandwidth resource | |||
| evaluation and reservation can be divided into service access | evaluation and reservation can be divided into service access | |||
| interface part on the DetNet UPE node and explicit route part. | interface part on the DetNet UPE node and explicit route part. | |||
| o Service access interface part on the DetNet UPE node: The | * Service access interface part on the DetNet UPE node: The | |||
| bandwidth of service access interface part on the DetNet UPE is | bandwidth of service access interface part on the DetNet UPE is | |||
| reserved according to the MinBandwidth of the DetNet flow. | reserved according to the MinBandwidth of the DetNet flow. | |||
| o Explicit route part: This mechanism ensures that the available | * Explicit route part: This mechanism ensures that the available | |||
| bandwidth along the explicit path can meet MinBandwidth of DetNet | bandwidth along the explicit path can meet MinBandwidth of DetNet | |||
| flow. | flow. | |||
| The P node should take into account that there are multiple explicit | The P node should take into account that there are multiple explicit | |||
| routes passing in the same direction. For example, if one interface | routes passing in the same direction. For example, if one interface | |||
| of P node accesses 3 explicit paths, the reserved bandwidth of the | of P node accesses 3 explicit paths, the reserved bandwidth of the | |||
| interface is the total required bandwidth of the 3 explicit paths. | interface is the total required bandwidth of the 3 explicit paths. | |||
| It is emphasized that the remaining bandwidth of the interface on the | It is emphasized that the remaining bandwidth of the interface on the | |||
| DetNet nodes can also be used for non-DetNet flows. | DetNet nodes can also be used for non-DetNet flows. | |||
| 5.1.2.4.2. DetNet Latency Evaluation | 4.3.2. DetNet Latency Evaluation | |||
| The DetNet network administrator can let the controller collect the | The DetNet network administrator can let the controller collect the | |||
| network-wide delay information for calculation and evaluation, and | network-wide delay information for calculation and evaluation, and | |||
| obtain the queuing type. | obtain the queuing type. | |||
| Given that DetNet nodes have a finite amount of buffer space, the | Given that DetNet nodes have a finite amount of buffer space, the | |||
| resource allocation necessarily results in a maximum end-to-end | resource allocation necessarily results in a maximum end-to-end | |||
| latency. The overall latency of the explicit route can be calculated | latency. The overall latency of the explicit route can be calculated | |||
| based on the queue scheduling mechanism on the data plane of the | based on the queue scheduling mechanism on the data plane of the | |||
| DetNet nodes. The queue scheduling mechanisms have various types, | DetNet nodes. The queue scheduling mechanisms have various types, | |||
| skipping to change at page 8, line 40 ¶ | skipping to change at page 8, line 28 ¶ | |||
| bound computations for such mechanisms that can be used by the | bound computations for such mechanisms that can be used by the | |||
| control plane to provide DetNet QoS. If the CQF is used, | control plane to provide DetNet QoS. If the CQF is used, | |||
| CyclicBufferSize, CyclicInterval and BufferNumber of queuing | CyclicBufferSize, CyclicInterval and BufferNumber of queuing | |||
| mechanism can be included in the calculation factors that affect the | mechanism can be included in the calculation factors that affect the | |||
| E2E delay. | E2E delay. | |||
| The controller evaluates the path delay based on the resources of the | The controller evaluates the path delay based on the resources of the | |||
| entire network, and judges whether it meets the MaxLatency of the | entire network, and judges whether it meets the MaxLatency of the | |||
| deterministic flow. | deterministic flow. | |||
| 5.1.2.4.3. DetNet Jitter Evaluation | 4.3.3. DetNet Jitter Evaluation | |||
| The DetNet network administrator can figure out that there are two | The DetNet network administrator can figure out that there are two | |||
| aspects to reduce network jitter. The first is through resource | aspects to reduce network jitter. The first is through resource | |||
| reservation in section 4.4.1 to 4.4.2 , and the second is through | reservation in section 4.4.1 to 4.4.2 , and the second is through | |||
| effective queuing control methods. The former is not easy to | effective queuing control methods. The former is not easy to | |||
| evaluate jitter, but the latter is very convenient. The DetNet | evaluate jitter, but the latter is very convenient. The DetNet | |||
| network administrator also can know the queuing type, because not all | network administrator also can know the queuing type, because not all | |||
| queuing mechanisms have a jitter control mechanism. The CQF is | queuing mechanisms have a jitter control mechanism. The CQF is | |||
| recommend to effectively solve the uncertainty of jitter. Under this | recommend to effectively solve the uncertainty of jitter. Under this | |||
| mechanism, the end to end jitter can be controlled within 2 * | mechanism, the end to end jitter can be controlled within 2 * | |||
| CyclicInterval. | CyclicInterval. | |||
| 5.2. DetNet Network Element Configuration and Functions | 5. Controller Processing and Operation | |||
| The DetNet network administrator should let the planning tool connect | ||||
| to DetNet controller defined in draft-ietf-detnet-controller-plane- | ||||
| framework ,or the planning tool should automatically to notisfy the | ||||
| DetNet controller after the work finised in the planning tool. As | ||||
| draft-ietf-detnet-controller-plane-framework describes, the DetNet | ||||
| control plane is responsible for the instantiation and maintenance of | ||||
| DetNet services and DetNet flows and explicit path, for the functions | ||||
| of resource reservation, path caculation and service protection. | ||||
| Finally, the DetNet controller should generate configuration and path | ||||
| information and download them on demand to the related DetNet network | ||||
| nodes. | ||||
| After the information is input by the DetNet network administrator, | After the information is input by the DetNet network administrator, | |||
| the controller will convert the information into the network | the controller will convert the information into the network | |||
| configuration and send it to the DetNet network element node, using a | configuration and send it to the DetNet network element node, using a | |||
| protocol such as NETCONF [RFC6241]/YANG[RFC6020]. Deterministic | protocol such as NETCONF [RFC6241]/YANG[RFC6020]. Deterministic | |||
| Networking (DetNet) YANG Model defined in [DetNet-YANG] contains the | Networking (DetNet) YANG Model defined in [DetNet-YANG] contains the | |||
| specification for the Deterministic Networking YANG Model for | specification for the Deterministic Networking YANG Model for | |||
| configuration and operational data for DetNet Flows. | configuration and operational data for DetNet Flows. | |||
| 6. Performed Functions on DetNet Network Node | ||||
| The DetNet network administrator should check the operation of the | ||||
| DetNet network nodes. | ||||
| The dynamic signaling protocols most commonly used for label | ||||
| distribution are LDP [RFC5036], RSVP-TE, and BGP [RFC8277] (which | ||||
| enables BGP/ MPLS-based Layer 3 VPNs [RFC4384] and Layer 2 VPNs | ||||
| [RFC7432]). | ||||
| After DetNet network node receives the information from the | ||||
| controller, the function will be executed. | ||||
| Basic Network Configuration among DetNet Network nodes: | ||||
| * MPLS TE or Segment Routing configuration RSVP configuration for | ||||
| resource reservation(optional) | ||||
| * Configuration Enabling DetNet capability Configuration of Queuing | ||||
| mechanism | ||||
| Ingress Node DetNet services Configuration: | ||||
| * DetNet flow Configuration Explicit path configuration | ||||
| * Configuration of Mapping DetNet flow to explicit path | ||||
| Configuration of Service Protection | ||||
| * Configuration of Queuing mechanism EgressConfiguration of Queuing | ||||
| mechanism Configuration of Service Protection | ||||
| Egress Node DetNet services Configuration: | ||||
| * DetNet flow Configuration Explicit path configuration | ||||
| * Configuration of Mapping DetNet flow to explicit path | ||||
| Configuration of Service Protection | ||||
| * Configuration of Queuing mechanism EgressConfiguration of Queuing | ||||
| mechanism Configuration of Service Protection | ||||
| After DetNet network equipment receives the configuration, it starts | After DetNet network equipment receives the configuration, it starts | |||
| to execute. As Figure 2 is shown, the functions of each DetNet | to execute. As Figure 2 is shown, the functions of each DetNet | |||
| network element is clearly visible. | network element is clearly visible. | |||
| SDN +----+ 1.Entrance to the above information | SDN +----+ 1.Entrance to the above information | |||
| Controller | | 2.Network Resource Evaluation and Reservation(Optional) | Controller | | 2.Network Resource Evaluation and Reservation(Optional) | |||
| +----+ 3.Converting the information into the network configuration | +----+ 3.Converting the information into the network configuration | |||
| | | | | |||
| +--------+-------+------+ | +--------+-------+------+ | |||
| | | | | | | | | | | |||
| skipping to change at page 9, line 44 ¶ | skipping to change at page 10, line 39 ¶ | |||
| | |Enabling queuing mechanism| | | |Enabling queuing mechanism| | |||
| | +--------------------------+ | | +--------------------------+ | |||
| +--> +-------------------------------------------------------+ | +--> +-------------------------------------------------------+ | |||
| |1.Identifying a deterministic flow | | |1.Identifying a deterministic flow | | |||
| |2.Establishing explicit path for the deterministic flow| | |2.Establishing explicit path for the deterministic flow| | |||
| |3.Enabling queuing mechanism | | |3.Enabling queuing mechanism | | |||
| +-------------------------------------------------------+ | +-------------------------------------------------------+ | |||
| Figure-2: DetNet Network Functions | Figure-2: DetNet Network Functions | |||
| 6. How to Maintain Deterministic Flow in DetNet network | 7. Security Considerations | |||
| TBD | ||||
| If a new DetNet flow needs to be added into the existing DetNet | ||||
| network, the network administrators will operate according to section | ||||
| 4.1~4.5. | ||||
| 7. How to Withdraw Deterministic Flow in DetNet network | ||||
| TBD | ||||
| If a DetNet flow deployed needs to be canceled, the network | ||||
| administrator will execute the corresponding undo operation through | ||||
| the controller, and the network will release the corresponding | ||||
| resources. | ||||
| 8. Deployment Trial Experience | ||||
| TBD | ||||
| 9. Security Considerations | ||||
| TBD | ||||
| 10. Acknowledgements | ||||
| TBD | The DetNet network administrator should work accroding to RFC 9055 | |||
| which addresses security considerations specific to the IP and MPLS | ||||
| data plane technologies, thereby complementing the Security | ||||
| Considerations sections of those documents. | ||||
| 11. Normative References | 8. Normative References | |||
| [DetNet-Bounded-Latency] | [DetNet-Bounded-Latency] | |||
| "DetNet Bounded Latency", <https://www.rfc- | "DetNet Bounded Latency", <https://www.rfc- | |||
| editor.org/info/draft-ietf-detnet-bounded-latency>. | editor.org/info/draft-ietf-detnet-bounded-latency>. | |||
| [DetNet-YANG] | [DetNet-YANG] | |||
| "Deterministic Networking (DetNet) YANG Model", | "Deterministic Networking (DetNet) YANG Model", | |||
| <https://www.rfc-editor.org/info/draft-ietf-detnet-yang- | <https://www.rfc-editor.org/info/draft-ietf-detnet-yang- | |||
| 12>. | 12>. | |||
| skipping to change at page 12, line 4 ¶ | skipping to change at page 12, line 17 ¶ | |||
| [RFC9016] "Flow and Service Information Model for Deterministic | [RFC9016] "Flow and Service Information Model for Deterministic | |||
| Networking (DetNet)", | Networking (DetNet)", | |||
| <https://www.rfc-editor.org/info/RFC9016>. | <https://www.rfc-editor.org/info/RFC9016>. | |||
| [RFC9023] "Deterministic Networking (DetNet) Data Plane: IP over | [RFC9023] "Deterministic Networking (DetNet) Data Plane: IP over | |||
| IEEE 802.1 Time-Sensitive Networking (TSN)", | IEEE 802.1 Time-Sensitive Networking (TSN)", | |||
| <https://www.rfc-editor.org/info/rfc9023>. | <https://www.rfc-editor.org/info/rfc9023>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Joanna Dang (editor) | Joanna Dang (editor) | |||
| Huawei | Huawei | |||
| No.156 Beiqing Road | No.156 Beiqing Road | |||
| Beijing, P.R. China 100095 | Beijing | |||
| P.R. China, 100095 | ||||
| China | China | |||
| Email: dangjuanna@huawei.com | Email: dangjuanna@huawei.com | |||
| Zongpeng Du | Zongpeng Du | |||
| China Mobile | China Mobile | |||
| 32 Xuanwumen West St | 32 Xuanwumen West St | |||
| Beijing, P.R. China 100053 | Beijing | |||
| P.R. China, 100053 | ||||
| China | China | |||
| Email: duzongpeng@chinamobile.com | Email: duzongpeng@chinamobile.com | |||
| Yizhou (editor) | ||||
| Huawei | ||||
| P.R. China, | ||||
| China | ||||
| Email: liyizhou@huawei.com | ||||
| End of changes. 49 change blocks. | ||||
| 199 lines changed or deleted | 226 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||