< draft-liu-teas-transport-network-slice-yang-03.txt   draft-liu-teas-transport-network-slice-yang-04.txt >
Network Working Group X. Liu Network Working Group X. Liu
Internet-Draft Volta Networks Internet-Draft Volta Networks
Intended status: Standards Track J. Tantsura Intended status: Standards Track J. Tantsura
Expires: November 3, 2021 Juniper Networks Expires: January 10, 2022 Microsoft
I. Bryskin I. Bryskin
Individual Individual
L. Contreras L. Contreras
Telefonica Telefonica
Q. Wu Q. Wu
Huawei Huawei
S. Belotti S. Belotti
R. Rokui R. Rokui
Nokia Nokia
May 2, 2021 July 9, 2021
IETF Network Slice YANG Data Model IETF Network Slice YANG Data Model
draft-liu-teas-transport-network-slice-yang-03 draft-liu-teas-transport-network-slice-yang-04
Abstract Abstract
This document describes a YANG data model for managing and This document describes a YANG data model for managing and
controlling IETF network slices, defined in controlling IETF network slices, defined in
[I-D.ietf-teas-ietf-network-slices]. [I-D.ietf-teas-ietf-network-slices].
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
skipping to change at page 1, line 42 skipping to change at page 1, line 42
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 3, 2021. This Internet-Draft will expire on January 10, 2022.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 24 skipping to change at page 2, line 24
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3
1.2. Tree Diagrams . . . . . . . . . . . . . . . . . . . . . . 3 1.2. Tree Diagrams . . . . . . . . . . . . . . . . . . . . . . 3
2. Modeling Considerations . . . . . . . . . . . . . . . . . . . 3 2. Modeling Considerations . . . . . . . . . . . . . . . . . . . 3
2.1. Relationships to Related Topology Models . . . . . . . . 3 2.1. Relationships to Related Topology Models . . . . . . . . 3
2.2. Network Slice with TE . . . . . . . . . . . . . . . . . . 4 2.2. Network Slice with TE . . . . . . . . . . . . . . . . . . 4
2.3. ACTN for Network Slicing . . . . . . . . . . . . . . . . 5 2.3. ACTN for Network Slicing . . . . . . . . . . . . . . . . 5
3. Model Applicability . . . . . . . . . . . . . . . . . . . . . 5 3. Model Applicability . . . . . . . . . . . . . . . . . . . . . 6
3.1. Network Slicing by Virtualization . . . . . . . . . . . . 5 3.1. Network Slicing by Virtualization . . . . . . . . . . . . 6
3.2. Network Slicing by TE Overlay . . . . . . . . . . . . . . 8 3.2. Network Slicing by TE Overlay . . . . . . . . . . . . . . 8
4. Model Tree Structure . . . . . . . . . . . . . . . . . . . . 10 4. Model Tree Structure . . . . . . . . . . . . . . . . . . . . 10
5. YANG Module . . . . . . . . . . . . . . . . . . . . . . . . . 10 5. YANG Module . . . . . . . . . . . . . . . . . . . . . . . . . 10
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16
7. Security Considerations . . . . . . . . . . . . . . . . . . . 17 7. Security Considerations . . . . . . . . . . . . . . . . . . . 17
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 18 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 18
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 18 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
9.1. Normative References . . . . . . . . . . . . . . . . . . 18 9.1. Normative References . . . . . . . . . . . . . . . . . . 18
9.2. Informative References . . . . . . . . . . . . . . . . . 20 9.2. Informative References . . . . . . . . . . . . . . . . . 20
Appendix A. Data Tree for the Example in Section 3.1. . . . . . 22 Appendix A. Data Tree for the Example in Section 3.1. . . . . . 22
skipping to change at page 4, line 17 skipping to change at page 4, line 17
L3 Topology Model: L3 Topology Model:
Defined in [RFC8346]. Defined in [RFC8346].
TE Topology Model: TE Topology Model:
Defined in [RFC8795]. Defined in [RFC8795].
Figure 1 shows the relationships among these models. The box of Figure 1 shows the relationships among these models. The box of
dotted lines denotes the model defined in this document. dotted lines denotes the model defined in this document.
+------------------------+ +-------------------------+
| | | |
| Network Topology Model | | Network Topology Model |
| RFC 8345 | | RFC 8345 |
+------------------------+ +------------^------------+
| |
+-------------+-------------+-------------+-------------+ | augments
| | | | | +--------------+------+-------+--------------+
V V V V V | | | |
+----------+ +----------+ +----------+ +----------+ ............ | | | |
| OTN | | L2 | | L3 | | TE | : Network : +-----^----+ +-----^----+ +-----^----+ ......^.....
| Topology | | Topology | | Topology | | Topology | : Slice : | L2 | | L3 | | TE | : Network :
| Model | | Model | | Model | | Model | : Model : | Topology | | Topology | | Topology | : Slice :
+----------+ +----------+ +----------+ +----------+ '''''''''''' | Model | | Model | | Model | : Model :
+----------+ +----------+ +-----^----+ ''''''''''''
|
|
+-----^----+
| OTN |
| Topology |
| Model |
+----------+
Figure 1: Model Relationships Figure 1: Model Relationships
2.2. Network Slice with TE 2.2. Network Slice with TE
In many situations, an IETF network slide needs to have TE (Traffic In many situations, an IETF network slide needs to have TE (Traffic
Engineering) capabilities to achieve certain network characteristics. Engineering) capabilities to achieve certain network characteristics.
The TE Topology Model defined in [RFC8795] can be used to make an The TE Topology Model defined in [RFC8795] can be used to make an
IETF network slice TE capable. To achieve this, an IETF network IETF network slice TE capable. To achieve this, an IETF network
slice instance will be configured to have both "network-slice" and slice instance will be configured to have both "network-slice" and
"te-topology" network types, taking advantage of the multiple "te-topology" network types, taking advantage of the multiple
inheritance capability featured by the network topology model inheritance capability featured by the network topology model
[RFC8345]. The following diagram shows their relations. [RFC8345]. The following diagram shows their relations.
+--------------------+ +--------------------+ +---------------------+ +---------------------+
| Network Slice | | TE Topology | | Network Slice | | TE Topology |
| ietf-network-slice | | ietf-te-topology | | ietf-network-slice | | ietf-te-topology |
+--------------------+ +--------------------+ +----------^----------+ +----------^----------+
\ / | inherits attributes from |
\ / \ /
\ / \ /
v v \ /
+------------------------+ +--------------------------------------------------------+
| Network Slice with TE | | Network Slice with TE |
| | +--------------------------------------------------------+
+------------------------+ | ietf-network-topology: |
| network-id (key) |
| network-types: { |
| network-slice{} |
| te-topology{} |
| } |
| <other network topology attributes> |
+-----------------------------+--------------------------+
| ietf-network-slice: | ietf-te-topology: |
| <network slice attributes>| <TE attributes> |
+-----------------------------+--------------------------+
Figure 2: Network Slice with TE Figure 2: Network Slice with TE
This method can be applied to other types of network topology models This method can be applied to other types of network topology models
too. For example, when a network topology instance is configured to too. For example, when a network topology instance is configured to
have the types of "network-slice" defined in this document, "te- have the types of "network-slice" defined in this document, "te-
topology" defined in [RFC8795], and "l3-unicast-topology" defined in topology" defined in [RFC8795], and "l3-unicast-topology" defined in
[RFC8346], this network topology instance becomes an IETF network [RFC8346], this network topology instance becomes an IETF network
slice instance that can perform layer 3 traffic engineering. slice instance that can perform layer 3 traffic engineering.
skipping to change at page 32, line 13 skipping to change at page 32, line 13
} }
Authors' Addresses Authors' Addresses
Xufeng Liu Xufeng Liu
Volta Networks Volta Networks
EMail: xufeng.liu.ietf@gmail.com EMail: xufeng.liu.ietf@gmail.com
Jeff Tantsura Jeff Tantsura
Juniper Networks Microsoft
EMail: jefftant.ietf@gmail.com EMail: jefftant.ietf@gmail.com
Igor Bryskin Igor Bryskin
Individual Individual
EMail: i_bryskin@yahoo.com EMail: i_bryskin@yahoo.com
Luis Miguel Contreras Murillo Luis Miguel Contreras Murillo
Telefonica Telefonica
 End of changes. 8 change blocks. 
33 lines changed or deleted 51 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/