Re: [Actn] charter 1.4

Kenji Kumaki <ke-kumaki@kddi.com> Tue, 09 December 2014 04:34 UTC

Return-Path: <ke-kumaki@kddi.com>
X-Original-To: actn@ietfa.amsl.com
Delivered-To: actn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E21B51A0242 for <actn@ietfa.amsl.com>; Mon, 8 Dec 2014 20:34:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JPvVJvaG82Uv for <actn@ietfa.amsl.com>; Mon, 8 Dec 2014 20:34:14 -0800 (PST)
Received: from post-send.kddi.com (athena4.kddi.com [27.90.165.197]) by ietfa.amsl.com (Postfix) with ESMTP id 3D76B1A014C for <actn@ietf.org>; Mon, 8 Dec 2014 20:34:13 -0800 (PST)
Received: from LTMC2122.kddi.com (LTMC2122.kddi.com [10.206.0.63]) by post-send.kddi.com (KDDI Mail) with ESMTP id EF9D412007D; Tue, 9 Dec 2014 13:34:12 +0900 (JST)
Received: from LTMC2145.kddi.com ([10.206.0.236] [10.206.0.236]) by LTMC2122.kddi.com with ESMTP; Tue, 9 Dec 2014 13:34:12 +0900
Received: from LTMC2145.kddi.com (localhost [127.0.0.1]) by localhost.kddi.com (Postfix) with ESMTP id C8EC23A006D; Tue, 9 Dec 2014 13:34:12 +0900 (JST)
Received: from LTMC2152.kddi.com (post-incheck [10.206.0.239]) by LTMC2145.kddi.com (Postfix) with ESMTP id BE0383A005F; Tue, 9 Dec 2014 13:34:12 +0900 (JST)
Received: from LTMC2152.kddi.com (localhost.localdomain [127.0.0.1]) by LTMC2152.kddi.com with ESMTP id sB94YCCv011828; Tue, 9 Dec 2014 13:34:12 +0900
Received: from LTMC2152.kddi.com.mid_6682069 (localhost.localdomain [127.0.0.1]) by LTMC2152.kddi.com with ESMTP id sB94Xl2N011334; Tue, 9 Dec 2014 13:33:47 +0900
X-SA-MID: 6682069
Received: from APAC01-HK1-obe.outbound.protection.outlook.com (mail-hk1lp0122.outbound.protection.outlook.com [207.46.51.122]) by post-gate.kddi.com (KDDI Mail) with ESMTPS id 2AB9C80003; Tue, 9 Dec 2014 13:33:47 +0900 (JST)
Received: from KDDI1202PC0730 (27.90.165.203) by SINPR02MB284.apcprd02.prod.outlook.com (10.141.112.156) with Microsoft SMTP Server (TLS) id 15.1.26.15; Tue, 9 Dec 2014 04:33:45 +0000
From: Kenji Kumaki <ke-kumaki@kddi.com>
To: 'Leeyoung' <leeyoung@huawei.com>, actn@ietf.org
References: <7AEB3D6833318045B4AE71C2C87E8E1729C6825A@dfweml706-chm>
In-Reply-To: <7AEB3D6833318045B4AE71C2C87E8E1729C6825A@dfweml706-chm>
Date: Tue, 09 Dec 2014 13:33:41 +0900
Message-ID: <003f01d01369$518db680$f4a92380$@kddi.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQMOCkhy3smVYw0SwQn378uQBrZr3ZoKkyvw
Content-Language: ja
X-Originating-IP: [27.90.165.203]
X-ClientProxiedBy: HK2PR01CA0025.apcprd01.prod.exchangelabs.com (25.160.175.35) To SINPR02MB284.apcprd02.prod.outlook.com (10.141.112.156)
X-Microsoft-Antispam: UriScan:;
X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:;SRVR:SINPR02MB284;
X-Exchange-Antispam-Report-Test: UriScan:;
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(602002); SRVR:SINPR02MB284;
X-Forefront-PRVS: 0420213CCD
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6009001)(51704005)(189002)(199003)(377454003)(13464003)(164054003)(62966003)(75216001)(89996001)(99396003)(36756003)(77156002)(4396001)(106116001)(105586002)(46406003)(42186005)(86362001)(33646002)(46102003)(97736003)(92566001)(2656002)(76176999)(120916001)(87976001)(101416001)(21056001)(84116002)(68736005)(47776003)(50986999)(50226001)(46816001)(50466002)(20776003)(61296003)(23726002)(64706001)(31966008)(122386002)(19580405001)(40100003)(106356001)(107886001)(19580395003)(107046002)(97756001)(77096005)(66066001)(102836002)(15975445007)(104876003); DIR:OUT; SFP:1102; SCL:1; SRVR:SINPR02MB284; H:KDDI1202PC0730; FPR:; SPF:None; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:;SRVR:SINPR02MB284;
X-OriginatorOrg: kddi.com
X-TM-AS-MML: disable
Archived-At: http://mailarchive.ietf.org/arch/msg/actn/peAySrHxcPMEoS7Ojgic_2BBgE0
Subject: Re: [Actn] charter 1.4
X-BeenThere: actn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Abstraction and Control of Transport Networks \(ACTN\)" <actn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/actn>, <mailto:actn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/actn/>
List-Post: <mailto:actn@ietf.org>
List-Help: <mailto:actn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/actn>, <mailto:actn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 04:34:18 -0000

Hi Young,

Thank you for your update for the charter.
It seems good that the charter includes the context of our draft.

https://tools.ietf.org/html/draft-kumaki-actn-multitenant-vno-00

Thanks,
Kenji

> -----Original Message-----
> From: ACTN [mailto:actn-bounces@ietf.org] On Behalf Of Leeyoung
> Sent: Tuesday, December 09, 2014 8:19 AM
> To: actn@ietf.org
> Subject: [Actn] charter 1.4
> 
> Dear all,
> 
> 
> 
> Here's a charter revision (v.1.4) for your comment. Your comment will be appreciated. If there are any key missing items
> for the WG to work that you feel should be included in the charter or any other discussions on terminology and clarify,
> please share your views  to the list. We look forward to seeing your active participation.
> 
> 
> 
> Best regards,
> 
> Young
> 
> 
> 
> ---------------------------------------------------------------------------------------------
> 
> Last Updated: December 5, 2014
> 
> 
> 
> Draft Charter V1.4
> 
> 
> 
> Abstraction and Control of Transport Networks (ACTN)
> 
> 
> 
> Transport networks are defined as network infrastructure that provides
> 
> connectivity and bandwidth for customer services. They are characterized
> 
> by their ability to support server layer provisioning and traffic
> 
> engineering for client layer services, such that resource guarantees may
> 
> be provided to their customers. Transport networks here refer to a set
> 
> of different type of connection-oriented networks, which include
> 
> Connection-Oriented Circuit Switched (CO-CS) networks and Connection-
> 
> Oriented Packet Switched (CO-PS) networks. This implies that at least
> 
> the following transport networks are in scope: Layer 1 (L1) and Layer 0
> 
> (L0) optical networks (e.g., OTN, ODU, OCh/WSON), MPLS-TP, MPLS-TE, as
> 
> well as other emerging network technologies with connection-oriented
> 
> behavior.
> 
> 
> 
> Transport networks have a variety of mechanisms to:
> 
> 
> 
> - Facilitate separation of data plane and control plane,
> 
> 
> 
> - Allow for distributed signaling or centralized models (e.g., NMS-
> 
>   based or centralized signaling) for path setup and protection, and
> 
> 
> 
> - Provide traffic engineering mechanism via centralized path
> 
>   computation.
> 
> 
> 
> These represent key technologies for enabling flexible and dynamic
> 
> networking, and efficient control and recovery of resources. Although
> 
> these technologies provide significant benefits within a single domain
> 
> control boundary, they do not meet the growing need for transport
> 
> network virtualization in multi-domain transport networks. More and more
> 
> network operators are building and operating on multi-domain transport
> 
> networks. These domains (collections of links and nodes) may be each of
> 
> a different technology, administrative zones, or vendor-specific
> 
> islands. Establishment of end-to-end connections spanning multiple
> 
> domains is a perpetual problem for operators because of both operational
> 
> concerns (control plane and management plane) and interoperability
> 
> issues (control plane and data plane).  Due to these issues, new
> 
> services that require connections that traverse multiple domains need
> 
> significant planning and often manual operations to interface different
> 
> vendor equipment and technology.
> 
> 
> 
> The aim of Abstraction and Control of Transport Networks (ACTN) is to
> 
> facilitate a centralized virtual network operation: the creation of a
> 
> virtualized environment allowing operators to view and control multi-
> 
> subnet, multi-technology, multi-vendor domain networks. This will enable
> 
> rapid service deployment of new dynamic and elastic services, and will
> 
> improve overall network operations and scaling of existing services.
> 
> Discussion with operators has also highlighted a need for
> 
> virtual network coordination based on the abstraction of underlying
> 
> technology and vendor domains as well as virtual service coordination
> 
> based on service-related knowledge. Abstraction of transport networks
> 
> also allows operators to consolidate their network services into
> 
> multi-tenant virtual transport networks.
> 
> 
> 
> Virtual network coordination function in ACTN is built on a control
> 
> hierarchy where a multi-domain coordinator interacts with the control
> 
> mechanism for each domain (e.g., EMS/NMS, GMPLS/PCE control plane, SDN
> 
> controller) to represent abstraction of network resources and to provide
> 
> control functions for virtual networks. These control functions enable
> 
> various services/clients/applications to create and manage their own
> 
> virtual networks that share the common transport network resources.
> 
> 
> 
> Virtual service coordination function in ACTN incorporates
> 
> customer's service-related knowledge in virtual network operation in order to
> 
> seamlessly operate virtual networks while meeting customer's service
> 
> requirements.
> 
> 
> 
> The ACTN facilitates seamless vertical service coordination across
> 
> multi-tenant customers (primarily internal service organizations with
> 
> respect to a network operator), the control of virtual and physical
> 
> network domains, as well as a horizontal E2E service coordination
> 
> across multi-domain networks.
> 
> 
> 
> The ACTN working group works to develop a high-level architecture that
> 
> describes the basic building-blocks necessary to enable the multi-domain
> 
> virtual service coordination. It will identify key building components and
> 
> the corresponding interfaces among these components. The Key components can
> 
> be future building block or legacy components existing today. It will
> 
> clearly show the  interaction between the customer controller
> 
> and the virtual network controller, and the virtual network controller and
> 
> the physical network controllers with possibility for recursion.
> 
> 
> 
> The ACTN working group will develop the requirements for these interfaces
> 
> and extend existing protocols and data models if necessary with coordination
> 
> with other WGs  or to develop new protocols and data models uniquely identified
> 
> in scope of ACTN WG.
> 
> 
> 
> The ACTN WG will coordinate with the following working groups:
> 
> 
> 
> - With the TEAS WG regarding TE architecture and generic TE
> 
>    Information and Data Model. ACTN will extend these models
> 
>    for its use cases.
> 
> 
> 
> - With the CCAMP WG regarding abstraction of technology specific Data
> 
>   Models
> 
> 
> 
> - With the PCE WG on uses of a PCE in the ACTN architecture.
> 
> 
> 
> - With the IDR WG on the use of BGP-LS in ACTN.
> 
> 
> 
> In doing this work, the WG will cooperate with external SDOs as
> 
> necessary.
> 
> 
> 
> The working group will work on the following items:
> 
> 
> 
> - Develop an applicability document based on use cases. This work will
> 
>   support the architecture and serve as the repository of requirement
> 
>   sets that include: support of APIs/protocols and information models.
> 
> 
> 
> - Complete architecture that describes the basic building blocks to
> 
>   enable virtual network and service coordination.
> 
> 
> 
> - Evaluate gap of existing IETF and other protocols, encoding languages
> 
>   and data models to fulfill the requirements. Where the need for data
> 
>   models is identified, the working group will first examine data models
> 
>   already developed by other working groups.
> 
> 
> 
> - Work on data models that are uniquely identified in the scope of ACTN.
> 
>   It is envisioned to work on issues of security, privacy, and trust in
> 
>   mechanisms that provide abstraction across domain boundaries
> 
>  (and therefore across trust boundaries) and the abstraction of
> 
>   customer's service-specific models.
> 
> 
> 
> - Develop protocol extensions as deemed necessary to support unique
> 
>   requirements of controller interfaces.
> 
> 
> 
> Milestones
> 
> 
> 
> May 2015   Adopt the WG draft on the Applicability of ACTN.
> 
> Aug 2015   Adopt the WG draft on the ACTN Architecture.
> 
> Sep 2015   Adopt the WG draft on Gap Analysis and YANG models.
> 
> Nov 2015   Adopt the WG drafts on Protocol Extensions for basic models.
> 
> Feb 2016   Submit the Applicability of ACTN to IESG as an informational
> 
>            RFC.
> 
>                       Adopt the WG drafts on Protocol Extensions for advanced
> 
>            models.
> 
> Apr 2016   Submit the ACTN Architecture to IESG for review as an
> 
>            informational RFC.
> 
> May 2016   Submit the Gap Analysis and YANG model(s) document to IESG for
> 
>            review as Proposed Standards RFC.
> 
> Jul 2016   Submit the Protocol Extensions for basic models to IESG for
> 
>            review as Proposed Standards RFCs.
> 
> Sep 2016   Submit the Protocol Extensions for advanced models to IESG for
> 
>            Review as Proposed Standard RFCs.
> 
> Nov 2016   recharter or conclude the WG.