Internet DRAFT - draft-peng-p2psip-network-management-scenarios
draft-peng-p2psip-network-management-scenarios
P2PSIP Y. Peng
Internet-Draft W. Wang
Intended status: Informational ZTE Corporation
Expires: March 9, 2012 J. Peng
L. Le
China Mobile Communication
Corporation
Z. Hao
Y. Meng
ZTE Corporation
September 6, 2011
Network Management Scenarios for RELOAD
draft-peng-p2psip-network-management-scenarios-03
Abstract
The RELOAD protocol can be applied in different kinds of scenarios,
including the Internet, carrier's dedicated network, enterprise
network, etc. This document summarizes the network management
scenarios by analyzing typical application model for each of the
above three kinds of scenarios.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 9, 2012.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Peng, et al. Expires March 9, 2012 [Page 1]
Internet-Draft Network Management Scenarios for RELOAD September 2011
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Network Management Scenarios for RELOAD Applied on The
Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Network Management Scenarios for RELOAD Applied on
Carrier's Dedicated Network . . . . . . . . . . . . . . . . . 4
5. Network Management Scenarios for RELOAD Applied on
Enterprise Network . . . . . . . . . . . . . . . . . . . . . . 7
6. Summary of the Network Management Scenarios for RELOAD . . . . 8
7. Relationship between Network Management Protocol and
Diagnostic Protocol . . . . . . . . . . . . . . . . . . . . . 10
8. Security Considerations . . . . . . . . . . . . . . . . . . . 10
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11
11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11
11.1. Normative References . . . . . . . . . . . . . . . . . . 11
11.2. Informative References . . . . . . . . . . . . . . . . . 11
Appendix A. Additional Stuff . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12
Peng, et al. Expires March 9, 2012 [Page 2]
Internet-Draft Network Management Scenarios for RELOAD September 2011
1. Introduction
The RELOAD protocol is a peer-to-peer (P2P) signaling protocol, which
provides an abstract storage and messaging service between a set of
cooperating peers that form the overlay network. It can be applied
in different kinds of scenarios, including the Internet, carrier's
dedicated network, enterprise network, etc. This document summarizes
the network management scenarios by analyzing typical application
model for each of the above three kinds of scenarios.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
We use the terminology and definitions from Concepts and Terminology
for Peer to Peer SIP [I-D.ietf-p2psip-concepts] and the RELOAD Base
Protocol [I-D.ietf-p2psip-base] extensively in this document.
SNMP: Simple Network Management Protocol.
3. Network Management Scenarios for RELOAD Applied on The Internet
There are a variety of application models for RELOAD on the Internet,
this document only analyses one of the typical application model
named "Public P2P VoIP Service Providers" [cite P2PVoIP scenario].
As stated in the draft of application scenarios for RELOAD,
centralized operation and management is required for RELOAD in this
application model. Here we will analyse two aspects of the network
management requirements for this application model.
From the viewpoint of the service provider, they need to ensure
network stability and efficient operation. On the one hand, the
provider needs to monitor and control their own devices, and view
network utility and load of the devices; on the other hand, because
of its openness to user nodes, it is necessary to prevent malicious
user nodes from attacking the service network and abnormal user nodes
from disturbing the service network, so the action of user nodes need
be monitored and controlled. Furthermore, human intervention may be
needed when the built-in mechanisms in RELOAD is not able to solve
the network problems.
From the viewpoint of administrator of enterprise users who use the
service from the public P2P VoIP service provider, they need to
ensure their own network security, defense external network attacks
Peng, et al. Expires March 9, 2012 [Page 3]
Internet-Draft Network Management Scenarios for RELOAD September 2011
and viruses; It is needed to prevent commercial secret leakage; It is
also needed to limit user function to prevent misuse enterprise VoIP
services; It is needed to reasonably distribute traffic flows to
improve user experience using limited bandwidth. As an example,
Skype plans to provide administration tools for enterprise users to
resolve the problem that Skype may be blocked by enterprise networks.
(Note: This quotes from http://www.best-voip-review.com/news/
2010_06_Skype_offers_network_management_tools_to_control_their_softwa
re.htmlz)
According to the above requirements, we put forward the following
network management scenarios for RELOAD used on the Internet:
a. Monitoring and controlling the service provider's own devices,
such as viewing and modifying the configuration parameters of the
devices, monitoring the load and running state of accessed
nodes(or super nodes) and the number of client nodes that access
accessed nodes(client nodes include RELOAD client and application
client).
b. Viewing and collecting various network data, such as routing
table, the data stored in nodes, real-time status information of
nodes, in order to find out the operational status of the
network, such as capacity of network, quality of service, network
topology information. These are the decision-making basis for
optimization and adjustment of the network.
c. Alarm for abnormal events, such as congestion, message process
failures, routing failures, link failures, etc.
d. Disposal of abnormal nodes, for example, finding illegal user
nodes and forcing it to exit the network, finding fault nodes
that can't perform RELOAD related responsibilities and requiring
them to rejoin or forcing them to quit. These ensure the health
of the network.
e. Providing network management tool for enterprise users. The
administrator of the enterprise may control specific data flow
through RELOAD nodes, and limit application functions, and
configure the communication port by this tool.
4. Network Management Scenarios for RELOAD Applied on Carrier's
Dedicated Network
DHT-based VoIP service is studied in DSN project of ITU-T (SG13 Q19).
Its architecture and processes were developed by referring RELOAD.
Although it has not yet been clearly adopted which protocol will be
Peng, et al. Expires March 9, 2012 [Page 4]
Internet-Draft Network Management Scenarios for RELOAD September 2011
adopted in the project, but it is feasible that RELOAD is used here.
And it is very possible that RELOAD is adopted by the VoIP service of
DSN. The following figure is the architecture figure defined in DSN.
+-----------------------------------------------+ +---------+
| /-------\ /-------\ | | |
| | TOCF |---- -----| NEF | | |Managemet|
| \-------/ | | \-------/ | | plane |
| | | | | |
| | | | | |
| /------\ /-------\ /------\ | | |
| | |-----| SCF |--| | | | |
| | | \-------/ | RLF | | |/------\ |
| | | | | ----| |---------- |------|| MF | |
| | | | | | \------/ | | |\------/ |
| | EF | | -------------------- | | | |
| | | | | | | | | |
| | | /-------\ /-------\ | | |
| | |*****| CDF |*************| | | | |
| | | \-------/ | RF | | | |
| | |***************************| | | | |
| \------/ \-------/ | | |
+-----------------------------------------------+ +---------+
RLF in the above figure is equivalent to the peer of RELOAD. And NEF
is equivalent to the Enrollment server of RELOAD. And MF is the
function of network management. The specific descriptions of every
function are as follows:
RLF (Resource Location Functions):
Resource registration;
Locate resources (content, Relay Node, subscription data, service
capability, etc.);
Store and maintain resource information;
Routing of DSN message;
Construction and management (such as updating routing tables,
transferring resources when a new node joins the overlay network, and
so on.)of overlay network;
Retrieve optimization information from TOCF(Traffic Optimization
Control Functions).
Peng, et al. Expires March 9, 2012 [Page 5]
Internet-Draft Network Management Scenarios for RELOAD September 2011
NEF (Node Enrolment Functions):
Provide bootstrap information for the DSN Node to join the DSN;
Assign globally unique Node ID to the DSN Nodes;
Configure parameters and information related to joining of the DSN
Node;
Apply Authentication/Authorization to DSN Node;
Maintain the Node profile of all enrolled nodes (e.g. Node ID, Zone
information and etc), which can be requested by RLF;
MF (Management Functions):
DSN network and service administration
DSN monitoring and diagnosis
Statistics and Accounting which includes collection of information
related to usage and contribution of DSN services.
It is a telecom class application network built by telecom operators,
and the Management Function is clearly defined in the architecture
draft so as to achieve network management. In this kind of
applications, the core network devices are provided by telecom
operators. As the number of the devices is large and network
topology changes frequently, it is very difficult to manage devices
one by one, so the need for centralized operation and management is
obvious. Moreover, the existing telecom networks were equipped with
the appropriate network management systems. In this kind of
application model, we will analyze the needs for network management
mainly from the perspective of network operators:
Firstly, in order to ensure network stability and efficient
operation, the network operators need to monitor and control the
network devices to ensure utility and load of the core devices.
Secondly, the network operators need to effectively locate failure
when an exception occurs in the system.
For these requirements, we propose the following specific network
management scenarios:
a. Monitoring and controlling network devices. Such as viewing and
modifying the configuration parameters of the devices, monitoring
load and running state of the devices, controlling the functions
Peng, et al. Expires March 9, 2012 [Page 6]
Internet-Draft Network Management Scenarios for RELOAD September 2011
and roles of these devices in the network.
b. Viewing and collecting various network data, such as routing
table, the data stored in nodes, real-time status information of
nodes, in order to find out the operational status of the
network, such as the capacity of network, the quality of service,
network topology information. These are the decision-making
basis for network optimization and adjustment.
c. Abnormal nodes alarm, such as congestion, message process
failures, routing failures, link failures, etc.
d. When an exception occurs, the operators may find the location and
the cause of failure by tracing process flow and signaling or
doing diagnostic test. It will provide effective help to resolve
the failure.
5. Network Management Scenarios for RELOAD Applied on Enterprise
Network
RELOAD can be applied in a variety of application models in
controlled private network, which was put forward in the draft of
application scenarios for RELOAD. The need for centralized operation
and management was clearly stated in the application model named "P2P
for Redundant SIP Proxies" in this draft. This document analyses the
need of network management only for this kind of application model.
Firstly, in order to ensure network stability and efficient
operation, the IT department of enterprise needs to monitor and
control network devices to ensure reasonable utilization rate and no
overload.
Secondly, the IT department of enterprise needs to ensure the network
security, to defense external network attacks and viruses; It is
needed to prevent commercial secret leakage; It is needed to limit
user functions to prevent misuse of network resources; It is needed
to reasonably distribute traffic flows to improve the user's
experience under the limited bandwidth.
Thirdly, the network operators need to effectively locate failure
when an exception occurs in the system.
For these requirements, we propose the following specific network
management scenarios:
Peng, et al. Expires March 9, 2012 [Page 7]
Internet-Draft Network Management Scenarios for RELOAD September 2011
a. Monitoring and controlling the network devices, such as viewing
and modifying the configuration parameters of the devices,
monitoring load and running state of the accessed nodes(or super
nodes) and the number of client nodes that access accessed
nodes(client nodes include RELOAD Client and Application Client).
b. Viewing and collecting various network data, such as routing
table, the data stored in nodes, real-time status information of
nodes, in order to find out the operational status of the
network, such as the capacity of the network, the quality of
service, network topology information. These are the decision-
making basis for optimization and adjustment of the network.
c. Abnormal nodes alarm, such as congestion, message process
failures, routing failures, link failures, etc.
d. Disposal of abnormal nodes, for example, finding illegal user
nodes and forcing it to exit the network, finding fault nodes
that can't perform RELOAD related responsibilities and requiring
them to rejoin or forcing them to quit, and doing corresponding
treatment. These ensure the health of the network.
e. The manager may control specific data flow through RELOAD nodes,
and limit application functions, and configure the communication
port, in order to control the actions of users.
f. When an exception occurs, the operators may find the location and
the cause of failure by tracing process flow and signaling or
doing diagnostic test. It will provide effective help to resolve
the failure.
6. Summary of the Network Management Scenarios for RELOAD
Differences Among These Scenarios
Peng, et al. Expires March 9, 2012 [Page 8]
Internet-Draft Network Management Scenarios for RELOAD September 2011
+---------------+-------------+----------------+---------------+
| Applications| | | |
| Category| Internet | Carrier's | Enterprise |
|Network | | Dedicated | Network |
|Management | | Network | |
|Scenarios | | | |
+---------------+-------------+----------------+---------------+
| Applications |"Public P2P |Carrier's |"P2P for |
| Scenarios |VoIP Service |dedicated |Redundant |
| |Providers" |network |SIP Proxies" |
| |in the RELOAD|application |in the RELOAD |
| |scenarios |in the DSN |scenarios draft|
| |draft |project of ITU-T| |
+---------------+-------------+----------------+---------------+
| Monitoring | | | |
| Dedicated | Y | Y | Y |
| Device | | | |
+---------------+-------------+----------------+---------------+
| Viewing | | | |
| Network | Y | Y | Y |
| Data | | | |
+---------------+-------------+----------------+---------------+
| Fault | | | |
| Alarming | Y | Y | Y |
| | | | |
+---------------+-------------+----------------+---------------+
| Disposing | | | |
| Malicous/Fault| Y | | Y |
| User Nodes | | | |
+---------------+-------------+----------------+---------------+
| Controlling | | | |
| User Node | Y | | Y |
| | | | |
+---------------+-------------+----------------+---------------+
| | Y | | |
| |(It is said | | |
|Troubleshooting|that Skype | Y | Y |
| Quickly |will provide | | |
| |this tool to | | |
| |solve the | | |
| |problem of | | |
| |blocking by | | |
| |enterprise) | | |
+---------------+-------------+----------------+---------------+
| Control Level | | | |
| of Network | Loose | Strict | Medium |
| Management | | | |
+---------------+-------------+----------------+---------------+
Peng, et al. Expires March 9, 2012 [Page 9]
Internet-Draft Network Management Scenarios for RELOAD September 2011
According to above analysis, we think whether RELOAD is applied on
the Internet or carrier's dedicated network or enterprise network,
network management is always involved in some application models and
scenarios. So it is necessary to study the network management
solution for RELOAD and to define its corresponding implementation
protocol.
7. Relationship between Network Management Protocol and Diagnostic
Protocol
A diagnostic mechanism was proposed in [I-D.ietf-p2psip-diagnostics],
which is an extension to RELOAD protocol and defines the method how
to monitor the connection between peers and the node status. While
the SNMP usage for reload protocol focus on how to apply SNMP to
manage DHT overlay considering its particular network circumstance.
There are some correlations between the network management protocol
and the diagnostic protocol. But they are applied respectively
between different network elements. The network management protocol
is used between the network management server and the managed peers.
The diagnostic protocol is used between two peers in the overlay.
These two protocols can fulfill network management functions through
collaboration. For example, the network management server sends SNMP
message to Peer to trigger diagnostic operation. After RELOAD Peer
receives the message, it will do diagnostic test through RELOAD
diagnostic message and generate result data. Finally, this REOAD
Peer will report the diagnostic result to the network management
server through SNMP message.
8. Security Considerations
The security requirements of SNMP Usage for RELOAD are same as the
security requirements of SNMP [RFC3414].
1. Provide for verification that each received SNMP message has not
been modified during its transmission through the network.
2. Provide for verification of the identity of the user on whose
behalf a received SNMP message claims to have been generated.
3. Provide for detection of received SNMP messages, which request or
contain management information, whose time of generation was not
recent.
4. Provide, when necessary, that the contents of each received SNMP
message are protected from disclosure.
Peng, et al. Expires March 9, 2012 [Page 10]
Internet-Draft Network Management Scenarios for RELOAD September 2011
9. IANA Considerations
This document has no IANA Considerations.
10. Acknowledgments
This draft is based on "REsource LOcation And Discovery (RELOAD) Base
Protocol" draft by C. Jennings, B. Lowekamp, E. Rescorla, S. Baset
and H. Schulzrinne.
This draft make a reference to "Application Scenarios for Peer-to-
Peer Session Initiation Protocol" draft by D. Bryan, E. Shim, B.
Lowekamp, S. Dawkins, Ed.
Thanks to the many people of the IETF P2PSIP WG whose many drafts we
have learned.
11. References
11.1. Normative References
[I-D.ietf-p2psip-app-scenarios]
Bryan, D., Shim, E., Rescorla, E., Lowekamp, B., Dawkins,
S., and Ed. , "Application Scenarios for Peer-to-Peer
Session Initiation Protocol", November 2007.
[I-D.ietf-p2psip-base]
Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., and
H. Schulzrinne, "REsource LOcation And Discovery
(RELOAD)Base Protocol", November 2010.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3414] Blumenthal, U. and B. Wijnen, "User-based Security Model
(USM) for version 3 of the Simple Network Management
Protocol (SNMPv3)", STD 62, RFC 3414, December 2002.
11.2. Informative References
[I-D.ietf-p2psip-concepts]
Bryan, D., Matthews, P., Shim, E., Willis, D., and S.
Dawkins, "Concepts and Terminology for Peer to Peer SIP",
July 2008.
[I-D.narten-iana-considerations-rfc2434bis]
Peng, et al. Expires March 9, 2012 [Page 11]
Internet-Draft Network Management Scenarios for RELOAD September 2011
Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs",
draft-narten-iana-considerations-rfc2434bis-09 (work in
progress), March 2008.
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
June 1999.
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC
Text on Security Considerations", BCP 72, RFC 3552,
July 2003.
Appendix A. Additional Stuff
Authors' Addresses
YongLin Peng
ZTE Corporation
Nanjing, 210012
China
Phone: +86 13776637274
Email: peng.yonglin@zte.com.cn
Wei Wang
ZTE Corporation
Nanjing, 210012
China
Phone: +86 13851658076
Email: wang.wei108@zte.com.cn
Jin Peng
China Mobile Communication Corporation
Beijing,
China
Phone: +86 13911281193
Email: pengjin@chinamobile.com
Peng, et al. Expires March 9, 2012 [Page 12]
Internet-Draft Network Management Scenarios for RELOAD September 2011
LiFeng Le
China Mobile Communication Corporation
Beijing,
China
Phone: +86 13910019925
Email: lelifeng@chinamobile.com
ZhenWu Hao
ZTE Corporation
Nanjing, 210012
China
Phone: +86 13382087596
Email: hao.zhenwu@zte.com.cn
Meng Yu
ZTE Corporation
Nanjing, 210012
China
Phone: +86 18651806839
Email: meng.yu@zte.com.cn
Peng, et al. Expires March 9, 2012 [Page 13]