Re: [Idnet] Summary 20170814 & IDN dedicated session call for case

Hesham ElBakoury <Hesham.ElBakoury@huawei.com> Wed, 16 August 2017 02:22 UTC

Return-Path: <Hesham.ElBakoury@huawei.com>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B362132455 for <idnet@ietfa.amsl.com>; Tue, 15 Aug 2017 19:22:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dw8Szki9qYKL for <idnet@ietfa.amsl.com>; Tue, 15 Aug 2017 19:22:00 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E58481323C1 for <idnet@ietf.org>; Tue, 15 Aug 2017 19:21:59 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DMS19913; Wed, 16 Aug 2017 02:21:57 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.301.0; Wed, 16 Aug 2017 03:21:56 +0100
Received: from SJCEML701-CHM.china.huawei.com ([169.254.3.191]) by SJCEML702-CHM.china.huawei.com ([169.254.4.148]) with mapi id 14.03.0301.000; Tue, 15 Aug 2017 19:21:45 -0700
From: Hesham ElBakoury <Hesham.ElBakoury@huawei.com>
To: Haoyu song <haoyu.song@huawei.com>, yanshen <yanshen@huawei.com>, "idnet@ietf.org" <idnet@ietf.org>
Thread-Topic: Summary 20170814 & IDN dedicated session call for case
Thread-Index: AdMUrc8Ikmqfd+z8QxaI3D4f5YkgmgBFDo4AAA5JSBAADruyIA==
Date: Wed, 16 Aug 2017 02:21:44 +0000
Message-ID: <C3855D43D6701846AD1151A536E7A05824701BE3@SJCEML701-CHM.china.huawei.com>
References: <6AE399511121AB42A34ACEF7BF25B4D2982F34@DGGEMM505-MBX.china.huawei.com> <C3855D43D6701846AD1151A536E7A05824700491@SJCEML701-CHM.china.huawei.com> <78A2745BE9B57D4F9D27F86655EB87F925997F85@SJCEML701-CHM.china.huawei.com>
In-Reply-To: <78A2745BE9B57D4F9D27F86655EB87F925997F85@SJCEML701-CHM.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.135.45]
Content-Type: multipart/alternative; boundary="_000_C3855D43D6701846AD1151A536E7A05824701BE3SJCEML701CHMchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090205.5993AC46.0022, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.3.191, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 43a6cfdcfe6e42dbffe3f653857679b4
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/7-_kErlUrgFVZ312OBqBBhrg4xY>
Subject: Re: [Idnet] Summary 20170814 & IDN dedicated session call for case
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Aug 2017 02:22:04 -0000

I would think that the self-service revolution can provide useful use cases for ML/AI.

Hesham

From: Haoyu song
Sent: Tuesday, August 15, 2017 1:10 PM
To: Hesham ElBakoury; yanshen; idnet@ietf.org
Subject: RE: Summary 20170814 & IDN dedicated session call for case

Obviously we are not going to apply ML on networking just for the sake of ML. In my opinion, the only reason to apply ML is that it’s proved to be a better (or only) way to solve a problem. We have seen a few successful examples such as ETA and root cause analysis, and ML approaches seem promising on solving some networking problems, but I also agree that we are still far from  the conclusion (or don’t even have clear understanding) that all these use cases can be better solved by ML. Then it is even farther to think about standardizing the related protocols and interfaces at the current stage. That said, this doesn’t prevent us from studying the possibilities. The most important thing is to develop more solid use cases to demonstrate that ML is not only useful but preferred. The current list is still too high level which doesn’t help me gain such confidence yet. Hopefully more detailed reports will come.

Haoyu

From: IDNET [mailto:idnet-bounces@ietf.org] On Behalf Of Hesham ElBakoury
Sent: Tuesday, August 15, 2017 5:49 AM
To: yanshen <yanshen@huawei.com>; idnet@ietf.org
Subject: Re: [Idnet] Summary 20170814 & IDN dedicated session call for case

Hi Yanshen,

In all of these use cases what problems we are trying to solve that have not been solved before or why existing solutions are not good enough ?

Thanks

Hesham

From: IDNET [mailto:idnet-bounces@ietf.org] On Behalf Of yanshen
Sent: Sunday, August 13, 2017 8:36 PM
To: idnet@ietf.org<mailto:idnet@ietf.org>
Subject: [Idnet] Summary 20170814 & IDN dedicated session call for case

Dear all,

Here is a summary and some index (2017.08.14). Till now, whatever the case is supported or not, I tried to organize all the content and keep the core part. It is still welcome to contribute and discuss.

If I miss something important, please let me know. Apologized in advance.

Yansen


---------  Roadmap  ---------
***Aug. : Collecting the use cases (related with NM). Rough thoughts and requirements
Sep. : Refining the cases and abstract the common elements
Oct. : Deeply analysis. Especially on Data Format, control flow, or other key points
Nov.: F2F discussions on IETF100
---------  Roadmap End  ---------


1. Gap and Requirement Analysis
    1.1 Network Management requirement
    1.2 TBD
2. Use Cases
    2.1 Traffic Prediction
                   Proposed by: yanshen@huawei.com<mailto:yanshen@huawei.com>
                   Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00131.html
                   Abstract: Collect the history traffic data and external data which may influence the traffic. Predict the traffic in short/long/specific term. Avoid the congestion or risk in previously.

    2.2 QoS Management
                   Proposed by: yanshen@huawei.com<mailto:yanshen@huawei.com>
                   Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00131.html
                   Abstract: Use multiple paths to distribute the traffic flows. Adjust the percentages. Avoid congestion and ensure QoS.

    2.3 Application (and/or DDoS) detection
                   Proposed by: aydinulas@gmx.net<mailto:aydinulas@gmx.net>
                   Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00133.html
                   Abstract: Detect the application (or attack) from network packets (HTTPS or plain) Collect the history traffic data and identify a service or attack (ex: Skype, Viber, DDoS attack etc.)

         2.4 QoE Management
                   Proposed by: albert.cabellos@gmail.com<mailto:albert.cabellos@gmail.com>
                   Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00137.html
                   Abstract: Collect low-level metrics (SNR, latency, jitter, losses, etc) and measure QoE. Then use ML to understand what is the relation between satisfactory QoE and the low-level metrics. As an example learn that when delay>N then QoE is degraded, but when M<delay<N then QoE is satisfactory for the customers (please note that QoE cannot be measured directly over your network). This is useful to understand how the network must be operated to provide satisfactory QoE.

         2.5 (Encrypted) Traffic Classification
                   Proposed by: jerome.francois@inria.fr<mailto:jerome.francois@inria.fr>; mskim16@etri.re.kr<mailto:mskim16@etri.re.kr>
                   Track: [Jerome] https://www.ietf.org/mail-archive/web/idnet/current/msg00141.html ; [Min-Suk Kim] https://www.ietf.org/mail-archive/web/idnet/current/msg00153.html
                   Abstract:
                            [Jerome] collect flow-level traffic metrics such as protocol information but also meta metrics such as distribution of packet sizes, inter-arrival times... Then use such information to label the traffic with the underlying application assuming that the granularity of classification may vary (type of application, exact application name, version...)
                            [Min-Suk Kim] continuously collect packet data, then applying learning process for traffic classification with generating application using deep learning models such as CNN (convolutional neural network) and RNN (recurrent neural network). Data-set to apply into the models are generated by processing with features of information from flow in packet data.

         2.6 TBD

3. Data Focus
    3.1 Data attribute
    3.2 Data format
    3.3 TBD

4. Support Technologies
    4.1 Benchmarking Framework
                   Proposed by: pedro@nict.go.jp<mailto:pedro@nict.go.jp>
                   Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00146.html
                   Abstract: A proper benchmarking framework comprises a set of reference procedures, methods, and models that can (or better *must*) be followed to assess the quality of an AI mechanism proposed to be applied to the network management/control area. Moreover, and much more specific to the IDNET topics, is the inclusion, dependency, or just the general relation of a standard format enforced to the data that is used (input) and produced (output) by the framework, so a kind of "data market" can arise without requiring to transform the data. The initial scope of input/output data would be the datasets, but also the new knowledge items that are stated as a result of applying the benchmarking procedures defined by the framework, which can be collected together to build a database of benchmark results, or just contrasted with other existing entries in the database to know the position of the solution just evaluated. This increases the usefulness of IDNET.

    4.2 TBD