Network Working Group                                           Y. Cheng
Internet-Draft                                              China Unicom
Intended status: Informational                                  D. Zhang
Expires: December 30, 2015                                 Aliababa Group
                                                            JF. Tremblay
                                                                Viagenie
                                                                  S. Zhu
                                                           Alibaba Group
                                                                   J. Bi
                                                     Tsinghua University
                                                         L. M. Contreras
                                                          Telefonica I+D
                                                            June 30, 2015


              Use Case for Distributed Data Center in SUPA
                   draft-cheng-supa-ddc-use-cases-08

Abstract

   Large scale Distributed Data Centers (DDCs) can provide various
   services and usually consist of numbers of internal and external
   links where various VPNs are built upon.  The Service provisioning
   and network connectivity configurations could be complex and dynamic,
   and manual configuration is onerous and error-prone.  This draft
   analyzes the use cases in DDCs, in which some VPN scenarios are
   covered, and the applicability of Simplified Use of Policy
   Abstractions (SUPA) data models which can be used for better and
   automated resource usage and easy service/network deployment/
   configuration.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on December 6, 2015.




Cheng, et al.           Expires December 6, 2015                [Page 1]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   3
   3.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   4.  Challenges Faced by Data Center ISPs  . . . . . . . . . . . .   4
   5.  SUPA Benefits . . . . . . . . . . . . . . . . . . . . . . . .   4
   6.  Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . .   5
     6.1.  Scenario:Inter DC Connectivity  . . . . . . . . . . . . .   5
     6.2.  Scenario:vDC Connectivity . . . . . . . . . . . . . . . .   8
     6.3.  Scenario:Dynamic Link Configuration for DC  . . . . . . .  11
     6.4.  Scenario:DC Connectivity for Virtual Private Clouds (VPC)  12
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  14
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  15
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  15
   10. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  15
   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .  15
     11.1.  Normative References . . . . . . . . . . . . . . . . . .  15
     11.2.  informative References . . . . . . . . . . . . . . . . .  15
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  16

1.  Introduction

   The SUPA (Simplified Use of Policy Abstractions) work aims at
   providing data models, including network service data models, policy
   data models, to easily, accurately, and efficiently select and use
   the available communication network capabilities.  An example of the
   data model can be found in
   [I-D.zaalouk-supa-vpn-service-management-model].  Service Manager
   (SM) is used by an a communications service provider and/or operator
   to deploy and manage services on top of network facilities.  An
   example of SM is a set of applications used by an Operational Support
   System (OSS) entity to perform network configuration.  Several SUPA



Cheng, et al.           Expires December 6, 2015                [Page 2]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   use cases have been introduced in the problem statement document.
   This document reviews various scenarios for Distributed Data Center
   (DDC) use case.

   A large-scale Distributed Data Center (DDC) operator may have to
   maintain multiple data centers and the inter-connecting networks in
   order to provide server hosting, leased line, and value-added
   services to enterprises and ISPs, and have multiple data centers.  In
   this DDC network, traffic at each site is routed via configuring
   policy routes and the operator may be able to adjust routes
   prioritization to choose an outgoing link.  This type of static
   provisioning comes with high costs and poor operability,and as
   a result the bandwidth resources intra/inter-data centers are not
   efficiently utilized.

   In quite a few scenarios, the links between DCs are VPNs (MPLS, SSL,
   IPsec, and etc.).  SUPA will be mainly used for those VPN
   configurations.  Although there may be some cases where physical
   links are used, but those are out of the scope of this draft.

   DC and network may belong to different operators.  If a DC operator
   needs to configure network connectivity for DCs, it may need to
   cooperate with network operators providing such connectivity.
   Network operators can define and provide data models to enable this.

   This document illustrates several distributed datacenter (DDC)
   applications and explains how an operator could use SUPA to provide
   these applications.

2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Terminology

   The terminology used in the SUPA problem statement draft
   [I-D.zhou-supa-framework] and
   [I-D.karagiannis-supa-problem-statement] apply also to this draft.

   DC        Data Center

   DDC       Distributed Data Center

   ECA       Event Condition Action

   NM/NC     Network Manager / Controller



Cheng, et al.           Expires December 6, 2015                [Page 3]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   OSS       Operational Support System

   SM        Service Manager

   SUPA      Simplified Use of Policy Abstractions

   TTM       Time to Market

   VAS       Value Added Service

   vDC       virtual Data Center

   VPC       Virtual Private Cloud (PC)

4.  Challenges Faced by Data Center ISPs

   There are many challenges in traditional DDCs:

   1.  The infrastructure and network links rent from other operators,
       are normally dependent on manual planning and design, which leads
       to inflexibility and low efficiency of resource usages.  SUPA can
       benefit the DDC operators to manage the network resources rent
       from others in a more flexible way.

   2.  Service expansion is limited in a single physical DC.  Each DC
       resource is isolated, so service and resource can only be
       deployed in one single DC.

   3.  VAS (Value Added Service) is provisioned via static
       configuration, which brings complex training, long service TTM
       time and poor flexibility.  This could not meet the requirements
       of complex use cases, e.g., lot of VAS devices, significant
       differences between various services.

5.  SUPA Benefits

   There are requirements from DDC operators to optimize and automate
   the service deployment.  Also, a tenant may expect the traffic
   steering capabilities in order to use the rent links more
   efficiently.  SUPA can show its advantages in above cases since it is
   able to:

   o  Support an open network architecture: standardizaed data models
      enable an open architecture and make it possible for unified
      service / network planning, which can interconnect with third
      party cloud platform, supporting fast service innovation.





Cheng, et al.           Expires December 6, 2015                [Page 4]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   o  Support overall DC resource integration: SUPA data models can be
      used for network resource virtualization; inter-DC resource,
      virtual DC (vDC) resource, etc, can be integrated and controlled
      by a centralized functional entity.

   o  Support automatic E2E service delivery: Network (including virtual
      network), computing, inter-DC management of storage resource,
      automatic service delivery, automatic VPN connection
      configurations between DCs, which improves operation efficiency.

   o  Improve DDC network usage by means of Intelligent scheduling of
      DDC traffic, improving link usage.

   o  Support VAS service on-demand provisioning automatically: Create
      or delete VAS nodes on-demand, based on various service
      requirements; network forwarding policy based on the VAS routing,
      to achieve automatic draining and automatic configuration of VAS
      device policy.

   Please refer to [I-D.zhou-supa-framework] and other SUPA related
   documents for more details of SUPA features.

   The following sections will illustrate three typical cases in
   distributed data center which could benefit from SUPA architecture.

6.  Scenarios

   In the following uses, Service Manager (SM) is used for service and
   policy definition; and Network Manager (Controller) is used for
   network topology maintenance and mapping data models to detail
   network configurations, as defined in [I-D.zhou-supa-framework].

6.1.  Scenario:Inter DC Connectivity


















Cheng, et al.           Expires December 6, 2015                [Page 5]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


                   +---------------------------+
                   |    Service Manager        |
                   |                           |
                   | +----------+ +----------+ |
                   | |Service   | |Policy    | |
                   | |Data Model| |Data Model| |
                   | +----------+ +----------+ |
                   |                           |
                   +---------------------------+
                               ^
                               |
                               |
                               |
                               v
                   +--------------------------+
                   |          Network         |
                   |  Manager / Controller    |
                   +--------------------------+
                      /                   \
                     /                     \
              +---------+                   \
             /|  DC1    |\                   \
            / +---------+ \              +-----------+
           |      | d1     \___a1________|   DC-A    |
           |      |                      |           |
           |  +---------+                +-----------+
        d3 |  |  DC2    |\
           |  +---------+ \              +-----------+
           |      | d2     \___a2________|   DC-B    |
           |      |        ____a3________|           |
            \ +---------+ /              +-----------+
             \|  DC3    |/
              +---------+


                           Inter DC Connectivity

   There can be a number of links between data centers, and the
   configuration of such links could complex.  As shown in Figure 1,
   service data models and policy data models can be defined to automate
   the configuration procedures.  The service data model for
   connectivity is used for specifying attributes of (virtual) links,
   e.g. the end points of links, bandwidth, QoS and availability
   parameters, etc.  The policy model can specify some high level
   requirements to the links, like routing strategy (via and not via)
   and price/cost strategy.  The policy data model can also define the
   policy rules that drive the security requirements.




Cheng, et al.           Expires December 6, 2015                [Page 6]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   An application example is, the links interconnecting two DCs together
   should guarantee a minimum bandwidth, certain QoS parameters, and
   provide availability guarantees.

   Anothe service policy example in Figure 1, for traffic from DC2 to
   DC-B, if the load on a link exceeds a threshold (e.g., 90%), some
   (new) traffic can be redirect to another link.

   Requirements and configurations derived from above application
   scenarios can be described by service data model and policy data
   model.


      module: ietf-supa-ddc
         +--rw ddc-services
            +--rw ......                 other possible attributes
            +--rw ddc-service* [name]
            |  +--rw name                string
            |  +--rw connection-type?    enumeration
            |  +--rw connection-name     string
            |  +--rw bandwidth           uint32
            |  +--rw latency             uint32
            +--rw ......                 other possible attributes


               Service Data Model for Inter DC Connectivity

   The above service data model can be used to describe links attributes
   for a VPN, including bandwidth , latency, etc.


   module: ietf-supa-policy
      +--rw supa-policy
         +--rw ......                         other possible attributes
         +--rw supa-policy-atomic
         |  +--rw supa-ECA-policy-rule
         |     +--rw policy-rule-name?        string
         |     +--rw has-policy-events?       boolean
         |     +--rw has-policy-conditions?   boolean
         |     +--rw has-policy-actions?      boolean
         +--rw ......                         other possible attributes


                           ECA Policy Data Model

   The above policy data model can be used to describe the requirement
   that when the load on a link exceed a threashold.  In this case,




Cheng, et al.           Expires December 6, 2015                [Page 7]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   "event" is the bandwidth of a link, "condition" is "load >= 80%",
   "action" is "redirect some traffic to another link".


   module: ietf-supa-policy
      +--rw policy-set
         +--rw ......                          other possible attributes
         +--rw policy-rule
            +--rw rule-name?                   string
            +--rw rule-type?                   enumeration
            +--rw policy-rule-priority?        uint8
            +--rw intent-policy-rule
            |  +--rw desired-state
            |  |  +--rw constraint?            string
            |  |  +--rw constraint-priority?   uint8
            |  +--rw behavior-constraint
            |     +--rw constraint?            string
            |     +--rw constraint-priority?   uint8
            +--rw ......                       other possible attributes


               Policy Data Model for high level requirements

   The policy model shown above can be used to express some
   sophisticated requirements, e.g. the number of hop of any link should
   be less than 5, or any links should not share any network nodes in
   between and should be completely independent to each other so as to
   achieve high availablity in case of network node failure.

   Inter DC connections can be classified into two types: connections
   within a single administrative domain and connections across multiple
   administrative domains.  Links d1, d2 and d3 are within an
   administrative domain; and links a1, a2 and 3 are across domains.
   The difference between them is that connections across multiple
   administrative domain require extra negotiation and authentication/
   authorization, which can be achieved via communications between SMs.
   Data models for this purpose should also be defined.

6.2.  Scenario:vDC Connectivity

                 +---------------------------+
                 |    Service Manager        |
                 |                           |
                 | +----------+ +----------+ |
                 | |Service   | |Policy    | |
                 | |Data Model| |Data Model| |
                 | +----------+ +----------+ |
                 |                           |



Cheng, et al.           Expires December 6, 2015                [Page 8]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


                 +---------------------------+
                               ^
                               |
                               |
                               |
                               v
                   +--------------------------+
                   |          Network         |
                   |  Manager / Controller    |
                   +--------------------------+
                      /         |           \
                     /          |            \
                    /           |             \
                   /   +-------------------+   \
                  /    | DC2               |    \
                 /     | +---------------+ |     \
                /      | |Tenant1 (vDC)  | |      \
               /       | +---------------+ |       \
              /        |                   |        \
             /         | +---------------+ |         \
            /          | | Tenantn (vDC) | |          \
            |          | +---------------+ |          |
            |          +-------------------+          |
            |                     |vDC link           |
            |               +-------------+           |
            |               |             |           |
            |              /|  Cloud      |\          |
            |             / +-------------+ \         |
            |  vDC link  /                   \vDC link|
            |           /                     \       |
    +-------------------+               +-------------------+
    | DC1               |               | DC3               |
    | +---------------+ |               | +---------------+ |
    | | Tenant1 (vDC) | |               | | Tenant1 (vDC) | |
    | +---------------+ |               | +---------------+ |
    |                   |               |                   |
    | +---------------+ |               | +---------------+ |
    | | TenantK (VDC) | |               | | TenantN (vDC) | |
    | +---------------+ |               | +---------------+ |
    +-------------------+               +-------------------+



                             vDC Connectivity

   A DC tenant may have resources, e.g. network, computing, storage,
   etc, in multiple physical DCs.  DC operators will provide internal
   network connectivity for these distributed resources, and make it



Cheng, et al.           Expires December 6, 2015                [Page 9]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   look like one seamless entity, which can be called as virtual DC
   (vDC).

   The internal links for vDC can be implemented via tunneling overlay
   technologies, e.g.  VPN or VxLAN, etc.  The tunnels need to be
   dynamically established, managed and released.

   As show in Figure 5, service data model and policy data model can be
   defined to automate the links configuration for vDCs.  A service data
   model should specify the attributes of the tunnels, e.g., bandwidth,
   QoS and availability parameters.  Policy systems can dynamically
   scale the DC resources assigned to a tenant, and the policy rules
   that drive the prioritization of resource assignments.  The
   networking resources assigned to a tenant should scale proportionally
   to the compute resources assigned to a tenant.  The traffic should be
   prioritized to resources owned by tenants that offer interactive
   services according to the time zone the DC is located in.  Because a
   DC serving enterprise may require higher priority in working hour,
   and a DC providing entertainment service may need higher network
   priority in non-working hours.


   module: ietf-supa-policy
      +--rw supa-policy
         +--rw ......                         other possible attributes
         +--rw supa-policy-validity-period
         |  +--rw start?                      yang:date-and-time
         |  +--rw end?                        yang:date-and-time
         |  +--rw duration?                   uint32
         |  +--rw periodicity?                enumeration
         +--rw supa-policy-atomic
         |  +--rw supa-ECA-policy-rule
         |     +--rw policy-rule-name?        string
         |     +--rw has-policy-events?       boolean
         |     +--rw has-policy-conditions?   boolean
         |     +--rw has-policy-actions?      boolean
         +--rw ......                         other possible attributes


                  Policy Data Model for vDC Connectivity

   In the above policy data model, events and conditions may not be
   necessary; the actions will be based on the time; and two actions
   will be required: set the VPN priority to low or high.







Cheng, et al.           Expires December 6, 2015               [Page 10]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


6.3.  Scenario:Dynamic Link Configuration for DC

   Static and over provisioning for DC links is not always a good
   solution.  Sometimes dynamic configuration is necessary.


                  +---------------------------+
                  |    Service Manager        |
                  |                           |
                  | +----------+ +----------+ |
                  | |Service   | |Policy    | |
                  | |Data Model| |Data Model| |
                  | +----------+ +----------+ |
                  |                           |
                  +---------------------------+
                               ^
                               |
                               |
                               |
                               v
                   +--------------------------+
                   |          Network         |
                   |  Manager / Controller    |______________
                   +--------------------------+              \
                      /                    \                  \
                     /                      \                  \
                    /                        \                 |
        +--------------+                +-------------------+  |
        |              |                |                   |  |
        |              |                |  DC2              |
        |              |--------------- |                   |  |
        |   DC1        |                +-------------------+  |
        |              |                                       |
        |              |  \                                    |
        |              |   \            +-------------------+  |
        |              |    \           |                   | /
        |              |     \__________|  DC2              |/
        +--------------|                |                   |
                                        +-------------------+


                     Dynamic Link Configuration for DC

   One case is virtual machine migration and large amount of data
   transfer between DCs.  But this kind of activity does not happen
   frequently.  A dedicated link with constant bandwidth for this
   purpose is too expensive.  The network operator should allow the DC
   operator to create a link on demand when necessary.  This link may



Cheng, et al.           Expires December 6, 2015               [Page 11]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   have large bandwidth but last for a limited time period.  An
   alternative is to create short-term dedicated links for backups and
   migrations.

   As shown in Figure 7, data models can help to automate these kind of
   configurations.  In the data models, the attributes of links
   (bandwidth, QoS and availability parameters) should be specified.
   The policy concerning strict and soft bounds on the lifetime of such
   links, and the policy concerning the scheduling of dedicated links
   (e.g., based on the current load) and the services using the
   dedicated links can also be specified.

   When the traffic volume between DCs exceeds a certain threshold, the
   policy-driven service manager requests that traffic schedules may be
   adjusted within bounds in order to balance load on the links (e.g.,
   delay backups and migrations until the network has the necessary
   capacity).

   In this case, the ECA policy model will apply, but the action is
   different -- change the bandwidth of link(s) with time period
   constraints, as shown in Figure6.

6.4.  Scenario:DC Connectivity for Virtual Private Clouds (VPC)




























Cheng, et al.           Expires December 6, 2015               [Page 12]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


                  +---------------------------+
                  |    Service Manager        |
                  |                           |
                  | +----------+ +----------+ |
                  | |Service   | |Policy    | |
                  | |Data Model| |Data Model| |
                  | +----------+ +----------+ |
                  |                           |
                  +---------------------------+
                               ^
                               |
                               |
                               |
                               v
                   +--------------------------+
                   |          Network         |
                   |  Manager / Controller    |______________
                   +--------------------------+              \
                      /                    \                  \
                     /                      \                  \
                    /                        \                 |
    +-------------------+               +-------------------+  |
    | DC3               |               |                   |  |
    | +---------------+ |   VPN         |  DC1 (Database)   |  |
    | |     VPC1      |-----------------|                   |  |
    | +---------------+ \               +-------------------+  |
    | +---------------+ |\                                     |
    | |     VPC2      | | \                                    |
    | +---------------+ |  \            +-------------------+  |
    | +---------------+ |   \  VPN      |                   | /
    | |    ......     | |    \__________|  DC2 (Storage)    |/
    | +---------------+ |               |                   |
    +-------------------+               +-------------------+

                          VPC to DC Connectivity

   In practice, a public cloud operator can virtualize its cloud
   resources into different isolated virtualized private clouds and
   provided them for different tenants.  Such a virtualized private
   cloud is referred to as a VPC.  In a typical VPC provided by, e.g.,
   Alibaba or Amazon, through the control portal, a tenant can establish
   and manage its network easily, for instance, deploying or removing
   virtualized network devices (e.g., virtualized routers and
   virtualized switches), adjusting the topology of VPC
   networks,specifying packet forwarding policies, and deploying or un-
   deploying virtual services (e.g., load balancers, firewalls,
   databases, DNS, etc.).  The network functionalities that the tenant
   can accessed are virtualized and actually performed by the VMs



Cheng, et al.           Expires December 6, 2015               [Page 13]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


   located on the servers connected through physical or overlay
   networks.  Note that the servers may be located in different data
   centers which are geographically distributed.

   The manipulation of the virtualized VPC network may also affect the
   configuration of physical networks.  For instance, when a tenant
   newly deploys two VMs in its VPC which are located in different DCs,
   the VPC control mechanism may have to generate a VPN between two DCs
   for the internal VPC communication.  Therefore, the control mechanism
   for a VPC should be able to adjust the underlying network when a
   tenant changes the network or service deployment of the virtual VPC
   network.

   In many cases, a tenant may need to specify how the VPCs is connected
   to its enterprise cloud networks.  For instance, a tenant may want to
   deploy multiple VPNs to connect the VPC with its private cloud
   networks and specify the policies to steer the traffics through
   different VPNs in different conditions.  Note that the VPCs that the
   tenant may be located in different geographic regions, and the VPNs
   to those VPCs may need to be generated at run time.

   In addition, a VPC, often provides other value added services (e.g.,
   database Services, DNS) for VMs in certain VPCs.  The VMs and the
   value added services could be located in different DCs, or even
   provided by different vendors.  VPNs are configured for the VPCs to
   provide connection to the internal services, and to create and manage
   VPNs to internal services.  The access of VMs to data resources
   should be controlled.  For instance, the VMs in a VPC can access the
   database services only when the tenant has deployed database into its
   VPC through the control portal.

   As shown in figure 4, service data models and policy data models can
   be defined to automate the configurations of links between VPC and DC
   where service is located.  The data models should specify the policy
   controlling authentication and authorization concerning access to
   data residing in internal services.

7.  Security Considerations

   Security is a key aspect of any protocol that allows state
   installation and extracting of detailed configuration states.  More
   investigation remains to fully define the security requirements, such
   as authorization and authentication levels.








Cheng, et al.           Expires December 6, 2015               [Page 14]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


8.  IANA Considerations

   Not applicable.

9.  Acknowledgements

   The authors of this draft would like to thank the following persons
   for review, discussion, and valuable comments: Cathy Zhou, Georgios
   Karagiannis, Scott O.  Bradner, James Huang, Bob Natale.

10.  Contributors

   The following persons contribute use case and text to this draft, and
   are listed below:

           Scott O. Bradner
           sob@sobco.com

           Dacheng Zhang
           dacheng.zdc@alibaba-inc.com

11.  References

11.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

11.2.  informative References

   [I-D.karagiannis-supa-problem-statement]
              Karagiannis, G., Qiong, Q., Contreras, L., Yegani, P., and
              J. Bi, "Problem Statement for Simplified Use of Policy
              Abstractions (SUPA)", draft-karagiannis-supa-problem-
              statement-06 (work in progress), March 2015.

   [I-D.zaalouk-supa-vpn-service-management-model]
              Zhang, D., Zaalouk, A., Pentikousis, K., and Y. Cheng,
              "VPN Service Management YANG Data Model", draft-zaalouk-
              supa-vpn-service-management-model-03 (work in progress),
              April 2015.

   [I-D.zhou-supa-framework]
              Zhou, C., Contreras, L., Qiong, Q., and P. Yegani, "The
              Framework of Simplified Use of Policy Abstractions
              (SUPA)", draft-zhou-supa-framework-01 (work in progress),
              February 2015.




Cheng, et al.           Expires December 6, 2015               [Page 15]


Internet-Draft   Use cases for DDC Applications in SUPA        June 2015


Authors' Addresses

   Ying Cheng
   China Unicom
   P.R. China

   Email: chengying10@chinaunicom.cn


   Dacheng Zhang
   Aliababa Group

   Email: dacheng.zdc@alibaba-inc.com


   JF Tremblay
   Viagenie

   Email: jean-francois.tremblay@viagenie.ca


   Shunmin zhu
   Alibaba Group

   Email: jianghe.zsm@taobao.com


   Jun Bi
   Tsinghua University
   Bei Jing
   China

   Email: junbi@cernet.edu.cn


   Luis M. Contreras
   Telefonica I+D
   Ronda de la Comunicacion, Sur-3 building, 3rd floor
   Madrid  28050
   Spain

   Email: luismiguel.contrerasmurillo@telefonica.com









Cheng, et al.           Expires December 6, 2015               [Page 16]