Skip to main content

Problem Statement for Abstraction and Control of Transport Networks
draft-leeking-actn-problem-statement-02

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Authors Young Lee , Daniel King , Mohamed Boucadair , Ruiquan Jing , Luis M. Contreras
Last updated 2014-06-03
Replaced by draft-leeking-teas-actn-problem-statement
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-leeking-actn-problem-statement-02
Network Working Group                                         Young Lee
Internet Draft                                                   Huawei
                                                            Daniel King
Intended status: Informational                     Lancaster University
Expires: December 2014                                     M. Boucadair
                                                         France Telecom
                                                                R. Jing
                                                          China Telecom
                                                   L. Contreras Murillo
                                                             Telefonica

                                                           June 3, 2014

  Problem Statement for Abstraction and Control of Transport Networks

             draft-leeking-actn-problem-statement-02.txt

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with
   the provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire December 3, 2014.

Copyright Notice

Lee and King           Expires December 3, 2014                [Page 1]
Internet-Draft          ACTN Problem Statement                June 2014

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document.  Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Abstract

   Previously transport networks were typically static, lacked
   flexibility, and required long planning times when deploying new
   services. Network Providers and Service Providers have embraced
   technologies that allow separation of data plane and control plane,
   distributed signaling for path setup and protection, and centralized
   path computation for service planning and traffic engineering.
   Although these technologies provide significant benefits, they do
   not meet the growing need for network programmability, automation,
   resource sharing, and service elasticity necessary for meeting
   operator's requirement for their virtual network operation.

   Virtual network operation refers to the creation of a
   virtualized environment allowing operators to view the
   abstraction of the underlying multi-admin, multi-vendor, multi-
   technology networks and to operate, control and manage these
   multiple networks as single virtualized network. Another
   dimension of virtual network operation is associated with use of
   the common core transport network resource by multi-tenant
   service networks as a way of providing a virtualized
   infrastructure to flexibly offer new services and applications.

   The work effort investigating this problem space is known as
   Abstraction and Control of Transport Networks (ACTN). This
   document provides an ACTN problem description, scope of work,
   and outlines the core requirements to facilitate virtual network
   operation.

Lee & King              Expires December, 2014                 [Page 2]
Internet-Draft          ACTN Problem Statement                June 2014

Table of Contents

   1. Introduction...................................................4
      1.1. Terminology...............................................5
   2. Relationship with Existing Technologies........................7
      2.1. Virtual Private Networks..................................7
      2.2. Overlay Networks..........................................8
   3. Motivations for Additional Functionality.......................9
      3.1. Business Objectives.......................................9
      3.2. Network Resource Recursiveness...........................10
      3.3. Customer-Initiated Programmability.......................10
      3.4. Resource Partitioning....................................10
      3.5. Service Orchestration....................................11
   4. ACTN Objectives and Requirements..............................11
      4.1. Capability and Resource Visibility.......................11
      4.2. Network Programmability..................................12
      4.3. Common Data Models.......................................13
      4.4. Scheduling...............................................14
      4.5. Allocation...............................................14
      4.6. Adaptability.............................................15
      4.7. Slicing..................................................15
      4.8. Isolation................................................15
      4.9. Manageability............................................16
      4.10. Resilience..............................................16
      4.11. Security................................................17
      4.12. Policy..................................................18
      4.13. Technology Independence.................................18
      4.14. Optimization............................................18
      4.15. Multi-domain Support....................................18
      4.16. Architecture Principles.................................19
         4.16.1. Network Partitioning...............................19
         4.16.2. Orchestration......................................19
         4.16.3. Recursion..........................................19
         4.16.4. Legacy Support and Interoperability................19
      4.17. Other Related Work......................................19
         4.17.1. Requirements for Automated (Configuration) Management
         ...........................................................19
         4.17.2. Connectivity Provisioning Negotiation Protocol (CPNP)
         ...........................................................20
   5. References....................................................20
      5.1. Informative References...................................20
   6. Acknowledgements..............................................21
   7. IANA Considerations...........................................22
   8. Authors' Addresses............................................22

Lee & King              Expires December, 2014                 [Page 3]
Internet-Draft          ACTN Problem Statement                June 2014

1. Introduction

   Customers continue to demand new services that are time scheduled,
   dynamic, and underpinned by a Pay As You Go billing model.  These
   services are provided to customers by network operators and service
   providers and give rise to a variety of applications for office
   automation, data backup and retrieval, distributed computing, and
   high-quality media broadcasting. They offer Network and Service
   Providers new revenue generation opportunities, and these services
   typically have different traffic characteristics from established
   network services such as file hosting, web, and email. Deploying and
   operating these new applications and services using traditional
   network technologies and architectures limits network efficiency,
   scalability, and elasticity (i.e., capable of adapting to customer
   and application demands).

   Network virtualization has been a significant innovation towards
   meeting customer demands, and enabling new applications and
   services. Separating network resources, and representing resources
   and topologies via abstracted concepts, facilitate effective
   sharing, or slicing, of physical infrastructure into virtual network
   service instances corresponding to multiple virtual network
   topologies that may be used by specific applications, services and
   users. Further development is required to allow customers to create,
   modify, and delete virtual network services dynamically.

   Previously transport networks were typically static, lacked
   flexibility, and required long planning times when deploying new
   services. Network Providers and Service Providers have embraced
   technologies that allow separation of data plane and control plane,
   distributed signaling for path setup and protection, and centralized
   path computation for service planning and traffic engineering.
   Although these technologies provide significant benefits, they do
   not meet the growing need for network programmability, automation,
   resource sharing, and service elasticity necessary for meeting
   operator's requirement for their virtual network operation.

   Virtual network operation refers to the creation of a virtualized
   environment allowing operators to view the abstraction of the
   underlying multi-admin, multi-vendor, multi-technology networks and
   to operate, control and manage these multiple networks as single
   virtualized network. Another dimension of virtual network operation
   is associated with use of the common core transport network resource
   by multi-tenant service networks as a way of providing a virtualized
   infrastructure to flexibly offer new services and applications.

Lee & King              Expires December, 2014                 [Page 4]
Internet-Draft          ACTN Problem Statement                June 2014

   Abstraction and Control of Transport Networks (ACTN) defines new
   methods and capabilities for the deployment and operation of
   transport network resource. These are summarized as:

        o Coordination and abstraction of underlying transport network
          resources to higher-layer applications and customers (note
          that higher-layer applications and customers could be
          internal users of the core transport network resource such as
          various service networks);

        o Multi-domain virtual network operation that facilitates
          multi-admin, multi-vendor, multi-technology networks as a
          single virtualized network.

        o Multi-tenant virtual network operation that consolidates
          different network services and applications to allow slicing
          of network resources to meet specific service, application
          and customer requirements;

        o Provision of a computation scheme and virtual control
          capability, via a data model, to customers who request
          virtual network services (note that these customers could be
          service providers themselves);

      This document provides an ACTN problem description and scope of
      work, and outlines the core requirements to facilitate virtual
      network operation.

1.1. Terminology

      This document uses the terminology defined in [RFC4655], and
      [RFC5440]. Additional terms are defined below.

        o Customers:

      Customers are users of virtual network services. They are
      provided with an abstract resource view of the network resource
      (known as "a slice") to support their users and applications. In

Lee & King              Expires December, 2014                 [Page 5]
Internet-Draft          ACTN Problem Statement                June 2014

      some cases, customers may have to support multiple virtual
      network services with different service objectives and QoS
      requirements to support multiple types of users and applications.
      Customers can be internal trusted parties with respect to the
      provider such as wholesale service department, etc. Customers can
      also be trusted external parties with respect to the provider.

        o Service Providers (also Virtual Network Service Provider):

      Service Providers are the providers of virtual network services
      to their customers. Service Providers typically lease resources
      from single or multiple Network Providers' facilities to create
      virtual network services and offer end-to-end services to their
      customers. A Virtual Network Service Provider is a type of
      Service Provider, except that they may own no physical equipment
      or infrastructure, or have limited physical infrastructure and
      will require virtual resources for offering the final service,
      and only provide services built upon virtual network
      infrastructure. In general, this document does not distinguish
      between a Virtual Network Service Provider and Service Provider.

        o Network Providers:

      Network Providers are the infrastructure providers that own the
      physical network resources and provide transport network
      resources to their customers. Service Providers can be the
      customers of Network Providers or can be the Network Providers
      themselves.

        o Network Virtualization:

      Network virtualization, refers to allowing the customers to
      Utilize a certain network resources as if they own them and thus
      allows them to control their allocated resources in a way most
      optimal with higher layer or application processes. This customer
      control facilitates the introduction of new applications (on top
      of available services) as the customers are given programmable
      interfaces to create, modify, and delete their virtual network
      services.

        o Transport Networks

Lee & King              Expires December, 2014                 [Page 6]
Internet-Draft          ACTN Problem Statement                June 2014

      Transport networks are defined as network infrastructure that
      provides connectivity and bandwidth for customer services. They
      are characterized by their ability to support server layer
      provisioning and traffic engineering for client layer services,
      such that resource guarantees may be provided to their customers.
      Transport networks in this document refer to a set of different
      type of connection-oriented networks, which include Connection-
      Oriented Circuit Switched (CO-CS) networks and Connection-
      Oriented Packet Switched (CO-PS) networks. This implies that at
      least the following transport networks are in scope of the
      discussion of this draft: Layer 1 (L1) optical networks (e.g.,
      Optical Transport Networks (OTN) and Wavelength Switched Optical
      Networks (WSON)), MPLS-TP, MPLS-TE, as well as other emerging
      network technologies with connection-oriented behavior.

2. Relationship with Existing Technologies

2.1. Virtual Private Networks

      A Virtual Private Network (VPN) is a well-known concept
      [RFC4110], [RFC4664] and [RFC4847], and may be used to connect
      Multiple distributed sites via a variety of transport
      technologies, sometimes over shared network infrastructure.

      Typically VPNs are managed and provisioned directly by the
      Network Provider or a VPN Service Provider. VPN systems may be
      Classified by:

         o Protocol mechanisms used to tunnel the traffic;

         o Tunnel termination point and/or location;

         o Type of connectivity, site-to-site or remote-access;

         o Quality of Service (QoS) capabilities;

Lee & King              Expires December, 2014                 [Page 7]
Internet-Draft          ACTN Problem Statement                June 2014

         o Level of security provided;

         o Emulated service connectivity layer  (layer 1, layer 2,
           layer 3);

      Existing VPN solutions are largely technology specific and offer
      limited elasticity, although some technologies offer greater
      flexibility (i.e., layer 2 VPNs [RFC4664] and layer 3 VPNs
      [RFC4110]) when compared with layer 1 VPNs [RFC4847], all
      technologies are often deployed using pre-defined configurations.
      The transport layer is achieved by utilizing a variety of
      technology-specific interfaces - e.g. Gigabit Ethernet (GE),
      Synchronous Digital Hierarchy (SDH), or Asynchronous Transfer
      Mode (ATM) for wireless back-hauling, or optical networks OTN and
      WSON).

      VPNs offer a scalable tunnel solution for customer traffic;
      However, they are wholly dependent on the Service Provider to
      setup and manage the VPNs, lacking customer-initiated service
      programmability: creation, resizing, and deletion.

2.2. Overlay Networks

      An overlay network [RFC4208] provides an enhanced network
      virtualization technique, with the overlay network providing a
      topology comprised of virtual or logical links and nodes, which
      are built on top of physical nodes and links, providing a
      topology in which some of the links and nodes are virtual or
      logical and are built from multiple nodes or links in a server
      network.

      Overlay networks are typically used in the multi-layer context,
      In which the packet layer is a client to the server transport
      layer. The scope of network virtualization in overlay networks is
      somewhat limited. Customers and applications which need
      visibility or programmability, and the ability to resize or add
      resources, may find that overlay network technologies do meet
      their requirements.

Lee & King              Expires December, 2014                 [Page 8]
Internet-Draft          ACTN Problem Statement                June 2014

3. Motivations for Additional Functionality

3.1.   Business Objectives

      The traditional VPN and overlay network (ON) models are built on
      the premise that one single Network Provider provides all virtual
      private or overlay networks to its customers. This model is
      simple to operate but has some disadvantages in accommodating the
      increasing need for flexible and dynamic network virtualization
      capabilities.

      A Network Provider may provide traditional end-to-end services
      And content (i.e., web and email) to its customers. Emerging
      services, applications and content are typically provided via
      Service Providers and Over the Top (OTT) (i.e., Video-on-demand,
      Social Media) providers. We can further categorize Service
      Providers as:

      o A fixed or mobile Internet Service Providers (ISPs) which
        provide Internet connectivity and bandwidth to users;

      o A service provider that leases network resources from one or
        more network providers to create virtual network services
        between ISPs and the core Internet.

      o Data Center (DC)/content Network Provider and Service Providers
        who provide connectivity and bandwidth to content servers and
        application servers.

      Network Providers and Service Providers of every type, all share
      The common business and revenue objectives:

      o Minimize time to plan and deploy new services;

      o Reduce the reliance on highly skilled personnel to operate
        their network;

      o Reduce time to react to changing business demands and customer
        applications;

Lee & King              Expires December, 2014                 [Page 9]
Internet-Draft          ACTN Problem Statement                June 2014

      o Offer new, much more flexible services to their customers;

      o Maximize network resource usage and efficiency.

      All aforementioned objectives have the capability to significant
      increase revenue and reduce operational costs.

      Network and Service Providers require capabilities that extend
      the current landscape of network virtualization capabilities and
      overall business objectives of the Network Provider, Service
      Provider, and ultimately the Customer and their Applications.

3.2. Network Resource Recursiveness

      A newly emerged network virtualization environment is a
      Collection of heterogeneous network architectures from different
      players. VPNs and overlay networks are somewhat limited in
      addressing programmable interfaces for application or customer
      layers as well as for the service layer. The model must be
      extended to address a recursive nature of layer interactions in
      network virtualization across transport networks, service
      networks, and customers/applications.

3.3. Customer-Initiated Programmability

      Network-driven technologies such as VPNs and overlay networks
      provide customers with a set of pre-defined programmatic
      parameters to enable virtual networks. However, this model is
      limited to only allow programmable interfaces in which customers
      initiate and define virtual network services. This model must be
      extended to allow customer-initiated network programmability.

3.4. Resource Partitioning

      The ability to slice and allocate transport resources for Service
      Providers would be beneficial. It would improve transport network
      resource efficiency and provide a method for the transport
      Network Provider to offer resource flexibility and control to

Lee & King              Expires December, 2014                [Page 10]
Internet-Draft          ACTN Problem Statement                June 2014

      Service Providers and users.

3.5. Service Orchestration

      Another dimension is diversity on the customer side. Customers in
      this newly emerged network virtualization environment bring
      different dynamics than the traditional VPNs or Overlay Networks.
      There may be a multiple virtual slices that need to be created,
      managed and deleted, each interfacing to a number of Service
      Providers and Network Providers as the end-points of the clients
      span across multiple network domains. Thus, multiple components
      will require automated co-ordination and management, this is
      known as service orchestration and is therefore one of the key
      capabilities that should be provided.

4. ACTN Objectives and Requirements

      The overall goal of enabling network abstraction and multiple
      concurrent virtual networks to coexist together on a shared
      physical infrastructure, comprised on multiple physical layers,
      and may be subdivided into several smaller objectives. These are
      outlined below and are required in order to fulfill the design
      goals of ACTN.

      The ACTN effort should utilize existing physical layer monitoring
      capabilities, algorithmic representation and modelling of
      physical layer resources to consider appropriate transport
      metrics and constraints. Moreover, the model may want to support
      dynamic collection of the statistics (i.e., status and
      availability) of the underlying transport network infrastructure.

4.1. Capability and Resource Visibility

      It may be necessary for the application or Customer to obtain
      available capabilities and available network resources, for
      example, abstracted resource view and control. The visibility of
      the capabilities and the resources can be obtained either by
      resource discovery or by resource publishing. In the former case,
      the customer performs resource collection directly from the

Lee & King              Expires December, 2014                [Page 11]
Internet-Draft          ACTN Problem Statement                June 2014

      provider network by using discovery mechanisms to get total
      information about the available resources to be consumed. In the
      latter case, the network provider exposes available resources to
      potential customers (e.g., through a resource catalog) reducing
      the amount of detail of the underlying network.

      Furthermore, capabilities and resources will also include:

      o Peering Points (may be based on business SLAs or policies);

      o Transport Topology (i.e., transport switching type, topology
        and connection points);

      o Transport Capacity (i.e., current bandwidth and maximum
        bandwidth).

      o Policy Management (i.e., what resources and capabilities are
        available, and what may be requested and by whom).

      o Information about the provider (i.e., informative data about
        the resource owner)

      o Geographical information respect to the resources to be
        consumed (i.e., geolocation of the resources for preventing
        legal concerns that could appear in the provision of some final
        services).

      o Information about resource cost, consumption, etc. (i.e.,
        energy efficiency per transmitted bit, monetary cost of the
        resource usage per time unit, etc.).

      o Information about achievable resiliency (i.e.,
        protection/restoration capabilities, recover time, etc.).

4.2. Network Programmability

      A programmable interface should provide customers with the
      capabilities to dynamically create, deploy, and operate services
      in response to customer and application demands. To enable the

Lee & King              Expires December, 2014                [Page 12]
Internet-Draft          ACTN Problem Statement                June 2014

      on-demand services, the separation of control and forwarding is a
      fundamental requirement. Once this separation is achieved the
      network layer may be programmed irrespective of the underlying
      forwarding mechanism.

      The creation of a programmable abstraction layer for physical
      network devices would provide information models which
      would allow operators to manipulate the network resources. By
      utilizing open programmable north-bound network interfaces, it
      would enable access to virtual control layer by customer
      interfaces and applications.

4.3. Common Data Models

      The abstraction of the underlay transport, and resource
      Information representation model should describe each technology
      type within the ACTN framework; they will all follow a uniform
      structure, which is extensible to support any future
      technologies.

      Such models will represent the physical resources as a set of
      attributes, characteristics and functionality, while adaptively
      capturing the true real-time and dynamic (real-time) properties
      of underlying physical resources.

      For future discussion, abstraction and the technology agnostic
      virtualization requirements may benefit from being split into new
      sub-sections, suggested below:

      Attributes

         o Metrics

         o Control Actions

         o Semantics

         o Administrative information (resource ownership)

Lee & King              Expires December, 2014                [Page 13]
Internet-Draft          ACTN Problem Statement                June 2014

      Resources will be described with semantic methods so that the
      resource description models can be exposed in a uniformly
      structured manner to the upper layers.

      Virtual infrastructure requests from ACTN customers will be
      translated into network parameters according to aforementioned
      network abstraction model. Utilizing this mechanism, a request is
      translated into topology and multi-dimensional nodes, interfaces
      and spectrum space with specific attributes such as bandwidth,
      QoS, and node capability.

      Apart from facilitating the request of resources, these data
      models could be used for other tasks like network operation
      (e.g., the management of the abstracted transport infrastructure
      by the customer), configuration (e.g., the control of the
      resources), monitoring (e.g., the uniform view of different
      infrastructures in use), KPI customization (e.g., the
      particularization of the collected metrics according to the
      customer interests), etc.

4.4. Scheduling

      When requesting network slices it should be possible to request
      an immediate or scheduled service.

      To enable such on-demand consumption of resources, the Network
      Providers must employ appropriate scheduling algorithms in all of
      the network elements.

4.5. Allocation

      When establishing a network slice, a customer may require
      specific guarantees for the virtual node and link attributes.
      This might include a request that guarantees minimum packet
      processing on a virtual node, and fixed loss and delay
      characteristics on the virtual links. This should be governed by
      Service Level Agreements (SLAs) and can have implications in the
      supportive transport technologies, and in the properties of the

Lee & King              Expires December, 2014                [Page 14]
Internet-Draft          ACTN Problem Statement                June 2014

      service to be offered to the customer (e.g., protected versus
      non-protected).

      To provide such guarantees and to create an illusion of an
      Isolated and dedicated network slice to each customer, the
      Network Providers must employ appropriate scheduling algorithms
      in all of the network elements.

4.6. Adaptability

      Adaptability of services would allow the Service Provider, user,
      and application to request modification of exist network resource
      that has been assigned. This may include resizing of bandwidth,
      modification of the topology, and adding/removing connectivity
      points.

4.7. Slicing

      It should be possible for transport network infrastructure to be
      partitioned into multiple independent virtual networks known as
      "slicing", based on provider service types, customers and
      application requirements.

4.8. Isolation

      Isolation, both of physical underlay infrastructure and of co-
      existing virtual networks, and ensure no leakage of traffic.
      Furthermore, there must be mechanisms that ensure that once
      network slices are assigned Customer and Application services are
      not competing for transport resources.

      Each customer or application should be able to use arbitrary
      network topology, routing, or forwarding functions as well as
      customized control mechanisms independent of the underlying
      physical network and other coexisting virtual networks.

      It must also be possible for many virtual networks to share the
      underlying infrastructure, without significantly impacting the

Lee & King              Expires December, 2014                [Page 15]
Internet-Draft          ACTN Problem Statement                June 2014

      performance of applications utilizing the virtual networks.

4.9. Manageability

      A broad range of capabilities, including: request, control,
      provisioning, monitoring, resilience, adaptation and re-
      optimization of end-to-end services will need to be provided
      through a set of well-defined interfaces, specifically it should
      be possible to provide:

        o Control of virtual network resources, capable of delivering
          end-to-end services optimisation of connectivity and virtual
          infrastructure based on client interface and application
          demands, technology constraints (bandwidth, latency, jitter,
          function, etc.) and commercial constraints (energy, customer
          SLA, etc.).

        o Automation of virtual service and function requests and
          objectives, and providing on-demand and self-service network
          slicing.

        o Infrastructure elasticity to allow rapid provisioning,
          automatic scaling out, or in, of virtual resources.

        o Virtual resource monitoring [Editor's Note: Control of
          bandwidth, energy consumption and quality of service/packet
          scheduling.]

      [Editor's Note: The requirements on the technology driver from
       both sides need to be analysed, e.g. the information update
       frequency.]

4.10. Resilience

      The resilience of the transport service provided to the customer
      will depend on the requirements expressed by the customer. Two
      different resilience scenarios may be considered: (i) the
      resilience as observed from the point of view of the customer;
      and (ii) the resilience as observed from the point of view of the

Lee & King              Expires December, 2014                [Page 16]
Internet-Draft          ACTN Problem Statement                June 2014

      provider.

      The former case refers to the situation in which the customer
      request for specific resilience requirements on the offered
      transport service. For instance, the customer can request
      transport protection on the disjoint paths for connecting service
      end-points. This specific requirement forces the provider to
      explicitly assign transport resources to a customer.

      However there are other situations in which the provider has to
      allocate resources for implicit resilience. For instance, the
      customer could request a service with certain QoS or availability
      for a single connection between service end-points according to
      an SLA. In that case, the provider could trigger recovery actions
      in the network, e.g. during a network outage, and according to
      the conditions of the SLA. These measures may not be perceived by
      the customer.

4.11. Security

      Network programmability may introduce new security and
      misconfiguration vulnerabilities. These must be investigated and
      discussed, and then solved with suitable solutions. ACTN-based
      networks must be resilient to existing, and new, faults and
      attacks.

      Failure or security breach in one ACTN slice should not impact
      another virtual network. It must also be possible for separation
      of untrusted services and applications, along with confidential
      services and applications that must be secured.

      Some other aspects are relevant to security within the context of
      ACTN:

     o Security aspects from the service point of view. For instance,
       encryption capabilities as part of the service capabilities that
       could be requested by the customer.
     o Security aspects from the customer/provider relationship point
       of view. For instance aspects like authentication,

Lee & King              Expires December, 2014                [Page 17]
Internet-Draft          ACTN Problem Statement                June 2014

       authorization, logging, etc.

4.12. Policy

      [To be discussed.]

4.13. Technology Independence

      ACTN must support a variety of underlay transport technologies,
      providing the flexibility to manage a variety of heterogeneous
      network technologies.

4.14. Optimization

      It should be guaranteed the capability of the service provider to
      optimize the provided transport infrastructure without impacting
      the customer services. As the resources become consumed some
      fragmentation in the usage of the underlying infrastructure could
      occur. The provider then can be interested in optimizing the
      usage of its resources for several reasons (e.g., energy
      consumption, reutilization of vacant resources, etc.).

4.15. Multi-domain Support

      A given customer could required to compose an end-to-end
      transport service by using network capabilities from different
      service providers that may be internal organizations or external
      entity. Reasons for that could be geographical coverage of the
      service (not fully served by a unique provider), resource
      availability (not enough resources from a given provider) or
      simply resiliency (provider diversity). ACTN should allow the
      multi domain approach for giving the customer the possibility of
      composing multi-provider transport services.

Lee & King              Expires December, 2014                [Page 18]
Internet-Draft          ACTN Problem Statement                June 2014

4.16. Architecture Principles

4.16.1. Network Partitioning

      Coexistence of multiple network slices will need to be supported.
      It should also be possible for multiple network slices used by
      different customers to coexist together, spanning over part or
      full of the underlying physical networks.

4.16.2. Orchestration

      ACTN should allow orchestration (automated co-ordination of
      functions) for managing and controlling virtual network services
      that may span multiple Service Providers and Network Providers.

4.16.3. Recursion

      It should be possible for a network slice to be segmented to
      allow a slicing hierarchy with parent child relationships.
      Allowing a customer to become a virtual provider, this is known
      as recursion as well as nesting of network slices.

4.16.4. Legacy Support and Interoperability

      Capability to deploy ACTN should be transparent to existing
      Physical network control and management mechanisms and protocols.
      Additionally, interoperability with non-ACTN based (i.e.,
      conventional) networks should be guaranteed, thus allowing for
      the coexistence of both kinds of network solutions from the
      perspective of either the customer or the provider.

4.17. Other Related Work

4.17.1. Requirements for Automated (Configuration) Management

      Given the ever-increasing complexity of the configuration tasks

Lee & King              Expires December, 2014                [Page 19]
Internet-Draft          ACTN Problem Statement                June 2014

      required for the dynamic provisioning of IP networks and
      services, [I-D.boucadair-network-automation-requirements] aims at
      listing the requirements to drive the specification of an
      automated configuration management framework, including the
      requirements for a protocol to convey configuration information
      towards the managed entities.

4.17.2. Connectivity Provisioning Negotiation Protocol (CPNP)

      [I-D.boucadair-connectivity-provisioning-protocol] specifies
      the Connectivity Provisioning Negotiation Protocol (CPNP) which
      is used to facilitate the dynamic negotiation of service
      parameters between a Customer and a Provider.  As such, CPNP is a
      generic protocol that can be used for various negotiation
      purposes that include (but are not necessarily limited to)
      connectivity provisioning services, storage facilities, CDN
      (Content Delivery Networks) footprint, etc.

      The generic CPP template allows for:

      o  Automating the process of service negotiation and activation,
         thus accelerating service provisioning;

      o  Setting the (traffic) objectives of Traffic Engineering
         functions and service management functions.

      o  Enriching service and network management systems with
         'decision-making' capabilities based on negotiated/offered
         CPPs.

5. References

5.1. Informative References

      [RFC4208] Swallow, G., Drake, J., Ishimatsu, H., and Y. Rekhter,
                "Generalized Multiprotocol Label Switching (GMPLS)
                User-Network Interface (UNI): Resource ReserVation
                Protocol-Traffic Engineering (RSVP-TE) Support for the

Lee & King              Expires December, 2014                [Page 20]
Internet-Draft          ACTN Problem Statement                June 2014

                Overlay Model", RFC 4208, October 2005.

      [RFC4110] R. Callon and M. Suzuki, "A Framework for Layer 3
                Provider-Provisioned Virtual Private Networks
                (PPVPNs)", RFC 4110, July 2005.

      [RFC4847] T. Takeda, Ed., "Framework and Requirements for Layer 1
                Virtual Private Networks", RFC 4847, April 2007.

      [RFC4655]  Farrel, A., Vasseur, J., and J. Ash, "A Path
                 Computation Element (PCE)-Based Architecture", RFC
                 4655, August 2006.

      [RFC4664] L. Andersson, and E. Rosen, Eds., "Framework for Layer
                2 Virtual Private Networks (L2VPNs)", RFC 4664, Sep
                2006.

      [RFC5440] JP. Vasseur, Ed. And JL. Le Roux, Ed. "Path Computation
                Element (PCE) Communication Protocol (PCEP)", RFC 5440,
                March 2009.

      [I-D.boucadair-connectivity-provisioning-protocol]
                 Boucadair, M. and C. Jacquenet, "Connectivity
                 Provisioning Negotiation Protocol (CPNP)", draft-
                 boucadair-connectivity-provisioning-protocol-01 (work
                 in progress), October 2013.

      [I-D.boucadair-network-automation-requirements]
                 Boucadair, M. and C. Jacquenet, "Requirements for
                 Automated (Configuration) Management", draft-
                 boucadair-network-automation-requirements-02 (work in
                 progress), June 2013.

6. Acknowledgements

      The authors wish to thank the contributions on the IETF ACTN
      mailing list.

Lee & King              Expires December, 2014                [Page 21]
Internet-Draft          ACTN Problem Statement                June 2014

7. IANA Considerations

   Not Applicable.

8. Authors' Addresses

      Young Lee
      Huawei Technologies
      5340 Legacy Drive
      Plano, TX 75023, USA
      Phone: (469)277-5838
      Email: leeyoung@huawei.com

      Daniel King
      Lancaster University
      Email: d.king@lancaster.ac.uk

      Mohamed Boucadair
      France Telecom
      Rennes  35000
      France
      Email: mohamed.boucadair@orange.com

      Ruiquan Jing,
      China Telecom Corporation Limited,
      No. 118, Xizhimenneidajie, Xicheng District, Beijing, China
      Email: jingrq@ctbri.com.cn

      Luis Miguel Contreras Murillo
      Telefonica I+D
      Email: lmcm@tid.es

Lee & King              Expires December, 2014                [Page 22]
Internet-Draft          ACTN Problem Statement                June 2014

   Intellectual Property Statement

      The IETF Trust takes no position regarding the validity or scope
      of any Intellectual Property Rights or other rights that might be
      claimed to pertain to the implementation or use of the technology
      described in any IETF Document or the extent to which any license
      under such rights might or might not be available; nor does it
      represent that it has made any independent effort to identify any
      such rights.

      Copies of Intellectual Property disclosures made to the IETF
      Secretariat and any assurances of licenses to be made available,
      Or the result of an attempt made to obtain a general license or
      permission for the use of such proprietary rights by implementers
      or users of this specification can be obtained from the IETF on-
      line IPR repository at http://www.ietf.org/ipr

      The IETF invites any interested party to bring to its attention
      any copyrights, patents or patent applications, or other
      proprietary rights that may cover technology that may be required
      to implement any standard or specification contained in an IETF
      Document. Please address the information to the IETF at ietf-
      ipr@ietf.org.

   Disclaimer of Validity

      All IETF Documents and the information contained therein are
      provided on an "AS IS" basis and THE CONTRIBUTOR, THE
      ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE
      INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING
      TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
      BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
      THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
      MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

   Acknowledgment

      Funding for the RFC Editor function is currently provided by the

Lee & King              Expires December, 2014                [Page 23]
Internet-Draft          ACTN Problem Statement                June 2014

      Internet Society.

Lee & King              Expires December, 2014                [Page 24]