Re: [ncrg] Recording of last NCRG meeting

"Michael Behringer (mbehring)" <mbehring@cisco.com> Tue, 17 September 2013 08:32 UTC

Return-Path: <mbehring@cisco.com>
X-Original-To: ncrg@ietfa.amsl.com
Delivered-To: ncrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7126111E8396 for <ncrg@ietfa.amsl.com>; Tue, 17 Sep 2013 01:32:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level:
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nQW-K7rhscns for <ncrg@ietfa.amsl.com>; Tue, 17 Sep 2013 01:32:31 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id CA3B311E80EC for <ncrg@irtf.org>; Tue, 17 Sep 2013 01:32:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16370; q=dns/txt; s=iport; t=1379406751; x=1380616351; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=HK28+l2hwSDIpcknNCh17a2DP0+nyeXwuo3nuwqzOxk=; b=T7DT/gju5feBQZncH1lp7Kbl1mZSNw7w/BjHExzAXiNB4Z/9niq3zDLX eXmsbsrR9PwmFzdk35NkunIZw3veyt1856zeO1b2gU0VYdU7LV+1DBjQq bel4mh3vITDGZ5nDqr/ta5CdFkjyfG8mPiKvU8IYyqnRI53Q5H0y7UFd4 o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AkAFAJ0SOFKtJXG9/2dsb2JhbABBGoJDRDhSwRaBIBZ0giUBAQEEAQEBKkELEAIBCBEBAwEBCx0HIQYLFAMGCAEBBA4FCAGHaAMPDDawWw2JO4x7gjsPHgQGAQaDGIEAA5YSjiqFM4Mkgio
X-IronPort-AV: E=Sophos; i="4.90,921,1371081600"; d="scan'208,217"; a="260696480"
Received: from rcdn-core2-2.cisco.com ([173.37.113.189]) by rcdn-iport-7.cisco.com with ESMTP; 17 Sep 2013 08:32:27 +0000
Received: from xhc-aln-x04.cisco.com (xhc-aln-x04.cisco.com [173.36.12.78]) by rcdn-core2-2.cisco.com (8.14.5/8.14.5) with ESMTP id r8H8WQFD030284 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 17 Sep 2013 08:32:26 GMT
Received: from xmb-rcd-x14.cisco.com ([169.254.4.14]) by xhc-aln-x04.cisco.com ([173.36.12.78]) with mapi id 14.02.0318.004; Tue, 17 Sep 2013 03:32:26 -0500
From: "Michael Behringer (mbehring)" <mbehring@cisco.com>
To: Rana Sircar <sircar.rana@gmail.com>
Thread-Topic: [ncrg] Recording of last NCRG meeting
Thread-Index: Ac6qOI9j6LFGzlyiRSaezgogqMKPMAANSjgAAkSl83A=
Date: Tue, 17 Sep 2013 08:32:25 +0000
Message-ID: <3AA7118E69D7CD4BA3ECD5716BAF28DF1D638A41@xmb-rcd-x14.cisco.com>
References: <3AA7118E69D7CD4BA3ECD5716BAF28DF1D5FC5FF@xmb-rcd-x14.cisco.com> <CAPjPJcmJBh4V2y57a-UrMz1nk0Zp3=wU5mqwZpk66jKRrgYL=Q@mail.gmail.com>
In-Reply-To: <CAPjPJcmJBh4V2y57a-UrMz1nk0Zp3=wU5mqwZpk66jKRrgYL=Q@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.55.238.140]
Content-Type: multipart/alternative; boundary="_000_3AA7118E69D7CD4BA3ECD5716BAF28DF1D638A41xmbrcdx14ciscoc_"
MIME-Version: 1.0
Cc: "ncrg@irtf.org" <ncrg@irtf.org>
Subject: Re: [ncrg] Recording of last NCRG meeting
X-BeenThere: ncrg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Network Complexity Research Group <ncrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/ncrg>, <mailto:ncrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/ncrg>
List-Post: <mailto:ncrg@irtf.org>
List-Help: <mailto:ncrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/ncrg>, <mailto:ncrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Sep 2013 08:32:35 -0000

Rana,

Apologies for the late response, I'm very much under water at the moment. If you are on today's NCRG call, I suggest we take the discussion there. I think you have very interesting ideas!

Thanks,
Michael


From: Rana Sircar [mailto:sircar.rana@gmail.com]
Sent: 05 September 2013 16:26
To: Michael Behringer (mbehring)
Cc: ncrg@irtf.org
Subject: Re: [ncrg] Recording of last NCRG meeting

Hi Michael and Russ,

In continuation to our discussion in the call the other day, I thought of jotting down my thoughts and proposal to define the problem space. We have already seen examples of Metrics as outlined by you earlier e.g., Cost, Bandwidth / delay / jitter, Configuration complexity, Susceptibility to Denial-of-Service, Security (confidentiality / integrity), Scalability etc. Russ highlighted multiple examples of pairs of Variables. Two aspects were ongoing in my thoughts as I heard you all - how do you define this Complexity and is there some standard term that we can borrow from Nature and other Complexity analysis as pointed out by David.

One Term that seems to be used across Natural world for measure of Information and disorder is Entropy. Thermodynamic Entropy is used to measure Disorder. Similarly Shannon entropy quantifies the expected value of the information contained in a message. Some authors have used multiscale entropy analysis to measure complexity of network traffic (see attached papers). As I explained the other day, I was looking at Entropy to measure the Complexity of networks. Ofcourse, we still need to define that.

Now, let us assume that Complexity of the Network is defined by a Function of many variables called "Network Entropy", such that the goal of every network designer would be to minimise this Function. Then, the goal of the Network complexity framework is:

Minimize [ Network Entropy (variable 1, variable 2, ....variable n)] ---- our  Objective Function

Now, we need to now formulate 'n' constrain equations for these variables:
1. Constraints of Cost (c1.....cn)
2. Constraints of Control Plane State
3. Constraints of Optimal Forwarding State / Paths
4. Constraints of Configuration State
5. Constraints of Failure Domain Separation
6. Constraints of Policy Architecture
7. Constraints of Configuration State etc...etc...

One aspect of draft-irtf-ncrg-network-design-complexity-00 that Russ presented is very interesting - we can have an initial state that is at a lower complexity level e.g., simple routing with simplest configuration and minimum number of subscribers and simple traffic floows due to basic level of services and Applications. Now as time grows, each of these become complex since more subscriber / Routers / Apps / Services etc. come in. Thus, clearly, we have an initial simple state of "Network Entropy" and future more complex state of this variable.

There are different deployment of Networks serving different purposes and goals. The Framework Document should provide Guidance for defining this overall approach to simulate and optimize / minimize the Network Entropy. Thus, based on the Usage, the Objective Function can be defined as well as the the constraints.

Hope that I was able to put across my thoughts...

Best Regards,
Rana

Best Regards,
Rana Sircar
GSM+919899003705|

On 5 September 2013 18:41, Michael Behringer (mbehring) <mbehring@cisco.com<mailto:mbehring@cisco.com>> wrote:
On Tuesday, Russ White presented his and Alvaro's draft, and we had some interesting discussion throughout the call.
http://www.ietf.org/internet-drafts/draft-irtf-ncrg-network-design-complexity-00.txt

The recording is available here:
https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=71094517&rKey=67cfc3967052661f

Thanks Russ for the presentation.
Michael
_______________________________________________
ncrg mailing list
ncrg@irtf.org<mailto:ncrg@irtf.org>
https://www.irtf.org/mailman/listinfo/ncrg