Network Working Group B. Liu
Internet-Draft Huawei Technologies
Intended status: Informational B. Carpenter
Expires: April 20, 2019 Univ. of Auckland
October 17, 2018

Roadmap to a Networkless World
draft-liu-nmrg-networkless-roadmap-01

Abstract

This document aims to illustrate possible approaches to make network management and operations more autonomic in several aspects. The ultimate goal is that the network could run all by itself, so that users and administrators may feel that there is no network to take care of at all (a.k.a. "Networkless"). The approaches are described in a form of different levels (inspired by the Self-Driven Car levels). The higher the level is, the more autonomic management capabilities the network would have.

Although some specific technologies are categorized into different levels, it is not the document's intent to rank them; rather, this document is more about discussing the possible next stage and the ultimate vision. Hopefully, this document could collect people's consensus in the industry and provide guidance for future technology developments.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on April 20, 2019.

Copyright Notice

Copyright (c) 2018 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

As the network is evolving rapidly, the system is becoming more and more complex; thus managing a network is more and more challenging. It has been a common feeling in the industry that the operational expense of running networks is becoming a vital pain point. To address the management complexity challenges, there are new technologies emerging. For example, Autonomic Networking [RFC7575], which is under standardization in IETF Anima working group [Anima], is following an approach to allow the network elements do more management related operations by themselves. SDN techniques have significantly improved the efficiency of network service delivery in some scenarios. Network function virtualization, network slicing, and the related orchestration techniques are expected to do the same. In future, the intent-based network concept, which focuses more on the operational simplicity perspective, should allow users or administrators to control the network system in a radically simple way (that is, driven by abstract intent, rather than by detailed configurations).

This document is not proposing a new technology, rather, it collects available tecnologies and illustrates possible future technologies and the final effect on network users or administrators. The ultimate goal is that the network could run all by itself, so that users oradministrators may feel like there no network to take care of at all (a.k.a. "Networkless").

In Section 2, network management is divided into several aspects for discussion, from an administrator's perspective. In each aspect there are automation and autonomicity levels to illustrate past (Level 0), current state of art (Level 1) and possible future technologies (Level 2-4). Section 3 focuses on some common and vital capabilities the network system needs to have, in order to support the goals described in Section 2.

2. Level-by-Level approach to Networkless

2.1. Self-Organization Levels

Self-organization represents the ability of network elements to autonomically connect with each other, form domains, or even decide the topology, hierarchy or architecture.

2.2. Self-Configuration Levels

2.3. Self-Optimization and Levels

This sub-section focuses on traffic forwarding performance of the network, mainly include path selection and QoS related issues.

2.4. Self-Diagnostic Levels

This sub-section focuses on network fault diagnostic.

2.5. Self-Healing Levels

3. Key Capablities to Achieve Networkless

3.1. Network Perception

3.2. Decision and Reasoning

3.3. Operation Interface

4. Possible next-step technologies

This section discusses some possible next-steps for the technologies described in Section 2. Basically, the next-steps are Level-3 or Level-4 for each aspect.

4.1. Self-Organization

Current technologies (such as the Level-2 Self-organization ) can decently deal with the problem of how a device can get connected to the NOC and then get managed. After that, it still relies on human planning to properly configure the basic network connectivity, such as IP addresses, IGP etc. (This part of basic configurations is always called "underlay configurations" comparing to the overlay services.)

Thus, to simplify human work, it is expected that the system can do some "planning" work. Some critical aspects of network planning are as following, which are pre-conditions for both underlay configurations and overlay configurations.

-
Routing domain division: the system can divide the devices into groups, according to some mechanisms.
-
Network hierarchy recognition: the system can learn there is hierarchy in the network; and it can even recognize which are higher hierarchy and which are lower.
-
Roles recognition: some device roles are directly related to the topology, such as access gateway, aggregation gateway, core gateway.

If the system can figure out the above things, then it would be much easier to create the specific configurations. The IP addresses could be assigned in a good order (e.g. from higher hierarchy to lower, keep the addresses in a certain prefix for a specific domain); the IGP could be inheritably configured according to the routing domain divisions.

4.2. Self-Configuration

This section is mostly regarding service configurations (e.g. VPN configurations).

The following figure shows a typical architecture of how current state-of-the-art technologies do configurations for services.

(preamble)

                   l3vpn-svc |
                     Model   |
                             |
                      +------------------+         +-----+
                      |   Orchestration  | < --- > | OSS |
                      +------------------+         +-----+
                         |            |
                 +----------------+   |
                 | Config manager |   |
                 +----------------+   |
                         |            |
                         | NETCONF/CLI ...
                         |            |
           +------------------------------------------------+
                                Network

                              +++++++
                              + AAA +
                              +++++++

      ++++++++   Bearer    ++++++++           ++++++++      ++++++++
      + CE A + ----------- + PE A +           + PE B + ---- + CE B +
      ++++++++  Connection ++++++++           ++++++++      ++++++++

                 Site A                               Site B

Figure 1: L3VPN Service Configuration Architecture (from RFC8299)

For this approach, there are several issues:

  1. Too much details in currently defined service models, which implies
    -
    Cost a lot of human labor
    -
    The more details, the harder to achieve a unified and correct model
  2. Orchestrator/Controller is hard to scale
    -
    Binding to specific service and underlay models; need to develop new instance when service/underlay varies
    -
    Need to compile each single model in each device
  3. Southbound data models are hard to be unified
    -
    Each vendor's capabilities are different
    -
    Each operator's needs are different
    -
    A long-term puzzle from the SNMP era, not fixed by Netconf/YANG

To address Issue-1, we'll need some easy expression of the network service, this surely fits into the Intent-based network field. (TBD.)

To address Issue-2 we might need a intermediate common layer to separate the binding between specific service-level models and device-level configurations. (TBD.)

4.3. Self-Optimization

TBD.

4.4. Self-Diagnostic/Healing

TBD.

5. Security Considerations

Security mechanisms such as firewall placement, firewall or route filtering rules, authorization to join the network, key distribution, VPN encryption policy etc. are potentially subject to all of the above. However, raising security management to Levels 3 or 4 requires great confidence that the autonomic mechanisms are themselves foolproof. It is to be expected that security management remains at Level 0, 1 or 2 longer than most other aspects. An exception is threat or DoS detection, where ML techniques should be applicable in the short term.

6. IANA Considerations

No IANA assignment is needed.

7. Acknowledgements

The initial idea of this work and the "networkless" concept were from Xiaofei Xu.

8. Informative References

[Anima] "https://datatracker.ietf.org/wg/anima/about/"
[I-D.ietf-anima-autonomic-control-plane] Eckert, T., Behringer, M. and S. Bjarnason, "An Autonomic Control Plane (ACP)", Internet-Draft draft-ietf-anima-autonomic-control-plane-17, August 2018.
[I-D.ietf-anima-bootstrapping-keyinfra] Pritikin, M., Richardson, M., Behringer, M., Bjarnason, S. and K. Watsen, "Bootstrapping Remote Secure Key Infrastructures (BRSKI)", Internet-Draft draft-ietf-anima-bootstrapping-keyinfra-16, June 2018.
[I-D.ietf-anima-reference-model] Behringer, M., Carpenter, B., Eckert, T., Ciavaglia, L. and J. Nobre, "A Reference Model for Autonomic Networking", Internet-Draft draft-ietf-anima-reference-model-08, October 2018.
[RFC7575] Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A., Carpenter, B., Jiang, S. and L. Ciavaglia, "Autonomic Networking: Definitions and Design Goals", RFC 7575, DOI 10.17487/RFC7575, June 2015.

Authors' Addresses

Bing Liu Huawei Technologies Q14, Huawei Campus No.156 Beiqing Road Hai-Dian District, Beijing, 100095 P.R. China EMail: leo.liubing@huawei.com
Brian Carpenter Department of Computer Science University of Auckland PB 92019 Auckland, 1142 New Zealand EMail: brian.e.carpenter@gmail.com