< draft-lee-rtgwg-actn-applicability-enhanced-vpn-00.txt   draft-lee-rtgwg-actn-applicability-enhanced-vpn-01.txt >
RTGWG Working Group Daniel King RTGWG Working Group Daniel King
Internet Draft Lancaster University Internet Draft Lancaster University
Intended status: Informational Intended status: Informational
Young Lee Young Lee
Huawei Huawei
Expires: May 12, 2018 Jeff Tansura Expires: November 14, 2018 Jeff Tansura
Futurewei Nuage
Qin Wu Qin Wu
Huawei Huawei
November 12, 2017 Daniele Ceccarelli
Ericsson
May 14, 2018
Applicability of Abstraction and Control of Traffic Engineered Applicability of Abstraction and Control of Traffic Engineered
Networks (ACTN) to Enhanced VPN Networks (ACTN) to Enhanced VPN
draft-lee-rtgwg-actn-applicability-enhanced-vpn-00 draft-lee-rtgwg-actn-applicability-enhanced-vpn-01
Abstract Abstract
The Abstraction and Control of Traffic Engineered Networks (ACTN) The Abstraction and Control of Traffic Engineered Networks (ACTN)
defines an SDN-based architecture that relies on the concepts of defines an SDN-based architecture that relies on the concepts of
network and service abstraction to detach network and service network and service abstraction to detach network and service
control from the underlying data plane. control from the underlying data plane.
This document outlines the overview of ACTN capability and the This document outlines the overview of ACTN capability and the
applicability of ACTN to Enhanced VPN. In particular, this document applicability of ACTN to Enhanced VPN. In particular, this document
skipping to change at page 2, line 4 skipping to change at page 2, line 6
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
Internet-Drafts are draft documents valid for a maximum of six Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 12, 2018. This Internet-Draft will expire on November 14, 2018.
Copyright Notice Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 37 skipping to change at page 2, line 40
Table of Contents Table of Contents
1. Introduction...................................................3 1. Introduction...................................................3
2. ACTN Overview..................................................3 2. ACTN Overview..................................................3
2.1. ACTN Virtual Network......................................4 2.1. ACTN Virtual Network......................................4
2.2. Examples of ACTN Delivering Types of Virtual Networks.....5 2.2. Examples of ACTN Delivering Types of Virtual Networks.....5
2.2.1. ACTN Used for Virtual Private Line Model.............6 2.2.1. ACTN Used for Virtual Private Line Model.............6
2.2.2. ACTN Used for VPN Delivery Model.....................7 2.2.2. ACTN Used for VPN Delivery Model.....................7
2.2.3. ACTN Used to Deliver a Virtual Customer Network......8 2.2.3. ACTN Used to Deliver a Virtual Customer Network......8
2.3. Service Mapping from TE to ACTN VN Models.................9 2.3. Service Mapping from TE to ACTN VN Models.................9
2.4. ACTN VN KPI telemetry Models..............................9 2.4. ACTN VN KPI telemetry Models.............................10
3. Enhanced VPN and ACTN.........................................10 3. Enhanced VPN and ACTN.........................................10
3.1. Isolation between VPNs...................................10 3.1. Isolation between VPNs...................................10
3.2. Guaranteed Performance...................................11 3.2. Guaranteed Performance...................................11
3.3. Integration..............................................12 3.3. Integration..............................................13
3.4. Dynamic Configuration....................................13 3.4. Dynamic Configuration....................................13
3.5. Customized Control Plane.................................14 3.5. Customized Control Plane.................................14
3.6. The Gaps.................................................14 3.6. The Gaps.................................................15
4. Security Considerations.......................................15 4. Security Considerations.......................................15
5. IANA Considerations...........................................15 5. IANA Considerations...........................................16
6. Acknowledgements..............................................16 6. Acknowledgements..............................................16
7. References....................................................16 7. References....................................................16
7.1. Informative References...................................16 7.1. Informative References...................................16
8. Contributors..................................................17 8. Contributors..................................................18
Authors' Addresses...............................................17 Authors' Addresses...............................................18
1. Introduction 1. Introduction
The Abstraction and Control of Traffic Engineered Networks (ACTN) The Abstraction and Control of Traffic Engineered Networks (ACTN)
defines an SDN-based architecture that relies on the concepts of defines an SDN-based architecture that relies on the concepts of
network and service abstraction to detach network and service network and service abstraction to detach network and service
control from the underlying data plane. control from the underlying data plane.
This document outlines the overview of ACTN capability and the This document outlines the overview of ACTN capability and the
applicability of ACTN to Enhanced VPN. In particular, this document applicability of ACTN to Enhanced VPN. In particular, this document
skipping to change at page 5, line 44 skipping to change at page 5, line 46
Primitives (capabilities and messages) have been provided to support Primitives (capabilities and messages) have been provided to support
the different ACTN network control functions that will enable the different ACTN network control functions that will enable
virtual network. These include: topology request/query, VN service virtual network. These include: topology request/query, VN service
request, path computation and connection control, VN service policy request, path computation and connection control, VN service policy
negotiation, enforcement, routing options. [actn-info] negotiation, enforcement, routing options. [actn-info]
2.2. Examples of ACTN Delivering Types of Virtual Networks 2.2. Examples of ACTN Delivering Types of Virtual Networks
In examples below the ACTN framework is used to provide control, In examples below the ACTN framework is used to provide control,
management and orchestration for the virtual network life-cycle, and management and orchestration for the virtual network life-cycle, and
the connectivity . These dynamic and highly flexible, end-to-end and the connectivity. These dynamic and highly flexible, end-to-end and
dedicated virtual network utilizing common physical infrastructure, dedicated virtual network utilizing common physical infrastructure,
and according to vertical-specific requirements. and according to vertical-specific requirements.
The rest of this section provides three examples of using ACTN to The rest of this section provides three examples of using ACTN to
achieve different scenarios of ACTN for virtual network. All three achieve different scenarios of ACTN for virtual network. All three
scenarios can be scaled up in capacity or be subject to topology scenarios can be scaled up in capacity or be subject to topology
changes as well as changes from customer requirements perspective. changes as well as changes from customer requirements perspective.
2.2.1. ACTN Used for Virtual Private Line Model 2.2.1. ACTN Used for Virtual Private Line Model
skipping to change at page 6, line 33 skipping to change at page 6, line 35
o Agile: on-demand where the customer needs connectivity and o Agile: on-demand where the customer needs connectivity and
fully adjustable bandwidth. fully adjustable bandwidth.
(Customer VPL Request) (Customer VPL Request)
| |
--------- ---------
| CNC-A | | CNC-A |
Boundary --------- Boundary ---------
Between ====================|==================== Between ====================|====================
Customer & | Customer & |
Network Provider -------- Network Operator --------
| MDSC | | MDSC |
-------- --------
__|__ __|__
Site A ( PNC ) Site B Site A ( PNC ) Site B
------ ( ) ------ ------ ( ) ------
|vCE1|=============( Phys. )=============|vCE2| |vCE1|=============( Phys. )=============|vCE2|
------ ( Net ) ------ ------ ( Net ) ------
\ ----- / \ ----- /
\ || / \ || /
\ || / \ || /
skipping to change at page 7, line 28 skipping to change at page 7, line 31
delegated to the customer managed CNC. delegated to the customer managed CNC.
---------------- ---------------- ---------------- ----------------
| Site-A Users |___________ ____________| Site-B Users | | Site-A Users |___________ ____________| Site-B Users |
---------------- | | ---------------- ---------------- | | ----------------
------- -------
|CNC-A| |CNC-A|
Boundary ------- Boundary -------
Between ==========================|========================== Between ==========================|==========================
Customer & | Customer & |
Network Provider | Network Operator |
| |
--------------- ---------------
| MDSC | | MDSC |
--------------- ---------------
_________/ | \__________ _________/ | \__________
/ | \ / | \
/ | \ / | \
--------- --------- --------- --------- --------- ---------
| PNC | | PNC | | PNC | | PNC | | PNC | | PNC |
--------- --------- --------- --------- --------- ---------
skipping to change at page 8, line 41 skipping to change at page 8, line 44
| CNC |---------->( Network 2 ) | CNC |---------->( Network 2 )
--------------- _(_________ ) --------------- _(_________ )
--------------- ( Virtual )_) --------------- ( Virtual )_)
| CNC |----------->( Network 2 ) ^ | CNC |----------->( Network 2 ) ^
--------------- ( ) : --------------- ( ) :
^ (___________) : ^ (___________) :
| ^ ^ : | ^ ^ :
Boundary | : : : Boundary | : : :
Between ==========|========================:====:====:======== Between ==========|========================:====:====:========
Customer & | : : : Customer & | : : :
Network Provider | : : : Network Operator | : : :
v : : : v : : :
--------------- : :....: --------------- : :....:
| MDSC | : : | MDSC | : :
--------------- : : --------------- : :
^ ---^------ ... ^ ---^------ ...
| ( ) . | ( ) .
v ( Physical ) . v ( Physical ) .
---------------- ( Network ) . ---------------- ( Network ) .
| PNC |<------> ( ) ---^------ | PNC |<------> ( ) ---^------
---------------- | -------- ( ) ---------------- | -------- ( )
| |-- ( Physical ) | |-- ( Physical )
| PNC |<------------------------->( Network ) | PNC |<------------------------->( Network )
--------------- ( ) --------------- ( )
-------- --------
Figure 4: Virtual Customer Networks Figure 4: Virtual Customer Networks
2.3. Service Mapping from TE to ACTN VN Models 2.3. Service Mapping from TE to ACTN VN Models
skipping to change at page 9, line 30 skipping to change at page 9, line 33
The ACTN VN YANG model [actn-vn] is a generic virtual network The ACTN VN YANG model [actn-vn] is a generic virtual network
service model that allows customers (internal or external) to create service model that allows customers (internal or external) to create
a VN that meets the customer's service objective with various a VN that meets the customer's service objective with various
constraints. constraints.
The TE-service mapping model is needed to bind L3VPN specific The TE-service mapping model is needed to bind L3VPN specific
service model with TE-specific parameters. This binding will service model with TE-specific parameters. This binding will
facilitate a seamless service operation with underlay-TE network facilitate a seamless service operation with underlay-TE network
visibility. The TE-service model developed in this document can also visibility. The TE-service model developed in this document can also
be extended to support other services including L2SM, and future be extended to support other services including L2SM, and L1CSM.
transport network service models.
----------- --------------- ------------ +---------+ +-------------+ +----------+
| L3SM | <------> | | <-----> | TE-Tunnel| | L3SM | <------> | | <-----> | ACTN VN |
----------- | | | Model | +---------+ | | | Model |
| TE-Service | ------^----- | | +----------+
|Mapping Model| | | |
----------- | | ------v----- +---------+ | TE-Service | +----------+
| L2SM | <------> | | <-----> | ACTN VN | | L2SM | <------> |Mapping Model| <-----> | TE-Topo |
----------- --------------- | Model | +---------+ | | | Model |
------------ | | +----------+
Figure 5: TE-Service Mapping ([te-service-mapping]) | |
+---------+ | | +----------+
| L1CSM | <------> | | <-----> | TE-Tunnel|
+---------+ | | | Model |
+-------------+ +----------+
Figure 5: TE-Service Mapping ([te-service-mapping])
2.4. ACTN VN KPI telemetry Models 2.4. ACTN VN KPI telemetry Models
The role of ACTN VN KPI telemetry model [actn-pm-telemetry] is to The role of ACTN VN KPI telemetry model [actn-pm-telemetry] is to
provide YANG models so that customer can define key performance provide YANG models so that customer can define key performance
monitoring data relevant for its VN via the YANG subscription monitoring data relevant for its VN via the YANG subscription model.
model.
Key characteristics of [actn-pm-telemetry] include: Key characteristics of [actn-pm-telemetry] include:
o an ability to provide scalable VN-level telemetry aggregation o an ability to provide scalable VN-level telemetry aggregation
based on customer-subscription model for key performance based on customer-subscription model for key performance
parameters defined by the customer; parameters defined by the customer;
o an ability to facilitate proactive re-optimization and o an ability to facilitate proactive re-optimization and
reconfiguration of VNs based on network reconfiguration of VNs based on network
autonomic traffic engineering scaling configuration autonomic traffic engineering scaling configuration
mechanism. mechanism.
3. Enhanced VPN and ACTN 3. Enhanced VPN and ACTN
This section discusses how the advanced features of ACTN discussed This section discusses how the advanced features of ACTN discussed
in Section 2 can fulfill the enhanced VPN requirements defined in in Section 3 can fulfill the enhanced VPN requirements defined in
[vpn+]. Key requirements of the enhanced VPN include: [vpn+]. Key requirements of the enhanced VPN include:
1. Isolation between VPNs 1. Isolation between VPNs
2. Guaranteed Performance 2. Guaranteed Performance
3. Integration 3. Integration
4. Dynamic Configuration 4. Dynamic Configuration
5. Customized Control Plane 5. Customized Control Plane
Simple creation, deletion and modification of the services. Simple creation, deletion and modification of the services.
Control over VPN Seamless integration of both physical and virtual Control over VPN Seamless integration of both physical and virtual
network and service functions network and service functions
In the subsequent sections, we discuss how each requirement can be In the subsequent sections, we discuss how each requirement can be
fulfilled by the ACTN features and the gaps that remain to be solved fulfilled by the ACTN features and the gaps that remain to be solved
if applicable. if applicable.
3.1. Isolation between VPNs 3.1. Isolation between VPNs
The ACTN VN YANG model [actn-vn] fulfills the isolation requirement The ACTN VN YANG model [actn-vn] and the TE-service mapping model
by providing the features. [te-service-mapping] fulfill the isolation requirement by providing
the features.
o Each VN is identified with a unique identifier (vn-id and vn- o Each VN is identified with a unique identifier (vn-id and vn-
name) and so is each VN member that belongs to the VN (vn- name) and so is each VN member that belongs to the VN (vn-
member-id). member-id).
o Each instantiated VN is managed and controlled independent of o Each instantiated VN is managed and controlled independent of
other VNs in the network with proper protection level other VNs in the network with proper protection level
(protection) (protection)
+--rw vn
+--rw vn-list* [vn-id] o Each VN is instantiated with proper isolation requirement
+--rw vn-id uint32 mapping introduced by the TE-service mapping model [te-
+--rw vn-name? string service-mapping]. This mapping can support hard isolation
+--rw vn-topology-id? te-types:te-topology-id (i.e., dedicated TE resources in all layers (e.g., packet and
| {type-2}? optical)), soft isolation (i.e., optical layer may be shared
+--rw vn-member-list* [vn-member-id] while packet layer is dedicated) and no isolation (i.e.,
| +--rw vn-member-id uint32 sharing with other VN).
| +--rw src
. . . .
| +--rw dest
. . . .
| +--rw protection? Identityref
3.2. Guaranteed Performance 3.2. Guaranteed Performance
Performance objectives of a VN need first to be expressed in order Performance objectives of a VN need first to be expressed in order
to assure the performance guarantee. [actn-vn] allows configuration to assure the performance guarantee. [actn-vn] and [te-topo] allow
of several parameters that may affect the VN performance objectives. configuration of several parameters that may affect the VN
Among the performance-related parameters per a VN level provided by performance objectives. Among the performance-related parameters per
[actn-vn] are as follows: a VN level provided by [actn-vn] and [te-topo] are as follows:
o Bandwidth o Bandwidth
o Objective function (e.g., min cost path, min load path, etc.) o Objective function (e.g., min cost path, min load path, etc.)
o Metric Types and their threshold: o Metric Types and their threshold:
o TE cost, IGP cost, Hop count, or Unidirectional Delay (e.g., o TE cost, IGP cost, Hop count, or Unidirectional Delay (e.g.,
can set all path delay <= threshold) can set all path delay <= threshold)
See the below actn-vn tree structure for configuration parameters See the below actn-vn tree structure for the pointer for the
for the pertinent performance data. connectivity matrix identifier for each vn member in which the
configuration parameters listed above is provisioned using [te-topo]
model together with [te-tunnel] model in the network.
+--rw vn +--rw vn
+--rw vn-list* [vn-id] +--rw vn-list* [vn-id]
+--rw vn-id uint32 +--rw vn-id uint32
............ +--rw vn-name? string
+--rw vn-name? string +--rw vn-topology-id? te-types:te-topology-id
+--rw objective-function? pcep:objective-function +--rw abstract-node? -> /nw:networks/network/node/tet:te-node-id
+--rw metric* [metric-type] +--rw vn-member-list* [vn-member-id]
| +--rw metric-type identityref | +--rw vn-member-id uint32
| +--rw limit | +--rw src
| | +--rw enabled? boolean | | +--rw src? -> /actn/ap/access-point-list/access-point-id
| | +--rw value? uint32 | | +--rw src-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn-ap-id
| +--rw optimize | | +--rw multi-src? boolean {multi-src-dest}?
| +--rw enabled? boolean | +--rw dest
| +--rw value? uint32 | | +--rw dest? -> /actn/ap/access-point-list/access-point-
+--rw bandwidth? te-types:te-bandwidth id
| | +--rw dest-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn-ap-id
| | +--rw multi-dest? boolean {multi-src-dest}?
| +--rw connetivity-matrix-id? -> /nw:networks/network/node/tet:te/te-
node-attributes/connectivity-matrices/connectivity-matrix/id
| +--ro oper-status? identityref
+--ro if-selected? boolean {multi-src-dest}?
+--rw admin-status? identityref
+--ro oper-status? identityref
+--rw vn-level-diversity? vn-disjointness
Once these requests are instantiated, the resources are committed Once these requests are instantiated, the resources are committed
and guaranteed through the life cycle of the VN. and guaranteed through the life cycle of the VN.
[actn-pm-telemetry] provides models that allow for key performance [actn-pm-telemetry] provides models that allow for key performance
telemetry configuration mechanisms per VN level, VN member level as telemetry configuration mechanisms per VN level, VN member level as
well as path/link level. well as path/link level.
The following tree structure from [actn-pm-telemetry] illustrates The following tree structure from [actn-pm-telemetry] illustrates
how performance data (e.g., delay, delay-variation, utilization, how performance data (e.g., delay, delay-variation, utilization,
etc.) can be subscribed per VN need and monitored via YANG push etc.) can be subscribed per VN need and monitored via YANG push
streaming mechanism. streaming mechanism.
module: ietf-actn-te-kpi-telemetry module: ietf-actn-te-kpi-telemetry
augment /actn-vn:actn/actn-vn:vn/actn-vn:vn-list: augment /actn-vn:actn/actn-vn:vn/actn-vn:vn-list/actn-vn:vn-member-list:
+--rw vn-telemetry +--ro vn-member-telemetry
| +--rw grouping-op +--ro unidirectional-delay? uint32
| | +--rw delay-op? identityref +--ro unidirectional-min-delay? uint32
| | +--rw delay-variation-op? identityref +--ro unidirectional-max-delay? uint32
| | +--rw utilized-bandwidth-op? identityref +--ro unidirectional-delay-variation? uint32
| +--ro data +--ro unidirectional-packet-loss? decimal64
| +--ro one-way-delay? uint32 +--ro unidirectional-residual-bandwidth? rt-types:bandwidth-ieee-float32
| +--ro two-way-delay? uint32 +--ro unidirectional-available-bandwidth? rt-types:bandwidth-ieee-float32
| +--ro one-way-delay-min? uint32 +--ro unidirectional-utilized-bandwidth? rt-types:bandwidth-ieee-float32
| +--ro one-way-delay-max? uint32 +--ro bidirectional-delay? uint32
| +--ro two-way-delay-min? uint32 +--ro bidirectional-min-delay? uint32
| +--ro two-way-delay-max? uint32 +--ro bidirectional-max-delay? uint32
| +--ro one-way-delay-variation? uint32 +--ro bidirectional-delay-variation? uint32
| +--ro two-way-delay-variation? uint32 +--ro bidirectional-packet-loss? decimal64
| +--ro utilized-bandwidth? te-types:te-bandwidth +--ro bidirectional-residual-bandwidth? rt-types:bandwidth-ieee-float32
+--ro bidirectional-available-bandwidth? rt-types:bandwidth-ieee-float32
+--ro bidirectional-utilized-bandwidth? rt-types:bandwidth-ieee-float32
+--ro utilized-percentage? uint8
+--ro vn-ref? -> /actn-vn:actn/vn/vn-list/vn-
id
+--ro vn-member-ref? -> /actn-vn:actn/vn/vn-list/vn-
member-list/vn-member-id
+--ro te-grouped-params* ->
/te:te/tunnels/tunnel/state/te-kpi:te-telemetry/id
...... ......
3.3. Integration 3.3. Integration
ACTN provides mechanisms to correlate customer's VN and the actual ACTN provides mechanisms to correlate customer's VN and the actual
TE tunnels instantiated in the provider's network. Specifically, TE tunnels instantiated in the provider's network. Specifically,
o Link each VN member to actual TE tunnel o Link each VN member to actual TE tunnel
o Each VN can be monitored on a various level such as VN level, VN o Each VN can be monitored on a various level such as VN level, VN
member level, TE-tunnel level, and link/node level. member level, TE-tunnel level, and link/node level.
skipping to change at page 13, line 29 skipping to change at page 14, line 5
o Dynamic control over VN the customer creates. o Dynamic control over VN the customer creates.
o Create, Modify, Delete o Create, Modify, Delete
See the following tree structure from [actn-vn] as an example for See the following tree structure from [actn-vn] as an example for
the dynamic configuration capability (write) VN creation, modify and the dynamic configuration capability (write) VN creation, modify and
delete. VN can be dynamically created/modified/deleted with delete. VN can be dynamically created/modified/deleted with
constraints such as metric types (e.g., delay), bandwidth, constraints such as metric types (e.g., delay), bandwidth,
protection, etc. protection, etc.
+--rw vn +--rw vn
+--rw vn-list* [vn-id] +--rw vn-list* [vn-id]
+--rw vn-id uint32 +--rw vn-id uint32
+--rw vn-name? string +--rw vn-name? string
+--rw vn-topology-id? te-types:te-topology-id +--rw vn-topology-id? te-types:te-topology-id
| {type-2}? +--rw abstract-node? -> /nw:networks/network/node/tet:te-node-
+--rw vn-member-list* [vn-member-id] id
| +--rw vn-member-id uint32 +--rw vn-member-list* [vn-member-id]
........ | +--rw vn-member-id uint32
| +--rw src
+--rw objective-function? pcep:objective-function | | +--rw src? -> /actn/ap/access-point-list/access-
+--rw metric* [metric-type] point-id
| +--rw metric-type identityref | | +--rw src-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn-
| +--rw limit ap-id
| | +--rw enabled? boolean | | +--rw multi-src? boolean {multi-src-dest}?
| | +--rw value? uint32 | +--rw dest
| +--rw optimize | | +--rw dest? -> /actn/ap/access-point-list/access-
| +--rw enabled? boolean point-id
| +--rw value? uint32 | | +--rw dest-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn-
+--rw bandwidth? te-types:te-bandwidth ap-id
+--rw protection? Identityref | | +--rw multi-dest? boolean {multi-src-dest}?
| +--rw connetivity-matrix-id? ->
/nw:networks/network/node/tet:te/te-node-attributes/connectivity-
matrices/connectivity-matrix/id
| +--ro oper-status? identityref
+--ro if-selected? boolean {multi-src-dest}?
+--rw admin-status? identityref
+--ro oper-status? identityref
+--rw vn-level-diversity? vn-disjointness
3.5. Customized Control Plane 3.5. Customized Control Plane
ACTN provides a YANG model that allows the customer network ACTN provides a YANG model that allows the customer network
controller (CNC) to control VN via type 2 operation. Type 2 VN controller (CNC) to control VN via type 2 operation. Type 2 VN
allows the customer to provision pertinent LSPs that connect their allows the customer to provision pertinent LSPs that connect their
endpoints over the customized VN topology dynamically. endpoints over the customized VN topology dynamically.
See the following tree structure from [actn-vn] as an example for See the following tree structure from [actn-vn] as an example for
the provisioning of LSPs over the VN topology: the provisioning of LSPs over the VN topology:
skipping to change at line 741 skipping to change at page 18, line 25
Phone: (469)277-5838 Phone: (469)277-5838
Email: leeyoung@huawei.com Email: leeyoung@huawei.com
Jeff Tansura Jeff Tansura
Futurewei Futurewei
Email: jefftant.ietf@gmail.com Email: jefftant.ietf@gmail.com
Qin Wu Qin Wu
Huawei Technologies Co.,Ltd. Huawei Technologies Co.,Ltd.
Email: bill.wu@huawei.com Email: bill.wu@huawei.com
Daniele Ceccarelli
Ericsson
Email: daniele.ceccarelli@ericsson.com
 End of changes. 28 change blocks. 
104 lines changed or deleted 136 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/