Internet DRAFT - draft-tremblay-aponf-gap-analysis
draft-tremblay-aponf-gap-analysis
Network Working Group JF. Tremblay
Internet-Draft Viagenie
Intended status: Informational J. Bi
Expires: January 5, 2015 Tsinghua University
July 4, 2014
Application-based Policy for Network Functions Gap Analysis
draft-tremblay-aponf-gap-analysis-00
Abstract
As operators struggle to optimize their network for different
applications while maximizing network resources usage, there's
growing business pressure to minimize operational tasks and the
deployment time of new services.
New automation paradigms are meant to help reach these goals,
including the optimization of network functions through application
control. This control could be signaled directly by an application,
through a proxy or orchestrated in a centralized manner.
The current version of the Application-based Policy for Network
Functions (APONF) proposed working group mentions the NSIS framework
as a possible signaling protocol, through the definition of a new
NSIS Signaling Layer Protocol (NSLP). The present memo analyses if
this proposition is suitable for the designed purpose and if other
protocols would be more suitable.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 5, 2015.
Tremblay & Bi Expires January 5, 2015 [Page 1]
Internet-Draft APONF Gap Analysis July 2014
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Applicability to APONF Problem Statement . . . . . . . . . . 4
3. Gap Analysis for NSIS . . . . . . . . . . . . . . . . . . . . 4
3.1. Scope . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2. Mode of operation . . . . . . . . . . . . . . . . . . . . 4
3.2.1. Operation with NAT . . . . . . . . . . . . . . . . . 5
3.3. Data and State Reporting . . . . . . . . . . . . . . . . 5
3.4. Authentication, Authorization and Security . . . . . . . 5
3.5. Existing Implementations . . . . . . . . . . . . . . . . 5
4. Gap analysis for Netconf . . . . . . . . . . . . . . . . . . 6
5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 6
6. Security Considerations . . . . . . . . . . . . . . . . . . . 6
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6
9. Informative References . . . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
Network operators, including Internet Service Providers, Datacenters
operators and others, are under constant pressure to optimize the
usage of their installed network resources while maintaining high
availability and deploying new services at an ever-increasing pace.
The capabilities of the deployment teams are often already stretched
and scaling their efforts further while maintaining quality requires
significant efforts. The introduction of new paradigms aims at
reducing these efforts, optimize network resource usage and minimize
operational overhead.
Two of these paradigms are the virtualization of some network
functions (as discussed in the Service Function Chaining or SFC
Tremblay & Bi Expires January 5, 2015 [Page 2]
Internet-Draft APONF Gap Analysis July 2014
workgroup) and the automation in real time of network optimization
based on application needs. The latter may be realized by an
application signaling directly some needs to network elements in the
path using protocols such as RSVP or the NSIS framework.
If the application does not support natively such protocols, the
signaling function can be delegated to a proxy. This delegation to a
third party may incur some loss of functionality, as the proxy must
rely on the examination of flows to trigger signaling or use an out-
of-band mechanisms to exchange with the application.
A third possibility for the deployment of automated network
optimization is to use a centralized network management system. Some
functions such as access control and policy enforcement can be
simplified as they are implemented from a centralized point.
However, this technique requires previous knowledge and access to
network elements by the network management system. The usage of two
protocols is likely to be required, as the protocol requirements for
the application exchanging with the management system are different
than those of the management system exchanging with network elements.
The use of two independent protocols may be an opportunity to provide
isolation from the network implementation through an abstraction
layer, as discussed in the ACTN working group.
Three signaling protocols may therefore be used for application-based
network optimization:
1. A protocol for application signaling directly to network elements
(such as RSVP) and report back the related states.
2. A protocol for applications to signal their needs to a central
management system and get states from the network, possibly using
an abstracted view optimized for the application.
3. A protocol for the signaling between the central management
system and network elements, including the reporting of states.
The present memo provides an analysis of the applicability of the
NSIS framework and other protocols for the signaling cases described
at point 2 and 3 above. The NSIS framework could be used to provide
these functions through the addition of a new NSIS Signaling Layer
Protocol (NSLP). Other protocols such as Netconf are also
considered.
Tremblay & Bi Expires January 5, 2015 [Page 3]
Internet-Draft APONF Gap Analysis July 2014
2. Applicability to APONF Problem Statement
Although the NSIS framework [RFC4080] defines both path-decoupled (or
loosely coupled) and path-coupled modes of operation, subsequent work
such as GIST [RFC5971] have been designed to work mainly with network
elements located on the path taken by the data flow, as its
predecessor RSVP.
The NSIS framework is therefore well adapted to a scenario where an
application would signal its needs to network elements directly in
the data path (the first scenario described in the introduction).
However, according to the APONF problem statement document
[ID.karagiannis-aponf-problem-statement], the goal would be to have a
protocol between a management application and network devices (the
third scenario from the introduction).
According to [ID.karagiannis-aponf-problem-statement], the second
scenario where a protocol is used between an application and a
central management would not be in scope either, because some level
of abstraction would have to be presented by this protocol. The
generation of an abstract view of the network is described as out of
scope in the problem statement.
This document will therefore analyze the use of NSIS and other
protocols such as netconf only for the signaling between a central or
distributed management system/application and network elements (the
third scenario in the instrocution).
3. Gap Analysis for NSIS
3.1. Scope
NSIS has been designed to work across multiple administrative domains
and across the whole Internet. This does not preclude using it
within a single administrative domain. Although the APONF problem
statement does not state it explicitly, the APONF protocol would very
likely be used within a single administrative boundary.
3.2. Mode of operation
The NSIS framework and the related NSIS Transport Layer Protocol
(NTLP) GIST allow the presence of forwarding elements that are not
NSIS Entities (NE) and do not understand NSIS or GIST. The most
degenerated case where only two NEs exist is allowed. The management
system and a network element separated by multiple hops would be
allowed to become GIST adjacent.
Tremblay & Bi Expires January 5, 2015 [Page 4]
Internet-Draft APONF Gap Analysis July 2014
However the sender of the messages is also considered to be the
originator of the traffic, because GIST has been designed to be path-
coupled only. The data used for routing is the same than a NSIS Flow
Identifier. Both would have to be decoupled in GIST in order to be
used in APONF.
3.2.1. Operation with NAT
Although not mentioned in the APONF problem statement, it is possible
that the management application and the network elements are in
different IP domains and separated by one or multiple NAT devices.
Operation of NSIS through NAT devices may be problematic because flow
information is present in the signaling payload. This problem can be
circumvented using GIST-aware NAT implementations, a type or
application-level gateway (ALG) for NSIS.
In this case however any existing GIST ALG would have to be modified
in order not to interfere with the protocol. If flow information is
exchanged outside of the data path, the flow data is likely to use
another path through the network that may or not be within the same
IP domain and go through different NAT devices.
3.3. Data and State Reporting
The nature of the data being exchanged and the related messages are
defined in a NSIS Signaling Layer Protocol (NSLP). One or multiple
new NSLP would have to be defined in the context of APONF in order to
support the new parameters to be configured and reported on.
3.4. Authentication, Authorization and Security
Authentication and confidentiality features are built in the C-mode
of operation of GIST using TLS. This part could be used as-is by
APONF.
However authentication is performed per node only, against a database
of known IPs. If finer-grain authorization were required, for
example per user or per role, this would have to be added to GIST or
another NTLP.
3.5. Existing Implementations
Two experimental implementations of NSIS have been developed
independently. The first is called FreeNSIS and has been implemented
by a group from the Georg-August University of Goettingen. It was
last updated in July 2008.
Tremblay & Bi Expires January 5, 2015 [Page 5]
Internet-Draft APONF Gap Analysis July 2014
A second implementation is called NSIS-ka and is from the Karlsruhe
Institute of Technology (KIT). This implementation is more recent
and includes working NATFW and QoS NSLP. It is doubtful that the
interoperability of the two implementations was ever tested.
4. Gap analysis for Netconf
To be completed.
5. Conclusions
The NSIS framework and NSIS Transport Layer protocol GIST would
support operation between a management application and a network
elements separated by multiple hops. However GIST having been
designed for path-coupled operation only, it would need to be changed
significantly to support path-decoupled operation. Designing another
NTLP might be another option.
The design of one or many new NSLP would also be required, depending
of the type of information exchanged and required message types.
Overall, the NSIS framework could be used in the context of APONF,
but feature re-use would be minimal and the amount of modification
required important. Given that NSIS has shown very few independent
implementations and market traction, using it in the context of APONF
would probably involve a significant amount of work in design,
implementation and testing.
6. Security Considerations
Security considerations section to be completed.
7. IANA Considerations
No IANA considerations.
8. Acknowledgements
There are no acknowledgments in this version.
9. Informative References
[ID.cheng-aponf-ddc-use-cases]
Cheng, Y., Zhou, C., Karagiannis, G., and JF. Tremblay,
"Use Cases for Distributed Data Center Applicatinos in
APONF", June 2014.
Tremblay & Bi Expires January 5, 2015 [Page 6]
Internet-Draft APONF Gap Analysis July 2014
[ID.karagiannis-aponf-problem-statement]
Karagiannis, G., Liu, W., Tsou, T., Sun, Q., and D. Lopez,
"Problem Statement for Application Policy on Network
Functions (APONF)", June 2014.
[ID.sun-aponf-openv6-use-cases]
Xie, C. and Q. Sun, "Use case of IPv6 transition in
APONF", June 2014.
[RFC3726] Brunner, M., "Requirements for Signaling Protocols", RFC
3726, April 2004.
[RFC4080] Hancock, R., Karagiannis, G., Loughney, J., and S. Van den
Bosch, "Next Steps in Signaling (NSIS): Framework", RFC
4080, June 2005.
[RFC4081] Tschofenig, H. and D. Kroeselberg, "Security Threats for
Next Steps in Signaling (NSIS)", RFC 4081, June 2005.
[RFC5971] Schulzrinne, H. and R. Hancock, "GIST: General Internet
Signalling Transport", RFC 5971, October 2010.
[RFC5973] Stiemerling, M., Tschofenig, H., Aoun, C., and E. Davies,
"NAT/Firewall NSIS Signaling Layer Protocol (NSLP)", RFC
5973, October 2010.
[RFC5974] Manner, J., Karagiannis, G., and A. McDonald, "NSIS
Signaling Layer Protocol (NSLP) for Quality-of-Service
Signaling", RFC 5974, October 2010.
Authors' Addresses
JF Tremblay
Viagenie
Email: jean-francois.tremblay@viagenie.ca
Jun Bi
Tsinghua University
Network Research Center, Tsinghua University
Beijing 100084
China
Email: junbi@cernet.edu.cn
Tremblay & Bi Expires January 5, 2015 [Page 7]