Re: [nmrg] draft-irtf-nmrg-autonomic-network-definitions-01 feedback

Laurent Ciavaglia <Laurent.Ciavaglia@alcatel-lucent.com> Mon, 21 July 2014 23:03 UTC

Return-Path: <laurent.ciavaglia@alcatel-lucent.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8C6A1A01C5 for <nmrg@ietfa.amsl.com>; Mon, 21 Jul 2014 16:03:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5
X-Spam-Level:
X-Spam-Status: No, score=-5 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gfe81sz-kFKK for <nmrg@ietfa.amsl.com>; Mon, 21 Jul 2014 16:03:14 -0700 (PDT)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A23B1A0010 for <nmrg@irtf.org>; Mon, 21 Jul 2014 16:03:14 -0700 (PDT)
Received: from us70uusmtp3.zam.alcatel-lucent.com (h135-5-2-65.lucent.com [135.5.2.65]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id s6LN37OY016593 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 21 Jul 2014 18:03:07 -0500 (CDT)
Received: from US70UWXCHHUB02.zam.alcatel-lucent.com (us70uwxchhub02.zam.alcatel-lucent.com [135.5.2.49]) by us70uusmtp3.zam.alcatel-lucent.com (GMO) with ESMTP id s6LN37qY020580 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 21 Jul 2014 19:03:07 -0400
Received: from [135.244.34.154] (135.5.27.17) by US70UWXCHHUB02.zam.alcatel-lucent.com (135.5.2.49) with Microsoft SMTP Server (TLS) id 14.2.247.3; Mon, 21 Jul 2014 19:03:06 -0400
Message-ID: <53CD9C24.4070002@alcatel-lucent.com>
Date: Tue, 22 Jul 2014 01:03:00 +0200
From: Laurent Ciavaglia <Laurent.Ciavaglia@alcatel-lucent.com>
Organization: Alcatel-Lucent Bell Labs France
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Michael Behringer (mbehring)" <mbehring@cisco.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>, "Benoit Claise (bclaise)" <bclaise@cisco.com>
References: <53CD5D41.6050302@cisco.com> <53CD8E33.7070808@gmail.com> <3AA7118E69D7CD4BA3ECD5716BAF28DF21BEE9C7@xmb-rcd-x14.cisco.com>
In-Reply-To: <3AA7118E69D7CD4BA3ECD5716BAF28DF21BEE9C7@xmb-rcd-x14.cisco.com>
Content-Type: multipart/alternative; boundary="------------060007030308090800000105"
X-Originating-IP: [135.5.27.17]
Archived-At: http://mailarchive.ietf.org/arch/msg/nmrg/3gMAAH4s9STWXyFV-spwr_dMcds
Cc: "nmrg@irtf.org" <nmrg@irtf.org>
Subject: Re: [nmrg] draft-irtf-nmrg-autonomic-network-definitions-01 feedback
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jul 2014 23:03:21 -0000

Dear Michael, all,

I generally agree with your explanation (difference and co-existence 
between intent and configuration). This makes sense to me.

However, I have a question/comment on: "a more specific guidance takes 
priority over a less specific one", why / how have we ended up that CLI 
shall/should take priority over an intent?
I would say that in the general case, again this makes sense and is 
perfectly applciable. However, taking the analogy of aviation, there are 
rules/principles(/laws), when a plane is operating in auto-pilot, that 
forbid a human pilot to take an action/command that will "harm" the 
plane/flight (i.e. the human could make mistakes, not be sane...).
So why should a CLI overrides an intent? or stated differently, we 
should insert some principles/laws to drive the priority among the 
different configuration/intent/other interactions. (see also reference 
text below for more detail)

What do you think?

Best regards, Laurent.

/--- (extracted from a technical report of EU FP7 UniverS//e//lf 
project) ---//
//[...]/

The most important thing is to demonstrate the operator that an 
autonomic management does not come along with incalculable risks such as 
network outages and the like. Intuitively, human beings always have a 
tendency to distrust features that are not under their full control. 
However, in other domains, such as in aviation, automated systems have 
already taken a substantial part of the control over a system with much 
higher security requirements (i.e. the safety of aircraft passengers) 
than those in the telecom area. Even beyond, an article of the IEEE 
Spectrum Magazine [39]highlight the remaining challenges and obstacles 
but also the close opportunity that unmanned or pilotless airplane 
become a daily reality. A good example is the autopilot of a commercial 
aircraft that relieves the actual pilot from routine actions. But not 
only that, the autopilot is also able to control complex manoeuvres and 
supports the safe landing of the aircraft. With this in mind it should 
not be too hard to assure a network operator that a trustworthy 
deployment of self-* features is possible.

In the following we will transfer some key principles from aviation to 
the self-* domain. The basis for this is a flight crew training manual 
for the Airbus 330/340[1] <#_ftn1>. We will cite relevant sentences / 
paragraphs from this manual in italics and explain how this principle 
can be applied to autonomic management of a telecom network (instead of 
an aircraft). The idea behind this exercise is to apply security 
principles that have already proven to work.

The autopilot is designed to fly the aircraft within the normal flight 
envelope**

The management of the network is autonomic unless there are severe problems

The autopilot automatically disengages if the aircraft flies 
significantly outside the normal flight envelope limits**

The automatic management of the network is automatically disengaged if 
the key performance indicators significantly differ from normal (good) 
values

With one engine inoperative, the AP can be used throughout the entire 
flight envelope without any restriction, including autoland**

There are self-healing features. For instance, if there are outages of 
network equipment, the network management system is able to recover 
without manual intervention

The relationship between sidestick input and the aircraft response is 
called the flight control law. Depending upon the status of the 
fly-by-wire system, three sets of control laws are provided, i.e. Normal 
Law, Alternate Law and Direct Law**

Depending on the status / situation of the network, there are different 
levels of how much control the autonomic management has with respect to 
the human being in charge

Under most circumstances, the aircraft is operated in Normal Law**

Usually the autonomic management has full control

Normal Law provides five different protections [e.g. high angle of 
attack protection or high speed protection].The protections are 
complementary and together work to maintain the aircraft in the safe 
flight envelope**

There is the concept of protection during "normal law" which does not 
let the pilot / human operator make any dangerous moves. For example, 
during take-off of an aircraft, the pilot usually cannot let the tail 
touch the ground -- without protection that would be possible with all 
its dangerous consequences. Likewise, during "normal law" the network 
operator should not be allowed to leave certain parameter limits that 
are known to have negative or nonlinear effects

In some cases of double failure, e.g. double hydraulic failure, the 
integrity and redundancy of the computers and other required systems are 
not sufficient to achieve normal law with its protections. In this case, 
Alternate Law is triggered**

In case of multiple problems that cannot be accommodated automatically, 
the human operator gains more (yet not full) control

If the aircraft is operated outside the normal flight envelope, the 
pilot must take appropriate corrective action to avoid losing control 
and/or to avoid high speed excursions, since the normal law protection 
features may not be available**

In case of "alternate law" there are fewer protections. This allows 
human operators to do moves that would be dangerous in normal 
situations, but necessary in exceptional situations

In most cases of triple failure [...] direct law is triggered. Autopilot 
and auto-trim are not available**

In some pathological cases, the human operator is in full control and no 
autonomic functionality is active. This is clearly the worst case and 
should be considered an extremely rare event

Cautions and warnings**

An interesting aspect of the flight manual is the differentiation 
between "cautions", which are solely prudent forethought to minimize 
risks, and "warnings". Please note that this differentiation would allow 
the human network operator to prioritize information that he/she gets 
from the autonomic system. What looks like a minor detail at first sight 
is in fact a major security feature (as information overflow can cause 
delays or failures on the human reaction side) that deserves attention

Computer replication / backup**

Obviously, a network management system must not be a single point of failure

*Conclusion:*

Concerning trust in autonomics, we can learn and apply a number of 
principles from an autonomic system that is yet more security-critical 
than a telecom network, namely the autopilot of an aircraft:

-The partition of control between autonomic management system and the 
human network operator should be changeable to different discrete 
control levels. A first example of these control levels in the context 
of the UMF and NEM is the change of state of a particular NEM from under 
trial to operational (and vice-versa) depending on its trust index 
estimations (see Section 3, and section 3.4 in particular).

-Depending on the control level, the human network operator should be 
protected from dangerous changes of parameters. In the context of UMF, 
these "boundaries" can be defined and applied via the use of policies 
and policy based management principles.

-The information the human network operator receives from the network 
management system should be on clearly defined hierarchical levels so 
that information can be easily filtered depending on the current needs. 
In the context of the UMF and NEM, this information may take the form of 
a Call for Governance


------------------------------------------------------------------------

[1] <#_ftnref1>A330 & A340 Flight Crew Training Manual, FCTM Presentation



On 22/07/2014 00:45, Michael Behringer (mbehring) wrote:
> Let me expand a bit about intent versus configuration.
>
> For now, I stick to what is written in the document:
>
> 1. Intent does NOT contain configuration. (note: "contain")
> 2. An autonomic function does not REQUIRE configuration. This does not mean that there couldn't be a function that runs in a default mode using only intent, but could be locally also use some configuration.
>
> So, to me, intent and configuration will co-exist, but configuration is not part of the autonomic part (which is why I think the doc is actually correct).
>
> There is a need for conflict resolution. And this works something like this:
>
> prio 0: default behaviour (without intent)
> prio 1: intent
> prio 2: other (netconf, SNMP, i2rs, CLI, ...)
>
> In other words, a more specific guidance takes priority over a less specific one. Following this, an intent guidance will be overruled by CLI.  (how the various options in my "prio 2" are sorted is outside scope for this discussion, and I guess someone has worked this out already?)
>
> For you Benoit, this leads to two questions:
> 1. does the above explanation make sense, or am I missing your point?
> 2. if it does, should this explanation in some form go into the definitions draft?
>
> Regarding:
> --
> 3.7 Modularity
> Section 3 intro says:
>
>     This section explains the high level goals of Autonomic Networking,
>     independent of any specific solutions.
>
> Is this an Autonomic Networking design goal to be modular? Not really
> I see this more like a good deployment practice, i.e. if you think about an autonomic protocol, please think of deployment, i.e. modularity
> --
>
> I wonder whether we should just delete that section? You are right, this is not specific to AN.
>
> The other comments are clear, and I'll take care of them.
>
> Michael
>
>
>> -----Original Message-----
>> From: nmrg [mailto:nmrg-bounces@irtf.org] On Behalf Of Brian E Carpenter
>> Sent: 21 July 2014 18:04
>> To: Benoit Claise (bclaise)
>> Cc: nmrg@irtf.org
>> Subject: Re: [nmrg] draft-irtf-nmrg-autonomic-network-definitions-01
>> feedback
>>
>> Thanks Benoit. Michael has the editing pen so I will only comment on one
>> point right now:
>>
>>> I guess you want to rephrase that the intent is a general policy above
>>> configuration or information for a specific node,
>> I think it can also be for a specific role, where a bunch of nodes can all fill
>> that role (e.g. an intent that applies to all CE routers, or all AFTRs,...).
>>
>> Regards
>>     Brian
>>
>> _______________________________________________
>> nmrg mailing list
>> nmrg@irtf.org
>> https://www.irtf.org/mailman/listinfo/nmrg
> _______________________________________________
> nmrg mailing list
> nmrg@irtf.org
> https://www.irtf.org/mailman/listinfo/nmrg
>
>

-- 

Bien cordialement, Best regards,

*Laurent Ciavaglia*

Research Manager | Project Manager

Network Algorithms, Protocols and Security Group

Bell Labs | Alcatel Lucent

phone: +33 160 402 636

email: laurent.ciavaglia@alcatel-lucent.com 
<mailto:laurent.ciavaglia@alcatel-lucent.com>

linkedin: laurentciavaglia <http://fr.linkedin.com/in/laurentciavaglia/>

address: Route de Villejust | 91620 NOZAY | France