| < draft-lee-rtgwg-actn-applicability-enhanced-vpn-01.txt | draft-lee-rtgwg-actn-applicability-enhanced-vpn-02.txt > | |||
|---|---|---|---|---|
| RTGWG Working Group Daniel King | RTGWG Working Group Daniel King | |||
| Internet Draft Lancaster University | Internet Draft Lancaster University | |||
| Intended status: Informational | Intended status: Informational | |||
| Young Lee | Young Lee (Editor) | |||
| Huawei | Huawei | |||
| Expires: November 14, 2018 Jeff Tansura | Expires: December 29, 2018 Jeff Tansura | |||
| Nuage | Nuage | |||
| Qin Wu | Qin Wu | |||
| Huawei | Huawei | |||
| Daniele Ceccarelli | Daniele Ceccarelli | |||
| Ericsson | Ericsson | |||
| May 14, 2018 | June 29, 2018 | |||
| Applicability of Abstraction and Control of Traffic Engineered | Applicability of Abstraction and Control of Traffic Engineered | |||
| Networks (ACTN) to Enhanced VPN | Networks (ACTN) to Enhanced VPN | |||
| draft-lee-rtgwg-actn-applicability-enhanced-vpn-01 | draft-lee-rtgwg-actn-applicability-enhanced-vpn-02 | |||
| Abstract | Abstract | |||
| The Abstraction and Control of Traffic Engineered Networks (ACTN) | The Abstraction and Control of Traffic Engineered Networks (ACTN) | |||
| defines an SDN-based architecture that relies on the concepts of | defines an SDN-based architecture that relies on the concepts of | |||
| network and service abstraction to detach network and service | network and service abstraction to detach network and service | |||
| control from the underlying data plane. | control from the underlying data plane. | |||
| This document outlines the overview of ACTN capability and the | This document outlines the overview of ACTN capability and the | |||
| applicability of ACTN to Enhanced VPN. In particular, this document | applicability of ACTN to Enhanced VPN. In particular, this document | |||
| skipping to change at page 2, line 13 ¶ | skipping to change at page 2, line 13 ¶ | |||
| months and may be updated, replaced, or obsoleted by other documents | months and may be updated, replaced, or obsoleted by other documents | |||
| at any time. It is inappropriate to use Internet-Drafts as | at any time. It is inappropriate to use Internet-Drafts as | |||
| reference material or to cite them other than as "work in progress." | reference material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on November 14, 2018. | This Internet-Draft will expire on December 29, 2018. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with | carefully, as they describe your rights and restrictions with | |||
| respect to this document. Code Components extracted from this | respect to this document. Code Components extracted from this | |||
| document must include Simplified BSD License text as described in | document must include Simplified BSD License text as described in | |||
| Section 4.e of the Trust Legal Provisions and are provided without | Section 4.e of the Trust Legal Provisions and are provided without | |||
| skipping to change at page 2, line 42 ¶ | skipping to change at page 2, line 42 ¶ | |||
| 1. Introduction...................................................3 | 1. Introduction...................................................3 | |||
| 2. ACTN Overview..................................................3 | 2. ACTN Overview..................................................3 | |||
| 2.1. ACTN Virtual Network......................................4 | 2.1. ACTN Virtual Network......................................4 | |||
| 2.2. Examples of ACTN Delivering Types of Virtual Networks.....5 | 2.2. Examples of ACTN Delivering Types of Virtual Networks.....5 | |||
| 2.2.1. ACTN Used for Virtual Private Line Model.............6 | 2.2.1. ACTN Used for Virtual Private Line Model.............6 | |||
| 2.2.2. ACTN Used for VPN Delivery Model.....................7 | 2.2.2. ACTN Used for VPN Delivery Model.....................7 | |||
| 2.2.3. ACTN Used to Deliver a Virtual Customer Network......8 | 2.2.3. ACTN Used to Deliver a Virtual Customer Network......8 | |||
| 2.3. Service Mapping from TE to ACTN VN Models.................9 | 2.3. Service Mapping from TE to ACTN VN Models.................9 | |||
| 2.4. ACTN VN KPI telemetry Models.............................10 | 2.4. ACTN VN KPI telemetry Models.............................10 | |||
| 3. Enhanced VPN and ACTN.........................................10 | 3. Enhanced VPN and ACTN.........................................10 | |||
| 3.1. Isolation between VPNs...................................10 | 3.1. Isolation between VPNs...................................11 | |||
| 3.2. Guaranteed Performance...................................11 | 3.2. Guaranteed Performance...................................11 | |||
| 3.3. Integration..............................................13 | 3.3. Integration..............................................13 | |||
| 3.4. Dynamic Configuration....................................13 | 3.4. Dynamic Configuration....................................13 | |||
| 3.5. Customized Control Plane.................................14 | 3.5. Customized Control Plane.................................14 | |||
| 3.6. The Gaps.................................................15 | 3.6. The Gaps.................................................15 | |||
| 4. Security Considerations.......................................15 | 4. Security Considerations.......................................16 | |||
| 5. IANA Considerations...........................................16 | 5. IANA Considerations...........................................17 | |||
| 6. Acknowledgements..............................................16 | 6. Acknowledgements..............................................17 | |||
| 7. References....................................................16 | 7. References....................................................17 | |||
| 7.1. Informative References...................................16 | 7.1. Informative References...................................17 | |||
| 8. Contributors..................................................18 | 8. Contributors..................................................18 | |||
| Authors' Addresses...............................................18 | Authors' Addresses...............................................18 | |||
| 1. Introduction | 1. Introduction | |||
| The Abstraction and Control of Traffic Engineered Networks (ACTN) | The Abstraction and Control of Traffic Engineered Networks (ACTN) | |||
| defines an SDN-based architecture that relies on the concepts of | defines an SDN-based architecture that relies on the concepts of | |||
| network and service abstraction to detach network and service | network and service abstraction to detach network and service | |||
| control from the underlying data plane. | control from the underlying data plane. | |||
| skipping to change at page 3, line 34 ¶ | skipping to change at page 3, line 34 ¶ | |||
| The framework for ACTN [actn-framework] includes a reference | The framework for ACTN [actn-framework] includes a reference | |||
| architecture that has been adapted for Figure 1 in this document, it | architecture that has been adapted for Figure 1 in this document, it | |||
| describes the functional entities and methods for the coordination | describes the functional entities and methods for the coordination | |||
| of resources across multiple domains, to provide end-to-end | of resources across multiple domains, to provide end-to-end | |||
| services, components include: | services, components include: | |||
| o Customer Network Controller (CNC); | o Customer Network Controller (CNC); | |||
| o Multi-domain Service Coordinator (MDSC); | o Multi-domain Service Coordinator (MDSC); | |||
| o Provisional Network Controller (PNC). | o Provisioning Network Controller (PNC). | |||
| --------- --------- --------- | --------- --------- --------- | |||
| | CNC-A | | CNC-B | | CNC-C | | | CNC-A | | CNC-B | | CNC-C | | |||
| --------- --------- --------- | --------- --------- --------- | |||
| \ | / | \ | / | |||
| \__________ |-CMI I/F __________/ | \__________ |-CMI I/F __________/ | |||
| \ | / | \ | / | |||
| ------------------------- | ------------------------- | |||
| | MDSC | | | MDSC | | |||
| ------------------------- | ------------------------- | |||
| skipping to change at page 9, line 29 ¶ | skipping to change at page 9, line 29 ¶ | |||
| create a binding relationship across a Layer-3 Service Model [L3sm], | create a binding relationship across a Layer-3 Service Model [L3sm], | |||
| Layer-2 Service Model [L2SM], Layer-1 Service Model [L1CSM], and TE | Layer-2 Service Model [L2SM], Layer-1 Service Model [L1CSM], and TE | |||
| Tunnel model [TE-tunnel], via a generic ACTN Virtual Network (VN) | Tunnel model [TE-tunnel], via a generic ACTN Virtual Network (VN) | |||
| model [actn-vn]. | model [actn-vn]. | |||
| The ACTN VN YANG model [actn-vn] is a generic virtual network | The ACTN VN YANG model [actn-vn] is a generic virtual network | |||
| service model that allows customers (internal or external) to create | service model that allows customers (internal or external) to create | |||
| a VN that meets the customer's service objective with various | a VN that meets the customer's service objective with various | |||
| constraints. | constraints. | |||
| The TE-service mapping model is needed to bind L3VPN specific | ||||
| service model with TE-specific parameters. This binding will | ||||
| facilitate a seamless service operation with underlay-TE network | ||||
| visibility. The TE-service model developed in this document can also | ||||
| be extended to support other services including L2SM, and L1CSM. | ||||
| +---------+ +-------------+ +----------+ | +---------+ +-------------+ +----------+ | |||
| | L3SM | <------> | | <-----> | ACTN VN | | | L3SM | <------> | | <-----> | ACTN VN | | |||
| +---------+ | | | Model | | +---------+ | | | Model | | |||
| | | +----------+ | | | +-----^----+ | |||
| | | | | | | | |||
| +---------+ | TE-Service | +----------+ | +---------+ | TE-Service | +-----v----+ | |||
| | L2SM | <------> |Mapping Model| <-----> | TE-Topo | | | L2SM | <------> |Mapping Model| <-----> | TE-Topo | | |||
| +---------+ | | | Model | | +---------+ | | | Model | | |||
| | | +----------+ | | | +----------+ | |||
| | | | | | | |||
| +---------+ | | +----------+ | +---------+ | | +----------+ | |||
| | L1CSM | <------> | | <-----> | TE-Tunnel| | | L1CSM | <------> | | <-----> | TE-Tunnel| | |||
| +---------+ | | | Model | | +---------+ | | | Model | | |||
| +-------------+ +----------+ | +-------------+ +----------+ | |||
| Figure 5: TE-Service Mapping ([te-service-mapping]) | Figure 5: TE-Service Mapping ([te-service-mapping]) | |||
| The TE-service mapping model [te-service-map] is needed to bind | ||||
| L1/2/3 VPN specific service requirements and policies pertaining to | ||||
| TE-specific parameters. For example, the model can express the | ||||
| isolation requirement for each VPN service instance. Some VPN | ||||
| service would require a strict hard isolation with deterministic | ||||
| characteristic. In such case the underlay TE networks has to find | ||||
| end-to-end tunnels/LSPs that satisfy this particular isolation | ||||
| requirement. | ||||
| This binding will facilitate a seamless service operation with | ||||
| underlay-TE network visibility. The TE-service model developed in | ||||
| this document can also be extended to support other services | ||||
| including L2SM, and L1CSM. | ||||
| 2.4. ACTN VN KPI telemetry Models | 2.4. ACTN VN KPI telemetry Models | |||
| The role of ACTN VN KPI telemetry model [actn-pm-telemetry] is to | The role of ACTN VN KPI telemetry model [actn-pm-telemetry] is to | |||
| provide YANG models so that customer can define key performance | provide YANG models so that customer can define key performance | |||
| monitoring data relevant for its VN via the YANG subscription model. | monitoring data relevant for its VN via the YANG subscription model. | |||
| Key characteristics of [actn-pm-telemetry] include: | Key characteristics of [actn-pm-telemetry] include: | |||
| o an ability to provide scalable VN-level telemetry aggregation | o an ability to provide scalable VN-level telemetry aggregation | |||
| based on customer-subscription model for key performance | based on customer-subscription model for key performance | |||
| skipping to change at page 10, line 39 ¶ | skipping to change at page 11, line 4 ¶ | |||
| 1. Isolation between VPNs | 1. Isolation between VPNs | |||
| 2. Guaranteed Performance | 2. Guaranteed Performance | |||
| 3. Integration | 3. Integration | |||
| 4. Dynamic Configuration | 4. Dynamic Configuration | |||
| 5. Customized Control Plane | 5. Customized Control Plane | |||
| Simple creation, deletion and modification of the services. | Simple creation, deletion and modification of the services. | |||
| Control over VPN Seamless integration of both physical and virtual | Control over VPN Seamless integration of both physical and virtual | |||
| network and service functions | network and service functions | |||
| In the subsequent sections, we discuss how each requirement can be | In the subsequent sections, we discuss how each requirement can be | |||
| fulfilled by the ACTN features and the gaps that remain to be solved | fulfilled by the ACTN features and the gaps that remain to be solved | |||
| if applicable. | if applicable. | |||
| 3.1. Isolation between VPNs | 3.1. Isolation between VPNs | |||
| The ACTN VN YANG model [actn-vn] and the TE-service mapping model | The ACTN VN YANG model [actn-vn] and the TE-service mapping model | |||
| [te-service-mapping] fulfill the isolation requirement by providing | [te-service-mapping] fulfill the isolation requirement by providing | |||
| the features. | the features. | |||
| o Each VN is identified with a unique identifier (vn-id and vn- | o Each VN is identified with a unique identifier (vn-id and vn- | |||
| name) and so is each VN member that belongs to the VN (vn- | name) and so is each VN member that belongs to the VN (vn- | |||
| member-id). | member-id). | |||
| o Each instantiated VN is managed and controlled independent of | o Each instantiated VN is managed and controlled independent of | |||
| other VNs in the network with proper protection level | other VNs in the network with proper protection level | |||
| (protection) | (protection) | |||
| o Each VN is instantiated with proper isolation requirement | o Each VN is instantiated with proper isolation requirement | |||
| mapping introduced by the TE-service mapping model [te- | mapping introduced by the TE-service mapping model [te- | |||
| service-mapping]. This mapping can support hard isolation | service-mapping]. This mapping can support: | |||
| (i.e., dedicated TE resources in all layers (e.g., packet and | ||||
| optical)), soft isolation (i.e., optical layer may be shared | o hard isolation with deterministic characteristics (e.g., | |||
| while packet layer is dedicated) and no isolation (i.e., | this case may need optical bypass tunnel to guarantee | |||
| sharing with other VN). | latency with no jitter); | |||
| o hard isolation (i.e., dedicated TE resources in all | ||||
| layers (e.g., packet and optical)); | ||||
| o soft isolation (i.e., optical layer may be shared while | ||||
| packet layer is dedicated); | ||||
| o no isolation (i.e., sharing with other VN). | ||||
| 3.2. Guaranteed Performance | 3.2. Guaranteed Performance | |||
| Performance objectives of a VN need first to be expressed in order | Performance objectives of a VN need first to be expressed in order | |||
| to assure the performance guarantee. [actn-vn] and [te-topo] allow | to assure the performance guarantee. [actn-vn] and [te-topo] allow | |||
| configuration of several parameters that may affect the VN | configuration of several parameters that may affect the VN | |||
| performance objectives. Among the performance-related parameters per | performance objectives. Among the performance-related parameters per | |||
| a VN level provided by [actn-vn] and [te-topo] are as follows: | a VN level provided by [actn-vn] and [te-topo] are as follows: | |||
| o Bandwidth | o Bandwidth | |||
| skipping to change at page 14, line 6 ¶ | skipping to change at page 14, line 20 ¶ | |||
| o Dynamic control over VN the customer creates. | o Dynamic control over VN the customer creates. | |||
| o Create, Modify, Delete | o Create, Modify, Delete | |||
| See the following tree structure from [actn-vn] as an example for | See the following tree structure from [actn-vn] as an example for | |||
| the dynamic configuration capability (write) VN creation, modify and | the dynamic configuration capability (write) VN creation, modify and | |||
| delete. VN can be dynamically created/modified/deleted with | delete. VN can be dynamically created/modified/deleted with | |||
| constraints such as metric types (e.g., delay), bandwidth, | constraints such as metric types (e.g., delay), bandwidth, | |||
| protection, etc. | protection, etc. | |||
| +--rw vn | +--rw vn | |||
| +--rw vn-list* [vn-id] | +--rw vn-list* [vn-id] | |||
| +--rw vn-id uint32 | +--rw vn-id uint32 | |||
| +--rw vn-name? string | +--rw vn-name? string | |||
| +--rw vn-topology-id? te-types:te-topology-id | +--rw vn-topology-id? te-types:te-topology-id | |||
| +--rw abstract-node? -> /nw:networks/network/node/tet:te-node- | +--rw abstract-node? -> /nw:networks/network/node/tet:te-node-id | |||
| id | +--rw vn-member-list* [vn-member-id] | |||
| +--rw vn-member-list* [vn-member-id] | | +--rw vn-member-id uint32 | |||
| | +--rw vn-member-id uint32 | | +--rw src | |||
| | +--rw src | | | +--rw src? -> /actn/ap/access-point-list/access-point-id | |||
| | | +--rw src? -> /actn/ap/access-point-list/access- | | | +--rw src-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn-ap-id | |||
| point-id | | | +--rw multi-src? boolean {multi-src-dest}? | |||
| | | +--rw src-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn- | | +--rw dest | |||
| ap-id | | | +--rw dest? -> /actn/ap/access-point-list/access-point-id | |||
| | | +--rw multi-src? boolean {multi-src-dest}? | | | +--rw dest-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn-ap-id | |||
| | +--rw dest | | | +--rw multi-dest? boolean {multi-src-dest}? | |||
| | | +--rw dest? -> /actn/ap/access-point-list/access- | | +--rw connetivity-matrix-id? -> /nw:networks/network/node/tet:te/te- | |||
| point-id | node-attributes/connectivity-matrices/connectivity-matrix/id | |||
| | | +--rw dest-vn-ap-id? -> /actn/ap/access-point-list/vn-ap/vn- | | +--ro oper-status? identityref | |||
| ap-id | +--ro if-selected? boolean {multi-src-dest}? | |||
| | | +--rw multi-dest? boolean {multi-src-dest}? | +--rw admin-status? identityref | |||
| | +--rw connetivity-matrix-id? -> | +--ro oper-status? identityref | |||
| /nw:networks/network/node/tet:te/te-node-attributes/connectivity- | +--rw vn-level-diversity? vn-disjointness | |||
| matrices/connectivity-matrix/id | ||||
| | +--ro oper-status? identityref | ||||
| +--ro if-selected? boolean {multi-src-dest}? | ||||
| +--rw admin-status? identityref | ||||
| +--ro oper-status? identityref | ||||
| +--rw vn-level-diversity? vn-disjointness | ||||
| 3.5. Customized Control Plane | 3.5. Customized Control Plane | |||
| ACTN provides a YANG model that allows the customer network | ACTN provides a YANG model that allows the customer network | |||
| controller (CNC) to control VN via type 2 operation. Type 2 VN | controller (CNC) to control VN via type 2 operation. Type 2 VN | |||
| allows the customer to provision pertinent LSPs that connect their | allows the customer to provision pertinent LSPs that connect their | |||
| endpoints over the customized VN topology dynamically. | endpoints over the customized VN topology dynamically. | |||
| See the following tree structure from [actn-vn] as an example for | See the following tree structure from [actn-vn] as an example for | |||
| the provisioning of LSPs over the VN topology: | the provisioning of LSPs over the VN topology via TE-topology's [TE- | |||
| Topo] Connectivity Matrix's construct. | ||||
| +--rw vn | For some VN members of a VN, the customers are allowed to configure | |||
| +--rw vn-list* [vn-id] | the actual path (i.e., detailed virtual nodes and virtual links) | |||
| +--rw vn-id uint32 | over the VN/abstract topology agreed mutually between CNC and MDSC | |||
| +--rw vn-name? string | prior to or a topology created by the MDSC as part of VN | |||
| +--rw vn-topology-id? te-types:te-topology-id | instantiation. Type 2 VN is always built on top of a Type 1 VN. If a | |||
| | {type-2}? | Type 2 VN is desired for some or all of VN members of a type 1 VN | |||
| +--rw vn-member-list* [vn-member-id] | (see the example in Section 2.1 of [ACTN-VN]), the TE-topology model | |||
| | +--rw vn-member-id uint32 | can provide the following abstract topology (that consists of | |||
| ......... | virtual nodes and virtual links) which is built on top of the Type 1 | |||
| VN so that customers can configure path over this topology. | ||||
| | +--rw path {type-2}? | +----------------------------------------------+ | |||
| | | +--rw path-element* [path-element-id] | | S1 S2 | | |||
| | | +--rw path-element-id uint32 | | O---------------O | | |||
| | | +--rw index? uint32 | | ________/ \______ \ | | |||
| | | +--rw address? te-types:te-tp-id | | / \ \ | | |||
| | | +--rw hop-type? te-types:te-hop-type | |S3 / \ S4 \ S5 | | |||
| L1----|-O----------------------O---------O-----------|------L4 | ||||
| | \ \ \ | | ||||
| | \ \ \ | | ||||
| | \ S6 \ S7 \ S8 | | ||||
| | O ----------------O---------O-------|------L7 | ||||
| | / \ / \ ____/ | | ||||
| |S9 / \ /S10 \ / | | ||||
| L2-----|---O-----O---------------------O--------------|------L8 | ||||
| | / S11 | | ||||
| L3-----|-- | | ||||
| | | | ||||
| +----------------------------------------------+ | ||||
| Figure 3. Type 2 topology | ||||
| 3.6. The Gaps | 3.6. The Gaps | |||
| ACTN allows the customers/users to subscribe and monitor VN/Tunnel | ACTN allows the customers/users to subscribe and monitor VN/Tunnel | |||
| level performance data such as latency. The low level latency and | level performance data such as latency. The low level latency and | |||
| isolation characteristics that are sought by some VPN+ users such as | isolation characteristics that are sought by some VPN+ users such as | |||
| steering packets through specific queues resources are not in the | steering packets through specific queues resources are not in the | |||
| scope of ACTN. | scope of ACTN. | |||
| This implies that the device-level performance data such as queuing | This implies that the device-level performance data such as queuing | |||
| skipping to change at page 16, line 43 ¶ | skipping to change at page 17, line 26 ¶ | |||
| 7. References | 7. References | |||
| 7.1. Informative References | 7.1. Informative References | |||
| [actn-framework] Ceccarelli, D. and Y. Lee, "Framework for | [actn-framework] Ceccarelli, D. and Y. Lee, "Framework for | |||
| Abstraction and Control of Traffic Engineered Networks", | Abstraction and Control of Traffic Engineered Networks", | |||
| draft-ietf-teas-actn-framework, work in progress, February | draft-ietf-teas-actn-framework, work in progress, February | |||
| 2017. | 2017. | |||
| [te-service-mapping] Y. Lee, D. Dhody, and D. Ceccarelli, "Traffic | [te-service-map] Y. Lee, D. Dhody, and D. Ceccarelli, "Traffic | |||
| Engineering and Service Mapping Yang Model", draft-lee- | Engineering and Service Mapping Yang Model", draft-lee- | |||
| teas-te-service-mapping-yang, work in progress. | teas-te-service-mapping-yang, work in progress. | |||
| [actn-vn] Y. Lee (Editor), "A Yang Data Model for ACTN VN | [actn-vn] Y. Lee (Editor), "A Yang Data Model for ACTN VN | |||
| Operation", draft-lee-teas-actn-vn-yang, work in progress. | Operation", draft-lee-teas-actn-vn-yang, work in progress. | |||
| [actn-info] Y. Lee, S. Belotti (Editors), "Information Model for | [actn-info] Y. Lee, S. Belotti (Editors), "Information Model for | |||
| Abstraction and Control of TE Networks (ACTN)", draft- | Abstraction and Control of TE Networks (ACTN)", draft- | |||
| ietf-teas-actn-info-model, work in progress. | ietf-teas-actn-info-model, work in progress. | |||
| skipping to change at page 17, line 22 ¶ | skipping to change at page 18, line 5 ¶ | |||
| work in progress. | work in progress. | |||
| [vpn+] S. Bryant, and D. Jie, "Enhanced Virtual Private Networks | [vpn+] S. Bryant, and D. Jie, "Enhanced Virtual Private Networks | |||
| (VPN+)", draft-bryant-rtgwg-enhanced-vpn, work in | (VPN+)", draft-bryant-rtgwg-enhanced-vpn, work in | |||
| progress. | progress. | |||
| [TE-Tunnel] T. Saad (Editor), "A YANG Data Model for Traffic | [TE-Tunnel] T. Saad (Editor), "A YANG Data Model for Traffic | |||
| Engineering Tunnels and Interfaces", draft-ietf-teas-yang- | Engineering Tunnels and Interfaces", draft-ietf-teas-yang- | |||
| te, work in progress. | te, work in progress. | |||
| [TE-topo] X. Liu, et. al, "YANG Data Model for Traffic Engineering | ||||
| (TE) Topologies", draft-ietf-teas-yang-te-topo, work in | ||||
| progress. | ||||
| [L3SM] S. Litkowski, L.Tomotaki, and K. Ogaki, "YANG Data Model for | [L3SM] S. Litkowski, L.Tomotaki, and K. Ogaki, "YANG Data Model for | |||
| L3VPN service delivery", draft-ietf-l3sm-l3vpn-service- | L3VPN service delivery", draft-ietf-l3sm-l3vpn-service- | |||
| model, work in progress. | model, work in progress. | |||
| [L2SM] B. Wen, et al, "A YANG Data Model for L2VPN Service | [L2SM] B. Wen, et al, "A YANG Data Model for L2VPN Service | |||
| Delivery", draft-ietf-l2sm-l2vpn-service-model, work in | Delivery", draft-ietf-l2sm-l2vpn-service-model, work in | |||
| progress. | progress. | |||
| [L1CSM] G. Fioccola, et al, "A Yang Data Model for L1 Connectivity | [L1CSM] G. Fioccola, et al, "A Yang Data Model for L1 Connectivity | |||
| Service Model (L1CSM)", draft-fioccola-ccamp-l1csm-yang, | Service Model (L1CSM)", draft-fioccola-ccamp-l1csm-yang, | |||
| work in progress. | work in progress. | |||
| 8. Contributors | 8. Contributors | |||
| Authors' Addresses | Authors' Addresses | |||
| Daniel King | Daniel King | |||
| Lancaster University | Lancaster University | |||
| Email: d.king@lancaster.ac.uk | Email: d.king@lancaster.ac.uk | |||
| Young Lee | Young Lee (Editor) | |||
| Huawei | Huawei | |||
| Phone: (469)277-5838 | Phone: (469)277-5838 | |||
| Email: leeyoung@huawei.com | Email: leeyoung@huawei.com | |||
| Jeff Tansura | Jeff Tansura | |||
| Futurewei | Futurewei | |||
| Email: jefftant.ietf@gmail.com | Email: jefftant.ietf@gmail.com | |||
| Qin Wu | Qin Wu | |||
| Huawei Technologies Co.,Ltd. | Huawei Technologies Co.,Ltd. | |||
| End of changes. 21 change blocks. | ||||
| 74 lines changed or deleted | 100 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||