diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc8413.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc8413.txt')
-rw-r--r-- | doc/rfc/rfc8413.txt | 1235 |
1 files changed, 1235 insertions, 0 deletions
diff --git a/doc/rfc/rfc8413.txt b/doc/rfc/rfc8413.txt new file mode 100644 index 0000000..3874690 --- /dev/null +++ b/doc/rfc/rfc8413.txt @@ -0,0 +1,1235 @@ + + + + + + +Internet Engineering Task Force (IETF) Y. Zhuang +Request for Comments: 8413 Q. Wu +Category: Informational H. Chen +ISSN: 2070-1721 Huawei + A. Farrel + Juniper Networks + July 2018 + + + Framework for Scheduled Use of Resources + +Abstract + + Time-Scheduled (TS) reservation of Traffic Engineering (TE) resources + can be used to provide resource booking for TE Label Switched Paths + so as to better guarantee services for customers and to improve the + efficiency of network resource usage at any moment in time, including + network usage that is planned for the future. This document provides + a framework that describes and discusses the architecture for + supporting scheduled reservation of TE resources. This document does + not describe specific protocols or protocol extensions needed to + realize this service. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8413. + + + + + + + + + + + + + +Zhuang, et al. Informational [Page 1] + +RFC 8413 Scheduled Use of Resources July 2018 + + +Copyright Notice + + Copyright (c) 2018 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 4 + 2.1. Provisioning TE-LSPs and TE Resources . . . . . . . . . . 4 + 2.2. Selecting the Path of an LSP . . . . . . . . . . . . . . 4 + 2.3. Planning Future LSPs . . . . . . . . . . . . . . . . . . 5 + 2.4. Looking at Future Demands on TE Resources . . . . . . . . 6 + 2.4.1. Interaction between Time-Scheduled and Ad Hoc + Reservations . . . . . . . . . . . . . . . . . . . . 6 + 2.5. Requisite State Information . . . . . . . . . . . . . . . 7 + 3. Architectural Concepts . . . . . . . . . . . . . . . . . . . 8 + 3.1. Where is Scheduling State Held? . . . . . . . . . . . . . 8 + 3.2. What State is Held? . . . . . . . . . . . . . . . . . . . 10 + 3.3. Enforcement of Operator Policy . . . . . . . . . . . . . 12 + 4. Architecture Overview . . . . . . . . . . . . . . . . . . . . 13 + 4.1. Service Request . . . . . . . . . . . . . . . . . . . . . 13 + 4.1.1. Reoptimization After TED Updates . . . . . . . . . . 14 + 4.2. Initialization and Recovery . . . . . . . . . . . . . . . 15 + 4.3. Synchronization Between PCEs . . . . . . . . . . . . . . 15 + 5. Multi-domain Considerations . . . . . . . . . . . . . . . . . 16 + 6. Security Considerations . . . . . . . . . . . . . . . . . . . 18 + 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19 + 8. Informative References . . . . . . . . . . . . . . . . . . . 19 + Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 21 + Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 21 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 + + + + + + + + + +Zhuang, et al. Informational [Page 2] + +RFC 8413 Scheduled Use of Resources July 2018 + + +1. Introduction + + Traffic Engineering Label Switched Paths (TE-LSPs) are connection- + oriented tunnels in packet and non-packet networks [RFC3209] + [RFC3945]. TE-LSPs may reserve network resources for use by the + traffic they carry, thus providing some guarantees of service + delivery and allowing a network operator to plan the use of the + resources across the whole network. + + In some technologies (such as wavelength switched optical networks) + the resource is synonymous with the label that is switched on the + path of the LSP so that it is not possible to establish an LSP that + can carry traffic without assigning a physical resource to the LSP. + In other technologies (such as packet switched networks), the + resources assigned to an LSP are a measure of the capacity of a link + that is dedicated for use by the traffic on the LSP. + + In all cases, network planning consists of selecting paths for LSPs + through the network so that there will be no contention for + resources. LSP establishment is the act of setting up an LSP and + reserving resources within the network. Network optimization or + reoptimization is the process of repositioning LSPs in the network to + make the unreserved network resources more useful for potential + future LSPs while ensuring that the established LSPs continue to + fulfill their objectives. + + It is often the case that it is known that an LSP will be needed at + some specific time in the future. While a path for that LSP could be + computed using knowledge of the currently established LSPs and the + currently available resources, this does not give any degree of + certainty that the necessary resources will be available when it is + time to set up the new LSP. Yet, setting up the LSP ahead of the + time when it is needed (which would guarantee the availability of the + resources) is wasteful since the network resources could be used for + some other purpose in the meantime. + + Similarly, it may be known that an LSP will no longer be needed after + some future time and that it will be torn down, which will release + the network resources that were assigned to it. This information can + be helpful in planning how a future LSP is placed in the network. + + Time-Scheduled (TS) reservation of TE resources can be used to + provide resource booking for TE-LSPs so as to better guarantee + services for customers and to improve the efficiency of network + resource usage into the future. This document provides a framework + that describes the problem and discusses the architecture for the + + + + + +Zhuang, et al. Informational [Page 3] + +RFC 8413 Scheduled Use of Resources July 2018 + + + scheduled reservation of TE resources. This document does not + describe specific protocols or protocol extensions needed to realize + this service. + +2. Problem Statement + +2.1. Provisioning TE-LSPs and TE Resources + + TE-LSPs in existing networks are provisioned using a variety of + techniques. They may be set up using RSVP-TE as a signaling protocol + [RFC3209] [RFC3473]. Alternatively, they could be established by + direct control of network elements such as in the Software-Defined + Networking (SDN) paradigm. They could also be provisioned using the + PCE Communication Protocol (PCEP) [RFC5440] as a control protocol to + communicate with the network elements. + + TE resources are reserved at the point of use. That is, the + resources (wavelengths, timeslots, bandwidth, etc.) are reserved for + use on a specific link and are tracked by the Label Switching Routers + (LSRs) at the end points of the link. Those LSRs learn which + resources to reserve during the LSP setup process. + + The use of TE resources can be varied by changing the parameters of + the LSP that uses them, and the resources can be released by tearing + down the LSP. + + Resources that have been reserved in the network for use by one LSP + may be preempted for use by another LSP. If RSVP-TE signaling is in + use, a holding priority and a preemption priority are used to + determine which LSPs may preempt the resources that are in use for + which other LSPs. If direct (central) control is in use, the + controller is able to make preemption decisions. In either case, + operator policy forms a key part of preemption since there is a trade + between disrupting existing LSPs and enabling new LSPs. + +2.2. Selecting the Path of an LSP + + Although TE-LSPs can determine their paths hop by hop using the + shortest path toward the destination to route the signaling protocol + messages [RFC3209], in practice this option is not applied because it + does not look far enough ahead into the network to verify that the + desired resources are available. Instead, the full length of the + path of an LSP is usually computed ahead of time either by the head- + end LSR of a signaled LSP or by Path Computation Element (PCE) + functionality that is in a dedicated server or built into network + management software [RFC4655]. + + + + + +Zhuang, et al. Informational [Page 4] + +RFC 8413 Scheduled Use of Resources July 2018 + + + Such full-path computation is applied in order that an end-to-end + view of the available resources in the network can be used to + determine the best likelihood of establishing a viable LSP that meets + the service requirements. Even in this situation, however, it is + possible that two LSPs being set up at the same time will compete for + scarce network resources, which means that one or both of them will + fail to be established. This situation is avoided by using a + centralized PCE that is aware of the LSP setup requests that are in + progress. + + Path selection may make allowance for preemption as described in + Section 2.1. That is, when selecting a path, the decision may be + made to choose a path that will result in the preemption of an + existing LSP. The trade-off between selecting a less optimal path, + failing to select any path at all, and preempting an existing LSP + must be subject to operator policy. + + Path computation is subject to "objective functions" that define what + criteria are to be met when the LSP is placed [RFC4655]. These can + be criteria that apply to the LSP itself (such as the shortest path + to the destination) or to the network state after the LSP is set up + (such as the maximized residual link bandwidth). The objective + functions may be requested by the application requesting the LSP and + may be filtered and enhanced by the computation engine according to + operator policy. + +2.3. Planning Future LSPs + + LSPs may be established "on demand" when the requester determines + that a new LSP is needed. In this case, the path of the LSP is + computed as described in Section 2.2. + + However, in many situations, the requester knows in advance that an + LSP will be needed at a particular time in the future. For example, + the requester may be aware of a large traffic flow that will start at + a well-known time, perhaps for a database synchronization or for the + exchange of content between streaming sites. Furthermore, the + requester may also know for how long the LSP is required before it + can be torn down. + + The set of requests for future LSPs could be collected and held in a + central database (such as at a Network Management System (NMS)): when + the time comes for each LSP to be set up, the NMS can ask the PCE to + compute a path and can then request the LSP to be provisioned. This + approach has a number of drawbacks because it is not possible to + determine in advance whether it will be possible to deliver the LSP + since the resources it needs might be used by other LSPs in the + + + + +Zhuang, et al. Informational [Page 5] + +RFC 8413 Scheduled Use of Resources July 2018 + + + network. Thus, at the time the requester asks for the future LSP, + the NMS can only make a best-effort guarantee that the LSP will be + set up at the desired time. + + A better solution, therefore, is for the requests for future LSPs to + be serviced at once. The paths of the LSPs can be computed ahead of + time and converted into reservations of network resources during + specific windows in the future. That is, while the path of the LSP + is computed and the network resources are reserved, the LSP is not + established in the network until the time for which it is scheduled. + + There is a need to take into account items that need to be subject to + operator policy, such as 1) the amount of capacity available for + scheduling future reservations, 2) the operator preference for the + measures that are used with respect to the use of scheduled resources + during rapid changes in traffic demand events, or 3) a complex + (multiple nodes/links) failure event so as to protect against network + destabilization. Operator policy is discussed further in + Section 3.3. + +2.4. Looking at Future Demands on TE Resources + + While path computation, as described in Section 2.2, takes account of + the currently available network resources and can act to place LSPs + in the network so that there is the best possibility of future LSPs + being accommodated, it cannot handle all eventualities. It is simple + to construct scenarios where LSPs that are placed one at a time lead + to future LSPs being blocked, but where foreknowledge of all of the + LSPs would have made it possible for them all to be set up. + + If, therefore, we were able to know in advance what LSPs were going + to be requested, we could plan for them and ensure resources were + available. Furthermore, such an approach enables a commitment to be + made to a service user that an LSP will be set up and available at a + specific time. + + A reservation service can be achieved by tracking the current use of + network resources and also having a future view of the resource + usage. We call this Time-Scheduled TE (TS-TE) resource reservation. + +2.4.1. Interaction between Time-Scheduled and Ad Hoc Reservations + + There will, of course, be a mixture of resource uses in a network. + For example, normal unplanned LSPs may be requested alongside TS-TE + LSPs. When an unplanned LSP is requested, no prior accommodation can + be made to arrange resource availability, so the LSP can be placed no + better than would be the case without TS-TE. However, the new LSP + can be placed considering the future demands of TS-TE LSPs that have + + + +Zhuang, et al. Informational [Page 6] + +RFC 8413 Scheduled Use of Resources July 2018 + + + already been requested. Of course, the unplanned LSP has no known + end time and so any network planning must assume that it will consume + resources forever. + +2.5. Requisite State Information + + In order to achieve the TS-TE resource reservation, the use of + resources on the path needs to be scheduled. The scheduling state is + used to indicate when resources are reserved and when they are + available for use. + + A simple information model for one piece of the scheduling state is + as follows: + + { + link id; + resource id or reserved capacity; + reservation start time; + reservation end time + } + + The resource that is scheduled could be link capacity, physical + resources on a link, buffers on an interface, etc., and could include + advanced considerations such as CPU utilization and the availability + of memory at nodes within the network. The resource-related + information might also include the maximal unreserved bandwidth of + the link over a time interval. That is, the intention is to book + (reserve) a percentage of the residual (unreserved) bandwidth of the + link. This could be used, for example, to reserve bandwidth for a + particular class of traffic (such as IP) that doesn't have a + provisioned LSP. + + For any one resource, there could be multiple pieces of the + scheduling state, and for any one link, the timing windows might + overlap. + + There are multiple ways to realize this information model and + different ways to store the data. The resource state could be + expressed as a start time and an end time (as shown above), or it + could be expressed as a start time and a duration. Multiple + reservation periods, possibly of different lengths, may need to be + recorded for each resource. Furthermore, the current state of + network reservation could be kept separate from the scheduled usage, + or everything could be merged into a single TS database. + + An application may make a reservation request for immediate resource + usage or to book resources for future use so as to maximize the + chance of services being delivered and to avoid contention for + + + +Zhuang, et al. Informational [Page 7] + +RFC 8413 Scheduled Use of Resources July 2018 + + + resources in the future. A single reservation request may book + resources for multiple periods and might request a reservation that + repeats on a regular cycle. + + A computation engine (that is, a PCE) may use the scheduling state + information to help optimize the use of resources into the future and + reduce contention or blocking when the resources are actually needed. + + Note that it is also necessary to store the information about future + LSPs as distinct from the specific resource scheduling. This + information is held to allow the LSPs to be instantiated when they + are due, and use the paths/resources that have been computed for + them, and also to provide correlation with the TS-TE resource + reservations so that it is clear why resources were reserved, thus + allowing preemption and handling the release of reserved resources in + the event of cancellation of future LSPs. See Section 3.2 for + further discussion of the distinction between scheduled resource + state and scheduled LSP state. + + Network performance factors (such as maximum link utilization and the + residual capacity of the network), with respect to supporting + scheduled reservations, need to be supported and are subject to + operator policy. + +3. Architectural Concepts + + This section examines several important architectural concepts to + understand the design decisions reached in this document to achieve + TS-TE in a scalable and robust manner. + +3.1. Where is Scheduling State Held? + + The scheduling state information described in Section 2.5 has to be + held somewhere. There are two places where this makes sense: + + o in the network nodes where the resources exist; or, + + o in a central scheduling controller where decisions about resource + allocation are made. + + The first of these makes policing of resource allocation easier. It + means that many points in the network can request immediate or + scheduled LSPs with the associated resource reservation, and that all + such requests can be correlated at the point where the resources are + + + + + + + +Zhuang, et al. Informational [Page 8] + +RFC 8413 Scheduled Use of Resources July 2018 + + + allocated. However, this approach has some scaling and technical + problems: + + o The most obvious issue is that each network node must retain the + full time-based state for all of its resources. In a busy network + with a high arrival rate of new LSPs and a low hold time for each + LSP, this could be a lot of state. Network nodes are normally + implemented with minimal spare memory. + + o In order that path computation can be performed, the computing + entity normally known as a Path Computation Element (PCE) + [RFC4655] needs access to a database of available links and nodes + in the network (as well as the TE properties of said links). This + database is known as the Traffic Engineering Database (TED) and is + usually populated from information advertised in the IGP by each + of the network nodes or exported using BGP Link State (BGP-LS) + [RFC7752]. To be able to compute a path for a future LSP, the PCE + needs to populate the TED with all of the future resource + availability: if this information is held on the network nodes, it + must also be advertised in the IGP. This could be a significant + scaling issue for the IGP and the network nodes, as all of the + advertised information is held at every network node and must be + periodically refreshed by the IGP. + + o When a normal node restarts, it can recover the resource + reservation state from the forwarding hardware, from Non-Volatile + Random-Access Memory (NVRAM), or from adjacent nodes through the + signaling protocol [RFC5063]. If the scheduling state is held at + the network nodes, it must also be recovered after the restart of + a network node. This cannot be achieved from the forwarding + hardware because the reservation will not have been made, could + require additional expensive NVRAM, or might require that all + adjacent nodes also have the scheduling state in order to + reinstall it on the restarting node. This is potentially complex + processing with scaling and cost implications. + + Conversely, if the scheduling state is held centrally, it is easily + available at the point of use. That is, the PCE can utilize the + state to plan future LSPs and can update that stored information with + the scheduled reservation of resources for those future LSPs. This + approach also has several issues: + + o If there are multiple controllers, then they must synchronize + their stored scheduling state as they each plan future LSPs and + they must have a mechanism to resolve resource contention. This + is relatively simple and is mitigated by the fact that there is + ample processing time to replan future LSPs in the case of + resource contention. + + + +Zhuang, et al. Informational [Page 9] + +RFC 8413 Scheduled Use of Resources July 2018 + + + o If other sources of immediate LSPs are allowed (for example, other + controllers or autonomous action by head-end LSRs), then the + changes in resource availability caused by the setup or tear down + of these LSPs must be reflected in the TED (by use of the IGP as + is already normally done) and may have an impact on planned future + LSPs. This impact can be mitigated by replanning future LSPs or + through LSP preemption. + + o If the scheduling state is held centrally at a PCE, the state must + be held and restored after a system restart. This is relatively + easy to achieve on a central server that can have access to non- + volatile storage. The PCE could also synchronize the scheduling + state with other PCEs after restart. See Section 4.2 for details. + + o Of course, a centralized system must store information about all + of the resources in the network. In a busy network with a high + arrival rate of new LSPs and a low hold time for each LSP, this + could be a lot of state. This is multiplied by the size of the + network measured both by the number of links and nodes and by the + number of trackable resources on each link or at each node. This + challenge may be mitigated by the centralized server being + dedicated hardware, but there remains the problem of collecting + the information from the network in a timely way when there is + potentially a very large amount of information to be collected and + when the rate of change of that information is high. This latter + challenge is only solved if the central server has full control of + the booking of resources and the establishment of new LSPs so that + the information from the network only serves to confirm what the + central server expected. + + Thus, considering these trade-offs, the architectural conclusion is + that the scheduling state should be held centrally at the point of + use and not in the network devices. + +3.2. What State is Held? + + As already described, the PCE needs access to an enhanced, time-based + TED. It stores the Traffic Engineering (TE) information, such as + bandwidth, for every link for a series of time intervals. There are + a few ways to store the TE information in the TED. For example, + suppose that the amount of the unreserved bandwidth at a priority + level for a link is Bj in a time interval from time Tj to Tk (k = + j+1), where j = 0, 1, 2, .... + + + + + + + + +Zhuang, et al. Informational [Page 10] + +RFC 8413 Scheduled Use of Resources July 2018 + + + Bandwidth + ^ + | B3 + | B1 ___________ + | __________ + |B0 B4 + |__________ B2 _________ + | ________________ + | + -+-------------------------------------------------------> Time + |T0 T1 T2 T3 T4 + + + Figure 1: A Plot of Bandwidth Usage against Time + + The unreserved bandwidth for the link can be represented and stored + in the TED as [T0, B0], [T1, B1], [T2, B2], [T3, B3], ... as shown in + Figure 1. + + But it must be noted that service requests for future LSPs are known + in terms of the LSPs whose paths are computed and for which resources + are scheduled. For example, if the requester of a future LSP decides + to cancel the request or to modify the request, the PCE must be able + to map this to the resources that were reserved. When the LSP (or + the request for the LSP with a number of time intervals) is canceled, + the PCE must release the resources that were reserved on each of the + links along the path of the LSP in every time interval from the TED. + If the bandwidth that had been reserved for the LSP on a link was B + from time T2 to T3 and the unreserved bandwidth on the link was B2 + from T2 to T3, then B is added back to the link for the time interval + from T2 to T3 and the unreserved bandwidth on the link from T2 to T3 + will be seen to be B2 + B. + + This suggests that the PCE needs an LSP Database (LSP-DB) [RFC8231] + that contains information not only about LSPs that are active in the + network but also those that are planned. For each time interval that + applies to the LSP, the information for an LSP stored in the LSP-DB + includes: the time interval, the paths computed for the LSP + satisfying the constraints in the time interval, and the resources + (such as bandwidth) reserved for the LSP in the time interval. See + also Section 2.3 + + It is an implementation choice how the TED and LSP-DB are stored both + for dynamic use and for recovery after failure or restart, but it may + be noted that all of the information in the scheduled TED can be + recovered from the active network state and from the scheduled LSP- + DB. + + + + +Zhuang, et al. Informational [Page 11] + +RFC 8413 Scheduled Use of Resources July 2018 + + +3.3. Enforcement of Operator Policy + + Computation requests for LSPs are serviced according to operator + policy. For example, a PCE may refuse a computation request because + the application making the request does not have sufficient + permissions or because servicing the request might take specific + resource usage over a given threshold. + + Furthermore, the preemption and holding priorities of any particular + computation request may be subject to the operator's policies. The + request could be rejected if it does not conform to the operator's + policies, or (possibly more likely) the priorities could be set/ + overwritten according to the operator's policies. + + Additionally, the Objective Functions (OFs) of computation request + (such as maximizing residual bandwidth) are also subject to operator + policies. It is highly likely that the choice of OFs is not + available to an application and is selected by the PCE or management + system subject to operator policies and knowledge of the application. + + None of these statements is new to scheduled resources. They apply + to stateless, stateful, passive, and active PCEs, and they continue + to apply to scheduling of resources. + + An operator may choose to configure special behavior for a PCE that + handles resource scheduling. For example, an operator might want + only a certain percentage of any resource to be bookable. And an + operator might want the preemption of booked resources to be an + inverse function of how far in the future the resources are needed + for the first time. + + It is a general assumption about the architecture described in + Section 4 that a PCE is under the operational control of the operator + that owns the resources that the PCE manipulates. Thus, the operator + may configure any amount of (potentially complex) policy at the PCE. + This configuration would also include policy points surrounding + reoptimization of existing and planned LSPs in the event of changes + in the current and future (planned) resource availability. + + The granularity of the timing window offered to an application will + depend on an operator's policy as well as the implementation in the + PCE and goes to define the operator' service offerings. Different + granularities and different lengths of prebooking may be offered to + different applications. + + + + + + + +Zhuang, et al. Informational [Page 12] + +RFC 8413 Scheduled Use of Resources July 2018 + + +4. Architecture Overview + + The architectural considerations and conclusions described in the + previous section lead to the architecture described in this section + and illustrated in Figure 2. The interfaces and interactions shown + in the figure and labeled (a) through (f) are described in + Section 4.1. + + ------------------- + | Service Requester | + ------------------- + ^ + a| + v + ------- b -------- + | |<--->| LSP-DB | + | | -------- + | PCE | + | | c ----- + | |<---->| TED | + ------- ----- + ^ ^ + | | + d| |e + | | + ------+-----+-------------------- + | | Network + | -------- + | | Router | + v -------- + ----- ----- + | LSR |<------>| LSR | + ----- f ----- + + Figure 2: Reference Architecture for Scheduled Use of Resources + +4.1. Service Request + + As shown in Figure 2, some component in the network requests a + service. This may be an application, an NMS, an LSR, or any + component that qualifies as a Path Computation Client (PCC). We show + this on the figure as the "Service Requester", and it sends a request + to the PCE for an LSP to be set up at some time (either now or in the + future). The request, indicated on Figure 2 by the arrow (a), + includes all of the parameters of the LSP that the requester wishes + to supply, such as priority, bandwidth, start time, and end time. + Note that the requester in this case may be the LSR shown in the + figure or may be a distinct system. + + + +Zhuang, et al. Informational [Page 13] + +RFC 8413 Scheduled Use of Resources July 2018 + + + The PCE enters the LSP request in its LSP-DB (b) and uses information + from its TED (c) to compute a path that satisfies the constraints + (such as bandwidth) for the LSP in the time interval from the start + time to the end time. It updates the future resource availability in + the TED so that further path computations can take account of the + scheduled resource usage. It stores the path for the LSP into the + LSP-DB (b). + + When it is time (i.e., at the start time) for the LSP to be set up, + the PCE sends a PCEP Initiate request to the head-end LSR (d), which + provides the path to be signaled as well as other parameters, such as + the bandwidth of the LSP. + + As the LSP is signaled between LSRs (f), the use of resources in the + network is updated and distributed using the IGP. This information + is shared with the PCE either through the IGP or using BGP-LS (e), + and the PCE updates the information stored in its TED (c). + + After the LSP is set up, the head-end LSR sends a PCEP LSP State + Report (PCRpt) message to the PCE (d). The report contains the + resources, such as bandwidth usage, for the LSP. The PCE updates the + status of the LSP in the LSP-DB according to the report. + + When an LSP is no longer required (either because the Service + Requester has canceled the request or because the LSP's scheduled + lifetime has expired), the PCE can remove it. If the LSP is + currently active, the PCE instructs the head-end LSR to tear it down + (d), and the network resource usage will be updated by the IGP and + advertised back to the PCE through the IGP or BGP-LS (e). Once the + LSP is no longer active, the PCE can remove it from the LSP-DB (b). + +4.1.1. Reoptimization After TED Updates + + When the TED is updated as indicated in Section 4.1, depending on + operator policy (so as to minimize network perturbations), the PCE + may perform reoptimization of the LSPs for which it has computed + paths. These LSPs may be already provisioned, in which case the PCE + issues PCEP Update request messages for the LSPs that should be + adjusted. Additionally, the LSPs being reoptimized may be scheduled + LSPs that have not yet been provisioned, in which case reoptimization + involves updating the store of scheduled LSPs and resources. + + In all cases, the purpose of reoptimization is to take account of the + resource usage and availability in the network and to compute paths + for the current and future LSPs that best satisfy the objectives of + those LSPs while keeping the network as clear as possible to support + further LSPs. Since reoptimization may perturb established LSPs, it + + + + +Zhuang, et al. Informational [Page 14] + +RFC 8413 Scheduled Use of Resources July 2018 + + + is subject to operator oversight and policy. As the stability of the + network will be impacted by frequent changes, the extent and impact + of any reoptimization needs to be subject to operator policy. + + Additionally, the status of the reserved resources (alarms) can + enhance the computation and planning for future LSPs and may + influence repair and reoptimization. Control of recalculations based + on failures and notifications to the operator is also subject to + policy. + + See Section 3.3 for further discussion of operator policy. + +4.2. Initialization and Recovery + + When a PCE in the architecture shown in Figure 2 is initialized, it + must learn the state from the network, from its stored databases, and + potentially from other PCEs in the network. + + The first step is to get an accurate view of the topology and + resource availability in the network. This would normally involve + reading the state directly from the network via the IGP or BGP-LS + (e), but it might include receiving a copy of the TED from another + PCE. Note that a TED stored from a previous instantiation of the PCE + is unlikely to be valid. + + Next, the PCE must construct a time-based TED to show scheduled + resource usage. How it does this is implementation specific, and + this document does not dictate any particular mechanism: it may + recover a time-based TED previously saved to non-volatile storage, or + it may reconstruct the time-based TED from information retrieved from + the LSP-DB previously saved to non-volatile storage. If there is + more than one PCE active in the network, the recovering PCE will need + to synchronize the LSP-DB and time-based TED with other PCEs (see + Section 4.3). + + Note that the stored LSP-DB needs to include the intended state and + actual state of the LSPs so that when a PCE recovers, it is able to + determine what actions are necessary. + +4.3. Synchronization Between PCEs + + If there is active in the network more than one PCE that supports + scheduling, it is important to achieve some consistency between the + scheduled TED and scheduled LSP-DB held by the PCEs. + + [RFC7399] answers various questions around synchronization between + the PCEs. It should be noted that the time-based "scheduled" + information adds another dimension to the issue of synchronization + + + +Zhuang, et al. Informational [Page 15] + +RFC 8413 Scheduled Use of Resources July 2018 + + + between PCEs. It should also be noted that a deployment may use a + primary PCE and then have other PCEs as backup, where a backup PCE + can take over only in the event of a failure of the primary PCE. + Alternatively, the PCEs may share the load at all times. The choice + of the synchronization technique is largely dependent on the + deployment of PCEs in the network. + + One option for ensuring that multiple PCEs use the same scheduled + information is simply to have the PCEs driven from the same shared + database, but it is likely to be inefficient, and interoperation + between multiple implementations will be harder. + + Another option is for each PCE to be responsible for its own + scheduled database and to utilize some distributed database + synchronization mechanism to have consistent information. Depending + on the implementation, this could be efficient, but interoperation + between heterogeneous implementations is still hard. + + A further approach is to utilize PCEP messages to synchronize the + scheduled state between PCEs. This approach would work well if the + number of PCEs that support scheduling is small, but as the number + increases, considerable message exchange needs to happen to keep the + scheduled databases synchronized. Future solutions could also + utilize some synchronization optimization techniques for efficiency. + Another variation would be to request information from other PCEs for + a particular time slice, but this might have an impact on the + optimization algorithm. + +5. Multi-domain Considerations + + Multi-domain path computation usually requires some form of + cooperation between PCEs, each of which has responsibility for + determining a segment of the end-to-end path in the domain for which + it has computational responsibility. When computing a scheduled + path, resources need to be booked in all of the domains that the path + will cross so that they are available when the LSP is finally + signaled. + + Per-domain path computation [RFC5152] is not an appropriate mechanism + when a scheduled LSP is being computed because the computation + requests at downstream PCEs are only triggered by signaling. + However, a similar mechanism could be used where cooperating PCEs + exchange Path Computation Request (PCReq) messages for a scheduled + LSP, as shown in Figure 3. In this case, the service requester asks + for a scheduled LSP that will span two domains (a). PCE1 computes a + path across Domain 1 and reserves the resources and also asks PCE2 to + compute and reserve in Domain 2 (b). PCE2 may return a full path or + could return a path key [RFC5520]. When it is time for LSP setup, + + + +Zhuang, et al. Informational [Page 16] + +RFC 8413 Scheduled Use of Resources July 2018 + + + PCE1 triggers the head-end LSR (c), and the LSP is signaled (d). If + a path key is used, the entry LSR in Domain 2 will consult PCE2 for + the path expansion (e) before completing signaling (f). + + ------------------- + | Service Requester | + ------------------- + ^ + a| + v + ------ b ------ + | |<---------------->| | + | PCE1 | | PCE2 | + | | | | + ------ ------ + ^ ^ + | | + c| e| + | | + ----+----------------- ----+----------------- + | | Domain 1 | | | Domain 2 | + | v | | v | + | ----- d ----- | | ----- f ----- | + | | LSR |<--->| LSR |<-+--+->| LSR |<--->| LSR | | + | ----- ----- | | ----- ----- | + ---------------------- ---------------------- + + + Figure 3: Per-Domain Path Computation for Scheduled LSPs + + Another mechanism for PCE cooperation in multi-domain LSP setup is + Backward Recursive PCE-Based Computation (BRPC) [RFC5441]. This + approach relies on the downstream domain to supply a variety of + potential paths to the upstream domain. Although BRPC can arrive at + a more optimal end-to-end path than per-domain path computation, it + is not well suited to LSP scheduling because the downstream PCE would + need to reserve resources on all of the potential paths and then + release those that the upstream PCE announced it did not plan to use. + + Finally, we should consider hierarchical PCE (H-PCE) [RFC6805]. This + mode of operation is similar to that shown in Figure 3, but a parent + PCE is used to coordinate the requests to the child PCEs, which then + results in better visibility of the end-to-end path and better + coordination of the resource booking. The sequenced flow of control + is shown in Figure 4. + + + + + + +Zhuang, et al. Informational [Page 17] + +RFC 8413 Scheduled Use of Resources July 2018 + + + ------------------- + | Service Requester | + ------------------- + ^ + a| + v + -------- + | | + | Parent | + | PCE | + | | + -------- + ^ ^ b + b| |_______________________ + | | + v v + ------ ------ + | | | | + | PCE1 | | PCE2 | + | | | | + ------ ------ + ^ ^ + | | + c| e| + | | + ----+----------------- ----+----------------- + | | Domain 1 | | | Domain 2 | + | v | | v | + | ----- d ----- | | ----- f ----- | + | | LSR |<--->| LSR |<-+--+->| LSR |<--->| LSR | | + | ----- ----- | | ----- ----- | + ---------------------- ---------------------- + + + Figure 4: Hierarchical PCE for Path Computation for Scheduled LSPs + +6. Security Considerations + + The protocol implications of scheduled resources are unchanged from + "on demand" LSP computation and setup. A discussion of securing PCEP + is found in [RFC5440], and work to extend that security is provided + in [RFC8253]. Furthermore, the path key mechanism described in + [RFC5520] can be used to enhance privacy and security. + + Similarly, there is no change to the security implications for the + signaling of scheduled LSPs. A discussion of the security of the + signaling protocols that would be used is found in [RFC5920]. + + + + +Zhuang, et al. Informational [Page 18] + +RFC 8413 Scheduled Use of Resources July 2018 + + + However, the use of scheduled LSPs extends the attack surface for a + PCE-enabled TE system by providing a larger (logically infinite) + window during which an attack can be initiated or planned. That is, + if bogus scheduled LSPs can be requested and entered into the LSP-DB, + then a large number of LSPs could be launched and significant network + resources could be blocked. Control of scheduling requests needs to + be subject to operator policy, and additional authorization needs to + be applied for access to LSP scheduling. Diagnostic tools need to be + provided to inspect the LSP-DB to spot attacks. + +7. IANA Considerations + + This document has no IANA actions. + +8. Informative References + + [AUTOBW] Yong, L. and Y. Lee, "ASON/GMPLS Extension for Reservation + and Time Based Automatic Bandwidth Service", Work in + Progress, draft-yong-ccamp-ason-gmpls-autobw-service-00, + October 2006. + + [DRAGON] National Science Foundation, "The DRAGON Project: Dynamic + Resource Allocation via GMPLS Optical Networks", Overview + and Status Presentation at ONT3, September 2006, + <http://www.maxgigapop.net/wp-content/uploads/ + The-DRAGON-Project.pdf>. + + [FRAMEWORK-TTS] + Chen, H., Toy, M., Liu, L., and K. Pithewan, "Framework + for Temporal Tunnel Services", Work In Progress, draft- + chen-teas-frmwk-tts-01, March 2016. + + [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., + and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP + Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, + <https://www.rfc-editor.org/info/rfc3209>. + + [RFC3473] Berger, L., Ed., "Generalized Multi-Protocol Label + Switching (GMPLS) Signaling Resource ReserVation Protocol- + Traffic Engineering (RSVP-TE) Extensions", RFC 3473, + DOI 10.17487/RFC3473, January 2003, + <https://www.rfc-editor.org/info/rfc3473>. + + [RFC3945] Mannie, E., Ed., "Generalized Multi-Protocol Label + Switching (GMPLS) Architecture", RFC 3945, + DOI 10.17487/RFC3945, October 2004, + <https://www.rfc-editor.org/info/rfc3945>. + + + + +Zhuang, et al. Informational [Page 19] + +RFC 8413 Scheduled Use of Resources July 2018 + + + [RFC4655] Farrel, A., Vasseur, J., and J. Ash, "A Path Computation + Element (PCE)-Based Architecture", RFC 4655, + DOI 10.17487/RFC4655, August 2006, + <https://www.rfc-editor.org/info/rfc4655>. + + [RFC5063] Satyanarayana, A., Ed. and R. Rahman, Ed., "Extensions to + GMPLS Resource Reservation Protocol (RSVP) Graceful + Restart", RFC 5063, DOI 10.17487/RFC5063, October 2007, + <https://www.rfc-editor.org/info/rfc5063>. + + [RFC5152] Vasseur, JP., Ed., Ayyangar, A., Ed., and R. Zhang, "A + Per-Domain Path Computation Method for Establishing Inter- + Domain Traffic Engineering (TE) Label Switched Paths + (LSPs)", RFC 5152, DOI 10.17487/RFC5152, February 2008, + <https://www.rfc-editor.org/info/rfc5152>. + + [RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation + Element (PCE) Communication Protocol (PCEP)", RFC 5440, + DOI 10.17487/RFC5440, March 2009, + <https://www.rfc-editor.org/info/rfc5440>. + + [RFC5441] Vasseur, JP., Ed., Zhang, R., Bitar, N., and JL. Le Roux, + "A Backward-Recursive PCE-Based Computation (BRPC) + Procedure to Compute Shortest Constrained Inter-Domain + Traffic Engineering Label Switched Paths", RFC 5441, + DOI 10.17487/RFC5441, April 2009, + <https://www.rfc-editor.org/info/rfc5441>. + + [RFC5520] Bradford, R., Ed., Vasseur, JP., and A. Farrel, + "Preserving Topology Confidentiality in Inter-Domain Path + Computation Using a Path-Key-Based Mechanism", RFC 5520, + DOI 10.17487/RFC5520, April 2009, + <https://www.rfc-editor.org/info/rfc5520>. + + [RFC5920] Fang, L., Ed., "Security Framework for MPLS and GMPLS + Networks", RFC 5920, DOI 10.17487/RFC5920, July 2010, + <https://www.rfc-editor.org/info/rfc5920>. + + [RFC6805] King, D., Ed. and A. Farrel, Ed., "The Application of the + Path Computation Element Architecture to the Determination + of a Sequence of Domains in MPLS and GMPLS", RFC 6805, + DOI 10.17487/RFC6805, November 2012, + <https://www.rfc-editor.org/info/rfc6805>. + + [RFC7399] Farrel, A. and D. King, "Unanswered Questions in the Path + Computation Element Architecture", RFC 7399, + DOI 10.17487/RFC7399, October 2014, + <https://www.rfc-editor.org/info/rfc7399>. + + + +Zhuang, et al. Informational [Page 20] + +RFC 8413 Scheduled Use of Resources July 2018 + + + [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and + S. Ray, "North-Bound Distribution of Link-State and + Traffic Engineering (TE) Information Using BGP", RFC 7752, + DOI 10.17487/RFC7752, March 2016, + <https://www.rfc-editor.org/info/rfc7752>. + + [RFC8231] Crabbe, E., Minei, I., Medved, J., and R. Varga, "Path + Computation Element Communication Protocol (PCEP) + Extensions for Stateful PCE", RFC 8231, + DOI 10.17487/RFC8231, September 2017, + <https://www.rfc-editor.org/info/rfc8231>. + + [RFC8253] Lopez, D., Gonzalez de Dios, O., Wu, Q., and D. Dhody, + "PCEPS: Usage of TLS to Provide a Secure Transport for the + Path Computation Element Communication Protocol (PCEP)", + RFC 8253, DOI 10.17487/RFC8253, October 2017, + <https://www.rfc-editor.org/info/rfc8253>. + +Acknowledgements + + This work has benefited from the discussions of resource scheduling + over the years. In particular, the DRAGON project [DRAGON] and + [AUTOBW], both of which provide approaches to auto-bandwidth services + in GMPLS networks. + + Mehmet Toy, Lei Liu, and Khuzema Pithewan contributed to an earlier + version of [FRAMEWORK-TTS]. We would like to thank the authors of + that document on Temporal Tunnel Services for material that assisted + in thinking about this document. + + Thanks to Michael Scharf and Daniele Ceccarelli for useful comments + on this work. + + Jonathan Hardwick provided a helpful Routing Directorate review. + + Deborah Brungard, Mirja Kuehlewind, and Benjamin Kaduk suggested many + changes during their Area Director reviews. + +Contributors + + The following person contributed to discussions that led to the + development of this document: + + + Dhruv Dhody + Email: dhruv.dhody@huawei.com + + + + + +Zhuang, et al. Informational [Page 21] + +RFC 8413 Scheduled Use of Resources July 2018 + + +Authors' Addresses + + Yan Zhuang + Huawei + 101 Software Avenue, Yuhua District + Nanjing, Jiangsu 210012 + China + + Email: zhuangyan.zhuang@huawei.com + + + Qin Wu + Huawei + 101 Software Avenue, Yuhua District + Nanjing, Jiangsu 210012 + China + + Email: bill.wu@huawei.com + + + Huaimo Chen + Huawei + Boston, MA + United States of America + + Email: huaimo.chen@huawei.com + + + Adrian Farrel + Juniper Networks + + Email: afarrel@juniper.net + + + + + + + + + + + + + + + + + + + +Zhuang, et al. Informational [Page 22] + |