Policy-based Service Management

Similar documents
TAIL-F SYSTEMS TECHNOLOGY BRIEF Creating and modifying network services using Tail-f NCS

SolarWinds Certified Professional. Exam Preparation Guide

APNIC elearning: BGP Basics. Contact: erou03_v1.0

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Layer 3 Network + Dedicated Internet Connectivity

Module 12 Multihoming to the Same ISP

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

OpenFlow and Software Defined Networking presented by Greg Ferro. Software Defined Networking (SDN)

Using the Border Gateway Protocol for Interdomain Routing

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Postgres Plus xdb Replication Server with Multi-Master User s Guide

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Ensuring End-to-End QoS for IP Applications. Chuck Darst HP OpenView. Solution Planning

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Open Unified Data Protection and Business Continuity Framework

Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus IBM Corporation

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

QAME Support for Policy-Based Management of Country-wide Networks

Cisco Active Network Abstraction 4.0

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Hitachi HiCommand Storage Services Manager Software. Partner Beyond Technology

BGP-4 Case Studies. Nenad Krajnovic.

Configuring a Basic MPLS VPN

Instant YANG. The Basics. Hakan Millroth, Tail- f Systems ( hakan@tail- f.com)

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks

Question/Answer Transaction Protocol Overview First Committee Working Draft NISO Committee AZ: September 22, 2003

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares

EMC CENTERA VIRTUAL ARCHIVE

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Border Gateway Protocol Best Practices

Using OSPF in an MPLS VPN Environment

Configuring Auto Policy-Based Routing

Various Alternatives to achieve SDN. Dhruv Dhody, Sr. System Architect, Huawei Technologies

Configurable device discovery. Belgrade University Computer Centre, Serbia

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Card Commands on page 795 MDA Commands on page 796 Threat Management Service Interface Commands on page 797 Policy Commands on page 801

NNMi120 Network Node Manager i Software 9.x Essentials

Managing a Fibre Channel Storage Area Network

"Charting the Course...

IxNetwork TM MPLS-TP Emulation

Demonstrating the high performance and feature richness of the compact MX Series

Introduction Inter-AS L3VPN

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

Better management of large-scale, heterogeneous networks toward a programmable management plane

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer

basic BGP in Huawei CLI

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Table of Contents. Testimonials from the MDM Alliance Group... Introduction to MDM...

MPLS VPN Implementation

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Introduction to Software Defined Networking

Microsoft Technologies

Link-State Routing Protocols

Cisco CRS-1/IOS-XR Device Management 3.5.2: Based on Cisco Active Network Abstraction Software

Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Networking Devices Part 2

BGP Link Bandwidth. Finding Feature Information. Contents

Appendix A Remote Network Monitoring

Oracle Data Integrator 12c: Integration and Administration

<Insert Picture Here> Oracle SQL Developer 3.0: Overview and New Features

Oracle Data Integrator 11g: Integration and Administration

Real-time Data Replication

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

Principal MDM Components and Capabilities

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

White Paper. Requirements of Network Virtualization

How To Learn Cisco Cisco Ios And Cisco Vlan

mbits Network Operations Centrec

Designing and Implementing a Server Infrastructure

Using Oracle Data Integrator with Essbase, Planning and the Rest of the Oracle EPM Products

WHITEPAPER. Bringing MPLS to Data Center Fabrics with Labeled BGP

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

Implementation of Business Linux Routers

Multiprotocol Label Switching Load Balancing

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines. A.Zydroń 18 April Page 1 of 12

Next-Gen Securitized Network Virtualization

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Transcription:

Policy-based Service Management John Strassner Masaki Fukushima draft-bi-supa-policy-model draft-zaalouk-supa-vpn-service-management-model

Agenda PBSM and Its Relation to SUPA Policy Terminology Types of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management Policy-based Service Management Page 2

What Is PBSM? Service Model Describes the service as a managed object Describes relationships to other managed objects, such as resources, configurations, customers, and SLAs Policy Model Defines rules for governing managed objects Defines representation for rules Can be used to govern service relationships SUPA Defines how policy rules are used to manage service behavior Policy-based Service Management Page 3

SUPA Policy-based Services Deliverable #2: A Yang data model that describes network services, their resource requirements as well as service specific parameters. : SUPA scope Service Manager Service Data Model Policy Data Model RESTCONF / NETCONF Deliverable #3: A Yang data model that specifies policy rules controlling a network service. GoalPolicy 1 GoalPolicy i GoalPolicy j ECAPolicy 1 ECAPolicy p ECAPolicy q ECAPolicy r ECAPolicy x More Abstract More Concrete Network Manager (Controller) Topology Data Model Network Manager (Controller) Topology Data Model Network Elements (routers, switches, etc) Network Elements (routers, switches, etc) Policy-based Service Management Page 4

Agenda PBSM and Its Relation to SUPA Policy Terminology Types of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management Policy-based Service Management Page 5

Terminology An Information Model A representation of managed objects and their relationships that is independent of data repository, language, and protocol A Data Model A representation of managed objects and their relationships that is dependent on data repository, language, and/or protocol (typically all three) A Policy Rule A container that 1. uses metadata to define how the content is interpreted, and hence, how the behavior that it governs is defined 2. separates the content of the policy from its representation 3. provides a convenient control point for OAMP operations Policy-based Service Management Page 6

Information Model Independent of Independent of vendor, language, protocol, and Vendor-, Platform,- Language-, and Protocol- Neutral Data Model (RDBMS) Data Model (NoSQL) Data Model (Directory) Independent of Independent of vendor; dependent protocol, on language, and protocol, repository and Vendor- Independent; Platform-, Language-, and Protocol- Specific Data Model (Oracle PL/SQL) Data Model (Microsoft T- SQL) Data Model (PostgreSQL PL/pgSQL) Dependent on vendor, Vendor-, Dependent Platform,- language, on Language-, and vendor, protocol, language, and Protocol- Specific protocol, repository and Policy-based Service Management Page 7

Agenda PBSM and Its Relation to SUPA Policy Terminology Types and Uses of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management Policy-based Service Management Page 8

Motivation for Policy Management The usage of policy rules to manage the behavior of one or more managed entities Policy rules are half of the solution The other half is the mechanism used to effect governance (e.g., state automata) Policy is about governance, and can be expressed differently: When this threshold is violated, change the type of queuing used Provide Gold Service users the opportunity to upgrade to Platinum Service for ½ the price Policy provides a scalable automation implementation mechanism, which involves: Issuing changes to one or more entities Controlling how changes are being delivered Coordinating which entities are being changed when and in what order Policy-based Service Management Page 9

Why Multiple Types of Policy Rules? It s all bad! What to do? Gold: IF (RT G > 100 msec) THEN (Increase CPU G by 5%) Gold-Silver Tradeoff Silver: IF (RT S > 200 msec) THEN (Increase CPU S by 5%) 1 There are different types of policy rules; SUPA will initially consider two It s all good! What is best? Conflict: Gold/Silver Tradeoff What to do? Policy-based Service Management Page 10

Types of Policy Rules (1) Event-Condition-Action (ECA) IF the clause of Events evaluates to TRUE» IF the clause of Conditions evaluates to TRUE o THEN execute the clause of Actions Explicit programming of state (rationality is compiled into the policy!) Policy-based Service Management Page 11

Types of Policy Rules (2) Goal (Intent) Express what should be done, not how to do it Specifies criteria for choosing a set of states, any of which is acceptable Rationality is generated by optimizer/planner Policy-based Service Management Page 12

Agenda PBSM and Its Relation to SUPA Policy Terminology Types and Uses of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management Policy-based Service Management Page 13

Policy Continuum SUPA interface loopback 0 ip address 130.93.2.1 255.255.255.255 interface POS 3/0 ip address 130.93.1.1 255.255.255.0 ip ospf cost 1 ip ospf hello-interval 5 router bgp 100 network 130.93.0.0 neighbor internal peer-group neighbor internal remote-as 100 neighbor internal update-source loopback 0 neighbor internal route-map set-med out neighbor internal filter-list 1 out neighbor internal filter-list 2 in neighbor 171.69.232.53 peer-group internal neighbor 171.69.232.54 peer-group internal neighbor 171.69.232.55 peer-group internal router ospf 100 network 130.93.0.0 0.0.255.255 area 0.0.0.0 route-map set-med 10 permit match as-path 1 naming, restrictions, etc. Business View: SLAs, Processes, Guidelines, and Goals Policy Policy System View: Device- and Technology-Independent Operation Network View: Device- Independent, Technology -Specific Operation and ECA Device View: Device- and Technology-Specific Operation Policy-based Service Management Instance View: Device-Specific MIBs, PIBs, CLI, etc. Implementation Page 14

PBSM Architecture Policy Domain Policy Language Translation Policy Validation (Local Conflict Resolution) Policy Applications Policy Creation and Editing Event Bus Policy Repository Policy Broker Policy Verification Policy Execution Policy Decisions Protocol and Information Exchange Requirements Ø A protocol for encoding logic definitions is needed Ø Policy editing should use simple text or XML Ø So should policy translation Ø Policy apps and brokers, along with policy decision, execution, and verification, may need richer forms of information transfer Other Policy Domains Extracted from TM Forum TR234 Information Model Snapshot R14.5.0 Policy-based Service Management Page 15

Agenda PBSM and Its Relation to SUPA Policy Terminology Types and Uses of Policy Rules Use of Policy Rules by Different Actors SUPA Policy Service Management Policy-based Service Management Page 16

VPN Service Management Data Model Summary draft-zaalouk-supa-vpn-service-management-model defines a VPN service management Yang data model VPN management model is designed for DDC services» Defines DDC service initiation, VPN-based connectivity initiation, and other required services Status Several details need to be further worked out Integration with other SUPA drafts needs to be done» Integration with a generic service data model» Integration with a generic policy rule model Some comments received from mailing list, and will be addressed in the next version of the draft Policy-based Service Management Page 17

Policy and VPN Service Management develop a model that abstracts network resources and services and a methodology by which the management and monitoring of network services can be done using standardized policy rules Currently Out-of-Scope Information Model System Information Model Policy Information Model Service Yang Data Model ECA Policy Yang Data Model Intent-based Policy Govern Yang Data Model Service Currently Not Started Govern Govern Currently In Scope Govern Yang Data Model VPN Service Policy-based Service Management Page 18

VPN Service Management Data Model DDC model describes SUPA VPN management model designed for DDC services use case Module ietf-supa-ddc defines generic VPN management aspects that are common to all DDC services use case regardless of the type of vendor This module can be viewed as providing a generic VPN management for DDC services Update: focusing more about DDC info by removing the duplicated part of VPN initiation module: ietf-supa-ddc +--rw ddc-service +--rw ddc-service* [name] +--rw name string +--rw tenant-name string +--rw dc-name* string +--rw interface-name* string +--rw connection-type? enumeration +--rw connection-name string +--rw vlan-id? uint16 +--rw bandwidth uint32 +--rw latency uint32 Policy-based Service Management Page 19

VPN Service Management Data Model L3VPN model A Layer 3 Virtual Private Network (L3VPN) interconnects sets of hosts and routers based on Layer 3 addresses and forwarding. A L3VPN model is a collection of L3VPN instances, which contains a set of access interfaces to network devices as well as other attributes, such as routing protocol, address family, topology, and so on. To configure a L3VPN instance, the administrator needs to specify» which port(s) of a network device belongs to a L3VPN instance.» what routing protocol needs to be configured for a L3VPN instance. module: ietf-supa-l3vpn +--rw l3vpn-instance* [instance-name] +--rw instance-name string +--rw servic-type? enumeration +--rw address-family-type? enumeration +--rw access-interface-id* [access-interfaceid] +--rw access-interface-id string +--rw access-interface-address string +--rw ip-address-mask-length uint8 +--rw role enumeration +--rw user-name string +--rw user-password string +--rw physical-node-id string +--rw physical-access-interface string +--rw protocol +--rw protocol-type? enumeration +--rw igp-attribute +--rw protocol-id? uint32 +--rw bgp-attribute +--rw remote-as-number? string +--rw remote-peer-address string Policy-based Service Management Page 20

Service Profiles Service Profile draft-ph-supa-alps-yang-dm-00 represents the service as consumed by the Customer as a Yang data model Yang Data Model ECA Policy Forms a hierarchy of service profiles Supplies customer-defined configuration data for Services Policy-based Service Profiles Policy can be applied to Services and Service Profiles» Controls semantics of which Customers can use which set of Service Profiles in what context govern Yang Data Model Service inherit Yang Data Model VPN Service govern govern aggregation Yang Data Model Intent-based Policy govern Yang Data Model Service Profile inherit Yang Data Model VPN Service Profile Policy-based Service Management Page 21

Questions?! Questions? Create like a god. Command like a king. Work like a slave - Constantin Brancusi Policy-based Service Management Page 22