Internet DRAFT - draft-chen-nmrg-ibn-management

draft-chen-nmrg-ibn-management







Internet Research Task Force                                     D. Chen
Internet-Draft                                                    K. Yao
Intended status: Informational                              China Mobile
Expires: 14 September 2023                                       C. Yang
                                                                   X. Mi
                                                               Y. Ouyang
                                                       Xidian University
                                                           13 March 2023


            Network Management Intent -One of IBN Use Cases
                   draft-chen-nmrg-ibn-management-00

Abstract

   Full life cycle network management will be a key feature of the
   future communication networks.  Meanwhile, the complexity of the
   network management should be reduced and the network expects to be
   managed in a fully automated manner with humans out of the loop.  In
   this document, we propose an use case of intent based network
   management to achieve more flexible , convenient, and efficient
   network management.  In this use case, we propose an architecture and
   attempt to illustrate the five levels of achieving full autonomous
   network management.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 14 September 2023.




Chen, et al.            Expires 14 September 2023               [Page 1]

Internet-Draft            Network Working Group               March 2023


Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Definitions and Acronyms  . . . . . . . . . . . . . . . . . .   3
   3.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Advantages  . . . . . . . . . . . . . . . . . . . . . . . . .   7
   5.  Concrete Example  . . . . . . . . . . . . . . . . . . . . . .   7
   6.  Automated Network Management Tiers  . . . . . . . . . . . . .   7
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   9.  Normative References  . . . . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   With the rapid evolution of networks, such as the emergence of the
   sixth generation (6G), we have entered a new digital era that is
   ubiquitously connected by highly heterogeneous and dynamic network
   infrastructure.  And various network applications are predicted to
   appear more in future communication networks.  With these complex
   network scenarios, services, and uncountable degrees of freedom in
   future communication networks, the complexity of network management
   will increase drastically.  Traditional network management methods
   are insufficient to keep up with the growing requirements.  Firstly,
   there exists high complexity and difficulty to manage a large amount
   of infrastructures due to high labor cost, high error probability,
   low management efficiency.  Secondly, traditional network management
   lacks closed-loop control, which can not find and repair faults in
   time.  To overcome these challenges, some novel network models have
   been proposed, such as NFV and SDN.  However, it still faces many
   novel challenges:






Chen, et al.            Expires 14 September 2023               [Page 2]

Internet-Draft            Network Working Group               March 2023


      Tight coupling of network and service applications: Traditional
      network management methods cannot solve the diverse cross-domain
      service requirements in future communication networks

      High configuration complexity and scaling cost: Future
      communication networks will have a huge network scale, different
      kinds of network resources, and constantly changing topology.
      This will result in a high network configuration complexity and
      cannot be configured in a timely and efficient manner.  A smart
      and simple network management architecture is required for rapid
      deployment of network service requirements

      Fragile performance provision and policy robustness: In future
      communication networks, it need to continuously improve the
      network system model based on the experienced knowledge of
      administrators.  And real-time verification and feedback
      mechanisms are required for network runtime.

      Lack of full life cycle verification of policy resilience: Manual
      management has several shortcomings, such as high error
      probability, long fault location time, and expensive labor costs.
      Fortunately, full life cycle verification can reduce the failure
      recovery time, monitor network operation, and maintain the whole
      process while enhancing the accuracy of policy configuration and
      the robustness of policy implementation.

   At the same time, with the exponential growth of network devices,
   network administrators need to put in tremendous effort to manage the
   policies that affect the services of these devices.  While in recent
   years the network management methods have been gradually automated,
   there are still many procedures that must be accomplished under the
   strict supervision of administrators, resulting in high error
   probability.  Moreover, current network management is at a level too
   low to entirely eliminate the requirements to customize each solution
   for a specific device or protocol in use.  The emergence of the IBN,
   as defined in RFC 9315 [RFC9315], has the potential to compensate for
   the limitations of the current network management methods.  The
   intent is a high-level abstraction of policy, and the IBN is a way to
   manage the network through intent-driven rather than a low-level
   configuration.  When the user specifies a high-level goal (intent),
   the network automatically converts that goal into policies and
   automatically deploys these policies throughout the network.

2.  Definitions and Acronyms

   IBN: Intent based network

   IBNM: Intent based network management



Chen, et al.            Expires 14 September 2023               [Page 3]

Internet-Draft            Network Working Group               March 2023


   DQN: Deep Q network

3.  Overview

   Driven by the above requirements and challenges, the intent based
   network management (IBNM) is proposed.  IBNM aims to transition from
   a fully static manual network management to a fully dynamic
   autonomous intent based network management.  In IBNM, users express
   their service requirements or goals in a declarative manner without
   paying attention to how the network achieves them.

   The architecture is shown as Fig 1, which includes the application
   layer, the intent-enabled layer and the infrastructure layer.  The
   application layer collects intents from various users and
   applications, and provides a number of programmable network
   management services.  The intent-enabled layer consists of the intent
   translation module, intelligent policy mapping module, and intent
   guarantee module, whose functions are to build a bridge between the
   application layer and the infrastructure layer.  Heterogeneous
   physical devices are deployed in the infrastructure layer.  This
   layer can execute management instructions from the intent-enabled
   layer and upload underlying network situation information to the
   intent-enabled layer.  Information interaction between different
   layers is done through different interfaces, such as the northbound
   and southbound interfaces.


























Chen, et al.            Expires 14 September 2023               [Page 4]

Internet-Draft            Network Working Group               March 2023


     +----------------------------------------+
     |          Application   Layer           |
     +-------------+---------^----------------+
   Intent Ingestion|         | Northbound Interface
     +-------------+---------v----------------+
     |             |      Intent-enabled Layer|
     | +-----------+-------+  +-------------+ |
     | |           |       |  |             | |
     | |  +--------v----+  |  |             | |
     | |  | Translation |  |  |             | |
     | |  +-------------+  |  |             | |
     | |                   |  | Intelligent | |
     | |  +-------------+  |  |             | |
     | |  | Verification|  |  |  Guarantee  | |
     | |  +-------------+  |  |             | |
     | |Intent Translation |  |    Module   | |
     | |      Module       |  |             | |
     | +-------------------+  |             | |
     |                        |             | |
     | +-------------------+  |             | |
     | |Intelligent Policy |  |             | |
     | |  Mapping Module   |  |             | |
     | +-------------------+  +-------------+ |
     |                                        |
     +--------------------^-------------------+
                          |  Southbound Interface
     +--------------------v-------------------+
     |         Infrastructure Layer           |
     +----------------------------------------+

                     Figure 1: The Architecture of IBNM

   Among these layers, the intent-enabled layer is the core of this
   network management architecture.  First, the intent translation
   module translates declarative intent (expressed in the form of
   natural language) into the network intent that can be recognized by
   the system (specific ).  There may be an intent conflict problem when
   multiple intents are input simultaneously.  Thus, the intent
   translation module executes intent verification and intent conflict
   resolution before the intent is issued (measurable).  Second, the
   intelligent policy mapping module provides customized policies
   (achievable) for specific intents according to various requirements
   and evaluates the current policy by rewarding values.  After that, in
   order to complete the policy configuration within the time-bound, the
   intent guarantee module is needed to execute feature extraction and
   location on the collected alarm information.  Then the fault
   information is fed back to the intelligent policy mapping module.




Chen, et al.            Expires 14 September 2023               [Page 5]

Internet-Draft            Network Working Group               March 2023


   Based on the above design, on one hand, this architecture can achieve
   full lifecycle automated network management with humans out of the
   loop.  On the other hand, it converts service requirements (intent)
   into network policies and provides self-adapted customized service
   with a full lifecycle verification.  The functions of each module in
   intent-enabled layer are described below.

      Intent Translation Module

      Intent is expressed in the form of natural language, which is
      ambiguous and does not follow specific forms.  Thus, the intent
      translation module translates the intent expressed in a natural
      language through bidirectional long short-term memory (Bi-LSTM)
      and morphological rules, and outputs the network's understandable
      and regularized intent.  Meanwhile, the intent translation module
      analyzes the accuracy and completeness of the translated intent
      through intent verification and conflict resolution, and
      continuously monitors whether there are conflicts.  The intent
      translation module is the first step to realizing intent.  In
      short, the translation module provides a bridge between the users
      and the network and is responsible for ensuring the integrity and
      realizability of the input intent.  In addition, the result of the
      intent translation module is a critical foundation for the
      intelligent policy mapping module.

      Intelligent Policy Mapping Module

      The intelligent policy mapping module is the process of intent
      realization, in can consist of policy repository, fuzzy decision
      tree, and deep Q network (DQN).  A large number of atomic policies
      can be stored in the policy repository, which can be established
      by the historical policy and administrator operation and
      maintenance experience.  In particular, atomic policy refers to
      the smallest policy unit that can be executed but cannot be split
      again, such as some functional node configuration policies
      (routing selection, service provider node selection, etc.).  The
      function of the fuzzy decision tree is to generate new atomic
      policies for the policy repository or to adjust the existing
      atomic policies.  DQN is a combination of neural network and
      reinforcement learning, which are used to reorganize the atomic
      policies into a new policy that satisfies the current intent
      requirements.  The function of the neural network is to calculate
      the configuration scores for state-action pairs and outputs all
      actions.  Then the action with the highest configuration score is
      selected as the configuration action according to the Q-learning
      principle.

      Intent Guarantee Module



Chen, et al.            Expires 14 September 2023               [Page 6]

Internet-Draft            Network Working Group               March 2023


      The function of the intent guarantee module is to monitor the
      network in real time, collect and analyze the data of the faults
      that have occurred, and predict the faults that have not occurred
      in order to ensure the normal operation of the network.  First, a
      fault information table, including fault type, location, quantity,
      and occurrence time, is established based on the collected network
      abnormal information.  Second, a deep neural evolutionary network
      is used to repair faults and feed back the repair results to the
      intent translation module in real time.  A deep neural evolution
      network can not only repair faults, but also ensure the
      implementation of intents when network faults occur.

4.  Advantages

   The advantages of the intent based network management include:

      A specific intent based network management architecture is
      proposed for sensing diversified service intents with various
      scenarios, objectives, and preferences.

      The proposed framework can achieve zero touch management within a
      time bound, which can handle the complex services in a fully
      automatic manner.

      The performance benefits are in terms of adaptivity and
      scalability, which rewards various network environments and avoids
      network reconstructions.

5.  Concrete Example

   TBD

6.  Automated Network Management Tiers

   TBD

7.  Security Considerations

   TBD

8.  IANA Considerations

   This document has no requests to IANA.

9.  Normative References






Chen, et al.            Expires 14 September 2023               [Page 7]

Internet-Draft            Network Working Group               March 2023


   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC9315]  Clemm, A., Ciavaglia, L., Granville, L. Z., and J.
              Tantsura, "Intent-Based Networking - Concepts and
              Definitions", RFC 9315, DOI 10.17487/RFC9315, October
              2022, <https://www.rfc-editor.org/info/rfc9315>.

Authors' Addresses

   Danyang Chen
   China Mobile
   Beijing
   100053
   China
   Email: chendanyang@chinamobile.com


   Kehan Yao
   China Mobile
   Beijing
   100053
   China
   Email: yaokehan@chinamobile.com


   Chungang Yang
   Xidian University
   Xi'an
   710071
   China
   Email: cgyang@xidian.edu.cn


   Xinru Mi
   Xidian University
   Xi'an
   710071
   China
   Email: xinrum@163.com









Chen, et al.            Expires 14 September 2023               [Page 8]

Internet-Draft            Network Working Group               March 2023


   Ying Ouyang
   Xidian University
   Xi'an
   710071
   China
   Email: yingouyang224@163.com













































Chen, et al.            Expires 14 September 2023               [Page 9]