Internet-Draft | SRv6 Mobile YANG Model | March 2022 |
Jethanandani & Murakami | Expires 4 September 2022 | [Page] |
This document defines a YANG data model for configuration and management of SRv6 for the mobile network.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 4 September 2022.¶
Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
In mobile networks, mobility systems provide connectivity over a wireless link to stationary and non-stationary nodes. The user-plane establishes a tunnel between the mobile node and its anchor node over IP-based backhaul and core networks.¶
When SRv6 is applied to mobile networks, it enables a source routing architecture, where operators get to explicitly specify a route for the packets to traverse both to and from a mobile node. The SRv6 Endpoint nodes serve as mobile user-plane anchors.¶
For example, in an Enhanced mode topology, the intermediate waypoints, SIDs, can be used for Traffic Engineering. For more details, see Segment Routing IPv6 for Mobile User Plane [I-D.ietf-dmm-srv6-mobile-uplane], Section 5.2. The gNB and UPF are SR-aware, and there are two service segments, one for traffic engineering to support a low latency path, and the other for service programming. In such a topology the operator routes the traffic through these SRv6 nodes, so they can perform their Endpoint functionality and forward the packet. Further, in the uplink direction, when the gNB receives a packet from a UE, it adds the segments of the SR policy to route the traffic through those two segments, while doing something similar in the downlink direction.¶
This document describes a YANG 1.1 [RFC7950] data model for the Segment Routing IPv6 (SRv6) user plane of mobile networks.¶
The model conforms to the NMDA [RFC8342] architecture.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document references terms defined in other documents. In particular, it imports definitions for the following terms from Segment Routing Architecture [RFC8402], and IPv6 Segment Routing Header (SRH) [RFC8754].¶
This document uses a few acronyms. Some of them are defined here for reference.¶
Acronym | Definition |
---|---|
gNB | gNodeB, a 5G Base Station using New Radio technology |
MUP | Mobile User Plane |
SR | Segment Routing |
SRv6 | Segment Routing over v6 |
UE | User Equipment |
UPF | User Plane Function |
An abridged version of the tree diagram is shown here. Annotations used in the diagram are defined in YANG Tree Diagrams [RFC8340].¶
The YANG model is divided into two parts. The first part of the model augments the BGP model in BGP Model for Service Provider Network [I-D.ietf-idr-bgp-model] for the BGP configuration, while the second part augments the BGP Routing Policy model in BGP Model for Service Provider Network [I-D.ietf-idr-bgp-model].¶
The BGP model is augmented both at a global level to add SRv6 configuration, and at the route selection option. The BGP policy model is augemented to add a defined set, a set of match options, and a set of actions.¶
The model imports Common YANG Data Types [RFC6991], A YANG Data Model for Routing Management(NMDA Version) [RFC8349], A YANG Data Model for Routing Policy [RFC9067], YANG Data Model for Segment Routing [RFC9020], YANG Data Model for SRv6 Base and Static [I-D.ietf-spring-srv6-yang], and BGP Model for Service Provider Network [I-D.ietf-idr-bgp-model].¶
This memo registers the following namespace URIs in the IETF XML in the "IETF XML Registry" [RFC3688]:¶
This document registers the following YANG modules in the "YANG Module Names" registry [RFC6020]:¶
The YANG module specified in this document defines a schema for data that is designed to be accessed via network management protocols such as NETCONF [RFC6241] or RESTCONF [RFC8040]. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) [RFC6242]. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS [RFC8446].¶
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.¶
There are a number of data nodes defined in this YANG module that are writable/creatable/deletable (i.e., config true, which is the default). These data nodes may be considered sensitive or vulnerable in some network environments. Write operations (e.g., edit-config) to these data nodes without proper protection can have a negative effect on network operations. These are the subtrees and data nodes and their sensitivity/vulnerability:¶
Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control read access (e.g., via get, get-config, or notification) to these data nodes. These are the subtrees and data nodes and their sensitivity/vulnerability:¶
Some of the RPC operations in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control access to these operations. These are the operations and their sensitivity/vulnerability:¶
Here is a complete tree diagram for the configuration and operational part of the model.¶
Thanks to all of the contributors.¶