[Search] [txt|pdfized|bibtex] [Tracker] [Email] [Nits]
Versions: 00                                                            
CCAMP Working Group                                         Xian Zhang
Internet-Draft                                                  Huawei
Intended status: Standards Track                               R. Jing
                                                         China Telecom
                                                               W. Jian
                                                          China Unicom
                                                       Jeong-dong Ryoo
                                                                  ETRI
                                                                 Y. Xu
                                                                 CAICT
                                                           Daniel King
                                                  Lancaster University


Expires: September 05, 2016                              March 07, 2016




     YANG Models for the Northbound Interface of a Transport Network
     Controller: Requirements, Functions, and a List of YANG Models

             draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt


Abstract

   A transport network is a server-layer network designed to provide
   connectivity services for a client-layer network to carry the client
   traffic opaquely across the server-layer network resources.  A
   transport network may be constructed from equipment utilizing any of
   a number of different transport technologies such as the evolving
   optical transport infrastructure (Synchronous Optical Networking
   (SONET) / Synchronous Digital Hierarchy (SDH) and Optical Transport
   Network (OTN)) or packet transport as epitomized by the MPLS
   Transport Profile (MPLS-TP).

   All transport networks have high benchmarks for reliability and
   operational simplicity.  This suggests a common, technology-
   independent management/control paradigm that can be extended to
   represent and configure specific technology attributes.

   This document describes the requirements facing transport networks
   in order to provide open interfaces for resource programmability and
   control/management automation. A list of existing and additional
   YANG models is provided to fulfill the functional requirements.




Zhang et al            Expires September 2016                 [Page 1]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with
   the provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on September 05, 2016.

   Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Table of Contents

   1. Introduction ................................................ 3
   2. Conventions used in this document............................ 4
   3. Terminology and Notations.................................... 4
   4. Functional Requirements...................................... 5
      4.1. Scenarios  ............................................. 5
      4.2. Function Requirement Summary ........................... 8
   5. Function Analysis ........................................... 9


Zhang et al            Expires September 2016                 [Page 2]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


      5.1. Toplogy Related Functions .............................. 9
         5.1.1   Obtaining Access Point Info ...................... 9
         5.1.2   Obtaining Topology ............................... 9
         5.1.3   Virtual Network Operations ...................... 10
      5.2. Tunnel Operations ..................................... 10
      5.3. Service Requests ...................................... 10
   6. Security Considerations..................................... 17
   7. Manageability Considerations................................ 17
   8. IANA Considerations ........................................ 18
   9. Acknowledgements ........................................... 18
   10. References ................................................ 18
      10.1.   Normative References............................... 18
      10.2.   Informative References............................. 18
   11. Contributors' Address...................................... 19
   Authors' Addresses ............................................. 19



1. Introduction

   A transport network is a server-layer network designed to provide
   connectivity services, or more advanced services like Virtual
   Private Networks (VPN) for a client-layer network to carry the
   client traffic opaquely across the server-layer network resources.
   It acts as a pipe provider for upper-layer networks, such as IP
   network and mobile networks.

   Transport networks, such as Synchronous Optical Networking (SONET) /
   Synchronous Digital Hierarchy (SDH), Optical Transport Network (OTN),
   Wavelength Division Multiplexing (WDM), and flexi-grid networks, are
   often built using equipment from a single vendor and are managed
   using private interfaces to dedicated Element Management Systems
   (EMS) / Network Management Systems (NMS).  All transport networks
   have high benchmarks for reliability and operational simplicity.
   This suggests a common, technology-independent management/control
   paradigm that is extended to represent and configure specific
   technology attributes.

   The need of network providers to manage multi-vendor and multi-
   domain transport networks (where each domain is an island of
   equipment from a single supplier) has been further stressed by the
   expansion in network size.  At the same time, applications such as
   data center interconnection require larger and more dynamic
   connectivity matrices.  Therefore, transport networks face new
   challenges going beyond automatic provisioning of tunnel setup
   enabled by GMPLS (Generalized Multi-Protocol Label Switching)
   protocols to achieve automatic service provisioning, as well as


Zhang et al            Expires September 2016                 [Page 3]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


   address opportunities enabled by partitioning the network through
   the process of resource slicing.  With lower operational expenditure
   (OPEX) and capital expenditure (CAPEX) as the usual objectives, open
   interfaces to transport networks are considered by network providers
   as a way to meet these requirements.  The concept of Software
   Defined Networking (SDN) leverages these ideas.

   The YANG language [RFC6020] is currently the data modeling language
   of choice within the IETF and has been adopted by a number of
   industry-wide open management and control initiatives. YANG may be
   used to model both configuration and operational states; it is
   vendor-neutral and supports extensible APIs for control and
   management of elements.

   This document analyzes typical scenarios that need transport network
   control/management openness, and lists functions desired to enable
   deployment.  Moreover, a list of YANG models and their relationships
   have been identified that can help facilitate the deployment and
   operation of transport network open interfaces.  Note that some of
   the models discussed meet the requirements described, and are
   already being developed in the IETF.  Thus, this document provides a
   reference of existing models, and provides information of the
   missing ones which need further work.

2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 [RFC2119].

3. Terminology and Notations

   A simplified graphical representation of the data model is used in
   this document. The meaning of the symbols in the YANG data tree
   presented later in this draft is defined in [ietf-netmod-rfc6087bis].
   They are provided below for reference.

     o  Brackets "[" and "]" enclose list keys.

      o  Abbreviations before data node names: "rw" means configuration
   (read-write) and "ro" state data (read-only).

      o  Symbols after data node names: "?" means an optional node, "!"
   means a presence container, and "*" denotes a list and leaf-list.

      o  Parentheses enclose choice and case nodes, and case nodes are
   also marked with a colon (":").


Zhang et al            Expires September 2016                 [Page 4]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


      o  Ellipsis ("...") stands for contents of subtrees that are not
   shown.

4. Functional Requirements

4.1. Scenarios

   There are several scenarios where an open interface to access
   server-layer (transport) network resources would be useful. Here two
   typical scenarios are provided.

   The first one is depicted as below (Figure 1):


        /--\   +------+                  +------+     /--\
       | 1  ~~~|  A   +------------------|  B   |~~~~~  3 |
        \--/   +-----++                  +--+---+     \--/
                     |                      |
                     |                      |
                     |                      |
                    ++-----+            +---+--+
                    |   F  +------------+  C   |
                    ++-----+            +--+---+
                     |                     |
                     |                     |
                     |                     |
                     |                     |
                     |                     |
                 +---+-+               +---+-+    /---\
                 |  E  +---------------+  D  |~~~~  4  |
        /--\~~~~~+-----+               +-----+    \---/
       | 2  |
        \--/

                   +----+                      /--\
                   |    |  Transport NE       |    |   DC
                   +----+                      \--/

                   -----   Transport Link      ~~~   Transport-DC link

        (a) Data Centers interconnected via a transport network


                           +---------------------+
                           | Data Center Network |
                           |   Controller        |
                           +---------+-----------+


Zhang et al            Expires September 2016                 [Page 5]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


                                    |
                                    |
                                    |
                                     | Open Interface
                                    |
                                    |
                           +---------+-----------+
                           |  Transport Network  |
                           |    Controller       |
                           +---------------------+
         (b) The controller architecture for data center interconnection

    Figure 1: Scenario 1: Data centers interconnected via a transport
                network and the controller architecture

   For the data center operator, assuming the objective is to trigger
   the transport network to provide connectivity on demand, the
   following capabilities, at a minimum, would be required on the open
   itnerface between the two contollers illustrated in Figure 1:

   A: The ability to obtain information about a set of access points of
   the transport network facing the client side, including information
   such as access point identifiers, capabilities, etc.; for instance,
   transport-network-side end point identifiers related to the access
   link between DC1 and Transport NE A.

   B: The capability to send a request for a service using the
   aforementioned access point information, as well as the ability to
   retrieve a list of service requests and their statuses. In this
   request, it should at least be possible to include source node,
   destination node, and requested bandwidth to request the transport
   network to set up tunnels/paths so as to provide the requested
   connectivitiy for the service request.

   C: Note that in this case acquistion of the topology, be it physical
   or logical, of the transport network is not a compulsory requirement,
   but it may indeed be able to give data center providers more control
   over the transport resource usage. Furtheremore, the client
   controller can impose a virtual network of its own choice by
   requesting a slice of network resource with its choice of network
   parameters (such as network topology type, bandwidth etc.).

   The second scenario, more complicated than the first, is depicted as
   below (Figure 2). In this example, we focus on the management and
   control via open interfaces for multi-domain networks with
   homogeneous technologies (such as OTN), but it can be extended



Zhang et al            Expires September 2016                 [Page 6]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


   further to multi-domain networks with heterogeneous technologies
   with higher complexity.

        +-------------------------------------------------+
        |              Orchestrator/Coordinator           |
        +---------+--------------+-------------------+----+
                  |              |                   |
                  |              |                   |
     +------------+--+           |        +----------+----------+
     | Controller 1  |           |        |   Controller 2      |
     +---------+-----+           |        +-------+-------------+
               #        +----------------+        #
               #Qx      | Controller 3   |        #
               #        +----------------+        #TL1
               #                #                 #
           ----+-----           #             ----+-----
      ____/          \____      #        ____/          \____
     |                    |     #       |                    |
    |                      |    #      |                      |
    |    Network Domain    +***********+   Network Domain     |
    |          1          |     #      |          2           |
     |____            ___|      #       |____             ___|
          \           /         #PCEP        \           /
           -----------          #            *----------
             *       *          #           *       *
              *       *         #          *       *
               *       *        #         *       *
                *       *       #        *       *
                 *       *      #       *       *
                  *       *     #      *       *
                   *       *----+-----*       *
                    *  ____/          \____  *
                     *|                   |*
                     |                     |
                     |    Network Domain    |
                     |          3          |
                      |____            ___|
                           \           /
                            ----------

                        *****  inter-domain links
                        -----  Open Interfaces
                        #####  Controller-device interfaces

    Figure 2: Scenario 2: Multi-domain network control and management




Zhang et al            Expires September 2016                 [Page 7]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


   For the second scenario, the orchestrator/coordinator controls and
   manages three distinct network domains, each controlled/managed by
   their domain controller.  In order to orchestrate across
   domains/layers, the orchestrator needs its interface between domain
   controllers to be equipped with the following functions:

   A: Access to the topologies reported by each domain controller,
   including cross-domain links for the purpose of planning and
   requesting the paths of end-to-end tunnels. Multiple technologies
   within a domain (i.e., a multi-layer network), this might be
   reflected in the reported topology.  Depending on the abstraction
   level of the reported topology, the orchestrator has different
   control granularities.

   B: The ability to set up, delete and modify tunnels, be it within
   one domain or across multiple domains. Furthermore, it should have
   the abilty to view the tunnels created within each domain as well as
   thouse that cross domains as reported by each domain controller.


4.2. Function Requirement Summary

   For the open interface of a transport controller towards a
   northbound client, five functions are derived from the scenarios
   explained in the last section. They are summarized in the table
   below and we also match these functions with YANG models that are
   being developed in existing drafts.
   Analysis and descriptions of whether and how these functions are
   supported by the YANG models are provided in more detail in Section
   5.


  +-------------+-----------------------+-----------------------+
  | Functions   |     Description       | Related Existing      |
  |             |                       | YANG Models           |
  |-------------+-----------------------+-----------------------+
  | Obtaining   |Getting the necessary  |                       |
  | Access      |access points info     |      [TE-Topo]        |
  | Point Info  |                       |                       |
  +-------------+-----------------------+-----------------------+
  | Obtaining   |Getting the topology   |[TE-Topo], [WDM-Topo]  |
  | Topology    |info                   |[ODU-Topo]             |
  +-------------+-----------------------+-----------------------+
  | Tunnel      |Tunnel Setup, Deletion |                       |
  | Operations  |Modification and Info  |    [TE-Tunnel]        |
  |             |Retrieval              |                       |
  +-------------+-----------------------+-----------------------+


Zhang et al            Expires September 2016                 [Page 8]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


  | Service     |Requesting connectivity|                       |
  | Request     |service and retrieval  |   [this I.D.]         |
  |             |the list of service    |                       |
  |             |request                |                       |
  +-------------+-----------------------+-----------------------+
  | Virtual     |Requesting a virtual   |                       |
  | Network     |network and related    |[TE-Topo], [WDM topo]  |
  | Operations  |control operations,    |[ODU-Topo]             |
  |             |(e.g.,update, deletion)|                       |
  +-------------+-----------------------+-----------------------+

5. Function Analysis

5.1. Toplogy Related Functions

   As shown in Section 4, the functions of obtaining access point
   information, obtaining topology, and imposing virtual network
   operations can take advantages of the same set of topology YANG
   models.  These functions are briefly explained further in the
   following sub-sections.

5.1.1 Obtaining Access Point Info

   For cases such as scenario 1, a client may have no interest in
   directly controlling network resources, but might want an automated
   open control interface for initiating service requests.  In this
   case, a transport controller may provide the access point
   information. This information can then be used in service request
   sent over the open interface.

   The TE Topology YANG model provided in [TE-topo] can be used to
   provide a list of links.  If the remote node and termination point
   information is unknown, it is omitted from the reported information.
   If the client-side node and termination point information is
   obtained via configuration or a distributed discovery mechanism,
   then it can also be added into the reported information.
   Technology-specific details might also be needed to further express
   the constraints/attributes associated with the access points. Note
   that all of this information is usually read only.

5.1.2 Obtaining Topology

   Refer to [TE-Topo] for explanations and examples on how to obtain
   the topology. For technology specific topology information, other
   models such as those provided in [WDM-Topo] and [ODU-Topo] maybe
   used.



Zhang et al            Expires September 2016                 [Page 9]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


5.1.3 Virtual Network Operations

   There are two ways to request the creation of a virtual network.
   One is to define the topology explicitly using the model provided in
   the topology YANG drafts listed in Section 5.1.2..  The other way is
   to provide an estimated traffic information (a traffic matrix) and
   ask for a network controller of the provider network to provide a
   virtual network that can fulfill the demand.  This second approach
   does not have a supporting model and need further work.

5.2. Tunnel Operations

   Thecurrent [TE-Tunnel] provides a technology agnostic Traffic-
   Engieering (TE) device tunnel.  The model included in that draft is
   currently being developed to make it generic for both controller and
   device usage.  It is expected that the next version of this draft
   will provide such a generic TE tunnel model that can cater to the
   base requirementss for tunnel operations but it may need to be
   augmented to support controller-specific operations.

   Futhermore, technology-specific augmentations of the base generic TE
   tunnel models are needed.  For example, for Optical Channel (OCh)
   tunnels in WDM networks, information such as the lambda resource
   usage is needed.  Similarly, for ODU tunnels, information such as
   the usage of tributary slots is needed.

5.3. Service Requests

   The service model is an important model that enables automated
   operations between a client controller and a provider controller.
   The transport connectivity service model is different from the model
   of a tunnel since the transport connectivity service model hides
   technical details from a client.

   A transport connectivity service model is provided below:


   module: ietf-transport-service
      +--rw transport_service
      |  +--rw service* [service-id]
      |     +--rw service-id           uint32
      |     +--rw service-name?        string
      |     +--rw source
      |     |  +--rw node-id?   node-id
      |     |  +--rw tp-id?     tp-id
      |     +--rw destination
      |     |  +--rw node-id?   node-id


Zhang et al            Expires September 2016                [Page 10]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


      |     |  +--rw tp-id?     tp-id
      |     +--rw service-type?        service-types
      |     +--rw supporting-tunnel* [name]
      |     |  +--rw name    string
      |     +--rw bandwidth            decimal64
      |     +--rw SLA?                 SLAtypes
      |     +--rw intended-policies
      |        +--rw schedule
      |           +--rw schedules
      |              +--rw schedule* [schedule-id]
      |                 +--rw schedule-id          uint32
      |                 +--rw start?               yang:date-and-time
      |                 +--rw schedule-duration?   string
      |                 +--rw repeat-interval?     string
      +--rw service-state
         +--ro service* [service-id]
            +--ro service-id           uint32
            +--ro service-name?        string
            +--ro source
            |  +--ro node-id?   node-id
            |  +--ro tp-id?     tp-id
            +--ro destination
            |  +--ro node-id?   node-id
            |  +--ro tp-id?     tp-id
            +--ro service-type?        service-types
            +--ro supporting-tunnel* [name]
            |  +--ro name    string
            +--ro bandwidth            decimal64
            +--ro SLA?                 SLAtypes
            +--ro applied-policies
            |  +--ro schedule
            |     +--ro schedules
            |        +--ro schedule* [schedule-id]
            |           +--ro schedule-id          uint32
            |           +--ro start?               yang:date-and-time
            |           +--ro schedule-duration?   string
            |           +--ro repeat-interval?     string
            +--ro status?              state-types

   The corresponding YANG code is provided below:

   <CODE BEGINS> file " ietf-transport-service@2016-3-7.yang"

   module ietf-transport-service {
     yang-version 1;
     namespace "urn:ietf:params:xml:ns:yang:ietf_transport_service";
     prefix tser;


Zhang et al            Expires September 2016                [Page 11]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016



     import ietf-inet-types {
       prefix inet;
     }

     import ietf-schedule {
       prefix "sch";
     }

     organization "TBD";
     contact
       "WILL-BE-DEFINED-LATER";
     description
       "this module describes a service module that is essential
       API for a client to ask for a provider network for a path
       without the need to care about underlying technologies.
       Capability to specify constraints/policies are provided as
       optional features.";

     revision 2016-03-07 {
       description
         "Initial revision.";
         reference "to add the draft name";
     }


     typedef tp-id {  //client termination port
       type union {
         type uint32;
         type inet:ip-address; // IPv4 or IPv6 address
       }
       description
         "the client termination port of a transport device";
     }

     typedef node-id {  //client termination port
       type union {
         type uint32;
         type inet:ip-address; // IPv4 or IPv6 address
       }
       description
         "the node id of a transport device";
     }

     typedef service-types {
       type enumeration {
         enum "EPL" {


Zhang et al            Expires September 2016                [Page 12]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


           value 0;
           description
           "EPL service";
         }
         enum "EVPL" {
           value 1;
           description
           "EVPL";
         }
         enum "EPLAN" {
           value 2;
           description
           "EPLAN";
         }
         enum "EVPLAN" {
           value 3;
           description
           "EVPLAN";
         }
       }
       description "the type of a service request";
     }

     typedef state-types{
       type enumeration {
         enum "NORMAL" {
           value 0;
           description
           "service is normal/up and running";
         }
         enum "DOWN" {
           value 1;
           description
           "service is down.";
         }
         enum "DEGRADED"{
           value 2;
           description
           "service is in degraded state.";
         }
       }
       description "the state of a service.";
     }

     typedef SLAtypes{
       type enumeration{
         enum "1+1+R"{


Zhang et al            Expires September 2016                [Page 13]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


           value 0;
           description
           "A reroute will be provided after both the working and
           protection path fails.";
         }
         enum "1+1"{
           value 1;
           description
           "a protection path is provided.";
         }
         enum "Rerouting"{
           value 2;
           description
           "rerouting after the working path fails";
         }
         enum "unprotected"{
           value 3;
           description
           "no protection provided";
         }
       }
     }

     grouping service-basics {
       //later put all service under so that it can reused
       // in states.
       leaf service-id {
         type uint32;
         description "an unique identificaiton of a service.";
       }

       leaf service-name{
         type string;
         description "name for a service";
       }

       container source{
         leaf node-id {
           type node-id;
           description "node id";
         }
         leaf tp-id {
           type tp-id;
           description "TBD";
         }
         description "Service source information";
       }


Zhang et al            Expires September 2016                [Page 14]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016



       container destination{
         leaf node-id {
           type node-id;
           description "node id";
         }
         leaf tp-id {
           type tp-id;
           description "TBD";
         }
         description "Service destination information";
       }


       leaf service-type {
         type service-types;
         description "the type of a service request";
       }

       list supporting-tunnel{
         key "name";
         leaf name{
           type string;
           description "the name of a tunnel";
         }

         description "the list of tunnesl to support the list";
       }

       leaf bandwidth {
         type decimal64 {
           fraction-digits 2;
         }
         mandatory true;
         description "the bandwidth requested by a service.";
       }

       leaf SLA{
         type SLAtypes;
         description "the type of protection expected for this
         service";
       }
     }

     container transport_service {
       description
         "serves as a top-level container for a list of services";


Zhang et al            Expires September 2016                [Page 15]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016



       list service {
         key "service-id";
         description
           "an unique identifier of a service";

         uses service-basics;

         container intended-policies {
           container schedule {
             uses sch:schedules;
             description "to specify bandwidth scheduling
             information of this service.";
           }
           description "specify the policy associated with a
           service";
         }//end of policy
       }//end of service list
     }//service top container

     container service-state
     {
       list service {
         config false;
         key "service-id";
         description "operational state of a service";

         uses service-basics;

         container applied-policies{
           container schedule {
             uses sch:schedules;
             description "to specify bandwidth scheduling
             information of this service.";
           }
         }

         leaf status {
           type state-types;
           description "TBD";
         }
       }//end of a service state
     }//end of state
   }

   <CODE ENDS>



Zhang et al            Expires September 2016                [Page 16]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


6. Security Considerations

   Clearly modifying server-layer resources will have a significant
   impact on network infrastructure. More specifically they will
   provide the services and applications running across client-layers,
   which the server-layer is supporting. Therefore, security must be an
   important consideration when implementing the architecture, models
   and protocol mechanisms discussed in this document.

   Communicating service and network information (including access
   point identifiers, capabilities, topologies, etc.) across external
   interfaces represents a security risk. Thus, mechanisms to encrypt
   or preserve the domain topology confidentiality should be used.

   A key consideration are the external protocols (those shown as
   entering or leaving the orchestrator and controllers shown in Figure
   2 (Scenario 2: Multi-domain network control and management)) which
   must be appropriately secured.  This security should include
   authentication and authorization to control access to different
   functions that the orchestrator may perform to modify or create
   state in the server-layer, and the establishment and management of
   the orchestrator to controller relationship.

   The orchestrator will contain significant data about the network
   domains, the services carried by each domain, and customer type
   information. Therefore, access to information held in the
   orchestrator must be secured.  Since such access will be largely
   through external mechanisms, it may be pertinent to apply policy-
   based controls to restrict access and functions.

7. Manageability Considerations

   The core objectives of this document are to assist in the deployment
   and operation of transport services across server-layer network
   infrastructure. The model-driven management/control principles,
   which are vendor-neutral and supported by extensible APIs, should be
   utilized.

   The open models described in this document are based on YANG
   [RFC6020] and the RESTCONF [RESTCONF] messaging protocol, a REST-




Zhang et al            Expires September 2016                [Page 17]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


   like protocol running over HTTP for accessing data defined in YANG,
   may also be used.

8. IANA Considerations

   TBD.

9. Acknowledgements

   Thank Igor Bryskin for useful discussions on relevant YANG models.

10. References

10.1. Normative References

   [RFC2119] S. Bradner, "Key words for use in RFCs to indicate
             requirements levels", RFC 2119, March 1997.

   [RFC6020] Bjorklund, M., "YANG - A Data Modeling Language for the
             Network Configuration Protocol (NETCONF)", RFC 6020,
             October 2010.

   [ietf-netmod-rfc6087bis] Bierman, A., "Guidelines for Authors and
             Reviewers of YANG Data Model Documents", draft-ietf-
             netmod-rfc6087bis-01, work in progress, October 2014.

10.2. Informative References

   [TE-Topo] Liu X., Bryskin I., et al, "YANG Data Model for TE
             Topologies", draft-ietf-teas-yang-te-topo-02, October 2015.

   [WDM-Topo] Lee Y., et al, "A Yang Data Model for WSON Optical
             Networks", draft-lee-ccamp-wson-yang-02, work in progress,
             July 2015.

   [ODU-Topo] Zhang X., Rao B., Liu X., "A YANG Data Model for Layer 1
             Network Topology", draft-zhang-ccamp-l1-topo-yang-02,
             December 2015.

   [TE-Tunnel] Saad T., Gandhi R., Liu X., et al, "A YANG Data Model
             for Traffic Engineering Tunnels and Interfaces", draft-
             ietf-teas-yang-te-02, October, 2015.

   [RESTCONF] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
             Protocol", Work in Progress, draft-ietf-netconf-restconf-
             09, December 2015.


Zhang et al            Expires September 2016                [Page 18]


draft-zhang-ccamp-transport-ctrlnorth-yang-00.txt            March 2016


11. Contributors' Address

   Sergio Belotti
   Nokia
   Sergio.belotti@nokia.com

   Young Lee
   Futurewei Technologies
   leeyoung@huawei.com

   Aihua Guo
   Huawei Technologies Canada
   aihuaguo@huawei.com


Authors' Addresses
   Xian Zhang
   Huawei Technologies
   Email: zhang.xian@huawei.com

   Ruiquan Jing
   China Telecom
   jingrq@ctbri.com.cn


   Wei Jian
   China Unicom
   jianwei@chinaunicom.cn

   Jeong-dong Ryoo
   ETRI
   ryoo@etri.re.kr

   Yunbin Xu
   China Academy of Information and Communication Technology (CAICT)
   xuyunbin@ritt.cn

   Daniel King
   Lancaster University
   d.king@lancaster.ac.uk









Zhang et al            Expires September 2016                [Page 19]