Policy-based Service Management

Slides:



Advertisements
Similar presentations
1 Introducing the Specifications of the Metro Ethernet Forum.
Advertisements

Proposal: Model-Driven SAL for the OpenDaylight Controller
UML Class Diagram. UML Class Diagrams2 Agenda What is a Class Diagram? Essential Elements of a UML Class Diagram Tips.
IWAN A Web Service- and ForCES-based Programmable Router Architecture Evangelos Haleplidis 1, Robert Haas 2, Spyros Denazis 13, Odysseas Koufopavlou.
Gap Analysis of Simplified Use of Policy Abstractions (SUPA) Presenter: Jun Bi draft-bi-supa-gap-analysis-02 IETF 92 SUPA BoF Dallas, TX March 23, 2015.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
ENS 1 SNMP M Clements. ENS 2 Simple Network Management Protocol Manages elements in networks – E.g. routers, switches, IP phones, printers etc. Uses manager.
1 Introducing the Specifications of the Metro Ethernet Forum.
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Documenting Network Design
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
© Drexel University Software Engineering Research Group (SERG) 1 Based on the paper by Philippe Kruchten from Rational Software.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Protocols and the TCP/IP Suite
Status of Work Feb 2, What and how fits? (option 1) Network Manager Network Elements (routers, switches, etc) RESTCONF / NETCONF Service Management.
Introduction to MDA (Model Driven Architecture) CYT.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
FI-CORE Data Context Media Management Chapter Release 4.1 & Sprint Review.
Introduction of PRO WG activities Group Name: TP Source: Shingo Fujimoto, FUJITSU, Meeting Date: Agenda Item:
Web Services Management Framework by Umut Bultan & Gül Hünerkar.
TEMPLATE DESIGN © SUPA – Simplified Use of Policy Abstractions Policy-driven Service Management Date: Monday, March 23,
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
A Throttling Layer-7 Web Switch James Furness. Motivation & Goals Specification & Design Design detail Demonstration Conclusion.
Logical view –show classes and objects Process view –models the executables Implementation view –Files, configuration and versions Deployment view –Physical.
Ch- 8. Class Diagrams Class diagrams are the most common diagram found in modeling object- oriented systems. Class diagrams are important not only for.
Application Ontology Manager for Hydra IST Ján Hreňo Martin Sarnovský Peter Kostelník TU Košice.
ICOM TC Charter TC’s Scope –Specify the normative standards for collaboration objects, along with their attributes, relationships, constraints, and behavior,
STEP Tutorial: “ Fundamentals of STEP” David Briggs, Boeing January 16, 2001 ® PDES, Inc NASA STEP Workshop step.nasa.gov.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Basic Concepts and Definitions
Class Diagrams. Terms and Concepts A class diagram is a diagram that shows a set of classes, interfaces, and collaborations and their relationships.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
31 st October – 4 th November 2011 Fall 2011 Meeting Agenda Boulder, Colorado, USA SOIS Application Support Services WG Device Virtualisation & EDS Coordination.
47th IETF 3/29/00 Information Model for describing network policy and services John Strassner - Cisco Walter Weiss - Lucent Andrea Westerinen - SNIA David.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Policy Modeling in a PBM Architecture 6WIND / Euronetlab
What problems are we trying to solve? Hannes Tschofenig.
SUPA Proposition Maxim Klyus, NetCracker John Strassner, Huawei Technologies July, 2015.
Simplified Use of Policy Abstractions (SUPA) Policy Data Model Overview 1 Michiaki Hayashi KDDI R&D Labs. Inc Nov. 3 rd, 2015.
ONAP and MEF LSO External API Framework Functional Reference Architecture 12 July 2017 Andy Mayer, Ph.D. © 2016 AT&T Intellectual Property. All rights.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Databases and DBMSs Todd S. Bacastow January 2005.
Multi-layer software defined networking in GÉANT
SNMP M Clements ENS.
The SUPA Information Model
Can SUPA Aid ECA Policy Development in I2RS Yang
ONAP Integration Through Information and Data Modeling
SUPA/YMCA (Yang Models for Configuration and topology Abstraction)
draft-ietf-teas-yang-te-topo-01
SNMP M Clements ENS.
OSPF Extensions for ASON Routing draft-ietf-ccamp-gmpls-ason-routing-ospf-03.txt IETF67 - Prague - Mar’07 Dimitri.
Proposal on system description, reference model and draft outline
SNMP M Clements ENS.
UML Class Diagram.
Chapter 20 Object-Oriented Analysis and Design
SUPA Policy-based Management Framework (SUPA: Simplified Use of Policy Abstractions) draft-ietf-supa-policy-based-management-framework-01 Will Liu, John.
Analysis models and design models
CHAPTER 1: THE DATABASE ENVIRONMENT AND DEVELOPMENT PROCESS
Metadata The metadata contains
Cloud-Enabling Technology
Network Architecture By Dr. Shadi Masadeh 1.
János Farkas, Balázs Varga, Rodney Cummings, Jiang Yuanlong
ICOM TC Charter TC’s Scope Out of TC’s Scope Call for Participation
Standards, Models and Language
Presentation transcript:

Policy-based Service Management John Strassner Masaki Fukushima draft-bi-supa-policy-model draft-zaalouk-supa-vpn-service-management-model

Agenda PBSM and Its Relation to SUPA Policy Terminology Types of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management

What Is PBSM? Service Model Policy Model SUPA Describes the service as a managed object Describes relationships to other managed objects, such as resources, configurations, customers, and SLAs Policy Model Defines rules for governing managed objects Defines representation for rules Can be used to govern service relationships SUPA Defines how policy rules are used to manage service behavior

SUPA Policy-based Services Deliverable #2: A Yang data model that describes network services, their resource requirements as well as service specific parameters. Deliverable #3: A Yang data model that specifies policy rules controlling a network service. ECAPolicy1 ECAPolicyp ECAPolicyq ECAPolicyr ECAPolicyx … GoalPolicy1 GoalPolicyi GoalPolicyj More Abstract More Concrete Network Manager (Controller) Network Elements (routers, switches, etc) RESTCONF / NETCONF Service Manager Service Data Model Policy Topology Data Model : SUPA scope

Agenda Policy Terminology PBSM and Its Relation to SUPA Types of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management

Terminology An Information Model A Data Model A Policy Rule A representation of managed objects and their relationships that is independent of data repository, language, and protocol A Data Model A representation of managed objects and their relationships that is dependent on data repository, language, and/or protocol (typically all three) A Policy Rule A container that uses metadata to define how the content is interpreted, and hence, how the behavior that it governs is defined separates the content of the policy from its representation provides a convenient control point for OAMP operations Examples of container metadata: 1) define behavior is a particular action fails when a set of actions are being executed (e.g., should all actions be rolled back, or should the system retry the action for some specified number of times, or…) 2) define which versions of which interfaces should be supported for a given client

Modeling Concepts Independent of vendor; dependent on language, protocol, and repository Independent of vendor, language, protocol, and repository Dependent on vendor, language, protocol, and repository

Agenda Types and Uses of Policy Rules PBSM and Its Relation to SUPA Policy Terminology Types and Uses of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management

Motivation for Policy Management The usage of policy rules to manage the behavior of one or more managed entities Policy rules are half of the solution The other half is the mechanism used to effect governance (e.g., state automata) Policy is about governance, and can be expressed differently: When this threshold is violated, change the type of queuing used Provide Gold Service users the opportunity to upgrade to Platinum Service for ½ the price Policy provides a scalable automation implementation mechanism, which involves: Issuing changes to one or more entities Controlling how changes are being delivered Coordinating which entities are being changed when and in what order

Why Multiple Types of Policy Rules? It’s all bad! What to do? Gold-Silver Tradeoff Gold: IF (RTG > 100 msec) THEN (Increase CPUG by 5%) Silver: IF (RTS > 200 msec) THEN (Increase CPUS by 5%) 1 It’s all good! What is best? Conflict: Gold/Silver Tradeoff What to do? There are different types of policy rules; SUPA will initially consider two

Types of Policy Rules (1) Event-Condition-Action (ECA) IF the clause of Events evaluates to TRUE IF the clause of Conditions evaluates to TRUE THEN execute the clause of Actions Explicit programming of state (rationality is compiled into the policy!) Advantages: 1) CAN be simple 2) System knows exactly what to do (and therefore, easier to understand and debug) Disadvantages: 1) Policy explosion 2) Conflict detection and resolution can be very difficult

Types of Policy Rules (2) Goal (Intent) Express what should be done, not how to do it Specifies criteria for choosing a set of states, any of which is acceptable Rationality is generated by optimizer/planner Advantages: 1) More abstract, and potentially more flexible, than ECA policies Disadvantages: 1) Requires sophisticated translation and optimization modules 2) Conflict detection/resolution is HARD

Agenda Use of Policy Rules by Different Actors PBSM and Its Relation to SUPA Policy Terminology Types and Uses of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management

Policy Continuum Bus: Give Customer Gold Service SUPA I2RS, others Sys: Define Bus Concepts in technology terms - map customer to addr range - map Gold to types of apps … Net: For Services1-j - create L3VPN - define port - define routing protocol Dev: account for device-specific naming, restrictions, etc. SUPA I2RS, others Policy Continuum, Applicable to both Goal and ECA Policy Rules Bob Personally, I think this is critical. Whether or not the number and nomenclature of the perspectives in the continuum are correct or fixed is open to discussion (might need updating, or might not), my own experience is that many attempts at PBM have failed due to a mismatch between the specification of policy at one level and the expectation of interpretation/translation of that policy at another level Juergen Concerning slide 18, what would really help are examples that say follow slide 18 and show how say an SLA is broken down to a system view and then to a network view and finally to a device view. But it gets worse! Click This shows two “policies” about the same SLA. One the left, the Business Manager thinks of revenue, while on the right, the network admin thinks CLI. Who is right? Click They both are! This is one variation of the Policy Continuum. The point is to enable a management system to translate between different expressions of a policy.

Extracted from TM Forum TR234 Information Model Snapshot R14.5.0 PBSM Architecture Protocol and Information Exchange Requirements A protocol for encoding logic definitions is needed Policy editing should use simple text or XML So should policy translation Policy apps and brokers, along with policy decision, execution, and verification, may need richer forms of information transfer Added text on the right side TMF is defining the overall architecture. However, it has no protocol experience. Furthermore, while it has experience in information modeling, it does not emphasize data models. Service primitives: request, response, indication, Extracted from TM Forum TR234 Information Model Snapshot R14.5.0

Agenda SUPA Policy Service Management PBSM and Its Relation to SUPA Policy Terminology Types and Uses of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management

VPN Service Management Data Model Summary draft-zaalouk-supa-vpn-service-management-model defines a VPN service management Yang data model VPN management model is designed for DDC services Defines DDC service initiation, VPN-based connectivity initiation, and other required services Status Several details need to be further worked out Integration with other SUPA drafts needs to be done Integration with a generic service data model Integration with a generic policy rule model Some comments received from mailing list, and will be addressed in the next version of the draft

Policy and VPN Service Management “…develop a model that abstracts network resources and services and a methodology by which the management and monitoring of network services can be done using standardized policy rules” Govern Currently Out-of-Scope Currently In Scope Currently Not Started Information Model Policy System Service Yang Data Model VPN Service ECA Policy Intent-based Policy This slide expands on the red sentence from slide 18, and seeks to answer HOW policy and service models are integrated in SUPA. Several added points on this slide: 1) ECA and Intent are BOTH viable mechanisms to govern services 2) Without a common policy model, translating or even using BOTH ECA and Intent is HARD 3) Work on the policy model has not yet started 4) The Yang VPN service model SHOULD be constructed such that it is one (of possibly many) instances of modeling services 5) A similar tree could be drawn for Resources; if this was done, then: a) similar “govern” relationships between ECA Policy and Resource as well as between Intent-based Policy and Resource could be drawn b) additional relationships between Service and Resource would then be uncovered c) Resource work is currently NOT in scope

VPN Service Management Data Model DDC model describes SUPA VPN management model designed for DDC services use case Module “ietf-supa-ddc” defines generic VPN management aspects that are common to all DDC services use case regardless of the type of vendor This module can be viewed as providing a generic VPN management for DDC services Update: focusing more about DDC info by removing the duplicated part of VPN initiation module: ietf-supa-ddc +--rw ddc-service | +--rw ddc-service* [name] | +--rw name string | +--rw tenant-name string | +--rw dc-name* string | +--rw interface-name* string | +--rw connection-type? enumeration | +--rw connection-name string | +--rw vlan-id? uint16 | +--rw bandwidth uint32 | +--rw latency uint32

VPN Service Management Data Model L3VPN model A Layer 3 Virtual Private Network (L3VPN) interconnects sets of hosts and routers based on Layer 3 addresses and forwarding. A L3VPN model is a collection of L3VPN instances, which contains a set of access interfaces to network devices as well as other attributes, such as routing protocol, address family, topology, and so on. To configure a L3VPN instance, the administrator needs to specify which port(s) of a network device belongs to a L3VPN instance. what routing protocol needs to be configured for a L3VPN instance. module: ietf-supa-l3vpn +--rw l3vpn-Instance* [instance-name] +--rw instance-name string +--rw servic-type? enumeration +--rw address-family-type? enumeration +--rw access-interface-id* [access-interface-id] +--rw access-interface-id string +--rw access-interface-address string +--rw ip-address-mask-length uint8 +--rw role enumeration +--rw user-name string +--rw user-password string +--rw physical-node-id string +--rw physical-access-interface string +--rw protocol +--rw protocol-type? enumeration +--rw igp-attribute | +--rw protocol-id? uint32 +--rw bgp-attribute +--rw remote-as-number? string +--rw remote-peer-address string

Service Profiles Service Profile Policy-based Service Profiles draft-ph-supa-alps-yang-dm-00 represents the service as consumed by the Customer as a Yang data model Forms a hierarchy of service profiles Supplies customer-defined configuration data for Services Policy-based Service Profiles Policy can be applied to Services and Service Profiles Controls semantics of which Customers can use which set of Service Profiles in what context Yang Data Model Intent-based Policy govern ECA Policy Yang Data Model Service VPN Service inherit Yang Data Model Service Profile VPN Service Profile inherit aggregation

Questions? Questions? “Create like a god. Command like a king. Work like a slave” - Constantin Brancusi