Re: [nmrg] draft-irtf-nmrg-autonomic-network-definitions-01 feedback
Laurent Ciavaglia <Laurent.Ciavaglia@alcatel-lucent.com> Mon, 21 July 2014 23:03 UTC
Return-Path: <laurent.ciavaglia@alcatel-lucent.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8C6A1A01C5 for <nmrg@ietfa.amsl.com>; Mon, 21 Jul 2014 16:03:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5
X-Spam-Level:
X-Spam-Status: No, score=-5 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gfe81sz-kFKK for <nmrg@ietfa.amsl.com>; Mon, 21 Jul 2014 16:03:14 -0700 (PDT)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A23B1A0010 for <nmrg@irtf.org>; Mon, 21 Jul 2014 16:03:14 -0700 (PDT)
Received: from us70uusmtp3.zam.alcatel-lucent.com (h135-5-2-65.lucent.com [135.5.2.65]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id s6LN37OY016593 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 21 Jul 2014 18:03:07 -0500 (CDT)
Received: from US70UWXCHHUB02.zam.alcatel-lucent.com (us70uwxchhub02.zam.alcatel-lucent.com [135.5.2.49]) by us70uusmtp3.zam.alcatel-lucent.com (GMO) with ESMTP id s6LN37qY020580 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 21 Jul 2014 19:03:07 -0400
Received: from [135.244.34.154] (135.5.27.17) by US70UWXCHHUB02.zam.alcatel-lucent.com (135.5.2.49) with Microsoft SMTP Server (TLS) id 14.2.247.3; Mon, 21 Jul 2014 19:03:06 -0400
Message-ID: <53CD9C24.4070002@alcatel-lucent.com>
Date: Tue, 22 Jul 2014 01:03:00 +0200
From: Laurent Ciavaglia <Laurent.Ciavaglia@alcatel-lucent.com>
Organization: Alcatel-Lucent Bell Labs France
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Michael Behringer (mbehring)" <mbehring@cisco.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>, "Benoit Claise (bclaise)" <bclaise@cisco.com>
References: <53CD5D41.6050302@cisco.com> <53CD8E33.7070808@gmail.com> <3AA7118E69D7CD4BA3ECD5716BAF28DF21BEE9C7@xmb-rcd-x14.cisco.com>
In-Reply-To: <3AA7118E69D7CD4BA3ECD5716BAF28DF21BEE9C7@xmb-rcd-x14.cisco.com>
Content-Type: multipart/alternative; boundary="------------060007030308090800000105"
X-Originating-IP: [135.5.27.17]
Archived-At: http://mailarchive.ietf.org/arch/msg/nmrg/3gMAAH4s9STWXyFV-spwr_dMcds
Cc: "nmrg@irtf.org" <nmrg@irtf.org>
Subject: Re: [nmrg] draft-irtf-nmrg-autonomic-network-definitions-01 feedback
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jul 2014 23:03:21 -0000
Dear Michael, all, I generally agree with your explanation (difference and co-existence between intent and configuration). This makes sense to me. However, I have a question/comment on: "a more specific guidance takes priority over a less specific one", why / how have we ended up that CLI shall/should take priority over an intent? I would say that in the general case, again this makes sense and is perfectly applciable. However, taking the analogy of aviation, there are rules/principles(/laws), when a plane is operating in auto-pilot, that forbid a human pilot to take an action/command that will "harm" the plane/flight (i.e. the human could make mistakes, not be sane...). So why should a CLI overrides an intent? or stated differently, we should insert some principles/laws to drive the priority among the different configuration/intent/other interactions. (see also reference text below for more detail) What do you think? Best regards, Laurent. /--- (extracted from a technical report of EU FP7 UniverS//e//lf project) ---// //[...]/ The most important thing is to demonstrate the operator that an autonomic management does not come along with incalculable risks such as network outages and the like. Intuitively, human beings always have a tendency to distrust features that are not under their full control. However, in other domains, such as in aviation, automated systems have already taken a substantial part of the control over a system with much higher security requirements (i.e. the safety of aircraft passengers) than those in the telecom area. Even beyond, an article of the IEEE Spectrum Magazine [39]highlight the remaining challenges and obstacles but also the close opportunity that unmanned or pilotless airplane become a daily reality. A good example is the autopilot of a commercial aircraft that relieves the actual pilot from routine actions. But not only that, the autopilot is also able to control complex manoeuvres and supports the safe landing of the aircraft. With this in mind it should not be too hard to assure a network operator that a trustworthy deployment of self-* features is possible. In the following we will transfer some key principles from aviation to the self-* domain. The basis for this is a flight crew training manual for the Airbus 330/340[1] <#_ftn1>. We will cite relevant sentences / paragraphs from this manual in italics and explain how this principle can be applied to autonomic management of a telecom network (instead of an aircraft). The idea behind this exercise is to apply security principles that have already proven to work. The autopilot is designed to fly the aircraft within the normal flight envelope** The management of the network is autonomic unless there are severe problems The autopilot automatically disengages if the aircraft flies significantly outside the normal flight envelope limits** The automatic management of the network is automatically disengaged if the key performance indicators significantly differ from normal (good) values With one engine inoperative, the AP can be used throughout the entire flight envelope without any restriction, including autoland** There are self-healing features. For instance, if there are outages of network equipment, the network management system is able to recover without manual intervention The relationship between sidestick input and the aircraft response is called the flight control law. Depending upon the status of the fly-by-wire system, three sets of control laws are provided, i.e. Normal Law, Alternate Law and Direct Law** Depending on the status / situation of the network, there are different levels of how much control the autonomic management has with respect to the human being in charge Under most circumstances, the aircraft is operated in Normal Law** Usually the autonomic management has full control Normal Law provides five different protections [e.g. high angle of attack protection or high speed protection].The protections are complementary and together work to maintain the aircraft in the safe flight envelope** There is the concept of protection during "normal law" which does not let the pilot / human operator make any dangerous moves. For example, during take-off of an aircraft, the pilot usually cannot let the tail touch the ground -- without protection that would be possible with all its dangerous consequences. Likewise, during "normal law" the network operator should not be allowed to leave certain parameter limits that are known to have negative or nonlinear effects In some cases of double failure, e.g. double hydraulic failure, the integrity and redundancy of the computers and other required systems are not sufficient to achieve normal law with its protections. In this case, Alternate Law is triggered** In case of multiple problems that cannot be accommodated automatically, the human operator gains more (yet not full) control If the aircraft is operated outside the normal flight envelope, the pilot must take appropriate corrective action to avoid losing control and/or to avoid high speed excursions, since the normal law protection features may not be available** In case of "alternate law" there are fewer protections. This allows human operators to do moves that would be dangerous in normal situations, but necessary in exceptional situations In most cases of triple failure [...] direct law is triggered. Autopilot and auto-trim are not available** In some pathological cases, the human operator is in full control and no autonomic functionality is active. This is clearly the worst case and should be considered an extremely rare event Cautions and warnings** An interesting aspect of the flight manual is the differentiation between "cautions", which are solely prudent forethought to minimize risks, and "warnings". Please note that this differentiation would allow the human network operator to prioritize information that he/she gets from the autonomic system. What looks like a minor detail at first sight is in fact a major security feature (as information overflow can cause delays or failures on the human reaction side) that deserves attention Computer replication / backup** Obviously, a network management system must not be a single point of failure *Conclusion:* Concerning trust in autonomics, we can learn and apply a number of principles from an autonomic system that is yet more security-critical than a telecom network, namely the autopilot of an aircraft: -The partition of control between autonomic management system and the human network operator should be changeable to different discrete control levels. A first example of these control levels in the context of the UMF and NEM is the change of state of a particular NEM from under trial to operational (and vice-versa) depending on its trust index estimations (see Section 3, and section 3.4 in particular). -Depending on the control level, the human network operator should be protected from dangerous changes of parameters. In the context of UMF, these "boundaries" can be defined and applied via the use of policies and policy based management principles. -The information the human network operator receives from the network management system should be on clearly defined hierarchical levels so that information can be easily filtered depending on the current needs. In the context of the UMF and NEM, this information may take the form of a Call for Governance ------------------------------------------------------------------------ [1] <#_ftnref1>A330 & A340 Flight Crew Training Manual, FCTM Presentation On 22/07/2014 00:45, Michael Behringer (mbehring) wrote: > Let me expand a bit about intent versus configuration. > > For now, I stick to what is written in the document: > > 1. Intent does NOT contain configuration. (note: "contain") > 2. An autonomic function does not REQUIRE configuration. This does not mean that there couldn't be a function that runs in a default mode using only intent, but could be locally also use some configuration. > > So, to me, intent and configuration will co-exist, but configuration is not part of the autonomic part (which is why I think the doc is actually correct). > > There is a need for conflict resolution. And this works something like this: > > prio 0: default behaviour (without intent) > prio 1: intent > prio 2: other (netconf, SNMP, i2rs, CLI, ...) > > In other words, a more specific guidance takes priority over a less specific one. Following this, an intent guidance will be overruled by CLI. (how the various options in my "prio 2" are sorted is outside scope for this discussion, and I guess someone has worked this out already?) > > For you Benoit, this leads to two questions: > 1. does the above explanation make sense, or am I missing your point? > 2. if it does, should this explanation in some form go into the definitions draft? > > Regarding: > -- > 3.7 Modularity > Section 3 intro says: > > This section explains the high level goals of Autonomic Networking, > independent of any specific solutions. > > Is this an Autonomic Networking design goal to be modular? Not really > I see this more like a good deployment practice, i.e. if you think about an autonomic protocol, please think of deployment, i.e. modularity > -- > > I wonder whether we should just delete that section? You are right, this is not specific to AN. > > The other comments are clear, and I'll take care of them. > > Michael > > >> -----Original Message----- >> From: nmrg [mailto:nmrg-bounces@irtf.org] On Behalf Of Brian E Carpenter >> Sent: 21 July 2014 18:04 >> To: Benoit Claise (bclaise) >> Cc: nmrg@irtf.org >> Subject: Re: [nmrg] draft-irtf-nmrg-autonomic-network-definitions-01 >> feedback >> >> Thanks Benoit. Michael has the editing pen so I will only comment on one >> point right now: >> >>> I guess you want to rephrase that the intent is a general policy above >>> configuration or information for a specific node, >> I think it can also be for a specific role, where a bunch of nodes can all fill >> that role (e.g. an intent that applies to all CE routers, or all AFTRs,...). >> >> Regards >> Brian >> >> _______________________________________________ >> nmrg mailing list >> nmrg@irtf.org >> https://www.irtf.org/mailman/listinfo/nmrg > _______________________________________________ > nmrg mailing list > nmrg@irtf.org > https://www.irtf.org/mailman/listinfo/nmrg > > -- Bien cordialement, Best regards, *Laurent Ciavaglia* Research Manager | Project Manager Network Algorithms, Protocols and Security Group Bell Labs | Alcatel Lucent phone: +33 160 402 636 email: laurent.ciavaglia@alcatel-lucent.com <mailto:laurent.ciavaglia@alcatel-lucent.com> linkedin: laurentciavaglia <http://fr.linkedin.com/in/laurentciavaglia/> address: Route de Villejust | 91620 NOZAY | France
- [nmrg] draft-irtf-nmrg-autonomic-network-definiti… Benoit Claise
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Brian E Carpenter
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Michael Behringer (mbehring)
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Laurent Ciavaglia
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Arran Cudbard-Bell
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Benoit Claise
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Laurent Ciavaglia
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Brian E Carpenter
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Olivier Festor
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Sheng Jiang
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Michael Behringer (mbehring)
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Alexander Clemm (alex)
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Brian E Carpenter
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Alexander Clemm (alex)
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Brian E Carpenter
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Benoit Claise
- Re: [nmrg] draft-irtf-nmrg-autonomic-network-defi… Michael Behringer (mbehring)