<?xml version='1.0' encoding='utf-8'?>
<rfc version="3" category="info" consensus="true" docName="draft-ietf-teas-native-ip-scenarios-12" indexInclude="true" ipr="trust200902" number="8735" prepTime="2020-02-28T15:44:44" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-teas-native-ip-scenarios-12" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8735" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="CCDR Scenario and Simulation Results">Scenarios and Simulation Results of PCE in a Native IP Network</title>
    <seriesInfo name="RFC" value="8735" stream="IETF"/>
    <author fullname="Aijun Wang" initials="A" surname="Wang">
      <organization showOnFrontPage="true">China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <city>Beijing</city>
          <region>Beijing</region>
          <code>102209</code>
          <country>China</country>
        </postal>
        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </author>
    <author fullname="Xiaohong Huang" initials="X" surname="Huang">
      <organization abbrev="BUPT" showOnFrontPage="true">Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>No.10 Xitucheng Road, Haidian District</street>
          <street/>
          <city>Beijing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>huangxh@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Caixia Kou" initials="C" surname="Kou">
      <organization abbrev="BUPT" showOnFrontPage="true">Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>No.10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <phone/>
        <email>koucx@lsec.cc.ac.cn</email>
        <uri/>
      </address>
    </author>
    <author fullname="Zhenqiang Li" initials="Z" surname="Li">
      <organization showOnFrontPage="true">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Ave, Xicheng District</street>
          <city>Beijing</city>
          <region/>
          <code>100053</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>li_zhenqiang@hotmail.com</email>
        <uri/>
      </address>
    </author>
    <author fullname="Penghui Mi" initials="P" surname="Mi">
      <organization showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <postal>
          <street>Tower C of Bldg.2, Cloud Park, No.2013 of Xuegang Road</street>
          <city>Shenzhen</city>
          <region>Bantian,Longgang District</region>
          <code>518129</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>mipenghui@huawei.com</email>
        <uri/>
      </address>
    </author>
    <date month="02" year="2020"/>
    <area>RTG Area</area>
    <workgroup>TEAS Working Group</workgroup>
    <keyword>CCDR, Traffic Engineering</keyword>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">Requirements for providing the End-to-End (E2E) performance assurance
      are emerging within the service provider networks. While there are
      various technology solutions, there is no single solution that can
      fulfill these requirements for a native IP network. In particular, there
      is a need for a universal E2E solution that can cover both intra- and
      inter-domain scenarios.</t>
      <t pn="section-abstract-2">One feasible E2E traffic-engineering solution is the addition of
      central control in a native IP network. This document describes various
      complex scenarios and simulation results when applying the Path
      Computation Element (PCE) in a native IP network. This solution,
      referred to as Centralized Control Dynamic Routing (CCDR), integrates
      the advantage of using distributed protocols and the power of a
      centralized control technology, providing traffic engineering for native
      IP networks in a manner that applies equally to intra- and inter-domain
      scenarios.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by the
            Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8735" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ccdr-scenarios">CCDR Scenarios</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-qos-assurance-for-hybrid-cl">QoS Assurance for Hybrid Cloud-Based Application</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-link-utilization-maximizati">Link Utilization Maximization</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-traffic-engineering-for-mul">Traffic Engineering for Multi-domain</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-network-temporal-congestion">Network Temporal Congestion Elimination</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ccdr-simulation">CCDR Simulation</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-case-study-for-ccdr-algorit">Case Study for CCDR Algorithm</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-topology-simulation">Topology Simulation</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-traffic-matrix-simulation">Traffic Matrix Simulation</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ccdr-end-to-end-path-optimi">CCDR End-to-End Path Optimization</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-network-temporal-congestion-">Network Temporal Congestion Elimination</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ccdr-deployment-considerati">CCDR Deployment Consideration</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t keepWithNext="true" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t keepWithNext="true" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t keepWithNext="true" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t keepWithNext="true" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t keepWithNext="true" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">A service provider network is composed of thousands of routers that
      run distributed protocols to exchange reachability information. The path
      for the destination network is mainly calculated, and controlled, by the
      distributed protocols. These distributed protocols are robust enough to
      support most applications; however, they have some difficulties
      supporting the complexities needed for traffic-engineering applications,
      e.g., E2E performance assurance, or maximizing the link utilization
      within an IP network.</t>
      <t pn="section-1-2">Multiprotocol Label Switching (MPLS) using Traffic-Engineering (TE)
      technology (MPLS-TE) <xref format="default" target="RFC3209" sectionFormat="of" derivedContent="RFC3209"/> is one
      solution for TE networks, but it introduces an MPLS network along with
      related technology, which would be an overlay of the IP network. MPLS-TE
      technology is often used for Label Switched Path (LSP) protection and
      setting up complex paths within a domain. It has not been widely
      deployed for meeting E2E (especially in inter-domain) dynamic
      performance assurance requirements for an IP network.</t>
      <t pn="section-1-3">Segment Routing <xref format="default" target="RFC8402" sectionFormat="of" derivedContent="RFC8402"/> is another
      solution that integrates some advantages of using a distributed protocol
      and central control technology, but it requires the underlying network,
      especially the provider edge router, to do an in-depth label push and
      pop action while adding complexity when coexisting with the non-segment
      routing network. Additionally, it can only maneuver the E2E paths for
      MPLS and IPv6 traffic via different mechanisms.</t>
      <t pn="section-1-4">Deterministic Networking (DetNet) <xref format="default" target="RFC8578" sectionFormat="of" derivedContent="RFC8578"/> is another possible solution. It is primarily focused
      on providing bounded latency for a flow and introduces additional
      requirements on the domain edge router. The current DetNet scope is
      within one domain. The use cases defined in this document do not require
      the additional complexity of deterministic properties and so differ from
      the DetNet use cases.</t>
      <t pn="section-1-5">This document describes several scenarios for a native IP network
      where a Centralized Control Dynamic Routing (CCDR) framework can produce
      qualitative improvement in efficiency without requiring a change to the
      data-plane behavior on the router. Using knowledge of the Border Gateway
      Protocol (BGP) session-specific prefixes advertised by a router, the
      network topology and the near-real-time link-utilization information
      from network management systems, a central PCE is able to compute an
      optimal path and give the underlying routers the destination address to
      use to reach the BGP nexthop, such that the distributed routing protocol
      will use the computed path via traditional recursive lookup procedure.
      Some results from simulations of path optimization are also presented to
      concretely illustrate a variety of scenarios where CCDR shows
      significant improvement over traditional distributed routing
      protocols.</t>
      <t pn="section-1-6">This document is the base document of the following two documents:
      the universal solution document, which is suitable for intra-domain and
      inter-domain TE scenario, is described in <xref format="default" target="I-D.ietf-teas-pce-native-ip" sectionFormat="of" derivedContent="PCE-NATIVE-IP"/>; and the related protocol
      extension contents is described in <xref format="default" target="I-D.ietf-pce-pcep-extension-native-ip" sectionFormat="of" derivedContent="PCEP-NATIVE-IP-EXT"/>.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t pn="section-2-1">In this document, PCE is used as defined in <xref format="default" target="RFC5440" sectionFormat="of" derivedContent="RFC5440"/>. The following terms are used as described here:</t>
      <dl indent="8" spacing="normal" newline="false" pn="section-2-2">
        <dt pn="section-2-2.1">BRAS:</dt>
        <dd pn="section-2-2.2">Broadband Remote Access Server</dd>
        <dt pn="section-2-2.3">CD:</dt>
        <dd pn="section-2-2.4">Congestion Degree</dd>
        <dt pn="section-2-2.5">CR:</dt>
        <dd pn="section-2-2.6">Core Router</dd>
        <dt pn="section-2-2.7">CCDR:</dt>
        <dd pn="section-2-2.8">Centralized Control Dynamic Routing</dd>
        <dt pn="section-2-2.9">E2E:</dt>
        <dd pn="section-2-2.10">End to End</dd>
        <dt pn="section-2-2.11">IDC:</dt>
        <dd pn="section-2-2.12">Internet Data Center</dd>
        <dt pn="section-2-2.13">MAN:</dt>
        <dd pn="section-2-2.14">Metro Area Network</dd>
        <dt pn="section-2-2.15">QoS:</dt>
        <dd pn="section-2-2.16">Quality of Service</dd>
        <dt pn="section-2-2.17">SR:</dt>
        <dd pn="section-2-2.18">Service Router</dd>
        <dt pn="section-2-2.19">TE:</dt>
        <dd pn="section-2-2.20">Traffic Engineering</dd>
        <dt pn="section-2-2.21">UID:</dt>
        <dd pn="section-2-2.22">Utilization Increment Degree</dd>
        <dt pn="section-2-2.23">WAN:</dt>
        <dd pn="section-2-2.24">Wide Area Network</dd>
      </dl>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-ccdr-scenarios">CCDR Scenarios</name>
      <t pn="section-3-1">The following sections describe various deployment scenarios where
      applying the CCDR framework is intuitively expected to produce
      improvements based on the macro-scale properties of the framework and
      the scenario.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-qos-assurance-for-hybrid-cl">QoS Assurance for Hybrid Cloud-Based Application</name>
        <t pn="section-3.1-1">With the emergence of cloud computing technologies, enterprises are
        putting more and more services on a public-oriented cloud environment
        while keeping core business within their private cloud. The
        communication between the private and public cloud sites spans the
        WAN. The bandwidth requirements between them are variable, and the
        background traffic between these two sites varies over time.
        Enterprise applications require assurance of the E2E QoS performance
        on demand for variable bandwidth services.</t>
        <t pn="section-3.1-2">CCDR, which integrates the merits of distributed protocols and the
        power of centralized control, is suitable for this scenario. The
        possible solution framework is illustrated below:</t>
        <figure anchor="hybrid-cloud-comm" align="left" suppress-title="false" pn="figure-1">
          <name slugifiedName="name-hybrid-cloud-communication-">Hybrid Cloud Communication Scenario</name>
          <artwork align="left" alt="" name="" type="" pn="section-3.1-3.1">
                         +------------------------+
                         | Cloud-Based Application|
                         +------------------------+
                                     |
                               +-----------+
                               |    PCE    |
                               +-----------+
                                     |
                                     |
                            //--------------\\
                       /////                  \\\\\
  Private Cloud Site ||       Distributed          |Public Cloud Site
                      |       Control Network      |
                       \\\\\                  /////
                            \\--------------//
</artwork>
        </figure>
        <t pn="section-3.1-4">As illustrated in <xref target="hybrid-cloud-comm" format="default" sectionFormat="of" derivedContent="Figure 1"/>, the source
        and destination of the "Cloud-Based Application" traffic are located
        at "Private Cloud Site" and "Public Cloud Site", respectively.</t>
        <t pn="section-3.1-5">By default, the traffic path between the private and public cloud
        site is determined by the distributed control network. When an
        application requires E2E QoS assurance, it can send these requirements
        to the PCE and let the PCE compute one E2E path, which is based on the
        underlying network topology and real traffic information, in order to
        accommodate the application's QoS requirements. <xref format="default" target="Section-4.4" sectionFormat="of" derivedContent="Section 4.4"/> of this document describes the simulation
        results for this use case.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-link-utilization-maximizati">Link Utilization Maximization</name>
        <t pn="section-3.2-1">Network topology within a Metro Area Network (MAN) is generally in
        a star mode as illustrated in <xref target="star-mode-man" format="default" sectionFormat="of" derivedContent="Figure 2"/>, with
        different devices connected to different customer types. The traffic
        from these customers is often in a tidal pattern with the links
        between the Core Router (CR) / Broadband Remote Access Server (BRAS)
        and CR/Service Router (SR) experiencing congestion in different
        periods due to subscribers under BRAS often using the network at night
        and the leased line users under SR often using the network during the
        daytime. The link between BRAS/SR and CR must satisfy the maximum
        traffic volume between them, respectively, which causes these links to
        often be underutilized.</t>
        <figure anchor="star-mode-man" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-star-mode-network-topology-">Star-Mode Network Topology within MAN</name>
          <artwork align="left" alt="" name="" type="" pn="section-3.2-2.1">
                         +--------+
                         |   CR   |
                         +----|---+
                              |
                  |-------|--------|-------|
                  |       |        |       |
               +--|-+   +-|+    +--|-+   +-|+
               |BRAS|   |SR|    |BRAS|   |SR|
               +----+   +--+    +----+   +--+
</artwork>
        </figure>
        <t pn="section-3.2-3">If we consider connecting the BRAS/SR with a local link loop (which
        is usually lower cost) and control the overall MAN topology with the
        CCDR framework, we can exploit the tidal phenomena between the BRAS/CR
        and SR/CR links, maximizing the utilization of these central trunk
        links (which are usually higher cost than the local loops).</t>
        <figure anchor="link-max-ccdr" align="left" suppress-title="false" pn="figure-3">
          <name slugifiedName="name-link-utilization-maximizatio">Link Utilization Maximization via CCDR</name>
          <artwork align="left" alt="" name="" type="" pn="section-3.2-4.1">
                                  +-------+
                              -----  PCE  |
                              |   +-------+
                         +----|---+
                         |   CR   |
                         +----|---+
                              |
                  |-------|--------|-------|
                  |       |        |       |
               +--|-+   +-|+    +--|-+   +-|+
               |BRAS-----SR|    |BRAS-----SR|
               +----+   +--+    +----+   +--+
</artwork>
        </figure>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-traffic-engineering-for-mul">Traffic Engineering for Multi-domain</name>
        <t pn="section-3.3-1">Service provider networks are often comprised of different domains,
        interconnected with each other, forming a very complex topology as
        illustrated in <xref target="te-topology" format="default" sectionFormat="of" derivedContent="Figure 4"/>. Due to the traffic
        pattern to/from the MAN and IDC, the utilization of the links between
        them are often asymmetric. It is almost impossible to balance the
        utilization of these links via a distributed protocol, but this
        unbalance can be overcome utilizing the CCDR framework.</t>
        <figure anchor="te-topology" align="left" suppress-title="false" pn="figure-4">
          <name slugifiedName="name-traffic-engineering-for-com">Traffic Engineering for Complex Multi-domain Topology</name>
          <artwork align="left" alt="" name="" type="" pn="section-3.3-2.1">
               +---+                +---+
               |MAN|----------------|IDC|
               +---+       |        +---+
                 |     ----------     |
                 |-----|Backbone|-----|
                 |     ----|-----     |
                 |         |          |
               +---+       |        +---+
               |IDC|----------------|MAN|
               +---+                +---+
</artwork>
        </figure>
        <t pn="section-3.3-3">A solution for this scenario requires the gathering of NetFlow
        information, analysis of the source/destination autonomous system
        (AS), and determining what the main cause of the congested link(s) is.
        After this, the operator can use the external Border Gateway Protocol
        (eBGP) sessions to schedule the traffic among the different domains
        according to the solution described in the CCDR framework.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-network-temporal-congestion">Network Temporal Congestion Elimination</name>
        <t pn="section-3.4-1">In more general situations, there is often temporal congestion
        within the service provider's network, for example, due to daily or
        weekly periodic bursts or large events that are scheduled well in
        advance. Such congestion phenomena often appear regularly, and if the
        service provider has methods to mitigate it, it will certainly improve
        their network operation capabilities and increase satisfaction for
        customers. CCDR is also suitable for such scenarios, as the controller
        can schedule traffic out of the congested links, lowering their
        utilization during these times. <xref format="default" target="Section-4.5" sectionFormat="of" derivedContent="Section 4.5"/> describes the simulation results of this
        scenario.</t>
      </section>
    </section>
    <section anchor="Section-4" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-ccdr-simulation">CCDR Simulation</name>
      <t pn="section-4-1">The following sections describe a specific case study to illustrate
      the workings of the CCDR algorithm with concrete paths/metrics, as well
      as a procedure for generating topology and traffic matrices and the
      results from simulations applying CCDR for E2E QoS (assured path and
      congestion elimination) over the generated topologies and traffic
      matrices. In all cases examined, the CCDR algorithm produces
      qualitatively significant improvement over the reference (OSPF)
      algorithm, suggesting that CCDR will have broad applicability.</t>
      <t pn="section-4-2">The structure and scale of the simulated topology is similar to that
      of the real networks. Multiple different traffic matrices were generated
      to simulate different congestion conditions in the network. Only one of
      them is illustrated since the others produce similar results.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-case-study-for-ccdr-algorit">Case Study for CCDR Algorithm</name>
        <t pn="section-4.1-1">In this section, we consider a specific network topology for case
        study: examining the path selected by OSPF and CCDR and evaluating how
        and why the paths differ. <xref target="ccdr-algo" format="default" sectionFormat="of" derivedContent="Figure 5"/> depicts the
        topology of the network in this case. There are eight forwarding
        devices in the network. The original cost and utilization are marked
        on it as shown in the figure. For example, the original cost and
        utilization for the link (1, 2) are 3 and 50%, respectively. There are
        two flows: f1 and f2. Both of these two flows are from node 1 to node
        8. For simplicity, it is assumed that the bandwidth of the link in the
        network is 10 Mb/s. The flow rate of f1 is 1 Mb/s and the flow rate of
        f2 is 2 Mb/s. The threshold of the link in congestion is 90%.</t>
        <t pn="section-4.1-2">If the OSPF protocol, which adopts Dijkstra's algorithm (IS-IS is
        similar because it also uses Dijkstra's algorithm), is applied in the
        network, the two flows from node 1 to node 8 can only use the OSPF
        path (p1: 1-&gt;2-&gt;3-&gt;8). This is because Dijkstra's algorithm
        mainly considers the original cost of the link. Since CCDR considers
        cost and utilization simultaneously, the same path as OSPF will not be
        selected due to the severe congestion of the link (2, 3). In this
        case, f1 will select the path (p2: 1-&gt;5-&gt;6-&gt;7-&gt;8) since
        the new cost of this path is better than that of the OSPF path.
        Moreover, the path p2 is also better than the path (p3:
        1-&gt;2-&gt;4-&gt;7-&gt;8) for flow f1. However, f2 will not select
        the same path since it will cause new congestion in the link (6, 7).
        As a result, f2 will select the path (p3:
        1-&gt;2-&gt;4-&gt;7-&gt;8).</t>
        <figure anchor="ccdr-algo" align="left" suppress-title="false" pn="figure-5">
          <name slugifiedName="name-case-study-for-ccdrs-algori">Case Study for CCDR's Algorithm</name>
          <artwork align="left" alt="" name="" type="" pn="section-4.1-3.1"> 
      +----+      f1                +-------&gt; +-----+ ----&gt; +-----+
      |Edge|-----------+            |+--------|  3  |-------|  8  |
      |Node|---------+ |            ||+-----&gt; +-----+ ----&gt; +-----+
      +----+         | |       4/95%|||              6/50%     |
                     | |            |||                   5/60%|
                     | v            |||                        |
      +----+       +-----+ -----&gt; +-----+      +-----+      +-----+
      |Edge|-------|  1  |--------|  2  |------|  4  |------|  7  |
      |Node|-----&gt; +-----+ -----&gt; +-----+7/60% +-----+5/45% +-----+
      +----+  f2      |     3/50%                              |
                      |                                        |
                      |   3/60%   +-----+ 5/55%+-----+   3/75% |
                      +-----------|  5  |------|  6  |---------+
                                  +-----+      +-----+
                (a) Dijkstra's Algorithm (OSPF/IS-IS)
                 
      
      +----+      f1                          +-----+ ----&gt; +-----+
      |Edge|-----------+             +--------|  3  |-------|  8  |
      |Node|---------+ |             |        +-----+ ----&gt; +-----+
      +----+         | |       4/95% |               6/50%    ^|^
                     | |             |                   5/60%|||
                     | v             |                        |||
      +----+       +-----+ -----&gt; +-----+ ---&gt; +-----+ ---&gt; +-----+
      |Edge|-------|  1  |--------|  2  |------|  4  |------|  7  |
      |Node|-----&gt; +-----+        +-----+7/60% +-----+5/45% +-----+
      +----+  f2     ||     3/50%                              |^
                     ||                                        ||
                     ||   3/60%   +-----+5/55% +-----+   3/75% ||
                     |+-----------|  5  |------|  6  |---------+|
                     +----------&gt; +-----+ ---&gt; +-----+ ---------+
                   (b) CCDR Algorithm
</artwork>
        </figure>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-topology-simulation">Topology Simulation</name>
        <t pn="section-4.2-1">Moving on from the specific case study, we now consider a class of
        networks more representative of real deployments, with a fully linked
        core network that serves to connect edge nodes, which themselves
        connect to only a subset of the core. An example of such a topology is
        shown in <xref target="top-sim" format="default" sectionFormat="of" derivedContent="Figure 6"/> for the case of 4 core nodes and 5
        edge nodes. The CCDR simulations presented in this work use topologies
        involving 100 core nodes and 400 edge nodes. While the resulting graph
        does not fit on this page, this scale of network is similar to what is
        deployed in production environments.</t>
        <figure anchor="top-sim" align="left" suppress-title="false" pn="figure-6">
          <name slugifiedName="name-topology-of-simulation">Topology of Simulation</name>
          <artwork align="left" alt="" name="" type="" pn="section-4.2-2.1">
                                +----+ 
                               /|Edge|\
                              | +----+ |
                              |        |
                              |        |
                +----+    +----+     +----+
                |Edge|----|Core|-----|Core|---------+
                +----+    +----+     +----+         |
                        /  |    \   /   |           |
                  +----+   |     \ /    |           |
                  |Edge|   |      X     |           |
                  +----+   |     / \    |           |
                        \  |    /   \   |           |
                +----+    +----+     +----+         |
                |Edge|----|Core|-----|Core|         |
                +----+    +----+     +----+         |
                            |          |            |
                            |          +------\   +----+
                            |                  ---|Edge|
                            +-----------------/   +----+
</artwork>
        </figure>
        <t pn="section-4.2-3">For the simulations, the number of links connecting one edge node
        to the set of core nodes is randomly chosen between two and thirty,
        and the total number of links is more than 20,000. Each link has a
        congestion threshold, which can be arbitrarily set, for example, to
        90% of the nominal link capacity without affecting the simulation
        results.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-traffic-matrix-simulation">Traffic Matrix Simulation</name>
        <t pn="section-4.3-1">For each topology, a traffic matrix is generated based on the link
        capacity of the topology. It can result in many kinds of situations
        such as congestion, mild congestion, and non-congestion.</t>
        <t pn="section-4.3-2">In the CCDR simulation, the dimension of the traffic matrix is
        500*500 (100 core nodes plus 400 edge nodes). About 20% of links are
        overloaded when the Open Shortest Path First (OSPF) protocol is used
        in the network.</t>
      </section>
      <section anchor="Section-4.4" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-ccdr-end-to-end-path-optimi">CCDR End-to-End Path Optimization</name>
        <t pn="section-4.4-1">The CCDR E2E path optimization entails finding the best path, which
        is the lowest in metric value, as well as having utilization far below
        the congestion threshold for each link of the path. Based on the
        current state of the network, the PCE within CCDR framework combines
        the shortest path algorithm with a penalty theory of classical
        optimization and graph theory.</t>
        <t pn="section-4.4-2">Given a background traffic matrix, which is unscheduled, when a set
        of new flows comes into the network, the E2E path optimization finds
        the optimal paths for them. The selected paths bring the least
        congestion degree to the network.</t>
        <t pn="section-4.4-3">The link Utilization Increment Degree (UID), when the new flows are
        added into the network, is shown in <xref target="sim-congestion-elimination" format="default" sectionFormat="of" derivedContent="Figure 7"/>. The first graph in <xref target="sim-congestion-elimination" format="default" sectionFormat="of" derivedContent="Figure 7"/> is the UID with OSPF, and the
        second graph is the UID with CCDR E2E path optimization. The average
        UID of the first graph is more than 30%. After path optimization, the
        average UID is less than 5%. The results show that the CCDR E2E path
        optimization has an eye-catching decrease in UID relative to the path
        chosen based on OSPF.</t>
        <t pn="section-4.4-4">While real-world results invariably differ from simulations (for
        example, real-world topologies are likely to exhibit correlation in
        the attachment patterns for edge nodes to the core, which are not
        reflected in these results), the dramatic nature of the improvement in
        UID and the choice of simulated topology to resemble real-world
        conditions suggest that real-world deployments will also experience
        significant improvement in UID results.</t>
        <figure anchor="sim-congestion-elimination" align="left" suppress-title="false" pn="figure-7">
          <name slugifiedName="name-simulation-results-with-con">Simulation Results with Congestion Elimination</name>
          <artwork align="left" alt="" name="" type="" pn="section-4.4-5.1">
       +-----------------------------------------------------------+
       |                *                               *    *    *|
     60|                *                             * * *  *    *|
       |*      *       **     * *         *   *   *  ** * *  * * **|
       |*   * ** *   * **   *** **  *   * **  * * *  ** * *  *** **|
       |* * * ** *  ** **   *** *** **  **** ** ***  **** ** *** **|
     40|* * * ***** ** ***  *** *** **  **** ** *** ***** ****** **|
 UID(%)|* * ******* ** ***  *** ******* **** ** *** ***** *********|
       |*** ******* ** **** *********** *********** ***************|
       |******************* *********** *********** ***************|
     20|******************* ***************************************|
       |******************* ***************************************|
       |***********************************************************|
       |***********************************************************|
      0+-----------------------------------------------------------+
      0    100   200   300   400   500   600   700   800   900  1000
       +-----------------------------------------------------------+
       |                                                           |
     60|                                                           |
       |                                                           |
       |                                                           |
       |                                                           |
     40|                                                           |
 UID(%)|                                                           |
       |                                                           |
       |                                                           |
     20|                                                           |
       |                                                          *|
       |                                     *                    *|
       |        *         *  *    *       *  **                 * *|
      0+-----------------------------------------------------------+
      0    100   200   300   400   500   600   700   800   900  1000
                            Flow Number          
</artwork>
        </figure>
      </section>
      <section anchor="Section-4.5" numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-network-temporal-congestion-">Network Temporal Congestion Elimination</name>
        <t pn="section-4.5-1">During the simulations, different degrees of network congestion
        were considered. To examine the effect of CCDR on link congestion, we
        consider the Congestion Degree (CD) of a link, defined as the link
        utilization beyond its threshold.</t>
        <t pn="section-4.5-2">The CCDR congestion elimination performance is shown in <xref target="sim-congestion-elimination-2" format="default" sectionFormat="of" derivedContent="Figure 8"/>. The first graph is the CD
        distribution before the process of congestion elimination. The average
        CD of all congested links is about 20%. The second graph shown in
        <xref target="sim-congestion-elimination-2" format="default" sectionFormat="of" derivedContent="Figure 8"/> is the CD distribution
        after using the congestion elimination process. It shows that only
        twelve links among the total 20,000 exceed the threshold, and all the
        CD values are less than 3%. Thus, after scheduling the traffic away
        from the congested paths, the degree of network congestion is greatly
        eliminated and the network utilization is in balance.</t>
        <figure anchor="sim-congestion-elimination-2" align="left" suppress-title="false" pn="figure-8">
          <name slugifiedName="name-simulation-results-with-cong">Simulation Results with Congestion Elimination</name>
          <artwork align="left" alt="" name="" type="" pn="section-4.5-3.1">
	    Before congestion elimination
        +-----------------------------------------------------------+
        |                *                            ** *   ** ** *|
      20|                *                     *      **** * ** ** *|
        |*      *       **     * **       **  **** * ***** *********|
        |*   *  * *   * **** ****** *  ** *** **********************|
      15|* * * ** *  ** **** ********* *****************************|
        |* * ******  ******* ********* *****************************|
  CD(%) |* ********* ******* ***************************************|
      10|* ********* ***********************************************|
        |*********** ***********************************************|
        |***********************************************************|
       5|***********************************************************|
        |***********************************************************|
        |***********************************************************|
       0+-----------------------------------------------------------+
           0            0.5            1            1.5            2

                     After congestion elimination
       +-----------------------------------------------------------+
       |                                                           |
     20|                                                           |
       |                                                           |
       |                                                           |
     15|                                                           |
       |                                                           |
 CD(%) |                                                           |
     10|                                                           |
       |                                                           |
       |                                                           |
     5 |                                                           |
       |                                                           |
       |        *        **  * *  *  **   *  **                 *  |
     0 +-----------------------------------------------------------+
        0            0.5            1            1.5            2
                         Link Number(*10000)
</artwork>
        </figure>
        <t pn="section-4.5-4">It is clear that by using an active path-computation mechanism that
        is able to take into account observed link traffic/congestion, the
        occurrence of congestion events can be greatly reduced. Only when a
        preponderance of links in the network are near their congestion
        threshold will the central controller be unable to find a clear path
        as opposed to when a static metric-based procedure is used, which will
        produce congested paths once a single bottleneck approaches its
        capacity. More detailed information about the algorithm can be found
        in <xref format="default" target="PTCS" sectionFormat="of" derivedContent="PTCS"/>.</t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-ccdr-deployment-considerati">CCDR Deployment Consideration</name>
      <t pn="section-5-1">The above CCDR scenarios and simulation results demonstrate that a
      single general solution can be found that copes with multiple complex
      situations. The specific situations considered are not known to have any
      special properties, so it is expected that the benefits demonstrated
      will have general applicability. Accordingly, the integrated use of a
      centralized controller for the more complex optimal path computations in
      a native IP network should result in significant improvements without
      impacting the underlying network infrastructure.</t>
      <t pn="section-5-2">For intra-domain or inter-domain native IP TE scenarios, the
      deployment of a CCDR solution is similar with the centralized controller
      being able to compute paths along with no changes being required to the
      underlying network infrastructure. This universal deployment
      characteristic can facilitate a generic traffic-engineering solution
      where operators do not need to differentiate between intra-domain and
      inter-domain TE cases.</t>
      <t pn="section-5-3">To deploy the CCDR solution, the PCE should collect the underlying
      network topology dynamically, for example, via Border Gateway Protocol -
      Link State (BGP-LS) <xref format="default" target="RFC7752" sectionFormat="of" derivedContent="RFC7752"/>. It also
      needs to gather the network traffic information periodically from the
      network management platform. The simulation results show that the PCE
      can compute the E2E optimal path within seconds; thus, it can cope with
      a change to the underlying network in a matter of minutes. More agile
      requirements would need to increase the sample rate of the underlying
      network and decrease the detection and notification interval of the
      underlying network. The methods of gathering this information as well as
      decreasing its latency are out of the scope of this document.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-6-1">This document considers mainly the integration of distributed
      protocols and the central control capability of a PCE. While it can
      certainly simplify the management of a network in various
      traffic-engineering scenarios as described in this document, the
      centralized control also brings a new point that may be easily attacked.
      Solutions for CCDR scenarios need to consider protection of the PCE and
      communication with the underlying devices.</t>
      <t pn="section-6-2"><xref format="default" target="RFC5440" sectionFormat="of" derivedContent="RFC5440"/> and <xref format="default" target="RFC8253" sectionFormat="of" derivedContent="RFC8253"/> provide additional information.</t>
      <t pn="section-6-3">The control priority and interaction process should also be carefully
      designed for the combination of the distributed protocol and central
      control. Generally, the central control instructions should have higher
      priority than the forwarding actions determined by the distributed
      protocol. When communication between PCE and the underlying devices is
      disrupted, the distributed protocol should take control of the
      underlying network. <xref format="default" target="I-D.ietf-teas-pce-native-ip" sectionFormat="of" derivedContent="PCE-NATIVE-IP"/> provides more considerations
      corresponding to the solution.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-7-1">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-teas-pce-native-ip" to="PCE-NATIVE-IP"/>
    <displayreference target="I-D.ietf-pce-pcep-extension-native-ip" to="PCEP-NATIVE-IP-EXT"/>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC5440" target="https://www.rfc-editor.org/info/rfc5440" quoteTitle="true" derivedAnchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author initials="JP." surname="Vasseur" fullname="JP. Vasseur" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="JL." surname="Le Roux" fullname="JL. Le Roux" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="March"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs.  Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering.  PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC7752" target="https://www.rfc-editor.org/info/rfc7752" quoteTitle="true" derivedAnchor="RFC7752">
          <front>
            <title>North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP</title>
            <author initials="H." surname="Gredler" fullname="H. Gredler" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Medved" fullname="J. Medved">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Previdi" fullname="S. Previdi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Ray" fullname="S. Ray">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="March"/>
            <abstract>
              <t>In a number of environments, a component external to a network is called upon to perform computations based on the network topology and current state of the connections within the network, including Traffic Engineering (TE) information.  This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol.  This is achieved using a new BGP Network Layer Reachability Information (NLRI) encoding format.  The mechanism is applicable to physical and virtual IGP links.  The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7752"/>
          <seriesInfo name="DOI" value="10.17487/RFC7752"/>
        </reference>
        <reference anchor="RFC8253" target="https://www.rfc-editor.org/info/rfc8253" quoteTitle="true" derivedAnchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author initials="D." surname="Lopez" fullname="D. Lopez">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="O." surname="Gonzalez de Dios" fullname="O. Gonzalez de Dios">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Q." surname="Wu" fullname="Q. Wu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Dhody" fullname="D. Dhody">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="October"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP.  The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-teas-pce-native-ip" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-teas-pce-native-ip-05" derivedAnchor="PCE-NATIVE-IP">
          <front>
            <title>PCE in Native IP Network</title>
            <author initials="A" surname="Wang" fullname="Aijun Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Q" surname="Zhao" fullname="Quintin Zhao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B" surname="Khasanov" fullname="Boris Khasanov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H" surname="Chen" fullname="Huaimo Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="January" day="9" year="2020"/>
            <abstract>
              <t>This document defines the framework for traffic engineering within native IP network, using Dual/Multi-Border Gateway Protocol (BGP) sessions strategy and Path Computation Engine (PCE) -based central control architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-pce-native-ip-05"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-teas-pce-native-ip-05.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-pce-pcep-extension-native-ip" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-pce-pcep-extension-native-ip-05" derivedAnchor="PCEP-NATIVE-IP-EXT">
          <front>
            <title>PCEP Extension for Native IP Network</title>
            <author initials="A" surname="Wang" fullname="Aijun Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B" surname="Khasanov" fullname="Boris Khasanov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S" surname="Fang" fullname="Sheng Fang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C" surname="Zhu" fullname="Chun Zhu">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="February" day="17" year="2020"/>
            <abstract>
              <t>This document defines the Path Computation Element Communication Protocol (PCEP) extension for Central Control Dynamic Routing (CCDR) based application in Native IP network.  The scenario and framework of CCDR in native IP is described in [I-D.ietf-teas-native-ip-scenarios] and [I-D.ietf-teas-pce-native-ip].  This draft describes the key information that is transferred between Path Computation Element (PCE) and Path Computation Clients (PCC) to accomplish the End to End (E2E) traffic assurance in Native IP network under central control mode.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pce-pcep-extension-native-ip-05"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-pce-pcep-extension-native-ip-05.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="PTCS" target="https://ieeexplore.ieee.org/document/8657733" quoteTitle="true" derivedAnchor="PTCS">
          <front>
            <title>A Practical Traffic Control Scheme With Load Balancing Based on PCE Architecture</title>
            <seriesInfo name="DOI" value="10.1109/ACCESS.2019.2902610"/>
            <seriesInfo name="IEEE Access" value="18526773"/>
            <author fullname="Pei Zhang" initials="P." surname="Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Kun Xie" initials="K." surname="Xie">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Caixia Kou" initials="C." surname="Kou">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Xiaohong Huang" initials="X." surname="Huang">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Qiong Sun" initials="Q." surname="Sun">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="March" year="2019"/>
          </front>
        </reference>
        <reference anchor="RFC3209" target="https://www.rfc-editor.org/info/rfc3209" quoteTitle="true" derivedAnchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author initials="D." surname="Awduche" fullname="D. Awduche">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Gan" fullname="D. Gan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Li" fullname="T. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Srinivasan" fullname="V. Srinivasan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Swallow" fullname="G. Swallow">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2001" month="December"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching).  Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels.  A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC8402" target="https://www.rfc-editor.org/info/rfc8402" quoteTitle="true" derivedAnchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author initials="C." surname="Filsfils" fullname="C. Filsfils" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Previdi" fullname="S. Previdi" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Ginsberg" fullname="L. Ginsberg">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Decraene" fullname="B. Decraene">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Litkowski" fullname="S. Litkowski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Shakir" fullname="R. Shakir">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="July"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8578" target="https://www.rfc-editor.org/info/rfc8578" quoteTitle="true" derivedAnchor="RFC8578">
          <front>
            <title>Deterministic Networking Use Cases</title>
            <author initials="E." surname="Grossman" fullname="E. Grossman" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="May"/>
            <abstract>
              <t>This document presents use cases for diverse industries that have in common a need for "deterministic flows".  "Deterministic" in this context means that such flows provide guaranteed bandwidth, bounded latency, and other properties germane to the transport of time-sensitive data.  These use cases differ notably in their network topologies and specific desired behavior, providing as a group broad industry context for Deterministic Networking (DetNet).  For each use case, this document will identify the use case, identify representative solutions used today, and describe potential improvements that DetNet can enable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8578"/>
          <seriesInfo name="DOI" value="10.17487/RFC8578"/>
        </reference>
      </references>
    </references>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t pn="section-appendix.a-1">The authors would like to thank <contact fullname="Deborah Brungard"/>, <contact fullname="Adrian Farrel"/>, <contact fullname="Huaimo Chen"/>, <contact fullname="Vishnu Beeram"/>, and <contact fullname="Lou Berger"/> for
      their support and comments on this document.</t>
      <t pn="section-appendix.a-2">Thanks to <contact fullname="Benjamin Kaduk"/> for his careful review
      and valuable suggestions on this document. Also, thanks to <contact fullname="Roman Danyliw"/>, <contact fullname="Alvaro Retana"/>, and
      <contact fullname="Éric Vyncke"/> for their reviews and comments.</t>
    </section>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-contributors">Contributors</name>
      <t pn="section-appendix.b-1"><contact fullname="Lu Huang"/> contributed to the content of this
      document.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Aijun Wang" initials="A" surname="Wang">
        <organization showOnFrontPage="true">China Telecom</organization>
        <address>
          <postal>
            <street>Beiqijia Town, Changping District</street>
            <city>Beijing</city>
            <region>Beijing</region>
            <code>102209</code>
            <country>China</country>
          </postal>
          <email>wangaj3@chinatelecom.cn</email>
        </address>
      </author>
      <author fullname="Xiaohong Huang" initials="X" surname="Huang">
        <organization abbrev="BUPT" showOnFrontPage="true">Beijing University of Posts and Telecommunications</organization>
        <address>
          <postal>
            <street>No.10 Xitucheng Road, Haidian District</street>
            <street/>
            <city>Beijing</city>
            <region/>
            <code/>
            <country>China</country>
          </postal>
          <email>huangxh@bupt.edu.cn</email>
        </address>
      </author>
      <author fullname="Caixia Kou" initials="C" surname="Kou">
        <organization abbrev="BUPT" showOnFrontPage="true">Beijing University of Posts and Telecommunications</organization>
        <address>
          <postal>
            <street>No.10 Xitucheng Road, Haidian District</street>
            <city>Beijing</city>
            <region/>
            <code/>
            <country>China</country>
          </postal>
          <phone/>
          <email>koucx@lsec.cc.ac.cn</email>
          <uri/>
        </address>
      </author>
      <author fullname="Zhenqiang Li" initials="Z" surname="Li">
        <organization showOnFrontPage="true">China Mobile</organization>
        <address>
          <postal>
            <street>32 Xuanwumen West Ave, Xicheng District</street>
            <city>Beijing</city>
            <region/>
            <code>100053</code>
            <country>China</country>
          </postal>
          <phone/>
          <email>li_zhenqiang@hotmail.com</email>
          <uri/>
        </address>
      </author>
      <author fullname="Penghui Mi" initials="P" surname="Mi">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <street>Tower C of Bldg.2, Cloud Park, No.2013 of Xuegang Road</street>
            <city>Shenzhen</city>
            <region>Bantian,Longgang District</region>
            <code>518129</code>
            <country>China</country>
          </postal>
          <phone/>
          <email>mipenghui@huawei.com</email>
          <uri/>
        </address>
      </author>
    </section>
  </back>
</rfc>
