Benchmarking Workgroup                                             S. Wu
Internet-Draft                                          Juniper Networks
Intended status: Informational                              May 18, 2018
Expires: November 19, 2018


                  Network Service Layer Abstract Model
                        draft-xwu-bmwg-nslam-01

Abstract

   While the networking technologies have evolved over the years, the
   layered approach has been dominant in many network solutions.  Each
   layer may have multiple interchangeable, competing alternatives that
   deliver a similar set of functionality.  In order to provide an
   objective benchmarking data among various implementations, the need
   arises for a common abstract model for each network service layer,
   with a set of required and optional specifications in respective
   layers.  Many overlay and or underlay solutions can be described
   using these models.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 19, 2018.

Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect



Wu                      Expires November 19, 2018               [Page 1]


Internet-Draft                    NSLAM                         May 2018


   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
     1.2.  Purpose of The Document . . . . . . . . . . . . . . . . .   3
     1.3.  Conventions Used in This Document . . . . . . . . . . . .   3
   2.  Network Service Framework . . . . . . . . . . . . . . . . . .   4
     2.1.  Node  . . . . . . . . . . . . . . . . . . . . . . . . . .   4
     2.2.  Topology  . . . . . . . . . . . . . . . . . . . . . . . .   6
     2.3.  Infrastructure  . . . . . . . . . . . . . . . . . . . . .   7
     2.4.  Services  . . . . . . . . . . . . . . . . . . . . . . . .   8
   3.  Service Models  . . . . . . . . . . . . . . . . . . . . . . .   9
     3.1.  Layer 2 Ethernet Service Model  . . . . . . . . . . . . .   9
     3.2.  Layer 3 Service Model . . . . . . . . . . . . . . . . . .  10
     3.3.  Infrastructure Service Model  . . . . . . . . . . . . . .  10
     3.4.  Node Level Features . . . . . . . . . . . . . . . . . . .  11
     3.5.  Common Service Specification  . . . . . . . . . . . . . .  11
     3.6.  Common Network Events . . . . . . . . . . . . . . . . . .  12
       3.6.1.  Event Attributes  . . . . . . . . . . . . . . . . . .  12
       3.6.2.  Hardware Related  . . . . . . . . . . . . . . . . . .  13
       3.6.3.  Software Component  . . . . . . . . . . . . . . . . .  13
       3.6.4.  Protocol Events . . . . . . . . . . . . . . . . . . .  14
       3.6.5.  Redundancy Failover . . . . . . . . . . . . . . . . .  14
   4.  Use of Network Service Layer Abstract Model . . . . . . . . .  14
   5.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  15
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  15
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  15
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  15
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  15
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  15
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  16

1.  Introduction

   This document provides a reference model for common network service
   framework.  The main purpose is to abstract service model for each
   network layer with a small set of key specifications.  This is
   essential to characterize the capability and capacity of a production
   network, a target network design.  A complete service model mainly
   includes

      Infrastructure - devices, links, and other equipment.




Wu                      Expires November 19, 2018               [Page 2]


Internet-Draft                    NSLAM                         May 2018


      Services - network applications provisioned.  It is often defined
      as device configuration and or resource allocation.

      Capacity - A set of objects dynamically created for both control
      and forwarding planes, such as routes, traffic, subscribers and
      etc.  In some cases, the amount and types of traffic may impact
      control plane objects, such as multicast or ethernet networks.

      Performance Metrics - infrastructure resource utilization.

1.1.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

1.2.  Purpose of The Document

   Many efforts to YANG model and OpenConfig collaboration are well
   under way.  This document specifies a higher layer abstraction that
   reuses a small subset of YANG keywords for service description
   purpose.  It SHALL NOT be used for production provisioning purpose.
   Instead, it can be adopted for design spec, capacity planning,
   product benchmarking and test setup.

   The specification described in this document SHALL be used for
   outline service requirements from customer perspective, instead of
   network implementation mechanism from operators perspective.

1.3.  Conventions Used in This Document

   Descriptive terms can quickly become overloaded.  For consistency,
   the following definitions are used.

   o  Node - The name for an attrubute.

   o  Brackets "[" and "]" enclose list keys.

   o  Abbreviations before data node names: "rw" means configuration
      data (read-write), and "ro" means state data (read-only).

   o  Parentheses enclose choice and case nodes, and case nodes are also
      marked with a colon (":").








Wu                      Expires November 19, 2018               [Page 3]


Internet-Draft                    NSLAM                         May 2018


2.  Network Service Framework

   The network service layer abstract model is illustrated by Figure 1.
   This shows a stack of components to enable end-to-end services.  Not
   all components are required for a given service.  A common use case
   is to pick one component as target service with a detailed profile,
   with the remaining components as supporting technologies using
   default profiles.

                   Network Service Layer Abstract Model

                          +---+-+-+-+---+-+-+-+-+
                          | S |L|L| |   |L| |L| |
                          | E |2|2|V| E |3|M|U|6|
                          | R |V|C|P| V |V|V|B|P|
                          | V |P|K|L| P |P|P|G|E|
                          | I |N|T|S| N |N|N|P| |
                          | C +-+-+-+-+-+-+-+-+-+
                          | E | L2SVC |  L3SVC  |
                          +---+-------+---------+
                          |   |      BGP        |
                          | I +-----------------+
                          | N |    Transport    |
                          | F +-----------------+
                          | R |      IGP        |
                          | A +-----------------+
                          |   |    Bridging     |
                          +---+---------+-------+
                          | T |         | Active|
                          | O | Logical |Standby|
                          | P +---------+ M-Home|
                          | O | Physical| L/B   |
                          +---+-+-+-+-+-+-+-+-+-+
                          | N |I| | | | |C| | |I|
                          | O |N|F|Q| | |G|N|N|S|
                          | D |T|A|O|F|G|S|S|S|S|
                          | E |F|B|S|W|R|S|R|F|U|
                          +---+-+-+-+-+-+-+-+-+-+

                                 Figure 1

2.1.  Node

   A network node or a network device processes and forwards traffic
   based on predefined or dynamically learned policies.  This section
   covers standalone features like the following:





Wu                      Expires November 19, 2018               [Page 4]


Internet-Draft                    NSLAM                         May 2018


   o  INTF - Network interfaces that provides internal or external
      connectivity to adjacent devices.  Only physical properties of the
      interfaces are of concern in this level.  The interfaces can be
      physical or logical, wired or wireless.

   o  FAB - Fabric capacity.  It provides redundancy and cross connect
      within the same network device among various linecards or
      interfaces

   o  QOS - Quality of Services.  Traffic queuing, buffering, and
      congestion management technologies are used in this level

   o  FW - Firewall filters or access control list.  This commonly
      refers to stateless packet inspection and filtering.  Stateful
      firewall is out of scope of this document.  Number of filters
      daisy chained on a given protocol family, number of terms within
      same filter, and depth of packet inspection can all affect speed
      and latency of traffic forwarding.  It also provides necessary
      security protection of node, where protocol traffic may be
      affected.

   o  GR - Graceful Restart per protocol.  It needs to cooperate with
      adjacent node

   o  CGSS - Controller Graceful / Stateful Switchover.  A network
      device often has two redundant controllers to minimize the
      disruption in event of catastrophic failure on the primary
      controller.  This is accomplished via real time state
      synchronization from the primary to the backup controller.  It,
      however, should be used along with either NSR or NSF to achieve
      optimal redundancy.

   o  NSR - Non-Stop Routing - hitless failover of route processor.  It
      maintains an active copy of route information base (RIB) as well
      as state for protocol exchange so that the protocol adjacency is
      not reset.

   o  NSF - Non-Stop Forwarding for layer 2 traffic, including layer 2
      protocols such as spanning tree state

   o  ISSU - In Service Software Upgrade - Sub-second traffic loss in
      many modern routing platforms.  The demand for this feature
      continues to grow from the field.  Some study shows that the
      downtime due to software upgrade is greater than that caused by
      unplanned outages.






Wu                      Expires November 19, 2018               [Page 5]


Internet-Draft                    NSLAM                         May 2018


2.2.  Topology

   Placement of network devices and corresponding links plays an
   important role for optimal traffic forwarding.  There are two types
   of topologies:

   o  Physical Topology - Actual physical connectivity via fiber, coax,
      cat5 or even wireless.  That could be a ring, bus, star or matrix
      topology.  Even though all can be modeled using point-to-point
      connections.

   o  Logical Topology - With aggregated ethernet, extended dot1q
      tunneling, or VxLAN, a logical or virtual topology can be easily
      created spanning across geography boundaries.  Recent development
      of multi-chassis, virtual-chassis, node-slicing technologies, and
      multiple logical units within a single physical node have enabled
      logical topology deployment more flexible and agile.

   With various topology, the following functionalities need to be taken
   into consideration for feature design and validation.

   o  Active-Standby - 1:1 or 1:n support.  The liveness detection is
      essential to trigger failover.

   o  M-Home - Multi-homing support.  A customer edge (CE) device can be
      homed to 2 or more Provider Edge (PE) devices at the same time.
      This is a common redundancy design in layer 2 service offering

   o  L/B - Load Balancing - When multiple diverse paths exist for a
      given destination, it is important to achieve load balancing based
      on multiple criteria, such as per packet, or per prefix.
      Sometimes, cascading effect can make issues more complex and
      harder to resolve

   The topology, regardless of physical or virtual, can be better
   depicted using a collection of nodes and point-to-point links.  Some
   broadcast network, or ring topology, can also be abstracted using
   same collection of point-to-point links.  For example, in a wireless
   LAN network, each client is a node with wireless LAN NIC as its
   physical interface.  The access point is the node, at which all WLAN
   cients terminate with airwaves.  The Service Set IDentifier (SSID) on
   this access point can be considered as part of broadcast domain with
   many pseudo-ports taking airwave terminations from clients.

   The default link id can use srcnode-dstnode-linkseq to uniquely
   identify a link in this topology.  If this is a link connecting two
   ports on the same node, it can use link-id of srcnode-srcnode-




Wu                      Expires November 19, 2018               [Page 6]


Internet-Draft                    NSLAM                         May 2018


   linkseq-portseq.  Additional attributes of the node can be added with
   proper placement for auto topology diagram.

                        Network Topology Definition

   node-id-1 {
       maker: maker_name,
       model: model_name,
       controller: controller-type,
       mgmt_ip: mgmt_ip_address,
       links: {
           link-id-1 {
               name: link_name,
               connector: 'sfpp',
               attr: ['10G', 'Ethernet'],
               node_dst: destination node-id,
               link_seq: sequence number for links between the node pair
               ...
           }
       }
       ...
   }
   node-id-2 {
       ...
   }

                                 Figure 2

2.3.  Infrastructure

   Network infrastructure here refers to a list of protocols and
   policies for a data center network, an enterprise network, or a core
   backbone in a service provider network.

   o  Bridging - Spanning Tree Protocol (STP) and its various flavors,
      802.1q tunneling, Q-in-Q, VRRP and etc

   o  IGP - Interior Gateway Protocol - some common choices are OSPF,
      IS-IS, RIP, RIPng.  For multicast, choices are PIM and its various
      flavors including MSDP, Bootstrap, DVMRP

   o  Transport - Tunnel technologies including

      *  MPLS - Multi-Protocol Label Switching - most commonly used in
         service provider network

         +  LDP - Label distribution protocol - including mLDP and LDP
            Tunneling through RSVP LSPs



Wu                      Expires November 19, 2018               [Page 7]


Internet-Draft                    NSLAM                         May 2018


         +  RSVP - Resource Reservation Protocol - including P2MP and
            its various features like Fast ReRoute - FRR.

      *  IPSec - IPSec Tunnel with AH or ESP

      *  GRE - Generic Routing Encapsulation (GRE) tunnels provides a
         flexible direct adjacency between two remote routers

      *  VxLAN - In data center interconnect (DCI) solutions, VxLAN
         encapsulation provides data plane for layer 2 frames

   o  BGP - Define families and their sub-SAFI deployed, as well as
      route reflector topology.

2.4.  Services

   Previous sections mostly outline an operator's implementation of the
   network, while customers may not necessarily care about these.  This
   section defines service profiles from customer's view.

   o  Layer 2 Services

      *  Layer 2 VPN - RFC 6624

      *  Martini Layer 2 Circuit - RFC 4906

      *  Virtual Private LAN Services - RFC 4761

      *  Ethernet VPN - RFC 7432

   o  Layer 3 Services

      *  Type 5 Route for EVPN - draft-ietf-bess-evpn-prefix-
         advertisement-05

      *  Layer 3 VPN - RFC 4364

      *  Labled Unicast BGP - RFC 3107

      *  Draft Rosen MVPN - RFC 6037

      *  NG MVPN - RFC 6513

      *  6PE - RFC 4798

   In next section, an abstract model is proposed to identify key
   metrics for both layer 2 and layer 3 model




Wu                      Expires November 19, 2018               [Page 8]


Internet-Draft                    NSLAM                         May 2018


3.  Service Models

   A service model is a high level abstraction of network deployment
   from bottom up.  It defines a set of common key characteristics of
   customer traffic profile in both control and forwarding planes.  The
   network itself should be considered as a blackbox and deliver the
   services regardless of types of network equipment vendor or network
   technologies.

   The abstraction removes some details like specific IP address
   assignment, and favors address range and its distribution.  The goal
   is to describe aggregated network behavior instead of granular
   network element configuration.  It is up to implementation to map
   aggregated metrics to actual configuration for the network devices,
   protocol emulator and traffic genrator.

   A single network may be comprised of multiple instances of service
   models defined below.

3.1.  Layer 2 Ethernet Service Model

   The metrics outlined below are for layer 2 network services typically
   within a data center, data center interconnect, metro ethernet, or
   layer 2 domain over WAN or even inter-carrier.

   o  service-type: identityref, ELAN, ELINE, ETREE
   o  sites-per-instance: uint32, an average number of sites a layer 2
      instance may span across
   o  global-mac-count: uint32, Global MAC from all attachment circuits,
      local and remote.  This is probably the most important metric that
      determines the capacity requirements in layer 2 for both control
      and forwarding planes
   o  interface-mac-max: uint32, maximum number of locally learned MAC
      addresses per logical interface, aka attachment circuit
   o  single-home-segments: uint32, number of single homed ethernet
      segments per service instance
   o  multi-home-segments: uint32, number of multi homed ethernet
      segments per layer 2 service instance
   o  service-instance-count: uint32, total number of layer 2 service
      instances.  Typically, one customer is
   o  traffic-type: list, {known-unicast: %, multicast, %, broadcast: %,
      unknown-unicast: %}
   o  traffic-frame-size: list, predefined mixture of traffic frame size
      distribution
   o  traffic-load: speed of traffic being sent towards the network.
      This can be defined as frame per second (fps), or actual speed in
      bps.  This is particular important whenever some component along




Wu                      Expires November 19, 2018               [Page 9]


Internet-Draft                    NSLAM                         May 2018


      forwarding path is implemented in software, the throughput might
      be affected significantly at high speed
   o  traffic-flow: A distribution of flows.  This may affect efficient
      use of load-balancing techniques and resource consumption.  More
      details discussed in later section of this document.
   o  layer3-gateway-count: uint32, number of layer 2 service instances
      that also provide layer 3 gateway service
   o  arpnp-table-size: uint32.  This is only relevant with presence of
      layer 3 gateway

   Integrated routing and bridging (IRB) and EVPN Type 5 route have
   blurred boundaries between layer 2 and layer 3 services.

3.2.  Layer 3 Service Model

   This section outlines traffic type, layer 3 protocol families, layer
   3 prefixes distribution, layer 3 traffic flow and packet size
   distributions.

   o  proto-family: protocol family are defined with three sub-
      attributes.  The list may grow as the complexity

      *  proto - list: inet, inet6, iso
      *  type - list: unicast, mcast, segment, labeled
      *  vpn - list, true, false
   o  prefix-count, uint32, total unique prefixes
   o  prefix-distrib, list of prefix length size and percentage.  This
      could be a distribution pattern, such as uniform, random.  Or
      simply top representation of prefix lengths
   o  bgp-path-count, uint32, total BGP paths
   o  bgp-path-distrib, top representation of number of paths per prefix
   o  traffic-frame-size, similar to traffic-frame-size in layer 2
      model.  The focus is on the MTU size on each protocol interfaces
      and the impact of fragmentation
   o  traffic-flow, similar to traffic-flow in layer 2 model, it focuses
      on a set of labels, source and destination addresses as well as
      ports
   o  traffic-load, similar to traffic-load in layer 2 model
   o  ifl-count, uint32,
   o  vpn-count, uint32,

3.3.  Infrastructure Service Model

   o  bgp-peer-ext-count, uint32, number of eBGP peers
   o  bgp-peer-int-count, uint32, number of iBGP peers
   o  bgp-path-mtu, list, true or false.  Larger path mtu helps
      convergence




Wu                      Expires November 19, 2018              [Page 10]


Internet-Draft                    NSLAM                         May 2018


   o  bgp-hold-time-distrib, list of top hold-time values and their
      respective percentage out of all peers.
   o  bgp-as-path-distrib, list of top as-path lengths and their
      respective percentage of all BGP paths
   o  bgp-community-distrib, list of top community size and their
      respective percentage out of all BGP paths
   o  mpls-sig, list, MPLS signaling protocol, rsvp or ldp
   o  rsvp-lsp-count-ingress, uint32, total ingress lsp count
   o  rsvp-lsp-count-transit, uint32, total transit lsp count
   o  rsvp-lsp-count-egress, uint32, total egress lsp count
   o  ldp-fec-count, uint32, total forwarding equivalence class
   o  rsvp-lsp-protection, list, link-node, link, frr
   o  ospf-interface-type, list, point-to-point, broadcast, non-
      broadcast multi-access
   o  ospf-lsa-distrib, list.  OSPF Link Statement Advertisement
      distribution is comprised of those for core router in backbone
      area, and internal router in non-Backbone areas.  A common
      modeling can include number of LSAs per OSPF LSA type
   o  ospf-route-count, list, total OSPF routes in both backbone and
      non-backbone areas
   o  isis-lsp-distrib, list, similar to ospf-lsa-distrib
   o  isis-route-count, list, total IS-IS routes in both level-1 and
      level-2 areas

   TODO: bridging, OAM, EOAM, BFD and etc

3.4.  Node Level Features

   TODO: node level feature set

3.5.  Common Service Specification

   For most network services, regardless of layer 2 or layer 3, protocol
   families, the following needs to be considered when measuring network
   capacity and baseline.

   o  rib-learning-time, uint32 in seconds.  This indicates show quickly
      the route processor learns routing objects either locally and
      remotely
   o  fib-learning-time.  In large routing system, forwarding engine
      residing on separate hardware from controller, takes additional
      time to install all forwarding entries learned by controller.
   o  convergence-time, this is could be as a result of many events,
      such as uplink failure, ae member link failure, fast reroute,
      local repair, upstream node failure and etc
   o  multihome-failover-time, this refers to traffic convergence in a
      topology where a customer edge (CE) device is connected to two or
      more provider edge (PE) devices.



Wu                      Expires November 19, 2018              [Page 11]


Internet-Draft                    NSLAM                         May 2018


   o  issu-dark-window-size.  Unlike NSR, the goal of ISSU is not zero
      packet loss.  Instead, there will be a few seconds, or in some
      cases, sub-second dark window where it sees both total packet loss
      for both transit and or host bound protocol traffic.
   o  cpu-util, total CPU utilization of the controllers in stead state
   o  cpu-util-peak, Peak CPU utilization on the controller in event of
      failure, and convergence
   o  mem-util, total memory utilization of the controllers in steady
      state
   o  mem-util-peak, total memory utilization on the controller in event
      of failure and convergence
   o  processes, list of top processes running on the controllers with
      their CPU and memory utilization.
   o  lc-cpu-util, top CPU utilization on the line cards
   o  lc-cpu-util-peak, maximum peak CPU utilization among all line
      cards in event of failure and convergence
   o  lc-mem-util, top memory utilization on the line cards
   o  lc-mem-util-peak, maximum peak memory utilization among all line
      cards in event of failure and convergence
   o  throughout, in both pps and bps.  This is measured with zero
      packet loss.  For virtualized environment, throughput is sometimes
      measured with a small loss tolerance given the nature of shared
      resource
   o  traffic performance, in both pps and bps.  It is measured the rate
      of traffic received by pumping oversubscribed traffic at ingress
   o  latency in us. this is more important within a local data center
      environment rather than DCI over wide area network.  Use of
      extensive firewall filter or access control lists may affect
      latency
   o  Out of Order Packet - This can happen in intra-node or over ECMP
      where different paths have large latency/delay variations.

   The list of metrics can be used for network monitoring during network
   resiliency test.  This is to understand how quickly a network service
   can restore during various events and failures

3.6.  Common Network Events

   A list of events is defined to characterize network resiliency.
   These attributes require that the provider networks have diverse
   paths and node redundancy built-in.  They directly affect service
   level agreement and network availability.

3.6.1.  Event Attributes

   Each network or system event may each be defined with the following
   aspects




Wu                      Expires November 19, 2018              [Page 12]


Internet-Draft                    NSLAM                         May 2018


   o  event-iteration, uint16, event to be repeated
   o  event-interval, unit16, seconds in between consecutive events
   o  event-dist, list, random, equal, or other type of event scheduling
   o  event-timeout, uint16, seconds when a single event is expected to
      complete
   o  event-convergence, uint16, seconds before the network can be
      recovered

3.6.2.  Hardware Related

   Some hardware failures can not easily replicated, or even simulated
   in a lab environment, like the memory errors.  A system or network
   should be equipped to monitor, detect and contain the impact to avoid
   global catastrohpic failure that may proagate beyond a single node or
   the regional network.

   o  hw-mod-yank: hardware module removal and insertion.
   o  hw-interface: Transceiver on/off or any other simulated link
      failures.
   o  hw-storage: storage failure, ether local or network attached.
   o  hw-power: unplanned power failure.
   o  hw-controller: Controller failure
   o  hw-memory: memory errors

3.6.3.  Software Component

   o  sw-daemon-watchdog-loss: Induced CPU hog that trigger watchdog
      failure
   o  sw-daemon-restart-graceful: Graceful software daemon restart.
   o  sw-daemon-restart-kill: The process is killed and the daemon was
      forced to restart
   o  sw-daemon-panic: Sometimes a panic can introduced to trigger a
      coredump of software daemon along with restart.
   o  sw-os-panic: network operating system may panic under various
      situations.  Many network products with a console access support
      OS panic with a special sequence keystroke.  Sometimes it may also
      generate a coredump for further debug
   o  sw-upgrade: In many provider networks, the most downtime actually
      come from scheduled maintenance, especially software or firmware
      upgrade to provide better feature set or as a result of security
      patch.  It is important to understand the downtime requirement for
      a routine software upgrade on a given network device or the
      devices in the network.  This often presents a challenge to the
      access network.







Wu                      Expires November 19, 2018              [Page 13]


Internet-Draft                    NSLAM                         May 2018


3.6.4.  Protocol Events

   o  protocol-keepalive-loss: Loss of keepalive, such as hellos for
      routing-protocols like OSPF and BGP
   o  oam-keepalive-loss: there are many OAM protocols, such as EOAM,
      MPLS OAM, LACP, one of their main purposes is to detect
      reachability.  This is different from routing protocols keepalive
   o  protocol-adjacency-reset: clear all protocol neighbors and any
      routes or link states learned from the neighbor
   o  protocol-db-purge: remove all database objects learned from a
      particular neighbor, or a group of neighbors, or all neigbors.
      The database maybe original set of state learned from neighbors,
      or the consolidated database.

3.6.5.  Redundancy Failover

   The network protocols and design have a lot of redundancy built-in.
   It is important to benchmark their effectiveness.

   o  ha-lag-links: measure packet loss in milliseconds when member
      link(s) of a link aggregation group is torn down.  In case of
      protected interface, traffic should failover seamlessly to the
      backup interface in event of primary link failure
   o  ha-controller: In a system with redundant controller, measure the
      network recovery time when the primary controller fails.  If the
      advanced non-stop routing/forwarding is enabled, the network
      should only experience zero or sub-second traffic loss.
   o  ha-multihome: in addition to device level redundancy, many
      protocols support network layer redundancy though multihoming such
      as EVPN.
   o  ha-mpls-frr: MPLS RSVP Fast ReRoute provides core network
      redundancy
   o  ha-uplink: the core network is typically designed to provide path
      diversity for edge devices, at either layer 2 and layer 3
      connectivity.  The resiliency of network is measured by how fast
      the system detects the failure and reroute the traffic

4.  Use of Network Service Layer Abstract Model

   The primary goal is to characterize and document a complex network
   using a simplified service model.  While eliminating many details
   such as address assignment, actual route or mac entries, it retains a
   set of key network information, including services, scale, and
   performance profiles.  This can be used to validate how well each
   underlying solution performs when delivering same set of services.

   The model can also be used to build a virtualized topology with both
   static and dynamic scale closely resemble to a real network.  This



Wu                      Expires November 19, 2018              [Page 14]


Internet-Draft                    NSLAM                         May 2018


   eases network design and benchmarking, and helps capacity planning by
   studying the impact with changes to a specific dimension.

5.  Acknowledgements

   The authors appreciate and acknowledge comments from Al Morton and
   others based on initial discussions.

6.  IANA Considerations

   This memo includes no request to IANA.

   All drafts are required to have an IANA considerations section (see
   Guidelines for Writing an IANA Considerations Section in RFCs
   [RFC5226] for a guide).  If the draft does not require IANA to do
   anything, the section contains an explicit statement that this is the
   case (as above).  If there are no requirements for IANA, the section
   will be removed during conversion into an RFC by the RFC Editor.

7.  Security Considerations

   All drafts are required to have a security considerations section.
   See RFC 3552 [RFC3552] for a guide.

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552,
              DOI 10.17487/RFC3552, July 2003,
              <https://www.rfc-editor.org/info/rfc3552>.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", RFC 5226,
              DOI 10.17487/RFC5226, May 2008,
              <https://www.rfc-editor.org/info/rfc5226>.

8.2.  Informative References

   [L2SM]     B. Wu et al, "A Yang Data Model for L2VPN Service
              Delivery", 2017, <https://www.ietf.org/id/
              draft-ietf-l2sm-l2vpn-service-model-02.txt>.



Wu                      Expires November 19, 2018              [Page 15]


Internet-Draft                    NSLAM                         May 2018


   [RFC8049]  Litkowski, S., Tomotaki, L., and K. Ogaki, "YANG Data
              Model for L3VPN Service Delivery", RFC 8049,
              DOI 10.17487/RFC8049, February 2017,
              <https://www.rfc-editor.org/info/rfc8049>.

Author's Address

   Sean Wu
   Juniper Networks
   2251 Corporate Park Dr.
   Suite #200
   Herndon, VA  20171
   US

   Phone: +1 571 203 1898
   Email: xwu@juniper.net



































Wu                      Expires November 19, 2018              [Page 16]