Internet DRAFT - draft-yanhuan-anima-policy

draft-yanhuan-anima-policy



Autonomic Networking Integrated Model and Approach	              H. Yan
Internet Draft		                                 Tsinghua University
Intended status: Informational      	                           Y. Li
Expires: January 2018                                Tsinghua University
	                                                              H. Sun
                                                     Huawei Technologies
                                                               C. Xiong
                                                     Huawei Technologies
                                                                  D. Jin
                                                     Tsinghua University
                                                        Auguest 30, 2017
        
		
		
		
		  A Generic Network Policy Model and its Deployment 
                 in Future Wireless Network System
                  draft-yanhuan-anima-policy-00.txt
			  
Abstract

	Recent years have witnessed a rapid development of wireless 
	communication technologies. Internet Service Providers (ISPs) are 
	willing to provide customized network services in a very short 
	time to their customers. However, since network demands are highly
	diverse, it is difficult to design the specific network policies 
	that implement the required network services for each scenario. In
	this document, we propose a generic network policy model for 
	future wireless network systems to meet different network demands 
	based on the typical scenarios. Meanwhile, to automatically and 
	intelligently deploy the policies defined by this model, we design 
	a novel architecture that orchestrates the high-level policies 
	into the low-level rules available in the underlying networks. 
	
Status of this Memo

	This Internet-Draft is submitted in full conformance with the
	provisions of BCP 78 and BCP 79. 
	
	Internet-Drafts are working documents of the Internet Engineering 
	Task Force (IETF), its areas, and its working groups.  Note that 
	other groups may also distribute working documents as 
	Internet-Drafts.
	
	Internet-Drafts are draft documents valid for a maximum of six 
	months and may be updated, replaced, or obsoleted by other 
	documents at any time.  It is inappropriate to use Internet-Drafts 
	as reference material or to cite them other than as "work in 
	progress."
	
	The list of current Internet-Drafts can be accessed at 
	http://www.ietf.org/ietf/1id-abstracts.txt
	
	
Yan, et al.	          Expires February 29, 2018	                [Page 1]

Internet-Draft	    Policy Model and its Application	     August 2017
	
	The list of Internet-Draft Shadow Directories can be accessed at 
	http://www.ietf.org/shadow.html
	
	This Internet-Draft will expire on February 29, 2018.

Copyright Notice

	Copyright (c) 2017 IETF Trust and the persons identified as the
	document authors. All rights reserved.
	
	This document is subject to BCP 78 and the IETF Trust's Legal 
	Provisions Relating to IETF Documents (http://trustee.ietf.org
	/license-info) in effect on the date of publication of this 
	document. Please review these documents carefully, as they describe 
	your rights and restrictions with respect to this document. Code 
	Components extracted from this document must include Simplified BSD 
	License text as described in Section 4.e of the Trust Legal 
	Provisions and are provided without warranty as described in the 
	Simplified BSD License.

	
Table of Contents

	1. Introduction	3
	2. Design Objective	4
	3. Requirements and Terminology	4
	3.1. Requirements	4
	3.2. Definition of Terms	4
	4. The Network Policy Model	4
	4.1. Model Overview	4
	4.2. Example	7
	5. The Deployment Architecture	7
	6. Summary	9
	7. Security Considerations	9
	8. IANA Considerations	9
	9. Informative References	9
	10. Acknowledgments	9

1. Introduction

    Wireless communication technologies have achieved a great progress 
	in recent years, which are indispensable in many important 
	applications such as Internet of Things (IoT), Augmented Reality 
	(AR). To impel the evolution of wireless network, Internet Service
	Providers (ISPs) have increased their investment to construct or 
	upgrade the network infrastructures, but they can hardly make big 
	profits. This is because they only provide the services of data 
	transmission, which is seen as the plumber. To address it, ISPs 
	have to innovate their service types and open the capability of 
	customizing network services through web portals. 	
	
Yan, et al.	          Expires February 29, 2018	                [Page 2]

Internet-Draft	    Policy Model and its Application	     August 2017

    However, it is challenging to provide such capabilities. First,
	network demands have become more diverse. Different customers 
	(e.g., enterprises) have different network requirements in their 	
	scenarios. It is expected to provide customized network services 
	for them on demand. However, it is impractical to design the 
	specific network policies for each scenario. Therefore, it is 
	required to design the generic network policy model to meet the 
	demands. Second, implementing network services often requires 
	network operators to manually configure network policies, which 
	leads to low efficiency and is prone to error. Moreover, this 
	process needs to take much time. To quickly and intelligently 
	deploy them, an effective approach is needed to compile the 
	abstract network policies into low-level rules available in the 
	underlying networks. 

    Many previous works [Chaithan_pga_sigcomm] have studied the design
	of network policy model and its deployment in the proposed network
	architecture. However, most of them are applied in the networks 
	deployed in datacenters. In this document, we design a generic 
	network policy model in future wireless network systems based on 
	the typical scenarios. Specifically, we abstract network 
	connections that can be seen as the most basic policies into 
	general types. Based on this abstraction, customers can specify 
	more complicated network policies by adding required network 
	functions. Furthermore, we propose a novel architecture to 
	automatically orchestrate high-level policies into low-level rules
	that can be used for the underlying networks. This helps to 
	improve the efficiency of policy deployment and user experience of
	network services. Therefore, our proposed policy model and its 
	implementation approach can benefit ISPs to design their network 
	systems to provide better network services and gain more revenue. 

2. Design Objective

    Our proposed network policy model aims at providing generic ways 
	to define network polices, which is suitable of customers to 
	conveniently request their on-demand network services. To deploy 
	them in a short time, we propose a modified architecture to 
	perform the automatic compilation. Therefore, it is beneficial of 
	ISPs to design their network systems to improve better network 
	services.
	
3. Requirements and Terminology

3.1. Requirements

    Based on the separation of the control and forwarding plane, the 
	future wireless network system requires to support the NFV 
	capability. Network functions can be implemented by means of the 
	virtualized technologies used in the generic sever. Thus, 
	controller can flexibly deploy required network functions in the
	underlying networks.
	
Yan, et al.	          Expires February 29, 2018	                [Page 3]

Internet-Draft	    Policy Model and its Application	     August 2017
	
3.2. Definition of Terms

    Network service: This consists of one or more network policies,
	which is often provided by the operators.
	
    Network function: It is responsible for processing the specific 
	packets. A network function can be implemented as a virtual 
	element in a generic sever or be embedded in a proprietary device.
	
    Network demand: This consists of required network resources.
	
    Service chain: This defines an ordered set of virtual network 
	functions. For example, firewall can be seen as a virtual network 
	function.
	
4. The Network Policy Model 

    In this section, we introduce our generic network policy model and
	illustrate how it can meet different network demands. 
	
4.1. Model Overview

    For the customers, when they request network services, they do not 
	care about the details in underlying networks. In other words, 
	they focus on network demands associated with their own business. 
	To design the generic model, we have to reasonably abstract 
	network policies used in different scenarios
	
    First, we introduce two basic elements in our model: vertex and 
	edge. We regard a vertex as an endpoint group consisting of 
	multiple endpoint (i.e., a server, a virtual machine or a user 
	equipment). Meanwhile, we can specify the attribute tag of the 
	vertex including the geolocation, tenant and running state. The 
	edge between two vertexes denotes a forwarding path, which is 
	directional. Moreover, the edge can be seen as a classifier that 
	specify packets from/to the required ports or the service chain 
	consisting of multiple network function elements (e.g., middlebox).
	
    Considering that some policies are performed when the special 
	conditions are satisfied, we introduce a novel connection mode, 
	which is called parallel mode. As shown in Figure 1, we define the
	edge drawn in dash line as the triggering condition, and the one 
	drawn in dotted line as the required action. This figure shows 
	that if the transmission delay between two nodes is greater than 
	10 ms, it is required to place an accelerator between them to 
	reduce the delay.

Yan, et al.	          Expires February 29, 2018	                [Page 4]

Internet-Draft	    Policy Model and its Application	     August 2017
	
                          +----------+
                   +------|Delay<10ms|------+
                   |      +----------+      |
                   |                        v
                  ++                        ++
                    +  +                      +  +
                  ++                        ++
                   .                        ^
                   .      +-----------+     .
                   .......|Accelerator|......
                          +-----------+
         Figure 1: The policy described in paralleling form
		 
    The network policies are requested on the basis of network 
	connections. Different scenarios have different demands of network 
	connections. For example, two network nodes need to communicate 
	with each other over virtual private network (VPN), which is 
	regarded as the point-to-point communication. To be closer to 
	practical scenarios, we divide the network connections into three 
	types: point to point (seen in Figure 2), point and multiple 
	points (seen in Figure 3), multiple points to multiple points 
	(seen in Figure 4). 
                         ++           ++
                        +  +-------->+  +
                         ++           ++

                    Figure 2: The point-to-point type

                       ++
                      +  ++
                       ++ |
                          |              ++
                          +------------>+  +
                          |              ++
                       ++ |
                      +  ++
                       ++

                 Figure 3: The point-and-multiple-points type
				 
                       ++                 ++
                      +  ++             >+  +
                       ++ |             | ++
                          |             |
                          +-------------|
                          |             |
                       ++ |             | ++
                      +  ++             >+  +
                       ++                 ++

               Figure 4: The multiple points to multiple points

Yan, et al.	          Expires February 29, 2018	                [Page 5]

Internet-Draft	    Policy Model and its Application	     August 2017
			   
    Point-to-point connection is used to establish connection between 
	two nodes, i.e., the connection over VPN. This is the simplest 
	connection type since it only involves the original and 
	destination nodes.
	
    Point and multiple-points connection is an asymmetric connection 
	type. This is because that network traffic has marked orientation. 
	Specifically, one node called the producer produces the large 
	traffic, while other nodes called the consumers consumes the 
	traffic. The reverse is also the same. The typical example is the 
	communication between user devices and the server provided by the 
	content provider.
	
    Multiple-points to multiple-points connection represents the
	interconnection among multiple nodes. The nodes in this type are
	not only service producers but also consumers. The typical example 
	is device to device communication.
	
4.2. Example

    Consider a typical IoT scenario. A company needs to establish 
	network connections to multiple wireless smart devices distributed 
	in three different regions. Meanwhile, it requires to guarantee 
	the communication security and reliability. According to our 
	designed policy model, we can request the network services showed 
	in Figure 5. Specifically, we can regard the devices in each 
	region as a virtual endpoint group. The demands between the 
	company and three endpoint group are the same. To guarantee the 
	security and reliability, the edge between the company and devices 
	need to add the firewall and QoS monitor.
	
	+--------------+
	|Device group 1+--+
	+--------------+  |
					  |
					  |
	+--------------+  |      +--------+   +-----------+    +---------+
	|Device group 2+--+------+Firewall+---+QoS monitor+---->Company A|
	+--------------+  |      +--------+   +-----------+    +---------+
					  |
					  |
	+--------------+  |
	|Device group 3+--+
	+--------------+
     Figure 5: Point and Multiple points connection in IoT scenario
	 

Yan, et al.	          Expires February 29, 2018	                [Page 6]

Internet-Draft	    Policy Model and its Application	     August 2017
	 
5. The Deployment Architecture

    In this section, we design a policy deployment architecture to 
	automatically compile the requested policies into forwarding rules 
	and network configurations.
	
    Figure 6 shows the policy deployment architecture in wireless
	network system. This architecture is decoupled the controlling 
	plane from the user plane, and consists of five major modules 
	including the application manager (AM), compiler, converter, 
	monitor and controller in controlling plane.
	
					 +-----+  +---------+
					 | AM  +--+ Compiler|
					 +-----+  +----+----+
								   |
							  +----+----+  +-------+
							  |Converter|--|Monitor|
							  +----+----+  +---+---+
								   |           |
							  +----+-----+     |
							  |Controller|     |
							  +----+-----+     |
								   |           |   
								  .--.         |
							  __(     ')__     |
						   (                ')_|
						 (                     ')
				   ( Wireless Network Infrastructure ')
						 (                     ')
							 (              )
							  '--(_____)--'
    Figure 6: The policy deployment architecture in future wireless 
	network systems
	
    AM is used to request network services based on our policy model. 
	It can provide services for customers via Application Programming 
	Interfaces (APIs). 
	
    The compiler is to compile high-level network policies. When 
	receiving the requested services, the compiler maps each vertex
	defined in policy model into a virtual network element, and 
	constructs a virtual network topology according to required 
	network connections. If a vertex participates in multiple 
	connection types, we have to add a divider to assure the isolation
	of different services. Meanwhile, the network function elements
	defined in each edge are mapped into virtual network devices. Note
	that in this phase we do not consider available network resources
	in the underlying networks. The purpose of such process is to hide
	from the differences in the underlying network and thus make it 
	more efficiently. 
	
	
Yan, et al.	          Expires February 29, 2018	                [Page 7]

Internet-Draft	    Policy Model and its Application	     August 2017
	
    Monitor is used to process the policies defined in parallel mode. 
	According to the policies, it needs to check whether the required 
	performance is fulfilled. To achieve it, it has to collect the 
	measurements from the underlying networks. When the performance 
	indicator is lower than the required value, it triggers the 
	request notifying the converter enforces pre-defined actions.

    Converter is to convert the results obtained from the compiler 
	into forwarding rules and network configurations. In this phase, 
	we have to consider available network resources in the underlying 
	networks. This information can be obtained from the controller. 
	Meanwhile, it also receives the request that performs the 
	value-added actions from monitor when policies in parallel mode is
	in effect.

    Controller is responsible for configuring network resources to the 
	underlying networks. It not only installs/uninstalls forwarding 
	rules to the switches in the underlying wireless network 
	infrastructure, but also creates, deletes and manages the virtual 
	network function entities in the underlying networks.
	
6. Summary

    This document proposes a generic policy model based on the 
	practical scenarios in future wireless network systems. With this 
	model, customers can conveniently request the network services 
	without caring about the details in the underlying networks. 
	Furthermore, we design an architecture to automatically deploy the 
	defined policies. Our architecture can benefit ISPs to improve 
	user experience on network services as well as increase their 
	revenue. 
	
Yan, et al.	          Expires February 29, 2018	                [Page 8]

Internet-Draft	    Policy Model and its Application	     August 2017
	
7. Security Considerations

    Security issues due to aggregating the service chains across 
	different administrative domain are an aspect for further study.
	
8. IANA Considerations

    This draft does not have any IANA considerations.

9. Informative References

    [Chaithan_pga_sigcomm]Chaithan Prakash, J. Lee, Yoshio Turner, 
	J.M. Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi 
	Ma,Puneet Sharma, and Ying Zhang. PGA: Using Graphs to Express and
	Automatically Reconcile Network Policies. SIGCOMM Comput. Commun,
	29-42, 2015.

10. Acknowledgments

    This document was prepared using 2-Word-v2.0.template.dot.
 
Authors' Addresses
Huan Yan
Tsinghua University
yanh14@mails.tsinghua.edu.cn

Yong Li
Tsinghua University
liyong07@tsinghua.edu.cn
	
Haiyang Sun
Huawei Technologies
sunhaiyang3@huawei.com

Chunshan Xiong
Huawei Technologies
sam.xiongchunshan@huawei.com

Depeng Jin
Tsinghua University
jindp@tsinghua.edu.cn

Yan, et al.	          Expires February 29, 2018	                [Page 9]