Chin Guok, ESnet. Network Service Interface Signaling and Path Finding

Similar documents
Open Cloud Computing Interface Platform

Example set of DFDL 1.0 properties

Multi-Server Based Namespace Data Management of Resource Namespace Service

Open Cloud Computing Interface Service Level Agreements

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol

XDI Requirements and Use Cases

Example set of DFDL 1.0 properties

OCCI Compute Resource Templates Profile

E. Lewis ARIN September 23, KEY RR Secure Entry Point Flag draft-ietf-dnsext-keyrr-key-signing-flag-09. Status of this Memo

Configuration Description, Deployment and Lifecycle Management Working Group (CDDLM-WG) Final Report

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)

Updates: 2535 November 2003 Category: Standards Track

Network Working Group Request for Comments: Category: Best Current Practice January 2004

Use and Interpretation of HTTP Version Numbers

draft-aoun-mgcp-nat-package-02.txt

SSTC Response to Security Analysis of the SAML Single Sign-on Browser/Artifact Profile

Steven Newhouse, Microsoft Mario Antonioletti, EPCC August 1, 2011

Request for Comments: 3578 Category: Standards Track dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Network Working Group. Category: Informational January Unused Dynamic Host Configuration Protocol (DHCP) Option Codes

Michel Drescher, FLE, Ltd. Standardised Namespaces for XML in GGF (draft 09) N/A

Request for Comments: 4633 Category: Experimental August 2006

Deploying Standards-based, Multi-domain, Bandwidth-on-Demand

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol

Expires: February 25, 2004 August 27, Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00.

J. Basney, NCSA Category: Experimental October 10, MyProxy Protocol

Network Working Group. Category: Standards Track September 2003

Network Working Group Request for Comments: 3634 Category: Standards Track Comcast Cable J. Bevilacqua N. Davoust YAS Corporation December 2003

SMOA Computing HPC Basic Profile adoption Experience Report

Category: Standards Track December 2003

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

Network Working Group Request for Comments: December IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6

Feb :33 draft-glenn-id-sensor-alert-mib-01.txt Page 1

Network Working Group. Category: Standards Track February SIEVE Filtering: Spamtest and VirusTest Extensions

Category: Informational M. Shand Cisco Systems May 2004

Open Cloud Computing Interface Text Rendering

Open Cloud Computing Interface - HTTP Protocol

Deployment Profile Template Version 1.0 for WS-Reliability 1.1

Position Paper: Facets for Content Components

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview

Request for Comments: 2711 Category: Standards Track BBN October 1999

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

Category: Standards Track September 2003

Request for Comments: 2493 Category: Standards Track January 1999

Network Working Group. Redback H. Smit. Procket Networks. October Domain-wide Prefix Distribution with Two-Level IS-IS

Network Working Group Request for Comments: 3397 Category: Standards Track Apple Computer, Inc. November 2002

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Network Working Group. Category: Informational SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007

E2E Service Verification Architecture

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice

Report for the GGF 15 Community Activity: Leveraging Site Infrastructure for Multi-Site Grids

Kerberos SAML Profiles

HPCP-WG, OGSA-BES-WG March 20, Smoa Computing HPC Basic Profile Adoption Experience Report

Request for Comments: 3861 Category: Standards Track August 2004

Network Working Group Request for Comments: August Address-Prefix-Based Outbound Route Filter for BGP-4

Internet-Draft Harvard U. Editor March Intellectual Property Rights in IETF Technology. <draft-ietf-ipr-technology-rights-02.

{Describe the status and stability of the specification here.}

NSI: The common interface towards network services

Network Working Group. Category: Standards Track September 2006

Abstract Code-Signing Profile of the OASIS Digital Signature Services

Signature Gateway Profile of the OASIS Digital Signature Service

TestCases for the SCA Assembly Model Version 1.1

Network Working Group Request for Comments: Juniper Networks D. Meyer Sprint September 2003

Expires in six months 24 October 2004 Obsoletes: RFC , , 3377, 3771

David Chadwick, University of Kent Linying Su, University of Kent 11 June 2008

Category: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP

Network Working Group Request for Comments: 2514 Category: Standards Track Cisco Systems K. Tesink Bellcore Editors February 1999

Metadata for SAML 1.0 Web Browser Profiles

Request for Comments: January 2007

Expires: October 9, 2005 April 7, 2005

C. Martin ipath Services February A Policy Control Mechanism in IS-IS Using Administrative Tags

Request for Comments: May 2007

Network Working Group. Category: Standards Track August Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Remote-ID Option

Category: Standards Track October 2006

SWOP Specifications for Web Offset Publications Edition 10.0 Errata

Using the AMQP Anonymous Terminus for Message Routing Version 1.0

Network Working Group. Juniper Networks January Maximum Transmission Unit Signalling Extensions for the Label Distribution Protocol

Network Working Group. Updates: 3463, 4468, 4954 June 2008 Category: Best Current Practice. A Registry for SMTP Enhanced Mail System Status Codes

OpenOffice Specification Sample

Network Working Group Request for Comments: Cisco Systems, Inc. June 2006

Network Working Group. Category: Informational June Intermediate System to Intermediate System (IS-IS) Extensions for Traffic Engineering (TE)

Heterogeneous Interconnection between SDN and Layer2 Networks based on NSI

OASIS - Artifact naming guidelines

Network Working Group. November 1999

Enhanced Client Profile (PAOS-LECP) Solution Proposal for SAML 2.0

Network Working Group. Category: Informational May OSPF Database Exchange Summary List Optimization

Request for Comments: 3277 Category: Informational April Intermediate System to Intermediate System (IS-IS) Transient Blackhole Avoidance

Ericsson D. Willis. Cisco Systems. April 2006

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

Network Services Interface. OGF NSI standards development progress:

Category: Standards Track LabN Consulting, LLC July 2008

SAML V2.0 Profile for Token Correlation

draft-zhang-nsis-interdomain-qosm-02.txt

Network Service Interface Topology Representation

Category: Best Current Practice February Early IANA Allocation of Standards Track Code Points

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice

Request for Comments: 3345 Category: Informational AOL Time Warner, Inc. D. Walton A. Retana Cisco Systems, Inc. August 2002

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000

Network Working Group Internet-Draft January 25, 2006 Expires: July 29, Feed Rank draft-snell-atompub-feed-index-05.txt. Status of this Memo

Open Command and Control (OpenC2) Language Specification. Version 0.0.2

Transcription:

GFD-I.234 NSI-WG nsi-wg@ogf.org John MacAuley, ESnet Chin Guok, ESnet Guy Roberts, GEANT August 8, 2017 Network Service Interface Signaling and Path Finding Status of This Document This document provides information to the Grid community on signaling and pathfinding in the NSI protocol. Grid Working Document Informational (GWD-I). This document obsoletes GFD.217. Copyright Notice Copyright Open Grid Forum (2012-2017). Some Rights Reserved. Distribution is unlimited. Abstract This document provides a discussion of the signaling and path finding models supported by the NSI protocol. Contents Abstract... 1 Contents... 1 1 Introduction... 1 2 Signaling and Path Finding Models... 2 2.1 Tree-Based Signaling and Path Finding Model... 2 2.1.1 Tree-Based Hop-by-Hop Routing... 4 2.1.2 Tree-Based Source Routing... 5 2.2 Chain-Based Signaling and Path Finding Model... 6 2.2.1 Chain-Based Hop-by-Hop Routing... 7 2.2.2 Chain-Based Source Routing... 8 3 Conclusion... 9 4 Security Considerations... 9 5 Contributors... 9 6 Glossary... 9 7 Intellectual Property Statement... 11 8 Disclaimer... 11 9 Full Copyright Notice... 11 10 References... 12 1 Introduction The NSI Service Framework defines a Transport Plane and a Service Plane. The connectivity services are built using the resources available in the Transport Plane. NSI messages are exchanged on the Service Plane. The NSI messages follow a workflow that has been designed to be independent of the Transport Plane connectivity. The NSI framework provides the flexibility to support NSI message workflows as simple as a chain or as complex as multi-level trees. The fundamentals of NSI that support this flexibility can be found in the OGF NSI Framework document [1]. To provide clarity on the various scenarios for signaling and path finding, the following sections outline specific workflows and their requirements. 1

2 Signaling and Path Finding Models The model for signaling and path finding has been driven by the following architectural requirements that were established early in the inception of the NSI working group. These requirements have been driven by the need to support a flexible Service Plane that is topologically decoupled from the Transport Plane. Recent developments in Software Defined Networking (SDN) have confirmed the importance of decoupling of the Service and Transport Planes. 1. The Network Service Agent (NSA) Service Plane topology does not need to be congruent with Transport Plane topology. 2. Not all NSAs peer with each other, i.e. it cannot be assumed that there is a full mesh of reachability between all NSAs. Pair-wise peering between NSAs dictate the Service Plane topology. NSA Service Plane inter-connectivity will be guided by security and administration considerations and NOT exclusively Transport Plane considerations. Therefore, a requester NSA may not have a direct Service Plane peering to the complete set of Provider Agents (PAs) involved in a reservation. 3. Users may request a reservation from an NSA (i.e. an Aggregator NSA (AG)) that is not directly managing resources in the Transport Plane. Based on item #2 above, this AG may not have direct Service Plane peering with all the NSAs involved in the reservation request. 4. Users may request reservations between endpoints that are not in their Network, or the Network of their NSA. This implies the user request may not originate from the NSA managing the source end of the Connection. These all imply that a reservation request in a tree workflow may pass through many AGs on its way to instantiating Connection segments on the children upas. If the AG at the top of the request tree is to perform its duties, then it will need to understand the Service Plane topology. This implies a knowledge of all relevant AGs within the Network, all the relevant upas and of course, the applicable Transport Plane topology. Now for the most important bit: this top-level AG can only get all this information through its direct peers. The following sections distinguish between the tree and chain workflows even though a chain workflow can be considered to be a degenerate case of a tree workflow. The reason for this is to highlight certain concessions that can be made when considering the chain workflow independently. This following sections also distinguish between source-based and hop-by-hop workflows. In the source-based case, the first AG takes responsibility for calculating the full path for the whole Connection. In the hop-by-hop case, each AG can choose to perform only sufficient path computation to determine where to forward the request. By supporting both modes, the NSI CS allows the AGs to decide how much or little path finding they chose to perform. The hop-by-hop mode allows a light-weight PCE to be implemented that only knows where to forward path request. Alternatively, an AG may choose to implement a PCE that is aware of the whole service domain. 2.1 Tree-Based Signaling and Path Finding Model To support the NSI tree-based workflow (see Figure 1), the following must be supported: 1. A Network Service request may be initiated at any AG in the service region, and this AG does not have to be associated with any Network resources involved in the creation of the service. 2. A Network Service request can be propagated to as many upas as there are sub-connection segments. The AG receiving the request does not need to fully resolve the path of the Connection, but can delegate the task further down the tree to other AGs. 2

Figure 1. Tree-based signaling flow In order to support the above two premises, the following requirements need to be met: 1. The Aggregator NSA needs a view of as much of the Network topology as is needed to perform advanced "intelligent" routing decisions. At a minimum, the Aggregator NSA needs to know about the relevant Networks, the Transport Plane peering ports (to derive SDP), the services offered, associated service domains (Switching Services), and any adaptations within the Networks. 2. An AG may hide Network details of child Networks if desired, and advertise a summarized NSI Topology as needed. The key with this model is that external NSAs need not know the details of these internal child NSAs. 3. An AG is restricted to communicating with only direct peer NSAs based on administrative policies, however, it needs access to all relevant NSA Description Documents and NSI Topology documents to perform tree based routing. In addition to peer communications, the NSA Description Documents and NSI Topology documents are needed to determine the NSA managing Networks and the Service Plane topology to determine routing paths of requests in the connected graph. The NSI Topology Documents from each Network are then used to build NSI Topology for the service region for routing of the Connection. The security, verification, and distribution of the NSA Description Documents and NSI Topology documents are outside the scope of this document and are addressed in separate NSI working group documents [3]. The specific requirement that an NSA would only directly peer with a subset of NSAs, and not be able to directly communicate with all NSAs is due to administrative limitations and scaling. Provisioning a full mesh of trust relationships between all NSAs is considered prohibitive, and anonymous retrieval of the NSI documents have negative security implications. This results in the need for Service Plane topology so that trust relationships between NSAs can be discovered, and NSI description information can be distributed to all NSAs within the service region. 3

2.1.1 Tree-Based Hop-by-Hop Routing In a tree-based hop-by-hop routing workflow, the (root) AG receiving the request from the ura may perform partial path finding and segment the initial request into smaller components that it can pass on to other NSAs to resolve. Figure 2 shows an example of such a workflow with the associated Path Computation Engines (PCEs): Figure 2. Example of a tree-based source routing workflow 1. The ura makes a reservation request to the root Aggregator AG 0 on behalf of the user to Connect STP A to STP F. 2. AG 0 receives the request (A,F), and after validation, performs path finding to determine a viable path for the requested end-points A and F. 3. PCE 0 uses NSI Topology over the whole service region to determine a viable Transport Plane path for the request, returning two Connection segments (A,B)(C,F). 4. AG 0 then sends the Connection request for segment (A,B) to AG 1 which represents the only signaling path to upa 1. 5. AG 1 receives the request (A,B), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation. 6. PCE 1 determines that both the source and destination STP are managed by upa 1 and returns the Connection segment (A,B). 7. AG 1 then makes a reservation request to the upa 1 for the local Connection segment (A,B). 8. AG 0 then sends the Connection request for segment (C,F) to AG 2 which represents the signaling path to upa 2 and upa 3. 9. AG 2 receives the request (C,F), and after validation, performs path finding to determine a viable path for the requested end-points C and F. 10. PCE 2 uses NSI Topology over its service region to determine a viable Transport Plane path for the request, returning two Connection segments (C,D)(E,F). 4

11. AG 2 then makes a reservation request to the upa 2 for the local Connection segment (C,D). 12. To complete the end-to-end Connection, AG 2 makes a reservation request to the upa 3 for the local Connection segment (E,F). NB: It should be noted that since Connection segments (A,B) and (C,F) are distinct, steps 4-7 and 8-12 can be done in parallel. This can be generalized to anywhere an AG has multiple children 2.1.2 Tree-Based Source Routing In a tree-based source routing workflow, it is typical for the (root) AG receiving the request from the ura to perform path finding and segmentation using NSI Topology for the whole service region and route the requests to the appropriate NSAs accordingly. Figure 3 shows an example of such a workflow with the associated Path Computation Engines (PCEs): Figure 3. Example of a tree-based source routing workflow 1. The ura makes a reservation request to the root Aggregator AG 0 on behalf of the user to Connect STP A to STP F. 2. AG 0 receives the request (A,F), and after validation, performs path finding to determine an end-to-end path through the various networks. 3. PCE 0 uses NSI Topology over the whole service region to determine an explicit Transport Plane path for the request, returning three Connection segments (A,B)(C,D)(E,F). 4. AG 0 then sends the Connection request for segment (A,B) to AG 1 which represents the only signaling path to upa 1. 5. AG 1 receives the request (A,B), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation. 6. PCE 1 determines that both the source and destination STP are managed by upa 1 and returns the Connection segment (A,B). 5

7. AG 1 then makes a reservation request to the upa 1 for the local Connection segment (A,B). 8. With upa 2 having only a trust relationship with AG 2, AG 0 sends the request to upa 2 for Connection segment (C,D) via AG 2. 9. AG 2 receives the request (C,D), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation. 10. PCE 2 determines that both the source and destination STP are managed by upa 2 and returns the Connection segment (C,D). 11. AG 2 then makes a reservation request to the upa 2 for the local Connection segment (C,D). 12. To complete the end-to-end Connection, AG 0 sends the request for Connection segment (E,F) to AG 2 as it is the only signaling path to upa 3. 13. AG 2 receives the request (E,F), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation. 14. PCE 2 determines that both the source and destination STP are managed by upa 3 and returns the Connection segment (E,F). 13. AG 2 then makes a reservation request to the upa 3 for the local Connection segment (E,F). 2.2 Chain-Based Signaling and Path Finding Model Chain signaling with the NSI CS protocol requires every NSA to be an AG capable of propagating a reservation request to the local upa component (associated with local Network resources) and at most one adjacent (child) NSA associated with the next Connection segment in the data path. In general, a Connection request issued by a ura should be to the AG associated with the head-end STP of the service, as the service request will only be signaled in one direction, from the NSA associated with source STP through to the NSA associated with the destination STP. If a ura issues a Connection request to an arbitrary AG, the AG must first route the request to the AG associated with the head-end STP of the service. It is important to note that if the request was initially issued to an intermediate AG (i.e. an AG in the middle of the chain), the intermediate AG will maintain two records of the reservation, the first to track the routing of the request message to the head-end AG, and the second to manage the request for resources and the forwarding of the message to the downstream AG in the chain. All NSAs in the chain request must contain a Transport Plane Connection segment associated with the reservation request. An NSA in the chain must have a peering relationship with all NSAs that it is connected to at the data plane. This implies that the Service Plane MUST be congruent with the Transport Plane. Figure 4. shows this basic chain signaling flow and NSA components involved in the deployment. Figure 4. Chain-based signaling flow 6

The NSI CS 2.0 architecture currently supports two path-finding models for chain-based deployments: Hop-by-hop routing, and source routing. These are discussed in the next two sections. 2.2.1 Chain-Based Hop-by-Hop Routing Hop-by-hop routing is a chain-based solution that makes a localized routing decision at each NSA along the service path while using the NSI Topology to guide next hop decisions. Figure 5 shows the following hop-by-hop routing workflow: Figure 5. Example of a chain signaling workflow using hop-by-hop routing 1. The ura make a reservation request to the head-end Aggregator AG 1 on behalf of the user to interconnect STP A to STP F. This request is made to the head-end Aggregator NSA associated with the source STP in Network 1. 2. AG 1 receives the request (A,F), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation, and therefore, the peer NSA that will be next in the chain. 3. The PCE 1 uses NSI Topology over the whole service region to determine a loose path for the request, returning the local Connection segment (A,B), and the remaining path segment in the form of two STPs: the ingress STP in the adjacent Network 2 and the original destination STP (C,F). 4. AG 1 makes a reservation request to the local upa 1 for the local Connection segment (A,B). 5. AG 1 then sends a new reservation request to the next NSA (Network 2) in the chain for the remaining Connection segment (C,F). 6. AG 2 receives the request (C,F), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation, and therefore, the peer NSA that will be next in the chain. 7. PCE 2 also uses the NSI Topology over the whole service region to determine a loose path for the request, returning the local Connection segment (C,D), and the remaining path segment in the form of two STPs: the ingress STP in adjacent Network 3 and the original destination STP (E,F). 8. AG 2 makes a reservation request to the local upa 2 for the local Connection segment (C,D). 7

9. AG 2 then sends a new reservation request to the next NSA (Network 3) in the chain for the remaining Connection segment (E,F). 10. AG 3 receives the request (E,F), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation. 11. PCE 3 determines that both the source and destination STP are within the local Network and returns the local Connection segment (E,F). The chain is complete and no further segments are returned. 12. AG 3 makes a reservation request to the local upa 3 for the local Connection segment (E,F). 2.2.2 Chain-Based Source Routing Source routing is a chain-based solution where the head-end Aggregator NSA (or ura) uses The NSI topology for the whole service region to partially or completely specify a path the Connection will take through the network. This detailed path information is passed from NSA to NSA along signaling path using an Explicit Route Object (ERO) within the service request. Each NSA is bound by the ERO to follow the path segments specified during its own path finding activities. If an NSA along the path cannot meet the constraints specified in the ERO, the reservation request is rejected and an error is returned to the head-end Aggregator (or ura) that can attempt an alternative path. Figure 6 shows the following source routing workflow: Figure 6. Example of a chain signaling workflow using source routing 1. The ura make a reservation request to the head-end Aggregator AG 1 on behalf of the user to interconnect STP A to STP F. This request is made to the head-end Aggregator NSA associated with the source STP in Network 1. 2. AG 1 receives the request (A,F), and after validation, performs path finding to determine an end-to-end path through the network. 3. The PCE 1 uses NSI Topology over the whole service region to determine an explicit path for the request, returning the local Connection segment (A,B), and the remaining path segment in the form of a set of STP in other Network to include in the service (C,D,E,F). The egress STP B from Network 1 is connected to the ingress STP C in the adjacent Network 2, and therefore, the peer NSA that will be next in the chain. 4. AG 1 makes a reservation request to the local upa 1 for the local Connection segment (A,B). 8

5. AG 1 then sends a new reservation request to AG 2 in the chain for the remaining Connection segments (C,D,E,F). 6. AG 2 receives the request (C,D,E,F), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation, and therefore, the peer NSA that will be next in the chain. 7. PCE 2 uses NSI Topology over the whole service region to determine path for the request, returning the local Connection segment (C,D), and the remaining path segment (E,F). 8. AG 2 makes a reservation request to the local upa 2 for the local Connection segment (C,D). 9. AG 2 then sends a new reservation request to AG 3 in the chain for the remaining Connection segment (E,F). 10. AG 3 receives the request (E,F), and after validation, performs path finding to determine which local STP should be involved in the Connection reservation. 11. PCE 3 determines that both the source and destination STP are within the local domain, so returns the local Connection segment (E,F). The chain is complete and no further segments are returned. 12. AG 3 makes a reservation request to the local upa 3 for the local Connection segment (E,F). 3 Conclusion The above sections have outlined several rudimentary examples of how an end-to-end path can be segmented and corresponding requests routed to the appropriate NSAs. It does not however dictate the algorithm that the path finder uses to determine the optimal path and segments, which is beyond the scope of this document. It should be noted however that in all the schemes discussed above, it is necessary to apply the path computation against the NSI Topology over the whole service region topology and not simply partial fragments of topology. 4 Security Considerations Security considerations are dealt with in Open Grid forum GWD-R draft-trompert-gwdi-nsi-aa-v04, NSI Authentication and Authorization [3]. No additional security issues have been raised. 5 Contributors Chin Guok, ESnet Tomohiro Kudoh, AIST John MacAuley, SURFnet Guy Roberts, GEANT Henrik Thostrup Jensen, NORDUnet Hans Trompert, SURFnet 6 Glossary The following terms are defined in NSI: Aggregator (AG) The Aggregator is an NSA that has more than one child NSA, and has the responsibility of aggregating the responses from each child NSA. 9

Connection Connection Service (CS) Connection Service Protocol NSA Description Document ERO Network Network Services Network Service Agent (NSA) Network Services Framework (NSF) Network Service Interface (NSI) NSI Message NSI Topology Requester/Provider Agent (RA/PA) Service Demarcation Point (SDP) Service Termination Point (STP) Service Plane A Connection is an NSI construct that identifies the physical instance of a circuit in the Transport Plane. A Connection has a set of properties (for instance, Connection identifier, ingress and egress STPs, capacity, or start time). Connections can be either unidirectional or bidirectional. The NSI Connection Service is a service that allows an RA to request and manage a Connection from a PA. The Connection Service Protocol is the protocol that describes the messages and associated attributes that are exchanged between RA and PA. The NSA Description Document is a document that provides information about the services and features supported by an NSA. An Explicit Routing Object (ERO) is a parameter in a Connection request. It is an ordered list of STP constraints to be used by the inter-network pathfinder. A Network is an Inter-Network topology object that describes a set of STPs with a Transfer Function between STPs. Network Services are the full set of services offered by an NSA. Each NSA will support one or more Network Services. The Network Service Agent is a concrete piece of software that sends and receives NSI Messages. The NSA includes a set of capabilities that allow Network Services to be delivered. The Network Services framework describes an NSI message-based platform capable of supporting a suite of Network Services such as the Connection Service and the Topology Service. The NSI is the interface between RAs and PAs. The NSI defines a set of interactions or transactions between these NSAs to realize a Network Service. An NSI Message is a structured unit of data sent between an RA and a PA. The NSI Topology defines a standard ontology and a schema to describe network resources that are managed to create the NSI service. The NSI Topology as used by the NSI CS (and in future other NSI services) is described in: GWD-R-P: Network Service Interface Topology Representation [3]. An NSA acts in one of two possible roles relative to a particular instance of an NSI. When an NSA requests a service, it is called a Requester Agent (RA). When an NSA realizes a service, it is called a Provider Agent (PA). A particular NSA may act in different roles at different interfaces. Service Demarcation Points (SDPs) are NSI topology objects that identify a grouping of two Edge Points at the boundary between two Networks. Service Termination Points (STPs) are NSI topology objects that identify the Edge Points of a Network in the intra-network topology. The Service Plane is a plane in which services are requested and 10

Topology Distribution Description ServiceDocument Transport Plane Ultimate PA (upa) Ultimate RA (ura) managed; these services include the Network Service. The Service Plane contains a set of Network Service Agents communicating using Network Service Interfaces. The NSI Topology distribution Service description document contains a description of the Network topology. This document is available to be distributed as a way of sharing topology information between trusted NSAs. is a service that allows the NSI topology to be exchanged between NSAs. The Transport Plane refers to the infrastructure that carries the physical instance of the Connection, e.g. the Ethernet switches that deliver the Connection. This is also commonly referred to elsewhere as the data plane. The ultimate PA is a Provider Agent that has an associated NRM. The Ultimate RA is a Requester Agent is the originator of a service request. 7 Intellectual Property Statement The OGF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the OGF Secretariat. The OGF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights, which may cover technology that may be required to practice this recommendation. Please address the information to the OGF Executive Director. 8 Disclaimer This document and the information contained herein is provided on an As Is basis and the OGF disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties of merchantability or fitness for a particular purpose. 9 Full Copyright Notice Copyright (C) Open Grid Forum (2012-2017). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included as references to the derived portions on all such copies and derivative works. The published OGF document from which such works are derived, however, may not be modified in any way, such as by removing the copyright notice or 11

references to the OGF or other organizations, except as needed for the purpose of developing new or updated OGF documents in conformance with the procedures defined in the OGF Document Process, or as required to translate it into languages other than English. OGF, with the approval of its board, may remove this restriction for inclusion of OGF document content for the purpose of producing standards in cooperation with other international standards bodies. The limited permissions granted above are perpetual and will not be revoked by the OGF or its successors or assignees. 10 References 1. OGF GFD-R-212, Network Service Interface Connection Service, v2.0 http://www.ogf.org/documents/gfd.212.pdf 2. Open Grid forum GFD-I-213, Network Services Framework v2.0, http://www.ogf.org/documents/gfd.213.pdf 3. Open Grid forum GWD-R draft-trompert-gwdi-nsi-aa-publi-comment-v7, NSI Authentication and Authorization, https://redmine.ogf.org/dmsf_files/13424?download= 12